throbber
Trials@uspto.gov
`Tel: 571-272-7822
`
`Paper No. 13
`Entered: August 12, 2019
`
`
`UNITED STATES PATENT AND TRADEMARK OFFICE
`_______________
`
`BEFORE THE PATENT TRIAL AND APPEAL BOARD
`_______________
`
`UNIFIED PATENTS INC.,
`Petitioner,
`
`v.
`
`VINDOLOR, LLC,
`Patent Owner.
`____________
`
`Case IPR2019-00478
`Patent 6,213,391 B1
`____________
`
`
`
`Before KALYAN K. DESHPANDE, WILLIAM V. SAINDON,
`and SCOTT E. BAIN, Administrative Patent Judges.
`
`SAINDON, Administrative Patent Judge.
`
`
`
`DECISION
`Denying Petitioner’s Request on Rehearing of Decision Denying Institution
`37 C.F.R. § 42.71
`
`
`
`
`
`

`

`IPR2019-00478
`Patent 6,213,391 B1
`
`INTRODUCTION
`I.
`Unified Patents, Inc. (“Petitioner”) filed a petition requesting inter
`partes review of claims 1 and 2 of U.S. Patent No. 6,213,391 B1 (Ex. 1001,
`“the ’391 patent”). Paper 1 (“Pet.”). We issued a Decision Denying
`Institution (Paper 9, “Dec. on Inst.”), based upon a finding that Petitioner
`had not shown that the relied upon reference (Gullman1) taught a particular
`“access code” limitation. See, e.g., Dec. on Inst. 6 (“Gullman’s security
`token is not [the claimed] access code because the security token is used to
`provide transmission security, not to provide access”). Petitioner requests
`rehearing (Paper 10, “Request” or “Req. Reh’g”), arguing that we
`overlooked or misapprehended its positions regarding the “access code”
`limitation. Req. Reh’g 1.
`When rehearing a decision on petition, the Board will review the
`decision for an abuse of discretion. 37 C.F.R. § 42.71(c). “An abuse of
`discretion occurs if a decision is based on an erroneous interpretation of law,
`if a factual finding is not supported by substantial evidence, or if the
`decision represents an unreasonable judgment in weighing relevant factors.”
`Arnold P’ship v. Dudas, 362 F.3d 1338, 1340 (Fed. Cir. 2004). The party
`requesting rehearing bears the burden of showing an abuse of discretion, and
`“[t]he request must specifically identify all matters the party believes the
`Board misapprehended or overlooked.” 37 C.F.R. § 42.71(d).
`Upon consideration of Petitioner’s arguments, we deny Petitioner’s
`Request.
`
`
`1 U.S. Patent No. 5,280,527, issued Jan. 18, 1994 (Ex. 1004).
`
`2
`
`

`

`IPR2019-00478
`Patent 6,213,391 B1
`
`II. PETITIONER’S REQUEST
`Petitioner argues three points. First, Petitioner argues that “the
`Decision overlooks portions of the Petition that show Gullman’s security
`token is also an ‘access code,’ as claimed, and can be used in a similar
`fashion as disclosed in the ’391 patent.” Req. Reh’g 2–4. Second, Petitioner
`argues that “the Decision appears not to recognize that Gullman advances
`the prior art by disclosing a security token that provides both transmission
`security and user identification/access.” Id. at 4–5. Third, Petitioner argues
`that “the Decision found that Gullman ‘decodes the security token and uses
`what is encoded within to determine whether to grant access’” but that
`“Gullman’s security token . . . provides all of the information necessary to
`authorize access” and that “the claims of the ’391 patent do not require that
`the ‘access code’ be received in a decoded or decrypted form.” Id. at 5–6.
`
`III. ANALYSIS
`Petitioner’s Request disagrees with the outcome of our Decision and
`argues why it believes we should have reached a different outcome, but does
`not point to any specific thing we misapprehended or overlooked. Instead,
`Petitioner’s arguments merely set out how it believes we could have ruled in
`its favor. Underlying Petitioner’s arguments is the notion that we could have
`ruled in its favor had we construed the claims in a particular manner.
`Critically, however, Petitioner never argued such a claim construction in the
`Petition. Specifically, Petitioner did not set out a claim construction that
`would lead us to find that a security token containing an access code is itself
`an access code. Because the claim construction was not made, we could not
`have overlooked or misunderstood arguments made in reliance of it.
`
`3
`
`

`

`IPR2019-00478
`Patent 6,213,391 B1
`Further, Gullman makes clear that its security token is not itself an
`access code—it is a container for various separate and distinct items that are
`separately evaluated to determine access. For example:
`The access device 12 transmits the token to the host 10 which
`decrypts or decodes the token to derive the fixed code and
`correlation factor. If the fixed code identifies a valid user and the
`correlation factor is above the threshold level, then access is
`permitted. If not, then access is denied. With a fixed code to
`identify a particular person or group of persons, the host can be
`programmed to control the type of access or transactions allowed
`for such fixed code.
`Ex. 1004, 6:37–45 (emphasis added); see also id. at 6:17–22 (correlation
`factor determines if verification successful), 4:29–33 (verification and access
`based on correlation factor and fixed code).
`
`We turn back to Petitioner’s three arguments in its Request. As to the
`first argument, that Gullman’s token is an access code, we addressed that
`position in our Decision on Intuition and above. Functionally, a security
`container and an access code are different things. E.g., id. at 1:28–39. The
`function of Gullman’s token is to provide security, not access. As to the
`second argument, that Gullman’s token provides both security and access,
`we again point to the language in Gullman that states that it is not the token
`but the decoded contents therein that provide access. E.g., id. at 6:37–45.
`Petitioner has not provided a claim construction in support of its position
`that containing an access code is the same thing as being an access code.2
`Petitioner’s third argument is not persuasive for the same reason, with the
`
`
`2 We intend no implication as to whether such a construction would be
`persuasive. We merely point out that Petitioner’s arguments are premised
`on a particular broad reading of the claims but no support for such a reading
`is provided.
`
`4
`
`

`

`IPR2019-00478
`Patent 6,213,391 B1
`added note that it is not encrypted versus unencrypted that matters but rather
`the distinction between being an access code and containing an access code.
`In sum, Petitioner’s Request does not persuade us we misapprehended or
`overlooked any matter, or that we abused our discretion.
`
`IV. ORDER
`In view of the foregoing, it is hereby ORDERED that Petitioner’s
`Request on Rehearing is denied and that we do not modify our Decision
`Denying Institution in light of Petitioner’s Request.
`
`
`
`For Petitioner:
`Cono Carrano
`Ashraf Fawzy
`Jung S. Hahm
`Akin Gump Strauss Hauer & Feld LLP
`ccarrano@akingump.com
`afawzy@unifiedpatents.com
`jung@unifiedpatents.com
`
`For Patent Owner:
`Raymond Mort
`Cabrach Connor
`Connor Kudlac Lee PLLC
`raymort@gmail.com
`cab@connorleepllc.com
`
`
`5
`
`

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket