throbber
Case 6:22-cv-00697-ADA Document 41 Filed 08/21/23 Page 1 of 33
`
`
`
`
`IN THE UNITED STATES DISTRICT COURT
`FOR THE WESTERN DISTRICT OF TEXAS
`WACO DIVISION
`
`
`
`RFCyber CORP.,
`
`
`Plaintiff,
`
`
`
`v.
`
`
`VISA U.S.A. Inc.,
`
`
`Defendants.
`
`
`
`
`
`
`
`
`
`
`
`CASE NO.: 6:22-cv-00697-ADA
`
`JURY TRIAL DEMANDED
`
`
`
`
`)
`)
`)
`)
`)
`)
`)
`)
`)
`)
`)
`)
`
`DEFENDANT VISA U.S.A INC.’S
`OPENING CLAIM CONSTRUCTION BRIEF
`
`
`

`

`Case 6:22-cv-00697-ADA Document 41 Filed 08/21/23 Page 2 of 33
`
`
`
`TABLE OF CONTENTS
`
`Page
`
`I.
`
`II.
`
`INTRODUCTION .............................................................................................................. 1
`
`CLAIM CONSTRUCTION STANDARD ......................................................................... 2
`
`A.
`
`B.
`
`Claim Construction ................................................................................................. 2
`
`Indefiniteness .......................................................................................................... 2
`
`III.
`
`PATENT BACKGROUND AND TECHNOLOGY .......................................................... 3
`
`A.
`
`B.
`
`U.S. Patent Nos. 8,118,218, 8,448,855 and 9,189,787 ........................................... 3
`
`U.S. Patent No. 9,240,009....................................................................................... 6
`
`IV.
`
`AGREED CONSTRUCTIONS .......................................................................................... 7
`
`V.
`
`DISPUTED CONSTRUCTIONS ....................................................................................... 8
`
`A.
`
`“fund” and “fund stored in an emulator” ................................................................ 8
`
`1.
`
`2.
`
`3.
`
`The Parties Disagree on the Plain and Ordinary Meaning of the
`Term “Fund.” .............................................................................................. 9
`
`The Intrinsic Evidence Distinguishes “Funding” from
`“Purchasing” ............................................................................................. 10
`
`The Extrinsic Evidence Makes Clear That the Plain Meaning of
`“Fund” Is a Sum of Money or Providing Such a Sum .............................. 13
`
`B.
`
`Each Asserted System Claim Is Indefinite for Covering Both an Apparatus
`and a Method of Using the Apparatus .................................................................. 13
`
`1.
`
`2.
`
`3.
`
`’218 Patent Claims 11-18.......................................................................... 14
`
`’009 Patent Claims 1-17............................................................................ 15
`
`’787 Patent Claims 1-8, 10........................................................................ 15
`
`“e-purse SAM originally used to issue the e-purse / existing security
`authentication module (SAM) originally used to issue the e-purse” .................... 16
`
`“an appropriate transformed password based on the keys in the emulator” ......... 19
`
`“contactless interface that facilitates communication between the e-purse
`applet in the smart card and the payment server over a wired network” .............. 21
`
`-i-
`
`C.
`
`D.
`
`E.
`
`
`
`

`

`Case 6:22-cv-00697-ADA Document 41 Filed 08/21/23 Page 3 of 33
`
`
`
`F.
`
`“the agent sends commands or receives responses thereto through the
`RFID reader to/from the e-purse applet, and on the other hand, the agent
`composes network requests and receives responses thereto from the
`network server” ..................................................................................................... 25
`
`VI.
`
`CONCLUSION ................................................................................................................. 26
`
`
`
`
`
`
`
`-ii-
`
`

`

`Case 6:22-cv-00697-ADA Document 41 Filed 08/21/23 Page 4 of 33
`
`
`
`TABLE OF AUTHORITIES
`
`CASES
`
`Page(s)
`
`Bd. of Regents of the Univ. of Texas Sys. v. BENQ Am. Corp.,
`533 F.3d 1362 (Fed. Cir. 2008)..........................................................................................17
`
`Bushnell Hawthorne, LLC v. Cisco Sys., Inc.,
`813 F. App’x 522 (Fed. Cir. 2020) ....................................................................................17
`
`ERBE Elektromedizin GmbH & ERBE USA, Inc. v. ITC,
`566 F.3d 1028 (Fed. Cir. 2009)..........................................................................................12
`
`Ernie Ball, Inc. v. Earvana, LLC,
`502 F. App’x 971 (Fed. Cir. 2013) ....................................................................................20
`
`Halliburton Energy Servs., Inc. v. M-I LLC,
`514 F.3d 1244 (Fed. Cir. 2008)............................................................................................3
`
`In re Katz Interactive Call Processing Pat. Litig.,
`639 F.3d 1303 (Fed. Cir. 2011)..........................................................................................14
`
`Innova/Pure Water, Inc. v. Safari Water Filtration Sys., Inc.,
`381 F.3d 1111 (Fed. Cir. 2004)................................................................................2, 22, 25
`
`Interval Licensing LLC v. AOL, Inc.,
`766 F.3d 1364 (Fed. Cir. 2014)................................................................................3, 20, 21
`
`IPXL Holdings, L.L.C. v. Amazon.com, Inc.,
`430 F.3d 1377 (Fed. Cir. 2005)......................................................................................2, 13
`
`Nassau Precision Casting Co. v. Acushnet Co.,
`566 F. App’x 933 (Fed. Cir. 2014) ....................................................................................13
`
`Nautilus, Inc. v. Biosig Instruments, Inc.,
`572 U.S. 898 (2014) .............................................................................................2, 3, 21, 25
`
`O2 Micro Int’l Ltd. v. Beyond Innovation Tech. Co.,
`521 F.3d 1351 (Fed. Cir. 2008)..........................................................................................12
`
`Phillips v. AWH Corp.,
`415 F.3d 1303 (Fed. Cir. 2005)........................................................................................1, 2
`
`Sonix Tech. Co., Ltd. v. Publ’ns Int’l, Ltd.,
`844 F.3d 1370 (Fed. Cir. 2017)............................................................................................3
`
`TVnGO Ltd. (BVI) v. LG Elecs. Inc.,
`861 F. App’x 453 (Fed. Cir. 2021) ....................................................................................23
`
`
`
`-iii-
`
`

`

`Case 6:22-cv-00697-ADA Document 41 Filed 08/21/23 Page 5 of 33
`
`
`
`Wilson Sporting Goods Co. v. Hillerich & Bradsby Co.,
`442 F.3d 1322 (Fed. Cir. 2006)..........................................................................................10
`
`STATUTES
`
`35 U.S.C. § 101 ..............................................................................................................................13
`
`35 U.S.C. § 112 ................................................................................................................................2
`
`
`
`
`-iv-
`
`

`

`Case 6:22-cv-00697-ADA Document 41 Filed 08/21/23 Page 6 of 33
`
`I.
`
`INTRODUCTION
`
`
`
`Defendant Visa U.S.A. Inc. (“Visa”) and Plaintiff RFCyber Corp. (“RFCyber”) dispute the
`
`meaning of several terms within U.S. Patent Nos. 8,118,218 (“the ’218 Patent”); 8,448,855 (“the
`
`’855 Patent”); 9,189,787 (“the ’787 Patent”); and 9,240,009 (“the ’009 Patent”) (the “Asserted
`
`Patents”).
`
`Visa proposes constructions that are guided by the intrinsic record as well as the relevant
`
`extrinsic evidence, including the Declaration of Dr. Michael Shamos (“Shamos Decl.”) as well as
`
`textbooks, standards, articles, and dictionaries that were well known to a person of ordinary skill
`
`in the art (“POSITA”) at the time of the purported invention(s). See Phillips v. AWH Corp., 415
`
`F.3d 1303, 1317-18 (Fed. Cir. 2005). In particular, Visa’s proposed constructions for the “fund”
`
`terms are consistent with the intrinsic evidence and the plain and ordinary meaning of the word.
`
`Although RFCyber characterizes its position as to these terms as reflecting the “plain and ordinary
`
`meaning,” it is quite the opposite; in its infringement contentions, RFCyber seeks to stretch the
`
`word “fund” far beyond its ordinary meaning to bring technology, neither invented nor claimed by
`
`RFCyber, into the ambit of infringement. Construction is therefore required, and Visa’s proposal
`
`should be adopted.
`
`In addition, many of the Asserted Claims are indefinite. Certain claims cover both an
`
`apparatus and method of using the apparatus. Other claims use terms lacking any antecedent basis,
`
`are internally inconsistent, and otherwise fail to inform a person of ordinary skill in the art of their
`
`scope with reasonable certainty. These claims should be held invalid as indefinite.
`
`
`
`-1-
`
`

`

`Case 6:22-cv-00697-ADA Document 41 Filed 08/21/23 Page 7 of 33
`
`
`
`II.
`
`CLAIM CONSTRUCTION STANDARD
`
`A.
`
`Claim Construction
`
`“It is a ‘bedrock principle’ of patent law that ‘the claims of a patent define the invention to
`
`which the patentee is entitled the right to exclude.’” Phillips, 415 F.3d at 1312 (quoting
`
`Innova/Pure Water, Inc. v. Safari Water Filtration Sys., Inc., 381 F.3d 1111, 1115 (Fed. Cir.
`
`2004)).
`
`To ascertain the meaning of claims, the Court looks primarily to the intrinsic evidence: the
`
`claims themselves, the specification, and the prosecution history—where the specification “is the
`
`single best guide to the meaning of a disputed term.” Phillips, 415 F.3d at 1314-17. The claims
`
`must be read or interpreted in the light of the specifications of which they are a part. Id. at 1316.
`
`Extrinsic evidence consists of “evidence external to the patent and prosecution history,
`
`including expert and inventor testimony, dictionaries, and learned treatises” and may be considered
`
`in claim construction as well. Id. at 1317. While extrinsic evidence is less significant than the
`
`intrinsic record in determining the legally operative meaning of claim language, the Court can still
`
`consider extrinsic evidence where it is helpful “[to] educate [itself] regarding the field of the
`
`invention . . . [and to] determine what a [POSITA] would understand claim terms to mean.” Id. at
`
`1319.
`
`B.
`
`Indefiniteness
`
`Patent claims must particularly point out and distinctly claim the subject matter regarded
`
`as the invention. Pre-AIA 35 U.S.C. § 112 ¶ 2. A claim, when viewed in light of the intrinsic
`
`evidence, must “inform those skilled in the art about the scope of the invention with reasonable
`
`certainty.” Nautilus, Inc. v. Biosig Instruments, Inc., 572 U.S. 898, 910 (2014); see also IPXL
`
`Holdings, L.L.C. v. Amazon.com, Inc., 430 F.3d 1377, 1383-84 (Fed. Cir. 2005). If it does not, the
`
`
`
`-2-
`
`

`

`Case 6:22-cv-00697-ADA Document 41 Filed 08/21/23 Page 8 of 33
`
`
`
`claim is invalid as indefinite. Nautilus, 572 U.S. at 901. Whether a claim is indefinite is
`
`determined from the perspective of one of ordinary skill in the art as of the time the application for
`
`the patent was filed. Id. at 911. “Even if a claim term’s definition can be reduced to words, the
`
`claim is still indefinite if a person of ordinary skill in the art cannot translate the definition into
`
`meaningfully precise claim scope.” Halliburton Energy Servs., Inc. v. M-I LLC, 514 F.3d 1244,
`
`1251 (Fed. Cir. 2008); see also Interval Licensing LLC v. AOL, Inc., 766 F.3d 1364, 1371 (Fed.
`
`Cir. 2014) (“The claims, when read in light of the specification and the prosecution history, must
`
`provide objective boundaries for those of skill in the art.”). “Indefiniteness must be proven by
`
`clear and convincing evidence.” Sonix Tech. Co., Ltd. v. Publ’ns Int’l, Ltd., 844 F.3d 1370, 1377
`
`(Fed. Cir. 2017).
`
`III.
`
`PATENT BACKGROUND AND TECHNOLOGY
`
`The Asserted Patents are directed to various aspects of a mobile payment and, in particular,
`
`the personalization, loading, and use of an electronic purse (“e-purse”) on a smart card in a portable
`
`device to conduct secure transactions.
`
`A.
`
`U.S. Patent Nos. 8,118,218, 8,448,855 and 9,189,787
`
`The ’218, ’855, and ’787 Patents share a common specification and describe an e-purse on
`
`a smart card mobile phone or other portable device, which allows the device to conduct secure
`
`payment transactions with a payment server. ’218 Patent at 1:6-22, 1:34-38, FIG. 2.1 The Asserted
`
`Patents refer to an e-purse as a “single functional card” having “stored values,” i.e., electronic
`
`money, for performing “micro payment transactions.” Id. at 1:14-17, 1:23-27, 3:51-55, 3:61-63,
`
`
`
`1 Because these three Asserted Patents share a specification, references to the ’218 Patent
`specification and figures encompass the corresponding portions of the other two as well unless
`otherwise specified.
`
`-3-
`
`
`
`

`

`Case 6:22-cv-00697-ADA Document 41 Filed 08/21/23 Page 9 of 33
`
`
`
`4:2-7, 4:62-64. The Asserted Patents acknowledge that “[s]ingle functional cards have been
`
`successfully used in enclosed environments such as transportation systems” and highlight the
`
`MIFARE card as a widely used e-purse. Id. at 1:13-22. They assert, however, that “such enclosed
`
`systems are difficult to be expanded into other areas such as e-commerce and m-commerce because
`
`stored values and transaction information are stored” in a way that is “protected by a set of keys,”
`
`and “the keys need to be delivered to the card for authentication before data can be accessed during
`
`a transaction.” Id. at 1:23-29. The Asserted Patents assert that there is “a need for a mechanism
`
`in devices, especially portable devices, functioning as an electronic purse (e-purse) to be able to
`
`conduct transactions over an open network with a payment server without compromising security.”
`
`Id. at 1:34-38.
`
`The Asserted Patents’ purported solution is to provide “a mechanism to be embedded” in
`
`the portable device to function as an e-purse and provide the necessary security. Id. at 2:42-46.
`
`That “mechanism” is a smart card. Id. at 2:10-41. The smart card comes with a preloaded
`
`operating system, such as Java Card Open Platform (“JCOP”), which provides “a general security
`
`framework,” such as the GlobalPlatform standard, for “card personalization.” Id. at 4:8-22, 4:41-
`
`46, 4:50-56. The operating system’s security “control[s] the access to the smart card (e.g., an
`
`installation of external applications into the smart card).” Id. at 4:47-50.
`
`The Asserted Patents explain that “multiple application smart cards”—including the well-
`
`known SmartMX smart card by Philips—can also come “pre-loaded with an emulator,” such as a
`
`MIFARE emulator, allowing the multi-application smart card to mimic (or “emulate”) single
`
`functional cards such as a MIFARE transit card for use with MIFARE readers. Id. at 2:14, 2:27-
`
`28, 3:51-60, 4:62-64, FIG. 2.
`
`
`
`-4-
`
`

`

`Case 6:22-cv-00697-ADA Document 41 Filed 08/21/23 Page 10 of 33
`
`
`
`The Asserted Patents teach that a smart card, including an e-purse applet or emulator in the
`
`smart card, can be personalized using a GlobalPlatform card manager to enable a secure channel
`
`to be established between the e-purse and a server. Id. at 4:11-22, 5:50-54. Personalization
`
`involves loading a specific user’s data into the e-purse, e.g., the user’s account information,
`
`“operation keys (e.g., a load key and a purchase key), default PINs, administration keys (e.g., an
`
`unblock PIN key and a reload PIN key), and passwords (e.g., from Mifare).” Id. at 5:54-59. Smart
`
`cards that comply with the GlobalPlatform standard have at least one security domain that
`
`“includes three 3DES keys,” which are encryption keys that are “used to generate session keys for
`
`a secured session between two entities,” i.e., a security channel. Id. at 6:29-47, FIG. 3C. The
`
`security domain and encryption keys are “installed by a card issuer.” Id. at 6:48-54. Another set
`
`of keys can also be generated and distributed to the e-purse applet to secure subsequent operations.
`
`Id. at 6:55-7:9, FIG. 3C.
`
`The Asserted Patents also describe a process for “funding” the e-purse—a necessary step
`
`in using it to conduct transactions. Id. at 7:10-13, 8:7-12, FIGs. 4A-4C. After a valid PIN entry,
`
`a midlet initiates an over-the-air (“OTA”) “top off request,” sending a request to the e-purse applet.
`
`Id. at 7:22-28, FIG. 4A. The e-purse applet composes a response to the request, which is sent via
`
`the midlet to “a payment network and server over a wireless network.” Id. at 7:29-32, FIG. 4A.
`
`The response is verified and a bank account at a financial institution is then verified. Id. at 7:35-
`
`44, FIG. 4A. A response is then sent back to the midlet, after which commands are extracted from
`
`the response and sent to the e-purse. Id. at 7:45-48, FIG. 4B. The e-purse verifies the commands
`
`and then updates the emulator and transaction logs to reflect the updated stored value. Id. at 7:48-
`
`51, FIG. 4B.
`
`
`
`
`
`-5-
`
`

`

`Case 6:22-cv-00697-ADA Document 41 Filed 08/21/23 Page 11 of 33
`
`
`
`B.
`
`U.S. Patent No. 9,240,009
`
`The ’009 Patent is a continuation-in-part of the ’218 Patent and describes mobile devices
`
`with “secure element[s]” that can securely host “an application such as an electronic purse” for
`
`conducting secured transactions over a network. ’009 Patent at 1:18-24. The ’009 Patent includes
`
`the disclosures found in the ’218, ’855, and ’787 Patent specifications, as well as additional
`
`disclosures and figures.
`
`The ’009 Patent states:
`
`[T]here is a need to provide techniques to personalize a secure element in a
`contactless smart card or an NFC-enabled mobile device so that such a device is so
`secured and personalized when it comes to financial applications or secure
`transactions. With a personalized secure element in an NFC-enabled mobile device,
`various applications or services, such as electronic purse or payments, can be
`realized.
`
`Id. at 2:10-17. The ’009 Patent teaches that, when a mobile device is obtained, the secure element
`
`(“SE”) “is installed with a set of default keys (e.g., an Issuer Security Domain (ISD) key set by the
`
`SE manufacturer).” Id. at 6:55-58, 8:46-48. “[A] standard-compliant secure element comes with
`
`one issuer security domain (ISD) and an option for one or more supplemental security domains
`
`(SSD). Each of these domains includes a set of keys.” Id. at 7:1-4.
`
`The ’009 Patent explains that the “SE 102 needs to go through a personalization process
`
`before it can be used.” Id. at 7:13-14. “The personalization process can be done either physically
`
`in a service center or remotely via a web portal by a TSM server.” Id. at 7:49-51. A “TSM,
`
`standing for Trusted Service Management, is a collection of services” that can “help service
`
`providers securely distribute and manage contactless services for their customers using the
`
`networks of mobile operators.” Id. at 7:35-39. The default “device information (e.g., ISD) of the
`
`SE” can be used to derive personalized keys to personalize the SE. Id. at 8:57-9:23. “After the
`
`personalization, the SE can only be accessed using the personalized ISD key of the SE issuer.
`
`
`
`-6-
`
`

`

`Case 6:22-cv-00697-ADA Document 41 Filed 08/21/23 Page 12 of 33
`
`
`
`Depending on the security requirement of each service provider, the TSM can create additional
`
`SSDs for the various providers to personalize their respective applications (e.g., the modules 104
`
`or 106 of FIG. 1A).” Id. at 9:24-29.
`
`The ’009 Patent describes “an e-token enabled device,” such as “a single functional card
`
`or a portable device enabled with an e-purse” that “may represent e-money, e-coupon, e-ticket, e-
`
`voucher or any other forms of payment tokens in a device.” Id. at 20:44-50. Transactions using
`
`the e-token device may occur in “real time” and “offline (i.e., without the portable device
`
`connecting to a backend POS transaction server[].” Id. at 20:51-58; see also id. at FIGs. 6A-6D.
`
`FIG. 6D depicts “a flowchart illustrating an exemplary process [] of conducting m-commerce using
`
`a portable device.” Id. at 22:48-56, FIG. 6D. The ’009 Patent explains that transactions using the
`
`e-purse may be evaluated against the value stored on the e-purse to determine whether to approve
`
`or deny the transaction or to allow the user to “top-up” and attempt re-processing. Id. at 22:57-
`
`23:32, FIGs. 6C and 6D.
`
`IV. AGREED CONSTRUCTIONS
`
`The parties met and conferred on August 4, 2023 and exchanged emails on August 7, 2023,
`
`agreeing to constructions for the following terms:
`
`No. Claim Term
`
`Agreed Construction
`
`1.
`
`“PIN”
`
`“personal identification number”
`
`’218 Patent, Claims 2, 13
`’855 Patent, All Claims
`’787 Patent, Claim 7
`
`2.
`
`“e-purse” / “electronic purse”
`
`“software that stores electronic financial
`information in a local device”
`
`’218 Patent, All Claims
`’855 Patent, All Claims
`’787 Patent, All Claims
`’009 Patent, Claim 3
`
`
`
`-7-
`
`

`

`Case 6:22-cv-00697-ADA Document 41 Filed 08/21/23 Page 13 of 33
`
`
`
`No. Claim Term
`
`Agreed Construction
`
`3.
`
`“smart card pre-loaded with an
`emulator” / “a SmartMX (SMX)
`module pre-loaded with the
`emulator”
`
`“smart card with an emulator loaded prior to the
`smart card being provided” / “a SmartMX (SMX)
`module with an emulator loaded prior to the SMX
`being provided”
`
`’218 Patent, All Claims
`’855 Patent, Claims 2 and 11
`
`4.
`
`“security authentication module”
`and “SAM”
`
`“hardware or software module containing data
`necessary to authenticate transactions”
`
`’218 Patent, All Claims
`’855 Patent, All Claims
`’787 Patent, Claims 6 and 16
`
`5.
`
`“emulator”
`
`’218 Patent, All Claims
`’855 Patent, All Claims
`’787 Patent, All Claims
`
`“a hardware device or a program that pretends to
`be another particular device or program that other
`components expect to interact with”
`
`6.
`
`“e-purse applet”
`
`“applet for use with an e-purse”
`
`’218 Patent, All Claims
`’855 Patent, All Claims
`’787 Patent, All Claims
`
`V.
`
`DISPUTED CONSTRUCTIONS
`
`A.
`
`“fund” and “fund stored in an emulator”
`
`Term and Claims
`“fund” / “fund stored in the
`emulator”
`
`’855 Patent, Claim 9
`’787 Patent, Claims 1 and 11
`“fund” / “funded” / “funding”
`
`’218 Patent, Claims 10, 18
`’855 Patent, Claim 1, 4, 13
`
`
`
`
`
`
`
`
`Visa’s Construction
`“money balance” / “money
`balance stored in the
`emulator”
`
`RFCyber’s Construction
`Plain and ordinary meaning
`except for “emulator”
`
`“add / added / adding money
`balance to”
`
`Plain and ordinary meaning
`
`-8-
`
`

`

`Case 6:22-cv-00697-ADA Document 41 Filed 08/21/23 Page 14 of 33
`
`
`
`The term “fund” appears in the following claims:
`
`Claim Number
`
`Claim Language
`
`’218 Patent, Claims 10 and 18
`
`“the e-purse is funded2 through a financial institution that
`maintains an account for a user”
`
`’855 Patent, Claims 1 and 9
`
`“A method for funding an e-purse”
`
`“a fund transfer request is initiated by the server to the
`financial institution” / “initiating a fund transfer request by a
`server with a financial institution”
`
`“responding to the fund transfer request”
`
`’855 Patent, Claims 4 and 13
`
`“to regulate or control data exchange between the server and
`the portable device for funding the e-purse therein”
`
`’787 Patent, Claims 1 and 11
`
`“to perform electronic commerce with the e-purse applet
`against a fund stored in the emulator”
`
`“to perform mobile commerce with a payment server via an
`application against the fund stored in the emulator” /
`“performing mobile commerce via a second interface with a
`payment server via an application against the fund stored in
`the emulator”
`
`
`
`1.
`
`The Parties Disagree on the Plain and Ordinary Meaning of the Term
`“Fund.”
`
`The plain claim language of the Asserted Patents demonstrates that “fund” means adding
`
`to a money balance (as a verb) or a money balance itself (as a noun). Although RFCyber contends
`
`the term “fund” should receive its “plain and ordinary meaning,” its infringement contentions
`
`reflect a wholly unsupportable construction. See RFCyber Infringement Contentions, ’787 Claim
`
`Chart at 58, element 1[d]. RFCyber contends, for example, that “consumable keys or tokens” can
`
`constitute a “fund” despite the fact that those keys or tokens do not reflect any money, balance, or
`
`
`
`2 All emphasis herein is added, and all internal citations and quotations are omitted unless
`otherwise noted.
`
`-9-
`
`
`
`

`

`Case 6:22-cv-00697-ADA Document 41 Filed 08/21/23 Page 15 of 33
`
`
`
`anything else falling within the ordinary meaning of the term. Id.; see also Wilson Sporting Goods
`
`Co. v. Hillerich & Bradsby Co., 442 F.3d 1322, 1331 (Fed. Cir. 2006) (The “court may refer to the
`
`accused product or process for [] context” for “breadth of the claim construction analysis and the
`
`most useful terms to facilitate that defining process”). Visa’s proposed constructions are consistent
`
`with the plain and ordinary meaning of the word “fund” and the intrinsic evidence, and therefore
`
`should be adopted.
`
`2.
`
`The Intrinsic Evidence Distinguishes “Funding” from “Purchasing”
`
` In the ’787 Patent, independent claims 1 and 11 both use the term “fund stored in the
`
`emulator.” In the ’855 Patent, independent claims 1 and 9 both recite “a method for funding an
`
`e-purse” that involves “a fund transfer request” initiated by “a server with a financial institution
`
`administrating the e-purse when the request is successfully verified.” Thus, these claims describe
`
`a “fund” that is transferred and then stored on an emulator and/or for use with the e-purse.
`
`The plain claim language of the ’218 Patent also demonstrates that “fund” means a money
`
`balance or adding to a money balance. In the ’218 Patent, only two claims use the term: dependent
`
`claims 10 and 18. Whereas the other claims, including independent claims 1 and 11, describe a
`
`method and system for providing an e-purse without requiring that the e-purse be “funded,” claims
`
`10 and 18 specifically require that the “e-purse is funded through a financial institution that
`
`maintains an account for a user being associated with the portable device.” This meaning is further
`
`supported by the remaining use of the term “fund” in the claims of the ’855 Patent. Dependent
`
`claims 4 and 13 of the ’855 Patent describe “funding the e-purse,” not, for example, enabling a
`
`purchase as “funding.” Accordingly, “funding” an e-purse means adding or storing a money
`
`balance in the e-purse and does not encompass merely enabling a transfer of money from one
`
`
`
`-10-
`
`

`

`Case 6:22-cv-00697-ADA Document 41 Filed 08/21/23 Page 16 of 33
`
`
`
`financial institution to another or a purchase. It is clear from the claims themselves that an actual
`
`balance of money is being transferred and/or stored as claimed.
`
`The shared specification of the ’218,’855, and ’787 Patents makes clear that this was the
`
`intended meaning of the term “fund”: a money balance or to add to a money balance. Each of the
`
`three times the term “fund” is used in the shared specification, it describes adding a balance to the
`
`e-purse: “The user desires to fund the e-purse from an account associated with a bank. . . . If the
`
`account does exist, a fund transfer request is initiated. . . [T]he process 400 is described as funding
`
`the e-purse.” ’218 Patent at 7:10-8:8. The specification further confirms the e-purse has a
`
`“balance.” Id. at 5:16-18 (describing “viewing a purse balance”). It never appears in the context
`
`of making a purchase or another transaction. In the description of this funding process, the transfer
`
`of funds only occurs between the user’s bank and the user’s e-purse; there is no reference to another
`
`party to any transaction, such as a merchant, that would suggest that “funding” could mean
`
`something other than adding to the money balance of the e-purse. Indeed, the shared specification
`
`clearly describes “funding the e-purse” as a distinct process from “making a purchase.” Id. at 8:7-
`
`12 (“Although the process 400 is described as funding the e-purse. Those skilled in the art can
`
`appreciate that the process of making purchasing [sic]over a network with the e-purse is
`
`substantially similar to the process 400, accordingly no separate discussion on the process of
`
`making purchasing is provided.”). Therefore, the inventor unequivocally distinguished the process
`
`of “funding” from the process of “purchasing.” If the patent applicants had wanted to claim
`
`“purchasing,” they could have used that term or a broader term than “funding” in the claims.
`
`Additionally, in referencing an “OTA top off request,” the details of the embodiment
`
`provided in the specification for “funding the e-purse” further confirms that the term “fund” means
`
`a money balance or adding to a money balance:
`
`
`
`-11-
`
`

`

`Case 6:22-cv-00697-ADA Document 41 Filed 08/21/23 Page 17 of 33
`
`
`
`The user desires to fund the e-purse from an account associated with a bank. At
`402, the user enters a set of personal identification numbers (PIN). Assuming the
`PIN is valid, a purse manger in the device is activated and initiates a request (also
`referred to an OTA top off request) at 404. The midlet in the device sends a
`request to the e-purse applet at 406, which is illustrated in FIG. 4C where the e-
`purse manager midlet 434 communicates with the e-purse applet 436.
`
`Id. at 7:20-28. A “top off” is the act of refilling the money balance on the card. See Shamos Decl.
`
`¶ 51. Like “topping off” a gas tank, it means to actually add to the card; it does not refer to any
`
`and every activity that could relate to a card being used in a transaction.
`
`The specification further explains the process for a “fund transfer request”:
`
`If the response can be verified, the process 400 moves to 412 where a corresponding
`account at a bank is verified. If the account does exist, a fund transfer request is
`initiated. At 414, the bank receives the request and responds to the request by
`returning a response. In general, the messages exchanged between the payment
`network and server and the bank are compliant with a network protocol (e.g., HTTP
`for the Internet).
`
`’218 Patent at 7:36-44. Again, “fund” is used to mean adding a money balance to the device. The
`
`“messages exchanged” are only between “the payment network and server and the bank” so that
`
`the bank can transfer funds to the device. There is no discussion of a fund transfer request being
`
`a request to complete a purchase made using the e-purse because, as the specification made clear,
`
`funding is separate and distinct from purchasing.
`
`Adopting Visa’s proposed construction is necessary to avoid allowing RFCyber to
`
`“construe claim language to be inconsistent with the clear language of the specification” to support
`
`RFCyber’s infringement positions. See ERBE Elektromedizin GmbH & ERBE USA, Inc. v. ITC,
`
`566 F.3d 1028, 1034 (Fed. Cir. 2009); see also O2 Micro Int’l Ltd. v. Beyond Innovation Tech.
`
`Co., 521 F.3d 1351, 1361 (Fed. Cir. 2008) (“A determination that a claim term ‘needs no
`
`construction’ or has the ‘plain and ordinary meaning’ may be inadequate . . . when reliance on a
`
`term’s ‘ordinary’ meaning does not resolve the parties’ dispute.”).
`
`
`
`-12-
`
`

`

`Case 6:22-cv-00697-ADA Document 41 Filed 08/21/23 Page 18 of 33
`
`
`
`3.
`
`The Extrinsic Evidence Makes Clear That the Plain Meaning of
`“Fund” Is a Sum of Money or Providing Such a Sum
`
`As demonstrated above, none of the claims or the specification describe a fund as being
`
`used in any other manner than the common meaning of the word, which is a sum of money or to
`
`supply such a sum. See Ex. 1 (VISA_USA_00009148 at -9148) (“1: store 2: sum of money”); see
`
`also Ex. 2 (VISA_USA_00009158 at -9164) (“a supply of money or monetary resources”). There
`
`is no discussion of “fund” meaning storing credit card numbers, bank account numbers, or payment
`
`tokens that in turn might be utilized to transfer money. That is simply not what a “fund” or
`
`“funding” means. The inventor should not be able to retroactively redefine the term to capture
`
`technology that is clearly neither described nor claimed in the Asserted Patents. The extrinsic
`
`evidence is consistent with Visa’s proposed construction, which the Court should adopt.
`
`B.
`
`Each Asserted System Claim Is Indefinite for Covering Both an Apparatus
`and a Method of Using the Apparatus
`
`The Federal Circuit “has long warned that apparatus and method claims ‘are directed
`
`toward different classes of patentable subject material under 35 U.S.C. § 101’ and that the
`
`distinction should not be blurred.” Nassau Precision Casting Co. v. Ac

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket