throbber
Case 6:21-cv-00916-ADA-DTG Document 59 Filed 05/24/22 Page 1 of 13
`
`IN THE UNITED STATES DISTRICT COURT
`FOR THE WESTERN DISTRICT OF TEXAS
`WACO DIVISION
`
`RFCYBER CORP.,
`
`v.
`
`APPLE INC.,
`
`Plaintiff,
`
`Defendant.
`
`Civil Action No. 6:21-cv-00916-ADA
`
`JURY TRIAL DEMANDED
`
`DEFENDANT APPLE INC.’S REPLY CLAIM CONSTRUCTION BRIEF
`
`WEST\298672028.1
`
`

`

`Case 6:21-cv-00916-ADA-DTG Document 59 Filed 05/24/22 Page 2 of 13
`
`TABLE OF CONTENTS
`
`Page
`
`I.
`
`II.
`
`DISPUTED CLAIM TERMS ..............................................................................................1
`A.
`“e-purse” / “electronic purse” / “e-purse applet” .....................................................1
`B.
`“payment server” .....................................................................................................4
`C.
`“security authentication module” / “SAM” .............................................................5
`D.
`“application” ............................................................................................................6
`CONCLUSION ....................................................................................................................8
`
`WEST\298672028.1
`
`i
`
`

`

`Case 6:21-cv-00916-ADA-DTG Document 59 Filed 05/24/22 Page 3 of 13
`
`TABLE OF AUTHORITIES
`
`
`
`Page(s)
`
`Cases
`
`RFCyber Corp. v. Google LLC,
`No. 2:20-CV-274-JRG, 2021 WL 5357465 (E.D. Tex. Nov. 17, 2021)................................3, 5
`
`WEST\298672028.1
`
`i
`
`

`

`Case 6:21-cv-00916-ADA-DTG Document 59 Filed 05/24/22 Page 4 of 13
`
`RFCyber ignores Apple’s constructions and the disputes between the parties and instead
`
`tries to rewrite Apple’s positions. For several disputed terms, RFCyber recharacterizes Apple’s
`
`position as trying to limit each term to a single specific function, rather than identifying a
`
`necessary, but not exclusive, aspect. Similarly, RFCyber fails to address the arguments in
`
`Apple’s opening brief, instead relying on arguments from a prior litigation analyzing different
`
`constructions than the ones Apple now proposes. For each disputed term, Apple’s constructions
`
`address and clarify the actual disputes between the parties and should be adopted
`
`I.
`
`DISPUTED CLAIM TERMS
`
`A.
`
`“e-purse” / “electronic purse” / “e-purse applet”
`
`Term and Claims
`“e-purse” / “electronic purse” / “e-
`purse applet”
`
`’218 patent, claims 1, 3-7, 10-12,
`14-15, 18
`’855 patent, claims 1, 3-6, 9, 12-15
`’787 patent, claims 1-3, 5-6, 11-13,
`15-16
`’009 patent, claim 3
`’046 patent, claim 1
`
`Apple’s Construction
`software that stores
`electronic financial
`information, including
`electronic value, in a local
`portable device
`
`RFCyber’s Construction
`Regarding “e-purse” and
`“electronic purse”,
`“software that stores
`electronic financial
`information in a local
`device”
`
`Regarding “e-purse applet”,
`Plain and ordinary meaning
`except for the term “e-purse”
`
`RFCyber misunderstands Apple’s position. Apple’s construction requires that an e-purse
`
`be capable of storing electronic value, not that it must always do so. Compare Opening Br. at 9
`
`(“The dispute regarding the ‘e-purse’ terms centers around whether the electronic information
`
`stored by an e-purse includes but is not limited to electronic value.”) to Response at 9 (arguing
`
`that the patent “does not require that every e-purse actually stores value”). A purse is a purse,
`
`regardless of whether it is empty or full, but software that lacks the ability to store electronic
`
`value cannot be an “e-purse.”
`
`WEST\298672028.1
`
`1
`
`

`

`Case 6:21-cv-00916-ADA-DTG Document 59 Filed 05/24/22 Page 5 of 13
`
`RFCyber concedes an e-purse is capable of storing electronic value. “There is no dispute
`
`that an e-purse can include some sort of stored value.” Response at 7 (emphasis in original). An
`
`e-purse, “[l]ike any purse, [] can include cash or credit cards or both.” Id. During prior litigation,
`
`“RFCyber explained that an e-purse can store money, but was not limited to such storage” and
`
`could store other information as well. Id. at 8 (“[A]n e-purse can store money, but it is not
`
`required to store money.”) (emphasis in original). RFCyber’s concessions are consistent with
`
`Apple’s construction, leaving little to no dispute between the parties.
`
`The applicant’s statements during prosecution of the ’218 patent confirm that an e-purse
`
`stores electronic value. “[A]n e-purse in the instant application describes [] electronic money in a
`
`local portable device.” See Response at 8 (quoting Apple Ex. 1, ’218 File History, 12/31/2010
`
`Resp. at 9) (emphasis in original). RFCyber now argues the applicant distinguished the Atsmon
`
`reference because it did not disclose storing electronic value in a local portable device (Response
`
`at 9), but the fact remains that the applicant characterized the e-purse “in the instant application”
`
`as one that holds “electronic money”—that is, value—in a local portable device.
`
`RFCyber’s extrinsic evidence confirms that an e-purse is capable of storing electronic
`
`value. The Third Edition of Dictionary of Banking and Finance equates an “e-purse” with a
`
`“digital wallet,” see Response at 7, and explains that the digital wallet is a “piece of personalised
`
`software on the hard drive of a user’s computer that contains, in coded form, such items as credit
`
`card information [and] digital cash … and can be used when paying for a transaction
`
`electronically.” Ex. A to Response (emphasis added). Earlier editions of the same dictionary
`
`define an e-purse as “a way of holding a virtual token when shopping” and users should “treat
`
`[their] e-purse like cash in a wallet.” Ex. 10, Dictionary of Banking and Finance, 106 (2d. ed.
`
`2000) (“e-purse … [a] concept developed to provide a way of holding a virtual token when
`
`WEST\298672028.1
`
`2
`
`

`

`Case 6:21-cv-00916-ADA-DTG Document 59 Filed 05/24/22 Page 6 of 13
`
`shopping on the internet.”); id. at 250 (e-purse is a “concept developed to provide a way of
`
`holding a virtual token when shopping on the internet; you should treat your electronic purse like
`
`cash in a wallet”). These definitions comport with Apple’s construction that an e-purse is capable
`
`of storing electronic value.
`
`Apple proposes a different, broader construction than the one advocated by Samsung and
`
`analyzed in the Google case. As RFCyber points out, “Samsung argued … that an e-purse was
`
`limited to one that ‘stores electronic money locally.’” Response at 7. The Google court rejected
`
`Samsung’s proposed construction, holding that it “would improperly limit the disputed term to a
`
`specific feature of particular disclosed embodiments.” RFCyber Corp. v. Google LLC, No. 2:20-
`
`CV-274-JRG, 2021 WL 5357465, at *9 (E.D. Tex. Nov. 17, 2021). Unlike Samsung, Apple’s
`
`construction does not limit the e-purse to storing a specific type of information. Rather, Apple’s
`
`construction confirms that an e-purse must be capable of storing electronic value, potentially in
`
`addition to other electronic financial information.
`
`RFCyber fails to identify any substantive difference between “e-purse/electronic purse”
`
`and “e-purse applet” that would require these terms be given different meanings. RFCyber’s
`
`Response regarding “e-purse applet” consists of a single paragraph that asserts “e-purse, when
`
`used as part of e-purse applet, [] is an adjective modifying ‘applet.’” Response at 11. Although
`
`RFCyber’s argument is a distinction without a difference, Apple is amenable adding the word
`
`“applet” to its construction, to make it “applet software that stores electronic financial
`
`information, including electronic value, in a local portable device.” This should resolve any
`
`imagined dispute between the parties.
`
`WEST\298672028.1
`
`3
`
`

`

`Case 6:21-cv-00916-ADA-DTG Document 59 Filed 05/24/22 Page 7 of 13
`
`B.
`
`“payment server”
`
`Term and Claims
`“payment server”
`
`’218 patent, claims 1, 3,
`5, 7-8, 11, 14, 15-16
`
`Apple’s Construction
`server for payment
`transactions
`
`RFCyber’s Construction
`Plain and ordinary
`meaning
`
`RFCyber’s Response misstates Apple’s position: Apple does not seek to limit a payment
`
`server to a server only for payment transactions. See Opening Br. at 15. Rather, Apple explained
`
`that the term refers to a server that is capable of payment transactions. Id.; see also Response at
`
`12 (acknowledging Apple’s position but not addressing it). Apple’s construction does not
`
`prevent a payment server from performing functions other than payment transactions. However,
`
`a server that is not capable of payment transactions cannot be a “payment server.”
`
`RFCyber’s arguments underscore the need for a clarifying construction. RFCyber
`
`repeatedly characterizes the primary role of the payment server as facilitating something other
`
`than payment transactions. See Response at 12 (“the payment server’s primary role as
`
`personalization of e-purse applets”), 12 (“the Asserted Patents recite a payment server in the
`
`context of the process of downloading, installing, and personalizing an e-purse applet without
`
`imposing any requirement for payment transactions”), 13 (“the payment server’s primary role is
`
`personalization of e-purse applets … not ‘facilitating or processing’ transactions”) (emphasis in
`
`original). RFCyber goes further, arguing that “the Asserted Patents recite a payment server …
`
`without imposing any requirement for payment transactions.” Response at 12. RFCyber’s
`
`position would include servers that do not and cannot process payments and would therefore read
`
`the word “payment” out of the term “payment server.” RFCyber seeks to broaden this term
`
`beyond its plain and ordinary meaning and delete words from the claim, which is improper.
`
`WEST\298672028.1
`
`4
`
`

`

`Case 6:21-cv-00916-ADA-DTG Document 59 Filed 05/24/22 Page 8 of 13
`
`Apple’s position differs from the one advanced by Samsung, so the Google court’s
`
`analysis of Samsung’s position is inapposite. RFCyber tries to equate Apple’s and Samsung’s
`
`different positions while simultaneously acknowledging that they differ. Response at 13-14
`
`(“While Apple’s construction does not explicitly recite ‘settling,’ its statement that a payment
`
`server must process a payment imposes similar scope.”). Further, the Google court’s analysis
`
`relied on the “settling” term that Apple’s construction lacks. RFCyber Corp. v. Google LLC, No.
`
`2:20-CV-274-JRG, 2021 WL 5357465, at *12 (E.D. Tex. Nov. 17, 2021) (“‘settling,’ which is a
`
`word that appears nowhere in the patents here at issue, despite there being various disclosures
`
`regarding ‘transactions,’ ‘commerce,’ and ‘purchasing’”). Samsung’s position in the prior
`
`litigation therefore has no bearing on Apple’s correct construction here.
`
`C.
`
`“security authentication module” / “SAM”
`
`Term and Claims
`“security authentication
`module”/ “SAM”
`
`’218 patent, claims 1, 3,
`11, 14
`’855 patent, claims 1, 9
`’787 patent, claims 6, 16
`
`Apple’s Construction
`hardware or software module
`containing data to authenticate
`transactions of funds or
`transfer of funds1
`
`RFCyber’s Construction
`“hardware or software
`module containing data
`necessary to authenticate
`transactions”
`
`RFCyber misstates the extent to which the parties agree on this term. Apple’s
`
`construction does not include the “necessary” term found in RFCyber’s construction. As Apple
`
`explained, the “parties dispute whether the claimed ‘security authentication module’ must
`
`contain the data to authenticate transactions, as Apple contends, or whether it may merely
`
`1 For clarity, Apple is amenable to a compromise construction of “hardware or software module
`containing data to authenticate transactions, including, but not limited to, transactions of funds or
`transfer of funds” (addition underlined).
`
`WEST\298672028.1
`
`5
`
`

`

`Case 6:21-cv-00916-ADA-DTG Document 59 Filed 05/24/22 Page 9 of 13
`
`contain some portion of data necessary to authenticate transactions under RFCyber’s improperly
`
`broad construction.” Opening Br. at 18. RFCyber does not address this issue.
`
`Apple does not propose limiting the SAM term to authenticating only “transactions of
`
`funds or transfer of funds.” Response at 14. Rather, Apple’s construction would require that a
`
`SAM contain data to authenticate transactions of funds or transfers of funds, in addition to
`
`whatever other authentication data or functionality it may include. The patents disclose that the
`
`SAM “is used to enable and authenticate any transactions between a card and a corresponding
`
`[payment] server,” including payment transactions. ’218 patent at 5:18-22 (emphasis added).
`
`And although the PTAB did not construe this term, it agreed that the SAM “is used to enable and
`
`authenticate transactions between a card and a payment server.” Opening Br. at 19, Ex. 9 at 4.
`
`Thus, Apple’s construction aligns with the meaning ascribed by the patents and by the PTAB.
`
`Apple’s proposed authentication of the “transactions of funds or transfer of funds” does
`
`not exclude the authentication of data transactions related to the same. RFCyber states without
`
`citation or explanation that “[a]n authentication transaction does not involve funds.” Response at
`
`16. But the patents describe the payment network authorizing a potential fund transaction by
`
`communicating with the SAM module. See ’218 patent, 7:56-62, Fig. 4C. The patents also
`
`discuss the use of PINs to authenticate or validate fund transfers and transactions. See id. at 2:1-
`
`8, 5:54-59, 6:62-65. Thus, an authentication transaction can involve a fund transfer or fund-
`
`related information.
`
`D.
`
`“application”
`
`Term and Claims
`“application”
`
`’787 patent, claims 1, 11
`’009 patent, claims 1-4, 6, 9,
`13-14
`
`WEST\298672028.1
`
`Apple’s Construction
`software program suitable
`for being executed on a
`portable device
`
`RFCyber’s Construction
`Plain and ordinary
`meaning
`
`6
`
`

`

`Case 6:21-cv-00916-ADA-DTG Document 59 Filed 05/24/22 Page 10 of 13
`
`’046 patent, claim 1
`’724 patent, claims 1, 3, 7, 8
`
`RFCyber’s proposal broadens the disputed term to include nearly any piece of software,
`
`regardless of whether it is capable of execution. The term “application” has a more precise
`
`meaning than a collection of lines of code or source code files.
`
`RFCyber incorrectly equates limited functionality with the inability to “execute.” For
`
`example, RFCyber points to examples in which the applications described in the patents cannot
`
`perform certain functions until obtaining related data. See Response at 16 (“The application
`
`cannot function as designed and is not enabled (i.e., it cannot be executed) until it receives the
`
`‘data prepared by the server.’”). RFCyber’s arguments create a temporal impossibility. Under
`
`RFCyber’s theory, the applications “cannot execute” without first obtaining additional data but
`
`the applications cannot obtain said data without first executing. Rather, the inability to perform a
`
`specific function requiring certain data does not render an application “unsuitable for execution.”
`
`The patents teach that the applications can and do execute, thereby providing the mechanism to
`
`obtain the necessary information (e.g., via user input, wireless communications, etc.).
`
`Likewise, disabling an application via a configuration setting does not equate to
`
`rendering the application “unsuitable for execution.” Response at 17 (“The specification also
`
`describes instances where an application is locked or disabled, and therefore, no longer suitable
`
`for being executed.”). The same software remains installed and may be executed under a
`
`different configuration. For example, the patent describes instances requiring the entry of a PIN
`
`before activating the e-purse. See ’009 patent, 17:15-22. The e-purse remains “locked” until the
`
`PIN is entered, but it does not follow that the application “cannot be executed.”
`
`RFCyber confuses the claimed “applications” with the unclaimed disclosures of other
`
`applications. The claims recite applications stored or installed on portable or mobile devices. See,
`
`WEST\298672028.1
`
`7
`
`

`

`Case 6:21-cv-00916-ADA-DTG Document 59 Filed 05/24/22 Page 11 of 13
`
`e.g., ’787 patent, claims 1 and 11 (“portable device”); ’009 patent, claims 1 and 14 (“mobile
`
`device”); ’046 patent, claim 1 (“mobile device [] configured to execute an installed application
`
`therein”); ’787 patent, claims 1 and 8 (“mobile device”). RFCyber’s arguments relying on
`
`unclaimed “web-based applications” or “server applications” exemplify the dispute between the
`
`parties and the need for a construction to prevent jury confusion. Furthermore, the language of
`
`claim 1 of the ’787 patent does not overcome the fact that every other disputed claim explicitly
`
`requires the application to reside on the portable device. Regardless, Apple would agree to a
`
`construction of “application” as “software program suitable for being executed.”
`
`II.
`
`CONCLUSION
`
`For the foregoing reasons and those demonstrated in Apple’s opening brief, Apple
`
`respectfully requests the Court adopt its constructions for the disputed terms and reject
`
`RFCyber’s request that this Court to adopt wholesale a claim construction order from a separate
`
`litigation involving different disputes and different proposed constructions.
`
`Dated: May 24, 2022
`
`Respectfully submitted,
`
`/s/ John M. Guaragna
`John M. Guaragna (Bar No. 24043308)
`Zachary Loney (Bar No. 24092714)
`DLA PIPER LLP (US)
`303 Colorado St., Suite 3000
`Austin, TX 78701
`Telephone: (512) 457-7000
`Facsimile: (512) 457-7001
`john.guaragna@us.dlapiper.com
`zachary.loney@us.dlapiper.com
`
`Sean C. Cunningham (pro hac vice)
`Erin P. Gibson (pro hac vice)
`Peter Maggiore (pro hac vice)
`DLA PIPER LLP (US)
`401 B Street, Suite 1700
`San Diego, CA 92101
`Telephone: (619) 699-2700
`
`8
`
`WEST\298672028.1
`
`

`

`Case 6:21-cv-00916-ADA-DTG Document 59 Filed 05/24/22 Page 12 of 13
`
`Facsimile: (619) 699-2701
`sean.cunningham@us.dlapiper.com
`erin.gibson@us.dlapiper.com
`peter.maggiore@us.dlapiper.com
`
`Stephanie Lim (pro hac vice)
`DLA PIPER LLP (US)
`444 West Lake Street, Suite 900
`Chicago, IL 60606
`Telephone: (312) 368-4000
`Facsimile: (312) 630-7408
`stephanie.lim@us.dlapiper.com
`
`Attorneys for Defendant Apple Inc.
`
`WEST\298672028.1
`
`9
`
`

`

`Case 6:21-cv-00916-ADA-DTG Document 59 Filed 05/24/22 Page 13 of 13
`
`CERTIFICATE OF SERVICE
`
`I hereby certify that all counsel of record who are deemed to have consented to electronic
`
`service are being served on May 24, 2022 with a copy of this document via the Court’s CM/ECF
`
`system per Local Rule CV-5(a)(3). Any other counsel of record will be served by electronic
`
`mail on this same date.
`
`/s/ John M. Guaragna
`John M. Guaragna
`
`WEST\298672028.1
`
`10
`
`

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket