throbber
Paper No. ___
`Filed: January 17, 2017
`
`
`
`UNITED STATES PATENT AND TRADEMARK OFFICE
`_____________________________
`
`
`
`BEFORE THE PATENT TRIAL AND APPEAL BOARD
`
`_____________________________
`
`
`
`SECURENET TECHNOLOGIES, LLC,
`Petitioner,
`
`v.
`
`ICONTROL NETWORKS, INC.,
`Patent Owner.
`
`_____________________________
`
`Case IPR2016-01919
`Patent No. 8,473,619
`
`_____________________________
`
`
`
`PATENT OWNER’S PRELIMINARY RESPONSE
`PURSUANT TO 37 C.F.R. § 42.107
`
`

`
`TABLE OF CONTENTS
`
`I.
`
`II.
`
`STATEMENT OF PRECISE RELIEF REQUESTED .................................. 1
`
`INTRODUCTION ........................................................................................ 1
`
`III. THE ’619 PATENT ...................................................................................... 3
`
`IV. CLAIM CONSTRUCTION .......................................................................... 8
`
`V. GROUND 1 SHOULD NOT BE INSTITUTED ........................................... 9
`
`A.
`
`B.
`
`C.
`
`2.
`
`Claim 1 is not obvious ........................................................................ 9
`1.
`Neither Wimsatt nor Severson discloses “automatically
`discovering the security system components” .......................... 9
`Johnson does not disclose the limitation “maintains
`objects at the security server using the processed data,
`wherein the objects correspond to the security system
`components and the plurality of network devices” ..................16
`3. Mere reference to a processor does not disclose
`“generat[ing] processed data by processing at the
`gateway the security data, the device data, and the remote
`data” .......................................................................................20
`The petition fails to demonstrate that Wimsatt’s system
`would be modified to include a remote server .........................22
`Dependent claims 2-9, 12-16, 19, 23-28, 32, 34, 42-47, 54-57,
`59, and 62 are not obvious ................................................................ 26
`1.
`Claim 15 .................................................................................26
`2.
`Claims 43 and 44 ....................................................................27
`3.
`Claim 47 .................................................................................29
`4.
`Claim 62 .................................................................................30
`Independent claims 60 and 61 are not obvious .................................. 30
`
`4.
`
`VI. SECONDARY CONSIDERATIONS ......................................................... 30
`
`VII. CONCLUSION .......................................................................................... 31
`
`-i-
`
`

`
`I.
`
`STATEMENT OF PRECISE RELIEF REQUESTED
`
`Petitioner SecureNet Technologies, LLC (“Petitioner”) filed a petition
`
`(“Pet.,” PN 1) for inter partes review (“IPR”) of claims 1-9, 12-16, 19, 23-28, 32,
`
`34, 42-47, 54-57, and 59-62 of U.S. Patent No. 8,473,619 (“’619 patent,” Ex.
`
`1001). Patent Owner Icontrol Networks, Inc. (“Icontrol”) requests that the Board
`
`deny institution because Petitioner has not met its burden of showing it has a
`
`reasonable likelihood of prevailing on at least one claim with respect to any of its
`
`proposed grounds of patentability.
`
`II.
`
`INTRODUCTION
`
`Petitioner’s reliance on U.S. Patent Pub. No. 2004/0260427 (“Wimsatt,” Ex.
`
`1004) suffers from a fundamental problem: Wimsatt is a locally distributed system
`
`with many control panels and many devices and subsystems that are arranged in a
`
`manner completely different from that of the ’619 patent, which claims an
`
`integrated system with a gateway that communicates with security components,
`
`network devices and a server. Compare Ex. 1004 Fig. 1 with Ex. 1001 cl. 1. This
`
`basic disconnect between Wimsatt and the ’619 patent claims results in a ripple
`
`effect of problems with the petition throughout, causing Petitioner to mismatch
`
`Wimsatt’s inadequate disclosures with the ’619 patent’s claim elements. Further
`
`compounding these problems is Petitioner’s reliance on U.S. Patent No. 6,580,950
`
`(“Johnson,” Ex. 1005), a reference that teaches a system that is incompatible with
`
`-1-
`
`
`

`
`and taught away by Wimsatt, and on U.S. Patent No. 4,951,029 (“Severson,” Ex.
`
`1006), which is a primitive security system that lacks any of the claimed features
`
`of the ’619 patent. Indeed, any one of the following problems prevents the Board
`
`from instituting IPR as to the challenged claims of the ’619 patent:
`
`First, the combination of Wimsatt, Severson, and Johnson does not teach
`
`automatically discovering components of a security system. See infra Section
`
`V.A.1. Petitioner conflates the difference between discovering a system versus
`
`discovering that system’s components, and improperly relies on prior art disclosure
`
`of interrogation (not discovery) that occurs after components have been manually
`
`coupled and programmed. See id.
`
`Second, the proposed combination of Wimsatt, Severson, and Johnson does
`
`not maintain objects at a security server. See infra Section V.A.2. Petitioner’s
`
`reliance on Johnson’s “icons” for this point is unexplained and unsupported by the
`
`reference, which does not disclose the purpose of the icons let alone disclose any
`
`corresponding aspect of the data structure in Johnson’s server that would be
`
`relevant to the ’619 patent claims. See id.
`
`Third, the petition fails to demonstrate that the proposed combination of
`
`Wimsatt, Severson, and Johnson generates processed data in the manner claimed
`
`by the ’619 patent. See infra Section V.A.3. Merely stating that a “processor” is
`
`disclosed does not satisfy Petitioner’s burden to explain whether and how the
`
`-2-
`
`
`

`
`processed data recited in claim 1 is generated and subsequently used as claimed.
`
`See id.
`
`Fourth, the petition fails to demonstrate that it would have been obvious to
`
`modify Wimsatt to include the remote server discussed in Johnson. Wimsatt
`
`teaches away from the use of servers, and Johnson is incompatible with Wimsatt.
`
`See infra Section V.A.4.
`
`Given the numerous above deficiencies with the Petition, none of the
`
`Grounds should be instituted.
`
`III. THE ’619 PATENT
`
`The ’619 patent, entitled “Security Network Integrated with Premise
`
`Security System,” describes “an integrated security system . . . that integrates
`
`broadband and mobile access and control with conventional security systems and
`
`premise devices.” See Ex. 1001 Title, Abstract. “The integrated security system
`
`provides a complete system that integrates or layers on top of a conventional host
`
`security system” and is not limited to integration with any particular security
`
`system. See id. 5:19-21, 15:65-16:3. As demonstrated by one embodiment
`
`displayed in Fig. 1, the integrated security system 100 includes a single gateway
`
`102 that is coupled to conventional home security system 110. See id. 6:54-57.
`
`-3-
`
`
`

`
`Ex. 1001 Fig. 1 (annotated)
`
`
`
`The ’619 patent specification explains that “gateway 102 connects and
`
`manages the diverse variety of home security and self-monitoring devices.” Id.
`
`6:57-59. Specifically, the gateway “couples or connects the various third-party
`
`cameras, home security panels, sensors and devices . . . .” Id. 11:48-53.
`
`Exemplary methods of automatically establishing a wireless coupling between the
`
`gateway and the security system components are found at Figs. 8 and 9. See id.
`
`Figs. 8-9, 19:6-34.
`
`-4-
`
`
`

`
`Ex. 1001 Fig. 8
`
`Ex. 1001 Fig. 9
`As is apparent from steps 806 and 904, the gateway automatically discovers and
`
`couples to the conventional security system’s components. See id. Figs. 8-9; see
`
`also id. 25:55-58.
`
`Step 902 also indicates that local gateway 102 is further coupled to security
`
`servers 104 via multiple communication channels. See id. Fig. 9, 6:54-57, 6:59-64.
`
`One of the functions of the gateway is to manage server communication and to
`
`implement a main event loop to process events and control messages. See id.
`
`23:51-24:3. The gateway also transfers data and information between components
`
`in the local area network and wide area network, such as to the servers. See id.
`
`Figs. 5-6, 14:36-40, 14:64-67.
`
`“These servers 104 manage the system integrations necessary to deliver the
`
`integrated system service . . . .” Id. 6:64-66. “The server components provide
`
`access to, and management of, the objects associated with an integrated security
`
`system installation,” such as “sensors, cameras, home security panels and
`
`-5-
`
`
`

`
`automation devices, as well as the controller or processor-based device running the
`
`gateway applications.” See id. 8:29-41. Business components at servers 104 “are
`
`responsible for orchestrating all of the low-level service management activities for
`
`the integrated security system service. They define all of the users and devices
`
`associated with a network (site), analyze how the devices interact, and trigger
`
`associated actions (such as sending notifications to users). All changes in device
`
`states are monitored and logged.” See id. 8:53-59. As shown in Fig. 2, connected
`
`to servers 104 are a service database 240 that stores information, e.g., about users,
`
`networks, and devices, relating to the managed objects, and a content store 242 that
`
`stores media objects, such as video, photos, and widget content. See id. 9:47-53.
`
`Ex. 1001 Fig. 2
`
`-6-
`
`
`
`
`

`
`The formation of an integrated security system including these and other
`
`functions is summarized in independent system claim 1, from which challenged
`
`claims 2-9, 12-16, 19, 23-28, 32, 34, 42-47, 54-57, 59, and 62 ultimately depend
`
`and which are comparable in scope to challenged claims 60 and 61:
`
`1. A system comprising:
`
`a gateway located at a first location;
`
`a connection management component coupled to the gateway and
`
`automatically establishing a wireless coupling with a security
`
`system installed at the first location, the security system
`
`including security system components, wherein the connection
`
`management component forms a security network by
`
`automatically discovering the security system components and
`
`integrating communications and functions of the security
`
`system components into the security network; and
`
`a security server at a second location different from the first location,
`
`wherein the security server is coupled to the gateway, wherein
`
`the gateway receives security data from the security system
`
`components, device data of a plurality of network devices
`
`coupled to a local network of the first location that is
`
`independent of the security network, and remote data from the
`
`security server, wherein the gateway generates processed data
`
`by processing at the gateway the security data, the device data,
`
`and the remote data, wherein the gateway determines a state
`
`change of the security system using the processed data and
`
`maintains objects at the security server using the processed
`
`-7-
`
`
`

`
`data, wherein the objects correspond to the security system
`
`components and the plurality of network devices.
`IV. CLAIM CONSTRUCTION
`
`Petitioner admits that it does not discuss how even a single limitation of the
`
`challenged claims should be interpreted by the Board. Pet. 5 (“Petitioner does not
`
`propose any claim constructions for this proceeding.”). Yet, the burden is on
`
`Petitioner to “identify . . . how the challenged claim is to be construed.” See 37
`
`C.F.R. § 42.104(b)(3).
`
`Petitioner’s failure to address its understanding of the proper construction of
`
`the challenged claims only compounds the difficulty of discerning the basis of the
`
`obviousness challenges and the liberties taken in the petition with respect to
`
`mapping the prior art to the claims. For example, Petitioner hand-waves around
`
`the mapping of the prior art’s disclosures relating to manual coupling of
`
`components to the ’619 patent claims’ express requirement that components be
`
`“automatically discover[ed].” See infra Section V.A.1. Petitioner similarly fails to
`
`construe terms necessary to understand how the prior art could possibly disclose
`
`the limitation “maintains objects at the security server . . . wherein the objects
`
`correspond to the security system components and the plurality of network devices”
`
`or “generates processed data.” See infra Sections V.A.2 and V.A.3.
`
`-8-
`
`
`

`
`In refusing to comply with its obligations to construe the challenged claims,
`
`Petitioner improperly shifts the burden of claim construction to the Board and
`
`Icontrol. The Board should not reward Petitioner for doing so.
`
`V. GROUND 1 SHOULD NOT BE INSTITUTED
`
`A. Claim 1 is not obvious
`
`1.
`
`Neither Wimsatt nor Severson discloses “automatically
`discovering the security system components”
`
`Claim 1 requires “automatically discovering the security system
`
`components.” See Ex. 1001 cl. 1, element 1[d].1 Petitioner alleges that Wimsatt
`
`meets this limitation due to its disclosure of “interrogat[ing a] device or subsystem
`
`to learn details of the control interface of that particular system.” See Pet. 13.
`
`Petitioner also alleges that Severson meets this limitation because it “explains that
`
`‘without human intervention’ ‘each system controller may be operated to ‘self-
`
`learn’ each of its sensors.’” See id. 14. Petitioner does not rely on Johnson for this
`
`limitation. See id. 13-15.
`
`As explained below, Petitioner’s assertions are incorrect.
`
`
`1 For the purposes of this preliminary response, Icontrol adopts the claim element
`
`designations used in the petition. See, e.g., Pet. 13 (identifying “[c]laim element
`
`1[d]”).
`
`-9-
`
`
`

`
`a) Wimsatt does not automatically discover a system or
`its components
`
`Petitioner admits that Wimsatt does not “disclose that its security system’s
`
`sensors are automatically discovered.” See Pet. 14. Petitioner then asserts that
`
`Wimsatt “only explicitly discloses that the ‘security system’ is discovered,” but
`
`that is not claimed. See id. Regardless, Wimsatt does not disclose either the
`
`claimed limitation of discovering components or the phantom limitation of
`
`discovering a system since Petitioner incorrectly equates Wimsatt’s disclosure of
`
`interrogation with claim 1’s requirement of automatic discovery. See Pet. 14.
`
`Automatic discovery is explained in part at Fig. 12 of the ’619 patent, which
`
`“is a flow diagram of a method of integrating an external control and management
`
`application system with an existing security system, under an embodiment.” See
`
`Ex. 1001 22:17-19, Fig. 12. As part of the process shown in Fig. 12, the gateway
`
`must (1) “locate the extant security system” in step 1220; (2) “‘learn’ the gateway
`
`into the security system” in step 1230; and (3) “discover and learn the existence
`
`and capabilities of existing RF devices within the extant security system” in step
`
`1240 before the system becomes operational. See id. 22:19-32, 22:41-44.
`
`-10-
`
`
`

`
`Ex. 1001 Fig. 12
`
`
`
`Wimsatt’s control panel does not locate or learn of the existence of a
`
`security system or its components. Instead, Wimsatt presupposes that a control
`
`panel is coupled to a subsystem during installation prior to the control panel’s
`
`interrogation of the subsystem. See Ex. 1004 ¶ 39 (“The control panel 101 couples
`
`to the subsystem interface using the physical, electrical, and signaling protocols
`
`adopted by that subsystem.”), ¶ 45 (“When a control panel 101 is coupled to a
`
`controlled device or subsystem, it interrogates that device or subsystem to learn
`
`details of the control interface of that particular system.”). In other words, instead
`
`of discovering the subsystem, Wimsatt already knows about the subsystem when it
`
`-11-
`
`
`

`
`interrogates the subsystem. See id. The interrogation disclosed by Wimsatt’s
`
`interrogation is not an automatic discovery as claimed in the ’619 patent but rather
`
`merely an inquiry regarding the applicable control interface. Id. ¶ 45.
`
`Moreover, even if Wimsatt did disclose automatic discovery of a security
`
`subsystem, this disclosure does not extend to security system components as
`
`required by the claim. Neither Petitioner nor its expert provides any explanation
`
`for the conclusory statement that “[a] POSITA would have understood that
`
`discovering the security system would also include discovering its sensors.” Pet.
`
`14; Ex. 1002 ¶ 92. Such a naked assertion should be given no weight and does not
`
`satisfy Petitioner’s burden of demonstrating a reasonable likelihood of
`
`unpatentability. See, e.g., 37 C.F.R. § 42.65 (“Expert testimony that does not
`
`disclose the underlying facts or data on which the opinion is based is entitled to
`
`little or no weight.”); Wowza Media Sys., LLC v. Adobe Sys. Inc., IPR2013-00054,
`
`Paper 16 4-5 (2013) (denying request for rehearing of institution denial and citing
`
`Active Video Networks, Inc. v. Verizon Commc’ns, Inc., 694 F.3d 1312, 1327 (Fed.
`
`Cir. 2012) (holding that “conclusory statement” in expert testimony “is fraught
`
`with hindsight bias” and should be discounted)).
`
`Wimsatt’s mention of Universal Plug-and-Play (“UPnP”) does not save
`
`Petitioner’s argument. See Pet. 14. The UPnP disclosure is limited to one line:
`
`“Universal Plug-and-Play (UPnP™) processes support common protocols and
`
`-12-
`
`
`

`
`procedures intended to enhance interoperability among network-enabled PCs,
`
`appliances, and wireless devices.” See Ex. 1004 ¶ 54. Mr. Parker’s declaration
`
`adds little more than stating that “it was well known at the time of the ’619 patent
`
`that UPnP™ was used by 2-way devices connected to a shared network.” See Ex.
`
`1002 ¶ 91. But merely stating that UPnP “was well known” does nothing to
`
`explain how UPnP would operate to fulfill the claim limitations of “automatically
`
`discovering the security system components.” In fact, the disclosure does not even
`
`state that UPnP is used by Wimsatt’s control panels. See Ex. 1004 ¶ 54.
`
`Accordingly, Wimsatt does not disclose automatically discovering a
`
`system’s components, much less the system itself (which is not claimed).
`
`b)
`
`Severson’s components must be programmed prior to
`discovery so the process is not automatic
`
`Because Wimsatt does not disclose automatic discovery of a system’s
`
`components, Petitioner relies on Severson in an attempt to save its Grounds. See
`
`Pet. 14-15. However, Severson also does not disclose “automatically discovering
`
`the security system components.”
`
`Severson discloses that each sensor must be programmed. See Ex. 1006
`
`25:3-6 (“Even further and without human intervention, once the sensors
`
`transducers are initially programmed, each system controller may be operated to
`
`‘self-learn’ each of its sensors.”) (emphasis added), 25:22-24 (“If [the controller] is
`
`in a program mode and the sensor was previously initialized, the CPU checks to
`
`-13-
`
`
`

`
`see if the sensor is either a hardwired or an RF sensor.”) (emphasis added). As a
`
`matter of fact, the programming is a lengthy and involved manual process: “In the
`
`above regard and during system initialization, the installer at his/her shop typically
`
`develops a tabular listing of each of the S/T numbers to be assigned to the various
`
`sensors and transducers to be placed about the subscriber premises. The
`
`preconditioning parameters of each sensor are also defined, if different from those
`
`normally set by the system, such as the NO/NC transducer state, restore, lockout
`
`delay or other parameters which are separately programmable for each RF sensor.
`
`The installer then separately programs each sensor with this data via the hand held
`
`programmer 11.” See id. 25:51-61.
`
`In other words, the sensors that are to be “self-learned” must already be
`
`assigned to the controller. See id. 25:3-13, 23:60-26:7. This so-called “self-
`
`learning” of sensors in Severson, which requires extensive programming and
`
`component assignment prior to its operation, differs markedly from the ’619
`
`patent’s claim limitations of “automatically discovering” components and devices.
`
`Accordingly, Severson also does not disclose claim element 1[d], and does
`
`not remedy the deficiencies of Wimsatt.
`
`c)
`
`Severson only discloses discovering its own
`components
`
`A further problem with Severson is that its security system only discovers its
`
`own components—not those of another system. See Pet. 14-15. Severson
`
`-14-
`
`
`

`
`discloses what the ’619 patent refers to as a “conventional host security system.”
`
`See Ex. 1001 Abstract. Severson does not “integrate[] or layer[] on top of a
`
`conventional host security system.” See id.; see also generally Ex. 1006. This is
`
`evident in that each sensor is coupled to a controller and that the controller self-
`
`learns “each of its sensors.” See id. 24:64-25:6.
`
`In contrast, claim 1 of the ’619 patent requires coupling a gateway to a
`
`security system and then discovering that other system’s components. See Ex.
`
`1001 cl. 1. As a result, the cited disclosure of Severson cannot fulfill claim 1’s
`
`limitation of “automatically discovering the plurality of security system
`
`components.” Nor does Petitioner explain why the claimed automatic coupling
`
`and discovery by a “connection management component coupled to the gateway”
`
`would have been obvious in view of the combination of Wimsatt and Severson. At
`
`best, the combination proposed by Petitioner would result in Wimsatt’s security
`
`subsystem automatically discovering its own components, not Wimsatt’s control
`
`panel 101 that Petitioner relies on as disclosing the claimed gateway.
`
`Moreover, Petitioner’s contention that the proposed combination would
`
`result in an “easier sensor installation process” (Pet. 15) is at odds with Wimsatt’s
`
`consistent description of its control panel network as in communication with a
`
`security system, not the underlying security system components (e.g., security
`
`sensors). See, e.g., Ex. 1004 ¶ 30 (“In one implementation, when a security system
`
`-15-
`
`
`

`
`is triggered indicating a fire, intruder, or other hazard, passive elements such as
`
`backgrounds and borders change color or flash to alert the user of the condition.”),
`
`¶ 31 (“In another example, tripping a zone on a burglar alarm . . . causes control
`
`units to display a security screen having controls that allow the alarm to be de-
`
`activated by entry of a valid code.”); see also id. ¶¶ 5, 23, 58, 62, 65. Because
`
`Wimsatt’s control panels are limited to functionality regarding the status of a
`
`security system, not to communication with or control over individual security
`
`system components, Petitioner’s proposed modification would unnecessarily
`
`complicate installation, not simplify it.
`
`Because Petitioner fails to demonstrate that the combination of Wimsatt,
`
`Severson, and Johnson discloses automatic discovery, the Board should not
`
`institute IPR on Ground 1.
`
`2.
`
`Johnson does not disclose the limitation “maintains objects
`at the security server using the processed data, wherein the
`objects correspond to the security system components and
`the plurality of network devices”
`
`Petitioner relies solely on Johnson for its alleged disclosure of claim element
`
`1[h]’s limitation of “maintains objects at the security server using the processed
`
`data, wherein the objects correspond to the security system components and the
`
`-16-
`
`
`

`
`plurality of network devices.” Pet. 26-29. Petitioner asserts that the “icons”
`
`displayed in Fig. 3 of Johnson are the claimed “objects.” Id. 28.2
`
`Petitioner’s assertion is unsupported and incorrect.
`
`a)
`
`Johnson’s icons do not correspond to security system
`components
`
`The icons do not correspond to security system components and network
`
`devices. See Ex. 1005 6:36-50. Mr. Parker’s bald opinion that a POSITA would
`
`have understood the icons to represent particular controlled devices is illogical and
`
`should be afforded no weight. See Ex. 1002 ¶ 119. In reality, Johnson does not
`
`provide description of the nature of the icons and they do not appear to directly
`
`correspond to any elements described elsewhere in the reference. For example, the
`
`icons displayed on the control page do not correspond to the control devices 40
`
`disclosed in Fig. 2 that connect to control unit 30. Compare Ex. 1005 Fig. 3 with
`
`id. Fig. 2.
`
`Likewise, the “Camera” icon does not correspond to any one camera in the
`
`security system. As demonstrated elsewhere in Johnson, there are many cameras,
`
`not just one camera, so it would be illogical for the “Camera” icon to correspond to
`
`a particular one of those cameras. Compare id. Fig. 4 (showing many different
`
`
`2 The term “icons” does not appear in Johnson and is a characterization introduced
`
`by Petitioner.
`
`-17-
`
`
`

`
`camera views) with id. Fig. 3 (showing only one “Camera” icon). To get around
`
`this, Petitioner apparently refers to Wimsatt’s IP camera 109 rather than any
`
`camera within Johnson—but does so without any cite or explanation of why that
`
`would make sense. See Pet. 28.
`
`Similarly, there is only one “Window” icon and one “Door” icon in
`
`Johnson’s Figure 3, but a house would typically comprise many windows and
`
`multiple doors so it would be illogical for these icons to “correspond . . . to the
`
`security system components and the network devices.” Compare, e.g., Ex. 1005
`
`Fig. 4 (showing multiple windows) with id. Fig. 2 (showing only one “Window”
`
`icon). Petitioner’s assertion that the “Door” icon and the “Window” icon would
`
`correspond to “a door sensor and a window sensor, respectively” is presented with
`
`no cite to Johnson, Mr. Parker, or any evidence in the record. See Pet. 28.
`
`Additionally, the other icons are labeled “Mode,” “Smoke,” “Water,”
`
`“Temp,” “Alerts,” “Lights,” and “Shopping Cart.” See Ex. 1005 Fig. 3. At least
`
`some of these are plainly not components of a security system, and Mr. Parker
`
`does not explain why a POSITA would think they are. See Ex. 1002 ¶ 119. Indeed,
`
`Johnson is devoid of any written description of the icons displayed in Fig. 3,
`
`failing even to use the term “icon.” See generally Ex. 1005. Moreover, to the
`
`extent some of the icons, such as “Mode” or “Alerts” may potentially relate to
`
`security system functions, Petitioner provides no explanation as to how they
`
`-18-
`
`
`

`
`disclose the recited server-maintained “objects,” nor does Petitioner address the
`
`role of the “Door” and “Window” icons relative to these other icons. Johnson, as
`
`well, is silent on these points.
`
`As a result, Petitioner has failed to demonstrate that Johnson discloses icons
`
`that correspond to the plurality of security system components and the network
`
`devices.
`
`b)
`
`Johnson’s icons are not maintained at the security
`server
`
`The ’619 patent explains that “server components provide access to, and
`
`management of, the objects associated with an integrated security system
`
`installation.” See Ex. 1001 8:29-31. Business components at the server “are
`
`responsible for orchestrating all of the low-level service management activities for
`
`the integrated security system service,” and “all changes in device states are
`
`monitored and logged.” See id. 8:53-55, 8:58-59. The specification also states that
`
`the business components “store information about the objects that they manage” in
`
`a service database 240 and in a content store 22, and that they manage all data
`
`storage and retrieval. See id. 9:47-55.
`
`As described above, Johnson completely lacks written description relating to
`
`the “icons” identified by Petitioner. See supra Section V.A.2.a). There is no
`
`explanation regarding where those icons are maintained or what they even
`
`represent. See id. Instead, Petitioner merely claims that a POSITA would
`
`-19-
`
`
`

`
`understand “that the data center 20 server maintains the status of each of these
`
`objects” because “it would be difficult to change a device’s settings without
`
`knowing the current status of that device.” See Pet. 29. But this leap in logic is in
`
`direct contradiction to Fig. 7 of Johnson, which shows that commands are
`
`transmitted without any prior knowledge of control devices’ status; Fig. 8, which
`
`shows that commands and requests are stored at the data center for intermittent
`
`download/upload to the control unit; and Fig. 9, which shows that the control
`
`unit—not the data center—appears to maintain control devices. See Ex. 1005 Figs.
`
`7-9, 6:22-34. Combined with Petitioner’s failure to address the meaning of this
`
`claim term, it is impossible to understand Petitioner or Mr. Parker’s basis for
`
`claiming that Johnson’s icons fulfill the claim limitation. See supra Section IV.
`
`Accordingly, Petitioner fails to meet its burden of showing that this claim
`
`limitation is met by Johnson (or any of the other references), so the Board should
`
`not institute IPR.
`
`3. Mere reference to a processor does not disclose
`“generat[ing] processed data by processing at the gateway
`the security data, the device data, and the remote data”
`
`Claim element 1[g] requires that the gateway “generates processed data by
`
`processing at the gateway the security data, the device data, and the remote data.”
`
`Petitioner points to the alleged existence of security data, device data, remote data,
`
`and a processor 201 to fulfill this limitation. See Pet. 23-25. Petitioner does not
`
`-20-
`
`
`

`
`rely on Severson or Johnson for any disclosures relating to this claim limitation.
`
`See id.
`
`This is plainly insufficient for Petitioner to meet its burden. At best,
`
`Petitioner shows that the combination fulfills the limitations of “security data,”
`
`“device data,” and “remote data.” See id. But stating that there is a processor so
`
`therefore the data must be processed is circular reasoning that fails to convey how
`
`Petitioner interprets “processed data” in the context of the ’619 patent claims, what
`
`in the cited combination discloses “processed data,” or how the security data,
`
`device data, and remote data are processed to generate the claimed processed data.
`
`See Alarm.com Inc. v. Vivint, Inc., No. IPR2015-02003, Paper No. 15 (P.T.A.B.
`
`Mar. 31, 2016) (denying institution because “it is not enough to find that a prior art
`
`device is capable of being modified to operate in the manner claimed . . . [r]ather,
`
`the asserted prior art apparatus, as disclosed, must be capable of performing the
`
`recited function, not merely that it might be modified to include such capability”)
`
`(citing Typhoon Touch Techs., Inc. v. Dell, Inc., 659 F.3d 1376, 1380 (Fed. Cir.
`
`2011)). Mr. Parker’s parroting of the petition fails to provide additional
`
`explanation of how this limitation is met. See Ex. 1002 ¶¶ 109-112. Further, as
`
`discussed above, the burden is on Petitioner to “identify . . . how the challenged
`
`claim is to be construed.” See 37 C.F.R. § 42.104(b)(3); supra Section IV.
`
`Petitioner fails to do so, making its argument unintelligible. See Pet. 23-25.
`
`-21-
`
`
`

`
`Thus, because Petitioner has failed to demonstrate that the combination of
`
`Wimsatt, Severson, and Johnson discloses that the gateway “generates processed
`
`data,” the Board should not institute IPR on Ground 1.
`
`4.
`
`The petition fails to demonstrate that Wimsatt’s system
`would be modified to include a remote server
`
`In addressing claim element 1[e], requiring “a security server at a second
`
`location different from the first location, wherein the security server is coupled to
`
`the gateway,” Petitioner contends that it would have been obvious to modify
`
`Wimsatt to communicate with a remote server in view of Johnson. Pet. 18-20.
`
`Petitioner’s argument overlooks that Wimsatt discusses problems with a server-
`
`oriented approach and provides an alternative to avoid those known shortcomings.
`
`Petitioner also fails to demonstrate that the server-based modifications it proposes
`
`would have been compatible with Wimsatt’s disclosure.
`
`a) Wimsatt teaches away from use of servers
`
`Although Petitioner is correct that Wimsatt does not disclose a remotely
`
`located security server (see Pet. 18-20), Petitioner is not correct that a POSITA
`
`would be motivated to combine Wimsatt with a reference that discloses servers.
`
`Instead, Wimsatt expressly teaches away from use of servers. See Ex. 1004 ¶ 9.
`
`It is improper to combine references where the references teach away from
`
`their combination. See In re Grasselli, 713 F.2d 731, 743 (Fed. Cir. 1983). A
`
`referen

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket