throbber
Covered Business Method Patent Review
`United States Patent No. 8,033,458
`
`IN THE UNITED STATES PATENT AND TRADEMARK OFFICE
`
`Petitioner: Apple Inc.
`
`Attorney Docket No.:
`
` 104677-5008-827
`Customer No. 28120
`

`Inventor: Hulst et al.
`United States Patent No.: 8,033,458 §
`Formerly Application No.: 12/943,847 §
`Issue Date: October 11, 2011

`Filing Date: November 10, 2010

`Former Group Art Unit: 2887

`Former Examiner: Thien M. Le

`
`For: Data Storage and Access Systems
`
`MAIL STOP PATENT BOARD
`Patent Trial and Appeal Board
`United States Patent and Trademark Office
`Post Office Box 1450
`Alexandria, Virginia 22313-1450
`
`PETITION FOR COVERED BUSINESS METHOD PATENT REVIEW OF
`UNITED STATES PATENT NO. 8,033,458 PURSUANT TO 35 U.S.C. § 321,
`37 C.F.R. § 42.304
`
`
`
`

`
` Covered Business Method Patent Review
`United States Patent No. 8,033,458
`
`TABLE OF CONTENTS
`
`B.
`
`INTRODUCTION ....................................................................................................... 1
`I.
`II. OVERVIEW OF FIELD OF THE CLAIMED INVENTION ......................... 6
`III. OVERVIEW OF CHALLENGED CLAIMS ....................................................... 19
`IV. PETITIONER HAS STANDING .......................................................................... 23
`A.
`The ’458 Patent Is A Covered Business Method Patent ........................... 23
`1.
`Exemplary Claim 4 Is Financial In Nature ...................................... 25
`2.
`Claim 4 Does Not Cover A Technological Invention ................... 28
`(a)
`Claim 4 Does Not Recite A Technological Feature That Is
`Novel And Unobvious ............................................................ 28
`(b) Claim 4 Does Not Solve A Technical Problem Using A
`Technical Solution .................................................................... 31
`Related Matters And Mandatory Notice Information; Petitioner Is
`A Real Party In Interest Sued For And Charged With
`Infringement ..................................................................................................... 34
`V. DETAILED EXPLANATION OF REASONS FOR RELIEF
`REQUESTED, SHOWING IT IS MORE LIKELY THAN NOT
`THAT AT LEAST ONE CHALLENGED CLAIM IS
`UNPATENTABLE .................................................................................................... 36
`A.
`Claim Construction .......................................................................................... 38
`B.
`The Challenged Claims Are Unpatentable Under § 101 ............................ 41
`1.
`The Challenged Claims Are Directed To Abstract Ideas .............. 42
`2.
`The Challenged Claims Do Not Disclose An “Inventive
`Concept” That Is “Significantly More” Than An Abstract
`Idea ......................................................................................................... 50
`(a)
`Field Of Use Limitations Cannot Create Patent Eligibility
` ..................................................................................................... 50
`(b) Generic Computer Implementation Cannot Transform
`Abstract Ideas Into Patent Eligible Inventions ................... 51
`Functional Nature Confirms Preemption and Ineligibility 67
`(c)
`(d) Machine-or-Transformation Test Confirms Patent
`Ineligibility ................................................................................. 70
`
`
`
`i
`
`

`
`C.
`
` Covered Business Method Patent Review
`United States Patent No. 8,033,458
`
`Claims 3-5 Are Indefinite Under § 112 ........................................................ 71
`1.
`“The Code” Lacks A Clear Or Definite Antecedent Basis
`In The Claims ....................................................................................... 71
`“The Content Data Memory” Lacks A Clear Or Definite
`Antecedent Basis In The Claims ........................................................ 74
`VI. CONCLUSION........................................................................................................... 75
`
`2.
`
`
`
`ii
`
`
`
`
`
`

`
` Covered Business Method Patent Review
`United States Patent No. 8,033,458
`
`
`U.S. Patent No. 8,033,458
`
`Plaintiffs’ First Amended Complaint
`
`U.S. Patent No. 5,925,127
`
`File History for U.S. Patent No. 8,033,458
`
`U.S. Patent No. 5,940,805
`
`U.S. Patent No. 4,999,806
`
`U.S. Patent No. 5,675,734
`
`August 2014 Emails Titled “RE: Smartflash: Meet and Confer
`Regarding Further Claim/Prior Art Limits.”
`
`U.S. Patent No. 4,878,245
`
`U.S. Patent No. 7,334,720
`
`U.S. Patent No. 4,337,483
`
`U.S. Patent No. 5,103,392
`
`U.S. Patent No. 5,530,235
`
`U.S. Patent No. 5,629,980
`
`U.S. Patent No. 5,915,019
`
`European Patent Application, Publication No. EP0809221A2
`
`International Publication No. WO 99/43136
`
`JP Patent Application Publication No. H11-164058 (transla-
`tion)
`
`Eberhard von Faber, Robert Hammelrath, and Franz-Peter
`Heider, “The Secure Distribution of Digital Contents,” IEEE
`(1997)
`
`iii
`
`EXHIBIT LIST
`1001
`
`1002
`
`1003
`
`1004
`
`1005
`
`1006
`
`1007
`
`1008
`
`1009
`
`1010
`
`1011
`
`1012
`
`1013
`
`1014
`
`1015
`
`1016
`
`1017
`
`1018
`
`1019
`
`
`
`

`
` Covered Business Method Patent Review
`United States Patent No. 8,033,458
`
`
`Declaration of John P. J. Kelly In Support of Apple Inc.’s Pe-
`tition for Covered Business Method Patent Review
`
`Declaration of Michael P. Duffey In Support of Apple Inc.’s
`Petition for Covered Business Method Patent Review
`
`Declaration of Megan F. Raymond In Support of Apple Inc.’s
`Petition for Covered Business Method Patent Review
`
`U.S. Patent No. 8,118,221
`
`File History for U.S. Patent No. 8,061,598
`
`Claim Construction Memorandum Opinion from Smartflash
`LLC v. Apple Inc., No. 6:13cv447 (Dkt. 229)
`
`U.S. Patent No. 7,725,375
`
`International Publication No. WO95/34857
`
`U.S. Patent No. 5,646,992
`
`U.S. Patent No. 5,903,721
`
`R. Mohan, J.R. Smith, C.S. Li, “Adapting Multimedia Internet
`Content for Universal Access,” IEEE Transactions on Multi-
`media, Vol. 1, No. 1, 1999, pp. 104-114
`JP Patent Application Publication No. H10-269289 (transla-
`tion)
`U.S. Patent No. 5,761,485
`
`Apr. 8-9, 2015 Deposition Transcript of Jonathan Katz,
`CBM2014-00102/106/108/112
`International Publication No. WO99/13398
`
`U.S. Patent No. 5,953,005
`
`iv
`
`EXHIBIT LIST
`1020
`
`1021
`
`1022
`
`1023
`
`1024
`
`1025
`
`1026
`
`1027
`
`1028
`
`1029
`
`1030
`
`1031
`
`1032
`
`1033
`
`1034
`
`1035
`
`
`
`

`
` Covered Business Method Patent Review
`United States Patent No. 8,033,458
`
`
`EXHIBIT LIST
`1036
`
`1037
`
`J. Taylor, “DVD-Video: Multimedia for the Masses,” IEEE
`Multimedia, Vol. 6, No. 3, July-September 1999, pp. 86-92
`Excerpt of Transcript of Trial Afternoon Session, February
`16, 2015 from Smartflash LLC v. Apple Inc., No. 6:13cv447
`
`
`
`v
`
`

`
` Covered Business Method Patent Review
`United States Patent No. 8,033,458
`
`I.
`
`INTRODUCTION
`
`Pursuant to § 321 and Rule § 42.304,1 the undersigned, on behalf of and acting
`
`in a representative capacity for, Apple Inc. (“Petitioner”), hereby petitions for covered
`
`business method review of claims 2-5, 7, 9, and 12 (“challenged claims”) of U.S. Pa-
`
`tent No. 8,033,458 (“the ’458 Patent” or “’458”), issued to Smartflash Technologies
`
`Limited and assigned to Smartflash LLC (“Patent Owner”). Petitioner asserts that it
`
`is more likely than not that the challenged claims are unpatentable for the reasons
`
`herein and requests review of, and judgment against, claims 2-5, 7, 9, and 12 as un-
`
`patentable under § 101, and claims 3-5 as unpatentable under § 112.
`
`As discussed in Section IV.B, infra, Petitioner previously filed CBM2014-
`
`00106/107 and CBM2015-00016 seeking CBM review certain claims of the ’458 Pa-
`
`tent. Those petitions were instituted for trial (and CBM2014-00106 and 00107 were
`
`consolidated as CBM2014-00106) with respect to claim 1 on § 103 grounds, claims 1,
`
`6, 8, and 10 on § 101 grounds, and claim 11 on § 112 grounds.2 In general, the previ-
`
`ous petitions were directed towards claims asserted in a first litigation filed by Smart-
`
`
`1 All section cites herein are to 35 U.S.C. or 37 C.F.R., as the context indicates.
`
`2 Petitioner respectfully notes that the Director, pursuant to Rule 325(c), may deter-
`
`mine after institution that consolidation of this proceeding with CBM2015-00016 may
`
`be appropriate, or may at minimum decide to coordinate the schedules of this pro-
`
`ceeding and CBM2015-00016.
`
`
`
`1
`
`

`
` Covered Business Method Patent Review
`United States Patent No. 8,033,458
`
`flash against Petitioner as of the time those petitions were filed. Since that time,
`
`Smartflash has filed a second litigation against Petitioner in which it again asserts the
`
`’458 Patent. Although Smartflash has not yet identified the asserted claims in the sec-
`
`ond litigation, this petition is directed towards the additional claims that Smartflash
`
`may assert in the new litigation. In addition, Samsung Electronics America (“Sam-
`
`sung”) previously filed CBM2014-00192 and CBM2014-00197 seeking CBM review of
`
`the ’458 Patent. CBM2014-00192 was instituted for trial with respect to claim 11 on
`
`§ 101 grounds. On April 30, 2015 Petitioner filed a Motion for Joinder with pending
`
`Covered Business Method review CBM2014-00193 (Attorney Docket No 104677-
`
`5008-826). The Board has not yet rendered a decision on this motion. However,
`
`none of the challenged claims herein has previously been challenged by Petitioner or
`
`Samsung on §§ 101 or 112 grounds, and the challenged claims were not being asserted
`
`against Petitioner by Smartflash at the time Petitioner filed the CBM2015-00016 peti-
`
`tion.
`
`The challenged claims of the ’458 Patent are merely directed to “[d]ata storage
`
`and access systems [that] enable downloading and paying for data,” including a well-
`
`known “portable data carrier” and a “data access device for retrieving stored data
`
`from a data carrier.” See Ex. 1001 at Abstract, claims 2-5, 7, 9, 12. Claim 4, for ex-
`
`ample, recites five rudimentary components of a portable data carrier—(A) an inter-
`
`face for reading and writing data, (B and C) non-volatile data memory for storing
`
`
`
`2
`
`

`
` Covered Business Method Patent Review
`United States Patent No. 8,033,458
`
`data and supplementary data and non-volatile payment data memory for providing
`
`payment data to an external device, (D) a program store storing code implementable
`
`by a processor, and (E) a processor … for implementing code on the program store.
`
`The recited code is similarly conventional and well-known: code to (F) output supple-
`
`mentary data and stored data in response to an external request, (G) output payment data and (H)
`
`provide external access to data memory:
`
`4. A portable data carrier, comprising:
`[A] an interface for reading and writing data from and to the carrier;
`[B] non-volatile data memory, coupled to the interface, for storing da-
`ta on the carrier;
`[C] non-volatile payment data memory, coupled to the interface, for
`providing payment data to an external device;
`[D] a program store storing code implementable by a processor; and
`[E] a processor, coupled to the content data memory, the payment data
`memory, the interface and to the program store for implementing code
`in the program store;
`[F] wherein the portable data carrier is configured for storing supple-
`mentary data in said data memory, and further comprising code to output
`the supplementary data from the interface in addition to the stored data, in re-
`sponse to an external request to read the data memory, and
`[G] wherein the code comprises code to output payment data from the
`payment data memory to the interface and [H] code to provide external ac-
`cess to the data memory.
`
`
`
`3
`
`

`
` Covered Business Method Patent Review
`United States Patent No. 8,033,458
`
`Ex. 1001 at cl. 4.3 But at the earliest claimed priority date, these simple elements and
`
`their combination were all well-known. See Section II; Ex. 1020 ¶¶ 77-78.4 The pa-
`
`tent itself acknowledges that the idea of providing access to data in exchange for a
`
`payment (e.g., purchase of music on a CD) was well-known at the time. E.g., Ex. 1001
`
`5:9-12 (“where the data carrier stores … music, the purchase outright option may be
`
`equivalent to the purchase of a compact disc (CD), preferably with some form of content
`
`copy protection such as digital watermarking”). The idea of purchasing digital data
`
`for payment was similarly well-known. See, e.g., Ex. 1007 at 5:41-56; Ex. 1033 at
`
`14:21-15:14.5 And, as shown herein, the prior art was teeming with disclosures of this
`
`basic concept and its straightforward implementation. See, e.g., Section II. Further, as
`
`its language makes clear, claim 4 involves no “technology” at all other than a “portable
`
`3 All emphasis herein is added unless otherwise noted
`
`4 In further support of the Petitioner’s grounds, the Declaration of technical expert
`
`John P.J. Kelly, Ph.D., is attached as Exhibit 1020. Dr. Kelly qualifies as a person of
`
`ordinary skill in the art (Ex. 1020 §§ I, III) and has analyzed whether the challenged
`
`claims are unpatentable based on the grounds in this petition (Ex. 1020 §§ I-II and
`
`IV-VIII).
`
`5 Exhibit 1033 is the April 8-9, 2015 Deposition Transcript of Jonathan Katz, Patent
`
`Owner’s expert, for CBM2014-00102/106/108/112 regarding the ’458 Patent as well
`
`as other related patents (see Section IV.B infra describing related matters).
`
`
`
`4
`
`

`
`data carrier” with an interface, non-volatile memory, and program store/processor—
`
` Covered Business Method Patent Review
`United States Patent No. 8,033,458
`
`
`which the patent itself concedes was well-known and entirely commonplace at the
`
`time. See, e.g., Ex. 1001 at 11:28-29 (“standard smart card”), 3:37, 4:9-13, 6:19-31,
`
`11:27-44, 17:6-18:4, Figures 2, 9. Thus, as the intrinsic record reflects, claim 4 recites
`
`nothing more than a system for reading and writing data while outputting payment
`
`data and other stored data, which was similarly well-known as discussed in Section II.
`
`Indeed, the ’458 Patent states that “[t]he physical embodiment of the system is not
`
`critical and a skilled person will understand that the terminals, data processing systems
`
`and the like can all take a variety of forms.” See, e.g., id. at Fig 1; 12:29-32. It is thus
`
`no surprise that each element of the challenged claims of the ’458 Patent has been
`
`disclosed in the prior art.
`
` Indeed, as confirmed by the Supreme Court’s recent decision in Alice Corp. Pty,
`
`Ltd. v. CLS Bank Int’l, 134 S. Ct. 2347 (2014)—decided after Petitioner filed its first
`
`petitions challenging the ’458 Patent—claim 4 and the remaining challenged claims
`
`are also directed to patent-ineligible subject matter under § 101. As the Board noted
`
`in its previous Institution Decisions, “the ’458 patent makes clear that the asserted
`
`novelty of the invention is not in any specific improvement of hardware, but in the
`
`method of controlling access to data,” CBM2014-00106, Pap. 8, at 12; CBM2015-00016,
`
`Pap. 23, at 15; CBM2014-00192, Pap. 7, at 10-11; and the challenged claims are di-
`
`rected to nothing more than the unpatentable abstract idea of payment for and/or
`
`
`
`5
`
`

`
` Covered Business Method Patent Review
`United States Patent No. 8,033,458
`
`controlling access to data, with at most the addition of well-known, routine and con-
`
`ventional features that do not render them patentable—in particular, generic comput-
`
`er implementation that cannot confer patentability on these patent-ineligible abstrac-
`
`tions. E.g., Alice, 134 S. Ct. at 2359-60. Further, each of claims 3-5 lacks a clear or
`
`definite antecedent basis and is thus indefinite under § 112. In summary, each chal-
`
`lenged claim recites ineligible subject matter, and claims 3-5 are indefinite; thus, each
`
`is unpatentable.
`
`II. OVERVIEW OF FIELD OF THE CLAIMED INVENTION
`By October 25, 1999, electronic sale, distribution, and content protection for
`
`digital products all would have been well-known to a POSA.6 See, e.g., Ex. 1020 ¶¶ 23-
`
`25, 29-30, 46, 75. A POSA would have been aware of computer-based systems for
`
`providing digital content, including software, audio, and video content, for a fee. See,
`
`e.g., id. ¶¶ 29-30, 46, 75; Ex. 1033 at 14:21-15:14, 16:6-17:9; see also Ex. 1019; Ex. 1009
`
`at 4:27-35, 6:49-7:6; Ex. 1034 at 4:9-5:3; Ex. 1028 at 1:42-60, 4:48-54; Ex. 1029 at Ab-
`
`stract, 6:14-25; Ex. 1035 at 5:9-17. Such systems included servers, computers, e-
`
`
`6 All references to a person of ordinary skill in the art (“POSA”) refer to the
`
`knowledge or understanding of a POSA as of October 25, 1999. A POSA would
`
`have at least a B.S. degree in E.E., C.S., or a telecommunications-related field, and at
`
`least three years of industry experience that included client-server data/information
`
`distribution and management architectures. See Ex. 1020 ¶¶ 15-17.
`
`
`
`6
`
`

`
` Covered Business Method Patent Review
`United States Patent No. 8,033,458
`
`payment systems, and user devices connected over known wired and wireless com-
`
`munications networks to distribute content from content owners to users. See, e.g.,
`
`Ex. 1020 ¶¶ 23-25, 29-30, 34-38, 43-46, 48, 71-73, 75; Ex. 1033 at 19:3-18; see also Ex.
`
`1011 at Figure 1, 9:50-68.
`
`Indeed, the ’458 Patent explains that the physical embodiment of the system is
`
`“not critical and a skilled person will understand that the terminals, data processing
`
`systems and the like can all take a variety of forms.” Ex. 1001 at 12:26-32. For ex-
`
`ample, the patent concedes that various claimed components and functionalities were
`
`conventional and well-known in the art (see Ex. 1020 ¶ 22), such as:
`
` Internet users paying for goods and/or services by credit card transaction.
`
`Ex. 1001 2:17-18; 19:5-9.
`
` Encrypting/decrypting content for security: “The skilled person will be
`
`aware of a range of suitable encryption/decryption techniques,” “using a
`
`conventional encryption system,” “in a conventional manner as is well
`
`known to those skilled in the art (for example, using public key data encryp-
`
`tion).” Id. at 2:64-3:7, 18:65-19:2, 21:33-38.7
`
`
`7 See also Fidelity National Information Serv., Inc. v. DataTreasury Corp., CBM2014-00020,
`
`Pap. 34, at 13, 19.
`
`
`
`7
`
`

`
` Covered Business Method Patent Review
`United States Patent No. 8,033,458
`
`
` Data access terminal or content access terminal hardware: “conventional
`
`computer” or “mobile phone,” “home personal computer,” “mobile com-
`
`munications device,” “set top box.” Id. at 4:4-5, 15:63-16:5.
`
` WAP and i-mode allowing mobile phones to access the internet and down-
`
`load data. Id. at 4:5-9.
`
` SIM cards including a user identification means. Id. at 4:9-13.
`
` Non-volatile memory, including EEPROM, Flash memory, optical memory.
`
`Id. at 4:41-47, 17:22-29.
`
` Purchasing digital music and its equivalence to the purchase of a CD. Id. at
`
`5:9-12.
`
` Data carrier hardware: “IC card,” “smart card,” “memory stick,” “standard
`
`smart card.” Id. at 6:28-30, 11:28-31, 17:8-29.
`
` Electronics Point of Sale System (EPoSS) functionality for smart cards. Id.
`
`at 11:37-41.
`
` E-payment systems and standards. Id. at 13:35-38.
`
` Data access terminal: a “general purpose computer” with standard compo-
`
`nents. Id. at Figure 8, 16:31-53.
`
`
`
`8
`
`

`
` Covered Business Method Patent Review
`United States Patent No. 8,033,458
`
`
` Data access device hardware: a “portable audio/video player” or a “conven-
`
`tional dedicated computer system” with standard components. Id. at 18:5-
`
`27.
`
` Use control routines, which include digital watermarking and content pro-
`
`tection from the SDMI specification. Id. at 18:29-35.
`
` “Standard transmission protocols,” which are used to transmit content data
`
`items. Id. at 21:44-47.
`
` Communication networks, such as the “Internet,” “web-based technology,”
`
`“any electronic communications network,” “wide area network,” “local area
`
`network,” “wireless network,” “conventional land line network,” “extranet.”
`
`Id. at 25:41-48.
`
`In addition, a POSA also would have known, for example, that content could
`
`be provided to, and played on, mobile phones, as disclosed in Japanese Patent Appli-
`
`cation Publication No. H11-164058 (“Sato,” published June 18, 1999). See also Ex.
`
`1030; Ex. 1031 at ¶ 5; Ex. 1032 at Figure 1, 5:65-7:16. Sato disclosed a mobile phone
`
`connected to a music distribution center server via a public communications network.
`
`Ex. 1018 Figure 1, Abstract, ¶ 3. Using the phone, a user accesses a distribution cen-
`
`ter, enters a song selection, and receives the selected music on the mobile phone. Id.
`
`¶¶ 12, 14. The downloaded music is stored either in a local “storage device” in the
`
`mobile phone or in a “removable storage device,” such as “a memory card similar to,
`
`
`
`9
`
`

`
` Covered Business Method Patent Review
`United States Patent No. 8,033,458
`
`for example, a magnetic card, a magnetic tape, a CD, a DVD, or an IC card” for later
`
`playback on the mobile phone. Id. ¶¶ 8-9. Sato also discloses performing a billing
`
`process after transmission from the distribution center. Id. ¶ 15. See, e.g., Ex. 1020 ¶
`
`73.
`
`International Publication No. WO99/43136 (“Rydbeck,” published August 26,
`
`1999) also disclosed a cellular telephone that stores and plays music through the tele-
`
`phone’s headset. Ex. 1017 at Figure 1, Abstract. Rydbeck disclosed a “digital enter-
`
`tainment module” that includes “RAM and/or removable memory cartridges for stor-
`
`ing music or other audio signals which can be played back through the headset” of the
`
`cellular phone. Id. at 6. Rydbeck discloses a bus or input port on the entertainment
`
`module for interfacing with a source of the music, or the music may be obtained
`
`“from the transceiver unit 12 in an ‘internet-enabled’ phone.” Id. The digital enter-
`
`tainment module integrated with the cellular phone advantageously shares compo-
`
`nents already present in the cellular phone. Id. at 3. In addition to the hardware
`
`components disclosed in Rydbeck and Sato, a POSA would have understood that the
`
`cellular phone devices discussed in both references contained SIM cards that were
`
`well-known and common by 1999, or at a minimum would have appreciated that such
`
`a SIM card could be installed in the phone. See, e.g., Ex. 1020 ¶¶ 72-73; Ex. 1033 at
`
`41:19-42:10.
`
`A POSA also would have known systems for selling and distributing digital
`
`
`
`10
`
`

`
` Covered Business Method Patent Review
`United States Patent No. 8,033,458
`
`content to user devices. For example, U.S. Patent No. 5,675,734 (“Hair,” published
`
`October 7, 1997) disclosed a system for selling digital video or audio content. Ex.
`
`1007 at Abstract. Hair describes a distribution system that transmits digital video or
`
`audio signals stored on a first memory belonging to a first party to a second memory
`
`belonging to a second party for a fee. Id. at 5:41-44. In a first step, money is trans-
`
`ferred from the second party to the first party via telecommunications line for an elec-
`
`tronic sale. Id. at 5:44-47. Then, the memory of the second party is connected to the
`
`memory of the first party over a communications line, and the digital or audio signals
`
`are transmitted from the first memory to the second memory. Id. at 5:47-56. See, e.g.,
`
`Ex. 1020 ¶ 29.
`
`U.S. Patent No. 4,999,806 (“Chernow,” published March 12, 1991) also dis-
`
`closed a system for digital content sales. Chernow described a software distribution
`
`system in which a seller computer communicates with buyers over a telephone line for
`
`the buyers to browse and purchase or lease software. Ex. 1006 at 2:22-36. The seller
`
`computer answers calls from buyers, verifies credit card information, transmits pur-
`
`chased software to buyers, and performs accounting functions to ensure proper billing
`
`and record keeping. Id. at 2:37-47. A POSA would have understood that delivery of
`
`the purchased content could be conditioned on successful payment, as the system de-
`
`scribed in Chernow ensures that the customer is able to pay for the purchase, for ex-
`
`ample by verifying credit card approval for the sale amount, before providing request-
`
`
`
`11
`
`

`
` Covered Business Method Patent Review
`United States Patent No. 8,033,458
`
`ed software. Id. 6:48-65, 7:53-63; Ex. 1033 27:4-9. A POSA also would have appreci-
`
`ated the need to limit leased software to a period of time or a number of runs, in view
`
`of Chernow’s description of software that renders itself unusable or erases itself at the
`
`conclusion of the leased use. Ex. 1006 at 5:10-18. See, e.g., Ex. 1020 ¶¶ 25-28.
`
`U.S. Patent No. 5,530,235 (“’235 Stefik,” published June 25, 1996) disclosed a
`
`transportable DocuCard “used for storing digital information which may be accessed
`
`by a system that is capable of playing or rendering the digital information, such as a
`
`computer system, digital copier, audio CD player and the like.” Ex. 1013 at Abstract,
`
`4:21-31. The ’235 Stefik specification described implementing the DocuCard as a
`
`card “in accordance with standards promulgated by the Personal Computer Memory
`
`Card International Association (PCMCIA),” which may be “desirable because of their
`
`small size and support for plug and play applications.” Id. at 4:55-5:12. A user ac-
`
`cesses documents from a repository using the DocuCard by logging in to the Docu-
`
`Card, for example by entering a PIN, which may “activate credit accounts,” assigning
`
`payment of any fees, and then selecting a desired document and function before con-
`
`firming the transaction. Id. at 3, 6:60-7:13. See, e.g., Ex. 1020 ¶ 30.
`
`The DocuCard disclosed in ’235 Stefik implements the functionality of a “re-
`
`pository,” described in more detail in U.S. Patent No. 5,629,980 (“’980 Stefik,” pub-
`
`lished May 13, 1997).8 See Ex. 1013 at 2:48-52, 4:35-40. The ’980 Stefik specification
`
`8 ’235 Stefik incorporates ’980 Stefik by reference. See Ex. 1113 at 2:47-52.
`
`
`
`12
`
`

`
` Covered Business Method Patent Review
`United States Patent No. 8,033,458
`
`disclosed a repository having a processing means that provides the functions of the
`
`repository by executing code stored in a processor memory. Ex. 1014 at Figure 12,
`
`14:15-27. The repository also includes a content storage for storing content and a de-
`
`scription storage, which may be the same memory or a physically different memory
`
`device, for storing description trees for the associated content. Id. at Figure 12, 14:28-
`
`35. A description file includes an identifier for its associated digital work and a point-
`
`er to the starting address in memory at which the work is stored. Id. at Figure 7, 9:54-
`
`58. The identifier includes both a number identifying the work and a unique number
`
`identifying the repository that is assigned upon manufacture of the device. Id. at Fig-
`
`ure 7, 9:62-66. See, e.g., Ex. 1020 ¶¶ 29-33.
`
`The stored descriptions include a “rights portion” that indicates the “granted
`
`usage rights and their status data….” Ex. 1014 at Figures 7 and 10, 9:59-10:1, 10:24-
`
`33, Table 1. The usage rights associated with a digital work “define how that digital
`
`work may be transferred, used, performed, or played.” Id. at 19:14-15. When a digital
`
`work is transferred between repositories or used, a “next set of rights” can track and
`
`update the rights remaining on the digital work. Id. at Figure 15, 11:40-44, 19:58-20:2,
`
`20:55-67. The updated rights may limit usage of the digital work, for example by set-
`
`ting a limit on the number of copies of a digital work that may be loaned out or
`
`viewed at one time. Id. 21:10-24. See, e.g., Ex. 1020 ¶¶ 29-33.
`
`
`
`13
`
`

`
` Covered Business Method Patent Review
`United States Patent No. 8,033,458
`
`As Stefik disclosed, attaching fee specifications to digital content allows a varie-
`
`ty of distribution and fee schemes to be created, including creating special deals or re-
`
`bates for specified users. Ex. 1014 at 43:46-49. Examples of fee specifications in-
`
`clude discounts, incentives paid to users, or best price specifications that “accommo-
`
`date special deals, rebates, and pricing that depends on information that is not availa-
`
`ble to the repository.” Id. at 23:60-24:25, 24:34-57. The fee specifications “can be
`
`combined with tickets or authorizations that could indicate that the consumer is a
`
`wholesaler or that he is a preferred customer” in which case when the transaction is
`
`reconciled and “any excess amount will be returned to the consumer in a separate
`
`transaction.” Id. 24:39-47. See, e.g., Ex. 1020 ¶ 31. A POSA would have understood
`
`that these fee specifications (e.g., reward data) could be modified in response to other
`
`data. See, e.g., Ex. 1020 ¶ 31.
`
`In addition to changing fee specifications, Stefik disclosed that repositories may
`
`also change or create the digital works by editing or merging multiple digital works in-
`
`to a “composite work” that has distinguishable parts, each with its own rights and fees
`
`attached. Ex. 1014 at 50:41-44. An example of a composite work is a collection of
`
`digital works combined into one content item. Id. at 6:39-42. The repositories in
`
`Stefik include code (like the claimed “synthesis code”) that supports extraction, em-
`
`bedding, and editing functions that allow the user to add shells or portions of digital
`
`
`
`14
`
`

`
`works to each other to create new works. Id. at 39:56-41:39. See, e.g., Ex. 1020 ¶¶ 29-
`
` Covered Business Method Patent Review
`United States Patent No. 8,033,458
`
`
`34.
`
`In another example, U.S. Patent No. 5,915,019 (“Ginter,” published June 22,
`
`1999) disclosed a Virtual Distribution Environment (“VDE”) with flexibility to sup-
`
`port different transactions among content producers and consumers wishing to obtain
`
`rights to use programs from the producers. Ex. 1015 at Figure 1, 53:38-59. The
`
`VDE distributes content among “electronic appliances,” which include computers, set
`
`top boxes, phones, and “smart” credit cards. Id. at Figure 8, 60:18-30. In some em-
`
`bodiments, the electronic appliance is portable, for example implemented as a
`
`PCMCIA card or “smart card.” Id. at Figure 71, 228:36-54, 230:20-38. The portable
`
`appliance may contain memory storing information which uniquely identifies each de-
`
`vice for authentication and verification. Id. at 229:12-17. The electronic appliances
`
`store VDE content and code for operating VDE functions in a secondary storage of
`
`the appliance that is accessible by a CPU or SPU (“Secure Processing Unit”). Id. at
`
`Figure 8, 62:56-67. The VDE protects content distributed among appliances by im-
`
`plementing flexible “rules and controls” that are used to grant users specific rights,
`
`specify how much is to be paid for content usage, and establish usage reporting re-
`
`quirements. Id. at 56:25-61. The rules and controls either travel with the content to
`
`which they apply or are delivered to a user separately from content. Id. at 57:27-40.
`
`See, e.g., Ex. 1020 ¶¶ 48-51.
`
`
`
`15
`
`

`
` Covered Business Method Patent Review
`United States Patent No. 8,033,458
`
`The secure data management functions of electronic appliances are performed
`
`by a processing unit, such as an SPU. Ex. 1015 at Figure 8, 63:27-31. The functions
`
`performed by an SPU include “secure data management processes including govern-
`
`ing usage of, auditing of, and where appropriate, payment for VDE objects 300
`
`(through the use of prepayments, credits, real-time electronic debits from bank ac-
`
`counts and/or VDE node currency token deposit accounts).” Id. at 63:34-41. The
`
`processes performed by the SPU, and dictated by the rules and controls, include
`
`“events” processes, “meter” processes, “billing” processes, and “budget” processes
`
`that track and control use of and payment for VDE content. Id. at 57:50-58:32. A
`
`VDE appliance employs a “usage map” to store usage history information, for exam-
`
`ple by mapping which content or parts of a piece of content (e.g., chapters in a book) a
`
`user accesses. Id. at 145:48-146:22. See, e.g., Ex. 1020 ¶¶ 48-51.
`
`A POSA would have appreciated the need to monitor and control usage of dis-
`
`tributed digital content to ensure that usage was properly paid for and that the distr

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket