NOTE: This disposition is nonprecedential.
United States Court of Appeals
for the Federal Circuit
______________________
NEOLOGY, INC.,
Appellant
v.
INTERNATIONAL TRADE COMMISSION,
Appellee
KAPSCH TRAFFICCOM USA, INC., KAPSCH
TRAFFICCOM HOLDING CORP., KAPSCH
TRAFFICCOM CANADA INC., STAR SYSTEMS
INTERNATIONAL LTD., STAR RFID CO., LTD.,
Intervenors
______________________
2018-1338
______________________
Appeal from the United States International Trade
Commission in Investigation No. 337-TA-979.
______________________
Decided: April 19, 2019
______________________
VINAY VIJAY JOSHI, Amin Turocy & Watson LLP, San
Jose, CA, argued for appellant. Also represented by
DANIEL W. BEDELL, ANTHONY KIM, ANDREW TIMOTHY
OLIVER.
2 NEOLOGY, INC. v. ITC
CATHY CHEN, Office of the General Counsel, United
States International Trade Commission, Washington, DC,
argued for appellee. Also represented by DOMINIC L.
BIANCHI, WAYNE W. HERRINGTON, SIDNEY A. ROSENZWEIG.
NATHAN S. MAMMEN, Kirkland & Ellis LLP, Washing-
ton, DC, argued for intervenors. Also represented by
GREGG F. LOCASCIO, BRIAN H. GOLD.
______________________
Before TARANTO, SCHALL, and CHEN, Circuit Judges.
TARANTO, Circuit Judge.
Neology filed a complaint with the International Trade
Commission in 2015, alleging, as now relevant, infringe-
ment of claims 13, 14, and 25 of its U.S. Patent No.
8,325,044 and claims 1, 2, and 4 of its U.S. Patent No.
8,587,436. The patents, which share a specification, de-
scribe and claim systems and methods for tracking identi-
fying information, particularly those relying on radio
frequency identification (RFID). The Commission held the
claims now at issue invalid because (1) they lack adequate
written description support and (2) they are invalid for an-
ticipation by U.S. Patent No. 5,627,544 (Snodgrass) or for
obviousness based on the combination of Snodgrass and
two other pieces of prior art. Neology appeals. We affirm
on the written-description ground and do not reach antici-
pation or obviousness.
I
A
Neology filed applications for both the ’044 and ’436 pa-
tents in 2012, both applications tracing by the same chain
of continuation applications to an application filed in 2003
and a provisional application filed in 2002. The claims that
appeared in the 2012 applications as filed (the 2012 claims)
issued with very few changes as the claims in the ’044 and
NEOLOGY, INC. v. ITC
3
’436 patents. Compare J.A. 3549–54, with ’044 patent, col.
23, line 5, through col. 24, line 63; compare J.A. 3755–59,
with ’436 patent, col. 23, line 13, through col. 25, line 17.
The patents share a title, “System and Method for Provid-
ing Secure Identification Solutions,” as well as a specifica-
tion. They describe and claim methods and systems “for
verifying and tracking identification information” in a se-
cure system that, for one embodiment, “includes at least
one of the following: a radio frequency (RF) identification
device, an identification mechanism (e.g., a card, sticker),
and an RF reader/writer.” See, e.g., ’044 patent, col. 1, lines
39–45. An example is an RF device (corresponding to the
claims “RFID transponder”) on an automobile, with identi-
fying information embedded in the RFID device readable
by an RFID reader. The important claim limitation for the
asserted claims here involves exchanges of a “security key”
between the RFID reader and transponder.
The claims of the ’044 patent now at issue are claims
13, 14, and 25. Claims 13 and 14 depend on claim 10, which
reads:
10. A toll system, comprising:
a central database configured to:
store toll accounts,
receive identifiers related to toll accounts, and
compare the received identifiers to identifiers
associated with the toll accounts to determine
if a match exists;
an RFID reader comprising a radio and an an-
tenna, the RFID reader configured to:
send a first communication to a RFID tran-
sponder that includes a memory the contents of
which include an identifier,
4 NEOLOGY, INC. v. ITC
send a second communication to the RFID
transponder that includes a security key for
validation by the RFID transponder,
receive at least the identifier included in the
memory contents in response to the second
communication and as a result of validation of
the security key, and transmit the identifier to
the central database.
Id., col. 23, lines 39–56. Claim 13 adds the limitation of an
RFID reader sending a “third communication . . . that in-
cludes a second security key for validation by the RFID
transponder and receive further memory contents in re-
sponse to the third communication and as a result of vali-
dation of the second security key.” Id., col. 23, line 64,
through col. 24, line 4. Claim 14, which depends on claim
13, further requires that “the second security key is based
on information received from the RFID transponder.” Id.,
col. 24, lines 5–7. Claim 25 depends on claim 23, which
recites the same series of communications and transfers of
security keys but for an RFID transponder, not the “toll
system” of claim 10. Id., col. 24, lines 37–50, 54–60.
The ’436 patent claims also include the same series of
communications between the RFID reader and tran-
sponder. ’436 patent, col. 23, lines 13–43. Independent
claim 1 recites:
1. A RFID reader, comprising:
a radio and an antenna;
a processor coupled with the radio, the processor
configured to:
send a first communication to a RFID transponder
via the radio and the antenna that includes a
memory the contents of which includes an identi-
fier,
NEOLOGY, INC. v. ITC
5
send a second communication to the RFID tran-
sponder via the radio and the antenna that in-
cludes a security key for validation by the RFID
transponder,
receive at least the identifier included in the
memory contents via the radio and the antenna in
response to the second communication and as a re-
sult of validation of the security key, and
transmit the identifier to a central database;
wherein the processor is further configured to send
a third communication to the RFID transponder
via the radio and the antenna that includes a sec-
ond security key for validation by the RFID tran-
sponder and receive via the radio and the antenna
further memory contents in response to the third
communication and as a result of validation of the
second security key.
Id., col. 23, lines 13–34. Claims 2 and 4 depend directly on
claim 1. Claim 2 adds the limitation that “the security key
is based on information received from the RFID tran-
sponder.” Id., col. 23, lines 35–36. Claim 4 adds the limi-
tation that “the second security key is based on information
received from the RFID transponder.” Id., col. 23, lines 41–
43.
B
Neology filed a complaint with the Commission on De-
cember 4, 2015. The complaint alleged infringement of var-
ious claims of the ’044 and ’436 patents, as well as claims
of another patent not at issue here. Neology accused Kap-
sch TrafficCom U.S. Corp., Kapsch TrafficCom IVHS Tech-
nologies Holding Corp., Kapsch TrafficCom IVHS Holding
Corp., Kapsch TrafficCom IVHS, Inc., Kapsch TrafficCom
Canada Inc., Kapsch TrafficCom Holding Corp., Star Sys-
tems International, Ltd., and STAR RFID Co., Ltd. (collec-
tively, Kapsch) of importing infringing products. The
6 NEOLOGY, INC. v. ITC
Commission instituted an investigation on January 11,
2016. After Neology terminated the investigation with re-
spect to claims 3, 6–12, and 14–18 of the ’436 patent, what
remained were claims 13, 14, and 25 of the ’044 patent and
claims 1, 2, and 4 of the ’436 patent.
The administrative law judge concluded on June 22,
2017, that the ’044 and ’436 patents are not entitled to the
priority date of U.S. Patent Application No. 10/615,026,
filed in 2003, because that application “does not provide
written description support” for some of the key limitations
of the at-issue claims of the ’044 and ’436 patents. The ALJ
also found invalidity of the claims on several grounds, in-
cluding the following: (a) claims 13, 14, and 25 of the ’044
patent and claims 1, 2, and 4 of the ’446 patent are invalid
for lack of written description; (b) claim 25 of the ’044 pa-
tent and claims 1, 2, and 4 of the ’436 patent are antici-
pated by Snodgrass; and (c) claims 13 and 14 of the ’044
patent are invalid for obviousness over a combination of
Snodgrass, U.S. Patent No. 5,819,234 (Slavin), and an ar-
ticle, “RFID for Road Tolling, Road-Use Pricing and Vehicle
Access Control,” by Phil Blythe (Blythe).
Neology appealed to the full Commission, which issued
its final decision on October 30, 2017. The Commission de-
termined that the ALJ was correct that the two patents are
not entitled to an earlier priority date, that the claims are
invalid for lack of written description, and that the claims
are invalid for anticipation by Snodgrass or obviousness
based on a combination of Snodgrass, Slavin, and Blythe.
The Commission reversed certain other invalidity determi-
nations made by the ALJ.
Neology filed a timely notice of appeal on December 22,
2017. We have jurisdiction under 28 U.S.C. § 1295(a)(6).
II
We review the Commission’s factual findings for sub-
stantial evidence. Rivera v. Int’l Trade Comm’n, 857 F.3d
NEOLOGY, INC. v. ITC
7
1315, 1319 (Fed. Cir. 2017). Whether a claim is adequately
supported by the written description is an issue of fact.
GlaxoSmithKline LLC v. Banner Pharmacaps, Inc., 744
F.3d 725, 729 (Fed. Cir. 2014). We review “procedural and
evidentiary determinations made by the Commission,” in-
cluding “waiver” determinations, for abuse of discretion.
Windbond Elecs. Corp. v. Int’l Trade Comm’n, 262 F.3d
1363, 1370 (Fed. Cir. 2001).
A
1
Contrary to Neology’s initial contention, Kapsch did
not waive the argument that the claims are invalid for lack
of written description. Both the ALJ and the Commission
decided whether the claims at issue have adequate written-
description support both in determining priority and in de-
termining validity. See J.A. 38–45; J.A. 147–74. The Com-
mission specifically held that Kapsch had not waived the
direct invalidity challenge based on inadequate support in
the written description. See J.A. 39–40. We see no error
in that determination. In pre- and post-hearing briefs,
Kapsch and the Commission’s Office of Unfair Import In-
vestigations timely raised, and they and Neology all dis-
cussed, the issue of invalidity due to inadequate written
description. J.A. 764; J.A. 937; J.A. 977; J.A. 1187; J.A.
1188; J.A. 4770–71; J.A. 5135. There was no waiver.
2
When the investigation went to the Commission, on re-
view of the ALJ decision, Neology argued that the specifi-
cation and the 2012 claims themselves each provided
adequate written description, but the Commission con-
cluded that Neology had waived reliance on the 2012
claims by not relying on those claims before the ALJ as a
basis for written-description support. J.A. 42−43. We see
no error in that conclusion. Neology’s briefing, even after
the hearing, relied on the argument that the specification
8 NEOLOGY, INC. v. ITC
of the ’026 application (the 2003 application), which did not
include the 2012 claims, provided the written-description
support of the claims in the ’044 and ’436 patents, and it
did not make an argument that the 2012 claims furnished
the required written-description support. J.A. 4775 (“How
a [person of ordinary skill in the art] would specifically un-
derstand that each challenged claim limitation is disclosed
in the specification of the ’026 Application is described in
even more detail below.”) (emphasis added); id. (“As fur-
ther evidence that the specification of the ’026 Application
provides adequate written description for the asserted
claims . . . .”) (emphasis added). It was not until after the
Commission requested additional briefing that Neology
raised the argument that the 2012 claims contained ade-
quate disclosure to provide written-description support for
the issued claims. J.A. 5570 (“For validity, the written-de-
scription analysis properly relies on the cumulative disclo-
sure of the applications that became the ’044 and ’436
patents—including the originally-filed claims [(the 2012
claims)] in the asserted patents along with all prior appli-
cations incorporated by reference—to determine whether
the asserted claims have adequate support.”) (second em-
phasis added); J.A. 5573 (“Therefore, unlike priority, the
written-description analysis for invalidity in this case
. . . also relies on the originally-filed claims of the applica-
tions [(the 2012 claims)] that led to the ’044 and ’436 pa-
tents . . . .”) (emphasis added).
In response to the Commission’s determination that
Neology waived the argument that the 2012 claims provide
written-description support, Neology points to one passage
in the pre-hearing brief it submitted to the ALJ. There,
previewing its evidence for written description, Neology
stated that “[e]xcept for the claims, the as-filed specifica-
tion of the ’026 Application is nearly identical to the respec-
tive applications that issued as the later member patents
in the same family . . . .” J.A. 765. Neology argues that the
NEOLOGY, INC. v. ITC
9
quoted sentence differentiates between the claims in the
’026 application and the 2012 claims and thereby preserves
the argument that the 2012 claims alone provide written
description support for the issued claims.
We disagree. We have recognized that claims can be
self-describing. See, e.g., Mentor Graphics Corp. v. EVE-
USA, Inc., 851 F.3d 1275, 1297 (Fed. Cir. 2017); Ariad
Pharm., Inc. v. Eli Lilly & Co., 598 F.3d 1336, 1349–51
(Fed. Cir. 2010). On the other hand, genus claims, espe-
cially those that “use functional language to define the
boundaries of a claimed genus,” are unlikely to provide an
adequate written description so as to be self-describing.
Ariad Pharm., 598 F.3d at 1349. Determining whether a
particular claim is self-describing is not a cut-and-dried,
simple matter, but would require more development—fac-
tual and legal—than the passing reference on which Neol-
ogy now relies. We conclude that the Commission did not
abuse its discretion in finding that Neology waived its ar-
gument that the asserted claims are supported by the 2012
claims. We therefore affirm the Board’s conclusion that
Neology waived this argument. The written-description
contention preserved before the ALJ and Commission,
therefore, was simply whether support for the claims at is-
sue can be found in the body of the written description
without the 2012 claims—which is substantively the same
as the 2003 written description.
B
A patent must “contain a written description of the in-
vention . . . in such full, clear, concise, and exact terms as
to enable any person skilled in the art . . . to make and use
the same.” 35 U.S.C. § 112 ¶ 1. 1 We have long held that,
1 Although the relevant wording has not changed, we
cite the version of § 112 that pre-dated the amendments to
10 NEOLOGY, INC. v. ITC
for any given claim, “the description must ‘clearly allow
persons of ordinary skill in the art to recognize that [the
inventor] invented what is claimed.’” Ariad Pharm., 598
F.3d at 1351 (quoting Vas–Cath Inc. v. Mahurkar, 935 F.2d
1555, 1562–63 (Fed. Cir. 1991)). As we have noted, the ad-
equacy of support in the written description is a question
of fact, and we review the Commission’s answer to that
question for substantial evidence. Rivera, 857 F.3d at
1319; GlaxoSmithKline, 744 F.3d at 729.
The ALJ identified five limitations of the asserted
claims that lacked adequate written description, a finding
affirmed by the Commission. The five limitations are: “a
second communication . . . that includes a security key”;
transmission of an “identifier” from transponder memory
“in response to the second communication” as a result of
“validation” of the “security key”; a central database and
toll system; a “third communication . . . that includes a sec-
ond security key”; and a “security key is based on infor-
mation received from the RFID transponder.” J.A. 24–25;
J.A. 70. We find it unnecessary to discuss the third limita-
tion. It suffices to discuss the other four limitations, for
which the Commission’s findings of inadequate support
largely rest on a shared basis.
The first limitation claims the transmission of a second
communication containing a security key and is part of
claims 13, 14, and 25 of the ’044 patent and claims 1, 2, and
4 of the ’436 patent. It requires both the existence of a “se-
curity key” and the transmission of that same key. The
specification mentions five types of keys: cryptographic,
that section made by the Leahy-Smith America Invents
Act, Pub. L. No. 112-29, § 4(c), 125 Stat. 284, 296 (2011).
Those amendments do not apply to patents, like the ’044
and ’436 patents, that issued from applications filed before
September 16, 2012. Id., § 4(e), 125 Stat. 297.
NEOLOGY, INC. v. ITC
11
security, credit and debit exchange, encryption, and ex-
change encrypted. The specification describes crypto-
graphic keys as “check[ed] and validate[d]” by the “security
management unit” and being “sent to the cryptographic
block.” ’044 patent, col. 2, lines, 51–53. The “cryptographic
block” also “stores the security keys.” Id., col. 2, lines 53–
54. Credit and debit exchange keys are disclosed as part of
the “Optional Security Features” where identifying infor-
mation is stored in “[h]ighly secure chips with a hardware
programmable cryptographic block” that has the credit and
debit exchange key. Id., col. 12, lines 7, 20–23. Encryption
keys are disclosed in the same optional security features
section and are needed to “initialize[]” equipment that in-
teracts with the device storing identifying information. Id.,
col. 12, lines 28–31. Finally, the specification discloses a
“hardware wired cryptographic block 2210 (with 4 ex-
change encrypted keys . . . ).” Id., col. 22, lines 18–19.
Based on the disclosures in the specification and testi-
mony from the experts, the Commission had substantial
evidence to support its finding of insufficient written de-
scription. Despite disclosing several types of keys, the
specification discloses only where they are stored and not
whether they are exchanged. Experts for both Kapsch and
Neology agreed that cryptographic and encryption keys, by
their nature, are not exchanged. J.A. 2908–09; J.A. 3046.
Dr. Gregory Durgin, Kapsch’s expert, testified that credit
and debit exchange keys and exchange encrypted keys
function like cryptographic keys, in that they are stored in
the same cryptographic block, and are not exchanged, be-
cause cryptographic keys are not exchanged. J.A. 2433–34.
He also testified that the credit and debit exchange and ex-
change encrypted keys are not exchanged because the spec-
ification “doesn’t involve those keys in any sort of RFID
protocol.” J.A. 2433 The Commission could reasonably rely
as well on the inventor’s own testimony that the keys dis-
closed in the specification are encryption keys, J.A. 1704–
12 NEOLOGY, INC. v. ITC
07, which, as previously discussed, are not exchanged, even
though he later clarified his testimony that two of the dis-
closed keys are the credit and debit exchange keys, id. And
Jack Goldberg, Neology’s expert, originally testified that he
simply did not know if the keys were exchanged, J.A. 3060–
61, which allowed the Commission not to credit—against
other evidence—Mr. Goldberg’s later testimony that the
credit and debit and exchange encrypted keys must be ex-
changed because of their names. We conclude that there is
substantial evidence in the specification and the testimony
to support the Commission’s finding that the specification
does not adequately describe a second communication that
includes a security key.
The Commission’s finding that there is no disclosure of
a transmission of the security key supports the finding that
three additional claim limitations are likewise inade-
quately supported. The second limitation requires the
transmission of an “identifier” “in response to the second
communication” as a result of “validation of the security
key.” ’044 patent, col. 23, lines 53–56; ’436 patent, col. 23,
lines 23–26. If there is no transmission of a security key,
there cannot be validation of such a key or transmission of
an identifier in response to the second communication.
Similarly, the fourth limitation requires a “third communi-
cation . . . that includes a second security key,” ’044 patent,
col. 23, line 64 through col. 24, line 4; ’436 patent, col. 23,
lines 27–29, so the finding that there is no disclosure of a
second communication including a key means that there
can be no third communication that includes a “second” one
of that key. The fifth limitation, which requires the “secu-
rity key”/“second security key” from the independent claim
to be “based on information received from the RFID tran-
sponder,” ’044 patent, col. 24, lines 5–7; ’436 patent, col. 23,
lines 34–35, 40–43, also is reasonably found unsupported
in the absence of a disclosure of information exchanged be-
tween the transponder and the device. Additionally, Dr.
Durgin testified that “there is no disclosure of an RFID
NEOLOGY, INC. v. ITC
13
protocol or any specific step that would involve the security
key, based on information from the RFID transponder.”
J.A. 2449–53. Thus, the Commission had substantial evi-
dence to find inadequate written-description support for
limitations two, four, and five.
For those reasons, we affirm the Commission’s finding
that the asserted claims lack sufficient written-description
support. In view of that conclusion, we need not reach the
issues of anticipation or obviousness.
III
The ruling of the Commission that the claims at issue
are invalid is affirmed.
AFFIRMED