`United States Patent No. 8,336,772
`
`IN THE UNITED STATES PATENT AND TRADEMARK OFFICE
`
`Attorney Docket No.:
`
` 104677-5008-821
`Customer No. 28120
`
`Petitioner: Apple Inc.
`
`§
`Inventor: Racz et al.
`United States Patent No.: 8,336,772 §
`Formerly Application No.: 13/212,047 §
`Issue Date: December 25, 2012
`§
`Filing Date: August 17, 2011
`§
`Former Group Art Unit: 2887
`§
`Former Examiner: Thien M. Le
`§
`
`For: Data Storage and Access Systems
`
`MAIL STOP PATENT BOARD
`Patent Trial and Appeal Board
`United States Patent and Trademark Office
`Post Office Box 1450
`Alexandria, Virginia 22313-1450
`
`
`PETITION FOR COVERED BUSINESS METHOD PATENT REVIEW OF
`UNITED STATES PATENT NO. 8,336,772 PURSUANT TO 35 U.S.C. § 321,
`37 C.F.R. § 42.304
`
`
`
`
`
`
`
`
`
`
`
` Covered Business Method Patent Review
`United States Patent No. 8,336,772
`
`
`TABLE OF CONTENTS
`
`INTRODUCTION ....................................................................................................... 1
`I.
`II. OVERVIEW OF FIELD OF THE CLAIMED INVENTION ......................... 6
`III. PETITIONER HAS STANDING ............................................................................ 9
`A.
`The ’772 Patent Is a Covered Business Method (“CBM”) Patent ............. 9
`1.
`Exemplary Claim 30 Is Financial In Nature .................................... 10
`2.
`Claim 30 Does Not Cover A Technological Invention ................. 12
`Related Matters and Mandatory Notice Information; Petitioner Is a Real
`Party In Interest Sued for and Charged With Infringement ..................... 16
`IV. DETAILED EXPLANATION OF REASONS FOR RELIEF REQUESTED,
`SHOWING IT IS MORE LIKELY THAN NOT THAT AT LEAST ONE
`CHALLENGED CLAIM IS UNPATENTABLE ............................................... 17
`A.
`Claim Construction .......................................................................................... 19
`B.
`The Challenged Claims Are Unpatentable Under 35 U.S.C. § 101 .......... 23
`1.
`Claims Are Directed To Abstract Ideas ........................................... 24
`2.
`Claims Do Not Disclose An “Inventive Concept” That Is
`“Significantly More” Than An Abstract Idea .................................. 27
`Field Of Use Limitations Cannot Create Patent Eligibility ........... 27
`Generic Computer Implementation Cannot Transform
`Abstract Ideas Into Patent Eligible Inventions ............................... 28
`Functional Nature Confirms Preemption and Ineligibility ............ 32
`5.
`Machine-or-Transformation Test Confirms Ineligibility .............. 34
`6.
`The Challenged Claims Are Invalid Under § 103 ....................................... 35
`1.
`Overview of Stefik ............................................................................... 35
`2.
`Motivation to Combine Stefik with Poggio ..................................... 38
`3.
`Motivation to Combine Stefik with Poggio and Subler ................. 40
`4.
`Motivation to Combine Stefik with Poggio, Subler, and
`Ahmad .................................................................................................... 41
`Motivation to Combine Stefik with Poggio, Subler, Ahmad,
`and Kopp ............................................................................................... 42
`
`B.
`
`C.
`
`3.
`4.
`
`5.
`
`ii
`
`
`
` Covered Business Method Patent Review
`United States Patent No. 8,336,772
`
`
`6.
`
`7.
`
`Motivation to Combine Stefik with Poggio, Subler, Ahmad,
`and Sato ................................................................................................. 44
`Claims 25, 26, 30, and 32 are Obvious in Light of Stefik in
`view of Poggio, Subler, and Ahmad (Ground 2), Obvious
`in Light of Stefik in View of Poggio, Subler, Ahmad, and
`Kopp (Ground 3), Obvious in Light of Stefik in View of
`Poggio, Subler, Ahmad, and Sato (Ground 4), and Obvious
`in Light of Stefik in View of Poggio, Subler, Ahmad, Kopp,
`and Sato (Ground 5). ........................................................................... 46
`CONCLUSION........................................................................................................... 80
`
`V.
`
`
`iii
`
`
`
`
`
`EXHIBIT LIST
`1401
`
`1402
`
`1403
`
`1404
`
`1405
`
`1406
`
`1407
`
`1408
`
`1409
`
`1410
`
`1411
`
`1412
`
`1413
`
`1414
`
`1415
`
`1416
`
`1417
`
`1418
`
`1419
`
` Covered Business Method Patent Review
`United States Patent No. 8,336,772
`
`
`U.S. Patent No. 8,336,772
`
`Plaintiffs’ First Amended Complaint
`
`U.S. Patent No. 5,925,127
`
`U.S. Patent No. 5,940,805
`
`Russell Housley and Jan Dolphin, “Metering: A Pre-pay
`Technique,” Storage and Retrieval for Image and Video Data-
`bases V, Conference Volume 3022, 527 (January 15, 1997)
`U.S. Patent No. 4,999,806
`
`U.S. Patent No. 5,675,734
`
`U.S. Patent No. 4,878,245
`
`File History for U.S. Patent No. 8,336,772
`
`U.S. Patent No. 7,942,317
`
`U.S. Patent No. 5,103,392
`
`U.S. Patent No. 5,530,235
`
`U.S. Patent No. 5,629,980
`
`U.S. Patent No. 5,915,019
`
`European Patent Application, Publication No. EP0809221A2
`
`International Publication No. WO 99/43136
`
`JP Patent Application Publication No. H11-164058 (transla-
`tion)
`Eberhard von Faber, Robert Hammelrath, and Frank-Peter
`Heider, “The Secure Distribution of Digital Contents,” IEEE
`(1997)
`Declaration of Anthony J. Wechselberger In Support of Apple
`
`iv
`
`
`
`1420
`
`1421
`
`1422
`
`1423
`
`1424
`
`1425
`
`1426
`
`1427
`
`1428
`
`1429
`
`1430
`
`1431
`
`1432
`
`1433
`
`1434
`
`1435
`
`1436
`
` Covered Business Method Patent Review
`United States Patent No. 8,336,772
`
`
`Inc.’s Petition for Covered Business Method Patent Review
`U.S. Patent No. 8,033,458
`
`Declaration of Michael P. Duffey In Support of Apple Inc.’s
`Petition for Covered Business Method Patent Review
`Declaration of Megan F. Raymond In Support of Apple Inc.’s
`Petition for Covered Business Method Patent Review
`Claim Construction Memorandum Opinion from Smartflash
`LLC v. Apple Inc., No. 6:13cv447 (Dkt. 229)
`File History for U.S. Patent No. 8,061,598
`
`U.S. Patent No. 4,337,483
`
`U.S. Patent No. 7,725,375
`
`International Publication No. WO 95/34857
`
`JP Patent Application Publication No. H10-269289 (transla-
`tion)
`File History for U.S. Patent No. 7,942,317
`
`File History for U.S. Patent No. 8,033,458
`
`U.S. Patent No. 8,061,598
`
`U.S. Patent No. 8,118,221
`
`File History for U.S. Patent No. 8,118,221
`
`U.S. Patent No. 7,334,720
`
`File History for U.S. Patent No. 7,334,720
`
`U.S. Patent No. 5,646,992
`
`v
`
`
`
` Covered Business Method Patent Review
`United States Patent No. 8,336,772
`
`I.
`
`INTRODUCTION
`Pursuant to § 321 and Rule § 42.304,1 the undersigned, on behalf of and acting
`
`in a representative capacity for Apple Inc. (“Petitioner”), petitions for covered busi-
`
`ness method review of claims 25, 26, 30, and 32 (“challenged claims”) of U.S. Pat. No.
`
`8,336,772, issued to Smartflash Technologies Limited and assigned to Smartflash LLC
`
`(“Patentee”). Petitioner asserts it is more likely than not that the challenged claims are
`
`unpatentable for the reasons herein and requests review of, and judgment against, the
`
`challenged claims under §§ 101 and 103. As discussed in Sec. III.B, infra, Petitioner
`
`has concurrently filed two other CBM Petitions requesting judgment against differ-
`
`ent ’772 claims. The Director, pursuant to Rule 325(c), may determine that merger, or
`
`at minimum coordination, of these proceedings, is appropriate.
`
`
`
`Petitioner previously filed CBM2014-00110/111 seeking review of the ’772 un-
`
`der §§102 and 103. Those petitions were not instituted. In its Decisions Denying In-
`
`stitution, the Board construed “use rule” as “a rule specifying a condition under which
`
`access to content is permitted,” and determined Petitioner had not shown it was more
`
`likely than not that it would prevail in demonstrating that Stefik alone or combined
`
`with Poggio and/or Sato rendered obvious limitations related to “code to request
`
`identifier data…” and “use status data.” CBM2014-00110, Pap. 7, at 15-18; -00111,
`
`
`1 All section cites herein are to 35 U.S.C. or 37 C.F.R., as context indicates, and all
`
`emphasis herein added unless otherwise noted.
`
`
`
`
`
` Covered Business Method Patent Review
`United States Patent No. 8,336,772
`
`Pap. 7, at 15-21. In light of the Board’s decision, Petitioner now identifies additional
`
`prior art with explicit disclosures of the limitations related to “code to request identi-
`
`fier data…” For example, Subler discloses an end user device that provides a power-
`
`ful, easy-to-use interface to browse through and analyze products available from a
`
`storage database. Ex.1436 3:46-52. The end user device software includes code that
`
`retrieves product information from the database and presents the information to the
`
`user in a windowed graphical user interface. Ex.1436 4:49-54; 5:26-30. Petitioner also
`
`identifies additional prior art—Ahmad and Kopp (Exs.1403 and 1404)—with explicit
`
`disclosures of “use rules” as construed by the Board and “use status data.” Ahmad,
`
`for example, describes a software rental system that monitors an elapsed time of use
`
`recorded by a timer or a number of uses recorded by a counter and does not permit
`
`access to the rented software if a software rental license has been exhausted (see, e.g.,
`
`Ex.1403 2:62-3:18), while Kopp discloses checking recorded utilization data and deny-
`
`ing access to a data record if a licensed extent of utilization has been exhausted (see,
`
`e.g., Ex.1404 6:41-47). Petitioner has also identified additional disclosures in Stefik and
`
`Poggio concerning these limitations, further confirming a POSA2 would have found it
`
`2 “POSA” refers to knowledge/understanding of a person of ordinary skill in the art
`
`as of Oct. 25, 1999, who would have at least a B.S. in E.E., C.S., or a telecommunica-
`
`tions related field, and at least 3 yrs. industry experience including client-server data/
`
`information distribution and management architectures. See Ex.1419 ¶¶ 25, 28 n.3.
`
`2
`
`
`
` Covered Business Method Patent Review
`United States Patent No. 8,336,772
`
`obvious and routine to implement the system disclosed by Stefik and Poggio using the
`
`expressly advantageous teachings of Subler, Ahmad, Kopp, and/or Sato, detailed in
`
`§IV.C, infra. See, e.g., Ex.1419 ¶¶ 60-67.
`
`The challenged claims merely recite basic computer systems well-known in the
`
`field of data storage and access, including a “handheld multimedia terminal for retriev-
`
`ing and accessing protected multimedia content” and a “data access terminal for con-
`
`trolling access to one or more content data items stored on a data carrier.” Ex.1401
`
`1:24-26. Claim 30, for example, recites four rudimentary components of a data access
`
`terminal “for controlling access to one or more content data items”—(A) a user interface, (B) a
`
`data carrier interface, (C) a program store storing code implementable by a processor, and
`
`(D) a processor . . . for implementing the stored code. The recited code is similarly ele-
`
`mentary, requesting and receiving user identifier data (D1-D2), requesting, receiving, and present-
`
`ing content information (D3-D5), receiving and responding to a user selection (D6-D7), re-
`
`ceiving and responding to payment validation data (D8-D9), receiving a second user selec-
`
`tion (D10), and reading and evaluating use status data and use rules (D11-D12):
`
`30. A data access terminal for controlling access to one or more content
`data items stored on a data carrier, the data access terminal comprising:
`[A] user interface;
`[B] a data carrier interface;
`[C] a program store storing code implementable by a processor; and
`[D] a processor coupled to the user interface, to the data carrier interface
`and to the program store for implementing the stored code, the code
`
`3
`
`
`
` Covered Business Method Patent Review
`United States Patent No. 8,336,772
`
`
`comprising:
`[D1]code to request identifier data identifying one or more content
`data items available for retrieving;
`[D2] code to receive said identifier data identifying said one or more
`content data items available for retrieving;
`[D3] code to request content information pertaining to at least one of
`said one or more content data items identified by said identified data;
`[D4] code to receive said content information;
`[D5] code to present said content information to a user via said user
`interface pertaining to said identified one or more content data items
`available for retrieving;
`[D6] code to receive a first user selection selecting at least one of said
`one or more of said content data items available for retrieving;
`[D7] code responsive to said first user selection of said selected at
`least one content data item to transmit payment data relating to pay-
`ment for said selected at least one content item for validation by a
`payment validation system;
`[D8] code to receive payment validation data defining if said payment
`validation system has validated payment for said selected at least one
`content data item;
`[D9] code responsive to the payment validation data to retrieve said
`selected at least one content data item from a data supplier and to
`write said retrieved at least one content data item into said data carrier;
`[D10] code to receive a second user selection selecting one of said one
`or more of said retrieved content data items to access;
`[D11] code to read use status data and use rules from said data carrier
`pertaining to said second selected one or more retrieved content data
`
`4
`
`
`
` Covered Business Method Patent Review
`United States Patent No. 8,336,772
`
`
`items; and
`[D12] code to evaluate said use status data and use rules to determine
`whether access is permitted to said second selected one or more re-
`trieved content data items.
`Ex.1401. But at the patent’s earliest claimed priority date, these simple elements and
`
`their combination were well known to any POSA. The patent acknowledges that the
`
`idea of providing access to data in exchange for a payment (e.g., purchase of music on
`
`a CD) was already well known. E.g., id. 5:13-16 (“the purchase outright option may be
`
`equivalent to the purchase of a compact disc (CD)”). And, the prior art was teeming with
`
`disclosures of this basic concept and its straightforward physical implementation.
`
`Further, claim 30 clearly involves no “technology” at all other than “a data access
`
`terminal,” with user and data carrier interfaces, a program store storing code, and a processor
`
`that implements the specification’s well-known steps—all conceded as well known
`
`and commonplace by the ’772, which states this “terminal comprises a general purpose
`
`computer.” E.g., id. 4:7, 16:47-52. Claim 30 recites no more than a system for requesting
`
`and retrieving content while sending payment data, receiving and responding to pay-
`
`ment data, and controlling access to the data based on payment validation data. And
`
`the other challenged claims are nothing but variations on this simple theme, with the
`
`addition, in the challenged “handheld multimedia terminal” claims, of equally generic
`
`components (e.g., known wireless interface, non-volatile memory, and a display). 3 See,
`
`3 Claim 25, e.g., recites a “handheld multimedia terminal,” but simply adds to claim 30
`
`5
`
`
`
` Covered Business Method Patent Review
`United States Patent No. 8,336,772
`
`e.g., id. 12:37-40 (“physical embodiment of the system is not critical and a skilled person will un-
`
`derstand that the terminals, data processing systems and the like can all take a variety of forms.”).
`
`Indeed, as confirmed by Alice Corp.Pty, Ltd. v. CLS Bank Int’l, 134 S. Ct. 2347
`
`(2014)—decided after Petitioner’s original ’772 petitions—the challenged claims are
`
`also directed to patent ineligible subject matter under §101. As the Board noted previ-
`
`ously, “the ’772 patent makes clear that the asserted novelty of the invention is not in
`
`any specific improvement of software or hardware, but in the method of controlling ac-
`
`cess to data,” CBM2014-00110, Pap. 7, at 13, and the challenged claims are directed to
`
`nothing more than the unpatentable abstract idea of paying for and controlling access
`
`to data, with at most the addition of well-known, routine and conventional features—
`
`in particular, generic computer implementation that cannot confer patentability on
`
`these patent-ineligible abstractions. E.g., Alice, 134 S. Ct. at 2359-60. Each challenged
`
`claim recites ineligible subject matter and is obvious, and is thus unpatentable.
`
`II. OVERVIEW OF FIELD OF THE CLAIMED INVENTION
`By October 25, 1999, electronic sale, distribution, and content protection for
`
`digital products was well-known to a POSA, and their combination as claimed would
`
`also have been well-known or at minimum obvious. See, e.g., Ex.1419 § V. In 1991, e.g.,
`
`
`the requirements of a wireless interface, non-volatile memory, and a display, while
`
`specifying the user interface enables certain functions. Claim 32, which depends from
`
`claim 30, simply specifies integration with a mobile communications device. Ex.1401.
`
`6
`
`
`
` Covered Business Method Patent Review
`United States Patent No. 8,336,772
`
`U.S. Pat. 4,999,806 disclosed a system and method for content protection and sale
`
`and distribution of digital products (e.g., software) by phone. See, e.g., Ex.1406 Abstract
`
`(“central station distributes software by telephone. . . accepts credit card information, transmits an
`
`acceptance code . . . After verifying the credit card information, the station calls the purchaser back
`
`and continues with the transaction only after receiving the acceptance code.”); 1:67-2:9 (describing
`
`“means for selling and distributing protected software using standard telephone lines,” “permit[ting]
`
`the purchaser to rent the protected software for a period of time,” and “to rent the protected software
`
`for a specific number of runs”). Ex.1406 also discloses (1) different types of access, e.g.,
`
`purchase vs. rental and (2) a Control Transfer Program and a Primary Protection Pro-
`
`gram to prevent unauthorized copies. See id. Abstract; 2:65-3:23; Ex.1419 ¶ 30.
`
`In April 1992, U.S. Pat. No. 5,103,392 issued, disclosing use-based charging for
`
`digital products. See, e.g., id. Ex.1411 1:64-2:17. Ex. 1411’s emphasis on assuring per-
`
`mission to access a program and compensating providers underscores this existing fo-
`
`cus in the art on digital rights management (“DRM”), over eight years before the
`
`claimed priority date. See, e,g., Ex.1419 ¶ 33. Also in 1997, Exhibit 1418 (“von Faber”)
`
`observed that “[e]lectronic commerce systems dealing with the distribution of digital con-
`
`tents . . . have to couple the use of the provided digital goods with a prior payment for the goods in a
`
`way which cannot be bypassed,” proposing a system where customers purchase keys
`
`required to utilize encrypted content. See, e.g., id. at 7(“The basic idea . . . is to distribute
`
`the contents in encrypted form, and to have the customer pay for the key which he needs to transform
`
`7
`
`
`
` Covered Business Method Patent Review
`United States Patent No. 8,336,772
`
`the encrypted content in an usable form.”); id. 8; see also id. Fig. 1. Von Faber’s system can be
`
`used for a variety of known distribution and payment methods. See, e.g., id. 13 (“Differ-
`
`ent methods can be used to distribute the encrypted contents (standard techniques). . . . Different
`
`electronic payment methods can be integrated . . . . This flexibility leads to the fact that totally differ-
`
`ent authorisation methods can be integrated.”). Von Faber further addressed the known issue
`
`of payment distribution to providers. See, e.g., id. (“The system automatically divides the
`
`package price (payments) and guarantees that the money is transferred to each Content Provider.”);
`
`Ex.1419 ¶¶ 36-38.
`
`And U.S. Pat. No. 5,915,019 (“Ginter,” filed Jan. 8, 1997) issued June 1999,
`
`discloses “systems and methods for secure transaction management and electronic
`
`rights protection.” See, e.g., Ex.1414 Abstract. Ginter’s system “help[s] to ensure that
`
`information is accessed and used only in authorized ways, and maintain the integrity, availabil-
`
`ity, and/or confidentiality of the information.” See, e.g., id. Ginter’s “techniques may be
`
`used to support an all-electronic information distribution, for example, utilizing the ‘electronic
`
`highway.’” Id. Ginter discloses that the various entities of the virtual distribution envi-
`
`ronment (“VDE”) can flexibly take on any VDE roles. See, e.g., id. 255:22-23 (“All par-
`
`ticipants of VDE 100 have the innate ability to participate in any role.”); 255:23-43. Ginter
`
`thus highlights the known flexibility in such distribution systems, underscoring that
`
`combinations among disclosures of such distribution systems would have been obvi-
`
`ous. See, e.g., Ex.1419 ¶¶ 39, 40.
`
`8
`
`
`
` Covered Business Method Patent Review
`United States Patent No. 8,336,772
`
`
`Content storage and utilization on portable devices, including mobile commu-
`
`nication devices such as cellular phones, was also well-known. As one example,
`
`Ex.1416 (“Rydbeck,” pub’d Aug. 26, 1999), discloses a cell phone for storing digital
`
`content in non-volatile memory and accessing that content. See, e.g., Ex.1416 5 (“Be-
`
`cause of its integration into the cellular phone, the digital entertainment module can share
`
`components already present in the cellular phone. Such savings would not be available
`
`if a CD player were simply aggregated with the phone. Further, the use of solid state
`
`RAM or ROM, as opposed to disc storage, eliminates the need for bounce control
`
`circuitry[, enabling the] invention to provide cellular communications and entertain-
`
`ment during leisure activities.”); Ex.1419 ¶ 41. Thus, as these background examples
`
`and the additional prior art detailed below in IV.B (including the primary prior art
`
`Stefik patent) illustrate, the art was rife with discussion of the same supposed “inven-
`
`tion” now memorialized in the challenged claims. Long before the purported priority
`
`date, disclosures abounded of the very features that Smartflash now seeks to claim as
`
`its exclusive property. As outlined below, the challenged claims are obvious.
`
`III. PETITIONER HAS STANDING
`A.
`The ’772 is a CBM patent under AIA § 18(d)(1), and Petitioner certifies it is
`
`The ’772 Patent Is a Covered Business Method (“CBM”) Patent
`
`available for review under § 42.304(a). Although many claims qualify, a patent with
`
`even one CBM claim is a CBM patent. See CBM 2012-00001, Doc. 36 at 26; 77 Fed.
`
`9
`
`
`
` Covered Business Method Patent Review
`United States Patent No. 8,336,772
`
`Reg. 48,709 (Aug. 14, 2012). This Board previously found the claim 8 satisfies the
`
`CBM requirement, CBM2014-00104, Pap. 8, 8-13. Petitioner nevertheless additionally
`
`addresses Claim 30 (quoted above) herein.
`
`1. Exemplary Claim 30 Is Financial In Nature
`A CBM patent is “a patent that claims a method or corresponding apparatus for per-
`
`forming data processing or other operations used in the practice, administration, or management of a
`
`financial product or service, except that the term does not include patents for technological
`
`inventions.” AIA § 18(d)(1); 37 C.F.R. § 42.301. “[T]he definition of covered business
`
`method patent was drafted to encompass patents claiming activities that are financial in
`
`nature, incidental to a financial activity or complementary to a financial activity.’” 77 Fed. Reg.
`
`48,734-35 (Aug. 14, 2012) (citing 157 Cong. Rec. S5432 (daily ed. Sept. 8, 2011)).
`
`“[F]inancial product or service” is to be interpreted broadly, id., and “financial . . . simp-
`
`ly means relating to monetary matters”—it does not require any link to traditional financial
`
`industries such as banks. See, e.g., CBM2012-00001, Pap. 36 at 23. .
`
`The ’772 includes claims to a “data access terminal” (e.g., a “conventional com-
`
`puter” or mobile phone (Ex.1401 4:7-8)), that transmits payment data to a payment
`
`validation system for authorization and responds to payment validation data to re-
`
`trieve requested content. See id. cl. 8, 30, 35; AIA § 18(d)(1); Rule § 42.301(a). The pa-
`
`tent alleges this terminal is part of a system that allows content to be made available
`
`without fear of losing revenue, and claim 30 specifies that the terminal is “for control-
`
`10
`
`
`
` Covered Business Method Patent Review
`United States Patent No. 8,336,772
`
`ling access to one or more content data items.” Ex.1401 2:15-19; see also id. Fig 12(a)-
`
`(e). More generally, the patent is about “[d]ata storage and access systems [that] enable
`
`downloading and paying for data.” Id. Abstract. “The combination of payment data
`
`and stored content data . . . helps reduce the risk of unauthorized access.” Id. And in
`
`asserting the patent, Smartflash conceded the alleged invention relates to a financial
`
`activity or transaction, stating “[t]he patents-in-suit generally cover a portable data car-
`
`rier for storing data and managing access to the data via payment information and/or use
`
`status rule [and] also generally cover a computer network . . . that serves data and man-
`
`ages access to data by, for example, validating payment information.” Ex.1402 ¶ 17.
`
`Indeed, the specification confirms that the recited “data access terminal” is “for
`
`storing and paying for data,” (Ex.1401 1:20-22), “can communicate with a bank or other finan-
`
`cial services provider to control payment” (id. 3:53-55), and can “validate payment with an ex-
`
`ternal authority such as a bank” (id. 2:8-10). Further, “[p]ayment for the data item or items
`
`requested may either be made directly to the system owner or may be made to an e-payment system”
`
`(id. 20:59-61), and such systems may be provided “according to, for example,
`
`MONDEX, Proton, and/or Visa cash compliant standards” and “payment authentication . . .
`
`may [] be performed by, for example, a data access terminal . . . using payment management
`
`code.” Id. 13:43-64. See also id. 7:66-8:61 (esp. 8:26-28); 11:65-12:4; Fig. 12(a)-(e).
`
`Claim 30 expressly recites software to perform data processing and other oper-
`
`ations in connection with the recited “payment validation system” thus clearly relates
`
`11
`
`
`
` Covered Business Method Patent Review
`United States Patent No. 8,336,772
`
`to a financial activity and providing a financial service. See CBM2013-00020, Pap. 14 at
`
`11-12 (“the electronic transfer of money is a financial activity, and allowing such a
`
`transfer amounts to providing a financial service.”). See also AIA § 18(d)(1); 37 C.F.R.
`
`§ 42.301(a); 77 Fed. Reg. 48,734, 48,735 (Aug. 14, 2012) (“[T]he definition of [CBM]
`
`was drafted to encompass patents ‘claiming activities that are financial in nature, incidental
`
`to a financial activity or complementary to a financial activity.’”) (citation omitted). 4
`
`2. Claim 30 Does Not Cover A Technological Invention
`Further, claim 30 does not cover a “technological invention” within the exception in
`
`AIA § 18(d)(1), because it does not claim “subject matter as a whole [that] recites a
`
`technological feature that is novel and unobvious over the prior art[] and solves a technical problem us-
`
`ing a technical solution.” § 42.301(b). To the contrary, the specification explains that
`
`claim 30’s “data access terminal” was commonplace, and is not directed to a technical
`
`problem, but rather offers a non-technical solution to the business problem of data piracy.
`
`(a) Claim 30 Does Not Recite A Technological Feature
`That Is Novel and Unobvious
`First, no “technological feature” of claim 30 is novel and unobvious. The
`
`PTAB has confirmed that “[m]ere recitation of known technologies, such as comput-
`
`er hardware, communication or computer networks, software, memory, computer-
`
`readable storage medium, scanners, display devices or databases, or specialized ma-
`
`chines, such as an ATM or point of sale device,” or “[r]eciting the use of known prior
`
`4 Claim 8 is similarly financial in nature. See CBM2014-00110, Pap. 7, 10-12.
`
`12
`
`
`
` Covered Business Method Patent Review
`United States Patent No. 8,336,772
`
`art technology to accomplish a process or method, even if that process or method is
`
`novel and non-obvious” will “not typically render a patent a technological invention.”
`
`See, e.g., 77 Fed. Reg. 48,764 (Aug. 14, 2012). As the PTAB further stated, “combining
`
`prior art structures to achieve a normal, expected, or predictable result of that combi-
`
`nation” is not a technological invention. 77 Fed. Reg. 157 (Aug. 14, 2012) at 48,764.
`
`As its language makes clear, claim 30 involves no “technology” at all other than, at
`
`most, “a data access terminal,” which includes user and data carrier interfaces, a pro-
`
`gram store, and a processor. Ex.1401. “The data access terminal may be a conventional
`
`computer or, alternatively, it may be a mobile phone,” both of which were known in the
`
`art well before 2000. Id. 4:7; 16:47-52. Indeed, the specification disclaims the use of par-
`
`ticular hardware, relying instead on conventional hardware known to a POSA: “[t]he
`
`physical embodiment of the system is not critical and a skilled person will understand that the
`
`terminals, data processing systems and the like can all take a variety of forms.” Id. 12:37-40. The
`
`“data supplier” of the claims is also not a technological component, and requires no
`
`specific hardware, see Ex.1401 6:20-22; 6:62-64, but is, instead, simply a supplier of
`
`online data. Id. 6:2-4. See also id. 6:62-64 (“The computer system is operated by a data
`
`supplier or a data supplier ‘system owner’ for providing content data to the data carrier.”);
`
`8:16-19. The referenced data carrier is, e.g., a standard smart card. Id. 11:35.
`
`The use of software (code) for requesting and receiving identifier data identify-
`
`ing content data, requesting, receiving, and presenting content information, receiving
`
`13
`
`
`
`and responding to a user selection for content (including by transmitting payment da-
`
` Covered Business Method Patent Review
`United States Patent No. 8,336,772
`
`
`ta), receiving and responding to payment validation data, receiving a second user se-
`
`lection for content, and reading and evaluating use status data and use rules to deter-
`
`mine access, was also exceedingly well known in the art, and could not transform the
`
`claims into a technological invention. See, e.g., 77 Fed. Reg. 48,756 48,764 (Aug. 14,
`
`2012) (“[m]ere recitation of known technologies, such as . . . software, memory, com-
`
`puter-readable storage medium . . . [will] not typically render a patent a technological
`
`invention.”); Ex.1419 § V, ¶¶ 80-88. The functions performed by the code (D1-D7,
`
`D10)—related to the identification, access, presentation, selection, and control of data
`
`and content information, as disclosed in the specification—were commonplace before
`
`the earliest claimed priority date. See, e.g., Ex.1406 8:62-9:12; Ex.1401 1:40-50. Further,
`
`the sending of payment data to a payment validation system and (D7) and the finan-
`
`cial transaction performed by the code described in elements D8 and D9 was well
`
`known, because, as the patent concedes, e-payment systems were known. Ex.1401
`
`13:43-64 (“E-payment systems coupled to banks . . . these provide an e-payment system accord-
`
`ing to, for example, MONDEX, Proton, and/or Visa cash compliant standards . . . payment data
`
`may be validated by a data access terminal using payment management code.”). Using code to im-
`
`plement this transaction, as disclosed in the specification, was obvious and known.
`
`E.g,, Ex.1419 §V, ¶¶ 80-88. Providing access to content based on payment and rules
`
`(D11-D12), as claimed in the patent, was also well known. See, e.g., Exs.1407; 1406
`
`14
`
`
`
`Abstract, 1:67-2:9; 1408 Abstract, 4:27-35; 1419 §V, ¶¶ 76-78.
`
` Covered Business Method Patent Review
`United States Patent No. 8,336,772
`
`
`The state of the art at the time, and the detailed prior art analysis below, further
`
`reflects claim 30 does not recite a technological feature that is novel and nonobvious.
`
`See, e.g., Section II, supra; Section IV.C, infra. Even apart from other failures to trigger
`
`the exception, for these reasons alone, claim 30 is not a technological invention. 5
`
`(b) Claim 30 Does