Searching over 5,500,000 cases.


searching
Buy This Entire Record For $7.95

Download the entire decision to receive the complete text, official citation,
docket number, dissents and concurrences, and footnotes for this case.

Learn more about what you receive with purchase of this case.

Axcess International, Inc. v. AMAG Technology, Inc.

United States District Court, E.D. Texas, Marshall Division

November 10, 2017

AXCESS INTERNATIONAL, INC., Plaintiff,
v.
AMAG TECHNOLOGY, INC., Defendant. Plaintiff's Proposed Construction Defendants' Proposed Construction

          CLAIM CONSTRUCTION OPINION AND ORDER

          ROY S. PAYNE, UNITED STATES MAGISTRATE JUDGE

         I. BACKGROUND

         These consolidated patent cases concern U.S. Patent 7, 286, 158, which is entitled “Method and System for Providing Integrated Remote Monitor Services.” The '158 Patent purports to teach technology that “allow[s] a subscriber to remotely monitor, evaluate, and control operations at a facility.” '158 Patent at 1:50-52.

         More specifically, the patent is directed to integrating the use of radio frequency identification (RFID) with video data to provide video verification of an event, such as authorized access (or attempted unauthorized access) to a secure area. Id. at 9:22-24. This allows a remote user to view the video and confirm the identity of the person attempting access.

         As an example, FIG. 4 of the patent (below) embodies asserted independent claim 14. In step 200, a radio response is elicited from an RFID tag at an access door of a secure area of a monitored facility 14. At step 202, one or more video images of the wearer of the RFID tag are obtained from a camera covering the access door. The video image may be obtained in response to the radio response, authorized access, or an attempt at unauthorized access. At step 204, the method determines whether the requested access is authorized based on the radio response from the RFID tag. If access is authorized, step 206 opens the access door. But regardless of whether the door is opened, step 208 stores the video image with the RFID action to provide video verification of the event. See generally Id. At 9:13-35.

         (Image Omitted)

         Claims 14-18, which are the only asserted claims, include the terms the parties proffer for construction (bolded):

14. A method for providing identity verification for access to a secure area, comprising:
eliciting a radio response from a radio frequency identification (RFID) tag at an access door of a secure area;
determining whether access by a wearer of the RFID tag to the secure area is authorized based on the radio response;
recording a video image of the wearer of the RFID tag at the access door; and
controlling access to the door to provide access to the secure area by the wearer only if access by the wearer is authorized.
15. The method of claim 14, further comprising recording the video image in response to authorized access.
16. The method of claim 14, further comprising recording the video image in response to an attempt at unauthorized access.
17. The method of claim 14, further comprising recording the video image in response to the radio response from the RFID tag.
18. The method of claim 14, further comprising recording a series of video images of the wearer of the RFID tag at the access door.

         II. DISCUSSION

         A. “wearer of the RFID tag” ...


Buy This Entire Record For $7.95

Download the entire decision to receive the complete text, official citation,
docket number, dissents and concurrences, and footnotes for this case.

Learn more about what you receive with purchase of this case.