`
` Covered Business Method Patent Review
`United States Patent No. 8,336,772
`
`Attorney Docket No.:
`
` 104677-5008-820
`Customer No. 28120
`
`Petitioner: Apple Inc.
`
`§
`Inventor: Racz et al.
`United States Patent No.: 8,336,772 §
`Formerly Application No.: 13/212,047 §
`Issue Date: December 25, 2012
`§
`Filing Date: August 17, 2011
`§
`Former Group Art Unit: 2887
`§
`Former Examiner: Thien M. Le
`§
`
`For: Data Storage and Access Systems
`
`MAIL STOP PATENT BOARD
`Patent Trial and Appeal Board
`United States Patent and Trademark Office
`Post Office Box 1450
`Alexandria, Virginia 22313-1450
`
`
`PETITION FOR COVERED BUSINESS METHOD PATENT REVIEW OF
`UNITED STATES PATENT NO. 8,336,772 PURSUANT TO 35 U.S.C. § 321,
`37 C.F.R. § 42.304
`
`
`
`
`
`
`
`
`
`
`
` Covered Business Method Patent Review
`United States Patent No. 8,336,772
`
`
`TABLE OF CONTENTS
`
`INTRODUCTION ....................................................................................................... 1
`I.
`II. OVERVIEW OF FIELD OF THE CLAIMED INVENTION ......................... 6
`III. PETITIONER HAS STANDING .......................................................................... 11
`A.
`The ’772 Patent Is a Covered Business Method (“CBM”) Patent ........... 11
`1.
`Exemplary Claim 19 Is Financial In Nature .................................... 11
`2.
`Claim 19 Does Not Cover A Technological Invention ................. 13
`Related Matters and Mandatory Notice Information; Petitioner Is a Real
`Party In Interest Sued for and Charged With Infringement ..................... 18
`IV. DETAILED EXPLANATION OF REASONS FOR RELIEF REQUESTED,
`SHOWING IT IS MORE LIKELY THAN NOT THAT AT LEAST ONE
`CHALLENGED CLAIM IS UNPATENTABLE ............................................... 19
`A.
`Claim Construction .......................................................................................... 21
`B.
`The Challenged Claims Are Unpatentable Under § 101 ............................ 24
`1.
`Claims Are Directed To Abstract Ideas ........................................... 25
`2.
`Claims Do Not Disclose An “Inventive Concept” That Is
`“Significantly More” Than An Abstract Idea .................................. 28
`Field Of Use Limitations Cannot Create Patent Eligibility ........... 28
`Generic Computer Implementation Cannot Transform
`Abstract Ideas Into Patent Eligible Inventions ............................... 29
`Functional Nature Confirms Preemption and Ineligibility ............ 34
`5.
`6. Machine-or-Transformation Test Also Confirms Patent
`Ineligibility ............................................................................................. 36
`The Challenged Claims Are Invalid Under § 103 ....................................... 36
`1.
`Overview of Stefik ............................................................................... 36
`2. Motivation to Combine Stefik with Poggio ..................................... 40
`3. Motivation to Combine Stefik with Poggio and Subler ................. 41
`4. Motivation to Combine Stefik with Poggio, Subler, and
`Sato ......................................................................................................... 42
`Claims 14, 19, and 22 are Obvious in Light of Stefik in
`view of Poggio and Subler (Ground 2); Claims 14, 19, and
`
`B.
`
`C.
`
`3.
`4.
`
`5.
`
`ii
`
`
`
` Covered Business Method Patent Review
`United States Patent No. 8,336,772
`
`
`22 are Obvious in Light of Stefik in view of Poggio, Subler,
`and Sato (Ground 3). .......................................................................... 43
`CONCLUSION........................................................................................................... 80
`
`V.
`
`
`
`iii
`
`
`
`
`
`EXHIBIT LIST
`1301
`
`1302
`
`1303
`
`1304
`
`1305
`
`1306
`
`1307
`
`1308
`
`1309
`
`1310
`
`1311
`
`1312
`
`1313
`
`1314
`
`1315
`
`1316
`
`1317
`
`1318
`
`1319
`
` Covered Business Method Patent Review
`United States Patent No. 8,336,772
`
`
`U.S. Patent No. 8,336,772
`
`Plaintiffs’ First Amended Complaint
`
`U.S. Patent No. 5,925,127
`
`U.S. Patent No. 5,940,805
`
`Russell Housley and Jan Dolphin, “Metering: A Pre-pay
`Technique,” Storage and Retrieval for Image and Video Data-
`bases V, Conference Volume 3022, 527 (January 15, 1997)
`U.S. Patent No. 4,999,806
`
`U.S. Patent No. 5,675,734
`
`U.S. Patent No. 4,878,245
`
`File History for U.S. Patent No. 8,336,772
`
`U.S. Patent No. 7,942,317
`
`U.S. Patent No. 5,103,392
`
`U.S. Patent No. 5,530,235
`
`U.S. Patent No. 5,629,980
`
`U.S. Patent No. 5,915,019
`
`European Patent Application, Publication No. EP0809221A2
`
`International Publication No. WO 99/43136
`
`JP Patent Application Publication No. H11-164058 (transla-
`tion)
`Eberhard von Faber, Robert Hammelrath, and Frank-Peter
`Heider, “The Secure Distribution of Digital Contents,” IEEE
`(1997)
`Declaration of Anthony J. Wechselberger In Support of Apple
`
`iv
`
`
`
`1320
`
`1321
`
`1322
`
`1323
`
`1324
`
`1325
`
`1326
`
`1327
`
`1328
`
`1329
`
`1330
`
`1331
`
`1332
`
`1333
`
`1334
`
`1335
`
`1336
`
` Covered Business Method Patent Review
`United States Patent No. 8,336,772
`
`
`Inc.’s Petition for Covered Business Method Patent Review
`U.S. Patent No. 8,033,458
`
`Declaration of Michael P. Duffey In Support of Apple Inc.’s
`Petition for Covered Business Method Patent Review
`Declaration of Megan F. Raymond In Support of Apple Inc.’s
`Petition for Covered Business Method Patent Review
`Claim Construction Memorandum Opinion from Smartflash
`LLC v. Apple Inc., No. 6:13cv447 (Dkt. 229)
`File History for U.S. Patent No. 8,061,598
`
`U.S. Patent No. 4,337,483
`
`U.S. Patent No. 7,725,375
`
`International Publication No. WO 95/34857
`
`JP Patent Application Publication No. H10-269289 (transla-
`tion)
`File History for U.S. Patent No. 7,942,317
`
`File History for U.S. Patent No. 8,033,458
`
`U.S. Patent No. 8,061,598
`
`U.S. Patent No. 8,118,221
`
`File History for U.S. Patent No. 8,118,221
`
`U.S. Patent No. 7,334,720
`
`File History for U.S. Patent No. 7,334,720
`
`U.S. Patent No. 5,646,992
`
`v
`
`
`
` Covered Business Method Patent Review
`United States Patent No. 8,336,772
`
`I.
`
`INTRODUCTION
`Pursuant to § 321 and Rule § 42.304,1 the undersigned, on behalf of and acting
`
`in a representative capacity for Apple Inc. (“Petitioner”), petitions for covered busi-
`
`ness method review of claims 14, 19, and 22 (“challenged claims”) of U.S. Pat. No.
`
`8,336,772 (“’772 patent” or “’772”), issued to Smartflash Technologies Limited and
`
`assigned to Smartflash LLC (“Patentee”). Petitioner asserts it is more likely than not
`
`that the challenged claims are unpatentable for the reasons herein and requests review
`
`of, and judgment against, the challenged claims under §§ 101 and 103.
`
`As discussed in Sec. III.B, infra, Petitioner has concurrently filed two other Pe-
`
`titions, requesting judgment against different ’772 claims based on some of the same
`
`art. The Director, pursuant to Rule 325(c), may determine that merger, or at mini-
`
`mum coordination, of these proceedings, is appropriate. Further, Petitioner previous-
`
`ly filed CBM2014-00110/111 seeking review of the ’772 under §§102 and 103. Those
`
`petitions were not instituted. In its Decisions Denying Institution, the Board then de-
`
`termined that Petitioner had not shown that it was more likely than not that it would
`
`prevail in demonstrating that Stefik alone or combined with Poggio and/or Sato ren-
`
`dered obvious limitations related to “code to request identifier data…” CBM2014-
`
`
`1 Petitioner is demonstrating, in pending litigation, that these claims are invalid for
`
`numerous additional reasons. All section cites herein are to 35 U.S.C. or 37 C.F.R., as
`
`the context indicates, and all emphasis herein added unless otherwise noted.
`
`
`
`
`
`00110, Pap. 7, at 15-18; -00111, Pap. 7, at 15-21. In light of the Board’s decision, Pe-
`
` Covered Business Method Patent Review
`United States Patent No. 8,336,772
`
`
`titioner now identifies additional prior art—Subler (Ex. 1336)—with explicit disclo-
`
`sures of the limitations related to “code to request identifier data…” For example,
`
`Subler discloses an end user device that provides a powerful, easy-to-use interface to
`
`browse through and analyze products available from a storage database. Ex. 1336
`
`3:46-52. The end user device software includes code that retrieves product infor-
`
`mation from the database and presents the information to the user in a windowed
`
`graphical user interface. Ex. 1336 4:49-54; 5:26-30. Petitioner has also identified addi-
`
`tional disclosures in Stefik and Poggio concerning these limitations, further confirm-
`
`ing a POSA 2 would have found it obvious and routine to implement Stefik and
`
`Poggio’s system using the expressly advantageous teachings of Subler and/or Sato,
`
`detailed in §IV.C, infra. See, e.g., Ex. 1319 ¶¶ 56-67.
`
`The challenged claims merely recite basic computer systems well-known in the
`
`field of data storage and access, including a “handheld multimedia terminal for retriev-
`
`ing and accessing protected multimedia content” and a “data access terminal for con-
`
`2 References to a POSA refer to the knowledge or understanding of a person of ordi-
`
`nary skill in the art as of October 25, 1999, who would have at least a B.S. in E.E.,
`
`C.S., or a telecommunications related field, and at least 3 years of industry experience
`
`that
`
`included client-server data/information distribution and management
`
`architectures. See Ex. 1319 ¶¶ 27, 30 n.3.
`
`2
`
`
`
` Covered Business Method Patent Review
`United States Patent No. 8,336,772
`
`trolling access to one or more content data items stored on a data carrier.” Ex. 1301
`
`1:24-26. Claim 19, for example, recites four rudimentary components of a data access
`
`terminal “for retrieving a content data item from a data supplier and providing the retrieved data
`
`item to a data carrier”—(A) an interface for communicating (B) a user interface, (C) a data
`
`carrier interface, (D) a program store storing code implementable by a processor, and (D)
`
`a processor . . . for implementing the stored code. The recited code is similarly elemen-
`
`tary, requesting and receiving user identifier data (E1-E2), requesting, receiving, and presenting con-
`
`tent data (E3-E5), receiving and responding to a user selection (E6-E7), and receiving and re-
`
`sponding to payment validation data (E8-E9):
`
`19. A data access terminal for retrieving a content data item from a data
`supplier and providing the retrieved data item to a data carrier, the data
`access terminal comprising:
`[A] a first interface for communicating with the data supplier;
`[B] a user interface;
`[C] a data carrier interface;
`[D] a program store storing code implementable by a processor; and
`[E] a processor coupled to the user interface, to the data carrier inter-
`face and to the program store for implementing the stored code, the
`code comprising:
`[E1] code to request identifier data identifying one or more content da-
`ta items available for retrieving;
`[E2] code to receive said identifier data identifying said one or more
`content data items available for retrieving;
`[E3] code to request content information pertaining to at least one of
`
`3
`
`
`
` Covered Business Method Patent Review
`United States Patent No. 8,336,772
`
`
`said one or more content data items identified by said identified data;
`[E4] code to receive said content information;
`[E5] code to present said content information to a user via said user in-
`terface pertaining to said identified one or more content data items
`available for retrieving;
`[E6] code to receive a user selection selecting at least one of said one
`or more of said content data items available for retrieving;
`[E7] code responsive to said user selection of said selected at least one
`content data item to transmit payment data relating to payment for said
`selected at least one content item for validation by a payment valida-
`tion system;
`[E8] code to receive payment validation data defining if said payment
`validation system has validated payment for said selected at least one
`content data item; and
`[E9] code responsive to the payment validation data to retrieve said se-
`lected at least one content data item from a data supplier and to write
`said retrieved at least one content data item into said data carrier
`Ex. 1301. But at the patent’s earliest claimed priority date, these simple elements and
`
`their combination were well known to any POSA. The patent acknowledges that the
`
`idea of providing access to data in exchange for payment (e.g., purchase of music on a
`
`CD) was already well known. E.g., Ex. 1301 5:13-16 (“the purchase outright option
`
`may be equivalent to the purchase of a compact disc (CD)”). And, as demonstrated herein,
`
`the prior art was teeming with disclosures of this basic concept and its straightforward
`
`implementation in physical systems.
`
`4
`
`
`
` Covered Business Method Patent Review
`United States Patent No. 8,336,772
`
`Moreover, claim 19 clearly involves no “technology” at all other than “a data ac-
`
`cess terminal,” with an interface for communicating with a data supplier, and user
`
`and data carrier interfaces, a program store storing code, and a processor that im-
`
`plements the well-known steps disclosed in the specification—all of which the patent
`
`concedes were well known and commonplace, stating that this “terminal comprises a
`
`general purpose computer.” E.g., id. 4:7, 16:47-52. Claim 19 recites no more than a system
`
`for requesting and retrieving data from a data carrier while receiving and responding
`
`to payment data for validation and controlling access to the data based on payment.
`
`And the other challenged claims are nothing but variations on this simple theme, with
`
`the addition, in the challenged “handheld multimedia terminal” claims, of equally ge-
`
`neric components (e.g., known wireless interface, non-volatile memory, and a display).3
`
`See, e.g., id. 12:37-40 (“physical embodiment of the system is not critical and a skilled person will
`
`understand that the terminals, data processing systems and the like can all take a variety of forms.”).
`
`Indeed, as confirmed by the Supreme Court’s recent decision in Alice Corp.
`
`Pty, Ltd. v. CLS Bank Int’l, 134 S. Ct. 2347 (2014)—decided after Petitioner’s original
`
`challenges to the ’772 were filed—the challenged claims are also directed to patent in-
`
`3 Claim 14, e.g., recites a “handheld multimedia terminal,” but simply adds to the fea-
`
`tures of claim 19 the requirements of a wireless interface, non-volatile memory, and a
`
`display. And Claim 22, which depends from claim 19, simply specifies integration
`
`with a mobile communications device. Ex. 1301.
`
`5
`
`
`
` Covered Business Method Patent Review
`United States Patent No. 8,336,772
`
`eligible subject matter under § 101. As the Board noted in its previous Institution De-
`
`cision, “the ’772 patent makes clear that the asserted novelty of the invention is not in
`
`any specific improvement of software or hardware, but in the method of controlling ac-
`
`cess to data,” CBM2014-00110, Pap. 7, at 13, and the challenged claims are directed to
`
`nothing more than the unpatentable abstract idea of paying for and controlling access
`
`to data, with at most the addition of well-known, routine and conventional features—
`
`in particular, generic computer implementation that cannot confer patentability on
`
`these patent-ineligible abstractions. E.g., Alice, 134 S. Ct. at 2359-60. Each challenged
`
`claim recites ineligible subject matter and is also obvious; thus, each is unpatentable.
`
`II. OVERVIEW OF FIELD OF THE CLAIMED INVENTION
`By October 25, 1999, electronic sale, distribution, and content protection for
`
`digital products was well-known to a POSA, and their combination as claimed would
`
`also have been well-known or at minimum obvious. See, e.g., Ex. 1319 § V. In March
`
`1991, for example, U.S. Pat. No. 4,999,806 issued, disclosing a system and method for
`
`sale and distribution of digital products (e.g., software) by phone, and for content pro-
`
`tection. See, e.g., Ex. 1306 Abstract (“central station distributes software by telephone. . . ac-
`
`cepts credit card information, transmits an acceptance code . . . After verifying the credit card infor-
`
`mation, the station calls the purchaser back and continues with the transaction only after receiving
`
`the acceptance code.”); 1:67-2:9 (describing “means for selling and distributing protected software
`
`using standard telephone lines,” “permit[ting] the purchaser to rent the protected software for a period
`
`of time,” and “to rent the protected software for a specific number of runs”). Ex. 1306 also dis-
`
`6
`
`
`
` Covered Business Method Patent Review
`United States Patent No. 8,336,772
`
`closes (1) different types of access, e.g., purchase vs. rental and (2) a Control Transfer
`
`Program and a Primary Protection Program to prevent unauthorized copies. See Ex.
`
`1306 Abstract; 2:65-3:23; Ex. 1319 ¶ 30.
`
`In April 1992, U.S. Pat. No. 5,103,392 issued, disclosing use-based charging for
`
`digital products. See, e.g., id. Ex. 1311 1:64-2:17:
`
`The data processing apparatus includes user-specific credit data storage
`means for storing data identifying the user . . . and indicating credit for payment ca-
`pacity, use time length, or the like of the user . . . . Also included is use deci-
`sion means for determining permission to use the program . . . on the basis of pro-
`gram-specific data supplied from the program storage means or user-specific
`credit data supplied from the user-specific credit data storage means, the
`use decision means delivering either an affirmative or negative signal corresponding
`to results of the decision. Also included is program use history storage means
`connected to the use decision means for storing program use history data . . . .
`Ex. 1311’s emphasis on assuring permission to access a program and compensating
`
`providers underscores this existing focus in the art on digital rights management
`
`(“DRM”), over eight years before the claimed priority date. See, e,g., Ex. 1319 ¶ 33.
`
`Exhibit 1315 (“Poggio”, pub’d Nov. 26, 1997) gives another example of secure
`
`content distribution with content protection, disclosing a “virtual vending machine”
`
`system for sale and distribution of digital products. See, e.g., id. Abstract (“virtual vending
`
`machine manages a comprehensive vending service for the distribution of licensed electronic data (i.e.,
`
`products) over a distributed computer system. . . . [and] distributes licenses for the electronic data for
`
`7
`
`
`
` Covered Business Method Patent Review
`United States Patent No. 8,336,772
`
`the complete product or for components thereof and for a variety of time frames, including permanent
`
`licenses and rental period licenses. [It] provides . . . capability to obtain information regarding the
`
`available products and the associated license fees and rental periods, to receive the product upon re-
`
`ceipt of a corresponding electronic payment, and to reload the product during the term of the license.”).
`
`Poggio, too, discloses different types of access, including rentals, and re-download ca-
`
`pabilities for already-purchased content. See, e.g., id. Ex. 1319 ¶¶ 35, 50.
`
`Also in 1997, Ex. 1318 (“von Faber”) observed that “[e]lectronic commerce systems
`
`dealing with the distribution of digital contents . . . have to couple the use of the provided dig-
`
`ital goods with a prior payment for the goods in a way which cannot be bypassed,” proposing
`
`a system where customers purchase keys required to utilize encrypted content. See, e.g.,
`
`id. at 7(“basic idea . . . is to distribute the contents in encrypted form, and to have the customer pay
`
`for the key which he needs to transform the encrypted content in an usable form.”); id. 8 (“The
`
`Content Provider provides digital contents in encrypted form being distributed by the Con-
`
`tent Distributor. . . . The Authorisation System permits the distribution of the appropriate key
`
`after settling of the fees payable by the Customer . . .. The role of the Content Distributor is
`
`not essential for the subsequent discussion but, of course, for the business to take place.”);
`
`see also id. Fig. 1. Von Faber notes its system could be used for a variety of known dis-
`
`tribution and payment methods. See, e.g., id. 13 (“Different methods can be used to distribute
`
`the encrypted contents (standard techniques). . . . Different electronic payment methods can be
`
`integrated . . . . This flexibility leads to the fact that totally different authorisation methods can be
`
`8
`
`
`
` Covered Business Method Patent Review
`United States Patent No. 8,336,772
`
`integrated.”). Von Faber also addressed the known issue of payment distribution to
`
`providers. See, e.g., id. (“The system automatically divides the package price (payments) and guar-
`
`antees that the money is transferred to each Content Provider.”); Ex.1319 ¶¶ 36-38.
`
`And U.S. Pat. No. 5,915,019 (“Ginter,” filed Jan. 8, 1997) issued June 1999,
`
`discloses “systems and methods for secure transaction management and electronic
`
`rights protection.” See, e.g., Ex. 1314 Abstract. Ginter’s system “help[s] ensure that in-
`
`formation is accessed and used only in authorized ways, and maintain the integrity, availability,
`
`and/or confidentiality of the information.” See, e.g., id. Ginter’s “techniques may be used
`
`to support an all-electronic information distribution, for example, utilizing the ‘electronic high-
`
`way.’” Id. Ginter discloses that the various entities of the virtual distribution environ-
`
`ment (“VDE”) can flexibly take on any VDE roles. See, e.g., id. 255:22-23 (“All partici-
`
`pants of VDE 100 have the innate ability to participate in any role.”); 255:23-43. Ginter
`
`thus highlights the known flexibility in such distribution systems, underscoring that
`
`combinations between and among disclosures of such distribution systems would
`
`have been obvious. See, e.g., Ex. 1319 ¶¶ 39-40.
`
`Content storage and utilization on portable devices, including mobile commu-
`
`nication devices such as cellular phones, was also well-known. As one example, Ex.
`
`1316 (“Rydbeck,” pub’d Aug. 26, 1999), discloses a cell phone for storing digital con-
`
`tent in non-volatile memory and accessing that content. See, e.g., Ex. 1316 5 (“Because
`
`of its integration into the cellular phone, the digital entertainment module can share com-
`
`9
`
`
`
` Covered Business Method Patent Review
`United States Patent No. 8,336,772
`
`ponents already present in the cellular phone. Such savings would not be available if a
`
`CD player were simply aggregated with the phone. Further, the use of solid state
`
`RAM or ROM, as opposed to disc storage, eliminates the need for bounce control
`
`circuitry[, enabling the] invention to provide cellular communications and entertain-
`
`ment during leisure activities.”); Ex. 1319 ¶ 41. And Exhibit 1317 (“Sato,” pub’d June
`
`18, 1999), discloses storing media content onto mobile user devices and playing the
`
`media content from these mobile devices, as well as storing that media content on a
`
`removable IC card. See, e.g., ¶ 9 (“portable music selection and viewing device 70 pro-
`
`vides a removable storage device 76 on a main body 71. This storage device 76 is a memory
`
`card similar to, for example. . . an IC card. The user, after downloading the music
`
`software to the storage device (medium) 76 of the portable music selection and view-
`
`ing device 70 . . . can enjoy this music software on a display 72 or a receiver 74 of . . .
`
`device 70, and can also enjoy higher quality music playback by removing this storage device
`
`(medium) and inserting it into another audio unit. Further, the user can store the music soft-
`
`ware from another audio unit into the storage device 76”); ¶ 13 (“music storage medi-
`
`um 250 such as . . . a memory card such as an IC card stores the music software, and this
`
`storage medium 250 can be removed and used on other audio units.”); Ex. 1319 ¶ 42.
`
`Thus, as these background examples and the additional prior art detailed below
`
`in IV.B (including the primary prior art Stefik patent) illustrate, the prior art was rife
`
`with awareness and discussion of the same supposed “invention” now memorialized
`
`10
`
`
`
`in the challenged claims. Long before the purported priority date, disclosures abound-
`
` Covered Business Method Patent Review
`United States Patent No. 8,336,772
`
`
`ed of the very features that Smartflash now seeks to claim as its exclusive property. As
`
`outlined below, the challenged claims are obvious.
`
`III. PETITIONER HAS STANDING
`A.
`The ’772 is a CBM patent under § 18(d)(1) of the AIA, and Petitioner certifies
`
`The ’772 Patent Is a Covered Business Method (“CBM”) Patent
`
`it is available for review under § 42.304(a). Although in fact many claims qualify, a pa-
`
`tent with even one CBM claim is a CBM patent. See CBM 2012-00001, Doc. 36 at 26;
`
`77 Fed. Reg. 48,709 (Aug. 14, 2012). The Board previously found claim 8 of the ’772
`
`satisfied the CBM standing requirement. CBM2014-00110, Pap. 7, 9-14. Petitioner
`
`additionally addresses exemplary Claim 19 (quoted above).
`
`1.
`A CBM patent is “a patent that claims a method or corresponding apparatus for per-
`
`Exemplary Claim 19 Is Financial In Nature
`
`forming data processing or other operations used in the practice, administration, or management of a
`
`financial product or service, except that the term does not include patents for technological
`
`inventions.” AIA § 18(d)(1); Rule § 42.301. “[T]he definition of covered business
`
`method patent was drafted to encompass patents claiming activities that are financial in
`
`nature, incidental to a financial activity or complementary to a financial activity.’” 77 Fed. Reg.
`
`48,734-35 (Aug. 14, 2012) (citing 157 Cong. Rec. S5432 (daily ed. Sept. 8, 2011)).
`
`“[F]inancial product or service” is to be interpreted broadly, id., and “financial . . . simp-
`
`ly means relating to monetary matters”—it does not require any link to traditional financial
`
`11
`
`
`
`industries such as banks. See, e.g., CBM2012-00001, Pap. 36 at 23. See also CBM2013-
`
` Covered Business Method Patent Review
`United States Patent No. 8,336,772
`
`
`00020, Pap. 14 at 11-12; CBM2013-00017, Pap. 8 at 5-6.
`
`The ’772 includes claims to a “data access terminal” (e.g., a “conventional com-
`
`puter” or mobile phone (Ex. 1301 4:7-8)), that transmits payment data to a payment
`
`validation system, and reads and responds to payment validation data, and allows ac-
`
`cess to content in exchange for payment (id. 8:26-28). See AIA § 18(d)(1); Rule
`
`§ 42.301(a). The patent alleges this terminal is part of a system that allows content
`
`owners to make content available without fear of losing revenue. Ex. 1301 2:15-19.
`
`See also id. Fig 12(a)-(e). More generally, the patent is about “[d]ata storage and access
`
`systems [that] enable downloading and paying for data.” Id. Abstract. “The combina-
`
`tion of payment data and stored content data . . . helps reduce the risk of unauthor-
`
`ized access.” Id. And in asserting the patent, Smartflash conceded the alleged inven-
`
`tion relates to a financial activity or transaction, stating “[t]he patents-in-suit generally
`
`cover a portable data carrier for storing data and managing access to the data via pay-
`
`ment information and/or use status rules. The patents-in-suit also generally cover a com-
`
`puter network . . . that serves data and manages access to data by, for example, validat-
`
`ing payment information.” Ex. 1302 ¶ 17.
`
`Indeed, the specification confirms that the recited “data access terminal” is “for
`
`storing and paying for data,” (Ex. 1301 1:20-22), “can communicate with a bank or other fi-
`
`nancial services provider to control payment” (id. 3:53-55), and can “validate payment with an
`
`12
`
`
`
` Covered Business Method Patent Review
`United States Patent No. 8,336,772
`
`external authority such as a bank” (id. 2:8-10). Further, “[p]ayment for the data item or
`
`items requested may either be made directly to the system owner or may be made to an e-payment
`
`system” (id. 20:59-61), and such systems may be provided “according to, for example,
`
`MONDEX, Proton, and/or Visa cash compliant standards” and “payment authentication . . .
`
`may [] be performed by, for example, a data access terminal . . . using payment management
`
`code.” Id. 13:43-64. See also id. 7:66-8:61 (esp. 8:26-28); 11:65-12:4; Fig. 12(a)-(e).
`
`Claim 19 expressly recites software to perform data processing and other oper-
`
`ations in connection with the recited “payment validation system” and thus clearly re-
`
`lates to a financial activity and providing a financial service. See CBM2013-00020, Pap.
`
`14 at 11-12 (“the electronic transfer of money is a financial activity, and allowing such
`
`a transfer amounts to providing a financial service.”). See also AIA § 18(d)(1); 37 C.F.R.
`
`§ 42.301(a); 77 Fed. Reg. 48,734, 48,735 (Aug. 14, 2012) (“[T]he definition of [CBM]
`
`was drafted to encompass patents ‘claiming activities that are financial in nature, incidental
`
`to a financial activity or complementary to a financial activity.’”) (citation omitted). 4
`
`2.
`Claim 19 Does Not Cover A Technological Invention
`Further, claim 19 does not cover a “technological invention” within the excep-
`
`tion in AIA § 18(d)(1), because it does not claim “subject matter as a whole [that] re-
`
`cites a technological feature that is novel and unobvious over the prior art[] and solves a technical
`
`problem using a technical solution.” § 42.301(b). Rather, the specification explains that
`
`
`4 Claim 8 is similarly financial in nature. See CBM2014-00110, Pap. 7, 10-12.
`
`13
`
`
`
` Covered Business Method Patent Review
`United States Patent No. 8,336,772
`
`claim 19’s “data access terminal” was commonplace, and is not directed to a technical
`
`problem, but rather offers a non-technical solution to the business problem of data piracy.
`
`(a) Claim 19 Does Not Recite A Technological Feature
`That Is Novel and Unobvious
`First, no “technological feature” of claim 19 is novel and unobvious. The
`
`PTAB has confirmed that “[m]ere recitation of known technologies, such as comput-
`
`er hardware, communication or computer networks, software, memory, computer-
`
`readable storage medium, scanners, display devices or databases, or specialized ma-
`
`chines, such as an ATM or point of sale device,” or “[r]eciting the use of known prior
`
`art technology to accomplish a process or method, even if that process or method is
`
`novel and non-obvious” will “not typically render a patent a technological invention.”
`
`See, e.g., 77 Fed. Reg. 48,764 (Aug. 14, 2012). As PTAB further stated, “combining
`
`prior art structures to achieve a normal, expected, or predictable result of that combi-
`
`nation” is not a technological invention. 77 Fed. Reg. 157 (Aug. 14, 2012) at 48,764.
`
`As its language makes clear, claim 19 involves no “technology” at all other than “a
`
`data access terminal,” which includes a first interface for communicating with a data
`
`supplier, a user interface, data carrier interface, a program store storing code, and a
`
`processor that implements the well-known steps disclosed in the specification. Ex.
`
`1301. “The data access terminal may be a conventional computer or, alternatively, it may
`
`be a mobile phone,” both of which were known in the art well before the earliest claimed
`
`priority. Id. 4:7; 16:47-52. Indeed, the specification disclaims the use of particular hard-
`
`14
`
`
`
`ware, relying instead on conventional hardware known to a POSA: “[t]he physical em-
`
` Covered Business Method Patent Review
`United States Patent No. 8,336,772
`
`
`bodiment of the system is not critical and a skilled person will understand that the terminals,
`
`data processing systems and the like can all take a variety of forms.” Id. 12:37-40. The “data
`
`supplier” referenced in the claim is also not a technological component, and requires
`
`no specific hardware, see Ex. 1301 6:20-22; 6:62-64, but is, instead, simply a supplier of
`
`online data. Id. 6:2-4. See also id. 6:62-64 (“The computer system is operated by a data
`
`supplier or a data supplier ‘system owner’ for providing content data to the data carrier.”);
`
`8:16-19. The referenced data carrier is, e.g., a s