throbber

`
`UNITED STATES DISTRICT COURT
`MIDDLE DISTRICT OF FLORIDA
`ORLANDO DIVISION
`
`PROXICOM WIRELESS, LLC,
`
` Plaintiff,
`
`v.
`
`T
`ARGET CORPORATION,
`
` Defendant.
`
`
`C
`ASE NO.: 6:19-cv-01886-RBD-LRH
`
`
`A
`MENDED COMPLAINT AND DEMAND FOR
`JURY TRIAL
`
`
`
`Plaintiff Proxicom Wireless, LLC (“Proxicom”), by and through undersigned counsel, files
`this amended complaint pursuant to F ED. R. CIV. PRO. 15(a)(2) and the Court’s Order granting
`Motion for Extension of Time (Doc. 30) for its suit against Def endant Target Corporation
`(“Target”) and, pursuant to FED. R. CIV. PRO. 8 alleges as follows:
`NATURE of Action
`1. This is an action for patent inf ringement under 35 U.S.C. § 271 et seq. arising out
`of Target’s infringement of U.S. Patent Nos. 8,090,359; 8,116,7 49; 8,374,592; 8,385,896;
`8,385,913; 8,369,842; 9,038,129; 7,936,736 and 9,161,164 (collectively, the “patents-in-suit”).
`The following allegations of patent infringement arise from act ions performed by or attributable
`to Target.
`PARTIES, JURISDICTION & Venue
`2. Plaintiff Proxicom is a limited liability company duly organized and existing under
`the laws of the State of Florida and having its principal place of business at 1680 N. Riverside Dr.,
`Indialantic, Florida 32903. Proxicom has only two members: the inventors of the patents-in-suit,
`James Arthur Proctor, Jr. and James Arthur Proctor, III, individuals who are citizens of the State
`of Florida.
`SCT Exhibit 2022
`IPR2025-01183
`
`
`
`
`
`
`
`
`-2-
`3. Target Corporation is a corporation duly organized and existing under the laws of
`the State of Minnesota and having its principal place of busine ss at 1000 Nicollet Mall,
`Minneapolis, Minnesota, 55403. For purposes of diversity, Targ et is a citizen of the State of
`Minnesota.
`4. Because this is an action arising under the patent laws of the United States, this
`Court has subject matter jurisd iction pursuant to 28 U.S.C. §§ 1331 and 1338(a). Additionally,
`because there is complete diversity of citizenship between the parties and the amount in
`controversy exceeds $75,000 (exclusive of attorneys’ fees, interest and costs), this Court also has
`subject matter jurisdiction pursuant to 28 U.S.C. § 1332(a)(1).
`5. This Court has personal jurisdiction over Target because, inter alia , Target
`maintains or has maintained c ontinuous and systematic contacts with, and regularly transacts
`business in, the State of Florida and this judicial district, and because Proxicom’s claims arise out
`of Target operating, conducting, en gaging in, or carrying on a business venture in the State of
`Florida and this judicial district and committing tortious acts in the State of Florida and this judicial
`district.
`6. Venue is proper in the Middle District of Florida under 28 U.S. C. §§ 1391 and
`1400(b) because Target is subject to personal jurisdiction and, therefore, is deemed to reside in
`this judicial district, and because Target maintains established places of business in this judicial
`district and has committed and continues to commit acts of infringement in violation of 35 U.S.C.
`§ 271 at its places of business in this judicial district. Tar get’s regular and established places of
`business in this judicial district include at least six stores in Orlando, Florida, as well as stores in
`Winter Park, Altamonte Springs, Casselberry, Waterford Lakes, Hunters Creek, and Kissimmee,
`SCT Exhibit 2022
`IPR2025-01183
`
`
`
`
`
`
`
`
`-3-
`Florida. Additionally, Proxicom has suffered harm in this judi cial district due to Target’s
`infringement of the patents-in-suit.
`TECHNICAL BACKGROUND
`7. The Patents-in-suit each claim priority to two provisional appl ications that were
`filed in early September, 2008. As of 2008, mobile wireless co mmunication standards had
`progressed to the point where high-speed data connections were possible over mobile networks.
`U.S. Patent No. 8,090,359 (a true and correct copy of which is attached hereto as Exhibit 1), 1:26-
`30. These standards included (“3G”) third-generation broadband cellular network technology, for
`example, EDGE and GPRS. Id., 1:29-30.
`8. Therefore, mobile devices (such as mobile phones) had access to high-speed
`networks. Some web sites, such as social networking sites, had been optimized to make use of the
`high speed of mobile networks, but for the most part these web sites were simply standard social
`networking sites that had been redesigned for use on a mobile p hone with little change in
`capability. Id., 1:34-37.
`9. At the time, most mobile phones supported at least two wireless standards, one for
`a cellular wireless wide area ne twork connection (such as EDGE and GPRS), and a second for a
`local area network that is typically used for short-range communication such as Bluetooth or WiFi.
`Exhibit 1, 2:11-23. These two channels, however, had not been used in the innovative manner of
`the inventions of the patents-in-suit. Wide-area networks had commonly been used for high-speed
`data connections. Short-range connections had commonly been used to connect hands-free devices
`such as headsets or peripherals. Short-range connections were also used in peer-to-peer network
`applications. Id., 2:17-27.
`SCT Exhibit 2022
`IPR2025-01183
`
`
`
`
`
`
`
`
`-4-
`10. Peer-to-peer communication via th ese commonly-available short-r ange
`communication channels (WiFi, Bluetooth) had been attempted for mobile social networking by
`some social networking services as of 2008. Id., 2:24-27. For example, a service called Flobbi
`allowed community members to identify each other via Bluetooth transmissions and then interact
`with chat, with the messages being carried over the Bluetooth c onnection. Id., 3:67-4:4. These
`social networking services typically consisted of a software application executing on each mobile
`phone to facilitate direct communication between each device by creating an ad-hoc network
`among nearby devices. Id., 2:29-31. Each device in the network is a “peer” of the other devices,
`and each of the “peer” devices share information directly with other devices in the ad-hoc network.
`The social-networking services necessarily stored the information to be exchanged locally on the
`peer devices, which rendered th e services vulnerable to fraud, for example, if one of the peer
`devices copied or misused the information. Id., 2:37-47.
`11. Global Positioning System (GPS) receivers were also commonly av ailable and
`incorporated into mobile phones. GPS is a satellite-based system operated by the United States
`government. GPS receivers provide location information for the mobile device using these
`satellite signals. Signals from several satellites must be simultaneously read (for triangulation) to
`determine a location. Obstacles like buildings block the relat ively weak satellite-based GPS
`signals. Id., 1:43-50. As a result, GPS capabilities for mobile devices we re typically targeted at
`navigation to a specified location outdoors, or GPS was used for mobile social networking to allow
`a user to see where their friends were located in a relatively large geographic location on a map.
`Id., 1:38-43, 1:50-54.
`SCT Exhibit 2022
`IPR2025-01183
`
`
`
`
`
`
`
`
`-5-
`THE Proctors’ Innovative Technology
`12. Proxicom was founded by Messrs. James Arthur Proctor, III and J ames Arthur
`Proctor, Jr. (father and son, co llectively, “the Proctors”). Between them, the Proctors are named
`inventors on more than 290 United States patents. Mr. James A. Proctor, III holds a B.S.E.E. from
`the University of Florida and an M.S.E.E. from the Florida Institute of Technology. He is a former
`member of the faculty of the Florida Institute of Technology wh ere he taught graduate courses in
`electrical engineering. Mr. James A. Proctor, III has forty years of experience in engineering and
`management roles at Harris Cor poration in Melbourne, Florida working with communications
`systems.
`13. Mr. James A. Proctor, Jr., holds a B.S.E.E. from the University of Florida and an
`M.S.E.E. from the Georgia Institute of Technology. Mr. Proctor , Jr. is an accomplished
`technology executive and serial ent repreneur in the wireless an d communications field, having
`contributed to the startup, growth, operation, and exits of a number of programs and companies.
`14. Proxicom was founded by the Proctors to research and develop wireless technology
`using proximity wireless signals. The Proctors are coinventors on the patents-in-suit, each of
`which has been assigned to Proxicom.
`15. The Proctors have developed nume rous innovative technologies in t h e f i e l d o f
`wireless communications, including cellular and local area netw orking, with applications for use
`by governments and businesses. The Proctors’ inventions, various aspects of which are embodied
`by the claims of the patents-in-suit, including each of the claims referenced herein, address several
`deficiencies with prior art pee r-to-peer systems and methods by improving control of user
`information and privacy.
`SCT Exhibit 2022
`IPR2025-01183
`
`
`
`
`
`
`
`
`-6-
`16. One inspiration for the inventions taught and claimed in the patents-in-suit was the
`difficulty that Mr. Proctor, Jr. experienced in sharing files s ecurely. In 2008, Mr. Proctor, Jr.
`realized that devices such as laptops that had WiFi and Bluetoo th capabilities for short-range
`communication, couldn’t communicat e securely with other similar devices, or exchange
`documents using those short-range communication channels. In f act, users could be tracked by
`third parties with the then-existing peer-to-peer technology. A third party could copy the identifier
`associated with a user or user’s device and misuse it. Accordin gly, there was a need in the art for
`technology that could facilitate secure communications between mobile devices using short-range
`communication technologies.
`17. Because of these security concerns, prior to the inventions that are embodied in the
`claims of the patents-in-suit, including the claims referenced herein, mobile applications that relied
`on privacy and security rarely us ed location or proximity information. See Exhibit 1, 1:26-60.
`Prior art peer-to-peer systems and methods, in which peer devices communicated directly with one
`another, were vulnerable to security breaches and fraud, making t h e m i n a d e q u a t e f o r u s e i n
`commerce or for providing user privacy. See id., 2:37-45. There was a need for improved security
`and for fraud resistance. See id. The Proctors recognized the need for a trusted third party server
`to help facilitate these kinds of electronic transactions. See id. , 1:67-2:10. The Proctors also
`understood that a trusted third party server could be used in conjunction with wireless devices with
`both a short-range and long-range communication channel in an innovative manner. An example
`of this innovation is taught by the embodiment of Figure 2 that is identical in each of the patents-
`in-suit.
`18. The embodiment of Figure 2 teaches a Central Server (100) in combination with a
`first wireless device (202) that is connected to a cellular network (101), and also a second wireless
`SCT Exhibit 2022
`IPR2025-01183
`
`
`
`
`
`
`
`
`-7-
`device (204) that does not have a cellular connection that tran smits its identifying information
`using a short range wireless link (203). Exhibit 1, 7:20-29. In the annotated version of Figure 2
`reproduced below the first wireless device is shown in orange (labelled “Long-range & Short-
`range (1st) device”). The second wireless device is shown in blue (labelled “Short-range (2 nd)
`device”):
`
`Exhibit 1, Figure 2 (annotated).
`19. The patents explain that, for th is embodiment, the second devic e (204, in blue) is
`deployed in a museum at a particular exhibit. The first device (202, in orange) belongs to a
`museum patron. The second device (204) will simply broadcast an identifier via the short range
`wireless connection (e.g., Bluetooth). Id., 7:30-33. The first wireless device (202, in orange) will
`pass that identifier to the central server (100). Id., 7:37-38. The central server is aware of the
`association of the second wireless device (204) with a particular museum (and a particular exhibit
`w i t h i n t h e m u s e u m ) . A l s o , t h e c e n t r a l s e r v e r i s a w a r e t h a t t h e patron (with device 202) is in
`SCT Exhibit 2022
`IPR2025-01183
`
`
`
`
`
`
`
`
`-8-
`proximity to the particular exhibit in which the second device (204) is installed, because the
`patron’s device (202) received a short-range signal from the second device (204). The patron’s
`device need not identify itself to the first device (204) or an y other device in the museum. The
`central server passes information that is relevant to the museu m exhibit to the patron’s device
`(204). Id., 7:37-41.
`20. The inventions that are embodied in the claims of the patents-in-suit, including the
`claims referenced herein, are a technical improvement over conventional peer-to-peer systems and
`methods in that the inventions offered enhanced security, priva cy, and fraud resistance. For
`example, through the innovative use of a server in combination with wireless devices, a device’s
`identifier could be periodically changed. See Exhibit 1, 4:22-30, 7:9-15. Only the server need be
`aware of the pattern of changing identifiers, because the server may decode the identifier upon
`request.
`21. Common prior art systems and methods were unable to accommodate a changing
`identifier. For prior-art peer-to-peer systems such as Bluetooth and WiFi, changing the transmitted
`identifier (such as the MAC address of a device) would prevent subsequent communications from
`being received and interpreted properly. Id., 7:15-19. Therefore, common prior-art systems were
`vulnerable to spoofing and fraud, as a device’s identifier could be easily copied and misused.
`22. Another disadvantage of conventio nal prior art peer-to-peer met hods was the
`difficulty of enforcing policies for the delivery of locally-st ored content without the potential for
`fraud such as spoofing (copying) of identifiers between peers. Id., 2:37-43. For example, a policy
`might include a rule to verify the identity and presence of a party before providing access to content
`(such as a picture of the user). Exhibit 1, 4:32-35. Another example of a policy is a rule requiring
`confirmation that a device (or a ssociated user) is on a field l ist or belongs to a specific group or
`SCT Exhibit 2022
`IPR2025-01183
`
`
`
`
`
`
`
`
`-9-
`organization. Id., 4:40-41. As another example, a policy may apply past feedbac k ratings for a
`particular user and provide information only if the user has past positive feedback. Id., 4:41-48.
`23. It was difficult to enforce policies in prior art peer-to-peer systems because, for
`those systems, a device must e xchange information directly with another device in an attempt to
`itself verify the identity of the second device. By the time a device determines whether information
`should be shared with the second device, information such as th e device’s (trackable) identifier
`has already been shared.
`24. The inventions that are embodied in the claims of the patents-i n-suit improve
`systems and methods for exchange of information between devices . The inventions do this by
`using an unconventional combinati on of a server with wireless d evices and several different
`communication channels to enable enforcement of disclosure poli cies. The disclosure policies
`allow better control of exchange of information between two ent ities. By enabling the use of
`policies for security verification between entities, the premature revelation of private information
`can be avoided. Exhibit 1, 3:15-21, 4:12-40. For example, the verification required for applying
`a policy can be performed in accordance with the inventions in an anonymous way. Id., 4:36-41.
`25. By using a central server to “broker” communications in combina tion with the
`innovative use of short and long-range communication channels in an unconventional manner, the
`inventions reduce complexity and resource consumption of system s and methods for exchanging
`information between wireless devices. See U.S. Provision Patent Application No. 61/095,001 (a
`true and correct copy of which is attached here as Exhibit 10) at 6 (to avoid ambiguity, Proxicom
`uses the original page numbering that appears at the bottom-mid dle of the provisional
`applications). The server may verify the identity of a wireless device based on its identifier, instead
`of requiring a consumer device to attempt such verification itself.
`SCT Exhibit 2022
`IPR2025-01183
`
`
`
`
`
`
`
`
`-10-
`26. The claimed inventions reduced the amount of computational resources needed as
`compared to a peer-to-peer approach, as explained in Application No. 61/095,001:
`[U]tilizing a peer to peer based network, supporting an application such
`as social networking, the information flow between the devices running
`the applications are carried over the peer to peer network itse lf. This
`approach creates complexity in a handset, and unnecessary addit ional
`resources are utilized. Further, in most cases, it reduces or e liminates
`the dependency on a central server to "broker" the transaction, reducing
`the ability to manage security and information disclosure. The
`complexity also is increased because one of the main devices ta rgeted
`by the present invention is the phone. In the case of performin g peer to
`peer networking using Bluetooth in a phone significant resource s
`including memory and applicatio n software processing would be
`required to support full IP protocol networking over such a connection.
`The support for IP based networking already is included for WWA N
`connections and as a result, communication between one device t o
`another using the WWAN is curre ntly supported in many devices w ith
`no modification. The use of simple detection of one or more identifiers
`requires significantly less resources in a phone than performing a
`complete peer to peer IP based network with dynamic configurati on of
`nodes being added and dropped continuously.
`Exhibit 10 at 6-7 of 19 (emphasis added) (original page numbering); see also U.S. Provision Patent
`Application No. 61/095,359 (a true and correct copy of which is attached here as Exhibit 11 at 8
`of 28 (original page numbering).
`27. The Proctors’ inventions, embodied by the claims of the patents -in-suit, including
`those claims listed herein, thereby improve the methods or syst ems for exchange of information
`between wireless devices. For example, the claims of the paten ts-in-suit, including the claims
`listed herein, implement a server / first device / second device combination in a manner that allows
`SCT Exhibit 2022
`IPR2025-01183
`
`
`
`
`
`
`
`
`-11-
`a mobile device to advantageously receive information associated with a “broadcast only” device,
`which costs less. See id. at 7 of 19 (original page numbering).
`28. The inventions that are embodied by the claims of the patents-in-suit, including the
`claims referenced herein, are also a technical improvement to systems and methods that determine
`a device’s location or proximity in that the inventions enable the systems and methods to work
`reliably indoors by using proximity to determine a device location rather than relying on weak or
`unreliable GPS signals. Exhibit 10 at 6 (original page numberi ng). This represents a major
`technological improvement over the conventional prior art approach because numerous applicable
`environments that are important for commerce are largely indoors. See id.
`29. One problem with prior art GPS-based systems was inadequate sig nal strength in
`many indoor environments. See Exhibit 1 at 2:37-43. GPS will often not operate indoors, where
`the GPS signal is weak. Exhibit 11 at 7, 12 (original page num ber). GPS signals may also be
`unreliable, particularly in large cities with numerous tall buildings.
`30. The Proctors’ inventions are also an improvement over conventional prior art peer-
`to-peer methods in that, through the innovative manner in which a server is combined with wireless
`devices and the use of short-range and wide-range transmissions, the entities associated with each
`wireless device (such as a user associated with one device, and a business like a retailer that is
`associated with the second device ) can continue to communicate with each other even when the
`wireless devices are no longer in proximity to each other. See Exhibit 1 at 2:35-37. Conventional
`peer-to-peer approaches commonl y required two devices to remain in proximity in order to
`continue to communicate effectively.
`SCT Exhibit 2022
`IPR2025-01183
`
`
`
`
`
`
`
`
`-12-
`THE PATENTS IN SUIT
`31. The patents-in-suit each claim priority through two provisional applications,
`Application No. 61/095,001 ( Exhibit 10), which was filed September 8, 2008, and Application
`No. 61/095,359 (Exhibit 11), which was filed September 9, 2008.
`32. Proxicom is the assignee and owner of all rights to enforce U.S . Patent
`No. 8,090,359 (“’359 Patent”), entitled “Exchanging Identifiers Between Wireless
`Communication to Determine Furthe r Information to Be Exchanged or Further Services to Be
`Provided,” and has full rights to sue and recover damages from all past, present and future
`infringements of the ’359 Patent. The ’359 Patent was duly and legally issued by the United States
`Patent and Trademark Office on January 3, 2012. The inventors of the ’359 Patent are James
`Arthur Proctor, Jr. of Indialantic, Florida and James Arthur Proctor, III of Indialantic, Florida. A
`true and correct copy of the ’359 Patent is attached as Exhibit 1.
`33. The ’359 Patent relates to tech niques for facilitating the exch ange of information
`and transactions between two entities that are associated with two wireless devices, when the two
`devices are in close proximity to each other. Conventional pri or art peer-to-peer methods for
`exchanging information between wireless devices required the de vices to reveal personal
`information, such as a static identifier, so that other peer devices could identify a particular user’s
`wireless device. See Exhibit 1, 4:12-30. Conventional prior art peer-to-peer systems also required
`complex equipment and processes in order for each peer device to determine and track the identity
`of other peer devices over time. Id., 6:54-63.
`34. The inventions taught and claime d in the ’359 Patent solved the se problems in an
`unconventional way that improves the functioning and performanc e of systems and methods of
`exchanging information between wireless devices.
`SCT Exhibit 2022
`IPR2025-01183
`
`
`
`
`
`
`
`
`-13-
`35. For example, the method of claim 1 of the ’359 Patent recites a central server that
`receives a second device identifie r from a first wireless devic e. The second device provides its
`identifier to the first wireless device using short range wireless communication. The central server
`uses the second device identifier “to determine one or more of an identity or related information
`concerning an entity or object located in proximity to the second device.” Exhibit 1, 23:46-49.
`36. By employing a trusted server, a user’s device need not broadcast an identifier that
`can be readily tracked. As a result, users have greater control over their information and may “opt
`out” of location (or proximity) tracking. A wireless device may transmit an anonymous identifier,
`and other wireless devices may authenticate the first wireless device’s identifier via the trusted
`server, without revealing the identity of the first wireless device.
`37. Because the anonymous ident ifier is received via short range wireless signal, the
`trusted server also knows that the second wireless device is in proximity to the first wireless device,
`and the server can use this knowledge as part of the authentication process.
`38. In conventional prior art peer-to-peer systems, devices could not communicate with
`each other by using anonymous identifiers. That technical limit ation put users’ privacy at risk.
`Exhibit 1, 7:9-19.
`39. The system and methods described in the ʼ359 Patent also beneficially enables the
`use of simpler, lower-cost wireless devices that consume less power. This is made possible by the
`inclusion of the trusted server, which handles authentication in the context of the claimed wireless
`devices that communicate via short and long-range signals in accordance with the inventions. For
`example, a method that permits the use of low-cost beacons is a major technological advantage in
`an indoor application such as a retailer, as the entire indoor space can be “blanketed” in low-cost,
`low-power beacons to provide near-total indoor coverage.
`SCT Exhibit 2022
`IPR2025-01183
`
`
`
`
`
`
`
`
`-14-
`40. Further, by using the concept of proximity, the inventions do n ot require GPS
`signals (which can be unreliable indoors) to identify relevant location information. Instead, the
`inventions employ a device that transmits a short-range signal. Only devices in proximity to each
`other will detect the same short -range signal. That proximity information is reported to a server
`via a long-range signal. Therefore, systems and methods that e mploy the claimed inventions can
`detect and report the location of a user’s device reliably indo ors if the location of devices
`broadcasting short-range signals is known.
`41. Also, unlike conventional peer-to- peer systems, the wireless de vices recited by
`claim 1 need not authenticate each other, because the central server performs that function, which
`improves the security and fraud resistance of the method over r outine and conventional prior art
`peer-to-peer methods.
`42. Claim 1 further recites that, “subsequent to the step of the ce ntral server receiving
`the second device identifier information from the first wireless device,” the central server then
`takes “further action to deliver information or a service to th e first wireless device based at least
`in part upon (a) the second devi ce identifier” and “(i) feedback ratings relevant to an entity
`associated with either the first wireless device or the second device identifier information; (ii)
`information representing a reward for an entity associated with the first device's participation in a
`loyalty program; or (iii) a current step in a multiple step pro cess for an ongoing electronic
`commerce transaction.” Id., 23:56-63
`43. Through the innovative use of a tru sted server that not only can determine
`information related to a device, but also is aware of what that devices is in proximity to, the method
`of claim 1 encompasses providing relevant information to a user , such as relevant feedback
`SCT Exhibit 2022
`IPR2025-01183
`
`
`
`
`
`
`
`
`-15-
`ratings—for example, the server can provide feedback ratings for nearby goods and services that
`the server has access to that are relevant to a particular user.
`44. Prior to 2008, it was not routine in the prior art to use proxi mity or location
`information to facilitate electronic transactions. The innovative and unconventional combination
`o f a t r u s t e d t h i r d p a r t y s e r v e r with wireless devices, together with the use of proximity with
`anonymous (or private) identifier s, improves security and fraud resistance and also provides a
`method that works indoors (e.g., in a museum, airport or retail environment).
`45. The unconventional combination of steps recited by claim 1 of t he ’359 Patent
`improves the functioning and performance of systems and methods of exchanging information
`between wireless devices.
`46. As another non-limiting example, claim 48 of the ʼ359 Patent further improves the
`method of claim 1 in an unconventional manner. Claim 48 requir es “the further action taken by
`the central server comprises: notifying the first wireless devi ce of the presence of an entity or
`object associated with or in proximity to the second device.” Prior to 2008, use of proximity was
`unconventional; prior art systems commonly used GPS. Use of pr oximity in the claimed manner
`is a technical improvement over prior-art GPS-based systems for at least two reasons: (i) a
`proximity-system is more reliabl e in indoor environments; and ( ii) a proximity-based system
`allows the second wireless device to be moved (or for an array of wireless devices that includes
`the second wireless device, to be reconfigured) to reflect changes in the location of relevant objects
`(for example, retail goods or departments). Using proximity rather than absolute location enables
`such applications because there i s n o r e q u i r e m e n t f o r t h e w i r e less devices to know the actual
`location of a user’s mobile devi ce, or the actual location of a transmitting beacon device—only
`proximity, determined from short-range signals, need be known.
`SCT Exhibit 2022
`IPR2025-01183
`
`
`
`
`
`
`
`
`-16-
`47. Another non-limiting example is described in claim 52 of the ʼ3 59 Patent, which
`requires that the second wireless device is a broadcast only de vice. This further improves the
`method of claim 1 in an unconventional manner. Because the ser ver handles authentication, the
`second wireless device may be a simple, low-cost broadcast-only device. The ability to use low-
`cost devices is a technical advance over prior art systems and methods (e.g., peer-to-peer systems)
`that enables a business to cost-effectively deploy the technology in a way that reliably covers the
`entire square footage of an indoor space. For example, less co mplex wireless devices such as
`beacons can be deployed that are also less costly.
`48. As another non-limiting example, claim 55 of the ʼ359 Patent further improves the
`method of claim 1 in an unconventional manner. Claim 55 requires that “the further action [of the
`central server] is based at least in part upon both (a) the sec ond device identifier and (b) the an
`identifier associated with the first wireless device or an identifier associated with a user of the first
`wireless device.” The method of claim 55 is a technical improvement over prior-art GPS or peer-
`to-peer systems because, through the innovative combination of wireless devices and server(s) in
`conjunction with the use of short and long-range signals, the information delivered to a user of the
`first wireless device may be customized to that user, and relat e to products in proximity to that
`user. Such customization is not possible indoors with conventi onal GPS based systems, or in
`conventional peer-to-peer based s ystems in which no intermediar y server is used in the claimed
`innovative manner.
`49. Proxicom is the assignee and owner of all rights to enforce U.S . Patent
`No. 8,116,749 (“’749 Patent”), entitled “Protocol for Anonymous Wireless Communication,” and
`has full rights to sue and recover damages from all past, prese nt and future infringements of the
`’749 Patent. The ’749 Patent wa s duly and legally issued by th e United States Patent and
`SCT Exhibit 2022
`IPR2025-01183
`
`
`
`
`
`
`
`
`-17-
`Trademark Office on February 14, 2012. The inventors of the ’7 49 Patent are James Arthur
`Proctor, Jr. of Indialantic, Florida and James Arthur Proctor, III of Indialantic, Florida.
`50. A true and correct copy of the ’749 Patent is attached as Exhibit 2.
`51. The ’749 Patent is a sibling of the ’359 Patent. The ’749 Pate nt also relates to
`techniques for facilitating the exchange of information and transactions between two entities that
`are associated with two wireless devices, when the two devices are in close proximity to each
`other. The ’749 Patent focuses on embodiments that improve sec urity and fraud resistance over
`prior art methods. As mentioned above, conventional prior art peer-to-peer methods for
`exchanging information between w ireless devices required the devices to reveal personal
`information, such as a static identifier, so that other peer devices could identify a particular user’s
`wireless device. See Exhibit 2 at 4:13-27.
`52. The inventions claimed in the ’749 Patent solved this problem in an unconventional
`way that improves the functioning and performance of systems by using modified device
`identification information to improve device security. By employing the claimed unconventional
`combination of a server in combination with wireless devices us ing short-range and long-range
`signals in the claimed manner, a device may anonymously transmit an identifier and even change
`that identifier over time, relyi ng on th

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket