`
`IN THE UNITED STATES DISTRICT COURT
`FOR THE WESTERN DISTRICT OF TEXAS
`WACO DIVISION
`
`RFCYBER CORP.,
`
`v.
`
`APPLE INC.,
`
`Plaintiff,
`
`Defendant.
`
`Civil Action No. 6:21-cv-00916-ADA
`
`JURY TRIAL DEMANDED
`
`DEFENDANT APPLE INC.’S REPLY CLAIM CONSTRUCTION BRIEF
`
`WEST\298672028.1
`
`
`
`Case 6:21-cv-00916-ADA-DTG Document 59 Filed 05/24/22 Page 2 of 13
`
`TABLE OF CONTENTS
`
`Page
`
`I.
`
`II.
`
`DISPUTED CLAIM TERMS ..............................................................................................1
`A.
`“e-purse” / “electronic purse” / “e-purse applet” .....................................................1
`B.
`“payment server” .....................................................................................................4
`C.
`“security authentication module” / “SAM” .............................................................5
`D.
`“application” ............................................................................................................6
`CONCLUSION ....................................................................................................................8
`
`WEST\298672028.1
`
`i
`
`
`
`Case 6:21-cv-00916-ADA-DTG Document 59 Filed 05/24/22 Page 3 of 13
`
`TABLE OF AUTHORITIES
`
`
`
`Page(s)
`
`Cases
`
`RFCyber Corp. v. Google LLC,
`No. 2:20-CV-274-JRG, 2021 WL 5357465 (E.D. Tex. Nov. 17, 2021)................................3, 5
`
`WEST\298672028.1
`
`i
`
`
`
`Case 6:21-cv-00916-ADA-DTG Document 59 Filed 05/24/22 Page 4 of 13
`
`RFCyber ignores Apple’s constructions and the disputes between the parties and instead
`
`tries to rewrite Apple’s positions. For several disputed terms, RFCyber recharacterizes Apple’s
`
`position as trying to limit each term to a single specific function, rather than identifying a
`
`necessary, but not exclusive, aspect. Similarly, RFCyber fails to address the arguments in
`
`Apple’s opening brief, instead relying on arguments from a prior litigation analyzing different
`
`constructions than the ones Apple now proposes. For each disputed term, Apple’s constructions
`
`address and clarify the actual disputes between the parties and should be adopted
`
`I.
`
`DISPUTED CLAIM TERMS
`
`A.
`
`“e-purse” / “electronic purse” / “e-purse applet”
`
`Term and Claims
`“e-purse” / “electronic purse” / “e-
`purse applet”
`
`’218 patent, claims 1, 3-7, 10-12,
`14-15, 18
`’855 patent, claims 1, 3-6, 9, 12-15
`’787 patent, claims 1-3, 5-6, 11-13,
`15-16
`’009 patent, claim 3
`’046 patent, claim 1
`
`Apple’s Construction
`software that stores
`electronic financial
`information, including
`electronic value, in a local
`portable device
`
`RFCyber’s Construction
`Regarding “e-purse” and
`“electronic purse”,
`“software that stores
`electronic financial
`information in a local
`device”
`
`Regarding “e-purse applet”,
`Plain and ordinary meaning
`except for the term “e-purse”
`
`RFCyber misunderstands Apple’s position. Apple’s construction requires that an e-purse
`
`be capable of storing electronic value, not that it must always do so. Compare Opening Br. at 9
`
`(“The dispute regarding the ‘e-purse’ terms centers around whether the electronic information
`
`stored by an e-purse includes but is not limited to electronic value.”) to Response at 9 (arguing
`
`that the patent “does not require that every e-purse actually stores value”). A purse is a purse,
`
`regardless of whether it is empty or full, but software that lacks the ability to store electronic
`
`value cannot be an “e-purse.”
`
`WEST\298672028.1
`
`1
`
`
`
`Case 6:21-cv-00916-ADA-DTG Document 59 Filed 05/24/22 Page 5 of 13
`
`RFCyber concedes an e-purse is capable of storing electronic value. “There is no dispute
`
`that an e-purse can include some sort of stored value.” Response at 7 (emphasis in original). An
`
`e-purse, “[l]ike any purse, [] can include cash or credit cards or both.” Id. During prior litigation,
`
`“RFCyber explained that an e-purse can store money, but was not limited to such storage” and
`
`could store other information as well. Id. at 8 (“[A]n e-purse can store money, but it is not
`
`required to store money.”) (emphasis in original). RFCyber’s concessions are consistent with
`
`Apple’s construction, leaving little to no dispute between the parties.
`
`The applicant’s statements during prosecution of the ’218 patent confirm that an e-purse
`
`stores electronic value. “[A]n e-purse in the instant application describes [] electronic money in a
`
`local portable device.” See Response at 8 (quoting Apple Ex. 1, ’218 File History, 12/31/2010
`
`Resp. at 9) (emphasis in original). RFCyber now argues the applicant distinguished the Atsmon
`
`reference because it did not disclose storing electronic value in a local portable device (Response
`
`at 9), but the fact remains that the applicant characterized the e-purse “in the instant application”
`
`as one that holds “electronic money”—that is, value—in a local portable device.
`
`RFCyber’s extrinsic evidence confirms that an e-purse is capable of storing electronic
`
`value. The Third Edition of Dictionary of Banking and Finance equates an “e-purse” with a
`
`“digital wallet,” see Response at 7, and explains that the digital wallet is a “piece of personalised
`
`software on the hard drive of a user’s computer that contains, in coded form, such items as credit
`
`card information [and] digital cash … and can be used when paying for a transaction
`
`electronically.” Ex. A to Response (emphasis added). Earlier editions of the same dictionary
`
`define an e-purse as “a way of holding a virtual token when shopping” and users should “treat
`
`[their] e-purse like cash in a wallet.” Ex. 10, Dictionary of Banking and Finance, 106 (2d. ed.
`
`2000) (“e-purse … [a] concept developed to provide a way of holding a virtual token when
`
`WEST\298672028.1
`
`2
`
`
`
`Case 6:21-cv-00916-ADA-DTG Document 59 Filed 05/24/22 Page 6 of 13
`
`shopping on the internet.”); id. at 250 (e-purse is a “concept developed to provide a way of
`
`holding a virtual token when shopping on the internet; you should treat your electronic purse like
`
`cash in a wallet”). These definitions comport with Apple’s construction that an e-purse is capable
`
`of storing electronic value.
`
`Apple proposes a different, broader construction than the one advocated by Samsung and
`
`analyzed in the Google case. As RFCyber points out, “Samsung argued … that an e-purse was
`
`limited to one that ‘stores electronic money locally.’” Response at 7. The Google court rejected
`
`Samsung’s proposed construction, holding that it “would improperly limit the disputed term to a
`
`specific feature of particular disclosed embodiments.” RFCyber Corp. v. Google LLC, No. 2:20-
`
`CV-274-JRG, 2021 WL 5357465, at *9 (E.D. Tex. Nov. 17, 2021). Unlike Samsung, Apple’s
`
`construction does not limit the e-purse to storing a specific type of information. Rather, Apple’s
`
`construction confirms that an e-purse must be capable of storing electronic value, potentially in
`
`addition to other electronic financial information.
`
`RFCyber fails to identify any substantive difference between “e-purse/electronic purse”
`
`and “e-purse applet” that would require these terms be given different meanings. RFCyber’s
`
`Response regarding “e-purse applet” consists of a single paragraph that asserts “e-purse, when
`
`used as part of e-purse applet, [] is an adjective modifying ‘applet.’” Response at 11. Although
`
`RFCyber’s argument is a distinction without a difference, Apple is amenable adding the word
`
`“applet” to its construction, to make it “applet software that stores electronic financial
`
`information, including electronic value, in a local portable device.” This should resolve any
`
`imagined dispute between the parties.
`
`WEST\298672028.1
`
`3
`
`
`
`Case 6:21-cv-00916-ADA-DTG Document 59 Filed 05/24/22 Page 7 of 13
`
`B.
`
`“payment server”
`
`Term and Claims
`“payment server”
`
`’218 patent, claims 1, 3,
`5, 7-8, 11, 14, 15-16
`
`Apple’s Construction
`server for payment
`transactions
`
`RFCyber’s Construction
`Plain and ordinary
`meaning
`
`RFCyber’s Response misstates Apple’s position: Apple does not seek to limit a payment
`
`server to a server only for payment transactions. See Opening Br. at 15. Rather, Apple explained
`
`that the term refers to a server that is capable of payment transactions. Id.; see also Response at
`
`12 (acknowledging Apple’s position but not addressing it). Apple’s construction does not
`
`prevent a payment server from performing functions other than payment transactions. However,
`
`a server that is not capable of payment transactions cannot be a “payment server.”
`
`RFCyber’s arguments underscore the need for a clarifying construction. RFCyber
`
`repeatedly characterizes the primary role of the payment server as facilitating something other
`
`than payment transactions. See Response at 12 (“the payment server’s primary role as
`
`personalization of e-purse applets”), 12 (“the Asserted Patents recite a payment server in the
`
`context of the process of downloading, installing, and personalizing an e-purse applet without
`
`imposing any requirement for payment transactions”), 13 (“the payment server’s primary role is
`
`personalization of e-purse applets … not ‘facilitating or processing’ transactions”) (emphasis in
`
`original). RFCyber goes further, arguing that “the Asserted Patents recite a payment server …
`
`without imposing any requirement for payment transactions.” Response at 12. RFCyber’s
`
`position would include servers that do not and cannot process payments and would therefore read
`
`the word “payment” out of the term “payment server.” RFCyber seeks to broaden this term
`
`beyond its plain and ordinary meaning and delete words from the claim, which is improper.
`
`WEST\298672028.1
`
`4
`
`
`
`Case 6:21-cv-00916-ADA-DTG Document 59 Filed 05/24/22 Page 8 of 13
`
`Apple’s position differs from the one advanced by Samsung, so the Google court’s
`
`analysis of Samsung’s position is inapposite. RFCyber tries to equate Apple’s and Samsung’s
`
`different positions while simultaneously acknowledging that they differ. Response at 13-14
`
`(“While Apple’s construction does not explicitly recite ‘settling,’ its statement that a payment
`
`server must process a payment imposes similar scope.”). Further, the Google court’s analysis
`
`relied on the “settling” term that Apple’s construction lacks. RFCyber Corp. v. Google LLC, No.
`
`2:20-CV-274-JRG, 2021 WL 5357465, at *12 (E.D. Tex. Nov. 17, 2021) (“‘settling,’ which is a
`
`word that appears nowhere in the patents here at issue, despite there being various disclosures
`
`regarding ‘transactions,’ ‘commerce,’ and ‘purchasing’”). Samsung’s position in the prior
`
`litigation therefore has no bearing on Apple’s correct construction here.
`
`C.
`
`“security authentication module” / “SAM”
`
`Term and Claims
`“security authentication
`module”/ “SAM”
`
`’218 patent, claims 1, 3,
`11, 14
`’855 patent, claims 1, 9
`’787 patent, claims 6, 16
`
`Apple’s Construction
`hardware or software module
`containing data to authenticate
`transactions of funds or
`transfer of funds1
`
`RFCyber’s Construction
`“hardware or software
`module containing data
`necessary to authenticate
`transactions”
`
`RFCyber misstates the extent to which the parties agree on this term. Apple’s
`
`construction does not include the “necessary” term found in RFCyber’s construction. As Apple
`
`explained, the “parties dispute whether the claimed ‘security authentication module’ must
`
`contain the data to authenticate transactions, as Apple contends, or whether it may merely
`
`1 For clarity, Apple is amenable to a compromise construction of “hardware or software module
`containing data to authenticate transactions, including, but not limited to, transactions of funds or
`transfer of funds” (addition underlined).
`
`WEST\298672028.1
`
`5
`
`
`
`Case 6:21-cv-00916-ADA-DTG Document 59 Filed 05/24/22 Page 9 of 13
`
`contain some portion of data necessary to authenticate transactions under RFCyber’s improperly
`
`broad construction.” Opening Br. at 18. RFCyber does not address this issue.
`
`Apple does not propose limiting the SAM term to authenticating only “transactions of
`
`funds or transfer of funds.” Response at 14. Rather, Apple’s construction would require that a
`
`SAM contain data to authenticate transactions of funds or transfers of funds, in addition to
`
`whatever other authentication data or functionality it may include. The patents disclose that the
`
`SAM “is used to enable and authenticate any transactions between a card and a corresponding
`
`[payment] server,” including payment transactions. ’218 patent at 5:18-22 (emphasis added).
`
`And although the PTAB did not construe this term, it agreed that the SAM “is used to enable and
`
`authenticate transactions between a card and a payment server.” Opening Br. at 19, Ex. 9 at 4.
`
`Thus, Apple’s construction aligns with the meaning ascribed by the patents and by the PTAB.
`
`Apple’s proposed authentication of the “transactions of funds or transfer of funds” does
`
`not exclude the authentication of data transactions related to the same. RFCyber states without
`
`citation or explanation that “[a]n authentication transaction does not involve funds.” Response at
`
`16. But the patents describe the payment network authorizing a potential fund transaction by
`
`communicating with the SAM module. See ’218 patent, 7:56-62, Fig. 4C. The patents also
`
`discuss the use of PINs to authenticate or validate fund transfers and transactions. See id. at 2:1-
`
`8, 5:54-59, 6:62-65. Thus, an authentication transaction can involve a fund transfer or fund-
`
`related information.
`
`D.
`
`“application”
`
`Term and Claims
`“application”
`
`’787 patent, claims 1, 11
`’009 patent, claims 1-4, 6, 9,
`13-14
`
`WEST\298672028.1
`
`Apple’s Construction
`software program suitable
`for being executed on a
`portable device
`
`RFCyber’s Construction
`Plain and ordinary
`meaning
`
`6
`
`
`
`Case 6:21-cv-00916-ADA-DTG Document 59 Filed 05/24/22 Page 10 of 13
`
`’046 patent, claim 1
`’724 patent, claims 1, 3, 7, 8
`
`RFCyber’s proposal broadens the disputed term to include nearly any piece of software,
`
`regardless of whether it is capable of execution. The term “application” has a more precise
`
`meaning than a collection of lines of code or source code files.
`
`RFCyber incorrectly equates limited functionality with the inability to “execute.” For
`
`example, RFCyber points to examples in which the applications described in the patents cannot
`
`perform certain functions until obtaining related data. See Response at 16 (“The application
`
`cannot function as designed and is not enabled (i.e., it cannot be executed) until it receives the
`
`‘data prepared by the server.’”). RFCyber’s arguments create a temporal impossibility. Under
`
`RFCyber’s theory, the applications “cannot execute” without first obtaining additional data but
`
`the applications cannot obtain said data without first executing. Rather, the inability to perform a
`
`specific function requiring certain data does not render an application “unsuitable for execution.”
`
`The patents teach that the applications can and do execute, thereby providing the mechanism to
`
`obtain the necessary information (e.g., via user input, wireless communications, etc.).
`
`Likewise, disabling an application via a configuration setting does not equate to
`
`rendering the application “unsuitable for execution.” Response at 17 (“The specification also
`
`describes instances where an application is locked or disabled, and therefore, no longer suitable
`
`for being executed.”). The same software remains installed and may be executed under a
`
`different configuration. For example, the patent describes instances requiring the entry of a PIN
`
`before activating the e-purse. See ’009 patent, 17:15-22. The e-purse remains “locked” until the
`
`PIN is entered, but it does not follow that the application “cannot be executed.”
`
`RFCyber confuses the claimed “applications” with the unclaimed disclosures of other
`
`applications. The claims recite applications stored or installed on portable or mobile devices. See,
`
`WEST\298672028.1
`
`7
`
`
`
`Case 6:21-cv-00916-ADA-DTG Document 59 Filed 05/24/22 Page 11 of 13
`
`e.g., ’787 patent, claims 1 and 11 (“portable device”); ’009 patent, claims 1 and 14 (“mobile
`
`device”); ’046 patent, claim 1 (“mobile device [] configured to execute an installed application
`
`therein”); ’787 patent, claims 1 and 8 (“mobile device”). RFCyber’s arguments relying on
`
`unclaimed “web-based applications” or “server applications” exemplify the dispute between the
`
`parties and the need for a construction to prevent jury confusion. Furthermore, the language of
`
`claim 1 of the ’787 patent does not overcome the fact that every other disputed claim explicitly
`
`requires the application to reside on the portable device. Regardless, Apple would agree to a
`
`construction of “application” as “software program suitable for being executed.”
`
`II.
`
`CONCLUSION
`
`For the foregoing reasons and those demonstrated in Apple’s opening brief, Apple
`
`respectfully requests the Court adopt its constructions for the disputed terms and reject
`
`RFCyber’s request that this Court to adopt wholesale a claim construction order from a separate
`
`litigation involving different disputes and different proposed constructions.
`
`Dated: May 24, 2022
`
`Respectfully submitted,
`
`/s/ John M. Guaragna
`John M. Guaragna (Bar No. 24043308)
`Zachary Loney (Bar No. 24092714)
`DLA PIPER LLP (US)
`303 Colorado St., Suite 3000
`Austin, TX 78701
`Telephone: (512) 457-7000
`Facsimile: (512) 457-7001
`john.guaragna@us.dlapiper.com
`zachary.loney@us.dlapiper.com
`
`Sean C. Cunningham (pro hac vice)
`Erin P. Gibson (pro hac vice)
`Peter Maggiore (pro hac vice)
`DLA PIPER LLP (US)
`401 B Street, Suite 1700
`San Diego, CA 92101
`Telephone: (619) 699-2700
`
`8
`
`WEST\298672028.1
`
`
`
`Case 6:21-cv-00916-ADA-DTG Document 59 Filed 05/24/22 Page 12 of 13
`
`Facsimile: (619) 699-2701
`sean.cunningham@us.dlapiper.com
`erin.gibson@us.dlapiper.com
`peter.maggiore@us.dlapiper.com
`
`Stephanie Lim (pro hac vice)
`DLA PIPER LLP (US)
`444 West Lake Street, Suite 900
`Chicago, IL 60606
`Telephone: (312) 368-4000
`Facsimile: (312) 630-7408
`stephanie.lim@us.dlapiper.com
`
`Attorneys for Defendant Apple Inc.
`
`WEST\298672028.1
`
`9
`
`
`
`Case 6:21-cv-00916-ADA-DTG Document 59 Filed 05/24/22 Page 13 of 13
`
`CERTIFICATE OF SERVICE
`
`I hereby certify that all counsel of record who are deemed to have consented to electronic
`
`service are being served on May 24, 2022 with a copy of this document via the Court’s CM/ECF
`
`system per Local Rule CV-5(a)(3). Any other counsel of record will be served by electronic
`
`mail on this same date.
`
`/s/ John M. Guaragna
`John M. Guaragna
`
`WEST\298672028.1
`
`10
`
`