throbber
Covered Business Method Patent Review
`United States Patent No. 7,334,720
`
`IN THE UNITED STATES PATENT AND TRADEMARK OFFICE
`
`Petitioner: Apple Inc.
`
`Attorney Docket No.:
`
` 104677-5008-817
`Customer No. 28120
`

`Inventor: Hulst et al.
`United States Patent No.: 7,334,720 §
`Formerly Application No.: 11/336,758 §
`Issue Date: February 26, 2008

`Filing Date: January 19, 2006

`Former Group Art Unit: 2876

`Former Examiner: Steven S. Paik

`
`For: Data Storage and Access Systems
`
`MAIL STOP PATENT BOARD
`Patent Trial and Appeal Board
`United States Patent and Trademark Office
`Post Office Box 1450
`Alexandria, Virginia 22313-1450
`
`PETITION FOR COVERED BUSINESS METHOD PATENT REVIEW OF
`UNITED STATES PATENT NO. 7,334,720 PURSUANT TO 35 U.S.C.
`§ 321, 37 C.F.R. § 42.304
`
`
`
`

`
`
`
` Covered Business Method Patent Review
`United States Patent No. 7,334,720
`
`
`TABLE OF CONTENTS
`
`INTRODUCTION ....................................................................................................... 1
`I.
`II. OVERVIEW OF FIELD OF THE CLAIMED INVENTION ......................... 6
`III. PETITIONER HAS STANDING ............................................................................ 9
`A.
`The ’720 Patent Is a Covered Business Method Patent ............................... 9
`1.
`Exemplary Claim 2 Is Financial In Nature ...................................... 11
`2.
`Claim 2 Does Not Cover A Technological Invention ................... 13
`(a)
`Claim 2 Does Not Recite A Technological Feature
`That Is Novel and Unobvious ............................................. 13
`Claim 2 Does Not Solve A Technical Problem
`Using A Technical Solution ................................................. 16
`Related Matters and Mandatory Notice Information; Petitioner Is a Real
`Party In Interest Sued for and Charged With Infringement ..................... 18
`IV. DETAILED EXPLANATION OF REASONS FOR RELIEF REQUESTED,
`SHOWING IT IS MORE LIKELY THAN NOT THAT AT LEAST ONE
`CHALLENGED CLAIM IS UNPATENTABLE ............................................... 19
`A.
`Claim Construction .......................................................................................... 21
`B.
`The Challenged Claims Are Unpatentable Under 35 U.S.C. § 101 .......... 25
`1.
`Claims Are Directed To Abstract Ideas ........................................... 26
`2.
`Claims Do Not Disclose An “Inventive Concept” That Is
`“Significantly More” Than An Abstract Idea .................................. 29
`Field Of Use Limitations Cannot Create Patent Eligibility ........... 30
`Generic Computer Implementation Cannot Transform
`Abstract Ideas Into Patent Eligible Inventions ............................... 31
`Functional Nature Confirms Preemption and Ineligibility ............ 35
`5.
`6. Machine-or-Transformation Test Also Confirms Patent
`Ineligibility ............................................................................................. 37
`Challenged Claim 1 Is Unpatentable Under 35 U.S.C. § 103 .................... 38
`C.
`CONCLUSION........................................................................................................... 71
`
`V.
`
`ii
`
`
`
`(b)
`
`B.
`
`3.
`4.
`
`

`
` Covered Business Method Patent Review
`United States Patent No. 7,334,720
`
`
`
`EXHIBIT LIST
`1201
`U.S. Patent No. 7,334,720
`
`1202
`
`1203
`
`1204
`
`1205
`
`1206
`
`1207
`
`1208
`
`1209
`
`1210
`
`1211
`
`1212
`
`1213
`
`1214
`
`1215
`
`1216
`
`1217
`
`1218
`
`1219
`
`Plaintiffs’ First Amended Complaint
`
`U.S. Patent No. 5,925,127
`
`U.S. Patent No. 5,940,805
`Russell Housley and Jan Dolphin, “Metering: A Pre-pay Technique,”
`Storage and Retrieval for Image and Video Databases V, Conference
`Volume 3022, 527 (January 15, 1997)
`U.S. Patent No. 4,999,806
`
`U.S. Patent No. 5,675,734
`
`U.S. Patent No. 4,878,245
`
`File History for U.S. Patent No. 7,334,720
`
`U.S. Patent No. 7,942,317
`
`U.S. Patent No. 5,103,392
`
`U.S. Patent No. 5,530,235
`
`U.S. Patent No. 5,629,980
`
`U.S. Patent No. 5,915,019
`
`European Patent Application, Publication No. EP0809221A2
`
`International Application Publication No. WO 99/43136
`
`JP Patent Application Publication No. H11-164058 (translation)
`
`Eberhard von Faber, Robert Hammelrath, and Franz-Peter Heider,
`“The Secure Distribution of Digital Contents,” IEEE (1997)
`Declaration of Anthony J. Wechselberger In Support of Apple Inc.’s
`Petition for Covered Business Method Patent Review
`
`iii
`
`

`
` Covered Business Method Patent Review
`United States Patent No. 7,334,720
`
`
`1221
`
`1222
`
`EXHIBIT LIST
`1220
`U.S. Patent No. 8,033,458
`Declaration of Michael P. Duffey In Support of Apple Inc.’s Petition
`for Covered Business Method Patent Review
`Declaration of Megan F. Raymond In Support of Apple Inc.’s Peti-
`tion for Covered Business Method Patent Review
`Claim Construction Memorandum Opinion from Smartflash LLC v.
`Apple Inc., No. 6:13-cv-447 (Dkt. 229)
`File History for U.S. Patent No. 8,061,598
`
`1223
`
`1224
`
`1225
`
`1226
`
`1227
`
`1228
`
`1229
`
`1230
`
`1231
`
`1232
`
`1233
`
`1234
`
`1235
`
`U.S. Patent No. 4,337,483
`
`U.S. Patent No. 7,725,375
`
`International Publication No. WO 95/34857
`
`JP Patent Application Publication No. H10-269289 (translation)
`
`File History for U.S. Patent No. 7,942,317
`
`File History for U.S. Patent No. 8,033,458
`
`U.S. Patent No. 8,061,598
`
`U.S. Patent No. 8,118,221
`
`File History for U.S. Patent No. 8,118,221
`
`U.S. Patent No. 8,336,772
`
`File History for U.S. Patent No. 8,336,772
`
`1236
`
`U.S. Patent No. 5,646,992
`
`iv
`
`

`
` Covered Business Method Patent Review
`United States Patent No. 7,334,720
`
`I.
`
`INTRODUCTION
`
`Pursuant to § 321 and Rule 42.304, 1 the undersigned, on behalf of and in a
`
`representative capacity for, Apple Inc. (“Petitioner”), petitions for review under the
`
`transitional program for covered business method patents of claims 1 and 2 (“chal-
`
`lenged claims”) of U.S. Pat No. 7,334,720 (“the ’720 Patent” or “720”), issued to
`
`Smartflash Limited and currently assigned to Smartflash LLC (“Patentee”). Petitioner
`
`asserts it is more likely than not that the challenged claims are unpatentable for the
`
`reasons herein and requests review of, and judgment against, claims 1 and 2 as un-
`
`patentable under § 101 as claiming unpatentable subject matter, and claim 1 under §
`
`103 as obvious.
`
`As discussed in Section III.B, infra, Petitioner has concurrently filed a Petition
`
`seeking covered business method review, requesting judgment against these same ’720
`
`claims based on different art. Petitioner notes that the Director, pursuant to Rule
`
`325(c), may determine at the proper time that merger of these proceedings, or at min-
`
`imum coordination of proceedings involving the same patent, is appropriate. As also
`
`discussed in Section III.B, infra, Petitioner previously filed CBM2014-00104/105 seek-
`
`ing review of the ’720 under §§ 102 and 103. Those petitions were not instituted. In
`
`
`1 Petitioner is demonstrating, in pending litigation, that these claims are invalid for
`
`numerous additional reasons. All section cites herein are to 35 U.S.C. or 37 C.F.R.,
`
`as the context indicates, and all emphasis herein is added unless otherwise noted.
`
`
`
`

`
` Covered Business Method Patent Review
`United States Patent No. 7,334,720
`
`its Decision Denying Institution, the Board construed “use rule,” as “a rule specifying
`
`a condition under which access to content is permitted,” id., Pap. 9, at 8, and deter-
`
`mined Petitioner had not shown it was more likely than not that it would prevail in
`
`demonstrating that Stefik and Poggio, Maari, and/or Sato rendered obvious limita-
`
`tions related to “use rules” or “use status data.” Id. Pap. 9, at 13-20. In light of the
`
`Board’s decision, Petitioner now identifies additional prior art—Ahmad and Kopp
`
`(Exs. 1203, 1204)—with explicit disclosures of the limitations related to “use rules,”
`
`as construed by the Board, and “use status data.” Ahmad, for example, which was not
`
`known to Petitioner at the time of the original petitions, describes a software rental
`
`system that monitors an elapsed time of use recorded by a timer or a number of uses
`
`recorded by a counter and does not permit access to the rented software if a software
`
`rental license has been exhausted. See, e.g., Ex. 1203 2:62-3:18. Rented software is
`
`monitored by a Software Monitor that specifies the time or number of use limits for
`
`the rental and monitors usage when programs are launched and continuously as pro-
`
`grams are used to determine whether the specified limits allow further use of the pro-
`
`gram. See, e.g., id. 13:65-14:8; 14:28-48. The rental usage status is tracked by monitor-
`
`ing timers or counters when a user executes the rented program. See, e.g., id. 14:20-23.
`
`Kopp, e.g., describes a vending system allowing a user to specify a desired extent of
`
`usage, pay for only that amount of usage, and then receive data limited to the pur-
`
`chased usage amount. See, e.g., Ex. 1204 2:50-65. The data records provided through
`
`2
`
`

`
` Covered Business Method Patent Review
`United States Patent No. 7,334,720
`
`the vending system are associated with limitations, for example on length of time or
`
`number of uses, tied to a purchased data record. See, e.g., id. 5:16-23. After purchase,
`
`the user’s device checks recorded data regarding the extent of utilization to determine
`
`if the user has purchased use remaining and does not permit the data record to be
`
`read if the purchased use has been exhausted. See, e.g., id. 6:41-47. Petitioner has also
`
`identified additional disclosures in Stefik concerning these limitations as construed,
`
`further confirming a POSA2 would have found it obvious and routine to implement
`
`the system disclosed by Stefik using the expressly advantageous teachings of Ahmad,
`
`Kopp and/or Maari, detailed in §IV.C, infra. See, e.g., Ex. 1219 ¶¶ 68-74.
`
`The challenged claims merely recite steps well-known in the field of data stor-
`
`age and access, including use of a “portable data carrier for storing and paying for data
`
`and to computer systems for providing access to data to be stored.” E.g., Ex. 1201
`
`1:5-8. Independent Claim 1, for example, recites four rudimentary steps relating to da-
`
`ta access—(A) receiving a data access request from a user, (B) reading use status da-
`
`ta and use rules from memory (C) evaluating data to determine whether access to
`
`2 References to a POSA refer to the knowledge or understanding of a person of ordi-
`
`nary skill in the art POSA as of October 25, 1999, who would have at least a B.S. in
`
`E.E., C.S., or a telecommunications related field, and at least 3 years of industry
`
`experience that included client-server data/information distribution and management
`
`architectures. See Ex. 1219 ¶¶ 27, 30 n.3.
`
`3
`
`

`
` Covered Business Method Patent Review
`United States Patent No. 7,334,720
`
`content is permitted, (D) displaying to a user whether access to the content is per-
`
`mitted:
`
`1. A method of controlling access to content data on a data carrier, the
`data carrier comprising non-volatile data memory storing content
`memory and non-volatile parameter memory storing use status data and
`use rules, the method comprising:
`receiving a data access request from a user for at least one con-
`tent item of the content data stored in the non-volatile data
`memory;
`reading the use status data and use rules from the parameter
`memory that pertain to use of the at least one requested content
`data item;
`evaluating the use status data using the use rules to determine
`whether access to the at least one requested content item stored in
`the content memory is permitted; and
`displaying to the user whether access is permitted for each of the
`at least one requested content item stored in the non-volatile data
`memory.
`Claim 2 merely adds the concept of storing of payment data, and the step of
`selecting a use rule depending on payment:
`2. A method as claimed in claim 1 wherein said parameter memory
`further stores payment data and further comprising selecting one of
`said use rules dependent upon said payment data.
`Ex. 1201. But at the ‘720’s earliest claimed priority date, these simple elements and
`
`their combination were all known to any POSAPOSA. The patent itself acknowledges
`
`4
`
`

`
` Covered Business Method Patent Review
`United States Patent No. 7,334,720
`
`that the idea of providing access to data in exchange for a payment (e.g., purchase of
`
`music on a CD) was well known at the time, e.g., id. 5:4-7 (“where the data carrier
`
`stores . . . music, the purchase outright option may be equivalent to the purchase of a
`
`compact disc (CD)”) and the prior art was teeming with disclosures of this basic concept.
`
`Moreover, as its language makes clear, Claim 2 involves no “technology” at all oth-
`
`er than “a data carrier” (with memories)— which the patent concedes was well known
`
`and entirely commonplace at the time. E.g., id. 3:29, 8:64-66, 11:36-53, 13:46-58, 14:1-
`
`2, 17:23-18:23, 18:38, Figs. 2, 9. Thus, as the intrinsic record reflects, Claims 1 and 2
`
`recite nothing more than a method for restricting access to data based on rules, in-
`
`cluding rules dependent upon payment data. E.g., id. 12:38-41 (“The physical embod-
`
`iment of the system is not critical and a skilled person will understand that the termi-
`
`nals, data processing systems and the like can all take a variety of forms.”); Fig. 4b.
`
`Indeed, as confirmed by Alice Corp. Pty, Ltd. v. CLS Bank Int’l, 134 S. Ct. 2347
`
`(2014)—decided after Petitioner’s original challenges to the ’720 were filed—the chal-
`
`lenged claims are also directed to patent-ineligible subject matter under § 101. As the
`
`Board noted in its previous Institution Decision, “the ’720 patent makes clear that the
`
`asserted novelty of the invention is not in any specific improvement of software or
`
`hardware, but in the method of controlling access to data,” CBM2014-00104, Pap. 9, at 12,
`
`and the challenged claims are directed to nothing more than the unpatentable abstract
`
`idea of paying for and controlling access to data, with at most the addition of well-
`
`5
`
`

`
` Covered Business Method Patent Review
`United States Patent No. 7,334,720
`
`known, routine and conventional features—in particular, generic computer implemen-
`
`tation that cannot confer patentability on these patent-ineligible abstractions. E.g., Al-
`
`ice, 134 S. Ct. at 2359-60. Each challenged claim recites ineligible subject matter, and is
`
`also obvious, thus, each is unpatentable.
`
`II. OVERVIEW OF FIELD OF THE CLAIMED INVENTION
`By October 25, 1999, electronic sale, distribution, and content protection for
`
`digital products all would have been well-known to a POSA, and their combination as
`
`claimed also would have been well-known or at minimum obvious POSA. See, e.g., Ex.
`
`1219 § V. In March, 1991, for example, U.S. Pat. No. 4,999,806, issued disclosing a
`
`system and method for the sale and distribution of digital products (e.g., software) by
`
`phone, and for content protection. See, e.g., Ex. 1206 Abstract (“central station distrib-
`
`utes software by telephone[.]accepts credit card information, transmits an acceptance code … After
`
`verifying the credit card information, the station calls the purchaser back and continues with the
`
`transaction.”); 1:67-2:9 (describing “means for selling and distributing protected software using
`
`standard telephone lines” and “permit[ting] the purchaser to rent the protected software for a specific
`
`number of runs”). Ex. 1206 thus discloses making different types of access available, e.g.
`
`as purchase vs. rental, a Control Transfer Program and a Primary Protection Program
`
`that ensure the computer receiving a downloaded program does not have another
`
`program present that could create unauthorized copies. See id. Abstract; 2:65-3:23. See
`
`also Ex. 1219 ¶ 32.
`
`6
`
`

`
` Covered Business Method Patent Review
`United States Patent No. 7,334,720
`
`In April 1992, U.S. Pat. No. 5,103,392, issued, disclosing use-based charging
`
`for digital products, including “_
`
`user-specific credit data storage means for storing data identifying the us-
`er … and indicating credit for payment capacity, use time length, or the like of the
`user,” as well as [1] use decision means for determining permission to use the
`program … on the basis of program-specific data supplied from the program
`storage means or user-specific credit data supplied from the user-specific
`credit data storage means, the use decision means delivering either an affirmative
`or negative signal corresponding to results of the decision[, and [2]] program
`use history storage means connected to the use decision means for storing pro-
`gram use history data . . ..”
`See, e.g. Ex 1211 1:64-2:17. Ex. 1211 emphasis on assuring permission to access a
`
`program and compensation to providers for use underscores the art’s focus on digital
`
`rights management (“DRM”), over eight years before Smartflash’s claimed October
`
`25, 1999 priority date. See also Ex. 1219 ¶ 35.
`
`Also in 1997, Exhibit 1218 (“von Faber”) observed that “[e]lectronic commerce sys-
`
`tems dealing with the distribution of digital contents like software or multimedia data
`
`have to couple the use of the provided digital goods with a prior payment for the goods in a way
`
`which cannot be bypassed,” proposing a system where customers purchase keys to
`
`utilize distributed encrypted content. E.g., id. 7 (a “solution is to distribute the contents in
`
`encrypted form, and to have the customer pay for the key which he needs to transform the encrypted
`
`content in an usable form.”), 8 (“The Content Provider provides digital contents in encrypted
`
`7
`
`

`
`form being distributed by the Content Distributor . . . The Authorisation System permits the dis-
`
` Covered Business Method Patent Review
`United States Patent No. 7,334,720
`
`
`tribution of the appropriate key after settling of the fees payable by the Customer, who will enjoy
`
`the decrypted digital contents.”), Fig. 1. Von Faber states its system could be used for
`
`a variety of known distribution and payment methods, and further addressed the
`
`known issue of payment distribution to content providers. See, e.g., id. 13 (“Different
`
`methods can be used to distribute the encrypted contents (standard techniques) . . . Different elec-
`
`tronic payment methods can be integrated . . . This flexibility leads to the fact that totally different
`
`authorisation methods can be integrated.”; “The system automatically divides the package price
`
`(payments) and guarantees that the money is transferred to each Content Provider.”). See also Ex.
`
`1219 ¶¶ 37-39.
`
`And U.S. Pat. No. 5,915,019 (“Ginter,”), issued in June, 1999, disclosing “sys-
`
`tems and methods for secure transaction management and electronic rights protec-
`
`tion.” See, e.g., Ex. 1214 Abstract. Ginter’s system helps ensure that information is ac-
`
`cessed and used only in authorized ways, and maintain the integrity, availability, and/or confiden-
`
`tiality of the information,” and discloses that “[a]ll participants … have the innate abil-
`
`ity to participate in any role,” e.g., id. 255:22-43 highlighting the known flexibility in
`
`such distribution systems, underscoring that combinations between and among dis-
`
`closures of such systems would have been obvious to a POSA. See also, e.g., Ex. 1219
`
`¶¶ 40-41.
`
`Content storage and utilization on portable devices, including mobile commu-
`
`8
`
`

`
` Covered Business Method Patent Review
`United States Patent No. 7,334,720
`
`nication devices such as cellular phones, was also well-known Ex. 1216 (pub’d Aug.
`
`26, 1999) describes a cell phone for storing and accessing digital content. See, e.g., id.
`
`3:7-13 (“Because of its integration into the cellular phone, the digital entertainment module can
`
`share components already present in the cellular phone. [T]he use of solid state RAM or ROM, as
`
`opposed to disc storage, eliminates the need for bounce control circuitry. This enables
`
`the disclosed invention to provide cellular communications and entertainment during leisure activi-
`
`ties.”). And Exhibit 1217, “Portable Music Selection and Viewing System,” (pub’d
`
`June 18, 1999), discloses storing and playing media on mobile devices, e.g., using a re-
`
`movable IC card. See, e.g., Ex. 1217 ¶ 9 (“portable music selection viewing device 70
`
`provides a removable storage device 76 [which] is a memory card similar to, for example… an
`
`IC card [T]he user can store the music software from another audio unit into the storage device 76
`
`and enjoy music by inserting this storage unit 76 into this portable … device 70.”); ¶
`
`13 (“music storage medium 250 such as a magnetic card, magnetic tape, a CD, a DVD,
`
`or a memory card such as an IC card stores the music software”). See also Ex. 1219 ¶¶
`
`42-43.
`
`As these and the additional examples in § IV.C illustrate, the prior art was rife
`
`with awareness and discussion of the same supposed “invention” memorialized in the
`
`‘’720’s challenged claims.
`
`III. PETITIONER HAS STANDING
`A.
`
`The ’720 Patent Is a Covered Business Method Patent
`
`9
`
`

`
` Covered Business Method Patent Review
`United States Patent No. 7,334,720
`
`The ’720 Patent a “covered business method patent” under § 18(d)(1) of the
`
`AIA, and Petitioner certifies it is available for review under § 42.304(a). Although nu-
`
`merous claims qualify, a patent with even one claim covering a covered business
`
`method is considered a CBM patent. See CBM 2012-00001, Doc. 36 at 26; 77 Fed. Reg.
`
`48,709 (Aug. 14, 2012). The Board previously found claim 14 of the ’720 patent satis-
`
`fied the CBM standing requirement. CBM2014-00104, Pap. 8, 8-13. Petitioner addi-
`
`tionally addresses exemplary claim 2:
`
`1. A method of controlling access to content data on a data carrier, the
`data carrier comprising non-volatile data memory storing content
`memory and non-volatile parameter memory storing use status data and
`use rules, the method comprising:
`receiving a data access request from a user for at least one content
`item of the content data stored in the non-volatile data memory;
`reading the use status data and use rules from the parameter
`memory that pertain to use of the at least one requested content
`data item;
`evaluating the use status data using the use rules to determine
`whether access to the at least one requested content item stored in
`the content memory is permitted; and
`displaying to the user whether access is permitted for each of the
`at least one requested content item stored in the non-volatile data
`memory.
`2. A method as claimed in claim 1 wherein said parameter memory fur-
`ther stores payment data and further comprising selecting one of said use
`
`10
`
`

`
` Covered Business Method Patent Review
`United States Patent No. 7,334,720
`
`
`rules dependent upon said payment data.
`1.
`Exemplary Claim 2 Is Financial In Nature
`A CBM patent is “a patent that claims a method or corresponding apparatus
`
`for performing data processing or other operations used in the practice, administra-
`
`tion, or management of a financial product or service, except that the term does not
`
`include patents for technological inventions.” AIA §18(d)(1); 37 C.F.R. §42.301.
`
`“[T]he definition of covered business method patent was drafted to encompass pa-
`
`tents claiming activities that are financial in nature, incidental to a financial activity or comple-
`
`mentary to a financial activity.” 77 Fed. Reg. 48,734, 48,735 (Aug. 14, 2012) (citing 157
`
`Cong. Rec. S5432 (daily ed. Sept. 8, 2011) (statement of Sen. Schumer)). “[F]inancial
`
`product or service” is to be interpreted broadly, id., and “financial . . . simply means
`
`relating to monetary matters”—it does not require any link to traditional financial in-
`
`dustries such as banks. See, e.g., CBM2012-00001, Pap. 36 at 23.
`
`The ’720 Patent relates to the idea of restricting access to data, including re-
`
`stricting access based on payment. See AIA § 18(d)(1); 37 C.F.R. § 42.301(a); Ex. 1201
`
`1:64-2:3. Indeed, in asserting the patent, Smartflash conceded the alleged invention
`
`relates to a financial activity or transaction, stating that “[t]he patents-in-suit generally
`
`cover a portable data carrier for storing data and managing access to the data via pay-
`
`ment information and/or use status rules. The patents-in-suit also generally cover a
`
`computer network . . . that serves data and manages access to data by, for example,
`
`validating payment information.” Ex. 1202.
`
`11
`
`

`
` Covered Business Method Patent Review
`United States Patent No. 7,334,720
`
`
`The ’720 Patent emphasizes payment in describing the claimed invention:
`
`According to the present invention there is therefore provided a method
`of providing portable data comprising providing a portable data storage
`device comprising downloaded data storage means and payment vali-
`dation means; providing a terminal for internet access; coupling the
`portable data storage device to the terminal; reading payment infor-
`mation from the payment validation means using the terminal; validat-
`ing the payment information; and downloading data into the portable
`storage device from a data supplier.
`Ex. 1201 1:46-55. See also id. 1:56-57 (“Another aspect of the invention provides a cor-
`
`responding mobile data retrieval device…”). Indeed, the specification confirms that
`
`the “data carrier” of the invention is “for storing and paying for data,” id. 1:6-8, and
`
`the “payment data” “may either be data relating to an actual payment made to the data sup-
`
`plier, or it may be a record of a payment made to an e-payment system.” Id. 6:59-63. “Payment
`
`for the data item or items requested may either be made directly to the system owner
`
`or may be made to an e-payment system.” Id. 21:6-8. “E-payment systems [] are coupled
`
`to banks” and may be provided in accordance with cash compliant standards such as
`
`MONDEX, Proton, and/or Visa. Id. 13:46-58. And
`
`Claim 2 explicitly describes storing payment data as well as restricting access to
`
`content based on payment, and therefore clearly relates to a financial activity and
`
`providing a financial service. See CBM2013-00020, Pap. 14 at 9-10 (“the electronic
`
`transfer of money is a financial activity, and allowing such a transfer amounts to
`
`12
`
`

`
` Covered Business Method Patent Review
`United States Patent No. 7,334,720
`
`providing a financial service.”). See also AIA § 18(d)(1); 37 C.F.R. § 42.301(a). See also
`
`77 Fed. Reg. 48,734, 48,735 (Aug. 14, 2012) (“[T]he definition of [CBM] was drafted
`
`to encompass patents ‘claiming activities that are financial in nature, incidental to a financial
`
`activity or complementary to a financial activity.’”) (citation omitted).3
`
`2.
`Further, claim 2 is not a “technological invention” that would trigger the excep-
`
`Claim 2 Does Not Cover A Technological Invention
`
`tion in AIA § 18(d)(1), because it does not claim “subject matter as a whole [that] re-
`
`cites a technological feature that is novel and unobvious over the prior art[] and solves a
`
`technical problem using a technical solution.” § 42.301(b). To the contrary, the patent makes
`
`clear that its claimed “data carrier” (including “memory”) was commonplace.
`
`(a) Claim 2 Does Not Recite A Technological Feature
`That Is Novel and Unobvious
`
`First, no “technological feature” of claim 2 is novel and unobvious. The PTO
`
`confirmed that “[m]ere recitation of known technologies, such as computer hardware,
`
`communication or computer networks, software, memory, computer-readable storage
`
`medium, scanners, display devices or databases, or specialized machines, such as an
`
`
`3 Claim 14, which requires, inter alia, “reading payment data,” “forwarding payment
`
`data,” and an “access rule specifying at last one condition . . . being dependent upon
`
`the amount of payment associated with the payment data forwarded to the payment
`
`validation system,” is similarly financial in nature. See CBM2014-00104, Pap. 8, 8-13.
`
`13
`
`

`
` Covered Business Method Patent Review
`United States Patent No. 7,334,720
`
`ATM or point of sale device,” or “[r]eciting the use of known prior art technology to
`
`accomplish a process or method, even if that process or method is novel and non-
`
`obvious” will “not typically render a patent a technological invention.” E.g., 77 Fed.
`
`Reg. 48,756 48,764 (Aug. 14, 2012). As its language makes clear, claim 2 requires no
`
`particularized hardware, but instead simply relates to the idea of providing electronic
`
`data in exchange for payment and restricting access based on the amount of payment.
`
`The claim involves no “technology” at all other than, at most, use of a data carrier, a
`
`payment validation system, and a data supplier. Ex. 1201. The patent confirms this
`
`data carrier is in no way novel or unobvious, explaining it may be¸ inter alia, based on a
`
`“standard smart card” (id. 11:37-38), an “electronic memory card” (id. 3:29), or a so-
`
`called “smart Flash card,” (id. 17:25), all commonplace at the time, see id. 11:37-38;
`
`14:1-2. Indeed, the ‘720 explains a smart Flash card is “an IC card . . . incorporating a
`
`processor and Flash data memory, preferably of large capacity” (id. 17:25-28), and in-
`
`corporates by reference, for additional details, the ISO series of standards. Id. 17:28-
`
`33; see also Figs. 2, 9; 11:36-53; 17:34-18:23.4
`
`4 Claim 14 similarly requires no technology at all other than, at most, a data carrier,
`
`payment validation system, and data supplier. Payment validation systems were also
`
`well-known. See Ex. 1201 13:57-61. The patent explains that “[t]he payment validation
`
`system may be part of the data supplier’s computer systems or it may be a separate e-
`
`payment system.” Id. 8:64-66. “E-payment systems are coupled to banks . . . These provide
`
`14
`
`

`
` Covered Business Method Patent Review
`United States Patent No. 7,334,720
`
`Further, the idea of providing access to data in exchange for a payment, as
`
`claimed, was known. See, e.g., id. 5:4-7 (“Thus where the data carrier stores, for exam-
`
`ple, music, the purchase outright option may be equivalent to the purchase of a compact disc
`
`(CD)”). See also, e.g., Ex. 1207; Ex. 1206 Abstract, 1:67-2:9; Ex. 1208 Abstract, 4:27-35.
`
`The 720’s alleged invention merely combines a known payment validation system with
`
`the known ability to download data and restrict access to the data based on that pay-
`
`ment. But “combining prior art structures to achieve a normal, expected, or predicta-
`
`ble result of that combination” does not “render a patent a technological invention.”
`
`77 Fed. Reg. 48755 (Aug. 14, 2012) at 48764. Access rules, and restricting access to
`
`downloaded data based on the amount of payment was also known. E.g., Ex. 1214
`
`an e-payment system according to, for example, MONDEX, Proton, and/or Visa cash
`
`compliant standards . . .” Id. 13:46-58. The “data supplier” of the claims is not a techno-
`
`logical component, and does not require any specific hardware. See Ex. 1201 6:14-16;
`
`6:56-58. Rather, it is simply a supplier of online data. Id. 5:64-65. See also id. 6:56-58
`
`(“The computer system is operated by a data supplier or a data supplier ‘system owner’ for
`
`providing content data to the data carrier.”); 8:13-15. The patent states that the physi-
`
`cal embodiment of the system, including data providers/suppliers, is not critical. Ex.
`
`1201 12:11-13, 38-41; Fig. 4(b). Data suppliers were well known long before the
`
`claimed priority date. See id. 1:26-41. See CBM2014-00104, Pap. 8, 8-13 (finding claim
`
`14 to satisfy CBM standing requirement).
`
`15
`
`

`
`186:15-24; 172:32-35; 264:62-265:16; 128:23-36; Ex. 1215 7:14-16; 10:25-28.5
`
` Covered Business Method Patent Review
`United States Patent No. 7,334,720
`
`
`The state of the art at the time, and the detailed prior art analysis provided be-
`
`low, further reflects claim 2 does not recite a technological feature that is novel and
`
`nonobvious. See, e.g., Section II, supra; Section IV.C, infra. Claim 2 concerns nothing
`
`more than a non-technical idea of selling data in exchange for payment and restricting
`
`access to that data depending on payment. Even apart from its other failures to trigger
`
`the statutory exception, for these reasons alone claim 2 would not be techn

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket