throbber

`
`
`
`
`
`
`
`
`DEFENDANTS’ INVALIDITY CONTENTIONS
`APPENDIX B18
`
`Intellectual Ventures II LLC, v. FedEx Corp. et al.
`Civil Action No. 2:16-CV-980-JRG (E.D. TX)
`
`
`
`Exhibit 2118 Page 1
`
`IV Exhibit 2118
`FedEx v. IV
`Case IPR2017-02028
`
`

`

`
`
`
`
`
`
`INVALIDITY CHART FOR U.S. PATENT NO. 6,909,356
`
`AND
`
`UNITED STATES PATENT NO. 5,963,134 TO BOWERS ET AL. (“BOWERS”)
`
`As shown below, Bowers anticipates U.S. Patent No. 6,909,356 (“’356 patent”) claims 1, 3-5, 7, 11-14, and 17. Additionally or
`alternatively, Bowers renders obvious the ’356 patent, either alone or in combination with one or more of the following:
`- U.S. Patent No. 7,844,505 (“Arneson”) (Appendix B01)
`- U.S. Patent No. 6,748,318 (“Jones”) (Appendix B02)
`The above reference combinations are exemplary only and are not intended to be limiting. For example, Bowers also renders obvious
`the ’356 patent in combination with one or more of the other prior art provided in the claim charts in Appendices B01-B23, and/or the
`prior art provided in Appendix F.
`’356 Patent Claims
`1. A method, comprising:
`obtaining identity
`information regarding an
`entity which enters a
`controlled space;
`
`Disclosure by Bowers and/or Other Prior Art
`Bowers discloses obtaining identity information regarding an entity which enters a controlled
`space. See, e.g., Bowers, 6:42-8:34; 10:49-64; 11:5-62; 12:3-49; 22:4-24:10; Figure 1; Figure 5;
`and Figure 12. For example, Bowers discloses a controlled library environment where articles are
`tracked via RFID tags and patrons are identified before check-out.
`(6:42-8:34) Referring to FIG. 1, the library 10 is divided into a public space area 16 for use
`by library patrons, and an employee space area 18. The public space area 16 includes a
`storage area in the form of a plurality of shelves or stacks 20 for holding articles such as
`books, periodicals, audio tapes, CD’s, video tapes, wall art, sheet music and the like 22, a
`periodical room 23 having additional shelves or stacks 24, and a plurality of on-line
`computerized catalogs 26 of library holdings. A circulation desk 28 separates a portion of
`the public space area 16 from a portion of the employee space area 18. The employee space
`area 18 includes a back office operations area 30. Additional on-line computerized catalogs
`26 are located at the circulation desk 28 and in the back office operations area 30. Other
`miscellaneous computer equipment may be placed in these locations, such as a barcode
`reader 46, or a computer 48. A database associated with the computer 48 stores inventory
`data on all of the articles 22 in the library collection, as well as data regarding articles 22
`Intellectual Ventures II LLC v. FedEx Corp. et al.
`Civil Action No. 2:16-CV-980-JRG
`Defendants' Invalidity Contentions, Appendix B18
`
`2
`
`Exhibit 2118 Page 2
`
`

`

`
`
`
`
`’356 Patent Claims
`
`Disclosure by Bowers and/or Other Prior Art
`checked out by patrons. The on-line catalogs 26 are connected to the computer 48 and its
`database. All of the features and elements described above are conventional. Libraries also
`typically include areas devoted to other resource information, such as videos, CD-ROMs,
`cassettes or the like. For brevity, these alternative resources are not shown in FIG. 1.
`Throughout the specification, the word articles and books are used interchangeably.
`However, it should be understood that the scope of the word “article” includes other types
`of items which are typically found in a library, such as videos, CD-ROMS, cassettes,
`newspapers or the like. The library 10 further includes elements which are associated with
`novel methods and systems for inventory control and article usage tracking. First, the
`library includes a plurality of “smart” article return areas or book drops. Prior art book
`drops merely functioned to provide a temporary storage location for books which were
`being returned by patrons for check-in and reshelving. The “smart” book drops of the
`present invention interrogate the articles 22 as they pass into the book drop and read, record
`and process information about their identity. FIG. 1 shows one smart exterior article return
`area or book drop 32 and three smart interior article return areas or book drops 34. The
`exterior book drop 32 allows patrons to return articles when the library 10 is closed or when
`the patron does not wish to physically enter the library 10. The library policy might also
`require all checked out articles 22 to be returned to the exterior book drop 32. The book
`drops 32 or 34 may thus function as a check-in terminal for articles 22 being returned. The
`interior book drops 34 may be placed in the public area 16 and/or in the employee space
`area 18. When patrons return articles 22 to the circulation desk 28, an employee places the
`article 22 in the interior book drop 34 located in the employee space area 18. Patrons may
`also place borrowed articles 22 in either of the publicly located interior book drops 34. In
`both instances, the borrowed articles may be articles being returned after being checked out
`or articles which were used by the patron while in the library but which were not checked
`out. Each of the articles 22 have a radio frequency identification (RFID) tag, some times
`referred to as an “intelligent tag” attached thereto. The RFID tag thus becomes an
`intelligent security tag in the disclosed embodiment of the invention. The RFID tags are
`described below with respect to FIG. 2. When the RFID tags are properly interrogated, they
`return unique information which can be used to determine the identity of the article 22 and
`its proper location in the library. Second, the library 10 includes one or more pairs of
`
`Intellectual Ventures II LLC v. FedEx Corp. et al.
`Civil Action No. 2:16-CV-980-JRG
`Defendants' Invalidity Contentions, Appendix B18
`
`
`
`3
`
`Exhibit 2118 Page 3
`
`

`

`
`
`
`
`’356 Patent Claims
`
`Disclosure by Bowers and/or Other Prior Art
`“smart” pedestals 36. A pair of “smart pedestals” as described, are pedestal-configured
`devices which contain interrogators capable of communicating with RFID tags. A pair of
`smart pedestals 36 reads RFID tags when tagged articles 22 are within a predesignated zone
`between the pedestals 36. In FIG. 1, one pair of smart pedestals 36 monitors a zone in
`which a patron must pass through to enter or exit the library 10. Another pair of smart
`pedestals 36 monitors a zone in which employees enter and exit the library 10. Each of the
`zones are optionally monitored by a surveillance camera 38 or a biometric measurement
`device. The output of each pair of smart pedestals 36 is connected to the database of the
`computer 48 for verifying whether detected articles 22 within the zone between the
`pedestals 36 have been properly checked out. The library 10 may also include a pair of
`sensors, referred to herein as “dumb pedestals 40”, for detecting the presence of articles
`carrying prior art security tags, such as magnetic security tags or non-intelligent resonant
`security tags. The dumb pedestals 40 may be used to ensure that periodicals remain within a
`designated portion of the library 10 (e.g., periodical room 23). Alternatively, the dumb
`pedestals 40 may be similar to the smart pedestals 36 but are not connected to the database
`of the computer 48. Since no articles 24 are permitted to be removed from the periodical
`room 23, the detection of any article 24 between the dumb pedestals 40 triggers an alarm.
`Third, the library 10 includes portable radio frequency (RFID) tag scanners or so-called
`“RFID scanners”. These scanners can read identification information associated with an
`RFID tag, as described more fully below. One RFID scanner 42 is shown at the circulation
`desk 28, and a portable scanner 42 is shown adjacent to a set of book shelves 20. Two
`additional scanners 42 are associated with a novel checkout station, described next. When
`portability is not required, a fixed interrogator 43 may be used at the circulation desk 28
`and novel checkout station in place of, or in conjunction with, the portable scanner 42.
`Fourth, the library includes a patron self-checkout station 50 for allowing library patrons to
`check out articles 22 for removal from the premises. The checkout station 50 includes a
`fixed interrogator 43, and optionally, one or more optional portable RFID scanners 42, both
`of which are used for identifying articles 22 presented at the checkout station 50. The
`checkout station 50 also includes at least one computer terminal 52 for receiving data from
`the fixed interrogator 43 and scanner 42. The computer terminal 52 is also connected to a
`patron identification device 68. The circulation desk 28 also includes a fixed interrogator
`
`Intellectual Ventures II LLC v. FedEx Corp. et al.
`Civil Action No. 2:16-CV-980-JRG
`Defendants' Invalidity Contentions, Appendix B18
`
`
`
`4
`
`Exhibit 2118 Page 4
`
`

`

`
`
`
`
`’356 Patent Claims
`
`Disclosure by Bowers and/or Other Prior Art
`43, an optional scanner 42, computer terminal 52 and patron identification device 68 which
`may be used by either patrons or employees for article checkout. The patron self-checkout
`station 50 is described in more detail below with respect to FIG. 5. The novel systems of
`the present invention all use an RFID tag which is attached to each article 22. While such
`tags are well-known in the prior art, one particular type of RFID tag which is particularly
`suitable for use with the present invention is a passive radio frequency tag having an
`antenna, and in the preferred embodiment, an RFID tag comprising an antenna or inductor
`coil connected to an integrated circuit.
`(10:49-64) The database 66 may also optionally include a field for maintaining the
`checkout status of each article 22 and a field for maintaining the present location of the
`article 22. For instance, a checked out article is flagged as checked out in the checkout
`status field and the patron identification number of the patron who checked out the article is
`stored in the patron ID field. The patron ID field may also signify that the article is
`presently on the library shelf (for instance, with a zero (000000) stored in the Patron ID
`field) and indicate that the article has been returned and not yet reshelved (for instance, with
`a 000001 stored in the Patron ID field). It will be understood that the checkout status and
`the patron ID field, as well as other fields, may be stored in a separate database, or stored as
`a linked list, and that other information may also be stored in the database 66 or linked to
`the database 66.
`(11:5-62) Referring to FIG. 5, there is shown a schematic block diagram of the patron self-
`checkout system 50 in FIG. 1. When a patron wishes to check out an article 22 from the
`library collection, the patron identifies himself or herself to the system through a patron
`identification (ID) device 68. The patron ID device 68 may be a card reader, such as a bar
`code reader or magnetic stripe reader for reading data from a patron’s library card. The
`patron ID device 68 may also be the same fixed interrogator 43 or RFID scanner 42 used
`for interrogating articles 22. Alternatively, the patron ID device 68 may be a biometric
`(physiological) reading device, such as a fingerprint or iris scanner. In another alternative
`embodiment of the invention, the patron may directly identify himself or herself to the
`system 50 by entering an ID and/or password into the computer terminal 52. The patron ID
`data is received by the computer terminal 52 which communicates with a database of
`
`Intellectual Ventures II LLC v. FedEx Corp. et al.
`Civil Action No. 2:16-CV-980-JRG
`Defendants' Invalidity Contentions, Appendix B18
`
`
`
`5
`
`Exhibit 2118 Page 5
`
`

`

`
`
`
`
`’356 Patent Claims
`
`Disclosure by Bowers and/or Other Prior Art
`patrons stored in the computer 48 to verify that the patron is authorized to checkout articles
`22. If the patron is not in the patron database or if the patron is delinquent, the checkout
`procedure may be either terminated or the computer terminal may enter a patron
`registration routine. After the patron is identified and determined to be an authorized user,
`the checkout process may begin by performing the following steps. The patron manipulates
`either the article 22 to be checked out and/or the fixed interrogator 43 or scanner 42 so as to
`interrogate the tag 54 associated with the article 22 and read the data returned by the tag 54.
`Since the article 22 is preferably tagged with the RFID tag 54, the article 22 need only be
`placed in proximity to the interrogator 43 or scanner 42. The data output from the
`interrogator 43 or scanner 42 includes the serial number of the tag 54. The tag serial
`number is sent directly, or through the computer terminal 52, to the computer 48 which
`locates the appropriate record for the article 22 in its database 66. If an article 22 is properly
`checked into the library 10, a patron may check it out. The database 66 is then updated to
`show that the article 22 has been checked out to the patron currently using the station 50.
`These checkout steps are repeated for each article 22 that the patron wishes to check out.
`FIG. 12 shows an alternative inputting process for the patron self-checkout system 50 in
`FIGS. 1 and 5. All of the articles 22 which the patron wishes to check out may be placed on
`a tray 150 or in a predefined interrogation zone, such as a housing, in the proximity of the
`fixed interrogator 43' which simultaneously interrogates all of the articles 22. RFID
`interrogators do not require a line of sight, and thus may simultaneously interrogate
`multiple tags which are placed in a defined region regardless of their orientation in the
`region. The interrogator 43' may also be designed to read both a patron ID card 152 (which
`may also include a tag 54), as well as the tags 54 attached to the articles 22. Thus, the
`patron ID device 68 of FIG. 5 may be incorporated into the interrogator 43' of FIG. 12. To
`check out, the patron merely places the ID card 152 and the articles 22 in a defined region,
`and initiates a checkout process. The data output from the interrogator 43' is communicated
`to the database 48 either directly or via the computer terminal 52 (FIG. 5).
`(12:3-49) To ensure that only articles 22 which were properly checked out are removed
`from the library 10, the pair of smart pedestals 36 (which incorporates the elements of the
`interrogator 100 of FIG. 3 therein) interrogates the articles 22 as they pass through a zone in
`which a patron or employee must pass through to exit the library 10. The status of each
`Intellectual Ventures II LLC v. FedEx Corp. et al.
`Civil Action No. 2:16-CV-980-JRG
`Defendants' Invalidity Contentions, Appendix B18
`
`
`
`6
`
`Exhibit 2118 Page 6
`
`

`

`
`
`
`
`’356 Patent Claims
`
`Disclosure by Bowers and/or Other Prior Art
`interrogated article 22 is checked in the database 66. If an article 22 is not properly checked
`out, a visible and/or audio alarm is triggered to alert the patron and library employees to the
`problem. Alternatively, the alarm may cause a gate (not shown) to lock, thereby preventing
`the patron or employee from exiting the library 10. Alternatively, the information about the
`non-checked out article is recorded in a database and no alarm is activated. As noted above,
`the exit zones are optionally monitored by a surveillance camera 38 or biometric
`measurement device which is activated by the alarm signal to record an image or biometric
`data of the patron or employee passing through the zone. The image would be useful if the
`patron or employee disregards the alarm and exits the library 10 with the unchecked out
`article(s) 22. In an optional configuration, check out occurs automatically as the patron
`exits the library. In this embodiment, the interrogator associated with the smart pedestals 36
`can read both the patron ID card (which is also includes an RFID tag) as well as the tags 54
`attached to the articles 22. As the patron walks past the smart pedestals 36, the articles 22
`are automatically checked out. Alternatively, the patron may be required to insert an
`identification card into a card reader which unlocks an exit door or passage barrier. Smart
`pedestals 36 are placed at the exit door or passage barrier. As the patron passes through the
`exit door or passage barrier, the interrogator associated with the smart pedestals 36 checks
`out the articles 22. These optional configurations are particularly suitable for unattended
`libraries, typically found in private, corporate or university settings. If the tag of the article
`22 has write or rewrite capabilities, one or more bits of tag memory may be used to indicate
`the “checked out” status of the article 22. During checkout, the appropriate changes are
`made to the one or more bits. In this case, if the interrogator associated with the smart
`pedestals 36 detects that the article has been properly checked out, it is not necessary to
`search the database 66 to determine the status of the article 22, and the patron passes
`through the zone without sounding any alarms or causing any article database searching to
`occur.
`(22:4-24:10) (Claim 22) A library inventory control system for use in conjunction with
`articles which are maintained in the library, each of the articles having a radio frequency tag
`attached thereto, each tag including an antenna for use in detecting the presence of the
`article by receiving an interrogation signal and returning a response signal and an integrated
`circuit connected to the antenna for storing article identification information and for
`Intellectual Ventures II LLC v. FedEx Corp. et al.
`Civil Action No. 2:16-CV-980-JRG
`Defendants' Invalidity Contentions, Appendix B18
`
`
`
`7
`
`Exhibit 2118 Page 7
`
`

`

`
`
`
`
`’356 Patent Claims
`
`Disclosure by Bowers and/or Other Prior Art
`outputting the article identification information with the response signal upon interrogation
`of the tag by an interrogator, the system comprising: an inventory database including a list
`of the articles in the library and the circulation status of each such article; a patron
`identification device for identifying a patron to the system; an article checkout system
`located in an article checkout area of the library, the checkout system including a first
`interrogator for interrogating an article that the patron wants to remove from the library, the
`first interrogator receiving a response signal containing the stored article identification
`information for the article to be removed; a processor in communication with the first
`interrogator and the database, the processor receiving the patron identification information
`and the article identification information for the article to be removed from the first
`interrogator, and updating the inventory database with the circulation status of the article to
`be removed; a video camera for capturing images of the checkout area and outputting video
`signals of the captured images; a video recorder for storing the video signals on a video
`storage medium; an article check-in system including at least one article return area for
`receiving articles which were removed from the library, each returned article passing
`through a check-in zone as the article is returned; a second interrogator in communication
`with the inventory database, the second interrogator monitoring the check-in zone for
`disturbances in the form of a response signal caused by the presence of a tag within the
`zone, and outputting an interrogator output signal when a tag is detected in the zone, each
`interrogator output signal including the identification information stored in the integrated
`circuit of an interrogated tag for the article being returned, wherein the inventory data base
`receives the interrogator output signals and updates the checkout status of the article being
`returned using the interrogator output signals; a mobile interrogator for scanning discrete
`portions of the library and detecting disturbances in the form of response signals caused by
`the presence of tags within a predefined zone extending from the mobile interrogator, and
`for outputting an interrogator output signal when a tag is detected in the zone, wherein
`plural articles located in the discrete portions may be simultaneously scanned, each
`interrogator output signal including the identification information stored in the integrated
`circuit of an interrogated tag, wherein the database receives the identification information
`and updates the circulation status of the articles stored therein using only the identification
`information obtained from the interrogated tagged articles; an exit interrogator for
`
`Intellectual Ventures II LLC v. FedEx Corp. et al.
`Civil Action No. 2:16-CV-980-JRG
`Defendants' Invalidity Contentions, Appendix B18
`
`
`
`8
`
`Exhibit 2118 Page 8
`
`

`

`
`
`
`
`’356 Patent Claims
`
`Disclosure by Bowers and/or Other Prior Art
`monitoring an exit from the library, the exit interrogator for interrogating an article passing
`through the exit and thereby being removed from the library, the exit interrogator receiving
`a response signal from the tag associated with the article, the response signal containing the
`stored article identification information for the article passing through the exit; an exit
`processor coupled to the exit interrogator, the exit processor receiving an output signal from
`the exit interrogator including the identification information of the response signal, wherein
`the exit processor compares the received identification information with the information
`stored in the database to determine whether 24 the article is recorded therein as checked
`out, wherein the exit interrogator activates an alarm if the article passing through the exit is
`not recorded in the database as checked out; and a zone interrogator located at an exit of a
`predefined area of the library, the zone interrogator for detecting the removal of tagged
`articles from the predefined area, wherein the zone interrogator activates an alarm in
`response to the detection of the removal of an article from the predefined area.
`(Figure 1)
`(Figure 5)
`(Figure 12)
`Bowers discloses monitoring, using a wireless tracking system communicatively coupled to a
`computer system, locations and movements of the entity and objects within the controlled space.
`See, e.g., Bowers, 6:42-8:34; 10:49-64; 11:5-62; 12:3-49; 15:21-43; Figure 1; Figure 5; Figure 9;
`and Figure 12 partially quoted above. For example, Bowers discloses a controlled library
`environment where articles are tracked via RFID tags and patrons are identified before check-out.
`(15:21-43) FIG. 9 shows a shelf scanning inventory system 120 for the library 10 in FIG. 1.
`The system 120 is used to perform inventory and to verify that articles 22 are placed on the
`proper shelf. Taking inventory of the library’s entire collection is an extremely labor
`intensive and error-prone activity. By using the system 120, the inventory process can be
`greatly simplified and performed by lower skilled employees. Accordingly, inventory
`checks can be performed more frequently than is the current practice. The system 120 is
`implemented using a portable RFID scanner 42 connected at its output to a portable
`computer 122. The portable computer 122 stores the data collected by the RFID scanner 42
`Intellectual Ventures II LLC v. FedEx Corp. et al.
`Civil Action No. 2:16-CV-980-JRG
`Defendants' Invalidity Contentions, Appendix B18
`
`monitoring, using a
`wireless tracking system
`communicatively
`coupled to a computer
`system, locations and
`movements of the entity
`and objects within the
`controlled space;
`
`
`
`9
`
`Exhibit 2118 Page 9
`
`

`

`
`
`
`
`’356 Patent Claims
`
`automatically
`associating, using the
`computer system, the
`identity information
`regarding the entity with
`status information
`regarding additions,
`removals, returns,
`defective status, or
`movements of the objects
`to/from/within the
`controlled space; and
`
`transmitting the status
`information and the
`associated identity
`information to a server
`communicatively
`coupled to the computer
`system and configured to
`automatically notify a
`user of the status
`information, wherein at
`
`
`
`Disclosure by Bowers and/or Other Prior Art
`in a memory 130 and downloads the data to the computer 48 for updating of the database
`66. In one embodiment of the invention, the portable computer 122 and computer 48 each
`include a wireless communication device 132 for allowing the portable computer 122 to
`continuously send the scanner data to the computer 48. In another embodiment of the
`invention, the portable computer 122 is periodically hardwired or otherwise physically
`connected to the computer 48 for downloading the data from the memory 130.
`(Figure 9)
`Bowers discloses automatically associating, using the computer system, the identity information
`regarding the entity with status information regarding additions, removals, returns, defective status,
`or movements of the objects to/from/within the controlled space. See, e.g., Bowers, 6:42-8:34;
`10:49-64; 11:5-62; 12:3-49; Figure 1; Figure 5; and Figure 12 quoted above. For example, Bowers
`discloses a controlled library environment where articles are tracked via RFID tags, patrons are
`identified before check-out and associated with checked out articles, and patrons are notified of
`article status.
`
`Bowers discloses transmitting the status information and the associated identity information to a
`server communicatively coupled to the computer system and configured to automatically notify a
`user of the status information, wherein at least one of the objects is automatically returned or
`picked up as a result of such notification. See, e.g., Bowers, 9:56-10:21; and 12:3-23 quoted above.
`For instance, Bowers discloses a controlled library environment where articles are tracked via
`RFID tags, patrons are identified before check-out, and security alarms sound off if articles are
`improperly removed from the premises for the purpose of being returned.
`
`Intellectual Ventures II LLC v. FedEx Corp. et al.
`Civil Action No. 2:16-CV-980-JRG
`Defendants' Invalidity Contentions, Appendix B18
`
`10
`
`Exhibit 2118 Page 10
`
`

`

`
`
`
`
`’356 Patent Claims
`least one of the objects is
`automatically returned or
`picked up as a result of
`such notification.
`
`3. The method of claim 1
`further comprising
`notifying the user of the
`addition, removal, return,
`defective status, or
`movement of the objects.
`
`4. The method of claim 3
`further comprising
`notifying the user of
`whether or not the
`addition, removal, return,
`defective status, or
`movement of the objects
`is authorized or not.
`
`Disclosure by Bowers and/or Other Prior Art
`
`Bowers discloses the method of claim 1 further comprising notifying the user of the addition,
`removal, return, defective status, or movement of the objects. See, e.g., Bowers, 9:56-10:21 quoted
`above. For instance, Bowers discloses a library article monitoring and check-out system that
`utilizes RFID tags and notifies users of improperly placed books, books leaving the premise, and
`when a book is to be returned.
`
`Bowers discloses the method of claim 3 further comprising notifying the user of whether or not the
`addition, removal, return, defective status, or movement of the objects is authorized or not. See,
`e.g., Bowers, 9:56-10:21; and 12:3-23 quoted above. For example, Bowers discloses a notification
`system that alerts users of article removals that are improper and not authorized check-outs.
`
`5. The method of claim 4
`wherein authorization is
`determined according to
`the identity information.
`
`Bowers discloses the method of claim 4 wherein authorization is determined according to the
`identity information. See, e.g., Bowers, 9:56-10:21; and 12:3-23 quoted above. For instance,
`Bowers discloses a library check-out and monitoring system that monitors books and identifies
`potential patrons.
`
`7. The method of claim 1
`wherein the wireless
`tracking system includes
`barcode labels affixed to
`one or more of the
`
`Bowers discloses the method of claim 1 wherein the wireless tracking system includes barcode
`labels affixed to one or more of the objects. See, e.g., Bowers, 6:56-58; 9:63-67; 11:5-23; Figure 1;
`and Figure 5 partially quoted above. For example, Bowers discloses tracking articles by any
`means, such as barcodes or RFID tags.
`(9:63-67) 3. Next, item identification information is obtained for the article 22, by any
`
`Intellectual Ventures II LLC v. FedEx Corp. et al.
`Civil Action No. 2:16-CV-980-JRG
`Defendants' Invalidity Contentions, Appendix B18
`
`
`
`11
`
`Exhibit 2118 Page 11
`
`

`

`
`
`
`
`’356 Patent Claims
`objects.
`
`11. The method of
`claim 1 wherein the
`server is
`communicatively
`coupled to the computer
`system via one of a
`wireless communication
`link, or a network
`communication link.
`
`Disclosure by Bowers and/or Other Prior Art
`means, such as by reading existing bar codes or labels on the article 22 or by manually
`entering identifying information or reading such information from another database or
`storage device.
`Bowers discloses the method of claim 1 wherein the server is communicatively coupled to the
`computer system via one of a wireless communication link, or a network communication link. See,
`e.g., Bowers, 6:43-7:5; 9:56-10:48; Figure 1; and Figure 4 partially quoted above. For instance,
`Bowers discloses an online catalog system linked to the database and computers.
`(9:56-10:48) In the example illustrated herein, the library 10 applies tags 54 to 100 articles.
`Next, an inventory database is created in the following manner: 1. An article 22 is read by a
`fixed interrogator 43 or by a portable RFID scanner 42 which extracts the unique
`programmed serial number from the tag 54. 2. A database record is added for the serial
`number. 3. Next, item identification information is obtained for the article 22, by any
`means, such as by reading existing bar codes or labels on the article 22 or by manually
`entering identifying information or reading such information from another database or
`storage device. The item identification information is then added to the database record for
`the respective tag serial number. Most large libraries already have an automated on-line
`catalog which is generated from an existing database of their collection (i.e., articles 22).
`Thus, the library 10 need only add information to an existing data field to identify the serial
`number of the specific tag 54 which is attached to the article 22, rather than create an
`entirely new database of information for tagged articles 22. Alternatively, the library 10
`could maintain its existing on-line catalog and create a new database for tracking the status
`of the tagged articles 22. The discussion below presumes that the library 10 sets up either a
`fully integrated database or that the on-line catalog information is linked with the tagged
`article database so that all available information about an article 22 is easily retrievable.
`The database of articles 22 in the library collection also includes circulation status
`information (not shown), such as whether an article 22 is checked out, who has checked it
`out, and when it is due back (i.e., article due data). FIG. 4 is a sample of a sequence of
`database records created by the process described above. Each record includes a field for
`tag identification information (e.g., the serial number of the tag 22) and a field for item
`identification
`information. Tag
`identification
`information correlates with “article
`
`Intellectual Ventures II LLC v. FedEx Corp. et al.
`Civil Action No. 2:16-CV-980-JRG
`Defendants' Invalidity Contentions, Appendix B18
`
`
`
`12
`
`Exhibit 2118 Page 12
`
`

`

`Disclosure by Bowers and/or Other Prior Art
`identification information” and so is also referred to as “article identification information.”
`That is, because the tag serial number is unique, it may be used to identify the article. The
`item identification information may be a Dewey Decimal System call number, a Library of
`Congress call number, ISBN number, or an arbitrarily assigned number. The last digit of
`item identification information may be used to identify the copy number of the item in the
`library’s inventory. Item identification information may also include any part of the
`bibliographic data, such as title, author, publisher and the like. optionally, the database
`record may include additional information, such as a predetermined location of a large
`library system where the article 22 is stor

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket