throbber
UNITED STATES PATENT AND TRADEMARK OFFICE
`
`BEFORE THE PATENT TRIAL AND APPEAL BOARD
`
`
`
`——————
`
`ALARM.COM INC.
`Petitioner
`
`v.
`
`VIVINT, INC.
`Patent Owner
`
`——————
`
`Case IPR2016-00116
`Patent 6,147,601
`
`——————
`
`
`PETITIONER’S REPLY TO PATENT OWNER’S RESPONSE
`
`
`
`
`
`
`
`

`
`Case IPR2016-00116 of
`U.S. Patent No. 6,147,601
`
`TABLE OF CONTENTS
`
`
`I.
`
`SHETTY TEACHES A MESSAGE PROFILE CONTAINING
`OUTGOING MESSAGE ROUTING INSTRUCTIONS .....................1
`
`A. Vivint's Proposed Construction Of “Message Profile”
`Should Again Be Rejected. .........................................................1
`
`B.
`
`Even Applying Vivint’s Incorrect Construction, Shetty
`Teaches a Message Profile. .........................................................3
`
`II.
`
`SHETTY TEACHES REMOTE CONFIGURATION OF THE
`MESSAGE PROFILE ...........................................................................4
`
`A.
`
`B.
`
`Shetty Teaches Configuration of a Message Profile via a
`User Interface. .............................................................................4
`
`Shetty Discloses Remote Configuration, as Further
`Confirmed by the Disclosure of HP-UX. ....................................7
`
`C. Modifying Shetty’s Remote Access to Include
`Configuration Was Obvious and Well within the Skill
`Level of a POSA. ........................................................................9
`
`III. SHETTY DISCLOSES THE CLAIMED COMMUNICATION
`DEVICE IDENTIFICATION CODES .............................................. 15
`
`A.
`
`The ’601 Patent’s Preferred Embodiment, and Indeed Only
`Disclosure of “Communication Device Identification
`Codes”, Is the Storage of Phone Numbers and Email
`Addresses. ................................................................................ 16
`
`B. As a Matter of Law, “Communication Device
`Identification Code” Must Be Construed Broadly Enough
`to Include Phone Numbers and Email Addresses. ................... 17
`
`IV. SHETTY AND LEVAC RENDER OBVIOUS THE “TIME”
`LIMITATIONS OF CLAIMS 19 and 20 ........................................... 20
`
`A.
`
`Specifying the Runtime for a Message Results in Sending
`Outgoing Messages at Certain Times. ..................................... 21
`
`B. A POSA Had Motivation to Combine Shetty and Levac. ....... 22
`
`V.
`
`SHETTY AND BRITTON RENDER OBVIOUS THE “NORMAL
`STATUS” CLAIMS ........................................................................... 23
`
`A.
`
`The Parallel Operation of the Britton and ’601 Normal
`Status Functions. ...................................................................... 24
`
`
`
`ii
`
`

`
`B. Alarm.com’s Proposed Combination Does Not Require
`Modification of Britton’s Check-In Messages. ........................ 26
`
`VI. CONCLUSION .................................................................................. 27
`
`Case IPR2016-00116 of
`U.S. Patent No. 6,147,601
`
`
`
`Page | iii
`
`

`
`Case IPR2016-00116 of
`U.S. Patent No. 6,147,601
`I. SHETTY TEACHES A MESSAGE PROFILE CONTAINING
`OUTGOING MESSAGE ROUTING INSTRUCTIONS
`
`Claims 1 and 22 of the ’601 Patent disclose a “message profile”, which the
`
`Board correctly construed as a “data record including instructions specifying at
`
`least one communication device to which an outgoing message can be routed in
`
`response to an incoming exception message”. Institution Decision, 14. Vivint
`
`disagrees, but its proposed construction is meritless. See infra § I.A. Because the
`
`Board’s construction “take[s] into consideration” the problem the ’601 Patent was
`
`directed at and is the Broadest Reasonable Interpretation of the term, it is correct.
`
`Patent Owner’s Resp., 32-35 (citations omitted) (“Response”). However, under
`
`either the Board’s or Vivint’s construction, Shetty teaches a “message profile”.
`
`A. Vivint’s Proposed Construction Of “Message Profile” Should
`Again Be Rejected.
`
`Vivint contends that “message profile” should be construed as a “data record
`
`including instructions specifying which communication device associated with
`
`which individuals an outgoing message can be routed in response to an incoming
`
`exception message”. Response, 32.
`
`Vivint largely rehashes arguments the Board previously rejected in its
`
`Institution Decision. Patent Owner’s Prelim. Resp., 7-9 (arguing that Patentee was
`
`his own lexicographer and urging similar construction); Response, 33-35. Those
`
`
`
`

`
`arguments should be rejected once again for the same reasons the Board previously
`
`Case IPR2016-00116 of
`U.S. Patent No. 6,147,601
`
`articulated:
`
`1) Vivint’s construction proposes an “uncommon definition”. No such
`
`“uncommon definition” is found in the Patent. Institution Decision, 12-13.
`
`2) The ’601 Patent’s teachings “at most reflect[] that ‘a list of who to contact
`
`via what means depending on which fault has occurred’ could be”—not must be—
`
`“an example of a message profile”. Id.
`
`Vivint cites the language of the ’601 Patent, stating that “[s]uch a list of who
`
`to contact via what means ... may be referred to as a ‘message profile’” (Response,
`
`33), but this adds nothing. Such a list indeed fits within the Board’s construction,
`
`but adds no support for a limitation requiring that a message profile identify
`
`individuals. Institution Decision, 12-13; Ex. 1130, ¶¶18-26.
`
`Lines 4:39-47 of the ’601 Patent likewise do not support Vivint’s narrower
`
`construction of “message profile”. Response, 34. That passage identifies several
`
`implementation details of the preferred embodiment that are not limitations of the
`
`independent claims: a user account; accessing a server via the internet; specifying
`
`types of communication devices and the specification of multiple individuals. To
`
`make such details part of the term construction improperly imports the
`
`specification into the claims. Petition, 7-8; Ex. 1130, ¶¶27-34.
`
` 2
`
`
`
`
`
`

`
`Case IPR2016-00116 of
`U.S. Patent No. 6,147,601
`
`As such, Vivint’s proposed construction of the “message profile” term
`
`should be rejected.
`
`B.
`
`Even Applying Vivint’s Incorrect Construction, Shetty Teaches a
`Message Profile.
`
`Even if a message profile could properly be construed to require a “list of
`
`who to contact” (which would be inconsistent with the BRI of this term), Shetty
`
`still discloses this element.
`
`Shetty discloses a “user profile database,” Ex. 1103, 2:18-21, containing one
`
`or more separate profiles each associated with a user (“[e]ach profile of each
`
`user”), each of which “may also trigger a different mode or modes of
`
`communication”. Id., 2:53-60. Shetty teaches a “batch processing means” that
`
`compares all of the “events” on the server with all of the user profiles, sending
`
`notifications when “all the conditions” of user profiles are met. Id., 2:38-45;
`
`Ex. 1130, ¶¶40-41. From these disclosures, a POSA would understand that the
`
`Shetty system may be configured such that when a particular event occurs,
`
`specified individuals would be notified via specified media/devices. Ex. 1130,
`
` 3
`
`
`
`¶¶38-43.
`
`
`
`

`
`II. SHETTY TEACHES REMOTE CONFIGURATION OF THE MESSAGE
`PROFILE
`
`Contrary to Vivint’s arguments (Response, 8, 11-12), Shetty teaches a user
`
`Case IPR2016-00116 of
`U.S. Patent No. 6,147,601
`
`interface for remote configuration of a message profile.
`
`A.
`
`Shetty Teaches Configuration of a Message Profile via a User
`Interface.
`
`Vivint speciously argues that “Shetty does not teach a customizable system”
`
`because Shetty does not expressly use the word “customizable”. Response, 9-10.
`
`However, Shetty describes a system designed to handle the monitoring of an
`
`arbitrary set of sensors of an arbitrary fleet of machines, maintaining multiple user
`
`profiles that determine whether, when and how each user will be notified of events
`
`specified individually in each profile. Ex. 1103, 1:52-2:61. This is a description of
`
`a system that not only may be, but must be, customized and “configured”.
`
`Ex. 1130, ¶¶45-50; Ex. 1118, 48:9-18. To say otherwise is to ignore the plain
`
`sense of Shetty as it would be understood by a POSA—all because the drafter did
`
`not use one particular word.
`
`Shetty further discloses a “user interface [that] allows a user to access ... the
`
`user profile database” that contains the “user profiles” that specify when and how
`
`each user will receive notifications. Ex. 1103, Abstract, 2:18-21, 2:33-36, 2:41-45,
`
`FIG 1. Vivint nevertheless argues that Shetty does not disclose permitting the user
`
` 4
`
`
`
`
`
`

`
`Case IPR2016-00116 of
`U.S. Patent No. 6,147,601
`
`to “configure” user profiles, because “accessing” and “configuring” the contents of
`
`a database are not coextensive in meaning. This is a logical error, because while
`
`indeed not “coextensive,” “configuring” is a subset of what one may do if one has
`
`“access” to such a database. Vivint’s citation to In re Magna Carta and argument
`
`concerning how the ’601 Patent does not use the terms “access” and
`
`“configuration” co-extensively are inapposite, as the question is whether Shetty’s
`
`“access” discloses the ’601 Patent’s “configuration”. Response, 12; Ex. 1130,
`
`¶¶73-74. And the answer to that question is an unequivocal yes.
`
`Vivint concedes this, acknowledging that “updat[ing]” (i.e., modifying) the
`
`contents of a database is one “level[] of access” or “access operation[]”, unless that
`
`access is somehow “controlled”. Response, 13. Vivint and its expert speculate
`
`that in some cases users “may” only be permitted access to a database for limited
`
`purposes (id.; Ex. 2010, ¶76)—but Shetty describes user access to user profiles
`
`without suggesting any limitation/restriction on operations that users can perform.
`
`Ex. 1130, ¶¶52-55.
`
`Petitioner’s expert Mr. Zatarain explains that a POSA would understand
`
`“access” as used in Shetty includes the ability to input and “configure” user
`
`profiles. Vivint’s expert concedes that in this context inputting is a form of
`
`configuring. Ex. 1118, 50:3-24. This is all the more true given that Shetty does
`
` 5
`
`
`
`
`
`

`
`Case IPR2016-00116 of
`U.S. Patent No. 6,147,601
`
`disclose a user interface providing “access” to the user profile database and does
`
`not suggest any other means (or agent) to configure user profiles. Ex. 1130, ¶¶54-
`
`55, 57-59, 62-68.
`
`In addition, Shetty’s express teaching of “access” immediately adjacent to a
`
`teaching of “also allowing the user to input information” establishes that the
`
`concept of “access” includes at least the ability to input information into the fleet
`
`and machine database.
`
`“A user interface 110 allows a user to access both the
`
`user profile database 106 and the event database 108. The
`
`user interface 110 also allows the user to input
`
`information relating to the fleet or machine data.”
`
`Ex. 1103, 2:34-37 (emphasis added); Petition, 16. In fact, a POSA would
`
`understand from the word “also” that the user could perform the function of
`
`“inputting information” into all three of the databases (the “user profile”, “event”,
`
`and “fleet and machine” databases), in addition to “accessing” information in those
`
`databases. Ex. 1130, ¶¶69-72; 80-84.
`
`Mr. Zatarain’s opinion in regard to a POSA’s understanding of Shetty’s use
`
`of “access” is informed and supported by four contemporaneous technical
`
`dictionaries, which confirm that a POSA would understand that “access”
`
`encompasses both reading/writing data.
`
` 6
`
`
`
`
`
`

`
`Case IPR2016-00116 of
`U.S. Patent No. 6,147,601
`• Ex. 1126.0006: “(A) The process of obtaining data from or placing
`
`data into a storage device. ... (B) To obtain data from or place data
`
`into a storage device as in (A).
`
`• Ex. 1127.0005: “access ... (4) To obtain data from or to put data in
`
`storage.”
`
`• Ex. 1128.0006: “[COMPUT SCI] The reading of data from storage or
`
`the writing of data into storage.”
`
`• Ex. 1129.0005: “To gain entry to memory in order to read or write
`
`data.”
`
`Ex. 1130, ¶56.
`
`In short, Petitioner is not relying on “inherency” (Response, 13), but on the
`
`plain words and disclosure of Shetty. Shetty teaches user access to the user profile
`
`database, and in the context of the Shetty system, this access includes
`
`configuration of user profiles.
`
`B.
`
`Shetty Discloses Remote Configuration, as Further Confirmed by
`the Disclosure of HP-UX.
`
`Rehashing an argument rejected by the Board in its Institution Decision (at
`
`23-25), Vivint again wrongly contends that even if Shetty discloses configuration
`
`of message profiles, it does not disclose remote configuration (Response, 17).
`
`Shetty expressly teaches that users may “access” data on a “data manager”
`
` 7
`
`
`
`
`
`

`
`Case IPR2016-00116 of
`U.S. Patent No. 6,147,601
`
`“via ... remote work stations”, which are depicted in Figure 4 as communicating
`
`with the data manager by modem-type connection. See § II.A; Petition, 17;
`
`Ex. 1130, ¶¶75-76, 82-84.; Ex. 1103, 4:8-10; Ex. 1118, 74:2-75:16. As discussed
`
`above, this access allows “configuration”.
`
`Vivint also incorrectly suggests that Shetty’s “remoteness” is limited to the
`
`retrieval of email. Response, 18-19. To the contrary, Shetty expressly states that
`
`users can “access the data stored on the third work station and receive electronic
`
`mail ...”. Ex. 1103, 4:8-10 (emphasis added). Vivint’s argument that HP-UX does
`
`not by itself teach remote access to a message profile (Response, 20) misses the
`
`point. HP-UX is an operating system, not application software, and Petitioner
`
`never contended that HP-UX itself discloses remote configuration. However, as
`
`Mr. Zatarain has explained, HP-UX is a multiuser network operating system
`
`specifically designed to support software and network operations such that a user
`
`may interact with software remotely. Thus, a POSA would see the use of HP-UX
`
`in the preferred embodiment as consistent with and confirming the network-based
`
`implementation depicted in Figure 4 and the remote access capability described in
`
`Shetty’s specification. Ex. 1107, ¶82; Ex. 1130, ¶¶85-88. More specifically, when
`
`Shetty further teaches that it is the “user interface 110” software—in connection
`
`with the specified HP-UX operating system—that “allows a user to access both the
`
` 8
`
`
`
`
`
`

`
`Case IPR2016-00116 of
`U.S. Patent No. 6,147,601
`
`user profile database 106 and the event database 108”, it is readily apparent to the
`
`POSA how the “access ... via ... remote work stations” disclosed in column 4 is
`
`achieved. Ex. 1130, ¶¶92-93.
`
`Vivint’s argument that HP-UX’s “remsh” command teaches away from
`
`running Shetty’s “user interface 110” remotely is a red herring and depends on a
`
`selective quotation by Vivint from Exhibit 2016. It may be true that the particular
`
`“remsh” command is not suited to remote execution of interactive commands in an
`
`HP-UX network system, but neither Shetty nor Petitioners mentioned “remsh”. In
`
`fact, other HP-UX commands do support remote execution of interactive software,
`
`as the very next sentence—omitted by Vivint—reveals:
`
`“Do not use remsh to run an interactive command, such
`
`as vi or more. With some interactive commands, remsh
`
`hangs. To run interactive commands, log into the remote
`
`host with rlogin [‘remote login’].”
`
`Ex. 2016, 13•14 (bold in original, italics added). The argument that HP-UX
`
`“teaches away” from remote access, is both baseless and false. Ex. 1130, ¶¶89-94.
`
`C. Modifying Shetty’s Remote Access to Include Configuration Was
`Obvious and Well within the Skill Level of a POSA.
`
`Even if Shetty had disclosed only local read-access to the user profile
`
`database, modifying Shetty to enable remote configuration of user profiles would
`
` 9
`
`
`
`
`
`

`
`Case IPR2016-00116 of
`U.S. Patent No. 6,147,601
`
`have been both obvious and well within a POSA’s skill level.
`
`i.
`
`Extending Shetty’s Remote Access to Include Configuration
`Was Obvious.
`
`There are only two basic means of access to a database stored on a network
`
`server: local (directly from the server) or remote. Ex. 1118, 72:5-15. There are
`
`only two basic “access” operations on a database: reading and writing. Ex. 1118,
`
`38:15-22. It should be undisputed that a POSA would understand Shetty to teach
`
`providing read/write access at least directly, so that the complex and user-specific
`
`user profiles described in column 2 may be input. It should be undisputed that
`
`Shetty teaches at least “read” access of the databases described in the disclosure
`
`“via . . . remote work stations”. Ex. 1103, 4:8-10. It is evident that Shetty at least
`
`taught three out of four of the possible modes of access: direct read-only; direct
`
`read/write; and remote read-only. The possibility of enabling remote write access,
`
`thereby enabling remote configuration is the single, supposedly missing capability.
`
`But, the convenience of enabling this capability in a system expressly designed to
`
`provide notifications to a plurality of remote users concerning a plurality of mobile
`
`machines through the notification means of each user’s choice would also have
`
`been obvious. Ex. 1130, ¶¶101-11.
`
`As the Supreme Court instructed in KSR International Co. v. Teleflex Inc.,
`
`
`
`10
`
`550 U.S. 398 (2007):
`
`
`
`

`
`Case IPR2016-00116 of
`U.S. Patent No. 6,147,601
`
`“When there is a design need or market pressure to solve
`
`a problem and there are a finite number of identified,
`
`predictable solutions, a person of ordinary skill has good
`
`reason to pursue the known options within his or her
`
`technical grasp. If this leads to the anticipated success, it
`
`is likely the product not of innovation but of ordinary
`
`skill and common sense.” Id., at 421.
`
`Here, the addition of a remote write capability, enabling remote
`
`configuration, would have been not merely one of a “finite number” of possibilities
`
`to enhance user convenience, but the only “missing link” in the system’s
`
`configuration capabilities. Ex. 1130, ¶¶112-15.
`
`As the Board has already concluded once, Vivint is wrong to dismiss this as
`
`hindsight. Response, 14; Prelim Resp., 47-49; Institution Decision, 24-25. As Mr.
`
`Zatarain explained, Shetty itself provided the motivation for and pointed to
`
`enabling remote configuration because it teaches remote notification and disclosed
`
`remote access to the data manager. Ex. 1107, ¶83; Ex. 1103, 2:41-45, 4:8-10, FIG
`
`2, FIG 4; Ex. 1130, ¶¶95-98. Further, remote configuration would have been
`
`suggested by commercially available, contemporaneous prior art systems, such as
`
`alarm auto-dialers, that already had these capabilities. Ex. 1107, ¶84; Ex. 1130,
`
`
`
`11
`
`¶¶99-100.
`
`
`
`

`
`Case IPR2016-00116 of
`U.S. Patent No. 6,147,601
`
`Vivint argues that none of these prior art systems singly taught remotely
`
`configuring a message profile, but Petitioner only argues that these prior art
`
`systems provide motivation to combine Shetty’s teachings. Because remote input
`
`of other types of configuration information in alarm systems was known, a POSA
`
`would have been motivated to do so for Shetty’s user profile database. Ex. 1130,
`
`¶¶99-100.
`
`Likewise, the art of record during prosecution of the ’601 Patent makes clear
`
`that configuration of message profiles specifically was well known. For instance,
`
`French (Ex. 1106) teaches configuration of a message profile. Likewise, U.S.
`
`Patent No. 5,400,246 (“Wilson”) (Ex. 1123), over which the ’601 Patent was
`
`initially rejected (Petition, 5-6; Ex. 1102.0065-66), also teaches message profile
`
`configuration, such as configuring a PC to dial the police or send a text message
`
`when a vehicle has been burglarized. Ex. 1123, 33:28-34:15; Ex. 1130, ¶¶129-31.
`
`Finally, as Mr. Zatarain also explained, HP-UX as early as 1984 both disclosed,
`
`made routine, and made it easy to support remote user interfaces. Ex. 1107, ¶82;
`
`Ex. 1130, ¶¶89-94. Therefore, unlike the challengers in Mintz and Stryker,
`
`Petitioner here did not support its modification simply by arguing that it was
`
`simple to do so, but with evidentiary support. Response, 14-15 (citing Mintz v.
`
`Dietz & Watson, 679 F.3d 1372 (Fed. Cir. 2012); Stryker Corp. v. Karl Storz
`
`
`
`12
`
`
`
`

`
`Case IPR2016-00116 of
`U.S. Patent No. 6,147,601
`
`Endoscopy-America, Inc., IPR2015-00677, Paper 15 (P.T.A.B. Sept. 2, 2015).
`
`ii.
`
`Extending Shetty’s Remote Access to Include Configuration
`Was Well within the Skill Level of a POSA and Required
`Only Routine Application of Well Known Techniques.
`
`As the above suggests, Vivint’s contentions about the difficulty of the
`
`modification are without merit. (Response, 16, 22) Indeed, no programming
`
`whatsoever would be needed. Because Shetty taught a program (“user interface
`
`110”) allowing for remote access (Ex. 1130, ¶126), only the routine application of
`
`well-known networking and user interface techniques would be required: the
`
`straightforward use of HP-UX’s rlogin [“remote log-in”] command to invoke
`
`Shetty’s user interface 110 (the particular program that “allows a user to access
`
`both the user profile database 106 and the event database 108”) from a remote
`
`terminal connected to the network would, without any additional steps, enable
`
`remote read/write access and thus remote configuration. Ex. 1103, 2:34-35;
`
`Ex. 1107, ¶85; Ex. 1130, ¶¶125-28.
`
`Vivint argues that modifying Shetty to allow for configuration of the profile
`
`database “introduces a host of issues with database integrity and security”
`
`(Response, 16), but this is an orthogonal concern not discussed in Shetty and
`
`irrelevant to the question of whether it was within the skill of a POSA to extend
`
`Shetty to include remote configuration. Any network system can be vulnerable to
`
`
`
`13
`
`
`
`

`
`Case IPR2016-00116 of
`U.S. Patent No. 6,147,601
`
`concerns about “database integrity and security,” and because Shetty describes a
`
`network-based system that provides for “access” to databases from “remote work
`
`stations,” including “input[ting] information relating to the fleet or machine data”
`
`(Ex, 1103, 2:35-37), it would not be immune to those concerns regardless of
`
`whether it enabled remote configuration. But the security steps that a POSA
`
`should or would take to strengthen the security of a remotely configurable
`
`monitoring system is not a topic addressed by either Shetty or the claims of the
`
`’601 Patent. That is a separate question and a separate art, and has no relevance to
`
`the validity of the claims of the ’601 Patent over Shetty. Ex. 1130, ¶¶119-24.
`
`iii. Vivint’s Other Criticisms Are Faulty.
`
`Vivint mischaracterizes three paragraphs of Mr. Zatarain’s declaration as not
`
`“cit[ing] to a single piece of corroborating evidence”. But those paragraphs do cite
`
`to corroborating evidence in Shetty, as Vivint admits in a footnote (Response, 24
`
`n.6). Specifically, Shetty explicitly teaches users using workstations remotely to
`
`access both a database server and a third workstation. Ex. 1103, 4:5-15. Shetty
`
`also teaches that users access the user profile database via a user interface. Id.
`
`2:34-35. As the Petition explained, it would be obvious to combine Shetty’s
`
`remote access teachings with Shetty’s teaching of user profile database access.
`
`
`
`14
`
`Pet. 16-17, 20-21.
`
`
`
`

`
`Case IPR2016-00116 of
`U.S. Patent No. 6,147,601
`
`Vivint then claims that Shetty’s teaching of remote notification of users does
`
`not provide a reason to combine the two teachings of Shetty. Response, 25-26.
`
`But Vivint overlooks the manifest import of Shetty’s remote notifications—that the
`
`users of Shetty are not expected to be present at the site of the data manager
`
`(reinforced by Shetty’s teaching of remote user workstations), which establishes
`
`the necessity for use of the user interface remotely. Ex. 1130, ¶¶96-98. Moreover,
`
`Vivint tries to incorporate the ’601 Patent’s specification, where a “contractor” has
`
`access to different system functionality than a “customer”, into Shetty. But
`
`interpreting Shetty based on teachings of the ’601 Patent is impermissible. See
`
`Graham v. John Deere Co., 383 U.S. 1, 36 (1966) (warning against “the temptation
`
`to read into the prior art the teachings of the invention in issue”). Shetty does not
`
`differentiate between classes of users, and the only explicit discussion of user
`
`access comes in the context of a user remotely accessing data on one computer
`
`from a different computer. Ex. 1103, 4:5-10; Ex. 1130, ¶¶81-84.
`
`And if anything, the opinions of Mr. Denning should be discounted because
`
`his expertise in database systems is limited. See Ex. 1130, ¶¶190-99.
`
`III. SHETTY DISCLOSES THE CLAIMED COMMUNICATION DEVICE
`IDENTIFICATION CODES
`
`Vivint incorrectly argues that Shetty does not disclose “communication
`
`device identification codes” (“CDICs”), as required by Claim 26. Response, 37-
`
`
`
`15
`
`
`
`

`
`Case IPR2016-00116 of
`U.S. Patent No. 6,147,601
`
`38. Because the disclosures in Shetty (storage of email addresses and telephone
`
`numbers in a user profile database) are identical to the preferred embodiment of the
`
`’601 Patent for this limitation, Shetty teaches CDICs. Ex. 1130, ¶¶132-35.
`
`In initiating this review with respect to Claim 26, the Board concluded that it
`
`was likely that Shetty does disclose use of CDICs within the meaning of the term
`
`in the ’601 Patent. Petitioner recognizes that in declining to institute review of
`
`U.S. Patent No. 6,462,654, the Board reached a contrary preliminary conclusion.
`
`Petitioner respectfully submits that a careful review of the preferred embodiment
`
`of the ’601 Patent will confirm that Shetty does disclose CDICs.
`
`A. The ’601 Patent’s Preferred Embodiment, and Indeed Only
`Disclosure of “Communication Device Identification Codes”, Is
`the Storage of Phone Numbers and Email Addresses.
`
`The term “communication device identification code” is not used in the
`
`specification of the ’601 Patent. Claim 26 identifies the CDIC as a component of
`
`the “user-defined message profiles”. The ’601 specification and description of the
`
`preferred embodiment repeatedly teach that what is stored in the message profile is
`
`information sufficient to identify “by which media (fax, e-mail, PCS) . . .
`
`individuals are to be notified” of exception conditions. 4:43-45; 7:50-58;
`
`Ex. 1130, ¶¶136-39.
`
`
`
`16
`
`
`
`

`
`Case IPR2016-00116 of
`U.S. Patent No. 6,147,601
`
`The term “device” is used in the specification in exactly one paragraph to
`
`provide teachings concerning the “user-defined communication device[s]” of the
`
`claims. In that paragraph, the specification describes the process of “deliver[y] to
`
`the specified end device or devices”. Ex. 1101, 6:7-9. Those devices are described
`
`as an “e-mail box”, “fax machine”, “pager or PCS” and “voice mail box”. Id.,
`
`6:10-21.
`
`Obviously, an “email box” is a logical rather than a physical “device” (but it
`
`is the only “e-mail receiving device” disclosed), different physical fax machines
`
`might be substituted on a fax line, and a call to a land-line telephone may ring
`
`multiple telephone devices within a home. Nevertheless, there is no teaching in the
`
`’601 Patent of storage in the “user message profile” of any CDIC more specific
`
`than, e.g., a telephone number, fax number, or email address. Nor is any possible
`
`utility for storing any such more specific CDIC suggested. Ex. 1130, ¶¶140-43.
`
`Moreover, these CDICs represent identifiers for all of the specific devices
`
`enumerated in claims 11 and 29.
`
`B. As a Matter of Law, “Communication Device Identification
`Code” Must Be Construed Broadly Enough to Include Phone
`Numbers and Email Addresses.
`
`In light of the details concerning the ’601 preferred embodiment reviewed
`
`above, any interpretation of “communication device identification code” that
`
`
`
`17
`
`
`
`

`
`Case IPR2016-00116 of
`U.S. Patent No. 6,147,601
`
`excludes “phone numbers” and “email addresses” cannot be the “broadest
`
`reasonable construction”, and thus would be inconsistent with 37 C.F.R.
`
`§ 42.100(b) and would also impermissibly exclude the preferred embodiment. The
`
`Federal Circuit has held that “a claim interpretation that excludes a preferred
`
`embodiment from the scope of the claim ‘is rarely, if ever, correct’”. Globetrotter
`
`Software, Inc. v. Elan Computer Grp., Inc., 362 F.3d 1367, 1381 (Fed. Cir. 2004)
`
`(quoting Vitronics Corp. v. Conceptronic, Inc., 90 F.3d 1576, 1583 (Fed. Cir.
`
`1996)); Hoechst Celanese Corp. v. BP Chems. Ltd., 78 F.3d 1575, 1580-81
`
`(Fed. Cir. 1996). The strong presumption that claim terms encompass preferred
`
`embodiments can only be overcome by “highly persuasive evidentiary support” to
`
`the contrary. Vitronics, 90 F.3d at 1583. Vivint has identified no such evidence
`
`here.
`
`As noted above, the Patent’s disclosures about the storage of phone numbers
`
`(pager, cellular telephone, fax) and “internet addresses” (email) are the only
`
`disclosure of storing any data about the communication devices. Ex. 1130, ¶¶140-
`
`43, 160-64. A POSA would recognize that a contractor entering message delivery
`
`information as described at 7:50-58 would, when wishing to identify a “user’s e-
`
`mail box” (6:14) as a destination, enter an email address rather than some other
`
`
`
`18
`
`
`
`

`
`Case IPR2016-00116 of
`U.S. Patent No. 6,147,601
`
`form of “internet addresses”, such as IP addresses, as IP addresses are not used to
`
`identify e-mail boxes. Ex. 1130, ¶¶152-59; Ex. 1118, 96:9-17, 79:9-22.
`
`The only disclosures of fixed and unique device identifiers in the ’601 Patent
`
`are not relevant. The ’601 Patent discloses the use of electronic serial numbers
`
`(“ESNs”) and mobile identification numbers (“MINs”) as identifiers for the
`
`interface unit. Ex. 1101, 4:25-31. However, with respect to the user-defined
`
`communication devices, there is no disclosure of the storage of serial numbers,
`
`ESNs/MSNs, MINs, MEIDs, IP addresses, MAC addresses or any other unique
`
`device identifiers in the ’601 Patent. Ex. 1130, ¶¶144-51.
`
`Vivint’s argument that an email address is not a CDIC (Response, 38)
`
`should also not be credited because it ignores basic claim interpretation principles.
`
`Claim 22 claims sending a message to “at least one predetermined user-defined
`
`remote communication device.” Claim 29 depends from Claim 22 and additionally
`
`claims “wherein said remote communication devices include at least ... an e-mail
`
`receiving device ...”. As such, the “communication device” of Claim 22 must be
`
`interpreted broadly to enough to include at least an “e-mail receiving device”. 35
`
`U.S.C. § 112(d). Both Claim 22 and 26 include the term “user-defined
`
`communication remote devices”. Because Claim 26 depends from Claim 22, the
`
`term in Claim 26 must be interpreted identically to Claim 22, as they are related
`
`
`
`19
`
`
`
`

`
`Case IPR2016-00116 of
`U.S. Patent No. 6,147,601
`
`claims. Fin Control Sys. Pty, Ltd. v. OAM, Inc., 265 F.3d 1311, 1318 (Fed. Cir.
`
`2001) (“[W]e begin with the presumption that the same terms appearing in
`
`different portions of the claims should be given the same meaning unless it is clear
`
`from the specification and prosecution history that the terms have different
`
`meanings at different portions of the claims.”). Thus, an email address must be a
`
`device identifier despite Vivint’s argument to the contrary. Response, 37-38.
`
`In sum, the preferred embodiment of the ’601 Patent clearly and repeatedly
`
`describes storing e-mail addresses and telephone numbers—and no other such
`
`CDICs—in message profiles to route messages properly. For this reason, a
`
`construction of “communication device identification codes” that does not include
`
`e-mail addresses and telephone numbers would exclude the preferred embodiment
`
`and cannot be correct.
`
`Because a POSA would understand Shetty’s user profile database stores
`
`such identifiers for all users, Shetty renders obvious the “communication device
`
`identification codes” limitation. Petition, 15-16; Ex. 1130, ¶¶164-66.
`
`IV. SHETTY AND LEVAC RENDER OBVIOUS THE “TIME”
`LIMITATIONS OF CLAIMS 19 AND 20
`
`The combination of Shetty and Levac discloses the “time” elements of
`
`claims 19 and 20 because Levac’s RUNTIME variable restricts the sending of
`
`
`
`20
`
`
`
`

`
`Case IPR2016-00116 of
`U.S. Patent No. 6,147,601
`
`outgoing exception messages to specific time periods, and a POSA would have
`
`been motivated to combine Shetty and Levac.
`
`A.
`
`Specifying the Runtime for a Message Results in Sending
`Outgoing Messages at Certain Times.
`
`Vivint asserts that Levac’s “method for scheduling the runtime of a message
`
`at some later time” “is sig

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket