throbber
Case 2:19-cv-00209-JRG Document 158 Filed 06/30/20 Page 1 of 128 PageID #: 5773
`
`1
`
`VS.
`
`IN THE UNITED STATES DISTRICT COURT
`FOR THE EASTERN DISTRICT OF TEXAS
`MARSHALL DIVISION
`THE HILLMAN GROUP, INC.
`)(
`
`)(
`CIVIL ACTION NO.
`)(
`2:19-CV-209-JRG
`)(
`MARSHALL, TEXAS
`)(
`JUNE 23, 2020
`)(
`9:03 A.M.
`)(
`CLAIM CONSTRUCTION HEARING
`BEFORE THE HONORABLE JUDGE RODNEY GILSTRAP
`UNITED STATES CHIEF DISTRICT JUDGE
`
`KEYME, LLC
`
`FOR THE PLAINTIFF: (See Attorney Attendance Sheet docketed
` in minutes of this hearing.)
`
`FOR THE DEFENDANT: (See Attorney Attendance Sheet docketed
` in minutes of this hearing.)
`
`COURT REPORTER:
`
`Shelly Holmes, CSR, TCRR
`Official Reporter
`United States District Court
`Eastern District of Texas
`Marshall Division
`100 E. Houston Street
`Marshall, Texas 75670
`(903) 923-7464
`
`(Proceedings recorded by mechanical stenography, transcript
`produced on a CAT system.)
`
`1 2 3 4 5 6 7 8 9
`
`10
`11
`12
`13
`14
`15
`16
`17
`18
`19
`20
`21
`22
`23
`24
`25
`
`

`

`Case 2:19-cv-00209-JRG Document 158 Filed 06/30/20 Page 2 of 128 PageID #: 5774
`
`2
`
`I N D E X
`
`June 23, 2020
`
`Appearances
`Hearing
`Court Reporter's Certificate
`
`
`Page
`1
`3
`128
`
`1 2 3 4 5 6 7 8 9
`
`10
`11
`12
`13
`14
`15
`16
`17
`18
`19
`20
`21
`22
`23
`24
`25
`
`

`

`Case 2:19-cv-00209-JRG Document 158 Filed 06/30/20 Page 3 of 128 PageID #: 5775
`
`3
`
`COURT SECURITY OFFICER: All rise.
`THE COURT: Be seated, please.
`Good morning, counsel. This is the time set for
`claim construction in The Hillman Group versus KeyMe
`matter. This is Civil Case No. 2:19-CV-209.
`The Court will call for announcements at this
`
`time.
`
`What says the Plaintiff, The Hillman Group?
`MR. FINDLAY: Good morning, Your Honor. Eric
`Findlay on behalf of The Hillman Group. Also with me,
`Mr. John Williamson, Mr. Ryan O'Quinn, and Brian Craft, and
`we're ready to proceed.
`THE COURT: All right. Thank you.
`What's the announcement from Defendant, KeyMe?
`MR. DACUS: Good morning, Your Honor. Deron Dacus
`on behalf of Defendant, KeyMe. And here me is Dave Nelson,
`Jeff Nardinelli, Sean Pak, and Eric Huang, and we're ready
`to proceed, Your Honor.
`THE COURT: All right. Thank you.
`Counsel, as you're aware, I typically take up
`claim construction disputes on a term-by-term basis. I'm
`aware that the parties have made their desires known by way
`of email to the Court as to the groupings or order for the
`disputed terms to be considered and argued this morning. I
`plan to follow what you've requested. I see no problems
`
`1 2 3 4 5 6 7 8 9
`
`10
`11
`12
`13
`14
`15
`16
`17
`18
`19
`20
`21
`22
`23
`24
`25
`
`09:03:14
`
`09:03:16
`
`09:03:21
`
`09:04:18
`
`09:04:24
`
`09:04:28
`
`09:04:31
`
`09:04:32
`
`09:04:38
`
`09:04:39
`
`09:04:44
`
`09:04:45
`
`09:04:46
`
`09:04:48
`
`09:04:50
`
`09:04:52
`
`09:04:57
`
`09:05:01
`
`09:05:01
`
`09:05:03
`
`09:05:13
`
`09:05:16
`
`09:05:22
`
`09:05:25
`
`09:05:29
`
`

`

`Case 2:19-cv-00209-JRG Document 158 Filed 06/30/20 Page 4 of 128 PageID #: 5776
`
`4
`
`with that.
`Consequently, we'll begin with "configured to
`replicate the tooth pattern of the blade of said key
`inserted in said key-receiving entry." We'll follow that
`by the 13th term, which is "configured to cut the selected
`key blank to duplicate the key tooth pattern of the master
`key"; followed by "configured to cut the determined bitting
`pattern into a key blank," Term 21; then Term 3, "at least
`one duplicate"; and then Term 22, "key duplication
`process"; and then Term 26, "duplicated key." That will be
`our first group, and we'll follow that order.
`We'll start with Term 1 -- Disputed Term 1,
`"configured to replicate the tooth pattern," et cetera.
`And let me hear from Plaintiff on this one first.
`MR. FINDLAY: May I approach, Your Honor?
`THE COURT: You may.
`Counsel, you may proceed when you're ready.
`MR. O'QUINN: Good morning, Your Honor. Ryan
`O'Quinn for the Plaintiff, The Hillman Group.
`And the parties have agreed to argue Claim Term
`Nos. 1, 3, 13, 21, 22, and 26, as Your Honor just listed as
`a group because they all center around pretty much the
`exact same dispute. And we called them the identicality
`disputes.
`THE COURT: That's probably a good way to say it.
`
`1 2 3 4 5 6 7 8 9
`
`10
`11
`12
`13
`14
`15
`16
`17
`18
`19
`20
`21
`22
`23
`24
`25
`
`09:05:33
`
`09:05:36
`
`09:05:41
`
`09:05:47
`
`09:05:52
`
`09:05:56
`
`09:06:02
`
`09:06:06
`
`09:06:12
`
`09:06:20
`
`09:06:26
`
`09:06:28
`
`09:06:30
`
`09:06:32
`
`09:06:39
`
`09:06:42
`
`09:06:59
`
`09:07:01
`
`09:07:02
`
`09:07:04
`
`09:07:09
`
`09:07:16
`
`09:07:18
`
`09:07:22
`
`09:07:24
`
`

`

`Case 2:19-cv-00209-JRG Document 158 Filed 06/30/20 Page 5 of 128 PageID #: 5777
`
`5
`
`MR. O'QUINN: Okay. So, you know, you -- you have
`just read for us the -- the claim terms. The parties have
`made different proposed constructions based around those
`terms, but the differences boil down to one simple thing
`here on Slide 6. All of Hillman's proposed constructions
`were duplicating the bitting pattern of a key, replicating
`the bitting pattern of a key, or duplicating a key in
`general, boiling down to make a copy of that key.
`Whereas KeyMe's proposed construction of the same
`terms boiled down to making an identical copy. The only
`difference between the constructions, the only dispute
`between the parties is the superlative "identical" that
`KeyMe seeks to include.
`Now, the specifications of the three
`patents-in-suit make clear that the purpose of key
`duplication is to open a lock. And you can see this in the
`specification here on Slide 7 in the '474 patent.
`The point is to make a key that corresponds to the lock
`intended to receive the key blade.
`Key duplication is an art that's as old as
`preventing access, as old as doors, as old as locks. And
`the entire point in the field and the art of key
`duplication is making not a key that's an exact match of
`the customer or the person's existing key, it's making a
`key that will open the same lock as that first key.
`
`1 2 3 4 5 6 7 8 9
`
`10
`11
`12
`13
`14
`15
`16
`17
`18
`19
`20
`21
`22
`23
`24
`25
`
`09:07:26
`
`09:07:29
`
`09:07:34
`
`09:07:37
`
`09:07:41
`
`09:07:45
`
`09:07:50
`
`09:07:55
`
`09:07:58
`
`09:08:01
`
`09:08:04
`
`09:08:07
`
`09:08:11
`
`09:08:13
`
`09:08:15
`
`09:08:18
`
`09:08:22
`
`09:08:26
`
`09:08:30
`
`09:08:35
`
`09:08:38
`
`09:08:42
`
`09:08:45
`
`09:08:49
`
`09:08:53
`
`

`

`Case 2:19-cv-00209-JRG Document 158 Filed 06/30/20 Page 6 of 128 PageID #: 5778
`
`6
`
`And so it's well-known in the art that the -- the
`purpose of key duplication is to make accurate keys that
`will enter the same lock. It's not to per -- perfectly and
`identically duplicate that key.
`THE COURT: I understand the difference between
`code cutting and trace cutting, if that will help you --
`MR. O'QUINN: Okay, Your Honor.
`THE COURT: -- get us down to the bottom line.
`MR. O'QUINN: Perhaps, yes.
`The main portion of this -- of this dispute is the
`fact that the word "identical" does not appear in any of
`the specifications or in any of the claims. The '446 and
`'179 specifications do not contain the word "identical" at
`all. The '474 contains it only once in a completely
`irrelevant context that you see here.
`KeyMe refers in the briefing to the intrinsic
`record, but what they're referring to is random patents
`cited on the face of the patent that were submitted during
`prosecution. They were not raised during the prosecution
`with the USPTO. They were not used in any way to
`distinguish over a prior art rejection.
`The intrinsic record, the specification, the
`claims, the prosecution history, makes no mention of
`identicality. It makes a mention of making a copy only of
`the key.
`
`1 2 3 4 5 6 7 8 9
`
`10
`11
`12
`13
`14
`15
`16
`17
`18
`19
`20
`21
`22
`23
`24
`25
`
`09:08:56
`
`09:08:58
`
`09:09:03
`
`09:09:08
`
`09:09:10
`
`09:09:12
`
`09:09:16
`
`09:09:17
`
`09:09:19
`
`09:09:19
`
`09:09:23
`
`09:09:25
`
`09:09:31
`
`09:09:34
`
`09:09:38
`
`09:09:40
`
`09:09:44
`
`09:09:48
`
`09:09:51
`
`09:09:55
`
`09:09:57
`
`09:09:58
`
`09:10:01
`
`09:10:04
`
`09:10:08
`
`

`

`Case 2:19-cv-00209-JRG Document 158 Filed 06/30/20 Page 7 of 128 PageID #: 5779
`
`7
`
`THE COURT: Let me ask you this, counsel.
`Defendants have made it clear in their briefing that
`they're not talking about identical on an atomic level,
`that we're not talking about the arrangement of protons and
`neutrons and electrons, that we're not talking about
`identical in the theoretical to the nth degree, that there
`are tiny differences and imperfections that would be
`recognized and permissible even within Defendant's notion
`of identicality.
`So if that's the case, what's the problem with it?
`MR. O'QUINN: That was actually where I was headed
`on my next slide, Your Honor, is if -- if KeyMe concedes
`that identical means there can still be minute differences,
`we're talking about minute technology, so where do we draw
`the line as to what is identical and what isn't? How do
`you know if you infringe a claim?
`For example, when I duplicate a key, I often have
`what's called burrs or flashes on that key. It's little
`metallic leftovers that are left over -- I can see them.
`They're not microscopic. And, in fact, I can cut my finger
`on them if I'm not careful. The key that I stuck into the
`machine to duplicate it doesn't have those, and so there
`are clear differences between the key that I put into the
`machine and the key that I got out of the machine.
`And with any engineering application, there's
`
`1 2 3 4 5 6 7 8 9
`
`10
`11
`12
`13
`14
`15
`16
`17
`18
`19
`20
`21
`22
`23
`24
`25
`
`09:10:09
`
`09:10:12
`
`09:10:14
`
`09:10:20
`
`09:10:23
`
`09:10:29
`
`09:10:35
`
`09:10:38
`
`09:10:41
`
`09:10:42
`
`09:10:48
`
`09:10:50
`
`09:10:54
`
`09:10:57
`
`09:11:00
`
`09:11:05
`
`09:11:05
`
`09:11:09
`
`09:11:12
`
`09:11:16
`
`09:11:18
`
`09:11:22
`
`09:11:24
`
`09:11:27
`
`09:11:29
`
`

`

`Case 2:19-cv-00209-JRG Document 158 Filed 06/30/20 Page 8 of 128 PageID #: 5780
`
`8
`
`going to be tolerances. There's going to be allowed
`differences. And that's why Hillman's construction of a
`copy instead of an identical copy recognizes that position
`in the art.
`Indeed, no embodiment in the specification of any
`of these patents-in-suit requires or could achieve
`identicality. It simply is not possible to make a
`perfectly identical copy of two keys. And so KeyMe's
`proposed construction would exclude every embodiment in all
`three specifications.
`THE COURT: Tell me this, with regard to the
`accused products here, when a customer walks up to one of
`the Defendant's kiosks and sticks a key out of their pocket
`into the slot to receive that key, how is the decision made
`as to whether to trace cut that key to make the duplicate
`and in effect copy the key out of the customer's pocket as
`opposed to code cutting the key and using a pre-determined
`code that's transmitted to the device so that it's not a
`copy of the key that came out of the customer's pocket but
`a copy of the key when it was first made and put into the
`customer's pocket? How does the accused product know which
`method to pursue if I walk up and take the key to my front
`door at my house and stick it in the kiosk?
`MR. O'QUINN: We are still reviewing their code
`and their documents, Your Honor, and I also don't want to
`
`1 2 3 4 5 6 7 8 9
`
`10
`11
`12
`13
`14
`15
`16
`17
`18
`19
`20
`21
`22
`23
`24
`25
`
`09:11:32
`
`09:11:36
`
`09:11:41
`
`09:11:45
`
`09:11:45
`
`09:11:50
`
`09:11:53
`
`09:11:57
`
`09:12:01
`
`09:12:04
`
`09:12:05
`
`09:12:08
`
`09:12:11
`
`09:12:15
`
`09:12:20
`
`09:12:24
`
`09:12:29
`
`09:12:32
`
`09:12:40
`
`09:12:43
`
`09:12:45
`
`09:12:51
`
`09:12:57
`
`09:12:59
`
`09:13:01
`
`

`

`Case 2:19-cv-00209-JRG Document 158 Filed 06/30/20 Page 9 of 128 PageID #: 5781
`
`9
`
`say anything in open court that would bar a protective
`order. But our understanding is the analytical system
`within the accused products makes a determination based on
`the cross section of the key, whether it's a key type that
`can readily be duplicated simply by code cutting or whether
`it requires more of a trace cut.
`THE COURT: Okay.
`MR. O'QUINN: And as Your Honor has mentioned
`already, there is code cutting disclosed in the
`specification of the '446 patent.
`KeyMe concedes that in its brief and concedes that
`its construction would exclude that disclosed embodiment.
`This is despite the claim not being limited in any fashion
`and despite code cutting being a long-standing form of key
`duplication.
`The '474 patent, similarly includes a disclosed
`embodiment of what's called optical tracing. It's more of
`an image processing technique where a photograph is taken
`of the bitting pattern, and the profile is then transferred
`to the cutting apparatus to make a copy of the key. That
`embodiment would also be excluded by KeyMe's construction
`of an identical copy.
`KeyMe's own technical tutorial, indeed, recognizes
`that code cutting is one way that that keys, quote, are
`traditionally made and duplicated. And they would now have
`
`1 2 3 4 5 6 7 8 9
`
`10
`11
`12
`13
`14
`15
`16
`17
`18
`19
`20
`21
`22
`23
`24
`25
`
`09:13:03
`
`09:13:06
`
`09:13:09
`
`09:13:13
`
`09:13:17
`
`09:13:21
`
`09:13:23
`
`09:13:24
`
`09:13:30
`
`09:13:35
`
`09:13:37
`
`09:13:40
`
`09:13:43
`
`09:13:46
`
`09:13:51
`
`09:13:51
`
`09:13:56
`
`09:13:59
`
`09:14:03
`
`09:14:07
`
`09:14:11
`
`09:14:14
`
`09:14:18
`
`09:14:21
`
`09:14:23
`
`

`

`Case 2:19-cv-00209-JRG Document 158 Filed 06/30/20 Page 10 of 128 PageID #: 5782
`
`10
`
`that written out of the claim interpretation for this
`lawsuit, mainly for attorney argument purposes.
`There's a non-infringement position and an
`invalidity position perhaps that they're trying to set up.
`But those of skill in this art have long recognized that
`there are many ways to duplicate a key.
`The patents here are not limited to mechanical
`tracing, and even if they were, mechanical tracing itself
`does not produce identical copies. It aims to create a
`copy that matches the keys so that it will operate the same
`lock. But a mechanically-traced duplicate key, as I
`mentioned, will not necessarily be identical. It could
`have those imperfections on it. It could have a different
`style of key. It could be a different length of the key
`blank that still has the same cross section. All of those
`are possibilities, and all of those are examples of
`non-identical duplicate keys.
`THE COURT: There's -- there's a portion of the
`briefing that seems to make much out of what happened in
`the Southern District of Ohio. Why don't you tell me about
`what happened in the Southern District of Ohio and whether
`it matters or doesn't matter in this case.
`MR. O'QUINN: We'll -- we will plan to discuss
`that later, but I can discuss that now because I was
`involved, as well.
`
`1 2 3 4 5 6 7 8 9
`
`10
`11
`12
`13
`14
`15
`16
`17
`18
`19
`20
`21
`22
`23
`24
`25
`
`09:14:27
`
`09:14:30
`
`09:14:34
`
`09:14:36
`
`09:14:39
`
`09:14:44
`
`09:14:48
`
`09:14:52
`
`09:14:56
`
`09:15:00
`
`09:15:05
`
`09:15:10
`
`09:15:12
`
`09:15:15
`
`09:15:18
`
`09:15:22
`
`09:15:25
`
`09:15:28
`
`09:15:30
`
`09:15:36
`
`09:15:38
`
`09:15:40
`
`09:15:43
`
`09:15:45
`
`09:15:47
`
`

`

`Case 2:19-cv-00209-JRG Document 158 Filed 06/30/20 Page 11 of 128 PageID #: 5783
`
`11
`
`In the Southern District of Ohio, this was before
`the Hillman/Minute Key merger, and Hillman had brought a
`declaratory judgment suit of non-infringement against
`Minute Key's patents, one patent of which was a related
`patent to the '446 patent-in-suit.
`Prior to the filing of that lawsuit, at the
`request of Walmart, a mutual customer, counsel for Hillman
`drafted a letter explaining a myriad of potential
`non-infringement positions and invalidity positions that
`they might pursue in a trial based on the innuendo that
`Minute Key had provided in the industry about whether
`Hillman's device infringed.
`So the letter that's being referred to in the
`briefing was before a case was ever filed. It was never
`accepted by a Court. There was never a Markman hearing in
`that Southern District of Ohio case. The patent
`infringement part of that case went away at an early stage,
`and it became an unfair competition Lanham Act case.
`So there was never a position that was adopted by
`a Court in that instance. Indeed, there was never claim
`construction briefing, and there was never any discovery
`that Hillman was able to take before it wrote the letter
`that KeyMe is raising in this brief.
`The '809 patent is a different patent. The claim
`language reads differently. If anything, it supports
`
`1 2 3 4 5 6 7 8 9
`
`10
`11
`12
`13
`14
`15
`16
`17
`18
`19
`20
`21
`22
`23
`24
`25
`
`09:15:48
`
`09:15:53
`
`09:15:57
`
`09:16:01
`
`09:16:04
`
`09:16:09
`
`09:16:10
`
`09:16:15
`
`09:16:19
`
`09:16:23
`
`09:16:29
`
`09:16:32
`
`09:16:34
`
`09:16:37
`
`09:16:41
`
`09:16:47
`
`09:16:49
`
`09:16:52
`
`09:16:57
`
`09:16:59
`
`09:17:03
`
`09:17:06
`
`09:17:10
`
`09:17:13
`
`09:17:17
`
`

`

`Case 2:19-cv-00209-JRG Document 158 Filed 06/30/20 Page 12 of 128 PageID #: 5784
`
`12
`
`Hillman's position in this case because a dependent claim
`in the '809 patent specifically claims mechanical tracing,
`and so if a dependent claim claims mechanical tracing, the
`Independent Claim 1 claims a broader scope.
`THE COURT: All right. What else do you have for
`me on this first term?
`MR. O'QUINN: The identicality dispute also would
`violate the claim construction canon of mooting dependent
`claims. I just gave one example.
`Another example is in the '446 patent, Dependent
`Claim 11 here on the screen on Slide 14. The kiosk of
`Claim 1 in the '446 patent includes a de-burring tool.
`Now, de-burring tool is a -- it's almost like a
`wheel of sandpaper in the kiosk box, and it can rub off
`those metal flashes and burrs that are by-products of the
`duplication process that I mentioned earlier. There would
`be no need for that de-burring wheel if the key was made
`identically and perfectly to begin with. And so if that's
`the construction that's adopted for Claim 1, this dependent
`claim becomes moot.
`Those of skill in the art, as I mentioned,
`understand that duplicate means to copy. The Professional
`Locksmith Dictionary has a definition of duplicate that's
`simple two words, to copy. And they don't use it in a --
`in a manner where the duplication process versus the
`
`1 2 3 4 5 6 7 8 9
`
`10
`11
`12
`13
`14
`15
`16
`17
`18
`19
`20
`21
`22
`23
`24
`25
`
`09:17:21
`
`09:17:23
`
`09:17:28
`
`09:17:35
`
`09:17:37
`
`09:17:38
`
`09:17:40
`
`09:17:44
`
`09:17:45
`
`09:17:48
`
`09:17:52
`
`09:17:55
`
`09:18:00
`
`09:18:03
`
`09:18:09
`
`09:18:14
`
`09:18:17
`
`09:18:20
`
`09:18:23
`
`09:18:28
`
`09:18:30
`
`09:18:33
`
`09:18:36
`
`09:18:41
`
`09:18:44
`
`

`

`Case 2:19-cv-00209-JRG Document 158 Filed 06/30/20 Page 13 of 128 PageID #: 5785
`
`13
`
`duplicating of the key or the duplicate key are different.
`That's the position KeyMe is trying to make here
`is that duplicate, replicate, duplicate should mean one
`thing when it's a modifier of key and another thing when
`it's a modifier of bitting pattern. And that's not how
`people in the art understand it. It's simply to copy.
`And KeyMe's own patents make this clear because
`they in a figure here in their own patent refer to a
`duplicated key and a duplication process of a key here that
`is a non-identical copy of the original key on the left.
`So KeyMe, as well, understood that a duplicated
`key made by a duplication process need not be perfectly
`identical to the original key.
`THE COURT: Let me ask you this. If you -- if you
`take the position for purposes of argument that identical
`goes too far, doesn't just saying a copy not go far enough?
`Doesn't it need some clarification? I mean, what is a
`copy? Is it 51 percent the same, or is it 66 percent the
`same, or is it 91 percent the same?
`Just -- just like your argument on identicality
`that a minute discrepancy would open the door to disputes
`about what's minute or not, at the other end of the
`spectrum, if you just say copy, haven't you opened the door
`to disputes about how much similarity there needs to be to
`become a copy? I mean, isn't that the same argument at the
`
`1 2 3 4 5 6 7 8 9
`
`10
`11
`12
`13
`14
`15
`16
`17
`18
`19
`20
`21
`22
`23
`24
`25
`
`09:18:47
`
`09:18:50
`
`09:18:53
`
`09:18:56
`
`09:18:59
`
`09:19:03
`
`09:19:07
`
`09:19:10
`
`09:19:15
`
`09:19:23
`
`09:19:27
`
`09:19:33
`
`09:19:37
`
`09:19:39
`
`09:19:44
`
`09:19:49
`
`09:19:55
`
`09:19:59
`
`09:20:03
`
`09:20:07
`
`09:20:10
`
`09:20:14
`
`09:20:18
`
`09:20:22
`
`09:20:26
`
`

`

`Case 2:19-cv-00209-JRG Document 158 Filed 06/30/20 Page 14 of 128 PageID #: 5786
`
`14
`
`opposite end of the spectrum? Why is one better than the
`other.
`
`MR. O'QUINN: That's fair, Your Honor. And I
`think we can address that by the two things that have to
`happen for a copy of a key to meet the proposed function of
`the device and of the art.
`It needs to have the right cross section so that
`it can go into the lock to begin with. If you have a
`Kwikset key and your lock is a Schlage-brand lock, you're
`going to just get hit right at the opening because the
`cross section won't allow it in. That has to be one
`element.
`The other element is the bitting pattern has to
`match such that the tumblers are engaged and will all turn.
`If even a single tumbler out of the bits on that key
`doesn't turn, your key gets stuck in the lock and breaks
`off.
`
`So a copy meets the criteria where it will operate
`the lock, and I think that's the line we would draw. It
`needs to match the pattern so that it can perform the same
`function. If I have a pair of socks that match, one of
`them has a hole in it, they still work as socks, they're a
`match. They're not identical.
`THE COURT: Well, keys wear out. And if I take a
`key out of my pocket that is on the verge of not
`
`1 2 3 4 5 6 7 8 9
`
`10
`11
`12
`13
`14
`15
`16
`17
`18
`19
`20
`21
`22
`23
`24
`25
`
`09:20:29
`
`09:20:32
`
`09:20:32
`
`09:20:35
`
`09:20:37
`
`09:20:42
`
`09:20:43
`
`09:20:45
`
`09:20:49
`
`09:20:49
`
`09:20:56
`
`09:20:58
`
`09:20:58
`
`09:21:01
`
`09:21:06
`
`09:21:09
`
`09:21:12
`
`09:21:12
`
`09:21:16
`
`09:21:18
`
`09:21:22
`
`09:21:25
`
`09:21:28
`
`09:21:30
`
`09:21:32
`
`

`

`Case 2:19-cv-00209-JRG Document 158 Filed 06/30/20 Page 15 of 128 PageID #: 5787
`
`15
`
`functioning because it's so worn and I put it in one of
`these accused products and for whatever reason the kiosk
`decides to trace cut instead of code cut, then I got a copy
`of the key that came out of my pocket. And if it's not
`working very well because it's just about worn out, the
`copy I get doesn't work very well either because it's in
`the same position.
`I mean, there again, if you're talking about a
`functionality analysis to determine what's a copy and
`what's not, then you may have problems with the -- the
`creation of the duplicate key to begin, especially if
`you're duplicating one that's on the borderline of not
`functioning because it's so worn. And that happens in the
`real world.
`MR. O'QUINN: It does. I've cut a lot of these
`keys in the last few years. I would offer from your
`hypothetical that the reason your key might be worn is that
`the interior of your lock might be worn. And so if you
`were to get a brand new spanking sharp peak key, it may not
`operate your lock. And even though it may have, you know,
`a perfect -- a trace copy, perfect in the manner it may be,
`might have some of those wear marks and rounded edges that
`your original key has, that's what fits your lock like a
`glove, and that's what makes it work.
`THE COURT: All right. What else on this term?
`
`1 2 3 4 5 6 7 8 9
`
`10
`11
`12
`13
`14
`15
`16
`17
`18
`19
`20
`21
`22
`23
`24
`25
`
`09:21:37
`
`09:21:40
`
`09:21:46
`
`09:21:52
`
`09:21:54
`
`09:21:57
`
`09:22:01
`
`09:22:02
`
`09:22:05
`
`09:22:08
`
`09:22:15
`
`09:22:20
`
`09:22:23
`
`09:22:27
`
`09:22:28
`
`09:22:29
`
`09:22:30
`
`09:22:33
`
`09:22:36
`
`09:22:42
`
`09:22:44
`
`09:22:48
`
`09:22:54
`
`09:22:57
`
`09:23:00
`
`

`

`Case 2:19-cv-00209-JRG Document 158 Filed 06/30/20 Page 16 of 128 PageID #: 5788
`
`16
`
`MR. O'QUINN: This is all I have, Your Honor.
`THE COURT: Let me hear a response from the
`Defendant.
`MR. NELSON: Good morning, Your Honor. Dave
`Nelson on behalf of Defendant, KeyMe.
`THE COURT: Good morning. Please proceed.
`MR. NELSON: Thank you, sir. So if I we could
`start with Slide 6 --
`MR. DACUS: Your Honor, may I approach with the
`slides?
`THE COURT: You may.
`MR. NELSON: Oh, I apologize, Your Honor. It's
`been too long since I've been in court. I keep forgetting
`things.
`
`THE COURT: Well, we'll endeavor to knock-off the
`
`rust.
`
`MR. NELSON: Thank you.
`THE COURT: Go right ahead.
`MR. NELSON: And I'll let Mr. Dacus finish here.
`So we agree with -- with counsel for Plaintiff
`that the issue really does come down to the same thing for
`all these terms. And -- and particularly the terms are the
`three sets that are configured to replicate the tooth
`pattern of the blade of said key inserted in the receiving
`entry. That's Term 1.
`
`1 2 3 4 5 6 7 8 9
`
`10
`11
`12
`13
`14
`15
`16
`17
`18
`19
`20
`21
`22
`23
`24
`25
`
`09:23:01
`
`09:23:03
`
`09:23:04
`
`09:23:04
`
`09:23:11
`
`09:23:12
`
`09:23:14
`
`09:23:19
`
`09:23:20
`
`09:23:22
`
`09:23:22
`
`09:23:23
`
`09:23:24
`
`09:23:29
`
`09:23:29
`
`09:23:33
`
`09:23:33
`
`09:23:33
`
`09:23:34
`
`09:23:37
`
`09:23:44
`
`09:23:47
`
`09:23:51
`
`09:23:54
`
`09:24:00
`
`

`

`Case 2:19-cv-00209-JRG Document 158 Filed 06/30/20 Page 17 of 128 PageID #: 5789
`
`17
`
`Term 13, configured to cut the selected key length
`to duplicate a key tooth pattern of the master key.
`And then Claim 20 -- or Term 21, configured to cut
`the determined bitting pattern into a key blank.
`Those are the terms that really come down to the
`question are the claims limited to trace cutting. Your
`Honor, the other three terms, as we covered in the
`briefing, are really not relevant to the dispute between
`the parties. You know, in terms of duplicating a key, Your
`Honor has already noted there are many ways to duplicate a
`key. We don't have any dispute with that. But that's not
`the issue.
`These claims and these patents are specific to
`particular ways of duplicating the keys. And in our
`position and what we've tried to convey through our claim
`construction and tried to be very clear about in the
`briefing is that these claims are limited to trace cutting.
`So the -- the question -- and you heard a lot of
`argument from counsel for the Plaintiff -- is, well, all
`you're really trying to do is duplicate a key, and there
`are many ways to duplicate a key, and that's all these
`claims are. But that's not right.
`These claims are very specific in how you
`duplicate a key, and those are the terms, the three terms,
`1, 13, and 21, that I just read for Your Honor for the
`
`1 2 3 4 5 6 7 8 9
`
`10
`11
`12
`13
`14
`15
`16
`17
`18
`19
`20
`21
`22
`23
`24
`25
`
`09:24:02
`
`09:24:03
`
`09:24:08
`
`09:24:13
`
`09:24:16
`
`09:24:19
`
`09:24:19
`
`09:24:22
`
`09:24:26
`
`09:24:30
`
`09:24:33
`
`09:24:35
`
`09:24:36
`
`09:24:39
`
`09:24:43
`
`09:24:46
`
`09:24:48
`
`09:24:52
`
`09:24:57
`
`09:25:01
`
`09:25:05
`
`09:25:07
`
`09:25:09
`
`09:25:11
`
`09:25:13
`
`

`

`Case 2:19-cv-00209-JRG Document 158 Filed 06/30/20 Page 18 of 128 PageID #: 5790
`
`18
`
`record, those have very specific language about replicating
`the tooth pattern, replicating the bitting pattern. The
`parties agree that bitting pattern and tooth pattern refer
`to the same thing. There's, in fact, an agreed upon
`construction provided to Your Honor that says that.
`So that's what we tried to focus on. It is -- and
`it's the tooth pattern -- I'll just take those two for now.
`It's the tooth pattern of the master key that's inserted
`into the machine. And the -- and the claims are very
`specific. It's not, oh, of some factory replica of that or
`how it used to be before you had it in your pocket and
`carried around other things in there and wore down the key.
`Whatever it was, as Your -- as Your Honor mentioned, that's
`what is being replicated, whatever that tooth pattern is or
`that bitting pattern of the key that is placed in the
`machine. The claims are very, very specific on that.
`Now -- so what I hear as the main argument in
`response is, well, there's code cutting. We mentioned code
`cutting in the patent. And what I've seen in the briefing
`is that there is a -- we would read that out of the claim
`with the Defendant's construction.
`But, in fact, it's quite the opposite, Your Honor,
`because if we -- we look -- and I have a replication here
`of the '446, '179, '474, the three patents at issue with
`Claim 1, of all of these. And I want to focus in on the
`
`1 2 3 4 5 6 7 8 9
`
`10
`11
`12
`13
`14
`15
`16
`17
`18
`19
`20
`21
`22
`23
`24
`25
`
`09:25:18
`
`09:25:22
`
`09:25:27
`
`09:25:29
`
`09:25:33
`
`09:25:36
`
`09:25:38
`
`09:25:43
`
`09:25:45
`
`09:25:47
`
`09:25:53
`
`09:25:56
`
`09:26:00
`
`09:26:03
`
`09:26:07
`
`09:26:10
`
`09:26:13
`
`09:26:20
`
`09:26:24
`
`09:26:28
`
`09:26:33
`
`09:26:34
`
`09:26:37
`
`09:26:40
`
`09:26:46
`
`

`

`Case 2:19-cv-00209-JRG Document 158 Filed 06/30/20 Page 19 of 128 PageID #: 5791
`
`19
`
`highlighted elements that I have in -- in each of these
`here.
`
`So let's look at the '446 and that next to the
`last element. The way the element reads is a key
`duplicating system within said kiosk configured to
`replicate the tooth pattern of the blade of said key
`inserted in said key-receiving entry, on the blade of said
`extracted key blank.
`So said key refers back up -- the antecedent basis
`reference, if we trace that all the way back, is the key
`that's inserted in, right? It's not a key like that. It's
`not some other key that's back in the factory that matches
`the code of that key. It's that key.
`Now, similarly, we have in the '179, automatically
`cutting by the key -- key duplicating machine the selected
`key blank to duplicate a key tooth pattern of the master
`key, so, again, a very specific way to do it referring back
`to that master key.
`Now, in the '474, similar -- if we look at the
`first reference here, we have consisting of a bitting
`pattern of the existing key, the existing key, once again,
`referring to the key that's inserted into the machine. And
`if we drop down, it says: Cut the determined bitting
`pattern into a key blank. In other words, the bitting
`pattern of that key that's inserted into the kiosk.
`
`1 2 3 4 5 6 7 8 9
`
`10
`11
`12
`13
`14
`15
`16
`17
`18
`19
`20
`21
`22
`23
`24
`25
`
`09:26:51
`
`09:26:54
`
`09:26:55
`
`09:26:57
`
`09:27:01
`
`09:27:05
`
`09:27:10
`
`09:27:15
`
`09:27:17
`
`09:27:21
`
`09:27:24
`
`09:27:28
`
`09:27:31
`
`09:27:33
`
`09:27:37
`
`09:27:41
`
`09:27:46
`
`09:27:50
`
`09:27:51
`
`09:27:59
`
`09:28:01
`
`09:28:02
`
`09:28:05
`
`09:28:08
`
`09:28:11
`
`

`

`Case 2:19-cv-00209-JRG Document 158 Filed 06/30/20 Page 20 of 128 PageID #: 5792
`
`20
`
`With Plaintiff's proposed construction, at least
`the way this is argued in the briefs, Your Honor, and I
`think Your Honor's question right from the beginning gets
`right to the heart of the matter, you're really removing a
`lot of this claim language, not giving credit to it,
`because --
`THE COURT: So, in other words, are you telling me
`that while code cutting may be in the specification, it's
`not really in the applicable claim language of these
`asserted claims?
`MR. NELSON: That's correct, Your Honor. That's
`correct.
`THE COURT: That's how you're getting around the
`code cutting?
`MR. NELSON: Yes, exactly.
`THE COURT: All right.
`MR. NELSON: And, in fact -- and I -- and I
`will -- I think the very next thing I'll get to here, the
`code cutting, the description that's cited by the -- the
`Plaintiff, if you actually look at that, and we'll go
`through the language. First of all, it's in the very last
`paragraph of the patent, Your Honor, one of those catch-all
`paragraphs, as I'm sure Your Honor's done more patent cases
`than any of us in the room here knows, those are kind of
`throw-ins at the end and says, well, I know I described a
`
`1 2 3 4 5 6 7 8 9
`
`10
`11
`12
`13
`14
`15
`16
`17
`18
`19
`20
`21
`22
`23
`24
`25
`
`09:28:14
`
`09:28:20
`
`09:28:22
`
`09:28:25
`
`09:28:29
`
`09:28:32
`
`09:28:33
`
`09:28:34
`
`09:28:38
`
`09:28:43
`
`09:28:44
`
`09:28:45
`
`09:28:45
`
`09:28:47
`
`09:28:48
`
`09:28:49
`
`09:28:50
`
`09:28:52
`
`09:28:56
`
`09:28:58
`
`09:29:01
`
`09:29:04
`
`09:29:07
`
`09:29:11
`
`09:29:14
`
`

`

`Case 2:19-cv-00209-JRG Document 158 Filed 06/30/20 Page 21 of 128 PageID #: 5793
`
`21
`
`particular way of doing this in the embodiments of my
`invention, but there's a whole bunch of other ways you can
`do it, maybe, right? That's -- that's where it appears.
`But then it's even worse than that from -- well,
`not from my perspective, but from the Plaintiff's
`perspective because the code cutting that's described there
`is actually described to be a -- something different than
`the -- the invention that's claimed in the patent. So
`let's -- let's go through that.
`THE COURT: One thing I want you to do, counsel,
`is I want you to address and respond to Plaintiff's
`argument about identical or identicality not being in the
`intrinsic record here. And that, in essence, the argument
`is that it's an imported limitation.
`And so whether we're talking about code cutting or
`trace cutting or some other physical means by which a
`duplicate is made, at a higher level, the Plaintiffs made
`an argument that your inclusion of the concept of
`identicality is just not supported by the intrinsic record.
`And I need you to respond to that.
`MR. NELSON: Yes, Your Honor.
`And so if I could go back to -- and I'll

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket