throbber
Covered Business Method Patent Review
`United States Patent No. 8,061,598
`
`IN THE UNITED STATES PATENT AND TRADEMARK OFFICE
`
`Petitioner: Apple Inc.
`
`Attorney Docket No.:
`
` 104677-5008-815
`Customer No. 28120
`

`Inventor: Racz et al.
`United States Patent No.: 8,061,598 §
`Formerly Application No.: 13/012,541 §
`Issue Date: November 22, 2011

`Filing Date: January 24, 2011

`Former Group Art Unit: 2887

`Former Examiner: Thien M. Le

`
`For: Data Storage and Access Systems
`
`MAIL STOP PATENT BOARD
`Patent Trial and Appeal Board
`United States Patent and Trademark Office
`Post Office Box 1450
`Alexandria, Virginia 22313-1450
`
`PETITION FOR COVERED BUSINESS METHOD PATENT REVIEW OF
`UNITED STATES PATENT NO. 8,061,598 PURSUANT TO 35 U.S.C. § 321,
`37 C.F.R. § 42.304
`
`
`
`

`

` Covered Business Method Patent Review
`United States Patent No. 8,061,598
`
`
`TABLE OF CONTENTS
`
`B.
`
`3.
`
`4.
`
`INTRODUCTION ....................................................................................................... 1
`I.
`II. OVERVIEW OF FIELD OF THE CLAIMED INVENTION ......................... 6
`III. PETITIONER HAS STANDING .......................................................................... 12
`A.
`The ’598 Patent Is a Covered Business Method Patent ............................. 12
`1.
`Exemplary Claim 7 Is Financial In Nature ...................................... 13
`2.
`Claim 7 Does Not Cover A Technological Invention ................... 17
`Related Matters and Mandatory Notice Information; Petitioner Is a Real
`Party In Interest Sued for and Charged With Infringement ..................... 22
`IV. DETAILED EXPLANATION OF REASONS FOR RELIEF REQUESTED,
`SHOWING IT IS MORE LIKELY THAN NOT THAT AT LEAST ONE
`OF THE CHALLENGED CLAIMS IS UNPATENTABLE ............................ 24
`A.
`Claim Construction .......................................................................................... 24
`B.
`The Challenged Claims Are Unpatentable Under § 101 ............................ 29
`1.
`Claims Are Directed To Abstract Ideas ........................................... 30
`2.
`Claims Do Not Disclose An “Inventive Concept” That Is
`“Significantly More” Than an Abstract Idea ................................... 33
`Field Of Use Limitations Cannot Transform Abstract Ideas
`Into Patent Eligible Inventions .......................................................... 33
`Generic Computer Implementation Cannot Transform Ab-
`stract Ideas Into Patent Eligible Inventions..................................... 34
`The Functional Nature Of The Challenged Claims Con-
`firms preemption and Patent Ineligibility ......................................... 39
`6. Machine-or-Transformation Test Also Confirms Patent In-
`eligibility ................................................................................................. 41
`The Challenged Claims Are Unpatentable Under § 103 ............................ 41
`1.
`Overview of Stefik ............................................................................... 41
`2. Motivation to Combine Stefik with Ahmad .................................... 45
`3. Motivation to Combine Stefik with Ahmad and Kopp ................. 47
`4.
`Claims 1, 2, 15, and 31 are Obvious in Light of Stefik in
`View of Ahmad (Ground 2); Claims 1, 2, 15, and 31 are
`Obvious in Light of Stefik in View of Ahmad and Kopp
`(Ground 3) ............................................................................................ 48
`
`5.
`
`C.
`
`ii
`
`

`

` Covered Business Method Patent Review
`United States Patent No. 8,061,598
`
`CONCLUSION........................................................................................................... 79
`
`V.
`
`iii
`
`

`

`
`EXHIBIT LIST
`1201
`
`1202
`
`1203
`
`1204
`
`1205
`
`1206
`
`1207
`
`1208
`
`1209
`
`1210
`
`1211
`
`1212
`
`1213
`
`1214
`
`1215
`
`1216
`
`1217
`
`1218
`
`1219
`
` Covered Business Method Patent Review
`United States Patent No. 8,061,598
`
`U.S. Patent No. 8,061,598
`
`Plaintiffs’ First Amended Complaint
`
`U.S. Patent No. 5,925,127
`
`U.S. Patent No. 5,940,805
`
`Russell Housley and Jan Dolphin, “Metering: A Pre-pay
`Technique,” Storage and Retrieval for Image and Video Data-
`bases V, Conference Volume 3022, 527 (January 15, 1997)
`U.S. Patent No. 4,999,806
`
`U.S. Patent No. 5,675,734
`
`U.S. Patent No. 4,878,245
`
`U.S. Patent No. 7,334,720
`
`U.S. Patent No. 7,942,317
`
`U.S. Patent No. 5,103,392
`
`U.S. Patent No. 5,530,235
`
`U.S. Patent No. 5,629,980
`
`U.S. Patent No. 5,915,019
`
`European Patent Application, Publication No. EP0809221A2
`
`International Publication No. WO 99/43136
`
`JP Patent Application Publication No. H11-164058 (transla-
`tion)
`Eberhard von Faber, Robert Hammelrath, and Frank-Peter
`Heider, “The Secure Distribution of Digital Contents,” IEEE
`(1997)
`Declaration of Anthony J. Wechselberger In Support of Apple
`Inc.’s Petition for Covered Business Method Patent Review
`
`
`
`

`

` Covered Business Method Patent Review
`United States Patent No. 8,061,598
`
`
`EXHIBIT LIST
`1220
`
`U.S. Patent No. 8,033,458
`
`1221
`
`1222
`
`1223
`
`1224
`
`1225
`
`1226
`
`1227
`
`Declaration of Michael P. Duffey In Support of Apple Inc.’s
`Petition for Covered Business Method Patent Review
`Declaration of Megan F. Raymond In Support of Apple Inc.’s
`Petition for Covered Business Method Patent Review
`Claim Construction Memorandum Opinion from Smartflash
`LLC v. Apple Inc., No. 6:13cv447 (Dkt. 229)
`File History for U.S. Patent No. 8,061,598
`
`U.S. Patent No. 4,337,483
`
`U.S. Patent No. 7,725,375
`
`International Publication No. WO 95/34857
`
`ii
`
`

`

` Covered Business Method Patent Review
`United States Patent No. 8,061,598
`
`I.
`
`INTRODUCTION
`
`Pursuant to 35 U.S.C. § 321 and 37 C.F.R. § 42.304,1 the undersigned, on be-
`
`half of and acting in a representative capacity for petitioner, Apple Inc. (“Petitioner”
`
`and the real party in interest), petitions for review under the transitional program for
`
`covered business method (“CBM”) patents of claims 1, 2, 7, 15, and 31 of U.S. Patent
`
`No. 8,061,598 (“the ’598 Patent”), issued to Smartflash Technologies Limited and as-
`
`signed to Smartflash LLC (“Patentee”). Petitioner asserts that it is more likely than
`
`not that at least one of the challenged claims is unpatentable, and respectfully requests
`
`review of, and judgment against the challenged claims as unpatentable under §101,
`
`and claims 1, 2, 15, and 31 as unpatentable under § 103 as obvious.
`
`As discussed in Section III.B, infra, Petitioner previously filed CBM2014-00108
`
`and CBM2014-00109 seeking CBM review of the ’598 Patent on §§102 and 103
`
`grounds. Those petitions were instituted for trial (and consolidated2) with respect to
`
`claim 26 on grounds based on § 103, but the Board did not institute trial on claims 1,
`
`2, 7, 15, or 31. In its Institution Decision, the Board construed the term “use rule” as
`
`1 Petitioner is demonstrating, in pending litigation, that these claims are invalid for
`
`numerous additional reasons. All emphasis herein added unless otherwise noted. All
`
`section cites herein are to 35 U.S.C. or 37 C.F.R., as the context indicates, and all em-
`
`phasis herein is added unless otherwise noted.
`
`2 Petitioner concurrently moves for joinder of this petition and CBM2014-00108.
`
`
`
`
`
`

`

` Covered Business Method Patent Review
`United States Patent No. 8,061,598
`
`“a rule specifying a condition under which access to content is permitted,” and de-
`
`termined that Petitioner had not shown it was more likely than not that it would pre-
`
`vail in demonstrating that Stefik renders obvious “use rules” under the Board’s con-
`
`struction and did not sufficiently explain why usage rights in Stefik fall within exam-
`
`ples of “use status data” in the specification of the ’598 Patent (e.g., past usage of
`
`stored data, that stored data has not been accessed, number of times stored data has
`
`been accessed, duration of access of stored data). In light of the Board’s Decision,
`
`Petitioner now identifies additional prior art—Ahmad and Kopp (see Exs. 1203 and
`
`1204)—with explicit disclosures of “use rules” as construed by the Board, and data
`
`that meets particular examples of “use status data” provided by the specification of
`
`the ’598 Patent. Ahmad, for example, describes a software rental system that moni-
`
`tors an elapsed time of use recorded by a timer or a number of uses recorded by a
`
`counter and does not permit access to the rented software if a software rental license
`
`has been exhausted (see, e.g., Ex. 1203 at 2:62-3:18), while Kopp discloses checking
`
`recorded utilization data and denying access to a data record if a licensed extent of
`
`utilization has been exhausted (see, e.g., Ex. 1204 at 6:41-47). Petitioner has also identi-
`
`fied additional disclosures in Stefik concerning these limitations of claims 2, 15, and
`
`31, further confirming a POSITA3 would have found it entirely obvious and routine
`
`3 All references to a person of ordinary skill in the art (“POSITA”) refer to the
`
`knowledge or understanding of a person of ordinary skill in the art as of October 25,
`
`2
`
`

`

` Covered Business Method Patent Review
`United States Patent No. 8,061,598
`
`to implement the system disclosed by Stefik using the express and advantageous
`
`teachings of Ahmad and Kopp detailed in Section IV.C.4., infra, and in Ex. 1219 ¶¶48,
`
`49, 51, 53, 60-68.
`
`The challenged claims of the ’598 Patent merely recite steps and corresponding
`
`systems well-known in the field of data storage and access, including use of a “porta-
`
`ble data carrier.” Ex. 1201 at 1:20-24, Abstract, claim 1. Claim 1, for example, recites
`
`five rudimentary components of a portable data carrier (e.g., smart card)—(A) an in-
`
`terface, (B and C) content data and use rule memory, (D) a program store storing
`
`code implementable by a processor, and (E) a processor . . . for implementing code.
`
`The recited code is similarly elementary, storing content data and a use rule in memory (F):
`
`1. A portable data carrier comprising:
`[A] an interface for reading and writing data from and to the portable
`data carrier;
`[B] content data memory, coupled to the interface, for storing one or
`more content data items on the carrier;
`[C] use rule memory to store one or more use rules for said one or more
`content data items;
`
`
`1999, unless specifically noted. A POSITA would have at least a Bachelor of Science
`
`degree in electrical engineering, computer science or a telecommunications related
`
`field, and at least three years of industry experience that included client-server
`
`data/information distribution and management architectures. See Ex. 1219 ¶31.
`
`3
`
`

`

` Covered Business Method Patent Review
`United States Patent No. 8,061,598
`
`
`[D] a program store storing code implementable by a processor;
`[E] and a processor coupled to the content data memory, the use rule
`memory, the interface and to the program store for implementing code
`in the program store,
`[F] wherein the code comprises code for storing at least one content data
`item in the content data memory and at least one use rule in the use rule
`memory.
`Ex. 1201. And dependent claim 7, for instance, adds certain express financial
`
`components to claim 1:
`
`7. A portable data carrier as claimed in claim 1, further comprising
`
`[G] payment data memory to store payment data and code to
`provide the payment data to a payment validation system.
`
`Ex. 1201. But at the time of the earliest claimed priority date, these simple elements
`
`and their combination would have all been well known. Indeed, the patent itself
`
`acknowledges that the idea of providing access to data in exchange for a payment (e.g.,
`
`purchase of music on a CD) was well known at the time. E.g., Ex. 1201 5:9-12
`
`(“where the data carrier stores, for example, music, the purchase outright option may
`
`be equivalent to the purchase of a compact disc (CD), preferably with some form of con-
`
`tent copy protection such as digital watermarking”). The idea of purchasing digital
`
`data for payment was similarly well known. See, e.g., Ex. 1207. And, as shown herein,
`
`the prior art was teeming with disclosures of this basic concept and its straightforward
`
`implementation.
`
`4
`
`

`

` Covered Business Method Patent Review
`United States Patent No. 8,061,598
`
`Further, as its language makes clear, claim 1 involves no “technology” at all other
`
`than a “portable data carrier” with an interface, non-volatile memory, and program
`
`store/processor—which the patent itself concedes was well known and commonplace at
`
`the time. See e.g., Ex. 1201 11:28-29 (“standard smart card”), 3:37, 4:7-13, 6:19-21,
`
`11:27-44, 17:6-18:4, Figs. 2, 9. The use rules of claim 1 “may be linked to payments
`
`made from the card to provide payment options such as access to buy content data
`
`outright; [or] rental access . . .” Id. 5:1-8. Thus, as the intrinsic record reflects, claim 1
`
`recites nothing more than a system for reading and writing data while restricting ac-
`
`cess to that data. Indeed, the ’598 Patent states that “[t]he physical embodiment of
`
`the system is not critical and a skilled person will understand that the terminals, data
`
`processing systems and the like can all take a variety of forms.” See, e.g., Ex. 1201 Fig
`
`1, 12:29-32. And the variations presented in the other challenged system claims add
`
`nothing that was not already well-known. Dependent claim 7, for example,4 simply
`
`adds to claim 1 the ability to store and provide payment data. Similarly, the chal-
`
`lenged method claim, claim 31, relating to “controlling access to content data,” recites
`
`4 Claim 2 merely adds to claim 1 the well-known notion of providing access to data
`
`based on a use rule. Claim 15 adds to claim 1 only the storage of a PIN number.
`
`Claim 31 is a rudimentary method claim for “controlling aces to content data,” includ-
`
`ing the steps of (a) “receiving a data access request . .”; (b) “reading the use status da-
`
`ta”, (c) “evaluating the use status data . . .”; and (4) enabling access to the content . . .”
`
`5
`
`

`

`nothing more than the steps implemented by the portable data carrier that restrict ac-
`
` Covered Business Method Patent Review
`United States Patent No. 8,061,598
`
`
`cess to data. See id. Fig. 13.
`
`Indeed, as confirmed by the Supreme Court’s recent decision in Alice Corp. Pty,
`
`Ltd. v. CLS Bank Int’l, 134 S. Ct. 2347 (2014)—decided after Petitioner’s original peti-
`
`tions challenging the ’598 Patent were filed—the challenged claims are also directed to
`
`patent-ineligible subject matter under § 101. As the Board noted in its previous Insti-
`
`tution Decision, “the ’598 patent makes clear that the asserted novelty of the inven-
`
`tion is not in any specific improvement of software or hardware, but in the method of
`
`controlling access to data,” CBM2014-00108, Paper No. 8, at 10, and the challenged claims
`
`are directed to nothing more than the unpatentable abstract idea of paying for and
`
`controlling access to data, with at most the addition of well-known, routine and con-
`
`ventional features that do not render them patentable—in particular, generic comput-
`
`er implementation that cannot confer patentability on these patent-ineligible abstrac-
`
`tions. E.g., Alice, 134 S. Ct. at 2359-60. Because each of the challenged claims recites
`
`unpatentable subject matter, and because claims 1, 2, 15, and 31 are also obvious, all
`
`of the challenged claims should be unpatentable.
`
`II. OVERVIEW OF FIELD OF THE CLAIMED INVENTION
`By October 25, 1999, electronic sale, distribution, and content protection for
`
`digital products all would have been well-known to a POSITA, and their combination
`
`as claimed also would have been well-known or at minimum obvious to a POSITA.
`
`6
`
`

`

` Covered Business Method Patent Review
`United States Patent No. 8,061,598
`
`See, e.g., Ex. 1219 Sec. V. On March 12, 1991, for example, U.S. Pat. No. 4,999,806
`
`(“Chernow,” filed Sept. 4, 1987) issued, disclosing a system and method for sale and
`
`distribution of digital products by phone, and for content protection. See Ex. 1206
`
`Abstract (“A central station distributes software by telephone[,] accepts credit card
`
`information, transmits an acceptance code and then terminates the call. After verifying
`
`the credit card information, the station calls the purchaser back and continues with the transaction
`
`only after receiving the acceptance code.”); 1:67-2:9 ( “means for selling and distributing protected
`
`software using standard telephone lines,” “permit[ting] the purchaser to rent the protected software for
`
`a period of time,” and “to rent the protected software for a specific number of runs”). Chernow
`
`thus discloses making different types of access available, such as purchase versus rent-
`
`al, and further discloses a Control Transfer Program and Primary Protection Program
`
`that ensures the computer receiving a downloaded program does not have another
`
`program present that could create unauthorized copies. See Ex. 1206 Abstract; 2:65-
`
`3:23. See also Ex. 1219 ¶36.
`
`In April 1992, U.S. Patent No. 5,103,392 (“Mori,” filed Dec. 5, 1990), issued
`
`disclosing storing information about customer use of digital products so that a cus-
`
`tomer can be charged according to its use. See, e.g., Ex. 1211 1:64-2:17.
`
`The data processing apparatus includes user-specific credit data storage
`means for storing data identifying the user . . . and indicating credit for payment ca-
`pacity, use time length, or the like of the user of the data processing appa-
`ratus. Also included is use decision means for determining permission to use
`
`7
`
`

`

` Covered Business Method Patent Review
`United States Patent No. 8,061,598
`
`
`the program on the data processing apparatus on the basis of program-specific
`data supplied from the program storage means or user-specific credit data
`supplied from the user-specific credit data storage means, the use deci-
`sion means delivering either an affirmative or negative signal corre-
`sponding to results of the decision. Also included is program use history
`storage means connected to the use decision means for storing program
`use history data . . . .
`Mori’s emphasis on assuring permission to access a program and compensation to
`
`providers for use of their programs underscores the art’s focus on digital rights man-
`
`agement (“DRM”), over eight years before the ’598 Patent’s claimed priority date. See
`
`also Ex. 1219 ¶39.
`
`Exhibit 1215 (“Poggio,” pub’d Nov. 26, 1997), gives another example of secure
`
`distribution and protection, disclosing a “virtual vending machine” system for the sale
`
`of digital products. See, e.g., id. Abstract (“A virtual vending machine manages a comprehen-
`
`sive vending service for the distribution of licensed electronic data (i.e., products) over a distributed
`
`computer system. . . . [and] distributes licenses for the electronic data for the complete product or for
`
`components thereof and for a variety of time frames, including permanent licenses and rental period
`
`licenses. [It] provides client computers with the capability to obtain information regarding
`
`the available products and the associated license fees and rental periods, to receive the product upon
`
`receipt of a corresponding electronic payment, and to reload the product during the term of the li-
`
`cense.”). Thus, like Chernow, Poggio too discloses different types of product options,
`
`including rentals. See also Ex. 1219 ¶40.
`
`8
`
`

`

` Covered Business Method Patent Review
`United States Patent No. 8,061,598
`
`Also in 1997, Exhibit 1218 (“von Faber”) observed that “[e]lectronic commerce sys-
`
`tems dealing with the distribution of digital contents like software or multimedia data
`
`have to couple the use of the provided digital goods with a prior payment for the goods in a way
`
`which cannot be bypassed.” See id. at 7. Von Faber proposes a system where cus-
`
`tomers purchase keys required to utilize distributed encrypted content. See, e.g., id.
`
`(“The basic idea of one possible solution is to distribute the contents in encrypted form, and to
`
`have the customer pay for the key which he needs to transform the encrypted content in an usable form.
`
`The security problem can in this way be transformed into a problem of key distribu-
`
`tion.”); id. at 8 (“The Content Provider provides digital contents in encrypted form being
`
`distributed by the Content Distributor. The Key Management System holds the keys for the
`
`contents to be decrypted. The Authorisation System permits the distribution of the appropriate
`
`key after settling of the fees payable by the Customer, who will enjoy the decrypted digital con-
`
`tents.”); see also Ex. 1218 at Fig. 1. Von Faber also states its system could be used for
`
`a variety of known distribution and payment methods, and further addressed the
`
`known issue of payment distribution to content providers. See, e.g., Ex. 1218 at 13
`
`(“Different methods can be used to distribute the encrypted contents (standard techniques)…
`
`This includes broadcasting, point-to-point networking, as well as offering disks. Different electronic
`
`payment methods can be integrated… independent from the number of protocol steps
`
`needed. This includes credit card based systems as well as electronic purses. This flex-
`
`ibility leads to the fact that totally different authorisation methods can be integrated.”); (The system
`
`9
`
`

`

` Covered Business Method Patent Review
`United States Patent No. 8,061,598
`
`automatically divides the package price (payments) and guarantees that the money is transferred to
`
`each Content Provider whose product has been integrated into the package.”). See also Ex.
`
`1219 ¶¶41-43.
`
`Moreover, U.S. Patent No. 5,915,019 (“Ginter,” filed Jan. 8, 1997), issued June
`
`22, 1999, discloses “Systems and Methods for Secure Transaction Management and
`
`Electronic Rights Protection.” See, e.g., Ex. 1214 (filed January 8, 1997). Ginter dis-
`
`closes “systems and methods for secure transaction management and electronic rights
`
`protection,” and describes a “virtual distribution environment” (termed a “VDE”) to
`
`“control and/or meter or otherwise monitor use of electronically stored or dissemi-
`
`nated information.” See, e.g., Ex. 1214 Abstract. Ginter’s system “help[s] to ensure
`
`that information is accessed and used only in authorized ways, and maintain the integrity,
`
`availability, and/or confidentiality of the information.” See, e.g., id. Ginter discloses that
`
`various entities that comprise the VDE can flexibly take on any of the roles within the
`
`VDE, see, e.g., id. 255:22-23 (“All participants of VDE 100 have the innate ability to
`
`participate in any role.”); 255:23-43, and thus highlights the known flexibility in such
`
`distribution systems, underscoring that a POSITA would have known that combina-
`
`tions between and among disclosures of such distribution systems would have been
`
`obvious to a POSITA. See also Ex. 1219 ¶¶44-45.
`
`Storage and utilization of content on portable devices, including mobile com-
`
`munication devices such as cellular phones, was also well-known before Smartflash’s
`
`10
`
`

`

` Covered Business Method Patent Review
`United States Patent No. 8,061,598
`
`claimed October 25, 1999 priority date. As one example, Exhibit 1216, (“Rydbeck,”
`
`pub’d Aug. 26, 1999), discloses a cellular phone for storing and accessing digital con-
`
`tent. See, e.g., Ex. 1216 at 5 (“Because of its integration into the cellular phone, the digital en-
`
`tertainment module can share components already present in the cellular phone. Such savings
`
`would not be available if a CD player were simply aggregated with the phone . . . the
`
`use of solid state RAM or ROM, as opposed to disc storage, eliminates the need for
`
`bounce control circuitry. This enables the disclosed invention to provide cellular communications
`
`and entertainment during leisure activities.”). See also Ex. 1219 ¶46. And Exhibit 1218
`
`(“Sato,” pub’d June 18, 1999) discloses storing media content on mobile user devices
`
`and playing the media content from these mobile devices, as well as storing the media
`
`content on a removable IC card. See, e.g., Ex. 1217 ¶ 9 (“The portable music selection
`
`and viewing device 70 provides a removable storage device 76 [which] is a memory card simi-
`
`lar to, for example. . . an IC card… The user, after downloading the music software
`
`to the storage device (medium) 76 of the portable music selection and viewing device
`
`70 by operating the push buttons or the like on the main body 71, can enjoy this mu-
`
`sic software on a display 72 or a receiver 74 of the portable music selection and view-
`
`ing device 70, and can also enjoy higher quality music playback by removing this storage
`
`device (medium) and inserting it into another audio unit. [T]he user can store the music software
`
`from another audio unit into the storage device 76 and enjoy music by inserting this storage
`
`unit 76 into this portable music selection and viewing device 70.”); ¶ 13 (“A music
`
`11
`
`

`

` Covered Business Method Patent Review
`United States Patent No. 8,061,598
`
`storage medium 250 such as a magnetic card, magnetic tape, a CD, a DVD, or a
`
`memory card such as an IC card stores the music software, and this storage medium 250
`
`can be removed and used on other audio units.”). See also Ex. 1219 ¶47.
`
`As this background and the additional examples detailed below in Section IV.C
`
`illustrate, the prior art was rife with awareness and discussion of the same supposed
`
`“invention” now memorialized in the challenged claims of the ’598 patent.
`
`III. PETITIONER HAS STANDING
`A.
`The ’598 Patent is a “covered business method patent” under § 18(d)(1) of the
`
`The ’598 Patent Is a Covered Business Method Patent
`
`Leahy-Smith America Invents Act, Pub. L. 112-29 (“AIA”) and § 42.301, and Peti-
`
`tioner certifies it is available for review under § 42.304(a). See also CBM2014-
`
`00108/109, Pap. 8, 7-12) (finding claim 7 of ’598 Patent satisfies requirement). Alt-
`
`hough numerous claims of the ’598 Patent qualify, a patent with even one claim cover-
`
`ing a covered business method is considered a CBM patent. See CBM 2012-00001,
`
`Doc. 36 at 26; 77 Fed. Reg. 48,709 (Aug. 14, 2012). Petitioner thus addresses here ex-
`
`emplary claim 7, which depends from claim 1 (Ex. 1201):
`
`1. A portable data carrier comprising:
`[A] an interface for reading and writing data from and to the portable da-
`ta carrier;
`[B] content data memory, coupled to the interface, for storing one or
`more content data items on the carrier;
`[C] use rule memory to store one or more use rules for said one or more
`
`12
`
`

`

` Covered Business Method Patent Review
`United States Patent No. 8,061,598
`
`
`content data items;
`[D] a program store storing code implementable by a processor;
`[E] and a processor coupled to the content data memory, the use rule
`memory, the interface and to the program store for implementing code
`in the program store,
`[F] wherein the code comprises code for storing at least one content data
`item in the content data memory and at least one use rule in the use rule
`memory.
`7. A portable data carrier as claimed in claim 1, further comprising
`
`[G] payment data memory to store payment data and code to
`provide the payment data to a payment validation system.
`1.
`A “covered business method patent” is “a patent that claims a method or corre-
`
`Exemplary Claim 7 Is Financial In Nature
`
`sponding apparatus for performing data processing or other operations used in the practice, admin-
`
`istration, or management of a financial product or service, except that the term does not in-
`
`clude patents for technological inventions.” AIA § 18(d)(1); 37 C.F.R. § 42.301. “The
`
`‘legislative history explains that the definition of covered business method patent was
`
`drafted to encompass patents claiming activities that are financial in nature, incidental
`
`to a financial activity or complementary to a financial activity.’” 77 Fed. Reg. 48,734,
`
`48,735 (Aug. 14, 2012) (citing 157 Cong. Rec. S5432 (daily ed. Sept. 8, 2011) (state-
`
`ment of Sen. Schumer)). “[F]inancial product or service” is to be interpreted broadly,
`
`id., and the term “financial . . . simply means relating to monetary matters”—it does
`
`not require any link to traditional financial industries such as banks. See, e.g.,
`
`13
`
`

`

`CBM2012-00001, Paper 36 at 23.
`
` Covered Business Method Patent Review
`United States Patent No. 8,061,598
`
`
`The Board has previously found, e.g., that a claim for “transferring money elec-
`
`tronically via a telecommunication line to the first party . . . from the second party”
`
`met the financial product or service requirement, concluding that “the electronic
`
`transfer of money is a financial activity, and allowing such a transfer amounts to
`
`providing a financial service.” CBM2013-00020, Paper 14 at 11-12. See also, e.g.,
`
`CBM2013-00017, Paper 8 at 5-6 (finding patent sufficiently financial based on refer-
`
`ence in the specification to e-commerce and the fact that “[a] person of ordinary skill
`
`in the art would have understood that [one of the claim limitations] may be associated
`
`with financial services”).
`
`As discussed above, the ’598 patent includes claims directed to a “portable data
`
`carrier” (such as a standard smart card) that stores content, use rules, payment data,
`
`and code that provides payment data to a payment validation system. See AIA
`
`§ 18(d)(1); 37 C.F.R. § 42.301(a); Ex. 1201. The ’598 patent alleges that this allows
`
`content owners to make content available to users without fearing loss of revenue.
`
`Ex. 1201 at 2:11-15; see also id. at claim 31 (“A method of controlling access to content data,
`
`the method comprising: receiving a data access request from a user for a content data
`
`item, reading the use status data and one or more use rules from parameter memory
`
`that pertain to use of the requested content data item; evaluating the use status data
`
`using the one or more use rules to determine whether access to the content data item
`
`14
`
`

`

` Covered Business Method Patent Review
`United States Patent No. 8,061,598
`
`is permitted; and enabling access to the content data item responsive to a determina-
`
`tion that access to the content data item is permitted”). More generally, the patent is
`
`about “[d]ata storage and access systems [that] enable downloading and paying for da-
`
`ta . . .” Id. Abstract. “The combination of payment data and stored content data and
`
`use rule data helps reduce the risk of unauthorized access to data.” Id. And in seek-
`
`ing to enforce the ’598 patent in litigation, Smartflash itself conceded that the alleged
`
`invention relates to a financial activity or transaction, stating that “[t]he patents-in-suit
`
`generally cover a portable data carrier for storing data and managing access to the data
`
`via payment information and/or use status rules. The patents-in-suit also generally
`
`cover a computer network . . . that serves data and manages access to data by, for ex-
`
`ample, validating payment information.” Ex. 1202 ¶ 17.
`
`Indeed, the specification confirms the “portable data carrier” of the invention
`
`is “for storing and paying for data,” Ex. 1201 1:20-22, and the “use rules” of Claim 1
`
`“may be linked to payments made from the card to provide payment options such as
`
`access to buy content data outright; [or] rental access . . .” Id. 5:1-8. Claim 7 further
`
`requires memory to store payment data and code to “provide the payment data to a
`
`payment validation system.” Id. cl. 7. Thus Claim 7, which explicitly describes storing
`
`and providing payment data to a payment validation system, clearly concerns a com-
`
`puter system (corresponding to the methods discussed and claimed elsewhere) for
`
`performing data processing and other operations used in the practice, administration,
`
`15
`
`

`

` Covered Business Method Patent Review
`United States Patent No. 8,061,598
`
`or management of a financial activity and service. Indeed, claim 7 expressly recites
`
`software (i.e., code) to perform data processing and other operations in connection
`
`with the recited “payment validation system” (e.g., “to store payment data and code to
`
`provide the payment data to

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket