Neology, Inc. v. Itc ( 2019 )


Menu:
  •       NOTE: This disposition is nonprecedential.
    United States Court of Appeals
    for the Federal Circuit
    ______________________
    NEOLOGY, INC.,
    Appellant
    v.
    INTERNATIONAL TRADE COMMISSION,
    Appellee
    KAPSCH TRAFFICCOM USA, INC., KAPSCH
    TRAFFICCOM HOLDING CORP., KAPSCH
    TRAFFICCOM CANADA INC., STAR SYSTEMS
    INTERNATIONAL LTD., STAR RFID CO., LTD.,
    Intervenors
    ______________________
    2018-1338
    ______________________
    Appeal from the United States International Trade
    Commission in Investigation No. 337-TA-979.
    ______________________
    Decided: April 19, 2019
    ______________________
    VINAY VIJAY JOSHI, Amin Turocy & Watson LLP, San
    Jose, CA, argued for appellant. Also represented by
    DANIEL W. BEDELL, ANTHONY KIM, ANDREW TIMOTHY
    OLIVER.
    2                                        NEOLOGY, INC. v. ITC
    CATHY CHEN, Office of the General Counsel, United
    States International Trade Commission, Washington, DC,
    argued for appellee. Also represented by DOMINIC L.
    BIANCHI, WAYNE W. HERRINGTON, SIDNEY A. ROSENZWEIG.
    NATHAN S. MAMMEN, Kirkland & Ellis LLP, Washing-
    ton, DC, argued for intervenors. Also represented by
    GREGG F. LOCASCIO, BRIAN H. GOLD.
    ______________________
    Before TARANTO, SCHALL, and CHEN, Circuit Judges.
    TARANTO, Circuit Judge.
    Neology filed a complaint with the International Trade
    Commission in 2015, alleging, as now relevant, infringe-
    ment of claims 13, 14, and 25 of its U.S. Patent No.
    8,325,044 and claims 1, 2, and 4 of its U.S. Patent No.
    8,587,436. The patents, which share a specification, de-
    scribe and claim systems and methods for tracking identi-
    fying information, particularly those relying on radio
    frequency identification (RFID). The Commission held the
    claims now at issue invalid because (1) they lack adequate
    written description support and (2) they are invalid for an-
    ticipation by U.S. Patent No. 5,627,544 (Snodgrass) or for
    obviousness based on the combination of Snodgrass and
    two other pieces of prior art. Neology appeals. We affirm
    on the written-description ground and do not reach antici-
    pation or obviousness.
    I
    A
    Neology filed applications for both the ’044 and ’436 pa-
    tents in 2012, both applications tracing by the same chain
    of continuation applications to an application filed in 2003
    and a provisional application filed in 2002. The claims that
    appeared in the 2012 applications as filed (the 2012 claims)
    issued with very few changes as the claims in the ’044 and
    NEOLOGY, INC. v. ITC
    3
    ’436 patents. Compare J.A. 3549–54, with ’044 patent, col.
    23, line 5, through col. 24, line 63; compare J.A. 3755–59,
    with ’436 patent, col. 23, line 13, through col. 25, line 17.
    The patents share a title, “System and Method for Provid-
    ing Secure Identification Solutions,” as well as a specifica-
    tion. They describe and claim methods and systems “for
    verifying and tracking identification information” in a se-
    cure system that, for one embodiment, “includes at least
    one of the following: a radio frequency (RF) identification
    device, an identification mechanism (e.g., a card, sticker),
    and an RF reader/writer.” See, e.g., ’044 patent, col. 1, lines
    39–45. An example is an RF device (corresponding to the
    claims “RFID transponder”) on an automobile, with identi-
    fying information embedded in the RFID device readable
    by an RFID reader. The important claim limitation for the
    asserted claims here involves exchanges of a “security key”
    between the RFID reader and transponder.
    The claims of the ’044 patent now at issue are claims
    13, 14, and 25. Claims 13 and 14 depend on claim 10, which
    reads:
    10. A toll system, comprising:
    a central database configured to:
    store toll accounts,
    receive identifiers related to toll accounts, and
    compare the received identifiers to identifiers
    associated with the toll accounts to determine
    if a match exists;
    an RFID reader comprising a radio and an an-
    tenna, the RFID reader configured to:
    send a first communication to a RFID tran-
    sponder that includes a memory the contents of
    which include an identifier,
    4                                        NEOLOGY, INC. v. ITC
    send a second communication to the RFID
    transponder that includes a security key for
    validation by the RFID transponder,
    receive at least the identifier included in the
    memory contents in response to the second
    communication and as a result of validation of
    the security key, and transmit the identifier to
    the central database.
    
    Id., col. 23,
    lines 39–56. Claim 13 adds the limitation of an
    RFID reader sending a “third communication . . . that in-
    cludes a second security key for validation by the RFID
    transponder and receive further memory contents in re-
    sponse to the third communication and as a result of vali-
    dation of the second security key.” 
    Id., col. 23,
    line 64,
    through col. 24, line 4. Claim 14, which depends on claim
    13, further requires that “the second security key is based
    on information received from the RFID transponder.” 
    Id., col. 24,
    lines 5–7. Claim 25 depends on claim 23, which
    recites the same series of communications and transfers of
    security keys but for an RFID transponder, not the “toll
    system” of claim 10. 
    Id., col. 24,
    lines 37–50, 54–60.
    The ’436 patent claims also include the same series of
    communications between the RFID reader and tran-
    sponder. ’436 patent, col. 23, lines 13–43. Independent
    claim 1 recites:
    1. A RFID reader, comprising:
    a radio and an antenna;
    a processor coupled with the radio, the processor
    configured to:
    send a first communication to a RFID transponder
    via the radio and the antenna that includes a
    memory the contents of which includes an identi-
    fier,
    NEOLOGY, INC. v. ITC
    5
    send a second communication to the RFID tran-
    sponder via the radio and the antenna that in-
    cludes a security key for validation by the RFID
    transponder,
    receive at least the identifier included in the
    memory contents via the radio and the antenna in
    response to the second communication and as a re-
    sult of validation of the security key, and
    transmit the identifier to a central database;
    wherein the processor is further configured to send
    a third communication to the RFID transponder
    via the radio and the antenna that includes a sec-
    ond security key for validation by the RFID tran-
    sponder and receive via the radio and the antenna
    further memory contents in response to the third
    communication and as a result of validation of the
    second security key.
    
    Id., col. 23,
    lines 13–34. Claims 2 and 4 depend directly on
    claim 1. Claim 2 adds the limitation that “the security key
    is based on information received from the RFID tran-
    sponder.” 
    Id., col. 23,
    lines 35–36. Claim 4 adds the limi-
    tation that “the second security key is based on information
    received from the RFID transponder.” 
    Id., col. 23,
    lines 41–
    43.
    B
    Neology filed a complaint with the Commission on De-
    cember 4, 2015. The complaint alleged infringement of var-
    ious claims of the ’044 and ’436 patents, as well as claims
    of another patent not at issue here. Neology accused Kap-
    sch TrafficCom U.S. Corp., Kapsch TrafficCom IVHS Tech-
    nologies Holding Corp., Kapsch TrafficCom IVHS Holding
    Corp., Kapsch TrafficCom IVHS, Inc., Kapsch TrafficCom
    Canada Inc., Kapsch TrafficCom Holding Corp., Star Sys-
    tems International, Ltd., and STAR RFID Co., Ltd. (collec-
    tively, Kapsch) of importing infringing products. The
    6                                        NEOLOGY, INC. v. ITC
    Commission instituted an investigation on January 11,
    2016. After Neology terminated the investigation with re-
    spect to claims 3, 6–12, and 14–18 of the ’436 patent, what
    remained were claims 13, 14, and 25 of the ’044 patent and
    claims 1, 2, and 4 of the ’436 patent.
    The administrative law judge concluded on June 22,
    2017, that the ’044 and ’436 patents are not entitled to the
    priority date of U.S. Patent Application No. 10/615,026,
    filed in 2003, because that application “does not provide
    written description support” for some of the key limitations
    of the at-issue claims of the ’044 and ’436 patents. The ALJ
    also found invalidity of the claims on several grounds, in-
    cluding the following: (a) claims 13, 14, and 25 of the ’044
    patent and claims 1, 2, and 4 of the ’446 patent are invalid
    for lack of written description; (b) claim 25 of the ’044 pa-
    tent and claims 1, 2, and 4 of the ’436 patent are antici-
    pated by Snodgrass; and (c) claims 13 and 14 of the ’044
    patent are invalid for obviousness over a combination of
    Snodgrass, U.S. Patent No. 5,819,234 (Slavin), and an ar-
    ticle, “RFID for Road Tolling, Road-Use Pricing and Vehicle
    Access Control,” by Phil Blythe (Blythe).
    Neology appealed to the full Commission, which issued
    its final decision on October 30, 2017. The Commission de-
    termined that the ALJ was correct that the two patents are
    not entitled to an earlier priority date, that the claims are
    invalid for lack of written description, and that the claims
    are invalid for anticipation by Snodgrass or obviousness
    based on a combination of Snodgrass, Slavin, and Blythe.
    The Commission reversed certain other invalidity determi-
    nations made by the ALJ.
    Neology filed a timely notice of appeal on December 22,
    2017. We have jurisdiction under 28 U.S.C. § 1295(a)(6).
    II
    We review the Commission’s factual findings for sub-
    stantial evidence. Rivera v. Int’l Trade Comm’n, 857 F.3d
    NEOLOGY, INC. v. ITC
    7
    1315, 1319 (Fed. Cir. 2017). Whether a claim is adequately
    supported by the written description is an issue of fact.
    GlaxoSmithKline LLC v. Banner Pharmacaps, Inc., 
    744 F.3d 725
    , 729 (Fed. Cir. 2014). We review “procedural and
    evidentiary determinations made by the Commission,” in-
    cluding “waiver” determinations, for abuse of discretion.
    Windbond Elecs. Corp. v. Int’l Trade Comm’n, 
    262 F.3d 1363
    , 1370 (Fed. Cir. 2001).
    A
    1
    Contrary to Neology’s initial contention, Kapsch did
    not waive the argument that the claims are invalid for lack
    of written description. Both the ALJ and the Commission
    decided whether the claims at issue have adequate written-
    description support both in determining priority and in de-
    termining validity. See J.A. 38–45; J.A. 147–74. The Com-
    mission specifically held that Kapsch had not waived the
    direct invalidity challenge based on inadequate support in
    the written description. See J.A. 39–40. We see no error
    in that determination. In pre- and post-hearing briefs,
    Kapsch and the Commission’s Office of Unfair Import In-
    vestigations timely raised, and they and Neology all dis-
    cussed, the issue of invalidity due to inadequate written
    description. J.A. 764; J.A. 937; J.A. 977; J.A. 1187; J.A.
    1188; J.A. 4770–71; J.A. 5135. There was no waiver.
    2
    When the investigation went to the Commission, on re-
    view of the ALJ decision, Neology argued that the specifi-
    cation and the 2012 claims themselves each provided
    adequate written description, but the Commission con-
    cluded that Neology had waived reliance on the 2012
    claims by not relying on those claims before the ALJ as a
    basis for written-description support. J.A. 42−43. We see
    no error in that conclusion. Neology’s briefing, even after
    the hearing, relied on the argument that the specification
    8                                          NEOLOGY, INC. v. ITC
    of the ’026 application (the 2003 application), which did not
    include the 2012 claims, provided the written-description
    support of the claims in the ’044 and ’436 patents, and it
    did not make an argument that the 2012 claims furnished
    the required written-description support. J.A. 4775 (“How
    a [person of ordinary skill in the art] would specifically un-
    derstand that each challenged claim limitation is disclosed
    in the specification of the ’026 Application is described in
    even more detail below.”) (emphasis added); 
    id. (“As fur-
    ther evidence that the specification of the ’026 Application
    provides adequate written description for the asserted
    claims . . . .”) (emphasis added). It was not until after the
    Commission requested additional briefing that Neology
    raised the argument that the 2012 claims contained ade-
    quate disclosure to provide written-description support for
    the issued claims. J.A. 5570 (“For validity, the written-de-
    scription analysis properly relies on the cumulative disclo-
    sure of the applications that became the ’044 and ’436
    patents—including the originally-filed claims [(the 2012
    claims)] in the asserted patents along with all prior appli-
    cations incorporated by reference—to determine whether
    the asserted claims have adequate support.”) (second em-
    phasis added); J.A. 5573 (“Therefore, unlike priority, the
    written-description analysis for invalidity in this case
    . . . also relies on the originally-filed claims of the applica-
    tions [(the 2012 claims)] that led to the ’044 and ’436 pa-
    tents . . . .”) (emphasis added).
    In response to the Commission’s determination that
    Neology waived the argument that the 2012 claims provide
    written-description support, Neology points to one passage
    in the pre-hearing brief it submitted to the ALJ. There,
    previewing its evidence for written description, Neology
    stated that “[e]xcept for the claims, the as-filed specifica-
    tion of the ’026 Application is nearly identical to the respec-
    tive applications that issued as the later member patents
    in the same family . . . .” J.A. 765. Neology argues that the
    NEOLOGY, INC. v. ITC
    9
    quoted sentence differentiates between the claims in the
    ’026 application and the 2012 claims and thereby preserves
    the argument that the 2012 claims alone provide written
    description support for the issued claims.
    We disagree. We have recognized that claims can be
    self-describing. See, e.g., Mentor Graphics Corp. v. EVE-
    USA, Inc., 
    851 F.3d 1275
    , 1297 (Fed. Cir. 2017); Ariad
    Pharm., Inc. v. Eli Lilly & Co., 
    598 F.3d 1336
    , 1349–51
    (Fed. Cir. 2010). On the other hand, genus claims, espe-
    cially those that “use functional language to define the
    boundaries of a claimed genus,” are unlikely to provide an
    adequate written description so as to be self-describing.
    Ariad 
    Pharm., 598 F.3d at 1349
    . Determining whether a
    particular claim is self-describing is not a cut-and-dried,
    simple matter, but would require more development—fac-
    tual and legal—than the passing reference on which Neol-
    ogy now relies. We conclude that the Commission did not
    abuse its discretion in finding that Neology waived its ar-
    gument that the asserted claims are supported by the 2012
    claims. We therefore affirm the Board’s conclusion that
    Neology waived this argument. The written-description
    contention preserved before the ALJ and Commission,
    therefore, was simply whether support for the claims at is-
    sue can be found in the body of the written description
    without the 2012 claims—which is substantively the same
    as the 2003 written description.
    B
    A patent must “contain a written description of the in-
    vention . . . in such full, clear, concise, and exact terms as
    to enable any person skilled in the art . . . to make and use
    the same.” 35 U.S.C. § 112 ¶ 1. 1 We have long held that,
    1    Although the relevant wording has not changed, we
    cite the version of § 112 that pre-dated the amendments to
    10                                        NEOLOGY, INC. v. ITC
    for any given claim, “the description must ‘clearly allow
    persons of ordinary skill in the art to recognize that [the
    inventor] invented what is claimed.’” Ariad 
    Pharm., 598 F.3d at 1351
    (quoting Vas–Cath Inc. v. Mahurkar, 
    935 F.2d 1555
    , 1562–63 (Fed. Cir. 1991)). As we have noted, the ad-
    equacy of support in the written description is a question
    of fact, and we review the Commission’s answer to that
    question for substantial evidence. 
    Rivera, 857 F.3d at 1319
    ; 
    GlaxoSmithKline, 744 F.3d at 729
    .
    The ALJ identified five limitations of the asserted
    claims that lacked adequate written description, a finding
    affirmed by the Commission. The five limitations are: “a
    second communication . . . that includes a security key”;
    transmission of an “identifier” from transponder memory
    “in response to the second communication” as a result of
    “validation” of the “security key”; a central database and
    toll system; a “third communication . . . that includes a sec-
    ond security key”; and a “security key is based on infor-
    mation received from the RFID transponder.” J.A. 24–25;
    J.A. 70. We find it unnecessary to discuss the third limita-
    tion. It suffices to discuss the other four limitations, for
    which the Commission’s findings of inadequate support
    largely rest on a shared basis.
    The first limitation claims the transmission of a second
    communication containing a security key and is part of
    claims 13, 14, and 25 of the ’044 patent and claims 1, 2, and
    4 of the ’436 patent. It requires both the existence of a “se-
    curity key” and the transmission of that same key. The
    specification mentions five types of keys: cryptographic,
    that section made by the Leahy-Smith America Invents
    Act, Pub. L. No. 112-29, § 4(c), 125 Stat. 284, 296 (2011).
    Those amendments do not apply to patents, like the ’044
    and ’436 patents, that issued from applications filed before
    September 16, 2012. 
    Id., § 4(e),
    125 Stat. 297.
    NEOLOGY, INC. v. ITC
    11
    security, credit and debit exchange, encryption, and ex-
    change encrypted. The specification describes crypto-
    graphic keys as “check[ed] and validate[d]” by the “security
    management unit” and being “sent to the cryptographic
    block.” ’044 patent, col. 2, lines, 51–53. The “cryptographic
    block” also “stores the security keys.” 
    Id., col. 2,
    lines 53–
    54. Credit and debit exchange keys are disclosed as part of
    the “Optional Security Features” where identifying infor-
    mation is stored in “[h]ighly secure chips with a hardware
    programmable cryptographic block” that has the credit and
    debit exchange key. 
    Id., col. 12,
    lines 7, 20–23. Encryption
    keys are disclosed in the same optional security features
    section and are needed to “initialize[]” equipment that in-
    teracts with the device storing identifying information. 
    Id., col. 12,
    lines 28–31. Finally, the specification discloses a
    “hardware wired cryptographic block 2210 (with 4 ex-
    change encrypted keys . . . ).” 
    Id., col. 22,
    lines 18–19.
    Based on the disclosures in the specification and testi-
    mony from the experts, the Commission had substantial
    evidence to support its finding of insufficient written de-
    scription. Despite disclosing several types of keys, the
    specification discloses only where they are stored and not
    whether they are exchanged. Experts for both Kapsch and
    Neology agreed that cryptographic and encryption keys, by
    their nature, are not exchanged. J.A. 2908–09; J.A. 3046.
    Dr. Gregory Durgin, Kapsch’s expert, testified that credit
    and debit exchange keys and exchange encrypted keys
    function like cryptographic keys, in that they are stored in
    the same cryptographic block, and are not exchanged, be-
    cause cryptographic keys are not exchanged. J.A. 2433–34.
    He also testified that the credit and debit exchange and ex-
    change encrypted keys are not exchanged because the spec-
    ification “doesn’t involve those keys in any sort of RFID
    protocol.” J.A. 2433 The Commission could reasonably rely
    as well on the inventor’s own testimony that the keys dis-
    closed in the specification are encryption keys, J.A. 1704–
    12                                         NEOLOGY, INC. v. ITC
    07, which, as previously discussed, are not exchanged, even
    though he later clarified his testimony that two of the dis-
    closed keys are the credit and debit exchange keys, 
    id. And Jack
    Goldberg, Neology’s expert, originally testified that he
    simply did not know if the keys were exchanged, J.A. 3060–
    61, which allowed the Commission not to credit—against
    other evidence—Mr. Goldberg’s later testimony that the
    credit and debit and exchange encrypted keys must be ex-
    changed because of their names. We conclude that there is
    substantial evidence in the specification and the testimony
    to support the Commission’s finding that the specification
    does not adequately describe a second communication that
    includes a security key.
    The Commission’s finding that there is no disclosure of
    a transmission of the security key supports the finding that
    three additional claim limitations are likewise inade-
    quately supported. The second limitation requires the
    transmission of an “identifier” “in response to the second
    communication” as a result of “validation of the security
    key.” ’044 patent, col. 23, lines 53–56; ’436 patent, col. 23,
    lines 23–26. If there is no transmission of a security key,
    there cannot be validation of such a key or transmission of
    an identifier in response to the second communication.
    Similarly, the fourth limitation requires a “third communi-
    cation . . . that includes a second security key,” ’044 patent,
    col. 23, line 64 through col. 24, line 4; ’436 patent, col. 23,
    lines 27–29, so the finding that there is no disclosure of a
    second communication including a key means that there
    can be no third communication that includes a “second” one
    of that key. The fifth limitation, which requires the “secu-
    rity key”/“second security key” from the independent claim
    to be “based on information received from the RFID tran-
    sponder,” ’044 patent, col. 24, lines 5–7; ’436 patent, col. 23,
    lines 34–35, 40–43, also is reasonably found unsupported
    in the absence of a disclosure of information exchanged be-
    tween the transponder and the device. Additionally, Dr.
    Durgin testified that “there is no disclosure of an RFID
    NEOLOGY, INC. v. ITC
    13
    protocol or any specific step that would involve the security
    key, based on information from the RFID transponder.”
    J.A. 2449–53. Thus, the Commission had substantial evi-
    dence to find inadequate written-description support for
    limitations two, four, and five.
    For those reasons, we affirm the Commission’s finding
    that the asserted claims lack sufficient written-description
    support. In view of that conclusion, we need not reach the
    issues of anticipation or obviousness.
    III
    The ruling of the Commission that the claims at issue
    are invalid is affirmed.
    AFFIRMED