Lead Opinion
Opinion dissenting-in-part filed by Circuit Judge STOLL.
Intellectual Ventures I LLC (“IV”) sued Symantec Corp. and Trend Micro
Background
I
IV owns the three patents at issue: the '050 patent, the '142 patent, and the '610 patent. IV sued Symantec and Trend Micro, two developers of anti-malware and anti-spam software, for infringement of various claims of those patents. Against Symantec, IV asserted claims 9,16, and 22 of the '050 patent; claims 1, 7, 21, and 22 of the '142 patent; and claim 7 of the '610 patent. Against Trend Micro, IV asserted claims 9, 13, 16, 22, arid 24 of the '050 patent; and claims 1, 7, 17, 21, 22, 24, and 26 of the '142 patent.
With respect to the two defendants, a § 101 patent eligibility issue arose at different stages of the proceedings. The case against Symantec went to trial. The jury found that Symantec had not proven by clear- and convincing evidence that any asserted claims were invalid under §§ 102 and 103. The jury found Symantec had infringed the asserted claims of the '142 patent and '610 patent, and had not infringed any asserted claims of the '050 patent.
The case against Trend Micro did not go to trial. Trend Micro brought a motion for summary judgment- of invalidity under § 101 for all of the asserted claims.
II
The '050 patent is entitled, “Distributed Content Identification System.”-The patent application was filed on December 22, 1999, and the '050 patent issued on October 1, 2002. The patent is directed to methods of screening emails and other data files for unwanted content.
The '142 patent is entitled, “Automated Post Office Based Rule Analysis of E-Mail Messages and Other Data Objects for Con
The '610 patent is entitled, “Computer Virus Screening Methods and Systems.” The patent applicаtion was filed on February 12, 1998, and the patent issued on November 16, 1999. The patent is directed to using computer virus screening in the telephone network.
In both cases the district court determined that the asserted claims of the '050 patent and '142 patent claimed ineligible subject matter under 35 U.S.C. § 101, and granted appellees’ motions with respect to those patents. The district court held, however, that Symantec had failed to establish that the asserted claim of the '610 patent is patent-ineligible under § 101, and denied Symantec’s motion with respect to that patent.
Final judgment was entered in favor of Symantec and Trend Micro that the asserted claims of the '050 and '142 patents are patent-ineligible under 35 U.S.C. § 101. Id. See Final Judgment Following Jury Trial (“Symantec Final Judgment”), Intellectual Ventures I LLC v. Symantec Corp., No. 10-cv-1067-LPS,
IV now appeals the district court’s ineligibility determinations with respect to the '050 patent and '142 patent as to Syman-tec and Trend Micro, and Symantec cross-appeals- the determination of eligibility for the '610 patent. We have jurisdiction under 28 U.S.C. § 1295(a)(1).
Discussion
I
We review the grant or denial of summary judgment de novo. See Nicini v. Morra,
II
Section 101 of title 35 defines patent-eligible subject matter. It provides, “[w]hoever invents or discovers any new and useful process, machine, manufacture, or composition of matter, or any new and useful improvement thereof, may obtain a patent therefor....” 35 U.S.C. § 101. For over 150 years, the Supreme Court has recognized an implicit exception to these broad categories encompassing “[l]aws of nature, natural phenomena, and abstract ideas[, which] are not patentable.” Mayo Collaborative Servs. v. Prometheus Labs., Inc., — U.S.-,
In Mayo and in Alice, the Court set forth a framework for “distinguishing patents that claim laws of nature, natural phenomena, and abstract ideas from those that claim patent-eligible applications of those concepts.” Alice Corp. Pty. Ltd. v. CLS Bank Int’l, — U.S.-,
If a claim is directed to a patent-ineligible concept, the court must proceed to Mayo/Alice step two, and ask, “what else is there in the claims before us?” Alice,
At Mayo/Alice step two, the search is for “an inventive concept sufficient to transform the claimed abstract idea into a patent-eligible application.” Id. at 2357 (citation and internal quotation marks omitted). And “[s]imply appending conventional steps, specified at a high level of generality,” which are “well known in the art” and consist of “well-understood, routine, conventional activities]” previously engaged in by workers in the field, is not sufficient to supply the inventive concept. Id. at 2357, 2359 (citations and internal quotation marks omitted).
1, The '050 Patent
The district court held patent-ineligible the asserted claims of the '050 patent— claims 9, 13, 16, 22, and 24—directed to filtering e-mails that have unwanted content. We agree with the district court. The parties agree that independent claim 9 is representative. It recites’:
9. A method for identifying chаracteristics of data files, comprising:
receiving, on a processing system, , file content identifiers for data files from a plurality of file content identifier generator agents, each agent provided on a source system and creating file content IDs using a mathematical algorithm, via a network;
determining, on the processing system, whether each received content identifier matches a characteristic of other identifiers; and ’
outputting, to at least one of the source systems responsive to a request from said source system, an indication of the characteristic of the data file based on said step of determining.
'050 patent, col. 8, 11. 13-26. According to IV, this method of filtering emails is used to address the problems of spam e-mail and the use of e-mail to deliver computer viruses.
We agree with the district court that receiving ’e-mail (and other data file) identifiers, characterizing e-mail based on the identifiers, and communicating the characterization—in other words, filtering files/e-mail—is an abstract idea.
Here, it was long-prevalent practice for people receiving paper mail to look at an envelope and discard certain letters, without opening them, from sources from which they did not wish to receive mail based on characteristics of the mail.
The asserted claims of the '050 patent also resemble claims we have held were directed to an abstract idea. Recently, in BASCOM Global Internet Services, Inc. v. AT&T Mobility LLC, we held that a claim to a “content filtering system for filtering content retrieved from an Internet computer network[, e.g., to prevent users from accessing certain websites] ... is [directed to] an abstract idea.”
Because we hold the asserted claims of the '050 patent are directed to an abstract idea, we proceed to Mayo/Alice step two to determine whether the claims contain an “inventive concept” that renders them рatent-eligible. Claims that “amount to nothing significantly more than an instruction to apply [an] abstract idea ... using some unspecified, generic computer” and in which “each step does no more than require a generic computer to perform generic computer functions” do not make an abstract idea patent-eligible, Alice,
IV argues that the jury verdict determined that Symantec’s proffered pri- or art did not anticipate or render obvious the asserted claims of the '050 patent, and that the jury’s anticipation and obviousness determination is inconsistent with a determination that the claims are patent-ineligible. While the claims may not have been anticipated or obvious because the prior art did not disclose “determining ... whether each received content identifier matches a characteristic” or “outputting ... an indication of the characteristic of the data file,” that does not suggest that the idea of “determining” and “outputting” is not abstract, - much less that its implemеntation is not routine and conventional.
Indeed, “[t]he ‘novelty’ of any element or steps in a process, or even of the process itself, is of no relevance in determining whether the subject' matter of a claim falls within the § 101 categories of possibly patentable subject matter.” Diamond v. Diehr,
The steps of the asserted claims of the '050 patent do not “improve the functioning of the computer itself,” Alice,
. In Intellectual Ventures v. Capital One Bank, we found abstract an. Internet-based method for “tracking financial transactions to determine whether they exceed a preset spending limit (i.e., budgeting).”
The claims .here are also distinguishable from those in BASCOM, which allegedly improved an existing technological process by describing “how [a] particular arrangement of elements is a technical improvement over prior art ways of filtering [Internet] content,” i.e., “a filter implementation versatile enough that it could be adapted to many different users’ preferences while also installed remotely in a single location,”
Finally, IV argues that the '050 patent “shrink[s] the protection gap and moot[s] the volumé problem.” IV’s Opening Br. at 14. According to IV, the protection gap is “the period of time between identification of a computer virus' by an anti-malware provider and distribution of that knowledge to its users.” Id. at 10. Thе volume problem is the “exponential growth in malware and spam,” increasing the amount of antivirus signatures to be downloaded. Id. at 12-13. However, the asserted claims do not contain any limitations that address the protection gap or volume problem, e.g., by requiring automatic updates to the antivirus or antispam software or the ability to deal with a large volume of such software. We have explained that, “for a perceived abstract idea, if the claim ‘contains an “inventive concept” sufficient to “transform” the claimed abstract idea into a patent-eligible application,’ then the claims pass the test of eligibility under section 101.” Internet Patents Corp., 790 F,3d at 1347 (emphasis added) (quoting Alice,
The asserted claims of the '050 patent are not patent>eligible under § 101.
2. The T42 Patent
The district court held ineligible claims 1, 7, 17, 22, 24, and 26 of the '142 patent, which relate to systems and methods for receiving, screening, and distributing email, and we agree. According to IV, claim 1 is representative of how the '142 patent screens e-mail,
1. A post office for receiving and redistributing email messages on a computer network, the post office comprising:
a receipt mechanism that receives an email message from a sender, the e-mail*1317 message having at least one specified recipient;
a databаse of business rules, each business rule specifying an action for controlling the delivery of an e-mail message as a function of an attribute of the e-mail message;
a rule engine coupled to receive an email message from the receipt mechanism and coupled to the database to selectively apply the business rules to the e-mail message to determine from selected ones of the business rules a set of actions to be applied to the e-mail message; and
a distribution mechanism coupled to receive the set of actions from the rule engine and apply at least one action thereof to the e-mail message to control delivery of the e-mail message and which in response to the rule engine applying an action of deferring delivery of the' e-mail message, the distribution engine automatically combines the email message with a new distribution list specifying at least one destination post office for receiving the e-mail message for review by an administrator associated with the destination post office, and a rule history specifying the business rules that were determined to be applicable to the e-mail message by at least one rule engine, and automatically delivers the e-mail message to a first destination pоst office on the distribution list instead of a specified recipient of the email message.
'142 patent, col. 27,11. 2-32.
The written description is particularly useful in determining what is well-known or conventional. See, e.g., Internet Patents Corp.,
We agree, and think the district court’s analogy to a corporate mailroom is also useful. Such mailrooms receive correspondence, keep business rules defining actions to be taken regarding correspondence based on attributes of the correspondence, apply those business rules to correspondence, and take certain actions based on the application of business rules. Those actions include gating the message for further review,
Indeed, in recounting the background of the invention, the patent states,
[m]any corporate organizations have elaborate methods to control the flow of memorandum, publications, notices, and other printed information within the organization. An organization may limit the types of documents employees can distribute at work, and in some cases, control which persons within an organization communicate with each other— These various rules are typically doeu-*1318 mented as part of- the organization’s business communication policies.
Id. at col. 1,11. 15-33. Thus, the '142 patent itself demonstrates that the claimed systems and methods of screening messages are abstract ideas, “fundamental ... practice[s] long prevalent in our system” and “method[s] of organizing human activity.” Alice,
And IV itself informed the district court, in its technology tutorial, “[i]n the typical environment, the post office resides on a mail server, where the company’s emails are received, processed, and routed to recipients.' Conceptually, this post office is not much different than a United States Postal Service office that processes letters and packages, except that the process is all computer-implemented and done electronically in a matter of seconds.” J.A. 40.
This demonstrates that the concept is well-known and abstract. Furthermore, with the exception of generic compúter-implemented steps, there is nothing in the claims themselves that foreclose them from being performed by a human, mentally or with pen and paper. See CyberSource,
Since the claims are directed to an abstract idea, we proceed to Mayo/Alice step two. According to the specification, the claims can “operate[ ] on a conventional communications network.” Id. at col. 5,1. 46. The post offices are “[c]ommunicatively coupled to the network through cоnventional e-mail protocols,” and “conventional mail servers and conventional post office/mail server combinations may be present.” Id. at col. 5, 11. 48-49, 55-57. The patent discloses only generic computers performing generic functions: “[t]he [Rule Enforcing Post Offices] and [Gatekeeping Post Offices] are preferably implemented as software products executing on conventional server-class computers, such as ... IBM compatible computers based on Intel Inc.’s Pentium™ processors. The servers operate in conjunction with conventional operating systems, such, as UNIX™, or Microsoft Corp.’s Windows95™ or Win-dowNT™.” Id. at col. 9, 11. 51-58. The specification thus confirms.that the implementation of the abstract idea is routine and conventional. The '142 patent does not “improve the functioning of the computer itself.” Alice,
IV argues that the claims do not merely require routine and conventional use of computers and the Internet because “applying business rules to email is not what computers and the Internet do in the absence of this claim limitation” and “because computers and the Internet do not have ‘rule engines’ as a matter of course.” IVs Opening Br. at 54. But the inquiry is not whether conventional computers already apply, for example, well-known business concepts like hedging or intermediat-ed settlement. Rather, we determine whether “each step does no more than require a generic computer to perform generic computer functions.” Alice, 134 S.Ct.
The asserted claims of the '142 patent are not patent-eligible under § 101.
3. The '610 Patent
Claim 7 is the only asserted claim of the '610 patent. The district court held eligible claim 7 of the '610 patent. Claim 7 depends from claim 1, which provides:
1. A virus screening method comprising the steps of:
routing a call between a calling party and a called party of a telephone network;
receiving, within the telephone network, computer data from a first party selected from the group consisting of the calling party and the called party;
detecting, within the telephone network, a virus in the computer data; and
in response to detecting the virus, inhibiting communication of at least a portion of the computer data from the telephone network to a second party selected from the group consisting of the calling party and the called party.
'610 patent, col. 14, 11. 34-47. Claim 7 recites:
7. The virus screening method of claim 1 further comprising, the step of determining that virus screening is to be applied to the call based upon at least one of an identification code of the calling party and an identification code of the called party.
Id. at col. 14,1. 66-eol. 151. 3.
Unlike the asserted claims of the '050 and- '142 patents, claim 7 involves an idea that originated in the computer era— computer virus screening. But the idea of virus screening was nonetheless well known when the '610 patent was filed. Performing virus screening was a long prevalent practice in the field of computers, and, as the patent admits, performed by many computer users. The patent acknowledges that, prior to the invention, “[m]any computer users [had] virus screening and detection software installed on their computers.” Id. at col. 1, 11. 10-11. Claim 7 of the '610 patent, however, does not claim a new method of virus screening or improvements thereto—in fact, it requires only “detecting ... a virus in the computer data.” Id. at col. 14, 11. 40-41. The specification recites conventional “virus screening software.” See, e.g., -610 patent, col. 3, 11. 35-39. By itself, virus screening is well-known and constitutes an abstract idea.
At step two of Mayo/Alice, there is no other aspect of the claim that is anything but conventional.
The '610 patent is directed to the use of well-known virus screening software within the telephone network
. Just as performance of an abstract idea on the Internet is abstract, so too the performance of an abstract concept in the environment of,the telephone network is abstract, as Intellectual Ventures v. Capitol One Bank recognized. Our regent decision in TLI Communications involved a similar situation. There, we held that a challenged claim was “drawn to the concept of classifying an image and storing the image based on its classification.”
Nor does the asserted claim improve or change the way a computer functions. Claim 7 recites no more than generic computers that use generic virus screening technology. But the “mere recitation of a generic computer cannot transform a patent-ineligible abstract idea into a patent-eligible invention.” Alice,■
As the district court determined, claim 7 calls for at least three computers: the computer of the first party or sending party, the virus screening computer, and the computer of the second or receiving party. The sending and receiving computers can be generic—they perform only sending and receiving functions. See bu-ySAFE,
IV argues that “[t]he claims of the '610 Patent include meaningful limitations that narrow the claimed invention to a specific way of screening for computer viruses within the telephone network ... and does not -preempt all virus detection.”
In summary, unlike the claims at issue in Enfish, which involved a “sрecific type of data structure designed to improve the way a computer stores and retrieves data in memory,”
Citing BASCOM, the dissent argues that “claim 7 constitutes an improvement of the network itself and, thus, focuses on improving computers as tools.” Dissenting Op. at 1331. Contrary to the dissent, this case is unlike BASCOM, where, “[o]n [a] limited record” and when viewed in favor of the patentee, the claims alleged a “technical improvement over prior art ways of filtering [Internet] content.”
The dissent nonetheless urges that there are two advantages to using virus screening on the telephone network that qualify as inventive concepts: (1) shifting virus detection away from the networks of the sender and recipient, which allows users to communicate over a network without concern of receiving computer viruses; and (2) closing the “protection gap,” i.e., the problem of individual computer users having to periodically update their virus screening software. Dissenting Op. at 1329.
Regarding shifting virus detection to the telephone network, the claimed inventive solution of claim 7 is to utilize an intermediary computer in forwarding information. But that solution is perfectly conventional and is applied any time an e-mail recipient performs virus screening and, acting as an intermediary, forwards the email to another recipient. As discussed above, there is no claim here describing a particular method of incorporating virus screening into the Internet.
As to the protection gap, claim 7 of the '610 patent does not describe or require a solution to the protection gap. See supra at 13-14 (explaining that the language of the challenged claims of the '050 patent do not address the protection gap). The district court erred in relying on technological details set forth in the patent’s specification and not set forth in the claims to find an inventive concept. See Accenture,
As we explained in TLI Communications, the claim here is “not directed to a specific improvement to computer functionality. Rather, [it is] directed to the use of conventional or generic technology in a nascent but well-known environment, without any claim that the invention reflects an inventive solution to any problem presented by combining the two.”
Claim 7 of the '610 patent is not patent-eligible under § 101.
AFFIRMED-IN-PART AND REVERSED-IN-PART
Costs
Costs to defendants.
Notes
. We refer to Trend Micro Incorporated and Trend Micro, Inc. (USA) together as a singular defendant "Trend Micro.”
. The jury awarded $9 million for infringement of the '142 patent and $8 million for infringement of the '610 patent.
.While Trеnd Motion did not" state under which rule it brought its motion, the district ■ court applied the Fed. R. Civ. P. 56 summary judgment standard, and the parties did not dispute the application of that standard.
. The entry of final judgment ripened Syman-tec's cross-appeal. See Pause Tech. LLC v. TiVo Inc.,
. See., e.g., Bilski,
. For example, it is common for "an occupant who receives genetically addressed mail [to] discard it as junk mail.” Jones v. Flowers,
. In BASCOM, we found the claims patent-eligible because, at step two, the patent claimed "a technology-based solution (not an abstract-idea-based solution implemented with generic technical components in a conventional way) to filter content on the Internet that overcomes existing problems with other Internet filtering systems.”
. See also Parker v. Flook,
. Defendants agree, and IV does not dispute, that "[a]ll of the claims are substantially similar and no party claims that they differ in any manner relevant” to the § 101 analysis. Opening Br. of Cross-Appellant Symantec Corp. at 10. We focus on claim 1 of the '142 patent, which IV states is representative. Addressing each of the asserted claims is unnecessary when "all the claims are substantially similar and linked to the same abstract idea." Content Extraction,
. The specification states, “[f]or example, a business rule to gate an e-mail for further review may be triggered for any e-mail message that is addressed to the president of the company.” '142 patent, col, 3, 45-48.
. The district court construed "within the telephone network” to mean "in the voice or data network connecting the calling party and called party, exclusive of the networks and gateway nodes of the called party and calling party.” J.A, 276.
. See also, e.g., buySAFE,
. Indeed, in BASCOM, the patent specification acknowledged that several prior art systems already performed content filtering at either local or remote servers. See 827 F,3d at 1344.
. See Affinity Labs of Tex., LLC v. DirecTV, LLC, No. 2015-1845 (Fed. Cir. Sept. 23, 2016),
Concurrence Opinion
concurring.
I agree that all claims on appeal fall outside of 35 U.S.C. § 101. I write separately, however, to make two points: (1) patents constricting the essential channels of online communication run afoul of the First Amendment; and (2) claims directed to software implemented on a generic computer are categorically not eligible for patent.
I.
“[T]he Constitution protects the right to receive information and ideas.... This right to receive information and ideas, regardless of their social worth, is fundamental to our free society.” Stanley v. Georgia,
Although the claims at issue here disclose no new technology, they have the potential to disrupt, or even derail, large swaths of online communication. U.S. Patent No. 6,460,050 (the “ '050 patent”) purports to cover methods of “identifying characteristics of data files,” '050 patent, col. 8 1. 13, whereas U.S. Patent No. 6,073,142 (the “'142 patent”) broadly claims
Suppression of free speech is no less pernicious because it occurs in the digital, rather than the physical, realm. “[W]hatever the challenges of applying the Constitution to ever-advancing technology, the basic principles of freedom of speech and the press, like the First Amendment’s command, do not vary when a new and different medium for communication appears.” Brown v. Entm’t Merchs. Ass’n,
Like all congressional powers, the power to issue patents and copyrights is circumscribed by the First Amendment. See Golan v. Holder, — U.S. -,
Just as the idea/еxpression dichotomy and the fair use defense serve to keep copyright protection from abridging free speech rights, restrictions on subject mat
As both the Supreme Court and this court have recognized, section 101 imposes “a threshold test,” Bilski v. Kappos,
The public has a “paramount interest in seeing that patent monopolies ... are kept within their legitimate scope.” Cuozzo Speed Techs., LLC v. Lee, — U.S.-,
II.
Most of the First Amendment concerns associated with patent protection could be avoided if this court were willing to acknowledge that Alice sounded the death knell for software patents. The claims at issue in Alice• were directed to a computer-implemented system for mitigating settlement risk.
Software is a form of language—in essence, a set of instructions. See Microsoft Corp. v. AT&T Corp.,
The central problem with affording patent protection to generically-implemented software is that standard computers have long been ceded to the public domain. See Flook,
Software lies in the antechamber of patentable invention. Because generically-implemented software is an “idea” insufficiently linked to any defining physical structure other than a standard computer,
. Software development has flourished despite—not because of—the availability of expansive patent protection. See Brief of Amicus Curiae Elec. Frontier Found, in Support of Respondents, Alice,
From an eligibility perspective, software claims suffer from at least four insurmountable problems. First, their scope is generally vastly disproportionate to their technological disclosure. In assessing patent eligibility, “the underlying functional concern ... is a relative one: how much future innovation is foreclosed relative to the contribution of the inventor.” Mayo Collaborative Servs. v. Prometheus Labs., Inc., — U.S.-,
A second, and related, problem with software patents is that they provide incentives at the wrong time. Because they are typically obtained at the “idea” stage, before any real inventive work has been done, such patents are incapable of effectively incentivizing meaningful advances in science and technology. “A player focused on patenting can obtain numerous patents without developing any of the technologies to useful levels of deployment or disclosure, leaving a minefield of abstract patent claims for others who actually deploy software.” Seltzer,
Yet another intractable problem with software patents is their sheer number. See Brief of Amici Curiae Checkpoint Software, Inc. et al. .in Support of Respondents, Alice,
Fourth, and most fundamentally, generically-implemented software invariably lacks the concrete borders the patent law demands. See, e.g., Digital Equip. Corp. v. AltaVista Tech., Inc.,
Software, however, is akin to a work of literature or a piece of music, undeniably important, but too unbounded, i.e., too “abstract,” to qualify as a patent-eligible invention. See Microsoft,
Declaring that software implemented on a generic computer falls outside of section 101 would provide much-needed clarity and consistency in our approach to patent eligibility. It would end the semantic gymnastics of trying to bootstrap software into the patent system by alleging it offers a “spеcific method of filtering Internet content,” see BASCOM Global Internet Servs., Inc. v. AT&T Mobility LLC,
Dissenting Opinion
dissenting in part.
I concur in the result reached by the majority except -with respect to the '6.10 patent. I would affirm the judgment of the district court that asserted claim 7 of the '610 patent is eligible under § 101.
The '610 patent confirms that the claimed invention “advantageously screenfs] computer data for viruses within a telephone network before communicating the computer data to an end user.” '610 patent col. 1 11. 59-61. The patent explains that this was a fundamental architectural shift from prior-art virus screening, which occurred locally on an end user’s computer rather than centrally as in the invention. Id. col. 1 11. 10-11. This shift improved the overall security of telecommunication networks by thwarting the ability of viruses to reach and exploit end users. Using the patented invention, end users could communicate over a network “without concern of receiving various predetermined computer viruses.” Id. col. 1 11. 63-64; see also Intellectual Ventures I LLC v. Symantec Corp. (Dist. Ct. Op.),
I agree with the district court that the claimed invеntion is eligible under § 101. Dist. Ct. Op.,
Claim 7 is eligible as an ordered combination. While the network components and virus screening software recited by the claim may themselves be conventional, “an inventive concept can be found in the non-conventional and non-generic arrangement of known, conventional pieces.” BASCOM Glob. Internet Servs., Inc. v. AT&T Mobility LLC,
The claimed invention is also markedly similar to that in BASCOM, where we vacated the district court’s ineligibility determination on the basis of a step-two ordered combination. Compare '610 patent col. 111. 59-61 (“Embodiments of the present invention advantageously screen computer data for viruses within a telephone network before communicating the computer data to an end user.”), with BASCOM,
I disagree with the majority’s characterization of this case as fitting within our line of cases rendering ineligible patents that mеrely “perform[ ] otherwise abstract activity on the Internet.” Maj. Op. 1319. The claims at issue in those cases, like the claims at issue in Alice, simply invoked the Internet as a means to an end; they did not improve the security and functioning of the Internet itself. Patents that fall within that paradigm are ineligible because “the focus of the[ir] claims is not on such an improvement in computers as tools, but on certain independently abstract ideas that use computers as tools.” Elec. Power Grp., LLC v. Alstom S.A., No. 2015-1778,
For these reasons, I respectfully dissent from the majority opinion regarding the '610 patent and would affirm the judgment of the district court holding that asserted claim 7 of the '610 patent is eligible under § 101.
