throbber
Filed By: Vivek Ganti (vg@hkw-law.com) Reg. No. 71,368; and
`
`
`Sharad K. Bijanki (sb@hkw-law.com) Reg. No. 73,400
`
`
`
`
`
`UNITED STATES PATENT AND TRADEMARK OFFICE
`
`BEFORE THE PATENT TRIAL AND APPEAL BOARD
`
`_________________
`
`TV MANAGEMENT, INC., D/B/A GPS NORTH AMERICA
`Petitioner,
`
`v.
`
`PERDIEM CO., LLC.
`
`Patent Owner
`
`_________________
`
`Case IPR2016-01064
`
`U.S. Patent 9,003,499
`
`_________________
`
`PETITIONER’S REPLY
`
`
`
`i
`
`
`
`
`
`

`

`
`
`TABLE OF CONTENTS
`
`II. Claims 1, 3–6, 8, 11, 12, and 16–20 Are Anticipated by Fast ........................... 3
`
`
`
`
`
`
`
`
`
`A. Fast discloses limitation [k] .......................................................................... 3
`
`B. Fast discloses limitation [l] ........................................................................... 9
`
`C. Fast discloses limitation [m] ....................................................................... 12
`
`III. Claims 1, 3–6, 8, 11, 12, and 16–20 Are Rendered Obvious by Fast and
`
` Zou............................................................................................................. 14
`
`
`
`
`
`
`
`
`
`A. The allegedly patentable distinctions over Fast are obvious in view of
`Zou ................................................................................................................... 14
`
`B. A POSITA would be motivated to combine Fast and Zou .......................... 17
`
`C. Patent Owner’s licensing evidence does not amount to a secondary
`consideration to rebut the obviousness case ...................................................... 20
`
`IV. Conclusion .................................................................................................. 24
`
`
`
`V. Certification of Compliance ........................................................................ 24
`
`
`
`ii
`
`
`
`
`
`

`

`TABLE OF AUTHORITIES
`
`CASE LAW
`
`Federal Circuit Court of Appeals
`
`In re Antor Media Corp., 689 F.3d 1282 (Fed. Cir. 2012) ...............................21
`
`Bell Communications v. Vitalink Communications Corp., 55 F.3d 615
`
` (Fed. Cir 1995) ...........................................................................................2
`
`In re Blaise Laurent Mouttet, No. 2011-1451 (Fed. Cir. June 26, 2012) ..........18
`
`In re Etter, 756 F.2d 852 (Fed. Cir. 1985) (en banc) .......................................19
`
`In re Kahn, 441 F.3d 977, 987-88 (Fed. Cir. 2006) .........................................18
`
`Novartis AG v. Torrent Pharmaceuticals, Case No. 2016-1352 (Fed. Cir.
`
` April 12, 2017 ............................................................................................21
`
`
`
`USPTO, Patent Trial and Appeal Board
`
`CaptionCall, LLC v. Ultratec Inc., IPR2013-00545, paper 67, pp.7-8 (PTAB,
`
` December 1, 2015) .....................................................................................18
`
`
`
`FEDERAL REGULATIONS
`
`37 C.F.R. § 42.64(b) .......................................................................................23
`
`37 C.F.R. § 42.65(a) .......................................................................................20
`
`
`
`
`
`
`
`iii
`
`

`

`EXHIBIT LIST1
`
`Ex. 1001 U.S. Patent No. 9,003,499 (“’499 Patent”)
`
`Ex. 1002
`
`The file history of the ’499 Patent
`
`Ex. 1003 U.S. Patent No. 7,327,258 (“Fast”)
`
`Ex. 1004 U.S. Provisional Patent App. No. 60/542,208 (“Fast Provisional”)
`
`Ex. 1005 U.S. Patent Pub. No. US 2005/0156715 (“Zou”)
`
`Ex. 1006 Discrete Wireless’s Marcus GPS Fleet Management Application
`
`Product Brochure (“Marcus”)
`
`Ex. 1007
`
`Success Stories in Fleet Tracking (Sept. 1, 2005)
`
`Ex. 1008 U.S. Patent No. 7,949,608 (“Li”)
`
`Ex. 1009
`
`Software as a Service Article (“SaaS Article”)
`
`Ex. 1010 Declaration of Dr. Stephen Heppe
`
`Ex. 1011 Declaration of Vivek Ganti, Esq.
`
`Ex. 1012 Declaration of William Steckel
`
`Ex. 1013 Declaration of Steven G. Hill
`
`Ex. 1014 Declaration of Michael Femal
`
`Ex. 1015
`
`Infringement Complaints Filed by Patent Owner
`
`
`1 Newly filed exhibits in bold
`
`
`
`iv
`
`

`

`The Board instituted trial on all claims and all grounds which include claims
`
`1, 3–6, 8, 11, 12, and 16–20 of the ’499 Patent. (Inst. Dec., paper 20, p. 40). Patent
`
`Owner filed its Corrected Patent Owner Response (POR, p.34) addressing only
`
`three claim limitations which are found in independent claims 1 and 19. Petitioner
`
`submits the following Reply demonstrating that the challenged claims are
`
`anticipated and rendered obvious by a preponderance of the evidence.
`
`I.
`
`The Claim Scope of the ’499 Patent
`
`
`
`The parties’ dispute over claim scope boils down to the term “associating”
`
`as it appears below in limitations [k] and [l]:
`
`- “access control codes associated with the plurality of authorized user
`
`identification codes [AUICs]”
`
`- “event information access codes [EIACs] that are associated with the
`
`plurality of authorized user identification codes”
`
`Neither party proposed an express construction for the term “associated,” but given
`
`the patentability arguments raised in the POR, a discussion is warranted.
`
`
`
`The specification of the ’499 Patent describes both the active “associate”
`
`(see Ex. 1001, 13:19-20, “the administrator can associate individual users with one
`
`or more of the defined groups” (emphasis added)) as well as the passive
`
`“associated” (id., 8:30-33, “an icon 202 that indicates the location of a car
`
`equipped or somehow associated with a source of location information” (emphasis
`
`
`
`1
`
`

`

`added)). The claims use “associated” and therefore encompass a passive
`
`association under the BRI standard. Cf. Bell Communications v. Vitalink
`
`Communications Corp., 55 F.3d 615, 621–22 (Fed. Cir 1995) (faulting the district
`
`court for interpreting claim term “associating” to cover only explicit, and not
`
`implicit, association). Yet in this proceeding, Patent Owner now seeks to read into
`
`the claims an actor (network administrator) who specifies the association between
`
`two things. In other words, according to Patent Owner, an access code associated
`
`with a user ID actually means an actor specifying or assigning an access to a user
`
`having a user ID.
`
`
`
`For example, Patent Owner argues that “in limitation 1(l), a user cannot
`
`access the E-ISE (highlighted in red) unless it has an EIAC, which is specified by
`
`the authorized user.” (POR, p.11). Nothing in limitation [l] requires the EIAC to
`
`be specified by another entity, much less an authorized user. Rather, the EIAC is
`
`merely “associated” with a plurality of AUICs. Similarly, Patent Owner argues
`
`that “in limitation 1(k), a user cannot access the first-ISE (highlighted in blue)
`
`unless it has a first level access code (i.e., an AUIC).” (Id., p.11). Patent Owner
`
`goes as far as to say that the access code “is assigned to the user by the network
`
`administrator, so that the user can access the first-ISE.” (Id., 23). However, an
`
`access code being “associated” with a user identification code does not mean that
`
`someone or something such as a network administrator necessarily assigned the
`
`
`
`2
`
`

`

`access code to the user. Consequently, limitation [k] does not require any specific
`
`entity to access the first-ISE, but rather explains that the access control codes are
`
`merely associated with a plurality of AUICs.
`
`
`
`In sum, Patent Owner’s attempt to narrow the claim scope violates the BRI
`
`standard. Patent Owner should not be permitted to now rewrite its claims to avoid
`
`the prior art. The claims at issue require nothing more than the passive
`
`“association” being claimed. Furthermore, the POR improperly interprets that
`
`access codes associated with AUICs necessarily means access codes that are
`
`assigned to the AUICs. As discussed below, even under Patent Owner’s
`
`unreasonably narrow reading of its own claims, the prior art still invalidates the
`
`challenged claims.
`
`II. Claims 1, 3–6, 8, 11, 12, and 16–20 Are Anticipated by Fast
`
`Patent Owner argues that Fast does not anticipate claims 1, 3–6, 8, 11, 12,
`
`and 16–20 because limitations [k], [l], and [m] are allegedly absent in Fast. These
`
`three limitations appear in independent claims 1 and 19. The following explains
`
`how Fast discloses limitations [k], [l], and [m].
`
`A. Fast discloses limitation [k]
`
`
`Limitation [k], as it appears in claim 1, states:
`
`wherein access to said first information sharing environment is
`controlled under the first level of access control based on access
`
`
`
`3
`
`

`

`control codes associated with the plurality of authorized user
`identification codes[.]
`
`
`(Ex. 1001, claim 1) (emphasis added). Limitation [k] is directed to the first-ISE
`
`access being controlled based on access control codes. In addition, these access
`
`control codes are associated with the plurality of authorized user identification
`
`codes. Patent Owner misreads limitation [k] by asserting that access to the first-
`
`ISE is based on an “authorized user identification code” instead of the “access
`
`control codes.” (POR, p. 18). Specifically, Patent Owner argues that “[t]he first
`
`level access control code is an ‘authorized user identification code’ (AUIC).” (Id.,
`
`p.4). Under BRI, an access control code is not necessarily the same as an AUIC.
`
`Patent Owner’s arguments are therefore built on top of a flawed premise.
`
`
`
`As the Petition demonstrates, Fast discloses this specific limitation in two
`
`ways: (1) the first-ISE is a subscriber-level ISE; and (2) the first-ISE is a
`
`wholesaler-level ISE (or Retail-level ISE). (Petition, pp.18-19). These two ways
`
`are briefly discussed below.
`
`Subscriber-level ISE – The Petition demonstrates how a subscriber is a
`
`network administrator that authorizes different users such as guardians or GMMS
`
`operators to manage aspects of the subscriber’s functionality. (Petition, pp.18-21;
`
`Ex. 1010, ¶¶44-47; Ex. 1003, 42:48-50). The POR is silent with respect to this
`
`
`
`4
`
`

`

`analysis. The following shows how Fast discloses limitation [k] where a
`
`subscriber serves as the network administrator.
`
`Fast discloses that access to said first ISE (e.g., subscriber’s environment) is
`
`controlled under the first level of access control (e.g., the subscriber’s user type)
`
`based on access control codes (e.g., the subscriber’s ID or password) associated
`
`with the plurality of authorized user identification codes (e.g., Guardian IDs). As
`
`explained in the Petition, “The subscriber may assign a user with an access level
`
`equivalent to the subscriber, or may restrict access to certain features, such as in
`
`the case of guardians. (Ex. 1010, ¶¶48, 98).” (Petition, p.27; see also id., p.33).
`
`In Fast, the subscriber’s login User ID/password is associated with the
`
`authorized Guardian’s ID because a subscriber must log into the subscriber portal
`
`using his User ID/password (Ex. 1003, FIG. 16-1, item 504) before the subscriber
`
`can manage and assign guardians (id., FIG. 16-2, items 526 and 527). Here, Fast
`
`uses a “guardian manager” to allow a subscriber to create “an unlimited number of
`
`guardians” and assign them user IDs such as phone numbers, email addresses,
`
`etc.). (Id., 20:57-62). Thus, a subscriber ID/password is associated with Guardian
`
`IDs of the guardians created by the subscriber.
`
`Even applying Patent Owner’s attempt to unreasonably restrict the scope of
`
`its claims in violation of BRI, Fast still anticipates. As discussed, Patent Owner
`
`narrowly reads limitation [k] to require controlling an authorized user’s access to
`
`
`
`5
`
`

`

`the first-ISE based on AUICs. Fast discloses this by allowing subscribers (e.g.,
`
`administrators) to assign (not just associate) guardians to the subscriber portal’s
`
`functionality. (Ex. 1010, ¶48; Ex. 1003, 42:48-52, 43:1-11, FIG. 16-2). Fast’s
`
`Guardian’s ID teaches the claimed first level access control code and the AUIC by
`
`implementing Patent Owner’s suggestion that “[t]he first level access control code
`
`is an ‘authorized user identification code’ (AUIC).” (POR, p.4).
`
`Wholesaler-level ISE – Wholesalers function as network administrators
`
`who control a first ISE, namely, the wholesale-level ISE. (See Ex. 1003, FIG. 22).
`
`Wholesalers create and manage subscriber accounts within the first ISE. (Id., FIG.
`
`14, items 414 and 416 showing a wholesaler portal to manage subscriber accounts
`
`and add/delete subscribers). As discussed in the Petition and Institution Decision,
`
`these subscriber accounts make up different event-ISEs that are configured within
`
`the first ISE (e.g., wholesale level ISE). (Petition, p.26; Institution Decision,
`
`pp.23-24; see also Ex. 1003, FIG. 22).
`
`
`
`Turning to limitation [k], Fast teaches that access to the first-ISE (e.g.,
`
`wholesaler environment) is controlled under the first level of access control (e.g.,
`
`the wholesaler’s user type) based on access control codes (e.g., the IDs or
`
`password associated with the wholesaler user type). (Petition, p.30; Institution
`
`Decision, p.28; Ex. 1003, FIG. 14-1, items 405a-c). In other words, a wholesaler
`
`gains access via the portal of FIG. 14 based on submitting an ID or password. (Ex.
`
`
`
`6
`
`

`

`1003, FIG. 14-1). The IDs or passwords of the wholesalers are the claimed “access
`
`control codes.” Petitioner notes that limitation [k] does not specify a particular
`
`entity (administrator or authorized user) who accesses the first-ISE, but instead,
`
`states only that such access is controlled by access control codes.
`
`
`
`Fast also teaches that the wholesaler’s access control codes are associated
`
`with the plurality of AUICs, such as subscriber ID codes (Ex. 1010, ¶126 stating
`
`“This access control code is associated with the plurality of subscriber User IDs
`
`(‘authorized user identification codes’), among other User IDs.”). First, in FIG. 22
`
`of Fast, each subscriber corresponds to a respective wholesaler, demonstrating that
`
`the two IDs are associated. (Ex. 1003, FIG. 22). Second, through the wholesaler
`
`portal of FIG. 14, wholesalers provide access control codes (e.g., user ID,
`
`password) so that they can update a subscriber or access the subscriber’s portal.
`
`(Id., 38:46-54). Again, this shows an association between the wholesaler’s
`
`ID/password and the subscriber’s ID. Third, Dr. Schonfeld explains that such
`
`tiered relationships may be stored as “hierarchical information structures [that]
`
`may be organized in a dynamic nested tree structure[.]” (Schonfeld Decl., filed as
`
`Ex. 2011, ¶22). This shows a relationship encoded as a data structure. These three
`
`reasons show a direct association between the wholesalers’ access control codes
`
`(e.g., user ID, password) and the subscriber IDs of the authorized subscribers.
`
`Patent Owner counters by arguing that:
`
`7
`
`
`
`
`
`

`

`If Petitioners were to argue instead that the AUIC are the IDs or
`
`password associated with the subscribers, then this argument also
`
`fails. As explained above, in Fast, the authorized access is determined
`
`by a predefined user type, not a user-specific code. All of the
`
`subscribers in Fast are treated the same based on the user type.
`
`(POR, p.19). To clarify, Petitioner equates access control codes to a wholesaler’s
`
`user ID/password and equates the AUIC to the subscriber’s ID. As discussed
`
`above, the wholesaler’s user ID/password and the subscriber’s ID are associated
`
`when wholesalers log into their own portal (FIG. 14) to then manage subscribers
`
`using their subscriber IDs.
`
`
`
`Patent Owner also incorrectly concludes that “[a]ll of the subscribers in Fast
`
`are treated the same based on the user type.” Patent Owner confuses “user types”
`
`with specific users. Using the portal of FIG. 14, a wholesaler can create any
`
`number of subscribers under the wholesaler’s account. (Ex. 1003, FIG. 22, FIG.
`
`14-2, item 416; id., 38:46-54). Even though all subscribers have the same “user
`
`type,” each subscriber will be assigned different levels of access such that each
`
`subscriber can access his own account but not the account of other subscribers.
`
`(See Ex. 1010, ¶¶45-47; Ex. 1003, 18:25-37). Because each subscriber has access
`
`to only his own account, each subscriber is uniquely defined and protected.
`
`
`
`8
`
`

`

`
`
`Ultimately, Fast’s disclosure is the same, if not more detailed, than the
`
`disclosure than the ’499 Patent, as it relates to limitation [k] (as well as other
`
`limitations). For example, the ’499 Patent states:
`
`In one embodiment, one or more administrators may be given
`
`privileges to configure the information-sharing environment. Such
`
`configuration could include specifying authorized users of the
`
`environment and their access privileges, etc.
`
`(Ex. 1001, 5:39-42). No additional details are provided beyond this with respect to
`
`limitation [k]. As discussed, Fast explains how wholesalers are administrators that
`
`create and authorize subscribers to access their own subscriber accounts. (Ex.
`
`1003, FIG. 14-2, item 416). Fast also explains how subscribers are administrators
`
`who authorize guardians by creating/managing them (Id., FIG. 16-2, items 526,
`
`527, and 534). Assuming that a POSITA understands that the ’499 Patent’s
`
`specification supports the limitation in question, then the POSITA would also
`
`understand that Fast discloses the very same limitation because, at a minimum,
`
`Fast mirrors the relevant portions of the specification. For these reasons, Fast
`
`discloses limitation [k] regardless of how narrowly the claims are construed.
`
`B. Fast discloses limitation [l]
`
`Limitation [l], as it appears in claim 1, states:
`
`wherein access to said event information sharing environments is
`controlled under the second level of access control to access the
`plurality of specified event conditions independent of each other
`
`9
`
`
`
`
`
`

`

`based on a corresponding plurality of event information access codes
`that are associated with the plurality of authorized user identification
`codes
`
`
`
`Fast discloses this limitation by teaching how subscribers (or guardians
`
`authorized by the subscriber) build “scenarios” and select “notification schemes”
`
`to notify suitable entities when a scenario is triggered. (See Petition, pp.31-32). In
`
`response, Patent Owner argues that “the authorized user has to be someone with
`
`the capability to access and configure the E-ISE, not merely the recipients of a
`
`notification scheme.” (POR, p.20).
`
`Patent Owner’s argument overlooks the fact the recipients of the notification
`
`scheme are not arbitrary recipients, but instead the “subscriber” and any guardian
`
`authorized by the subscriber. (Ex. 1003, 35:49-50 stating “Suitable entities may
`
`include the database, the incident queue, a subscriber, a guardian . . .” (emphasis
`
`added)). As discussed above, when the administrator is a wholesaler, the
`
`authorized user is a subscriber. And, when the administrator is a subscriber, the
`
`authorized user is a guardian.
`
`Next, Fast teaches an event-ISE by describing a level of control for
`
`subscribers based on the subscriber user type. (See Petition, p.31). When a
`
`wholesaler (e.g., network administrator) creates a subscriber, which has a
`
`subscriber user type, the wholesaler grants that user the right to access the scenario
`
`manager and create event-based scenarios. For example, when a subscriber logs
`
`
`
`10
`
`

`

`into the subscriber portal of FIG. 16-1, Fast explains that the system “determine[s]
`
`level of authorized access based on User type” (Ex. 1003, FIG. 16-1, item 512),
`
`and assuming the subscriber has a certain level of authorized access, the subscriber
`
`may build scenarios (Id., FIG. 16-2, items 518 and 520).
`
`In response, Patent Owner argues that “[t]he subscriber user type, on the
`
`other hand, is a predefined user type that is not specified by the user.” (POR,
`
`pp.20-21). Patent Owner’s argument misses the mark. While the subscriber user
`
`type is associated with certain levels of access, it is up to the wholesaler whether to
`
`create a user with that particular user type. (Ex. 1003, FIG. 14-2, item 416). To
`
`elaborate further, an individual person may be given any user type (e.g., subscriber,
`
`guardian, Organization Manager, operator, administrator, reseller, etc.), each user
`
`type having its own level of authorized access. (Id., FIG. 14-1, items 408 and 409;
`
`id., FIG. 16-1, items 512 and 514). Thus, when a wholesaler wants to make a
`
`particular individual a subscriber (e.g., a person having a subscriber user type), the
`
`wholesaler creates a subscriber (as opposed to creating a user with a different user
`
`type). The wholesaler can make a person a subscriber (id., FIG. 14-2, item 416) or
`
`can make a person some other system user (id., item 412). Contrary to Patent
`
`Owner’s characterization of Fast, Fast permits numerous user types creating “a
`
`flexible relationship to enhance the ease in the system operation.” (Ex. 1003,
`
`Abstract).
`
`
`
`11
`
`

`

` Lastly, the Petition explains how Fast teaches an event-ISE by describing a
`
`notification scheme number. (Petition, p.32). In response, Patent Owner argues:
`
`But this argument also fails because the notification scheme name is
`
`merely a shorthand for the event itself. It has nothing to do with
`
`whether the event has occurred, and it certainly is not used to control
`
`whether a subscriber can access this information
`
`(POR, p.21). Patent Owner is wrong. Patent Owner confuses a scenario
`
`with a notification scheme.
`
`
`
`When building a scenario in Fast (shown in FIGS. 11-1 and 11-2), the user
`
`selects a notification scheme to be part of the scenario. (Ex. 1003, FIG. 11-1, item
`
`278 “select a notification scheme”). The notification scheme number is not a
`
`shorthand for the event, but rather a shorthand for those entities who will be
`
`notified in response to the occurrence of an event. (Id., 36:36-38 stating “The
`
`notification scheme 276 (see also 276 in FIG. 11) specifies what messages are sent
`
`to what entities using what notification methods.”). Contrary to Patent Owner’s
`
`contention, when the notification scheme identifies the subscriber as a recipient
`
`(id., 35:49-50), the notification scheme number is used to control whether a
`
`subscriber can access location information.
`
`For these reasons, Fast discloses limitation [l].
`
`C. Fast discloses limitation [m]
`
`
`Limitation [m], as it appears in claim 1, states:
`
`
`
`12
`
`

`

`an administrator system in communication with said one or
`
`more computer servers adapted to configure a corresponding
`
`plurality of access privileges for the plurality of authorized
`
`users that specify the specified event conditions based on the
`
`plurality of event information access codes, wherein
`
`conveyance of the plurality of event information is managed
`
`based on the plurality of access privileges.
`
`
`
`Fast discloses an administrator system by describing a device that presents
`
`the “subscriber portal.” (See Petition, p.32). The subscriber portal is accessible to
`
`both wholesalers (See Ex. 1003, FIG. 14-1, item 418 “access subscriber portal”), as
`
`well the subscriber/subscriber’s guardians (id., FIGS. 16-1 and 16-2). Fast
`
`discloses “authorized users” by describing the creation, control, and management
`
`of “guardians.” (See Petition, p.19; Ex. 1003, 42:48-52, FIG. 16-2, item 534; Ex.
`
`1010, ¶¶48, 98). Fast also teaches a Guardian Manager. A subscriber can make a
`
`guardian an authorized user who may manage the subscriber’s scenarios (Ex. 1003,
`
`43:1-11; see also id., FIG. 16-1, items 512 and 514 showing a guardian user type
`
`having access to the scenario manager in FIG. 16-2, item 518; Ex. 1010, ¶149).
`
`Moreover, Patent Owner utterly ignores Petitioner’s analysis which mapped
`
`the claimed “authorized user” to a guardian. For that reason alone, the POR fails
`
`to rebut the Petitioner’s showing that Fast discloses limitation [m].
`
`
`
`13
`
`

`

`Instead, Patent Owner focuses solely on “subscribers” by arguing that “in
`
`Fast, all of the subscribers are treated the same based on the user type. Therefore, it
`
`is not possible to authorize a subset of the subscribers.” (POR, pp.21-22). That is
`
`also incorrect. Dr. Heppe’s exemplary configuration (Ex. 1010, ¶¶45-46) shows
`
`how a first subscriber of account A1 can create scenarios for dependents “Alex”
`
`and “Amy” but cannot create scenarios for dependents “Bob” and “Beth” who are
`
`associated with a different subscriber’s account, B1. In addition, Fast explains that
`
`“The portal is accessible via the Internet and is restricted, using password
`
`protection, to users that are authorized by the system administrators.” (Ex. 1003,
`
`16:9-11). Therefore, a first subscriber cannot log into a second subscriber’s
`
`account and create scenarios to track the second subscriber’s dependents.
`
`Therefore, each subscriber has unique privileges to manage only his own account,
`
`where such privileges are defined when a Wholesaler creates a subscriber. (See
`
`id., FIG. 14-2, item 416). For these reasons, Fast discloses limitation [m].
`
`III. Claims 1, 3–6, 8, 11, 12, and 16–20 Are Rendered Obvious by Fast
`and Zou
`
`A. The allegedly patentable distinctions over Fast are obvious in view of
`Zou
`
`14
`
`
`
`
`
`
`
`

`

`Patent Owner falsely asserts that Fast is not anticipatory because it uses a
`
`“predetermined hierarchical structure” that does not meet the limitations of [k], [l],
`
`and [m].
`
`Attempting to distinguish Fast from these three limitations, Patent Owner
`
`further asserts that “there are no access codes for authorizing some of the
`
`subscribers to configure ISEs[]” (POR, p.17), and that one cannot authorize “Fast’s
`
`subscribers to access and configure the ISEs, as recited in the challenged claims.”
`
`(Id., p.18). Setting aside the fact that Patent Owner is wrong about Fast’s
`
`teachings, these concepts are obvious in view of Zou.
`
`Zou describes creating a first ISE (e.g., location sharing of multiple fleets) to
`
`configure a plurality of event ISEs (e.g., geofence alerts for a specific
`
`fleets/vehicles). (Petition, p.48). Zou describes a flexible hierarchy of users
`
`having different privileges to:
`
`- “Add/edit Fleets” which adds new fleets (expanding the first ISE)
`
`- “Add users to Fleets” which authorizes new users for one or more fleets
`
`- “Edit Permissions” which allows a user to set authority levels for the
`
`users who can view the fleet group
`
`(Ex. 1005, ¶0192). Zou explains that a user’s permissions are encoded into a user
`
`profile. (Id., ¶0152 explaining how a user profile may not allow the user access to
`
`a particular feature; see also id., ¶0211). Users having higher administrator
`
`
`
`15
`
`

`

`privileges can edit the profiles of other users. (Id., ¶0192). Dr. Heppe explains that
`
`the data stored in Zou’s profiles equates to “access control codes” (Ex. 1010,
`
`¶123), because Zou’s users are authorized to gain access to certain functionality
`
`based on a user ID. (Ex. 1005, ¶0193). When users are created, they are assigned a
`
`user ID such as a “user name,” “first name,” “last name,” “email address.” (See id.,
`
`FIG. 18b). For these reasons and the reasons stated in the Petition, Zou discloses
`
`limitations [k], [l], and [m].
`
`Patent Owner incorrectly suggests that Zou does not teach (1) an AUIC and
`
`(2) an EIAC. As an initial matter, the POR confuses “AUIC” with “access code.”
`
`(POR, p.23). Echoing the same infirmity, Dr. Schonfeld concludes that:
`
`there is no teaching or suggestion in Zou of an authorized user
`
`identification code. To the contrary, it appears that any ‘permissions’
`
`in Zou are pre-defined, and not user-specific.
`
`(Schonfeld Decl., ¶25). Dr. Schonfeld’s opinion that Zou’s “permissions” are not
`
`“user-specific” flatly contradicts Zou’s teachings that one user can “edit
`
`permission profiles for existing users.” (Ex. 1005, ¶0192). In addition, Petitioner
`
`cites to Zou’s user ID (id., FIG. 18b) as the authorized user identification code
`
`(AUIC), not Zou’s permissions. Zou’s user ID is associated with, but different
`
`from, the authority levels stored in a user’s permission profile. (See Petition, p.50).
`
`Patent Owner provides no response to this argument.
`
`
`
`16
`
`

`

`Patent Owner argues that while “the ability to create geofences may be
`
`relevant to the ‘second level of administrator privilege’ in limitation 1(f), it does
`
`not teach the EIAC claimed in limitations 1(l) and 1(m).” (POR, p.24). Patent
`
`Owner misconstrues Petitioner’s invalidity argument by conflating the second level
`
`of administrator privilege with access to geofence functionality.
`
`Zou teaches at least two levels of administrator privileges: those users who
`
`can edit other users (e.g., creating users or editing their profiles) and those users
`
`who cannot. (See Ex. 1005, ¶0192). As discussed in the Petition, Zou describes a
`
`fleet manager (first level) who creates and sets privileges for other users (second
`
`level). (Petition, p.47). Some of these created users have access to geofence
`
`functionality, while others do not. (Ex. 1005, ¶0205 stating “The exemplary
`
`telemetry system allows the user to create and view current GeoFences; however,
`
`the user's user profile may not allow the user to create GeoFences.”). In this
`
`respect, Zou’s disclosure of how some users at the second level are given access to
`
`geofence functionality teaches the EIAC claimed in limitations [l] and [m]. This
`
`teaching is additive to Zou’s disclosure of a Fleet Manager who also creates users
`
`(e.g., a flexible hierarchical structure).
`
`For these reasons, Zou combined with Fast renders the challenged claims
`
`obvious.
`
`B. A POSITA would be motivated to combine Fast and Zou
`
`
`
`
`
`17
`
`

`

`Fast’s system may be optimized for fleet tracking applications by using the
`
`teachings of Zou. (See Petition, p.43). In opposition, Patent Owner relies on Dr.
`
`Schonfeld, who testifies that a POSITA would not have been motivated or even
`
`able to combine these systems, due to their fundamentally different ways of
`
`arranging and conveying information. (POR, p.25 citing Schonfeld Decl., ¶¶23-
`
`24). Dr. Schonfeld does not draw any conclusion of non-obviousness but rather
`
`limits his opinion on whether a POSITA would be motivated to physically
`
`combine Fast with Zou. Specifically, Dr. Schonfeld’s analysis focused on the
`
`degree of difficulty of adding software code that implements “simple lists” to the
`
`software code of Fast. (Schonfeld Decl., ¶23). He concluded that it would require
`
`completely re-writing Fast’s software code. (Id.). For the following reasons, Dr.
`
`Schonfeld’s opinions should be given no weight.
`
`First, his opinions are irrelevant when considering a correct obviousness
`
`analysis. A correct obviousness analysis focuses on whether a POSITA would
`
`have sufficient motivation to combine different teachings to arrive at the claimed
`
`invention. See In re Kahn, 441 F.3d 977, 987-88 (Fed. Cir. 2006). However, “[i]t
`
`is well-established that a determination of obviousness based on teachings from
`
`multiple references does not require an actual, physical substitution of elements.”
`
`In Re Blaise Laurent Mouttet, No. 2011-1451, at *15 (Fed. Cir. June 26, 2012)
`
`(emphasis added); see also CaptionCall, LLC v. Ultratec Inc., IPR2013-00545,
`
`
`
`18
`
`

`

`paper 67, pp.7-8 (PTAB, December 1, 2015); see also In re Etter, 756 F.2d 852,
`
`859 (Fed. Cir. 1985) (en banc) (“Etter’s assertions that Azure cannot be
`
`incorporated in Ambrosio are basically irrelevant, the criterion being not whether
`
`the references could be physically combined but whether the claimed inventions
`
`are rendered obvious by the teachings of the prior art as a whole.”).
`
`Here, Dr. Schonfeld testified that physically combining the two systems
`
`“would necessitate a complete rewriting of the system’s software.” (Schonfeld
`
`Decl., ¶23). This analysis is irrelevant to the issue-at-hand, to wit, combining the
`
`location sharing concepts taught in Fast and Zou. If anything, Dr. Schonfeld’s
`
`testimony suggests that the two references can be combined when starting from
`
`scratch. (Id., ¶24). Certainly, their relevant teachings are not incompatible,
`
`structurally or otherwise.
`
`Second, Dr. Schonfeld’s opinion that Fast is “a predefined hierarchical
`
`system” contradicts the intrinsic record as well as Dr. Heppe’s analysis of flexible
`
`subscriber accounts (Ex. 1010, ¶30). Fast explains that a subscriber has the
`
`flexibility to create different users and user relationships using the subscriber’s
`
`portal.

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket