throbber
Trials@uspto.gov
`Tel: 571-272-7822
`
`Paper 9
`Entered: September 30, 2014
`
`
`
`
`
`UNITED STATES PATENT AND TRADEMARK OFFICE
`
`BEFORE THE PATENT TRIAL AND APPEAL BOARD
`
`APPLE INC.,
`Petitioner,
`
`v.
`
`SMARTFLASH LLC,
`Patent Owner.
`
`Case CBM2014-00105
`Patent 7,334,720 B2
`
`
`
`
`
`
`
`
`
`Before JENNIFER S. BISK, RAMA G. ELLURU, NEIL T. POWELL,
`JEREMY M. PLENZLER, and MATTHEW R. CLEMENTS,
`Administrative Patent Judges.
`
`ELLURU, Administrative Patent Judge.
`
`DECISION
`
`Denying Institution of Covered Business Method Patent Review
`37 C.F.R. § 42.208
`
`
`
`
`
`

`

`CBM2014-00105 B2
`Patent 7,334,720
`
`A. Background
`
`INTRODUCTION
`
`Petitioner, Apple Inc. (“Apple”), filed a Petition (Paper 6, “Pet.”) to
`
`institute a covered business method patent review of claims 1, 3, 11, and 13–
`
`15 (“the challenged claims”) of U.S. Patent No. 7,334,720 (Ex. 1101, “the
`
`’720 patent”) pursuant to § 18 of the Leahy-Smith America Invents Act
`
`(“AIA”). Patent Owner, Smartflash LLC (“Smartflash”), filed a Preliminary
`
`Response (Paper 7, “Prelim. Resp.”). We have jurisdiction under 35 U.S.C.
`
`§ 324, which provides that a covered business patent review may not be
`
`instituted “unless . . . it is more likely than not that at least 1 of the claims
`
`challenged in the petition is unpatentable.”
`
`B. Asserted Grounds
`
`Apple contends that the challenged claims are unpatentable under 35
`
`U.S.C. §§ 102 and/or 103 based on the following grounds (Pet. 22–23, 45–
`
`80).
`
`Ginter1
`
`References
`
`Ginter and Maari2
`
`Ginter
`
`Ginter and Sato3
`
`Claims Challenged
`
`Basis
`
`§ 102
`
`§ 103
`
`1
`
`1
`
`§ 103
`
`1, 3, 11, and 13–15
`
`§ 103
`
`1, 3, 11, and 13–15
`
`
`1 U.S. Patent No. 5,915,019 (Ex. 1115) (“Ginter”).
`2 JP Patent Application Publication No. H10-269289 (including translation),
`published October 9, 1998 (Ex. 1119, “Maari”).
`3 JP Patent Application Publication No. H11-164058 (including translation),
`published June 18, 1999 (Ex. 1118, “Sato”).
`
`2
`
`

`

`CBM2014-00105 B2
`Patent 7,334,720
`
`References
`
`Basis
`
`Claims Challenged
`
`Ginter, Stefik ’2354, and
`Stefik ’9805
`
`§ 103
`
`1, 3, 11, and 13–15
`
`Ginter and Poggio6
`
`§ 103
`
`3, 11, and 13–15
`
`Ginter, Poggio, Stefik ’235,
`and Stefik ’980
`
`§ 103
`
`3, 11, and 13–15
`
`Petitioner also provides a declaration from Anthony J.
`
`Wechselberger.7 Ex. 1121.
`
`After considering the Petition and Preliminary Response, we
`
`determine that the ’720 patent is a covered business method patent. We
`
`further determine, however, that Apple has not demonstrated that it is more
`
`likely than not that at least one of the challenged claims is unpatentable.
`
`Therefore, we deny institution of a covered business method patent review
`
`of claims 1, 3, 11, and 13–15 of the ’720 patent.
`
`C. Related Matters
`
`The parties indicate that Smartflash has sued Apple for infringement
`
`of the ’720 patent and identify the following district court case: Smartflash
`
`LLC v. Apple Inc., Case No. 6:13-cv-447 (E.D. Tex.). Pet. 21; Papers 5, 8.
`
`
`4 U.S. Patent No. 5,530,235 (Ex. 1113) (“Stefik ’235”).
`5 U.S. Patent No. 5,629,980 (Ex. 1114) (“Stefik ’980”).
`6 European Patent Application, Publication No. EP 0809221 A2 (including
`translation), published November 26, 1997 (Ex. 1116, “Poggio”).
`7 On this record, we are not persuaded by Patent Owner’s argument that we
`should disregard the Wechselberger Declaration. See Prelim. Resp. 20–23.
`Patent Owner identifies purported omissions from the Declaration, but offers
`no evidence that Mr. Wechselberger used incorrect criteria, failed to
`consider evidence, or is not an expert in the appropriate field. Id.
`
`3
`
`

`

`CBM2014-00105 B2
`Patent 7,334,720
`
`The parties also indicate that the ’720 patent is the subject of a second case,
`
`to which Apple is not a party: Smartflash LLC v. Samsung, Case No. 6:13-
`
`cv-448 (E.D. Tex.). Id.
`
`Apple filed a concurrent petition for covered business method patent
`
`review of the ’720 patent: CBM2014-00104.8 In addition, Apple filed ten
`
`other petitions for covered business method patent review challenging
`
`claims of patents owned by Smartflash and disclosing similar subject matter:
`
`CBM2014-00102; CBM2014-00103; CBM2014-00106; CBM2014-00107;
`
`CBM2014-00108; CBM2014-00109; CBM2014-00110; CBM2014-00111;
`
`CBM2014-00112; and CBM2014-00113.
`
`D. The ’720 Patent
`
`The ’720 patent relates to “a portable data carrier for storing and
`
`paying for data and to computer systems for providing access to data to be
`
`stored” and the “corresponding methods and computer programs.”
`
`Ex. 1101, 1:6–10. Owners of proprietary data, especially audio recordings,
`
`have an urgent need to address the prevalence of “data pirates,” who make
`
`proprietary data available over the internet without authorization. Id. at
`
`1:15–41. The ’720 patent describes providing portable data storage together
`
`with a means for conditioning access to that data upon validated payment.
`
`Id. at 1:46–62. According to the ’720 patent, this combination of the
`
`payment validation means with the data storage means allows data owners to
`
`8 Patent Owner argues that the multiple petitions filed against the ’720 patent
`violate the page limit requirement of 37 C.F.R. § 42.24(a)(iii), but does not
`cite any authority to support its position. Prelim. Resp. 11–13. The page
`limit for petitions requesting covered business method patent review is 80
`pages (37 C.F.R. § 42.24(a)(iii)), and each of the ’104 and the ’105 Petitions
`meets that requirement.
`
`
`4
`
`

`

`CBM2014-00105 B2
`Patent 7,334,720
`
`make their data available over the internet without fear of data pirates. Id. at
`
`1:62–2:3.
`
`As described, the portable data storage device is connected to a
`
`terminal for internet access. Id. at 1:46–55. The terminal reads payment
`
`information, validates that information, and downloads data into the portable
`
`storage device from a data supplier. Id. The data on the portable storage
`
`device can be retrieved and output from a mobile device. Id. at 1:56–59.
`
`The ’720 patent makes clear that the actual implementation of these
`
`components is not critical and may be implemented in many ways. See, e.g.,
`
`id. at 26:13–16 (“The skilled person will understand that many variants to
`
`the system are possible and the invention is not limited to the described
`
`embodiments . . .”).
`
`E. Challenged Claims
`
`Petitioner challenges claims 1, 3, 11, and 13–15 of the ’720 patent.
`
`Claims 1, 3, and 14 are independent. Claims 11 and 13 depend from claim 3
`
`and claim 15 depends from claim 14. Claims 1 and 3 are illustrative of the
`
`claims at issue and recite the following.
`
`1.
`A method of controlling access to content data on a data carrier,
`the data carrier comprising non-volatile data memory storing content
`memory and non-volatile parameter memory storing use status data
`and use rules, the method comprising:
`
`receiving a data access request from a user for at least one
`content item of the content data stored in the nonvolatile data
`memory;
`
`reading the use status data and use rules from the parameter
`memory that pertain to use of the at least one requested content item;
`
`evaluating the use status data using the use rules to determine
`whether access to the at least one requested content item stored in the
`content memory is permitted; and
`
`5
`
`

`

`CBM2014-00105 B2
`Patent 7,334,720
`
`displaying to the user whether access is permitted for each of
`the at least one requested content item stored in the non-volatile data
`memory.
`
`Ex. 1101, 26:18–36.
`
`
`
`A data access terminal for retrieving data from a data supplier
`3.
`and providing the retrieved data to a data carrier, the terminal
`comprising:
`
`a first interface for communicating with the data supplier;
`
`a data carrier interface for interfacing with the data carrier;
`
`a program store storing code; and
`
`a processor coupled to the first interface, the data carrier
`interface, and the program store for implementing the stored code, the
`code comprising:
`
`code to read payment data from the data carrier and to forward
`the payment data to a payment validation system;
`
`code to receive payment validation data from the payment
`validation system;
`
`code responsive to the payment validation data to retrieve data
`from the data supplier and to write the retrieved data into the data
`carrier; and
`
`code responsive to the payment validation data to receive at
`least one access rule from the data supplier and to write the at least
`one access rule into the data carrier, the at least one access rule
`specifying at least one condition for accessing the retrieved data
`written into the data carrier, the at least one condition being dependent
`upon the amount of payment associated with the payment data
`forwarded to the payment validation system.
`
`Ex. 1101, 26:41-67.
`
`A. Claim Construction
`
`ANALYSIS
`
`In a covered business method patent review, claim terms are given
`
`their broadest reasonable interpretation in light of the specification in which
`
`6
`
`

`

`CBM2014-00105 B2
`Patent 7,334,720
`
`they appear. See 37 C.F.R. § 42.300(b). Applying that standard, we
`
`interpret the claim terms of the ’720 patent according to their ordinary and
`
`customary meaning, in the context of the patent’s written description. See In
`
`re Translogic Tech., Inc., 504 F.3d 1249, 1257 (Fed. Cir. 2007).
`
`For purposes of this decision, we must construe the following claim
`
`terms of the challenged claims as they are critical terms in the independent
`
`claims. Neither party proposed a construction for these terms.
`
`“use rule” and “access rule”
`
`Independent claim 1 requires parameter memory storing “use rules”
`
`and evaluating use status data using the “use rules” to determine whether
`
`access to the requested content item is permitted. Ex. 1101, 26:21–22, 30–
`
`33.
`
`While independent claims 3 and 14 do not recite “use rules,” they
`
`require receiving at least one “access rule” from the data supplier. The ’720
`
`patent Specification imparts the same meaning to “access rule” as “use rule.”
`
`For example, when discussing a particular embodiment, the Specification
`
`states:
`
`one or more content access rules is received from the system
`owner data supply computer and written to the smart Flash card
`so that each content data item has an associated use rule to
`specify under what conditions a user of the smart Flash card is
`allowed access to the content data item.
`
`Ex. 1101 at 22:4–9 (emphases added). Thus, we give the same construction
`
`to “use rules” and “access rule.”
`
`Claim 3 recites that the “at least one access rule specif[ies] at least one
`
`condition for accessing the retrieved data.” Similarly, in describing a
`
`particular embodiment, the ’720 patent Specification explains that each
`
`7
`
`

`

`CBM2014-00105 B2
`Patent 7,334,720
`
`content data item has an associated “use rule” “to specify under what
`
`conditions a user of the smart Flash card is allowed access to the content
`
`data item.” Ex. 1101, 22:4–9; see id. at 4:62–63 (a data carrier may store
`
`content “use rules pertaining to allowed use of stored data items.”)
`
`(emphasis added). The Specification explains that the data access device
`
`uses the use status data and “use rules” to determine what access is
`
`permitted to data stored on the data carrier. Id. at 9:21–23 (emphasis added).
`
`Accordingly, pursuant to the claim language and the ’720 patent
`
`Specification, we construe “use rule” and “access rule” as a rule specifying a
`
`condition under which access to content is permitted.
`
`For purposes of this decision, we determine that no other terms in the
`
`challenged claims require an express construction at this time.
`
`B. Covered Business Method Patent
`
`Section 18 of the AIA provides for the creation of a transitional
`
`program for reviewing covered business method patents. A “[c]overed
`
`business method patent” is a patent that “claims a method or corresponding
`
`apparatus for performing data processing or other operations used in the
`
`practice, administration, or management of a financial product or service,
`
`except that the term does not include patents for technological inventions.”
`
`AIA § 18(d)(1); see 37 C.F.R. § 42.301(a). A patent need have only one
`
`claim directed to a covered business method to be eligible for review. See
`
`Transitional Program for Covered Business Method Patents—Definitions of
`
`Covered Business Method Patent and Technological Invention; Final Rule,
`
`77 Fed. Reg. 48,734, 48,736 (Aug. 14, 2012) (Comment 8).
`
`8
`
`

`

`CBM2014-00105 B2
`Patent 7,334,720
`
`1. Financial Product or Service
`
`Apple asserts that because claim 14 “explicitly describes transferring
`
`money and allowing such a transfer, as well as restricting access based on
`
`payment, it clearly relates to a financial activity and providing a financial
`
`service.” Pet. 16. Based on this record, we agree with Apple that the subject
`
`matter recited by claim 14 is directed to activities that are financial in nature,
`
`namely data access conditioned on payment validation. Claim 14 recites:
`
`writing the at least one access rule into the data carrier, the at
`least one access rule specifying at least one condition for
`accessing the retrieved data written into the data carrier, the at
`least one condition being dependent upon the amount of
`payment associated with the payment data forwarded to the
`payment validation system.
`
`We are persuaded that payment validation is a financial activity, and
`
`conditioning data access based on the amount of payment associated with
`
`the payment data forwarded to the payment validations system amounts to a
`
`financial service. This is consistent with the Specification of the ’720
`
`patent, which confirms claim 14’s connection to financial activities by
`
`stating that the invention “relates to a portable data carrier for storing and
`
`paying for data.” Ex. 1101, 1:6–7. The Specification also states repeatedly
`
`that the disclosed invention involves managing access to data based on
`
`payment validation. See, e.g., Ex. 1101, 1:46–49, 2:4–19, 3:19–27, 3:50–54,
`
`7:62–8:9, 8:21–34.
`
`Smartflash disagrees that claim 14 satisfies the financial-in-nature
`
`requirement of AIA § 18(d)(1), arguing that that section should be
`
`interpreted narrowly to cover only technology used specifically in the
`
`financial or banking industry. Prelim. Resp. 5–8. Smartflash cites to
`
`9
`
`

`

`CBM2014-00105 B2
`Patent 7,334,720
`
`various portions of the legislative history as support for its proposed
`
`interpretation. Id.
`
`We do not agree that the phrase “financial product or service” in
`
`§ 18(d)(1) of the AIA is as limited as Smartflash proposes. The AIA does
`
`not include as a prerequisite for covered business method patent review, a
`
`“nexus” to a “financial business,” but rather a “method or corresponding
`
`apparatus for performing data processing or other operations used in the
`
`practice, administration, or management of a financial product or
`
`service . . .” AIA § 18(d)(1). Further, contrary to Patent Owner’s view of
`
`the legislative history, the legislative history indicates that the phrase
`
`“financial product or service” is not limited to the products or services of the
`
`“financial services industry” and is to be interpreted broadly. CBM Rules,
`
`77 Fed. Reg. at 48,735–36. For example, the “legislative history explains
`
`that the definition of covered business method patent was drafted to
`
`encompass patents ‘claiming activities that are financial in nature, incidental
`
`to a financial activity or complementary to a financial activity.’” Id. (citing
`
`157 Cong. Rec. S5432 (daily ed. Sept. 8, 2011) (statement of Sen.
`
`Schumer)).
`
`In addition, Smartflash asserts that claim 14 is not directed to an
`
`apparatus or method that is financial in nature because claim 14 “omits the
`
`specifics of how payment is made.” Prelim. Resp. 8. We are not persuaded
`
`by this argument because § 18(d)(1) of the AIA does not include such a
`
`requirement, nor does Patent Owner point to any other authority that makes
`
`such a requirement. Id. We determine that because payment is required by
`
`claim 14, as Patent Owner acknowledges (id.), the financial-in-nature
`
`requirement of § 18(d)(1) is satisfied.
`
`10
`
`

`

`CBM2014-00105 B2
`Patent 7,334,720
`
`For the reasons stated above, and based on the particular facts of this
`
`proceeding, we conclude that the ’720 patent includes at least one claim that
`
`meets the financial-in-nature requirement of § 18(d)(1) of the AIA.
`
`2. Exclusion for Technological Inventions
`
`Apple asserts that claim 14 does not fall within § 18(d)(1)’s exclusion
`
`for “technological inventions.” Pet. 17–21. In particular, Apple argues that
`
`claim 14 “does not claim ‘subject matter as a whole [that] recites a
`
`technological feature that is novel and unobvious over the prior art[] and
`
`solves a technical problem using a technical solution.’” Id. at 17 (quoting
`
`37 C.F.R. § 42.301(b)). Smartflash disagrees and argues that claim 14, as a
`
`whole, recites at least one technological feature. Prelim. Resp. 9–11.
`
`We are persuaded that claim 14 as a whole does not recite a
`
`technological feature that is novel and unobvious over the prior art. The
`
`claimed “portable data carrier” is a generic hardware device known in the
`
`prior art. The Specification discloses, for instance, that a portable data
`
`carrier may be a “standard smart card.” See Ex. 1101, 11:36–39; Pet. 17.
`
`Claim 14 also recites a “payment validation system.” The Specification,
`
`however, discloses that the required payment validation system may be one
`
`that is already in use or otherwise commercially available. For example,
`
`“[t]he payment validation system may be part of the data supplier’s
`
`computer systems or it may be a separate e-payment system.” Id. at 8:64–
`
`66; see id. at 13:46–58.
`
`In addition, the ’720 patent makes clear that the asserted novelty of
`
`the invention is not in any specific improvement of software or hardware,
`
`but in the method of controlling access to data. For example, the ’720 patent
`
`states that “there is an urgent need to find a way to address the problem of
`
`11
`
`

`

`CBM2014-00105 B2
`Patent 7,334,720
`
`data piracy,” (id. at 1:40–41) while acknowledging that the “physical
`
`embodiment of the system is not critical and a skilled person will understand
`
`that the terminals, data processing systems and the like can all take a variety
`
`of forms” (id. at 12:38–41). Thus, we determine that claim 14 is merely the
`
`recitation of a combination of known technologies, which indicates that it is
`
`not a patent for a technological invention. See Office Patent Trial Practice
`
`Guide, 77 Fed. Reg. at 48,764.
`
`Smartflash also argues that claim 14 falls within § 18(d)(1)’s
`
`exclusion for “technological inventions” because it is directed towards
`
`solving the technological problem of “data piracy” with the technological
`
`solution of “(1) a data carrier from which payment data is read and to which
`
`retrieved data from a data supplier is written and (2) at least once access
`
`rule, also stored on the data carrier, specifying at least one condition for
`
`accessing the retrieved data written into the data carrier.” Prelim. Resp. 9–
`
`10. We are not persuaded by this argument because, as Petitioner argues,
`
`the problem being solved by claim 14 is a business problem—data piracy.
`
`Pet. 21. For example, the Specification states that “[b]inding the data access
`
`and payment together allows the legitimate owners of the data to make the
`
`data available themselves over the internet without fear of loss of revenue,
`
`thus undermining the position of data pirates.” Ex. 1101, 1:66–2:3.
`
`Therefore, based on the particular facts of this proceeding, we conclude that
`
`claim 14 does not recite a technological invention and is eligible for a
`
`covered business method patent review.
`
`12
`
`

`

`CBM2014-00105 B2
`Patent 7,334,720
`
`3. Conclusion
`
`In view of the foregoing, we conclude that the ’720 patent is a covered
`
`business method patent under AIA § 18(d)(1) and is eligible for review
`
`using the transitional covered business method patent program.
`
`C. Claim 1
`
`Petitioner asserts that independent claim 1 is anticipated by Ginter or
`
`is rendered obvious by Ginter alone or in combination with various other
`
`references, including Maari, Sato, and Stefik.9 Pet. 22–23. Petitioner
`
`provides one claim chart for claim 1. Pet. 45–54.
`
`Claim 1 requires “use rules,” which, as explained above, we construe
`
`as a rule specifying a condition under which access to content is permitted.
`
`Specifically, claim 1 recites “non-volatile parameter memory storing [ ] use
`
`rules,” “reading the [ ] use rules from the parameter memory that pertain to
`
`use of the at least one requested content item,” and “evaluating the use status
`
`data using the use rules to determine whether access to the at least one
`
`requested content item stored in the content memory is permitted.”
`
`Petitioner’s claim chart states that the claimed “use rules” corresponds to
`
`“(e.g., billing method map MDE and/or budget method UDE).” Pet. 48, 51;
`
`see Pet. 52. We determine that Petitioner has not shown sufficiently that
`
`Ginter alone or in combination with other references discloses or teaches
`
`“use rules.”
`
`
`9 Petitioner refers to Stefik ’235 and Stefik ’980 collectively as “Stefik” and
`argues that they should be considered collectively as a single reference
`because, according to Petitioner, Stefik ’235 incorporates Stefik ’980 by
`reference. Pet. 9, n.5. Patent Owner disagrees. Prelim. Resp. 15–17. We
`do not reach this issue because neither Stefik ’235 nor Stefik ’980 affects our
`analysis.
`
`13
`
`

`

`CBM2014-00105 B2
`Patent 7,334,720
`
`Petitioner does not provide adequate argument or explanation as to
`
`why Ginter’s billing method map MDE and/or budget UDE satisfies the
`
`claimed “use rules.” Petitioner’s claim chart provides a lengthy string
`
`citation to numerous portions of Ginter, without providing the corresponding
`
`disclosure. Specifically, Petitioner provides the following:
`
`use rules (e.g., billing method map MDE and/or budget method
`UDE). See, e.g., Ex. 1115 Fig. 8; FIG. 71; 169:4-6 (“In one
`alternate embodiment, SPU 500 may have sufficient internal,
`non-volatile memory to allow it to store some or all of secure
`database 610.”); 229:18-20; 230:7-19; 126:36-44; 181:7-12;
`186:56-62; 187:52-57; 190:45-57; 62:64-67; 264:62-265-16;
`128:23-36; 59:17-23; Ex. 1121, Appx D 69-73.
`
`See e.g., Pet. 48 (footnotes omitted). Without corresponding argument and
`
`explanation, Petitioner’s claim chart does not persuade us that Ginter’s
`
`billing method MDE or budget method UDE satisfies the claimed “use
`
`rules.”
`
`Our review of Ginter does not persuade us otherwise. Ginter
`
`describes billing method map MDE as “a price list, table, or parameters to
`
`the billing amount calculation algorithm” (Ex. 1115, 190:47–50), and budget
`
`method UDE as “limitations on usage of information content 304, and how
`
`usage will be paid for” (id. at 59:17–20). Petitioner does not explain
`
`sufficiently, however, why a price list (billing method map MDE) and/or
`
`limitations on information content usage (budget method UDE), for
`
`example, discloses or teaches “use rules.” To the extent Petitioner alleges
`
`that Ginter’s “access limit” or “budget value” (Pet. 52) satisfies the claimed
`
`“use rules,” Petitioner does not explain why an access limit or budget value,
`
`particularly by itself, teaches a rule specifying a condition under which
`
`access to content is permitted.
`
`14
`
`

`

`CBM2014-00105 B2
`Patent 7,334,720
`
`Petitioner has not demonstrated more likely than not that Ginter’s
`
`budget method UDE renders obvious the claimed “use rules.” See Pet. 51
`
`n.23. Petitioner discusses Ginter “using a budget method UDE specific to a
`
`particular VDE content object to limit access to that VDE content object . . .
`
`to a finite amount,” and simply concludes that one skilled in the art “would
`
`have considered it at minimum obvious to use a budget method UDE
`
`pertaining to a particular content item (e.g., VDE content object) to limit
`
`user access to that particular content item (e.g., VDE content object).” Id.
`
`Petitioner does not provide any further rationale as to why claim 1 would
`
`have been obvious over Ginter, and the cited portion of the Wechselberger
`
`Declaration simply reiterates Petitioner’s contentions and conclusory
`
`reasoning. See Pet. 51, n.24; Ex. 1121, App. D 75–77.
`
`
`
`Petitioner’s claim chart also states that Stefik ’235 and Stefik ’980
`
`disclose the claimed “use rules.” Pet. 48. Petitioner provides no persuasive
`
`argument or explanation of why the relied upon disclosure from Stefik ’235
`
`and Stefik ’980 corresponds to “use rules.” Without corresponding
`
`argument or explanation, Petitioner’s claim chart does not persuade us that
`
`either Stefik ’235 or Stefik ’980 teaches “use rules.” Our review of the
`
`Petition does not indicate that Petitioner refers to any other reference as
`
`teaching the claimed “use rules.”
`
`For the reasons set forth above, Petitioner has failed to establish that,
`
`more likely than not, it would prevail in demonstrating that claim 1 is
`
`unpatentable as anticipated by Ginter or obvious over Ginter alone, or in
`
`combination with any other asserted reference.
`
`15
`
`

`

`CBM2014-00105 B2
`Patent 7,334,720
`
`D. Claim 3
`
`Petitioner asserts that independent claim 3 is rendered obvious over
`
`Ginter, alone or in combination with various other references, including
`
`Stefik, Sato, and Poggio. Pet. 22–23. Petitioner provides one claim chart
`
`for claim 3. Pet. 54–65.
`
`Claim 3 requires an “access rule,” which we’ve construed as a rule
`
`specifying a condition under which access to content is permitted.
`
`Specifically, claim 3 recites “code . . . to receive at least one access rule
`
`from the data supplier,” “code . . . to write the at least one access rule into
`
`the data carrier,” and “the at least one access rule specifying at least one
`
`condition for accessing the retrieved data written into the data carrier.”
`
`Petitioner’s claim chart states that the claimed “access rule” corresponds to
`
`“(e.g., billing method map MDE and/or budget method UDE).” Pet. 62, 64;
`
`see also Pet. 63. For the same reasons discussed above as to why Ginter
`
`does not disclose or teach “use rules,” as recited in claim 1, we determine
`
`that Petitioner has not shown sufficiently that Ginter, alone or in
`
`combination with other references, teaches an “access rule.”
`
`Petitioner’s claim chart for claim 3 cites the following disclosure from
`
`Ginter:
`
`“Budgets” 308 shown in FIG. 5B are a special type of
`“method” 1000 that may specify, among other things,
`limitations on usage of information content 304, and how usage
`will be paid for. Budgets 308 can specify, for example, how
`much of the total information content 304 can be used and/or
`copied. The methods 310 may prevent use of more than the
`amount specified by a specific budget.
`
`Pet. 63 (citing Ex. 1115, 59:17–23). This disclosure indicates that Ginter’s
`
`Budgets 308 can specify a limiting value. As discussed above, however,
`
`16
`
`

`

`CBM2014-00105 B2
`Patent 7,334,720
`
`Petitioner does not explain why a limiting value, particularly by itself,
`
`teaches a rule specifying a condition under which access to content is
`
`permitted.
`
`
`
`In addition, claim 3 recites “code responsive to the payment validation
`
`data to receive at least one access rule from the data supplier.” Petitioner’s
`
`claim chart asserts that Ginter teaches the “responsive to the payment
`
`validation data” element because the alleged “access rule” is “received
`
`together with the VDE content object and thus responsive to the payment
`
`validation data.” Pet. 62 (citations omitted). We are not persuaded by
`
`Petitioner’s conclusory statement that the access rule is received in response
`
`to the payment validation data because it is received together with the VDE
`
`content object. Our review of the Petition does not indicate that Petitioner
`
`refers to any other reference as teaching this claim limitation.
`
`
`
`Furthermore, claim 3 requires “at least one access rule specifying at
`
`least one condition for accessing the retrieved data . . . the at least one
`
`condition being dependent upon the amount of payment associated with the
`
`payment data forwarded to the payment validation system.” For this claim
`
`element, Petitioner’s claim chart provides the following:
`
`Ginter further discloses that the at least one access rule (e.g., the
`billing method map MDE and/or budget method UDE) depends
`upon the amount of payment associated with the payment data
`forwarded to the payment validation system (e.g., is dependent
`upon the amount a user is charged to access the VDE content
`object). See, e.g., Ex. 1115 Fig,. 72D; 28:21-42; Ex. 1121
`App[.] D 114-15.
`
`Pet. 64; see also id. at 65. Petitioner alleges that the “access rule” “is
`
`dependent upon the amount a user is charged to access the VDE content,”
`
`but does not explain why that disclosure teaches “at least one access rule
`
`17
`
`

`

`CBM2014-00105 B2
`Patent 7,334,720
`
`specifying at least one condition for accessing the retrieved data . . . the at
`
`least one condition being dependent upon the amount of payment associated
`
`with the payment data forwarded to the payment validation system.” Id. In
`
`other words, the amount a user is charged to access content may occur after
`
`the amount of payment associated with the payment data is forwarded to the
`
`payment validation system. Petitioner has not persuaded us that the amount
`
`a user is charged is the same amount of payment forwarded to the payment
`
`validation system.
`
`
`
`Petitioner’s claim chart also refers to disclosure from Poggio for this
`
`claim element. Specifically, Petitioner’s claim chart provides the following.
`
`Additionally, Poggio also discloses receiving at least one access
`rule (e.g., license information) specifying at least one condition
`for accessing the retrieved data (e.g., a vendor product can be
`rented or purchased) from a data supplier (e.g., web server)
`responsive to the payment validation data (confirmation that the
`payment has been made). See, e.g., Ex. 1116 Fig. 7; 9:56-10:25;
`10:41-53; Ex. 1121 App[.] D 118-20.
`
`Pet. 65. Petitioner, however, fails to explain why receiving an access
`
`rule in response to “payment validation data” or “confirmation that the
`
`payment has been made” teaches “at least one access rule specifying
`
`at least one condition for accessing the retrieved data . . . the at least
`
`one condition being dependent upon the amount of payment
`
`associated with the payment data forwarded to the payment validation
`
`system.” For example, Petitioner does not explain why the amount of
`
`the payment that was made is the same amount of payment associated
`
`with the payment data forwarded to the payment validation system.
`
`The Petition does not indicate that Petitioner refers to any other
`
`reference as teaching this claim limitation.
`
`18
`
`

`

`CBM2014-00105 B2
`Patent 7,334,720
`
`For the reasons set forth above, Petitioner has failed to establish that it
`
`is more likely than not that it would prevail in demonstrating that claim 3 is
`
`rendered obvious over Ginter, alone or in combination with any other
`
`asserted reference. For the same reasons, we determine that Petitioner has
`
`failed to establish that it is more likely than not that it would prevail in
`
`demonstrating that claims 11 and 13, which depend from claim 3, are
`
`rendered obvious over Ginter, alone or in combination with any other
`
`asserted reference.
`
`E. Claims 14 and 15
`
`Petitioner asserts that independent claim 14 is rendered obvious over
`
`Ginter, alone or in combination with various other references, including
`
`Sato, Stefik, and Poggio. Pet. 22–23. Petitioner provides one claim chart
`
`for claim 14. Pet. 72–77.
`
`Claim 14 requires an “access rule,” which we’ve construed as a rule
`
`specifying a condition under which access to content is permitted.
`
`Specifically, claim 14 recites “receiving at least one access rule from the
`
`data supplier,” “writing the at least one access rule into the data carrier,” and
`
`“the at least one access rule specifying at least one condition for accessing
`
`the retrieved data written into the data carrier, the at least one condition
`
`being dependent

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket