throbber

`UNITED STATES PATENT AND TRADEMARK OFFICE
`_____________________
`
`BEFORE THE PATENT TRIAL AND APPEAL BOARD
`_____________________
`
`
`
`GLOBAL TEL*LINK CORPORATION,
`Petitioner
`
`v.
`
`SECURUS TECHNOLOGIES, INC.,
`Patent Owner
`____________________
`
`Case CBM2017-00043
`Patent No. 7,529,357
`_____________________
`
`
`
`
`
`PETITION FOR COVERED BUSINESS METHOD REVIEW OF CLAIMS
`2, 5, 8, 9, 11, 12, AND 14-18 OF U.S. PATENT NO. 7,529,357
`
`
`
`Mail Stop “PATENT BOARD”
`Patent Trial and Appeal Board
`U.S. Patent and Trademark Office
`P.O. Box 1450
`Alexandria, VA 22313-1450
`
`
`
`

`

`Petition for Covered Business Method
`Review of U.S. Patent No. 7,529,357
`TABLE OF CONTENTS
`
`B.
`
`b.
`
`Mandatory Notices.......................................................................................... 4
`I.
`Identification of Challenge ............................................................................. 5
`II.
`III. Grounds for Standing ...................................................................................... 6
`A. GTL meets the eligibility requirements to file the present petition. ..... 6
`1.
`GTL has standing. ...................................................................... 6
`2.
`GTL is not estopped. .................................................................. 6
`3.
`GTL has not filed a civil action challenging the validity of a
`claim of the patent. ..................................................................... 7
`The ’357 patent is a business method patent. ........................................ 7
`1.
`Overview of the ’357 patent. ..................................................... 8
`2.
`The ’357 patent claims activities that are financial in nature. . 11
`3.
`The ’357 patent does not claim a “technological invention.” .. 13
`a.
`The remaining claims are not novel or
`nonobvious. ..........................................................13
`The claims do not solve a technical
`problem with a technical solution. .......................21
`IV. Claim Construction ....................................................................................... 22
`V.
`Level of Ordinary Skill in the Art ................................................................ 23
`VI. GROUND 1: The remaining claims are unpatentable under 35 U.S.C. §
`101. ............................................................................................................... 23
`A. All of the challenged claims are directed to the abstract idea of
`centrally and remotely managing inmate information. .......................25
`1.
`Independent claims 1 and 10 .................................................... 25
`2.
`The dependent claims are directed to an abstract idea. ........... 30
`There is no inventive concept beyond the abstract idea; the claims
`rely on conventional technologies performing routine functions. ......36
`1.
`Independent Claims.................................................................. 37
`a.
`Independent Claim 1 ............................................37
`b.
`Independent Claim 10 ..........................................44
`
`B.
`
`
`
`- i -
`
`

`

`Petition for Covered Business Method
`Review of U.S. Patent No. 7,529,357
`Dependent Claims 2 and 14 ..................................................... 47
`2.
`Dependent Claims 5 and 12 ..................................................... 48
`3.
`Dependent Claims 8 and 16 ..................................................... 49
`4.
`Dependent Claims 9 and 17 ..................................................... 51
`5.
`Dependent Claim 11 ................................................................ 51
`6.
`Dependent Claim 15 ................................................................ 52
`7.
`Dependent Claim 18 ................................................................ 54
`8.
`The claims preempt longstanding human activities because they
`recite generic ways of managing inmate information. ........................56
`VII. Conclusion .................................................................................................... 58
`
`C.
`
`
`
`- ii -
`
`

`

`Petition for Covered Business Method
`Review of U.S. Patent No. 7,529,357
`TABLE OF AUTHORITIES
`
`Cases
`Alice Corp. Pty. Ltd. v. CLS Bank Int’l,
`134 S.Ct. 2347 (2014) .................................................................................. passim
`Apple Inc. v. SightSound Techs., LLC, CBM2013-00020, Paper 14 (P.T.A.B. Oct.
`8, 2013) ................................................................................................................11
`Bascom Glob. Internet Servs., Inc. v. AT&T Mobility LLC,
`827 F.3d 1341 (Fed. Cir. 2016) ...........................................................................44
`DDR Holdings, LLC v. Hotels.com, L.P.,
`773 F.3d 1245 (Fed. Cir. 2014) .................................................................... 24, 36
`Elec. Power Grp., LLC v. Alstom S.A.,
`830 F.3d 1350 (Fed. Cir. 2016) ................................................................... passim
`Global Tel*Link Corporation v. Securus Technologies, Inc.,
`IPR2014-00493, Paper 32 (P.T.A.B. Sept. 11, 2015) .................................. passim
`Global Tel*Link Corporation v. Securus Technologies, Inc.,
`IPR2014-00825, Paper 36 (P.T.A.B. Dec. 2, 2015) .............................................. 1
`Hybritech v. Monoclonal Antibodies, Inc.,
`802 F.2d 1367 (Fed. Cir. 1986) ...........................................................................58
`Intellectual Ventures I LLC v. Capital One,
`792 F.3d 1363 (Fed. Cir. 2015) ...........................................................................36
`Intellectual Ventures I, LLC v. Symantec Corporation,
`838 F.3d 1307 (Fed. Cir. 2016) ...........................................................................27
`Mayo Collab. Servs. v. Prometheus Labs.,
`132 S.Ct. 1289 (2012) ............................................................................. 23, 24, 56
`SightSound Techs., LLC v. Apple Inc.,
`809 F.3d 1307 (Fed. Cir. 2015) ...........................................................................11
`Square, Inc. v. Unwired Planet, LLC,
`CBM2014-00156, Paper 40 (P.T.A.B. Dec. 22, 2015)........................................12
`Versata Dev. Grp., Inc. v. SAP Am., Inc.,
`793 F.3d 1306 (Fed. Cir. 2015) ...........................................................................11
`
`
`
`
`
`- iii -
`
`

`

`Petition for Covered Business Method
`Review of U.S. Patent No. 7,529,357
`
`Statutes
`35 U.S.C. § 102(b) ...................................................................................................14
`35 U.S.C. § 315(e) ..................................................................................................... 7
`AIA § 18(a)(1)(B) ...................................................................................................... 6
`AIA § 18(d)(1) .....................................................................................................7, 13
`
`Other Authorities
`
`77 Fed. Reg. 48,734 (Aug. 14, 2012).......................................................................11
`
`Regulations
`37 C.F.R. § 42.10(a) ................................................................................................... 5
`37 C.F.R. § 42.301(a) ................................................................................................. 7
`37 C.F.R. § 42.301(b) ..............................................................................................13
`37 C.F.R. § 42.302(a) ................................................................................................. 6
`37 C.F.R. § 42.304(a) ................................................................................................. 6
`37 C.F.R. § 42.8(b)(3) ................................................................................................ 5
`37 C.F.R. § 42.206 ..................................................................................................... 6
`
`
`
`
`
`
`
`- iv -
`
`

`

`Petition for Covered Business Method
`Review of U.S. Patent No. 7,529,357
`EXHIBIT LIST
`
`Description
`
`U.S. Patent No. 7,529,357 to Rae, issued May 5, 2009
`Declaration of Dr. Leonard J. Forys in Support of Petition for Inter
`Partes Review of U.S. Patent No. 7,529,357
`Dr. Leonard J. Forys Curriculum Vitae
`SR-4717, “Voice Over Packet in Next Generation Networks: An
`Architectural Framework,” Bellcore, January 1999
`U.S. Patent Application Publication No. 2004/0029564 to Hodge,
`published February 12, 2004
`U.S. Patent No. 6,831,556 to Boykin, issued December 14, 2014
`U.S. Patent No. 5,861,810 to Nguyen, issued January 19, 1999
`“Criminal Calls: A Review of the Bureau of Prisons’ Management of
`Inmate Telephone Privileges” (U.S. Department of Justice, Office of
`the Inspector General, August 1999)
`Securus Technologies, Inc. v. Global Tel*Link Corporation, No. 3-
`16-cv-01338, Complaint (N.D. Tex. May 13, 2016)
`U.S. Patent No. 4,054,756 to Comella, et al., issued October 18,
`1977
`PacketCableTM 1.0 Architecture Framework Technical Report, PKT-
`TR-ARCH-V01-001201 (Cable Television Laboratories, Inc. 1999)
`Bur Goode, Voice Over Internet Protocol (VoIP), Proceedings of the
`IEEE, Vol. 90, No. 9, 1495–1517 (Sept. 2002)
`U.S. Patent No. 7,899,167 to Rae, issued March 1, 2011
`U.S. Patent No. 7,505,406 to Spadaro, et al., issued March 17, 2009
`BubbleLINK Software Architecture, Science Dynamics Corporation,
`2003.
`BOP Historical Timeline,
`http://www.bop.gov/about/history/timeline.jsp (last accessed October
`11, 2016)
`
`Exhibit
`No.
`1001
`1002
`
`1003
`1004
`
`1005
`
`1006
`1007
`1008
`
`1009
`
`1010
`
`1011
`
`1012
`
`1013
`1014
`1015
`
`1016
`
`
`
`- v -
`
`

`

`Petition for Covered Business Method
`Review of U.S. Patent No. 7,529,357
`
`Exhibit
`No.
`1017
`
`1018
`
`1019
`
`1020
`1021
`
`1022
`
`1023
`
`1024
`
`1025
`
`1026
`
`Description
`
`SENTRY Audit Report No. 0325, U.S. Department of Justice, Office
`of the Inspector General, July 2003
`“Privacy Impact Assessment for the SENTRY Inmate Management
`System,” U.S. Department of Justice, Federal Bureau of Prisons, July
`2, 2012
`“Inmate Security Designation and Custody Classification Program
`Statement,” U.S. Department of Justice, Federal Bureau of Prisons,
`September 12, 2006
`U.S. Patent No. 7,197,560 to Caslin, issued March 27, 2007
`“SIP and IPLink in the Next Generation Network: An Overview,”
`Intel Corporation, 2001.
`Commander II, http://www.scidyn.com/products/commander2.html
`(archived by web.archive.org on March 6, 2002)
`SR-2275, “Bellcore Notes on the Networks,” Bellcore, December
`1997.
`Engineering and Operations in the Bell System, Second Edition,
`AT&T Bell Laboratories, 1984
`Pages from http://www.corp.att.com/history, archived by
`web.archive.org on November 4, 2013.
`U.S. Patent No. 4,191,860 to Weber, issued March 4, 1980
`
`
`
`- vi -
`
`

`

`
`
`
`
` Petition for Covered Business Method
`Review of U.S. Patent No. 7,529,357
`
`Petitioner, Global Tel*Link Corporation (“GTL”), petitions for Covered
`
`Business Method (“CBM”) review of dependent claims 2, 5, 8, 9, 11, 12, and 14-
`
`18, the sole remaining claims in U.S. Patent No. 7,529,357 (“the ’357 patent”). The
`
`Board previously found independent claims 1 and 10 and dependent claims 3, 4, 6,
`
`7, 13, 19, and 20 unpatentable. Global Tel*Link Corporation v. Securus
`
`Technologies, Inc., IPR2014-00825, Paper 36, Final Written Decision (P.T.A.B.
`
`Dec. 2, 2015).
`
`The claims of the ’357 patent are directed to managing inmate information
`
`and communications for multiple facilities at a remote, centralized location. In
`
`particular, the ’357 patent describes “centralized or nodal inmate management and
`
`telephone call processing capabilities.” (Ex. 1001, ’357 patent, 2:62-65.) The
`
`inmate management and telephone call processing system “serves a plurality of
`
`controlled environment facilities” and “includes an inmate information database to
`
`provide data aggregation and sharing capabilities across several facilities, in
`
`addition to call processing functionality.” (Id., 2:66-3:7.)
`
`Remote, centralized call processing and shared information management
`
`were well-known before July 2007, the filing date of the ’357 patent which Patent
`
`Owner contends is the priority date for the challenged claims. Dr. Leonard Forys,
`
`who has nearly 50 years of experience working in the telecommunications
`
`industry, explains that the purported invention of the ’357 patent, centralizing
`
`
`
`- 1 -
`
`

`

`
`
`
`information management was standard practice in telecommunications for at least
`
` Petition for Covered Business Method
`Review of U.S. Patent No. 7,529,357
`
`four decades prior to the filing date of the ’357 patent. Prison systems also
`
`followed these trends and incorporated centralization well before the ’357 patent.
`
`For example, the Federal Bureau of Prisons (BOP) centralized storage and
`
`management of inmate data in its SENTRY database as early as 1978. Federal
`
`prison facilities accessed the centralized SENTRY database to load, update and
`
`manage inmate records.
`
`Centralization of call processing was also known and established in the
`
`prison environment prior to the filing date of the ’357 patent. For example, U.S.
`
`Patent No. 4,054,756 to Comella, issued in 1977, introduced centralized call
`
`processing facilities to service collect calls. These centralized platforms handled
`
`inmate calls from remote prison facilities. (Ex. 1002, Forys Decl., ¶54.) For
`
`example, U.S. Patent No. 7,505,406 to Spadaro applied the well-known
`
`centralization concept to inmate communications systems utilizing Voice over
`
`Internet Protocol (VoIP) networks more than six years before the filing date of the
`
`’357 patent. Further, U.S. Patent Application Publication No. 2004/0029564 to
`
`Hodge applies shared information management to centralized prison call
`
`processing platforms more than one year before filing date of the ’357 patent.
`
`The ’357 patent is a covered business method (“CBM”) patent because at
`
`least challenged claims 8, 9, 16, and 17 recite systems or methods that have
`
`
`
`- 2 -
`
`

`

`
`
` Petition for Covered Business Method
`Review of U.S. Patent No. 7,529,357
`
`
`particular uses “in the practice, administration, or management of a financial
`
`product or service.” Specifically, these claims recite “inmate accounts for charging
`
`fees to the third parties associated with the inmates . . .” (’357 patent, 26:2-4.) The
`
`financial nature of the subject matter is confirmed by its corresponding description
`
`in the specification, which provides that “[t]he account may be a pre-paid account,
`
`a post-paid account, a debit account, a credit account, or the like.” (’357 patent,
`
`3:41-43; see also id., 18:43-46.) Accordingly, at least claims 8, 9, 16, and 17 fall
`
`squarely within the definition of a CBM patent.
`
`The ’357 patent is not a technological invention. The ’357 patent assumes
`
`the use of conventional equipment for its ordinary purpose in a well-known
`
`environment. Nothing recited in the claims is distinguishable over the prior art.
`
`Nor does the ’357 patent solve a technical problem with a technical solution.
`
`Rather, the’357 patent alleges that its invention is “centralized or nodal inmate
`
`management.” (’357 patent, 2:62-64.) But the concept of centralization is not an
`
`inventive technological solution. For example, the Federal BOP centralized
`
`management of inmates and associated data for decades prior to the filing date of
`
`the ’357 patent. And as Dr. Forys explains in his Declaration, it has always been
`
`advantageous to centralize records, including inmate records. The ’357 patent
`
`relates fundamentally to organizing human activities and information about
`
`inmates. Thus, it is not technological in nature.
`
`
`
`- 3 -
`
`

`

`
`
`
`
` Petition for Covered Business Method
`Review of U.S. Patent No. 7,529,357
`
`With respect to unpatentability, the challenged claims fail to recite patent-
`
`eligible subject matter under 35 U.S.C. § 101. Specifically, claims 2, 5, 8, 9, 11,
`
`12, and 14-18 are directed to the abstract idea of centrally, remotely managing
`
`inmate information. The claims recite conventional equipment used for its ordinary
`
`purpose and otherwise attempt to cover longstanding, prevalent ways of organizing
`
`human activities and inmate information. A high level of preemption risk exists in
`
`this case because the challenged claims at best require only that the recited
`
`functions and steps be performed using generic computer-based systems,
`
`conventional telephones, and off-the-shelf networking equipment. Indeed, a person
`
`using generic equipment to centrally, remotely manage inmate information would
`
`be preempted by these broad and abstract claims. Accordingly, the Board should
`
`find claims 2, 5, 8, 9, 11, 12, and 14-18 to be subject-matter ineligible.
`
`I. Mandatory Notices
`
`REAL PARTY-IN-INTEREST: The real party-in-interest of Petitioner is Global
`
`Tel*Link Corporation (“GTL”).
`
`RELATED MATTERS:
`
`The ’357 patent is the subject of the following civil action: Securus
`
`Technologies, Inc. v. Global Tel*Link Corporation, No. 3-16-cv-01338 (N.D.
`
`Tex.).
`
`The ’357 patent claims the benefit of U.S. Patent No. 7,899,167 (“the ’167
`
`
`
`- 4 -
`
`

`

`
`
`
`patent”), filed August 15, 2003. U.S. Patent No. 8,340,260 (“the ’260 patent”),
`
` Petition for Covered Business Method
`Review of U.S. Patent No. 7,529,357
`
`filed March 24, 2009, claims the benefit of the ’357 patent.
`
`The ’357 patent was the subject of inter partes review proceeding IPR2014-
`
`00825, filed May 27, 2014. The ’260 patent was the subject of inter partes review
`
`proceeding IPR2014-00824, filed May 27, 2014. The ’167 Patent was the subject
`
`of inter partes review proceeding IPR2014-00493, filed March 10, 2014.
`
`Petitioner is concurrently filing a petition for covered business method
`
`review of the ’260 patent.
`
`LEAD AND BACKUP COUNSEL: Pursuant to 37 C.F.R. § 42.8(b)(3) and 42.10(a),
`
`Petitioner appoints Lori A. Gordon (Reg. No. 50,633) as its lead counsel and
`
`Michael B. Ray (Reg. No. 33,997) and Ryan C. Richardson (Reg. No. 67,254) as
`
`its back-up counsel, all at the address: STERNE, KESSLER, GOLDSTEIN & FOX, 1100
`
`New York Avenue, N.W., Washington, D.C., 20005, phone number (202) 371-
`
`2600 and facsimile (202) 371-2540.
`
`SERVICE INFORMATION: Petitioner consents to electronic service by email at
`
`the email addresses: lgordon-PTAB@skgf.com, mray-PTAB@skgf.com and
`
`rrichardson-PTAB@skgf.com.
`
`II.
`
`Identification of Challenge
`
`GTL requests review of claims 2, 5, 8, 9, 11, 12, and 14-18 as unpatentable
`
`under 35 U.S.C. § 101.
`
`
`
`- 5 -
`
`

`

`
`
`
`III. Grounds for Standing
`
` Petition for Covered Business Method
`Review of U.S. Patent No. 7,529,357
`
`A. GTL meets the eligibility requirements to file the present petition.
`
`1. GTL has standing.
`
`A party may not file a petition for covered business method (“CBM”) review
`
`unless the person or the person’s real party-in-interest or privy has been sued for
`
`infringement of the challenged patent or has been charged with infringement under
`
`that patent. See AIA § 18(a)(1)(B); 37 C.F.R. §§ 42.206, 42.302(a), 42.304(a). The
`
`Patent Owner, Securus, charged GTL with infringement of the ’357 patent on May
`
`13, 2016. (See Ex. 1009, Complaint in Securus Technologies, Inc. v. Global
`
`Tel*Link Corporation, No. 3-16-cv-01338 (N.D. Tex.).)
`
`Accordingly, “a real and substantial controversy regarding infringement of a
`
`covered business method patent exists” and GTL has standing to file the instant
`
`petition for CBM review. 37 C.F.R. § 42.302(a).
`
`2. GTL is not estopped.
`
`In the present CBM petition, GTL presents a single ground of
`
`unpatentability, challenging the remaining claims of the ’357 patent as failing to
`
`recite patent eligible subject matter. GTL is not estopped from challenging claims
`
`2, 5, 8, 9, 11, 12 or 14-18 on this ground. Estoppel for proceedings before the
`
`Office is provided in Section 315(e)(1) of Title 35:
`
`(1) Proceedings before the Office—The petitioner in an inter
`
`
`
`- 6 -
`
`

`

`
`
`
`
` Petition for Covered Business Method
`Review of U.S. Patent No. 7,529,357
`
`partes review of a claim in a patent under this chapter that results
`in a final written decision under section 318(a) … may not
`request or maintain a proceeding before the Office with respect to
`that claim on any ground that the petitioner raised or reasonably
`could have raised during that inter partes review.
`
`35 U.S.C. § 315(e) (emphasis added). Statutory challenges based on eligibility
`
`under 35 U.S.C. § 101 cannot be raised during an inter partes review proceeding.
`
`Therefore, GTL is not estopped from challenging the remaining claims under 35
`
`U.S.C. § 101.
`
`3. GTL has not filed a civil action challenging the validity of a
`claim of the patent.
`
`GTL and the undersigned certify that GTL has not filed a civil action
`
`challenging the validity of any remaining claim of the ’357 patent.
`
`B. The ’357 patent is a business method patent.
`
`Congress defined the term “covered business method patent” to mean a
`
`patent that “claims a method or corresponding apparatus for performing data
`
`processing or other operations used in the practice, administration, or management
`
`of a financial product or service, except that the term does not include patents for
`
`technological inventions.” AIA § 18(d)(1); 37 C.F.R. § 42.301(a).
`
`The claims in the ’357 patent recite the practice, administration and
`
`management of a financial product or service –– storing/establishing accounts for
`
`
`
`- 7 -
`
`

`

`
`
`
`charging fees (claims 8/16) and charging fees to those accounts (claims 9/17). And
`
` Petition for Covered Business Method
`Review of U.S. Patent No. 7,529,357
`
`these claims are not directed to technological inventions. Therefore, the ’357 patent
`
`is eligible for CBM review.
`
`1. Overview of the ’357 patent.
`
`The ’357 patent describes “systems and methods that provide centralized or
`
`nodal inmate management and telephone call processing capabilities.” (’357
`
`patent, Abstract.) Figure 1 of the ’357 patent (reproduced below) illustrates the
`
`components of the centralized or nodal inmate management system (centralized
`
`call processing platform 101). As shown in Figure 1, the call processing platform
`
`101 provides calling and related services to multiple facilities 150, 160, 170 and
`
`180.
`
`
`
`- 8 -
`
`

`

`
`
`
`
` Petition for Covered Business Method
`Review of U.S. Patent No. 7,529,357
`
`
`
`The ’357 patent describes the use of VoIP to transport calls handled by the
`
`centralized call processing platform. (See, e.g., ’357 patent, 4:14-21.) The call
`
`processing platform 101 communicates with one or more call processing gateways
`
`140 located at or near facilities 150-180 via network 130. (See, e.g., id., 6:40-42.)
`
`A router/switch 118 at the centralized platform (referred to in the claims as a
`
`
`
`- 9 -
`
`

`

`
`
`
`“networking device”) is coupled to network 130 to receive data packets from the
`
` Petition for Covered Business Method
`Review of U.S. Patent No. 7,529,357
`
`plurality of facilities. (See id., 15:32-39.)
`
`Neither the ’357 patent nor its parent, the ’167 patent, purports to invent new
`
`call processing functionality or new VoIP functionality. (See id., 7:20-23.) Indeed,
`
`the Board found all claims of the ’167 VoIP call processing patent unpatentable
`
`and the Federal Circuit affirmed the Board’s decision. Global Tel*Link
`
`Corporation v. Securus Technologies, Inc., IPR2014-00493, Paper 32 Final
`
`Written Decision at 81 (P.T.A.B. Sept. 11, 2015); Securus Technologies, Inc. v.
`
`Global Tel Link Corporation, Appeal No. 2016-1372, 2016-1373, Fed. Cir. R. 36
`
`Affirmance (December 8, 2016). Instead, the ’357 patent merely adds shared
`
`information management functionality to the unpatentable centralized call
`
`processing system. (’357 patent, 1:60-62 (“The present invention relates generally
`
`to information systems, and more particularly, to systems and methods for inmate
`
`management and call processing.”).) According to the ’357 patent, “the centralized
`
`configuration of inmate monitoring and call processing system 100 may be utilized
`
`to provide data sharing, aggregation, and/or analysis across a plurality of controlled
`
`environment facilities . . . to collect intelligence, to improve facility management,
`
`to minimize administrative burden, etc.”). (’357 patent, 14:35-43.) However, these
`
`motivations were not new –– the same motivation drove centralization of
`
`information management in the telecommunications industry and in prison systems
`
`
`
`- 10 -
`
`

`

`
`
` Petition for Covered Business Method
`Review of U.S. Patent No. 7,529,357
`
`
`for decades prior to the filing date of the ’357 patent. (Forys Decl., ¶¶38-57.)
`
`2. The ’357 patent claims activities that are financial in nature.
`
`A patent need only have one challenged claim directed to a covered business
`
`method to be eligible for CBM review. 77 Fed. Reg. 48,734, 48,736 (Aug. 14,
`
`2012); see also Versata Dev. Grp., Inc. v. SAP Am., Inc., 793 F.3d 1306, 1327
`
`(Fed. Cir. 2015) (affirming Board decision based on single claim standard).
`
`Furthermore, a challenged claim’s recitation of financial terminology, or a method
`
`step requiring the movement or transfer of money, generally signals a financial
`
`product or service. See Apple Inc. v. SightSound Techs., LLC, CBM2013-00020,
`
`Paper 14 at 11-15, Institution Decision (P.T.A.B. Oct. 8, 2013) (finding
`
`“transferring money electronically” to be financial in nature); aff’d SightSound
`
`Techs., LLC v. Apple Inc., 809 F.3d 1307 (Fed. Cir. 2015).
`
`At least four of the challenged claims—claims 8, 9, 16 and 17––are directed
`
`to financial services. For example, claims 8 and 16 both explicitly recite an
`
`apparatus used in the practice of a financial service using financial terminology:
`
`storing or establishing “inmate accounts for charging fees to” third parties
`
`associated with the inmates or the inmate account. Claim 9, which depends from
`
`claim 8, recites a financial service using financial terminology: “charg[ing] for
`
`expenses incurred by said inmates for an activity other than placing the calls.”
`
`(See also, claim 17 (similar).) Thus, on their face, claims 8, 9, 16 and 17 cover
`
`
`
`- 11 -
`
`

`

`
`
`
`financial activities related to charging monetary fees for a good or a service. The
`
` Petition for Covered Business Method
`Review of U.S. Patent No. 7,529,357
`
`rest of the claim language specifies how the charged fee/expenses are used (e.g.,
`
`connecting phone calls or other activities). Thus, these claims fall within the
`
`statutory definition of a CBM patent. See, e.g., Square, Inc. v. Unwired Planet,
`
`LLC, CBM2014-00156, Paper 40 at 9-10, Final Written Decision (P.T.A.B. Dec.
`
`22, 2015) (finding claims for “controlling transactions” and “charging the
`
`correlated transaction amount to a source funds identified by the user to allow
`
`completion of the desired transaction” to meet the financial services requirement).
`
`The specification confirms that the subject matter of the challenged claims is
`
`a financial product or service. An inmate account “may be a pre-paid account, a
`
`post-paid account, and debit account, a credit account, or the like.” (’357 patent,
`
`3:38-43; see also id., 18:43-46.) When the inmate account is a debit account, for
`
`example, “the inmate, or family and friends thereof, may deposit funds” and such
`
`“funds of an inmate debit account may later be utilized for such services as placing
`
`telephone calls from within the controlled environment facility.” (’357 patent,
`
`19:18-24.) In addition, the “debit card amounts may be debited real time by billing
`
`system 112 and the debit card threshold monitored by validation system 113 to
`
`shut off a call immediately upon crossing the debit card threshold.” (Id., 13:20-24;
`
`see also id., 14:34-39.) The ’357 patent’s emphasis on facilitating the transfer of
`
`funds into inmate accounts from third parties, and the purchasing of goods or
`
`
`
`- 12 -
`
`

`

`
`
` Petition for Covered Business Method
`Review of U.S. Patent No. 7,529,357
`
`
`services with these accounts demonstrates unequivocally that the claims are
`
`financial in nature and cover financial activities and apparatuses.
`
`3. The ’357 patent does not claim a “technological invention.”
`
`Even if a patent includes claims otherwise eligible for CBM review, the
`
`statute precludes review if the claims cover “technological inventions.” AIA §
`
`18(d)(1). The test for whether the patent is for a technological invention, and
`
`therefore exempt from CBM review, is a two-pronged inquiry. First, the Board
`
`must determine “whether the claimed subject matter as a whole recites a
`
`technological feature that is novel and unobvious over the prior art.” 37 C.F.R. §
`
`42.301(b). Second, the Board must determine whether the claimed subject matter
`
`“solves a technical problem using a technical solution.” Id. The challenged claims
`
`of the ’357 patent, including claims 8, 9, 16 and 17, fail both inquiries.
`
`a. The remaining claims are not novel or nonobvious.
`Each of the remaining claims of the ’357 patent depend from independent
`
`claims 1 and 10. But, independent claims 1 and 10 are not novel or nonobvious.
`
`The Board previously found the independent claims obvious over the combination
`
`of U.S. Patent No. 7,505,406 to Spadaro (“Spadaro”) and U.S. Patent No.
`
`7,333,798 to Hodge (“the Hodge patent”)1. Global Tel*Link Corporation,
`
`1 The Hodge patent published on February 12, 2004 as U.S. Patent
`
`
`
`
`
`- 13 -
`
`

`

`
`
` Petition for Covered Business Method
`Review of U.S. Patent No. 7,529,357
`
`
`IPR2014-00825, Final Written Decision, at 34-55, 67.
`
`The subject matter of the remaining dependent claims is also not novel or
`
`nonobvious, merely using the prior art technology of the independent claims to
`
`accomplish well-known processes such as establishing or storing a financial
`
`account and notifying a third-party of a condition.
`
`Claims 2 and 14, reciting the types of information that may be included in
`
`an inmate record, are not novel or nonobvious. (Forys Decl., ¶¶58-62, 80-84.) The
`
`claims require that the inmate records comprise at least one of “physical
`
`description,” “social security number,” “driver’s license number,” “biometric
`
`data,” “information related to the arrest of,” and “contact information of third
`
`parties” associated with one or more inmate. The ’357 patent itself recognizes that
`
`at least one of these types of information––information related to arrest of the
`
`inmates—was collected and stored in the existing inmate management systems.
`
`(See, e.g., ’357 patent, 2:5-19, 2:49-51 (collected inmate information included
`
`
`Publication No. 2004/0029564. Because the Hodge publication qualifies as prior
`
`art under 35 U.S.C. § 102(b) based on Patent Owner’s representations regarding
`
`the invention date of the challenged claims, Petitioner cites to the Hodge
`
`publication in this proceeding.
`
`
`
`- 14 -
`
`

`

`
`
` Petition for Covered Business Method
`Review of U.S. Patent No. 7,529,357
`
`
`information “identifying the individual, describing the reason for arrest or
`
`detention” as well as photographs and fingerprints of the inmate).) Additionally,
`
`Hodge teaches that an inmate record includes “biometric data of … inmates.” In
`
`Hodge, “biometric data may be required to access the system.” (Ex. 1005, Hodge
`
`Publication, ¶[0056].) The biometric data “may be acquired from users…upon the
`
`creation of a telephone account for use with the system” and “may be stored along
`
`with the user’s PIN in the user’s account profile or another storage means to be
`
`used later as an authentication device.” (Id.)
`
`The inmate records of Hodge also include “contact information of third
`
`parties associated with the inmates.” Hodge discloses that the call processing
`
`system “access[es] a list of telephone numbers that the inmate may not call.” (Id.,
`
`¶[0010].) These “blocked” telephone numbers are “contact information” associated
`
`with each inmate, specifying the individuals that the inmate is prohibited from
`
`contacting to ensure that the inmate does not threaten or harass these individuals.
`
`“For example, a convicted criminal would be blocked from ever calling his
`
`previous victims.” (Id., ¶[0328].)
`
`In addition, the Federal BOP’s centralized SENTRY system stored inmate
`
`records that included a wide-variety o

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket