throbber
Case 6:21-cv-00916-ADA-DTG Document 54 Filed 05/10/22 Page 1 of 24
`
`Plaintiff,
`
`IN THE UNITED STATES DISTRICT COURT
`FOR THE WESTERN DISTRICT OF TEXAS
`WACO DIVISION

`

`Case No. 6:21-cv-00916-ADA

`
`JURY TRIAL DEMANDED


`






`
`
`Defendant.
`
`
`
`
`PLAINTIFF RFCYBER CORP.’S
`RESPONSIVE CLAIM CONSTRUCTION BRIEF
`
`
`RFCYBER CORP.,
`
`
`
`
`v.
`
`
`APPLE INC.,
`
`
`
`
`
`
`
`
`

`

`Case 6:21-cv-00916-ADA-DTG Document 54 Filed 05/10/22 Page 2 of 24
`
`
`I.
`
`II.
`
`III.
`
`IV.
`
`V.
`
`TABLE OF CONTENTS
`
`Page(s)
`
`INTRODUCTION .............................................................................................................. 1
`
`THE PATENTS-IN-SUIT .................................................................................................. 2
`
`A.
`
`B.
`
`C.
`
`D.
`
`The ’218, ’855, and ’787 Patents ............................................................................ 2
`
`The ’009 Patent ....................................................................................................... 3
`
`The ’046 Patent ....................................................................................................... 4
`
`The ’724 Patent ....................................................................................................... 5
`
`PRIOR LITIGATION ......................................................................................................... 5
`
`LEGAL STANDARD ......................................................................................................... 6
`
`DISPUTED TERMS ........................................................................................................... 6
`
`A.
`
`“e-purse” / “electronic purse” (identified by both parties) ..................................... 6
`
`1.
`
`2.
`
`3.
`
`4.
`
`RFCyber’s position in Google is consistent with its position here ............. 7
`
`The claims and other intrinsic evidence support RFCyber’s
`construction ................................................................................................. 8
`
`Extrinsic evidence does not compel Apple’s construction ....................... 10
`
`Prosecution history disclaimer does not exclude RFCyber’s
`construction ............................................................................................... 10
`
`“e-purse applet” (identified by Apple) .................................................................. 11
`
`“payment server” (identified by Apple) ................................................................ 12
`
`“security authentication module” / “SAM” (identified by both) .......................... 14
`
`“application” (identified by Apple) ...................................................................... 16
`
`B.
`
`C.
`
`D.
`
`E.
`
`VI.
`
`CONCLUSION ................................................................................................................. 19
`
`
`
`i
`
`

`

`Case 6:21-cv-00916-ADA-DTG Document 54 Filed 05/10/22 Page 3 of 24
`
`TABLE OF AUTHORITIES
`
`
`
`Page(s)
`
`Cases
`
`Amgen Inc. v. Hoechst Marion Roussel, Inc.,
`314 F.3d 1313 (Fed. Cir. 2003)................................................................................................18
`
`Apple Inc. v. RFCyber Corp,
`IPR2022-00412, Paper No. 1 (P.T.A.B. Jan. 14, 2022) ...........................................................17
`
`August Tech. Corp. v. Camtek, Ltd.,
`655 F.3d 1278 (Fed. Cir. 2011)..................................................................................................6
`
`Cordis Corp. v. Boston Sci. Corp.,
`561 F.3d 1319 (Fed. Cir. 2009)..................................................................................................9
`
`Core Wireless Licensing S.A.R.L. v. LG Elecs., Inc.
`880 F.3d 1356 (Fed. Cir. 2018)................................................................................................11
`
`Hill-Rom Servs., Inc. v. Stryker Corp.¸
`755 F.3d 1367 (Fed. Cir. 2014)..................................................................................................6
`
`Markman v. Westview Instruments, Inc.,
`52 F.3d 967 (Fed. Cir. 1995)......................................................................................................6
`
`Omega Eng’g, Inc. v. Raytek Corp.,
`334 F.3d 1314 (Fed. Cir. 2003)..................................................................................................9
`
`Phillips v. AWH Corp.,
`415 F.3d 1303 (Fed. Cir. 2005) (en banc) .................................................................................6
`
`RFCyber Corp. v. Google LLC,
`No. 2:20-cv-00274-JRG, 2021 WL 5357465 (E.D. Tex. Nov. 17, 2021) ....................... passim
`
`Superguide Corp. v. DirecTV Enters., Inc.,
`358 F.3d 870 (Fed. Cir. 2004)..................................................................................................10
`
`Thorner v. Sony Comput. Ent. Am. LLC,
`669 F.3d 1362 (Fed. Cir. 2012)..................................................................................................6
`
`U.S. Surgical Corp. v. Ethicon, Inc.,
`103 F.3d 1554 (Fed. Cir. 1997)................................................................................................19
`
`Vitronics Corp. v. Conceptronic, Inc.,
`90 F.3d 1576 (Fed. Cir. 1996)..............................................................................................6, 17
`
`ii
`
`

`

`Case 6:21-cv-00916-ADA-DTG Document 54 Filed 05/10/22 Page 4 of 24
`
`Pursuant to the Court’s Scheduling Order (Dkt. 29), Plaintiff RFCyber Corp. (“RFCyber”)
`
`hereby submits its Responsive Claim Construction Brief. The asserted patents are U.S. Patent
`
`Nos. 8,118,218 (the “’218 Patent”), 8,448,855 (the “’855 Patent”), 9,189,787 (the “’787 Patent”),
`
`9,240,009 (the “’009 Patent”), 10,600,046 (the “’046 Patent”), and 11,018,724 (the “’724 Patent”)
`
`(together, the “Asserted Patents”).
`
`I.
`
`INTRODUCTION
`
`RFCyber is a pioneer in mobile and electronic payment technology. The Asserted Patents
`
`embody RFCyber’s technology and are directed to various aspects of a mobile payment system.
`
`The Parties have met and conferred and reached agreement on most terms. The only terms
`
`in dispute are:
`
`• “e-purse” / “electronic purse”;
`
`• “e-purse applet”;
`
`• “payment server”;
`
`• “security authentication module” / “SAM”; and
`
`• “application.”
`
`For “e-purse” and “electronic purse,” Apple misconstrues the intrinsic record to suggest
`
`there was a clear and unmistakable disclaimer that would limit these terms to electronic value.
`
`However, a correct reading of the prosecution history shows that no such disclaimer was made;
`
`the applicants distinguished the patented invention, which stores information locally, from “an e-
`
`wallet system [that] has a user credit-card and personal info at the backend. . .” Ex. 1 at 9. Indeed,
`
`in the Google case, Judge Gilstrap considered precisely the same argument and evidence on which
`
`Apple relies and found that there was no disclaimer. Apple further seeks to confuse matters by
`
`
`
`

`

`Case 6:21-cv-00916-ADA-DTG Document 54 Filed 05/10/22 Page 5 of 24
`
`proposing the same construction for e-purse applet. But the patents use “e-purse” and “e-purse
`
`applet” differently. An “e-purse applet” is an applet that is a component of an e-purse.
`
`For “security authentication module” / “SAM,” Apple seeks to introduce the requirement
`
`that the SAM “authenticate transactions of funds or transfers of funds.” Nothing in the intrinsic
`
`record imposes such a requirement.
`
`Finally, Apple seeks to construe the commonplace terms “application” and “payment
`
`server.” Apple’s requested limitations are presumably intended to manufacture a non-
`
`infringement defense. A jury can apply these terms without construction.
`
`Accordingly, the Court should adopt RFCyber’s constructions for e-purse, e-purse applet,
`
`and SAM, and reject Apple’s unsupported constructions.
`
`II.
`
`THE PATENTS-IN-SUIT
`
`A.
`
`The ’218, ’855, and ’787 Patents
`
`The ’218, ’855, and ’787 Patents share a common specification and are directed to various
`
`aspects of a mobile payment system focusing, in particular, on inventions for “portable devices,
`
`functioning as an electronic purse.” (’218 Patent, 1:34-38.)
`
`In exemplary embodiments, the invention provides a portable device, such as a cell phone
`
`with a smart card module, configured to conduct e-commerce transactions over contactless
`
`interfaces and m-commerce transactions over wireless interfaces. (Id. 1:42-2:46.) Figure 2 of the
`
`’218 Patent shows an exemplary embodiment of the system:
`
`2
`
`

`

`Case 6:21-cv-00916-ADA-DTG Document 54 Filed 05/10/22 Page 6 of 24
`
`(’218 Patent, Fig. 2.) The portable device includes an emulator that pretends to be another device
`
`or program, such as a payment card, that other components expect to interact with. (Id., 2:9-41,
`
`
`
`4:35-39.)
`
`
`
`In exemplary embodiments, a purse manager midlet acts as an agent to conduct transactions
`
`with one or more e-purse applets. (Id. 2:9-41, 5:5-16.) To use the device as a payment card, it
`
`must be personalized with card details. (E.g., id., 4:4-22, 5:50-6:54.) The electronic purse may be
`
`personalized over secure channels, such as secure channels between an applet and a security
`
`authentication module. (Id., 5:50-6:65.) The secure channels, in turn, may be established by
`
`creating a key or keys used to protect subsequent operations. (Id. 1:65-2:1, 2:9-24, 4:35-46 .)
`
`B.
`
`The ’009 Patent
`
`The ’009 Patent is a continuation-in-part of the ’218 Patent and shares portions of its
`
`specification. The ’009 Patent is related to “techniques for personalizing a secure element and
`
`provisioning an application such as an electronic purse.” ’009 Patent at 1:19-21. In particular, the
`
`’009 Patent claims modules and applications that work in conjunction with a secure element.
`
`3
`
`

`

`Case 6:21-cv-00916-ADA-DTG Document 54 Filed 05/10/22 Page 7 of 24
`
`In exemplary embodiments, the invention provides a portable device, such as a cell phone
`
`with a smart card module, configured to conduct transactions using the modules and applications.
`
`Id. at 14:60-15:26. In one embodiment, an application is provisioned following a process where
`
`the device sends to a server an identifier that identifies the application, along with device
`
`information relating to the secure element. Id. at 3:32-35. A secure channel is then established
`
`between the server and secure element, using a key set installed on the secure element. Id. at 3:37-
`
`39. The secure element receives data prepared by the server, which enables the application to
`
`function as designed. Id. at 3:38-41. As a result of these steps, the application can function with
`
`the secure element and be used to perform commerce transactions.
`
`C.
`
`The ’046 Patent
`
`The ’046 Patent is a continuation-in-part, through parent applications, of the ’218 Patent
`
`and shares portions of its specification with the ’218 Patent. The ’046 Patent is related to a “mobile
`
`device configured to settle payments.” ’046 Patent at 1:16-20. At the time of the invention,
`
`existing payment methods were limited to “a lengthy process that typically takes a couple of
`
`minutes or much longer.” Id. at 1:34-36. The inventors realized that “[w]ith the advancement in
`
`mobile devices, it is anticipated that many consumers will carry one with them. Thus there is an
`
`opportunity of using a mobile device to quickly settle the payment at a point of sale (POS).” Id. at
`
`1:40-44. The ’046 Patent discloses and claims such methods; in particular:
`
`The present invention is related to techniques for mobile devices configured to
`
`support settlement of charges in electronic invoices or bills. According to one
`
`aspect of the present invention, a mobile device embedded with a secure
`
`element generates or is loaded with an electronic invoice. When the mobile
`
`device is brought to a consumer with an NFC mobile device, the data including
`
`the electronic invoice and other information regarding the mobile device or an
`
`4
`
`

`

`Case 6:21-cv-00916-ADA-DTG Document 54 Filed 05/10/22 Page 8 of 24
`
`owner thereof is read off wirelessly into the NFC mobile device. After the user
`
`verifies the amount being charged and authorizes the payment, the NFC mobile
`
`device communicates with a payment gateway or network for payment that is
`
`configured to proceed with the payment in accordance with a chosen payment
`
`method.
`
`(Id. at 1:54-67.)
`
`D.
`
`The ’724 Patent
`
`The ’724 Patent is a continuation-in-part of the ’218 Patent and shares portions of its
`
`specification. The ’724 Patent relates to devices configured to support or function as multiple
`
`contactless cards. ’724 Patent at Abstract. Under one of the ’724 Patent’s embodiments, “a mobile
`
`device embedded with an emulator is loaded with a plurality of software modules or applications,
`
`each emulating or simulating one card or one type of contactless cards.” Id. at 1:54-57. “When
`
`the mobile device is to be used as a contactless card to perform a set of monetary functions, a
`
`corresponding application is loaded into and executed in the emulator.” Id. at 1:61-64. If a
`
`different card is to be used, “a corresponding application is loaded into the emulator to replace the
`
`previous application entirely or partially.” Id. at 1:64-2:1.
`
`III.
`
`PRIOR LITIGATION
`
`RFCyber previously litigated the ’218, ’855, ’787, and ’009 Patents in the Eastern District
`
`of Texas against Google LLC, Samsung Electronics Co. Ltd., and Samsung Electronics America,
`
`Inc. RFCyber Corp. v. Google LLC, No. 2:20-cv-00274 (E.D. Tex.). The Eastern District
`
`construed “e-purse”, “security authentication module”, and “payment server,” among other terms.
`
`RFCyber Corp. v. Google LLC, No. 2:20-cv-00274-JRG, 2021 WL 5357465, at *6-9, *11-13,*17-
`
`18 (E.D. Tex. Nov. 17, 2021) (“Google”). The Court considered, and rejected, many of the same
`
`arguments that Apple makes now. Id.
`
`5
`
`

`

`Case 6:21-cv-00916-ADA-DTG Document 54 Filed 05/10/22 Page 9 of 24
`
`IV.
`
`LEGAL STANDARD
`
`Claim construction is a question of law to be decided by the Court. Markman v. Westview
`
`Instruments, Inc., 52 F.3d 967, 979 (Fed. Cir. 1995). In construing claim terms, courts begin with
`
`an examination of the claim language itself. August Tech. Corp. v. Camtek, Ltd., 655 F.3d 1278,
`
`1284 (Fed. Cir. 2011). The terms used in the claims are generally given their “ordinary and
`
`customary meaning.” Phillips v. AWH Corp., 415 F.3d 1303, 1312 (Fed. Cir. 2005) (en banc)
`
`(citations omitted). This is the meaning as understood by a person of ordinary skill in the art at
`
`the time of the invention. Id. at 1313. “There are only two exceptions” to the general rule that a
`
`claim term is given its plain and ordinary meaning: “1) when a patentee sets out a definition and
`
`acts as his own lexicographer, or 2) when the patentee disavows the full scope of a claim term
`
`either in the specification or during prosecution.” Thorner v. Sony Comput. Ent. Am. LLC, 669
`
`F.3d 1362, 1365 (Fed. Cir. 2012)); accord Hill-Rom Servs., Inc. v. Stryker Corp.¸ 755 F.3d 1367,
`
`1371 (Fed. Cir. 2014) (“We depart from the plain and ordinary meaning of claim terms based on the
`
`specification in only two instances: lexicography and disavowal.”). Accordingly, “although the
`
`specification often describes very specific embodiments of the invention, [the Federal Circuit]
`
`ha[s] repeatedly warned against confining the claims to those embodiments.” Phillips, 415 F.3d
`
`at 1323. That being said, a construction that excludes a preferred embodiment is “rarely, if ever,
`
`correct.” Vitronics Corp. v. Conceptronic, Inc., 90 F.3d 1576, 1583 (Fed. Cir. 1996).
`
`V.
`
`DISPUTED TERMS
`
`A.
`
`“e-purse” / “electronic purse” (identified by both parties)
`
`Term
`
`RFCyber’s Construction
`
`Apple’s Construction
`
`“e-purse”
`“electronic purse”
`
`“software that stores electronic
`financial information in a local
`device”
`
`“software that stores
`electronic financial
`information, including
`electronic value, in a local
`portable device”
`
`6
`
`

`

`Case 6:21-cv-00916-ADA-DTG Document 54 Filed 05/10/22 Page 10 of 24
`
`
`
`The Parties are in general agreement that an e-purse or electronic purse is software that
`
`stores electronic financial information in a local device. Apple seeks to add an additional
`
`limitation: that the electronic financial information “include[es] electronic value.” There is no
`
`dispute that an e-purse can include some sort of stored value; but there is no support for Apple’s
`
`additional limitation that requires the e-purse to include electronic value.
`
`An “e-purse” is exactly what its name implies: an electronic version of a purse. Like any
`
`purse, it can include cash or credit cards or both. Several dictionary definitions support this
`
`reading. For example, the Dictionary of Banking and Finance states that an “e-purse” is the same
`
`as a “digital wallet” that is a “piece of personalised software . . . that contains, in coded form, such
`
`items as credit card information, digital cash. . . .” (Ex. A.) Similarly, Newton’s Telecom
`
`Dictionary defines it as “an electronic monetary transaction card being proposed by several
`
`government agencies.” (Ex. B.) Neither definition limits an e-purse to one that stores “electronic
`
`value.”
`
`1.
`
`RFCyber’s position in Google is consistent with its position
`here
`
`Apple argues that RFCyber has changed its position since the Google case. (Apple Br. at
`
`13-15.) As explained above, an e-purse can store money, but it is not required to store money.
`
`This is entirely consistent with RFCyber’s position in the Google case. In that case, Samsung
`
`argued, similar to Apple’s arguments here, that an e-purse was limited to one that “stores electronic
`
`money locally.” RFCyber explained that an e-purse can store money, but was not limited to such
`
`storage, and “can store credit card numbers and other financial-related materials.” (Ex. 4 at 4.)
`
`The Court in that case agreed with RFCyber and rejected Samsung’s attempt to limit the
`
`invention. Google, 2021 WL 5357465, at *6-*9. The Court rejected Samsung’s argument that
`
`7
`
`

`

`Case 6:21-cv-00916-ADA-DTG Document 54 Filed 05/10/22 Page 11 of 24
`
`there was a disclaimer in the prosecution history, and further rejected Samsung’s citation to the
`
`same embodiments Apple now cites.
`
`2.
`
`The claims and other intrinsic evidence support RFCyber’s
`construction
`
`The claims of the Asserted Patents make clear that the e-purse is not limited to one that
`
`stores electronic value. For example, Claim 7 of the ’218 Patent requires the payment server to
`
`communicate with a financial institution to authorize a transaction. (’218 patent at cl. 7.) Claim 8
`
`of the ’855 Patent includes a similar limitation. (’855 Patent at cl. 8.) Authorization would not be
`
`required if the invention were limited to value stored in the local device.
`
`Apple primarily relies on one portion of the prosecution history. (Apple Br. at 10.) During
`
`prosecution of the ’218 Patent, the Examiner rejected the claims over the Shmueli and Atsmon
`
`references. (Ex. 1, ’218 File History, 12/31/2010 Resp, at 7.) As the Applicants explained,
`
`Atsmon described a type of “e-wallet” that “has a user credit-card and personal info at the
`
`backend.” Id. at 9. Under the Atsmon system, “an e-card in the e-wallet system is used as an
`
`identity card for logging in into the system.” Id. When a user seeks to make a purchase, “the e-
`
`card can be used to identify the user to retrieve the info and submit the info to the merchant site.”
`
`Id. The user’s information, such as a credit card number, is stored in the backend server, and not
`
`on the local device. Id.
`
`In contrast, the invention of the ’218 Patent stores financial information locally in the
`
`device. “[A]n e-purse in the instant application describes about electronic money in a local
`
`portable device.” Id.
`
`8
`
`

`

`Case 6:21-cv-00916-ADA-DTG Document 54 Filed 05/10/22 Page 12 of 24
`
`
`
`(Id. (emphasis added).) Thus, the distinction the Applicants made between Atsmon and the ’218
`
`Patent was where the information was stored; not the type of information stored.1 Accordingly,
`
`there was no “clear and unmistakable” disclaimer of scope. Cordis Corp. v. Boston Sci. Corp.,
`
`561 F.3d 1319, 1329 (Fed. Cir. 2009) (“A disclaimer must be ‘clear and unmistakable,’ and unclear
`
`prosecution history cannot be used to limit claims.”). Indeed, the Eastern District of Texas
`
`considered the exact arguments and evidence Apple presents and determined “The patentee thus
`
`distinguished Shmueli and Atsmon based on the claimed invention using information stored
`
`locally rather than retrieving information from somewhere else.” Google, 2021 WL 5357465, at
`
`*8.
`
`
`
`The remainder of the intrinsic record similarly neither amounts to a disclaimer nor limits
`
`the term to require “electronic value.” Apple cites scattered passages that refer to embodiments
`
`with “balances” that can be “topped off” or discuss “funding.” (Apple Br. at 11.) But reference
`
`to a “balance” or topping off that balance does not require that every e-purse actually stores value.
`
`Google, 2021 WL 5357465, at *8 (“The disclosures relied upon by Defendants, however, do not
`
`
`1 Apple’s interpretation of Atsmon is not relevant. (See Apple Br. at 10, 15.) It is the patentee’s
`words that control the meaning of claim terms. E.g., Omega Eng’g, Inc. v. Raytek Corp., 334 F.3d
`1314, 1326 (Fed. Cir. 2003) (“[O]ur precedent requires that the alleged disavowing actions or
`statements made during prosecution be both clear and unmistakable.”).
`
`9
`
`

`

`Case 6:21-cv-00916-ADA-DTG Document 54 Filed 05/10/22 Page 13 of 24
`
`‘clearly set forth a definition’ for ‘e-purse’ but rather describe the e-purse used in particular
`
`embodiments.”); Superguide Corp. v. DirecTV Enters., Inc., 358 F.3d 870, 875 (Fed. Cir. 2004)
`
`(“a particular embodiment appearing in the written description may not be read into a claim when
`
`the claim language is broader than the embodiment.”). And Apple does not cite any evidence that
`
`“funding” an e-purse requires storing value in the e-purse.
`
`
`
`Apple next relies on disclosures in the ’009 and ’046 Patents to attempt to impose its
`
`limitation on each of the Asserted Patents. (Apple Br. At 11.) But the claims of the Asserted
`
`Patents explicitly recite a “balance” when called for. For example, the claims of the ’046 Patent
`
`each recite that the e-purse has “a balance” and comparing that balance to a payment request. (’046
`
`Patent at cl. 1, 12, 18). The specification’s description of that process does not impose a balance
`
`limitation on the claims that do not recite a balance. Google, 2021 WL 5357465, at *8 (noting that
`
`the ’046 Patent “includes different claim language . . . such as the recital of ‘a balance in the e-
`
`purse’”).
`
`3.
`
`Extrinsic evidence does not compel Apple’s construction
`
`Apple cites to four extrinsic sources as supporting its construction. However, as noted
`
`above, other dictionary definitions support RFCyber’s position. The competing definitions “at a
`
`minimum raise[] doubts about Defendants’ assertion that Defendants’ proposed construction
`
`represents a well-established meaning of ‘e-purse’ in the relevant art.” Google, 2021 WL 5357465,
`
`at *9.
`
`4.
`
`Prosecution history disclaimer does not exclude RFCyber’s
`construction
`
`Apple finally argues that the doctrine of prosecution disclaimer compels its construction.
`
`(Apple Br. At 14-15.) As discussed above, there was no disclaimer that would limit the claims as
`
`Apple prefers. The patentee distinguished the Atsmon reference “based on the claimed invention
`
`10
`
`

`

`Case 6:21-cv-00916-ADA-DTG Document 54 Filed 05/10/22 Page 14 of 24
`
`using information stored locally rather than retrieving information from somewhere else.” Google,
`
`2021 WL 5357465, at *8. “This prosecution history therefore does not amount to a definitive
`
`statement by the patentee that the term ‘e-purse’ requires money stored locally.” Id. With no
`
`disclaimer of relevant scope, prosecution disclaimer does not attach.
`
`Apple further relies on its own interpretation of Atsmon to impose a broad disclaimer on
`
`RFCyber. (Apple Br. at 15.) But it is the applicants’ words and actions that generate a disclaimer,
`
`not the content of the prior art being distinguished. E.g., Core Wireless Licensing S.A.R.L. v. LG
`
`Elecs., Inc. 880 F.3d 1356, 1367 (Fed. Cir. 2018) (“The doctrine of prosecution disclaimer
`
`precludes patentees from recapturing the full scope of a claim term only when the patentee clearly
`
`and unmistakably disavows a certain meaning in order to obtain the patent.” (emphasis added)).
`
`Accordingly, the Court should construe “e-purse” and “electronic purse” as “software that
`
`stores electronic financial information in a local device.”
`
`B.
`
`“e-purse applet” (identified by Apple)
`
`Term
`
`RFCyber’s Construction
`
`Apple’s Construction
`
`“e-purse applet”
`
`
`No construction necessary other than
`“e-purse”
`
`
`
`“software that stores
`electronic financial
`information, including
`electronic value, in a local
`portable device”
`
`Apple seeks to conflate “e-purse applet” with “e-purse.” But the claims make clear that an
`
`e-purse applet is a component of an e-purse. For example,’855 Patent claim 1 recites “sending the
`
`response by the e-purse applet over a wireless network to a server administrating the e-
`
`purse,” thus clearly denoting that the two are not identical. (’855 Patent, cl. 1.) “E-purse,” when
`
`used as part of “e-purse applet” thus is an adjective modifying “applet.” (See also ’855 Patent cl.
`
`1 (discussing “e-purse SAM”).)
`
`11
`
`

`

`Case 6:21-cv-00916-ADA-DTG Document 54 Filed 05/10/22 Page 15 of 24
`
`Accordingly, to avoid confusing the jury, the Court should adopt RFCyber’s construction.
`
`C.
`
`“payment server” (identified by Apple)
`
`Term
`
`RFCyber’s Construction
`
`Apple’s Construction
`
`“payment server”
`
`
`
`
`Plain and ordinary meaning
`
`“server for payment
`transactions”
`
`“Payment server” is easily understandable and requires no construction. Apple offers no
`
`justification, much less any clear and unmistakable reason, to turn “payment server” into “server
`
`for payment transactions.” And while Apple’s construction, on its face, seems similar to the term
`
`itself, Apple’s brief construes its own construction as a server “capable of facilitating or processing
`
`payments.” (Apple Br. At 15.)
`
`The patents do not limit “payment server” to one that facilitates or processes payments,
`
`rather they broadly use “payment server” in a variety of contexts. Notably, the patents describe
`
`that the payment server’s primary role as personalization of e-purse applets; the personalization
`
`enables subsequent payments, but does not itself involve any payment transaction at all. For
`
`example, the payment server may be “associated with an issuer of the e-purse” not a merchant or
`
`other third party. (’218 Patent, 2:36-36.) Indeed, the specification describes an application where
`
`“a card issuer provides a SA module 212 that is used to enable and authenticate any transactions
`
`between a card and a corresponding server (also referred to as a payment server).” (Id., 5:18-22.)
`
`The specification primarily discusses the use of the payment server during personalization. (Id.,
`
`6:11-25.)
`
`Similarly, exemplary claims of the Asserted Patents recite a payment server in the context
`
`of the process of downloading, installing, and personalizing an e-purse applet without imposing
`
`any requirement for payment transactions: “the e-purse applet is downloaded and installed in the
`
`12
`
`

`

`Case 6:21-cv-00916-ADA-DTG Document 54 Filed 05/10/22 Page 16 of 24
`
`smart card when the smart card is in communication with the payment server,” (Id., cl. 1),
`
`“wherein, when said personalizing the e-purse applet is done over a wireless network, the midlet
`
`in the portable device is configured to facilitate communications between the e-purse and the
`
`payment server,” (id., cl. 5 (emphasis added)), and “the e-purse SAM configured to enable the e-
`
`purse applet, wherein an SAM is behind the payment server and in communication with the e-
`
`purse applet when the e-purse applet is caused to communicate with the payment server via the
`
`midlet.” (Id., cl. 11). In contrast, when the payment server is required to process a transaction, the
`
`claim explicitly recites as much. (E.g., id., cl. 7 (“wherein the payment server further
`
`communicates with a financial institution to authorize a transaction therewith” (emphasis added);
`
`cl. 15 (same)). Thus, the payment server’s primary role is personalization of e-purse applets (e.g.
`
`during the course of adding new payment cards to an e-purse), not “facilitating or processing”
`
`transactions.
`
`The portions of the specification to which Apple cites do not support its construction.
`
`(Apple Br. at 16 (citing ’218 Patent at 1:65-2:1, 2:20-24).) The cited section from 1:65-2:1 does
`
`not state that the claimed payment server must facilitate or process a payment in every case, merely
`
`that it is involved in a transaction. (Id. at 1:65-2:1.) Similarly, the section from 2:20-24 merely
`
`states that operation keys are “used to establish a secured channel between the e-purse and a SAM
`
`or a payment server.” (Id. at 2:20-24.) And the process described at 7:29-62 and Figs. 4A-4C
`
`involves communications with a “payment network and servers” but does not disclose, or require,
`
`that that payment network and server facilitate or process a payment.
`
`In the Google case, Samsung proposed a similar construction as Apple does now: “server
`
`for settling a payment.” Google, 2021 WL 5357465, at *11. While Apple’s construction does not
`
`explicitly recite “settling,” its statement that a payment server must process a payment imposes
`
`13
`
`

`

`Case 6:21-cv-00916-ADA-DTG Document 54 Filed 05/10/22 Page 17 of 24
`
`similar scope. In Google, as here, RFCyber contended that the term be given its plain and ordinary
`
`meaning. Id. The Court agreed with RFCyber, finding no requirement that the payment server be
`
`involved in settling a transaction, and that no construction was necessary. Id. at 13.
`
`Apple cites the Google case to complain that RFCyber proposed an alternative construction
`
`there: “server for enabling a payment.” (Apple Br. at 17-18.) While RFCyber believed and
`
`believes in both Google and in this case that the term needs no construction, should the Court find
`
`construction necessary, it should adopt that alternative construction which is consistent with the
`
`specification as discussed above.
`
`D.
`
`“security authentication module” / “SAM” (identified by both)
`
`Term
`
`RFCyber’s Construction
`
`Apple’s Construction
`
`“security
`authentication
`module” / “SAM”
`
`
`“hardware or software module
`containing data necessary to
`authenticate transactions”
`
`“hardware or software
`module containing data to
`authenticate transactions of
`funds or transfer of funds”
`
`The Parties agree that “security authentication module” should be construed as a “hardware
`
`
`
`
`
`or software module containing data necessary to authenticate transactions.”2 The Parties’ only
`
`dispute is whether the Court should accept Apple’s request to further limit those transactions to
`
`“transactions of funds or transfer of funds.” The Court should decline to do so.
`
`At the outset, the claims recite that the e-purse applet and the e-purse SAM are used to
`
`personalize the e-purse applet. (’218 Patent, 9:53-67.) Personalization is a type of data transaction3
`
`and is not related to funds. (Id. at 6:62-65 (“Via the new purse SAM306, a set of e-purse operation
`
`
`2 The Eastern District of Texas adopted this construction in the Google case. Google, 2021 WL
`5357465, at *18.
`3 The specification makes clear (and, by seeking this construction, Apple tacitly admits) that
`transactions are not always related to funds. (Id. at 4:32-34 (discussing “data transactions”).)
`
`14
`
`

`

`Case 6:21-cv-00916-ADA-DTG Document 54 Filed 05/10/22 Page 18 of 24
`
`keys and pins are generated for data transactions between the new e-purse SAM and the e-purse
`
`applet to essentially personalize the e-purse applet at 358.” (emphasis added)). See also id. at 2:5-
`
`8 (“During a transaction, the security keys are used to establish a secured channel between an
`
`embedded e-purse and an SAM (Security Authentication Module) or backend server.”), 6:11-25.)
`
`Thus, Apple’s construction directly contradicts the claims of the Asserted

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket