DCT
1:19-cv-00462
Blackbird Tech LLC v. HSBC Bank USA NA
Key Events
Complaint
Table of Contents
complaint
I. Executive Summary and Procedural Information
- Parties & Counsel:
- Plaintiff: Blackbird Tech LLC d/b/a Blackbird Technologies (Delaware)
- Defendant: HSBC Bank USA, N.A. (National Association)
- Plaintiff’s Counsel: Stamoulis & Weinblatt LLC
- Case Identification: 1:19-cv-00462, D. Del., 03/05/2019
- Venue Allegations: Venue is alleged to be proper in the District of Delaware because Defendant HSBC has committed acts of infringement in the district and maintains a regular and established place of business there, specifically at least one bank branch.
- Core Dispute: Plaintiff alleges that Defendant’s Fraud Alerts service for credit and debit cards infringes three patents related to methods for securely authorizing transactions using a secondary, out-of-band communication channel.
- Technical Context: The technology addresses the risk of fraud in "card-not-present" e-commerce transactions by creating a two-step verification process, where a cardholder must separately confirm a transaction via a secondary channel like SMS or email.
- Key Procedural History: The three patents-in-suit are part of a single family, with the '832 patent being a continuation of the application that issued as the '214 patent, and the '848 patent being a continuation of the application that issued as the '832 patent. This shared prosecution history and specification may lead to consistent interpretations of common claim terms across the patents.
Case Timeline
| Date | Event |
|---|---|
| 2000-06-09 | Priority Date for '214, '832, and '848 Patents |
| 2011-06-07 | U.S. Patent No. 7,958,214 Issued |
| 2012-10-09 | U.S. Patent No. 8,285,832 Issued |
| 2016-08-23 | U.S. Patent No. 9,424,848 Issued |
| 2019-03-05 | Complaint Filed |
II. Technology and Patent(s)-in-Suit Analysis
U.S. Patent No. 7,958,214 - Method for Secure Transactions Utilizing Physically Separated Computers, issued June 7, 2011
The Invention Explained
- Problem Addressed: The patent’s background section identifies the problem of fraudulent use of credit card credentials in "card not present" transactions, such as those conducted over the internet, where physical verification of the card is impossible (’214 Patent, col. 1:20-34).
- The Patented Solution: The invention proposes a method to secure these transactions by establishing a separate, "electronically accessible verification site" (e.g., an email account) known to the cardholder. When a purchase is initiated, the merchant accesses this site, triggering an "authorization communication" to the cardholder. The transaction is only approved after the cardholder transmits a response back, thus creating an out-of-band verification loop that decouples the purchase request from the final approval. (’214 Patent, Abstract; col. 2:20-43).
- Technical Importance: This approach sought to improve security for networked transactions by introducing a distinct verification architecture that did not exist in prior "closed loop" systems. (Compl. ¶10).
Key Claims at a Glance
- The complaint asserts "one or more claims," including at least independent claim 1. (Compl. ¶12).
- The essential elements of independent claim 1 include:
- establishing an electronically accessible verification site authorized by the holder of a credit card;
- receiving a request for goods or services by a merchant using the credit card, where the card is not physically presented;
- accessing the verification site by the merchant to determine if the request is authorized;
- sending an electronic authorization communication from the verification site to the cardholder with transaction information; and
- transmitting an approval communication by the cardholder if the transaction is approved.
U.S. Patent No. 8,285,832 - Method for Secure Transactions Utilizing Physically Separated Computers, issued October 9, 2012
The Invention Explained
- Problem Addressed: The '832 Patent addresses the same problem as its parent '214 Patent: securing remote transactions against fraudulent use of payment credentials. (’832 Patent, col. 1:22-35).
- The Patented Solution: The technical solution is identical to that of the '214 Patent, involving an out-of-band verification process via a separate communication path. The primary distinction lies in the claim language, which uses the broader term "pre-existing identification credentials" instead of the more specific "credit card," suggesting applicability to a wider range of identifiers. (’832 Patent, col. 4:37-55).
- Technical Importance: The patent describes an unconventional technological solution for improving security for networked transactions. (Compl. ¶10).
Key Claims at a Glance
- The complaint asserts "one or more claims," including at least independent claim 1. (Compl. ¶25).
- The essential elements of independent claim 1 are substantively similar to claim 1 of the '214 Patent but are framed around "identification credentials":
- establishing a verification site authorized by the holder of "pre-existing identification credentials";
- receiving a request at a merchant using the credentials without physical presentation;
- accessing the verification site by the merchant to determine authorization;
- sending an authorization communication from the site to the holder of the credentials; and
- transmitting an approval communication by the holder of the credentials.
Multi-Patent Capsule: U.S. Patent No. 9,424,848
- Patent Identification: U.S. Patent No. 9,424,848, Method for Secure Transactions Utilizing Physically Separated Computers, issued August 23, 2016. (Compl. ¶9).
- Technology Synopsis: As a continuation in the same family, this patent addresses the same problem of remote transaction fraud with the same out-of-band verification solution. (Compl. ¶10). The claims of the '848 Patent further structure the method by delineating the process into a sequence of a "first," "second," "third," and "fourth electronic network communication" corresponding to the request, access, authorization, and approval steps. ('848 Patent, Claim 1).
- Asserted Claims: The complaint asserts "one or more claims," including at least independent claim 1. (Compl. ¶32).
- Accused Features: The accused features are the same HSBC Fraud Alerts service, with the complaint specifically mapping the service's operational flow to the four enumerated communication steps recited in the claims. (Compl. ¶¶ 33-37).
III. The Accused Instrumentality
Product Identification
- The accused instrumentality is the "Fraud Alerts" service offered by HSBC for its credit and debit card accounts. (Compl. ¶12).
Functionality and Market Context
- The service is a fraud detection system that monitors card-not-present transactions for suspicious activity. (Compl. ¶15). When a potentially fraudulent transaction is detected, the system sends an SMS text message to the cardholder's mobile phone. (Compl. ¶21). A screenshot from HSBC's website provided in the complaint explains that HSBC may notify the user by free text message if suspicious activity is detected. (Compl. p. 6).
- This alert contains information about the transaction and instructs the cardholder to respond "Yes" or "No" to verify or reject the purchase. (Compl. ¶21). Another screenshot illustrates how a user should respond to the fraud alert. (Compl. p. 7).
- The complaint alleges that transaction approval is conditioned upon the customer's response to this alert. (Compl. ¶23). It further alleges that customers agree to HSBC sending these alerts and merchants must conform to HSBC's authorization standards to accept its cards. (Compl. ¶15, ¶17).
IV. Analysis of Infringement Allegations
'214 Patent Infringement Allegations
| Claim Element (from Independent Claim 1) | Alleged Infringing Functionality | Complaint Citation | Patent Citation |
|---|---|---|---|
| establishing an electronically accessible verification site authorized by the holder of a credit card | HSBC establishes and operates its fraud detection and communication systems, which are authorized by customers who agree to cardmember and service terms. | ¶13-15 | col. 2:47-49 |
| receiving a request for goods or services by a merchant using the credit card, but wherein the card is not required to be physically presented to the merchant | Merchants receive requests from customers for online purchases and electronically forward these requests to HSBC, the card issuer, for authorization. | ¶16-17 | col. 2:50-54 |
| accessing the verification site by the merchant to determine whether the request for goods or services is an authorized transaction | Upon receiving a request from a merchant, HSBC accesses its internal fraud detection systems (the alleged "verification site") to determine if the transaction is potentially fraudulent, allegedly at the direction or control of the merchant. | ¶18-19 | col. 2:49-52 |
| sending an electronic authorization communication by the verification site to the holder of the credit card, the message including information indicative of the transaction | If a transaction is flagged as potentially fraudulent, HSBC’s system sends an SMS text alert to the cardholder's mobile phone with details of the transaction. | ¶20-21 | col. 4:2-4 |
| transmitting, by the holder of the credit card, an approval communication if the transaction is approved by the card holder | The cardholder responds to the SMS alert with a "Yes" or "No" text message to approve or reject the transaction, which constitutes the approval communication. | ¶22-23 | col. 4:1-4 |
'832 Patent Infringement Allegations
| Claim Element (from Independent Claim 1) | Alleged Infringing Functionality | Complaint Citation | Patent Citation |
|---|---|---|---|
| establishing an electronically accessible verification site authorized by the holder of a set of pre-existing identification credentials | HSBC establishes its fraud detection and communication systems, authorized by customers who hold credentials (e.g., credit card accounts) and agree to service terms. | ¶26 | col. 4:37-39 |
| receiving at a merchant location, via an electronic communication link, a request for goods from, or services by, a merchant using the identification credentials... | Merchants receive requests for online purchases using the customer's credentials (credit card information) and forward these requests to HSBC for authorization. | ¶27 | col. 4:40-44 |
| accessing the verification site by the merchant, via an electronic communication link, to determine whether the request for goods or services is an authorized transaction | The merchant's authorization request allegedly constitutes or causes an access to HSBC’s internal fraud detection systems to determine authorization. | ¶28 | col. 4:45-49 |
| sending an electronic authorization communication from the verification site to the holder of the identification credentials... | If a transaction is suspicious, HSBC’s system sends an SMS text alert with transaction details to the holder of the credentials. | ¶29 | col. 4:50-53 |
| transmitting, by the holder of the identification credentials, an electronic approval communication if the transaction is approved... | The cardholder responds to the SMS alert via text message to approve or reject the transaction. | ¶30 | col. 4:54-55 |
Identified Points of Contention
- Scope Questions: A primary question may be whether HSBC’s internal fraud-detection platform, which is operated by HSBC, can be considered a "verification site" that is "access[ed]... by the merchant" as required by the claims. The complaint alleges the merchant's standard authorization request constitutes this access (Compl. ¶18, ¶28), which raises the question of whether this indirect trigger satisfies the claim's specific language about the actor performing the access.
- Technical Questions: The infringement theory hinges on equating a bank's internal fraud check with the patent's described verification method. A key technical question is whether the accused system's function is consistent with the claims. The claims recite the merchant accessing the site "to determine whether the request... is an authorized transaction," which suggests the merchant is the party making the determination. The complaint, however, describes a system where HSBC, not the merchant, makes this determination after receiving a standard authorization request.
V. Key Claim Terms for Construction
The Term: "verification site"
- Context and Importance: The definition of this term is foundational to the dispute. The central issue is whether HSBC's integrated, internal fraud alert platform qualifies as the claimed "verification site," or if the patent requires a system that is architecturally separate or external.
- Intrinsic Evidence for a Broader Interpretation: The specification states the verification site is "an electronically accessible" location, and an "electronic mail account" is provided as just one preferred embodiment, not a limiting example. (’214 Patent, col. 2:54-55). This could support a broad interpretation covering any network-addressable system used for verification.
- Intrinsic Evidence for a Narrower Interpretation: The specification describes the site as a "separate, pre-established communications path" and repeatedly uses the example of an external e-mail account that a cardholder would access. (’214 Patent, col. 2:21-23, col. 2:31-32). This may support an argument that the site must be distinct from the primary transaction authorization channel.
The Term: "accessing the verification site by the merchant"
- Context and Importance: Practitioners may focus on this term because the identity of the actor ("the merchant") is a critical limitation that appears to diverge from the alleged facts. The infringement case depends on construing this phrase to cover a merchant's authorization request that merely triggers an internal bank process.
- Intrinsic Evidence for a Broader Interpretation: A plaintiff may argue that "accessing" should be interpreted functionally. If the merchant's action is the necessary prerequisite that causes the verification site to be used, one could argue the merchant has, in effect, "accessed" it for the purpose of getting a transaction authorized.
- Intrinsic Evidence for a Narrower Interpretation: The plain language of the claim assigns the action of "accessing" to "the merchant." The patent's Figure 1 depicts a direct link between the "Vendor Computer" and the verification process, which could be interpreted as requiring a direct, technical access by the merchant's system, not an indirect trigger of the bank's system. (’214 Patent, Fig. 1).
VI. Other Allegations
- Indirect Infringement: The complaint alleges that HSBC directs or controls both its customers and merchants to perform the claimed steps, which suggests a theory of induced infringement. (Compl. ¶¶ 22, 27). The allegations point to HSBC's SMS alerts that instruct customers on how to respond to verify transactions (Compl. ¶23) and its requirements for merchants to use its authorization systems to accept HSBC-issued cards. (Compl. ¶17).
- Willful Infringement: The complaint does not plead specific facts to support pre-suit knowledge or egregious conduct that would typically underpin a claim for willfulness.
VII. Analyst’s Conclusion: Key Questions for the Case
- A core issue will be one of claim construction and actor identity: can the phrase "accessing the verification site by the merchant," as used in the patents, be construed to cover a scenario where a merchant's standard payment authorization request indirectly triggers a bank's internal fraud-detection system, or does the claim require a direct technical action initiated by the merchant itself?
- A related evidentiary question will be one of system equivalence: does the accused HSBC Fraud Alerts service, which is activated only for suspicious transactions and is operated entirely by the bank, function as the claimed "verification site," or is there a fundamental mismatch between the bank-side security check and the patent's description of a merchant-driven, out-of-band authorization process?
- The viability of the inducement theory will likely be a central focus, hinging on whether the plaintiff can demonstrate that HSBC's instructions to merchants and customers show a specific intent to cause infringement of all steps of the claimed method, including the disputed "accessing by the merchant" step.
Analysis metadata