throbber
UNITED STATES PATENT AND TRADEMARK OFFICE
`
`
`
`
`
`
`BEFORE THE PATENT TRIAL AND APPEAL BOARD
`
`
`
`
`
`
`TREND MICRO INC.,
`Petitioner
`
`v.
`
`CUPP COMPUTING AS,
`Patent Owner
`
`PGR2021-00101
`U.S. Patent No. 10,951,632
`
`
`PETITION FOR POST GRANT REVIEW OF
`U.S. PATENT NO. 10,951,632
`
`
`
`
`
`
`
`
`
`
`

`

`
`
`
`
`
`
`
`
`
`
`TABLE OF CONTENTS
`
`INTRODUCTION .......................................................................................... 1
`COMPLIANCE WITH FORMAL REQUIREMENTS ................................. 1
`A. Mandatory Notices Under 37 C.F.R. §§ 42.8(b)(1)-(4) ....................... 1
`1.
`Real Party-In-Interest ................................................................. 1
`2.
`Related Matters .......................................................................... 1
`3.
`Lead and Backup Counsel ......................................................... 2
`4.
`Service Information.................................................................... 2
`Proof of Service on the Patent Owner .................................................. 2
`B.
`Power of Attorney ................................................................................ 2
`C.
`Standing ................................................................................................ 2
`D.
`Timing .................................................................................................. 4
`E.
`Fees ....................................................................................................... 4
`F.
`STATEMENT OF PRECISE RELIEF REQUESTED .................................. 4
`
` FULL STATEMENT ON REASONS FOR REQUESTED RELIEF ........... 5
`A.
`Summary of the ’632 Patent ................................................................. 5
`B.
`The ’632 Patent Prosecution History ................................................. 10
`C.
`No Challenged Claim of the ’632 Patent is Entitled to the
`Benefit of the ’134 Provisional Application’s Filing Date. ............... 10
`IPR of the Related ’595 Patent ........................................................... 13
`Person of Ordinary Skill in the Art .................................................... 14
`Claim Construction............................................................................. 14
`1.
`“power management mode” ..................................................... 14
`2.
`“security administrator device”................................................ 15
`3.
`“a security system processor” .................................................. 15
`G. Ground 1: Claims 1, 7, 9, 16, 22, and 24 are Obvious Under 35
`U.S.C. § 103 (AIA) in light of Gordon and Gardner. ........................ 16
`1.
`Limitation-by-Limitation Analysis .......................................... 19
`
`D.
`E.
`F.
`
`ii
`
`

`

`
`
`
`
`
`
`
`
`I.
`
`H. Ground 2: Claims 7 and 22 are Obvious Under 35 U.S.C. § 103
`(AIA) in light of Gordon, Gardner, and Chang. ................................. 50
`1.
`Limitation-by-Limitation Analysis .......................................... 53
`Ground 3: Claims 9 and 24 are Obvious Under 35 U.S.C. § 103
`(AIA) in light of Gordon, Gardner, and Meenan. .............................. 56
`1.
`Limitation-by-Limitation Analysis .......................................... 57
`THE BOARD SHOULD NOT DENY INSTITUTION UNDER 35
`U.S.C. § 325(d). ............................................................................................ 62
` PTAB DISCRETION UNDER 35 U.S.C. § 324(a) SHOULD NOT
`PRECLUDE INSTITUTION. ...................................................................... 63
`A.
`Fintiv Factor 1: Institution Will Enable a Stay ................................. 64
`B.
`Fintiv Factor 2: District Court Schedule ........................................... 64
`C.
`Fintiv Factor 3: Parallel Proceeding Considerations ......................... 66
`D.
`Fintiv Factor 4: The Petition Raises Unique Issues .......................... 66
`E.
`Fintiv Factor 5: The Petition Will Enable Cancellation of
`Claims That Might be Reasserted ...................................................... 67
`Fintiv Factor 6: Other Considerations Support Institution ............... 67
`F.
` CONCLUSION ............................................................................................. 68
`
`
`iii
`
`

`

`
`
`
`
`EXHIBIT LIST
`
`Exhibit No.
`
`Description
`
`1101
`
`1102
`
`1103
`
`1104
`
`1105
`
`1106
`
`1107
`
`1108
`
`1109
`
`1110
`
`1111
`
`1112
`
`1113
`
`1114
`
`1115
`
`U.S. Patent No. 10,951,632 (the “’632 patent”).
`
`File history of U.S. Patent No. 10,951,632.
`
`Trend Micro Inc. v. CUPP Computing AS, IPR2019-00765 (’595
`patent), Final Written Decision (PTAB Aug. 25, 2020).
`
`U.S. Patent No. 9,781,164 (the “’595 patent”).
`
`Provisional Application No. 61/086,134.
`
`Joint Claim Construction Chart from the parties’ litigation in
`CUPP Cybersecurity, LLC v. Trend Micro, Inc., No. 3:18-cv-
`01251 (N.D. Tex.).
`
`U.S. Patent No. 7,818,803 to Gordon (“Gordon”).
`
`U.S. Patent App. Pub. No. 2006/0272020 to Gardner (“Gardner”).
`
`U.S. Patent App. Pub. No. 2011/0264931 to Chang (“Chang”).
`
`Int’l Patent App. Pub. No. WO 2010/004296.
`
`U.S. Patent App. Pub. No. 2006/0101277 to Meenan (“Meenan”).
`
`CUPP Cybersecurity, LLC v. Trend Micro, Inc., No. 3:18-cv-
`01251, Doc. 70 (N.D. Tex. Sept. 5, 2019) (stay order).
`
`CUPP Cybersecurity, LLC v. Trend Micro, Inc., No. 3:20-cv-
`03206, Doc. 38 (N.D. Tex. Apr. 8, 2021) (scheduling order).
`
`CUPP Cybersecurity, LLC v. Trend Micro, Inc., No. 3:20-cv-
`03206, Doc. 1 (N.D. Tex. Oct. 1, 2020) (original complaint).
`
`CUPP Cybersecurity, LLC v. Trend Micro, Inc., No. 3:20-cv-
`03206, Doc. 41 (N.D. Tex. Apr. 23, 2021) (amended complaint).
`
`iv
`
`

`

`
`
`
`
`1116
`
`1117
`
`1118
`
`1119
`
`1120
`
`Patent Owner’s infringement contentions in CUPP Cybersecurity,
`LLC v. Trend Micro, Inc., No. 3:20-cv-03206 (N.D. Tex.) (dated
`May 6, 2021).
`
`CUPP Cybersecurity, LLC v. Trend Micro, Inc., No. 3:18-cv-
`01251, Doc. 39 (N.D. Tex. Aug. 3, 2018) (order setting trial for
`May 18, 2020).
`
`CUPP Cybersecurity, LLC v. Trend Micro, Inc., No. 3:18-cv-
`01251, Doc. 63 (N.D. Tex. May 9, 2019) (order changing trial
`date to October 5, 2020).
`
`CUPP Cybersecurity, LLC v. Trend Micro, Inc., No. 3:18-cv-
`01251, Doc. 89 (N.D. Tex. Feb. 10, 2021) (order changing trial
`date to May 2, 2022).
`
`Email from Patent Owner’s counsel in CUPP Cybersecurity, LLC
`v. Trend Micro, Inc., No. 3:20-cv-03206 (N.D. Tex.) identifying
`asserted claims.
`
`1121
`
`Declaration of expert Dr. Markus Jakobsson (“Jakobsson Decl.”).
`
`v
`
`

`

`
`
`
`
`INTRODUCTION
`
`The PTAB has found claims that are effectively identical to the ’632 patent’s
`
`claims to be unpatentable. Trend Micro Inc. v. CUPP Computing AS, IPR2019-
`
`00765, Paper 29 at 45-46 (PTAB Aug. 25, 2020) (Ex. 1103) (finding unpatentable
`
`many claims of related U.S. Patent No. 9,843,595 (the “’595 patent”)). For
`
`example, the ’632 patent’s claim 1 is word-for-word identical to the ’595 patent’s
`
`claim 1, except for one additional limitation also disclosed by the prior art. The
`
`PTAB therefore should find that the ’632 patent’s claims, like the ’595 patent’s
`
`claims, are unpatentable.
`
`Moreover, although the crux of the ’632 patent’s purported novelty is a
`
`security system that is mobile, the ’632 patent’s claims recite a “security system”
`
`without regard to whether it is mobile or stationary. By claiming a security system
`
`that may be stationary, the applicant wiped away any potential point of novelty the
`
`patent’s purported invention may have had, and encompassed the prior art. The
`
`challenged claims therefore are invalid.
`
` COMPLIANCE WITH FORMAL REQUIREMENTS
`
`A. Mandatory Notices Under 37 C.F.R. §§ 42.8(b)(1)-(4)
`
`1.
`
`Real Party-In-Interest
`
`Trend Micro is the real party-in-interest.
`
`2.
`
`Related Matters
`
`The ’632 patent is subject to the following action: CUPP Cybersecurity LLC
`
`
`
`1
`
`

`

`
`
`v. Trend Micro, Inc., et al., No. 3:20-cv-03206 (N.D. Tex.).
`
`3.
`
`Lead and Backup Counsel
`
`Lead counsel is Robert Buergi, Reg. No. 58,125, of DLA Piper LLP (US),
`
`2000 University Ave., East Palo Alto, CA 94303; robert.buergi@dlapiper.com,
`
`650-833-2407 (phone), 650-687-1144 (fax).
`
`Backup counsel is Michael Burns, Reg. No. 57,593, of DLA Piper LLP
`
`(US), One Liberty Place, 1650 Market St, Suite 5000, Philadelphia, PA 19103;
`
`michael.burns@dlapiper.com, 215-656-2443 (phone), 215-606-2143 (fax).
`
`4.
`
`Service Information
`
`Service information for lead and backup counsel is provided in the
`
`designation of lead and backup counsel above.
`
`B.
`
`Proof of Service on the Patent Owner
`
`As identified in the attached Certificate of Service, a copy of this Petition in
`
`its entirety is being served to the Patent Owner’s attorney of record at the address
`
`listed in the USPTO’s records by overnight courier pursuant to 37 C.F.R. § 42.6.
`
`C.
`
`Power of Attorney
`
`Powers of attorney are being filed with designation of counsel in accordance
`
`with 37 C.F.R. § 41.10(b).
`
`D.
`
`Standing
`
`On July 9, 2021, Petitioner filed two petitions for inter partes review
`
`(“IPR”) of the ’632 patent: IPR2021-01236 and IPR2021-01237. The PTAB
`
`
`
`2
`
`

`

`
`
`should institute those IPRs.
`
`However, Public PAIR lists the ’632 patent as an AIA patent. This is
`
`incorrect. The ’632 patent is a pre-AIA patent because its effective filing date is
`
`no later than August 4, 2009, the date of its ancestor U.S. Patent No. 8,631,488, to
`
`which the ’632 patent claims priority via a series of continuations. See Leahy-
`
`Smith America Invents Act, Pub. L. 112-29, § 3(n)(1), 125 Stat. 284, 293 (2011).
`
`August 4, 2009 predates the AIA’s March 16, 2013 effective date. In addition, the
`
`’632 patent does not claim priority to any patent or application that is an AIA
`
`patent or AIA application because no patent or application in its chain of priority
`
`has an effective filing date that is on or after March 16, 2013.
`
`Nonetheless, if the PTAB finds that the ’632 patent is an AIA patent, then
`
`this petition for post-grant review (“PGR”) is proper because Petitioner is filing it
`
`within nine months of the ’632 patent’s issue date (March 16, 2021). 35 U.S.
`
`§ 321(c). In addition, Petitioner is not barred or estopped from requesting a post-
`
`grant review challenging the challenged patent claims on the grounds identified in
`
`this petition.
`
`Out of an abundance of caution, therefore, Petitioner is filing this PGR
`
`petition that is substantively duplicative of IPR2021-01237. At least one of this
`
`petition for PGR and the petition in IPR2021-01237 is procedurally proper.
`
`
`
`3
`
`

`

`
`
`E.
`
`Timing
`
`Under 37 CFR § 42.202, “[a] petition for a post-grant review of a patent
`
`must be filed no later than the date that is nine months after the date of the grant of
`
`a patent or of the issuance of a reissue patent.” Petitioner is filing this petition
`
`within nine months of the ’632 patent’s issue date (March 16, 2021), and this
`
`petition therefore is timely.
`
`F.
`
`Fees
`
`The undersigned authorizes the Director to charge the fee specified by 37
`
`C.F.R. § 42.15(b) and any additional fees that might be due in connection with this
`
`Petition to Deposit Account No. 07-1896.
`
` STATEMENT OF PRECISE RELIEF REQUESTED
`
`In accordance with 35 U.S.C. § 321 and 37 C.F.R. § 42.204(b), Petitioner
`
`requests cancelation of claims 1, 7, 9, 16, 22, and 24 of the ’632 patent in view of
`
`the following grounds:
`
`Ground
`
`Claims
`
`§103 Prior Art Basis
`
`1
`
`2
`
`3
`
`1, 7, 9, 16, 22, 24 Gordon and Gardner
`
`7, 22
`
`9, 24
`
`Gordon, Gardner, and Chang
`
`Gordon, Gardner, and Meenan
`
`
`Constructions of terms in the challenged claims are set forth in Section IV.F.
`
`An explanation of how the construed claims are unpatentable is set forth in
`
`
`
`4
`
`

`

`
`
`Sections IV.G-I, which include discussions of the relevance of the evidence to the
`
`challenges raised, including identifying specific portions of the evidence that
`
`support the challenges.
`
` FULL STATEMENT ON REASONS FOR REQUESTED RELIEF
`
`A.
`
`Summary of the ’632 Patent
`
`The ’632 patent describes the purported problem of mobile devices being
`
`more vulnerable to attack when traveling outside of an enterprise network by
`
`losing the benefit of the enterprise network’s security system, such as a network
`
`gateway that includes a firewall. Ex. 1101, 1:45-65. For example, the patent’s
`
`Figure 2 shows mobile device 110 that has moved out of the trusted enterprise
`
`network 140 and no longer receives the benefit of network security system 120.
`
`Id., Fig. 2, 2:19-32.
`
`
`
`5
`
`

`

`
`
`
`
`The ’632 patent also states that “[a]nother disadvantage to existing security
`
`systems is that they require a fully operational system and a significant load on
`
`CPU power. To reduce the impact of scanning and updating a system, users often
`
`leave their PCs active overnight which consumes power. Further, when the PC is a
`
`laptop, the user cannot close the laptop and expect security functions to be
`
`performed.” Ex. 1101, 2:55-61.
`
`To solve these purported problems, the ’632 patent proposes a “mobile
`
`security system” that travels with a mobile device outside of the trusted network to
`
`provide security for the mobile device that the network security system provides
`
`
`
`6
`
`

`

`
`
`inside the trusted network. Ex. 1101, 5:53-6:15, Fig. 3. Figure 3 shows mobile
`
`security system 345b that has traveled with mobile device 310c outside of trusted
`
`enterprise network 340.
`
`
`
`The mobile security system is used to manage “security services” of a
`
`mobile device that has entered a “power management mode.” Ex. 1101, 19:26-40.
`
`“In some embodiments, the mobile security system detects a wake event and then
`
`may either take control of one or more components of the mobile device or
`
`terminate the power management mode of the mobile device in order to perform
`
`the security services.” Id., 19:63-67. In some embodiments, the mobile security
`
`system includes a “wake module” that sends a “wake signal” to the mobile device
`
`to wake up some or all of the components on the mobile device. Id., 21:56-22:27.
`
`
`
`7
`
`

`

`
`
`“Security services may include, but are not limited to, scanning the mobile
`
`device, updating the mobile device, and/or performing maintenance functions.”
`
`Ex. 1101, 19:35-37, 19:41-62. Figure 20 (shown below) illustrates one process for
`
`managing and performing security services based on a detected wake event.
`
`
`
`8
`
`

`

`
`
`The description of Figure 20 refers to the mobile security system performing the
`
`steps above. Id., 29:44-30:55; see also id., Fig. 18 (showing the modules of the
`
`
`
`mobile security system referenced in that description).
`
`9
`
`
`
`

`

`
`
`Although the crux of the ’632 patent’s purported novelty is a security system
`
`that is mobile, the ’632 patent’s claims recite a “security system” without regard to
`
`whether it is mobile or stationary. Ex. 1101, 31:15 (“A security system”), 32:35-
`
`336 (“a security system”). By claiming a security system that may be stationary,
`
`the ’632 patent’s claims wipe away any potential point of novelty they may have
`
`otherwise had, and encompass the prior art.
`
`B.
`
`The ’632 Patent Prosecution History
`
`The ’632 patent issued from Application No. 16/601,466, filed on October
`
`14, 2019. Ex. 1101, cover page sections (22), (21). During prosecution of the ’466
`
`application, the applicant submitted a TrackOne request, which the PTO granted.
`
`Ex. 1102, 254, 233-234. The applicant also filed a terminal disclaimer. Id., 225-
`
`227. The PTO issued the ’632 patent on March 16, 2021 without having rejected
`
`the claims during prosecution. Id., 1.
`
`C. No Challenged Claim of the ’632 Patent is Entitled to the Benefit
`of the ’134 Provisional Application’s Filing Date.
`
`The earliest possible effective filing date to which the claims of the ’632
`
`patent may be entitled is August 4, 2008, the date of the ’134 provisional
`
`application to which the ’632 patent claims priority. Ex. 1101, cover page section
`
`(60). However, the challenged claims depend on new matter that was added to the
`
`specification after the filing of the ’134 provisional application. Therefore, none of
`
`the challenged claims are entitled to the benefit of the ’134 provisional
`
`
`
`10
`
`

`

`
`
`application’s filing date, and the challenged claims’ earliest effective filing date is
`
`the filing date of the first non-provisional patent application to which the ’632
`
`patent claims priority: August 4, 2009. Transco Prods., Inc. v. Performance
`
`Contracting, Inc., 38 F.3d 551 (Fed. Cir. 1994); New Railhead Mfg., L.L.C. v.
`
`Vermeer Mfg. Co., 298 F.3d 1290, 1294 (Fed. Cir. 2002) (a provisional application
`
`must satisfy 35 U.S.C. § 112, ¶1 to afford a non-provisional application the benefit
`
`of claiming it is entitled to the non-provisional application’s filing date).
`
`A comparison between the ’134 provisional application’s specification (Ex.
`
`1105, 3-50) and the ’632 patent’s specification shows that the ’632 patent
`
`specification contains a significant amount of subject matter that was not part of
`
`the ’134 provisional application. Indeed, the ’632 patent includes nearly 15
`
`columns of subject matter, shown in the ’632 patent (Ex. 1101) at 15:60 to 30:55
`
`and Figs. 11-20, which is missing from the ’134 provisional application. The
`
`newly added matter includes the description of the “wake” functionality, the
`
`components for implementing this functionality on the mobile security system
`
`(Fig. 18), and the processing performed by the mobile security system to
`
`implement this functionality (Fig. 20). The patent’s Figures 18 and 20 are shown
`
`below.
`
`
`
`11
`
`

`

`
`
`
`
`This new matter includes at least the following functionality claimed in the
`
`
`
`challenged claims:
`
`a.
`
`“store in the security system memory at least a portion of wake code”
`
`(claim 1) / “storing at least a portion of wake code executable by a
`
`security system process” (claim 16);
`
`b.
`
`“the wake code [when executed by the security system processor]
`
`being configured to detect a wake event and to send a wake signal to
`
`[the/a] mobile device in response to detecting the wake event” (claim
`
`
`
`12
`
`

`

`
`
`1 and 16);
`
`c.
`
`“the security agent of the mobile device being configured to receive
`
`the wake signal” (claims 1 and 16);
`
`d.
`
`“the security agent of the mobile device being configured to wake at
`
`least a portion of the mobile device from a power management mode
`
`e.
`
`f.
`
`in response to receiving the wake signal” (claims 1 and 16);
`
`“detect a particular wake event” (claims 1 and 16);
`
`“prepare a particular wake signal [to send to the mobile device] in
`
`response to detecting the particular wake event” (claims 1 and 16);
`
`and
`
`g.
`
`“send the particular wake signal to the mobile device” (claims 1 and
`
`16).
`
`Because the challenged claims rely on new matter that was not in the ’134
`
`provisional application, they are not entitled to the benefit of that application’s
`
`August 4, 2008 filing date.
`
`D.
`
`IPR of the Related ’595 Patent
`
`In IPR2019-00765, the PTAB found claims 1, 9, 11, 13-14, 16, 24, 26, 28,
`
`and 29 of U.S. Patent No. 9,843,595 to be unpatentable in light of the Joseph,
`
`Gordon, and Zmudzinski prior art references. Ex. 1103, 45-46. The ’632 patent’s
`
`claim 1 is word-for-word identical to the ’595 patent’s claim 1, except for one
`
`
`
`13
`
`

`

`
`
`additional limitation also disclosed by the prior art. Compare Ex. 1101, 31:15-58
`
`with Ex. 1104 (’595 patent), 31:14-51. And the ’632 patent’s independent claim
`
`16 recites effectively identical limitations as its claim 1.
`
`E.
`
`Person of Ordinary Skill in the Art
`
`A person of ordinary skill in the art at the time of the alleged invention of
`
`the ’632 patent (i.e., August 4, 2008) (“POSITA”) 1 would have had a bachelors’
`
`degree in computer science, electrical engineering, or a comparable field of study,
`
`plus at least two years of professional experience with computer security systems,
`
`or the equivalent. Ex. 1121 (“Jakobsson Decl.”), ¶ 60.
`
`F. Claim Construction
`
`Claims in this PGR should be construed in accordance with their “ordinary
`
`and customary meaning” as understood by one of ordinary skill in the art at the
`
`time of the invention. 37 C.F.R. § 42.200(b); Phillips v. AWH Corp., 415 F.3d
`
`1303, 1313 (Fed. Cir. 2005) (en banc).
`
`1.
`
`“power management mode”
`
`Claims 1 and 16 recite “power management mode.” In a related litigation
`
`concerning the related ’595 patent, the parties agreed that this term means “a mode
`
`
`1 Petitioner has used the Patent Owner’s alleged priority date of the ’632 patent for
`
`determining the POSITA. The same level of skill applies for the actual priority
`
`date of the ’632 patent (i.e., August 4, 2009). Jakobsson Decl., ¶ 60.
`
`
`
`14
`
`

`

`
`
`where the mobile device conserves power.” Ex. 1106, 6; see also Ex. 1103, 8
`
`(’595 patent IPR final written decision adopting same construction). Accordingly,
`
`the Board should adopt this construction for purposes of the ’632 patent.
`
`2.
`
`“security administrator device”
`
`Claims 1 and 16 recite “security administrator device.” The plain and
`
`ordinary meaning of this term includes a device that performs security
`
`administration. Jakobsson Decl., ¶ 65. This is consistent with the ’632 patent’s
`
`disclosure that the security administrator device 325 may perform various security
`
`administration tasks. Ex. 1101, 24:55-57 (“security administrator 325” is an
`
`“administrator device”), Fig. 3 (showing “security admin[istrator device] 325”),
`
`6:48-51 (it may translate enterprise security policies to mobile security policies),
`
`10:6-10 (it may import a firewall’s “rule base”), 10:22-25 (it may store “local logs
`
`and audit trails” from mobile security systems), 11:63-64 (it may update URL
`
`black and white lists for traveling users), 12:4-6 (it may delegate tasks to a help
`
`desk), 12:28-30 (it may maintain routing tables).
`
`3.
`
`“a security system processor”
`
`Claims 1 and 16 recite “a security system processor.” “Unless the claim is
`
`specific as to the number of elements, the article ‘a’ receives a singular
`
`interpretation only in rare circumstances when the patentee evinces a clear intent to
`
`so limit the article.” KCJ Corp. v. Kinetic Concepts, Inc., 223 F.3d 1351, 1356
`
`
`
`15
`
`

`

`
`
`(Fed. Cir. 2000). “Under this conventional rule, the claim limitation ‘a,’ without
`
`more, requires at least one.” Id.; see also Convolve, Inc. v. Compaq Comput.
`
`Corp., 812 F.3d 1313, 1321 (Fed. Cir. 2016) (interpreting “a processor” as “one or
`
`more processors”). Further, the ’632 specification makes clear that a security
`
`system processor is not limited to a single processor. Ex. 1101, 21:49-52 (“mobile
`
`security system 1702 may comprise more processors … than those depicted in
`
`FIG. 17.”). “A security system processor” therefore means “one or more security
`
`system processors.”
`
`G. Ground 1: Claims 1, 7, 9, 16, 22, and 24 are Obvious Under 35
`U.S.C. § 103 (AIA) in light of Gordon and Gardner.
`
`U.S. Patent No. 7,818,803 to Gordon (“Gordon,” Ex. 1107) was filed on
`
`January 16, 2008, claiming priority to a provisional application filed on January
`
`16, 2007. Accordingly, Gordon is prior art under 35 U.S.C. §102(a)(2) (AIA) and
`
`predates the earliest possible effective filing date of the ’632 patent (Aug. 4, 2008).
`
`Gordon discloses a host monitoring system C (outlined in green below) that
`
`communicates via a host monitoring server 3 (outlined in purple below) with host
`
`devices A (outlined in blue below). Gordon, 8:12-36, Fig. 5.
`
`
`
`16
`
`

`

`
`
`
`
`
`
`
`
`
`
`Host device A may include a “host agent and a security module.” Gordon,
`
`8:12-18. For example, host device A may be laptop 10 (outlined in blue below)
`
`with security module 19 (outlined in red below) that includes firmware agent 21.
`
`Gordon, Fig. 1, 4:58-63, 13:1-5, 17:5-9.
`
`
`
`17
`
`

`

`
`
`
`
`
`
`
`
`
`
`Gordon also includes host agent 14 (outlined in orange above) that performs
`
`security services such as deleting data and updating software. Gordon, 3:43-45,
`
`7:20-40, 12:49-60, 15:50-56.
`
`U.S. Patent Application Publication No. 2006/0272020 to Gardner
`
`(“Gardner,” Ex. 1108) was published on November 30, 2006. Accordingly,
`
`Gardner is prior art under 35 U.S.C. §102(a)(1) (AIA) and predates the earliest
`
`possible effective filing date of the ’632 patent (Aug. 4, 2008).
`
`Gordon refers to Gardner by application number as showing more detail of
`
`Gordon’s Figure 5. Gordon, 8:54-60 (referring to U.S. Pat. App. Pub. No.
`
`
`
`18
`
`

`

`
`
`2006/0272020). Gardner has overlapping disclosure with Gordon and, for
`
`example, includes Gordon’s Figure 5 as its Figure 1.
`
`Like Gordon, Gardner discloses a “host monitoring system.” Gardner
`
`further discloses that the host monitoring system stores “location and asset related
`
`data … in a central repository and can be accessed 24x7 by authorized
`
`administrators via secure web-based or network based console.” Gardner, ¶ 57.
`
`1.
`
`Limitation-by-Limitation Analysis
`
`Claim 1:
`
`[1.0] A security system, comprising:
`
`To the extent the preamble is limiting, Gordon discloses a security system
`
`that includes the limitations of claim 1. Gordon discloses a “host monitoring
`
`system C” (outlined in green below) that communicates via a “host monitoring
`
`server 3” (outlined in purple below) with host devices A (outlined in blue below).
`
`Gordon, 8:12-36, Fig. 5.
`
`
`
`19
`
`
`
`

`

`
`
`
`
`
`
`
`
`
`
`Host monitoring server 3 is a “security system” at least because it sends
`
`wake signals to mobile devices for purposes related to security, as described
`
`below. Host monitoring system C also is a “security system” because it includes
`
`host monitoring server 3.
`
`Gordon also disclose a “monitoring center” 70 shown on the right side of its
`
`Figure 1:
`
`
`
`20
`
`

`

`
`
`
`
`
`
`Gordon explains that “[m]onitoring centers are sometimes also referred to using
`
`other terms, including … host monitoring system.” Gordon, 12:45-48. A POSITA
`
`therefore will understand that Gordon’s “monitoring center” 70 (in Figure 1) is
`
`another name for its “host monitoring system” C (in Figure 5). Jakobsson Decl.,
`
`¶ 76. This conclusion is confirmed by the fact that Gordon discloses that
`
`monitoring center 70 and host monitoring system C have the same general
`
`functionality. Gordon, 8:37-47, 12:41-45; see also id., 12:40-13:60, 8:12-53;
`
`Jakobsson Decl., ¶ 76. Gordon’s monitoring center 70 therefore also is a “security
`
`system” for the same reasons that host monitoring system C is a security system.
`
`
`
`21
`
`

`

`
`
`*
`
`*
`
`*
`
`It also would have been obvious to a POSITA to include the functionality of
`
`Gordon’s monitoring center 70 cited in this petition with the functionality of its
`
`host monitoring center C, and vice versa. For example, Gordon discloses that
`
`monitoring center 70 sends wake signals and it would have been obvious to a
`
`POSITA to have host monitoring system C also send those wake signals. See
`
`limitation 1.4.a (describing wake signals). A POSITA could do so by, for
`
`example, having host monitoring server 3 (shown in Gordon’s Figure 5) send the
`
`wake signals to host devices A. Doing so would have been obvious in part because
`
`Gordon already discloses that monitoring server 3 communicates with host devices
`
`A, including laptop A3. Gordon, Fig. 5; Jakobsson Decl., ¶ 77.
`
`Implementing such functionality would have been well within the
`
`knowledge of a POSITA, would have required minimal effort, would have yielded
`
`predictable results, would have been fully compatible with host monitoring system
`
`C, monitoring center 70, and Gordon’s disclosed functionality. Jakobsson Decl., ¶
`
`78.
`
`Motivation to do so arises from Gordon’s disclosure of both monitoring
`
`system C and monitoring center 70 in one reference. Additional motivation arises
`
`from Gordon’s disclosure that the two have the same general functionality, as
`
`established above. Further motivation arises from Gordon’s teaching that sending
`
`
`
`22
`
`

`

`
`
`wake signals to host devices is desirable for various purposes. Gordon, 3:28-30 (to
`
`“carry out data protection measures or other servicing operations.”). More
`
`motivation arises from Gordon’s teaching that “[m]onitoring centers are sometimes
`
`also referred to using other terms, including … host monitoring system,” indicating
`
`that monitoring centers and monitoring systems can be viewed as the same system.
`
`Gordon, 12:45-48.
`
`[1.1] security system memory;
`
`Gordon discloses that host monitoring server 3 (a security system) has
`
`memory. The host monitoring server 3 “monitors the communications between the
`
`host device A and the host monitoring system C, which is contacted on a regular or
`
`scheduled basis by the host devices records information from the host devices.”
`
`Gordon, 8:28-36, Fig. 5. The host monitoring server 3 also “records information
`
`from the host devices [and] provides instructions to the host on what actions to
`
`perform, including what actions the host is to perform, what data to collect and the
`
`host[’]s next scheduled call time.” Id., 8:32-36. The host monitoring server 3 also
`
`is illustrated in Figure 5 as a physical “computer” (outlined in purple below).
`
`
`
`
`
`23
`
`

`

`
`
`
`
`
`
`A POSITA would understand that host monitoring server 3 inherently and
`
`necessarily has a memory because, for example, it is disclosed as a physical
`
`“computer” in Figure 5. Jakobsson Decl., ¶ 81. If the host monitoring server 3
`
`did not have memory, it could not perform its disclosed functions described above,
`
`including monitoring communications, receiving data, and instructing the host. Id.
`
`Similarly, monitoring center 70 inherently and necessarily has memory to at
`
`least temporarily store the instructions of monitoring center software 71 that it
`
`executes. Gordon, Fig. 1. Without such memory, it could not execute that
`
`software because it could not even temporarily store the instructions that make up
`
`that software. Jakobsson Decl., ¶ 82. See also limitation 1.0 (host monitoring
`
`system C and monitoring center 70 are the same).
`
`
`
`24
`
`

`

`
`
`[1.2.a] a communication interface configured to communicate with a mobile
`device and configured to communicate over a network with a security
`administrator device,
`
`Gordon discloses a mobile device, such as laptop computer A3, shown in
`
`Figure 5:
`
`
`
`Gordon, 8:15-18, Fig. 5. Gordon also explains that the “host may be a laptop
`
`computer, a cellphone, a Blackberry, a portable electronic gaming console, a
`
`personal digital assistant,” each of which also is a mobile device. Id., 8:4-11.
`
`Gordon also discloses “laptop 10” (a mobile device), shown in its Figure 1. Id.,
`
`14:30-31. Petitioner will refer to Gordon’s laptop host devices 10 and A3 as
`
`exemplary mobile devices.
`
`a. Gardner discloses the recited “security administrator
`device.”
`
`As described in the beginning of this ground, Gordon refers to Gardner (Ex.
`
`1108). Gordon, 8:54-60. Gardner discloses additional detail about “host
`
`monitoring system C” and discloses that its “location and asset related data … may
`
`
`
`25
`
`

`

`
`
`be kept in a central repository” that can be accessed “by authorized administrators
`
`via secure web-based or network based console[s]” (each a security administrator
`
`device). Gardner, ¶ 57. A POSITA would understand that the “web-based or
`
`network based console” is a computer that remotely accesses the host monitoring
`
`system C and its “central repository” via a network. Jakobsson Decl., ¶ 84. This
`
`computer console is an administrator device because it is used by “authorized
`
`administrators” for the administrative purposes of accessing “location and asset
`
`related data.” This computer console is a security administrator device because
`
`Gardner discloses doing so as part of “secure asset tracking” and as part of
`
`securing devices in the event of theft, tampering, or loss. Gardner ¶¶ 59, 56, 60
`
`(“theft recovery”) 191 (“protection in a theft or loss scenario”). See also Section
`
`IV.F.2 (“security administrator device” includes a device that performs security
`
`administration).
`
`b.
`
`It would have been obvious to combine Gordon and
`Gardner.
`
`It would have been obvious to a POSITA to combine the Gardner
`
`administrator “consoles” described above with Gordon. For example, it would
`
`have been obvious to a POSITA to include in the Gordon ecosystem the “web-
`
`based or network based console[s]” disclosed in Gardner such that “authorized
`
`administrators” could use the consoles to access data in “host monitoring system
`
`C” over a network

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket