throbber
Case 2:19-cv-00209-JRG Document 142 Filed 05/12/20 Page 1 of 37 PageID #: 4241
`
`IN THE UNITED STATES DISTRICT COURT
`FOR THE EASTERN DISTRICT OF TEXAS
`MARSHALL DIVISION
`
`
`THE HILLMAN GROUP, INC.,
`
`
`Plaintiff,
`
`
`v.
`
`KEYME, LLC,
`
`
`
`
`
`Case No. 2:19-cv-00209-JRG
`
`
`JURY TRIAL DEMANDED
`
`Defendant.
`
`
`
`
`
`PLAINTIFF THE HILLMAN GROUP, INC.’S
`OPENING CLAIM CONSTRUCTION BRIEF
`
`
`
`
`
`
`
`

`

`Case 2:19-cv-00209-JRG Document 142 Filed 05/12/20 Page 2 of 37 PageID #: 4242
`
`
`
`I.
`
`II.
`
`TABLE OF CONTENTS
`
`Introduction ..........................................................................................................................1
`
`The Law Governing Claim Construction .............................................................................2
`
`III.
`
`Disputed Claim Terms .........................................................................................................3
`
`A.
`
`The So-Called “Identical” Terms .............................................................................3
`
`1.
`
`2.
`
`3.
`
`4.
`
`5.
`
`The Specifications Establish That Strict Identicality Is Not
`Required .......................................................................................................4
`
`The Claim Language Defeats KeyMe’s Strict Identicality Position ............7
`
`KeyMe’s Strict Identicality Limitation Would Expressly Exclude
`an Embodiment in Contravention of Governing Law ..................................8
`
`KeyMe’s Dictionary Definitions Cannot Override the Intrinsic
`Record ..........................................................................................................9
`
`Claim Constructions Laden With Superlatives Are Routinely
`Rejected......................................................................................................10
`
`B.
`
`Key Analysis System .............................................................................................12
`
`1.
`
`2.
`
`Overview of the “Key Analysis System” ...................................................13
`
`35 U.S.C. § 112, ¶6 Does Not Apply .........................................................13
`
`a)
`
`b)
`
`c)
`
`The Claim Language Connotes Structure ......................................14
`
`The Prosecution History Confirms that §112, ¶6 Does Not
`Govern............................................................................................17
`
`KeyMe Fails to Meet Its Burden to Overcome the
`Presumption that § 112, ¶6 Does Not Govern ...............................19
`
`3.
`
`The Specification Discloses Mechanical, Optical, and Electronic
`Structures Corresponding to the “Key Analysis System” ..........................21
`
`C.
`
`D.
`
`E.
`
`Matches Preselected Key Types ............................................................................22
`
`Queue .....................................................................................................................23
`
`Key Duplicating System ........................................................................................25
`
`1.
`
`35 U.S.C. § 112, ¶6 Does Not Apply .........................................................25
`
`i
`
`

`

`Case 2:19-cv-00209-JRG Document 142 Filed 05/12/20 Page 3 of 37 PageID #: 4243
`
`
`
`2.
`
`3.
`
`4.
`
`The Claimed “Key Duplicating System” Connotes Structure ...................26
`
`KeyMe Includes Structure that Is Not Linked to the Claimed
`Function .....................................................................................................28
`
`KeyMe’s “Mechanical Trace-Cutting” Characterization
`Contravenes Express Disclosure in the Specification ................................29
`
`IV.
`
`Conclusion .........................................................................................................................30 
`
`ii
`
`

`

`Case 2:19-cv-00209-JRG Document 142 Filed 05/12/20 Page 4 of 37 PageID #: 4244
`
`
`
`Federal Cases
`
`TABLE OF AUTHORITIES
`
`
`
`Page(s)
`
`Am. Piledriving Equip., Inc. v. Geoquip, Inc.,
`637 F.3d 1324 (Fed. Cir. 2011)..................................................................................................2
`
`Apex Inc. v. Raritan Comput., Inc.,
`325 F.3d 1364 (Fed. Cir. 2003)..........................................................................................14, 26
`
`Apple Inc. v. Motorola, Inc.,
`757 F.3d 1286 (Fed. Cir. 2014)........................................................................................ passim
`
`Avid Tech. v. Harmonic, Inc.,
`2013 WL 12334592 (D. Del., April 15, 2013)...................................................................22, 30
`
`Aylus Networks, Inc. v. Apple Inc.,
`856 F.3d 1353 (Fed. Cir. 2017)..................................................................................................2
`
`Blitzsafe Tex., LLC v. Subaru Corp.,
`2018 WL 6504174 (E.D. Tex., Dec. 11, 2018) ..................................................................14, 20
`
`Budde v. Harley-Davidson, Inc.,
`250 F.3d 1369 (Fed. Cir. 2000)................................................................................................22
`
`Charles E. Hill & Assoc. v. Amazon.com,
`2005 U.S. Dist. LEXIS 45414 (E.D. Tex., Oct. 7, 2005) ....................................................8, 29
`
`Colorquick, LLC v. Eastman Kodak Co.,
`2008 WL 5771324 (E.D. Tex., June 25, 2008) ........................................................................11
`
`Free Stream Media Corp. v. Alphonso Inc.,
`2017 WL 1165578 (E.D. Tex., Mar. 29, 2017) ...........................................................15, 16, 26
`
`Genzyme Corp. v. Atrium Medical Corp.,
`212 F.Supp.2d 292 (D. Del. 2002) ...........................................................................................22
`
`Gestion Proche, Inc. v. Dialight Corp.,
`2017 WL 2834695 (E.D. Tex., June 30, 2017) ........................................................................11
`
`Inventio AG v. ThyssenKrupp Elevator Americas Corp.,
`649 F.3d 1350 (Fed. Cir. 2011)..........................................................................................17, 27
`
`Ishida Co. v. Taylor,
`221 F.3d 1310 (Fed. Cir. 2000)................................................................................................22
`
`iii
`
`

`

`Case 2:19-cv-00209-JRG Document 142 Filed 05/12/20 Page 5 of 37 PageID #: 4245
`
`
`
`Markman v. Westview Instruments, Inc.
`52 F.3d 967 (Fed. Cir. 1995) (en banc) ..............................................................................18, 26
`
`Medtronic, Inc. v. Advanced Cardiovascular Sys., Inc.,
`248 F.3d 1303 (Fed. Cir. 2001)................................................................................................23
`
`Nichia Corp. v. Everlight Elecs. Co.,
`2014 WL 7149169 (E.D. Tex., Dec. 12, 2014) ........................................................................11
`
`Northrop Grumman Corp. v. Intel Corp.,
`325 F.3d 1346 (Fed. Cir. 2003)................................................................................................29
`
`Optis Wireless Tech., LLC v. Huawei Device Co.,
`2018 WL 476054 (E.D. Tex., Jan. 18, 2018) .............................................................................9
`
`Panoptis Patent Mgmt., LLC v. Blackberry Ltd.,
`2017 WL 497571 (E.D. Tex., Feb. 7, 2017) ............................................................................16
`
`PerdiemCo, LLC v. IndusTrack, LLC,
`2016 WL 3633627 (E.D. Tex., July 7, 2017) ..........................................................................20
`
`Personalized Media Commc’ns., LLC v. Motorola, Inc.,
`2011 WL 4591898 (E.D. Tex., Sept. 30, 2011) .......................................................................11
`
`Phillips v. AWH Corp.,
`415 F.3d 1303 (Fed. Cir. 2005) (en banc) ..................................................................................2
`
`Rockwell Automation, Inc. v. 3-S Smart Software Solutions, GMBH,
`2016 WL 5811485 (E.D. Tex., Oct. 5, 2016) ..........................................................................20
`
`TEK Global, S.R.L. v. Sealant Sys. Int’l,
`920 F.3d 777 (Fed. Cir. 2019)............................................................................................17, 18
`
`Uniloc 2017 LLC v. Google LLC,
`2020 WL 512605 (E.D. Tex., Jan. 30, 2020) ...........................................................................23
`
`United States Surgical Corp. v. Ethicon, Inc.,
`103 F.3d 1554 (Fed. Cir. 1997)................................................................................................23
`
`Va. Innovation Scis., Inc. v. Amazon.com, Inc.,
`2019 WL 4259020 (E.D. Tex. Sept. 9, 2019) ..........................................................................20
`
`Wenger Mfg. v. Coating Mach. Sys., Inc.,
`239 F.3d 1225 (Fed. Cir. 2001)................................................................................................30
`
`Federal Statutes
`
`35 U.S.C. § 112, ¶6 ................................................................................................................ passim
`
`iv
`
`

`

`Case 2:19-cv-00209-JRG Document 142 Filed 05/12/20 Page 6 of 37 PageID #: 4246
`
`
`I.
`
`Introduction
`
`The parties before the Court compete in the market for machines that copy keys. The
`
`competing machines at issue in this litigation are fully contained, self-service kiosks located in
`
`hardware stores, grocery stores, home improvement stores, and other commercial retail locations.
`
`Hillman’s Minute Key “v3” Machine 

`
`KeyMe’s Locksmith in a Box Machine 
`

`

`The parties are currently before the Court on claim construction. There are three patents in suit,
`
`Hillman’s U.S. Patent Nos. 8,979,446 (Ex. 1) (Fig. 1 shown below); 9,914,179 (Ex. 2); and 10,400,474
`
`(Ex. 3). The inventions claimed in these patents solve a number of
`
`challenging problems. Legacy key cutting technologies, machines, and
`
`processes required a great deal of labor and capital. Keys needed to be cut by
`
`trained technicians using specialized equipment. Hardware stores needed to
`
`maintain square footage for key cutting machines and a massive inventory of
`
`different types of key blanks to service their customers. And consumers
`
`needed to tolerate long lines, inconvenient hours and locations, and sometimes
`
`even faulty keys (mis-cuts) made by rushed or novice technicians.
`
`1
`
`

`

`Case 2:19-cv-00209-JRG Document 142 Filed 05/12/20 Page 7 of 37 PageID #: 4247
`
`
`
`The inventions and the machines involved in this litigation represent the culmination of years
`
`of technological advances aimed at automating the once cumbersome and inconvenient key cutting
`
`process. The patents involve not only core technical innovations that enable the accurate cutting of
`
`keys, but also critical innovations that enable an acceptable user experience. With the advent of these
`
`technologies, the key cutting process has been automated and incorporated into a convenient, easy to
`
`use, self-service kiosk. Everything from managing the inventory of the key blanks to be cut, to
`
`monitoring the machine for maintenance issues, to setting the consumer at ease during the cutting
`
`process, to taking payment from the customer, to actually cutting new keys has been automated and
`
`incorporated into the machines. The patent claims involved in this dispute are directed to the
`
`fundamental technologies that have enabled the significant advance from the cumbersome legacy key
`
`cutting process to the now convenient state-of-the-art experience.
`
`II.
`
`The Law Governing Claim Construction
`
`The words of a patent claim are generally given their ordinary and customary meaning.
`
`Phillips v. AWH Corp., 415 F.3d 1303, 1312 (Fed. Cir. 2005) (en banc). “Ordinary and customary
`
`meaning” is “the meaning that the [claim language] would have to a person of ordinary skill in the art
`
`at the time of the invention.” Am. Piledriving Equip., Inc. v. Geoquip, Inc., 637 F.3d 1324, 1332 (Fed.
`
`Cir. 2011). The patent specification is often the “single best guide to the meaning of a disputed term.”
`
`Phillips, 415 F.3d at 1315. The prosecution history also serves as important intrinsic evidence of the
`
`meaning of claim terms. Aylus Networks, Inc. v. Apple Inc., 856 F.3d 1353, 1361 (Fed. Cir. 2017).
`
`Extrinsic evidence, such as dictionary definitions, may be considered but is “less significant than the
`
`intrinsic record.” Phillips, 415 F.3d at 1317.
`
`
`
`2
`
`

`

`Case 2:19-cv-00209-JRG Document 142 Filed 05/12/20 Page 8 of 37 PageID #: 4248
`
`
`III. Disputed Claim Terms
`A.
`
`The So-Called “Identical” Terms
`
`Conjuring the image of prosecutor James Trotter III’s farcical argument in the cult classic
`
`comedy, My Cousin Vinny, (“I--DENTICAL”), KeyMe argues that the Court should impose the term
`
`“identical” on six different claim limitations across all three patents-in-suit, despite that the term
`
`“identical” appears nowhere in the claims or even the specification. The following six disputed claim
`
`elements involve some variation of the claim language “replicate” or “duplicate” as applied to the
`
`customer’s original or master key. The only dispute between the parties for these six terms is whether
`
`the elements require a “copy” (Hillman’s position) or an “identical copy” (KeyMe’s position).1
`
`Ref. No.2
`1
`
`3
`
`
`13
`
`’446 claim term
`“configured to
`replicate the tooth
`pattern of the blade of
`said key inserted in
`said key receiving
`entry” [all asserted
`claims]
`
`“at least one
`duplicate” [all asserted
`claims]
`’179 claim term
`“configured to cut the
`selected key blank to
`duplicate a key tooth
`pattern of the master
`key” [all asserted
`claims]
`
`Hillman’s Construction
`“configured to make a copy
`of the tooth pattern of the
`blade of the customer’s key
`inserted into said key-
`receiving entry”
`
`KeyMe’s Construction
` “configured to make an identical
`copy of the tooth pattern of the
`blade of the customer’s key
`inserted into said key-receiving
`entry”
`
`“at least one copy of”
`
`Plain and ordinary meaning
`
`Hillman’s Construction
`“configured to cut the
`selected key blank to make
`a copy of a key tooth pattern
`of the master key”
`
`KeyMe’s Construction
`“configured to cut the selected
`key blank to make an identical
`copy of a key tooth pattern of the
`master key”
`
`
`1Two weeks ago, KeyMe changed its construction for three of these terms from “identical copy” to
`“plain and ordinary meaning.” Compare Dkt. No. 116 with Dkt. No. 135. But KeyMe would neither
`accept Hillman’s proposed construction nor otherwise disavow its earlier position that the claims
`require strict identicality. So the dispute regarding the appropriate scope of these terms remains,
`notwithstanding KeyMe’s belated switch to “plain and ordinary meaning.”
`
`2The Ref. Nos. in this brief correspond to those used in the P.R. 4-3 disclosures (Dkt. Nos. 116, 135).
`
`3
`
`

`

`Case 2:19-cv-00209-JRG Document 142 Filed 05/12/20 Page 9 of 37 PageID #: 4249
`
`
`
`
`21
`
`22
`
`26
`
`’474 claim term
`“configured to . . . cut
`the determined bitting
`pattern into a key
`blank” / “the
`determined bitting
`pattern” [claims 1-19]
`
`Hillman’s Construction
`“configured to … make a
`copy of the tooth pattern of
`the existing key determined
`by the imaging system” /
`“the tooth pattern of the
`existing key determined by
`the imaging system”
`
`“key duplication
`process” [claims 1-19]
`
`“process of making a copy
`of a key”
`
`“duplicated key”
`[claims 7, 19]
`
`“a copy of a key”
`
`KeyMe’s Construction
`“configured to … make an
`identical copy of the tooth pattern
`of the existing key determined by
`the imaging system” / “the tooth
`pattern of the existing key
`determined by the imaging
`system”
`Plain and ordinary meaning
`
`Plain and ordinary meaning
`
`Hillman’s proposed constructions require that the claimed “duplication” or “replication” must
`
`result in a “copy” of the customer’s original or master key. Consistent with the specifications of all
`
`three patents, the copy has to work in that it has to be able to operate the same lock as the master key.
`
`Beyond that, it need not be a perfect copy, an exact copy, or an identical copy. KeyMe’s addition of
`
`the superlative “identical” before the word “copy” in all of these otherwise agreed upon constructions
`
`reflects (six times over) a thinly veiled non-infringement position. KeyMe contends that its machines
`
`do not “duplicate” or “replicate,” even though they make a copy of a key that will open the same lock
`
`as the original master key, because KeyMe’s experts will be able to find some nominal variation or
`
`other difference when comparing the original key to the copy under a microscope. But the claim
`
`construction required to support KeyMe’s non-infringement argument—strict identicality—is at odds
`
`with the entire intrinsic record.
`
`1.
`
`The Specifications Establish That Strict Identicality Is Not Required
`
`The specifications describe the level of similarity required between the operative “tooth
`
`pattern” or “bitting pattern” of a master key and that of a “duplicated” or “replicated” key. Namely, a
`
`key (or its tooth pattern) has been effectively “duplicated” or “replicated” according to the claimed
`
`inventions if the copy can open the same lock as the master key. This common-sense understanding of
`
`the inventions is explicitly confirmed by the specification of the ’474 patent, which explains that a key
`
`4
`
`

`

`Case 2:19-cv-00209-JRG Document 142 Filed 05/12/20 Page 10 of 37 PageID #: 4250
`
`
`blank includes “blade 12 with a single relatively thinner lengthwise outer edge 46 that is configured to
`
`be notched in a particular pattern (shown in phantom lines as notches 49) corresponding to the lock
`
`intended to receive blade 12 . . .” Ex. 3 (’474 col. 3:66-4:2) (emphasis added).
`
`
`Id. (Fig. 1A) (annotated). Naturally, keys are consistently disclosed as being directly associated with
`
`their attendant locks: “a user generates torque within blade 12, causing an associated lock to turn and
`
`open or close.” Id. (col. 3:57-58). And the specific pattern of notches to be cut into a key blank,
`
`shown by the phantom lines in Fig. 1A above, are also consistently disclosed as corresponding to a
`
`lock: “the pattern being variable and corresponding to the lock intended to receive blade 12.” Id. (col.
`
`4:17-18) (emphasis added).
`
`The phantom lines corresponding to the lock are described “notches” or “patterns of bitting
`
`notches” that are cut into key blanks based on information derived from the master key. Specifically,
`
`data regarding the master key is collected by the “identification module” from cameras, lasers,
`
`scanners, or other techniques. See, e.g., Ex. 3 (’474 col. 9:49-10:14; 10:48-59). The identification
`
`module measures “the pattern of existing notches 49 [] in the master key.” Id. (col. 17:52). Then the
`
`fabrication system “make[s] desired patterns of bitting notches 49 within the key blanks based on
`
`identification data received form the identification module.” Id. (col. 11:42-45).
`
`Like Hillman’s proposed constructions, the specification explains that this process results in
`
`copying the bitting patterns: “key making machine 100 [] can be used to create within key blade 12 a
`
`new bitting pattern or a copied bitting pattern of an existing key.” Id. (col. 7:14-15) (emphasis added).
`
`The duplicated key is described as having a “copied bitting pattern” or as being a “match” of the
`
`5
`
`

`

`Case 2:19-cv-00209-JRG Document 142 Filed 05/12/20 Page 11 of 37 PageID #: 4251
`
`
`master key, with the expressly stated goal in all instances being “to ensure that the duplicate key
`
`functions in the same manner as the master key.” Id. (col. 7:25-27; 18:4-49; 22:26-27). This common-
`
`sense functional standard does not require strict identicality, exact matches, or perfect measurements.
`
`The disputed claim language of the ’474 patent merely requires a “bitting pattern” that will operate the
`
`associated lock, nothing more. Neither the concept of identicality, nor even the term, are mentioned
`
`anywhere in the three specifications.
`
`
`
`Simply put, a “duplicated” or “replicated” key (or “tooth pattern” or “bitting pattern” as the
`
`case may be) in accordance with the disclosed inventions is a copy that opens the associated lock.
`
`That is what the ’474 patent specification means when it discloses bitting patterns that “correspond to
`
`the lock” and keys that “function in the same manner as the master key.” The goal as described in the
`
`specification is to avoid “mis-cuts” (“keys that do not function” and must be returned), not to achieve
`
`some other strict metaphysical identicality with the master key. Id. (col. 15:32; 19:18-19; 20:21-31).
`
`The specifications of the ’179 and ’446 patents are in complete accord with the disclosure of
`
`the ’474 patent. They speak of customers using the claimed automated kiosk to “obtain accurate
`
`duplicate keys,” not strictly identical duplicate keys. Ex. 2 (’179 col. 2:19); Ex. 4 (U.S. Patent
`
`Publication No. 2008/0145163 (“the ’163” or “the ’163 application”) at [0007]);3 Ex. 1 (’446 col.
`
`12:33-36). The disputed claim language of the ’179 and ’446 patents (reciting a replicated or
`
`duplicated “tooth pattern”) is repeatedly characterized in the specifications of those patents as merely
`
`requiring a “tooth pattern” that is cut “in accordance with the tooth pattern” of the master key. Ex. 2
`
`(’179 col. 3:6-8; 5:39-41; 7:55-57; 10:64-66); Ex. 4 (’163 [0010], [0022], [0033], [0065]). The
`
`language “in accordance with” in no way suggests or implies strict identicality in every sense (i.e.,
`
`something more than a copy that opens the same lock). The duplicated or replicated tooth patterns
`
`3 KeyMe concedes, correctly, that the ’163 application is part of the specification of the ’446 patent.
`See, e.g., KeyMe P.R. 4-3 disclosures at Dkt. No. 135 at Appx. C (“U.S. Patent Publication No.
`2008/0145163, incorporated by reference at 12:33-36 of the ’446 patent”).
`
`6
`
`

`

`Case 2:19-cv-00209-JRG Document 142 Filed 05/12/20 Page 12 of 37 PageID #: 4252
`
`
`need not be perfect copies, identical copies, exact copies, or any other type of superlative copies.
`
`Rather, they have to be “accurate” in that they work the lock (i.e., not “mis-cuts”).
`
`
`
`There is no reasonable reading of any of the specifications that would demand strict identicality
`
`between master keys and copies in some other aspect (i.e., beyond that they open the same lock). The
`
`word “identical” is nowhere to be found in any of the specifications when addressing duplicated keys,
`
`tooth patterns, or bitting patterns. And there is nothing else, not even an exemplary embodiment,
`
`requiring such a strict identicality standard. If anything, the specifications all point in the other
`
`direction—disclosing that a duplicate must be able to open the lock, but expressly contemplating non-
`
`identicality in all other aspects. For instance, the ’446 specification discloses that a customer can
`
`choose from “different styles [of keys] (plain brass, colored flag pattern, colored flower pattern, etc.).”
`
`Ex. 1 (’446 col. 6:10-13; 13:36-38). Similarly, the ’474 specification discloses that customers can
`
`chose from different graphic designs, colors, and shapes for the “duplicate key’s head.” Ex. 3 (’474
`
`col. 7:61-66). And the ’179 specification discloses that key blanks will be stocked in different colors.
`
`Ex. 2 (’179 col. 3:18-20). Given that all three specifications expressly contemplate a variety of
`
`different style and color choices for the duplicated key, KeyMe’s position requiring strict identicality
`
`between the master key and the duplicate lacks credibility. By the express disclosure in the
`
`specifications, a painted American Flag key is still a claimed “duplicate key” (even if the master key
`
`was a plain brass key), as long as it opens the same lock despite its differences, cosmetic or otherwise.
`
`
`
`All embodiments in all three specifications demonstrate that strict identicality is not required.
`
`According to the specifications, where a copy opens the same lock as the original, it possesses the
`
`requisite similarity with the original to meet the “replicate” or “duplicate” limitations of the claims.
`
`2.
`
`The Claim Language Defeats KeyMe’s Strict Identicality Position
`
`Unsurprisingly, the claims are consistent with the specifications in the fundamental
`
`understanding that the claimed “tooth pattern” or “bitting pattern” need not be strictly identical with
`
`that of the master key. In particular, the claims of the ’446 patent establish that the claimed “replicated
`7
`
`

`

`Case 2:19-cv-00209-JRG Document 142 Filed 05/12/20 Page 13 of 37 PageID #: 4253
`
`
`tooth pattern” is not strictly identical to the tooth pattern of the master key for the additional reason
`
`that a “replicated tooth pattern” has imperfections known as flashes and burrs. Ex. 1 (’446 col. 6:29-
`
`30; 17:23-24, 45-52); Ex. 4 (’163 [0090] (“the cleaning wheel . . . remove[s] flashes and burrs from the
`
`trailing edge of the newly cut duplicate key”)). Dependent claim 11 adds a limitation for
`
`“automatically de-burring the tooth pattern replicated on the blade.” Ex. 1 (’446 col. 22:16-19). This
`
`narrowing limitation, while not requiring strict identicality, nevertheless results in a copy that is closer,
`
`in comparison, to the original master by including a new limitation for removing certain imperfections
`
`in the copy. But by requiring strict identicality in the independent claims, KeyMe’s construction
`
`improperly “moots these dependent claims by resulting in a construction of the independent claims
`
`which is actually more narrow than the dependent claims.” Charles E. Hill & Assoc. v. Amazon.com,
`
`2005 U.S. Dist. LEXIS 45414, *38-39 (E.D. Tex., Oct. 7, 2005). Because the claims expressly
`
`demonstrate that the “replicated tooth pattern” in the ’446 patent can have imperfections when
`
`compared to the master key, a construction requiring “replicated tooth pattern” to be strictly identical
`
`to the tooth pattern of the master key would be facially incorrect.
`
`3.
`
`KeyMe’s Strict Identicality Limitation Would Expressly Exclude an
`Embodiment in Contravention of Governing Law
`
`
`
`The ’446 patent discloses an embodiment where the master key is “analyzed and matched to an
`
`original code that is then used to control the cutting of the duplicate key(s), rather than using the
`
`master key as a real-time pattern for cutting the duplicate.” Ex. 1 (’446 col. 20:65-21:2). It has long
`
`been well-known in the art that the tooth pattern of a master key is represented by a numerical or
`
`alphanumeric “code” that signifies the depths and locations of cuts along the tooth pattern.4 The
`
`
`4 See, e.g., Ex. 5 (U.S. Patent No. 2,731,087 (col. 1:22-23) (disclosing an invention “to cut keys after
`an established pattern or code with regard to the depth and location of the bits to be formed on the key
`blank”)); Ex. 6 (U.S. Patent No. 5,271,698 (col. 35:28-31) (“creating a duplicate key by using factory
`numerical or alphanumeric key duplicating codes”)); Ex. 7 (U.S. Patent No. 5,676,504 (describing
`extensive art relating to creating “a duplicate key” using code-cutting from numerical codes associated
`with the master key (col. 1:5-2:64) and disclosing a “key cutting machine [that] can electronically
`(continued on next page)
`
`8
`
`

`

`Case 2:19-cv-00209-JRG Document 142 Filed 05/12/20 Page 14 of 37 PageID #: 4254
`
`
`disclosed embodiment in the ’446 patent employs “code-cutting” where the master key’s code is
`
`determined and used as the basis for the duplicate. Ex. 1 (’446 col. 20:65-21:2). Because the master
`
`key is not used “as a real-time pattern for cutting the duplicate,” any slight imperfections or nominal
`
`deviations in the master key from wear, usage, etc., will not be present in the code-cut duplicate. Yet
`
`KeyMe’s construction—requring strict identicality with the master key—completely eviscerates the
`
`disclosed code-cutting embodiment. Because it excludes the code cutting embodiment (as well as the
`
`other embodiments contemplating differences between the duplicated key and the master key),
`
`KeyMe’s construction contravenes the established claim construction cannon that counsels against
`
`excluding disclosed embodiments. Optis Wireless Tech., LLC v. Huawei Device Co., 2018 WL
`
`476054, *11 (E.D. Tex., Jan. 18, 2018) citing Accent Packaging, Inc. v. Legget & Platt, Inc., 707 F.3d
`
`1318, 1326 (Fed. Cir. 2013) (“Huawei’s construction, which requires ‘only,’ can be read to exclude the
`
`disclosed coding embodiment. A construction that excludes embodiments is rarely correct.”).
`
`4.
`
`KeyMe’s Dictionary Definitions Cannot Override the Intrinsic Record
`
`Lacking evidentiary support from the intrinsic record, KeyMe proffers a host of general
`
`purpose dictionaries for the terms “replicate” and “duplicate.” Dkt. No. 135, Appx. C. Unsurprisingly,
`
`some of these definitions are consistent with the concept of strict identicality. But for every general
`
`purpose dictionary definition suggesting strict identicality, there is another suggesting the opposite.
`
`For example, Merriam-Webster’s Collegiate Dictionary includes the following definitions for
`
`the term “duplicate”: “one that resembles or corresponds to another”; “to make a copy of <a cell ~
`
`itself when it divides>”; and “to produce something equal to <trying to ~ last year’s success.” Ex. 11.
`
`And the same dictionary defines “replicate” as “to undergo replication,” where “replication” is defined
`
`(continued from previous page)
`duplicate a bit notch pattern defined by a key code without reference to the master key bit notch
`pattern” (col. 3:5-7))); Ex. 8 (Marc Weber Tobias, Locks, Safes, and Security, An International Police
`Reference, 160, § 4.3.3 “Duplicating Keys by Code” (2nd ed. 2000)); Ex. 9 (Lockwiki); Ex. 10
`(Wikipedia).
`
`9
`
`

`

`Case 2:19-cv-00209-JRG Document 142 Filed 05/12/20 Page 15 of 37 PageID #: 4255
`
`
`as “the action or process of reproducing or duplicating.” Id. None of these definitions require strict
`
`identicality. And all of them support Hillman’s position that “duplicate” and “replicate” are properly
`
`understood as requiring a “copy,” nothing more. If dictionary definitions are helpful at all, the more
`
`pertinent Professional LOCKSMITH Dictionary defines “duplicate” as “to copy.” Ex. 12. In other
`
`words, strict identicality is not a concept found in pertinent special purpose dictionaries.
`
`Moreover, to the extent that extrinsic evidence is necessary to determine whether a person of
`
`skill in the art would understand the claim language as requiring strict identicality, KeyMe’s own
`
`disclosures in its own patents on that exact issue are far more instructive than KeyMe’s proffered
`
`general purpose dictionary definitions. In KeyMe’s invention entitled “SYSTEMS AND METHODS
`
`FOR DUPLICATING KEYS” the inventors (including KeyMe’s founder and CEO along with four
`
`other KeyMe engineers) unquestionably recognize that a “duplicated key” is not strictly identical to the
`
`original. Ex. 13 (U.S Patent No. 8,682,468). This is readily apparent as KeyMe expressly illustrates
`
`differences and flaws between the “original key” and the “duplicated key” in the ’468 patent:
`
`
`
`Id. (’468 Fig. 8). So the argument that a person of skill in the art would understand the term
`
`“duplicate” to require strict identicality is belied not only by both general purpose and special purpose
`
`dictionaries, but also by KeyMe’s own use of the term in its ’468 patent.
`
`5.
`
`Claim Constructions Laden With Superlatives Are Routinely Rejected
`
`
`
`As a factual matter, experts at trial will need to evaluate the original and copied keys against
`
`some standard to determine whether they achieve the requisite level of similarity to meet the
`
`“duplicate” or “replicate” limitations. Hillman submits that the standard is supplied by the
`
`10
`
`

`

`Case 2:19-cv-00209-JRG Document 142 Filed 05/12/20 Page 16 of 37 PageID #: 4256
`
`
`specification (i.e., whether the copy works the lock), and that Hillman’s proposed constructions—
`
`requiring “copies”—properly captures the scope of the invention. “Copy” already presupposes a high
`
`degree of similarity. Adding a superlative (“identical copy”) merely stacks the deck in KeyMe’s favor
`
`in a way that is inconsistent with the disclosed inventions.
`
`KeyMe’s strategy has

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket