1:17-cv-00911
Blackbird Tech LLC v. Capital One Financial Corp
I. Executive Summary and Procedural Information
- Parties & Counsel:- Plaintiff: Blackbird Tech LLC d/b/a Blackbird Technologies (Delaware)
- Defendant: Capital One Financial Corporation (Delaware)
- Plaintiff’s Counsel: Stamoulis & Weinblatt LLC
 
- Case Identification: 1:17-cv-00911, D. Del., 07/06/2017
- Venue Allegations: Venue is alleged to be proper in the District of Delaware because Defendant is a Delaware corporation, has committed alleged acts of infringement in the district, and maintains a regular and established place of business there.
- Core Dispute: Plaintiff alleges that Defendant’s "Fraud Alerts" service for credit card transactions infringes three patents related to methods for securely authorizing transactions when a payment card is not physically present.
- Technical Context: The technology addresses the security vulnerabilities inherent in "card-not-present" transactions, such as those conducted online or over the phone, which became a significant challenge with the growth of e-commerce.
- Key Procedural History: The three patents-in-suit constitute a patent family, with U.S. Patent No. 8,285,832 being a continuation of the application that issued as U.S. Patent No. 7,958,214, and U.S. Patent No. 9,424,848 being a continuation of the application that issued as U.S. Patent No. 8,285,832. This relationship suggests a consistent underlying technology and may be relevant to claim construction across the patents.
Case Timeline
| Date | Event | 
|---|---|
| 2000-06-09 | '214, '832, & '848 Patent Priority Date | 
| 2011-06-07 | U.S. Patent No. 7,958,214 Issued | 
| 2012-10-09 | U.S. Patent No. 8,285,832 Issued | 
| 2016-08-23 | U.S. Patent No. 9,424,848 Issued | 
| 2017-07-06 | Complaint Filing Date | 
II. Technology and Patent(s)-in-Suit Analysis
U.S. Patent No. 7,958,214 - “Method for Secure Transactions Utilizing Physically Separated Computers,” Issued June 7, 2011
The Invention Explained
- Problem Addressed: The patent’s background section identifies the risk of fraud in "card not present" transactions, where a seller cannot physically verify a credit card or the identity of the person using it, creating opportunities for criminals to use stolen credentials (ʼ214 Patent, col. 1:20-34).
- The Patented Solution: The invention proposes a method to verify transactions using a separate, "out-of-band" communication channel. When a purchase is made, a request for verification is sent to a pre-established, electronically accessible "verification site" (such as an email account) authorized by the cardholder. The cardholder receives this communication, which contains transaction details, and must send back an approval communication to complete the purchase (ʼ214 Patent, Abstract; col. 2:21-43). The process is illustrated in Figure 1, which shows a multi-step flow from transaction initiation to vendor notification after the customer's e-mail response is verified (ʼ214 Patent, Fig. 1).
- Technical Importance: This method introduced a "closed loop" verification system intended to improve security for online transactions by requiring active, out-of-band confirmation from the legitimate cardholder before a transaction is finalized (Compl. ¶11).
Key Claims at a Glance
- The complaint asserts at least independent claim 1 (Compl. ¶13).
- The essential elements of Claim 1 are:- Establishing an electronically accessible verification site authorized by the holder of a credit card;
- Receiving a request for goods or services by a merchant using the credit card, where the card is not physically presented;
- Accessing the verification site by the merchant to determine if the request is authorized;
- Sending an electronic authorization communication from the verification site to the cardholder with transaction information; and
- Transmitting, by the cardholder, an approval communication if the transaction is approved.
 
U.S. Patent No. 8,285,832 - “Method for Secure Transactions Utilizing Physically Separated Computers,” Issued October 9, 2012
The Invention Explained
- Problem Addressed: As a continuation, the '832 Patent addresses the same problem of securing remote, "card not present" transactions against fraudulent use of payment credentials (ʼ832 Patent, col. 1:24-38).
- The Patented Solution: The solution is functionally identical to that of the ’214 Patent: using a separate communication path and a verification site to obtain explicit authorization from the credential holder for a given transaction. The specification broadens the terminology from "credit card" to "identification credentials" (ʼ832 Patent, col. 4:38-55).
- Technical Importance: This patent extends the applicability of the core verification method beyond traditional credit cards to a wider range of digital identification and payment credentials (ʼ832 Patent, col. 4:46-51).
Key Claims at a Glance
- The complaint asserts at least independent claim 1 (Compl. ¶27).
- The essential elements of Claim 1 are:- Establishing an electronically accessible verification site authorized by the holder of a set of pre-existing identification credentials;
- Receiving a request at a merchant location via an electronic communication link using the identification credentials, without physical presentation;
- Accessing the verification site by the merchant via an electronic communication link to determine if the request is authorized;
- Sending an electronic authorization communication from the verification site to the holder of the identification credentials; and
- Transmitting, by the holder, an electronic approval communication if the transaction is approved.
 
U.S. Patent No. 9,424,848 - “Method for Secure Transactions Utilizing Physically Separated Computers,” Issued August 23, 2016
- Patent Identification: U.S. Patent No. 9,424,848, “Method for Secure Transactions Utilizing Physically Separated Computers,” Issued August 23, 2016 (Compl. ¶10).
- Technology Synopsis: This patent continues the same technological theme of out-of-band transaction verification. Its independent claim further refines the method by explicitly delineating the process into four distinct electronic network communications for the various steps: (1) the merchant receiving the request, (2) the merchant accessing the verification site, (3) the site sending the authorization request to the holder, and (4) the holder transmitting approval (ʼ848 Patent, col. 4:40-62).
- Asserted Claims: The complaint asserts at least independent claim 1 (Compl. ¶35).
- Accused Features: The accused features are Capital One's text-based and email-based Fraud Alerts services (Compl. ¶35, ¶41).
III. The Accused Instrumentality
Product Identification
The accused instrumentalities are Capital One's "Fraud Alerts" services, which operate via both text message and email (Compl. ¶13, ¶25).
Functionality and Market Context
The complaint alleges that Capital One operates fraud detection systems that monitor customer transactions. If a transaction is flagged as potentially fraudulent, the Fraud Alerts service sends a "real-time alert by email or text" to the cardholder (Compl. ¶16). This alert contains information about the transaction, and the customer can "respond instantly" to verify or reject the charge (Compl. ¶24). The complaint cites a Capital One webpage titled "Bank Securely | Interactive Fraud Alerts" (Exhibit G) to support these allegations (Compl. ¶16). A separate allegation references a "Suspicious Activity' Email Alert" (Exhibit H) for the email-based service (Compl. ¶25). This service is presented as a security feature for Capital One credit card customers.
IV. Analysis of Infringement Allegations
’214 Patent Infringement Allegations
| Claim Element (from Independent Claim 1) | Alleged Infringing Functionality | Complaint Citation | Patent Citation | 
|---|---|---|---|
| establishing an electronically accessible verification site authorized by the holder of a credit card | Capital One issues credit cards and operates communication systems for fraud alerts. Customers agree to receive messages (e.g., text messages) as part of the account terms, which allegedly constitutes authorization for the verification site (its fraud alert system). | ¶14, ¶16 | col. 3:50-51 | 
| receiving a request for goods or services by a merchant using the credit card, but wherein the card is not required to be physically presented to the merchant | Capital One customers use their credit cards for online purchases where the card is not physically presented. The merchant receives this request for goods or services. | ¶18 | col. 3:52-55 | 
| accessing the verification site by the merchant to determine whether the request for goods or services is an authorized transaction | After receiving a request, the merchant electronically forwards it to Capital One. Capital One then accesses its internal fraud detection systems to determine if the transaction is potentially fraudulent. The complaint alleges Capital One "directs or controls merchants to ‘access[] the verification site...’" | ¶19, ¶20 | col. 3:56-59 | 
| sending an electronic authorization communication by the verification site to the holder of the credit card, the message including information indicative of the transaction | If a transaction is deemed potentially fraudulent, Capital One’s system sends a text message or email to the customer asking for verification. This message includes transaction information. The complaint cites a Capital One document stating, "[w]e may contact you [the customer] via text to confirm an attempted charge" (Exhibit G). | ¶21, ¶22 | col. 3:60-63 | 
| transmitting, by the holder of the credit card, an approval communication if the transaction is approved by the card holder | The customer responds to the text or email to either verify or reject the transaction. The complaint alleges Capital One conditions transaction approval on receiving this responsive communication. | ¶23, ¶24 | col. 4:1-4 | 
’832 Patent Infringement Allegations
| Claim Element (from Independent Claim 1) | Alleged Infringing Functionality | Complaint Citation | Patent Citation | 
|---|---|---|---|
| establishing an electronically accessible verification site authorized by the holder of a set of pre-existing identification credentials | As described in Section III, Capital One's fraud alert system is alleged to be the "verification site," authorized by customers' acceptance of account terms. "Identification credentials" are the credit card details. | ¶28 | col. 4:35-39 | 
| receiving at a merchant location, via an electronic communication link, a request for goods from, or services by, a merchant using the identification credentials... | Merchants receive requests for online purchases from customers using Capital One card details. | ¶29 | col. 4:40-44 | 
| accessing the verification site by the merchant, via an electronic communication link, to determine whether the request for goods or services is an authorized transaction | The complaint realleges that the merchant forwards the transaction request to Capital One, which then accesses its fraud systems. This is again framed as the merchant accessing the site under Capital One's direction or control. | ¶30 | col. 4:45-49 | 
| sending an electronic authorization communication from the verification site to the holder of the identification credentials... | Capital One's fraud alert system sends a text or email to the cardholder with transaction details. | ¶31 | col. 4:50-53 | 
| transmitting, by the holder of the identification credentials, an electronic approval communication if the transaction is approved... | The cardholder replies to the alert to approve or deny the transaction. | ¶32 | col. 4:54-58 | 
Identified Points of Contention
- Scope Questions: A primary issue may be whether Capital One's internal fraud-detection and communication system qualifies as a "verification site" as contemplated by the patents, which describe the site as an "e-mail account" in a preferred embodiment (ʼ214 Patent, col. 2:54). Another question is whether the claim limitation "accessing the verification site by the merchant" can be met when the merchant forwards a request to the card issuer (Capital One), and it is the issuer that accesses its own internal system. The complaint’s theory appears to rely on principles of agency or control (Compl. ¶19, ¶30).
- Technical Questions: A factual question will be whether a customer's general agreement to receive account-related communications (Compl. ¶15) constitutes "authorizing" a "verification site" in the specific manner required by the claims. Further, for the ’848 Patent, it raises the evidentiary question of whether the accused system actually uses four distinct and separable electronic network communications as recited in claim 1.
V. Key Claim Terms for Construction
"verification site"
- Context and Importance: This term is the central component of the claimed invention. The dispute will likely focus on whether Capital One’s integrated, internal fraud alert system is a "verification site" or if the term requires a more specific, user-designated location like an external email account. Practitioners may focus on this term because its scope could determine whether the patent reads on modern, automated banking security features.
- Intrinsic Evidence for Interpretation:- Evidence for a Broader Interpretation: The claims themselves use the broad language "electronically accessible verification site" without further limitation to a specific technology (ʼ214 Patent, col. 3:50-51).
- Evidence for a Narrower Interpretation: The patent abstract states the "verification site is an electronic mail account" (ʼ214 Patent, Abstract). The detailed description repeatedly uses an "e-mail account" as the primary and detailed example of the verification site, which may suggest the invention is limited to such structures (ʼ214 Patent, col. 2:31, col. 2:54-55).
 
"accessing the verification site by the merchant"
- Context and Importance: This term defines the actor performing a key step. The infringement allegation rests on the theory that the merchant's act of submitting a transaction to Capital One for authorization constitutes "accessing" the site, or that Capital One's subsequent actions are performed on the merchant's behalf. The construction of "by the merchant" is critical to this theory.
- Intrinsic Evidence for Interpretation:- Evidence for a Broader Interpretation: The patent does not explicitly define what "by the merchant" requires. A party could argue it encompasses any action initiated by the merchant that causes the site to be accessed, even indirectly.
- Evidence for a Narrower Interpretation: The plain language suggests the merchant is the direct actor. The claim separately recites "receiving a request... by a merchant" and then "accessing the verification site by the merchant," suggesting two distinct actions performed by the same entity (ʼ214 Patent, col. 3:52-59). The specification does not appear to describe a multi-party handoff where the card issuer, a separate entity from the merchant, performs the access step.
 
VI. Other Allegations
Indirect Infringement
The complaint alleges a theory of induced infringement by stating that Capital One "at least directs or controls merchants" to perform the step of accessing the verification site (Compl. ¶19, ¶30) and "at least directs or controls customers to ‘transmit[]... an approval communication’" (Compl. ¶23, ¶32). These allegations are based on Capital One setting the conditions for transaction approval, which allegedly requires merchants and customers to perform the claimed steps.
Willful Infringement
The complaint does not allege that Defendant had pre-suit knowledge of the patents-in-suit. It includes a prayer for a finding that the case is exceptional under 35 U.S.C. § 285 but does not plead the factual basis typically associated with a claim for willful infringement (Compl. p. 11, ¶D).
VII. Analyst’s Conclusion: Key Questions for the Case
This dispute will likely center on fundamental questions of claim scope and the application of patent claims drafted in the early 2000s to modern, integrated financial security systems.
- A core issue will be one of definitional scope: can the term "verification site," which the patent describes as an "e-mail account," be construed broadly enough to encompass a financial institution’s proprietary, internal fraud-detection and automated alert system?
- A second key issue will be one of agency and action: does the claim limitation "accessing the verification site by the merchant" read on a system where the merchant's only action is to submit a transaction to a card issuer, who then performs the verification? The viability of the infringement case may depend on whether Plaintiff's "directs or controls" theory can satisfy this claim element.
- Finally, a key evidentiary question for the ’848 patent will be whether the accused text and email alert process can be mapped to the claim's requirement for four distinct electronic network communications, a more granular limitation than what is required by the earlier patents.