throbber
Covered Business Method Patent Review
`United States Patent No. 8,061,598
`
`IN THE UNITED STATES PATENT AND TRADEMARK OFFICE
`
`Petitioner: Apple Inc.
`
`Attorney Docket No.:
`
` 104677-5008-829
`Customer No. 28120
`

`Inventor: Racz et al.
`United States Patent No.: 8,061,598 §
`Formerly Application No.: 13/012,541 §
`Issue Date: November 22, 2011

`Filing Date: January 24, 2011

`Former Group Art Unit: 2887

`Former Examiner: Thien M. Le

`
`For: Data Storage and Access Systems
`
`MAIL STOP PATENT BOARD
`Patent Trial and Appeal Board
`United States Patent and Trademark Office
`Post Office Box 1450
`Alexandria, Virginia 22313-1450
`
`PETITION FOR COVERED BUSINESS METHOD PATENT REVIEW OF
`UNITED STATES PATENT NO. 8,061,598 PURSUANT TO 35 U.S.C. § 321,
`37 C.F.R. § 42.304
`
`

`
`Covered Business Method Patent Review
`United States Patent No. 8,061,598
`
`TABLE OF CONTENTS
`
`B.
`
`INTRODUCTION ....................................................................................................... 1
`I.
`II. OVERVIEW OF FIELD OF THE CLAIMED INVENTION ......................... 6
`III. OVERVIEW OF CHALLENGED CLAIMS ....................................................... 18
`IV. PETITIONER HAS STANDING .......................................................................... 23
`A.
`The ’598 Patent Is A Covered Business Method Patent ........................... 23
`1.
`Exemplary Claim 8 Is Financial In Nature ...................................... 25
`2.
`Claim 8 Does Not Cover A Technological Invention ................... 30
`(a)
`Claim 8 Does Not Recite A Technological Feature
`That Is Novel And Unobvious .............................................. 30
`(b) Claim 8 Does Not Solve A Technical Problem Using
`A Technical Solution................................................................ 34
`Related Matters And Mandatory Notice Information; Petitioner Is
`A Real Party In Interest Sued For And Charged With
`Infringement ..................................................................................................... 37
`V. DETAILED EXPLANATION OF REASONS FOR RELIEF
`REQUESTED, SHOWING IT IS MORE LIKELY THAN NOT
`THAT AT LEAST ONE CHALLENGED CLAIM IS
`UNPATENTABLE .................................................................................................... 38
`A.
`Claim Construction .......................................................................................... 40
`B.
`Challenged Claims Are Unpatentable Under § 101 .................................... 43
`1.
`Challenged Claims Are Directed To Abstract Ideas ....................... 45
`2.
`Challenged Claims Do Not Disclose An “Inventive
`Concept” That Is “Significantly More” Than An Abstract
`Idea ......................................................................................................... 53
`(a)
`Field Of Use Limitations Cannot Create Patent
`Eligibility .................................................................................... 54
`(b) Generic Computer Implementation Cannot
`Transform Abstract Ideas Into Patent Eligible
`Inventions .................................................................................. 55
`(i) Generic Computer Functions Cannot
`Transform Abstract Ideas Into Patent Eligible
`Inventions ...................................................................... 56
`
`
`
`i
`
`

`
`Covered Business Method Patent Review
`United States Patent No. 8,061,598
`
`(ii) Generic Computer Hardware Cannot
`Transform Abstract Ideas Into Patent Eligible
`Inventions ...................................................................... 59
`(iii) Challenged Claims Are Analogous To Those
`Found Patent-Ineligible In Alice ................................ 63
`(iv) Challenged Claims Are Analogous To Those
`Found Patent-Ineligible In Accenture ....................... 73
`Functional Nature Of The Challenged Claims
`Confirms Preemption And Patent Ineligibility .................... 76
`(d) Machine-or-Transformation Test Also Confirms
`Patent Ineligibility ..................................................................... 78
`VI. CONCLUSION........................................................................................................... 79
`
`
`(c)
`
`
`
`ii
`
`

`
`Covered Business Method Patent Review
`United States Patent No. 8,061,598
`
`U.S. Patent No. 8,061,598
`
`Plaintiffs’ First Amended Complaint
`
`U.S. Patent No. 5,925,127
`
`U.S. Patent No. 5,940,805
`
`August 2014 Emails Titled “RE: Smartflash: Meet and Confer
`Regarding Further Claim/Prior Art Limits.”
`U.S. Patent No. 4,999,806
`
`U.S. Patent No. 5,675,734
`
`U.S. Patent No. 4,878,245
`
`U.S. Patent No. 7,334,720
`
`U.S. Patent No. 7,942,317
`
`U.S. Patent No. 5,103,392
`
`U.S. Patent No. 5,530,235
`
`U.S. Patent No. 5,629,980
`
`U.S. Patent No. 5,915,019
`
`European Patent Application, Publication No. EP0809221A2
`
`International Publication No. WO 99/43136
`
`JP Patent Application Publication No. H11-164058 (transla-
`tion)
`
`iii
`
`EXHIBIT LIST
`1001
`
`1002
`
`1003
`
`1004
`
`1005
`
`1006
`
`1007
`
`1008
`
`1009
`
`1010
`
`1011
`
`1012
`
`1013
`
`1014
`
`1015
`
`1016
`
`1017
`
`
`
`

`
`Covered Business Method Patent Review
`United States Patent No. 8,061,598
`
`Eberhard von Faber, Robert Hammelrath, and Frank-Peter
`Heider, “The Secure Distribution of Digital Contents,” IEEE
`(1997)
`Declaration of John P. J. Kelly In Support of Apple Inc.’s Pe-
`tition for Covered Business Method Patent Review
`U.S. Patent No. 8,033,458
`
`Declaration of Michael P. Duffey In Support of Apple Inc.’s
`Petition for Covered Business Method Patent Review
`Declaration of Megan F. Raymond In Support of Apple Inc.’s
`Petition for Covered Business Method Patent Review
`Claim Construction Memorandum Opinion from Smartflash
`LLC v. Apple Inc., No. 6:13cv447 (Dkt. 229)
`File History for U.S. Patent No. 8,061,598
`
`U.S. Patent No. 4,337,483
`
`U.S. Patent No. 7,725,375
`
`International Publication No. WO 95/34857
`
`U.S. Patent No. 5,970,479
`
`U.S. Patent No. 5,646,992
`
`Apr. 8-9, 2015 Deposition Transcript of Jonathan Katz,
`CBM2014-00102/106/108/112
`J. Taylor, “DVD-Video: Multimedia for the Masses,” IEEE
`Multimedia, Vol. 6, No. 3, July-September 1999, pp. 86-92
`U.S. Patent No. 5,903,721
`
`iv
`
`EXHIBIT LIST
`1018
`
`1019
`
`1020
`
`1021
`
`1022
`
`1023
`
`1024
`
`1025
`
`1026
`
`1027
`
`1028
`
`1029
`
`1030
`
`1031
`
`1032
`
`
`
`

`
`Covered Business Method Patent Review
`United States Patent No. 8,061,598
`
`EXHIBIT LIST
`1033
`
`1034
`
`1035
`
`1036
`
`1037
`
`1038
`
`R. Mohan, J.R. Smith, C.S. Li, “Adapting Multimedia Internet
`Content for Universal Access,” IEEE Transactions on Multi-
`media, Vol. 1, No. 1, 1999, pp. 104-114
`JP Patent Application Publication No. H10-269289 (transla-
`tion)
`U.S. Patent No. 5,761,485
`
`International Publication No. WO99/13398
`
`U.S. Patent No. 5,953,005
`
`Excerpt of Transcript of Trial Afternoon Session, February
`16, 2015 from Smartflash LLC v. Apple Inc., No. 6:13cv447
`
`
`
`v
`
`

`
`Covered Business Method Patent Review
`United States Patent No. 8,061,598
`
`I.
`
`INTRODUCTION
`
`Pursuant to § 321 and Rule § 42.304,1 the undersigned, on behalf of and acting
`
`in a representative capacity for Apple Inc. (“Petitioner”), petitions for review under
`
`the transitional program for covered business method (“CBM”) patents of claims 3-6,
`
`8-14, 16-30, and 32-41 (“challenged claims”) of U.S. Patent No. 8,061,598 (“the ’598
`
`Patent” or “’598”), issued to Smartflash Technologies Limited and assigned to Smart-
`
`flash LLC (“Patent Owner”). Petitioner asserts that it is more likely than not that the
`
`challenged claims are unpatentable for the reasons herein, and respectfully requests
`
`review of, and judgment against the challenged claims as unpatentable under § 101.
`
`As discussed in Section IV.B, infra, Petitioner previously filed CBM2014-00108
`
`and CBM2014-00109 seeking CBM review of certain claims of the ’598 Patent on
`
`§§ 102 and 103 grounds, and CBM2015-00017, seeking review of certain claims on
`
`§§ 101 and 103 grounds. Those petitions were instituted (and CBM2014-00108/109
`
`were consolidated) with respect to claim 26 on § 103 grounds, and claims 1, 2, 15, and
`
`31 on § 101 grounds.
`
`The previous petitions were generally directed towards claims asserted in a first
`
`litigation filed by Smartflash against Petitioner as of the time those petitions were filed.
`
`Since that time, Smartflash has filed a second litigation against Petitioner in which it
`
`
`
` 1
`
` All section cites herein are to 35 U.S.C. or 37 C.F.R., as the context indicates.
`
`
`
`1
`
`

`
`Covered Business Method Patent Review
`United States Patent No. 8,061,598
`
`again asserts the ’598 Patent. Although Smartflash has not yet identified the asserted
`
`claims in the second litigation, this petition is directed towards the additional claims
`
`that Smartflash may assert in the new litigation. In addition, Samsung Electronics
`
`America (“Samsung”) previously filed CBM2014-00193/198 seeking CBM review of
`
`the ’598 Patent. CBM2014-00193 was instituted for trial with respect to claim 7 on
`
`§ 101 grounds. However, none of the challenged claims herein has previously been
`
`challenged by Petitioner or Samsung on § 101 grounds, and the challenged claims
`
`were not being asserted against Petitioner at the time Petitioner filed the CBM2015-
`
`00017 petition.
`
`The challenged claims are merely directed to steps and corresponding systems
`
`well-known in the field of data storage and access, including use of a “portable data
`
`carrier” and a “data access terminal.” See, e.g., Ex.1001 1:20-24, Abstract, claim 1.
`
`Claim 8, for example, recites six rudimentary components of a portable data carrier—
`
`(A) an interface, (B and C) content data and use rule memory, (D) a program store
`
`storing code implementable by a processor, (E) a processor … for implementing
`
`code, and (G) payment data memory. The recited code is similarly conventional and
`
`well-known: (F) storing content data and a use rule in memory and (H) providing payment
`
`data, including identification data identifying the user of the carrier, to a payment vali-
`
`dation system.
`
`
`
`2
`
`

`
`Covered Business Method Patent Review
`United States Patent No. 8,061,598
`
`1. A portable data carrier comprising:
`
`[A] an interface for reading and writing data from and to the portable
`data carrier;
`
`[B] content data memory, coupled to the interface, for storing one or
`more content data items on the carrier;
`
`[C] use rule memory to store one or more use rules for said one or more
`content data items;
`
`[D] a program store storing code implementable by a processor;
`
`[E] and a processor coupled to the content data memory, the use rule
`memory, the interface and to the program store for implementing code
`in the program store,
`
`[F] wherein the code comprises code for storing at least one content data
`item in the content data memory and at least one use rule in the use rule
`memory.
`
`7. A portable data carrier as claimed in claim 1, further comprising
`
`[G] payment data memory to store payment data and [H] code to
`provide the payment data to a payment validation system.
`
`8. A portable data carrier as claimed in claim 7, wherein
`
`[H] code to provide payment to the payment validation system com-
`prises code to provide the identification data identifying the user of the
`portable data carrier to the payment validation system.
`
`
`
`3
`
`

`
`Covered Business Method Patent Review
`United States Patent No. 8,061,598
`
`Ex.1001.2 But at the patent’s earliest claimed priority date, these simple elements and
`
`their combination were all well-known. See Section II; Ex.1019 ¶ 77.3 The patent
`
`acknowledges that the idea of providing access to data in exchange for a payment (e.g.,
`
`purchase of music on a CD) was well-known at the time. E.g., Ex.1001 5:9-12 (“where
`
`the data carrier stores … music, the purchase outright option may be equivalent to the
`
`purchase of a compact disc (CD), preferably with some form of content copy protection
`
`such as digital watermarking”). The idea of purchasing digital data for payment was
`
`similarly well-known. See, e.g., Ex.1007 5:41-56; Ex.1030 14:21-15:14.4 And, as shown
`
`herein, the prior art was teeming with disclosures of this basic concept and its
`
`
`
` 2
`
` All emphasis herein is added unless otherwise noted.
`
`3 In further support of the Petitioner’s grounds, the Declaration of technical expert
`
`John P.J. Kelly, Ph.D., is attached as Exhibit 1019. Dr. Kelly qualifies as a person of
`
`ordinary skill in the art (“POSA”) (Ex.1019 §§ I, III) and has analyzed whether the
`
`challenged claims are unpatentable based on the grounds in this petition (Ex.1019
`
`§§ I-II and IV-VIII).
`
`4 Exhibit 1030 is the April 8-9, 2015 Deposition Transcript of Jonathan Katz, Patent
`
`Owner’s expert, for CBM2014-00102/106/108/112 regarding the ’598 Patent as well
`
`as other related patents (see Section IV.B infra describing related matters).
`
`
`
`4
`
`

`
`Covered Business Method Patent Review
`United States Patent No. 8,061,598
`
`straightforward implementation, including the ability to store and provide payment
`
`data. See, e.g., Section II.
`
`As its language makes clear, claim 8 involves no “technology” at all other than a
`
`“portable data carrier” with an interface, memory, program store, and a processor—which the
`
`patent itself concedes was well-known and commonplace at the time. See e.g., Ex.1001
`
`11:28-29 (“standard smart card”), 3:37, 4:7-13, 6:19-21, 11:27-44, 17:6-18:4, Figs. 2, 9.
`
`The use rules of claim 8 “may be linked to payments made from the card to provide
`
`payment options such as access to buy content data outright; [or] rental access ….” Id.
`
`5:1-8. Thus, as the intrinsic record reflects, claim 8 recites nothing more than a system
`
`for reading and writing data while restricting access to that data. Indeed, the ’598 Pa-
`
`tent states that “[t]he physical embodiment of the system is not critical and a skilled person will
`
`understand that the terminals, data processing systems and the like can all take a variety of forms.”
`
`See, e.g., Ex.1001 Fig. 1, 12:29-32. And the variations presented in the other challenged
`
`system claims add nothing that was not already well-known. It is thus no surprise that
`
`each element of the challenged claims were known in the prior art. See, e.g., Section II.
`
`Indeed, as confirmed by Alice Corp. Pty, Ltd. v. CLS Bank Int’l, 134 S. Ct. 2347
`
`(2014)—decided after Petitioner filed its first two petitions challenging the ’598 Pa-
`
`tent—the challenged claims are also directed to patent-ineligible subject matter under
`
`§ 101. As the Board noted in its previous Institution Decision, “the ’598 Patent makes
`
`clear that the asserted novelty of the invention is not in any specific improvement of
`
`
`
`5
`
`

`
`Covered Business Method Patent Review
`United States Patent No. 8,061,598
`
`software or hardware, but in the method of controlling access to data,” CBM2014-00108,
`
`Pap. 8, at 10, and the challenged claims are directed to nothing more than the un-
`
`patentable abstract idea of payment for and/or controlling access to data, with at
`
`most the addition of well-known, routine and conventional features that do not ren-
`
`der them patentable—in particular, generic computer implementation that cannot
`
`confer patentability on these patent-ineligible abstractions. E.g., Alice, 134 S. Ct. at
`
`2359-60; Ex.1019 § VII.A. In summary, each challenged claim recites ineligible subject
`
`matter and is thus unpatentable.
`
`II. OVERVIEW OF FIELD OF THE CLAIMED INVENTION
`By October 25, 1999, electronic sale, distribution, and content protection for
`
`digital products all were well-known to a POSA.5 See, e.g., Ex.1019 ¶¶ 23-25, 29-30, 46,
`
`75. A POSA would have been aware of computer-based systems for providing digital
`
`content, including software, audio, and video content, for a fee. See, e.g., id. ¶¶ 29-30,
`
`46, 75; Ex.1030 14:21-15:14, 16:6-17:9; see also Ex.1008 at 4:27-35, 6:49-7:6; Ex.1029 at
`
`
`
` 5
`
` All references to a POSA refer to the knowledge or understanding of a POSA as of
`
`October 25, 1999. A POSA would have at least a B.S. degree in E.E., C.S., or a tele-
`
`communications-related field, and at least three years of industry experience that in-
`
`cluded client-server data/information distribution and management architectures. See,
`
`e.g., Ex.1019 ¶¶ 15-17.
`
`
`
`6
`
`

`
`Covered Business Method Patent Review
`United States Patent No. 8,061,598
`
`1:42-60; Ex.1037 at 5:9-17; Ex.1036 at 4:9-5:3. Such systems included servers, com-
`
`puters, e-payment systems, and user devices connected over known wired and wire-
`
`less communications networks to distribute content from content owners to users. See,
`
`e.g., Ex.1019 ¶¶ 23-25, 29-30, 34-38, 43-46, 48, 71-73, 75; Ex.1030 19:3-18; see also
`
`Ex.1025 at Figure 1, 9:50-68.
`
`Indeed, the ’598 Patent explains that the physical embodiment of the system is
`
`“not critical and a skilled person will understand that the terminals, data processing
`
`systems and the like can all take a variety of forms.” Ex.1001 12:26-32. For example,
`
`the patent concedes that various claimed components and functionalities were con-
`
`ventional and well-known in the art (see Ex.1019 ¶ 22), such as:
`
` Internet users paying for goods and/or services by credit card transaction (2:17-18;
`
`19:5-9)
`
` Encrypting/decrypting content for security: “The skilled person will be aware of a
`
`range of suitable encryption/decryption techniques,” “using a conventional en-
`
`cryption system,” “in a conventional manner as is well known to those skilled in
`
`the art (for example, using public key data encryption)” (2:64-3:7; 18:65-19:2;
`
`21:33-38)
`
` Data access terminal or content access terminal hardware: “conventional comput-
`
`er” or “mobile phone,” “home personal computer,” “mobile communications de-
`
`vice,” “set top box” (4:4-5, 15:63-16:5)
`
`
`
`7
`
`

`
`Covered Business Method Patent Review
`United States Patent No. 8,061,598
`
` WAP and i-mode allowing mobile phones to access the internet and download da-
`
`ta (4:5-9)
`
` SIM cards including a user identification means (4:9-13)
`
` Non-volatile memory, including EEPROM, Flash memory, optical memory (4:41-
`
`47, 17:22-29)
`
` Purchasing digital music equivalent to the purchase of a CD (5:9-12)
`
` Data carrier hardware: “IC card,” “smart card,” “memory stick,” “standard smart
`
`card” (6:28-30, 11:28-31, 17:8-29)
`
` Electronics Point of Sale Systems (EPoSS) functionality for smart cards (11:37-41)
`
` E-payment systems and standards (13:35-38)
`
` Data access terminal as a “general purpose computer” with standard components
`
`(Fig. 8, 16:31-53)
`
` Data access device hardware: “portable audio/video player,” “conventional dedi-
`
`cated computer system” with standard components (18:5-27)
`
` Use control routines including digital watermarking and content protection from
`
`the SDMI specification (18:29-35)
`
` “Standard transmission protocols” used to transmit content data items (21:44-47)
`
` Communication network whose detailed implementation is not essential, and can
`
`be “Internet,” “web-based technology,” “any electronic communications net-
`
`work,” “wide area network,” “local area network,” “wireless network,” “conven-
`
`
`
`8
`
`

`
`Covered Business Method Patent Review
`United States Patent No. 8,061,598
`
`tional land line network,” “extranet” (25:41-48)
`
`A POSA also would have known, for example, that content could be provided
`
`to, and played on, mobile phones, as disclosed in Japanese Patent App. Pub. No.
`
`H11-164058 (“Sato,” pub’d June 18, 1999). See also Ex.1033; Ex.1034 at ¶ 5; Ex.1035
`
`at Figure 1, 5:65-7:16. Sato disclosed a mobile phone connected to a music distribu-
`
`tion center server via a public communications network. Ex.1017 Fig. 1, Abstract, ¶ 3.
`
`Using the phone, a user accesses a distribution center, enters a song selection, and re-
`
`ceives the selected music on the mobile phone. Id. ¶¶ 12, 14. The downloaded music
`
`is stored either in a local “storage device” in the mobile phone or in a “removable
`
`storage device,” such as “a memory card similar to, for example, a magnetic card, a
`
`magnetic tape, a CD, a DVD, or an IC card” for later playback on the mobile phone.
`
`Id. ¶¶ 8-9. Sato also discloses performing a billing process after transmission from the
`
`distribution center. Id. ¶ 15. See, e.g., Ex.1019 ¶ 73.
`
`International Pub. No. WO99/43136 (“Rydbeck,” pub’d August 26, 1999) also
`
`disclosed a cellular telephone that stores and plays music through the telephone’s
`
`headset. Ex.1016 Fig. 1, Abstract. Rydbeck disclosed a “digital entertainment module”
`
`that includes “RAM and/or removable memory cartridges for storing music or other
`
`audio signals which can be played back through the headset” of the cellular phone. Id.
`
`6. Rydbeck discloses a bus or input port on the entertainment module for interfacing
`
`with a source of the music, or the music may be obtained “from the transceiver unit
`
`
`
`9
`
`

`
`Covered Business Method Patent Review
`United States Patent No. 8,061,598
`
`12 in an ‘internet-enabled’ phone.” Id. The digital entertainment module integrated
`
`with the cellular phone advantageously shares components already present in the cel-
`
`lular phone. Id. at 3. In addition to the hardware components disclosed in Rydbeck
`
`and Sato, a POSA would have understood that the cellular phone devices discussed in
`
`both references contained SIM cards that were well-known and common by 1999, or
`
`at a minimum would have appreciated that such a SIM card could be installed in the
`
`phone. See, e.g., Ex.1019 ¶¶ 72-73; see also Ex.1030 41:19-42:10. Indeed, as conceded
`
`in the ’598 specification, SIM cards were already known: “The data storage means can,
`
`if desired, incorporate the functionality of a mobile phone SIM (Subscriber Identity
`
`Module) card, which cards already include a user identification means, to allow user
`
`billing through the phone network operator.” Ex.1001 4:9-13. See, e.g., Ex.1019 ¶ 22.
`
`U.S. Patent No. 5,530,235 (“’235 Stefik,” pub’d June 25, 1996) disclosed a
`
`transportable DocuCard “used for storing digital information which may be accessed
`
`by a system that is capable of playing or rendering the digital information, such as a
`
`computer system, digital copier, audio CD player and the like.” Ex.1012 Abstract,
`
`4:21-31. The ’235 Stefik specification described implementing the DocuCard as a card
`
`“in accordance with standards promulgated by the Personal Computer Memory Card
`
`International Association (PCMCIA),” which may be “desirable because of their small
`
`size and support for plug and play applications.” Id. 4:55-5:12. A user accesses docu-
`
`ments from a repository using the DocuCard by logging in to it, for example by enter-
`
`
`
`10
`
`

`
`Covered Business Method Patent Review
`United States Patent No. 8,061,598
`
`ing a PIN, which may “activate credit accounts,” assigning payment of any fees, and
`
`then selecting a desired document and function before confirming the transaction. Id.
`
`Fig. 3, 6:60-7:13. A POSA would have understood that the PIN can be stored in
`
`memory. See, e.g., Ex.1019 ¶ 30.
`
`The DocuCard disclosed in ’235 Stefik implements the functionality of a “re-
`
`pository,” described in more detail in U.S. Patent No. 5,629,980 (“’980 Stefik,” pub’d
`
`May 13, 1997). See Ex.1012 2:48-52 (incorporating ’980 Stefik by reference), 4:35-40.
`
`The ’980 Stefik specification disclosed a repository having a processing means that
`
`provides the functions of the repository by executing code stored in a processor
`
`memory. Ex.1013 Fig. 12, 14:15-27. The repository also includes a content storage for
`
`storing content and a description storage, which may be the same memory or a physi-
`
`cally different memory device, for storing description trees for the associated content.
`
`Id. Fig. 12, 14:28-35. A description file includes an identifier for its associated digital
`
`work and a pointer to the starting address in memory at which the work is stored. Id.
`
`Fig. 7, 9:54-58. The identifier includes both a number identifying the work and a
`
`unique number identifying the repository that is assigned upon manufacture of the
`
`device. Id. Fig. 7, 9:62-66. A POSA would have understood that a pointer could be
`
`used to refer to an address in memory or to refer to the address of a remote server.
`
`See, e.g., Ex.1030 at 27:10-28:19. A POSA also would have understood that the pointer
`
`can also be a URL. See Ex.1014 287:36-58, discussed infra. See, e.g., Ex.1019 ¶¶ 30-33.
`
`
`
`11
`
`

`
`Covered Business Method Patent Review
`United States Patent No. 8,061,598
`
`The stored digital work descriptions in ’980 Stefik also include a “rights portion”
`
`that indicates the “granted usage rights and their status data….” Ex.1013 Figs. 7 and
`
`10, 9:59-10:1, 10:24-33, Table 1. The usage rights associated with a digital work “de-
`
`fine how that digital work may be transferred, used, performed, or played.” Id. 19:14-
`
`15. The works and their associated descriptions, including the usage right descrip-
`
`tions that define how the work may be used, are stored in separate memories on a re-
`
`pository device, and those memories may be different memory types or may be physi-
`
`cally separate memory devices. Id. Fig. 12, 14:28-39. When a digital work is transferred
`
`between repositories or used, a “next set of rights” can track and update the rights
`
`remaining on the digital work. Id. Fig. 15, 11:40-44, 19:58-20:2, 20:55-67. The updated
`
`rights may limit usage of the digital work, for example by setting a limit on the num-
`
`ber of copies of a digital work that may be loaned out or viewed at one time. Id.
`
`21:10-24. See, e.g., Ex.1019 ¶¶ 30-33.
`
`In another example, U.S. Patent No. 5,915,019 (“Ginter,” pub’d June 22, 1999)
`
`disclosed a Virtual Distribution Environment (“VDE”) with flexibility to support dif-
`
`ferent transactions among content producers and consumers wishing to obtain rights
`
`to use programs from the producers. Ex.1014 Fig. 1, 53:38-59. The VDE distributes
`
`content among “electronic appliances,” which include computers, set top boxes,
`
`phones, and “smart” credit cards. Id. Fig. 8, 60:18-30. In some embodiments, the elec-
`
`tronic appliance is portable, for example implemented as a PCMCIA card or “smart
`
`
`
`12
`
`

`
`Covered Business Method Patent Review
`United States Patent No. 8,061,598
`
`card.” Id. Fig. 71, 228:36-54, 230:20-38. The portable appliance may contain memory
`
`storing information which uniquely identifies each device for authentication and veri-
`
`fication. Id. 229:12-17. The electronic appliances store VDE content and code for op-
`
`erating VDE functions in a secondary storage of the appliance that is accessible by a
`
`CPU or SPU (“Secure Processing Unit”). Id. Fig. 8, 62:56-67. VDE content provided
`
`to users on an electronic appliance is stored either locally in content memory at a data
`
`supplier or remotely, in which case the data supplier responds to a user request using
`
`content references (e.g., “the network address where the content may be located, a
`
`URL, a filesystem reference”) to retrieve the data for transmission to the user. Id.
`
`287:36-58. For content stored remotely, a POSA would have understood that a point-
`
`er could be used to refer the address of a remote server. See, e.g., Ex.1030 at 27:10-
`
`28:19. Ex.1019 ¶¶ 48-51.
`
`The VDE in Ginter protects content distributed among appliances by imple-
`
`menting flexible “rules and controls” that are used to grant users specific rights, speci-
`
`fy how much is to be paid for content usage, and establish usage reporting require-
`
`ments. Id. 56:25-61. The rules and controls either travel with the content to which
`
`they apply or are delivered to a user separately from content. Id. 57:27-40. See, e.g.,
`
`Ex.1019 ¶¶ 48-51.
`
`The secure data management functions of electronic appliances are performed
`
`by a processing unit, such as an SPU. Ex.1014 Fig. 8, 63:27-31. The SPU functions
`
`
`
`13
`
`

`
`Covered Business Method Patent Review
`United States Patent No. 8,061,598
`
`include “secure data management processes including governing usage of, auditing of,
`
`and where appropriate, payment for VDE objects 300 (through the use of prepay-
`
`ments, credits, real-time electronic debits from bank accounts and/or VDE node cur-
`
`rency token deposit accounts).” Id. 63:34-41. The processes performed by the SPU,
`
`and dictated by the rules and controls, include “events” processes, “meter” processes,
`
`“billing” processes, and “budget” processes that track and control use of and payment
`
`for VDE content. Id. 57:50-58:32. A VDE appliance employs a “usage map” (e.g., use
`
`status data) to store usage history information, for example by mapping which content
`
`or parts of a piece of content (e.g., chapters in a book) a user accesses. Id. 145:48-
`
`146:22. See, e.g., Ex.1019 ¶¶ 48-51.
`
`A POSA also would have known that a central vending system could be used
`
`to provide multiple vendors with a mechanism to market, distribute, and receive pay-
`
`ment for electronic data, as described for example in EP Patent App. Pub. No.
`
`0809221 (“Poggio,” pub’d November 26, 1997). Ex.1015 Fig. 1, 2:32-36; see also
`
`Ex.1030 19:3-18. Poggio described a vending machine that manages distribution of
`
`electronic data on a variety of license terms by providing information about the prod-
`
`ucts for a purchaser to browse, obtaining payment for a product, and distributing pur-
`
`chased products to users’ computers. Ex.1015 4:35-49. The vending machine includes
`
`“a digital cash interface 116 for obtaining point-of-sale electronic payment for the li-
`
`cense fee associated with a particular vendor product.” Id. Fig. 1, 6:13-16. The digital
`
`
`
`14
`
`

`
`Covered Business Method Patent Review
`United States Patent No. 8,061,598
`
`cash interface confirms successful payment of the required license fee with an elec-
`
`tronic banking network (e.g., payment validation system) before the virtual vending
`
`machine provides a product to a user. Id. Fig. 7, 10:7-20; see also Ex.1001 13:35-47.
`
`Poggio disclosed a variety of existing payment schemes for purchasing a vendor
`
`product that would have been known to a POSA, including “credit card payment
`
`transactions,” “digital cash,” “debit transactions,” and “electronic funds transfers.”
`
`Ex.1015 6:25-36. See, e.g., Ex.1019 ¶¶ 34-42.
`
`A POSA would have also known additional methods for executing electronic
`
`payments beyond those explicitly discussed in Poggio. See Ex.1030 16:6-19:2. For ex-
`
`ample, U.S. Patent No. 5,903,721 (“Sixtus,” pub’d May 11, 1999) disclosed an elec-
`
`tronic payment system in which a “user’s credit card number or other like sensitive
`
`information is not transmitted between entities as part of the transaction approval
`
`process.” Ex.1032 7:37-40. The system instead securely registers a user’s payment in-
`
`formation, such as a credit card, in an initial transaction and then later uses that in-
`
`formation for checking credit approval without requiring the user to transmit the sen-
`
`sitive payment information. Id. 7:40-53; 8:21-31. The user sends only user identification in-
`
`formation that is used to locate and check the registered payment information. Id.
`
`10:19-31. See, e.g., Ex.1019 ¶¶ 64-65.
`
`A POSA would have appreciated the need to monitor and control usage of dis-
`
`tributed digital content to ensure that usage was properly paid for and that the distrib-
`
`
`
`15
`
`

`
`Covered Business Method Patent Review
`United States Patent No. 8,061,598
`
`uted content was protected from unauthorized use, and a POSA would have been
`
`aware of existing systems designed to implement such monitoring, such as the “Soft-
`
`Meter” system for requiring purchase of specified amounts of software use as dis-
`
`closed in International Pub. No. WO95/34857 (“Smith,” pub’d December 21, 1995).
`
`Ex.1027 Abstract. The SoftMeter system stores a user’s information, such as name,
`
`address, charge card number, and password, for purchasing specified amounts of
`
`software usage. Id. 8:10-14. The usage may be purchased by units of time, pages, key-
`
`strokes, or records retrieved. Id. 9:15-28, 19:7-16. To purchase usage, the user speci-
`
`fies an amount of desired usage, enters a password, and transmits the stored payment
`
`information from memory of the SoftMeter device for approval by a financial transac-
`
`tion center. Id. Fig. 5, 18:21-33. As Smith indicates, such purchases were well-known
`
`with “absolutely nothing new” in the transaction process, as “there is no difference
`
`between the telephonically transmitted message from a retail merchant’s card-swipe
`
`terminal and an identical m

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket