Smart Authentication IP, LLC v. Electronic Arts Inc.

CourtDistrict Court, N.D. California
DecidedSeptember 11, 2019
Docket3:19-cv-01994
StatusUnknown

This text of Smart Authentication IP, LLC v. Electronic Arts Inc. (Smart Authentication IP, LLC v. Electronic Arts Inc.) is published on Counsel Stack Legal Research, covering District Court, N.D. California primary law. Counsel Stack provides free access to over 12 million legal documents including statutes, case law, regulations, and constitutions.

Bluebook
Smart Authentication IP, LLC v. Electronic Arts Inc., (N.D. Cal. 2019).

Opinion

1 2 3 4 5 6 UNITED STATES DISTRICT COURT 7 NORTHERN DISTRICT OF CALIFORNIA 8 9 SMART AUTHENTICATION IP, LLC, Case No. 19-cv-01994-SI

10 Plaintiff, ORDER GRANTING DEFENDANT’S 11 v. MOTION TO DISMISS

12 ELECTRONIC ARTS INC., Re: Dkt. No. 21 13 Defendant.

14 15 Before the Court is a motion to dismiss brought by defendant Electronic Arts Inc. (“EA”), 16 which seeks a finding that U.S. Patent No. 8,082,213 (the “‘213 patent”) is invalid and patent- 17 ineligible under 35 U.S.C. § 101. Dkt. No. 21 (Motion to Dismiss). This matter came on for hearing 18 on August 9, 2019. Having read the papers and heard the parties’ arguments the Court hereby 19 GRANTS defendant’s motion, finding the ‘213 patent invalid under § 101 and dismisses the 20 complaint with prejudice. 21 22 BACKGROUND 23 On December 20, 2011, the ‘213 patent, entitled “Method and System for Personalized 24 Online Security,” was duly and lawfully issued by the U.S. Patent and Trademark Office. Compl. 25 ¶ 7. Plaintiff, Smart Authentication, is the assignee and owner of the right, title and interest in and 26 to the ‘213 patent. Compl. ¶ 8. The inventions of the ‘213 patent generally relate to methods and 27 systems for multi-factor authentication of users over multiple communications media. Compl. ¶ 9. Various embodiments of the present invention provide strong authentication of users 1 on behalf of commercial entities and other parties to electronic transactions. In these embodiments of the present invention, a user interacts with an authentication service 2 provider [“ASP”] to establish policies for subsequent authentication of the user. Thus, in these embodiments of the present invention, a user controls the level and 3 complexity of authentication processes carried out by the authentication service provider on behalf of both the user and commercial entities and other entities seeking 4 to authenticate the user in the course of conducting electronic transactions, electronic dialogues, and other interactions for which user authentication is needed. The 5 policies specified by a user may include specification of variable-factor authentication, in which the user, during the course of an authentication, provides 6 both secret information as well as evidence of control of a tangible object. 7 Dkt. No. 25-2 at 16 (‘213 Patent).! Figure 3 of the ‘213 patent provides a helpful illustration of 8 || one of the patent’s potential uses. Specifically, it models an interaction between a user, an ASP 9 client, and an ASP. /d. at 5. 10 11 12 ASP 310 308 L& 13 authorization request

@ 314 © 15 @ return 5 authentication ate A 16 ASP-client result

17 og. 306 @) authentication

18 ' ©. © completion . ransac fon status initialization 19 316 20 304 21 22 23 302 24 29 Figure 3 26 27 28 ' For ease of reference, page citations to docket entries will refer to the ECF assigned page number in the upper right hand corner of each page.

1 The ‘213 patent contemplates a user trying to login to the user’s account on a website, for 2 example. In order to strengthen the security of the user’s login credentials and protect the user’s 3 information, the user could be prompted to select an alternative form of authorization confirmation. 4 The user could select to confirm her authorization via a secondary medium, including, but not 5 limited to, a text message on her cell phone or an email. The secondary authenticating medium 6 would occur outside the purview of the initial login credentials. This second form of authentication 7 confirms the user’s identity. 8 Prior to filing the instant action, Smart Authentication was engaged in proceedings before 9 the Patent Trial and Appeal Board. Claim 11 emerged as the sole remaining claim following an 10 inter partes review (IPR). Dkt. No. 21 at 10, Footnote 2 (Motion to Dismiss); see also Dkt. Nos. 11 25-3 and 25-4 (Decision on Appeal and Final Written Decision, respectively, attached to the Shekhar 12 Vyas Declaration in Support of Opposition). Claim 11 is dependent upon claims 1, 9, and 10 (all of 13 which were invalidated in the IPR). The relevant claims read: 14 1. A user-authentication service implemented as routines that execute one or more computer systems interconnected by two or more communications media with both 15 an authentication-service client, and a user, the user-authentication service comprising: 16 the one or more computer systems; 17 stored user-authentication policies specified by the user; 18 stored user information; 19 account interface routines that implement an account interface by which the user 20 specifies, modifies, adds, and deletes user-authentication policies; and 21 authentication-interface routines that implement an authentication interface by which, following initiation of a transaction by the user with the authentication service 22 client, the authentication-service client submits an authentication request, through the first communications medium or through a second communications medium, to 23 authenticate the user, the authentication interface routines employing a variable- factor authentication, when specified to do so by stored user-authentication policies, 24 to authenticate the user on behalf of the authentication-service client during which the user communicates with the user-authentication service through a third 25 communications medium different from the first and second communications media and a user device different from that employed by the user to initiate the transaction 26 with the authentication-service client. 27 9. The user-authentication service of claim 1 wherein a user-authentication policy authentication processes carried out by the user-authentication service on behalf of 1 one or more, specified authentication-service clients. 2 10. The user-authentication service of claim 9 wherein constraints include one or more of: 3 geographical constraints; 4 time-of-day constraints; 5 date constraints; 6 communications -medium-related constraints; 7 user-authentication service actions; and 8 event constraints. 9 11. The user-authentication service of claim 10 wherein user-authentication service 10 actions include one or more of: 11 halting authorization service after detecting a specified event; 12 employing particular types of user-authentication procedures; and 13 providing alerts upon detecting specified events. 14 Dkt. No. 25-2 at 16-17 (‘213 Patent). 15 Plaintiff’s complaint, filed in April 2019, alleges a single cause of action for direct 16 infringement against defendant EA. Specifically, plaintiff alleges: 17 Without license or authorization and in violation of 35 U.S.C. § 271(a), Defendant is liable for infringement of claim 11 of the ‘213 patent by making, using, importing, 18 offering for sale, selling and/or hosting a method for authenticating a user that requires two-factor authentication, including, but not limited to Login Verification, 19 because each and every element is met either literally or equivalently. 20 Compl. ¶ 16. 21 22 LEGAL STANDARD 23 I. Motion to Dismiss 24 Under Federal Rule of Civil Procedure 12(b)(6), a district court must dismiss a complaint if 25 it fails to state a claim upon which relief can be granted. To survive a Rule 12(b)(6) motion to 26 dismiss, the plaintiff must allege “enough facts to state a claim to relief that is plausible on its face.” 27 Bell Atl. Corp. v. Twombly, 550 U.S. 544, 570 (2007). This “facial plausibility” standard requires 1 unlawfully.” Ashcroft v. Iqbal, 556 U.S. 662

Free access — add to your briefcase to read the full text and ask questions with AI

Related

Gottschalk v. Benson
409 U.S. 63 (Supreme Court, 1972)
Diamond v. Diehr
450 U.S. 175 (Supreme Court, 1981)
Bell Atlantic Corp. v. Twombly
550 U.S. 544 (Supreme Court, 2007)
Ashcroft v. Iqbal
556 U.S. 662 (Supreme Court, 2009)
In Re Gilead Sciences Securities Litigation
536 F.3d 1049 (Ninth Circuit, 2008)
Genetic Technologies Limited v. Merial L.L.C.
818 F.3d 1369 (Federal Circuit, 2016)
Enfish, LLC v. Microsoft Corporation
822 F.3d 1327 (Federal Circuit, 2016)
Affinity Labs of Texas, LLC v. Directv, LLC
838 F.3d 1253 (Federal Circuit, 2016)
Trading Technologies International, Inc. v. CQG, Inc.
675 F. App'x 1001 (Federal Circuit, 2017)
Wenjie Zheng v. Sessions
696 F. App'x 23 (Second Circuit, 2017)
Berkheimer v. Hp Inc.
881 F.3d 1360 (Federal Circuit, 2018)
Bilski v. Kappos
177 L. Ed. 2d 792 (Supreme Court, 2010)
Broadband ITV, Inc. v. Oceanic Time Warner Cable, LLC
135 F. Supp. 3d 1175 (D. Hawaii, 2015)
Uniloc U.S. Inc. v. LG Elecs. USA Inc.
379 F. Supp. 3d 974 (N.D. California, 2019)
OIP Technologies, Inc. v. Amazon.com, Inc.
788 F.3d 1359 (Federal Circuit, 2015)

Cite This Page — Counsel Stack

Bluebook (online)
Smart Authentication IP, LLC v. Electronic Arts Inc., Counsel Stack Legal Research, https://law.counselstack.com/opinion/smart-authentication-ip-llc-v-electronic-arts-inc-cand-2019.