throbber
CBM2015-00015
`United States Patent No. 8,118,221
`
`
`UNITED STATES PATENT AND TRADEMARK OFFICE
`
`____________
`
`BEFORE THE PATENT TRIAL AND APPEAL BOARD
`
`____________
`
`APPLE INC.,
`Petitioner,
`
`v.
`
`SMARTFLASH LLC,
`Patent Owner.
`
`
`____________
`
`Case CBM2015-00015
`Patent 8,118,221
`
`____________
`
`
`
`
`
`
`
`
`
`CORRECTED PETITION FOR COVERED BUSINESS METHOD
`PATENT REVIEW OF UNITED STATES PATENT NO. 8,118,221
`PURSUANT TO 35 U.S.C. § 321, 37 C.F.R. § 42.3041
`
`
`
`
`1 As directed by the Board in Pap. 7, Petitioner hereby resubmits this Petition to ad-
`
`dress formality issues identified therein.
`
`i
`
`
`

`
` CBM2015-00015
`United States Patent No. 8,118,221
`
`
`
`TABLE OF CONTENTS
`
`B.
`
`C.
`
`3.
`4.
`
`INTRODUCTION ....................................................................................................... 1
`I.
`II. OVERVIEW OF FIELD OF THE CLAIMED INVENTION ......................... 4
`III. PETITIONER HAS STANDING ............................................................................ 8
`A.
`The ’221 Patent Is a Covered Business Method Patent ............................... 8
`1.
`Exemplary Claim 32 Is Financial In Nature ...................................... 9
`2.
`Claim 32 Does Not Cover A Technological Invention ................. 12
`Related Matters and Mandatory Notice Information; Petitioner Is a
`Real Party In Interest Sued for and Charged With Infringement ............ 17
`IV. DETAILED EXPLANATION OF REASONS FOR RELIEF REQUESTED,
`SHOWING IT IS MORE LIKELY THAN NOT THAT AT LEAST ONE
`CHALLENGED CLAIMS IS UNPATENTABLE ............................................. 18
`A.
`Claim Construction .......................................................................................... 18
`B.
`The Challenged Claims Are Invalid Under 35 U.S.C. §101 ...................... 22
`1.
`Claims Are Directed To Abstract Ideas ........................................... 23
`2.
`Claims Do Not Disclose An “Inventive Concept” That Is
`“Significantly More” Than an Abstract Idea ................................... 26
`Field Of Use Limitations Cannot Create Patent Eligibility ........... 26
`Generic Computer Implementation Cannot Transform
`Abstract Ideas Into Patent Eligible Inventions ............................... 27
`Functional Nature Confirms Preemption and Ineligibility ............ 32
`5.
`6. Machine-or-Transformation Test Confirms Ineligibility ............... 33
`The Challenged Claims Are Invalid Under 35 U.S.C. § 103 ..................... 34
`1.
`Overview of Stefik ............................................................................... 34
`2. Motivation to Combine Stefik with Poggio ..................................... 38
`3. Motivation to Combine Stefik and Poggio with Kopp .................. 42
`4. Motivation to Combine Stefik with Poggio, Kopp, and
`Smith ...................................................................................................... 46
`Claim 32 is Obvious............................................................................. 48
`5.
`CONCLUSION........................................................................................................... 79
`
`V.
`
`
`i
`
`
`

`
` CBM2015-00015
`United States Patent No. 8,118,221
`
`
`U.S. Patent No. 8,118,221
`
`Plaintiffs’ First Amended Complaint
`
`File History for U.S. Patent No. 8,061,598
`
`File History for U.S. Patent No. 8,336,772
`
`U.S. Patent No. 5,675,734
`
`U.S. Patent No. 4,999,806
`
`U.S. Patent No. 4,878,245
`
`U.S. Patent No. 7,334,720
`
`U.S. Patent No. 7,942,317
`
`U.S. Patent No. 5,940,805
`
`File History for U.S. Patent No. 8,118,221
`
`U.S. Patent No. 5,103,392
`
`U.S. Patent No. 5,530,235
`
`U.S. Patent No. 5,629,980
`
`U.S. Patent No. 5,915,019
`
`European Patent Application, Publication No. EP0809221A2
`
`International Publication No. WO 99/43136
`
`JP Patent Application Publication No. H11-164058 (transla-
`tion)
`International Publication No. WO 95/34857
`
`Eberhard von Faber, Robert Hammelrath, and Franz-Peter
`Heider, “The Secure Distribution of Digital Contents,” IEEE
`
`ii
`
`
`
`EXHIBIT LIST
`1201
`
`1202
`
`1203
`
`1204
`
`1205
`
`1206
`
`1207
`
`1208
`
`1209
`
`1210
`
`1211
`
`1212
`
`1213
`
`1214
`
`1215
`
`1216
`
`1217
`
`1218
`
`1219
`
`1220
`
`

`
` CBM2015-00015
`United States Patent No. 8,118,221
`
`
`(1997)
`Declaration of Anthony J. Wechselberger In Support of Apple
`Inc.’s Petition for Covered Business Method Patent Review
`Declaration of Michael P. Duffey In Support of Apple Inc.’s
`Petition for Covered Business Method Patent Review
`Declaration of Flora D. Elias-Mique In Support of Apple
`Inc.’s Petition for Covered Business Method Patent Review
`U.S. Patent No. 8,033,458
`
`U.S. Patent No. 8,061,598
`
`U.S. Patent No. 8,336,772
`
`File History for U.S. Patent No. 7,334,720
`
`File History for U.S. Patent No. 7,942,317
`
`File History for U.S. Patent No. 8,033,458
`
`Claim Construction Memorandum Opinion from Smartflash
`LLC v. Apple Inc., No. 6:13cv447 (Dkt. 229)
`U.S. Patent No. 4,337,483
`
`U.S. Patent No. 7,725,375
`
`U.S. Patent No. 5,925,127
`
`EXHIBIT LIST
`
`1221
`
`1222
`
`1223
`
`1224
`
`1225
`
`1226
`
`1227
`
`1228
`
`1229
`
`1230
`
`1231
`
`1232
`
`1233
`
`iii
`
`

`
` CBM2015-00015
`United States Patent No. 8,118,221
`
`I.
`
`INTRODUCTION
`Pursuant to § 321 and Rule § 42.304,2 the undersigned, on behalf of and in a
`
`representative capacity for Apple Inc. (“Petitioner”), petitions for review under the
`
`transitional program for covered business method patents of claim 1, 2, 11, and 32
`
`(“challenged claims”) of U.S. Patent No. 8,118,221 (“the ’221 Patent” or “’221”), is-
`
`sued to Smartflash Technologies Limited and assigned to Smartflash LLC (“Patent-
`
`ee”). Petitioner asserts it is more likely than not that the challenged claims are un-
`
`patentable for the reasons herein and requests review of, and judgment against, claim
`
`1, 2, 11, and 32 as unpatentable under § 101, and claim 32 as unpatentable under §
`
`103. As discussed in Section III.B, infra, Petitioner previously filed CBM2014-
`
`00102/103 seeking CBM review of the ’221 Patent. Those petitions were instituted
`
`for trial (and consolidated) with respect to claims 1, 2, and 11-14 on grounds based on
`
`§ 103, but the Board did not institute trial on claim 32. In its Institution Decision, the
`
`Board construed the term “access rule” as “a rule specifying a condition under which
`
`access to content is permitted,” id. Pap. 8, 8, and determined Petitioner had not
`
`shown it was more likely than not that it would prevail in demonstrating that Stefik,
`
`Poggio, and/or Sato rendered obvious code “responsive to payment validation data”
`
`
`2 Petitioner is demonstrating, in pending litigation, that these claims are invalid for
`
`numerous additional reasons. All section cites herein are to 35 U.S.C. or 37 C.F.R., as
`
`the context indicates, and all emphasis herein is added unless otherwise noted.
`
`1
`
`
`

`
` CBM2015-00015
`United States Patent No. 8,118,221
`
`to receive an “access rule” specifying at least one condition for accessing data, the
`
`condition being dependent upon the “amount of payment associated with the pay-
`
`ment data forwarded to the payment validation system” under the Board’s construc-
`
`tion, id., 17-20. In light of the Board’s Decision, Petitioner now identifies additional
`
`prior art—Kopp and Smith (Exs.1210, 1219)—with explicit disclosures of “access
`
`rules” as construed by the Board and expressly disclosing code to retrieve access rules
`
`responsive to payment validation data and specifying access conditions dependent on
`
`amount of payment. Kopp, e.g., describes a vending system allowing a user to specify a
`
`desired extent of usage, pay for only that amount of usage, and then receive data lim-
`
`ited to the purchased usage amount (e.g., Ex.1210 2:50-65), while Smith provides ex-
`
`press disclosure of a software vending system allowing a user to pre-pay license fees
`
`proportional to the value received from using software, rather than paying all or noth-
`
`ing (e.g., Ex.1219 6:1-5; 18:4-33). Petitioner has also identified additional disclosures in
`
`Stefik and Poggio concerning these limitations as construed, further confirming a
`
`POSA3 would have found it obvious and routine to implement the system disclosed
`
`
`3 References to a POSA refer to the knowledge or understanding of a person of ordi-
`
`nary skill in the art (“POSA”) as of October 25, 1999. A POSA would have at least a
`
`B.S. degree in E.E., C.S., or a telecommunications-related field, and at least three years
`
`of industry experience that included client-server data/information distribution and
`
`management architectures. See Ex.1221 ¶ 24.
`
`2
`
`

`
` CBM2015-00015
`United States Patent No. 8,118,221
`
`by Stefik and Poggio using the expressly advantageous teachings of Kopp and Smith,
`
`detailed in Section IV.C, infra. See, e.g., Ex.1221 ¶¶ 57-79.
`
`The challenged claims merely recite a basic computer system well-known in the
`
`field of data storage and access. Claim 32 recites four rudimentary components of a
`
`data access terminal “for retrieving data from a data supplier and providing the retrieved data to a
`
`data carrier”—(A) an interface, (B) a data carrier interface, (C) a program store storing code,
`
`and (D) a processor . . . for implementing the stored code. The recited code is similarly
`
`elementary—(D1) reading and forwarding payment data , (D2) receiving payment validation data,
`
`(D3) responding to payment data, (D4) responding to payment validation data, and (D5) retrieving
`
`value data and use rule data. Ex.1201. But at the earliest claimed priority date, these sim-
`
`ple elements and their combination were all known to any POSA. The patent acknowl-
`
`edges that the idea of providing access to data in exchange for a payment (e.g., purchase
`
`of music on a CD) was already well known, e.g., Ex.1201 5:9-11 (“the purchase out-
`
`right option may be equivalent to the purchase of a compact disc (CD)”), and the prior art
`
`was teeming with disclosures of this basic concept. Further, claim 32 clearly involves
`
`no “technology” at all other than “a data access terminal,” with interfaces, a program store
`
`storing code, and a processor that implements the well-known steps disclosed in the
`
`specification—all of which the patent concedes were well known and commonplace,
`
`stating that this “terminal comprises a general purpose computer.” E.g., Ex.1201 4:4, 16:32-
`
`33. The patent describes no more than a system for retrieving data from, and provid-
`
`3
`
`

`
`ing data to, a data carrier while reading payment data, receiving payment data, re-
`
` CBM2015-00015
`United States Patent No. 8,118,221
`
`
`sponding to payment validation data, and retrieving user-stored data and use rule data.
`
`Indeed, as confirmed by Alice Corp. Pty, Ltd. v. CLS Bank Int’l, 134 S. Ct. 2347
`
`(2014)—decided after Petitioner’s original challenges to the ’221 were filed—claim 32
`
`and the remaining challenged claims are also directed to patent-ineligible subject mat-
`
`ter under § 101. As the Board noted in its previous Institution Decision, “the ’221 pa-
`
`tent makes clear that the asserted novelty of the invention is not in any specific im-
`
`provement of software or hardware, but in the method of controlling access to data,”
`
`CBM2014-00102, Pap. 8, 11, and the challenged claims are directed to nothing more
`
`than the unpatentable abstract idea of paying for and controlling access to data, with
`
`at most the addition of well-known, routine and conventional features—in particular,
`
`generic computer implementation that cannot confer patentability on these patent-
`
`ineligible abstractions. E.g., Alice, 134 S. Ct. at 2359-60. Each challenged claim recites
`
`ineligible subject matter, and claim 32 is also obvious; thus, each is unpatentable.
`
`II. OVERVIEW OF FIELD OF THE CLAIMED INVENTION
`By October 25, 1999, electronic sale, distribution, and content protection for
`
`digital products all would have been well-known to a POSA, and their combination as
`
`claimed also would have been well-known or at minimum obvious. See, e.g., Ex.1221
`
`¶¶ 27-28. In March, 1991, for example, U.S. Pat. No. 4,999,806, issued, disclosing a
`
`system and method for sale and distribution of digital products (e.g., software) by
`
`phone, and for content protection. See Ex.1206 Abstract (“central station distributes
`
`4
`
`

`
` CBM2015-00015
`United States Patent No. 8,118,221
`
`software by telephone . . . accepts credit card information, transmits an acceptance code . . . After veri-
`
`fying the credit card information, the station calls the purchaser back and continues with the transac-
`
`tion.”); 1:67-2:9 (describing “means for selling and distributing protected software using stand-
`
`ard telephone lines,” “permit[ting] the purchaser to rent the protected software for a period of time,”
`
`and “to rent the protected software for a specific number of runs””). Ex. 1206 thus discloses
`
`making different types of access available, e.g., purchase vs. rental, with a Control
`
`Transfer Program and Primary Protection Program that ensure the computer receiv-
`
`ing a downloaded program does not have another program present that could create
`
`unauthorized copies. See id. Abstract; 2:65-3:23; see also Ex.1221 ¶ 29.
`
`In April 1992, U.S. Pat. No. 5,103,392, issued, disclosing use-based charging
`
`for digital products, including “user-specific credit data storage means for storing data
`
`identifying the user . . . and indicating credit for payment capacity, use time length, or the like
`
`of the user,” as well as “[1] use decision means for determining permission to use the pro-
`
`gram . . . on the basis of program-specific data supplied from the program storage means or
`
`user-specific credit data supplied from the user-specific credit data storage means, the use
`
`decision means delivering either an affirmative or negative signal corresponding to results of the
`
`decision[, and [2]] program use history storage means connected to the use decision means
`
`for storing program use history data.” See, e.g., Ex.1212 1:64-2:17. Ex. 1212’s emphasis on
`
`assuring permission to access a program and compensation to providers for use un-
`
`derscores the art’s focus on digital rights management (“DRM”), over eight years be-
`
`5
`
`

`
`fore the ’221’s claimed priority date. See also Ex.1221 ¶ 32.
`
` CBM2015-00015
`United States Patent No. 8,118,221
`
`
`Also in 1997, Exhibit 1220 (“von Faber”) observed that “[e]lectronic commerce sys-
`
`tems dealing with the distribution of digital contents like software or multimedia data have to
`
`couple the use of the provided digital goods with a prior payment for the goods in a way which can-
`
`not be bypassed,” proposing a system where customers purchase keys to utilize dis-
`
`tributed encrypted content. E.g., id. 7 (a “solution is to distribute the contents in encrypted
`
`form, and to have the customer pay for the key which he needs to transform the encrypted content in an
`
`usable form.”), 8 (“The Content Provider provides digital contents in encrypted form being
`
`distributed by the Content Distributor . . . . The Authorisation System permits the distribution of
`
`the appropriate key after settling of the fees payable by the Customer, who will enjoy the de-
`
`crypted digital contents.”), Fig. 1. Von Faber states its system could be used for a va-
`
`riety of known distribution and payment methods, and further addressed the known
`
`issue of payment distribution to content providers. See, e.g., id. 13 (“Different methods can
`
`be used to distribute the encrypted contents (standard techniques) . . . Different electronic pay-
`
`ment methods can be integrated . . . This flexibility leads to the fact that totally different authorisa-
`
`tion methods can be integrated.”; “The system automatically divides the package price (payments)
`
`and guarantees that the money is transferred to each Content Provider.”); see Ex.1221 ¶¶ 34-36.
`
`And U.S. Pat. No. 5,915,019 (“Ginter”), issued in June 1999, discloses “systems
`
`and methods for secure transaction management and electronic rights protection,” and describes
`
`a “virtual distribution environment” (VDE) to “control and/or meter or otherwise
`
`6
`
`

`
` CBM2015-00015
`United States Patent No. 8,118,221
`
`monitor use of electronically stored or disseminated information.” See, e.g., Ex.1215
`
`Abstract. Ginter’s system helps “ensure that information is accessed and used only in au-
`
`thorized ways, and maintain the integrity, availability, and/or confidentiality of the infor-
`
`mation,” e.g., id., and discloses that “[a]ll participants . . . have the innate ability to par-
`
`ticipate in any role, e.g., id. 255:22-23, highlighting the known flexibility in such distri-
`
`bution systems, underscoring that combinations between and among disclosures of
`
`such systems would have been obvious to a POSA. See also, e.g., Ex.1221 ¶¶ 37-38.
`
`Content storage and utilization on portable devices, including mobile commu-
`
`nication devices such as cellular phones, was also well-known. Exhibit 1217 (pub’d
`
`Aug. 26, 1999), discloses a cell phone for storing and accessing digital content. See, e.g.,
`
`id. 5:7-13 (“Because of its integration into the cellular phone, the digital entertainment module
`
`can share components already present in the cellular phone. [T]he use of solid state RAM or ROM,
`
`as opposed to disc storage, eliminates the need for bounce control circuitry. This ena-
`
`bles the disclosed invention to provide cellular communications and entertainment . . . .”). Exhibit
`
`1218 (pub’d June 18, 1999), discloses storing and playing media on mobile devices, e.g.,
`
`using a removable IC card. See, e.g., id. ¶ 9 (“portable music selection viewing device 70
`
`provides a removable storage device 76 [which] is a memory card similar to, for example. . .
`
`an IC card. . . . [T]he user can store the music software from another audio unit into the storage
`
`device 76 and enjoy music by inserting this storage unit 76 into this portable . . . device 70.”), ¶
`
`13 (“music storage medium 250 such as a magnetic card, magnetic tape, a CD, a DVD,
`
`7
`
`

`
`or a memory card such as an IC card stores the music software.”); see Ex.1221 ¶ 39.
`
` CBM2015-00015
`United States Patent No. 8,118,221
`
`
`As these and the additional examples detailed below in Section IV.B illustrate,
`
`the prior art was rife with awareness and discussion of the same supposed “invention”
`
`memorialized in the ’221’s challenged claims.
`
`III. PETITIONER HAS STANDING
`A.
`The ’221 Patent Is a Covered Business Method Patent
`The ’221 Patent is a “covered business method patent” under § 18(d)(1) of the
`
`AIA and § 42.301, and Petitioner certifies it is available for review under § 42.304(a).
`
`See also CBM2014-00102, Pap. 8, 8-12 (finding claim 12 satisfies requirement);
`
`CBM2014-00112, Pap. 8, 8-12 (same for similar claim directed to “data access termi-
`
`nal”). Although numerous claims of the ’221 qualify, a patent with even one claim
`
`covering a covered business method is considered a CBM patent. See CBM 2012-
`
`00001, Pap. 36, 26; 77 Fed. Reg. 48,709 (Aug. 14, 2012). Petitioner thus addresses ex-
`
`emplary claim 32:
`
`32. A data access terminal for retrieving data from a data supplier and
`providing the retrieved data to a data carrier, the terminal comprising:
`[A] a first interface for communicating with the data supplier;
`[B] a data carrier interface for interfacing with the data carrier;
`[C] a program store storing code; and
`[D] a processor coupled to the first interface, the data carrier interface,
`and the program store for implementing the stored code, the code com-
`prising:
`[D1] code to read payment data from the data carrier and to for-
`
`8
`
`

`
` CBM2015-00015
`United States Patent No. 8,118,221
`
`
`ward the payment data to a payment validation system;
`[D2] code to receive payment validation data from the payment
`validation system;
`[D3] code responsive to the payment validation data to retrieve
`data from the data supplier and to write the retrieved data into the
`data carrier;
`[D4] code responsive to the payment validation data to receive at
`least one access rule from the data supplier and to write the at least
`one access rule into the data carrier, the at least one access rule speci-
`fying at least one condition for accessing the retrieved data written in-
`to the data carrier, the at least one condition being dependent
`upon the amount of payment associated with the payment data
`forwarded to the payment validation system; and
`[D5] code to retrieve from the data supplier and output to a user-
`stored data identifier data and associated value data and use rule data
`for a data item available from the data supplier.
`1.
`Exemplary Claim 32 Is Financial In Nature
`A CBM patent is “a patent that claims a method or corresponding apparatus for per-
`
`forming data processing or other operations used in the practice, administration, or management of a
`
`financial product or service, except that the term does not include patents for technological
`
`inventions.” AIA § 18(d)(1); § 42.301. “[T]he definition of covered business method
`
`patent was drafted to encompass patents claiming activities that are financial in nature,
`
`incidental to a financial activity or complementary to a financial activity.’” 77 Fed. Reg. 48,734-
`
`35 (Aug. 14, 2012) (citing 157 Cong. Rec. S5432 (daily ed. Sept. 8, 2011)). “[F]inancial
`
`product or service” is to be interpreted broadly, id., and “financial . . . simply means relat-
`
`9
`
`

`
` CBM2015-00015
`United States Patent No. 8,118,221
`
`ing to monetary matters”—it does not require any link to traditional financial industries
`
`such as banks. See, e.g., CBM2012-00001, Pap. 36, 23. The Board has previously found,
`
`e.g., that a claim for “transferring money electronically via a telecommunication line to
`
`the first party . . . from the second party” met the financial product or service re-
`
`quirement, concluding that “the electronic transfer of money is a financial activity,
`
`and allowing such a transfer amounts to providing a financial service.” CBM2013-
`
`00020, paper 13 at 11-15; 4 see also, e.g., CBM2013-00017, paper 8 at 5-6.
`
`The ’221 patent includes claims to a “data access terminal” (e.g., a “convention-
`
`al computer” or mobile phone (Ex.1201 4:4-5)), that reads and forwards payment data
`
`from a data carrier (e.g., standard smart card (id. 11:29)) to a payment validation system
`
`for authorizing payment, receives payment data from the payment validation system,
`
`and code responsive to payment validation data that allows access to content in ex-
`
`change for payment (id. 8:21-23). See AIA § 18(d)(1); § 42.301(a). The patent alleges
`
`this data access terminal is part of a system that allows content owners to make con-
`
`tent available without fear of losing revenue. Ex.1201 2:11-15; Fig 12(a)-(e). More
`
`generally, the patent is about “[d]ata storage and access systems [that] enable down-
`
`loading and paying for data.” Id. Abstract. “The combination of payment data and
`
`stored content data . . . helps reduce the risk of unauthorized access.” Id. And in as-
`
`
`4 Indeed, these aspects of claim 32 are generally similar to those of the claim found to
`
`convey CBM standing in CBM2014-00106/107, paper 8 at 9-13.
`
`10
`
`

`
` CBM2015-00015
`United States Patent No. 8,118,221
`
`serting the patent, Smartflash conceded the alleged invention relates to a financial ac-
`
`tivity or transaction, stating “[t]he patents-in-suit generally cover a portable data carri-
`
`er for storing data and managing access to the data via payment information and/or use sta-
`
`tus rules. The patents-in-suit also generally cover a computer network . . . that serves
`
`data and manages access to data by, for example, validating payment information.”
`
`Ex.1202 ¶ 17. The specification confirms the recited “data access terminal” “can com-
`
`municate with a bank or other financial services provider to control payment” (id. 3:50-52) and can
`
`“validate payment with an external authority such as a bank” (id. 2:5-7). Further, “[p]ayment
`
`for the data item or items requested may either be made directly to the system owner or may be
`
`made to an e-payment system” (id. 20:50-54), which may be provided “according to, for
`
`example, MONDEX, Proton, and/or Visa cash compliant standards” and “payment authenti-
`
`cation . . . may [] be performed by, for example, a data access terminal . . . using payment
`
`management code.” Id. 13:37-48; see id. 7:62-8:56 (esp. 8:22-24); 11:59-65; Fig. 12(a)-(e).
`
`Claim 32 expressly recites software to perform data processing and other oper-
`
`ations in connection with the recited “payment validation system” (e.g., “to forward
`
`payment data to a payment validation system,” “to receive payment validation data,”
`
`and “to retrieve data [in response to the payment validation data]”) and further re-
`
`quires software to “receive at least one access rule . . . specifying at least one condi-
`
`tion . . . the at least one condition being dependent upon the amount of payment as-
`
`sociated with the payment data” Id. Thus, claim 32, which explicitly describes trans-
`
`11
`
`

`
` CBM2015-00015
`United States Patent No. 8,118,221
`
`mitting payment data to a payment validation system, receiving payment validation,
`
`and controlling access to data based on payment, concerns a computer system (corre-
`
`sponding to methods discussed in the patent) for performing data processing and
`
`other operations used in the practice, administration, or management of a financial activity and
`
`service. See, e.g., CBM2013-00020, Pap. 14, 10-11.
`
`2.
`Claim 32 Does Not Cover A Technological Invention
`Further, claim 32 is not a “technological invention” that would trigger the ex-
`
`ception in AIA § 18(d)(1), because it does not claim “subject matter as a whole [that]
`
`recites a technological feature that is novel and unobvious over the prior art[] and solves a
`
`technical problem using a technical solution.” § 42.301(b). To the contrary, the ’221 patent
`
`itself makes clear that its claimed “data carrier” and payment validation systems were
`
`commonplace and could be implemented using well-known industry standards.
`
`(a) Claim 32 Does Not Recite A Technological Feature
`That Is Novel and Unobvious
`First, no “technological feature” of claim 32 is novel and unobvious. The PTO
`
`confirmed that “[m]ere recitation of known technologies, such as computer hardware, communica-
`
`tion or computer networks, software, memory, computer-readable storage medium, scanners, display
`
`devices or databases, or specialized machines, such as an ATM or point of sale de-
`
`vice,” or “[r]eciting the use of known prior art technology to accomplish a process or method,
`
`even if that process or method is novel and non-obvious” will “not typically render a patent a
`
`technological invention.” E.g., 77 Fed. Reg. 48,756 48,764 (Aug. 14, 2012). Claim 32’s
`
`12
`
`

`
` CBM2015-00015
`United States Patent No. 8,118,221
`
`language makes clear it involves no “technology” at all other than, at most, “a data access
`
`terminal,” which includes an interface for communicating with the data supplier, data
`
`carrier interface, a program store storing code, and a processor that implements the
`
`well-known steps disclosed in the specification. Ex.1201; see also Section II, supra. “The
`
`data access terminal may be a conventional computer or, alternatively, it may be a mobile
`
`phone,” both of which were known in the art well before the earliest claimed priority
`
`date. Id. 4:4-5; 16:33. Indeed, the specification disclaims the use of particular hardware,
`
`relying instead on conventional hardware known to a POSA: “[t]he physical embodiment
`
`of the system is not critical and a skilled person will understand that the terminals, data pro-
`
`cessing systems and the like can all take a variety of forms.” Id. 12:29-32.
`
`Payment validation systems were also well-known. See id. 13:35-47. The ’221
`
`explains “[t]he payment validation system may be part of the data supplier’s computer systems
`
`or it may be a separate e-payment system.” Id. 8:63-65. “E-payment systems . . . are coupled
`
`to banks [and] provide an e-payment system according to, for example, MONDEX, Proton,
`
`and/or Visa cash compliant standards. . . . [P]ayment data may be validated . . . by for ex-
`
`ample a data access terminal . . . using payment management code.” Id. 13:35-47. The
`
`“data supplier” of the claims is also not a technological component, and requires no
`
`specific hardware, see Ex.1201 6:16-18; 6:58-59, but is, instead, simply a supplier of
`
`online data, id. 5:64-65; see also id. 6:58-60 (“The computer system is operating by a da-
`
`ta supplier or a data supplier ‘system owner’ for providing content data to the data carrier.”);
`
`13
`
`

`
` CBM2015-00015
`United States Patent No. 8,118,221
`
`8:33-40; 12:2-4, 29-32; Fig. 4(b). Data suppliers were well known long before the ear-
`
`liest claimed priority date. See id. 1:40-55.
`
`The use of software (code) for retrieving and storing data, reading and forward-
`
`ing payment data, receiving and responding to payment validation data, as disclosed in
`
`the specification, was also exceedingly well known in the art, and could not transform
`
`the claims into a technological invention. See, e.g., 77 Fed. Reg. 48,756 48,764 (Aug. 14,
`
`2012) (“Mere recitation of known technologies, such as . . . software, memory, com-
`
`puter-readable storage medium . . . [will] “not typically render a patent a technological
`
`invention.”); Ex.1221 § V; Section II, supra. The financial transaction performed by
`
`the code described in elements D1 through D4 was well known, because, as the pa-
`
`tent concedes, e-payment systems were known. Ex.1201 13:43-64 (“E-payment systems
`
`coupled to banks . . . these provide an e-payment system according to, for example, MONDEX,
`
`Proton, and/or Visa cash compliant standards . . . payment data may be validated by a data access
`
`terminal using payment management code.”); see Ex.1219 18:7-17 (“Since the purchase pro-
`
`cess involves making a charge purchase on a credit card via a data modem, this process
`
`is subject to the strictest integrity controls for electronic financial transactions. How-
`
`ever, there is absolutely nothing new that is required . . . .”). Using code to implement
`
`this transaction, as disclosed in the specification, was obvious and known. E.g,,
`
`Ex.1221 § V; Section II, supra. Further, the functions performed by the code (D3-
`
`D5)—related to the retrieving and outputting data as disclosed in the specification
`
`14
`
`

`
` CBM2015-00015
`United States Patent No. 8,118,221
`
`and providing and restricting access based on payment, as claimed in the patent—was
`
`also commonplace before the earliest claimed priority date. E.g., Ex.1206 Abstract;
`
`1:67-2:9; 8:62-9:12; 1207 Abstract; 4:27-35; see also Section II, supra; Ex.1221 § V. Ac-
`
`cess and use rules were similarly known. E.g., Ex.1210 5:3-21; Ex.1219 16:25-34.
`
`The state of the art at the time, and the detailed prior art analysis provided be-
`
`low, further reflects claim 32 does not recite a technological feature that is novel and
`
`nonobvious. See, e.g., Section II, supra; Section IV.C, infra. Claim 32 concerns nothing
`
`more than a non-technical idea of selling data in exchange for payment. Even apart
`
`from its other failures to trigger the statutory exception, for these reasons alone, claim
`
`32 would not be technological.
`
`(b) Claim 32 Does Not Solve A Technical Problem Using
`A Technical Solution
`
`Claim 32 also does not solve a technical problem using a technical solution because
`
`there was no technical problem to begin with. While a POSA would certainly have known
`
`how to sell data over the Internet, see, e.g., Ex.1216 Fig. 7; 1:50-55; 10:41-53; Ex.1221 §
`
`V, the patent nonetheless describes the “problem” the invention is intended to solve
`
`as the business problem of data piracy: users were downloading content (such as MP3s)
`
`without paying, and providers were losing money. Ex.1201 1:52-55. However, a
`
`POSA would have known well before the earliest claimed priority date how to sell
`
`electronic data, use payment authorization mechanisms, and provide electronic data
`
`based on payment. E.g., Ex.1216 Fig. 7; 1:56-59, 2:32-36; 9:56-10:25; Ex.1221 § V.
`
`15
`
`

`
` CBM2015-00015
`United States Patent No. 8,118,221
`
`The solution described in claim 32—using previously

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket