throbber
Covered Business Method Patent Review
`United States Patent No. 7,334,720
`
`IN THE UNITED STATES PATENT AND TRADEMARK OFFICE
`
`Petitioner: Apple Inc.
`
`Attorney Docket No.:
`
` 104677-5008-819
`Customer No. 28120
`

`Inventor: Hulst et al.
`United States Patent No.: 7,334,720 §
`Formerly Application No.: 11/336,758 §
`Issue Date: February 26, 2008

`Filing Date: January 19, 2006

`Former Group Art Unit: 2876

`Former Examiner: Steven S. Paik

`
`For: Data Storage and Access Systems
`
`MAIL STOP PATENT BOARD
`Patent Trial and Appeal Board
`United States Patent and Trademark Office
`Post Office Box 1450
`Alexandria, Virginia 22313-1450
`
`PETITION FOR COVERED BUSINESS METHOD PATENT REVIEW OF
`UNITED STATES PATENT NO. 7,334,720 PURSUANT TO 35 U.S.C.
`§ 321, 37 C.F.R. § 42.304
`
`
`
`

`
`
`
` Covered Business Method Patent Review
`United States Patent No. 7,334,720
`
`
`TABLE OF CONTENTS
`
`INTRODUCTION ....................................................................................................... 1
`I.
`II. OVERVIEW OF FIELD OF THE CLAIMED INVENTION ......................... 5
`III. PETITIONER HAS STANDING ............................................................................ 9
`A.
`The ’720 Patent Is a Covered Business Method Patent ............................... 9
`1.
`Exemplary Claim 14 Is Financial In Nature ...................................... 9
`2.
`Claim 14 Does Not Cover A Technological Invention ................. 12
`(a)
`Claim 14 Does Not Recite A Technological
`Feature That Is Novel and Unobvious .............................. 12
`Claim 14 Does Not Solve A Technical Problem
`Using A Technical Solution ................................................. 14
`Related Matters and Mandatory Notice Information; Petitioner Is a Real
`Party In Interest Sued for and Charged With Infringement ..................... 16
`IV. DETAILED EXPLANATION OF REASONS FOR RELIEF REQUESTED,
`SHOWING IT IS MORE LIKELY THAN NOT THAT AT LEAST ONE
`CHALLENGED CLAIM IS UNPATENTABLE ............................................... 17
`A.
`Claim Construction .......................................................................................... 19
`B.
`The Challenged Claims Are Unpatentable Under 35 U.S.C. § 101 .......... 22
`1.
`Claims Are Directed To Abstract Ideas ........................................... 23
`2.
`Claims Do Not Disclose An “Inventive Concept” That Is
`“Significantly More” Than an Abstract Idea ................................... 26
`Field Of Use Limitations Cannot Create Patent Eligibility ........... 27
`Generic Computer Implementation Cannot Transform
`Abstract Ideas Into Patent Eligible Inventions ............................... 27
`Functional Nature Confirms Preemption and Ineligibility ............ 32
`5.
`6. Machine-or-Transformation Test Confirms Ineligibility ............... 33
`The Challenged Claims Are Unpatentable Under 35 U.S.C. § 103 .......... 34
`C.
`CONCLUSION........................................................................................................... 79
`
`V.
`
`ii
`
`
`
`(b)
`
`B.
`
`3.
`4.
`
`

`
` Covered Business Method Patent Review
`United States Patent No. 7,334,720
`
`
`
`EXHIBIT LIST
`1301
`U.S. Patent No. 7,334,720
`
`1302
`
`1303
`
`1304
`
`1305
`
`1306
`
`1307
`
`1308
`
`1309
`
`1310
`
`1311
`
`1312
`
`1313
`
`1314
`
`1315
`
`1316
`
`1317
`
`1318
`
`1319
`
`1320
`
`Plaintiffs’ First Amended Complaint
`
`U.S. Patent No. 5,925,127
`
`U.S. Patent No. 5,940,805
`
`Russell Housley and Jan Dolphin, “Metering: A Pre-pay Technique,”
`Storage and Retrieval for Image and Video Databases V, Conference
`Volume 3022, 527 (January 15, 1997)
`U.S. Patent No. 4,999,806
`
`U.S. Patent No. 5,675,734
`
`U.S. Patent No. 4,878,245
`
`File History for U.S. Patent No. 7,334,720
`
`U.S. Patent No. 7,942,317
`
`U.S. Patent No. 5,103,392
`
`U.S. Patent No. 5,530,235
`
`U.S. Patent No. 5,629,980
`
`U.S. Patent No. 5,915,019
`
`European Patent Application, Publication No. EP0809221A2
`
`International Publication No. WO 99/43136
`
`JP Patent Application Publication No. H11-164058 (translation)
`
`Eberhard von Faber, Robert Hammelrath, and Frank-Peter Heider,
`“The Secure Distribution of Digital Contents,” IEEE (1997)
`Declaration of Anthony J. Wechselberger In Support of Apple Inc.’s
`Petition for Covered Business Method Patent Review
`U.S. Patent No. 8,033,458
`
`iii
`
`

`
` Covered Business Method Patent Review
`United States Patent No. 7,334,720
`
`
`EXHIBIT LIST
`Declaration of Michael P. Duffey In Support of Apple Inc.’s Petition
`1321
`for Covered Business Method Patent Review
`Declaration of Megan F. Raymond In Support of Apple Inc.’s Peti-
`tion for Covered Business Method Patent Review
`Claim Construction Memorandum Opinion from Smartflash LLC v.
`Apple Inc., No. 6:13cv447 (Dkt. 229)
`File History for U.S. Patent No. 8,061,598
`
`1322
`
`1323
`
`1324
`
`1325
`
`1326
`
`1327
`
`1328
`
`1329
`
`1330
`
`1331
`
`1332
`
`1333
`
`1334
`
`1335
`
`1336
`
`U.S. Patent No. 4,337,483
`
`U.S. Patent No. 7,725,375
`
`International Publication No. WO 95/34857
`
`JP Patent Application Publication No. H10-269289 (translation)
`
`File History for U.S. Patent No. 7,942,317
`
`File History for U.S. Patent No. 8,033,458
`
`U.S. Patent No. 8,061,598
`
`U.S. Patent No. 8,118,221
`
`File History for U.S. Patent No. 8,118,221
`
`U.S. Patent No. 8,336,772
`
`File History for U.S. Patent No. 8,336,772
`
`U.S. Patent No. 5,646,992
`
`iv
`
`

`
` Covered Business Method Patent Review
`United States Patent No. 7,334,720
`
`I.
`
`INTRODUCTION
`
`Pursuant to § 321 and Rule 42.304, 1 the undersigned, on behalf of and in a rep-
`
`resentative capacity for Apple Inc. (“Petitioner”), petitions for covered business
`
`method review of claims 3 and 13-15 (“challenged claims”) of U.S. Pat. No. 7,334,720
`
`(“the ’720 Patent” or “’720”), issued to Smartflash Limited and currently assigned to
`
`Smartflash LLC (“Patentee”). Petitioner asserts it is more likely than not that the chal-
`
`lenged claims are unpatentable for the reasons herein and requests review of, and
`
`judgment against, claims 3 and 13-15 as unpatentable under § 101 and § 103.
`
`As discussed in Sec. III.B, infra, Petitioner has concurrently filed a second CBM
`
`Petition requesting judgment against different ’720 claims under § 101 and § 103. The
`
`Director, pursuant to Rule 325(c), may determine that merger, or at minimum coordi-
`
`nation, of these proceedings, is appropriate. Petitioner previously filed CBM2014-
`
`00104/105 seeking review of the ’720 under §§ 102 and 103. In its Decision Denying
`
`Institution, the Board construed “access rule” as “a rule specifying a condition under
`
`which access to content is permitted,” id., Pap. 9, at 8, and determined Petitioner had
`
`not shown it was more likely than not that it would prevail in demonstrating that Stef-
`
`ik and Poggio, Maari, and/or Sato rendered obvious limitations related to “access
`
`
`1 Petitioner is demonstrating, in pending litigation, that these claims are invalid for
`
`numerous additional reasons. All section cites herein are to 35 U.S.C. or 37 C.F.R.,
`
`as the context indicates, and all emphasis herein is added unless otherwise noted.
`
`
`
`

`
` Covered Business Method Patent Review
`United States Patent No. 7,334,720
`
`rule[s].” Id. Pap. 9, at 13-20. In light of the Board’s decision, Petitioner now identifies
`
`additional prior art—Kopp and Smith (Exs. 1304, 1227)—with explicit disclosures of
`
`the limitations related to “access rules,” as construed by the Board. Kopp, e.g., de-
`
`scribes a vending system allowing a user to specify a desired extent of usage, pay for
`
`only that amount of usage, and then receive data limited to the purchased usage
`
`amount (e.g., Ex. 1304 2:50-65), while Smith provides express disclosure of a software
`
`vending system allowing a user to pre-pay license fees proportional to the value re-
`
`ceived from using software, rather than paying all or nothing (e.g., Ex. 1327 6:1-5;
`
`18:4-33). Petitioner has also identified additional disclosures in Stefik and Poggio con-
`
`cerning these limitations as construed, further confirming a POSA2 would have found
`
`it obvious and routine to implement the system disclosed by Stefik and Poggio using
`
`the expressly advantageous teachings of Kopp and/or Smith, detailed in §IV.C, infra.
`
`See, e.g., Ex. 1319 ¶¶ 66-81.
`
`The challenged claims merely recite steps and corresponding systems well-
`
`known in the field of data storage and access, including use of a “portable data carrier
`
`2 References to a POSA refer to the knowledge or understanding of a person of ordi-
`
`nary skill in the art (“POSA”) as of October 25, 1999 who would have at least a B.S.
`
`in E.E., C.S., or a telecommunications related field, and at least 3 years of industry
`
`experience that included client-server data/information distribution and management
`
`architectures. See Ex. 1319 ¶¶ 27, 30 n.3.
`
`2
`
`

`
` Covered Business Method Patent Review
`United States Patent No. 7,334,720
`
`for storing and paying for data and to computer systems for providing access to data
`
`to be stored.” E.g., Ex. 1301 1:5-8. Independent Claim 14, for example, recites six ru-
`
`dimentary steps relating to data storage and access—(A) reading payment data from a
`
`data carrier, (B) forwarding that data, (C) retrieving data, (D) writing the retrieved
`
`data, (E) receiving f at least one access rule; and (F) writing that rule:
`
`14. A method of providing data from a data supplier to a data carrier,
`the method comprising:
`reading payment data from the data carrier;
`forwarding the payment data to a payment validation system;
`retrieving data from the data supplier;
`writing the retrieved data into the data carrier;
`receiving at least one access rule from the data supplier; and
`writing the at least one access rule into the data carrier, the at least one
`access rule specifying at least one condition for accessing the retrieved
`data written into the data carrier, the at least one condition being de-
`pendent upon the amount of payment associated with the payment data
`forwarded to the payment validation system.
`Ex. 1301. But at the ’720’s earliest claimed priority date, these simple elements and
`
`their combination were all known to any POSA. The patent itself acknowledges that the
`
`idea of providing access to data in exchange for a payment (e.g., purchase of music on
`
`a CD) was well known at the time, e.g., id. 5:4-7 (“where the data carrier stores . . . mu-
`
`sic, the purchase outright option may be equivalent to the purchase of a compact disc (CD)”),
`
`and the prior art was teeming with disclosures of this basic concept.
`
`3
`
`

`
` Covered Business Method Patent Review
`United States Patent No. 7,334,720
`
`Moreover, as its language makes clear, Claim 14 involves no “technology” at all
`
`other than “a payment validation system” and “a data carrier”—both of which the pa-
`
`tent concedes were well known and entirely commonplace at the time. E.g., id. 3:29,
`
`8:64-66, 11:36-53, 13:46-58, 14:1-2, 17:23-18:23, 18:38, Figs. 2, 9. Thus, as the intrinsic
`
`record reflects, Claim 14 recites nothing more than a method for retrieving and stor-
`
`ing data from a data supplier while reading and forwarding payment data for valida-
`
`tion and receiving and writing an access rule for the stored data. The other challenged
`
`claims are nothing but variations on this same simple and well-known theme, with the
`
`addition, in the challenged “system” claims, of equally generic components (e.g., data
`
`terminals with interfaces, processors, program stores and code).3 E.g., id. 12:38-41
`
`(“The physical embodiment of the system is not critical and a skilled person will understand that the
`
`terminals, data processing systems and the like can all take a variety of forms.”); Fig. 4b.
`
`3 Dependent claim 15, e.g., simply adds steps involving receiving payment validation
`
`data and transmitting at least a portion of the data to the data supplier. Claim 3
`
`simply recites a “data access terminal” with interfaces, a processor, a program store
`
`and “code” to perform similar steps, along with the processing of data access requests
`
`and various data (e.g., payment data and payment validation data) via the application of
`
`access and use rules. And claim 13 simply adds to claim 3 that the data access terminal
`
`is “integrated with a mobile communication device, a personal computer, an au-
`
`dio/video player, and/or a cable or satellite television interface device.” See Ex. 1301.
`
`4
`
`

`
` Covered Business Method Patent Review
`United States Patent No. 7,334,720
`
`Indeed, as confirmed by the recent decision in Alice Corp. Pty, Ltd. v. CLS Bank
`
`Int’l, 134 S. Ct. 2347 (2014)—decided after Petitioner’s original challenges to the ’720
`
`were filed—the challenged claims are also directed to patent-ineligible subject matter
`
`under § 101. As the Board noted previously, “the ’720 patent makes clear that the as-
`
`serted novelty of the invention is not in any specific improvement of software or
`
`hardware, but in the method of controlling access to data,” CBM2014-00104, Pap. 9, at 12,
`
`and the challenged claims are directed to nothing more than the unpatentable abstract
`
`idea of paying for and controlling access to data, with at most the addition of well-
`
`known, routine and conventional features—in particular, generic computer implemen-
`
`tation that cannot confer patentability on these patent-ineligible abstractions. E.g., Al-
`
`ice, 134 S. Ct. at 2359-60. Each challenged claim recites ineligible subject matter and is
`
`also obvious; thus, each is unpatentable.
`
`II. OVERVIEW OF FIELD OF THE CLAIMED INVENTION
`By October 25, 1999, electronic sale, distribution, and content protection for
`
`digital products all would have been well-known to a POSA, and their combination as
`
`claimed also would have been at minimum obvious. See, e.g., Ex. 1319 § V. In 1991,
`
`for example, U.S. Pat. No. 4,999,806, disclosed a system and method for sale and dis-
`
`tribution of digital products (e.g., software) by phone, and for content protection. See,
`
`e.g., Ex. 1306 Abstract (“central station distributes software by telephone[,]accepts credit card
`
`information, transmits an acceptance code … After verifying the credit card information, the station
`
`5
`
`

`
` Covered Business Method Patent Review
`United States Patent No. 7,334,720
`
`calls the purchaser back and continues with the transaction.”); 1:67-2:9 (describing “means for
`
`selling and distributing protected software using standard telephone lines” and “permit[ting] the pur-
`
`chaser to rent the protected software for a specific number of runs”). Ex. 1306 thus discloses
`
`making different types of access available, e.g., purchase vs. rental, with a Control
`
`Transfer Program and Primary Protection Program that ensure the computer receiv-
`
`ing a downloaded program does not have another program present that could create
`
`unauthorized copies. See id. Abstract; 2:65-3:23. See also Ex. 1319 ¶ 32.
`
`In April 1992, U.S. Pat. No. 5,103,392, disclosed use-based charging for digital
`
`products, including “user-specific credit data storage means for storing data identifying
`
`the user … and indicating credit for payment capacity, use time length, or the like of the user,”
`
`as well as “[1] use decision means for determining permission to use the program … on the ba-
`
`sis of program-specific data supplied from the program storage means or user-specific credit
`
`data supplied from the user-specific credit data storage means, the use decision means de-
`
`livering either an affirmative or negative signal corresponding to results of the decision[, and
`
`[2]] program use history storage means connected to the use decision means for storing pro-
`
`gram use history data . . ..” See, e.g., Ex. 1311 1:64-2:17. Ex. 1311’s emphasis on assuring
`
`permission to access a program and compensation to providers for use underscores
`
`the art’s focus on digital rights management (“DRM”), over eight years before Smart-
`
`flash’s claimed October 25, 1999 priority date. See also Ex. 1319 ¶ 35.
`
`In 1997, Exhibit 1218 (“von Faber”) observed that “[e]lectronic commerce systems
`
`6
`
`

`
` Covered Business Method Patent Review
`United States Patent No. 7,334,720
`
`dealing with the distribution of digital contents like software or multimedia data have to couple
`
`the use of the provided digital goods with a prior payment for the goods in a way which cannot be
`
`bypassed,” proposing a system where customers purchase keys to utilize distributed
`
`encrypted content. E.g., id. 7 (a “solution is to distribute the contents in encrypted form, and to
`
`have the customer pay for the key which he needs to transform the encrypted content in an usable
`
`form.”), 8 (“The Content Provider provides digital contents in encrypted form being distribut-
`
`ed by the Content Distributor . . . The Authorisation System permits the distribution of the appro-
`
`priate key after settling of the fees payable by the Customer, who will enjoy the decrypted digi-
`
`tal contents.”), Fig. 1. Von Faber states its system could be used for a variety of
`
`known distribution and payment methods, and further addressed the known issue of
`
`payment distribution to content providers. See, e.g., id. 13 (“Different methods can be used
`
`to distribute the encrypted contents (standard techniques) . . . Different electronic payment meth-
`
`ods can be integrated . . . This flexibility leads to the fact that totally different authorisation methods
`
`can be integrated.”; “The system automatically divides the package price (payments) and guarantees
`
`that the money is transferred to each Content Provider.”). See also Ex. 1319 ¶¶ 37-39.
`
`And U.S. Pat. No. 5,915,019 (“Ginter”), issued in June 1999, disclosing “sys-
`
`tems and methods for secure transaction management and electronic rights protection.” See, e.g.,
`
`Ex. 1314 Abstract. Ginter’s system helps “ensure that information is accessed and used
`
`only in authorized ways, and maintain the integrity, availability, and/or confidentiality of the in-
`
`formation,” and discloses that “[a]ll participants … have the innate ability to partici-
`
`7
`
`

`
` Covered Business Method Patent Review
`United States Patent No. 7,334,720
`
`pate in any role,” e.g., id. 255:22-43, highlighting the known flexibility in such distribu-
`
`tion systems, underscoring that combinations between and among disclosures of such
`
`systems would have been obvious to a POSA. See also, e.g., Ex. 1319 ¶¶ 40-41.
`
`Content storage and utilization on portable devices, including mobile commu-
`
`nication devices such as cellular phones, was also well-known. Ex. 1316 (pub’d Aug.
`
`26, 1999) describes a cell phone for storing and accessing digital content. See, e.g., id.
`
`3:7-13 (“Because of its integration into the cellular phone, the digital entertainment module can
`
`share components already present in the cellular phone. [T]he use of solid state RAM or ROM, as
`
`opposed to disc storage, eliminates the need for bounce control circuitry. This enables
`
`the disclosed invention to provide cellular communications and entertainment during leisure activi-
`
`ties.”). And Exhibit 1217, “Portable Music Selection and Viewing System” (pub’d June
`
`18, 1999), discloses storing and playing media on mobile devices, e.g., using a remova-
`
`ble IC card. See, e.g., Ex. 1317 ¶ 9 (“portable music selection viewing device 70 pro-
`
`vides a removable storage device 76 [which] is a memory card similar to, for example…an IC
`
`card. [T]he user can store the music software from another audio unit into the storage device 76 and
`
`enjoy music by inserting this storage unit 76 into this portable … device 70.”); ¶ 13 (“music
`
`storage medium 250 such as a magnetic card, magnetic tape, a CD, a DVD, or a
`
`memory card such as an IC card stores the music software”). See also Ex. 1319 ¶¶ 42-43. As
`
`these and the examples in § IV.C illustrate, the prior art was rife with discussion of the
`
`same supposed “invention” memorialized in the ’720’s challenged claims.
`
`8
`
`

`
` Covered Business Method Patent Review
`United States Patent No. 7,334,720
`
`
`III. PETITIONER HAS STANDING
`A.
`The ’720 Patent a “covered business method patent” under § 18(d)(1) of the
`
`The ’720 Patent Is a Covered Business Method Patent
`
`AIA, and Petitioner certifies it is available for review under § 42.304(a). See also
`
`CBM2014-00104, Pap. 8, 8-13 (finding claim 14 satisfies requirement). Although nu-
`
`merous claims qualify, a patent with even one claim covering a covered business
`
`method is considered a CBM patent. See CBM 2012-00001, Doc. 36 at 26; 77 Fed. Reg.
`
`48,709 (Aug. 14, 2012). Petitioner thus addresses exemplary claim 14 (quoted above).
`
`1.
`A CBM patent is “a patent that claims a method or corresponding apparatus
`
`Exemplary Claim 14 Is Financial In Nature
`
`for performing data processing or other operations used in the practice, administra-
`
`tion, or management of a financial product or service, except that the term does not
`
`include patents for technological inventions.” AIA §18(d)(1); 37 C.F.R. §42.301.
`
`“[T]he definition of covered business method patent was drafted to encompass pa-
`
`tents claiming activities that are financial in nature, incidental to a financial activity or comple-
`
`mentary to a financial activity.” 77 Fed. Reg. 48,734, 48,735 (Aug. 14, 2012) (citing 157
`
`Cong. Rec. S5432 (daily ed. Sept. 8, 2011) (statement of Sen. Schumer)). “[F]inancial
`
`product or service” is to be interpreted broadly, id., and “financial . . . simply means
`
`relating to monetary matters”—it does not require any link to traditional financial in-
`
`dustries such as banks. See, e.g., CBM2012-00001, Pap. 36 at 23. The Board has previ-
`
`ously found, e.g., that a claim for “transferring money electronically via a telecommu-
`
`9
`
`

`
` Covered Business Method Patent Review
`United States Patent No. 7,334,720
`
`nication line to the first party . . . from the second party” met the financial product or
`
`service requirement, concluding that “the electronic transfer of money is a financial
`
`activity, and allowing such a transfer amounts to providing a financial service.”
`
`CBM2013-00020, Pap. 14 at 9-10. 4 See also, e.g., CBM2013-00017, Pap. 8 at 5-6.
`
`The ’720 Patent relates to the idea of providing electronic data in exchange for
`
`payment and restricting access to data based on payment amount. See AIA § 18(d)(1);
`
`37 C.F.R. § 42.301(a); Ex. 1301 1:64-2:3. Indeed, in asserting the patent, Smartflash
`
`conceded the alleged invention relates to a financial activity or transaction, stating that
`
`“[t]he patents-in-suit generally cover a portable data carrier for storing data and man-
`
`aging access to the data via payment information and/or use status rules. The patents-
`
`in-suit also generally cover a computer network . . . that serves data and manages ac-
`
`cess to data by, for example, validating payment information.” Ex. 1302.
`
`The ’720 Patent emphasizes payment in describing the claimed invention:
`According to the present invention there is therefore provided a method
`of providing portable data comprising providing a portable data storage
`device comprising downloaded data storage means and payment vali-
`dation means; providing a terminal for internet access; coupling the
`portable data storage device to the terminal; reading payment infor-
`mation from the payment validation means using the terminal; validat-
`
`
`4 Indeed, these aspects of claim 14 are generally similar to those of the claim found to
`
`convey CBM standing in CBM2013-00020, Pap. 8, at 9-13.
`
`10
`
`

`
` Covered Business Method Patent Review
`United States Patent No. 7,334,720
`
`
`ing the payment information; and downloading data into the portable
`storage device from a data supplier.
`Ex. 1301 1:46-55. See also id. 1:56-57 (“Another aspect of the invention provides a cor-
`
`responding mobile data retrieval device…”). Indeed, the specification confirms that
`
`the “portable data carrier” of the invention is “for storing and paying for data,” id.
`
`1:6-8, and the “payment data” forwarded to the “payment validation system” “may ei-
`
`ther be data relating to an actual payment made to the data supplier, or it may be a record of a
`
`payment made to an e-payment system.” Id. 6:59-63. “Payment for the data item or items re-
`
`quested may either be made directly to the system owner or may be made to an e-
`
`payment system.” Id. 21:6-8. “E-payment systems [] are coupled to banks” and may be
`
`provided in accordance with cash compliant standards such as MONDEX, Proton,
`
`and/or Visa. Id. 13:46-58. And Claim 14 explicitly describes electronically transferring
`
`money and allowing such a transfer, as well as restricting access based on payment (e.g.,
`
`“the at least one condition being dependent upon the amount of payment associated with the
`
`payment data forwarded to the payment validation system”), and clearly relates to a financial
`
`activity and providing a financial service. See CBM2013-00020, Pap. 14 at 9-10 (“the
`
`electronic transfer of money is a financial activity, and allowing such a transfer
`
`amounts to providing a financial service.”). See also AIA § 18(d)(1); 37 C.F.R.
`
`§ 42.301(a). See also 77 Fed. Reg. 48,734, 48,735 (Aug. 14, 2012) (“[T]he definition of
`
`[CBM] was drafted to encompass patents ‘claiming activities that are financial in nature, in-
`
`cidental to a financial activity or complementary to a financial activity.’”) (citation omitted).
`
`11
`
`

`
` Covered Business Method Patent Review
`United States Patent No. 7,334,720
`
`
`2.
`Further, claim 14 is not a “technological invention” that would trigger the ex-
`
`Claim 14 Does Not Cover A Technological Invention
`
`ception in AIA § 18(d)(1), because it does not claim “subject matter as a whole [that]
`
`recites a technological feature that is novel and unobvious over the prior art[] and solves a
`
`technical problem using a technical solution.” § 42.301(b). To the contrary, the patent makes
`
`clear that its claimed “data carrier,” “payment validation system,” and “data supplier,”
`
`were commonplace and could be implemented using well-known industry standards.
`
`(a) Claim 14 Does Not Recite A Technological Feature
`That Is Novel and Unobvious
`
`First, no “technological feature” of claim 14 is novel and unobvious. The PTO
`
`confirmed that “[m]ere recitation of known technologies, such as computer hardware, communica-
`
`tion or computer networks, software, memory, computer-readable storage medium, scanners, display
`
`devices or databases, or specialized machines, such as an ATM or point of sale de-
`
`vice,” or “[r]eciting the use of known prior art technology to accomplish a process or method,
`
`even if that process or method is novel and non-obvious” will “not typically render a patent a
`
`technological invention.” E.g., 77 Fed. Reg. 48,756 48,764 (Aug. 14, 2012). Claim 14’s
`
`language makes clear it requires no particularized hardware, but instead simply relates
`
`to the idea of providing electronic data in exchange for payment and restricting access
`
`based on the amount of payment. The claim involves no “technology” at all other than, at
`
`most, use of a data carrier, a payment validation system, and a data supplier. Ex. 1301.
`
`The patent confirms this data carrier is in no way novel or unobvious, explaining it
`
`12
`
`

`
` Covered Business Method Patent Review
`United States Patent No. 7,334,720
`
`may be¸ inter alia, based on a “standard smart card” (id. 11:37-38), an “electronic
`
`memory card” (id. 3:29), or a so-called “smart Flash card,” (id. 17:25), all commonplace at
`
`the time, see id. 11:37-38; 14:1-2. Indeed, the ’720 explains a smart Flash card is “an IC
`
`card . . . incorporating a processor and Flash data memory, preferably of large capaci-
`
`ty” (id. 17:25-28), and incorporates by reference, for additional details, the ISO series of
`
`standards. Id. 17:28-33; see also Figs. 2, 9; 11:36-53; 17:34-18:23.
`
`Payment validation systems were also well-known. See Ex. 1301 13:57-61.
`
`The ’720 explains “[t]he payment validation system may be part of the data supplier’s
`
`computer systems or it may be a separate e-payment system.” Id. 8:64-66. “E-payment
`
`systems are coupled to banks . . . These provide an e-payment system according to, for example,
`
`MONDEX, Proton, and/or Visa cash compliant standards . . .” Id. 13:46-58. The “data
`
`supplier” of the claims is also not a technological component, and requires no specific
`
`hardware, see Ex. 1301 6:14-16; 6:56-58, but is, instead, simply a supplier of online da-
`
`ta. Id. 5:64-65. See also id. 6:56-58 (“The computer system is operated by a data supplier
`
`or a data supplier ‘system owner’ for providing content data to the data carrier.”); 8:13-15.
`
`The ’720 explains the system’s physical embodiment, including data provid-
`
`ers/suppliers, is not critical, Ex. 1301 12:11-13, 38-41; Fig. 4(b), and data suppliers
`
`were well known long before the claimed priority date. See id. 1:26-41. Further, the
`
`idea of providing access to data in exchange for payment, as claimed, was known. See,
`
`e.g., id. 5:4-7 (“Thus where the data carrier stores, for example, music, the purchase
`
`13
`
`

`
` Covered Business Method Patent Review
`United States Patent No. 7,334,720
`
`outright option may be equivalent to the purchase of a compact disc (CD).”). See also, e.g., Ex.
`
`1307; Ex. 1306 Abstract, 1:67-2:9; Ex. 1308 Abstract, 4:27-35. The ’720’s alleged in-
`
`vention merely combines a known payment validation system with the known ability
`
`to download data and restrict access to the data based on that payment. But “combin-
`
`ing prior art structures to achieve a normal, expected, or predictable result of that
`
`combination” does not “render a patent a technological invention.” 77 Fed. Reg.
`
`48755 (Aug. 14, 2012) at 48764. Access rules, and restricting access to downloaded
`
`data based on the amount of payment was also known. E.g., Ex. 1314 186:15-24;
`
`172:32-35; 264:62-265:16; 128:23-36; Ex. 1315 7:14-16; 10:25-28.
`
`The state of the art at the time, and the detailed prior art analysis provided be-
`
`low, further reflects claim 14 does not recite a technological feature that is novel and
`
`nonobvious. See, e.g., Section II, supra; Section IV.C, infra. Claim 14 concerns nothing
`
`more than a non-technical idea of selling data in exchange for payment and restricting
`
`access to that data depending on payment. Even apart from its other failures to trigger
`
`the statutory exception, for these reasons alone claim 14 would not be technological.
`
`(b) Claim 14 Does Not Solve A Technical Problem Using
`A Technical Solution
`
`Claim 14 also does not solve a technical problem using a technical solution be-
`
`cause there was no technical problem to begin with. While a POSA already would have
`
`known how to sell data over the Internet, see, e.g., Ex. 1315 Fig. 7; 1:50-55, 10:41-53,
`
`the patent nonetheless describes the “problem” the invention is intended to solve as
`
`14
`
`

`
` Covered Business Method Patent Review
`United States Patent No. 7,334,720
`
`the business problem of data piracy: users were downloading content, such as MP3s, with-
`
`out paying, and providers were losing money. Id. 1:15-17, 26-41. However, a POSA
`
`would have known well before October 1999 how to sell electronic data, use payment
`
`authorization mechanisms, and provide electronic data based on payment. See, e.g., Ex.
`
`1315 Fig. 7; 1:56-59, 2:32-36; 9:56-10:25; see also, e.g., Ex. 1319 § V. The solution de-
`
`scribed in claim 14—using previously-known data access and previously-known data
`
`payment abilities—was also not “technical.” As the patent states, “[b]inding the data
`
`access and payment together allows the legitimate owners of the data to make the data
`
`available themselves over the internet without fear or loss of revenue, thus undermin-
`
`ing the position of data pirates.” Ex. 1301 1:66-2:3; see also id. 4:27-29. But the basic
`
`notion of coupling of data access to payment5, as claimed in the ’720, is not a tech-
`
`nical solution. Further, even if the solution were somehow deemed “technical” (it is
`
`not), this would not alter that there was no technical problem presented and ad-
`
`dressed by the ’720. As the Board stated in CBM 2012-00007, “[d]ifficulty implement-
`
`ing an automated or technical solution to a problem that is not technical does not trans-
`
`form that non-technical problem into a technical one.” P

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket