throbber
EXHIBIT 1012
`
`
`
`EXHIBIT 1012EXHIBIT 1012
`
`
`
`
`
`TO PETITIONER GOOGLE INC.’STO PETITIONER GOOGLE INC.’S
`
`
`
`PETITION FOR COVERED BUSINESSPETITION FOR COVERED BUSINESS
`
`
`
`METHOD REVIEW OFMETHOD REVIEW OF
`
`TO PETITIONER GOOGLE INC.’S
`PETITION FOR COVERED BUSINESS
`METHOD REVIEW OF
`U.S. PATENT NO. 7,334,720
`
`U.S. PATENT NO. 7,334,720U.S. PATENT NO. 7,334,720
`
`
`
`
`
`

`
`Case 6:13-cv-00448-KNM Document 175 Filed 06/13/14 Page 1 of 43 PageID #: 3407
`
`IN THE UNITED STATES DISTRICT COURT
`FOR THE EASTERN DISTRICT OF TEXAS
`TYLER DIVISION
`
`SMARTFLASH LLC, et al.,
`
`
`
`Plaintiffs,
`
`
`v.
`
`APPLE, INC., et al.,
`
`Defendants.
`
`
`
`
`
`
`
`
`
`
`
`
`
`Case No. 6:13-cv-00447-KNM
`
`JURY TRIAL DEMANDED
`
`Case No. 6:13-CV-00448-KNM
`
`JURY TRIAL DEMANDED
`
`
`
`SMARTFLASH LLC, et al.,
`
`Plaintiffs,
`
`
`
`v.
`
`SAMSUNG ELECTRONICS CO.,
`LTD., et al.,
`
`Defendants.
`
`
`PLAINTIFFS SMARTFLASH LLC’S AND SMARTFLASH
`TECHNOLOGIES LIMITED’S OPENING CLAIM CONSTRUCTION BRIEF
`
`
`
`
`
`
`
`Google Exhibit 1012 Page 00001
`
`

`
`Case 6:13-cv-00448-KNM Document 175 Filed 06/13/14 Page 2 of 43 PageID #: 3408
`
`
`
`
`I.
`
`II.
`
`III.
`
`IV.
`
`TABLE OF CONTENTS
`Introduction ..........................................................................................................................1
`
`Technology Background ......................................................................................................1
`
`Applicable Law ....................................................................................................................3
`
`Argument .............................................................................................................................4
`
`A.
`
`B.
`
`C.
`
`D.
`
`“payment data” .........................................................................................................4
`
`“payment validation system” ...................................................................................7
`
`1.
`
`2.
`
`excludes
`improperly
`proposal
`Defendants’
`embodiments. ...............................................................................................7
`
`unnecessary
`imports
`proposal
`Defendants’
`functional requirements into the claims. ......................................................9
`
`“payment validation data” ......................................................................................11
`
`“content data memory” “non-volatile data memory”
`“memory … for storing data” “memory configured to store
`… content” “parameter memory” “use rule memory” ...........................................12
`
`E.
`
`“data carrier” ..........................................................................................................17
`
`1.
`
`2.
`
`3.
`
`4.
`
`A data carrier is not limited to a “removable smart
`card or integrated circuit (IC) card.” ..........................................................18
`
`A data carrier is not limited to a “having two or
`more separate non-volatile memories, for storing
`both payment data and content data.” ........................................................20
`
`A data carrier is “for storing both payment data and
`content data.” .............................................................................................20
`
`A data carrier is not required to “incorporate[e] a
`processor.” .................................................................................................21
`
`F.
`
`G.
`
`H.
`
`“portable data carrier” ............................................................................................22
`
`“use rule(s)” “use rule(s) data” “data use rule data” ..............................................23
`
`“access rule(s)” ......................................................................................................24
`
`1.
`
`Use/access rules need not be “separately stored”
`from content. ..............................................................................................24
`
`i
`
`
`Page 00002
`
`

`
`Case 6:13-cv-00448-KNM Document 175 Filed 06/13/14 Page 3 of 43 PageID #: 3409
`
`2.
`
`3.
`
`Defendants’ proposed “indicating permissible
`use…” and “specifying under what conditions…”
`limitations
`are unnecessary
`and potentially
`confusing. ...................................................................................................26
`
`Defendants’ reference to a “content data item” is
`confusing. ...................................................................................................26
`
`“use status data” .....................................................................................................26
`
`“said code to control access permitting access to said
`second selected one or more items of retrieved multimedia
`content” ..................................................................................................................28
`
`“the card” ...............................................................................................................31 
`
`Alleged Means Plus Function Terms .....................................................................33 
`
`I.
`
`J.
`
`K.
`
`L.
`
`Conclusion .........................................................................................................................35
`
`
`
`V. 
`
`
`
`ii
`
`
`Page 00003
`
`

`
`Case 6:13-cv-00448-KNM Document 175 Filed 06/13/14 Page 4 of 43 PageID #: 3410
`
`TABLE OF AUTHORITIES
`
`
`Alloc, Inc. v. Int'l Trade Comm’n,
` 342 F.3d 1361 (Fed. Cir. 2003)................................................................................................... 3
`
`Becton, Dickinson & Co. v. Tyco Healthcare Grp., LP,
` 616 F.3d 1249 (Fed. Cir. 2010)................................................................................... 5, 6, 14, 25
`
`Bose Corp. v. JBL, Inc.,
` 274 F.3d 1354 (Fed. Cir. 2001)................................................................................................. 31
`
`C.R. Bard, Inc. v. U.S. Surgical Corp.,
` 388 F.3d 858 (Fed. Cir. 2004)..................................................................................................... 3
`
`Cannon Rubber Ltd. v. First Years, Inc.,
` 163 Fed. Appx. 870 (Fed. Cir. 2005) .................................................................................... 6, 13
`
`Catalina Mktg. Int’l, Inc. v. Coolsavings.com, Inc.,
` 289 F.3d 801 (Fed. Cir. 2002)................................................................................................... 11
`
`Cheetah Omni LLC v. Alcatel-Lucent Inc.,
` 939 F.Supp.2d 649 (E.D. Tex. Apr. 11, 2013) .......................................................................... 29
`
`Comark Commc’ns, Inc. v. Harris Corp.,
` 156 F.3d 1182 (Fed. Cir. 1998)............................................................................................. 3, 20
`
`Constant v. Advanced Micro–Devices, Inc.,
` 848 F.2d 1560 (Fed. Cir. 1988)................................................................................................... 3
`
`Cordis Corp. v. Medtronic AVE, Inc.,
` 339 F.3d 1352 (Fed. Cir. 2003)................................................................................................. 15
`
`Energizer Holdings, Inc. v. International Trade Com’n,
` 435 F.3d 1366 (Fed. Cir. 2006)........................................................................................... 29, 31
`
`Epistar Corp. v. Int’l Trade Comm’n,
` 566 F.3d 1321 (Fed. Cir. 2009)................................................................................................... 4
`
`Golight, Inc. v. Wal–Mart Stores, Inc.,
` 355 F.3d 1327 (Fed. Cir. 2004)................................................................................................. 15
`
`In Spine Solutions, Inc. v. Medtronic Sofamor Danek USA, Inc.,
` 620 F.3d 1305 (Fed. Cir. 2010)................................................................................................... 4
`
`Innova/Pure Water Inc. v. Safari Water Filtration Sys., Inc.,
` 381 F.3d 1111 (Fed. Cir. 2004)) ................................................................................................. 3
`

`
`iii 
`
`Page 00004
`
`

`
`Case 6:13-cv-00448-KNM Document 175 Filed 06/13/14 Page 5 of 43 PageID #: 3411
`
`
`Intellectual Property Development, Inc. v. UAColumbia Cablevision,
` 336 F.3d 1308 (Fed. Cir. 2003)............................................................................................. 6, 13
`
`Invitrogen Corp. v. Clontech Labs., Inc.,
` 429 F.3d 1052 (Fed. Cir. 2005)..................................................................................... 16, 20, 25
`
`Liebel–Flarsheim Co. v. Medrad, Inc.,
` 358 F.3d 898 (Fed. Cir. 2004)................................................................................................... 10
`
`Luv N' Care, Ltd. v. Koninklijke Philips Electronics N.V.,
` No. 2:11-CV-512, 2013 WL 3471269 (E.D. Tex. July 9, 2013) .............................................. 31
`
`Nautilus, Inc. v. Biosig Instruments, Inc.,
` 134 S. Ct. 2120 (2014) .................................................................................................. 28, 29, 31
`
`Novo Indus., L.P. v. Micro Molds Corp.,
` 350 F.3d 1348 (Fed. Cir. 2003)................................................................................................. 31
`
`Omega Engineering, Inc. v. Raytek,
` 334 F.3d 1314 (Fed. Cir. 2003)........................................................................................... 15, 25
`
`Paragon Solutions, LLC v. Timex Corp.,
` 566 F.3d 1075 (Fed. Cir. 2009)................................................................................................. 11
`
`Phillips v. AWH Corp.,
` 415 F.3d 1303 (Fed. Cir. 2005)....................................................................................... 3, 10, 17
`
`ResQNet.com, Inc. v. Lansa, Inc.,
` 346 F.3d 1374 (Fed. Cir. 2003)........................................................................................... 16, 20
`
`SanDisk Corp. v. Memorex Products, Inc.,
` 415 F.3d 1278 (Fed. Cir. 2005)................................................................................................. 15
`
`Saunders Group, Inc. v. Comfortrac, Inc.,
` 492 F.3d 1326 (Fed. Cir. 2007)................................................................................................. 16
`
`Tele-Cons, Inc. v. General Elec. Co.,
` 6:10-CV-451 LED-JDL, 2012 WL 3112299 (E.D. Tex. Jul. 31, 2012) ................................... 29
`
`Teleflex, Inc. v. Ficosa N. Am. Corp.,
` 299 F.3d 1313 (Fed. Cir. 2002)........................................................................................... 17, 18
`
`Thorner v. Sony Computer Entm’t Am. LLC,
` 669 F.3d 1362 (Fed. Cir. 2012)................................................................................................... 3
`
`

`
`iv 
`
`Page 00005
`
`

`
`Case 6:13-cv-00448-KNM Document 175 Filed 06/13/14 Page 6 of 43 PageID #: 3412
`
`TracBeam, L.L.C. v. AT & T, Inc.,
` 6:11-CV-96, 2013 WL 250532 (E.D. Tex. Jan. 23, 2013) ....................................................... 31
`
`Ventana Med. Sys. v. Biogenex Labs.,
` 473 F.3d 1173 (Fed. Cir. 2006)..................................................................................... 16, 20, 25
`
`Statutes
`
`35 U.S.C. § 112 ........................................................................................................... 28, 29, 33, 35
`
`Other Authorities
`
`MPEP § 2173.05(e) ................................................................................................................. 29, 31
`
`   
`

`
`v 
`
`Page 00006
`
`

`
`Case 6:13-cv-00448-KNM Document 175 Filed 06/13/14 Page 7 of 43 PageID #: 3413
`
`
`I.
`
`INTRODUCTION
`
`A consistent theme emerges from the parties’ competing constructions. Smartflash’s
`
`proposals give full scope to the claim language, as firmly supported by the intrinsic evidence.
`
`Defendants’ proposed constructions seek to limit the claims to certain preferred embodiments
`
`while excluding others. Smartflash respectfully requests that the Court adopt its proposals as
`
`supported by the intrinsic and extrinsic evidence and the canons of claim construction.
`
`II.
`
`TECHNOLOGY BACKGROUND
`
`The patents-in-suit all stem from a common specification1 that describes a data supply
`
`system, and various user devices, generally referred to as data access terminals and data access
`
`devices, that may be used by consumers to purchase and use content from the system. A user
`
`can store payment data on these devices and connect to the data supply system to exchange
`
`payment data for downloadable content.
`
`Referring to preferred embodiments, the patents-in-suit disclose that the data supply
`
`system is designed to provide users with a seamless purchase and content delivery experience.
`
`’720 patent at 24:25-24:32. Users are able to purchase content from a variety of different content
`
`providers even if they do not know where the content providers are located or how the content is
`
`delivered. See id. The exemplary system is operated by a “content data supply ‘system owner,’”
`
`who can act as an intermediary between a user seeking to purchase content and content
`
`providers, such as record labels, movie studios, and software providers. See ’720 patent at 14:7-
`
`14:14. When a user accesses the system, he or she is able to select content to purchase or rent
`
`from a variety of different content providers. See ’720 patent at 4:63-5:3. If the user finds a
`
`content item to buy, his or her device will transmit stored “payment data” to a “payment
`
`1 For the Court’s convenience, citations in this brief refer to the specification of the ’720 patent.
`
`1
`
`
`Page 00007
`
`

`
`Case 6:13-cv-00448-KNM Document 175 Filed 06/13/14 Page 8 of 43 PageID #: 3414
`
`validation system” to validate the payment data. See ’720 patent at 8:4-8:6. Once the payment
`
`validation system returns proof that the payment data has been validated, in the form of
`
`“payment validation data,” the user is able to retrieve the purchased content from the content
`
`provider. ’720 patent at 8:6-8:9.
`
`The system owner’s system can also connect to an e-payment system coupled to a bank.
`
`See ’720 patent 13:46-13:47. The e-payment system handles the actual transfer of money. See
`
`’720 patent at 23:27-23:33. If the system owner validates the user’s payment data, using its own
`
`payment validation system, then it may seek reimbursement from the e-payment system at a later
`
`time. See ’720 patent at 13:58-13:62 On the other hand, if the user submits payment data
`
`directly to a payment validation system at the e-payment system, the e-payment system may
`
`validate the payment data and transfer money to the system owner’s account before the system
`
`owner provides the content to the user. See ’720 patent at 23:23-23:28.
`
`In addition to describing a data supply system, the patents describe a variety of user
`
`devices that can be used with the system. For example, a user can purchase content from the
`
`data supply system using a data access terminal and download the content to a “data carrier.”
`
`See ’720 patent at 8:10-12. The patents describe a wide variety of data access terminals—
`
`including mobile communication devices, personal computers, and television set top boxes—as
`
`examples of devices that may be used with the system. See ’720 patent at Fig. 7; 16:1-35. The
`
`patents describe that a data carrier may be a removable memory device, such as a smart card or
`
`memory stick, but they also explain that it can be integrated into a data access terminal, such as a
`
`mobile communications device. See ’720 patent at 4:43-44; 16:6-10. These devices store
`
`content such as music, videos, and software. Id. Access to the content is controlled by access
`
`rules and use rules. See ’720 patent at 4:59-5:3. By using these rules, a content provider can
`
`2
`
`
`Page 00008
`
`

`
`Case 6:13-cv-00448-KNM Document 175 Filed 06/13/14 Page 9 of 43 PageID #: 3415
`
`provide content for sale or rent, or set special rules for accessing certain types of content. Id.
`
`For example, a user could be required to pay extra to unlock an extra level of a game or to
`
`download the rest of the songs on an album. See ’720 patent at 3:16-3:18. The patents-in-suit
`
`cover various aspects of the data supply system and the disclosed user devices.
`
`III. APPLICABLE LAW
`
`“It is a ‘bedrock principle’ of patent law that ‘the claims of a patent define the invention
`
`to which the patentee is entitled the right to exclude.’” Phillips v. AWH Corp., 415 F.3d 1303,
`
`1312 (Fed. Cir. 2005) (en banc) (quoting Innova/Pure Water Inc. v. Safari Water Filtration Sys.,
`
`Inc., 381 F.3d 1111, 1115 (Fed. Cir. 2004)). In claim construction, courts examine the patent’s
`
`intrinsic evidence to define the patented invention’s scope. See id.; C.R. Bard, Inc. v. U.S.
`
`Surgical Corp., 388 F.3d 858, 861 (Fed. Cir. 2004). This intrinsic evidence includes the claims
`
`themselves, the specification, and the prosecution history. See Phillips, 415 F.3d at 1314; C.R.
`
`Bard, Inc., 388 F.3d at 861. Courts give claim terms their ordinary and accustomed meaning as
`
`understood by one of ordinary skill in the art at the time of the invention in the context of the
`
`entire patent. Phillips, 415 F.3d at 1312–13; Alloc, Inc. v. Int'l Trade Comm’n, 342 F.3d 1361,
`
`1368 (Fed. Cir. 2003).
`
` “Although the specification may aid the court in interpreting the meaning of disputed
`
`claim language, particular embodiments and examples appearing in the specification will not
`
`generally be read into the claims.’” Comark Commc’ns, Inc. v. Harris Corp., 156 F.3d 1182,
`
`1187 (Fed. Cir. 1998) (quoting Constant v. Advanced Micro–Devices, Inc., 848 F.2d 1560, 1571
`
`(Fed. Cir. 1988)). Specifically, Courts may not rely on the specification to “redefine words” in
`
`the claim language. See Thorner v. Sony Computer Entm’t Am. LLC, 669 F.3d 1362, 1366-67
`
`(Fed. Cir. 2012). “Only the patentee can do that. To constitute disclaimer, there must be a clear
`
`and unmistakable disclaimer.” Id. “Mere criticism of a particular embodiment encompassed in
`3
`
`
`Page 00009
`
`

`
`Case 6:13-cv-00448-KNM Document 175 Filed 06/13/14 Page 10 of 43 PageID #: 3416
`
`the plain meaning of a claim term is not sufficient to rise to the level of clear disavowal.”
`
`Epistar Corp. v. Int’l Trade Comm’n, 566 F.3d 1321, 1335 (Fed. Cir. 2009) (holding that even a
`
`direct criticism of a particular technique did not rise to the level of clear disavowal). Moreover,
`
`even where a particular structure makes it “particularly difficult” to obtain certain benefits of the
`
`claimed invention, this does not rise to the level of disavowal of the structure. See In Spine
`
`Solutions, Inc. v. Medtronic Sofamor Danek USA, Inc., 620 F.3d 1305, 1315 (Fed. Cir. 2010).
`
`IV. ARGUMENT
`
`A.
`
`“payment data”2 – ’720 claims 11,13, 14, 15; ’317 claims 6, 7, 8, 13, 14, 16, 18;
`’598 claim 7; ’221 claims 2, 11, 14, 32; ’772 claims 5, 10, 14, 22, 26, 32
`
`Smartflash’s Proposal
`data that can be used to make payment for
`content
`
`Defendants’ Proposal
`data, distinct from access control data and
`user identity data, representing either actual
`payment made or record of payment made for
`requested content data
`
`
`The parties agree that the term “payment data” relates to payment for content, but there
`
`are two disputes: (1) whether payment data is used to make a payment or whether it
`
`memorializes a payment that has already been made; and (2) whether the term should be limited
`
`to embodiments where payment data is “distinct from access control data or user identity data.”
`
`The claims of the patents-in-suit make clear that payment data is used to make a
`
`payment. For example, claim 30 of the ’772 patent exemplifies this process:
`
`code responsive to said first user selection of said selected at least
`one content data item to transmit payment data relating to payment
`for said selected at least one content item for validation by a
`payment validation system;
`code to receive payment validation data defining if said payment
`validation system has validated payment for said selected at least
`one content data item;
`
`2 The following list identifies the asserted claims that contain this term, not all claims that
`contain the term.
`
`4
`
`
`Page 00010
`
`

`
`Case 6:13-cv-00448-KNM Document 175 Filed 06/13/14 Page 11 of 43 PageID #: 3417
`
`code responsive to the payment validation data to retrieve said
`selected at least one content data item from a data supplier and to
`write said retrieved at least one content data item into said data
`carrier
`This exemplary claim sets out the order in which payment data is exchanged. First, a user selects
`
`an item of multimedia content to purchase. To purchase the selected content, the data access
`
`terminal transmits payment data to a payment validation system. If the payment validation
`
`system validates the data, then payment validation data is transmitted back to the data access
`
`terminal. In response to receiving payment validation data, the data access terminal retrieves the
`
`content data item that was just purchased. The role of “payment data” in this claim is to make a
`
`payment, and all claims of the patents-in-suit consistently use “payment data” in this way.
`
`The specification also consistently teaches the use of “payment data” to make a payment.
`
`For example, Figure 12c provides an exemplary flow diagram for purchasing content. ’720
`
`patent at 20:8-20:10. The specification explains that during the first step in this process, step
`
`S54, “payment data for making a payment” is transmitted from the data access terminal. See
`
`’720 at 21:15-21:16 (emphasis added). After the payment data is validated, the purchased
`
`content is downloaded to the data access terminal at step S57. See ’720 at 21:44-21:48.
`
`Defendants’ proposal is flawed because it misunderstands the role of “payment data” in
`
`the patents-in-suit. As discussed above, the purpose of payment data is to make a payment for
`
`content—not to represent that a payment has already been made. The claims themselves further
`
`disprove Defendants’ proposed construction. Because claim 30 of the ’772 patent requires a
`
`device to transmit payment data for an item in response to a user selection for the item,
`
`Defendants’ proposal would require a user to pay for an item before selecting it. Otherwise, the
`
`device would not contain the payment data that it needs to transmit in response to the user
`
`selection. The Court should reject this nonsensical result. See Becton, Dickinson & Co. v. Tyco
`
`5
`
`
`Page 00011
`
`

`
`Case 6:13-cv-00448-KNM Document 175 Filed 06/13/14 Page 12 of 43 PageID #: 3418
`
`Healthcare Grp., LP, 616 F.3d 1249, 1255 (Fed. Cir. 2010) (“A claim construction that renders
`
`asserted claims facially nonsensical cannot be correct.”).
`
`Defendants’ proposal is also flawed because it injects a new limitation into the claims by
`
`requiring that payment data must be “distinct from access control data and user identity data.”3
`
`There is nothing in the claims, the specification, or the prosecution history that would support
`
`this construction. The Defendants’ proposed construction simply has no basis in the principles
`
`of claim construction. The claims require that payment data is data that can be used to make a
`
`payment for data. If access control data or user identity data may be used to pay for content,
`
`then this type of data acts as payment data. Cf. Cannon Rubber Ltd. v. First Years, Inc., 163 Fed.
`
`Appx. 870, 877 (Fed. Cir. 2005) (“[T]here is nothing in the . . . specification or the claims that
`
`require the ‘deformable diaphragm’ and ‘valve means’ limitations to be embodied as two
`
`separate structural components. . . . Tellingly, [defendant] does not cite any case law prohibiting
`
`a claim from reciting two limitations embodied by the same structural component.”); Intellectual
`
`Property Development, Inc. v. UAColumbia Cablevision, 336 F.3d 1308, 1320 n. 9 (Fed. Cir.
`
`2003) (“Contrary to Cablevision’s argument, we see no reason why, as a matter of law, one
`
`claim limitation may not be responsive to another merely because they are located in the same
`
`physical structure.”). In sum, the Court should reject Defendants’ proposed construction.
`
`
`3 The term “user identity data” appears only once throughout the patents-in-suit: “This card
`registration data comprises user identity data, access control data, payment system specifying
`data, system owner access data, such as a system owner web page address and other dial-up
`information.” ’720 patent at 19:42-19:46. The term “access control data” appears throughout
`the specification and is described as including a “user ID and a password” for protecting valuable
`information. ’720 patent at 5:29-5:31.
`
`6
`
`
`Page 00012
`
`

`
`Case 6:13-cv-00448-KNM Document 175 Filed 06/13/14 Page 13 of 43 PageID #: 3419
`
`B.
`
`“payment validation system” – ’720 claims 11, 13, 14, and 15; ’221 claims 2,
`11, 14, and 32; ’772 claims 5, 10, 14, 22, 26, and 32
`
`Smartflash’s Proposal
`[no construction necessary]
`
`Alternatively: system that returns payment
`validation data in response to valid payment
`data
`
`Defendants’ Proposal
`system to validate payment data and authorize
`payment
`
` A
`
` person of ordinary skill seeking to understand the meaning of this term need look no
`
`further than the claim language itself. For example, ’772 claim 30 requires that a user device
`
`“transmit payment data relating to payment for said selected at least one content item for
`
`validation by a payment validation system” and “receive payment validation data defining if said
`
`payment validation system has validated payment for said selected at least one content data
`
`item.” See also ’772 patent claims 1, 8, 14, 19, 25, 30. Every other asserted claim that includes
`
`this term confirms that the payment validation system receives payment data, validates the
`
`payment data, and outputs payment validation data. See, e.g., ’720 patent claim 3, ’598 patent
`
`claim 7, ’221 patent claims 1, 32.
`
`Defendants do not dispute this conclusion or assert that any of the words of this term are
`
`ambiguous or unclear. Quite the contrary, the parties all agree that a payment validation system
`
`is a system that validates payment data. Given this fundamental agreement and the clear
`
`description of this term in the claim language, there is no need to construe this term. Defendants
`
`only request construction for this term in an effort to inject a new limitation into the claims—that
`
`the payment validation system also authorize payment.
`
`1.
`
`Defendants’ proposal improperly excludes embodiments.
`
`While Defendants’ proposal provides no insight into their intended meaning of the phrase
`
`“authorize payment,” Defendants no doubt intend to rely on it as a non-infringement hook. They
`
`7
`
`
`Page 00013
`
`

`
`Case 6:13-cv-00448-KNM Document 175 Filed 06/13/14 Page 14 of 43 PageID #: 3420
`
`will likely argue that “payment authorization” refers to the act of transferring monetary value as
`
`performed by an e-payment system or credit card processor. They may further argue that even if
`
`they perform some sort of validation, such as confirming that a credit card number is accurate,
`
`they do not infringe because they do not actually cause money to change hands. The claims
`
`should not be construed so narrowly as to support this argument.
`
`Defendants’ proposal appears to be based on descriptions in the specification of an
`
`embodiment where a user device transfers payment data to a data supplier that relies on a third
`
`party payment authority to process the transaction and authorize payment. See, e.g., ’720 patent
`
`at 11:66-12:4 (“A user connects the data carrier (30) to terminal (40) and logs on to a data web
`
`page of data supply service provider (60). Either terminal (40) or service provider (60) then
`
`communicates via data paths (62) with a payment validation authority (70) to check and
`
`authorize the user’s or payer’s payment.”); see also ’720 patent at 8:21-8:23 (“The terminal reads
`
`payment data from the data carrier and transmits this to a payment validation system for
`
`validating the data and authorizing the payment.”). While these examples mention “authorizing
`
`payment” and validating data, these are the only portions of the specification that mention this
`
`concept in connection with payment for content. On their own, they provide little guidance to
`
`the meaning of a phrase that is wholly foreign to the actual claim language. They certainly do
`
`not support Defendants’ inevitable, broader non-infringement position that a payment validation
`
`system must actually transfer money before allowing a transaction to proceed.
`
`In fact, the specification directly contradicts Defendants’ position. The term “payment
`
`validation system” is not used to refer solely to credit card processors and banking systems.
`
`Rather, this term may also refer to a system that validates (or “authenticates,” but not
`
`“authorizes”) payment data without performing the additional functions of an actual credit card
`
`8
`
`
`Page 00014
`
`

`
`Case 6:13-cv-00448-KNM Document 175 Filed 06/13/14 Page 15 of 43 PageID #: 3421
`
`or banking processing system. See generally ’720 patent at 13:53-13:62. The specification
`
`provides several examples to illustrate this point. In one example, it describes a type of payment
`
`data that consists of a “publicly verifiable digital signature” that performs a similar role to
`
`checks. See ’720 patent at 13:53-13:60. Because this form of payment data is “publicly
`
`verifiable,” a data supplier can itself be a payment validation system that is able to validate the
`
`payment data without first forwarding it to an e-payment system:
`
`In such a signature-transporting arrangement, payment data may be
`validated using public keys and thus payment authentication need
`not be performed by the e-payment system but may instead be
`performed by, for example, a data access terminal or data supply
`system computer, using payment management code.
`
`’720 patent at 13:53-13:57. Thus, the specification teaches that a data supplier—an entity that
`
`does not process financial transactions—may have its own “payment validation system” for
`
`validating payment data. See ’720 patent 8:64-8:65 (explaining that a “payment validation
`
`system may be part of the data supplier’s computer systems”).
`
`The specification also explains that, when the data supplier is the one validating the
`
`payment data, it can later contact a separate e-payment system for “reimbursement or transfer of
`
`monetary value.” See ’720 patent at 13:60-13:62; see also ’720 patent at 23:25-23:33
`
`(explaining that, in embodiments where payment is made directly to the data supplier, the data
`
`supplier may receive actual payment from the e-payment system “concurrently with the content
`
`access and download process, or at some later stage”). The claims should not be construed to
`
`exclude these embodiments. Because the patents disclose some payment validation systems that
`
`only validate payment, and because none of the claims require the payment validation system to
`
`authorize payment, Defendants proposal should be rejected.
`
`2.
`
`Defendants’ proposal imports unnecessary functional requirements into
`the claims.
`
`9
`
`
`Page 00015
`
`

`
`Case 6:13-cv-00448-KNM Document 175 Filed 06/13/14 Page 16 of 43 PageID #: 3422
`
`Even if the patents did not disclose a payment validation system located at a data
`
`supplier, Defendants’ proposal is improper. “The fact that a patent asserts that an invention
`
`achieves several objectives does not require that each of the claims be construed as limited to
`
`structures that are capable of achieving all of the objectives.” See Liebel–Flarsheim Co. v.
`
`Medrad, Inc., 358 F.3d 898, 908 (Fed. Cir. 2004). Similarly, when a patent discloses a structure
`
`with multiple functions, a claim that recites that structure is not limited to embodiments that
`
`satisfy all of the functions recited in the patent. See Phillips, 415 F.3d at 1325 (“While that
`
`statement makes clear the invention envisions baffles that serve that function, it does not imply
`
`that in order to qualify as baffles within the meaning of the claims, the internal support structures
`
`must serve the projectile-deflecting function in all the embodiments of

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket