PTAB
IPR2019-00200
Cellco Partnership v. Barkan Wireless IP Holdings LP
Key Events
Petition
Table of Contents
petition
1. Case Identification
- Case #: IPR2019-00200
- Patent #: 8,559,312
- Filed: November 9, 2018
- Petitioner(s): Cellco Partnership d/b/a Verizon Wireless, and Samsung Electronics America, Inc.
- Patent Owner(s): Barkan Wireless IP Holdings, L.P.
- Challenged Claims: 8-11, 13, 34, 39-55
2. Patent Overview
- Title: Add-on base station for packet-based data network
- Brief Description: The ’312 patent describes a system for providing wireless access to a packet-based data network, such as the internet. The system uses a gateway (e.g., a base station) that communicates with a mobile device and connects to the network, with its operation being managed by a central "coordination center."
3. Grounds for Unpatentability
Ground 1: Obviousness over Bergenwall and Borgelt - Claims 8-11, 13, 34, and 39-55 are obvious over Bergenwall in view of Borgelt.
- Prior Art Relied Upon: Bergenwall (WO 99/35800) and Borgelt (Patent 5,398,285).
- Core Argument for this Ground:
- Prior Art Mapping: Petitioner argued that Bergenwall taught the core architecture of the challenged claims, including an IP-based, auto-configuring base station (the claimed "gateway") that connects to a packet-based network and communicates with a "configuration server" (the claimed "coordination center") to obtain necessary network information. Petitioner contended that Bergenwall failed to detail specific encryption methods but expressly suggested using "known encryption methods." Borgelt, a reference dedicated to secure communications in such systems, supplied the missing encryption elements. Specifically, Borgelt taught binding a unique identity to a cryptographic key for authentication and encrypting communications, fulfilling limitations in claims 8, 11, and others. Borgelt also disclosed using EEPROM for tamper-resistance, mapping to the "tamper-free hardware" of claim 13.
- Motivation to Combine: Petitioner asserted that a POSITA, guided by Bergenwall’s explicit instruction to use "known encryption methods," would have been directly motivated to look to analogous art like Borgelt to implement that security. The combination was presented as simply applying a known security technique (Borgelt) to a known wireless system (Bergenwall) to achieve the predictable result of a secure wireless system.
- Expectation of Success: A POSITA would have a high expectation of success because both references relate to communication systems with base stations and controllers, and implementing Borgelt’s standard encryption techniques would not alter Bergenwall's fundamental architecture.
Ground 2: Obviousness over Bergenwall, Sudia, and Thro - Claims 8-11, 13, 34, and 39-55 are obvious over Bergenwall in view of Sudia and Thro.
Prior Art Relied Upon: Bergenwall (WO 99/35800), Sudia (Patent 6,009,177), and Thro (Patent 5,864,764).
Core Argument for this Ground:
- Prior Art Mapping: This ground used Bergenwall as the base system, similar to Ground 1. However, it relied on Sudia to teach the encryption elements and Thro to provide further details on the base station and coordination center. Petitioner argued Sudia provided more explicit teachings than Borgelt on binding a unique identity (e.g., a device serial number) to a public key using a digital certificate, directly mirroring the disclosure of the ’312 patent. Sudia also taught storing keys in a "tamper-resistant device." Thro was used to bolster Bergenwall’s disclosure of "known network elements," teaching specific base station hardware, an embedded GPS for location reporting (claim 44), periodic reporting of RF operating parameters to a configuration server (claims 43, 49), and the use of multiple access technologies like GSM (claim 54).
- Motivation to Combine: Petitioner argued a POSITA would combine these references because Bergenwall expressly stated its system could be used with "known network elements," which Thro provided for the same type of GSM/IP network. The motivation to add Sudia’s encryption was the same as in Ground 1: to implement the "known encryption methods" called for by Bergenwall. The combination represented filling in the implementation details of a known system with other known, compatible components to achieve predictable improvements in functionality and security.
- Expectation of Success: Success was expected because Thro and Sudia provided compatible, off-the-shelf solutions for features described at a high level in Bergenwall. No architectural changes would be required.
Additional Grounds: Petitioner asserted additional obviousness challenges, including a ground combining Bergenwall, Sudia, Thro, and Shibasaki to specifically address claims related to periodic verification and disconnection. Further alternative grounds were presented substituting Bergenwall with combinations including Vedel and/or Kari to address a narrower construction of "coordination center" that required price-setting capabilities.
4. Key Claim Construction Positions
- "coordination center": Petitioner proposed this term should be construed as "computer(s) that coordinates operation of the [gateways]." This construction was central to mapping the "configuration server" disclosed in Bergenwall and Thro to the claimed element.
- "gateway is associated, with a unique identity bound, to a cryptographic key": Petitioner argued this phrase requires that "the gateway's unique identity and a cryptographic key are bound together in a digital certificate." This construction was based on the patent's sole disclosed embodiment and was critical for mapping the teachings of Sudia, which explicitly described using digital certificates for this purpose.
5. Key Technical Contentions (Beyond Claim Construction)
- Defective Priority Claim: A central contention of the petition was that the ’312 patent was not entitled to its claimed 1999 priority date due to defects in the priority chain of its parent applications. Petitioner argued that this defective claim meant Bergenwall, published in July 1999, was a statutory bar under §102(b) against the patent’s effective 2001 filing date, strengthening the invalidity case.
6. Arguments Regarding Discretionary Denial
- Petitioner argued that discretionary denial under §314(a) or §325(d) would be inappropriate. The petition asserted that this was the first IPR filed against the ’312 patent. Furthermore, the primary prior art references (Bergenwall, Sudia, Thro) were not before the Examiner during the original prosecution and were therefore not duplicative. Petitioner also noted that the co-pending district court litigation was not scheduled for trial until August 2019, making an IPR decision likely to issue before a final judgment.
7. Relief Requested
- Petitioner requested the institution of an inter partes review and the cancellation of claims 8-11, 13, 34, and 39-55 of the ’312 patent as unpatentable.
Analysis metadata