`United States Patent No. 8,118,221
`
`
`IN THE UNITED STATES PATENT AND TRADEMARK OFFICE
`
`Petitioner: Apple Inc.
`
`Attorney Docket No.:
`
` 104677-5008-823
`Customer No. 28120
`
`§
`Inventor: Racz et al.
`United States Patent No.: 8,118,221 §
`Formerly Application No.: 12/943,872 §
`Issue Date: February 21, 2012
`§
`Filing Date: November 10, 2010
`§
`Former Group Art Unit: 2887
`§
`Former Examiner: Thien M. Le
`§
`
`For: Data Storage and Access Systems
`
`MAIL STOP PATENT BOARD
`Patent Trial and Appeal Board
`United States Patent and Trademark Office
`Post Office Box 1450
`Alexandria, Virginia 22313-1450
`
`PETITION FOR COVERED BUSINESS METHOD PATENT REVIEW OF
`UNITED STATES PATENT NO. 8,118,221 PURSUANT TO 35 U.S.C. § 321,
`37 C.F.R. § 42.304
`
`i
`
`
`
`
`
`
`Covered Business Method Patent Review
`United States Patent No. 8,118,221
`
`TABLE OF CONTENTS
`
`(b)
`
`B.
`
`I.
`INTRODUCTION ....................................................................................................... 1
`II. OVERVIEW OF FIELD OF THE CLAIMED INVENTION ......................... 6
`III. OVERVIEW OF THE CHALLENGED CLAIMS ............................................ 19
`IV.
`PETITIONER HAS STANDING .......................................................................... 22
`A.
`The ’221 Patent Is A Covered Business Method Patent ........................... 22
`1.
`Exemplary Claim 12 Is Financial In Nature .................................... 23
`2.
`Claim 12 Does Not Cover A Technological Invention ................. 26
`(a)
`Claim 12 Does Not Recite A Technological
`Feature That Is Novel And Unobvious ............................. 27
`Claim 12 Does Not Solve A Technical Problem
`Using A Technical Solution ................................................. 30
`Related Matters And Mandatory Notice Information; Petitioner Is A
`Real Party In Interest Sued For And Charged With Infringement .......... 32
`V. DETAILED EXPLANATION OF REASONS FOR RELIEF
`REQUESTED, SHOWING IT IS MORE LIKELY THAN NOT THAT
`AT LEAST ONE CHALLENGED CLAIM IS UNPATENTABLE .............. 33
`A.
`Claim Construction .......................................................................................... 36
`B.
`The Challenged Claims Are Unpatentable Under 35 U.S.C. §101 ........... 39
`1.
`The Challenged Claims Are Directed To Abstract Ideas .............. 41
`2.
`The Challenged Claims Do Not Disclose An “Inventive
`Concept” That Is “Significantly More” Than An Abstract
`Idea ......................................................................................................... 49
`(a)
`Field Of Use Limitations Cannot Create Patent
`Eligibility ................................................................................. 50
`Generic Computer Implementation Cannot
`Transform Abstract Ideas Into Patent Eligible
`Inventions ............................................................................... 50
`(i) Generic Computer Functions Cannot Transform
`Abstract Ideas Into Patent Eligible Inventions ....... 52
`(ii) Generic Computer Hardware Cannot Transform
`Abstract Ideas Into Patent Eligible Inventions ....... 55
`
`(b)
`
`i
`
`
`
`
` Covered Business Method Patent Review
`United States Patent No. 8,118,221
`
`
`(c)
`
`(iii) Challenged Claims Are Analogous To Those
`Found Patent-Ineligible In Alice ................................. 60
`(iv) Challenged Claimed Are Analogous To Those
`Found Patent-Ineligible In Accenture .......................... 70
`Functional Nature Confirms Preemption and
`Ineligibility .............................................................................. 72
`Machine-Or-Transformation Test Also Confirms
`Patent Ineligibility .................................................................. 75
`Claims 6, 22, And 29 Are Indefinite Under § 112 ...................................... 76
`C.
`VI. CONCLUSION........................................................................................................... 79
`
`
`(d)
`
`ii
`
`
`
`
`EXHIBIT LIST
`1001
`
`1002
`
`1003
`
`1004
`
`1005
`
`1006
`
`1007
`
`1008
`
`1009
`
`1010
`
`1011
`
`1012
`
`1013
`
`1014
`
`1015
`
`1016
`
`1017
`
`1018
`
`1019
`
`1020
`
` Covered Business Method Patent Review
`United States Patent No. 8,118,221
`
`
`U.S. Patent No. 8,118,221
`
`Plaintiffs’ First Amended Complaint
`
`File History for U.S. Patent No. 8,061,598
`
`File History for U.S. Patent No. 8,336,772
`
`U.S. Patent No. 5,675,734
`
`U.S. Patent No. 4,999,806
`
`U.S. Patent No. 4,878,245
`
`U.S. Patent No. 7,334,720
`
`U.S. Patent No. 7,942,317
`
`U.S. Patent No. 5,940,805
`
`File History for U.S. Patent No. 8,118,221
`
`U.S. Patent No. 5,103,392
`
`U.S. Patent No. 5,530,235
`
`U.S. Patent No. 5,629,980
`
`U.S. Patent No. 5,915,019
`
`European Patent Application, Publication No. EP0809221A2
`
`International Publication No. WO 99/43136
`
`JP Patent Application Publication No. H11-164058 (transla-
`tion)
`International Publication No. WO 95/34857
`
`Eberhard von Faber, Robert Hammelrath, and Franz-Peter
`Heider, “The Secure Distribution of Digital Contents,” IEEE
`(1997)
`
`iii
`
`
`
`EXHIBIT LIST
`1021
`
`1022
`
`1023
`
`1024
`
`1025
`
`1026
`
`1027
`
`1028
`
`1029
`
`1030
`
`1031
`
`1032
`
`1033
`
`1034
`
`1035
`
`1036
`
`1037
`
`1038
`
`1039
`
`1040
`
` Covered Business Method Patent Review
`United States Patent No. 8,118,221
`
`
`Declaration of John P. J. Kelly In Support of Apple Inc.’s Pe-
`tition for Covered Business Method Patent Review
`Declaration of Michael P. Duffey In Support of Apple Inc.’s
`Petition for Covered Business Method Patent Review
`International Publication No. WO99/13398
`
`U.S. Patent No. 8,033,458
`
`U.S. Patent No. 8,061,598
`
`U.S. Patent No. 8,336,772
`
`File History for U.S. Patent No. 7,334,720
`
`File History for U.S. Patent No. 7,942,317
`
`File History for U.S. Patent No. 8,033,458
`
`Claim Construction Memorandum Opinion from Smartflash
`LLC v. Apple Inc., No. 6:13cv447 (Dkt. 229)
`U.S. Patent No. 4,337,483
`
`U.S. Patent No. 7,725,375
`
`U.S. Patent No. 5,925,127
`
`JP Patent Application Publication No. H10-269289 (transla-
`tion)
`U.S. Patent No. 5,953,005
`
`August 2014 Emails Titled “RE: Smartflash: Meet and Confer
`Regarding Further Claim/Prior Art Limits.”
`Apr. 8-9, 2015 Deposition Transcript of Jonathan Katz,
`CBM2014-00102/106/108/112
`J. Taylor, “DVD-Video: Multimedia for the Masses,” IEEE
`Multimedia, Vol. 6, No. 3, July-September 1999, pp. 86-92
`U.S. Patent No. 5,646,992
`
`Rakesh Mohan, John R. Smith and Chung-Sheng Li , “Adapt-
`
`iv
`
`
`
`EXHIBIT LIST
`
`1041
`
`1042
`
`1043
`
`1044
`
` Covered Business Method Patent Review
`United States Patent No. 8,118,221
`
`
`ing Multimedia Internet Content for Universal Access” IEEE
`(March 1999)
`U.S. Patent No. 5,761,485
`
`U.S. Patent No. 5,903,721
`
`Excerpt of Transcript of Trial Afternoon Session, February
`16, 2015 from Smartflash LLC v. Apple Inc., No. 6:13cv447
`Declaration of Megan F. Raymond In Support of Apple Inc.’s
`Petition for Covered Business Method Patent Review
`
`v
`
`
`
`Covered Business Method Patent Review
`United States Patent No. 8,118,221
`
`I.
`
`INTRODUCTION
`Pursuant to 35 U.S.C. § 321 and 37 C.F.R. § 42.304,1 the undersigned, on be-
`
`half of and acting in a representative capacity for Apple Inc. (“Petitioner”), petitions
`
`for review under the transitional program for covered business method (“CBM”) pa-
`
`tents of claims 3-10, 12-31, and 33 (“challenged claims”) of U.S. Pat. No. 8,118,221
`
`(“’221”), issued to Smartflash Technologies Limited and assigned to Smartflash LLC
`
`(“PO”). Petitioner asserts it is more likely than not that the challenged claims are un-
`
`patentable for the reasons herein and requests review of, and judgment against the
`
`challenged claims 3-10, 12-31, and 33 as unpatentable under § 101, and challenged
`
`claims 6, 22, and 29 as unpatentable under § 112.
`
`As discussed in IV.B, infra, Petitioner previously filed CBM2014-00102/103
`
`and CBM2015-00015 seeking CBM review of certain claims of the ’221. Those peti-
`
`tions were instituted (and CBM2014-00102/103 consolidated) with respect to claims 1,
`
`2, and 11-14 on §103 grounds and claim 1 on §101 grounds. 2 See CBM2014-
`
`
`1 Petitioner is demonstrating, in pending litigation, that these claims are invalid for
`
`numerous additional reasons. All section cites herein are to 35 U.S.C. or 37 C.F.R., as
`
`the context indicates.
`
`2 The Board instituted review of petitions filed by Samsung on the ’221 with respect
`
`to claims 2, 11, and 32 on § 101 grounds, and claims 2 and 11 on § 102 grounds. See
`
`CBM2014-00194, Pap. 9 at 20; CBM2014-00199, Pap. 9 at 13.
`
`1
`
`
`
`
` Covered Business Method Patent Review
`United States Patent No. 8,118,221
`
`00102/103, Pap. 8 at 24; CBM2015-00015, Pap. 23 at 21. With respect to §101, the
`
`Board has stated that claims 1, 2, 11, and 32 are “directed to patent-ineligible subject
`
`matter under 35 U.S.C. 101.” See CBM2014-00194, Pap. 9 at 12; CBM2015-00015,
`
`Pap. 23 at 15. However, none of the challenged claims herein has previously been
`
`challenged by Petitioner or Samsung on §§ 101 or 112 grounds, and the challenged
`
`claims were not being asserted against Petitioner at the time it filed CBM2015-00015.
`
`Apple’s previous petitions were directed towards claims asserted in a first litigation
`
`filed by Smartflash against Apple as of the time the petitions were filed. See Ex.1036.
`
`Since that time, Smartflash has filed a second litigation against Apple in which it again
`
`asserts the ’221. Although Smartflash has not yet identified the asserted claims at issue
`
`in the second litigation, this petition is directed towards the additional claims that
`
`Smartflash may now assert in the new litigation.
`
`The challenged claims are merely directed to steps and corresponding systems
`
`well-known in the field of data storage and access, including the use of a “portable da-
`
`ta carrier for storing and paying for data and to computer systems for providing ac-
`
`cess to data to be stored.” E.g., Ex.1001 1:20-23. Claim 12, e.g., recites four rudimen-
`
`tary steps relating to data storage and access—(A) reading payment data from a data
`
`carrier, (B) forwarding that data to a payment validation system, (C) retrieving data
`
`from a data supplier, and (D) writing the retrieved data to the data carrier:
`
`12. A method of providing data from a data supplier to a data carrier, the
`method comprising:
`
`2
`
`
`
` Covered Business Method Patent Review
`United States Patent No. 8,118,221
`
`
`reading payment data from the data carrier;
`forwarding the payment data to a payment validation system;
`retrieving data from the data supplier; and
`writing the retrieved data into the date carrier.
`
`Ex.1001, cl. 12.3 But at the patent’s earliest claimed priority date, these simple ele-
`
`ments and their combination would have been all well known to any person of ordi-
`
`nary skill in the art (“POSA” 4). See Sect. II; Ex.1021 ¶¶ 82-86, § VI.5 Indeed, the pa-
`
`tent acknowledges that the idea of providing access to data in exchange for a payment
`
`(e.g., purchase of music on a CD) was well known at the time. E.g., Ex.1001 5:9-12
`
`(“where the data carrier stores, for example, music, the purchase outright option may
`
`be equivalent to the purchase of a compact disc (CD), preferably with some form of con-
`
`3 All emphasis herein added unless otherwise noted.
`
`4 All references to a POSA refer to the knowledge or understanding of a person of
`
`ordinary skill in the art as of October 25, 1999. A POSA would have at least a B.S. in
`
`E.E., computer science or a telecommunications related field, and at least three years
`
`of industry experience that included client-server data/information distribution and
`
`management architectures. See Ex.1021 ¶¶ 15-17.
`
`5 In further support of the Petitioner’s grounds, the Declaration of technical expert
`
`John P.J. Kelly, Ph.D., is attached as Exhibit 1021. Dr. Kelly qualifies as a POSA (Ex.
`
`1021 §§ I, III) and has analyzed whether the challenged claims are unpatentable based
`
`on the grounds herein (Ex. 1021 §§ I-II and IV-VIII).
`
`3
`
`
`
` Covered Business Method Patent Review
`United States Patent No. 8,118,221
`
`tent copy protection such as digital watermarking”). The idea of purchasing digital da-
`
`ta for payment was similarly well known. See, e.g., Ex.1005 5:41-56; Ex.1037 14:21-
`
`15:14.6 The prior art was teeming with disclosures of this basic concept. See Sect. II.
`
`Further, claim 12, for example, clearly involves no “technology” at all other than “a
`
`payment validation system” and “a data carrier”—both of which the patent concedes
`
`were well known and entirely commonplace at the time. E.g., Ex.1001 3:36-37, 8:63-
`
`65, 11:27-44, 13:35-47, 13:56-57, 17:6-18:4, 18:20, Figs. 2, 9; Ex.1021 ¶¶ 77, 79, 81,
`
`§ VI. Thus, as the intrinsic record reflects, claim 12 recites no more than a method for
`
`retrieving and storing data from a data supplier while reading and forwarding payment
`
`data for validation. And the other challenged claims are nothing but variations on this
`
`same basic theme, with the addition, in the challenged “system” claims, of equally
`
`well-known components (such as data terminals with interfaces, processors, program
`
`stores and code). See, e.g., Ex.1001 12:29-32 (“The physical embodiment of the system is not
`
`critical and a skilled person will understand that the terminals, data processing systems
`
`and the like can all take a variety of forms.”); Fig. 4(b). In institution decisions on
`
`the ’221 and related patents, the Board correctly found that “the Specification treats as
`
`well-known all potentially technical aspects of [certain challenged claims] including”
`
`
`6 Ex. 1037 is the April 8-9, 2015 Deposition Transcript of Jonathan Katz, PO’s expert,
`
`for CBM2014-00102/106/108/112 regarding the ’221 Patent as well as other related
`
`patents (see Section IV.B infra describing related matters).
`
`4
`
`
`
` Covered Business Method Patent Review
`United States Patent No. 8,118,221
`
`“data store,” “payment system,” “interface,” “content data memory,” “data memory,”
`
`“use rule memory,” “program store,” “processor,” “data carrier,” and code to receive,
`
`retrieve, evaluate, provide, store, write, and access data. See CBM2015-00015, Pap. 23
`
`at 17; CBM2015-00018, Pap. 15 at 11-12; CBM2015-00017, Pap. 22 at 16; CBM2015-
`
`00016, Pap. 23 at 19; CBM2014-00190, Pap. 9 at 15; CBM2014-00192, Pap. 7 at 15;
`
`CBM2014-00193, Pap. 7 at 13; CBM2014-00194, Pap. 9 at 15.
`
`Indeed, as confirmed by Alice Corp. Pty, Ltd. v. CLS Bank Int’l, 134 S. Ct. 2347
`
`(2014)—decided after Petitioner filed its first set of petitions challenging the ’221 Pa-
`
`tent—claim 12 and the remaining challenged claims are also directed to patent-
`
`ineligible subject matter under § 101. This Board has already recognized that claims 1,
`
`2, 11, and 32 of the ’221, which are strikingly similar to claims 3-10 and 33 of the ’221,
`
`recite patent ineligible subject matter, stating that “the claimed ‘data access terminal’ is
`
`directed to an abstract idea,” and the Board is “not persuaded that the challenged
`
`claims of the ’221 patent add an inventive concept sufficient to ensure that the patent
`
`in practice amounts to significantly more than a patent on the abstract idea itself.” See
`
`CBM2015-00015, Pap. 23 at 15-17 (citations omitted); see also CBM2014-00194, Pap. 9
`
`at 13-15. The Board also correctly recognized that “the ’221 patent makes clear that
`
`the asserted novelty of the invention is not in any specific improvement of software
`
`or hardware, but in the method of controlling access to data,” see CBM2014-00102/103,
`
`Pap. 8 at 11; CBM2014-00194, Pap. 9 at 10-11; CBM2015-00015, Pap. 23 at 14, and
`
`5
`
`
`
` Covered Business Method Patent Review
`United States Patent No. 8,118,221
`
`the challenged claims are directed to no more than the unpatentable abstract idea of
`
`payment for and/or controlling access to data, with at most the addition of well-
`
`known, routine, and conventional features—in particular, features that, even if as-
`
`sumed to suggest a generic computer implementation, cannot confer patentability on
`
`these patent-ineligible abstractions. E.g., Alice, 134 S. Ct. at 2359-60. In addition to the
`
`challenged claims being unpatentable under § 101, claims 6, 22, and 29 are also un-
`
`patentable as indefinite under § 112.
`
`II. OVERVIEW OF FIELD OF THE CLAIMED INVENTION
`By October 1999, the sale, distribution, and protection of digital content would
`
`have been well-known to a POSA. See, e.g., Ex.1021 ¶¶ 23-25, 29-30, 46, 75. A POSA
`
`would have been aware of computer-based systems for providing digital content, in-
`
`cluding software, audio, and video content, for a fee. See, e.g., id. ¶¶ 25-30, 34, 43, 46,
`
`48-50, 53-56, 58, 61, 75; Ex.1037 14:21-15:15, 16:6-17:9; see also Ex.1009 at 4:27-35,
`
`6:49-7:6. Such systems included servers, computers, e-payment systems, and user de-
`
`vices connected over known wired and wireless communications networks to distrib-
`
`ute content from content owners to users. See, e.g., Ex.1021 ¶¶ 23-25, 29, 30, 34-38,
`
`43-46, 48, 71-73, 75; Ex.1037 19:3-18; see also Ex.1031 at Fig. 1, 9:50-68.
`
`Indeed, the ’221 Patent explains that the physical embodiment of the system is
`
`“not critical and a skilled person will understand that the terminals, data processing
`
`systems and the like can all take a variety of forms.” Ex.1001 12:26-32. And, the pa-
`
`tent concedes that various claimed components and functionalities were conventional
`
`6
`
`
`
`and well-known in the art (see Ex.1021 ¶ 22), such as:
`
` Covered Business Method Patent Review
`United States Patent No. 8,118,221
`
`
` Internet users paying for goods and/or services by credit card transaction
`
`(Ex.1001 at 2:17-18; 19:5-9)
`
` Encrypting/decrypting content for security (id. 2:64-3:7)
`
` Data access terminal or content access terminal hardware: “conventional comput-
`
`er” or “mobile phone,” “home personal computer,” “mobile communications de-
`
`vice,” “set top box” (id. 4:4-5, 15:63-16:5)
`
` WAP and i-mode allowing mobile phones to access the internet and download da-
`
`ta (id. 4:5-9)
`
` SIM cards including a user identification means (id. 4:9-13)
`
` Non-volatile memory, including EEPROM, Flash memory, optical memory (id.
`
`4:41-47, 17:22-29)
`
` Purchasing digital music equivalent to the purchase of a CD (id. 5:9-12)
`
` Data carrier hardware: “IC card,” “smart card,” “memory stick,” “standard smart
`
`card” (id. 6:28-30, 11:28-31, 17:8-29)
`
` Electronics Point of Sale Systems (EPoSS) functionality for smart cards (id. 11:37-
`
`41)
`
` E-payment systems and standards (id. 13:35-38)
`
` Data access terminal as a “general purpose computer” with standard components
`
`(id. Fig. 8, 16:31-53)
`
`7
`
`
`
` Data access device hardware: “portable audio/video player,” “conventional dedi-
`
` Covered Business Method Patent Review
`United States Patent No. 8,118,221
`
`
`cated computer system” with standard components (id. 18:5-27)
`
` Use control routines including digital watermarking and content protection from
`
`the SDMI specification (id. 18:29-35)
`
` “Standard transmission protocols” used to transmit content data items (id. 21:44-
`
`47)
`
` Communication network, whose detailed implementation is “not essential,” and
`
`can be the “Internet,” “web-based technology,” “any electronic communications
`
`network,” “wide area network,” “local area network,” “wireless network,” “con-
`
`ventional land line network,” “extranet” (id. 25:33-39)
`
`A POSA would have known, for example, multiple systems for selling and dis-
`
`tributing digital content to remote user devices. See, e.g., Ex.1021 ¶¶ 25-30, 34-44, 48-
`
`50, 53-54, 61, 64-65, 67-69; see also Ex.1037 19:3-18. U.S. Pat. No. 5,675,734 (“Hair,”
`
`pub’d Oct. 7, 1997) disclosed a system for selling digital video or audio content.
`
`Ex.1005 Abstract. Hair described a distribution system that transmits digital video or
`
`audio signals stored on a first memory belonging to a first party to a second memory
`
`belonging to a second party for a fee. Id. 5:41-44. In a first step, money is transferred
`
`from the second party to the first party via telecommunications line for an electronic
`
`sale. Id. 5:44-47. Then, the memory of the second party is connected to the memory
`
`of the first party over a telecommunications line, and the digital or audio signals are
`
`8
`
`
`
`transmitted from the first to the second memory. Id. 5:47-56. See, e.g., Ex.1021 ¶ 29.
`
` Covered Business Method Patent Review
`United States Patent No. 8,118,221
`
`
`U.S. Pat. No. 4,999,806 (“Chernow,” pub’d Mar. 12, 1991) also disclosed a sys-
`
`tem for digital content sales. Chernow described a software distribution system in
`
`which a seller computer communicates with buyers over a telephone line for the buy-
`
`ers to browse and purchase or lease software. Ex.1006 2:22-36. The seller computer
`
`answers calls from buyers, verifies credit card information, transmits purchased soft-
`
`ware to buyers, and performs accounting functions to ensure proper billing and rec-
`
`ord keeping. Id. 2:37-47. A POSA would have understood that delivery of the pur-
`
`chased content could be conditioned on successful payment, as the system described
`
`in Chernow ensures that the customer is able to pay for the purchase, for example by
`
`verifying credit card approval for the sale amount, before providing requested soft-
`
`ware. Id. 6:48-65, 7:53-63; see also Ex.1037 24:2-11, 27:4-9. A POSA also would have
`
`appreciated the need to limit leased software to a period of time or a number of runs,
`
`in view of Chernow’s description of software that renders itself unusable or erases it-
`
`self at the conclusion of the leased use. Ex.1006 5:10-18. See, e.g., Ex.1021 ¶¶ 25-28.
`
`In addition to systems for providing purchased content to users after confirm-
`
`ing payment, a POSA would have also been aware of existing systems allowing users
`
`to purchase content that is locally stored, but not yet accessible, by distributing de-
`
`cryption keys after confirming a purchase. For example, The Secure Distribution of
`
`Digital Contents (“von Faber,” pub’d 1997) disclosed a “system for distribution of
`
`9
`
`
`
` Covered Business Method Patent Review
`United States Patent No. 8,118,221
`
`encrypted digital contents via freely accessible distribution media.” Ex.1020 Abstract.
`
`A POSA would have appreciated the importance of ensuring that goods were paid for
`
`before being accessed, as von Faber acknowledged the need to “couple the use of the
`
`provided digital goods with a prior payment for the goods in a way which cannot be
`
`bypassed.” Id. 7; see also Ex.1037 27:4-9. The solution of von Faber was to freely dis-
`
`tribute encrypted digital contents and focus on key management, by providing the de-
`
`cryption key required to gain access to the digital content only after it is “guaranteed
`
`that payment has been authorised.” Ex.1020 at 8. See, e.g., Ex.1021 ¶¶ 43-45.
`
`A POSA also would have known that a central vending system could be used
`
`to provide multiple vendors with a mechanism to market, distribute, and receive pay-
`
`ment for electronic data, as described for example in EP Pat. App. Pub. No. 0809221
`
`(“Poggio,” pub’d Nov. 26, 1997). Ex.1016 Fig. 1, 2:32-36; see also Ex.1037 19:3-18.
`
`Poggio described a vending machine that manages distribution of electronic data on a
`
`variety of license terms by providing information about the products for a purchaser
`
`to browse, obtaining payment for a product, and distributing purchased products to
`
`users’ computers. Ex.1016 4:35-49. The vending machine includes “a digital cash in-
`
`terface 116 for obtaining point-of-sale electronic payment for the license fee associat-
`
`ed with a particular vendor product.” Id. Fig. 1, 6:13-16. The digital cash interface
`
`confirms successful payment of the required license fee with an electronic banking
`
`network before the virtual vending machine provides a product to a user. Id. Fig. 7,
`
`10
`
`
`
`10:7-20. Poggio disclosed a variety of existing payment schemes for purchasing a ven-
`
` Covered Business Method Patent Review
`United States Patent No. 8,118,221
`
`
`dor product that would have been known to a POSA, including “credit card payment
`
`transactions,” “digital cash,” “debit transactions,” and “electronic funds transfers.” Id.
`
`6:25-36. See, e.g., Ex.1021 ¶¶ 34-42.
`
`A POSA also would have known that different product options could be pro-
`
`vided for a buyer to choose from, with different limits on the buyer’s access associat-
`
`ed with each choice and different fee schedules for the products. For example, Poggio
`
`disclosed providing a purchaser with a choice between purchasing a permanent license
`
`for a vendor product or renting the product with a license limited to a rental time pe-
`
`riod. Ex.1016 Fig. 6, 9:25-33. Product sales information stored at the virtual vending
`
`machines includes fee schedules indicating license fees for the product on a purchase
`
`and/or rental basis. Id. Fig.3B, 7:12-16. Rented products are “formatted to include a
`
`time bomb or other disabling device which will disable the product at the end of the
`
`rental period” before being transmitted to the user. Id. 10:25-28. See, e.g., Ex.1021 ¶¶
`
`34-42.
`
`A POSA would have understood that the user’s rights to purchased or rented
`
`content could be “attached” such that the rights remain with the content, like the us-
`
`age rights disclosed in U.S. Pat. No. 5,629,980 (“’980 Stefik,” pub’d May 13, 1997).
`
`Ex.1014 6:51-56. The ’980 Stefik specification described attaching usage rights to con-
`
`tent to “define how that digital work may be transferred, used, performed, or played.”
`
`11
`
`
`
` Covered Business Method Patent Review
`United States Patent No. 8,118,221
`
`Id. 19:14-15. A work could have multiple versions of a right with different prices, such
`
`that a purchaser may choose which option best fits the rights he or she needs. Id.
`
`18:9-16. See, e.g., Ex.1021 ¶¶ 30-33.
`
`A POSA also would have known that a user could be provided with an option
`
`to specify the extent of utilization needed, so that the price paid is dependent on the
`
`amount of usage desired, and the content is released only to that extent of utilization,
`
`as disclosed in U.S. Pat. No. 5,940,805 (“Kopp,” pub’d Aug. 17, 1999). Ex.1010 2:61-
`
`3:2, 5:47-55. Kopp disclosed storing “data records” purchased by users on chip cards
`
`with “data regarding the extent of utilization” such as “number of possible utilizations
`
`of the data record, the length of time during which the data record can be used, or the
`
`time limit up to which the data record may be used.” Id. 5:16-21. The extent of utiliza-
`
`tion is specified by the user during the purchase process, and a vending apparatus
`
`control device calculates a fee based on the specified extent. Id. 5:47-55. The user then
`
`makes payment to a payment device, for example by inserting bills and coins or by
`
`electronically transferring money, before the data record is released. Id. 4:25-42, 5:56-
`
`58. See, e.g., Ex.1021 ¶¶ 58-60.
`
`U.S. Pat. No. 5,530,235 (“’235 Stefik,” pub’d June 25, 1996) disclosed a trans-
`
`portable data carrier, a DocuCard “used for storing digital information which may be
`
`accessed by a system that is capable of playing or rendering the digital information,
`
`such as a computer system, digital copier, audio CD player and the like.” Ex.1013 Ab-
`
`12
`
`
`
` Covered Business Method Patent Review
`United States Patent No. 8,118,221
`
`stract, 4:21-31. ’235 Stefik described implementing the DocuCard as a card “in ac-
`
`cordance with standards promulgated by the Personal Computer Memory Card Inter-
`
`national Association (PCMCIA),” which may be “desirable because of their small size
`
`and support for plug and play applications.” Id. 4:55-5:12. A user accesses documents
`
`from a repository using the DocuCard by logging in to it, for example by entering a
`
`PIN, which may “activate credit accounts,” assigning payment of any fees, and then
`
`selecting a desired document and function before confirming the transaction. Id. Fig.
`
`3, 6:60-7:13. See, e.g., Ex.1021 ¶¶ 30-33.
`
`The DocuCard disclosed in ’235 Stefik implements the functionality of a “re-
`
`pository,” described in more detail in ’980 Stefik.7 See Ex.1013 2:47-52 (incorporat-
`
`ing ’980 Stefik by reference), 4:35-40. A POSA would have appreciated the im-
`
`portance of ensuring that fees paid for use of repository documents were properly dis-
`
`tributed to content creators and copyright owners who were concerned not only with
`
`flexibility in distribution, but also with making sure they were paid for that distribu-
`
`tion, as discussed in ’980 Stefik. Ex.1014 2:66-3:1. The ’980 Stefik specification de-
`
`scribed a solution that attached “usage rights” to works so that fee descriptions re-
`
`main with the work, and “all uses of copies are potentially controlled and billable.” Id.
`
`6:62-7:5. Attaching fee specifications to digital content allows a variety of distribution
`
`and fee schemes to be created. Id. 43:46-49. For example, a fee could be collected for a con-
`
`
`7 ’235 Stefik incorporates ’980 Stefik by reference. See Ex.1013 2:47-52.
`
`13
`
`
`
`tent creator each time a consumer copies a work (id. 43:51-67), a fee could be paid to the cre-
`
` Covered Business Method Patent Review
`United States Patent No. 8,118,221
`
`
`ator and also to the immediate distributor for each copy (id. 44:2-22), distribution fees could
`
`be paid only to distributors licensed by the content creator (id. 44:24-64), or licensed
`
`distributors could be allowed to add fee specifications on their own (id. 44:66-45:20).
`
`See, e.g., Ex.1021¶¶ 30-33.
`
`Examples of possible fee specifications include discounts, incentives paid to
`
`users, or best price specifications that “accommodate special deals, rebates, and pric-
`
`ing that depends on information that is not available to the repository.” Ex.1014
`
`23:60-24:25, 24:34-57. The fee specifications “can be combined with tickets or author-
`
`izations that could indicate that the consumer is a wholesaler or that he is a preferred
`
`customer” in which case when the transaction is reconciled and “any excess amount
`
`will be returned to the consumer in a separate transaction.” Id. 24:39-47. See, e.g.,
`
`Ex.1021 ¶¶ 30-33. A POSA would have understood that these fee specifications (e.g.,
`
`reward data) could be modified in response to other data. See, e.g., Ex.1021 ¶ 31.
`
`A POSA would have understood that digital content distribution systems also
`
`provided digital content to portable systems while still ensuring adequate protection
`
`against unauthorized use, as disclosed, for example, in Japanese Pat. App. Pub. No.
`
`H10-269289 (“Maari,” pub’d October 9, 1998). Ex.1034 ¶ 5; see also Ex.1040. Maari
`
`described a system that distributes encrypted digital content with encrypted content
`
`keys, tracks billing, and “distributes to digital content proprietors the digital content
`
`14
`
`
`
` Covered Business Method Patent Review
`United States Patent No. 8,118,221
`
`usage fees collected based on digital content usage information.” Ex.1034 ¶ 6. An
`
`“administration company” in Maari controls the transfer of information, including
`
`confirming “information such as the bank account number, credit card number, name,
`
`contact address, and the like for the user” to process a request and “determine wheth-
`
`er or not a transaction is possible with the user.” Id. ¶ 18. See, e.g., Ex.1021 ¶¶ 66, 70.
`
`A user’s player in Maari allows access to installed content as long as the user
`
`has purchased sufficient “points” to access the content and requests replenishment of
`
`those points if a shortage is detected. Ex.1034 ¶¶ 32-33. The administration center
`
`confirms with a financial organization that the user’s account allows the purchase and
`
`provides the points to the user. Id. ¶ 34. The administration center also notifies the
`
`content provider the amount of money to be paid to the proprietor and the copyright
`
`holder. Id. ¶ 35. The fees paid by the user are then divided into a “copyright fee” paid
`
`to the content provider, a “store commission” paid to the virtual store, a “content
`
`manipulation commission” paid to the system administration company, a “settlement
`
`commission” paid to the system administration company and the financial organiza-
`
`tion, and a “system administration commission” paid to the system administrati