Management Science Associates, Inc. v. Datavant, Inc.

CourtDistrict Court, D. Delaware
DecidedDecember 30, 2020
Docket1:20-cv-00502
StatusUnknown

This text of Management Science Associates, Inc. v. Datavant, Inc. (Management Science Associates, Inc. v. Datavant, Inc.) is published on Counsel Stack Legal Research, covering District Court, D. Delaware primary law. Counsel Stack provides free access to over 12 million legal documents including statutes, case law, regulations, and constitutions.

Bluebook
Management Science Associates, Inc. v. Datavant, Inc., (D. Del. 2020).

Opinion

IN THE UNITED STATES DISTRICT COURT FOR THE DISTRICT OF DELAWARE MANAGEMENT SCIENCE ASSOCIATES, INC.,

Plaintiff, Civil Action No. 20-0502-CFC V. DATAVANT, INC. and UNIVERSAL PATIENT KEY, INC.,

Defendant.

Neal C. Belgam, Eve H. Ormerod, SMITH, KATZENSTEIN, & JENKINS LLP, Wilmington, Delaware; James J. Bosco, Jr., Christian D. Ehret, THE WEBB LAW FIRM, Pittsburgh, Pennsylvania; Michael P. Flynn, DICKIE, MCCAMEY & CHILCOTE, P.C., Pittsburgh, Pennsylvania Counsel for Plaintiff Jack B. Blumenfeld, MORRIS, NICHOLS, ARSHT & TUNNELL LLP, Wilmington, Delaware; Andrew S. Ong, GOODWIN PROCTER LLP, Redwood City, California; Brett M. Schuman, GOODWIN PROCTER LLP, San Francisco, California; Christie Larochelle, GOODWIN PROCTER LLP, Boston, Massachusetts Counsel for Defendant

MEMORANDUM OPINION

December 30, 2020 Wilmington, Delaware

Ch. G: Z2. LY. 2 COLM F. CONNOLLY UNITED STATES DISTRICT JUDGE Plaintiff Management Science Associates, Inc. (MSA) has sued Defendants Datavant, Inc. and Universal Patient Key, Inc. (UPK) for infringement of U.S. Patent No. 9,614,814 (the #814 patent). D.I. 1. Pending before me is Defendants’ motion to dismiss pursuant to Federal Rule of Civil Procedure 12(b)(6). D.I. 10. Defendants argue I should dismiss MSA’s complaint because the asserted patent is invalid under 35 U.S.C. § 101 for failing to claim patentable subject matter. I. Background MSA is a provider of de-identification technology for removing personally identifiable information from data. D.I. 17. Datavant and UPK are healthcare data management companies. D.I. 1 {§ 21-22. MSA has alleged that Defendants sell de-identification software that infringes the #814 patent. D.I. 1 J] 40-45. The asserted patent is titled “System and Method for Cascading Token Generation and Data De-identification.” It claims systems and methods for de- identifying client records. The patent describes approaches for creating unique tokens that can be substituted for personally identifying information. The parties agree the claim element that separates the #814 patent from the prior art is the use of a “client tag,” a unique identifier for each client, as one of the inputs in the creation of a token. DI. 1 at § 38; D.I. 15 at 1, 9; D.I. 16 at 1; see also D.I. 11-1,

Ex. C at 7-8 (allowing application based on the “client tag” element). The “client tag” may be as simple as the client’s name. #814 patent at 6:41-43. A “client tag” identifies the client who provided the record, enabling records from different clients to be distinguished even if those records are otherwise the same, as could

occur, for example, if different clients provided records about the same patient. #814 patent at 6:34-37. The #814 patent’s written description explains how de-identified tokens can be created. Much of this information is more pertinent to related U.S. Patent No. 9,292,707, which shares the same written description as the #814 patent, but it still provides context for the #814 claims. The written description explains that “[flor decades, data including personally-identified information has been de-identified through the creation of tokens that uniquely identify an individual.” #814 patent at 1:21-23. One method of creating a token is hashing, where a mathematical function is used to convert arbitrary data (such as a password or personally identifying information) into data of a particular size. The hashing function is unidirectional, meaning that the original data cannot be recovered from the output, even if the hashing function is known. The #814 patent describes how a unique de-identified token can be created from multiple data elements (e.g. name, date of birth, and zip code of a patient in a database rather than name alone), and that a unique “client tag” identifying the client may be among the data elements. #814

patent at 4:5-10, 6:41-43. One embodiment of the invention describes using a hash function to create an intermediary token before combining that intermediary token with another data element and applying a second hash function to generate a final token. #814 patent at 1:49-65. This process can be repeated multiple times. The #814 patent has three independent claims. Claim 1 describes a “computer implemented method for de-identifying records,” claim 10 describes a “computer program product for de-identifying records,” and claim 19 describes a “system for de-identifying records.” #814 patent at claim 1 (9:63-64), claim 10 (10:60-61), claim 19 (12:14). The remaining seventeen claims in the #814 patent are dependent claims. The Complaint alleges Defendants infringe “at least claims 1, 10, and 19” (the independent claims). D.I. 1.949. Defendants argue that claim 1 is representative. D.I. 11 at 5. Claim 1 recites: [a] computer-implemented method for de-identifying records received from a plurality of clients, each of the plurality of clients associated with a client tag unique to the client and a plurality of records including identifying data for a plurality of individuals, comprising: receiving a record for an individual from at least one data storage device associated with a client, the record comprising a plurality of data elements identifying the individual; generating, with at least one processor, a token based at least partially on the plurality of data elements and a client tag uniquely identifying the client among the plurality of clients;

creating, with at least one processor, a de-identified record comprising a portion of the record and the token; matching, with at least one processor, the token or a new token based on the token to at least one other token in a database, the at least one other token generated based on the client tag and associated with at least one other de-identified record for the individual; and

linking, with at least one processor, the de-identified record to the at least one other de-identified record in at least one data storage device. Claim 10 recites: [a] computer program product for de-identifying records received from a plurality of clients, each of the plurality of clients associated with a client tag unique to the client and a plurality of records including identifying data for a plurality of individuals, comprising at least one non-transitory computer-readable medium comprising program instructions that, when executed by at least one processor, cause the at least one processor to: receive a record for an individual from at least one data storage device associated with a client, the record comprising a plurality of data elements identifying an individual; generate a token based at least partially on the plurality of data elements and a client tag uniquely identifying the client among the plurality of clients; create a de-identified record comprising a portion of the record and the token; match the token or a new token based on the token to at least one other token in a database, the at least one other token generated based on the client tag and associated with at least one other de-identified record for the individual; and link the de-identified record to the at least one other de-identified record in at least one data storage device.

Free access — add to your briefcase to read the full text and ask questions with AI

Related

Gottschalk v. Benson
409 U.S. 63 (Supreme Court, 1972)
Parker v. Flook
437 U.S. 584 (Supreme Court, 1978)
Bell Atlantic Corp. v. Twombly
550 U.S. 544 (Supreme Court, 2007)
Ashcroft v. Iqbal
556 U.S. 662 (Supreme Court, 2009)
Microsoft Corp. v. i4i Ltd. Partnership
131 S. Ct. 2238 (Supreme Court, 2011)
CyberSource Corp. v. Retail Decisions, Inc.
654 F.3d 1366 (Federal Circuit, 2011)
Belkin International, Inc. v. Kappos
696 F.3d 1379 (Federal Circuit, 2012)
Umland v. PLANCO Financial Services, Inc.
542 F.3d 59 (Third Circuit, 2008)
Alan Schmidt v. John Skolas
770 F.3d 241 (Third Circuit, 2014)
Ultramercial, Inc. v. Hulu, LLC
772 F.3d 709 (Federal Circuit, 2014)
Ddr Holdings, LLC v. hotels.com, L.P.
773 F.3d 1245 (Federal Circuit, 2014)
Internet Patents Corporation v. Active Network, Inc.
790 F.3d 1343 (Federal Circuit, 2015)
Enfish, LLC v. Microsoft Corporation
822 F.3d 1327 (Federal Circuit, 2016)
Electric Power Group, LLC v. Alstom S.A.
830 F.3d 1350 (Federal Circuit, 2016)
McRO, Inc. v. Bandai Namco Games America Inc.
837 F.3d 1299 (Federal Circuit, 2016)
Thales Visionix Inc. v. United States
850 F.3d 1343 (Federal Circuit, 2017)

Cite This Page — Counsel Stack

Bluebook (online)
Management Science Associates, Inc. v. Datavant, Inc., Counsel Stack Legal Research, https://law.counselstack.com/opinion/management-science-associates-inc-v-datavant-inc-ded-2020.