throbber
Case 6:22-cv-00697-ADA Document 43-2 Filed 09/05/23 Page 1 of 48
`Case 6:22-cv-00697-ADA Document 43-2 Filed 09/05/23 Page 1 of 48
`
`
`
`
`EXHIBIT A
`EXHIBIT A
`
`
`
`
`
`

`

`
`
`Case 2:20-cv-00274-JRG-RSP Document 147 Filed 11/17/21 Page 1 of 47 PageID #: 5023Case 6:22-cv-00697-ADA Document 43-2 Filed 09/05/23 Page 2 of 48
`
`THE UNITED STATES DISTRICT COURT
`FOR THE EASTERN DISTRICT OF TEXAS
`MARSHALL DIVISION
`
`RFCYBER CORP.,
`
`v.
`
`GOOGLE LLC, GOOGLE PAYMENT
`CORP.
`___________________________________
`
`RFCYBER CORP.,
`
`v.
`
`SAMSUNG ELECTRONICS CO., LTD.,
`SAMSUNG ELECTRONICS AMERICA,
`INC.
`
`















`
`
`CLAIM CONSTRUCTION
`MEMORANDUM AND ORDER
`
`
`
` CASE NO. 2:20-CV-274-JRG
` [LEAD CASE]
`
`
`
`
`
`
` CASE NO. 2:20-CV-335-JRG
` [MEMBER CASE]
`
`
`
`Before the Court is the Opening Claim Construction Brief (Dkt. No. 116) filed by Plaintiff
`
`
`
`
`
`
`RFCyber Corp. (“Plaintiff” or “RFCyber” or “RFC”). Also before the Court is the Responsive
`
`Claim Construction Brief (Dkt. No. 122) filed by Defendants Samsung Electronics Co., Ltd. and
`
`Samsung Electronics America, Inc. (“Defendants” or “Samsung”)1 as well as Plaintiff’s reply
`
`(Dkt. No. 124).
`
`
`
`
`
`
`
`The Court held a claim construction hearing on October 27, 2021.
`
`
`
`
`1 Defendants Google LLC and Google Payment Corp. (collectively, “Google”) have been
`dismissed. (See Dkt. Nos. 72–73, 127, 129.)
`
`
`
`
`- 1 -
`
`

`

`
`
`Case 2:20-cv-00274-JRG-RSP Document 147 Filed 11/17/21 Page 2 of 47 PageID #: 5024Case 6:22-cv-00697-ADA Document 43-2 Filed 09/05/23 Page 3 of 48
`
`Table of Contents
`
`I. BACKGROUND ....................................................................................................................... 2
`II. LEGAL PRINCIPLES ........................................................................................................... 4
`III. AGREED TERMS................................................................................................................. 8
`IV. DISPUTED TERMS .............................................................................................................. 8
`1. “security channel” .................................................................................................................. 9
`2. “secured channel” ................................................................................................................ 11
`3. “security channel on top of the initial security channel” ..................................................... 12
`4. “applet” ................................................................................................................................ 13
`5. “e-purse” and “electronic purse” ......................................................................................... 13
`6. “install” and “installed” ....................................................................................................... 19
`7. “payment server” ................................................................................................................. 23
`8. “personalize,” “personalized,” “personalizing,” and “personalization” .............................. 26
`9. “smart card pre-loaded with [an/the] emulator” .................................................................. 29
`10. “smart card,” “card module,” and “smart card module” .................................................... 31
`11. “security authentication module” and “SAM” ................................................................... 34
`12. “device information of [a/the] secure element” ................................................................. 37
`13. “key set installed on the secure element” .......................................................................... 40
`14. “secure element” ................................................................................................................ 40
`15. “method for funding an e-purse” ....................................................................................... 41
`16. “contactless interface that facilitates communication between the e-purse applet in the
`smart card and the payment server over a wired network” and “e-purse SAM originally
`used to issue the e-purse / existing security authentication module (SAM) originally used
`to issue the e-purse” ............................................................................................................ 45
`V. CONCLUSION...................................................................................................................... 46
`
`
`
`
`
`
`I. BACKGROUND
`
`Plaintiff alleges infringement of United States Patent Nos. 8,118,218 (“the ’218 Patent”),
`
`8,448,855 (“the ’855 Patent”), 9,189,787 (“the ’787 Patent”), and 9,240,009 (“the ’009 Patent”)
`
`(collectively, “the patents-in-suit” or “the asserted patents”). (Dkt. No. 116, Exs. A–D). Plaintiff
`
`
`
`
`- 2 -
`
`

`

`
`
`Case 2:20-cv-00274-JRG-RSP Document 147 Filed 11/17/21 Page 3 of 47 PageID #: 5025Case 6:22-cv-00697-ADA Document 43-2 Filed 09/05/23 Page 4 of 48
`
`submits that the patents-in-suit “are directed to various aspects of a mobile payment system.” (Dkt.
`
`No. 116 at 2.)
`
`
`
`The ’218 Patent, titled “Method and Apparatus for Providing Electronic Purse,” issued on
`
`February 21, 2012, and bears a filing date of September 24, 2006. The Abstract of the ’218 Patent
`
`states:
`
`
`
`Techniques for portable devices functioning as an electronic purse (e-purse) are
`disclosed. According to one aspect of the invention, a mechanism is provided to
`enable a portable device to conduct transactions over an open network with a
`payment server without compromising security. In one embodiment, a device is
`loaded with an e-purse manager. The e-purse manager is configured to manage
`various transactions and functions as a mechanism to access an emulator therein.
`The transactions may be conducted over a wired network or a wireless network. A
`three-tier security model is contemplated to support the security of the transactions
`from the e-purse. The three-tier security model includes a physical security, an e-
`purse security and a card manager security, concentrically encapsulating one with
`another. Security keys (either symmetric or asymmetric) are personalized within
`the three-tier security model.
`
`The ’855 Patent resulted from continuations of the ’218 Patent. The ’787 Patent, in turn,
`
`resulted from a continuation of the ’855 Patent. The ’009 Patent resulted from a continuation-in-
`
`part of the ’218 Patent.
`
`
`
`Samsung submits: “RFCyber has accused Samsung of infringing claims 1, 3, 7–9, 11, 14–
`
`15, and 17 of the ’218 patent, claims 1–6, 10, and 12 of the ’855 patent, claims 1–3, 6, 8, 11, 13,
`
`16, and 18 of the ’787 patent, and claims 1, 6–7, 10, 14, and 16 of the ’009 patent (collectively,
`
`the ‘Asserted Claims’).” (Dkt. No. 122 at 2 n.3.)
`
`
`
`Plaintiff previously also asserted United States Patent No. 10,600,046 (“the ’046 Patent”).
`
`(Dkt. No. 1, Ex. E). Plaintiff did not elect any claims from the ’046 Patent in its election of asserted
`
`claims filed on September 15, 2021 (Dkt. 110, Ex. A), so Plaintiff no longer asserts the ’046 Patent
`
`in the present case.
`
`
`
`
`- 3 -
`
`

`

`
`
`Case 2:20-cv-00274-JRG-RSP Document 147 Filed 11/17/21 Page 4 of 47 PageID #: 5026Case 6:22-cv-00697-ADA Document 43-2 Filed 09/05/23 Page 5 of 48
`
`II. LEGAL PRINCIPLES
`
`
`
`It is understood that “[a] claim in a patent provides the metes and bounds of the right which
`
`the patent confers on the patentee to exclude others from making, using or selling the protected
`
`invention.” Burke, Inc. v. Bruno Indep. Living Aids, Inc., 183 F.3d 1334, 1340 (Fed. Cir. 1999).
`
`Claim construction is clearly an issue of law for the court to decide. Markman v. Westview
`
`Instruments, Inc., 52 F.3d 967, 970–71 (Fed. Cir. 1995) (en banc), aff’d, 517 U.S. 370 (1996).
`
`
`
`To ascertain the meaning of claims, courts look to three primary sources: the claims, the
`
`specification, and the prosecution history. Markman, 52 F.3d at 979. The specification must
`
`contain a written description of the invention that enables one of ordinary skill in the art to make
`
`and use the invention. Id. A patent’s claims must be read in view of the specification, of which
`
`they are a part. Id. For claim construction purposes, the description may act as a sort of dictionary,
`
`which explains the invention and may define terms used in the claims. Id. “One purpose for
`
`examining the specification is to determine if the patentee has limited the scope of the claims.”
`
`Watts v. XL Sys., Inc., 232 F.3d 877, 882 (Fed. Cir. 2000).
`
`
`
`Nonetheless, it is the function of the claims, not the specification, to set forth the limits of
`
`the patentee’s invention. Otherwise, there would be no need for claims. SRI Int’l v. Matsushita
`
`Elec. Corp., 775 F.2d 1107, 1121 (Fed. Cir. 1985) (en banc). The patentee is free to be his own
`
`lexicographer, but any special definition given to a word must be clearly set forth in the
`
`specification. Intellicall, Inc. v. Phonometrics, Inc., 952 F.2d 1384, 1388 (Fed. Cir. 1992).
`
`Although the specification may indicate that certain embodiments are preferred, particular
`
`embodiments appearing in the specification will not be read into the claims when the claim
`
`language is broader than the embodiments. Electro Med. Sys., S.A. v. Cooper Life Sciences, Inc.,
`
`34 F.3d 1048, 1054 (Fed. Cir. 1994).
`
`
`
`
`- 4 -
`
`

`

`
`
`Case 2:20-cv-00274-JRG-RSP Document 147 Filed 11/17/21 Page 5 of 47 PageID #: 5027Case 6:22-cv-00697-ADA Document 43-2 Filed 09/05/23 Page 6 of 48
`
`
`
`This Court’s claim construction analysis is substantially guided by the Federal Circuit’s
`
`decision in Phillips v. AWH Corporation, 415 F.3d 1303 (Fed. Cir. 2005) (en banc). In Phillips,
`
`the court set forth several guideposts that courts should follow when construing claims. In
`
`particular, the court reiterated that “the claims of a patent define the invention to which the patentee
`
`is entitled the right to exclude.” Id. at 1312 (quoting Innova/Pure Water, Inc. v. Safari Water
`
`Filtration Sys., Inc., 381 F.3d 1111, 1115 (Fed. Cir. 2004)). To that end, the words used in a claim
`
`are generally given their ordinary and customary meaning. Id. The ordinary and customary
`
`meaning of a claim term “is the meaning that the term would have to a person of ordinary skill in
`
`the art in question at the time of the invention, i.e., as of the effective filing date of the patent
`
`application.” Id. at 1313. This principle of patent law flows naturally from the recognition that
`
`inventors are usually persons who are skilled in the field of the invention and that patents are
`
`addressed to, and intended to be read by, others skilled in the particular art. Id.
`
`
`
`Despite the importance of claim terms, Phillips made clear that “the person of ordinary
`
`skill in the art is deemed to read the claim term not only in the context of the particular claim in
`
`which the disputed term appears, but in the context of the entire patent, including the
`
`specification.” Id. Although the claims themselves may provide guidance as to the meaning of
`
`particular terms, those terms are part of “a fully integrated written instrument.” Id. at 1315
`
`(quoting Markman, 52 F.3d at 978). Thus, the Phillips court emphasized the specification as being
`
`the primary basis for construing the claims. Id. at 1314–17. As the Supreme Court stated long
`
`ago, “in case of doubt or ambiguity it is proper in all cases to refer back to the descriptive portions
`
`of the specification to aid in solving the doubt or in ascertaining the true intent and meaning of the
`
`language employed in the claims.” Bates v. Coe, 98 U.S. 31, 38 (1878). In addressing the role of
`
`
`
`
`- 5 -
`
`

`

`
`
`Case 2:20-cv-00274-JRG-RSP Document 147 Filed 11/17/21 Page 6 of 47 PageID #: 5028Case 6:22-cv-00697-ADA Document 43-2 Filed 09/05/23 Page 7 of 48
`
`the specification, the Phillips court quoted with approval its earlier observations from Renishaw
`
`PLC v. Marposs Societa’ per Azioni, 158 F.3d 1243, 1250 (Fed. Cir. 1998):
`
`Ultimately, the interpretation to be given a term can only be determined and
`confirmed with a full understanding of what the inventors actually invented and
`intended to envelop with the claim. The construction that stays true to the claim
`language and most naturally aligns with the patent’s description of the invention
`will be, in the end, the correct construction.
`
`Phillips, 415 F.3d at 1316. Consequently, Phillips emphasized the important role the specification
`
`plays in the claim construction process.
`
`
`
`The prosecution history also continues to play an important role in claim interpretation.
`
`Like the specification, the prosecution history helps to demonstrate how the inventor and the
`
`United States Patent and Trademark Office (“PTO”) understood the patent. Id. at 1317. Because
`
`the file history, however, “represents an ongoing negotiation between the PTO and the applicant,”
`
`it may lack the clarity of the specification and thus be less useful in claim construction proceedings.
`
`Id. Nevertheless, the prosecution history is intrinsic evidence that is relevant to the determination
`
`of how the inventor understood the invention and whether the inventor limited the invention during
`
`prosecution by narrowing the scope of the claims. Id.; see also Microsoft Corp. v. Multi-Tech Sys.,
`
`Inc., 357 F.3d 1340, 1350 (Fed. Cir. 2004) (noting that “a patentee’s statements during
`
`prosecution, whether relied on by the examiner or not, are relevant to claim interpretation”).
`
`
`
`Phillips rejected any claim construction approach that sacrificed the intrinsic record in
`
`favor of extrinsic evidence, such as dictionary definitions or expert testimony. The en banc court
`
`condemned the suggestion made by Texas Digital Systems, Inc. v. Telegenix, Inc., 308 F.3d 1193
`
`(Fed. Cir. 2002), that a court should discern the ordinary meaning of the claim terms (through
`
`dictionaries or otherwise) before resorting to the specification for certain limited purposes.
`
`Phillips, 415 F.3d at 1319–24. According to Phillips, reliance on dictionary definitions at the
`
`
`
`
`- 6 -
`
`

`

`
`
`Case 2:20-cv-00274-JRG-RSP Document 147 Filed 11/17/21 Page 7 of 47 PageID #: 5029Case 6:22-cv-00697-ADA Document 43-2 Filed 09/05/23 Page 8 of 48
`
`expense of the specification had the effect of “focus[ing] the inquiry on the abstract meaning of
`
`words rather than on the meaning of claim terms within the context of the patent.” Id. at 1321.
`
`Phillips emphasized that the patent system is based on the proposition that the claims cover only
`
`the invented subject matter. Id.
`
`“In some cases, however, the district court will need to look beyond the patent’s intrinsic
`
`evidence and to consult extrinsic evidence in order to understand, for example, the background
`
`science or the meaning of a term in the relevant art during the relevant time period.” Teva Pharm.
`
`USA, Inc. v. Sandoz, Inc., 135 S. Ct. 831, 841 (2015) (citation omitted). “In cases where those
`
`subsidiary facts are in dispute, courts will need to make subsidiary factual findings about that
`
`extrinsic evidence. These are the ‘evidentiary underpinnings’ of claim construction that we
`
`discussed in Markman, and this subsidiary factfinding must be reviewed for clear error on appeal.”
`
`Id. (citing 517 U.S. 370).
`
`
`
`Phillips does not preclude all uses of dictionaries in claim construction proceedings.
`
`Instead, the court assigned dictionaries a role subordinate to the intrinsic record. In doing so, the
`
`court emphasized that claim construction issues are not resolved by any magic formula. The court
`
`did not impose any particular sequence of steps for a court to follow when it considers disputed
`
`claim language. Id. at 1323–25. Rather, Phillips held that a court must attach the appropriate
`
`weight to the intrinsic sources offered in support of a proposed claim construction, bearing in mind
`
`the general rule that the claims measure the scope of the patent grant. Id.
`
`
`
`The Supreme Court of the United States has “read [35 U.S.C.] § 112, ¶ 2 to require that a
`
`patent’s claims, viewed in light of the specification and prosecution history, inform those skilled
`
`in the art about the scope of the invention with reasonable certainty.” Nautilus, Inc. v. Biosig
`
`Instruments, Inc., 572 U.S. 898, 910, 134 S. Ct. 2120, 2129 (2014). “A determination of claim
`
`
`
`
`- 7 -
`
`

`

`
`
`Case 2:20-cv-00274-JRG-RSP Document 147 Filed 11/17/21 Page 8 of 47 PageID #: 5030Case 6:22-cv-00697-ADA Document 43-2 Filed 09/05/23 Page 9 of 48
`
`indefiniteness is a legal conclusion that is drawn from the court’s performance of its duty as the
`
`construer of patent claims.” Datamize, LLC v. Plumtree Software, Inc., 417 F.3d 1342, 1347 (Fed.
`
`Cir. 2005) (citations and internal quotation marks omitted), abrogated on other grounds by
`
`Nautilus, 572 U.S. 898. “Indefiniteness must be proven by clear and convincing evidence.” Sonix
`
`Tech. Co. v. Publ’ns Int’l, Ltd., 844 F.3d 1370, 1377 (Fed. Cir. 2017).
`
`III. AGREED TERMS
`
`
`
`In their August 19, 2021 P.R. 4-3 Joint Claim Construction and Prehearing Statement (Dkt.
`
`No. 101) and their October 14, 2021 P.R. 4-5(d) Joint Claim Construction Chart (Dkt. No. 73, Ex.
`
`A at 3–4), the parties submitted the following agreements:
`
`
`
`Term
`
`
`
`“emulator”
`
`’218 Patent, All Claims
`’855 Patent, All Claims
`’787 Patent, All Claims
`
`“midlet”
`
`’218 Patent, All Claims
`’855 Patent, All Claims
`’787 Patent, All Claims
`
`“payment gateway”
`
`’046 Patent, All Claims
`
`
`
`
`Agreed Construction
`“hardware device or program that pretends to be another
`particular device or program that other components
`expect to interact with”
`
`
`
`
`“software component suitable for being executed on a
`portable device”
`
`
`“server or collection of servers for settling a payment”
`
`
`IV. DISPUTED TERMS
`
`The parties organize the disputed terms slightly differently in their briefing. Rather than
`
`
`
`
`
`attempt to divine an ideal arrangement of the disputed terms, the Court adopts the ordering set
`
`forth in Plaintiff’s opening brief.
`
`
`
`
`- 8 -
`
`

`

`
`
`Case 2:20-cv-00274-JRG-RSP Document 147 Filed 11/17/21 Page 9 of 47 PageID #: 5031Case 6:22-cv-00697-ADA Document 43-2 Filed 09/05/23 Page 10 of 48
`
`
`
`Also, the parties have set forth their positions on the qualifications of a person of ordinary
`
`skill in the art, but neither side argues that any differences between the parties in this regard has
`
`any significance when addressing the claim construction disputes. (See Dkt. No. 116 at 1–2; see
`
`also Dkt. No. 122 at 6.)
`
`1. “security channel”
`
`
`
`“security channel”
`(’218 Patent, All Claims; ’855 Patent, All Claims;
`’787 Patent, All Claims; ’009 Patent, All Claims)
`
`
`Plaintiff’s Proposed Construction
`
`Plain and ordinary meaning
`
`
`
`(Dkt. No. 126, Ex. B at 2.)
`
`Defendants’ Proposed Construction
`
`“protected channel established by keys”
`
`
`
`
`
`
`(a) The Parties’ Positions
`
`Plaintiff argues that “‘security’ is a readily understandable word,” and “Defendants identify
`
`no disclaimer or definition that limits a security channel to one ‘established by keys.’” (Dkt. No.
`
`116 at 4.) As to the prosecution history cited by Defendants, Plaintiff argues that “the question of
`
`whether a channel established by keys could meet the limitation is distinct from whether only
`
`channels established by keys can meet the limitation.” (Id.)
`
`
`
`Defendants respond that “the Asserted Patents use the term ‘secured channel’
`
`interchangeably with the term ‘security channel.’” (Dkt. No. 122 at 34.) Defendants also argue
`
`that “a POSITA would understand that the secured channels and security channels described in the
`
`patents are established using ‘keys,’” and “[t]he Asserted Patents do not disclose any secured
`
`channel or security channel that is not established by keys.” (Id. at 35, 36.) Further, Defendants
`
`argue that “there can be no genuine dispute that a security channel and secured channel must be
`
`
`
`
`- 9 -
`
`

`

`
`
`Case 2:20-cv-00274-JRG-RSP Document 147 Filed 11/17/21 Page 10 of 47 PageID #: 5032Case 6:22-cv-00697-ADA Document 43-2 Filed 09/05/23 Page 11 of 48
`
`‘protected.’” (Id. at 36.) Finally, Defendants argue that “RFCyber fails to address the extrinsic
`
`evidence that supports Defendants’ construction.” (Id. at 37.)
`
`
`
`Plaintiff replies that “nothing in the specification requires the use of keys to create a
`
`security channel,” which are only “one way of creating a security channel.” (Dkt. No. 124 at 2.)
`
`
`
`At the October 27, 2021 hearing, Defendants argued that although the specification
`
`contains no explicit disclaimer, the specification does not disclose any other way of providing a
`
`“security channel” or “secure channel.” Plaintiff argued that keys do not perform the establishing.
`
`At most, Plaintiff argued, keys are used during the process of establishing.
`
`
`
`
`
`
`
`(b) Analysis
`
`Claim 1 of the ’218 Patent, for example, recites in part (emphasis added):
`
`1. A method for providing an e-purse, the method comprising:
`
`. . .
`
`personalizing the e-purse applet by reading off data from the smart card to
`generate in the smart card one or more operation keys that are subsequently used to
`establish a secured channel between the e-purse applet and an e-purse security
`authentication module (SAM) external to the smart card, wherein said
`personalizing the e-purse applet comprises:
`establishing an initial security channel between the smart card
`and the e-purse SAM to install and personalize the e-purse
`applet in the smart card, and
`creating a security channel on top of the initial security channel
`to protect subsequent operations of the smart card with the
`e-purse SAM, wherein any subsequent operation of the
`emulator is conducted over the security channel via the e-
`purse applet.
`
`
`As a threshold matter, Defendants’ proposal of requiring a “protected” channel is consistent
`
`with disclosures in the specification regarding using “security” mechanisms to “protect data.” See,
`
`e.g., ’218 Patent at 3:51–52. Plaintiff does not demonstrate that “security” has any other meaning
`
`in this context.
`
`
`
`
`- 10 -
`
`

`

`
`
`Case 2:20-cv-00274-JRG-RSP Document 147 Filed 11/17/21 Page 11 of 47 PageID #: 5033Case 6:22-cv-00697-ADA Document 43-2 Filed 09/05/23 Page 12 of 48
`
`
`
`As to Defendants’ proposal that the channel must be “established by keys,” Defendants
`
`cite disclosure that:
`
`Security keys (either symmetric or asymmetric) are personalized within the three-
`tier security model so as to personalize an e-purse and perform secured transaction
`with a payment server. . . . During a transaction, the security keys are used to
`establish a secured channel between an embedded e-purse and an SAM . . . or
`backend server.
`
`’218 Patent at 1:65–2:8; ’009 Patent at 2:53–63 (similar);’218 Patent at 3:66–4:2 (similar).
`
`Defendants also cite disclosure regarding “updat[ing] security keys to establish appropriate
`
`channels for interactions between the server and the applets . . . .” ’218 Patent at 4:41–46; ’009
`
`Patent at 10:36–40.
`
`
`
`These disclosures regarding security keys, however, refer to specific details of particular
`
`disclosed embodiments that should not be imported into the claims. See Phillips, 415 F.3d at 1323.
`
`Defendants identify no definition or disclaimer in which the patentee limited the term “security
`
`channel” so as to require being “established by keys.” Indeed, Claim 1 of the ’009 Patent, for
`
`example, expressly recites “establishing a secured channel between the secure element and the
`
`server using a key set installed on the secure element,” which is an additional reason to reject
`
`Defendants’ proposal to introduce an “established by keys” requirement into all of the claims.
`
`
`
`The Court therefore construes “security channel” to mean “protected channel.”
`
`2. “secured channel”
`
`
`
`“secured channel”
`(’218 Patent, All Claims; ’009 Patent, All Claims)
`
`
`Plaintiff’s Proposed Construction
`
`Plain and ordinary meaning
`
`
`
`(Dkt. No. 126, Ex. B at 2.)
`
`
`
`Defendants’ Proposed Construction
`
`“protected channel established by keys”
`
`
`
`- 11 -
`
`

`

`
`
`Case 2:20-cv-00274-JRG-RSP Document 147 Filed 11/17/21 Page 12 of 47 PageID #: 5034Case 6:22-cv-00697-ADA Document 43-2 Filed 09/05/23 Page 13 of 48
`
`
`
`Prior to the start of the October 27, 2021 hearing, the parties notified the Court that the
`
`parties now agree that the term “secured channel” should be given the same construction as the
`
`above-discussed term “security channel.”
`
`
`
`The Court therefore construes “secured channel” to mean “protected channel.”
`
`3. “security channel on top of the initial security channel”
`
`
`
`“security channel on top of the initial security channel”
`(’218 Patent, All Claims;
` ’855 Patent, All Claims;
`’787 Patent, Claims 6–7, 16–17)
`
`
`Plaintiff’s Proposed Construction
`
`Plain and ordinary meaning
`
`
`
`(Dkt. No. 116 at 7.)
`
`Defendants’ Proposed Construction
`
`Indefinite
`
`
`
`Defendants asserted in their portion of the parties’ P.R. 4-3 Joint Claim Construction and
`
`Prehearing Statement that this term is indefinite. (Dkt. No. 101, Ex. B at B-7.) Defendants’
`
`response brief does not address this term, and this term does not appear in the parties’ P.R. 4-5(d)
`
`Joint Claim Construction Chart. (See Dkt. No. 122; see also Dkt. No. 126, Ex. B.) At the October
`
`27, 2021 hearing, the remaining Defendants confirmed that they are not asserting indefiniteness
`
`and therefore this term is no longer in dispute.
`
`
`
`The Court therefore construes “security channel on top of the initial security channel”
`
`to have its plain and ordinary meaning.
`
`
`
`
`- 12 -
`
`

`

`
`
`Case 2:20-cv-00274-JRG-RSP Document 147 Filed 11/17/21 Page 13 of 47 PageID #: 5035Case 6:22-cv-00697-ADA Document 43-2 Filed 09/05/23 Page 14 of 48
`
`4. “applet”
`
`
`
`“applet”
`(’218 Patent, Claims 1, 11, 14, 15;
`’855 Patent, Claims 1, 3;
`’787 Patent, Claims 1, 2, 6, 11)
`
`
`Plaintiff’s Proposed Construction
`
`Defendants’ Proposed Construction
`
`“application configured to perform a specific
`task”
`
`Plain and ordinary meaning
`
`Alternatively:
`configured
`component
`“software
`perform one or more specific tasks”
`
`
`
`(Dkt. No. 126, Ex. B at 2.)
`
`to
`
`
`
`Prior to the start of the October 27, 2021 hearing, the parties notified the Court that the
`
`parties now agree that this term should be given its plain and ordinary meaning.
`
`
`
`The Court therefore construes “applet” to have its plain and ordinary meaning.
`
`5. “e-purse” and “electronic purse”
`
`
`
`“e-purse” / “electronic purse”
`(’218 Patent, Claims 1, 11, 14, 15;
`’855 Patent, Claims 1, 3, 5;
`’787 Patent, Claims 1, 2, 6, 11)
`
`
`Plaintiff’s Proposed Construction
`
`Plain and ordinary meaning
`
`Alternatively:
`“system that maintains electronic financial
`information locally”
`
`
`
`(Dkt. No. 126, Ex. B at 2.)
`
`Defendants’ Proposed Construction
`
`“application that stores electronic money
`locally (i.e., in the user’s portable device)”
`
`
`
`
`- 13 -
`
`

`

`
`
`Case 2:20-cv-00274-JRG-RSP Document 147 Filed 11/17/21 Page 14 of 47 PageID #: 5036Case 6:22-cv-00697-ADA Document 43-2 Filed 09/05/23 Page 15 of 48
`
`
`
`
`
`(a) The Parties’ Positions
`
`Plaintiff argues that “[t]he term is readily understandable and can be applied without
`
`construction,” and “Defendants’ construction finds no support in the intrinsic record.” (Dkt.
`
`No. 116 at 11.) As to the prosecution history cited by Defendants, Plaintiff argues that “[t]he most
`
`relevant Office Action actually demonstrates that Defendants’ construction is unwarranted and
`
`unsupported.” (Id.) Plaintiff also argues, for example, that “[w]hile the specifications describe
`
`functions related to stored values on a card, those discussions do not amount to any disclaimer.”
`
`(Id. at 13.)
`
`
`
`Defendants respond that “an ‘e-purse’ is a well-known term of art,” and “[d]uring
`
`prosecution of the ’218 patent, RFCyber distinguished the prior art ‘Atsmon’ reference, which
`
`discloses an ‘e-wallet,’ by arguing that, as ‘is commonly known in the art,’ an ‘e-wallet is not the
`
`same as [an] e-purse’ and, unlike an e-wallet which stores credit cards or e-cards, an e-purse stores
`
`‘electronic money in a local portable device’ . . . .” (Dkt. No. 122 at 7.) Defendants also cite the
`
`specification as well as the prosecution of a related patent. (See id. at 8–12.)
`
`
`
`Plaintiff replies that “an e-purse, just like a physical purse, is not limited to only storing
`
`money (or being a stored-value card) and can store credit card numbers and other financial-related
`
`materials.” (Dkt. No. 124 at 4.) Plaintiff argues that “[w]hile the asserted patents disclose
`
`embodiments that include locally stored money, Samsung identifies no disclaimer or lexicography
`
`that would justify limiting the claims.” (Id. at 6.) Plaintiff also argues that “[n]othing in the
`
`prosecution history or in the specification amounts to a clear and unambiguous disavowal of claim
`
`scopes [sic] that would limit the claims to a local-only implementation, or to an ‘application that
`
`stores electronic money locally.’” (Id. at 4.) As an alternative, Plaintiff proposes: “a system that
`
`maintains electronic financial information locally.” (Id. at 7.)
`
`
`
`
`- 14 -
`
`

`

`
`
`Case 2:20-cv-00274-JRG-RSP Document 147 Filed 11/17/21 Page 15 of 47 PageID #: 5037Case 6:22-cv-00697-ADA Document 43-2 Filed 09/05/23 Page 16 of 48
`
`
`
`At the October 27, 2021 hearing, Plaintiff argued that in the prosecution history relied upon
`
`by Defendants, the patentee distinguished accessing information remotely (as opposed to storing
`
`information locally) and did not limit the term “e-purse” in the manner proposed by Defendants.
`
`Moreover, Plaintiff argued that “electronic money” is not the same as cash because electronic
`
`money may still need to be settled after use.
`
`
`
`
`
`(b) Analysis
`
`Defendants cite prosecution history of the ’218 Patent in which the patentee stated:
`
`Atsmon teaches an interactive authentication system to allow a consumer to interact
`with a base station to receive coupons, special sales and other information with an
`electronic card. After a careful review, the Applicant concludes that Atsmon does
`not teach how to use a security channel to install and personalize an e-purse applet
`in a smart card. Atsmon only says that special client remote access software is
`downloaded, see Col. 32, lines-56-63, where that special client remote access
`software is for access to the website (e.g., a base station), no encryption, or any
`mechanism for a security channel are mentioned or described.
`
` .
`
` . . [T]he Applicant submits [the] Shmueli [reference] could not be modified with
`[the] Atsmon [reference] or such modification would render Shmueli inoperable.
`The Applicant wishes to further point out that Atsmon describes entirely about
`e-wallet. It is commonly known in the art that e-wallet is not the same as e-purse.
`An e-wallet system has a user credit-card and personal info at the backend, an
`e-card in the e-wallet system is used as an identity card for logging in into the
`system. When shopping, the e-card can be used to identify the user to retrieve the
`info and submit the info to the merchant site. Evidently, an e-purse in the instant
`application describes about electronic money in a local portable device.
`Accordingly, the combination of Shmueli and Atsmon neither teaches nor suggests
`Claim 1, and Claim shall be allowable over Shmueli and Atsmon.
`
`(Dkt. No. 116, Ex. E, Dec. 31, 2010 Response to Final OA, at 9–10 (p. 132–33 of 259 of Ex. E)
`
`(emphasis added).)
`
`
`
`The patentee thus distinguished Shmueli and Atsmon based on the claimed invention using
`
`information stored locally rather than retrieving information from somewhere else. This
`
`prosecution history therefore does not amount to a definitive statement by the patentee that the
`
`term “e-purse” requires money stored locally. See Omega Eng’g Inc. v. Raytek Corp., 334 F.3d
`
`- 15 -
`
`
`
`

`

`
`
`Case 2:20-cv-00274-JRG-RSP Document 147 Filed 11/17/21 Page 16 of 47 PageID #: 5038Case 6:22-cv-00697-ADA Document 43-2 Filed 09/05/23 Page 17 of 48
`
`1314, 1324 (Fed. Cir. 2003) (“As a basic principle of claim interpretation,

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket