1:15-cv-02167
Maxim Integrated Products Inc v. M&T Bank Corp
I. Executive Summary and Procedural Information
- Parties & Counsel:
- Plaintiff: Maxim Integrated Products, Inc. (Delaware)
- Defendant: M&T Bank Corporation (New York)
- Plaintiff’s Counsel: Kheyfits & Belenky LLP; Tensegrity Law Group LLP
- Case Identification: 1:15-cv-02167, S.D.N.Y., 03/23/2015
- Venue Allegations: Venue is alleged to be proper based on Defendant M&T Bank Corporation conducting substantial business, maintaining physical branches, offering products for sale, and committing the alleged acts of infringement within the Southern District of New York.
- Core Dispute: Plaintiff alleges that Defendant’s "M&T Mobile Banking" smartphone applications, when used on mobile devices in conjunction with its banking infrastructure, infringe three patents related to secure electronic data communication and financial transactions.
- Technical Context: The patents-in-suit relate to foundational technologies for secure, portable electronic value storage and transfer, akin to a digital wallet, using cryptographic methods on dedicated hardware modules.
- Key Procedural History: The provided patent documents indicate that after the complaint was filed, Plaintiff filed disclaimers for claim 2 of the '510 patent, claims 7, 14, and 16 of the '013 patent, and claim 7 of the '095 patent. An ex parte reexamination of the '510 patent concluded in 2016, confirming the patentability of claims 1, 3, 5, and 6. These post-filing events may influence subsequent arguments regarding claim scope and validity.
Case Timeline
| Date | Event |
|---|---|
| 1995-09-29 | Earliest Priority Date for ’013 and ’095 Patents |
| 1996-01-31 | Priority Date for ’510 Patent |
| 1999-08-17 | U.S. Patent No. 5,940,510 Issued |
| 2000-08-15 | U.S. Patent No. 6,105,013 Issued |
| 2001-05-22 | U.S. Patent No. 6,237,095 Issued |
| 2015-03-23 | Complaint Filed |
| 2015-06-23 | Disclaimer of Claim 2 of the '510 Patent Filed |
| 2015-07-06 | Disclaimer of Claims 7, 14, 16 of the '013 Patent Filed |
| 2015-07-08 | Disclaimer of Claim 7 of the '095 Patent Filed |
| 2016-04-12 | Reexamination Certificate Issued for the '510 Patent |
II. Technology and Patent(s)-in-Suit Analysis
U.S. Patent No. 5,940,510 - "Transfer of Valuable Information Between a Secure Module and Another Module," issued August 17, 1999 (’510 Patent)
The Invention Explained
- Problem Addressed: The patent describes a need for an electronic system that functions as a true cash equivalent, distinct from credit-based systems that require subsequent settlement with a bank. The goal is an "electronic wallet" that a consumer can "fill" with value and have instantly debited at the point of sale. (’510 Patent, col. 2:3-13, 49-58).
- The Patented Solution: The invention proposes a system comprising a portable module for carrying value, a reader, and a separate secure module (a "trusted computer"). When a user makes a transaction, the system uses cryptographic protocols to securely transfer value from the portable module to the secure module, ensuring that value is conserved. (’510 Patent, Abstract; col. 7:13–8:26; FIG. 4). The system is designed to prevent counterfeiting and ensure the integrity of the transaction. (’510 Patent, col. 8:45-60).
- Technical Importance: The technology provided a framework for creating self-contained, secure digital cash systems where transactions could be authenticated and settled without immediate reliance on a centralized banking network for every transaction. (’510 Patent, col. 2:52-58).
Key Claims at a Glance
- The complaint asserts infringement of "one or more claims" of the patent (Compl. ¶16). Independent claim 1 is representative.
- Independent Claim 1 recites a system for securely communicating data, comprising:
- A "first portable module" which includes nonvolatile memory, a real time clock, a transaction counter, and a unique electronic ID.
- A "portable module reader" for communicating with the portable module.
- A "secure microcontroller based module" that communicates with the reader and includes a microcontroller core and a math coprocessor for encryption.
- The combination of the reader and the secure module performs "secure data transfers" with the first portable module.
U.S. Patent No. 6,105,013 - "Method, Apparatus, System, and Firmware for Secure Transactions," issued August 15, 2000 (’013 Patent)
The Invention Explained
- Problem Addressed: The patent identifies a security vulnerability in systems like P.G.P. (Pretty Good Privacy) where a user's private encryption key is stored on a general-purpose computer. This ties the security of the transaction to the security of the host computer, which may be compromised. (’013 Patent, col. 5:1-30).
- The Patented Solution: The invention is a "microcontroller based secure transaction integrated circuit," essentially a self-contained "trusted computer" on a single chip. This module can generate and store a private key that never leaves the device, preventing its discovery even if the host computer is insecure. (’013 Patent, Abstract; col. 6:1-17). By performing cryptographic operations within this secure hardware, it enables secure transactions, digital signatures, and authentication that are portable and independent of the host machine's security. (’013 Patent, col. 2:35-42; FIG. 1).
- Technical Importance: This approach decoupled the security of a transaction from the host device (e.g., a PC), creating a portable, hardware-based root of trust for electronic interactions. (’013 Patent, col. 6:1-17).
Key Claims at a Glance
- The complaint asserts infringement of "one or more claims" of the patent (Compl. ¶19). Independent claims 1 and 9 are representative.
- Independent Claim 1 recites a microcontroller based secure transaction integrated circuit, comprising: a microcontroller core; a math coprocessor for encryption; programmable memory circuitry; an input/output circuit; and a real time clock for time stamping.
- Independent Claim 9 recites a secure transaction integrated circuit, comprising: a microcontroller core; a memory circuit for storing a transaction program; a modular exponentiation accelerator circuit for encryption; an input/output circuit; and a clock circuit for time stamping.
U.S. Patent No. 6,237,095 - "Apparatus for Transfer of Secure Information Between a Data Carrying Module and an Electronic Device," issued May 22, 2001 (’095 Patent)
- Technology Synopsis: This patent is directed to an apparatus, such as a secure hardware module, for transmitting encrypted data. It addresses the problem of "replay attacks" by describing a challenge-response protocol where the apparatus receives a challenge number (a "SALT") from an electronic device and incorporates it into a signed certificate, authenticating the transaction and proving it is not a duplicate of a prior one. (’095 Patent, col. 7:29-44).
- Asserted Claims: The complaint asserts infringement of "one or more claims" (Compl. ¶22); Claim 1 is the sole independent claim.
- Accused Features: The "M&T Mobile Banking" smartphone applications used in conjunction with M&T's banking infrastructure are accused of infringing the patent. (Compl. ¶22).
III. The Accused Instrumentality
Product Identification
- The accused instrumentality is identified as the "M&T Mobile Banking" smartphone applications. (Compl. ¶16).
Functionality and Market Context
- The complaint alleges that when these applications are installed on portable computing devices like Android or iOS smartphones and "combined with components of M&T's banking infrastructure," the resulting system performs "secure financial transactions." (Compl. ¶16). The complaint does not provide further technical detail regarding the specific operation of the accused applications or infrastructure, nor does it contain allegations regarding the products' market positioning. No probative visual evidence provided in complaint.
IV. Analysis of Infringement Allegations
The complaint does not provide a detailed infringement theory or element-by-element mapping. The allegations are made at a high level, asserting that the accused system as a whole embodies the patented inventions. (Compl. ¶¶ 16, 19, 22). The chart below summarizes the implied infringement theory for the lead patent based on the complaint's general allegations.
’510 Patent Infringement Allegations
| Claim Element (from Independent Claim 1) | Alleged Infringing Functionality | Complaint Citation | Patent Citation |
|---|---|---|---|
| A first portable module comprising: a nonvolatile memory for storing a first data; a first real time clock circuit... a counter... an input/output circuit; a... identification number | The "M&T Mobile Banking" smartphone applications when "installed on a portable computing device, such as an Android or iOS™ device." | ¶16 | col. 24:2-15 |
| a portable module reader that can be placed in communication with said first portable module | The complaint does not provide sufficient detail for analysis of this element. | -- | col. 24:16-19 |
| a secure microcontroller based module in electronic communication with said portable module reader, said secure microcontroller comprising: a microcontroller core; a math coprocessor... | "components of M&T’s banking infrastructure for performing secure financial transactions." | ¶16 | col. 24:20-31 |
| said combination of said portable module reader and said secure microcontroller performing secure data transfers with said first portable module | The "resulting systems" created by the combination of the mobile app and banking infrastructure are "made and/or used, thereby infringing." | ¶16 | col. 24:32-35 |
Identified Points of Contention
- Scope Questions: The core of the dispute may center on claim construction. A primary question is whether terms drafted for dedicated 1990s hardware can be construed to read on a modern, distributed software system. For example, does a general-purpose smartphone running an application meet the definition of the "first portable module", which the specification describes as a "durable micro-can package" intended for items like a "ring, bracelet, [or] wallet"? (’510 Patent, col. 4:44-50). Similarly, does M&T's server infrastructure meet the limitations of the "secure microcontroller based module" as claimed?
- Technical Questions: The complaint lacks specific factual allegations linking the operation of the M&T system to the claimed functions. A key question for discovery will be what evidence, if any, demonstrates that the M&T system performs the specific cryptographic and data transfer steps required by the claims, such as the debiting process shown in FIG. 4 of the ’510 Patent.
V. Key Claim Terms for Construction
The Term: "secure transaction integrated circuit" (’013 Patent, Claim 1)
Context and Importance: This term is foundational to the ’013 Patent. Infringement hinges on whether the accused system—a software application on a general-purpose phone communicating with remote servers—can be considered an "integrated circuit." Practitioners may focus on this term because its plain and ordinary meaning in electrical engineering is a set of electronic circuits on a small flat piece of semiconductor material, which appears to be a significant mismatch with the accused system's architecture.
Intrinsic Evidence for Interpretation:
- Evidence for a Broader Interpretation: A plaintiff may argue that the term should be interpreted functionally, and that the distributed M&T system performs the functions of the claimed circuit.
- Evidence for a Narrower Interpretation: The patent repeatedly describes the invention in terms of physical hardware, stating the components are "preferably integrated on a single silicon chip and packaged in a stainless steel microcan." (’013 Patent, col. 3:51-54). The abstract and detailed description consistently refer to a physical "module," "token," or "card," supporting a narrow construction limited to a single, self-contained hardware device. (’013 Patent, col. 2:45-48).
The Term: "first portable module" (’510 Patent, Claim 1)
Context and Importance: The identity of this element is central to the infringement case for the ’510 Patent. The plaintiff's theory appears to equate a modern smartphone running an app with this "portable module". The defendant will likely argue that a smartphone is a general-purpose computer, not the specific type of device disclosed in the patent.
Intrinsic Evidence for Interpretation:
- Evidence for a Broader Interpretation: The claim language itself does not explicitly limit the module's form factor, referring to its components (memory, clock, counter) which a smartphone possesses.
- Evidence for a Narrower Interpretation: The specification provides specific, and potentially limiting, examples, describing the module as a "rugged read/write data carrier" in a "durable micro-can package" that can be incorporated into personal items like "a ring, bracelet, wallet, name tag, [or] necklace." (’510 Patent, col. 4:40-50). This context may support an interpretation narrower than a general-purpose smartphone.
VI. Other Allegations
- Indirect Infringement: The complaint exclusively alleges direct infringement under 35 U.S.C. § 271(a) for each of the Asserted Patents. (Compl. ¶¶ 16, 19, 22). It does not contain allegations to support claims of induced or contributory infringement.
- Willful Infringement: The complaint does not explicitly allege willful infringement. However, it does request a judgment that this is an "exceptional case within the meaning of 35 U.S.C. § 285" to support an award of attorney fees. (Compl., Prayer for Relief (d)).
VII. Analyst’s Conclusion: Key Questions for the Case
- A core issue will be one of definitional scope: Can claim terms like "first portable module" and "secure transaction integrated circuit", which are rooted in the patent specifications' descriptions of dedicated 1990s hardware, be construed broadly enough to cover a modern, distributed system composed of a general-purpose smartphone, a software application, and back-end bank servers?
- A second key issue will be one of evidentiary sufficiency: As the complaint provides only conclusory allegations of infringement, the case will depend on whether discovery yields specific evidence that the M&T Mobile Banking system actually performs the technical functions and contains the discrete components recited in the asserted claims.
- A final question concerns the impact of post-filing prosecution: How will the Plaintiff's disclaimers of certain claims and the successful reexamination of the ’510 Patent affect the parties' strategies regarding claim construction and potential invalidity defenses for the remaining asserted claims?