throbber
Trials@uspto.gov
`Tel: 571-272-7822
`
`Paper 31
`Entered: April 6, 2015
`
`UNITED STATES PATENT AND TRADEMARK OFFICE
`
`BEFORE THE PATENT TRIAL AND APPEAL BOARD
`
`GOOGLE INC.,
`Petitioner,
`
`v.
`
`UNWIRED PLANET, LLC,
`Patent Owner.
`
`Case CBM2014-00006
`Patent 7,203,752 B2
`
`
`
`
`
`
`
`
`
`Before MICHAEL W. KIM, JENNIFER S. BISK, and
`BARBARA A. PARVIS, Administrative Patent Judges.
`
`BISK, Administrative Patent Judge.
`
`FINAL WRITTEN DECISION
`
`35 U.S.C. § 328(a) and 37 C.F.R. § 42.73
`
`
`
`

`

`CBM2014-00006
`Patent 7,203,752 B2
`
`I.
`
`INTRODUCTION
`
`A.
`
`Background
`
`Petitioner, Google Inc., filed a Petition pursuant to § 18 of the Leahy-
`
`Smith America Invents Act (“AIA”).1 Paper 1 (“Pet.”). The Petition
`
`challenged claims 25–29 (“the challenged claims”) of U.S. Patent No.
`
`7,203,752 B2 (“the ’752 patent”). On April 8, 2014, we instituted a
`
`transitional covered business method patent review (Paper 11, “Decision to
`
`Institute” or “Dec.”) based upon Petitioner’s assertion that the challenged
`
`claims are unpatentable based on the following grounds:
`
`Reference[s] 2
`
`Not Applicable
`
`Not Applicable
`
`Havinis ’931 and Leonhardt
`
`Landgren and Leonhardt
`
`Basis
`
`§ 101
`
`§ 112, ¶ 1
`
`§ 103
`
`§ 103
`
`Claims Challenged
`
`25–29
`
`26
`
`25
`
`25
`
`A consolidated hearing for CBM2014-00004, CBM2014-00005,
`
`CBM2014-000006, IPR2014-00027, IPR2014-00036, IPR2013-00037,
`
`involving the same parties, was held January 13, 2015. Paper 30 (hearing
`
`transcript).
`
`This is a Final Written Decision under 35 U.S.C. § 328(a). Based on
`
`the record presented, we are persuaded that Petitioner has shown by a
`
`preponderance of the evidence that the challenged claims are unpatentable.
`
`
`1 Pub. L. No. 112-29, 125 Stat. 284, 296–07 (2011).
`2 U.S. Patent No. 6,104,931 (Ex. 1004) (“Havinis ’931”); U.S. Patent No.
`6,115,754 (Ex. 1005) (“Landgren”); Ulf Leonhardt & Jeff Magee, Towards
`a General Location Service for Mobile Environments, Proceedings of the
`Third Int’l Workshop on Servs. In Distributed & Networked Env’ts 43–50
`(1996) (Ex. 1008) (“Leonhardt”).
`
`2
`
`

`

`CBM2014-00006
`Patent 7,203,752 B2
`
`B. The ’752 Patent
`
`The ’752 patent relates to using location-based services over mobile
`
`wireless networks. Ex. 1001, 1:14–19. According to the ’752 patent, at the
`
`time of the invention, services related to the provision of wireless
`
`communications, including those provided to mobile subscribers based on
`
`their geographic location, were common. Id. at 1:33–46. These so-called
`
`“location-based services” track the mobile subscriber as they move
`
`throughout the network so that the service may provide location-based
`
`information to either the subscriber (e.g., the closest gas station) or an entity
`
`monitoring the subscriber (e.g., an employer monitoring the location of its
`
`employees). Id. at 1:47–56.
`
`Of course, location tracking raises privacy concerns. Id. at 1:60–63.
`
`To protect his or her privacy, a mobile subscriber may wish to limit access to
`
`their location information based upon many factors, including: (1) the time
`
`of the request; (2) the mobile subscriber’s location at the time of the request;
`
`or (3) the party who is seeking the information. Id. at 1:63–2:1. The ’752
`
`patent addresses this need for controlled access to potentially sensitive
`
`location information by storing a “subscriber profile.” Id. at 2:8–14. A
`
`subscriber profile includes a description of the services (“client
`
`applications”) that may receive location information and the conditions
`
`under which that information may be provided to the services. Id. at 2:8–20.
`
`Figure 1 of the ’752 patent is reproduced below.
`
`3
`
`

`

`CBM2014-00006
`Patent 7,203,752 B2
`
`
`
`Figure 1 discloses the overall system architecture in which the
`
`invention described by the ’752 patent operates. Id. at 4:12–13. Wireless
`
`communications device 14 communicates via tower 12 over wireless
`
`network 10. Id. at 4:28–32. Location server 50 periodically collects
`
`location data for wireless communication device 14. Id. at 4:51–56. Client
`
`application 24 communicates with access manager 40 to request wireless
`
`communication device 14’s current location. Id. at 5:25–46. Access
`
`manager 40 determines if client application 24 is authorized to make the
`
`request under the current conditions by authenticating client application 24
`
`and inspecting the contents of wireless communication device 14’s
`
`subscriber profile. Id. at 5:38–46. Figure 3 of the ’752 patent is reproduced
`
`below.
`
`4
`
`

`

`CBM2014-00006
`Patent 7,203,752 B2
`
`
`
`Figure 3 discloses an example subscriber profile. Id. at 4:17–18. In
`
`this example, the subscriber profile includes permission set 324 for each
`
`client application 24 (each of Company A, B, and C) authorized to access
`
`this subscriber’s location information. Id. at 9:36–39. Each permission set
`
`324 “may include a temporal permission set which identifies the time of
`
`day/day of week a particular authorized client may access the location
`
`information” as well as a “spatial permission set [which] provides a listing
`
`of the enabled geographic areas (for example city/county/state), for
`
`providing the location information” to the requesting client application. Id.
`
`at 9:39–45.
`
`C. Related Matters
`
`Petitioner states that the ’752 patent has been asserted against
`
`Petitioner in a related district court proceeding in the District of Nevada.
`
`5
`
`

`

`CBM2014-00006
`Patent 7,203,752 B2
`
`Pet. 79. Additionally, Petitioner filed a petition for an inter partes review in
`
`the following proceeding before the Board involving the ’752 patent:
`
`IPR2014-00037. A final written decision in IPR2014-00037 is entered
`
`concurrently with this decision.
`
`Furthermore, U.S. Patent No. 7,463,151 (“the ’151 patent”) and U.S.
`
`Patent No. 7,024,205 (“the ’205 patent”) are involved in the same district
`
`court proceeding identified above, and also concern location-based, mobile
`
`service technology. The ’151 patent and the ’205 patent are not, however, in
`
`the same patent family as the ’752 patent. Petitioner has requested Office
`
`review of the ’151 patent (Case Nos. CBM2014-00004 and IPR2014-00027)
`
`and the ’205 patent (Case Nos. CBM2014-00005 and IPR2014-00036).
`
`D. The Challenged Claims
`
`Petitioner challenges claims 25–29 of the ’752 patent. Of the
`
`challenged claims, only claim 25 is independent. Claim 26 depends from
`
`claim 25, claims 27 and 28 each depend from claim 26, and claim 29
`
`depends from claim 28. Claims 25 and 26 are reproduced here:
`
`25. A method of controlling access to location information
`for wireless communications devices operating in a wireless
`communications network, the method comprising:
`
`receiving a request from a client application for location
`information for a wireless device;
`
`retrieving a subscriber profile from a memory, the
`subscriber profile
`including a
`list of authorized client
`applications and a permission set for each of the authorized
`client applications, wherein the permission set includes at least
`one of a spatial limitation on access to the location information
`or a temporal limitation on access to the location information;
`
`querying the subscribe profile to determine whether the
`client application is an authorized client application;
`
`6
`
`

`

`CBM2014-00006
`Patent 7,203,752 B2
`
`querying the subscriber profile to determine whether the
`permission set for the client application authorizes the client
`application to receive the location information for the wireless
`device;
`
`determining that the client application is either not an
`authorized client application or not authorized to receive the
`location information; and
`
`denying the client application access to the location
`information.
`
`Ex. 1001, 16:18–40.
`
`26. The method of claim 25 further comprising:
`
`notifying the wireless device that the client application is
`not authorized to receive the location information; and
`
`updating the subscriber profile to authorize the client
`application
`to
`receive
`the
`location
`information during
`subsequent requests.
`
`Ex. 1001, 16:41–46.
`
`II. ANALYSIS
`
`A. Claim Construction
`
`We construe all terms, whether or not expressly discussed here, using
`
`the broadest reasonable construction in light of the ’742 patent specification.
`
`In re Cuozzo Speed Techs., LLC, No. 2014-1301, 2015 WL 448667 at *7
`
`(Fed. Cir. Feb. 4, 2015) (“We conclude that Congress implicitly adopted the
`
`broadest reasonable interpretation standard in enacting the AIA.”); 37 C.F.R.
`
`§ 42.300(b). In the Decision to Institute, we expressly construed the
`
`following terms: (1) “spatial limitation on access to the location
`
`information” as “limitation on access to location information that depends
`
`on the mobile device’s location”; and (2) “subscriber profile” as “a set of
`
`limitations on the provision of location information corresponding to the
`
`wireless device, based upon the privacy preferences of the wireless device
`
`7
`
`

`

`CBM2014-00006
`Patent 7,203,752 B2
`
`user.” Dec. 7–9. Neither party has expressed disagreement with these
`
`constructions, and we see no reason to modify these constructions based on
`
`the evidence introduced during trial. For purposes of this Decision, we
`
`continue to apply these constructions for the same reasons as set forth in the
`
`Decision to Institute.
`
`B. Obviousness Grounds—Claim 25
`
`The Petition challenges the patentability of claims 25–29 of the ’752
`
`patent under 35 U.S.C. §§ 102 and 103. Pet. 46–79. After considering the
`
`arguments and evidence presented in the Petition and the Preliminary
`
`Response (Paper 8), we instituted trial with respect to claim 25, concluding
`
`that Petitioner was likely to prevail in showing unpatentability over
`
`combinations of (1) Havinis ’931 and Leonhardt, and (2) Landgren and
`
`Leonhardt. Dec. 34.
`
`1. Patent Owner’s Arguments
`
`Patent Owner was then afforded the opportunity to file a Patent
`
`Owner Response to address “any ground for unpatentability not already
`
`denied” by our Decision to Institute. 37 C.F.R. § 42.220. In its Patent
`
`Owner Response, Patent Owner does not address the grounds of
`
`unpatentability under § 103 for claim 25. Paper 22 (“PO Resp.”), 3 (“The
`
`present response does not address the alleged grounds of unpatentability
`
`under §§ 102 and 103 for independent claim 25.”). Thus, Patent Owner
`
`provides no substantive arguments beyond those previously asserted in its
`
`Preliminary Response (Paper 8). We previously considered those
`
`arguments, but did not find them persuasive. Dec. 17–29.
`
`Thus, for these grounds we are left to consider only the evidence of
`
`record as presented in the Petition. See Pet. 56–59, 69–70. After
`
`8
`
`

`

`CBM2014-00006
`Patent 7,203,752 B2
`
`considering Petitioner’s evidence with respect to claim 25, as explained in
`
`more detail below, we determine that the preponderance weighs in favor of
`
`unpatentability.
`
`2. Overview of Havinis ’931
`
`Havinis ’931 discloses a method requesting location services within a
`
`mobile communications system. Ex. 1004, 1:8–14. Specifically, Havinis
`
`’931 describes a “Location Application (LA)” that may request the location
`
`of a mobile station after registering with at least one “Gateway Mobile
`
`Location Center (GMLC”). Id. at 2:24–35, 3:43–51. This information is
`
`stored in a database called the “Home Location Register (HLR)” along with
`
`subscriber information including privacy preferences. Id. at 1:55–2:9, 7:16–
`
`29. Upon a request from a particular LA, the GMLC verifies the
`
`authenticity of the LA. Id. at 4:66–5:4. Once the GMLC determines that the
`
`LA is legitimate, it requests the mobile station’s location from the HLR (id.
`
`at 7:16–45) and checks the privacy indications of the mobile station (id. at
`
`7:46–65). If the mobile station’s privacy settings allow location information
`
`to be sent to the LA under the current conditions, the information is
`
`forwarded. Id. at 8:1–9. Otherwise, a rejection message is sent. Id. at 7:66–
`
`8:1.
`
`3. Overview of Leonhardt
`
`Leonhardt describes “how to meet the need for location-dependent
`
`information by introducing a general-purpose location service for mobile
`
`environments” and “investigates mechanisms to exactly specify and
`
`supervise the level of access to location data that is wanted.” Ex. 1008, 43.
`
`The mechanism Leonhardt proposes is a “flexible yet powerful access
`
`control mechanism[ ]” using a hierarchical structure of location information.
`
`9
`
`

`

`CBM2014-00006
`Patent 7,203,752 B2
`
`Id. at 47. Specifically, Leonhardt’s mechanism includes a set of location
`
`access rules that define boundaries within which an object allows access to
`
`its location information. Id. These boundaries are defined using a “visible
`
`domain set[ ] (VDS).” Id. Only objects positioned in a location listed in the
`
`VDS of an access rule may be queried for their location. Id. To allow for
`
`personalized privacy preferences, “a user can specify his or her private
`
`location access authorisation policies in his or her personal user
`
`representation domain.” Id. Figure 3 of Leonhardt is reproduced below.
`
`
`
`Figure 3 of Leonhardt illustrates an example location access control
`
`rule “that specifies a policy which restricts the level of access for students to
`
`the location of members of staff.” Id. Specifically, the VDS of Figure 3
`
`includes, “Blackett Lab, Campus A, College, [and] CS Department.” Id. If
`
`a student queries the location of staff located anywhere other than those four
`
`listed locations, their query will be unsuccessful. Id.
`
`4. Overview of Landgren
`
`Landgren discloses appending location information of a mobile unit
`
`onto its communications. Ex. 1005, 1:9–15. Specifically, Landgren
`
`describes an entity called a “location appending unit,” which monitors
`
`communications passing between a gateway between a wireless network and
`
`10
`
`

`

`CBM2014-00006
`Patent 7,203,752 B2
`
`the Internet. Id. at 4:49–67, 5:28–41. When the location appending unit
`
`detects a requirement for location information on any communications, it
`
`determines the location of the mobile unit. Id. at 5:28–41. Part of this
`
`determination includes accessing a subscriber profile of the mobile unit. Id.
`
`at 8:56–59. The subscriber profile indicates whether the location appending
`
`unit is allowed to append its location information to a communication. Id. at
`
`8:59–65. If allowed, the location appending unit appends the mobile unit’s
`
`location information to the communication for delivery to the final
`
`destination. Id.
`
`5. Obviousness Over Havinis ’931 and Leonhardt
`
`Petitioner asserts that Havinis ’931 discloses all the features of claim
`
`25, but acknowledges that Leonhardt expressly teaches the limitation “the
`
`subscriber profile including . . . a permission set for each of the authorized
`
`client applications, wherein the permission set includes at least one of a
`
`spatial limitation on access to the location information or a temporal
`
`limitation on access to the location information” (“the permission set
`
`constraint limitation”). Pet. 56–57.
`
`We have reviewed Petitioner’s obviousness contentions and
`
`supporting evidence, including the Declaration of Dr. Donald Cox (Ex. 1002
`
`¶¶ 39–50, 68–70, 76), which read all elements of claim 25 of the ’752 Patent
`
`onto the combined teachings of Havinis ’931 and Leonhardt. Pet. 46–49,
`
`51–53, 56–59 (citing Ex. 1004, 2:10–14, 23–26, 3:33–40, 4:37–45, 5:5–36,
`
`7:47–66; Ex. 1008, Abs., 43, 47, Fig. 3). We are persuaded that Petitioner
`
`has shown claim 25 unpatentable over this combination. For instance, we
`
`are persuaded that Havinis ’931 discloses “[a] method of controlling access
`
`to location information for wireless communications devices operating in a
`
`11
`
`

`

`CBM2014-00006
`Patent 7,203,752 B2
`
`wireless communications network” as recited by claim 25. Specifically,
`
`Havinis ’931 discloses that the GMLC receives a positioning request for a
`
`mobile station from a location application and provides the requested
`
`information only if the location application is authorized and such access is
`
`permitted by the subscriber’s privacy indication.
`
`Moreover, we are persuaded that Havinis ’931 discloses the recited
`
`“subscriber profile including a list of authorized client applications and a
`
`permission set for each of the authorized client applications.” Specifically,
`
`we are persuaded that the location services profiles maintained by the
`
`GMLC database of Havinis ’931 constitute a subscriber profile. Ex. 1004,
`
`5:5–36; Ex. 1002 ¶¶ 41–44. As stated in our Decision to Institute, we are
`
`persuaded that these profiles “include limitations on the provision of
`
`location information corresponding to wireless devices, based on the privacy
`
`preferences of the wireless device user.” Dec. 22. Moreover, the GMLC
`
`maintains a list of location applications (in the form of Location Application
`
`Identifier Numbers) corresponding to the claimed authorized client
`
`applications and identifies a location services profile corresponding to the
`
`claimed permission set. See, e.g., Ex. 1004, 2:56–66.
`
`Finally, we are persuaded that the remaining limitations recited by
`
`claim 25 are disclosed by the combination of Havinis ’931 and Leonhardt.
`
`See Pet. 46–49, 51–53, 56–59; Dec. 21–25. For example, we are persuaded
`
`that Leonhardt discloses the “spatial limitation” component of the
`
`permission set constraint limitation. Leonhardt discloses requests for
`
`location information from querying objects may be constrained depending
`
`on the location of the target objects to be located. Ex. 1008, 47, Fig. 3; Ex.
`
`1002 ¶¶ 68–70; see Pet. 57–59.
`
`12
`
`

`

`CBM2014-00006
`Patent 7,203,752 B2
`
`Furthermore, Petitioner has set forth a showing of articulated
`
`reasoning with rational underpinning to combine Havinis ’931 and
`
`Leonhardt. See KSR Int’l Co. v. Teleflex Inc., 550 U.S. 398, 418 (2007).
`
`For instance, Petitioner states:
`
`[a] person of ordinary skill would have found it obvious to
`modify the system of Havinis ’931 to include Leonhardt’s
`location access policies, in order to further Havinis ’931’s goals
`of managing positioning requests sent by Location Applications
`such that location services can be tailored individually to meet
`the needs of the mobile device user.
`
`Pet. 59 (citing Ex. 1004, 3:33–40). Relying on Dr. Cox, Petitioner adds that
`
`this modification “would have been nothing more than the application of a
`
`known method of privacy management to achieve a predictable result.” Ex.
`
`1002 ¶ 76. As explained in our Decision to Institute, we are persuaded the
`
`rationale set forth by Petitioner and Dr. Cox is reasonable. See Dec. 24–25.
`
`Subsequent to our preliminary finding, Patent Owner has provided no
`
`evidence or argument to the contrary. Thus, after once again evaluating
`
`Petitioner’s arguments and supporting evidence, we conclude that Petitioner
`
`has shown by a preponderance of the evidence that it would have been
`
`obvious to combine the relied upon teachings of Havinis ’931 and
`
`Leonhardt.
`
`We conclude that Petitioner has shown by a preponderance of the
`
`evidence that claim 25 of the ’752 Patent would have been obvious over
`
`Havinis ’931 and Leonhardt.
`
`6. Obviousness Over Landgren and Leonhardt
`
`Petitioner asserts that Landgren discloses all the features of claim 25,
`
`including a “subscriber profile,” except that the subscriber profile of
`
`Landgren does not include “a list of authorized client applications and a
`
`13
`
`

`

`CBM2014-00006
`Patent 7,203,752 B2
`
`permission set for each of the authorized client applications, wherein the
`
`permission set includes at least one of a spatial limitation on access to the
`
`location information or a temporal limitation on access to the location
`
`information.” Pet. 61–66, 69–70. Petitioner relies on Leonhardt to make up
`
`this deficiency. Id. at 60–70.
`
`We have reviewed Petitioner’s obviousness contentions and
`
`supporting evidence, including the Declaration of Dr. Donald Cox (Ex. 1002
`
`¶¶ 52–55, 78), which read all elements of claim 25 of the ’752 Patent onto
`
`the combined teachings of Landgren and Leonhardt. Pet. 61–66, 69–70
`
`(citing Ex. 1005, Abs., 8:2126, 62–65; Ex. 1008, 43, 47). We are persuaded
`
`that Petitioner has shown claim 25 unpatentable over this combination. For
`
`instance, we are persuaded that Landgren discloses “receiving a request from
`
`a client application for location information for a wireless device” as recited
`
`by claim 25. Landgren discloses “an application operating on [a] web server
`
`. . . requesting the location appending unit . . . to intercept all
`
`communications.” Ex. 1001, 5:52–58; see id. 8:21–42.
`
`We are also persuaded that the remaining limitations recited by claim
`
`25 are disclosed by the combination of Landgren and Leonhardt. See Pet.
`
`61–66, 69–70; Dec. 27–29. For example, we are persuaded that the location
`
`access policies of Leonhardt constitute a subscriber profile, in that they
`
`identify subscribers or target objects (e.g., staff members) that may be
`
`located by querying objects (e.g., students). Ex. 1008, 47, Fig. 3; Ex. 1002
`
`¶¶ 68–70; see Pet. 61–66, 69–70. In addition, the querying objects
`
`(students) operate through applications to request location data. Id.
`
`Moreover, given that such location data may be provided, the applications
`
`used by the querying objects are authorized. Id. Finally, the reduction rules
`
`14
`
`

`

`CBM2014-00006
`Patent 7,203,752 B2
`
`of Leonhardt correspond to the recited “permission set includ[ing] . . . spatial
`
`limitations on access to location information,” in that they constrain requests
`
`for location information from querying objects (students) depending on the
`
`location of the target objects (staff members) to be located. Id.
`
`Furthermore, Petitioner has set forth a showing of articulated
`
`reasoning with rational underpinning to combine Landgren and Leonhardt.
`
`See KSR Int’l Co. v. Teleflex Inc., 550 U.S. 398, 418 (2007). For instance,
`
`Petitioner states:
`
`[a] person of ordinary skill would have found it obvious to
`modify the system of Landgren to include Leonhardt’s location
`access policies and reduction rules, in order to further
`Landgren’s goals of managing positioning requests sent by
`applications such
`that
`location services can be
`tailored
`individually to meet the needs of the mobile device user.
`
`Pet. 70. Relying on Dr. Cox, Petitioner adds that this modification “would
`
`have been nothing more than the application of a known method of privacy
`
`management to achieve a predictable result.” Ex. 1002 ¶ 78. As explained
`
`in our Decision to Institute, we are persuaded the rationale set forth by
`
`Petitioner and Dr. Cox is reasonable. See Dec. 29. Subsequent to our
`
`preliminary finding, Patent Owner has provided no evidence or argument to
`
`the contrary. Thus, after once again evaluating Petitioner’s arguments and
`
`supporting evidence, we conclude that Petitioner has shown by a
`
`preponderance of the evidence that it would have been obvious to combine
`
`the relied upon teachings of Landgren and Leonhardt.
`
`We conclude that Petitioner has shown by a preponderance of the
`
`evidence that claim 25 of the ’752 Patent would have been obvious over
`
`Landgren and Leonhardt.
`
`15
`
`

`

`CBM2014-00006
`Patent 7,203,752 B2
`
`C. Written Description—Claim 26
`
`Petitioner contends that claim 26 lacks written description support
`
`under 35 U.S.C. § 112, ¶ 1.3 Pet. 43–46. Specifically, Petitioner asserts that
`
`the limitations “notifying the wireless device that the client application is not
`
`authorized to receive the location information” (“the notifying limitation”)
`
`and “updating the subscriber profile to authorize the client application to
`
`receive the location information during subsequent requests” (“the updating
`
`limitation”) were added during prosecution and are not supported by the
`
`language of the originally filed application. Id. at 43 (citing Ex. 1003, 43).
`
`In the Decision to Institute we instituted trial on this ground,
`
`concluding that Petitioner was likely to prevail in showing that the ’752
`
`patent fails to describe notifying the wireless device as required by the
`
`notifying limitation. Dec. 14–16. In addition, we concluded that Petitioner
`
`was likely to prevail in showing that the ’752 patent fails to describe the
`
`combination of the notifying limitation and the updating limitation. Id. at
`
`16–17.
`
`1. Order of the Steps
`
`As a preliminary matter, Patent Owner argues that the Decision to
`
`Institute erred in requiring a certain order to the steps of claim 26. PO Resp.
`
`6–13. This argument centers on four limitations of claim 26: “determining
`
`that the client application is either not an authorized client application or not
`
`authorized to receive the location information” (“the determining
`
`limitation”); (2) “denying the client application access to the location
`
`
`3 Section 4(c) of the AIA re-designated 35 U.S.C. § 112 ¶ 1 as 35 U.S.C.
`§ 112(a). Because the ’752 patent has a filing date before September 16,
`2012 (effective date of § 4(c)), we will refer to the pre-AIA version of 35
`U.S.C. § 112.
`
`16
`
`

`

`CBM2014-00006
`Patent 7,203,752 B2
`
`information” (“the denying limitation”); (3) the notifying limitation; and
`
`(4) the updating limitation. The determining and denying limitations are
`
`recited sequentially in claim 25 and the notifying and updating limitations
`
`are recited sequentially in claim 26. Id. We agree with Patent Owner that
`
`“unless the steps of a method actually recite an order, the steps are not
`
`ordinarily construed to require one.” Altiris, Inc. v. Synantec Corp., 318
`
`F.3d 1363, 1369 (Fed. Cir. 2003) (internal quotation marks omitted); PO
`
`Resp. 7.
`
`Patent Owner argues that between these four limitations, the only
`
`potential temporal requirement is that the determining limitation may be
`
`required to take place before the notifying limitation. PO Resp. 8–13. We
`
`agree that this particular temporal requirement is required by the claim
`
`language, because “notifying the wireless device that the client application is
`
`not authorized” requires there first to have been a “determin[ation] that the
`
`client application is . . . not authorized.”
`
`According to Patent Owner, however, the order of the denying and
`
`notifying limitations are not related, and thus do not indicate a particular
`
`temporal requirement. Id. at 8–10. In particular, Patent Owner asserts that
`
`although listed later in the claim than the denying limitation (because the
`
`notifying limitation is recited in claim 26 while the denying limitation is
`
`recited in claim 25), the notifying limitation is not tied to the result of the
`
`denying limitation. Id. In other words, Patent Owner asserts that nothing in
`
`the claim language or the specification restricts the wireless device from
`
`being notified that a client application is not authorized to receive the
`
`location information before the client application is denied access to the
`
`location information. Petitioner does not appear to disagree with this
`
`17
`
`

`

`CBM2014-00006
`Patent 7,203,752 B2
`
`argument. See Paper 24 (“Reply”) 1–5. We agree with Patent Owner that
`
`the denying and notifying limitations do not have to occur in any particular
`
`order in relation to each other.
`
`Patent Owner also argues that nothing in the claim language or the
`
`specification requires a particular order of the notifying and updating
`
`limitations—“updating the subscriber profile to authorize the client
`
`application to receive the location information during subsequent requests.”
`
`PO Resp. 10–13. In the Decision to Institute, we stated that “because the
`
`‘updating’ step in claim 26 authorizes the client application to receive the
`
`location information ‘during subsequent requests’” the updating limitation
`
`must follow the notifying step in time. Dec. 17. Patent Owner objects to
`
`this logic because although “during subsequent requests” expresses a timing
`
`element, that element is not tied to anything in the notifying limitation. Id.
`
`Petitioner agrees with the Decision to Institute, arguing that the updating
`
`limitation has to occur after the notifying limitation. Reply 6–7 (citing Ex.
`
`2001 ¶¶ 20, 22 (Patent Owner’s declarant testimony)).
`
`We agree with Patent Owner that neither the claims nor the
`
`specification requires that the notifying limitation occur before the updating
`
`limitation. Instead, “during subsequent requests” logically refers to requests
`
`that occur after the subscriber profile has been updated. We agree that
`
`“subsequent” is not related to the immediately preceding claim limitation
`
`and we see no reason that a subscriber profile cannot be updated before the
`
`wireless device is notified that the client application is not authorized to
`
`receive the location information. Beginning with the claim language, “it
`
`neither grammatically nor logically indicates” that the notifying step must
`
`occur prior to the updating step. Altiris, 318 F.3d at 1370.
`
`18
`
`

`

`CBM2014-00006
`Patent 7,203,752 B2
`
`Although it is true that being notified that a client application is not
`
`authorized may prompt a subscriber to update their profile, nothing in the
`
`claim ties the updating limitation to such a reaction. In fact, claim 26 does
`
`not specify who or what does the updating of the profile. See Ex. 1001,
`
`16:47–48 (claim 28 “[t]he method of claim 26 wherein the updating the
`
`subscriber profile is performed by the subscriber”). Thus, it is unclear why
`
`the updating limitation would be tied to the notification of the wireless
`
`device. Looking at the specification, we also see no requirement that the
`
`updating limitation occur after the notifying limitation and Petitioner does
`
`not point us to language supporting such a requirement. See Pet. 45–46;
`
`Reply 5–7. In fact, Petitioner acknowledges that the specification does not
`
`describe any embodiments in which the limitations occur in this order. Pet.
`
`45 (“[a]lthough the ’752 specification describes the subscriber profile can be
`
`modified . . . , it does not describe any embodiments in which the wireless
`
`device is notified that the client application is not authorized to receive the
`
`location information and the subscriber profile is then updated to authorize
`
`the client application in subsequent requests”) (citing Ex. 1001, 8:60–9:25,
`
`Figs. 5, 6A, 6B; Ex. 1002 ¶¶ 37–38).
`
`For these reasons, we conclude that, in claim 26, the denying and
`
`notifying limitations do not have to occur in any particular order in relation
`
`to each other.
`
`2. Written Description Support for the Notifying Limitation
`
`Petitioner contends that “the closest disclosure in the ’752
`
`specification” to the notifying limitation—“notifying the wireless device that
`
`the client application is not authorized to receive the location information”—
`
`is the following language: “If the information does not match, a ‘denied
`
`19
`
`

`

`CBM2014-00006
`Patent 7,203,752 B2
`
`access’ message will be presented to the requesting application.” Pet. 44
`
`(quoting Ex. 1001, 11:40–42). According to Petitioner, this language only
`
`describes notifying the client application of a denial of access and not
`
`notifying the wireless device as claimed and thus does not support the
`
`notifying limitation. Id. Petitioner points to other portions of the ’752
`
`patent that describe notifying the wireless device, but according to
`
`Petitioner, these sections only support notifications that occur after a client
`
`application has been cleared to receive location information, and therefore
`
`do not support notifying the wireless device of the correct information—in
`
`other words, Petitioner asserts that the notifying limitation requires
`
`notification that the client application is not authorized to receive the
`
`information. Id. at 44–45 (citing Ex. 1002 ¶¶ 34–36).
`
`We are not persuaded that Petitioner has shown by a preponderance of
`
`the evidence that the ’752 patent fails to provide sufficient written
`
`description support for the notifying limitation. Petitioner’s only evidence
`
`that the notifying limitation is not sufficiently supported is its argument that
`
`the ’752 patent fails to explicitly describe notifying the wireless device that
`
`access to the location information was denied. Pet. 44–45. Petitioner
`
`proffers testimony from Dr. Cox

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket