throbber
Covered Business Method Patent Review
`United States Patent No. 8,794,516
`
`IN THE UNITED STATES PATENT AND TRADEMARK OFFICE
`
`Petitioner: Apple Inc.
`
`Attorney Docket No.:
`
` 104677-5008-832
`Customer No. 28120
`

`Inventor: Racz et al.
`United States Patent No.: 8,794,516 §
`Formerly Application No.: 13/438,754 §
`Issue Date: August 5, 2014

`Filing Date: April 3, 2012

`Former Group Art Unit: 2887

`Former Examiner: Thien Minh Le

`
`For: Data Storage and Access Systems
`
`MAIL STOP PATENT BOARD
`Patent Trial and Appeal Board
`United States Patent and Trademark Office
`Post Office Box 1450
`Alexandria, Virginia 22313-1450
`
`PETITION FOR COVERED BUSINESS METHOD PATENT REVIEW OF
`UNITED STATES PATENT NO. 8,794,516 PURSUANT TO 35 U.S.C.
`§ 321, 37 C.F.R. § 42.304
`
`
`
`

`

` Covered Business Method Patent Review
`United States Patent No. 8,794,516
`
`
`
`
`TABLE OF CONTENTS
`
`INTRODUCTION ....................................................................................................... 1
`I.
`II. OVERVIEW OF FIELD OF THE CLAIMED INVENTION ......................... 5
`III. OVERVIEW OF THE CHALLENGED CLAIMS ............................................ 18
`IV. PETITIONER HAS STANDING .......................................................................... 23
`A.
`The ’516 Patent Is A Covered Business Method (“CBM”) Patent .......... 23
`B.
`Related Matters And Mandatory Notice Information; Petitioner Is A
`Real Party In Interest Sued For And Charged With Infringement .......... 36
`V. DETAILED EXPLANATION OF REASONS FOR RELIEF REQUESTED,
`SHOWING IT IS MORE LIKELY THAN NOT THAT AT LEAST ONE
`CHALLENGED CLAIM IS UNPATENTABLE ............................................... 37
`A.
`Claim Construction .......................................................................................... 37
`B.
`The Challenged Claims Are Unpatentable Under 35 U.S.C. § 101 .......... 41
`C.
`Claims 1-4 Lack Written Description And Are Unpatentable Under §
`112 ...................................................................................................................... 77
`VI. CONCLUSION........................................................................................................... 79
`
`
`
`ii
`
`

`

` Covered Business Method Patent Review
`United States Patent No. 8,794,516
`
`
`
`EXHIBIT LIST
`1001
`U.S. Patent No. 8,794,516
`
`1002
`
`1003
`
`1004
`
`1005
`
`1006
`
`1007
`
`1008
`
`1009
`
`1010
`
`1011
`
`1012
`
`1013
`
`1014
`
`1015
`
`1016
`
`1017
`
`1018
`
`1019
`
`1020
`
`Plaintiffs’ First Amended Complaint
`
`U.S. Patent No. 5,925,127
`
`U.S. Patent No. 5,940,805
`File History for U.S. Patent No. 7,334,720
`
`U.S. Patent No. 4,999,806
`
`U.S. Patent No. 5,675,734
`
`U.S. Patent No. 4,878,245
`
`File History for U.S. Patent No. 8,794,516
`
`U.S. Patent No. 7,942,317
`
`U.S. Patent No. 5,103,392
`
`U.S. Patent No. 5,530,235
`
`U.S. Patent No. 5,629,980
`
`U.S. Patent No. 5,915,019
`
`European Patent Application, Publication No. EP0809221A2
`
`International Application Publication No. WO 99/43136
`
`JP Patent Application Publication No. H11-164058 (translation)
`
`Eberhard von Faber, Robert Hammelrath, and Franz-Peter Heider,
`“The Secure Distribution of Digital Contents,” IEEE (1997)
`Declaration of John P. J. Kelly In Support of Apple Inc.’s Petition for
`Covered Business Method Patent Review
`U.S. Patent No. 8,033,458
`
`iii
`
`

`

` Covered Business Method Patent Review
`United States Patent No. 8,794,516
`
`
`EXHIBIT LIST
`Declaration of Michael P. Duffey In Support of Apple Inc.’s Petition
`1021
`for Covered Business Method Patent Review
`Declaration of Megan F. Raymond In Support of Apple Inc.’s Peti-
`tion for Covered Business Method Patent Review
`Claim Construction Memorandum Opinion from Smartflash LLC v.
`Apple Inc., No. 6:13-cv-447 (Dkt. 229)
`File History for U.S. Patent No. 8,061,598
`
`1022
`
`1023
`
`1024
`
`1025
`
`1026
`
`1027
`
`1028
`
`1029
`
`1030
`
`1031
`
`1032
`
`1033
`
`1034
`
`1035
`
`1036
`
`1037
`
`1038
`
`1039
`
`1040
`
`U.S. Patent No. 4,337,483
`
`U.S. Patent No. 7,725,375
`
`International Publication No. WO 95/34857
`
`JP Patent Application Publication No. H10-269289 (translation)
`
`File History for U.S. Patent No. 7,942,317
`
`File History for U.S. Patent No. 8,033,458
`
`U.S. Patent No. 8,061,598
`
`U.S. Patent No. 8,118,221
`
`File History for U.S. Patent No. 8,118,221
`
`U.S. Patent No. 8,336,772
`
`File History for U.S. Patent No. 8,336,772
`
`U.S. Patent No. 5,646,992
`
`U.S. Patent No. 5,903,721
`
`International Publication No. WO99/13398
`
`U.S. Patent No. 5,761,485
`
`Rakesh Mohan, John R. Smith and Chung-Sheng Li , “Adapting Mul-
`timedia Internet Content for Universal Access” IEEE (March 1999)
`
`iv
`
`

`

` Covered Business Method Patent Review
`United States Patent No. 8,794,516
`
`
`EXHIBIT LIST
`1041
`U.S. Patent No. 5,953,005
`
`1042
`
`1043
`
`1044
`
`1045
`
`1046
`
`Plaintiffs’ Complaint for Patent Infringement, Smartflash LLC, et al. v.
`Apple Inc., Civil Action No. 6:15-cv-145
`U.S. Patent No. 7,334,720
`
`Apr. 8-9, 2015 Deposition Transcript of Jonathan Katz, CBM2014-
`00102/106/108/112
`J. Taylor, “DVD-Video: Multimedia for the Masses,” IEEE Multime-
`dia, Vol. 6, No. 3, July-September 1999, pp. 86-92
`Excerpt of Transcript of Trial Afternoon Session, February 16, 2015
`from Smartflash LLC v. Apple Inc., No. 6:13-cv-447
`
`v
`
`

`

` Covered Business Method Patent Review
`United States Patent No. 8,794,516
`
`I.
`
`INTRODUCTION
`
`Pursuant to § 321 and Rule § 42.304,1 the undersigned, on behalf of and acting
`
`in a representative capacity for Apple Inc. (“Petitioner”), petitions for review under
`
`the transitional program for covered business method patents of claims 1-28 (“chal-
`
`lenged claims”) of U.S. Pat. No. 8,794,516 (“the ’516 Patent” or “’516”), issued to
`
`Smartflash Technologies Limited and assigned to Smartflash LLC (“Patent Owner”).
`
`Petitioner asserts it is more likely than not that the challenged claims are unpatentable
`
`for the reasons herein and requests review of, and judgment against, claims 1-28 un-
`
`der § 101, and claims 1-4 under § 112, ¶ 1, as being unpatentable.
`
`The challenged claims are merely directed to steps and corresponding systems
`
`well-known in the field of data storage and access, including a “handheld multimedia
`
`terminal,” a “content data supply server for providing an item of multimedia content
`
`to a handheld multimedia terminal,” and “a computer system for providing multime-
`
`dia data items to a handheld multimedia terminal.” See Ex. 1001 cls. 1-28; 4:7-8, 6:45-
`
`47, 6:62-64, 13:30-31, 16:6-8, 16:47-52. And in fact, the ’516 Patent states that “[t]he
`
`physical embodiment of the system is not critical and a skilled person will understand
`
`that the terminals, data processing systems and the like can all take a variety of
`
`forms.” See, e.g., id. Fig 1; 12:37-40.
`
`Claim 14, for example, recites five rudimentary steps—(A) receiving a request
`
`
`1 All section cites herein are to 35 U.S.C. or 37 C.F.R., as the context indicates.
`
`
`
`

`

` Covered Business Method Patent Review
`United States Patent No. 8,794,516
`
`for identifier data; (B) retrieving the identifier data; (C) transmitting the identifier
`
`data; (D) receiving payment validation data; and (E) retrieving and transmitting the
`
`item of multimedia content in response to payment validation data. Claim 14 provides:
`
`14. A method of providing an item of multimedia content to a handheld mul-
`timedia terminal, the method comprising:
`[A] receiving a request from the handheld multimedia terminal for identifier
`data identifying one or more items of multimedia content data available to the
`handheld multimedia terminal;
`[B] retrieving the identifier data from a data store;
`[C] transmitting the identifier data to the handheld multimedia terminal;
`[D] receiving payment validation data validating a user purchase of an item of
`multimedia content; and
`[E] responsive to the payment validation data validating the user purchase, re-
`trieving the purchased item of multimedia content data from a multimedia
`content store and transmitting the purchased item of multimedia content to
`the handheld multimedia terminal.
`Ex. 1001 cl. 14. 2 But at the patent’s earliest claimed priority date, these simple ele-
`
`ments and their combination were well known. See Section II; Ex. 1019 ¶¶ 82-86,
`
`§ VI.3 The patent acknowledges that the idea of providing access to data in exchange
`
`
`2 All emphasis herein added unless otherwise noted.
`
`3 In further support of the Petitioner’s grounds, the Declaration of technical expert
`
`John P.J. Kelly, Ph.D., is attached as Exhibit 1019. Dr. Kelly qualifies as a person of
`
`ordinary skill in the art (Ex. 1019 §§ I, III) and has analyzed whether the challenged
`
`2
`
`

`

` Covered Business Method Patent Review
`United States Patent No. 8,794,516
`
`for a payment (e.g., purchase of music on a CD) was already well known, as were e-
`
`payment systems. E.g., Ex. 1001 5:13-16 (“the purchase outright option may be equiv-
`
`alent to the purchase of a compact disc (CD)”); 8:26-30; 9:1-11; 13:43-63. It is thus no sur-
`
`prise that the prior art was teeming with disclosures of this basic concept and its
`
`straightforward implementation in physical systems. See, e.g., Section II.
`
`Moreover, as its language makes clear, claim 14 involves no “technology” at all
`
`other than, at most, a “handheld multimedia terminal” and a “data store”—both of
`
`which were well known and entirely commonplace at the time. E.g., Ex. 1001 3:39-40,
`
`8:64-66, 11:34-50, 13:43-58, 14:1-2, 17:15-18:13, 18:28, Figures 2, 9; Ex. 1014 Figures
`
`71, 228:36-44; Ex. 1039 Figures 1, 4:34-39, 5:47-53, 6:22-7:15, 9:39-67; Ex. 1015 Fig-
`
`ures 3A-B, 6:37-7:39; Ex. 1016 2-3, 5-6; Ex. 1017 ¶¶ 5-6; Ex. 1013 Figures 12, 14:28-
`
`36, Ex. 1019 ¶¶ 82-86, § VI. Thus, as the intrinsic record reflects, claim 14 recites
`
`nothing more than a method for retrieving and transmitting data from a data store
`
`while receiving and responding to payment validation.
`
`The other challenged claims are nothing but variations on this same simple and
`
`well-known theme, with the addition of, in other challenged claims, equally generic
`
`components (e.g., handheld multimedia terminals with wireless interfaces, non-volatile
`
`memories, program stores, processors, displays, and code; content data supply servers
`
`claims are unpatentable based on the grounds in this petition (Ex. 1019 §§ I-II and
`
`IV-VIII).
`
`3
`
`

`

` Covered Business Method Patent Review
`United States Patent No. 8,794,516
`
`with communications interfaces, program stores, data stores, multimedia content
`
`stores, processors, and code; computer systems with communications interfaces, data
`
`stores, program stores, processors, and code) and steps. E.g., Ex. 1001 12:37-40 (“The
`
`physical embodiment of the system is not critical and a skilled person will understand that the termi-
`
`nals, data processing systems and the like can all take a variety of forms.”), Figure 4b.
`
`As confirmed in Alice Corp. Pty, Ltd. v. CLS Bank Int’l, 134 S. Ct. 2347 (2014),
`
`the challenged claims are directed to patent-ineligible subject matter under § 101. As
`
`the Board has noted in connection with similar claims of related patents, “the . . . pa-
`
`tent makes clear that the asserted novelty of the invention is not in any specific im-
`
`provement of software or hardware, but in the method of controlling access to data.”
`
`CBM2014-00110, Pap. 7, at 13; see also CBM2014-00102/103, Pap. 8; 11; CBM2014-
`
`00104, Pap. 9, 12; CBM2014-00106, Pap. 8, 12; CBM2014-00108, Pap. 8, 10;
`
`CBM2014-00112, Pap. 8, at 11; CBM2014-00190, Pap. 9, 10; CBM2014-00192, Pap. 7,
`
`10-11; CBM2014-00194, Pap. 9, 10-11; CBM2015-00015, Pap. 23, 14; CBM2015-
`
`00016, Pap. 23, 15. Further, the challenged claims are directed to nothing more than
`
`the unpatentable abstract idea of payment for and controlling access to data, with at
`
`most the addition of well-known, routine and conventional features—in particular,
`
`generic computer implementation that cannot confer patentability on these patent-
`
`ineligible abstractions. See, e.g., Alice, 134 S. Ct. at 2359-60. In summary, each chal-
`
`lenged claim recites ineligible subject matter and is thus unpatentable. Further, claim 1
`
`4
`
`

`

`(and thus, dependent claims 2-4) lacks a proper written description under § 112.
`
` Covered Business Method Patent Review
`United States Patent No. 8,794,516
`
`
`II. OVERVIEW OF FIELD OF THE CLAIMED INVENTION
`By October 25, 1999, the sale, distribution, and protection of digital content
`
`were well-known to a person of ordinary skill (“POSA”).4 See, e.g., Ex. 1019 ¶¶ 23-25,
`
`29-30, 46, 75. A POSA would have been aware of computer-based systems for
`
`providing digital content, including software, audio, and video content, for a fee. See,
`
`e.g., id. ¶¶ 25-30, 34, 43, 46, 48-50, 53-56, 58, 61, 75; see also Ex. 1044 14:21-15:15,
`
`16:6-17:9; Ex. 1008 at 4:27-35, 6:49-7:6.5 Such systems included servers, computers, e-
`
`payment systems, and user devices connected over known wired and wireless com-
`
`munications networks to distribute content from content owners to users. See, e.g., Ex.
`
`1019 ¶¶ 23-25, 29, 30, 34-38, 43-46, 48, 71-73, 75. Ex. 1044 19:3-18; see also Ex. 1025
`
`
`4 All references to a POSA refer to the knowledge or understanding of a person of
`
`ordinary skill in the art as of October 25, 1999, unless specifically noted. A POSA
`
`would have at least a B.S. in E.E., computer science or a telecommunications related
`
`field, and at least three years of industry experience that included client-server
`
`data/information distribution and management architectures. See Ex. 1019 ¶¶ 15-17.
`
` Exhibit 1044 is April 8-9, 2015 Deposition Transcript of Jonathan Katz, Patent
`
` 5
`
`Owner’s expert, for CBM2014-00102/106/108/112 regarding related patents in the
`
`same family as the ’516 Patent (see Section IV.B infra describing related matters).
`
`5
`
`

`

`at Figure 1, 9:50-68.
`
` Covered Business Method Patent Review
`United States Patent No. 8,794,516
`
`
`Indeed, the ’516 Patent explains that the physical embodiment of the system is
`
`“not critical and a skilled person will understand that the terminals, data processing
`
`systems and the like can all take a variety of forms.” Ex. 1001 12:34-40. For example,
`
`the patent concedes that various claimed components and functionalities were con-
`
`ventional and well-known in the art (see Ex. 1019 ¶ 22), such as:
`
` Internet users paying for goods and/or services by credit card transaction (id.
`
`2:21-22; 19:13-17)
`
` Encrypting/decrypting content for security (id. 3:1-11)
`
` Data access terminal or content access terminal hardware: “conventional com-
`
`puter” or “mobile phone,” “home personal computer,” “mobile communica-
`
`tions device,” “set top box” (id. 4:7-8, 16:4-13)
`
` WAP and i-mode allowing mobile phones to access the Internet and download
`
`data (id. 4:8-12)
`
` SIM cards including a user identification means (id. 4:12-16)
`
` Non-volatile memory, including EEPROM, Flash memory, optical memory (id.
`
`4:45-51, 17:31-38)
`
` Purchasing digital music equivalent to the purchase of a CD (id. 5:13-16)
`
` Data carrier hardware: “IC card,” “smart card,” “memory stick,” “standard
`
`6
`
`

`

` Covered Business Method Patent Review
`United States Patent No. 8,794,516
`
`
`smart card” (id. 6:32-34, 11:34-37, 17:17-38)
`
` Electronics Point of Sale Systems (EPoSS) functionality for smart cards (id.
`
`11:43-47)
`
` E-payment systems and standards (id. 13:43-46)
`
` Data access terminal as a “general purpose computer” with standard compo-
`
`nents (id. Figure 8, 16:40-62)
`
` Data access device hardware: “portable audio/video player,” “conventional
`
`dedicated computer system” with standard components (id. 18:14-34)
`
` Use control routines including digital watermarking and content protection
`
`from the SDMI specification (id. 18:37-43)
`
` “Standard transmission protocols” used to transmit content data items (id.
`
`21:53-56)
`
` Communication network, whose detailed implementation is “not essential,”
`
`and can be the “Internet,” “web-based technology,” “any electronic communi-
`
`cations network,” “wide area network,” “local area network,” “wireless net-
`
`work,” “conventional land line network,” “extranet” (id. 25:51-58)
`
`In addition, a POSA would have known, for example, multiple systems for sell-
`
`ing and distributing digital content to remote user devices. See Ex. 1044 14:21-15:15,
`
`16:6-17:9; see, e.g., Ex. 1019 ¶¶ 25-30, 34-44, 48-50, 53-54, 61, 64-65, 67-69. For exam-
`
`7
`
`

`

` Covered Business Method Patent Review
`United States Patent No. 8,794,516
`
`ple, U.S. Patent No. 5,675,734 (“Hair,” published October 7, 1997) disclosed a system
`
`for selling digital video or audio content. Ex. 1007 Abstract. Hair described a distribu-
`
`tion system that transmits digital video or audio signals stored on a first memory be-
`
`longing to a first party to a second memory belonging to a second party for a fee. Id.
`
`5:41-44. In a first step, money is transferred from the second party to the first party
`
`via telecommunications line for an electronic sale. Id. 5:44-47. Then, the memory of
`
`the second party is connected to the memory of the first party over a telecommunica-
`
`tions line, and the digital or audio signals are transmitted from the first memory to the
`
`second memory. Id. 5:47-56. See, e.g., Ex. 1019 ¶ 29.
`
`U.S. Patent No. 4,999,806 (“Chernow,” published March 12, 1991) also dis-
`
`closed a system for digital content sales. Chernow described a software distribution
`
`system in which a seller computer communicates with buyers over a telephone line for
`
`the buyers to browse through software products available from the remote seller
`
`computer for leasing or purchasing. Ex. 1006 2:22-36. The seller computer answers
`
`calls from buyers, verifies credit card information, transmits purchased software to
`
`buyers, and performs accounting functions to ensure proper billing and record keep-
`
`ing. Id. 2:37-47. A POSA would have understood that delivery of the purchased con-
`
`tent could be conditioned on successful payment, as the system described in Chernow
`
`ensures that the customer is able to pay for the purchase, for example by verifying
`
`credit card approval for the sale amount, before providing requested software. Id.
`
`8
`
`

`

` Covered Business Method Patent Review
`United States Patent No. 8,794,516
`
`6:48-65; 7:53-63; see also Ex. 1044 24:2-11, 27:4-9. A POSA also would have appreciat-
`
`ed the need to limit leased software to a period of time or a number of runs, in view
`
`of Chernow’s description of software that renders itself unusable or erases itself at the
`
`conclusion of the leased use. Ex. 1006 5:10-18. See, e.g., Ex. 1019 ¶¶ 25-28.
`
`A POSA would have known that a central vending system could be used to
`
`provide multiple vendors with a mechanism to market, distribute, and receive pay-
`
`ment for electronic data, as described for example in EP Patent Application Publica-
`
`tion No. 0809221 (“Poggio,” published November 26, 1997). Ex. 1015 Figure 1; 2:32-
`
`36; see also Ex. 1044 9:3-18. Poggio described a vending machine that manages distri-
`
`bution of electronic data on a variety of license terms by providing information about
`
`the products for a purchaser to browse, obtaining payment for a product, and distrib-
`
`uting purchased products to users’ computers. Ex. 1015 4:35-49. The vending ma-
`
`chine includes a library of vendor products with a vending information database that
`
`maintains product information for each vendor product, including product identifiers,
`
`pointers to the products in the library, and information identifying the particular ven-
`
`dor and category of the product. Id. Figure 3, 6:37-7:39. The vending machine also in-
`
`cludes “a digital cash interface 116 for obtaining point-of-sale electronic payment for
`
`the license fee associated with a particular vendor product.” Id. Figure 1, 6:13-16. The
`
`digital cash interface confirms successful payment of the required license fee with an
`
`electronic banking network before the virtual vending machine provides a product to
`
`9
`
`

`

`a user. Id. Figure 7, 10:7-20. See, e.g., Ex. 1019 ¶¶ 34-42.
`
` Covered Business Method Patent Review
`United States Patent No. 8,794,516
`
`
`Poggio disclosed a variety of existing payment schemes for purchasing a vendor
`
`product that would have been known to a POSA, including “credit card payment
`
`transactions,” “digital cash,” “debit transactions,” and “electronic funds transfer.” Ex.
`
`1015 6:25-36. Poggio also disclosed payment methods in which payment information
`
`is sent directly to an e-payment system instead of to the virtual vending machine, with
`
`the e-payment system forwarding a confirmation that the payment has been made to
`
`the vending machine. Ex. 1015 10:41-53. A POSA would have also known additional
`
`methods for executing electronic payments beyond those explicitly discussed in
`
`Poggio. See Ex. 1044 16:6-19:2. For example, U.S. Patent No. 5,903,721 (“Sixtus,”
`
`published May 11, 1999) disclosed an electronic payment system in which a “user’s
`
`credit card number or other like sensitive information is not transmitted between enti-
`
`ties as part of the transaction approval process.” Ex. 1037 7:37-40. The system instead
`
`securely registers a user’s payment information, such as a credit card, in an initial
`
`transaction and then later uses that information for checking credit approval without
`
`requiring the user to transmit the sensitive payment information. Id. 7:40-53; 8:21-31.
`
`The user sends only user identification information that is used to locate and check the regis-
`
`tered payment information. Id. 10:19-31. See, e.g., Ex. 1019 ¶¶ 64-65.
`
`In addition to systems for providing purchased content to users from remote
`
`stores, a POSA would have also been aware of systems allowing users to purchase
`
`10
`
`

`

` Covered Business Method Patent Review
`United States Patent No. 8,794,516
`
`content that is locally stored, but not yet accessible, on the user’s computer or on a
`
`secondary storage device in the user’s possession. For example, The Secure Distribu-
`
`tion of Digital Contents (“von Faber,” published 1997) disclosed a “system for distri-
`
`bution of encrypted digital contents via freely accessible distribution media.” Ex. 1018
`
`Abstract. A POSA would have appreciated the importance of ensuring that goods
`
`were paid for, as von Faber acknowledged the need to “couple the use of the provid-
`
`ed digital goods with a prior payment for the goods in a way which cannot be by-
`
`passed.” Id. 7; see also Ex. 1044 27:4-9. The solution proposed by von Faber was to
`
`freely distribute encrypted digital contents and focus on key management, to “have
`
`the customer pay for the key which he needs to transform the encrypted content in an
`
`usable form.” Ex. 1018 at 7. The content in such a distribution scheme is in the user’s
`
`possession before any purchase, but the decryption key required to gain access to the
`
`digital content is sent to a customer only after it is “guaranteed that payment has been
`
`authorised.” Id. 8. See, e.g., Ex. 1019 ¶¶ 43-47. International Application Publication
`
`No. WO99/13398 (“Peterson,” published March 18, 1999) also disclosed a system for
`
`purchasing access to locally-stored content. As in claims 1-4 of the ’516 Patent, Peter-
`
`son disclosed a digital content vending machine run on a personal computer that al-
`
`lows a user to purchase products from inventory stored either in a hard drive of the
`
`computer or on removable media, such as a CD, DVD, or tape in the user’s posses-
`
`sion. Ex. 1038 Abstract, 8:11-15. The digital assets stored in the inventory “are pro-
`
`11
`
`

`

` Covered Business Method Patent Review
`United States Patent No. 8,794,516
`
`tected from unauthorized use by a digital wrapper requiring at least one key for un-
`
`wrapping.” Id. 4:14-16. The vending software displays information about the invento-
`
`ry to the user for browsing and selecting a product, then “transmits money represent-
`
`ing payment for the selection and an identifier for it to the clearing house, which
`
`transmits back to the client a key associated with the selected asset.” Id. 4:18-20; see
`
`also 9:18-10:6. The data displayed to a user in the browsing interface includes adver-
`
`tisements and Internet links. Id. 15:24-29. The keys in Peterson provide security for
`
`the content, including “protecting the asset 22 once it has been paid for” and “sup-
`
`press[ing] unauthorized copying of [vendors’] intellectual property.” Id. 10:17-23. See,
`
`e.g., Ex. 1019 ¶¶ 46-47.
`
`A POSA would have appreciated that the available systems for providing pur-
`
`chased digital content to users, or for allowing users to access local content after a
`
`purchase was completed, could be implemented on a wide array of user devices. In
`
`addition to well-known personal computers, a POSA would have been familiar with
`
`mobile and handheld devices, for example devices the size of a book, for accessing
`
`such content, as disclosed for example in U.S. Patent No. 5,761,485 (“Munyan,” pub-
`
`lished June 2, 1998). Munyan disclosed a handheld “Personal Electronic Book” device
`
`including a cellular modem or other high-speed modem for wireless communication.
`
`Ex. 1039 Figure 1; 5:47-50; 6:41-45; 7:49-52. The device allows a user to “initiate and
`
`establish communications with the remote bookstore’s database library and services”
`
`12
`
`

`

`to locate and download content. Id. 7:33-42; 8:1-13. The bookstore is “an on-line elec-
`
` Covered Business Method Patent Review
`United States Patent No. 8,794,516
`
`
`tronic archive of multimedia products” that the user browses to select products, to
`
`buy licenses to use the products, and to download the products to the personal device.
`
`Id. 9:39-54. See, e.g., Ex. 1019 ¶¶ 71-73.
`
`A POSA also would have known that content could be provided to, and played
`
`on, mobile phones, for example mobile phones disclosed in Japanese Patent Applica-
`
`tion Publication No. H11-164058 (“Sato,” published June 18, 1999). Sato disclosed a
`
`mobile phone connected to a music distribution center server via “a wireless public
`
`communications network.” Ex. 1017 Figure 1, Abstract, ¶ 3. The mobile phone in-
`
`cludes, among other components, “a transmitting and receiving control unit, a trans-
`
`mitter and a receiver, a radio wave transmitting and receiving control unit, [and] an
`
`antenna” for communication with the distribution center. Id. ¶ 4. Using the phone, a
`
`user accesses a distribution center, enters a song selection, and receives the selected
`
`music on the mobile phone. Id. ¶¶ 12, 14. Sato also discloses performing a billing pro-
`
`cess after transmission from the distribution center. Id. ¶ 15. In order to provide mul-
`
`timedia data to diverse client devices, including handheld devices and cellular phones,
`
`a POSA would have recognized a need to address the different capabilities of the di-
`
`verse platforms to which content is being delivered, as disclosed in Adapting Multi-
`
`media Internet Content for Universal Access (“Mohan,” published March 1999). Ex.
`
`1040 Abstract. A POSA would have understood multiple approaches to adapting mul-
`
`13
`
`

`

` Covered Business Method Patent Review
`United States Patent No. 8,794,516
`
`timedia to optimally match the resources and capabilities of diverse clients, for exam-
`
`ple using known compression and transcoding techniques. Ex.1040 1-2. See, e.g., Ex.
`
`1019 ¶¶ 66, 73.
`
`A POSA also would have known that different product options could be pro-
`
`vided for a buyer to choose from, with different limits on the buyer’s access associat-
`
`ed with each choice. For example, Poggio discloses providing a purchaser with a
`
`choice between purchasing a permanent license for a vendor product or renting the
`
`product with a license limited to rental a time period. Ex. 1015 Figure 6, 9:25-33.
`
`Rented products are “formatted to include a time bomb or other disabling device
`
`which will disable the product at the end of the rental period” before being transmit-
`
`ted to the user. Id. 10:25-28. U.S. Patent No. 5,915,019 (“Ginter,” published June 22,
`
`1999) disclosed a system distributing content with a set of “rules and controls” to
`
`prevent unauthorized use of protected information and specify how much usage is to
`
`be paid for. Ex. 1014 56:25-57:16. See, e.g., Ex. 1019 ¶¶ 34-42, 48-51.
`
`A POSA would have understood that the user’s rights to purchased content
`
`could be “attached” such that the rights and fee specifications remain with the con-
`
`tent, as disclosed in U.S. Patent No. 5,629,980 (“Stefik,” published May 13, 1997). Ex.
`
`1013 6:51-56. Stefik disclosed attaching usage rights to content to “define how that
`
`digital work may be transferred, used, performed, or played.” Id. 19:14-15. Usage
`
`rights also define fee specifications including discounts, incentives paid to users, or
`
`14
`
`

`

` Covered Business Method Patent Review
`United States Patent No. 8,794,516
`
`best price specifications that “accommodate special deals, rebates, and pricing that
`
`depends on information that is not available to the repository.” Id. 23:60-24:25, 24:34-
`
`57. The fee specifications “can be combined with tickets or authorizations that could
`
`indicate that the consumer is a wholesaler or that he is a preferred customer” in which
`
`case when the transaction is reconciled “any excess amount will be returned to the
`
`consumer in a separate transaction.” Id. 24:39-47. Stefik also disclosed a digital work
`
`having multiple versions of a right attached with different prices, such that a purchas-
`
`er may choose which option best fits the rights he or she needs. Id. 18:9-16. A POSA
`
`would have known that a user could also be provided with an option to specify the
`
`extent of utilization needed, so only that usage is paid for and the content is released
`
`only to that extent of utilization, as disclosed in U.S. Patent No. 5,940,805 (“Kopp,”
`
`published August 17, 1999). Ex. 1004 2:61-3:2; 5:47-55. See, e.g., Ex. 1019 ¶¶ 30-33,
`
`58-60.
`
`A POSA would have known how to monitor and enforce limits on purchased
`
`or rented content when the amount of allowed content usage was limited. For exam-
`
`ple, a POSA would have known that rented content could be monitored to ensure
`
`that a licensed amount of use time or licensed number of uses is not exceeded, as dis-
`
`closed in U.S. Patent No. 5,925,127 (“Ahmad,” published July 20, 1999). Ex. 1003
`
`2:62-3:19; see also Ex. 1011 at Abstract, 2:52-61, 3:1-24. Ahmad disclosed a monitor
`
`that could be provided from a content server along with content, or could be already
`
`15
`
`

`

` Covered Business Method Patent Review
`United States Patent No. 8,794,516
`
`stored on the user’s computer before the content is purchased. Ex. 1003 Figure 3,
`
`11:4-13. When the user uses the licensed content, the monitor tracks the usage and
`
`ensures that usage is cut off when the licensed amount is reached, for example when
`
`the licensed usage time or number of uses has been expended. Id. Figures 5A-B,
`
`13:65-14:9, 14:20-48. In addition to limiting use with a monitor, a POSA also would
`
`have known that usage could be controlled by providing a user with limited-use de-
`
`cryption keys after authenticating a user, for example by verifying payment data, as
`
`disclosed in U.S. Patent No. 5,953,005 (“Liu,” published September 14, 1999). Ex.
`
`1041 5:9-17. Liu disclosed limiting the key provided to the user to a single use, a pre-
`
`determined number of plays, or a time period, after which the key expires and is no
`
`longer usable. Ex. 1041 5:33-49. See, e.g., Ex. 1019 ¶¶ 56-57, 61.
`
`In addition to the purchased content itself, a POSA would have known that
`
`additional data could be provided to the user along with the content. For example,
`
`Sato disclosed transmitting lyrics and images along with a song that are then displayed
`
`to the user when the song is played. Ex. 1017 ¶¶ 14-15. A POSA also would have un-
`
`derstood that promotional materials, including materials selected based on the charac-
`
`ter of usage exhibited by a particular user, could be included in a container in which
`
`the content is transmitted to an end user, as disclosed in Ginter. Ex. 1014 286:57-
`
`287:6. See, e.g., Ex. 1019 ¶¶ 48, 51, 73.
`
`Ginter also disclosed providing promotional data a

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket