throbber
Case 2:19-cv-00209-JRG Document 159 Filed 07/02/20 Page 1 of 44 PageID #: 5901
`
`THE UNITED STATES DISTRICT COURT
`FOR THE EASTERN DISTRICT OF TEXAS
`MARSHALL DIVISION
`
`
`THE HILLMAN GROUP, INC.,
`
`v.
`
`KEYME, LLC
`
`
`

`

` CASE NO. 2:19-CV-209-JRG

`

`

`
`
`CLAIM CONSTRUCTION
`MEMORANDUM AND ORDER
`
`
`
`
`Before the Court is the Opening Claim Construction Brief (Dkt. No. 142) filed by
`
`Plaintiff The Hillman Group, Inc. (“Plaintiff” or “Hillman”). Also before the Court is the
`
`Responsive Claim Construction Brief (Dkt. No. 151) filed by Defendant KeyMe, LLC
`
`(“Defendant” or “KeyMe”) as well as Plaintiff’s reply (Dkt. No. 154).
`
`
`
`The Court held a hearing on June 23, 2020.
`
`Table of Contents
`
`I. BACKGROUND ....................................................................................................................... 2
`
`II. LEGAL PRINCIPLES ........................................................................................................... 3
`
`III. AGREED TERMS................................................................................................................. 7
`
`IV. DISPUTED TERMS .............................................................................................................. 8
`
`A. “configured to replicate the tooth pattern of the blade of said key inserted in said key
`receiving entry” ..................................................................................................................... 8
`
`B. “configured to cut the selected key blank to duplicate a key tooth pattern of the master
`key” ..................................................................................................................................... 16
`
`C. “configured to . . . cut the determined bitting pattern into a key blank” ............................. 18
`
`D. “at least one duplicate,” “key duplication process,” and “duplicated key” ........................ 21
`
`E. “to determine whether the inserted key matches one of a group of preselected key
`types” .................................................................................................................................. 22
`
`F. “key analysis system . . .” .................................................................................................... 27
`
`G. “queue of key duplication events” ...................................................................................... 35
`
`H. “key duplicating system . . .” .............................................................................................. 40
`
`V. CONCLUSION...................................................................................................................... 44
`
`
`
`
`
`
`- 1 -
`
`

`

`Case 2:19-cv-00209-JRG Document 159 Filed 07/02/20 Page 2 of 44 PageID #: 5902
`
`I. BACKGROUND
`
`
`
`Plaintiff alleges infringement of United States Patents No. 8,979,446 (the “’446 Patent”),
`
`9,914,179 (the “’179 Patent”), and 10,400,474 (the “’474 Patent”) (collectively, “the patents-in-
`
`suit”). (Dkt. No. 142, Exs. 1–3). Plaintiff submits that “[t]he inventions and the machines
`
`involved in this litigation represent the culmination of years of technological advances aimed at
`
`automating the once cumbersome and inconvenient key cutting process.” (Dkt. No. 142, at 2.)
`
`Defendant contends that “the asserted claims are directed to a particular technique for
`
`duplicating keys, called ‘trace cutting,’ which involves making an identical copy of the tooth
`
`profile of the customer’s key.” (Dkt. No. 151, at 1.) Plaintiff disputes Defendant’s contention,
`
`as discussed regarding the disputed claim terms construed herein.
`
`
`
`The ’446 Patent, titled “Fully Automatic Self-Service Key Duplicating,” issued on
`
`March 17, 2015, and bears an earliest priority date of June 3, 2010. The ’446 Patent was
`
`originally assigned to Minute Key Inc. (“Minute Key”). The Abstract of the ’446 Patent states:
`
`A self-service, fully-automatic kiosk for duplicating keys includes a kiosk
`housing having a customer interface for receiving payment from a customer for
`the purchase of at least one duplicate of the customer’s key. A key-receiving
`entry in the housing receives at least a portion of the customer’s key to be
`duplicated, and a key analysis system within the housing analyzes the blade of a
`key inserted in the key-receiving entry to determine whether the inserted key
`matches one of a group of preselected key types and, if so, which preselected key
`type is matched. A key blank magazine within the housing stores key blanks for
`each of the preselected key types. A key blank extraction system extracts from
`the magazine a key blank for the preselected key type matched by the blade of the
`key inserted in the key-receiving entry. Then a key duplicating system within the
`kiosk replicates the tooth pattern of the blade of the key inserted in the key-
`receiving entry, on the blade of the extracted key blank.
`
`The ’179 Patent, titled “Self Service Key Duplicating Machine with Automatic Key
`
`
`
`Model Identification System,” issued on March 13, 2018, and bears an earliest priority date of
`
`
`
`
`- 2 -
`
`

`

`Case 2:19-cv-00209-JRG Document 159 Filed 07/02/20 Page 3 of 44 PageID #: 5903
`
`November 28, 2006. The ’179 Patent was originally assigned to Minute Key. The Abstract of
`
`the ’179 Patent states:
`
`A method of duplicating a key includes receiving a master key in a key
`duplicating machine. The machine automatically detects a cross sectional profile
`of the master key. The machine automatically determines, based on the detected
`cross sectional profile, a type and model of the master key. The machine
`automatically selects a key blank that matches the type and model of the master
`key, and then automatically cuts the selected key blank to duplicate a key tooth
`pattern of the master key.
`
`The ’474 Patent, titled “Identification Module for Key Making Machine,” issued on
`
`
`
`September 3, 2019, and bears an earliest priority date of August 16, 2013. Plaintiff is the
`
`original assignee of the ’474 Patent. The Abstract of the ’474 Patent states:
`
`An identification module is disclosed for use in a key making machine. The
`identification module may have a key receiving assembly configured to receive
`only a shank of an existing key. The identification module may also have a tip
`guide, configured to receive a tip of the shank of the existing key. The tip guide
`may have a slot that exposes a tip end of the shank. The identification module
`may also have an imaging assembly configured to capture an image of the tip end
`through the slot.
`
`
`II. LEGAL PRINCIPLES
`
`
`
`It is understood that “[a] claim in a patent provides the metes and bounds of the right
`
`which the patent confers on the patentee to exclude others from making, using or selling the
`
`protected invention.” Burke, Inc. v. Bruno Indep. Living Aids, Inc., 183 F.3d 1334, 1340 (Fed.
`
`Cir. 1999). Claim construction is clearly an issue of law for the court to decide. Markman v.
`
`Westview Instruments, Inc., 52 F.3d 967, 970–71 (Fed. Cir. 1995) (en banc), aff’d, 517 U.S. 370
`
`(1996).
`
`
`
`“In some cases, however, the district court will need to look beyond the patent’s intrinsic
`
`evidence and to consult extrinsic evidence in order to understand, for example, the background
`
`science or the meaning of a term in the relevant art during the relevant time period.” Teva
`
`
`
`
`- 3 -
`
`

`

`Case 2:19-cv-00209-JRG Document 159 Filed 07/02/20 Page 4 of 44 PageID #: 5904
`
`Pharm. USA, Inc. v. Sandoz, Inc., 135 S. Ct. 831, 841 (2015) (citation omitted). “In cases where
`
`those subsidiary facts are in dispute, courts will need to make subsidiary factual findings about
`
`that extrinsic evidence. These are the ‘evidentiary underpinnings’ of claim construction that we
`
`discussed in Markman, and this subsidiary factfinding must be reviewed for clear error on
`
`appeal.” Id. (citing 517 U.S. 370).
`
`
`
`To ascertain the meaning of claims, courts look to three primary sources: the claims, the
`
`specification, and the prosecution history. Markman, 52 F.3d at 979. The specification must
`
`contain a written description of the invention that enables one of ordinary skill in the art to make
`
`and use the invention. Id. A patent’s claims must be read in view of the specification, of which
`
`they are a part. Id. For claim construction purposes, the description may act as a sort of
`
`dictionary, which explains the invention and may define terms used in the claims. Id. “One
`
`purpose for examining the specification is to determine if the patentee has limited the scope of
`
`the claims.” Watts v. XL Sys., Inc., 232 F.3d 877, 882 (Fed. Cir. 2000).
`
`
`
`Nonetheless, it is the function of the claims, not the specification, to set forth the limits of
`
`the patentee’s invention. Otherwise, there would be no need for claims. SRI Int’l v. Matsushita
`
`Elec. Corp., 775 F.2d 1107, 1121 (Fed. Cir. 1985) (en banc). The patentee is free to be his own
`
`lexicographer, but any special definition given to a word must be clearly set forth in the
`
`specification. Intellicall, Inc. v. Phonometrics, Inc., 952 F.2d 1384, 1388 (Fed. Cir. 1992).
`
`Although the specification may indicate that certain embodiments are preferred, particular
`
`embodiments appearing in the specification will not be read into the claims when the claim
`
`language is broader than the embodiments. Electro Med. Sys., S.A. v. Cooper Life Scis., Inc., 34
`
`F.3d 1048, 1054 (Fed. Cir. 1994).
`
`
`
`
`- 4 -
`
`

`

`Case 2:19-cv-00209-JRG Document 159 Filed 07/02/20 Page 5 of 44 PageID #: 5905
`
`
`
`This Court’s claim construction analysis is substantially guided by the Federal Circuit’s
`
`decision in Phillips v. AWH Corp., 415 F.3d 1303 (Fed. Cir. 2005) (en banc). In Phillips, the
`
`court set forth several guideposts that courts should follow when construing claims. In
`
`particular, the court reiterated that “the claims of a patent define the invention to which the
`
`patentee is entitled the right to exclude.” Id. at 1312 (quoting Innova/Pure Water, Inc. v. Safari
`
`Water Filtration Sys., Inc., 381 F.3d 1111, 1115 (Fed. Cir. 2004)). To that end, the words used
`
`in a claim are generally given their ordinary and customary meaning. Id. The ordinary and
`
`customary meaning of a claim term “is the meaning that the term would have to a person of
`
`ordinary skill in the art in question at the time of the invention, i.e., as of the effective filing date
`
`of the patent application.” Id. at 1313. This principle of patent law flows naturally from the
`
`recognition that inventors are usually persons who are skilled in the field of the invention and
`
`that patents are addressed to, and intended to be read by, others skilled in the particular art. Id.
`
`
`
`Despite the importance of claim terms, Phillips made clear that “the person of ordinary
`
`skill in the art is deemed to read the claim term not only in the context of the particular claim in
`
`which the disputed term appears, but in the context of the entire patent, including the
`
`specification.” Id. Although the claims themselves may provide guidance as to the meaning of
`
`particular terms, those terms are part of “a fully integrated written instrument.” Id. at 1315
`
`(quoting Markman, 52 F.3d at 978). Thus, the Phillips court emphasized the specification as
`
`being the primary basis for construing the claims. Id. at 1314–17. As the Supreme Court stated
`
`long ago, “in case of doubt or ambiguity it is proper in all cases to refer back to the descriptive
`
`portions of the specification to aid in solving the doubt or in ascertaining the true intent and
`
`meaning of the language employed in the claims.” Bates v. Coe, 98 U.S. 31, 38 (1878). In
`
`addressing the role of the specification, the Phillips court quoted with approval its earlier
`
`
`
`
`- 5 -
`
`

`

`Case 2:19-cv-00209-JRG Document 159 Filed 07/02/20 Page 6 of 44 PageID #: 5906
`
`observations from Renishaw PLC v. Marposs Societa’ per Azioni, 158 F.3d 1243, 1250 (Fed. Cir.
`
`1998):
`
`Ultimately, the interpretation to be given a term can only be determined and
`confirmed with a full understanding of what the inventors actually invented and
`intended to envelop with the claim. The construction that stays true to the claim
`language and most naturally aligns with the patent’s description of the invention
`will be, in the end, the correct construction.
`
`Phillips, 415 F.3d at 1316. Consequently, Phillips emphasized the important role the
`
`specification plays in the claim construction process.
`
`
`
`The prosecution history also continues to play an important role in claim interpretation.
`
`Like the specification, the prosecution history helps to demonstrate how the inventor and the
`
`United States Patent and Trademark Office (“PTO”) understood the patent. Id. at 1317. Because
`
`the file history, however, “represents an ongoing negotiation between the PTO and the
`
`applicant,” it may lack the clarity of the specification and thus be less useful in claim
`
`construction proceedings. Id. Nevertheless, the prosecution history is intrinsic evidence that is
`
`relevant to the determination of how the inventor understood the invention and whether the
`
`inventor limited the invention during prosecution by narrowing the scope of the claims. Id.; see
`
`Microsoft Corp. v. Multi-Tech Sys., Inc., 357 F.3d 1340, 1350 (Fed. Cir. 2004) (noting that
`
`“a patentee’s statements during prosecution, whether relied on by the examiner or not, are
`
`relevant to claim interpretation”).
`
`
`
`Phillips rejected any claim construction approach that sacrificed the intrinsic record in
`
`favor of extrinsic evidence, such as dictionary definitions or expert testimony. The en banc court
`
`condemned the suggestion made by Texas Digital Sys., Inc. v. Telegenix, Inc., 308 F.3d 1193
`
`(Fed. Cir. 2002), that a court should discern the ordinary meaning of the claim terms (through
`
`dictionaries or otherwise) before resorting to the specification for certain limited purposes.
`
`
`
`
`- 6 -
`
`

`

`Case 2:19-cv-00209-JRG Document 159 Filed 07/02/20 Page 7 of 44 PageID #: 5907
`
`Phillips, 415 F.3d at 1319–24. According to Phillips, reliance on dictionary definitions at the
`
`expense of the specification had the effect of “focus[ing] the inquiry on the abstract meaning of
`
`words rather than on the meaning of claim terms within the context of the patent.” Id. at 1321.
`
`Phillips emphasized that the patent system is based on the proposition that the claims cover only
`
`the invented subject matter. Id.
`
`
`
`Phillips does not preclude all uses of dictionaries in claim construction proceedings.
`
`Instead, the court assigned dictionaries a role subordinate to the intrinsic record. In doing so, the
`
`court emphasized that claim construction issues are not resolved by any magic formula. The
`
`court did not impose any particular sequence of steps for a court to follow when it considers
`
`disputed claim language. Id. at 1323–25. Rather, Phillips held that a court must attach the
`
`appropriate weight to the intrinsic sources offered in support of a proposed claim construction,
`
`bearing in mind the general rule that the claims measure the scope of the patent grant.
`
`III. AGREED TERMS
`
`
`
`In their May 15, 2020 Amended Joint Claim Construction and Prehearing Statement
`
`(Dkt. No. 146) and in their June 9, 2020 Joint Claim Construction Chart Under P.R. 4-5(d) (Dkt.
`
`No. 155, Ex. A), the parties submitted the following agreements:
`
`
`Term
`
`
`“controllable drive coupled to said magazine”
`
`(’446 Patent, Claims 9, 40, 66, 92)
`
`“a guard adjacent said key receiving entry to
`protect the head of a key protruding from said
`entry from accidental contact”
`
`(’446 Patent, Claims 22, 53, 78, 103)
`
`
`
`Agreed Construction
`
`
`“a drive motor selectively energized to control
`the movement of said magazine”
`
`
`“a guard adjacent to said key receiving entry to
`protect the head of a key inserted in the kiosk
`from being bumped during a key duplication
`process”
`
`
`
`
`
`- 7 -
`
`

`

`Case 2:19-cv-00209-JRG Document 159 Filed 07/02/20 Page 8 of 44 PageID #: 5908
`
`“configured to exchange communications”
`
`(’474 Patent, Claims 11–19)
`
`“channel profile”
`
`(’474 Patent, All Claims)
`
`“a bitting pattern of an existing key”
`
`(’474 Patent, Claims 20)
`
`“the determined bitting pattern”
`
`(’474 Patent, Claims 1–19)
`
`
`
`“configured to send and receive information”
`
`sizes, and/or
`
`locations of
`
`shapes,
`“the
`channels”
`
`
`“the tooth pattern of an existing key”
`
`the existing key
`tooth pattern of
`“the
`determined by the imaging system”
`
`IV. DISPUTED TERMS
`
`A. “configured to replicate the tooth pattern of the blade of said key inserted in said key
`receiving entry”
`
`
`“configured to replicate the tooth pattern of the blade of said key inserted in
`said key receiving entry”
`(Term 1)1
`(’446 Patent, All Asserted Claims)
`
`
`Plaintiff’s Proposed Construction
`
`Defendant’s Proposed Construction
`
`“configured to make a copy of the tooth pattern
`of the blade of the customer’s key inserted into
`said key-receiving entry”
`
`
`(Dkt. No. 146, App’x A, at 1; Dkt. No. 142, at 3; Dkt. No. 151, at 2; Dkt. No. 155, Ex. A, at 1.)
`
`“configured to make an identical copy of the
`tooth pattern of the blade of the customer’s key
`inserted into said key-receiving entry”
`
`
`
`
`
`
`(1) The Parties’ Positions
`
`Plaintiff argues that “the copy has to work in that it has to be able to operate the same
`
`lock as the master key,” but “it need not be a perfect copy, an exact copy, or an identical copy.”
`
`
`1 The “Term” numbers set forth in this Claim Construction Memorandum and Order refer to
`numbering used by the parties. (See Dkt. No. 146, App’x A; see also Dkt. No. 142, at 3 n.2.)
`
`
`
`
`- 8 -
`
`

`

`Case 2:19-cv-00209-JRG Document 159 Filed 07/02/20 Page 9 of 44 PageID #: 5909
`
`(Dkt. No. 142, at 4.) Plaintiff argues that this “common-sense understanding” is also consistent
`
`with the specification. (Id., at 4; see id. at 4–7.) Plaintiff also emphasizes that “[t]he word
`
`‘identical’ is nowhere to be found in any of the specifications when addressing duplicated keys,
`
`tooth patterns, or bitting patterns.” (Id., at 7.) Plaintiff also cites dependent claims that
`
`“include[e] a new limitation for removing certain imperfections in the copy.” (Id., at 8.)
`
`Further, Plaintiff cites embodiments in which a key is cut based on a “code” associated with a
`
`master key rather than based on the master key itself, such that “any slight imperfections or
`
`nominal deviations in the master key from wear, usage, etc., will not be present in the code-cut
`
`duplicate.” (Id., at 9.) Plaintiff concludes that “[a]dding a superlative (‘identical copy’) merely
`
`stacks the deck in KeyMe’s favor in a way that is inconsistent with the disclosed inventions.”
`
`(Id., at 11.)
`
`
`
`Defendant responds that mechanical trace cutting is the only disclosed technique. (Dkt.
`
`No. 151, at 2–3.) Defendant argues that different patents, not the patents-in-suit, are directed to
`
`techniques other than trace cutting, and such techniques do not necessarily reproduce the tooth
`
`pattern of a customer key. (Id., at 3–5.) Defendant urges that the evidence distinguishes
`
`between replicating a key and merely producing a duplicate that will work in the same lock. (Id.,
`
`at 5–6.) Defendant also submits that its proposal does not exclude “minute flaws” and “does not
`
`require replicating non-geometric features such as material, color, or an American Flag pattern,
`
`or any feature of the key head, which is not part of the blade and does not have a tooth pattern.”
`
`(Id., at 7.) Further, Defendant argues that judicial estoppel precludes Plaintiff from contesting
`
`Defendant’s proposed interpretation. (Id., at 7–9.)
`
`
`
`Plaintiff replies that “[t]here is no basis to limit all three patents to a single ‘mechanical
`
`trace cutting’ embodiment,” “[a]nd ‘mechanical trace cutting’ does not necessarily yield
`
`
`
`
`- 9 -
`
`

`

`Case 2:19-cv-00209-JRG Document 159 Filed 07/02/20 Page 10 of 44 PageID #: 5910
`
`‘identical copies.’” (Dkt. No. 154, at 1.) Plaintiff emphasizes that the specification discloses
`
`other duplication techniques, such as code cutting and optical trace cutting, and “[t]he
`
`specification emphasizes the standard time and again—the copied ‘bitting pattern’ must be able
`
`to open the lock, it need not be ‘identical’ to the original.” (Id., at 1–2.) Plaintiff concludes:
`
`“The term ‘copy’ properly captures the scope of the inventions. As is clear from the
`
`specifications, the scope of the claims contemplate that the newly cut key (or tooth pattern or
`
`bitting pattern) can open the same lock as the original key despite recognized differences,
`
`‘microscopic,’ ‘minute,’ aesthetic, or otherwise.” (Id., at 4.)
`
`
`
`At the June 23, 2020 hearing, Defendant argued that this disputed term does not
`
`encompass code cutting because the phrase “said key” in this disputed term refers to the inserted
`
`key, not a factory pattern. Plaintiff reiterated that the specification refers to code cutting and that
`
`code cutting has been well known in the art.
`
`
`
`
`
`(2) Analysis
`
`The Background of the Invention section of the ’446 Patent discloses:
`
`Duplicate keys are typically cut from pre-existing master keys using a hand-
`operated table-top tool having two clamps, a cutting wheel, a follower and a
`cleaning wheel. There is a long-felt need for a fully automatic key identifying
`and/or duplicating machine that can provide a duplicate key for an ordinary
`consumer in a manner as easy as purchasing an item from a vending machine or
`receiving money from an automated teller machine.
`
`’446 Patent at 1:19–26.
`
`
`
`Claim 1 of the ’446 Patent, for example, recites (emphasis added):
`
`1. A self-service kiosk for duplicating keys, comprising:
`a kiosk housing having a customer interface configure [sic] to receive
`
`payment from a customer for the purchase of at least one duplicate of the
`customer’s key,
`
`a key-receiving entry in said housing configured to receive at least a
`portion of the customer’s key to be duplicated, wherein the key-receiving entry
`
`
`
`
`- 10 -
`
`

`

`Case 2:19-cv-00209-JRG Document 159 Filed 07/02/20 Page 11 of 44 PageID #: 5911
`
`blocks insertion of the head of an inserted key so that only the blade of an inserted
`key extends into the kiosk housing,
`
`a key analysis system within said housing configured to analyze the blade
`of a key inserted in said key-receiving entry to determine whether the inserted key
`matches one of a group of preselected key types and, if so, which preselected key
`type is matched,
`
`a key blank magazine within said housing configured to store key blanks
`for each of said preselected key types,
`
`a key blank extraction system configured to extract from said magazine a
`key blank for the preselected key type matched by the blade of said key inserted
`in said key-receiving entry,
`a key duplicating system within said kiosk configured to replicate the
`
`tooth pattern of the blade of said key inserted in said key-receiving entry, on the
`blade of said extracted key blank, and
`
`a key-removal exit in said housing providing customer access to the key
`with the replicated tooth pattern for removal from the kiosk.
`
`The claims here at issue use “replicate” in the context of producing a key (referred to as a
`
`
`
`“duplicate”) based on an existing key (referred to as a “master” or as an “original”). A duplicate
`
`should be able to open the same locks as the master. The parties agree that the master and the
`
`duplicate can differ in various ways that do not affect the ability of the duplicate to open the
`
`same locks as the master, such as differences in material and differences in aesthetic design. For
`
`example, the specification refers to “key blanks of . . . different styles (plain brass, colored flag
`
`pattern, colored flower pattern, etc.).” ’446 Patent at 6:10–13; see id. at 13:36–38 (“different
`
`styles”).
`
`
`
`The parties also agree that the duplicate need not be perfectly identical to the master.
`
`This understanding is consistent with disclosures and dependent claims regarding “de-burring” a
`
`newly cut key. See, e.g., ’446 Patent at Cl. 11; id. at 17:45–52 (“the tooth edges of the key blank
`
`that are first engaged by the de-burring wheel 141 are the edges last engaged by the cutting
`
`wheel 131, which are the edges that contain any burrs or other debris remaining from the cutting
`
`operation”). This understanding is also consistent with evidence cited by Plaintiff that a
`
`
`
`
`- 11 -
`
`

`

`Case 2:19-cv-00209-JRG Document 159 Filed 07/02/20 Page 12 of 44 PageID #: 5912
`
`duplication process can correct for flaws in a master key. (See Dkt. No. 142, Ex. 13, U.S. Patent
`
`No. 8,682,468 at Fig. 8.)
`
`
`
`Defendant’s proposal of “identical” is therefore potentially misleading and confusing.
`
`Indeed, in prior instances the Court has found that absolutes in claim constructions are
`
`disfavored. See, e.g., Colorquick, LLC v. Eastman Kodak Co., No. 6:06-CV-390, 2008 WL
`
`5771324, at *14 (E.D. Tex. June 25, 2008) (Love, J.) (“Using the word ‘identical’ implies a level
`
`of perfect correlation that is not necessarily always possible between an image on a screen and a
`
`printed document.”).
`
`
`
`The parties dispute whether a duplicate can be produced merely from information about
`
`the master or rather must be produced by physically tracing the tooth pattern2 of the master
`
`(sometimes referred to as “mechanical trace cutting”). The key issue, so to speak, is whether
`
`“replicate” encompasses techniques other than trace cutting, such as “code cutting.” Code
`
`cutting involves matching the master with a manufacturing code and then cutting the duplicate
`
`based on tooth pattern information associated with the code.3 Defendant urges that “replicate” is
`
`limited to tracing.
`
`
`2 The “tooth pattern” of a key can interact with pins inside a lock so as to enable the lock to be
`turned by the key. The “tooth pattern” is sometimes referred as a “bitting pattern.”
`
`3 Plaintiff cites numerous references regarding code cutting (Dkt. No. 142, at 8 n.4):
`
`See, e.g., [Dkt. No. 142,] Ex. 5 (U.S. Patent No. 2,731,087 (col. 1:22–23)
`(disclosing an invention “to cut keys after an established pattern or code with
`regard to the depth and location of the bits to be formed on the key blank”)); Ex. 6
`(U.S. Patent No. 5,271,698 (col. 35:28–31) (“creating a duplicate key by using
`factory numerical or alphanumeric key duplicating codes”)); Ex. 7 (U.S. Patent
`No. 5,676,504 (describing extensive art relating to creating “a duplicate key”
`using code-cutting from numerical codes associated with the master key (col. 1:5–
`2:64) and disclosing a “key cutting machine [that] can electronically duplicate a
`bit notch pattern defined by a key code without reference to the master key bit
`notch pattern” (col. 3:5–7))); Ex. 8 (Marc Weber Tobias, Locks, Safes, and
`
`- 12 -
`
`
`
`

`

`Case 2:19-cv-00209-JRG Document 159 Filed 07/02/20 Page 13 of 44 PageID #: 5913
`
`
`
`Defendant emphasizes disclosures that relate to mechanical tracing, such as disclosure of
`
`using a “follower”:
`
`FIG. 58 is a diagrammatic plan view of a master key clamped for engagement by
`a follower and a key blank clamped to be cut to reproduce the tooth profile of the
`master key.
`
` *
`
` * *
`
`
`Key duplication requires analysis of the master key to determine the model and
`tooth pattern of the master key, and then reproducing that tooth pattern on a key
`blank of the same model as the master key. It is generally necessary to have the
`master key stationary and to firmly hold the key blank while reproducing the
`tooth pattern.
`
`’446 Patent at 4:4–7 & 4:32–37 (emphasis added); see id. at 16:38–45 (“Thus, the cutting wheel
`
`131 cuts a tooth pattern in the clamped key blank B that reproduces the tooth pattern of the
`
`master key K . . . .”) & 17:3–13 (“the carrier 134 moves the follower along the blade of the
`
`master key K, and the blade of the key blank B across the cutting wheel 131, to cut a tooth
`
`pattern in the key blank that reproduces the tooth pattern of the master key”); see also id. at
`
`Figs. 58–59.
`
`
`
`The specification also discloses:
`
`While particular embodiments and applications of the present invention have been
`illustrated and described, it is to be understood that the invention is not limited to
`the precise construction and compositions disclosed herein and that various
`modifications, changes, and variations may be apparent from the foregoing
`descriptions without departing from the spirit and scope of the invention as
`defined in the appended claims. For example, the master key inserted by the
`customer could be analyzed and matched to an original code that is then used to
`control the cutting of the duplicate key(s), rather than using the master key as a
`real-time pattern for cutting the duplicate.
`
`’446 Patent at 20:58–21:2 (emphasis added). The ’446 Patent cites various references that
`
`disclose techniques related to producing a duplicate key other than mechanical trace cutting.
`
`
`Security, An International Police Reference, 160, § 4.3.3 “Duplicating Keys by
`Code” (2nd ed. 2000)); Ex. 9 (Lockwiki); Ex. 10 (Wikipedia).
`
`
`
`
`- 13 -
`
`

`

`Case 2:19-cv-00209-JRG Document 159 Filed 07/02/20 Page 14 of 44 PageID #: 5914
`
`(See id. at p. 2 (citing references); see also Dkt. No. 151, Ex. A, U.S. Patent No. 5,676,504
`
`(“Mueller”) at 2:66–3:7; id., Ex. B, U.S. Patent No. 5,807,042 (“Almblad”) at 4:33–37; id. at
`
`Exs. C & D.) For example, the “Marsh” reference discloses inferring the “factory specifications
`
`of the bitting of the to-be-copied key” and cutting “to these factory specifications instead of
`
`merely replicating the original key’s bitting profile.” (Id., Ex. D, U.S. Patent No. 8,682,468 at
`
`10:66–11:5; see id., Ex. C, U.S. Patent No. 6,064,747 (“Wills”) at 2:17–27 (“the depths of the
`
`cuts . . . are modified to be the closest or most likely cut depth from the factory specifications”).)
`
`
`
`Defendant cites authority that the claims need not necessary encompass all embodiments.
`
`See TIP Sys., LLC v. Phillips & Brooks/Gladwin, Inc., 529 F.3d 1364, 1373 (Fed. Cir. 2008)
`
`(“Our precedent is replete with examples of subject matter that is included in the specification,
`
`but is not claimed.”); see also SRI Int’l v. Matsushita Elec. Corp. of Am., 775 F.2d 1107, 1121
`
`(Fed. Cir. 1985) (“If everything in the specification were required to be read into the claims . . .
`
`there would be no need for claims.”).
`
`
`
`Nonetheless, Defendant fails to demonstrate that the word “replicate” warrants excluding
`
`techniques that produce a duplicate key without tracing a master key, particularly given that the
`
`above-cited intrinsic evidence demonstrates that a duplicate key can serve its purpose without
`
`having been trace cut. Defendant argues that the above-reproduced disclosure contrasts code
`
`cutting with “using the master as a real-time pattern for cutting the duplicate.” ’446 Patent at
`
`20:58–21:2. Any such contrast between trace cutting and code cutting embodiments, however,
`
`does not warrant interpreting the disputed term as excluding code cutting.
`
`
`
`Finally, Defendant also cites positions taken by Plaintiff in relation to litigation in the
`
`Southern District of Ohio in 2013. In that litigation, Minute Key asserted United States Patent
`
`No. 8,532,809 (“the ’809 patent”) (Dkt. No. 151, Ex. G). The ’809 Patent resulted from a
`
`
`
`
`- 14 -
`
`

`

`Case 2:19-cv-00209-JRG Document 159 Filed 07/02/20 Page 15 of 44 PageID #: 5915
`
`continuation of a continuation-in-part of the application that issued as the ’446 Patent. The ’809
`
`Patent is thus related to the ’446 Patent. Claim 1 of the ’809 Patent includes language that is
`
`identical to the present disputed term in the ’446 Patent except that Claim 1 of the ’809 Patent
`
`uses the phrase “for replicating” instead of the phrase “configured to replicate.” Defendant
`
`submits that in a letter from Plaintiff to Wal-Mart Stores Inc. (one of Plaintiff’s customers),
`
`Plaintiff stated as follows regarding the recited “key duplication [sic] system” (this letter became
`
`an exhibit to the Complaint in the Ohio action):
`
`Hillman’s structure for duplicating a key is also significantly different than the
`structure in the ‘809 patent that corresponds to the “key duplication system.”
`Minute Key’s corresponding structure inc

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket