1:19-cv-01129
Blackbird Tech LLC v. Wells Fargo & Co
I. Executive Summary and Procedural Information
- Parties & Counsel:
- Plaintiff: Blackbird Tech LLC d/b/a Blackbird Technologies (Delaware)
- Defendant: Wells Fargo & Company (Delaware)
- Plaintiff’s Counsel: Stamoulis & Weinblatt LLC
- Case Identification: 1:19-cv-01129, D. Del., 06/18/2019
- Venue Allegations: Venue is alleged to be proper in the District of Delaware because the defendant, Wells Fargo, is a Delaware corporation and therefore resides in the district. The complaint also alleges that Wells Fargo has 17 banks in Delaware, which constitute regular and established places of business.
- Core Dispute: Plaintiff alleges that Defendant’s suspicious card activity alerts service infringes three patents related to methods for securely authorizing transactions using an out-of-band verification process.
- Technical Context: The technology addresses security vulnerabilities in "card-not-present" e-commerce and remote transactions by introducing a secondary communication channel to verify a cardholder's identity and intent to authorize a purchase.
- Key Procedural History: The complaint does not mention any prior litigation, Inter Partes Review (IPR) proceedings, or licensing history related to the patents-in-suit. The '832 and '848 patents are continuations of the '214 patent and are subject to terminal disclaimers.
Case Timeline
| Date | Event |
|---|---|
| 2000-06-09 | Priority Date for ’214, ’832, and ’848 Patents |
| 2011-06-07 | U.S. Patent No. 7,958,214 Issued |
| 2012-10-09 | U.S. Patent No. 8,285,832 Issued |
| 2016-08-23 | U.S. Patent No. 9,424,848 Issued |
| 2017 | Date noted for accused Wells Fargo TV commercial |
| 2019-06-18 | Complaint Filed |
II. Technology and Patent(s)-in-Suit Analysis
U.S. Patent No. 7,958,214 - “Method for Secure Transactions Utilizing Physically Separated Computers,” Issued June 7, 2011
The Invention Explained
- Problem Addressed: The patent identifies the risk of fraud in "card not present" transactions, where a seller cannot physically verify a credit card or the identity of the person using it, creating opportunities for criminals to use stolen credentials (U.S. Patent No. 7,958,214, col. 1:20-34).
- The Patented Solution: The invention proposes a method using a separate, "pre-established communications path" as a "verification site" (e.g., a designated e-mail account) to confirm a transaction. When a purchase is initiated, the merchant's system contacts this verification site, which in turn sends an authorization request to the cardholder. The cardholder must then send an approval communication back to complete the transaction, creating an out-of-band verification loop (’214 Patent, col. 2:20-44; Fig. 1).
- Technical Importance: The method provides a "closed loop" security architecture intended to improve integrity for networked transactions by separating the transaction process from the authorization process (Compl. ¶10).
Key Claims at a Glance
- The complaint asserts infringement of at least independent claim 1 (Compl. ¶12).
- The essential elements of claim 1 include:
- establishing an electronically accessible verification site authorized by the holder of a credit card;
- receiving a request for goods or services by a merchant using the credit card, where the card is not physically presented;
- accessing the verification site by the merchant to determine if the request is authorized;
- sending an electronic authorization communication from the verification site to the cardholder, including information indicative of the transaction; and
- transmitting, by the cardholder, an approval communication if the transaction is approved.
- The complaint does not explicitly reserve the right to assert dependent claims.
U.S. Patent No. 8,285,832 - “Method for Secure Transactions Utilizing Physically Separated Computers,” Issued October 9, 2012
The Invention Explained
- Problem Addressed: As a continuation of the '214 patent, the '832 patent addresses the same problem of fraudulent "card not present" transactions (U.S. Patent No. 8,285,832, col. 1:25-35).
- The Patented Solution: The patented solution is functionally identical to that of the '214 patent, involving a "verification site" for out-of-band authorization. The primary distinction in the asserted claim is the use of the broader term "pre-existing identification credentials" instead of "credit card" (’832 Patent, col. 2:25-41).
- Technical Importance: This patent extends the applicability of the security method beyond credit cards to a wider range of identification credentials used in remote transactions (Compl. ¶10).
Key Claims at a Glance
- The complaint asserts infringement of at least independent claim 1 (Compl. ¶26).
- The essential elements of claim 1 include:
- establishing an electronically accessible verification site authorized by the holder of a set of pre-existing identification credentials;
- receiving a request at a merchant location using the identification credentials, where they are not physically presented;
- accessing the verification site by the merchant to determine if the request is authorized;
- sending an electronic authorization communication from the verification site to the holder of the credentials, including information indicative of the transaction; and
- transmitting, by the holder of the credentials, an electronic approval communication if the transaction is approved.
- The complaint does not explicitly reserve the right to assert dependent claims.
Multi-Patent Capsule
- Patent Identification: U.S. Patent No. 9,424,848, “Method for Secure Transactions Utilizing Physically Separated Computers,” Issued August 23, 2016.
- Technology Synopsis: As a further continuation in the same family, this patent refines the method for securing remote transactions. It claims a specific sequence of four distinct electronic network communications between the merchant, a verification site, and the holder of "pre-existing identification (ID) information" to achieve out-of-band authorization for a unique transaction (’848 Patent, col. 1:25-35, col. 4:35-62).
- Asserted Claims: The complaint asserts infringement of at least independent claim 1 (Compl. ¶33).
- Accused Features: The complaint alleges that Wells Fargo’s suspicious card activity alerts service infringes by performing the claimed sequence of communications: a "first" communication from the merchant to the bank, a "second" from the bank to its fraud systems, a "third" (the text alert) to the customer, and a "fourth" (the customer's reply) to approve the transaction (Compl. ¶¶35-38).
III. The Accused Instrumentality
Product Identification
The accused instrumentality is Wells Fargo’s "suspicious card activity alerts service," which applies to both credit and debit card transactions (Compl. ¶12, ¶24).
Functionality and Market Context
The service is a fraud detection system. When Wells Fargo’s systems flag a transaction as potentially fraudulent, the service automatically sends a text message to the cardholder containing details of the transaction (e.g., amount and merchant). A screenshot in the complaint shows a sample alert asking the user to "Reply CONFIRM if valid or DENY if suspicious" (Compl. p. 7; Ex. G). The customer’s reply determines whether the transaction is approved or rejected (Compl. ¶¶21, 23). The complaint alleges that customers must enroll and consent to receive these text messages, and that Wells Fargo conditions transaction approval on the customer’s response (Compl. ¶15, ¶23).
IV. Analysis of Infringement Allegations
’214 Patent Infringement Allegations
| Claim Element (from Independent Claim 1) | Alleged Infringing Functionality | Complaint Citation | Patent Citation |
|---|---|---|---|
| establishing an electronically accessible verification site authorized by the holder of a credit card | Wells Fargo establishes text communication systems, and customers authorize their use by enrolling a mobile number and accepting terms to receive text message alerts (Compl. ¶15). | ¶¶13-15 | col. 2:25-28 |
| receiving a request for goods or services by a merchant using the credit card, but wherein the card is not required to be physically presented | Customers use Wells Fargo credit cards for online purchases, where merchants receive an electronic request for goods without the card being physically present. | ¶¶16-17 | col. 2:45-53 |
| accessing the verification site by the merchant to determine whether the request for goods or services is an authorized transaction | Upon receiving a request from a merchant, Wells Fargo accesses its fraud detection systems. The complaint alleges Wells Fargo "at least directs or controls merchants to 'access[] the verification site'". | ¶¶18-19 | col. 2:45-50 |
| sending an electronic authorization communication by the verification site to the holder of the credit card...including information indicative of the transaction | If a transaction is flagged, Wells Fargo sends a text message to the customer asking for verification and providing details of the purchase (Compl. Ex. G). | ¶¶20-21 | col. 2:35-41 |
| transmitting, by the holder of the credit card, an approval communication if the transaction is approved by the card holder | The customer replies to the text message (e.g., by sending "CONFIRM") to approve the transaction. | ¶¶22-23 | col. 2:41-44 |
Identified Points of Contention
- Scope Questions: A primary question will be whether the accused "text communication systems" and associated fraud detection servers constitute a "verification site" as contemplated by the patent, which describes the site in its preferred embodiment as an "e-mail account" (’214 Patent, col. 2:35-38).
- Technical Questions: The claim requires the step of "accessing the verification site by the merchant". The complaint alleges that Wells Fargo (the bank) accesses its own fraud systems and "directs or controls merchants" to do so (Compl. ¶18). This raises the question of whether the actions of the bank can be attributed to the "merchant" to satisfy this claim element, which may implicate issues of divided infringement.
’832 Patent Infringement Allegations
The complaint alleges infringement of the '832 patent based on the same conduct as for the '214 patent, cross-referencing the same factual allegations (Compl. ¶¶27-31). The analysis is therefore substantially similar, with "credit card" being replaced by "identification credentials."
| Claim Element (from Independent Claim 1) | Alleged Infringing Functionality | Complaint Citation | Patent Citation |
|---|---|---|---|
| establishing an electronically accessible verification site authorized by the holder of a set of pre-existing identification credentials | Wells Fargo establishes text communication systems, and customers authorize their use by enrolling a mobile number and accepting terms to receive text message alerts (Compl. ¶15). | ¶27 | col. 2:25-30 |
| receiving at a merchant location...a request for goods from, or services by, a merchant using the identification credentials...not physically presented | Customers use Wells Fargo cards (a form of identification credential) for online purchases, where merchants receive an electronic request without physical presentation. | ¶28 | col. 2:40-45 |
| accessing the verification site by the merchant...to determine whether the request...is an authorized transaction | Upon receiving a request from a merchant, Wells Fargo accesses its fraud detection systems. The complaint alleges Wells Fargo "at least directs or controls merchants to 'access[] the verification site'". | ¶29 | col. 2:45-50 |
| sending an electronic authorization communication from the verification site to the holder of the identification credentials... | If a transaction is flagged, Wells Fargo sends a text message to the customer asking for verification and providing details of the purchase (Compl. Ex. G). | ¶30 | col. 2:48-53 |
| transmitting, by the holder of the identification credentials, an electronic approval communication if the transaction is approved... | The customer replies to the text message (e.g., by sending "CONFIRM") to approve the transaction. | ¶31 | col. 2:53-57 |
Identified Points of Contention
The points of contention are identical to those for the '214 patent, as described in the section above. The dispute will likely center on the construction of "verification site" and the factual and legal basis for the allegation that the bank's actions satisfy the "accessing...by the merchant" limitation.
V. Key Claim Terms for Construction
For the ’214 and ’832 Patents
The Term: "verification site"
Context and Importance: This term is the technological core of the invention. Its definition is critical because the infringement case depends on whether Wells Fargo's text alert infrastructure and backend fraud-detection systems can be considered a "verification site." Practitioners may focus on this term because of the potential mismatch between the patent’s primary embodiment (an e-mail account) and the accused technology (a text-messaging platform).
Intrinsic Evidence for Interpretation:
- Evidence for a Broader Interpretation: The claims use the general term "electronically accessible verification site" without being limited to a specific technology like email. The specification notes the site may be "wirelessly accessible, enabling an authorization message to be delivered through a cellular telephone" (’214 Patent, col. 2:9-12), which may support application to text messaging.
- Evidence for a Narrower Interpretation: The detailed description repeatedly and consistently refers to the verification site as an "e-mail account" which is either maintained by a clearinghouse or an "external" service provider (’214 Patent, col. 2:35-38). An argument could be made that the invention is implicitly limited to such an architecture.
The Term: "accessing the verification site by the merchant"
Context and Importance: This limitation defines who performs a critical step in the claimed method. Its construction is central because the complaint alleges Wells Fargo (the bank, not the merchant) performs the access, while asserting this action is controlled by or attributable to the merchant. The viability of the infringement claim may turn on whether "by the merchant" can be read to include actions taken by the merchant's bank as part of the transaction authorization workflow.
Intrinsic Evidence for Interpretation:
- Evidence for a Broader Interpretation: The patent describes a transaction flow where a "credit card clearinghouse" is involved, and a party could argue that the bank is acting as an agent for or integral part of the "merchant" system in this context (’214 Patent, col. 2:30-31).
- Evidence for a Narrower Interpretation: The plain language of the claim assigns the action of "accessing" to the "merchant" entity. The specification distinguishes between the "vendor computer" (merchant) and the "credit card clearinghouse" (bank/processor), suggesting they are distinct actors in the process (’214 Patent, Fig. 1).
VI. Other Allegations
Indirect Infringement
The complaint alleges that Wells Fargo "at least directs or controls" customers to transmit approval communications and merchants to access the verification site (Compl. ¶18, ¶22). These allegations, combined with claims that Wells Fargo provides instructions and operates the system for its customers to use, form a basis for a potential claim of induced infringement under 35 U.S.C. § 271(b).
Willful Infringement
The complaint does not contain specific factual allegations to support willful infringement, such as pre-suit knowledge of the patents. The prayer for relief requests an award of attorneys' fees for an "exceptional" case under § 285 but does not explicitly request enhanced damages for willfulness under § 284 (Compl. Prayer for Relief, D).
VII. Analyst’s Conclusion: Key Questions for the Case
- A core issue will be one of claim scope and construction: Can the term "verification site", which is described in the patents’ preferred embodiment as an "e-mail account," be construed broadly enough to read on the accused text-messaging-based fraud alert system operated by Wells Fargo?
- A second central question will concern divided infringement: Can the claim limitation requiring an action "by the merchant" be satisfied by the actions of Wells Fargo, the card-issuing bank? The outcome may depend on the extent to which the plaintiff can prove Wells Fargo "directs or controls" the merchant's participation in the authorization process.
- An evidentiary question for the '848 patent will be one of technical mapping: Does the actual sequence of electronic messages in the accused Wells Fargo service—from merchant to bank, bank to its internal systems, bank to customer, and customer back to bank—align with the specific "first," "second," "third," and "fourth" electronic network communication steps recited in claim 1 of the ’848 patent?