`United States Patent No. 7,942,317
`
`IN THE UNITED STATES PATENT AND TRADEMARK OFFICE
`
`Petitioner: Apple Inc.
`
`Attorney Docket No.:
`
` 104677-5008-816
`Customer No. 28120
`
`§
`Inventor: Racz et al.
`United States Patent No.: 7,942,317 §
`Formerly Application No.: 12/014,558 §
`Issue Date: May 17, 2011
`§
`Filing Date: January 15, 2008
`§
`Former Group Art Unit: 2887
`§
`Former Examiner: Thien M. Le
`§
`
`For: Data Storage and Access Systems
`
`MAIL STOP PATENT BOARD
`Patent Trial and Appeal Board
`United States Patent and Trademark Office
`Post Office Box 1450
`Alexandria, Virginia 22313-1450
`
`PETITION FOR COVERED BUSINESS METHOD PATENT REVIEW OF
`UNITED STATES PATENT NO. 7,942,317 PURSUANT TO 35 U.S.C. § 321,
`37 C.F.R. § 42.304
`
`
`
`
`
`
`
`
`
` Covered Business Method Patent Review
`United States Patent No. 7,942,317
`
`
`TABLE OF CONTENTS
`
`(b)
`
`B.
`
`INTRODUCTION ....................................................................................................... 1
`I.
`II. OVERVIEW OF FIELD OF THE CLAIMED INVENTION ......................... 4
`III. PETITIONER HAS STANDING .......................................................................... 11
`A.
`The ’317 Patent Is a Covered Business Method (“CBM”) Patent ........... 11
`1.
`Exemplary Claim 18 Is Financial In Nature .................................... 12
`2.
`Claim 18 Does Not Cover A Technological Invention ................. 14
`(a)
`Claim 18 Does Not Recite A Technological
`Feature That Is Novel and Unobvious .............................. 15
`Claim 18 Does Not Solve A Technical Problem
`Using A Technical Solution ................................................. 17
`Related Matters and Mandatory Disclosures; Petitioner Is a
`Real Party In Interest Sued For and Charged With Infringement ........... 19
`IV. DETAILED EXPLANATION OF REASONS FOR RELIEF
`REQUESTED, SHOWING IT IS MORE LIKELY THAN NOT
`THAT AT LEAST ONE CHALLENGED CLAIM IS
`UNPATENTABLE .................................................................................................... 20
`A.
`Claim Construction .......................................................................................... 20
`B.
`The Challenged Claims are Unpatentable Under § 101 ............................. 22
`1.
`The Challenged Claim is Directed To Abstract Ideas .................... 23
`2.
`The Challenged Claim Does Not Disclose An “Inventive
`Concept” That Is “Significantly More” Than an Abstract
`Idea ......................................................................................................... 26
`Field Of Use Limitations Cannot Transform Abstract Ideas
`Into Patent Eligible Inventions .......................................................... 27
`Generic Computer Implementation Cannot Transform
`Abstract Ideas Into Patent Eligible Inventions ............................... 28
`The Functional Nature Of The Challenged Claims
`Confirms preemption and Patent Ineligibility ................................. 29
`Machine-or-Transformation Test Also Confirms Patent
`Ineligibility ............................................................................................. 30
`CONCLUSION........................................................................................................... 30
`
`3.
`
`4.
`
`5.
`
`6.
`
`V.
`
`ii
`
`
`
`
`EXHIBIT LIST
`1201
`
`1202
`
`1203
`
`1204
`
`1205
`
`1206
`
`1207
`
`1208
`
`1209
`
`1210
`
`1211
`
`1212
`
`1213
`
`1214
`
`1215
`
`1216
`
`1217
`
`1218
`
`1219
`
` Covered Business Method Patent Review
`United States Patent No. 7,942,317
`
`
`U.S. Patent No. 7,942,317
`
`Plaintiff’s First Amended Complaint
`
`U.S. Patent No. 5,940,805
`
`U.S. Patent No. 4,999,806
`
`U.S. Patent No. 5,675,734
`
`U.S. Patent No. 4,337,483
`
`File History for U.S. Patent No. 7,942,317
`
`Declaration of Megan F. Raymond In Support of Apple Inc.’s
`Petition for Covered Business Method Patent Review
`U.S. Patent No. 5,103,392
`
`U.S. Patent No. 5,530,235
`
`U.S. Patent No. 5,629,980
`
`U.S. Patent No. 5,915,019
`
`European Patent Application, Publication No. EP0809221A2
`
`International Publication No. WO 99/43136
`
`JP Patent Application Publication No. H11-164058 (transla-
`tion)
`Eberhard von Faber, Robert Hammelrath, and Franz-Peter
`Heider, “The Secure Distribution of Digital Contents,” IEEE
`(1997)
`Declaration of Anthony J. Wechselberger In Support of Apple
`Inc.’s Petition for Covered Business Method Patent Review
`Declaration of Michael P. Duffey In Support of Apple Inc.’s
`Petition for Covered Business Method Patent Review
`U.S. Patent No. 4,878,245
`
`iii
`
`
`
` Covered Business Method Patent Review
`United States Patent No. 7,942,317
`
`
`EXHIBIT LIST
`1220
`
`1221
`
`Claim Construction Memorandum Opinion from Smartflash
`LLC v. Apple Inc., No. 6:13cv447 (Dkt. 229)
`U.S. Patent No. 5,925,127
`
`iv
`
`
`
` Covered Business Method Patent Review
`United States Patent No. 7,942,317
`
`I.
`
`INTRODUCTION
`
`Pursuant to 35 U.S.C. § 321 and 37 C.F.R. § 42.304, the undersigned, on behalf
`
`of and acting in a representative capacity for Apple Inc. (“Petitioner” and the real par-
`
`ty in interest), petitions for review under the transitional program for covered busi-
`
`ness method (“CBM”) patents of claim 18 (the challenged claim) of U.S. Pat.
`
`No. 7,942,317 (“the ’317 patent”), issued to Smartflash Technologies Limited and as-
`
`signed to Smartflash LLC (“Patentee”). Petitioner hereby asserts that it is more likely
`
`than not that claim 18 is unpatentable for the reasons herein and requests review of,
`
`and judgment against, the challenged claim as unpatentable under 35 U.S.C. § 101.1
`
`Ad discussed in Section III.B, infra, Petitioner previously filed CBM2014-00112
`
`and CBM-00113 seeking review of claims 1, 6-8, 12, 13, 16, and 18 of the ’317 patent
`
`on §§102 and 103 grounds. Those petitions were instituted for trial (and consolidated
`
`as CBM2014-001122) with respect to those claims on the basis of §103.
`
`
`1 Petitioner is demonstrating, in pending litigation, that these claims are invalid for
`
`numerous additional reasons. All emphasis herein added unless otherwise noted. All
`
`section cites herein are to 35 U.S.C. or 37 C.F.R., as the context indicates, and all
`
`emphasis herein is added unless otherwise noted.
`
`2 Petitioner respectfully notes that the Director, pursuant to Rule 325(c), may
`
`determine after institution that consolidation of these proceedings may be appropriate,
`
`
`
`
`
` Covered Business Method Patent Review
`United States Patent No. 7,942,317
`
`As detailed herein, claim 18 merely recites steps well-known in the field of data
`
`storage and access, including the method of “providing data to a data requester.” See,
`
`e.g., Ex. 1201 at claim 18; Abstract “Data storage and access systems are described for
`
`downloading and paying for data . . .”). Moreover, as confirmed by the Supreme
`
`Court’s recent decision in Alice Corp. Pty, Ltd. v. CLS Bank Int’l, 134 S. Ct. 2347
`
`(2014)—decided after Petitioner’s original petitions challenging the ’317 patent were
`
`filed—claim 18—a method claim—represents nothing more than an attempt to pa-
`
`tent a well-known and unpatentable abstract idea ineligible for patenting under § 101:
`
`paying for data.. Claim 18 recites five rudimentary steps relating to data storage and
`
`access—(A) receiving a request for data, (B) receiving payment data relating to
`
`the data, (C) transmitting requested data, (D) reading payment distribution infor-
`
`mation, and (E) outputting payment data for distributing the requested data:
`
`18. A method of providing data to a data requester comprising:
`receiving a request for a data item from the requester;
`receiving payment data from the requester relating to payment for
`
`the requested data;
`transmitting the requested data to the requestor;
`reading payment distribution information from a data store; and
`outputting payment data to a payment system for distributing the
`
`
`or may at minimum determine to coordinate the schedules of this proceeding and
`
`CBM2014-00112.
`
`2
`
`
`
` Covered Business Method Patent Review
`United States Patent No. 7,942,317
`
`
`payment for the requested data.
`Ex. 1201. But at the patent’s earliest claimed priority date, these simple elements and
`
`their combination were well known to any person of ordinary skill (“POSITA”3). In-
`
`deed, the patent acknowledges that the idea of providing access to data in exchange
`
`for a payment (e.g., purchase of music on a CD) was already well known. See, e.g., Ex.
`
`1201 5:4-7 (“the purchase outright option may be equivalent to the purchase of a compact
`
`disc (CD)”). And, as demonstrated herein, the prior art was teeming with disclosures
`
`of this basic concept and its straightforward implementation in physical systems.
`
`Moreover, claim 18 clearly involves no “technology” at all other than, at most, a
`
`“data requester,” which is merely an entity that may make a data request, and a “pay-
`
`ment system” and “data store,” which were commonplace and—to the extent they are
`
`deemed to require hardware at all—certainly do not require any particularized hard-
`
`ware. See, e.g., Ex. 1201 4:27-42; 6:38-40; 7:52-53; 9:62; 10:16, 25, 36, 44; 12:29-32;
`
`13:35-47; 14:25-29; 19:43-44; Figs. 6, 12(d), (e). Thus, as the intrinsic record reflects,
`
`Claim 18 recites no more than a method for receiving a request for and transmitting
`
`
`3 All references to a POSITA refer to the knowledge or understanding of a person of
`
`ordinary skill in the art as of October 25, 1999, unless specifically noted. A POSITA
`
`would have at least a B.S. in E.E., computer science or a telecommunications related
`
`field, and at least three years of industry experience that included client-server
`
`data/information distribution and management architectures. See Ex. 1217 ¶ 28.
`
`3
`
`
`
` Covered Business Method Patent Review
`United States Patent No. 7,942,317
`
`data while receiving and outputting payment data. Independent claims 1, 8, and 16
`
`are nothing but variations on this same simple theme, with the addition, in the chal-
`
`lenged “system” claims, of equally generic components (such as a communication in-
`
`terface, program store, and processor). See, e.g., Ex. 1201 12:29-32 (“The physical em-
`
`bodiment of the system is not critical and a skilled person will understand that the
`
`terminals, data processing systems and the like can all take a variety of forms.”).
`
`As the Board noted in its previous Institution Decision, “the ’317 patent makes
`
`clear that the asserted novelty of the invention is not in any specific improvement of
`
`software or hardware, but in the method of controlling access to data,” CBM2014-00112,
`
`Paper 8, at 11, and the challenged claim is directed to nothing more than the un-
`
`patentable abstract idea of paying for data, with at most the addition of well-known,
`
`routine and conventional features that do not render it patentable—in particular, fea-
`
`tures that, even if assumed to suggest a generic computer implementation, cannot
`
`confer patentability on this patent-ineligible abstraction. See, e.g., Alice, 134 S. Ct. at
`
`2359-60.
`
`Because claim 18 recites unpatentable subject matter, it should be invalidated.
`
`II. OVERVIEW OF FIELD OF THE CLAIMED INVENTION
`By October 25, 1999, electronic sale, distribution, and content protection for
`
`digital products all would have been well-known to a POSITA, and (as Petitioner is
`
`demonstrative in the instituted trial in CBM2014-00112) their combination as claimed
`
`4
`
`
`
` Covered Business Method Patent Review
`United States Patent No. 7,942,317
`
`also would have been well-known or at minimum obvious. See, e.g., Ex. 1217 § V. On
`
`March 12, 1991, for example, U.S. Pat. No. 4,999,806 (“Chernow,” filed Sept. 4, 1987)
`
`issued, disclosing a system and method for sale and distribution of digital products by
`
`phone, and for content protection. See, e.g., Ex. 1204 Abstract (“central station distrib-
`
`utes software by telephone. . . accepts credit card information, transmits an acceptance code . . . After
`
`verifying the credit card information, the station calls the purchaser back and continues with the
`
`transaction only after receiving the acceptance code.”); 1:67-2:9 (describing “means for selling
`
`and distributing protected software using standard telephone lines,” “permit[ting] the purchaser to
`
`rent the protected software for a period of time,” and “to rent the protected software for a specific
`
`number of runs”). Chernow also discloses (1) different types of access, such as purchase
`
`vs. rental and (2) a Control Transfer Program and a Primary Protection Program to
`
`prevent unauthorized copies. See Ex. 1204 Abstract; 2:65-3:23; Ex. 1217 ¶ 33.
`
`In April 1992, U.S. Patent No. 5,103,392 (“Mori,” filed Dec. 5, 1990) issued,
`
`disclosing use-based charging for digital products. See, e.g., id. Ex. 1209 1:64-2:17:
`
`The data processing apparatus includes user-specific credit data storage
`means for storing data identifying the user . . . and indicating credit for payment ca-
`pacity, use time length, or the like of the user . . .. Also included is use deci-
`sion means for determining permission to use the program . . . on the basis of pro-
`gram-specific data supplied from the program storage means or user-specific
`credit data supplied from the user-specific credit data storage means, the
`use decision means delivering either an affirmative or negative signal corresponding
`to results of the decision. Also included is program use history storage means
`
`5
`
`
`
` Covered Business Method Patent Review
`United States Patent No. 7,942,317
`
`
`connected to the use decision means for storing program use history data . . ..
`Mori’s emphasis on assuring permission to access a program and compensating pro-
`
`viders underscores this existing focus in the art on digital rights management
`
`(“DRM”), over eight years before the claimed priority date. See, e,g., Ex. 1217 ¶ 36.
`
`In 1996 and 1997, related U.S. Patent Nos. 5,530,235, issued June 25, 1996, and
`
`5,629,980, issued May 13, 1997, (referred to collectively as “Stefik”) also addressed the
`
`need for DRM in the expanding field of content distribution. Stefik disclosed a net-
`
`work of “repositories,” including portable cards, which interact to distribute content
`
`among users. See, e.g., Ex. 1210 4:21-46. Stefik acknowledged the importance of
`
`providing controls over distributed digital content to prevent piracy and ensure that
`
`content creators are adequately compensated. See, e.g., Ex. 1211 6:65-7:2 (“[Once a
`
`work has been read, computational control over that copy is gone. Metaphorically,
`
`‘the content genie is out of the bottle and no more fees can be billed.” Stefik disclos-
`
`es combating piracy of the read content by tying “usage rights” specifying use and fee
`
`restrictions that remain with the work through the distribution chain. Id. 7:1-5 (“[T]he
`
`present invention never separates the fee descriptions from the work. Thus, the digi-
`
`tal work genie only moves from one trusted bottle (repository) to another, and all uses
`
`of copies are potentially controlled and billable.”); 11:33-34 (“It is fundamental to the
`
`present invention that the usage rights are treated as part of the digital work. As the
`
`digital work is distributed, the scope of the granted usage rights will remain the same
`
`6
`
`
`
` Covered Business Method Patent Review
`United States Patent No. 7,942,317
`
`or may be narrowed.”). Stefik also discloses distribution of payment for purchased
`
`content. See, e.g., 1211 43:53-55 (“If the consumer copies the digital work (usually for
`
`a third party), a fee is collected and automatically paid to the creator.”); 44:2-4 (“In
`
`another scenario, every time a copy of a digital work is sold a fee is paid to the creator
`
`and also to the immediate distributor.”); 44:18-19 (“When a consumer buys a copy
`
`from the distributor, fees are paid both to the distributor and to the creator.”). See also,
`
`e,g., Ex. 1217 ¶¶ 43-49, 82.
`
`Exhibit 1213 (“Poggio”, pub’d Nov. 26, 1997) gives another example of secure
`
`content distribution with content protection, disclosing a “virtual vending machine”
`
`system for sale and distribution of digital products. See, e.g., id. Abstract (“virtual vend-
`
`ing machine manages a comprehensive vending service for the distribution of licensed electronic data
`
`(i.e., products) over a distributed computer system. . . . [and] distributes licenses for the electronic data
`
`for the complete product or for components thereof and for a variety of time frames, including perma-
`
`nent licenses and rental period licenses. [It] provides . . . capability to obtain information regard-
`
`ing the available products and the associated license fees and rental periods, to receive the product
`
`upon receipt of a corresponding electronic payment, and to reload the product during the term of the
`
`license.”). Poggio, too, discloses different types of access, including rentals, and re-
`
`download capabilities for already-purchased content. See, e.g., id.; Ex. 1217 ¶ 37.
`
`Also in 1997, Exhibit 1216 (“von Faber”) published, making the well-known
`
`observation that “[e]lectronic commerce systems dealing with the distribution of digital con-
`
`7
`
`
`
` Covered Business Method Patent Review
`United States Patent No. 7,942,317
`
`tents . . . have to couple the use of the provided digital goods with a prior payment for the goods in a
`
`way which cannot be bypassed.” See id. 7. Von Faber proposed a system where cus-
`
`tomers purchase keys required to utilize encrypted content. See, e.g., id. (“The basic
`
`idea . . . is to distribute the contents in encrypted form, and to have the customer pay for the key
`
`which he needs to transform the encrypted content in an usable form.”); id. 8 (“The Content Pro-
`
`vider provides digital contents in encrypted form being distributed by the Content Distribu-
`
`tor. . . . The Authorisation System permits the distribution of the appropriate key after settling
`
`of the fees payable by the Customer . . .. The role of the Content Distributor is not essential
`
`for the subsequent discussion but, of course, for the business to take place.”); see also id. Fig.
`
`1. Von Faber notes its system could be used for a variety of known distribution and
`
`payment methods. See, e.g., id. 13 (“Different methods can be used to distribute the encrypted
`
`contents (standard techniques). . . . Different electronic payment methods can be integrated . . . .
`
`This flexibility leads to the fact that totally different authorisation methods can be integrated.”).
`
`Von Faber further addressed the known issue of payment distribution to providers.
`
`See, e.g., id. (“The system automatically divides the package price (payments) and guarantees that
`
`the money is transferred to each Content Provider.”); Ex. 1217 ¶¶ 38-40, 81.
`
`Moreover, on June 22, 1999, U.S. Pat. No. 5,915,019 (“Ginter,” filed Jan. 8,
`
`1997) issued, disclosing “systems and methods for secure transaction management
`
`and electronic rights protection.” See, e.g., Ex. 1212 Abstract. Ginter describes a “vir-
`
`tual distribution environment” (“VDE”) to “control and/or meter or otherwise moni-
`
`8
`
`
`
` Covered Business Method Patent Review
`United States Patent No. 7,942,317
`
`tor use of electronically stored or disseminated information.” Id. Ginter’s system
`
`“help[s] to ensure that information is accessed and used only in authorized ways, and
`
`maintain the integrity, availability, and/or confidentiality of the information.” See, e.g.,
`
`id. Further, Ginter’s “techniques may be used to support an all-electronic information dis-
`
`tribution, for example, utilizing the ‘electronic highway.’” Id. Ginter discloses that the vari-
`
`ous entities of the VDE can flexibly take on any VDE roles. See, e.g., id. 255:22-23
`
`(“All participants of VDE 100 have the innate ability to participate in any role.”); 255:23-43.
`
`Ginter thus highlights the known flexibility in such distribution systems. And Ginter
`
`also discloses distribution of payment for purchased content. See id. 255:40-43 (“Roy-
`
`alty payments for the new works may be accessed by the publisher, distributors, or
`
`end-users, and may be tracked and electronically collected at any stage of the chain.”).
`
`See, e.g., Ex. 1217 ¶¶ 41-42, 81.
`
`Storage and utilization of content stored on portable devices, including mobile
`
`communication devices such as cellular phones, was also well-known before Smart-
`
`flash’s claimed October 25, 1999 priority date. As one example, PCT Application
`
`Publication No. WO 99/43136 (“Rydbeck”) published on August 26, 1999. See Ex.
`
`1214. Rydbeck discloses a cellular phone as a user device for storing digital content in
`
`non-volatile memory and accessing that content. See, e.g., id. 5 (“Because of its integra-
`
`tion into the cellular phone, the digital entertainment module can share components
`
`already present in the cellular phone. Such savings would not be available if a CD
`
`9
`
`
`
` Covered Business Method Patent Review
`United States Patent No. 7,942,317
`
`player were simply aggregated with the phone. Further, the use of solid state RAM or
`
`ROM, as opposed to disc storage, eliminates the need for bounce control circuitry.
`
`This enables the disclosed invention to provide cellular communications and enter-
`
`tainment during leisure activities.”). In addition, JP Patent Application Publication
`
`No. H11-164058 (“Sato”), entitled “Portable Music Selection and Viewing System”
`
`and published June 18, 1999, discloses storing media content onto mobile user devic-
`
`es and playing the media content from these mobile devices. Sato further discloses
`
`storing that media content on a removable IC card. See, e.g., Ex. 1215 ¶ 9 (“The port-
`
`able music selection and viewing device 70 provides a removable storage device 76 on a
`
`main body 71. This storage device 76 is a memory card similar to, for example, a mag-
`
`netic card, a magnetic tape, a CD, a DVD, or an IC card. The user, after downloading
`
`the music software to the storage device (medium) 76 of the portable music selection
`
`and viewing device 70 by operating the push buttons or the like on the main body 71,
`
`can enjoy this music software on a display 72 or a receiver 74 of the portable music
`
`selection and viewing device 70, and can also enjoy higher quality music playback by
`
`removing this storage device (medium) and inserting it into another audio unit. Further, the user
`
`can store the music software from another audio unit into the storage device 76 and
`
`enjoy music by inserting this storage unit 76 into this portable music selection and
`
`viewing device 70.”); ¶ 13 (“A music storage device 240 connected to the music con-
`
`trol unit 200 stores the music software. A music storage medium 250 such as . . . a
`
`10
`
`
`
` Covered Business Method Patent Review
`United States Patent No. 7,942,317
`
`memory card such as an IC card stores the music software, and this storage medium 250
`
`can be removed and used on other audio units.”). See, e.g., Ex. 1217 ¶¶ 50-51.
`
`Thus, as these background examples illustrate, the prior art was rife with
`
`awareness and discussion of the same supposed “invention” now memorialized in the
`
`challenged claims. Long before the purported priority date, disclosures abounded of
`
`the very features that Smartflash now seeks to claim as its exclusive property.
`
`III. PETITIONER HAS STANDING
`A.
`Petitioner certifies that the ’317 patent is available for review under 37 C.F.R. §
`
`The ’317 Patent Is a Covered Business Method (“CBM”) Patent
`
`42.304(a). The ’317 patent is a CBM patent under § 18(d)(1) of the Leahy-Smith
`
`America Invents Act, Pub. L. 112-29 (“AIA”) and § 42.301. See also CBM2014-00111,
`
`Paper 8, at 7-12 (finding claim 18 of ’317 Patent satisfies CBM requirement). Alt-
`
`hough in fact numerous claims qualify, a patent with even one claim covering a CBM
`
`is considered a CBM patent. See CBM 2012-00001, Doc. 36 at 26; 77 Fed. Reg. 48,709
`
`(Aug. 14, 2012). Accordingly, Petitioner addresses here exemplary claim 18:
`
`18. A method of providing data to a data requester comprising:
`receiving a request for a data item from the requester;
`receiving payment data from the requester relating to payment for
`
`the requested data;
`transmitting the requested data to the requestor;
`reading payment distribution information from a data store; and
`outputting payment data to a payment system for distributing the
`
`11
`
`
`
` Covered Business Method Patent Review
`United States Patent No. 7,942,317
`
`
`payment for the requested data.
`1.
`Exemplary Claim 18 Is Financial In Nature
`A CBM patent is “a patent that claims a method or corresponding apparatus
`
`for performing data processing or other operations used in the practice, administra-
`
`tion, or management of a financial product or service, except that the term does not
`
`include patents for technological inventions.” AIA § 18(d)(1); 37 C.F.R. § 42.301.
`
`“[T]he definition of covered business method patent was drafted to encompass pa-
`
`tents claiming activities that are financial in nature, incidental to a financial activity or comple-
`
`mentary to a financial activity.’” 77 Fed. Reg. 48,734-35 (Aug. 13, 2012) (citing 157 Cong.
`
`Rec. S5432 (daily ed. Sept. 8, 2011) (stm’t Sen. Schumer)). “[F]inancial product or ser-
`
`vice” is to be interpreted broadly, id., and “financial . . . simply means relating to monetary
`
`matters”—it does not require any link to traditional financial industries such as banks.
`
`See, e.g., CBM2012-00001, Paper 36, at 23.
`
`This Board has previously found, e.g., that a claim for “transferring money elec-
`
`tronically via a telecommunication line to the first party . . . from the second party”
`
`met the financial product or service requirement, concluding that “the electronic transfer
`
`of money is a financial activity, and allowing such a transfer amounts to providing a financial ser-
`
`vice.” CBM2013-00020, Paper 14, at 11-12. See also, e.g., CBM2013-00017, Paper 8, at
`
`5-6 (qualification as CBM patent based on specification’s reference to e-commerce
`
`and fact that a POSITA “would have understood that [one of the claim limitations] may be asso-
`
`ciated with financial services”).
`
`12
`
`
`
` Covered Business Method Patent Review
`United States Patent No. 7,942,317
`
`As discussed above, the ’317 patent relates, at most, to the idea of providing
`
`electronic data in exchange for payment. See AIA § 18(d)(1); 37 C.F.R. § 42.301(a); Ex.
`
`1201 2:12-15. Indeed, in seeking to enforce the ’317 patent in litigation, Smartflash
`
`itself conceded that the alleged invention relates to a financial activity or transaction,
`
`stating that “[t]he patents-in-suit generally cover a portable data carrier for storing da-
`
`ta and managing access to the data via payment information and/or use status rules. The
`
`patents-in-suit also generally cover a computer network . . . that serves data and man-
`
`ages access to data by, for example, validating payment information.” Ex. 1202 ¶ 17.
`
`The ‘317 patent generally describes the invention as follows (Ex. 1201 1:55-63):
`
`According to the present invention there is therefore provided a method
`of providing portable data comprising providing a portable data storage
`device comprising downloaded data storage means and payment vali-
`dation means; providing a terminal for internet access; coupling the
`portable data storage device to the terminal; reading payment infor-
`mation from the payment validation means using the terminal; validat-
`ing the payment information; and downloading data into the portable
`storage device from a data supplier.”
`More specifically, the ’317 patent and claim 18 are directed to a method of
`
`
`
`providing data to a data requester in response to receiving payment data. Figures 12d and
`
`12e describe various steps in this process, including: (a) receiving a request for a data
`
`item (S63), (b) receiving payment data from the requestor (S66), (c) reading content
`
`from the content provider (S73), (d) transmitting the content to the terminal (S73). Ex.
`
`13
`
`
`
` Covered Business Method Patent Review
`United States Patent No. 7,942,317
`
`1201. In addition, Figs. 12d and 12e show that providing data to a data requester may
`
`involve (e) transmitting access rules to the requester (S71), (f) reading payment distribution
`
`data (S68), and (g) distributing payments according to distribution data (S69). Id. The
`
`specification describes that “[p]ayment for the data item or items requested may either be made
`
`directly to the system owner or may be made to an e-payment system.” Id. 20:50-54. “E-payment
`
`systems [] are coupled to banks” and may be provided in accordance with cash compliant
`
`standards such as MONDEX, Proton, and/or Visa. Id. 13:35-46. Thus because claim
`
`18 explicitly describes receiving and responding to payment data, as well as outputting payment
`
`data, it clearly relates to a financial activity and providing a financial service. See
`
`CBM2013-00020, Institution Decision at 9-10 (“the electronic transfer of money is a
`
`financial activity, and allowing such a transfer amounts to providing a financial ser-
`
`vice.”); CBM2014-00112, Paper 7, at 10 (finding claim 18 of the ’317 Patent satisfies
`
`the “financial-in-nature” requirement). See also AIA § 18(d)(1); 37 C.F.R. § 42.301(a).
`
`See also 77 Fed. Reg. at 48,735.
`
`2.
`Further, claim 18 does not cover a “technological invention” within the excep-
`
`Claim 18 Does Not Cover A Technological Invention
`
`tion in AIA § 18(d)(1), because it does not claim “subject matter as a whole [that] re-
`
`cites a technological feature that is novel and unobvious over the prior art[] and solves a
`
`technical problem using a technical solution.” § 42.301(b). To the contrary, the specifica-
`
`tion makes clear that, to the extent any hardware is argued to be required to begin
`
`14
`
`
`
` Covered Business Method Patent Review
`United States Patent No. 7,942,317
`
`with, claim 18 does not require any specific hardware at all. The “data requester” is not any
`
`particular hardware according to the patent, and may even be an individual who re-
`
`quests data. The claimed “data store” and “payment systems” were commonplace
`
`and could be implemented using, e.g., well-known industry standards.
`
`(a) Claim 18 Does Not Recite A Technological Feature
`That Is Novel and Unobvious
`
`First, no “technological feature” of claim 18 is novel and unobvious. The
`
`PTAB has confirmed that “[m]ere recitation of known technologies, such as comput-
`
`er hardware, communication or computer networks, software, memory, computer-
`
`readable storage medium, scanners, display devices or databases, or specialized ma-
`
`chines, such as an ATM or point of sale device,” or “[r]eciting the use of known prior
`
`art technology to accomplish a process or method, even if that process or method is
`
`novel and non-obvious” will “not typically render a patent a technological invention.”
`
`See, e.g., 77 Fed. Reg. 48,764 (Aug. 14, 2012).
`
`As its language makes clear, claim 18 requires no particularized hardware: in-
`
`stead, it simply describes, at most, the idea of providing electronic data in exchange
`
`for payment. The claim involves no “technology” at all other than, at most, the use of a
`
`data store and payment system. Ex. 1201. The “data requestor” of claim 8 is not de-
`
`scribed as hardware, let alone any particular type of hardware. The data requester is
`
`simply described as an entity that may make a data request and to which data is pro-
`
`vided. Ex. 1201 6:38-40; 7:52-53; 9:62; 10:16, 25, 36, 44; 12:29-32. The patent also
`
`15
`
`
`
` Covered Business Method Patent Review
`United States Patent No. 7,942,317
`
`confirms that the “data store” is not any particularized hardware, but rather can be
`
`generic memory. See id. 14:25-29; Fig 6 (136 (payment record data store)); 14:43-44.
`
`See also, e.g., Ex. 1201 12:29-32 (“The physical embodiment of the system is not critical
`
`and a skilled person will understand that the terminals, data processing systems and
`
`the like can all take a variety of forms.”). Further, receiving, reading, and outputting
`
`payment data was known because e-payment systems were known, as were payment
`
`systems. See Ex. 1201 3:35-47. The patent explains that “[e