throbber
Covered Business Method Patent Review
`United States Patent No. 8,336,772
`
`IN THE UNITED STATES PATENT AND TRADEMARK OFFICE
`
`Petitioner: Apple Inc.
`
`Attorney Docket No.:
`
` 104677-5008-806
`Customer No. 28120
`

`Inventor: Racz et al.
`United States Patent No.: 8,336,772 §
`Formerly Application No.: 13/212,047 §
`Issue Date: December 25, 2012

`Filing Date: August 17, 2011

`Former Group Art Unit: 2887

`Former Examiner: Thien M. Le

`
`For: Data Storage and Access Systems
`
`MAIL STOP PATENT BOARD
`Patent Trial and Appeal Board
`United States Patent and Trademark Office
`Post Office Box 1450
`Alexandria, Virginia 22313-1450
`
`PETITION FOR COVERED BUSINESS METHOD PATENT REVIEW OF
`UNITED STATES PATENT NO. 8,336,772 PURSUANT TO 35 U.S.C. § 321,
`37 C.F.R. § 42.304
`
`
`
`
`
`
`
`

`

`
`
` Covered Business Method Patent Review
`United States Patent No. 8,336,772
`
`
`TABLE OF CONTENTS
`
`B. 
`
`INTRODUCTION ....................................................................................................... 1 
`I. 
`II.  OVERVIEW OF FIELD OF THE CLAIMED INVENTION ......................... 4 
`III.  PETITIONER HAS STANDING .......................................................................... 11 
`A. 
`The ’772 Patent Is a Covered Business Method (“CBM”) Patent ........... 11 
`1. 
`Exemplary Claim 8 Is Financial In Nature ...................................... 12 
`2. 
`Claim 8 Does Not Cover A Technological Invention ................... 15 
`Related Matters; Petitioner Is a Real Party In Interest Sued for and
`Charged With Infringement ........................................................................... 19 
`IV.  DETAILED EXPLANATION OF REASONS FOR RELIEF REQUESTED,
`SHOWING IT IS MORE LIKELY THAN NOT THAT AT LEAST ONE
`OF THE CHALLENGED CLAIMS IS UNPATENTABLE ............................ 20 
`A. 
`Claim Construction .......................................................................................... 20 
`B. 
`The Challenged Claims Are Invalid Under § 103 ...................................... 25 
`1. 
`Overview of Ginter .............................................................................. 25 
`2. 
`Motivation to Combine Ginter with Poggio.................................... 29 
`3. 
`Motivation to Combine Ginter with Stefik ...................................... 32 
`4. 
`Motivation to Combine Ginter with Sato ........................................ 36 
`5. 
`Claims 1, 5, 8, 10, 14, 19, 22, 25, 26, 30, and 32 are
`Obvious in Light of Ginter (Ground 1), Obvious in Light
`of Ginter in View of Poggio (Ground 2), and Obvious in
`Light of Ginter in view of Sato (Ground 3); and Claims 8,
`10, 19, 22, 30, and 32 are Obvious in Light of Ginter in
`View of Stefik (Ground 4) .................................................................. 38 
`CONCLUSION........................................................................................................... 75 
`
`V. 
`
`
`ii
`
`

`

`
`EXHIBIT LIST
`1101
`
`1102
`
`1103
`
`1104
`
`1105
`
`1106
`
`1107
`
`1108
`
`1109
`
`1110
`
`1111
`
`1112
`
`1113
`
`1114
`
`1115
`
`1116
`
`1117
`
`1118
`
`1119
`
`1120
`
` Covered Business Method Patent Review
`United States Patent No. 8,336,772
`
`
`United States Patent No. 8,336,772
`
`Plaintiffs’ First Amended Complaint
`
`U.S. Patent No. 5,675,734
`
`File History for U.S. Patent No. 8,061,598
`
`File History for U.S. Patent No. 8,118,221
`
`U.S. Patent No. 4,999,806
`
`U.S. Patent No. 4,878,245
`
`U.S. Patent No. 7,334,720
`
`U.S. Patent No. 7,942,317
`
`U.S. Patent No. 8,118,221
`
`File History for U.S. Patent No. 8,336,772
`
`U.S. Patent No. 5,103,392
`
`U.S. Patent No. 5,530,235
`
`U.S. Patent No. 5,629,980
`
`U.S. Patent No. 5,915,019
`
`European Patent Application, Publication No. EP0809221A2
`
`PCT Application Publication No. WO 99/43136
`
`JP Patent Application Publication No. H11-164058 (transla-
`tion)
`JP Patent Application Publication No. H10-269289 (transla-
`tion)
`Eberhard von Faber, Robert Hammelrath, and Franz-Peter
`Heider, “The Secure Distribution of Digital Contents,” IEEE
`(1997)
`
`iii
`
`

`

` Covered Business Method Patent Review
`United States Patent No. 8,336,772
`
`
`Declaration of Anthony J. Wechselberger In Support of Apple
`Inc.’s Petition for Covered Business Method Patent Review
`U.S. Patent No. 5,754,654
`
`Declaration of Michael P. Duffey In Support of Apple Inc.’s
`Petition for Covered Business Method Patent Review
`Declaration of Flora D. Elias-Mique In Support of Apple
`Inc.’s Petition for Covered Business Method Patent Review
`U.S. Patent No. 8,033,458
`
`U.S. Patent No. 8,061,598
`
`File History for U.S. Patent No. 7,334,720
`
`File History for U.S. Patent No. 7,942,317
`
`File History for U.S. Patent No. 8,033,458
`
`EXHIBIT LIST
`1121
`
`1122
`
`1123
`
`1124
`
`1125
`
`1126
`
`1127
`
`1128
`
`1129
`
`iv
`
`

`

` Covered Business Method Patent Review
`United States Patent No. 8,336,772
`
`I.
`
`INTRODUCTION
`
`Pursuant to 35 U.S.C. § 321 and 37 C.F.R. § 42.304, the undersigned, on behalf
`
`of and acting in a representative capacity for petitioner, Apple Inc. (“Petitioner” and
`
`the real party in interest), hereby petitions for review under the transitional program
`
`for covered business method patents of claims 1, 5, 8, 10, 14, 19, 22, 25, 26, 30, and
`
`32 (“the challenged claims”) of U.S. Patent No. 8,336,772 (“the ’772 patent”), issued
`
`to Smartflash Technologies Limited and assigned to Smartflash LLC (“Patentee”). Pe-
`
`titioner hereby asserts it is more likely than not that at least one of the challenged
`
`claims is invalid for the reasons herein and requests review of, and judgment against,
`
`the challenged claims under § 103.1 Petitioner has concurrently filed a Petition seek-
`
`ing CBM review of the ’772 patent, requesting judgment against these same claims
`
`based on different prior art. The Director, pursuant to Rule 325(c), may determine
`
`that merger, or at minimum coordination of these proceedings, is appropriate.
`
`The challenged claims merely recite basic computer systems well-known in the
`
`field of data storage and access, including a “handheld multimedia terminal for retriev-
`
`ing and accessing protected multimedia content” and a “data access terminal for con-
`
`trolling access to one or more content data items stored on a data carrier.” Ex. 1101.
`
`Claim 8, e.g., recites four rudimentary components of a data access terminal “for control-
`
`
`1 Petitioner is demonstrating, in pending litigation, that these claims are invalid for
`
`numerous additional reasons. All emphasis herein added unless otherwise noted.
`
`
`
`

`

` Covered Business Method Patent Review
`United States Patent No. 8,336,772
`
`ling access to one or more content data items”—(A) a user interface, (B) a data carrier inter-
`
`face, (C) a program store storing code implementable by a processor, and (D) a pro-
`
`cessor . . . for implementing the stored code. The recited code is similarly elementary,
`
`requesting and receiving user identifier data (D1-D2), presenting available content data items
`
`(D3), receiving a selection and transmitting payment for the data item (D4-D5), receiving pay-
`
`ment validation data (D6), and controlling access to the data item in response (D7):
`
`8. A data access terminal for controlling access to one or more content
`data items stored on a data carrier, the data access terminal comprising:
`[A] a user interface;
`[B] a data carrier interface;
`[C] a program store storing code implementable by a processor; and
`[D] a processor coupled to the user interface, to the data carrier inter-
`face and to the program store for implementing the stored code, the
`code comprising:
`[D1] code to request identifier data identifying one or more con-
`tent data items stored on the data carrier;
`[D2] code to receive said identifier data;
`[D3] code to present to a user via said user interface said identi-
`fied one or more content data items available from the data carrier;
`[D4] code to receive a user selection selecting at least one of said
`one or more of said stored content data items;
`[D5] code responsive to said user selection of said selected con-
`tent data item to transmit payment data relating to payment for
`said selected content item for validation by a payment validation
`system;
`
`2
`
`

`

` Covered Business Method Patent Review
`United States Patent No. 8,336,772
`
`
`[D6] code to receive payment validation data defining if said pay-
`ment validation system has validated payment for said content da-
`ta item; and
`[D7] code to control access to said selected content data item re-
`sponsive to the payment validation data.
`Ex. 1101. But at the patent’s earliest claimed priority date, these simple elements and
`
`their combination were well-known to any person of ordinary skill (“POSITA”). In-
`
`deed, the patent acknowledges that the idea of providing access to data in exchange
`
`for a payment (e.g., the purchase of music on a CD) was already well known. See, e.g.,
`
`Ex. 1101 5:13-16 (“the purchase outright option may be equivalent to the purchase of a
`
`compact disc (CD)”). And, as demonstrated here, the prior art was teeming with disclo-
`
`sures of this basic concept and its straightforward implementation in physical systems.
`
`Moreover, claim 8 clearly involves no “technology” at all other than “a data access
`
`terminal,” with user and data carrier interfaces, a program store storing code, and a
`
`processor that implements the well-known steps disclosed in the specification—all of
`
`which the patent concedes were well known and commonplace, stating that this “ter-
`
`minal comprises a general purpose computer.” E.g., Ex. 1101 4:7, 16:47-52. Claim 8 recites
`
`nothing more than a system for requesting and retrieving data from a data carrier
`
`while receiving and responding to payment data for validation and controlling access
`
`to the data based on payment. And the other challenged claims are nothing but varia-
`
`tions on this simple theme, with the addition, in the challenged “handheld multimedia
`
`3
`
`

`

` Covered Business Method Patent Review
`United States Patent No. 8,336,772
`
`terminal” claims, of equally generic components (e.g., well-known wireless interface,
`
`non-volatile memory, and a display).2 See, e.g., id. 12:37-40 (“physical embodiment of the
`
`system is not critical and a skilled person will understand that the terminals, data processing systems
`
`and the like can all take a variety of forms.”).
`
`It is thus little surprise that, as detailed herein, every element of the challenged
`
`claims was disclosed in the prior art, and their claimed combinations are at minimum
`
`obvious in light of individual references, or by those references or systems in combi-
`
`nation. Accordingly, each of the challenged claims is obvious.
`
`II. OVERVIEW OF FIELD OF THE CLAIMED INVENTION
`By October 25, 1999, electronic sale, distribution, and content protection for
`
`digital products was well-known to a POSITA,3 and their combination as claimed
`
`
`2 Claims 1, 14, and 25, e.g., recite a “handheld multimedia terminal,” but simply add to
`
`claim 8 the requirements of a wireless interface, non-volatile memory, and a display,
`
`while specifying the user interface enables a user to perform certain functions. Claim
`
`19, like claim 8, recites a data access terminal, but specifies it is “for retrieving a con-
`
`tent data item from a data supplier and providing the retrieved data item to a data car-
`
`rier.” Claim 30 also recites a data access terminal, but with code performing slightly
`
`different functions. Id. And Claims 10, 22, and 32, which depend from claims 8, 19,
`
`and 30, simply specify integration with a mobile communications device. Ex. 1101.
`
`3 All references to a POSITA refer to the knowledge or understanding of a POSITA
`
`4
`
`

`

` Covered Business Method Patent Review
`United States Patent No. 8,336,772
`
`would also have been well-known or at minimum obvious. See, e.g., Ex. 1121 § V. On
`
`March 12, 1991, for example, U.S. Pat. No. 4,999,806 (“Chernow,” filed Sept. 4, 1987)
`
`issued, disclosing. a system and method for sale and distribution of digital products by
`
`telephone, and for content protection. See, e.g., Ex. 1106 Abstract (“central station dis-
`
`tributes software by telephone. . . . accepts credit card information, transmits an ac-
`
`ceptance code . . . After verifying the credit card information, the station calls the purchaser
`
`back and continues with the transaction only after receiving the acceptance code.”); 1:67-2:9 (de-
`
`scribing “means for selling and distributing protected software using standard tele-
`
`phone lines,” “permit[ting] the purchaser to rent the protected software for a period of time,” and
`
`“rent[ing] the protected software for a specific number of runs”). Chernow also dis-
`
`closes (1) different types of access, such as purchase versus rental and (2) Control
`
`Transfer Program and a Primary Protection Program to prevent unauthorized copies.
`
`See Ex. 1106 Abstract; see also id. 2:65-3:23; Ex. 1121 ¶ 30.
`
`In April 1992, U.S. Patent No. 5,103,392 (“Mori,” filed Dec. 5, 1990) issued,
`
`disclosing use-based charging for digital products. E.g., Ex. 1112 1:64-2:17:
`
`The data processing apparatus includes user-specific credit data storage
`
`as of October 25, 1999, unless specifically noted. A POSITA would have at least a B.S.
`
`in E.E., computer science or a telecommunications related field, and at least three
`
`years of industry experience that included client-server data/information distribution
`
`and management architectures. Ex. 1121 ¶ 25.
`
`5
`
`

`

` Covered Business Method Patent Review
`United States Patent No. 8,336,772
`
`
`means for storing data identifying the user . . . and indicating credit for payment ca-
`pacity, use time length, or the like of the user . . . Also included is use deci-
`sion means for determining permission to use the program . . . on the basis of pro-
`gram-specific data supplied from the program storage means or user-specific
`credit data supplied from the user-specific credit data storage means, the
`use decision means delivering either an affirmative or negative signal corresponding
`to results of the decision. Also included is program use history storage means
`connected to the use decision means for storing program use history data . . .
`Mori’s emphasis on assuring permission to access a program and compensating pro-
`
`viders underscores this existing focus in the art on digital rights management
`
`(“DRM”), over eight years before the claimed priority date. Ex. 1121 ¶ 33.
`
`Exhibit 1116 (“Poggio”, pub’d Nov. 26, 1997) gives another example of secure
`
`content distribution with content protection, disclosing a “virtual vending machine”
`
`system for sale and distribution of digital products. See, e.g., id. Abstract (“virtual vending
`
`machine manages a comprehensive vending service for the distribution of licensed electronic data (i.e.,
`
`products) over a distributed computer system. . . . [and] distributes licenses for the electronic data for
`
`the complete product or for components thereof and for a variety of time frames, including permanent
`
`licenses and rental period licenses. [It] provides . . . capability to obtain information regarding the
`
`available products and the associated license fees and rental periods, to receive the product upon re-
`
`ceipt of a corresponding electronic payment, and to reload the product during the term of the license.”).
`
`Poggio, too, discloses different types of access, including rentals, and re-download ca-
`
`pabilities for already-purchased content. See, e.g., id.; Ex. 1121 ¶¶ 34, 46.
`
`6
`
`

`

` Covered Business Method Patent Review
`United States Patent No. 8,336,772
`
`Also in 1997, Exhibit 1020 (“von Faber”) (“von Faber”) published, making the
`
`well-known observation that “[e]lectronic commerce systems dealing with the distribution of
`
`digital contents . . . have to couple the use of the provided digital goods with a prior payment for the
`
`goods in a way which cannot be bypassed.” See id. 7. Von Faber proposed a system
`
`where customers purchase keys required to utilize encrypted content. See, e.g., id. (“The
`
`basic idea . . . is to distribute the contents in encrypted form, and to have the customer pay for the
`
`key which he needs to transform the encrypted content in an usable form.”); id. 8 (“The Content
`
`Provider provides digital contents in encrypted form being distributed by the Content Dis-
`
`tributor. . . . The Authorisation System permits the distribution of the appropriate key after
`
`settling of the fees payable by the Customer . . .. The role of the Content Distributor is not
`
`essential for the subsequent discussion but, of course, for the business to take place.”); see
`
`also id. Fig. 1. Von Faber notes its system could be used for a variety of known distri-
`
`bution and payment methods. See, e.g., id. 13 (“Different methods can be used to distribute
`
`the encrypted contents (standard techniques). . . . Different electronic payment methods can be
`
`integrated . . . . This flexibility leads to the fact that totally different authorisation methods can be
`
`integrated.”). Von Faber further addressed the known issue of payment distribution to
`
`providers. See, e.g., id. (“The system automatically divides the package price (payments) and
`
`guarantees that the money is transferred to each Content Provider.”); Ex. 1121 ¶¶ 35-37.
`
`Also in 1997, the second of two Stefik patents issued, incorporating the first by
`
`reference. U.S. Patent No. 5,530,235 (“Stefik ’235,” filed Feb. 16, 1995 and issued
`
`7
`
`

`

` Covered Business Method Patent Review
`United States Patent No. 8,336,772
`
`June 25, 1996), incorporates by reference U.S. Patent No. 5,629,980 (“Stefik ’980,”
`
`filed Nov. 23, 1994 and issued May 13, 1997). See Ex. 1113 2:47-53 (“currently pre-
`
`ferred embodiment of a DocuCard is an instance of a repository, as defined in co-
`
`pending application. . . herein incorporated by reference.”). Stefik ’235 and Stefik ’980 will
`
`be referred to collectively herein as “Stefik.”4
`
`Stefik discloses “[a] Document Card (DocuCard) for storing documents and
`
`which is content revealing. The DocuCard is a transportable unit having a nonvolatile
`
`storage means for storing information in a digital form, a control processor for pro-
`
`cessing user initiated functions; an I/O port for interfacing to external devices for
`
`reading and writing digital information, and a user interface for allowing a user to di-
`
`rectly interact with the DocuCard.” See, e.g., Ex. 1113 Abstract; see also, e.g., Ex. 1114
`
`Abstract (“Digital work playback devices, coupled to the repository containing the
`
`4 Because Stefik ’235 incorporates Stefik ’980 by reference, they should be considered
`
`a single reference. For clarity in citation, however, separate citations are provided to
`
`the Stefik ’235 and ’980 (Exs. 1113 and 1114). To the extent Stefik ’235 and
`
`ik ’980 are argued to be separate references, there is explicit motivation to implement
`
`the repository disclosed by Stefik ’980 using the Document Card (DocuCard) of Stef-
`
`ik ’235. See, e.g., Ex. 1113 2:47-52; Ex. 1114 16:56-58 (“For example, the repository
`
`could be embedded in a ‘card’ that is inserted into an available slot in a computer sys-
`
`tem.”); Ex. 1121 ¶ 40.
`
`8
`
`

`

`work, are used to play, display or print the work.”).
`
` Covered Business Method Patent Review
`United States Patent No. 8,336,772
`
`
`Stefik also discloses a broader framework within which the DocuCard is used,
`
`including the protection of content with “usage rights.” See, e.g., Ex. 1114 Abstract
`
`(“A system for controlling use and distribution of digital works. In the present inven-
`
`tion, the owner of a digital work attaches usage rights to that work. Usage rights are
`
`granted by the ‘owner’ of a digital work to ‘buyers’ of the digital work . . . [and] define
`
`how a digital work may be used and further distributed by the buyer. Each right has
`
`associated with it certain optional specifications which outline the conditions and fees
`
`upon which the right may be exercised.”). Stefik’s digital works are stored in a “re-
`
`pository” that processes requests for access—including for such actions as utilizing
`
`content (viewing, executing, or printing) or transporting content (copying, borrowing,
`
`or transferring)—and evaluates the relevant usage rights to determine whether such
`
`access is permitted. See, e.g., id. Abstract (“Digital works are stored in a repository[, which]
`
`will process each request to access a digital work by examining the corresponding usage rights . . .
`
`Access to digital works for the purposes of transporting between repositories (e.g. copying, bor-
`
`rowing or transfer) is carried out using a digital work transport protocol. Access to digi-
`
`tal works for the purposes of replay by a digital work playback device (e.g. printing, display-
`
`ing or executing) is carried out using a digital work playback protocol.”).
`
`Storage and utilization of content stored on portable devices, including mobile
`
`communication devices such as cellular phones, was also well-known before the
`
`9
`
`

`

` Covered Business Method Patent Review
`United States Patent No. 8,336,772
`
`claimed October 25, 1999 priority date. As one example, PCT App. Pub. No. WO
`
`99/43136 (“Rydbeck,” pub’d Aug. 26, 1999), discloses a cellular phone as a user de-
`
`vice for storing digital content in non-volatile memory and accessing that content. E.g.,
`
`Ex. 1117 5 (“Because of its integration into the cellular phone, the digital entertain-
`
`ment module can share components already present in the cellular phone. Such sav-
`
`ings would not be available if a CD player were simply aggregated with the phone.
`
`Further, the use of solid state RAM or ROM, as opposed to disc storage, eliminates
`
`the need for bounce control circuitry. This enables the disclosed invention to provide
`
`cellular communications and entertainment during leisure activities.”). In addition,
`
`Exhibit 1018 (“Sato,” pub’d June 18, 1999), discloses storing media content onto mo-
`
`bile user devices and playing the media content from these mobile devices. Sato fur-
`
`ther discloses storing that media content on a removable IC card. See, e.g., ¶ 9 (“porta-
`
`ble music selection and viewing device 70 provides a removable storage device 76 on a
`
`main body 71. This storage device 76 is a memory card similar to, for example, a mag-
`
`netic card, a magnetic tape, a CD, a DVD, or an IC card. The user, after downloading
`
`the music software to the storage device (medium) 76 of the portable music selection
`
`and viewing device 70 by operating the push buttons or the like on the main body 71,
`
`can enjoy this music software on a display 72 or a receiver 74 of the portable music
`
`selection and viewing device 70, and can also enjoy higher quality music playback by
`
`removing this storage device (medium) and inserting it into another audio unit. Further, the user
`
`10
`
`

`

` Covered Business Method Patent Review
`United States Patent No. 8,336,772
`
`can store the music software from another audio unit into the storage device 76 and
`
`enjoy music by inserting this storage unit 76 into this portable music selection and
`
`viewing device 70.”); ¶ 13 (“A music storage device 240 connected to the music con-
`
`trol unit 200 stores the music software. A music storage medium 250 such as . . . a
`
`memory card such as an IC card stores the music software, and this storage medium 250
`
`can be removed and used on other audio units.”).
`
`Thus, as these background examples and the additional prior art detailed below
`
`in IV.B (including Ginter, the primary prior art) illustrate, the prior art was rife with
`
`awareness and discussion of the same supposed “invention” now memorialized in the
`
`challenged claims. Long before its purported priority date, disclosures abounded of
`
`the very features that Smartflash now seeks to claim exclusively. As outlined in more
`
`detail below, the challenged claims are therefore invalid under § 103.
`
`III. PETITIONER HAS STANDING
`A.
`Petitioner certifies that the ’772 patent is available for review under 37 C.F.R.
`
`The ’772 Patent Is a Covered Business Method (“CBM”) Patent
`
`§ 42.304(a). The ’772 patent is a CBM patent under § 18(d)(1) of the Leahy-Smith
`
`America Invents Act, Pub. L. 112-29 (“AIA”) and § 42.301. Although in fact numer-
`
`ous claims qualify, a patent with even one claim covering a CBM is considered a CBM
`
`patent. See CBM 2012-00001, Paper 36 at 26; 77 Fed. Reg. 48,709 (Aug. 14, 2012). Ac-
`
`cordingly, Petitioner addresses here exemplary claim 8 (Ex. 1101):
`
`11
`
`

`

` Covered Business Method Patent Review
`United States Patent No. 8,336,772
`
`
`8. A data access terminal for controlling access to one or more content
`data items stored on a data carrier, the data access terminal comprising:
`[A] a user interface;
`[B] a data carrier interface;
`[C] a program store storing code implementable by a processor; and
`[D] a processor coupled to the user interface, to the data carrier interface
`and to the program store for implementing the stored code, the code
`comprising:
`[D1] code to request identifier data identifying one or more con-
`tent data items stored on the data carrier;
`[D2] code to receive said identifier data;
`[D3] code to present to a user via said user interface said identi-
`fied one or more content data items available from the data carrier;
`[D4] code to receive a user selection selecting at least one of said
`one or more of said stored content data items;
`[D5] code responsive to said user selection of said selected con-
`tent data item to transmit payment data relating to payment
`for said selected content item for validation by a payment vali-
`dation system;
`[D6] code to receive payment validation data defining if said
`payment validation system has validated payment for said
`content data item; and
`[D7] code to control access to said selected content data item re-
`sponsive to the payment validation data.
`
`1.
`A “covered business method patent” is “a patent that claims a method or corre-
`
`Exemplary Claim 8 Is Financial In Nature
`
`12
`
`

`

`sponding apparatus for performing data processing or other operations used in the practice, admin-
`
` Covered Business Method Patent Review
`United States Patent No. 8,336,772
`
`
`istration, or management of a financial product or service, except that the term does not in-
`
`clude patents for technological inventions.” AIA § 18(d)(1); 37 C.F.R. § 42.301.
`
`“[T]he definition of covered business method patent was drafted to encompass pa-
`
`tents claiming activities that are financial in nature, incidental to a financial activity or
`
`complementary to a financial activity.’” 77 Fed. Reg. 48,734 (Aug. 14, 2012) (citing
`
`157 Cong. Rec. S5432 (daily ed. Sept. 8, 2011) (stmt of Sen. Schumer). “[F]inancial
`
`product or service” is to be interpreted broadly, and “financial . . . simply means relating to
`
`monetary matters”—it does not require any link to traditional financial industries such as
`
`banks. See, e.g., CBM2012-00001, Paper 36 at 23. This Board previously found, e.g.,
`
`that a claim for “transferring money electronically via a telecommunication line to the
`
`first party . . . from the second party” met the financial product or service requirement,
`
`concluding that “the electronic transfer of money is a financial activity, and allowing such a trans-
`
`fer amounts to providing a financial service.” CBM2013-00020, Paper 14 at 11-12. See also, e.g.,
`
`CBM2013-00017, Paper 8 at 5-6 (qualification as CBM patent based on specification’s
`
`reference to e-commerce and fact that a POSITA “would have understood that [one of
`
`the claim limitations] may be associated with financial services”).
`
`As discussed above, the ’772 patent includes claims directed to a “data access
`
`terminal” (e.g., a “conventional computer” or mobile phone (Ex. 1101 4:7-8)), that
`
`reads payment data from a data carrier (e.g., standard smart card (id. 11:35)), transmits
`
`13
`
`

`

` Covered Business Method Patent Review
`United States Patent No. 8,336,772
`
`it to a validation system for authorizing payment, and allows access to content in ex-
`
`change for payment (id. at 8:26-28). See AIA § 18(d)(1); 37 C.F.R. § 42.301(a). The pa-
`
`tent alleges that this terminal is part of a system that allows content owners to make
`
`content available to users without the fear of losing revenue, and claim 8 specifically
`
`states that the terminal is “for controlling access to one or more content data items.”
`
`Ex. 1101 2:15-19; Cl. 8. See also id. Fig 12(a)-(e). More generally, the patent is about
`
`“[d]ata storage and access systems [that] enable downloading and paying for data . . .”
`
`Id. Abstract. “The combination of payment data and stored content data . . . helps re-
`
`duce the risk of unauthorized access to data.” Id. And in asserting the patent in litiga-
`
`tion, Smartflash conceded that the alleged invention relates to a financial activity or
`
`transaction: “[t]he patents-in-suit generally cover a portable data carrier for storing da-
`
`ta and managing access to the data via payment information and/or use status rules. The pa-
`
`tents-in-suit also generally cover a computer network . . . that serves data and manages
`
`access to data by, for example, validating payment information.” Ex. 1102 ¶ 17.
`
`Indeed, the specification confirms that the recited “data access terminal” is “for
`
`storing and paying for data,” (Ex. 1101 1:20-22), “can communicate with a bank or other fi-
`
`nancial services provider to control payment” (3:53-55) and can “validate payment with an
`
`external authority such as a bank . . .” (2:8-10). Further, “[p]ayment for the data item or items
`
`requested may either be made directly to the system owner or may be made to an e-payment system” (d.
`
`20:59-61), and such systems may be provided “according to, for example, MONDEX,
`
`14
`
`

`

` Covered Business Method Patent Review
`United States Patent No. 8,336,772
`
`Proton, and/or Visa cash compliant standards” and “payment authentication . . . may [] be
`
`performed by, for example, a data access terminal . . . using payment management code.” Id.
`
`13:43-64. See also id. 7:66-8:61 (esp. 8:26-28); 11:65-12:4; Fig. 12(a)-(e).
`
`Claim 8 expressly recites software to perform data processing and other opera-
`
`tions in connection with the recited “payment validation system” (e.g., “to transmit
`
`payment data . . . for validation by a payment validation system” and “code to receive
`
`payment validation data defining if said payment validation system has validated pay-
`
`ment”). The claim further requires software “to control access to said selected content
`
`data item responsive to the payment validation data.” Id. Thus, claim 8, which explicit-
`
`ly describes transmitting payment data to a payment validation system, receiving pay-
`
`ment validation, and controlling access to data based on payment, clearly concerns a
`
`computer system (corresponding to methods discussed in the patent) for performing
`
`data processing and other operations used in the practice, administration, or management of
`
`a financial activity and service. See, e.g., CBM2013-00020, Paper 14 at 11-12.
`
`2.
`Claim 8 Does Not Cover A Technological Invention
`Further, claim 8 is not a “technological invention” within the exception in AIA
`
`§ 18(d)(1), because it does not claim “subject matter as a whole [that] recites a techno-
`
`logical feature that is novel and unobvious over the prior art[] and solves a technical prob-
`
`lem using a technical solution.” §42.301(b). To the contrary, the specification explains that
`
`claim 8’s “data access terminal” was commonplace, and is not directed to a technical
`
`problem, but rather a non-technical solution to the business problem of data piracy.
`
`15
`
`

`

` Covered Business Method Patent Review
`United States Patent No. 8,336,772
`
`
`(a) Claim 8 Does Not Recite A Technological Feature
`That Is Novel and Unobvious
`First, no “technological feature” of claim 8 is novel and unobvious. The PTAB
`
`has confirmed that “[m]ere recitation of known technologies, such as computer hard-
`
`ware, communication or computer networks, software, memory, computer-readable
`
`storage medium, scanners, display devices or databases, or specialized machines, such
`
`as an ATM or point of sale device,” or “[r]eciting the use of known prior art technol-
`
`ogy to accomplis

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket