throbber
Trials@uspto.gov
`Tel: 571-272-7822
`
`Paper 11
`Entered: May 28, 2015
`
`
`
`
`
`UNITED STATES PATENT AND TRADEMARK OFFICE
`
`BEFORE THE PATENT TRIAL AND APPEAL BOARD
`
`APPLE INC.,
`Petitioner,
`
`v.
`
`SMARTFLASH LLC,
`Patent Owner.
`
`Case CBM2015-00028
`Patent 7,334,720 B2
`
`
`
`
`
`
`
`
`
`Before JENNIFER S. BISK, RAMA G. ELLURU,
`MATTHEW R. CLEMENTS, and GREGG I. ANDERSON,
`Administrative Patent Judges.
`
`ELLURU, Administrative Patent Judge.
`
`DECISION
`Institution of Covered Business Method Patent Review
`37 C.F.R. § 42.208
`
`
`
`
`
`

`
`CBM2015-00028
`Patent 7,334,720 B2
`
`A. Background
`
`INTRODUCTION
`
`Apple Inc. filed a Corrected Petition requesting covered business
`
`method patent review of claims 1 and 2 (the “challenged claims”) of U.S.
`
`Patent No. 7,334,720 B2 (Ex. 1201, “the ’720 patent”) pursuant to § 18 of
`
`the Leahy-Smith America Invents Act (“AIA”).1 Paper 5 (“Pet.”).
`
`Smartflash LLC filed a Preliminary Response (Paper 8, “Prelim. Resp.”).
`
`We have jurisdiction under 35 U.S.C. § 324, which provides that a
`
`covered business method patent review may not be instituted “unless . . . it is
`
`more likely than not that at least 1 of the claims challenged in the petition is
`
`unpatentable.”
`
`Upon consideration of the Petition and Preliminary Response, we
`
`determine that Apple has demonstrated that it is more likely than not that the
`
`challenged claims are unpatentable. Accordingly, we institute a covered
`
`business method review of claims 1 and 2 of the ’720 patent.
`
`B. Asserted Grounds
`
`Apple argues that the challenged claims are unpatentable based on the
`
`following grounds (Pet. 19):
`
`Basis Claims Challenged
`§ 101 1 and 2
`§ 103 1
`§ 103 1
`§ 103 1
`
`References
`Not Applicable
`Stefik2 and Ahmad3
`Stefik, Ahmad, and Kopp4
`Stefik, Ahmad, and Maari5
`
`1 Pub. L. No. 112-29, 125 Stat. 284, 296–07 (2011).
`2 U.S. Patent No. 5,530,235 (Ex. 1212) (“Stefik ’235”), and U.S. Patent No.
`5,629,980 (Ex. 1213) (“Stefik ’980”) (collectively, “Stefik”).
`3 U.S. Patent No. 5,925,127 (Ex. 1203) (“Ahmad”).
`4 U.S. Patent No. 5,940,805 (Ex. 1204) (“Kopp”).
`
`2
`
`

`
`CBM2015-00028
`Patent 7,334,720 B2
`
`Stefik, Ahmad, Kopp, and Maari § 103 1
`
`Apple also provides a declaration from Anthony J. Wechselberger.
`
`Ex. 1219.
`
`C. Related Matters
`
`The parties indicate that the ’720 patent is the subject of the following
`
`district court cases: Smartflash LLC v. Apple Inc., Case No. 6:13-cv-447
`
`(E.D. Tex.); Smartflash LLC v. Samsung Electronics Co., Case No. 6:13-cv-
`
`448 (E.D. Tex.). Pet. 18; Paper 6, 3. Smartflash also indicates that the ’720
`
`patent is the subject of a third district court case: Smartflash LLC v. Google,
`
`Inc., Case No. 6:14-cv-435 (E.D. Tex.). Paper 6, 3.
`
`Apple previously filed two Petitions for covered business method
`
`patent review of the ’720 Patent: CBM2014-00104 and CBM2014-00105.
`
`A covered business method patent review was denied in both cases. Apple
`
`Inc. v. Smartflash LLC, Case CBM2014-00104, slip op. at 20 (PTAB Sept.
`
`30, 2014) (Paper 9); Apple Inc. v. Smartflash LLC, Case CBM2014-00105,
`
`slip op. at 21 (PTAB Sept. 30, 2014) (Paper 9). Several related patents,
`
`which claim priority back to a common series of applications are currently
`
`the subject of CBM2014-00102, CBM2014-00106, CBM2014-00108,
`
`CBM2014-00112, CBM2015-00015, CBM2015-00016, CBM2015-00017,
`
`and CBM2015-00018, filed by Apple. The ’720 patent also is the subject of
`
`CBM2014-00190, filed by another Petitioner.
`
`Apple filed a concurrent Petition for covered business method patent
`
`review of the ’720 patent: CBM2015-00029. In addition, Apple
`
`concurrently filed three other Petitions for covered business patent review
`
`
`5 JP Patent Application Publication No. H10-269289 (including translation),
`published October 9, 1998 (Ex. 1228) (“Maari”).
`
`3
`
`

`
`CBM2015-00028
`Patent 7,334,720 B2
`
`challenging claims of othr patents owned by Smartflash, which disclose
`
`similar subject matter: CBM2015-00031, CBM2015-00032, and CBM2015-
`
`00033.
`
`D. The ’720 Patent
`
`The ’720 patent relates to “a portable data carrier for storing and
`
`paying for data and to computer systems for providing access to data to be
`
`stored” and the “corresponding methods and computer programs.”
`
`Ex. 1001, 1:6–10. Owners of proprietary data, especially audio recordings,
`
`have an urgent need to address the prevalence of “data pirates,” who make
`
`proprietary data available over the Internet without authorization. Id. at
`
`1:15–41. The ’720 patent describes providing portable data storage together
`
`with a means for conditioning access to that data upon validated payment.
`
`Id. at 1:46–62. According to the ’720 patent, this combination of the
`
`payment validation means with the data storage means allows data owners to
`
`make their data available over the Internet without fear of data pirates. Id. at
`
`1:62–2:3.
`
`As described, the portable data storage device is connected to a
`
`terminal for Internet access. Id. at 1:46–55. The terminal reads payment
`
`information, validates that information, and downloads data into the portable
`
`storage device from a data supplier. Id. The data on the portable storage
`
`device can be retrieved and output from a mobile device. Id. at 1:56–59.
`
`The ’720 patent makes clear that the actual implementation of these
`
`components is not critical, and the alleged invention may be implemented in
`
`many ways. See, e.g., id. at 26:13–16 (“The skilled person will understand
`
`that many variants to the system are possible and the invention is not limited
`
`to the described embodiments.”).
`
`4
`
`

`
`CBM2015-00028
`Patent 7,334,720 B2
`
`E. Illustrative Claim
`
`As noted above, Apple challenges claims 1 and 2. Claim 1 is
`
`independent and claim 2 depends from claim 1. Claim 1 is illustrative of the
`
`claimed subject matter and is reproduced below:
`
`1. A method of controlling access to content data on a
`data carrier, the data carrier comprising non-
`volatile data memory storing content memory and
`non-volatile parameter memory storing use status
`data and use rules, the method comprising:
`
`receiving a data access request from a user for at least one
`content item of the content data stored in the non-volatile data
`memory;
`
`reading the use status data and use rules from the parameter
`memory that pertain to use of the at least one requested content
`item;
`
`evaluating the use status data using the use rules to determine
`whether access to the at least one requested content item stored
`in the content memory is permitted; and
`
`displaying to the user whether access is permitted for each of
`the at least one requested content item stored in the non-volatile
`data memory.
`
`Id. at 26:17–36.
`
`A. Claim Construction
`
`ANALYSIS
`
`While Apple presents constructions for several claim terms, no terms
`
`require express construction for purposes of this Decision.
`
`B. Covered Business Method Patent
`
`Section 18 of the AIA provides for the creation of a transitional
`
`program for reviewing covered business method patents. A “covered
`
`business method patent” is a patent that “claims a method or corresponding
`
`apparatus for performing data processing or other operations used in the
`
`5
`
`

`
`CBM2015-00028
`Patent 7,334,720 B2
`
`practice, administration, or management of a financial product or service,
`
`except that the term does not include patents for technological inventions.”
`
`AIA § 18(d)(1); see 37 C.F.R. § 42.301(a). A patent need have only one
`
`claim directed to a covered business method to be eligible for review. See
`
`Transitional Program for Covered Business Method Patents—Definitions of
`
`Covered Business Method Patent and Technological Invention; Final Rule,
`
`77 Fed. Reg. 48,734, 48,736 (Aug. 14, 2012) (“CBM Rules”) (Comment 8).
`
`1. Financial Product or Service
`
`Apple asserts that claim 2 “explicitly describes storing payment data
`
`as well as restricting access to content based on payment, and therefore
`
`clearly relates to a financial activity and providing a financial service.” Pet.
`
`12. Based on this record, we agree with Apple that the subject matter recited
`
`by claim 2 is directed to activities that are financial in nature, namely
`
`“wherein said parameter memory further stores payment data and further
`
`comprising selecting one of said use rules dependent upon said payment
`
`data,” which is recited in the claim. We are persuaded that storing payment
`
`data and restricting access to content based on such payment data is a
`
`financial activity, and conditioning data access based on the payment data
`
`amounts to a financial service. This is consistent with the Specification of
`
`the ’720 patent, which confirms claim 2’s connection to financial activities
`
`by stating that the invention “relates to a portable data carrier for storing and
`
`paying for data.” Ex. 1201, 1:6–7. The Specification also states repeatedly
`
`that the disclosed invention involves managing access to data based on
`
`payment validation. See, e.g., Ex. 1201, 1:46–49, 2:4–19, 3:19–27, 3:50–54,
`
`7:62–8:9, 8:21–35.
`
`6
`
`

`
`CBM2015-00028
`Patent 7,334,720 B2
`
` Smartflash disagrees that claim 2 satisfies the financial in nature
`
`requirement of AIA § 18(d)(1), arguing that that section should be
`
`interpreted narrowly to cover only technology used specifically in the
`
`financial or banking industry. Prelim. Resp. 5–10. Smartflash cites to
`
`various portions of the legislative history as support for its proposed
`
`interpretation. Id.
`
`Although we agree with Smartflash that the statutory language
`
`controls whether a patent is eligible for a covered business method patent
`
`review, we do not agree that the phrase “financial product or service” is as
`
`limited as Smartflash proposes. The AIA does not include as a prerequisite
`
`for covered business method patent review, a “nexus” to a “financial
`
`business,” but rather a “method or corresponding apparatus for performing
`
`data processing or other operations used in the practice, administration, or
`
`management of a financial product or service.” AIA § 18(d)(1). Further,
`
`contrary to Smartflash’s view of the legislative history, the legislative
`
`history indicates that the phrase “financial product or service” is not limited
`
`to the products or services of the “financial services industry” and is to be
`
`interpreted broadly. CBM Rules, 77 Fed. Reg. at 48,735–36. For example,
`
`the “legislative history explains that the definition of covered business
`
`method patent was drafted to encompass patents ‘claiming activities that are
`
`financial in nature, incidental to a financial activity or complementary to a
`
`financial activity.’” Id. (citing 157 Cong. Rec. S5432 (daily ed. Sept. 8,
`
`2011) (statement of Sen. Schumer)).
`
`In addition, Smartflash asserts that claim 2 is not directed to an
`
`apparatus or method that is financial in nature because claim 1 “omits the
`
`specifics of how payment is made.” Prelim. Resp. 10. We are not
`
`7
`
`

`
`CBM2015-00028
`Patent 7,334,720 B2
`
`persuaded by this argument because § 18(d)(1) of the AIA does not include
`
`such a requirement, nor does Smartflash point to any other authority that
`
`imposes such a requirement. Id. We determine that because claim 2 recites
`
`storing payment data and restricting access content based on such payment
`
`data, as Smartflash acknowledges (id.), the financial in nature requirement of
`
`§ 18(d)(1) is satisfied.
`
`For the reasons stated above, and based on the particular facts of this
`
`proceeding, we conclude that the ’720 patent includes at least one claim that
`
`meets the financial in nature requirement of § 18(d)(1) of the AIA.
`
`2. Exclusion for Technological Inventions
`
`Apple asserts that claim 2 does not fall within § 18(d)(1)’s exclusion
`
`for “technological inventions.” Pet. 13–17. In particular, Apple argues that
`
`claim 1 “does not claim ‘subject matter as a whole [that] recites a
`
`technological feature that is novel and unobvious over the prior art[] and
`
`solves a technical problem using a technical solution.’” Pet. 13 (quoting 37
`
`C.F.R. § 42.301(b)) (emphases in original). Smartflash disagrees and argues
`
`that claim 2, as a whole, recites at least one technological feature that is
`
`novel and unobvious over the prior art. Prelim. Resp. 11.
`
`We are persuaded that claim 2 as a whole does not recite a
`
`technological feature that is novel and unobvious over the prior art. For
`
`example, claim 1, from which claim 2 depends, recites only features such as
`
`“nonvolatile data memory,” “parameter memory,” and “content memory.”
`
`Dependent claim 2 adds only that “said parameter memory further stores
`
`payment data.” The Specification does not indicate, nor does Smartflash
`
`provide any support, that these features are not novel and nonobvious.
`
`Furthermore, even assuming claim 2 requires a “data carrier,” the
`
`8
`
`

`
`CBM2015-00028
`Patent 7,334,720 B2
`
`Specification discloses, for instance, that a portable data carrier may be a
`
`“standard smart card.” See Ex. 1201, 11:36–39.
`
`In addition, the ’720 patent makes clear that the asserted novelty of
`
`the invention is not in any specific improvement of software or hardware,
`
`but in the method of controlling access to data. For example, the ’720 patent
`
`states that “there is an urgent need to find a way to address the problem of
`
`data piracy,” (id. at 1:40–41) while acknowledging that the “physical
`
`embodiment of the system is not critical and a skilled person will understand
`
`that the terminals, data processing systems and the like can all take a variety
`
`of forms” (id. at 12:38–41). Thus, we determine that claim 2 is merely the
`
`recitation of a combination of known technologies, which indicates that it is
`
`not a patent for a technological invention. See Office Patent Trial Practice
`
`Guide, 77 Fed. Reg. 48, 756 48,764 (Aug. 14, 2012).
`
`Smartflash also argues that claim 2 falls within § 18(d)(1)’s exclusion
`
`for “technological invention” because it is directed to solving the
`
`technological problem of “controlling access, according to access rules, to
`
`data (retrieved from a data supplier) stored on the data carrier” with the
`
`technological solution of “(1) reading use status data and use rules from
`
`parameter memory that pertain to use of a requested content item
`
`(2) evaluating the use status data using the use rules to determine whether
`
`access to the requested content item stored in the content memory is
`
`permitted.” Prelim. Resp. 11–12. We are not persuaded by this argument
`
`because, as Apple argues, the problem being solved by claim 2 is a business
`
`problem—data piracy. Pet. 16–17. For example, the Specification states
`
`that “[b]inding the data access and payment together allows the legitimate
`
`owners of the data to make the data available themselves over the internet
`
`9
`
`

`
`CBM2015-00028
`Patent 7,334,720 B2
`
`without fear of loss of revenue, thus undermining the position of data
`
`pirates.” Ex. 1201, 1:66–2:3. Therefore, based on the particular facts of this
`
`proceeding, we conclude that claim 2 does not recite a technological
`
`invention and is eligible for a covered business method patent review.
`
`3. Conclusion
`
`In view of the foregoing, we conclude that the ’720 patent is a covered
`
`business method patent under AIA § 18(d)(1) and is eligible for review
`
`using the transitional covered business method patent review program.
`
`C. 35 U.S.C. § 101
`
`Apple challenges claims 1 and 2 as being directed to patent-ineligible
`
`subject matter under 35 U.S.C. § 101. Pet. 24–36. Smartflash does not
`
`address the merits of this challenge. See Prelim. Resp. 19. Analyzing the
`
`challenged claims using the two-step process applied recently in Alice Corp.
`
`Pty, Ltd. v. CLS Bank Int’l, 134 S.Ct. 2347 (2014), Apple asserts that all the
`
`challenged claims are directed to an abstract idea without additional
`
`elements that transform the claims into a patent-eligible application of that
`
`idea. Pet. 25–38. Specifically, Apple argues that the challenged claims are
`
`directed to the abstract idea of “controlling access to content, including
`
`based on payment data.” Id. at 25.
`
`We agree with Apple that, on this record, the challenged claims of the
`
`’720 patent are more likely than not directed to patent-ineligible subject
`
`matter. Under 35 U.S.C. § 101, we must first identify whether an invention
`
`fits within one of the four statutorily provided categories of patent-
`
`eligibility: “processes, machines, manufactures, and compositions of
`
`matter.” Ultramercial, Inc. v. Hulu, LLC, 772 F.3d 709, 713–14 (Fed. Cir.
`
`2014). Here, each of the challenged claims recites a “process,” i.e., a
`
`10
`
`

`
`CBM2015-00028
`Patent 7,334,720 B2
`
`“method of controlling access to content data on a data carrier,” under § 101.
`
`Section 101, however, “contains an important implicit exception [to subject
`
`matter eligibility]: Laws of nature, natural phenomena, and abstract ideas
`
`are not patentable.” Alice, 134 S.Ct. at 2354 (2014) (citing Assoc. for
`
`Molecular Pathology v. Myriad Genetics, Inc., 133 S.Ct. 2107, 2116 (2013)
`
`(internal quotation marks and brackets omitted)).
`
`We are persuaded that the challenged claims are more likely than not
`
`drawn to a patent-ineligible abstract idea. In Alice, the Supreme Court
`
`reiterated the framework set forth previously in Mayo Collaborative Servs.
`
`v. Prometheus Labs., 132 S.Ct. 1289, 1293 (2012) “for distinguishing
`
`patents that claim laws of nature, natural phenomena, and abstract ideas
`
`from those that claim patent-eligible applications of these concepts.” Alice,
`
`134 S.Ct. at 2355. The first step in the analysis is to “determine whether the
`
`claims at issue are directed to one of those patent-ineligible concepts.” Id.
`
`If so, the second step in the analysis is to consider the elements of the claims
`
`“individually and ‘as an ordered combination’” to determine whether there
`
`are additional elements that “‘transform the nature of the claim’ into a
`
`patent-eligible application.” Id. (quoting Mayo, 132 S.Ct. at 1291, 1297). In
`
`other words, the second step is to “search for an ‘inventive concept’—i.e., an
`
`element or combination of elements that is ‘sufficient to ensure that the
`
`patent in practice amounts to significantly more than a patent upon the
`
`[ineligible concept] itself.’” Id. (brackets in original) (quoting Mayo, 132 S.
`
`Ct. at 1294).
`
`Apple contends that each challenged claim is drawn to the concept of
`
`controlling access based on payment, a “well known ‘building block of the
`
`modern economy’ and a longstanding ‘method of organizing human activity’
`
`11
`
`

`
`CBM2015-00028
`Patent 7,334,720 B2
`
`long pre-dating the ’720 Patent.” Pet. 29. As discussed above, the ’720
`
`patent discusses addressing recording industry concerns of data pirates
`
`offering unauthorized access to widely available compressed audio
`
`recordings. Ex. 1001, 1:26–41. The ’720 patent proposes to solve this
`
`problem by restricting access to data on a portable data carrier based upon
`
`payment validation. Id. at 1:46–1:59. The ’720 patent makes clear that the
`
`heart of the claimed subject matter is restricting access to stored data based
`
`on supplier-defined access rules and validation of payment. Id. at 1:60–2:3.
`
`We are persuaded, on this record, that the challenged claims are directed to
`
`an abstract idea. See Alice, 134 S. Ct. at 2356 (holding that the concept of
`
`intermediated settlement at issue in Alice was an abstract idea); Accenture
`
`Global Servs., GmbH v. Guidewire Software, Inc., 728 F.3d 1336, 1344
`
`(Fed. Cir. 2013) (holding the abstract idea at the heart of a system claim to
`
`be “generating tasks [based on] rules . . . to be completed upon the
`
`occurrence of an event” (brackets in original) (citation omitted)).
`
`Turning to the second step of the analysis, we look for additional
`
`elements that can “transform the nature of the claim” into a patent-eligible
`
`application of an abstract idea. Mayo, 132 S.Ct. at 1297. On this record, we
`
`are not persuaded that the challenged claims of the ’720 patent add an
`
`inventive concept sufficient to ensure that the patent in practice amounts to
`
`significantly more than a patent on the abstract idea itself. Alice, 134 S. Ct.
`
`at 2355; see also Accenture Global Servs., 728 F.3d at 1345 (holding claims
`
`directed to the abstract idea of “generating tasks [based on] rules . . . to be
`
`completed upon the occurrence of an event” to be unpatentable even when
`
`applied in a computer environment and within the insurance industry).
`
`12
`
`

`
`CBM2015-00028
`Patent 7,334,720 B2
`
`Apple contends that the “challenged claims simply instruct that the
`
`abstract ideas of payment for controlling access to data should be
`
`implemented in software and refer only to generic computer functions.” Pet.
`
`31. On this record, we are not persuaded that the recited limitations of the
`
`challenged claims, which include, for example, “receiving,” “reading,”
`
`“evaluating,” “displaying,” “nonvolatile data memory,” “parameter
`
`memory,” “content memory,” and “said parameter memory further stores
`
`payment data,” perform functions that are anything other than “purely
`
`conventional.” See Alice, 134 S.Ct. at 2359. Thus, on this record, we are
`
`not persuaded that any of the allegedly technical limitations viewed “both
`
`individually and ‘as an ordered combination,’” transform the nature of the
`
`claims into patent-eligible subject matter. See Alice, 134 S.Ct. at 2355
`
`(quoting Mayo, 132 S.Ct. at 1297, 1298).
`
`Having considered the information provided in the Petition and the
`
`Preliminary Response, we are persuaded that Apple has demonstrated that it
`
`is more likely than not that challenged claims 1 and 2 are unpatentable under
`
`35 U.S.C. § 101.
`
`Smartflash argues that Apple’s assertion of this ground is untimely
`
`because Apple “provides no valid reason why it did not raise this purely
`
`legal issue as grounds for invalidity in its two prior petitions filed long
`
`before [the instant Corrected Petition].” Prelim. Resp. 15–16. According to
`
`Smartflash,
`
`[A]llowing Apple to raise a new ground of invalidity that it
`could have and should have raised in its March 31, 2014
`petitions encourages Apple’s piecemeal invalidity challenges to
`Patent Owner’s patent claims and runs afoul of the [Board’s]
`charge to ‘secure the just, speedy, and inexpensive resolution’
`
`13
`
`

`
`CBM2015-00028
`Patent 7,334,720 B2
`
`of Apple’s covered business method challenges to the ‘720
`Patent.
`
`Id. at 16. Smartflash, however, cites no statutory or regulatory authority
`
`precluding Apple from asserting this ground. Moreover, Smartflash
`
`acknowledges that the Supreme Court’s June 19, 2014 decision in Alice was
`
`decided after Apple’s original petitions were filed in March 2014. Id. at 15–
`
`16. Thus, on this record, we are not persuaded that Apple’s assertion of a
`
`new ground based on 35 U.S.C. § 101 is untimely.
`
`Conclusion
`
`On this record, Apple has established that it is more likely than not
`
`that claims 1 and 2 of the ’720 patent are unpatentable under 35 U.S.C.
`
`§ 101.
`
`D. Obviousness Challenges
`
`Apple argues that claim 1 is unpatentable under 35 U.S.C. § 103(a) as
`
`obvious over: Stefik and Ahmad; Stefik, Ahmad, and Kopp; Stefik, Ahmad,
`
`and Maari; and Stefik, Ahmad, Kopp, and Maari. Pet. 19.
`
`A patent claim is unpatentable, under 35 U.S.C. § 103(a), if the
`
`differences between the claimed subject matter and the prior art are such that
`
`the subject matter, as a whole, would have been obvious at the time the
`
`invention was made to a person having ordinary skill in the art to which said
`
`subject matter pertains. KSR Int’l Co. v. Teleflex Inc., 550 U.S. 398, 406
`
`(2007). The question of obviousness is resolved on the basis of underlying
`
`factual determinations, including: (1) the scope and content of the prior art,
`
`(2) any differences between the claimed subject matter and the prior art,
`
`(3) the level of skill in the art, and (4) where in evidence, so-called
`
`secondary considerations. Graham v. John Deere Co., 383 U.S. 1, 17–18
`
`(1966).
`
`14
`
`

`
`CBM2015-00028
`Patent 7,334,720 B2
`
`After carefully considering the Petition and Preliminary Response, we
`
`determine that Apple has not shown that it is more likely than not that it
`
`would prevail in showing that claims 1 and 2 are unpatentable as obvious
`
`over any of the proposed obviousness combinations identified above. An
`
`obviousness inquiry is based on factual inquiries including the difference
`
`between the claimed invention and the prior art. Graham, 383 U.S. at 17–
`
`18. For each of the challenged claims, Apple has not identified sufficiently
`
`the differences between the claimed invention and each reference, or how
`
`the teachings of the references are to be combined, if at all. Pet. 49–75.
`
`Apple also has not shown that any of the individual references anticipate the
`
`challenged claims. Thus, it is unclear how Apple proposes that we do a
`
`proper Graham analysis to determine that the challenged claims are
`
`unpatentable.
`
`We cannot ascertain from the Petition, including the claim charts and
`
`the numerous attending footnotes, which disclosure of which prior art
`
`reference Apple is referring to as teaching or suggesting each limitation and
`
`why such disclosure satisfies the limitation. With respect to independent
`
`claim 1, for example, Apple cites Stefik for each claim limitation. Id. at 50–
`
`75. At the same time, Apple cites Ahmad, Kopp, and/or Maari for a
`
`majority of the limitations of claim 1. Id. With respect to the recited “use
`
`status data,” “use rules,” and “evaluating the use status data using the use
`
`rules” in claim 1, for example, Apple cites a number of portions of Stefik in
`
`the Petition’s claim chart, as well as portions of Ahmad and Kopp. See id. at
`
`61–70. Apple does not allege directly that Stefik alone teaches or renders
`
`obvious each limitation, yet, as noted above, Apple cites Stefik for each
`
`claim limitation. At the same time, Apple proposes combining a number of
`
`15
`
`

`
`CBM2015-00028
`Patent 7,334,720 B2
`
`features from Ahmad and/or Kopp with the teachings of Stefik. Id. at 42–
`
`46, 64 n.47, 65 n.49.
`
`Moreover, in the “Motivation to Combine Stefik with Ahmad” section
`
`(id. at 42–44), Apple alleges that both Stefik and Ahmad “aim to enforce
`
`usage restrictions tied to content in order to prevent unauthorized access”
`
`and “[t]he teachings of Stefik and Ahmad render obvious various limitations
`
`of challenged claim 1, including ‘use status data,’ ‘use rules,’ and
`
`‘evaluating the use status data using the use rules to determine whether
`
`access . . . is permitted.’” Pet. 44. Apple notes that “the data usage
`
`controlling system taught by the combination of Stefik and Ahmad” teaches
`
`these limitations. Id. Similarly, in the “Motivation to Combine Stefik with
`
`Ahmad and Kopp” section (id. at 44–46), Apple indicates that “[t]he
`
`teachings of Stefik, Ahmad, and Kopp render obvious various limitations of
`
`challenged claim 1, including ‘use status data,’ ‘use rules,” and ‘evaluating
`
`the use status data using the use rules to determine whether access is
`
`permitted’” (id. at 46). Apple notes that “the data usage controlling system
`
`taught by the combination of Stefik and Ahmad in view of Kopp” teaches
`
`these limitations. Id.
`
`Apple’s analysis prevents us from determining what specific teaching
`
`is lacking in Stefik, for example (i.e., the differences between the claimed
`
`subject matter and Stefik). See Graham, 383 U.S. at 17–18. Apple’s claim
`
`charts, nor the numerous footnotes referenced therein, make clear the
`
`differences between the claimed subject matter and cited references. For
`
`example, with respect to “use status data” and “use rules,” the claim chart
`
`for claim 1 identifies various “usage rights” in Stefik (id. at 54–55, 61–62),
`
`and Apple contends that “[t]hese rules . . . disclosed in Stefik include some
`
`16
`
`

`
`CBM2015-00028
`Patent 7,334,720 B2
`
`of the same examples of content rules disclosed in the ’720 patent.” Id. at
`
`55, n.29. The claim chart, however, also alleges that Ahmad discloses a
`
`“software monitor and check-in/check-out modules” that store “use rules.”
`
`Id. at 58, n.34. Apple further contends that it would have been obvious “to
`
`implement Stefik’s repository configuration using Ahmad’s advantageous
`
`teachings of time-limiting rental restrictions.” Id. at 57, n.33. Similarly,
`
`Apple contends that “Kopp also expressly discloses storing use rules” (id. at
`
`59, n.36) and that it would have been obvious “to implement the content
`
`access control system taught by Stefik and Ahmad using Kopp’s
`
`advantageous teachings of utilization limitations.” Id. at 59–60, n.38.
`
`Nowhere does Apple explain any differences between the claimed
`
`invention and Stefik. As a result, it is not clear, for example, whether Apple
`
`is alleging that certain claim limitations are taught by Stefik, rendered
`
`obvious by Stefik, taught by Ahmad, Kopp, and/or Maari, or rendered
`
`obvious in view of Stefik, Ahmad, Kopp, and/or Maari. Given this
`
`ambiguity in the Petition, we cannot ascertain which reference to rely on for
`
`any given limitation or why a person of ordinary skill in the art would have
`
`found it obvious to combine that particular disclosed subject matter with the
`
`subject matter disclosed by the other references.
`
`We are, thus, not persuaded that Apple has shown that it is more
`
`likely than not that claim 1 would have been obvious over the combination
`
`of Stefik and Ahmad, the combination of Stefik, Ahmad, and Kopp, the
`
`combination of Stefik, Ahmad, and Maari, or the combination of Stefik,
`
`Ahmad, Kopp, and Maari.
`
`17
`
`

`
`CBM2015-00028
`Patent 7,334,720 B2
`
`Conclusion
`
`On this record, Apple has not established that it is more likely than not
`
`that claim 1 is unpatentable as obvious over: Stefik and Ahmad; Stefik,
`
`Ahmad, and Kopp; Stefik, Ahmad, and Maari; or Stefik, Ahmad, Kopp, and
`
`Maari. For the same reasons, we are not persuaded that Apple has shown
`
`more likely than not that dependent claim 2 would have been obvious over:
`
`Stefik and Ahmad; Stefik, Ahmad, and Kopp; Stefik, Ahmad, and Maari; or
`
`Stefik, Ahmad, Kopp, and Maari.
`
`CONCLUSION
`
`For the foregoing reasons, we determine that the information
`
`presented in the Petition establishes that it is more likely than not that Apple
`
`would prevail in establishing the unpatentability of claims 1 and 2 of the
`
`’720 patent.
`
`The Board has not made a final determination on the patentability of
`
`any challenged claims.
`
`For the reasons given, it is:
`
`ORDER
`
`ORDERED that a covered business method patent review is instituted
`
`as to claims 1 and 2 under 35 U.S.C. § 101 as being directed to patent-
`
`ineligible subject matter under;
`
`FURTHER ORDERED that no other ground raised in the Petition is
`
`authorized for covered business method patent review; and
`
`FURTHER ORDERED that, pursuant to 35 U.S.C. § 324(d) and
`
`37 C.F.R. § 42.4, notice is hereby given of the institution of a trial on the
`
`grounds of unpatentability authorized above, the trial commencing on the
`
`entry date of this Decision.
`
`18
`
`

`
`CBM2015-00028
`Patent 7,334,720 B2
`
`PETITIONER:
`
`J. Steven Baughman
`Ching-Lee Fukuda
`ROPES & GRAY LLP
`steven.baughman@ropesgray.com
`ching-lee.fukuda@ropesgray.com
`
`
`PATENT OWNER:
`
`Michael R. Casey
`J. Scott Davidson
`DAVIDSON BERQUIST JACKSON & GOWDEY LLP
`mcasey@dbjg.com
`jsd@dbjg.com
`
`19

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket