throbber
Trials@uspto.gov
`Tel: 571-272-7822
`
`.
`
`Paper 7 (CBM2014-00112)
`Paper 7 (CBM2014-00113)
`Entered: September 30, 2014
`

`
`UNITED STATES PATENT AND TRADEMARK OFFICE
`
`BEFORE THE PATENT TRIAL AND APPEAL BOARD
`
`APPLEINC.,
`Petitioner,
`
`Vv.
`
`SMARTFLASHLLC,
`Patent Owner.
`
`Case CBM2014-00112
`Case CBM2014-00113
`Patent 7,942,317 B2
`
`Before JENNIFER S. BISK, RAMA G. ELLURU, NEIL T. POWELL,
`JEREMY M. PLENZLER, and MATTHEW R. CLEMENTS,
`Administrative Patent Judges.
`.
`
`ELLURU,Administrative Patent Judge. _
`
`DECISION
`Institution of Covered Business Method Patent Review
`37 CFR. § 42.208
`
`

`

`CBM2014-00112 and CBM2014-00113
`Patent 7,942,317 B2
`
`INTRODUCTION
`
`A. Background
`Petitioner, Apple Inc. (“Apple”), filed two Petitionsto institute
`
`covered business methodpatent review ofclaims 1, 6-8, 12-14, 16, and 18
`(“the challenged claims”) of U.S. Patent No.7,942,317 B2 (Ex. 1001, “the
`’317 patent”) pursuant to § 18 of the Leahy-Smith America Invents Act
`
`(“AIA”). CBM2014-00112 (Paper 2, “112 Pet.) and CBM2014-00113
`(Paper 2, “113 Pet.”). Patent Owner, Smartflash LLC (“Smartflash”), filed a
`Preliminary Response in each of the two cases: CBM2014-00112 (Paper6,
`“112 Prelim. Resp.”) and CBM2014-00113 (Paper6, “113 Prelim. Resp.”).'
`Wehavejurisdiction under 35 U.S.C. § 324, which providesthat a
`
`covered business method patent review maynotbeinstituted “unless. ..it is
`morelikely than not that at least 1 of the claims challenged in the petitionis
`unpatentable.”
`
`B. Asserted Grounds
`Apple contendsthat the challenged claims are unpatentable under
`35 U.S.C. §§ 102 and/or 103 based on the following grounds(112 Pet. 16;
`
`28-77; 113 Pet. 40—78).
`
`' Patent Ownerarguesthat the multiple petitions filed against the *317 patent
`violate the page limit requirement of 37 C.F.R. § 42.24(a)(iii), but does not
`cite any authority to support its position. 112 Prelim. Resp. 10-11; 113
`Prelim. Resp. 10-11. The pagelimit for petitions requesting covered
`business method patent review is 80 pages (37 C.F.R. § 42.24(a)(iii)), and
`each of the 112 and the 113 Petitions is within that requirement.
`
`

`

`CBM2014-00112 and CBM2014-00113
`Patent 7,942,317 B2
`eeOe
`
`SaSees.
`
`eeee
`
`CBM2014-00112
`
`
`
`Stefik 235° and Stefik 980‘ § 102°|1, 6-8, 12-14, 16, and 18.
`
`
`
`Stefik ’235 and Stefik ’980 § 103|1, 6-8, 12-14, 16, and 18
`
`
`
`CBM2014-00113
`
`
`
`
`
`
`
`Stefik ’235, Stefik ’°980, and §103|1, 6-8, 12-14, 16, and 181
`
`Poggio®
`
`
`
`Ginter’ § 103|1, 6-8, 12-14, 16, and 18
`
`
`
`
`gee aae
`
`
`
`
`
`Ginter and Poggio § 103|1, 6-8, 12-14, 16, and 18
`
`
`
` Ginter, Stefik ’235, and Stefik 980|§ 103|12-14
`
`? Exhibits with numbers 1001-1029 werefiled in CBM2014-00112 and
`those with numbers 1101-1129 werefiled in CBM2014-00113. For
`purposesofthis decision, where the two cases have duplicate exhibits, we
`refer to the exhibit filed in CBM2014-00112.
`3 U.S. Patent No.5,530,235 (June 25, 1996) (Ex. 1013, “Stefik ’235”).
`4 U.S. Patent No. 5,629,980 (May 13, 1997) (Ex. 1014, “Stefik °980”).
`> Petitioner refers to Stefik °235 and Stefik ’980 collectively as “Stefik” and
`argues that they should be considered as a single reference for anticipation
`purposes because, according to Pétitioner, Stefik °235 incorporates Stefik
`’980 by reference. 112 Pet. 20-21, n.12. Patent Ownerdisagrees. 112
`Prelim. Resp. 12-14. We do notreach this issue because even when
`considered as one reference, we determine that Stefik ’235 and Stefik ’980
`do not teach all the recited claim limitations in the same form and order as
`listed in the claims.
`° European Patent Application, Publication No. EP0809221A2(including
`translation), published November26, 1997 (Ex. 1016, “Poggio”).
`7 US. Patent No. 5,915,019 (June 22, 1999) (Ex. 1115,“Ginter”).
`
`

`

`CBM2014-00112 and CBM2014-00113
`Patent 7,942,317 B2
`|
`
`ClaimsChallenged —
`S OUR Basis:
`5
`2
`oe
`Ginter, Stefik235, Stefik ?980, and
`§ 103 12-14
`
`
`
`Poggio
`
`
`
`
`
`
`Ginter and Sato® § 103|12-14
`
`
`
`Petitioner also provides a declaration from Anthony J. Wechselberger
`(“the Wechselberger Declaration”).’ 112 Ex. 1021.
`"After considering the Petitions and Preliminary Responses, we
`determine that the ’317 patent is a covered business method patent and that
`
`Apple has demonstrated thatit is more likely than not that at least one of the
`
`challenged claims is unpatentable. Based on the information presented, we
`institute a covered business method patent review of claims 1, 6-8, 12-14,
`
`16, and 18 of the ’317 patent.
`C. RelatedMatters
`The parties indicate that Smartflash has sued Apple for infringement
`ofthe °317 patent and identify the following district court case: Smartflash
`LLC v. Apple Inc., Case No. 6:13-cv-447 (E.D. Tex.). See, e.g., 112 Pet. 15—
`16; 112 Papers4, 5.. The parties also indicate that the °317 patent is the
`subject of a second case, to which Appleis not a party: Smartflash LLC v.
`Samsung, Case No. 6:13-cv-448 (E.D. Tex.). Jd.
`
`\
`
`8 JP Patent Application Publication No. H11-164058 (inclidingtranslation),
`published June 18, 1999 (Ex. 1118, “Sato’’).
`.
`” Onthis record, we are not persuaded by Patent Owner’s argumentthat we
`should disregard the Wechselberger Declaration. See 112 Prelim. Resp. 17—
`20; 113 Prelim. Resp. 17-20. Patent Owneridentifies purported omissions
`from the Declaration, but offers no evidence that Mr. Wechselberger used
`incorrectcriteria, failed to consider evidence,or is not an expert in the
`appropriate field. Jd.
`
`

`

`CBM2014-00112 and CBM2014-00113
`Patent 7,942,317 B2
`
`In addition to the 112 and 113 Petitions, Apple filed ten other
`
`Petitions for covered business method patent review challenging claims of
`
`patents owned by Smartflash and disclosing similar subject matter:
`CBM2014-00102; CBM2014-00103; CBM2014-00104; CBM2014-00105;
`
`CBM2014-00106; CBM2014-00107; CBM2014-00108; CBM2014-00109;
`CBM2014-00110; and CBM2014-00111.
`|
`
`D. The ’317 Patent
`
`The °317 patent relates to “a portable data carrier for storing and
`
`paying for data and to computer systems for providing accessto data to be
`stored” and the “corresponding methods and computer programs.”
`Ex. 1001, 1:18-23. Owners of proprietary data, especially audio recordings,
`have an urgent need to address the prevalence of “data pirates,” who make
`
`proprietary data available overthe internet without authorization. Jd.at
`
`1:38-51. The ’317 patent describes providing portable data storage together
`
`with a meansfor conditioning access to that data upon validated payment.
`
`Id. at 1:55—2:3. This combination allows data owners to maketheir data
`
`available over the internet without fear of data pirates. Jd. at 2:3-11.
`
`Asdescribed, the portable data storage device is connected to a
`___
`terminal for internet access. Id. at 1:55—63. The terminal reads payment
`
`information, validates that information, and downloadsdata into the portable
`
`storage device from a data supplier. Jd. The data on the portable storage
`
`device can beretrieved and output from a mobile device. Jd. at 1:64—-67.
`
`The ’317 patent makesclear that the actual implementationof these
`componentsis not critical and may be implemented in many ways. -See, e.g.,
`
`id. at 25:49-52 (“The skilled person will understand that many variants to
`
`

`

`CBM2014-00112 and CBM2014-001 13
`Patent 7,942,317 B2
`
`the system are possible and the invention is not limited to the described
`
`embodiments.”’).
`
`E. Challenged Claims
`Apple challenges claims 1, 6-8, 12-14, 16, and 18 of the *317 patent.
`
`Claims 1, 8, 12, 16, and 18 are independent. Claims 6 and 7 depend from
`
`claim 1 and claims 13 and 14 depend from claim 12. Claims 1 and 8 are
`
`illustrative of the claimsat issue andrecite the following:
`
`1.|Acomputer system for providingdata to a data requester,
`the system comprising:
`
`a communication interface;
`
`a data access data store for storing records of data items available
`from the system, each record comprising a data item description and a
`pointer to a data providerfor the data item;
`
`a program store storing code implementable by a processor;
`
`a processor coupled to the communications interface, to the data
`access data store, and to the program store for implementing the stored code,
`the code comprising:
`
`code to receive a request for a data item from the requester;
`
`code to receive from the communicationsinterface payment data
`comprising data relating to payment for the requested data item;
`
`code responsive to the request and to the received payment data, to
`read data for the requested data item from a content provider; and
`
`code to transmit the read data to the requester over the
`communicationsinterface.
`Ex. 1001, 25:55-26:8.
`
`8.
`
`Amethod of providing data to a data requester comprising:
`
`receiving a request for a data item from the requester;
`
`.
`
`

`

`CBM2014-00112 and CBM2014-001 13
`Patent 7,942,317 B2
`
`- receiving payment data from the requester relatingto payment for the
`requested data;
`
`reading the requested data from a content provider responsive to the
`received payment data; and
`transmitting the read data to the requester.
`
`Id. at 26:36-44.
`
`A. Claim Construction
`
`ANALYSIS |
`
`In a covered business method patent review, claim termsare given
`
`. their broadest reasonable interpretation in light of the specification in which
`
`they appear. See 37 C.F.R.§ 42.300(b). Applying that standard, we
`interpret the claim terms of the 7317 patent accordingto their ordinary and
`customary meaning in the context of the patent’s written description. See In
`re Translogic Tech., Inc., 504 F.3d 1249, 1257 (Fed. Cir. 2007). For
`
`purposes ofthis decision, we construe the claim term “use rule data,” as
`
`recited in dependent claim 14. Neither party proposed a construction for this
`term.
`|
`
`Dependentclaim 14 recites “use rule data.” The 317 patent describes
`
`“use rule data” as “comprising a list of values (i.e. content data item prices)
`
`and correspondinglevels ofpermitted usage. Ex. 1001, 14:66—15:1
`' (emphasis added). The 317 patent further explains that “[t]hus a value of
`£1 might permit ten plays of a music track, while the value of £10 might
`
`permit an unlimited numberofplays of the track and copyingof the track for
`personal use.” Id. at 15:1-4. Accordingly, for purposes ofthis decision, we
`construe “use rule data” as data for a rule specifying a condition under which
`
`access to contentis permitted.
`
`

`

`CBM2014-00112 and CBM2014-00113
`Patent 7,942,317 B2
`
`B. Covered Business Method Patent
`
`Section 18 of the AIA provides for the creation ofa transitional
`
`program for reviewing covered business methodpatents. A “covered
`business methodpatent”is a patent that “claims a method or corresponding
`apparatus for performingdata processing or other operationsused in the
`practice, administration, or managementofa financial productorservice,
`except that the term does not include patents for technological inventions.”
`AIA § 18(d)(1); see 37 C.F.R. § 42.301(a). A patent need have only one
`claim directed to a covered business methodto beeligible for review. See
`
`Transitional Program for Covered Business Method Patents—Definitions of
`Covered Business Method Patent and Technological Invention;Final Rule,
`77 Fed. Reg. 48,734, 48,736 (Aug. 14, 2012) (“CBM Rules”) (Comment8).
`
`.
`1. Financial Product or Service
`Apple asserts that “because claim 18 explicitly describes receiving
`and responding to payment data, as well as outputtingpaymentdata, it
`clearly relates to a financial activity and providing a financial service.” 112
`
`Pet. 11; 113 Pet. 16. Based on this record, we agree with Apple that the
`
`subject matter recited by claim 18 is directed to activities that are financial in
`
`nature, namely data access conditioned on paymentvalidation. Claim 18
`recites “receiving payment data from the requesterrelating to paymentfor
`99 66
`
`the requested data,”
`
`“reading paymentdistribution information from a data
`
`store,” and “outputting paymentdata to a payment system for distributing
`
`the paymentfor the requested data.” We are persuaded that “[rJeceiving
`
`paymentdata from the requester relating to payment for the requested data”
`and “reading paymentdistribution information from a data store” are
`financialactivities and “outputting paymentdata to a paymentsystem for
`
`

`

`CBM2014-00112 and CBM2014-00113
`Patent 7,942,317 B2
`
`distributing the paymentfor the requested data” amounts to a financial
`
`service. This is consistent with the Specification of the °317 patent, which
`confirms claim 18’s connection to financialactivities by stating that the ,
`invention “relates to a portable data carrier for storing and paying for data.”
`
`Ex. 1001, 1:19-20. The Specification also states repeatedly that the
`disclosed invention involves managing accessto data based on payment
`
`validation. See, e.g., Ex. 1001, 1:55-63, 2:12-26, 3:22—30, 3:51-56, 7:59-
`
`8:6, 8:18-31.
`
`Smartflash disagrees that claim 18 satisfies the financial-in-nature
`
`requirement of AIA § 18(d)(1), arguing that section should be interpreted
`narrowly to cover only technologyusedspecifically in the financial or
`banking industry. 112 Prelim. Resp. 3-7; 113 Prelim. Resp. 3-7.
`Smartflash cites to variousportions of the legislative history as support for
`
`its proposed interpretation. Id.
`Wedo notagree that the phrase “financial product or service”in
`§ 18(d)(1) is as limited as Smartflash proposes. The AIA doesnotinclude as
`
`a prerequisite for covered business methodpatentreview,a “nexus”to a
`“financial business,”but rather a “method or corresponding apparatus for
`performing data processing or other operations used in the practice,
`administration, or managementofa financial productor service.” AIA
`§ 18(d)(1). Further, contrary to Smartflash’s view ofthe legislative history,
`the legislative history indicates that the phrase “financialproductor service”
`is not limited to the products or services of the “financial services industry”
`andis to be interpreted broadly. CBM Rules,77 Fed. Reg.at 48,735—36.
`For example,the “legislative history explains that the definition of covered
`business method patent was drafted to encompasspatents ‘claiming
`
`

`

`CBM2014-00112 and CBM2014-001 13
`Patent 7,942,317 B2
`
`activities that are financial in nature, incidental to a financial activity or
`
`complementary to a financial activity.’” Jd. (citing 157 Cong. Rec. $5432
`
`(daily ed. Sept. 8, 2011) (statement of Sen. Schumer)).
`In addition, Smartflash asserts that claim 18 is not directed to an
`apparatus or methodthatis financial in nature because claim 18 “omits the
`specifics of how paymentis made.” 112 Prelim. Resp. 7; 113 Prelim.
`Resp. 7. Weare not persuaded by this argument because § 18(d)(1) ofthe
`AJA doesnot include such a requirement, nor does Smartflash point to any
`other authority that makes such a requirement. 112 Prelim. Resp.8;
`113 Prelim. Resp. 8. We determine that because paymentis required by
`
`claim 18, as Smartflash acknowledges(id.), the financial-in-nature
`
`requirement of § 18(d)(1) is satisfied.
`
`Forthe reasons stated above, and based on theparticular facts of this
`proceeding, we conclude that the 7317 patent includesat least one claim that
`meets the financial-in-nature requirement of § 18(d)(1) of the AIA.
`
`2. Exclusionfor Technological Inventions
`Appleasserts that claim 18 does not fall within § 18(d)(1)’s exclusion
`for “technological inventions.” 112.Pet. 11-15; 113 Pet. 16-20. In
`particular, Apple argues that claim 18 “does not claim ‘subject matter as a
`whole [that] recites a technologicalfeature that is novel and unobviousover
`the prior art[] and solves a technical problem using a technicalsolution.’”
`112 Pet. 11; 113 Pet. 16-20 (quoting 37 C.F.R. § 42.301(b)). Smartflash
`disagrees and argues that claim 18, as a whole, recitesat least one
`
`technological feature. 112 Prelim. Resp. 11; 113 Prelim. Resp. 17.
`Weare persuaded that claim 18 as a whole does notrecite a
`technological feature that is novel and unobviousoverthe prior art. Claim
`
`10
`
`

`

`CBM2014-00112 and CBM2014-00113
`Patent 7,942,317 B2
`
`18 recites a “payment system.” The Specification, however, discloses that
`
`‘the required payment system may be onethatis already in use or otherwise
`
`commercially available. For example, the payment validation system “may
`
`be part of the data supplier’s computer systemsor it may be a separate
`
`system such as an e-paymentsystem.” Ex. 1001 8:18—22; see alsoid. at
`8:60-63. Claim 18 also recites a “data store.” This component, however, is
`
`described as generic memory. 112 Pet. 12-13; 113 Pet 18. The
`
`Specification discloses, for instance, that “(t]he data storage meansis based
`ona standard smart card.” Ex. 1001, 11:28—30; see also id. at 14:25—-29
`(“{l]ikewise data stores 136, 138 and 140 may comprise a single physical
`
`data store or may be distributed overa plurality of physical devices and may
`
`even be at physically remote locations from processors 128-134 and coupled
`
`to these processors via internet 142.”), Fig. 6.
`In addition, the °317 patent makesclearthat the asserted novelty of
`the invention is not in any specific improvement of software or hardware,
`
`but in the method of controlling access to data. For example, the ’317 patent
`
`states that “there is an urgent need to find a way to address the problem of
`data piracy”(id. at 1:50—51), while acknowledgingthat the “physical
`
`embodiment of the system is notcritical and a skilled person will understand
`
`that the terminals, data processing systemsandthe like canall take a variety
`
`of forms”(id. at 12:29-32). Thus, we determine that claim 18 is merely the
`recitation of a combination of knowntechnologies, which indicatesthatit is.
`not a patent for a technological invention. See Office Patent Trial Practice
`Guide, 77 Fed. Reg. 48,756, 48,764 (Aug. 14, 2012).
`|
`Smartflash also argues that claim 18 falls within § 18(d)(1)’s
`
`exclusion for “technological inventions” becauseit is directed towards
`
`11
`
`

`

`CBM2014-00112 and CBM2014-00113
`Patent 7,942,317 B2
`
`solving the technological problem of“transmitting requested data to a
`
`requester, e.g., as part of a convenient, legitimate acquisition of data from a
`
`data supplier” with the technological solution of a “data store, from which
`paymentdistribution information is read, in combination with a payment
`system.” 112 Prelim. Resp. 8-9; 113 Prelim. Resp. 8-9. Weare not
`persuadedbythis argument because, as Apple argues, the problem being
`solved by claim 18 is a business problem—data piracy. 112 Pet. 14; 113
`Pet. 19. For example, the Specification states that “[b]inding the data access
`and payment together allows the legitimate owners ofthe data tomake the
`data available themselves over the internet without fear of loss of revenue,
`thus undermining the position of data pirates.” Ex. 1001, 2:7-11.
`
`_ Therefore, based on the particular facts of this proceeding, we conclude that
`claim 18-does not recite a technological invention andis eligible for a
`covered business method patent review.
`
`3. Conclusion
`
`In view of the foregoing, we conclude that the ’317 patent is a covered
`business method patent under AIA § 18(d)(1) andis eligible for review
`
`using the transitional covered business method patent program.
`
`C. Anticipation by Stefik ’235 and Stefik 980
`Stefik ’235 teaches a portable Document Card (“DocuCard”) for
`storing information in a digital form,storing usage rights for the
`information, processing user-initiated functions and requests to access
`documentsstored therein, interfacing to external devices for reading and
`writing digital information, and allowing a userto directly interact with the
`
`DocuCard. Ex. 1013, 2:29-40, 7:35-42.
`
`12
`
`

`

`CBM2014-00112 and CBM2014-00113
`Patent7,942,317 B2
`
`Stefik ’980 teaches a “repository” for storing digital works,
`
`controlling access to digital works, billing for access to digital works and
`maintaining the security and integrity ofthe system. Ex. 1014, 6:57-61.
`Petitioner asserts that claims 1, 6-8, 12—14, 16, and 18 are anticipated
`by Stefik °235 and Stefik 980. 112 Pet. 28-47. We are notpersuadedthat
`Petitioner has shownthat every claim limitation, and sub part, ofclaims L,
`6-8, 12-14, 16, and 18 are set forth in the prior art in the same form and
`order as in the claim. See In re Omeprazone Patent Litigation, 483 F.3d
`
`1364, 1373 (Fed. Cir. 2007); Continental Can Co. v Monsanto Co., 948 F.2d
`
`1264, 1267 (Fed. Cir. 1991).
`
`Petitioner relies on the multiple repositories acting in different
`
`capacities described in Stefik ’235 and Stefik ’980, as disclosing several of
`
`the claim limitations of independentclaims 1, 8, 12, 16, and 18. See, e.g,
`112 Pet. 28-47 (claim 1), 50 (claim 8, refers to claim 1 claim chart), 50-63
`(claim 12), 68-73 (claim 16, refers to claim 1 claim chart), 73-77 (claim 18,
`refers to claim 1 claim chart). While Stefik 980discloses repositories that
`mayactin different capacities(see, e.g, Ex. 1014, Abstract; Ex. 1014, 4:9—
`10 (“[a] repository has two primary operating modes, a server mode and a
`
`requester mode”)), Petitioner does not persuasively establish morelikely
`than not that either Stefik ’235 or Stefik °980 discloses a system of
`repositories that is configured in the exact form and orderas in independent
`
`claims 1, 8, 12, 16, and 18. Rather, Petitioner argues Stefik teaches that the
`
`repositories described in Stefik ’235 and ’980 may be configuredin the exact
`
`form and orderas in independent claims 1, 8, 12, 16, and 18. See, e.g., 112
`Pet. 31 (“A DocuCard can be inserted into a PCMCIA slot of another
`
`repository or can interface with a second DocuCard.”) (emphasis added)
`
`13
`
`

`

`CBM2014-00112 and CBM2014-001 13
`Patent 7,942,317 B2
`
`(citations omitted); Ex. 1013, 6:32-43 (“The repositories and rendering
`
`systems to which a DocuCard mayinterface wouldfulfill the functional
`requirementsas defined in the aforementioned ‘System For Controlling The
`Distribution and Use of Digital Works’ application.”) (emphasis added).
`
`Thus, Petitioner has failed to establish that it is more likely than not
`
`that it would prevail in demonstrating that independentclaims1, 8, 12, 16,
`
`and 18 are unpatentable as anticipated by the Stefik references. For the
`
`same reasons, we determinethat Petitioner has failed to establish thatit is
`
`morelikely than not that it would prevail in demonstrating that dependent
`claims 6, 7, 13, and 14 are unpatentable as anticipated by the Stefik
`references.
`
`D. Additional Grounds Based on Stefik 235 and Stefik ’980
`Petitioner asserts that claims 1, 6-8, 12—14, 16, and 18 would have
`been obvious overthe Stefik references alone. 112 Pet. 25-77. Petitioner
`
`also contendsthat claims 1, 6-8, 12-14, 16, and 18 would have been
`obviousoverStefik and Poggio. Id. at 28-77. We find Petitioner’s
`
`contentions that claims 1, 6-8, 12, 13, 16, and 18 would have been obvious
`over the combination of Stefik ’235 and Stefik °980 persuasive, but are not
`persuaded by Petitioner’s contentions regarding claim 14 for the reasons
`discussed below.
`|
`
`1. Claims 1, 6-8, 12, 13, 16, and 18
`In light of the arguments and evidence, Petitioner has established that
`it is more likely than not that claims 1, 6-8, 12, 13, 16, and 18 would have
`been obvious over the combination ofStefik ’235and Stefik 980. See id.at
`
`25-77.
`
`14
`
`

`

`CBM2014-00112 and CBM2014-00113
`Patent 7,942,317 B2
`Weare not persuaded by Patent Owner’s argumentthat there is no
`evidencethat one of ordinary skill in the art would have combinedthe
`
`teachings of the Stefik ’235 patent with the teachings of the Stefik °980
`patent because Patent Owner’s argument is based on an unproven premise
`that the Stefik ’235’s reference to the Stefik ’980 patent must uniquely
`identify the Stefik ’980 patent. 112 Prelim. Resp. 13-14. One reference
`need notidentify explicitly another reference in order to form the basis for
`an obviousness combination. Wealso are not persuaded by Patent Owner’s
`argumentthat because Petitioner has not proven that Stefik ’235 and Stefik
`"980qualify as a single reference, all combinations including those
`references fail. 112 Prelim. Resp. 14. Petitioner argues that “there is
`
`explicit motivation to implementthe repository disclosed by Stefik ’980
`using the Document Card (DocuCard) of Stefik ’235.” 112 Pet. 21, n.12
`(citing Ex. 1013, 2:47—52; Ex. 1014, 16:56—-58; Ex. 1021 4 51, 53). Stefik
`’980 teachesthat “the repository could be embeddedin a ‘card’that is
`inserted into an available slot in a computer system” (Ex. 1014, 16:56—58),
`and Stefik ’235 teaches a repository embeddedin a card (Ex. 1013, 2:47—
`
`52). On the record before us, we are persuaded that Petitioner has provided
`
`sufficiently an articulated reasoning with somerational underpinning to
`
`support the legal conclusion of obviousness over a combination ofStefik
`°235 and Stefik °980. See KSR Int’l v. Teleflex Inc., 550 U.S. 398, 418
`(2007) (citing In re Kahn, 441 F.3d 977, 988 (Fed. Cir. 2006)).
`Wediscuss dependent claims 6, 7, and 13 as examples.
`Claim 6
`
`Claim 6 recites “[a] computer system as claimed in claim 1, further
`
`comprising an access control data store coupled to said processor for storing
`
`15
`
`

`

`CBM2014-00112 and CBM2014-00113
`Patent 7,942,317 B2
`
`access control data comprising a requester identifier, corresponding
`
`requester system access data and payment system data for identifying a
`
`payment system for use by the requester.” For this limitation, Petitioner
`
`refers to disclosure from Stefik °235 teaching that “[a] Login transaction is
`
`the process by whicha user logs onto a repository, typically by entering a
`
`Personal Identification Number(PIN). In this case, the user of the DocuCard
`is logging onto the DocuCard. This logging in process mayalso activate
`credit accounts.” 112 Pet. 48 (citing Ex. 1013, 6:60-65).
`Claim 7
`|
`Claim 7 recites “Ta] computer system as claimedin claim 1, further
`comprising content synthesis code to generate substantially complete item
`
`data from partial item data provided from two or more sources.” Forthis
`limitation, Petitioner refers to disclosure from Stefik ’235 teachingthat
`
`“(flor composite documents comprised of multiple individual digital works,
`
`the description part is an acyclic structure (e.g. a tree structure) wherein each
`node correspondsto one or moreofthe multiple individual digital works.”
`112 Pet. 49 (citing Ex. 1013, 7:42-50). Stefik ’980 also discloses the
`following extract transaction.
`
`A extract transaction is a request to copy a part of a digital work
`and to create a new workcontaining it. The extraction operation
`differs from copying in that it can be used to separate a part of a
`digital work from d-blocks or shells that place additional
`restrictions or fees on it. The extraction operation differs from
`the edit operation in that it does not change the contents of a
`work, only its embedding in d-blocks. Extraction creates a new
`digital work.
`
`Ex. 1014, 39:57-64
`
`Claim 13
`
`16
`
`

`

`CBM2014-00112 and CBM2014-00113
`Patent 7,942,317 B2
`
`Claim 13 recites “[a] data access system according to claim 12 further
`.
`comprising a paymentdistribution store and wherein the electronic payment
`
`system makes payments according to data in the paymentdistributionstore-
`
`‘associated with the forwarded data on confirmation of the payment and/or
`| provision of the forwarded data to the card.” Forthis limitation, Petitioner
`refers to disclosure from Stefik ’980, which indicates that data content has
`
`information associated withit, including “[a] handle identifying a revenue
`
`ownerfor a digital work,” “used for reporting usage fees.” Ex. 1014, 9:21—
`
`29, 10:24-32, Table 1.
`For the reasonsset forth above, Petitioner has established that it is
`morelikely than not that it would prevail in demonstrating that claims 1, 6—
`
`8, 12, 13, 16, and 18 would have been obvious over the combination of
`Stefik ’235 and Stefik °980. We deny as redundant the asserted groundthat
`claims 1, 6-8, 12, 13, 16, and 18 would have been obvious over Stefik °235,
`
`Stefik ’°980, and Poggio. See 37 C.F.R. § 42.208(a).
`|
`2. Claim 14
`|
`Claim 14recites “[a] data access system according to claim 12 further
`~
`comprising a data use rule data store and wherein data use rule data is
`providedto the data carrier with the forwarded data for controlling user
`
`access to the forwarded data.” Petitioner’s claim chart states that the
`“
`claimed “use rule data” correspondsto Stefik’s “(e.g., conflict rules;
`descriptortree files containing usage rights and access conditions).” 112
`Pet. 66. Petitioner also refers to disclosure from Stefik ’980 teaching that
`
`“Tejach usage right might have one or more specified conditions which must
`
`be satisfied before the right may be exercised.” Jd. at 67; see Ex. 1014,
`
`

`

`CBM2014-00112 and CBM2014-001 13
`Patent 7,942,317 B2
`
`6:46—48.'° Petitioner provides insufficient explanation, however, as to how
`Stefik’s “usage rights” operate. Petitioner also does notshowsufficiently
`why “usage rights” satisfies “use rule data.” Even though “usage rights”
`may have “conditions,” they are not necessarily rules, and Petitioner has not
`persuaded us otherwise. For example, rights portion 504 is described as “a
`
`data structure, such as a look-up table, wherein the various information
`associated with a right is maintained.” Pet. 67 (citing Ex. 1013, 8:8-10); see
`Ex. 1014, 9:54-10:1. An exemplary data structureis illustrated in Figure 10
`of Stefik ’°980 and the information contained in such a data structure is
`indicated in Table 1. Ex. 1014, 10:28-32. Table1 ofStefik °980 discloses,
`for example, a “Loan—Period”property with a value in “Time-Units” that is
`an “[ijndicator of the maximum numberof time-units that a document can
`
`be leased out.” Petitioner, however, does not explain sufficiently why a
`
`“¥.oan-Period,” by itself, without, for example, corresponding content data
`item price, satisfies “data for a rule specifying a condition under which
`access to contentis permitted,” as we haveconstrued “userule data.”
`Petitioner does not refer to Poggio as teaching this limitation. 112 Pet. 66—
`
`68.
`
`|
`
`Forthe reasons set forth above, Petitioner has not establishedthat,
`morelikely than not, it would prevail in demonstrating that claim 14 would
`have been obvious over the combination of Stefik °235 and Stefik °980 or
`over Stefik ’235, Stefik °980, and Poggio.
`
`'° We note that Petitioner mistakenly cites to Stefik ’235 (Ex. 1013) as citing
`this disclosure. Pet. 66-67.
`
`18
`
`

`

`CBM2014-00112 and CBM2014-00113
`Patent 7,942,317 B2
`E. Obviousness over Ginter
`Petitioner contends that claims 1, 6-8, 12-14, 16, and 18 would have
`been obvious over Ginter. 113 Pet. 22, 40-78.
`,
`Ginter discloses a portable “virtual distribution environment”
`(“VDE”) that can “control and/or meter or otherwise mohitor use of
`electronically stored or disseminated information.” Ex. 1115, Abstract,
`Fig. 71, 52:26-27.
`.
`
`1. Claims 1, 6-8, 12, 13, 16, and 18
`In light ofthe arguments and evidence, Petitioner has establishedthat
`it is more likely than not that claims 1, 6-8, 12, 13, 16, and18 are
`|
`unpatentable as obvious over Ginter.
`Weare not persuaded by Patent Owner’s argumentthat Petitioner has
`
`not provided evidencethat one of ordinary skill in the art would have
`modified Ginter in a way to render obvious the claimed subject matter. 113
`Prelim. Resp. 12..For example, Petitioner points to Ginter’s teaching “the
`knownflexibility in such distribution systems, andunderscoresthat one of
`ordinary skill would have known that combinations between and among
`disclosures of such distribution systems would have been obviousto one of
`ordinary skill in the art.” 113 Pet. 28-29 (citing Ex. 1015, 255:22-43; Ex.
`1121 458). We are, therefore, persuaded that Petitioner has provided
`
`sufficiently an articulated reasoning with somerational underpinning to
`
`support the conclusion that a person of ordinary skill would also have found
`claims 1, 6—8, 12, 13, 16, and 18 obviousin light of the teachings of Ginter.
`See KSR Int’l, 550 U.S.at 418.
`|
`|
`
`|
`
`19
`
`

`

`CBM2014-00112 and CBM2014-00113
`Patent 7,942,317 B2
`
`2. Claim 14
`
`-Claim 14 recites “[a] data access system according to claim 12 further
`
`comprising a data use rule data store and wherein data use rule datais
`
`provided to thedata carrier with the forwarded data for controlling user
`
`_access to the forwarded data.” (Emphasis added). Petitioner’s claim chart
`states that the claimed“use rule data” correspondsto Ginter’s “(e.g., billing
`
`method map MDEand/or budget method UDE).” 113 Pet. 70-72.
`Petitioner does not provide adequate argument or explanation as to
`why Ginter’s billing method map MDEand/or budget UDEsatisfies the
`
`claimed “use rule data.” Without corresponding argument and explanation,
`
`Petitioner’s claim chart does not persuade usthat morelikely than not
`Ginter’s billing method MDEor budget method UDEsatisfies the claimed
`| “use rule data.”
`Our review of Ginter does not perstiade us otherwise. Ginter
`describes billing method map MDEas“a price list, table, or pa

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket