throbber
Trials@uspto.gov
`571-272-7822
`
`
`
`
`
`
`
`
`
`
`
`Paper 62
`Entered: November 3, 2014
`
`
`UNITED STATES PATENT AND TRADEMARK OFFICE
`____________
`
`BEFORE THE PATENT TRIAL AND APPEAL BOARD
`____________
`
`
`
`POLARIS WIRELESS, INC.,
`Petitioner,
`
`v.
`
`TRUEPOSITION, INC.,
`Patent Owner.
`____________
`
`Case IPR2013-00323
`Patent 7,783,299 B2
`____________
`
`
`Before JAMESON LEE, JONI Y. CHANG, and MICHAEL W. KIM,
`Administrative Patent Judges.
`
`
`KIM, Administrative Patent Judge.
`
`
`
`
`
`
`FINAL WRITTEN DECISION
`35 U.S.C. § 318(a) and 37 C.F.R. § 42.73
`
`
`

`

`IPR2013-00323
`Patent 7,783,299 B2
`
`
`I.
`
`BACKGROUND
`
`A.
`
`Introduction
`
`Polaris Wireless, Inc. (“Petitioner”) filed a Petition requesting inter
`
`partes review of claims 111–114 of U.S. Patent No. 7,783,299 B2 (Ex.
`
`1001, “the ’299 patent”). Paper 1 (“Pet.”). Petitioner relies upon the
`
`following prior art references:
`
`July 1, 1999
`
`WO 99/33303
`
`Zell
`July 11, 2000
`Abbadessa U.S. Patent 6,088,587
`Havinis
`U.S. Patent 6,167,266 Dec. 26, 2000
`
`Ex. 10071
`Ex. 1011
`Ex. 1012
`
`TruePosition, Inc. (“Patent Owner”) timely filed a Patent Owner Preliminary
`
`Response. Paper 6 (“Prelim. Resp.”). On November 15, 2013, the Board
`
`instituted trial for claims 111–114 on the following grounds of
`
`unpatentability:
`
`Reference(s)
`
`Basis
`
`Claims Challenged
`
`Zell
`
`§ 102(b)
`
`Abbadessa and Havinis
`
`§ 103(a)
`
`111–114
`
`111–114
`
`Paper 9 (“Dec.”).
`
`After institution of trial, Patent Owner filed a Patent Owner Response.
`
`Paper 21 (“PO Resp.”). Petitioner subsequently filed a Reply to the
`
`Response. Paper 30 (“Reply”). Petitioner filed a Motion to Exclude (Paper
`
`39; “Pet. Mot.”), to which Patent Owner filed an Opposition (Paper 47; “PO
`
`
`
`1 Although Zell is Exhibit 1007, Zell is written in French. Accordingly, all
`citations to Zell in this Decision will be to Exhibit 1008, which is a certified
`English language translation of Zell.
`
`2
`
`

`

`IPR2013-00323
`Patent 7,783,299 B2
`
`Opp.”). Petitioner then filed a Reply (Paper 51; “Pet. Reply”). Patent
`
`Owner filed a Motion to Exclude (Paper 38; “PO Mot.”), to which Petitioner
`
`filed an Opposition (Paper 48; “Pet. Opp.”). Patent Owner then filed a
`
`Reply (Paper 50; “PO Reply”). An oral hearing was held on July 15, 2014.
`
`The transcript of the hearing has been entered into the record. Paper 61.
`
`We have jurisdiction under 35 U.S.C. § 6(c). This final written
`
`decision is issued pursuant to 35 U.S.C. § 318(a).
`
`Petitioner has shown by a preponderance of the evidence that claims
`
`111–114 of the ’299 patent are unpatentable.
`
`Petitioner’s Motion to Exclude is dismissed.
`
`Patent Owner’s Motion to Exclude is dismissed-in-part and denied-in-
`
`part.
`
`B.
`
`Related Proceedings
`
`Both Petitioner and Patent Owner indicate that the ’299 patent was
`
`asserted against Petitioner in a co-pending district court case captioned
`
`TruePosition, Inc. v. Polaris Wireless, Inc., Case No. 1:12-cv-00646
`
`(D. Del.). Pet. 3; Paper 23, 2.
`
`C.
`
`The ’299 patent
`
`The subject matter of the ’299 patent relates to locating wireless
`
`devices, also called mobile stations (“MS”), such as those used in analog or
`
`digital cellular systems, personal communications systems, enhanced
`
`specialized mobile radios, and other types of wireless communications
`
`systems. Ex. 1001, 1:23–28. The ’299 patent discloses that wireless
`
`location systems have been installed in more than 40,000 Base Transceiver
`
`Stations (BTS), providing emergency location coverage for wireless
`
`3
`
`

`

`IPR2013-00323
`Patent 7,783,299 B2
`
`subscribers across the continental United States. Ex. 1001, 1:62–67.
`
`According to the ’299 patent, widespread deployment of these systems can
`
`reduce emergency response time, save lives, and save enormous costs
`
`because of the reduced use of emergency response resources. Ex. 1001, 2:6–
`
`9. In addition, the ’299 patent discloses that surveys and studies have
`
`concluded that various wireless applications, such as location sensitive
`
`billing, fleet management, and others, will have great commercial value in
`
`coming years. Ex. 1001, 2:9–12.
`
`Early work related to wireless location systems used time difference
`
`of arrival techniques to locate cellular telephones. Ex. 1001, 1:39–43. Over
`
`time, the cellular industry has increased the number of air interface protocols
`
`available for use by wireless telephones, increased the number of frequency
`
`bands in which wireless or mobile telephones may operate, and expanded
`
`the number of terms that refer or relate to mobile telephones to include
`
`“personal communications services,” “wireless,” and others. Ex. 1001,
`
`1:51–57.
`
`Air interface protocols use two categories of channels, where a
`
`channel is defined as one of multiple transmission paths within a single link
`
`between points in a wireless network. Ex. 1001, 2:19–22. A channel may
`
`be defined by frequency, by bandwidth, by synchronized time slots, by
`
`encoding, by shift keying, by modulation scheme, or by any combination of
`
`these parameters. Ex. 1001, 2:22–24. The first channel category, called a
`
`control or access channel, is used to convey information about the wireless
`
`telephone or transmitter, for initiating or terminating calls, or for transferring
`
`intermittent data. Ex. 1001, 2:25–28. The second channel category, known
`
`4
`
`

`

`IPR2013-00323
`Patent 7,783,299 B2
`
`as a voice or traffic channel, typically conveys voice or data
`
`communications over an air interface. Ex. 1001, 2:33–35.
`
`There are some difficulties in integrating wireless location services
`
`with certain air interface protocols. For example, one protocol, Code-
`
`Division Multiple Access (“CDMA”), uses both frequency and code
`
`separation. Ex. 1001, 3:7–9. Because adjacent cell sites may use the same
`
`frequency sets, CDMA must operate under very careful power control,
`
`producing a situation known to those skilled in the art as the near-far
`
`problem, making it difficult for most methods of wireless location to achieve
`
`an accurate location. Ex. 1001, 3:9–13. In another example, networks that
`
`use Global System for Mobile Communications (“GSM”) protocol also
`
`present a number of potential problems to existing wireless location systems.
`
`Ex. 1001, 4:8–9. GSM networks use encryption on the traffic channel and
`
`use temporary nicknames (Temporary Mobile Station Identifiers (TMSID))
`
`for security reasons, making it difficult to identify properly a desired MS in
`
`order to trigger or task wireless location systems. Ex. 1001, 4:11–15.
`
`Furthermore, an MS connected to GSM networks does not transmit signals
`
`to regional receivers except during call setup, voice/data operation, and call
`
`breakdown, reducing the number of opportunities to detect the MS.
`
`Ex. 1001, 4:15–21.
`
`To solve these and other problems, methods and systems are disclosed
`
`that are employed by a wireless location system (WLS) for locating a
`
`wireless device operating in a geographic area served by a wireless
`
`communications system. Ex. 1001, 4:39–42. According to the ’299 patent,
`
`an exemplary method includes monitoring a set of signaling links of a
`
`5
`
`

`

`IPR2013-00323
`Patent 7,783,299 B2
`
`wireless communications system, and detecting at least one predefined
`
`signaling transaction occurring on at least one predefined signaling link.
`
`Ex. 1001, 4:42–46. Some examples of predefined signaling transactions are
`
`a called-number trigger, idle mobile location trigger, lists of all mobile
`
`devices recently in set of cells trigger, background location of all subscribers
`
`in set of cells trigger, and smart proximity identification trigger. Ex. 1001,
`
`4:66–5:4. “Then, in response to the detection of the at least one predefined
`
`network transaction, at least one predefined location service is triggered.”
`
`Ex. 1001, 4:46–48.
`
`D.
`
`Illustrative Claim
`
`Each of claims 111 to 114 is an independent claim. Independent
`
`claim 111 is reproduced as follows:
`
`111. A method for use by a wireless location system
`(WLS) for locating a wireless device operating in a geographic
`area served by a wireless communications system, comprising:
`monitoring a set of predefined signaling links of the
`wireless communications system, wherein said predefined
`signaling links include at least an Abis link between a base
`transceiver station (BTS) and a base station controller (BSC),
`wherein said monitoring comprises passively monitoring said
`set of predefined links such that the operation of said wireless
`device and said wireless communications system is unaffected
`by said monitoring;
`detecting at least one predefined network transaction
`involving a predefined trigger occurring on said Abis link,
`wherein said predefined network transaction comprises at least
`one of a mobile origination
`transaction and a mobile
`termination transaction; and
`
`6
`
`

`

`IPR2013-00323
`Patent 7,783,299 B2
`
`
`in response to the detection of said at least one
`predefined network transaction involving a predefined trigger,
`initiating at least one predefined location service.
`
`Ex. 1001, 49:47–66.
`
`II.
`
`ANALYSIS
`
`For the challenged claims, Petitioner has to prove unpatentability by a
`
`preponderance of the evidence. 35 U.S.C. § 316(e). In patent law, “the
`
`name of the game is the claim.” In re Hiniker Co., 150 F.3d 1362, 1369
`
`(Fed. Cir. 1998). Therefore, we begin with claim construction, and then
`
`follow with specific analysis of the prior art.
`
`A.
`
`Claim Construction
`
`In an inter partes review, claim terms in an unexpired patent are
`
`interpreted according to their broadest reasonable construction in light of the
`
`specification of the patent in which they appear. 37 C.F.R. § 42.100(b);
`
`Office Patent Trial Practice Guide, 77 Fed. Reg. 48,756, 48,766 (Aug. 14,
`
`2012). Under the broadest reasonable construction standard, claim terms are
`
`given their ordinary and customary meaning, as would be understood by one
`
`of ordinary skill in the art in the context of the disclosure. In re Translogic
`
`Tech., Inc., 504 F.3d 1249, 1257 (Fed. Cir. 2007).
`
`1.
`
`Trigger
`
`Each of claims 111 to 114 recites some form of trigger. For example,
`
`independent claims 111 and 113 each recite “predefined trigger,” and
`
`independent claims 112 and 114 each recite “dialed digit trigger” and
`
`“Mobile Station Identification (MSID) trigger.” Petitioner proposes
`
`construing “trigger” as “an indicium . . . that directly and but-for causes an
`
`action.” Pet. 15. Patent Owner proposes construing “trigger” as limited to
`
`7
`
`

`

`IPR2013-00323
`Patent 7,783,299 B2
`
`“location services,” because the claim context and Specification limit
`
`“triggers” to “location triggers.” PO Resp. 5–6. Petitioner counters that
`
`adopting Patent Owner’s construction would render, improperly, superfluous
`
`“initiating at least one predefined location service,” as recited in each of
`
`claims 111–114. Reply 1.
`
`The Specification discloses the following concerning “trigger”:
`
`More particularly, but not exclusively, the present invention
`relates to the use of prescribed network message sequences in
`initiating, or triggering, location-based service applications
`and re-use of existing radio interface parameters within such
`message sequences to provide low-accuracy location or to allow
`tuning of specialized receivers for high accuracy location for a
`particular subscriber.
`
`Ex. 1001, 1:28–35 (emphasis added).
`
`The use of encryption on the traffic channel and the use of
`temporary nicknames (Temporary Mobile Station Identifiers
`(TMSID)) for security render radio network monitors of limited
`usefulness for triggering or tasking wireless location systems.
`
`Ex. 1001, 4:11–15 (emphasis added).
`
`For example, while [U.S. Patent No. 6,782,264] describes a
`system
`that monitors communications between a base
`transceiver station and base station controller, and forwards
`mobile station (MS) information to a Wireless Location System
`for emergency call location, the advanced location-based
`services applications described herein utilize additional network
`messages as triggering events and information sources for a
`wide variety of location-based services.
`
`Ex. 1001, 7:46–53 (emphasis added).
`
`The following procedures are used for location triggering
`by the Radio Network Monitor (RNM) and/or Link Monitoring
`System (LMS). A trigger for wireless location consists of a
`transaction and a filter. If a transaction occurs and the filtering
`
`8
`
`

`

`IPR2013-00323
`Patent 7,783,299 B2
`
`
`matches, then a location trigger is generated. Each procedure
`contains the messaging needed for determination if a potential
`location-triggering event has occurred. The description of each
`message includes the fields for filtering by the preset rules for
`positive determination of the occurrence of a location trigger.
`
`Ex. 1001, 13:6–15 (emphases added). Any of the above-described
`
`three types of triggers can be set to cause (trigger) a location
`
`estimation procedure. Ex. 1001, 22:64–66. The Specification then
`
`discloses the following concerning the content of a trigger:
`
`Advanced triggers allow for radio or network events
`(corresponding to specific messages or groups of messages
`detectable by the LMS 11 or RNM 82) to generate high and low
`accuracy location estimates. A triggering event, one that
`initiates a location estimation, may be a detection of a
`particular message or a field within a specific message.
`
`Ex. 1001, 26:36–42 (emphases added). Based on the above, we construe
`
`“trigger” as “an event, message, message field, or message sequence
`
`sufficient to initiate, cause, or task an action related to location-based
`
`services.” The “direct” and “but for” requirements in Petitioner’s proposed
`
`construction are not necessary to make sense of the claim, and are not
`
`required in the context of the Specification. Furthermore, the limiting of
`
`“trigger” to “location triggers” is appropriate in view of the fact that
`
`“trigger” is disclosed consistently in the Specification as being related to
`
`“location,” and does not render superfluous the “initiating” limitation, as a
`
`“trigger,” by itself, only need be capable of, but need not actually, “initiate”
`
`any action.
`
`9
`
`

`

`IPR2013-00323
`Patent 7,783,299 B2
`
`
`2.
`
`Network Transaction
`
`Each of claims 111 to 114 recites “network transaction.” Petitioner
`
`proposes that “network transaction” be construed as follows:
`
`“one or more messages on the signaling links of a network;” a
`genus that comprises the two subgenera: (i) Mobile Origination
`Transaction, and (ii) Mobile Termination Transaction, and the
`14 species transactions listed in Table 1 [at column 23] of the
`’299 Patent.
`
`Pet. 15. The Specification discloses the following concerning “network
`
`transaction”: “The term ‘transaction’ refers to a message or message
`
`sequence potentially useful to the advanced trigger invention.” Ex. 1001,
`
`12:66–67 (emphasis added). The Specification then discloses the following
`
`concerning the relationship between “network” and “transaction”:
`
`Advanced triggers allow for radio or network events
`(corresponding to specific messages or groups of messages
`detectable by the LMS 11 or RNM 82) to generate high and low
`accuracy location estimates. A triggering event, one that
`initiates a location estimation, may be a detection of a particular
`message or a field within a specific message. Network events
`(also called network
`transactions)
`include: (1) Mobile
`originations/terminations; (2) SMS originations/terminations;
`(3) GPRS Mobile Attach/Detach events; (4) Location/ Routing
`Update (that is, a GSM “location” update for the purposes of
`mobility and roaming as opposed to a U-TDOA location event);
`(5) Handovers; and (6) Call Releases.
`
`Ex. 1001, 26:36–47 (emphases added). We construe “network transaction”
`
`as “a message, message sequence, or group of messages detectable by a
`
`network.” Petitioner’s construction is overly restrictive. No persuasive
`
`reasoning is provided as to why the term must be regarded as a particular
`
`genus, especially a genus that includes a combination of species.
`
`10
`
`

`

`IPR2013-00323
`Patent 7,783,299 B2
`
`
`3. Mobile Origination Transaction
`
`Independent claims 111 and 113 each recite “mobile origination
`
`transaction.” Petitioner proposes that “mobile origination transaction” be
`
`construed as follows:
`
`a subgenus of ‘network transaction[’;] a genus that consists of
`exactly the three species: Mobile Originated Call Placed,
`Mobile Originated SMS Sent, and Mobile Originated Call
`Disconnect.
`
`Pet. 16. The Specification sets forth an explicit definition of “mobile
`
`origination” as follows: “Mobile Origination is the act of a mobile device
`
`placing a call to the wireless network to begin a conversation or data
`
`session.” Ex. 1001, 23:31–33. Independent claims 111 and 113 recite that
`
`“mobile origination transaction” is a type of “network transaction.”
`
`Accordingly, we construe “mobile origination transaction” as “a message,
`
`message sequence, or group of messages that are detectable by a network,
`
`and correspond to the act of a mobile device placing a call to the wireless
`
`network to begin a conversation or data session.”
`
`Petitioner’s construction is overly restrictive. No persuasive
`
`reasoning is provided as to why the term must be regarded as a particular
`
`genus, especially a genus that includes a precise number of species.
`
`4. Mobile Termination Transaction
`
`Independent claims 111 and 113 each recite “mobile termination
`
`transaction.” Petitioner proposes that “mobile termination transaction” be
`
`construed as follows:
`
`subgenus of ‘network transaction[’;] a genus that consists of
`exactly the three species: Mobile Terminated Call Received,
`
`11
`
`

`

`IPR2013-00323
`Patent 7,783,299 B2
`
`
`Mobile Terminated SMS Received, and Mobile Terminated
`Call Disconnect.
`
`Pet. 16. The Specification sets forth an explicit definition of “mobile
`
`termination” as follows: “Mobile termination is the act of a mobile device
`
`receiving a call from the wireless network to begin a conversation or data
`
`session.” Ex. 1001, 24:62–64. Independent claims 111 and 113 recite that
`
`“mobile termination transaction” is a type of “network transaction.”
`
`Accordingly, we construe “mobile termination transaction” as “a message,
`
`message sequence, or group of messages that are detectable by a network,
`
`and correspond to the act of a mobile device receiving a call from the
`
`wireless network to begin a conversation or data session.”
`
`Petitioner’s construction is overly restrictive. No persuasive
`
`reasoning is provided as to why the term must be regarded as a particular
`
`genus, especially a genus that includes a precise number of species.
`
`5. Means for Monitoring
`
`Independent claims 113 and 114 each recite “means for monitoring a
`
`set of predefined signaling links of the wireless communications system . . .
`
`wherein said monitoring comprises passively monitoring said set of
`
`predefined links such that the operation of said wireless device and said
`
`wireless communications system is unaffected by said monitoring”
`
`(hereafter “means for monitoring”). Petitioner asserts that the recited
`
`“means for monitoring” should be construed in accordance with 35 U.S.C.
`
`§ 112, sixth paragraph, and that the corresponding structure disclosed in the
`
`Specification for the recited “means” is a computer (Link Monitoring
`
`System 11) programmed to perform the recited “monitoring” function.
`
`Petitioner also asserts that because the recited function is not described in
`12
`
`

`

`IPR2013-00323
`Patent 7,783,299 B2
`
`the Specification as implemented by a computer without software, but
`
`instead by software implemented on a general purpose computer, the
`
`corresponding structure under § 112, sixth paragraph, is not the general
`
`purpose computer, but any disclosed algorithm for performing the claimed
`
`function. Aristocrat Techs. Australia Pty Ltd. v. Int’l Game Tech., 521 F.3d
`
`1328, 1333 (Fed. Cir. 2008) (“computer-implemented means-plus-function
`
`term is limited to the corresponding structure disclosed in the specification
`
`and equivalents thereof, and the corresponding structure is the algorithm”
`
`(quoting Harris Corp. v. Ericsson Inc., 417 F.3d 1241, 1253 (Fed. Cir.
`
`2005)) (internal quotation marks omitted)). The algorithm may be expressed
`
`“in any understandable terms including as a mathematical formula, in prose,
`
`or as a flow chart, or in any other manner that provides sufficient structure.”
`
`Typhoon Touch Techs., Inc. v. Dell, Inc., 659 F.3d 1376, 1385 (Fed. Cir.
`
`2011) (quoting Finisar Corp. v. DirecTV Grp., Inc., 523 F.3d 1323, 1340
`
`(Fed. Cir. 2008)) (internal quotation marks omitted). Petitioner contends
`
`that the Specification does not disclose any algorithm for performing the
`
`recited “monitoring” function. Pet. 10–15; Reply 4.
`
`Independent claims 113 and 114 each further define the recited
`
`“monitoring” function as follows: “wherein said monitoring comprises
`
`passively monitoring said set of predefined links such that the operation of
`
`said wireless device and said wireless communications system is unaffected
`
`by said monitoring.”
`
`13
`
`

`

`IPR2013-00323
`Patent 7,783,299 B2
`
`
`The Specification further discloses the following concerning
`
`“monitoring”:
`
`As described in U.S. Pat. No. 6,782,264, it is possible to
`monitor the base transceiver station (BTS) to base station
`controller (BSC) link (e.g., the Abis link) for triggering
`messages and information fields. A passive network monitor,
`called the AMS (Abis Monitoring System) in the ’264 patent
`and exemplified by monitoring the GSM Abis interface, has
`been extended in accordance with the present invention and is
`now called the Link Monitoring System, or LMS. The Link
`Monitoring System (LMS) can monitor multiple cellular
`network data links simultaneously, scanning for data of
`interest, and can detect particular messages or data fields within
`messages. Setting or tasking of messages or data fields of
`interest can take place at any time.
`
`Ex. 1001, 10:32–44 (emphases added).
`
`The Link Monitoring System allows for passive, non-
`intrusive monitoring of, for example, the GSM, GSM-R, GPRS,
`and UTMS systems. In the exemplary case of a GSM system,
`the LMS can passively receive data streams from the Abis
`(BTS-BSC) interface, the A (BSC-MSC) interface, and the
`GSM MAP interface (MSC-HLR, MSC-GMLC, MSC-GMSC
`and MSC-gsmSCF). The term GSM MAP (where MAP stands
`for Mobile Application Part) is used to refer to the global SS7
`network and includes the C, D, E, F, H, Gc, Gf, Gr, Lh, and Lg
`interfaces.
`
`In the exemplary case of a GPRS system, the LMS can
`passively receive data streams from the Abis (BTS-BSC or
`BTS-PCU) interface, the Gb (PCU-SGSN) interface, and the
`GSM MAP interface (SGSN-HLR, SGSN-GMLC and SGSN-
`gsmSCF). In the exemplary case of a UMRS system, the LMS
`can passively receive data streams from the Iub (Node B-RNC)
`interface, the Iu-CS (RNC-MSC) interface, the Iu-PS (RNC-
`SGSN) interface, and the GSM MAP interface (MSC-HLR,
`
`14
`
`

`

`IPR2013-00323
`Patent 7,783,299 B2
`
`
`MSC-GMLC and MSC-gsmSCF, SGSN-HLR, SGSN-GMLC
`and SGSN-gsmSCF).
`
`The LMS can search received data for particular
`messages or data fields within messages. Setting or tasking of
`messages or data fields of interest can take place at any time.
`
`Ex. 1001, 11:5–27 (emphases added). We discern the following algorithm
`
`from the aforementioned portions of claims 113 and 114, and the
`
`Specification: (1) passively receive data streams from a set of predefined
`
`links such that the operation of said wireless device and said wireless
`
`communications system is unaffected; and (2) scan or search the data
`
`streams for data of interest, such as particular messages or data fields within
`
`messages. Finisar Corp. v. DirectTV Grp., Inc., 523 F.3d 1323, 1340 (Fed.
`
`Cir. 2008) (the algorithm may be expressed in “any understandable terms
`
`including as a mathematical formula, in prose, or as a flow chart, or in any
`
`other manner that provides sufficient structure” (citations omitted)).
`
`Accordingly, we construe the recited “means for monitoring” as
`
`corresponding to a computer that implements the aforementioned algorithm.
`
`6. Means for Detecting
`
`Independent claims 113 and 114 each recite “means for detecting at
`
`least one predefined network transaction involving a predefined trigger
`
`occurring on at least one of said predefined signaling links” (hereafter
`
`“means for detecting”). Petitioner asserts that the recited “means for
`
`detecting” should be construed in accordance with 35 U.S.C. § 112, sixth
`
`paragraph, and that the corresponding structure for the recited “means”
`
`should be an algorithm disclosed in the Specification for performing the
`
`recited “detecting” function implemented on a computer (Link Monitoring
`
`15
`
`

`

`IPR2013-00323
`Patent 7,783,299 B2
`
`System 11). Petitioner contends that the Specification does not disclose any
`
`algorithm for performing the recited “detecting” function. Pet. 10–15;
`
`Reply 4.
`
`The Specification discloses the following concerning “detecting”:
`
`The Link Monitoring System (LMS) can monitor multiple
`cellular network data links simultaneously, scanning for data of
`interest, and can detect particular messages or data fields
`within messages. Setting or tasking of messages or data fields
`of interest can take place at any time. When a match occurs,
`the LMS may be further triggered to perform a pre-set action,
`such as a write to storage memory or forwarding of the
`triggering message and (or) data fields to another system node.
`
`Ex. 1001, 10:39–47 (emphases added).
`
`The LMS can search received data for particular
`messages or data fields within messages. Setting or tasking of
`messages or data fields of interest can take place at any time.
`When a match occurs, the LMS is further triggered to perform a
`pre-set action, normally a write to storage memory or
`forwarding of the triggering message and (or) data fields to
`another system node.
`
`Ex. 1001, 11:25–32 (emphasis added).
`
`The term “filter” refers to pre-set rules in the LMS for analysis
`of the monitored data within the transaction. Filters can
`include MS identification, cell identification, location area
`codes, or differences between the monitored and expected pre-
`set information.
`
`Ex. 1001, 13:1–5 (emphasis added). We discern the following algorithm
`
`from the aforementioned portions of the Specification: (1) setting a
`
`predefined trigger, the predefined trigger including particular messages or
`
`data fields within messages; and (2) matching or filtering-out a network
`
`transaction having the predefined trigger. Accordingly, we construe the
`
`16
`
`

`

`IPR2013-00323
`Patent 7,783,299 B2
`
`recited “means for detecting” as corresponding to a computer that
`
`implements the aforementioned algorithm.
`
`7. Means for Initiating
`
`Independent claims 113 and 114 each recite “means for initiating at
`
`least one predefined location service in response to the detection of said at
`
`least one predefined network transaction involving a predefined trigger”
`
`(hereafter “means for initiating”). Petitioner asserts that the recited “means
`
`for initiating” should be construed in accordance with 35 U.S.C. § 112, sixth
`
`paragraph, and that the corresponding structure for the recited “means”
`
`should be an algorithm disclosed in the Specification for performing the
`
`recited “initiating” function implemented on a computer (Link Monitoring
`
`System 11). Petitioner contends that the Specification does not disclose any
`
`algorithm for performing the recited “initiating” function. Pet. 10–15; Reply
`
`4.
`
`The Specification discloses the following concerning “initiating”:
`
`A triggering event, one that initiates a location estimation, may
`be a detection of a particular message or a field within a
`specific message.
`
`Ex. 1001, 26:39–42.
`
`A NULL value SMS may be sent to the mobile or the asset
`finder location services application can initiate an ATI message
`to the GMLC to initiate the location process.
`
`Ex. 1001, 28:50–53 (emphasis added).
`
`If the received LAI code differs from that stored on the SIM,
`then the MS has entered another location area and initiates a
`location update procedure to report the change to the Mobile
`Switching Center (MSC).
`
`Ex. 1001, 34:21–25 (emphasis added).
`
`17
`
`

`

`IPR2013-00323
`Patent 7,783,299 B2
`
`
`At step 842, the mobile can initiate a location update
`transaction with the wireless network. The LMS will detect the
`location update event at step 843 and will collect and deliver
`mobile identity data, the CGI, and RF channel to location to a
`location application, for example.
`
`Ex. 1001, 35:8–12 (emphases added).
`
`A mobile can then initiate a network transaction at step 920.
`The LMS can then detect the transaction at step 925 and collect
`the MSID, Cell, and radio information from the transaction
`messaging and store that information into memory at step 930.
`
`Ex. 1001, 42:37–41 (emphases added). We discern this algorithm from the
`
`aforementioned portions of the Specification: (1) collecting and storing
`
`device information; and (2) sending the device information to a location
`
`application. Accordingly, we construe the recited “means for initiating” as
`
`corresponding to a computer that implements the aforementioned algorithm.
`
`B.
`
`Principles of Law
`
`To establish anticipation, each and every element in a claim, arranged
`
`as recited in the claim, must be found in a single prior art reference.
`
`Net MoneyIN, Inc. v. VeriSign, Inc., 545 F.3d 1359, 1369 (Fed. Cir. 2008);
`
`Karsten Mfg. Corp. v. Cleveland Golf Co., 242 F.3d 1376, 1383 (Fed. Cir.
`
`2001). While the elements must be arranged or combined in the same way
`
`as in the claim, “the reference need not satisfy an ipsissimis verbis test,” i.e.,
`
`identity of terminology is not required. In re Gleave, 560 F.3d 1331, 1334
`
`(Fed. Cir. 2009); In re Bond, 910 F.2d 831, 832 (Fed. Cir. 1990). “A
`
`reference anticipates a claim if it discloses the claimed invention such that a
`
`skilled artisan could take its teachings in combination with his own
`
`knowledge of the particular art and be in possession of the invention.” In re
`
`18
`
`

`

`IPR2013-00323
`Patent 7,783,299 B2
`
`Graves, 69 F.3d 1147, 1152 (Fed. Cir. 1995) (quoting In re LeGrice, 301
`
`F.2d 929, 936 (CCPA 1962)) (internal quotation marks and emphasis
`
`omitted). In the context of anticipation, “it is proper to take into account not
`
`only specific teachings of the reference but also the inferences which one
`
`skilled in the art would reasonably be expected to draw therefrom.” In re
`
`Preda, 401 F.2d 825, 826 (CCPA 1968).
`
`Similarly, an obviousness analysis “need not seek out precise
`
`teachings directed to the specific subject matter of the challenged claim, for
`
`a court can take account of the inferences and creative steps that a person of
`
`ordinary skill in the art would employ.” KSR Int’l Co. v. Teleflex Inc., 550
`
`U.S. 398, 418 (2007). A prima facie case of obviousness is established
`
`when the prior art itself would appear to have suggested the claimed subject
`
`matter to a person of ordinary skill in the art. In re Rinehart, 531 F.2d 1048,
`
`1051 (CCPA 1976). The level of ordinary skill in the art may be reflected
`
`by the prior art of record. See Okajima v. Bourdeau, 261 F.3d 1350, 1355
`
`(Fed. Cir. 2001); In re GPAC Inc., 57 F.3d 1573, 1579 (Fed. Cir. 1995); In
`
`re Oelrich, 579 F.2d 86, 91 (CCPA 1978).
`
`We analyze the instituted grounds of unpatentability in accordance
`
`with the above-stated principles.
`
`C.
`
`Alleged Anticipation by Zell
`
`Petitioner asserts that claims 111–114 are unpatentable under
`
`35 U.S.C. § 102(b) as anticipated by Zell, and relies on Declarations of
`
`Dr. Tarun Kumar Bhattacharya. Pet. 35–41; Reply 4–12 (citing Exs. 1005,
`
`1037). Patent Owner disagrees with Petitioner’s assertions, and relies on the
`
`Declaration of Dr. Oded Gottesman. PO Resp. 6–29 (citing Ex. 2014).
`
`19
`
`

`

`IPR2013-00323
`Patent 7,783,299 B2
`
`
`1. Whether Zell is Prior Art
`
`Zell has a publication date of July 1, 1999. The ’299 patent issued
`
`from U.S. Patent Application No. 11/150,414 (Ex. 1034, “the ’414
`
`application”), which has a filing date of June 10, 2005. Patent Owner asserts
`
`that Zell is not prior art to claims 111–114 of the ’299 patent under
`
`35 U.S.C. § 102(b), because claims 111–114 claim

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket