throbber
Covered Business Method Patent Review
`United States Patent No. 8,118,221
`
`
`IN THE UNITED STATES PATENT AND TRADEMARK OFFICE
`
`Petitioner: Apple Inc.
`
`Attorney Docket No.:
`
` 104677-5008-823
`Customer No. 28120
`

`Inventor: Racz et al.
`United States Patent No.: 8,118,221 §
`Formerly Application No.: 12/943,872 §
`Issue Date: February 21, 2012

`Filing Date: November 10, 2010

`Former Group Art Unit: 2887

`Former Examiner: Thien M. Le

`
`For: Data Storage and Access Systems
`
`MAIL STOP PATENT BOARD
`Patent Trial and Appeal Board
`United States Patent and Trademark Office
`Post Office Box 1450
`Alexandria, Virginia 22313-1450
`
`PETITION FOR COVERED BUSINESS METHOD PATENT REVIEW OF
`UNITED STATES PATENT NO. 8,118,221 PURSUANT TO 35 U.S.C. § 321,
`37 C.F.R. § 42.304
`
`i
`
`
`
`
`

`
`Covered Business Method Patent Review
`United States Patent No. 8,118,221
`
`TABLE OF CONTENTS
`
`(b) 
`
`B. 
`
`I. 
`INTRODUCTION ....................................................................................................... 1 
`II.  OVERVIEW OF FIELD OF THE CLAIMED INVENTION ......................... 6 
`III.  OVERVIEW OF THE CHALLENGED CLAIMS ............................................ 19 
`IV. 
`PETITIONER HAS STANDING .......................................................................... 22 
`A. 
`The ’221 Patent Is A Covered Business Method Patent ........................... 22 
`1. 
`Exemplary Claim 12 Is Financial In Nature .................................... 23 
`2. 
`Claim 12 Does Not Cover A Technological Invention ................. 26 
`(a) 
`Claim 12 Does Not Recite A Technological
`Feature That Is Novel And Unobvious ............................. 27 
`Claim 12 Does Not Solve A Technical Problem
`Using A Technical Solution ................................................. 30 
`Related Matters And Mandatory Notice Information; Petitioner Is A
`Real Party In Interest Sued For And Charged With Infringement .......... 32 
`V.  DETAILED EXPLANATION OF REASONS FOR RELIEF
`REQUESTED, SHOWING IT IS MORE LIKELY THAN NOT THAT
`AT LEAST ONE CHALLENGED CLAIM IS UNPATENTABLE .............. 33 
`A. 
`Claim Construction .......................................................................................... 36 
`B. 
`The Challenged Claims Are Unpatentable Under 35 U.S.C. §101 ........... 39 
`1. 
`The Challenged Claims Are Directed To Abstract Ideas .............. 41 
`2. 
`The Challenged Claims Do Not Disclose An “Inventive
`Concept” That Is “Significantly More” Than An Abstract
`Idea ......................................................................................................... 49 
`(a) 
`Field Of Use Limitations Cannot Create Patent
`Eligibility ................................................................................. 50 
`Generic Computer Implementation Cannot
`Transform Abstract Ideas Into Patent Eligible
`Inventions ............................................................................... 50 
`(i)  Generic Computer Functions Cannot Transform
`Abstract Ideas Into Patent Eligible Inventions ....... 52 
`(ii)  Generic Computer Hardware Cannot Transform
`Abstract Ideas Into Patent Eligible Inventions ....... 55 
`
`(b) 
`
`i
`
`
`

`
` Covered Business Method Patent Review
`United States Patent No. 8,118,221
`
`
`(c) 
`
`(iii)  Challenged Claims Are Analogous To Those
`Found Patent-Ineligible In Alice ................................. 60 
`(iv)  Challenged Claimed Are Analogous To Those
`Found Patent-Ineligible In Accenture .......................... 70 
`Functional Nature Confirms Preemption and
`Ineligibility .............................................................................. 72 
`Machine-Or-Transformation Test Also Confirms
`Patent Ineligibility .................................................................. 75 
`Claims 6, 22, And 29 Are Indefinite Under § 112 ...................................... 76 
`C. 
`VI.  CONCLUSION........................................................................................................... 79 
`
`
`(d) 
`
`ii
`
`

`
`
`EXHIBIT LIST
`1001
`
`1002
`
`1003
`
`1004
`
`1005
`
`1006
`
`1007
`
`1008
`
`1009
`
`1010
`
`1011
`
`1012
`
`1013
`
`1014
`
`1015
`
`1016
`
`1017
`
`1018
`
`1019
`
`1020
`
` Covered Business Method Patent Review
`United States Patent No. 8,118,221
`
`
`U.S. Patent No. 8,118,221
`
`Plaintiffs’ First Amended Complaint
`
`File History for U.S. Patent No. 8,061,598
`
`File History for U.S. Patent No. 8,336,772
`
`U.S. Patent No. 5,675,734
`
`U.S. Patent No. 4,999,806
`
`U.S. Patent No. 4,878,245
`
`U.S. Patent No. 7,334,720
`
`U.S. Patent No. 7,942,317
`
`U.S. Patent No. 5,940,805
`
`File History for U.S. Patent No. 8,118,221
`
`U.S. Patent No. 5,103,392
`
`U.S. Patent No. 5,530,235
`
`U.S. Patent No. 5,629,980
`
`U.S. Patent No. 5,915,019
`
`European Patent Application, Publication No. EP0809221A2
`
`International Publication No. WO 99/43136
`
`JP Patent Application Publication No. H11-164058 (transla-
`tion)
`International Publication No. WO 95/34857
`
`Eberhard von Faber, Robert Hammelrath, and Franz-Peter
`Heider, “The Secure Distribution of Digital Contents,” IEEE
`(1997)
`
`iii
`
`

`
`EXHIBIT LIST
`1021
`
`1022
`
`1023
`
`1024
`
`1025
`
`1026
`
`1027
`
`1028
`
`1029
`
`1030
`
`1031
`
`1032
`
`1033
`
`1034
`
`1035
`
`1036
`
`1037
`
`1038
`
`1039
`
`1040
`
` Covered Business Method Patent Review
`United States Patent No. 8,118,221
`
`
`Declaration of John P. J. Kelly In Support of Apple Inc.’s Pe-
`tition for Covered Business Method Patent Review
`Declaration of Michael P. Duffey In Support of Apple Inc.’s
`Petition for Covered Business Method Patent Review
`International Publication No. WO99/13398
`
`U.S. Patent No. 8,033,458
`
`U.S. Patent No. 8,061,598
`
`U.S. Patent No. 8,336,772
`
`File History for U.S. Patent No. 7,334,720
`
`File History for U.S. Patent No. 7,942,317
`
`File History for U.S. Patent No. 8,033,458
`
`Claim Construction Memorandum Opinion from Smartflash
`LLC v. Apple Inc., No. 6:13cv447 (Dkt. 229)
`U.S. Patent No. 4,337,483
`
`U.S. Patent No. 7,725,375
`
`U.S. Patent No. 5,925,127
`
`JP Patent Application Publication No. H10-269289 (transla-
`tion)
`U.S. Patent No. 5,953,005
`
`August 2014 Emails Titled “RE: Smartflash: Meet and Confer
`Regarding Further Claim/Prior Art Limits.”
`Apr. 8-9, 2015 Deposition Transcript of Jonathan Katz,
`CBM2014-00102/106/108/112
`J. Taylor, “DVD-Video: Multimedia for the Masses,” IEEE
`Multimedia, Vol. 6, No. 3, July-September 1999, pp. 86-92
`U.S. Patent No. 5,646,992
`
`Rakesh Mohan, John R. Smith and Chung-Sheng Li , “Adapt-
`
`iv
`
`

`
`EXHIBIT LIST
`
`1041
`
`1042
`
`1043
`
`1044
`
` Covered Business Method Patent Review
`United States Patent No. 8,118,221
`
`
`ing Multimedia Internet Content for Universal Access” IEEE
`(March 1999)
`U.S. Patent No. 5,761,485
`
`U.S. Patent No. 5,903,721
`
`Excerpt of Transcript of Trial Afternoon Session, February
`16, 2015 from Smartflash LLC v. Apple Inc., No. 6:13cv447
`Declaration of Megan F. Raymond In Support of Apple Inc.’s
`Petition for Covered Business Method Patent Review
`
`v
`
`

`
`Covered Business Method Patent Review
`United States Patent No. 8,118,221
`
`I.
`
`INTRODUCTION
`Pursuant to 35 U.S.C. § 321 and 37 C.F.R. § 42.304,1 the undersigned, on be-
`
`half of and acting in a representative capacity for Apple Inc. (“Petitioner”), petitions
`
`for review under the transitional program for covered business method (“CBM”) pa-
`
`tents of claims 3-10, 12-31, and 33 (“challenged claims”) of U.S. Pat. No. 8,118,221
`
`(“’221”), issued to Smartflash Technologies Limited and assigned to Smartflash LLC
`
`(“PO”). Petitioner asserts it is more likely than not that the challenged claims are un-
`
`patentable for the reasons herein and requests review of, and judgment against the
`
`challenged claims 3-10, 12-31, and 33 as unpatentable under § 101, and challenged
`
`claims 6, 22, and 29 as unpatentable under § 112.
`
`As discussed in IV.B, infra, Petitioner previously filed CBM2014-00102/103
`
`and CBM2015-00015 seeking CBM review of certain claims of the ’221. Those peti-
`
`tions were instituted (and CBM2014-00102/103 consolidated) with respect to claims 1,
`
`2, and 11-14 on §103 grounds and claim 1 on §101 grounds. 2 See CBM2014-
`
`
`1 Petitioner is demonstrating, in pending litigation, that these claims are invalid for
`
`numerous additional reasons. All section cites herein are to 35 U.S.C. or 37 C.F.R., as
`
`the context indicates.
`
`2 The Board instituted review of petitions filed by Samsung on the ’221 with respect
`
`to claims 2, 11, and 32 on § 101 grounds, and claims 2 and 11 on § 102 grounds. See
`
`CBM2014-00194, Pap. 9 at 20; CBM2014-00199, Pap. 9 at 13.
`
`1
`
`
`

`
` Covered Business Method Patent Review
`United States Patent No. 8,118,221
`
`00102/103, Pap. 8 at 24; CBM2015-00015, Pap. 23 at 21. With respect to §101, the
`
`Board has stated that claims 1, 2, 11, and 32 are “directed to patent-ineligible subject
`
`matter under 35 U.S.C. 101.” See CBM2014-00194, Pap. 9 at 12; CBM2015-00015,
`
`Pap. 23 at 15. However, none of the challenged claims herein has previously been
`
`challenged by Petitioner or Samsung on §§ 101 or 112 grounds, and the challenged
`
`claims were not being asserted against Petitioner at the time it filed CBM2015-00015.
`
`Apple’s previous petitions were directed towards claims asserted in a first litigation
`
`filed by Smartflash against Apple as of the time the petitions were filed. See Ex.1036.
`
`Since that time, Smartflash has filed a second litigation against Apple in which it again
`
`asserts the ’221. Although Smartflash has not yet identified the asserted claims at issue
`
`in the second litigation, this petition is directed towards the additional claims that
`
`Smartflash may now assert in the new litigation.
`
`The challenged claims are merely directed to steps and corresponding systems
`
`well-known in the field of data storage and access, including the use of a “portable da-
`
`ta carrier for storing and paying for data and to computer systems for providing ac-
`
`cess to data to be stored.” E.g., Ex.1001 1:20-23. Claim 12, e.g., recites four rudimen-
`
`tary steps relating to data storage and access—(A) reading payment data from a data
`
`carrier, (B) forwarding that data to a payment validation system, (C) retrieving data
`
`from a data supplier, and (D) writing the retrieved data to the data carrier:
`
`12. A method of providing data from a data supplier to a data carrier, the
`method comprising:
`
`2
`
`

`
` Covered Business Method Patent Review
`United States Patent No. 8,118,221
`
`
`reading payment data from the data carrier;
`forwarding the payment data to a payment validation system;
`retrieving data from the data supplier; and
`writing the retrieved data into the date carrier.
`
`Ex.1001, cl. 12.3 But at the patent’s earliest claimed priority date, these simple ele-
`
`ments and their combination would have been all well known to any person of ordi-
`
`nary skill in the art (“POSA” 4). See Sect. II; Ex.1021 ¶¶ 82-86, § VI.5 Indeed, the pa-
`
`tent acknowledges that the idea of providing access to data in exchange for a payment
`
`(e.g., purchase of music on a CD) was well known at the time. E.g., Ex.1001 5:9-12
`
`(“where the data carrier stores, for example, music, the purchase outright option may
`
`be equivalent to the purchase of a compact disc (CD), preferably with some form of con-
`
`3 All emphasis herein added unless otherwise noted.
`
`4 All references to a POSA refer to the knowledge or understanding of a person of
`
`ordinary skill in the art as of October 25, 1999. A POSA would have at least a B.S. in
`
`E.E., computer science or a telecommunications related field, and at least three years
`
`of industry experience that included client-server data/information distribution and
`
`management architectures. See Ex.1021 ¶¶ 15-17.
`
`5 In further support of the Petitioner’s grounds, the Declaration of technical expert
`
`John P.J. Kelly, Ph.D., is attached as Exhibit 1021. Dr. Kelly qualifies as a POSA (Ex.
`
`1021 §§ I, III) and has analyzed whether the challenged claims are unpatentable based
`
`on the grounds herein (Ex. 1021 §§ I-II and IV-VIII).
`
`3
`
`

`
` Covered Business Method Patent Review
`United States Patent No. 8,118,221
`
`tent copy protection such as digital watermarking”). The idea of purchasing digital da-
`
`ta for payment was similarly well known. See, e.g., Ex.1005 5:41-56; Ex.1037 14:21-
`
`15:14.6 The prior art was teeming with disclosures of this basic concept. See Sect. II.
`
`Further, claim 12, for example, clearly involves no “technology” at all other than “a
`
`payment validation system” and “a data carrier”—both of which the patent concedes
`
`were well known and entirely commonplace at the time. E.g., Ex.1001 3:36-37, 8:63-
`
`65, 11:27-44, 13:35-47, 13:56-57, 17:6-18:4, 18:20, Figs. 2, 9; Ex.1021 ¶¶ 77, 79, 81,
`
`§ VI. Thus, as the intrinsic record reflects, claim 12 recites no more than a method for
`
`retrieving and storing data from a data supplier while reading and forwarding payment
`
`data for validation. And the other challenged claims are nothing but variations on this
`
`same basic theme, with the addition, in the challenged “system” claims, of equally
`
`well-known components (such as data terminals with interfaces, processors, program
`
`stores and code). See, e.g., Ex.1001 12:29-32 (“The physical embodiment of the system is not
`
`critical and a skilled person will understand that the terminals, data processing systems
`
`and the like can all take a variety of forms.”); Fig. 4(b). In institution decisions on
`
`the ’221 and related patents, the Board correctly found that “the Specification treats as
`
`well-known all potentially technical aspects of [certain challenged claims] including”
`
`
`6 Ex. 1037 is the April 8-9, 2015 Deposition Transcript of Jonathan Katz, PO’s expert,
`
`for CBM2014-00102/106/108/112 regarding the ’221 Patent as well as other related
`
`patents (see Section IV.B infra describing related matters).
`
`4
`
`

`
` Covered Business Method Patent Review
`United States Patent No. 8,118,221
`
`“data store,” “payment system,” “interface,” “content data memory,” “data memory,”
`
`“use rule memory,” “program store,” “processor,” “data carrier,” and code to receive,
`
`retrieve, evaluate, provide, store, write, and access data. See CBM2015-00015, Pap. 23
`
`at 17; CBM2015-00018, Pap. 15 at 11-12; CBM2015-00017, Pap. 22 at 16; CBM2015-
`
`00016, Pap. 23 at 19; CBM2014-00190, Pap. 9 at 15; CBM2014-00192, Pap. 7 at 15;
`
`CBM2014-00193, Pap. 7 at 13; CBM2014-00194, Pap. 9 at 15.
`
`Indeed, as confirmed by Alice Corp. Pty, Ltd. v. CLS Bank Int’l, 134 S. Ct. 2347
`
`(2014)—decided after Petitioner filed its first set of petitions challenging the ’221 Pa-
`
`tent—claim 12 and the remaining challenged claims are also directed to patent-
`
`ineligible subject matter under § 101. This Board has already recognized that claims 1,
`
`2, 11, and 32 of the ’221, which are strikingly similar to claims 3-10 and 33 of the ’221,
`
`recite patent ineligible subject matter, stating that “the claimed ‘data access terminal’ is
`
`directed to an abstract idea,” and the Board is “not persuaded that the challenged
`
`claims of the ’221 patent add an inventive concept sufficient to ensure that the patent
`
`in practice amounts to significantly more than a patent on the abstract idea itself.” See
`
`CBM2015-00015, Pap. 23 at 15-17 (citations omitted); see also CBM2014-00194, Pap. 9
`
`at 13-15. The Board also correctly recognized that “the ’221 patent makes clear that
`
`the asserted novelty of the invention is not in any specific improvement of software
`
`or hardware, but in the method of controlling access to data,” see CBM2014-00102/103,
`
`Pap. 8 at 11; CBM2014-00194, Pap. 9 at 10-11; CBM2015-00015, Pap. 23 at 14, and
`
`5
`
`

`
` Covered Business Method Patent Review
`United States Patent No. 8,118,221
`
`the challenged claims are directed to no more than the unpatentable abstract idea of
`
`payment for and/or controlling access to data, with at most the addition of well-
`
`known, routine, and conventional features—in particular, features that, even if as-
`
`sumed to suggest a generic computer implementation, cannot confer patentability on
`
`these patent-ineligible abstractions. E.g., Alice, 134 S. Ct. at 2359-60. In addition to the
`
`challenged claims being unpatentable under § 101, claims 6, 22, and 29 are also un-
`
`patentable as indefinite under § 112.
`
`II. OVERVIEW OF FIELD OF THE CLAIMED INVENTION
`By October 1999, the sale, distribution, and protection of digital content would
`
`have been well-known to a POSA. See, e.g., Ex.1021 ¶¶ 23-25, 29-30, 46, 75. A POSA
`
`would have been aware of computer-based systems for providing digital content, in-
`
`cluding software, audio, and video content, for a fee. See, e.g., id. ¶¶ 25-30, 34, 43, 46,
`
`48-50, 53-56, 58, 61, 75; Ex.1037 14:21-15:15, 16:6-17:9; see also Ex.1009 at 4:27-35,
`
`6:49-7:6. Such systems included servers, computers, e-payment systems, and user de-
`
`vices connected over known wired and wireless communications networks to distrib-
`
`ute content from content owners to users. See, e.g., Ex.1021 ¶¶ 23-25, 29, 30, 34-38,
`
`43-46, 48, 71-73, 75; Ex.1037 19:3-18; see also Ex.1031 at Fig. 1, 9:50-68.
`
`Indeed, the ’221 Patent explains that the physical embodiment of the system is
`
`“not critical and a skilled person will understand that the terminals, data processing
`
`systems and the like can all take a variety of forms.” Ex.1001 12:26-32. And, the pa-
`
`tent concedes that various claimed components and functionalities were conventional
`
`6
`
`

`
`and well-known in the art (see Ex.1021 ¶ 22), such as:
`
` Covered Business Method Patent Review
`United States Patent No. 8,118,221
`
`
` Internet users paying for goods and/or services by credit card transaction
`
`(Ex.1001 at 2:17-18; 19:5-9)
`
` Encrypting/decrypting content for security (id. 2:64-3:7)
`
` Data access terminal or content access terminal hardware: “conventional comput-
`
`er” or “mobile phone,” “home personal computer,” “mobile communications de-
`
`vice,” “set top box” (id. 4:4-5, 15:63-16:5)
`
` WAP and i-mode allowing mobile phones to access the internet and download da-
`
`ta (id. 4:5-9)
`
` SIM cards including a user identification means (id. 4:9-13)
`
` Non-volatile memory, including EEPROM, Flash memory, optical memory (id.
`
`4:41-47, 17:22-29)
`
` Purchasing digital music equivalent to the purchase of a CD (id. 5:9-12)
`
` Data carrier hardware: “IC card,” “smart card,” “memory stick,” “standard smart
`
`card” (id. 6:28-30, 11:28-31, 17:8-29)
`
` Electronics Point of Sale Systems (EPoSS) functionality for smart cards (id. 11:37-
`
`41)
`
` E-payment systems and standards (id. 13:35-38)
`
` Data access terminal as a “general purpose computer” with standard components
`
`(id. Fig. 8, 16:31-53)
`
`7
`
`

`
` Data access device hardware: “portable audio/video player,” “conventional dedi-
`
` Covered Business Method Patent Review
`United States Patent No. 8,118,221
`
`
`cated computer system” with standard components (id. 18:5-27)
`
` Use control routines including digital watermarking and content protection from
`
`the SDMI specification (id. 18:29-35)
`
` “Standard transmission protocols” used to transmit content data items (id. 21:44-
`
`47)
`
` Communication network, whose detailed implementation is “not essential,” and
`
`can be the “Internet,” “web-based technology,” “any electronic communications
`
`network,” “wide area network,” “local area network,” “wireless network,” “con-
`
`ventional land line network,” “extranet” (id. 25:33-39)
`
`A POSA would have known, for example, multiple systems for selling and dis-
`
`tributing digital content to remote user devices. See, e.g., Ex.1021 ¶¶ 25-30, 34-44, 48-
`
`50, 53-54, 61, 64-65, 67-69; see also Ex.1037 19:3-18. U.S. Pat. No. 5,675,734 (“Hair,”
`
`pub’d Oct. 7, 1997) disclosed a system for selling digital video or audio content.
`
`Ex.1005 Abstract. Hair described a distribution system that transmits digital video or
`
`audio signals stored on a first memory belonging to a first party to a second memory
`
`belonging to a second party for a fee. Id. 5:41-44. In a first step, money is transferred
`
`from the second party to the first party via telecommunications line for an electronic
`
`sale. Id. 5:44-47. Then, the memory of the second party is connected to the memory
`
`of the first party over a telecommunications line, and the digital or audio signals are
`
`8
`
`

`
`transmitted from the first to the second memory. Id. 5:47-56. See, e.g., Ex.1021 ¶ 29.
`
` Covered Business Method Patent Review
`United States Patent No. 8,118,221
`
`
`U.S. Pat. No. 4,999,806 (“Chernow,” pub’d Mar. 12, 1991) also disclosed a sys-
`
`tem for digital content sales. Chernow described a software distribution system in
`
`which a seller computer communicates with buyers over a telephone line for the buy-
`
`ers to browse and purchase or lease software. Ex.1006 2:22-36. The seller computer
`
`answers calls from buyers, verifies credit card information, transmits purchased soft-
`
`ware to buyers, and performs accounting functions to ensure proper billing and rec-
`
`ord keeping. Id. 2:37-47. A POSA would have understood that delivery of the pur-
`
`chased content could be conditioned on successful payment, as the system described
`
`in Chernow ensures that the customer is able to pay for the purchase, for example by
`
`verifying credit card approval for the sale amount, before providing requested soft-
`
`ware. Id. 6:48-65, 7:53-63; see also Ex.1037 24:2-11, 27:4-9. A POSA also would have
`
`appreciated the need to limit leased software to a period of time or a number of runs,
`
`in view of Chernow’s description of software that renders itself unusable or erases it-
`
`self at the conclusion of the leased use. Ex.1006 5:10-18. See, e.g., Ex.1021 ¶¶ 25-28.
`
`In addition to systems for providing purchased content to users after confirm-
`
`ing payment, a POSA would have also been aware of existing systems allowing users
`
`to purchase content that is locally stored, but not yet accessible, by distributing de-
`
`cryption keys after confirming a purchase. For example, The Secure Distribution of
`
`Digital Contents (“von Faber,” pub’d 1997) disclosed a “system for distribution of
`
`9
`
`

`
` Covered Business Method Patent Review
`United States Patent No. 8,118,221
`
`encrypted digital contents via freely accessible distribution media.” Ex.1020 Abstract.
`
`A POSA would have appreciated the importance of ensuring that goods were paid for
`
`before being accessed, as von Faber acknowledged the need to “couple the use of the
`
`provided digital goods with a prior payment for the goods in a way which cannot be
`
`bypassed.” Id. 7; see also Ex.1037 27:4-9. The solution of von Faber was to freely dis-
`
`tribute encrypted digital contents and focus on key management, by providing the de-
`
`cryption key required to gain access to the digital content only after it is “guaranteed
`
`that payment has been authorised.” Ex.1020 at 8. See, e.g., Ex.1021 ¶¶ 43-45.
`
`A POSA also would have known that a central vending system could be used
`
`to provide multiple vendors with a mechanism to market, distribute, and receive pay-
`
`ment for electronic data, as described for example in EP Pat. App. Pub. No. 0809221
`
`(“Poggio,” pub’d Nov. 26, 1997). Ex.1016 Fig. 1, 2:32-36; see also Ex.1037 19:3-18.
`
`Poggio described a vending machine that manages distribution of electronic data on a
`
`variety of license terms by providing information about the products for a purchaser
`
`to browse, obtaining payment for a product, and distributing purchased products to
`
`users’ computers. Ex.1016 4:35-49. The vending machine includes “a digital cash in-
`
`terface 116 for obtaining point-of-sale electronic payment for the license fee associat-
`
`ed with a particular vendor product.” Id. Fig. 1, 6:13-16. The digital cash interface
`
`confirms successful payment of the required license fee with an electronic banking
`
`network before the virtual vending machine provides a product to a user. Id. Fig. 7,
`
`10
`
`

`
`10:7-20. Poggio disclosed a variety of existing payment schemes for purchasing a ven-
`
` Covered Business Method Patent Review
`United States Patent No. 8,118,221
`
`
`dor product that would have been known to a POSA, including “credit card payment
`
`transactions,” “digital cash,” “debit transactions,” and “electronic funds transfers.” Id.
`
`6:25-36. See, e.g., Ex.1021 ¶¶ 34-42.
`
`A POSA also would have known that different product options could be pro-
`
`vided for a buyer to choose from, with different limits on the buyer’s access associat-
`
`ed with each choice and different fee schedules for the products. For example, Poggio
`
`disclosed providing a purchaser with a choice between purchasing a permanent license
`
`for a vendor product or renting the product with a license limited to a rental time pe-
`
`riod. Ex.1016 Fig. 6, 9:25-33. Product sales information stored at the virtual vending
`
`machines includes fee schedules indicating license fees for the product on a purchase
`
`and/or rental basis. Id. Fig.3B, 7:12-16. Rented products are “formatted to include a
`
`time bomb or other disabling device which will disable the product at the end of the
`
`rental period” before being transmitted to the user. Id. 10:25-28. See, e.g., Ex.1021 ¶¶
`
`34-42.
`
`A POSA would have understood that the user’s rights to purchased or rented
`
`content could be “attached” such that the rights remain with the content, like the us-
`
`age rights disclosed in U.S. Pat. No. 5,629,980 (“’980 Stefik,” pub’d May 13, 1997).
`
`Ex.1014 6:51-56. The ’980 Stefik specification described attaching usage rights to con-
`
`tent to “define how that digital work may be transferred, used, performed, or played.”
`
`11
`
`

`
` Covered Business Method Patent Review
`United States Patent No. 8,118,221
`
`Id. 19:14-15. A work could have multiple versions of a right with different prices, such
`
`that a purchaser may choose which option best fits the rights he or she needs. Id.
`
`18:9-16. See, e.g., Ex.1021 ¶¶ 30-33.
`
`A POSA also would have known that a user could be provided with an option
`
`to specify the extent of utilization needed, so that the price paid is dependent on the
`
`amount of usage desired, and the content is released only to that extent of utilization,
`
`as disclosed in U.S. Pat. No. 5,940,805 (“Kopp,” pub’d Aug. 17, 1999). Ex.1010 2:61-
`
`3:2, 5:47-55. Kopp disclosed storing “data records” purchased by users on chip cards
`
`with “data regarding the extent of utilization” such as “number of possible utilizations
`
`of the data record, the length of time during which the data record can be used, or the
`
`time limit up to which the data record may be used.” Id. 5:16-21. The extent of utiliza-
`
`tion is specified by the user during the purchase process, and a vending apparatus
`
`control device calculates a fee based on the specified extent. Id. 5:47-55. The user then
`
`makes payment to a payment device, for example by inserting bills and coins or by
`
`electronically transferring money, before the data record is released. Id. 4:25-42, 5:56-
`
`58. See, e.g., Ex.1021 ¶¶ 58-60.
`
`U.S. Pat. No. 5,530,235 (“’235 Stefik,” pub’d June 25, 1996) disclosed a trans-
`
`portable data carrier, a DocuCard “used for storing digital information which may be
`
`accessed by a system that is capable of playing or rendering the digital information,
`
`such as a computer system, digital copier, audio CD player and the like.” Ex.1013 Ab-
`
`12
`
`

`
` Covered Business Method Patent Review
`United States Patent No. 8,118,221
`
`stract, 4:21-31. ’235 Stefik described implementing the DocuCard as a card “in ac-
`
`cordance with standards promulgated by the Personal Computer Memory Card Inter-
`
`national Association (PCMCIA),” which may be “desirable because of their small size
`
`and support for plug and play applications.” Id. 4:55-5:12. A user accesses documents
`
`from a repository using the DocuCard by logging in to it, for example by entering a
`
`PIN, which may “activate credit accounts,” assigning payment of any fees, and then
`
`selecting a desired document and function before confirming the transaction. Id. Fig.
`
`3, 6:60-7:13. See, e.g., Ex.1021 ¶¶ 30-33.
`
`The DocuCard disclosed in ’235 Stefik implements the functionality of a “re-
`
`pository,” described in more detail in ’980 Stefik.7 See Ex.1013 2:47-52 (incorporat-
`
`ing ’980 Stefik by reference), 4:35-40. A POSA would have appreciated the im-
`
`portance of ensuring that fees paid for use of repository documents were properly dis-
`
`tributed to content creators and copyright owners who were concerned not only with
`
`flexibility in distribution, but also with making sure they were paid for that distribu-
`
`tion, as discussed in ’980 Stefik. Ex.1014 2:66-3:1. The ’980 Stefik specification de-
`
`scribed a solution that attached “usage rights” to works so that fee descriptions re-
`
`main with the work, and “all uses of copies are potentially controlled and billable.” Id.
`
`6:62-7:5. Attaching fee specifications to digital content allows a variety of distribution
`
`and fee schemes to be created. Id. 43:46-49. For example, a fee could be collected for a con-
`
`
`7 ’235 Stefik incorporates ’980 Stefik by reference. See Ex.1013 2:47-52.
`
`13
`
`

`
`tent creator each time a consumer copies a work (id. 43:51-67), a fee could be paid to the cre-
`
` Covered Business Method Patent Review
`United States Patent No. 8,118,221
`
`
`ator and also to the immediate distributor for each copy (id. 44:2-22), distribution fees could
`
`be paid only to distributors licensed by the content creator (id. 44:24-64), or licensed
`
`distributors could be allowed to add fee specifications on their own (id. 44:66-45:20).
`
`See, e.g., Ex.1021¶¶ 30-33.
`
`Examples of possible fee specifications include discounts, incentives paid to
`
`users, or best price specifications that “accommodate special deals, rebates, and pric-
`
`ing that depends on information that is not available to the repository.” Ex.1014
`
`23:60-24:25, 24:34-57. The fee specifications “can be combined with tickets or author-
`
`izations that could indicate that the consumer is a wholesaler or that he is a preferred
`
`customer” in which case when the transaction is reconciled and “any excess amount
`
`will be returned to the consumer in a separate transaction.” Id. 24:39-47. See, e.g.,
`
`Ex.1021 ¶¶ 30-33. A POSA would have understood that these fee specifications (e.g.,
`
`reward data) could be modified in response to other data. See, e.g., Ex.1021 ¶ 31.
`
`A POSA would have understood that digital content distribution systems also
`
`provided digital content to portable systems while still ensuring adequate protection
`
`against unauthorized use, as disclosed, for example, in Japanese Pat. App. Pub. No.
`
`H10-269289 (“Maari,” pub’d October 9, 1998). Ex.1034 ¶ 5; see also Ex.1040. Maari
`
`described a system that distributes encrypted digital content with encrypted content
`
`keys, tracks billing, and “distributes to digital content proprietors the digital content
`
`14
`
`

`
` Covered Business Method Patent Review
`United States Patent No. 8,118,221
`
`usage fees collected based on digital content usage information.” Ex.1034 ¶ 6. An
`
`“administration company” in Maari controls the transfer of information, including
`
`confirming “information such as the bank account number, credit card number, name,
`
`contact address, and the like for the user” to process a request and “determine wheth-
`
`er or not a transaction is possible with the user.” Id. ¶ 18. See, e.g., Ex.1021 ¶¶ 66, 70.
`
`A user’s player in Maari allows access to installed content as long as the user
`
`has purchased sufficient “points” to access the content and requests replenishment of
`
`those points if a shortage is detected. Ex.1034 ¶¶ 32-33. The administration center
`
`confirms with a financial organization that the user’s account allows the purchase and
`
`provides the points to the user. Id. ¶ 34. The administration center also notifies the
`
`content provider the amount of money to be paid to the proprietor and the copyright
`
`holder. Id. ¶ 35. The fees paid by the user are then divided into a “copyright fee” paid
`
`to the content provider, a “store commission” paid to the virtual store, a “content
`
`manipulation commission” paid to the system administration company, a “settlement
`
`commission” paid to the system administration company and the financial organiza-
`
`tion, and a “system administration commission” paid to the system administrati

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket