throbber

`
`UNITED STATES PATENT AND TRADEMARK OFFICE
`_________________
`
`BEFORE THE PATENT TRIAL AND APPEAL BOARD
`_________________
`
`
`APPLE INC.,
`Petitioner
`
`v.
`
`RFCYBER CORP.,
`Patent Owner
`_________________
`
`
`Inter Partes Review Case No. IPR2022-00413
`U.S. Patent No. 9,240,009
`
`
`
`
`
`PETITION FOR INTER PARTES REVIEW
`OF U.S. PATENT NO. 9,240,009
`
`

`

`TABLE OF CONTENTS
`
`I. BACKGROUND ............................................................................................ 1
`II. MANDATORY NOTICES UNDER 37 C.F.R. § 42.8(A)(1) FOR INTER
`PARTES REVIEW ................................................................................................ 2
`A. Real Party in Interest Under 37 C.F.R. § 42.8(b)(1) ..................................... 2
`B. Related Matters Under 37 C.F.R. § 42.8(b)(2) ............................................. 2
`C. Lead and Backup Counsel Under 37 C.F.R. § 42.8(b)(3) and Service
`Information under 37 C.F.R. § 42.8(b)(4) ........................................................... 4
`III. PAYMENT OF FEES UNDER 37 C.F.R. § 42.15 .......................................... 5
`IV. CERTIFICATION OF WORD COUNT UNDER 37 C.F.R. § 42.24(D) ......... 5
`V. REQUIREMENTS FOR IPR UNDER 37 C.F.R. § 42.104 ............................. 6
`A. Grounds for Standing Under 37 C.F.R. § 42.104(a) ..................................... 6
`B. Identification of Challenge Under 37 C.F.R. § 42.104(b) and Relief
`Requested ........................................................................................................... 6
`VI. THE ’009 PATENT ........................................................................................ 6
`A. Overview ..................................................................................................... 6
`B. Effective Filing Date .................................................................................... 7
`C. ’009 Patent’s Prosecution ............................................................................. 7
`VII. PETITIONER’S GROUNDS ARE NEW AND DISCRETIONARY DENIAL
`IS UNWARRANTED UNDER GENERAL PLASTIC & FINTIV ........................ 8
`A. General Plastic ............................................. Error! Bookmark not defined.
`B. Fintiv ........................................................................................................... 8
`VIII. ........................ PERSON OF ORDINARY SKILL IN THE ART (“POSITA”)
`
`9
`IX. CLAIM CONSTRUCTION ............................................................................ 9
`X. OVERVIEW OF PRIOR ART .......................................................................10
`A. Dua .............................................................................................................10
`B. GlobalPlatform ...........................................................................................11
`C. Smart Card Handbook .................................................................................12
`D. Thibadeau ...................................................................................................13
`XI. DETAILED ANALYSIS ...............................................................................14
`
`ii
`
`

`

`A. Ground 1: Dua in view of GlobalPlatform render obvious claims 1-6 and
`13-17 .................................................................................................................14
`B. Ground 2: Dua in view of GlobalPlatform and Smart Card Handbook
`render obvious claims 7-10 ................................................................................52
`C. Ground 3: Dua in view of GlobalPlatform, Smart Card Handbook, and
`Thibadeau renders obvious claims 11 and 12 .....................................................61
`XII. CONCLUSION ..............................................................................................64
`
`iii
`
`

`

`CLAIM LISTING
`
`CLAIM 1:
`
`[1.PREAMBLE] A mobile device for conducting a secured transaction over a
`
`network, the mobile device comprising:
`
`[1a] a network interface;
`
`[1b] an interface to receive a secure element;
`
`[1c] a memory space for storing at least a module and an application downloaded from
`
`the network;
`
`[1d] a processor coupled to the memory space and configured to execute the module
`
`to perform operations including:
`
`[1di] sending to a server via the network interface an identifier identifying the
`
`application together with device information of a secure element,
`
`[1dii] wherein the application is downloaded from the network in the mobile
`
`device;
`
`[1diii] establishing a secured channel between the secure element and the server
`
`using a key set installed on the secure element,
`
`[1div] wherein the server is configured to prepare data necessary for the
`
`application to function as designed on the mobile device; and
`
`iv
`
`

`

`[1dv] receiving the data from the server to associate the application with the
`
`secure element,
`
`[1dvi] wherein the application subsequently functions in conjunction with the
`
`secure element.
`
`CLAIM 2:
`
`The mobile device as recited in claim 1, wherein the data received in the mobile device
`
`includes an application key set for the application, and a user interface specifically
`
`designed for the mobile device.
`
`CLAIM 3:
`
`The mobile device as recited in claim 2, wherein the mobile device is a near field
`
`communication (NFC) enabled mobile phone, and the application is an electronic
`
`purse (e-purse), the mobile device is used to exchange secured data with another
`
`device within a near distance to conduct a transaction.
`
`CLAIM 4:
`
`The mobile device as recited in claim 3, wherein the secured data is being exchanged
`
`over a secured channel between the mobile device and the another device established
`
`by the application key set.
`
`CLAIM 5:
`
`The mobile device as recited in claim 4, wherein the transaction is conducted without
`
`the mobile device communicating with a transaction server.
`
`v
`
`

`

`CLAIM 6:
`
`[6.PREAMBLE] The mobile device as recited in claim 1, [6a] wherein said sending
`
`to a server via the network interface an identifier identifying the application together
`
`with device information of a secure element comprises:
`
`[6bi] determining whether the secure element has been personalized with a
`
`Trusted Service Management (TSM) system,
`
`[6bii] wherein the TSM system is a collection of services configured to
`
`distribute and manage contactless services for customers signed up with the
`
`TSM, and provide data exchanges among different parties to make electronic
`
`commerce possible over a wireless network; and
`
`[6ci] performing a personalization process for the secure element when the
`
`secure element has not been personalized with the Trusted Service Management
`
`(TSM) system,
`
`[6cii] wherein the secure element when personalized establishes a security
`
`platform for the application to run on the mobile device.
`
`CLAIM 7:
`
`[7.PREAMBLE] The mobile device as recited in claim 6, wherein the personalization
`
`process comprises:
`
`vi
`
`

`

`[7a] causing the mobile device to initiate data communication with a server in
`
`the TSM system;
`
`[7bi] retrieving device information of the secure element in responding to a
`
`request from the TSM server after the TSM server determines that the secure
`
`element is registered therewith,
`
`[7bii] wherein the device information is a sequence of characters uniquely
`
`identifying the secure element;
`
`[7ci] receiving at least a set of keys from the TSM server,
`
`[7cii] wherein the keys are generated in the TSM server in accordance with the
`
`device information of the secure element; and
`
`[7d] storing the set of keys in the secure element to facilitate a subsequent
`
`transaction with the secure element in the computing device.
`
`CLAIM 8:
`
`The mobile device as recited in claim 7, wherein the device information includes an
`
`identifier of the secure element, manufacturer information and a batch number.
`
`CLAIM 9:
`
`The method as recited in claim 8, wherein part of the data is used to facilitate the server
`
`to remotely manage the application.
`
`vii
`
`

`

`CLAIM 10:
`
`The mobile device as recited in claim 7, wherein the secure element is embedded in
`
`the mobile device and integrated with the mobile device via the interface.
`
`CLAIM 11:
`
`The mobile device as recited in claim 7, wherein the secure element is a software
`
`module installed in a secure memory space only accessible by a distributor of the
`
`secure element.
`
`CLAIM 12:
`
`The mobile device as recited in claim 11, wherein some components are updated when
`
`the secure element is upgraded by the distributor.
`
`CLAIM 13:
`
`[13.PREAMBLE] The mobile device as recited in claim 1, wherein the operations
`
`further comprises:
`
`[13a] receiving a message from a distributor of the application, the message
`
`including an identifier identifying the application;
`
`[13b] verifying that the message is indeed from the distributor;
`
`[13c] disassociating the application with the secure element in responding to a
`
`confirmation from the distributor after the message has been verified and was
`
`indeed from the distributor; and
`
`viii
`
`

`

`[13d] notifying the distributor that the application installed in the mobile
`
`device is no longer active.
`
`CLAIM 14:
`
`[14.PREAMBLE] A mobile device for conducting a secured transaction over a
`
`network, the mobile device comprising:
`
`[14a] a network interface;
`
`[14b] a secure element;
`
`[14c] a memory space for storing various modules downloaded from the network, each
`
`of the modules configured to provide an application or a service to a user of the mobile
`
`device;
`
`[14d] a processor coupled to the memory space and configured to execute an
`
`embedded module to perform operations including:
`
`[14di] provisioning each of the modules, wherein said provisioning each of the
`
`modules with a distributor comprises:
`
`[14dii] sending to a server via the network interface an identifier identifying the
`
`each of the modules together with device information of the secure element,
`
`[14diii] wherein the each of the modules is downloaded from the network in the
`
`mobile device;
`
`ix
`
`

`

`[14div] establishing a secured channel between the secure element and the
`
`server using a key set installed on the secure element, wherein the server is
`
`configured to prepare data necessary for the each of the modules to function as
`
`designed on the mobile device; and
`
`[14dv] receiving the data from the server to associate the each of the modules
`
`with the secure element, wherein the data includes a set of keys generated for
`
`the each of the modules, wherein the each of the modules subsequently
`
`functions in conjunction with the secure element.
`
`CLAIM 15:
`
`[15.PREAMBLE] The mobile device as recited claim 14, wherein the operations
`
`further comprise:
`
`[15a] receiving a message from a distributor of one of the modules, the
`
`message including an identifier identifying the one of the modules;
`
`[15b] verifying that the message is authenticated;
`
`[15c] disassociating the one of the modules with the secure element in
`
`responding to a confirmation from the distributor after the message has been
`
`verified and was indeed from the distributor; and
`
`[15d] notifying the distributor that the one of the modules installed in the mobile
`
`device is no longer active.
`
`x
`
`

`

`CLAIM 16:
`
`The mobile device as recited claim 14, wherein the mobile device includes a display
`
`configured to display a user interface showing some of the modules that are still
`
`provisioned and active, each of the modules is configured to show another user
`
`interface particularly designed for the display of the mobile device when the each of
`
`the modules is activated by a user.
`
`CLAIM 17:
`
`The mobile device as recited claim 16, wherein the secure element must be
`
`personalized before each of the modules is provisioned, each of the provisioned
`
`modules is associated with the personalized secure element and a key set generated in
`
`accordance with a key set of the secure element.
`
`
`
`
`
`xi
`
`

`

`PETITIONER’S EXHIBIT LIST
`
`Exhibit No. Description
`
`1001
`
`1002
`
`1003
`
`1004
`
`1005
`
`1006
`
`1007
`
`1008
`
`1009
`
`1010
`
`1011
`
`1012
`
`1013
`
`U.S. Patent No. 9,240,009 (the “’009 patent”)
`
`File History of U.S. Patent No. 8,118,218 (“’218 FH”)
`
`Declaration of Gerald Smith Regarding Invalidity of U.S. Patent
`No. 8,118,218
`
`U.S. Patent Application Publication No. 2006/0165060 (“Dua”)
`
`Defendants’ Contingent Election Regarding Invalidity Defenses,
`RFCyber Corp. v. Samsung Electronics Co., Ltd. et al., 2:20-cv-
`00335 (E.D. Tex.) (Dkt. 60) (filed June 8, 2021).
`
`GlobalPlatform Card Specification Version 2.1.1 (March 2003)
`(“GlobalPlatform” or “GP”)
`
`File History of U.S. Patent No. 8,448,855 (“’855 FH”)
`
`Smart Card Handbook Third Edition, by Wolfgang Rankl and
`Wolfgang Effing (2003)
`
`Common Electronic Purse Specifications, Technical
`Specification Version 2.3 (March 2001)
`
`SmartMX, P5CD009 Secure Dual Interface PKI Smart Card
`Controller, Short Form Specification (Rev. 1.0 – 2004 March 26)
`
`SmartMX, P5CD036 Secure Dual Interface PKI Smart Card
`Controller, Short Form Specification (Rev. 1.0 – 2004 March 26)
`
`SmartMX, P5CT072 Secure Dual Interface PKI Smart Card
`Controller, Short Form Specification (Rev. 1.3 – 4 October
`2004)
`
`Mifare proX, P8RF6016 Secure Dual Interface Smart Card IC,
`Short Form Specification (Revision 1.0 – November 2003)
`
`xii
`
`

`

`Exhibit No. Description
`
`1014
`
`1015
`
`1016
`
`1017
`
`1018
`
`1019
`
`1020
`
`1021
`
`1022
`
`1023
`
`1024
`
`1025
`
`1026
`
`1027
`
`1028
`
`1029
`
`ETSI TS 102 226 V6.12.0 (2005-09), “Smart cards; Remote
`APDU structure for UICC based applications (Release 6)”
`
`Wenninger et al., “The Electronic Purse,” in Current Issues in
`Economics and Finance, Volume 1, Number 1, Federal Reserve
`Bank of New York (April 1995).
`
`RESERVED
`
`Excerpt from Cambridge Business English Dictionary
`
`U.S. Patent No. 6,983,882
`
`RFID Handbook – Radio-Frequency Identification Fundamentals
`and Applications, Klaus Finkenzeller, John Wiley & Son, Ltd.
`(1999)
`
`RESERVED
`
`ISO/IEC 7816-4:1995 Interindustry commands for interchange
`(May 1995)
`
`U.S. Government General Services Administration (GSA) Smart
`Card Handbook (FEB 2004)
`
`“Here Comes The Wallet Phone,” IEEE Spectrum, November
`2005
`
`File History of U.S. Patent No. 9,189,787 (“’787 FH”)
`
`RESERVED
`
`RFC 3261, SIP: Session Initiation Protocol, The Internet Society
`(June 2002).
`
`RESERVED
`
`RESERVED
`
`RESERVED
`
`xiii
`
`

`

`Exhibit No. Description
`
`1030
`
`1031
`
`1032
`
`1033
`
`1034
`
`1035
`
`1036
`
`1037
`
`1038
`
`1039
`
`1040
`
`1041
`
`1042
`
`1043
`
`
`
`RESERVED
`
`RESERVED
`
`RESERVED
`
`RESERVED
`
`RESERVED
`
`RESERVED
`
`RESERVED
`
`RESERVED
`
`RESERVED
`
`U.S. Patent Application Publication No. 2006/0196931
`
`Declaration of Sylvia Hall-Ellis, Ph.D.
`
`U.S. Patent Application Publication No. 2006/0174352
`(“Thibadeau”)
`
`File history of U.S. Patent No. 9,240,009 (“’009 FH”)
`
`U.S. Patent No. 9,189,787
`
`xiv
`
`

`

`Apple Inc. hereby seeks inter partes review of claims 1-17 (“the Challenged
`
`Claims”) of U.S. Patent No. 9,240,009. Ex. 1001 (the “’009 patent”).
`
`I.
`
`BACKGROUND
`
`The ’009 patent proclaims that “the present invention is related to techniques
`
`for personalizing a secure element and provisioning an application such as an
`
`electronic purse that can be advantageously used in portable devices” for use in
`
`conducting commercial transactions. Ex. 1001, 1:18-24. One concern that the ’009
`
`patent purportedly addressed was “concerns in the NFC mobile ecosystem” about
`
`security. Id., 2:9-10. The patent states that “there is a need to provide techniques to
`
`personalize a secure element in a contactless smart card or an NFC enabled mobile
`
`device so that such a device is so secured and personalized when it comes to financial
`
`applications or secure transactions.” Id., 2:10-14. The “secure element” (SE) in the
`
`patent “may be in form of a smart card.” Id., 6:45, 6:58-62. Processes for installing,
`
`personalizing, and removing applications from “secure elements” are claimed. Ex.
`
`1001, cl.1, 6 (personalizing application), 13 (removing application); Ex. 1003, ¶¶30-
`
`37.
`
`The problem is that the examiner was unaware of Dua, which discloses
`
`“embedded smart card[s]” in wireless devices that can have “mini-programs” called
`
`“extensions” stored on the card for performing a variety of financial transactions,
`
`like paying for subway fare. Ex. 1004, ¶¶[0289]-[0295]. The examiner was also not
`
`1
`
`

`

`presented with an industry standard for performing operations on smart cards called
`
`“GlobalPlatform” which describes how to do what the patent alleges was the
`
`invention: personalizing and securing a smart card. Ex. 1006, pp. 51-103 (§§6-8)
`
`(describing “Card Manager,” “Security Domains” including use of same for
`
`“Personalization Support,” and “Secure Communication”); Ex. 1003, ¶¶46-50. As
`
`shown below, the challenged claims would not have issued had the examiner known
`
`of the references applied herein.
`
`II. MANDATORY NOTICES UNDER 37 C.F.R. § 42.8(A)(1) FOR INTER
`PARTES REVIEW
`A.
`Real Party in Interest Under 37 C.F.R. § 42.8(b)(1)
`
`The real parties-in-interest in this petition are Samsung Electronics
`
`America, Inc. and Samsung Electronics Co., Ltd.
`
`B.
`
`Related Matters Under 37 C.F.R. § 42.8(b)(2)
`
`Petitioner identifies the following related matters:
`
`• RFCyber Corp. v. Apple Inc., 6:21-cv-00916 (W.D. Tex.) (the
`
`“Apple case”);
`
`• RFCyber Corp. v. Google LLC et al., 2:20-cv-00274 (E.D. Tex.)
`
`(the “Google case”);
`
`• RFCyber Corp v. LG Electronics, Inc., 2:20-cv-00336 (E.D. Tex.);
`
`• RFCyber Corp. v. Samsung Electronics Co., Ltd. et al., 2:20-cv-
`
`00335 (E.D. Tex.) (the “Samsung case”);
`
`2
`
`

`

`• Google LLC v. RFCyber Corp., PGR2021-00028 and 00029
`
`concerning U.S. Patent No. 10,600,046;
`
`• Google LLC v. RFCyber Corp., IPR2021-00954 concerning U.S.
`
`Patent No. 8,448,855;
`
`• Google LLC v. RFCyber Corp., IPR2021-00955 concerning U.S.
`
`Patent No. 9,189,787
`
`• Google LLC v. RFCyber Corp., IPR2021-00956 concerning U.S.
`
`Patent No. 9,240,009;
`
`• Google LLC v. RFCyber Corp., IPR2021-00957 concerning U.S.
`
`Patent No. 8,118,218;
`
`• Google LLC v. RFCyber Corp., IPR2021-00978 concerning U.S.
`
`Patent No. 8,448,855;
`
`• Google LLC v. RFCyber Corp., IPR2021-00979 concerning U.S.
`
`Patent No. 8,118,218;
`
`• Google LLC v. RFCyber Corp., IPR2021-00980 concerning U.S.
`
`Patent No. 9,189,787;
`
`• Apple Inc. v. RFCyber Corp., PGR2022-00003 concerning U.S.
`
`Patent No. 10,600,046;
`
`• Samsung Electronics America, Inc., et al. v. RFCyber Corp.,
`
`IPR2021-00981 concerning U.S. Patent No. 9,240,009;
`
`3
`
`

`

`• Samsung Electronics America, Inc., et al. v. RFCyber Corp.,
`
`IPR2021-00979 concerning U.S. Patent No. 8,118,218;
`
`• Samsung Electronics America, Inc., et al. v. RFCyber Corp.,
`
`IPR2021-00980 concerning U.S. Patent No. 9,189,787;
`
`• Samsung Electronics America, Inc., et al. v. RFCyber Corp.,
`
`IPR2021-00978 concerning U.S. Patent No. 8,448,855.
`
`Petitioner is a party to the Apple case, which is in its earliest stages: no
`
`scheduling conference has occurred, and Apple has not yet answered the amended
`
`complaint, which was filed on December 2, 2021.
`
`The instant petition is substantively identical to Samsung’s petition in
`
`IPR2021-00981. That proceeding was instituted on December 15, 2021, and
`
`Petitioner has filed a motion to join IPR2021-00981.
`
`In addition to joining IPR2021-00981, Petitioner is filing a substantively
`
`identical petition and motion to join Samsung’s IPR2021-00980. That proceeding
`
`was also instituted on December 15, 2021.
`
`The undersigned is unaware of any other judicial or administrative matter that
`
`would affect, or be affected by, a decision in the proceeding.
`
`C.
`
`Lead and Backup Counsel Under 37 C.F.R. § 42.8(b)(3) and Service
`Information under 37 C.F.R. § 42.8(b)(4)
`
`Petitioner designates the following lead and backup counsel:
`
`4
`
`

`

`Lead Counsel
`Adam P. Seitz (Reg. No. 52,206)
`Adam.Seitz@eriseip.com
`PTAB@eriseip.com
`
`Postal and Hand-Delivery Address:
`ERISE IP, P.A.
`7015 College Blvd., Suite 700
`Overland Park, Kansas 66211
`Telephone: (913) 777-5600
`Fax: (913) 777-5601
`
`Back-Up Counsel
`Paul R. Hart (Reg. No. 59,646)
`Paul.Hart@eriseip.com
`
`
`Postal and Hand-Delivery Address:
`ERISE IP, P.A.
`5299 DTC Blvd., Ste. 1340
`Greenwood Village, Colorado 80111
`Telephone: (913) 777-5600
`Fax: (913) 777-5601
`
`Service on Petitioner may be made by mail or hand delivery to: Erise IP, P.A., 7015
`
`College Boulevard, Suite 700, Overland Park, Kansas 66211. Petitioner also
`
`consents to and prefers electronic service by emailing PTAB@eriseip.com and
`
`counsel of record (shown above).
`
`III. PAYMENT OF FEES UNDER 37 C.F.R. § 42.15
`Petitioner authorizes the U.S. Patent & Trademark Office to charge Deposit
`
`Account No. 50-6159 for the fee set in 37 C.F.R. § 42.15(a) for this Petition and
`
`further authorizes for any additional fees to be charged to this Deposit Account.
`
`IV. CERTIFICATION OF WORD COUNT UNDER 37 C.F.R. § 42.24(D)
`Petitioner certifies that the word count in this Petition is 13,363 words,
`
`as counted by the word-processing program Microsoft Word used to generate this
`
`Petition, where such word count excludes the table of contents, table of authorities,
`
`mandatory notices, certificate of service, appendix of exhibits, and this certificate
`
`5
`
`

`

`of word count. This Petition is in compliance with the 14,000 word limit set forth
`
`in 37 C.F.R. § 42.24(a)(1)(i).
`
`V. REQUIREMENTS FOR IPR UNDER 37 C.F.R. § 42.104
`A. Grounds for Standing Under 37 C.F.R. § 42.104(a)
`Petitioner certifies that the ’009 patent is available for inter partes review,
`
`and that Petitioner is not barred or estopped from requesting an IPR on the
`
`grounds identified herein.
`
`B.
`
`Identification of Challenge Under 37 C.F.R. § 42.104(b) and Relief
`Requested
`
`Petitioner presents the following grounds and requests that the challenged
`
`claims be canceled:
`
`Ground Challenged Claim(s) Prior Art
`
`1
`
`2
`
`3
`
`1-6, 13-17
`
`7-10
`
`11-12
`
`Dua (Ex. 1004) and
`GlobalPlatform (Ex. 1006)
`
`Dua, GlobalPlatform, and Smart
`Card Handbook (Ex. 1008)
`
`Dua, GlobalPlatform, Smart Card
`Handbook, and Thibadeau (Ex.
`1041)
`
`VI. THE ’009 PATENT
`
`A. Overview
`
`An overview of the ’009 patent is given in Section I.
`
`Basis
`
`§103
`
`§103
`
`§103
`
`6
`
`

`

`B.
`
`Effective Filing Date
`
`To resolve Petitioner’s challenge, the Board may presume that the effective
`
`filing date of the ’009 patent is September 24, 2006. Petitioner reserves its right
`
`to challenge priority in this or any other proceeding.
`
`C.
`
`’009 Patent’s Prosecution
`
`The ’009 patent is a continuation-in-part of two earlier-filed applications. Ex.
`
`1001, cover. The references cited by the examiner during prosecution of the earlier-
`
`filed applications and the application leading to the ’009 patent are not used herein.
`
`While the ’009 patent briefly references “a global platform,” and “a Global Platform
`
`(GP) card manager,” Ex. 1001, 15:39-40, 18:20, it cribs numerous concepts from the
`
`prior art GlobalPlatform standards and fails to add non-obvious modifications to the
`
`cribbed material. Although Applicants drew heavily from GlobalPlatform, they
`
`never provided a copy to the Patent Office.
`
`A significant issue during prosecution was whether the claims were entitled
`
`to either parent applications’ filing date. Ex. 1044, pp. 140-142, 168-170, 179-182,
`
`205-208. The examiner ultimately agreed with Applicant that the claims were
`
`entitled to a filing date of April 23, 2007. Ex. 1044, p. 214. The examiner then
`
`rejected the claims as being obvious over publications to Labrou and Rackley. Id.,
`
`pp. 215-222. Applicants distinguished Labrou because Labrou’s use of a phone
`
`number to conduct a secure transaction was not the same as using “multiple
`
`7
`
`

`

`identifiers” to identify “multiple applications . . . running on the mobile device” and
`
`because Labrou was “silent about a secure element in a mobile device.” Ex. 1044,
`
`pp. 239-240. Applicants also argued that Rackley did not disclose “provisioning an
`
`installed application with a secure element.” Ex. 1044, p. 240. This led to allowance
`
`of the claims. Id., pp. 252-254.
`
`VII. PETITIONER’S GROUNDS ARE NEW AND DISCRETIONARY
`DENIAL IS UNWARRANTED UNDER FINTIV
`
`Applicants’ prosecution arguments focused on how the prior art failed to
`
`disclose a secure element that was personalized and the identification of applications
`
`using application identifiers (as opposed to phone numbers). Supra §VI.C.3. These
`
`features—as well as the other features of the Challenged Claims—are obvious over
`
`Dua and GlobalPlatform, neither of which have been considered by the Office in the
`
`context of the ’009 patent claims before. Dua discloses an “embedded smart card”
`
`in a wireless device and GlobalPlatform describes a standardized process for
`
`securing a smart card that includes identifying applications by Application
`
`Identifiers (AIDs) on the smart card. Ex. 1004, ¶¶[0295], [0309]; Ex. 1006, p. 20
`
`(§1.4) (AID is “Application Identifier”). These teachings are relevant to Applicant’s
`
`distinctions over the prior art and the allowance of the claims.
`
`Fintiv
`
`A.
`Petitioners submit the Fintiv factors weigh against exercising authority to
`
`deny. Specifically, Petitioner is seeking to join an already instituted proceeding,
`
`8
`
`

`

`which will conclude with a final written decision by December 15, 2022. The
`
`District Court proceedings are at the earliest stage: no scheduling conference has
`
`occurred, and Apple has not yet answered the amended complaint, which was just
`
`filed on December 2, 2021. Based on the expected schedule that will govern the
`
`district court litigation, the final written decision will issue long before any district
`
`court trial.
`
`VIII. PERSON OF ORDINARY SKILL IN THE ART (“POSITA”)
`A POSITA in the field of the ’009 patent at the time of the effective filing date
`
`would have been knowledgeable regarding mobile payment methods and systems
`
`pertinent to the ’009 patent. A POSITA would have had at least a bachelor’s
`
`degree in computer science, computer engineering, electrical engineering or an
`
`equivalent, and about one year of professional experience relating to mobile
`
`payment
`
`technology, which would have exposed
`
`them
`
`to concepts
`
`like
`
`GlobalPlatform and smart cards. Lack of professional experience could be remedied
`
`by additional education, and vice versa. Ex. 1003, ¶¶28-29.
`
`IX. CLAIM CONSTRUCTION
`Under Phillips v. AWH Corp., 415 F.3d 1303, 1312-16 (Fed. Cir. 2005) (en
`
`banc), claim terms are typically given their ordinary and customary meanings, as
`
`would have been understood by a POSITA, at the time of the invention, having taken
`
`into consideration the language of the claims, the specification, and the prosecution
`
`9
`
`

`

`history of record.1 Petitioner applies the plain and ordinary meaning to the claims as
`
`no specific constructions are required to resolve the grounds presented in this
`
`Petition.
`
`X. OVERVIEW OF PRIOR ART
`A. Dua
`
`Dua was filed January 21, 2005 and published on July 27, 2006 making it
`
`§§102(a), (e) prior art.2 Ex. 1004, cover. Dua is analogous art to the ’009 patent
`
`because it discloses e-purses in a smart card on a mobile device to pay for things like
`
`subway fare. Id., ¶¶[0288]-[0289], [0293]-[0295], [0368].
`
`Dua discloses a “system and methodology for conducting financial and other
`
`transactions using a wireless device.” Id., Abstract. Dua’s wireless device includes
`
`a “wallet application” that receives, stores, manages, and transmits multiple
`
`payment, identification, and other confidential information electronically. Id.,
`
`¶[0041]. Card issuers like banks or merchants can develop custom “extensions”
`
`which are installed in the wallet application and stored in an embedded smart card.
`
`Id., ¶¶[0289], [0295]. One example of an extension is a stored-value card extension
`
`for paying subway fare. Id., ¶¶[0290], [0293]. The stored value card extension
`
`
`1 The claims may be invalid for reasons not raised herein, including reasons based
`
`on statutory grounds unavailable in an IPR.
`
`2 All references to §102 are to pre-AIA §102.
`
`10
`
`

`

`“need[s] to be programmed” to support “over-the-air reload,” i.e., wireless funding
`
`of the e-purse. Id., ¶[0293]; Ex. 1003, ¶¶78-82.
`
`B. GlobalPlatform
`
`GlobalPlatform is a printed publication under §102(b) because it was printed,
`
`distributed, and publicly accessible by April 2003. Ex. 1003, ¶¶43-45. Mr. Smith,
`
`former Board Member of GlobalPlatform, knows that Ex. 1003 was released in
`
`March 2003 and was publicly available by April 2003 for free download on
`
`GlobalPlatform’s website. Id., ¶¶13, 44. Those interested in smart cards knew of
`
`GlobalPlatform’s activities and how to access Ex. 1003. Ex. 1003, ¶¶44-45; Ex.
`
`1008, pp.290, 9943; Ex. 1022, pp.29 n.16, 33; Ex. 1014, pp.5, 11, 12; Ex. 1039,
`
`¶[0063]. GlobalPlatform is analogous to the ’009 patent because it discloses
`
`creating secure channels for personalization of smart cards and subsequent secure
`
`communications. Ex. 1001, 15:39-44, 18:19-20, 18:52-57.
`
`GlobalPlatform is a “hardware-neutral,” “vendor-neutral,” and “Application-
`
`independent” “chip card standard” which “provides a common security and card
`
`management architecture.” Ex. 1006, p.16; Ex. 1008, p. 290. “GlobalPlatform is
`
`intended to run on top of any secure, multi-application card runtime environment”
`
`including Java Card. Ex. 1006, pp. 16 (§1), 29 (§3.1). GlobalPlatform specifies the
`
`card architecture, security architecture, Life Cycle models for smart cards and their
`
`
`3 Citations to Ex. 1008 are to actual page numbers of the book.
`
`11
`
`

`

`Applications, the Card Manager, Security Domains for key management and
`
`establishing Secure Channels.4 Ex. 1003, ¶¶51-63. GlobalPlatform describes
`
`sequences of commands for installing, personalizing, and deleting applications on
`
`multi-application smart cards. Ex. 1006, pp. 65-67, 88-90.
`
`Smart Card Handbook
`
`C.
`The Third Edition of Smart Card Handbook was published by reputable
`
`publisher John Wiley & Sons, Ltd. in 2003 and is a printed publication under
`
`§102(b). Ex. 1008, p. 7 (proceeding number); Ex. 1040, ¶¶39-44. This book was
`
`distributed and accessible to members of the public interested in the subject matter
`
`of smart cards on or shortly after August 22, 2003. Ex. 1040, ¶44. It has been
`
`available at the Linda Hall Library and was cataloged by subject matter at the Library
`
`of Congress in 2003. Ex. 1040, ¶¶42-44. Smart Card Handbook is analogous to the
`
`’009 patent because both relate to smart cards. Ex. 1001, 6:58-59 (“SE may be in
`
`form of a smart card”).
`
`Smart Card Handbook describes well-known techniques used in smart cards
`
`and smart card management. Ex. 1003, ¶¶84-92. For instance, it describes card
`
`management systems that employ databases for holding data related to unique smart
`
`cards and data on the cards themselves. Ex. 1041, pp. 251, 301, 600. Moreover,
`
`Smart Card Handbook discusses managing security keys on smart cards. Ex. 1041,
`
`
`4 Petitioner capitalizes terms defined in GlobalPlatform just as GlobalPlatform does.
`
`12
`
`

`

`pp. 202-208. The book explains that one technique for generating keys during
`
`personalization includes the use of a “card number” or “chip number” to generate an
`
`encryption key by a security module to secure the personalization data transmitted
`
`to the card.
`
`
`
`Ex. 1008, p. 645.
`D.
`
`Thibadeau
`
`Thibadeau is prior art to the ’009 patent under at least §§102(a), (e) because
`
`it was filed January 31, 2006 and published August 3, 2006. Ex. 1041, cover.
`
`Thibadeau describes a way of storing “virtual smart cards” managed by “Card
`
`Operating System,” software “needed to
`
`interface
`
`into” standardized card
`
`environments such as GlobalPlatform-based smart cards. Ex. 1041, ¶¶[0091],
`
`[0099]; Ex. 1003, ¶¶94-96. Thibadeau is analogous to the ’009 patent because both
`
`13
`
`

`

`relate to smart cards, and even mention Java Card and the ISO 7816 smart card
`
`standards. Ex. 1001, 13:15-19; Ex. 1041, ¶¶[0099]-[0100].
`
`XI. DETAILED ANALYSIS
`A. Ground 1: Dua in view of GlobalPlatform render obvious claims 1-6
`and 13-17
`1.
`
`The scope and content of the prior art
`
`For Ground 1, the prior art consists of Dua and GlobalPlatform.
`2. Motivation/Rationale for Combining the Prior Art
`
`Dua discloses “a novel system and methodology

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket