throbber

`
`
`
`
`
`
`
`
`
`UNITED STATES PATENT AND TRADEMARK OFFICE
`
`_________________________
`
`BEFORE THE PATENT TRIAL AND APPEAL BOARD
`_________________________
`
`FedEx Corporation,
`Petitioner
`v.
`
`Intellectual Ventures II LLC and Gula Consulting LLC,
`Patent Owners
`_________________________
`
`U.S. Patent No. 6,909,356
`_________________________
`
`
`PETITION FOR INTER PARTES REVIEW
`OF U.S. PATENT NO. 6,909,356
`
`
`
`Exhibit 2102 Page 1
`
`IV Exhibit 2102
`FedEx v. IV
`Case IPR2017-02028
`
`

`

`United States Patent No. 6,909,356
`
`
`TABLE OF CONTENTS
`
`LIST OF EXHIBITS ................................................................................................ iv
`
`TABLE OF AUTHORITIES ..................................................................................... v
`
`I.
`
`II.
`
`Introduction ...................................................................................................... 1
`
`Statement of Precise Relief Requested for Each Claim Challenged ............... 2
`
`A.
`
`B.
`
`Claims for Which Review Is Requested ............................................... 2
`
`Statutory Grounds.................................................................................. 2
`
`III.
`
`’356 Patent Overview ...................................................................................... 3
`
`IV. The Level of Ordinary Skill in the Art ............................................................ 7
`
`V.
`
`Claim Construction .......................................................................................... 7
`
`A.
`
`B.
`
`“controlled space” ................................................................................. 9
`
`“defective status” .................................................................................10
`
`VI. Ground 1: Arneson Renders Obvious Claims 1, 3-5, 7, 10-14, 17, 33,
`34, 51, 53-55, and 60-63 under 35 U.S.C. § 103 ...........................................11
`
`A. Overview of Arneson...........................................................................11
`
`B.
`
`C.
`
`D.
`
`E.
`
`It Would Have Been Obvious to Combine Arneson’s
`Embodiments .......................................................................................16
`
`Arneson Renders Obvious Each Element of Claims 1, 3-5, 7,
`10-14, and 17 ......................................................................................19
`
`Arneson Renders Obvious Each Element of Claims 33 and 34 ..........47
`
`Arneson Renders Obvious Each Element of Claims 51, 53-55,
`and 60-63 .............................................................................................51
`
`VII. Mandatory Notices Under 37 C.F.R. § 42.8 ..................................................56
`
`A.
`
`B.
`
`Real Party-in-Interest ..........................................................................56
`
`Related Matters ....................................................................................56
`
`–ii–
`
`Exhibit 2102 Page 2
`
`

`

`United States Patent No. 6,909,356
`
`Lead and Backup Counsel ...................................................................57
`
`Service Information .............................................................................57
`
`C.
`
`D.
`
`VIII. Grounds for Standing .....................................................................................57
`
`IX. Fee Payments .................................................................................................58
`
`X.
`
`Conclusion .....................................................................................................58
`
`
`
`
`
`–iii–
`
`Exhibit 2102 Page 3
`
`

`

`United States Patent No. 6,909,356
`
`
`LIST OF EXHIBITS
`
`Exhibit 1001.
`
`U.S. Patent No. 6,909,356 to Brown et al. (“the ’356 patent”).
`
`Exhibit 1002.
`
`U.S. Patent No. 7,844,505 to Arneson et al. (“Arneson”).
`
`Exhibit 1003.
`
`Declaration of Jason Hill, Ph.D.
`
`Exhibit 1004.
`
`Prosecution History of U.S. Patent Application No. 10/053,540.
`
`Exhibit 1005.
`
`[Reserved]
`
`Exhibit 1006.
`
`Exhibit 1007.
`
`Exhibit 1008.
`
`Complaint for Patent Infringement, Intellectual Ventures II LLC
`v. FedEx Corp. et al., No. 2:16-cv-00980 (Aug. 31, 2016),
`ECF No. 1.
`
`Intellectual Ventures II Claim Chart Alleging FedEx
`Infringement of the ’356 patent.
`
`Exhibit B to Intellectual Ventures II Infringement Contentions
`of January 17, 2017 in Intellectual Ventures II LLC v. FedEx
`Corp. et al., No. 2:16-cv-00980 (Aug. 31, 2016).
`
`
`
`
`
`
`
`–iv–
`
`Exhibit 2102 Page 4
`
`

`

`United States Patent No. 6,909,356
`
`
`TABLE OF AUTHORITIES
`
`Cases
`Boston Sci. Scimed, Inc. v. Cordis Corp.,
`554 F.3d 982 (Fed. Cir. 2009) ............................................................... 16, 17, 18
`
`Cuozzo Speed Techs, LLC v. Lee,
`136 S. Ct. 2131 (2016) .......................................................................................... 7
`
`In re GPAC Inc.,
`57 F.3d 1573 (Fed. Cir. 1995) .............................................................................. 7
`
`Microsoft v. Proxyconn, Inc.,
`789 F.3d 1292 (Fed. Cir. 2015) ............................................................................ 8
`
`Statutes
`
`35 U.S.C. § 311(c) ...................................................................................................56
`
`Other Authorities
`
`77 Fed. Reg. 48657, 48698 ........................................................................................ 8
`
`77 Fed. Reg. 48657, 48764 ........................................................................................ 8
`
`Regulations
`
`37 C.F.R. § 42.100(b) ................................................................................................ 7
`
`37 C.F.R. § 42.104(b)(3) ............................................................................................ 8
`
`
`
`–v–
`
`Exhibit 2102 Page 5
`
`

`

`United States Patent No. 6,909,356
`
`
`I.
`
`
`Introduction
`Petitioner FedEx Corporation (“FedEx”) requests inter partes review of
`
`claims 1, 3-5, 7, 10-14, 17, 33, 34, 51, 53-55, and 60-63 of U.S. Patent No.
`
`6,909,356 (“the ’356 patent”) (Ex. 1001), assigned in public records to Gula
`
`Consulting LLC but now purportedly assigned to Intellectual Ventures II, LLC
`
`(“IV2”). The Board should institute review and cancel claims 1, 3-5, 7, 10-14, 17,
`
`33, 34, 51, 53-55, and 60-63.
`
`The ’356 patent describes an inventory management system for monitoring
`
`“entities” and “objects” within a “controlled space” using wireless technology,
`
`such as radio frequency identification (RFID). ’356 patent at Abstract and 4:7-22.
`
`In particular, the ’356 patent describes and claims methods for conducting
`
`inventory management
`
`that involve associating the addition, removal, or
`
`movement of tracked objects with the “person or robot” in possession of those
`
`objects, notifying a user of whether such events were authorized, and returning
`
`objects in response to the notification. ’356 patent at 3:7-28, claims 1, 3-5, 7,
`
`10-14, 17, 33, 34, 51, 53-55, and 60-63.
`
`But these inventory management techniques were well-known when the
`
`application underlying the ’356 patent was filed. Prior art patent Arneson, for
`
`example, disclosed associating the status of an item with the person in possession
`
`of that item before the earliest claimed priority date of the ’356 patent. Arneson
`
`–1–
`
`Exhibit 2102 Page 6
`
`

`

`United States Patent No. 6,909,356
`
`at 30:59-65 and 31:8-12. Indeed, Arneson also disclosed notifying a user when an
`
`item left a secure area or otherwise entered an unauthorized area, as well as a
`
`robotic vehicle for navigating such an area to return items. Id. at 34:54-62. FedEx
`
`thus requests that the Board institute review of the ’356 patent and cancel claims 1,
`
`3-5, 10, 11, 14, 33, 34, 51, 53-55, and 60-63.
`
`II.
`
`
`Statement of Precise Relief Requested for Each Claim Challenged
`
` Claims for Which Review Is Requested A.
`FedEx respectfully requests review under 35 U.S.C. § 311 of claims 1, 3-5,
`
`7, 10-14, 17, 33, 34, 51, 53-55, and 60-63 of the ’356 patent and cancellation of
`
`those claims as unpatentable.
`
`Statutory Grounds
`
`B.
`
`Claims 1, 3-5, 7, 10-14, 17, 33, 34, 51, 53-55, and 60-63 of the ’356 patent
`
`are unpatentable and should be cancelled because U.S. Patent No. 7,844,505 to
`
`Arneson et al. (“Arneson”) (Ex. 1002) renders obvious claims 1, 3-5, 7, 10-14, 17,
`
`33, 34, 51, 53-55, and 60-63 under 35 U.S.C. § 103. Arneson was filed on February
`
`3, 2000 and issued on November 30, 2010, and thus qualifies as prior art under at
`
`least 35 U.S.C. § 102(e).
`
`
`
`
`
`–2–
`
`Exhibit 2102 Page 7
`
`

`

`United States Patent No. 6,909,356
`
`
`III.
`
`
`’356 Patent Overview
`
`The ’356 patent was filed on November 2, 2001, as U.S. Patent Application
`
`No. 10/053,540. ’356 patent at 1; Ex. 1004 at 254. Its earliest claimed priority date
`
`is November 3, 2000. ’356 patent at 1; Ex. 1004 at 255. The ’356 patent describes
`
`an inventory management system for monitoring individuals and objects within a
`
`controlled space using wireless
`
`technology, particularly radio frequency
`
`identification (RFID). ’356 patent at Abstract and 4:7-22. The ’356 patent notes in
`
`its Background section that existing systems “provide some secure means of access
`
`such a locked door or cabinet using physical keys and/or a method for tracking and
`
`viewing inventory,” but purports that “none couple both of these methods….”
`
`’356 patent at 1:49-53.
`
`–3–
`
`Exhibit 2102 Page 8
`
`

`

`United States Patent No. 6,909,356
`
`As disclosed with regard to Figure 2 of the ’356 patent (below), the
`
`inventory management system tracks the location and movement of entities and
`
`objects within the controlled space. Id. at 5:38-62; see also Id. at 3:7-28. In
`
`particular, a tracking system 220 tracks an entity, described as “a person or robot,”
`
`upon entry into a controlled space, and correlates the addition, removal, or
`
`movement of tracked objects with that of the entity. Id. at 3:7-28.
`
`’356 Patent Fig. 2 Depicting a Remote
`Inventory Management System
`
`
`
`Tracking system 220 then reports this tracking information to a server 230,
`
`which stores the information in inventory records. Id. at 5:37-6:44. Server 230 can
`
`also notify a user regarding an event in inventory (i.e., the removal or addition of
`
`an object in inventory associated with a particular entity identity). Id. at 6:45-55.
`
`–4–
`
`Exhibit 2102 Page 9
`
`

`

`United States Patent No. 6,909,356
`
`The notification may also indicate whether or not the event was authorized. Id.
`
`at 3:30-35 and 5:56-62. Moreover, when objects in inventory are depleted or
`
`otherwise moved, the object may be automatically replenished or returned. ’356
`
`patent at 7:6-19.
`
`The claims of the ’356 patent recite performing these well-known functions
`
`of inventory management of secure areas. Independent claim 1 recites:
`
`1. A method, comprising:
`obtaining identity information regarding an entity which enters a
`controlled space;
`monitoring, using a wireless tracking system communicatively
`coupled to a computer system, locations and movements of the
`entity and objects within the controlled space;
`automatically associating, using the computer system, the identity
`information regarding the entity with status information
`regarding additions, removals, returns, defective status, or
`movements of the objects to/from/within the controlled space;
`and
`transmitting the status information and the associated identity
`information to a server communicatively coupled to the
`computer system and configured to automatically notify a user
`of the status information, wherein at least one of the objects is
`automatically returned or picked up as a result of such
`notification.
`
`
`
`
`
`–5–
`
`Exhibit 2102 Page 10
`
`

`

`United States Patent No. 6,909,356
`
`Independent claim 33 embodies substantially the same concepts, and recites:
`
`33. A computer system, comprising:
`a processing unit;
`a memory coupled to the processing unit; and
`a process executed from the memory causing the processing unit to
`(i) automatically associate an identity of an entity with
`movement and/or status changes of objects to/from/within a
`controlled space,
`(ii) monitor the location and movement of the entity and objects
`within the controlled space via a wireless tracking system
`coupled to the computer system, and
`(iii) associate the identity of the entity with the movement or
`status changes of the objects according to information which
`is entered into the computer system by the entity using an
`input device coupled to the computer system.
`
`Independent claim 51 also embodies substantially the same concepts as
`
`independent claim 1, and recites:
`
`51. A method, comprising:
`obtaining identity information regarding an entity which enters a
`controlled space;
`monitoring, using a wireless tracking system communicatively
`coupled to a computer system, locations and movements of the
`entity and objects within the controlled space; and
`automatically associating, using the computer system, the identity
`information regarding the entity with status information
`regarding additions, removals, returns, defective status, or
`movements of the objects to/from/within the controlled space,
`which status information is entered into the computer system by
`the entity using an input device.
`
`–6–
`
`Exhibit 2102 Page 11
`
`

`

`United States Patent No. 6,909,356
`
`
` The Level of Ordinary Skill in the Art IV.
`
`
`Factors defining the level of ordinary skill in the art include: (1) the types of
`
`problems encountered in the art; (2) the prior art solutions to those problems;
`
`(3) the rapidity with which innovations are made; (4) the sophistication of
`
`technology; and (5) the educational level of active workers in the field. See In re
`
`GPAC Inc., 57 F.3d 1573, 1579 (Fed. Cir. 1995).
`
`Based on these factors, a person of ordinary skill at the time of the alleged
`
`invention of the ’356 patent would have held at least a Bachelor’s Degree in
`
`Electrical Engineering, Computer Engineering, or the equivalent, and two or more
`
`years of industry experience in the field of information management, or the
`
`academic equivalent thereof. Ex. 1003 at ¶¶ [036]-[037]. Such a person would have
`
`been familiar with the standard components, methods, and protocols used at the
`
`time of the alleged invention of the ’356 patent to conduct inventory management
`
`using wireless tracking systems. Id.
`
` Claim Construction V.
`
`
`A claim in an unexpired patent “shall be given its broadest reasonable
`
`construction in light of the specification of the patent in which it appears.”
`
`37 C.F.R. § 42.100(b). Under this standard, claim terms are given their ordinary
`
`and customary meaning as would be understood by one of ordinary skill in the art
`
`in
`
`the context of
`
`the specification. Cuozzo Speed Techs, LLC v. Lee,
`
`–7–
`
`Exhibit 2102 Page 12
`
`

`

`United States Patent No. 6,909,356
`
`136 S. Ct. 2131, 2142 (2016). “The PTO should also consult the patent’s
`
`prosecution history
`
`in [IPR] proceedings.” Microsoft v. Proxyconn, Inc.,
`
`789 F.3d 1292, 1298 (Fed. Cir. 2015).
`
`In this proceeding, FedEx submits that the claim terms of the ’356 patent
`
`should be given their broadest reasonable interpretation as understood by one of
`
`ordinary skill in the art and consistent with the disclosure.1 37 C.F.R.
`
`§ 42.104(b)(3); 77 Fed. Reg. 48657, 48764. FedEx offers the following comments,
`
`however, understanding that the Board may find written statements of the Patent
`
`Owner regarding claim scope helpful in understanding and construing claims under
`
`the broadest reasonable interpretation. 77 Fed. Reg. 48657, 48698 (explaining that
`
`the Office may take into consideration inconsistent statements made by a patent
`
`owner regarding claim scope submitted under 35 U.S.C. 301(d)).2
`
`
`1 While FedEx believes that additional claim terms may warrant
`
`construction, any such terms do not affect the analysis in this Petition. Additional
`
`terms may be construed in the related district court litigation.
`
`2 Because IPR procedures do not permit challenges under 35 U.S.C. § 112,
`
`Petitioner has not included any such arguments herein. Petitioner may, however,
`
`raise such arguments in other proceedings.
`
`–8–
`
`Exhibit 2102 Page 13
`
`

`

`United States Patent No. 6,909,356
`
`
` “controlled space”
`
`A.
`
`Independent claims 1, 33, and 51, and dependent claims 10, 12, 34, 52,
`
`and 61 recite “controlled space.” While the ’356 patent consistently describes
`
`“controlled space” as a physically confined space with limitations on ingress
`
`and/or egress (see, e.g., ’356 patent at 3:30-35; see also ’356 patent at 1:49-55,
`
`Figs. 1B, 2, and 3, and associated discussion), IV2’s allegations of infringement
`
`against FedEx construe the term more broadly. For example, in IV2’s infringement
`
`contentions in Intellectual Ventures II LLC v. FedEx Corp. et al., No. 2:16-cv-
`
`00980 (Aug. 31, 2016), IV2 alleges that a geo-fence setting virtual barriers to a
`
`physical area constitutes a “controlled space.” Ex. 1008 at 3, 5, 6, 13, 14, 19, 27,
`
`and 31; see also Ex. 1007 at 1-3, 8, 10, 11. As discussed below, Arneson renders
`
`these claims obvious regardless of whether the Board adopts the ordinary and
`
`customary meaning or a meaning consistent with IV2’s allegations for “controlled
`
`space.”
`
`–9–
`
`Exhibit 2102 Page 14
`
`

`

`United States Patent No. 6,909,356
`
`
`“defective status”
`
`B.
`
`Independent claims 1, 33, and 61, and dependent claims 3, 4, 10, 12, 53, 54,
`
`and 61 recite “defective status.” The ’356 patent includes only one reference
`
`outside of the abstract and claims to monitoring the status of objects. ’356 patent
`
`at 5:60-62. That reference, however, delineates between the status of objects and
`
`the movement of objects:
`
`Note that these accesses and/or movements of goods may be
`authorized or not. The action is recorded/reported in either case.
`Further, the wireless link 235 may be replaced and/or augmented by a
`wired communication link. In addition to the movement of goods,
`status (e.g., defective, return, etc.) may also be monitored.
`
`Id.
`
`Again, however, IV2’s allegations of infringement against FedEx construe
`
`the term more broadly. For example, IV2 alleges that objects have a defective
`
`status “when the objects deviate from a predetermined route”. Ex. 1008 at 21; see
`
`also Ex. 1007, 13. Indeed, IV2 alleges that status information regarding defective
`
`status includes “details regarding the current location in relation to a predetermined
`
`location or route.” Ex. 1008 at 14. As discussed below, Arneson renders these
`
`claims obvious regardless of whether the Board adopts the ordinary and customary
`
`meaning or a meaning consistent with IV2’s allegations for “defective status.”
`
`
`
`
`
`–10–
`
`Exhibit 2102 Page 15
`
`

`

`United States Patent No. 6,909,356
`
`
` Ground 1: Arneson Renders Obvious Claims 1, 3-5, 7, 10-14, 17, 33, 34,
`VI.
`51, 53-55, and 60-63 under 35 U.S.C. § 103
` Overview of Arneson
`A.
`Arneson discloses electronic inventory systems using radio frequency
`
`identification (RFID) tags to provide various data applications, such as location
`
`tracking, inventory applications, automated transaction applications, and security
`
`monitoring. Arneson at Abstract, 1:57-2:8, 2:65-3:55, 24:14-21, and 27:6-14. For
`
`example, Arneson discloses a distributed tag reader network 1100, depicted in
`
`Figure 11 below, that “can track the location of individuals and items connected to
`
`tags 102.” Id. at Abstract, 28:42-44, and Fig. 11.
`
`Annotated Arneson Fig. 11 Depicting a Remote
`Inventory Management System
`
`
`
`–11–
`
`Exhibit 2102 Page 16
`
`

`

`United States Patent No. 6,909,356
`
`Tag reader network 1100 includes a computer system 1112 that, in
`
`conjunction with network reader 1120, receives tracking information from a
`
`wireless system of remote access sensor modules 1104 physically distributed
`
`throughout a monitored space. Id. at 3:14-17, 21:63-22:5, 32:17-22, and 33:19-44.
`
`Computer system 1112 then uses the received information to maintain inventory
`
`records as shown below in Figure 10B, reflecting, among other things, the location
`
`of each tag 102 attached to an item or carried by an individual, the identity of the
`
`individual in possession of an item (if applicable), and the status of the item (e.g.,
`
`missing, accounted for, in an unauthorized area, etc.): Id. at 34:30-50.
`
`Annotated Arneson Fig. 10B Depicting Dynamic Records
`Associating Status Information of an Item with a Customer
`
`Tag reader network 1100 monitors “the location of each person or item that
`
`has a tag 102” by “correlating remote access sensor module 1104 identities with
`
`
`
`–12–
`
`Exhibit 2102 Page 17
`
`

`

`United States Patent No. 6,909,356
`
`Tag IDs.” Id. at 28:42-55, and 28:65-29:7. For example, when a particular remote
`
`access sensor module 1304 interrogates a tag 102, tag reader network 1100
`
`associates the physical area defined by the coverage pattern 1304 of that particular
`
`remote access sensor module 1304 with the Tag ID of the interrogated tag 102. Id.
`
`Thus, in the example shown in the annotated Figure 13 of Arneson below, when
`
`remote access sensor module 1104a interrogates tag 102, computer system 1112
`
`receives this information and associates the location of coverage 1304a (e.g.,
`
`aisle 7, designated transaction area, etc.) with the Tag ID for tag 102 in inventory
`
`records:
`
`Annotated Arneson Fig. 13 Showing Sensor 1104a
`Recognizing Tag 102 Within Coverage Area 1304a
`
`
`
`Thus, with the location of each coverage pattern known, distributed tag
`
`reader network 1100 “can track the location of individuals and items connected to
`
`–13–
`
`Exhibit 2102 Page 18
`
`

`

`United States Patent No. 6,909,356
`
`tags 102 as they move through regions defined by coverage patterns 1304.”
`
`Arneson at Abstract, 28:42-55, and Fig. 11. Coverage patterns 1304 may
`
`correspond to a retail store, library, warehouse, areas associated with restricted
`
`pharmaceuticals, storerooms, or other “physical areas.” Id. at 32:38-50. Arneson
`
`also explains that these physical areas may be a “secure area” and include
`
`“automated gates and/or turnstiles … placed near an area’s exits” that “enable[] the
`
`egress of people to be restricted.” Arneson at 13:10-19 and 32:27-50. For inventory
`
`applications where the physical area is controlled, tag reader network 1100
`
`provides various automated security actions. Id. at 29:47-30:17, 31:46-55, and
`
`Fig. 10C. For example, when an item in an individual’s possession has been
`
`removed from the controlled space or moved into an unauthorized area, tag reader
`
`network 1100 may automatically lock the exits to control egress and notify
`
`management or security personnel to retrieve the item. Id. at 29:47-30:17,
`
`31:46-55, and Fig. 10C.
`
`Tag reader network 1100 also monitors the location and movement of
`
`individuals and items to provide automated transactions applications. Id.
`
`at 23:13-24, and 32:12-34:50. For example, remote access transmission terminal
`
`1124 allows individuals to engage in a transaction, such as video rental, retail
`
`purchase, etc., without the assistance of a clerk. Id. at 23:6-12, and 27:9-14.
`
`Specifically, when an individual carrying a tag 102 approaches remote access
`
`–14–
`
`Exhibit 2102 Page 19
`
`

`

`United States Patent No. 6,909,356
`
`transmission terminal 1124 in a “designated transaction location,” distributed tag
`
`reader network 1100 interrogates tags 102 to identify the items (each having
`
`tags 102 attached to them) in proximity to the individual and the remote access
`
`transmission terminal 1124. Id. at 23:13-24, and 32:12-34:50. Remote access
`
`transmission terminal 1124 may then receive the associated customer and tag
`
`information from computer system 1112 and provide a user interface allowing the
`
`individual to confirm and authenticate the transaction. Id. at 23:10-12.
`
`Arneson also discloses a portable tag reader system 1900 that includes
`
`autonomous or robotic vehicle functionality. Id. at 34:54-62, Fig. 19. Portable tag
`
`reader system 1900, like wireless tag reader network 1100, tracks movement using
`
`tag readers interrogating tags 102. While wireless tag reader network 1100 tracks
`
`the movement of tags 102 based on their interaction with stationary remote access
`
`sensor modules 1104, the portable tag reader system 1900 tracks the movement of
`
`a portable tag reader 1914 based on its interaction with stationary tags 102. Id. at
`
`35:1-36:14, Fig. 19. Arneson discloses that tags 102 may also be associated with
`
`various landmarks in addition to individuals or items, and may thus be used as a
`
`reference location for an autonomous or remote vehicle equipped with a portable
`
`tag reader 1914. Id. at 35:5-6, 35:65-36:14.
`
`Thus, portable tag reader system 1900 includes a location database 1906
`
`storing data records that contain “descriptive information” associated with each
`
`–15–
`
`Exhibit 2102 Page 20
`
`

`

`United States Patent No. 6,909,356
`
`stationary tag 102 within a “defined area,” such as the above-discussed controlled
`
`spaces. Id. at 34:66-35:15. This “descriptive information” serves as “a navigation
`
`map to identify specific landmarks that are relevant to the vehicle’s navigation.”
`
`Id. at 36:9-13. And, as the automated vehicle moves through a defined area,
`
`portable tag reader 1914 interrogates tags 102 and retrieves corresponding map
`
`data to guide the autonomous or robotic vehicle’s navigation. Id. at 37:51-38:17.
`
`B.
`
`
`It Would Have Been Obvious to Combine Arneson’s
`Embodiments
`
`The obviousness analysis that follows relies on several embodiments
`
`described in Arneson, including those described with respect to distributed tag
`
`reader network 1100 (Fig. 11) and portable tag reader system 1900 (Fig. 19). It
`
`would have been obvious to combine these embodiments of Arneson with one
`
`another. There is nothing in Arneson to suggest these embodiments could not be
`
`easily combined by one skilled in the art. Indeed, combining disclosed
`
`embodiments disclosed in a prior art patent does not require a leap of faith. Boston
`
`Sci. Scimed, Inc. v. Cordis Corp., 554 F.3d 982, 991 (Fed. Cir. 2009); Ex. 1003 at
`
`¶¶ [046]-[050].
`
`For example, Arneson refers to embodiments for distributed tag reader
`
`network 1100 implementing various data applications in the context of inventory
`
`control, security monitoring, or automated transactions. Arneson at 27:5-34:50. As
`
`Arneson explicitly discloses, these data applications employ many common
`
`–16–
`
`Exhibit 2102 Page 21
`
`

`

`United States Patent No. 6,909,356
`
`operations, rely on common static and dynamic information, and become
`
`implemented using common RFID technology and techniques. Id. (discussing
`
`implementation of data applications in terms of common steps discussed with
`
`respect to Figures 2, 5, 6, 7, 15 and/or employing common system components
`
`discussed with respect to Figures 1, 11, and 13). Thus, one of skill in the art would
`
`have found it straightforward and obvious to combine the embodiments for
`
`distributed tag reader network 1100, and would have been motivated to do so in
`
`order to achieve the desired overall functionality of distributed tag reader
`
`network 1100. Ex. 1003 at ¶¶ [047]-[050]. For example, one of skill in the art
`
`would have been motivated to combine the embodiments for distributed tag reader
`
`network 1100 in order to produce an “unattended store” with automated inventory
`
`surveillance, security actions, and transaction capabilities. Ex. 1003 at ¶ [047]
`
`(citing Arneson 13:1-44).
`
`Similarly, one of skill would have found it obvious to combine the
`
`embodiments of distributed tag reader network 1100 with that of portable tag
`
`reader system 1900. Ex. 1003 at ¶ [048]; Boston Sci., 554 F.3d at 991. Both
`
`systems are implemented in common settings using common RFID technology and
`
`techniques discussed
`
`in Arneson. For example, while Arneson refers
`
`to
`
`functionality of computer system 1112 and network reader 1120 while describing
`
`distributed tag reader network 1100, and functionality of portable tag reader 1914
`
`–17–
`
`Exhibit 2102 Page 22
`
`

`

`United States Patent No. 6,909,356
`
`while describing portable tag reader system 1900, both are implemented using
`
`common RFID technology and techniques discussed in Arneson. See, e.g., Arneson
`
`at 16:28-44, 18:57-64, 27:39-42, 34:63-65, and 37:63-67 (referring to common
`
`computing and RFID components and modes of operation with respect to
`
`Figures 1, 2, 5, 6, and 7).
`
`As noted above, whereas distributed tag reader network 1100 generally
`
`tracks the movement of tags 102 based on their interaction with stationary remote
`
`access sensor modules 1104, the disclosed portable tag reader system 1900 tracks
`
`the movement of a portable tag reader 1914 based on its interaction with stationary
`
`tags 102. Id. at 35:1-36:14, and Fig. 19. Arneson discloses that both distributed tag
`
`reader network 1100 and portable tag reader system 1900 may include such
`
`stationary tags 102 placed near a landmark, such as a “door.” Arneson at 29:48-57
`
`and 35:10-14. Thus, one of skill in the art would have found it straightforward and
`
`obvious to combine the embodiments for distributed tag reader network 1100 and
`
`portable tag reader system 1900, and would have been motivated to do so in order
`
`to achieve the desired overall functionality of distributed tag reader network 1100
`
`and portable tag reader system 1900 operating in parallel. Boston Sci., 554 F.3d
`
`at 991; Ex. 1003 at ¶ [049].
`
`For example, one of skill in the art would have been motivated to combine
`
`the automated inventory surveillance, security actions, and transaction capabilities
`
`–18–
`
`Exhibit 2102 Page 23
`
`

`

`United States Patent No. 6,909,356
`
`embodiments of distributed tag reader network 1100 with the autonomous robotic
`
`vehicle of portable tag reader system 1900 in order to, for example, to automate the
`
`return of items to inventory when an automatic transaction is declined or an item’s
`
`departure from an authorized area caused security actions to be taken. Ex. 1003 at
`
`¶ [050].
`
`i.
`
`
` Arneson Renders Obvious Each Element of Claims 1, 3-5, 7,
`C.
`10-14, and 17
`Claim 1
`“A method of comprising: obtaining identity information
`regarding an entity which enters a controlled space”
`Arneson discloses obtaining a “customer ID” identifying a person that enters
`
`1.
`
`a “physical area defined by [a] coverage patterns 1304.” Arneson at 28:1-9,
`
`28:42-44, 32:12-37, and 33:19-55. For example, “coverage patterns 1304” may
`
`correspond to a retail store, library, warehouse, areas associated with restricted
`
`pharmaceuticals, storerooms, etc. Id. at 32:43-50. Arneson also explains that these
`
`physical areas may be a “secure area” and include “automated gates and/or
`
`turnstiles … placed near an area's exits” that “enable[] the egress of people to be
`
`restricted.” Id. at 30:8-17, 31:45-57, and 32:27-50.
`
`In one exemplary embodiment, Arneson discloses a tag reader network 1100
`
`that “can track the location of individuals and items connected to tags 102 as they
`
`move through regions defined by coverage patterns 1304.” Id. at 28:42-55, and
`
`Fig. 11. Each tag 102 is allocated a unique “Tag ID,” also referred to as a
`
`–19–
`
`Exhibit 2102 Page 24
`
`

`

`United States Patent No. 6,909,356
`
`“customer ID” when associated with an individual instead of an item. Id. at
`
`3:14-17, 28:41-55, and 33:34-35. Thus, tag reader network 1100 obtains identity
`
`information when an individual carrying an identification card with a tag 102
`
`enters a controlled space associated with coverage patterns 1304, such as a retail
`
`store, library, warehouse, etc. Id. at 27:51-67 and 32:38-50; see also Section V(a).
`
`For example, Arneson discloses computer system 1112, in conjunction with
`
`network reader 1120, receiving the customer ID when the individual enters
`
`coverage pattern(s) 1304 via the remote access sensor module(s) 1104 for that
`
`physical area interrogate the tag 102 carried by the individual. Id. at 3:14-17,
`
`21:63-22:5, 32:17-21, and 33:19-44.
`
`2.
`
`“monitoring, using a wireless tracking system
`communicatively coupled to a computer system, locations
`and movements of the entity and objects within the
`controlled space”
`Arneson discloses a tag reader network 1100 that wirelessly “track[s] the
`
`location of individuals and items connected to tags 102 as they move through
`
`regions defined by coverage patterns 1304.” Arneson at 28:42-55, Fig. 11. For
`
`example, as shown in Fig. 11 below, tag reader network 1100 uses a wireless
`
`tracking system (e.g., remote access sensor modules 1104 and tags 102)
`
`comm

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket