throbber
Case 1:23-cv-00758-JLH-SRF Document 138 Filed 09/05/24 Page 1 of 27 PageID #: 2964
`
`
`
`IN THE UNITED STATES DISTRICT COURT
`FOR THE DISTRICT OF DELAWARE
`
`
`ORCA SECURITY LTD.,
`
`
`Plaintiff,
`
`
`
`v.
`
`
`WIZ, INC.,
`
`
`
`
`Defendant.
`
`
`
`
`
`C.A. No. 23-758 (JLH)
`
`
`
`)
`)
`)
`)
`)
`)
`)
`)
`)
`
`ORCA SECURITY LTD.’S OPENING BRIEF IN SUPPORT OF ITS MOTION TO
`DISMISS WIZ, INC.’S COUNTERCLAIM COUNT IV
`UNDER FED. R. CIV. P. 12(b)(6)
`
`
`
`
`
`
`
`OF COUNSEL:
`
`Douglas E. Lumish
`Lucas Lonergan
`LATHAM & WATKINS LLP
`140 Scott Drive
`Menlo Park, CA 94025
`(650) 328-4600
`
`Blake R. Davis
`Peter Hoffman
`LATHAM & WATKINS LLP
`505 Montgomery Street, Suite 2000
`San Francisco, CA 94111
`(415) 391-0600
`
`Christopher W. Henry
`Kristina D. McKenna
`LATHAM & WATKINS LLP
`200 Clarendon Street
`Boston, MA 02116
`(617) 948-6000
`
`September 5, 2024
`
`MORRIS, NICHOLS, ARSHT & TUNNELL LLP
`Jack B. Blumenfeld (#1014)
`Rodger D. Smith II (#3778)
`Cameron P. Clark (#6647)
`1201 North Market Street
`P.O. Box 1347
`Wilmington, DE 19899-1347
`(302) 658-9200
`jblumenfeld@morrisnichols.com
`rsmith@morrisnichols.com
`cclark@morrisnichols.com
`
`Attorneys for Plaintiff and Counterclaim-
`Defendant Orca Security Ltd.
`
`
`Ryan T. Banks
`LATHAM & WATKINS LLP
`650 Town Center Drive, 20th Floor
`Costa Mesa, CA 92626
`(714) 540-1235
`
`Gabriel K. Bell
`Nicole E. Bruner
`LATHAM & WATKINS LLP
`555 Eleventh Street, NW, Suite 1000
`Washington, DC 20004
`(202) 637-2200
`
`
`
`

`

`Case 1:23-cv-00758-JLH-SRF Document 138 Filed 09/05/24 Page 2 of 27 PageID #: 2965
`
`
`
`I.
`
`II.
`
`TABLE OF CONTENTS
`
`Page
`
`NATURE AND STAGE OF PROCEEDINGS .................................................................. 1
`
`SUMMARY OF THE ARGUMENT ................................................................................. 1
`
`III.
`
`STATEMENT OF FACTS ................................................................................................. 3
`
`A.
`
`The ’549 Patent ....................................................................................................... 3
`
`1.
`
`2.
`
`The ’549 Patent Specification ..................................................................... 3
`
`The ’549 Patent Claims ............................................................................... 5
`
`IV.
`
`LEGAL STANDARDS ...................................................................................................... 6
`
`A.
`
`B.
`
`Motions To Dismiss Under Rule 12(b)(6) .............................................................. 6
`
`Patent Eligibility Under 35 U.S.C. § 101................................................................ 6
`
`V.
`
`ARGUMENT ...................................................................................................................... 7
`
`A.
`
`Alice Step One: The Claims Are Directed to An Abstract Idea .............................. 7
`
`1.
`
`2.
`
`The Independent Claims are Directed to An Abstract Idea ........................ 7
`
`The Dependent Claims Are Equally Abstract ........................................... 14
`
`B.
`
`Alice Step Two: The Claims Add Nothing Inventive to the Abstract Idea ........... 15
`
`1.
`
`2.
`
`The ’549 Independent Claims Add Nothing Inventive ............................. 15
`
`The Dependent Claims Add Nothing Inventive ........................................ 18
`
`C.
`
`There Is No Reason to Delay Finding the Claims Ineligible ................................ 19
`
`VI.
`
`CONCLUSION ................................................................................................................. 20
`
`
`
`i
`
`

`

`Case 1:23-cv-00758-JLH-SRF Document 138 Filed 09/05/24 Page 3 of 27 PageID #: 2966
`
`
`
`TABLE OF AUTHORITIES
`
`CASES
`
`
`
`Page(s)
`
`Aatrix Software, Inc. v. Green Shades Software, Inc.,
`882 F.3d 1121 (Fed. Cir. 2018)................................................................................................20
`
`Affinity Labs of Tex., LLC v. DIRECTV, LLC,
`838 F.3d 1253 (Fed. Cir. 2016)................................................................................................15
`
`AI Visualize, Inc. v. Nuance Commc’ns, Inc.,
`97 F.4th 1371 (Fed. Cir. 2024) ............................................................................................6, 13
`
`Alice Corp. v. CLS Bank International,
`573 U.S. 208 (2014) ......................................................................................................... passim
`
`Bascom Glob. Internet Servs., Inc. v. AT&T Mobility LLC,
`827 F.3d 1341 (Fed. Cir. 2016)................................................................................................18
`
`Beteiro, LLC v. DraftKings Inc.,
`104 F.4th 1350 (Fed. Cir. 2024) ................................................................................6, 7, 16, 20
`
`BSG Tech LLC v. Buyseasons, Inc.,
`899 F.3d 1281 (Fed. Cir. 2018)........................................................................................ passim
`
`Cellspin Soft, Inc. v. Fitbit, Inc.,
`927 F.3d 1306 (Fed. Cir. 2019)................................................................................................20
`
`Chamberlain Grp., Inc. v. Techtronic Indus. Co.,
`935 F.3d 1341 (Fed. Cir. 2019)................................................................................................15
`
`ChargePoint, Inc. v. SemaConnect, Inc.,
`920 F.3d 759 (Fed. Cir. 2019)....................................................................................................8
`
`Chewy, Inc. v. Int’l Bus. Machines Corp.,
`94 F.4th 1354 (Fed. Cir. 2024) ..............................................................................12, 15, 17, 19
`
`Content Extraction & Transmission LLC v. Wells Fargo Bank, Nat’l Ass’n,
`776 F.3d 1343 (Fed. Cir. 2014)..........................................................................................15, 19
`
`cxLoyalty, Inc. v. Maritz Holdings Inc.,
`986 F.3d 1367 (Fed. Cir. 2021)................................................................................................15
`
`Elec. Commc’n Techs., LLC v. ShoppersChoice.com, LLC,
`958 F.3d 1178 (Fed. Cir. 2020)................................................................................................19
`
`ii
`
`

`

`Case 1:23-cv-00758-JLH-SRF Document 138 Filed 09/05/24 Page 4 of 27 PageID #: 2967
`
`
`
`Elec. Power Grp., LLC v. Alstom S.A.,
`830 F.3d 1350 (Fed. Cir. 2016)....................................................................................13, 14, 18
`
`Enfish, LLC v. Microsoft Corp.,
`822 F.3d 1327 (Fed. Cir. 2016)................................................................................................11
`
`Ericsson Inc. v. TCL Commc’n Tech. Holdings Ltd.,
`955 F.3d 1317 (Fed. Cir. 2020)................................................................................................10
`
`FairWarning IP, LLC v. Iatric Sys., Inc.,
`839 F.3d 1089 (Fed. Cir. 2016)....................................................................................10, 11, 14
`
`Hyper Search, LLC v. Facebook, Inc.,
`C.A. No. 17-1387-CFC-SRF, 2018 WL 6617143 (D. Del. Dec. 17, 2018) ............................17
`
`Int’l Bus. Machines Corp. v. Zillow Grp., Inc.,
`50 F.4th 1371 (Fed. Cir. 2022) ................................................................................2, 12, 18, 19
`
`Intellectual Ventures I LLC v. Capital One Bank (USA),
`792 F.3d 1363 (Fed. Cir. 2015)....................................................................................11, 17, 19
`
`Intellectual Ventures I LLC v. Erie Indem. Co.,
`850 F.3d 1315 (Fed. Cir. 2017)................................................................................................17
`
`Intellectual Ventures I LLC v. Symantec Corp.,
`838 F.3d 1307 (Fed. Cir. 2016)........................................................................................ passim
`
`Interval Licensing LLC v. AOL, Inc.,
`896 F.3d 1335 (Fed. Cir. 2018)................................................................................................20
`
`James v. City of Wilkes-Barre,
`700 F.3d 675 (3d Cir. 2012).......................................................................................................6
`
`Neochloris, Inc. v. Emerson Process Mgmt. LLLP,
`140 F. Supp. 3d 763 (N.D. Ill. 2015) .......................................................................................17
`
`OIP Techs., Inc. v. Amazon.com, Inc.,
`788 F.3d 1359 (Fed. Cir. 2015)................................................................................................15
`
`PersonalWeb Techs. LLC v. Google LLC,
`8 F.4th 1310 (Fed. Cir. 2021) .......................................................................................... passim
`
`Quad City Pat., LLC v. Zoosk, Inc.,
`498 F. Supp. 3d 1178 (N.D. Cal. 2020) ...................................................................................17
`
`Recentive Analytics, Inc. v. Fox Corp.,
`692 F. Supp. 3d 438 (D. Del. 2023) .........................................................................................17
`
`iii
`
`

`

`Case 1:23-cv-00758-JLH-SRF Document 138 Filed 09/05/24 Page 5 of 27 PageID #: 2968
`
`
`
`RecogniCorp, LLC v. Nintendo Co.,
`855 F.3d 1322 (Fed. Cir. 2017)................................................................................................13
`
`Sanderling Mgmt. Ltd. v. Snap Inc.,
`65 F.4th 698 (Fed. Cir. 2023) ..............................................................................................6, 19
`
`SAP Am., Inc. v. InvestPic, LLC,
`898 F.3d 1161 (Fed. Cir. 2018)........................................................................................ passim
`
`Simio, LLC v. FlexSim Software Prods., Inc.,
`983 F.3d 1353 (Fed. Cir. 2020)........................................................................................ passim
`
`Trading Techs. Int’l, Inc. v. IBG LLC,
`921 F.3d 1084 (Fed. Cir. 2019)..........................................................................................12, 15
`
`Trinity Info Media, LLC v. Covalent, Inc.,
`72 F.4th 1355 (Fed. Cir. 2023) ......................................................................................8, 10, 17
`
`Two-Way Media Ltd. v. Comcast Cable Commc’ns, LLC,
`874 F.3d 1329 (Fed. Cir. 2017)......................................................................................7, 13, 18
`
`Univ. of Fla. Rsch. Found., Inc. v. Gen. Elec. Co.,
`916 F.3d 1363 (Fed. Cir. 2019)..................................................................................................8
`
`Universal Secure Registry LLC v. Apple Inc.,
`10 F.4th 1342 (Fed. Cir. 2021) ..............................................................................13, 16, 17, 19
`
`Vehicle Intel. & Safety LLC v. Mercedes-Benz USA, LLC,
`635 F. App’x 914 (Fed. Cir. 2015) ..........................................................................................17
`
`35 U.S.C. § 101 ..................................................................................................................1, 6, 7, 19
`
`STATUTES
`
`Fed. R. Civ. P. 12(b)(6)..........................................................................................................1, 6, 19
`
`RULES
`
`
`
`
`iv
`
`

`

`Case 1:23-cv-00758-JLH-SRF Document 138 Filed 09/05/24 Page 6 of 27 PageID #: 2969
`
`
`
`I.
`
`NATURE AND STAGE OF PROCEEDINGS
`
`Plaintiff and Counterclaim-Defendant Orca Security Ltd. (“Orca”) alleges that Defendant
`
`and Counterclaim-Plaintiff Wiz, Inc. (“Wiz”) infringes six patents: U.S. Patent Nos. 11,663,031,
`
`11,663,032, 11,693,685, 11,726,809, 11,740,926, and 11,775,326. D.I. 15 (Second Amended
`
`Complaint). On November 21, 2023, Wiz filed a Motion to Dismiss Orca’s claims of indirect and
`
`willful infringement (D.I. 17, 18), which the Court denied on May 21, 2024. D.I. 65. On June 4,
`
`2024, Wiz filed counterclaims, alleging that Orca infringes U.S. Patent Nos. 11,722,554,
`
`11,929,896, 11,936,693, 12,001,549 (“’549 patent”), and 12,003,529. D.I. 70 at 37-147. On
`
`July 25, 2024, Orca moved to dismiss Counterclaim Count IV under Rule 12(b)(6) because the
`
`’549 patent lacks patent-eligible subject matter under 35 U.S.C. § 101 and Alice Corp. v. CLS Bank
`
`International, 573 U.S. 208 (2014). D.I. 111. Wiz then amended its counterclaims (“FACC”) on
`
`August 22, 2024. D.I. 124. But the allegations that Wiz added do not save the ’549 patent under
`
`§ 101. Therefore, Orca again moves to dismiss Counterclaim IV (FACC ¶¶ 89-124) under § 101.
`
`II.
`
`SUMMARY OF THE ARGUMENT
`
`1.
`
`The Court should hold that Wiz’s ’549 patent claims (asserted in Counterclaim
`
`Count IV) are ineligible for patent protection under § 101 and grant Orca’s motion to dismiss with
`
`prejudice. In Alice, the Supreme Court set forth its two-step test for determining whether computer
`
`implemented patent claims are eligible under § 101, which is a threshold requirement for any patent
`
`suit. Under Alice, computer implemented claims are ineligible if they (i) are directed to an abstract
`
`idea and (ii) add nothing inventive to that abstract idea. Wiz’s ’549 patent claims fail that test.
`
`2.
`
`At Alice step one, the claims are directed to the abstract idea of retrieving,
`
`contextualizing, querying, and responding to cybersecurity threat information. The ’549 patent
`
`addresses a human problem: “an operator will often receive an alert [about a cybersecurity threat]
`
`1
`
`

`

`Case 1:23-cv-00758-JLH-SRF Document 138 Filed 09/05/24 Page 7 of 27 PageID #: 2970
`
`
`
`that lacks context” and “does not … indicate what, if at all, should be done” to respond. ’549
`
`patent at 1:51-56. The purported solution is to use existing computer technology—including
`
`natural language processing techniques such as a “large language model,” or “LLM”—to generate
`
`additional context and thereby make it easier to respond. Indeed, Wiz itself alleges that humans
`
`can be involved in every single step of the claims—a key indication of abstraction. That the claims
`
`also recite using existing computer technology, even if applied in a new environment, does not
`
`make them less abstract.
`
`3.
`
`At Alice step two, the claims add no inventive concept beyond the abstract idea.
`
`The specification expressly acknowledges that the claims can be implemented using well-known
`
`large language models—like OpenAI’s ChatGPT, or Google’s BERT. See, e.g., ’549 patent
`
`at 16:25-26, 10:14-40. The remaining steps, by admission, can be implemented on generic
`
`computer components, such as “general-purpose microprocessors” or “any other hardware logic
`
`components that can perform calculations.” Id. at 17:59-18:3; see also, e.g., id. at 18:43-45. That
`
`is not inventive.
`
`4.
`
`The Federal Circuit has held similar, or even more technological-seeming, claims
`
`ineligible as a matter of law, including claims for identifying and responding to risky emails in
`
`Intellectual Ventures I LLC v. Symantec Corp., 838 F.3d 1307 (Fed. Cir. 2016) (“Symantec”);
`
`implementing graphical object-oriented programming in Simio, LLC v. FlexSim Software Prods.,
`
`Inc., 983 F.3d 1353 (Fed. Cir. 2020) (ineligible claims), analyzing and presenting relevant
`
`information in Int’l Bus. Machines Corp. v. Zillow Grp., Inc., 50 F.4th 1371 (Fed. Cir. 2022), and
`
`implementing a database structure with contextual information in BSG Tech LLC v. Buyseasons,
`
`Inc., 899 F.3d 1281 (Fed. Cir. 2018). Wiz’s ’549 patent claims are likewise ineligible as a matter
`
`of law and its Counterclaim IV (FACC ¶¶ 89-124) should be dismissed with prejudice.
`
`2
`
`

`

`Case 1:23-cv-00758-JLH-SRF Document 138 Filed 09/05/24 Page 8 of 27 PageID #: 2971
`
`
`
`III.
`
`STATEMENT OF FACTS
`
`A.
`
`The ’549 Patent
`
`Wiz filed the ’549 patent application on January 31, 2024, five months after Orca brought
`
`this suit against Wiz. The patent issued on June 4, 2024, and Wiz asserted it against Orca that day.
`
`1.
`
`The ’549 Patent Specification
`
`The ’549 patent specification states that it “relates generally to cybersecurity incident
`
`response and specifically to initiating mitigation actions in response to detected cybersecurity
`
`threats.” ’549 patent at 1:16-18. The patent explains that in typical “cybersecurity solutions,” an
`
`“operator” (i.e., a human) would “receive an alert” (an “incident”) about a cybersecurity threat
`
`(e.g., a message stating that a system has been accessed without authorization) and then query a
`
`database or other “structured data” to determine how to respond. See id. at 1:22-56. But the patent
`
`states this process is “not always human-friendly” because it “requires a human to learn a special
`
`query language which the machine uses to retrieve and store data.” Id. at 1:31-37. Accordingly,
`
`the patent explains that a human can instead use existing techniques to generate natural language
`
`“prompts” for known “large language models” (LLMs), to “provide[] accurate translation between
`
`a query received in natural language and a database query, in order to provide a user with a relevant
`
`result to their query.” Id. at 10:14-28; see id. at 1:39-43.
`
`However, according to the patent, the problem was “a lack of context”: “an operator will
`
`often receive an alert that lacks context” and “does not provide a root cause, or indicate what, if at
`
`all, should be done to remediate, mitigate, and the like.” Id. at 1:51-56. Then, lacking relevant
`
`context, if the operator inputs an ambiguous natural language query (e.g., “what is jay?”), the
`
`computer has no way of discerning between different possible meanings and, accordingly, the
`
`resulting computer database query will not necessarily produce useful results. Id. at 1:44-49. The
`
`3
`
`

`

`Case 1:23-cv-00758-JLH-SRF Document 138 Filed 09/05/24 Page 9 of 27 PageID #: 2972
`
`
`
`patent’s purported solution, therefore, is to supply additional context so that, when the operator
`
`inputs a natural language query (which is converted to a database query) to look up next steps, the
`
`resulting information will be more useful. See, e.g., id. at 1:44-58, 2:60-65.
`
`The specification acknowledges that no new computer technology is required. Instead, the
`
`patent states that the steps require only generic “hardware, firmware, software, or any combination
`
`thereof,” id. at 18:43-45—for example, “general-purpose microprocessors” or “any other hardware
`
`logic components that can perform calculations,” id. at 17:59-18:3. At the outset, the purported
`
`invention does not describe any new way of identifying security threats; rather, it receives already-
`
`identified security information (“incidents”) and facilitates the user obtaining additional context to
`
`employ in querying a database for potential responses. And the patent acknowledges that this
`
`requires only well-known large language models such as OpenAI’s ChatGPT, or Google’s BERT,
`
`see, e.g., ’549 patent at 16:25-26 (“A large language model is, for example, GPT, BERT, and the
`
`like.”), 10:14-40 (same), and existing tools to convert natural language queries to database queries,
`
`see id. at 12:13-17 (“natural language processing (NLP) techniques” include known “distance-
`
`based Word2Vec”), 1:38-43. Moreover, the patent states that humans are integral in the purported
`
`solution. For example, the user can retrieve additional context by providing input to match the
`
`incident to unspecified “predefined scenarios.” Id. at 15:27-40, 16:2, Fig. 6.
`
`In sum, the patent acknowledges that its advance is supplying additional context or
`
`“structure” for natural language database queries (see id. at 10:10-13, 1:26-37)—not a new tool or
`
`feature for identifying a security threat, querying a database, or implementing a response. To
`
`facilitate a user’s natural language queries, the patent describes using conventional techniques,
`
`including large language models, to generate the structured database queries (id. at 10:20-28,
`
`12:46-52), and using conventional database technology, such as SQL, to store and retrieve the
`
`4
`
`

`

`Case 1:23-cv-00758-JLH-SRF Document 138 Filed 09/05/24 Page 10 of 27 PageID #: 2973
`
`
`
`data. Id. at 1:30-37. The result of an executed database query can be “provided to … a user,” who
`
`can initiate mitigation actions. Id. at 11:30-39, 17:14-21. The patent does not purport to invent or
`
`improve such technologies; it merely uses them.
`
`2.
`
`The ’549 Patent Claims
`
`The ’549 patent’s claims likewise recite no specific technological advances, instead
`
`applying conventional LLM technology to common human activity. Each of the three independent
`
`claims (claims 1, 11, and 12) recites basic steps for “providing [a] cybersecurity incident response”
`
`by (1) receiving cybersecurity threat information (“an incident”), (2) contextualizing the
`
`information using an LLM, (3) querying a cybersecurity database using that context, and
`
`(4) initiating a mitigation action. That is, the claims recite receiving, determining, querying, and
`
`responding to cybersecurity information. Claim 1 is representative:
`
`1. A method for providing cybersecurity incident response, comprising:
`
`receiving an incident input based on a cybersecurity event;
`
`generating a prompt for a large language model (LLM) based on the received
`incident input;
`
`configuring the LLM to generate an output based on the generated prompt;
`
`mapping the received incident input into a scenario of a plurality of scenarios based
`on the output of the LLM, wherein each scenario is associated with an incident
`response;
`
`generating a query based on the received incident input and the mapped scenario;
`
`executing the query on a security database, the security database including a
`representation of a computing environment;
`
`initiating a mitigation action based on a result of the executed query.
`
`
`The other two independent claims are materially the same, except they recite a “computer-
`
`readable medium” (claim 11) and “system” (claim 12) for performing the same computer
`
`functions, with additional generic hardware limitations. The dependent claims recite incidental
`
`limitations, including types of incident inputs (claim 2), LLM usage (claims 3, 4, 5, and 7), user
`
`5
`
`

`

`Case 1:23-cv-00758-JLH-SRF Document 138 Filed 09/05/24 Page 11 of 27 PageID #: 2974
`
`
`
`interface activity (claims 6, 8, and 10), and database storage (claim 9). Infra at 14-15, 18-19.
`
`Dependent claims 13-21 recite the same limitations as claims 2-10.
`
`IV.
`
`LEGAL STANDARDS
`
`A. Motions To Dismiss Under Rule 12(b)(6)
`
`Patent eligibility under § 101 is a threshold issue that “may be, and frequently has been,
`
`resolved on a Rule 12(b)(6)” motion, before formal claim construction or fact development, where
`
`there are no relevant factual disputes. SAP Am., Inc. v. InvestPic, LLC, 898 F.3d 1161, 1166 (Fed.
`
`Cir. 2018); see, e.g., AI Visualize, Inc. v. Nuance Commc’ns, Inc., 97 F.4th 1371, 1377 (Fed. Cir.
`
`2024) (affirming Rule 12(b)(6) dismissal); Beteiro, LLC v. DraftKings Inc., 104 F.4th 1350, 1358
`
`(Fed. Cir. 2024) (same); Sanderling Mgmt. Ltd. v. Snap Inc., 65 F.4th 698, 705 (Fed. Cir. 2023)
`
`(same). The Court accepts well-pleaded factual allegations but “disregard[s] rote recitals of the
`
`elements of a cause of action, legal conclusions, and mere conclusory statements.” James v. City
`
`of Wilkes-Barre, 700 F.3d 675, 679 (3d Cir. 2012) (citations omitted). And “‘generalized
`
`assertions that factual considerations about the state of the art preclude a decision at the pleadings
`
`stage’ do not prevent a district court from granting a motion to dismiss.” Beteiro, 104 F.4th at 1358
`
`(citation omitted).
`
`B.
`
`Patent Eligibility Under 35 U.S.C. § 101
`
`Section 101 delineates the categories of patent eligible subject matter, and “contains an
`
`important implicit exception” for abstract ideas—such as mental processes, human activities, or
`
`basic computerized steps—which are not ineligible. Alice, 573 U.S. at 216 (citation omitted). The
`
`two-step Alice framework governs whether computer-based claims are ineligible. Id. at 217-27.
`
`At step one, the Court determines whether the asserted claims are, at root, directed to an
`
`abstract idea notwithstanding the recitation of any computer features. Id. at 218. If so, at step two,
`
`6
`
`

`

`Case 1:23-cv-00758-JLH-SRF Document 138 Filed 09/05/24 Page 12 of 27 PageID #: 2975
`
`
`
`the Court determines whether the other claim elements, individually or collectively, add
`
`“significantly more”—i.e., an “inventive concept”—apart from the abstract idea. Id. at 217-22.
`
`The claims cannot “simply … implement the abstract idea … on a generic computer.” Id. at 225.
`
`If claims add nothing inventive at step two, they are ineligible under § 101 as a matter of law. Id.
`
`At both steps, the eligible subject matter cannot stem from the abstract idea itself. See
`
`Simio, 983 F.3d at 1365. Automating an idea in a “particular technological environment” with
`
`conventional computer technology does not make claims “less abstract” and contributes nothing
`
`inventive. Symantec, 838 F.3d at 1314 (citation omitted). Nor may claims simply recite “generic
`
`functional language to achieve [the] purported solutions” without claiming “how the desired result
`
`is achieved.” Two-Way Media Ltd. v. Comcast Cable Commc’ns, LLC, 874 F.3d 1329, 1339 (Fed.
`
`Cir. 2017) (citation omitted). Indeed, “[c]laims of this nature are almost always found to be
`
`ineligible” under § 101. Beteiro, 104 F.4th at 1356.
`
`V.
`
`ARGUMENT
`
`Wiz’s ’549 patent claims are ineligible under § 101 and Alice because they are directed to
`
`an abstract idea and add nothing inventive.
`
`A.
`
`Alice Step One: The Claims Are Directed to An Abstract Idea
`
`The claims of the ’549 patent are directed to the abstract idea of retrieving, contextualizing,
`
`querying, and responding to cybersecurity threat information—activities that humans can perform.
`
`1.
`
`The Independent Claims are Directed to An Abstract Idea
`
`The independent claims recite that abstract idea as a series of basic steps. Claim 1 (which
`
`is representative) recites “a method for providing cybersecurity incident response” by:
`
`(1) “receiving” information about a cybersecurity threat (“an incident”); (2) determining relevant
`
`context by using existing LLMs (i.e., generating a prompt for an LLM based on the incident and
`
`using the LLM’s output to “map[]” the incident to a “scenario”); (3) querying a cybersecurity
`
`7
`
`

`

`Case 1:23-cv-00758-JLH-SRF Document 138 Filed 09/05/24 Page 13 of 27 PageID #: 2976
`
`
`
`database using that incident/scenario context (i.e., generating and executing a query on a security
`
`database that includes “a representation of a computing environment”); and (4) “initiating a
`
`mitigation action based on a result of the executed query.” ’549 patent cl. 1. Independent claims
`
`11 and 12 are the same but are couched as a computer “medium” and “system” for performing the
`
`same steps, which does not change the analysis. See Alice, 573 U.S. at 226 (ineligible system and
`
`software claims “no different from the method claims in substance”). Therefore, all independent
`
`claims focus on retrieving, contextualizing, querying, and responding to cybersecurity threat
`
`information. The specification confirms those steps are the purported advance. See, e.g., ’549
`
`patent at 1:16-18, 1:22-43, 1:51-58; see also ChargePoint, Inc. v. SemaConnect, Inc., 920 F.3d
`
`759, 774 (Fed. Cir. 2019) (specification is useful in identifying purported advance); FACC ¶¶ 10,
`
`90-92. The claims are directed to an abstract idea for three reasons.
`
`First, the claims are directed to a human problem and provide a solution that automates
`
`human activities—a “telltale sign of abstraction.” Trinity Info Media, LLC v. Covalent, Inc., 72
`
`F.4th 1355, 1361 (Fed. Cir. 2023) (citation omitted); see also, e.g., PersonalWeb Techs. LLC v.
`
`Google LLC, 8 F.4th 1310, 1318 (Fed. Cir. 2021) (“mere automation of manual processes using
`
`generic computers … fails step one”) (citation omitted); Univ. of Fla. Rsch. Found., Inc. v. Gen.
`
`Elec. Co., 916 F.3d 1363, 1367 (Fed. Cir. 2019) (similar). As the specification describes,
`
`generating database queries was not “human-friendly” and that, although existing natural language
`
`processing techniques allowed users to translate natural language into machine language queries,
`
`they often lacked relevant context and thus failed to produce relevant responses. Supra at 3-4. In
`
`turn, the patent’s purported solution is using generic computers and well-known LLMs to generate
`
`relevant context for natural language queries of a cybersecurity database, so that the human
`
`operator receives more relevant information to better respond to an incident. Id. Therefore,
`
`8
`
`

`

`Case 1:23-cv-00758-JLH-SRF Document 138 Filed 09/05/24 Page 14 of 27 PageID #: 2977
`
`
`
`because the claims are rooted in human problems and activities, they are abstract.
`
`The patentee’s own statements support that conclusion. The ’549 patent admits that human
`
`activity and input is integral to the claim steps: users (humans) can: (1) receive cybersecurity threat
`
`information, see ’549 patent at 1:51-52, 7:30-37; (2) provide input for a natural language query,
`
`id. at 11:45-47, 12:53-55, “scenario” selections, id. at 2:44-45, 2:48-49, 3:52-56, 3:59-61, 4:56-
`
`63, 6:11-19, 15:22-40, and “generating a prompt” for the LLM, id. at 2:49-50; see also id. at 2:52-
`
`54, 3:62-66, 4:64-66, 5:5-7, 6:19-23, 6:35-37; (3) query the database, id. at 10:14-19; and
`
`(4) initiate a response, see id. at 17:15-21, 1:51-56. Likewise, Wiz’s counterclaim confirms that
`
`human activity is integral to the claim steps: Wiz’s allegations depend at every turn on human
`
`activities and input. See FACC ¶¶ 112-120 (alleging infringement based on user receiving human-
`
`readable alerts; user actions in generating prompts, configuring an LLM by clicking a “toggle”
`
`button, mapping scenarios, generating and executing a database query by “click[ing]”; and
`
`“allowing users to take remedial steps based on the query results”). Despite Orca making this
`
`same argument in its earlier motion to dismiss (D.I. 112 at 9), Wiz did not amend these allegations
`
`(or its corresponding infringement contentions) to state otherwise. Compare D.I. 70 ¶¶ 96-104,
`
`with FACC ¶¶ 112-120. By the patentee’s own admissions, therefore, human activity is integral
`
`to the claim limitations. And automating such steps that involve, or are akin to, human activity
`
`does not make the claims “any less abstract.” Symantec, 838 F.3d at 1319.
`
`The Federal Circuit has found abstract and ineligible similar claims involving human-
`
`performable concepts for processing and responding to data. For example, in Symantec, the claims
`
`provided a computer network system for identifying undesirable or risky electronic messages (e.g.,
`
`spam or viruses) based on their data attributes and taking actions accordingly. 838 F.3d at 1316-
`
`17. The claims recited various computer components for performing those steps, including a
`
`9
`
`

`

`Case 1:23-cv-00758-JLH-SRF Document 138 Filed 09/05/24 Page 15 of 27 PageID #: 2978
`
`
`
`“receipt mechanism,” a database of rules, a “rule engine,” and a “distribution mechanism.” Id. at
`
`1317. The court held the claims were akin to a “method of organizing human activity” in a
`
`corporate mailroom and thus abstract at step one. Id. at 1318; see also id. at 1313-16, 1319-20
`
`(holding other computer and security claims abstract). In PersonalWeb, the claims recited content-
`
`based data processing systems that analyzed data attributes using hash functions and took actions
`
`based on those attributes, such as allowing or denying access to the data. 8 F.4th at 1316. The
`
`court held that the claim steps were akin to mental concepts performable “using a pencil and paper”
`
`and thus abstract. Id. at 1316 (citation omitted); see also Trinity, 72 F.4th at 1362 (computer claims
`
`directed to the abstract idea of “matching based on questioning” because “[a] human mind” could
`
`perform similar activities); FairWarning IP, LLC v. Iatric Sys., Inc., 839 F.3d 1089, 1097 (Fed.
`
`Cir. 2016) (claims for identifying suspicious activity in sensitive medical file); Ericsson Inc. v.
`
`TCL Commc’n Tech. Holdings Ltd., 955 F.3d 1317, 1326 (Fed. Cir. 2020) (claims for controlling
`
`software access). Here, the claims similarly recite steps akin to human activities—retrieving,
`
`contextualizing, querying, and responding to threat information—and are, therefore, abstract.
`
`Second, the claims do not purport to provide any specific improvement to computer
`
`technology itself. The claims rely on ad

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket