throbber
Case 6:21-cv-00916-ADA Document 43 Filed 04/19/22 Page 1 of 27
`
`IN THE UNITED STATES DISTRICT COURT
`FOR THE WESTERN DISTRICT OF TEXAS
`WACO DIVISION
`
`RFCYBER CORP.,
`
`v.
`
`APPLE INC.,
`
`Plaintiff,
`
`Defendant.
`
`Civil Action No. 6:21-cv-00916-ADA
`
`JURY TRIAL DEMANDED
`
`DEFENDANT APPLE INC.’S OPENING CLAIM CONSTRUCTION BRIEF
`
`WEST\298299817.1
`
`

`

`Case 6:21-cv-00916-ADA Document 43 Filed 04/19/22 Page 2 of 27
`
`TABLE OF CONTENTS
`
`Page
`
`I.
`II.
`
`III.
`IV.
`
`V.
`
`B.
`
`C.
`
`INTRODUCTION ...............................................................................................................1
`OVERVIEW OF THE ASSERTED PATENTS..................................................................1
`A.
`U.S. Patent Nos. 8,118,218, 8,448,855, and 9,189,787 ...........................................2
`B.
`U.S. Patent Nos. 9,240,009 and 10,600,046 ............................................................4
`C.
`U.S. Patent No. 11,018,724......................................................................................5
`AGREED CONSTRUCTIONS ...........................................................................................7
`DISPUTED CLAIM TERMS ..............................................................................................8
`A.
`“e-purse” / “electronic purse” / “e-purse applet” .....................................................8
`1.
`The Intrinsic Record Confirms That An E-Purse Stores Electronic
`Value. ...........................................................................................................9
`The Extrinsic Evidence, Including RFCyber’s Prior Concessions,
`Confirms That An E-Purse Stores Electronic Value..................................13
`RFCyber’s Newly Minted Position Would Contradict The Intrinsic
`Record And The Extrinsic Evidence. .........................................................14
`“payment server” ...................................................................................................15
`1.
`The Intrinsic Record Confirms That A Payment Server Is A Server
`For Payment Transactions..........................................................................16
`The Extrinsic Evidence, Including RFCyber’s Prior Concessions,
`Confirms That A Payment Server Is A Server For Payment
`Transactions. ..............................................................................................17
`“security authentication module” / “SAM” ...........................................................18
`1.
`The Intrinsic Record Confirms That The Security Authentication
`Module Must Contain Data To Authenticate Transactions Of
`Funds. .........................................................................................................18
`The Extrinsic Evidence Confirms That A Security Authentication
`Module Must Contain Data To Authenticate Transactions Of
`Funds. .........................................................................................................19
`D.
`“application” ..........................................................................................................20
`CONCLUSION ..................................................................................................................22
`
`2.
`
`3.
`
`2.
`
`2.
`
`WEST\298299817.1
`
`i
`
`

`

`Case 6:21-cv-00916-ADA Document 43 Filed 04/19/22 Page 3 of 27
`
`TABLE OF AUTHORITIES
`
`
`
`Page(s)
`
`Cases
`
`Amazon.com, Inc. v. Barnesandnoble.com, Inc.,
`239 F.3d 1343 (Fed. Cir. 2001)................................................................................................14
`
`Aylus Networks, Inc. v. Apple Inc.,
`856 F.3d 1353 (Fed. Cir. 2017)................................................................................................14
`
`CommScope Techs. LLC v. Dali Wireless Inc.,
`10 F.4th 1289 (Fed. Cir. 2021) ................................................................................................14
`
`Groove Digital v. United Bank,
`825 F. App’x 852 (Fed. Cir. 2020) ..........................................................................................17
`
`HTC Corp. v. Cellular Commc’ns Equip., LLC
`701 F. App’x 978 (Fed. Cir. 2017) ............................................................................................9
`
`Profectus Tech. LLC v. Huawei Technologies Co.,
`823 F.3d 1375 (Fed. Cir. 2016)................................................................................................17
`
`SpeedTrack, Inc. v. Amazon.com,
`998 F.3d 1373 (Fed. Cir. 2021)................................................................................................14
`
`Trading Tech. Intl., Inc. v. Open E Cry, LLC,
`728 F.3d 1309 (Fed. Cir. 2013)..................................................................................................8
`
`WEST\298299817.1
`
`i
`
`

`

`Case 6:21-cv-00916-ADA Document 43 Filed 04/19/22 Page 4 of 27
`
`Defendant Apple Inc. submits its Opening Claim Construction Brief for U.S. Patent Nos.
`
`8,118,218 (“the ’218 patent”); 8,448,855 (“the ’855 patent”); 9,189,787 (“the ’787 patent”);
`
`9,240,009 (“the ’009 patent”); 10,600,046 (“the ’046 patent”); and 11,018,724 (“the ’724
`
`patent”) (the “Asserted Patents”).
`
`I.
`
`INTRODUCTION
`
`Apple’s constructions rely on the intrinsic record and statements made during related
`
`proceedings to clarify the handful of disputes between the parties. Regarding the “e-purse”
`
`terms, Apple’s construction holds true to the use of those terms in the claims and specification
`
`and in the relevant extrinsic evidence. While RFCyber proposes a broader construction,
`
`RFCyber disclaimed that scope during prosecution. Apple’s construction of “payment server”
`
`provides useful guidance by explaining that the term refers specifically to servers for payment
`
`transactions, a point RFCyber acknowledged via its proposed construction for the same claim
`
`term in a prior case. Apple has proposed a construction for “security authentication module” that
`
`clarifies the term must contain the data used for authentication rather than merely some portion
`
`of the data. Lastly, regarding “application,” Apple’s proposed construction explains that the
`
`term refers to a complete software program capable of execution, rather than partial or
`
`incomplete software snippets. In each instance, Apple’s constructions address and clarify the
`
`disputed issues based on the use of the same and similar terms in the asserted patents.
`
`II.
`
`OVERVIEW OF THE ASSERTED PATENTS
`
`The six Asserted Patents generally relate to mobile payments, and, in particular, the
`
`personalization, funding, and use of an electronic purse (“e-purse”) on a smart card in a portable
`
`device to conduct secure transactions.
`
`WEST\298299817.1
`
`1
`
`

`

`Case 6:21-cv-00916-ADA Document 43 Filed 04/19/22 Page 5 of 27
`
`A.
`
`U.S. Patent Nos. 8,118,218, 8,448,855, and 9,189,787
`
`The ’218, ’855, and ’787 patents share a common specification and describe an e-purse
`
`on a smart card in a Near Field Communication (“NFC”)-enabled mobile phone or other portable
`
`device, which allows the device to conduct secure payment transactions either over a wireless
`
`network (“m-commerce”) or via an RFID reader (“e-commerce”). ’218 patent at 1:6-22, 1:34-38,
`
`Fig. 2. The patents refer to an e-purse as a “single functional card” having “stored values,” i.e.,
`
`electronic money, for performing “micro payment transactions.” Id. at 1:14-17, 1:23-27, 3:51-55,
`
`3:61-63, 4:2-7, 4:62-64. The patents explain that “[s]ingle functional cards have been
`
`successfully used in enclosed environments such as transportation systems” and highlight the
`
`MIFARE card as a widely used e-purse. Id. at 1:13-22. They assert, however, that “such enclosed
`
`systems are difficult to be expanded into other areas such as e-commerce and m-commerce
`
`because stored values and transaction information are stored” in a way that is “protected by a set
`
`of keys,” and “the keys need to be delivered to the card for authentication before data can be
`
`accessed during a transaction.” Id. at 1:23-29. Thus, there is “a need for a mechanism in devices,
`
`especially portable devices, functioning as an electronic purse (e-purse) to be able to conduct
`
`transactions over an open network with a payment server without compromising security.” Id. at
`
`1:34-38.
`
`The patents’ purported solution is to provide “a mechanism to be embedded” in the
`
`portable device to function as an e-purse and provide the necessary security. Id. at 2:42-46. That
`
`“mechanism” is a smart card. Id. at 2:10-41. The smart card comes with a preloaded operating
`
`system, such as Java Card Open Platform (“JCOP”), which provides “a general security
`
`framework,” such as the GlobalPlatform standard, for “card personalization.” Id. at 4:8-22, 4:41-
`
`46, 4:50-56. The operating system’s security “control[s] the access to the smart card (e.g., an
`
`installation of external applications into the smart card).” Id. at 4:47-50.
`2
`
`WEST\298299817.1
`
`

`

`Case 6:21-cv-00916-ADA Document 43 Filed 04/19/22 Page 6 of 27
`
`The patents explain that “multiple application smart cards” – including the well-known
`
`SmartMX smart card by Philips – can also come “pre-loaded with an emulator,” such as a
`
`MIFARE emulator, allowing the multi-application smart card to mimic (or “emulate”) single
`
`functional cards such as a MIFARE transit card for use with MIFARE readers. Id. at 2:14, 2:27-
`
`28, 3:51-60, 4:62-64, Fig. 2.
`
`The ’218, ’855, and ’787 patents teach that a smart card, including an e-purse applet or
`
`emulator in the smart card, can be personalized using a GlobalPlatform card manager to establish
`
`a secure channel between the e-purse and a server. Id. at 4:11-22, 5:50-54. Personalization
`
`involves loading a specific user’s data into the e-purse, e.g., the user’s account information,
`
`“operation keys (e.g., a load key and a purchase key), default PINs, administration keys (e.g., an
`
`unblock PIN key and a reload PIN key), and passwords (e.g., from Mifare).” Id. at 5:54-59.
`
`Smart cards that comply with the GlobalPlatform standard have at least one security domain that
`
`“includes three 3DES keys,” which are encryption keys that are “used to generate session keys
`
`for a secured session between two entities,” i.e., a security channel. Id. at 6:29-47, Fig. 3C. The
`
`security domain and encryption keys are “installed by a card issuer.” Id. at 6:48-54. Another set
`
`of keys can also be generated and distributed to the e-purse applet to secure subsequent
`
`operations. Id. at 6:55-7:9, Fig. 3C.
`
`The ’218, ’855, and ’787 patents also describe a process for funding the e-purse – a
`
`necessary step for using it to conduct transactions. Id. at 7:10-13, 8:7-12, Figs. 4A-4C. After a
`
`valid PIN entry, the midlet initiates an over-the-air (“OTA”) “top off request,” sending a request
`
`to the e-purse applet. Id. at 7:22-28, Fig. 4A. The e-purse applet composes a response to the
`
`request, which is sent via the midlet to “a payment network and server over a wireless network.”
`
`Id. at 7:29-32, Fig. 4A. The response is verified and then a bank account at a financial institution
`
`WEST\298299817.1
`
`3
`
`

`

`Case 6:21-cv-00916-ADA Document 43 Filed 04/19/22 Page 7 of 27
`
`is verified. Id. at 7:35-44, Fig. 4A. A response is then sent back to the midlet after which
`
`commands are extracted from the response and sent to the e-purse. Id. at 7:45-48, Fig. 4B. The e-
`
`purse verifies the commands and then updates the emulator and transaction logs to reflect the
`
`updated stored value. Id. at 7:48-51, Fig. 4B.
`
`B.
`
`U.S. Patent Nos. 9,240,009 and 10,600,046
`
`The ’009 and ’046 patents are continuations-in-part of the ’218 patent and describe
`
`mobile devices with “secure elements” that can securely host “an application such as an
`
`electronic purse” for conducting secured transactions over a network. ’009 patent at 1:18-24. The
`
`’009 and ’046 patents share a common specification that includes the disclosures found in the
`
`’218, ’855, and ’787 patent specifications, as well as additional disclosures and figures.
`
`The ’009 patent states:
`
`[T]here is a need to provide techniques to personalize a secure element in a contactless
`smart card or an NFC-enabled mobile device so that such a device is so secured and
`personalized when it comes to financial applications or secure transactions. With a
`personalized secure element in an NFC-enabled mobile device, various applications
`or services, such as electronic purse or payments, can be realized.
`
`Id. at 2:10-17. The ’009 patent teaches that when a mobile device is obtained, the secure element
`
`(“SE”) “is installed with a set of default keys (e.g., an Issuer Security Domain (ISD) key set by
`
`the SE manufacturer).” Id. at 6:55-58, 8:46-48. “[A] standard-compliant secure element comes
`
`with one issuer security domain (ISD) and an option for one or more supplemental security
`
`domains (SSD). Each of these domains includes a set of keys.” Id. at 7:1-4.
`
`The ’009 patent explains that the “SE 102 needs to go through a personalization process
`
`before it can be used.” Id. at 7:13-14. “The personalization process can be done either physically
`
`in a service center or remotely via a web portal by a TSM server.” Id. at 7:49-51. A “TSM,
`
`standing for Trusted Service Management, is a collection of services” that can “help service
`
`providers securely distribute and manage contactless services for their customers using the
`4
`
`WEST\298299817.1
`
`

`

`Case 6:21-cv-00916-ADA Document 43 Filed 04/19/22 Page 8 of 27
`
`networks of mobile operators.” Id. at 7:35-39. The default “device information (e.g., ISD) of the
`
`SE” can be used to derive personalized keys to personalize the SE. Id. at 8:57-9:23. “After the
`
`personalization, the SE can only be accessed using the personalized ISD key of the SE issuer.
`
`Depending on the security requirement of each service provider, the TSM can create additional
`
`SSDs for the various providers to personalize their respective applications (e.g., the modules 104
`
`or 106 of FIG. 1A).” Id. at 9:24-29.
`
`The ’009 patent describes “an e-token enabled device,” such as “a single functional card
`
`or a portable device enabled with an e-purse” that “may represent e-money, e-coupons, e-ticket,
`
`e-voucher or any other forms of payment tokens in a device. Id. at 20:44-50. Transactions using
`
`the e-token device may occur in “real time” and “offline (i.e., without the portable device
`
`connecting to a backend POS transaction server.” Id. at 20:51-58; see also id. at Figs. 6A-6D.
`
`Figure 6D depicts “a flowchart illustrating an exemplary process [] of conducting m-commerce
`
`using a portable device.” Id. at 22:48-56, Fig. 6D. The ’009 patent explains that transactions
`
`using the e-purse may be evaluated against the value stored on the e-purse to determine whether
`
`to approve or deny the transaction or to allow the user to “top-up” and attempt re-processing. Id.
`
`at 22:57-23:20, Figs. 6C and 6D.
`
`C.
`
`U.S. Patent No. 11,018,724
`
`The ’724 is a continuation-in-part of the ’218 patent but comprises a different
`
`specification. The ’724 Patent describes an NFC equipped mobile device configured to emulate
`
`multiple different contactless card applications. ’724 patent, Abstract, 1:8-11, 1:33-36, 5:66-6:6.
`
`Depicted below in Fig. 1A, a key focus of the ’724 Patent is secure element 108, which contains
`
`multiple card applications, an emulator, and a Trusted Mifare Service Manager (TMSM) 106 to
`
`support multiple cards in a single device:
`
`WEST\298299817.1
`
`5
`
`

`

`Case 6:21-cv-00916-ADA Document 43 Filed 04/19/22 Page 9 of 27
`
`Id., Fig. 1A, Abstract, 1:54-2:3, 6:17-55.
`
`Applications and their associated security domains are downloaded and installed and
`
`personalized on the secure element by the TMSM 106. Id., 7:1-12, 7:43-47. The TMSM is also
`
`responsible for allowing a user to swap applications into or out of emulator 122, e.g., to use a
`
`different card for an upcoming transaction. Id., 1:61-64, 7:8-47 (noting that one application
`
`should always remain “activated”).
`
`The ’724 Patent describes additional features related to the multi-card mobile device and
`
`swapping applications via the emulator. For example, applications can be locked such that they
`
`may not be swapped into the emulator until they are unlocked. Id., 9:60-64. Additionally, the
`
`’724 Patent contemplates retaining certain data from a first application for use by a second
`
`application (i.e., a partial swap) or simply swapping applications and their data in their entirety
`
`(i.e., a complete swap). Id., 7:29-33, 2:67-3:2. Finally, a counter can be used as an additional
`
`WEST\298299817.1
`
`6
`
`

`

`Case 6:21-cv-00916-ADA Document 43 Filed 04/19/22 Page 10 of 27
`
`layer of security. For example, “[u]pon a successful swapping, [a] counter is incremented by 1”
`
`as a way “to keep track of the [applications/server objects] that are currently swapped out.” Id.,
`
`10:7-65.
`
`III.
`
`AGREED CONSTRUCTIONS
`
`The parties met and conferred on April 8, 2022 and exchanged emails on April 12, 2022,
`
`agreeing to constructions for the following terms:
`
`No. Claim Term
`1.
`“emulator”
`
`’218 patent, claims 1, 3, 6, 11-12, 14
`’855 patent, claims 1-2, 5-6, 9, 11, 14-15
`’787 patent, claims 1, 3, 10-11, 13, 16
`“payment gateway”
`
`’046 patent, claim 1
`“smart card”/“smart card module”/“card
`module”
`
`’218 patent, claims 1, 11-12
`’855 patent, claims 1-3, 9-12
`’787 patent, claims 1, 6, 8-9, 11, 16, 18-19
`“smart card pre-loaded with the emulator”
`
`’218 patent, claims 1, 11
`“midlet”
`
`’218 patent, claims 1, 5, 7-8, 11, 15-16
`’855 patent, claims 1, 9
`’787 patent, claims 1, 10
`“personalization”/”personalizing”
`
`2.
`
`3.
`
`4.
`
`5.
`
`6.
`
`’218 patent, claims 1, 4-6, 11-12
`’855 patent, claims 1, 3, 9, 12
`’787 patent, claims 1-2, 6-7, 11-12, 16-17
`’009 patent, claims 6-7, 17
`“security channel” / “secured channel”
`
`7.
`
`
`
`’218 patent, claims 1, 3, 11, 14
`
`7
`
`WEST\298299817.1
`
`Agreed Construction
`hardware device or program that
`pretends to be another particular
`device or program that other
`components expect to interact with
`
`server or collection of servers for
`settling a payment
`
`No construction necessary; plain and
`ordinary meaning
`
`No construction necessary; plain and
`ordinary meaning
`
`No construction necessary; plain and
`ordinary meaning
`
`No construction necessary; plain and
`ordinary meaning
`
`No construction necessary; plain and
`ordinary meaning
`
`

`

`Case 6:21-cv-00916-ADA Document 43 Filed 04/19/22 Page 11 of 27
`
`No. Claim Term
`’855 patent, claims 1, 4, 9, 13
`’787 patent, claims 1, 2, 6, 11, 12, 16
`’009 patent, claims 1, 4, 14
`’724 patent, claims 1, 8
`“emulator device”
`
`8.
`
`
`
`’724 patent, claims 1, 3, 8
`
`Agreed Construction
`
`hardware device, alone or containing
`software, that pretends to be another
`particular device or program that other
`components expect to interact with
`
`IV.
`
`DISPUTED CLAIM TERMS
`
`A.
`
`“e-purse” / “electronic purse” / “e-purse applet”
`
`Term and Claims
`“e-purse” / “electronic purse” / “e-
`purse applet”
`
`’218 patent, claims 1, 3-7, 10-12,
`14-15, 18
`’855 patent, claims 1, 3-6, 9, 12-15
`’787 patent, claims 1-3, 5-6, 11-13,
`15-16
`’009 patent, claim 3
`’046 patent, claim 1
`
`Apple’s Construction
`software that stores
`electronic financial
`information, including
`electronic value, in a local
`portable device
`
`RFCyber’s Construction
`Regarding “e-purse” and
`“electronic purse”,
`“software that stores
`electronic financial
`information in a local
`device”
`
`Regarding “e-purse applet”,
`Plain and ordinary meaning
`except for the term “e-purse”
`
`The ’218, ’855, ’787, ’009 and ’046 patents (the “e-purse patents”) are directed to
`
`systems for providing and funding e-purses. The e-purse patents are part of the same family, and
`
`each later patent ultimately claims priority back to the ’218 patent. The ’218, ’855, and ’787
`
`patents share the same specification, while the ’009 and ’046 patent specifications include the
`
`same disclosures as the previous three patents, as well as additional disclosures. Because these
`
`patents claim priority to one another, share the same disclosures, and list common inventors, the
`
`use of the disputed terms in each patent informs the proper construction of the “e-purse” terms
`
`across all five e-purse patents. See Trading Tech. Intl., Inc. v. Open E Cry, LLC, 728 F.3d 1309,
`
`1323 (Fed. Cir. 2013) (“[P]rosecution history regarding a particular limitation in one patent is
`
`WEST\298299817.1
`
`8
`
`

`

`Case 6:21-cv-00916-ADA Document 43 Filed 04/19/22 Page 12 of 27
`
`presumed to inform the later use of that same limitation in related patents, ‘unless otherwise
`
`compelled.’”)
`
`The parties do not identify any meaningful distinction among the various “e-purse” terms
`
`in dispute (“e-purse,” “electronic purse,” and “e-purse applet”), so the terms should be
`
`considered together and given the same scope. See HTC Corp. v. Cellular Commc’ns Equip.,
`
`LLC, 701 F. App’x 978, 983 (Fed. Cir. 2017) (system and method claims in a patent had the
`
`same scope where parties did not assert any “meaningful” differences between them).
`
`The dispute regarding the “e-purse” terms centers around whether the electronic
`
`information stored by an e-purse includes but is not limited to electronic value. Apple contends
`
`that an e-purse stores electronic information including electronic value, as the patents describe.
`
`RFCyber takes a much broader view, contending that storage of any electronic financial
`
`information suffices. The parties do not dispute that an e-purse is software or that it stores
`
`electronic financial information in a device. The only dispute is the storage of electronic value.
`
`1.
`
`The Intrinsic Record Confirms That An E-Purse Stores Electronic
`Value.
`
`The plain claim language demonstrates that an e-purse stores “electronic value.” Claims
`
`1 and 9 of the ’855 patent recite “a method for funding an e-purse.” Claim 1 of the ’046 patent
`
`recites “verifying the total amount with a balance in the e-purse” and “displaying a
`
`confirmation in the mobile device that the balance in the e-purse has been reduced.”
`
`Unasserted claims 12 and 18 of the ’046 patent recite a “balance of an electronic purse (e-
`
`purse) maintained locally in the mobile device” where “the balance in the e-purse [is] reduced
`
`by the amount.” Dependent claims 10 and 18 of the ’218 patent recite a system or method
`
`“wherein the e-purse is funded.” The language of these claims informs the meaning of “e-
`
`purse” because there can be no “balance” or ability to “fund” the balance without storing an
`
`WEST\298299817.1
`
`9
`
`

`

`Case 6:21-cv-00916-ADA Document 43 Filed 04/19/22 Page 13 of 27
`
`electronic value. The storage of a balance of funds within the e-purse aligns with Apple’s
`
`construction that the e-purse stores “electronic value.”
`
`Indeed, RFCyber unequivocally disclaimed and distinguished an “e-purse” (which stores
`
`value locally) from an “e-wallet” (which stores card information) during prosecution of the ’218
`
`patent. The applicant asserted that U.S. Patent No. 6,607,136 (“Atsmon”) “describes [sic]
`
`entirely about e-wallet.” Ex. 1 (December 31, 2010 Response to Final Office Action) at 9. The
`
`applicant explained “[i]t is commonly known in the art that e-wallet is not the same as e-purse.”
`
`Id. “An e-wallet system has a user credit-card and personal info at the backend,” whereas “an e-
`
`purse in the instant application describes [] electronic money in a local portable device.” Id. The
`
`Atsmon reference describes an e-wallet as “a convenient application that allows the user to shop
`
`and purchase items … which contains all of his personal information.” Ex. 2 (Atsmon) at 68:53-
`
`67. When used for a purchase, the “e-wallet application would either fill out the form
`
`automatically for the user or deliver equivalent information to the website so that the sales
`
`transaction can be finalized.” Id. The applicant’s statements distinguishing Atsmon clarified
`
`that the claimed e-purse must do more than store credit card and personal information; it must
`
`store electronic money—something of value—in the local device.
`
`During the prosecution of the ’046 patent, the applicant further confirmed the correct
`
`construction of “e-purse.” The applicant explained that “the balance of the e-purse can be used
`
`to determine if the e-purse is sufficient to perform the transaction without verifying with the
`
`server.” Ex. 3 (November 28, 2019 Response to First Office Action) at 9. The applicant
`
`distinguished the prior art that “is clearly meant for credit or debit payment” and “neither teaches
`
`nor suggests the verification of a charge against the balance of a local e-purse.” Id. RFCyber
`
`WEST\298299817.1
`
`10
`
`

`

`Case 6:21-cv-00916-ADA Document 43 Filed 04/19/22 Page 14 of 27
`
`unambiguously disclaimed that an e-purse may include an e-wallet or simply storing any
`
`electronic financial information, but rather requires electronic storage of something of value.
`
`The specifications of the e-purse patents further confirm that the e-purse terms require
`
`storing electronic value. The specifications describe “viewing a purse balance.” ’218 patent at
`
`5:16-18.1 The patents also provide flowcharts describing the process for “financing [or funding]
`
`an e-purse.” ’218 patent at 7:10-18, 8:7-12 (“[P]rocess 400 is described as funding the e-purse”),
`
`Figs. 4A and 4B; ’009 patent at 17:3-5 (adding “or funding” language).2 When a user seeks to
`
`fund an e-purse, she initiates a funding or “top off request” to add to the balance stored within
`
`the e-purse. ’218 patent at 7:19-28. The terms “financing, funding, load or top-up [of] an e-
`
`purse” all refer to the process of adding electronic value to the e-purse. See ’009 patent at 5:10-
`
`12. The ’855 and ’787 patents further disclose “[t]echniques for funding an electronic purse (e-
`
`purse).” ’855 patent at Abstract; ’787 patent at Abstract; see also ’855 patent at Title (“Method
`
`and apparatus for funding an electronic purse.”)
`
`The ’009 and ’046 specifications include further disclosures that support the construction
`
`of storing “electronic value.” Figure 6D of the ’009 and ’046 patents depicts the use of an e-
`
`purse, including determining whether it contains a sufficient balance to complete the transaction.
`
`At step 672, the process sends an initial purchase request to the e-token enabled device, where
`
`the “e-token enabled device” refers to “a multi-functional card or an e-purse enabled cell phone
`
`emulating a multi-functional card.” ’009 patent at 22:57-65. The process next determines
`
`whether there is “[e]nough balance in [the] e-token enabled device” to complete the transaction.
`
`’009 patent at 22:65-23:5; Fig. 6D (shaded in yellow).
`
`1 Apple cites the ’218 patent by way of example, but these citations apply equally to the similar
`disclosures of the other e-purse patents.
`2 Apple’s citations to the ’009 patent apply equally to the similar disclosures in the ’046 patent.
`11
`
`WEST\298299817.1
`
`

`

`Case 6:21-cv-00916-ADA Document 43 Filed 04/19/22 Page 15 of 27
`
`In response to that determination, the system either denies the purchase request when
`
`“there is not enough balance in the e-token enabled device” or approves the transaction “if there
`
`is enough balance in the e-token enabled device.” ’009 patent at 22:65-23:5. “Also when there is
`
`not enough balance in the e-token enabled device, a top-up or funding operation may be
`
`performed using the process 400 illustrated in FIG. 4A and FIG. 4B.” Id. at 23:30-32. After a
`
`purchase completes, the system “deducts or debits the purchase amount from the e-token of the
`
`e-token enabled device.” Id. at 22:8-11, 23:42-45 (“Then e-token (e.g., e-money) is deducted
`
`from the e-purse 724 of the portable device 730 to pay the ticket purchase to a credit/debit
`
`system 714 (e.g., a financial institute, a bank).”). The patents also explain that a point-of-sale
`
`system may interact with the “e-token enabled device” to “check[] the current balance of [the] e-
`
`token device.” Id. at 22:37-47.
`
`WEST\298299817.1
`
`12
`
`

`

`Case 6:21-cv-00916-ADA Document 43 Filed 04/19/22 Page 16 of 27
`
`The claim language, the specifications, and the applicant’s statements during prosecution
`
`confirm the plain meaning of “e-purse” reflected in Apple’s construction, which is software that
`
`stores electronic financial information, including electronic value, in a local portable device.
`
`2.
`
`The Extrinsic Evidence, Including RFCyber’s Prior Concessions,
`Confirms That An E-Purse Stores Electronic Value.
`
`The available extrinsic evidence—including litigation positions taken by RFCyber during
`
`a related lawsuit—confirms that Apple’s construction is correct. During claim construction
`
`proceedings in the Google matter, RFCyber conceded “there is no dispute that an e-purse, like
`
`any purse, can store money.” Ex. 4 (RFCyber Claim Construction Reply in RFCyber v. Google)
`
`(“the Google Reply”). And multiple books and articles describing e-purse technology
`
`demonstrate that the “e-purse” terms store “electronic financial information, including electronic
`
`value.” These include:
`
`
`
`The Smart Card Handbook, which defines “Electronic Purse (e-purse)” as “[a]
`
`card with a chip that must be loaded with an amount of money before it can be used for making
`
`payments.” Ex. 5 at 5961;
`
`
`
`The GSA Smart Card Handbook, which defines “Electronic Purse” as “[a] chip-
`
`based application where cash or value is recorded on a chip and is available for use.” Ex. 6 at
`
`8941;
`
`
`
`A CEP Technical Specification, which defines “Electronic Purse” as “[a]n
`
`electronic purse uses an integrated circuit for the storage and processing of monetary value.” Ex.
`
`7 at 8348 (further defining “Electronic Value” as “[t]he value stored and exchanged in an
`
`electronic purse card system.” Id.
`
`WEST\298299817.1
`
`13
`
`

`

`Case 6:21-cv-00916-ADA Document 43 Filed 04/19/22 Page 17 of 27
`
`
`
`An article entitled “Shopping Without Cash,” which states “[a]n e-purse is a
`
`stored-value payment device that . . . holds electronic monetary value that substitutes for cash.”
`
`Ex. 8 at 10586.
`
`Thus, RFCyber’s prior position and the other extrinsic evidence are uniform in
`
`confirming that an e-purse stores or is capable of storing electronic value. Apple’s construction
`
`therefore reflects the universally plain meaning of that term.
`
`3.
`
`RFCyber’s Newly Minted Position Would Contradict The Intrinsic
`Record And The Extrinsic Evidence.
`
`Contradicting its position in the Google case, RFCyber’s new proposal (“software that
`
`stores electronic financial information in a local device”) would improperly broaden the term to
`
`try to recapture claim scope disclaimed during prosecution. Despite distinguishing the prior art
`
`on this basis during prosecution, and therefore arguing for a narrower construction of “e-purse,”
`
`RFCyber now rejects those earlier assertions in favor of a broader construction that would allow
`
`storage of any electronic financial information within the e-purse to satisfy this term. The
`
`doctrine of prosecution disclaimer exists to ensure that the proper construction of a term cannot
`
`be twisted to first avoid prior art but then later to encompass the same structures under
`
`infringement. See CommScope Techs. LLC v. Dali Wireless Inc., 10 F.4th 1289, 1299 (Fed. Cir.
`
`2021) (applying “the principle that a ‘patent may not, like a nose of wax, be twisted one way to
`
`avoid anticipation and another to find infringement.’”) (quoting Amazon.com, Inc. v.
`
`Barnesandnoble.com, Inc., 239 F.3d 1343, 1351 (Fed. Cir. 2001)); See Aylus Networks, Inc. v.
`
`Apple Inc., 856 F.3d 1353, 1360 (Fed. Cir. 2017) (““Ultimately, the doctrine of prosecution
`
`disclaimer ensures that claims are not ‘construed one way in order to obtain their allowance and
`
`in a different way against accused infringers.’”). Courts have repeatedly acknowledged the
`
`necessity of uniform claim interpretation across both analyses. See SpeedTrack, Inc. v.
`
`WEST\298299817.1
`
`14
`
`

`

`Case 6:21-cv-00916-ADA Document 43 Filed 04/19/22 Page 18 of 27
`
`Amazon.com, 998 F.3d 1373, 1379-80 (Fed. Cir. 2021) (finding prosecution disclaimer arising
`
`from claim amendments and the applicant’s arguments where the earlier arguments contradict
`
`later litigation positions).
`
`Likewise, RFCyber cannot now rewrite its prosecution statements to contradict the very
`
`prior art reference to which they refer. In the related Google case, RFCyber alleged that its
`
`prosecution statements differentiated Atsmon from the ’218 patent because applicant’s inve

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket