throbber
Paper 7
`Entered: November 10, 2015
`
`Trials@uspto.gov
`Tel: 571-272-7822
`
`
`
`UNITED STATES PATENT AND TRADEMARK OFFICE
`
`_______________
`
`BEFORE THE PATENT TRIAL AND APPEAL BOARD
`
`_______________
`
`APPLE INC.,
`Petitioner,
`
`v.
`
`SMARTFLASH LLC,
`Patent Owner.
`_______________
`
`Case CBM2015-00123
`Patent 8,033,458 B2
`_______________
`
`
`
`Before JENNIFER S. BISK, RAMA G. ELLURU,
`JEREMY M. PLENZLER, and MATTHEW R. CLEMENTS,
`Administrative Patent Judges.
`
`
`PLENZLER, Administrative Patent Judge.
`
`
`DECISION
`Institution of Covered Business Method Patent Review
`37 C.F.R. § 42.208
`
`
`
`
`
`
`
`

`
`CBM2015-00123
`Patent 8,033,458 B2
`
`
`A. Background
`
` INTRODUCTION
`
`Petitioner, Apple Inc. (“Apple”), filed a Petition requesting covered
`
`business method patent review of claims 2–5, 7, 9, and 12 (the “challenged
`
`claims”) of U.S. Patent No. 8,033,458 (Ex. 1001, “the ’458 patent”) (Paper
`
`2, “Pet.”). On August 13, 2015, Patent Owner, Smartflash LLC
`
`(“Smartflash”), filed a Preliminary Response (Paper 5, “Prelim. Resp.”).
`
`We have jurisdiction under 35 U.S.C. § 324, which provides that a
`
`covered business method patent review may not be instituted “unless . . . it is
`
`more likely than not that at least 1 of the claims challenged in the petition is
`
`unpatentable.”
`
`Upon consideration of the Petition and Preliminary Response, we
`
`determine that Petitioner has demonstrated that it is more likely than not that
`
`the challenged claims are unpatentable. Accordingly, we institute a covered
`
`business method review of claims 2–5, 7, 9, and 12 of the ’458 patent.
`
`B. Asserted Grounds
`
`Petitioner argues that all of the challenged claims are unpatentable
`
`under 35 U.S.C. § 101, as being directed to patent-ineligible subject matter,
`
`and that claims 3–5 also are unpatentable under 35 U.S.C. § 112, ¶ 2 as
`
`indefinite. Pet. 41–75. Petitioner provides a declaration from John P.J.
`
`Kelly, Ph.D. to support its challenges. Ex. 1020 (“the Kelly Declaration”).
`
`C. Related Matters
`
`The parties indicate that the ’458 patent is the subject of the following
`
`district court cases: Smartflash LLC v. Apple Inc., Case No. 6:13-cv-447
`
`(E.D. Tex.); and Smartflash LLC et al. v. Apple Inc., Case No. 6:15-cv-
`
`00145 (E.D. Tex.). Pet. 34; Paper 4, 4–5. The parties also indicate that the
`
`
`
`2
`
`

`
`CBM2015-00123
`Patent 8,033,458 B2
`
`’458 patent is the subject of a number of other district court cases, to which
`
`Petitioner is not a party. Pet. 34; Paper 4, 4.
`
`Petitioner previously filed four petitions for covered business method
`
`patent review of the ’458 Patent: CBM2014-00106, CBM2014-00107
`
`(consolidated with CBM2014-00106), CBM2015-00016, and CBM2015-
`
`00119. A final written decision has issued in CBM2015-00106, determining
`
`claim 1 of the ’458 patent is unpatentable pursuant to § 103. Apple Inc. v.
`
`Smartflash LLC, Case CBM2014-00106, slip op. at 31 (PTAB Sept. 25,
`
`2015) (Paper 52). Trial was instituted in CBM2015-00016 with respect to
`
`claims 1, 6, 8, and 10 based on challenges under 35 U.S.C. § 101, and with
`
`respect to claim 11 based on a challenge under 35 U.S.C. § 112, ¶ 2. Apple
`
`Inc. v. Smartflash LLC, Case CBM2015-00016, slip op. at 26 (PTAB Apr.
`
`10, 2015) (Paper 23). Trial was instituted in CBM2015-00119 with respect
`
`to claim 11 based on a challenge under 35 U.S.C. § 101, and that proceeding
`
`was consolidated with CBM2014-00192. Apple Inc. v. Smartflash LLC,
`
`Case CBM2015-00119, slip op. at 6 (PTAB Aug. 6, 2015) (Paper 11).
`
`D. The ’458 Patent
`
`The ’458 patent relates to “a portable data carrier for storing and
`
`paying for data and to computer systems for providing access to data to be
`
`stored,” and the “corresponding methods and computer programs.”
`
`Ex. 1001, 1:21–25. Owners of proprietary data, especially audio recordings,
`
`have an urgent need to address the prevalence of “data pirates” who make
`
`proprietary data available over the internet without authorization. Id. at
`
`1:29–55. The ’458 patent describes providing portable data storage together
`
`with a means for conditioning access to that data upon validated payment.
`
`
`
`3
`
`

`
`CBM2015-00123
`Patent 8,033,458 B2
`
`Id. at 1:59–2:11. This combination allows data owners to make their data
`
`available over the internet without fear of data pirates. Id. at 2:11–15.
`
`As described, the portable data storage device is connected to a
`
`terminal for internet access. Id. at 1:59–67. The terminal reads payment
`
`information, validates that information, and downloads data into the portable
`
`storage device from a data supplier. Id. The data on the portable storage
`
`device can be retrieved and output from a mobile device. Id. at 2:1–5.
`
`The ’458 patent makes clear that the actual implementation of these
`
`components is not critical and may be implemented in many ways. See, e.g.,
`
`id. at 25:49–52 (“The skilled person will understand that many variants to
`
`the system are possible and the invention is not limited to the described
`
`embodiments.”).
`
`E. Illustrative Claim
`
`As noted above, Petitioner challenges claims 2–5, 7, 9, and 12.
`
`Claims 3, 4, and 5 are independent. Claim 2 depends from claim 1, and
`
`claims 7, 9, and 12 depend from claim 6. Claim 4 is illustrative of the
`
`claimed subject matter and is reproduced below:
`
`4.
`
`A portable data carrier, comprising:
`
`an interface for reading and writing data from and to the
`carrier;
`
`non-volatile data memory, coupled to the interface, for
`storing data on the carrier;
`
`non-volatile payment data memory, coupled to the
`interface, for providing payment data to an external device;
`
`a program store storing code implementable by a
`processor; and
`
`a processor, coupled to the content data memory, the
`payment data memory, the interface and to the program store
`for implementing code in the program store;
`
`
`
`4
`
`

`
`CBM2015-00123
`Patent 8,033,458 B2
`
`
`wherein the portable data carrier is configured for storing
`supplementary data in said data memory, and further
`comprising code to output the supplementary data from the
`interface in addition to the stored data, in response to an
`external request to read the data memory, and
`
`wherein the code comprises code to output payment data
`from the payment data memory to the interface and code to
`provide external access to the data memory.
`
`Ex. 1001, 26:36–55.
`
`
`
`A. Claim Construction
`
`ANALYSIS
`
`In a covered business method patent review, claim terms are given
`
`their broadest reasonable interpretation in light of the specification in which
`
`they appear and the understanding of others skilled in the relevant art. See
`
`37 C.F.R. § 42.300(b). Applying that standard, we interpret the claim terms
`
`of the ’458 patent according to their ordinary and customary meaning in the
`
`context of the patent’s written description. See In re Translogic Tech., Inc.,
`
`504 F.3d 1249, 1257 (Fed. Cir. 2007). Petitioner proposes constructions for
`
`“payment data,” “supplementary data,” and “use rules data” (Pet. 38–40),
`
`and Patent Owner offers no proposed claim constructions. For purposes of
`
`this Decision, we determine that “payment data” is the only term requiring
`
`an express construction in order to conduct properly our analysis.1
`
`The term “payment data” is recited in claims 2–5. Petitioner asserts
`
`that “[f]or review purposes, [payment data] should be construed to mean
`
`
`1 Petitioner makes certain contentions regarding the definiteness of the term
`“supplementary data” in its discussion of claim construction (Pet. 40 n.17),
`but does not include this term in its challenges based on indefiniteness (see
`id. at 71–75).
`
`
`
`5
`
`

`
`CBM2015-00123
`Patent 8,033,458 B2
`
`‘data representing payment made for requested content data’ and is distinct
`
`from ‘access control data.’” Pet. 38–39.
`
`The plain and ordinary meaning of the two words that make up the
`
`term—“payment” and “data”—do not incorporate any notion of time and
`
`nothing about their combination changes that determination. As used in the
`
`’458 patent, “payment data” encompasses data relating to future, current,
`
`and past payments. For example, the ’458 patent states that “payment data
`
`for making a payment to the system owner is received from the smart Flash
`
`card by the content access terminal and forwarded to an e-payment system.”
`
`Ex. 1001, 20:59–62. This language indicates that payment data exists prior
`
`to the payment being made for the requested content. The ’458 patent also
`
`explains that “payment data received may either be data relating to an actual
`
`payment made to the data supplier, or it may be a record of a payment made
`
`to an e-payment system.” Ex. 1001, 6:60–63. This indicates that “payment
`
`data,” includes data for payments that have already been made.
`
`Moreover, the plain and ordinary meaning of data does not implicate
`
`changes in character based on when it is used in a transaction. For example,
`
`a credit card number may qualify as “data relating to payment” before the
`
`number is processed, while the number is being processed, and after the
`
`number is processed. See Ex. 1015, 232:14–24 (providing credit or debit
`
`card information to a retail terminal). Thus, without an express description
`
`to the contrary, we presume that “payment data” retains the same meaning
`
`before, during, and after the payment operation. Neither party points to any
`
`such contrary description. In fact, the ’458 patent describes “payment data”
`
`in several instances as data relating to payment for the requested data item.
`
`Ex. 1001, 10:8–8, 10:28–30, 10:40–41.
`
`
`
`6
`
`

`
`CBM2015-00123
`Patent 8,033,458 B2
`
`
`For purposes of this decision, we determine that the broadest
`
`reasonable interpretation of “payment data” as used in the ’458 patent is
`
`“data relating to payment for the requested data item.”
`
`B. Covered Business Method Patent
`
`Section 18 of the AIA provides for the creation of a transitional
`
`program for reviewing covered business method patents. A “covered
`
`business method patent” is a patent that “claims a method or corresponding
`
`apparatus for performing data processing or other operations used in the
`
`practice, administration, or management of a financial product or service,
`
`except that the term does not include patents for technological inventions.”
`
`AIA § 18(d)(1); see 37 C.F.R. § 42.301(a). A patent need have only one
`
`claim directed to a covered business method to be eligible for review. See
`
`Transitional Program for Covered Business Method Patents—Definitions of
`
`Covered Business Method Patent and Technological Invention; Final Rule,
`
`77 Fed. Reg. 48,734, 48,736 (Aug. 14, 2012) (“CBM Rules”) (Comment 8).
`
`We previously have determined that the ’458 patent is a “covered
`
`business method patent.” See, e.g., CBM2014-00106, Paper 8, 9–13
`
`(determining that the ’458 patent is eligible for covered business method
`
`patent review based on claim 1). In this Petition, Petitioner cites claim 4 as
`
`the basis for covered business method patent review of the ’458 patent,
`
`which includes limitations similar to those found in claim 1 (e.g., “providing
`
`payment data to an external device”). Pet. 23.
`
`1. Financial Product or Service
`
`Petitioner asserts that claim 4 “concerns a system (corresponding to
`
`methods claimed elsewhere in the patent family) for performing data
`
`processing and other operations used in the practice, administration, or
`
`
`
`7
`
`

`
`CBM2015-00123
`Patent 8,033,458 B2
`
`management of a financial activity and service” because it “expressly recites
`
`code to perform data processing and other operations in connection with
`
`providing and outputting ‘payment data.’” Pet. 27. Based on this record, we
`
`agree with Petitioner that the subject matter recited by claim 4 is directed to
`
`activities that are financial in nature, namely “providing payment data to an
`
`external device,” which is recited in the claim. The transfer of data relating
`
`to payment is a financial activity, and providing for such a transfer amounts
`
`to a financial service. This is consistent with the Specification of the ’458
`
`patent, which confirms claim 4’s connection to financial activities by stating
`
`that the invention “relates to a portable data carrier for storing and paying for
`
`data.” Ex. 1001, 1:21–23. The specification also states repeatedly that the
`
`disclosed invention involves handling payment data. See, e.g., id. at 17:30–
`
`42, 17:49–53.
`
`Patent Owner disagrees that claim 4 satisfies the financial in nature
`
`requirement of AIA § 18(d)(1), arguing that that section should be
`
`interpreted narrowly to cover only technology used specifically in the
`
`financial or banking industry. Prelim. Resp. 49–53. Patent Owner cites to
`
`various portions of the legislative history as support for its proposed
`
`interpretation. Id.
`
`The Federal Circuit has expressly determined, however, that “the
`
`definition of ‘covered business method patent’ is not limited to products and
`
`services of only the financial industry, or to patents owned by or directly
`
`affecting the activities of financial institutions, such as banks and brokerage
`
`houses.” Versata Dev. Grp., Inc. v. SAP America, Inc., 793 F.3d 1306, 1325
`
`(Fed. Cir. 2015). Rather, “it covers a wide range of finance-related
`
`activities.” Id. Further, contrary to Patent Owner’s view of the legislative
`
`
`
`8
`
`

`
`CBM2015-00123
`Patent 8,033,458 B2
`
`history, the legislative history overall indicates that the phrase “financial
`
`product or service” is not limited to the products or services of the “financial
`
`services industry” and is to be interpreted broadly. CBM Rules, 77 Fed.
`
`Reg. at 48,735–36. For example, the “legislative history explains that the
`
`definition of covered business method patent was drafted to encompass
`
`patents ‘claiming activities that are financial in nature, incidental to a
`
`financial activity or complementary to a financial activity.’” Id. (citing 157
`
`Cong. Rec. S5432 (daily ed. Sept. 8, 2011) (statement of Sen. Schumer)).
`
`In addition, Patent Owner asserts that claim 4 is not directed to an
`
`apparatus or method that is financial in nature because claim 4 “omits the
`
`specifics of how payment is made.” Prelim. Resp. 53. We are not
`
`persuaded by this argument because § 18(d)(1) of the AIA does not include
`
`such a requirement, nor does Patent Owner point to any other authority that
`
`makes such a requirement. Id. We determine that because claim 4 recites
`
`“payment data,” the financial in nature requirement of § 18(d)(1) is satisfied.
`
`For the reasons stated above, and based on the particular facts of this
`
`proceeding, we conclude that the ’458 patent includes at least one claim that
`
`meets the financial in nature requirement of § 18(d)(1) of the AIA.
`
`2. Exclusion for Technological Inventions
`
`Petitioner asserts that claim 4 does not fall within § 18(d)(1)’s
`
`exclusion for “technological inventions.” Pet. 28–34. In particular,
`
`Petitioner argues that claim 4 “does not claim ‘subject matter as a whole
`
`[that] recites a technological feature that is novel and unobvious over the
`
`prior art[] and solves a technical problem using a technical solution.’”
`
`Pet. 28 (quoting 37 C.F.R. § 42.301(b)) (emphases in original).
`
`
`
`9
`
`

`
`CBM2015-00123
`Patent 8,033,458 B2
`
`
`We are persuaded that claim 4 as a whole does not recite a
`
`technological feature that is novel and unobvious over the prior art. The
`
`’458 patent makes clear that the asserted novelty of the invention is not in
`
`any specific improvement of hardware, but in the method of controlling
`
`access to data. For example, the ’458 patent states that “there is an urgent
`
`need to find a way to address the problem of data piracy” (Ex. 1001, 1:52–
`
`55), and provides the example of a “smart Flash card” for a data carrier,
`
`referring to “the ISO (International Standards Organization) series of
`
`standards, including ISO 7810, ISO 7811, ISO 7812, ISO 7813, ISO 7816,
`
`ISO 9992 and ISO 10102” (id. at 17:8–9, 11–15) for further details on smart
`
`cards. Thus, we determine that claim 4 recites merely known technological
`
`features, which indicates that it is not a patent for a technological invention.
`
`See Office Patent Trial Practice Guide, 77 Fed. Reg. 48,756, 48,764 (Aug.
`
`14, 2012).
`
`Patent Owner argues that claim 4 falls within § 18(d)(1)’s exclusion
`
`for “technological inventions” because it is directed towards solving the
`
`technological problem of “storing and outputting supplemental data in/from
`
`a data memory of the portable data carrier” with the technological solution
`
`of
`
`using (1) a data memory, (2) a program store storing code
`implementable by a processor, and (3) a processor, coupled to
`the data memory, for implementing code in the program store,
`such that supplementary data is stored in said data memory and
`output, using code, from the interface in addition to the stored
`data, in response to an external request to read the data
`memory.
`
`Prelim. Resp. 54. We are not persuaded by this argument because, as
`
`Petitioner argues, the problem being solved by claim 4 is a business
`
`
`
`10
`
`

`
`CBM2015-00123
`Patent 8,033,458 B2
`
`problem—data piracy. Pet. 32. For example, the specification states that
`
`“[b]inding the data access and payment together allows the legitimate
`
`owners of the data to make the data available themselves over the internet
`
`without fear of loss of revenue, thus undermining the position of data
`
`pirates.” Ex. 1001, 2:11–15. Thus, based on the particular facts of this
`
`proceeding, we conclude that claim 4 does not recite a technological
`
`invention.
`
`3. Conclusion
`
`In view of the foregoing, we conclude that the ’458 patent is a covered
`
`business method patent under AIA § 18(d)(1) and is eligible for review
`
`using the transitional covered business method patent program.
`
`C. Section 101 Patent-Eligible Subject Matter
`
`Petitioner challenges claims 2–5, 7, 9, and 12 as directed to patent-
`
`ineligible subject matter under 35 U.S.C. § 101. Pet. 41–71. Petitioner
`
`asserts that the challenged claims are directed to an abstract idea without
`
`additional elements that transform it into a patent-eligible application of that
`
`idea (id. at 42–67), triggers preemption concerns (id. at 67–70), and fails the
`
`machine-or-transformation test (id. at 70–71).
`
`Patent Owner disagrees, arguing that the limitations of each of the
`
`challenged claims, taken as a combination, “recite specific ways of using
`
`distinct memories, data types, and use rules that amount to significantly
`
`more than the underlying abstract idea” (Prelim. Resp. 15, 18, 22, 25, 29
`
`(quoting Ex. 2049, 19)), and does not result in inappropriate preemption (id.
`
`at 29–39). Patent Owner also asserts that (1) the Office is estopped from
`
`revisiting the issue of § 101, which was inherently reviewed during
`
`examination (id. at 44); (2) invalidating patent claims via covered business
`
`
`
`11
`
`

`
`CBM2015-00123
`Patent 8,033,458 B2
`
`method patent review is unconstitutional (id. at 44–46); and (3) section 101
`
`is not a ground that may be raised in a covered business method patent
`
`review (id. at 46–48).
`
`1. Abstract Idea
`
`Under 35 U.S.C. § 101, we must first identify whether an invention
`
`fits within one of the four statutorily provided categories of patent-
`
`eligibility: “processes, machines, manufactures, and compositions of
`
`matter.” Ultramercial, Inc. v. Hulu, LLC, 772 F.3d 709, 713–14 (Fed. Cir.
`
`2014). Here, each of the challenged claims recites a “machine,” i.e., a
`
`“portable data carrier” (claims 2–5) or a “data access device” (claims 7, 9,
`
`and 12), under § 101. Section 101, however, “contains an important implicit
`
`exception to subject matter eligibility: Laws of nature, natural phenomena,
`
`and abstract ideas are not patentable.” Alice, 134 S.Ct. 2347, 2354 (2014)
`
`(citing Assoc. for Molecular Pathology v. Myriad Genetics, Inc., 133 S.Ct.
`
`2107, 2116 (2013) (internal quotation marks and brackets omitted)). In
`
`Alice, the Supreme Court reiterated the framework set forth previously in
`
`Mayo Collaborative Services v. Prometheus Laboratories, 132 S.Ct. 1289,
`
`1293 (2012) “for distinguishing patents that claim laws of nature, natural
`
`phenomena, and abstract ideas from those that claim patent-eligible
`
`applications of those concepts.” Alice, 134 S.Ct. at 2355. The first step in
`
`the analysis is to “determine whether the claims at issue are directed to one
`
`of those patent-ineligible concepts.” Id.
`
`Petitioner argues that the challenged claims are directed to the abstract
`
`idea of “payment for and/or controlling access to data based on payment or
`
`rules.” Prelim. Resp. 42. Patent Owner does not dispute that the challenged
`
`claims are directed to an abstract idea. See Id. at 8–41.
`
`
`
`12
`
`

`
`CBM2015-00123
`Patent 8,033,458 B2
`
`
`We are persuaded that the challenged claims are more likely than not
`
`drawn to a patent-ineligible abstract idea. As discussed above, the ’458
`
`patent discusses addressing recording industry concerns of data pirates
`
`offering unauthorized access to widely available compressed audio
`
`recordings. Ex. 1001, 1:20–55. The ’458 patent proposes to solve this
`
`problem by restricting access to data on a device based upon satisfaction of
`
`use rules linked to payment data. Id. at 9:7–25. The ’458 patent makes clear
`
`that the heart of the claimed subject matter is restricting access to stored data
`
`based on supplier-defined access rules and payment data. Id. at Abstract,
`
`1:59–2:15. We are, thus, persuaded, on this record, that the claimed device
`
`is directed to an abstract idea. See Alice, 134 S.Ct. at 2356 (holding that the
`
`concept of intermediated settlement at issue in Alice was an abstract idea);
`
`Accenture Global Servs., GmbH v. Guidewire Software, Inc., 728 F.3d 1336,
`
`1344 (Fed. Cir. 2013) (holding the abstract idea at the heart of a system
`
`claim to be “generating tasks [based on] rules . . . to be completed upon the
`
`occurrence of an event”).
`
`2. Inventive Concept
`
`Turning to the second step of the analysis, we look for additional
`
`elements that can “transform the nature of the claim” into a patent-eligible
`
`application of an abstract idea. Mayo, 132 S.Ct. at 1297. On this record, we
`
`are not persuaded that the challenged claims of the ’458 patent add an
`
`inventive concept sufficient to ensure that the patent in practice amounts to
`
`significantly more than a patent on the abstract idea itself. Alice, 134 S.Ct.
`
`at 2355; see also Accenture Global Servs., 728 F.3d at 1345 (holding claims
`
`directed to the abstract idea of “generating tasks [based on] rules . . . to be
`
`
`
`13
`
`

`
`CBM2015-00123
`Patent 8,033,458 B2
`
`completed upon the occurrence of an event” to be unpatentable even when
`
`applied in a computer environment and within the insurance industry).
`
`Patent Owner argues that the challenged claims are patentable because
`
`they “recite specific ways of using distinct memories, data types, and use
`
`rules that amount to significantly more than the underlying abstract idea.”
`
`Prelim. Resp. 15, 18, 22, 25, 29 (quoting Ex. 2049, 19). Patent Owner,
`
`however, does not elaborate as to how these claim limitations amount to
`
`significantly more than the underlying abstract idea. The specification treats
`
`as well-known all potentially technical aspects of the claims, including
`
`“interface,” “data memory,” “program store,” “processor,” “data carrier,”
`
`and the various “code to” limitations recited in the challenged claims. The
`
`linkage of existing hardware devices to existing payment validation
`
`processes and supplier-defined access rules appear to be “‘well-understood,
`
`routine, conventional activit[ies]’ previously known to the industry.” Alice,
`
`134 S.Ct. at 2359; Mayo, 132 S.Ct. at 1294.
`
`Patent Owner also asserts that the challenged claims are like those in
`
`DDR Holdings, which the Federal Circuit held were directed to statutory
`
`subject matter because “‘the claimed solution is necessarily rooted in
`
`computer technology in order to overcome a problem specifically arising in
`
`the realm of computer networks.’” Prelim. Resp. 10 (quoting DDR
`
`Holdings, LLC v. Hotels.Com, LP., 773 F.3d 1245, 1257 (Fed. Cir. 2014)).
`
`According to Patent Owner, the challenged claims overcome the problem of
`
`“digital data piracy,” “‘a challenge particular to the Internet.’” Prelim. Resp.
`
`11 (quoting DDR Holdings, 773 F.3d at 1257).
`
`We are not persuaded that the challenged claims are like those at issue
`
`in DDR Holdings. In DDR Holdings, the Federal Circuit found that the
`
`
`
`14
`
`

`
`CBM2015-00123
`Patent 8,033,458 B2
`
`challenged claims were directed to patentable subject matter because they
`
`“specif[ied] how interactions with the Internet are manipulated to yield a
`
`desired result—a result that overrides the routine and conventional sequence
`
`of events triggered by the click of a hyperlink.” 773 F.3d at 1258. We are
`
`not persuaded that the challenged claims specify interactions that depart
`
`from the routine use of the recited devices. Instead, we determine, based on
`
`the current record, that the claims merely apply conventional computer
`
`processes to restrict access to data based on payment.
`
`The differences between the challenged claims and those at issue in
`
`DDR Holdings are made clear by Patent Owner in its tables mapping the
`
`challenged claims of the ’458 patent to claim 19 of the patent at issue in
`
`DDR Holdings. Prelim. Resp. 12–28. For example, claim 5 of the ’458
`
`patent recites “synthesis code to receive a first portion of data from the
`
`interface and to combine the first portion with a second portion of data
`
`stored in the data memory and to store the result in the data memory.” There
`
`is no language in this, or any other, limitation of claim 5, any of the other
`
`challenged claims, or the specification of the ’458 patent, that demonstrates
`
`that the generic computer components function in an unconventional manner
`
`or employ sufficiently specific programming. Instead, this limitation, like
`
`all the other limitations of the challenged claims, is “specified at a high level
`
`of generality,” which the Federal Circuit has found to be “insufficient to
`
`supply an ‘inventive concept.’” Ultramercial, 772 F.3d at 716.
`
`The limitation of claim 19 in DDR Holdings, which Patent Owner
`
`contends corresponds to the “synthesis code to” limitation from claim 5 of
`
`the ’458 patent, recites “using the data retrieved, automatically generate and
`
`transmit to the web browser a second web page that displays:
`
`
`
`15
`
`

`
`CBM2015-00123
`Patent 8,033,458 B2
`
`(A) information associated with the commerce object associated with the
`
`link that has been activated, and (B) the plurality of visually perceptible
`
`elements visually corresponding to the source page.” Prelim. Resp. 14–15.
`
`It was this limitation from claim 19 in DDR Holdings, according to the
`
`Federal Circuit, that specifies “how interactions with the Internet are
`
`manipulated to yield a desired result—a result that overrides the routine and
`
`conventional sequence of events ordinarily triggered by the click of a
`
`hyperlink.” 773 F.3d at 1258. Importantly, the Federal Circuit identified
`
`this limitation as differentiating the DDR Holdings claims from those held to
`
`be unpatentable in Ultramercial, which “broadly and generically claim ‘use
`
`of the Internet’ to perform an abstract business practice (with insignificant
`
`added activity).” Id.
`
`On this record, we are persuaded that Petitioner has shown that it is
`
`more likely than not that claims 2–5, 7, 9, and 12 of the ’458 patent do not
`
`add an inventive concept sufficient to ensure that the patent in practice
`
`amounts to significantly more than a patent on the abstract idea itself. Alice,
`
`134 S.Ct. at 2355; see also Accenture, 728 F.3d at 1345 (holding claims
`
`directed to the abstract idea of “generating tasks [based on] rules . . . to be
`
`completed upon the occurrence of an event” to be unpatentable even when
`
`applied in a computer environment and within the insurance industry).
`
`3. Preemption
`
`Petitioner argues that “the challenged claims’ attempt to achieve
`
`broad functional coverage—with no relative contribution from the named
`
`inventors—firmly triggers preemption concerns.” Pet. 68. Patent Owner
`
`responds that the challenged claims do not result in inappropriate
`
`preemption. Prelim. Resp. 29–39. According to Patent Owner, the claims of
`
`
`
`16
`
`

`
`CBM2015-00123
`Patent 8,033,458 B2
`
`the ’458 patent recite “specific ways of managing access to digital content
`
`data based on payment validation through storage and retrieval of use status
`
`data and use rules in distinct memory types and evaluating the use data
`
`according to use rules.” Id. at 30 (quoting Ex. 2049, 20). Patent Owner also
`
`asserts that the existence of a large number of non-infringing alternatives
`
`shows that the claims of the ’458 patent do not raise preemption concerns.
`
`Id. at 35–36.
`
`Patent Owner’s preemption argument does not alter our § 101
`
`analysis. The Supreme Court has described the “pre-emption concern” as
`
`“undergird[ing] our § 101 jurisprudence.” Alice, 134 S.Ct. at 2358. The
`
`concern “is a relative one: how much future innovation is foreclosed relative
`
`to the contribution of the inventor.” Mayo, 132 S.Ct. at 1303. “While
`
`preemption may signal patent ineligible subject matter, the absence of
`
`complete preemption does not demonstrate patent eligibility.” See Ariosa
`
`Diagnostics, Inc. v. Sequenom, Inc., 788 F.3d 1371, 1379 (Fed. Cir. 2015).
`
`Importantly, the preemption concern is addressed by the two part test
`
`considered above. After all, every patent “forecloses ... future invention” to
`
`some extent, Mayo, 132 S.Ct. at 1292, and, conversely, every claim
`
`limitation beyond those that recite the abstract idea limits the scope of the
`
`preemption. Ariosa, 788 F.3d at 1379 (“The Supreme Court has made clear
`
`that the principle of preemption is the basis for the judicial exception to
`
`patentability. For this reason, questions on preemption are inherent in and
`
`resolved by the § 101 analysis.”).
`
`The two-part test elucidated in Alice and Mayo does not require us to
`
`anticipate the number, feasibility, or adequacy of non-infringing alternatives
`
`to gauge a patented invention’s preemptive effect in order to determine
`
`
`
`17
`
`

`
`CBM2015-00123
`Patent 8,033,458 B2
`
`whether a claim is patent-eligible under § 101. The relevant precedents
`
`simply direct us to ask whether the claim involves one of the patent-
`
`ineligible categories, and, if so, whether additional limitations contain an
`
`“inventive concept” that is “sufficient to ensure that the claim in practice
`
`amounts to ‘significantly more’ than a patent on an ineligible concept.”
`
`DDR Holdings, 773 F.3d at 1255. This is the basis for the rule that the
`
`unpatentability of abstract ideas “cannot be circumvented by attempting to
`
`limit the use of the formula to a particular technological environment,”
`
`despite the fact that doing so reduces the amount of innovation that would be
`
`preempted. Diamond v. Diehr, 450 U.S. 175, 191; see also Alice, 134 S.Ct.
`
`at 2358; Mayo, 132 S.Ct. at 1303; Bilski v. Kappos, 561 U.S. 593, 612
`
`(2010); Parker v. Flook, 437 U.S. 584, 593 (1978). The Federal Circuit
`
`spelled this out, stating that “[w]here a patent’s claims are deemed only to
`
`disclose patent ineligible subject matter under the Mayo framework, as they
`
`are in this case, preemption concerns are fully addressed and made moot.”
`
`Ariosa, 788 F.3d at 1379. Patent Owner argues that Ariosa does not apply
`
`here because the claims and facts are distinguishable. Prelim. Resp. 36–39.
`
`Although the facts and claims in this case certainly differ from those in
`
`Ariosa, we are not persuaded by Patent Owner’s arguments that the general
`
`principle described by the Federal Circuit in that case does not apply here.
`
`As described above, after applying this two-part test, we are
`
`persuaded that Petitioner has shown that it is more likely than not that the
`
`challenged claims of the ’458 patent are drawn to an abstract idea that does
`
`not add an inventive concept sufficient to ensure that the patent in practice
`
`amounts to significantly more than a patent on the abstract idea itself. The
`
`alleged existence of a large number of non-infringing, and, thus, non-
`
`
`
`18
`
`

`
`CBM2015-00123
`Paten

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket