throbber
IN THE UNITED STATES PATENT AND TRADEMARK OFFICE
`
`Attorney Docket No.:
`
`104677-5005-832
`Customer No. 28120
`
`Petitioner: Apple Inc.
`







`
`
`Inventor: Racz et al.
`United States Patent No.: 8,794,516
`Formerly Application No.: 13/438,754
`Issue Date: August 5, 2014
`
`Filing Date: April 3, 2012
`
`Former Group Art Unit: 2887
`
`Former Examiner: Thien Minh Le
`
`
`For: Data storage and access systems
`
`MAIL STOP PATENT BOARD
`Patent Trial and Appeal Board
`United States Patent and Trademark Office
`Post Office Box 1450
`Alexandria, Virginia 22313-1450
`
`
`DECLARATION OF DR. JOHN P. J. KELLY IN SUPPORT OF APPLE
`INC.’S PETITION FOR COVERED BUSINESS METHOD PATENT
`REVIEW OF UNITED STATES PATENT NO. 8,794,516 PURSUANT TO 35
`U.S.C. § 321, 37 C.F.R. § 42.304
`
`
`
`
`
`e
`
`
`Page 00001
`
`Apple Exhibit 1019
`
`

`
`I, John Kelly, hereby declare as follows:
`
`
`
`I. INTRODUCTION
`
`1.
`
`I have been retained to provide assistance regarding U.S. Patent No.
`
`8,794,516 (“’516 patent”). Attached hereto as Appendix A is a true and correct
`
`copy of my Curriculum Vitae describing my background and experience. I have
`
`personal knowledge of the facts and opinions set forth in this declaration, and, if
`
`called upon to do so, I would testify competently thereto.
`
`2.
`
`I hold Bachelor of Arts and Master of Arts degrees with Honors in
`
`Mathematics from the University of Cambridge, England. I hold a Ph.D. in
`
`Computer Science from U.C.L.A. From 1982 through 1986, I was a professor in
`
`the Computer Science Department at U.C.L.A. From 1986 through 1997, I was a
`
`professor in the Electrical and Computer Engineering Department of the University
`
`of California, Santa Barbara, where I held tenure.
`
`3.
`
`I am the principal of Kelly Computing, Inc. I teach and consult in
`
`many different aspects of computer science and engineering, including computer
`
`hardware and software architecture and design, software engineering and fault
`
`tolerance. My particular areas of expertise include computer architecture, software
`
`engineering and “clean-room” development and evaluation, reverse engineering,
`
`operating systems (including real-time and embedded), network computing
`
`e e 2
`
`
`
`
`Page 00002
`
`

`
`
`
`(including Internet computing), storage systems, fault tolerance, parallel and
`
`distributed computing systems, transaction processing systems, database systems,
`
`and program management.
`
`4.
`
`As a result of my education and professional experience, I have
`
`extensive development experience and knowledge of computer operating systems
`
`including access control concepts, data encryption/decryption techniques,
`
`networking technologies, database systems, communication protocols including
`
`network communication protocols, user interfaces including graphical user
`
`interfaces and computer hardware design, and software analysis, design, and
`
`development. I have developed computer software and hardware for many
`
`different computer systems and applications including programming
`
`microprocessors. For more than the last 20 years, I have analyzed software
`
`products related to access control, audio and video playback, network transmission
`
`of audio and video, storage of audio and video in multimedia databases, and
`
`content delivery networks and distribution systems. For example, I have analyzed
`
`databases and repositories used to store and access audio file repositories, network
`
`based distribution of electronic media, set top boxes, and content delivery network
`
`architecture of leading content delivery network providers. I have also analyzed
`
`the source code for computer operating systems such as Apple’s Mac OS X,
`
`e e 3
`
`
`
`
`Page 00003
`
`

`
`
`
`Microsoft Windows, Linux, etc. I have also testified in Court on several occasions
`
`as a computer science expert to report my analysis and opinions.
`
`5.
`
`I have worked in the area of computer software, hardware and system
`
`design and development for over forty years. I have extensive experience in the
`
`design and development of small and large scale software systems. I have been
`
`involved in the specification, development, integration, and testing of computer
`
`systems with a wide range of requirements, sizes and types. These have included,
`
`by way of example, custom hardware and software for a US Air Force fighter
`
`plane, a distributed real-time system for US FAA air traffic control, and a
`
`distributed geographical information system for the US Department of Energy.
`
`6.
`
`From 1978 to 1995, I specified, designed and implemented distributed
`
`database architectures, systems and applications for Los Alamos National
`
`Laboratory and NASA’s Jet Propulsion Laboratory and database machine design
`
`and implementation at Transaction Technology Incorporated, Ordain, Inc. and
`
`Teradata.
`
`7.
`
`From 1985 to 1998, I consulted for AT&T GIS, NCR, Symbios Logic,
`
`and LSI Logic, including working as a member of the AT&T GIS Science
`
`Advisory Committee (“SAC”). The SAC evaluated AT&T’s organization,
`
`e e 4
`
`
`
`
`Page 00004
`
`

`
`
`
`technical direction and product strategy and made recommendations to the Vice
`
`President of Technology and Development.
`
`8.
`
`A listing of testimony that I have provided in the last four years and
`
`my compensation is attached hereto as Appendix B. I am being compensated for
`
`my time spent in connection with this case. I have no financial interest in the
`
`outcome of this case.
`
`9.
`
`In preparing my opinions, I have considered the following materials:
`
`1018
`
`
`Exhibit Document
`1001 U.S. Patent No. 8,794,516
`1003 U.S. Patent No. 5,925,127
`1004 U.S. Patent No. 5,940,805
`1005
`File History for U.S. Patent No. 7,334,720
`1006 U.S. Patent No. 4,999,806
`1007 U.S. Patent No. 5,675,734
`1008 U.S. Patent No. 4,878,245
`1009
`File History for U.S. Patent No. 8,794,516
`1010 U.S. Patent No. 7,942,317
`1011 U.S. Patent No. 5,103,392
`1012 U.S. Patent No. 5,530,235
`1013 U.S. Patent No. 5,629,980
`1014 U.S. Patent No. 5,915,019
`1015
`European Patent Application, Publication No. EP0809221A2
`1016
`International Publication No. WO 99/43136
`1017
`JP Patent Application Publication No. H11-164058 (translation)
`Eberhard von Faber, Robert Hammelrath, and Franz-Peter Heider, “The
`Secure Distribution of Digital Contents,” IEEE (1997)
`1020 U.S. Patent No. 8,033,458
`Claim Construction Memorandum Opinion from Smartflash LLC v.
`Apple Inc., No. 6:13-cv-447 (Dkt. 229)
`File History for U.S. Patent No. 8,061,598
`
`1023
`
`1024
`
`e e 5
`
`
`
`
`Page 00005
`
`

`
`
`
`Exhibit Document
`1025 U.S. Patent No. 4,337,483
`1027
`International Publication No. WO 95/34857
`1028
`JP Patent Application Publication No. H10-269289 (translation)
`1029
`File History for U.S. Patent No. 7,942,317
`1030
`File History for U.S. Patent No. 8,033,458
`1031 U.S. Patent No. 8,061,598
`1032 U.S. Patent No. 8,118,221
`1033
`File History for U.S. Patent No. 8,118,221
`1034 U.S. Patent No. 8,336,772
`1035
`File History for U.S. Patent No. 8,336,772
`1036 U.S. Patent No. 5,646,992
`1037 U.S. Patent No. 5,903,721
`1038
`International Publication No. WO99/13398
`1039 U.S. Patent No. 5,761,485
`Adapting Multimedia Internet Content for Universal Access (“Mohan,”
`published March 1999)
`1041 U.S. Patent No. 5,953,005
`1043 U.S. Patent No. 7,334,720
`J. Taylor, “DVD-Video: Multimedia for the Masses,” IEEE Multimedia,
`Vol. 5, No. 9, July-September 1999, pp. 86-92
`
`1045
`
`1040
`
`
`
`II. LEGAL STANDARDS
`
`A.
`
`UNPATENTABLE SUBJECT MATTER
`
`10.
`
`I understand that claims of a patent may be unpatentable if they are
`
`directed to an abstract idea. If a claim is directed to an abstract idea, I understand
`
`that to be patentable, it must contain other elements or combination of elements,
`
`sometimes referred to as an “inventive concept,” that are sufficient to ensure that
`
`the patent in practice amounts to significantly more than a patent upon the abstract
`
`e e 6
`
`
`
`
`Page 00006
`
`

`
`
`
`idea itself. Even if the claims limit an abstract idea to one field of use or add
`
`insignificant extra-solution elements or computer-based limitations, they are not
`
`patentable if the abstract idea is combined with nothing more than well-
`
`understood, routine, conventional activities. I further understand that mere
`
`implementation of an abstract idea with a general purpose computer or in the
`
`context of the Internet does not make the abstract idea patentable. I also
`
`understand that the “machine or transformation” test can be an important tool in
`
`determining the patentability of claims. The “machine or transformation” test
`
`examines whether the claims are tied to a particular machine or apparatus, or
`
`transform a particular article into a different state or thing. If neither, then the test
`
`points to unpatentability. I understand that a general purpose computer is not a
`
`“particular machine or apparatus” under this test. I understand that the mere
`
`manipulation or reorganization of data does not satisfy the transformation prong.
`
`11.
`
`I also understand that to determine whether a claim recites patentable
`
`subject matter, the claim must be analyzed as a whole.
`
`12.
`
`I understand that the “inquiry on preemption is not whether the
`
`patents directed at building blocks of human ingenuity would preempt an entire
`
`field, but, instead, whether such patents would risk disproportionately tying up the
`
`use of the underlying ideas.”
`
`e e 7
`
`
`
`
`Page 00007
`
`

`
`
`
`13.
`
`I understand that the PTAB applies the “more likely than not”
`
`standard in determining whether to institute a CBM proceeding, and the
`
`preponderance of the evidence standard when ultimately determining patentability
`
`under § 101.
`
`B. WRITTEN DESCRIPTION
`
`14.
`
`It is my understanding that a patent claim is invalid if the patent fails
`
`to provide adequate written description. I understand that to satisfy the written
`
`description requirement, the disclosure of the specification must convey with
`
`reasonable clarity to those skilled in the art that, as of the filing date sought, the
`
`inventor was in possession of the invention. I understand that the invention is, for
`
`purposes of the written description inquiry, whatever is claimed. I further
`
`understand that the description must do more than merely disclose that which
`
`would render the claimed invention obvious.
`
`III. PERSON OF ORDINARY SKILL IN THE ART
`
`15.
`
`In determining the characteristics of a hypothetical person of ordinary
`
`skill in the art of the ’516 patent at the time of SmartFlash’s asserted priority date, I
`
`considered several things, including the type of problems encountered in the field,
`
`the solutions to those problems, the rapidity with which innovations are made, the
`
`e e 8
`
`
`
`
`Page 00008
`
`

`
`
`
`sophistication of the technology, and the education level and experience of active
`
`workers in the field. Finally, I placed myself back in the year 1999, and
`
`considered the engineers whom I had taught and with whom I had worked.
`
`16.
`
`In my opinion a person of ordinary skill in the art relating to the
`
`technology of the ’516 patent at the time of Smartflash’s asserted priority date of
`
`October 25, 1999 would have had at least a B.S. in E.E., C.S., or a
`
`telecommunications related field, and at least 3 years industry experience including
`
`client-server data/information distribution and management architectures. I
`
`understand that Smartflash asserts that a person of ordinary skill in the art would
`
`have had a bachelor’s degree in electrical engineering or its equivalent, or at least 5
`
`years of experience in manufacturing or engineering, with significant exposure to
`
`the digital content distribution and/or ecommerce industries.
`
`17.
`
`In 1999, I would have exceeded the level of skill required by either
`
`definition, and I am in a position to opine on the understanding of a person of
`
`ordinary skill in the art. In addition, my opinions herein are the same under both
`
`definitions.
`
`IV.
`
`CLAIM CONSTRUCTION
`
`18. For the purposes of this declaration, I have been asked to assume
`
`constructions for certain claim terms as presented in the following table. For all
`
`e e 9
`
`
`
`
`Page 00009
`
`

`
`remaining claim terms, I have assumed their plain and ordinary meaning consistent
`
`
`
`with the specification.
`
`
`
`ac” e
`
`access rule
`
`Žƒ‹ e‘•–”—…–‹‘e
`
`A rule specifying a condition under which access to
`
`content is permitted
`
`Data representing payment made for requested
`
`payment data
`
`content data and is distinct from “access control
`
`supplementary data
`
`
`
`data [which includes user identification data].”1
`
`Advertising data, customer reward management
`
`data, and/or hotlinks to web sites
`
`
`1 I understand that, in district court litigation, Petitioner has previously proposed
`
`that the term “payment data” should be construed more narrowly to mean “data,
`
`distinct from access control data and user identity data, representing either actual
`
`payment made or record of payment made for requested content data.” I also
`
`understand that the District Court defined the term as “data that can be used to
`
`make a payment for content.” My opinions contained herein remain the same
`
`under all of these constructions of “payment data.”
`
`e e
`
`10
`
`
`Page 00010
`
`

`
`
`
`V. THE ’516 PATENT
`
`
`Figure 1. Overview of the system of the ’516 patent. Data carriers (the
`content access terminals) communicate over the Internet with e-payment
`systems and with a data provider (content access web server and associated
`servers). [See Ex. 1001 (’516 patent) at Fig. 6]
`
`
`
`e e
`
`11
`
`
`Page 00011
`
`

`
`
`
`19. The ’516 patent issued on Aug. 5, 2014, from U.S. Patent Application
`
`No. 13/438,754 (“’754 application”), which was filed on April 3, 2012. For the
`
`purpose of this declaration only, I have been asked to assume that the priority date
`
`of the ’516 patent is October 25, 1999.
`
`20. The ’516 patent is directed to “a portable data carrier for storing and
`
`paying for data and to computer systems for providing access to data to be stored.”
`
`[See, e.g., Ex. 1001 (’516 patent) at 1:24-26.] The ’516 patent says that its systems
`
`and methods can be applied to the sale of audio and video data, text, software
`
`(including games) as well as other types of data. [See, e.g., Ex. 1001 (’516 patent)
`
`at 1:28-31.] The data carrier communicates with payment processors and data
`
`providers over a network such as the Internet. [See, e.g., Figure 1; Ex. 1001 (’516
`
`patent) at 11:60-15:60.] The data carrier downloads and displays items available
`
`from the data provider; the user selects an item for purchase; the data carrier pays
`
`for the item; and the data carrier downloads the item from the data provider. [See,
`
`e.g., Ex. 1001 (’516 patent) at 20:34-21:41, 22:32-24:13.]
`
`21. The multimedia content may also be accompanied by content use
`
`rules that specify the permitted level of usage such as the number of times that the
`
`content may be played. These use rules are transferred from the server to the client
`
`e e
`
`12
`
`
`Page 00012
`
`

`
`
`
`during purchase of an item. [See, e.g., Ex. 1001 (’516 patent) at 15:6-13, 21:57-
`
`62, 23:41-56.]
`
`22. The specification of the ’516 patent says that this system can be
`
`implemented using, for example, conventional computers, conventional storage
`
`devices, standard smart cards, standard transmission protocols, conventional
`
`encryption systems and standard e-payment systems. For instance, the patent
`
`explains that the following were known:
`
`• Internet users paying for goods and/or services by credit card transaction
`
`[see, e.g., Ex. 1001 (’516 patent) at 2:21-22; 19:13-17];
`
`• Encrypting/decrypting content for security [see, e.g., Ex. 1001 (’516 patent)
`
`at 3:1-11, 19:6-10, 21:42-47];
`
`• Data access terminal or content access terminal hardware: “conventional
`
`computer” or “mobile phone,” “home personal computer, “mobile
`
`communications device,” or “set top box” [see, e.g., Ex. 1001 (’516 patent)
`
`at 4:7-8, 16:4-14];
`
`• WAP and i-mode allowing mobile phones to access the Internet and
`
`download data [see, e.g., Ex. 1001 (’516 patent) at 4:8-13];
`
`• SIM cards including a user identification means [see, e.g., Ex. 1001 (’516
`
`patent) at 4:12-17];
`
`e e
`
`13
`
`
`Page 00013
`
`

`
`
`
`• Non-volatile memory, including EEPROM, flash memory, and optical
`
`memory [see, e.g., Ex. 1001 (’516 patent) at 4:45-51, 17:31-38];
`
`• Purchasing digital music equivalent to the purchase of a CD [see, e.g., Ex.
`
`1001 (’516 patent) at 5:13-16];
`
`• Data carrier hardware: “IC card,” “smart card,” “memory stick,” “standard
`
`smart card” [see, e.g., Ex. 1001 (’516 patent) at 6:32-34, 11:34-37, 17:17-
`
`38];
`
`• Electronics Point of Sale Systems (EPoSS) functionality for smart cards
`
`[see, e.g., Ex. 1001 (’516 patent) at 11:43-47];
`
`• E-payment systems and standards [see, e.g., Ex. 1001 (’516 patent) at 13:43-
`
`46];
`
`• Data access terminal: “general purpose computer” with standard components
`
`[see, e.g., Ex. 1001 (’516 patent) at 16:40-62; Fig. 8];
`
`• Data access device hardware: “portable audio/video player,” “conventional
`
`dedicated computer system” with standard components [see, e.g., Ex. 1001
`
`(’516 patent) at 18:13-34];
`
`• Use control routines including digital watermarking and content protection
`
`from the SDMI specification [see, e.g., Ex. 1001 (’516 patent) at 18:37-43];
`
`• “Standard transmission protocols,” which are used to transmit content data
`
`e e
`
`14
`
`
`Page 00014
`
`

`
`
`
`items [see, e.g., Ex. 1001 (’516 patent) at 21:53-56];
`
`• Communications technology (no particular technology is essential): for
`
`example, “internet,” “web-based technology,” “any electronic
`
`communications network,” “wide area network,” “local area network,”
`
`“wireless network,” “conventional land line network,” and “extranet” [see,
`
`e.g., Ex. 1001 (’516 patent) at 25:51-58].
`
`In addition, “[t]he physical embodiment of the system is not critical and a skilled
`
`person will understand that the terminals, data processing systems and the like can
`
`all take a variety of forms.” [See Ex. 1001 (’516 patent) at 12:37-40.]
`
`VI.
`
`OVERVIEW OF THE STATE OF THE ART
`
`23. By Smartflash’s claimed priority date of Oct. 25, 1999, the elements
`
`of the challenged claims – including, e.g., electronic payment for merchandise,
`
`digital data; storing data at a remote server; downloading data from a remote server
`
`to a local computer; controlling access to digital content; smartcards, and portable
`
`devices that could access the Internet – were already well known in the art.
`
`24. Computer scientists, engineers and users have long recognized the
`
`advantages of connecting computers together so that they can share information.
`
`Personal communication (e.g., e-mail), file sharing and electronic commerce are
`
`just a few applications of computer networking, all of which were available many
`
`e e
`
`15
`
`
`Page 00015
`
`

`
`
`
`years prior to 1999. Many systems for providing these applications were also
`
`known including online services – such as America Online (AOL), CompuServe,
`
`GEnie and Prodigy – and the Internet – including the World Wide Web.
`
`25. Electronic sale of goods and services was well known. For example,
`
`in 1991, U.S. Patent No. 4,999,8062 (“Chernow”) described a system for the sale
`
`and distribution of digital data, specifically computer software, by telephone. The
`
`seller’s system includes at least a computer (the “central computer”) and a modem:
`
`“The computer can be as simple as an IBM PC or as complex as a
`
`mainframe. The hardware requirements are that the computer must be
`
`capable of utilizing modems, have a large rapid access storage
`
`capacity (e.g.. a hard disk). meet the processing power requirements
`
`and have the ability to back up stored files.” [See Ex. 1006
`
`(Chernow) at 10:27-32.]
`
`The central computer’s rapid-access storage contains the library of software
`
`available for sale. [See, e.g., Ex. 1006 (Chernow) at 2:22-25, 2:30-36, 10:27-32,
`
`11:1-11.] The central computer also stores an index so that the purchaser can
`
`browse the available software. [See, e.g., Ex. 1006 (Chernow) at 8:62-9:12.]
`
`
`2 United States Patent No. 4,999,806 to Chernow et al., titled “Software
`
`Distribution System,” was filed on September 4, 1987 and issued March 12, 1991.
`
`e e
`
`16
`
`
`Page 00016
`
`

`
`
`
`26. The purchaser must also have a computer (containing storage such as
`
`hard disk or floppy disk for the downloaded software) and a modem:
`
`“The modems should have the ability to automatically alter their data
`
`rate to accommodate the customer’s modem. The central computer
`
`modems should be able to accommodate customer modem data rates
`
`from 300 to 9600 baud.” [See Ex. 1006 (Chernow) at 10:34-38.]
`
`“When the seller’s computer transmits the software to the purchaser’s
`
`computer it also transmits a Storing Program whose sole purpose is to
`
`store the transmitted software on either floppy disk or hard disk
`
`depending on the purchaser's desires.” [See Ex. 1006 (Chernow) at
`
`4:18-22.]
`
`[See also Ex. 1006 (Chernow) at Abstract, 4:48-51, 8:17-20, 8:46-47, 10:54-58.]
`
`27. The method of selling software according to Chernow is shown in
`
`Figure 2. The purchaser connects to the seller’s computer over the telephone line
`
`and browses the seller’s library of software. [See, e.g., Ex. 1006 (Chernow) at
`
`5:62-6:17.] If the purchaser decides to buy a software program, order information
`
`and credit card information are sent from the purchaser’s computer to the central
`
`computer over the telephone line:
`
`“Once a program is selected for purchase, the Interactive Program
`
`must make sure that the customer is able to pay for the purchase. To
`
`accomplish
`
`this, credit card
`
`information as well as customer
`
`information must be provided by the customer. The credit card used
`
`e e
`
`17
`
`
`Page 00017
`
`

`
`
`
`for the purchase must belong to the customer, and the address and
`
`phone number given by the customer must be the same as that to
`
`which the purchase is to be delivered.” [See Ex. 1006 (Chernow) at
`
`6:50-58.]
`
`The seller verifies the credit card information. [See, e.g., Ex. 1006 (Chernow) at
`
`6:66-7:13.] If the credit card is declined, the customer is prompted to input an
`
`alternate credit card number. [See, e.g., Ex. 1006 (Chernow) at 7:53-63.] If the
`
`credit card is approved, the software is downloaded to the purchaser’s computer
`
`and stored on disk. [See, e.g., Ex. 1006 (Chernow) at 7:64-8:57.] “The telephone
`
`call is terminated, the sale billed to [the] customer’s credit card and some internal
`
`information is recorded at the central computer for accounting purposes.” [See Ex.
`
`1006 (Chernow) at 8:58-61.]
`
`e e
`
`18
`
`
`Page 00018
`
`

`
`
`
`
`
`Figure 2. A flow diagram summary of a method for selling and distributing
`computer software. The customer locates a desired program (boxes c and d).
`The payment is made using a credit card (boxes labeled e, f and g). The
`program is transferred and copy-protected in a secure manner (boxes i-r).
`[See Ex. 1006 (Chernow) at Figs. 1A and 1B.]
`
`28. Chernow discloses that the purchaser may lease the software instead
`
`of buying it outright. Chernow also describes that the lease could be for a fixed
`
`period of time or a fixed number of uses, and that the terms of use for the leased
`
`software could be encrypted and stored within the software along with a record of
`
`e e
`
`19
`
`
`Page 00019
`
`

`
`
`
`the remaining time or number of uses. After the lease expires, the software is
`
`rendered unusable or even erased from the disk. [See Ex. 1006 (Chernow) at 4:64-
`
`5:19.] Given that the software described in Chernow becomes unusable at the
`
`conclusion of the leased use, a person of ordinary skill in the art would have
`
`appreciated the need to provide an appropriate warning prior to lease expiration
`
`particularly in light of Smith discussed below.
`
`29. The electronic sale of audio and video data was also known. For
`
`example, in 1997, United States Patent No. 5,675,7343 (“Hair”) described a system
`
`and method for the sale and transmission of audio and video signals. [See, e.g.,
`
`Ex. 1007 (Hair) at Abstract.] The audio and/or data signals are stored on the
`
`system of the seller. [See, e.g., Ex. 1007 (Hair) at 4:8-12.] A buyer can purchase
`
`audio or video signals, transfer these signals over telephone lines, and store the
`
`signals on the buyer’s system. [See, e.g., Ex. 1007 (Hair) at 3:56-4:61, Fig. 1.]
`
`The buyer can then play the audio or video signals stored on the buyer’s system.
`
`
`3 United States Patent No. 5,675,734 to Hair, titled “System for transmitting
`
`desired digital video or audio signals,” was filed February 27, 1996, and issued
`
`October 7, 1997; claiming priority to application 586,391, which was filed
`
`September 18, 1990.
`
`e e
`
`20
`
`
`Page 00020
`
`

`
`
`
`[See Ex. 1007 (Hair) at 4:66-5:16, 7:54-8:14.] Hair describes that the payment is
`
`sent before the audio or video is downloaded. [See Ex. 1007 (Hair) at Abstract,
`
`5:44-56.]
`
`30.
`
`It was also well-known to protect digital content that was
`
`electronically distributed. For example, U.S. Patent Nos. 5,530,235 and 5,629,9804
`
`(collectively “Stefik”) described a system for controlling the distribution and/or
`
`use of digital works, including audio and video. [See, e.g., Ex. 1012 (’235 patent)
`
`at 2:47-61, 4:21-31, 4:47-50; Ex. 1013 (’980 patent) at Abstract, 6:36-41.] Stefik
`
`stores the digital works in repositories, which control access to the works, and
`
`permanently attaches usage rights to the digital works.
`
`“A key feature of the present invention is that usage rights are
`
`permanently ‘attached’ to the digital work. Copies made of a digital
`
`work will also have usage rights attached. Thus, the usage rights and
`
`
`4 United States Patent No. 5,530,235 to Stefik et al., titled “Interactive contents
`
`revealing storage device,” was filed on February 16, 1995 and issued June 25,
`
`1996. United States Patent No. 5,629,980 to Stefik et al., titled “System for
`
`controlling the distribution and use of digital works,” was filed on November 23,
`
`1994 and issued May 13, 1997.
`
`e e
`
`21
`
`
`Page 00021
`
`

`
`
`
`any associated fees assigned by a creator and subsequent distributor
`
`will always remain with a digital work.
`
`The enforcement elements of the present invention are embodied in
`
`repositories. Among other things, repositories are used to store digital
`
`works, control access to digital works, bill for access to digital works
`
`and maintain the security and integrity of the system.” [See Ex. 1013
`
`(’980 patent) at 6:51-61.]
`
`Consequently, when a repository (Repository 2) needs to access a digital work in a
`
`different repository (Repository 1), each repository ensures that the other is
`
`trustworthy and then Repository 1 checks the usage rights attached to the digital
`
`work. Stefik discloses a number of conditions that may be part of this check
`
`including time-based conditions (e.g., a loan period), security conditions,
`
`conditions on number of allowed uses, and fee-based conditions. If access is
`
`granted, then the digital work is transmitted from Repository 1 to Repository 2 and
`
`both repositories generate billing information. [See, e.g., Ex. 1013 (’980 patent) at
`
`7:6-37, 31:23-32:43; Figs. 1, 8.] Similarly, when the user wishes to render a digital
`
`work, the repository first determines if the usage rights attached to the digital work
`
`allow the requested access. [See, e.g., Ex. 1013 (’980 patent) at 8:23-31, 19:12-32,
`
`19:46-57.] One example of a repository is a DocuCard, which is a transportable
`
`device implemented as a PCMCIA card. The components of the DocuCard are a
`
`controller module (including a microprocessor or microcontroller, a clock and
`
`e e
`
`22
`
`
`Page 00022
`
`

`
`
`
`memory for storing code), an external interface and a storage subsystem. [See,
`
`e.g., Ex. 1012 (’235 patent) at 2:29-61, 4:54-5:12, 5:31-21; Fig. 2.] A DocuCard
`
`(or other repository) may also include an integrated credit server for the recording
`
`a reporting of fees. [See, e.g., Ex. 1012 (’235 patent) at 6:22-24; Ex. 1013 (’980
`
`patent) at 17:34-42.] The user accesses the DocuCard (or a repository in general)
`
`by performing a login transaction:
`
`“A Login transaction is the process by which a user logs onto a
`
`repository, typically by entering a Personal Identification Number
`
`(PIN). In this case, the user of the DocuCard is logging onto the
`
`DocuCard. This logging in process may also activate credit accounts.”
`
`[See Ex. 1012 (’235 patent) at 6:61-65.]
`
`A person of skill in the art would have understood that the PIN could be stored in
`
`memory. The user can then specify the account to be charged for using the digital
`
`works on the DocuCard. Finally, the user selects the desired digital work and the
`
`function to be performed on that work (e.g., copy or play). The usage rights
`
`attached to the document determine whether the user can access the digital work in
`
`the specified way. [See, e.g., Ex. 1012 (’235 patent) at 2:47-61, 6:60-7:13; Fig. 3.]
`
`Stefik also discloses a “demo version” scenario, in which a user can access a
`
`limited version of the work for free but can only access the full-functionality after
`
`paying a fee to purchase. [See, e.g., Ex. 1013 (’980 patent) at 46:43-61.]
`
`e e
`
`23
`
`
`Page 00023
`
`

`
`
`
`31. The repositories charge for use of the digital works based on fee
`
`specifications coded in the usage rights attached to the content. Fees can be
`
`charged per use, per amount of time, etc. The fee specifications also allow
`
`incentives or best price features that accommodate discounts for preferred
`
`customers, special deals and rebates (e.g., supplementary data or reward data).
`
`[See, e.g., Ex. 1013 (’980 patent) at 17:8-17, 23:45-25:8.] A person having
`
`ordinary skill in the art would have also understood that these incentives or best
`
`price features could be modified in response to other data. The repositories
`
`distribute proceeds for selling the digital works in accordance with the usage
`
`rights. Several scenarios are discussed including using unpaid distributors (fees
`
`paid to creator), allowing anyone to redistribute digital works (fees paid to content
`
`creator and distributor), using licensed distributors (fees paid to content creator and
`
`licensed distributor), and many multi-tiered arrangements (fees paid to content
`
`creator and one or more entities in the distribution chain). [See, e.g., Ex. 1013
`
`(’980 patent) at 43:45-45:63.] Credit servers and billing clearinghouses are used
`
`for authorizing, recording and clearing payments, which requires various billing
`
`transactions between repositories and credit servers, and between credit servers and
`
`billing clearinghouses. [See, e.g., Ex. 1013 (’980 patent) at 17:1-61, 29:57-30:35;
`
`Fig. 3.]
`
`e e
`
`24
`
`
`Page 00024
`
`

`
`
`
`32. The storage system of a repository comprises descriptor storage and
`
`content storage, which need not be the same physical storage devices. [See, e.g.,
`
`Ex. 1013 (’980 patent) at 14:28-39.] Each descriptor block in the descriptor
`
`storage includes the identifier for the associated digital work and a pointer to the
`
`location of the digital work in content storage. [See, e.g., Ex. 1013 (’980 patent) at
`
`9:54-66; Fig. 7.] A person having ordinary skill in the art would have understood
`
`that the pointer can also be a URL, particularly in light of Ginter discussed below.
`
`33. The usage rights attached to a digital work may include a “next set of
`
`rights” that can be used to change the usage rights as the work is moved
`
`(transferred, copied, loaned) to another repository. [See, e.g., Ex. 1013 (’980
`
`patent) at 11:40-44, 19:14-15, 19:58-20:2, 20:55-67; Fig. 15.] In addition, like the
`
`claimed synthesis code, the usage rights may allow the user to extract a portion of
`
`a digital work to create a new work; embed a first digital work into a second digital
`
`work; and to edit the contents of a digital work. These features support the
`
`creation of a composite digital work: “A digital work comprised of distinguishable
`
`parts. Each of the distinguishable parts is itself a digital work which have [sic]
`
`usage rights attached.” [See, e.g., Ex. 1013 (’980 patent) at 6:39-43, 39:56-41:39,
`
`50:41-44.]
`
`e e
`
`25
`
`
`Page 00025
`
`

`
`
`
`34

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket