`
`
`
`
`
` CBM2015-00033
`United States Patent No. 8,336,772 B2
`
`UNITED STATES PATENT AND TRADEMARK OFFICE
`
`____________
`
`BEFORE THE PATENT TRIAL AND APPEAL BOARD
`
`____________
`
`APPLE INC.,
`Petitioner,
`
`v.
`
`SMARTFLASH LLC,
`Patent Owner.
`
`
`____________
`
`Case CBM2015-00033
`Patent 8,336,772 B2
`
`____________
`
`
`CORRECTED PETITION FOR COVERED BUSINESS METHOD PA-
`TENT REVIEW OF UNITED STATES PATENT NO. 8,336,772 PURSU-
`ANT TO 35 U.S.C. § 321, 37 C.F.R. § 42.3041
`
`
`
`
`1 As directed by the Board in Paper 4, Petitioner hereby resubmits this Petition to ad-
`
`dress formality issues identified therein.
`
`
`
` CBM2015-00033
`United States Patent No. 8,336,772 B2
`
`
`
`TABLE OF CONTENTS
`
`B.
`
`C.
`
`INTRODUCTION ....................................................................................................... 1
`I.
`II. OVERVIEW OF FIELD OF THE CLAIMED INVENTION ......................... 5
`III. PETITIONER HAS STANDING ............................................................................ 7
`A.
`The ’772 Patent Is a Covered Business Method (“CBM”) Patent ............. 7
`1.
`Exemplary Claim 30 Is Financial In Nature ...................................... 7
`2.
`Claim 30 Does Not Cover A Technological Invention ................... 9
`Related Matters and Mandatory Notice Information; Petitioner Is a Real
`Party In Interest Sued for and Charged With Infringement ..................... 13
`IV. DETAILED EXPLANATION OF REASONS FOR RELIEF REQUESTED,
`SHOWING IT IS MORE LIKELY THAN NOT THAT AT LEAST ONE
`CHALLENGED CLAIM IS UNPATENTABLE ............................................... 14
`A.
`Claim Construction .......................................................................................... 17
`B.
`The Challenged Claims Are Unpatentable Under 35 U.S.C. § 101 .......... 20
`1.
`Claims Are Directed To Abstract Ideas ........................................... 21
`2.
`Claims Do Not Disclose An “Inventive Concept” That Is
`“Significantly More” Than An Abstract Idea .................................. 24
`Field Of Use Limitations Cannot Create Patent Eligibility ........... 24
`Generic Computer Implementation Cannot Transform
`Abstract Ideas Into Patent Eligible Inventions ............................... 25
`Functional Nature Confirms Preemption and Ineligibility ............ 29
`5.
`6. Machine-or-Transformation Test Confirms Ineligibility .............. 31
`The Challenged Claims Are Invalid Under § 103 ....................................... 31
`1.
`Overview of Stefik ............................................................................... 31
`2. Motivation to Combine Stefik with Poggio ..................................... 35
`3. Motivation to Combine Stefik with Poggio and Subler ................. 36
`4. Motivation to Combine Stefik with Poggio, Subler, and
`Ahmad .................................................................................................... 37
`5. Motivation to Combine Stefik with Poggio, Subler, Ahmad,
`and Kopp ............................................................................................... 39
`6. Motivation to Combine Stefik with Poggio, Subler, Ahmad,
`and Sato ................................................................................................. 40
`Claims 25, 26, 30, and 32 are Obvious in Light of Stefik in
`view of Poggio, Subler, and Ahmad (Ground 2), Obvious
`in Light of Stefik in View of Poggio, Subler, Ahmad, and
`
`3.
`4.
`
`7.
`
`i
`
`
`
`Kopp (Ground 3), Obvious in Light of Stefik in View of
`Poggio, Subler, Ahmad, and Sato (Ground 4), and Obvious
`in Light of Stefik in View of Poggio, Subler, Ahmad, Kopp,
`and Sato (Ground 5). ........................................................................... 42
`(a)
`Cl. 25: A handheld multimedia terminal for
`retrieving and accessing protected multimedia
`content, comprising: ............................................................. 42
`Cl. 25: a wireless interface configured to interface
`with a wireless network for communicating with a
`data supplier; .......................................................................... 43
`Cl. 25: non-volatile memory configured to store
`multimedia content, wherein said multimedia
`content comprises one or more of music data,
`video data and computer game data; .................................. 46
`Cl. 25: a program store storing processor control
`code; ........................................................................................ 46
`Cl. 25: a processor coupled to said non-volatile
`memory, said program store, said wireless interface
`and a user interface to allow a user to select and
`play said multimedia content; .............................................. 47
`Cl. 25: a display for displaying one or both of said
`played multimedia content and data relating to said
`played multimedia content; wherein the processor
`control code comprises: ....................................................... 48
`Cl. 25: code to request identifier data identifying
`one or more items of multimedia content available
`for retrieving via said wireless interface; ............................ 49
`Cl. 25: code to receive said identifier data via said
`wireless interface, said identifier data identifying
`said one or more items of multimedia content
`available for retrieving via said wireless interface; ............ 51
`Cl. 25: code to request content information via said
`wireless interface, wherein said content
`information comprises one or more of description
`data and cost data pertaining to at least one of said
`one or more items of multimedia content identified
`by said identifier data; ........................................................... 53
`Cl. 25: code to receive said content information via
`said wireless interface; ........................................................... 55
`
`(h)
`
`(b)
`
`(c)
`
`(d)
`
`(e)
`
`(f)
`
`(g)
`
`(i)
`
`(j)
`
` CBM2015-00033
`United States Patent No. 8,336,772 B2
`
`
`
`ii
`
`
`
`(k)
`
`(l)
`
`(m)
`
`(n)
`
`(o)
`
`(p)
`
`(q)
`
`(r)
`
`(s)
`
`(t)
`
` CBM2015-00033
`United States Patent No. 8,336,772 B2
`
`
`
`Cl. 25: code to present said content information
`pertaining to said identified one or more items of
`multimedia content available for retrieving to a
`user on said display; .............................................................. 57
`Cl. 25: code to receive a first user selection
`selecting at least one of said one or more items of
`multimedia content available for retrieving; ...................... 58
`Cl. 25: code responsive to said first user selection
`of said selected at least one item of multimedia
`content to transmit payment data relating to
`payment for said selected at least one item of
`multimedia content via said wireless interface for
`validation by a payment validation system; ....................... 58
`Cl. 25: code to receive payment validation data via
`said wireless interface defining if said payment
`validation system has validated payment for said
`selected at least one item of multimedia content; ............ 60
`Cl. 25: code responsive to said payment validation
`data to retrieve said selected at least one item of
`multimedia content via said wireless interface from
`a data supplier and to write said retrieved at least
`one item of multimedia content into said non-
`volatile memory, .................................................................... 62
`Cl. 25: code to receive a second user selection
`selecting one or more of said items of retrieved
`multimedia content to access; .............................................. 63
`Cl. 25: code to read use status data and use rules
`from said non-volatile memory pertaining to said
`second selected one or more items of retrieved
`multimedia content; and ....................................................... 64
`Cl. 25: code to evaluate said use status data and use
`rules to determine whether access is permitted to
`said second selected one or more items of retrieved
`multimedia content, .............................................................. 66
`Cl. 25: wherein said user interface is operable to
`enable a user to make said first user selection of
`said selected at least one item of multimedia
`content available for retrieving, ........................................... 69
`Cl. 25: wherein said user interface is operable to
`
`iii
`
`
`
` CBM2015-00033
`United States Patent No. 8,336,772 B2
`
`
`
`(u)
`
`(v)
`
`(w)
`
`enable a user to make said second user selection of
`said one or more items of retrieved multimedia
`content available for accessing, and .................................... 69
`Cl. 25: wherein said user interface is operable to
`enable a user to access said second user selection
`of said one or more item of retrieved multimedia
`content responsive to said code to control access
`permitting access to said second selected one or
`more items of retrieved multimedia content. .................... 70
`Cl. 26: A handheld multimedia terminal as claimed
`in claim 25 further comprising code to present said
`second selected one or more items of retrieved
`multimedia content to a user via said display if
`access is permitted. ................................................................ 71
`Cl. 30: A data access terminal for controlling access
`to one or more content data items stored on a data
`carrier, the data access terminal comprising: ..................... 72
`Cl. 30: a user interface; .......................................................... 74
`Cl. 30: a data carrier interface; ............................................. 74
`Cl. 30: a program store storing code implementable
`by a processor; and ................................................................ 75
`Cl. 30: a processor coupled to the user interface, to
`the data carrier interface and to the program store
`for implementing the stored code, the code
`comprising: ............................................................................. 76
`Cl. 30: Remaining Claim 30 limitations .............................. 78
`Cl. 32: A data access terminal as claimed in claim
`30, wherein said data access terminal is integrated
`with a mobile communications device and
`audio/video player. ............................................................... 79
`CONCLUSION........................................................................................................... 80
`
`(x)
`(y)
`(z)
`
`(aa)
`
`(bb)
`(cc)
`
`V.
`
`
`iv
`
`
`
`
`EXHIBIT LIST
`1401
`
`1402
`
`1403
`
`1404
`
`1405
`
`1406
`
`1407
`
`1408
`
`1409
`
`1410
`
`1411
`
`1412
`
`1413
`
`1414
`
`1415
`
`1416
`
`1417
`
`1418
`
`1419
`
` CBM2015-00033
`United States Patent No. 8,336,772 B2
`
`
`
`U.S. Patent No. 8,336,772
`
`Plaintiffs’ First Amended Complaint
`
`U.S. Patent No. 5,925,127
`
`U.S. Patent No. 5,940,805
`
`Russell Housley and Jan Dolphin, “Metering: A Pre-pay
`Technique,” Storage and Retrieval for Image and Video Data-
`bases V, Conference Volume 3022, 527 (January 15, 1997)
`U.S. Patent No. 4,999,806
`
`U.S. Patent No. 5,675,734
`
`U.S. Patent No. 4,878,245
`
`File History for U.S. Patent No. 8,336,772
`
`U.S. Patent No. 7,942,317
`
`U.S. Patent No. 5,103,392
`
`U.S. Patent No. 5,530,235
`
`U.S. Patent No. 5,629,980
`
`U.S. Patent No. 5,915,019
`
`European Patent Application, Publication No. EP0809221A2
`
`International Publication No. WO 99/43136
`
`JP Patent Application Publication No. H11-164058 (transla-
`tion)
`Eberhard von Faber, Robert Hammelrath, and Frank-Peter
`Heider, “The Secure Distribution of Digital Contents,” IEEE
`(1997)
`Declaration of Anthony J. Wechselberger In Support of Apple
`
`v
`
`
`
`1420
`
`1421
`
`1422
`
`1423
`
`1424
`
`1425
`
`1426
`
`1427
`
`1428
`
`1429
`
`1430
`
`1431
`
`1432
`
`1433
`
`1434
`
`1435
`
`1436
`
` CBM2015-00033
`United States Patent No. 8,336,772 B2
`
`Inc.’s Petition for Covered Business Method Patent Review
`U.S. Patent No. 8,033,458
`
`
`
`Declaration of Michael P. Duffey In Support of Apple Inc.’s
`Petition for Covered Business Method Patent Review
`Declaration of Megan F. Raymond In Support of Apple Inc.’s
`Petition for Covered Business Method Patent Review
`Claim Construction Memorandum Opinion from Smartflash
`LLC v. Apple Inc., No. 6:13cv447 (Dkt. 229)
`File History for U.S. Patent No. 8,061,598
`
`U.S. Patent No. 4,337,483
`
`U.S. Patent No. 7,725,375
`
`International Publication No. WO 95/34857
`
`JP Patent Application Publication No. H10-269289 (transla-
`tion)
`File History for U.S. Patent No. 7,942,317
`
`File History for U.S. Patent No. 8,033,458
`
`U.S. Patent No. 8,061,598
`
`U.S. Patent No. 8,118,221
`
`File History for U.S. Patent No. 8,118,221
`
`U.S. Patent No. 7,334,720
`
`File History for U.S. Patent No. 7,334,720
`
`U.S. Patent No. 5,646,992
`
`vi
`
`
`
` CBM2015-00033
`United States Patent No. 8,336,772 B2
`
`I.
`
`INTRODUCTION
`
`Pursuant to § 321 and Rule § 42.304,2 the undersigned, on behalf of Apple Inc.
`
`(“Petitioner”), petitions for covered business method review of claims 25, 26, 30, and
`
`32 (“challenged claims”) of U.S. Pat. No. 8,336,772, issued to Smartflash Technolo-
`
`gies Limited and assigned to Smartflash LLC (“Patentee”). Petitioner asserts it is more
`
`likely than not that the challenged claims are unpatentable and requests review of, and
`
`judgment against, the challenged claims under §§ 101 and 103. Petitioner has concur-
`
`rently filed two other CBM Petitions against different ’772 claims. The Director, pur-
`
`suant to Rule 325(c), may determine that merger, or at minimum coordination, of
`
`these proceedings, is appropriate.
`
`
`
`Petitioner previously filed CBM2014-00110/111 on the ’772 under §§102 and
`
`103. In its Decisions Denying Institution, the Board construed “use rule” as “a rule
`
`specifying a condition under which access to content is permitted,” and determined
`
`Petitioner had not shown it was more likely than not that it would prevail in demon-
`
`strating that Stefik alone or combined with Poggio and/or Sato rendered obvious lim-
`
`itations related to “code to request identifier data” and “use status data.” CBM2014-
`
`00110, Pap. 7, at 15-18; -00111, Pap. 7, at 15-21. In light of the Board’s decision, Peti-
`
`tioner now identifies additional prior art with explicit disclosures of the limitations re-
`
`
`2 All section cites herein are to 35 U.S.C. or 37 C.F.R., as context indicates, and all
`
`emphasis herein added unless otherwise noted.
`
`
`
`
`
` CBM2015-00033
`United States Patent No. 8,336,772 B2
`
`
`lated to “code to request identifier data.” For example, Subler discloses an end user
`
`device that provides a powerful, easy-to-use interface to browse through and analyze
`
`products available from a storage database. Ex.1436 3:46-52. The end user device
`
`software includes code that retrieves product information from the database and pre-
`
`sents the information to the user in a windowed graphical user interface. Ex.1436
`
`4:49-54; 5:26-30. Petitioner also identifies additional prior art—Ahmad and Kopp
`
`(Exs.1403, 1404)—with explicit disclosures of “use rules” as construed by the Board
`
`and “use status data.” Ahmad, e.g., describes a software rental system that monitors an
`
`elapsed time of use recorded by a timer or a number of uses recorded by a counter
`
`and does not permit access to the rented software if a software rental license has been
`
`exhausted (see, e.g., Ex.1403 2:62-3:18), while Kopp discloses checking recorded utili-
`
`zation data and denying access to a data record if a licensed extent of utilization has
`
`been exhausted (see, e.g., Ex.1404 6:41-47). Petitioner has also identified additional dis-
`
`closures in Stefik and Poggio concerning these limitations, further confirming a
`
`POSA3 would have found it obvious and routine to implement the system disclosed
`
`
`3 “POSA” refers to knowledge/understanding of a person of ordinary skill in the art
`
`as of Oct. 25, 1999, who would have at least a B.S. in E.E., C.S., or a telecommunica-
`
`tions related field, and at least 3 yrs. industry experience including client-server data/
`
`information distribution and management architectures. See Ex.1419 ¶¶ 25, 28 n.3.
`
`2
`
`
`
` CBM2015-00033
`United States Patent No. 8,336,772 B2
`
`
`by Stefik and Poggio using the expressly advantageous teachings of Subler, Ahmad,
`
`Kopp, and/or Sato, detailed in §IV.C, infra. See, e.g., Ex.1419 ¶¶ 60-67.
`
`The challenged claims merely recite basic computer systems well-known in the
`
`field of data storage and access, including a “handheld multimedia terminal for retriev-
`
`ing and accessing protected multimedia content” and a “data access terminal for con-
`
`trolling access to one or more content data items stored on a data carrier.” Ex.1401
`
`1:24-26. Claim 30, for example, recites four rudimentary components of a data access
`
`terminal “for controlling access to one or more content data items”— a user interface, a data car-
`
`rier interface, a program store storing code implementable by a processor, and a proces-
`
`sor . . . for implementing the stored code. The recited code is similarly elementary, re-
`
`questing and receiving user identifier data, requesting, receiving, and presenting content infor-
`
`mation, receiving and responding to a user selection, receiving and responding to payment vali-
`
`dation data, receiving a second user selection, and reading and evaluating use status data
`
`and use rules. Ex. 1401 cl.30. But at the patent’s earliest claimed priority date, these
`
`simple elements and their combination were well known to any POSA. The patent
`
`admits the idea of providing access to data in exchange for a payment (e.g., purchase
`
`of music on a CD) was already well known. See id. 5:13-16. And, the prior art was
`
`teeming with this basic concept and its straightforward physical implementation.
`
`Further, claim 30 clearly involves no “technology” at all other than “a data access
`
`terminal,” with user and data carrier interfaces, a program store storing code, and a processor
`
`3
`
`
`
` CBM2015-00033
`United States Patent No. 8,336,772 B2
`
`
`that implements the specification’s well-known steps—all conceded as well known
`
`and commonplace by the ’772, which states this “terminal comprises a general purpose
`
`computer.” E.g., id. 4:7, 16:47-52. Claim 30 recites no more than a system for requesting
`
`and retrieving content while sending payment data, receiving and responding to pay-
`
`ment data, and controlling access to the data based on payment validation data. The
`
`other challenged claims are variations on this simple theme, with the addition, in the
`
`challenged “handheld multimedia terminal” claims, of equally generic components. 4
`
`See, e.g., id. 12:37-40 (“physical embodiment of the system is not critical . . . the terminals, data
`
`processing systems and the like can all take a variety of forms.”). Indeed, as confirmed by Alice
`
`Corp.Pty, Ltd. v. CLS Bank Int’l, 134 S. Ct. 2347 (2014)—decided after Petitioner’s
`
`original ’772 petitions—the challenged claims are also directed to patent ineligible
`
`subject matter under §101. As the Board noted previously, “the ’772 patent makes
`
`clear that the asserted novelty of the invention is not in any specific improvement of
`
`software or hardware, but in the method of controlling access to data,” CBM2014-00110,
`
`Pap. 7, at 13, and the challenged claims are directed to not more than the unpatenta-
`
`
`4 Claim 25, e.g., recites a “handheld multimedia terminal,” but simply adds to claim 30
`
`the requirements of a wireless interface, non-volatile memory, and a display, while
`
`specifying the user interface enables certain functions. Claim 32, which depends from
`
`claim 30, simply specifies integration with a mobile communications device. Ex.1401.
`
`4
`
`
`
` CBM2015-00033
`United States Patent No. 8,336,772 B2
`
`
`ble abstract idea of paying for and controlling access to data, with at most the addition
`
`of well-known, routine and conventional features—in particular, generic computer
`
`implementation that cannot confer patentability on these patent-ineligible abstractions.
`
`E.g., Alice, 134 S. Ct. at 2359-60. Each challenged claim recites ineligible subject mat-
`
`ter and is obvious, and is thus unpatentable.
`
`II. OVERVIEW OF FIELD OF THE CLAIMED INVENTION
`By October 25, 1999, electronic sale, distribution, and content protection for
`
`digital products was well-known to a POSA, and their combination as claimed would
`
`also have been at minimum obvious. See, e.g., Ex.1419 § V. In 1991, e.g., U.S. Pat.
`
`4,999,806 disclosed a system and method for content protection and sale and distribu-
`
`tion of digital products (e.g., software) by phone. See, e.g., Ex.1406 Abstract; 1:67-2:9.
`
`Ex.1406 also discloses different types of access, e.g., purchase vs. rental and a Control
`
`Transfer Program and a Primary Protection Program to prevent unauthorized copies.
`
`See id. Abstract; 2:65-3:23; Ex.1419 ¶ 30.
`
`In 1992, U.S. Pat. No. 5,103,392 issued, disclosing use-based charging for digi-
`
`tal products. See, e.g., id. Ex.1411 1:64-2:17. Ex. 1411’s emphasis on assuring permis-
`
`sion to access a program and compensating providers underscores this existing focus
`
`in the art on digital rights management (“DRM”), over eight years before the claimed
`
`priority date. See, e,g., Ex.1419 ¶ 33. In 1997, Exhibit 1418 (“von Faber”) observed
`
`that “[e]lectronic commerce systems dealing with the distribution of digital contents . . . have
`
`5
`
`
`
` CBM2015-00033
`United States Patent No. 8,336,772 B2
`
`
`to couple the use of the provided digital goods with a prior payment for the goods in a way which
`
`cannot be bypassed,” proposing a system where customers purchase keys required to
`
`utilize encrypted content. See, e.g., id. at 7, 8; see also id. Fig. 1. Von Faber’s system can
`
`be used for a variety of known distribution and payment methods, and addresses the
`
`known issue of payment distribution to providers. See, e.g., id. at 13; Ex.1419 ¶¶ 36-38.
`
`And U.S. Pat. No. 5,915,019 (“Ginter,” filed Jan. 8, 1997) issued June 1999,
`
`discloses “systems and methods for secure transaction management and electronic
`
`rights protection.” See, e.g., Ex.1414 Abstract. Ginter’s system “help[s] to ensure that
`
`information is accessed and used only in authorized ways, and maintain the integrity, availabil-
`
`ity, and/or confidentiality of the information.” See, e.g., id. Ginter’s “techniques may be
`
`used to support an all-electronic information distribution, for example, utilizing the ‘electronic
`
`highway.’” Id. Ginter discloses that the various entities of the virtual distribution envi-
`
`ronment (“VDE”) can flexibly take on any VDE roles. See, e.g., id. 255:22-23; 255:23-
`
`43. Ginter thus highlights the known flexibility in such distribution systems, under-
`
`scoring that combinations among disclosures of such distribution systems would have
`
`been obvious. See, e.g., Ex.1419 ¶¶ 39, 40.
`
`Content storage and utilization on portable devices, including mobile commu-
`
`nication devices such as cellular phones, was also well-known. As one example,
`
`Ex.1416 (“Rydbeck,” pub’d Aug. 26, 1999), discloses a cell phone for storing digital
`
`content in non-volatile memory and accessing that content. See, e.g., Ex.1416 5;
`
`6
`
`
`
` CBM2015-00033
`United States Patent No. 8,336,772 B2
`
`
`Ex.1419 ¶ 41. The art was rife with discussion of the same supposed “invention” in
`
`the challenged claims. Long before the purported priority date, disclosures abounded
`
`of the very features that Smartflash now seeks to claim as its exclusive property.
`
`III. PETITIONER HAS STANDING
`A.
`The ’772 is a CBM patent under AIA § 18(d)(1), and Petitioner certifies it is
`
`The ’772 Patent Is a Covered Business Method (“CBM”) Patent
`
`available for review under § 42.304(a). Although many claims qualify, a patent with
`
`even one CBM claim is a CBM patent. See CBM 2012-00001, Doc. 36 at 26; 77 Fed.
`
`Reg. 48,709 (Aug. 14, 2012). This Board previously found the claim 8 satisfies the
`
`CBM requirement, CBM2014-00104, Pap. 8, 8-13. Petitioner nevertheless additionally
`
`addresses Claim 30 herein.
`
`1.
`A CBM patent “ claims a method or corresponding apparatus for performing data pro-
`
`Exemplary Claim 30 Is Financial In Nature
`
`cessing or other operations used in the practice, administration, or management of a financial product
`
`or service, except that the term does not include patents for technological inventions.”
`
`AIA § 18(d)(1); 37 C.F.R. § 42.301. “[T]he definition of covered business method pa-
`
`tent was drafted to encompass patents claiming activities that are financial in nature, in-
`
`cidental to a financial activity or complementary to a financial activity.’” 77 Fed. Reg. 48,734-35
`
`(Aug. 14, 2012). “[F]inancial product or service” is to be interpreted broadly, id., and
`
`“financial . . . simply means relating to monetary matters”—it does not require any link to tra-
`
`7
`
`
`
` CBM2015-00033
`United States Patent No. 8,336,772 B2
`
`ditional financial industries such as banks. See, e.g., CBM2012-00001, Pap. 36 at 23.
`
`
`
`The ’772 includes claims to a “data access terminal” (e.g., a “conventional com-
`
`puter” or mobile phone (Ex.1401 4:7-8)), that transmits payment data to a payment
`
`validation system for authorization and responds to payment validation data to re-
`
`trieve requested content. See id. cl. 8, 30, 35; AIA § 18(d)(1); Rule § 42.301(a). The pa-
`
`tent alleges this terminal is part of a system that allows content to be made available
`
`without fear of losing revenue, and claim 30 specifies that the terminal is “for control-
`
`ling access to one or more content data items.” Ex.1401 2:15-19; see also id. Fig 12(a)-
`
`(e). More generally, the patent is about “[d]ata storage and access systems [that] enable
`
`downloading and paying for data.” Id. Abstract. “The combination of payment data
`
`and stored content data . . . helps reduce the risk of unauthorized access.” Id. And in
`
`asserting the patent, Smartflash conceded the alleged invention relates to a financial
`
`activity or transaction, stating “[t]he patents-in-suit generally cover a portable data car-
`
`rier for storing data and managing access to the data via payment information and/or use
`
`status rule [and] also generally cover a computer network . . . that serves data and man-
`
`ages access to data by, for example, validating payment information.” Ex.1402 ¶ 17.
`
`The specification confirms that the recited “data access terminal” is “for stor-
`
`ing and paying for data,” (Ex.1401 1:20-22), “can communicate with a bank or other financial
`
`services provider to control payment” (id. 3:53-55), and can “validate payment with an external
`
`authority such as a bank” (id. 2:8-10). “Payment for the data item or items requested may ei-
`
`8
`
`
`
` CBM2015-00033
`United States Patent No. 8,336,772 B2
`
`
`ther be made directly to the system owner or may be made to an e-payment system” (id. 20:59-61),
`
`and such systems may be provided “according to, for example, MONDEX, Proton,
`
`and/or Visa cash compliant standards” and “payment authentication . . . may [] be performed
`
`by, for example, a data access terminal . . . using payment management code.” Id. 13:43-64.
`
`See also id. 7:66-8:61 (esp. 8:26-28); 11:65-12:4; Fig. 12(a)-(e). Claim 30 expressly recites
`
`software to perform data processing and other operations in connection with the re-
`
`cited “payment validation system” thus clearly relates to a financial activity and
`
`providing a financial service. See CBM2013-00020, Pap. 14 at 11-12 (“the electronic
`
`transfer of money is a financial activity, and allowing such a transfer amounts to
`
`providing a financial service.”); 77 Fed. Reg. 48,734, 48,735. 5
`
`2.
`Further, claim 30 does not cover a “technological invention” within the exception in
`
`Claim 30 Does Not Cover A Technological Invention
`
`AIA § 18(d)(1), because it does not claim “subject matter as a whole [that] recites a
`
`technological feature that is novel and unobvious over the prior art[] and solves a technical problem us-
`
`ing a technical solution.” § 42.301(b). To the contrary, the specification explains that
`
`claim 30’s “data access terminal” was commonplace, and is not directed to a technical
`
`problem, but rather offers a non-technical solution to the business problem of data piracy.
`
`First, claim 30 does not recite a “technological feature” that is novel and un-
`
`
`5 Claim 8 is similarly financial in nature. See CBM2014-00110, Pap. 7, 10-12.
`
`9
`
`
`
` CBM2015-00033
`United States Patent No. 8,336,772 B2
`
`
`obvious. “Mere recitation of known technologies, such as computer hardware, com-
`
`munication or computer networks, software, memory, computer-readable storage me-
`
`dium, scanners, display devices or databases, or specialized machines, such as an ATM
`
`or point of sale device,” or “[r]eciting the use of known prior art technology to ac-
`
`complish a process or method, even if that process or method is novel and non-
`
`obvious” will “not typically render a patent a technological invention.” See, e.g., 77 Fed.
`
`Reg. 48,764 (Aug. 14, 2012). As the PTAB further stated, “combining prior art struc-
`
`tures to achieve a normal, expected, or predictable result of that combination” is not a
`
`technological invention. Id. As its language makes clear, claim 30 involves no “technolo-
`
`gy” at all other than, at most, “a data access terminal,” which includes user and data
`
`carrier interfaces, a program store, and a processor. Ex.1401. “The data access termi-
`
`nal may be a conventional computer or, alternatively, it may be a mobile phone,” both of
`
`which were known in the art well before 2000. Id. 4:7; 16:47-52. Indeed, the specifica-
`
`tion disclaims the use of particular hardware, relying instead on conventional hardware
`
`known to a POSA: “[t]he physical embodiment of the system is not critical and a skilled per-
`
`son will understand that the terminals, data processing systems and the like can all take a variety
`
`of forms.” Id. 12:37-40. The “data supplier” of the claims is also not a technological
`
`component, and requires no specific hardware, see Ex.1401 6:20-22; 6:62-64, but is, in-
`
`stead, simply a supplier of online data. Id. 6:2-4. See also id. 6:62-64 (“The computer
`
`system is operated by a data supplier or a data supplier ‘system owner’ for providing content
`
`10
`
`
`
` CBM2015-00033
`United States Patent No. 8,336,772 B2
`
`
`data to the data carrier.”); 8:16-19. The referenced data carrier is, e.g., a standard smart
`
`card. Id. 11:35. The use of software (code) for requesting and receiving identifier data
`
`identifying content data, requesting, receiving, and presenting content information, re-
`
`ceiving and responding to a user selection for content (including by transmitting pay-
`
`ment data), receiving and responding to payment validation data, receiving a second
`
`user selection for content, and reading and evaluating use status data and use rules to
`
`determine access, was also exceedingly well known in the art, and could not transform
`
`the claims into a technological invention. See, e.g., 77 Fed. Reg. 48,756 48,764 (Aug. 14,
`
`2012) (“[m]ere recitation of known technologies, such as . . . software, memory, com-
`
`puter-readable storage medium . . . [will] not typically render a patent a technological
`
`invention.”); Ex.1419 § V, ¶¶ 80-88. The functions performed by the code—related to
`
`the identification, access, presentation, selection, and control of data and content in-
`
`formation, as disclosed in the specification—were commonplace before the earliest
`
`claimed priority date. See, e.g., Ex.1406 8:62-9:12; Ex.1401 1:40-50. Further, the send-
`
`ing of payment data to a payment validation system and the financial transaction per-
`
`formed by the code was well known, because, as the patent concedes, e-payment sys-
`
`tems were known. Ex.1401 13:43-64 (“E-payment systems coupled to banks . . . these pro-
`
`vide an e-payment system according to, for example, MONDEX, Proton, and/or Visa cash com-
`
`pliant standards . . . payment data may be validated by a data access terminal using payment man-
`
`agement code.”). Using code to implement this transaction, as disclosed in the specifica-
`
`11
`
`
`
` CBM2015-00033
`United States Patent No. 8,336,772 B2
`
`
`tion, was obvious and known. E.g,, Ex.1419 §V, ¶¶ 80-88. Providing access to content
`
`based on payment and rules, as claimed in the patent, was also well known. See, e.g.,
`
`Exs.1407; 1406 Abstract, 1:67-2:9; 1408 Abstr