throbber
Covered Business Method Patent Review
`United States Patent No. 7,334,720
`
`IN THE UNITED STATES PATENT AND TRADEMARK OFFICE
`
`Petitioner: Apple Inc.
`
`Attorney Docket No.:
`
` 104677-5008-825
`Customer No. 28120
`

`Inventor: Hulst et al.
`United States Patent No.: 7,334,720 §
`Formerly Application No.: 11/336,758 §
`Issue Date: February 26, 2008

`Filing Date: January 19, 2006

`Former Group Art Unit: 2876

`Former Examiner: Steven S. Paik

`
`For: Data Storage and Access Systems
`
`MAIL STOP PATENT BOARD
`Patent Trial and Appeal Board
`United States Patent and Trademark Office
`Post Office Box 1450
`Alexandria, Virginia 22313-1450
`
`PETITION FOR COVERED BUSINESS METHOD PATENT REVIEW OF
`UNITED STATES PATENT NO. 7,334,720 PURSUANT TO 35 U.S.C.
`§ 321, 37 C.F.R. § 42.304
`
`

`
`Covered Business Method Patent Review
`United States Patent No. 7,334,720
`
`TABLE OF CONTENTS
`
`(b)
`
`B.
`
`INTRODUCTION ....................................................................................................... 1
`I.
`II. OVERVIEW OF FIELD OF THE CLAIMED INVENTION ......................... 7
`III. OVERVIEW OF CHALLENGED CLAIMS ....................................................... 20
`IV. PETITIONER HAS STANDING .......................................................................... 24
`A.
`The ’720 Patent Is A Covered Business Method Patent ........................... 24
`1.
`Exemplary Claim 16 Is Financial In Nature .................................... 25
`2.
`Claim 16 Does Not Cover A Technological Invention ................. 29
`(a)
`Claim 16 Does Not Recite A Technological
`Feature That Is Novel And Unobvious ............................. 30
`Claim 16 Does Not Solve A Technical Problem
`Using A Technical Solution ................................................. 33
`Related Matters And Mandatory Notice Information; Petitioner Is
`A Real Party In Interest Sued For And Charged With
`Infringement ..................................................................................................... 35
`V. DETAILED EXPLANATION OF REASONS FOR RELIEF
`REQUESTED, SHOWING IT IS MORE LIKELY THAN NOT
`THAT AT LEAST ONE CHALLENGED CLAIM IS
`UNPATENTABLE .................................................................................................... 37
`A.
`Claim Construction .......................................................................................... 39
`B.
`The Challenged Claims Are Unpatentable Under 35 U.S.C. § 101 .......... 43
`1.
`The Challenged Claims Are Directed To Abstract Ideas .............. 44
`2.
`The Challenged Claims Do Not Disclose An “Inventive
`Concept” That Is “Significantly More” Than An Abstract
`Idea ......................................................................................................... 51
`(a)
`Field Of Use Limitations Cannot Create Patent
`Eligibility ................................................................................. 52
`Generic Computer Implementation Cannot
`Transform Abstract Ideas Into Patent Eligible
`Inventions ............................................................................... 53
`(i) Generic Computer Functions Cannot
`Transform Abstract Ideas Into Patent
`Eligible Inventions ..................................................... 56
`
`(b)
`
`
`
`i
`
`

`
`Covered Business Method Patent Review
`United States Patent No. 7,334,720
`
`(ii) Generic Computer Hardware Cannot
`Transform Abstract Ideas Into Patent
`Eligible Inventions ..................................................... 59
`(iii) Challenged Claims Are Analogous To Those
`Found Patent-Ineligible In Alice ............................. 61
`(iv) Challenged Claims Are Analogous To Those
`Found Patent-Ineligible In Accenture .................... 68
`Functional Nature Confirms Preemption and
`Ineligibility .............................................................................. 70
`Machine-or-Transformation Test Confirms Patent
`Ineligibility .............................................................................. 73
`Claim 17 Is Indefinite Under § 112 ............................................................... 74
`C.
`VI. CONCLUSION........................................................................................................... 75
`
`(d)
`
`(c)
`
`
`
`ii
`
`
`
`
`
`

`
`Covered Business Method Patent Review
`United States Patent No. 7,334,720
`
`EXHIBIT LIST
`1001
`U.S. Patent No. 7,334,720
`
`1002
`
`1003
`
`1004
`
`1005
`
`1006
`
`1007
`
`1008
`
`1009
`
`1010
`
`1011
`
`1012
`
`1013
`
`1014
`
`1015
`
`1016
`
`1017
`
`
`
`Plaintiffs’ First Amended Complaint
`
`U.S. Patent No. 5,925,127
`
`U.S. Patent No. 5,940,805
`
`August 2014 Emails Titled “RE: Smartflash: Meet and Confer Re-
`garding Further Claim/Prior Art Limits.”
`U.S. Patent No. 4,999,806
`
`U.S. Patent No. 5,675,734
`
`U.S. Patent No. 4,878,245
`
`File History for U.S. Patent No. 7,334,720
`
`U.S. Patent No. 7,942,317
`
`U.S. Patent No. 5,103,392
`
`U.S. Patent No. 5,530,235
`
`U.S. Patent No. 5,629,980
`
`U.S. Patent No. 5,915,019
`
`European Patent Application, Publication No. EP0809221A2
`
`International Publication No. WO 99/43136
`
`JP Patent Application Publication No. H11-164058 (translation)
`
`iii
`
`

`
`Covered Business Method Patent Review
`United States Patent No. 7,334,720
`
`EXHIBIT LIST
`Eberhard von Faber, Robert Hammelrath, and Frank-Peter Heider,
`1018
`“The Secure Distribution of Digital Contents,” IEEE (1997)
`Declaration of John P. J. Kelly In Support of Apple Inc.’s Petition for
`Covered Business Method Patent Review
`U.S. Patent No. 8,033,458
`
`1019
`
`1020
`
`1021
`
`1022
`
`1023
`
`1024
`
`1025
`
`1026
`
`1027
`
`1028
`
`1029
`
`1030
`
`1031
`
`1032
`
`1033
`
`
`
`Declaration of Michael P. Duffey In Support of Apple Inc.’s Petition
`for Covered Business Method Patent Review
`Declaration of Megan F. Raymond In Support of Apple Inc.’s Peti-
`tion for Covered Business Method Patent Review
`Claim Construction Memorandum Opinion from Smartflash LLC v.
`Apple Inc., No. 6:13cv447 (Dkt. 229)
`File History for U.S. Patent No. 8,061,598
`
`U.S. Patent No. 4,337,483
`
`U.S. Patent No. 7,725,375
`
`International Publication No. WO 95/34857
`
`JP Patent Application Publication No. H10-269289 (translation)
`
`File History for U.S. Patent No. 7,942,317
`
`File History for U.S. Patent No. 8,033,458
`
`U.S. Patent No. 8,061,598
`
`U.S. Patent No. 8,118,221
`
`File History for U.S. Patent No. 8,118,221
`
`iv
`
`

`
`Covered Business Method Patent Review
`United States Patent No. 7,334,720
`
`EXHIBIT LIST
`1034
`U.S. Patent No. 8,336,772
`
`1035
`
`1036
`
`1037
`
`1038
`
`1039
`
`1040
`
`1041
`
`1042
`
`1043
`
`1044
`
`1045
`
`File History for U.S. Patent No. 8,336,772
`
`U.S. Patent No. 5,646,992
`
`U.S. Patent No. 5,953,005
`
`U.S. Pat. No. 5,970,479
`
`R. Mohan, J.R. Smith, C.S. Li, “Adapting Multimedia Internet Con-
`tent for Universal Access,” IEEE Transactions on Multimedia, Vol.
`1, No. 1, 1999, pp. 104-114
`Apr. 8-9, 2015 Deposition Transcript of Jonathan Katz, CBM2014-
`00102/106/108/112
`J. Taylor, “DVD-Video: Multimedia for the Masses,” IEEE Multime-
`dia, Vol. 6, No. 3, July-September 1999, pp. 86-92
`U.S. Patent No. 5,903,721
`
`U.S. Patent No. 5,761,485
`
`International Publication No. WO99/13398
`
`Excerpt of Transcript of Trial Afternoon Session, February 16, 2015
`from Smartflash LLC v. Apple Inc., No. 6:13cv447
`
`
`
`v
`
`

`
`Covered Business Method Patent Review
`United States Patent No. 7,334,720
`
`I.
`
`INTRODUCTION
`
`Pursuant to § 321 and Rule § 42.304,1 the undersigned, on behalf of and in a
`
`representative capacity for Apple Inc. (“Petitioner”), petitions for covered business
`
`method review of claims 4-12 and 16-18 (“challenged claims”) of U.S. Pat. No.
`
`7,334,720 (“the ’720 Patent” or “’720”), issued to Smartflash Limited and assigned to
`
`Smartflash LLC (“Patent Owner”). Petitioner asserts that it is more likely than not
`
`that the challenged claims are unpatentable for the reasons herein and requests review
`
`of, and judgment against, claims 4-12 and 16-18 as unpatentable under § 101, and
`
`claim 17 as unpatentable under § 112.
`
`As discussed in Section IV.B, infra, Petitioner previously filed CBM2014-
`
`00104/105 seeking review of the ’720 under §§ 102 and 103, and CBM2015-00028/29
`
`seeking review of certain claims of the ’720 under §§ 101 and 103. Petitions
`
`CBM2014-00104/105 were not instituted, and institution decisions in CBM2015-
`
`00028/29 (on claims 1-3 and 13-15) are still pending. 2 The previous petitions were
`
`generally directed towards claims asserted in a first litigation filed by Smartflash
`
`1 All section cites herein are to 35 U.S.C. or 37 C.F.R., as the context indicates.
`
`2 Petitioner respectfully notes that the Director, pursuant to Rule 325(c), may deter-
`
`mine after institution that consolidation of this proceeding with CBM2015-00028/29
`
`may be appropriate, or may at minimum decide to coordinate the schedules of this
`
`proceeding and CBM2015-00028/29.
`
`
`
`1
`
`

`
`Covered Business Method Patent Review
`United States Patent No. 7,334,720
`
`against Petitioner as of the time those petitions were filed. Since that time, Smartflash
`
`has filed a second litigation against Petitioner in which it again asserts the ’720 Patent.
`
`Although Smartflash has not yet identified the asserted claims in the second litigation,
`
`this petition is directed towards the additional claims that Smartflash may assert in the
`
`new litigation. In addition, Samsung Electronics America (“Samsung”) previously
`
`filed CBM2014-00190 and CBM2014-00196 seeking CBM review of the ’720 Patent.
`
`CBM2014-00190 was instituted for trial with respect to claims 13 and 14 on § 101
`
`grounds. On April 30, 2015, Petitioner filed a Motion for Joinder with pending Cov-
`
`ered Business Method review CBM2014-00190 (Attorney Docket No 104677-5008-
`
`824). The Board has not yet rendered a decision on this motion. None of the chal-
`
`lenged claims herein has previously been challenged by Petitioner or Samsung on
`
`§§ 101 or 112 grounds, and the challenged claims were not being asserted against Peti-
`
`tioner by Smartflash at the time Petitioner filed the CBM2015-00028/029 petitions.
`
`The challenged claims are merely directed to steps and corresponding systems
`
`well-known in the field of data storage and access, including use of a “portable data
`
`carrier for storing and paying for data and to computer systems for providing access
`
`to data to be stored.” E.g., Ex. 1001 1:5-8. Independent claim 16, for example, re-
`
`cites eight rudimentary steps relating to data storage and access—(A) reading pay-
`
`ment data from a data carrier, (B) forwarding that data, (C) retrieving data, (D) writ-
`
`ing the retrieved data, (E) receiving at least one access rule, (F) writing that rule; (G)
`
`
`
`2
`
`

`
`Covered Business Method Patent Review
`United States Patent No. 7,334,720
`
`receiving payment validation data, and (H) transmitting payment validation data:
`
`14. A method of providing data from a data supplier to a data carrier,
`the method comprising:
`reading payment data from the data carrier;
`forwarding the payment data to a payment validation system;
`retrieving data from the data supplier;
`writing the retrieved data into the data carrier;
`receiving at least one access rule from the data supplier; and
`writing the at least one access rule into the data carrier, the at least one
`access rule specifying at least one condition for accessing the retrieved
`data written into the data carrier, the at least one condition being de-
`pendent upon the amount of payment associated with the payment data
`forwarded to the payment validation system.
`15. A method of providing data from a data supplier according to claim
`14 further comprising:
`receiving payment validation data from the payment validation
`system; and
`transmitting at least a portion of the payment validation data to the
`data supplier.
`16. A method of providing data as claimed in claim 15, wherein the
`payment validation system comprises a payment processor at the
`data supplier.
`Ex. 1001.3 But at the ’720 Patent’s earliest claimed priority date, these simple ele-
`
`ments and their combination were all well-known. See Section II; Ex. 1019 ¶¶ 77-83,
`
`
`3 All emphasis herein is added unless otherwise noted.
`
`
`
`3
`
`

`
`Covered Business Method Patent Review
`United States Patent No. 7,334,720
`
`§ VI.4 The patent itself acknowledges that the idea of providing access to data in ex-
`
`change for a payment (e.g., purchase of music on a CD) was well-known at the time,
`
`e.g., Ex. 1001 5:4-7 (“where the data carrier stores … music, the purchase outright op-
`
`tion may be equivalent to the purchase of a compact disc (CD), preferably with some form of
`
`content copy protection such as digital watermarking”). The idea of purchasing digital
`
`data for payment was similarly well-known. See, e.g., Ex. 1007 5:41-56; Ex. 1040
`
`14:21-15:14.5 And, as shown herein, the prior art was teeming with disclosures of this
`
`basic concept. See, e.g., Section II.
`
`Moreover, as its language makes clear, claim 16 involves no “technology” at all
`
`other than “a payment validation system” (comprising a payment processor) and “a
`
`data carrier”—both of which the patent concedes were well-known and entirely
`
`commonplace at the time. E.g., Ex. 1001 3:29, 8:64-66, 9:2-7, 11:36-53, 13:46-58, 14:1-
`
`4 In further support of the Petitioner’s grounds, the Declaration of technical expert
`
`John P.J. Kelly, Ph.D., is attached as Exhibit 1019. Dr. Kelly qualifies as a person of
`
`ordinary skill in the art (Ex. 1019 §§ I, III) and has analyzed whether the challenged
`
`claims are unpatentable based on the grounds in this petition (Ex. 1019 §§ I-II and
`
`IV-VIII).
`
`5 Exhibit 1040 is the April 8-9, 2015 Deposition Transcript of Jonathan Katz, Patent
`
`Owner’s expert, for CBM2014-00102/106/108/112 regarding the ’720 Patent as well
`
`as other related patents (see Section IV.B infra describing related matters).
`
`
`
`4
`
`

`
`Covered Business Method Patent Review
`United States Patent No. 7,334,720
`
`2, 14:19-24, 14:52-54, 15:44, 17:23-18:23, 18:38, 19:35, 19:65-20:7, Figures 2, 6, 9, 11b;
`
`Ex. 1019 ¶¶ 77-83, § VI. Thus, as the intrinsic record reflects, claim 16 recites noth-
`
`ing more than a method for retrieving and storing data from a data supplier while
`
`reading and forwarding payment data for validation, receiving and writing an access
`
`rule for the stored data, and receiving and transmitting payment validation data.
`
`The other challenged claims are only variations on this same simple and well-
`
`known theme. Claim 17 depends from claim 16 and recites the additional steps of
`
`reading a stored value, comparing the stored value with value data, and outputting the
`
`result. Claim 18 depends from claim 14 and recites the additional limitations of re-
`
`trieving and writing a stored data item identifier and associated value data. The chal-
`
`lenged “system” claims 4-12 all depend from previously instituted claim 3, which re-
`
`cites equally well-known components (e.g., data access terminals with interfaces, pro-
`
`cessors, program stores and code).6 E.g., Ex. 1001 12:38-41 (“The physical embodiment
`
`of the system is not critical and a skilled person will understand that the terminals, data processing
`
`6 Claim 3, for example, simply recites a “data access terminal” with interfaces, a pro-
`
`cessor, a program store and “code” to perform similar steps, along with the pro-
`
`cessing of data access requests and various data (e.g., payment data and payment vali-
`
`dation data) via the application of access and use rules. See Ex. 1001. Claims 4-11
`
`merely recite additional types of code, and claim 12 recites a cash input device and as-
`
`sociated code.
`
`
`
`5
`
`

`
`Covered Business Method Patent Review
`United States Patent No. 7,334,720
`
`systems and the like can all take a variety of forms.”); Figure 4b. See also Section II, infra; Ex.
`
`1019 ¶¶ 77-82, § VI.
`
`Indeed, as confirmed by the Supreme Court’s recent decision in Alice Corp. Pty,
`
`Ltd. v. CLS Bank Int’l, 134 S. Ct. 2347 (2014)—decided after Petitioner’s first chal-
`
`lenges to the ’720 Patent were filed—the challenged claims are also directed to patent-
`
`ineligible subject matter under § 101. As the Board noted in its previous Institution
`
`Decisions, “the ’720 Patent makes clear that the asserted novelty of the invention is
`
`not in any specific improvement of software or hardware, but in the method of control-
`
`ling access to data,” CBM2014-00104, Pap. 9 at 12; CBM2014-00190, Pap. 9 at 10, and
`
`the challenged claims are directed to nothing more than the unpatentable abstract idea
`
`of payment for and controlling access to data, with at most the addition of well-
`
`known, routine and conventional features that do not render them patentable—in
`
`particular, generic computer implementation that cannot confer patentability on these
`
`patent-ineligible abstractions. E.g., Alice, 134 S. Ct. at 2359-60. Further, claim 17
`
`lacks a clear or definite antecedent basis and is thus also unpatentable under § 112. In
`
`summary, each challenged claim recites ineligible subject matter, and claim 17 is indef-
`
`inite; thus, each is unpatentable.
`
`
`
`6
`
`

`
`Covered Business Method Patent Review
`United States Patent No. 7,334,720
`
`II. OVERVIEW OF FIELD OF THE CLAIMED INVENTION
`By October 25, 1999, the sale, distribution, and protection of digital content
`
`were well-known to a POSA.7 See, e.g., Ex. 1019 ¶¶ 23-25, 29-30, 46, 75. A POSA
`
`would have been aware of computer-based systems for providing digital content, in-
`
`cluding software, audio, and video content, for a fee. See, e.g., id. ¶¶ 25-30, 34, 43, 46,
`
`48-50, 53-56, 58, 61, 75; Ex. 1040 14:21-15:15, 16:6-17:9; see also Ex. 1008 at 4:27-35,
`
`6:49-7:6. Such systems included servers, computers, e-payment systems, and user de-
`
`vices connected over known wired and wireless communications networks to distrib-
`
`ute content from content owners to users. See, e.g., Ex. 1019 ¶¶ 25-30, 34, 43, 46, 48-
`
`50, 53-56, 58, 61, 75; Ex. 1040 19:3-18; see also Ex. 1025 at Figure 1, 9:50-68; Ex. 1039.
`
`Indeed, the ’720 Patent explains that the physical embodiment of the system is
`
`“not critical and a skilled person will understand that the terminals, data processing
`
`systems and the like can all take a variety of forms.” Ex. 1001 12:38-41. For example,
`
`the patent concedes that various claimed components and functionalities were con-
`
`ventional and well-known in the art (see Ex. 1019 ¶ 22), such as:
`
`7 All references to a person of ordinary skill in the art (“POSA”) refer to the
`
`knowledge or understanding of a POSA as of October 25, 1999. A POSA would
`
`have at least a B.S. in E.E., C.S., or a telecommunications related field, and at least
`
`three years of industry experience that included client-server data/information distri-
`
`bution and management architectures. See Ex. 1019 ¶¶ 15-17.
`
`
`
`7
`
`

`
`Covered Business Method Patent Review
`United States Patent No. 7,334,720
`
` Internet users paying for goods and/or services by credit card transaction (2:5-
`
`6; 19:25-29)
`
` Encrypting/decrypting content for security (2:56-66)
`
` Data access terminal or content access terminal hardware: “conventional com-
`
`puter” or “mobile phone,” “home personal computer,” “mobile communica-
`
`tions device,” “set top box” (3:64-65, 16:11-20)
`
` WAP and i-mode allowing mobile phones to access the internet and download
`
`data (3:65-4:2)
`
` SIM cards including a user identification means (4:2-6)
`
` Non-volatile memory, including EEPROM, Flash memory, optical memory
`
`(4:35-44, 17:41-48)
`
` Purchasing digital music equivalent to the purchase of a CD (5:4-7)
`
` Data carrier hardware: “IC card,” “smart card,” “memory stick,” “standard
`
`smart card” (6:26-29, 11:37-40, 17:24-48)
`
` Electronics Point of Sale Systems (EPoSS) functionality for smart cards (11:46-
`
`50)
`
` E-payment systems and standards (13:46-49)
`
` Data access terminal as a “general purpose computer” with standard compo-
`
`nents (Figure 8, 16:47-17:2)
`
`
`
`8
`
`

`
`Covered Business Method Patent Review
`United States Patent No. 7,334,720
`
` Data access device hardware: “portable audio/video player,” “conventional
`
`dedicated computer system” with standard components (18:24-44)
`
` Use control routines including digital watermarking and content protection
`
`from the SDMI specification (18:47-54)
`
` “Standard transmission protocols” used to transmit content data items (21:66-
`
`22:3)
`
` Communication network whose detailed implementation is not essential, and
`
`can be “internet,” “web-based technology,” “any electronic communications
`
`network,” “wide area network,” “local area network,” “wireless network,”
`
`“conventional land line network,” “extranet” (26:5-12)
`
`A POSA would have known, for example, multiple systems for selling and dis-
`
`tributing digital content to remote user devices. See, e.g., Ex. 1019 ¶¶ 25-30, 34-44, 48-
`
`50, 53-54, 61, 64-65, 67-69; see also Ex. 1040 19:3-18. For example, U.S. Patent No.
`
`5,675,734 (“Hair,” published October 7, 1997) disclosed a system for selling digital
`
`video or audio content. Ex. 1007 Abstract. Hair describes a distribution system that
`
`transmits digital video or audio signals stored on a first memory belonging to a first
`
`party to a second memory belonging to a second party for a fee. Id. 5:41-44. In a first
`
`step, money is transferred from the second party to the first party via telecommunica-
`
`tions line for an electronic sale. Id. 5:44-47. Then, the memory of the second party is
`
`connected to the memory of the first party over a telecommunications line, and the
`
`
`
`9
`
`

`
`Covered Business Method Patent Review
`United States Patent No. 7,334,720
`
`digital or audio signals are transmitted from the first memory to the second memory.
`
`Id. 5:47-56. See, e.g., Ex. 1019 ¶ 29.
`
`U.S. Patent No. 4,999,806 (“Chernow,” published March 12, 1991) also dis-
`
`closed a system for digital content sales. Chernow described a software distribution
`
`system in which a seller computer communicates with buyers over a telephone line for
`
`the buyers to browse and purchase or lease software. Ex. 1006 2:22-36. The seller
`
`computer answers calls from buyers, verifies credit card information, transmits pur-
`
`chased software to buyers, and performs accounting functions to ensure proper billing
`
`and record keeping. Id. 2:37-47. A POSA would have understood that delivery of the
`
`purchased content could be conditioned on successful payment, as the system de-
`
`scribed in Chernow ensures that the customer is able to pay for the purchase, for ex-
`
`ample, by verifying credit card approval for the sale amount, before providing re-
`
`quested software. Id. 6:48-65, 7:53-63; see also Ex. 1040 24:2-11, 27:4-9. A POSA also
`
`would have appreciated the need to limit leased software to a period of time or a
`
`number of runs and provide an appropriate warning (see, e.g., Ex. 1027 discussed be-
`
`low), in view of Chernow’s description of software that renders itself unusable or
`
`erases itself at the conclusion of the leased use. Ex. 1006 5:10-18. See, e.g., Ex. 1019
`
`¶¶ 25-28.
`
`In addition to systems for providing purchased content to users after confirm-
`
`ing payment, a POSA also would have been aware of systems allowing users to pur-
`
`
`
`10
`
`

`
`Covered Business Method Patent Review
`United States Patent No. 7,334,720
`
`chase content that is locally stored, but not yet accessible, by distributing decryption
`
`keys after confirming a purchase. For example, The Secure Distribution of Digital
`
`Contents (“von Faber,” published 1997) disclosed a “system for distribution of en-
`
`crypted digital contents via freely accessible distribution media.” Ex. 1018 Abstract.
`
`A POSA would have appreciated the importance of ensuring that goods were paid for
`
`before being accessed, as von Faber acknowledged the need to “couple the use of the
`
`provided digital goods with a prior payment for the goods in a way which cannot be
`
`bypassed.” Id. 7; see also Ex. 1040 27:4-9. The solution proposed by von Faber was to
`
`freely distribute encrypted digital contents and focus on key management, by provid-
`
`ing the decryption key required to gain access to the digital content only after it is
`
`“guaranteed that payment has been authorised.” Ex. 1018 at 8. See, e.g., Ex. 1019 ¶¶
`
`43-45.
`
`A POSA also would have known that a central vending system could be used
`
`to provide multiple vendors with a mechanism to market, distribute, and receive pay-
`
`ment for electronic data, as described for example in EP Patent Application Publica-
`
`tion No. 0809221 (“Poggio,” published November 26, 1997). Ex. 1015 Figure 1,
`
`2:32-36; see also Ex. 1040 19:3-18. Poggio described a vending machine that manages
`
`distribution of electronic data on a variety of license terms by providing information
`
`about the products for a purchaser to browse, obtaining payment for a product, and
`
`distributing purchased products to users’ computers. Id. 4:35-49. The vending ma-
`
`
`
`11
`
`

`
`Covered Business Method Patent Review
`United States Patent No. 7,334,720
`
`chine includes “a digital cash interface 116 for obtaining point-of-sale electronic pay-
`
`ment for the license fee associated with a particular vendor product.” Id. Figure 1,
`
`6:13-16. The digital cash interface confirms successful payment of the required li-
`
`cense fee with an electronic banking network before the virtual vending machine pro-
`
`vides a product to a user. Id. Figure 7, 10:7-20. Poggio disclosed a variety of existing
`
`payment schemes for purchasing a vendor product that would have been known to a
`
`POSA, including “credit card payment transactions,” “digital cash,” “debit transac-
`
`tions,” and “electronic funds transfers.” Id. 6:25-36. See, e.g., Ex. 1019 ¶¶ 34-42.
`
`A POSA also would have known that different product options could be pro-
`
`vided for a buyer to choose from, with different limits on the buyer’s access associat-
`
`ed with each choice and different fee schedules for the products. For example,
`
`Poggio disclosed providing a purchaser with a choice between purchasing a perma-
`
`nent license for a vendor product and renting the product with a license limited to a
`
`rental time period. Ex. 1015 Figure 6, 9:25-33. Product sales information stored at
`
`the virtual vending machine includes fee schedules indicating license fees for the
`
`product on a purchase and/or rental basis. Id. Figure 3B, 7:12-16. Rented products
`
`are “formatted to include a time bomb or other disabling device which will disable the
`
`product at the end of the rental period” before being transmitted to the user. Id.
`
`10:25-28. See, e.g., Ex. 1019 ¶¶ 34-42.
`
`
`
`12
`
`

`
`Covered Business Method Patent Review
`United States Patent No. 7,334,720
`
`A POSA would have understood that the user’s rights to purchased or rented
`
`content could be “attached” such that the rights remain with the content, like the us-
`
`age rights disclosed in U.S. Patent No. 5,629,980 (“’980 Stefik,” published May 13,
`
`1997). Ex. 1013 6:51-56. The ’980 Stefik specification described attaching usage
`
`rights to content to “define how that digital work may be transferred, used, performed,
`
`or played.” Id. 19:14-15. A work could have multiple versions of a right with differ-
`
`ent prices, such that a purchaser may choose which option best fits the rights he or
`
`she needs. Id. 18:9-16. The works and their associated descriptions, including the us-
`
`age right descriptions that define how the work may be used, are stored in separate
`
`memories on a repository device, and those memories may be different memory types
`
`or may be physically separate memory devices. Id. Figure 12, 14:28-39. See, e.g., Ex.
`
`1019 ¶¶ 30-33.
`
`A POSA also would have known that a user could also be provided with an op-
`
`tion to specify the extent of utilization needed, so that the price paid is dependent on
`
`the amount of usage desired, and the content is released only to that extent of utiliza-
`
`tion, as disclosed in U.S. Patent No. 5,940,805 (“Kopp,” published August 17, 1999).
`
`Ex. 1004 2:61-3:2, 5:47-55. Kopp disclosed storing “data records” purchased by users
`
`on chip cards with “data regarding the extent of utilization” such as “number of pos-
`
`sible utilizations of the data record, the length of time during which the data record
`
`can be used, or the time limit up to which the data record may be used.” Id. 5:16-21.
`
`
`
`13
`
`

`
`Covered Business Method Patent Review
`United States Patent No. 7,334,720
`
`The extent of utilization is specified by the user during the purchase process, and a
`
`vending apparatus control device calculates a fee based on the specified extent. Id.
`
`5:47-55. The user then makes payment to a payment device, for example by inserting
`
`bills and coins or by electronically transferring money, before the data record is re-
`
`leased. Id. 4:25-42, 5:56-58. See, e.g., Ex. 1019 ¶¶ 58-60.
`
`U.S. Patent No. 5,530,235 (“’235 Stefik,” published June 25, 1996) disclosed a
`
`transportable data carrier, a DocuCard “used for storing digital information which
`
`may be accessed by a system that is capable of playing or rendering the digital infor-
`
`mation, such as a computer system, digital copier, audio CD player and the like.” Ex.
`
`1012 Abstract, 4:21-31. The ’235 Stefik specification described implementing the
`
`DocuCard as a card “in accordance with standards promulgated by the Personal
`
`Computer Memory Card International Association (PCMCIA),” which may be “desir-
`
`able because of their small size and support for plug and play applications.” Id. 4:55-
`
`5:12. A user accesses documents from a repository using the DocuCard by logging in
`
`to the DocuCard, for example by entering a PIN, which may “activate credit ac-
`
`counts,” assigning payment of any fees, and then selecting a desired document and
`
`function before confirming the transaction. Id. Figure 3, 6:60-7:13. See, e.g., Ex. 1019
`
`¶ 30.
`
`The DocuCard disclosed in ’235 Stefik implements the functionality of a repos-
`
`itory, described in more detail in ’980 Stefik. See Ex. 1012 2:48-52 (incorporating ’980
`
`
`
`14
`
`

`
`Covered Business Method Patent Review
`United States Patent No. 7,334,720
`
`Stefik by reference), 4:35-40. A POSA would have appreciated the importance of en-
`
`suring that fees paid for use of repository documents were properly distributed to
`
`content creators and copyright owners who were concerned not only with flexibility
`
`in distribution, but also with making sure they were paid for that distribution, as dis-
`
`cussed in ’980 Stefik. Ex. 1013 2:66-3:1. The ’980 Stefik specification described a so-
`
`lution that attached “usage rights” to works so that fee descriptions remain with the
`
`work, and “all uses of copies are potentially controlled and billable.” Id. 6:62-7:5. As
`
`Stefik disclosed, attaching fee specifications to digital content allows a variety of fee
`
`structures. Examples of possible fee specifications include discounts, incentives paid
`
`to users, or best price specifications (e.g., reward data) that “accommodate special
`
`deals, rebates, and pricing that depends on information that is not available to the re-
`
`pository.” Id. 23:56-24:25, 24:34-57. The fee specifications “can be combined with
`
`tickets or authorizations that could indicate that the consumer is a wholesaler or that
`
`he is a preferred customer” in which case when the transaction is reconciled “any ex-
`
`cess amount will be returned to the consumer in a separate transaction.” Id. 24:39-47.
`
`See, e.g., Ex. 1019 ¶¶ 30-33. A POSA would have understood that these fee specifica-
`
`tions (e.g., reward data) could be modified in response to other data. See, e.g., Ex. 1019
`
`¶ 31.
`
`U.S. Patent No. 5,915,019 (“Ginter,” published June 22, 1999) also disclosed a
`
`system distributing content with a set of “rules and controls” to prevent unauthorized
`
`
`
`15
`
`

`
`Covered Business Method Patent Review
`United States Patent No. 7,334,720
`
`use of protected information and specify how much usage is to be paid for. Ex. 1014
`
`56:25-57:16. The VDE protects content distributed among appliances by implement-
`
`ing flexible “rules and controls” that are used to grant users specific rights, specify
`
`how much is to be paid for content usage, and establish usage reporting requirements.
`
`Id. 56:25-61. The rules and controls either travel with the content to which they apply
`
`or are delivered to a user separately from c

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket