Haddad v. United States ( 2023 )


Menu:
  •           In the United States Court of Federal Claims
    No. 17-307
    (Filed: 20 January 2023)
    ***************************************
    MICHAEL HADDAD,                          *
    *
    Plaintiff,             *
    *
    v.                                       *
    *
    THE UNITED STATES,                       *
    *
    Defendant,             *       Claim Construction; Markman Hearing;
    *       Plain and Ordinary Meaning; Means Plus
    TRANS DIGITAL TECHNOLOGIES               *       Function; Intrinsic Record; Indefinite;
    LIMITED LIABILITY COMPANY,               *       Person Having Ordinary Skill in the Art;
    *       
    28 U.S.C. § 112
    .
    Third-Party Defendant, *
    *
    and                                      *
    *
    IDEMIA IDENTITY & SECURITY USA           *
    LLC,                                     *
    *
    Third-Party Defendant. *
    *
    ***************************************
    Geoffrey Mason, MOARBES, LLP, of Washington, DC, for plaintiff.
    Conrad J. DeWitte, Jr., Assistant Director, with whom were Gary L. Hausken, Director,
    Commercial Litigation Branch, and Brian M. Boynton, Principal Deputy Assistant Attorney
    General, Civil Division, Department of Justice, all of Washington, DC, for defendant.
    Richard L. Brophy, Armstrong Teasdale LLP, of St. Louis, MO, for third-party
    defendants Trans Digital Technologies LLC and Idemia Identity & Security USA LLC.
    CLAIM CONSTRUCTION OPINION AND ORDER
    HOLTE, Judge.
    Plaintiff Michael Haddad accuses the government of infringing 
    U.S. Patent No. 7,639,844
    . The government noticed Trans Digital Technology LLC and Morpho Trust USA,
    LLC (now Idemia Identity & Security USA LLC), distributors of the allegedly infringing
    product, who joined the government in defending the claims against patent infringement. The
    parties filed claim construction briefs seeking to construe the meaning of various disputed claim
    terms. The Court held a Markman hearing to construe the disputed terms. Defendants argue
    thirteen of the fifteen claim terms are indefinite under 
    35 U.S.C. § 112
    . This Claim Construction
    Opinion and Order construes the disputed terms and finds sole independent claim 1 indefinite
    and accordingly finds the entire ’844 patent invalid. The Court further orders the plaintiff to
    show cause why this case should not be dismissed.
    I.     Background
    A.      Patents, Property, and Presumption of Validity
    In 1876, the Supreme Court held “[a] patent for an invention is as much property as a
    patent for land. The right rests on the same foundation, and is surrounded and protected by the
    same sanctions.” Consol. Fruit-Jar Co. v. Wright, 
    94 U.S. 92
    , 96 (1876). In more recent years,
    the Supreme Court has established the right to exclude as “one of the most essential sticks in the
    bundle of rights that are commonly characterized as property.” Kaiser Aetna v. United States,
    
    444 U.S. 164
    , 176 (1979). The Federal Circuit confirms “a patent grants only the right to
    exclude others and confers no right on its holder to make, use, or sell [an invention].” Bio-Tech.
    Gen. Corp. v. Genentech, Inc., 
    80 F.3d 1553
    , 1559 (Fed. Cir. 1996) (quoting Vaupel
    Texilmaschinen KG v. Meccanica Euro Italia S.P.A., 
    944 F.3d 870
    , 879 n.4 (Fed. Cir. 1991))
    (internal quotations omitted).
    In addition to patents being property, “[p]atents are presumed to be valid.” Procter &
    Gamble Co. v. Teva Pharm. USA, Inc., 
    566 F.3d 989
    , 994 (Fed. Cir. 2009) (citing Kao Corp. v.
    Unilever U.S., Inc., 
    441 F.3d 963
    , 968 (Fed. Cir. 2006)). “[T]he [United States] Patent and
    Trademark Office [(‘USPTO’)] only grants those patent applications that meet the statutory
    patentability requirement.” Adam Mossoff, Who Cares What Thomas Jefferson Thought about
    Patents–Reevaluating the Patent Privilege in Historical Context, 
    92 Cornell L. Rev. 953
    , 999
    (2007) (citing Intervet Am., Inc. v. Kee-Vet Labs., Inc., 
    887 F.2d 1050
    , 1054 (Fed. Cir. 1989)
    (“The presumption of validity under 
    35 U.S.C. § 282
     carries with it a presumption the examiner
    did his duty and knew what claims he was allowing”); Am. Hoist & Derrick Co. v. Sowa & Sons,
    Inc., 
    725 F.2d 1350
    , 1359 (Fed. Cir. 1984) (noting § 282 is based on the “basic proposition that a
    government agency such as the then Patent Office was presumed to do its job”)). “The burden of
    establishing invalidity of a patent claim . . . rest[s] on the party asserting invalidity.” 
    35 U.S.C. § 282
    (a). “An issued patent enjoys a presumption of validity[, and] a party challenging patent
    validity has the burden to prove its case with clear and convincing evidence.” Impax Labs., Inc.
    v. Aventis Pharm., Inc., 
    545 F.3d 1312
    , 1314 (Fed. Cir. 2008).
    B.      Factual History
    Plaintiff Michael Haddad is the sole inventor, owner, and assignee of 
    U.S. Patent No. 7,639,844
     (“the ’844 patent”). Compl. ¶¶ 1, 6, 9, ECF No. 1. The ’844 patent is a
    “[c]ontinuation-in-part of [U.S.] application No. 11/220,282 [(‘the ’282 application’)], filed on 7
    September 2005, now Pat[ent] No. 7,401,732 [(‘the ’732 patent’)], and a continuation-in-part of
    -2-
    [U.S.] application No. 10/330,981, filed on 30 December 2002, now abandoned.” ’844 patent at
    [63].
    The ’844 patent, titled “Airport Vehicular Gate Entry Access System,” relates to methods
    of “securing airport vehicular gate entries by providing” “means of authenticating drivers’
    licenses, verifying employee status, printing temporary passes, printing a temporary vehicle entry
    pass and certificate” and “providing the airport police with a handheld apparatus capable of
    reading the entry certificate and wirelessly verifying its authenticity.” 
    Id.
     at [54], [57]. The
    system also provides means of matching vehicle drivers and passengers “against the TSA
    NO-FLY and SELECTEE lists.” 
    Id.
     at [57]. The system is “fully automated and is touch screen
    capable, thus requiring a minimal amount of human interaction.” 
    Id.
    C.      Procedural History
    Plaintiff filed his complaint on 6 March 2017, alleging the Credential Authentication
    Technology-Boarding Pass Scanning System (“CAT/BPSS”) used by the government and
    provided by third-party defendants Trans Digital Technology LLC (“TDT”) and Idemia Identity
    & Security USA LLC 1 (“Idemia”) (collectively “defendants”) for its airport security systems
    infringes the ’844 patent. See Compl. ¶¶ 15–16, 19, 33. The government moved to notice
    interested third parties, BAE Systems Information Solutions, Inc., NCR Government Systems,
    LLC, Trans Digital Technologies, Inc., and MorphoTrust USA, Inc., and the interested third
    parties were noticed on 3 May 2017. Mot. for Notice to Third Parties, ECF No. 8; see Notice to
    Third Parties, ECF No. 11. On 28 February 2018, this court dismissed plaintiff’s claims for
    patent infringement accruing prior to 27 October 2016. See Order Granting Gov’t’s Mot. to
    Dismiss at 15–16, ECF No. 39. On 27 July 2018, this court dismissed third-party defendants
    BAE Systems Information Solutions, Inc. and NCR Government Systems, LLC. See Order
    Dismissing Third-Party Defs. at 2, ECF No. 45. This case was reassigned to the undersigned
    judge on 29 July 2019. See Order, ECF No. 81.
    On 9 February 2021, defendants filed a joint status report stating each party’s views on a
    proposed discovery schedule, whether the parties had claim construction disputes, and each
    party’s proposed schedule for claim construction briefing. See Joint Status Report, ECF No. 116.
    On 16 February 2021, the Court issued a scheduling order for the exchange of: preliminary
    infringement contentions; preliminary invalidity contentions; claim terms for construction;
    proposed claim constructions; and extrinsic evidence supporting claim construction positions.
    See Scheduling Order at 2–3, ECF No. 117. On 19 March 2021, defendants filed a motion to
    compel plaintiff to serve supplemental infringement contentions. See Mot. to Compel, ECF No.
    120. After the parties fully briefed the issue, the Court denied the motion to compel as moot
    when plaintiff agreed to serve infringement contentions. See Order, ECF No. 131.
    On 23 November 2021, defendants filed their opening claim construction brief. See
    Defs.’ Opening Claim Construction Br. (“Defs.’ Cl. Constr. Br.”), ECF No. 137. Plaintiff filed
    his response to defendants’ opening claim construction brief on 20 December 2021. See Pl.’s
    Resp. to Defs.’ Opening Claim Construction Br. (“Pl.’s Resp. Cl. Constr. Br.”), ECF No. 140.
    1
    Idemia Identity & Security USA LLC was formerly known as MorphoTrust USA, LLC. Notice of Name Change,
    ECF No. 60.
    -3-
    On 7 January 2022, defendants filed their reply to plaintiff’s response. See Defs.’ Reply Claim
    Construction Br. (“Defs.’ Reply Cl. Constr. Br.”), ECF No. 141. Plaintiff filed a surreply to
    defendants’ reply on 21 January 2022. See Pl.’s Surreply Claim Construction Br. (“Pl.’s
    Surreply Cl. Constr. Br”), ECF No. 144. The Court held a Markman hearing on 12 July 2022.
    See Order, ECF No. 151.
    D.      The Technology of the ’844 Patent
    On 27 August 2007, plaintiff filed U.S. Patent Application No. 11/895,656, later issued
    as the ’844 patent. See ’844 patent at [10], [21]–[22]. Plaintiff asserts infringement of sole
    independent claim 1 of the ’844 patent and dependent claims 3, 5, and 6. See Compl. ¶¶ 19–32.
    The ’844 patent “relates to a method of securing airport vehicular gate entry/exit gates”
    by allowing “security personnel to process a vehicle entry as a group of verifiable objects
    interrelated, including an employee host, a vehicle registration card, a vehicle driver and vehicle
    passengers.” ’844 patent col. 1 ll. 13–14, 36–39. The background of the ’844 patent describes
    the field as being “prone to excessive error rates, lower security standards, increased
    inefficiencies and decreased reliability” because “[a]irport vehicular entry gates rely on human
    intervention and manual data entry.” 
    Id.
     col. 1 ll. 22–25. The patent discloses “an enterprise
    platform where multiple airport vehicular gates comprise one workstation each, interconnected in
    a network configuration, controlled by a central database server” making “all data immediately
    available at all workstations” because “[a]ll workstations collect and store data in the central
    database server.” 
    Id.
     col. 2 ll. 41–45. The platform “uses a computer system, the apparatus of
    [the ’282 application], and the software application of [the ’282 application] customized for the
    purpose [of providing], a commercial [i]dentification card authentication apparatus, and various
    computer peripherals.” 
    Id.
     col. 1 ll. 40–44.
    The system provides an “entry/exit workstation” for airport gate attendants, “which
    would be located at an airport vehicular gate booth” preferably having “a touch screen LCD” or
    another display screen. 
    Id.
     col. 2 ll. 31–38. The workstation contains a “reader for standardized
    personal identification credentials, . . . a suitable camera, . . . a central processing unit color, . . .
    plastic card printers, . . . one ID card authenticator, . . . a keyboard, a laser printer, . . . and a
    display monitor.” 
    Id.
     (cleaned up). Each workstation is “interconnected in a network
    configuration, controlled by a central database server,” and “[a]ll workstations collect and store
    data in the central database server.” ’844 patent col. 2 ll. 42–45. Figure 1, reproduced below,
    “schematically illustrates the elements of an entry/exit workstation.” ’844 patent col. 2 ll. 31–32,
    fig.1.
    -4-
    The system provides “a vehicle entry . . . formed of a group of collected records,
    processed sequentially” including the following records: “1–ESCORTER”; “2–[Department of
    Motor Vehicles (‘DMV’)] Vehicle Registration Information”; “3–Driver Information”; and “4–
    Passengers Information.” 
    Id.
     col. 2 ll. 58–64. “Upon the arrival of a vehicle at an airport
    vehicular entry gate,” an airport employee “presents its airport ID to the reader for standardized
    personal identification credentials device” and is then requested “to enter a security code in the
    numeric keypad.” 
    Id.
     col. 2 l. 65–col. 3 l. 3. “The information read from the ID serves to locate
    the ESCORTER record in the airport employee database,” “verifies employment status,” and
    “[i]f active . . . match[es the employee] against the TSA NO-FLY and SELECTEE lists.” 
    Id.
     col.
    3 ll. 5–9. The system “provides a security alert if the employee is not active” or “matched during
    the TSA NO-FLY and SELECTEE list search.” 
    Id.
     col. 3 ll. 9–13.
    “After processing the employee, the employee becomes the ESCORTER of the entry
    group,” and the system “automatically moves into the vehicle registration mode.” 
    Id.
     col. 3 ll.
    19–21. “The gate attendant places the DMV vehicle registration card in the authenticator, as
    requested by the display message,” which in turn “acquires an image of the registration card.”
    ’844 patent col. 3 ll. 25–28. The authenticator then “sends the image to the system for
    proceeding with character recognition” which “becomes the second record in the entry group.”
    
    Id.
     col. 3 ll. 29–30.
    “The system automatically moves into the DRIVER mode,” requiring the gate attendant
    to “follow[] operational steps” such as presenting a credential to the reading apparatus and
    following the “warning window” message if prompted. 
    Id.
     col. 3 ll. 31, 35–38, 49. When a
    -5-
    credential “is presented to the reading apparatus, . . . [t]he system decodes the encoded data and
    encrypts the sensitive information, . . . checks database information to determine whether the
    individual is an employee,” and checks the “ID credential against the TSA NO-FLY and
    SELECTEE lists.” 
    Id.
     col. 3 ll. 37–48. “If all checks are negative, the process continues. The
    system picks up the individual photo provided by the authenticator returned record, and prints a
    time sensitive encoded temporary pass.” 
    Id.
     col. 3 ll. 61–64.
    “Upon completing the DRIVER entry record, the system moves automatically into the
    ‘PASSENGER’ mode . . . .” 
    Id.
     col. 3 ll. 65–66. “The gate attendant proceeds with collecting
    passengers’ records, one after another, in a sequential manner, following the same functional
    steps mentioned earlier during the DRIVER ID processing.” ’844 col. 4 ll. 3–6. The gate
    attendant then selects the “‘CERTIFICATE’ touch button” on the screen causing the “printing of
    the Temporary Vehicle Entry Certificate and Permit” which “is to be displayed at the vehicle
    windshield.” 
    Id.
     col. 4 ll. 15–16, 29. “A wireless handheld apparatus reader . . . is provided to
    the airport police to read the certificate on the premises and instantly verify the displayed
    certificate records, through a wireless access to the system database.” 
    Id.
     col. 4 ll. 30–33.
    E.        Overview of Claims
    Plaintiff asserts infringement of claims 1, 3, 5, and 6. These claims are directed toward a
    CAT/BPSS. See Compl. ¶¶ 19–32. Claims 3, 5, and 6 depend on claim 1.
    Based on the Court’s detailed review of the patents, the disputed terms appear in the
    claims as follows:
    Term                                   Disputed Term                                    Applicable
    #                                                                                      Claim(s)
    1         “standardized credential reader means”                                     Claim 1
    2         “credential encoded with personal identification”                          Claims 1, 3
    3         “build individual real time records”                                       Claim 1
    4         “credential collected information match”                                   Claim 1
    5         “system database”                                                          Claims 1, 5, 6
    6         “the type of entry, visitor, employee, contractor, supplier, or vendor,    Claim 1
    is determined”
    7        “an ID authenticator”                                                      Claim 1
    8        “means to read non-encoded credentials”                                    Claim 1
    9        “authentication data record”                                               Claim 1
    10        “authenticity risk rating” / “authentication rating” / “ID forgery risks   Claim 1
    rating”
    11        “automatically determines the source”                                      Claim 1
    12        “credential data record”                                                   Claim 1
    13        “to be checked against a security list, TSA NO-FLY list, SELECTEE          Claim 1
    list, other alternative credentials”
    14        “warning window[, as a result of the individual credentials match          Claim 1
    and ID forgery risks rating contained in the authentication data
    record]”
    -6-
    15     “individual credentials match”                                          Claim 1
    Claim 1 of the ’844 patent, reproduced below, provides a representative example of all of
    the disputed claim terms:
    1. An automated access control system for securing airport vehicular gates and
    airport sterile areas comprising:
    a standardized credential reader means for reading a credential encoded with
    personal identification to be used at entry point into the airport sterile
    areas and automatically collects data to build individual real time records;
    a software application for recovering information from the standardized
    credential reader, wherein one or more of the following processing is
    performed:
    real time records are checked searching for a credential collected information
    match; individual suspicious status is checked against a security list
    stored in a system database; employee records are checked to determine if
    the individual is an employee; the type of entry, visitor, employee,
    contractor, supplier, or vendor, is determined; and admission is processed
    as entry or re-entry of the individuals,
    an ID authenticator, wherein a credential to be authenticated is presented, a
    credential physical aspect and embedded security features are analyzed to
    determine the possibility of any tempering or forgery and provide an
    authenticity risk rating, said ID authenticator comprises means to read non-
    encoded credentials, whereas said ID authenticator generates an
    authentication data record comprising presented credential information and
    authentication rating,
    a central processing unit for receiving information from the standardized
    credential reader and the ID authenticator;
    wherein, upon a credential reading, the automated access control system
    automatically determines the source of the credential data record, and
    automatically extracts personal information to be checked against a
    security list, TSA NO-FLY list, SELECTEE list, other alternative
    credentials; whereas upon the credential authentication, the automated
    access control system automatically extracts authentication information
    from the authentication data record, and subsequently displays a warning
    window, as a result of the individual credentials match and ID forgery
    risks rating contained in the authentication data record.
    Claim 3 of the ’844 patent, reproduced below, provides a representative example of one
    disputed claim term (“credential encoded with personal identification”) indicated in italics:
    -7-
    3. An automatic access control system as claimed in claim 1, wherein the
    standardized credential reader can read any one of: drivers license identification,
    passports, boarding passes or any other standardized credentials presented as a
    personal identification upon entry into the airport, and whereas standardized
    credentials refer to identification documents encoded using established standards.
    Claim 5 of the ’844 patent, reproduced below, provides a representative example of one
    disputed claim term (“system database”) indicated in italics:
    5. An automated access control system as claimed in claim 1, wherein the system
    database includes one or more interrelated group of records: the airport employee
    as ESCORTER, the DMV vehicle registration card information, the driver
    identification record and the passengers’ identification records.
    Claim 6 of the ’844 patent, reproduced below, provides a representative example of one
    disputed claim term (“system database”) indicated in italics:
    6. An automated access control system as claimed in claim 1, includes: a wireless
    barcode reader, a system database, a suitable camera, a color plastic card printer, a
    keyboard, a laser printer, an intranet package and a display monitor.
    ’844 patent col. 4 l. 66–col. 6 l. 18.
    II.      Applicable Law for Claim Construction
    A.       Claim Term Interpretation
    “[T]he interpretation and construction of patent claims, which define the scope of the
    patentee’s rights under the patent, is a matter of law exclusively for the court.” Markman v.
    Westview Instruments, Inc., 
    52 F.3d 967
    , 970–71 (Fed. Cir. 1995). “To construe a claim term,
    the trial court must determine the meaning of any disputed words from the perspective of one of
    ordinary skill in the pertinent art at the time of filing.” 2 Chamberlain Grp. Inc. v. Lear Corp.,
    
    516 F.3d 1331
    , 1335 (Fed. Cir. 2008). “[T]he words of a claim ‘are generally given their
    ordinary and customary meaning,’ . . . [and] the ordinary and customary meaning of a claim
    term is the meaning that the term would have to a person of ordinary skill in the art in question at
    the time of the invention.” Phillips v. AWH Corp., 
    415 F.3d 1303
    , 1312–13 (Fed. Cir. 2005)
    (quoting Vitronics Corp. v. Conceptronic, Inc., 
    90 F.3d 1576
    , 1582 (Fed. Cir. 1996)). “There are
    only two exceptions to this general rule: (1) when a patentee sets out a definition and acts as his
    2
    At oral argument, the parties agreed none of their claim constructions rely on one particular definition of a person
    having ordinary skill in the art (“PHOSITA”), and the Court need not decide the parties’ dispute over who a
    PHOSITA is at this stage. Cl. Constr. Tr. (“Tr.”) at 10:2–11, ECF No. 153 (“THE COURT: [I]s it plaintiff’s
    understanding that there’s any argument about specific terms that would be affected by the definition of PHOSITA?
    [PLAINTIFF]: No, you honor, I don’t think we have to decide at this point. . . . THE COURT: [D]o defendants
    believe that there is any specific claim construction that may be affected by PHOSITA definition?
    [DEFENDANTS]: Not in this case . . . .”). See also Cave Consulting Grp., Inc. v. Truven Health Analytics Inc.,
    No. 15-cv-02177-SI, 
    2016 WL 2902234
    , at *3 (N.D. Cal. May 13, 2016).
    -8-
    own lexicographer, or (2) when the patentee disavows the full scope of a claim term either in the
    specification or during prosecution.” Thorner v. Sony Comput. Entm’t Am. LLC, 
    669 F.3d 1362
    ,
    1365 (Fed. Cir. 2012) (citing Vitronics, 
    90 F.3d at 1580
    ).
    The analysis of any disputed claim term begins with the intrinsic evidence of record, as
    “intrinsic evidence is the most significant source of the legally operative meaning of disputed
    claim language.” Vitronics, 
    90 F.3d at 1582
    . Additional claims, whether asserted or not, “can
    also be valuable sources of enlightenment as to the meaning of a claim term” when determining
    consistent language usage throughout the patent, differences amongst particular terms, and
    various limitations added throughout the dependent claims. Phillips, 415 F.3d at 1314. The
    claims do not stand on their own; “they are part of ‘a fully integrated written instrument,’
    consisting principally of a specification that concludes with the claims.” Id. at 1315 (quoting
    Markman, 
    52 F.3d at 978
    ). The claims are therefore read in view of the specification. Markman,
    
    52 F.3d at 979
    . It is important limitations from preferred embodiments are not read “into the
    claims absent a clear indication in the intrinsic record that the patentee intended the claims to be
    so limited.” Liebel-Flarsheim Co. v. Medrad, Inc., 
    358 F.3d 898
    , 913 (Fed. Cir. 2004).
    Federal Circuit caselaw “instructs that different claim terms are presumed to have
    different meanings.” MicroStrategy Inc. v. Bus. Objects Americas, 
    238 F. App’x 605
    , 609 (Fed.
    Cir. 2007) (citing CAE Screenplates, Inc. v. Heinrich Fiedler GmbH & Co. KG, 
    224 F.3d 1308
    ,
    1317 (Fed. Cir. 2000) (“In the absence of any evidence to the contrary, we must presume that the
    use of these different terms in the claims connotes different meanings.”); Applied Med. Res.
    Corp. v. U.S. Surgical Corp., 
    448 F.3d 1324
    , 1333 n.3 (Fed. Cir. 2006) (“[T]he use of two terms
    in a claim requires that they connote different meanings . . . .”)).
    B.      Prosecution History Weight and Interpretation
    The prosecution history may serve as an additional source of intrinsic evidence.
    Markman, 
    52 F.3d at 980
    . The prosecution history “consists of the complete record of the
    proceedings before the [USPTO] and includes the prior art cited during the examination of the
    patent.” Phillips, 415 F.3d at 1317. The prosecution history “represents an ongoing negotiation
    between the [US]PTO and the applicant, rather than the final product of that negotiation.” Id.
    “Any explanation, elaboration, or qualification presented by the inventor during patent
    examination is relevant, for the role of claim construction is to ‘capture the scope of the actual
    invention’ that is disclosed, described, and patented.” Iridescent Networks, Inc. v. AT&T
    Mobility, LLC, 
    933 F.3d 1345
    , 1352–53 (Fed. Cir. 2019) (quoting Fenner Invs., Ltd. v. Cellco
    P’ship, 
    778 F.3d 1320
    , 1323 (Fed. Cir. 2015)). After considering all intrinsic evidence of record,
    the court has discretion to consider sources of extrinsic evidence, such as dictionaries, treatises,
    and expert and inventor testimony, “if the court deems it helpful in determining ‘the true
    meaning of language used in the patent claims.’” Phillips, 415 F.3d at 1318 (quoting Markman,
    
    52 F.3d at 980
    ). While sometimes helpful, extrinsic evidence is “less significant than the
    intrinsic record in determining the legally operative meaning of claim language.” Id. at 1317
    (internal quotation marks and citations omitted) (quoting C.R. Bard, Inc. v. U.S. Surgical Corp.,
    
    388 F.3d 858
    , 862 (Fed. Cir. 2004).
    -9-
    “Prosecution disclaimer ‘preclud[es] patentees from recapturing through claim
    interpretation specific meanings disclaimed during prosecution.’” Aylus Networks, Inc. v. Apple
    Inc., 
    856 F.3d 1353
    , 1359 (Fed. Cir. 2017) (quoting Omega Eng’g, Inc. v. Raytek Corp., 
    334 F.3d 1314
    , 1323 (Fed. Cir. 2003)). Federal Circuit caselaw “requires that the alleged disavowing
    actions or statements made during prosecution be both clear and unmistakable” in order to apply
    the principles of prosecution disclaimer. 
    Id.
     “[W]hen the patentee unequivocally and
    unambiguously disavows a certain meaning to obtain a patent, the doctrine of prosecution history
    disclaimer narrows the meaning of the claim consistent with the scope of the claim surrendered.”
    Biogen Idec, Inc. v. GlaxoSmithKline LLC, 
    713 F.3d 1090
    , 1095 (Fed. Cir. 2013). Further,
    “statements made by a patent owner during an [inter partes review] proceeding can be
    considered during claim construction and relied upon to support a finding of prosecution
    disclaimer.” Aylus Networks, Inc., 
    856 F.3d at 1361
    . “Where the alleged disavowal is
    ambiguous, or even ‘amenable to multiple reasonable interpretations,’ [the Federal Circuit has]
    declined to find prosecution disclaimer.” Avid Tech., Inc. v. Harmonic, Inc., 
    812 F.3d 1040
    ,
    1045 (Fed. Cir. 2016) (quoting Cordis Corp. v. Medtronic AVE, Inc., 
    339 F.3d 1352
    , 1359 (Fed.
    Cir. 2003)).
    C.       Use of a Parent Patent as Part of the Intrinsic Record
    Federal Circuit cases “draw[] a distinct line between patents that have a familial
    relationship and those that do not” when considering whether a “related patent or its prosecution
    history is available to construe the claims of a patent at issue.” Goldenberg v. Cytogen, Inc., 
    373 F.3d 1158
    , 1167 (Fed. Cir. 2004). “When a parent application includes statements involving
    ‘common subject matter’ with the terms at issue, those statements are relevant to construction of
    the terms in the child patent.” E.I. du Pont de Nemours & Co. v. Unifrax I LLC, 
    921 F.3d 1060
    ,
    1070 (Fed. Cir. 2019). When an application cites a parent application as prior art or in the
    prosecution history, these familial applications, moreover, become incorporated into the intrinsic
    record. 3 Goldenberg, 
    373 F.3d at 1167
    ; Unifrax I, 
    921 F.3d at
    1070 (citing Advanced
    Cardiovascular Sys., Inc. v. Medtronic, Inc., 
    265 F.3d 1294
    , 1305–06 (Fed. Cir. 2001) (“[I]t is
    plainly appropriate to treat a parent application as intrinsic evidence[] when considering two
    related patents with identical claim terms.”).
    Further, as “claims must be read in light of the specification,” “any patents incorporated
    by reference are effectively part of the host patent.” Finjan LLC v. ESET, LLC, 
    51 F.4th 1377
    ,
    1382 (Fed. Cir. 2022) (first citing Phillips, 415 F.3d at 1315; then citing X2Y Attenuators, LLC v.
    U.S. Int’l Trade Comm’n, 
    757 F.3d 1358
    , 1362–63 (Fed. Cir. 2014)). Accordingly,
    “[i]ncorporation by reference of a patent ‘renders the entire contents of that patent’s disclosure a
    3
    At oral argument, defendants agreed there was no significant difference between the ’282 application and the
    subsequent ’732 patent specification. Tr. at 14:13–17 (“THE COURT: [R]elated to the specification, it sounds like
    there was no change or new information that was added as the ’282 application became the ’732 patent?
    [DEFENDANTS]: That’s my understanding.”). Accordingly, the Court references the ’282 application and the
    ’732 interchangeably. Defendants also agreed “the prosecution history of the parent application as well as the
    prosecution of the ’844 patent, can all be considered part of what’s referred to as intrinsic evidence.” See Tr. at
    17:15–18:11. During argument for claim term 13, defendants agreed the parent patent is part of the intrinsic record.
    Tr. at 136:10–17. Plaintiff also agreed the ’732 parent patent could be used for construing a term of the ’844 patent.
    Tr. at 18:12–17. (“THE COURT: [P]laintiff generally agrees that the Court can refer to the parent patent, the ’732
    patent, to construe a term and that that would be intrinsic evidence? [PLAINTIFF]: Yes . . . .”).
    - 10 -
    part of the host patent’” and “may inform the construction of claim terms common across
    patents.” 
    Id.
     (quoting X2Y Attenuators, LLC, 
    757 F.3d at
    1362–63).
    D.       Indefiniteness
    “[I]ndefiniteness is a question of law and in effect part of claim construction.” ePlus, Inc.
    v. Lawson Software, Inc., 
    700 F.3d 509
    , 517 (Fed. Cir. 2012). “Indefiniteness must be proven by
    clear and convincing evidence.” Sonix Tech. Co. v. Publ’ns Int’l, Ltd., 
    844 F.3d 1370
    , 1377
    (Fed. Cir. 2017). A patent specification must conclude with claims distinctly pointing out the
    subject matter of the invention. 
    35 U.S.C. § 112
    , ¶ 2. 4 Patent claims must apprise “a skilled
    artisan [of] the scope of the claimed invention with reasonable certainty.” Sonix Tech. Co., 
    844 F.3d at 1376
    . If the claim language fails to apprise a skilled artisan with reasonable certainty, the
    patent claim is indefinite under § 112, ¶ 2. Nautilus, Inc. v. Biosig Instruments, Inc., 
    572 U.S. 898
    , 910 (2014). General knowledge “sufficiently well established in the art and referenced in
    the patent,” does not render a claim indefinite. Presidio Components, Inc. v. Am. Tech. Ceramics
    Corp., 
    875 F.3d 1369
    , 1377 (Fed. Cir. 2017).
    Claim construction may contain indefiniteness inquries, but other invalidity arguments
    under § 112, such as lack of enablement or lack of adequate written description, are separate and
    distinct. See ePlus, Inc., 
    700 F.3d at 517
    ; Philips, 415 F.3d at 1327 (“[W]e have certainly not
    endorsed a regime in which validity analysis is a regular component of claim construction.”); see
    also, e.g., Metabolite Labs., Inc. v. Lab. Corp. of Am. Holdings, 
    370 F.3d 1354
    , 1361 (Fed. Cir.
    2004); Sw. Software, Inc. v. Harlequin Inc., 
    226 F.3d 1280
    , 1297–98 (Fed. Cir. 2000). Despite
    invalidity conceptually overlapping with indefiniteness, parties must use the proper standard
    when arguing invalidity. See, e.g., Augme Techs., Inc. v. Yahoo! Inc., 
    755 F.3d 1326
    , 1340 (Fed.
    Cir. 2014) (“Appellants’ arguments appear to be based on the wrong legal standard, i.e., written
    description or enablement as opposed to indefiniteness.”); Process Control Corp. v. HydReclaim
    Corp., 
    190 F.3d 1350
    , 1358 n.2 (Fed. Cir. 1999) (“[D]efiniteness and enablement are analytically
    distinct requirements [of validity], even though both concepts are contained in 
    35 U.S.C. § 112
    .”).
    E.       Means-Plus-Function Claims
    Patent claims may also be directed to a combination comprising a series of elements. “A
    patentee may express an ‘element in a claim for a combination’ ‘as a means or step for
    performing a specified function without the recital of structure, material, or acts in support
    thereof.’” HTC Corp. v. IPCom GmbH & Co., KG, 
    667 F.3d 1270
    , 1278 (Fed. Cir. 2012)
    (quoting 
    35 U.S.C. § 112
    , ¶ 6). Known as means-plus-function claiming, this claim drafting
    technique pursuant to § 112, ¶ 6 results in a claim construction covering “the corresponding
    structure, material, or acts described in the specification and equivalents thereof.” 
    35 U.S.C. § 112
    , ¶ 6.
    4
    The paragraphs of 
    35 U.S.C. § 112
     were replaced with newly designated subsections when the America Invents
    Act (“AIA”), Pub. L. No. 112–29, took effect on 16 September 2012. The application resulting in the patent-at-
    issue in this case was filed before that date, so the Court refers to the pre-AIA version of § 112.
    - 11 -
    The presence or absence of the word “means” in a patent claim impacts the claim
    limitation’s interpretation. See Williamson v. Citrix Online, LLC, 
    792 F.3d 1339
    , 1348 (Fed. Cir.
    2015). The presence of the word “means” creates a rebuttable presumption indicating invocation
    of § 112, ¶ 6 but is not the “essential inquiry” of means plus function claiming structure. Id.
    Instead, the analysis turns on “whether the words of the claim are understood by persons of
    ordinary skill in the art to have a sufficiently definite meaning as the name for structure.” Id.
    Sufficient structure is recited “‘if the claim term is used in common parlance or by persons of
    skill in the pertinent art to designate structure, even if the term covers a broad class of structures
    and even if the term identifies the structures by their function.’” Skky, Inc. v. MindGeek,
    S.A.R.L., 
    859 F.3d 1014
    , 1019 (Fed. Cir. 2017) (quoting TecSec, Inc. v. Int’l Bus. Machs. Corp.,
    
    731 F.3d 1336
    , 1347 (Fed. Cir. 2013)). If both the claim and the specification fail to disclose
    sufficient structure to perform the claimed function, then the claim is indefinite. Williamson, 
    792 F.3d at 1352
    .
    III.    Disputed Claim Term #1: “standardized credential reader means”
    Plaintiff’s Proposed Construction                  Defendants’ Proposed Construction
    “Here the claimed function is to ‘read a           “Indefinite.
    credential.’ The patent in suit identifies one
    or more standard devices for performing this       To the extent the term is construed,
    function. However, the patent covers both          Defendants propose:
    such standard devices and any equivalents.
    You have heard testimony in the trial of this      A device, separate from the ID authenticator,
    matter relating to whether or not the accused      for reading a credential encoded with personal
    products are such equivalents. As the fact         identification that has a fixed 2D imaging
    finder, your role is to decide whether the         assembly, an angled window on which the
    products accused of infringing by plaintiff are    credential is placed, an ID/object detector,
    such equivalents or not.”                          and a 3-track magstripe reader, all of which
    are mounted in a housing. The device does
    Pl.’s Resp. Cl. Constr. Br. at 2–3.                not rely on any of the following to improve
    the image resolution: movement or rotation
    of any component, mirroring, focused
    circuitry, a display screen, movable support, a
    longitudinal axis, a support shroud, an optics
    rotating assembly, or a user visible indicator.”
    Defs.’ Cl. Constr. Br. at 4.
    The disputed term is used in claim 1:
    a standardized credential reader means for reading a credential encoded with
    personal identification to be used at entry point into the airport sterile
    areas and automatically collects data to build individual real time records;
    ’844 patent col. 5 ll. 1–4.
    - 12 -
    A.      Parties’ Arguments
    Defendants argue “standardized credential reader means” is indefinite because the
    specification of the ’844 patent “fails to disclose adequate corresponding structure for the
    claimed function.” Defs.’ Cl. Constr. Br. at 4. Defendants state, “[N]o description is given as to
    the actual structure of this element that would enable it to read encoded credentials” in either the
    figures or the specification. Id. at 5. Defendants assert Figure 1 “includes merely a perspective
    view of an outer housing of [the apparatus for recovering information from standardized personal
    identification credentials], with no visible internal structure,” whereas “the specification
    describes the reader element in purely functional terms.” Id. at 5–6. While acknowledging “in
    some circumstances, ‘familial patents inform the construction of a claim term and are
    appropriately treated as intrinsic evidence,’” defendants argue “‘material incorporated by
    reference cannot provide the corresponding structure necessary to satisfy the definiteness
    requirement for a means-plus-function clause.’” Id. at 6 (quoting E.I. du Pont de Nemours & Co.
    v. Unifrax I LLC, 
    921 F.3d 1060
    , 1070 (Fed. Cir. 2019); Default Proof Credit Card Sys., Inc. v.
    Home Depot U.S.A. Inc., 
    412 F.3d 1291
    , 1301 (Fed. Cir. 2005); then citing Atmel Corp. v. Info.
    Storage Devices, Inc., 
    198 F.3d 1374
    , 1382 (Fed. Cir. 1999); Fiber, LLC v. Ciena Corp., 
    792 F. App’x 789
    , 795 (Fed. Cir. 2019)). Defendants argue, moreover, “even if ‘one of skill in the art
    may have been able to find a structure that would work’ to implement the recited function, that
    does not satisfy § 112, ¶ 6” because “a patentee is only entitled to claim ‘corresponding structure
    . . . described in the specification and equivalents thereof.’” Defs.’ Reply Cl. Constr. Br. at 3
    (emphasis in original) (quoting Ergo Licensing, LLC v. CareFusion 303, Inc., 
    673 F.3d 1361
    ,
    1364 (Fed. Cir. 2012). Defendants argue plaintiff’s reference to his ’282 application—now the
    ’732 patent—for which the ’844 patent is a continuation-in-part, cannot satisfy the definiteness
    requirement for a means-plus-function clause. Defs.’ Cl. Constr. Br. at 6.
    If not indefinite, defendants argue their proposed construction is the “only one that
    accurately captures the structure disclosed in the [’732 parent patent].” 
    Id.
     According to
    defendants, plaintiff’s proposed construction “is silent as to what actual structure would result in
    infringement of the claim.” Id. at 7. Defendants also argue plaintiff’s proposed construction,
    “‘read a credential,’ completely reads out the claim terms ‘standardized’ and ‘encoded,’ each of
    which modifies the term ‘credential’ in the limitation at issue.” Id. at 5. If the Court gives effect
    to plaintiff’s definition, defendants argue, the claim could encompass the “reading of any type of
    credential, regardless of whether the credential was ‘standardized’ or contained ‘encoded’
    information.” Id.
    Plaintiff refutes defendants’ indefiniteness argument by contending “standard credential
    reader means are well known to one of the ordinary skill in the art.” Pl.’s Resp. Cl. Constr. Br. at
    3. “There are only a few such machines commercially available at any given time,” plaintiff
    argues, “and anyone of ordinary skill working in the field is well aware of what those machines
    are.” Id.; see also Pl.’s Surreply Cl. Constr. Br. at 5. Plaintiff quotes Atmel to argue “the
    knowledge of one skilled in the particular art may be used to understand what structure(s) the
    specification discloses . . . [and] even a dictionary or other documentary source may be helpful
    for such assistance.” Pl.’s Resp. Cl. Constr. Br. at 3 (quoting Atmel Corp., 
    198 F.3d at 1382
    ).
    Plaintiff argues “the patent in suit identifies one or more standard devices for performing this
    function,” as seen in Figure 1 and the detailed description of Figure 1. Pl.’s Surreply Cl. Constr.
    - 13 -
    Br. at 3. Asserting the claim is definite, plaintiff argues the Court should construe the term as
    claiming the function, “to ‘read a credential.’” Pl.’s Resp. Cl. Constr. Br. at 2–3.
    B.       Analysis
    1.       The Court’s Preliminary Construction
    Before the Markman hearing, the Court provided the parties with the Court’s preliminary
    construction after considering both parties’ claim construction briefs and all referenced materials
    in full. See Tr. at 8:15–19. The government asserts in briefing both parties agreed the term
    should be construed under 
    35 U.S.C. § 112
    , ¶ 6 “but dispute the precise function involved.”
    Defs’ Cl. Constr. Br. at 4. Accordingly, the Court initially construed the term under a means-
    plus-function analysis. As the claim term contains the word “means,” the Court looked to
    identify what function the means was intended to perform. The parties dispute what credentials
    the function applies to and limitations surrounding the apparatus performing the function, but
    both parties generally agree the claimed function is to “read a credential.” See 
    id.
     at 4–5
    (arguing the construction, among other limitations, includes “reading a credential”); Pl.’s Resp.
    Cl. Constr. Br. at 2–3 (contending the construction should be, “read a credential”). After
    identifying a function, the Court then “identif[ied] the structure in the specification that is clearly
    linked with this function . . . .” Rain Computing Inc. v. Samsung Elecs. Am., Inc., 
    989 F.3d 1002
    ,
    1007 (Fed. Cir. 2021). The Court relied on the ’732 patent’s description, as referenced the ’844
    patent, column 1 lines 39–40, for the apparatus components for a corresponding structure of the
    “standardized credential reader means” function and, therefore, preliminarily found the term not
    indefinite. See HTC Corp. v. IPCom GmbH & Co., KG, 
    667 F.3d 1270
    , 1279 (Fed. Cir. 2012).
    The Court preliminarily construed the term as the apparatus in the the ’732 patent or “a device
    for reading a credential encoded with personal identification that has a fixed 2D imaging
    assembly, an angled top window, an ID/object detector, and a 3-track magstripe reader, all of
    which are mounted on a housing. The device is stationary with no moveable components.” 5
    2.       The Court’s Final Construction
    At the Markman hearing, plaintiff confirmed the disputed term invokes a means-plus-
    function construction. Tr. at 27:13–14 (“[PLAINTIFF]: [The claim] was a means-plus-function
    claim.”), 31:16–18 (“THE COURT: [Y]our point is that it does invoke 112(f)? [PLAINTIFF]:
    Yes, using that structure.”). Defendants agreed the language of the term invokes means-plus-
    function construction. Tr. at 45:4–7 (“[DEFENDANTS]: [B]oth parties contend this is a means-
    plus-function construction.”). Ordinarily, the word “means” in a claim creates a rebuttable
    5
    The Court initially construed the term as the apparatus disclosed in the ’732 patent because of a shared Figure 1
    and the reference to the apparatus in the ’844 patent. See ’844 patent col. 1 l. 39–40 (“Such method uses a computer
    system, the apparatus of [the ’732 patent], and the software application of the [the ’732 patent].”). While the ’732
    patent is incorporated by reference and therefore “provides context” to claim construction, the ’844 patent does not
    provide a comprehensive explanation linking the structure to the performance of the function. Fiber, 792 Fed.
    App’x at 795 (quoting Default Proof Credit Card Sys., Inc., 
    412 F.3d at 1301
     (“As an initial matter, material
    incorporated by reference cannot provide the corresponding structure necessary to satisfy the definiteness
    requirement for a means-plus-function clause.”) (internal quotes and citation omitted)); see Finjan LLC v. ESET,
    LLC, 
    51 F.4th 1377
    , 1382 (Fed. Cir. 2022). As a preliminary construction, however, the Court was willing to
    construe in favor of validity, despite the tenuous link between structure and performance of the function.
    - 14 -
    presumption § 112, ¶ 6 applies, which the party seeking to overcome the presumption has the
    burden to proffer evidence to rebut. Williamson v. Citrix Online, LLC, 
    792 F.3d 1339
    , 1348
    (Fed. Cir. 2015); Apex, Inc. v. Raritan Comput., Inc., 
    325 F.3d 1364
    , 1371–72 (Fed. Cir. 2003)
    (placing the evidentiary burden to rebut on the party seeking to overcome the presumption).
    Here, neither party seeks to rebut a mean-plus-function construction, so the Court need not
    determine whether the rebuttable presumption is overcome and instead analyzes definiteness
    under the mean-plus-function construction.
    Determining definiteness under a means-plus-function construction requires a two-step
    analysis. Williamson, 
    792 F.3d at 1351
    . First, a court will “identify the claimed function.” 
    Id.
     at
    1351 (citing Noah Sys., Inc. v. Intuit Inc., 
    675 F.3d 1302
    , 1311 (Fed. Cir. 2012)). “Then, the
    court [will] determine what structure, if any, disclosed in the specification corresponds to the
    claimed function.” 
    Id. at 1349
    .
    First, the Court identifies the claimed function. Both parties agree the claimed function is
    to “read a credential.” See Defs.’ Cl. Constr. Br. at 4–5 (arguing the construction, among other
    limitations, includes “reading a credential”); Pl.’s Resp. Cl. Constr. Br. at 2–3 (contending the
    construction should be “read a credential”). The Court agrees “reading a credential” is at least
    the primary claimed function here as it is consistent with the claim language. ’844 patent col. 5
    ll. 1–2 (emphasis added) (“a standardized credential reader means for reading a credential”).
    Claim 1 also suggests the standardized credential reader may store some information for some
    amount of time. The claim states a “software application” can “recover[] information from the
    standardized credential reader,” and “a central processing unit” can “receiv[e] information from
    the standardized credential reader.” ’844 patent col. 5 ll. 5–6, 24–25 (emphasis added).
    Second, the Court determines whether the specification discloses sufficient structure
    corresponding to the claimed function. Williamson, 
    792 F.3d at 1351
    . When asked where the
    specification discloses structure corresponding to the credential reader’s function, plaintiff could
    not point to anything in the ’844 patent specification describing structure necessary for a
    standardized credential reader means. Tr. at 44:16–24 (“THE COURT: [C]an you read from the
    spec[ification] where . . . the requisite structure is given? [PLAINTIFF]: Not from the
    spec[ification], no. You have to refer to external devices and the knowledge of one of ordinary
    skill in the art in terms of what those devices are.”).
    The Court in its preliminary construction relied on the ’732 patent to find corresponding
    structure and prevent indefiniteness, but at oral argument, plaintiff disclaimed the references to
    the ’732 patent in this context, specifically Figure 1 contained in both patents and column 1 lines
    39 to 40. Tr. at 28:9–14 (“THE COURT: Isn’t [Figure 1] a picture from the ’732 patent?”
    [PLAINTIFF]: It is a picture from the ’732 patent, but it’s a generic reference . . . we’ve never
    said that this is what we’re actually using as our structural reference.”). Plaintiff asserted Figure
    1 of the ’844 patent was used to denote a generic credential reader understood as a wide variety
    of readers for the purpose of credential reading by a PHOSITA, not a specific structure. Tr. at
    28:20–29:14. Indeed, plaintiff argues, “The patent-in-suit identifies one or more standard
    devices for performing this function. However, the patent covers both such standard devices and
    any equivalents.” Pl.’s Resp. Cl. Constr. Br. at 2–3. Plaintiff, however, cannot point to other
    language in the ’844 patent describing products or characteristics of products which could be
    - 15 -
    used for the purpose of reading credentials. See Tr. at 30:10–16 (“THE COURT: Is there
    anywhere where it says that it could be a variety of certain products or a reader that has certain
    attributes or may have certain attributes? [PLAINTIFF]: Not to my knowledge.”). Even using
    the reference to the ’732 figure, the link between the apparatus and the performance of function
    was tenuous; with plaintiff disclaiming the ’732 figure as a specific structure, the ’844 patent
    specification cannot adequately explain how the apparatus, including the apparatus incorporated
    though the ’732 patent, performs the function. By characterizing Figure 1 as a generic and
    cabining its structure to the ’732 patent, the specification, including its figures, now do not link
    any structure to the claimed function. See Williamson, 
    792 F.3d at
    1351–54.
    To support a structure, plaintiff states the generic reader is sufficient “to refer to a group
    of electronic devices by one of ordinary skill in the art.” See Tr. at 28:23–29:7. Plaintiff asserts
    the Federal Circuit in Telcordia held the word “controller” was deemed to have sufficient
    structure for a “means-plus-function claim because the record shows that an ordinary artisan
    would have recognized the controller as an electronic device of known structure.” 
    Id.
     Telcordia,
    however, is distinguishable from the current case because the meaning of “controller” was
    clarified and supported by expert testimony, whereas no such testimony in support of “credential
    reader” exists here. Telcordia Techs., Inc. v. Cisco Sys., Inc., 
    612 F.3d 1365
    , 1377 (Fed. Cir.
    2010).
    “The indefiniteness inquiry is concerned with whether the bounds of the invention are
    sufficiently demarcated, not with whether one of ordinary skill in the art may find a way to
    practice the invention.” ePlus, Inc. v. Lawson Software, Inc., 
    700 F.3d 509
    , 517 (Fed. Cir. 2012).
    Plaintiff’s boundless mention of devices is an insufficient demarcation of the invention. 
    Id.
    Plaintiff agrees the claim invokes means-plus-function claiming yet fails to point to any structure
    “in the specification [corresponding] to the claimed function.” Williamson, 
    792 F.3d at 1351
    .
    Plaintiff is unable to prove “the claim term is used in common parlance or by persons of skill in
    the pertinent art to designate structure, even if the term covers a broad class of structures and
    even if the term identifies the structures by their function.” Skky, Inc. v. MindGeek, S.A.R.L., 
    859 F.3d 1014
    , 1019 (Fed. Cir. 2017) (cleaned up) (quoting TecSec, Inc. v. Int’l Bus. Machs. Corp.,
    
    731 F.3d 1336
    , 1347 (Fed. Cir. 2013)). Under 
    35 U.S.C. § 112
    , ¶ 6, a person of ordinary skill in
    the art is unable to recognize the structure in the specification and associate it with the
    corresponding function in the claim; the means-plus-function clause of “standardized credential
    reader means” is therefore indefinite. See Williamson, 
    792 F.3d at 1354
    .
    Plaintiff’s Proposed Construction                    Defendants’ Proposed Construction
    “Here the claimed function is to ‘read a             “Indefinite.
    credential.’ The patent in suit identifies one
    or more standard devices for performing this         To the extent the term is construed,
    function. However, the patent covers both            Defendants propose:
    such standard devices and any equivalents.
    You have heard testimony in the trial of this        A device, separate from the ID authenticator,
    matter relating to whether or not the accused        for reading a credential encoded with personal
    products are such equivalents. As the fact           identification that has a fixed 2D imaging
    finder, your role is to decide whether the           assembly, an angled window on which the
    credential is placed, an ID/object detector,
    - 16 -
    products accused of infringing by plaintiff are    and a 3-track magstripe reader, all of which
    such equivalents or not.”                          are mounted in a housing. The device does
    not rely on any of the following to improve
    the image resolution: movement or rotation of
    any component, mirroring, focused circuitry,
    a display screen, movable support, a
    longitudinal axis, a support shroud, an optics
    rotating assembly, or a user visible indicator.”
    Court’s Construction
    Indefinite.
    IV.       Disputed Claim Term #2: “credential encoded with personal identification”
    Plaintiff’s Proposed Construction                        Defendants’ Proposed Construction
    “Plain meaning.” 6                                       “Indefinite.
    Pl.’s Cl. Constr. Br. at 4.                              To the extent the term is construed,
    Defendants propose:
    A credential used to prove an individual’s
    identity containing a machine-readable
    magnetic stripe or bar code which stores at
    least the individual’s full name.”
    Defs.’ Cl. Constr. Br. at 7.
    The disputed term is used in claims 1 and 3. See ’844 patent col. 5 ll. 1–4, col. 5 l. 44–
    col. 6 l. 5. The following claim limitations highlight selected usage of the term in context:
    a standardized credential reader means for reading a credential encoded with
    personal identification to be used at entry point into the airport sterile areas
    and automatically collects data to build individual real time records;
    
    id.
     col. 5 ll. 1–4.
    An automatic access control system as claimed in claim 1, wherein the standardized
    credential reader can read any one of: driver license identification,
    passports, boarding passes or any other standardized credentials presented
    as a personal identification upon entry into the airport, and whereas
    6
    Plainitiff inadvertently pasted in the proposed construction of a different disputed term for term 2 in exchange of
    proposed construction. Plaintiff, however argues disputed term 2 as plain meaning. See Pl.’s Cl. Constr. Br. at 4 n.2
    (“Plaintiff regrets the inadvertent provision of the definition for another term in the supplemental exchange of
    definitions. (See Ex. C at 3). The parties have exchanged numerous tables for the claim terms with unfortunately
    many different orders for the terms even for each party, so while cut and pasting is helpful, it has its hazards. In any
    event, rather than ask for a supplemental definition, Defendants construed this mistake as an argument for ‘a
    credential,’ stripping the term of its requirement that it be encoded with personal identification. As with many of the
    other claims that have clearly understood terms, Plaintiff intended to argue only for plain meaning.”)
    - 17 -
    standardized credentials refer to identification documents encoded using
    established standards.
    
    Id.
     col. 5 l. 44–col. 6 l. 5.
    A.       Parties’ Arguments
    Defendants primarily argue the term is indefinite under § 112, ¶ 2. Defendants raise
    several indefiniteness arguments concerning the “multiple types of credentials” plaintiff attempts
    to claim and the ambiguity surrounding “which ones include information ‘encoded’ thereon that
    qualifies as ‘personal identification.’” Defs.’ Cl. Constr. Br. at 7. Defendants asserts “it is
    impossible to determine whether the airport ID so described is also a ‘credential encoded with
    personal identification’” because after the reader device reads an airport ID, the reader device
    requires the employee to enter a security code in a numeric keypad. Id. at 8. Defendants argue
    “[i]t is unclear whether using the information read from the airport ID to verify ‘employment
    status’ . . . would qualify . . . as ‘personal identification’ . . . or . . . would not qualify because the
    separate security code entered on a keypad . . . is necessary to establish the identity of the
    holder.” Id. (emphasis omitted).
    Plaintiff rebuts defendants’ indefiniteness arguments by defining “encode” as “to convert
    into a coded form” and narrowing “personal identification” to “personal identification
    information” because “encoding with personal identification” requires information. Pl.’s Resp.
    Cl. Constr. Br. at 4. Plaintiff argues both “encode” and “personal information” “have very clear
    meanings to one of ordinary skill,” and “read together, it is clear all that is meant is that the
    credential have plain text personal identification information encoded on it in some fashion,
    i.e.[,] a bar code or magnetic stripe.” Id. at 4–5. Plaintiff argues the claim does not exclude
    airport IDs, contrary to defendants’ position, because the keypad security code merely functions
    as an “additional security measure so [airport IDs] are not misused.” Id. at 5. If “information
    sufficient to identify an individual is encoded,” plaintiff argues, “this claim limitation is met.”
    Id.
    If the claim is definite, defendants argue, the Court should construe the scope of the claim
    in accordance with the “structures disclosed in the intrinsic record, and in particular [the ’732
    patent,]” which would require limiting the “personal information” to information encoded in
    magnetic strips or bar codes. Defs.’ Cl. Constr. Br. at 8. Plaintiff argues the examples of
    encoded information in the ’732 patent “do not overrule the plain meaning” of “credential
    encoded with personal identification.” Pl.’s Resp. Cl. Constr. Br. at 6. According to plaintiff,
    “credential encoded with personal identification” should be given its ordinary meaning: “[a]
    credential used to prove an individual’s identity containing a machine-readable aspect (e.g., a
    magnetic stripe or bar code) which stores a name or number that, alone or in combination with
    other information, is sufficient to identify a specific individual.” Id.
    B.       Analysis
    1.      The Court’s Preliminary Construction
    - 18 -
    Before the Markman hearing, the Court provided the parties with the Court’s preliminary
    construction after considering both parties’ claim construction briefs and all referenced materials
    in full. Tr. at 8:15–19. The Court first addressed defendants’ indefiniteness arguments.
    Defendants argue two embodiments described in the specification suggest competing
    interpretations of “credential encoded with personal identification,” so the patent should fail for
    indefiniteness. Defs.’ Cl. Constr. Br. at 7–8. Defendants do not explain why the term cannot
    cover both types of identification.
    The specification language referenced by defendants suggests a broad interpretation. Id.
    The ’844 patent, when describing the operation of the system, indicates a driver’s license is
    merely offered as an example. ’844 patent col. 3 ll. 37–38 (“[a] credential, in this case a driver
    license, is presented to the reading apparatus) (emphasis added). Language in dependent claim 3
    further supports a broad reading which would cover both types of credentials: “the standardized
    credential reader can read any one of: driver license identification, passports, boarding passes or
    any other standardized credentials presented as a personal identification . . . whereas
    standardized credentials refer to identification documents encoded using established standards.”
    ’844 patent col. 5 l. 44–col. 6 l. 5. The PHOSITA is not left in the “zone of uncertainty” as to
    whether the term refers to a driver’s license or airport ID because the claim term explicitly
    covers both. Id. Accordingly, the Court preliminarily rejected defendants’ indefiniteness
    arguments.
    Claim terms are “generally given their ordinary and customary meanings” unless the
    patentee acts as his own lexicographer or disavows the full scope of the claim in the
    specification or during patent prosecution. Phillips v. AWH Corp., 
    415 F.3d 1303
    , 1312–13
    (Fed. Cir. 2005); Thorner v. Sony Comput. Entm’t Am. LLC, 
    669 F.3d 1362
    , 1365 (Fed. Cir.
    2012) (citing Vitronics Corp. v. Conceptronic, Inc., 
    90 F.3d 1576
    , 1580 (Fed. Cir. 1996)). The
    embodiments referenced by defendants provide context for evaluating the scope of the patent,
    but do not limit the Court’s construction. See Phillips, 415 F.3d at 1323–24. The described
    embodiments merely exemplify operation of the system and do not act as explicit definitions or
    overcome the presumptive use of plain and ordinary meaning. See Markman v. Westview
    Instruments, Inc., 
    52 F.3d 967
    , 980 (Fed. Cir. 1995); Jack Guttman, Inc. v. Kopykake Enters.,
    Inc., 
    302 F.3d 1352
    , 1360–61 (Fed. Cir. 2002). The Court, therefore, rejected the construction
    offered by defendants which requires encoding of at least the individual’s full name. Defs.’ Cl.
    Constr. Br. at 7–8. Likewise, the Court also rejected defendants’ argument the patent should be
    limited to use of only magnetic stripe or bar code as a method for encoding. Id. at 8. Such
    limitations are not clearly adopted by the ’844 patent and are merely contemplated by the ’732
    patent. See ’844 patent; ’732 patent. Finally, neither the specification nor the prosecution
    history demonstrates an intention by the patentee to disavow the scope of the plain and ordinary
    meaning, and neither party argrues otherwise in the briefing. See ’844 patent; Defs.’ Cl. Constr.
    Br.; Pl.’s Resp. Cl. Constr. Br.; Defs.’ Reply Cl. Constr. Br.; Pl.’s Surreply Cl. Constr. Br. As
    neither of the two exceptions for ordinary meaning are met, supra Section II.A., the Court did
    not adopt the limitations provided by the ’732 patent and instead preliminarily adopted the plain
    and ordinary meaning of this term. See Phillips, 415 F.3d at 1312–13. Insofar as a specific
    definition is useful, the Court offered the following: “a certified document containing
    information relating to a particular individual converted from one system of communication into
    another.” Credential, Merriam-Webster Dictionary, https://www.merriam-
    - 19 -
    webster.com/dictionary/credential (last visited Jan. 10, 2023) (“testimonials or certified
    documents showing that a person is entitled to credit or has a right to exercise official power);
    Encode, Merriam-Webster Dictionary, https://www.merriam-webster.com/dictionary/encode
    (last visited Jan. 10, 2023) (“to convert (something, such as a body of information) from one
    system of communication into another”); Personal, Webster’s Third New International
    Dictionary (2002) (“of or relating to a particular person”).
    2.      The Court’s Final Construction
    At the Markman hearing, the parties agreed with the Court’s preliminary construction
    with certain modifications. See Tr. at 52:1–60:25. Consistent with defendants’ request, a list of
    documents including “driver’s license, passport, boarding pass, airport ID” has been added. Tr.
    at 56:11–20. Consistent with plaintiff’s request, the term “certified” is replaced with
    “standardized.” Tr. at 58:18–59:17. The Court’s final construction is: “a driver’s license,
    passport, boarding pass, airport ID, or other standardized documents containing information
    relating to a particular individual converted from one system of communication into another.”
    Plaintiff’s Proposed Construction                 Defendants’ Proposed Construction
    “Plain meaning.”                                  “Indefinite.
    To the extent the term is construed,
    Defendants propose:
    A credential used to prove an individual’s
    identity containing a machine-readable
    magnetic stripe or bar code which stores at
    least the individual’s full name.”
    Court’s Construction
    Plain meaning: “a driver’s license, passport, boarding pass, airport ID, or other standardized
    documents containing information relating to a particular individual converted from one
    system of communication into another.”
    V.     Disputed Claim Term #3: “build individual real time records”
    Plaintiff’s Proposed Construction                 Defendants’ Proposed Construction
    “Plain meaning. The system generates a data       “Indefinite.
    record in real time. The data and entry
    decision are displayed to the operator but not    To the extent the term is construed,
    accessed by the system operator. Accessing        Defendants propose:
    data means ability to edit, update and make
    changes, which is not the case here.”             Create and store a record of information
    obtained from each credential reading,
    Pl.’s Resp. Cl. Constr. Br. at 6.                 including at least the individual’s photo and
    all information extracted from the machine-
    readable magnetic stripe or bar code, which
    - 20 -
    may be accessed by the system operator at
    any time”
    Defs.’ Cl. Constr. Br. at 9.
    The disputed term in used in claim 1:
    a standardized credential reader means for reading a credential encoded with
    personal identification to be used at entry point into the airport sterile
    areas and automatically collects data to build individual real time records;
    ’844 patent col. 5 ll. 1–4.
    A.      Parties’ Arguments
    Defendants contend plaintiff’s plain meaning construction is indefinite because the claim
    provides no explanation of how records are built, what constitutes a record, or how the record
    building is done in real time, leaving one of ordinary skill in a zone of uncertainty as to what
    activity is covered by this claim term. Defs.’ Cl. Constr. Br. at 9. According to defendants,
    plaintiff’s “general dictionary definitions” do not remedy this uncertainty. Defs.’ Reply Cl.
    Constr. Br. at 4–5. Plaintiff disagrees, asserting the “information collected and processed” from
    a standardized credential reader means would be “known to one of ordinary skill” because the art
    uses “only a few” machines for this function. Pl.’s Surreply Cl. Const. Br. at 5.
    Plaintiff argues “build individual real time records” is not indefinite. Pl.’s Resp. Cl.
    Constr. Br. at 6–8. Plaintiff relies on general dictionary definitions for “build” and “real time” to
    demonstrate “build” and “real time” are well understood and therefore not indefinite. Id. at 6–7
    (defining build as to “construct (something) by putting parts or material together,” and real time
    as “a system, in which input data is processed within milliseconds so that it is available virtually
    immediately as feedback”) (quoting Exs. D, ECF No. 140-5 (Google definition of “build”), E,
    ECF No. 140-6 (Google definition of “real time”).
    Both parties also offer alternative constructions. Plaintiff suggests the term should be
    construed broadly as “any step of storing data received by a credential reader,” if the Court does
    not adopt the plain meaning construction. Id. at 8. Defendants reject this reading as “overbroad”
    because the construction “would apply to essentially any step of storing data received by an
    accused credential reader.” Defs.’ Cl. Constr. Br. at 10. Plaintiff argues breadth is irrelevant, for
    “[p]atentees are entitled to claim as broadly or as narrowly as they like, so long as the patent is
    valid.” Pl.’s Resp. Cl. Constr. Br. at 7. Defendants’ alternative construction, in contrast,
    imposes two limitations related to “what data is collected and stored in the process of ‘building’
    the records”: (1) the record must include the “individual’s photo and all information extracted
    from the machine-readable magnetic stripe or bar code”; and (2) the “system operator” must be
    able to “access” the record “at any time.” Defs.’ Cl. Constr. Br. at 9. Plaintiff characterizes
    these limitations as attempts to “seize on illustrations in the patent to try to claim a definition
    limited to those illustrations.” Pl.’s Resp. Cl. Constr. Br. at 7.
    - 21 -
    B.       Analysis
    1.       The Court’s Preliminary Construction
    Before the Markman hearing, the Court provided the parties with the Court’s preliminary
    construction after considering both parties’ claim construction briefs and all referenced materials
    in full. Tr. at 8:15–19. At the onset, the Court noted there are two types of records created by
    practicing claim 1 of the ’844 patent: (1) “individual real time records” generated by a
    “standardized credential reader means,” ’844 patent col 5. ll. 1–4; and (2) an “authentication data
    record” generated by an “ID authenticator,” id. at col. 5 ll. 21–23. “[D]ifferent claim terms are
    presumed to have different meanings,” so the Court considered intrinsic evidence concerning the
    individual real time records. MicroStrategy Inc. v. Bus. Objects Ams., 
    238 F. App’x 605
    , 609
    (Fed. Cir. 2007) (citations omitted). For clarity, the Court construed the term by parsing it into
    two phrases: first construing “real time” and then addressing what is required to “build
    individual records.”
    The ’844 patent and ’732 patent specifications extensively detail what “real time” means
    and include disclosures supporting plaintiff’s proffered dictionary definition. Compare Pl.’s
    Resp. Cl. Constr. Br. Ex. E (Google definition of “real time”) (defining real time as “a system, in
    which input data is processed within milliseconds so that it is available virtually immediately as
    feedback”), with ’844 patent col. 5 ll. 26–29 (“upon a credential reading, the automated access
    control system automatically determines the source of the credential data record, and
    automatically extracts personal information”), and the ’732 patent col. 9 ll. 56–60 (“A large
    number of workstations are connected to a local area network . . . controlled by a central
    database server . . . . In such a[n interconnected] network, all data is immediately available at all
    workstations.”). The Court agrees the “information collected and processed” from a
    standardized credential reader means would be “known to one of ordinary skill” as it was well
    known in the art. Presidio Components, Inc. v. Am. Tech. Ceramics Corp., 
    875 F.3d 1369
    , 1376
    (Fed. Cir. 2017) (“A patent need not explicitly include information that is already well known in
    the art.”). Indeed, reading credentials and generating real time records is “sufficiently well
    established in the art and referenced in the patent to render the claims not indefinite.” 
    Id.
     The
    Court accordingly accepted plaintiff’s proffered definition for “real time.” See 
    id.
    Turning to “build[ing] individual records,” the claims describe a process where a
    “standardized credential reader means” reads a “credential encoded with personal identification
    [information].” ’844 patent col. 5 ll. 1–4. The ’844 patent claims mention personal
    identification information is “automatically collect[ed] . . . to build individual real time records,”
    id.; the ’732 patent provides some necessary clarification. 7 The claims of the ’732 patent outline
    the potential arrangement of the system: each “workstation can be standalone with all data
    collected and stored locally, or otherwise [the workstation can be] connected to a local area
    network or an intranet . . . with data stored in a central database server.” ’732 patent col. 14 ll.
    7
    The Court finds the ’732 patent’s disclosures on the apparatus or software application are available as intrinsic
    evidence to the ’844 patent because the ’732 patent is the ’844 patent’s parent. See ’732 patent col. 9 l. 40–col. 13 l.
    25; see also E.I. du Pont de Nemours & Co. v. Unifrax I LLC, 
    921 F.3d 1060
    , 1070 (Fed. Cir. 2019). The ’732
    patent discloses elements of the method claimed by the ’844 patent.
    - 22 -
    27–31 (emphasis added). The ’732 patent specification further clarifies “[t]he functional intent
    of this apparatus is to provide a means for automatically recovering information from
    standardized identification cards and processing the data through an internal processor and
    communicating the output to a computer system or network application.” 
    Id.
     at col. 7 ll. 3–8
    (emphasis added). Viewing the patents together, a “standardized credential reader means”
    processes and stores the credential data internally—at least for a temporary period before the
    data is extracted and stored on the central database server.
    The ’732 and ’844 patents also disclose the process of building real time records: the
    “standardized credential reader means” first decodes data and then encrypts sensitive data. See
    ’732 patent fig.7; ’844 patent col. 3 ll. 39–41 (“The system decodes the encoded data and
    encrypts the sensitive information before displaying it on the work-station monitor for
    verification by the station guard.”). A software application, designed for recovering information
    from the standardized credential reader, extracts the encoded data before the system “display[s
    the data] on the work-station monitor for verification by the station guard.” ’844 patent col. 3 ll.
    40–41. The phrase “for recovering information from” is used several times in the ’732 patent to
    describe the standardized credential reader’s acquisition of information “from standardized
    personal identification credentials.” See, e.g., ’732 patent col. 13 ll. 27–28, 47–48, 57–58. The
    credential reader is separate from the credential, so the inventor’s consistent usage between
    familial patents implies the software application is also separate from the credential reader. See
    ’844 patent col. 1 ll. 37–41. Accordingly, the intrinsic evidence suggests the process of
    “build[ing] individual real time records” occurs exclusively on the credential reader. 
    Id.
     col. 5 ll.
    1–6. The Court preliminarily found the process requires the system to read information off a
    credential, and then immediately: (1) save the information on the credential reader; (2) decode
    the information; (3) encrypt any sensitive personal information; and (4) display the information
    for verification by the gate employee. See ’732 patent fig.7, col. 13 ll. 27–28, 47–48, 57–58; see
    also ’844 patent col. 3 ll. 39–41, col. 5 ll. 1–6. The description of prior art in the ’732 patent,
    where plaintiff distinguished 
    U.S. Patent No. 6,394,356
     (“Zagami”) (filed June 4, 2001), further
    supports the Court’s preliminary construction: (1) the Zagami system “does not claim reading
    encoding available on the driver[’s] license”; and (2) without reading this information, the
    Zagami system “at most” scans credentials as a picture, saving sensitive information in an
    unencrypted format, which “fails to protect individual information.” ’732 patent col. 2 ll. 34–37,
    49–52.
    The Court, by clearly demarcating the bounds of the ’844 patent claim term “build[ing]
    individual real time records,” rejected defendants’ indefiniteness arguments because the ’844
    patent combined with the ’732 patent allow “a skilled artisan to know the scope of the claimed
    invention with reasonable certainty.” See Presidio, 
    875 F.3d at
    1376–77. Defendants’
    indefiniteness contention of “how [records are built] in ‘real time’” is irrelevant because a patent
    claim need not answer every conceivable question to be found definite. 
    Id.
     at 1376 (citing
    Nautilus, Inc. v. Biosig Instruments, Inc., 
    572 U.S. 898
    , 909–10 (2014)). Defendants’ alternative
    construction fares no better, for nothing in the claims or the specification limits what information
    must be stored from the read data. See ’732 patent col. 11 ll. 30–32 (“Each data item . . . can be
    saved in the system data store or ignored at the end of an admission process”), col. 11 ll. 28–29
    (“Data shown in the collection form can be customized for viewing and saving as specified by
    the system administrator.”), col. 10 ll. 43–47 (“[D]igital images . . . [of a potential visitor] are
    - 23 -
    saved or stored in the system only if the individual is actually admitted into the facility.”).
    Limitations from preferred embodiments are not read “into the claims absent a clear indication in
    the intrinsic record that the patentee intended the claims to be so limited.” Liebel-Flarsheim Co.
    v. Medrad, Inc., 
    358 F.3d 898
    , 913 (Fed. Cir. 2004). Defendants offered no indication in the
    intrinsic record that these limitations were intended, so the Court declined to read them into the
    claims and rejected defendants’ alternative construction.
    Plaintiff’s broad proposed constructions must also be rejected. Zagami discloses a “basis
    for providing an access control system,” to “generate[] a data record in real time” and “stor[e]
    data received by a credential reader,” which means either relevant portions of the ’844 patent are
    fully disclosed in the art, or “build[ing] individual real time records” requires additional
    disclosure. ’732 patent col. 1 l. 64–col. 2 l. 52. Plaintiff distinguishes Zagami because of the
    ’844 patent’s usage of decoding and encrypting, so decoding and encrypting must be a necessary
    part of “build[ing] individual real time records.”
    In sum, the Court preliminarily found the intrinsic evidence to support the following
    construction: “the credential reader immediately generates a digital record after decoding
    information from the credential and encrypting sensitive personal information.” See ’844 patent
    col. 3 ll. 39–41 (“The system decodes the encoded data and encrypts the sensitive information
    before displaying it on the work-station monitor for verification by the station guard.”); ’732
    patent fig.7, col. 14 ll. 27–31 (“[T]he system workstation can be standalone with all data
    collected and stored locally, or otherwise connected to a local area network or an intranet . . .
    with data stored in a central database server . . . .”).
    2.     The Court’s Final Construction
    At the Markman hearing, the parties agreed with the Court’s preliminary construction
    with certain modifications. See Tr. at 60:9–69:10. Defendants requested the language “stored
    within the system for access by a operator at any time” be added as the language was supported
    by the specification. Tr. at 63:15–66:6; ’844 patent col. 4 ll. 10–11 (“At any time, the gate
    attendant is able to review the records that have been collected during the entry process.”).
    Plaintiff agreed to this modification and suggested use of the term “user” instead of “operator.”
    Tr. at 65:19. The Court’s final construction is: “The credential reader immediately generates a
    digital record after decoding information from the credential and encrypting sensitive personal
    information. The digital record is then stored within the system for access by a user at any time.”
    Plaintiff’s Proposed Construction                Defendants’ Proposed Construction
    “Plain meaning. The system generates a           “Indefinite.
    data record in real time. The data and
    entry decision are displayed to the              To the extent the term is construed,
    operator but not accessed by the system          Defendants propose:
    operator. Accessing data means ability to
    edit, update and make changes, which is          Create and store a record of information
    not the case here.”                              obtained from each credential reading,
    including at least the individual’s photo and
    all information extracted from the machine-
    - 24 -
    readable magnetic stripe or bar code, which
    may be accessed by the system operator at
    any time”
    Court’s Construction
    The credential reader immediately generates a digital record after decoding information from
    the credential and encrypting sensitive personal information. The digital record is then stored
    within the system for access by a user at any time.
    VI.    Disputed Claim Term #4: “credential collected information match”
    Plaintiff’s Proposed Construction                 Defendants’ Proposed Construction
    “Plain meaning. As an illustration, checks can    “Indefinite.
    be made against TSA lists, employee lists if
    employee, or traveler lists, if traveler.”        To the extent the term is construed,
    Defendants propose:
    Pl.’s Resp. Cl. Constr. Br. at 8.
    A match between the individual real time
    record created for the presented credential and
    any previously collected and stored individual
    real time record containing the same name, or
    information extracted from the same
    credential.”
    Defs.’ Cl. Constr. Br. at 10.
    The disputed term is used in claim 1:
    real time records are checked searching for a credential collected information
    match; individual suspicious status is checked against a security list stored
    in a system database; employee records are checked to determine if the
    individual is an employee; the type of entry, visitor, employee, contractor,
    supplier, or vendor, is determined; and admission is processed as entry or
    re-entry of the individuals,
    ’844 patent col. 5 ll. 8–15.
    A.      Parties’ Arguments
    Defendants argue this term is indefinite. Defs.’ Cl. Constr. Br. at 10. Defendants
    contend the list of functions (including the contested term) require the “software application [to
    perform] three separate and distinct functions, creating ambiguity as to how” the contested term
    differs from what is covered by the second and third recited functions. 
    Id.
     at 11–12 (identifying
    the second phrase to include matches found by “comparing data read by the reader device
    against an airport employee database to verify employee status” and the third phrase to include
    “comparing data read by the reader device against a suspect individual list obtained from an
    outside source”). Moreover, defendants argue plaintiff’s “suggested interpretation of [function
    - 25 -
    1] as a ‘catchall’ would clearly render [functions 2 and 3] superfluous.” Defs.’ Reply Cl. Constr.
    Br. at 6. If the Court does not find the term indefinite, defendants propose the term be construed
    as: “[a] match between the individual real time record created for the presented credential and
    any previously collected and stored individual real time record containing the same name, or
    information extracted from the same credential.” Defs.’ Cl. Constr. Br. at 10.
    To rebut defendants’ indefiniteness argument, plaintiff offers an illustration of potential
    databases where the collected information may be “matched”: “TSA lists, employee lists[,] if
    employee, or traveler lists, if traveler.” Pl.’s Resp. Cl. Constr. Br. at 8. Plaintiff reasons the
    preamble to the contested term, “‘wherein one or more of the following process[es] is
    performed,’” contextualizes the subsequent clauses as part of a list. Id. at 9 (quoting ’844 patent
    col. 5 ll. 6–7). More specifically, plaintiff argues the term is a “catchall phrase in the midst of
    much more specific types of matches, only one of which needs to be performed by the accused
    process to infringe this claim.” Id. If found to be definite, plaintiff argues “credential collected
    information match” should be given its plain and ordinary meaning. Id. at 8.
    B.      Analysis
    1.      The Court’s Preliminary Construction
    Before the Markman hearing, the Court provided the parties with the Court’s preliminary
    construction after considering both parties’ claim construction briefs and all referenced materials
    in full. Tr. at 8:15–19. The ’844 patent specification discloses the elements for a “credential
    collected information match,” including three main prerequisite steps: (1) the standardized
    credential reader means decodes the credential; (2) the standardized credential reader means
    encrypts sensitive personal information; and (3) the station guard views the resulting “real time
    record” after the standardized credential reader means presents the record for verification. See
    ’844 patent col. 3 ll. 35–41. After station guard verification, the system “checks database
    information to determine whether the individual is an employee, contractor, vendor, supplier or a
    visitor.” ’732 patent col. 10 ll. 32–34; see also ’844 patent col. 5 ll. 12–13 (“the type of entry,
    visitor, employee, contractor, supplier, or vendor, is determined”). If the individual is an
    employee who is “recognized using the employee pre-selected alternative credential,” the system
    displays the employee’s picture, which is verified by the station guard. ’732 patent col. 10 ll.
    35–39; see also ’844 patent col. 5 ll. 30–31 (“other alternative credentials”). If the individual is
    “recognized as a visitor, then the system acquires a digital image of the individual” using a
    camera, which is “saved or stored in the system only if the individual is actually admitted into
    the facility.” ’732 patent col. 10 ll. 41–47. The system then “checks existing records for
    possible matches. If a match is found, the archived record is displayed with the
    contemporaneous record . . . to facilitate visual confirmation by the station guard.” Id. col. 10 ll.
    48–52; see also ’844 patent col. 5 ll. 29–30 (“checked against a security list”). In addition, the
    system “further checks for known and suspected criminal, saboteurs, and terrorists using lists as
    delivered by the US Department of Homeland Security.” ’732 patent col. 10 ll. 55–58; see also
    ’844 patent col. 5 ll. 29–30 (“checked against . . . TSA NO-FLY list, SELECTEE list”). If all
    checks are negative, “the system searches for previous visitor records,” and if found, the system
    displays the previous image for visual confirmation by the station guard. ’732 patent col. 10 ll.
    64–67; see also ’844 patent col. 5 ll. 14–15 (“admission is processed as entry or re-entry of the
    - 26 -
    individuals”). In sum, the disclosure identifies four potential matches: (1) an employee match;
    (2) a Department of Homeland Security list match; (3) an archived record match; and (4) a
    current visitor match (for entry/re-entry).
    Turning to the parties’ proposed constructions, the Court agreed with plaintiff the plain
    meaning is sufficiently clear within context of the specifications but disagreed the “credential
    collected information match” is a “catchall” provision. See Pl.’s Resp. Cl. Constr. Br. at 8–9.
    Defendants’ attempt to limit this “match” to a “collected and stored individual real time record
    containing the same name, or information extracted from the same credential” is unsupported by
    the intrinsic record. See Defs.’ Cl. Constr. Br. at 10. Accordingly, the Court preliminarily
    construed “credential collected information match” according to its plain and ordinary meaning.
    See Thorner v. Sony Comput. Entm’t Am. LLC, 
    669 F.3d 1362
    , 1365 (Fed. Cir. 2012) (citing
    Vitronics Corp. v. Conceptronic, Inc., 
    90 F.3d 1576
    , 1580 (Fed. Cir. 1996)). Insofar as a specific
    definition is useful, the Court offered the following preliminary construction: “when the data
    collected from a currently presented credential is equal or similar to an existing record.” See
    Match, Merriam-Webster Dictionary, https://www.merriam-webster.com/dictionary/match (last
    visited Jan. 10, 2023) (“a person or thing equal or similar to another); Information, Webster’s
    Third New International Dictionary (2002) (“facts of figures ready for communication or use as
    distinguished from those incorporated in a formally organized branch of knowledge: DATA”).
    2.     The Court’s Final Construction
    At the Markman hearing, both parties agreed to the Court’s preliminary plain meaning
    construction. Tr. at 67:1–9. The Court adopts its preliminary construction as final: plain
    meaning, “when the data collected from a currently presented credential is equal or similar to an
    existing record.”
    Plaintiff’s Proposed Construction                Defendants’ Proposed Construction
    “Plain meaning. As an illustration, checks can   “Indefinite.
    be made against TSA lists, employee lists if
    employee, or traveler lists, if traveler.”       To the extent the term is construed,
    Defendants propose:
    A match between the individual real time
    record created for the presented credential and
    any previously collected and stored individual
    real time record containing the same name, or
    information extracted from the same
    credential.”
    Court’s Final Construction
    Plain meaning: “when the data collected from a currently presented credential is equal or
    similar to an existing record.”
    VIII. Disputed Claim Terms #5: “system database”
    Plaintiff’s Proposed Construction                Defendants’ Proposed Construction
    - 27 -
    “Plain meaning. A database is a database and      “A central database server, connected to
    yes there is a system involved but all            the automated access control system over a
    databases involve some type of system.            local area network, that stores at least
    Currently, that hardly means it is connected to   individual real time records and a security
    a [local access network (‘LAN’)] and              list for multiple automated access control
    generally its not given improvement in WiFi       systems.”
    and cellular technologies like 5G.”
    Defs.’ Cl. Constr. Br. at 13.
    Pl.’s Resp. Cl. Const. Br. at 9–10.
    The disputed term in used claims 1, 5, and 6. ’844 patent col. 5 ll. 7–15, col. 6 ll. 9–14,
    15–19. The following claim limitations highlight selected usage of the term in context:
    real time records are checked searching for a credential collected information
    match; individual suspicious status is checked against a security list stored
    in a system database; employee records are checked to determine if the
    individual is an employee; the type of entry, visitor, employee, contractor,
    supplier, or vendor, is determined; and admission is processed as entry or
    re-entry of the individuals,
    
    id.
     col. 5 ll. 5–7,
    5. An automated access control system as claimed in claim 1, wherein the system
    database includes one or more interrelated group of records: the airport employee
    as ESCORTER, the DMV vehicle registration card information, the driver
    identification record and the passengers’ identification records.
    
    id.
     col. 6 ll. 9–14,
    6. An automated access control system as claimed in claim 1, includes: a wireless
    barcode reader, a system database, a suitable camera, a color plastic card printer, a
    keyboard, a laser printer, an intranet package and a display monitor.
    
    id.
     col. 6 ll. 15–19.
    A.       Parties’ Arguments
    Defendants argue “system database” in the context of the ’844 patent requires the
    combination of a central server, the automated access systems, and a local area network. Defs.’
    Cl. Constr. Br. at 14. According to defendants, the embodiment described in the ’844 patent
    makes use of a network and limits the breadth of the term because a single embodiment can be
    appropriately used to limit patent scope. 
    Id.
     at 13 (citing Medicines Co. v. Mylan, Inc., 
    853 F.3d 1296
    , 1309 (Fed. Cir. 2017)).
    Plaintiff argues patent scope can only be limited by a single embodiment when the term
    has no generally accepted technical meaning and intrinsic evidence is required to construe the
    - 28 -
    term. Pl.’s Resp. Cl. Constr. Br. at 10. Plaintiff further argues “the term ‘system database’ is
    being used in its conventional manner to simply describe a conventional component used in the
    invention.” 
    Id.
     The “‘system database’ . . . has a well understood meaning to one of ordinary
    skill in the art,” so plaintiff argues “plain meaning should . . . control.” 
    Id.
     at 10–11.
    B.      Analysis
    1.      The Court’s Preliminary Construction
    Before the Markman hearing, the Court provided the parties with the Court’s preliminary
    construction after considering both parties’ claim construction briefs and all referenced materials
    in full. Tr. at 8:15–19. The Court first determined whether defendants’ proposed construction
    was supported in the patent. Defendants’ preferred construction imposes multiple limitations on
    the construction of the term. See Defs.’ Cl. Constr. Br. at 13. Defendants construe “system
    database” to require a centralized server and a connection through a LAN from the server to the
    automated control system, while the “system database” stores real time records and a security
    list. 
    Id.
     Defendants draw these limitations from language in the specification describing the
    “Airport Vehicular Gate Entry system” as an “enterprise platform.” Id. at 14 (quoting ’844
    patent col. 2 ll. 40–47). In the system:
    multiple airport vehicular gates comprise one workstation each, interconnected in
    a network configuration, controlled by a central database server. All workstations
    collect and store data in the central database server. In such a network, all data is
    immediately available at all workstations. Such a strategy permits vehicles entering
    from one particular gate to exit from another gate.
    ’844 patent col. 2 ll. 40–47. The stated configuration does not explicitly correspond to a “system
    database” as used in claim 1. Compare id., with id. col. 5 l. 12, col. 6 l. 10, col. 6 l. 16.
    Defendants conflate “central database server” as used in the specification with “system database”
    as used in the claims; however, these are not necessarily the same. The section of the
    specification cited by defendants refers to storage of information collected by the individual
    workstations. ’844 patent col. 2 ll. 40–47. “All workstations collect and store data in the central
    database server[,]” so “all data is immediately available at all workstations” and the system can
    stay up to date when a vehicle “exit[s] from another gate.” Id. (emphasis added). By contrast,
    the “system database” referenced in claim term 1 stores a “security list.” Id. col. 5 ll. 12. The
    specification indicates the invention—the Airport Vehicular Gate Entry system—“incorporates
    critical data” from security lists which “could be supplied by . . . the US Department of
    Homeland Security, the Federal Bureau of Investigation and other security agencies.” ’844
    patent col. 1 ll. 54–59. In other words, the “central databases server” is not necessarily the same
    as the “system database.” Consequently, the “system database” in claim 1 could be a separate
    repository of information and is not limited by the methods for storing information collected by
    each workstation in a central database server.
    Moreover, a particular embodiment described in the specification should not limit the
    scope of the claims. Phillips v. AWH Corp., 
    415 F.3d 1303
    , 1323–24 (Fed. Cir. 2005) (noting
    that the Federal Circuit “expressly reject[s] the contention that if a patent describes only a single
    - 29 -
    embodiment, the claims of the patent must be construed as being limited to that embodiment”).
    Even if the language cited by defendants were relevant to the definition of system database as
    used in claim 1, the scope of the claim term should not be so limited. 
    Id.
     Defendants cite
    Medicines for the proposition a single embodiment can be used to provide a limited definition for
    claim construction. Defs.’ Cl. Constr. Br. at 13 (citing Medicines, 
    853 F.3d at 1309
    ). Medicines
    is inapposite to the facts in this case. First, in Medicines, the court was required to construct a
    term—“efficient mixing”—which did not “carr[y] an accepted meaning to one of ordinary skill
    in the art.” Medicines, 
    853 F.3d at 1308
    . Second, in Medicines, construction of the term in a
    manner consistent with the specification was necessary to overcome the prior art. 
    Id.
     at 1303–
    05. The patent’s novelty was based on its “batch consistency,” and the specification taught
    “efficient mixing as a necessary and sufficient condition for achieving batch consistency.” 
    Id. at 1305
    . Therefore, constructing “efficient mixing” based on the specification was necessary to
    cabin the scope of the patent. In this case, “system database” is a common term of art and the
    novelty of the patent does not depend on this term’s construction. See Pl.’s Resp. Cl. Constr. Br.
    at 10–11. Therefore, the Court did not preliminarily construe “system database” with the
    limitations of the embodiment described in the ’844 patent specification. See ’844 patent col. 2
    ll. 40–47.
    As plaintiff neither disavows claim scope or acts as his own lexicographer, the Court
    preliminarily construed the term according to its plain and ordinary meaning. Thorner v. Sony
    Comput. Entm’t Am. LLC, 
    669 F.3d 1362
    , 1365 (Fed. Cir. 2012) (citing Vitronics Corp. v.
    Conceptronic, Inc., 
    90 F.3d 1576
    , 1580 (Fed. Cir. 1996)). Insofar as a specific definition is
    useful, the Court offered the following: “a collection of data organized for retrieval by a
    computer, and accessible by an automated access control system.” See Database, Merriam-
    Webster Dictionary, https://www.merriam-webster.com/dictionary/database, (last visited Jan. 10,
    2023) (“a usually large collection of data organized especially for rapid search and retrieval (as
    by a computer)”).
    2.     The Court’s Final Construction
    At the Markman hearing, both parties agreed to the Court’s preliminary plain meaning
    construction. Tr. at 67:20–68:11. The Court adopts its preliminary construction as final: plain
    meaning, “a collection of data organized for retrieval by a computer, and accessible by an
    automated access control system.”
    Plaintiff’s Proposed Construction               Defendants’ Proposed Construction
    “Plain meaning. A database is a database and “A central database server, connected to
    yes there is a system involved but all          the automated access control system over a
    databases involve some type of system.          local area network, that stores at least
    Currently, that hardly means it is connected to individual real time records and a security
    a LAN and generally its not given               list for multiple automated access control
    improvement in WiFi and cellular                systems.”
    technologies like 5G.”
    Court’s Construction
    Plain meaning: “a collection of data organized for retrieval by a computer, and accessible by
    an automated access control system.”
    - 30 -
    IX.    Disputed Claim Term #6: “the type of entry, visitor, employee, contractor, supplier,
    or vendor, is determined”
    Plaintiff’s Proposed Construction              Defendants’ Proposed Construction
    “Plain meaning. Visitor is a well understood   “Indefinite.
    term. So is an employee. Contractor. Supplier.
    And Vendor.”                                   To the extent the term is construed,
    Defendants propose:
    Pl.’s Resp. Cl. Constr. Br. at 11.
    The system is capable of categorizing the
    individual presenting the credential as each
    one of the following and categorizes the
    individual as one of the following: visitor,
    employee, contractor, supplier, or vendor.”
    Defs.’ Cl. Constr. Br. at 14.
    The disputed term is used in claim 1:
    real time records are checked searching for a credential collected information
    match; individual suspicious status is checked against a security list stored
    in a system database; employee records are checked to determine if the
    individual is an employee; the type of entry, visitor, employee, contractor,
    supplier, or vendor, is determined; and admission is processed as entry or
    re-entry of the individuals,
    ’844 patent col. 5 ll. 8–15.
    A.      Parties’ Arguments
    Defendants argue the disputed term is indefinite. Defs.’ Cl. Constr. Br. at 14–15.
    Defendants concede the terms visitor, employee, contractor, supplier, and vendor are “well
    understood terms,” but not well understood in the context of the claim. 
    Id.
     Defendants state the
    patent is “silent with respect to how the system determines who is in the other four distinct
    categories of visitor, contractor, supplier, or vendor.” 
    Id.
     at 15–17. Defendants argue “the claim
    creates a zone of uncertainty as to what activity is encompassed under the claim term,” and “the
    claim term remains indefinite.” 
    Id.
     In the alternative, defendants argue the term should be
    construed to “properly parse[] the potentially confusing use of passive voice and an ‘or’-joined
    list.” Id. at 17.
    Plaintiff argues the terms “visitor, employee, contractor, supplier, [and] vendor” all have
    a well understood plain meaning. See Pl.’s Cl. Constr. Br. at 11. Plaintiff claims “the system
    would determine whether someone is a contractor, supplier or vendor: just as with their
    employees, an airport maintains a database of such individuals.” Id. Plaintiff further claims
    defendants’ proposed construction should be rejected because defendants’ “definition that the
    - 31 -
    system must be both capable of and actually perform this step” is contrary to the claim’s
    language stating “one or more of the following processing is performed.” Id. at 12.
    B.      Analysis
    1.      The Court’s Preliminary Construction
    Before the Markman hearing, the Court provided the parties with the Court’s preliminary
    construction after considering both parties’ claim construction briefs and all referenced materials
    in full. Tr. at 8:15–19. The ’844 patent details the process followed when “standardized
    personal identification credentials” are presented to the reader by the attendant. See ’844 patent
    col. 3 ll. 35–64. When the information is presented, “[t]he system checks database information
    to determine whether the individual is an employee.” Id. col. 3 ll. 42–43. The system then
    proceeds to validate the credentials by comparing them to separate “TSA NO-FLY and
    SELECTEE” lists. Id. col. 3 ll. 47–48. Following the comparison, the system prompts the
    attendant to insert the credential ID into an “authenticator apparatus” which verifies “physical
    aspects” of the ID by comparing it to stored templates. Id. col. 3 ll. 54–60. “If all checks are
    negative, . . . [t]he system . . . prints a time sensitive encoded pass.” Id. col. 3 ll. 61–64. The
    specification focuses heavily on the procedure used to identify employees, but it also mentions
    the system’s capability to “automatically collect[] data and build visitor records.” Id. col. 1 ll.
    61–62. The parent patent specification also states “[t]he system checks database information to
    determine whether the individual is an employee, contractor, vendor, supplier or a visitor.” ’732
    patent col. 10 ll. 33–35. Even though the process detailed in the specification does not describe
    how the system would verify other individuals such as visitors, the Court is “cautioned against
    limiting the claimed invention to preferred embodiments or specific examples in the
    specification.” Teleflex, Inc. v. Ficosa N. Am. Corp., 
    299 F.3d 1313
    , 1328 (Fed. Cir. 2002)
    (citing Comark Comm’ns, Inc. v. Harris Corp., 
    156 F.3d 1182
    , 1186 (Fed. Cir. 1998)). The use
    of the system for other categories of individuals is implied because when construing claims the
    Court looks “to the words of the claims themselves . . . to define the scope of the patented
    invention,” and the specification allows one to extend the use of the system to other categories of
    individuals. Vitronics Corp. v. Conceptronic, Inc., 
    90 F.3d 1576
    , 1582 (Fed. Cir. 1996). The
    ’844 patent describes two key components in the process of authenticating credentials, i.e.,
    building records (employees and visitors) and comparing the credentials to the records, so the
    patent “need not explicitly include information [on how the comparison occurs] that is already
    well known in the art.” Presidio Components, Inc. v. Am. Tech. Ceramics Corp., 
    875 F.3d 1369
    ,
    1376 (Fed. Cir. 2017). The ’844 patent contains sufficient disclosure to rebut defendants’
    indefiniteness arguments because the “general approach [of scanning credentials and comparing
    to a database is] sufficiently well established in the art and referenced in the patent.” 
    Id. at 1377
    .
    The detailed description of the comparison process and the development of databases for people
    other than employees makes it reasonable to expect a “skilled artisan to know the scope of the
    claimed invention with reasonable certainty.” Nautilus, Inc. v. Biosig Instruments, Inc., 
    572 U.S. 898
    , 910 (2014). Accordingly, when the authentication process is “read in the view of the
    specification,” describing the building of visitor records, the process is reasonably applied to
    other categories of individuals such as vendors, contractors, suppliers, and visitors. Markman v.
    Westview Instruments, Inc., 
    52 F.3d 967
    , 979 (Fed. Cir. 1995).
    - 32 -
    Defendants note the terms “contractor” and “supplier” appear “nowhere outside their use
    in the claim at issue.” Defs.’ Cl. Constr. Br. at 15. Similarly, the term “vendor” is only used
    once “outside of the claim term issue.” 
    Id.
     Although “visitor” is frequently used, the term is not
    explicitly defined. See ’844 patent. Accordingly, none of the terms are defined, so the patentee
    did not “set[] out a definition and act[] as his own lexicographer.” Thorner v. Sony Comput.
    Entm’t Am. LLC, 
    669 F.3d 1362
    , 1365 (Fed. Cir. 2012) (citing Vitronics, 
    90 F.3d at 1580
    ).
    Similarly, the patentee did not disavow the claim scope in the specification. Id.; see ’844 patent.
    The patentee neither set a definition nor disavowed the full scope of a claim term in the
    specification, so the ordinary and customary meanings of the terms visitor, employee, contractor,
    supplier, vendor apply. Phillips v. AWH Corp., 
    415 F.3d 1303
    , 1312–13 (Fed. Cir. 2005). The
    Court preliminarily construed “the type of entry, visitor, employee, contractor, supplier, or
    vendor, is determined” as: “Using the individual real time record built from the presented
    personal identification credentials, the software application checks the system database stored
    information to ascertain whether the individual presenting the credential is one of the following:
    visitor, employee, contractor, supplier, or vendor.”
    2.     The Court’s Final Construction
    At the Markman hearing, both parties agreed to the Court’s preliminary construction. See
    Tr. at 68:11–69:10. The Court adopts it preliminary construction as final: “Using the individual
    real time record built from the presented personal identification credentials, the software
    application checks the system database stored information to ascertain whether the individual
    presenting the credential is one of the following: visitor, employee, contractor, supplier, or
    vendor.”
    Plaintiff’s Proposed Construction                Defendants’ Proposed Construction
    “Plain meaning. Visitor is a well understood     “Indefinite.
    term. So is an employee. Contractor.
    Supplier. And Vendor.”                           To the extent the term is construed,
    Defendants propose:
    The system is capable of categorizing the
    individual presenting the credential as each
    one of the following and categorizes the
    individual as one of the following: visitor,
    employee, contractor, supplier, or vendor.”
    Court’s Construction
    “Using the individual real time record built from the presented personal identification
    credentials, the software application checks the system database stored information to
    ascertain whether the individual presenting the credential is one of the following: visitor,
    employee, contractor, supplier, or vendor.”
    X.     Disputed Claim Term #7: “an ID authenticator”
    Plaintiff’s Proposed Construction                Defendants’ Proposed Construction
    - 33 -
    “An ID authenticator is a device that scans a              “Indefinite.
    personal identification document (including,
    but not limited to, a U.S. State driver’s license          To the extent the term is construed,
    or a U.S. passport) and determines the                     Defendants propose:
    authenticity of the identification document
    using one or more embedded security                        A commercial identification card
    features.”                                                 authentication device, separate from the
    standardized credential reader device, which
    Pl.’s Resp. Cl. Constr. Br. at 12.                         further includes ‘means to read non-encoded
    credentials.’”
    Defs.’ Cl. Constr. Br. at 17.
    The disputed term is used in claim 1:
    an ID authenticator, wherein a credential to be authenticated is presented, a
    credential physical aspect and embedded security features are analyzed to
    determine the possibility of any tempering or forgery and provide an authenticity
    risk rating, said ID authenticator comprises means to read non-encoded credentials,
    whereas said ID authenticator generates an authentication data record comprising
    presented credential information and authentication rating,
    ’844 patent col. 5 ll. 16–23.
    A.       Parties’ Arguments
    Defendants argue “ID authenticator” is indefinite because it is not supported by sufficient
    structure or detail. 8 Defs.’ Cl. Constr. Br. at 17. According to defendants, within the context of
    the claims, the patent defines multiple “who’s” of the “ID authenticator”: (1) a mechanism or
    apparatus which automatically analyzes an ID for authentication issues; and (2) a human
    attendant who uses a device to perform authentication. 
    Id. at 18
    . Defendants also argue the
    specification is silent on “what” the “ID authenticator” authenticates or “how” the “ID
    authenticator” performs the relevant analysis. 
    Id.
     at 18–19. The patent suggests either the
    process may require the mechanism perform the analysis automatically or the mechanism may
    merely assist a human operator in analyzing the 
    ID.
     Id. at 18–19. Accordingly, defendants
    assert the claim is indefinite. 
    Id.
    Defendants also argue, citing Becton, based on the structure of the ’844 patent, the “ID
    authenticator” and credential reader device must necessarily be separate. Defs.’ Reply Cl.
    Constr. Br. at 8 (citing Becton, Dickinson & Co. v. Tyco Healthcare Grp., 
    616 F.3d 1249
    , 1254
    (Fed. Cir. 2010)). Defendants note “Claim 1 separately lists ‘a standardized credential reader
    means for reading a credential encoded with personal identification’ and ‘an ID authenticator’
    that ‘comprises means to read non-encoded credentials.’” Id. at 8 (quoting ’844 patent col. 5 ll.
    1–2, 16–21). Defendants argue the distinction creates a presumption the devices are separate,
    8
    Defendants argue the claim term is indefinite but do not invoke a specific paragraph under § 112 in their briefing.
    - 34 -
    and nothing in the intrinsic record contemplates practice of the functions in a single device. Id.
    at 8. Defendants also argue the specification outlines multiple purposes for the ID authenticator,
    and therefore the exact function is unclear. Defs.’ Cl. Constr. Br. at 18. If the Court finds the
    term not indefinite, defendants assert the term should be limited to non-encoded credentials and a
    “commercial” product as described in certain embodiments. Id. at 19.
    Plaintiff argues “ID authenticator” is not inherently ambiguous because the ’844 patent
    specifically references “a commercial ID card authenticator.” Pl.’s Resp. Cl. Constr. Br. at 12
    (citing ’844 patent fig.1). According to plaintiff, the number of suitable devices is limited, and,
    therefore, the boundary of the claims is not indefinite. Id. at 12–13. Moreover, plaintiff
    contends the claims need not define the operator and device relationship as the specific device
    chosen will define the relationship. Pl.’s Surreply Cl. Constr. Br. at 8. The patent does not
    differentiate the functions of the standardized credential reader and “ID authenticator,” so
    plaintiff argues the claim encompasses a machine performing both functions. Id. at 9–10.
    “Plaintiff concedes, however, that plain meaning will indeed not suffice for this Claim” and
    instead invokes means-plus-function claim interpretation. Pl.’s Resp. Cl. Constr. Br. at 13–14.
    Under a means-plus-function construction, plaintiff asserts the patent contains sufficient
    structure to define the meaning of “ID authenticator.” Id. at 14.
    B.      Analysis
    1.      The Court’s Preliminary Construction
    Before the Markman hearing the Court provided the parties with the Court’s preliminary
    construction after considering both parties’ claim construction briefs and all referenced materials
    in full. Tr. at 8:15–19. The patent references a commercial identification card authentication
    device. ’844 patent fig.1, element 4. While a question exists as to which specific model the
    patent contemplates, the options are limited, and a skilled artisan would understand the
    boundaries of the claim with reasonable certainty. Presidio Components, Inc. v. Am. Tech.
    Ceramics Corp., 
    875 F.3d 1369
    , 1376 (Fed. Cir. 2017). Disclosure of a specific device, or
    specific characteristics of a suitable device, is not the type of information that must be explicitly
    included as it “is already well known in the art.” 
    Id.
     Therefore, the Court did not preliminarily
    find the term to be indefinite.
    The parties agree the term refers to a commercial identification card authentication device
    if the term is not indefinite. See Pl.’s Resp. Cl. Constr. Br. at 12; Defs.’ Cl. Constr. Br. at 19.
    Given the device must be a standard commercial product, the Court found no reason to hold the
    term indefinite or to provide a unique construction in its preliminary construction. The patentee
    did not act as his own lexicographer, nor did patentee clearly disavow claim scope; neither
    exception to use of the plain and ordinary meaning is triggered. See Thorner v. Sony Comput.
    Entm’t Am. LLC, 
    669 F.3d 1362
    , 1365 (Fed. Cir. 2012) (citing Vitronics Corp. v. Conceptronic,
    Inc., 
    90 F.3d 1576
    , 1580 (Fed. Cir. 1996)); Phillips v. AWH Corp., 
    415 F.3d 1303
    , 1312–13
    (Fed. Cir. 2005).
    While “ID authenticator” should be given its plain and ordinary meaning, the parties
    dispute whether the authentication device is necessarily separate from the standardized credential
    - 35 -
    reader. See Pl.’s Resp. Cl. Constr. Br. at 14; Defs.’ Reply Cl. Constr. Br. at 8. The ’844 patent
    provides several reasons why the two devices would be considered separate and no reasons as to
    why they should be considered as one machine. First, Figure 1 of the ’844 patent shows them as
    separate machines (#4–Commercial ID card Authenticator; #3–Apparatus for Recovering
    Information from standardized personal identification Credentials). ’844 patent fig.1, elements
    3, 4. Figure 1 is consistent with the claim language, which divides the functions between the
    standardized credential reader, 
    id.
     col. 5 ll. 1–15, and the “ID authenticator,” 
    id.
     col. 5 ll. 16–23.
    Second, the ’732 patent, which covers the standardized credential reader, does not contemplate
    or enable a device capable of ID authentication. See ’732 patent. The “ID authenticator” is
    accordingly a new disclosure in the ’844 patent, which does not teach the combination of “ID
    authentication” into the standardized credential reader. The intrinsic record provides support for
    two separate devices but does not provide support for combining these two devices into one; the
    Court therefore considered the devices separately. See ’844 patent.
    In sum, the Court preliminarily found “ID authenticator” should be given its plain
    meaning, with the caveat the device must be separate from the “standardized credential reader
    means.” Insofar as a specific definition is clarifying, the Court offered the following: “a
    commercial identification card authentication device, separate from the standardized credential
    reader device.”
    2.      The Court’s Final Construction
    At the Markman hearing, plaintiff argued the authentication device need not be separate
    from the credential reader but otherwise was satisfied with the Court’s construction. Tr. at
    70:10–17. (“THE COURT: [T]he question is whether or not the ID authenticator necessarily
    has to be separate from the credential reader. Is that right? [PLAINTIFF]: Yes, that’s the
    issue . . . . The rest of it, obviously, we have no issue.”). Plaintiff stated the claims support a
    combined device. Tr. at 72:18–20. (“THE COURT: [W]hat describes them as the same thing?
    [PLAINTIFF]: I think the party’s claims ultimately.”). Plaintiff was unable to point to any
    claim suggesting the two devices could be combined into a single device and agreed there were a
    number of instances where separate devices were described throughout the specification and the
    claims. See Tr. at 72:1–74:25. Plaintiff’s only explanation was the devices “could possibly be
    separate, they could possibly be combined.” Tr. at 74:14–15. Defendants reasserted the claims
    and specification “uniformly and exclusively treats [“the standardized credential reader means”
    and “ID authenticator”] as separate from one another” and agreed with the Court’s preliminary
    construction. Tr. at 75:19–76:18, 79:14–15. Plaintiff failed to provide any support from the
    intrinsic record for a combined credential reader and ID authenticator; accordingly, the Court
    adopts its preliminary construction of “ID authenticator”: “A commercial identification card
    authentication device, separate from the standardized credential reader device.”
    Plaintiff’s Proposed Construction                   Defendants’ Proposed Construction
    “An ID authenticator is a device that scans a       “Indefinite.
    personal identification document (including,
    but not limited to, a U.S. State driver’s license   To the extent the term is construed,
    or a U.S. passport) and determines the              Defendants propose:
    authenticity of the identification document
    - 36 -
    using one or more embedded security             A commercial identification card
    features.”                                      authentication device, separate from the
    standardized credential reader device, which
    further includes ‘means to read non-encoded
    credentials.’”
    Court’s Construction
    “A commercial identification card authentication device, separate from the standardized
    credential reader device.”
    XI.    Disputed Claim Term #8: “means to read non-encoded credentials”
    Plaintiff’s Proposed Construction                  Defendants’ Proposed Construction
    “Plain meaning. Any automated ID                   “Indefinite.”
    authentication systems also includes means to
    read the non-encoded aspects of the                Defs.’ Cl. Constr. Br. at 20.
    identification.”
    Pl.’s Resp. Cl. Constr. Br. at 14.
    The disputed term is used in claim 1.
    an ID authenticator, wherein a credential to be authenticated is presented, a
    credential physical aspect and embedded security features are analyzed to
    determine the possibility of any tempering or forgery and provide an authenticity
    risk rating, said ID authenticator comprises means to read non-encoded credentials,
    whereas said ID authenticator generates an authentication data record comprising
    presented credential information and authentication rating,
    ’844 patent col. 5 ll. 16–23.
    A.      Parties’ Arguments
    Defendants argue the term is a means-plus-function claim and should be construed under
    
    35 U.S.C. § 112
    , ¶ 6. Defs.’ Cl. Constr. Br. at 20. According to defendants, the word “means”
    creates a rebuttable presumption § 112, ¶ 6 applies, and when construed as a means-plus-function
    claim, the specification fails to provide sufficient structure to disclose the function. Id. As a
    result, defendants assert the term is indefinite. Id.
    Plaintiff avers the specification discloses sufficient structure to perform the function in its
    entirety. Pl.’s Resp. Cl. Constr. Br. at 14–15. Plaintiff points to the language from the
    specification, related to vehicle tracking, which suggests the patent discloses image acquisition
    and character recognition. Id. (citing ’844 patent col. 3:25–29). According to plaintiff, the
    PHOSITA would recognize these requirements for vehicle tracking are applicable structure for
    “means to read non-encoded credentials.” Id.
    B.      Analysis
    - 37 -
    1.      The Court’s Preliminary Construction
    Before the Markman hearing, the Court provided the parties with the Court’s preliminary
    construction after considering both parties’ claim construction briefs and all referenced materials
    in full. Tr. at 8:15–19. The Court first considered whether the disputed term overcomes the
    presumption of a means-plus-function construction. Ordinarily, the word “means” in a claim
    creates a rebuttable presumption § 112, ¶ 6 applies. Williamson v. Citrix Online, LLC, 
    792 F.3d 1339
    , 1348 (Fed. Cir. 2015). Using the term “means to read non-encoded credentials” creates a
    rebuttable presumption of means-plus-function construction, which can be overcome if the patent
    recites sufficient structure for performing the function in its entirety. Skky, Inc. v. MindGeek,
    S.A.R.L., 
    859 F.3d 1014
    , 1019 (Fed. Cir. 2017); see Biomedino, LLC. v. Waters Techs. Corp.,
    
    490 F.3d 946
    , 950 (Fed. Cir. 2007) (discussing the inclusion of “means” in claim language
    creates a presumption of § 112, ¶ 6); Altiris, Inc. v. Symantec Corp., 
    318 F.3d 1363
    , 1375 (Fed.
    Cir. 2003) (“[T]his presumption can be rebutted where the claim, in addition to the functional
    language, recites structure sufficient to perform the claimed function in its entirety.”). The claim
    language indicates “ID authenticator” is the structure which performs the function. See ’844
    patent col. 5 ll. 16–23. The key language from claim 1 of the’844 patent is the term “comprises”
    which links “ID authenticator” to “means to read non-encoded credentials,” therefore implying
    “ID authenticator” provides the structure for the claimed functionality. 
    Id.
     Given the Court’s
    finding that “ID authenticator” is sufficiently specific when interpreted by the PHOSITA, the
    overall claim term “ID authenticator comprises means to read non-encoded credentials” provides
    adequate structure to implement the function in its entirety. See supra at Section X. The Court
    preliminarily found the term overcame the presumption of a means-plus-function construction
    because there was adequate structure for the claimed functionality; accordingly, the Court
    preliminarily found the term to be definite. See Williamson, 
    792 F.3d at
    1351–52.
    The Court preliminarily found “means to read non-encoded credentials” should be
    construed as a function of the “ID authenticator.” When construed in this manner, the phrase
    should be given its plain and ordinary meaning: “an apparatus capable of image acquisition and
    taking in the sense of letters and symbols.” See Read, Merriam-Webster Dictionary,
    https://www.merriam-webster.com/dictionary/read, (last visited Jan. 10, 2023) (“to receive or
    take in the sense of (letters, symbols, etc.) especially by sight or touch”).
    2.      The Court’s Final Construction
    At the Markman hearing, the parties disputed whether the rebuttable presumption is
    overcome. Plaintiff argued the application of § 112, ¶ 6 is rebutted for this term. Tr. at 86:12–
    21. Defendants claimed the term “means to read non-encoded credentials” invokes means-plus-
    function construction and does not overcome the rebuttable presumption as the claim has “no
    structure disclosed for performing that process of reading non-encoded credentials.” Tr. at
    77:14–15, 78:2–4. Defendants argued, “[T]here’s a disconnect between what the specification
    teaches and what the claims require.” Tr. at 78:6–7. The disconnect, according to defendants, is
    because “the claim requires the ID authenticator box scans the non-encoded credential, does
    [optical character recognition (‘OCR’)] and generates a data record” whereas “[t]he specification
    teaches that the ID authenticator takes a picture . . . then sends that to the system for doing the
    - 38 -
    character recognition.” Tr. at 78:12–18. Defendants claimed the discrepancy between the
    specification and the claim results in indefiniteness. See Tr. at 89:24–90:6. Defendants,
    however, were unable to point to any location in the patent where the claim mandates OCR of
    the credential information. See Tr. at 84:9–90:5 (“THE COURT: So your argument is that from
    the claim, presented credential information must be an OCR-converted digital file?
    [DEFENDANTS]: The authentication data record includes presented credential information
    which necessarily is OCR . . . . That’s our position. . . . THE COURT: I just don’t see where
    that conversion is mandated in the claim. [DEFENDANTS]: . . . I can’t point to anything that
    specifically says the personal information in the authentication data record constitutes post-OCR
    data.”).
    The parties misunderstood the Court’s preliminary construction to include OCR.
    Defendants understood the Court’s preliminary construction to include OCR, which is in line
    with the claim but not the specification. Tr. at 88:23–89:2 (“[DEFENDANTS]: [W]e agree
    generally with [the preliminary definition] capturing the notion of reading a non-encoded
    credential, because you’re doing an OCR process.”). Plaintiff also misunderstood the Court’s
    construction to include OCR. Tr. at 89:20–23. Plaintiff initially required the “ID authenticator”
    be capable of doing OCR in plaintiff’s brief but later changed position and agreed the Court’s
    construction does not and should not include OCR. Tr. at 91:13–15 (“[PLAINTIFF]: I agree. I
    mean, certainly, I’ve changed my position from that brief at this point, based on [the preliminary
    construction], as well as this discussion.”). The Court’s preliminary definition, however, did not
    convey the capability of OCR because the key term in the disputed claim is “read” which is
    defined as “to receive or take in the sense of (letters, symbols, etc.) especially by sight or touch.”
    Read, Merriam-Webster Dictionary. The process of OCR requires the further recognition of
    these letters and symbols as alphanumeric and conversion into digital data, which was not
    described in the Court’s preliminary construction. Tr. at 88:20–22. As defendants have not
    persuaded the Court OCR should be included in its construction, the Court retains its preliminary
    construction of the claim term: “An apparatus capable of image acquisition and taking sense of
    letters and symbols.”
    Plaintiff’s Proposed Construction              Defendants’ Proposed Construction
    “Plain meaning. Any automated ID               “Indefinite.”
    authentication systems also includes means to
    read the non-encoded aspects of the
    identification.”
    Court’s Construction
    “An apparatus capable of image acquisition and taking sense of letters and symbols.”
    XII.   Disputed Claim Term #9: “authentication data record”
    Plaintiff’s Proposed Construction                  Defendants’ Proposed Construction
    “Plain meaning.”                                   “Indefinite.
    Pl.’s Resp. Cl. Constr. Br. at 15.                 To the extent the term is construed,
    Defendants propose:
    - 39 -
    A record, separate from any individual real
    time record, containing both information
    extracted from a scanned image of the
    credential and an ‘authentication rating.’”
    Defs.’ Cl. Constr. Br. at 21.
    The disputed term is used in claim 1:
    an ID authenticator, wherein a credential to be authenticated is presented, a
    credential physical aspect and embedded security features are analyzed to
    determine the possibility of any tempering or forgery and provide an authenticity
    risk rating, said ID authenticator comprises means to read non-encoded credentials,
    whereas said ID authenticator generates an authentication data record comprising
    presented credential information and authentication rating,
    ’844 patent col. 5 ll. 16–23.
    A.      Parties’ Arguments
    Defendants argue the ID authenticator generates two types of records: (1) the image of
    the vehicle registration card; and (2) the data captured and analyzed when the ID authenticator
    performs ID checks against stored templates. Defs.’ Cl. Constr. Br. at 21–22. According to
    defendants, “[b]ecause one of ordinary skill is left in a zone of uncertainty as to which type(s) of
    record would be encompassed by the claim term, the term should be held indefinite.” Id. at 22.
    In the alternative, defendants propose “authentication data record” should refer only to
    information extracted from the scan of a vehicle registration card. Id. Defendants argue
    plaintiff’s interpretation is overbroad as it would include any information extracted from a
    credential, regardless of the method of extraction. Id.
    Plaintiff argues there is no ambiguity in the claims. Pl.’s Resp. Cl. Constr. Br. at 16.
    Plaintiff explains “authentication data record” comprises information extracted when the ID
    authenticator reads credential information and the authentication rating. Id. Plaintiff’s
    construction excludes any DMV or vehicle registration records because such records are not
    credentials as defined by the claims. Id. at 15–16. Rather, the claims refer to personal
    credentials. Id. Plaintiff asserts the term should be given it plain and ordinary meaning. Id. at
    15.
    B.      Analysis
    1.      The Court’s Preliminary Construction
    Before the Markman hearing, the Court provided the parties with the Court’s preliminary
    construction after considering both parties’ claim construction briefs and all referenced materials
    in full. Tr. at 8:15–19. The Court first determined the scope of “authentication data record.”
    Neither party contests the “authentication data record” includes at least an image of the presented
    - 40 -
    credential. See Defs.’ Cl. Constr. Br. at 21–22; Pl.’s Resp. Cl. Constr. Br. 15–16. The ’844
    specification supports this notion: “[t]he authenticator acquires an image of the registration card
    and sends the image to the system for proceeding with character recognition.” ’844 patent col. 3
    ll. 27–29. “The system picks up the individual photo provided by the authenticator returned
    record . . . .” Id. col. 3 ll. 61–63. “[T]he automated access control system picks up the individual
    photo provided by the authentication data record . . . .” Id. col. 5 ll. 41–42.
    The parties dispute whether “authentication data record” is separate from other data
    records. Defs.’ Cl. Constr. Br. at 21; Pl.’s Resp. Cl. Constr. Br. at 16. Different terms in a claim
    are construed to have different meanings, and meaning should be given to all terms in a claim.
    MicroStrategy Inc. v. Bus. Objects Americas, 
    238 F. App’x 605
    , 609 (Fed. Cir. 2007)
    (“[D]ifferent claims terms are presumed to have different meanings.”); see Merck & Co. v. Teva
    Pharm. USA, Inc., 
    395 F.3d 1364
    , 1372 (Fed. Cir. 2017). The Court preliminarily construed
    claim term 7, “ID authenticator,” as necessarily separate from the “standardized credential reader
    means.” See supra Section X. Consequently, the record generated by the ID authenticator must
    also necessarily be a separate record from the record created by the “standardized credential
    reader means.” In other words, an individual real time record must be different from an
    “authentication data record.” Paralleling the Court’s construction of claim term 3—deriving the
    “individual real-time record” from “standardized credential reader means”—the “authentication
    data record” must come from the “ID authenticator.” The derivation is explicitly supported by
    the claim language: “whereas said ID authenticator generates an authentication data record
    comprising presented credential information and authentication rating . . . .” ’844 patent col. 5 ll.
    21–23; see supra Section V.
    The specification also suggests “authentication data record” should include an
    authentication rating. Compare ’844 patent col. 3 ll. 26–30 (“The authenticator acquires an
    image of the registration card and sends the image to the system for proceeding with character
    recognition. This data becomes the second record in the entry group.”), with id. col. 3 ll. 56–60
    (“The authentication process provides a mean [sic] of determining and rating ID physical aspects
    security risks. The authenticator matches the ID against stored templates, and looks for the ID
    security features to determine the possibility of any ID tampering.”). While the registration card
    has an image captured and stored, the credential has its unique security features analyzed to
    create an authentication rating. See id. col. 3 ll. 26–30, 56–60. The patent claim, therefore,
    refers to the credential ID and the information captured from the credential ID when describing
    an “authentication data record” comprising presented credential information and authentication
    rating. See supra Section X. As such, the Court preliminarily construed the “authentication data
    record” to be “[a] record, separate from any individual real time record, containing both an
    authentication rating and information extracted from a scanned image of the credential.”
    2.      The Court’s Final Construction
    At the Markman hearing, plaintiff agreed to the Court’s preliminary construction. Tr. at
    91:24–25. (“[PLAINTIFF]: Yeah, I have no [problem] with [the Court’s] construction [of term
    9].”). Defendants requested clarification as to the use of “information extracted from a scanned
    image of the credential.” Tr. at 92:2–7. Consistent with the term 8 arguments, defendants
    argued disputed term 9 also “include[s] post-OCR information” Tr. at 94:7–15. This was
    - 41 -
    defendants’ only disagreement with the preliminary construction. Tr. 97:5–8. For all the reasons
    the Court notes in term 8, supra, there is no OCR requirement. The Court modifies its
    preliminary construction and adopts the following final construction: “A record, separate from
    any individual real time record, containing both an authentication rating and a digital image of
    the credential.”
    Plaintiff’s Proposed Construction                 Defendants’ Proposed Construction
    “Plain meaning.”                                  “Indefinite.
    To the extent the term is construed,
    Defendants propose:
    A record, separate from any individual real
    time record, containing both information
    extracted from a scanned image of the
    credential and an ‘authentication rating.’”
    Court’s Construction
    “A record, separate from any individual real time record, containing both an authentication
    rating and a digital image of the credential.”
    XIII. Disputed Claim Term #10: “authenticity risk rating” / “authentication rating” / “ID
    forgery risks rating”
    Plaintiff’s Proposed Construction                 Defendants’ Proposed Construction
    “An authentication rating is either a numerical “Indefinite.”
    scale based on various authentication criteria,
    or a narrative or message relating to             Defs.’ Cl. Constr. Br. At 23.
    authenticity that is delivered to the end user of
    a device that can determine authenticity.
    Many numerical scales are, in fact, simply a
    series of different narrative or message
    choices that can be converted into a number.”
    Pl.’s Resp. Cl. Constr. Br. At 16–17.
    The disputed term is used in claim 1:
    an ID authenticator, wherein a credential to be authenticated is presented, a
    credential physical aspect and embedded security features are analyzed to
    determine the possibility of any tempering or forgery and provide an authenticity
    risk rating, said ID authenticator comprises means to read non-encoded credentials,
    whereas said ID authenticator generates an authentication data record comprising
    presented credential information and authentication rating . . .
    wherein, upon a credential reading, the automated access control system
    automatically determines the source of the credential data record, and
    - 42 -
    automatically extracts personal information to be checked against a
    security list, TSA NO-FLY list, SELECTEE list, other alternative
    credentials; whereas upon the credential authentication, the automated
    access control system automatically extracts authentication information
    from the authentication data record, and subsequently displays a warning
    window, as a result of the individual credentials match and ID forgery
    risks rating contained in the authentication data record.
    ’844 patent col. 5 ll. 16–37.
    A.      Parties’ Arguments
    Defendants argue the patent uses “authenticity risk rating,” “authentication rating,” and
    “ID forgery risks rating” interchangeably. Defs.’ Cl. Constr. Br. At 23. Defendants argue,
    however, Merck dictates the claim terms must be construed to have unique and distinct
    meanings. Id. (citing Merck & Co. v. Teva Pharm. USA, Inc., 
    395 F.3d 1364
    , 1372 (Fed. Cir.
    2005)). The patent cannot support a construction whereby all three terms have a different
    meaning, so defendants argue the patent must fail for indefiniteness. 
    Id.
     At 24.
    Plaintiff argues the patent language makes clear the authenticity risk rating,
    authentication rating, and ID forgery risks rating are all produced by the “standardized credential
    reader means.” Pl.’s Resp. Cl. Constr. Br. At 17–18. Plaintiff asserts a limited number of
    devices are commercially available; therefore, the analytical outputs of such machines are
    familiar in the industry and the claim is sufficiently definite. 
    Id.
     Plaintiff rejects defendants’
    reliance on Merck, and argues Merck suggests unique definitions are preferred but not required.
    
    Id.
     At 17. Plaintiff further argues a PHOSITA would understand all three terms refer to the same
    output, and, therefore, the claim is sufficiently definite. 
    Id.
     17–18.
    B.      Analysis
    1.      The Court’s Preliminary Construction
    Before the Markman hearing, the Court provided the parties with the Court’s preliminary
    construction after considering both parties’ claim construction briefs and all referenced materials
    in full. Tr. At 8:15–19. Patent claim interpretation preferably presumes different claim terms
    have different meanings. MicroStrategy Inc. v. Bus. Objects Americas, 
    238 F. App’x 605
    , 609
    (Fed. Cir. 2007); see Merck, 
    395 F.3d at 1372
    . This presumption can be “overcome where . . .
    the evidence indicates that the patentee used the . . . terms interchangeably.” Baran v. Med.
    Device Techs., Inc., 
    616 F.3d 1309
    , 1316 (Fed. Cir. 2010) (citing Tehrani v. Hamilton Med.,
    Inc., 
    331 F.3d 1355
    , 1361 (Fed. Cir. 2003)). In Baran, the Federal Circuit construed the
    descriptors “detachable” and “releasably” to have the same meaning based on the overall context
    of the claim language. 
    Id.
    The present case, like Baran, uses three terms interchangeably. Each of the three
    variations of the term “rating” occur when describing the same process (ID authentication) by the
    same apparatus (ID authenticator) evaluating the same aspects (an ID’s physical aspects and
    - 43 -
    embedded security features) to produce the same output (authentication data record), suggesting
    interchangeability of the terms. Compare ’844 patent col. 5 ll. 16–21 (“ID authenticator . . . a
    credential physical aspect and embedded security features are analyzed to . . . provide an
    authenticity risk rating . . . [which] generates an authentication data record comprising
    presented credential information and authentication rating”) (emphasis added), with 
    id.
     Col. 5 ll.
    31–37 (“whereas upon the credential authentication . . . [the ID authenticator] automatically
    extracts authentication information from the authentication data record, and subsequently
    displays a warning window, as a result of the individual credentials match and ID forgery risk
    rating contained in an authentication data record.”) (emphasis added). The claim begins by
    describing how “an ID authenticator . . . [is used to] determine the possibility of any tempering
    [sic] and forgery and provide an authenticity risk rating” for a presented credential. 
    Id.
     Col. 5 ll.
    16–19. The claim then contrasts this process with the functioning of the same ID authenticator
    when “non-encoded” credentials are presented which results in the generation of an
    “authentication data record comprising [of] presented credential information and [an]
    authentication rating.” 
    Id.
     Col. 5 ll. 20–23. The claim continues describing how a “central
    processing unit” receives the “authentication data record” and “automatically extracts
    authentication information from the authentication data record.” 
    Id.
     Col. 5 ll. 24–34. The central
    processing unit then “displays a warning window” based on its comparison of the authentication
    information and “ID forgery risks rating” extracted from the authentication data record. 
    Id.
     Col.
    5 ll. 34–37. No specific definition of each of the terms exists in the intrinsic record to suggest
    the terms are not interchangeable, so the “evidence [and context of the terms] indicates that the
    patentee used the [three] terms interchangeably.” Baran, 
    616 F.3d at 1316
    . When viewed within
    context, a skilled artisan would know the scope of the claimed invention with reasonable
    certainty—these rating descriptors refer to the same output and are interchangeable. See
    Presidio Components, Inc. v. Am. Tech. Ceramics Corp., 
    875 F.3d 1369
    , 1376 (Fed. Cir. 2017).
    Accordingly, the Court rejected defendants’ indefiniteness arguments. See 
    id.
    Given the language of the claim, and the general purpose of the ID authenticator in
    relation to the overall process, the Court preliminarily construed all three “rating” terms to mean:
    “[a] grade of an ID’s security risks provided by the ID authenticator by analyzing physical
    aspects and embedded security features to determine the possibility of any tampering or forgery
    by matching with stored templates.” See ’844 patent col. 5 ll. 16–19 (“ID authenticator . . . [is
    used to] determine the possibility of any tempering [sic] and forgery”), col. 3 ll. 56–60 (“The
    authentication process provides a means of determining and rating ID physical aspects security
    risks. The authenticator matches the ID against stored templates, and looks for ID security
    features to determine the possibility of any ID tempering [sic]”).
    2.      The Court’s Final Construction
    At the Markman hearing, defendants argued the term is indefinite because the terms are
    presumed to have “three different meanings” and the specification does not support or define
    even one of the terms. Tr. At 98:13–23. Defendants further argued the specification does not
    support “how [the rating] is used.” 
    Id.
     In response, plaintiff stated the terms are
    interchangeable, and a PHOSITA would understand the terms are interchangeable. Tr. At
    100:5–11. Regarding the Court’s preliminary construction, defendants stated “grade” is not
    defined and might lead to future litigation. See Tr. At 98:24–99:9. Plaintiff claimed a PHOSITA
    - 44 -
    would understand the term “grade” as a percentage in the industry; for example, “TSA uses the
    percentage between a certain point and another point as being high risk, low risk, medium risk.
    There is no set risk . . . for everyone. It’s just relative to the client.” Tr. At 106:9–13 (plaintiff
    explaining “percentage of risk”). Further, plaintiff suggested at the Markman hearing
    defendants’ argument—“[n]othing’s taught in the specification about what a rating looks like”—
    is an enablement argument, not an indefiniteness argument. Tr. At 99:1–106:25; 25:18–24
    (defendants stating if disputed terms are definite “we have some written description and
    enablement issues to grapple with, but that will be down the road”).
    Although enablement and indefiniteness may conceptually overlap, the legal standards
    are distinct. See, e.g., Augme Techs., Inc. v. Yahoo! Inc., 
    755 F.3d 1326
    , 1340 (Fed. Cir.
    2014) (“Appellants’ arguments appear to be based on the wrong legal standard, i.e.,
    written description or enablement as opposed to indefiniteness.”); Process Control Corp.
    v. HydReclaim Corp., 
    190 F.3d 1350
    , 1358 n.2 (Fed. Cir. 1999) (“[D]efiniteness and
    enablement are analytically distinct requirements [of validity], even though both concepts
    are contained in 
    35 U.S.C. § 112
    .”). The Federal Circuit has held validity arguments,
    such as lack of enablement and lack of written description, are not proper to address
    during claim construction; therefore, the Court will not address defendants’ enablement
    argument here. See Philips v. AWH Corp., 
    415 F.3d 1303
    , 1327 (Fed. Cir. 2005) (“[W]e
    have certainly not endorsed a regime in which validity analysis is a regular component of
    claim construction.”). Accordingly, the Court adopts its preliminary construction as
    final: “A grade of an ID’s security risks provided by the ID authenticator by analyzing
    physical aspects and embedded security features to determine the possibility of any
    tampering or forgery by matching with stored templates.”
    Plaintiff’s Proposed Construction                 Defendants’ Proposed Construction
    “An authentication rating is either a numerical “Indefinite.”
    scale based on various authentication criteria,
    or a narrative or message relating to
    authenticity that is delivered to the end user of
    a device that can determine authenticity.
    Many numerical scales are, in fact, simply a
    series of different narrative or message
    choices that can be converted into a number”
    Court’s Construction
    “A grade of an ID’s security risks provided by the ID authenticator by analyzing physical
    aspects and embedded security features to determine the possibility of any tampering or
    forgery by matching with stored templates.”
    XIV. Disputed Claim Term #11: “automatically determines the source”
    Plaintiff’s Proposed Construction                  Defendants’ Proposed Construction
    “Plain meaning, and as an example, the type        “Indefinite” or “Using common storage to
    of entry, visitor, employee, contractor,           verify that a submitted unique identifier has
    supplier, or vendor.”                              not already been assigned to another physical
    device.”
    - 45 -
    Pl.’s Resp. Cl. Constr. Br. At 18.
    Defs.’ Cl. Constr. Br. At 24.
    The disputed term is used in claim 1:
    wherein, upon a credential reading, the automated access control system
    automatically determines the source of the credential data record, and
    automatically extracts personal information to be checked against a
    security list, TSA NO-FLY list, SELECTEE list, other alternative
    credentials; whereas upon the credential authentication, the automated
    access control system automatically extracts authentication information
    from the authentication data record, and subsequently displays a warning
    window, as a result of the individual credentials match and ID forgery
    risks rating contained in the authentication data record.
    ’844 patent col. 5 ll. 26–37.
    A.      Parties’ Arguments
    Defendants argue the term “automatically determines the source” must be read in relation
    to the subsequent term “credential data record” and is therefore ambiguous. Defs.’ Cl. Constr.
    Br. At 24. Assuming “credential data record” refers to information extracted from IDs processed
    by the system, the source could be: (1) the actual terminal device which originally processed the
    data record; or (2) the original source of the ID, such as the state agency which produced and
    issued the credential. 
    Id.
     Defendants contend the term is ambiguous because “source” never
    appears anywhere else in the language of the patent. 
    Id.
     Defendants argue the first interpretation
    stems naturally from the construction of the sentence, but the second interpretation is also
    plausible because a determination of the original source is likely necessary to determine which
    template should be used for evaluation of the authenticity risk rating. 
    Id.
     Accordingly,
    defendants argue the term is indefinite. 
    Id.
    Plaintiff rejects defendants’ interpretation and instead argues the source is a reference to
    the type of prospective entrant presenting the credential. Pl.’s Resp. Cl. Constr. Br. At 18.
    Plaintiff contends “automatically determin[ing] the source” is an extension of the process
    described in claim term 1, where the type of entry is determined. 
    Id.
     At 18–19 (citing ’844
    patent col. 5 ll. 12–13). In support, plaintiff argues “automatically determin[ing] the source” is a
    necessary step because different types of entrants utilize different credentials, and the central
    processing unit must analyze each credential. 
    Id.
     (citing ’844 patent col. 5 ll. 27–31)
    (“automatically determines the source [or type of entrant] of the credential data record and
    automatically extracts personal information to be checked against a security list, TSA NO-FLY
    list, SELECTEE list, other alternative credentials [because based on the type of entrant the list to
    compare would vary.]” ). Therefore, the system must determine the type of entrant presenting
    the credential. 
    Id.
     Accordingly, plaintiff argues the term should be given its plain meaning. 
    Id.
    B.      Analysis
    - 46 -
    1.        The Court’s Preliminary Construction
    Before the Markman hearing, the Court provided the parties with the Court’s preliminary
    construction after considering both parties’ claim construction briefs and all referenced materials
    in full. Tr. At 8:15–19. The Court first determined whether “source” must refer to the “type of
    entrant,” as plaintiff argues. 9 See Pl.’s Resp. Cl. Constr. Br. At 18. Reading the specification,
    “type of entry,” however, has multiple potential meanings as argued by defendants including:
    (1) the physical location of the credential, see ’844 patent col. 5 ll. 12-13 (“[A]dmission is
    processed as entry or re-entry of the individuals . . . .”); and (2) the issuing authority of the
    credential, see 
    id.
     (“[E]mployee records are checked to determine if the individual is an
    employee; the type of entry, visitor, employee, contractor, supplier, or vendor, is determined
    . . . .”). See also Defs.’ Cl. Constr. Br. At 24. Replacing either meaning of “type of entrant”
    with the plain meaning of “source” indicates plaintiff’s interchangeability argument is
    inapplicable. The patentee further did not consistently interchange “type of entry” and “source”
    in the specification. See id.; see also Baran v. Med. Device Techs., Inc., 
    616 F.3d 1309
    , 1316
    (Fed. Cir. 2010). Additionally, the ordinary meaning of “source” does not naturally lend itself to
    be understood as “type of entrant.” See Source, Webster’s Third New International Dictionary,
    (2002) (“A point of origin or procurement”). As such, the Court preliminarily construed
    “source” and “type of entry” to have different meanings. MicroStrategy Inc. v. Bus. Objects
    Americas, 
    238 F. App’x 605
    , 609 (Fed. Cir. 2007); see Merck & Co. v. Teva Pharm. USA, Inc.,
    
    395 F.3d 1364
    , 1372 (Fed. Cir. 2005).
    When construing the term, the Court looked “to the words of the claims themselves,
    both asserted and nonasserted, to define the scope of the patented invention”; however, equating
    “source” to “type of entry” is not supported by asserted and nonasserted aspects of the
    specification. Phillips v. AWH Corp., 
    415 F.3d 1303
    , 1312–13 (Fed. Cir. 2005) (citing Vitronics
    Corp. v. Conceptronic, Inc., 
    90 F.3d 1576
    , 1582 (Fed. Cir. 1996)). Although a patent need not
    answer every conceivable question to be found definite, the ’844 patent specification does not
    define “automatically determines the source,” even when read within the context of the claims.
    See Presidio Components, Inc. v. Am. Tech. Ceramics Corp., 
    875 F.3d 1369
    , 1377 (Fed. Cir.
    2017); Baran, 
    616 F.3d at 1316
    . Without a clear definition for “source” in the specification, a
    skilled artisan could not know the scope of the claimed invention with reasonable certainty. See
    Presidio, 
    875 F.3d at
    1375 (citing Nautilus, Inc. v. Biosig Instruments, Inc., 
    572 U.S. 898
    , 910
    (2014)).
    Noting this term may be indefinite, the Court provided the parties with three potential
    preliminary constructions for “automatically determines the source”: (1) “the process by which
    the system understands the physical location from which the credential data record originated”;
    (2) “the process by which the system understands the type of entry of the credential (employee,
    visitor, etc.)”; or (3) “the process by which the system determines the issuing authority of the
    credential.”
    2.        The Court’s Final Construction
    9
    In briefing, plaintiff uses “type of entry” to describe the “type of entrant.” See Pl.’s Resp. Cl. Constr. Br. at 18
    (arguing “source” means “type of entry” or entrant, i.e., visitor, employee, contractor, supplier or vendor).
    - 47 -
    At the Markman hearing, defendants maintained “automatically determines the source”
    was indefinite because the term is prone to multiple constructions, and a skilled artisan would not
    know the scope of the term with reasonable certainty. See Tr. At 117:24–118:1 (defendants
    arguing “we have multiple intrinsic references all supplying multiple potential interpretations
    . . . .”). Plaintiff admitted the term “source” was not defined in the specification and stated, “[I]t
    could be a lot of different things.” Tr. At 109:12–14 (“[PLAINTIFF]: [I]t’s our view that a
    source check . . . there’s no definition of it. It could be a lot of different things.”). Plaintiff
    agreed the specification does not provide any detail as to the meaning of the term “source.” Tr.
    At 112:19–22. (“THE COURT: And you agree that the specification does not provide any detail
    of what source is? [PLAINTIFF]: That’s correct.”). When asked how the patent informs the
    PHOSITA with reasonable certainty as to what “source” is “automatically determined,” plaintiff
    stated “source” “reasonably” could refer to the type of person presenting the credential (“visitor
    versus employee”) or “reasonably does incorporate another sense of the word [depending on]
    where it is.” See Tr. At 115:20–116:14. Defendants agreed, citing supporting intrinsic evidence
    for all the possible different meanings of “source.” Tr. At 117:3–118:11 (“[DEFENDANTS]:
    . . . It’s not enough for us to come up with an interpretation. We’ve come up with four or five.
    We have to know, with reasonable certainty, which one it is, and we just don’t know here.
    There’s nothing to discern that from and so it can’t be valid. . . . [T]he word ‘source’ doesn’t
    even appear in the specification.”).
    As plaintiff concedes, “source” means “a lot of different things,” Tr. At 109:12–14, and
    therefore does not inform “those skilled in the art about the scope of the claimed invention with
    reasonable certainty.” Sonix Tech. Co. v. Publ’ns Int’l, Ltd., 
    844 F.3d 1370
    , 1377 (Fed. Cir.
    2017) (citing Nautilus, 
    572 U.S. at 901
    ). As such, “automatically determines the source” fails
    § 112, ¶ 2 and renders the term indefinite. Nautilus, 
    572 U.S. at 901
    .
    Plaintiff’s Proposed Construction               Defendants’ Proposed Construction
    “Plain meaning, and as an example, the type     “Indefinite” or “Using common storage to
    of entry, visitor, employee, contractor,        verify that a submitted unique identifier has
    supplier, or vendor.”                           not already been assigned to another physical
    device.”
    Court’s Construction
    Indefinite.
    XV.    Disputed Claim Term #12: “credential data record”
    Plaintiff’s Proposed Construction                  Defendants’ Proposed Construction
    “Plain meaning.”                                   “Indefinite.”
    Pl.’s Resp. Cl. Constr. Br. At 19.                 Defs.’ Cl. Constr. Br. At 25.
    The disputed term is used in claim 1:
    wherein, upon a credential reading, the automated access control system
    automatically determines the source of the credential data record, and
    - 48 -
    automatically extracts personal information to be checked against a
    security list, TSA NO-FLY list, SELECTEE list, other alternative
    credentials; whereas upon the credential authentication, the automated
    access control system automatically extracts authentication information
    from the authentication data record, and subsequently displays a warning
    window, as a result of the individual credentials match and ID forgery
    risks rating contained in the authentication data record.
    ’844 patent col. 5 ll. 26–37.
    A.      Parties’ Arguments
    Defendants argue “credential data record” is ambiguous because claim 1 contains no
    antecedent basis for the term. Defs.’ Cl. Constr. Br. At 25. According to defendants, the claim
    identifies multiple types of records, including real time records generated from the ID reader,
    authentication data records generated by the ID authenticator, and entry records when vehicles
    are admitted. 
    Id.
     (citing ’844 patent col. 5 ll. 1–24). Defendants argue the “credential data
    record” could be a combination of any of the records. 
    Id.
     Given the patent identifies multiple
    types of records but does not specify type here, defendants contend the claim is indefinite. 
    Id.
    Plaintiff argues “credential data record” encompasses all entrant data derived from
    presented credentials, as recorded by the access system as a whole, including both the real time
    data generated by the credential reader and authentication data records generated by the ID
    authenticator. Pl.’s Resp. Cl. Constr. Br. At 19–20. Plaintiff argues a term encompassing both
    types of system data is required because some types of identification do not receive an
    authentication rating, but all data records are subject to evaluation against a relevant list. 
    Id.
     At
    20. Plaintiff therefore argues “credential data record” encompasses all data extracted during the
    process of admitting an entrant and is not indefinite. 
    Id.
     At 20–21. Plaintiff asserts the term
    should be given its plain and ordinary meaning. 
    Id.
     At 19.
    B.      Analysis
    1.      The Court’s Preliminary Construction
    Before the Markman hearing, the Court provided the parties with the Court’s preliminary
    construction after considering both parties’ claim construction briefs and all referenced materials
    in full. Tr. At 8:15–19. The Court first addressed whether the term clearly marks the bounds of
    the claim. When a claim term has no express antecedent basis, the claim term is indefinite unless
    the context of the claim provides information to sufficiently clarify the boundary of the claim.
    See Energizer Holdings, Inc. v. Int’l Trade Comm’n, 
    435 F.3d 1366
    , 1370 (Fed. Cir. 2006). To
    avoid indefiniteness, a “person of ordinary skill in the art [should be able] to read [‘credential
    data record’] . . . in the context of the entire patent” and ascertain the clear boundaries of the
    claim. Phillips v. AWH Corp., 
    415 F.3d 1303
    , 1313 (Fed. Cir. 2005); see Energizer Holdings,
    435 F.3d at 1370–71. The term “credential data record” appears for the first and only time in the
    ’844 patent on column 5, line 28. When read within the local context of the claim, “credential
    data record” has at least two possible meanings: (1) “authentication data record”; and (2) “the
    - 49 -
    real time record” generated by reading the credential. See ’844 patent col. 5 ll. 21–37. When
    viewed within the context of the entire patent, however, “credential data record” must be a new,
    third record comprising both the “real time record” and the “authentication data record.” Id. The
    term “credential data record” is therefore prone to multiple interpretations within the context of
    the patent, so “the bounds of the invention are [not] sufficiently demarcated.” ePlus, Inc. v.
    Lawson Software, Inc., 
    700 F.3d 509
    , 517 (Fed. Cir. 2012). The term is boundless, and “a skilled
    artisan [could not] know the scope of the claimed invention with reasonable certainty.” Sonix
    Tech. Co. v. Publ’ns Int’l, Ltd., 
    844 F.3d 1370
    , 1377 (Fed. Cir. 2017) (citing Nautilus, Inc. v.
    Biosig Instruments, Inc., 
    572 U.S. 898
    , 901 (2014)). As a skilled artisan cannot “know the scope
    of the claimed invention with reasonable certainty[,]” “credential data record” fails under § 112,
    ¶ 2 and is indefinite. Nautilus, 
    572 U.S. at 901
    . Preliminarily noting this term may be indefinite,
    the Court offered the parties the following alternative construction in addition to those the parties
    already presented: “a record comprising of the individual real-time record and the authentication
    data record.”
    2.      The Court’s Final Construction
    At the Markman hearing, plaintiff faltered from the arguments made in its brief—
    “credential data record” encompasses all entrant data derived from presented credentials, as
    recorded by the access system as a whole. Pl.’s Resp. Cl. Constr. Br. at 19–20. Plaintiff argued
    “credential data record” only includes the real time record. Tr. at 120:11–14. (“[PLAINTIFF]: .
    . . So [‘credential data record’] looks like it really actually should be just the real time record . . .
    .”). Plaintiff then changed course and agreed the term could be construed to include both real
    time data record and authentication data record when asked why the Court’s alternative
    construction of “a record comprising of the individual real-time record and the authentication
    data record” was incorrect. Tr. at 121:13–15 (“THE COURT: So explain to me why it’s not
    both. [PLAINTIFF]: Well, because I think . . . it certainly could be both, and I think that was
    why I originally wrote that . . . .”). Plaintiff also conceded neither the ’732 nor the ’844 patent
    described “credential data record.” Tr. at 123:22–25 (“THE COURT: [D]oes either the ’844
    patent or the ’732 patent describe and use the language ‘credential data record” anywhere?
    [PLAINTIFF]: I don’t believe so.”). Plaintiff agreed the plain meaning of “credential data
    record” favored the Court’s alternative construction. Tr. at 123:16–21. (“THE COURT: . . .
    [W]hat is the plain meaning of ‘credential data record’? [PLAINTIFF]: Well, it is more
    encompassing, and I think that pushes in favor of [the preliminary construction].”). Plaintiff
    further argued the antecedent basis for the term was “the authentication device and the
    standardized credential reader . . . are the only sources of data that are present,” which in turn
    supported the Court’s alternative construction. Tr. at 124:1–21. At the same time, plaintiff
    stated “credential data record” “probably is just real time records,” but because “it’s a different
    term, it should be given a different meaning . . . [so], overall, I think it actually encompasses
    both.” Tr. at 123:9–125:5. By changing positions between two separate constructions, and
    deviating from the construction in plaintiff’s own briefs, plaintiff demonstrated the term is prone
    to multiple constructions. See, e.g., Tr. at 120:7–125:14. The multiple constructions show “the
    bounds of the invention are [not] sufficiently demarcated.” ePlus, Inc., 
    700 F.3d at 517
    . The
    claim term lacks clear antecedent basis and does not “inform those skilled in the art about the
    scope of the claimed invention with reasonable certainty.” Sonix Tech. Co., 
    844 F.3d at
    1377
    (citing Nautilus, 
    572 U.S. at 901
    ); Energizer Holdings, 435 F.3d at 1370–71. The term fails
    - 50 -
    under § 112, ¶ 2 and is indefinite. Nautilus, 
    572 U.S. at 901
    ; Energizer Holdings, 435 F.3d at
    1370–71.
    Plaintiff’s Proposed Construction              Defendants’ Proposed Construction
    “Plain meaning.”                               “Indefinite.”
    Court’s Construction
    Indefinite.
    XVI. Disputed Claim Term #13: “to be checked against a security list, TSA NO-FLY list,
    SELECTEE list, other alternative credentials”
    Plaintiff’s Proposed Construction                 Defendants’ Proposed Construction
    “Plain meaning. All airports maintain a           “Indefinite.”
    security list, the TSA maintains a NO-FLY
    list, as well as a SELECTEE list.”                Defs.’ Cl. Constr. Br. at 26.
    Pl.’s Resp. Cl. Constr. Br. at 21.
    The disputed term is used in claim 1:
    wherein, upon a credential reading, the automated access control system
    automatically determines the source of the credential data record, and
    automatically extracts personal information to be checked against a
    security list, TSA NO-FLY list, SELECTEE list, other alternative
    credentials; whereas upon the credential authentication, the automated
    access control system automatically extracts authentication information
    from the authentication data record, and subsequently displays a warning
    window, as a result of the individual credentials match and ID forgery
    risks rating contained in the authentication data record.
    ’844 patent col. 5 ll. 26–37.
    A.      Parties’ Arguments
    The parties primarily dispute the meaning of “other alternative credentials.” According
    to defendants, “other alternative credentials” appears at the end of a list and could reasonably be
    read in light of the characteristics of the other listed elements. Defs.’ Cl. Constr. Br. at 26.
    Reading the term alongside the “security list, TSA NO-FLY list, SELECTEE list,” defendants
    suggest “alternative credentials” refers to a type of list. Id. Defendants alternatively assert,
    using the ’732 patent, the term could refer to an alternative backup form of ID for employees
    unable to present their main credential. Id. at 26–27. Defendants argue the term is indefinite
    because the claim term has two plausible readings. Id. Defendants further argue if the term is
    construed to mean an alternative employee ID, the claim term does not adequately describe what
    type of comparison the system would make between: (1) the personal information extracted
    from the presented credential; and (2) the personal information extracted from the alternative
    credential. Id. Accordingly, defendants assert the term is indefinite. Id. at 26.
    - 51 -
    Plaintiff argues if a separate alternative credentials “list” was contemplated, as suggested
    by defendants, the claim would have expressly described the list as an “alternative credentials
    list.” Pl.’s Resp. Cl. Constr. Br. at 21. The lack of the word “list,” according to plaintiff,
    suggests “alternative credentials” should be construed without consistency with the
    characteristics of the other elements in the list. Id. Plaintiff contends “to be checked against”
    should receive its ordinary meaning, contemplating a process where the system compares
    personal data from the presented credential to various lists maintained by the facility or to an
    alternative credential. Id. at 21–22.
    B.       Analysis
    1.       The Court’s Preliminary Construction
    Before the Markman hearing, the Court provided the parties with the Court’s preliminary
    construction after considering both parties’ claim construction briefs and all referenced materials
    in full. Tr. at 8:15–19. The Court first looked to determine if the ’844 defines alternative
    credential. The ’844 patent does not reference or provide an independent definition of
    “alternative credentials.” See ’844 patent. The ’732 patent, on the other hand, describes “an
    alternative credential” in dependent claim 3 as a credential used when an employee’s main
    credential is unavailable. ’732 patent col. 10 l. 36, col 11 l. 20, col. 14 l. 54. In the context of
    airport security, the ’732 patent’s definition coincides with the term’s plain meaning. See
    Alternative, Oxford Dictionary of English, (3d ed. 2010) (“available as another possibility or
    choice”). “When a parent application includes statements involving ‘common subject matter’
    with the terms at issue, those statements are relevant to construction of the terms in the child
    patent.” E.I. du Pont De Nemours & Co. v. Unifrax I LLC, 
    921 F.3d 1060
    , 1070 (Fed. Cir. 2019).
    The ’732 parent patent includes a definition of “an alternative credential” consistent with the
    term’s plain meaning in context, so the ’732 patent is relevant to construing the term within the
    ’844 patent. Accordingly, the Court preliminarily construed this term indefinite or plain
    meaning for the enumerated lists, with “alternative credentials” as defined in dependent claim 3
    of the ’732 patent. 10
    2.       The Court’s Final Construction
    At the Markman hearing, defendants agreed the ’282 application (the predecessor to the
    ’732 patent) is part of the intrinsic record and therefore resolved any indefinite issues for the
    disputed term. Tr. at 128:24–25, 129:1 (“THE COURT: And you would agree that [’282
    application, now ’732 patent is] in the intrinsic record? [DEFENDANTS]: Yes . . . .”).
    Defendants also agreed the definition of “alternative credentials” from the ’732 patent can be
    used in construing the term in the current claim at issue. Tr. at 136:1–7 (“THE COURT: You
    got to agree that the parent patent does seem to go into some discussions about alternative
    credential. So there’s explanation there in the spec[ification]. [DEFENDANTS]: . . . [G]iven
    that this is in the intrinsic record, I think the Court has a basis for [the preliminary] construction
    10
    The Court preliminarily construed the term as indefinite based on the differences between the ’282 application and
    ’732 issued patent; however, these discrepancies were resolved during the Markman hearing.
    - 52 -
    under Phillips.”). For clarity, defendants requested the Court remove reference to the parent
    patent and define “alternative credential” within the construction itself as “a credential used
    when the employee loses or misplaces a regular company credential.” Tr. at 131:10–19.
    Plaintiff agreed to the modification. Tr. at 132:15–17. Accordingly, as agreed by the parties, the
    Court adopts as final the construction: “Plain meaning as to the enumerated lists, with
    ‘alternative credentials’ meaning a credential used when an employee loses or misplaces a
    regular credential.”
    Plaintiff’s Proposed Construction                Defendants’ Proposed Construction
    “Plain meaning. All airports maintain a          “Indefinite.”
    security list, the TSA maintains a NO-FLY
    list, as well as a SELECTEE list.”
    Court’s Construction
    “Plain meaning as to the enumerated lists, with ‘alternative credentials’ meaning a credential
    used when an employee loses or misplaces a regular credential.”
    XVII. Disputed Claim Term #14: “warning window[, as a result of the individual
    credentials match and ID forgery risks rating contained in the authentication data
    record]”
    Plaintiff’s Proposed Construction                  Defendants’ Proposed Construction
    “Plain meaning. All airports maintain a            “Indefinite.
    security list, the TSA maintains a NO-FLY
    list, as well as a SELECTEE list.”                 To the extent the term is construed,
    Defendants propose:
    Pl.’s Resp. Cl. Constr. Br. at 22.
    An alert to the system operator, notifying the
    system operator that the individual should be
    denied access without human intervention,
    based on the credential data record generated
    using information from the standardized
    credential means and the authentication data
    record generated using information from the
    ID authenticator.”
    Defs.’ Cl. Constr. Br. at 27.
    This disputed term is used in claim 1:
    wherein, upon a credential reading, the automated access control system
    automatically determines the source of the credential data record, and
    automatically extracts personal information to be checked against a
    security list, TSA NO-FLY list, SELECTEE list, other alternative
    credentials; whereas upon the credential authentication, the automated
    access control system automatically extracts authentication information
    from the authentication data record, and subsequently displays a warning
    - 53 -
    window, as a result of the individual credentials match and ID forgery
    risks rating contained in the authentication data record.
    ’844 patent col. 5 ll. 26–37.
    A.      Parties’ Arguments
    Defendants contend the term is indefinite because the patent does not describe the
    information displayed upon appearance of the warning window or the additional actions the
    system takes once the warning window is triggered. Defs.’ Cl. Constr. Br. at 27–28. Defendants
    point to the ’844 patent specification describing a potential embodiment where the warning
    window requires a security manager to enter a predefined security code in order to override the
    warning. 
    Id.
     (citing ’844 patent col. 3 ll. 37–53). Defendants assert the language of claim 1 does
    not describe the content of the warning window or the potential actions taken by the security
    system to prevent unauthorized access prior to intervention by the security manager. Id. at 28.
    According to defendants, the ’844 patent’s lack of detail renders the claim indefinite. Id.
    Alternatively, if the claim is not indefinite, defendants argue the term must be construed to
    clarify the relationship with the system operator when the warning window is triggered. Id.
    Plaintiff argues “warning window” has a plain and ordinary meaning in the field. Pl.’s Resp.
    Cl. Constr. Br. at 22–23. Plaintiff further argues defendants are inappropriately reading
    limitations from an illustrative embodiment into the construction of the claim term. Id. at 23.
    B.      Analysis
    1.      The Court’s Preliminary Construction
    Before the Markman hearing, the Court provided the parties with the Court’s preliminary
    construction after considering both parties’ claim construction briefs and all referenced materials
    in full. Tr. at 8:15–19. The Court first determined whether an embodiment should limit the
    claim. The ’844 patent provides an illustration of the system operating as a vehicle gate entry
    system. ’844 patent col. 3 ll. 31–64. The embodiment explains when a “warning window” is
    displayed, intervention and a security code from a manager are required. Id. Such an illustrative
    embodiment, however, should not limit this term’s construction. Phillips v. AWH Corp., 
    415 F.3d 1303
    , 1323 (Fed. Cir. 2005) (the Federal Circuit “has repeatedly warned against confining
    the claims to [very specific] embodiments”). As such, the Court did not preliminarily adopt a
    requirement where a security manager must intervene with a security access code because claim
    1 does not expressly state the limitation. Furthermore, the patentee did not adopt an independent
    definition, act as his own lexicographer, or disavow any claim scope. See ’844 patent; ’282
    application; Phillips, 415 F.3d at 1312–13 (quoting Vitronics Corp. v. Conceptronic, Inc., 
    90 F.3d 1576
    , 1582 (Fed. Cir. 1996)); Thorner v. Sony Comput. Entm’t Am. LLC, 
    669 F.3d 1362
    ,
    1365 (Fed. Cir. 2012) (citing Vitronics, 
    90 F.3d at 1580
    ). The Court therefore preliminarily
    adopted a plain and ordinary meaning. See Phillips, 415 F.3d at 1312–13. Insofar as a definition
    is helpful, the Court preliminarily offered: “any of various rectangular boxes appearing on a
    computer screen that display files or program output to call something to an operator’s
    attention.” Warn, Webster’s Third New International Dictionary (2002) (“to notify or apprise
    - 54 -
    esp[ecially] in advance: call to one’s attention: make aware: INFORM”); Window, Merriam-
    Webster’s Dictionary, https://www.merriam-webster.com/dictionary/window (last visited Jan.
    10, 2023) (“any of various rectangular boxes appearing on a computer screen that display files or
    program output, that can usually be moved and resized, and that facilitate multitasking”).
    2.     The Court’s Final Construction
    At the Markman hearing, defendants argued the term is indefinite because the
    specification fails to detail a test for when the warning window would be displayed. Tr. at
    137:11–23. Defendants also questioned if “the warning window [is] triggered to display or [if
    the warning window] is . . . always displayed to show the operator information.” Tr. at 139:21–
    23. Applying broader patent policy arguments, defendants stated, because “[t]here’s zero
    information about when this warning window appears, . . . if it always has to appear, [or] what
    that rating looks like,” designing around the patent is more difficult. See Tr. at 146:6–12.
    Defendants’ argument, however, focuses on enablement rather than indefiniteness. See Enzo
    Life Sciences, Inc. v. Roche Molecular Sys., Inc., 
    928 F.3d 1340
    , 1345 (Fed. Cir. 2019) (“The
    enablement requirement asks whether ‘the specification teach[es] those in the art to make and
    use the invention without undue experimentation.’”). The legal standards of enablement and
    indefiniteness are distinct despite a conceptual overlap between both statutory requirements, and
    defendants improperly conflate enablement and indefiniteness. See, e.g., Augme Techs., Inc. v.
    Yahoo! Inc., 
    755 F.3d 1326
    , 1340 (Fed. Cir. 2014) (“Appellants’ arguments appear to be based
    on the wrong legal standard, i.e., written description or enablement as opposed to
    indefiniteness.”); Process Control Corp. v. HydReclaim Corp., 
    190 F.3d 1350
    , 1358 n.2 (Fed.
    Cir. 1999) (“[D]efiniteness and enablement are analytically distinct requirements [of validity],
    even though both concepts are contained in 
    35 U.S.C. § 112
    .”). The Federal Circuit has held
    validity arguments, such as lack of enablement and lack of written description, are not relevant
    during claim construction; therefore, the Court will not address an enablement argument here.
    See Philips, 415 F.3d at 1327 (“[W]e have certainly not endorsed a regime in which validity
    analysis is a regular component of claim construction.”). Defendants alternatively agreed with
    the Court’s construction of this term. Tr. at 139:10–20. Accordingly, the Court adopts its
    preliminary construction as final: “Plain meaning, ‘any of various rectangular boxes appearing
    on a computer screen that display files or program output to call something to an operator’s
    attention.’”
    Plaintiff’s Proposed Construction                Defendants’ Proposed Construction
    “Plain meaning. All airports maintain a          “Indefinite.
    security list, the TSA maintains a NO-FLY
    list, as well as a SELECTEE list.”               To the extent the term is construed,
    Defendants propose:
    An alert to the system operator, notifying the
    system operator that the individual should be
    denied access without human intervention,
    based on the credential data record generated
    using information from the standardized
    credential means and the authentication data
    - 55 -
    record generated using information from the
    ID authenticator.”
    Court’s Construction
    Plain meaning: “any of various rectangular boxes appearing on a computer screen that display
    files or program output to call something to an operator’s attention.”
    XVIII. Disputed Claim Term #15: “individual credentials match”
    Plaintiff’s Proposed Construction                  Defendants’ Proposed Construction
    “Plain meaning. As an illustration, checks         “Indefinite.”
    can be made against TSA lists, employee lists
    if employee, or traveler lists, if traveler.”      Defs.’ Cl. Constr. Br. at 28.
    Pl.’s Resp. Cl. Constr. Br. at 24.
    The disputed term is used in claim 1:
    wherein, upon a credential reading, the automated access control system
    automatically determines the source of the credential data record, and
    automatically extracts personal information to be checked against a
    security list, TSA NO-FLY list, SELECTEE list, other alternative
    credentials; whereas upon the credential authentication, the automated
    access control system automatically extracts authentication information
    from the authentication data record, and subsequently displays a warning
    window, as a result of the individual credentials match and ID forgery
    risks rating contained in the authentication data record.
    ’844 patent col. 5 ll. 26–37.
    A.      Parties’ Arguments
    Defendants argue the term is indefinite because the patent does not describe whether the
    system checks against various predetermined databases or against previously collected ID
    information to detect a match. Defs.’ Cl. Constr. Br. at 28–29. Defendants further argue if the
    system checks against predetermined databases, the patent does not specify which databases are
    contemplated as the patent describes a non-exhaustive list of potential databases. Id. at 29.
    Plaintiff argues the term is intended as a catch-all and should describe a match against
    any list utilized by the system and is not indefinite. Pl.’s Resp. Cl. Constr. Br. at 24. Plaintiff
    asserts the term should be given its plain and ordinary meaning. Id.
    B.      Analysis
    1.      The Court’s Preliminary Construction
    - 56 -
    Before the Markman hearing, the Court provided the parties with the Court’s preliminary
    construction after considering both parties’ claim construction briefs and all referenced materials
    in full. See Tr. at 8:15–19. In multiple instances, the ’844 patent describes a system comparing
    personal information against different types of predefined lists. See ’844 patent col. 1 l. 66
    (terrorists lists), col. 3 l. 13 (NO-FLY and SELECTEE lists), col. 3 l. 46 (NO-FLY and
    SELECTEE lists), col. 5 ll. 29–30 (security list, TSA NO-FLY and SELECTEE list). A
    PHOSITA would therefore read the term against a backdrop of these references and understand
    “individual credentials match” to refer to predefined lists similar to those illustrated in the patent.
    As for “match,” neither of the Thorner exceptions are met, and therefore, the Court preliminarily
    construed based on ordinary meaning. See ’844 patent; ’282 application; Thorner v. Sony
    Comput. Entm’t Am. LLC, 
    669 F.3d 1362
    , 1365 (Fed. Cir. 2012) (citing Vitronics Corp. v.
    Conceptronic, Inc., 
    90 F.3d 1576
    , 1580 (Fed. Cir. 1996)). Based on the lists described by the
    ’844 patent and the ordinary meaning of “match,” the Court provided the following preliminary
    construction: “The result when the extracted personal information is equal or similar to an entry
    in a security list, TSA NO-FLY list, SELECTEE list, or other alternative credentials.”
    2.      The Court’s Final Construction
    At the Markman hearing, defendants generally agreed to the Court’s construction but
    wanted “further clarity . . . where the extraction of personal information comes from.” Tr. at
    149:18–24. Plaintiff stated the information comes from the authentication data record. Tr. at
    151:5. Both parties then agreed with the Court’s construction of the term with the added
    clarification. See Tr. at 151:12–21. Accordingly, the Court adopts the following final
    construction: “The result when the extracted personal information from the authentication data
    record is equal or similar to an entry in a security list, TSA NO-FLY list, SELECTEE list, or
    other alternative credentials.”
    Plaintiff’s Proposed Construction                   Defendants’ Proposed Construction
    “Plain meaning. As an illustration, checks can “Indefinite.”
    be made against TSA lists, employee lists if
    employee, or traveler lists, if traveler.”
    Court’s Construction
    “The result when the extracted personal information from the authentication data record is
    equal or similar to an entry in a security list, TSA NO-FLY list, SELECTEE list, or other
    alternative credentials.”
    XIX. Conclusion
    The disputed terms are interpreted by the Court in this Claim Construction Opinion and
    Order. The Court accordingly adopts the constructions of the disputed terms as set forth herein.
    Term           Disputed Term                                   The Court’s Construction
    #
    1    “standardized credential reader             Indefinite.
    means”
    - 57 -
    2    “credential encoded with personal        Plain meaning: “a driver’s license, passport,
    identification”                          boarding pass, airport ID, or other standardized
    documents containing information relating to a
    particular individual converted from one system
    of communication into another.”
    3    “build individual real time records”     “The credential reader immediately generates a
    digital record after decoding information from
    the credential and encrypting sensitive personal
    information. The digital record is then stored
    within the system for access by a user at any
    time.”
    4    “credential collected information        Plain meaning: “when the data collected from a
    match”                                   currently presented credential is equal or similar
    to an existing record.”
    5    “system database”                        Plain meaning: “a collection of data organized
    for retrieval by a computer, and accessible by
    an automated access control system.”
    6    “the type of entry, visitor,             “Using the individual real time record built
    employee, contractor, supplier, or       from the presented personal identification
    vendor, is determined”                   credentials, the software application checks the
    system database stored information to ascertain
    whether the individual presenting the credential
    is one of the following: visitor, employee,
    contractor, supplier, or vendor.”
    7    “an ID authenticator”                    “A commercial identification card
    authentication device, separate from the
    standardized credential reader device.”
    8    “means to read non-encoded               “An apparatus capable of image acquisition and
    credentials”                             taking sense of letters and symbols.”
    9    “authentication data record”             “A record, separate from any individual real
    time record, containing both an authentication
    rating and a digital image of the credential.”
    10   “authenticity risk rating” /             “A grade of an ID’s security risks provided by
    “authentication rating” / “ID            the ID authenticator by analyzing physical
    forgery risks rating”                    aspects and embedded security features to
    determine the possibility of any tampering or
    forgery by matching with stored templates.”
    11   “automatically determines the            Indefinite.
    source”
    12   “credential data record”             Indefinite.
    13   “to be checked against a security    Plain meaning as to the enumerated lists, with
    list, TSA NO-FLY list, SELECTEE      “alternative credentials” meaning a credential
    list, other alternative credentials” used when an employee loses or misplaces a
    regular credential.
    14   “warning window[, as a result of     Plain meaning: “any of various rectangular
    the individual credentials match and boxes appearing on a computer screen that
    - 58 -
    ID forgery risks rating contained in     display files or program output to call
    the authentication data record]”         something to an operator’s attention.”
    15      “individual credentials match”           “The result when the extracted personal
    information from the authentication data record
    is equal or similar to an entry in a security list,
    TSA NO-FLY list, SELECTEE list, or other
    alternative credentials.”
    The Court began this claim construction analysis with a presumption “patents are
    presumed to be valid” and the USPTO “only grants those patent applications that meet the
    statutory patentability requirement[s].” See supra Section I.A. Defendants have proven their
    case and overcome the presumption of validity with clear and convincing evidence regarding
    three disputed terms. As discussed supra Sections III, XIV, and XV, claim terms 1, 11, and 12
    are indefinite under 
    35 U.S.C. § 112
     and as a result independent claim 1 is rendered invalid. As
    the only independent claim in the ’844 patent, the entire ’844 patent is invalid under § 112. See
    Horizon Pharma, Inc. v. Dr. Reddy’s Labs., Inc., No. CV 15-3324 (SRC), 
    2018 WL 6040265
    , at
    *9 (D.N.J. Nov. 19, 2018) (finding the patents-in-suit invalid after finding the sole independent
    claims invalid for indefiniteness), aff’d, 
    839 F. App’x 500
     (Fed. Cir. 2021); see also Nautilus,
    Inc. v. Biosig Instruments, Inc., 
    572 U.S. 898
    , 902 (“A lack of definiteness renders invalid ‘the
    patent or any claim in suit.’”) (quoting 
    35 U.S.C. § 282
    , ¶ 2(3)). Although three terms were
    found indefinite, rendering the entire ’844 patent invalid, the Court construed all disputed terms
    the parties raised. See O2 Micro Int’l Ltd. v. Beyond Innovation Tech. Co., 
    521 F.3d 1351
    , 1360
    (Fed. Cir. 2008) (“When the parties raise an actual dispute regarding the proper scope of these
    claims, the court . . . must resolve that dispute.”).
    The ’844 patent—the only patent asserted as infringed—is now invalid. Plaintiff no
    longer presents a valid patent viable for patent infringement adjudication in this Court. Rule
    12(h)(3) of the Rules of the Court of Federal Claims (“RCFC”) provides “[i]f the court
    determines at any time that it lacks subject matter jurisdiction, the court must dismiss the action.”
    The Court therefore ORDERS plaintiff to SHOW CAUSE as to why this case should not be
    dismissed pursuant to RCFC 12(h)(3) on or before 20 February 2023. In responding to this
    order, plaintiff must identify which source or sources of law he is invoking and explain why this
    Court has jurisdiction over this case. Defendants SHALL FILE a response on or before 6
    March 2023.
    IT IS SO ORDERED.
    s/ Ryan T. Holte
    RYAN T. HOLTE
    Judge
    - 59 -
    

Document Info

Docket Number: 17-307

Judges: Ryan T. Holte

Filed Date: 1/20/2023

Precedential Status: Precedential

Modified Date: 1/20/2023

Authorities (53)

Atmel Corporation v. Information Storage Devices, Inc. , 198 F.3d 1374 ( 1999 )

American Hoist & Derrick Company, Cross-Appellee v. Sowa & ... , 725 F.2d 1350 ( 1984 )

Cordis Corp. v. Medtronic Ave, Inc. , 339 F.3d 1352 ( 2003 )

Skky, Inc. v. Mindgeek, S.A.R.L. , 859 F.3d 1014 ( 2017 )

Altiris, Inc. v. Symantec Corp., Defendant-Cross , 318 F.3d 1363 ( 2003 )

Liebel-Flarsheim Company and Mallinckrodt Inc. v. Medrad, ... , 358 F.3d 898 ( 2004 )

Richard Williamson v. Citrix Online, LLC , 792 F.3d 1339 ( 2015 )

Avid Technology, Inc. v. Harmonic, Inc. , 812 F.3d 1040 ( 2016 )

Sonix Technology Co., Ltd. v. Publications International , 844 F.3d 1370 ( 2017 )

The Medicines Company v. Mylan, Inc. , 853 F.3d 1296 ( 2017 )

Aylus Networks, Inc. v. Apple Inc. , 856 F.3d 1353 ( 2017 )

E.I. Dupont De Nemours & Co. v. Unifrax I LLC , 921 F.3d 1060 ( 2019 )

Iridescent Networks, Inc. v. At&t Mobility, LLC , 933 F.3d 1345 ( 2019 )

Enzo Life Sciences, Inc. v. Roche Molecular Systems, Inc. , 928 F.3d 1340 ( 2019 )

Herbert Markman and Positek, Inc. v. Westview Instruments, ... , 52 F.3d 967 ( 1995 )

Procter & Gamble Co. v. Teva Pharmaceuticals USA, Inc. , 566 F.3d 989 ( 2009 )

Applied Medical Resources Corp. v. United States Surgical ... , 448 F.3d 1324 ( 2006 )

Biomedino, LLC v. Waters Technologies Corporation , 490 F.3d 946 ( 2007 )

Thorner v. Sony Computer Entertainment America LLC , 669 F.3d 1362 ( 2012 )

Presidio Components, Inc. v. American Technical Ceramics , 875 F.3d 1369 ( 2017 )

View All Authorities »