throbber
Covered Business Method Patent Review
`United States Patent No. 8,336,772
`
`IN THE UNITED STATES PATENT AND TRADEMARK OFFICE
`
`Attorney Docket No.:
`
` 104677-5008-821
`Customer No. 28120
`
`Petitioner: Apple Inc.
`

`Inventor: Racz et al.
`United States Patent No.: 8,336,772 §
`Formerly Application No.: 13/212,047 §
`Issue Date: December 25, 2012

`Filing Date: August 17, 2011

`Former Group Art Unit: 2887

`Former Examiner: Thien M. Le

`
`For: Data Storage and Access Systems
`
`MAIL STOP PATENT BOARD
`Patent Trial and Appeal Board
`United States Patent and Trademark Office
`Post Office Box 1450
`Alexandria, Virginia 22313-1450
`
`
`PETITION FOR COVERED BUSINESS METHOD PATENT REVIEW OF
`UNITED STATES PATENT NO. 8,336,772 PURSUANT TO 35 U.S.C. § 321,
`37 C.F.R. § 42.304
`
`
`
`
`
`
`
`

`
`
`
` Covered Business Method Patent Review
`United States Patent No. 8,336,772
`
`
`TABLE OF CONTENTS
`
`INTRODUCTION ....................................................................................................... 1 
`I. 
`II.  OVERVIEW OF FIELD OF THE CLAIMED INVENTION ......................... 6 
`III.  PETITIONER HAS STANDING ............................................................................ 9 
`A. 
`The ’772 Patent Is a Covered Business Method (“CBM”) Patent ............. 9 
`1. 
`Exemplary Claim 30 Is Financial In Nature .................................... 10 
`2. 
`Claim 30 Does Not Cover A Technological Invention ................. 12 
`Related Matters and Mandatory Notice Information; Petitioner Is a Real
`Party In Interest Sued for and Charged With Infringement ..................... 16 
`IV.  DETAILED EXPLANATION OF REASONS FOR RELIEF REQUESTED,
`SHOWING IT IS MORE LIKELY THAN NOT THAT AT LEAST ONE
`CHALLENGED CLAIM IS UNPATENTABLE ............................................... 17 
`A. 
`Claim Construction .......................................................................................... 19 
`B. 
`The Challenged Claims Are Unpatentable Under 35 U.S.C. § 101 .......... 23 
`1. 
`Claims Are Directed To Abstract Ideas ........................................... 24 
`2. 
`Claims Do Not Disclose An “Inventive Concept” That Is
`“Significantly More” Than An Abstract Idea .................................. 27 
`Field Of Use Limitations Cannot Create Patent Eligibility ........... 27 
`Generic Computer Implementation Cannot Transform
`Abstract Ideas Into Patent Eligible Inventions ............................... 28 
`Functional Nature Confirms Preemption and Ineligibility ............ 32 
`5. 
`Machine-or-Transformation Test Confirms Ineligibility .............. 34 
`6. 
`The Challenged Claims Are Invalid Under § 103 ....................................... 35 
`1. 
`Overview of Stefik ............................................................................... 35 
`2. 
`Motivation to Combine Stefik with Poggio ..................................... 38 
`3. 
`Motivation to Combine Stefik with Poggio and Subler ................. 40 
`4. 
`Motivation to Combine Stefik with Poggio, Subler, and
`Ahmad .................................................................................................... 41 
`Motivation to Combine Stefik with Poggio, Subler, Ahmad,
`and Kopp ............................................................................................... 42 
`
`B. 
`
`C. 
`
`3. 
`4. 
`
`5. 
`
`ii
`
`

`
` Covered Business Method Patent Review
`United States Patent No. 8,336,772
`
`
`6. 
`
`7. 
`
`Motivation to Combine Stefik with Poggio, Subler, Ahmad,
`and Sato ................................................................................................. 44 
`Claims 25, 26, 30, and 32 are Obvious in Light of Stefik in
`view of Poggio, Subler, and Ahmad (Ground 2), Obvious
`in Light of Stefik in View of Poggio, Subler, Ahmad, and
`Kopp (Ground 3), Obvious in Light of Stefik in View of
`Poggio, Subler, Ahmad, and Sato (Ground 4), and Obvious
`in Light of Stefik in View of Poggio, Subler, Ahmad, Kopp,
`and Sato (Ground 5). ........................................................................... 46 
`CONCLUSION........................................................................................................... 80 
`
`V. 
`
`
`iii
`
`

`
`
`
`EXHIBIT LIST
`1401
`
`1402
`
`1403
`
`1404
`
`1405
`
`1406
`
`1407
`
`1408
`
`1409
`
`1410
`
`1411
`
`1412
`
`1413
`
`1414
`
`1415
`
`1416
`
`1417
`
`1418
`
`1419
`
` Covered Business Method Patent Review
`United States Patent No. 8,336,772
`
`
`U.S. Patent No. 8,336,772
`
`Plaintiffs’ First Amended Complaint
`
`U.S. Patent No. 5,925,127
`
`U.S. Patent No. 5,940,805
`
`Russell Housley and Jan Dolphin, “Metering: A Pre-pay
`Technique,” Storage and Retrieval for Image and Video Data-
`bases V, Conference Volume 3022, 527 (January 15, 1997)
`U.S. Patent No. 4,999,806
`
`U.S. Patent No. 5,675,734
`
`U.S. Patent No. 4,878,245
`
`File History for U.S. Patent No. 8,336,772
`
`U.S. Patent No. 7,942,317
`
`U.S. Patent No. 5,103,392
`
`U.S. Patent No. 5,530,235
`
`U.S. Patent No. 5,629,980
`
`U.S. Patent No. 5,915,019
`
`European Patent Application, Publication No. EP0809221A2
`
`International Publication No. WO 99/43136
`
`JP Patent Application Publication No. H11-164058 (transla-
`tion)
`Eberhard von Faber, Robert Hammelrath, and Frank-Peter
`Heider, “The Secure Distribution of Digital Contents,” IEEE
`(1997)
`Declaration of Anthony J. Wechselberger In Support of Apple
`
`iv
`
`

`
`1420
`
`1421
`
`1422
`
`1423
`
`1424
`
`1425
`
`1426
`
`1427
`
`1428
`
`1429
`
`1430
`
`1431
`
`1432
`
`1433
`
`1434
`
`1435
`
`1436
`
` Covered Business Method Patent Review
`United States Patent No. 8,336,772
`
`
`Inc.’s Petition for Covered Business Method Patent Review
`U.S. Patent No. 8,033,458
`
`Declaration of Michael P. Duffey In Support of Apple Inc.’s
`Petition for Covered Business Method Patent Review
`Declaration of Megan F. Raymond In Support of Apple Inc.’s
`Petition for Covered Business Method Patent Review
`Claim Construction Memorandum Opinion from Smartflash
`LLC v. Apple Inc., No. 6:13cv447 (Dkt. 229)
`File History for U.S. Patent No. 8,061,598
`
`U.S. Patent No. 4,337,483
`
`U.S. Patent No. 7,725,375
`
`International Publication No. WO 95/34857
`
`JP Patent Application Publication No. H10-269289 (transla-
`tion)
`File History for U.S. Patent No. 7,942,317
`
`File History for U.S. Patent No. 8,033,458
`
`U.S. Patent No. 8,061,598
`
`U.S. Patent No. 8,118,221
`
`File History for U.S. Patent No. 8,118,221
`
`U.S. Patent No. 7,334,720
`
`File History for U.S. Patent No. 7,334,720
`
`U.S. Patent No. 5,646,992
`
`v
`
`

`
` Covered Business Method Patent Review
`United States Patent No. 8,336,772
`
`I.
`
`INTRODUCTION
`Pursuant to § 321 and Rule § 42.304,1 the undersigned, on behalf of and acting
`
`in a representative capacity for Apple Inc. (“Petitioner”), petitions for covered busi-
`
`ness method review of claims 25, 26, 30, and 32 (“challenged claims”) of U.S. Pat. No.
`
`8,336,772, issued to Smartflash Technologies Limited and assigned to Smartflash LLC
`
`(“Patentee”). Petitioner asserts it is more likely than not that the challenged claims are
`
`unpatentable for the reasons herein and requests review of, and judgment against, the
`
`challenged claims under §§ 101 and 103. As discussed in Sec. III.B, infra, Petitioner
`
`has concurrently filed two other CBM Petitions requesting judgment against differ-
`
`ent ’772 claims. The Director, pursuant to Rule 325(c), may determine that merger, or
`
`at minimum coordination, of these proceedings, is appropriate.
`
`
`
`Petitioner previously filed CBM2014-00110/111 seeking review of the ’772 un-
`
`der §§102 and 103. Those petitions were not instituted. In its Decisions Denying In-
`
`stitution, the Board construed “use rule” as “a rule specifying a condition under which
`
`access to content is permitted,” and determined Petitioner had not shown it was more
`
`likely than not that it would prevail in demonstrating that Stefik alone or combined
`
`with Poggio and/or Sato rendered obvious limitations related to “code to request
`
`identifier data…” and “use status data.” CBM2014-00110, Pap. 7, at 15-18; -00111,
`
`
`1 All section cites herein are to 35 U.S.C. or 37 C.F.R., as context indicates, and all
`
`emphasis herein added unless otherwise noted.
`
`
`
`

`
` Covered Business Method Patent Review
`United States Patent No. 8,336,772
`
`Pap. 7, at 15-21. In light of the Board’s decision, Petitioner now identifies additional
`
`prior art with explicit disclosures of the limitations related to “code to request identi-
`
`fier data…” For example, Subler discloses an end user device that provides a power-
`
`ful, easy-to-use interface to browse through and analyze products available from a
`
`storage database. Ex.1436 3:46-52. The end user device software includes code that
`
`retrieves product information from the database and presents the information to the
`
`user in a windowed graphical user interface. Ex.1436 4:49-54; 5:26-30. Petitioner also
`
`identifies additional prior art—Ahmad and Kopp (Exs.1403 and 1404)—with explicit
`
`disclosures of “use rules” as construed by the Board and “use status data.” Ahmad,
`
`for example, describes a software rental system that monitors an elapsed time of use
`
`recorded by a timer or a number of uses recorded by a counter and does not permit
`
`access to the rented software if a software rental license has been exhausted (see, e.g.,
`
`Ex.1403 2:62-3:18), while Kopp discloses checking recorded utilization data and deny-
`
`ing access to a data record if a licensed extent of utilization has been exhausted (see,
`
`e.g., Ex.1404 6:41-47). Petitioner has also identified additional disclosures in Stefik and
`
`Poggio concerning these limitations, further confirming a POSA2 would have found it
`
`2 “POSA” refers to knowledge/understanding of a person of ordinary skill in the art
`
`as of Oct. 25, 1999, who would have at least a B.S. in E.E., C.S., or a telecommunica-
`
`tions related field, and at least 3 yrs. industry experience including client-server data/
`
`information distribution and management architectures. See Ex.1419 ¶¶ 25, 28 n.3.
`
`2
`
`

`
` Covered Business Method Patent Review
`United States Patent No. 8,336,772
`
`obvious and routine to implement the system disclosed by Stefik and Poggio using the
`
`expressly advantageous teachings of Subler, Ahmad, Kopp, and/or Sato, detailed in
`
`§IV.C, infra. See, e.g., Ex.1419 ¶¶ 60-67.
`
`The challenged claims merely recite basic computer systems well-known in the
`
`field of data storage and access, including a “handheld multimedia terminal for retriev-
`
`ing and accessing protected multimedia content” and a “data access terminal for con-
`
`trolling access to one or more content data items stored on a data carrier.” Ex.1401
`
`1:24-26. Claim 30, for example, recites four rudimentary components of a data access
`
`terminal “for controlling access to one or more content data items”—(A) a user interface, (B) a
`
`data carrier interface, (C) a program store storing code implementable by a processor, and
`
`(D) a processor . . . for implementing the stored code. The recited code is similarly ele-
`
`mentary, requesting and receiving user identifier data (D1-D2), requesting, receiving, and present-
`
`ing content information (D3-D5), receiving and responding to a user selection (D6-D7), re-
`
`ceiving and responding to payment validation data (D8-D9), receiving a second user selec-
`
`tion (D10), and reading and evaluating use status data and use rules (D11-D12):
`
`30. A data access terminal for controlling access to one or more content
`data items stored on a data carrier, the data access terminal comprising:
`[A] user interface;
`[B] a data carrier interface;
`[C] a program store storing code implementable by a processor; and
`[D] a processor coupled to the user interface, to the data carrier interface
`and to the program store for implementing the stored code, the code
`
`3
`
`

`
` Covered Business Method Patent Review
`United States Patent No. 8,336,772
`
`
`comprising:
`[D1]code to request identifier data identifying one or more content
`data items available for retrieving;
`[D2] code to receive said identifier data identifying said one or more
`content data items available for retrieving;
`[D3] code to request content information pertaining to at least one of
`said one or more content data items identified by said identified data;
`[D4] code to receive said content information;
`[D5] code to present said content information to a user via said user
`interface pertaining to said identified one or more content data items
`available for retrieving;
`[D6] code to receive a first user selection selecting at least one of said
`one or more of said content data items available for retrieving;
`[D7] code responsive to said first user selection of said selected at
`least one content data item to transmit payment data relating to pay-
`ment for said selected at least one content item for validation by a
`payment validation system;
`[D8] code to receive payment validation data defining if said payment
`validation system has validated payment for said selected at least one
`content data item;
`[D9] code responsive to the payment validation data to retrieve said
`selected at least one content data item from a data supplier and to
`write said retrieved at least one content data item into said data carrier;
`[D10] code to receive a second user selection selecting one of said one
`or more of said retrieved content data items to access;
`[D11] code to read use status data and use rules from said data carrier
`pertaining to said second selected one or more retrieved content data
`
`4
`
`

`
` Covered Business Method Patent Review
`United States Patent No. 8,336,772
`
`
`items; and
`[D12] code to evaluate said use status data and use rules to determine
`whether access is permitted to said second selected one or more re-
`trieved content data items.
`Ex.1401. But at the patent’s earliest claimed priority date, these simple elements and
`
`their combination were well known to any POSA. The patent acknowledges that the
`
`idea of providing access to data in exchange for a payment (e.g., purchase of music on
`
`a CD) was already well known. E.g., id. 5:13-16 (“the purchase outright option may be
`
`equivalent to the purchase of a compact disc (CD)”). And, the prior art was teeming with
`
`disclosures of this basic concept and its straightforward physical implementation.
`
`Further, claim 30 clearly involves no “technology” at all other than “a data access
`
`terminal,” with user and data carrier interfaces, a program store storing code, and a processor
`
`that implements the specification’s well-known steps—all conceded as well known
`
`and commonplace by the ’772, which states this “terminal comprises a general purpose
`
`computer.” E.g., id. 4:7, 16:47-52. Claim 30 recites no more than a system for requesting
`
`and retrieving content while sending payment data, receiving and responding to pay-
`
`ment data, and controlling access to the data based on payment validation data. And
`
`the other challenged claims are nothing but variations on this simple theme, with the
`
`addition, in the challenged “handheld multimedia terminal” claims, of equally generic
`
`components (e.g., known wireless interface, non-volatile memory, and a display). 3 See,
`
`3 Claim 25, e.g., recites a “handheld multimedia terminal,” but simply adds to claim 30
`
`5
`
`

`
` Covered Business Method Patent Review
`United States Patent No. 8,336,772
`
`e.g., id. 12:37-40 (“physical embodiment of the system is not critical and a skilled person will un-
`
`derstand that the terminals, data processing systems and the like can all take a variety of forms.”).
`
`Indeed, as confirmed by Alice Corp.Pty, Ltd. v. CLS Bank Int’l, 134 S. Ct. 2347
`
`(2014)—decided after Petitioner’s original ’772 petitions—the challenged claims are
`
`also directed to patent ineligible subject matter under §101. As the Board noted previ-
`
`ously, “the ’772 patent makes clear that the asserted novelty of the invention is not in
`
`any specific improvement of software or hardware, but in the method of controlling ac-
`
`cess to data,” CBM2014-00110, Pap. 7, at 13, and the challenged claims are directed to
`
`nothing more than the unpatentable abstract idea of paying for and controlling access
`
`to data, with at most the addition of well-known, routine and conventional features—
`
`in particular, generic computer implementation that cannot confer patentability on
`
`these patent-ineligible abstractions. E.g., Alice, 134 S. Ct. at 2359-60. Each challenged
`
`claim recites ineligible subject matter and is obvious, and is thus unpatentable.
`
`II. OVERVIEW OF FIELD OF THE CLAIMED INVENTION
`By October 25, 1999, electronic sale, distribution, and content protection for
`
`digital products was well-known to a POSA, and their combination as claimed would
`
`also have been well-known or at minimum obvious. See, e.g., Ex.1419 § V. In 1991, e.g.,
`
`
`the requirements of a wireless interface, non-volatile memory, and a display, while
`
`specifying the user interface enables certain functions. Claim 32, which depends from
`
`claim 30, simply specifies integration with a mobile communications device. Ex.1401.
`
`6
`
`

`
` Covered Business Method Patent Review
`United States Patent No. 8,336,772
`
`U.S. Pat. 4,999,806 disclosed a system and method for content protection and sale
`
`and distribution of digital products (e.g., software) by phone. See, e.g., Ex.1406 Abstract
`
`(“central station distributes software by telephone. . . accepts credit card information, transmits an
`
`acceptance code . . . After verifying the credit card information, the station calls the purchaser back
`
`and continues with the transaction only after receiving the acceptance code.”); 1:67-2:9 (describing
`
`“means for selling and distributing protected software using standard telephone lines,” “permit[ting]
`
`the purchaser to rent the protected software for a period of time,” and “to rent the protected software
`
`for a specific number of runs”). Ex.1406 also discloses (1) different types of access, e.g.,
`
`purchase vs. rental and (2) a Control Transfer Program and a Primary Protection Pro-
`
`gram to prevent unauthorized copies. See id. Abstract; 2:65-3:23; Ex.1419 ¶ 30.
`
`In April 1992, U.S. Pat. No. 5,103,392 issued, disclosing use-based charging for
`
`digital products. See, e.g., id. Ex.1411 1:64-2:17. Ex. 1411’s emphasis on assuring per-
`
`mission to access a program and compensating providers underscores this existing fo-
`
`cus in the art on digital rights management (“DRM”), over eight years before the
`
`claimed priority date. See, e,g., Ex.1419 ¶ 33. Also in 1997, Exhibit 1418 (“von Faber”)
`
`observed that “[e]lectronic commerce systems dealing with the distribution of digital con-
`
`tents . . . have to couple the use of the provided digital goods with a prior payment for the goods in a
`
`way which cannot be bypassed,” proposing a system where customers purchase keys
`
`required to utilize encrypted content. See, e.g., id. at 7(“The basic idea . . . is to distribute
`
`the contents in encrypted form, and to have the customer pay for the key which he needs to transform
`
`7
`
`

`
` Covered Business Method Patent Review
`United States Patent No. 8,336,772
`
`the encrypted content in an usable form.”); id. 8; see also id. Fig. 1. Von Faber’s system can be
`
`used for a variety of known distribution and payment methods. See, e.g., id. 13 (“Differ-
`
`ent methods can be used to distribute the encrypted contents (standard techniques). . . . Different
`
`electronic payment methods can be integrated . . . . This flexibility leads to the fact that totally differ-
`
`ent authorisation methods can be integrated.”). Von Faber further addressed the known issue
`
`of payment distribution to providers. See, e.g., id. (“The system automatically divides the
`
`package price (payments) and guarantees that the money is transferred to each Content Provider.”);
`
`Ex.1419 ¶¶ 36-38.
`
`And U.S. Pat. No. 5,915,019 (“Ginter,” filed Jan. 8, 1997) issued June 1999,
`
`discloses “systems and methods for secure transaction management and electronic
`
`rights protection.” See, e.g., Ex.1414 Abstract. Ginter’s system “help[s] to ensure that
`
`information is accessed and used only in authorized ways, and maintain the integrity, availabil-
`
`ity, and/or confidentiality of the information.” See, e.g., id. Ginter’s “techniques may be
`
`used to support an all-electronic information distribution, for example, utilizing the ‘electronic
`
`highway.’” Id. Ginter discloses that the various entities of the virtual distribution envi-
`
`ronment (“VDE”) can flexibly take on any VDE roles. See, e.g., id. 255:22-23 (“All par-
`
`ticipants of VDE 100 have the innate ability to participate in any role.”); 255:23-43. Ginter
`
`thus highlights the known flexibility in such distribution systems, underscoring that
`
`combinations among disclosures of such distribution systems would have been obvi-
`
`ous. See, e.g., Ex.1419 ¶¶ 39, 40.
`
`8
`
`

`
` Covered Business Method Patent Review
`United States Patent No. 8,336,772
`
`
`Content storage and utilization on portable devices, including mobile commu-
`
`nication devices such as cellular phones, was also well-known. As one example,
`
`Ex.1416 (“Rydbeck,” pub’d Aug. 26, 1999), discloses a cell phone for storing digital
`
`content in non-volatile memory and accessing that content. See, e.g., Ex.1416 5 (“Be-
`
`cause of its integration into the cellular phone, the digital entertainment module can share
`
`components already present in the cellular phone. Such savings would not be available
`
`if a CD player were simply aggregated with the phone. Further, the use of solid state
`
`RAM or ROM, as opposed to disc storage, eliminates the need for bounce control
`
`circuitry[, enabling the] invention to provide cellular communications and entertain-
`
`ment during leisure activities.”); Ex.1419 ¶ 41. Thus, as these background examples
`
`and the additional prior art detailed below in IV.B (including the primary prior art
`
`Stefik patent) illustrate, the art was rife with discussion of the same supposed “inven-
`
`tion” now memorialized in the challenged claims. Long before the purported priority
`
`date, disclosures abounded of the very features that Smartflash now seeks to claim as
`
`its exclusive property. As outlined below, the challenged claims are obvious.
`
`III. PETITIONER HAS STANDING
`A.
`The ’772 is a CBM patent under AIA § 18(d)(1), and Petitioner certifies it is
`
`The ’772 Patent Is a Covered Business Method (“CBM”) Patent
`
`available for review under § 42.304(a). Although many claims qualify, a patent with
`
`even one CBM claim is a CBM patent. See CBM 2012-00001, Doc. 36 at 26; 77 Fed.
`
`9
`
`

`
` Covered Business Method Patent Review
`United States Patent No. 8,336,772
`
`Reg. 48,709 (Aug. 14, 2012). This Board previously found the claim 8 satisfies the
`
`CBM requirement, CBM2014-00104, Pap. 8, 8-13. Petitioner nevertheless additionally
`
`addresses Claim 30 (quoted above) herein.
`
`1. Exemplary Claim 30 Is Financial In Nature
`A CBM patent is “a patent that claims a method or corresponding apparatus for per-
`
`forming data processing or other operations used in the practice, administration, or management of a
`
`financial product or service, except that the term does not include patents for technological
`
`inventions.” AIA § 18(d)(1); 37 C.F.R. § 42.301. “[T]he definition of covered business
`
`method patent was drafted to encompass patents claiming activities that are financial in
`
`nature, incidental to a financial activity or complementary to a financial activity.’” 77 Fed. Reg.
`
`48,734-35 (Aug. 14, 2012) (citing 157 Cong. Rec. S5432 (daily ed. Sept. 8, 2011)).
`
`“[F]inancial product or service” is to be interpreted broadly, id., and “financial . . . simp-
`
`ly means relating to monetary matters”—it does not require any link to traditional financial
`
`industries such as banks. See, e.g., CBM2012-00001, Pap. 36 at 23. .
`
`The ’772 includes claims to a “data access terminal” (e.g., a “conventional com-
`
`puter” or mobile phone (Ex.1401 4:7-8)), that transmits payment data to a payment
`
`validation system for authorization and responds to payment validation data to re-
`
`trieve requested content. See id. cl. 8, 30, 35; AIA § 18(d)(1); Rule § 42.301(a). The pa-
`
`tent alleges this terminal is part of a system that allows content to be made available
`
`without fear of losing revenue, and claim 30 specifies that the terminal is “for control-
`
`10
`
`

`
` Covered Business Method Patent Review
`United States Patent No. 8,336,772
`
`ling access to one or more content data items.” Ex.1401 2:15-19; see also id. Fig 12(a)-
`
`(e). More generally, the patent is about “[d]ata storage and access systems [that] enable
`
`downloading and paying for data.” Id. Abstract. “The combination of payment data
`
`and stored content data . . . helps reduce the risk of unauthorized access.” Id. And in
`
`asserting the patent, Smartflash conceded the alleged invention relates to a financial
`
`activity or transaction, stating “[t]he patents-in-suit generally cover a portable data car-
`
`rier for storing data and managing access to the data via payment information and/or use
`
`status rule [and] also generally cover a computer network . . . that serves data and man-
`
`ages access to data by, for example, validating payment information.” Ex.1402 ¶ 17.
`
`Indeed, the specification confirms that the recited “data access terminal” is “for
`
`storing and paying for data,” (Ex.1401 1:20-22), “can communicate with a bank or other finan-
`
`cial services provider to control payment” (id. 3:53-55), and can “validate payment with an ex-
`
`ternal authority such as a bank” (id. 2:8-10). Further, “[p]ayment for the data item or items
`
`requested may either be made directly to the system owner or may be made to an e-payment system”
`
`(id. 20:59-61), and such systems may be provided “according to, for example,
`
`MONDEX, Proton, and/or Visa cash compliant standards” and “payment authentication . . .
`
`may [] be performed by, for example, a data access terminal . . . using payment management
`
`code.” Id. 13:43-64. See also id. 7:66-8:61 (esp. 8:26-28); 11:65-12:4; Fig. 12(a)-(e).
`
`Claim 30 expressly recites software to perform data processing and other oper-
`
`ations in connection with the recited “payment validation system” thus clearly relates
`
`11
`
`

`
` Covered Business Method Patent Review
`United States Patent No. 8,336,772
`
`to a financial activity and providing a financial service. See CBM2013-00020, Pap. 14 at
`
`11-12 (“the electronic transfer of money is a financial activity, and allowing such a
`
`transfer amounts to providing a financial service.”). See also AIA § 18(d)(1); 37 C.F.R.
`
`§ 42.301(a); 77 Fed. Reg. 48,734, 48,735 (Aug. 14, 2012) (“[T]he definition of [CBM]
`
`was drafted to encompass patents ‘claiming activities that are financial in nature, incidental
`
`to a financial activity or complementary to a financial activity.’”) (citation omitted). 4
`
`2. Claim 30 Does Not Cover A Technological Invention
`Further, claim 30 does not cover a “technological invention” within the exception in
`
`AIA § 18(d)(1), because it does not claim “subject matter as a whole [that] recites a
`
`technological feature that is novel and unobvious over the prior art[] and solves a technical problem us-
`
`ing a technical solution.” § 42.301(b). To the contrary, the specification explains that
`
`claim 30’s “data access terminal” was commonplace, and is not directed to a technical
`
`problem, but rather offers a non-technical solution to the business problem of data piracy.
`
`(a) Claim 30 Does Not Recite A Technological Feature
`That Is Novel and Unobvious
`First, no “technological feature” of claim 30 is novel and unobvious. The
`
`PTAB has confirmed that “[m]ere recitation of known technologies, such as comput-
`
`er hardware, communication or computer networks, software, memory, computer-
`
`readable storage medium, scanners, display devices or databases, or specialized ma-
`
`chines, such as an ATM or point of sale device,” or “[r]eciting the use of known prior
`
`4 Claim 8 is similarly financial in nature. See CBM2014-00110, Pap. 7, 10-12.
`
`12
`
`

`
` Covered Business Method Patent Review
`United States Patent No. 8,336,772
`
`art technology to accomplish a process or method, even if that process or method is
`
`novel and non-obvious” will “not typically render a patent a technological invention.”
`
`See, e.g., 77 Fed. Reg. 48,764 (Aug. 14, 2012). As the PTAB further stated, “combining
`
`prior art structures to achieve a normal, expected, or predictable result of that combi-
`
`nation” is not a technological invention. 77 Fed. Reg. 157 (Aug. 14, 2012) at 48,764.
`
`As its language makes clear, claim 30 involves no “technology” at all other than, at
`
`most, “a data access terminal,” which includes user and data carrier interfaces, a pro-
`
`gram store, and a processor. Ex.1401. “The data access terminal may be a conventional
`
`computer or, alternatively, it may be a mobile phone,” both of which were known in the
`
`art well before 2000. Id. 4:7; 16:47-52. Indeed, the specification disclaims the use of par-
`
`ticular hardware, relying instead on conventional hardware known to a POSA: “[t]he
`
`physical embodiment of the system is not critical and a skilled person will understand that the
`
`terminals, data processing systems and the like can all take a variety of forms.” Id. 12:37-40. The
`
`“data supplier” of the claims is also not a technological component, and requires no
`
`specific hardware, see Ex.1401 6:20-22; 6:62-64, but is, instead, simply a supplier of
`
`online data. Id. 6:2-4. See also id. 6:62-64 (“The computer system is operated by a data
`
`supplier or a data supplier ‘system owner’ for providing content data to the data carrier.”);
`
`8:16-19. The referenced data carrier is, e.g., a standard smart card. Id. 11:35.
`
`The use of software (code) for requesting and receiving identifier data identify-
`
`ing content data, requesting, receiving, and presenting content information, receiving
`
`13
`
`

`
`and responding to a user selection for content (including by transmitting payment da-
`
` Covered Business Method Patent Review
`United States Patent No. 8,336,772
`
`
`ta), receiving and responding to payment validation data, receiving a second user se-
`
`lection for content, and reading and evaluating use status data and use rules to deter-
`
`mine access, was also exceedingly well known in the art, and could not transform the
`
`claims into a technological invention. See, e.g., 77 Fed. Reg. 48,756 48,764 (Aug. 14,
`
`2012) (“[m]ere recitation of known technologies, such as . . . software, memory, com-
`
`puter-readable storage medium . . . [will] not typically render a patent a technological
`
`invention.”); Ex.1419 § V, ¶¶ 80-88. The functions performed by the code (D1-D7,
`
`D10)—related to the identification, access, presentation, selection, and control of data
`
`and content information, as disclosed in the specification—were commonplace before
`
`the earliest claimed priority date. See, e.g., Ex.1406 8:62-9:12; Ex.1401 1:40-50. Further,
`
`the sending of payment data to a payment validation system and (D7) and the finan-
`
`cial transaction performed by the code described in elements D8 and D9 was well
`
`known, because, as the patent concedes, e-payment systems were known. Ex.1401
`
`13:43-64 (“E-payment systems coupled to banks . . . these provide an e-payment system accord-
`
`ing to, for example, MONDEX, Proton, and/or Visa cash compliant standards . . . payment data
`
`may be validated by a data access terminal using payment management code.”). Using code to im-
`
`plement this transaction, as disclosed in the specification, was obvious and known.
`
`E.g,, Ex.1419 §V, ¶¶ 80-88. Providing access to content based on payment and rules
`
`(D11-D12), as claimed in the patent, was also well known. See, e.g., Exs.1407; 1406
`
`14
`
`

`
`Abstract, 1:67-2:9; 1408 Abstract, 4:27-35; 1419 §V, ¶¶ 76-78.
`
` Covered Business Method Patent Review
`United States Patent No. 8,336,772
`
`
`The state of the art at the time, and the detailed prior art analysis below, further
`
`reflects claim 30 does not recite a technological feature that is novel and nonobvious.
`
`See, e.g., Section II, supra; Section IV.C, infra. Even apart from other failures to trigger
`
`the exception, for these reasons alone, claim 30 is not a technological invention. 5
`
`(b) Claim 30 Does

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket