throbber
Case 6:22-cv-00697-ADA Document 43-3 Filed 09/05/23 Page 1 of 31
`Case 6:22-cv-00697-ADA Document 43-3 Filed 09/05/23 Page 1 of 31
`
`
`
`
`EXHIBIT B
`EXHIBIT B
`
`
`
`
`
`

`

`Case 6:22-cv-00697-ADA Document 43-3 Filed 09/05/23 Page 2 of 31
`
`IN THE UNITED STATES DISTRICT COURT
`FOR THE WESTERN DISTRICT OF TEXAS
`WACO DIVISION
`
`
`Case No. 6:22-cv-00697-ADA
`
`JURY TRIAL DEMANDED
`
`










`
`Plaintiff,
`
`Defendant.
`
`
`RFCyber CORP.,
`
`
`
`
`v.
`
`
`VISA U.S.A. INC.,
`
`
`DECLARATION OF MARK JONES IN SUPPORT OF
`PLAINTIFF RFCYBER CORP’S OPENING MARKMAN BRIEF
`
`
`
`
`
`
`
`I, Mark Jones, do hereby declare as follows:
`
`1.
`
`INTRODUCTION
`
`1.
`
`I have been retained by Fabricant LLP., counsel for RFCyber Corporation
`
`(“RFCyber”), as an expert in the lawsuit captioned above.
`
`2.
`
`I have reviewed U.S. Patent Nos. 8,118,218, 9,189,787 (the “Patents-at-Issue”), the
`
`prosecution file histories for the Patents-at-Issue, and the parties’ proposed claim
`
`construction of the terms of the Patents-at-Issue. I have also reviewed Visa U.S.A.
`
`Inc. (“Visa”)’s Opening Claim Construction Brief and the Declaration of Michael
`
`Shamos, Ph.D. in Support of Defendant’s Opening Claim Construction Brief.
`
`2.
`
`QUALIFICATIONS
`
`3.
`
`Until my recent retirement, I was a Professor of Electrical and Computer
`
`Engineering at Virginia Tech in Blacksburg, Virginia. I graduated summa cum
`
`laude from Clemson University in 1986 with a B.S. in Computer Science and a
`
`minor in Computer Engineering, while holding a National Merit Scholarship and
`
`-1-
`
`

`

`Case 6:22-cv-00697-ADA Document 43-3 Filed 09/05/23 Page 3 of 31
`
`the R. F. Poole Scholarship. I then graduated from Duke University in 1990 with a
`
`PhD in Computer Science, while holding the Von Neumann Fellowship.
`
`4.
`
`Upon graduation, I joined the Department of Energy at its Argonne National
`
`Laboratory facility. My responsibilities there included the design and use of
`
`software for computers with hundreds of processing elements. This software was
`
`designed for compatibility with new parallel computer architectures as they became
`
`available, as well as with other large software components being written in the
`
`Department of Energy. While with the Department of Energy, I received the IEEE
`
`Gordon Bell Prize.
`
`5.
`
`In 1994, I joined the Computer Science faculty at the University of Tennessee. My
`
`teaching responsibilities included computer architecture and computer networking.
`
`My research interests included the design and use of software that used the
`
`collective power of large groups of workstations. While at the University of
`
`Tennessee, I received a CAREER Award from the National Science Foundation.
`
`6.
`
`In 1997, I joined the Electrical and Computer Engineering faculty at Virginia Tech.
`
`My teaching responsibilities have included the design of embedded systems,
`
`computer organization, computer architecture, a variety of programming courses,
`
`and parallel computing. I have been cited multiple times on the College of
`
`Engineering’s Dean’s List for teaching.
`
`7.
`
`In addition to the activities, education, and professional experience listed above, I
`
`have been involved in research projects that contribute to my expertise relating to
`
`this report. While at Virginia Tech, I have been a primary or co-investigator on
`
`government and industrial research grants and contracts in excess of five million
`
`-2-
`
`

`

`Case 6:22-cv-00697-ADA Document 43-3 Filed 09/05/23 Page 4 of 31
`
`dollars.
`
`8.
`
`The majority of the research contracts undertaken in the laboratory have involved
`
`collaboration and coordination with other groups to build a larger system. My
`
`responsibilities under the SLAAC project (a collaborative effort funded by the
`
`Defense Advanced Research Projects Agency involving the University of Southern
`
`California, Sandia National Laboratory, Los Alamos National Laboratory, Brigham
`
`Young University, UCLA, Lockheed-Martin, and the United States Navy) included
`
`the development of a software system for monitoring, configuring, and controlling
`
`a networked collection of computers hosting specialized computer hardware. As
`
`part of the DSN project (a collaborative effort funded by the Defense Advanced
`
`Research Projects Agency involving UCLA and USC), I was responsible for
`
`designing algorithms and software for controlling and monitoring a large network
`
`of autonomous computer sensor nodes. This software was integrated with software
`
`from several other teams around the country for a set of field demonstrations over
`
`a three-year period.
`
`9.
`
`In the TEAMDEC project for the Air Force Research Laboratory, I led an effort to
`
`design and construct a collaborative, Internet-based decision making system. This
`
`Java-based system provided a geographically diverse team with Internet-based
`
`tools to enable collaborative decision-making. On the server side, the system
`
`architecture made extensive use of database technology. This work was awarded
`
`first prize at the 2002 AOL/CIT Research Day.
`
`10.
`
`Other projects have involved the close coupling of computer hardware and
`
`software, including the writing of device drivers and simple operating systems, the
`
`-3-
`
`

`

`Case 6:22-cv-00697-ADA Document 43-3 Filed 09/05/23 Page 5 of 31
`
`design of hardware circuits, the design of new system architectures, architectures
`
`for secure computing, the modification of complex operating systems, and software
`
`for mediating between complex software packages.
`
`11.
`
`A detailed record of my professional qualifications is set forth in the attached
`
`Exhibit 1, which is my curriculum vitae, including a list of publications, awards,
`
`research grants, and professional activities. My curriculum vitae also lists the
`
`depositions, hearings, and trial at which I have testified. I am being compensated
`
`$700 per hour for my work in connection with this case. My compensation is in no
`
`way related to the outcome of this litigation. If called as a witness, I would testify
`
`as to the statements and opinions contained in this report.
`
`3.
`
`LEGAL UNDERSTANDING
`
`12.
`
`Below I include my understanding of several pertinent legal principles. I have
`
`applied these principles in reaching my opinions discussed herein.
`
`3.1. Claim Construction
`
`13.
`
`I understand that claim terms should be given their ordinary and customary
`
`meaning within the context of the patent in which the terms are used, i.e., the
`
`meaning that the term would have to a person of ordinary skill in the art in question
`
`at the time of the invention in light of what the patent teaches, unless it appears that
`
`the inventors were using them to mean something else. Additionally, the
`
`specification and prosecution history must be consulted to confirm whether the
`
`patentee has acted as his/her own lexicographer (i.e., provided special meaning to
`
`any disputed terms), or intentionally disclaimed, disavowed, or surrendered any
`
`claim scope).
`
`-4-
`
`

`

`Case 6:22-cv-00697-ADA Document 43-3 Filed 09/05/23 Page 6 of 31
`
`14.
`
`I understand that a person of ordinary skill in the art is deemed to read a claim term
`
`not only in the context of the particular claim in which the disputed term appears,
`
`but also in the context of the entire patent, including the specification and the
`
`prosecution history. The prosecution file history provides evidence of how both
`
`the Patent Office and the inventors understood the terms of the patent, particularly
`
`in light of what was known in the prior art. Further, where the specification
`
`describes a claim term broadly, arguments and amendments made during
`
`prosecution may require a more narrow interpretation. For these reasons, the words
`
`of the claim must be interpreted in view of, and be consistent with, the entire
`
`specification. The specification is the primary basis for construing the claims and
`
`provides a safeguard such that correct constructions closely align with the
`
`specification. Ultimately, the interpretation to be given a term can only be
`
`determined and confirmed with a full understanding of what the inventors actually
`
`invented and intended to envelop with the claim as set forth in the patent itself.
`
`15.
`
`I understand that, to determine how a person of ordinary skill would understand a
`
`claim term, one should look to those sources available that show what a person of
`
`skill in the art would have understood disputed claim language to mean. Such
`
`sources include the words of the claims themselves, the remainder of the patent’s
`
`specification, the prosecution history of the patent (all considered “intrinsic”
`
`evidence), and “extrinsic” evidence concerning relevant scientific principles, the
`
`meaning of technical terms, and the state of the art. I understand that one looks
`
`primarily to the intrinsic patent evidence, but extrinsic evidence may also be useful
`
`in interpreting patent claims when the intrinsic evidence itself is insufficient.
`
`-5-
`
`

`

`Case 6:22-cv-00697-ADA Document 43-3 Filed 09/05/23 Page 7 of 31
`
`16.
`
`Additionally, the context in which a term is used in the Asserted Claims can be
`
`highly instructive. Likewise, other claims of the patent in question, both asserted
`
`and not asserted, can inform the meaning of a claim term. For example, because
`
`claim terms are normally used consistently throughout the patent, the usage of a
`
`term in one claim can often illuminate the meaning of the same term in other claims.
`
`Differences among claims can also be a useful guide in understanding the meaning
`
`of particular claim terms.
`
`17.
`
`I understand that, while intrinsic evidence is of primary importance, extrinsic
`
`evidence, e.g., all evidence external to the patent and prosecution history, including
`
`expert and inventor testimony, dictionaries, and learned treatises, can also be
`
`considered. For example, technical dictionaries may help one better understand the
`
`underlying technology and the way in which one of skill in the art might use the
`
`claim terms. Extrinsic evidence should not be considered, however, divorced from
`
`the context of the intrinsic evidence. Evidence beyond the patent specification,
`
`prosecution history, and other claims in the patent should not be relied upon unless
`
`the claim language is ambiguous in light of these intrinsic sources. Furthermore,
`
`while extrinsic evidence can shed useful light on the relevant art, it is less
`
`significant than the intrinsic record in determining the legally operative meaning of
`
`3.2.
`
`18.
`
`claim language.
`
`Indefiniteness
`
`I understand that a patent term may be considered indefinite. I further understand
`
`that a term is to be considered indefinite if a person of ordinary skill in the art
`
`(POSITA) reading the term, in light of the specification and prosecution history of
`
`-6-
`
`

`

`Case 6:22-cv-00697-ADA Document 43-3 Filed 09/05/23 Page 8 of 31
`
`the patent, is not informed about the scope of the invention with reasonable
`
`certainty. Absolute precision, however, is not required—some amount of
`
`uncertainty about the meaning of the term is acceptable.
`
`19.
`
`I understand that the Supreme Court of the United States has instructed that in order
`
`for a claim to be definite, “a patent’s claims, viewed in light of the specification
`
`and prosecution history, [must] inform those skilled in the art about the scope of
`
`the invention with reasonable certainty.”1 The Supreme Court also warned that
`
`“the definiteness requirement must take into account the inherent limitations of
`
`language . . . Some modicum of uncertainty . . . is the price of ensuring the
`
`appropriate incentives for innovation.” The Court also stated that “a patent must
`
`be precise enough to afford clear notice of what is claimed, thereby apprising the
`
`public of what is still open to them.”2
`
`20.
`
`I understand that the Federal Circuit has held that certain claims may be invalid as
`
`indefinite if they cover both an apparatus and a method of use of that apparatus. For
`
`example, claims that cover an apparatus and require a user to actually use the
`
`apparatus are subject to this rule. I further understand that claims are not indefinite
`
`under this rule if the claims merely recite a structure and its capabilities. One must
`
`examine the language of the claims to determine if it is directed at user actions or
`
`system capabilities.
`
`4.
`
`THE PATENTS AT ISSUE
`
`4.1. Description of the ‘218 and ‘787 Patents
`
`
`1 Nautilus, Inc. v. Biosig Instruments, Inc., 134 S. Ct. 2120, 2129 (2014).
`
`2 Id. at 2123.
`
`-7-
`
`

`

`Case 6:22-cv-00697-ADA Document 43-3 Filed 09/05/23 Page 9 of 31
`
`21.
`
`I understand that Visa contends that certain claim terms of the ‘218 and ‘787, patent
`
`are indefinite. The ‘218, and ‘787 patents share a common specification, and
`
`citations to the specification herein are to the ‘218 Patent unless otherwise noted.
`
`22.
`
`The ’218 patent, entitled “Method and Apparatus for Providing Electronic Purse”
`
`was issued on February 21, 2012. The ’218 patent was filed on September 24, 2006.
`
`23.
`
`The ‘787 patent, entitled “Method and Apparatus for Conducting E-Commerce and
`
`M-Commerce,” was issued on November 17, 2015. The ‘787 patent was filed on
`
`May 28, 2013, and is a continuation of the application which issued as the ‘855
`
`patent.
`
`24.
`
`I understand that RFCyber may claim a priority date for the patent at issue based
`
`on a date of invention, at least as early as August 2004.
`
`25.
`
`The patent at issue discloses inventions “for portable devices functioning as an
`
`electronic purse”:
`
`
`
`-8-
`
`

`

`Case 6:22-cv-00697-ADA Document 43-3 Filed 09/05/23 Page 10 of 31
`
`26.
`
` In exemplary embodiments, the invention provides a portable device, such as cell
`
`phone with a smart card module, configured to conduct e-commerce transactions
`
`over contactless interfaces and m-commerce transactions over wireless interfaces:
`
`27.
`
`According to exemplary embodiments, a purse manager midlet may act as an agent
`
`to conduct transactions with one or more e-purse applets:
`
`
`
`-9-
`
`

`

`Case 6:22-cv-00697-ADA Document 43-3 Filed 09/05/23 Page 11 of 31
`
`Referring now to FIG. 2, there shows an exemplary archi-
`tecture diagram 200 according to one embodiment of the
`present invention. The diagram 200 includesa cellphone 202
`embedded with a smart card module. An example of such a
`cell phone is a near field communication (NFC) enabled
`cellphone that includes a Smart MX (SMX) module. The
`SMX is pre-loaded with a Mifare emulator 208 (which is a
`single functional card) for storing values. The cellphone is
`equipped with a RFID interface (e.g., ISO 144443) that
`allows the cellphoneto act as a tag. In addition, the SMX is a
`
`JavaCardthat can run Java applets. According to one embodi-
`
`
`
`-10-
`
`

`

`Case 6:22-cv-00697-ADA Document 43-3 Filed 09/05/23 Page 12 of 31
`
`
`
`‘218 Patent at 4:57-5:29.
`
`28.
`
`In exemplary embodiments, the invention provides an electronic purse which may
`
`be personalized over secure channels, such as secure channels between an applet
`
`and a security authentication module (“SAM”).
`
`-11-
`
`

`

`Case 6:22-cv-00697-ADA Document 43-3 Filed 09/05/23 Page 13 of 31
`
`29.
`
`In exemplary embodiments, a security channel may be established via an
`
`application security domain. Personalization may further include creating keys over
`
`a security channel to protect subsequent operations:
`
`
`
`
`
`-12-
`
`

`

`Case 6:22-cv-00697-ADA Document 43-3 Filed 09/05/23 Page 14 of 31
`
`‘218 patent at 5:60-6:25; see also id. at 6:26-7:9.
`
`30.
`
`In exemplary embodiments, the invention is financed overt the air:
`
`
`
`-13-
`
`

`

`Case 6:22-cv-00697-ADA Document 43-3 Filed 09/05/23 Page 15 of 31
`
`See also ‘218 patent at 7:10-8:6.
`
`5.
`
`LEVEL OF ORDINARY SKILL IN THE ART
`
`
`
`31.
`
`I understand that claims are to be construed from the viewpoint of a person of
`
`ordinary skill in the art as of the date of the invention (e.g., on or around September
`
`1, 2004). I understand that the level of ordinary skill in the art is a function of many
`
`factors, including: (1) the educational level of the inventor; (2) type of problems
`
`encountered in the art; (3) prior art solutions to those problems; (4) rapidity with
`
`which innovations are made; (5) sophistication of the technology; and (6)
`
`educational level of active workers in the field.
`
`32.
`
`It is my opinion that the person of ordinary skill in the art would have a bachelor’s
`
`degree in computer science, computer engineering, or equivalent, with one to two
`
`years of experience in the areas of secure computing and portable computing
`
`devices. Extensive experience and technical training may substitute for educational
`
`requirements, while advanced education might substitute for experience. I also
`
`understand that the patent at issue claims priority to a date of invention at least as
`
`-14-
`
`

`

`Case 6:22-cv-00697-ADA Document 43-3 Filed 09/05/23 Page 16 of 31
`
`early as August, 2004, and that is the relevant time period from which a person of
`
`ordinary skill in the art would evaluate the disclosure of the patent at issue. Further,
`
`even if the relevant time period were later, such as between August 2004 and
`
`September 2006, this would not affect the opinions I set forth in this declaration.
`
`33.
`
`I myself, based on my education and experience as described above, would exceed
`
`the qualifications and background of a POSITA.
`
`6.
`
`TERMS IN DISPUTE
`
`34.
`
`I have been asked to provide my opinions on the term addressed below. It is my
`
`understanding that the defendant, Visa, as well as Visa’s expert (Michael Shamos), contend that
`
`these terms are indefinite.
`
`6.1.
`
`“contactless interface that facilitates communication between the e-purse
`applet in the smart card and the payment server over a wired network”3
`
`35.
`
`I understand that the Defendant has taken the position that this term is indefinite. I
`
`understand that RFCyber has taken the position that this term is not indefinite and
`
`should be given its plain and ordinary meaning. I note that Defendant does not
`
`contend that the terms “e-purse,” “smart card,” “applet,” or “payment server” are
`
`indefinite.
`
`36.
`
`Both in the 2004-2006 timeframe and today, the plain meaning of this term would
`
`have been clear to a POSITA. Further, as described herein and in the patent itself,
`
`the meaning of this term is clear from the claims and the specification. A person of
`
`ordinary skill in the art would have been reasonably certain as to the scope of this
`
`term.
`
`3 ‘218 patent (all claims)
`
`
`
`-15-
`
`

`

`Case 6:22-cv-00697-ADA Document 43-3 Filed 09/05/23 Page 17 of 31
`
`37.
`
`This term is recited in all independent claims of the ‘218 patent. For example, claim
`
`1 of the ‘218 patent recites:
`
`
`
`38.
`
`Both the specification and claims of the ‘218 patent support RFCyber’s
`
`construction of the plain meaning of this term. A POSITA would recognize the
`
`plain and ordinary meaning of this term with reasonable certainty. For example,
`
`claim 1 recites a “contactless interface that facilitates communication … over a
`
`wired network” in contrast with “a midlet that is configured to facilitate
`
`-16-
`
`

`

`Case 6:22-cv-00697-ADA Document 43-3 Filed 09/05/23 Page 18 of 31
`
`communication … over a wireless network.” On this basis, a POSITA would be
`
`reasonably certain that a “contactless interface that facilitates communication …
`
`over a wired network” is used for contactless payments, such as radio-frequency
`
`identification (“RFID”) and near field communication (“NFC”) interfaces, as
`
`opposed to wireless communication interfaces, such as Wi-Fi or cellular adapters.
`
`39.
`
`The disclosure of the specification would reinforce a POSITA’s understanding of
`
`the plain and ordinary meaning of this term. For example, the specification
`
`discloses one embodiment of the invention, consistent with Figure 2, is an NFC-
`
`enabled cellphone with an RFID interface:
`
`
`
`-17-
`
`

`

`Case 6:22-cv-00697-ADA Document 43-3 Filed 09/05/23 Page 19 of 31
`
`
`
`
`
`‘218 patent at 1:17-27, 4:57-66 and FIG. 2 (emphasis added). Based on this disclosure, a
`
`POSITA would be reasonably certain that the term “contactless interface” is recited
`
`with its plain and ordinary meaning, including contactless payment interfaces, and
`
`that a “wired network” for e-commerce includes networks which can be interfaced
`
`with contactlessly (e.g. via an RFID reader).
`
`-18-
`
`

`

`Case 6:22-cv-00697-ADA Document 43-3 Filed 09/05/23 Page 20 of 31
`
`40.
`
`The specification of the ‘218 patent also discloses that a contactless interface may
`
`be used to conduct e-commerce with a RFID reader (e.g. a contactless card reader),
`
`in contrast with m-commerce which is conducted wirelessly (e.g. over the internet):
`
`
`
`-19-
`
`

`

`Case 6:22-cv-00697-ADA Document 43-3 Filed 09/05/23 Page 21 of 31
`
`
`
`‘218 Patent at 2:25-41 and FIG. 2. Based on this disclosure, a POSITA would be
`
`reasonably certain that a contactless interface may be used to conduct “e-commerce”
`
`over a wired network (e.g. via an RFID POS system in communication with a
`
`payment network and servers via a web agent on PC), in contrast with a wireless
`
`interface, which may be used to conduct “M-commerce” over a wireless network (e.g.
`
`Wi-Fi or a cellular network).
`
`41.
`
`Accordingly, it is my opinion that this term should be given its plain and ordinary
`
`meaning, and that it is not indefinite.
`
`6.2. The Asserted System Claims Do Not Mix Methods and Apparatus
`
`42.
`
`I have been asked to give my opinion as to whether the asserted system claims
`
`(claims 11-18 of the ’218 Patent and claims 1-8 and 10 of the ’787 Patent) cover
`
`-20-
`
`

`

`Case 6:22-cv-00697-ADA Document 43-3 Filed 09/05/23 Page 22 of 31
`
`both an apparatus and method of using that apparatus. I understand that both Visa
`
`and Dr. Shamos assert that they do. I disagree.
`
`6.2.1. Claims 11-18 of the ’218 Patent
`
`43.
`
`Claim 11 of the ’218 Patent reads:
`
`A system for providing an e-purse, the system comprising:
`
` a
`
` portable device including or communicating with a smart card pre-loaded with an
`emulator configured to execute a request from and provide a response an e-purse
`applet is configured to expect, the portable device including a memory space loaded
`with a midlet that is configured to facilitate wireless communication between the
`e-purse applet in the smart card and a payment server over a wireless network, the
`portable device further
`including a contactless
`interface
`that facilitates
`communication between the e-purse applet in the smart card and the payment server
`over a wired network, wherein the e-purse applet is downloaded from the payment
`server when the smart card is in communication with the payment server, and
`operations of personalizing the e-purse applet comprises:
`
`establishing an initial security channel between the smart card and the e-purse
`security authentication module (SAM) to install and personalize the e-purse applet
`in the smart card, and
`
`creating a security channel on top of the initial security channel to protect
`subsequent operations of the smart card with the e-purse SAM, wherein any
`subsequent operation of the emulator is conducted over the security channel via the
`e-purse applet;
`
`the payment server associated with an issuer authorizing the e-purse applet; and
`
`the e-purse SAM configured to enable the e-purse applet, wherein an SAM is
`behind the payment server and in communication with the e-purse applet when the
`e-purse applet is caused to communicate with the payment server via the midlet.
`
`Visa focuses on the wherein clause describing the e-purse applet: “wherein the e-
`
`44.
`
`purse applet is downloaded from the payment server when the smart card is in
`
`communication with the payment server,”
`
`45.
`
`I understand that Visa and Dr. Shamos assert that a “person of ordinary skill in the
`
`art at the time of the invention would not know whether infringement occurs when
`
`the portable device is created (and perhaps capable of downloading an e-purse
`
`-21-
`
`

`

`Case 6:22-cv-00697-ADA Document 43-3 Filed 09/05/23 Page 23 of 31
`
`applet from the payment server), or if infringement occurs only if, or after, the e-
`
`purse applet is actually downloaded.” Visa Br. at 14. I disagree.
`
`46.
`
`Claims 11-18 of the ’218 Patent set out a system for providing an e-purse. The
`
`system includes a portable device. That portable device includes or communicates
`
`with a smart card that is pre-loaded with an emulator. The portable device further
`
`includes a memory space loaded with a midlet and a contactless interface.
`
`47.
`
`Claim 11 further sets out requirements for the portable device and its components.
`
`One requirement is that the emulator, midlet, and contactless interface must all
`
`operate with an e-purse applet.
`
`48.
`
`For example, the emulator is “configured to execute a request from and provide a
`
`response an e-purse applet is configured to expect.”
`
`49.
`
`The midlet “is configured to facilitate wireless communication between the e-purse
`
`applet in the smart card and a payment server over a wireless network.”
`
`50.
`
`The contactless interface “facilitates communication between the e-purse applet in
`
`the smart card and the payment server over a wired network.”
`
`51.
`
`The claim’s use of the term “configured to” would indicate to a POSITA that the
`
`device need not include an e-purse applet to infringe. It must only be capable of
`
`operating with a particular type of e-purse applet.4
`
`52.
`
`The claim provides limitations defining the type of e-purse applet that the portable
`
`device and its components must operate with: for example, i) it must be an e-purse
`
`applet “in the smart card” and ii) “wherein the e-purse applet is downloaded from
`
`
`4 Of course, the system as a whole must meet the other limitations of claim 11. Those limitations
`are not in dispute here.
`
`-22-
`
`

`

`Case 6:22-cv-00697-ADA Document 43-3 Filed 09/05/23 Page 24 of 31
`
`the payment server when the smart card is in communication with the payment
`
`server.”
`
`53.
`
` A POSITA, reading claim 11, would understand that the e-purse applet itself is not
`
`a claimed element of the portable device. Instead, the elements of the portable
`
`device must be configured to operate with an e-purse applet of the type set forth in
`
`the claim.
`
`54.
`
`A POSITA, reading the claim, would therefore understand that a system infringes
`
`when the portable device is created and is configured to operate with the e-purse
`
`applet as defined. Even if no e-purse applet is ever downloaded, such a device
`
`would still infringe because it is configured to work with the type of e-purse defined
`
`in the claims. In other words, a portable device that is not configured to operate
`
`with an e-purse applet that is downloaded from the payment server while the smart
`
`card is in communication with the payment server would not infringe.
`
`55.
`
`I further disagree with Dr. Shamos that the clause “when the smart card is in
`
`communication with the payment server” imposes a temporal limitation on the
`
`claims that would indicate that the claim covers an “action.” As I explain above,
`
`the clause merely describes the type of e-purse applet with which the portable
`
`device and its components must operate.
`
`56.
`
`The statements in the prosecution history are further consistent with the proper
`
`understanding of the claim. During prosecution, the applicants amended the claims
`
`to include the limitation “wherein the e-purse applet is downloaded and installed in
`
`the smart card when the smart card is in communication with the payment server.”
`
`Ex. 3 at 2, 4.
`
`-23-
`
`

`

`Case 6:22-cv-00697-ADA Document 43-3 Filed 09/05/23 Page 25 of 31
`
`Ex. 3 at 2.
`
`
`
`
`
`Ex. 3 at 4.
`
`57.
`
`The applicants cited paragraph [0037] of the specification to support this addition.
`
`-24-
`
`

`

`Case 6:22-cv-00697-ADA Document 43-3 Filed 09/05/23 Page 26 of 31
`
`Ex. 3 at 9.
`
`58.
`
`Paragraph [0037] (reproduced below) explains that the e-purse applet is
`
`
`
`dynamically installed.
`
`
`
`
`
`
`
`Ex. 4 at 11-12.
`
`59.
`
`The applicants there explained that that an e-purse applet is dynamically installed.
`
`-25-
`
`

`

`Case 6:22-cv-00697-ADA Document 43-3 Filed 09/05/23 Page 27 of 31
`
`Ex. 3 at 9 (“As supported in paragraph [0037], the e-purse applet is dynamically
`
`installed and personalized.” (emphasis added)). Ex. 4 at 12 (“The card manager
`
`311 performs … establishing a security channel, via a security domain, to install
`
`and personalize an external application (e.g., e-purse applet) in the card.”). These
`
`statements explaining how an e-purse applet may generally be dynamically
`
`downloaded do not transform claim 11 such that it requires an e-purse applet to be
`
`downloaded.
`
`60.
`
`Claim 18 adds another limitation defining the type of e-purse applet that the
`
`portable device must operate with: “wherein the e-purse is funded through a
`
`financial institution that maintains an account for a user being associated with the
`
`portable device.”
`
`61.
`
`As I explain above with respect to claim 11, this clause provides further definition
`
`to the type of e-purse with which the system works.
`
`62.
`
`In my opinion, therefore, claims 11-18 do not cover both an apparatus and a method
`
`of using the apparatus and are therefore not indefinite.
`
`6.2.2. Claims 1-8, 10 of the ’787 Patent
`
`63.
`
`Claim 1 of the ’787 Patent reads:
`
`A portable device for commerce, the portable device comprising:
`an emulator loaded in a smart card module for storing security values and updated
`transaction logs, and an e-purse applet to cause the portable device to function as
`an electronic purse (e-purse), wherein both of the emulator and e-purse applet are
`already personalized via a personalization process built on a first security channel
`so that the emulator is set to store a set of keys for subsequent data access
`authentication and the e-purse applet is configured to conduct a transaction with a
`network server over a second security channel;
`
` first interface configured to perform field communication (NFC) with a reader to
`perform electronic commerce with the e-purse applet against a fund stored in the
`emulator;
`
`
` a
`
`-26-
`
`

`

`Case 6:22-cv-00697-ADA Document 43-3 Filed 09/05/23 Page 28 of 31
`
`a second interface configured to perform mobile commerce with a payment server
`via an application against the fund stored in the emulator; and
`
` purse manager midlet being executed in the portable device to act as an agent to
`facilitate communications between the e-purse applet and a payment server to
`conduct transactions therebetween.
`
`
` a
`
`64.
`
`I understand that Visa and Dr. Shamos assert that it is “not clear whether any device
`
`that merely has the midlet installed would infringe or whether infringement would
`
`only occur when the midlet is actually being executed.” I disagree.
`
`65.
`
`A POSITA would understand that the phrase “being executed in the portable
`
`device” describes the functional capability of the midlet. Thus, the midlet, when
`
`executed, acts as an agent to facilitate communications. Indeed, the midlet is a
`
`component of the claimed portable device.
`
`66.
`
`A POSITA would not read the claim as requiring the midlet to actually be executed
`
`to infringe. So long as the midlet will have the requisite functionality, it will
`
`infringe.
`
`67.
`
`In other words, a manufacturer would understand that a midlet that cannot be
`
`executed to act as an agent to facilitate communications as claimed would not
`
`infringe claim 1 of the ’787 Patent.
`
`68.
`
`Visa also argues that claim 2 of the ’787 Patent separately sets out a specific timing
`
`and use of the system.
`
`-27-
`
`

`

`Case 6:22-cv-00697-ADA Document 43-3 Filed 09/05/23 Page 29 of 31
`
`Visa Br. at 15.
`
`
`
`69.
`
`70.
`
`I disagree.
`
`Claim 2 reads: “The portable device as recited in claim 1, further comprising a
`
`security module configured to install and personalize the e-purse applet via either
`
`the first interface or the second interface, wherein the keys are updated when the
`
`personalization process built on the first security channel completes.” Visa focuses
`
`on “wherein the keys are updated when the personalization process built on the first
`
`security channel completes.”
`
`71.
`
`Claim 1 imposes a precondition on the portable device thatboth the emulator and
`
`the e-purse applet “are already personalized via a personalization process.” Claim
`
`2 merely makes clear that after the process is completed, the keys must have b

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket