`
`
`
`
`
`
`BEFORE THE PATENT TRIAL AND APPEAL BOARD
`
`
`
`
`
`
`TREND MICRO INC.,
`Petitioner
`
`v.
`
`CUPP COMPUTING AS,
`Patent Owner
`
`PGR2021-00101
`U.S. Patent No. 10,951,632
`
`
`PETITION FOR POST GRANT REVIEW OF
`U.S. PATENT NO. 10,951,632
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`TABLE OF CONTENTS
`
`INTRODUCTION .......................................................................................... 1
`COMPLIANCE WITH FORMAL REQUIREMENTS ................................. 1
`A. Mandatory Notices Under 37 C.F.R. §§ 42.8(b)(1)-(4) ....................... 1
`1.
`Real Party-In-Interest ................................................................. 1
`2.
`Related Matters .......................................................................... 1
`3.
`Lead and Backup Counsel ......................................................... 2
`4.
`Service Information.................................................................... 2
`Proof of Service on the Patent Owner .................................................. 2
`B.
`Power of Attorney ................................................................................ 2
`C.
`Standing ................................................................................................ 2
`D.
`Timing .................................................................................................. 4
`E.
`Fees ....................................................................................................... 4
`F.
`STATEMENT OF PRECISE RELIEF REQUESTED .................................. 4
`
` FULL STATEMENT ON REASONS FOR REQUESTED RELIEF ........... 5
`A.
`Summary of the ’632 Patent ................................................................. 5
`B.
`The ’632 Patent Prosecution History ................................................. 10
`C.
`No Challenged Claim of the ’632 Patent is Entitled to the
`Benefit of the ’134 Provisional Application’s Filing Date. ............... 10
`IPR of the Related ’595 Patent ........................................................... 13
`Person of Ordinary Skill in the Art .................................................... 14
`Claim Construction............................................................................. 14
`1.
`“power management mode” ..................................................... 14
`2.
`“security administrator device”................................................ 15
`3.
`“a security system processor” .................................................. 15
`G. Ground 1: Claims 1, 7, 9, 16, 22, and 24 are Obvious Under 35
`U.S.C. § 103 (AIA) in light of Gordon and Gardner. ........................ 16
`1.
`Limitation-by-Limitation Analysis .......................................... 19
`
`D.
`E.
`F.
`
`ii
`
`
`
`
`
`
`
`
`
`
`
`I.
`
`H. Ground 2: Claims 7 and 22 are Obvious Under 35 U.S.C. § 103
`(AIA) in light of Gordon, Gardner, and Chang. ................................. 50
`1.
`Limitation-by-Limitation Analysis .......................................... 53
`Ground 3: Claims 9 and 24 are Obvious Under 35 U.S.C. § 103
`(AIA) in light of Gordon, Gardner, and Meenan. .............................. 56
`1.
`Limitation-by-Limitation Analysis .......................................... 57
`THE BOARD SHOULD NOT DENY INSTITUTION UNDER 35
`U.S.C. § 325(d). ............................................................................................ 62
` PTAB DISCRETION UNDER 35 U.S.C. § 324(a) SHOULD NOT
`PRECLUDE INSTITUTION. ...................................................................... 63
`A.
`Fintiv Factor 1: Institution Will Enable a Stay ................................. 64
`B.
`Fintiv Factor 2: District Court Schedule ........................................... 64
`C.
`Fintiv Factor 3: Parallel Proceeding Considerations ......................... 66
`D.
`Fintiv Factor 4: The Petition Raises Unique Issues .......................... 66
`E.
`Fintiv Factor 5: The Petition Will Enable Cancellation of
`Claims That Might be Reasserted ...................................................... 67
`Fintiv Factor 6: Other Considerations Support Institution ............... 67
`F.
` CONCLUSION ............................................................................................. 68
`
`
`iii
`
`
`
`
`
`
`
`EXHIBIT LIST
`
`Exhibit No.
`
`Description
`
`1101
`
`1102
`
`1103
`
`1104
`
`1105
`
`1106
`
`1107
`
`1108
`
`1109
`
`1110
`
`1111
`
`1112
`
`1113
`
`1114
`
`1115
`
`U.S. Patent No. 10,951,632 (the “’632 patent”).
`
`File history of U.S. Patent No. 10,951,632.
`
`Trend Micro Inc. v. CUPP Computing AS, IPR2019-00765 (’595
`patent), Final Written Decision (PTAB Aug. 25, 2020).
`
`U.S. Patent No. 9,781,164 (the “’595 patent”).
`
`Provisional Application No. 61/086,134.
`
`Joint Claim Construction Chart from the parties’ litigation in
`CUPP Cybersecurity, LLC v. Trend Micro, Inc., No. 3:18-cv-
`01251 (N.D. Tex.).
`
`U.S. Patent No. 7,818,803 to Gordon (“Gordon”).
`
`U.S. Patent App. Pub. No. 2006/0272020 to Gardner (“Gardner”).
`
`U.S. Patent App. Pub. No. 2011/0264931 to Chang (“Chang”).
`
`Int’l Patent App. Pub. No. WO 2010/004296.
`
`U.S. Patent App. Pub. No. 2006/0101277 to Meenan (“Meenan”).
`
`CUPP Cybersecurity, LLC v. Trend Micro, Inc., No. 3:18-cv-
`01251, Doc. 70 (N.D. Tex. Sept. 5, 2019) (stay order).
`
`CUPP Cybersecurity, LLC v. Trend Micro, Inc., No. 3:20-cv-
`03206, Doc. 38 (N.D. Tex. Apr. 8, 2021) (scheduling order).
`
`CUPP Cybersecurity, LLC v. Trend Micro, Inc., No. 3:20-cv-
`03206, Doc. 1 (N.D. Tex. Oct. 1, 2020) (original complaint).
`
`CUPP Cybersecurity, LLC v. Trend Micro, Inc., No. 3:20-cv-
`03206, Doc. 41 (N.D. Tex. Apr. 23, 2021) (amended complaint).
`
`iv
`
`
`
`
`
`
`
`1116
`
`1117
`
`1118
`
`1119
`
`1120
`
`Patent Owner’s infringement contentions in CUPP Cybersecurity,
`LLC v. Trend Micro, Inc., No. 3:20-cv-03206 (N.D. Tex.) (dated
`May 6, 2021).
`
`CUPP Cybersecurity, LLC v. Trend Micro, Inc., No. 3:18-cv-
`01251, Doc. 39 (N.D. Tex. Aug. 3, 2018) (order setting trial for
`May 18, 2020).
`
`CUPP Cybersecurity, LLC v. Trend Micro, Inc., No. 3:18-cv-
`01251, Doc. 63 (N.D. Tex. May 9, 2019) (order changing trial
`date to October 5, 2020).
`
`CUPP Cybersecurity, LLC v. Trend Micro, Inc., No. 3:18-cv-
`01251, Doc. 89 (N.D. Tex. Feb. 10, 2021) (order changing trial
`date to May 2, 2022).
`
`Email from Patent Owner’s counsel in CUPP Cybersecurity, LLC
`v. Trend Micro, Inc., No. 3:20-cv-03206 (N.D. Tex.) identifying
`asserted claims.
`
`1121
`
`Declaration of expert Dr. Markus Jakobsson (“Jakobsson Decl.”).
`
`v
`
`
`
`
`
`
`
`INTRODUCTION
`
`The PTAB has found claims that are effectively identical to the ’632 patent’s
`
`claims to be unpatentable. Trend Micro Inc. v. CUPP Computing AS, IPR2019-
`
`00765, Paper 29 at 45-46 (PTAB Aug. 25, 2020) (Ex. 1103) (finding unpatentable
`
`many claims of related U.S. Patent No. 9,843,595 (the “’595 patent”)). For
`
`example, the ’632 patent’s claim 1 is word-for-word identical to the ’595 patent’s
`
`claim 1, except for one additional limitation also disclosed by the prior art. The
`
`PTAB therefore should find that the ’632 patent’s claims, like the ’595 patent’s
`
`claims, are unpatentable.
`
`Moreover, although the crux of the ’632 patent’s purported novelty is a
`
`security system that is mobile, the ’632 patent’s claims recite a “security system”
`
`without regard to whether it is mobile or stationary. By claiming a security system
`
`that may be stationary, the applicant wiped away any potential point of novelty the
`
`patent’s purported invention may have had, and encompassed the prior art. The
`
`challenged claims therefore are invalid.
`
` COMPLIANCE WITH FORMAL REQUIREMENTS
`
`A. Mandatory Notices Under 37 C.F.R. §§ 42.8(b)(1)-(4)
`
`1.
`
`Real Party-In-Interest
`
`Trend Micro is the real party-in-interest.
`
`2.
`
`Related Matters
`
`The ’632 patent is subject to the following action: CUPP Cybersecurity LLC
`
`
`
`1
`
`
`
`
`
`v. Trend Micro, Inc., et al., No. 3:20-cv-03206 (N.D. Tex.).
`
`3.
`
`Lead and Backup Counsel
`
`Lead counsel is Robert Buergi, Reg. No. 58,125, of DLA Piper LLP (US),
`
`2000 University Ave., East Palo Alto, CA 94303; robert.buergi@dlapiper.com,
`
`650-833-2407 (phone), 650-687-1144 (fax).
`
`Backup counsel is Michael Burns, Reg. No. 57,593, of DLA Piper LLP
`
`(US), One Liberty Place, 1650 Market St, Suite 5000, Philadelphia, PA 19103;
`
`michael.burns@dlapiper.com, 215-656-2443 (phone), 215-606-2143 (fax).
`
`4.
`
`Service Information
`
`Service information for lead and backup counsel is provided in the
`
`designation of lead and backup counsel above.
`
`B.
`
`Proof of Service on the Patent Owner
`
`As identified in the attached Certificate of Service, a copy of this Petition in
`
`its entirety is being served to the Patent Owner’s attorney of record at the address
`
`listed in the USPTO’s records by overnight courier pursuant to 37 C.F.R. § 42.6.
`
`C.
`
`Power of Attorney
`
`Powers of attorney are being filed with designation of counsel in accordance
`
`with 37 C.F.R. § 41.10(b).
`
`D.
`
`Standing
`
`On July 9, 2021, Petitioner filed two petitions for inter partes review
`
`(“IPR”) of the ’632 patent: IPR2021-01236 and IPR2021-01237. The PTAB
`
`
`
`2
`
`
`
`
`
`should institute those IPRs.
`
`However, Public PAIR lists the ’632 patent as an AIA patent. This is
`
`incorrect. The ’632 patent is a pre-AIA patent because its effective filing date is
`
`no later than August 4, 2009, the date of its ancestor U.S. Patent No. 8,631,488, to
`
`which the ’632 patent claims priority via a series of continuations. See Leahy-
`
`Smith America Invents Act, Pub. L. 112-29, § 3(n)(1), 125 Stat. 284, 293 (2011).
`
`August 4, 2009 predates the AIA’s March 16, 2013 effective date. In addition, the
`
`’632 patent does not claim priority to any patent or application that is an AIA
`
`patent or AIA application because no patent or application in its chain of priority
`
`has an effective filing date that is on or after March 16, 2013.
`
`Nonetheless, if the PTAB finds that the ’632 patent is an AIA patent, then
`
`this petition for post-grant review (“PGR”) is proper because Petitioner is filing it
`
`within nine months of the ’632 patent’s issue date (March 16, 2021). 35 U.S.
`
`§ 321(c). In addition, Petitioner is not barred or estopped from requesting a post-
`
`grant review challenging the challenged patent claims on the grounds identified in
`
`this petition.
`
`Out of an abundance of caution, therefore, Petitioner is filing this PGR
`
`petition that is substantively duplicative of IPR2021-01237. At least one of this
`
`petition for PGR and the petition in IPR2021-01237 is procedurally proper.
`
`
`
`3
`
`
`
`
`
`E.
`
`Timing
`
`Under 37 CFR § 42.202, “[a] petition for a post-grant review of a patent
`
`must be filed no later than the date that is nine months after the date of the grant of
`
`a patent or of the issuance of a reissue patent.” Petitioner is filing this petition
`
`within nine months of the ’632 patent’s issue date (March 16, 2021), and this
`
`petition therefore is timely.
`
`F.
`
`Fees
`
`The undersigned authorizes the Director to charge the fee specified by 37
`
`C.F.R. § 42.15(b) and any additional fees that might be due in connection with this
`
`Petition to Deposit Account No. 07-1896.
`
` STATEMENT OF PRECISE RELIEF REQUESTED
`
`In accordance with 35 U.S.C. § 321 and 37 C.F.R. § 42.204(b), Petitioner
`
`requests cancelation of claims 1, 7, 9, 16, 22, and 24 of the ’632 patent in view of
`
`the following grounds:
`
`Ground
`
`Claims
`
`§103 Prior Art Basis
`
`1
`
`2
`
`3
`
`1, 7, 9, 16, 22, 24 Gordon and Gardner
`
`7, 22
`
`9, 24
`
`Gordon, Gardner, and Chang
`
`Gordon, Gardner, and Meenan
`
`
`Constructions of terms in the challenged claims are set forth in Section IV.F.
`
`An explanation of how the construed claims are unpatentable is set forth in
`
`
`
`4
`
`
`
`
`
`Sections IV.G-I, which include discussions of the relevance of the evidence to the
`
`challenges raised, including identifying specific portions of the evidence that
`
`support the challenges.
`
` FULL STATEMENT ON REASONS FOR REQUESTED RELIEF
`
`A.
`
`Summary of the ’632 Patent
`
`The ’632 patent describes the purported problem of mobile devices being
`
`more vulnerable to attack when traveling outside of an enterprise network by
`
`losing the benefit of the enterprise network’s security system, such as a network
`
`gateway that includes a firewall. Ex. 1101, 1:45-65. For example, the patent’s
`
`Figure 2 shows mobile device 110 that has moved out of the trusted enterprise
`
`network 140 and no longer receives the benefit of network security system 120.
`
`Id., Fig. 2, 2:19-32.
`
`
`
`5
`
`
`
`
`
`
`
`The ’632 patent also states that “[a]nother disadvantage to existing security
`
`systems is that they require a fully operational system and a significant load on
`
`CPU power. To reduce the impact of scanning and updating a system, users often
`
`leave their PCs active overnight which consumes power. Further, when the PC is a
`
`laptop, the user cannot close the laptop and expect security functions to be
`
`performed.” Ex. 1101, 2:55-61.
`
`To solve these purported problems, the ’632 patent proposes a “mobile
`
`security system” that travels with a mobile device outside of the trusted network to
`
`provide security for the mobile device that the network security system provides
`
`
`
`6
`
`
`
`
`
`inside the trusted network. Ex. 1101, 5:53-6:15, Fig. 3. Figure 3 shows mobile
`
`security system 345b that has traveled with mobile device 310c outside of trusted
`
`enterprise network 340.
`
`
`
`The mobile security system is used to manage “security services” of a
`
`mobile device that has entered a “power management mode.” Ex. 1101, 19:26-40.
`
`“In some embodiments, the mobile security system detects a wake event and then
`
`may either take control of one or more components of the mobile device or
`
`terminate the power management mode of the mobile device in order to perform
`
`the security services.” Id., 19:63-67. In some embodiments, the mobile security
`
`system includes a “wake module” that sends a “wake signal” to the mobile device
`
`to wake up some or all of the components on the mobile device. Id., 21:56-22:27.
`
`
`
`7
`
`
`
`
`
`“Security services may include, but are not limited to, scanning the mobile
`
`device, updating the mobile device, and/or performing maintenance functions.”
`
`Ex. 1101, 19:35-37, 19:41-62. Figure 20 (shown below) illustrates one process for
`
`managing and performing security services based on a detected wake event.
`
`
`
`8
`
`
`
`
`
`The description of Figure 20 refers to the mobile security system performing the
`
`steps above. Id., 29:44-30:55; see also id., Fig. 18 (showing the modules of the
`
`
`
`mobile security system referenced in that description).
`
`9
`
`
`
`
`
`
`
`Although the crux of the ’632 patent’s purported novelty is a security system
`
`that is mobile, the ’632 patent’s claims recite a “security system” without regard to
`
`whether it is mobile or stationary. Ex. 1101, 31:15 (“A security system”), 32:35-
`
`336 (“a security system”). By claiming a security system that may be stationary,
`
`the ’632 patent’s claims wipe away any potential point of novelty they may have
`
`otherwise had, and encompass the prior art.
`
`B.
`
`The ’632 Patent Prosecution History
`
`The ’632 patent issued from Application No. 16/601,466, filed on October
`
`14, 2019. Ex. 1101, cover page sections (22), (21). During prosecution of the ’466
`
`application, the applicant submitted a TrackOne request, which the PTO granted.
`
`Ex. 1102, 254, 233-234. The applicant also filed a terminal disclaimer. Id., 225-
`
`227. The PTO issued the ’632 patent on March 16, 2021 without having rejected
`
`the claims during prosecution. Id., 1.
`
`C. No Challenged Claim of the ’632 Patent is Entitled to the Benefit
`of the ’134 Provisional Application’s Filing Date.
`
`The earliest possible effective filing date to which the claims of the ’632
`
`patent may be entitled is August 4, 2008, the date of the ’134 provisional
`
`application to which the ’632 patent claims priority. Ex. 1101, cover page section
`
`(60). However, the challenged claims depend on new matter that was added to the
`
`specification after the filing of the ’134 provisional application. Therefore, none of
`
`the challenged claims are entitled to the benefit of the ’134 provisional
`
`
`
`10
`
`
`
`
`
`application’s filing date, and the challenged claims’ earliest effective filing date is
`
`the filing date of the first non-provisional patent application to which the ’632
`
`patent claims priority: August 4, 2009. Transco Prods., Inc. v. Performance
`
`Contracting, Inc., 38 F.3d 551 (Fed. Cir. 1994); New Railhead Mfg., L.L.C. v.
`
`Vermeer Mfg. Co., 298 F.3d 1290, 1294 (Fed. Cir. 2002) (a provisional application
`
`must satisfy 35 U.S.C. § 112, ¶1 to afford a non-provisional application the benefit
`
`of claiming it is entitled to the non-provisional application’s filing date).
`
`A comparison between the ’134 provisional application’s specification (Ex.
`
`1105, 3-50) and the ’632 patent’s specification shows that the ’632 patent
`
`specification contains a significant amount of subject matter that was not part of
`
`the ’134 provisional application. Indeed, the ’632 patent includes nearly 15
`
`columns of subject matter, shown in the ’632 patent (Ex. 1101) at 15:60 to 30:55
`
`and Figs. 11-20, which is missing from the ’134 provisional application. The
`
`newly added matter includes the description of the “wake” functionality, the
`
`components for implementing this functionality on the mobile security system
`
`(Fig. 18), and the processing performed by the mobile security system to
`
`implement this functionality (Fig. 20). The patent’s Figures 18 and 20 are shown
`
`below.
`
`
`
`11
`
`
`
`
`
`
`
`This new matter includes at least the following functionality claimed in the
`
`
`
`challenged claims:
`
`a.
`
`“store in the security system memory at least a portion of wake code”
`
`(claim 1) / “storing at least a portion of wake code executable by a
`
`security system process” (claim 16);
`
`b.
`
`“the wake code [when executed by the security system processor]
`
`being configured to detect a wake event and to send a wake signal to
`
`[the/a] mobile device in response to detecting the wake event” (claim
`
`
`
`12
`
`
`
`
`
`1 and 16);
`
`c.
`
`“the security agent of the mobile device being configured to receive
`
`the wake signal” (claims 1 and 16);
`
`d.
`
`“the security agent of the mobile device being configured to wake at
`
`least a portion of the mobile device from a power management mode
`
`e.
`
`f.
`
`in response to receiving the wake signal” (claims 1 and 16);
`
`“detect a particular wake event” (claims 1 and 16);
`
`“prepare a particular wake signal [to send to the mobile device] in
`
`response to detecting the particular wake event” (claims 1 and 16);
`
`and
`
`g.
`
`“send the particular wake signal to the mobile device” (claims 1 and
`
`16).
`
`Because the challenged claims rely on new matter that was not in the ’134
`
`provisional application, they are not entitled to the benefit of that application’s
`
`August 4, 2008 filing date.
`
`D.
`
`IPR of the Related ’595 Patent
`
`In IPR2019-00765, the PTAB found claims 1, 9, 11, 13-14, 16, 24, 26, 28,
`
`and 29 of U.S. Patent No. 9,843,595 to be unpatentable in light of the Joseph,
`
`Gordon, and Zmudzinski prior art references. Ex. 1103, 45-46. The ’632 patent’s
`
`claim 1 is word-for-word identical to the ’595 patent’s claim 1, except for one
`
`
`
`13
`
`
`
`
`
`additional limitation also disclosed by the prior art. Compare Ex. 1101, 31:15-58
`
`with Ex. 1104 (’595 patent), 31:14-51. And the ’632 patent’s independent claim
`
`16 recites effectively identical limitations as its claim 1.
`
`E.
`
`Person of Ordinary Skill in the Art
`
`A person of ordinary skill in the art at the time of the alleged invention of
`
`the ’632 patent (i.e., August 4, 2008) (“POSITA”) 1 would have had a bachelors’
`
`degree in computer science, electrical engineering, or a comparable field of study,
`
`plus at least two years of professional experience with computer security systems,
`
`or the equivalent. Ex. 1121 (“Jakobsson Decl.”), ¶ 60.
`
`F. Claim Construction
`
`Claims in this PGR should be construed in accordance with their “ordinary
`
`and customary meaning” as understood by one of ordinary skill in the art at the
`
`time of the invention. 37 C.F.R. § 42.200(b); Phillips v. AWH Corp., 415 F.3d
`
`1303, 1313 (Fed. Cir. 2005) (en banc).
`
`1.
`
`“power management mode”
`
`Claims 1 and 16 recite “power management mode.” In a related litigation
`
`concerning the related ’595 patent, the parties agreed that this term means “a mode
`
`
`1 Petitioner has used the Patent Owner’s alleged priority date of the ’632 patent for
`
`determining the POSITA. The same level of skill applies for the actual priority
`
`date of the ’632 patent (i.e., August 4, 2009). Jakobsson Decl., ¶ 60.
`
`
`
`14
`
`
`
`
`
`where the mobile device conserves power.” Ex. 1106, 6; see also Ex. 1103, 8
`
`(’595 patent IPR final written decision adopting same construction). Accordingly,
`
`the Board should adopt this construction for purposes of the ’632 patent.
`
`2.
`
`“security administrator device”
`
`Claims 1 and 16 recite “security administrator device.” The plain and
`
`ordinary meaning of this term includes a device that performs security
`
`administration. Jakobsson Decl., ¶ 65. This is consistent with the ’632 patent’s
`
`disclosure that the security administrator device 325 may perform various security
`
`administration tasks. Ex. 1101, 24:55-57 (“security administrator 325” is an
`
`“administrator device”), Fig. 3 (showing “security admin[istrator device] 325”),
`
`6:48-51 (it may translate enterprise security policies to mobile security policies),
`
`10:6-10 (it may import a firewall’s “rule base”), 10:22-25 (it may store “local logs
`
`and audit trails” from mobile security systems), 11:63-64 (it may update URL
`
`black and white lists for traveling users), 12:4-6 (it may delegate tasks to a help
`
`desk), 12:28-30 (it may maintain routing tables).
`
`3.
`
`“a security system processor”
`
`Claims 1 and 16 recite “a security system processor.” “Unless the claim is
`
`specific as to the number of elements, the article ‘a’ receives a singular
`
`interpretation only in rare circumstances when the patentee evinces a clear intent to
`
`so limit the article.” KCJ Corp. v. Kinetic Concepts, Inc., 223 F.3d 1351, 1356
`
`
`
`15
`
`
`
`
`
`(Fed. Cir. 2000). “Under this conventional rule, the claim limitation ‘a,’ without
`
`more, requires at least one.” Id.; see also Convolve, Inc. v. Compaq Comput.
`
`Corp., 812 F.3d 1313, 1321 (Fed. Cir. 2016) (interpreting “a processor” as “one or
`
`more processors”). Further, the ’632 specification makes clear that a security
`
`system processor is not limited to a single processor. Ex. 1101, 21:49-52 (“mobile
`
`security system 1702 may comprise more processors … than those depicted in
`
`FIG. 17.”). “A security system processor” therefore means “one or more security
`
`system processors.”
`
`G. Ground 1: Claims 1, 7, 9, 16, 22, and 24 are Obvious Under 35
`U.S.C. § 103 (AIA) in light of Gordon and Gardner.
`
`U.S. Patent No. 7,818,803 to Gordon (“Gordon,” Ex. 1107) was filed on
`
`January 16, 2008, claiming priority to a provisional application filed on January
`
`16, 2007. Accordingly, Gordon is prior art under 35 U.S.C. §102(a)(2) (AIA) and
`
`predates the earliest possible effective filing date of the ’632 patent (Aug. 4, 2008).
`
`Gordon discloses a host monitoring system C (outlined in green below) that
`
`communicates via a host monitoring server 3 (outlined in purple below) with host
`
`devices A (outlined in blue below). Gordon, 8:12-36, Fig. 5.
`
`
`
`16
`
`
`
`
`
`
`
`
`
`
`
`
`
`Host device A may include a “host agent and a security module.” Gordon,
`
`8:12-18. For example, host device A may be laptop 10 (outlined in blue below)
`
`with security module 19 (outlined in red below) that includes firmware agent 21.
`
`Gordon, Fig. 1, 4:58-63, 13:1-5, 17:5-9.
`
`
`
`17
`
`
`
`
`
`
`
`
`
`
`
`
`
`Gordon also includes host agent 14 (outlined in orange above) that performs
`
`security services such as deleting data and updating software. Gordon, 3:43-45,
`
`7:20-40, 12:49-60, 15:50-56.
`
`U.S. Patent Application Publication No. 2006/0272020 to Gardner
`
`(“Gardner,” Ex. 1108) was published on November 30, 2006. Accordingly,
`
`Gardner is prior art under 35 U.S.C. §102(a)(1) (AIA) and predates the earliest
`
`possible effective filing date of the ’632 patent (Aug. 4, 2008).
`
`Gordon refers to Gardner by application number as showing more detail of
`
`Gordon’s Figure 5. Gordon, 8:54-60 (referring to U.S. Pat. App. Pub. No.
`
`
`
`18
`
`
`
`
`
`2006/0272020). Gardner has overlapping disclosure with Gordon and, for
`
`example, includes Gordon’s Figure 5 as its Figure 1.
`
`Like Gordon, Gardner discloses a “host monitoring system.” Gardner
`
`further discloses that the host monitoring system stores “location and asset related
`
`data … in a central repository and can be accessed 24x7 by authorized
`
`administrators via secure web-based or network based console.” Gardner, ¶ 57.
`
`1.
`
`Limitation-by-Limitation Analysis
`
`Claim 1:
`
`[1.0] A security system, comprising:
`
`To the extent the preamble is limiting, Gordon discloses a security system
`
`that includes the limitations of claim 1. Gordon discloses a “host monitoring
`
`system C” (outlined in green below) that communicates via a “host monitoring
`
`server 3” (outlined in purple below) with host devices A (outlined in blue below).
`
`Gordon, 8:12-36, Fig. 5.
`
`
`
`19
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Host monitoring server 3 is a “security system” at least because it sends
`
`wake signals to mobile devices for purposes related to security, as described
`
`below. Host monitoring system C also is a “security system” because it includes
`
`host monitoring server 3.
`
`Gordon also disclose a “monitoring center” 70 shown on the right side of its
`
`Figure 1:
`
`
`
`20
`
`
`
`
`
`
`
`
`
`Gordon explains that “[m]onitoring centers are sometimes also referred to using
`
`other terms, including … host monitoring system.” Gordon, 12:45-48. A POSITA
`
`therefore will understand that Gordon’s “monitoring center” 70 (in Figure 1) is
`
`another name for its “host monitoring system” C (in Figure 5). Jakobsson Decl.,
`
`¶ 76. This conclusion is confirmed by the fact that Gordon discloses that
`
`monitoring center 70 and host monitoring system C have the same general
`
`functionality. Gordon, 8:37-47, 12:41-45; see also id., 12:40-13:60, 8:12-53;
`
`Jakobsson Decl., ¶ 76. Gordon’s monitoring center 70 therefore also is a “security
`
`system” for the same reasons that host monitoring system C is a security system.
`
`
`
`21
`
`
`
`
`
`*
`
`*
`
`*
`
`It also would have been obvious to a POSITA to include the functionality of
`
`Gordon’s monitoring center 70 cited in this petition with the functionality of its
`
`host monitoring center C, and vice versa. For example, Gordon discloses that
`
`monitoring center 70 sends wake signals and it would have been obvious to a
`
`POSITA to have host monitoring system C also send those wake signals. See
`
`limitation 1.4.a (describing wake signals). A POSITA could do so by, for
`
`example, having host monitoring server 3 (shown in Gordon’s Figure 5) send the
`
`wake signals to host devices A. Doing so would have been obvious in part because
`
`Gordon already discloses that monitoring server 3 communicates with host devices
`
`A, including laptop A3. Gordon, Fig. 5; Jakobsson Decl., ¶ 77.
`
`Implementing such functionality would have been well within the
`
`knowledge of a POSITA, would have required minimal effort, would have yielded
`
`predictable results, would have been fully compatible with host monitoring system
`
`C, monitoring center 70, and Gordon’s disclosed functionality. Jakobsson Decl., ¶
`
`78.
`
`Motivation to do so arises from Gordon’s disclosure of both monitoring
`
`system C and monitoring center 70 in one reference. Additional motivation arises
`
`from Gordon’s disclosure that the two have the same general functionality, as
`
`established above. Further motivation arises from Gordon’s teaching that sending
`
`
`
`22
`
`
`
`
`
`wake signals to host devices is desirable for various purposes. Gordon, 3:28-30 (to
`
`“carry out data protection measures or other servicing operations.”). More
`
`motivation arises from Gordon’s teaching that “[m]onitoring centers are sometimes
`
`also referred to using other terms, including … host monitoring system,” indicating
`
`that monitoring centers and monitoring systems can be viewed as the same system.
`
`Gordon, 12:45-48.
`
`[1.1] security system memory;
`
`Gordon discloses that host monitoring server 3 (a security system) has
`
`memory. The host monitoring server 3 “monitors the communications between the
`
`host device A and the host monitoring system C, which is contacted on a regular or
`
`scheduled basis by the host devices records information from the host devices.”
`
`Gordon, 8:28-36, Fig. 5. The host monitoring server 3 also “records information
`
`from the host devices [and] provides instructions to the host on what actions to
`
`perform, including what actions the host is to perform, what data to collect and the
`
`host[’]s next scheduled call time.” Id., 8:32-36. The host monitoring server 3 also
`
`is illustrated in Figure 5 as a physical “computer” (outlined in purple below).
`
`
`
`
`
`23
`
`
`
`
`
`
`
`
`
`A POSITA would understand that host monitoring server 3 inherently and
`
`necessarily has a memory because, for example, it is disclosed as a physical
`
`“computer” in Figure 5. Jakobsson Decl., ¶ 81. If the host monitoring server 3
`
`did not have memory, it could not perform its disclosed functions described above,
`
`including monitoring communications, receiving data, and instructing the host. Id.
`
`Similarly, monitoring center 70 inherently and necessarily has memory to at
`
`least temporarily store the instructions of monitoring center software 71 that it
`
`executes. Gordon, Fig. 1. Without such memory, it could not execute that
`
`software because it could not even temporarily store the instructions that make up
`
`that software. Jakobsson Decl., ¶ 82. See also limitation 1.0 (host monitoring
`
`system C and monitoring center 70 are the same).
`
`
`
`24
`
`
`
`
`
`[1.2.a] a communication interface configured to communicate with a mobile
`device and configured to communicate over a network with a security
`administrator device,
`
`Gordon discloses a mobile device, such as laptop computer A3, shown in
`
`Figure 5:
`
`
`
`Gordon, 8:15-18, Fig. 5. Gordon also explains that the “host may be a laptop
`
`computer, a cellphone, a Blackberry, a portable electronic gaming console, a
`
`personal digital assistant,” each of which also is a mobile device. Id., 8:4-11.
`
`Gordon also discloses “laptop 10” (a mobile device), shown in its Figure 1. Id.,
`
`14:30-31. Petitioner will refer to Gordon’s laptop host devices 10 and A3 as
`
`exemplary mobile devices.
`
`a. Gardner discloses the recited “security administrator
`device.”
`
`As described in the beginning of this ground, Gordon refers to Gardner (Ex.
`
`1108). Gordon, 8:54-60. Gardner discloses additional detail about “host
`
`monitoring system C” and discloses that its “location and asset related data … may
`
`
`
`25
`
`
`
`
`
`be kept in a central repository” that can be accessed “by authorized administrators
`
`via secure web-based or network based console[s]” (each a security administrator
`
`device). Gardner, ¶ 57. A POSITA would understand that the “web-based or
`
`network based console” is a computer that remotely accesses the host monitoring
`
`system C and its “central repository” via a network. Jakobsson Decl., ¶ 84. This
`
`computer console is an administrator device because it is used by “authorized
`
`administrators” for the administrative purposes of accessing “location and asset
`
`related data.” This computer console is a security administrator device because
`
`Gardner discloses doing so as part of “secure asset tracking” and as part of
`
`securing devices in the event of theft, tampering, or loss. Gardner ¶¶ 59, 56, 60
`
`(“theft recovery”) 191 (“protection in a theft or loss scenario”). See also Section
`
`IV.F.2 (“security administrator device” includes a device that performs security
`
`administration).
`
`b.
`
`It would have been obvious to combine Gordon and
`Gardner.
`
`It would have been obvious to a POSITA to combine the Gardner
`
`administrator “consoles” described above with Gordon. For example, it would
`
`have been obvious to a POSITA to include in the Gordon ecosystem the “web-
`
`based or network based console[s]” disclosed in Gardner such that “authorized
`
`administrators” could use the consoles to access data in “host monitoring system
`
`C” over a network