RFCyber Corp. v. Google LLC

CourtDistrict Court, E.D. Texas
DecidedNovember 17, 2021
Docket2:20-cv-00274
StatusUnknown

This text of RFCyber Corp. v. Google LLC (RFCyber Corp. v. Google LLC) is published on Counsel Stack Legal Research, covering District Court, E.D. Texas primary law. Counsel Stack provides free access to over 12 million legal documents including statutes, case law, regulations, and constitutions.

Bluebook
RFCyber Corp. v. Google LLC, (E.D. Tex. 2021).

Opinion

THE UNITED STATES DISTRICT COURT FOR THE EASTERN DISTRICT OF TEXAS MARSHALL DIVISION

RFCYBER CORP., § § v. § CASE NO. 2:20-CV-274-JRG § [LEAD CASE] GOOGLE LLC, GOOGLE PAYMENT § CORP. § ___________________________________ § § RFCYBER CORP., § § v. § CASE NO. 2:20-CV-335-JRG § [MEMBER CASE] SAMSUNG ELECTRONICS CO., LTD., § SAMSUNG ELECTRONICS AMERICA, § INC. §

CLAIM CONSTRUCTION MEMORANDUM AND ORDER

Before the Court is the Opening Claim Construction Brief (Dkt. No. 116) filed by Plaintiff RFCyber Corp. (“Plaintiff” or “RFCyber” or “RFC”). Also before the Court is the Responsive Claim Construction Brief (Dkt. No. 122) filed by Defendants Samsung Electronics Co., Ltd. and Samsung Electronics America, Inc. (“Defendants” or “Samsung”)1 as well as Plaintiff’s reply (Dkt. No. 124). The Court held a claim construction hearing on October 27, 2021.

1 Defendants Google LLC and Google Payment Corp. (collectively, “Google”) have been dismissed. (See Dkt. Nos. 72–73, 127, 129.) Table of Contents I. BACKGROUND ....................................................................................................................... 2 II. LEGAL PRINCIPLES ........................................................................................................... 4 III. AGREED TERMS................................................................................................................. 8 IV. DISPUTED TERMS .............................................................................................................. 8 1. “security channel” .................................................................................................................. 9 2. “secured channel” ................................................................................................................ 11 3. “security channel on top of the initial security channel” ..................................................... 12 4. “applet” ................................................................................................................................ 13 5. “e-purse” and “electronic purse” ......................................................................................... 13 6. “install” and “installed” ....................................................................................................... 19 7. “payment server” ................................................................................................................. 23 8. “personalize,” “personalized,” “personalizing,” and “personalization” .............................. 26 9. “smart card pre-loaded with [an/the] emulator” .................................................................. 29 10. “smart card,” “card module,” and “smart card module” .................................................... 31 11. “security authentication module” and “SAM” ................................................................... 34 12. “device information of [a/the] secure element” ................................................................. 37 13. “key set installed on the secure element” .......................................................................... 40 14. “secure element” ................................................................................................................ 40 15. “method for funding an e-purse” ....................................................................................... 41 16. “contactless interface that facilitates communication between the e-purse applet in the smart card and the payment server over a wired network” and “e-purse SAM originally used to issue the e-purse / existing security authentication module (SAM) originally used to issue the e-purse” ............................................................................................................ 45 V. CONCLUSION...................................................................................................................... 46

I. BACKGROUND Plaintiff alleges infringement of United States Patent Nos. 8,118,218 (“the ’218 Patent”), 8,448,855 (“the ’855 Patent”), 9,189,787 (“the ’787 Patent”), and 9,240,009 (“the ’009 Patent”) (collectively, “the patents-in-suit” or “the asserted patents”). (Dkt. No. 116, Exs. A–D). Plaintiff submits that the patents-in-suit “are directed to various aspects of a mobile payment system.” (Dkt. No. 116 at 2.) The ’218 Patent, titled “Method and Apparatus for Providing Electronic Purse,” issued on February 21, 2012, and bears a filing date of September 24, 2006. The Abstract of the ’218 Patent

states: Techniques for portable devices functioning as an electronic purse (e-purse) are disclosed. According to one aspect of the invention, a mechanism is provided to enable a portable device to conduct transactions over an open network with a payment server without compromising security. In one embodiment, a device is loaded with an e-purse manager. The e-purse manager is configured to manage various transactions and functions as a mechanism to access an emulator therein. The transactions may be conducted over a wired network or a wireless network. A three-tier security model is contemplated to support the security of the transactions from the e-purse. The three-tier security model includes a physical security, an e- purse security and a card manager security, concentrically encapsulating one with another. Security keys (either symmetric or asymmetric) are personalized within the three-tier security model.

The ’855 Patent resulted from continuations of the ’218 Patent. The ’787 Patent, in turn, resulted from a continuation of the ’855 Patent. The ’009 Patent resulted from a continuation-in- part of the ’218 Patent. Samsung submits: “RFCyber has accused Samsung of infringing claims 1, 3, 7–9, 11, 14– 15, and 17 of the ’218 patent, claims 1–6, 10, and 12 of the ’855 patent, claims 1–3, 6, 8, 11, 13, 16, and 18 of the ’787 patent, and claims 1, 6–7, 10, 14, and 16 of the ’009 patent (collectively, the ‘Asserted Claims’).” (Dkt. No. 122 at 2 n.3.) Plaintiff previously also asserted United States Patent No. 10,600,046 (“the ’046 Patent”). (Dkt. No. 1, Ex. E). Plaintiff did not elect any claims from the ’046 Patent in its election of asserted claims filed on September 15, 2021 (Dkt. 110, Ex. A), so Plaintiff no longer asserts the ’046 Patent in the present case. II. LEGAL PRINCIPLES It is understood that “[a] claim in a patent provides the metes and bounds of the right which the patent confers on the patentee to exclude others from making, using or selling the protected invention.” Burke, Inc. v. Bruno Indep. Living Aids, Inc., 183 F.3d 1334, 1340 (Fed. Cir. 1999). Claim construction is clearly an issue of law for the court to decide. Markman v. Westview

Instruments, Inc., 52 F.3d 967, 970–71 (Fed. Cir. 1995) (en banc), aff’d, 517 U.S. 370 (1996). To ascertain the meaning of claims, courts look to three primary sources: the claims, the specification, and the prosecution history. Markman, 52 F.3d at 979. The specification must contain a written description of the invention that enables one of ordinary skill in the art to make and use the invention. Id. A patent’s claims must be read in view of the specification, of which they are a part. Id. For claim construction purposes, the description may act as a sort of dictionary, which explains the invention and may define terms used in the claims. Id. “One purpose for examining the specification is to determine if the patentee has limited the scope of the claims.” Watts v.

Free access — add to your briefcase to read the full text and ask questions with AI

Related

Marrin v. Griffin
599 F.3d 1290 (Federal Circuit, 2010)
Bates v. Coe
98 U.S. 31 (Supreme Court, 1878)
Finjan, Inc. v. Secure Computing Corp.
626 F.3d 1197 (Federal Circuit, 2010)
Datamize, L.L.C. v. Plumtree Software, Inc.
417 F.3d 1342 (Federal Circuit, 2005)
Salazar v. Procter & Gamble Company
414 F.3d 1342 (Federal Circuit, 2005)
Intellicall, Inc. v. Phonometrics, Inc.
952 F.2d 1384 (Federal Circuit, 1992)
Stanton J. Rowe v. Michael Dror and Paul Trescony
112 F.3d 473 (Federal Circuit, 1997)
Burke, Inc. v. Bruno Independent Living Aids, Inc.
183 F.3d 1334 (Federal Circuit, 1999)
John D. Watts v. Xl Systems, Inc.
232 F.3d 877 (Federal Circuit, 2000)

Cite This Page — Counsel Stack

Bluebook (online)
RFCyber Corp. v. Google LLC, Counsel Stack Legal Research, https://law.counselstack.com/opinion/rfcyber-corp-v-google-llc-txed-2021.