throbber
Case 6:22-cv-00697-ADA Document 41-1 Filed 08/21/23 Page 1 of 98
`
`
`
`IN THE UNITED STATES DISTRICT COURT
`FOR THE WESTERN DISTRICT OF TEXAS
`WACO DIVISION
`
`
`
`RFCyber CORP.,
`
`
`Plaintiff,
`
`
`
`v.
`
`
`VISA U.S.A. Inc.,
`
`
`Defendant.
`
`
`
`
`
`
`
`
`
`
`
`CASE NO.: 6:22-cv-00697-ADA
`
`JURY TRIAL DEMANDED
`
`
`
`
`)
`)
`)
`)
`)
`)
`)
`)
`)
`)
`)
`)
`
`DECLARATION OF MICHAEL SHAMOS, PH.D., IN SUPPORT OF
`DEFENDANT’S OPENING CLAIM CONSTRUCTION BRIEF
`
`I, Michael Ian Shamos, Ph.D., do hereby declare as follows under penalty of perjury under
`
`the laws of Texas and the United States:
`
`I.
`
`INTRODUCTION
`
`1.
`
`My name is Michael Shamos. I have been retained as an expert witness by
`
`Defendant Visa U.S.A. Inc. (“Visa” or “Defendant”) in this matter.
`
`2.
`
`I have been asked to opine on the meaning of certain terms used in the asserted
`
`claims of U.S. Patents 8,118,218 (the “’218 Patent”); 8,448,855 (the “’855 Patent”); 9,189,787
`
`(the “’787 Patent”); and 9,240,009 (the “’009 Patent”) (collectively, the “Patents”).
`
`3.
`
`This Declaration contains statements of my opinions formed in this case to date and
`
`the bases and reasons for those opinions. I may offer additional opinions based on further review
`
`of materials in this case, including opinions and/or testimony of other expert witnesses.
`
`-1-
`
`
`

`

`Case 6:22-cv-00697-ADA Document 41-1 Filed 08/21/23 Page 2 of 98
`
`
`
`II.
`
`QUALIFICATIONS
`
`4.
`
`This section summarizes my educational background, career history, publications,
`
`and other relevant qualifications. My curriculum vitae is attached as Appendix A, which includes
`
`my detailed employment background, professional experience, and list of publications.
`
`5.
`
`I have an A.B. degree from Princeton University in Physics, an M.A. degree from
`
`Vassar College in Physics, an M.S. degree from American University in Technology of
`
`Management, an M.S. degree from Yale University in Computer Science, an M. Phil. from Yale
`
`University in Computer Science, a Ph.D. from Yale University in Computer Science, and a J.D.
`
`degree from Duquesne University.
`
`6.
`
`I currently hold the title of Distinguished Career Professor in the School of
`
`Computer Science at Carnegie Mellon University in Pittsburgh, Pennsylvania. I am a member of
`
`two departments in that School, the Software and Societal Systems Department and the Language
`
`Technologies Institute. I was a founder and Co-Director of the Institute for eCommerce at
`
`Carnegie Mellon from 1998-2004 and from 2004-2018 have been Director of the eBusiness
`
`Technology graduate program in the Carnegie Mellon University School of Computer Science.
`
`Since 2018, I have been Director of the M.S. in Artificial Intelligence and Innovation degree
`
`program at Carnegie Mellon.
`
`7.
`
`I have taught graduate courses at Carnegie Mellon in Electronic Commerce,
`
`including eCommerce Technology, Electronic Payment Systems, Electronic Voting, Internet of
`
`Things, Ubiquitous Computing, Electronic Payment Systems and eCommerce Law and
`
`Regulation, as well as Analysis of Algorithms. Since 2007, I have taught an annual course in Law
`
`of Computer Technology. I currently also teach Artificial Intelligence and Future Markets.
`
`8.
`
`I am the author and lecturer in a 24-hour video course on Internet protocols and
`
`have taught computer networking, wireless communication, and Internet architecture since 1999.
`
`-2-
`
`

`

`Case 6:22-cv-00697-ADA Document 41-1 Filed 08/21/23 Page 3 of 98
`
`
`
`9.
`
`From 2001-2021, I was a Visiting Professor at the University of Hong Kong, where
`
`I taught an annual course in Electronic Payment Systems. This is one of only a handful of graduate
`
`courses taught on this subject in the world.
`
`10.
`
`I was the Director of Carnegie Mellon’s graduate degree program in eBusiness
`
`Technology from 1999-2018 and am now a faculty member in the Privacy Engineering degree
`
`program at Carnegie Mellon. My course on Law of Computer Technology is required for all
`
`students in that program.
`
`11.
`
`I am a named inventor on the following six issued patents relating to electronic
`
`commerce: U.S. Patent Nos. 7,330,839; 7,421,278; 7,747,465; 8,195,197; 8,280,773; and
`
`9,465,299.
`
`12.
`
`From 1979-1987 I was the founder and president of two computer software
`
`development companies in Pittsburgh, Pennsylvania, Unilogic, Ltd. and Lexeme Corporation.
`
`13.
`
`I am an attorney admitted to practice in Pennsylvania and have been admitted to
`
`the Bar of the U.S. Patent and Trademark Office since 1981. I have been asked to render opinions
`
`in this Declaration as a technical expert. I have not been asked to offer any opinions on patent law
`
`in this proceeding.
`
`14.
`
`I have previously served as an expert in over 360 cases concerning computer
`
`technology. In particular, I have been involved in at least 35 cases involving electronic payment
`
`systems.
`
`III. COMPENSATION
`
`15.
`
`I am being compensated for my work in this case at the rate of $600 per hour. I am
`
`also reimbursed for all reasonable expenses that I incur during the course of this case. My
`
`compensation does not depend upon the results of my analysis or the substance of my testimony,
`
`nor does my compensation depend on the outcome of this or any related proceeding. I have no
`
`-3-
`
`

`

`Case 6:22-cv-00697-ADA Document 41-1 Filed 08/21/23 Page 4 of 98
`
`
`
`personal interest in the outcome of this matter. I have no financial interest in RFCyber Corp.
`
`(“Patent Owner”) or affiliation with any of parties in interest, the Patent Owner or the inventors of
`
`the Patents. It is conceivable that I may own mutual funds whose portfolios include stock in
`
`Defendant’s affiliate Visa, Inc. If this is the case, the value of such holding would not constitute
`
`a material part of my net worth.
`
`16.
`
`The statements made and opinions provided in this Declaration are based on my
`
`own personal knowledge and experience.
`
`17.
`
`In this Declaration, all emphasis in boldface has been added unless otherwise noted.
`
`IV. RELEVANT LEGAL PRINCIPLES
`
`18.
`
`I have been informed by counsel for Visa that the following principles of law are
`
`applicable to claim construction, and I have applied these principles in my analysis.
`
`19.
`
`The claims of a patent define the limits of the patentee’s exclusive rights. In order
`
`to determine the scope of the claimed invention, courts may construe (or define) claim terms when
`
`the meanings are disputed by the parties.
`
`20.
`
`Claim terms should generally be given their ordinary and customary meaning as
`
`understood by one of ordinary skill in the art at the time of the invention after reading the patent
`
`and its prosecution history.
`
`21.
`
`Claims must be construed, however, in light of, and consistent with, the patent’s
`
`intrinsic evidence. Intrinsic evidence includes the claims themselves, the written disclosure in the
`
`patent’s specification, and the patent’s prosecution history, including the prior art that was
`
`considered by the United States Patent and Trademark Office (“PTO”).
`
`22.
`
`The language of the claims helps guide the construction of claim terms. The context
`
`in which a term is used in the claims can be highly instructive.
`
`-4-
`
`

`

`Case 6:22-cv-00697-ADA Document 41-1 Filed 08/21/23 Page 5 of 98
`
`
`
`23.
`
`The specification of the patent is the best guide to the meaning of a disputed claim
`
`term, beyond the wording of the claims themselves. Embodiments disclosed in the specification
`
`help teach and enable those of skill in the art to make and use the invention, and are helpful to
`
`understanding the meaning of claim terms. Nevertheless, in many cases, the limitations of
`
`preferred embodiments and examples appearing in the specification should not be read into the
`
`claims.
`
`24.
`
`In the specification, a patentee may also define his own terms, give a claim term a
`
`different meaning than it would otherwise possess, or disclaim or disavow claim scope. A court
`
`may generally presume that a claim term possesses its ordinary meaning. This presumption,
`
`however, does not arise when the patentee acts as his own lexicographer by explicitly defining or
`
`re-defining a claim term. This presumption of ordinary meaning can also be overcome by
`
`statements, in the specification or prosecution history of the patent, of clear disclaimer or
`
`disavowal of a particular claim scope.
`
`25.
`
`The specification may also resolve any ambiguity if the ordinary and customary
`
`meaning of a claim term lacks sufficient clarity to permit the scope of the claim to be ascertained
`
`from the words of the claim alone.
`
`26.
`
`The prosecution history can be another important source of evidence in the claim
`
`construction analysis. The prosecution history is the record of the proceedings before the PTO,
`
`including communications between the patentee and the PTO. The prosecution history can inform
`
`the meaning of the claim language by demonstrating how the patentee and the PTO understood
`
`the invention and whether the patentee limited the invention in the course of prosecution, making
`
`the claim scope narrower than it would otherwise be. A patentee may also define a term during
`
`the prosecution of the patent. The patentee is precluded from recapturing through claim
`
`-5-
`
`

`

`Case 6:22-cv-00697-ADA Document 41-1 Filed 08/21/23 Page 6 of 98
`
`
`
`construction specific meanings or claim scope clearly and unambiguously disclaimed or
`
`disavowed during prosecution.
`
`27.
`
`Courts can also consider extrinsic evidence when construing claims. Extrinsic
`
`evidence is any evidence that is extrinsic to the patent itself and its prosecution history. Examples
`
`of extrinsic evidence include technical dictionaries, treatises, and expert testimony. I understand
`
`that extrinsic evidence is less significant than the intrinsic record in determining the meaning of
`
`claim language, and that a court should discount extrinsic evidence that is at odds with the intrinsic
`
`record.
`
`28.
`
`I understand that the patent claims can be invalidated for indefiniteness when they
`
`simultaneously claimed a product and a method of using it.
`
`29.
`
`I further understand that if the patent claims, read in light of the specification and
`
`the prosecution history, fail to inform, with reasonable certainty, those skilled in the art about the
`
`scope of the invention, they are invalid for indefiniteness. I understand that “reasonable certainty”
`
`does not require absolute precision in the language of the claims. Rather, the claims must be
`
`precise enough to give clear notice of what is claimed and what is still available in the public
`
`domain. I also understand that when analyzing definiteness, the claims must be interpreted from
`
`the perspective of a person of ordinary skill in the art at the time the invention was made in light
`
`of the specification and prosecution history.
`
`V.
`
`LEVEL OF ORDINARY SKILL IN THE ART
`
`30.
`
`It is my understanding that my analysis of the interpretation of a claim term must
`
`be undertaken from the perspective of what would have been known or understood by a person
`
`having ordinary skill in the art (“POSITA”) at the time of the invention. In determining the
`
`appropriate level of ordinary skill in the art in this case, I have been instructed that various factors
`
`may be considered, including the type of problems encountered in the art, prior art solutions to
`
`-6-
`
`

`

`Case 6:22-cv-00697-ADA Document 41-1 Filed 08/21/23 Page 7 of 98
`
`
`
`those problems, the rapidity with which innovations are made, the sophistication of the technology,
`
`and the educational level of active workers in the field. I have considered these factors in my
`
`analysis.
`
`31.
`
`It is my opinion that a POSITA would have a bachelor’s degree in computer
`
`science, computer engineering, or equivalent, with one year of experience relating to mobile
`
`technology or electronic payment technology. A person of ordinary skill in the art could have less
`
`formal education if that person had additional years of relevant professional experience.
`
`32.
`
`I understand that the Patents claim priority to U.S. Patent Application No.
`
`11/534,653, filed on September 24, 2006, although any given claim of those Patents may not be
`
`entitled to the that date. I also understand that Visa contends that the ’009 Patent is not entitled to
`
`a priority date any earlier than January 16, 2012.
`
`33.
`
`I also understand that RFCyber contends that each of the Patents has a priority date
`
`at least as early as July 1, 2004.
`
`34.
`
`At all times, I have understood and interpreted the claims of the Patents from the
`
`point of view of a POSITA as of the 2006 timeframe with respect to the ’218, ’855, and ’787
`
`Patents, and as of the 2012 timeframe with respect to the ’009 Patent. However, the opinions set
`
`forth in this Declaration would not change if the Court were to determine that one or more of the
`
`Patents were entitled to a priority date as early as 2004.
`
`VI.
`
`TECHNOLOGICAL BACKGROUND
`
`U.S. Patent Nos. 8,118,218, 8,448,855 and 9,189,787
`
`35.
`
`The ’218, ’855, and ’787 Patents share a common specification and describe an e-
`
`purse on a smart card mobile phone or other portable device, which allows the device to conduct
`
`-7-
`
`

`

`Case 6:22-cv-00697-ADA Document 41-1 Filed 08/21/23 Page 8 of 98
`
`
`
`secure payment transactions with a payment server. ’218 Patent at 1:6-22, 1:34-38, Fig. 2.1. The
`
`Patents refer to an e-purse as a “single functional card” having “stored values,” i.e., electronic
`
`money, for performing “micro payment transactions.” Id. at 1:14-17, 1:23-27, 3:51-55, 3:61-63,
`
`4:2-7, 4:62-64. The Patents acknowledge that “[s]ingle functional cards have been successfully
`
`used in enclosed environments such as transportation systems” and highlight the MIFARE card as
`
`having been a widely used e-purse. Id. at 1:13-22. They assert, however, that “such enclosed
`
`systems are difficult to be expanded into other areas such as e-commerce and m-commerce because
`
`stored values and transaction information are stored” in a way that is “protected by a set of keys,”
`
`and “the keys need to be delivered to the card for authentication before data can be accessed during
`
`a transaction.” Id. at 1:23-29. The Patents assert that there is “a need for a mechanism in devices,
`
`especially portable devices, functioning as an electronic purse (e-purse) to be able to conduct
`
`transactions over an open network with a payment server without compromising security.” Id. at
`
`1:34-38.
`
`36.
`
`The Patents’ purported solution is to provide “a mechanism to be embedded” in the
`
`portable device to function as an e-purse and provide the necessary security. Id. at 2:42-46. That
`
`“mechanism” is a smart card. Id. at 2:10-41. A “smart card” is one having a computer processor,
`
`The smart card comes with a preloaded operating system, such as Java Card Open Platform
`
`(“JCOP”), which provides “a general security framework,” such as the GlobalPlatform standard,
`
`for “card personalization.” Id. at 4:8-22, 4:41-46, 4:50-56. The operating system’s security
`
`
`
`1 Because the Asserted Patents share a specification, references to the ’218 patent
`specification and figures encompass the corresponding portions of the other two as well unless
`otherwise specified.
`
`-8-
`
`

`

`Case 6:22-cv-00697-ADA Document 41-1 Filed 08/21/23 Page 9 of 98
`
`
`
`“control[s] the access to the smart card (e.g., an installation of external applications into the smart
`
`card).” Id. at 4:47-50.
`
`37.
`
`The Patents explain that “multiple application smart cards” – including the well-
`
`known SmartMX smart card by Philips – can also come “pre-loaded with an emulator,” such as a
`
`MIFARE emulator, allowing the multi-application smart card to mimic (or “emulate”) single
`
`functional cards such as a MIFARE transit card for use with MIFARE readers. Id. at 2:14, 2:27-
`
`28, 3:51-60, 4:62-64, Fig. 2.
`
`38.
`
`The ’218, ’855, and ’787 Patents teach that a smart card, including an e-purse applet
`
`or emulator in the smart card, can be personalized using a GlobalPlatform card manager to enable
`
`a secure channel to be established between the e-purse and a server. Id. at 4:11-22, 5:50-54.
`
`Personalization involves loading a specific user’s data into the e-purse, e.g., the user’s account
`
`information, “operation keys (e.g., a load key and a purchase key), default PINs, administration
`
`keys (e.g., an unblock PIN key and a reload PIN key), and passwords (e.g., from Mifare).” Id. at
`
`5:54-59. Smart cards that comply with the GlobalPlatform standard have at least one security
`
`domain that “includes three 3DES keys,” which are encryption keys that are “used to generate
`
`session keys for a secured session between two entities,” i.e., a security channel. Id. at 6:29-47,
`
`Fig. 3C. The security domain and encryption keys are “installed by a card issuer.” Id. at 6:48-54.
`
`Another set of keys can also be generated and distributed to the e-purse applet to secure subsequent
`
`operations. Id. at 6:55-7:9, Fig. 3C.
`
`39.
`
`The ’218, ’855, and ’787 Patents also describe a process for funding the e-purse,
`
`which is a necessary step in using it to conduct transactions. Id. at 7:10-13, 8:7-12, Figs. 4A-4C.
`
`After a valid PIN entry, a midlet initiates an over-the-air (“OTA”) “top off request,” sending a
`
`request to the e-purse applet. Id. at 7:22-28, Fig. 4A. The e-purse applet composes a response to
`
`-9-
`
`

`

`Case 6:22-cv-00697-ADA Document 41-1 Filed 08/21/23 Page 10 of 98
`
`
`
`the request, which is sent via the midlet to “a payment network and server over a wireless network.”
`
`Id. at 7:29-32, Fig. 4A. The response is verified and a bank account at a financial institution is
`
`then verified. Id. at 7:35-44, Fig. 4A. A response is then sent back to the midlet, after which
`
`commands are extracted from the response and sent to the e-purse. Id. at 7:45-48, Fig. 4B. The
`
`e-purse verifies the commands and then updates the emulator and transaction logs to reflect the
`
`updated stored value. Id. at 7:48-51, Fig. 4B.
`
`U.S. Patent No. 9,240,009
`
`
`
`40.
`
`The ’009 Patent is a continuation-in-part of the ’218 Patent and describes mobile
`
`devices with “secure elements” that can securely host “an application such as an electronic purse”
`
`for conducting secured transactions over a network. ’009 Patent, at 1:18-24. The ’009 Patent
`
`includes the disclosures found in the shared specification of the ’218, ’855, and ’787 Patents, as
`
`well as additional disclosures and figures.
`
`41.
`
`The ’009 Patent states: “[T]here is a need to provide techniques to personalize a
`
`secure element in a contactless smart card or an NFC-enabled mobile device so that such a device
`
`is so secured and personalized when it comes to financial applications or secure transactions. With
`
`a personalized secure element in an NFC-enabled mobile device, various applications or services,
`
`such as electronic purse or payments, can be realized.” Id. at 2:10-17.
`
`42.
`
`The ’009 Patent teaches that, when a mobile device is obtained, the secure element
`
`(“SE”) “is installed with a set of default keys (e.g., an Issuer Security Domain (ISD) key set by the
`
`SE manufacturer).” Id. at 6:55-58, 8:46-48. “[A] standard-compliant secure element comes with
`
`one issuer security domain (ISD) and an option for one or more supplemental security domains
`
`(SSD). Each of these domains includes a set of keys.” Id. at 7:1-4.
`
`43.
`
`The ’009 Patent explains that the “SE 102 needs to go through a personalization
`
`process before it can be used.” Id. at 7:13-14. “The personalization process can be done either
`
`-10-
`
`

`

`Case 6:22-cv-00697-ADA Document 41-1 Filed 08/21/23 Page 11 of 98
`
`
`
`physically in a service center or remotely via a web portal by a TSM server.” Id. at 7:49-51. A
`
`“TSM, standing for Trusted Service Management, is a collection of services” that can “help service
`
`providers securely distribute and manage contactless services for their customers using the
`
`networks of mobile operators.” Id. at 7:35-39. The default “device information (e.g., ISD) of the
`
`SE” can be used to derive personalized keys to personalize the SE. Id. at 8:57-9:23. “After the
`
`personalization, the SE can only be accessed using the personalized ISD key of the SE issuer.
`
`Depending on the security requirement of each service provider, the TSM can create additional
`
`SSDs for the various providers to personalize their respective applications (e.g., the modules 104
`
`or 106 of FIG. 1A).” Id. at 9:24-29.
`
`44.
`
`The ’009 Patent describes “an e-token enabled device,” such as “a single functional
`
`card or a portable device enabled with an e-purse,” that “may represent e-money, e-coupons, e-
`
`ticket, e-voucher or any other forms of payment tokens in a device.” Id. at 20:44-50. Transactions
`
`using the e-token device may occur in “real time” and “offline (i.e., without the portable device
`
`connecting to a backend POS transaction server.” Id. at 20:51-58; see also id. at Figs. 6A-6D.
`
`Figure 6D depicts “a flowchart illustrating an exemplary process [] of conducting m-commerce
`
`using a portable device.” Id. at 22:48-56, Fig. 6D. The ’009 Patent explains that transactions using
`
`the e-purse may be evaluated against the value stored on the e-purse to determine whether to
`
`approve or deny the transaction or to allow the user to “top-up” and attempt re-processing. Id. at
`
`22:57-23:20, Figs. 6C and 6D.
`
`VII. TERMS IN DISPUTE
`
`45.
`
`I have been asked to provide my opinions on the term addressed below as well as
`
`to respond to RFCyber’s proposed constructions.
`
`A.
`
`“fund” / “fund stored in the emulator”
`
`
`
`-11-
`
`

`

`Case 6:22-cv-00697-ADA Document 41-1 Filed 08/21/23 Page 12 of 98
`
`
`
`46.
`
`I understand that RFCyber’s proposed construction of these terms is “plain and
`
`ordinary meaning except for ‘emulator.’”
`
`47.
`
`However, I also understand that RFCyber has alleged, for example, that
`
`“consumable keys or tokens” can comprise “a fund stored in an emulator.” A person of ordinary
`
`skill in the art at the time of the alleged invention would not understand funds to include
`
`“consumable keys or tokens,” including as the term is used in the shared specification of the
`
`Patents, as discussed further below. The term “funds” refers to money. A key or token is not
`
`money. In the electronic payment context, a token is a substitute for a sensitive data element
`
`(which is a data element, such as a credit card number, that should be kept private or secret). A
`
`token is not funds, which a person of ordinary skill in the art would understand comprise money
`
`or a balance of money, as discussed further below. A token does also not represent funds.
`
`Therefore, in my opinion, RFCyber’s position as to the meaning of “fund” terms is not the plain
`
`and ordinary meaning of those terms.
`
`48.
`
`One of ordinary skill in the art at the time of the alleged invention of the Patents
`
`would have understood the term “fund” (as a noun) to mean a money balance and to “fund” (as a
`
`verb) to mean to add to a money balance. This is summarized with respect to the “fund” terms
`
`below:
`
`Term and Claims
`“fund” / “fund stored in the emulator”
`
`Meaning
`“money balance” / “money balance stored in
`the emulator”
`
`’855 Patent, Claim 9
`’787 Patent, Claims 1 and 11
`“fund” / “funded” / “funding”
`
`’218 Patent, Claims 10, 18
`’855 Patent, Claim 1, 4, 13
`
`
`“add / added / adding money balance to”
`
`49.
`
`The terms appear in the following claim language:
`
`-12-
`
`

`

`Case 6:22-cv-00697-ADA Document 41-1 Filed 08/21/23 Page 13 of 98
`
`
`
`Claim Number
`
`Claim Language
`
`’218 Patent, Claims 10 and 18
`
`“the e-purse is funded through a financial institution that
`maintains an account for a user”
`
`’855 Patent, Claims 1 and 9
`
`“A method for funding an e-purse”
`
`“a fund transfer request is initiated by the server to the
`financial institution” / “initiating a fund transfer request by a
`server with a financial institution”
`
`“responding to the fund transfer request”
`
`’855 Patent, Claims 4 and 13
`
`“to regulate or control data exchange between the server and
`the portable device for funding the e-purse therein”
`
`’787 Patent, Claims 1 and 11
`
`“to perform electronic commerce with the e-purse applet
`against a fund stored in the emulator”
`
`“to perform mobile commerce with a payment server via an
`application against the fund stored in the emulator” /
`“performing mobile commerce via a second interface with a
`payment server via an application against the fund stored in
`the emulator”
`
`
`
`50.
`
`The shared specification of the ’218,’855, and ’787 Patents uses the word “fund”
`
`three times, and each time it is in the context of adding money to the balance of the e-purse—not
`
`in making a purchase. The first use of the term is to begin the description of funding the e-purse
`
`from a bank account in connection with a flowchart in FIG. 4: “The user desires to fund the e-
`
`purse from an account associated with a bank.” ’218 Patent at 7:20-22.
`
`51.
`
`The shared specification refers to the process of funding the e-purse as “an OTA
`
`top off request.” This helps to shape my understanding that “fund” means a money balance or
`
`adding to a money balance.
`
`52. More specifically, the shared specification continues on to say that “[a]t 402, the
`
`user enters a set of personal identification numbers (PIN). Assuming the PIN is valid, a purse
`
`manger in the device is activated and initiates a request (also referred to an OTA top off request)
`
`-13-
`
`

`

`Case 6:22-cv-00697-ADA Document 41-1 Filed 08/21/23 Page 14 of 98
`
`
`
`at 404. The midlet in the device sends a request to the e-purse applet at 406, which is illustrated
`
`in FIG. 4C where the e-purse manager midlet 434 communicates with the e-purse applet 436.”
`
`’218 Patent at 7:20-28. A “top off” is the act of refilling the money balance on the card, which is
`
`consistent with my understanding of the term “fund.” Like “topping off” a gas tank, it means to
`
`actually add money to the card; it does not refer to any and every activity that could relate to a card
`
`being used in a transaction.
`
`53.
`
`The next use of the term “fund” is also in the context of adding money to the balance
`
`of the e-purse from the bank account. The shared specification states that “[i]f the account does
`
`exist, a fund transfer request is initiated. At 414, the bank receives the request and responds to
`
`the request by returning a response. In general, the messages exchanged between the payment
`
`network and server and the bank are compliant with a network protocol (e.g., HTTP for the
`
`Internet).” ’218 Patent at 7:29-44. Here again, “fund” means adding a money balance to the
`
`device. The “messages exchanged” between “the payment network and server and the bank” make
`
`clear that the bank can transfer funds to the device. This is also consistent with my understanding
`
`that a fund transfer request is not the same as a request to complete a purchase made using the e-
`
`purse, which is further consistent with the discussion of “fund” below.
`
`54.
`
`Finally, the shared specification concludes the description of the flowchart in FIG.
`
`4, stating: “Although the process 400 is described as funding the e-purse. [sic]Those skilled in
`
`the art can appreciate that the process of making purchasing over a network with the e-purse is
`
`substantially similar to the process 400, accordingly, no separate discussion on the process of
`
`making purchasing is provided.” The specification could not be clearer: “funding” is separate and
`
`distinct from making a purchase.
`
`-14-
`
`

`

`Case 6:22-cv-00697-ADA Document 41-1 Filed 08/21/23 Page 15 of 98
`
`
`
`55.
`
`In light of the claim language and the specification discussed above, a person of
`
`ordinary skill in the art would understand “fund” to mean adding or storing a money balance.
`
`B.
`
`
`
`
`56.
`
`Each Asserted System Claim Is Indefinite for Covering Both an Apparatus
`and a Method of Using the Apparatus
`
`1.
`
`Indefiniteness of ’218 Patent Claims 11-18
`
`It is my opinion that a person of ordinary skill in the art would not understand the
`
`scope and meaning of claim 11 of the ’218 Patent because it claims both a “portable device” and
`
`a method of using the “portable device.” Because claims 12-18 depend from claim 11, it is my
`
`opinion that a person of ordinary skill in the art would also not understand the scope and meaning
`
`of those claims.
`
`57.
`
`Independent claim 11 of the ’218 Patent reads as follows:
`
`11. A system for providing an e-purse, the system comprising:
`
`a portable device including or communicating with a smart card
`pre-loaded with an emulator configured to execute a request from
`and provide a response an e-purse applet is configured to expect,
`the portable device including a memory space loaded with a midlet
`that is configured to facilitate wireless communication between the
`e-purse applet in the smart card and a payment server over a
`wireless network, the portable device further including a
`contactless interface that facilitates communication between the e-
`purse applet in the smart card and the payment server over a wired
`network, wherein the e-purse applet is downloaded from the
`payment server when the smart card is in communication with
`the payment server, and operations of personalizing the e-purse
`applet comprises:
`
`establishing an initial security channel between the smart card and
`the e-purse security authentication module (SAM) to install and
`personalize the e-purse applet in the smart card, and
`
`creating a security channel on top of the initial security channel to
`protect subsequent operations of the smart card with the e-purse
`SAM, wherein any subsequent operation of the emulator is
`conducted over the security channel via the e-purse applet;
`
`the payment server associated with an issuer authorizing the e-
`purse applet; and
`
`the e-purse SAM configured to enable the e-purse applet, wherein
`an SAM is behind the payment server and in communication with
`
`-15-
`
`

`

`Case 6:22-cv-00697-ADA Document 41-1 Filed 08/21/23 Page 16 of 98
`
`
`
`the e-purse applet when the e-purse applet is caused to
`communicate with the payment server via the midlet.
`
`58.
`
`Although the claim is to a “system comprising: a portable device,” the claim also
`
`includes a method step in which the “e-purse applet is downloaded.”
`
`59.
`
`It is my opinion that a person of ordinary skill in the art at the time of the invention
`
`would not know whether infringement occurs when the portable device is manufactured (and
`
`perhaps capable at that point of downloading an e-purse applet from the payment server), or if
`
`infringement occurs only if, or after, the e-purse applet is actually downloaded. The manufacture
`
`and sale of a portable device, such as one claimed in claim 11 of the ’218 Patent, often if not always
`
`occurs prior to the “downloading” of software onto the device at the time of the alleged invention.
`
`Software could and would be loaded onto such devices prior to sale through methods other than
`
`downloads from a network. It would be unclear from the claim to a person of ordinary skill in the
`
`art whether devices as they were typically manufactured and sold would infringe.
`
`60.
`
`The limitation that the downloading occurs “when the smart card is in
`
`communication with the payment server” further confirms that this is a method step that could
`
`(and usually would) occur separately from the manufacture or sale of the device. The specification
`
`describes communication with the payment server occurring “over an open network.” ’218 Patent
`
`at 1:36-37. A person of ordinary skill in the art would have known that communications over an
`
`open network must occur after manufacture and sale of a portable device, and not as part of the
`
`manufacturing process.
`
`61.
`
`The prosecution history also confirms that the downloading is a process step that
`
`makes unclear whether the portable device infringes when made or only infringes after the
`
`downloaded recited process is performed. During prosecution, the applicant pointed to a specific
`
`paragraph of its application as support for adding this limitation. See App. 11/534,653 9/7/2011
`
`-16-
`
`

`

`Case 6:22-cv-00697-ADA Document 41-1 Filed 08/21/23 Page 17 of 98
`
`
`
`Amendment at 8-9, 12. That corresponding paragraph describes the process when “a user desires
`
`to personalize an e-purse embedded in a device (e.g., a cellphone).” ’218 Patent at 5:60-61. This
`
`indicates that the down

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket