`
`
`
`
`
`
`
`
`DEFENDANTS’ INVALIDITY CONTENTIONS
`APPENDIX B18
`
`Intellectual Ventures II LLC, v. FedEx Corp. et al.
`Civil Action No. 2:16-CV-980-JRG (E.D. TX)
`
`
`
`Exhibit 2118 Page 1
`
`IV Exhibit 2118
`FedEx v. IV
`Case IPR2017-02028
`
`
`
`
`
`
`
`
`
`INVALIDITY CHART FOR U.S. PATENT NO. 6,909,356
`
`AND
`
`UNITED STATES PATENT NO. 5,963,134 TO BOWERS ET AL. (“BOWERS”)
`
`As shown below, Bowers anticipates U.S. Patent No. 6,909,356 (“’356 patent”) claims 1, 3-5, 7, 11-14, and 17. Additionally or
`alternatively, Bowers renders obvious the ’356 patent, either alone or in combination with one or more of the following:
`- U.S. Patent No. 7,844,505 (“Arneson”) (Appendix B01)
`- U.S. Patent No. 6,748,318 (“Jones”) (Appendix B02)
`The above reference combinations are exemplary only and are not intended to be limiting. For example, Bowers also renders obvious
`the ’356 patent in combination with one or more of the other prior art provided in the claim charts in Appendices B01-B23, and/or the
`prior art provided in Appendix F.
`’356 Patent Claims
`1. A method, comprising:
`obtaining identity
`information regarding an
`entity which enters a
`controlled space;
`
`Disclosure by Bowers and/or Other Prior Art
`Bowers discloses obtaining identity information regarding an entity which enters a controlled
`space. See, e.g., Bowers, 6:42-8:34; 10:49-64; 11:5-62; 12:3-49; 22:4-24:10; Figure 1; Figure 5;
`and Figure 12. For example, Bowers discloses a controlled library environment where articles are
`tracked via RFID tags and patrons are identified before check-out.
`(6:42-8:34) Referring to FIG. 1, the library 10 is divided into a public space area 16 for use
`by library patrons, and an employee space area 18. The public space area 16 includes a
`storage area in the form of a plurality of shelves or stacks 20 for holding articles such as
`books, periodicals, audio tapes, CD’s, video tapes, wall art, sheet music and the like 22, a
`periodical room 23 having additional shelves or stacks 24, and a plurality of on-line
`computerized catalogs 26 of library holdings. A circulation desk 28 separates a portion of
`the public space area 16 from a portion of the employee space area 18. The employee space
`area 18 includes a back office operations area 30. Additional on-line computerized catalogs
`26 are located at the circulation desk 28 and in the back office operations area 30. Other
`miscellaneous computer equipment may be placed in these locations, such as a barcode
`reader 46, or a computer 48. A database associated with the computer 48 stores inventory
`data on all of the articles 22 in the library collection, as well as data regarding articles 22
`Intellectual Ventures II LLC v. FedEx Corp. et al.
`Civil Action No. 2:16-CV-980-JRG
`Defendants' Invalidity Contentions, Appendix B18
`
`2
`
`Exhibit 2118 Page 2
`
`
`
`
`
`
`
`’356 Patent Claims
`
`Disclosure by Bowers and/or Other Prior Art
`checked out by patrons. The on-line catalogs 26 are connected to the computer 48 and its
`database. All of the features and elements described above are conventional. Libraries also
`typically include areas devoted to other resource information, such as videos, CD-ROMs,
`cassettes or the like. For brevity, these alternative resources are not shown in FIG. 1.
`Throughout the specification, the word articles and books are used interchangeably.
`However, it should be understood that the scope of the word “article” includes other types
`of items which are typically found in a library, such as videos, CD-ROMS, cassettes,
`newspapers or the like. The library 10 further includes elements which are associated with
`novel methods and systems for inventory control and article usage tracking. First, the
`library includes a plurality of “smart” article return areas or book drops. Prior art book
`drops merely functioned to provide a temporary storage location for books which were
`being returned by patrons for check-in and reshelving. The “smart” book drops of the
`present invention interrogate the articles 22 as they pass into the book drop and read, record
`and process information about their identity. FIG. 1 shows one smart exterior article return
`area or book drop 32 and three smart interior article return areas or book drops 34. The
`exterior book drop 32 allows patrons to return articles when the library 10 is closed or when
`the patron does not wish to physically enter the library 10. The library policy might also
`require all checked out articles 22 to be returned to the exterior book drop 32. The book
`drops 32 or 34 may thus function as a check-in terminal for articles 22 being returned. The
`interior book drops 34 may be placed in the public area 16 and/or in the employee space
`area 18. When patrons return articles 22 to the circulation desk 28, an employee places the
`article 22 in the interior book drop 34 located in the employee space area 18. Patrons may
`also place borrowed articles 22 in either of the publicly located interior book drops 34. In
`both instances, the borrowed articles may be articles being returned after being checked out
`or articles which were used by the patron while in the library but which were not checked
`out. Each of the articles 22 have a radio frequency identification (RFID) tag, some times
`referred to as an “intelligent tag” attached thereto. The RFID tag thus becomes an
`intelligent security tag in the disclosed embodiment of the invention. The RFID tags are
`described below with respect to FIG. 2. When the RFID tags are properly interrogated, they
`return unique information which can be used to determine the identity of the article 22 and
`its proper location in the library. Second, the library 10 includes one or more pairs of
`
`Intellectual Ventures II LLC v. FedEx Corp. et al.
`Civil Action No. 2:16-CV-980-JRG
`Defendants' Invalidity Contentions, Appendix B18
`
`
`
`3
`
`Exhibit 2118 Page 3
`
`
`
`
`
`
`
`’356 Patent Claims
`
`Disclosure by Bowers and/or Other Prior Art
`“smart” pedestals 36. A pair of “smart pedestals” as described, are pedestal-configured
`devices which contain interrogators capable of communicating with RFID tags. A pair of
`smart pedestals 36 reads RFID tags when tagged articles 22 are within a predesignated zone
`between the pedestals 36. In FIG. 1, one pair of smart pedestals 36 monitors a zone in
`which a patron must pass through to enter or exit the library 10. Another pair of smart
`pedestals 36 monitors a zone in which employees enter and exit the library 10. Each of the
`zones are optionally monitored by a surveillance camera 38 or a biometric measurement
`device. The output of each pair of smart pedestals 36 is connected to the database of the
`computer 48 for verifying whether detected articles 22 within the zone between the
`pedestals 36 have been properly checked out. The library 10 may also include a pair of
`sensors, referred to herein as “dumb pedestals 40”, for detecting the presence of articles
`carrying prior art security tags, such as magnetic security tags or non-intelligent resonant
`security tags. The dumb pedestals 40 may be used to ensure that periodicals remain within a
`designated portion of the library 10 (e.g., periodical room 23). Alternatively, the dumb
`pedestals 40 may be similar to the smart pedestals 36 but are not connected to the database
`of the computer 48. Since no articles 24 are permitted to be removed from the periodical
`room 23, the detection of any article 24 between the dumb pedestals 40 triggers an alarm.
`Third, the library 10 includes portable radio frequency (RFID) tag scanners or so-called
`“RFID scanners”. These scanners can read identification information associated with an
`RFID tag, as described more fully below. One RFID scanner 42 is shown at the circulation
`desk 28, and a portable scanner 42 is shown adjacent to a set of book shelves 20. Two
`additional scanners 42 are associated with a novel checkout station, described next. When
`portability is not required, a fixed interrogator 43 may be used at the circulation desk 28
`and novel checkout station in place of, or in conjunction with, the portable scanner 42.
`Fourth, the library includes a patron self-checkout station 50 for allowing library patrons to
`check out articles 22 for removal from the premises. The checkout station 50 includes a
`fixed interrogator 43, and optionally, one or more optional portable RFID scanners 42, both
`of which are used for identifying articles 22 presented at the checkout station 50. The
`checkout station 50 also includes at least one computer terminal 52 for receiving data from
`the fixed interrogator 43 and scanner 42. The computer terminal 52 is also connected to a
`patron identification device 68. The circulation desk 28 also includes a fixed interrogator
`
`Intellectual Ventures II LLC v. FedEx Corp. et al.
`Civil Action No. 2:16-CV-980-JRG
`Defendants' Invalidity Contentions, Appendix B18
`
`
`
`4
`
`Exhibit 2118 Page 4
`
`
`
`
`
`
`
`’356 Patent Claims
`
`Disclosure by Bowers and/or Other Prior Art
`43, an optional scanner 42, computer terminal 52 and patron identification device 68 which
`may be used by either patrons or employees for article checkout. The patron self-checkout
`station 50 is described in more detail below with respect to FIG. 5. The novel systems of
`the present invention all use an RFID tag which is attached to each article 22. While such
`tags are well-known in the prior art, one particular type of RFID tag which is particularly
`suitable for use with the present invention is a passive radio frequency tag having an
`antenna, and in the preferred embodiment, an RFID tag comprising an antenna or inductor
`coil connected to an integrated circuit.
`(10:49-64) The database 66 may also optionally include a field for maintaining the
`checkout status of each article 22 and a field for maintaining the present location of the
`article 22. For instance, a checked out article is flagged as checked out in the checkout
`status field and the patron identification number of the patron who checked out the article is
`stored in the patron ID field. The patron ID field may also signify that the article is
`presently on the library shelf (for instance, with a zero (000000) stored in the Patron ID
`field) and indicate that the article has been returned and not yet reshelved (for instance, with
`a 000001 stored in the Patron ID field). It will be understood that the checkout status and
`the patron ID field, as well as other fields, may be stored in a separate database, or stored as
`a linked list, and that other information may also be stored in the database 66 or linked to
`the database 66.
`(11:5-62) Referring to FIG. 5, there is shown a schematic block diagram of the patron self-
`checkout system 50 in FIG. 1. When a patron wishes to check out an article 22 from the
`library collection, the patron identifies himself or herself to the system through a patron
`identification (ID) device 68. The patron ID device 68 may be a card reader, such as a bar
`code reader or magnetic stripe reader for reading data from a patron’s library card. The
`patron ID device 68 may also be the same fixed interrogator 43 or RFID scanner 42 used
`for interrogating articles 22. Alternatively, the patron ID device 68 may be a biometric
`(physiological) reading device, such as a fingerprint or iris scanner. In another alternative
`embodiment of the invention, the patron may directly identify himself or herself to the
`system 50 by entering an ID and/or password into the computer terminal 52. The patron ID
`data is received by the computer terminal 52 which communicates with a database of
`
`Intellectual Ventures II LLC v. FedEx Corp. et al.
`Civil Action No. 2:16-CV-980-JRG
`Defendants' Invalidity Contentions, Appendix B18
`
`
`
`5
`
`Exhibit 2118 Page 5
`
`
`
`
`
`
`
`’356 Patent Claims
`
`Disclosure by Bowers and/or Other Prior Art
`patrons stored in the computer 48 to verify that the patron is authorized to checkout articles
`22. If the patron is not in the patron database or if the patron is delinquent, the checkout
`procedure may be either terminated or the computer terminal may enter a patron
`registration routine. After the patron is identified and determined to be an authorized user,
`the checkout process may begin by performing the following steps. The patron manipulates
`either the article 22 to be checked out and/or the fixed interrogator 43 or scanner 42 so as to
`interrogate the tag 54 associated with the article 22 and read the data returned by the tag 54.
`Since the article 22 is preferably tagged with the RFID tag 54, the article 22 need only be
`placed in proximity to the interrogator 43 or scanner 42. The data output from the
`interrogator 43 or scanner 42 includes the serial number of the tag 54. The tag serial
`number is sent directly, or through the computer terminal 52, to the computer 48 which
`locates the appropriate record for the article 22 in its database 66. If an article 22 is properly
`checked into the library 10, a patron may check it out. The database 66 is then updated to
`show that the article 22 has been checked out to the patron currently using the station 50.
`These checkout steps are repeated for each article 22 that the patron wishes to check out.
`FIG. 12 shows an alternative inputting process for the patron self-checkout system 50 in
`FIGS. 1 and 5. All of the articles 22 which the patron wishes to check out may be placed on
`a tray 150 or in a predefined interrogation zone, such as a housing, in the proximity of the
`fixed interrogator 43' which simultaneously interrogates all of the articles 22. RFID
`interrogators do not require a line of sight, and thus may simultaneously interrogate
`multiple tags which are placed in a defined region regardless of their orientation in the
`region. The interrogator 43' may also be designed to read both a patron ID card 152 (which
`may also include a tag 54), as well as the tags 54 attached to the articles 22. Thus, the
`patron ID device 68 of FIG. 5 may be incorporated into the interrogator 43' of FIG. 12. To
`check out, the patron merely places the ID card 152 and the articles 22 in a defined region,
`and initiates a checkout process. The data output from the interrogator 43' is communicated
`to the database 48 either directly or via the computer terminal 52 (FIG. 5).
`(12:3-49) To ensure that only articles 22 which were properly checked out are removed
`from the library 10, the pair of smart pedestals 36 (which incorporates the elements of the
`interrogator 100 of FIG. 3 therein) interrogates the articles 22 as they pass through a zone in
`which a patron or employee must pass through to exit the library 10. The status of each
`Intellectual Ventures II LLC v. FedEx Corp. et al.
`Civil Action No. 2:16-CV-980-JRG
`Defendants' Invalidity Contentions, Appendix B18
`
`
`
`6
`
`Exhibit 2118 Page 6
`
`
`
`
`
`
`
`’356 Patent Claims
`
`Disclosure by Bowers and/or Other Prior Art
`interrogated article 22 is checked in the database 66. If an article 22 is not properly checked
`out, a visible and/or audio alarm is triggered to alert the patron and library employees to the
`problem. Alternatively, the alarm may cause a gate (not shown) to lock, thereby preventing
`the patron or employee from exiting the library 10. Alternatively, the information about the
`non-checked out article is recorded in a database and no alarm is activated. As noted above,
`the exit zones are optionally monitored by a surveillance camera 38 or biometric
`measurement device which is activated by the alarm signal to record an image or biometric
`data of the patron or employee passing through the zone. The image would be useful if the
`patron or employee disregards the alarm and exits the library 10 with the unchecked out
`article(s) 22. In an optional configuration, check out occurs automatically as the patron
`exits the library. In this embodiment, the interrogator associated with the smart pedestals 36
`can read both the patron ID card (which is also includes an RFID tag) as well as the tags 54
`attached to the articles 22. As the patron walks past the smart pedestals 36, the articles 22
`are automatically checked out. Alternatively, the patron may be required to insert an
`identification card into a card reader which unlocks an exit door or passage barrier. Smart
`pedestals 36 are placed at the exit door or passage barrier. As the patron passes through the
`exit door or passage barrier, the interrogator associated with the smart pedestals 36 checks
`out the articles 22. These optional configurations are particularly suitable for unattended
`libraries, typically found in private, corporate or university settings. If the tag of the article
`22 has write or rewrite capabilities, one or more bits of tag memory may be used to indicate
`the “checked out” status of the article 22. During checkout, the appropriate changes are
`made to the one or more bits. In this case, if the interrogator associated with the smart
`pedestals 36 detects that the article has been properly checked out, it is not necessary to
`search the database 66 to determine the status of the article 22, and the patron passes
`through the zone without sounding any alarms or causing any article database searching to
`occur.
`(22:4-24:10) (Claim 22) A library inventory control system for use in conjunction with
`articles which are maintained in the library, each of the articles having a radio frequency tag
`attached thereto, each tag including an antenna for use in detecting the presence of the
`article by receiving an interrogation signal and returning a response signal and an integrated
`circuit connected to the antenna for storing article identification information and for
`Intellectual Ventures II LLC v. FedEx Corp. et al.
`Civil Action No. 2:16-CV-980-JRG
`Defendants' Invalidity Contentions, Appendix B18
`
`
`
`7
`
`Exhibit 2118 Page 7
`
`
`
`
`
`
`
`’356 Patent Claims
`
`Disclosure by Bowers and/or Other Prior Art
`outputting the article identification information with the response signal upon interrogation
`of the tag by an interrogator, the system comprising: an inventory database including a list
`of the articles in the library and the circulation status of each such article; a patron
`identification device for identifying a patron to the system; an article checkout system
`located in an article checkout area of the library, the checkout system including a first
`interrogator for interrogating an article that the patron wants to remove from the library, the
`first interrogator receiving a response signal containing the stored article identification
`information for the article to be removed; a processor in communication with the first
`interrogator and the database, the processor receiving the patron identification information
`and the article identification information for the article to be removed from the first
`interrogator, and updating the inventory database with the circulation status of the article to
`be removed; a video camera for capturing images of the checkout area and outputting video
`signals of the captured images; a video recorder for storing the video signals on a video
`storage medium; an article check-in system including at least one article return area for
`receiving articles which were removed from the library, each returned article passing
`through a check-in zone as the article is returned; a second interrogator in communication
`with the inventory database, the second interrogator monitoring the check-in zone for
`disturbances in the form of a response signal caused by the presence of a tag within the
`zone, and outputting an interrogator output signal when a tag is detected in the zone, each
`interrogator output signal including the identification information stored in the integrated
`circuit of an interrogated tag for the article being returned, wherein the inventory data base
`receives the interrogator output signals and updates the checkout status of the article being
`returned using the interrogator output signals; a mobile interrogator for scanning discrete
`portions of the library and detecting disturbances in the form of response signals caused by
`the presence of tags within a predefined zone extending from the mobile interrogator, and
`for outputting an interrogator output signal when a tag is detected in the zone, wherein
`plural articles located in the discrete portions may be simultaneously scanned, each
`interrogator output signal including the identification information stored in the integrated
`circuit of an interrogated tag, wherein the database receives the identification information
`and updates the circulation status of the articles stored therein using only the identification
`information obtained from the interrogated tagged articles; an exit interrogator for
`
`Intellectual Ventures II LLC v. FedEx Corp. et al.
`Civil Action No. 2:16-CV-980-JRG
`Defendants' Invalidity Contentions, Appendix B18
`
`
`
`8
`
`Exhibit 2118 Page 8
`
`
`
`
`
`
`
`’356 Patent Claims
`
`Disclosure by Bowers and/or Other Prior Art
`monitoring an exit from the library, the exit interrogator for interrogating an article passing
`through the exit and thereby being removed from the library, the exit interrogator receiving
`a response signal from the tag associated with the article, the response signal containing the
`stored article identification information for the article passing through the exit; an exit
`processor coupled to the exit interrogator, the exit processor receiving an output signal from
`the exit interrogator including the identification information of the response signal, wherein
`the exit processor compares the received identification information with the information
`stored in the database to determine whether 24 the article is recorded therein as checked
`out, wherein the exit interrogator activates an alarm if the article passing through the exit is
`not recorded in the database as checked out; and a zone interrogator located at an exit of a
`predefined area of the library, the zone interrogator for detecting the removal of tagged
`articles from the predefined area, wherein the zone interrogator activates an alarm in
`response to the detection of the removal of an article from the predefined area.
`(Figure 1)
`(Figure 5)
`(Figure 12)
`Bowers discloses monitoring, using a wireless tracking system communicatively coupled to a
`computer system, locations and movements of the entity and objects within the controlled space.
`See, e.g., Bowers, 6:42-8:34; 10:49-64; 11:5-62; 12:3-49; 15:21-43; Figure 1; Figure 5; Figure 9;
`and Figure 12 partially quoted above. For example, Bowers discloses a controlled library
`environment where articles are tracked via RFID tags and patrons are identified before check-out.
`(15:21-43) FIG. 9 shows a shelf scanning inventory system 120 for the library 10 in FIG. 1.
`The system 120 is used to perform inventory and to verify that articles 22 are placed on the
`proper shelf. Taking inventory of the library’s entire collection is an extremely labor
`intensive and error-prone activity. By using the system 120, the inventory process can be
`greatly simplified and performed by lower skilled employees. Accordingly, inventory
`checks can be performed more frequently than is the current practice. The system 120 is
`implemented using a portable RFID scanner 42 connected at its output to a portable
`computer 122. The portable computer 122 stores the data collected by the RFID scanner 42
`Intellectual Ventures II LLC v. FedEx Corp. et al.
`Civil Action No. 2:16-CV-980-JRG
`Defendants' Invalidity Contentions, Appendix B18
`
`monitoring, using a
`wireless tracking system
`communicatively
`coupled to a computer
`system, locations and
`movements of the entity
`and objects within the
`controlled space;
`
`
`
`9
`
`Exhibit 2118 Page 9
`
`
`
`
`
`
`
`’356 Patent Claims
`
`automatically
`associating, using the
`computer system, the
`identity information
`regarding the entity with
`status information
`regarding additions,
`removals, returns,
`defective status, or
`movements of the objects
`to/from/within the
`controlled space; and
`
`transmitting the status
`information and the
`associated identity
`information to a server
`communicatively
`coupled to the computer
`system and configured to
`automatically notify a
`user of the status
`information, wherein at
`
`
`
`Disclosure by Bowers and/or Other Prior Art
`in a memory 130 and downloads the data to the computer 48 for updating of the database
`66. In one embodiment of the invention, the portable computer 122 and computer 48 each
`include a wireless communication device 132 for allowing the portable computer 122 to
`continuously send the scanner data to the computer 48. In another embodiment of the
`invention, the portable computer 122 is periodically hardwired or otherwise physically
`connected to the computer 48 for downloading the data from the memory 130.
`(Figure 9)
`Bowers discloses automatically associating, using the computer system, the identity information
`regarding the entity with status information regarding additions, removals, returns, defective status,
`or movements of the objects to/from/within the controlled space. See, e.g., Bowers, 6:42-8:34;
`10:49-64; 11:5-62; 12:3-49; Figure 1; Figure 5; and Figure 12 quoted above. For example, Bowers
`discloses a controlled library environment where articles are tracked via RFID tags, patrons are
`identified before check-out and associated with checked out articles, and patrons are notified of
`article status.
`
`Bowers discloses transmitting the status information and the associated identity information to a
`server communicatively coupled to the computer system and configured to automatically notify a
`user of the status information, wherein at least one of the objects is automatically returned or
`picked up as a result of such notification. See, e.g., Bowers, 9:56-10:21; and 12:3-23 quoted above.
`For instance, Bowers discloses a controlled library environment where articles are tracked via
`RFID tags, patrons are identified before check-out, and security alarms sound off if articles are
`improperly removed from the premises for the purpose of being returned.
`
`Intellectual Ventures II LLC v. FedEx Corp. et al.
`Civil Action No. 2:16-CV-980-JRG
`Defendants' Invalidity Contentions, Appendix B18
`
`10
`
`Exhibit 2118 Page 10
`
`
`
`
`
`
`
`’356 Patent Claims
`least one of the objects is
`automatically returned or
`picked up as a result of
`such notification.
`
`3. The method of claim 1
`further comprising
`notifying the user of the
`addition, removal, return,
`defective status, or
`movement of the objects.
`
`4. The method of claim 3
`further comprising
`notifying the user of
`whether or not the
`addition, removal, return,
`defective status, or
`movement of the objects
`is authorized or not.
`
`Disclosure by Bowers and/or Other Prior Art
`
`Bowers discloses the method of claim 1 further comprising notifying the user of the addition,
`removal, return, defective status, or movement of the objects. See, e.g., Bowers, 9:56-10:21 quoted
`above. For instance, Bowers discloses a library article monitoring and check-out system that
`utilizes RFID tags and notifies users of improperly placed books, books leaving the premise, and
`when a book is to be returned.
`
`Bowers discloses the method of claim 3 further comprising notifying the user of whether or not the
`addition, removal, return, defective status, or movement of the objects is authorized or not. See,
`e.g., Bowers, 9:56-10:21; and 12:3-23 quoted above. For example, Bowers discloses a notification
`system that alerts users of article removals that are improper and not authorized check-outs.
`
`5. The method of claim 4
`wherein authorization is
`determined according to
`the identity information.
`
`Bowers discloses the method of claim 4 wherein authorization is determined according to the
`identity information. See, e.g., Bowers, 9:56-10:21; and 12:3-23 quoted above. For instance,
`Bowers discloses a library check-out and monitoring system that monitors books and identifies
`potential patrons.
`
`7. The method of claim 1
`wherein the wireless
`tracking system includes
`barcode labels affixed to
`one or more of the
`
`Bowers discloses the method of claim 1 wherein the wireless tracking system includes barcode
`labels affixed to one or more of the objects. See, e.g., Bowers, 6:56-58; 9:63-67; 11:5-23; Figure 1;
`and Figure 5 partially quoted above. For example, Bowers discloses tracking articles by any
`means, such as barcodes or RFID tags.
`(9:63-67) 3. Next, item identification information is obtained for the article 22, by any
`
`Intellectual Ventures II LLC v. FedEx Corp. et al.
`Civil Action No. 2:16-CV-980-JRG
`Defendants' Invalidity Contentions, Appendix B18
`
`
`
`11
`
`Exhibit 2118 Page 11
`
`
`
`
`
`
`
`’356 Patent Claims
`objects.
`
`11. The method of
`claim 1 wherein the
`server is
`communicatively
`coupled to the computer
`system via one of a
`wireless communication
`link, or a network
`communication link.
`
`Disclosure by Bowers and/or Other Prior Art
`means, such as by reading existing bar codes or labels on the article 22 or by manually
`entering identifying information or reading such information from another database or
`storage device.
`Bowers discloses the method of claim 1 wherein the server is communicatively coupled to the
`computer system via one of a wireless communication link, or a network communication link. See,
`e.g., Bowers, 6:43-7:5; 9:56-10:48; Figure 1; and Figure 4 partially quoted above. For instance,
`Bowers discloses an online catalog system linked to the database and computers.
`(9:56-10:48) In the example illustrated herein, the library 10 applies tags 54 to 100 articles.
`Next, an inventory database is created in the following manner: 1. An article 22 is read by a
`fixed interrogator 43 or by a portable RFID scanner 42 which extracts the unique
`programmed serial number from the tag 54. 2. A database record is added for the serial
`number. 3. Next, item identification information is obtained for the article 22, by any
`means, such as by reading existing bar codes or labels on the article 22 or by manually
`entering identifying information or reading such information from another database or
`storage device. The item identification information is then added to the database record for
`the respective tag serial number. Most large libraries already have an automated on-line
`catalog which is generated from an existing database of their collection (i.e., articles 22).
`Thus, the library 10 need only add information to an existing data field to identify the serial
`number of the specific tag 54 which is attached to the article 22, rather than create an
`entirely new database of information for tagged articles 22. Alternatively, the library 10
`could maintain its existing on-line catalog and create a new database for tracking the status
`of the tagged articles 22. The discussion below presumes that the library 10 sets up either a
`fully integrated database or that the on-line catalog information is linked with the tagged
`article database so that all available information about an article 22 is easily retrievable.
`The database of articles 22 in the library collection also includes circulation status
`information (not shown), such as whether an article 22 is checked out, who has checked it
`out, and when it is due back (i.e., article due data). FIG. 4 is a sample of a sequence of
`database records created by the process described above. Each record includes a field for
`tag identification information (e.g., the serial number of the tag 22) and a field for item
`identification
`information. Tag
`identification
`information correlates with “article
`
`Intellectual Ventures II LLC v. FedEx Corp. et al.
`Civil Action No. 2:16-CV-980-JRG
`Defendants' Invalidity Contentions, Appendix B18
`
`
`
`12
`
`Exhibit 2118 Page 12
`
`
`
`Disclosure by Bowers and/or Other Prior Art
`identification information” and so is also referred to as “article identification information.”
`That is, because the tag serial number is unique, it may be used to identify the article. The
`item identification information may be a Dewey Decimal System call number, a Library of
`Congress call number, ISBN number, or an arbitrarily assigned number. The last digit of
`item identification information may be used to identify the copy number of the item in the
`library’s inventory. Item identification information may also include any part of the
`bibliographic data, such as title, author, publisher and the like. optionally, the database
`record may include additional information, such as a predetermined location of a large
`library system where the article 22 is stor