throbber
Trials@uspto.gov
`571.272.7822
`
`
`Paper No. 11
`Filed: May 24, 2016
`
`
`
`UNITED STATES PATENT AND TRADEMARK OFFICE
`_______________
`
`BEFORE THE PATENT TRIAL AND APPEAL BOARD
`_______________
`
`SECURUS TECHNOLOGIES, INC.,
`Petitioner,
`
`v.
`
`JOHN D. PROFANCHIK, SR.,
`Patent Owner.
`_______________
`
`Case IPR2016-00268
`Patent 8,315,367 B2
`_______________
`
`Before KEVIN F. TURNER, BARBARA A. BENOIT, and
`GEORGIANNA W. BRADEN, Administrative Patent Judges.
`
`BRADEN, Administrative Patent Judge.
`
`DECISION
`Institution of Inter Partes Review
`37 C.F.R. § 42.108
`
`
`
`
`
`
`
`

`

`IPR2016-00268
`Patent 8,315,367 B2
`
`
`I.
`
`INTRODUCTION
`
`A. Background
`Securus Technologies, Inc. (“Petitioner”) filed a Petition (Paper 1,
`“Pet.”) to institute an inter partes review of claims 1–20 of U.S. Patent No.
`8,315,367 B2 (Ex. 1001, “the ’367 patent”). On the cover of its Petition for
`inter partes review, Petitioner indicated that Global Tel*Link Corporation
`was the patent owner. Global Tel*Link Corporation, however, informed the
`Board that John D. Profanchik, Sr. is the patent owner and real party-in-
`interest. Paper 4, 2; Paper 5, 1. John D. Profanchik, Sr. (“Patent Owner”)
`timely filed a Preliminary Response (Paper 5, “Prelim. Resp.”). We have
`jurisdiction under 35 U.S.C. § 314(a), which provides that an inter partes
`review may not be instituted “unless . . . there is a reasonable likelihood that
`the petitioner would prevail with respect to at least 1 of the claims
`challenged in the petition.”
`Upon consideration of the Corrected Petition, the Petition’s
`supporting evidence, Patent Owner’s Preliminary Response, and Patent
`Owner’s responsive pleading regarding amended citations found in the
`Corrected Petitioner (Paper 10) we conclude Petitioner has established a
`reasonable likelihood it would prevail with respect to at least one of the
`challenged claims. Accordingly, for the reasons that follow, we institute an
`inter partes review.
`B. Related Proceedings
`Petitioner informs us that no other related matters would affect or be
`affected by this proceeding. Pet. 59; see Paper 4, 2–3.
`
`2
`
`

`

`IPR2016-00268
`Patent 8,315,367 B2
`
`C. The ’367 Patent
`The ’367 patent discloses “systems and methods for preventing
`unauthorized persons from using an electronic device within a facility.”
`Ex. 1001, Abst. The ’367 patent teaches a radio frequency identification
`(RFID) system that identifies prison inmates within an RFID coverage zone
`during use of the telephone. The system determines whether the phone call
`can continue to proceed based on the proximity of one or more inmates to
`the telephone. Id. at 1:49–53, 2:16–20.
`One embodiment of the ’367 patent provides an RFID access system
`that includes RFID tags having unique identification information associated
`with wearers of the RFID tags. Id. at 2:39–41. The RFID tag “having
`unique identification information associated with a wearer of the RFID tag,”
`which may be contained in “a non-removable item worn by the wearer, such
`as a bracelet.” Id. at 2:40–43. RFID tags may be constructed such that they
`cannot be removed and are tamperproof. Id. at 5:26–28. The RFID system
`includes a reader having an RFID coverage zone for detecting RFID tags
`within the zone. Id. at 2:43–45. One embodiment of an RFID tag reader
`and RFID coverage zone is illustrated in Figure 2, reproduced below.
`
`
`
`3
`
`

`

`IPR2016-00268
`Patent 8,315,367 B2
`
`As shown above in Figure 2 of the ’367 patent, system 200 includes inmate
`telephone 210, RFID coverage zone 230, and RFID tag reader 240. Id. at
`5:36–38, Fig. 2. In this specific embodiment, RFID coverage zone 230 is
`generated around telephone 210 by RFID reader 240, which is integrated
`within telephone 210. Id. at 5:37–39.
`Another embodiment of the ’367 patent provides a call management
`system that connects the reader and determines whether wearers in the
`coverage zone are authorized to use the electronic device (e.g., a telephone)
`based on a detected RFID tag’s unique identification information. Id. at
`2:45–50, 7:19–21, cl. 1, Fig. 3. An example of a process by which an RFID-
`based access management system may be used to ensure only authorized
`person use an electronic device in a facility is shown in Figure 3, reproduced
`below.
`
`
`
`4
`
`

`

`IPR2016-00268
`Patent 8,315,367 B2
`
`As shown above in Figure 3 of the ’367 patent at step 350, the call
`management system deactivates the electronic device if it determines an
`unauthorized wearer is detected in the coverage zone. Id. at 2:50–52, 3:22–
`26, 7:25–28, Fig. 3.
`
`D. Illustrative Claims
`
`As noted above, Petitioner challenges claims 1–20 of the ’367 patent,
`of which claims 1 and 11 are the only independent claims. Claims 1 and 11
`are illustrative of the challenged claims and are reproduced below (with
`paragraphing):
`1. An access management system for preventing unauthorized
`persons from using an electronic communication device in a
`custodial facility, the system comprising:
`identification
`a RFID
`tag configurable
`to have unique
`information that can be associated with a wearer of the RFID
`tag, wherein the RFID tag is configured to be comprised in a
`non-removable item worn by the wearer;
`a reader configurable to be associated with the electronic
`communication device, the reader configurable to have a RFID
`coverage zone for detecting RFID tags within the coverage
`zone; and
`a call management system configurable to be connected to the
`reader and configurable to determine whether a wearer is
`authorized to use the electronic communication device based at
`least in part on an RFID tag's detected unique identification
`information;
`wherein the reader is configured to detect when the RFID tag is
`within the coverage zone, the call management system
`activating the electronic communication device if it determines
`the wearer is authorized to use the electronic communication
`device.
`
`Ex. 1001, 9:33–52.
`
`5
`
`

`

`the electronic
`
`IPR2016-00268
`Patent 8,315,367 B2
`
`11. A method of preventing unauthorized persons from using an
`electronic communication device in a custodial facility, the
`method comprising:
`providing a RFID tag configurable to have unique identification
`information that can be associated with a wearer of the RFID
`tag, wherein the RFID tag is configurable to be comprised in a
`non-removable item worn by the wearer;
`creating an RFID coverage zone around
`communication device;
`detecting when the RFID tag is within the coverage zone;
`determining whether the wearer of the RFID tag is authorized to
`use the electronic communication device based at least in part
`on the detected unique identification information; and
`activating the electronic communication device for use by the
`wearer of the RFID tag if it is determined that the wearer of the
`RFID tag is authorized to use the electronic communication
`device while the detected RFID tag is in the coverage zone.
`Id. at 10:16–35.
`E. The Evidence of Record
`Petitioner relies upon the following references, as well as the
`Declaration of Michael Caloyannides, Ph.D. (Ex. 1003):
`Reference
`Patent/Printed Publication
`Filing Date
`Polozola
`US Patent No. 8,031,052 B2
`Nov. 22, 2006
`Reinhold US Patent No. 7,494,061 B2
`June 30, 2006
`Csabai
`WO 2006/097775 A1
`July 21, 2005
`Hansen
`US Pub. No. 2006/0180647 A1 Feb. 11, 2005
`
`Exhibit
`1005
`1006
`1007
`1008
`
`F. The Asserted Grounds of Unpatentability
`Petitioner challenges the patentability of claims 1–20 of the ’367
`patent based on the following grounds:
`
`
`6
`
`

`

`IPR2016-00268
`Patent 8,315,367 B2
`
`
`References
`Polozola
`Polozola and Csabai
`Polozola and Hansen
`Reinhold, Csabai, and
`Polozola
`Reinhold, Csabai,
`Polozola, and Hansen
`
`Basis
`§ 102
`§ 103
`§ 103
`§ 103
`
`Claims Challenged
`1–7, 9–17, 19, and 20
`3 and 13
`4, 8, 14, and 18
`1–3, 5–7, 9–13, 15–17, 19, and 20
`
`§ 103
`
`4, 8, 14, and 18
`
`II. DISCUSSION
`
`A. Claim Construction
`In an inter partes review, claim terms in an unexpired patent are
`interpreted according to their broadest reasonable construction in light of the
`specification of the patent in which they appear. 37 C.F.R. § 42.100(b); see
`also In re Cuozzo Speed Techs., LLC, 793 F.3d 1268, 1275–79 (Fed. Cir.
`2015 (“Congress implicitly approved the broadest reasonable interpretation
`standard in enacting the AIA,” and “the standard was properly adopted by
`PTO regulation.”), cert. granted sub nom. Cuozzo Speed Techs., LLC v. Lee,
`136 S. Ct. 890 (mem.) (2016). Under that standard, and absent any special
`definitions, we give claim terms their ordinary and customary meaning, as
`would be understood by one of ordinary skill in the art at the time of the
`invention. In re Translogic Tech., Inc., 504 F.3d 1249, 1257 (Fed. Cir.
`2007). Our analysis in this Decision is not impacted by whether we apply
`the broadest reasonable interpretation or the Phillips standard.
`See Phillips v. AWH Corp., 415 F.3d 1303 (Fed. Cir. 2005).
`1. “non-removable item”
`The term “non-removable item” is recited expressly in claims 1, 8–11,
`and 18–20. Petitioner contends that the broadest reasonable interpretation of
`
`
`
`7
`
`

`

`IPR2016-00268
`Patent 8,315,367 B2
`
`the claim term “non-removable item” is “an item that cannot be removed by
`unauthorized persons without it ceasing to function properly.” Pet. 8–9
`(citing Ex. 1003 ¶¶ 42, 47). According to Petitioner, one of ordinary skill
`would not understand “non-removable item” to mean an item that can never
`be removed (id. ¶ 43), because the ’367 patent states that an RFID bracelet
`may be constructed so it “cannot be removed by unauthorized persons.” See
`Ex. 1001, 8:16–18; Ex. 1003 ¶ 44.
`Petitioner argues that ’367 patent supports its construction because the
`Specification describes a custodial facility environment, where (1) the “non-
`removable” bracelets must be removed when the wearer is released from the
`facility (Ex. 1003 ¶ 45), and (2) if tampering of a bracelet is detected, the
`bracelet will cease to function properly and would have to be removed and
`replaced (Ex. 1001, 8:48–63; Ex. 1003 ¶ 46). Pet 8. Petitioner, thus,
`concludes that one of ordinary skill in the art reading the ’367 patent would
`understand that the item should be non-removable by the wearer but should
`be removable by authorized personnel when necessary. Id. (citing Ex. 1003
`¶¶ 42, 45, 47).
`Patent Owner contests Petitioner’s proposed claim construction,
`explaining that the term is commonly understood and does not require
`construction. Prelim. Resp. 12. Nevertheless, Patent Owner argues that if
`the Board does construe the term, then one of ordinary skill in the art would
`understand it to mean “items that cannot be removed and are tamperproof.”
`Id. at 13.
`Based on the record before us, including the disclosure in the ’367
`patent of the term “non-removable item,” and crediting the testimony of Dr.
`Caloyannides regarding how the term would have been understood by one of
`
`8
`
`

`

`IPR2016-00268
`Patent 8,315,367 B2
`
`ordinary skill in the art, we are persuaded by Petitioner’s position.
`Therefore, we find the broadest reasonable construction of “non-removable
`item,” for purposes of this Decision, to be “an item that cannot be removed
`by unauthorized persons without it ceasing to function properly.”
`2. “RFID coverage zone”
`Patent Owner contends that the broadest reasonable interpretation of
`the claim term “RFID coverage zone” is “a zone of RFID coverage with a
`predetermined size.” Prelim. Resp. 13. Patent Owner argues that the ’367
`patent discloses that the RFID coverage zone can cover “any size,” where
`this size is predetermined and fixed. Id. (citing Ex. 1001, 5:50–56 (“RFID
`reader 240 would detect RFID tags that enter the predetermined RFID
`coverage zone 230 generated around the telephone 210. In one example the
`coverage zone 230 may be about 1.5m, however, any size coverage zone 230
`is envisioned. For example, the RFID reader 240 may be capable of reading
`RFID tags within a maximum range of 30 feet or longer, but alternatively,
`shorter distances may be desired in some applications.”)); see Ex. 1001,
`4:27–29, 6:40–43. Petitioner does not provide a proposed construction for
`this term.
`Although the Specification uses the term “RFID coverage zone” in
`connection with a predetermined area, we must be careful not to import
`limitations improperly into the claims or to read a particular embodiment
`appearing in the written description into the claim if the claim language is
`broader than the embodiment. In re Van Geuns, 988 F.2d 1181, 1184 (Fed.
`Cir. 1993). Accordingly, we look to the ordinary meaning of the term as
`would be understood by one of ordinary skill in the art. A non-technical
`dictionary, the Merriam-Webster Dictionary, defines “zone” as “an area that
`
`9
`
`

`

`IPR2016-00268
`Patent 8,315,367 B2
`
`is different from other areas in a particular way.” Ex. 3001. An area where
`a radio frequency identification signal can be detected is different from an
`area where such a signal cannot be detected. Thus, we are persuaded at this
`time that one of ordinary skill in the art would understand “RFID coverage
`zone” to be an area in which a radio frequency identification can be
`detected. The ordinary meaning of “RFID coverage zone” is consistent with
`the term’s use in the ’367 patent. Ex. 1001, 4:27–29, 5:36–39, 5:50–56,
`6:3–10, 6:40–43, 7:16–17, 7:35–47.
`Given the disclosure in the ’367 patent and the ordinary meaning of
`the term “RFID coverage zone,” as would be understood by one of ordinary
`skill in the art, based on the record before us, we find the broadest
`reasonable construction of “RFID coverage zone,” for purposes of this
`Decision, to encompass an area in which a radio frequency identification can
`be detected.
`
`3. Other Claim Terms
`For purposes of this Decision and based on the record before us, we
`need not provide express constructions for any other claim terms at this
`stage of the proceeding.
`B. Principles of Law
`A claim is unpatentable under 35 U.S.C. § 103(a) if the differences
`between the subject matter sought to be patented and the prior art are such
`that the subject matter as a whole would have been obvious at the time the
`invention was made to a person having ordinary skill in the art to which said
`subject matter pertains. KSR Int’l Co. v. Teleflex Inc., 550 U.S. 398, 406
`(2007). The question of obviousness is resolved on the basis of underlying
`factual determinations, including: (1) the scope and content of the prior art;
`
`10
`
`

`

`IPR2016-00268
`Patent 8,315,367 B2
`
`(2) any differences between the claimed subject matter and the prior art;
`(3) the level of skill in the art; and (4) objective evidence of nonobviousness,
`i.e., secondary considerations. See Graham v. John Deere Co., 383 U.S. 1,
`17–18 (1966).
`We analyze the challenges presented in the Petition in accordance
`with the above-stated principles.
`C. Level of Ordinary Skill in the Art
`In determining whether an invention would have been obvious at the
`time it was made, we consider the level of ordinary skill in the pertinent art
`at the time of the invention. Graham, 383 U.S. at 17. “The importance of
`resolving the level of ordinary skill in the art lies in the necessity of
`maintaining objectivity in the obviousness inquiry.” Ryko Mfg. Co. v. Nu-
`Star, Inc., 950 F.2d 714, 718 (Fed. Cir. 1991).
`Petitioner’s Declarant, Dr. Caloyannides, opines that a person of
`ordinary skill in the art relevant to the ’367 patent “would have held a
`bachelor’s or master’s degree in electrical engineering and had at least three
`years of experience working with access control systems, or the equivalent
`thereof.” Ex. 1003 ¶ 37. Patent Owner does not offer any contrary
`explanation regarding who would qualify as a person of ordinary skill in the
`art relevant to the ’367 patent. See generally PO Resp.
`Based on our review of the ’367 patent, the types of problems and
`solutions described in the ’367 patent and cited prior art, and the testimony
`of Petitioner’s Declarant, we adopt and apply Petitioner’s definition of a
`person of ordinary skill in the art at the time of the claimed invention. We
`note that the applied prior art reflects the appropriate level of skill at the time
`
`11
`
`

`

`IPR2016-00268
`Patent 8,315,367 B2
`
`of the claimed invention. See Okajima v. Bourdeau, 261 F.3d 1350, 1355
`(Fed. Cir. 2001).
`D. Alleged Anticipation of Claims 1–7, 9–17, 19, and 20 by Polozola
`Petitioner contends claims 1–7, 9–17, 19, and 20 of the ’367 patent
`are unpatentable under 35 U.S.C. § 102(e) as anticipated by Polozola.
`Pet. 9–26. Patent Owner disputes Petitioner’s contentions. Prelim. Resp.
`14–23. For reasons that follow, we determine Petitioner has demonstrated a
`reasonable likelihood of prevailing as to these claims.
`1. Overview of Polozola
`Polozola discloses systems and methods for “providing radio
`frequency identification (RFID) of individuals, as may be implemented with
`respect to a controlled environment facility, using RFID transducer
`technology deployed in association with a user terminal, such as telephone
`or multimedia kiosk.” Ex. 1005, Abst. RFID tags “identify residents of a
`controlled environment facility and control one or more transactions
`associated with the residents and/or actions of the residents using a RFID
`system in which a user presents a RFID transponder in proximity to a RFID
`transducer for identification.” Id.
`One embodiment in Polozola of an RFID system adapted to control
`calls or other transactions (e.g., commissary purchases) within a controlled
`environment facility is illustrated in Figure 4, reproduced below.
`
`
`
`12
`
`

`

`IPR2016-00268
`Patent 8,315,367 B2
`
`As shown in Figure 4, a user with RFID tag 12 approaches RFID tag
`reader 42 and is prompted to present RFID tag 12, which transmits the user’s
`identification via communication link 18 to RFID tag reader 42. Id. at 8:27–
`32, 9:61–62.
`A processing system for identifying the user based on the RFID tag’s
`information is illustrated in Figure 6, reproduced below.
`
`
`As shown in Figure 6, the processing system at step 606 “determines if the
`user is authorized to conduct the desired transaction, such as to place a call
`to a phone number input by the user.” Id. at 11:36–39, Fig. 6. If the “user is
`authorized to place the call, for example, [the] processing system[] connects
`
`13
`
`

`

`IPR2016-00268
`Patent 8,315,367 B2
`
`the call,” and the transaction is allowed to proceed. Id. at 11:59–61, Fig. 6
`step 607. If the user is not authorized, the call is not connected, the
`transaction may be terminated, and an investigator may be notified of the
`attempt to make an unauthorized call. Id. at 11:61–67, Fig. 6 step 614.
`Another embodiment in Polozola discloses using RFID tags to
`determine whether an inmate is authorized to use other electronic devices,
`“such as computers, personal digital assistants (PDAs), cellular telephones,
`and/or the like,” and whether the inmate can pass through a door or gate. Id.
`at 4:34–36, 8:50–55.
`2. Analysis
`a. Independent Claims 1 and 11
`Claim 1 specifically recites “a reader . . . configurable to have a[n]
`RFID coverage zone for detecting RFID tags within the coverage zone,”
`while claim 11 recites “creating an RFID coverage zone around the
`electronic communication device.” Ex. 1001, 9:33–52, 10:16–35.
`Petitioner contends Polozola discloses each of the elements recited in
`claims 1 and 11 (Pet. 11–20), and specifically contends that Polozola
`discloses “an RFID coverage zone” as required by the challenged claims.
`Id. at 15–18. According to Petitioner, Polozola discloses that RFID reader
`42 includes RFID interrogator 26, which “contains an antenna and is
`operable to communicate with RFID tag 12 (FIG. 1) via communication link
`18 (FIG. 1)” when the RFID tag is within the “proximity of RFID reader
`42.” Id. at 15 (citing Ex. 1005, 7:19–23, 9:61–62, Fig. 6 step 602; Ex. 1003
`¶¶ 73, 74). Petitioner explains that “RFID tag 12 responds with data stored
`therein, sending the data back over communication link 18 to RFID
`interrogator 26,” such as an “identification number.” Id. (citing Ex. 1005,
`
`14
`
`

`

`IPR2016-00268
`Patent 8,315,367 B2
`
`10:53–56, Fig. 6 step 603; Ex. 1003 ¶ 74). Petitioner, thus, concludes that
`Polozola discloses a “reader is configured to detect when the RFID tag is
`within the coverage zone,” as recited in claim 1, at least because the tag is
`close enough to send information to the reader. Id. (citing Ex. 1003 ¶ 74).
`For claim 11, Petitioner argues that communication link 18 creates an RFID
`coverage zone around the telephone connected to the tag reader, because
`communication between the tag and the reader only occurs when the RFID
`tag is within the “proximity of RFID reader 42.” Id. at 18 (citing Ex. 1005,
`9:61–62; Fig. 6 step 602; Ex. 1003 ¶ 115).
`Patent Owner contests Petitioner’s position, contending Polozola fails
`to disclose the required “RFID coverage zone” for several reasons. Prelim.
`Resp. 14–23. First, Patent Owner contends that communication link 18 in
`Polozola is a point-to-point connection while the claimed coverage zone
`covers a predetermined zone around RFID tag reader 42. Id. at 15 (citing
`Ex. 1001, Fig. 2; Ex. 1005, Fig. 4). Patent Owner argues that, a point-to-
`point connection is not a coverage zone, and communication link 18 does
`not “detect[] RFID tags within the coverage zone,” as required by claim 1.
`Id. at 15–16. Patent Owner further argues that a communication link does
`not necessarily imply detection of a device within a “coverage zone,”
`because one can easily communicate wirelessly with a device outside of a
`defined “coverage zone,” particularly if the link is a point-to-point
`connection. Id. at 16.
`Second, Patent Owner contends Petitioner fails to demonstrate how
`bringing RFID tag 12 “in proximity of RFID reader 42” to communicate
`with RFID reader 42 relates to the claimed “RFID coverage zone.” Id. at
`17–18. According to Patent Owner, Petitioner never argues that the claimed
`
`15
`
`

`

`IPR2016-00268
`Patent 8,315,367 B2
`
`“RFID coverage zone” corresponds to Polozola’s “proximity of RFID reader
`42” and that statements made by Petitioner’s Declarant cannot be relied
`upon to support the Petition due to a prohibition of incorporation by
`reference. Id. at 18 (citing 37 C.F.R. § 42.6(a)(3), which states “[a]rguments
`must not be incorporated by reference from one document into another
`document”). Patent Owner further contends that (1) communication within
`“proximity” of a device does not necessarily mean the device has a coverage
`zone (id. at 19); (2) although RFID tag 12 communicates with RFID reader
`42 in the proximity of reader 42, that does not necessarily mean reader 42
`has a coverage zone for detecting tag 12, because there need not be a
`coverage zone at all, or tag 12 could be configured to have a “coverage
`zone” rather than reader 42 having one (id. at 19–20); and (3) Polozola does
`not spell out an “RFID coverage zone” anywhere or specifically use
`anything like it or even contemplate the use of an “RFID coverage zone” (id.
`at 22).
`Lastly, Patent Owner contends that there are significant differences
`between the RFID coverage zone in the ’367 patent and communication link
`18 in Polozola. Specifically, (1) the RFID coverage zone in the ’367 patent
`can detect multiple RFID tags (including first and second RFID tags) within
`the zone (id. at 16 (citing Ex. 1001, 2:59–3:5, 6:5–10 (“another RFID tag
`enters within the coverage zone 230”))), whereas communication link 18 in
`Polozola only works for one tag 12 and different tags require different point-
`to-point links for communication with the reader;1 (2) Polozola’s
`
`
`1 Patent Owner does not provide a citation to support its characterization of
`Polozola.
`
`16
`
`

`

`IPR2016-00268
`Patent 8,315,367 B2
`
`communication link 18 has a dynamic length depending on the distance
`between RFID tag 12 and RFID reader 42, which may change even during
`active communication as the tag moves about, whereas that the claimed
`coverage zone has a predetermined size (e.g., 1.5 m or 30 feet) (id. at 16–17
`(citing Ex. 1001, 5:50–56)); (3) the existence of Polozola’s communication
`link 18 necessarily requires active communication between RFID tag 12 and
`RFID reader 42, whereas the claimed coverage zone is “predetermined” by a
`reader alone, meaning that the coverage zone does not require
`communication between the reader and any RFID tag (i.e., the coverage
`zone exists even if there is no RFID tag near the reader) (id. at 16–17 (citing
`Ex. 1001, 4:28–29, 5:50–53)); and (4) Polozola’s communication link 18
`cannot achieve certain security features of the claimed coverage zone,
`whereas by using the coverage zone in the ’367 patent, “system 200 may be
`implemented so that only one inmate is allowed in proximity of the
`telephone 210” (id. at 16–17 (citing Ex. 1001, 5:44–62)).
`Patent Owner concludes that challenges to claims 1 and 11 should be
`rejected because Polozola fails to disclose specifically or inherently an
`“RFID coverage zone,” and Petitioner has failed to show that Polozola’s
`communication link 18 creates an “RFID coverage zone.” Id. at 23.
`At this stage of the proceeding, we are persuaded by Petitioner’s
`position that Polozola discloses “an RFID coverage zone.” See Pet. 22. On
`the record before us, we are satisfied that one of ordinary skill in the art
`would have understood that Polozola’s communication link 18 creates an
`“RFID coverage zone” as required by claims 1 and 11. Specifically, we
`credit the testimony of Dr. Caloyannides that communication between RFID
`tag 12 only occurs when tag 12 is within the “proximity of RFID reader 42,”
`
`17
`
`

`

`IPR2016-00268
`Patent 8,315,367 B2
`
`thus, one of ordinary skill in the art would have understood “proximity of
`[the] RFID reader 42” as being the coverage zone of RFID reader 42. Ex.
`1003 ¶ 74 (citing Ex. 1005, 9:61–62, Fig. 6 step 603). Furthermore, based
`on the record before us at this time, we are unpersuaded by Patent Owner’s
`characterization of Polozola’s communication link 18 as a point-to-point
`communication, because there does not appear to be any disclosure in
`Polozola that RFID tag 12 must be at a specific location to communicate
`with RFID reader 42. Although, Polozola discloses a preferred embodiment
`where “the user places RFID tag 12 less than 3 inches away from RFID
`reader 42,” we do not have sufficient evidence at this time to indicate that
`such a preferred embodiment prevents communication link 18 from being
`considered a “coverage zone” as recited by claims 1 and 11.
`b. Dependent Claims 2–7, 9, 10, 12–17, 19, and 20
`Claims 2–7, 9, and 10 depend from claim 1, while claims 12–17, 19,
`and 20 depend from claim 11. Ex. 1001, 9:54–10:15, 10:36–10:64.
`Petitioner contends that Polozola, as summarized above, discloses each
`limitation of the challenged dependent claims. Pet. 20–26. Patent Owner
`does not provide separate contentions regarding additional limitations
`recited in the dependent claims. Prelim. Resp. 23. On the record before us
`and for purposes of this Decision, we are persuaded by Petitioner’s
`contentions regarding dependent claims 2–7, 9, 10, 12–17, 19, and 20.
`c. Summary
`On this record and for purposes of this Decision, we conclude that
`Petitioner has established a reasonable likelihood it would prevail in
`showing that claims 1–7, 9–17, 19, and 20 are anticipated under 35 U.S.C.
`§ 102(e) by Polozola.
`
`18
`
`

`

`IPR2016-00268
`Patent 8,315,367 B2
`
`E. Alleged Obviousness of Claims 3 and 13 in View of Polozola and
`Csabai
`Claims 3 and 13 require that the unique identification information
`from claims 1 and 11 be permanently associated with the corresponding
`wearer at the time the wearer arrives at the custodial facility. See Ex. 1001,
`9:57–60, 10:40–43. Petitioner contends claims 3 and 13 of the ’367 patent
`are unpatentable under 35 U.S.C. § 103 in view of Polozola and Csabai.
`Pet. 26–30. Patent Owner disputes Petitioner’s contention. Prelim. Resp.
`23–24. For the reasons that follow, we determine Petitioner has
`demonstrated a reasonable likelihood of prevailing as to these claims.
`1. Overview of Polozola
`See Section II.D.1.
`2. Overview of Csabai
`Csabai describes a “supervisory communication system serving
`callers with restricted freedom, connected to a local telephone exchange and
`to a local computer network that comprises a data base storing relevant data
`concerning each possible caller.” Ex. 1007, 1:3–5. The system includes “a
`personal identification means for identifying any caller” and “call units (11)
`are activated by the caller when identifying himself.” Id. at 2:12–13. Csabai
`teaches using bar codes to identify prisoners and that “instead of bar codes
`any appropriate carrier can be used (magnetic stripe, 3D code or an RFID
`tag).” Id. at 6:18–19.
`Csabai further teaches that “[p]risoners are identified by their name
`and by the personal identification data, which is generally a coded number
`under which they are registered,” and that “[e]ach prisoner has a specific
`record, which includes what restrictions are applied to them.” Id. at 1:15–
`17. When a prisoner attempts to use a supervised device, such as a
`
`19
`
`

`

`IPR2016-00268
`Patent 8,315,367 B2
`
`telephone, a communication server accesses a database containing the
`prisoner’s calling restrictions and determines, for example, “whether the
`number dialed is among the stored numbers permitted for the [prisoner].”
`Id. at 6:28–7:1; 8:3–12.
`3. Analysis
`Petitioner contends Polozola teaches that unique identification
`information is associated with “with an individual, whether permanently or
`temporarily,” while Csabai teaches that “[p]risoners are identified by their
`name and by the personal identification data, which is generally a coded
`number under which they are registered.” Pet. 28 (citing Ex. 1005, 2:63–66;
`Ex. 1007, 1:15–17; Ex. 1003 ¶¶ 166, 172). According to Petitioner, one of
`ordinary skill in the art would have understood that registration of a prisoner
`takes place when the prisoner arrives at the custodial facility. Id. (citing Ex.
`1003 ¶¶ 167, 173). Petitioner also argues that one of ordinary skill in the art
`would have found it obvious to modify the system of Polozola and its
`permanent association of identification information with associating the
`identification information at the time of registration when the wearer arrives
`at the custodial facility, as taught by Csabai. Id. at 28–29 (citing Ex. 1003
`¶¶ 168–169, 174–175).
`Petitioner contends that it would have been obvious to a person of
`ordinary skill in the art to combine the teachings of Polozola and Csabai,
`because such a combination merely would have used a known technique to
`improve similar devices and methods in the same way. Pet. 11–12 (citing
`Ex. 1003 ¶ 31). According to Petitioner, Polozola and Csabai would have
`been combined because both references relate to access control restrictions
`for prisoners in controlled facilities. Id. at 29 (citing Ex. 1005, Abst.; Ex.
`
`20
`
`

`

`IPR2016-00268
`Patent 8,315,367 B2
`
`1007, 1:3–5; Ex. 1003 ¶ 174). Petitioner argues that a person of ordinary
`skill in the art would have been motivated to combine Polozola and Csabai
`to associate a prisoner’s unique identification when the prisoner arrives at
`the prison to ensure that the restrictions are properly applied during the
`prisoner’s entire time at the prison (see Ex. 1003 ¶¶ 168, 174), and that such
`modification would have been well within the grasp of a person of ordinary
`skill in the art without the need for undue experimentation (see Ex. 1003 ¶¶
`169, 175). Pet. 29–30.
`Patent Owner contests Petitioner’s position, contending that claims 3
`and 13 are patentable for the same reasons claims 1 and 11 are patentable
`and that Csabai fails to remedy the flaws that Patent Owner finds in
`Polozola. Prelim. Resp. 23–24.
`Despite Patent Owner’s arguments, at this stage of the proceeding, we
`are persuaded by Petitioner that Polozola and Csabai at least suggest that the
`unique identification information from claims 1 and 11 would be
`permanently associated with the corresponding wearer at the time the wearer
`arrives at the custodial facility as required by claims 3 and 13. See Pet. 26–
`29. We credit the testimony of Petitioner’s Declarant, Dr. Caloyannides,
`st

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket