Plaintiff-appellant CyberSource Corporation (“CyberSource”) appeals from a decision of the United States District Court for the Northern District of California. The district court granted summary judgment of invalidity of claims 2 and 3 of U.S. Patent No. 6,029,154 (“'154 patent”) under 35 U.S.C. § 101 for failure to recite patent-eligible subject matter.
See CyberSource Corp. v. Retail Decisions, Inc.,
Background
CyberSource is the owner by assignment of the '154 patent, which recites a “method and system for detecting fraud in a credit card transaction between [a] consumer and a merchant over the Internet.” '154 patent, at [57]. The '154 patent’s specification explains that prior art credit card fraud detection systems — which generally rely on billing addresses and personal identification information — work well for “face-to-face” transactions and transactions where “the merchant is actually shipping a package ... to the address of a customer.” Id. col.l 11.21-24. But for online sales where the product purchased is downloadable content, the patent explains, “address and identity information are not enough to adequately verify that the customer who is purchasing the goods is actually the owner of the credit card.” Id. col.l 11.28-30.
The '154 patent purports to solve this problem by using “Internet address” information (IP addresses, MAC addresses, email addresses, etc.) to determine whether an Internet address relating to a particular transaction “is consistent with other Internet addresses [that have been] used in *1368 transactions utilizing [the same] credit card.” Id. col.3 11.15-16. 'As we discuss in detail below, the claims of the '154 patent are broad and essentially purport to encompass any method or system for detecting credit card fraud which utilizes information relating credit card transactions to particular “Internet address[es].” 1
CyberSource brought suit against Retail Decisions, Inc. (“Retail Decisions”) on August 11, 2004, alleging infringement of the '154 patent. Retail Decisions thereafter initiated an
ex parte
reexamination of the '154 patent, and the district court stayed its proceedings while the U.S. Patent and Trademark Office (“PTO”) conducted the examination. The district court resumed proceedings after the PTO reissued the '154 patent with amended claims on August 5, 2008. On October 30, 2008, this court decided
In re Bilski,
CyberSource appealed to this court in April 2009. After the Supreme Court granted certiorari in
Bilski v. Doll,
-
*1369
U.S. -,
Discussion
We review grants of summary judgment de novo.
Tokai Corp. v. Easton Enters., Inc.,
I
Two claims of the '154 patent are at issue in this case. Claim 3 recites a process for verifying the validity of credit card transactions over the Internet. See J.A. 32 ('154 Patent Reexamination Certificate), eol.2 11.38-47. Claim 2 recites a computer readable medium containing program instructions for executing the same process. See id. col.211.9-37.
The categories of patent-eligible subject matter are set forth in § 101, which provides:
Whoever invents or discovers any new and useful process, machine, manufacture, or composition of matter, or any new and useful improvement thereof, may obtain a patent therefor, subject to the conditions and requirements of this title.
35 U.S.C. § 101. Section 100(b) of the Patent Act defines the “process” category tautologically, stating that: 35 U.S.C. § 100(b). “In choosing such expansive terms ... modified by the comprehensive ‘any,’ Congress plainly contemplated that the patent laws would be given wide scope.”
Bilski
The term “process” means process, art or method, and includes a new use of a known process, machine, manufacture, composition of matter,'or material.
In interpreting § 101, this court concluded in
Bilski
that the “machine-or-transformation” test was the appropriate test for the patentability of process claims.
II
We first address claim 3 of the '154 patent, which recites a method for verifying the validity of a credit card transaction over the Internet. Claim 3, as amended during reexamination, reads in its entirety: 3. A method for verifying the validity of a credit card transaction over the Internet comprising the steps of:
a) obtaining information about other transactions that have utilized an Internet address that is identified with the [ ] credit card transaction;
b) constructing a map of credit card numbers based upon the other transactions and;
c) utilizing the map of credit card numbers to determine if the credit card transaction is valid.
J.A. 32 ('154 Patent Reexamination Certificate), eol.2 11.38-47. CyberSource acknowledges that the “Internet address” recited in step (a) of claim 3 “may be, for example, an Internet protocol (IP) address or an email address for the particular credit card transaction.” Appellant’s Br. 7. CyberSource further concedes that the “map of credit card numbers” recited in step (b) can be as simple as a list of credit card transactions relating to a particular IP address. See Appellant’s Br. 9. Finally, step (c) does not limit claim 3 to any specific fraud detection formula or mathematical algorithm, but rather broadly purports to encompass any means of “utilizing the map of credit card numbers to determine if the credit card transaction is valid.” J.A. 32, col.211.46-47.
The district court found that claim 3 fails to meet either prong of the machine- or-transformation test.
CyberSource,
We are not persuaded by the appellant’s argument that the claimed method is tied to a particular machine because it “would not be necessary or possible without the Internet.” Appellant’s Br. 42. Regardless of whether “the Internet” can be viewed as a machine, it is clear that the Internet cannot perform the fraud detection steps of the claimed method. Moreover, while claim 3 describes a method of analyzing data regarding Internet credit card transactions, nothing in claim 3 requires an infringer to use the Internet to obtain that data (as opposed to obtaining the data from a pre-compiled database). The Internet is merely described as the source of the data. We have held that mere “[data-gathering] step[s] cannot make an otherwise nonstatutory claim statutory.”
In re Grams,
*1371
Thus, the district court did not err in holding that claim 3 fails to meet the machine-or-transformation test. However, our analysis does not end there. In holding that the machine-or-transformation test “is not the sole test for deciding whether an invention is a patent-eligible process,”
Bilski,
The Supreme Court has stated that “[phenomena of nature, though just discovered,
mental processes,
and abstract intellectual concepts are not patentable, as they are the basic tools of scientific and technological work.”
Gottschalk v. Benson,
The conversion of BCD numerals to pure binary numerals can be done mentally____The method sought to be patented varies the ordinary arithmetic steps a human would use by changing the order of the steps, changing the symbolism for writing the multiplier used in some steps, and by taking subtotals after each successive operation. The mathematical procedures can be carried out in existing computers long in use, no new machinery being necessary. And, as noted, they can also be performed without a computer.
Id.
at 67,
The Supreme Court reaffirmed and extended its
Benson
holding in the case of
Parker v. Flook,
Following the Supreme Court, we have similarly held that mental processes are not patent-eligible subject matter because the “application of [only] human intelligence to the solution of practical problems is no more than a claim to a fundamental principle.”
Bilski,
[T]he patent statute does not allow patents on particular systems that depend for their operation on human intelligence alone, a field of endeavor that both the framers and Congress intended to be beyond the reach of patentable subject matter.... [I]t is established that the application of human intelligence to the solution of practical problems is not in and of itself patentable.
Id. Thus, because the method of arbitration claims in Comiskey essentially sought “to patent the use of human intelligence in and of itself,” the claims were drawn to abstract ideas and were invalid under § 101. Id. at 981.
It is clear that unpatentable mental processes are the subject matter of claim 3. All of claim 3’s method steps can be performed in the human mind, or by a human using a pen and paper. Claim 3 does not limit its scope to any particular fraud detection algorithm, and no algorithms are disclosed in the '154 patent’s specification. Rather, the broad scope of claim 3 extends to essentially any method of detecting credit card fraud based on information relating past transactions to a particular “Internet address,” even methods that can be performed in the human mind.
First, step (a) — which requires “obtaining information about other transactions that have utilized an Internet address that is identified with the [ ] credit card transaction” — can be performed by a human who simply reads records of Internet credit card transactions from a preexisting database. J.A. 32, col.2 11.40-42. While the '154 patent’s specification discusses referencing “a database of Internet addresses,” '154 patent, col.3 11.13-14, CyberSource concedes that claim 3 does not cover the initial creation of the database. Oral Arg. at 1:15-1:30,
available at
http://www.cafc. uscourts.gov/oral-argument-recordings/all/ cybersouree.html. Moreover, as discussed above, even if some physical steps are required to obtain information from the database (e.g., entering a query via a keyboard, clicking a mouse), such data-gathering steps cannot alone confer patentability.
Grams,
Second, a person may “construct[] a map of credit card numbers” as required by step (b) by writing down a list of credit card transactions made from a particular IP address. J.A. 32, col.2 11.43-44. There is no language in claim 3 or in the '154 patent’s specification that requires the constructed “map” to consist of anything more than a list of a few credit card transactions. This is readily apparent from the appellant’s brief, in which CyberSource *1373 provides a sample “map” that merely consists of four listed credit card transactions denoted by their dates, times, cardholder names, card numbers, IP addresses, transaction amounts, and shipping addresses. See Appellant’s Br. 9.
Finally, step (c) — which requires “utilizing the map of credit card numbers to determine if the credit card transaction is valid” — is so broadly worded that it encompasses literally any method for detecting fraud based on the gathered transaction and Internet address data. J.A. 32, col.2 11.45-46. This necessarily includes even logical reasoning that can be performed entirely in the human mind. For example, a person could literally infringe step (c) by identifying a likely instance of fraud based on the simple observation that numerous transactions using different credit cards, having different user names and billing addresses, all originated from the same IP address. Indeed, CyberSource’s CEO admitted that, before CyberSource created a computer implemented fraud detection system, “[w]e could see just by looking that more than half of our orders were fraudulent.” J.A. 375.
Thus, claim 3’s steps can all be performed in the human mind. Such a method that can be performed by human thought alone is merely an abstract idea and is not patent-eligible under § 101. Methods which can be performed entirely in the human mind are unpatentable not because there is anything wrong with claiming mental method steps as part of a process containing non-mental steps,
3
but rather because computational methods which can be performed
entirely
in the human mind are the types of methods that embody the “basic tools of scientific and technological work” that are free to all men and reserved exclusively to none.
Benson,
Ill
We turn next to claim 2 of the '154 patent, which recites a so-called “Beauregard claim.” A Beauregard claim— named after
In re Beauregard,
2. A computer readable medium containing program instructions for detecting fraud in a credit card transaction between a consumer and a merchant over the Internet, wherein execution of the program instructions by one or more processors of a computer system causes the one or more processors to carry out the steps of:
a) obtaining credit card information relating to the transactions from the consumer; and
b) verifying the credit card information based upon values of plurality of parameters, in combination with information that identifies the consumer, and that may provide an indication whether the credit card transaction is fraudulent,
wherein each value among the plurality of parameters is weighted in the verifying step according to an importance, as determined by the merchant, of that value to the credit card transaction, so as to provide the merchant with a quantifiable in *1374 dication of whether the credit card transaction is fraudulent,
wherein execution of the program instructions by one or more processors of a computer system causes that one or more processors to carry out the further steps of;
[a] obtaining information about other transactions that have utilized an Internet address that is identified with the credit card transaction;
[b] constructing a map of credit card numbers based upon the other transactions; and
[c] utilizing the map of credit card numbers to determine if the credit card transaction is valid.
J.A. 32 ('154 Patent Reexamination Certificate), col.2 11.9-37 (emphases added). While claim 2 contains somewhat redundant language, it is clear from the emphasized text that claim 2 recites nothing more than a computer readable medium containing program instructions for executing the method of claim 3.
As discussed above, we found claim 3 to be unpatentable because it is drawn to a mental process — i.e., an abstract idea. The method underlying claim 2 is clearly the same method of fraud detection recited in claim 3. Nonetheless, CyberSource contends that claim 2 should be patentable. CyberSource’s main argument is that coupling the unpatentable mental process recited in claim 3 with a manufacture or machine renders it patent-eligible.
CyberSource argues that claim 2 is patent-eligible per se because it recites a “manufacture,” rather than a “process,” under the statutory language of § 101. CyberSource contends that, by definition, a tangible, man-made article of manufacture such as a “computer readable medium containing program instructions” cannot possibly fall within any of the three patent-eligibility exceptions the Supreme Court has recognized for “laws of nature, physical phenomena, [or] abstract ideas.” Appellant’s Br. 47-48 (quoting
Bilski,
Regardless of what statutory category (“process, machine, manufacture, or composition of matter,” 35 U.S.C. § 101) a claim’s language is crafted to literally invoke, we look to the underlying invention for patent-eligibility purposes. Here, it is clear that the invention underlying both claims 2 and 3 is a method for detecting credit card fraud, not a manufacture for storing computer-readable information. This case is thus similar to
In re Abele,
In the present case, CyberSource has not met its burden to demonstrate that
*1375
claim
2
is “truly drawn to a specific” computer readable medium, rather than to the underlying method of credit card fraud detection. To be sure, after
Abele,
we have held that, as a general matter, programming a general purpose computer to perform an algorithm “creates a new machine, because a general purpose computer in effect becomes a special purpose computer once it is programmed to perform particular functions pursuant to instructions from program software.”
In re Alappat,
Analyzing claim 2 as a process claim, CyberSource first asserts that claim 2 satisfies the transformation prong of the machine-or-transformation test because it recites a patentable transformation of data representing Internet credit card transactions. According to CyberSource, the claimed technique uses an “Internet address” such as an IP address or e-mail address and constructs a “map” of credit card numbers from Internet transactions that have utilized that Internet address. We agree with the district court that the claimed process manipulates data to organize it in a logical way such that additional fraud tests may be performed. The mere manipulation or reorganization of data, however, does not satisfy the transformation prong. Thus, claim 2 fails to meet the transformation test.
CyberSource additionally argues that claim 2 satisfies the machine prong of the machine-or-transformation test, since the recited “computer readable medium” contains software instructions that can only be executed by “one or more processors of a computer system.” J.A. 32, eol.2 11.12-14. As we stated in
Bilski,
to impart patent-eligibility to an otherwise unpatentable process under the theory that the process is linked to a machine, the use of the machine “must impose meaningful limits on the claim’s scope.”
That purely mental processes can be unpatentable, even when performed by a computer, was precisely the holding of the Supreme Court in
Gottschalk v. Benson.
As discussed above, the Supreme Court found in
Benson
that a claim to a method of programming a general-purpose computer to convert BCD numbers into pure binary was unpatentable because the conversion of BCD numerals to pure binary
*1376
numerals “can be done mentally,”
Following Benson, as noted earlier, the Supreme Court in Flook and Bilski found other method claims invalid under § 101 for being drawn to abstract ideas. In so holding, the Court did not indicate that those claims could have avoided invalidity under § 101 by merely requiring a computer to perform the method, or by reciting a computer readable medium containing program instructions for performing the method. 4
This is entirely unlike cases where, as a practical matter, the use of a computer is required to perform the claimed method. For example, in
SiRF Tech.,
we found that claims to a “method for calculating an absolute position of a GPS receiver and an absolute time of reception of satellite signals” recited patent-eligible subject matter.
Similarly, in
Research Corp. Techs. v. Microsoft Corp.,
In contrast, it is clear in the present case that one could mentally perform the fraud detection method that underlies both claims 2 and 3 of the '154 patent, as the method consists of only the general approach of obtaining information about credit card transactions utilizing an Internet address and then using that information in some undefined manner to determine if the credit card transaction is valid. Because claims 2 and 3 attempt to capture *1377 unpatentable mental processes (i.e., abstract ideas), they are invalid under § 101.
AFFIRMED
Notes
. Claim 3, as amended during reexamination, reads:
3. A method for verifying the validity of a credit card transaction over the Internet comprising the steps of:
a) obtaining information about other transactions that have utilized an Internet address that is identified with the [ ] credit card transaction;
b) constructing a map of credit card numbers based upon the other transactions and;
c) utilizing the map of credit card numbers to determine if the credit card transaction is valid.
J.A. 32 ('154 Patent Reexamination Certificate), col.2 11.38-47.
Claim 2, as amended during reexamination, reads:
2. A computer readable medium containing program instructions for detecting fraud in a credit card transaction between a consumer and a merchant over the Internet, wherein execution of the program instructions by one or more processors of a computer system causes the one or more processors to carry out the steps of:
a) obtaining credit card information relating to the transactions from the consumer; and
b) verifying the credit card information based upon values of plurality of parameters, in combination with information that identifies the consumer, and that may provide an indication whether the credit card transaction is fraudulent,
wherein each value among the plurality of parameters is weighted in the verifying step according to an importance, as determined by the merchant, of that value to the credit card transaction, so as to provide the merchant with a quantifiable indication of whether the credit card transaction is fraudulent,
wherein execution of the program instructions by one or more processors of a computer system causes that one or more processors to carry out the further steps of;
[a] obtaining information about other transactions that have utilized an Internet address that is identified with the credit card transaction;
[b] constructing a map of credit card numbers based upon the other transactions; and
[c] utilizing the map of credit card numbers to determine if the credit card transaction is valid.
Id. col.2 11.9-37.
.
See also In re Schrader, 22
F.3d 290, 291 (Fed. Cir. 1994) (holding unpatentable a "method constitut[ing] a novel way of conducting auctions” to maximize total sales revenue);
In re Warmerdam,
.
See In re Abele,
. The Supreme Court in
Diamond v. Diehr
characterized
Flook
as a case involving the use of a mathematical formula in the abstract, regardless of whether the patent "is intended to cover all uses of the formula or only limited uses.”
