throbber
Trials@uspto.gov
`571-272-7822
`
`Paper 42
`Entered: September 13, 2016
`
`
`
`
`
`
`
`UNITED STATES PATENT AND TRADEMARK OFFICE
`____________
`
`BEFORE THE PATENT TRIAL AND APPEAL BOARD
`____________
`
`KAPSCH TRAFFICCOM IVHS INC. and
`KAPSCH TRAFFICCOM HOLDING CORP.,
`Petitioner,
`
`v.
`
`NEOLOGY, INC.,
`Patent Owner.
`____________
`
`Case IPR2015-00819
`Patent 8,325,044 B2
`____________
`
`
`
`Before JUSTIN T. ARBES, GLENN J. PERRY, and
`TREVOR M. JEFFERSON, Administrative Patent Judges.
`
`ARBES, Administrative Patent Judge.
`
`
`
`FINAL WRITTEN DECISION
`35 U.S.C. § 318(a) and 37 C.F.R. § 42.73
`
`

`
`IPR2015-00819
`Patent 8,325,044 B2
`
`
`I. BACKGROUND
`
`Petitioners Kapsch TrafficCom IVHS Inc. and Kapsch TrafficCom
`
`Holding Corp. (collectively, “Petitioner”)1 filed a Petition (Paper 1, “Pet.”)
`
`seeking inter partes review of claims 1–26 of U.S. Patent No. 8,325,044 B2
`
`(Ex. 1004, “the ’044 patent”) pursuant to 35 U.S.C. §§ 311–319. On
`
`September 14, 2015, we instituted an inter partes review of claims 1–3,
`
`7–12, 16–20, 23, and 24 on three grounds of unpatentability (Paper 13,
`
`“Dec. on Inst.”). Patent Owner Neology, Inc. filed a Patent Owner Response
`
`(Paper 23, “PO Resp.”), and Petitioner filed a Reply (Paper 31, “Reply”).2
`
`A combined oral hearing with Case IPR2015-008183 was held on May 10,
`
`2016, and a transcript of the hearing is included in the record (Paper 41,
`
`“Tr.”). We have jurisdiction under 35 U.S.C. § 6. This final written
`
`decision is issued pursuant to 35 U.S.C. § 318(a) and 37 C.F.R. § 42.73. For
`
`the reasons that follow, we determine that Petitioner has shown by a
`
`preponderance of the evidence that claims 1–3, 7–12, 16–20, 23, and 24 are
`
`unpatentable.
`
`
`1 The original Petitioners were Kapsch TrafficCom IVHS Inc., Kapsch
`TrafficCom IVHS Holding Corp., Kapsch TrafficCom IVHS Technologies
`Holding Corp., Kapsch TrafficCom U.S. Corp., and Kapsch TrafficCom
`Holding Corp. During trial, Kapsch TrafficCom IVHS Holding Corp.,
`Kapsch TrafficCom IVHS Technologies Holding Corp., and Kapsch
`TrafficCom U.S. Corp. merged with Kapsch TrafficCom Holding Corp.
`See Papers 1, 34, 35.
`
`2 Petitioner filed redacted (Paper 33) and unredacted (Paper 31) versions of
`its Reply and other materials, along with two motions to seal, which were
`conditionally granted. See Papers 29, 34. We do not rely on any sealed
`material in this Decision.
`
`3 The ’044 patent and U.S. Patent No. 8,587,436 B2, which was challenged
`in Case IPR2015-00815, are continuations of U.S. Patent No. 8,237,568 B2
`(“the ’568 patent”), which is being challenged in Case IPR2015-00818.
`
`
`
`
`2
`
`
`
`

`
`IPR2015-00819
`Patent 8,325,044 B2
`
`
`A. The ’044 Patent
`
`The ’044 patent describes a system for “verifying and tracking
`
`identification information” using “a radio frequency (RF) identification
`
`device, an identification mechanism (e.g., a card, sticker), and an RF
`
`reader/writer.” Ex. 1004, col. 1, ll. 32–46. The system facilitates electronic
`
`identification by reading data stored on the RF device (without having to
`
`contact the device) and verifying the data against known identification
`
`information. Id. at col. 2, ll. 30–57. The system also provides security by
`
`checking and validating security keys stored on the RF device before reading
`
`the data. Id. The ’044 patent explains that the system can be used in a
`
`number of different applications, such as for “vehicle identification,”
`
`“border crossing solutions,” or “toll booths.” Id. at col. 10, ll. 20–62, Fig. 4.
`
`Figure 2 of the ’044 patent is reproduced below.
`
`
`
`
`3
`
`
`
`
`
`

`
`IPR2015-00819
`Patent 8,325,044 B2
`
`As shown in Figure 2, dual frequency RF device 110 comprises modulator
`
`215 that receives baseband signals from an antenna, security management
`
`unit 255, cryptographic block 210, and electrically erasable programmable
`
`read-only memory (EEPROM) memory 205 that stores data. Id. at col. 2,
`
`ll. 30–57, col. 20, ll. 42–51. RF device 110 receives security keys from an
`
`RF reader, and security management unit 255 “checks and validates” the
`
`keys to “grant or deny access to the memory chip.” Id. at col. 2, ll. 51–55.
`
`
`
`B. Illustrative Claim
`
`Challenged claims 1, 10, 19, and 23 are independent. Claims 1 and 10
`
`recite limitations from the perspective of a radio-frequency identification
`
`(RFID) reader, whereas claims 19 and 23 recite limitations from the
`
`perspective of an RFID transponder. Claims 1 and 19 of the ’044 patent
`
`recite:
`
`1. A method for granting access to memory contents of
`an RFID transponder, the memory contents including an
`identifier, comprising:
`
`sending a first communication to the RFID transponder;
`
`the RFID
`to
`second communication
`sending a
`transponder that includes a security key for validation by the
`RFID transponder;
`
`receiving at least the identifier included in the memory
`contents in response to the second communication and as a
`result of validation of the security key; and
`
`comparing the identifier to an identifier stored in a
`database to determine if the two identifiers are related.
`
`19. A method for granting access to memory contents of
`an RFID transponder, the memory contents including an
`identifier, comprising:
`
`receiving a first communication from a RFID reader;
`
`
`
`
`4
`
`
`
`

`
`IPR2015-00819
`Patent 8,325,044 B2
`
`
`receiving a second communication from the RFID reader
`that includes a security key;
`
`granting access to the memory contents based on the
`security key; and
`
`sending at least the identifier included in the memory
`contents in response to the second communication.
`
`
`
`C. Prior Art
`
`The pending grounds of unpatentability in the instant inter partes
`
`review are based on the following prior art:
`
`U.S. Patent No. 5,627,544,
`(Ex. 1006, “Snodgrass”);
`
`issued May 6, 1997
`
`U.S. Patent No. 5,819,234, issued Oct. 6, 1998 (Ex. 1007,
`“Slavin”); and
`
`Publication
`Application
`Patent
`European
`No. EP 0762332 A2, published Mar. 12, 1997 (Ex. 1009,
`“Hurta”).
`
`
`
`D. Pending Grounds of Unpatentability
`
`The instant inter partes review involves the following grounds of
`
`unpatentability:
`
`Reference(s)
`
`Snodgrass
`
`Slavin and Snodgrass
`
`Hurta
`
`Basis
`
`Claims
`
`35 U.S.C. § 102(b) 19, 20, 23, and 24
`
`35 U.S.C. § 103(a) 1–3, 7–12, 16–20,
`23, and 24
`
`35 U.S.C. § 102(b) 1–3, 7, 10–12, 16,
`19, 20, 23, and 24
`
`
`
`5
`
`
`
`
`
`
`

`
`IPR2015-00819
`Patent 8,325,044 B2
`
`
`II. ANALYSIS
`
`A. Claim Interpretation
`
`The Board interprets claims using the “broadest reasonable
`
`construction in light of the specification of the patent in which [they]
`
`appear[].” 37 C.F.R. § 42.100(b); Cuozzo Speed Techs., LLC v. Lee,
`
`136 S. Ct. 2131, 2144–46 (2016) (upholding the use of the broadest
`
`reasonable interpretation standard as the claim interpretation standard to be
`
`applied in inter partes reviews). Under this standard, we interpret claim
`
`terms using “the broadest reasonable meaning of the words in their ordinary
`
`usage as they would be understood by one of ordinary skill in the art, taking
`
`into account whatever enlightenment by way of definitions or otherwise that
`
`may be afforded by the written description contained in the applicant’s
`
`specification.” In re Morris, 127 F.3d 1048, 1054 (Fed. Cir. 1997).
`
`We presume that claim terms have their ordinary and customary meaning.
`
`See Trivascular, Inc. v. Samuels, 812 F.3d 1056, 1062 (Fed. Cir. 2016)
`
`(“Under a broadest reasonable interpretation, words of the claim must be
`
`given their plain meaning, unless such meaning is inconsistent with the
`
`specification and prosecution history.”); In re Translogic Tech., Inc.,
`
`504 F.3d 1249, 1257 (Fed. Cir. 2007) (“The ordinary and customary
`
`meaning is the meaning that the term would have to a person of ordinary
`
`skill in the art in question.” (internal quotation marks omitted)). A patentee,
`
`however, may rebut this presumption by acting as his or her own
`
`lexicographer, providing a definition of the term in the specification with
`
`“reasonable clarity, deliberateness, and precision.” In re Paulsen, 30 F.3d
`
`1475, 1480 (Fed. Cir. 1994).
`
`
`
`
`6
`
`
`
`

`
`IPR2015-00819
`Patent 8,325,044 B2
`
`
`1. “Security Key”
`
`In the Decision on Institution, we interpreted “security key” in claims
`
`1, 10, 19, and 23 of the ’044 patent to mean a key that is checked and
`
`validated to grant or deny access to a memory, and encouraged the parties to
`
`address the term further during trial if necessary. Dec. on Inst. 6–7. The
`
`parties do not dispute this interpretation in their Patent Owner Response and
`
`Reply. See PO Resp. 12; Reply 7–8. We do not perceive any reason or
`
`evidence that compels any deviation from this interpretation. Accordingly,
`
`we adopt our previous analysis of “security key” for purposes of this
`
`Decision.
`
`
`
`2. Other Limitations
`
`In its Response, Patent Owner argues that various limitations
`
`pertaining to the “security key” should be interpreted as follows:
`
`Claim Term
`
`Proposed Interpretation
`
`1
`
`10
`
`19
`
`“receiving . . . memory
`contents . . . as a result of
`validation of the security
`key”
`
`“receive . . . memory
`contents . . . as a result of
`validation of the security
`key”
`
`“granting access to the
`memory contents based on
`the security key”
`
`being provided with protected
`information based on a key that
`is checked and validated to grant
`or deny access to the memory
`
`be provided with protected
`information based on a key that
`is checked and validated to grant
`or deny access to the memory
`
`providing the capability to read
`or write protected information
`based on a key that is checked
`and validated to grant or deny
`access to the memory
`
`
`
`
`7
`
`
`
`

`
`IPR2015-00819
`Patent 8,325,044 B2
`
`
`Claim Term
`
`23
`
`“grant access to the memory
`contents based on the
`security key”
`
`Proposed Interpretation
`
`provide the capability to read or
`write protected information
`based on a key that is checked
`and validated to grant or deny
`access to the memory
`
`PO Resp. 14–16.4 According to Patent Owner, granting access “based on”
`
`the security key means that “the tag’s decision to grant or deny access to the
`
`tag’s memory is made only after the processor has actually received the
`
`security key.” Id. at 19 (citing Ex. 2032 ¶ 146). Patent Owner argues that
`
`a [person of ordinary skill in the art] would understand that the
`security key is similar to a key that unlocks a door. Without the
`key the door is closed; and in the context of the ’044 Patent,
`without the security key, there is no access to any of the
`information in the memory which is protected by the security
`key. Thus, an RFID system in which a reader has the capability
`to read or write protected information to the chip’s memory
`prior to the chip’s processor having received, checked and
`validated the security key, would not meet the limitations of the
`Challenged Claims of the ’044 Patent.
`
`Id. at 15. Petitioner disagrees with various aspects of Patent Owner’s
`
`proposed interpretations, and argues that the phrases instead mean that
`
`“access to memory depends, in part, on the security key.” Reply 7–14,
`
`18–19 (emphasis omitted).
`
`
`4 With respect to the individual words of the phrases, Patent Owner argues
`that “grant access” (misquoted as “provide access”) means “provide the
`capability to read or write information,” and “memory” means an “area for
`storing computer instructions and data for either short-term or long-term
`purposes,” where “data” is “any information, represented in binary, that a
`computer receives, processes, or outputs.” PO Resp. 12–13. We address the
`individual words in our discussion of the full phrases herein.
`
`
`
`
`8
`
`
`
`

`
`IPR2015-00819
`Patent 8,325,044 B2
`
`
`Based on our review of the full record and the parties’ arguments, we
`
`are persuaded that Patent Owner’s proposed interpretations are too narrow,
`
`and incorrectly limit the claims in five respects. First, according to Patent
`
`Owner, access to the memory includes the ability to read from or write to the
`
`memory. PO Resp. 12–16. The claims, however, only recite information
`
`being provided from the memory contents of the RFID transponder to the
`
`RFID reader, not the RFID reader writing information to the memory. Thus,
`
`we do not include in our interpretations the concept of writing information to
`
`the memory.
`
`Second, Patent Owner appears to contend that access to the memory
`
`must be based only on checking and validating the security key (i.e., the
`
`system cannot check any other information). See id. at 15, 31–32 (arguing
`
`that Snodgrass does not teach the “granting access” limitations in claims 19
`
`and 23 because there are “several other parameters in addition to the
`
`arbitration number that must be checked”). We agree with Petitioner that the
`
`claim language is not limited in that respect. See Reply 18–19. Claim 19
`
`specifies that access to the memory contents (which include the identifier) is
`
`granted based on the security key. Claim 1 similarly recites receiving the
`
`identifier as a result of validation of the security key. Claims 10 and 23
`
`recite similar limitations. Thus, access to the memory contents is contingent
`
`on, or “based on,” the security key, which is a key that is checked and
`
`validated to grant or deny access to a memory. The claims do not include
`
`any language precluding other security checks from being performed as
`
`well. Based on Patent Owner’s locked door analogy quoted above, the
`
`parties discussed at the hearing that a door may have both a key lock and a
`
`deadbolt lock, but access to the house is still “based on” the physical key
`
`
`
`
`9
`
`
`
`

`
`IPR2015-00819
`Patent 8,325,044 B2
`
`matching the pins in the key lock. See PO Resp. 15; Tr. 9:8–18,
`
`45:12–46:13. We agree that the “based on” and “as a result of” language in
`
`the independent claims should be read the same way.
`
`Third, Patent Owner appears to argue that the claims require all data
`
`stored in memory to be “protected” by the security key (i.e., nothing in
`
`memory may be accessible without checking and validating the security
`
`key). See PO Resp. 15, 19–28 (arguing that “the tag’s decision to grant or
`
`deny access to the tag’s memory is made only after the processor has
`
`actually received the security key,” and Snodgrass does not teach the
`
`“granting access” limitations in claims 19 and 23 because the REVISION
`
`data field “is accessible to the reader without the reader providing an
`
`arbitration number” (emphasis omitted)). Interpreting the limitations cited
`
`above in the manner Patent Owner suggests would be inconsistent with the
`
`language of the claims. Dependent claim 4, for example, recites sending a
`
`third communication to the RFID transponder with a second security key
`
`and “receiving further memory contents . . . as a result of validation of the
`
`second security key.” See Reply 14; Tr. 13:21–14:4. Similarly, claim 21
`
`recites receiving a third communication with a second security key,
`
`“granting access to the memory based on the second security key,” and
`
`“sending further memory contents in response to the third communication.”
`
`Access to the portion of memory storing the “further memory contents” is
`
`granted based on the “second security key,” not based on the “security key”
`
`recited in the corresponding independent claims. Thus, the claims
`
`contemplate that there are certain portions of memory for which access is
`
`granted based on the security key, and certain portions of memory that may
`
`be accessed without checking and validating the security key. Patent Owner
`
`
`
`
`10
`
`
`
`

`
`IPR2015-00819
`Patent 8,325,044 B2
`
`agreed with this principle at the hearing. Tr. 52:9–20. Patent Owner’s
`
`declarant, Jack Goldberg, agreed as well. Ex. 1049, 56:12–57:4 (agreeing
`
`that “there may be some information [in memory] that’s protected by a
`
`security key and some information that’s not”). Accordingly, in the context
`
`of independent claims 1, 10, 19, and 23, granting access to the “memory
`
`contents” means providing the capability to read certain data stored in the
`
`memory.
`
`Fourth, Patent Owner contends that the “primary purpose” of the
`
`’044 patent (which allegedly distinguishes the claims from prior art
`
`references like Snodgrass) is to “provide security to the contents of a tag’s
`
`memory.” PO Resp. 7–8. Regardless of how the “primary purpose” of the
`
`challenged independent claims is characterized, their scope is defined by the
`
`language of the claims. The claims do not recite any encryption, and the
`
`“security” provided by virtue of the “security key” is based on what is
`
`recited expressly in the claims—validating the security key (claims 1 and
`
`10), and granting access to the memory contents based on the security key
`
`(claims 19 and 23). See Dec. on Inst. 6–7. This reading is supported by
`
`Patent Owner’s statements in a previous district court case involving related
`
`patents:
`
`THE COURT: What you are saying is that the communication
`isn’t encrypted, but isn’t the information in the reader and the
`tag encrypted?
`
`[PATENT OWNER’S COUNSEL]: I don’t believe so.
`
`THE COURT: Okay. So anybody who could figure out what’s
`going on between the reader and the tag could do this?
`
`[PATENT OWNER’S COUNSEL]: Yes.
`
`THE COURT: So how is it a security key?
`
`
`
`
`11
`
`
`
`

`
`IPR2015-00819
`Patent 8,325,044 B2
`
`
`[PATENT OWNER’S COUNSEL]: Well, it’s making sure that
`– that’s right. So it’s a low level of security potentially, if that’s
`the point. But it is making sure that I am talking to a reader
`that got my random number before I send it back. . . .
`
`Ex. 1031, 108:3–16 (emphasis added);5 see Reply 9–10. We do not read any
`
`additional “security” requirements into the claims.
`
`Fifth, Patent Owner contends that “[t]he claim language of the
`
`’044 Patent . . . clearly shows that singulation is not part of the inventions.”
`
`PO Resp. 8–11. Singulation is “a method utilized in an RFID system that
`
`allows an RFID reader to identify a specific tag within a group of tags in its
`
`RF field” and avoid collisions when multiple tags are “sending and receiving
`
`signals in the same shared frequency band . . . at the same time.” Id. at 8
`
`(citing Ex. 2032 ¶ 24); see also Ex. 1014 ¶ 45 (“The process of identifying a
`
`single tag is called ‘singulation.’”). Patent Owner argues that the
`
`embodiments described in the Specification of the ’044 patent involve a
`
`single tag within the field of a reader, claims 1 and 19 “grant access to one
`
`and only one RFID transponder,” claim 10 recites “communication with one
`
`and only one RFID transponder,” and claim 23 recites “a single RFID
`
`transponder.” PO Resp. 9–11. Thus, the claims “assume[]” that
`
`“singulation has already occurred prior to any exchange of protected
`
`information and prior to the transmission of any security key.” Id.
`
`(emphasis omitted). According to Patent Owner, prior art like Snodgrass,
`
`which is directed to “singulation” rather than “security,” does not disclose
`
`granting access to memory contents “as a result of validation of the security
`
`key” or “based on the security key,” as recited in the claims. Id. at 10–11.
`
`5 When citing Exhibits 1031 and 2022, we refer to the page numbers of the
`original transcript, rather than the page numbers in the lower-right corner
`added by the parties.
`
`
`
`
`12
`
`
`
`

`
`IPR2015-00819
`Patent 8,325,044 B2
`
`
`We do not read into the challenged independent claims any limitation
`
`with respect to singulation. Neither the claims nor the Specification mention
`
`the concept. The claims recite particular sets of steps or components that are
`
`configured to perform certain steps; if those limitations are present in the
`
`prior art, the prior art may render the claims anticipated or obvious,
`
`regardless of the ultimate purpose behind why the components are so
`
`configured (e.g., for singulation or any other function).6 We also disagree
`
`with Patent Owner that the claims are limited to “one and only one” RFID
`
`transponder. See id. at 9–10. Because the claims use the open-ended term
`
`“comprising,” the fact that they recite a single “RFID transponder” does not
`
`preclude the presence of additional RFID transponders. See Amgen Inc. v.
`
`Hoechst Marion Roussel, Inc., 314 F.3d 1313, 1344–45 (Fed. Cir. 2003)
`
`(“comprising” means that “the named elements are essential, but other
`
`elements may be added and still form a construct within the scope of the
`
`claim” (citation and internal quotation marks omitted)). Likewise,
`
`exemplary embodiments are described in the Specification with respect to
`
`one RF device communicating with one RF reader, but Patent Owner does
`
`not point to any language indicating that the invention is limited to
`
`communication with a single RF device. See, e.g., Ex. 1004, col. 2,
`
`ll. 22–57 (“This embodiment comprises an RF device 110 . . . and an RF
`
`reader/writer 125.”), col. 10, ll. 24–33. Thus, we do not interpret the claims
`
`
`6 Patent Owner cites the testimony of Petitioner’s declarant, Roger Stewart,
`as allegedly inconsistent with this reading, but the cited testimony pertains to
`the related ’568 patent, not the ’044 patent. See PO Resp. 10 n.2; Ex. 2022,
`204:19–205:8. Regardless, Mr. Stewart testified that although the
`’568 patent “wasn’t an anticollision patent, . . . the claims are broad enough
`to cover anticollision situations.” Ex. 2022, 204:19–205:8.
`
`
`
`
`13
`
`
`
`

`
`IPR2015-00819
`Patent 8,325,044 B2
`
`to exclude any use of the recited components for singulation, or any
`
`requirement that singulation already have occurred; the claims mean just
`
`what they say.
`
`Accordingly, applying the broadest reasonable interpretation of the
`
`claims in light of the Specification, we interpret the disputed limitations as
`
`follows:
`
`Claim Term
`
`Interpretation
`
`“receiving at least the
`identifier included in the
`memory contents . . . as a
`result of validation of the
`security key”
`
`“receive at least the
`identifier included in the
`memory contents . . . as a
`result of validation of the
`security key”
`
`“granting access to the
`memory contents based on
`the security key”
`
`“grant access to the memory
`contents based on the
`security key”
`
`being provided with the
`identifier included in the
`memory contents based on a key
`that is checked and validated to
`grant or deny access to the
`memory contents
`
`be provided with the identifier
`included in the memory contents
`based on a key that is checked
`and validated to grant or deny
`access to the memory contents
`
`providing the capability to read
`certain contents of the memory
`(i.e., at least the identifier) based
`on checking and validating the
`security key
`
`provide the capability to read
`certain contents of the memory
`(i.e., at least the identifier) based
`on checking and validating the
`security key
`
`1
`
`10
`
`19
`
`23
`
`
`
`B. Anticipation Ground Based on Snodgrass
`
`Petitioner argues that claims 19, 20, 23, and 24 are anticipated by
`
`Snodgrass under 35 U.S.C. § 102(b), relying on the supporting testimony of
`
`
`
`
`14
`
`
`
`

`
`IPR2015-00819
`Patent 8,325,044 B2
`
`Mr. Stewart. Pet. 10–14 (citing Ex. 1001). We have reviewed the Petition,
`
`Patent Owner Response, and Reply, as well as the evidence discussed in
`
`each of those papers, and are persuaded, by a preponderance of the evidence,
`
`that claims 19, 20, 23, and 24 are anticipated by Snodgrass.
`
`
`
`1. Snodgrass
`
`Snodgrass describes a messaging protocol for establishing RF
`
`communication between an interrogator and a particular responder from
`
`among a group of responders, such as in a baggage handling system in an
`
`airport terminal. Ex. 1006, col. 1, ll. 29–35. Figure 1 of Snodgrass is
`
`reproduced below.
`
`Figure 1 depicts commander station 10, which communicates wirelessly
`
`with a group of responder stations, including responder station 40. Id. at
`
`col. 5, ll. 41–53. Responder station 40 includes register array 66, memory
`
`64, flag register 84 (storing addressed-bit 86 and locked-bit 88), and random
`
`
`
`
`
`
`15
`
`
`
`

`
`IPR2015-00819
`Patent 8,325,044 B2
`
`number generator 90. Id. at col. 6, ll. 57–61, col. 7, ll. 40–47. “Memory 64
`
`is used to store values for responder station identification and data related to
`
`the communication system application,” such as, in the case of a baggage
`
`handling system, “data describing [the] destination for the item to which the
`
`tag is attached.” Id. at col. 7, ll. 12–19. Register array 66 stores additional
`
`data, such as a random number (designated as the ARBITRATION
`
`NUMBER) generated by random number generator 90. Id. at col. 7,
`
`ll. 21–30, 50–55. Addressed-bit 86 is set to “indicate whether responder
`
`station 40 has been addressed in a received command message,” and
`
`locked-bit 88 is set to “indicate whether responder station 40 should ignore
`
`messages from a commander station because responder station 40 has
`
`already announced its identification to a commander station.” Id. at col. 7,
`
`ll. 40–47.
`
`Snodgrass discloses a communication system protocol comprising
`
`various actions taken by the commander station, shown in Figure 10, and
`
`actions taken by the responder station, shown in Figure 11 reproduced
`
`below.
`
`
`
`
`16
`
`
`
`
`
`

`
`IPR2015-00819
`Patent 8,325,044 B2
`
`Figure 11 is a state diagram of the protocol followed by the responder
`
`station. Id. at col. 5, ll. 26–27, col. 12, ll. 30–38.
`
`The protocol begins by the commander station first broadcasting an
`
`“identify, clear, and generate” (IDCG) command to a group of responder
`
`stations. Id. at col. 13, ll. 40–45. The IDCG command causes each
`
`responder station to “generate a random number and retain it as its
`
`ARBITRATION NUMBER, and broadcast a response.” Id. at col. 13,
`
`ll. 45–48, col. 15, ll. 47–52, Fig. 11 (state 318). The IDR response from
`
`each responder station includes, inter alia, REVISION, LOCAL ID, and
`
`ARBITRATION NUMBER data fields. Id. at col. 12, ll. 5–21, col. 15,
`
`ll. 47–52, Figs. 8, 9 (format 192). REVISION is “a one-byte value set by a
`
`communication system developer at the time of manufacture or
`
`commissioning of a responder station,” and “represents the responder station
`
`configuration and connotes its capability.” Id. at col. 12, ll. 17–21. LOCAL
`
`ID is a “unique identification number assigned” to the commander station.
`
`Id. at col. 11, ll. 11–14.
`
`The commander station waits to receive responses and then
`
`determines whether a collision between multiple responses occurred. Id. at
`
`col. 13, ll. 51–57. If only one response was received, the commander station
`
`“determines and validates the responding responder station’s
`
`ARBITRATION NUMBER.” Id. at col. 14, ll. 7–13. The commander
`
`station then selects a command to communicate with the particular
`
`responder station, such as a read (RD) command, and broadcasts it to the
`
`responder stations. Id. at col. 14, 13–23. The RD command includes, inter
`
`alia, the ARBITRATION NUMBER identifying the responder station as the
`
`one that “should act on [the] command and should reply,” and causes the
`
`
`
`
`17
`
`
`
`

`
`IPR2015-00819
`Patent 8,325,044 B2
`
`responder station to set its locked-bit 88. Id. at col. 11, ll. 18–22, col. 14,
`
`ll. 13–23, Figs. 5, 6 (format 144).
`
`In response to receiving the RD command, the responder station
`
`determines whether it has been addressed by determining whether the
`
`ARBITRATION NUMBER stored in its register array is “bit-wise identical
`
`to [the] ARBITRATION NUMBER as received in the command.” Id. at
`
`col. 15, ll. 26–32, Fig. 11 (address check state 312). If so, the responder
`
`station responds with a message that includes, inter alia, its stored
`
`ARBITRATION NUMBER, TAG, and DATA. Id. at col. 12, ll. 5–29,
`
`Figs. 8, 9 (response format 194). TAG is a long value identifying the
`
`responder station “throughout the life of the communication system
`
`application,” whereas the ARBITRATION NUMBER is a short value
`
`identifying the responder station only for the period of time when it is in
`
`communication with a particular commander station. Id. at col. 11,
`
`ll. 22–33. DATA includes data stored in various memory devices in the
`
`responder station, and may include “some or all of the contents of any or all
`
`devices including memory 64, register array 66, flag register 84, or random
`
`number generator 90.” Id. at col. 7, ll. 13–20, col. 12, ll. 26–29. Once the
`
`commander station receives a proper response to the RD command, “two
`
`party uninterrupted communication between commander station 10 and one
`
`responder station 60 has been established.” Id. at col. 14, ll. 23–30.
`
`
`
`2. Analysis
`
`Petitioner has presented evidence showing that Snodgrass discloses
`
`every limitation of claims 19, 20, 23, and 24. Pet. 10–14. With respect to
`
`claim 19, Petitioner argues that Snodgrass discloses an “RFID transponder”
`
`
`
`
`18
`
`
`
`

`
`IPR2015-00819
`Patent 8,325,044 B2
`
`(i.e., responder station) receiving a “first communication” (i.e., IDCG
`
`command) and a “second communication” (i.e., RD command) that includes
`
`a “security key” (i.e., arbitration number), granting access to memory
`
`contents based on the arbitration number, and sending an “identifier”
`
`(i.e., TAG or DATA) included in the memory contents. Id. at 10–14. As to
`
`the limitation of “granting access to the memory contents based on the
`
`security key,” Petitioner argues that the responder station in Snodgrass
`
`“determines whether to respond by comparing the arbitration number in the
`
`[RD] command to the arbitration number in its register array,” and when
`
`there is a match, “the command station receives from the responder station
`
`TAG and DATA.” Id. at 13–14. Claim 23 recites limitations similar to
`
`those of claim 19, and Petitioner argues that Snodgrass teaches an “RFID
`
`transponder” (i.e., responder station) with a “memory” (i.e., memory where
`
`TAG and DATA are stored, such as memory 64, register array 66, or flag
`
`register 84), “radio front end” (i.e., transmitter 164 and receiver 170),
`
`“antenna” (i.e., antenna 168), and “processor” (i.e., arithmetic-logic unit 72
`
`and microsequencer 42). Id. at 10–14. Claims 20 and 24 recite sending a
`
`“response to the first communication” that includes the security key, and
`
`Petitioner cites Snodgrass’s IDR response in format 192, which includes the
`
`ARBITRATION NUMBER. Id. at 14. Petitioner’s analysis, supported by
`
`the testimony of Mr. Stewart, is persuasive. See id. at 10–14; Ex. 1001
`
`¶¶ 84–151.
`
`Patent Owner argues that Snodgrass does not disclose a security key
`
`that grants access to the contents of a memory, as recited in independent
`
`claims 19 and 23, for four reasons. PO Resp. 18–32. First, Patent Owner
`
`contends that Snodgrass’s arbitration number is not a “security key” because
`
`
`
`
`19
`
`
`
`

`
`IPR2015-00819
`Patent 8,325,044 B2
`
`it is “used to determine if a responder station has been addressed and not to
`
`grant or deny access to memory.” Id. at 18. We are not persuaded. In
`
`Snodgrass’s communication protocol, the responder station receives an
`
`RD command with an arbitration number, compares the received arbitration
`
`number with the one stored in memory, and provides TAG and DATA only
`
`when there is a match. See Ex. 1006, col. 15, ll. 26–34; Pet. 10, 12–14;
`
`Ex. 1001 ¶¶ 129–43. Importantly, the responder station does not provide
`
`TAG and DATA if there is not a match, as Mr. Goldberg acknowledged.
`
`See Ex. 1006, col. 15, ll. 31–34; Ex. 1049, 87:21–88:22. In other words,
`
`access to TAG and DATA is contingent on a matching arbitration number
`
`being sent by the commander station in the RD command. See Tr. 44:16–
`
`24, 46:14–47:5 (Patent Owner acknowledging that “there’s no question the
`
`arbitration number is checked” in Snodgrass, and that a matching arbitration
`
`number is a “prerequisite” to sending the response to the RD command).
`
`The fact that the arbitration number also serves the purpose of identifying
`
`the responder station does not negate the fact that it is used by the responder
`
`station to perform a comparison and only provide data from memory in the
`
`case of a match. Thus, we agree with Petitioner that the arbitration number
`
`in Snodgrass is a key that is checked and validated to grant or deny access to
`
`a memory. See Pet. 10, 12–14.
`
`Second, Patent Owner argues that “information stored in a tag’s
`
`memory [in Snodgrass] can be accessed wi

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket