`Filed: January 17, 2017
`
`
`
`UNITED STATES PATENT AND TRADEMARK OFFICE
`_____________________________
`
`
`
`BEFORE THE PATENT TRIAL AND APPEAL BOARD
`
`_____________________________
`
`
`
`SECURENET TECHNOLOGIES, LLC,
`Petitioner,
`
`v.
`
`ICONTROL NETWORKS, INC.,
`Patent Owner.
`
`_____________________________
`
`Case IPR2016-01919
`Patent No. 8,473,619
`
`_____________________________
`
`
`
`PATENT OWNER’S PRELIMINARY RESPONSE
`PURSUANT TO 37 C.F.R. § 42.107
`
`
`
`TABLE OF CONTENTS
`
`I.
`
`II.
`
`STATEMENT OF PRECISE RELIEF REQUESTED .................................. 1
`
`INTRODUCTION ........................................................................................ 1
`
`III. THE ’619 PATENT ...................................................................................... 3
`
`IV. CLAIM CONSTRUCTION .......................................................................... 8
`
`V. GROUND 1 SHOULD NOT BE INSTITUTED ........................................... 9
`
`A.
`
`B.
`
`C.
`
`2.
`
`Claim 1 is not obvious ........................................................................ 9
`1.
`Neither Wimsatt nor Severson discloses “automatically
`discovering the security system components” .......................... 9
`Johnson does not disclose the limitation “maintains
`objects at the security server using the processed data,
`wherein the objects correspond to the security system
`components and the plurality of network devices” ..................16
`3. Mere reference to a processor does not disclose
`“generat[ing] processed data by processing at the
`gateway the security data, the device data, and the remote
`data” .......................................................................................20
`The petition fails to demonstrate that Wimsatt’s system
`would be modified to include a remote server .........................22
`Dependent claims 2-9, 12-16, 19, 23-28, 32, 34, 42-47, 54-57,
`59, and 62 are not obvious ................................................................ 26
`1.
`Claim 15 .................................................................................26
`2.
`Claims 43 and 44 ....................................................................27
`3.
`Claim 47 .................................................................................29
`4.
`Claim 62 .................................................................................30
`Independent claims 60 and 61 are not obvious .................................. 30
`
`4.
`
`VI. SECONDARY CONSIDERATIONS ......................................................... 30
`
`VII. CONCLUSION .......................................................................................... 31
`
`-i-
`
`
`
`I.
`
`STATEMENT OF PRECISE RELIEF REQUESTED
`
`Petitioner SecureNet Technologies, LLC (“Petitioner”) filed a petition
`
`(“Pet.,” PN 1) for inter partes review (“IPR”) of claims 1-9, 12-16, 19, 23-28, 32,
`
`34, 42-47, 54-57, and 59-62 of U.S. Patent No. 8,473,619 (“’619 patent,” Ex.
`
`1001). Patent Owner Icontrol Networks, Inc. (“Icontrol”) requests that the Board
`
`deny institution because Petitioner has not met its burden of showing it has a
`
`reasonable likelihood of prevailing on at least one claim with respect to any of its
`
`proposed grounds of patentability.
`
`II.
`
`INTRODUCTION
`
`Petitioner’s reliance on U.S. Patent Pub. No. 2004/0260427 (“Wimsatt,” Ex.
`
`1004) suffers from a fundamental problem: Wimsatt is a locally distributed system
`
`with many control panels and many devices and subsystems that are arranged in a
`
`manner completely different from that of the ’619 patent, which claims an
`
`integrated system with a gateway that communicates with security components,
`
`network devices and a server. Compare Ex. 1004 Fig. 1 with Ex. 1001 cl. 1. This
`
`basic disconnect between Wimsatt and the ’619 patent claims results in a ripple
`
`effect of problems with the petition throughout, causing Petitioner to mismatch
`
`Wimsatt’s inadequate disclosures with the ’619 patent’s claim elements. Further
`
`compounding these problems is Petitioner’s reliance on U.S. Patent No. 6,580,950
`
`(“Johnson,” Ex. 1005), a reference that teaches a system that is incompatible with
`
`-1-
`
`
`
`
`and taught away by Wimsatt, and on U.S. Patent No. 4,951,029 (“Severson,” Ex.
`
`1006), which is a primitive security system that lacks any of the claimed features
`
`of the ’619 patent. Indeed, any one of the following problems prevents the Board
`
`from instituting IPR as to the challenged claims of the ’619 patent:
`
`First, the combination of Wimsatt, Severson, and Johnson does not teach
`
`automatically discovering components of a security system. See infra Section
`
`V.A.1. Petitioner conflates the difference between discovering a system versus
`
`discovering that system’s components, and improperly relies on prior art disclosure
`
`of interrogation (not discovery) that occurs after components have been manually
`
`coupled and programmed. See id.
`
`Second, the proposed combination of Wimsatt, Severson, and Johnson does
`
`not maintain objects at a security server. See infra Section V.A.2. Petitioner’s
`
`reliance on Johnson’s “icons” for this point is unexplained and unsupported by the
`
`reference, which does not disclose the purpose of the icons let alone disclose any
`
`corresponding aspect of the data structure in Johnson’s server that would be
`
`relevant to the ’619 patent claims. See id.
`
`Third, the petition fails to demonstrate that the proposed combination of
`
`Wimsatt, Severson, and Johnson generates processed data in the manner claimed
`
`by the ’619 patent. See infra Section V.A.3. Merely stating that a “processor” is
`
`disclosed does not satisfy Petitioner’s burden to explain whether and how the
`
`-2-
`
`
`
`
`processed data recited in claim 1 is generated and subsequently used as claimed.
`
`See id.
`
`Fourth, the petition fails to demonstrate that it would have been obvious to
`
`modify Wimsatt to include the remote server discussed in Johnson. Wimsatt
`
`teaches away from the use of servers, and Johnson is incompatible with Wimsatt.
`
`See infra Section V.A.4.
`
`Given the numerous above deficiencies with the Petition, none of the
`
`Grounds should be instituted.
`
`III. THE ’619 PATENT
`
`The ’619 patent, entitled “Security Network Integrated with Premise
`
`Security System,” describes “an integrated security system . . . that integrates
`
`broadband and mobile access and control with conventional security systems and
`
`premise devices.” See Ex. 1001 Title, Abstract. “The integrated security system
`
`provides a complete system that integrates or layers on top of a conventional host
`
`security system” and is not limited to integration with any particular security
`
`system. See id. 5:19-21, 15:65-16:3. As demonstrated by one embodiment
`
`displayed in Fig. 1, the integrated security system 100 includes a single gateway
`
`102 that is coupled to conventional home security system 110. See id. 6:54-57.
`
`-3-
`
`
`
`
`Ex. 1001 Fig. 1 (annotated)
`
`
`
`The ’619 patent specification explains that “gateway 102 connects and
`
`manages the diverse variety of home security and self-monitoring devices.” Id.
`
`6:57-59. Specifically, the gateway “couples or connects the various third-party
`
`cameras, home security panels, sensors and devices . . . .” Id. 11:48-53.
`
`Exemplary methods of automatically establishing a wireless coupling between the
`
`gateway and the security system components are found at Figs. 8 and 9. See id.
`
`Figs. 8-9, 19:6-34.
`
`-4-
`
`
`
`
`Ex. 1001 Fig. 8
`
`Ex. 1001 Fig. 9
`As is apparent from steps 806 and 904, the gateway automatically discovers and
`
`couples to the conventional security system’s components. See id. Figs. 8-9; see
`
`also id. 25:55-58.
`
`Step 902 also indicates that local gateway 102 is further coupled to security
`
`servers 104 via multiple communication channels. See id. Fig. 9, 6:54-57, 6:59-64.
`
`One of the functions of the gateway is to manage server communication and to
`
`implement a main event loop to process events and control messages. See id.
`
`23:51-24:3. The gateway also transfers data and information between components
`
`in the local area network and wide area network, such as to the servers. See id.
`
`Figs. 5-6, 14:36-40, 14:64-67.
`
`“These servers 104 manage the system integrations necessary to deliver the
`
`integrated system service . . . .” Id. 6:64-66. “The server components provide
`
`access to, and management of, the objects associated with an integrated security
`
`system installation,” such as “sensors, cameras, home security panels and
`
`-5-
`
`
`
`
`automation devices, as well as the controller or processor-based device running the
`
`gateway applications.” See id. 8:29-41. Business components at servers 104 “are
`
`responsible for orchestrating all of the low-level service management activities for
`
`the integrated security system service. They define all of the users and devices
`
`associated with a network (site), analyze how the devices interact, and trigger
`
`associated actions (such as sending notifications to users). All changes in device
`
`states are monitored and logged.” See id. 8:53-59. As shown in Fig. 2, connected
`
`to servers 104 are a service database 240 that stores information, e.g., about users,
`
`networks, and devices, relating to the managed objects, and a content store 242 that
`
`stores media objects, such as video, photos, and widget content. See id. 9:47-53.
`
`Ex. 1001 Fig. 2
`
`-6-
`
`
`
`
`
`
`The formation of an integrated security system including these and other
`
`functions is summarized in independent system claim 1, from which challenged
`
`claims 2-9, 12-16, 19, 23-28, 32, 34, 42-47, 54-57, 59, and 62 ultimately depend
`
`and which are comparable in scope to challenged claims 60 and 61:
`
`1. A system comprising:
`
`a gateway located at a first location;
`
`a connection management component coupled to the gateway and
`
`automatically establishing a wireless coupling with a security
`
`system installed at the first location, the security system
`
`including security system components, wherein the connection
`
`management component forms a security network by
`
`automatically discovering the security system components and
`
`integrating communications and functions of the security
`
`system components into the security network; and
`
`a security server at a second location different from the first location,
`
`wherein the security server is coupled to the gateway, wherein
`
`the gateway receives security data from the security system
`
`components, device data of a plurality of network devices
`
`coupled to a local network of the first location that is
`
`independent of the security network, and remote data from the
`
`security server, wherein the gateway generates processed data
`
`by processing at the gateway the security data, the device data,
`
`and the remote data, wherein the gateway determines a state
`
`change of the security system using the processed data and
`
`maintains objects at the security server using the processed
`
`-7-
`
`
`
`
`data, wherein the objects correspond to the security system
`
`components and the plurality of network devices.
`IV. CLAIM CONSTRUCTION
`
`Petitioner admits that it does not discuss how even a single limitation of the
`
`challenged claims should be interpreted by the Board. Pet. 5 (“Petitioner does not
`
`propose any claim constructions for this proceeding.”). Yet, the burden is on
`
`Petitioner to “identify . . . how the challenged claim is to be construed.” See 37
`
`C.F.R. § 42.104(b)(3).
`
`Petitioner’s failure to address its understanding of the proper construction of
`
`the challenged claims only compounds the difficulty of discerning the basis of the
`
`obviousness challenges and the liberties taken in the petition with respect to
`
`mapping the prior art to the claims. For example, Petitioner hand-waves around
`
`the mapping of the prior art’s disclosures relating to manual coupling of
`
`components to the ’619 patent claims’ express requirement that components be
`
`“automatically discover[ed].” See infra Section V.A.1. Petitioner similarly fails to
`
`construe terms necessary to understand how the prior art could possibly disclose
`
`the limitation “maintains objects at the security server . . . wherein the objects
`
`correspond to the security system components and the plurality of network devices”
`
`or “generates processed data.” See infra Sections V.A.2 and V.A.3.
`
`-8-
`
`
`
`
`In refusing to comply with its obligations to construe the challenged claims,
`
`Petitioner improperly shifts the burden of claim construction to the Board and
`
`Icontrol. The Board should not reward Petitioner for doing so.
`
`V. GROUND 1 SHOULD NOT BE INSTITUTED
`
`A. Claim 1 is not obvious
`
`1.
`
`Neither Wimsatt nor Severson discloses “automatically
`discovering the security system components”
`
`Claim 1 requires “automatically discovering the security system
`
`components.” See Ex. 1001 cl. 1, element 1[d].1 Petitioner alleges that Wimsatt
`
`meets this limitation due to its disclosure of “interrogat[ing a] device or subsystem
`
`to learn details of the control interface of that particular system.” See Pet. 13.
`
`Petitioner also alleges that Severson meets this limitation because it “explains that
`
`‘without human intervention’ ‘each system controller may be operated to ‘self-
`
`learn’ each of its sensors.’” See id. 14. Petitioner does not rely on Johnson for this
`
`limitation. See id. 13-15.
`
`As explained below, Petitioner’s assertions are incorrect.
`
`
`1 For the purposes of this preliminary response, Icontrol adopts the claim element
`
`designations used in the petition. See, e.g., Pet. 13 (identifying “[c]laim element
`
`1[d]”).
`
`-9-
`
`
`
`
`a) Wimsatt does not automatically discover a system or
`its components
`
`Petitioner admits that Wimsatt does not “disclose that its security system’s
`
`sensors are automatically discovered.” See Pet. 14. Petitioner then asserts that
`
`Wimsatt “only explicitly discloses that the ‘security system’ is discovered,” but
`
`that is not claimed. See id. Regardless, Wimsatt does not disclose either the
`
`claimed limitation of discovering components or the phantom limitation of
`
`discovering a system since Petitioner incorrectly equates Wimsatt’s disclosure of
`
`interrogation with claim 1’s requirement of automatic discovery. See Pet. 14.
`
`Automatic discovery is explained in part at Fig. 12 of the ’619 patent, which
`
`“is a flow diagram of a method of integrating an external control and management
`
`application system with an existing security system, under an embodiment.” See
`
`Ex. 1001 22:17-19, Fig. 12. As part of the process shown in Fig. 12, the gateway
`
`must (1) “locate the extant security system” in step 1220; (2) “‘learn’ the gateway
`
`into the security system” in step 1230; and (3) “discover and learn the existence
`
`and capabilities of existing RF devices within the extant security system” in step
`
`1240 before the system becomes operational. See id. 22:19-32, 22:41-44.
`
`-10-
`
`
`
`
`Ex. 1001 Fig. 12
`
`
`
`Wimsatt’s control panel does not locate or learn of the existence of a
`
`security system or its components. Instead, Wimsatt presupposes that a control
`
`panel is coupled to a subsystem during installation prior to the control panel’s
`
`interrogation of the subsystem. See Ex. 1004 ¶ 39 (“The control panel 101 couples
`
`to the subsystem interface using the physical, electrical, and signaling protocols
`
`adopted by that subsystem.”), ¶ 45 (“When a control panel 101 is coupled to a
`
`controlled device or subsystem, it interrogates that device or subsystem to learn
`
`details of the control interface of that particular system.”). In other words, instead
`
`of discovering the subsystem, Wimsatt already knows about the subsystem when it
`
`-11-
`
`
`
`
`interrogates the subsystem. See id. The interrogation disclosed by Wimsatt’s
`
`interrogation is not an automatic discovery as claimed in the ’619 patent but rather
`
`merely an inquiry regarding the applicable control interface. Id. ¶ 45.
`
`Moreover, even if Wimsatt did disclose automatic discovery of a security
`
`subsystem, this disclosure does not extend to security system components as
`
`required by the claim. Neither Petitioner nor its expert provides any explanation
`
`for the conclusory statement that “[a] POSITA would have understood that
`
`discovering the security system would also include discovering its sensors.” Pet.
`
`14; Ex. 1002 ¶ 92. Such a naked assertion should be given no weight and does not
`
`satisfy Petitioner’s burden of demonstrating a reasonable likelihood of
`
`unpatentability. See, e.g., 37 C.F.R. § 42.65 (“Expert testimony that does not
`
`disclose the underlying facts or data on which the opinion is based is entitled to
`
`little or no weight.”); Wowza Media Sys., LLC v. Adobe Sys. Inc., IPR2013-00054,
`
`Paper 16 4-5 (2013) (denying request for rehearing of institution denial and citing
`
`Active Video Networks, Inc. v. Verizon Commc’ns, Inc., 694 F.3d 1312, 1327 (Fed.
`
`Cir. 2012) (holding that “conclusory statement” in expert testimony “is fraught
`
`with hindsight bias” and should be discounted)).
`
`Wimsatt’s mention of Universal Plug-and-Play (“UPnP”) does not save
`
`Petitioner’s argument. See Pet. 14. The UPnP disclosure is limited to one line:
`
`“Universal Plug-and-Play (UPnP™) processes support common protocols and
`
`-12-
`
`
`
`
`procedures intended to enhance interoperability among network-enabled PCs,
`
`appliances, and wireless devices.” See Ex. 1004 ¶ 54. Mr. Parker’s declaration
`
`adds little more than stating that “it was well known at the time of the ’619 patent
`
`that UPnP™ was used by 2-way devices connected to a shared network.” See Ex.
`
`1002 ¶ 91. But merely stating that UPnP “was well known” does nothing to
`
`explain how UPnP would operate to fulfill the claim limitations of “automatically
`
`discovering the security system components.” In fact, the disclosure does not even
`
`state that UPnP is used by Wimsatt’s control panels. See Ex. 1004 ¶ 54.
`
`Accordingly, Wimsatt does not disclose automatically discovering a
`
`system’s components, much less the system itself (which is not claimed).
`
`b)
`
`Severson’s components must be programmed prior to
`discovery so the process is not automatic
`
`Because Wimsatt does not disclose automatic discovery of a system’s
`
`components, Petitioner relies on Severson in an attempt to save its Grounds. See
`
`Pet. 14-15. However, Severson also does not disclose “automatically discovering
`
`the security system components.”
`
`Severson discloses that each sensor must be programmed. See Ex. 1006
`
`25:3-6 (“Even further and without human intervention, once the sensors
`
`transducers are initially programmed, each system controller may be operated to
`
`‘self-learn’ each of its sensors.”) (emphasis added), 25:22-24 (“If [the controller] is
`
`in a program mode and the sensor was previously initialized, the CPU checks to
`
`-13-
`
`
`
`
`see if the sensor is either a hardwired or an RF sensor.”) (emphasis added). As a
`
`matter of fact, the programming is a lengthy and involved manual process: “In the
`
`above regard and during system initialization, the installer at his/her shop typically
`
`develops a tabular listing of each of the S/T numbers to be assigned to the various
`
`sensors and transducers to be placed about the subscriber premises. The
`
`preconditioning parameters of each sensor are also defined, if different from those
`
`normally set by the system, such as the NO/NC transducer state, restore, lockout
`
`delay or other parameters which are separately programmable for each RF sensor.
`
`The installer then separately programs each sensor with this data via the hand held
`
`programmer 11.” See id. 25:51-61.
`
`In other words, the sensors that are to be “self-learned” must already be
`
`assigned to the controller. See id. 25:3-13, 23:60-26:7. This so-called “self-
`
`learning” of sensors in Severson, which requires extensive programming and
`
`component assignment prior to its operation, differs markedly from the ’619
`
`patent’s claim limitations of “automatically discovering” components and devices.
`
`Accordingly, Severson also does not disclose claim element 1[d], and does
`
`not remedy the deficiencies of Wimsatt.
`
`c)
`
`Severson only discloses discovering its own
`components
`
`A further problem with Severson is that its security system only discovers its
`
`own components—not those of another system. See Pet. 14-15. Severson
`
`-14-
`
`
`
`
`discloses what the ’619 patent refers to as a “conventional host security system.”
`
`See Ex. 1001 Abstract. Severson does not “integrate[] or layer[] on top of a
`
`conventional host security system.” See id.; see also generally Ex. 1006. This is
`
`evident in that each sensor is coupled to a controller and that the controller self-
`
`learns “each of its sensors.” See id. 24:64-25:6.
`
`In contrast, claim 1 of the ’619 patent requires coupling a gateway to a
`
`security system and then discovering that other system’s components. See Ex.
`
`1001 cl. 1. As a result, the cited disclosure of Severson cannot fulfill claim 1’s
`
`limitation of “automatically discovering the plurality of security system
`
`components.” Nor does Petitioner explain why the claimed automatic coupling
`
`and discovery by a “connection management component coupled to the gateway”
`
`would have been obvious in view of the combination of Wimsatt and Severson. At
`
`best, the combination proposed by Petitioner would result in Wimsatt’s security
`
`subsystem automatically discovering its own components, not Wimsatt’s control
`
`panel 101 that Petitioner relies on as disclosing the claimed gateway.
`
`Moreover, Petitioner’s contention that the proposed combination would
`
`result in an “easier sensor installation process” (Pet. 15) is at odds with Wimsatt’s
`
`consistent description of its control panel network as in communication with a
`
`security system, not the underlying security system components (e.g., security
`
`sensors). See, e.g., Ex. 1004 ¶ 30 (“In one implementation, when a security system
`
`-15-
`
`
`
`
`is triggered indicating a fire, intruder, or other hazard, passive elements such as
`
`backgrounds and borders change color or flash to alert the user of the condition.”),
`
`¶ 31 (“In another example, tripping a zone on a burglar alarm . . . causes control
`
`units to display a security screen having controls that allow the alarm to be de-
`
`activated by entry of a valid code.”); see also id. ¶¶ 5, 23, 58, 62, 65. Because
`
`Wimsatt’s control panels are limited to functionality regarding the status of a
`
`security system, not to communication with or control over individual security
`
`system components, Petitioner’s proposed modification would unnecessarily
`
`complicate installation, not simplify it.
`
`Because Petitioner fails to demonstrate that the combination of Wimsatt,
`
`Severson, and Johnson discloses automatic discovery, the Board should not
`
`institute IPR on Ground 1.
`
`2.
`
`Johnson does not disclose the limitation “maintains objects
`at the security server using the processed data, wherein the
`objects correspond to the security system components and
`the plurality of network devices”
`
`Petitioner relies solely on Johnson for its alleged disclosure of claim element
`
`1[h]’s limitation of “maintains objects at the security server using the processed
`
`data, wherein the objects correspond to the security system components and the
`
`-16-
`
`
`
`
`plurality of network devices.” Pet. 26-29. Petitioner asserts that the “icons”
`
`displayed in Fig. 3 of Johnson are the claimed “objects.” Id. 28.2
`
`Petitioner’s assertion is unsupported and incorrect.
`
`a)
`
`Johnson’s icons do not correspond to security system
`components
`
`The icons do not correspond to security system components and network
`
`devices. See Ex. 1005 6:36-50. Mr. Parker’s bald opinion that a POSITA would
`
`have understood the icons to represent particular controlled devices is illogical and
`
`should be afforded no weight. See Ex. 1002 ¶ 119. In reality, Johnson does not
`
`provide description of the nature of the icons and they do not appear to directly
`
`correspond to any elements described elsewhere in the reference. For example, the
`
`icons displayed on the control page do not correspond to the control devices 40
`
`disclosed in Fig. 2 that connect to control unit 30. Compare Ex. 1005 Fig. 3 with
`
`id. Fig. 2.
`
`Likewise, the “Camera” icon does not correspond to any one camera in the
`
`security system. As demonstrated elsewhere in Johnson, there are many cameras,
`
`not just one camera, so it would be illogical for the “Camera” icon to correspond to
`
`a particular one of those cameras. Compare id. Fig. 4 (showing many different
`
`
`2 The term “icons” does not appear in Johnson and is a characterization introduced
`
`by Petitioner.
`
`-17-
`
`
`
`
`camera views) with id. Fig. 3 (showing only one “Camera” icon). To get around
`
`this, Petitioner apparently refers to Wimsatt’s IP camera 109 rather than any
`
`camera within Johnson—but does so without any cite or explanation of why that
`
`would make sense. See Pet. 28.
`
`Similarly, there is only one “Window” icon and one “Door” icon in
`
`Johnson’s Figure 3, but a house would typically comprise many windows and
`
`multiple doors so it would be illogical for these icons to “correspond . . . to the
`
`security system components and the network devices.” Compare, e.g., Ex. 1005
`
`Fig. 4 (showing multiple windows) with id. Fig. 2 (showing only one “Window”
`
`icon). Petitioner’s assertion that the “Door” icon and the “Window” icon would
`
`correspond to “a door sensor and a window sensor, respectively” is presented with
`
`no cite to Johnson, Mr. Parker, or any evidence in the record. See Pet. 28.
`
`Additionally, the other icons are labeled “Mode,” “Smoke,” “Water,”
`
`“Temp,” “Alerts,” “Lights,” and “Shopping Cart.” See Ex. 1005 Fig. 3. At least
`
`some of these are plainly not components of a security system, and Mr. Parker
`
`does not explain why a POSITA would think they are. See Ex. 1002 ¶ 119. Indeed,
`
`Johnson is devoid of any written description of the icons displayed in Fig. 3,
`
`failing even to use the term “icon.” See generally Ex. 1005. Moreover, to the
`
`extent some of the icons, such as “Mode” or “Alerts” may potentially relate to
`
`security system functions, Petitioner provides no explanation as to how they
`
`-18-
`
`
`
`
`disclose the recited server-maintained “objects,” nor does Petitioner address the
`
`role of the “Door” and “Window” icons relative to these other icons. Johnson, as
`
`well, is silent on these points.
`
`As a result, Petitioner has failed to demonstrate that Johnson discloses icons
`
`that correspond to the plurality of security system components and the network
`
`devices.
`
`b)
`
`Johnson’s icons are not maintained at the security
`server
`
`The ’619 patent explains that “server components provide access to, and
`
`management of, the objects associated with an integrated security system
`
`installation.” See Ex. 1001 8:29-31. Business components at the server “are
`
`responsible for orchestrating all of the low-level service management activities for
`
`the integrated security system service,” and “all changes in device states are
`
`monitored and logged.” See id. 8:53-55, 8:58-59. The specification also states that
`
`the business components “store information about the objects that they manage” in
`
`a service database 240 and in a content store 22, and that they manage all data
`
`storage and retrieval. See id. 9:47-55.
`
`As described above, Johnson completely lacks written description relating to
`
`the “icons” identified by Petitioner. See supra Section V.A.2.a). There is no
`
`explanation regarding where those icons are maintained or what they even
`
`represent. See id. Instead, Petitioner merely claims that a POSITA would
`
`-19-
`
`
`
`
`understand “that the data center 20 server maintains the status of each of these
`
`objects” because “it would be difficult to change a device’s settings without
`
`knowing the current status of that device.” See Pet. 29. But this leap in logic is in
`
`direct contradiction to Fig. 7 of Johnson, which shows that commands are
`
`transmitted without any prior knowledge of control devices’ status; Fig. 8, which
`
`shows that commands and requests are stored at the data center for intermittent
`
`download/upload to the control unit; and Fig. 9, which shows that the control
`
`unit—not the data center—appears to maintain control devices. See Ex. 1005 Figs.
`
`7-9, 6:22-34. Combined with Petitioner’s failure to address the meaning of this
`
`claim term, it is impossible to understand Petitioner or Mr. Parker’s basis for
`
`claiming that Johnson’s icons fulfill the claim limitation. See supra Section IV.
`
`Accordingly, Petitioner fails to meet its burden of showing that this claim
`
`limitation is met by Johnson (or any of the other references), so the Board should
`
`not institute IPR.
`
`3. Mere reference to a processor does not disclose
`“generat[ing] processed data by processing at the gateway
`the security data, the device data, and the remote data”
`
`Claim element 1[g] requires that the gateway “generates processed data by
`
`processing at the gateway the security data, the device data, and the remote data.”
`
`Petitioner points to the alleged existence of security data, device data, remote data,
`
`and a processor 201 to fulfill this limitation. See Pet. 23-25. Petitioner does not
`
`-20-
`
`
`
`
`rely on Severson or Johnson for any disclosures relating to this claim limitation.
`
`See id.
`
`This is plainly insufficient for Petitioner to meet its burden. At best,
`
`Petitioner shows that the combination fulfills the limitations of “security data,”
`
`“device data,” and “remote data.” See id. But stating that there is a processor so
`
`therefore the data must be processed is circular reasoning that fails to convey how
`
`Petitioner interprets “processed data” in the context of the ’619 patent claims, what
`
`in the cited combination discloses “processed data,” or how the security data,
`
`device data, and remote data are processed to generate the claimed processed data.
`
`See Alarm.com Inc. v. Vivint, Inc., No. IPR2015-02003, Paper No. 15 (P.T.A.B.
`
`Mar. 31, 2016) (denying institution because “it is not enough to find that a prior art
`
`device is capable of being modified to operate in the manner claimed . . . [r]ather,
`
`the asserted prior art apparatus, as disclosed, must be capable of performing the
`
`recited function, not merely that it might be modified to include such capability”)
`
`(citing Typhoon Touch Techs., Inc. v. Dell, Inc., 659 F.3d 1376, 1380 (Fed. Cir.
`
`2011)). Mr. Parker’s parroting of the petition fails to provide additional
`
`explanation of how this limitation is met. See Ex. 1002 ¶¶ 109-112. Further, as
`
`discussed above, the burden is on Petitioner to “identify . . . how the challenged
`
`claim is to be construed.” See 37 C.F.R. § 42.104(b)(3); supra Section IV.
`
`Petitioner fails to do so, making its argument unintelligible. See Pet. 23-25.
`
`-21-
`
`
`
`
`Thus, because Petitioner has failed to demonstrate that the combination of
`
`Wimsatt, Severson, and Johnson discloses that the gateway “generates processed
`
`data,” the Board should not institute IPR on Ground 1.
`
`4.
`
`The petition fails to demonstrate that Wimsatt’s system
`would be modified to include a remote server
`
`In addressing claim element 1[e], requiring “a security server at a second
`
`location different from the first location, wherein the security server is coupled to
`
`the gateway,” Petitioner contends that it would have been obvious to modify
`
`Wimsatt to communicate with a remote server in view of Johnson. Pet. 18-20.
`
`Petitioner’s argument overlooks that Wimsatt discusses problems with a server-
`
`oriented approach and provides an alternative to avoid those known shortcomings.
`
`Petitioner also fails to demonstrate that the server-based modifications it proposes
`
`would have been compatible with Wimsatt’s disclosure.
`
`a) Wimsatt teaches away from use of servers
`
`Although Petitioner is correct that Wimsatt does not disclose a remotely
`
`located security server (see Pet. 18-20), Petitioner is not correct that a POSITA
`
`would be motivated to combine Wimsatt with a reference that discloses servers.
`
`Instead, Wimsatt expressly teaches away from use of servers. See Ex. 1004 ¶ 9.
`
`It is improper to combine references where the references teach away from
`
`their combination. See In re Grasselli, 713 F.2d 731, 743 (Fed. Cir. 1983). A
`
`referen