throbber
Trials@uspto.gov
`Tel: 571-272-7822
`
`
`Paper 8 (CBM2014-00102)
`Paper 8 (CBM2014-00103)
`Entered: September 30, 2014
`
`UNITED STATES PATENT AND TRADEMARK OFFICE
`
`BEFORE THE PATENT TRIAL AND APPEAL BOARD
`
`APPLE INC.,
`Petitioner,
`
`v.
`
`SMARTFLASH LLC,
`Patent Owner.
`
`Case CBM2014-00102
`Case CBM2014-00103
`Patent 8,118,221 B2
`
`
`
`
`
`
`
`
`
`Before JENNIFER S. BISK, RAMA G. ELLURU, NEIL T. POWELL,
`JEREMY M. PLENZLER, and MATTHEW R. CLEMENTS,
`Administrative Patent Judges.
`
`BISK, Administrative Patent Judge.
`
`DECISION
`
`Institution of Covered Business Method Patent Review
`37 C.F.R. § 42.208
`
`
`
`INTRODUCTION
`
`A. Background
`
`Apple Inc. (“Petitioner”) filed two Petitions to institute covered
`
`business method patent review of claims 1, 2, 11-14, and 32 (the “challenged
`
`1
`
`SAMSUNG 1048
`Samsung Electronics v. SmartFlash
`CBM2014-00192
`
`

`
`CBM2014-00102 and CBM2014-00103
`Patent 8,118,221 B2
`
`claims”) of U.S. Patent No. 8,118,221 B2 (Ex. 1001, “the ’221 patent”)
`
`pursuant to § 18 of the Leahy-Smith America Invents Act (“AIA”).1
`
`CBM2014-00102, Paper 2 (“’102 Pet.”); CBM2014-00103, Paper 2 (“’103
`
`Pet.”). Smartflash LLC (“Patent Owner”) filed a Preliminary Response in
`
`each of the two cases. CBM2014-00102, Paper 6 (“’102 Prelim. Resp.”);
`
`CBM2014-00103, Paper 6 (“’103 Prelim. Resp.”).
`
`We have jurisdiction under 35 U.S.C. § 324, which provides that a
`
`covered business patent review may not be instituted “unless . . . it is more
`
`likely than not that at least 1 of the claims challenged in the petition is
`
`unpatentable.”
`
`B. Asserted Grounds
`
`Petitioner contends that the challenged claims are unpatentable under
`
`35 U.S.C. §§ 102 and/or 103 based on the following grounds (’102 Pet. 20–
`
`21, 26–79; ’103 Pet. 22–23; 28–79).
`
`References
`
`Basis Claims Challenged
`
`CBM2014-00102
`
`Stefik ’2352 and Stefik ’9803
`
`§ 1024 1, 11, 12, and 32
`
`
`1 Patent Owner argues that the multiple petitions filed against the ’458 patent
`violate the page limit requirement of 37 C.F.R. § 42.24(a)(iii), but does not
`cite any authority to support its position. ’102 Prelim. Resp. 10–11; ’103
`Prelim. Resp. 10–11. The page limit for petitions requesting covered
`business method patent review is 80 pages (37 C.F.R. § 42.24(a)(iii)), and
`each of the ’102 and the ’103 Petitions is within that requirement.
`2 U.S. Patent 5,530,235 (Ex. 1013) (“Stefik ’235”).
`3 U.S. Patent 5,629,980 (Ex. 1014) (“Stefik ’980”).
`4 Petitioner refers to Stefik ’235 and Stefik ’980 collectively as “Stefik” and
`argues that they should be considered as a single reference for anticipation
`purposes because, according to Petitioner, Stefik ’235 incorporates
`
`2
`
`

`
`CBM2014-00102 and CBM2014-00103
`Patent 8,118,221 B2
`
`References
`
`Basis Claims Challenged
`
`Stefik ’235 and Stefik ’980
`
`§ 103 1, 11, 12, and 32
`
`Stefik ’235, Stefik ’980, and Poggio5
`
`§ 103 1, 2, 11–14, and 32
`
`Stefik ’235, Stefik ’980, and Sato6
`
`§ 103 1, 2, 11–14, and 32
`
`Stefik ’235, Stefik ’980, Poggio, and
`Sato
`
`§ 103 1, 2, 11–14, and 32
`
`CBM2014-00103
`
`Ginter7
`
`§ 103 1, 2, 11–14, and 32
`
`Ginter and Poggio
`
`§ 103 1, 2, 11–14, and 32
`
`Ginter, Stefik ’235, and Stefik ’980
`
`§ 103 1, 2, 11–14, and 32
`
`Ginter and Sato
`
`§ 103 1, 2, 11–14, and 32
`
`Ginter, Poggio, Stefik ’235, and
`Stefik ’980
`
`§ 103 1, 2, 11–14, and 32
`
`Petitioner also provides a Declaration from Anthony J. Wechselberger
`
`(“the Wechselberger Declaration”).8 Ex. 1021; Ex. 1121.9
`
`
`Stefik ’980 by reference. ’102 Pet. 26–27, n.13. Patent Owner disagrees.
`’102 Prelim. Resp. 12–14. We do not reach this issue because even when
`considered as one reference, we determine that Stefik ’235 and Stefik ’980
`do not teach all the recited claim limitations in the same form and order as
`listed in the claims.
`5 European Patent Application, Publication No. EP0809221A2 (Ex. 1016)
`(“Poggio”).
`6 JP Patent Application Publication No. H11-164058 (including translation)
`(Ex. 1018) (“Sato”).
`7 U.S. Patent No. 5,915,019 (Ex. 1015) (“Ginter”).
`
`3
`
`

`
`CBM2014-00102 and CBM2014-00103
`Patent 8,118,221 B2
`
`After considering the Petitions and Preliminary Responses, we
`
`determine that the ’221 patent is a covered business method patent and that
`
`Petitioner has demonstrated that it is more likely than not that at least one of
`
`the challenged claims is unpatentable. Therefore, we institute a covered
`
`business method patent review of claims 1, 2, and 11–14. We deny
`
`institution of a covered business method patent review of claim 32.
`
`C. Related Matters
`
`Petitioner indicates that the ’221 patent is the subject of the following
`
`co-pending district court cases: Smartflash LLC v. Apple Inc., Case No.
`
`6:13-cv-447 (E.D. Tex.); and Smartflash LLC v. Samsung, Case No. 6:13-
`
`CV-448 (E.D. Tex.). ’102 Pet. 20; ’103 Pet. 22.
`
`In addition to the Petitions in CBM2014-00102 and CBM2014-00103,
`
`Petitioner filed ten other petitions for covered business method patent review
`
`challenging claims of patents owned by Patent Owner and disclosing similar
`
`subject matter: CBM2014-00104; CBM2014-00105; CBM2014-00106;
`
`CBM2014-00107; CBM2014-00108; CBM2014-00109; CBM2014-00110;
`
`CBM2014-00111; CBM2014-00112; and CBM2014-00113.
`
`
`8 On this record, we are not persuaded by Patent Owner’s argument that we
`should disregard the Wechselberger Declaration. See ’102 Prelim. Resp.
`15–17; ’103 Prelim. Resp. 18–20. Patent Owner identifies purported
`omissions from the Declaration, but offers no evidence that Mr.
`Wechselberger used incorrect criteria, failed to consider evidence, or is not
`an expert in the appropriate field. Id.
`9 Exhibits with numbers 1001–1029 were filed in CBM2014-00102 and
`those with numbers 1101–1129 were filed in CBM2014-00103. For
`purposes of this Decision, where the two cases have duplicate exhibits, we
`refer to the exhibit filed in CBM2014-00102.
`
`4
`
`

`
`CBM2014-00102 and CBM2014-00103
`Patent 8,118,221 B2
`
`D. The ’221 Patent
`
`The ’221 patent relates to “a portable data carrier for storing and
`
`paying for data and to computer systems for providing access to data to be
`
`stored” and the “corresponding methods and computer programs.” Ex. 1001
`
`1:21–25. Owners of proprietary data, especially audio recordings, have an
`
`urgent need to address the prevalence of “data pirates,” who make
`
`proprietary data available over the Internet without authorization. Id. at
`
`1:29–56. The ’221 patent describes providing portable data storage together
`
`with a means for conditioning access to that data upon validated payment.
`
`Id. at 1:59–2:11. This combination allows data owners to make their data
`
`available over the Internet without fear of data pirates. Id. at 2:11–15.
`
`As described, the portable data storage device is connected to a
`
`terminal for internet access. Id. at 1:59–67. The terminal reads payment
`
`information, validates that information, and downloads data into the portable
`
`storage device from the data supplier. Id. The data on the portable storage
`
`device can be retrieved and output from a mobile device. Id. at 2:1–4. The
`
`’221 patent makes clear that the actual implementation of these components
`
`is not critical and may be implemented in many ways. See, e.g., id. at
`
`25:41–44 (“The skilled person will understand that many variants to the
`
`system are possible and the invention is not limited to the described
`
`embodiments.”).
`
`E. Challenged Claims
`
`Petitioner challenges claims 1, 2, 11–14, and 32 of the ’221 patent.
`
`Claims 1, 12, and 32 are independent. Claims 2 and 11 depend from claim 1
`
`and claims 13 and 14 depend either directly or indirectly from claim 12.
`
`5
`
`

`
`CBM2014-00102 and CBM2014-00103
`Patent 8,118,221 B2
`
`Claims 1, 12, and 32 are illustrative of the claims at issue and recite the
`
`following:
`
`1.
`A data access terminal for retrieving data from a data supplier
`and providing the retrieved data to a data carrier, the terminal
`comprising:
`
`a first interface for communicating with the data supplier;
`
`a data carrier interface for interfacing with the data carrier;
`
`a program store storing code implementable by a processor; and
`
`a processor, coupled to the first interface, to the data carrier
`interface and to the program store for implementing the stored code,
`the code comprising:
`
`code to read payment data from the data carrier and to forward
`the payment data to a payment validation system;
`
`code to receive payment validation data from the payment
`validation system;
`
`code responsive to the payment validation data to retrieve data
`from the data supplier and to write the retrieved data into the data
`carrier.
`
`Ex. 1001, 25:45–61.
`
`12. A method of providing data from a data supplier to a data
`carrier, the method comprising:
`
`reading payment data from the data carrier;
`
`forwarding the payment data to a payment validation system;
`
`retrieving data from the data supplier; and
`
`writing the retrieved data into the date [sic] carrier.
`
`Id. at 26:43–49.
`
`32. A data access terminal for retrieving data from a data supplier
`and providing the retrieved data to a data carrier, the terminal
`comprising:
`
`a first interface for communicating with the data supplier;
`
`a data carrier interface for interfacing with the data carrier;
`
`6
`
`

`
`CBM2014-00102 and CBM2014-00103
`Patent 8,118,221 B2
`
`a program store storing code; and
`
`a processor coupled to the first interface, the data carrier
`interface, and the program store for implementing the stored code, the
`code comprising:
`
`code to read payment data from the data carrier and to forward
`the payment data to a payment validation system;
`
`code to receive payment validation data from the payment
`validation system;
`
`code responsive to the payment validation data to retrieve data
`from the data supplier and to write the retrieved data into the data
`carrier;
`
`code responsive to the payment validation data to receive at
`least one access rule from the data supplier and to write the at least
`one access rule into the data carrier, the at least one access rule
`specifying at least one condition for accessing the retrieved data
`written into the data carrier, the at least one condition being dependent
`upon the amount of payment associated with the payment data
`forwarded to the payment validation system; and
`
`code to retrieve from the data supplier and output to a user-
`stored data identifier data and associated value data and use rule data
`for a data item available from the data supplier.
`
`Id. at 28:23–50.
`
`A. Claim Construction
`
`ANALYSIS
`
`In a covered business method patent review, claim terms are given
`
`their broadest reasonable interpretation in light of the specification in which
`
`they appear and the understanding of others skilled in the relevant art. See
`
`37 C.F.R. § 42.300(b). Applying that standard, we interpret the claim terms
`
`of the ’221 patent according to their ordinary and customary meaning in the
`
`context of the patent’s written description. See In re Translogic Tech., Inc.,
`
`504 F.3d 1249, 1257 (Fed. Cir. 2007). For purposes of this Decision, we
`
`construe the claim term “access rule.”
`
`7
`
`

`
`CBM2014-00102 and CBM2014-00103
`Patent 8,118,221 B2
`
`Independent claim 32 requires receiving at least one “access rule”
`
`from the data supplier and that the “at least one access rule specif[ies] at
`
`least one condition for accessing the retrieved data.” The ’221 patent also
`
`states that “one or more content access rules are received from the system
`
`owner data supply computer and written to the smart Flash card so that each
`
`content data item has an associated use rule to specify under what conditions
`
`a user of the smart Flash card is allowed access to the content data item.”
`
`Ex. 1001, 21:48–53; see also id. at 7:31–32 (stating that access data “links a
`
`content identifier with an access rule, typically based upon a required
`
`payment value”). Accordingly, for purposes of this Decision, we construe
`
`“access rule” as a rule specifying a condition under which access to content
`
`is permitted.
`
`B. Covered Business Method Patent
`
`Section 18 of the AIA provides for the creation of a transitional
`
`program for reviewing covered business method patents. A “[c]overed
`
`business method patent” is a patent that “claims a method or corresponding
`
`apparatus for performing data processing or other operations used in the
`
`practice, administration, or management of a financial product or service,
`
`except that the term does not include patents for technological inventions.”
`
`AIA § 18(d)(1); see 37 C.F.R. § 42.301(a). A patent need have only one
`
`claim directed to a covered business method to be eligible for review. See
`
`Transitional Program for Covered Business Method Patents—Definitions of
`
`Covered Business Method Patent and Technological Invention; Final Rule,
`
`77 Fed. Reg. 48,734, 48,736 (Aug. 14, 2012) (“CBM Rules”) (Comment 8).
`
`8
`
`

`
`CBM2014-00102 and CBM2014-00103
`Patent 8,118,221 B2
`
`1. Financial Product or Service
`
`Petitioner asserts that claim 12 “clearly relates to a financial activity
`
`and providing a financial service” because it “describes electronically
`
`transferring money and allowing such a transfer.” ’102 Pet. 15; ’103 Pet.
`
`16–17. Based on this record, we agree with Petitioner that the subject matter
`
`recited by claim 12 is directed to activities that are financial in nature,
`
`namely data access conditioned on payment validation. Claim 12 recites
`
`“reading payment data from the data carrier” and “forwarding the payment
`
`data to a payment validation system.” We are persuaded that payment
`
`validation is a financial activity, and conditioning data access based on
`
`payment validation amounts to a financial service. This is consistent with
`
`the specification of the ’221 patent, which confirms claim 12’s connection to
`
`financial activities by stating that the invention “relates to a portable data
`
`carrier for storing and paying for data.” Ex. 1001, 1:21–23. The
`
`specification also states repeatedly that the disclosed invention involves
`
`managing access to data based on payment validation. See, e.g., Ex. 1001
`
`1:59–68; 6:60–64; 20:50–54.
`
`Patent Owner disagrees that claim 12 satisfies the financial-in-nature
`
`requirement of AIA § 18(d)(1), arguing that that section should be
`
`interpreted narrowly to cover only technology used specifically in the
`
`financial or banking industry. ’102 Prelim. Resp. 3–7; ’103 Prelim. Resp.
`
`3–7. Patent Owner cites to various portions of the legislative history as
`
`support for its proposed interpretation. Id.
`
`We do not agree that the phrase “financial product or service” in
`
`§ 18(d)(1) of the AIA is as limited as Patent Owner proposes. The AIA does
`
`not include as a prerequisite for covered business method patent review, a
`
`9
`
`

`
`CBM2014-00102 and CBM2014-00103
`Patent 8,118,221 B2
`
`“nexus” to a “financial business,” but rather a “method or corresponding
`
`apparatus for performing data processing or other operations used in the
`
`practice, administration, or management of a financial product or service.”
`
`AIA § 18(d)(1). Further, contrary to Patent Owner’s view of the legislative
`
`history, the legislative history indicates that the phrase “financial product or
`
`service” is not limited to the products or services of the “financial services
`
`industry” and is to be interpreted broadly. CBM Rules, 77 Fed. Reg. at
`
`48,735–36. For example, the “legislative history explains that the definition
`
`of covered business method patent was drafted to encompass patents
`
`‘claiming activities that are financial in nature, incidental to a financial
`
`activity or complementary to a financial activity.’” Id. (citing 157 Cong.
`
`Rec. S5432 (daily ed. Sept. 8, 2011) (statement of Sen. Schumer)).
`
`In addition, Patent Owner asserts that claim 12 is not directed to an
`
`apparatus or method that is financial in nature because claim 12 “omits the
`
`specifics of how payment is made.” ’102 Prelim. Resp. 7; ’103 Prelim.
`
`Resp. 7. We are not persuaded by this argument because § 18(d)(1) of the
`
`AIA does not include such a requirement, nor does Patent Owner point to
`
`any other authority that makes such a requirement. Id. We determine that
`
`because payment is required by claim 12, as Patent Owner acknowledges
`
`(id.), the financial-in-nature requirement of § 18(d)(1) is satisfied.
`
`For the reasons stated above, and based on the particular facts of this
`
`proceeding, we conclude that the ’221 patent includes at least one claim that
`
`meets the financial-in-nature requirement of § 18(d)(1) of the AIA.
`
`2. Exclusion for Technological Inventions
`
`Petitioner asserts that claim 12 does not fall within § 18(d)(1)’s
`
`exclusion for “technological inventions.” ’102 Pet. 15–19; ’103 Pet. 17–20.
`
`10
`
`

`
`CBM2014-00102 and CBM2014-00103
`Patent 8,118,221 B2
`
`In particular, Petitioner argues that claim 12 “does not recite a technological
`
`feature that is novel and unobvious” or “solve a technical problem using a
`
`technical solution.” Id. (quoting 37 C.F.R. § 42.301(b) (emphasis omitted)).
`
`Patent Owner disagrees and argues that claim 12, as a whole, recites at least
`
`one technological feature. ’102 Prelim. Resp. 8–9; ’103 Prelim. Resp. 8–9.
`
`We are persuaded that claim 12 as a whole does not recite a
`
`technological feature that is novel and unobvious over the prior art.
`
`Claim 12 does recite a “payment validation system.” The specification,
`
`however, discloses that the required payment validation system may be one
`
`that is already in use or otherwise commercially available. For example,
`
`“[t]he payment validation system may be part of the data supplier’s
`
`computer systems or it may be a separate e-payment system.” Ex. 1001,
`
`8:63–65; see id. at 13:35–47. Claim 12 also recites a “data carrier.” This
`
`component, however, is a generic hardware device known in the prior art.
`
`The specification discloses, for instance, that a data carrier may be a
`
`“standard smart card.” See Ex. 1001, 11:28–29.
`
`In addition, the ’221 patent makes clear that the asserted novelty of
`
`the invention is not in any specific improvement of software or hardware,
`
`but in the method of controlling access to data. For example, the ’221 patent
`
`states that “there is an urgent need to find a way to address the problem of
`
`data piracy,” (id. at 1:52–55) while acknowledging that the “physical
`
`embodiment of the system is not critical and a skilled person will understand
`
`that the terminals, data processing systems and the like can all take a variety
`
`of forms” (id. at 12:29–32). Claim 12 is merely the recitation of known
`
`technologies to perform a method, which indicates that it is not a patent for a
`
`11
`
`

`
`CBM2014-00102 and CBM2014-00103
`Patent 8,118,221 B2
`
`technological invention. See Office Patent Trial Practice Guide, 77 Fed.
`
`Reg. 48,756, 48,764 (Aug. 14, 2012).
`
`Patent Owner also argues that claim 12 falls within § 18(d)(1)’s
`
`exclusion for “technological inventions” because it is directed towards
`
`solving the technological problem of “writing data from a data supplier into
`
`a data carrier” with the technological solution of “a data carrier from which
`
`payment data is read and to which retrieved data from a data supplier is
`
`written.” ’102 Prelim. Resp. 8; ’103 Prelim. Resp. 8. We are not persuaded
`
`by this argument because, as Petitioner argues, the problem being solved by
`
`claim 12 is a business problem—data piracy. ’102 Pet. 18–19; ’103 Pet. 17–
`
`20. For example, the specification states that “[b]inding data access and
`
`payment together allows the legitimate owners of the data to make the data
`
`available themselves over the internet without fear of loss of revenue, thus
`
`undermining the position of data pirates.” Ex. 1001, 2:11–15. Therefore,
`
`based on the particular facts of this proceeding, we conclude that claim 12
`
`does not recite a technological invention and is eligible for a covered
`
`business method patent review.
`
`3. Conclusion
`
`In view of the foregoing, we conclude that the ’221 patent is a covered
`
`business method patent under AIA § 18(d)(1) and is eligible for review
`
`under the transitional covered business method patent program.
`
`C. Anticipation by Stefik ’235 and Stefik ’980
`
`Stefik ’235 teaches a portable Document Card (“DocuCard”) for
`
`storing information in a digital form, storing usage rights for the
`
`information, processing user-initiated functions and requests to access
`
`documents stored therein, interfacing to external devices for reading and
`
`12
`
`

`
`CBM2014-00102 and CBM2014-00103
`Patent 8,118,221 B2
`
`writing digital information, and allowing a user to directly interact with the
`
`DocuCard. Ex. 1013, 2:29–40; 7:35–42.
`
`Stefik ’980 teaches a “repository” for storing digital works,
`
`controlling access to digital works, billing for access to digital works and
`
`maintaining the security and integrity of the system. Ex. 1014, 6:57–61.
`
`Petitioner asserts that claims 1, 11, 12, and 32 are anticipated by
`
`Stefik ’235 and Stefik ’980. ’102 Pet. 21; 26–31. We are not persuaded that
`
`Petitioner has shown that every claim element and limitation of claims 1, 11,
`
`12, and 32 is set forth in the prior art in the same form and order as in the
`
`claim. See In re Omeprazole Patent Litig., 483 F.3d 1364, 1373 (Fed. Cir.
`
`2007); Continental Can Co. USA, Inc. v. Monsanto Co., 948 F.2d 1264,
`
`1267 (Fed. Cir. 1991).
`
`Petitioner relies on the repository described in Stefik ’980, as
`
`describing several of the claim elements. For example, Petitioner describes
`
`a combination of two examples of repositories as corresponding to the
`
`claimed subject matter. ’102 Pet. 44, n. 14; see also ’102 Pet. 41–61 (claim
`
`chart for claim 1), 62–73 (claim charts for claims 12 and 32). In the first
`
`example, “a data access terminal (processing means 1200) and data supplier
`
`(storage system 1207) are both located within a first repository . . . and a
`
`data carrier (second repository) is communicating with the data access
`
`terminal through a communications interface (external interface 1206) of the
`
`first repository.” ’102 Pet. 44, n.14. In the second example, “a data access
`
`terminal (processing means 1200) and data carrier (storage system 1207) are
`
`both located within a first repository . . . and a data supplier (second
`
`repository) is communicating with the data access terminal through a
`
`13
`
`

`
`CBM2014-00102 and CBM2014-00103
`Patent 8,118,221 B2
`
`communications interface (external interface 1206) of the first repository.”
`
`Id.
`
`To support this assertion, Petitioner cites to several figures and the
`
`corresponding description of Stefik ’980. Id. at 45–61. Petitioner, however,
`
`does not explain persuasively how either Stefik ’235 or Stefik ’980 alone or
`
`in combination discloses the claimed limitations in the same form and order
`
`as in the claim. Although Stefik ’980 discloses repositories that may act in
`
`different capacities (see, e.g., Ex. 1014, Abstract), Petitioner does not
`
`persuasively establish it is more likely than not that either Stefik ’980 or
`
`Stefik ’235 discloses a system using repositories in the same form and order
`
`as in claims 1, 11, 12, and 32. For example, Petitioner asserts that “either of
`
`the first or second repositories shown in Fig. 1, or both of those repositories,
`
`could be configured as shown in Fig. 12,” but does not point to any
`
`disclosure of this configuration in the Stefik references. ’102 Pet. 42 (claim
`
`chart for claim 1) (emphasis added); 63 (claim chart for claim 12) (emphasis
`
`added).
`
`Thus, Petitioner has failed to establish that it is more likely than not
`
`that it would prevail in demonstrating that claims 1, 11, 12, and 32 are
`
`unpatentable as anticipated by the Stefik references.
`
`D. Additional Grounds Based on Stefik ’235 and Stefik ’980
`
`Petitioner contends that claims 1, 11, 12, and 32 would have been
`
`obvious over the Stefik references alone. ’102 Pet. 21, 26–31. Petitioner
`
`also contends that claims 1, 2, 11–14, and 32 would have been obvious over
`
`Stefik combined with Poggio and/or Sato. We find Petitioner’s contentions
`
`that claims 1, 2, and 11–14 would have been obvious over the Stefik
`
`14
`
`

`
`CBM2014-00102 and CBM2014-00103
`Patent 8,118,221 B2
`
`references persuasive, but are not persuaded by Petitioner’s contentions
`
`regarding claim 32 for the reasons discussed below.
`
`1. Claims 1, 11, and 12
`
`In light of the arguments and evidence, Petitioner has established that
`
`it is more likely than not that claims 1, 11, and 12 are unpatentable as
`
`obvious over the combined teachings of Stefik ’235 and Stefik ’980. See
`
`’102 Pet. 41–69.
`
`We are not persuaded by Patent Owner’s argument that there is no
`
`evidence that one of ordinary skill in the art would have combined
`
`Stefik ’235 and Stefik ’980 because Stefik ’235 does not identify sufficiently
`
`Stefik ’980. ’102 Prelim. Resp. 13–14. One reference need not identify
`
`explicitly another reference by “application serial number, filing date,
`
`inventors or attorney docket number” (id. at 13) in order to form the basis
`
`for an obviousness combination.
`
`Petitioner argues that “there is explicit motivation to implement the
`
`repository disclosed by Stefik ’980 using the Document Card (DocuCard) of
`
`Stefik ’235.” ’102 Pet. 26–27, n.13 (citing Ex. 1013, 2:47–52; Ex. 1014,
`
`16:56–58; Ex. 1021 ¶ 56). Stefik ’980 teaches that “the repository could be
`
`embedded in a ‘card’ that is inserted into an available slot in a computer
`
`system” (Ex. 1014, 16:56–58), and Stefik ’235 teaches a repository
`
`embedded in a card (Ex. 1013, 2:47–52). On the record before us, we are
`
`persuaded that Petitioner has provided sufficiently an articulated reasoning
`
`with some rational underpinning to support the legal conclusion of
`
`obviousness. See KSR Int’l v. Teleflex Inc., 550 U.S. 398, 418 (2007) (citing
`
`In re Kahn, 441 F.3d 977, 988 (Fed. Cir. 2006)).
`
`15
`
`

`
`CBM2014-00102 and CBM2014-00103
`Patent 8,118,221 B2
`
`We decline to proceed on the asserted grounds that claims 1, 11, and
`
`12 would have been obvious over Stefik combined with Poggio and/or Sato,
`
`as these grounds are redundant in light of the grounds on which we have
`
`decided to institute trial. See 37 C.F.R. § 42.208(a).
`
`2. Claims 2, 13, and 14
`
`Petitioner asserts that claims 2, 13, and 14 would have been obvious
`
`over Stefik combined with Poggio and/or Sato. ’102 Pet. 21, 31–40, 73–79.
`
`In light of the arguments and evidence, Petitioner has established that it is
`
`more likely than not that claims 2, 13, and 14 would have been obvious over
`
`the combination of Stefik ’235, Stefik ’980, and Poggio. On this record, we
`
`are persuaded that Petitioner’s citations support Petitioner’s contentions. Id.
`
`at 74–79.
`
`We are not persuaded by Patent Owner’s argument that because
`
`Petitioner has not proven that Stefik ’235 and Stefik ’980 qualify as a single
`
`reference, all combinations including those references fail. ’102 Prelim.
`
`Resp. 14–15. As described above, we are persuaded that Petitioner has
`
`provided sufficiently an articulated reasoning with some rational
`
`underpinning to support the legal conclusion of obviousness over a
`
`combination of Stefik ’235 and Stefik ’980. We further are persuaded that
`
`Petitioner has provided sufficiently an articulated reasoning with some
`
`rational underpinning to support the conclusion that a person of ordinary
`
`skill would also have included the teachings of Poggio. For example,
`
`Petitioner points to Poggio’s teaching that “facilitating the content
`
`transactions can advantageously be done with minimal action from the
`
`vendor, and payment validation processes that are automatically executed
`
`from stored code, as taught by Poggio, would contribute this additional
`
`16
`
`

`
`CBM2014-00102 and CBM2014-00103
`Patent 8,118,221 B2
`
`benefit to Stefik’s repository system.” ’102 Pet. 34 (citing Ex. 1014 2:66–
`
`3:1).
`
`For the reasons set forth above, Petitioner has established that it is
`
`more likely than not that it would prevail in demonstrating that claims 2, 13,
`
`and 14 would have been obvious over Stefik ’235, Stefik ’980, and Poggio.
`
`We decline to proceed on the asserted grounds that claims 2, 13, and 14
`
`would have been obvious over the Stefik references combined with Sato or
`
`with both Poggio and Sato, as these grounds are redundant in light of the
`
`grounds on which we have decided to institute trial. See 37 C.F.R.
`
`§ 42.208(a).
`
`3. Claim 32
`
`Petitioner asserts that independent claim 32 would have been obvious
`
`over Stefik alone or combined with Poggio and/or Sato. ’102 Pet. 21, 69–
`
`71.
`
`Claim 32 requires “at least one access rule,” which, as explained
`
`above, we construe as a rule specifying a condition under which access to
`
`content is permitted. Specifically, claim 32 recites
`
`code responsive to the payment validation data to receive at
`least one access rule from the data supplier and to write the at
`least one access rule into the data carrier, the at least one access
`rule specifying at least one condition for accessing the retrieved
`data written into the data carrier.
`
`Petitioner’s claim chart states that the claimed “access rule” corresponds to
`
`Stefik’s “(e.g., usage rights).” ’102 Pet. 70.
`
`Petitioner provides insufficient explanation as to how Stefik’s “usage
`
`rights” operate. Petitioner also does not show sufficiently why “usage
`
`rights” satisfy “access rule.” Even though “usage rights” may have
`
`17
`
`

`
`CBM2014-00102 and CBM2014-00103
`Patent 8,118,221 B2
`
`“conditions,” they are not necessarily rules, and Petitioner has not persuaded
`
`us otherwise. For example, rights portion 504 is described as “a data
`
`structure, such as a look-up table, wherein the various information
`
`associated with a right is maintained.” ’102 Pet. 47 (citing Ex. 1013, 8:8–
`
`10); see Ex. 1014, 9:54–10:1. An exemplary data structure is illustrated in
`
`Figure 10 of Stefik ’980 and the information contained in such a data
`
`structure is indicated in Table 1. Ex. 1014, 10:28–32. Table 1 of Stefik ’980
`
`discloses, for example, a “Loan-Period” property with a value in “Time-
`
`Units” that is an “[i]ndicator of the maximum number of time-units that a
`
`document can be loaned out.” A data structure and the information within it,
`
`however, cannot be a rule. At best, a rule might use the information in the
`
`data structure—e.g., if the number of time-units that a document has been
`
`leased out is less than Loan-Period, then allow access—but the usage right
`
`itself (e.g., Loan-Period) is not “a rule specifying a condition under which
`
`access to content is permitted,” as we have construed “access rule.”
`
`In addition, claim 32 recites “code responsive to the payment
`
`validation data to receive at least one access rule from the data supplier and
`
`to write the at least one access rule into the data carrier.” Petitioner’s claim
`
`chart asserts that “Stefik discloses attaching at least one access rule (e.g.,
`
`usage rights) to retrieved data (e.g., digital works), and then transmitting the
`
`attached access rule (e.g., usage rights) with the content when the content is
`
`provided to a data carrier (e.g., requesting repository).” ’102 Pet. 70.
`
`Petitioner, however, does not explain why transmitting usage rights with the
`
`content when the content is provided to a data carrier teaches code that is
`
`responsive to payment validation data to receive an access rule. Petitioner’s
`
`claim chart further asserts that Stefik discloses an example in which the
`
`18
`
`

`
`CBM2014-00102 and CBM2014-00103
`Patent 8,118,221 B2
`
`receipt of payment validation data (e.g., acceptance of assigned fees) is a
`
`prerequisite to providing a user with options to select a document and a
`
`desired function for the document to perform, and the requested content and
`
`attached access rule (e.g., usage rights) is provided to the requester
`
`responsive to (e.g., only after) payment validation. Id. at 70–71. Petitioner,
`
`however, does not explain why a requesting repository providing a user with
`
`the usage rights in response to payment validation teaches code that is
`
`responsive to the payment validation system to receive an access rule from
`
`the data supplier and to w

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket