throbber
UNITED STATES PATENT AND TRADEMARK OFFICE
`_________________________
`BEFORE THE PATENT TRIAL AND APPEAL BOARD
`_________________________
`
`
`
`SECURUS TECHNOLOGIES, INC.
`Petitioner
`v.
`GLOBAL TEL*LINK CORPORATION
`Patent Owner
`_________________________
`
`Case IPR2016-00268
`Patent No. 8,315,367
`_________________________
`
`PETITION FOR INTER PARTES REVIEW OF U.S. PATENT NO. 8,315,367
`
`
`
`

`
`I.
`II.
`
`TABLE OF CONTENTS
`Introduction ...................................................................................................... 1
`Statement of Precise Relief Requested for Each Claim Challenged ............... 2
`Claims for Which Review Is Requested ............................................... 2
`A.
`
`Statutory Ground of Challenge ............................................................. 2
`B.
`
`III. Overview of the ’367 Patent ............................................................................ 4
`IV. The Level of Ordinary Skill in the Art ............................................................ 6
`V.
`Claim Construction .......................................................................................... 7
`“Non-Removable Item” ......................................................................... 7
`A.
`
`VI. Polozola Anticipates Claims 1-7, 9-17, 19, and 20 of the ’367 Patent ........... 9
`
` Overview of Polozola ............................................................................ 9 A.
`Polozola Teaches Each and Every Feature of Claims 1-7, 9-17,
`B.
`
`19, and 20 ............................................................................................10
`VII. Polozola in View of Csabai Renders Obvious Claims 3 and 13 ..................26
`
` Overview of Csabai.............................................................................27 A.
`Polozola and Csabai Collectively Teach Each and Every
`B.
`
`Feature of Claims 3 and 13 .................................................................28
`C.
`Rationale to Combine Polozola and Csabai .......................................29
`
`VIII. Polozola in View of Hansen Renders Obvious Claims 4, 8, 14, and 18.......30
`
` Overview of Hansen ............................................................................30 A.
`Polozola and Hansen Collectively Teach Each and Every
`B.
`
`Feature of Claims 4, 8, 14, and 18 ......................................................31
`C.
`Rationale to Combine Polozola and Hansen ......................................33
`
`IX. Reinhold in View of Polozola and Csabai Renders Obvious Claims 1-
`3, 5-7, 9-13, 15-17, 19, and 20 ......................................................................34
`
`
`
`- ii -
`
`

`
`X.
`
`
` Overview of Reinhold .........................................................................35 A.
`Reinhold, Polozola, and Csabai Collectively Teach Each and
`B.
`
`Every Feature of Claims 1-3, 5-7, 9-13, 15-17, 19, and 20 ................36
`C.
`Rationale to Combine Reinhold, Csabai, and Polozola ......................52
`
`Reinhold in View of Csabai, Polozola, and Hansen Renders Obvious
`Claims 4, 8, 14, and 18 ..................................................................................54
`Reinhold, Csabai, Polozola, and Hansen Collectively Teach
`A.
`
`Each and Every Feature of Claims 4, 8, 14, and 18 ............................54
`B.
`Rationale to Combine Reinhold, Polozola, Csabai, and Hansen .......56
`
`XI. Petitioner Presents New Grounds of Rejection That Are Not
`Redundant ......................................................................................................58
`XII. Mandatory Notices Under 37 C.F.R. § 42.8 ..................................................59
`Real Party-in-Interest ..........................................................................59
`A.
`
`Related Matters ....................................................................................59
`B.
`
`Lead and Backup Counsel ...................................................................59
`C.
`
`Service Information .............................................................................59
`D.
`
`XIII. Grounds for Standing .....................................................................................60
`XIV. Fee Payments .................................................................................................60
`XV. Conclusion .....................................................................................................60
`
`
`
`- iii -
`
`
`
`
`
`

`
`LIST OF EXHIBITS
`
`Description
`
`Ex. 1001 U_S. Patent No. 8,315,367 to Profanchik (“the ’367 patent”)
`
`Ex. 1002 Prosecution History of U.S. Patent No. 8,315,367
`
`Ex. 1003 Declaration of Michael Caloyannides, Ph.D.
`
`Ex. 1004 Curriculum Vitae of Michael Caloyannides Ph D
`
`Ex. 1005 U.S. Patent No. 8,031,052 to Polozola (“PoIo:0la”)
`
`Ex. 1006 U.S. Patent No 7,494,061 to Reinhold (“Reinhold’ )
`
`Ex. 1007 International Publication No. WO2006/097775 to C sabai et al
`
`(“Csabai”)
`
`Ex. 1008 U.S. Patent Publication No. 2006/0180647 to Hansen (“Hansen”)
`
`_iV_
`
`

`
`
`TABLE OF AUTHORITIES
`
` Page(s)
`
`Cases
`Arkema France v. Honeywell Int’l Inc., IPR2015-00916,
` Paper 16 (Oct. 21, 2015) .................................................................................... 59
`In re Leshin, 277 F.2d 197 (C.C.P.A. 1960) ..................................................... 33. 56
`Phillips v. AWH Corp.,
`415 F.3d 1303 (Fed. Cir. 2005) (en banc) ............................................................ 7
`
`Statutes
`35 U.S.C. § 102 .................................................................................................... 3, 59
`35 U.S.C. § 102(a) ..................................................................................................... 3
`35 U.S.C. § 102(b) ..................................................................................................... 2
`35 U.S.C. § 102(e) ............................................................................................. 2, 3, 9
`35 U.S.C. § 103 ........................................................................................ 3, 33, 56, 59
`35 U.S.C. § 311 .......................................................................................................... 2
`35 U.S.C. §§ 311-319................................................................................................. 1
`
`Regulations
`37 C.F.R. § 42.8 ......................................................................................................... 9
`37 C.F.R. § 42.15(b)(1) ............................................................................................ 60
`37 C.F.R. § 42.100 et seq. .......................................................................................... 1
`37 C.F.R. § 42.100(b) ................................................................................................ 7
`37 C.F.R. § 42.101 ................................................................................................... 60
`
`
`
`- v -
`
`

`
`Regulations (continued)
`37 C.F.R. § 42.104(a) ............................................................................................... 60
`
`Other Authorities
`77 Fed. Reg. 48756, 48764 (Aug. 14, 2012) ............................................................. 7
`M.P.E.P. § 2131.03 .................................................................................................... 6
`
`
`
`
`- vi -
`
`

`
`I.
`
`Introduction
`Securus Technologies, Inc. (“Petitioner”) requests inter partes review of
`
`claims 1-20 of U.S. Patent No. 8,315,367 (“the ’367 patent”) (Ex. 1001) in
`
`accordance with 35 U.S.C. §§ 311-319 and 37 C.F.R. § 42.100 et seq.
`
`The ’367 patent generally discloses a controlled access system in which an
`
`inmate wears a radio frequency identification (“RFID”) tag. A tag reader receives
`
`identification information from the RFID tag and provides the information to a
`
`management system. The management system uses the identification information
`
`to determine whether an inmate is allowed to use an electronic device, such as to
`
`use a telephone to place a call.
`
`This technology, however, was well-known in the prior art as of the priority
`
`date of the ’367 patent, and prior art RFID identification systems for inmates are
`
`described in many patents and publications. These identification systems were used
`
`with access management systems for devices like telephones, computers, doors,
`
`and gates to prevent inmates from placing unauthorized calls, accessing
`
`unauthorized websites, or entering unauthorized areas. Each of these systems was
`
`known to receive identification information from an inmate’s RFID tag and to
`
`provide the identification information to a management system. The prior art
`
`management system then accessed a database of restrictions linked to the identified
`
`inmate and determined whether the inmate was authorized to make the requested
`
`
`
`- 1 -
`
`

`
`call, just like in the ’367 patent.
`
`Because every limitation of claims 1-20 was well—knoWn and described in
`
`the prior art before the priority date of the ’367 patent, all of the challenged claims
`
`should be cancelled as unpatentable.
`
`H.
`
`Statement of Precise Relief Requested for Each Claim Challenged
`
`A.
`
`Claims for Which Review Is Requested
`
`Petitioner respectfully requests review under 35 U.S.C- § 311 of claims 1-20
`
`of the ’367 patent and cancellation of those claims as unpatentable.
`
`B.
`
`Statutory Ground of Challenge
`
`Claims 1-20 of the ’367 patent are unpatentable and should be canceled in
`
`View of the following prior art references and grounds:
`
`Prior Art References
`
`Polozola, U.S. Patent No. 8,031,052 (Ex. 1005); issued on Oct. 4,
`
`2011, from an application filed in the United States on Nov. 22, 2006;
`
`under at least pre—AIA 35 U.S.C. § l02(e).
`
`prior art under at least pre-AIA 35 U.S.C_ § 102(e)_
`
`Reinhold, U.S. Patent No. 7,494,061 (Ex. 1006); issued on Feb. 24,
`
`2009, from a United States application filed June 30, 2006; prior art
`
`

`
`Prior Art References
`
`Csabai, International Publication No. WO 2006/097775 (Ex. 1007);
`
`filed July 25, 2005, published Sept. 21, 2006; prior art under at least
`
`pre-AIA 35 U.S.C. § 102(a).
`
`Hansen, U.S. Patent Publication No. 2006/0180647 (Ex. 1008);
`
`published on Aug. 17, 2006, from a U_S. application filed Feb. 1 1,
`
`2005; prior art under at least pre—AIA 35 U.S.C. §§ 102(a) and (e).
`
`Grounds of Unpatentability
`
`Polozola anticipates claims 1-7, 9-17, 19, and 20 under
`
`35 U.S.C- § 102.
`
`Polozola in View of Csabai renders obvious claims 3 and 13 under
`
`35 U.S-C. § 103.
`
`Polozola in View of Hansen renders obvious claims 4, 8, 14, and 18
`
`under 35 U.S.C. § 103.
`
`Reinhold in view of Csabai and Polozola renders obvious claims 1-3,
`
`5-7, 9-13, 15-17, and 19-20 under 35 U.S.C. § 103.
`
`Reinhold in view of Csabai, Polozola, and Hansen renders obvious
`
`claims 4, 8, 14, and 18 under 35 U.S.C. § 103.
`
`

`
`III. Overview of the ’367 Patent
`The ’367 patent was filed May 23, 2011, as a continuation application of
`
`U.S. Patent Application No. 11/870,157, filed Oct. 10, 2007, and claims priority to
`
`U.S. Provisional Application No. 60/916,166, filed May 4, 2007.
`
`The ’367 patent describes “systems and methods for preventing
`
`unauthorized persons from using an electronic device within a facility.” (Ex. 1001
`
`at Abstract.) Disclosed examples include penal institutions, such as prisons,
`
`attempting to control inmates’ access to telephone systems and other electronic
`
`devices. (See, e.g., Ex. 1001 at 5:14-7:2, 8:8-15.) These access control systems
`
`include an “RFID tag having unique identification information associated with a
`
`wearer of the RFID tag,” which may be contained in “a non-removable item worn
`
`by the wearer, such as a bracelet.” (Ex. 1001 at Abstract, 2:40-43.) Each RFID tag
`
`contains “identification information unique to each tag, which in turn is unique to
`
`each wearer of a tag.” (Ex. 1001 at 4:30-31.)
`
`Discussing the RFID tags in a prison telephone context, the system
`
`“identifies prison inmates during their use of the telephone in a controlled
`
`environment, and determines whether the phone call can continue to proceed based
`
`on the proximity of one or more inmates to the telephone.” (Ex. 1001 at 2:16-20.)
`
`Figure 2, for example, shows an “RFID reader 240 [that] would detect RFID tags
`
`that enter the predetermined RFID coverage zone 230 generated around [a]
`
`
`
`- 4 -
`
`

`
`telephone 21.” (Ex. 1001 at 5:50-52, 7:16-17, FIG. 3 at 310.) The RFID signal
`
`from the tag “will identify its inmate wearer to the call management system.” (Ex.
`
`1001 at 5:58-60.) When the RFID tag is detected, the detected identification
`
`information is sent to a device management system. (Ex. 1001 at 7:19-21, FIG. 3 at
`
`315, 320.) The management system then determines “whether the wearer of the
`
`detected RFID tag is authorized to use the electronic device.” (Ex. 1001 at 7:21-24,
`
`FIG. 3 at 25.) If the wearer is authorized to use the device, the device is activated
`
`for use by the wearer. (Ex. 1001 at 7:31-34, FIG. 3 at 325, 330.) If the wearer is
`
`not authorized to use the device, “the device is deactivated or otherwise prevented
`
`from operating for the detected wearer.” (Ex. 1001 at 7:25-28, FIG. 3 at 325, 350.)
`
`The ’367 patent contains two independent claims, claims 1 and 11.
`
`Challenged claim 1 recites:
`
`1. An access management system for preventing
`unauthorized persons from using an electronic communication
`device in a custodial facility, the system comprising:
`a RFID tag configurable to have unique identification
`information that can be associated with a wearer of the RFID
`tag, wherein the RFID tag is configured to be comprised in a
`non-removable item worn by the wearer;
`a reader configurable to be associated with the electronic
`communication device, the reader configurable to have a RFID
`coverage zone for detecting RFID tags within the coverage
`zone; and
`
`
`
`- 5 -
`
`

`
`a call management system configurable to be connected
`to the reader and configurable to determine whether a wearer is
`authorized to use the electronic communication device based at
`least in part on an RFID tag’s detected unique identification
`information;
`wherein the reader is configured to detect when the RFID
`tag is within the coverage zone, the call management system
`activating the electronic communication device if it determines
`the wearer is authorized to use the electronic communication
`device.
`(Ex. 1001 at 9:33-52.) Independent claim 11 is a method reciting steps similar to
`
`claim 1. (Ex. 1001 at 10:16-35.)
`
`IV. The Level of Ordinary Skill in the Art
`Several factors define the level of ordinary skill in the art. These include:
`
`(1) the types of problems encountered in the art; (2) the prior art solutions to those
`
`problems; (3) the rapidity with which innovations are made; (4) the sophistication
`
`of the technology; and (5) the educational level of active workers in the field. See
`
`M.P.E.P. § 2131.03 (citing In re GPAC, 57 F.3d 1573, 1579 (Fed. Cir. 1995)).
`
`Based on these factors, a person of ordinary skill at the time of the alleged
`
`invention of the ’367 patent would have held a bachelor’s or master’s degree in
`
`electrical engineering and had at least three years of experience working with
`
`access control systems, or the equivalent thereof. (Ex. 1003 at ¶ 37.)
`
`
`
`- 6 -
`
`

`
`V. Claim Construction
`A claim in an unexpired patent subject to inter partes review “shall be given
`
`its broadest reasonable construction in light of the specification of the patent in
`
`which it appears.” 37 C.F.R. § 42.100(b).
`
`The construction below is provided solely for this proceeding. Claim terms
`
`not addressed below should be given their plain and ordinary meaning under the
`
`broadest reasonable interpretation standard. 37 C.F.R. § 42.100(b); Office Patent
`
`Trial Practice Guide, 77 Fed. Reg. 48756, 48764 (Aug. 14, 2012).
`
`Because claims are construed under a different standard in district court,
`
`Petitioner reserves its right to present a different construction there, if applicable.
`
`See, e.g., Phillips v. AWH Corp., 415 F.3d 1303, 1312-13 (Fed. Cir. 2005) (en
`
`banc). But the unpatentability grounds presented here hold under either standard.
`
` A.
`“Non-Removable Item”
`
`The term “non-removable item” is expressly recited in claims 1, 8-11, and
`
`18-20, and it implicitly appears in the remaining claims of the ’367 patent by virtue
`
`of their dependence on either claim 1 or claim 11. Although one might reasonably
`
`read “non-removable item” to mean an item that can never be removed, this is not
`
`the understanding one of ordinary skill would derive from the ’367 patent’s
`
`specification. (Ex. 1003, ¶ 43.) Instead, the ’367 patent states that an RFID bracelet
`
`may be constructed so it “cannot be removed by unauthorized persons.” (Ex. 1001
`
`
`
`- 7 -
`
`

`
`at 8:16-18; Ex. 1003, at ¶ 44.) The ’367 patent supports this understanding by
`
`describing a custodial facility environment, where the “non-removable” bracelets
`
`must be removed when the wearer is released from the facility. (Ex. 1003 at ¶ 45.)
`
`One of ordinary skill in the art reading the ’367 patent would understand that the
`
`item should be non-removable by the wearer but should be removable by
`
`authorized personnel when necessary. (Ex. 1003 at ¶ 45.)
`
`This understanding also makes sense based on the ’367 patent’s disclosure
`
`of “tamper detection circuitry” within the RFID bracelet. If tampering is detected,
`
`the bracelet will cease to function properly. (Ex. 1001 at 8:48-61; Ex. 1003 at ¶
`
`46.) One of ordinary skill in the art reading this disclosure would understand that
`
`an authorized person replacing a non-functioning band would first need to remove
`
`the damaged “non-removable” bracelet. (Ex. 1003 at ¶ 46.) And some tampering is
`
`so severe that the ’367 patent contemplates that “the inmate has . . . broken the
`
`band.” (Ex. 1001 at 8:54-58.) One of ordinary skill in the art would understand that
`
`a broken band could be removed, but the ’367 patent teaches that broken bands
`
`also no longer function. (Ex. 1001 at 8:48-63; Ex. 1003 at ¶ 46.)
`
`In view of these teachings, “non-removable item” in the context of the ’367
`
`patent does not mean an item that is impossible to remove. Instead, one of ordinary
`
`skill in the art would understand “non-removable item” to mean “an item that
`
`cannot be removed by unauthorized persons without it ceasing to function
`
`
`
`- 8 -
`
`

`
`properly.” (Ex. 1003 at ¶¶ 42, 47.)
`
`VI. Polozola Anticipates Claims 1-7, 9-17, 19, and 20 of the ’367 Patent
`Polozola is prior art to the ’367 patent under 35 U.S.C. § 102(e). It discloses
`
`every element of claims 1-7, 9-17, 19, and 20 of the ’367 patent, so it anticipates
`
`these claims.
`
` Overview of Polozola A.
`
`Polozola teaches systems and methods for “providing radio frequency
`
`identification (RFID) of individuals, as may be implemented with respect to a
`
`controlled environment facility, using RFID transducer technology deployed in
`
`association with a user terminal, such as telephone or multimedia kiosk.” (Ex. 1005
`
`at Abstract; Ex. 1003 at ¶ 52.) RFID tags “identify residents of a controlled
`
`environment facility and control one or more transactions associated with the
`
`residents and/or actions of the residents using a RFID system in which a user
`
`presents a RFID transponder in proximity to a RFID transducer for identification.”
`
`(Ex. 1005 at Abstract.)
`
`Figure 6 shows an exemplary method in which a user approaches an
`
`electronic device and is prompted to present their RFID tag. (Ex. 1005 at 9:61-62,
`
`FIG. 6 at 602; Ex. 1003 at ¶ 53.) The RFID tag then transmits identification
`
`information, such as an “identification number,” to an RFID tag reader. (Ex. 1005
`
`at 10:49-57, FIG. 6 at 603.) A processing system then identifies the user based on
`
`
`
`- 9 -
`
`

`
`the RFID tag’s information. (Ex. 1005 at 11:21-23, FIG. 6 at 605.)
`
`The processing system “determines if the user is authorized to conduct the
`
`desired transaction, such as to place a call to a phone number input by the user.”
`
`(Ex. 1005 at 11:36-39, FIG. 6 at 606.) If the “user is authorized to place the call,
`
`for example, [the] processing system[] connects the call,” and the transaction is
`
`allowed to proceed. (Ex. 1005 at 11:59-61, FIG. 6 at 607.) If the user is not
`
`authorized, the call is not connected, the transaction may be terminated, and an
`
`investigator may be notified of the attempt to make an unauthorized call. (Ex. 1005
`
`at 11:61-67, FIG. 6 at 614.)
`
`In addition to determining whether calls are authorized, Polozola also
`
`teaches using RFID tags to determine whether an inmate is authorized to use other
`
`electronic devices, “such as computers, personal digital assistants (PDAs), cellular
`
`telephones, and/or the like,” and whether the inmate can pass through a door or
`
`gate. (Ex. 1005 at 4:34-36, 8:50-55.)
`
`
`
` B.
`
`Polozola Teaches Each and Every Feature of Claims 1-7, 9-17, 19,
`and 20
`Claim 1 recites an access management system and claim 11 recites a similar
`
`method. These are the only independent claims in the ’367 patent, and this petition
`
`addresses them first below. The claims depending from claim 1 frequently recite
`
`features identical to claims depending from claim 11. For example, claims 2 and 12
`
`recite essentially identical features. This petition groups these similar dependent
`
`
`
`- 10 -
`
`

`
`claims and addresses them below after addressing independent claims 1 and 11.
`
`Claim 1
`1.
`Polozola teaches each and every element of claim 1, so it anticipates that
`
`claim. (Ex. 1003 at ¶¶ 63-75.)
`
`“An access management system for preventing unauthorized persons
`from using an electronic communication device in a custodial facility”
`
`Polozola discloses this preamble feature of claim 1. (Ex. 1001 at 9:32-34;
`
`Ex. 1003 at ¶¶ 64-65.) For example, Polozola discloses systems “providing radio
`
`frequency identification (RFID) of individuals, [and] using RFID transducer
`
`technology deployed in association with a user terminal, such as [a] telephone or
`
`multimedia kiosk.” (Ex. 1005 at Abstract, 2:34-40; Ex. 1003 at ¶ 65.) An “access
`
`management system,” such as processing system 16 in Figures 1, 2, 4, and 5,
`
`controls access to a telephone or multimedia kiosk to prevent unauthorized use of
`
`the device by inmates. (Ex. 1005 at Abstract, 8:4-17, 11:21-35, 11:61-63, FIGs. 1,
`
`2, 4, and 5 at item 16; Ex. 1003 at ¶ 65.) The telephone and multimedia kiosk in
`
`Polozola are understood to be “electronic communication device[s].” (Ex. 1003 at
`
`¶ 65) Polozola also discloses that this system can be implemented in a “custodial
`
`facility,” such as a jail or prison. (Ex. 1005 at 3:54-59, claim 51; Ex. 1003 at ¶ 65.)
`
`
`
`- 11 -
`
`

`
`“a RFID tag configurable to have unique identification information that
`can be associated with a wearer of the RFID tag, wherein the RFID tag
`is configured to be comprised in a non-removable item worn by the
`wearer”
`
`Polozola discloses this feature of claim 1 by disclosing, for example, an
`
`RFID tag 12 in Figures 1 and 4 that includes “data which identifies an individual,
`
`data which may be used to identify an individual, or a combination of both.” (Ex.
`
`1005 at 2:55-57; see also id. at 8:31-32, FIGs. 1 and 4; Ex. 1003 at ¶¶ 66, 67.) The
`
`RFID tag has the claimed “unique identification information that can be associated
`
`with the wearer of the RFID tag” because the data it contains may include “an
`
`individual’s identification number, identification code, name, picture, social
`
`security number, date of birth, age, nationality, race, height, weight, eye color, hair
`
`color, and/or any other information that may be used for identification purposes.”
`
`(Ex. 1005 at 2:55-65.) Polozola describes this data as being “associable with an
`
`individual” wearing the RFID tag (id.) or “associated with the identity of the
`
`resident carrying [the tag]” (id. at 4:9-14; Ex. 1003 at ¶ 67).
`
`Polozola discloses that “the RFID tag is configured to be comprised in a
`
`non-removable item worn by the wearer,” as claimed, because the RFID tags can
`
`be placed in “a bracelet or other substantially permanently associated or attached
`
`item” or a “permanent RFID wristband” that is rendered inoperable if removed.
`
`(Ex. 1005 at 2:55-65, 4:9-12, 16:41-44, FIG. 8; Ex. 1003 at ¶ 68.) These types of
`
`wristbands are “non-removable items” under Petitioner’s proposed construction for
`
`
`
`- 12 -
`
`

`
`that term.
`
`“a reader configurable to be associated with the electronic
`communication device, the reader configurable to have a RFID
`coverage zone for detecting RFID tags within the coverage zone”
`
`Polozola teaches this element of claim 1, for example, through its disclosure
`
`in Figure 4 of an RFID reader 42 in electronic communication with RFID tag 12
`
`via communication link 18. (Ex. 1005 at 8:31-32, FIG. 4; Ex. 1003 at ¶¶ 69, 70.)
`
`RFID reader 42 is also associated with telephone 44 via communication link 46,
`
`which is also shown in Figure 7A where RFID reader 72 attached to a telephone
`
`70. (Ex. 1005 at 4:33-37, 8:38-43, 14:43-49, FIGs. 4, 7A; Ex. 1003 at ¶ 70.) The
`
`RFID reader includes an RFID interrogator 26 that “contains an antenna and is
`
`operable to communicate with RFID tag 12 (FIG. 1) via communication
`
`link 18 (FIG. 1).” (Ex. 1005 at 7:19-23; Ex. 1003 at ¶ 70.) The communication link
`
`is an RFID coverage zone for detecting the RFID tags within the zone, because
`
`communication between the RFID tag and the RFID reader only occurs when the
`
`RFID tag is within the “proximity of RFID reader 42.” (Ex. 1005 at 9:61-62; FIG.
`
`6 at step 602; Ex. 1003 at ¶ 70.)
`
`“a call management system configurable to be connected to the reader
`and configurable to determine whether a wearer is authorized to use the
`electronic communication device based at least in part on an RFID tag’s
`detected unique identification information”
`
`Polozola teaches this claimed feature, for example, by disclosing a call
`
`management system in the form of processing system 16. (Ex. 1005 at 8:4-17,
`
`
`
`- 13 -
`
`

`
`11:21-35, FIG. 4 at 16; Ex. 1003 at ¶¶ 71, 72.) Processing system 16 is connected
`
`to tag reader 42 via communication link 20. (Ex. 1005 at 4:36-39, FIG. 4 at 20; Ex.
`
`1003 at ¶ 72.) Processing system 16 receives the RFID tag’s identification
`
`information from tag reader 42 and accesses a database entry for the wearer based
`
`on the received information. (Ex. 1005 at 8:12-17, 8:40-49, 10:55-60, 11:21-35;
`
`Ex. 1003 at ¶ 72.) Each database entry includes “access, rights, privileges,
`
`restrictions, and/or the like associated with the [wearer]” of the RFID tag, which
`
`processing system 16 uses to “determine if the user is authorized to place the
`
`call . . . by analyzing the information.” (Ex. 1005 at 8:12-17, 11:21-39; Ex. 1003 at
`
`¶ 72.) Thus, the processing system determines whether the wearer of the RFID tag
`
`is authorized to use the electronic communication device, for example, to place the
`
`requested call, based on the RFID tag’s identification information. (Ex. 1005 at
`
`8:12-17, 11:21-39, FIG. 6 at 605, 606; Ex. 1003 at ¶ 72.)
`
`Polozola, therefore, discloses the claimed “call management system
`
`configurable to be connected to the reader and configurable to determine whether a
`
`wearer is authorized to use the electronic communication device based at least in
`
`part on an RFID tag’s detected unique identification information.” (Ex. 1003 at
`
`¶ 71.)
`
`
`
`- 14 -
`
`

`
`“wherein the reader is configured to detect when the RFID tag is within
`the coverage zone, the call management system activating the electronic
`communication device if it determines the wearer is authorized to use
`the electronic communication device”
`
`Polozola teaches this last feature of claim 1. For example, the RFID reader
`
`includes an RFID interrogator 26 that “contains an antenna and is operable to
`
`communicate with RFID tag 12 (FIG. 1) via communication link 18 (FIG. 1)”
`
`when the RFID tag is within the “proximity of RFID reader 42.” (Ex. 1005 at 7:19-
`
`23, 9:61-62, FIG. 6 at step 602; Ex. 1003 at ¶¶ 73, 74.) Polozola explains that
`
`“RFID tag 12 responds with data stored therein, sending the data back over
`
`communication link 18 to RFID interrogator 26,” such as an “identification
`
`number.” (Ex. 1005 at 10:53-56, FIG. 6 at 603; Ex. 1003 at ¶ 74.) Thus, Polozola
`
`teaches that the “reader is configured to detect when the RFID tag is within the
`
`coverage zone,” as claimed, at least because the tag is close enough to send
`
`information to the reader. (Ex. 1003 at ¶ 74.)
`
`Once the tag’s identification information is received, processing system 16
`
`accesses a database entry containing “access, rights, privileges, restrictions, and/or
`
`the like” corresponding to RFID tag’s wearer and “determine[s] if the user is
`
`authorized to place the call . . . by analyzing the information.” (Ex. 1005 at 8:12-
`
`17, 8:40-49, 10:55-60, 11:21-39; Ex. 1003 at ¶ 75.) Based on these entries, the
`
`processing system determines whether the wearer of the RFID tag is authorized to
`
`use the electronic communication device, for example, to place the requested call.
`
`
`
`- 15 -
`
`

`
`(Ex. 1005 at 8:12-17, 11:21-39, FIG. 6 at 605, 606; Ex. 1003 at ¶ 75.) If the
`
`transaction is authorized by the processing system, “the transaction is allowed to
`
`proceed” (e.g., “YES” path from step 606 to 607 of FIG. 6). (Ex. 1005 at 11:51-54,
`
`FIG. 6 at 606, 607; Ex. 1003 at ¶ 75.) In the case of a phone call, if “a user is
`
`authorized to place the call . . . processing system 16 connects the call.” (Ex. 1005
`
`at 11:59-61; Ex. 1003 at ¶ 75.) Connecting the call, or otherwise permitting the
`
`requested transaction to proceed, corresponds to “activating the electronic device”
`
`once processing system 16 “determines the wearer is authorized to use the
`
`electronic communication device,” as recited in claim 1. (Ex. 1003 at ¶ 75.)
`
`Accordingly, Polozola teaches each and every element of claim 1, and
`
`therefore, anticipates claim 1.
`
`Claim 11
`2.
`Polozola teaches each and every element of claim 11, thereby anticipating
`
`claim 11. (Ex. 1003 at ¶¶ 108-121.)
`
`“A method of preventing unauthorized persons from using an electronic
`communication device in a custodial facility”
`
`This preamble of claim 11 closely resembles the preamble of claim 1, which
`
`recites “[a]n access management system for preventing unauthorized persons from
`
`using an electronic communication device in a custodial facility.” Because the
`
`preambles are nearly identical, the same Polozola features discussed above in
`
`Section VI.B.1 for claim 1’s preamble also disclose the preamble of claim 11. (Ex.
`
`
`
`- 16 -
`
`

`
`1003 at ¶¶ 64-65, 109-110.)
`
`“providing a RFID tag configurable to have unique identification
`information that can be associated with a wearer of the RFID tag,
`wherein the RFID tag is configurable to be comprised in a non-
`removable item worn by the wearer”
`
`This feature of claim 11 closely resembles claim 1’s recited “RFID tag
`
`configurable to have unique identification information that can be associated with a
`
`wearer of the RFID tag, wherein the RFID tag is configured to be comprised in a
`
`non-removable item worn by the wearer.” Because these claimed features are
`
`nearly identical, the same Polozola features discussed above in Section VI.B.1 for
`
`claim 1’s corresponding feature also disclose this feature of claim 11. (Ex. 1003 at
`
`¶¶ 66-68, 111-113.)
`
`“creating an RFID coverage zone around the electronic communication
`device” and “detecting when the RFID tag is within the coverage zone”
`
`These features are disclosed by the same Polozola features discussed above
`
`regarding claim 1’s “reader configurable to be associated with the electronic
`
`communication device, the reader configurable to have a RFID coverage zone for
`
`detecting RFID tags within the coverage zone” and “wherein the reader is
`
`configured to detect when the RFID tag is within the coverage zone.” (Ex. 1003 at
`
`¶¶ 69-70, 114-115.)
`
`For example, Figure 4 of Polozola shows an RFID reader 42 in electronic
`
`communication with RFID tag 12 via communication link 18. (Ex. 1005 at 8:31-
`
`
`
`- 17 -
`
`

`
`32, FIG. 4; Ex. 1003 at ¶ 115.) The RFID reader is associated with a telephone via
`
`communication link 46 (FIG. 4) or can be attached to a telephone (FIG. 7A). (Ex.
`
`1005 at 4:33-37, 8:38-43, 14:43-49, FIG. 4, 7A; Ex. 1003 at ¶ 115.) The RFID
`
`reader includes an RFID interrogator 26 that “contains an antenna and is operable
`
`to communicate with RFID tag 12 (FIG. 1) via communication link 18 (FIG. 1)”
`
`when the RFID tag is within the “proximity of RFID reader 42.” (Ex.

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket