throbber
Exhibit D-2 – Invalidity Chart Regarding
`U.S. Publication No. 2006/0165060 (“Dua”)
`
`Apple, Inc. (“Apple”) hereby contends that the asserted claims (claims 1-17) of U.S. Patent No. 9,240,009 (“the ’009 patent”) are invalid as
`anticipated and/or rendered obvious by U.S. Publication No. 2006/0165060 (“Dua”) under 35 U.S.C. §§ 102 and/or 103, alone or in view of the
`knowledge and skill of one in the art at the time and/or any other prior art reference identified herein or within the related pleading, including, but not
`limited to, GlobalPlatform Card Specification Version 2.1.1 (“GlobalPlatform”), Smart Card Handbook Third Edition, by Wolfgang Rankl and
`Wolfgang Effing (2003) (“Smart Card Handbook”), and U.S. Patent Application Publication No. 2006/0174352 (“Thibadeau”). Dua was filed on
`January 21, 2005, and published on July 27, 2006. GlobalPlatform was published on March 2003. Smart Card Handbook was available at the Linda
`Hall Library and was cataloged by subject matter at the Library of Congress in 2003. Thibadeau was filed on January 31, 2006, and published on
`August 3, 2006.
`The chart below discloses how the aforementioned prior art reference discloses, either expressly or inherently, and/or renders obvious each of
`the asserted claims. The citations provided are exemplary and do not necessarily include each and every disclosure of the limitation in the references.
`Apple has endeavored to cite to the most relevant portions of the identified prior art, but other portions of the identified prior art may additionally
`disclose, either expressly or inherently, and/or render obvious one or more limitations of the asserted claims. Thus, Apple reserves the right to rely on:
`(1) uncited portions of the identified prior art; (2) other prior art not identified herein; (3) references that show the state of the art (irrespective of
`whether such references themselves qualify as prior art to the asserted patents); (4) factual testimony from the inventors or authors of the prior art
`references, or purveyors of prior art devices; and/or (5) expert testimony, to provide context to or aid in understanding the prior art and the state of the
`art at the time of the alleged inventions.
`The lack of a citation for an element should not be deemed an admission that the element is not disclosed or is not inherent in the reference.
`When the chart indicates a particular reference discloses or embodies a limitation, the terms “discloses,” “disclosed,” “embodies,” and “embodied”
`refer to explicit and/or inherent disclosure and/or obvious variations of the actual disclosure. Further, for each claim limitation that Apple contends is
`indefinite, Apple has used its best efforts to reasonably interpret the claims to fulfill their duties in charting the prior art references.
`Where Apple cites to a particular drawing or figure in the accompanying charts, the citation encompasses the description of the drawing or
`figure, as well as any text associated with the drawing or figure. Similarly, where Apple cites to particular text concerning a drawing or figure, the
`citation encompasses that drawing or figure as well. Certain identified prior art inherently discloses features of the asserted claims. Apple reserves the
`right to rely on inherency to demonstrate the invalidity of the asserted claims. Moreover, certain prior art references may inherently disclose certain
`features of the asserted claims as construed by RFCyber. Apple may rely on cited or uncited portions of the prior art, other documents, factual testimony,
`and expert testimony to establish the inherency of certain features of the prior art to invalidate the asserted claims.
`The exemplary disclosures identified below disclose and/or render obvious the asserted claims as Defendant currently understands them,
`including based on Plaintiff’s infringement contentions. No disclosure or statement below is intended to assert or agree with any particular claim
`
`WEST\297652083.1
`
`1
`
`RFCyber's Exhibit No. 2006, IPR2022-00413
`Page 001
`
`

`

`Exhibit D-2 – Invalidity Chart Regarding
`U.S. Publication No. 2006/0165060 (“Dua”)
`
`construction position and Defendant reserves the right to advance and rely on positions regarding claim construction and noninfringement regardless
`of the disclosures asserted herein.
`
`WEST\297652083.1
`
`2
`
`RFCyber's Exhibit No. 2006, IPR2022-00413
`Page 002
`
`

`

`Exhibit D-2 – Invalidity Chart Regarding
`U.S. Publication No. 2006/0165060 (“Dua”)
`
`Claim
`No.
`1[pre]
`
`’009 Patent Claim Limitation
`
`A mobile device for conducting a
`secured transaction over a network, the
`mobile device comprising:
`
`WEST\297652083.1
`
`U.S. Patent 9,240,009 (the ’009 Patent)
`Exemplary disclosure
`
`To the extent the preamble is limiting, Dua discloses the mobile device for conducting a
`secured transaction over a network, the mobile device comprising:
`For Example:
`See Claim 1.
`“The present invention relates generally to systems and methodologies for conducting
`electronic commerce and more particularly to systems and methodologies for issuing,
`managing, storing and using credentials authorizing the legitimate holder of Such a credential
`to accomplish a desired result.”
`“Another important trend in consumer-related electronics is the increased speed and the reduced
`size of available electronic components which has contributed to the proliferation of powerful
`wireless devices. Mobile devices including personal digital assistants (PDAs) and cellular
`phones now number over one billion worldwide. The capability of wireless devices has been
`augmented by their ability to connect to the Internet and also to exchange data over short ranges
`with other wireless devices or readers.”
`“As stated above, the present invention preferably involves the distribution of credentials to a
`“wireless device”. As used herein, wireless device 200 is preferably a device that is capable of
`wirelessly connecting to the Internet using network protocols such as GSM/GPRS,
`CDMA2000, W-CDMA, EDGE, HDR, 1xRTT, UMTS, IMT-2000, 802.11a, 802.11b,
`802.11g, or BLUETOOTH or other relevant protocols developed hereinafter. Preferably,
`wireless device 200 has a display screen and a key pad for alphanumeric and special character
`data input. It is further preferred that wireless device 200 has processing and secure storage
`capabilities allowing it to host and operate a wallet application capable of receiving, storing,
`managing and transmitting multiple payment, identification, and other confidential information
`electronically. Wireless device 200 also preferably has an
`integrated short-range
`communication capability for transmitting confidential information and exchanging other data
`between the wallet application and an external reader that is in proximity to the wireless
`device.”
`
`3
`
`RFCyber's Exhibit No. 2006, IPR2022-00413
`Page 003
`
`

`

`Exhibit D-2 – Invalidity Chart Regarding
`U.S. Publication No. 2006/0165060 (“Dua”)
`
`“FIG. 3 illustrates some of the SIP components, their relationship to one another and the
`protocols that are employed. A user agent acting as a client (in this case the issuer WCM 410
`which is in communication with issuer card management system 420) uses SIP to set up a
`session with a user agent that acts as a server (in this case a wallet application operating on
`user's wireless device 400). The session initiation dialogue uses SIP and involves one or more
`proxy servers to forward requests and responses between the two user agents. The user agents
`also make use of the SDP, which is used to describe the media session.”
`“Mobile transactions can be performed in three environments: local, remote, and personal. Each
`environment has its own mobile commerce services and characteristics that may require
`specific technologies. A wallet application on a wireless device that enables transactions in all
`three environments will provide the greatest utility to users. Electronic credentials issued to a
`user and stored in the wallet application can be used in all three environments.”
`“As can be seen in FIG. 8, a first transmission path of an electronic credit card authorization
`request 870 includes, for example, a merchant store controller and merchant host system, an
`acquirer/processor network, a private network Such as VisaNet, and a issuer gateway. Using
`these components, point of sale terminal 860, via RF reader 820 can be used to capture and
`transmit an electronic credential from a wireless device for online authorization. The second
`transmission path as shown in FIG. 8 is via WCM 810 using the Internet and wireless link 880
`and issuer DNS server 890 and is used to deliver a PIN request to wireless device 800 and to
`receive a user-input response from wireless device 800.”
`Dua ¶¶ [0002], [0015], [0041], [0107], [0313], [0405].
`
`WEST\297652083.1
`
`4
`
`RFCyber's Exhibit No. 2006, IPR2022-00413
`Page 004
`
`

`

`Exhibit D-2 – Invalidity Chart Regarding
`U.S. Publication No. 2006/0165060 (“Dua”)
`
`WEST\297652083.1
`
`5
`
`RFCyber's Exhibit No. 2006, IPR2022-00413
`Page 005
`
`

`

`Exhibit D-2 – Invalidity Chart Regarding
`U.S. Publication No. 2006/0165060 (“Dua”)
`
`WEST\297652083.1
`
`6
`
`RFCyber's Exhibit No. 2006, IPR2022-00413
`Page 006
`
`

`

`Exhibit D-2 – Invalidity Chart Regarding
`U.S. Publication No. 2006/0165060 (“Dua”)
`
`WEST\297652083.1
`
`Dua at FIGs. 1, 3, and 8.
`
`7
`
`RFCyber's Exhibit No. 2006, IPR2022-00413
`Page 007
`
`

`

`Exhibit D-2 – Invalidity Chart Regarding
`U.S. Publication No. 2006/0165060 (“Dua”)
`
`To the extent that this element is not explicitly disclosed, a POSITA would have found this
`element obvious in light of this reference in combination with the knowledge and skill of a
`POSITA and/or one or more of the other prior art references identified by Defendants. For
`example, a POSITA would have recognized and understood that the teachings of this
`reference could be modified, combined, or replaced with the teachings from the other
`identified prior art references, including, but not limited to, the disclosures identified in the
`following documents and charts related to this limitation:
`
`See, e.g, APL-RFC0916-PA-00000001 - APL-RFC0916-PA-00021141
`See, e.g., “D” Charts regarding the ’009 patent
`
`A POSITA would have been motivated to combine the teachings of these references to
`practice this limitation. For example, one of skill in the art would find these combinations
`obvious to try, due at least to the similarity of the technical teachings of the art. As another
`example, one of skill in the art would find that the teachings could be predictably
`interchanged by, for example, simple substitution, at least because of the predictability of the
`art and the known interchangeability of the various elements. As another example, one of skill
`in the art would be motivated to combine the references, and would have a reasonable
`expectation of success in doing so, at least because the references use known variations of
`existing technology to solve routine and well understood problems in predictable ways.
`
`Dua discloses a network interface.
`For Example:
`See 1[pre], which is incorporated by reference.
`To the extent that this element is not explicitly disclosed, a POSITA would have found this
`element obvious in light of this reference in combination with the knowledge and skill of a
`POSITA and/or one or more of the other prior art references identified by Defendants. For
`example, a POSITA would have recognized and understood that the teachings of this
`reference could be modified, combined, or replaced with the teachings from the other
`
`8
`
`1[a]
`
`a network interface;
`
`WEST\297652083.1
`
`RFCyber's Exhibit No. 2006, IPR2022-00413
`Page 008
`
`

`

`Exhibit D-2 – Invalidity Chart Regarding
`U.S. Publication No. 2006/0165060 (“Dua”)
`
`identified prior art references, including, but not limited to, the disclosures identified in the
`following documents and charts related to this limitation:
`
`See, e.g, APL-RFC0916-PA-00000001 - APL-RFC0916-PA-00021141
`See, e.g., “D” Charts regarding the ’009 patent
`
`A POSITA would have been motivated to combine the teachings of these references to
`practice this limitation. For example, one of skill in the art would find these combinations
`obvious to try, due at least to the similarity of the technical teachings of the art. As another
`example, one of skill in the art would find that the teachings could be predictably
`interchanged by, for example, simple substitution, at least because of the predictability of the
`art and the known interchangeability of the various elements. As another example, one of skill
`in the art would be motivated to combine the references, and would have a reasonable
`expectation of success in doing so, at least because the references use known variations of
`existing technology to solve routine and well understood problems in predictable ways.
`
`Dua discloses an interface to receive a secure element.
`For Example:
`See 1[pre]-1[a], which are incorporated by reference.
`“There are three general categories of smart cards: contact, contactless, and hybrid Smart
`cards. A contact Smart card requires that the user insert the Smart card into a Smart card
`reader with a direct connection to a conductive micro-module on the surface of the card. It is
`via these physical contact points, that transmission of commands, data, and card status takes
`place.”
`“A wireless device loaded with the wallet application may come with some pre-loaded
`extensions. Extensions may reside on the device memory, in an embedded Smart card, in a
`removable storage media, or on a remote server, securely accessible through the wallet
`application protocols. An extension may communicate with the user, may exchange
`information with remote servers or it may use other elements of the device hardware or
`software.”
`
`9
`
`1[b]
`
`an interface to receive a secure
`element;
`
`WEST\297652083.1
`
`RFCyber's Exhibit No. 2006, IPR2022-00413
`Page 009
`
`

`

`Exhibit D-2 – Invalidity Chart Regarding
`U.S. Publication No. 2006/0165060 (“Dua”)
`
`“The wallet shell is the core of the wallet platform. The wallet application handles processing
`of incoming credentials and extensions, the execution of extensions within the wallet
`framework, controlling access to secure storage, enabling communication with an embedded
`RF interface or Smart card, and facilitating the use of operating system and hardware features
`such as display and sound.”
`Dua ¶¶ [0008], [0295], [0309]
`To the extent that this element is not explicitly disclosed, a POSITA would have found this
`element obvious in light of this reference in combination with the knowledge and skill of a
`POSITA and/or one or more of the other prior art references identified by Defendants. For
`example, a POSITA would have recognized and understood that the teachings of this
`reference could be modified, combined, or replaced with the teachings from the other
`identified prior art references, including, but not limited to, the disclosures identified in the
`following documents and charts related to this limitation:
`
`See, e.g, APL-RFC0916-PA-00000001 - APL-RFC0916-PA-00021141
`See, e.g., “D” Charts regarding the ’009 patent
`
`A POSITA would have been motivated to combine the teachings of these references to
`practice this limitation. For example, one of skill in the art would find these combinations
`obvious to try, due at least to the similarity of the technical teachings of the art. As another
`example, one of skill in the art would find that the teachings could be predictably
`interchanged by, for example, simple substitution, at least because of the predictability of the
`art and the known interchangeability of the various elements. As another example, one of skill
`in the art would be motivated to combine the references, and would have a reasonable
`expectation of success in doing so, at least because the references use known variations of
`existing technology to solve routine and well understood problems in predictable ways.
`
`1[c]
`
`a memory space for storing at least a
`module and an application downloaded
`from the network;
`
`Dua discloses a memory space for storing at least a module and an application downloaded
`from the network.
`For Example:
`
`WEST\297652083.1
`
`10
`
`RFCyber's Exhibit No. 2006, IPR2022-00413
`Page 010
`
`

`

`Exhibit D-2 – Invalidity Chart Regarding
`U.S. Publication No. 2006/0165060 (“Dua”)
`
`See 1[pre]-1[b], which are incorporated by reference.
`“Smart cards provide a distinct advantage in that they offer the ability to provide
`authentication in connection with a transaction. Card authentication can be performed by the
`reader terminal and/or the issuer's systems using dynamic techniques that distinguish genuine
`cards from clones. A Smart card generally includes an embedded semiconductor device which
`is programmed before issue with the account holders information. This data is protected
`through secure encryption methods, making it difficult to fraudulently replicate a Smart card.
`The integrated circuits within Smart cards in general have continued to improve with
`miniaturization, low power requirements, the addition of strong encryption capability, and
`tamper-proof standards for crypto-processor chips”
`“As a result of the increased move towards standardization, improving technology and more
`demanding security and authorization requirements, Smart cards are slowly replacing the
`magnetic stripe card as the dominant technology for conducting financial transactions. The
`enhanced ability of smart cards to secure confidential information and the ability of POS
`systems to authenticate the chip cards makes them an attractive alternative to magnetic stripe
`cards. Also, the reduction of fraudulent transactions achieved by smart cards results in lower
`risk, and lower fees for the consumer and the merchant.”
`“Depending on the situation, SIP messages between the WCM and the wallet application on
`the wireless device can carry any supported content types in its payload (e.g. WML, HTML,
`XHTML, gif, text and others). SIP payload content could include encryption keys, encryption
`algorithms, forms, user authentication information (e.g. user names, passwords, PINs, and
`answers to secret questions), Software extensions the issuer wants to register with the wallet
`application, Software updates, electronic credentials, updates to existing credentials, graphics
`that are part of the credentials, and other Such information.”
`“These are just a few examples of the types of credentials that can be issued to and stored
`within the wallet application. Implementing electronic versions of these credentials in the
`wallet application creates different operating and processing requirements for each credential.
`Consider the requirements associated with implementing the Subway stored value credential
`through the wallet platform. The logic required to operate the Subway stored value credential,
`the unique message format for communication between the wireless device and a RF reader at
`the turnstile, unique display messages, an over-the-air reload tool, and other features
`11
`
`WEST\297652083.1
`
`RFCyber's Exhibit No. 2006, IPR2022-00413
`Page 011
`
`

`

`Exhibit D-2 – Invalidity Chart Regarding
`U.S. Publication No. 2006/0165060 (“Dua”)
`
`associated with the stored value credential that a user might see on the wireless device—all
`need to be programmed into the wallet application. These types of requirements are embodied
`in mini-programs that operate within the wallet application called “extensions' since they
`“extend the capability of the wallet application in order to handle new features and
`capabilities that are specific to an issuer's credential. These extensions allow credentials to be
`used in a controlled way through specific issuer-defined functions.”
`Dua ¶¶ [0007], [0014], [0215], [0293].
`To the extent that this element is not explicitly disclosed, a POSITA would have found this
`element obvious in light of this reference in combination with the knowledge and skill of a
`POSITA and/or one or more of the other prior art references identified by Defendants. For
`example, a POSITA would have recognized and understood that the teachings of this
`reference could be modified, combined, or replaced with the teachings from the other
`identified prior art references, including, but not limited to, the disclosures identified in the
`following documents and charts related to this limitation:
`
`See, e.g, APL-RFC0916-PA-00000001 - APL-RFC0916-PA-00021141
`See, e.g., “D” Charts regarding the ’009 patent
`
`A POSITA would have been motivated to combine the teachings of these references to
`practice this limitation. For example, one of skill in the art would find these combinations
`obvious to try, due at least to the similarity of the technical teachings of the art. As another
`example, one of skill in the art would find that the teachings could be predictably
`interchanged by, for example, simple substitution, at least because of the predictability of the
`art and the known interchangeability of the various elements. As another example, one of skill
`in the art would be motivated to combine the references, and would have a reasonable
`expectation of success in doing so, at least because the references use known variations of
`existing technology to solve routine and well understood problems in predictable ways.
`For example:
`GlobalPlatform pp.19, 29, 31(§3.5), 39(§5.1.1.), pp.62(§6.4.1), 63(§6.4.1.1), 65(§6.4.1.2)
`Dua discloses “a novel system and methodology for conducting financial and other transactions
`requiring authorization” that involves the secure distribution, and personalization, of
`12
`
`WEST\297652083.1
`
`RFCyber's Exhibit No. 2006, IPR2022-00413
`Page 012
`
`

`

`Exhibit D-2 – Invalidity Chart Regarding
`U.S. Publication No. 2006/0165060 (“Dua”)
`
`applications to a “handheld device such as a mobile telephone via a wireless network.” Dua,
`¶[0026]. Dua’s systems/methods may use a wireless device that “has processing and secure
`storage capabilities allowing it to host and operate a wallet application capable of receiving,
`storing, managing and transmitting multiple payment, identification, and other confidential
`information electronically”
`through a wireless
`interface or
`through a short-range
`communication capability. Id., ¶¶[0041], [0309]. The wireless device includes a smart card that
`can be programmed with an account holder’s information, keys and authentication information
`that provides for authentication in connection with a transaction and protects data through
`secure encryption methods. Id., ¶¶[0007], [0215], [0295].
`Dua refers to credit card organizations “working jointly over the last few years to develop
`specifications that define a set of requirements for security and interoperability between chip
`cards and terminals on a global basis, regardless of the manufacturer, financial institution, or
`where the card was used,” which a POSITA would recognize as including GlobalPlatform. Id.,
`¶[0014]; GlobalPlatform, p.16(§1); Ex1003, ¶¶99-100, Smart Card Handbook, p.290, 950.
`Indeed, GlobalPlatform discloses “a hardware-neutral, vendor-neutral, Application-
`independent [smart] card management specification” that provides a security architecture that
`protects the “structure and function of cards within the GlobalPlatform system” for the life of
`the card—thus providing a “secure element” as claimed. GlobalPlatform, pp.16, 32. Dua’s
`“wallet application should meet standards defined by card organizations,” and GlobalPlatform
`was specifically developed by such card organizations. Dua, ¶[0525]; GlobalPlatform, p.16.
`For these reasons alone, a POSITA would be motivated to and would find it obvious to employ
`the well-known GlobalPlatform system with Dua’s smart cards. Id.
`Moreover, Dua discloses the use of a Java platform and Java applets with its wireless devices,
`which a POSITA would recognize as being a reference to Java Card. Dua, ¶¶[0195], [0500].
`GlobalPlatform is designed to be compatible with Java Card. GlobalPlatform, p.24(§1.5.2.10);
`see also id. p.29(§3.1) (“GlobalPlatform is intended to run on top of any secure, multi-
`application card runtime environment.”). And, GlobalPlatform “has primarily become the de
`facto standard for loading and managing Java-based applications with the Java Card operating
`system. Smart Card Handbook, p.290. This further confirms a POSITA would be motivated to
`and would find it obvious to use GlobalPlatform with Dua’s smart cards.
`
`WEST\297652083.1
`
`13
`
`RFCyber's Exhibit No. 2006, IPR2022-00413
`Page 013
`
`

`

`1[d]
`
`a processor coupled to the memory
`space and configured to execute the
`module to perform operations
`including:
`
`1[e]
`
`sending to a server via the network
`interface an identifier identifying the
`application together with device
`information of a secure element,
`
`WEST\297652083.1
`
`Exhibit D-2 – Invalidity Chart Regarding
`U.S. Publication No. 2006/0165060 (“Dua”)
`
`Dua discloses a processor coupled to the memory space and configured to execute the module
`to perform operations.
`For Example:
`See 1[pre]-1[c], which are incorporated by reference.
`To the extent that this element is not explicitly disclosed, a POSITA would have found this
`element obvious in light of this reference in combination with the knowledge and skill of a
`POSITA and/or one or more of the other prior art references identified by Defendants. For
`example, a POSITA would have recognized and understood that the teachings of this
`reference could be modified, combined, or replaced with the teachings from the other
`identified prior art references, including, but not limited to, the disclosures identified in the
`following documents and charts related to this limitation:
`
`See, e.g, APL-RFC0916-PA-00000001 - APL-RFC0916-PA-00021141
`See, e.g., “D” Charts regarding the ’009 patent
`
`A POSITA would have been motivated to combine the teachings of these references to
`practice this limitation. For example, one of skill in the art would find these combinations
`obvious to try, due at least to the similarity of the technical teachings of the art. As another
`example, one of skill in the art would find that the teachings could be predictably
`interchanged by, for example, simple substitution, at least because of the predictability of the
`art and the known interchangeability of the various elements. As another example, one of skill
`in the art would be motivated to combine the references, and would have a reasonable
`expectation of success in doing so, at least because the references use known variations of
`existing technology to solve routine and well understood problems in predictable ways.
`For example:
`GlobalPlatform pp..62(§6.4.1), 63(§6.4.1.1), 65(§6.4.1.2)
`Dua discloses sending to a server via the network interface an identifier identifying the
`application together with device information of a secure element, wherein the application is
`downloaded from the network in the mobile device.
`For Example:
`
`14
`
`RFCyber's Exhibit No. 2006, IPR2022-00413
`Page 014
`
`

`

`wherein the application is downloaded
`from the network in the mobile device;
`
`Exhibit D-2 – Invalidity Chart Regarding
`U.S. Publication No. 2006/0165060 (“Dua”)
`
`See 1[pre]-1[d], which are incorporated by reference.
`“The present invention, in a preferred embodiment provides for using some of the SIP-
`network infrastructure that mobile operators will have in place to deliver credentials from
`SIP-based Wireless Credential Manager (WCM) 110 at an issuer site to a SIP-based wallet
`application on a wireless device 200. The system disclosed herein is designed to interoperate
`with mobile 2.5G, 3G, and Wi-Fi networks among others.”
`“In the next example, the 180 (Ringing) response is routed to the Sample Bank WCM 510. In
`this example, Bob decides to allow connectivity with the Sample Bank server 510 by pressing
`a key on his phone (as prompted for by the wallet application). After he presses the
`appropriate key to accept connectivity with Sample Bank’s server 510, his SIP phone 500
`sends a 200 (OK) response to indicate that the call has been answered by the wallet
`application. The 200 (OK) contains a message body with the SDP media description of the
`type of session that the wallet application running on Bob's SIP phone 500 is willing to
`establish with the Sample Bank WCM 510. As a result, there is a two-phase exchange of SDP
`messages: the WCM 510 sent one to Bob's wallet application, and the wallet application sent
`one back to the WCM 510. This two-phase exchange provides basic negotiation capabilities
`and is based on a simple offer/answer model of SDP exchange. If Bob did not wish to answer
`the communication from Sample Bank or was busy on a phone call, an error response would
`have been sent instead of the 200 (OK), which would have resulted in no media session being
`established between the wallet application on Bob's phone 500 and the Sample Bank WCM
`510. The complete list of SIP response codes is in Section 21 of RFC 3261. The 200 (OK)
`(message F9 in FIG. 4) might look like this as Bob's wallet application sends it out:”
`“The open-architecture of the wallet platform allows credential issuers to deploy their own
`commerce-specific applications called “extensions’. Extensions literally “extend the
`capability of the wallet platform by enabling a new set of features defined by the credential
`issuer. Different credentials serve many unique purposes and are not all used in the same
`way.”
`Dua ¶¶ [0104], [0160], [0289].
`To the extent that this element is not explicitly disclosed, a POSITA would have found this
`element obvious in light of this reference in combination with the knowledge and skill of a
`POSITA and/or one or more of the other prior art references identified by Defendants. For
`15
`
`WEST\297652083.1
`
`RFCyber's Exhibit No. 2006, IPR2022-00413
`Page 015
`
`

`

`Exhibit D-2 – Invalidity Chart Regarding
`U.S. Publication No. 2006/0165060 (“Dua”)
`
`example, a POSITA would have recognized and understood that the teachings of this
`reference could be modified, combined, or replaced with the teachings from the other
`identified prior art references, including, but not limited to, the disclosures identified in the
`following documents and charts related to this limitation:
`
`See, e.g, APL-RFC0916-PA-00000001 - APL-RFC0916-PA-00021141
`See, e.g., “D” Charts regarding the ’009 patent
`
`A POSITA would have been motivated to combine the teachings of these references to
`practice this limitation. For example, one of skill in the art would find these combinations
`obvious to try, due at least to the similarity of the technical teachings of the art. As another
`example, one of skill in the art would find that the teachings could be predictably
`interchanged by, for example, simple substitution, at least because of the predictability of the
`art and the known interchangeability of the various elements. As another example, one of skill
`in the art would be motivated to combine the references, and would have a reasonable
`expectation of success in doing so, at least because the references use known variations of
`existing technology to solve routine and well understood problems in predictable ways.
`For example:
`GlobalPlatform pp. 18(§1.3); 19, 20(§1.4), 81(§7.6.2), 92(§7.6.2), 93(§7.6.2); 98(§7.7.4).
`Dua discloses establishing a secured channel between the secure element and the server using
`a key set installed on the secure element, wherein the server is configured to prepare data
`necessary for the application to function as designed on the mobile device.
`For Example:
`See 1[pre]-1[e], which are incorporated by reference.
`“These and other objects of the present invention are obtained through the use of a novel
`system and methodology for conducting financial and other transactions requiring
`authorization. According to the methodology of the present invention, credentials may be
`selectively issued by issuers Such as credit card companies, banks, and merchants to
`consumers permitting the specific consumer to conduct a transaction according to the
`authorization given as reflected by the credential or set of credentials. The preferred
`
`16
`
`1[f]
`
`establishing a secured channel between
`the secure element and the server using
`a key set installed on the secure
`element, wherein the server is
`configured to prepare data necessary
`for the application to function as
`designed on the mobile device; and
`
`WEST\297652083.1
`
`RFCyber's Exhibit No. 2006, IPR2022-00413
`Page 016
`
`

`

`Exhibit D-2 – Invalidity Chart Regarding
`U.S. Publication No. 2006/0165060 (“Dua”)

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket