throbber
PTO/SB/16 (12-08)
`Approved for use through 09/30/2010. OMB 0651-0032
`U.S. Patent and Trademark Office; U.S. DEPARTMENT OF COMMERCE
`Under the Paperwork Reduction Act of 1995, no persons are required to respondto a collection of information unlessit displays a valid OMB control number.
`PROVISIONAL APPLICATION FOR PATENT COVER SHEET — Page 1 of 2
`This is a requestforfiling a PROVISIONAL APPLICATION FOR PATENT under37 CFR 1.53(c).
`Express Mail Label No.
`
`Given Name(first and middle [if any])
`
`INVENTOR(S
`Family Name or Surname
`
`
`
`Jaemin
`
`Daeman
`
`Youngjin
`
`YOU
`
`
`
`ENCLOSED APPLICATION PARTS(checkall that apply)
`Application Data Sheet. See 37 CFR 1.76
`[] cps), Number of CDs
`10
`Drawing(s) Number of Sheets
`[| Other(specify)
`Specification (e.g. description of the invention) Number of Pages
`22
`Fees Due: Filing Fee of $220 ($110 for small entity).
`If the specification and drawings exceed 100 sheets of paper, an application size fee is
`also due, which is $270 ($135 for small entity) for each additional 50 sheets or fraction thereof. See 35 U.S.C. 41(a)(1)(G) and 37 CFR 1.16(s).
`METHOD OF PAYMENT OFTHE FILING FEE AND APPLICATION SIZE FEE FOR THIS PROVISIONAL APPLICATION FOR PATENT
`
`Seoul, KR
`Seongwoo
`
`Donghyun
`Yongin Si, KR
`
`
`
`Residence
`(City and either State or Foreign Country)
`
`Seoul, KR
`
`Seoul, KR
`
`Seoul, KR
`
`separately numbered sheets attached hereto.
`1
`Additional inventors are being named on the
`TITLE OF THE INVENTION(500 characters max):
`
`SYSTEM AND METHOD FOR PROVISIONING OVER THE AIR OF CONFIDENTIAL
`INFORMATION ON MOBILE COMMUNICATIVE DEVICES WITH NON-UICC SECURE
`ELEMENTS
`
`Direct all correspondenceto:
`
`CORRESPONDENCE ADDRESS
`
`
`The address corresponding to Customer Number:
`
`58027
`
`OR
`
`Firm or
`Individual Name
`Address
`
` City
`
`Applicant claims small entity status. See 37 CFR 1.27.
`A check or money order made payable to the Director of fhe United States Patent and Trademark Office
`is enclosed to coverthe filing fee and application size fee (if applicable).
`.
`.
`Paymentby credit card. Form PTO-2038is attached.
`
`220.00
`:
`
`TOTAL FEE AMOUNT($)
`
`The Director is hereby authorized to chargethe filing fee and application size fee (if applicable) or credit any overpaymentto Deposit
`Account Number:
`503
`USE ONLY FOR FILING A PROVISIONAL APPLICATION FOR PATENT
`This collection of information is required by 37 CFR 1.51. The information is required to obtain or retain a benefit by the public whichis to file (and by the USPTO to
`process) an application. Confidentiality is governed by 35 U.S.C. 122 and 37 CFR 1.11 and 1.14. This collection is estimated to take 10 hours to complete,
`including
`gathering, preparing, and submitting the completed application form to the USPTO.
`Time will vary depending upon the individual case. Any comments on the
`amount of time you require to complete this form and/or suggestions for reducing this burden, should be sent to the Chief Information Officer, U.S. Patent and
`Trademark Office, U.S. Department of Commerce, P.O. Box 1450, Alexandria, VA 22313-1450. DO NOT SEND FEES OR COMPLETED FORMSTO THIS
`ADDRESS. SEND TO: Commissioner for Patents, P.O. Box 1450, Alexandria, VA 22313-1450.
`if you need assistance in completing the form, calf 1-800-PTO-9199 and selectoption 2.
`
`Apple Ex. 1013, p. 1
`Apple Ex. 1013, p. 1
` Apple v. Fintiv
`Apple v.Fintiv
`IPR2020-00019
`IPR2020-00019
`
`

`

`PROVISIONAL APPLICATION COVER SHEET
`Page 2 of 2
`
`PTO/SB/16 (12-08)
`Approved for use through 09/30/2010. OMB 0651-0032
`U.S. Patent and Trademark Office; U.S. DEPARTMENT OF COMMERCE
`Under the Paperwork Reduction Act of 1995, no persons are required to respondto a collection of information unless it displays a valid OMB control number.
`
`The invention was made by an agencyof the United States Government or under a contract with an agency of the United States Government.
`No.
`
`[] Yes, the name of the U.S. Government agency and the Government contract numberare:
`
`WARNING:
`Petitioner/applicant is cautioned to avoid submitting personal information in documents filed in a patent application that may
`contribute to identity theft. Personal
`information such as social security numbers, bank account numbers, or credit card
`numbers (other than a check or credit card authorization form PTO-2038 submitted for payment purposes) is never required by
`the USPTOto support a petition or an application.
`If this type of personal information is included in documents submitted to the
`USPTO, petitioners/applicants should consider redacting such personal information from the documents before submitting them
`to the USPTO. Petitioner/applicant is advised that the record of a patent application is available to the public after publication of
`the application (unless a non-publication request in compliance with 37 CFR 1.213(a) is made in the application) or issuance of
`a patent. Furthermore, the record from an abandoned application may also be available to the public if the
`application is
`referenced in a published application or an issued patent (see 37 CFR 1.14). Checks and credit card authorization forms
`PTO-2038 submitted for payment purposesare notretained in the application file and therefore are not publicly available.
`
`signature /hae-chan park/
`
`Date December 30, 2010
`
`TYPED or PRINTED NAME Hae-Chan Park
`
`REGISTRATION No. 20114
`(if appropriate)
`TELEPHONE _£03-288-5105 Docket Number: P4303USPR
`
`Apple Ex. 1013, p. 2
`Apple Ex. 1013, p. 2
` Apple v. Fintiv
`Apple v. Fintiv
`IPR2020-00019
`IPR2020-00019
`
`

`

`Privacy Act Statement
`
`The Privacy Act of 1974 (P.L. 93-579) requires that you be given certain information in connection
`with your submission of the attached form related to a patent application or patent. Accordingly,
`pursuant to the requirements of the Act, please be advised that:
`(1) the general authority for the
`collection of this information is 35 U.S.C. 2(b)(2); (2) furnishing of the information solicited is voluntary;
`and (3) the principal purpose for which the information is used by the U.S. Patent and Trademark
`Office is to process and/or examine your submission related to a patent application or patent. If you do
`not furnish the requested information, the U.S. Patent and Trademark Office may not be able to
`process and/or examine your submission, which may result in termination of proceedings or
`abandonmentof the application or expiration of the patent.
`
`The information provided by you in this form will be subject to the following routine uses:
`
`1. The information on this form will be treated confidentially to the extent allowed under the
`Freedom of Information Act (5 U.S.C. 552) and the Privacy Act (5 U.S.C 552a). Records from
`this system of records may be disclosed to the Department of Justice to determine whether
`disclosure of these recordsis required by the Freedom of Information Act.
`in the course of
`A record from this system of records may be disclosed, as a routine use,
`presenting evidence to a court, magistrate, or administrative tribunal, including disclosures to
`opposing counsel in the course of settlement negotiations.
`to a Member of
`A record in this system of records may be disclosed, as a routine use,
`Congress submitting a request involving an individual, to whom the record pertains, when the
`individual has requested assistance from the Member with respect to the subject matter of the
`record.
`A record in this system of records may bedisclosed, as a routine use, to a contractor of the
`Agency having need for the information in order to perform a contract. Recipients of
`information shall be required to comply with the requirements of the Privacy Act of 1974, as
`amended, pursuant to 5 U.S.C. 552a(m).
`A record related to an International Application filed under the Patent Cooperation Treaty in
`this system of records may bedisclosed, as a routine use, to the International Bureau of the
`World Intellectual Property Organization, pursuant to the Patent Cooperation Treaty.
`A record in this system of records may be disclosed, as a routine use, to another federal
`agencyfor purposes of National Security review (85 U.S.C. 181) and for review pursuant to
`the Atomic Energy Act (42 U.S.C. 218(c)).
`A record from this system of records may be disclosed, as a routine use, to the Administrator,
`General Services, or his/her designee, during an inspection of records conducted by GSA as
`part of that agency's responsibility to recommend improvements in records management
`practices and programs, under authority of 44 U.S.C. 2904 and 2906. Such disclosure shall
`be madein accordance with the GSA regulations governing inspection of records for this
`purpose, and any other relevant {/.e., GSA or Commerce) directive. Such disclosure shall not
`be used to make determinations about individuals.
`A record from this system of records may be disclosed, as a routine use, to the public after
`either publication of the application pursuant to 35 U.S.C. 122(b) or issuance of a patent
`pursuant to 35 U.S.C. 151. Further, a record may be disclosed, subject to the limitations of 37
`CFR 1.14, as a routine use, to the public if the record was filed in an application which
`became abandonedorin which the proceedings were terminated and which application is
`referenced by either a published application, an application open to public inspection or an
`issued patent.
`A record from this system of records may be disclosed, as a routine use, to a Federal, State,
`or local law enforcement agency, if the USPTO becomesawareofa violation or potential
`violation of law or regulation.
`
`Apple Ex. 1013, p. 3
`Apple Ex. 1013, p. 3
` Apple v. Fintiv
`Apple v.Fintiv
`IPR2020-00019
`IPR2020-00019
`
`

`

`Addtitional Page | of 1
`
`Given Name
`
`INVENTOR(S)
`Family Name
`JEONG
`
`Residence
`Yongin Si, KR
`
`Apple Ex. 1013, p. 4
`Apple Ex. 1013, p. 4
` Apple v. Fintiv
`Apple v.Fintiv
`IPR2020-00019
`IPR2020-00019
`
`

`

`Attorney Docket No P4303USPR
`
`SYSTEM AND METHODFOR PROVISIONING OVER THE AIR OF CONFIDENTIAL
`
`INFORMATION ON MOBILE COMMUNICATIVE DEVICES WITH NON-UICC SECURE
`
`ELEMENTS
`
`5
`
`CROSS REFERENCE TO RELATED APPLICATION
`
`[0001] The present application is related to co-pending U.S. provisional patent
`
`applications entitled, “SYSTEM AND METHOD FOR MANAGING MOBILE WALLET AND
`
`ITS RELATED CREDENTIALS,” “SYSTEM AND METHOD FOR SECURE
`
`CONTAINMENTOF SENSITIVE FINANCIAL INFORMATION STORED IN A MOBILE
`
`10
`
`COMMUNICATION TERMINAL,” and “SYSTEM AND METHOD FOR MANAGING OTA
`
`PROVISIONING APPLICATIONS THROUGH USE OF PROFILES AND DATA
`
`PREPARATION”filed on DEC. 30, 2010, and assigned to the assignee of the present
`
`application. Applicant hereby incorporates by reference the above-mentioned co-pending
`
`provisional application, which is not admitted to be prior art with respect to the present invention
`
`1s
`
`by its mention here or in the backgroundsection that follows.
`
`BACKGROUNDOF THE INVENTION
`
`[0002] 1. FIELD
`
`[0003] The following description relates to over-the-air provisioning of virtual cards on
`
`20
`
`mobile communicative devices with a non-Universal Integrated Circuit Card (UICC) type secure
`
`element.
`
`[0004] 2. DISCUSSION OF THE BACKGROUND
`
`[0005] With the advent of advancing mobile technology, more features have been
`
`Apple Ex. 1013, p. 5
`Apple Ex. 1013, p. 5
` Apple v. Fintiv
`Apple v.Fintiv
`IPR2020-00019
`IPR2020-00019
`
`

`

`Attorney Docket No P4303USPR
`
`integrated into the mobile devices. From GPSapplications to mobile office products, mobile
`
`communicative devices have become a necessity for everyday needs. In order to further utilize
`
`mobile technologyto better cater to consumer’s daily requirements, attempts have been made to
`
`provide for a mobile financial management system to replace conventional physical wallets.
`
`Specifically, this mobile wallet functionality was sought to be realized through provisioning of
`
`card issuer’s account information directly into a secure element of the mobile device equipped
`
`with Near Field Communication (NFC) chipset. The secure element may be a smart card chip
`
`capable of storing multiple applications, including of account specific information that may not
`
`be easily accessed by external parties. The model mobile wallet application may have the same
`
`composition as a conventional wallet, which may contain payment cards, membercards,
`
`transportation cards, and loyalty cards.
`
`[0006] Mobile wallet functionality may be further enhanced by provisioning the user
`
`financial credential onto mobile devices equipped with Near Field Communication chipset (NFC
`
`enabled). Once the user financial credentials have been provisioned onto the NFC enabled
`
`mobile device, the provisioned NFC enabled device maytransfer information or make payments
`
`to another NFC compatible device by coming near within a few centimeters of one another
`
`without physically contacting each other. This type of technology is conventionally referred to
`
`as “contactless” technology and a payment made with this technologyis referred to as
`
`“contactless” payment. Despite the numerousbenefits that are available utilizing the described
`
`technology, there has been no practical solution to provision sensitive user information to the
`
`NFC enabled mobile devices.
`
`[0007] One possible solution for provisioning mobile wallet cards is to perform the
`
`provisioning at a secure facility controlled by the mobile wallet card issuer. However,this
`
`10
`
`15
`
`20
`
`Apple Ex. 1013, p. 6
`Apple Ex. 1013, p. 6
` Apple v. Fintiv
`Apple v.Fintiv
`IPR2020-00019
`IPR2020-00019
`
`

`

`Attorney Docket No P4303USPR
`
`solution may require users to bring their mobile equipmentto the physical mobile wallet card
`
`issuer for provisioning. This process has to be repeated for every mobile wallet card the user
`
`seeks to provision at different card issuer facility, making the conceptof utilizing mobile wallet
`
`application impractical.
`
`[0008] In light of this limitation, a new system and method has been developed providing
`
`for over-the-air (OTA) provisioning. Rather than relying on provisioning at physical locations, a
`
`method for provisioning financial account information via OTA has been sought. Through
`
`technological advancement, OTA provisioning has been provided for mobile equipment with the
`
`secure element (SE) types of UICC, Services Identity Module (SIM), Universal Subscriber
`
`Identity Module (USIM)(herein referred collectively as UICC) cards via industry standard SMS-
`
`PP and BIP protocols. However, while SMS-PP and BIP protocols allow OTAprovisioning for
`
`UICC cards and their equivalents, it does not allow for OTA provisioning of MicroSD’s and
`
`Embedded SEs which do not support conventional Subscriber Identity Module Application
`
`Toolkit (SAT) / Universal Subscriber Identity Module Application Toolkit (USAT) / Card
`
`Application Toolkit (CAT) framework. As such, any mobile equipment with SE types MicroSD,
`
`Embedded SE, or any SE that does not support SMS-PP or BIP protocol may not be provisioned
`
`OTAwith the conventional technology.
`
`[0009] Further, OTA provisioning has been suggested to work preferably with a neutral
`
`third party management system, such as a trusted service manager (TSM), in an ideal
`
`20
`
`environmentto facilitate provisioning of multiple service providers. As service providers (SP)
`
`associated with the provisioned applications are often competing entities, it is preferable for the
`
`individual service provider to be able to interact with their customers without regard to other
`
`service providers or mobile network operators (MNO). In addition, because competing service
`
`Apple Ex. 1013, p. 7
`Apple Ex. 1013, p. 7
` Apple v. Fintiv
`Apple v.Fintiv
`IPR2020-00019
`IPR2020-00019
`
`

`

`providers may have security concerns as to sharing of their information to other SPs, such as
`
`credit card issuers, or MNOs, a neutral third party manageris preferred to fill this void.
`
`Attorney Docket No P4303USPR
`
`SUMMARY
`
`[0010] OTA Proxyis a mobile client which supports OTA post-issuance related services
`
`to the secure element in a mobile communicative device. While there are methods which allow
`
`for OTA provisioning without the use of OTA Proxy, these methods have beentraditionally
`
`limited to UICC cards. As SE types, Micro SD and Embedded SEs cannot support conventional
`
`SAT/SUSAT/CATframeworknecessary for conventional OTA provisioning, OTA Proxy over
`
`OTA may be used by any party to send data to mobile communicative devices with the non-
`
`UICC SE types, such as Micro SD and Embedded SE. However, if desired, OTA proxy can also
`
`provide an alternative method to provision OTA, over the conventional method, to SE devices
`
`which do support conventional SAT/SUSAT/CATframework.
`
`[0011] In addition, to facilitate reliable data transmission during the OTA provisioning
`
`process, OTA Proxy provides a retry mechanism for reliable data transmission. In the event of
`
`an error during the transmission to the server or in the case acknowledgement (ACK) from the
`
`TSM server is not received within the predefined time period, the OTA Proxyis set to retransmit
`
`the data to ensure processing of requested data. This data reliance mechanism provides another
`
`level of assurance from the service providers and requesting users that their requests will be
`
`20
`
`executed.
`
`[0012] Exemplary embodiments of the present invention provide a system to provision
`
`mobile wallet cards into various SE types utilized by the requesting mobile device.
`
`[0013] Exemplary embodiments of the present invention also provide a method for
`
`Apple Ex. 1013, p. 8
`Apple Ex. 1013, p. 8
` Apple v. Fintiv
`Apple v.Fintiv
`IPR2020-00019
`IPR2020-00019
`
`

`

`Attorney Docket No P4303USPR
`
`provisioning mobile wallet cards into various SE types utilized by the requesting mobile device.
`
`[0014] Exemplary embodiments of the present invention provide a system to install OTA
`
`Proxy application onto the mobile device.
`
`[0015] Exemplary embodiments of the present invention also provide a method for
`
`installing an OTA Proxy application onto the mobile device.
`
`[0016] Exemplary embodiments of the present invention provide a system to ensure
`
`reliable data transmission through a retry mechanism.
`
`[0017] Exemplary embodiments of the present invention provide a method to ensure
`
`reliable data transmission through a retry mechanism.
`
`[0018] Additional features of the invention will be set forth in the description which
`
`follows, and in part will be apparent from the description, or may be learned by practice of the
`
`invention.
`
`[0019] It is to be understood that both foregoing general descriptions and the following
`
`detailed description are exemplary and explanatory and are intended to provide further
`
`explanation of the invention as claimed. Other features and aspects will be apparent from the
`
`following detailed description, the drawings, and the claims.
`
`BRIEF DESCRIPTION OF THE DRAWINGS
`
`20
`
`[0020] The accompanying drawings, which are included to provide a further
`
`understanding of the invention and are incorporated in and constitute a part of this specification,
`
`illustrate embodiments of the invention, and together with the description serve to explain the
`
`principles of the invention.
`
`Apple Ex. 1013, p. 9
`Apple Ex. 1013, p. 9
` Apple v. Fintiv
`Apple v.Fintiv
`IPR2020-00019
`IPR2020-00019
`
`

`

`Attorney Docket No P4303USPR
`
`[0021] FIG. 1 is a system diagramof a prior art OTA provisioning process through SMS
`
`PP protocol.
`
`[0022] FIG. 2 is a flow diagram illustrating a method for prior art OTA provisioning
`
`process through SMSPPprotocol.
`
`[0023] FIG. 3 is a system diagram of a TSM ecosystem supporting the OTAprovisioning
`
`process through OTA proxy according to an exemplary embodimentof the present invention.
`
`[0024] FIG. 4 is a block diagram of an example TSM system,its components, andits
`
`relationship with external parties according to an exemplary embodimentof the present
`
`invention.
`
`[0025] FIG. 5 is a flow diagram illustrating steps a service provider must take in order to
`
`take advantage of the TSM architecture according to an exemplary embodiment of the present
`
`invention.
`
`[0026] FIG. 6 is a flow diagram illustrating a method of obtaining a mobile wallet
`
`application with accompanying OTA proxy application according to an exemplary embodiment
`
`of the present invention.
`
`[0027] FIG. 7 is a flow diagram illustrating a high level OTA provisioning process
`
`though OTA proxy according to an exemplary embodimentof the present invention.
`
`[0028] FIG. 8 is a flow diagram illustrating in detail a method of verifying SE types and
`
`status as required to provision into various types of SEs according to an exemplary embodiment
`
`20
`
`of the present invention.
`
`[0029] FIG. 9 is a system diagram depicting mobile equipmentthat has installed a mobile
`
`wallet application, accompanying OTA Proxy application and wallet management applet, and
`
`payment applets according to an exemplary embodimentof the present invention.
`
`Apple Ex. 1013, p. 10
`Apple Ex. 1013, p. 10
` Apple v. Fintiv
`Apple v.Fintiv
`IPR2020-00019
`IPR2020-00019
`
`

`

`[0030] FIG. 10 is a flow diagramillustrating operation of a retry mechanism to ensure
`
`reliable data transmission according to an exemplary embodimentof the present invention.
`
`Attorney Docket No P4303USPR
`
`DETAILED DESCRIPTION OF THE ILLUSTRATED EMBODIMENTS
`
`[0031] The invention is described more fully hereinafter with references to the
`
`accompanying drawings, in which exemplary embodiments of the invention are shown. This
`
`invention may, however, be embodied in many different forms and should not be construed as
`
`limited to the embodiments set forth herein. Rather, these exemplary embodiments are provided
`
`so that this disclosure is thorough, and will fully convey the scope of the invention to those
`
`skilled in the art. In the drawings, the size and relative sizes of layers and regions may be
`
`exaggerated for clarity. Like reference numerals in the drawings denote like elements.
`
`[0032] FIG. 1 and 2 are a system diagram and corresponding flow diagram illustrating a
`
`method for OTA provisioning to mobile equipment as disclosed by priorart. Specifically, the
`
`referenced figures will provide for OTA provisioning via SMS PP protocol.
`
`[0033] Typically, before the request is made to provision a mobile device, it is assumed
`
`that that the MNO hasalready registered all of its information including OTA key information in
`
`step 101 in an offline batch process. Once MNOregisters all of the necessary information,
`
`mobile device may be ready for provisioning.
`
`[0034] To begin the provisioning process, a user makes a request to provision a mobile
`
`20
`
`wallet card to a Financial Institution (FI) 18, in step 102. Then, the FI 18 will process the request
`
`and send the request along with necessary identifiers, such as MSISDN along with provisioning
`
`data, to the TSM 10 for provisioning in step 103. In step 104, TSM 10 will process the request
`
`from the requesting FI 18 with the attributes provided by MNO 19 in step 101 for the requesting
`
`Apple Ex. 1013, p. 11
`Apple Ex. 1013, p. 11
` Apple v. Fintiv
`Apple v.Fintiv
`IPR2020-00019
`IPR2020-00019
`
`

`

`Attorney Docket No P4303USPR
`
`user, and sends the provisioning command to MNO OTAserver 16 in step 105. MNO OTA
`
`Server 16 will then relay the provisioning command directly to the Mobile Equipment (ME) 11
`
`directly via SMS-PP protocol in step 106. MNO OTAServer 16 and MNO 19 may be owned by
`
`the sameentity but illustrated as two different entities to show the different functions performed
`
`by the individual elements. More specifically, MNO 19 is shown only in step 101 to illustrate the
`
`pre-registration step that is performed by the MNO 19. Once registered, MNO OTAserver
`
`primarily interacts with the ME11 to provision the information provided by FI 18. Lastly, in
`
`step 107 ME 11 receives the message and performsthe provisioning process into its SE (e.g.
`
`USIM,SIM, UICC).
`
`[0035] FIG. 3 is a system diagram of a TSM ecosystem supporting the OTA provisioning
`
`process through OTA proxy according to an exemplary embodimentof the present invention.
`
`[0036] As shownin FIG. 3, an example system employing TSM technology with OTA
`
`proxy provisioning includes a TSM system 10; mobile equipment 11; network 14; financial
`
`institution 18; MNO 19; handset manufacturer 20; card manufacturer 21. Before TSM system
`
`may befully utilized by the user andits participants, service providers (SP) such as identified in
`
`18 — 21 typically go through a pre-registration process such as that outlined in FIG.5.
`
`[0037] The handset manufacturers 20 may include embedded SE producer, and card
`
`manufacturers 21 may include producers of micro SD SE. As different SE manufacturer may
`
`provide for a different OTA keys than UICC SEdevices, handset manufacturers 20 and card
`
`20
`
`manufacturers 21 may provide their OTA keys to their respective devices in the pre-registration
`
`process mentioned above.
`
`[0038] Exemplary embodiments of the invention provide for OTA proxy to be connected
`
`with TSM system only during usageasit will conserve technical resources. As such, OTA proxy
`
`Apple Ex. 1013, p. 12
`Apple Ex. 1013, p. 12
` Apple v. Fintiv
`Apple v.Fintiv
`IPR2020-00019
`IPR2020-00019
`
`

`

`Attorney Docket No P4303USPR
`
`will be in a sleep mode as a default until it is awakenforits utility. To provide for an awakening
`
`mechanism,a third party messaging platform (e.g. C2DM) may be utilized to wake the OTA
`
`proxy, which in turn will connect with the TSM system for usage. When TSM system sends a
`
`message to a push message server with the wake up command and identifying information, the
`
`push message server in turn sends a messageto the identified mobile device to wake up OTA
`
`proxy residing within the mobile device. Once awake, OTA proxy will collect the mobile device
`
`and SE information and connect to the TSM system for provisioning orotherutility.
`
`[0039] Finally, once the mobile equipment 11 has been provisioned with contactless card
`
`applets and is NFC enabled, an owner of the mobile equipment may make a purchase at the NFC
`
`enabled Point-of-Sale (POS) merchant by waving the NFC enabled mobile device at the
`
`corresponding NFC enabled POS device. Subsequently, once a purchase is made with the NFC
`
`enabled mobile device, the acquirer network and payment processor work together to ensure the
`
`payment gets updated at the financial institution 18. This end user application, however, does
`
`not involve the described TSM ecosystem andis illustrated to provide a description of a
`
`complete ecosystem.
`
`[0040] Further, a TSM system may include multiple components for moreefficient
`
`processing. FIG. 4 is a system diagram illustrating a TSM system andits relationship to external
`
`parties according to an exemplary embodimentof the present invention.
`
`[0041] A TSM system 10 may be comprised of a Card & Application Management
`
`20
`
`System (CAMS) 21; Key Management System (KMS) 22; Post Issuance Processor (PIP) 23;
`
`Customer Care, Billing, Participant System (CBPS) 24; Wallet Management System (WMS) 25;
`
`OM&A 31; and External System Interface (EST) 32.
`
`[0042] Component CAMS 21 may be responsible for managinglife cycle of SE, SD, and
`
`Apple Ex. 1013, p. 13
`Apple Ex. 1013, p. 13
` Apple v. Fintiv
`Apple v.Fintiv
`IPR2020-00019
`IPR2020-00019
`
`

`

`Attorney Docket No P4303USPR
`
`applets. Life cycle refers to the various status of the respective device or application. In an
`
`example, life cycle of a SE mayinclude OS Native,initialized, and secured. Life cycle of an
`
`applet may include lock and unlock. Someofthe functionalities offered by the CAMS 21 will be
`
`management of SE type, SE profile, SE ID, application profile, and card profile. Each SEis
`
`identified individually and controlled by CAMS 21 with its own SE ID (CRN, CIN, CPLC,
`
`CSN).
`
`[0043] Component KMS 22 mayberesponsible for all of key managementfor allowing
`
`secure transactions. This may include secure log in, access control, audit, key profile
`
`management, key management, key profile exchange and recovery, and delegated management.
`
`[0044] ComponentPIP 23 is primarily responsible for provisioning information into the
`
`mobile handset, which may include preparation of data to be provisioned andthe actual
`
`execution of sending and receiving provisioning messages provided in Application Protocol Data
`
`Units (APDU).
`
`[0045] Component CBPS 24 may be responsible for customer management. It may keep
`
`customer accountstatus as well as link data once SP requests service subscription. The CBPS 24
`
`may modify the status of the SPs related to the customeras specified events occur(e.g. stolen
`
`handset) or as requested by the SP.
`
`[0046] Component WMS25 may be responsible for managementof wallet application
`
`and its associated mobile card widgets stored therein. This component may provide a mobile ID
`
`20
`
`to associate the wallet application stored in the user’s mobile equipment as well as all of the
`
`individual widgets stored in the wallet application.
`
`In addition, this component will store any of
`
`the user preferences made by the wallet owner(e.g. language, font, default card, etc.). This
`
`system may hold the master configuration which may provide synchronization benefit for the
`
`10
`
`Apple Ex. 1013, p. 14
`Apple Ex. 1013, p. 14
` Apple v. Fintiv
`Apple v.Fintiv
`IPR2020-00019
`IPR2020-00019
`
`

`

`Attorney Docket No P4303USPR
`
`wallet application. This particular component may reside within the TSM system or separately
`
`as deemed necessary.
`
`[0047] Component OM&A 31 maybe responsible for providing an interface for external
`
`managers to access TSM directly.
`
`In instances where an external party desires to enterin data or
`
`modify certain items directly, the designated personnel whohassecurity access to the system
`
`may access the TSM system via OM&A 31 to make the necessary modifications.
`
`[0048] Component ESI 32 may providefor an interface for all external parties to send
`
`and receive data. As external parties may have specific protocol they utilize, ESI 32 has the
`
`capability to translate commandsand requests arriving or leaving the TSM system as necessary.
`
`[0049] The described TSM system is a third party entity positioned to consolidateall of
`
`the information from various service providers (SP) including, Financial institutions, MNOs,
`
`Handset Manufacturers, and Card Manufacturers. As TSM holdsall of the information from
`
`various parties, the mobile equipment need only to interact with the TSM system rather than
`
`various discrete entities. In sum, the described TSM system acts as an integration point for all of
`
`the external parties the mobile equipment may haveto deal with, providing for a seamless and
`
`more efficient operation of mobile services.
`
`[0050] FIG. 5 illustrates a pre-registration process that may take place before
`
`provisioning services into the mobile equipment according to an exemplary embodimentof the
`
`invention. In an example, SPs mayfirst register their information into the TSM system for use
`
`20
`
`by the TSM system. A SP may be any entity that seeks to provision its services onto the end
`
`mobile equipment.
`
`[0051] In step 301, SPs’ information has beenregistered into the TSM system. This
`
`process may be achieved by various methods. For example, the SP may send an encrypted email
`
`11
`
`Apple Ex. 1013, p. 15
`Apple Ex. 1013, p. 15
` Apple v. Fintiv
`Apple v.Fintiv
`IPR2020-00019
`IPR2020-00019
`
`

`

`Attorney Docket No P4303USPR
`
`with basic registration information along with PGP public key. Registration may be achieved in
`
`person, by phone, through an automated system or any other method available to exchange
`
`information. TSM administrator may then enter SP’s basic information into the TSM system and
`
`provide a unique SP ID, transport key ID, and the participant type (MNO,service provider, SE
`
`manufacturer, application). TSM administrator may be a person, an automated system, or a
`
`separate entity. Afterwards, TSM system maycreates a participant account and generate secure
`
`token for the correlating SP ID. Oncethat is accomplished, TSM encrypts the SP account
`
`information in an encrypted email to send to the requesting SP.
`
`[0052] In step 302, a transport key is exchanged between the TSM system and the SP.
`
`Transport key serves to provide secure transmission of sensitive data between various parties.
`
`Such security may be provided through encryption, cryptographic transformation of data through
`
`Message Authentication Code (MAC), or other conventional security measures. The SP requests
`
`transport key sets to the TSM system. The TSM checks for duplicate keys assigned to the
`
`requesting SP, and if no such key has been assigned, then TSM generates transport key sets
`
`inside a Hardware Security Module (HSM).
`
`In an example, transport key sets may include three
`
`numbered keys including an encryption key (ENC), data encryption key (DEK), and me

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket