`United States Patent No. 8,118,221
`
`IN THE UNITED STATES PATENT AND TRADEMARK OFFICE
`
`Petitioner: Apple Inc.
`
`Attorney Docket No.:
`
` 104677-5008-813
`Customer No. 28120
`
`§
`Inventor: Racz et al.
`United States Patent No.: 8,118,221 §
`Formerly Application No.: 12/943,872 §
`Issue Date: February 21, 2012
`§
`Filing Date: November 10, 2010
`§
`Former Group Art Unit: 2887
`§
`Former Examiner: Thien M. Le
`§
`
`For: Data Storage and Access Systems
`
`MAIL STOP PATENT BOARD
`Patent Trial and Appeal Board
`United States Patent and Trademark Office
`Post Office Box 1450
`Alexandria, Virginia 22313-1450
`
`PETITION FOR COVERED BUSINESS METHOD PATENT REVIEW OF
`UNITED STATES PATENT NO. 8,118,221 PURSUANT TO 35 U.S.C. § 321,
`37 C.F.R. § 42.304
`
`
`
`i
`
`
`
`
` Covered Business Method Patent Review
`United States Patent No. 8,118,221
`
`
`
`TABLE OF CONTENTS
`
`INTRODUCTION ....................................................................................................... 1
`I.
`II. OVERVIEW OF FIELD OF THE CLAIMED INVENTION ......................... 4
`III. PETITIONER HAS STANDING ............................................................................ 8
`A.
`The ’221 Patent Is a Covered Business Method Patent ............................... 8
`1.
`Exemplary Claim 32 Is Financial In Nature .................................... 10
`2.
`Claim 32 Does Not Cover A Technological Invention ................. 13
`Related Matters and Mandatory Notice Information; Petitioner Is a
`Real Party In Interest Sued for and Charged With Infringement ............ 18
`IV. DETAILED EXPLANATION OF REASONS FOR RELIEF REQUESTED,
`SHOWING IT IS MORE LIKELY THAN NOT THAT AT LEAST ONE
`CHALLENGED CLAIMS IS UNPATENTABLE ............................................. 19
`A.
`Claim Construction .......................................................................................... 19
`B.
`The Challenged Claims Are Invalid Under 35 U.S.C. §101 ...................... 23
`1.
`Claims Are Directed To Abstract Ideas ........................................... 24
`2.
`Claims Do Not Disclose An “Inventive Concept” That Is
`“Significantly More” Than an Abstract Idea ................................... 27
`Field Of Use Limitations Cannot Transform Abstract Ideas
`Into Patent Eligible Inventions .......................................................... 27
`Generic Computer Implementation Cannot Transform Ab-
`stract Ideas Into Patent Eligible Inventions..................................... 28
`The Functional Nature Of The Challenged Claims Con-
`firms Preemption and Patent Ineligibility ........................................ 34
`6. Machine-or-Transformation Test Confirms Ineligibility ............... 36
`The Challenged Claims Are Invalid Under 35 U.S.C. § 103 ..................... 36
`1.
`Overview of Stefik ............................................................................... 36
`2. Motivation to Combine Stefik with Poggio ..................................... 41
`3. Motivation to Combine Stefik and Poggio with Kopp .................. 45
`4. Motivation to Combine Stefik with Poggio, Kopp, and
`Smith ...................................................................................................... 49
`Claim 32 is Obvious............................................................................. 52
`
`B.
`
`C.
`
`3.
`
`4.
`
`5.
`
`5.
`
`i
`
`
`
`
` Covered Business Method Patent Review
`United States Patent No. 8,118,221
`
`CONCLUSION........................................................................................................... 79
`
`V.
`
`
`
`ii
`
`
`
`
`EXHIBIT LIST
`1201
`
`1202
`
`1203
`
`1204
`
`1205
`
`1206
`
`1207
`
`1208
`
`1209
`
`1210
`
`1211
`
`1212
`
`1213
`
`1214
`
`1215
`
`1216
`
`1217
`
`1218
`
`1219
`
`1220
`
` Covered Business Method Patent Review
`United States Patent No. 8,118,221
`
`
`U.S. Patent No. 8,118,221
`
`Plaintiffs’ First Amended Complaint
`
`File History for U.S. Patent No. 8,061,598
`
`File History for U.S. Patent No. 8,336,772
`
`U.S. Patent No. 5,675,734
`
`U.S. Patent No. 4,999,806
`
`U.S. Patent No. 4,878,245
`
`U.S. Patent No. 7,334,720
`
`U.S. Patent No. 7,942,317
`
`U.S. Patent No. 5,940,805
`
`File History for U.S. Patent No. 8,118,221
`
`U.S. Patent No. 5,103,392
`
`U.S. Patent No. 5,530,235
`
`U.S. Patent No. 5,629,980
`
`U.S. Patent No. 5,915,019
`
`European Patent Application, Publication No. EP0809221A2
`
`International Publication No. WO 99/43136
`
`JP Patent Application Publication No. H11-164058 (transla-
`tion)
`International Publication No. WO 95/34857
`
`Eberhard von Faber, Robert Hammelrath, and Franz-Peter
`Heider, “The Secure Distribution of Digital Contents,” IEEE
`(1997)
`
`iii
`
`
`
` Covered Business Method Patent Review
`United States Patent No. 8,118,221
`
`
`Declaration of Anthony J. Wechselberger In Support of Apple
`Inc.’s Petition for Covered Business Method Patent Review
`Declaration of Michael P. Duffey In Support of Apple Inc.’s
`Petition for Covered Business Method Patent Review
`Declaration of Flora D. Elias-Mique In Support of Apple
`Inc.’s Petition for Covered Business Method Patent Review
`U.S. Patent No. 8,033,458
`
`U.S. Patent No. 8,061,598
`
`U.S. Patent No. 8,336,772
`
`File History for U.S. Patent No. 7,334,720
`
`File History for U.S. Patent No. 7,942,317
`
`File History for U.S. Patent No. 8,033,458
`
`Claim Construction Memorandum Opinion from Smartflash
`LLC v. Apple Inc., No. 6:13cv447 (Dkt. 229)
`U.S. Patent No. 4,337,483
`
`U.S. Patent No. 7,725,375
`
`U.S. Patent No. 5,925,127
`
`EXHIBIT LIST
`1221
`
`1222
`
`1223
`
`1224
`
`1225
`
`1226
`
`1227
`
`1228
`
`1229
`
`1230
`
`1231
`
`1232
`
`1233
`
`iv
`
`
`
` Covered Business Method Patent Review
`United States Patent No. 8,118,221
`
`I.
`
`INTRODUCTION
`Pursuant to 35 U.S.C. § 321 and 37 C.F.R. § 42.304,1 the undersigned, on be-
`
`half of and acting in a representative capacity for petitioner, Apple Inc. (“Petitioner”
`
`and the real party in interest), petitions for review under the transitional program for
`
`covered business method patents of claim 1, 2, 11, and 32 (“the challenged claims”) of
`
`U.S. Patent No. 8,118,221 (“the ’221 Patent”), issued to Smartflash Technologies
`
`Limited and assigned to Smartflash LLC (“Smartflash,” also referred to as “Patentee”).
`
`Petitioner asserts it is more likely than not that the challenged claims are unpatentable
`
`for the reasons herein and requests review of, and judgment against, claim 1, 2, 11,
`
`and 32 as unpatentable under § 101, and claim 32 as unpatentable under § 103.
`
`As discussed in Section III.B, infra, Petitioner previously filed CBM2014-
`
`00102/103 seeking CBM review of the ’221 Patent. Those petitions were instituted
`
`for trial (and consolidated2) with respect to claims 1, 2, and 11-14 on grounds based
`
`on § 103, but the Board did not institute trial on claim 32. In its Institution Decision,
`
`the Board construed the term “access rule” as “a rule specifying a condition under
`
`which access to content is permitted,” and determined Petitioner had not shown it
`
`
`1 Petitioner is demonstrating, in pending litigation, that these claims are invalid for
`
`numerous additional reasons. All section cites herein are to 35 U.S.C. or 37 C.F.R.,
`
`as the context indicates, and all emphasis herein is added unless otherwise noted.
`
`2 Petitioner concurrently moves for joinder of this petition and CBM2014-00102.
`
`
`
`1
`
`
`
`
` Covered Business Method Patent Review
`United States Patent No. 8,118,221
`
`was more likely than not that it would prevail in demonstrating that Stefik, Poggio,
`
`and/or Sato rendered obvious code “responsive to payment validation data” to re-
`
`ceive an “access rule” specifying at least one condition for accessing data, the condi-
`
`tion being dependent upon the “amount of payment associated with the payment data
`
`forwarded to the payment validation system” under the Board’s construction. In light
`
`of the Board’s Decision, Petitioner now identifies additional prior art—Kopp and
`
`Smith (Exs.1210, 1219)—with explicit disclosures of “access rules” as construed by
`
`the Board and expressly disclosing code to retrieve access rules responsive to payment
`
`validation data and specifying access conditions dependent on amount of payment.
`
`Kopp, for example, describes a vending system that allows a user to specify a desired
`
`extent of usage, pay for only that amount of usage, and then receive data limited to
`
`the purchased usage amount (see, e.g., Ex.1210 2:50-65), while Smith provides express
`
`disclosure of a software vending system that allows a user to pre-pay license fees pro-
`
`portional to the value received from using software, rather than paying all or nothing
`
`(see, e.g., Ex.1219 6:1-5; 18:4-33). Petitioner has also identified additional disclosures in
`
`Stefik and Poggio concerning these limitations as construed, further confirming a
`
`POSITA3 would have found it entirely obvious and routine to implement the system
`
`
`3 All references to a person of ordinary skill in the art (“POSITA”) refer to the
`
`knowledge or understanding of a person of ordinary skill in the art as of October 25,
`
`1999, unless specifically noted. A POSITA would have at least a Bachelor of Science
`
`2
`
`
`
` Covered Business Method Patent Review
`United States Patent No. 8,118,221
`
`disclosed by Stefik and Poggio using the expressly advantageous teachings of Kopp
`
`and Smith, detailed in §IV.C, infra. See, e.g., Ex.1221 ¶¶ 57-79.
`
`The challenged claims merely recite a basic computer system well-known in the
`
`field of data storage and access. Claim 32 recites four rudimentary components of a
`
`data access terminal “for retrieving data from a data supplier and providing the retrieved data to a
`
`data carrier”—(A) an interface, (B) a data carrier interface, (C) a program store storing code,
`
`and (D) a processor . . . for implementing the stored code. The recited code is similarly
`
`elementary, reading and forwarding payment data (D1), receiving payment validation data (D2),
`
`responding to payment data (D3), responding to payment validation data (D4), and retrieving . . .
`
`value data and use rule data. Ex.1201 cl. 32. But at the earliest claimed priority date, these
`
`simple elements and their combination were well known. Indeed, the patent acknowl-
`
`edges that the idea of providing access to data in exchange for a payment (e.g., purchase
`
`of music on a CD) was already well known. E.g., Ex.1201 5:9-11 (“the purchase out-
`
`right option may be equivalent to the purchase of a compact disc (CD)”). And, as shown
`
`herein, the prior art was teeming with disclosures of this basic concept and its
`
`straightforward implementation. Further, claim 32 clearly involves no “technology” at all
`
`other than “a data access terminal,” with interfaces, a program store storing code, and a
`
`
`degree in electrical engineering, computer science or a telecommunications related
`
`field, and at least three years of industry experience that included client-server
`
`data/information distribution and management architectures. See Ex.1221 ¶ 24.
`
`3
`
`
`
` Covered Business Method Patent Review
`United States Patent No. 8,118,221
`
`processor that implements the well-known steps disclosed in the specification—all of
`
`which the patent concedes were well known and commonplace, stating that this “ter-
`
`minal comprises a general purpose computer.” E.g., Ex.1201 4:4, 16:32-33. The patent de-
`
`scribes no more than a system for retrieving data from and providing data to a data
`
`carrier while reading payment data, receiving payment data, responding to payment
`
`validation data, and retrieving user-stored data and use rule data.
`
`Indeed, as confirmed by the Supreme Court’s recent decision in Alice Corp. Pty,
`
`Ltd. v. CLS Bank Int’l, 134 S. Ct. 2347 (2014)—decided after Petitioner’s original chal-
`
`lenges to the ’221 were filed—claim 32 and the remaining challenged claims are also
`
`directed to patent-ineligible subject matter under § 101. As the Board noted in its
`
`previous Institution Decision, “the ’221 patent makes clear that the asserted novelty
`
`of the invention is not in any specific improvement of software or hardware, but in
`
`the method of controlling access to data,” CBM2014-00102, Pap. 8, 11, and the challenged
`
`claims are directed to nothing more than the unpatentable abstract idea of paying for
`
`and controlling access to data, with at most the addition of well-known, routine and
`
`conventional features—in particular, generic computer implementation that cannot
`
`confer patentability on these patent-ineligible abstractions. E.g., Alice, 134 S. Ct. at
`
`2359-60. Because each challenged claim recites unpatentable subject matter, and claim
`
`32 is also obvious, all of the challenged claims should be invalidated.
`
`II. OVERVIEW OF FIELD OF THE CLAIMED INVENTION
`By October 25, 1999, electronic sale, distribution, and content protection for
`
`4
`
`
`
` Covered Business Method Patent Review
`United States Patent No. 8,118,221
`
`digital products all would have been well-known to a POSITA, and their combination
`
`as claimed also would have been well-known or at minimum obvious to a POSITA.
`
`See, e.g., Ex.1221 ¶¶ 27-28. On March 12, 1991, for example, U.S. Patent No.
`
`4,999,806 (“Chernow,” filed Sept. 4, 1987), issued, disclosing a system and method for
`
`sale and distribution of digital products by phone, and for content protection. See
`
`Ex.1206 Abstract (“central station distributes software by telephone . . . accepts credit card in-
`
`formation, transmits an acceptance code . . . After verifying the credit card information, the station
`
`calls the purchaser back and continues with the transaction.”); 1:67-2:9 (describing “means for
`
`selling and distributing protected software using standard telephone lines,” “permit[ting] the purchaser
`
`to rent the protected software for a period of time,” and “to rent the protected software for a specific
`
`number of runs””). Chernow thus discloses making different types of access available,
`
`such as purchase versus rental, and further discloses a Control Transfer Program and
`
`Primary Protection Program that ensure the computer receiving a downloaded pro-
`
`gram does not have another program present that could create unauthorized copies.
`
`See Ex.1206 Abstract; 2:65-3:23; see also Ex.1221 ¶ 29.
`
`In April 1992, U.S. Patent No. 5,103,392 (“Mori,” filed Dec. 5, 1990), issued,
`
`disclosing use-based charging for digital products. See Ex.1212, 1:64-2:17:
`
`[D]ata processing apparatus includes user-specific credit data storage
`means for storing data identifying the user … and indicating credit for pay-
`ment capacity, use time length, or the like of the user … Also included is [1]
`use decision means for determining permission to use the program … on the basis
`
`5
`
`
`
` Covered Business Method Patent Review
`United States Patent No. 8,118,221
`
`
`of program-specific data supplied from the program storage means or user-
`specific credit data supplied from the user-specific credit data storage means,
`the use decision means delivering either an affirmative or negative signal corre-
`sponding to results of the decision[, and [2]] program use history storage
`means connected to the use decision means for storing program use history da-
`ta . . ..
`Mori’s emphasis on assuring permission to access a program and compensation to
`
`providers for use underscores the art’s focus on digital rights management (“DRM”),
`
`over eight years before the ’221’s claimed priority date. See also Ex.1221 ¶ 32.
`
`Also in 1997, Exhibit 1020 (“von Faber”) observed that “[e]lectronic commerce sys-
`
`tems dealing with the distribution of digital contents like software or multimedia data
`
`have to couple the use of the provided digital goods with a prior payment for the goods in a way
`
`which cannot be bypassed.” See id. at 7. Von Faber proposed a system where custom-
`
`ers purchase keys to utilize distributed encrypted content. See, e.g., id. (“one possible
`
`solution is to distribute the contents in encrypted form, and to have the customer pay for the key
`
`which he needs to transform the encrypted content in an usable form.”); id. at 8 (“The Content
`
`Provider provides digital contents in encrypted form being distributed by the Content Distribu-
`
`tor . . . The Authorisation System permits the distribution of the appropriate key after settling of
`
`the fees payable by the Customer, who will enjoy the decrypted digital contents.”); see also
`
`Ex.1220 at Fig. 1. Von Faber states its system could be used for a variety of known
`
`distribution and payment methods, and further addressed the known issue of payment
`
`distribution to content providers. See, e.g., Ex.1220 at 13 (“Different methods can be used
`
`6
`
`
`
` Covered Business Method Patent Review
`United States Patent No. 8,118,221
`
`to distribute the encrypted contents (standard techniques) . . . Different electronic payment meth-
`
`ods can be integrated . . . This flexibility leads to the fact that totally different authorisation methods
`
`can be integrated.”; “The system automatically divides the package price (payments) and guarantees
`
`that the money is transferred to each Content Provider.”). See also Ex.1221 ¶¶ 34-36.
`
`Moreover, U.S. Patent No. 5,915,019 (“Ginter,” filed Jan. 8, 1997), issued June
`
`22, 1999, disclosing “systems and methods for secure transaction management and
`
`electronic rights protection,” and describing a “virtual distribution environment”
`
`(VDE) to “control and/or meter or otherwise monitor use of electronically stored or
`
`disseminated information.” See, e.g., Ex.1215 Abstract. Ginter’s system “help[s] to
`
`ensure that information is accessed and used only in authorized ways, and maintain the integ-
`
`rity, availability, and/or confidentiality of the information.” See, e.g., id. Ginter discloses
`
`that entities can flexibly take on any of the roles within the VDE, see, e.g., id. 255:22-23
`
`(“All participants of VDE 100 have the innate ability to participate in any role.”);
`
`255:23-43, and thus highlights the known flexibility in such distribution systems, un-
`
`derscoring that combinations between and among disclosures of such distribution sys-
`
`tems would have been obvious to a POSITA. See also, e.g., Ex.1221 ¶¶ 37-38.
`
`Storage and utilization of content on portable devices, including mobile com-
`
`munication devices such as cellular phones, was also well-known before Smartflash’s
`
`claimed October 25, 1999 priority date. As one example, Exhibit 1017 (“Rydbeck,”
`
`pub’d Aug. 26, 1999), discloses a cellular phone for storing and accessing digital con-
`
`7
`
`
`
` Covered Business Method Patent Review
`United States Patent No. 8,118,221
`
`tent. See, e.g., Ex.1017 5:7-13 (“Because of its integration into the cellular phone, the digital
`
`entertainment module can share components already present in the cellular phone. [T]he use of solid
`
`state RAM or ROM, as opposed to disc storage, eliminates the need for bounce control
`
`circuitry. This enables the disclosed invention to provide cellular communications and entertain-
`
`ment”). And Exhibit 1018 (“Sato,” pub’d June 18, 1999), discloses storing and playing
`
`media on mobile devices, for example using a removable IC card. See, e.g., Ex.1218 ¶
`
`9 (“The portable music selection viewing device 70 provides a removable storage device 76
`
`[which] is a memory card similar to, for example. . . an IC card…. [T]he user can store the
`
`music software from another audio unit into the storage device 76 and enjoy music by inserting
`
`this storage unit 76 into this portable music selection and viewing device 70.”); ¶ 13
`
`(“A music storage medium 250 such as a magnetic card, magnetic tape, a CD, a DVD,
`
`or a memory card such as an IC card stores the music software, and this storage medium
`
`250 can be removed and used on other audio units.”). See also Ex.1221 ¶ 39.
`
`As these and the additional examples detailed below in Section IV.B illustrate,
`
`the prior art was rife with awareness and discussion of the same supposed “invention”
`
`memorialized in the challenged claims of the ’221 Patent.
`
`III. PETITIONER HAS STANDING
`A.
`The ’221 Patent Is a Covered Business Method Patent
`The ’221 Patent is a “covered business method patent” under § 18(d)(1) of the
`
`Leahy-Smith America Invents Act, Pub. L. 112-29 (“AIA”) and § 42.301, and Peti-
`
`tioner certifies it is available for review under § 42.304(a). See also CBM2014-00102,
`
`8
`
`
`
` Covered Business Method Patent Review
`United States Patent No. 8,118,221
`
`Pap. 8, 8-12 (finding claim 12 of ’221 Patent satisfies requirement); CBM2014-00112,
`
`Pap. 8, 8-12 (same for similar claim directed to a “data access terminal”). Although
`
`numerous claims of the ’221 qualify, a patent with even one claim covering a covered
`
`business method is considered a CBM patent. See CBM 2012-00001, Doc. 36 at 26;
`
`77 Fed. Reg. 48,709 (Aug. 14, 2012). Petitioner thus addresses exemplary claim 32:
`
`32. A data access terminal for retrieving data from a data supplier and
`providing the retrieved data to a data carrier, the terminal comprising:
`[A] a first interface for communicating with the data supplier;
`[B] a data carrier interface for interfacing with the data carrier;
`[C] a program store storing code; and
`[D] a processor coupled to the first interface, the data carrier interface,
`and the program store for implementing the stored code, the code com-
`prising:
`[D1] code to read payment data from the data carrier and to for-
`ward the payment data to a payment validation system;
`[D2] code to receive payment validation data from the payment
`validation system;
`[D3] code responsive to the payment validation data to retrieve
`data from the data supplier and to write the retrieved data into the
`data carrier;
`[D4] code responsive to the payment validation data to receive at
`least one access rule from the data supplier and to write the at least
`one access rule into the data carrier, the at least one access rule speci-
`fying at least one condition for accessing the retrieved data written in-
`to the data carrier, the at least one condition being dependent
`
`9
`
`
`
` Covered Business Method Patent Review
`United States Patent No. 8,118,221
`
`
`upon the amount of payment associated with the payment data
`forwarded to the payment validation system; and
`[D5] code to retrieve from the data supplier and output to a user-
`stored data identifier data and associated value data and use rule data
`for a data item available from the data supplier.
`1.
`Exemplary Claim 32 Is Financial In Nature
`A “covered business method patent” is “a patent that claims a method or corre-
`
`sponding apparatus for performing data processing or other operations used in the practice, admin-
`
`istration, or management of a financial product or service, except that the term does not in-
`
`clude patents for technological inventions.” AIA § 18(d)(1); § 42.301. “[T]he defini-
`
`tion of covered business method patent was drafted to encompass patents claiming
`
`activities that are financial in nature, incidental to a financial activity or complementary to a finan-
`
`cial activity.’” 77 Fed. Reg. 48,734-35 (Aug. 14, 2012) (citing 157 Cong. Rec. S5432 (dai-
`
`ly ed. Sept. 8, 2011)). “[F]inancial product or service” is to be interpreted broadly, id.,
`
`and “financial . . . simply means relating to monetary matters”—it does not require any link to
`
`traditional financial industries such as banks. See, e.g., CBM2012-00001, paper 36 at 23.
`
`The Board has previously found, e.g., that a claim for “transferring money electronical-
`
`ly via a telecommunication line to the first party . . . from the second party” met the
`
`financial product or service requirement, concluding that “the electronic transfer of
`
`money is a financial activity, and allowing such a transfer amounts to providing a fi-
`
`10
`
`
`
` Covered Business Method Patent Review
`United States Patent No. 8,118,221
`
`nancial service.” CBM2013-00020, paper 14 at 9-10. 4 See also, e.g., CBM2013-00017,
`
`paper 8 at 5-6.
`
`The ’221 patent includes claims to a “data access terminal” (e.g., a “convention-
`
`al computer” or mobile phone (Ex.1201 4:4-5)), that reads and forwards payment data
`
`from a data carrier (e.g., standard smart card (id. 11:29)) to a payment validation system
`
`for authorizing payment, receives payment data from the payment validation system,
`
`and code responsive to payment validation data that allows restricts to content in ex-
`
`change for payment (id. 8:21-23). See AIA § 18(d)(1); § 42.301(a). The patent alleges
`
`this data access terminal is part of a system that allows content owners to make con-
`
`tent available without fear of losing revenue. Ex.1201 2:11-15. See also id. Fig 12(a)-(e).
`
`More generally, the patent is about “[d]ata storage and access systems [that] enable
`
`downloading and paying for data . . .” Id. Abstract. “The combination of payment da-
`
`ta and stored content data . . . helps reduce the risk of unauthorized access.” Id. And
`
`in asserting the patent, Smartflash conceded the alleged invention relates to a financial
`
`activity or transaction, stating “[t]he patents-in-suit generally cover a portable data car-
`
`rier for storing data and managing access to the data via payment information and/or use
`
`status rules. The patents-in-suit also generally cover a computer network . . . that serves
`
`data and manages access to data by, for example, validating payment information.”
`
`
`4 Indeed, these aspects of claim 32 are generally similar to those of the claim found to
`
`convey CBM standing in CBM2014-00106/107, paper 8 at 9-13.
`
`11
`
`
`
` Covered Business Method Patent Review
`United States Patent No. 8,118,221
`
`Ex.1202 ¶ 17. The specification confirms the recited “data access terminal” “can
`
`communicate with a bank or other financial services provider to control payment” (id. 3:50-52) and
`
`can “validate payment with an external authority such as a bank” (id. 2:5-7). Further,
`
`“[p]ayment for the data item or items requested may either be made directly to the system owner
`
`or may be made to an e-payment system” (id. 20:50-54), which may be provided “according
`
`to, for example, MONDEX, Proton, and/or Visa cash compliant standards” and “payment
`
`authentication . . . may [] be performed by, for example, a data access terminal . . . using
`
`payment management code.” Id. 13:37-48. See also id. 7:62-8:56 (esp. 8:22-24); 11:59-65;
`
`Fig. 12(a)-(e).
`
`Claim 32 expressly recites software to perform data processing and other oper-
`
`ations in connection with the recited “payment validation system” (e.g., “to forward
`
`payment data to a payment validation system,” “to receive payment validation data”),
`
`and “to retrieve data [in response to the payment validation data”) and further re-
`
`quires software to “receive at least one access rule . . . specifying at least one condi-
`
`tion . . . the at least one condition being dependent upon the amount of payment as-
`
`sociated with the payment data . . .” Id. Thus, claim 23, which explicitly describes
`
`transmitting payment data to a payment validation system, receiving payment valida-
`
`tion, and controlling access to data based on payment, concerns a computer system
`
`(corresponding to methods discussed in the patent) for performing data processing
`
`and other operations used in the practice, administration, or management of a financial activity
`
`12
`
`
`
`and service. See, e.g., CBM2013-00020, Paper 14 at 10-11.
`
` Covered Business Method Patent Review
`United States Patent No. 8,118,221
`
`
`2.
`Claim 32 Does Not Cover A Technological Invention
`Further, claim 32 is not a “technological invention” that would trigger the ex-
`
`ception in AIA § 18(d)(1), because it does not claim “subject matter as a whole [that]
`
`recites a technological feature that is novel and unobvious over the prior art[] and solves a
`
`technical problem using a technical solution.” § 42.301(b). To the contrary, the ’221 patent
`
`itself makes clear that its claimed “data carrier” and payment validation systems were
`
`commonplace and could be implemented using well-known industry standards.
`
`(a) Claim 32 Does Not Recite A Technological Feature
`That Is Novel and Unobvious
`First, no “technological feature” of claim 32 is novel and unobvious. The PTO
`
`has confirmed that “[m]ere recitation of known technologies, such as computer hard-
`
`ware, communication or computer networks, software, memory, computer-readable
`
`storage medium, scanners, display devices or databases, or specialized machines, such
`
`as an ATM or point of sale device,” or “[r]eciting the use of known prior art technol-
`
`ogy to accomplish a process or method, even if that process or method is novel and
`
`non-obvious” will “not typically render a patent a technological invention.” See, e.g.,
`
`77 Fed. Reg. 48,756 48,764 (Aug. 14, 2012).
`
`As its language makes clear, claim 32 involves no “technology” at all other than, at
`
`most, “a data access terminal,” which includes an interface for communicating with
`
`the data supplier, data carrier interface, a program store storing code, and a processor
`
`13
`
`
`
` Covered Business Method Patent Review
`United States Patent No. 8,118,221
`
`that implements the well-known steps disclosed in the specification. Ex.1201; see also
`
`Section II, supra. “The data access terminal may be a conventional computer or, alterna-
`
`tively, it may be a mobile phone,” both of which were known in the art well before 2000.
`
`Id. 4:4-5; 16:33. Indeed, the specification disclaims the use of particular hardware, rely-
`
`ing instead on conventional hardware known to a POSITA: “[t]he physical embodiment
`
`of the system is not critical and a skilled person will understand that the terminals, data pro-
`
`cessing systems and the like can all take a variety of forms.” Id. 12:29-32. Payment validation
`
`systems were also well-known. See Ex.1201 13:35-47. The patent explains that “[t]he
`
`payment validation system may be part of the data supplier’s computer systems or it may be a
`
`separate e-payment system.” Id. 8:63-65. “E-payment systems. . .are coupled to banks
`
`[and] provide an e-payment system according to, for example, MONDEX, Proton, and/or Visa
`
`cash compliant standards. . . . payment data may be validated…by for example a data access
`
`terminal…using payment management code.” Id. 13:35-47.
`
`The “data supplier” of the claims is not a technological component, and does
`
`not require any specific hardware. See Ex.1201 6:16-18; 6:58-59. Rather, it is simply a
`
`supplier of online data. Id. 5:64-65; see also id. 6:58-60 (“The computer system is oper-
`
`ating by a data supplier or a data supplier ‘system owner’ for providing content data to
`
`the data carrier.”); 8:33-40; 12:2-4, 29-32; Fig. 4(b). Data suppliers were well known
`
`long before 2000. See id. 1:40-55.
`
`The use of software (code) for retrieving and storing data, reading and forward-
`
`14
`
`
`
` Covered Business Method Patent Review
`United States Patent No. 8,118,221
`
`ing payment data, receiving and responding to payment validation data, as disclosed in
`
`the specification, was also exceedingly well known in the art, and could not transform
`
`the claims into a technological invention. See, e.g., 77 Fed. Reg. 48,756 48,764 (Aug. 14,
`
`2012) (“[m]ere recitation of known technologies, such as . . . software, memory, com-
`
`puter-readable storage medium . . . [will] “not typically render a patent a technological
`
`invention.”); Ex.1221 § V; Section II, supra. The financial transaction performed by
`
`the code described in elements D1 through D4 was well known, because, as the pa-
`
`tent concedes, e-payment systems were known. Ex.1201 13:43-64 (“E-payment systems
`
`coupled to banks . . . these provide an e-payment system according to, for example, MONDEX,
`
`Proton, and/or Visa cash compliant standards . . . payment data may be validated by a data access
`
`terminal using payment management code.”); Ex.1219 18:7-17 (“Since the purchase process
`
`involves making a charge purchase on a credit card via a data modem, this process is
`
`subject to the strictest integrity controls for electronic financial transactions. Howev-
`
`er, there is absolutely nothing new that is required . . .”). Using code to implement this
`
`transaction, as disclosed in the specific