throbber

`
`
`
`
`IN THE UNITED STATES PATENT AND TRADEMARK OFFICE
`
`
`Attorney Docket: UKY-778IPR
`
`
`Inter partes Review Case No. IPR2015-01440
`
`Inter partes Review of: U.S. Patent No. 7,706,778
`
`Issued: April 27, 2010
`
`To: Peter R. Lowe
`
`For: System and Method for Remotely Assigning and Revoking Access
`Credentials Using a Near Field Communication Equipped Mobile Phone
`
`
`
`PETITION FOR INTER PARTES REVIEW OF
`USPN 7,706,778
`
`
`Mail Stop Patent Board
`Patent Trial and Appeal Board
`P.O. Box 1450
`Alexandria, VA 22313-1450
`
`
`
`
`
`
`
`
`
`
`
`
`Steven M. Bauer, Reg. No. 31,481
`Joseph A. Capraro, Jr., Reg. No. 36,471
`Proskauer Rose LLP
`One International Place
`Boston, MA 02110
`Tel: (617) 526-9600
`
`
`
`

`

`
`Table of Contents
`I. Mandatory Notices Under 37 C.F.R. § 42.8(a) .............................................. 1 
`A. Real Party-In-Interest under 37 C.F.R. § 42.8(b)(1) .................................. 1 
`B. Related Matters under 37 C.F.R. § 42.8(b)(2) ........................................... 1 
`C. Lead and Back-Up Counsel under 37 C.F.R. § 42.8(b)(3) ........................ 1 
`D. Service Information under 37 C.F.R. § 42.8(b)(4) ..................................... 2 
`E. Proof of Service on the Patent Owner ........................................................ 2 
`F.  Power of Attorney ...................................................................................... 2 
`II. Payment of Fees Under 37 C.F.R. § 42.103 .................................................... 2 
`III. Requirements for Inter Partes Review under 37 C.F.R. § 42.104 ................ 2 
`A. Grounds for Standing under 37 C.F.R. § 42.104(a) ................................... 2 
`B. Identification of Challenge under 37 C.F.R. § 42.104(b) and
`Statement of Precise Relief Requested ....................................... 3 
`C. Threshold Requirement for Inter Partes Review Under 37 C.F.R.
`§ 42.108(c) .................................................................................. 3 
`IV. Overview of the ’778 Patent ............................................................................ 4 
`A. Brief Description of the Patent ................................................................... 4 
`B. Summary of the Prosecution History of the ’778 Patent ............................ 4 
`C. Claim Construction Under 37 C.F.R. § 42.104(b)(3) ................................ 5 
`D. Summary of Prior Art References Relied Upon ......................................... 5 
`V. Level of Ordinary Skill in the Art .................................................................. 7 
`VI. Claims 1-42 of the ’778 Patent are Unpatentable ......................................... 8 
`A. Claims 1, 3-12, 14-16, and 20-42 are anticipated by Libin; claims
`2, 13, and 17-19 are rendered obvious by Libin in view of
`Nielsen ........................................................................................ 8 
`B. Claims 1-8, 9-25, and 27-42 are rendered obvious by Nielsen in
`view of Kärkäs. ......................................................................... 35 
`VII. Conclusion ....................................................................................................... 60 
`
`
`
`
`
`
`
`

`

`
`
`
`Table of Exhibits
`
`
`Exhibit
`
`Description
`
`1003
`
`1001 USPN 7,706,778 (“’778 patent”)
`(patent under Inter Partes Review)
`1002 Declaration of Bruce Schneier in
`Support of Request for Inter Partes
`Review of the ’778 Patent
`Joint Claim Construction and
`Prehearing Statement Pursuant to Local
`Patent Rule 4-3, Ex. A, Assa Abloy AB
`v. Spectrum Brands, Inc., Civil Action
`No. 14-cv-00947-CJC (C.D. CA)
`1004 USPN 7,205,882 to Libin (“Libin”)
`1005 USPN 7,012,503 by Nielsen
`(“Nielsen”)
`1006 USPN 7,873,989 by Kärkäs et al.
`(“Kärkäs”)
`
`Publication
`Date or Filing
`Date
`April 3, 2006
`
`Type of
`Prior Art
`(35 U.S.C.)
`N/A
`
`N/A
`
`N/A
`
`N/A
`
`N/A
`
`Nov. 10, 2004
`Dec. 5, 2002
`
`102(e)
`102(a)
`
`Mar. 14, 2002
`
`102(a)
`
`
`
`iii
`
`

`

`
`
`Through counsel, real party-in-interest UniKey Technologies, Inc.
`
`(“Petitioner” or “UniKey”) hereby petitions for Inter Partes Review (“IPR”) under
`
`35 U.S.C. §§ 311-319 and 37 C.F.R. § 42 of claims 1-42 of U.S. Patent 7,706,778
`
`(Ex. 1001) (“’778 patent”). This Petition shows that there is a reasonable
`
`likelihood that Petitioner will prevail in establishing that at least one of these
`
`claims is unpatentable and should be canceled.
`
`I. MANDATORY NOTICES UNDER 37 C.F.R. § 42.8(a)
`A. Real Party-In-Interest under 37 C.F.R. § 42.8(b)(1)
`Petitioner, UniKey Technologies, Inc., is the real party-in-interest for the
`
`instant petition.
`
`B. Related Matters under 37 C.F.R. § 42.8(b)(2)
`The following matters would affect, or may be affected, by a decision in this
`
`proceeding: Assa Abloy AB v. Spectrum Brands, Inc., Civil Action No. 14-cv-
`
`00947-CJC, filed on June 19, 2014 in the U.S. District Court for the Central
`
`District of California (“District Court Action”); U.S. Patent No. 8150374; U.S.
`
`Application Nos. 13/404915, 14/674085, 14/674094, 14/674109, 14/674125,
`
`14/674167, 14/674175; and IPR2015-01441.
`
`C. Lead and Back-Up Counsel under 37 C.F.R. § 42.8(b)(3)
`Petitioner provides the following designation of counsel.
`
`LEAD COUNSEL
`Steven M. Bauer
`Reg. No. 31,481
`Proskauer Rose LLP
`
`BACK-UP COUNSEL
`Joseph A. Capraro, Jr.
`Reg. No. 36,471
`Proskauer Rose LLP
`
`
`
`
`
`

`

`
`
`One International Place
`One International Place
`Boston, MA 02110
`Boston, MA 02110
`Tel: (617) 526-9800
`Tel: (617) 526-9700
`Fax: (617) 526-9899
`Fax: (617) 526-9899
`jcapraro@proskauer.com
`PTABMattersBoston@proskauer.com
`D.
`Service Information under 37 C.F.R. § 42.8(b)(4)
`UniKey may be served at the lead counsel address provided in Section I.C of
`
`this Petition and consents to electronic service at the email address indicated.
`
`Proof of Service on the Patent Owner
`
`E.
`As identified in the attached Certificate of Service, a copy of the present
`
`Petition, in its entirety, including all exhibits and a power of attorney, is being
`
`served by EXPRESS MAIL® to Sheridan Ross PC, 1560 Broadway, Suite 1200,
`
`Denver, CO 80202.
`
`F.
`
`Power of Attorney
`
`A power of attorney pursuant to 37 C.F.R. § 42.10(b) is filed herewith.
`
`II.
`
`PAYMENT OF FEES UNDER 37 C.F.R. § 42.103
`
`The undersigned paid the fee set forth in 37C.F.R. § 42.15(a), as required by
`
`37 C.F.R. § 42.103, from Deposit Account No. 50-3081. The undersigned further
`
`authorizes the Director to charge any additional fees that may be due in connection
`
`with this matter to Deposit Account 50-3081.
`
`III. REQUIREMENTS FOR INTER PARTES REVIEW UNDER 37 C.F.R.
`§ 42.104
`A. Grounds for Standing under 37 C.F.R. § 42.104(a)
`Petitioner certifies that the ’778 patent is eligible for Inter Partes Review
`
`and further certifies that Petitioner is not barred or otherwise estopped from
`2
`
`
`
`

`

`
`challenging the identified claims on the grounds identified within the present
`
`petition.
`
`B.
`
`Identification of Challenge under 37 C.F.R. § 42.104(b) and
`Statement of Precise Relief Requested
`Petitioner requests Inter Partes Review of claims 1-42 of the ’778 patent on
`
`the grounds set forth in the table below and requests that each of the claims be
`
`found unpatentable. An explanation of how claims 1-42 are unpatentable under the
`
`statutory grounds identified below—including the identification of where each
`
`element is found in the prior art patents or publications and the relevance of the
`
`prior art reference—is provided in the form of analysis of each claim element.
`
`Additional explanation and support for each ground of rejection is set forth in the
`
`Declaration of Bruce Schneier. (See Ex. 1002.)
`
`Ground ’778 Patent Claims
`A(1)
`1, 3-12, 14-16, and 20-42
`A(2)
`2, 13, and 17-19
`B
`1-8, 9-25, and 27-42
`
`
`
`Basis for Rejection
`Libin (§102)
`Libin in view of Nielsen (§103)
`Nielsen in view of Kärkäs (§103)
`
`C. Threshold Requirement for Inter Partes Review Under 37 C.F.R.
`§ 42.108(c)
`
`An IPR should be instituted when there is a “reasonable likelihood that the
`
`requester will prevail with respect to at least one of the claims challenged.” 35
`
`U.S.C. § 314(a). This Petition meets the threshold. In particular, as set forth
`
`herein, each limitation of the challenged claims is disclosed or suggested by the
`
`prior art references. Moreover, where applicable, this Petition sets forth reasons
`
`
`
`3
`
`

`

`
`why a person of ordinary skill in the art would be motivated to combine the
`
`references.
`
`IV. OVERVIEW OF THE ’778 PATENT
`A. Brief Description of the Patent
`The ’778 patent generally relates to secure access systems in which
`
`credential data can be stored on a mobile device. (Ex. 1001, Abstract.) For
`
`example, the ’778 patent discusses an access control system in which readers
`
`control access to assets, such as a reader controlling a door that permits access to a
`
`secure room. (See, e.g., Ex. 1001, 3:25-32.) The mobile device can communicate
`
`with the reader to determine if the credential data on the mobile device permits
`
`access to the asset associated with the reader. (See, e.g., Ex. 1001, 3:29-32.) The
`
`independent claims of the ’778 patent are directed to basic approaches to updating
`
`this credential data on mobile devices. (See, e.g., Ex. 1001, claims 1, 16, and 33.)
`
`The dependent claims of the ’778 patent are further directed to the content of the
`
`credential data, how the updates are communicated to the mobile device, what the
`
`mobile device does in response to the update, or interactions between the mobile
`
`device and readers. (See, e.g., Ex. 1001, claims 2-15, 17-32, and 34-42).
`
`Summary of the Prosecution History of the ’778 Patent
`
`B.
`The ’778 patent issued from U.S. Patent Application No. 11/397,542 (“’542
`
`application”), filed on April 3, 2006. The ’542 application purports to be entitled
`
`
`
`4
`
`

`

`
`to the filing date of U.S. Provisional Patent Application No. 60/668,828, filed on
`
`April 5, 2005.
`
`While the Patent Office discussed several pieces of prior art during
`
`prosecution, it did not discuss the pieces of prior art discussed below, nor were
`
`they cited. Thus, the Examiner did not consider any of these references.
`
`C. Claim Construction Under 37 C.F.R. § 42.104(b)(3)
`In the District Court Action, the patent owner has taken the position that the
`
`term “self-authenticating data” should be construed to mean “data that can assist
`
`the mobile device in determining if it is eligible to gain access to a particular
`
`asset.”1 (Ex. 1003, at A16-A17.) As explained further below, the prior art relied
`
`upon in this petition meets patent owner’s proposed construction of this term in the
`
`District Court Action.
`
`Summary of Prior Art References Relied Upon
`
`D.
`Petitioner relies upon the following prior art references, for which full
`
`citations are provided in the Table of Exhibits above:
`
`1.
`
`Libin
`
`
`1 Any claim constructions discussed in this IPR do not reflect Petitioner’s view as
`
`to the proper constructions for litigation before a district court or any other
`
`proceeding, and Petitioner expressly reserves the right to present different claim
`
`constructions during litigation.
`
`
`
`5
`
`

`

`
`
`Libin (Ex. 1004) discloses a security system in which access codes are
`
`provided to a wireless device, and then the wireless device can transmit the access
`
`codes to a controller that actuates the security system (e.g., unlocks a door). (See,
`
`e.g., Ex. 1004, Abstract; see also FIG. 2). Figure 3 of Libin illustrates a computer
`
`workstation 42 used to transmit data and/or programming information updates (e.g.,
`
`access codes) to a cell phone 32. (See, e.g., Ex. 1004, 5:38-48.)
`
`
`
`The computer workstation 42 contains a first table 202 that has a plurality of
`
`entries corresponding to cell phone users (e.g., cell phone 32). (See, e.g., Ex. 1004,
`
`12:19-25, Fig. 11.) Each entry includes information for identifying the user and
`
`information needed to program the cell phone. (See, e.g., Ex. 1004, 12:19-25.)
`
`The generation module 206 of the computer workstation 42 receives data from the
`
`first table 204, along with other information, and then uses network 44 to provide
`
`appropriate programming information and access codes to the cell phone 32. (See,
`
`e.g., Ex. 1004, 12:33-50.)
`
`Nielsen
`
`2.
`Nielsen discloses “an access control system” for “managing a predetermined
`
`access right to a location.” (See, e.g., Ex. 1005, Abstract.) Similar to Libin,
`
`Nielsen describes programming “electronic key devices” with access codes, which
`6
`
`
`
`

`

`
`the “electronic key device” can transmit to a “lock control unit” for access. For
`
`example, figure 2b of Nielsen illustrates such a system including an “electronic key
`
`device 201, for example a mobile phone,” “lock control unit 221,” and “an access
`
`code management system 211.” (See, e.g., Ex. 1005, 11:46-12:20.)
`
`
`
`Nielsen discloses “access code management system 211 generates and administers
`
`the access codes.” (See, e.g., Ex. 1005, 12:27-28.) For example, “access code
`
`management system 211 transmits access codes to the electronic key device 201
`
`and/or the lock control unit 221” automatically. (See, e.g., Ex. 1005, 12:22-42.)
`
`Kärkäs
`
`3.
`Kärkäs discloses a security system similar to that in Libin and Nielsen.
`
`Kärkäs discloses “[t]he access device also includes wireless communication
`
`means . . . for providing the key and validity information to [another] party.” (See,
`
`e.g., Ex. 1006, Abstract.) According to Kärkäs, “if the key and validity
`
`information are determined by the other party to be valid access is provided.” (See,
`
`e.g., Ex. 1006, Abstract.)
`
`V. LEVEL OF ORDINARY SKILL IN THE ART
`7
`
`
`
`

`

`
`
`In light of the specification, the references of record, and other available
`
`evidence, a person of ordinary skill in the relevant field at the alleged time of
`
`invention of the ’778 patent would have an undergraduate degree in computer
`
`science or electrical engineering and two to three years of experience in the field,
`
`or an equivalent combination of education and experience. (See Ex. 1002, ¶ 31.)
`
`VI. CLAIMS 1-42 OF THE ’778 PATENT ARE UNPATENTABLE
`A detailed explanation of the relevance and manner of applying the prior art
`
`references to Claims 1-42 of the ’778 patent is provided below.
`
`A. Claims 1, 3-12, 14-16, and 20-42 are anticipated by Libin; claims 2,
`13, and 17-19 are rendered obvious by Libin in view of Nielsen
`
`Libin discloses each element of claims 1, 3-12, 14-16, and 20-42. Libin in
`
`view of Nielsen renders obvious each element of claims 2, 13, and 17-19. There is
`
`motivation to combine Libin and Nielsen. As noted, Libin discloses a security
`
`system in which access codes are provided to a wireless device, and the wireless
`
`device transmits the access codes to a controller that actuates the security system.
`
`(See, e.g., Ex. 1004, Abstract; see also FIG. 2.) Nielsen similarly discloses a
`
`system where an electronic key device is used to access a location by transmitting
`
`an access code to the lock control unit. (See, e.g., Ex. 1005, Abstract.) Because
`
`the systems of Libin and Nielsen have similar structure and provide similar
`
`functionality (e.g., allowing an electronic device to transmit codes to a lock
`
`controller in order to gain access), one of skill in the art would be readily
`
`motivated to incorporate Nielsen’s methods of distributing access codes and
`8
`
`
`
`

`

`
`reporting activity into the system of Libin to yield the predictable variations in
`
`such distribution and reporting within the security systems. (See, e.g., Ex. 1002, ¶¶
`
`53-56.)
`
`1.
`
`Claim 1
`
`a.
`
`[1a.] A method of remotely maintaining a secure
`access system, comprising:
`
`Libin discloses a secure access system: “a security system 30 includes the
`
`doors 24, 24', 24'' and the controllers 26, 26', 26'' . . . The system 30 also includes a
`
`cell phone 32 that may transmit access codes to one or more of the controllers 26,
`
`26', 26'' to cause a corresponding one of the doors 24, 24', 24'' to open and allow
`
`access to a restricted area.” (See, e.g., Ex. 1004, 4:48-54.) Libin discloses
`
`maintaining the secure access system by programming the cell phone 32 with the
`
`access codes used for gaining access to the restricted areas. (See, e.g., Ex. 1004,
`
`4:48-57, 5:38-54, FIGS. 2-3.) (See, e.g., Ex. 1002, ¶ 57.)
`
`b.
`
`[1b.] receiving, at a secure access system controller, a
`credential update for at least one user of the secure
`access system;
`
`Libin discloses a secure access controller system, the workstation 42, that
`
`controls programming the cell phone 32. The workstation 42 stores a first table
`
`202 that lists the users of the security system and a second table 204 that contains
`
`the access codes for the security system. (See, e.g., Ex. 1004, 12:32-37, FIG. 11.)
`
`The workstation 42 includes a generation module 206 that receives a credential
`
`update, authorization information, that “indicates to the generation module which
`9
`
`
`
`

`

`
`of the users from the first table 202 is to have his cell phone programmed with
`
`which access codes from the second table 204.” (See, e.g., Ex. 1004, 5:63-6:17,
`
`FIG. 4.) The updates may be periodic, causing new access codes to be sent to the
`
`cell phone 32. (See, e.g., Ex. 1004, 6:67-7:3 (“as long as a user who has
`
`possession of the cell phone 32 is authorized for a particular type of access, new
`
`access codes may be periodically sent to the cell phone 32 as appropriate.”)) (See,
`
`e.g., Ex. 1002, ¶¶ 58-60.)
`
`c.
`
`[1c.] in response to receiving the credential update,
`said controller automatically initiating a system
`update process, the system update process
`comprising:
`
`Libin discloses that in response to receiving the authorization information
`
`206, the workstation 42 automatically initiates a system update process when
`
`“[t]he generation module 206 interfaces with the network 44 to provide appropriate
`
`programming information/access codes to the cell phone 32.” (See, e.g., Ex. 1004,
`
`12:47-50) Libin discloses that the update process is automatic because, after
`
`receiving the authorization information, the generation module 206 transmits the
`
`programming information/access codes to cell phone 32 without requiring any
`
`party to request transmission of the programming information/access codes. (See,
`
`e.g., Ex. 1002, ¶¶ 61-62.)
`
`d.
`
`[1d.] generating a message comprising information
`representing the credential update;
`
`
`
`10
`
`

`

`
`
`Libin discloses generating a message comprising information representing
`
`the credential update, the programming information/access codes, that represents
`
`the access granted by the authorization information: “The generation module 206
`
`also receives authorization information data that indicates to the generation
`
`module which of the users from the first table 202 is to have his cell phone
`
`programmed with which access codes from the second table 204. . . . The
`
`generation module 206 interfaces with the network 44 to provide appropriate
`
`programming information/access codes to the cell phone 32.” (See, e.g., Ex. 1002,
`
`12:33-50 (emphasis added).) (See, e.g., Ex. 1002, ¶¶ 63.)
`
`e.
`
`[1e.] determining at least one target for said message,
`wherein said at least one target comprises at least one
`mobile device associated with the at least one user;
`and
`
`Libin discloses determining at least one target, a cell phone, for the
`
`programming information/access codes based on the authorization information:
`
`“The generation module 206 also receives authorization information data that
`
`indicates to the generation module which of the users from the first table 202 is to
`
`have his cell phone programmed with which access codes from the second table
`
`204. . . . The generation module 206 interfaces with the network 44 to provide
`
`appropriate programming information/access codes to the cell phone 32.” (See,
`
`e.g., Ex. 1002, 12:33-50 (emphasis added).) (See, e.g., Ex. 1002, ¶ 64.)
`
`f.
`
`[1f.] transmitting said message to said at least one
`target; and
`
`
`
`11
`
`

`

`
`
`Libin discloses transmitting the programming information/access codes to
`
`the target cell phone: “The generation module 206 interfaces with the network 44
`
`to provide appropriate programming information/access codes to the cell phone 32.”
`
`(See, e.g., Ex. 1002, 12:48-50.) (See, e.g., Ex. 1002, ¶ 65.)
`
`g.
`
`[1g.] wherein said at least one mobile device has a first
`set of credential data stored thereon,
`
`Libin discloses the cell phone stores, e.g., access codes in the access code
`
`data element 62. (See, e.g., Ex. 1004, 6:30-41, FIG. 5.) As noted above with
`
`respect to claim element [1a.], the access codes are the credentials provided to
`
`controllers 26, 26', 26'' to gain access to restricted areas. Libin further discloses
`
`cell phone 32 receiving new access codes while storing other access codes. (See,
`
`e.g., Ex. 1004, 6:67-7:3 (“as long as a user who has possession of the cell phone 32
`
`is authorized for a particular type of access, new access codes may be periodically
`
`sent to the cell phone 32 as appropriate.”)) (See, ex. 1002, ¶ 66-67.)
`
`h.
`
`[1h.] wherein upon receiving said message from said
`controller, said first set of credential data is changed
`to a second different set of credential data,
`
`Libin discloses that upon reception, “the access codes are stored in the cell
`
`phone 32 in, for example, the access code data element 62.” (See, e.g., Ex. 1004,
`
`11:24-29, FIG. 10.) By storing the new access codes with those access codes
`
`already stored in the access code data element 62, the access codes stored in access
`
`code data element 62 become a different set of credential data. (See, e.g., Ex. 1002,
`
`¶ 68.)
`
`
`
`12
`
`

`

`
`
`i.
`
`[1i.] wherein said message is transmitted to said at
`least one mobile device without receiving a request for
`said message from said at least one user,
`
`Libin discloses that after receiving the authorization information, the
`
`generation module 206 transmits the programming information/access codes to the
`
`cell phone. (See, e.g., Ex. 1004, 12:32-50, FIG. 11.) Libin describes that the
`
`generation module 206 transmits the programming information/access codes to cell
`
`phone 32 without requiring any party request transmission of the programming
`
`information/access codes. (See, e.g., Ex. 1002, ¶ 69.)
`
`j.
`
`[1j.] wherein said at least one mobile device is a smart
`mobile device,
`
`Libin discloses at least one mobile device is a smart mobile device, e.g., a
`
`cell phone. (See, e.g., Ex. 1004, 4:48-57, FIG. 2.) (See, e.g., Ex. 1002, ¶ 70.)
`
`k.
`
`[1k.] wherein said first set of credential data
`comprises self-authenticating data,
`
`Libin discloses two forms of “self-authenticating data,” i.e., data that can
`
`assist the cell phone 32 in determining if it is eligible to gain access to a particular
`
`asset (e.g., the correct access codes for a controller 26). First, Libin discloses the
`
`cell phone 32 “determine[s] which of the access codes from the access codes data
`
`element 62 should be transmitted” to the controller. (See, e.g., Ex. 1004, 7:29-8:3,
`
`FIG. 7.) As a part of this process, “it is determined if the reader (e.g., the card
`
`reader associated with the controller 26) has provided location information to the
`
`cell phone 32.” (See, e.g., Ex. 1004, 7:45-47, FIG. 7.) Libin discloses “the
`
`
`
`13
`
`

`

`
`number of possible access codes is reduced based on information from the reader,”
`
`for example “if the reader indicates that the reader is in a particular city, access
`
`codes for other cities are not to be used, and thus are eliminated as possible access
`
`codes to transmit.” (See, e.g., Ex. 1004, 7:52-59, FIG. 7.) Accordingly, Libin
`
`inherently discloses location data, stored on the cell phone 32, that is associated
`
`with the access codes. This location data is compared to the information received
`
`from the reader to determine if the cell phone 32 has a possible access code for the
`
`reader. (See, e.g., Ex. 1004, 7:52-59, FIG. 7.) Accordingly, the location data can
`
`assist the cell phone 32 in determining if it is eligible to gain access to a particular
`
`asset by determining if cell phone 32 has a possible code for a particular controller
`
`26. (See, e.g., Ex. 1002, ¶¶ 71-73)
`
`Second, Libin discloses that access codes can have an associated expiration
`
`data. (See, e.g., 7:20-23 (“[f]or some or all of the access codes in the access code
`
`data element 62, the expiration data 66 may have a corresponding expiration
`
`date”).) Libin further describes cell phone 32 deletes an access code if the access
`
`codes has expired. (See, e.g., Ex. 1004, 9:51-55 (cell phone 32 “determin[es] if the
`
`Ith access code has expired. The test at the step 104 may be fairly straight-forward
`
`and may include, for example, comparing the current date with the expiration date
`
`stored in the expiration data element 66”).) Accordingly, the expiration data can
`
`assist the cell phone 32 in determining if it is eligible to gain access to a particular
`
`
`
`14
`
`

`

`
`asset by determining if the access code for the reader has expired. (See, e.g., Ex.
`
`1002, ¶¶ 71, 74.)
`
`l.
`
`[1l.] wherein said second set of credential data
`comprises different self-authenticating data, and
`
`Libin discloses said second set of credential data comprises different self-
`
`authenticating data by disclosing receiving new programming information/access
`
`codes, as discussed with respect to limitation [1h]. (See, e.g., Ex. 1004, 11:4-33,
`
`FIG. 10.) For example, Libin discloses “new access codes may be periodically
`
`sent to the cell phone 32 as appropriate.” (See, e.g., Ex. 1004, 7:2-3.) As
`
`discussed above with respect to limitation [1k.], the programming
`
`information/access codes constitute self-authenticating data. (See also, e.g., Ex.
`
`1004, 11:61-12:18.) (See, e.g., Ex. 1002, ¶ 75.)
`
`m.
`
`[1m.] wherein said self-authenticating data enables
`said at least one mobile device to make a
`determination of its own access rights with respect to
`an asset.
`
`Libin discloses the location information and/or the expiration data enables
`
`the cell phone 32 to make a determination of its own access rights with respect to
`
`an asset, as discussed above with respect to element [1k]. (See, e.g., Ex. 1002, ¶
`
`76.)
`
`
`
`2.
`
`Claim 2. [2.] The method of claim 1, wherein the system
`update process further comprises transmitting said message
`to at least one of a reader and a database.
`
`15
`
`

`

`
`
`Nielsen discloses transmitting access codes to a reader, the lock control unit:
`
`“transmit[ting] access codes to . . . the lock control unit 221” “automatically,”
`
`rendering this element obvious for the reasons set forth in section VI(A). (See, e.g.,
`
`Ex. 1005, 12:29-33.) (See, e.g., Ex. 1002, ¶¶ 77-78.)
`
`3.
`
`Claim 3. [3.] The method of claim 1, wherein said first set of
`credential data has at least one of a key, password, unique
`ID, encryption scheme, and transmission protocol that is
`different in said second set of credential data.
`
`As discussed above with respect to claim limitation [1h] above, Libin
`
`discloses the first set of credential data is different than the second set of credential
`
`data. (See, e.g., Ex. 1004, 6:64-7:30; 11:4-33, FIG. 10.) Libin discloses the sets of
`
`credential data contain different access codes, which are keys because they are
`
`used by cell phone 32 to verify its authenticity to controllers 26. (See, e.g., Ex.
`
`1004, 6:64-7:30; 8:9-12; 11:4-33, FIG. 10.) (See, e.g., Ex. 1002, ¶ 79.)
`
`4.
`
`Claim 4. [4.] The method of claim 1, further comprising, in
`the event that said at least one mobile device does not receive
`said message and is subsequently presented to a reader,
`determining, by said reader, that said at least one mobile
`device is invalid.
`
`Libin discloses in the event that cell phone 32 does not receive the message
`
`containing new access codes sent periodically, the stored codes will be expired.
`
`(See, e.g., Ex. 1004, 6:64-7:10; 2:59-60 (“The first set of access codes provided to
`
`the wireless device may expire.”).) Libin further discloses that such expired codes
`
`sent to a reader will not be accepted. (See, e.g., Ex. 1004, 1:30-39, 6:64-7:10.)
`
`(See, e.g., Ex. 1002, ¶¶ 80.)
`
`
`
`16
`
`

`

`
`
`5.
`
`Claim 5. [5.] The method of claim 1, wherein said credential
`updates are received at the controller on a periodic basis.
`
`Libin discloses said credential updates are received at the controller on a
`
`periodic basis by disclosing distributing new access code monthly. (See, e.g., Ex.
`
`1004, 11:59-66.) (See, e.g., Ex. 1002, ¶ 81.)
`
`6.
`
`Claim 6
`
`a.
`
`b.
`
`[6a.] The method of claim 1, further comprising:
`
`[6b.] receiving said message at said at least one mobile
`device; and
`
`Libin discloses receiving the programming information/access codes at the
`
`cell phone 32. (See, e.g., Ex. 1004, 11:4-9, FIG. 10 (“. . . chart 150 illustrates steps
`
`performed in connection with receiving new access codes . . .”).) (See, e.g., Ex.
`
`1002, ¶¶ 82.)
`
`c.
`
`[6c.] modifying at least a portion of memory of said at
`least one mobile device according to said updated
`credential information.
`
`Libin discloses cell phone 32 contains a memory including the access code
`
`data element 62 that stores access codes. (See, e.g., Ex. 1004, 6:39-41.) Libin
`
`discloses modifying the access code data element 62 by storing the received access
`
`codes in the access code data element of the cell phone. (See, e.g., Ex. 1004,
`
`11:24-29 (“. . . the access codes are stored in the cell phone 32 in, for example, the
`
`access code data element 62.”).) (See, e.g., Ex. 1002, ¶ 83.)
`
`7.
`
`Claim 7. [7.] The method of claim 6, wherein said modifying
`comprises at least one of disabling and revoking at least a
`portion of said memory.
`17
`
`
`
`

`

`
`
`Libin also discloses disabling a portion of the access code data element 62
`
`by deleting access codes. Libin discloses “examining each of the expiration dates
`
`and, in response to a particular expiration date being prior to a current date, erasing
`
`from the wireless device a particular one of the first set of access codes that
`
`corresponds to the particular expiration date.” (See, e.g., Ex. 1004, 2:3-7) (See
`
`also, e.g., Ex. 1004, 10:1-8.) (See, e.g., Ex. 1002, ¶¶ 84.)
`
`8.
`
`Claim 8. [8.] The method of claim 6, further comprising:
`disabling at least a portion of said memory unless an
`enabling message is received.
`
`As described with respect to claim [7], Libin discloses disabling at least a
`
`portion of said memory by erasing access codes if they are expired. Libin further
`
`discloses that cell phone 32 can receive an enabling message, a message including
`
`a new expiration date. (See, e.g., Ex. 1004, 10:1-4 (“The expiration dates
`
`associated with access codes . . . may be provided separately [from access codes] at
`
`different times.”)) (See also, e.g., Ex. 1004, 9:50-10:8, FIG. 6, FIG. 8.)
`
`Accordingly, Libin discloses erasing access codes if they are expired, unless a new
`
`expiration date is received by the cell phone 32. (See, e.g., Ex. 1002, ¶ 85.)
`
`9.
`
`Claim 9. [9.] The method of claim 1, further comprising de-
`enrolling a user of at least one mobile device from an access
`list, wherein said credential update is generated in response
`to de-enrolling said user from said access list.
`
`Libin discloses de-enrolling a user of at least one mobile device from an
`
`access list by periodically deleting users: “the creation and deletion of special
`
`purpose users may be automated so that, for example, old special purpose users are
`18
`
`
`
`

`

`
`revoked and new special purpose users are created at set periods of time or after
`
`significant events (e.g., after every N times the cell phone 32 is programmed).”
`
`(See, e.g., Ex. 1004, 12:13-18.) In connection with periodically revoking users,
`
`Libin describes a credential update being generated that provides new access
`
`codes: “The frequency that special purpose user codes are changed is a matter of
`
`policy . . .” (See, e.g., Ex. 1004, 11:66-67.) (See, e.g., Ex. 1002, ¶ 86.)
`
`10. Claim 10. [10.] The method of claim 1, wherein said
`message is transmitted over a cellular communication
`network.
`
`Libin discloses transmitting the programming information/access over a
`
`cellular telephone network. (See, e.g., Ex. 1004, 5:38-54, FIG. 3.) (See, e.g., Ex.
`
`1002, ¶ 87.)
`
`11. Claim 11. [11.] The method of claim 1, wherein said
`message is transmitted by at least one of a radio frequency
`signal an

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket