throbber
Paper No. 21
`
`UNITED STATES PATENT AND TRADEMARK OFFICE
`____________________
`
`BEFORE THE PATENT TRIAL AND APPEAL BOARD
`___________________
`
`GOOGLE INC. AND APPLE INC.,
`Petitioners,
`
`v.
`
`CONTENTGUARD HOLDINGS, INC,
`Patent Owner.
`___________________
`
`Case No. CBM2015-000401
`U.S. Patent No. 7,774,280
`____________________
`
`__________________________________________________________________
`
`PETITIONERS’ REPLY BRIEF
`
`1 Case No. CBM2015-00160
`
`

`
`Table of Contents
`
`I.
`
`II.
`
`Introduction......................................................................................................1
`
`The ’280 Patent Covers Financial Activities And Is CBM-Eligible...............2
`
`A.
`
`B.
`
`Claim 1 Of The ’280 Patent Covers A Financial Activity....................2
`
`The ’280 Patent Does Not Claim A Technological Invention..............5
`
`III. Claim Construction..........................................................................................7
`
`IV. Anticipation .....................................................................................................9
`
`A.
`
`Stefik’s NSOR Is A “Meta-Right” Because It Is A Right To Generate,
`Dispose Of, Or Modify Usage Rights...................................................9
`
`1.
`
`2.
`
`3.
`
`4.
`
`The NSOR Controls Usage Rights Creation.............................10
`
`A Participant In The System Can Choose Whether To Exercise
`An NSOR ..................................................................................13
`
`The NSOR Element Can Specify Particular Rights By Itself ..14
`
`Even Under ContentGuard’s Proposed Claim Construction, the
`NSOR Is a Meta-Right..............................................................15
`
`B.
`
`Stefik Discloses The “Determining” Step...........................................18
`
`1.
`
`2.
`
`NSOR Elements Cannot Be Exercised Unless All Conditions
`Are Satisfied, Including Those Specific To The NSOR And To
`The Requesting Repository.......................................................18
`
`Stefik Shows Any Required Fees Can Be Paid By The
`Requesting Repository..............................................................19
`
`C.
`
`Stefik Discloses The “Exercising” Step..............................................20
`
`V.
`
`Obviousness...................................................................................................21
`
`A.
`
`A Person Of Ordinary Skill Would Have Been Motivated To Adapt
`Stefik To Exercise The NSOR In A Separate Transaction .................22
`
`i
`
`

`
`CBM2015-00040
`CBM2015-00160
`
`B.
`
`Stefik Does Not “Teach Away” From Adding Or Modifying Usage
`Rights Separately From An Action To Content..................................25
`
`VI. Conclusion .....................................................................................................25
`
`ii
`
`

`
`TABLE OF AUTHORITIES
`
`Page(s)
`
`Cases
`Bicon, Inc. v. Struamann Co.,
`441 F.3d 945 (Fed. Cir. 2006) ..............................................................................3
`
`Compass Bank v. Maxim Integrated Prods., Inc.,
`CBM2015-00102, Paper 16 at 12 (PTAB Oct. 7, 2015) ......................................4
`
`Global Tel*Link Corp. v. Securus Techs., Inc.,
`CBM2015-00145, Paper 20 at 10-14 (PTAB Nov. 25, 2015)..............................5
`
`KSR Int’l Co. v. Teleflex Inc.,
`550 U.S. 398 (2007)......................................................................................22, 23
`
`Photoshelter, Inc. v. Uniloc USA, Inc.,
`CBM2015-00023, Paper 24 at 12-13 (PTAB May 21, 2015) ..............................4
`
`SightSound Techs., LLC v. Apple Inc.,
`Nos. 2015-1159, slip op. (Fed. Cir. Dec. 15, 2015) .........................................5, 6
`
`Sony Comput. Entm’t Am. LLC v. ADC Tech. Inc.,
`CBM2015-00026, Paper 10 at 12-13 (PTAB July 3, 2015).................................4
`
`Versata Development Group, Inc. v. SAP Am., Inc.,
`793 F.3d 1306 (Fed. Cir. 2015) ........................................................................6, 8
`
`Other Authorities
`
`37 C.F.R. § 42.301(b) ................................................................................................6
`
`AIA § 18(d)(1) ...........................................................................................................2
`
`iii
`
`

`
`EXHIBIT LIST
`
`Petitioners’ Exhibit #
`1032
`1033
`
`Description
`Declaration of Benjamin Goldberg, Ph.D.
`Deposition Transcript of David Martin, Ph.D.
`
`iv
`
`

`
`I.
`
`Introduction
`
`In its Institution Decision, the Board correctly found the ’280 patent eligible
`
`for Covered Business Method (“CBM”) review, and that the Stefik ’012 patent
`
`anticipates or renders obvious claims 1, 5, and 11 of the ’280 patent.
`
`In its Response, ContentGuard disputes that the ’280 patent is CBM-eligible.
`
`It contends that any financial transactions that occur are “merely an optional
`
`condition” on the exercise of rights. Paper 15 at 32. But ContentGuard cannot run
`
`away from its own patent disclosure, which makes clear those transactions are the
`
`central purpose of its meta-rights scheme. See Ex. 1001 at 6:1-17. Next, it
`
`contends that its claims involve a “technological invention.” But again, the ’280
`
`patent itself refutes this assertion; it explains the technology used to implement the
`
`“meta-rights” scheme is old—it is the same technology described years earlier in
`
`the Stefik patents. Ex. 1001 at 7:23-24 (“At a high level the process of enforcing
`
`and exercising meta-rights are the same as for usage rights.”); id. at 7:36-39
`
`(“Thus, the mechanism for exercising and enforcing a meta-right can be the same
`
`as that for a usage right. For example, the mechanism disclosed in U.S. Pat. No.
`
`5,634,012 can be used.”).
`
`ContentGuard also argues its scheme is both novel and non-obvious over
`
`Stefik. To advance that argument, however, ContentGuard demands the Board first
`
`read several new limitations into its claims. Then, it argues the Next-Set-of-Rights
`
`1
`
`

`
`element in the Stefik scheme does not do what Stefik literally says it does—create
`
`or delete usage rights for downstream copies of a digital work.
`
`The Board should maintain its findings that (i) the ’280 patent is eligible for
`
`CBM review, and (ii) claims 1, 5, and 11 of the ’280 patent are unpatentable. As
`
`ContentGuard does not present separate arguments for claims 5 and 11, those
`
`claims stand or fall with claim 1.
`
`II.
`
`The ’280 Patent Covers Financial Activities And Is CBM-Eligible
`
`Under § 18 of the AIA, a “covered business method patent” is “a patent that
`
`claims a method or corresponding apparatus for performing data processing or
`
`other operations used in the practice, administration, or management of a financial
`
`product or service.” AIA § 18(d)(1). The Board correctly found the ’280 patent
`
`covers a financial activity because, inter alia, claim 1 covers purchase transactions
`
`between a consumer and a supplier. Paper 9 at 7-10. The Board also correctly
`
`found the ’280 patent does not qualify for the technological invention exception to
`
`CBM authority because, inter alia, the only “technological” element in the claim is
`
`admittedly old and well-known. Id. at 10-12.
`
`A.
`
`Claim 1 Of The ’280 Patent Covers A Financial Activity
`
`The ’280 patent is directed to systems and methods to enable the commercial
`
`distribution of digital content from a content supplier, via distributers and retailers,
`
`to consumers. See Paper 1 at 9-15. The very purpose of that scheme is to enable
`
`2
`
`

`
`financial transactions where a “rights consumer” purchases rights from a “rights
`
`supplier.” For example, claim 1 specifies a process where a supplier “obtain[s] a
`
`set of rights” that includes a meta-right, “determin[es]” whether the “rights
`
`consumer” is entitled to the right specified by the meta-right, and if so,
`
`“exercise[es]” the meta-right to create the right for “the rights consumer.” Ex. 1001
`
`at 15:5-22.2 Indeed, as the Petition explained and as the Board recognized, the ’280
`
`specification describes numerous embodiments where a rights consumer purchases
`
`rights from a rights supplier. Paper 1 at 10-12; Paper 9 at 9-10.
`
`These financial transactions are not a mere coincidence in the ’280 patent
`
`scheme—securing payment for uses of digital works is the central purpose of that
`
`scheme. See, e.g., Ex. 1001 at 5:36-38 (“Clearinghouse 90 can be used to process
`
`payment transactions and verify payment prior to issuing a license.”); id. at 2:18-
`
`21; Id. at 14:5-10 (explaining use of state variables to “…acknowledge that an
`
`appropriate fee has been paid…”); see also id. at 6:1-4; id. at 6:18-25 (explaining
`
`2 ContentGuard faults the Board for relying on the preamble of claim 1. See Paper
`
`15 at 29-30. But Bicon, Inc. v. Struamann Co., 441 F.3d 945, 952-53 (Fed. Cir.
`
`2006), cited by ContentGuard, actually shows the Board properly considered claim
`
`1’s preamble, as it recites “essential elements of the invention” and includes terms
`
`such as “rights consumer” that serve as antecedent bases to the body of the claim.
`
`3
`
`

`
`role of meta-rights in commercial distribution chain including distributors, retailers
`
`and consumers). More than substantial evidence supports the Board’s conclusion
`
`the claim 1 covers an activity “that, at the very least, is incidental or
`
`complementary to a financial activity.” Paper 9 at 9-10.
`
`In its Response, ContentGuard argues the Board erred in finding the ’280
`
`Patent CBM-eligible because claim 1 could cover a no-fee transaction. Paper 15 at
`
`31. It then contends that to be CBM eligible, a claim must necessarily cover only
`
`financial activities or an activity incidental or complementary to a financial
`
`activity, and no other kind of activity. Id. at 33.
`
`The Board properly considered and rejected this argument. Paper 9 at 8-9.
`
`That a single transaction might not collect fees in a scheme designed to collect fees
`
`is irrelevant—that hypothetical may never occur and plainly is not the intended
`
`purpose of the ’280 patent. More directly, nothing in § 18 limits CBM-eligibility in
`
`this way. See, e.g., Compass Bank v. Maxim Integrated Prods., Inc., CBM2015-
`
`00102, Paper 16 at 12 (PTAB Oct. 7, 2015) (CBM-eligible Patent where
`
`“independent claim 1 encompasses an apparatus for managing financial products
`
`or delivering financial services”) (emphasis added); Sony Computer Entm’t Am.
`
`LLC v. ADC Tech. Inc., CBM2015-00026, Paper 10 at 12-13 (PTAB July 3, 2015)
`
`(“[w]e do not interpret the statute as requiring the literal recitation of financial
`
`products or services in a claim”); Photoshelter, Inc. v. Uniloc USA, Inc.,
`
`4
`
`

`
`CBM2015-00023, Paper 24 at 12-13 (PTAB May 21, 2015) (Wood, J.); Global
`
`Tel*Link Corp. v. Securus Techs., Inc., CBM2015-00145, Paper 20 at 10-14
`
`(PTAB Nov. 25, 2015) (Braden, J.).
`
`Despite this, ContentGuard devotes four pages of its response to a discussion
`
`of decisions addressing CBM eligibility. Those cases are all readily distinguishable
`
`from the present case because the ’280 patent does not describe or claim a
`
`generalized technological process that might only theoretically be applied in a
`
`financial context. Instead, the central purpose of the ’280 patent is to control the
`
`sale of rights in multi-tiered distribution schemes. E.g., Ex. 1001 at 2:22-48
`
`(describing problems with the sale and distribution of content and rights); Paper 15
`
`at 42-43 (arguing ’280 patent enables greater control over “distributors or
`
`resellers”). Cases more relevant than the ones cited by ContentGuard find
`
`challenged patents CBM-eligible. For example, the Federal Circuit recently
`
`affirmed the Board’s finding of CBM eligibility for claims directed to “the
`
`electronic sale of digital audio” using “components [that] themselves were known
`
`in the art.” SightSound Techs., LLC v. Apple Inc., Nos. 2015-1159, -1160, slip op.
`
`at 12-13 (Fed. Cir. Dec. 15, 2015). Like that case, the ’280 patent claims are all
`
`concerned with methods for selling digital content to consumers.
`
`B.
`
`The ’280 Patent Does Not Claim A Technological Invention
`
`The Board also correctly found that the ’280 patent does not fall within the
`
`5
`
`

`
`“technological invention” exception to CBM authority. Paper 9 at 10-12. A
`
`“technological invention” is one in which (i) “the claimed subject matter as a
`
`whole recites a technological feature that is novel and unobvious over the prior art”
`
`and (ii) “solves a technical problem using a technical solution.” 37 C.F.R.
`
`§ 42.301(b); Versata Dev. Grp., Inc. v. SAP Am., Inc., 793 F.3d 1306, 1326 (Fed.
`
`Cir. 2015). Claim 1 of the ’280 patent fails both prongs of this inquiry.
`
`First, the record supports the Board’s finding the ’280 patent does not claim
`
`a novel and non-obvious technological feature. Paper 9 at 12. Most significantly,
`
`the ’280 patent itself admits the claimed meta-right methods are to be practiced
`
`using pre-existing technologies— it states: “the mechanism for exercising and
`
`enforcing a meta-right can be the same as that for a usage right” and it identifies as
`
`one example the mechanisms described in U.S. Pat. No. 5,634,012 to Stefik. Ex.
`
`1001 at 7:36-39. The ’280 patent also freely admits the claimed meta-rights
`
`scheme is built on old and known technologies including repositories, usage rights,
`
`state variables, and mechanisms for enforcing and exercising rights (including
`
`meta-rights). See Ex. 1001 at 1:37-43, 7:23-24, 7:36-39, 9:38-40; Paper 1 at 20-24.
`
`Such features cannot impart technical novelty to the ’280 claims. See Paper 9 at 11;
`
`Paper 1 at 17-18; SightSound, slip op. at 12-13. The ’280 patent also admits that
`
`meta-rights are an extension of the pre-existing concept of rights taught in Stefik.
`
`Ex. 1001 at 5:43-47. Thus, a meta-right is simply another type of “right”—at a
`
`6
`
`

`
`technical level, it is a simple and pre-existing software construct. See Ex. 1014
`
`¶¶ 38-42. And even if meta-rights were considered to be a technological feature
`
`(which they are not), they are not novel because meta-rights are disclosed and
`
`taught by the Stefik patent. See Paper 1 at 16-20; Paper 9 at 12.
`
`Claim 1 also fails the second prong of the exception. The ’280 specification
`
`admits that meta-rights address a business problem, not a technological problem.
`
`As the ’280 patent explains, meta-rights enable “typical business models for
`
`distributing digital content,” (Ex. 1001 at 5:39-40), and are particularly useful in
`
`“multi-tiered distribution models” that include “entities that . . . are in the business
`
`of manipulating the rights associated with the content” (id. at 6:1-8). See also
`
`Paper 1 at 11-12, 21. And the patent, as described by ContentGuard, solves a
`
`business problem: improving the control of the transfer of rights through
`
`distribution channels. Paper 15 at 6-7, 41-42.
`
`III. Claim Construction
`
`The Board construed the term “meta-right” to mean “a right that one has to
`
`generate, manipulate, modify, dispose of or otherwise derive another right.” Paper
`
`9 at 17. Although Dr. Martin agreed that the Board’s construction describes
`
`properties of meta-rights (Ex. 1033 at 14:24-15:9), ContentGuard argues the Board
`
`should instead adopt the district court’s construction, which would add that the
`
`meta-right “is not itself a usage right because exercising a meta-right does not
`
`7
`
`

`
`result in action to content.” The district court included that additional language to
`
`aid the jury, which is unnecessary here because there is no risk the Board will be
`
`confused by its own construction. It is also unnecessary because, as the Board
`
`correctly found, the claim adequately identifies the actions taken by “meta-rights,”
`
`and additional verbiage is not needed to give meaning to the claim term. Paper 9 at
`
`16. And, of course, the Board and the district court apply different claim
`
`construction standards. Versata, 793 F.3d at 1328 (applying broadest reasonable
`
`interpretation standard to CBMs).
`
`In any event, adding ContentGuard’s proposed language is unwarranted
`
`because it has no consequence in this case. This is because, as explained below,
`
`exercising a “Next-Set-of-Rights” in the Stefik scheme does not result in action to
`
`content. ContentGuard’s proposal may actually be an indirect attempt to add yet
`
`another restriction into the claims; namely, that a meta-right cannot be exercised
`
`concurrently with the exercising of one or more independent usage rights. But
`
`nothing in the ’280 claims or disclosure can be construed as precluding a meta-
`
`right from being exercised at the same time as a usage right.
`
`Separately, Petitioners disagree with ContentGuard’s interpretations of some
`
`other terms (e.g., “behavioral integrity”). But regardless of the exact claim
`
`construction used, Stefik undisputedly discloses the “repository,” “usage right,”
`
`and “state variable” elements. See Ex. 1033 at 39:19-22, 57:13-21, 132:15-19.
`
`8
`
`

`
`IV. Anticipation
`
`The Board correctly found that Stefik describes a “meta-right” in the form of
`
`the “Next-Set-of-Rights” (“NSOR”) grammar element, because the NSOR
`
`specifies usage rights a repository can create or delete when the NSOR is
`
`exercised. Paper 9 at 35-37. ContentGuard challenges that finding by contending
`
`that Stefik does not disclose or suggest a “meta-right” that can be “exercised
`
`independently of” a usage right, (Paper 15 at 53-54), and similar arguments about
`
`“independently” or “separately” exercisable meta-rights appear throughout
`
`ContentGuard’s brief. The problem with these arguments is that the claims do not
`
`require that meta-rights and usage rights be “exercised independently” or
`
`“exercised separately,” even under ContentGuard’s proposed construction.
`
`ContentGuard also argues that Stefik does not disclose the “determining” or
`
`“exercising” steps. Paper 15 at 56-63. The Board correctly rejected those
`
`arguments based on the way that the NSOR is actually used by repositories in the
`
`Stefik scheme. Paper 9 at 35-37.
`
`A.
`
`Stefik’s NSOR Is A “Meta-Right” Because It Is A Right To
`Generate, Dispose Of, Or Modify Usage Rights
`
`In arguing that Stefik’s NSOR grammar element is not a meta-right,
`
`ContentGuard seems to assume that the claims—whether as construed by the
`
`Board or as ContentGuard proposes in its response—preclude a meta-right from
`
`being exercised concurrently with one or more usage rights. Nothing in the claims
`
`9
`
`

`
`imposes any such restriction—the claims employ open “comprising” language, and
`
`only address actions being taken regarding meta-rights. ContentGuard’s arguments
`
`also ignore how the NSOR is actually used in the Stefik scheme.
`
`1.
`
`The NSOR Controls Usage Rights Creation
`
`The NSOR element is used by repositories in the Stefik scheme to control
`
`what usage rights the repository can create, delete, or modify for a work after it is
`
`transported. Paper 1 at 58-60; Ex. 1002 at 21:47-59; Ex. 1014 ¶ 64. If the NSOR
`
`does not specify the rights for the next copy of the work, the new copy’s rights will
`
`be the same as those of the original copy. Ex. 1002 at 21:50-52. If the NSOR does
`
`specify rights, those usage rights will be added, deleted, or replaced when the
`
`NSOR is exercised. Id. at 21:47-59.
`
`A simple example illustrates how the NSOR element can be used by a
`
`publisher to specifically grant the right to add, delete, or replace certain usage
`
`rights. Consider two digital works with the following rights:
`
`Work 1
`
`Work 2
`[Play] [Copy]
`[Play] [Copy]
`[Loan] [Next-Set-of-Rights: (Delete:
`[Loan]
`Copy Loan) (Add: Print)]
`In this example, if the Loan right for either work is exercised, the repository
`
`will make a copy of the content and then will create usage rights for that copy
`
`either according to the default rules (Work 1) or as specified in the NSOR (Work
`
`2). Ex. 1032 ¶ 9. Thus, for Work 1, the repository will create Play, Copy, and Loan
`
`10
`
`

`
`usage rights for the new copy of the work. This is because there is no NSOR
`
`element that modifies the default rules. See id.; Ex. 1002 at 21:50-52. For Work 2,
`
`the repository will create for the new copy of the work a different set of usage
`
`rights: (i) it will create a Play usage right (same as the original copy), (ii) it will not
`
`create a Copy or Loan usage right for that copy (i.e., it will “delete” those usage
`
`rights in the copy) and (iii) it will add a “Print” usage right (not present in original
`
`copy). Importantly, the different set of usage rights in the copy relative to the usage
`
`rights for the original digital work is directly attributable to actions taken by the
`
`repository when using the NSOR. In other words, the data in the NSOR directs the
`
`repository to: (i) delete the Copy and Loan usage rights from the copy (i.e., by
`
`specifying “Delete: Copy Loan”) and (ii) add the Print usage right to the copy (i.e.,
`
`“Add: Print”). See Ex. 1032 ¶ 9; see also Paper 1 at 59-60, Ex. 1014 ¶¶ 64-66, 72.
`
`The “Loan” usage right thus specifies certain actions that can be taken on the
`
`content; namely, making a copy of the content and transferring it to another
`
`repository. Ex. 1032 ¶ 10. For both Work 1 and Work 2, exercising the Loan right
`
`causes the same action to the content: a copy is made and loaned to another
`
`repository. Id. But the usage rights that are created in the loaned copies are
`
`different because only one of the works has a Next-Set-of-Rights meta-right. Id.
`
`Exercising the NSOR is what results in addition of the “Print” usage right that
`
`would not be created by exercising the Loan usage right, and it is the NSOR which
`
`11
`
`

`
`causes deletion of the “Copy” and “Loan” usage rights in the copy of the digital
`
`work. This can be easily appreciated by recognizing if there is no NSOR (i.e., as in
`
`the Work 1 example), the Loan usage right will create the copy with the same set
`
`of usage rights as the original.
`
`Because exercising the NSOR element determines what usage rights a
`
`repository can generate during a transaction, it is “a right that one has to generate,
`
`manipulate, modify, dispose of or otherwise derive another right,” which satisfies
`
`the Board’s construction. For the same reasons, the NSOR element is also “a right
`
`about a right” and “a right that, when exercised, creates or disposes of usage rights
`
`(or other meta-rights).”
`
`ContentGuard nonetheless argues the NSOR element must be considered a
`
`“usage right” because the NSOR is consulted during the exercise of the Loan usage
`
`right. Paper 15 at 53. But in its arguments, ContentGuard improperly conflates the
`
`use of the NSOR element with the use of the associated Loan usage right. What
`
`Stefik actually shows is that exercising the usage right controls the actions being
`
`taken on the content (e.g., making a copy or loaning a copy of the digital work),
`
`while exercising the NSOR creates or deletes “usage rights” which are attached to
`
`the copy of the digital work. Ex. 1032 ¶ 11. Both are exercised, for different
`
`purposes, as Petitioners and Dr. Goldberg have clearly and consistently explained.
`
`12
`
`

`
`2.
`
`A Participant In The System Can Choose Whether To Exercise
`An NSOR
`
`ContentGuard contends an NSOR is not a “right” (meta or usage) because it
`
`is “unconditionally applied” and the user has no choice about whether to use it.
`
`Paper 15 at 49, 52. But Stefik illustrates that a participant in its distribution scheme
`
`can choose whether to exercise an NSOR by selecting from multiple versions of
`
`the same usage right, and furthermore that the use of the NSOR can be subject to
`
`conditions. See, e.g., Ex. 1002 at 27:15-33. For example, Stefik describes a digital
`
`work with two different versions of a “Loan” right:
`
`Ex. 1002 at 27:15-33; see also Paper 15 at 58-59 (discussing this example). In this
`
`example, the first “Loan” right has an NSOR element, as well as a Remaining-
`
`Copy-Rights element that can also be exercised to create rights (for the original
`
`copy owner), and it requires a daily $10 fee. Ex. 1002 at 27:27-30. The second
`
`“Loan” right has no NSOR element and no rights specified in the Remaining-
`
`Copy-Rights. Id. at 27:30-33.
`
`When this digital work is loaned to another repository, the NSOR element is
`
`13
`
`

`
`only exercised if the first Loan right is selected and the $10 fee is paid. Id. at 27-
`
`30; see also Ex. 1014 ¶ 76; Ex. 1032 ¶ 13; Ex. 1033 at 113:12-14 (confirming the
`
`first Loan right costs $10 to exercise). The same is true for Remaining-Copy-
`
`Rights. As this example shows, a participant in the system may choose to exercise
`
`a particular version of a usage right based on its associated NSOR element or its
`
`Remaining-Copy-Rights, and must meet the corresponding conditions to do so. Ex.
`
`1032 ¶ 13.
`
`In addition, the NSOR element allows a publisher to control usage rights
`
`creation as a digital work is passed down a chain of repositories. See Paper 1 at 59.
`
`For example, the publisher could supply a digital work with multiple versions of a
`
`Copy usage right, each with a different NSOR element bearing a different fee. Ex.
`
`1032 ¶¶ 14-16. The publisher could thereby exert control over usage rights creation
`
`as a digital work is passed down a chain of repositories, while permitting a degree
`
`of choice (as to which NSOR element to use) by downstream distributors and
`
`consumers. Id.; see also Ex. 1002 at 27:1-28:3; Ex. 1014 ¶¶ 59, 64, 68.
`
`3.
`
`The NSOR Element Can Specify Particular Rights By Itself
`
`ContentGuard argues that “an NSOR parameter cannot even be interpreted
`
`as a separate right all by itself.” Paper 15 at 54. The point of this argument is
`
`unclear, since Dr. Martin admitted the claims do not require that a meta-right has
`
`to be interpreted all by itself. Ex. 1033 at 150:23-151:7. ContentGuard nevertheless
`
`14
`
`

`
`proceeds to discuss an embodiment of Stefik in which the NSOR parameter is
`
`unspecified. Paper 15 at 54. But the embodiments of greater interest (because they
`
`use the NSOR to create rights) are those in which the NSOR parameter is
`
`specified. In those embodiments the NSOR determines usage rights that get added
`
`or created, without reference to other usage rights.
`
`The Board recognized this in its Institution Decision. As it correctly found,
`
`Stefik teaches that the NSOR grammar element can be implemented by including
`
`key words in the NSOR, including “Add.” Paper 9 at 33-34, 37. Indeed, Stefik
`
`clearly explains this, stating: “Versions of rights after Add: are added to the current
`
`set of rights. Ex. 1002 at 21:53-54. “Add” precisely identifies the rights that may
`
`be generated and does so without reference to other usage rights.
`
`4.
`
`Even Under ContentGuard’s Proposed Claim Construction, the
`NSOR Is a Meta-Right
`
`ContentGuard contends that if the Board were to adopt ContentGuard’s
`
`construction of meta-right, the NSOR element could not be found to be a meta-
`
`right. But, as explained in §§ IV.A.1-3, above, exercising the NSOR element
`
`creates (or destroys or modifies) usage rights; it does not result in actions to
`
`content. For example, if a “Copy” usage right has an NSOR element, exercising
`
`the Copy usage right results in an action to content (making a copy) while
`
`exercising the NSOR element results in creating or destroying usage rights for the
`
`copy of the digital work (the rights specified using “Add:” or “Delete:”). Ex. 1032
`
`15
`
`

`
`¶ 17. Because the NSOR element is “a right that, when exercised, creates or
`
`disposes of usage rights (or other meta-rights) but that is not itself a usage right
`
`because exercising a meta-right does not result in action to content,” it satisfies
`
`even ContentGuard’s alternative construction of a “meta-right.” Id.
`
`Importantly, there is no evidence in the record that the NSOR is “itself” a
`
`usage right. Certainly, ContentGuard has never suggested this is the case. In fact,
`
`ContentGuard’s expert acknowledged the NSOR exists as a discrete and distinct
`
`field within a data structure that also includes the data representing the usage
`
`rights. See, e.g., Ex. 2009 ¶¶ 104-105. ContentGuard does contend the NSOR is
`
`“part of a usage right,” Paper 15 at 56 (emphasis added). But this is not the same as
`
`saying that the NSOR is itself a usage right, which is what the “not itself a usage
`
`right” portion of ContentGuard’s construction would require. That the data
`
`representing the meta-right is stored in a common file structure with other data
`
`representing usage rights is of no consequence. Ex. 1032 ¶ 18.
`
`There also is no evidence that using a Stefik NSOR “result[s] in”—i.e.,
`
`causes—an action to content. Critically, ContentGuard’s expert Dr. Martin offered
`
`no opinion in his declaration that using the NSOR results in an action to content.
`
`See Ex. 1033 at 149:22-150:6. Dr. Martin also agreed the NSOR does not cause a
`
`usage right to be exercised. Id. at 148:19-24 (“… I guess I would agree that the
`
`presence of a next set of rights parameter does not cause a particular usage right to
`
`16
`
`

`
`be exercised.”). To the extent there is any causal relationship between use of the
`
`NSOR and exercise of a usage right, it is that the usage right can trigger the
`
`exercising of the NSOR, not the other way around. This is how ContentGuard itself
`
`describes the system, stating that “during exercise of the usage right Stefik’s
`
`system consults the NSOR parameter to populate the next set of rights for that
`
`post-operation content.” Paper 15 at 53 (emphasis added); see also Ex. 1033 at
`
`148:10-18. Whether the usage right causes use of the NSOR or not is immaterial to
`
`the claim, even under ContentGuard’s proposed construction. That sequence is
`
`simply not one in which exercising the NSOR “result[s] in action to content.”
`
`At his deposition, Dr. Martin seemed to attribute relevance to the notion that
`
`the NSOR is used “in the context of exercising a usage right that does result in
`
`actions to content.” Ex. 1033 at 150:3-6. But, again, this cannot distinguish the
`
`claims at issue from the NSOR in Stefik, because no claim limitation bars a meta-
`
`right from operating “in the context of” a usage right, or otherwise being used
`
`contemporaneously with a usage right. The question, under ContentGuard’s
`
`proposed construction, is whether exercising the NSOR will “result in” action to
`
`content. The evidence demonstrates it does not.
`
`To summarize, there is no evidence in the record that suggests, much less
`
`proves, that the NSOR described in Stefik is a “usage right” according to the ’280
`
`patent. Likewise, there is no evidence in the record establishing that the exercise of
`
`17
`
`

`
`the NSOR results in actions to content. Whether exercising the usage right results
`
`in exercising the NSOR is irrelevant, as is whether the NSOR is exercised
`
`contemporaneously with actions that are being taken on content. As long as
`
`exercising the NSOR does not result in actions to content, it does not run afoul of
`
`the claim requirements for a meta-right, under both the Board’s construction and
`
`ContentGuard’s alternative construction. See Ex. 1032 ¶¶ 17-18. Thus, even under
`
`ContentGuard’s proposed construction, the NSOR shown in Stefik is a meta-right,
`
`not a usage right.
`
`B.
`
`Stefik Discloses The “Determining” Step
`
`Stefik shows that during a usage rights transaction between two repositories
`
`(e.g., a server repository and a requesting repository), a server repository validates
`
`all conditions on the exercise of a usage right before permitting the requesting
`
`repository to access a digital work. See Paper 1 at 65-68; Paper 9 at 37. This
`
`process satisfies the claim limitation “determining, by a repository, whether the
`
`rights consumer is entitled to the right specified by the meta-right.” Paper 9 at 37.
`
`ContentGuard’s attempts to distinguish Stefik’s validation process from the
`
`“determining” step disregard the claim language and the actual teachings in Stefik.
`
`1.
`
`NSOR Elements Cannot Be Exercised Unless All Conditions
`Are Satisfied, Including Those Specific To The NSOR And To
`The Requesting Repository
`
`Stefik teaches that to exercise a usage right with an NSOR, a repository must
`
`18
`
`

`
`first determine whether all applicable conditions are met. For example, in the Loan
`
`example discussed above (Ex. 1002 at 27:15-33), a $10 fee must be paid to
`
`exercise the first Loan right. If the $10 is not paid, the requester can still borrow
`
`the work (using the second Loan right), but different rights are created (at both the
`
`original copy owner’s and the requester’s repositories). Id. at 27:26-33. This
`
`example shows that compliance with the $10 fee condition controls whether the
`
`NSOR element is exercised. See id.; Ex. 1032 ¶ 19. Similarly, if a Loan right
`
`contains a “Security Level” parameter, the Loan right cannot be exercised unless
`
`the requesting repository meets the minimum security level requirement. See Ex.
`
`1002 at 26:16-28 (discussing “SC:3” element). As Stefik explains, during a
`
`transaction, a server repository validates all conditions on the exercise of a usage
`
`right, including any security level conditions applicable to the consumer
`
`repository. See, e.g., id. at 7:23-29, 27

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket