`United States Patent No. 8,794,516
`
`IN THE UNITED STATES PATENT AND TRADEMARK OFFICE
`
`Petitioner: Apple Inc.
`
`Attorney Docket No.:
`
` 104677-5008-832
`Customer No. 28120
`
`§
`Inventor: Racz et al.
`United States Patent No.: 8,794,516 §
`Formerly Application No.: 13/438,754 §
`Issue Date: August 5, 2014
`§
`Filing Date: April 3, 2012
`§
`Former Group Art Unit: 2887
`§
`Former Examiner: Thien Minh Le
`§
`
`For: Data Storage and Access Systems
`
`MAIL STOP PATENT BOARD
`Patent Trial and Appeal Board
`United States Patent and Trademark Office
`Post Office Box 1450
`Alexandria, Virginia 22313-1450
`
`PETITION FOR COVERED BUSINESS METHOD PATENT REVIEW OF
`UNITED STATES PATENT NO. 8,794,516 PURSUANT TO 35 U.S.C.
`§ 321, 37 C.F.R. § 42.304
`
`
`
`
`
` Covered Business Method Patent Review
`United States Patent No. 8,794,516
`
`
`
`
`TABLE OF CONTENTS
`
`INTRODUCTION ....................................................................................................... 1
`I.
`II. OVERVIEW OF FIELD OF THE CLAIMED INVENTION ......................... 5
`III. OVERVIEW OF THE CHALLENGED CLAIMS ............................................ 18
`IV. PETITIONER HAS STANDING .......................................................................... 23
`A.
`The ’516 Patent Is A Covered Business Method (“CBM”) Patent .......... 23
`B.
`Related Matters And Mandatory Notice Information; Petitioner Is A
`Real Party In Interest Sued For And Charged With Infringement .......... 36
`V. DETAILED EXPLANATION OF REASONS FOR RELIEF REQUESTED,
`SHOWING IT IS MORE LIKELY THAN NOT THAT AT LEAST ONE
`CHALLENGED CLAIM IS UNPATENTABLE ............................................... 37
`A.
`Claim Construction .......................................................................................... 37
`B.
`The Challenged Claims Are Unpatentable Under 35 U.S.C. § 101 .......... 41
`C.
`Claims 1-4 Lack Written Description And Are Unpatentable Under §
`112 ...................................................................................................................... 77
`VI. CONCLUSION........................................................................................................... 79
`
`
`
`ii
`
`
`
` Covered Business Method Patent Review
`United States Patent No. 8,794,516
`
`
`
`EXHIBIT LIST
`1001
`U.S. Patent No. 8,794,516
`
`1002
`
`1003
`
`1004
`
`1005
`
`1006
`
`1007
`
`1008
`
`1009
`
`1010
`
`1011
`
`1012
`
`1013
`
`1014
`
`1015
`
`1016
`
`1017
`
`1018
`
`1019
`
`1020
`
`Plaintiffs’ First Amended Complaint
`
`U.S. Patent No. 5,925,127
`
`U.S. Patent No. 5,940,805
`File History for U.S. Patent No. 7,334,720
`
`U.S. Patent No. 4,999,806
`
`U.S. Patent No. 5,675,734
`
`U.S. Patent No. 4,878,245
`
`File History for U.S. Patent No. 8,794,516
`
`U.S. Patent No. 7,942,317
`
`U.S. Patent No. 5,103,392
`
`U.S. Patent No. 5,530,235
`
`U.S. Patent No. 5,629,980
`
`U.S. Patent No. 5,915,019
`
`European Patent Application, Publication No. EP0809221A2
`
`International Application Publication No. WO 99/43136
`
`JP Patent Application Publication No. H11-164058 (translation)
`
`Eberhard von Faber, Robert Hammelrath, and Franz-Peter Heider,
`“The Secure Distribution of Digital Contents,” IEEE (1997)
`Declaration of John P. J. Kelly In Support of Apple Inc.’s Petition for
`Covered Business Method Patent Review
`U.S. Patent No. 8,033,458
`
`iii
`
`
`
` Covered Business Method Patent Review
`United States Patent No. 8,794,516
`
`
`EXHIBIT LIST
`Declaration of Michael P. Duffey In Support of Apple Inc.’s Petition
`1021
`for Covered Business Method Patent Review
`Declaration of Megan F. Raymond In Support of Apple Inc.’s Peti-
`tion for Covered Business Method Patent Review
`Claim Construction Memorandum Opinion from Smartflash LLC v.
`Apple Inc., No. 6:13-cv-447 (Dkt. 229)
`File History for U.S. Patent No. 8,061,598
`
`1022
`
`1023
`
`1024
`
`1025
`
`1026
`
`1027
`
`1028
`
`1029
`
`1030
`
`1031
`
`1032
`
`1033
`
`1034
`
`1035
`
`1036
`
`1037
`
`1038
`
`1039
`
`1040
`
`U.S. Patent No. 4,337,483
`
`U.S. Patent No. 7,725,375
`
`International Publication No. WO 95/34857
`
`JP Patent Application Publication No. H10-269289 (translation)
`
`File History for U.S. Patent No. 7,942,317
`
`File History for U.S. Patent No. 8,033,458
`
`U.S. Patent No. 8,061,598
`
`U.S. Patent No. 8,118,221
`
`File History for U.S. Patent No. 8,118,221
`
`U.S. Patent No. 8,336,772
`
`File History for U.S. Patent No. 8,336,772
`
`U.S. Patent No. 5,646,992
`
`U.S. Patent No. 5,903,721
`
`International Publication No. WO99/13398
`
`U.S. Patent No. 5,761,485
`
`Rakesh Mohan, John R. Smith and Chung-Sheng Li , “Adapting Mul-
`timedia Internet Content for Universal Access” IEEE (March 1999)
`
`iv
`
`
`
` Covered Business Method Patent Review
`United States Patent No. 8,794,516
`
`
`EXHIBIT LIST
`1041
`U.S. Patent No. 5,953,005
`
`1042
`
`1043
`
`1044
`
`1045
`
`1046
`
`Plaintiffs’ Complaint for Patent Infringement, Smartflash LLC, et al. v.
`Apple Inc., Civil Action No. 6:15-cv-145
`U.S. Patent No. 7,334,720
`
`Apr. 8-9, 2015 Deposition Transcript of Jonathan Katz, CBM2014-
`00102/106/108/112
`J. Taylor, “DVD-Video: Multimedia for the Masses,” IEEE Multime-
`dia, Vol. 6, No. 3, July-September 1999, pp. 86-92
`Excerpt of Transcript of Trial Afternoon Session, February 16, 2015
`from Smartflash LLC v. Apple Inc., No. 6:13-cv-447
`
`v
`
`
`
` Covered Business Method Patent Review
`United States Patent No. 8,794,516
`
`I.
`
`INTRODUCTION
`
`Pursuant to § 321 and Rule § 42.304,1 the undersigned, on behalf of and acting
`
`in a representative capacity for Apple Inc. (“Petitioner”), petitions for review under
`
`the transitional program for covered business method patents of claims 1-28 (“chal-
`
`lenged claims”) of U.S. Pat. No. 8,794,516 (“the ’516 Patent” or “’516”), issued to
`
`Smartflash Technologies Limited and assigned to Smartflash LLC (“Patent Owner”).
`
`Petitioner asserts it is more likely than not that the challenged claims are unpatentable
`
`for the reasons herein and requests review of, and judgment against, claims 1-28 un-
`
`der § 101, and claims 1-4 under § 112, ¶ 1, as being unpatentable.
`
`The challenged claims are merely directed to steps and corresponding systems
`
`well-known in the field of data storage and access, including a “handheld multimedia
`
`terminal,” a “content data supply server for providing an item of multimedia content
`
`to a handheld multimedia terminal,” and “a computer system for providing multime-
`
`dia data items to a handheld multimedia terminal.” See Ex. 1001 cls. 1-28; 4:7-8, 6:45-
`
`47, 6:62-64, 13:30-31, 16:6-8, 16:47-52. And in fact, the ’516 Patent states that “[t]he
`
`physical embodiment of the system is not critical and a skilled person will understand
`
`that the terminals, data processing systems and the like can all take a variety of
`
`forms.” See, e.g., id. Fig 1; 12:37-40.
`
`Claim 14, for example, recites five rudimentary steps—(A) receiving a request
`
`
`1 All section cites herein are to 35 U.S.C. or 37 C.F.R., as the context indicates.
`
`
`
`
`
` Covered Business Method Patent Review
`United States Patent No. 8,794,516
`
`for identifier data; (B) retrieving the identifier data; (C) transmitting the identifier
`
`data; (D) receiving payment validation data; and (E) retrieving and transmitting the
`
`item of multimedia content in response to payment validation data. Claim 14 provides:
`
`14. A method of providing an item of multimedia content to a handheld mul-
`timedia terminal, the method comprising:
`[A] receiving a request from the handheld multimedia terminal for identifier
`data identifying one or more items of multimedia content data available to the
`handheld multimedia terminal;
`[B] retrieving the identifier data from a data store;
`[C] transmitting the identifier data to the handheld multimedia terminal;
`[D] receiving payment validation data validating a user purchase of an item of
`multimedia content; and
`[E] responsive to the payment validation data validating the user purchase, re-
`trieving the purchased item of multimedia content data from a multimedia
`content store and transmitting the purchased item of multimedia content to
`the handheld multimedia terminal.
`Ex. 1001 cl. 14. 2 But at the patent’s earliest claimed priority date, these simple ele-
`
`ments and their combination were well known. See Section II; Ex. 1019 ¶¶ 82-86,
`
`§ VI.3 The patent acknowledges that the idea of providing access to data in exchange
`
`
`2 All emphasis herein added unless otherwise noted.
`
`3 In further support of the Petitioner’s grounds, the Declaration of technical expert
`
`John P.J. Kelly, Ph.D., is attached as Exhibit 1019. Dr. Kelly qualifies as a person of
`
`ordinary skill in the art (Ex. 1019 §§ I, III) and has analyzed whether the challenged
`
`2
`
`
`
` Covered Business Method Patent Review
`United States Patent No. 8,794,516
`
`for a payment (e.g., purchase of music on a CD) was already well known, as were e-
`
`payment systems. E.g., Ex. 1001 5:13-16 (“the purchase outright option may be equiv-
`
`alent to the purchase of a compact disc (CD)”); 8:26-30; 9:1-11; 13:43-63. It is thus no sur-
`
`prise that the prior art was teeming with disclosures of this basic concept and its
`
`straightforward implementation in physical systems. See, e.g., Section II.
`
`Moreover, as its language makes clear, claim 14 involves no “technology” at all
`
`other than, at most, a “handheld multimedia terminal” and a “data store”—both of
`
`which were well known and entirely commonplace at the time. E.g., Ex. 1001 3:39-40,
`
`8:64-66, 11:34-50, 13:43-58, 14:1-2, 17:15-18:13, 18:28, Figures 2, 9; Ex. 1014 Figures
`
`71, 228:36-44; Ex. 1039 Figures 1, 4:34-39, 5:47-53, 6:22-7:15, 9:39-67; Ex. 1015 Fig-
`
`ures 3A-B, 6:37-7:39; Ex. 1016 2-3, 5-6; Ex. 1017 ¶¶ 5-6; Ex. 1013 Figures 12, 14:28-
`
`36, Ex. 1019 ¶¶ 82-86, § VI. Thus, as the intrinsic record reflects, claim 14 recites
`
`nothing more than a method for retrieving and transmitting data from a data store
`
`while receiving and responding to payment validation.
`
`The other challenged claims are nothing but variations on this same simple and
`
`well-known theme, with the addition of, in other challenged claims, equally generic
`
`components (e.g., handheld multimedia terminals with wireless interfaces, non-volatile
`
`memories, program stores, processors, displays, and code; content data supply servers
`
`claims are unpatentable based on the grounds in this petition (Ex. 1019 §§ I-II and
`
`IV-VIII).
`
`3
`
`
`
` Covered Business Method Patent Review
`United States Patent No. 8,794,516
`
`with communications interfaces, program stores, data stores, multimedia content
`
`stores, processors, and code; computer systems with communications interfaces, data
`
`stores, program stores, processors, and code) and steps. E.g., Ex. 1001 12:37-40 (“The
`
`physical embodiment of the system is not critical and a skilled person will understand that the termi-
`
`nals, data processing systems and the like can all take a variety of forms.”), Figure 4b.
`
`As confirmed in Alice Corp. Pty, Ltd. v. CLS Bank Int’l, 134 S. Ct. 2347 (2014),
`
`the challenged claims are directed to patent-ineligible subject matter under § 101. As
`
`the Board has noted in connection with similar claims of related patents, “the . . . pa-
`
`tent makes clear that the asserted novelty of the invention is not in any specific im-
`
`provement of software or hardware, but in the method of controlling access to data.”
`
`CBM2014-00110, Pap. 7, at 13; see also CBM2014-00102/103, Pap. 8; 11; CBM2014-
`
`00104, Pap. 9, 12; CBM2014-00106, Pap. 8, 12; CBM2014-00108, Pap. 8, 10;
`
`CBM2014-00112, Pap. 8, at 11; CBM2014-00190, Pap. 9, 10; CBM2014-00192, Pap. 7,
`
`10-11; CBM2014-00194, Pap. 9, 10-11; CBM2015-00015, Pap. 23, 14; CBM2015-
`
`00016, Pap. 23, 15. Further, the challenged claims are directed to nothing more than
`
`the unpatentable abstract idea of payment for and controlling access to data, with at
`
`most the addition of well-known, routine and conventional features—in particular,
`
`generic computer implementation that cannot confer patentability on these patent-
`
`ineligible abstractions. See, e.g., Alice, 134 S. Ct. at 2359-60. In summary, each chal-
`
`lenged claim recites ineligible subject matter and is thus unpatentable. Further, claim 1
`
`4
`
`
`
`(and thus, dependent claims 2-4) lacks a proper written description under § 112.
`
` Covered Business Method Patent Review
`United States Patent No. 8,794,516
`
`
`II. OVERVIEW OF FIELD OF THE CLAIMED INVENTION
`By October 25, 1999, the sale, distribution, and protection of digital content
`
`were well-known to a person of ordinary skill (“POSA”).4 See, e.g., Ex. 1019 ¶¶ 23-25,
`
`29-30, 46, 75. A POSA would have been aware of computer-based systems for
`
`providing digital content, including software, audio, and video content, for a fee. See,
`
`e.g., id. ¶¶ 25-30, 34, 43, 46, 48-50, 53-56, 58, 61, 75; see also Ex. 1044 14:21-15:15,
`
`16:6-17:9; Ex. 1008 at 4:27-35, 6:49-7:6.5 Such systems included servers, computers, e-
`
`payment systems, and user devices connected over known wired and wireless com-
`
`munications networks to distribute content from content owners to users. See, e.g., Ex.
`
`1019 ¶¶ 23-25, 29, 30, 34-38, 43-46, 48, 71-73, 75. Ex. 1044 19:3-18; see also Ex. 1025
`
`
`4 All references to a POSA refer to the knowledge or understanding of a person of
`
`ordinary skill in the art as of October 25, 1999, unless specifically noted. A POSA
`
`would have at least a B.S. in E.E., computer science or a telecommunications related
`
`field, and at least three years of industry experience that included client-server
`
`data/information distribution and management architectures. See Ex. 1019 ¶¶ 15-17.
`
` Exhibit 1044 is April 8-9, 2015 Deposition Transcript of Jonathan Katz, Patent
`
` 5
`
`Owner’s expert, for CBM2014-00102/106/108/112 regarding related patents in the
`
`same family as the ’516 Patent (see Section IV.B infra describing related matters).
`
`5
`
`
`
`at Figure 1, 9:50-68.
`
` Covered Business Method Patent Review
`United States Patent No. 8,794,516
`
`
`Indeed, the ’516 Patent explains that the physical embodiment of the system is
`
`“not critical and a skilled person will understand that the terminals, data processing
`
`systems and the like can all take a variety of forms.” Ex. 1001 12:34-40. For example,
`
`the patent concedes that various claimed components and functionalities were con-
`
`ventional and well-known in the art (see Ex. 1019 ¶ 22), such as:
`
` Internet users paying for goods and/or services by credit card transaction (id.
`
`2:21-22; 19:13-17)
`
` Encrypting/decrypting content for security (id. 3:1-11)
`
` Data access terminal or content access terminal hardware: “conventional com-
`
`puter” or “mobile phone,” “home personal computer,” “mobile communica-
`
`tions device,” “set top box” (id. 4:7-8, 16:4-13)
`
` WAP and i-mode allowing mobile phones to access the Internet and download
`
`data (id. 4:8-12)
`
` SIM cards including a user identification means (id. 4:12-16)
`
` Non-volatile memory, including EEPROM, Flash memory, optical memory (id.
`
`4:45-51, 17:31-38)
`
` Purchasing digital music equivalent to the purchase of a CD (id. 5:13-16)
`
` Data carrier hardware: “IC card,” “smart card,” “memory stick,” “standard
`
`6
`
`
`
` Covered Business Method Patent Review
`United States Patent No. 8,794,516
`
`
`smart card” (id. 6:32-34, 11:34-37, 17:17-38)
`
` Electronics Point of Sale Systems (EPoSS) functionality for smart cards (id.
`
`11:43-47)
`
` E-payment systems and standards (id. 13:43-46)
`
` Data access terminal as a “general purpose computer” with standard compo-
`
`nents (id. Figure 8, 16:40-62)
`
` Data access device hardware: “portable audio/video player,” “conventional
`
`dedicated computer system” with standard components (id. 18:14-34)
`
` Use control routines including digital watermarking and content protection
`
`from the SDMI specification (id. 18:37-43)
`
` “Standard transmission protocols” used to transmit content data items (id.
`
`21:53-56)
`
` Communication network, whose detailed implementation is “not essential,”
`
`and can be the “Internet,” “web-based technology,” “any electronic communi-
`
`cations network,” “wide area network,” “local area network,” “wireless net-
`
`work,” “conventional land line network,” “extranet” (id. 25:51-58)
`
`In addition, a POSA would have known, for example, multiple systems for sell-
`
`ing and distributing digital content to remote user devices. See Ex. 1044 14:21-15:15,
`
`16:6-17:9; see, e.g., Ex. 1019 ¶¶ 25-30, 34-44, 48-50, 53-54, 61, 64-65, 67-69. For exam-
`
`7
`
`
`
` Covered Business Method Patent Review
`United States Patent No. 8,794,516
`
`ple, U.S. Patent No. 5,675,734 (“Hair,” published October 7, 1997) disclosed a system
`
`for selling digital video or audio content. Ex. 1007 Abstract. Hair described a distribu-
`
`tion system that transmits digital video or audio signals stored on a first memory be-
`
`longing to a first party to a second memory belonging to a second party for a fee. Id.
`
`5:41-44. In a first step, money is transferred from the second party to the first party
`
`via telecommunications line for an electronic sale. Id. 5:44-47. Then, the memory of
`
`the second party is connected to the memory of the first party over a telecommunica-
`
`tions line, and the digital or audio signals are transmitted from the first memory to the
`
`second memory. Id. 5:47-56. See, e.g., Ex. 1019 ¶ 29.
`
`U.S. Patent No. 4,999,806 (“Chernow,” published March 12, 1991) also dis-
`
`closed a system for digital content sales. Chernow described a software distribution
`
`system in which a seller computer communicates with buyers over a telephone line for
`
`the buyers to browse through software products available from the remote seller
`
`computer for leasing or purchasing. Ex. 1006 2:22-36. The seller computer answers
`
`calls from buyers, verifies credit card information, transmits purchased software to
`
`buyers, and performs accounting functions to ensure proper billing and record keep-
`
`ing. Id. 2:37-47. A POSA would have understood that delivery of the purchased con-
`
`tent could be conditioned on successful payment, as the system described in Chernow
`
`ensures that the customer is able to pay for the purchase, for example by verifying
`
`credit card approval for the sale amount, before providing requested software. Id.
`
`8
`
`
`
` Covered Business Method Patent Review
`United States Patent No. 8,794,516
`
`6:48-65; 7:53-63; see also Ex. 1044 24:2-11, 27:4-9. A POSA also would have appreciat-
`
`ed the need to limit leased software to a period of time or a number of runs, in view
`
`of Chernow’s description of software that renders itself unusable or erases itself at the
`
`conclusion of the leased use. Ex. 1006 5:10-18. See, e.g., Ex. 1019 ¶¶ 25-28.
`
`A POSA would have known that a central vending system could be used to
`
`provide multiple vendors with a mechanism to market, distribute, and receive pay-
`
`ment for electronic data, as described for example in EP Patent Application Publica-
`
`tion No. 0809221 (“Poggio,” published November 26, 1997). Ex. 1015 Figure 1; 2:32-
`
`36; see also Ex. 1044 9:3-18. Poggio described a vending machine that manages distri-
`
`bution of electronic data on a variety of license terms by providing information about
`
`the products for a purchaser to browse, obtaining payment for a product, and distrib-
`
`uting purchased products to users’ computers. Ex. 1015 4:35-49. The vending ma-
`
`chine includes a library of vendor products with a vending information database that
`
`maintains product information for each vendor product, including product identifiers,
`
`pointers to the products in the library, and information identifying the particular ven-
`
`dor and category of the product. Id. Figure 3, 6:37-7:39. The vending machine also in-
`
`cludes “a digital cash interface 116 for obtaining point-of-sale electronic payment for
`
`the license fee associated with a particular vendor product.” Id. Figure 1, 6:13-16. The
`
`digital cash interface confirms successful payment of the required license fee with an
`
`electronic banking network before the virtual vending machine provides a product to
`
`9
`
`
`
`a user. Id. Figure 7, 10:7-20. See, e.g., Ex. 1019 ¶¶ 34-42.
`
` Covered Business Method Patent Review
`United States Patent No. 8,794,516
`
`
`Poggio disclosed a variety of existing payment schemes for purchasing a vendor
`
`product that would have been known to a POSA, including “credit card payment
`
`transactions,” “digital cash,” “debit transactions,” and “electronic funds transfer.” Ex.
`
`1015 6:25-36. Poggio also disclosed payment methods in which payment information
`
`is sent directly to an e-payment system instead of to the virtual vending machine, with
`
`the e-payment system forwarding a confirmation that the payment has been made to
`
`the vending machine. Ex. 1015 10:41-53. A POSA would have also known additional
`
`methods for executing electronic payments beyond those explicitly discussed in
`
`Poggio. See Ex. 1044 16:6-19:2. For example, U.S. Patent No. 5,903,721 (“Sixtus,”
`
`published May 11, 1999) disclosed an electronic payment system in which a “user’s
`
`credit card number or other like sensitive information is not transmitted between enti-
`
`ties as part of the transaction approval process.” Ex. 1037 7:37-40. The system instead
`
`securely registers a user’s payment information, such as a credit card, in an initial
`
`transaction and then later uses that information for checking credit approval without
`
`requiring the user to transmit the sensitive payment information. Id. 7:40-53; 8:21-31.
`
`The user sends only user identification information that is used to locate and check the regis-
`
`tered payment information. Id. 10:19-31. See, e.g., Ex. 1019 ¶¶ 64-65.
`
`In addition to systems for providing purchased content to users from remote
`
`stores, a POSA would have also been aware of systems allowing users to purchase
`
`10
`
`
`
` Covered Business Method Patent Review
`United States Patent No. 8,794,516
`
`content that is locally stored, but not yet accessible, on the user’s computer or on a
`
`secondary storage device in the user’s possession. For example, The Secure Distribu-
`
`tion of Digital Contents (“von Faber,” published 1997) disclosed a “system for distri-
`
`bution of encrypted digital contents via freely accessible distribution media.” Ex. 1018
`
`Abstract. A POSA would have appreciated the importance of ensuring that goods
`
`were paid for, as von Faber acknowledged the need to “couple the use of the provid-
`
`ed digital goods with a prior payment for the goods in a way which cannot be by-
`
`passed.” Id. 7; see also Ex. 1044 27:4-9. The solution proposed by von Faber was to
`
`freely distribute encrypted digital contents and focus on key management, to “have
`
`the customer pay for the key which he needs to transform the encrypted content in an
`
`usable form.” Ex. 1018 at 7. The content in such a distribution scheme is in the user’s
`
`possession before any purchase, but the decryption key required to gain access to the
`
`digital content is sent to a customer only after it is “guaranteed that payment has been
`
`authorised.” Id. 8. See, e.g., Ex. 1019 ¶¶ 43-47. International Application Publication
`
`No. WO99/13398 (“Peterson,” published March 18, 1999) also disclosed a system for
`
`purchasing access to locally-stored content. As in claims 1-4 of the ’516 Patent, Peter-
`
`son disclosed a digital content vending machine run on a personal computer that al-
`
`lows a user to purchase products from inventory stored either in a hard drive of the
`
`computer or on removable media, such as a CD, DVD, or tape in the user’s posses-
`
`sion. Ex. 1038 Abstract, 8:11-15. The digital assets stored in the inventory “are pro-
`
`11
`
`
`
` Covered Business Method Patent Review
`United States Patent No. 8,794,516
`
`tected from unauthorized use by a digital wrapper requiring at least one key for un-
`
`wrapping.” Id. 4:14-16. The vending software displays information about the invento-
`
`ry to the user for browsing and selecting a product, then “transmits money represent-
`
`ing payment for the selection and an identifier for it to the clearing house, which
`
`transmits back to the client a key associated with the selected asset.” Id. 4:18-20; see
`
`also 9:18-10:6. The data displayed to a user in the browsing interface includes adver-
`
`tisements and Internet links. Id. 15:24-29. The keys in Peterson provide security for
`
`the content, including “protecting the asset 22 once it has been paid for” and “sup-
`
`press[ing] unauthorized copying of [vendors’] intellectual property.” Id. 10:17-23. See,
`
`e.g., Ex. 1019 ¶¶ 46-47.
`
`A POSA would have appreciated that the available systems for providing pur-
`
`chased digital content to users, or for allowing users to access local content after a
`
`purchase was completed, could be implemented on a wide array of user devices. In
`
`addition to well-known personal computers, a POSA would have been familiar with
`
`mobile and handheld devices, for example devices the size of a book, for accessing
`
`such content, as disclosed for example in U.S. Patent No. 5,761,485 (“Munyan,” pub-
`
`lished June 2, 1998). Munyan disclosed a handheld “Personal Electronic Book” device
`
`including a cellular modem or other high-speed modem for wireless communication.
`
`Ex. 1039 Figure 1; 5:47-50; 6:41-45; 7:49-52. The device allows a user to “initiate and
`
`establish communications with the remote bookstore’s database library and services”
`
`12
`
`
`
`to locate and download content. Id. 7:33-42; 8:1-13. The bookstore is “an on-line elec-
`
` Covered Business Method Patent Review
`United States Patent No. 8,794,516
`
`
`tronic archive of multimedia products” that the user browses to select products, to
`
`buy licenses to use the products, and to download the products to the personal device.
`
`Id. 9:39-54. See, e.g., Ex. 1019 ¶¶ 71-73.
`
`A POSA also would have known that content could be provided to, and played
`
`on, mobile phones, for example mobile phones disclosed in Japanese Patent Applica-
`
`tion Publication No. H11-164058 (“Sato,” published June 18, 1999). Sato disclosed a
`
`mobile phone connected to a music distribution center server via “a wireless public
`
`communications network.” Ex. 1017 Figure 1, Abstract, ¶ 3. The mobile phone in-
`
`cludes, among other components, “a transmitting and receiving control unit, a trans-
`
`mitter and a receiver, a radio wave transmitting and receiving control unit, [and] an
`
`antenna” for communication with the distribution center. Id. ¶ 4. Using the phone, a
`
`user accesses a distribution center, enters a song selection, and receives the selected
`
`music on the mobile phone. Id. ¶¶ 12, 14. Sato also discloses performing a billing pro-
`
`cess after transmission from the distribution center. Id. ¶ 15. In order to provide mul-
`
`timedia data to diverse client devices, including handheld devices and cellular phones,
`
`a POSA would have recognized a need to address the different capabilities of the di-
`
`verse platforms to which content is being delivered, as disclosed in Adapting Multi-
`
`media Internet Content for Universal Access (“Mohan,” published March 1999). Ex.
`
`1040 Abstract. A POSA would have understood multiple approaches to adapting mul-
`
`13
`
`
`
` Covered Business Method Patent Review
`United States Patent No. 8,794,516
`
`timedia to optimally match the resources and capabilities of diverse clients, for exam-
`
`ple using known compression and transcoding techniques. Ex.1040 1-2. See, e.g., Ex.
`
`1019 ¶¶ 66, 73.
`
`A POSA also would have known that different product options could be pro-
`
`vided for a buyer to choose from, with different limits on the buyer’s access associat-
`
`ed with each choice. For example, Poggio discloses providing a purchaser with a
`
`choice between purchasing a permanent license for a vendor product or renting the
`
`product with a license limited to rental a time period. Ex. 1015 Figure 6, 9:25-33.
`
`Rented products are “formatted to include a time bomb or other disabling device
`
`which will disable the product at the end of the rental period” before being transmit-
`
`ted to the user. Id. 10:25-28. U.S. Patent No. 5,915,019 (“Ginter,” published June 22,
`
`1999) disclosed a system distributing content with a set of “rules and controls” to
`
`prevent unauthorized use of protected information and specify how much usage is to
`
`be paid for. Ex. 1014 56:25-57:16. See, e.g., Ex. 1019 ¶¶ 34-42, 48-51.
`
`A POSA would have understood that the user’s rights to purchased content
`
`could be “attached” such that the rights and fee specifications remain with the con-
`
`tent, as disclosed in U.S. Patent No. 5,629,980 (“Stefik,” published May 13, 1997). Ex.
`
`1013 6:51-56. Stefik disclosed attaching usage rights to content to “define how that
`
`digital work may be transferred, used, performed, or played.” Id. 19:14-15. Usage
`
`rights also define fee specifications including discounts, incentives paid to users, or
`
`14
`
`
`
` Covered Business Method Patent Review
`United States Patent No. 8,794,516
`
`best price specifications that “accommodate special deals, rebates, and pricing that
`
`depends on information that is not available to the repository.” Id. 23:60-24:25, 24:34-
`
`57. The fee specifications “can be combined with tickets or authorizations that could
`
`indicate that the consumer is a wholesaler or that he is a preferred customer” in which
`
`case when the transaction is reconciled “any excess amount will be returned to the
`
`consumer in a separate transaction.” Id. 24:39-47. Stefik also disclosed a digital work
`
`having multiple versions of a right attached with different prices, such that a purchas-
`
`er may choose which option best fits the rights he or she needs. Id. 18:9-16. A POSA
`
`would have known that a user could also be provided with an option to specify the
`
`extent of utilization needed, so only that usage is paid for and the content is released
`
`only to that extent of utilization, as disclosed in U.S. Patent No. 5,940,805 (“Kopp,”
`
`published August 17, 1999). Ex. 1004 2:61-3:2; 5:47-55. See, e.g., Ex. 1019 ¶¶ 30-33,
`
`58-60.
`
`A POSA would have known how to monitor and enforce limits on purchased
`
`or rented content when the amount of allowed content usage was limited. For exam-
`
`ple, a POSA would have known that rented content could be monitored to ensure
`
`that a licensed amount of use time or licensed number of uses is not exceeded, as dis-
`
`closed in U.S. Patent No. 5,925,127 (“Ahmad,” published July 20, 1999). Ex. 1003
`
`2:62-3:19; see also Ex. 1011 at Abstract, 2:52-61, 3:1-24. Ahmad disclosed a monitor
`
`that could be provided from a content server along with content, or could be already
`
`15
`
`
`
` Covered Business Method Patent Review
`United States Patent No. 8,794,516
`
`stored on the user’s computer before the content is purchased. Ex. 1003 Figure 3,
`
`11:4-13. When the user uses the licensed content, the monitor tracks the usage and
`
`ensures that usage is cut off when the licensed amount is reached, for example when
`
`the licensed usage time or number of uses has been expended. Id. Figures 5A-B,
`
`13:65-14:9, 14:20-48. In addition to limiting use with a monitor, a POSA also would
`
`have known that usage could be controlled by providing a user with limited-use de-
`
`cryption keys after authenticating a user, for example by verifying payment data, as
`
`disclosed in U.S. Patent No. 5,953,005 (“Liu,” published September 14, 1999). Ex.
`
`1041 5:9-17. Liu disclosed limiting the key provided to the user to a single use, a pre-
`
`determined number of plays, or a time period, after which the key expires and is no
`
`longer usable. Ex. 1041 5:33-49. See, e.g., Ex. 1019 ¶¶ 56-57, 61.
`
`In addition to the purchased content itself, a POSA would have known that
`
`additional data could be provided to the user along with the content. For example,
`
`Sato disclosed transmitting lyrics and images along with a song that are then displayed
`
`to the user when the song is played. Ex. 1017 ¶¶ 14-15. A POSA also would have un-
`
`derstood that promotional materials, including materials selected based on the charac-
`
`ter of usage exhibited by a particular user, could be included in a container in which
`
`the content is transmitted to an end user, as disclosed in Ginter. Ex. 1014 286:57-
`
`287:6. See, e.g., Ex. 1019 ¶¶ 48, 51, 73.
`
`Ginter also disclosed providing promotional data a