throbber
Covered Business Method Patent Review
`United States Patent No. 8,033,458
`
`IN THE UNITED STATES PATENT AND TRADEMARK OFFICE
`
`
`
`Petitioner: Apple Inc.
`
`Attorney Docket No.:
`
` 104677-5008-807
`Customer No. 28120
`

`Inventor: Hulst et al.
`United States Patent No.: 8,033,458 §
`Formerly Application No.: 12/943,847 §
`Issue Date: October 11, 2011

`Filing Date: November 10, 2010

`Former Group Art Unit: 2887

`Former Examiner: Thien M. Le

`
`For: Data Storage and Access Systems
`
`MAIL STOP PATENT BOARD
`Patent Trial and Appeal Board
`United States Patent and Trademark Office
`Post Office Box 1450
`Alexandria, Virginia 22313-1450
`
`DECLARATION OF ANTHONY J. WECHSELBERGER IN SUPPORT OF
`APPLE INC.’S PETITION FOR COVERED BUSINESS METHOD
`PATENT REVIEW OF UNITED STATES PATENT NO. 8,033,458
`PURSUANT TO 35 U.S.C. § 321, 37 C.F.R. § 42.304
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Apple Exhibit 1021 Page 00001
`
`

`

`I, Anthony J. Wechselberger, declare as follows:
`
` Covered Business Method Patent Review
`United States Patent No. 8,033,458
`
`I.
`INTRODUCTION
`1. My name is Anthony Wechselberger. I am the President of Entropy
`
`Management Solutions (EMS), a consulting company I founded in 1999. I have been
`
`retained by Apple Inc. to provide assistance regarding U.S. Patent No. 8.033,458 (“the
`
`’458 patent”). Specifically, I have been asked to consider the validity of claims 1, 6, 7,
`
`8, 10, and 11 of the ’458 patent (“the challenged claims”). I have personal knowledge
`
`of the facts and opinions set forth in this declaration, and, if called upon to do so, I
`
`would testify competently thereto.
`
`2. My areas of expertise include broadcast and broadband content
`
`distribution networks and communications infrastructures (Internet, broadcast, cable,
`
`satellite and wireless mediums) including one-way and two-way interactive
`
`architectures, computer networks, communications systems technologies and
`
`equipment, various content and information distribution and merchandizing channels,
`
`digital television, digital cinema, interactive media/multimedia systems, Internet
`
`technologies (including but not limited to delivering content via the Internet,
`
`communications standards and protocols), digital rights management (DRM), physical
`
`media and file based and streaming content delivery, and other areas of expertise
`
`relevant to the technologies of this matter. Attached hereto as Appendix A is a true
`
`and correct copy of my Curriculum Vitae describing my background and experience.
`
`
`
`
`1
`
`Page 00002
`
`

`

` Covered Business Method Patent Review
`United States Patent No. 8,033,458
`I am currently the President of Entropy Management Solutions
`
`3.
`
`(“EMS”), a position I have held since I founded the company in 1999. In this
`
`capacity I perform consulting services related to technology and business
`
`development, content management, distribution and merchandizing, systems
`
`engineering and product design in the areas of industrial and consumer broadband
`
`and multimedia technologies and associated commercial systems.
`
`4.
`
`I have forty years of experience working with high technology systems
`
`related to military, commercial, and consumer communication systems and networks.
`
`I have held various design, leadership and executive positions in, for example,
`
`engineering, operations, sales and marketing, and product management at leading
`
`companies in those fields, such as TV/COM International, Inc. (TV/COM) and Oak
`
`Communications, Inc. Over many years I have published and/or presented a number
`
`of articles and papers related to content/information creation,
`
`transmission/distribution and reception/consumption in various media sectors,
`
`including cable, satellite, broadcast/wireless, Internet and digital cinema. Attached as
`
`part of Appendix A is a list of my publications.
`
`5.
`
`I specialize in the areas of digital communications technologies, systems
`
`and networks, including infrastructures, signal processing, network management and
`
`command and control, and information security as used for content management,
`
`merchandizing and delivery. My background includes much experience with
`
`interactive and client-server technologies, such as those used in broadband and
`
`
`
`
`2
`
`Page 00003
`
`

`

` Covered Business Method Patent Review
`United States Patent No. 8,033,458
`Internet networks. Network management and command and control refers to the
`
`technical oversight and management of communication systems and equipment
`
`within a distribution system to direct both the transmission equipment (e.g., network
`
`infrastructures, servers, hubs, nodes, head ends and uplinks etc.) and receiving
`
`equipment (e.g., personal computer, television, set top box, handset/mobile device or
`
`other consumer appliance) as to communications, applications and set-up and
`
`operation in order to perform required features and functions.
`
`6.
`
`As a Vice President at Oak Communications (1980s) and Chief
`
`Technology Officer at TV/COM (1990s), I was involved in the development of
`
`terrestrial broadcast, satellite uplink and cable head end industrial equipment for
`
`television transmissions, as well as consumer appliance equipment such as STBs and
`
`other home based or home networked devices. All of these architectures included
`
`computer control systems for network and associated network device command and
`
`control, and for management of content distribution and consumer appliance
`
`functions.
`
`7.
`
`I was involved from the start with the development and evolution of
`
`modern consumer digital audio and video communications systems and technologies.
`
`In 1991, my employer, TV/COM, and I began to participate in the International
`
`Organization for Standardization (ISO) MPEG-2 digital television standards
`
`initiatives, and, in the following year, in both the both the European Digital Video
`
`Broadcast (DVB) and U.S. Advanced Television Systems Committee (ATSC) forums
`
`
`
`
`3
`
`Page 00004
`
`

`

` Covered Business Method Patent Review
`United States Patent No. 8,033,458
`(which were based upon MPEG-2). I was an active participant and contributor to the
`
`first two standard-setting bodies, and was a voting member of the ATSC. As Chief
`
`Technology Officer of TV/COM, I developed a business strategy based on
`
`supporting open international standards for digital television (DTV). In the mid
`
`1990s, as the technologies and standards in support of DTV moved towards
`
`implementation, the dawn of the Internet age arrived. This had a dramatic impact on
`
`the way broadband systems engineers like me began to plan for the future. This is
`
`because the concept of convergence—the melding of traditional broadband
`
`communications systems and equipment, computers and computer networks, and the
`
`telecommunications worlds—was changing the communications infrastructure and
`
`technology landscape. When television distribution went all-digital, the information
`
`of television became simply “data”— and it became possible for the technologies of
`
`digital television, computers and computer networks and the telephony industry
`
`(which was in the midst of its transition to digital infrastructure that began in the:
`
`1970s) to coalesce. Support for on-line and Internet services demanded a high
`
`performance two-way data transmission capability, and so broadband network
`
`providers began to upgrade their distribution infrastructures accordingly.
`
`8.
`
`In conjunction with this convergence, as TV/COM’s Chief Technology
`
`Officer I directed the expansion of our network products into broadband data
`
`communications generally, from an initial focus on digital television. Networks
`
`became more advanced in order to support real-time interaction between consumers
`
`
`
`
`4
`
`Page 00005
`
`

`

` Covered Business Method Patent Review
`United States Patent No. 8,033,458
`and information sources within the network. Interactive and on-line applications led
`
`to rapid adoption of client-server information access approaches (typical of the
`
`computer industry) in the products and technologies I worked with for content
`
`delivery and network command and control functions. Starting in the early 1990s the
`
`ubiquitous set top box began to evolve from a minimalist appliance towards its
`
`current status as a communications hub of the consumer’s media room. In this same
`
`time period, the PC had also become a ubiquitous consumer appliance, and with the
`
`Internet age came much innovation in electronic information distribution and
`
`electronic merchandizing – that is, technology related to complementing physical
`
`information media and brick and mortar institutions with all-electronic digital
`
`alternatives. This was an explosive period of so called digital rights management
`
`(“DRM”), which I will discuss in more detail below. I and TV/COM were part of
`
`this evolution until TV/COM was purchased in 1999.
`
`9.
`
`In my consulting work I have continued to work with technologies and
`
`network infrastructures for content distribution and management. My current work
`
`involves both traditional and newly developing architectures and distribution
`
`channels. As an example of the latter, I am the chief security systems architect on
`
`behalf of the six major Hollywood studios for their “Digital Cinema Initiatives” (DCI)
`
`consortium.1 DCI develops and evolves the specifications for transitioning first run
`
`
`1 See: http://www.dcimovies.com
`
`
`
`
`5
`
`Page 00006
`
`

`

` Covered Business Method Patent Review
`United States Patent No. 8,033,458
`theatrical movie releases from film to digital for distribution and exhibition display. I
`
`am responsible for all elements of command and control and digital rights
`
`management (DRM) for digital cinema system design and implementation. I also
`
`represent DCI at the Society of Motion Picture and Television Engineers (SMPTE),
`
`which is developing the set of internationally recognized standards for global adoption
`
`of digital cinema. The migration to all-digital distribution impacts other content
`
`distribution channels such as early window release for hospitality, airplane and
`
`cable/satellite video-on-demand (VOD), as well as newer so called “over-the-top”
`
`distribution channels based on Internet distribution. I have also been a strategy and
`
`technology consultant to content management and distribution entities in those areas.
`
`10. The technologies of the ’458 patent and its family relate generally to
`
`apparatus, systems and methods to download content over a network from a source
`
`location to a data carrier storage device via an intermediary device called a data access
`
`terminal. The terminal serves the role of qualifying the downloading to confirmation
`
`of a payment process, after which content on the data carrier can be consumed by a
`
`user via a rendering device. This involves methods and technologies to collect (select
`
`or source), distribute and deliver content to consumers, who interact with supplied
`
`information and supporting network infrastructure in real time. My experience with
`
`interactive broadband systems and technologies stretches from the late 1970s until
`
`today, inclusive of similar network architectures, systems and equipment, and
`
`associated consumer appliances.
`
`
`
`
`6
`
`Page 00007
`
`

`

` Covered Business Method Patent Review
`United States Patent No. 8,033,458
`11. My consulting practice today includes a balance of technology and
`
`systems engineering services and assistance to the legal community as a technology
`
`consultant and/or expert witness. I have been accepted to provide, and have
`
`provided expert testimony in the areas of multimedia technologies and associated
`
`networks as used for content management and delivery on many occasions.
`
`12.
`
`I have a Bachelors degree and a Master’s degree in Electrical
`
`Engineering, conferred by the University of Arizona in 1974 and San Diego State
`
`University in 1979, respectively. I also completed the Executive Program for
`
`Scientists and Engineers at the University of California at San Diego in 1984. I am a
`
`named inventor on two patents, U.S. Patent No. 4,531,020, “Multi-layer Encryption
`
`System for the Broadcast of Encrypted Information,” and U.S. Patent No. 5,113,440,
`
`“Universal Decoder.”
`
`13. A listing of testimony that I have provided in the last five years is
`
`attached hereto as Appendix B. I am being compensated for my time spent in
`
`connection with this case at a flat rate of $325 per hour (plus expenses). I am being
`
`paid regardless of the facts I know or discover and/or the conclusions or opinions I
`
`reach. I have no personal interest or financial stake in the outcome of this case.
`
`14.
`
`In preparing my opinions I have considered the materials itemized in
`
`Appendix C.
`
`
`
`
`7
`
`Page 00008
`
`

`

` Covered Business Method Patent Review
`United States Patent No. 8,033,458
`II. THE ’458 PATENT
`15. The ’458 patent, entitled “Data Storage and Access Systems,” issued on
`
`October 11, 2011, to assignee Smartflash Technologies Limited and named inventors
`
`Hermen-ard Hulst and Patrick Racz. The ’458 patent purports to cover “[d]ata
`
`storage and access systems [that] enable downloading and paying for data such as
`
`audio and video data, text, software, games and other types of data.” See, e.g., Ex.
`
`1001, the ’458 patent, at Abstract. The alleged invention applies classical client-server
`
`models in a multi-stage architecture that revolves around appliances and methods for
`
`loading data into a memory storage device generally referred to as a data carrier. The
`
`user can then access the data subject to certain conditions.
`
`16.
`
`I have analyzed claims 1, 6, 7, 8, 10, and 11 of the ’458 patent and
`
`reviewed the File History of the ’458 patent (Ex. 1004).
`
`17. The ’458 patent issued from application number 12/943,847, which was
`
`filed on November 10, 2010. This application issued from a chain of applications
`
`claiming priority to United Kingdom application no. 9925227, filed October 25, 1999.
`
`18. The Examiner considering the application leading to the ’458 patent
`
`issued a first non-final office action on January 13, 2011. The Examiner rejected
`
`claims 1, 2, 5, 7-8, 14-16, and 24-25 under 35 U.S.C. § 102(b) as being anticipated by
`
`U.S. Patent 4,697,073 (“the Hara patent”). (Ex. 1004, 1/13/2011 OA, at 2). Claims
`
`17-23 were allowed, and claims 3-4, 6, and 9-13 were deemed allowable and objected
`
`to as being dependent upon a rejected base claim. (Ex. 1004, 1/13/2011 OA, at 3).
`
`
`
`
`8
`
`Page 00009
`
`

`

` Covered Business Method Patent Review
`United States Patent No. 8,033,458
`The Examiner remarked that the prior art did not disclose “a data access device
`
`comprising: a user interface, a data carrier interface, a program store, a processor, a
`
`code having the functions and characteristics as recited in claim 17” or “a portable
`
`data carrier as recited in claim 1 further including the limitations of claims 3-4, 6 and
`
`9-13.” (Ex. 1004, 1/13/2011 OA, at 3).
`
`19. Applicants filed a reply to the non-office action on February 10, 2011.
`
`Applicants cancelled claims 1, 2, 5, 7-8, 14-16, and 24-25; rewrote claims 3, 6, and 9-
`
`13 in independent form; and added new claims 26-27. (Ex. 1004, 2/10/2011 Amend.,
`
`at 7).
`
`20. The Examiner issued a second non-final office action on April 29, 2011.
`
`The Examiner rejected application claims 11-13 and 26 under 35 U.S.C. § 102(e) as
`
`being anticipated by U.S. Patent 6,747,930 (“the Weldon patent”), and rejected
`
`application claim 27 under 35 U.S.C. § 103(a) as unpatentable over the Weldon patent.
`
`(Ex. 1004, 4/29/2011 OA, at 3-4). Application claims 3-4, 6, 9-10, and 17-23 were
`
`allowed for the same reasons as given in the first non-final office action.
`
`21. On July 7, 2011, Applicants filed a reply to the second non-office action,
`
`cancelling application claims 11-13 and 26-27 to expedite issuance of the allowed
`
`claims. (Ex. 1004, 7/7/2011 Amend., at 6).
`
`22. On July 28, 2011, Applicants filed a Petition to Change Order of Names
`
`of Joint Inventors in the Heading of the Patent Application under 37 CFR 1.182. The
`
`
`
`
`9
`
`Page 00010
`
`

`

` Covered Business Method Patent Review
`United States Patent No. 8,033,458
`order of the inventors was changed to list Patrick S. Racz first, followed by Hermen-
`
`ard Hulst. (Ex. 1004, 7/28/2011 Petition, at 1-2).
`
`23. The Examiner issued a Notice of Allowance on August 9, 2011. Claims
`
`3-4, 6, 9-10, and 17-23 were allowed for the same reasons as given in the first non-
`
`final office action. (Ex. 1004, 8/9/2011 Notice, at 2).
`
`III. ONE OF ORDINARY SKILL
`I understand that the factors considered in determining the ordinary
`
`24.
`
`level of skill in the art include the level of education and experience of persons
`
`working in the field; the types of problems encountered in the field; and the
`
`sophistication of the technology.
`
`25.
`
`In my opinion, a person of ordinary skill in the art relating to the
`
`technology of the asserted patents at the time at which the patents were filed —the
`
`field of “data storage and access systems,” including the use of a “portable data carrier
`
`for storing and paying for data and to computer systems for providing access to data
`
`to be stored” (see, e.g., Ex. 1001 (’458 patent) at col. 1, lns. 20-23)—would have had at
`
`least a Bachelor of Science degree in electrical engineering, computer science or a
`
`telecommunications related field, and at least three years of industry experience that
`
`included client-server data/information distribution and management architectures.
`
`26. As I described in the discussion of my background beginning at
`
`paragraph 3 above, I have had decades of experience with computer based content/
`
`
`
`
`10
`
`Page 00011
`
`

`

` Covered Business Method Patent Review
`United States Patent No. 8,033,458
`information distribution networks, which included mixtures of consumer and
`
`industrial equipment. As of October 25, 1999, I would have qualified as one of skill
`
`in art according to the above definition.
`
`IV. CLAIM CONSTRUCTION
`For the purposes of this declaration, I have been asked to assume
`
`27.
`
`constructions for certain claim terms as presented in the following table. For all
`
`remaining claim terms, I have assumed their plain and ordinary meaning.
`
`
`
`Claim term
`
`“payment data”
`(Claim 1)
`
`“supplementary data”
`(Claim 10)
`
`
`
`Claim Construction
`
`“data representing payment made for
`requested content data” and distinct from
`“access control data”
`
`“advertising data, customer reward
`management data, and hot links to web
`sites”
`
`
`
`
`
`
`11
`
`Page 00012
`
`

`

` Covered Business Method Patent Review
`United States Patent No. 8,033,458
`V.
`STATE OF THE ART
`28. By Smartflash’s claimed priority date of October 25, 1999, the elements
`
`of the challenged claims were all well-known in the art, and their combination as
`
`claimed was also well-known or at minimum obvious to a person of ordinary skill. 2
`
`29. Years before the October 25, 1999 priority date claimed by Smartflash,
`
`the sale and distribution of digital products and content protection for digital products
`
`were well-known. Further, the concept of providing access to data in exchange for
`
`payment as well known.
`
`30.
`
`For example, U.S. Patent No. 4,999,806, entitled “Software Distribution
`
`System,” filed on September 4, 1987 and issued on March 12, 1991, to Fred Chernow
`
`and Randy J. Peterson (“the Chernow patent”), discloses a system and method for the
`
`sale and distribution of digital data by telephone, including content protection for the
`
`purchased content. See, e.g., Ex. 1006, the Chernow patent, at Abstract “A central
`
`station distributes software by telephone. The central station accepts credit card
`
`information, transmits an acceptance code to a caller and then terminates the call.
`
`After verifying the credit card information, the station calls the purchaser back and
`
`
`2 At various points in this declaration I refer to my opinions about the knowledge or
`
`understanding of a person of ordinary skill in the art. All of these opinions should be
`
`understood to refer to the knowledge or understanding of a person of ordinary skill in
`
`the art as of October 25, 1999, unless specifically noted otherwise.
`
`
`
`
`12
`
`Page 00013
`
`

`

` Covered Business Method Patent Review
`United States Patent No. 8,033,458
`continues with the transaction only after receiving the acceptance code.”); col. 1, ln.
`
`67-col. 2, ln. 9 (“It is an object of this invention to provide a means for selling and
`
`distributing protected software using standard telephone lines for transferring the
`
`software from the seller to the purchaser. Another object of this invention is to
`
`permit the purchaser to rent the protected software for a period of time after which it
`
`will self destruct. Another object of this invention is to permit the purchaser to rent
`
`the protected software for a specific number of runs which would be useful, e.g., if the
`
`software were a game.”).
`
`31. U.S. Patent No. 4, 878, 245, entitled “Control and Metering System for
`
`Pay Television Over a Cable Network,” filed January 22, 1987 and issued October 31,
`
`1989, to Graham C. Bradley et al. (“the Bradley patent”), discloses a system for pay
`
`television. See, e.g., Ex. 1007, the Bradley patent, at Abstract, col. 4 lns. 27-35 (“This
`
`apparatus can permit programming to be sold to the subscriber by the month, by the
`
`program, and by the hour of any portion thereof. Payment by the month is known as
`
`Subscription Television. Payment by the program is known as Pay-per-View.
`
`Payment by viewing time is known as Pay-for-Use (PFU) television. It also permits
`
`the Cable Operator to share revenues with independent programming suppliers
`
`sharing some portion of the cable TV distribution system.”).
`
`32. U.S. Patent No. 5,675,734, entitled “Method for Transmitting a Desired
`
`Digital Video or Audio Signal,” filed September 18, 1990 and issued March 2, 1993, to
`
`Arthur R. Hair (“the Hair patent”), discloses a method for electronic sales of digital
`
`
`
`
`13
`
`Page 00014
`
`

`

` Covered Business Method Patent Review
`United States Patent No. 8,033,458
`audio and digital video. See, e.g., Ex. 1005, the Hair patent, at Abstract (“A method for
`
`transferring desired digital video of digital audio signals”), col. 1, lns. 15-20 (“The
`
`present invention is related to a system and associated method for the electronic sales
`
`and distribution of digital audio or digital video signals, and more particularly, to a
`
`system and method which a user may purchase and receive digital audio or digital
`
`video signals from any location which the user has access to telecommunications
`
`lines.”).
`
`33.
`
`In addition, U.S. Patent No. 5,103,392, entitled “System for Storing
`
`History of Use of Programs Including User Credit Data and Having Access by the
`
`Proprietor,” filed on December 5, 1990 and issued on April 7, 1991, to Ryoichi Mori
`
`and assigned to Fujitsu Limited (“the Mori patent”), discloses a method for storing
`
`information about customer use so that a customer can be charged according to that
`
`use and in accordance with that customer’s credit. See, e.g., Ex. 1012, the Mori Patent
`
`at, col. 1, ln. 64-col. 2, ln. 17 (“In accordance with a fundamental aspect of the present
`
`invention, there is provided a system for storing data on the history of use of
`
`programs, including a data processing apparatus used by a user and program storage
`
`means for storing a program acquired from a proprietor and program-specific data.
`
`The data processing apparatus includes user-specific credit data storage means for
`
`storing data identifying the user of the data processing apparatus and indicating credit
`
`for payment capacity, use time length, or the like of the user of the data processing
`
`apparatus. Also included is use decision means for determining permission to use the
`
`
`
`
`14
`
`Page 00015
`
`

`

` Covered Business Method Patent Review
`United States Patent No. 8,033,458
`program on the data processing apparatus on the basis of program-specific data
`
`supplied from the program storage means or user-specific credit data supplied from
`
`the user-specific credit data storage means, the use decision means delivering either an
`
`affirmative or negative signal corresponding to results of the decision. Also included
`
`is program use history storage means connected to the use decision means for storing
`
`program use history data derived from the program-specific data or the user-specific
`
`credit data.”).
`
`34.
`
`Further, European Patent Application, Publication No. EP0809221A2,
`
`entitled “Virtual vending system and method for managing the distribution, licensing
`
`and rental of electronic data,” listing applicant Sun Microsystems, Inc. and inventors
`
`Andrew A. Poggio and Leo A. Hejza, and published on November 26, 1997 (“the
`
`Poggio patent application”), likewise discloses a content distribution system that
`
`provides for secure transactions and content protection. See, e.g., Ex. 1016, the Poggio
`
`patent application, at Abstract (“A virtual vending machine manages a comprehensive
`
`vending service for the distribution of licensed electronic data (i.e., products) over a
`
`distributed computer system. . . . The virtual vending machine distributes licenses for
`
`the electronic data for the complete product or for components thereof and for a
`
`variety of time frames, including permanent licenses and rental period licenses. The
`
`virtual vending machine provides client computers with the capability to obtain
`
`information regarding the available products and the associated license fees and rental
`
`periods, to receive the product upon receipt of a corresponding electronic payment,
`
`
`
`
`15
`
`Page 00016
`
`

`

` Covered Business Method Patent Review
`United States Patent No. 8,033,458
`and to reload the product during the term of the license.”). The Poggio patent
`
`application will be discussed in more detail below and in Appendix D, and that
`
`discussion is incorporated here by reference.
`
`35.
`
`Similarly, a 1997 IEEE article, “The Secure Distribution of Digital
`
`Contents,” by Eberhard von Faber, Robert Hammelrath, and Franz-Peter Heider
`
`(“the von Faber article”), recognized in its Introduction that “Electronic commerce
`
`systems dealing with the distribution of digital contents like software or multimedia
`
`data have to couple the use of the provided digital goods with a prior payment for the
`
`goods in a way which cannot be bypassed.” See Ex. 1020, the von Faber article, at 1.
`
`The von Faber article sets forth a proposal for a system in which encrypted contents
`
`are distributed and customers purchase keys required to utilize that encrypted content.
`
`See, e.g., Ex. 1020, the von Faber article, at 1 (“The basic idea of one possible solution
`
`is to distribute the contents in encrypted form, and to have the customer pay for the
`
`key which he needs to transform the encrypted content in an usable form. The
`
`security problem can in this way be transformed into a problem of key distribution.”);
`
`(“The Content Provider provides digital contents in encrypted form being distributed
`
`by the Content Distributor. The Key Management System holds the keys for the
`
`contents to be decrypted. The Authorisation System permits the distribution of the
`
`appropriate key after settling of the fees payable by the Customer, who will enjoy the
`
`decrypted digital contents. The role of the Content Distributor is not essential for the
`
`
`
`
`16
`
`Page 00017
`
`

`

` Covered Business Method Patent Review
`United States Patent No. 8,033,458
`subsequent discussion but, of course, for the business to take place.”); see also Ex.
`
`1020, the von Faber article Fig. 1.
`
`36. The von Faber article recognizes that its system could be used for
`
`different content distribution methods and different payment methods known in the
`
`art. See, e.g., Ex. 1020, the von Faber article at 22 (“The outlined system has the
`
`following characteristics: Different methods can be used to distribute the encrypted
`
`contents (standard techniques). This includes broadcasting, point-to-point
`
`networking, as well as offering disks. Different electronic payment methods can be
`
`integrated independent from the number of protocol steps needed. This includes
`
`credit card based systems as well as electronic purses. This flexibility leads to the fact
`
`that totally different authorisation methods can be integrated.”).
`
`37.
`
`Further, the von Faber article recognized that the issue of payment
`
`distribution to content providers, such as royalties, would also need to be addressed.
`
`See, e.g., Ex. 1020, the von Faber article, at 22 (“The system will support re-selling in a
`
`simple way. Re-sellers can integrate other manufacturer’s products into own packages
`
`without the need of signing any extra contract. The system automatically divides the
`
`package price (payments) and guarantees that the money is transferred to each
`
`Content Provider whose product has been integrated into the package.”).
`
`38.
`
`In addition, U.S. Patent No. 5,915,019 (“the Ginter patent”), entitled
`
`“Systems and Methods for Secure Transaction Management and Electronic Rights
`
`Protection,” filed on January 8, 1997 and issued on June 22, 1999, discloses “systems
`
`
`
`
`17
`
`Page 00018
`
`

`

` Covered Business Method Patent Review
`United States Patent No. 8,033,458
`and methods for secure transaction management and electronic rights protection.”
`
`See, e.g., Ex. 1015, the Ginter patent, at Abstract. The Ginter patent describes a
`
`“virtual distribution environment” (which it terms a “VDE”) to “control and/or
`
`meter or otherwise monitor use of electronically stored or disseminated information.”
`
`See, e.g., Ex. 1015, the Ginter patent, at Abstract. The Ginter patent’s system “help[s]
`
`to ensure that information is accessed and used only in authorized ways, and
`
`maintain[s] the integrity, availability, and/or confidentiality of the information.” See,
`
`e.g., Ex. 1015, the Ginter patent, at Abstract. Further, the Ginter patent’s “techniques
`
`may be used to support an all-electronic information distribution, for example,
`
`utilizing the ‘electronic highway.’” See, e.g., Ex. 1015, the Ginter patent, at Abstract.
`
`39.
`
`In addition, the Ginter patent discloses that the various entities that
`
`comprise the VDE architecture 100 of FIG. 1 can flexibly take on any of the roles
`
`taught in conjunction with the operation and functions of the VDE systems and
`
`methods. See, e.g., the Ginter patent at col. 61, lns. 22-43 (“All participants of VDE
`
`100 have the innate ability to participate in any role. For example, users may gather
`
`together existing protected packages, add (create new content) package of their own,
`
`and create new products. They may choose to serve as their own distributor, or
`
`delegate this responsibility to others. . . . The distribution process provided by VDE
`
`100 is symmetrical; any end-user may redistribute information received to other end-
`
`users, provided they possess permission from and follow the rules established by the
`
`distribution chain VDE control information governing redistribution. End users also
`
`
`
`
`18
`
`Page 00019
`
`

`

` Covered Business Method Patent Review
`United States Patent No. 8,033,458
`may, within the same rules and permissions restriction, encapsulate content owned by
`
`others within newly published works and distribute these works independently.
`
`Royalty payments for the new works may be accessed by the publisher, distributors,
`
`or end-users, and may be tracked and electronically collected at any stage of the
`
`chain.”). To one of ordinary skill this flexibility is a powerful and expansive teaching,
`
`and serves as a strong invitation and suggestion to consider combinations of the
`
`disclosures of the Ginter patent with other systems and teachings in the art to take
`
`advantage of this flexibility.
`
`40.
`
`Storage and utilization of content stored on mobile communication
`
`devices, such as cellular phones, was likewise well known. For example, PCT
`
`Application Publication No. WO 99/43136, listing applicant Ericsson, Inc. and
`
`inventors Nils R. Rydbeck and John P. Fussell, and published on August 26, 1999
`
`(“the Rydbeck PCT application”) discloses that a user equipment device for storing
`
`digital content in non-volatile memory can be a cellular phone (a mobile
`
`communications device). See, e.g

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket