`
`IN THE UNITED STATES DISTRICT COURT
`FOR THE DISTRICT OF DELAWARE
`
`C.A. No. _______________
`
`JURY TRIAL DEMANDED
`
`))))))))))))
`
`INTERNATIONAL BUSINESS MACHINES
`CORPORATION,
`
`Plaintiff,
`
`v.
`
`RAKUTEN, INC., RAKUTEN USA, INC.,
`RAKUTEN COMMERCE, LLC, and
`EBATES INC. DBA RAKUTEN,
`
`Defendants.
`
`COMPLAINT FOR PATENT INFRINGEMENT
`
`Plaintiff International Business Machines Corporation (“IBM”), for its Complaint for
`
`Patent Infringement against Rakuten, Inc., Rakuten USA, Inc., Rakuten Commerce, LLC, and
`
`Ebates Inc. dba Rakuten (collectively, “Rakuten”), demands a trial by jury on all issues so triable
`
`and alleges as follows:
`
`INTRODUCTION
`
`1.
`
`IBM is in the innovation business. Every year, IBM spends billions of dollars on
`
`research and development to invent, market, and sell new technology. For example, through its
`
`investments and innovations in the new frontier of quantum information science, IBM is the leader
`
`in commercializing quantum computing, once thought to be a purely academic exercise. IBM’s Q
`
`Network service—a community of Fortune 500 companies, academic institutions, research
`
`organizations, and startups working with IBM to advance quantum computing—now has over 100
`
`members.
`
`2.
`
`IBM obtains patents on the technology its inventors develop. IBM’s commitment
`
`to research and innovation has resulted in numerous inventions that have led to the thousands of
`
`patents awarded to IBM by the United States Patent Office each year. In fact, for each of the last
`
`
`
`Case 1:21-cv-00461-UNA Document 1 Filed 03/29/21 Page 2 of 47 PageID #: 2
`
`28 years, IBM scientists and researchers have been awarded more U.S. patents than those of any
`
`other company. Those patents are critical to IBM’s business and its licensing philosophy.
`
`3.
`
`For example, for over twenty years, IBM has been a strong proponent of open
`
`source technologies. IBM was a founding member of Open Invention Network, the largest patent
`
`non-aggression community in history, which supports freedom of action in Linux, a key element
`
`of open source software. IBM was able to leverage its patent portfolio to enable the broad industry
`
`adoption of open source
`
`technologies by pledging
`
`to provide open access
`
`to key
`
`innovations covered by hundreds of IBM software patents for those working on open source
`
`software. And early in 2020, IBM joined the License on Transfer Network (“LOT Network”), a
`
`non-profit community of companies that supports open innovation and responsible stewardship of
`
`technology. LOT Network affirms the traditional use of patents—safeguarding the innovations of
`
`companies who research, develop, and sell new technologies—while protecting its members
`
`against patent assertion entities who purchase or acquire patents from others.
`
`4.
`
`As another example, IBM has pledged to let anyone working on solutions to the
`
`coronavirus pandemic use its patents for free. IBM’s vast patent portfolio can now support
`
`researchers everywhere who are developing technologies to help prevent, diagnose, treat or contain
`
`COVID-19. The collection includes thousands of IBM artificial intelligence patents, some related
`
`to Watson technology, as well as dozens, if not hundreds, related to biological viruses.
`
`5.
`
`IBM also believes in the protection of its proprietary technologies, which result
`
`from IBM’s extensive investments in research and development and the hard work of IBM’s
`
`employees. IBM believes that companies who use IBM’s patented technology should agree to a
`
`license and pay a fair royalty. When a company is using IBM’s patents without authorization,
`
`IBM first seeks to negotiate an agreement whereby IBM and the other company each receive a
`
`2
`
`
`
`Case 1:21-cv-00461-UNA Document 1 Filed 03/29/21 Page 3 of 47 PageID #: 3
`
`license to the other’s patent portfolio. That way, each company can avoid litigation, be fairly
`
`compensated for the use of all of their patents, and maintain freedom to operate in their respective
`
`markets.
`
`6.
`
`IBM’s research and development is currently focused on technology that includes
`
`quantum computing, big data analytics, artificial intelligence, and natural language processing.
`
`But IBM also has a long history of innovating and licensing its technology in the field of internet
`
`commerce. In fact, long before Rakuten existed, IBM partnered with other companies to launch
`
`Prodigy, one of the very first e-commerce services. Rakuten, which was founded in 1997, after e-
`
`commerce was already established, took those prior innovations made by IBM and others to create
`
`and run its new business. As its business has developed, Rakuten has incorporated additional
`
`innovations pioneered by IBM.
`
`7.
`
`For almost six years, IBM has tried to negotiate with Rakuten about Rakuten’s
`
`unlicensed use of IBM’s patents. Dozens of similar companies, including Amazon, Apple,
`
`Google, and Facebook, have agreed to cross licenses with IBM. Unfortunately, Rakuten is not
`
`among them. Instead, to this day, Rakuten has chosen to willfully infringe IBM’s patents and even
`
`expand its infringing activity.
`
`8.
`
`Rather than negotiate with IBM, Rakuten has used a series of delay tactics. In July
`
`2015, when IBM first informed Rakuten that its subsidiaries were infringing IBM’s patents,
`
`Rakuten refused to take responsibility for the companies it controlled and told IBM to contact each
`
`of them individually. Then, Rakuten refused to meet with IBM by ignoring IBM’s messages,
`
`claiming vague scheduling conflicts, or deflecting responsibility from one Rakuten representative
`
`to the next.
`
`3
`
`
`
`Case 1:21-cv-00461-UNA Document 1 Filed 03/29/21 Page 4 of 47 PageID #: 4
`
`9.
`
`Two years later, in 2017, IBM finally had the opportunity to present detailed
`
`evidence of Rakuten’s infringement. In response, Rakuten refused to explain why it continued to
`
`infringe IBM’s patents. When that approach was no longer tenable, Rakuten raised objectively
`
`unreasonable excuses for why it refused to negotiate. When IBM pointed out that Rakuten’s
`
`excuses were flawed and included arguments that had been rejected in court, Rakuten reverted to
`
`delay tactics. In one instance in 2018, Rakuten finally agreed to meet with IBM after months of
`
`haggling over the attendees and the topics to be discussed, only to cancel at the last minute.
`
`10.
`
`Rather than address its infringement of IBM’s intellectual property, Rakuten
`
`attempted to strong-arm IBM by threatening existing relationships between the companies.
`
`Rakuten said it would blacklist IBM from future business opportunities if IBM did not drop the
`
`issue. Through this tactic too, Rakuten attempted to deflect responsibility from its own wrongful
`
`conduct.
`
`11.
`
`Over the years, IBM has discovered that Rakuten infringes additional IBM patents.
`
`IBM has informed Rakuten of its expanding liability for willful patent infringement across its
`
`subsidiaries but has been continually met with delay and excuses. This conduct clearly
`
`demonstrates Rakuten has never taken the issue seriously.
`
`12.
`
`After years of delay and excuses, Rakuten changed tactics. Rakuten told IBM that
`
`it had hired outside legal counsel and would no longer talk to IBM directly. In effect, Rakuten
`
`told IBM: “we will not deal with this issue; talk to our lawyers.” That decision made it nearly
`
`impossible to resolve this matter through business negotiations. IBM has urged Rakuten to
`
`reconsider many times, yet Rakuten refused IBM’s invitations to explain Rakuten’s infringement
`
`and to discuss an amicable business resolution.
`
`4
`
`
`
`Case 1:21-cv-00461-UNA Document 1 Filed 03/29/21 Page 5 of 47 PageID #: 5
`
`13.
`
`After almost six years without meaningful progress toward a resolution, IBM has
`
`brought this lawsuit to finally end Rakuten’s unauthorized use of IBM’s patented technology.
`
`NATURE OF THE CASE
`
`14.
`
`This action arises under 35 U.S.C. § 271 for Defendant’s infringement of IBM’s
`
`United States Patent Nos. 7,072,849 (the “’849 patent”), 7,631,346 (the “’346 patent”), 6,785,676
`
`(the “’676 patent”), and 7,543,234 (the “’234 patent”) (collectively the “Patents-In-Suit”).
`
`THE PARTIES
`
`15.
`
`Plaintiff IBM is a New York corporation, with its principal place of business at 1
`
`New Orchard Road, Armonk, New York 10504.
`
`16.
`
`Defendant Rakuten, Inc. is a Japanese corporation, with its principal place of
`
`business in Setagaya, Tokyo, Japan. Rakuten is the ultimate parent company to Rakuten USA,
`
`Inc., Rakuten Commerce, LLC, and Ebates Inc. dba Rakuten.
`
`17.
`
`Defendant Rakuten USA, Inc. is a Delaware corporation with its principal place of
`
`business at Rakuten Crimson House West 800 Concar Drive., San Mateo, California, 94402.
`
`18.
`
`Defendant Rakuten Commerce, LLC is a Delaware corporation with its principal
`
`place of business in San Mateo, California.
`
`19.
`
`Defendant Ebates Inc. dba Rakuten is a Delaware corporation with its principal
`
`place of business at 160 Spear Street, Suite 1900, San Francisco, CA 94105.
`
`JURISDICTION AND VENUE
`
`IBM incorporates by reference paragraphs 1-19.
`
`This action arises under the patent laws of the United States, including 35 U.S.C.
`
`20.
`
`21.
`
`§ 271 et seq. The jurisdiction of this Court over the subject matter of this action is proper under
`
`28 U.S.C. §§ 1331 and 1338(a).
`
`5
`
`
`
`Case 1:21-cv-00461-UNA Document 1 Filed 03/29/21 Page 6 of 47 PageID #: 6
`
`22.
`
`Venue is proper in this Court pursuant to 28 U.S.C. §§ 1391(b) and (c) and 1400(b).
`
`Rakuten, USA, Inc., Rakuten Commerce, LLC, and Ebates Inc. dba Rakuten are entities organized
`
`under the laws of Delaware and resides in Delaware for purposes of venue under 28 U.S.C. §
`
`1400(b). Additionally, Rakuten, Inc., Rakuten USA, Inc., Rakuten Commerce, LLC, and Ebates
`
`Inc. dba Rakuten conduct business in Delaware, at least by offering for sale and selling products
`
`and services through its websites and mobile applications, which are accessible in Delaware.
`
`Infringement by Rakuten, Inc., Rakuten USA, Inc., Rakuten Commerce, LLC, and Ebates Inc. dba
`
`Rakuten has occurred and continues to occur in Delaware.
`
`23.
`
`Personal jurisdiction exists over Rakuten, Inc., Rakuten USA, Inc., Rakuten
`
`Commerce, LLC, and Ebates Inc. dba Rakuten because those entities conduct business in
`
`Delaware, at least by offering for sale and selling products and services through its websites and
`
`mobile applications, which are accessible in Delaware, and because infringement has occurred and
`
`continues to occur in Delaware. Personal jurisdiction also exists over Rakuten USA, Inc. Rakuten
`
`Commerce, LLC, and Ebates Inc. dba Rakuten because those entities are organized under the laws
`
`of Delaware.
`
`A.
`
`IBM Is A Recognized Innovator.
`
`FACTUAL BACKGROUND
`
`24.
`
`IBM is a worldwide pioneer in various sectors of science and technology. During
`
`IBM’s over 100-year history, IBM’s employees have included six Nobel laureates, six Turing
`
`Awards laureates, five National Medal of Science recipients, and fifteen inventors in the National
`
`Inventors Hall of Fame. IBM has been awarded the U.S. National Medal of Technology more
`
`times than any other company or organization—the U.S. National Medal of Technology is the
`
`nation’s highest award for technological innovation.
`
`6
`
`
`
`Case 1:21-cv-00461-UNA Document 1 Filed 03/29/21 Page 7 of 47 PageID #: 7
`
`25.
`
`IBM employees are responsible for technological advances that have become
`
`foundational technology that is widely incorporated into use by the global community today,
`
`including the dynamic random access memory (DRAMs) found in nearly all modern computers;
`
`magnetic disk storage (hard disk drives) found in computers and portable music players; and some
`
`of the world’s most powerful supercomputers, including Deep Blue (the first computer to beat a
`
`reigning chess champion, Garry Kasparov), Watson (the system that combined content analysis,
`
`natural language processing, information retrieval, and machine learning to beat two of
`
`Jeopardy!’s greatest human champions), and Summit (the world’s fastest supercomputer when
`
`delivered to Oak Ridge National Laboratory in 2018 that has been employed to tackle society’s
`
`largest problems from the opioid crisis to COVID-19). Technology evolves quickly and the nature
`
`of research and development ambitiously seeks out new discoveries. The inventions that IBM
`
`unearths today lays the groundwork for tomorrow’s technology.
`
`B.
`
`IBM Is Committed To Protecting Its Innovations Through The Patent System.
`
`26.
`
`IBM’s research and development operations differentiate IBM from many other
`
`companies. IBM annually spends billions of dollars for research and development. In addition to
`
`yielding inventions that have literally changed the way in which the world works, IBM’s research
`
`and development efforts have resulted in more than 80,000 patents worldwide.
`
`27.
`
`Like the research upon which the patents are based, IBM’s patents also benefit
`
`society. Indeed, the Supreme Court has recognized that the patent system encourages both the
`
`creation and the disclosure of new and useful advances in technology. Such disclosure, in turn,
`
`permits society to innovate further. And, as the Court has further recognized, as a reward for
`
`committing resources to innovation and for disclosing that innovation, the patent system provides
`
`patent owners with the exclusive right to prevent others from practicing the claimed invention for
`
`a limited period of time.
`
`7
`
`
`
`Case 1:21-cv-00461-UNA Document 1 Filed 03/29/21 Page 8 of 47 PageID #: 8
`
`C.
`
`IBM Routinely Licenses Its Patents In Many Fields But Will Enforce Its Rights
`Against Those Who Use Its Intellectual Property Unlawfully.
`
`28.
`
`IBM’s commitment to creating a large patent portfolio underscores the value that
`
`IBM places in the exchange of innovation, and disclosure of that innovation, in return for limited
`
`exclusivity. Indeed, IBM has used its patent portfolio to generate revenue and other significant
`
`value for the company by executing patent cross-license agreements. The revenue generated
`
`through patent licensing enables IBM to continue to commit resources to innovation. Cross
`
`licensing, in turn, provides IBM with the freedom to innovate and operate in a manner that respects
`
`the technology of others.
`
`29.
`
`Given the investment IBM makes in the development of new technologies and the
`
`management of its patent portfolio, IBM and its shareholders expect companies to act responsibly
`
`with respect to IBM’s patents. IBM facilitates this by routinely licensing its patents in many fields
`
`and by working with companies that wish to use IBM’s technology in those fields in which IBM
`
`grants licenses. When a company appropriates IBM’s intellectual property but refuses to negotiate
`
`a license, IBM has no choice but to seek judicial assistance.
`
`D.
`
`IBM Invented Methods For Presenting Applications And Advertisements In An
`Interactive Service While Developing The PRODIGY Online Service.
`
`30.
`
`The inventors of the ’849 patent developed the patented technologies as part of
`
`IBM’s efforts to launch the PRODIGY online service (“Prodigy”), a forerunner to today’s Internet,
`
`in the late 1980s. The inventors believed that to be commercially viable, Prodigy would have to
`
`provide interactive applications to millions of users with minimal response times. The inventors
`
`believed that the “dumb” terminal approach that had been commonly used in conventional
`
`systems, which heavily relied on host servers’ processing and storage resources for performance,
`
`would not be suitable. As a result, the inventors sought to develop more efficient methods of
`
`8
`
`
`
`Case 1:21-cv-00461-UNA Document 1 Filed 03/29/21 Page 9 of 47 PageID #: 9
`
`communication that would improve the speed and functionality of interactive applications and
`
`reduce equipment capital and operating costs.
`
`31.
`
`In light of the above considerations, the inventors developed novel methods for
`
`presenting applications and advertisements in an interactive service that would take advantage of
`
`the computing power of each user’s PC and thereby reduce demand on host servers, such as those
`
`used by Prodigy. The inventors recognized that if applications were structured to be comprised of
`
`“objects” of data and program code capable of being processed by a user’s PC, the Prodigy system
`
`would be more efficient than conventional systems. By harnessing the processing and storage
`
`capabilities of the user’s PC, applications could then be composed on the fly from objects stored
`
`locally on the PC, reducing reliance on Prodigy’s server and network resources.
`
`32.
`
`The service that would eventually be called Prodigy embodied inventions from the
`
`’849 patent when it launched in late 1988, before the existence of the World Wide Web. The
`
`efficiencies derived from the use of the patented technology permitted the implementation of one
`
`of the first graphical user interfaces for online services. The efficiencies also allowed Prodigy to
`
`quickly grow its user base. By 1990, Prodigy had become one of the largest online service
`
`providers with hundreds of thousands of users. Prodigy was widely praised in the industry and is
`
`still held up as an example of innovation in computer networks that predated even the advent of
`
`the World Wide Web. The technological innovations embodied in this patent persist to this day
`
`and are fundamental to the efficient communication of Internet content.
`
`33.
`
`Today, it is easy to take the World Wide Web, powerful computers, and high-speed
`
`network connectivity for granted. Not so in 1988, when the first application in the ’849 patent’s
`
`priority chain was filed. The World Wide Web had not even been conceived yet. Typical personal
`
`computers at the time had “512K RAM”—not 512 megabytes or gigabytes of RAM, but 512
`
`9
`
`
`
`Case 1:21-cv-00461-UNA Document 1 Filed 03/29/21 Page 10 of 47 PageID #: 10
`
`kilobytes. ’849 patent at 9:16-18. The ’849 patent also describes the use of 1,200 to 2,400 bps
`
`(bits per second) modems to access a network—a far cry from today’s high-speed internet. Id. at
`
`9:18-20.
`
`34.
`
`The limited processing power and network bandwidth available in 1988 posed
`
`significant technical obstacles to the development and adoption of network-based interactive
`
`services, in which many users may access interactive services provided by a host. Id. at 1:34-58.
`
`Accordingly, the ’849 patent specifically identifies slowdowns in network response time caused
`
`by processing bottlenecks at the host as a problem to be solved:
`
`[I]n conventional time-sharing computer networks, the data and program
`instructions necessary to support user sessions are maintained at a central host
`computer. However, that approach has been found to create processing
`bottlenecks as greater numbers of users are connected to the network; bottlenecks
`which require increases in processing power and complexity; e.g., multiple hosts
`of greater computing capability, if the network is to meet demand. Further, such
`bottlenecks have been found to also slow response time as more users are
`connected to the network and seek to have their requests for data processing
`answered. Id. at 10:42-53; see also id. at 1:43-52, 10:54-57.
`
`35.
`
`As the ’849 patent also explains, simply adding additional computing capacity to
`
`the hosts is not enough to fix the bottleneck problem. “[E]ven in the case where additional
`
`computing power is added, and where response time is allowed to increase, eventually the host
`
`becomes user saturated as more and more users are sought to be served by the network.” Id. at
`
`10:58-61. In other words, even a host with additional computing capacity would still have limits
`
`on how many users it could support in conventional approaches.
`
`36.
`
`Conventional approaches
`
`to providing advertising
`
`in
`
`interactive services
`
`exacerbated the bottleneck problem by clogging limited network bandwidth. In conventional
`
`approaches to advertising in interactive services, advertising had to compete with service
`
`application data for limited network bandwidth. Id. at 2:20-30. That competition between
`
`10
`
`
`
`Case 1:21-cv-00461-UNA Document 1 Filed 03/29/21 Page 11 of 47 PageID #: 11
`
`advertising and service application data had “the undesirable effect of diminishing service
`
`response time.” Id. at 2:25-26.
`
`37.
`
`The bottleneck problem arises from the limitations of networks that rely exclusively
`
`on central hosts to satisfy users’ data processing requests and the limited network bandwidth
`
`available at the time of the invention. Accordingly, the bottleneck problem addressed by the ’849
`
`patent is a “technical problem.”
`
`38.
`
`Before this suit, the ’849 patent had been challenged three times on grounds of
`
`alleged patent ineligibility. Those challenges were all unsuccessful. In the matter of IBM v. The
`
`Priceline Grp., Inc., C.A. No. 1:15-cv-00137 (D. Del.), the defendants (collectively “Priceline”)
`
`filed a motion to dismiss, alleging that the ’849 patent was directed to unpatentable subject matter.
`
`The Delaware court denied Priceline’s motion, finding that “Defendants have failed to meet their
`
`burden of demonstrating that . . . claim 1 of the ’849 patent [is] devoid of inventive concepts.”
`
`IBM v. The Priceline Grp., Inc., 2016 WL 626495, at *24 (D. Del. Feb. 16, 2016).
`
`39.
`
`In the matter of Kayak Software Corp. v. IBM., CBM2016-00075, Priceline again
`
`challenged the ’849 patent on alleged patent eligibility grounds, this time before the Patent Trial
`
`and Appeal Board (“PTAB”). Just like in the district court, the PTAB rejected Priceline’s
`
`challenge. The PTAB “agree[d] with Patent Owner the disclosure of the ’849 patent itself is almost
`
`exclusively directed to solving a problem arising in computer technology (i.e., bandwidth) with a
`
`computerized solution (i.e., local storage).” Kayak Software Corp. v. IBM., CBM2016-00075,
`
`Paper 16 (PTAB Dec. 15, 2016)) at 19. The PTAB thus concluded, “Petitioner has not shown
`
`sufficiently that independent claims 1 and 21 are directed to an unpatentable ‘abstract idea’ . . . .”
`
`Id. at 20.
`
`11
`
`
`
`Case 1:21-cv-00461-UNA Document 1 Filed 03/29/21 Page 12 of 47 PageID #: 12
`
`40.
`
`Although the parties filed other summary judgment motions in the Priceline case,
`
`Priceline chose not to file a summary judgment motion to challenge the patent eligibility of the
`
`’849 patent.
`
`41.
`
`In the matter of IBM v. Groupon, Inc., C.A. No. 1:16-cv-00122 (D. Del.), Groupon,
`
`Inc. (“Groupon”) moved for judgment on the pleadings that the ’849 patent was directed to
`
`ineligible subject matter. The court denied Groupon’s motion, finding that “the asserted claims
`
`for the Filepp patents are not directed to an abstract idea and are directed to patent-eligible subject
`
`matter.” IBM v. Groupon, Inc., 289 F. Supp. 3d 596, 607 (D. Del. 2017).
`
`E.
`
`IBM Invented Methods For A Runtime User Account Creation Operation Using A
`Single-Sign-On (SSO) Process In A Federated Computer Environment.
`
`42.
`
`The inventors of the ’346 patent developed the patented technology as part of
`
`IBM’s efforts to improve single-sign-on technology. Online service providers, like website
`
`operators, typically use “sign-on” operations to manage access to protected resources, like
`
`confidential webpages. ’346 patent at 6:26-30. A user signs-on by providing authentication
`
`credentials, such as a username and password, which the service provider verifies to authenticate
`
`the user’s identity. Id. at 6:31-36. Then, the service provider can determine whether the identified
`
`user has authorization to access the protected resource and, if so, grants access. Id. at 6:37-43, Fig.
`
`1C. Although that process has become commonplace, it is time consuming for users to sign-on
`
`every time they wish to access a protected resource. Id. at 1:25-33.
`
`43.
`
`One way to address the shortcomings of repetitive sign-on operations is to
`
`authenticate users for an entire “session,” i.e., a series of multiple transfers of information between
`
`the server and the client. Id. at 1:53-61, 6:17-22. That technology is called single-sign-on because
`
`users are only required to sign-on once per session. Id. at 1:53-61. For example, users could enter
`
`a user name and password on the homepage of a service provider and request multiple protected
`
`12
`
`
`
`Case 1:21-cv-00461-UNA Document 1 Filed 03/29/21 Page 13 of 47 PageID #: 13
`
`webpages without reentering their credentials. But prior art single-sign-on methods were
`
`problematic because they required users to have preexisting user accounts at the service provider.
`
`Id. at 2:19-42.
`
`44.
`
`As Dr. Heather Hinton, first named inventor of the ’346 patent, testified in prior
`
`proceedings, prior art systems could not take advantage of the full benefits of single-sign-on
`
`because of this fundamental problem.
`
`45.
`
`The inventors of the ’346 patent sought to develop single-sign-on technology that
`
`would permit a new user of a service provider to access protected resources. They developed novel
`
`methods for systems interacting within a “federated computing environment” to trigger a single-
`
`sign-on operation on behalf of a user that would obtain access to a “protected resource” and create
`
`an account for the user. The specification discloses how to structure a “federated computing
`
`environment” using a nonconventional arrangement of computer components. Id. at 10:62-11:7,
`
`11:28-35. The specification describes a “protective resource” using precise technical terms that
`
`demonstrate “how” to solve the limitations of prior art single-sign-on operations. Id. at 5:60-67,
`
`6:26-30, 8:45-48, 11:28-35. And it specifies the “ordered combination” of technical steps
`
`necessary to implement the claimed embodiments. See, e.g., id. at Figs. 9, 11.
`
`46.
`
`One implementation of the ’346 patent involves using “tokens” to facilitate such
`
`interactions. “A token provides direct evidence of a successful operation and is produced by the
`
`entity that performs the operation, e.g., an authentication token that is generated after a successful
`
`authentication operation. A Kerberos token is one example of an authentication token that may be
`
`used with the present invention.” Id. at 8:49-54. Such binary security tokens can implement web
`
`services message-level security. When a user accesses a service provider and signs into the identity
`
`provider via single-sign-on operations, the identity provider authenticates the user. The identity
`
`13
`
`
`
`Case 1:21-cv-00461-UNA Document 1 Filed 03/29/21 Page 14 of 47 PageID #: 14
`
`provider provides a token to the service provider “to provide proof of authentication of a user.”
`
`Id. at 22:15-19. The service provider would in turn, “translate” the identity provider’s token into
`
`a “locally valid user identifier . . .based on information contained in the [] token” in order to “build
`
`a local session for the user.” Id. at 24:16-25:3. After the user has been found to be authenticated
`
`by the identity provider, the system provider can then create an account for the user at the service
`
`provider, thus bypassing any requirement for the user to directly create an account at the service
`
`provider. The ’346 patent thus extends the benefits of single-sign-on technology to allow the user
`
`to access protected resources at any number of service providers without having to first set up a
`
`user account.
`
`47.
`
`To date, the ’346 patent had been unsuccessfully challenged on grounds of alleged
`
`patent ineligibility. In the matter of IBM v. The Priceline Grp., Inc., C.A. No. 1:15-cv-00137 (D.
`
`Del.), Priceline filed a motion to dismiss, alleging that the ’346 patent was directed to unpatentable
`
`subject matter. The Delaware court denied the motion, finding the patent was not directed to an
`
`abstract idea; “the true heart of the invention is the utilization of SSO technology to automatically
`
`create an account at the service provider level on behalf of users who did not previously have such
`
`accounts, all in order to allow the user to access protected resources at the service provider.” IBM
`
`v. The Priceline Grp., Inc., 2016 WL 626495, at *16 (D. Del. Feb. 16, 2016). The Court also
`
`rejected the argument that the claim did not contain inventive aspects: “The specification describes
`
`the improvement over the prior art encompassed by the invention as the ‘eliminat[ion] [of] these
`
`prerequisites’ because while ‘[i]n the prior art, the service provider cannot automatically create an
`
`active session for the user and allow access to protected resources; with the present invention, the
`
`service provider dynamically performs a runtime linked-user-account creation operation at the
`
`14
`
`
`
`Case 1:21-cv-00461-UNA Document 1 Filed 03/29/21 Page 15 of 47 PageID #: 15
`
`service provider by creating a linked user account based on the user identity . . . that has been
`
`provided by the identity provider to the service provider[.]’” Id. at *19.
`
`48.
`
`Although the parties filed summary judgment motions in the Priceline case,
`
`Priceline chose not to file a motion to challenge the patent eligibility of the ’346 patent.
`
`49.
`
`In the IBM v. Groupon case, Groupon chose not to file any motions challenging the
`
`patent eligibility of the ’346 patent at the pleading stage or at the summary judgement stage. The
`
`case proceeded to trial. The jury rendered a verdict of willful infringement and no invalidity on
`
`all four of the patents-in-suit, including the ’346 patent, thus further showing the continued
`
`importance and relevance of the invention of the ’346 patent to modern network technology.
`
`50.
`
`The matters of IBM v. Expedia and IBM v. Airbnb also involved the ’346 patent.
`
`None of the defendants in those litigations filed motions that challenged the patent eligibility of
`
`the ’346 patent.
`
`51.
`
`The Federal Circuit has interpreted the claims of the ’346 patent in an appeal
`
`concerning two final written decisions issued by the PTAB. In reversing the PTAB’s finding that
`
`a subset of claims of the ’346 patent were anticipated by prior art, the Federal Circuit explained
`
`that the ’346 patent solves “the special challenges of providing single-sign-on capabilities in a
`
`‘federated’ environment,’” which the court understood as an environment containing different
`
`enterprises that “adhere to certain standards of interoperability.” IBM v. Iancu, 759 F. App’x 1002,
`
`1004-1005 (Fed. Cir. 2019). The Federal Circuit distinguished how the prior art approached
`
`authentication from how the ’346 patent solved the problem by looking at how the claimed
`
`“federated computing environment” and “single-sign-on” operated in the context of the invention.
`
`Id. at 1007-1009. The Federal Circuit’s opinion confirms that the ’346 patent is directed to a non-
`
`15
`
`
`
`Case 1:21-cv-00461-UNA Document 1 Filed 03/29/21 Page 16 of 47 PageID #: 16
`
`abstract computer-specific problem and involves innovation in “how” to solve the limitations of
`
`prior art single-sign-on techniques.
`
`F.
`
`IBM Invented Methods For Improving Searching Using Real-Time Incorporation
`Of Contextual Information.
`
`52.
`
`The inventor of the ’676 patent developed the patented technology as part of IBM’s
`
`efforts to improve search mechanisms for customer self-service search and retrieval systems.
`
`Customer self-service search and retrieval systems may include knowledge management systems,
`
`information portals, search engines, and data miners. Providing efficient and satisfactory search
`
`results using such systems could be improved by incorporating relevant contextual information
`
`about the user. At the time of the invention, conventional customer self-service search and
`
`retrieval systems required users to input their contextual information when conducting each search
`
`query. However, these prior art search mechanisms failed to utilize the contextual information to
`
`rank search results and did not change these rankings over time, even as the user’s contextual
`
`information changed. The prior art search mechanisms ranked search results without adapting to
`
`the current state of the user’s interactions with the system and, therefore, failed to prioritize the
`
`search results most relevant to the user.
`
`53.
`
`The inventor of the ’676 patent recognized a need for an improv