Mantissa Corporation v. FiServ Solutions, LLC

CourtDistrict Court, N.D. Illinois
DecidedJuly 5, 2022
Docket1:19-cv-03204
StatusUnknown

This text of Mantissa Corporation v. FiServ Solutions, LLC (Mantissa Corporation v. FiServ Solutions, LLC) is published on Counsel Stack Legal Research, covering District Court, N.D. Illinois primary law. Counsel Stack provides free access to over 12 million legal documents including statutes, case law, regulations, and constitutions.

Bluebook
Mantissa Corporation v. FiServ Solutions, LLC, (N.D. Ill. 2022).

Opinion

UNITED STATES DISTRICT COURT FOR THE NORTHERN DISTRICT OF ILLINOIS EASTERN DIVISION

MANTISSA CORPORATION, ) ) Plaintiff, ) 19 C 3204 ) vs. ) Judge Gary Feinerman ) FISERV SOLUTIONS, LLC, and FISERV, INC., ) ) Defendants. )

MEMORANDUM OPINION AND ORDER Mantissa Corporation brought this suit against FiServ Solutions, LLC, and Fiserv, Inc. (together, “Fiserv”), alleging infringement of U.S. Patent No. 9,361,658 (“’658 Patent”). Doc. 21. Consistent with Local Patent Rule 4.1(b), the parties selected six disputed claim terms and briefed the disputes under Local Patent Rule 4.2. Docs. 41, 44, 46, 48-49. (The parties agreed to be bound by the court’s construction in a related case, Mantissa Corp. v. First Financial Corp., 17 C 9174 (N.D. Ill.), of two other disputed terms in the ’658 Patent. Doc. 41.) The parties then presented argument based on their briefs and supporting documentary evidence without introducing any testimony. Doc. 63; see N.D. Ill. L.P.R. 4.3. Having considered the parties’ submissions, the court construes the disputed terms. Background A. The ’658 Patent The ’658 Patent, titled “System and Method for Enhanced Protection and Control Over the Use of Identity,” describes a method that allows users to protect their identity by placing conditions on financial transactions—which must be satisfied for the transaction to proceed— without exposing sensitive identification information to third parties. Doc. 45-1. Mantissa alleges that Fiserv’s software application CardValet, a “debit and credit card fraud mitigation and management system that enables cardholders to control when, where and how their debit and credit cards are used,” infringes the ’658 Patent. Doc. 21 at ¶¶ 22-38. Specifically, Mantissa alleges that CardValet infringes nine of the Patent’s claims, three independent (1, 7, and 13) and six dependent (3, 8, 10, 11, 12, and 15). Id. at ¶ 26; Doc. 46 at 6; see Alcon Research, Ltd. v.

Apotex Inc., 687 F.3d 1362, 1367 (Fed. Cir. 2012) (“It is axiomatic that a dependent claim cannot be broader than the [independent] claim from which it depends.”) (citing 35 U.S.C. § 112). The nine claims, with the disputed terms in bold, read as follows: Table 1. Independent Claims Claim Text 1 A method for a service provider to control use of an entity’s financial account to facilitate transactions, comprising:

setting scope of use, defined by the entity via a network, for the financial account, including at least: (a) the financial account to either OFF or ON; (b) for a plurality of individual categories, whether each category is authorized or unauthorized for transactions using the financial account, each category representing a different type of transaction partner; and (c) a geographical scope reflecting a geographic area in which transactions are authorized;

receiving, via a network from a source other than the entity, an inquiry regarding a proposed transaction that would use the financial account;

determining, relative to the scope of use, whether the financial account may or may not be used for the proposed transaction, comprising: denying when the financial account is OFF; denying when the financial account is ON and the proposed transaction falls within a category that is unauthorized; denying when the financial account is ON, the proposed transaction falls within a category that is authorized and when a location of the proposed transaction is outside of the geographical area; permitting when (a) the financial account is ON, (b) the proposed transaction falls within a category that is authorized, (c) a location of the proposed transaction is inside the geographical area, and (d) the proposed transaction is not otherwise impermissible; and responding to the inquiry by providing, via a network to the source, first information based on the result of the determining.

7 A method for a service provider to control use of an entity’s financial account to facilitate transactions, the method being executed on electronic computer hardware in combination with software, the method comprising:

setting scope of use, as defined by the entity via a network, for the financial account, including at least: (a) setting a state status of the financial account to either an OFF or ON state; (b) setting a category status for each category of a plurality of categories as either authorized or unauthorized for transactions using the financial account, each category representing a type of transaction partner; and (c) setting a distance from the entity, where the entity’s financial account can be used within said distance;

receiving, via a network from a source other than the entity, an inquiry regarding a proposed transaction on the financial account;

determining, relative to the scope of use, a response status to the inquiry reflecting whether the financial account may or may not be used for the proposed transaction, comprising: setting the response status to impermissible when the state status for the financial account is OFF; setting the response status to impermissible when the state status for the financial account is ON and the proposed transaction falls within a category having an unauthorized category status; setting the response status to impermissible when the state status for the financial account is ON, the proposed transaction falls within a category having an authorized category status and the distance from the entity where the entity’s financial account can be used is outside said distance; setting the response status to permissible when (a) the state status of the financial account is ON, (b) the proposed transaction falls within a category having an authorized category status, (c) the distance from the entity where the entity’s financial account can be used is within said distance, and (d) the proposed transaction is not otherwise impermissible; and

responding to the inquiry by providing, via a network to the source, first information based on the response status of the determining.

13 A method of protecting use of an entity’s financial account, the method being executed on electronic computer hardware in combination with software, the method comprising:

storing data representing: first identification information of an entity; and at least one criteria previously defined by the entity for allowing and/or limiting the use of the financial account, the at least one criteria defining at least one non-monetary circumstance under which the financial account can be used;

receiving, via a network from a source other than the entity, a request to determine whether a proposed use of the entity’s financial account by a party at a location is allowable, the request including second identification information;

comparing at least some of the first identification information with at least some of the second identification information;

determining whether the proposed use of the entity’s financial account by the party at the location is authorized for the proposed use, comprising: determining whether the entity’s financial account is in an entity established ON or OFF state; determining whether or not the at least one criteria blocks the proposed use, with the at least one criteria blocks comprising at least one of: a geographical limitation on where the financial account can be used; and a distance from the entity within which the financial account can be used; and

responding to the request by providing, via a network to the source, response information based on the result of said determining.

Doc. 45-1 at 17-18. Table 2.

Free access — add to your briefcase to read the full text and ask questions with AI

Related

Montana v. United States
440 U.S. 147 (Supreme Court, 1979)
Firishchak v. Holder
636 F.3d 305 (Seventh Circuit, 2011)
Paragon Solutions, LLC v. Timex Corp.
566 F.3d 1075 (Federal Circuit, 2009)
Praxair, Inc. v. Atmi, Inc.
543 F.3d 1306 (Federal Circuit, 2008)
Haberman v. Gerber Products Company
236 F. App'x 592 (Federal Circuit, 2007)
Aspex Eyewear, Inc. v. Marchon Eyewear, Inc.
672 F.3d 1335 (Federal Circuit, 2012)
Alcon Research, Ltd. v. Apotex Inc.
687 F.3d 1362 (Federal Circuit, 2012)

Cite This Page — Counsel Stack

Bluebook (online)
Mantissa Corporation v. FiServ Solutions, LLC, Counsel Stack Legal Research, https://law.counselstack.com/opinion/mantissa-corporation-v-fiserv-solutions-llc-ilnd-2022.