throbber
Trials@uspto.gov
`Tel: 571-272-7822
`
`Paper 33
`Entered: November 10, 2016
`
`UNITED STATES PATENT AND TRADEMARK OFFICE
`
`BEFORE THE PATENT TRIAL AND APPEAL BOARD
`
`GOOGLE, INC.,
`Petitioner
`
`and
`
`APPLE INC.,
`Petitioner,
`
`v.
`
`SMARTFLASH LLC,
`Patent Owner.
`
`Case CBM2015-001261
`Case CBM2015-00130
`Patent 8,118,221 B2
`
`Before JENNIFER S. BISK, RAMA G. ELLURU, and
`JEREMY M. PLENZLER, Administrative Patent Judges.
`
`BISK, Administrative Patent Judge.
`
`
`
`FINAL WRITTEN DECISION
`35 U.S.C. § 328(a) and 37 C.F.R. § 42.73
`
`
`
`
`
`
`1 CBM2015-00126 has been consolidated with CBM2015-00130.
`
`

`
`Case CBM2015-00126
`Case CBM2015-00130
`Patent 8,118,221 B2
`
`A. Background
`
`INTRODUCTION
`
`Google, Inc., filed a Petition to institute covered business method
`
`patent review of claim 3 of U.S. Patent No. 8,118,221 B2 (“the ’221
`
`patent”). CBM2015-00126, Paper 32 (“’126 Pet.”). Apple Inc., also filed a
`
`Petition to institute covered business method patent review of claims 3–10,
`
`12–31, and 33 of the ’221 patent. CBM2015-00130, Paper 2 (“Pet.”). On
`
`November 16, 2015, we instituted a covered business method patent review
`
`in CBM2015-00126 (Paper 8, “’126 Institution Decision” or “’126 Inst.
`
`Dec.”) based upon Google’s assertion that claim 3 is directed to patent
`
`ineligible subject matter under 35 U.S.C. § 101. CBM2015-00126, Inst.
`
`Dec. 19. The same day we instituted a covered business method patent
`
`review in CBM2015-00130 (Paper 9, “Institution Decision” or “Inst. Dec.”)
`
`based upon Apple’s assertion that claims 3–10, 15–31, and 33 are directed to
`
`patent ineligible subject matter under 35 U.S.C. § 101 and that claim 22 is
`
`indefinite under 35 U.S.C. § 112. CBM2015-00130, Inst. Dec. 25.
`
`Subsequent to institution, Smartflash LLC (“Patent Owner”) filed
`
`Patent Owner Responses (CBM2015-00126, Paper 21 (“’126 PO Resp.”);
`
`CBM2015-00130, Paper 19 (“PO Resp.”) and Google and Apple each filed
`
`Replies (CBM2015-00126, Paper 22 (“’126 Reply”); CBM2015-00130,
`
`Paper 23 (“Reply”) to Patent Owner’s Response, respecitvely.
`
`
`2 Google filed two versions of the Petition: Paper 2, which is sealed and
`accessible to the parties and Board only, and Paper 3, which is a public
`version of the Petition containing a small portion of redacted text. For
`purposes of this Decision, we refer only to the public version of the Petition.
`
`2
`
`

`
`Case CBM2015-00126
`Case CBM2015-00130
`Patent 8,118,221 B2
`
`Patent Owner, with authorization, filed Notices of Supplemental
`
`Authority. CBM2015-00126, Paper 28; CBM2015-00130, Paper 30
`
`(“Notice”). Google and Apple each filed Responses to Patent Owner’s
`
`Notices, respectively. CBM2015-00126, Paper 29 (“126 Notice Resp.”);
`
`CBM2015-00130, Paper 31 (“Notice Resp.”).
`
`We held a joint hearing of both cases, along with several other related
`
`cases, on July 18, 2016. CBM2015-00126, Paper 30; CBM2015-00130,
`
`Paper 32 (“Tr.”).3 At the hearing, we discussed with all parties the
`
`possibility of consolidating these two cases because of the overlapping
`
`issues. Tr. 30:3–16, 72:11–73:12. No party objected. Id. Thus, we issue
`
`one opinion covering both CBM2015-00126 and CBM2015-00130.4
`
`This Final Written Decision is issued pursuant to 35 U.S.C. § 328(a)
`
`and 37 C.F.R. § 42.73. For the reasons that follow, we determine that
`
`Petitioner has shown by a preponderance of the evidence that claims 3–10,
`
`15–31, and 33 of the ’221 patent are directed to patent ineligible subject
`
`matter under 35 U.S.C. § 101. We also determine that claim 22 is indefinite
`
`under 35 U.S.C. § 112.
`
`B. Related Matters and Estoppel
`
`We have issued two previous Final Written Decisions in reviews
`
`challenging the ’221 patent. In CBM2014-00102, we found claims 1, 2, and
`
`11–14 unpatentable under 35 U.S.C. § 103. Apple Inc. v. Smartflash LLC,
`
`
`3 Unless otherwise noted (using “’126” prior to the citation), all future
`citations in this Decision are to CBM2015-00130.
`
`4 For purposes of this Decision, the term “Petitioner” refers to both Google
`and Apple.
`
`3
`
`

`
`Case CBM2015-00126
`Case CBM2015-00130
`Patent 8,118,221 B2
`
`Case CBM2014-00102, (PTAB Sept. 25, 2015) (Paper 52). In CBM2014-
`
`00194, we found claim 32 unpatentable under 35 U.S.C. § 101. Samsung
`
`Electronics America, Inc. v. Smartflash LLC, Case CBM2014-00194,
`
`(PTAB Mar. 29, 2016) (Paper 51).
`
`C. The ’221 Patent
`
`The ’221 patent relates to “a portable data carrier for storing and
`
`paying for data and to computer systems for providing access to data to be
`
`stored” and the “corresponding methods and computer programs.” Ex. 1001
`
`1:21–25. Owners of proprietary data, especially audio recordings, have an
`
`urgent need to address the prevalence of “data pirates” who make
`
`proprietary data available over the Internet without authorization. Id. at
`
`1:29–56. The ’221 patent describes providing portable data storage together
`
`with a means for conditioning access to that data upon validated payment.
`
`Id. at 1:59–2:11. This combination allows data owners to make their data
`
`available over the Internet with less fear of data piracy. Id. at 2:11–15.
`
`As described, the portable data storage device is connected to a
`
`terminal for Internet access. Id. at 1:59–67. The terminal reads payment
`
`information, validates that information, and downloads data into the portable
`
`storage device from the data supplier. Id. The data on the portable storage
`
`device can be retrieved and output from a mobile device. Id. at 2:1–4. The
`
`’221 patent makes clear that the actual implementation of these components
`
`is not critical and may be implemented in many ways. See, e.g., id. at
`
`25:41–44 (“The skilled person will understand that many variants to the
`
`system are possible and the invention is not limited to the described
`
`embodiments . . . .”).
`
`4
`
`

`
`Case CBM2015-00126
`Case CBM2015-00130
`Patent 8,118,221 B2
`
`D. Challenged Claims
`
`The claims under review are claims 3–10, 15–31, and 33 of the ’221
`
`patent (the “challenged claims”). Inst. Dec. 24. Of the challenged claims,
`
`claim 17, 24, and 28 are independent, claims 3–10 depend directly or
`
`indirectly from unchallenged independent claim 1, claims 15 and 16 depend
`
`directly or indirectly from unchallenged independent claim 12, claims 18–23
`
`depend directly or indirectly from challenged independent claim 17, claims
`
`25–27 depend directly or indirectly from challenged independent claim 24,
`
`claims 29–31 depend directly or indirectly from challenged independent
`
`claim 28, and claim 33 depends from unchallenged independent claim 32.
`
`Claims 1, 3, 12, 17, and 24 are reproduced below:
`
`A data access terminal for retrieving data from a data
`1.
`supplier and providing the retrieved data to a data carrier, the
`terminal comprising:
`
`a first interface for communicating with the data supplier;
`
`a data carrier interface for interfacing with the data
`carrier;
`
`a program store storing code implementable by a
`processor; and
`
`a processor, coupled to the first interface, to the data
`carrier interface, and to the program store for implementing the
`stored code, the code comprising:
`
`code to read payment data from the data carrier and to
`forward the payment data to a payment validation system;
`
`code to receive payment validation data from the
`payment validation system;
`
`code responsive to the payment validation data to retrieve
`data from the data supplier and to write the retrieved data into
`the data carrier.
`
`5
`
`

`
`Case CBM2015-00126
`Case CBM2015-00130
`Patent 8,118,221 B2
`
`Ex. 1001, 25:50–62.
`
`A data access terminal as claimed in claim 1, further
`3.
`comprising code to transmit at least a portion of the payment
`validation data to the data supplier or to a destination received
`from the data supplier.
`
`Id. at 25:62–65.
`
`12. A method of providing data from a data supplier to a data
`carrier, the method comprising:
`
`reading payment data from the data carrier;
`
`forwarding the payment data to a payment validation
`system;
`
`retrieving data from the data supplier; and
`
`writing the retrieved data into the dat[a] carrier.
`
`Id. at 27:1–16.
`
`17. A data access device for retrieving stored data from a
`data carrier, the device comprising:
`
`a user interface;
`
`a data carrier interface;
`
`a program store storing code implementable by a
`processor; and
`
`a processor, coupled to the user interface, to the data
`carrier interface and to the program store for implementing the
`stored code, the code comprising:
`
`code to retrieve use status data indicating a use status of
`data stored on the carrier, and use rules data indicating
`permissible use of data stored on the carrier;
`
`code to evaluate the use status data using the use rules
`data to determine whether access is permitted to the stored data;
`and
`
`code to access the stored data when access is permitted.
`
`6
`
`

`
`Case CBM2015-00126
`Case CBM2015-00130
`Patent 8,118,221 B2
`
`Id. at 27:1–16.
`
`24. A method of controlling access to data from a data
`carrier, comprising:
`
`retrieving use status data from the data carrier indicating
`past use of the stored data;
`
`retrieving use rules from the data carrier;
`
`evaluating the use status data using the use rules to
`determine whether access to data stored on the carrier is
`permitted; and
`
`permitting access to the data on the data carrier
`dependent on the result of said evaluating.
`
`Id. at 27:37–45.
`
`A. Claim Construction
`
`ANALYSIS
`
`In a covered business method patent review, claim terms are given
`
`their broadest reasonable interpretation in light of the specification in which
`
`they appear and the understanding of others skilled in the relevant art. See
`
`37 C.F.R. § 42.300(b). Applying that standard, we interpret the claim terms
`
`of the ’221 patent according to their ordinary and customary meaning in the
`
`context of the patent’s written description. See In re Translogic Tech., Inc.,
`
`504 F.3d 1249, 1257 (Fed. Cir. 2007). For purposes of this Decision, we
`
`need not construe expressly any claim term.
`
`B. Statutory Subject Matter
`
`Petitioner challenges claims 3–10, 15–31, and 33 as directed to patent-
`
`ineligible subject matter under 35 U.S.C. § 101. Pet. 39–76; ’126 Pet. 18–
`
`33. According to Petitioner, the challenged claims are directed to an abstract
`
`idea without additional elements that transform the claims into a patent-
`
`7
`
`

`
`Case CBM2015-00126
`Case CBM2015-00130
`Patent 8,118,221 B2
`
`eligible application of that idea. Id. Google submits a declaration from Dr.
`
`Justin Douglas Tygar in support of its Petition.5 ’126 Ex. 1002. Apple
`
`submits a declaration from Dr. John P. J. Kelly in support of its Petition.6
`
`Ex. 1021. Patent Owner argues that the challenged claims are “directed to
`
`machines or useful processes, both patent eligible subject matter under
`
`§ 101.” PO Resp. 20.
`
`1. Abstract Idea
`
`Under 35 U.S.C. § 101, we must first identify whether an invention
`
`fits within one of the four statutorily provided categories of patent-
`
`eligibility: “processes, machines, manufactures, and compositions of
`
`matter.” Ultramercial, Inc. v. Hulu, LLC, 772 F.3d 709, 713–714 (Fed. Cir.
`
`2014). Here, the challenged claims recite a “machine,”—i.e., a “data access
`
`terminal,” (claims 3-10, 32, 33), a “data access system” (claims 28–31), or a
`
`“data access device” (claims 17–23)—and a “process”—i.e., a “method”
`
`(claims 15, 16, 24–27)—under § 101. Section 101, however, “contains an
`
`important implicit exception [to subject matter eligibility]: Laws of nature,
`
`
`5 In its Response, Patent Owner argues that Dr. Tygar’s declaration should
`be given little or no weight. ’126 PO Resp. 5–11. Because Patent Owner
`has filed a Motion to Exclude (’126 Paper 24, 1–8) that includes a request to
`exclude Dr. Tygar’s Declaration in its entirety, or in the alternative, portions
`of the declaration based on essentially the same argument, we address Patent
`Owner’s argument as part of our analysis of the motion to exclude, below.
`
`6 In its Response, Patent Owner argues that Dr. Kelly’s declaration should be
`given little or no weight. PO Resp. 6–17. Because Patent Owner has filed a
`Motion to Exclude (Paper 26, 7–12) that includes a request to exclude Dr.
`Kelly’s Declaration in its entirety, or in the alternative, portions of the
`declaration based on essentially the same argument, we address Patent
`Owner’s argument as part of our analysis of the motion to exclude, below.
`
`8
`
`

`
`Case CBM2015-00126
`Case CBM2015-00130
`Patent 8,118,221 B2
`
`natural phenomena, and abstract ideas are not patentable.” Alice Corp. Pty.
`
`Ltd. v. CLS Bank Int’l., 134 S. Ct. 2347, 2354 (2014) (citing Assoc. for
`
`Molecular Pathology v. Myriad Genetics, Inc., 133 S. Ct. 2107, 2116 (2013)
`
`(internal quotation marks and brackets omitted)). In Alice, the Supreme
`
`Court reiterated the framework set forth previously in Mayo Collaborative
`
`Services v. Prometheus Laboratories, Inc., 132 S. Ct. 1289, 1293 (2012) “for
`
`distinguishing patents that claim laws of nature, natural phenomena, and
`
`abstract ideas from those that claim patent-eligible applications of those
`
`concepts.” Alice, 134 S. Ct. at 2355. The first step in the analysis is to
`
`“determine whether the claims at issue are directed to one of those patent-
`
`ineligible concepts.” Id.
`
`According to the Federal Circuit, “determining whether the section
`
`101 exception for abstract ideas applies involves distinguishing between
`
`patents that claim the building blocks of human ingenuity—and therefore
`
`risk broad pre-emption of basic ideas—and patents that integrate those
`
`building blocks into something more, enough to transform them into specific
`
`patent-eligible inventions.” Versata Dev. Grp., Inc. v. SAP Am., Inc., 793
`
`F.3d 1306, 1332 (Fed. Cir. 2015) (emphasis added); accord id. at 1333–34
`
`(“It is a building block, a basic conceptual framework for organizing
`
`information . . . .” (emphasis added)). This is similar to the Supreme Court’s
`
`formulation in Bilski v. Kappos, 561 U.S. 593, 611 (2010) (emphasis added),
`
`noting that the concept of risk hedging is “a fundamental economic practice
`
`long prevalent in our system of commerce.” See also buySAFE Inc. v.
`
`Google, Inc., 765 F.3d 1350, 1353–54 (Fed. Cir. 2014) (stating that patent
`
`claims related to “long-familiar commercial transactions” and relationships
`
`9
`
`

`
`Case CBM2015-00126
`Case CBM2015-00130
`Patent 8,118,221 B2
`
`(i.e., business methods), no matter how “narrow” or “particular,” are
`
`directed to abstract ideas as a matter of law). As a further example, the
`
`“concept of ‘offer based pricing’ is similar to other ‘fundamental economic
`
`concepts’ found to be abstract ideas by the Supreme Court and [the Federal
`
`Circuit].” OIP Tech., Inc. v. Amazon.com, Inc., 788 F.3d 1359, 1362 (Fed.
`
`Cir. 2015) (citations omitted).
`
`Petitioner argues that the challenged claims are directed to the abstract
`
`idea of “controlling access to something based on validation that payment
`
`has been made” (’126 Pet. 21) or “payment for and/or controlling access to
`
`data” (Pet. 41). Specifically, Petitioner contends that “each challenged claim
`
`is drawn on its face to the concept of payment for and/or controlling access
`
`to data.” Pet. 43; see also ’126 Pet. 22 (“challenged claim 3 simply
`
`performs four steps inherent in the abstract idea of conditioning access on
`
`payment validation.”).
`
`We are persuaded that the challenged claims are drawn to a patent-
`
`ineligible abstract idea. Specifically, the challenged claims are directed to
`
`performing the fundamental economic practice of conditioning and
`
`controlling access to content. For example, claim 17 recites “code to
`
`evaluate the use status data using the use rules data to determine whether
`
`access is permitted to the stored data.” Ex. 1001, 27:1–15.
`
`As discussed above, the ’221 patent discusses addressing recording
`
`industry concerns of data pirates offering unauthorized access to widely
`
`available compressed audio recordings. Ex. 1001, 1:20–55. The
`
`Specification explains that these pirates obtain data either by unauthorized or
`
`legitimate means and then make the data available over the Internet without
`
`10
`
`

`
`Case CBM2015-00126
`Case CBM2015-00130
`Patent 8,118,221 B2
`
`authorization. Id. The Specification further explains that once data has been
`
`published on the Internet, it is difficult to police access to and use of it by
`
`internet users who may not even realize that it is pirated. Id. The ’221
`
`patent proposes to solve this problem by restricting access to data on a
`
`portable data carrier based upon payment validation. Id. at 1:59–2:4. The
`
`’221 patent makes clear that the crux of the claimed subject matter is
`
`restricting access to stored data based on supplier-defined access rules and
`
`validation of payment. Id. at 1:59–2:15.
`
`Although the Specification refers to data piracy on the Internet, the
`
`challenged claims are not limited to the Internet. The underlying concept of
`
`the challenged claims, particularly when viewed in light of the Specification,
`
`is controlling access to content based upon payment as Petitioner contends.
`
`As discussed further below, this is a fundamental economic practice long in
`
`existence in commerce. See Bilski, 561 U.S. at 611.
`
`Patent Owner argues that claims 3–10, 15–31, and 33 are directed to
`
`“machines or useful processes, both patent eligible under § 101.” PO Resp.
`
`20. Patent Owner, however, cites no controlling authority to support the
`
`proposition that subject matter is patent-eligible as long as it is directed to
`
`“various real-world structural components” or “real-world physical
`
`components.” PO Resp. 21. As Petitioner correctly points out (Reply 2–3),
`
`that argument is contradicted by well-established precedent:
`
`There is no dispute that a computer is a tangible system (in § 101
`terms, a “machine”), or that many computer-implemented claims
`are formally addressed to patent-eligible subject matter. But if
`that were the end of the § 101 inquiry, an applicant could claim
`any principle of the physical or social sciences by reciting a
`computer system configured to implement the relevant concept.
`
`11
`
`

`
`Case CBM2015-00126
`Case CBM2015-00130
`Patent 8,118,221 B2
`
`Such a result would make the determination of patent eligibility
`“depend simply on the draftman’s art,” … thereby eviscerating
`the rule that “‘… abstract ideas are not patentable.’”
`
`Alice Corp. Pty. Ltd. v. CLS Bank Int’l, 134 S. Ct. 2347, 2358-59 (2014)
`
`(internal citations omitted).
`
`Patent Owner also argues that the challenged claims are like those
`
`found not to be directed to an abstract idea in Google Inc. v. Network-1
`
`Technologies, Inc., CBM2015-00113, and in Hulu, LLC v. iMTX Strategic,
`
`LLC, CBM2015-00147. PO Resp. 23–26. These decisions are non-
`
`precedential and distinguishable. In CBM2015-00113, the panel’s
`
`determination turned on a step requiring “correlating, by the computer
`
`system using a non-exhaustive, near neighbor search, the first electronic
`
`media work with [an or the first] electronic media work identifier” and on
`
`the Petitioner’s formulation of the alleged abstract idea. Google Inc. v.
`
`Network-1 Technologies, Inc., CBM2015-00113, (PTAB Oct. 19, 2015)
`
`(Paper 7, 13). Patent Owner argues that the challenged claims are like those
`
`at issue in CBM2015-00113 because they “correlate use status data and/or
`
`use rules with content” (PO Resp. 21). As the panel in CBM2015-00113
`
`explained, however, the claims at issue there required “particular types of
`
`searching processes”—i.e., “a non-exhaustive, near neighbor search”—that
`
`are different than the abstract idea alleged by Petitioner. CBM2015-00113,
`
`Paper 7, 12–13. In this case, none of the challenged claims recite a specific
`
`search process by which use rules would be correlated with content data
`
`items. Some challenged claims do not even recite “use rules” or “use rule
`
`data” (e.g., claims 12, 15). Method claim 16 recites “retrieving from the
`
`data supplier a stored data item identifier and associated value data and use
`
`12
`
`

`
`Case CBM2015-00126
`Case CBM2015-00130
`Patent 8,118,221 B2
`
`rule data,” but “retrieving” does not imply “correlating, by the computer
`
`system” using a particular type of search. With respect to CBM2015-00147,
`
`Patent Owner mischaracterizes the Institution Decision. PO Resp. 25–26.
`
`The panel’s determination in that case was based on step two, not step one,
`
`of the Mayo/Alice test. Hulu, LLC v. iMTX Strategic, LLC, CBM2015-
`
`00147 (PTAB Nov. 30, 2015) (Paper 14, 14) (“As in DDR, we are persuaded
`
`that, however the abstract idea is characterized, the ʼ854 patent claims do not
`
`meet the second prong of the Mayo/Alice test.”).
`
`Patent Owner’s Notice of Supplemental Authority also does not alter
`
`our determination. Patent Owner argues that the challenged claims are
`
`“directed to an improvement to computer functionality.” Notice 1 (quoting
`
`Enfish, LLC v. Microsoft Corp., 822 F.3d 1327, 1336 (Fed. Cir. 2016)). The
`
`challenged claims, according to Patent Owner, are “directed to specific
`
`devices, systems, and methods for managing data to facilitate convenient
`
`and secure provision of digital content” (id. at 2) and, therefore, “like those
`
`in Enfish, ‘are directed to a specific implementation of a solution to a
`
`problem,’ in Internet digital commerce.” Id. at 3 (emphasis added by Patent
`
`Owner). Unlike the self-referential table at issue in Enfish, however, the
`
`challenged claims do not purport to be an improvement to the way
`
`computers operate. Instead, they “merely implement an old practice in a
`
`new environment.” FairWarning IP, LLC v. Iatric Systems, Inc., No. 2015-
`
`1985, slip op. 7 (Fed. Cir. Oct. 11, 2016). Petitioner argues, and we agree,
`
`that the challenged claims, like those in In re TLI Communications LLC
`
`Patent Litigation, 823 F.3d 607 (Fed. Cir. 2016), “perform[] generic
`
`computer functions such as storing, receiving, and extracting data” using
`
`13
`
`

`
`Case CBM2015-00126
`Case CBM2015-00130
`Patent 8,118,221 B2
`
`“physical components” that “behave exactly as expected according to their
`
`ordinary use” and “merely provide a generic environment in which to carry
`
`out the abstract idea” of controlling access to content based on payment
`
`and/or rules. Notice Resp. 2–3 (quoting In re TLI Communications LLC
`
`Patent Litigation, 823 F.3d at 612–15). The limitations of the challenged
`
`claims—e.g., “code to read payment data,” “code to receive payment
`
`validation data,”—are so general that they
`
`do no more than describe a desired function or outcome, without
`providing any limiting detail
`that confines the claim to a
`particular solution to an
`identified problem. The purely
`functional nature of the claim confirms that it is directed to an
`abstract idea, not to a concrete embodiment of that idea.
`
`Affinity Labs of Texas, LLC v. Amazon.com Inc., No. 2015-2080, slip op. 7
`
`(Fed. Cir. Sept. 23, 2016) (citation omitted).
`
`We are, thus, persuaded, based on the Specification and the language
`
`of the challenged claims, that claims 3–10, 15–31, and 33 are directed to an
`
`abstract idea. See Alice, 134 S. Ct. at 2356 (holding that the concept of
`
`intermediated settlement at issue in Alice was an abstract idea); Accenture
`
`Global Servs., GmbH v. Guidewire Software, Inc., 728 F.3d 1336, 1344
`
`(Fed. Cir. 2013) (holding the abstract idea at the heart of a system claim to
`
`be “generating tasks [based on] rules . . . to be completed upon the
`
`occurrence of an event”).
`
`2. Inventive Concept
`
`“A claim that recites an abstract idea must include ‘additional
`
`features’ to ensure ‘that the [claim] is more than a drafting effort designed to
`
`monopolize the [abstract idea].’” Alice, 134 S. Ct. at 2357 (quoting Mayo,
`
`14
`
`

`
`Case CBM2015-00126
`Case CBM2015-00130
`Patent 8,118,221 B2
`
`132 S. Ct. at 1297). “This requires more than simply stating an abstract idea
`
`while adding the words ‘apply it’ or ‘apply it with a computer.’ Similarly,
`
`the prohibition on patenting an ineligible concept cannot be circumvented by
`
`limiting the use of an ineligible concept to a particular technological
`
`environment.” Versata, 793 F.3d at 1332 (citations omitted). Moreover, the
`
`mere recitation of generic computer components performing conventional
`
`functions is not enough. See Alice, 134 S. Ct. at 2360 (“Nearly every
`
`computer will include a ‘communications controller’ and ‘data storage unit’
`
`capable of performing the basic calculation, storage, and transmission
`
`functions required by the method claims.”).
`
`Petitioner argues that “the [challenged c]laims’ ‘additional features’
`
`recite only well-known, routine, and conventional computer components and
`
`activities, which is insufficient to establish an inventive concept.” Reply 6.
`
`Petitioner adds that “[t]he specification [of the ’221 patent] itself disclaims
`
`[the claimed hardware elements] as non-inventive.” Id. (citing Ex. 1001,
`
`4:4–13, 11:28–29, 12:29–32, 13:35–38, 16:46–50, 18:7–17). We are
`
`persuaded that claims 3–10, 15–31, and 33 do not add an inventive concept
`
`sufficient to ensure that the patent in practice amounts to significantly more
`
`than a patent on the abstract idea itself. Alice, 134 S. Ct. at 2355; see also
`
`Accenture Global Servs., 728 F.3d at 1344 (holding claims directed to the
`
`abstract idea of “generating tasks [based on] rules . . . to be completed upon
`
`the occurrence of an event” to be unpatentable even when applied in a
`
`computer environment and within the insurance industry). Specifically, we
`
`agree with and adopt the rationale articulated in the Petition that the
`
`additional elements of the challenged claims are generic features of a
`
`15
`
`

`
`Case CBM2015-00126
`Case CBM2015-00130
`Patent 8,118,221 B2
`
`computer that do not bring the challenged claims within § 101 patent
`
`eligibility. Pet. 49–82; Reply 6–19; ’126 Pet. 25–31; ’126 Reply 8–12.
`
`a. Technical Elements
`
`Petitioner argues that the challenged claims are unpatentable because
`
`they are directed to an abstract idea and any “additional features” fall into
`
`“at the very most two categories—field of use limitations and generic
`
`computer implementations.” Pet. 49–50; Reply 6. Patent Owner disagrees,
`
`arguing that the challenged claims are patentable because they “recite[s]
`
`specific ways of using distinct memories, data types, and use rules that
`
`amount to significantly more than the underlying abstract idea.” PO Resp.
`
`40 (quoting Ex. 2049, 19). We agree with Petitioner for the following
`
`reasons.
`
`The ’221 patent Specification treats as well-known all potentially
`
`technical aspects of the challenged claims, including the “data carrier,” “data
`
`supplier,” “payment validation system,” and “mobile communication
`
`device.” See Reply 6 (citing Ex. 1001, 4:4–13, 11:28–29, 12:29–32, 13:35–
`
`38, 16:46–50, 18:7–17). For example, the Specification states the recited
`
`“data access terminal may be a conventional computer,” that the terminal
`
`memory “can comprise any conventional storage device,” and that a “data
`
`device . . . such as a portable audio/video player . . . comprises a
`
`conventional dedicated computer system including a processor . . . program
`
`memory . . . and timing and control logic . . . coupled by a data and
`
`communications bus.” Ex. 1001, 4:4–5, 16:46–50, 18:7–11. In addition, the
`
`Specification notes that the “data carrier” may be a generic device such as a
`
`“standard smart card.” Ex. 1001, 11:28–30; see also id. at 14:25–29
`
`16
`
`

`
`Case CBM2015-00126
`Case CBM2015-00130
`Patent 8,118,221 B2
`
`(“[l]ikewise data stores 136, 138 and 140 may comprise a single physical
`
`data store or may be distributed over a plurality of physical devices and may
`
`even be at physically remote locations from processors 128-134 and coupled
`
`to these processors via internet 142”), Fig. 6. The Specification further
`
`indicates that that the “payment system” may be “a signature transporting
`
`type e-payment system” or “a third party e-payment system.” Id. at 7:11–16,
`
`8:18–22, 13:36–38 (“an e-payment system according to, for example,
`
`MONDEX, Proton, and/or Visa cash compliant standards”).
`
`Further, the claimed computer code performs generic computer
`
`functions, such as reading, receiving, transmitting, and outputting data. See
`
`Pet. 53–55; Reply 7–10. The recitation of these generic computer functions
`
`is insufficient to confer specificity. See Content Extraction and
`
`Transmission LLC v. Wells Fargo Bank, Nat’l Assoc., 776 F.3d 1343, 1347
`
`(Fed. Cir. 2014) (“The concept of data collection, recognition, and storage is
`
`undisputedly well-known. Indeed, humans have always performed these
`
`functions.”).
`
`Moreover, we are not persuaded that the challenged claims “recite[s]
`
`specific ways of using distinct memories, data types, and use rules that
`
`amount to significantly more than” conditioning and controlling access to
`
`content based on payment. See PO Resp. 40. The challenged claims also
`
`recite several generic data types including, “data,” “retrieved data,” “code,”
`
`“payment data,” “payment validation data,” “access rule,” “use rule data,”
`
`“user-stored data identifier data,” and “associated value data.” We are not
`
`persuaded that the recitation of these data types, by itself, amounts to
`
`significantly more than the underlying abstract idea. Alice, 134 S. Ct. at
`
`17
`
`

`
`Case CBM2015-00126
`Case CBM2015-00130
`Patent 8,118,221 B2
`
`2355 (quoting Mayo, 132 S. Ct. at 1294) (“We have described step two of
`
`this analysis as a search for an ‘inventive concept’—i.e., an element or
`
`combination of elements that is ‘sufficient to ensure that the patent in
`
`practice amounts to significantly more than a patent on the [ineligible
`
`concept] itself.’”) (brackets in original). Patent Owner does not point to any
`
`inventive concept in the ’221 patent related to the way the recited data types
`
`are constructed or used. In fact, the ’221 patent simply recites these data
`
`types with no description of the underlying implementation or programming
`
`that results in these data constructs. See Content Extraction and
`
`Transmission LLC, 776 F.3d at 1347 (“The concept of data collection,
`
`recognition, and storage is undisputedly well-known. Indeed, humans have
`
`always performed these functions.”). This recitation of generic computer
`
`memories and data types, being used in the conventional manner, is
`
`insufficient to confer the specificity required to elevate the nature of the
`
`claim into a patent-eligible application. Alice, 134 S. Ct. at 2355 (quoting
`
`Mayo, 132 S. Ct. at 1294) (“We have described step two of this analysis as a
`
`search for an ‘inventive concept’—i.e., an element or combination of
`
`elements that is ‘sufficient to ensure that the patent in practice amounts to
`
`significantly more than a patent on the [ineligible concept] itself.’”)
`
`(brackets in original); Affinity Labs, No. 2015-2080, slip op. 10–11 (“The
`
`claims do not go beyond ‘stating [the relevant] functions in general terms,
`
`without limiting them to technical means for performing the functions that
`
`are arguably an advance over conventional computer and network
`
`technology.’”).
`
`18
`
`

`
`Case CBM2015-00126
`Case CBM2015-00130
`Patent 8,118,221 B2
`
`In addition, because the recited elements can be implemented on a
`
`general purpose computer, the challenged claims do not cover a “particular
`
`machine.” Pet. 75–76; see Bilski, 561 U.S. at 604–05 (stating that machine-
`
`or-transformation test remains “a useful and important clue” for determining
`
`whether an invention is patent eligible). And the challenged claims do not
`
`transform an article into a different state of thing. Pet. 75–76.
`
`Thus, we determine the potentially technical elements of the claim are
`
`nothing more than “generic computer implementations” and perform
`
`functions that are “purely conventional.” Alice, 134 S. Ct. at 2358–59;
`
`Mayo, 132 S. Ct. at 1294.
`
`b. DDR Holdings
`
`Relying on the Federal Circuit’s decision in DDR Holdings, Patent
`
`Owner asserts that the challenged claims are directed to statutory subject
`
`matter because the claimed solution is “necessarily rooted in computer
`
`technology in order to overcome a problem specifically arising in the realm
`
`of computer networks.’” PO Resp. 33 (quoting DDR Holdings, L

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket