throbber
IN THE UNITED STATES PATENT AND TRADEMARK OFFICE
`
`
`
`
`
`In the Inter Partes Review of:
`
`
`
`
`
`
`
`Trial Number: IPR2015-_____
`
`
`
`U.S. Patent No. 8,896,447
`
`Filed:
`
`April 16, 2014
`
`Issued:
`
`November 25, 2014
`
`
`
`
`
`Title: PROGRAMMABLE SECURITY SYSTEM
`
`AND METHOD FOR PROTECTING
`
`MERCHANDISE
`
`
`Panel: To Be Assigned
`
`
`
`Mail Stop Patent Board
`Patent Trial and Appeal Board
`P.O. Box 1450
`Alexandria, VA 22313-1450 Panel:
`
`
`
`
`PETITION FOR INTER PARTES REVIEW OF CLAIMS 1-12 and 15-24
`
`OF U.S. PATENT NO. 8,896,447
`
`PURSUANT TO 35 U.S.C. §§ 311-319 AND 37 C.F.R. § 42
`
`

`

`Petition for Inter Partes Review of U.S. Patent No. 8,896,447
`
`TABLE OF CONTENTS
`
`I.  MANDATORY NOTICES UNDER 37 C.F.R. § 42.8(A)(1) ................................................ 1 
`
`A.  Real Party-In-Interest Under 37 C.F.R § 42.8(B)(1) .......................................................... 1 
`
`B.  Related Matters Under 37 C.F.R § 42.8(B)(2).................................................................... 1 
`
`C.  Lead and Backup Counsel Under 37 C.F.R. § 42.8(B)(3) .................................................. 1 
`
`D.  Service Information Under 37 C.F.R. § 42.8(B)(4) ............................................................ 2 
`
`II.  PAYMENT OF FEES UNDER 37 C.F.R § 42.15(A) ............................................................ 2 
`
`III. 
`
`SUMMARY OF U.S. PATENT NO. 8,896,447................................................................. 3 
`
`A.   Technical Background of the ’447 Patent ........................................................................ 3 
`
`B.  Description of the ’447 Patent ............................................................................................ 4 
`
`C.  Summary of the Prosecution History of the ’447 Patent .................................................... 5 
`
`IV. 
`
`REQUIREMENTS FOR INTER PARTES REVIEW UNDER 37 C.F.R § 42.104 ............ 9 
`
`A.  Grounds for Standing Under 37 C.F.R. § 42.104(a) ........................................................... 9 
`
`B. 
`
`Identification of Challenge Under 37 C.F.R. § 42.104(b) and Relief Requested ............ 10 
`
`1.  Claims for Which Inter Partes Review is Requested (37 C.F.R. § 42.104(b)(1)) .......... 10 
`
`2.  The Specific Art and Statutory Ground(s) on Which the Challenge is Based Under 37
`C.F.R. § 42.104(b)(2) ............................................................................................................ 10 
`
`C.  Claim Construction (37 C.F.R. § 42.104(b)(3))................................................................ 11 
`
`1.  A “key” is a “remote control” ........................................................................................ 12 
`
`D.  How the Construed Claims are Unpatentable (37 C.F.R. § 42.104(b)(4)) ....................... 13 
`
`V.  BRIEF DESCRIPTION OF PRIOR ART RELIED ON ...................................................... 13 
`
`A.  Background ....................................................................................................................... 13 
`
`B.  Prior Art Applied Against Challenged Claims of the ’447 Patent .................................... 13 
`
`1. 
`
` WO/1997031347 A1 (“Cowell”) .................................................................................. 13 
`
`2.  U.S. Pat. No. 6,441,719 (“Tsui”) ................................................................................... 17 
`
`i
`
`

`

`Petition for Inter Partes Review of U.S. Patent No. 8,896,447
`
`3.  U.S. Pat. No. 6,380,855 (“Ott”) ..................................................................................... 19 
`
`4.  U.S. Pat. No. 5,650,774 (“Drori”) .................................................................................. 21 
`
`5.  U.S. Reissue 33,873 (“Romano”) ................................................................................... 22 
`
`6.  U.S. Pat. No. 5,942,985 (“Chin”) ................................................................................... 24 
`
`7.  U.S. Pat. No. 5,964,877 (“Victor”) ................................................................................ 25 
`
`DETAILED EXPLANATION OF PERTINENCE AND MANNER OF APPLYING
`VI. 
`CITED PRIOR ART TO EVERY CHALLENGED CLAIM....................................................... 26 
`
`VII.  CONCLUSION ................................................................................................................. 57 
`
`
`
`
`
`
`
`ii
`
`

`

`Petition for Inter Partes Review of U.S. Patent No. 8,896,447
`
`LIST OF EXHIBITS
`
`Exhibit No.
`
`Description
`
`1001
`
`1002
`
`1003
`
`1004
`
`1005
`
`1006
`
`1007
`
`1008
`
`
`
`WO/1997031347 A1 (“Cowell”)
`
`U.S. Pat. No. 6,441,719 (“Tsui”)
`
`U.S. Pat. No. 6,380,855 (“Ott”)
`
`U.S. Pat. No. 5,650,774 (“Drori”)
`
`U.S. Reissue 33,873 (“Romano”)
`
`U.S. Pat. No. 5,942,985 (“Chin”)
`
`U.S. Pat. No. 5,964,877 (“Victor”)
`
`Declaration of Dr. Mitchell A. Thornton (“Declaration”)
`
`iii
`
`

`

`Petition for Inter Partes Review of U.S. Patent No. 8,896,447
`
`I. MANDATORY NOTICES UNDER 37 C.F.R. § 42.8(A)(1)
`
`
`
`
`
`The following mandatory notices are provided as part of this Petition.
`
`A. Real Party-In-Interest Under 37 C.F.R § 42.8(B)(1)
`
`The real parties-in-interest for this Petition are Hangzhou Langhong
`
`Technology Co., Ltd. and Langhong Technology USA Inc. (collectively,
`
`“Petitioner”).
`
`B. Related Matters Under 37 C.F.R § 42.8(B)(2)
`
`
`
`U.S. Pat. No. 8,896,447 (“’447 patent”) is presently the subject of the
`
`following patent infringement lawsuit brought on November 25, 2014 by InVue
`
`Security Products Inc. (“InVue” or “plaintiff”) in U.S. District Court: InVue
`
`Security Products, Inc. v. Hangzhou Langhong Technology Co., Ltd., et al., Case
`
`No. 3:14-cv-00654 in the Western District of North Carolina, Charlotte Division.
`
`The following are known pending administrative matters: application serial no.
`
`14/306,761 and 14/529,516. Both of these applications claim the benefit of
`
`60/753,908, filed December 23, 2005, which is the provisional application to
`
`which the ’447 patent claims priority. Moreover, the following U.S. patents issued
`
`from respective applications that claim priority to 60/753,908: 8,884,762;
`
`8,890,691; 7,969,305; and 7,737,846.
`
`C.
`
`Lead and Backup Counsel Under 37 C.F.R. § 42.8(B)(3)
`
`
`
`Petitioner provides the following designation of counsel:
`
`1
`
`

`

`Petition for Inter Partes Review of U.S. Patent No. 8,896,447
`
`Name: John D. Zele (Reg. No. 39,887)
`(Lead Counsel)
`Name: Alex Hanna (pro hac vice to be
`filed)
`MORGAN, LEWIS & BOCKIUS
`LLP
`Postal and Hand Delivery Address
`1111 Pennsylvania Avenue, NW
`Washington, DC 20004
`T: 202.739.3000
`F: 202.739.3001
`jzele@morganlewis.com
`ahanna@morganlewis.com
`
`Name: Dion M. Bregman (Reg. No.
`45,645) (Backup Counsel)
`MORGAN, LEWIS & BOCKIUS
`LLP
`Postal and Hand Delivery Address
`2 Palo Alto Square, Suite 700
`3000 El Camino Real
`Palo Alto, CA 94306
`T: 650.843.4000
`F: 650.843.4001
`dbregman@morganlewis.com
`
`D.
`
`Service Information Under 37 C.F.R. § 42.8(B)(4)
`
`
`
`Petitioner
`
`consents
`
`to
`
`electronic
`
`service
`
`by
`
`email
`
`to:
`
`wapatents@morganlewis.com and dbregman@morganlewis.com.
`
`E.
`
`Power of Attorney Under 37 C.F.R. § 42.10(B)
`
`A power of attorney is being filed concurrently herewith.
`
`F.
`
`Service on the Patent Owner Under 37 C.F.R. § 42.105(A)
`
`This Petition, exhibits, and all supporting evidence are being served
`
`
`
`
`
`concurrently herewith by Federal Express on the patent owner as follows: InVue
`
`Security Products Inc., 15015 Lancaster Highway, Charlotte NC 28277 (Attention:
`
`Mr. Trent A. Kirk).
`
`II.
`
`PAYMENT OF FEES UNDER 37 C.F.R § 42.15(A)
`
`
`
`The undersigned authorizes the Office to charge Deposit Account No. 50-
`
`0310 (Order No. 102838-3003) for the fee set forth in 37 C.F.R. § 42.15(a) for this
`
`2
`
`

`

`Petition for Inter Partes Review of U.S. Patent No. 8,896,447
`
`Petition for Inter Partes Review. The undersigned further authorizes payment for
`
`any additional fees that might be due in connection with this Petition to be charged
`
`to Deposit Account No. 50-0310 (Order No. 102838-3003).
`
`III. SUMMARY OF U.S. PATENT NO. 8,896,447
`
`A. Technical Background of the ’447 Patent
`
`
`
`The following technical information is supported by the Declaration of Dr.
`
`Mitchell A. Thornton (“Dec.”) (Ex. 1008). The ’447 patent relates to security
`
`systems and methods for protecting merchandise items (e.g., consumer electronics)
`
`by utilizing a programmable key for arming and disarming a security device
`
`attached to the item. ’447.1.21-26; 2.18-23; Dec. at 16. These security devices are
`
`commonly used theft-deterrent systems that include an alarm module. ’447.1.30-
`
`55; Dec. at 16. Security devices generally also include a mechanical, electrical, or
`
`magnetic key for arming and disarming the associated alarm when, for example,
`
`the item needs to be removed. ’447.1.30-55; Dec. at 16-17. The ’447 patent
`
`allegedly improves on the traditional security device system by disclosing a key
`
`programmable with a security code that is unique to a particular retail store.
`
`’447.2.18-27; Dec. at 17. In addition, the programmable key may be equipped
`
`with an internal timer for automatic activation, an internal counter to track the
`
`number of activations, and visual indicators to display the operational status of the
`
`3
`
`

`

`Petition for Inter Partes Review of U.S. Patent No. 8,896,447
`
`station. ’447.2.35-42; 52-58; 3.37-41; 4.23-29; Dec. at 17. The ’447 patent
`
`contains 24 claims, 2 of which are independent.
`
`B. Description of the ’447 Patent
`
`
`
`The ’447 Patent discloses three primary components of a security system: (i)
`
`a programming station; (ii) a programmable key; and (iii) an alarm module that
`
`uses an attachment device to attach to an item of merchandise. ’447.6.4-10; Dec.
`
`at 17-18. A preferred attachment device may be a cable that contains a sense loop.
`
`’447.6.9-10.
`
`As shown in Fig. 1 of the ’447 patent, the alarm module 7 is
`
`attached to an item of merchandise 9 through an attachment cable 11. ’447.6.4-10;
`
`Dec. at 18. The programming station 3 contains a logic control circuit that further
`
`includes: a main controller, a communication circuit, and a security code memory
`
`communicating with the controller. The memory stores a security code known as
`
`the Security Disarm Code (SDC). ’447.6.11-31. Additionally, the ’447 patent
`
`describes an upper housing member 72 in alignment with a light emitting diode 90
`
`to indicate to a user the status and activation of programmable keys. ’447.8.46-50.
`
`Components and functionality of the programming station, the alarm module, and
`
`the programmable key, and logic control circuits, are disclosed in greater detail in
`
`U.S. Patent Nos.: (a) 7,737,844, (b) 7,737,843, and (c) 7,737,845, which are
`
`incorporated by reference in the ’447 patent. ’447.6.11-15 and 59-64; 7.9-14;
`
`8.15-17 and 59-62; 12.66-67; 13.1-2; 15.3-5; Dec. at 18-19.
`
`4
`
`

`

`Petition for Inter Partes Review of U.S. Patent No. 8,896,447
`
`
`
`In operation, a programmable key is placed in the key receiving port 65 (Fig.
`
`5). When the activation switch 85 is actuated, the logic control circuit 77 of the
`
`programming station randomly generates a unique SDC transmitted through a
`
`communication circuit to the communication circuit of the programmable key.
`
`The key memory stores the SDC. The process of activation and transmission is
`
`confirmed and relayed through a light emitting diode. ’447.9.1-18; Dec. at 19.
`
`The alarm module can then be disarmed when a key, programmed with a valid
`
`SDC, is placed into the key receiving port of the alarm module. ’447.10.47-58;
`
`Dec. at 19. This is illustrated in Fig. 5, below, of the ’447 patent.
`
`
`
`
`
`In Fig. 5, the programmable key 5 is placed in the key activation port, seen
`
`at 65. Id.; Dec. at 19-20.
`
`C.
`
`Summary of the Prosecution History of the ’447 Patent
`
`
`
`U.S. Patent Application No. 14/254,224 (“’224 Application”) that led to the
`
`’447 patent was filed on April 16, 2014. Dec. at 22. The ’224 Application was
`
`filed with 24 claims; 2 of the as-filed claims were independent claims. Dec. at 22.
`
`5
`
`

`

`Petition for Inter Partes Review of U.S. Patent No. 8,896,447
`
`
`
`On July 24, 2014, the Examiner issued a Non-Final Office Action. Dec. at
`
`22. The Office Action, among other things, provisionally rejected all 24 claims on
`
`the grounds of nonstatutory double patenting as being unpatentable over claims of
`
`co-pending Application Nos. 13/169,968 (“’968 Application”), 14/254,210 (“’210
`
`Application”), and 14/254,244 (“’244 Application”) in view of either Sedon et al.
`
`(U.S. 2005/0073413) or Deconinck et al. (U.S. Patent No. 7,002,467). Dec. at 22-
`
`23. The Office Action noted that the ’968 Application disclosed substantially
`
`similar technology to the ’224 Application, but lacked the security device “further
`
`comprising an alarm and a plurality of connection jacks,” at least one of which
`
`could be attached to merchandise through an attachment cable. USPTO Office
`
`Action, July 24, 2014 at 4; Dec. at 23. The Office Action, however, asserted that
`
`these features were well known in the art at the time of the invention, as discussed
`
`by Sedon et al. and Deconinck et al. Dec. at 23.
`
` The Office Action also noted
`
`that missing elements of
`
`the ’244 Application, such as
`
`the “wireless”
`
`communication between the security device and the key, were either obvious to
`
`one skilled in the art or taught by Sedon et al. and Deconinck et al. Dec. at 23.
`
`Similarly, the Office Action noted that the ’244 Application was missing
`
`substantially the same elements as the ’210 Application, such as the wireless
`
`element. Dec. at 23-24.
`
`6
`
`

`

`Petition for Inter Partes Review of U.S. Patent No. 8,896,447
`
`
`
`On July 30, 2014, Applicant held a telephone interview with the Examiner
`
`and filed an Amendment on the same day. Dec. at 24. Response to Office Action,
`
`July 30, 2014 at 6; Dec. at 24. The Applicant noted that the issue fee for the ’968
`
`Application was unpaid, rendering it abandoned. Id. at 6; Dec. at 26. Further, to
`
`overcome the nonstatutory double patenting rejection, Applicant filed terminal
`
`disclaimers for the ’210 and ’244 Applications. Id. at 6-7; Dec. at 26.
`
`
`
`On September 12, 2014, the USPTO issued a second Office Action. Second
`
`Office Action, September 12, 2014; Dec. at 26. According to the second Office
`
`Action, all 24 claims were found to be unpatentable over claims 1-3, 6-18, and 20
`
`of Applicant’s co-pending Application No. 14/306,761 (“’761 Application”) in
`
`view of Sedon et al. or Deconinck et al. Id.; Dec. at 26. The Office Action noted
`
`that Sedon and Deconinck disclosed missing elements of the ’761 Application. Id.
`
`at 5-7; Dec. at 26. The Office Action also noted that the following elements,
`
`missing from the ’761 Application, would have been obvious to one skilled in the
`
`art: “wireless” communication between the “key” and the “security device,” an
`
`“activation switch” at the key to initiate wireless communication, the key being
`
`reprogrammable by a person, a “visual indicator” in the key. Id. at 5-7; Dec. at 26-
`
`27.
`
`
`
`On September 12, 2014, in response to the second Office Action, the
`
`Applicant filed a Request for Reconsideration and a terminal disclaimer to
`
`7
`
`

`

`Petition for Inter Partes Review of U.S. Patent No. 8,896,447
`
`overcome the rejection. Response to Second Office Action, September 12, 2014;
`
`Dec. at 27. A Notice of Allowance issued on October 23, 2014; Dec. at 27.
`
`’447 Patent Elements Disclosed in the Prior Art
`
`D.
`
`Below are color-coded, annotated figures illustrating how elements of claim
`
`
`
`1 of the ’447 patent, shown through Fig. 1, are clearly disclosed in the prior art to
`
`Cowell and Tsui (see V.B infra; Exs. 1001-02), taken together.
`
`
`
`
`
`8
`
`

`

`Petition for Inter Partes Review of U.S. Patent No. 8,896,447
`
`
`
`IV. REQUIREMENTS FOR INTER PARTES REVIEW UNDER 37 C.F.R
`§ 42.104
`
`
`
`As set forth below and pursuant to 37 C.F.R. § 42.104, each requirement for
`
`inter partes review of the ’447 patent is satisfied.
`
`A. Grounds for Standing Under 37 C.F.R. § 42.104(a)
`
`
`
`Petitioner hereby certifies that the ’447 patent is available for inter partes
`
`review and that the Petitioner is not barred or estopped from requesting inter partes
`
`review challenging the claims of the ’447 patent on the grounds identified herein.
`
`More particularly, Petitioner certifies that: (1) Petitioner is not the owner of the
`
`’447 patent; (2) Petitioner has not filed a civil action challenging the validity of the
`
`’447 patent; (3) this Petition is filed less than one year after the date on which the
`
`Petitioner, the Petitioner’s real party-in-interest, or a privy of the Petitioner was
`
`9
`
`

`

`Petition for Inter Partes Review of U.S. Patent No. 8,896,447
`
`served with a complaint alleging infringement of the ’447 patent; (4) the estoppel
`
`provisions of 35 U.S.C. § 315(3)(1) do not prohibit this inter partes review.
`
`B.
`
`
`Identification of Challenge Under 37 C.F.R. § 42.104(b) and Relief
`Requested
`
`
`
`Petitioner requests cancellation of claims 1-12 and 15-24 of the ’447 patent
`
`as unpatentable under 35 U.S.C. § 103(a). This Petition, supported by a
`
`Declaration of Dr. Mitchell A. Thornton (Ex. 1008), filed herewith, demonstrates
`
`that there is a reasonable likelihood that Petitioner will prevail with respect to at
`
`least one challenged claim and that each challenged claim is not patentable.
`
`1.
`
`Claims for Which Inter Partes Review is Requested (37 C.F.R.
`§ 42.104(b)(1))
`
`Inter partes review of claims 1-12 and 15-24 of the ’447 patent is requested.
`
`2.
`
`The Specific Art and Statutory Ground(s) on Which the
`Challenge is Based Under 37 C.F.R. § 42.104(b)(2)
`
`Inter partes review is requested in view of the following prior art references:
`
`Prior Art Reference
`WO/1997031347 A1 (“Cowell”)
`
`Publication/Issue Date Exhibit No.
`8-28-1997
`1001
`
`U.S. Pat. No. 6,441,719 (“Tsui”)
`U.S. Pat. No. 6,380,855 (“Ott”)
`U.S. Pat. No. 5,650,774 (“Drori”)
`U.S. Reissue 33,873 (“Romano”)
`U.S. Pat. No. 5,942,985 (“Chin”)
`U.S. Pat. No. 5,964,877 (“Victor”)
`
`8-27-2002
`4-30-2002
`7-22-1997
`4-7-1992
`8-24-1999
`10-12-1999
`
`1002
`1003
`1004
`1005
`1006
`1007
`
`All of the above references qualify as prior art against the ’447 patent under
`
`
`
`
`
`
`
`
`pre-AIA 35 U.S.C. § 102 et seq. Although Cowell, Ott, and Romano are cited as
`10
`
`

`

`Petition for Inter Partes Review of U.S. Patent No. 8,896,447
`
`prior art on the face of the ’447 patent, they are among over 100 other cited prior
`
`art references that were cited. Furthermore, none of these references were applied
`
`by the Examiner during prosecution of the ’447 patent. Dec. at 36-38, 42, 44.
`
`
`
`The following are specific obviousness grounds under 35 U.S.C. § 103(a)
`
`for challenging the validity of claims 1-12 and 15-24 of the ’447 patent. Dec. at
`
`54.
`
`Ground 1: Claims 1-6, 8-9, and 16-24 are obvious under 35 U.S.C. § 103(a) in
`view of Cowell further in view of Tsui.
`Ground 2: Claim 7 is obvious under 35 U.S.C. § 103(a) in view of Cowell
`further in view of Tsui, and further in view of Ott.
`Ground 3: Claims 10-11 are obvious under 35 U.S.C. § 103(a) in view of
`Cowell further in view of Tsui, and further in view of Drori.
`Ground 4: Claim 12 is obvious under 35 U.S.C. § 103(a) in view of Cowell
`further in view of Tsui, and further in view of Romano.
`Claim 15 is obvious under 35 U.S.C. § 103(a) in view of Cowell
`further in view of Tsui, and further in view of Chin or, alternatively,
`Victor.
`
`Grounds
`5-6:
`
`
`C. Claim Construction (37 C.F.R. § 42.104(b)(3))
`A claim in inter partes review is given the “broadest reasonable construction
`
`
`
`in light of the specification.” See 37 C.F.R. § 42.100(b). For the purpose of this
`
`proceeding, claim terms are presumed to take on their broadest reasonable
`
`interpretation (“BRI”). Petitioner reserves the right to contend in the concurrent
`
`11
`
`

`

`Petition for Inter Partes Review of U.S. Patent No. 8,896,447
`
`district court actions that a different claim construction standard should apply and
`
`to advance a different construction.
`
`1.
`
`A “key” is a “remote control”
`
`
`
`Petitioner proposes a construction of the claim term “key.” The claim term
`
`“key” appears in all of the independent claims of the ’447 patent, i.e., claims 1 and
`
`20. ’447.27-29; Dec. 27-28, 31-32, 36. Therefore, “key” is present, at least by
`
`dependency, in all 24 claims of the ’447 patent. Dec. 27-33, 36. A construction of
`
`“key,” supported by Dr. Thornton’s Declaration, is offered below. Dec. at 35.
`
`Term
`“key”
`
`Proposed Claim Construction
`“remote control”
`
`

`
`The U.S. District Court for the Northern District of Texas (Fort Worth
`
`Division), in InVue Security Products, Inc. v. Hangzhou Langhong Tech. Co., Ltd.
`
`et al. (civil action no. 4:13-CV-457-A), construed the claim term “key” to mean
`
`“remote control.” Dec. at 35. In that case, plaintiff InVue Security Products, Inc.
`
`(“InVue”), the entity listed as assignee on the face of the ’447 patent, asserted
`
`claim 1 of U.S. Patent No. 7,737,843 (“’843 patent”) that recites the term “key,”
`
`and advanced the U.S. District Court’s adopted claim construction that a “key”
`
`means a “remote control.” Dec. at 35. Importantly, the ’843 patent disclosure is
`
`expressly incorporated by reference in the ’447 patent, making it highly relevant
`
`intrinsic evidence. ’447.7.9-14; Dec. 35. The incorporation of the ’843 patent
`
`disclosure in the ’447 patent and the U.S. District Court’s adoption of InVue’s
`12
`
`

`

`Petition for Inter Partes Review of U.S. Patent No. 8,896,447
`
`proposed construction that a “key” is a “remote control” support the BRI of “key”
`
`as a “remote control.” Dec. 35. See, e.g., Omega Eng’g, Inc. v. Raytek Corp., 334
`
`F.3d 1314, 1334 (Fed. Cir. 2003) (“[W]e presume, unless otherwise compelled,
`
`that the same claim term in the same patent or related patents carries the same
`
`construed meaning.”)
`
`For the purposes of this Petition, Petitioner proposes that
`
`the remaining claim terms of claims 1-12 and 15-24 of the ’447 patent should be
`
`provided their ordinary and customary meaning. 
`
`D. How the Construed Claims are Unpatentable (37 C.F.R. §
`42.104(b)(4))
`
`
`
`An explanation of how claims 1-12 and 15-24 of the ’447 patent are
`
`unpatentable under 35 U.S.C. § 103(a) is provided in Sections V and VI, below.
`
`V.
`
`BRIEF DESCRIPTION OF PRIOR ART RELIED ON
`
`A.
`
`Background
`
`
`
`In the following section, an explanation of each invalidating prior art
`
`reference is given using selected excerpts cited that are exemplary and not
`
`exhaustive. The ’447 patent is a continuation of application no. 13/169,968, filed
`
`on June 27, 2011, and is therefore subject to pre-AIA 35 U.S.C. § 102 et seq. The
`
`’447 patent’s claims priority to provisional application no. 60/753,908 filed on
`
`December 23, 2005.
`
`B.
`
`Prior Art Applied Against Challenged Claims of the ’447 Patent
`
`1.
`
` WO/1997031347 A1 (“Cowell”)
`
`13
`
`

`

`Petition for Inter Partes Review of U.S. Patent No. 8,896,447
`
`
`
`Cowell qualifies as prior art to the ’447 patent under at least pre-AIA §
`
`102(b), as Cowell was published on August 28, 1997 which is more than one year
`
`prior to December 23, 2005. Although Cowell was cited on the face of the ’447
`
`patent, it was not applied to reject any application claim. Cowell is directed to a
`
`key operated security system for protecting merchandise from theft. Cowell, p.1 ¶
`
`2 (Ex. 1001); Dec. at 38. Cowell discloses, inter alia, a “key” operated security
`
`system with a key that carries a “microchip containing a security code formed by a
`
`number of digits.” Id. at Abstract; Dec. at 38. This “key” is used to arm or disarm
`
`an alarm. Id. at Abstract; Dec. at 38. Cowell aims to rectify a common problem
`
`with various types of security systems, which require keys that “have to be
`
`provided by the manufacturer and, if lost, can cause considerable problems as a
`
`result of delays which would be incurred in obtaining a replacement key.” Id. at
`
`p.1 ¶ 2; Dec. at 38.
`
`Fig. 1, below, illustrates the first preferred form of the security system for
`
`use in stores (Key added for ease of reference).
`
`14
`
`

`

`Petition for Inter Partes Review of U.S. Patent No. 8,896,447
`
`KEY:
`
`“main alarm unit 12”
`
`“flex 20”
`
`“garment grip 14”
`
`“disarming key 16”
`
`
`
`
`
`
`Fig. 1 depicts a system with a “main alarm unit 12” attached to an item of
`
`merchandise through either a suitable or a “garment grip 14.” Id. at Abstract, p.3 ¶
`
`6; Dec. at 39. The garment grip:
`
`carries a microswitch which is tripped when the grip is removed from
`the garment. The microswitch is closed by the presence of the
`garment and is opened when the garment is removed. The
`microswitch is connected to a plug 18 by way of a suitable flex 20, the
`plug 18 engaging in one of several sockets 22 in the main alarm unit
`12.
`
`Id. at p.3 ¶ 7; Dec. at 39. Each socket 22 has an associated identical trigger circuit
`
`with its “own visual indicator or LED 32 to indicate clearly which of the garment
`
`grip 14 and/or flex 20 has been tampered with.” Id. at p.4 ¶ 1; Dec. at 39. In
`
`operation, “if any of the grips 14 or the flexes 20 are tampered with then an alarm
`
`is sounded.” Id. at p.7 ¶ 4; Dec. at 39.
`
`15
`
`

`

`Petition for Inter Partes Review of U.S. Patent No. 8,896,447
`
`The system also includes a disarming key 16, which has a number of pins 24
`
`that connect with a microchip 17 in the key in which a variable four-digit code is
`
`pre-programmed. Id. at p.3 ¶ 9; Dec. at 40. This security code is read into the
`
`logic control circuit, discussed in further detail below, to inhibit the alarm. Id. at
`
`Abstract; Dec. at 40. When the key is removed, remote sensors 14 can generate a
`
`trigger signal in response to sensed conditions such as the removal of merchandise,
`
`and will then cause activation of the alarm. Id. at Abstract; Dec. at 40.
`
`The logic control circuit includes a “microprocessor 102 with means 152 for
`
`reading the key security code of a key inserted in the socket 104, a store means
`
`(RAM) 154 for storing a key security code, monitoring means 156 for scanning the
`
`socket 104 and monitoring the presence or absence of a key in the socket, and a
`
`comparator 158 for comparing the security code stored in the store 154 with the
`
`key security code read from the key inserted in the socket 104.” Id. at p.4 ¶ 3, Fig.
`
`2; Dec. at 40-41.
`
`
`
`In operation, the system “has the great advantage that if the disarming key
`
`16 is lost or damaged it can be easily replaced and the replacement key does not
`
`have to have stored in its memory the same four digit code as the original key.” Id.
`
`at p.7 ¶ 6; p.8 ¶ 1; Dec. at 41. This can be implemented by disconnecting the
`
`power supply to the system, thus wiping the original stored four-digit code, and
`
`reconnecting the power supply with the new key inserted. Id. at p.8 ¶ 1; Dec. at
`
`16
`
`

`

`Petition for Inter Partes Review of U.S. Patent No. 8,896,447
`
`41. The power supply may come from a battery or a main supply. Id. at p.9 ¶ 1;
`
`Dec. at 41.
`
`2.
`
`U.S. Pat. No. 6,441,719 (“Tsui”)
`
`Tsui qualifies as prior art to the ’447 patent under at least pre-AIA § 102(b),
`
`as Tsui issued as a patent on August 27, 2002 which is more than one year prior to
`
`December 23, 2005. Tsui was not cited or considered in the prosecution of the
`
`’447 patent. Claims 1-6, 8-9, and 16-24 are obvious in view of Cowell in view of
`
`Tsui. Dec. at 46, 48.
`
`
`
`Tsui is directed to wireless security systems with a signaling device capable
`
`of receiving and verifying coded signals. Tsui, col. 1.9-14 (Ex. 1002); Dec. at 46.
`
`Tsui identifies problems in conventional security systems using a single, fixed
`
`identification code: for example, the code may be detected by a hostile user, or
`
`generated by a non-system source and incorrectly recognized as a system signal.
`
`Id. at col. 1.33-39; Dec. at 46. To address these issues, Tsui discloses a security
`
`system with a control unit “which operates with a number of peripheral devices,
`
`each having different identification codes which cannot be easily detected.” Id. at
`
`col. 1 ll. 40-43; Dec. at 46.
`
`Fig. 1A, below, depicts a block diagram illustrating one embodiment of the
`
`security system which includes a security console 20 comprising a housing 22, a
`
`keypad 24 which may be alphanumeric, a display panel 26, and an opening 28 to
`
`17
`
`

`

`Petition for Inter Partes Review of U.S. Patent No. 8,896,447
`
`facilitate the projection of audio signals (Key added for ease of reference). Id. at
`
`col. 2.39-64; Dec. at 46-47.
`
`KEY:
`
`“security console 20”
`
`“housing 22”
`
`“keypad 24”
`
`“remote control 40”
`
`
`The security console further comprises a micro-controller, a memory, a
`
`powerup reset circuit, LED display, tamper switches, and a voltage regulator. Id.
`
`at col. 3; ll. 29-47; Dec. at 47.
`
`In operation, when each peripheral device is activated a unique identification
`
`code and associated variable security code is transmitted from the device to the
`
`security console. Id. at col. 3.49-56; Dec. at 47. This information is stored in the
`
`memory. Id. at col. 3.49; Dec. at 47. The housing, which includes the keypad and
`
`LED display, is coupled to tamper switches via a tamper detection circuit to
`
`determine if the housing is subject to a predetermined level of pressure indicative
`
`of tampering or breakage. Id. at col. 5.11-26; Dec. at 47. When such a level is
`
`18
`
`

`

`Petition for Inter Partes Review of U.S. Patent No. 8,896,447
`
`detected, the micro-controller may activate an alarm. Id. at col. 5.23-26; Dec. at
`
`47. The micro-controller may also receive signals from any of the remote
`
`controllers that have both a unique identification code and a variable security code.
`
`Id. at col. 4.65-67; Dec. at 47-48. These remote controllers can be used to arm or
`
`disarm the security console by initiating transmissions between the security
`
`console and the signaling devices. Id. at col. 5.1-10; Dec. at 48. Tsui therefore
`
`remedies the deficiency of Cowell; namely, Tsui teaches a key configured to
`
`wirelessly communicate with the security device to arm or disarm the security
`
`device upon a matching of the security code stored in the memory of the security
`
`device with the security code stored in the memory of the key. Dec. at 48.
`
`Tsui also discloses a receiver, from which the processer may receive signals.
`
`These signals “include a unique identification code and a variable security or
`
`rolling code.” Id. at. col. 9.56-62; Dec. at 48. If the processor determines that the
`
`received signal is valid and intended for the signaling device, it will activate an
`
`alarm. Id.; Dec. at 48.
`
`3.
`
`U.S. Pat. No. 6,380,855 (“Ott”)
`
`
`
`Ott qualifies as prior art to the ’447 patent under at least pre-AIA § 102(b),
`
`as Ott issued as a patent on April 30, 2002 which is more than one year prior to
`
`December 23, 2005. Ott was cited on the face of the ’447 patent, but was not
`
`19
`
`

`

`Petition for Inter Partes Review of U.S. Patent No. 8,896,447
`
`applied to reject any application claim. Claim 7 is obvious in view of Cowell in
`
`view of Tsui further in view of Ott. Dec. at 42, 44.
`
`Ott is directed to an apparatus for safeguarding a merchandise item against
`
`theft in a manner that improves presentation of the merchandise item. Ott, col.
`
`1.43-46 (Ex. 1003); Dec. at 42. Ott proposes to overcome inadequacies of
`
`common safeguarding apparatuses that have a safeguarding part for fixing to the
`
`merchandise item as well as a connecting cord for connecting the safeguarding part
`
`to an object not at risk for theft. Id. at col. 1.5-10; Dec. at 42-43. These
`
`inadequacies include difficulty in fixing the safeguarding part to comparatively
`
`small merchandise items or items with curved surfaces, as well as systems that
`
`adversely affect the presentation of the merchandise item. Id. at col. 1.24-30; Dec.
`
`at 43.
`
`Ott discloses a “fixing part” that can be held in a “particularly reliable
`
`manner on the merchandise item, for example by means of a flexible adhesive pad
`
`disposed on the surface of the fixing part which faces the merchandise item.” Ott
`
`at col. 2.5-15; Dec. at 43. Such a system is depicted in Fig. 1, below.
`
`In Fig. 1, three contact elements 38, 39, and 40 can be fixed to the
`
`merchandise item 12 by means of adhesive pads. Id. at col. 8.36-40; Dec. at 43.
`
`These pads correspond to the adhesive pad 28 of the ho

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket