throbber

`UNITED STATES PATENT AND TRADEMARK OFFICE
`
`
`
`BEFORE THE PATENT TRIAL AND APPEAL BOARD
`
`
`
`SAMSUNG ELECTRONICS AMERICA, INC. and
`SAMSUNG ELECTRONICS CO., LTD.
`Petitioners,
`
`v.
`
`RFCYBER CORP.,
`Patent Owner.
`
`
`
`U.S. Patent No. 9,240,009 to Koh et al.
`
`IPR Case No. IPR2021-00981
`
`
`
`
`
`PETITION FOR INTER PARTES REVIEW
`OF CLAIMS 1-17 OF U.S. PATENT NO. 9,240,009
`
`

`

`TABLE OF CONTENTS
`BACKGROUND ............................................................................................. 1 
`I. 
`II.  MANDATORY NOTICES UNDER 37 C.F.R. § 42.8(a)(1) FOR INTER
`PARTES REVIEW ........................................................................................... 2 
`A. 
`Real Party in Interest Under 37 C.F.R. § 42.8(b)(1) ............................. 2 
`B. 
`Related Matters Under 37 C.F.R. § 42.8(b)(2) ..................................... 2 
`C. 
`Lead and Backup Counsel Under 37 C.F.R. § 42.8(b)(3) and Service
`Information under 37 C.F.R. § 42.8(b)(4) ............................................. 4 
`PAYMENT OF FEES UNDER 37 C.F.R. § 42.15 ......................................... 5 
`III. 
`IV.  CERTIFICATION OF WORD COUNT UNDER 37 C.F.R. § 42.24(D) ....... 5 
`V. 
`REQUIREMENTS FOR IPR UNDER 37 C.F.R. § 42.104 ............................ 5 
`A.  Grounds for Standing Under 37 C.F.R. § 42.104(a) ............................. 5 
`B. 
`Identification of Challenge Under 37 C.F.R. § 42.104(b) and Relief
`Requested .............................................................................................. 5 
`VI.  THE ’009 PATENT ......................................................................................... 6 
`A.  Overview ............................................................................................... 6 
`B. 
`Effective Filing Date ............................................................................. 6 
`C. 
`’009 Patent’s Prosecution ...................................................................... 6 
`VII.  PETITIONERS’ GROUNDS ARE NEW AND DISCRETIONARY
`DENIAL IS UNWARRANTED UNDER GENERAL PLASTIC & FINTIV .. 7 
`General Plastic ...................................................................................... 8 
`A. 
`Fintiv ...................................................................................................... 9 
`B. 
`VIII.  PERSON OF ORDINARY SKILL IN THE ART (“POSITA”) ................... 10 
`IX.  CLAIM CONSTRUCTION .......................................................................... 11 
`X.  OVERVIEW OF PRIOR ART ...................................................................... 11 
`A.  Dua ...................................................................................................... 11 
`B. 
`GlobalPlatform .................................................................................... 12 
`Smart Card Handbook ........................................................................ 14 
`C. 
`D. 
`Thibadeau ............................................................................................ 15 
`XI.  DETAILED ANALYSIS ............................................................................... 16 
`A.  Ground 1: Dua in view of GlobalPlatform render obvious claims 1-6
`and 13-17 ............................................................................................. 16 
`
`i
`
`

`

`B. 
`
`The scope and content of the prior art ...................................... 16 
`1. 
`2.  Motivation/Rationale for Combining the Prior Art .................. 16 
`3. 
`Application of Prior Art to Claims 1-6 and 13-17 .................... 18 
`Ground 2: Dua in view of GlobalPlatform and Smart Card Handbook
`render obvious claims 7-10 ................................................................. 54 
`1. 
`The scope and content of the prior art ...................................... 54 
`2.  Motivation/Rationale for Combining the Prior Art .................. 54 
`3. 
`Application of Prior Art to Claims 7-10 ................................... 56 
`Ground 3: Dua in view of GlobalPlatform, Smart Card Handbook,
`and Thibadeau renders obvious claims 11 and 12 .............................. 63 
`1. 
`The scope and content of the prior art ...................................... 63 
`2.  Motivation/Rationale for Combining the Prior Art .................. 64 
`XII.  CONCLUSION .............................................................................................. 66 
`
`
`
`C. 
`
`ii
`
`

`

`CLAIM 1:
`
`CLAIM LISTING
`
`
`[1.PREAMBLE] A mobile device for conducting a secured transaction over a
`
`network, the mobile device comprising:
`
`[1a] a network interface;
`
`[1b] an interface to receive a secure element;
`
`[1c] a memory space for storing at least a module and an application
`
`downloaded from the network;
`
`[1d] a processor coupled to the memory space and configured to execute the
`
`module to perform operations including:
`
`[1di] sending to a server via the network interface an identifier
`
`identifying the application together with device information of a
`
`secure element, [1dii] wherein the application is downloaded from the
`
`network in the mobile device;
`
`[1diii] establishing a secured channel between the secure element and
`
`the server using a key set installed on the secure element, [1div]
`
`wherein the server is configured to prepare data necessary for the
`
`application to function as designed on the mobile device; and
`
`[1dv] receiving the data from the server to associate the application
`
`with the secure element, [1dvi] wherein the application subsequently
`
`iii
`
`

`

`functions in conjunction with the secure element.
`
`CLAIM 2:
`
`The mobile device as recited in claim 1, wherein the data received in the mobile
`
`device includes an application key set for the application, and a user interface
`
`specifically designed for the mobile device.
`
`CLAIM 3:
`
`The mobile device as recited in claim 2, wherein the mobile device is a near field
`
`communication (NFC) enabled mobile phone, and the application is an electronic
`
`purse (e-purse), the mobile device is used to exchange secured data with another
`
`device within a near distance to conduct a transaction.
`
`CLAIM 4:
`
`The mobile device as recited in claim 3, wherein the secured data is being
`
`exchanged over a secured channel between the mobile device and the another
`
`device established by the application key set.
`
`CLAIM 5:
`
`The mobile device as recited in claim 4, wherein the transaction is conducted
`
`without the mobile device communicating with a transaction server.
`
`CLAIM 6:
`
`[6.PREAMBLE] The mobile device as recited in claim 1, [6a] wherein said
`
`sending to a server via the network interface an identifier identifying the
`
`iv
`
`

`

`application together with device information of a secure element comprises:
`
`[6bi] determining whether the secure element has been personalized with a
`
`Trusted Service Management (TSM) system, [6bii] wherein the TSM system
`
`is a collection of services configured to distribute and manage contactless
`
`services for customers signed up with the TSM, and provide data exchanges
`
`among different parties to make electronic commerce possible over a
`
`wireless network; and
`
`[6ci] performing a personalization process for the secure element when the
`
`secure element has not been personalized with the Trusted Service
`
`Management (TSM) system, [6cii] wherein the secure element when
`
`personalized establishes a security platform for the application to run on the
`
`mobile device.
`
`CLAIM 7:
`
`[7.PREAMBLE] The mobile device as recited in claim 6, wherein the
`
`personalization process comprises:
`
`[7a] causing the mobile device to initiate data communication with a server
`
`in the TSM system;
`
`[7bi] retrieving device information of the secure element in responding to a
`
`request from the TSM server after the TSM server determines that the secure
`
`element is registered therewith, [7bii] wherein the device information is a
`
`v
`
`

`

`sequence of characters uniquely identifying the secure element;
`
`[7ci] receiving at least a set of keys from the TSM server, [7cii] wherein the
`
`keys are generated in the TSM server in accordance with the device
`
`information of the secure element; and
`
`[7d] storing the set of keys in the secure element to facilitate a subsequent
`
`transaction with the secure element in the computing device.
`
`CLAIM 8:
`
`The mobile device as recited in claim 7, wherein the device information includes
`
`an identifier of the secure element, manufacturer information and a batch number.
`
`CLAIM 9:
`
`The method as recited in claim 8, wherein part of the data is used to facilitate the
`
`server to remotely manage the application.
`
`CLAIM 10:
`
`The mobile device as recited in claim 7, wherein the secure element is embedded
`
`in the mobile device and integrated with the mobile device via the interface.
`
`CLAIM 11:
`
`The mobile device as recited in claim 7, wherein the secure element is a software
`
`module installed in a secure memory space only accessible by a distributor of the
`
`secure element.
`
`vi
`
`

`

`CLAIM 12:
`
`The mobile device as recited in claim 11, wherein some components are updated
`
`when the secure element is upgraded by the distributor.
`
`CLAIM 13:
`
`[13.PREAMBLE] The mobile device as recited in claim 1, wherein the operations
`
`further comprises:
`
`[13a] receiving a message from a distributor of the application, the message
`
`including an identifier identifying the application;
`
`[13b] verifying that the message is indeed from the distributor;
`
`[13c] disassociating the application with the secure element in responding to
`
`a confirmation from the distributor after the message has been verified and
`
`was indeed from the distributor; and
`
`[13d] notifying the distributor that the application installed in the mobile
`
`device is no longer active.
`
`CLAIM 14:
`
`[14.PREAMBLE] A mobile device for conducting a secured transaction over a
`
`network, the mobile device comprising:
`
`[14a] a network interface;
`
`[14b] a secure element;
`
`[14c] a memory space for storing various modules downloaded from the network,
`
`vii
`
`

`

`each of the modules configured to provide an application or a service to a user of
`
`the mobile device;
`
`[14d] a processor coupled to the memory space and configured to execute an
`
`embedded module to perform operations including:
`
`[14di] provisioning each of the modules, wherein said provisioning each of
`
`the modules with a distributor comprises:
`
`[14dii] sending to a server via the network interface an identifier
`
`identifying the each of the modules together with device information
`
`of the secure element, [14diii] wherein the each of the modules is
`
`downloaded from the network in the mobile device;
`
`[14div] establishing a secured channel between the secure element
`
`and the server using a key set installed on the secure element, wherein
`
`the server is configured to prepare data necessary for the each of the
`
`modules to function as designed on the mobile device; and
`
`[14dv] receiving the data from the server to associate the each of the
`
`modules with the secure element, wherein the data includes a set of
`
`keys generated for the each of the modules, wherein the each of the
`
`modules subsequently functions in conjunction with the secure
`
`element.
`
`viii
`
`

`

`CLAIM 15:
`
`[15.PREAMBLE] The mobile device as recited claim 14, wherein the operations
`
`further comprise:
`
`[15a] receiving a message from a distributor of one of the modules, the
`
`message including an identifier identifying the one of the modules;
`
`[15b] verifying that the message is authenticated;
`
`[15c] disassociating the one of the modules with the secure element in
`
`responding to a confirmation from the distributor after the message has been
`
`verified and was indeed from the distributor; and
`
`[15d] notifying the distributor that the one of the modules installed in the
`
`mobile device is no longer active.
`
`CLAIM 16:
`
`The mobile device as recited claim 14, wherein the mobile device includes a
`
`display configured to display a user interface showing some of the modules that are
`
`still provisioned and active, each of the modules is configured to show another user
`
`interface particularly designed for the display of the mobile device when the each
`
`of the modules is activated by a user.
`
`CLAIM 17:
`
`The mobile device as recited claim 16, wherein the secure element must be
`
`personalized before each of the modules is provisioned, each of the provisioned
`
`ix
`
`

`

`modules is associated with the personalized secure element and a key set generated
`
`in accordance with a key set of the secure element.
`
`
`
`
`
`
`
`x
`
`

`

`PETITIONERS’ EXHIBIT LIST
`
`
`Exhibit No. Description
`
`1001
`
`1002
`
`1003
`
`1004
`
`1005
`
`1006
`
`1007
`
`1008
`
`1009
`
`1010
`
`1011
`
`1012
`
`1013
`
`U.S. Patent No. U.S. 9,240,009 (the “’009 patent”)
`
`File History of U.S. Patent No. 8,118,218 (“’218 FH”)
`
`Declaration of Gerald Smith Regarding Invalidity of U.S. Patent
`No. 8,118,218
`
`U.S. Patent Application Publication No. 2006/0165060 (“Dua”)
`
`Defendants’ Contingent Election Regarding Invalidity Defenses,
`RFCyber Corp. v. Samsung Electronics Co., Ltd. et al., 2:20-cv-
`00335 (E.D. Tex.) (Dkt. 60) (filed June 8, 2021).
`
`GlobalPlatform Card Specification Version 2.1.1 (March 2003)
`(“GlobalPlatform” or “GP”)
`
`File History of U.S. Patent No. 8,448,855 (“’855 FH”)
`
`Smart Card Handbook Third Edition, by Wolfgang Rankl and
`Wolfgang Effing (2003)
`
`Common Electronic Purse Specifications, Technical
`Specification Version 2.3 (March 2001)
`
`SmartMX, P5CD009 Secure Dual Interface PKI Smart Card
`Controller, Short Form Specification (Rev. 1.0 – 2004 March 26)
`
`SmartMX, P5CD036 Secure Dual Interface PKI Smart Card
`Controller, Short Form Specification (Rev. 1.0 – 2004 March 26)
`
`SmartMX, P5CT072 Secure Dual Interface PKI Smart Card
`Controller, Short Form Specification (Rev. 1.3 – 4 October
`2004)
`
`Mifare proX, P8RF6016 Secure Dual Interface Smart Card IC,
`Short Form Specification (Revision 1.0 – November 2003)
`
`xi
`
`

`

`Exhibit No. Description
`
`1014
`
`1015
`
`1016
`
`1017
`
`1018
`
`1019
`
`1020
`
`1021
`
`1022
`
`1023
`
`1024
`
`1025
`
`1026
`
`1027
`
`1028
`
`1029
`
`ETSI TS 102 226 V6.12.0 (2005-09), “Smart cards; Remote
`APDU structure for UICC based applications (Release 6)”
`
`Wenninger et al., “The Electronic Purse,” in Current Issues in
`Economics and Finance, Volume 1, Number 1, Federal Reserve
`Bank of New York (April 1995).
`
`RESERVED
`
`Excerpt from Cambridge Business English Dictionary
`
`U.S. Patent No. 6,983,882
`
`RFID Handbook – Radio-Frequency Identification Fundamentals
`and Applications, Klaus Finkenzeller, John Wiley & Son, Ltd.
`(1999)
`
`RESERVED
`
`ISO/IEC 7816-4:1995 Interindustry commands for interchange
`(May 1995)
`
`U.S. Government General Services Administration (GSA) Smart
`Card Handbook (FEB 2004)
`
`“Here Comes The Wallet Phone,” IEEE Spectrum, November
`2005
`
`File History of U.S. Patent No. 9,189,787 (“’787 FH”)
`
`RESERVED
`
`RFC 3261, SIP: Session Initiation Protocol, The Internet Society
`(June 2002).
`
`RESERVED
`
`RESERVED
`
`RESERVED
`
`xii
`
`

`

`Exhibit No. Description
`
`RESERVED
`
`RESERVED
`
`RESERVED
`
`RESERVED
`
`RESERVED
`
`RESERVED
`
`RESERVED
`
`RESERVED
`
`RESERVED
`
`U.S. Patent Application Publication No. 2006/0196931
`
`Declaration of Sylvia Hall-Ellis, Ph.D.
`
`U.S. Patent Application Publication No. 2006/0174352
`(“Thibadeau”)
`
`File history of U.S. Patent No. 9,240,009 (“’009 FH”)
`
`U.S. Patent No. 9,189,787
`
`1030
`
`1031
`
`1032
`
`1033
`
`1034
`
`1035
`
`1036
`
`1037
`
`1038
`
`1039
`
`1040
`
`1041
`
`1042
`
`1043
`
`
`
`
`xiii
`
`

`

`Patent No. 9,240,009
`IPR2021-00981
`Samsung Electronics America, Inc. and Samsung Electronics Co., Ltd. hereby
`
`Petition Requesting Inter Partes Review
`
`
`
`seek inter partes review of claims 1-17 (“the Challenged Claims”) of U.S. Patent
`
`No. 9,240,009. Ex-1001 (the “’009 patent”).
`
`I.
`
`BACKGROUND
`The ’009 patent proclaims that “the present invention is related to techniques
`
`for personalizing a secure element and provisioning an application such as an
`
`electronic purse that can be advantageously used in portable devices” for use in
`
`conducting commercial transactions. Ex-1001, 1:18-24. One concern that the ’009
`
`patent purportedly addressed was “concerns in the NFC mobile ecosystem” about
`
`security. Id., 2:9-10. The patent states that “there is a need to provide techniques to
`
`personalize a secure element in a contactless smart card or an NFC enabled mobile
`
`device so that such a device is so secured and personalized when it comes to financial
`
`applications or secure transactions.” Id., 2:10-14. The “secure element” (SE) in the
`
`patent “may be in form of a smart card.” Id., 6:45, 6:58-62. Processes for installing,
`
`personalizing, and removing applications from “secure elements” are claimed. Ex-
`
`1001, cl.1, 6 (personalizing application), 13 (removing application); Ex-1003, ¶¶30-
`
`37.
`
`The problem is that the examiner was unaware of Dua, which discloses
`
`“embedded smart card[s]” in wireless devices that can have “mini-programs” called
`
`“extensions” stored on the card for performing a variety of financial transactions,
`
`1
`
`

`

`Patent No. 9,240,009
`IPR2021-00981
`like paying for subway fare. Ex-1004, ¶¶[0289]-[0295]. The examiner was also not
`
`Petition Requesting Inter Partes Review
`
`
`
`presented with an industry standard for performing operations on smart cards called
`
`“GlobalPlatform” which describes how to do what the patent alleges was the
`
`invention: personalizing and securing a smart card. Ex-1006, pp.51-103(§§6-8)
`
`(describing “Card Manager,” “Security Domains” including use of same for
`
`“Personalization Support,” and “Secure Communication”); Ex-1003, ¶¶46-50. As
`
`shown below, the challenged claims would not have issued had the examiner known
`
`of the references applied herein.
`
`II. MANDATORY NOTICES UNDER 37 C.F.R. § 42.8(A)(1) FOR INTER
`PARTES REVIEW
`A. Real Party in Interest Under 37 C.F.R. § 42.8(b)(1)
`The real parties-in-interest in this petition are Samsung Electronics America,
`
`Inc. and Samsung Electronics Co., Ltd.
`
`B. Related Matters Under 37 C.F.R. § 42.8(b)(2)
`Petitioners identify the following related matters:
`
` RFCyber Corp. v. Google LLC et al., 2:20-cv-00274 (E.D. Tex.) (the
`
`“Google case”);
`
` RFCyber Corp v. LG Electronics, Inc., 2:20-cv-00336 (E.D. Tex.);
`
` RFCyber Corp. v. Samsung Electronics Co., Ltd. et al., 2:20-cv-00335
`
`(E.D. Tex.) (the “Samsung case”);
`
` Google LLC v. RFCyber Corp., PGR2021-00028 and -00029
`
`2
`
`

`

`Patent No. 9,240,009
`IPR2021-00981
`concerning U.S. Patent No. 10,600,046;
`
`
`
`Petition Requesting Inter Partes Review
`
` Google LLC v. RFCyber Corp., IPR2021-00954 concerning the ’855
`
`patent;
`
` Google LLC v. RFCyber Corp., IPR2021-00955 concerning U.S. Patent
`
`No. 9,189,787;
`
` Google LLC v. RFCyber Corp., IPR2021-00956 concerning U.S. Patent
`
`No. 9,240,009; and
`
` Google LLC v. RFCyber Corp., IPR2021-00957 concerning U.S. Patent
`
`No. 8,118,218.
`
`Petitioners are aware that certain patent applications claiming the benefit of
`
`one or more patents related to the challenged patent remain pending before the Patent
`
`Office including at least the following applications: 13/782,948, 16/234,587, and
`
`17,316,688.
`
`Petitioners are a party to the Samsung case, which is in its earliest stages: a
`
`scheduling conference occurred on May 12 and RFCyber’s Infringement
`
`Contentions were served that day. Discovery has just begun. Petitioners are not a
`
`party to any of the other proceedings identified above; however, the Samsung case
`
`has been consolidated with the Google case for pretrial purposes.
`
`Petitioners have filed IPR Petitions against related family members to the ’009
`
`patent, including against U.S. Patent Nos. 8,118,218 (“the ’218 patent”), 8,448,855
`
`3
`
`

`

`Patent No. 9,240,009
`IPR2021-00981
`(“the ’855 patent”), and 9,189,787 (“the ’787 patent”), all of which are asserted in
`
`Petition Requesting Inter Partes Review
`
`
`
`the Samsung case. See IPR2021-00978, -00979, -00980.
`
`The undersigned is unaware of any other judicial or administrative matter that
`
`would affect, or be affected by, a decision in the proceeding.
`
`C. Lead and Backup Counsel Under 37 C.F.R. § 42.8(b)(3) and Service
`Information under 37 C.F.R. § 42.8(b)(4)
`Petitioners designate the following lead and backup counsel:
`
`Lead Counsel
`Heath J. Briggs (Reg. No. 54,919)
`Greenberg Traurig, LLP
`1144 15th St. Suite 3300
`Denver, CO 80202
`Telephone: 303-685-7418
`Facsimile: 720-904-6118
`BriggsH@gtlaw.com
`Backup Counsel
`Allan A. Kassenoff (pro hac vice
`forthcoming)
`Greenberg Traurig, LLP
`200 Park Avenue
`New York, NY 10166
`Telephone: (212) 801-9200
`Facsimile: (212) 801-6400
`KassenoffA@gtlaw.com
`
`Backup Counsel
`Andrew R. Sommer (Reg. No. 53,932)
`Greenberg Traurig, LLP
`1750 Tysons Boulevard
`McLean, VA 22102
`Telephone: 703-749-1370
`Facsimile: 703-749-1301
`SommerA@gtlaw.com
`Backup Counsel
`Jeffrey R. Colin
`forthcoming)
`Greenberg Traurig, LLP
`200 Park Avenue
`New York, NY 10166
`Telephone: (212) 801-9200
`Facsimile: (212) 801-6400
`ColinJ@gtlaw.com
`
`(pro hac vice
`
`Service on Petitioners may be made by mail or hand delivery to: Greenberg Traurig,
`
`LLP, 1144 15th St., Suite 3300, Denver, CO 80202. Petitioners also consent to and
`
`prefers electronic service by emailing Samsung-RFCyber-iprs@gtlaw.com and
`
`counsel of record (shown above).
`
`4
`
`

`

`Patent No. 9,240,009
`IPR2021-00981
`III. PAYMENT OF FEES UNDER 37 C.F.R. § 42.15
`Petitioners authorize the U.S. Patent & Trademark Office to charge Deposit
`
`Petition Requesting Inter Partes Review
`
`
`
`Account No. 50-2638 for the fee set in 37 C.F.R. § 42.15(a) for this Petition and
`
`further authorizes for any additional fees to be charged to this Deposit Account.
`
`IV. CERTIFICATION OF WORD COUNT UNDER 37 C.F.R. § 42.24(D)
`Petitioners certify that the word count in this Petition is 13,273 words, as
`
`counted by the word-processing program Microsoft Word for Office 365 used to
`
`generate this Petition, where such word count excludes the table of contents, table
`
`of authorities, mandatory notices, certificate of service, appendix of exhibits, and
`
`this certificate of word count. This Petition is in compliance with the 14,000 word
`
`limit set forth in 37 C.F.R. § 42.24(a)(1)(i).
`
`V. REQUIREMENTS FOR IPR UNDER 37 C.F.R. § 42.104
`A. Grounds for Standing Under 37 C.F.R. § 42.104(a)
`Petitioners certify that the ’009 patent is available for inter partes review, and
`
`that Petitioners are not barred or estopped from requesting an IPR on the grounds
`
`identified herein.
`
`B. Identification of Challenge Under 37 C.F.R. § 42.104(b) and Relief
`Requested
`Petitioners present the following grounds and requests that the challenged
`
`claims be canceled:
`
`5
`
`

`

`Patent No. 9,240,009
`IPR2021-00981
`Ground Challenged Claim(s) Prior Art
`
`
`
`Petition Requesting Inter Partes Review
`
`Basis
`
`§103
`
`§103
`
`§103
`
`1
`
`2
`
`3
`
`1-6, 13-17
`
`7-10
`
`11-12
`
`Dua (Ex-1004) and
`GlobalPlatform (Ex-1006)
`
`Dua, GlobalPlatform, and Smart
`Card Handbook (Ex-1008)
`
`Dua, GlobalPlatform, Smart Card
`Handbook, and Thibadeau (Ex-
`1041)
`
`VI. THE ’009 PATENT
`A. Overview
`An overview of the ’009 patent is given in Section I.
`
`B. Effective Filing Date
`To resolve Petitioners’ challenge, the Board may presume that the effective
`
`filing date of the ’009 patent is September 24, 2006, even though that date is
`
`doubtful.
`
`C. ’009 Patent’s Prosecution
`The ’009 patent is a continuation-in-part of two earlier-filed applications. Ex-
`
`1001, cover. The references cited by the examiner during prosecution of the earlier-
`
`filed applications and the application leading to the ’009 patent are not used herein.
`
`While the ’009 patent briefly references “a global platform,” and “a Global Platform
`
`(GP) card manager,” Ex-1001, 15:39-40, 18:20, it cribs numerous concepts from the
`
`prior art GlobalPlatform standards and fails to add non-obvious modifications to the
`
`6
`
`

`

`Patent No. 9,240,009
`IPR2021-00981
`cribbed material. Although Applicants drew heavily from GlobalPlatform, they
`
`Petition Requesting Inter Partes Review
`
`
`
`never provided a copy to the Patent Office.
`
`A significant issue during prosecution was whether the claims were entitled
`
`to either parent applications’ filing date. Ex-1044, pp.140-142, 168-170, 179-182,
`
`205-208. The examiner ultimately agreed with Applicant that the claims were
`
`entitled to a filing date of April 23, 2007. Ex-1044, p.214. The examiner then
`
`rejected the claims as being obvious over publications to Labrou and Rackley. Id.,
`
`pp.215-222. Applicants distinguished Labrou because Labrou’s use of a phone
`
`number to conduct a secure transaction was not the same as using “multiple
`
`identifiers” to identify “multiple applications . . . running on the mobile device” and
`
`because Labrou was “silent about a secure element in a mobile device.” Ex-1044,
`
`pp.239-240. Applicants also argued that Rackley did not disclose “provisioning an
`
`installed application with a secure element.” Ex-1044, p.240. This led to allowance
`
`of the claims. Id., pp.252-254.
`
`VII. PETITIONERS’ GROUNDS ARE NEW AND DISCRETIONARY
`DENIAL IS UNWARRANTED UNDER GENERAL PLASTIC &
`FINTIV
`Applicants’ prosecution arguments focused on how the prior art failed to
`
`disclose a secure element that was personalized and the identification of applications
`
`using application identifiers (as opposed to phone numbers). Supra §VI.C.3. These
`
`features—as well as the other features of the Challenged Claims—are obvious over
`
`7
`
`

`

`Patent No. 9,240,009
`IPR2021-00981
`Dua and GlobalPlatform, neither of which have been considered by the Office in the
`
`Petition Requesting Inter Partes Review
`
`
`
`context of the ’009 patent claims before. Dua discloses an “embedded smart card”
`
`in a wireless device and GlobalPlatform describes a standardized process for
`
`securing a smart card that includes identifying applications by Application
`
`Identifiers (AIDs) on the smart card. Ex-1004, ¶¶[0295], [0309]; Ex-1006,
`
`p.20(§1.4) (AID is “Application Identifier”). These teachings are relevant to
`
`Applicant’s distinctions over the prior art and the allowance of the claims.
`
`A. General Plastic
`Google has filed an IPR against the ’009 patent. The General Plastic factors
`
`weigh against exercising discretionary denial. The present circumstance is
`
`consistent with those in Qualcomm v. Monterey Research (IPR2020-01493), Paper
`
`11, (Mar. 21, 2021) where the Board declined to discretionarily deny a petition.
`
`This IPR relies upon different grounds than the Google IPR. There is no
`
`significant relationship between the parties. While Google and Samsung are both
`
`defendants in litigations over the ’009 patent, Samsung and Google are distinct
`
`parties represented by different counsel; simply being co-defendants challenging the
`
`same patent’s claims is insufficient to establish a significant relationship. Id., p.16.
`
`Moreover, Patentee’s infringement contentions were only served on May 12,
`
`Google’s IPR was filed on May 19, and Petitioners filed this independent Petition
`
`promptly thereafter after evaluating Google’s IPR to ensure the present filing was
`
`8
`
`

`

`Patent No. 9,240,009
`IPR2021-00981
`still warranted. “[I]t benefits the Board for Petitioner to have considered whether a
`
`Petition Requesting Inter Partes Review
`
`
`
`substantively distinct challenge is warranted.” Id., pp.16-17. Samsung and Google
`
`are also not accused of infringement based on the same products or functionalities.
`
`Id., p.17. Therefore, Factors 1 and 4-5 weigh against denying institution. Id., pp.17-
`
`18. Factor 3 also weighs against denying institution because no POPR has been
`
`filed. Id., p.18. Factor 2 “has a limited, neutral value” as the “parties here are neither
`
`the same party nor related parties.” Id., p.17. Factors 6-7 “are neutral” because
`
`while Samsung and Google cite different primary references (Dua for Samsung;
`
`Staib for Google), and different secondary references, “there is substantial overlap
`
`in the subject matter of the references,” (e-purse technology employed with
`
`GlobalPlatform) which “somewhat minimize[s]” the burden on the Board despite
`
`the two wholly different proceedings. Id., p.18. Accordingly, General Plastic does
`
`not counsel in favor of discretionary denial. Id., pp.18-19.
`
`B. Fintiv
`The Fintiv factors also weigh against exercising authority to deny. The
`
`District Court proceedings are at the earliest stage: a scheduling conference was held
`
`on May 12, 2021, discovery has just begun, no depositions have occurred and the
`
`court has not engaged in claim construction or motion practice. Patentee’s
`
`infringement contentions were served May 12, 2021, Petitioners filed this Petition a
`
`month after receiving those contentions and about four months prior to the §315(b)
`
`9
`
`

`

`Patent No. 9,240,009
`IPR2021-00981
`deadline. Moreover, the Samsung case is currently scheduled for trial in March
`
`Petition Requesting Inter Partes Review
`
`
`
`2022, so the Board’s institution decision would issue many months before trial,
`
`potentially resulting in a stay of the Samsung case. Agis Software Dev. LLC v.
`
`Google LLC, 2021 U.S. Dist. LEXIS 24195, at *11-12 (E.D. Tex. Fed. 9, 2021)
`
`(granting motion to stay pending ex parte reexamination despite being “late in the
`
`progression of this case—with discovery complete, pretrial briefing submitted, and
`
`jury selection pending”). Finally, in accordance with Sotera, Petitioners have
`
`stipulated that, if the Board institutes trial, Petitioners will not pursue in the litigation
`
`the specific grounds asserted in the IPR or “any other ground … that was raised or
`
`could have been reasonably raised in [that] IPR (i.e., any ground that could be raised
`
`under §§ 102 or 103 on the basis of prior art patent or printed publications),” which
`
`“weighs strongly in favor of not exercising discretion to deny institution.” Ex-1005;
`
`Sotera Wireless, Inc. v. Masimo Corporation (§II.A), IPR2020-01019, Paper 12 at
`
`19 (Dec. 1, 2020) (precedential). Accordingly, Fintiv does not counsel to
`
`discretionarily deny. Snap, Inc. v. SRK Tech. LLC, IPR2020-00820, Paper 15, (Oct.
`
`21, 2020) (precedential).
`
`VIII. PERSON OF ORDINARY SKILL IN THE ART (“POSITA”)
`A POSITA in the field of the ’009 patent at the time of the effective filing date
`
`would have would have been knowledgeable regarding mobile payment methods
`
`and systems pertinent to the ’009 patent. A POSITA would have had at least a
`
`10
`
`

`

`Patent No. 9,240,009
`IPR2021-00981
`bachelor’s degree in computer science, computer engineering, electrical engineering
`
`Petition Requesting Inter Partes Review
`
`
`
`or an equivalent, and about one year of professional experience relating to mobile
`
`payment
`
`technology, which would have exposed
`
`them
`
`to concepts
`
`like
`
`GlobalPlatform and smart cards. Lack of professional experience could be remedied
`
`by additional education, and vice versa. Ex-1003, ¶¶28-29.
`
`IX. CLAIM CONSTRUCTION
`Under Phillips v. AWH Corp., 415 F.3d 1303, 1312-16 (Fed. Cir. 2005) (en
`
`banc), claim terms are typically given their ordinary and customary meanings, as
`
`would have been understood by a POSITA, at the time of the invention, having taken
`
`into consideration the language of the claims, the specification, and the prosecution
`
`history of record.1 Petitioners apply the plain and ordinary meaning to the claims as
`
`no specific constructions are required to resolve the grounds presented in this
`
`Petition.
`
`X. OVERVIEW OF PRIOR ART
`A. Dua
`Dua was filed January 21, 2005 and published on July 27, 2006 making it
`
`
`1 The claims may be invalid for reasons not raised herein, including reasons based
`
`on statutory grounds unavailable in an IPR.
`
`11
`
`

`

`Patent No. 9,240,009
`IPR2021-00981
`§§102(a), (e) prior art.2 Ex-1004, cover. Dua is analogous art to the ’009 patent
`
`Petition Requesting Inter Partes Review
`
`
`
`because it discloses e-purses in a smart card on a mobile device to pay for things like
`
`subway fare. Id., ¶¶[0288]-[0289], [0293]-[0295], [0368].
`
`Dua discloses a “system and methodology for conducting financial and other
`
`transactions using a wireless device.” Id., Abstract. Dua’s wireless device includes
`
`a “wallet application” that receives, stores, manages, and transmits multiple
`
`payment, identification, and other confidential information electronically. Id.,
`
`¶[0041]. Card issuers like banks or merchants can develop custom “extensions”
`
`which are installed in the wallet application and stored in an embedded smart card.
`
`Id.,

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket