throbber
Covered Business Method Patent Review
`United States Patent No. 7,942,317
`
`IN THE UNITED STATES PATENT AND TRADEMARK OFFICE
`
`Petitioner: Apple Inc.
`
`Attorney Docket No.:
`
` 104677-5008-816
`Customer No. 28120
`

`Inventor: Racz et al.
`United States Patent No.: 7,942,317 §
`Formerly Application No.: 12/014,558 §
`Issue Date: May 17, 2011

`Filing Date: January 15, 2008

`Former Group Art Unit: 2887

`Former Examiner: Thien M. Le

`
`For: Data Storage and Access Systems
`
`MAIL STOP PATENT BOARD
`Patent Trial and Appeal Board
`United States Patent and Trademark Office
`Post Office Box 1450
`Alexandria, Virginia 22313-1450
`
`PETITION FOR COVERED BUSINESS METHOD PATENT REVIEW OF
`UNITED STATES PATENT NO. 7,942,317 PURSUANT TO 35 U.S.C. § 321,
`37 C.F.R. § 42.304
`
`
`
`
`
`

`

`
`
` Covered Business Method Patent Review
`United States Patent No. 7,942,317
`
`
`TABLE OF CONTENTS
`
`(b) 
`
`B. 
`
`INTRODUCTION ....................................................................................................... 1 
`I. 
`II.  OVERVIEW OF FIELD OF THE CLAIMED INVENTION ......................... 4 
`III.  PETITIONER HAS STANDING .......................................................................... 11 
`A. 
`The ’317 Patent Is a Covered Business Method (“CBM”) Patent ........... 11 
`1. 
`Exemplary Claim 18 Is Financial In Nature .................................... 12 
`2. 
`Claim 18 Does Not Cover A Technological Invention ................. 14 
`(a) 
`Claim 18 Does Not Recite A Technological
`Feature That Is Novel and Unobvious .............................. 15 
`Claim 18 Does Not Solve A Technical Problem
`Using A Technical Solution ................................................. 17 
`Related Matters and Mandatory Disclosures; Petitioner Is a
`Real Party In Interest Sued For and Charged With Infringement ........... 19 
`IV.  DETAILED EXPLANATION OF REASONS FOR RELIEF
`REQUESTED, SHOWING IT IS MORE LIKELY THAN NOT
`THAT AT LEAST ONE CHALLENGED CLAIM IS
`UNPATENTABLE .................................................................................................... 20 
`A. 
`Claim Construction .......................................................................................... 20 
`B. 
`The Challenged Claims are Unpatentable Under § 101 ............................. 22 
`1. 
`The Challenged Claim is Directed To Abstract Ideas .................... 23 
`2. 
`The Challenged Claim Does Not Disclose An “Inventive
`Concept” That Is “Significantly More” Than an Abstract
`Idea ......................................................................................................... 26 
`Field Of Use Limitations Cannot Transform Abstract Ideas
`Into Patent Eligible Inventions .......................................................... 27 
`Generic Computer Implementation Cannot Transform
`Abstract Ideas Into Patent Eligible Inventions ............................... 28 
`The Functional Nature Of The Challenged Claims
`Confirms preemption and Patent Ineligibility ................................. 29 
`Machine-or-Transformation Test Also Confirms Patent
`Ineligibility ............................................................................................. 30 
`CONCLUSION........................................................................................................... 30 
`
`3. 
`
`4. 
`
`5. 
`
`6. 
`
`V. 
`
`ii
`
`

`

`
`EXHIBIT LIST
`1201
`
`1202
`
`1203
`
`1204
`
`1205
`
`1206
`
`1207
`
`1208
`
`1209
`
`1210
`
`1211
`
`1212
`
`1213
`
`1214
`
`1215
`
`1216
`
`1217
`
`1218
`
`1219
`
` Covered Business Method Patent Review
`United States Patent No. 7,942,317
`
`
`U.S. Patent No. 7,942,317
`
`Plaintiff’s First Amended Complaint
`
`U.S. Patent No. 5,940,805
`
`U.S. Patent No. 4,999,806
`
`U.S. Patent No. 5,675,734
`
`U.S. Patent No. 4,337,483
`
`File History for U.S. Patent No. 7,942,317
`
`Declaration of Megan F. Raymond In Support of Apple Inc.’s
`Petition for Covered Business Method Patent Review
`U.S. Patent No. 5,103,392
`
`U.S. Patent No. 5,530,235
`
`U.S. Patent No. 5,629,980
`
`U.S. Patent No. 5,915,019
`
`European Patent Application, Publication No. EP0809221A2
`
`International Publication No. WO 99/43136
`
`JP Patent Application Publication No. H11-164058 (transla-
`tion)
`Eberhard von Faber, Robert Hammelrath, and Franz-Peter
`Heider, “The Secure Distribution of Digital Contents,” IEEE
`(1997)
`Declaration of Anthony J. Wechselberger In Support of Apple
`Inc.’s Petition for Covered Business Method Patent Review
`Declaration of Michael P. Duffey In Support of Apple Inc.’s
`Petition for Covered Business Method Patent Review
`U.S. Patent No. 4,878,245
`
`iii
`
`

`

` Covered Business Method Patent Review
`United States Patent No. 7,942,317
`
`
`EXHIBIT LIST
`1220
`
`1221
`
`Claim Construction Memorandum Opinion from Smartflash
`LLC v. Apple Inc., No. 6:13cv447 (Dkt. 229)
`U.S. Patent No. 5,925,127
`
`iv
`
`

`

` Covered Business Method Patent Review
`United States Patent No. 7,942,317
`
`I.
`
`INTRODUCTION
`
`Pursuant to 35 U.S.C. § 321 and 37 C.F.R. § 42.304, the undersigned, on behalf
`
`of and acting in a representative capacity for Apple Inc. (“Petitioner” and the real par-
`
`ty in interest), petitions for review under the transitional program for covered busi-
`
`ness method (“CBM”) patents of claim 18 (the challenged claim) of U.S. Pat.
`
`No. 7,942,317 (“the ’317 patent”), issued to Smartflash Technologies Limited and as-
`
`signed to Smartflash LLC (“Patentee”). Petitioner hereby asserts that it is more likely
`
`than not that claim 18 is unpatentable for the reasons herein and requests review of,
`
`and judgment against, the challenged claim as unpatentable under 35 U.S.C. § 101.1
`
`Ad discussed in Section III.B, infra, Petitioner previously filed CBM2014-00112
`
`and CBM-00113 seeking review of claims 1, 6-8, 12, 13, 16, and 18 of the ’317 patent
`
`on §§102 and 103 grounds. Those petitions were instituted for trial (and consolidated
`
`as CBM2014-001122) with respect to those claims on the basis of §103.
`
`
`1 Petitioner is demonstrating, in pending litigation, that these claims are invalid for
`
`numerous additional reasons. All emphasis herein added unless otherwise noted. All
`
`section cites herein are to 35 U.S.C. or 37 C.F.R., as the context indicates, and all
`
`emphasis herein is added unless otherwise noted.
`
`2 Petitioner respectfully notes that the Director, pursuant to Rule 325(c), may
`
`determine after institution that consolidation of these proceedings may be appropriate,
`
`
`
`

`

` Covered Business Method Patent Review
`United States Patent No. 7,942,317
`
`As detailed herein, claim 18 merely recites steps well-known in the field of data
`
`storage and access, including the method of “providing data to a data requester.” See,
`
`e.g., Ex. 1201 at claim 18; Abstract “Data storage and access systems are described for
`
`downloading and paying for data . . .”). Moreover, as confirmed by the Supreme
`
`Court’s recent decision in Alice Corp. Pty, Ltd. v. CLS Bank Int’l, 134 S. Ct. 2347
`
`(2014)—decided after Petitioner’s original petitions challenging the ’317 patent were
`
`filed—claim 18—a method claim—represents nothing more than an attempt to pa-
`
`tent a well-known and unpatentable abstract idea ineligible for patenting under § 101:
`
`paying for data.. Claim 18 recites five rudimentary steps relating to data storage and
`
`access—(A) receiving a request for data, (B) receiving payment data relating to
`
`the data, (C) transmitting requested data, (D) reading payment distribution infor-
`
`mation, and (E) outputting payment data for distributing the requested data:
`
`18. A method of providing data to a data requester comprising:
`receiving a request for a data item from the requester;
`receiving payment data from the requester relating to payment for
`
`the requested data;
`transmitting the requested data to the requestor;
`reading payment distribution information from a data store; and
`outputting payment data to a payment system for distributing the
`
`
`or may at minimum determine to coordinate the schedules of this proceeding and
`
`CBM2014-00112.
`
`2
`
`

`

` Covered Business Method Patent Review
`United States Patent No. 7,942,317
`
`
`payment for the requested data.
`Ex. 1201. But at the patent’s earliest claimed priority date, these simple elements and
`
`their combination were well known to any person of ordinary skill (“POSITA”3). In-
`
`deed, the patent acknowledges that the idea of providing access to data in exchange
`
`for a payment (e.g., purchase of music on a CD) was already well known. See, e.g., Ex.
`
`1201 5:4-7 (“the purchase outright option may be equivalent to the purchase of a compact
`
`disc (CD)”). And, as demonstrated herein, the prior art was teeming with disclosures
`
`of this basic concept and its straightforward implementation in physical systems.
`
`Moreover, claim 18 clearly involves no “technology” at all other than, at most, a
`
`“data requester,” which is merely an entity that may make a data request, and a “pay-
`
`ment system” and “data store,” which were commonplace and—to the extent they are
`
`deemed to require hardware at all—certainly do not require any particularized hard-
`
`ware. See, e.g., Ex. 1201 4:27-42; 6:38-40; 7:52-53; 9:62; 10:16, 25, 36, 44; 12:29-32;
`
`13:35-47; 14:25-29; 19:43-44; Figs. 6, 12(d), (e). Thus, as the intrinsic record reflects,
`
`Claim 18 recites no more than a method for receiving a request for and transmitting
`
`
`3 All references to a POSITA refer to the knowledge or understanding of a person of
`
`ordinary skill in the art as of October 25, 1999, unless specifically noted. A POSITA
`
`would have at least a B.S. in E.E., computer science or a telecommunications related
`
`field, and at least three years of industry experience that included client-server
`
`data/information distribution and management architectures. See Ex. 1217 ¶ 28.
`
`3
`
`

`

` Covered Business Method Patent Review
`United States Patent No. 7,942,317
`
`data while receiving and outputting payment data. Independent claims 1, 8, and 16
`
`are nothing but variations on this same simple theme, with the addition, in the chal-
`
`lenged “system” claims, of equally generic components (such as a communication in-
`
`terface, program store, and processor). See, e.g., Ex. 1201 12:29-32 (“The physical em-
`
`bodiment of the system is not critical and a skilled person will understand that the
`
`terminals, data processing systems and the like can all take a variety of forms.”).
`
`As the Board noted in its previous Institution Decision, “the ’317 patent makes
`
`clear that the asserted novelty of the invention is not in any specific improvement of
`
`software or hardware, but in the method of controlling access to data,” CBM2014-00112,
`
`Paper 8, at 11, and the challenged claim is directed to nothing more than the un-
`
`patentable abstract idea of paying for data, with at most the addition of well-known,
`
`routine and conventional features that do not render it patentable—in particular, fea-
`
`tures that, even if assumed to suggest a generic computer implementation, cannot
`
`confer patentability on this patent-ineligible abstraction. See, e.g., Alice, 134 S. Ct. at
`
`2359-60.
`
`Because claim 18 recites unpatentable subject matter, it should be invalidated.
`
`II. OVERVIEW OF FIELD OF THE CLAIMED INVENTION
`By October 25, 1999, electronic sale, distribution, and content protection for
`
`digital products all would have been well-known to a POSITA, and (as Petitioner is
`
`demonstrative in the instituted trial in CBM2014-00112) their combination as claimed
`
`4
`
`

`

` Covered Business Method Patent Review
`United States Patent No. 7,942,317
`
`also would have been well-known or at minimum obvious. See, e.g., Ex. 1217 § V. On
`
`March 12, 1991, for example, U.S. Pat. No. 4,999,806 (“Chernow,” filed Sept. 4, 1987)
`
`issued, disclosing a system and method for sale and distribution of digital products by
`
`phone, and for content protection. See, e.g., Ex. 1204 Abstract (“central station distrib-
`
`utes software by telephone. . . accepts credit card information, transmits an acceptance code . . . After
`
`verifying the credit card information, the station calls the purchaser back and continues with the
`
`transaction only after receiving the acceptance code.”); 1:67-2:9 (describing “means for selling
`
`and distributing protected software using standard telephone lines,” “permit[ting] the purchaser to
`
`rent the protected software for a period of time,” and “to rent the protected software for a specific
`
`number of runs”). Chernow also discloses (1) different types of access, such as purchase
`
`vs. rental and (2) a Control Transfer Program and a Primary Protection Program to
`
`prevent unauthorized copies. See Ex. 1204 Abstract; 2:65-3:23; Ex. 1217 ¶ 33.
`
`In April 1992, U.S. Patent No. 5,103,392 (“Mori,” filed Dec. 5, 1990) issued,
`
`disclosing use-based charging for digital products. See, e.g., id. Ex. 1209 1:64-2:17:
`
`The data processing apparatus includes user-specific credit data storage
`means for storing data identifying the user . . . and indicating credit for payment ca-
`pacity, use time length, or the like of the user . . .. Also included is use deci-
`sion means for determining permission to use the program . . . on the basis of pro-
`gram-specific data supplied from the program storage means or user-specific
`credit data supplied from the user-specific credit data storage means, the
`use decision means delivering either an affirmative or negative signal corresponding
`to results of the decision. Also included is program use history storage means
`
`5
`
`

`

` Covered Business Method Patent Review
`United States Patent No. 7,942,317
`
`
`connected to the use decision means for storing program use history data . . ..
`Mori’s emphasis on assuring permission to access a program and compensating pro-
`
`viders underscores this existing focus in the art on digital rights management
`
`(“DRM”), over eight years before the claimed priority date. See, e,g., Ex. 1217 ¶ 36.
`
`In 1996 and 1997, related U.S. Patent Nos. 5,530,235, issued June 25, 1996, and
`
`5,629,980, issued May 13, 1997, (referred to collectively as “Stefik”) also addressed the
`
`need for DRM in the expanding field of content distribution. Stefik disclosed a net-
`
`work of “repositories,” including portable cards, which interact to distribute content
`
`among users. See, e.g., Ex. 1210 4:21-46. Stefik acknowledged the importance of
`
`providing controls over distributed digital content to prevent piracy and ensure that
`
`content creators are adequately compensated. See, e.g., Ex. 1211 6:65-7:2 (“[Once a
`
`work has been read, computational control over that copy is gone. Metaphorically,
`
`‘the content genie is out of the bottle and no more fees can be billed.” Stefik disclos-
`
`es combating piracy of the read content by tying “usage rights” specifying use and fee
`
`restrictions that remain with the work through the distribution chain. Id. 7:1-5 (“[T]he
`
`present invention never separates the fee descriptions from the work. Thus, the digi-
`
`tal work genie only moves from one trusted bottle (repository) to another, and all uses
`
`of copies are potentially controlled and billable.”); 11:33-34 (“It is fundamental to the
`
`present invention that the usage rights are treated as part of the digital work. As the
`
`digital work is distributed, the scope of the granted usage rights will remain the same
`
`6
`
`

`

` Covered Business Method Patent Review
`United States Patent No. 7,942,317
`
`or may be narrowed.”). Stefik also discloses distribution of payment for purchased
`
`content. See, e.g., 1211 43:53-55 (“If the consumer copies the digital work (usually for
`
`a third party), a fee is collected and automatically paid to the creator.”); 44:2-4 (“In
`
`another scenario, every time a copy of a digital work is sold a fee is paid to the creator
`
`and also to the immediate distributor.”); 44:18-19 (“When a consumer buys a copy
`
`from the distributor, fees are paid both to the distributor and to the creator.”). See also,
`
`e,g., Ex. 1217 ¶¶ 43-49, 82.
`
`Exhibit 1213 (“Poggio”, pub’d Nov. 26, 1997) gives another example of secure
`
`content distribution with content protection, disclosing a “virtual vending machine”
`
`system for sale and distribution of digital products. See, e.g., id. Abstract (“virtual vend-
`
`ing machine manages a comprehensive vending service for the distribution of licensed electronic data
`
`(i.e., products) over a distributed computer system. . . . [and] distributes licenses for the electronic data
`
`for the complete product or for components thereof and for a variety of time frames, including perma-
`
`nent licenses and rental period licenses. [It] provides . . . capability to obtain information regard-
`
`ing the available products and the associated license fees and rental periods, to receive the product
`
`upon receipt of a corresponding electronic payment, and to reload the product during the term of the
`
`license.”). Poggio, too, discloses different types of access, including rentals, and re-
`
`download capabilities for already-purchased content. See, e.g., id.; Ex. 1217 ¶ 37.
`
`Also in 1997, Exhibit 1216 (“von Faber”) published, making the well-known
`
`observation that “[e]lectronic commerce systems dealing with the distribution of digital con-
`
`7
`
`

`

` Covered Business Method Patent Review
`United States Patent No. 7,942,317
`
`tents . . . have to couple the use of the provided digital goods with a prior payment for the goods in a
`
`way which cannot be bypassed.” See id. 7. Von Faber proposed a system where cus-
`
`tomers purchase keys required to utilize encrypted content. See, e.g., id. (“The basic
`
`idea . . . is to distribute the contents in encrypted form, and to have the customer pay for the key
`
`which he needs to transform the encrypted content in an usable form.”); id. 8 (“The Content Pro-
`
`vider provides digital contents in encrypted form being distributed by the Content Distribu-
`
`tor. . . . The Authorisation System permits the distribution of the appropriate key after settling
`
`of the fees payable by the Customer . . .. The role of the Content Distributor is not essential
`
`for the subsequent discussion but, of course, for the business to take place.”); see also id. Fig.
`
`1. Von Faber notes its system could be used for a variety of known distribution and
`
`payment methods. See, e.g., id. 13 (“Different methods can be used to distribute the encrypted
`
`contents (standard techniques). . . . Different electronic payment methods can be integrated . . . .
`
`This flexibility leads to the fact that totally different authorisation methods can be integrated.”).
`
`Von Faber further addressed the known issue of payment distribution to providers.
`
`See, e.g., id. (“The system automatically divides the package price (payments) and guarantees that
`
`the money is transferred to each Content Provider.”); Ex. 1217 ¶¶ 38-40, 81.
`
`Moreover, on June 22, 1999, U.S. Pat. No. 5,915,019 (“Ginter,” filed Jan. 8,
`
`1997) issued, disclosing “systems and methods for secure transaction management
`
`and electronic rights protection.” See, e.g., Ex. 1212 Abstract. Ginter describes a “vir-
`
`tual distribution environment” (“VDE”) to “control and/or meter or otherwise moni-
`
`8
`
`

`

` Covered Business Method Patent Review
`United States Patent No. 7,942,317
`
`tor use of electronically stored or disseminated information.” Id. Ginter’s system
`
`“help[s] to ensure that information is accessed and used only in authorized ways, and
`
`maintain the integrity, availability, and/or confidentiality of the information.” See, e.g.,
`
`id. Further, Ginter’s “techniques may be used to support an all-electronic information dis-
`
`tribution, for example, utilizing the ‘electronic highway.’” Id. Ginter discloses that the vari-
`
`ous entities of the VDE can flexibly take on any VDE roles. See, e.g., id. 255:22-23
`
`(“All participants of VDE 100 have the innate ability to participate in any role.”); 255:23-43.
`
`Ginter thus highlights the known flexibility in such distribution systems. And Ginter
`
`also discloses distribution of payment for purchased content. See id. 255:40-43 (“Roy-
`
`alty payments for the new works may be accessed by the publisher, distributors, or
`
`end-users, and may be tracked and electronically collected at any stage of the chain.”).
`
`See, e.g., Ex. 1217 ¶¶ 41-42, 81.
`
`Storage and utilization of content stored on portable devices, including mobile
`
`communication devices such as cellular phones, was also well-known before Smart-
`
`flash’s claimed October 25, 1999 priority date. As one example, PCT Application
`
`Publication No. WO 99/43136 (“Rydbeck”) published on August 26, 1999. See Ex.
`
`1214. Rydbeck discloses a cellular phone as a user device for storing digital content in
`
`non-volatile memory and accessing that content. See, e.g., id. 5 (“Because of its integra-
`
`tion into the cellular phone, the digital entertainment module can share components
`
`already present in the cellular phone. Such savings would not be available if a CD
`
`9
`
`

`

` Covered Business Method Patent Review
`United States Patent No. 7,942,317
`
`player were simply aggregated with the phone. Further, the use of solid state RAM or
`
`ROM, as opposed to disc storage, eliminates the need for bounce control circuitry.
`
`This enables the disclosed invention to provide cellular communications and enter-
`
`tainment during leisure activities.”). In addition, JP Patent Application Publication
`
`No. H11-164058 (“Sato”), entitled “Portable Music Selection and Viewing System”
`
`and published June 18, 1999, discloses storing media content onto mobile user devic-
`
`es and playing the media content from these mobile devices. Sato further discloses
`
`storing that media content on a removable IC card. See, e.g., Ex. 1215 ¶ 9 (“The port-
`
`able music selection and viewing device 70 provides a removable storage device 76 on a
`
`main body 71. This storage device 76 is a memory card similar to, for example, a mag-
`
`netic card, a magnetic tape, a CD, a DVD, or an IC card. The user, after downloading
`
`the music software to the storage device (medium) 76 of the portable music selection
`
`and viewing device 70 by operating the push buttons or the like on the main body 71,
`
`can enjoy this music software on a display 72 or a receiver 74 of the portable music
`
`selection and viewing device 70, and can also enjoy higher quality music playback by
`
`removing this storage device (medium) and inserting it into another audio unit. Further, the user
`
`can store the music software from another audio unit into the storage device 76 and
`
`enjoy music by inserting this storage unit 76 into this portable music selection and
`
`viewing device 70.”); ¶ 13 (“A music storage device 240 connected to the music con-
`
`trol unit 200 stores the music software. A music storage medium 250 such as . . . a
`
`10
`
`

`

` Covered Business Method Patent Review
`United States Patent No. 7,942,317
`
`memory card such as an IC card stores the music software, and this storage medium 250
`
`can be removed and used on other audio units.”). See, e.g., Ex. 1217 ¶¶ 50-51.
`
`Thus, as these background examples illustrate, the prior art was rife with
`
`awareness and discussion of the same supposed “invention” now memorialized in the
`
`challenged claims. Long before the purported priority date, disclosures abounded of
`
`the very features that Smartflash now seeks to claim as its exclusive property.
`
`III. PETITIONER HAS STANDING
`A.
`Petitioner certifies that the ’317 patent is available for review under 37 C.F.R. §
`
`The ’317 Patent Is a Covered Business Method (“CBM”) Patent
`
`42.304(a). The ’317 patent is a CBM patent under § 18(d)(1) of the Leahy-Smith
`
`America Invents Act, Pub. L. 112-29 (“AIA”) and § 42.301. See also CBM2014-00111,
`
`Paper 8, at 7-12 (finding claim 18 of ’317 Patent satisfies CBM requirement). Alt-
`
`hough in fact numerous claims qualify, a patent with even one claim covering a CBM
`
`is considered a CBM patent. See CBM 2012-00001, Doc. 36 at 26; 77 Fed. Reg. 48,709
`
`(Aug. 14, 2012). Accordingly, Petitioner addresses here exemplary claim 18:
`
`18. A method of providing data to a data requester comprising:
`receiving a request for a data item from the requester;
`receiving payment data from the requester relating to payment for
`
`the requested data;
`transmitting the requested data to the requestor;
`reading payment distribution information from a data store; and
`outputting payment data to a payment system for distributing the
`
`11
`
`

`

` Covered Business Method Patent Review
`United States Patent No. 7,942,317
`
`
`payment for the requested data.
`1.
`Exemplary Claim 18 Is Financial In Nature
`A CBM patent is “a patent that claims a method or corresponding apparatus
`
`for performing data processing or other operations used in the practice, administra-
`
`tion, or management of a financial product or service, except that the term does not
`
`include patents for technological inventions.” AIA § 18(d)(1); 37 C.F.R. § 42.301.
`
`“[T]he definition of covered business method patent was drafted to encompass pa-
`
`tents claiming activities that are financial in nature, incidental to a financial activity or comple-
`
`mentary to a financial activity.’” 77 Fed. Reg. 48,734-35 (Aug. 13, 2012) (citing 157 Cong.
`
`Rec. S5432 (daily ed. Sept. 8, 2011) (stm’t Sen. Schumer)). “[F]inancial product or ser-
`
`vice” is to be interpreted broadly, id., and “financial . . . simply means relating to monetary
`
`matters”—it does not require any link to traditional financial industries such as banks.
`
`See, e.g., CBM2012-00001, Paper 36, at 23.
`
`This Board has previously found, e.g., that a claim for “transferring money elec-
`
`tronically via a telecommunication line to the first party . . . from the second party”
`
`met the financial product or service requirement, concluding that “the electronic transfer
`
`of money is a financial activity, and allowing such a transfer amounts to providing a financial ser-
`
`vice.” CBM2013-00020, Paper 14, at 11-12. See also, e.g., CBM2013-00017, Paper 8, at
`
`5-6 (qualification as CBM patent based on specification’s reference to e-commerce
`
`and fact that a POSITA “would have understood that [one of the claim limitations] may be asso-
`
`ciated with financial services”).
`
`12
`
`

`

` Covered Business Method Patent Review
`United States Patent No. 7,942,317
`
`As discussed above, the ’317 patent relates, at most, to the idea of providing
`
`electronic data in exchange for payment. See AIA § 18(d)(1); 37 C.F.R. § 42.301(a); Ex.
`
`1201 2:12-15. Indeed, in seeking to enforce the ’317 patent in litigation, Smartflash
`
`itself conceded that the alleged invention relates to a financial activity or transaction,
`
`stating that “[t]he patents-in-suit generally cover a portable data carrier for storing da-
`
`ta and managing access to the data via payment information and/or use status rules. The
`
`patents-in-suit also generally cover a computer network . . . that serves data and man-
`
`ages access to data by, for example, validating payment information.” Ex. 1202 ¶ 17.
`
`The ‘317 patent generally describes the invention as follows (Ex. 1201 1:55-63):
`
`According to the present invention there is therefore provided a method
`of providing portable data comprising providing a portable data storage
`device comprising downloaded data storage means and payment vali-
`dation means; providing a terminal for internet access; coupling the
`portable data storage device to the terminal; reading payment infor-
`mation from the payment validation means using the terminal; validat-
`ing the payment information; and downloading data into the portable
`storage device from a data supplier.”
`More specifically, the ’317 patent and claim 18 are directed to a method of
`
`
`
`providing data to a data requester in response to receiving payment data. Figures 12d and
`
`12e describe various steps in this process, including: (a) receiving a request for a data
`
`item (S63), (b) receiving payment data from the requestor (S66), (c) reading content
`
`from the content provider (S73), (d) transmitting the content to the terminal (S73). Ex.
`
`13
`
`

`

` Covered Business Method Patent Review
`United States Patent No. 7,942,317
`
`1201. In addition, Figs. 12d and 12e show that providing data to a data requester may
`
`involve (e) transmitting access rules to the requester (S71), (f) reading payment distribution
`
`data (S68), and (g) distributing payments according to distribution data (S69). Id. The
`
`specification describes that “[p]ayment for the data item or items requested may either be made
`
`directly to the system owner or may be made to an e-payment system.” Id. 20:50-54. “E-payment
`
`systems [] are coupled to banks” and may be provided in accordance with cash compliant
`
`standards such as MONDEX, Proton, and/or Visa. Id. 13:35-46. Thus because claim
`
`18 explicitly describes receiving and responding to payment data, as well as outputting payment
`
`data, it clearly relates to a financial activity and providing a financial service. See
`
`CBM2013-00020, Institution Decision at 9-10 (“the electronic transfer of money is a
`
`financial activity, and allowing such a transfer amounts to providing a financial ser-
`
`vice.”); CBM2014-00112, Paper 7, at 10 (finding claim 18 of the ’317 Patent satisfies
`
`the “financial-in-nature” requirement). See also AIA § 18(d)(1); 37 C.F.R. § 42.301(a).
`
`See also 77 Fed. Reg. at 48,735.
`
`2.
`Further, claim 18 does not cover a “technological invention” within the excep-
`
`Claim 18 Does Not Cover A Technological Invention
`
`tion in AIA § 18(d)(1), because it does not claim “subject matter as a whole [that] re-
`
`cites a technological feature that is novel and unobvious over the prior art[] and solves a
`
`technical problem using a technical solution.” § 42.301(b). To the contrary, the specifica-
`
`tion makes clear that, to the extent any hardware is argued to be required to begin
`
`14
`
`

`

` Covered Business Method Patent Review
`United States Patent No. 7,942,317
`
`with, claim 18 does not require any specific hardware at all. The “data requester” is not any
`
`particular hardware according to the patent, and may even be an individual who re-
`
`quests data. The claimed “data store” and “payment systems” were commonplace
`
`and could be implemented using, e.g., well-known industry standards.
`
`(a) Claim 18 Does Not Recite A Technological Feature
`That Is Novel and Unobvious
`
`First, no “technological feature” of claim 18 is novel and unobvious. The
`
`PTAB has confirmed that “[m]ere recitation of known technologies, such as comput-
`
`er hardware, communication or computer networks, software, memory, computer-
`
`readable storage medium, scanners, display devices or databases, or specialized ma-
`
`chines, such as an ATM or point of sale device,” or “[r]eciting the use of known prior
`
`art technology to accomplish a process or method, even if that process or method is
`
`novel and non-obvious” will “not typically render a patent a technological invention.”
`
`See, e.g., 77 Fed. Reg. 48,764 (Aug. 14, 2012).
`
`As its language makes clear, claim 18 requires no particularized hardware: in-
`
`stead, it simply describes, at most, the idea of providing electronic data in exchange
`
`for payment. The claim involves no “technology” at all other than, at most, the use of a
`
`data store and payment system. Ex. 1201. The “data requestor” of claim 8 is not de-
`
`scribed as hardware, let alone any particular type of hardware. The data requester is
`
`simply described as an entity that may make a data request and to which data is pro-
`
`vided. Ex. 1201 6:38-40; 7:52-53; 9:62; 10:16, 25, 36, 44; 12:29-32. The patent also
`
`15
`
`

`

` Covered Business Method Patent Review
`United States Patent No. 7,942,317
`
`confirms that the “data store” is not any particularized hardware, but rather can be
`
`generic memory. See id. 14:25-29; Fig 6 (136 (payment record data store)); 14:43-44.
`
`See also, e.g., Ex. 1201 12:29-32 (“The physical embodiment of the system is not critical
`
`and a skilled person will understand that the terminals, data processing systems and
`
`the like can all take a variety of forms.”). Further, receiving, reading, and outputting
`
`payment data was known because e-payment systems were known, as were payment
`
`systems. See Ex. 1201 3:35-47. The patent explains that “[e

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket