`United States Patent No. 7,334,720
`
`IN THE UNITED STATES PATENT AND TRADEMARK OFFICE
`
`Petitioner: Apple Inc.
`
`Attorney Docket No.:
`
` 104677-5008-817
`Customer No. 28120
`
`§
`Inventor: Hulst et al.
`United States Patent No.: 7,334,720 §
`Formerly Application No.: 11/336,758 §
`Issue Date: February 26, 2008
`§
`Filing Date: January 19, 2006
`§
`Former Group Art Unit: 2876
`§
`Former Examiner: Steven S. Paik
`§
`
`For: Data Storage and Access Systems
`
`MAIL STOP PATENT BOARD
`Patent Trial and Appeal Board
`United States Patent and Trademark Office
`Post Office Box 1450
`Alexandria, Virginia 22313-1450
`
`PETITION FOR COVERED BUSINESS METHOD PATENT REVIEW OF
`UNITED STATES PATENT NO. 7,334,720 PURSUANT TO 35 U.S.C.
`§ 321, 37 C.F.R. § 42.304
`
`
`
`
`
`
`
` Covered Business Method Patent Review
`United States Patent No. 7,334,720
`
`
`TABLE OF CONTENTS
`
`INTRODUCTION ....................................................................................................... 1
`I.
`II. OVERVIEW OF FIELD OF THE CLAIMED INVENTION ......................... 6
`III. PETITIONER HAS STANDING ............................................................................ 9
`A.
`The ’720 Patent Is a Covered Business Method Patent ............................... 9
`1.
`Exemplary Claim 2 Is Financial In Nature ...................................... 11
`2.
`Claim 2 Does Not Cover A Technological Invention ................... 13
`(a)
`Claim 2 Does Not Recite A Technological Feature
`That Is Novel and Unobvious ............................................. 13
`Claim 2 Does Not Solve A Technical Problem
`Using A Technical Solution ................................................. 16
`Related Matters and Mandatory Notice Information; Petitioner Is a Real
`Party In Interest Sued for and Charged With Infringement ..................... 18
`IV. DETAILED EXPLANATION OF REASONS FOR RELIEF REQUESTED,
`SHOWING IT IS MORE LIKELY THAN NOT THAT AT LEAST ONE
`CHALLENGED CLAIM IS UNPATENTABLE ............................................... 19
`A.
`Claim Construction .......................................................................................... 21
`B.
`The Challenged Claims Are Unpatentable Under 35 U.S.C. § 101 .......... 25
`1.
`Claims Are Directed To Abstract Ideas ........................................... 26
`2.
`Claims Do Not Disclose An “Inventive Concept” That Is
`“Significantly More” Than An Abstract Idea .................................. 29
`Field Of Use Limitations Cannot Create Patent Eligibility ........... 30
`Generic Computer Implementation Cannot Transform
`Abstract Ideas Into Patent Eligible Inventions ............................... 31
`Functional Nature Confirms Preemption and Ineligibility ............ 35
`5.
`6. Machine-or-Transformation Test Also Confirms Patent
`Ineligibility ............................................................................................. 37
`Challenged Claim 1 Is Unpatentable Under 35 U.S.C. § 103 .................... 38
`C.
`CONCLUSION........................................................................................................... 71
`
`V.
`
`ii
`
`
`
`(b)
`
`B.
`
`3.
`4.
`
`
`
` Covered Business Method Patent Review
`United States Patent No. 7,334,720
`
`
`
`EXHIBIT LIST
`1201
`U.S. Patent No. 7,334,720
`
`1202
`
`1203
`
`1204
`
`1205
`
`1206
`
`1207
`
`1208
`
`1209
`
`1210
`
`1211
`
`1212
`
`1213
`
`1214
`
`1215
`
`1216
`
`1217
`
`1218
`
`1219
`
`Plaintiffs’ First Amended Complaint
`
`U.S. Patent No. 5,925,127
`
`U.S. Patent No. 5,940,805
`Russell Housley and Jan Dolphin, “Metering: A Pre-pay Technique,”
`Storage and Retrieval for Image and Video Databases V, Conference
`Volume 3022, 527 (January 15, 1997)
`U.S. Patent No. 4,999,806
`
`U.S. Patent No. 5,675,734
`
`U.S. Patent No. 4,878,245
`
`File History for U.S. Patent No. 7,334,720
`
`U.S. Patent No. 7,942,317
`
`U.S. Patent No. 5,103,392
`
`U.S. Patent No. 5,530,235
`
`U.S. Patent No. 5,629,980
`
`U.S. Patent No. 5,915,019
`
`European Patent Application, Publication No. EP0809221A2
`
`International Application Publication No. WO 99/43136
`
`JP Patent Application Publication No. H11-164058 (translation)
`
`Eberhard von Faber, Robert Hammelrath, and Franz-Peter Heider,
`“The Secure Distribution of Digital Contents,” IEEE (1997)
`Declaration of Anthony J. Wechselberger In Support of Apple Inc.’s
`Petition for Covered Business Method Patent Review
`
`iii
`
`
`
` Covered Business Method Patent Review
`United States Patent No. 7,334,720
`
`
`1221
`
`1222
`
`EXHIBIT LIST
`1220
`U.S. Patent No. 8,033,458
`Declaration of Michael P. Duffey In Support of Apple Inc.’s Petition
`for Covered Business Method Patent Review
`Declaration of Megan F. Raymond In Support of Apple Inc.’s Peti-
`tion for Covered Business Method Patent Review
`Claim Construction Memorandum Opinion from Smartflash LLC v.
`Apple Inc., No. 6:13-cv-447 (Dkt. 229)
`File History for U.S. Patent No. 8,061,598
`
`1223
`
`1224
`
`1225
`
`1226
`
`1227
`
`1228
`
`1229
`
`1230
`
`1231
`
`1232
`
`1233
`
`1234
`
`1235
`
`U.S. Patent No. 4,337,483
`
`U.S. Patent No. 7,725,375
`
`International Publication No. WO 95/34857
`
`JP Patent Application Publication No. H10-269289 (translation)
`
`File History for U.S. Patent No. 7,942,317
`
`File History for U.S. Patent No. 8,033,458
`
`U.S. Patent No. 8,061,598
`
`U.S. Patent No. 8,118,221
`
`File History for U.S. Patent No. 8,118,221
`
`U.S. Patent No. 8,336,772
`
`File History for U.S. Patent No. 8,336,772
`
`1236
`
`U.S. Patent No. 5,646,992
`
`iv
`
`
`
` Covered Business Method Patent Review
`United States Patent No. 7,334,720
`
`I.
`
`INTRODUCTION
`
`Pursuant to § 321 and Rule 42.304, 1 the undersigned, on behalf of and in a
`
`representative capacity for, Apple Inc. (“Petitioner”), petitions for review under the
`
`transitional program for covered business method patents of claims 1 and 2 (“chal-
`
`lenged claims”) of U.S. Pat No. 7,334,720 (“the ’720 Patent” or “720”), issued to
`
`Smartflash Limited and currently assigned to Smartflash LLC (“Patentee”). Petitioner
`
`asserts it is more likely than not that the challenged claims are unpatentable for the
`
`reasons herein and requests review of, and judgment against, claims 1 and 2 as un-
`
`patentable under § 101 as claiming unpatentable subject matter, and claim 1 under §
`
`103 as obvious.
`
`As discussed in Section III.B, infra, Petitioner has concurrently filed a Petition
`
`seeking covered business method review, requesting judgment against these same ’720
`
`claims based on different art. Petitioner notes that the Director, pursuant to Rule
`
`325(c), may determine at the proper time that merger of these proceedings, or at min-
`
`imum coordination of proceedings involving the same patent, is appropriate. As also
`
`discussed in Section III.B, infra, Petitioner previously filed CBM2014-00104/105 seek-
`
`ing review of the ’720 under §§ 102 and 103. Those petitions were not instituted. In
`
`
`1 Petitioner is demonstrating, in pending litigation, that these claims are invalid for
`
`numerous additional reasons. All section cites herein are to 35 U.S.C. or 37 C.F.R.,
`
`as the context indicates, and all emphasis herein is added unless otherwise noted.
`
`
`
`
`
` Covered Business Method Patent Review
`United States Patent No. 7,334,720
`
`its Decision Denying Institution, the Board construed “use rule,” as “a rule specifying
`
`a condition under which access to content is permitted,” id., Pap. 9, at 8, and deter-
`
`mined Petitioner had not shown it was more likely than not that it would prevail in
`
`demonstrating that Stefik and Poggio, Maari, and/or Sato rendered obvious limita-
`
`tions related to “use rules” or “use status data.” Id. Pap. 9, at 13-20. In light of the
`
`Board’s decision, Petitioner now identifies additional prior art—Ahmad and Kopp
`
`(Exs. 1203, 1204)—with explicit disclosures of the limitations related to “use rules,”
`
`as construed by the Board, and “use status data.” Ahmad, for example, which was not
`
`known to Petitioner at the time of the original petitions, describes a software rental
`
`system that monitors an elapsed time of use recorded by a timer or a number of uses
`
`recorded by a counter and does not permit access to the rented software if a software
`
`rental license has been exhausted. See, e.g., Ex. 1203 2:62-3:18. Rented software is
`
`monitored by a Software Monitor that specifies the time or number of use limits for
`
`the rental and monitors usage when programs are launched and continuously as pro-
`
`grams are used to determine whether the specified limits allow further use of the pro-
`
`gram. See, e.g., id. 13:65-14:8; 14:28-48. The rental usage status is tracked by monitor-
`
`ing timers or counters when a user executes the rented program. See, e.g., id. 14:20-23.
`
`Kopp, e.g., describes a vending system allowing a user to specify a desired extent of
`
`usage, pay for only that amount of usage, and then receive data limited to the pur-
`
`chased usage amount. See, e.g., Ex. 1204 2:50-65. The data records provided through
`
`2
`
`
`
` Covered Business Method Patent Review
`United States Patent No. 7,334,720
`
`the vending system are associated with limitations, for example on length of time or
`
`number of uses, tied to a purchased data record. See, e.g., id. 5:16-23. After purchase,
`
`the user’s device checks recorded data regarding the extent of utilization to determine
`
`if the user has purchased use remaining and does not permit the data record to be
`
`read if the purchased use has been exhausted. See, e.g., id. 6:41-47. Petitioner has also
`
`identified additional disclosures in Stefik concerning these limitations as construed,
`
`further confirming a POSA2 would have found it obvious and routine to implement
`
`the system disclosed by Stefik using the expressly advantageous teachings of Ahmad,
`
`Kopp and/or Maari, detailed in §IV.C, infra. See, e.g., Ex. 1219 ¶¶ 68-74.
`
`The challenged claims merely recite steps well-known in the field of data stor-
`
`age and access, including use of a “portable data carrier for storing and paying for data
`
`and to computer systems for providing access to data to be stored.” E.g., Ex. 1201
`
`1:5-8. Independent Claim 1, for example, recites four rudimentary steps relating to da-
`
`ta access—(A) receiving a data access request from a user, (B) reading use status da-
`
`ta and use rules from memory (C) evaluating data to determine whether access to
`
`2 References to a POSA refer to the knowledge or understanding of a person of ordi-
`
`nary skill in the art POSA as of October 25, 1999, who would have at least a B.S. in
`
`E.E., C.S., or a telecommunications related field, and at least 3 years of industry
`
`experience that included client-server data/information distribution and management
`
`architectures. See Ex. 1219 ¶¶ 27, 30 n.3.
`
`3
`
`
`
` Covered Business Method Patent Review
`United States Patent No. 7,334,720
`
`content is permitted, (D) displaying to a user whether access to the content is per-
`
`mitted:
`
`1. A method of controlling access to content data on a data carrier, the
`data carrier comprising non-volatile data memory storing content
`memory and non-volatile parameter memory storing use status data and
`use rules, the method comprising:
`receiving a data access request from a user for at least one con-
`tent item of the content data stored in the non-volatile data
`memory;
`reading the use status data and use rules from the parameter
`memory that pertain to use of the at least one requested content
`data item;
`evaluating the use status data using the use rules to determine
`whether access to the at least one requested content item stored in
`the content memory is permitted; and
`displaying to the user whether access is permitted for each of the
`at least one requested content item stored in the non-volatile data
`memory.
`Claim 2 merely adds the concept of storing of payment data, and the step of
`selecting a use rule depending on payment:
`2. A method as claimed in claim 1 wherein said parameter memory
`further stores payment data and further comprising selecting one of
`said use rules dependent upon said payment data.
`Ex. 1201. But at the ‘720’s earliest claimed priority date, these simple elements and
`
`their combination were all known to any POSAPOSA. The patent itself acknowledges
`
`4
`
`
`
` Covered Business Method Patent Review
`United States Patent No. 7,334,720
`
`that the idea of providing access to data in exchange for a payment (e.g., purchase of
`
`music on a CD) was well known at the time, e.g., id. 5:4-7 (“where the data carrier
`
`stores . . . music, the purchase outright option may be equivalent to the purchase of a
`
`compact disc (CD)”) and the prior art was teeming with disclosures of this basic concept.
`
`Moreover, as its language makes clear, Claim 2 involves no “technology” at all oth-
`
`er than “a data carrier” (with memories)— which the patent concedes was well known
`
`and entirely commonplace at the time. E.g., id. 3:29, 8:64-66, 11:36-53, 13:46-58, 14:1-
`
`2, 17:23-18:23, 18:38, Figs. 2, 9. Thus, as the intrinsic record reflects, Claims 1 and 2
`
`recite nothing more than a method for restricting access to data based on rules, in-
`
`cluding rules dependent upon payment data. E.g., id. 12:38-41 (“The physical embod-
`
`iment of the system is not critical and a skilled person will understand that the termi-
`
`nals, data processing systems and the like can all take a variety of forms.”); Fig. 4b.
`
`Indeed, as confirmed by Alice Corp. Pty, Ltd. v. CLS Bank Int’l, 134 S. Ct. 2347
`
`(2014)—decided after Petitioner’s original challenges to the ’720 were filed—the chal-
`
`lenged claims are also directed to patent-ineligible subject matter under § 101. As the
`
`Board noted in its previous Institution Decision, “the ’720 patent makes clear that the
`
`asserted novelty of the invention is not in any specific improvement of software or
`
`hardware, but in the method of controlling access to data,” CBM2014-00104, Pap. 9, at 12,
`
`and the challenged claims are directed to nothing more than the unpatentable abstract
`
`idea of paying for and controlling access to data, with at most the addition of well-
`
`5
`
`
`
` Covered Business Method Patent Review
`United States Patent No. 7,334,720
`
`known, routine and conventional features—in particular, generic computer implemen-
`
`tation that cannot confer patentability on these patent-ineligible abstractions. E.g., Al-
`
`ice, 134 S. Ct. at 2359-60. Each challenged claim recites ineligible subject matter, and is
`
`also obvious, thus, each is unpatentable.
`
`II. OVERVIEW OF FIELD OF THE CLAIMED INVENTION
`By October 25, 1999, electronic sale, distribution, and content protection for
`
`digital products all would have been well-known to a POSA, and their combination as
`
`claimed also would have been well-known or at minimum obvious POSA. See, e.g., Ex.
`
`1219 § V. In March, 1991, for example, U.S. Pat. No. 4,999,806, issued disclosing a
`
`system and method for the sale and distribution of digital products (e.g., software) by
`
`phone, and for content protection. See, e.g., Ex. 1206 Abstract (“central station distrib-
`
`utes software by telephone[.]accepts credit card information, transmits an acceptance code … After
`
`verifying the credit card information, the station calls the purchaser back and continues with the
`
`transaction.”); 1:67-2:9 (describing “means for selling and distributing protected software using
`
`standard telephone lines” and “permit[ting] the purchaser to rent the protected software for a specific
`
`number of runs”). Ex. 1206 thus discloses making different types of access available, e.g.
`
`as purchase vs. rental, a Control Transfer Program and a Primary Protection Program
`
`that ensure the computer receiving a downloaded program does not have another
`
`program present that could create unauthorized copies. See id. Abstract; 2:65-3:23. See
`
`also Ex. 1219 ¶ 32.
`
`6
`
`
`
` Covered Business Method Patent Review
`United States Patent No. 7,334,720
`
`In April 1992, U.S. Pat. No. 5,103,392, issued, disclosing use-based charging
`
`for digital products, including “_
`
`user-specific credit data storage means for storing data identifying the us-
`er … and indicating credit for payment capacity, use time length, or the like of the
`user,” as well as [1] use decision means for determining permission to use the
`program … on the basis of program-specific data supplied from the program
`storage means or user-specific credit data supplied from the user-specific
`credit data storage means, the use decision means delivering either an affirmative
`or negative signal corresponding to results of the decision[, and [2]] program
`use history storage means connected to the use decision means for storing pro-
`gram use history data . . ..”
`See, e.g. Ex 1211 1:64-2:17. Ex. 1211 emphasis on assuring permission to access a
`
`program and compensation to providers for use underscores the art’s focus on digital
`
`rights management (“DRM”), over eight years before Smartflash’s claimed October
`
`25, 1999 priority date. See also Ex. 1219 ¶ 35.
`
`Also in 1997, Exhibit 1218 (“von Faber”) observed that “[e]lectronic commerce sys-
`
`tems dealing with the distribution of digital contents like software or multimedia data
`
`have to couple the use of the provided digital goods with a prior payment for the goods in a way
`
`which cannot be bypassed,” proposing a system where customers purchase keys to
`
`utilize distributed encrypted content. E.g., id. 7 (a “solution is to distribute the contents in
`
`encrypted form, and to have the customer pay for the key which he needs to transform the encrypted
`
`content in an usable form.”), 8 (“The Content Provider provides digital contents in encrypted
`
`7
`
`
`
`form being distributed by the Content Distributor . . . The Authorisation System permits the dis-
`
` Covered Business Method Patent Review
`United States Patent No. 7,334,720
`
`
`tribution of the appropriate key after settling of the fees payable by the Customer, who will enjoy
`
`the decrypted digital contents.”), Fig. 1. Von Faber states its system could be used for
`
`a variety of known distribution and payment methods, and further addressed the
`
`known issue of payment distribution to content providers. See, e.g., id. 13 (“Different
`
`methods can be used to distribute the encrypted contents (standard techniques) . . . Different elec-
`
`tronic payment methods can be integrated . . . This flexibility leads to the fact that totally different
`
`authorisation methods can be integrated.”; “The system automatically divides the package price
`
`(payments) and guarantees that the money is transferred to each Content Provider.”). See also Ex.
`
`1219 ¶¶ 37-39.
`
`And U.S. Pat. No. 5,915,019 (“Ginter,”), issued in June, 1999, disclosing “sys-
`
`tems and methods for secure transaction management and electronic rights protec-
`
`tion.” See, e.g., Ex. 1214 Abstract. Ginter’s system helps ensure that information is ac-
`
`cessed and used only in authorized ways, and maintain the integrity, availability, and/or confiden-
`
`tiality of the information,” and discloses that “[a]ll participants … have the innate abil-
`
`ity to participate in any role,” e.g., id. 255:22-43 highlighting the known flexibility in
`
`such distribution systems, underscoring that combinations between and among dis-
`
`closures of such systems would have been obvious to a POSA. See also, e.g., Ex. 1219
`
`¶¶ 40-41.
`
`Content storage and utilization on portable devices, including mobile commu-
`
`8
`
`
`
` Covered Business Method Patent Review
`United States Patent No. 7,334,720
`
`nication devices such as cellular phones, was also well-known Ex. 1216 (pub’d Aug.
`
`26, 1999) describes a cell phone for storing and accessing digital content. See, e.g., id.
`
`3:7-13 (“Because of its integration into the cellular phone, the digital entertainment module can
`
`share components already present in the cellular phone. [T]he use of solid state RAM or ROM, as
`
`opposed to disc storage, eliminates the need for bounce control circuitry. This enables
`
`the disclosed invention to provide cellular communications and entertainment during leisure activi-
`
`ties.”). And Exhibit 1217, “Portable Music Selection and Viewing System,” (pub’d
`
`June 18, 1999), discloses storing and playing media on mobile devices, e.g., using a re-
`
`movable IC card. See, e.g., Ex. 1217 ¶ 9 (“portable music selection viewing device 70
`
`provides a removable storage device 76 [which] is a memory card similar to, for example… an
`
`IC card [T]he user can store the music software from another audio unit into the storage device 76
`
`and enjoy music by inserting this storage unit 76 into this portable … device 70.”); ¶
`
`13 (“music storage medium 250 such as a magnetic card, magnetic tape, a CD, a DVD,
`
`or a memory card such as an IC card stores the music software”). See also Ex. 1219 ¶¶
`
`42-43.
`
`As these and the additional examples in § IV.C illustrate, the prior art was rife
`
`with awareness and discussion of the same supposed “invention” memorialized in the
`
`‘’720’s challenged claims.
`
`III. PETITIONER HAS STANDING
`A.
`
`The ’720 Patent Is a Covered Business Method Patent
`
`9
`
`
`
` Covered Business Method Patent Review
`United States Patent No. 7,334,720
`
`The ’720 Patent a “covered business method patent” under § 18(d)(1) of the
`
`AIA, and Petitioner certifies it is available for review under § 42.304(a). Although nu-
`
`merous claims qualify, a patent with even one claim covering a covered business
`
`method is considered a CBM patent. See CBM 2012-00001, Doc. 36 at 26; 77 Fed. Reg.
`
`48,709 (Aug. 14, 2012). The Board previously found claim 14 of the ’720 patent satis-
`
`fied the CBM standing requirement. CBM2014-00104, Pap. 8, 8-13. Petitioner addi-
`
`tionally addresses exemplary claim 2:
`
`1. A method of controlling access to content data on a data carrier, the
`data carrier comprising non-volatile data memory storing content
`memory and non-volatile parameter memory storing use status data and
`use rules, the method comprising:
`receiving a data access request from a user for at least one content
`item of the content data stored in the non-volatile data memory;
`reading the use status data and use rules from the parameter
`memory that pertain to use of the at least one requested content
`data item;
`evaluating the use status data using the use rules to determine
`whether access to the at least one requested content item stored in
`the content memory is permitted; and
`displaying to the user whether access is permitted for each of the
`at least one requested content item stored in the non-volatile data
`memory.
`2. A method as claimed in claim 1 wherein said parameter memory fur-
`ther stores payment data and further comprising selecting one of said use
`
`10
`
`
`
` Covered Business Method Patent Review
`United States Patent No. 7,334,720
`
`
`rules dependent upon said payment data.
`1.
`Exemplary Claim 2 Is Financial In Nature
`A CBM patent is “a patent that claims a method or corresponding apparatus
`
`for performing data processing or other operations used in the practice, administra-
`
`tion, or management of a financial product or service, except that the term does not
`
`include patents for technological inventions.” AIA §18(d)(1); 37 C.F.R. §42.301.
`
`“[T]he definition of covered business method patent was drafted to encompass pa-
`
`tents claiming activities that are financial in nature, incidental to a financial activity or comple-
`
`mentary to a financial activity.” 77 Fed. Reg. 48,734, 48,735 (Aug. 14, 2012) (citing 157
`
`Cong. Rec. S5432 (daily ed. Sept. 8, 2011) (statement of Sen. Schumer)). “[F]inancial
`
`product or service” is to be interpreted broadly, id., and “financial . . . simply means
`
`relating to monetary matters”—it does not require any link to traditional financial in-
`
`dustries such as banks. See, e.g., CBM2012-00001, Pap. 36 at 23.
`
`The ’720 Patent relates to the idea of restricting access to data, including re-
`
`stricting access based on payment. See AIA § 18(d)(1); 37 C.F.R. § 42.301(a); Ex. 1201
`
`1:64-2:3. Indeed, in asserting the patent, Smartflash conceded the alleged invention
`
`relates to a financial activity or transaction, stating that “[t]he patents-in-suit generally
`
`cover a portable data carrier for storing data and managing access to the data via pay-
`
`ment information and/or use status rules. The patents-in-suit also generally cover a
`
`computer network . . . that serves data and manages access to data by, for example,
`
`validating payment information.” Ex. 1202.
`
`11
`
`
`
` Covered Business Method Patent Review
`United States Patent No. 7,334,720
`
`
`The ’720 Patent emphasizes payment in describing the claimed invention:
`
`According to the present invention there is therefore provided a method
`of providing portable data comprising providing a portable data storage
`device comprising downloaded data storage means and payment vali-
`dation means; providing a terminal for internet access; coupling the
`portable data storage device to the terminal; reading payment infor-
`mation from the payment validation means using the terminal; validat-
`ing the payment information; and downloading data into the portable
`storage device from a data supplier.
`Ex. 1201 1:46-55. See also id. 1:56-57 (“Another aspect of the invention provides a cor-
`
`responding mobile data retrieval device…”). Indeed, the specification confirms that
`
`the “data carrier” of the invention is “for storing and paying for data,” id. 1:6-8, and
`
`the “payment data” “may either be data relating to an actual payment made to the data sup-
`
`plier, or it may be a record of a payment made to an e-payment system.” Id. 6:59-63. “Payment
`
`for the data item or items requested may either be made directly to the system owner
`
`or may be made to an e-payment system.” Id. 21:6-8. “E-payment systems [] are coupled
`
`to banks” and may be provided in accordance with cash compliant standards such as
`
`MONDEX, Proton, and/or Visa. Id. 13:46-58. And
`
`Claim 2 explicitly describes storing payment data as well as restricting access to
`
`content based on payment, and therefore clearly relates to a financial activity and
`
`providing a financial service. See CBM2013-00020, Pap. 14 at 9-10 (“the electronic
`
`transfer of money is a financial activity, and allowing such a transfer amounts to
`
`12
`
`
`
` Covered Business Method Patent Review
`United States Patent No. 7,334,720
`
`providing a financial service.”). See also AIA § 18(d)(1); 37 C.F.R. § 42.301(a). See also
`
`77 Fed. Reg. 48,734, 48,735 (Aug. 14, 2012) (“[T]he definition of [CBM] was drafted
`
`to encompass patents ‘claiming activities that are financial in nature, incidental to a financial
`
`activity or complementary to a financial activity.’”) (citation omitted).3
`
`2.
`Further, claim 2 is not a “technological invention” that would trigger the excep-
`
`Claim 2 Does Not Cover A Technological Invention
`
`tion in AIA § 18(d)(1), because it does not claim “subject matter as a whole [that] re-
`
`cites a technological feature that is novel and unobvious over the prior art[] and solves a
`
`technical problem using a technical solution.” § 42.301(b). To the contrary, the patent makes
`
`clear that its claimed “data carrier” (including “memory”) was commonplace.
`
`(a) Claim 2 Does Not Recite A Technological Feature
`That Is Novel and Unobvious
`
`First, no “technological feature” of claim 2 is novel and unobvious. The PTO
`
`confirmed that “[m]ere recitation of known technologies, such as computer hardware,
`
`communication or computer networks, software, memory, computer-readable storage
`
`medium, scanners, display devices or databases, or specialized machines, such as an
`
`
`3 Claim 14, which requires, inter alia, “reading payment data,” “forwarding payment
`
`data,” and an “access rule specifying at last one condition . . . being dependent upon
`
`the amount of payment associated with the payment data forwarded to the payment
`
`validation system,” is similarly financial in nature. See CBM2014-00104, Pap. 8, 8-13.
`
`13
`
`
`
` Covered Business Method Patent Review
`United States Patent No. 7,334,720
`
`ATM or point of sale device,” or “[r]eciting the use of known prior art technology to
`
`accomplish a process or method, even if that process or method is novel and non-
`
`obvious” will “not typically render a patent a technological invention.” E.g., 77 Fed.
`
`Reg. 48,756 48,764 (Aug. 14, 2012). As its language makes clear, claim 2 requires no
`
`particularized hardware, but instead simply relates to the idea of providing electronic
`
`data in exchange for payment and restricting access based on the amount of payment.
`
`The claim involves no “technology” at all other than, at most, use of a data carrier, a
`
`payment validation system, and a data supplier. Ex. 1201. The patent confirms this
`
`data carrier is in no way novel or unobvious, explaining it may be¸ inter alia, based on a
`
`“standard smart card” (id. 11:37-38), an “electronic memory card” (id. 3:29), or a so-
`
`called “smart Flash card,” (id. 17:25), all commonplace at the time, see id. 11:37-38;
`
`14:1-2. Indeed, the ‘720 explains a smart Flash card is “an IC card . . . incorporating a
`
`processor and Flash data memory, preferably of large capacity” (id. 17:25-28), and in-
`
`corporates by reference, for additional details, the ISO series of standards. Id. 17:28-
`
`33; see also Figs. 2, 9; 11:36-53; 17:34-18:23.4
`
`4 Claim 14 similarly requires no technology at all other than, at most, a data carrier,
`
`payment validation system, and data supplier. Payment validation systems were also
`
`well-known. See Ex. 1201 13:57-61. The patent explains that “[t]he payment validation
`
`system may be part of the data supplier’s computer systems or it may be a separate e-
`
`payment system.” Id. 8:64-66. “E-payment systems are coupled to banks . . . These provide
`
`14
`
`
`
` Covered Business Method Patent Review
`United States Patent No. 7,334,720
`
`Further, the idea of providing access to data in exchange for a payment, as
`
`claimed, was known. See, e.g., id. 5:4-7 (“Thus where the data carrier stores, for exam-
`
`ple, music, the purchase outright option may be equivalent to the purchase of a compact disc
`
`(CD)”). See also, e.g., Ex. 1207; Ex. 1206 Abstract, 1:67-2:9; Ex. 1208 Abstract, 4:27-35.
`
`The 720’s alleged invention merely combines a known payment validation system with
`
`the known ability to download data and restrict access to the data based on that pay-
`
`ment. But “combining prior art structures to achieve a normal, expected, or predicta-
`
`ble result of that combination” does not “render a patent a technological invention.”
`
`77 Fed. Reg. 48755 (Aug. 14, 2012) at 48764. Access rules, and restricting access to
`
`downloaded data based on the amount of payment was also known. E.g., Ex. 1214
`
`an e-payment system according to, for example, MONDEX, Proton, and/or Visa cash
`
`compliant standards . . .” Id. 13:46-58. The “data supplier” of the claims is not a techno-
`
`logical component, and does not require any specific hardware. See Ex. 1201 6:14-16;
`
`6:56-58. Rather, it is simply a supplier of online data. Id. 5:64-65. See also id. 6:56-58
`
`(“The computer system is operated by a data supplier or a data supplier ‘system owner’ for
`
`providing content data to the data carrier.”); 8:13-15. The patent states that the physi-
`
`cal embodiment of the system, including data providers/suppliers, is not critical. Ex.
`
`1201 12:11-13, 38-41; Fig. 4(b). Data suppliers were well known long before the
`
`claimed priority date. See id. 1:26-41. See CBM2014-00104, Pap. 8, 8-13 (finding claim
`
`14 to satisfy CBM standing requirement).
`
`15
`
`
`
`186:15-24; 172:32-35; 264:62-265:16; 128:23-36; Ex. 1215 7:14-16; 10:25-28.5
`
` Covered Business Method Patent Review
`United States Patent No. 7,334,720
`
`
`The state of the art at the time, and the detailed prior art analysis provided be-
`
`low, further reflects claim 2 does not recite a technological feature that is novel and
`
`nonobvious. See, e.g., Section II, supra; Section IV.C, infra. Claim 2 concerns nothing
`
`more than a non-technical idea of selling data in exchange for payment and restricting
`
`access to that data depending on payment. Even apart from its other failures to trigger
`
`the statutory exception, for these reasons alone claim 2 would not be techn