`
`
`
`
`
`
`
`BEFORE THE PATENT TRIAL AND APPEAL BOARD
`
`
`
`SecureNet Technologies, LLC,
`Petitioner
`
`v.
`
`iControl Networks, Inc.,
`Patent Owner
`
`U.S. Patent No. 8,473,619
`Filing Date: Aug. 11, 2008
`Issue Date: June 25, 2013
`
`Title: Forming a Security Network Including Integrated Security System
`Components and Network Devices
`
`
`Inter Partes Review No. ______
`
`
`
`Petition for Inter Partes Review of U.S. Patent No. 8,473,619
`
`i
`
`
`
`
`
`
`
`
`
`
`
`Table of Contents
`
`C.
`
`B.
`
`Page
`INTRODUCTION .......................................................................................... 1
`I.
`II. MANDATORY NOTICES UNDER 37 C.F.R. § 42.8(A)(1) ....................... 1
`A.
`Real Party-In-Interest Under 37 C.F.R. § 42.8(b)(1) ........................... 1
`B.
`Related Matters Under 37 C.F.R. § 42.8(b)(2) .................................... 1
`C.
`Lead and Back-Up Counsel under 37 C.F.R. § 42.8(b)(3) .................. 2
`D.
`Service Information .............................................................................. 2
`E.
`Power of Attorney ................................................................................ 2
`III. PAYMENT OF FEES - 37 C.F.R. § 42.103 .................................................. 2
`IV. REQUIREMENTS FOR INTER PARTES REVIEW UNDER 37
`C.F.R. §§ 42.104 AND 42.108 ....................................................................... 3
`A. Grounds for Standing Under 37 C.F.R. § 42.104(a) ............................ 3
`B.
`Identification of Challenge Under 37 C.F.R. § 42.104(b) and
`Statement of Precise Relief Requested ................................................ 3
`Threshold Requirement for Inter Partes Review 37 C.F.R. §
`42.108(c) ............................................................................................... 3
`BACKGROUND OF TECHNOLOGY RELATED TO THE ‘619
`PATENT ......................................................................................................... 4
`VI. SUMMARY OF THE ‘619 PATENT ............................................................ 4
`VII. CLAIM CONSTRUCTION UNDER 37 C.F.R. § 42.104(B)(3) ................... 4
`A.
`Legal Overview .................................................................................... 4
`B.
`Proposed Claim Constructions ............................................................. 4
`VIII. PERSON HAVING ORDINARY SKILL IN THE ART & STATE
`OF THE ART ................................................................................................. 5
`IX. CLAIMS 1-9, 12-16, 19, 23-28, 32, 34, 42-47, 54-57 AND 59-62 OF
`THE ‘619 PATENT ARE UNPATENTABLE .............................................. 5
`A. Overview Of The Prior Art .................................................................. 5
`1.
`Overview of Wimsatt ................................................................. 5
`2.
`Overview of Johnson ................................................................. 6
`3.
`Overview of Severson ................................................................ 7
`The Cited References Are Analogous Art ........................................... 7
`i
`
`
`V.
`
`
`
`
`
`
`
`Table of Contents
`(continued)
`
`Page
`
`C. Ground 1 – Claims 1-9, 12-16, 19, 23-28, 32, 34, 42-47, 54-57
`and 59-62 Are Obvious over Wimsatt in view of Johnson
`and/or Other Prior Art References Under 35 U.S.C. § 103(a) ............. 7
`1.
`Independent claim 1 – Ground 1 ................................................ 7
`2.
`Dependent claim 2 – Ground 1 ................................................ 29
`3.
`Dependent claim 3 – Ground 1 ................................................ 31
`4.
`Dependent claim 4 – Ground 1 ................................................ 32
`5.
`Dependent claim 5 – Ground 1 ................................................ 32
`6.
`Dependent claim 6 – Ground 1 ................................................ 34
`7.
`Dependent claim 7 – Ground 1 ................................................ 36
`8.
`Dependent claim 8 – Ground 1 ................................................ 36
`9.
`Dependent claim 9 – Ground 1 ................................................ 37
`10. Dependent claim 12 – Ground 1 .............................................. 37
`11. Dependent claim 13 – Ground 1 .............................................. 38
`12. Dependent claim 14 – Ground 1 .............................................. 38
`13. Dependent claim 15 – Ground 1 .............................................. 40
`14. Dependent claim 16 – Ground 1 .............................................. 41
`15. Dependent claim 19 – Ground 1 .............................................. 43
`16. Dependent claim 23 – Ground 1 .............................................. 43
`17. Dependent claim 24 – Ground 1 .............................................. 44
`18. Dependent claim 25 – Ground 1 .............................................. 45
`19. Dependent claim 26 – Ground 1 .............................................. 45
`20. Dependent claim 27 – Ground 1 .............................................. 46
`21. Dependent claim 28 – Ground 1 .............................................. 46
`22. Dependent claim 32 – Ground 1 .............................................. 47
`23. Dependent claim 34 – Ground 1 .............................................. 47
`24. Dependent claim 42 – Ground 1 .............................................. 48
`25. Dependent claims 43 and 44 – Ground 1 ................................. 48
`ii
`
`
`
`
`
`
`
`
`Table of Contents
`(continued)
`
`Page
`26. Dependent claim 45 – Ground 1 .............................................. 49
`27. Dependent claim 46 – Ground 1 .............................................. 49
`28. Dependent claim 47 – Ground 1 .............................................. 50
`29. Dependent claim 54 – Ground 1 .............................................. 51
`30. Dependent claim 55 – Ground 1 .............................................. 51
`31. Dependent claim 56 – Ground 1 .............................................. 53
`32. Dependent claim 57 – Ground 1 .............................................. 53
`33. Dependent claim 59 – Ground 1 .............................................. 54
`34.
`Independent claim 60 – Ground 1 ............................................ 55
`35.
`Independent claim 61 – Ground 1 ............................................ 58
`36. Dependent claim 62 – Ground 1 .............................................. 64
`X. NO SECONDARY CONSIDERATIONS OF NON-OBVIOUSNESS
`EXIST ........................................................................................................... 64
`XI. CONCLUSION ............................................................................................. 64
`
`
`
`
`
`iii
`
`
`
`
`
`EXHIBITS
`
`Description of Document
`
`Exhibit
`No.
`1001 U.S. Patent No. 8,473,619 ("the ‘619 patent")
`1002 Declaration of James Parker
`1003
`File History for U.S. Patent No. 8,473,619
`1004 U.S. Patent Publication No. 2004/0260427 to Wimsatt (“Wimsatt”)
`1005 U.S. Patent No. 6,580,950 to Johnson et al. (“Johnson”)
`1006 U.S. Patent No. 4,951,029 to Severson (“Severson”)
`1007 U.S. Publication No. 2003/0062997 to Naidoo et al. (“Naidoo”)
`1008 U.S. Patent No. 6,748,343 to Alexander et al. (“Alexander”)
`1009 U.S. Publication No. 2003/0137426 to Anthony et al. (“Anthony”)
`1010
`Installation Instructions for PC5401 Data Interface Module (2004)
`“Understanding Universal Plug and Play,” White Paper, Microsoft
`(2000)
`Waiver of Service, iControl Networks, Inc. v. SecureNet Techns.,
`LLC, No. 15-807-GMS, (D. Del. Sept. 30, 2015), ECF No. 5
`1012
`1013 Curriculum Vitae of James Parker
`
`1011
`
`
`
`
`
`iv
`
`
`
`
`
`Petition for Inter Partes Review of
`Patent No. 8,473,619
`I.
`INTRODUCTION
`
`SecureNet Technologies, LLC (“Petitioner” or “SecureNet”) petitions for
`
`inter partes review (“IPR”) under 35 U.S.C. §§ 311-319 and 37 C.F.R. § 42 of
`
`claims 1-9, 12-16, 19, 23-28, 32, 34, 42-47, 54-57 and 59-62 (“the Petitioned
`
`Claims”) of U.S. Patent No. 8,473,619 (“the ‘619 patent”) (Ex. 1001).
`
`II. MANDATORY NOTICES UNDER 37 C.F.R. § 42.8(A)(1)
`A. Real Party-In-Interest Under 37 C.F.R. § 42.8(b)(1)
`SecureNet Technologies, LLC is the real party-in-interest.
`
`B. Related Matters Under 37 C.F.R. § 42.8(b)(2)
`The ‘619 patent is asserted in iControl Networks, Inc. v. SecureNet
`
`Technologies, LLC, No. 15-807-GMS (D. Del.), which was filed on September 11,
`
`2015.1
`
`Petitioner is also concurrently filing an IPR petition covering claims 1-6, 14-
`
`46, 49-58 and 60-61 of U.S. Patent No. 8,073,931, which is assigned to the Patent
`
`Owner and claims priority to same applications as the ‘619 patent. Petitioner is
`
`also concurrently filing two IPR petitions covering claims 1-4, 6-50 of U.S. Patent
`
`1 iControl Networks, Inc. (“Patent Owner” or “iControl”) filed a Waiver of Service
`
`in that case on September 30, 2015 (Ex. 1012). Based on the PTAB-designated
`
`informative decision docketed as Case No. IPR2013-00010 (Paper 20) (January 30,
`
`2013), this Petition is being timely filed.
`
`1
`
`
`
`Petition for Inter Partes Review of
`Patent No. 8,473,619
`No. 8,478,844 (“the ‘844 patent”), which is assigned to the Patent Owner and is the
`
`child patent to the ‘619 patent. Petitioner is also concurrently filing an IPR petition
`
`for claims 25-40 and 42-50 of the ‘844 patent.
`
`Petitioner is not aware of any other judicial or administrative matters that
`
`would affect, or be affected by, a decision in this proceeding.
`
`C. Lead and Back-Up Counsel under 37 C.F.R. § 42.8(b)(3)
`
`Lead Counsel: Erik B. Milch (Reg. No. 42,887) / emilch@cooley.com
`Back-up Counsel:
`Jennifer Volk (Reg. No. 62,305) / jvolkfortier@cooley.com
`Frank Pietrantonio (Reg. No. 32,289) / fpietrantonio@cooley.com
`zSecureNetIPR@cooley.com
`zpatdcdocketing@cooley.com
`Cooley LLP ATTN: Patent Group
`1299 Pennsylvania Ave., NW, Suite 700 Washington, DC 20004
`Tel: (703) 456-8573 Fax: (703) 456-8100
`D.
`Service Information
`The Petition is being served by FEDERAL EXPRESS to the ‘619 Patent
`
`Owner’s attorneys of record, IPR Law Group, PC and the known outside counsel
`
`to Patent Owner, Wilson Sonsini Goodrich & Rosati. Petitioner consents to service
`
`by e-mail at the addresses provided above.
`
`Power of Attorney
`
`E.
`Filed concurrently with this petition per 37 C.F.R. § 42.10(b).
`
`III. PAYMENT OF FEES - 37 C.F.R. § 42.103
`This Petition requests review of claims 1-9, 12-16, 19, 23-28, 32, 34, 42-47,
`
`54-57 and 59-62 (a total of 37 claims) of the ‘619 patent and is accompanied by a
`
`2
`
`
`
`Petition for Inter Partes Review of
`Patent No. 8,473,619
`payment of $35,200. 37 C.F.R. § 42.15. This Petition meets the fee requirements
`
`of 35 U.S.C. § 312(a)(1).
`
`IV. REQUIREMENTS FOR INTER PARTES REVIEW UNDER 37 C.F.R. §§ 42.104
`AND 42.108
`A. Grounds for Standing Under 37 C.F.R. § 42.104(a)
`Petitioner certifies that the ‘619 patent is eligible for IPR and further
`
`certifies that Petitioner is not barred or estopped from requesting IPR.
`
`B.
`
`Identification of Challenge Under 37 C.F.R. § 42.104(b) and
`Statement of Precise Relief Requested
`
`Petitioner requests that the Board institute inter partes review of claims 1-9,
`
`12-16, 19, 23-28, 32, 34, 42-47, 54-57 and 59-62 of the ‘619 patent and requests
`
`that each claim be found unpatentable as obvious under 35 U.S.C. § 103(a) on the
`
`following ground:
`
`Ground ‘619 Claim(s)
`1.
`1-9, 12-16, 19,
`23-28, 32, 34,
`42-47, 54-57,
`59-62
`
`Basis for Challenge
`Obvious over Wimsatt in view of Johnson and
`Severson under 35 U.S.C. § 103(a)
`
`
`This petition is accompanied by the Declaration of James Parker (Ex. 1002,
`
`“Mr. Parker”), an expert in the field.
`
`C. Threshold Requirement for Inter Partes Review 37 C.F.R. §
`42.108(c)
`
`Inter partes review of claims 1-9, 12-16, 19, 23-28, 32, 34, 42-47, 54-57 and
`
`59-62 should be instituted because this Petition establishes a reasonable likelihood
`
`3
`
`
`
`Petition for Inter Partes Review of
`Patent No. 8,473,619
`that Petitioner will prevail with respect to each of the claims challenged. 35 U.S.C.
`
`§ 314(a).
`
`V. BACKGROUND OF TECHNOLOGY RELATED TO THE ‘619 PATENT
`Mr. Parker provides a technology tutorial in his declaration. (Ex. 1002, ¶¶
`
`30-57.)
`
`VI. SUMMARY OF THE ‘619 PATENT
`The ‘619 patent was filed on August 11, 2008 and claims priority to a
`
`divisional application and a long list of continuation-in-part applications and
`
`provisional applications, the earliest of which has a filing date of March 16, 2005.
`
`(Ex. 1001.) For purposes of this proceeding, we assume that the earliest possible
`
`priority date of the ‘619 patent is March 16, 2005. We reserve the right to dispute
`
`this priority date at a later time or in another proceeding.
`
`VII. CLAIM CONSTRUCTION UNDER 37 C.F.R. § 42.104(b)(3)
`A. Legal Overview
`A claim subject to IPR is given its “broadest reasonable construction in light
`
`of the specification of the patent in which it appears.”2 37 C.F.R. § 42.100(b).
`
`B.
`
`Proposed Claim Constructions
`
`
`2 Petitioners reserve the right to pursue different constructions in litigation. In re
`
`Zletz, 893 F.2d 319, 321 (Fed. Cir. 1989).
`
`4
`
`
`
`Petition for Inter Partes Review of
`Patent No. 8,473,619
`Petitioner does not propose any claim constructions for this proceeding. All
`
`claim terms and clauses should be given their plain and ordinary meaning as
`
`understood by a person of ordinary skill in the art (“POSITA”). (See Ex. 1002, ¶¶
`
`59.)
`
`VIII. PERSON HAVING ORDINARY SKILL IN THE ART & STATE OF THE ART
`
`The ‘619 patent is directed to integrated security systems that are capable of
`
`being remotely accessed and controlled. (Ex. 1002, ¶¶ 17-24.) At the time of the
`
`alleged invention, a POSITA as of 2005 would hold a bachelor’s degree or the
`
`equivalent in electrical engineering (or related academic fields) and at least three
`
`years of additional work experience in the area of digital and/or telecommunication
`
`system design, as applicable to safety and security systems, or equivalent work
`
`experience. (Id., ¶ 19.)
`
`IX. CLAIMS 1-9, 12-16, 19, 23-28, 32, 34, 42-47, 54-57 AND 59-62 OF THE ‘619
`PATENT ARE UNPATENTABLE
`
`As detailed in the sections below, claims 1-9, 12-16, 19, 23-28, 32, 34, 42-
`
`47, 54-57 and 59-62 of the ‘619 patent are obvious in light of Wimsatt in view of
`
`Johnson and/or one or more other prior art references cited below.
`
`A. Overview Of The Prior Art
`1. Overview of Wimsatt
`Wimsatt published on December 23, 2004 and therefore qualifies as prior art
`
`under 35 U.S.C. § 102(a). The patent issuing from Wimsatt was cited by Patent
`
`5
`
`
`
`Petition for Inter Partes Review of
`Patent No. 8,473,619
`Owner in an Information Disclosure Statement (IDS) during prosecution of the
`
`‘619 patent but it was never applied against the claims.
`
`Wimsatt describes a home automation system having a control panel 101
`
`that is connected to a number of co-located devices, called “controlled devices”,
`
`which manage already-existing systems, such as lighting systems or security
`
`systems. (Ex. 1004, ¶ 0023.) The control panel 101 displays an interactive
`
`graphical user interface (GUI) that allows the user (e.g., homeowner) to control the
`
`controlled devices. (Id., ¶ 0022; Ex. 1002, ¶¶ 61-64.)
`
`2. Overview of Johnson
`Johnson issued on June 17, 2003 and therefore qualifies as prior art under 35
`
`U.S.C. § 102(b). Johnson was cited by Patent Owner in an IDS during prosecution
`
`of the ‘619 patent but it was never applied against the claims.
`
`Johnson discloses an “Internet based home communications system for
`
`allowing a homeowner to monitor and control various features of their home from
`
`a distant location via a global computer network.” (Ex. 1005, Abstract.) For
`
`example, Johnson provides a website where homeowners can log in to access,
`
`monitor and control a home’s security system, lighting system, exterior cameras
`
`and the like. (Id., 2:8-28, 6:35-59.) The web site is provided through one or more
`
`data center 20 servers that are located remotely from the home. (Id., 4:15-53.)
`
`6
`
`
`
`Petition for Inter Partes Review of
`Patent No. 8,473,619
`3. Overview of Severson
`Severson issued on August 21, 1990 and therefore qualifies as prior art
`
`under 35 U.S.C. § 102(b). Severson discloses a home security system controller
`
`that automatically discovers newly-added sensors its security network. (Ex. 1006,
`
`23:60-26:7; Ex. 1002, ¶¶ 70-72.)
`
`The Cited References Are Analogous Art
`
`B.
`As indicated in the section above and as explained in Mr. Parker’s
`
`declaration, each of the prior art references combined in this Petition is analogous
`
`art to the ‘619 patent and to each other, as each reference is in the same field of
`
`endeavor as the ‘619 patent. (Ex. 1002, ¶ 76.)
`
`C. Ground 1 – Claims 1-9, 12-16, 19, 23-28, 32, 34, 42-47, 54-57 and
`59-62 Are Obvious over Wimsatt in view of Johnson and/or Other
`Prior Art References Under 35 U.S.C. § 103(a)
`
`Claims 1-9, 12-16, 19, 23-28, 32, 34, 42-47, 54-57 and 59-62 are rendered
`
`obvious under 35 U.S.C. § 103(a) for the reasons that follow.
`
`1.
`
`Independent claim 1 – Ground 1
`a.
`For the reasons discussed in the following sections, Wimsatt in view of
`
`Preamble: “A system comprising”
`
`Johnson and Severson discloses all the elements of the claimed system.
`
`7
`
`
`
`Petition for Inter Partes Review of
`Patent No. 8,473,619
`b.
`
`Claim element 1[a]: “a gateway located at a first
`location”
`
`
`
`Wimsatt discloses a control panel 101 that is mounted within a user’s home
`
`at a central location. (Ex. 1004, ¶ 0034.) The control panel 101 is the claimed
`
`“gateway” and the user’s home is the claimed “first location.”
`
`c.
`
`Claim element 1[b]: “a connection management
`component coupled to the gateway and automatically
`establishing a wireless coupling with a security system
`installed at the first location”
`
`Wimsatt discloses this limitation in its entirety. For clarity, this limitation is
`
`divided into two parts and discussed separately.
`
`i.
`
`“a connection management component coupled
`to the gateway …”
`
`A POSITA would understand that the “connection management component”
`
`(referred to also throughout as “CMC”) would be a module implemented by a
`
`processor to carry out the claimed operations. (Ex. 1002, ¶ 80.) A POSITA would
`
`also have understood that the control panel 101 in Wimsatt must also include a
`
`module to perform the discovery and connection processes that it describes and,
`
`thus, the control panel 101 in Wimsatt must indeed include the “connection
`
`management component” that would be responsible for the claimed couplings of
`
`the system. (Ex. 1002, ¶ 80.) Because the CMC is implemented by the control
`
`panel 101 (via its processor 201), Wimsatt discloses that the CMC is coupled to the
`
`control panel 101.
`
`8
`
`
`
`Petition for Inter Partes Review of
`Patent No. 8,473,619
`
`ii.
`
`“a connection management component …
`automatically establishing a wireless coupling
`with a security system installed at the first
`location”
`
`Wimsatt discloses that the user’s home (i.e., the claimed “first location”)
`
`includes a security system. (See, e.g., Ex. 1004, ¶ 0005 (“Home automation
`
`systems may be integrated with a home security system”), ¶ 0012 (describing a
`
`home automation system that controls “security systems”), ¶ 0023 (explaining that
`
`the “invention is particularly useful in home automation environments because it
`
`builds on top of the vast array of controlled devices and subsystems that already
`
`exist for managing … security systems”), ¶¶ 0029-0031 (“tripping a zone on a
`
`burglar alarm … may indicate a household member [is] entering the house”), ¶¶
`
`0043, 0057-0058, 0062, 0065, 0073-0074.)
`
`Wimsatt discloses that its control panel 101 can implement a “system
`
`discovery process.” A POSITA would have understood that the CMC module
`
`performs this process. (Ex. 1002, ¶¶ 82-83.) According to Wimsatt, “[w]hen a
`
`control panel 101 is coupled to a controlled device or subsystem, it interrogates
`
`that device or subsystem to learn details of the control interface of that particular
`
`system.” (Ex. 1004, ¶ 0045.) “This interrogation may simply be a matter of
`
`determining the controller type in which case the control panel 101 can look up a
`
`command set and signaling protocol information for that controller type.” (Id.)
`
`Wimsatt also explains that when the interrogation process does not work correctly,
`
`9
`
`
`
`Petition for Inter Partes Review of
`Patent No. 8,473,619
`“the control panel can be manually or semi-automatically programmed to
`
`support that controlled device or subsystem.” (Id. (emphasis added)) This last
`
`passage indicates that the interrogation process is automatic (i.e., the control panel
`
`101 automatically discovers the controlled devices) because manual or semi-
`
`automatic programming is only performed when the automatic interrogation fails.
`
`(See also, Ex. 1004, ¶ 0006 (describing the difficulties of manually adding devices
`
`to a network).) Per this disclosure, the control panel 101 can automatically
`
`discover the home security system when the home security system is coupled to the
`
`control panel 101.
`
`Wimsatt further discloses that its control panel 101 can be wireless (referred
`
`to as “control panel 107”) and can wirelessly communicate with any of the
`
`controlled devices of the security system as a result of the above discovery process
`
`(e.g., because it now has the signaling protocol information needed for
`
`communication). (Ex. 1004, ¶¶ 0037, 0043.)
`
`d.
`
`Claim element 1[c]: “the security system including
`security system components”
`
`The ‘619 patent discloses that “security system components” can be sensors
`
`or any other components “belonging to the security system.” (Ex. 1001, 4:40-45.)
`
`While Wimsatt does not illustrate sensors in its security system, a POSITA would
`
`have understood that the security system indeed includes sensors. (Ex. 1002, ¶ 85.)
`
`Wimsatt discloses at paragraph [0031] that “tripping a zone on a burglar alarm …
`
`10
`
`
`
`Petition for Inter Partes Review of
`Patent No. 8,473,619
`causes the control units to display a security screen having controls that allow the
`
`alarm to be de-activated.” (Ex. 1004, ¶ 0031.) A POSITA would have understood
`
`that a “burglar alarm” is a security system and that at least one sensor is located
`
`within each zone of the house. (Ex. 1002, ¶ 85.) It is this sensor (or sensors) that is
`
`“tripped” and sets off an alarm. Thus, sensors are inherent in Wimsatt.
`
`To the extent Patent Owner disagrees, it would be obvious from Wimsatt
`
`that its security system includes sensors. It was well known at the time of the ‘619
`
`patent that home security systems came equipped with multiple sensors (e.g.,
`
`motion sensors, door sensors, window sensors, etc.) that could be mounted at
`
`various locations throughout a home. (Ex. 1002, ¶ 86.) As Mr. Parker explains in
`
`his declaration, sensors are the “eyes” of a home security system. (Id.) Without
`
`sensors, a home security system is blind and cannot function. (Id.)
`
`To the extent the Patent Owner further argues that a more specific disclosure
`
`of sensors is required, Johnson has that disclosure. As illustrated in the below
`
`excerpted and annotated Figure 5 of Johnson, the security system 60 includes
`
`“security sensors.” (See also, Ex. 1004, FIG. 3 (illustrating icons for well-known
`
`components of a home security system, e.g., a door sensor, a window sensor and a
`
`smoke alarm).)
`
`11
`
`
`
`Petition for Inter Partes Review of
`Patent No. 8,473,619
`
`While a POSITA would have understood that Wimsatt already indicates the
`
`presence of sensors, it would be obvious to modify Wimsatt to include the plurality
`
`of security sensors disclosed in Johnson to make this disclosure more explicit. (Ex.
`
`
`
`1002, ¶ 88.)
`
`12
`
`
`
`Petition for Inter Partes Review of
`Patent No. 8,473,619
`e.
`
`the connection
`Claim element 1[d]: “wherein
`management component forms a security network by
`automatically discovering
`the
`security
`system
`components and integrating communications and
`functions of the security system components into the
`security network”
`
`For clarity, this limitation is divided into three parts and discussed
`
`separately. Petitioner discusses “form[ing] a security network” last because it is the
`
`end result of “automatically discovering” and “integrating” the devices.
`
`i.
`
`“the connection management component …
`automatically discovering the security system
`components”
`
`Wimsatt discloses that its control panel 101, including the connection
`
`management component, can implement a “system discovery process” as described
`
`above with respect to how Wimsatt also discloses element 1[b]. According to
`
`Wimsatt, “[w]hen a control panel 101 is coupled to a controlled device or
`
`subsystem, it interrogates that device or subsystem to learn details of the control
`
`interface of that particular system.” (Ex. 1004, ¶ 0045.) Wimsatt also explains that
`
`when the interrogation process does not work correctly, “the control panel can be
`
`manually or semi-automatically programmed to support that controlled device or
`
`subsystem.” (Id. (emphasis added)) This
`
`last passage
`
`indicates
`
`that
`
`the
`
`interrogation process is automatic (i.e., the control panel 101 automatically
`
`discovers the controlled devices) because manual or semi-automatic programming
`
`is only performed when the automatic interrogation fails. (See also, Ex. 1004, ¶
`
`13
`
`
`
`Petition for Inter Partes Review of
`Patent No. 8,473,619
`0006 (describing the difficulties of manually adding devices to a network).) Per
`
`this disclosure, the control panel 101 can automatically discover the home security
`
`system when the home security system is coupled to the control panel 101.
`
`Wimsatt also discloses that its control panel 101 implements “Universal
`
`Plug-and-Play (UPnP™) processes.” (Ex. 1004, ¶ 0054.) It was well known at the
`
`time of the ‘844 patent that UPnP™ was used to auto-discover 2-way devices
`
`connected to a shared network. (Ex. 1002, ¶ 91 (citing to Ex. 1011, 7).)
`
`Wimsatt does not explicitly disclose that its security system’s sensors are
`
`automatically discovered using this process – it only explicitly discloses that the
`
`“security system” is discovered. A POSITA would have understood that
`
`discovering the security system would also include discovering its sensors. (Ex.
`
`1002, ¶ 92.) To the extent Patent Owner disputes this, Severson discloses a security
`
`system that includes a controller and a plurality of sensors. (Ex. 1006, FIG. 1, 4:3-
`
`29.) Severson explains that “without human intervention” “each system controller
`
`may be operated to ‘self-learn’ each of its sensors.” (Ex. 1006, 25:3-13.) In
`
`describing a system installation process, Severson explains that the sensors and
`
`controller are mounted at the home and then “the controller is enabled and self-
`
`learns each of its sensors/transducers as they report their status.” (Ex. 1006, 25:51-
`
`26:7; see also, id., 23:60-25:50.) As a result, “[i]nstallation time is thereby reduced
`
`with minimal potential installer error, due to the CPU self-learning its reporting
`
`14
`
`
`
`Petition for Inter Partes Review of
`Patent No. 8,473,619
`sensors.” (Id., 25:51-26:7.) This is similar to the auto-discovery process described
`
`in the ‘619 patent. (See, e.g., Ex. 1001, FIG. 14, 24:66-26:5.)
`
`
`
`Motivation to Combine Severson with Wimsatt and Johnson: It would be
`
`obvious to a POSITA to combine the auto-discovery disclosure with Wimsatt and
`
`Johnson so that the control panel 101 in Wimsatt can auto-discover the security
`
`sensors in addition to the discovering the security system controller. (Ex. 1002, ¶
`
`93.) This would predictably result in an easier sensor installation process and
`
`reduce the likelihood of installer error. (Ex. 1002, ¶ 93; see also, Ex. 1006, 26:5-7.)
`
`As previously discussed, Wimsatt already discloses an automatic discovery
`
`process for learning the security system so it would be obvious to a POSITA to
`
`further discover the sensors that form part of that system. (Ex. 1004, ¶ 0045; Ex.
`
`1002, ¶ 94.) A POSITA would understand that the control panel 101 would want to
`
`“discover” all of the devices that it and the data center 20 server in Johnson
`
`controls. Severson illustrates the ability and desire for similar controllers to
`
`automatically discover devices at the security component level. A POSITA would
`
`understand that adding an extra step in the automatic discovery process to include
`
`discovery of the sensors would be easy to implement. (Ex. 1002, ¶ 94.)
`
`ii.
`
`“the connection management component …
`integrating communications and functions of
`the security system components
`into
`the
`security network”
`
`As background, Wimsatt discloses a home automation system. The purpose
`
`15
`
`
`
`Petition for Inter Partes Review of
`Patent No. 8,473,619
`of a home automation system, in general, is to communicate with and control the
`
`functionality of multiple home-based devices such as lighting, heating and air
`
`conditioning, media equipment, and security systems. (Ex. 1004, ¶¶ 0005-0006.) In
`
`its background section, Wimsatt provides an example of how such systems were
`
`known to operate with home security systems: “Home automation systems may be
`
`integrated with a home security system so that when a fire alarm is raised, for
`
`example, internal and external lights will be turned on.” (Ex. 1004, ¶ 0005.) In
`
`other words, it was well known at the time of the ‘619 patent that home automation
`
`systems communicated with home-based devices (such as the lights in the above
`
`example) and controlled their functionality (i.e., the system commanded the lights
`
`to “turn on”). Thus, the general concept of integrating communications and
`
`functions of home-based devices into a home automation system was well known
`
`long before the earliest priority date of the ‘619 patent. (Ex. 1002, ¶ 95.)
`
`Looking at Wimsatt’s system specifically, the control panel 101, including
`
`the connection management component, “integrat[es]” communications and
`
`functions of its home-based control devices through the system discovery process
`
`discussed above. (See, e.g., Ex. 1004, ¶ 0045.) Through this discovery process, the
`
`control panel 101 is able to “learn” various details about the controlled device,
`
`such as its command set, signaling protocol information, and the functionality
`
`available for that device. (Ex. 1004, ¶ 0046.) The control panel 101 is then able to
`
`16
`
`
`
`Petition for Inter Partes Review of
`Patent No. 8,473,619
`communicate with and control the functions of that device.
`
`Wimsatt identifies the home’s security system as one type of controlled
`
`device. (See, e.g., Ex. 1004, ¶¶ 0012, 0029, 0058.) The specification also states that
`
`“control application software executes on the control unit to communicate control
`
`information such as commands, sensor messages, status messages, and the like
`
`with … controlled systems (e.g., security systems …).” (Id. (emphasis added).) It
`
`further explains that this software “may enable features of the security system to be
`
`enabled/disabled.” (Ex. 1004, ¶ 0058.) A POSITA would have understood that
`
`controlling features of a security system would include controlling features (i.e.,
`
`functions) of the security system’s sensors via the home’s security system. (Ex.
`
`1002, ¶ 97.) The control panel 101 would not otherwise have the ability to control
`
`or communicate with the devices if it had not discovered the devices and integrated
`
`their functionality into itself and the overall system. Thus, this portion of the
`
`limitation is satisfied by Wimsatt, Johnson and Severson.
`
`iii.
`
`“the connection management component forms
`a security network …”
`
`A POSITA would have understood that the claimed “security network” is
`
`formed in Wimsatt (as modified by Johnson and Severson) as a result of the
`
`control panel’s CMC integrating the functions of the security system sensors. (Ex.
`
`1002, ¶¶ 98-100.) Wimsatt actually refers to its overall network more generically
`
`as a “home automation system” because its control panel 101 integrates the
`
`17
`
`
`
`Petition for Inter Partes Review of
`Patent No. 8,473,619
`functions of many other types of home-based control devices, in addition to
`
`security-related devices. (See, e.g., Ex. 1004, ¶¶ 0005, 0012.) But, a POSITA
`
`would have understood that this home automation system includes a sec