throbber
Covered Business Method Patent Review
`United States Patent No. 8,118,221
`
`IN THE UNITED STATES PATENT AND TRADEMARK OFFICE
`
`Petitioner: Apple Inc.
`
`Attorney Docket No.:
`
` 104677-5008-813
`Customer No. 28120
`

`Inventor: Racz et al.
`United States Patent No.: 8,118,221 §
`Formerly Application No.: 12/943,872 §
`Issue Date: February 21, 2012

`Filing Date: November 10, 2010

`Former Group Art Unit: 2887

`Former Examiner: Thien M. Le

`
`For: Data Storage and Access Systems
`
`MAIL STOP PATENT BOARD
`Patent Trial and Appeal Board
`United States Patent and Trademark Office
`Post Office Box 1450
`Alexandria, Virginia 22313-1450
`
`PETITION FOR COVERED BUSINESS METHOD PATENT REVIEW OF
`UNITED STATES PATENT NO. 8,118,221 PURSUANT TO 35 U.S.C. § 321,
`37 C.F.R. § 42.304
`
`
`
`i
`
`
`

`
` Covered Business Method Patent Review
`United States Patent No. 8,118,221
`
`
`
`TABLE OF CONTENTS
`
`INTRODUCTION ....................................................................................................... 1
`I.
`II. OVERVIEW OF FIELD OF THE CLAIMED INVENTION ......................... 4
`III. PETITIONER HAS STANDING ............................................................................ 8
`A.
`The ’221 Patent Is a Covered Business Method Patent ............................... 8
`1.
`Exemplary Claim 32 Is Financial In Nature .................................... 10
`2.
`Claim 32 Does Not Cover A Technological Invention ................. 13
`Related Matters and Mandatory Notice Information; Petitioner Is a
`Real Party In Interest Sued for and Charged With Infringement ............ 18
`IV. DETAILED EXPLANATION OF REASONS FOR RELIEF REQUESTED,
`SHOWING IT IS MORE LIKELY THAN NOT THAT AT LEAST ONE
`CHALLENGED CLAIMS IS UNPATENTABLE ............................................. 19
`A.
`Claim Construction .......................................................................................... 19
`B.
`The Challenged Claims Are Invalid Under 35 U.S.C. §101 ...................... 23
`1.
`Claims Are Directed To Abstract Ideas ........................................... 24
`2.
`Claims Do Not Disclose An “Inventive Concept” That Is
`“Significantly More” Than an Abstract Idea ................................... 27
`Field Of Use Limitations Cannot Transform Abstract Ideas
`Into Patent Eligible Inventions .......................................................... 27
`Generic Computer Implementation Cannot Transform Ab-
`stract Ideas Into Patent Eligible Inventions..................................... 28
`The Functional Nature Of The Challenged Claims Con-
`firms Preemption and Patent Ineligibility ........................................ 34
`6. Machine-or-Transformation Test Confirms Ineligibility ............... 36
`The Challenged Claims Are Invalid Under 35 U.S.C. § 103 ..................... 36
`1.
`Overview of Stefik ............................................................................... 36
`2. Motivation to Combine Stefik with Poggio ..................................... 41
`3. Motivation to Combine Stefik and Poggio with Kopp .................. 45
`4. Motivation to Combine Stefik with Poggio, Kopp, and
`Smith ...................................................................................................... 49
`Claim 32 is Obvious............................................................................. 52
`
`B.
`
`C.
`
`3.
`
`4.
`
`5.
`
`5.
`
`i
`
`
`

`
` Covered Business Method Patent Review
`United States Patent No. 8,118,221
`
`CONCLUSION........................................................................................................... 79
`
`V.
`
`
`
`ii
`
`

`
`
`EXHIBIT LIST
`1201
`
`1202
`
`1203
`
`1204
`
`1205
`
`1206
`
`1207
`
`1208
`
`1209
`
`1210
`
`1211
`
`1212
`
`1213
`
`1214
`
`1215
`
`1216
`
`1217
`
`1218
`
`1219
`
`1220
`
` Covered Business Method Patent Review
`United States Patent No. 8,118,221
`
`
`U.S. Patent No. 8,118,221
`
`Plaintiffs’ First Amended Complaint
`
`File History for U.S. Patent No. 8,061,598
`
`File History for U.S. Patent No. 8,336,772
`
`U.S. Patent No. 5,675,734
`
`U.S. Patent No. 4,999,806
`
`U.S. Patent No. 4,878,245
`
`U.S. Patent No. 7,334,720
`
`U.S. Patent No. 7,942,317
`
`U.S. Patent No. 5,940,805
`
`File History for U.S. Patent No. 8,118,221
`
`U.S. Patent No. 5,103,392
`
`U.S. Patent No. 5,530,235
`
`U.S. Patent No. 5,629,980
`
`U.S. Patent No. 5,915,019
`
`European Patent Application, Publication No. EP0809221A2
`
`International Publication No. WO 99/43136
`
`JP Patent Application Publication No. H11-164058 (transla-
`tion)
`International Publication No. WO 95/34857
`
`Eberhard von Faber, Robert Hammelrath, and Franz-Peter
`Heider, “The Secure Distribution of Digital Contents,” IEEE
`(1997)
`
`iii
`
`

`
` Covered Business Method Patent Review
`United States Patent No. 8,118,221
`
`
`Declaration of Anthony J. Wechselberger In Support of Apple
`Inc.’s Petition for Covered Business Method Patent Review
`Declaration of Michael P. Duffey In Support of Apple Inc.’s
`Petition for Covered Business Method Patent Review
`Declaration of Flora D. Elias-Mique In Support of Apple
`Inc.’s Petition for Covered Business Method Patent Review
`U.S. Patent No. 8,033,458
`
`U.S. Patent No. 8,061,598
`
`U.S. Patent No. 8,336,772
`
`File History for U.S. Patent No. 7,334,720
`
`File History for U.S. Patent No. 7,942,317
`
`File History for U.S. Patent No. 8,033,458
`
`Claim Construction Memorandum Opinion from Smartflash
`LLC v. Apple Inc., No. 6:13cv447 (Dkt. 229)
`U.S. Patent No. 4,337,483
`
`U.S. Patent No. 7,725,375
`
`U.S. Patent No. 5,925,127
`
`EXHIBIT LIST
`1221
`
`1222
`
`1223
`
`1224
`
`1225
`
`1226
`
`1227
`
`1228
`
`1229
`
`1230
`
`1231
`
`1232
`
`1233
`
`iv
`
`

`
` Covered Business Method Patent Review
`United States Patent No. 8,118,221
`
`I.
`
`INTRODUCTION
`Pursuant to 35 U.S.C. § 321 and 37 C.F.R. § 42.304,1 the undersigned, on be-
`
`half of and acting in a representative capacity for petitioner, Apple Inc. (“Petitioner”
`
`and the real party in interest), petitions for review under the transitional program for
`
`covered business method patents of claim 1, 2, 11, and 32 (“the challenged claims”) of
`
`U.S. Patent No. 8,118,221 (“the ’221 Patent”), issued to Smartflash Technologies
`
`Limited and assigned to Smartflash LLC (“Smartflash,” also referred to as “Patentee”).
`
`Petitioner asserts it is more likely than not that the challenged claims are unpatentable
`
`for the reasons herein and requests review of, and judgment against, claim 1, 2, 11,
`
`and 32 as unpatentable under § 101, and claim 32 as unpatentable under § 103.
`
`As discussed in Section III.B, infra, Petitioner previously filed CBM2014-
`
`00102/103 seeking CBM review of the ’221 Patent. Those petitions were instituted
`
`for trial (and consolidated2) with respect to claims 1, 2, and 11-14 on grounds based
`
`on § 103, but the Board did not institute trial on claim 32. In its Institution Decision,
`
`the Board construed the term “access rule” as “a rule specifying a condition under
`
`which access to content is permitted,” and determined Petitioner had not shown it
`
`
`1 Petitioner is demonstrating, in pending litigation, that these claims are invalid for
`
`numerous additional reasons. All section cites herein are to 35 U.S.C. or 37 C.F.R.,
`
`as the context indicates, and all emphasis herein is added unless otherwise noted.
`
`2 Petitioner concurrently moves for joinder of this petition and CBM2014-00102.
`
`
`
`1
`
`
`

`
` Covered Business Method Patent Review
`United States Patent No. 8,118,221
`
`was more likely than not that it would prevail in demonstrating that Stefik, Poggio,
`
`and/or Sato rendered obvious code “responsive to payment validation data” to re-
`
`ceive an “access rule” specifying at least one condition for accessing data, the condi-
`
`tion being dependent upon the “amount of payment associated with the payment data
`
`forwarded to the payment validation system” under the Board’s construction. In light
`
`of the Board’s Decision, Petitioner now identifies additional prior art—Kopp and
`
`Smith (Exs.1210, 1219)—with explicit disclosures of “access rules” as construed by
`
`the Board and expressly disclosing code to retrieve access rules responsive to payment
`
`validation data and specifying access conditions dependent on amount of payment.
`
`Kopp, for example, describes a vending system that allows a user to specify a desired
`
`extent of usage, pay for only that amount of usage, and then receive data limited to
`
`the purchased usage amount (see, e.g., Ex.1210 2:50-65), while Smith provides express
`
`disclosure of a software vending system that allows a user to pre-pay license fees pro-
`
`portional to the value received from using software, rather than paying all or nothing
`
`(see, e.g., Ex.1219 6:1-5; 18:4-33). Petitioner has also identified additional disclosures in
`
`Stefik and Poggio concerning these limitations as construed, further confirming a
`
`POSITA3 would have found it entirely obvious and routine to implement the system
`
`
`3 All references to a person of ordinary skill in the art (“POSITA”) refer to the
`
`knowledge or understanding of a person of ordinary skill in the art as of October 25,
`
`1999, unless specifically noted. A POSITA would have at least a Bachelor of Science
`
`2
`
`

`
` Covered Business Method Patent Review
`United States Patent No. 8,118,221
`
`disclosed by Stefik and Poggio using the expressly advantageous teachings of Kopp
`
`and Smith, detailed in §IV.C, infra. See, e.g., Ex.1221 ¶¶ 57-79.
`
`The challenged claims merely recite a basic computer system well-known in the
`
`field of data storage and access. Claim 32 recites four rudimentary components of a
`
`data access terminal “for retrieving data from a data supplier and providing the retrieved data to a
`
`data carrier”—(A) an interface, (B) a data carrier interface, (C) a program store storing code,
`
`and (D) a processor . . . for implementing the stored code. The recited code is similarly
`
`elementary, reading and forwarding payment data (D1), receiving payment validation data (D2),
`
`responding to payment data (D3), responding to payment validation data (D4), and retrieving . . .
`
`value data and use rule data. Ex.1201 cl. 32. But at the earliest claimed priority date, these
`
`simple elements and their combination were well known. Indeed, the patent acknowl-
`
`edges that the idea of providing access to data in exchange for a payment (e.g., purchase
`
`of music on a CD) was already well known. E.g., Ex.1201 5:9-11 (“the purchase out-
`
`right option may be equivalent to the purchase of a compact disc (CD)”). And, as shown
`
`herein, the prior art was teeming with disclosures of this basic concept and its
`
`straightforward implementation. Further, claim 32 clearly involves no “technology” at all
`
`other than “a data access terminal,” with interfaces, a program store storing code, and a
`
`
`degree in electrical engineering, computer science or a telecommunications related
`
`field, and at least three years of industry experience that included client-server
`
`data/information distribution and management architectures. See Ex.1221 ¶ 24.
`
`3
`
`

`
` Covered Business Method Patent Review
`United States Patent No. 8,118,221
`
`processor that implements the well-known steps disclosed in the specification—all of
`
`which the patent concedes were well known and commonplace, stating that this “ter-
`
`minal comprises a general purpose computer.” E.g., Ex.1201 4:4, 16:32-33. The patent de-
`
`scribes no more than a system for retrieving data from and providing data to a data
`
`carrier while reading payment data, receiving payment data, responding to payment
`
`validation data, and retrieving user-stored data and use rule data.
`
`Indeed, as confirmed by the Supreme Court’s recent decision in Alice Corp. Pty,
`
`Ltd. v. CLS Bank Int’l, 134 S. Ct. 2347 (2014)—decided after Petitioner’s original chal-
`
`lenges to the ’221 were filed—claim 32 and the remaining challenged claims are also
`
`directed to patent-ineligible subject matter under § 101. As the Board noted in its
`
`previous Institution Decision, “the ’221 patent makes clear that the asserted novelty
`
`of the invention is not in any specific improvement of software or hardware, but in
`
`the method of controlling access to data,” CBM2014-00102, Pap. 8, 11, and the challenged
`
`claims are directed to nothing more than the unpatentable abstract idea of paying for
`
`and controlling access to data, with at most the addition of well-known, routine and
`
`conventional features—in particular, generic computer implementation that cannot
`
`confer patentability on these patent-ineligible abstractions. E.g., Alice, 134 S. Ct. at
`
`2359-60. Because each challenged claim recites unpatentable subject matter, and claim
`
`32 is also obvious, all of the challenged claims should be invalidated.
`
`II. OVERVIEW OF FIELD OF THE CLAIMED INVENTION
`By October 25, 1999, electronic sale, distribution, and content protection for
`
`4
`
`

`
` Covered Business Method Patent Review
`United States Patent No. 8,118,221
`
`digital products all would have been well-known to a POSITA, and their combination
`
`as claimed also would have been well-known or at minimum obvious to a POSITA.
`
`See, e.g., Ex.1221 ¶¶ 27-28. On March 12, 1991, for example, U.S. Patent No.
`
`4,999,806 (“Chernow,” filed Sept. 4, 1987), issued, disclosing a system and method for
`
`sale and distribution of digital products by phone, and for content protection. See
`
`Ex.1206 Abstract (“central station distributes software by telephone . . . accepts credit card in-
`
`formation, transmits an acceptance code . . . After verifying the credit card information, the station
`
`calls the purchaser back and continues with the transaction.”); 1:67-2:9 (describing “means for
`
`selling and distributing protected software using standard telephone lines,” “permit[ting] the purchaser
`
`to rent the protected software for a period of time,” and “to rent the protected software for a specific
`
`number of runs””). Chernow thus discloses making different types of access available,
`
`such as purchase versus rental, and further discloses a Control Transfer Program and
`
`Primary Protection Program that ensure the computer receiving a downloaded pro-
`
`gram does not have another program present that could create unauthorized copies.
`
`See Ex.1206 Abstract; 2:65-3:23; see also Ex.1221 ¶ 29.
`
`In April 1992, U.S. Patent No. 5,103,392 (“Mori,” filed Dec. 5, 1990), issued,
`
`disclosing use-based charging for digital products. See Ex.1212, 1:64-2:17:
`
`[D]ata processing apparatus includes user-specific credit data storage
`means for storing data identifying the user … and indicating credit for pay-
`ment capacity, use time length, or the like of the user … Also included is [1]
`use decision means for determining permission to use the program … on the basis
`
`5
`
`

`
` Covered Business Method Patent Review
`United States Patent No. 8,118,221
`
`
`of program-specific data supplied from the program storage means or user-
`specific credit data supplied from the user-specific credit data storage means,
`the use decision means delivering either an affirmative or negative signal corre-
`sponding to results of the decision[, and [2]] program use history storage
`means connected to the use decision means for storing program use history da-
`ta . . ..
`Mori’s emphasis on assuring permission to access a program and compensation to
`
`providers for use underscores the art’s focus on digital rights management (“DRM”),
`
`over eight years before the ’221’s claimed priority date. See also Ex.1221 ¶ 32.
`
`Also in 1997, Exhibit 1020 (“von Faber”) observed that “[e]lectronic commerce sys-
`
`tems dealing with the distribution of digital contents like software or multimedia data
`
`have to couple the use of the provided digital goods with a prior payment for the goods in a way
`
`which cannot be bypassed.” See id. at 7. Von Faber proposed a system where custom-
`
`ers purchase keys to utilize distributed encrypted content. See, e.g., id. (“one possible
`
`solution is to distribute the contents in encrypted form, and to have the customer pay for the key
`
`which he needs to transform the encrypted content in an usable form.”); id. at 8 (“The Content
`
`Provider provides digital contents in encrypted form being distributed by the Content Distribu-
`
`tor . . . The Authorisation System permits the distribution of the appropriate key after settling of
`
`the fees payable by the Customer, who will enjoy the decrypted digital contents.”); see also
`
`Ex.1220 at Fig. 1. Von Faber states its system could be used for a variety of known
`
`distribution and payment methods, and further addressed the known issue of payment
`
`distribution to content providers. See, e.g., Ex.1220 at 13 (“Different methods can be used
`
`6
`
`

`
` Covered Business Method Patent Review
`United States Patent No. 8,118,221
`
`to distribute the encrypted contents (standard techniques) . . . Different electronic payment meth-
`
`ods can be integrated . . . This flexibility leads to the fact that totally different authorisation methods
`
`can be integrated.”; “The system automatically divides the package price (payments) and guarantees
`
`that the money is transferred to each Content Provider.”). See also Ex.1221 ¶¶ 34-36.
`
`Moreover, U.S. Patent No. 5,915,019 (“Ginter,” filed Jan. 8, 1997), issued June
`
`22, 1999, disclosing “systems and methods for secure transaction management and
`
`electronic rights protection,” and describing a “virtual distribution environment”
`
`(VDE) to “control and/or meter or otherwise monitor use of electronically stored or
`
`disseminated information.” See, e.g., Ex.1215 Abstract. Ginter’s system “help[s] to
`
`ensure that information is accessed and used only in authorized ways, and maintain the integ-
`
`rity, availability, and/or confidentiality of the information.” See, e.g., id. Ginter discloses
`
`that entities can flexibly take on any of the roles within the VDE, see, e.g., id. 255:22-23
`
`(“All participants of VDE 100 have the innate ability to participate in any role.”);
`
`255:23-43, and thus highlights the known flexibility in such distribution systems, un-
`
`derscoring that combinations between and among disclosures of such distribution sys-
`
`tems would have been obvious to a POSITA. See also, e.g., Ex.1221 ¶¶ 37-38.
`
`Storage and utilization of content on portable devices, including mobile com-
`
`munication devices such as cellular phones, was also well-known before Smartflash’s
`
`claimed October 25, 1999 priority date. As one example, Exhibit 1017 (“Rydbeck,”
`
`pub’d Aug. 26, 1999), discloses a cellular phone for storing and accessing digital con-
`
`7
`
`

`
` Covered Business Method Patent Review
`United States Patent No. 8,118,221
`
`tent. See, e.g., Ex.1017 5:7-13 (“Because of its integration into the cellular phone, the digital
`
`entertainment module can share components already present in the cellular phone. [T]he use of solid
`
`state RAM or ROM, as opposed to disc storage, eliminates the need for bounce control
`
`circuitry. This enables the disclosed invention to provide cellular communications and entertain-
`
`ment”). And Exhibit 1018 (“Sato,” pub’d June 18, 1999), discloses storing and playing
`
`media on mobile devices, for example using a removable IC card. See, e.g., Ex.1218 ¶
`
`9 (“The portable music selection viewing device 70 provides a removable storage device 76
`
`[which] is a memory card similar to, for example. . . an IC card…. [T]he user can store the
`
`music software from another audio unit into the storage device 76 and enjoy music by inserting
`
`this storage unit 76 into this portable music selection and viewing device 70.”); ¶ 13
`
`(“A music storage medium 250 such as a magnetic card, magnetic tape, a CD, a DVD,
`
`or a memory card such as an IC card stores the music software, and this storage medium
`
`250 can be removed and used on other audio units.”). See also Ex.1221 ¶ 39.
`
`As these and the additional examples detailed below in Section IV.B illustrate,
`
`the prior art was rife with awareness and discussion of the same supposed “invention”
`
`memorialized in the challenged claims of the ’221 Patent.
`
`III. PETITIONER HAS STANDING
`A.
`The ’221 Patent Is a Covered Business Method Patent
`The ’221 Patent is a “covered business method patent” under § 18(d)(1) of the
`
`Leahy-Smith America Invents Act, Pub. L. 112-29 (“AIA”) and § 42.301, and Peti-
`
`tioner certifies it is available for review under § 42.304(a). See also CBM2014-00102,
`
`8
`
`

`
` Covered Business Method Patent Review
`United States Patent No. 8,118,221
`
`Pap. 8, 8-12 (finding claim 12 of ’221 Patent satisfies requirement); CBM2014-00112,
`
`Pap. 8, 8-12 (same for similar claim directed to a “data access terminal”). Although
`
`numerous claims of the ’221 qualify, a patent with even one claim covering a covered
`
`business method is considered a CBM patent. See CBM 2012-00001, Doc. 36 at 26;
`
`77 Fed. Reg. 48,709 (Aug. 14, 2012). Petitioner thus addresses exemplary claim 32:
`
`32. A data access terminal for retrieving data from a data supplier and
`providing the retrieved data to a data carrier, the terminal comprising:
`[A] a first interface for communicating with the data supplier;
`[B] a data carrier interface for interfacing with the data carrier;
`[C] a program store storing code; and
`[D] a processor coupled to the first interface, the data carrier interface,
`and the program store for implementing the stored code, the code com-
`prising:
`[D1] code to read payment data from the data carrier and to for-
`ward the payment data to a payment validation system;
`[D2] code to receive payment validation data from the payment
`validation system;
`[D3] code responsive to the payment validation data to retrieve
`data from the data supplier and to write the retrieved data into the
`data carrier;
`[D4] code responsive to the payment validation data to receive at
`least one access rule from the data supplier and to write the at least
`one access rule into the data carrier, the at least one access rule speci-
`fying at least one condition for accessing the retrieved data written in-
`to the data carrier, the at least one condition being dependent
`
`9
`
`

`
` Covered Business Method Patent Review
`United States Patent No. 8,118,221
`
`
`upon the amount of payment associated with the payment data
`forwarded to the payment validation system; and
`[D5] code to retrieve from the data supplier and output to a user-
`stored data identifier data and associated value data and use rule data
`for a data item available from the data supplier.
`1.
`Exemplary Claim 32 Is Financial In Nature
`A “covered business method patent” is “a patent that claims a method or corre-
`
`sponding apparatus for performing data processing or other operations used in the practice, admin-
`
`istration, or management of a financial product or service, except that the term does not in-
`
`clude patents for technological inventions.” AIA § 18(d)(1); § 42.301. “[T]he defini-
`
`tion of covered business method patent was drafted to encompass patents claiming
`
`activities that are financial in nature, incidental to a financial activity or complementary to a finan-
`
`cial activity.’” 77 Fed. Reg. 48,734-35 (Aug. 14, 2012) (citing 157 Cong. Rec. S5432 (dai-
`
`ly ed. Sept. 8, 2011)). “[F]inancial product or service” is to be interpreted broadly, id.,
`
`and “financial . . . simply means relating to monetary matters”—it does not require any link to
`
`traditional financial industries such as banks. See, e.g., CBM2012-00001, paper 36 at 23.
`
`The Board has previously found, e.g., that a claim for “transferring money electronical-
`
`ly via a telecommunication line to the first party . . . from the second party” met the
`
`financial product or service requirement, concluding that “the electronic transfer of
`
`money is a financial activity, and allowing such a transfer amounts to providing a fi-
`
`10
`
`

`
` Covered Business Method Patent Review
`United States Patent No. 8,118,221
`
`nancial service.” CBM2013-00020, paper 14 at 9-10. 4 See also, e.g., CBM2013-00017,
`
`paper 8 at 5-6.
`
`The ’221 patent includes claims to a “data access terminal” (e.g., a “convention-
`
`al computer” or mobile phone (Ex.1201 4:4-5)), that reads and forwards payment data
`
`from a data carrier (e.g., standard smart card (id. 11:29)) to a payment validation system
`
`for authorizing payment, receives payment data from the payment validation system,
`
`and code responsive to payment validation data that allows restricts to content in ex-
`
`change for payment (id. 8:21-23). See AIA § 18(d)(1); § 42.301(a). The patent alleges
`
`this data access terminal is part of a system that allows content owners to make con-
`
`tent available without fear of losing revenue. Ex.1201 2:11-15. See also id. Fig 12(a)-(e).
`
`More generally, the patent is about “[d]ata storage and access systems [that] enable
`
`downloading and paying for data . . .” Id. Abstract. “The combination of payment da-
`
`ta and stored content data . . . helps reduce the risk of unauthorized access.” Id. And
`
`in asserting the patent, Smartflash conceded the alleged invention relates to a financial
`
`activity or transaction, stating “[t]he patents-in-suit generally cover a portable data car-
`
`rier for storing data and managing access to the data via payment information and/or use
`
`status rules. The patents-in-suit also generally cover a computer network . . . that serves
`
`data and manages access to data by, for example, validating payment information.”
`
`
`4 Indeed, these aspects of claim 32 are generally similar to those of the claim found to
`
`convey CBM standing in CBM2014-00106/107, paper 8 at 9-13.
`
`11
`
`

`
` Covered Business Method Patent Review
`United States Patent No. 8,118,221
`
`Ex.1202 ¶ 17. The specification confirms the recited “data access terminal” “can
`
`communicate with a bank or other financial services provider to control payment” (id. 3:50-52) and
`
`can “validate payment with an external authority such as a bank” (id. 2:5-7). Further,
`
`“[p]ayment for the data item or items requested may either be made directly to the system owner
`
`or may be made to an e-payment system” (id. 20:50-54), which may be provided “according
`
`to, for example, MONDEX, Proton, and/or Visa cash compliant standards” and “payment
`
`authentication . . . may [] be performed by, for example, a data access terminal . . . using
`
`payment management code.” Id. 13:37-48. See also id. 7:62-8:56 (esp. 8:22-24); 11:59-65;
`
`Fig. 12(a)-(e).
`
`Claim 32 expressly recites software to perform data processing and other oper-
`
`ations in connection with the recited “payment validation system” (e.g., “to forward
`
`payment data to a payment validation system,” “to receive payment validation data”),
`
`and “to retrieve data [in response to the payment validation data”) and further re-
`
`quires software to “receive at least one access rule . . . specifying at least one condi-
`
`tion . . . the at least one condition being dependent upon the amount of payment as-
`
`sociated with the payment data . . .” Id. Thus, claim 23, which explicitly describes
`
`transmitting payment data to a payment validation system, receiving payment valida-
`
`tion, and controlling access to data based on payment, concerns a computer system
`
`(corresponding to methods discussed in the patent) for performing data processing
`
`and other operations used in the practice, administration, or management of a financial activity
`
`12
`
`

`
`and service. See, e.g., CBM2013-00020, Paper 14 at 10-11.
`
` Covered Business Method Patent Review
`United States Patent No. 8,118,221
`
`
`2.
`Claim 32 Does Not Cover A Technological Invention
`Further, claim 32 is not a “technological invention” that would trigger the ex-
`
`ception in AIA § 18(d)(1), because it does not claim “subject matter as a whole [that]
`
`recites a technological feature that is novel and unobvious over the prior art[] and solves a
`
`technical problem using a technical solution.” § 42.301(b). To the contrary, the ’221 patent
`
`itself makes clear that its claimed “data carrier” and payment validation systems were
`
`commonplace and could be implemented using well-known industry standards.
`
`(a) Claim 32 Does Not Recite A Technological Feature
`That Is Novel and Unobvious
`First, no “technological feature” of claim 32 is novel and unobvious. The PTO
`
`has confirmed that “[m]ere recitation of known technologies, such as computer hard-
`
`ware, communication or computer networks, software, memory, computer-readable
`
`storage medium, scanners, display devices or databases, or specialized machines, such
`
`as an ATM or point of sale device,” or “[r]eciting the use of known prior art technol-
`
`ogy to accomplish a process or method, even if that process or method is novel and
`
`non-obvious” will “not typically render a patent a technological invention.” See, e.g.,
`
`77 Fed. Reg. 48,756 48,764 (Aug. 14, 2012).
`
`As its language makes clear, claim 32 involves no “technology” at all other than, at
`
`most, “a data access terminal,” which includes an interface for communicating with
`
`the data supplier, data carrier interface, a program store storing code, and a processor
`
`13
`
`

`
` Covered Business Method Patent Review
`United States Patent No. 8,118,221
`
`that implements the well-known steps disclosed in the specification. Ex.1201; see also
`
`Section II, supra. “The data access terminal may be a conventional computer or, alterna-
`
`tively, it may be a mobile phone,” both of which were known in the art well before 2000.
`
`Id. 4:4-5; 16:33. Indeed, the specification disclaims the use of particular hardware, rely-
`
`ing instead on conventional hardware known to a POSITA: “[t]he physical embodiment
`
`of the system is not critical and a skilled person will understand that the terminals, data pro-
`
`cessing systems and the like can all take a variety of forms.” Id. 12:29-32. Payment validation
`
`systems were also well-known. See Ex.1201 13:35-47. The patent explains that “[t]he
`
`payment validation system may be part of the data supplier’s computer systems or it may be a
`
`separate e-payment system.” Id. 8:63-65. “E-payment systems. . .are coupled to banks
`
`[and] provide an e-payment system according to, for example, MONDEX, Proton, and/or Visa
`
`cash compliant standards. . . . payment data may be validated…by for example a data access
`
`terminal…using payment management code.” Id. 13:35-47.
`
`The “data supplier” of the claims is not a technological component, and does
`
`not require any specific hardware. See Ex.1201 6:16-18; 6:58-59. Rather, it is simply a
`
`supplier of online data. Id. 5:64-65; see also id. 6:58-60 (“The computer system is oper-
`
`ating by a data supplier or a data supplier ‘system owner’ for providing content data to
`
`the data carrier.”); 8:33-40; 12:2-4, 29-32; Fig. 4(b). Data suppliers were well known
`
`long before 2000. See id. 1:40-55.
`
`The use of software (code) for retrieving and storing data, reading and forward-
`
`14
`
`

`
` Covered Business Method Patent Review
`United States Patent No. 8,118,221
`
`ing payment data, receiving and responding to payment validation data, as disclosed in
`
`the specification, was also exceedingly well known in the art, and could not transform
`
`the claims into a technological invention. See, e.g., 77 Fed. Reg. 48,756 48,764 (Aug. 14,
`
`2012) (“[m]ere recitation of known technologies, such as . . . software, memory, com-
`
`puter-readable storage medium . . . [will] “not typically render a patent a technological
`
`invention.”); Ex.1221 § V; Section II, supra. The financial transaction performed by
`
`the code described in elements D1 through D4 was well known, because, as the pa-
`
`tent concedes, e-payment systems were known. Ex.1201 13:43-64 (“E-payment systems
`
`coupled to banks . . . these provide an e-payment system according to, for example, MONDEX,
`
`Proton, and/or Visa cash compliant standards . . . payment data may be validated by a data access
`
`terminal using payment management code.”); Ex.1219 18:7-17 (“Since the purchase process
`
`involves making a charge purchase on a credit card via a data modem, this process is
`
`subject to the strictest integrity controls for electronic financial transactions. Howev-
`
`er, there is absolutely nothing new that is required . . .”). Using code to implement this
`
`transaction, as disclosed in the specific

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket