throbber
CBM2015-00029
`United States Patent No. 7,334,720 B2
`UNITED STATES PATENT AND TRADEMARK OFFICE
`
`____________
`
`BEFORE THE PATENT TRIAL AND APPEAL BOARD
`
`____________
`
`APPLE INC.,
`Petitioner,
`
`v.
`
`SMARTFLASH LLC,
`Patent Owner.
`
`
`____________
`
`Case CBM2015-00029
`Patent 7,334,720 B2
`
`____________
`
`
`CORRECTED PETITION FOR COVERED BUSINESS METHOD PA-
`TENT REVIEW OF UNITED STATES PATENT NO. 7,334,720 PUR-
`SUANT TO 35 U.S.C. § 321, 37 C.F.R. § 42.3041
`
`
`
`
`
`
`
`
`
`
`1 As directed by the Board in Paper 4, Petitioner hereby resubmits this Petition to ad-
`
`dress formality issues identified therein.
`
`
`
`

`
`
`
` CBM2015-00029
`United States Patent No. 7,334,720 B2
`
`
`TABLE OF CONTENTS
`
`B.
`
`C.
`
`3.
`4.
`
`INTRODUCTION ....................................................................................................... 1
`I.
`II. OVERVIEW OF FIELD OF THE CLAIMED INVENTION ......................... 4
`III. PETITIONER HAS STANDING ............................................................................ 7
`A.
`The ’720 Patent Is a Covered Business Method Patent ............................... 7
`1.
`Exemplary Claim 14 Is Financial In Nature ...................................... 7
`2.
`Claim 14 Does Not Cover A Technological Invention ................... 9
`Related Matters and Mandatory Notice Information; Petitioner Is a Real
`Party In Interest Sued for and Charged With Infringement ..................... 13
`IV. DETAILED EXPLANATION OF REASONS FOR RELIEF REQUESTED,
`SHOWING IT IS MORE LIKELY THAN NOT THAT AT LEAST ONE
`CHALLENGED CLAIM IS UNPATENTABLE ............................................... 14
`A.
`Claim Construction .......................................................................................... 16
`B.
`The Challenged Claims Are Unpatentable Under 35 U.S.C. § 101 .......... 19
`1.
`Claims Are Directed To Abstract Ideas ........................................... 20
`2.
`Claims Do Not Disclose An “Inventive Concept” That Is
`“Significantly More” Than an Abstract Idea ................................... 23
`Field Of Use Limitations Cannot Create Patent Eligibility ........... 23
`Generic Computer Implementation Cannot Transform
`Abstract Ideas Into Patent Eligible Inventions ............................... 24
`Functional Nature Confirms Preemption and Ineligibility ............ 28
`5.
`6. Machine-or-Transformation Test Confirms Ineligibility ............... 30
`The Challenged Claims Are Unpatentable Under 35 U.S.C. § 103 .......... 30
`1.
`Overview of Stefik ............................................................................... 30
`2. Motivation to Combine Stefik with Poggio ..................................... 33
`3. Motivation to Combine Stefik and Poggio with Kopp .................. 37
`4. Motivation to Combine Stefik with Poggio, Kopp, and
`Smith ...................................................................................................... 40
`Claims 3 and 13-15 are Obvious ........................................................ 42
`5.
`CONCLUSION........................................................................................................... 79
`
`V.
`
`ii
`
`

`
` CBM2015-00029
`United States Patent No. 7,334,720 B2
`
`
`
`EXHIBIT LIST
`1301
`U.S. Patent No. 7,334,720
`
`1302
`
`1303
`
`1304
`
`1305
`
`1306
`
`1307
`
`1308
`
`1309
`
`1310
`
`1311
`
`1312
`
`1313
`
`1314
`
`1315
`
`1316
`
`1317
`
`1318
`
`1319
`
`1320
`
`Plaintiffs’ First Amended Complaint
`
`U.S. Patent No. 5,925,127
`
`U.S. Patent No. 5,940,805
`
`Russell Housley and Jan Dolphin, “Metering: A Pre-pay Technique,”
`Storage and Retrieval for Image and Video Databases V, Conference
`Volume 3022, 527 (January 15, 1997)
`U.S. Patent No. 4,999,806
`
`U.S. Patent No. 5,675,734
`
`U.S. Patent No. 4,878,245
`
`File History for U.S. Patent No. 7,334,720
`
`U.S. Patent No. 7,942,317
`
`U.S. Patent No. 5,103,392
`
`U.S. Patent No. 5,530,235
`
`U.S. Patent No. 5,629,980
`
`U.S. Patent No. 5,915,019
`
`European Patent Application, Publication No. EP0809221A2
`
`International Publication No. WO 99/43136
`
`JP Patent Application Publication No. H11-164058 (translation)
`
`Eberhard von Faber, Robert Hammelrath, and Frank-Peter Heider,
`“The Secure Distribution of Digital Contents,” IEEE (1997)
`Declaration of Anthony J. Wechselberger In Support of Apple Inc.’s
`Petition for Covered Business Method Patent Review
`U.S. Patent No. 8,033,458
`
`iii
`
`

`
` CBM2015-00029
`United States Patent No. 7,334,720 B2
`
`
`EXHIBIT LIST
`Declaration of Michael P. Duffey In Support of Apple Inc.’s Petition
`1321
`for Covered Business Method Patent Review
`Declaration of Megan F. Raymond In Support of Apple Inc.’s Peti-
`tion for Covered Business Method Patent Review
`Claim Construction Memorandum Opinion from Smartflash LLC v.
`Apple Inc., No. 6:13cv447 (Dkt. 229)
`File History for U.S. Patent No. 8,061,598
`
`1322
`
`1323
`
`1324
`
`1325
`
`1326
`
`1327
`
`1328
`
`1329
`
`1330
`
`1331
`
`1332
`
`1333
`
`1334
`
`1335
`
`1336
`
`U.S. Patent No. 4,337,483
`
`U.S. Patent No. 7,725,375
`
`International Publication No. WO 95/34857
`
`JP Patent Application Publication No. H10-269289 (translation)
`
`File History for U.S. Patent No. 7,942,317
`
`File History for U.S. Patent No. 8,033,458
`
`U.S. Patent No. 8,061,598
`
`U.S. Patent No. 8,118,221
`
`File History for U.S. Patent No. 8,118,221
`
`U.S. Patent No. 8,336,772
`
`File History for U.S. Patent No. 8,336,772
`
`U.S. Patent No. 5,646,992
`
`iv
`
`

`
` CBM2015-00029
`United States Patent No. 7,334,720 B2
`
`I.
`
`INTRODUCTION
`
`Pursuant to § 321 and Rule 42.304, 2 the undersigned, on behalf of Apple Inc.
`
`(“Petitioner”), petitions for covered business method review of claims 3 and 13-15 of
`
`U.S. Pat. No. 7,334,720 (“the ’720 Patent” or “’720”), issued to Smartflash Limited
`
`and currently assigned to Smartflash LLC (“Patentee”). Petitioner asserts it is more
`
`likely than not that the challenged claims are unpatentable and requests review of, and
`
`judgment against, claims 3 and 13-15 as unpatentable under § 101 and § 103.
`
`Petitioner has concurrently filed a second CBM Petition against different ’720
`
`claims under § 101 and § 103. The Director, pursuant to Rule 325(c), may determine
`
`that merger, or at minimum coordination, of these proceedings, is appropriate. Peti-
`
`tioner previously filed CBM2014-00104/105 on the ’720 under §§ 102 and 103. In its
`
`Decision Denying Institution, the Board construed “access rule” as “a rule specifying
`
`a condition under which access to content is permitted,” id., Pap. 9, at 8, and deter-
`
`mined Petitioner had not shown it was more likely than not that it would prevail in
`
`demonstrating that Stefik and Poggio, Maari, and/or Sato rendered obvious limita-
`
`tions related to “access rule[s].” Id. Pap. 9, at 13-20. In light of the Board’s decision,
`
`Petitioner now identifies additional prior art—Kopp and Smith (Exs. 1304, 1327)—
`
`
`2 Petitioner is demonstrating, in pending litigation, that these claims are invalid for
`
`numerous additional reasons. All section cites herein are to 35 U.S.C. or 37 C.F.R., as
`
`the context indicates, and all emphasis herein is added unless otherwise noted.
`
`
`
`

`
`Covered Business Method Patent Review
`United States Patent No. 7,334,720
`
`with explicit disclosures of the limitations related to “access rules,” as construed.
`
`Kopp, e.g., describes a vending system allowing a user to specify a desired extent of
`
`usage, pay for only that usage, and receive data limited to the purchased usage amount
`
`(e.g., Ex. 1304 2:50-65), while Smith expressly discloses a software vending system al-
`
`lowing a user to pre-pay license fees proportional to the value received from using
`
`software, rather than paying all or nothing (e.g., Ex. 1327 6:1-5; 18:4-33). Petitioner has
`
`also identified additional disclosures in Stefik and Poggio concerning these limitations,
`
`further confirming a POSA3 would have found it obvious and routine to implement
`
`the system disclosed by Stefik and Poggio using the expressly advantageous teachings
`
`of Kopp and/or Smith, detailed in §IV.C, infra. See, e.g., Ex. 1319 ¶¶ 66-81.
`
`The challenged claims merely recite steps and corresponding systems well-
`
`known in the field of data storage and access, including use of a “portable data carrier
`
`for storing and paying for data and to computer systems for providing access to data
`
`to be stored.” E.g., Ex. 1301 1:5-8. Independent Claim 14, for example, recites six ru-
`
`dimentary steps relating to data storage and access—reading payment data from a da-
`
`ta carrier, forwarding that data, retrieving data, writing the retrieved data, receiving
`
`3 “POSA” refers to knowledge/understanding of a person of ordinary skill in the art
`
`as of Oct. 25, 1999 who would have at least a B.S. in E.E., C.S., or a telecommunic-
`
`ations related field, and at least 3 years industry experience that included client-server
`
`data/information distribution and management architectures. Ex. 1319 ¶¶ 27, 30 n.3.
`
`2
`
`

`
`Covered Business Method Patent Review
`United States Patent No. 7,334,720
`
`at least one access rule; and writing that rule. But at the ’720’s earliest claimed priori-
`
`ty date, these simple elements and their combination were all known to any POSA.
`
`The patent itself acknowledges that the idea of providing access to data in exchange for
`
`a payment (e.g., purchase of music on a CD) was well known, e.g., id. 5:4-7, and the
`
`prior art was teeming with this basic concept.
`
`Moreover, as its language makes clear, Claim 14 involves no “technology” at all
`
`other than “a payment validation system” and “a data carrier”—both of which the pa-
`
`tent concedes were well known and entirely commonplace. E.g., id. 3:29, 8:64-66,
`
`11:36-53, 13:46-58, 14:1-2, 17:23-18:23, 18:38, Figs. 2, 9. Thus, Claim 14 recites noth-
`
`ing more than a method for retrieving and storing data from a data supplier while
`
`reading and forwarding payment data for validation and receiving and writing an ac-
`
`cess rule for the stored data. The other challenged claims are variations on this same
`
`simple and well-known theme, with the addition, in the challenged “system” claims, of
`
`equally generic components.4 E.g., id. 12:38-41 (“The physical embodiment of the system is
`
`4 Dependent claim 15, e.g., simply adds steps involving receiving payment validation
`
`data and transmitting at least a portion of the data to the data supplier. Claim 3
`
`simply recites a “data access terminal” with interfaces, a processor, a program store
`
`and “code” to perform similar steps, along with the processing of data access requests
`
`and various data (e.g., payment data and payment validation data) via the application of
`
`access and use rules. And claim 13 simply adds to claim 3 that the data access terminal
`
`3
`
`

`
`Covered Business Method Patent Review
`United States Patent No. 7,334,720
`
`not critical and a skilled person will understand that the terminals, data processing systems and the
`
`like can all take a variety of forms.”); Fig. 4b. Indeed, as confirmed by the recent decision
`
`in Alice Corp. Pty, Ltd. v. CLS Bank Int’l, 134 S. Ct. 2347 (2014)—decided after Peti-
`
`tioner’s original challenges to the ’720 were filed—the challenged claims are also di-
`
`rected to patent-ineligible subject matter under § 101. As the Board noted previously,
`
`“the ’720 patent makes clear that the asserted novelty of the invention is not in any
`
`specific improvement of software or hardware, but in the method of controlling access to
`
`data,” CBM2014-00104, Pap. 9, at 12, and the challenged claims are directed to noth-
`
`ing more than the unpatentable abstract idea of paying for and controlling access to
`
`data, with at most the addition of well-known, routine and conventional features—in
`
`particular, generic computer implementation that cannot confer patentability on these
`
`patent-ineligible abstractions. E.g., Alice, 134 S. Ct. at 2359-60. Each challenged claim
`
`recites ineligible subject matter and is also obvious; thus, each is unpatentable.
`
`II. OVERVIEW OF FIELD OF THE CLAIMED INVENTION
`By October 25, 1999, electronic sale, distribution, and content protection for
`
`digital products all would have been well-known to a POSA, and their combination as
`
`claimed also would have been at minimum obvious. See, e.g., Ex. 1319 § V. In 1991,
`
`for example, U.S. Pat. No. 4,999,806, disclosed a system and method for sale and dis-
`
`is “integrated with a mobile communication device, a personal computer, an au-
`
`dio/video player, and/or a cable or satellite television interface device.” See Ex. 1301.
`
`4
`
`

`
`Covered Business Method Patent Review
`United States Patent No. 7,334,720
`
`tribution of digital products (e.g., software) by phone, and for content protection. See,
`
`e.g., Ex. 1306 Abstract; 1:67-2:9. Ex. 1306 thus discloses making different types of ac-
`
`cess available, e.g., purchase vs. rental, with a Control Transfer Program and Primary
`
`Protection Program that ensure the computer receiving a downloaded program does
`
`not have another program present that could create unauthorized copies. See id. Ab-
`
`stract; 2:65-3:23. See also Ex. 1319 ¶ 32.
`
`In 1992, U.S. Pat. No. 5,103,392, disclosed use-based charging for digital prod-
`
`ucts, including “user-specific credit data storage means for storing data identifying the us-
`
`er … and indicating credit for payment capacity, use time length, or the like of the user,” as
`
`well as “[1] use decision means for determining permission to use the program … on the basis
`
`of program-specific data supplied from the program storage means or user-specific credit data
`
`supplied from the user-specific credit data storage means, the use decision means delivering
`
`either an affirmative or negative signal corresponding to results of the decision[, and [2]]
`
`program use history storage means connected to the use decision means for storing program use
`
`history data . . ..” See, e.g., Ex. 1311 1:64-2:17. Ex. 1311’s emphasis on assuring permis-
`
`sion to access a program and compensation to providers for use underscores the art’s
`
`focus on digital rights management (“DRM”), over eight years before Smartflash’s
`
`claimed October 25, 1999 priority date. See also Ex. 1319 ¶ 35.
`
`In 1997, Exhibit 1218 (“von Faber”) observed that “[e]lectronic commerce systems
`
`dealing with the distribution of digital contents like software or multimedia data have to couple
`
`5
`
`

`
`Covered Business Method Patent Review
`United States Patent No. 7,334,720
`
`the use of the provided digital goods with a prior payment for the goods in a way which cannot be
`
`bypassed,” proposing a system where customers purchase keys to utilize distributed
`
`encrypted content. E.g., id. 7, 8, Fig. 1. Von Faber states its system could be used for a
`
`variety of known distribution and payment methods, and addresses the known issue
`
`of payment distribution to content providers. See, e.g., id. 13. See also Ex. 1319 ¶¶ 37-39.
`
`And U.S. Pat. No. 5,915,019 (“Ginter”), issued in June 1999, disclosing “sys-
`
`tems and methods for secure transaction management and electronic rights protection.” See, e.g.,
`
`Ex. 1314 Abstract. Ginter’s system helps “ensure that information is accessed and used
`
`only in authorized ways, and maintain the integrity, availability, and/or confidentiality of the in-
`
`formation,” and discloses that “[a]ll participants … have the innate ability to partici-
`
`pate in any role,” e.g., id. 255:22-43, highlighting the known flexibility in such distribu-
`
`tion systems, underscoring that combinations between and among disclosures of such
`
`systems would have been obvious to a POSA. See also, e.g., Ex. 1319 ¶¶ 40-41.
`
`Content storage and utilization on portable devices, including mobile commu-
`
`nication devices such as cellular phones, was also well-known. Ex. 1316 (pub’d Aug.
`
`26, 1999) describes a cell phone for storing and accessing digital content. See, e.g., id.
`
`3:7-13. And Exhibit 1217, “Portable Music Selection and Viewing System” (pub’d
`
`June 18, 1999), discloses storing and playing media on mobile devices, e.g., using a re-
`
`movable IC card. See, e.g., Ex. 1317 ¶ 9; ¶ 13. See also Ex. 1319 ¶¶ 42-43. The prior art
`
`was rife with the same supposed “invention” in the ’720’s challenged claims.
`
`6
`
`

`
`Covered Business Method Patent Review
`United States Patent No. 7,334,720
`
`
`III. PETITIONER HAS STANDING
`A.
`The ’720 Patent is a “covered business method patent” under § 18(d)(1) of the
`
`The ’720 Patent Is a Covered Business Method Patent
`
`AIA, and Petitioner certifies it is available for review under § 42.304(a). See also
`
`CBM2014-00104, Pap. 8, 8-13 (finding claim 14 satisfies requirement). Although nu-
`
`merous claims qualify, a patent with even one claim covering a covered business
`
`method is considered a CBM patent. See CBM 2012-00001, Doc. 36 at 26; 77 Fed. Reg.
`
`48,709 (Aug. 14, 2012). Petitioner thus addresses exemplary claim 14.
`
`1.
`A CBM patent “claims a method or corresponding apparatus for performing
`
`Exemplary Claim 14 Is Financial In Nature
`
`data processing or other operations used in the practice, administration, or manage-
`
`ment of a financial product or service, except that the term does not include patents
`
`for technological inventions.” AIA §18(d)(1); 37 C.F.R. §42.301. “[T]he definition of
`
`covered business method patent was drafted to encompass patents claiming activities
`
`that are financial in nature, incidental to a financial activity or complementary to a financial activi-
`
`ty.” 77 Fed. Reg. 48,734, 48,735 (Aug. 14, 2012). “[F]inancial product or service” is to
`
`be interpreted broadly, id., and “financial . . . simply means relating to monetary mat-
`
`ters”—it does not require any link to traditional financial industries such as banks. See,
`
`e.g., CBM2012-00001, Pap. 36 at 23. The Board has previously found, e.g., that a claim
`
`for “transferring money electronically via a telecommunication line to the first par-
`
`ty . . . from the second party” met the financial product or service requirement, con-
`
`7
`
`

`
`Covered Business Method Patent Review
`United States Patent No. 7,334,720
`
`cluding that “the electronic transfer of money is a financial activity, and allowing such
`
`a transfer amounts to providing a financial service.” CBM2013-00020, Pap. 14 at 9-
`
`10.5 See also, e.g., CBM2013-00017, Pap. 8 at 5-6.
`
`The ’720 Patent relates to the idea of providing electronic data in exchange for
`
`payment and restricting access to data based on payment amount. See AIA § 18(d)(1);
`
`37 C.F.R. § 42.301(a); Ex. 1301 1:64-2:3. Indeed, in asserting the patent, Smartflash
`
`conceded the alleged invention relates to a financial activity or transaction, stating that
`
`“[t]he patents-in-suit generally cover a portable data carrier for storing data and man-
`
`aging access to the data via payment information and/or use status rules. The patents-
`
`in-suit also generally cover a computer network . . . that serves data and manages ac-
`
`cess to data by, for example, validating payment information.” Ex. 1302.
`
`The ’720 Patent emphasizes payment in describing the claimed invention:
`According to the present invention there is therefore provided . . . pay-
`ment validation means . . . reading payment information from the
`payment validation means using the terminal; validating the payment in-
`formation . . .
`Ex. 1301 1:46-55. See also id. 1:56-57. The specification confirms that the “portable da-
`
`ta carrier” of the invention is “for storing and paying for data,” id. 1:6-8, and the
`
`“payment data” forwarded to the “payment validation system” “may either be data re-
`
`
`5 Indeed, these aspects of claim 14 are generally similar to those of the claim found to
`
`convey CBM standing in CBM2013-00020, Pap. 8, at 9-13.
`
`8
`
`

`
`Covered Business Method Patent Review
`United States Patent No. 7,334,720
`
`lating to an actual payment made to the data supplier, or it may be a record of a payment made to
`
`an e-payment system.” Id. 6:59-63. “Payment for the data item or items requested may ei-
`
`ther be made directly to the system owner or may be made to an e-payment system.”
`
`Id. 21:6-8. “E-payment systems [] are coupled to banks” and may be provided in accord-
`
`ance with cash compliant standards such as MONDEX, Proton, and/or Visa. Id.
`
`13:46-58. Claim 14 explicitly describes electronically transferring money and allowing
`
`such a transfer, as well as restricting access based on payment (e.g., “the at least one
`
`condition being dependent upon the amount of payment associated with the payment data forwarded
`
`to the payment validation system”), and clearly relates to a financial activity and providing a
`
`financial service. See CBM2013-00020, Pap. 14 at 9-10 (“the electronic transfer of
`
`money is a financial activity, and allowing such a transfer amounts to providing a fi-
`
`nancial service.”); 77 Fed. Reg. 48,734, 48,735 (Aug. 14, 2012) (“[T]he definition of
`
`[CBM] was drafted to encompass patents ‘claiming activities that are financial in nature, in-
`
`cidental to a financial activity or complementary to a financial activity.’”) (citation omitted).
`
`2.
`Further, claim 14 is not a “technological invention” that would trigger the ex-
`
`Claim 14 Does Not Cover A Technological Invention
`
`ception in AIA § 18(d)(1), because it does not claim “subject matter as a whole [that]
`
`recites a technological feature that is novel and unobvious over the prior art[] and solves a
`
`technical problem using a technical solution.” § 42.301(b). To the contrary, the patent makes
`
`clear that its claimed “data carrier,” “payment validation system,” and “data supplier,”
`
`9
`
`

`
`were commonplace and could be implemented using well-known industry standards.
`
`Covered Business Method Patent Review
`United States Patent No. 7,334,720
`
`
`First, claim 14 does not recite a “technological feature” that is novel and un-
`
`obvious. “Mere recitation of known technologies, such as computer hardware, communication or
`
`computer networks, software, memory, computer-readable storage medium, scanners, display de-
`
`vices or databases, or specialized machines, such as an ATM or point of sale device,”
`
`or “[r]eciting the use of known prior art technology to accomplish a process or method, even if that
`
`process or method is novel and non-obvious” will “not typically render a patent a technologi-
`
`cal invention.” E.g., 77 Fed. Reg. 48,756 48,764 (Aug. 14, 2012). Claim 14’s language
`
`makes clear it requires no particularized hardware, but instead simply relates to the
`
`idea of providing electronic data in exchange for payment and restricting access based
`
`on the amount of payment. The claim involves no “technology” at all other than, at most,
`
`use of a data carrier, a payment validation system, and a data supplier. Ex. 1301. The
`
`patent confirms this data carrier is in no way novel or unobvious, explaining it may
`
`be¸ inter alia, based on a “standard smart card” (id. 11:37-38), an “electronic memory
`
`card” (id. 3:29), or a so-called “smart Flash card,” (id. 17:25), all commonplace at the time,
`
`see id. 11:37-38; 14:1-2. Indeed, the ’720 explains a smart Flash card is “an IC card . . .
`
`incorporating a processor and Flash data memory, preferably of large capacity” (id.
`
`17:25-28), and incorporates by reference, for additional details, the ISO series of standards.
`
`Id. 17:28-33; see also Figs. 2, 9; 11:36-53; 17:34-18:23.
`
`Payment validation systems were also well-known. See Ex. 1301 13:57-61.
`
`10
`
`

`
`Covered Business Method Patent Review
`United States Patent No. 7,334,720
`
`The ’720 explains “[t]he payment validation system may be part of the data supplier’s
`
`computer systems or it may be a separate e-payment system.” Id. 8:64-66. “E-payment
`
`systems are coupled to banks . . . These provide an e-payment system according to, for example,
`
`MONDEX, Proton, and/or Visa cash compliant standards . . .” Id. 13:46-58. The “data
`
`supplier” of the claims is also not a technological component, and requires no specific
`
`hardware, see Ex. 1301 6:14-16; 6:56-58, but is, instead, simply a supplier of online da-
`
`ta. Id. 5:64-65. See also id. 6:56-58 (“The computer system is operated by a data supplier
`
`or a data supplier ‘system owner’ for providing content data to the data carrier.”); 8:13-15.
`
`The ’720 explains the system’s physical embodiment, including data provid-
`
`ers/suppliers, is not critical, Ex. 1301 12:11-13, 38-41; Fig. 4(b), and data suppliers
`
`were well known long before the claimed priority date. See id. 1:26-41. Further, the
`
`idea of providing access to data in exchange for payment, as claimed, was known. See,
`
`e.g., id. 5:4-7. See also, e.g., Ex. 1307; Ex. 1306 Abstract, 1:67-2:9; Ex. 1308 Abstract,
`
`4:27-35. The ’720’s alleged invention merely combines a known payment validation
`
`system with the known ability to download data and restrict access to the data based
`
`on that payment. But “combining prior art structures to achieve a normal, expected,
`
`or predictable result of that combination” does not “render a patent a technological
`
`invention.” 77 Fed. Reg. 48755 (Aug. 14, 2012) at 48764. Access rules, and restricting
`
`access to downloaded data based on the amount of payment was also known. E.g., Ex.
`
`1314 186:15-24; 172:32-35; 264:62-265:16; 128:23-36; Ex. 1315 7:14-16; 10:25-28.
`
`11
`
`

`
`The state of the art at the time, and the detailed prior art analysis provided below, fur-
`
`Covered Business Method Patent Review
`United States Patent No. 7,334,720
`
`
`ther reflects claim 14 does not recite a technological feature that is novel and nonob-
`
`vious. See, e.g., Section II, supra; Section IV.C, infra. Claim 14 concerns nothing more
`
`than a non-technical idea of selling data in exchange for payment and restricting ac-
`
`cess to that data depending on payment. Even apart from its other failures to trigger
`
`the statutory exception, for these reasons alone claim 14 would not be technological.
`
`Second, claim 14 does not solve a technical problem using a technical solution
`
`because there was no technical problem to begin with. While a POSA already would have
`
`known how to sell data over the Internet, see, e.g., Ex. 1315 Fig. 7; 1:50-55, 10:41-53,
`
`the patent nonetheless describes the “problem” the invention is intended to solve as
`
`the business problem of data piracy: users were downloading content, such as MP3s, with-
`
`out paying, and providers were losing money. Id. 1:15-17, 26-41. However, a POSA
`
`would have known well before October 1999 how to sell electronic data, use payment
`
`authorization mechanisms, and provide electronic data based on payment. See, e.g., Ex.
`
`1315 Fig. 7; 1:56-59, 2:32-36; 9:56-10:25; see also, e.g., Ex. 1319 § V. The solution de-
`
`scribed in claim 14—using previously-known data access and previously-known data
`
`payment abilities—was also not “technical.” As the patent states, “[b]inding the data
`
`access and payment together allows the legitimate owners of the data to make the data
`
`available themselves over the internet without fear or loss of revenue, thus undermin-
`
`ing the position of data pirates.” Ex. 1301 1:66-2:3; see also id. 4:27-29. But the basic
`
`12
`
`

`
`Covered Business Method Patent Review
`United States Patent No. 7,334,720
`
`notion of coupling of data access to payment,6 as claimed in the ’720, is not a tech-
`
`nical solution. Even if the solution were somehow deemed “technical” (it is not), this
`
`would not alter that there was no technical problem presented and addressed by
`
`the ’720—“[d]ifficulty implementing an automated or technical solution to a problem
`
`that is not technical does not transform that non-technical problem into a technical one.”
`
`CBM2012-00007, Pap. 16 at 17.
`
`In sum, the “invention” of claim 14 concerns no more than the non-technical
`
`idea of restricting access to content for payment to solve the business problem of data
`
`piracy. For this reason, too, claim 14 does not claim a technological invention.
`
`B. Related Matters and Mandatory Notice Information; Petitioner Is
`a Real Party In Interest Sued for and Charged With Infringement
`
`Petitioner Apple is the real party-in-interest. Smartflash’s complaint in 6:13-cv-
`
`447, Smartflash LLC. et al. v. Apple Inc. et al, pending in E.D. Tex., asserts the ’720 Pa-
`
`tent against Petitioner. Pursuant to Rule 42.8(b)(2), the ’720 is also the subject of
`
`Smartflash LLC et al. v. Samsung et al., No.6:13-cv-448 (E.D. Tex), to which Apple is not
`
`a party. Petitioner further identifies the following administrative matters: App’n No.
`
`10/111,716 (filed as No. PCT/GB00/4110). Petitioner previously filed two CBM pe-
`
`titions on this patent, CBM2014-00104/105, on §§102 and 103 grounds, which were
`
`
`6 Moreover, the idea of providing access to data in exchange for a payment was itself
`
`known. See, e.g., Exs. 1307; 1306 Abstract, 1:67-2:9; 1308 Abstract, 4:27-35.
`
`13
`
`

`
`Covered Business Method Patent Review
`United States Patent No. 7,334,720
`
`not instituted. Petitioner has concurrently filed another CBM Petition on the ’720 Pa-
`
`tent. Petitioner previously filed CBM petitions on the following related patents:
`
`8,118,221, 8,033,458, 8,061,598, 8,336,772, and 7,942,317 (CBM2014-00102/103/
`
`106/107/108/109/110/111/112/113). The following were instituted: CBM2014-
`
`00102/103/106-109/112/113. More recently, Petitioner filed the related petitions:
`
`CBM2015-00015/16/17/18 (’221, ’458, ’598, ’317 patents). 7 Lead/backup counsel
`
`and service information are designated in the signature block.
`
`IV. DETAILED EXPLANATION OF REASONS FOR RELIEF
`REQUESTED, SHOWING IT IS MORE LIKELY THAN NOT THAT
`AT LEAST ONE CHALLENGED CLAIM IS UNPATENTABLE
`
`Pursuant to §§ 42.22, 42.208, and 42.304(b), a full statement of reasons for the
`
`relief requested, including a detailed explanation of the evidence, and the governing
`
`law, rules and precedent is provided below. § IV.A lists and explains the bases for Pe-
`
`titioner’s relevant claim constructions for the challenged claims. §§ IV.B and IV.C
`
`provide a detailed explanation for why it is more likely than not that each challenged
`
`claim is unpatentable under §§101 and 103, respectively. In particular: Ground 1:
`
`Claims 3 and 13-15 recite unpatentable subject matter under §101; Ground 2: claims
`
`3 and 13-15 are obvious in light of Stefik in view of Poggio and Kopp; Ground 3:
`
`7 Samsung Electronics America filed CBM petitions on this (CBM2014-00190/196)
`
`and related Patents Nos. 8,033,458 (CBM2014-00192/197); 8,061,598 (CBM2014-
`
`00193/198); 8,118,221 (CBM2014-00194/199); 8,336,772 (CBM2014-00200/204).
`
`14
`
`

`
`claims 3 and 13-15 are obvious in light of Stefik in view of Poggio, Kopp, and Smith.
`
`Covered Business Method Patent Review
`United States Patent No. 7,334,720
`
`
`Lest Patent Owner argue, as suggested in a recent call with the Board regarding
`
`related CBM challenges (e.g., CBM2014-00015), that the Board should deny review
`
`under § 325(d) without regard to this petition’s merits in light of several recent deci-
`
`sions of the Board concerning IPRs–which are limited by statute in ways that CBMs
`
`are not, see, e.g., § 315(b) (barring IPRs after 1 year from service of infringement com-
`
`plaint except in the case of joinder of another petition); compare §315(e)(2) (IPR litiga-
`
`tion estoppel for arguments “petitioner raised or reasonably could have raised”), with AIA §
`
`18(a)(1)(D)(CBM litigation estoppel only for arguments “petitioner raised”)–Petitioner
`
`notes that this Petition does not raise substantially the same arguments or prior art as
`
`the original petitions. This petition, e.g., raises § 101 arguments relying on the Alice
`
`decision post-dating the original petitions,8 which raised no § 101 arguments, and pre-
`
`sents new prior art with explicit disclosure of limitations the Board construed and found absent
`
`from the previously-cited art. See, e.g., CBM2013-00009, Pap. 10 at 20-21 (rejecting argu-
`
`ment under § 325(d) that cited art was “substantially the same” as art previously be-
`
`fore PTO where “recognition” of principle in newly-cited reference was “not ex-
`
`pressed so clearly in [earlier considered] references”). Further, as such IPR-related
`
`8 See, e.g., Ultramercial, Inc. v. Hulu, LLC, -- F.3d --, No. 2010-1544, 2014 WL 5904902,
`
`at *2 (Fed. Cir

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket