United States: Tracking The Evolving Abstract Idea Doctrine: How Courts Have Applied The Two-Part Test For Computer-Implemented Inventions Post-Alice

Last Updated: March 18 2015
Article by Trent B. Ostler, Robert Kinberg and Michael A. Sartori Ph. D.

The Supreme Court decision in Alice v. CLS Bank.1 provides a framework for determining when a patent claim is directed to one of the long-standing exceptions to patent eligibility, namely, laws of nature, natural phenomena, and abstract ideas. That is, even though a patent claim technically falls within one of the four statutory categories of invention—process, machine, manufacture, or composition of matter—the claim may not be patent-eligible if it is directed to one of the exceptions to the extent that the claim preempts or monopolizes one of these fundamental building blocks. Alice particularly addresses whether computer-implemented inventions are patent-ineligible abstract ideas, but the framework set forth in Alice is broadly applicable to each of the long-standing exceptions. The Alice framework includes a two-part test: first, determining whether a claim is directed to an abstract idea, and if so, then determining whether the claim has additional elements that transform the claim into patent-eligible subject matter by supplying an "inventive concept."

However, this two-part test left patent practitioners, patent holders, and patent applicants alike in a state of uncertainty because the Court resolved the "abstract idea" determination in the test's first part by way of example, rather than by providing a clear definition. Further, the second part of the test requires a claim analysis to search for an "inventive concept," and the Court again resorted to fact-specific examples of what might constitute additional features of a claimed invention that are "sufficient to ensure that the patent in practice amounts to significantly more than a patent on the [ineligible concept] itself."2 Subsequent Federal Circuit decisions applying Alice shed light on patent eligibility of claims directed to abstract ideas, specifically abstract ideas implemented on a computer and/or using the Internet. Here, we recap the cases to date that have fallen within and outside both parts of the test. The Interim Guidance on Patent Subject Matter Eligibility3as well as the Subject Matter examples,4recently issued by the USPTO, substantially adhere to the principles of these cases.

Step 1: Are THE claims directed to AN abstract idea?

The first step of Alice asks whether the claims are directed to an abstract idea. Alice notably declined to define the term "abstract idea," and even acknowledged that at some level, all inventions are directed to an abstract idea. But for this first step, the Court focused on preemption: does the invention seek to improperly patent building blocks of human ingenuity? If the claims recite broad building blocks of innovation, they are directed to an abstract idea.

Supreme Court

To answer step 1, the Alice Court first distilled from the claimed invention a short narrative to characterize the "abstract idea" to which the claim is directed. In first applying this framework in Alice, the Supreme Court looked back to previous Supreme Court cases and provided reasoning for how its previous cases fit within the new two-step framework. The Supreme Court cases in Table 1 of the Appendix illustrate a comparison between the claim language and the abstract idea generalization. The Supreme Court then found that the claims in Alice's patents were directed to an abstract idea as covering fundamental economic principles.

Federal Circuit

Applying Alice, the Federal Circuit held that five claimed inventions were directed to abstract ideas and one claimed invention was not directed to an abstract idea. In the former cases, the Federal Circuit—like the Supreme Court—initially distilled the claimed inventions as follows:

  • "A process of organizing information through mathematical correlations [that is] not tied to a specific structure or machine."sup>5(Digitech)
  • "[M]anaging a bingo game while allowing a player to repeatedly play the same sets of numbers in multiple sessions."6 (Planet Bingo)
  • "Creating a contractual relationship—a 'transaction performance guaranty'—that is of ancient lineage" even if narrowed to particular types of relationships.7 (buySAFE)
  • "The process of receiving copyrighted media, selecting an ad, offering the media in exchange for watching the selected ad, displaying the ad, allowing the consumer access to the media, and receiving payment from the sponsor of the ad."8 (Ultramercial)
  • "Collecting data, recognizing certain data within the collected data set, and storing that recognized data in a memory."9 (Content Extraction)

In the one case finding patent eligibility (DDR Holdings), the Federal Circuit refused to simplify the claimed invention as being directed to an abstract idea.10 The claims covered an e-commerce outsourcing system that served a webpage to a user with a look and feel of the host webpage when a link was clicked by the user. Rather than finding that the claims were directed to an abstract idea, the court reasoned that the claims did not recite a mathematical algorithm, a fundamental economic principle, or long-standing commercial practice. Instead, the claimed solution was necessarily rooted in computer technology to overcome a problem arising in the realm of computer networks. Thus, the court concluded that the case was not as straightforward as Alice or other abstract idea cases.

Takeaway for Step 1 of Alice

In the step 1 analysis, an entire invention (even if it involves multiple steps) often can be summarized in a single sentence. And if the invention can be so generalized, the court is likely to find that the claims are directed to an abstract idea. However, distinguishing the claimed invention from mere mathematical algorithms, fundamental economic principles, or long-standing commercial practice saved the patent in DDR Holdings from this finding.
To avoid having the patent generalized to an abstract idea, it is important to frame the invention in a way that is not interpreted as overly broad. Seeking to patent applications of building blocks of human ingenuity, rather than seeking to patent the building blocks themselves, should be the goal. It is also important to avoid a characterization of the invention as a mathematical algorithm. Even if a significant component of the invention is an algorithm, real-world tie-in applications of the algorithm may be able to avoid a characterization that the invention seeks to patent the mathematical algorithm.

Step 2: DOES something "SIGNIFICANTLY more" Transform the nature of the claims?

The second step of Alice asks, in looking at the individual elements of the claims and the combination of elements, whether additional elements transform the nature of the claim into a patent-eligible application (inventive concept). That is, for patent eligibility, a sufficient element or combination of elements must ensure that the patent in practice amounts to significantly more than a patent on the abstract idea itself.
The Supreme Court in Alice notably did not define the "sufficiently more" standard. However, Alice and subsequent Federal Circuit decisions shed some light on what meets this threshold.

Meets the "Sufficiently More" Threshold

  • The patent in Diehr related to a computer-implemented process for curing rubber that employed a well-known mathematical equation to solve a technological problem in conventional industry practice.11 Alice explained that the Diehr patent met step 2 because the curing rubber process "used a thermocouple to record constant temperature measurements inside the rubber mold—something the industry had not been able to obtain. The temperature measurements were then fed into a computer, which repeatedly calculated the remaining cure time by using the mathematical equation. These additional steps transformed the process into an inventive application...."12
  • The patent in DDR Holdings focused on the problem of losing visitors to a third party's website. The patent relates to a host website that sends its visitors to a web page on the outsourced provider's server that 1) incorporates "look and feel" elements from the host website, and 2) provides visitors with the opportunity to purchase products from the third-party merchant without actually entering the merchant's website. The Federal Circuit explained that "the claimed solution is necessarily rooted in computer technology in order to overcome a problem specifically arising in the realm of computer networks."13

Does Not Meet the "Sufficiently More" Threshold
  • An algorithm implemented on a general-purpose digital computer. The computer implementations did not supply the inventive concept because the process could be carried out in existing computers long in use.14 (Gottschalk v. Benson)
  • A computerized method for using a mathematical formula to adjust alarm limits for certain operating conditions (e.g., temperature and pressure) that could signal inefficiency or danger in a catalytic conversion process, where the computer implementation was purely conventional.15 (Parker v. Flook)
  • A method requiring use of a computer to create electronic records, track multiple transactions, and issue simultaneous instructions. Each step of the claim was conventional (i.e., using a computer for electronic record keeping, obtaining data, adjusting account balances, and issuing automated instructions). Further, as an ordered combination, the method elements added nothing not already present in separately considered claims.16> (Alice)
  • A process of gathering and combining data that does not require input from a physical device. A process that employs mathematical algorithms to manipulate existing information to generate additional information without additional limitations to something more than a patent-ineligible data profile.17 (Digitech)
  • "A program that is used for the generic functions of storing, retrieving and verifying a chosen set of bingo numbers against a winning set of bingo numbers. The function performed by the computer at each step of the process is purely conventional."18 (Planet Bingo)
  • Invoking computers without adding an inventive concept because the computer functionality was generic and quite limited: a computer receives a request for a guarantee and transmits an offer of guarantee in return. Limiting the use of the abstract guarantee idea to a particular technological environment was insufficient.19 (buySAFE)
  • Instructing the practitioner to implement an abstract idea with routine, conventional activity at a high level of generality. Specifically, the data-gathering steps added nothing of practical significance to the underlying abstract idea. The steps of consulting and updating an activity log represent insignificant data-gathering steps and thus add nothing of practical significance to the underlying abstract idea. Nor did having the system actively restrict public access because it was considered insignificant pre-solution activity.20 (Ultramercial)
  • "Use of a generic scanner and computer to perform well-understood, routine, and conventional activities commonly used in industry. At most, the claims attempt to limit the abstract idea of recognizing and storing information from hard copy documents using a scanner and a computer to a particular technological environment."21 (Content Extraction)

Takeaway for Step 2 of Alice

From these limited cases, some markers have been set for determining whether the "something more" threshold is met. First, it appears helpful if any of the elements of the claim or the combination of elements recite novel steps or non-routine components. But, reciting a novel implementation of an abstract idea by itself does not turn the abstraction into something concrete. Novel implementations are especially unimportant in this analysis if the novel implementation is pre- or post-solution activity, that is, if the claim recites a token non-abstract claim limitation, which is not directly related to the invention's solution. Second, it helps if the combination of elements adds something not present in the individually considered steps. For example, the combination could improve the functioning of a computer or effect an improvement in another technology or technical field. When drafting an application, it is a good idea to include a discussion of improvements in technology. Finally, it helps to limit the claimed invention in a meaningful way so as to not cover building blocks of human ingenuity, for example, including the recitation of a physical device, especially if a claim is directed to a data structure or data profile. For this third point, the claims should not cover all implementations of the "abstract idea."
To achieve the "something more" threshold for computer-related applications, the patent should focus on technological improvements of computational efficiency, memory, and/or storage. For example, an application could save CPU processing resources, save time and/or improve memory management. Further, the patent should focus on any improvements in another technology that the invention leads to. Lastly, claiming physical, real-world limitations as a necessary part of the claimed invention may decrease the likelihood that the claim will be interpreted as seeking to improperly patent an abstract idea.


From Alice and subsequent Federal Circuit decisions, the patent system will likely remain an important vehicle for protecting the commercialization of computer-implemented inventions. Even though the patent eligibility of some of these inventions is still in flux, the courts have not outright precluded computer-implemented inventions from being considered patent-eligible—especially when the inventions include technological improvements. However, merely claiming a general-purpose computer to perform routine or conventional steps likely will not infuse patent-eligibility into a claim.


Comparison of claims in previous Supreme Court cases and the "abstract idea" identified therein by the Supreme Court in Alice


Claim Language

"Abstract Idea" Identified by the Supreme Court in Alice

Gottschalk v. Benson
The method of converting signals from binary coded decimal form into binary, which comprises the steps of:
  1. storing the binary coded decimal signals in a reentrant shift register;
  2. shifting the signals to the right by at least three places, until there is a binary '1′ in the second position of said register;
  3. masking out said binary '1′ in said second position of said register;
  4. adding a binary '1′ to the first position of said register;
  5. shifting the signals to the left by two positions;
  6. adding a '1′ to said first position; and
  7. shifting the signals to the right by at least three positions in preparation for a succeeding binary '1′ in the second position of said register.

An algorithm for converting binary-coded decimal numerals into pure binary form.22

Parker v. Flook
A method for updating the value of at least one alarm limit on at least one process variable involved in a process comprising the catalytic chemical conversion of hydrocarbons wherein said alarm limit has a current value of:
wherein Bo is the current alarm base and K is a predetermined alarm offset which comprises: 
  1. Determining the present value of said process variable, said present value being defined as PVL;
  2. Determining a new alarm base B1, using the following equation:
    B1=Bo(1.0 - F)+PVL(F)
    where F is a predetermined number greater than zero and less than 1.0;
  3. Determining an updated alarm limit which is defined as B1+K; and thereafter
  4. Adjusting said alarm limit to said updated alarm limit value.

A mathematical formula for computing alarm limits in a catalytic conversion process.23

Bilski v. Kappos
A method for managing the consumption risk costs of a commodity sold by a commodity provider at a fixed price, comprising the steps of:
  1. initiating a series of transactions between said commodity provider and consumers of said commodity wherein said consumers purchase said commodity at a fixed rate based upon historical averages, said fixed rate corresponding to a risk position of said consumer;
  2. identifying market participants for said commodity having a counter-risk position to said consumers; and
  3. initiating a series of transactions between said commodity provider and said market participants at a second fixed rate such that said series of market participant transactions balances the risk position of said series of consumer transactions.

A series of steps for hedging risk, including (1) initiating a series of financial transactions between providers and consumers of a commodity; (2) identifying market participants that have a counter-risk for the same commodity; and (3) initiating a series of transactions between those market participants and the commodity provider to balance the risk position of the first series of consumer transactions.24

Alice v. CLS Bank
A method of exchanging obligations as between parties, each party holding a credit record and a debit record with an exchange institution, and the credit records and debit records for exchange of predetermined obligations, the method comprising the steps of:
  1. creating a shadow credit record and a shadow debit record for each stakeholder party, to be held independently by a supervisory institution from the exchange institutions;
  2. obtaining from each exchange institution a start-of-day balance for each shadow credit record and shadow debit record;
  3. for every transaction resulting in an exchange obligation, the supervisory institution adjusting each respective party's shadow credit record or shadow debit record, allowing only those transactions that do not result in the value of the shadow debit record being less than the value of the shadow credit record at any time, each said adjustment taking place in chronological order; and
  4. at the end of day, the supervisory institution instructing on[e] of the exchange institutions to exchange credits or debits to the credit record and debit record of the respective parties in accordance with the adjustments of the said permitted transactions, the credits and debits being irrevocable, time invariant obligations placed on the exchange institutions.

A method of exchanging financial obligations between two parties using a third-party intermediary to mitigate settlement risk. The intermediary creates and updates "shadow" records to reflect the value of each party's actual accounts held at "exchange institutions," thereby permitting only those transactions for which the parties have sufficient resources.25


1.134 S. Ct. 2347 (U.S. 2014).

2.Id. at 2356.

3.79 FR 74618, December 16, 2014.


5.Digitech Image Techs. v. Elecs. for Imaging, Inc.,758 F.3d 1344, 1350 (Fed. Cir. 2014).

6.Planet Bingo, LLC v. VKGS LLC, 576 Fed App'x 1005, 1007 (Fed. Cir. 2014).

7.buySAFE, Inc. v. Google, Inc., 765 F.3d 1350, 1355 (Fed. Cir. 2014).

8Ultramercial, Inc. v. Hulu, LLC, 772 F.3d 709, 715 (Fed. Cir. 2014).

9.Content Extraction and Transmission LLC v. Wells Fargo Bank, National Association, 2013-1588, -1589, -2014-1112, -1687, at 7 (Fed. Cir. December 23, 2014).

10.DDR Holdings, LLC v. Hotels.com, L.P., 773 F.3d 1245 (Fed. Cir. 2014).

11. Diamond v. Diehr, 450 U.S. 175, 177 (1981).

12.Alice, at 2358.

13.DDR Holdings, at 1257.

14.Gottschalk v. Benson, 409 U.S. 63, 64, 67 (1972).

15.Parker v. Flook, 437 U.S. 584, 593, 594 (1978).

16.Alice, at 2359.

17.Digitech, at 1351.

18.Planet Bingo, at 1009.

19.buySAFE, at 1355.

20.Ultramercial, at 715-716.

21.Content Extraction, at 9.

22.Alice, at 2355-2356.



25.Id. at 2356.

The content of this article is intended to provide a general guide to the subject matter. Specialist advice should be sought about your specific circumstances.

To print this article, all you need is to be registered on Mondaq.com.

Click to Login as an existing user or Register so you can print this article.

In association with
Related Video
Up-coming Events Search
Font Size:
Mondaq on Twitter
Register for Access and our Free Biweekly Alert for
This service is completely free. Access 250,000 archived articles from 100+ countries and get a personalised email twice a week covering developments (and yes, our lawyers like to think you’ve read our Disclaimer).
Email Address
Company Name
Confirm Password
Mondaq Topics -- Select your Interests
 Law Performance
 Law Practice
 Media & IT
 Real Estate
 Wealth Mgt
Asia Pacific
European Union
Latin America
Middle East
United States
Worldwide Updates
Check to state you have read and
agree to our Terms and Conditions

Terms & Conditions and Privacy Statement

Mondaq.com (the Website) is owned and managed by Mondaq Ltd and as a user you are granted a non-exclusive, revocable license to access the Website under its terms and conditions of use. Your use of the Website constitutes your agreement to the following terms and conditions of use. Mondaq Ltd may terminate your use of the Website if you are in breach of these terms and conditions or if Mondaq Ltd decides to terminate your license of use for whatever reason.

Use of www.mondaq.com

You may use the Website but are required to register as a user if you wish to read the full text of the content and articles available (the Content). You may not modify, publish, transmit, transfer or sell, reproduce, create derivative works from, distribute, perform, link, display, or in any way exploit any of the Content, in whole or in part, except as expressly permitted in these terms & conditions or with the prior written consent of Mondaq Ltd. You may not use electronic or other means to extract details or information about Mondaq.com’s content, users or contributors in order to offer them any services or products which compete directly or indirectly with Mondaq Ltd’s services and products.


Mondaq Ltd and/or its respective suppliers make no representations about the suitability of the information contained in the documents and related graphics published on this server for any purpose. All such documents and related graphics are provided "as is" without warranty of any kind. Mondaq Ltd and/or its respective suppliers hereby disclaim all warranties and conditions with regard to this information, including all implied warranties and conditions of merchantability, fitness for a particular purpose, title and non-infringement. In no event shall Mondaq Ltd and/or its respective suppliers be liable for any special, indirect or consequential damages or any damages whatsoever resulting from loss of use, data or profits, whether in an action of contract, negligence or other tortious action, arising out of or in connection with the use or performance of information available from this server.

The documents and related graphics published on this server could include technical inaccuracies or typographical errors. Changes are periodically added to the information herein. Mondaq Ltd and/or its respective suppliers may make improvements and/or changes in the product(s) and/or the program(s) described herein at any time.


Mondaq Ltd requires you to register and provide information that personally identifies you, including what sort of information you are interested in, for three primary purposes:

  • To allow you to personalize the Mondaq websites you are visiting.
  • To enable features such as password reminder, newsletter alerts, email a colleague, and linking from Mondaq (and its affiliate sites) to your website.
  • To produce demographic feedback for our information providers who provide information free for your use.

Mondaq (and its affiliate sites) do not sell or provide your details to third parties other than information providers. The reason we provide our information providers with this information is so that they can measure the response their articles are receiving and provide you with information about their products and services.

If you do not want us to provide your name and email address you may opt out by clicking here .

If you do not wish to receive any future announcements of products and services offered by Mondaq by clicking here .

Information Collection and Use

We require site users to register with Mondaq (and its affiliate sites) to view the free information on the site. We also collect information from our users at several different points on the websites: this is so that we can customise the sites according to individual usage, provide 'session-aware' functionality, and ensure that content is acquired and developed appropriately. This gives us an overall picture of our user profiles, which in turn shows to our Editorial Contributors the type of person they are reaching by posting articles on Mondaq (and its affiliate sites) – meaning more free content for registered users.

We are only able to provide the material on the Mondaq (and its affiliate sites) site free to site visitors because we can pass on information about the pages that users are viewing and the personal information users provide to us (e.g. email addresses) to reputable contributing firms such as law firms who author those pages. We do not sell or rent information to anyone else other than the authors of those pages, who may change from time to time. Should you wish us not to disclose your details to any of these parties, please tick the box above or tick the box marked "Opt out of Registration Information Disclosure" on the Your Profile page. We and our author organisations may only contact you via email or other means if you allow us to do so. Users can opt out of contact when they register on the site, or send an email to unsubscribe@mondaq.com with “no disclosure” in the subject heading

Mondaq News Alerts

In order to receive Mondaq News Alerts, users have to complete a separate registration form. This is a personalised service where users choose regions and topics of interest and we send it only to those users who have requested it. Users can stop receiving these Alerts by going to the Mondaq News Alerts page and deselecting all interest areas. In the same way users can amend their personal preferences to add or remove subject areas.


A cookie is a small text file written to a user’s hard drive that contains an identifying user number. The cookies do not contain any personal information about users. We use the cookie so users do not have to log in every time they use the service and the cookie will automatically expire if you do not visit the Mondaq website (or its affiliate sites) for 12 months. We also use the cookie to personalise a user's experience of the site (for example to show information specific to a user's region). As the Mondaq sites are fully personalised and cookies are essential to its core technology the site will function unpredictably with browsers that do not support cookies - or where cookies are disabled (in these circumstances we advise you to attempt to locate the information you require elsewhere on the web). However if you are concerned about the presence of a Mondaq cookie on your machine you can also choose to expire the cookie immediately (remove it) by selecting the 'Log Off' menu option as the last thing you do when you use the site.

Some of our business partners may use cookies on our site (for example, advertisers). However, we have no access to or control over these cookies and we are not aware of any at present that do so.

Log Files

We use IP addresses to analyse trends, administer the site, track movement, and gather broad demographic information for aggregate use. IP addresses are not linked to personally identifiable information.


This web site contains links to other sites. Please be aware that Mondaq (or its affiliate sites) are not responsible for the privacy practices of such other sites. We encourage our users to be aware when they leave our site and to read the privacy statements of these third party sites. This privacy statement applies solely to information collected by this Web site.

Surveys & Contests

From time-to-time our site requests information from users via surveys or contests. Participation in these surveys or contests is completely voluntary and the user therefore has a choice whether or not to disclose any information requested. Information requested may include contact information (such as name and delivery address), and demographic information (such as postcode, age level). Contact information will be used to notify the winners and award prizes. Survey information will be used for purposes of monitoring or improving the functionality of the site.


If a user elects to use our referral service for informing a friend about our site, we ask them for the friend’s name and email address. Mondaq stores this information and may contact the friend to invite them to register with Mondaq, but they will not be contacted more than once. The friend may contact Mondaq to request the removal of this information from our database.


From time to time Mondaq may send you emails promoting Mondaq services including new services. You may opt out of receiving such emails by clicking below.

*** If you do not wish to receive any future announcements of services offered by Mondaq you may opt out by clicking here .


This website takes every reasonable precaution to protect our users’ information. When users submit sensitive information via the website, your information is protected using firewalls and other security technology. If you have any questions about the security at our website, you can send an email to webmaster@mondaq.com.

Correcting/Updating Personal Information

If a user’s personally identifiable information changes (such as postcode), or if a user no longer desires our service, we will endeavour to provide a way to correct, update or remove that user’s personal data provided to us. This can usually be done at the “Your Profile” page or by sending an email to EditorialAdvisor@mondaq.com.

Notification of Changes

If we decide to change our Terms & Conditions or Privacy Policy, we will post those changes on our site so our users are always aware of what information we collect, how we use it, and under what circumstances, if any, we disclose it. If at any point we decide to use personally identifiable information in a manner different from that stated at the time it was collected, we will notify users by way of an email. Users will have a choice as to whether or not we use their information in this different manner. We will use information in accordance with the privacy policy under which the information was collected.

How to contact Mondaq

You can contact us with comments or queries at enquiries@mondaq.com.

If for some reason you believe Mondaq Ltd. has not adhered to these principles, please notify us by e-mail at problems@mondaq.com and we will use commercially reasonable efforts to determine and correct the problem promptly.