The U.S. Patent and Trademark Office published examples of claims that are patent eligible and claims that are not patent eligible. The examples show how claims should be analyzed under the 2014 Interim Eligibility Guidance, discussed in a post below. All of the claims are analyzed for eligibility in accordance with their broadest reasonable interpretation.
Patent Eligible Claims
Example 1: Isolating and Removing Malicious Code from Electronic Messages
The invention relates to isolating and removing malicious code from email to prevent a computer from being compromised, for example by being infected with a computer virus. The specification explains the need for computer systems to scan electronic communications for malicious computer code and clean the electronic communication before it may initiate malicious acts. The disclosed invention operates by physically isolating a received electronic communication in a “quarantine” sector of the computer memory. A quarantine sector is a memory sector created by the computer’s operating system such that files stored in that sector are not permitted to act on files outside that sector.
Claims
1. A computer-implemented method for protecting a computer from an electronic communication containing malicious code, comprising executing on a processor the steps of:
receiving an electronic communication containing malicious code in a computer with a memory having a boot sector, a quarantine sector and a non-quarantine sector;
storing the communication in the quarantine sector of the memory of the computer, wherein the quarantine sector is isolated from the boot and the non-quarantine sector in the computer memory, where code in the quarantine sector is prevented from performing write actions on other memory sectors;
extracting, via file parsing, the malicious code from the electronic communication to create a sanitized electronic communication, wherein the extracting comprises
scanning the communication for an identified beginning malicious code marker,
flagging each scanned byte between the beginning marker and a successive end malicious code marker,
continuing scanning until no further beginning malicious code marker is found, and
creating a new data file by sequentially copying all non-flagged data bytes into a new file that forms a sanitized communication file;
transferring the sanitized electronic communication to the non-quarantine sector of the memory; and
deleting all data remaining in the quarantine sector.
Claim 1 is patent eligible.
Step 1. The claim recites a series of acts. Thus the claim is directed to a process.
Step 2. The claim is directed towards performing isolation and eradication of computer viruses, worms, and other malicious code, a concept inextricably tied to computer technology and distinct from the types of concepts found by the courts to be abstract.
2. A non-transitory computer-readable medium for protecting a computer from an electronic communication containing malicious code, comprising instructions stored thereon, that when executed on a processor, perform the steps of:
receiving an electronic communication containing malicious code in a computer with a memory having a boot sector, a quarantine sector and a non-quarantine sector;
storing the communication in the quarantine sector of the memory of the computer, wherein the quarantine sector is isolated from the boot and the non-quarantine sector in the computer memory, where code in the quarantine sector is prevented from performing write actions on other memory sectors;
extracting, via file parsing, the malicious code from the electronic communication to create a sanitized electronic communication, wherein the extracting comprises
scanning the communication for an identified beginning malicious code marker,
flagging each scanned byte between the beginning marker and a successive end malicious code marker,
continuing scanning until no further beginning malicious code marker is found, and
creating a new data file by sequentially copying all non-flagged data bytes into a new file that forms a sanitized communication file;
transferring the sanitized electronic communication to the non-quarantine sector of the memory; and
deleting all data remaining in the quarantine sector.
Claim 2 is patent eligible.
Step 1, Yes. The claim recites a manufacture.
Step
2A, No. The claim is directed towards performing isolation and eradication
of computer viruses, worms, and other malicious code, a concept
inextricably tied to computer technology and distinct from the types of
concepts found by the courts to be abstract.
Example 2: E-Commerce Outsourcing System/Generating a Composite Web Page
See the post below for DDR Holdings, LLC v. Hotels.com
Claim 19. A system useful in an outsource provider serving web pages offering
commercial opportunities, the system comprising:
(a) a computer store containing data, for each of a plurality of first web pages,
defining a plurality of visually perceptible elements, which visually perceptible
elements correspond to the plurality of first web pages;
(i) wherein each of the first web pages belongs to one of a plurality of web page owners;
(ii) wherein each of the first web pages displays at least one active link associated with a commerce object associated with a buying opportunity of a selected one of a plurality of merchants; and
(iii) wherein the selected merchant, the outsource provider, and the owner of the first web page displaying the associated link are each third parties with respect to one other;
(b) a computer server at the outsource provider, which computer server is coupled
to the computer store and programmed to:
(i) receive from the web browser of a computer user a signal indicating activation of one of the links displayed by one of the first web pages;
(ii) automatically identify as the source page the one of the first web pages on which the link has been activated;
(iii) in response to identification of the source page, automatically retrieve the stored data corresponding to the source page; and
(iv) using the data retrieved, automatically generate and transmit to the web browser a second web page that displays: (A) information associated with the commerce object associated with the link that has been activated, and (B) the plurality of visually perceptible elements visually corresponding to the source page.
Claim 19 is patent eligible.
Step 1, Yes. The claim recites a system comprising a computer service and is a machine.
Step
2A, No. The claim does not “merely recite the performance of some business practice known from the pre-Internet world along with the requirement to perform it on the Internet. Instead, the claimed solution is necessarily rooted in computer technology in order to overcome a problem specifically arising in the realm of computer networks.”
Example 3: Digital Image Processing
See Research Corporation Technologies Inc. v. Microsoft Corp.
Claim 1. A computer-implemented method for halftoning a gray scale image, comprising the steps of:
generating, with a processor, a blue noise mask by encoding changes in pixel values across a plurality of blue noise filtered dot profiles at varying gray levels;
storing the blue noise mask in a first memory location;
receiving a gray scale image and storing the gray scale image in a second memory location;
comparing, with a processor on a pixel-by-pixel basis, each pixel of the gray scale image to a threshold number in the corresponding position of the blue noise mask to produce a binary image array; and
converting the binary image array to a halftoned image.
Claim 1 is patent eligible.
Step 1, Yes. Claim 1 is directed to a process.
Step 2A, Yes. Mathematical relationships fall within the judicial exceptions, often labelled as “abstract ideas.”
Step 2B, Yes. First, the claim recites using a processor to generate the blue noise mask. The claim also recites the steps of storing the blue noise mask in a first memory location and receiving a gray scale image and storing the gray scale image in a second memory location. Thus, the claim uses a processor and memory to perform these steps of calculating a mathematical operation and receiving and storing data. The addition of general purpose computer components alone to perform such steps is not sufficient to transform a judicial exception into a patentable invention. The computer components are recited at a high level of generality and perform the basic functions of a computer (in this case, performing a mathematical operation and receiving and storing data) that would be needed to apply the abstract idea via computer. Merely using generic computer components to perform the above identified basic computer functions to practice or apply the judicial exception does not constitute a meaningful limitation that would amount to significantly more than the judicial exception, even though such operations could be performed faster than without a computer.
The claim also recites the additional steps of comparing the blue noise mask to a gray scale image to transform the gray scale image to a binary image array and converting the binary image array into a halftoned image. These additional steps tie the mathematical operation (the blue noise mask) to the processor’s ability to process digital images. These steps add meaningful limitations to the abstract idea of generating the blue noise mask and therefore add significantly more to the abstract idea than mere computer implementation.
Example 4: Global Positioning System
See SiRF Technology Inc. v. International Trade Commission, 601 F.3d 1319 (Fed. Cir. 2010)
Claim 1. A system for calculating an absolute position of a GPS receiver and an absolute time of reception of satellite signals comprising:
a mobile device comprising a GPS receiver, a display, a microprocessor and a wireless communication transceiver coupled to the GPS receiver, the mobile device programmed to receive PN codes sent by a plurality of GPS satellites, calculate pseudo-ranges to the plurality of GPS satellites by averaging the received PN codes, and transmit the pseudo-ranges, and
a server comprising a central processing unit, a memory, a clock, and a server communication transceiver that receives pseudo-ranges from the wireless communication transceiver of the mobile device, the memory having location data stored therein for a plurality of wireless towers, and the central processing unit programmed to:
estimate a position of the GPS receiver based on location data for a wireless tower from the memory and time data from the clock,
calculate absolute time that the signals were sent from the GPS satellites using the pseudo-ranges from the mobile device and the position estimate,
create a mathematical model to calculate absolute position of the GPS receiver based on the pseudo-ranges and calculated absolute time,
calculate the absolute position of the GPS receiver using the mathematical model, and
transmit the absolute position of the GPS receiver to the mobile device, via the server communication transceiver, for visual representation on the display.
Claim 1 is patent eligible.
Step 1, Yes. Claim 1 is directed to a mobile device, a machine.
Step 2A, Yes. Because mathematical operations are recited in the claim, the claim is directed to a judicial exception.
Step 2B, Yes. The claim recites using a central processing unit (CPU) for performing the mathematical operations of estimating position, calculating absolute time, and calculating absolute position using a mathematical model. The claim also recites using location data stored in a memory, and time data from a clock. These computer components are recited at a high level of generality and add no more to the claimed invention than the components that perform basic mathematical calculation functions routinely provided by a general purpose computer. Limiting performance of the mathematical calculations to a general purpose CPU, absent more, is not sufficient to transform the recited judicial exception into a patent-eligible invention. However, the claim is further limited to a mobile device comprising a GPS receiver, microprocessor, wireless communication transceiver and a display that receives satellite data, calculates pseudo-ranges, wirelessly transmits the calculated pseudo-ranges to the server, receives location data from the server, and displays a visual representation of the received calculated absolute position from the server. All of these features, especially when viewed in combination, amount to significantly more than the judicial exception.
Ineligible Claims
Example 5: Digital Image ProcessingThe following claim was found ineligible by the Federal Circuit in Digitech Image Tech., LLC v. Electronics for Imaging, Inc., 758 F.3d 1344 (Fed. Cir. 2014).
Claim 10 is patent ineligible.
Claim 10. A method of generating a device profile that describes properties of a device in a digital image reproduction system for capturing, transforming or rendering an image, said method comprising:
generating first data for describing a device dependent transformation of color information content of the image to a device independent color space through use of measured chromatic stimuli and device response characteristic functions;
generating second data for describing a device dependent transformation of spatial information content of the image in said device independent color space through use of spatial stimuli and device response characteristic functions; and
combining said first and second data into the device profile.
Claim 10 is patent ineligible.
Step 1, Yes. Claim 1 is directed to a series of acts, a process.
Step 2A, Yes. The gathering and combining merely employs mathematical relationships to manipulate existing information to generate additional information in the form of a ‘device profile,’ without limit to any use of the device profile. This is similar to the basic concept of manipulating information using mathematical relationships.
Step 2B, No. The claim does not include additional elements beyond the abstract idea of gathering and combining data.
Example 6: The Game of Bingo
The following claim was found ineligible by the Federal Circuit in Planet Bingo, LLC v. VKGS LLC, 576 Fed. Appx. 1005 (Fed. Cir. 2014).
Claim 1. A system for managing a game of Bingo which comprises:
(a) a computer with a central processing unit (CPU) and with a memory and with a printer connected to the CPU;
(b) an input and output terminal connected to the CPU and memory of the computer; and
(c) a program in the computer enabling:
(i) input of at least two sets of Bingo numbers which are preselected by a player to be played in at least one selected game of Bingo in a future period of time;
(ii) storage of the sets of Bingo numbers which are preselected by the player as a group in the memory of the computer;
(iii) assignment by the computer of a player identifier unique to the player for the group having the sets of Bingo numbers which are preselected by the player wherein the player identifier is assigned to the group for multiple sessions of Bingo;
(iv) retrieval of the group using the player identifier;
(v) selection from the group by the player of at least one of the sets of Bingo numbers preselected by the player and stored in the memory of the computer as the group for play in a selected game of Bingo in a specific session of Bingo wherein a number of sets of Bingo numbers selected for play in the selected game of Bingo is less than a total number of sets of Bingo numbers in the group;
(vi) addition by the computer of a control number for each set of Bingo numbers selected for play in the selected game of Bingo;
(vii) output of a receipt with the control number, the set of Bingo numbers which is preselected and selected by the player, a price for the set of Bingo numbers which is preselected, a date of the game of Bingo and optionally a computer identification number; and
(viii) output for verification of a winning set of Bingo numbers by means of the control number which is input into the computer by a manager of the game of Bingo.
Claim 1 is patent ineligible.
Step 1, Yes. Claim 1 is directed to a system, a machine.
Step 2A, Yes. Claim 1 describes managing the game of Bingo and therefore is directed to an abstract idea.
Step 2B, No. The recitation of the computer limitations amounts to mere instructions to implement the abstract idea on a computer. Taking the additional elements individually and in combination, the computer components at each step of the management process perform purely generic computer functions. As such, there is no inventive concept sufficient to transform the claimed subject matter into a patent-eligible application.
Example 7. E-Commerce providing Transaction Performance Guaranty
The following claim was found ineligible by the Federal Circuit in buySAFE, Inc. v. Google, Inc., 765 F.3d 1350 (Fed. Cir. 2014).
Claim 1. A method, comprising:
receiving, by at least one computer application program running on a computer of a safe transaction service provider, a request from a first party for obtaining a transaction performance guaranty service with respect to an online commercial transaction following closing of the online commercial transaction;
processing, by at least one computer application program running on the safe transaction service provider computer, the request by underwriting the first party in order to provide the transaction performance guaranty service to the first party,
wherein the computer of the safe transaction service provider offers, via a computer network, the transaction performance guaranty service that binds a transaction performance guaranty to the online commercial transaction involving the first party to guarantee the performance of the first party following closing of the online commercial transaction.
Claim 1 is patent ineligible.
Step 1, Yes. Claim 1 is directed to a series of steps, a process.
Step 2A, Yes. Claim 1 is directed to creation of a commercial arrangement involving contractual relations similar to the fundamental economic practices found by the courts to be abstract ideas (e.g., hedging in Bilski).
Step
2B, No. The claim amounts to no more than stating create a contract on a computer and send it over a network. These generic computing elements alone do not amount to significantly more than the judicial exception.
Example 8. Distribution of Products over the Internet
The following claim was found ineligible by the Federal Circuit in Ultramercial v. Hulu and WildTangent, 2014 U.S. App. LEXIS 21633 (Fed. Cir. 2014).
1. A method for distribution of products over the Internet via a facilitator, said method comprising the steps of:
a first step of receiving, from a content provider, media products that are covered by intellectual property rights protection and are available for purchase, wherein each said media product being comprised of at least one of text data, music data, and video data;
a second step of selecting a sponsor message to be associated with the media product, said sponsor message being selected from a plurality of sponsor messages, said second step including accessing an activity log to verify that the total number of times which the sponsor message has been previously presented is less than the number of transaction cycles contracted by the sponsor of the sponsor message;
a third step of providing the media product for sale at an Internet website;
a fourth step of restricting general public access to said media product;
a fifth step of offering to a consumer access to the media product without charge to the consumer on the precondition that the consumer views the sponsor message;
a sixth step of receiving from the consumer a request to view the sponsor message, wherein the consumer submits said request in response to being offered access to the media product;
a seventh step of, in response to receiving the request from the consumer, facilitating the display of a sponsor message to the consumer;
an eighth step of, if the sponsor message is not an interactive message, allowing said consumer access to said media product after said step of facilitating the display of said sponsor message;
a ninth step of, if the sponsor message is an interactive message, presenting at least one query to the consumer and allowing said consumer access to said media product after receiving a response to said at least one query;
a tenth step of recording the transaction event to the activity log, said tenth step including updating the total number of times the sponsor message has been presented; and
an eleventh step of receiving payment from the sponsor of the sponsor message displayed.
Claim 1 is patent ineligible.
Step 1, Yes. Claim 1 is directed to a series of steps, a process.
Step
2A, Yes. Claim 1 is directed to the concept of using advertising as an exchange or currency. This concept is similar to the concepts involving human activity relating to commercial practices (e.g., hedging in Bilski) that have been found by the courts to be abstract ideas.
Step
2B, No. The accessing and updating of an activity log are used only for data gathering and, as such, only represent insignificant pre-solution activity. Similarly, requiring a consumer request and restricting public access is insignificant pre-solution activity because such activity is necessary and routine in implementing the concept of using advertising as an exchange or currency. Furthermore, the Internet limitations do not add significantly more because they are simply an attempt to limit the abstract idea to a particular technological environment.