throbber
EXHIBIT A
`EXHIBIT A
`
`Petitioner's Exhibit 1016, Page 1
`
`

`

`
`
`UNITED STATES DISTRICT COURT
`FOR THE WESTERN DISTRICT OF TEXAS
`
`
`PROXENSE, LLC,
`
`Plaintiffs,
`
`v.
`
`SAMSUNG ELECTRONICS, CO., LTD. and
`SAMSUNG ELECTRONICS AMERICA, INC,
`
`Defendants.
`
`
`
`
`
`Civil Action No. 6:21-cv-00210-ADA
`
`
`
`
`
`INFRINGEMENT CONTENTIONS FOR US PATENT NO. 8,352,730
`
`Petitioner's Exhibit 1016, Page 2
`
`

`

`U.S. Patent Number 8,352,730 – Preliminary Infringement Contentions1
`
`
`
`Assignee:
`Title:
`Filing Date:
`Publication Date:
`Inventor:
`
`
`
`Proxense, LLC
`Biometric personal data key (PDK) authentication
`2005-12-20
`2013-01-08
`Giobbi, John J.
`
`‘730 Patent Claim2
`1
` A method for verifying a user during authentication of an
`integrated device, comprising the steps of4:
` persistently storing biometric data of the user and a
`plurality of codes and other data values comprising a
`device ID code uniquely identifying the integrated device
`and a secret decryption value in a tamper proof format
`written to a storage element on the integrated device that
`is unable to be subsequently altered;
`
`Accused Instrumentality And Where Each Claim Element Is Found3
`Samsung Pay preloaded5 smartphones carry out the claimed method, literally or by
`the doctrine of equivalents, for at least the reasons set forth below:
`persistently storing biometric data of the user … in a tamper proof format written
`to a storage element on the integrated device that is unable to be subsequently
`altered
`
`
`Utilizing the Android operating system, Samsung Pay preload smartphones
`persistently store biometric data of the user in a tamper proof format written
`
`
`1 The Preliminary Infringement Contentions (PICS) provided herein are based on information obtained to date and may not be exhaustive. Plaintiff’s investigation of Defendants’
`infringement is ongoing. Plaintiff reserves the right to supplement and/or amend these PICS to identify additional instrumentalities and to further identify where each element of
`each claim is found in each accused instrumentality, including on the basis of discovery obtained from Defendants, and from third-parties during the course of this litigation,
`pursuant to ¶2 of the Order Governing Proceedings – Patent Cases under Hon. Alan D. Albright.
`
` 2
`
` All PICS set forth herein for any independent patent claims are hereby incorporated by reference into the PICS alleged for any dependent patent claims that depend on such
`independent claims, as if fully set forth therein.
`
` 3
`
` The Accused Instrumentalities and associated exhibits discussed and/or cited for any claim herein are representative in all material respects of all other accused instrumentalities
`identified for that claim (e.g., a specified Samsung Galaxy phone may be used as a representative example in these charts since the other accused instrumentalities have immaterial
`differences in their hardware and/or software configuration, the cited references are believed to be illustrative of all such accused devices).
`
` 4
`
` Plaintiff’s inclusion of any claim preamble in this claim chart should not be interpreted as an admission that the preamble is limiting. Plaintiff reserves the right to take the
`position that the claim preambles are limiting or not limiting on a claim-by-claim basis.
`
` 5
`
` For the avoidance of doubt, "preloaded" includes devices that ship with Samsung Pay pre-installed or upon which Samsung Pay is otherwise installed by Defendants (e.g.,
`through operating system upgrades).
`
`
`1
`
`Petitioner's Exhibit 1016, Page 3
`
`

`

`‘730 Patent Claim2
`
`Accused Instrumentality And Where Each Claim Element Is Found3
`to a storage element on the integrated device that is unable to be
`subsequently altered.
`
`Starting with the Galaxy S6 and S6 Edge, Samsung sold mobile phones
`preloaded with Samsung Pay.
`Samsung Newsroom, Samsung’s Unpacked Event to Set the Pace for
`Mobile World Congress (2015), http://news.samsung.com/global/samsungs-
`unpacked-event-to-set-the-pace-for-mobile-world-congress (“The Galaxy
`S6 and S6 edge will come with Samsung Pay, a highly secure and
`universally accepted mobile payment system that will work with most
`credit cards, debit cards and NFC.”); Cho Jin-young, Samsung to Pre-install
`Samsung Pay in Its All Smartphone Starting from Next Year (2016),
`http://www.businesskorea.co.kr/news/articleView
`.html?idxno=16767 (“An official from Samsung Electronics said on
`December 14, ‘We have decided to pre-install Samsung Pay in Samsung
`Electronic’s smartphone to be released from next year.’”).
`
`Samsung’s devices persistently store user biometric data, which can be used
`in connection with Samsung Pay. “To add an extra layer of security to [a
`user’s] Samsung Pay account, [users] can turn on biometric security, like
`Fingerprint or Iris Verification.” Set up Samsung Pay on your phone,
`https://www.samsung.com/us/support/answer/ANS00045081 The persistent
`storage of user biometric data on Samsung devices must include, e.g., a
`fingerprint or iris template of the user, to verify a scan of a user’s
`fingerprint or iris against.
`
`Samsung Pay preloaded smartphones utilize the Android OS. Protecting
`biometric data, Android’s implementation guidelines require tamper-proof
`“raw fingerprint data or derivatives (for example, templates) [that] must
`never be accessible from outside the sensor driver or TEE” (trusted
`execution environment) and “fingerprint acquisition, enrollment, and
`recognition must occur inside the TEE”. Android Open-Source Project:
`Fingerprint HIDL,
`https://source.android.com/secruity/authentication/fingerprint-hal.
`Requiring acquisition and recognition to occur inside the TEE, when
`
`
`
`2
`
`Petitioner's Exhibit 1016, Page 4
`
`

`

`‘730 Patent Claim2
`
`Accused Instrumentality And Where Each Claim Element Is Found3
`following the implementation guidelines, fingerprint data never leaves the
`TEE. Android’s TEE, called Trusty, “uses ARM’s TrustzoneTM to
`virtualize the main processor and create a secure trusted exaction
`environment” isolated from the rest of the system. Android Open-Source
`Project: Trusty TEE, https://source.android.com/security/trusty.
`Accordingly, fingerprint data, which never leaves the TEE, also never
`leaves the Trustzone housing, Trusty. Keeping biometric data within the
`Trustzone, Android phones, including Samsung devices utilizing Samsung
`Pay, can persistently store biometric data in a tamper proof format.
`
`Samsung Pay admittedly adheres to Android’s implementation guidelines.
`Specifically, Samsung Pay utilizes Samsung Knox. “With Samsung Pay …
`Samsung Knox and tokenization add extra layers of security.” Samsung
`Pay, https://www.samsung.com/us/samsung-pay. On Samsung devices
`utilizing Knox, “the authentication software doesn’t share or distribute the
`biometric measurements of any user.” Knox Platform for Enterprise,
`Version 1.3.1 (2020), page 41. “The measurements are stored in a format
`that can’t be used to reproduce the original biometric, and can only be
`accessed and decoded within the specific part of the TrustZone that has
`access to the biometric hardware.” Id. Ensuring biometrics only accessible
`within a specific part of the Trustzone can access to the biometric hardware,
`Samsung Knox keeps biometric information within the Trustzone, adhering
`to Android’s implementation guidelines.
`
`On Android devices (like the Samsung devices preloaded with Samsung
`Pay), access to the biometric hardware is controlled by Fingerprint HIDL.
`“Android uses Fingerprint Hardware Interface Definition Language (HIDL)
`to connect to a vendor-specific library and fingerprint hardware (for
`example, a fingerprint sensor).” Android Open Source Project: Fingerprint
`HIDL, https://source.android.com/secruity/authentication/fingerprint-hal.
`Only permitting access to biometric information to elements having access
`to biometric hardware, Samsung Pay preloaded smartphones utilizing Knox
`must limit access to fingerprint biometric data to that permitted by
`Fingerprint HIDL. The methods enabled by the Fingerprint HIDL do not
`permit altering biometric data. Id. (providing a listing of methods, none of
`
`
`
`3
`
`Petitioner's Exhibit 1016, Page 5
`
`

`

`Accused Instrumentality And Where Each Claim Element Is Found3
`which allowing for the alternation of biometric data.). Keeping fingerprint
`and other biometric data within a portion of the Trustzone only accessible
`by Fingerprint HIDL, which lacks a method for altering biometric data,
`Samsung Pay preloaded smartphones persistently store biometric data of the
`user in a tamper proof format written to a storage element on the integrated
`device that is unable to be subsequently altered.
`
`
`persistently storing … a device ID code uniquely identifying the integrated device
`… in a tamper proof format written to a storage element on the integrated device
`that is unable to be subsequently altered
`
`
`Safeguarding credit card information with EMV payment tokens, Samsung
`Pay preloaded smartphones persistently store a device ID code uniquely
`identifying the smartphone in a tamper proof format written to a storage
`element on the integrated device that is unable to be subsequently altered.
`“Samsung [was] among the first to implement EMV payment tokens in
`digital wallets that hold credentials for several payments use cases.” EMV
`Payment Tokenization Primer and Lessons Learned, U.S. Payments Forum
`(2019), page 12. “EMV payment tokens are open-loop tokens provisioned
`by a TSP and, like other tokens, are used to replace the actual payment
`credential (e.g., PAN) with another numeric value.” Id., at 8. Payment
`tokens, accordingly, are issued (“provisioned”) to Samsung Pay preload
`smartphones in exchange for a credit card number by a token service
`provider (TSP), such as Visa, MasterCard, Discover, and American
`Express. Id., at 23 (Figure 5 – identifying Visa, MasterCard, American
`Express and Discover as Token Service Providers). “Payment tokens may
`vary depending on implementation, but typically there is a unique token for
`each device, which bears no resemblance to the PAN (e.g., the final four
`digits do not match).” Id., at 8 (emphasis added). EMV Payment tokens,
`which are device-specific, are stored by Samsung Pay preloaded
`smartphones as “device ID codes.”
`
` A
`
` device ID is defined in the Specification as a “value that uniquely
`identifies” a device, which may be “provided during enrollment.” U.S.
`Patent No. 8,886,954, Col. 5, ll. 37-44 (“[I]n one embodiment the code is a
`
`‘730 Patent Claim2
`
`
`
`4
`
`Petitioner's Exhibit 1016, Page 6
`
`

`

`‘730 Patent Claim2
`
`Accused Instrumentality And Where Each Claim Element Is Found3
`device ID or other value that uniquely identifies biometric key 100… In
`other embodiments, the code is provided during enrollment and/or the
`biometric data are provided during manufacturing.”). EMV payment tokens
`uniquely identifies devices, as no two devices will have the same payment
`token. Replacing a provided credit card number during provisioning, EMV
`token are assigned during enrollment of the credit card number on a
`particular device. Accordingly, EMV payment tokens are values uniquely
`identifying Samsung Pay preloaded smartphones provided during card
`enrollment, and therefore an identified embodiment of device ID codes.
`
`After receiving device ID codes / EMV payment tokens, Samsung Pay
`preloaded smartphones store tokens on a secure element. The EMV
`Payment Tokenisation Specification – Technical Framework v2.2 (2020)
`lists in Table 5.1, pages 41-42, three locations a smartphone may store a
`payment token – one them being a “secure element / ICC”. The initial
`Samsung Pay preloaded smartphones, the Galaxy S6 and S6 Edge, included
`the Infineon SLE 97 ICC. Infineon Supplies Embedded Secure Element
`Chip for new Samsung Galaxy S6 and S6 edge Smartphone, Infineon
`Technologies (2015), http://www.infineon.com/cms/en/about-
`infineon/press/market-news/2015/INFCCS201503-040.html (“We are
`proud that the SLE 97 has been selected by our customer Oberthur
`Technologies to secure Samsung’s new flagship smartphones Galaxy S6
`and S6 Edge.”). “Infineon’s SLE 97 is a SOLID FLASHTM-based eSE chip
`which can safeguard … transactions where user’s sensitive data such as
`payment credentials are concerned.” Id. Subsequent Samsung Pay preload
`smartphones continued to use ICC secure elements. See e.g. EMVCo Letter
`of Approval – EMV Contactless Level 1 Mobile Product, Approval No.
`MTA_LOA_SAEL_01032 (Identifying the “Execution Environment” as
`UICC and HCE). Secure elements are recognized as “a dynamic
`environment to store data securely, process data securely and perform
`communication with external entities securely,” that “will not allow
`unauthorized access.” EMV Payment Tokenization Primer and Lessons
`Learned, U.S. Payments Forum (2019), page 41. Securely storing EMV
`payment tokens on an element not allowing unauthorized access, Samsung
`Pay preloaded smartphones therefore persistently store a device ID code
`
`
`
`5
`
`Petitioner's Exhibit 1016, Page 7
`
`

`

`‘730 Patent Claim2
`
`Accused Instrumentality And Where Each Claim Element Is Found3
`uniquely identifying the smartphone in a tamper proof format, written to a
`storage element on the integrated device, that is unable to be subsequently
`altered.
`
`
`persistently storing … a secret decryption value in a tamper proof format written to
`a storage element on the integrated device that is unable to be subsequently altered
`
`Samsung Pay preloaded smartphones utilize the Android OS. Android’s
`implementation guidelines protect biometric data by requiring “fingerprint
`templates must be signed with a private, device-specific key.” Android
`Open Source Project: Fingerprint HIDL,
`https://source.android.com/secruity/authentication/fingerprint-hal. As
`detailed above, Samsung Pay preloaded smartphones must adhere to these
`guidelines.
`
`Samsung Pay preloaded smartphones contain a private key. Private key
`operations include singing and decrypting. Android Open-Source Project:
`Keymaster Functions,
`https://source.android.com/security/keystore/implementer-ref (“Private key
`operations (KeyPurpose::DECYPT and KeyPurpose::SIGN)”.). The private
`key utilized to sign a fingerprint template is a secret decryption value.
`
`Within the Android OS, “Keystore API and Keymaster components
`provide hardware-backed cryptography for secure key storage in a secure
`environment, such as the Trusted Execution Environment (TEE).” Android
`Open-Source Project: Fingerprint HIDL,
`https://source.android.com/secruity/authentication/fingerprint-hal. In
`addition to Android’s native security features, “with Samsung Pay …
`Samsung Knox and tokenization add extra layers of security.” Samsung
`Pay, https://www.samsung.com/us/samsung-pay/. Knox “builds upon the
`Android Keystore by providing a tamper-proof, detection-based lock-down
`of cryptographic keys.” Knox Platform for Enterprise, Version 1.3.1
`(2020), page 29. With Knox protection built on the Keystore, Samsung Pay
`preloaded smartphones persistently store a secret decryption value in a
`
`
`
`6
`
`Petitioner's Exhibit 1016, Page 8
`
`

`

`‘730 Patent Claim2
`
`Accused Instrumentality And Where Each Claim Element Is Found3
`tamper proof format written to a storage element on the integrated device
`that is unable to be subsequently altered.
`
` wherein the biometric data is selected from a group
`consisting of a palm print, a retinal scan, an iris scan, a
`hand geometry, a facial recognition, a signature
`recognition and a voice recognition;
`
`“Samsung Pay uses three levels of security to enable secure payments:
`fingerprint or iris-scanning authentication, tokenization and Samsung Knox,
`Samsung’s defense-grade mobile security platform.” Samsung Pay Reaches One
`Year Anniversary in the United States, Samsung Newsroom (2016),
`http://news.samsung.com/global/samsung-pay-reaches-one-year-anniversary-in-
`
` responsive to receiving a request for a biometric
`verification of the user, receiving scan data from a
`biometric scan;
`
`the-united-states.
`
`Samsung Pay preloaded smartphones request biometric verification before
`providing payment credentials when shopping online, through merchant apps, and
`in brick-and-mortar stores. The location of the purchase determines how the
`request is initiated.
`
`(1) When shopping online at a merchant’s website, Samsung Pay preloaded
`smartphones receive a push notification requesting biometric verification. On the
`website, a “user can select ‘Samsung pay’ option to pay, and then payment
`requesting push message will be arrived to user’s device and the payment can be
`confirmed by user authentication.” Samsung Pay Web checkout Integration guide,
`Document version 1.4 (2018), page 7. When the user clicks on the push
`notification received on their Samsung Pay preload smartphone, a “Payment Sheet
`is opened [and] User authentication is performed” giving the user the option to
`“pay with fingerprint”. Id., at 6. Receiving a push notification prompting the user
`to authenticate by paying with their fingerprint, Samsung Pay preloaded
`smartphones therefore receive a request for biometric verification.
`
`7
`
`Petitioner's Exhibit 1016, Page 9
`
`

`

`‘730 Patent Claim2
`
`Accused Instrumentality And Where Each Claim Element Is Found3
`(2) Samsung Pay preloaded smartphone also receive a request for biometric
`verification when shopping with merchant apps installed on the smartphone. The
`request, however, is passed internally. Samsung details how Samsung Pay is
`integrated with merchant apps in the Samsung Pay Developers Onboarding and
`Project Integration Guide: In-App Payments for Merchants, Doc Rev 3.1-US
`(2017). Within the Guide, a figure depicting the “general use case” is presented on
`page 18. As depicted in the Figure, the merchant app installed on the smartphone
`communicates with preloaded Samsung Pay app through an API (application
`programming interface).
`
`In order to be paid the merchant app calls the startIn-AppPay function of the API,
`which “initiates payment request with Samsung Pay.” Id, at 26. As shown in the
`in figure on page 18, when the merchant app calls startIn-AppPay, Samsung Pay
`responds by presenting the user “with a payment sheet, which includes card
`selection and shipping address confirmation.” Id., at 17. After being presented the
`payment sheet, “the user then authenticates the payment method, amount, and
`delivery address with a fingerprint.” Id., at 17. Presenting the user with a payment
`sheet to authenticate payment with a fingerprint, Samsung Pay preloaded
`smartphones therefore receive a request for biometric verification from merchant
`apps installed on the phone.
`
`(3) “Combining NFC with Samsung’s proprietary MST technologies, Samsung Pay
`provides consumers a way to pay almost anywhere you can swipe or tap a card at
`millions of merchant locations.” Samsung Pay Reaches One Year Anniversary in
`the United States, Samsung Newsroom (2016),
`http://news.samsung.com/global/samsung-pay-reaches-one-year-anniversary-in-
`the-united-states. Samsung Pay preloaded smartphones utilize the Android OS,
`as noted supra. “Android 4.4 introduce[d a] new platform support for secure NFC-
`based transactions through Host Card Emulation (HCE), for payments, loyalty
`programs, card access, transit passes, and other custom services.” Android KitKat,
`https://developer.android.com/about/versions/kitkat#44-hce. When a user taps a
`phone to a payment terminal, “Android uses Application Identifiers (AIDs) as
`defined in ISO/IEC 7816-4 as the basis for routing transactions to the correct
`Android applications”, such as the preloaded Samsung Pay. Id. When paying with
`Samsung Pay instore, “the app reads the transaction data and can use any local or
`
`
`
`8
`
`Petitioner's Exhibit 1016, Page 10
`
`

`

`‘730 Patent Claim2
`
` comparing the scan data to the biometric data to
`determine whether the scan data matches the biometric
`data;
`
`Accused Instrumentality And Where Each Claim Element Is Found3
`network-based services to verify and then complete the transaction.” Id. When
`opened in response to AID routing, Samsung Pay permits a user “to make a
`payment with [their] Favorite Cards, [by] swip[ing] up from the bottom of the
`screen. Then swip[ing] through and select[ing their] preferred card.” After
`selecting the card, the user “tap[s] PIN or IRIS … [or] simply place[s their] finger
`on [their] phone’s fingerprint scanner”. Make an in-store payment with Samsung
`Pay, http://www.samsung.com/us/support/answer/ANS0004512/. Requiring the
`user to place their finger on the Samsung Pay preloaded smartphone’s fingerprint
`reader, Samsung Pay preloaded smartphones therefore receive a request for
`biometric verification from the app itself.
`
`
`Whether through AID routing, functions call between apps, or push notifications,
`regardless of where a user is shopping Samsung Pay preloaded smartphones
`receive a request for biometric verification to authorize payment.
`
`As noted supra, Samsung Pay preloaded smartphone utilize the Android OS. On
`Android devices, “the fingerprint sensor of [the] device is generally”, but “in
`response to a call to authenticate … the fingerprint sensor listens for a touch”.
`Android Open Source Project: Fingerprint HIDL,
`https://source.android.com/security/authentication/fingerprint-hal. After the user
`places their fingerprint on the sensor, a “vendor-specific library determines if there
`is a fingerprint match in the current set of enrolled fingerprint templates.” Id.
`Determining whether there is a fingerprint match necessarily requires the vendor-
`specific library on the Samsung Pay preloaded smartphones to receive scan data
`from the biometric (fingerprint) scan.
`
`As noted supra, Samsung Pay preloaded smartphone utilize the Android OS. On
`Android devices, “the fingerprint sensor of [the] device is generally idle”, but “in
`response to a call to authenticate … the fingerprint sensor listens for a touch”.
`Android Open Source Project: Fingerprint HIDL,
`https://source.android.com/security/authentication/fingerprint-hal. After the user
`places their fingerprint on the sensor, a “vendor-specific library determines if there
`is a fingerprint match in the current set of enrolled fingerprint templates.” Id.
`Determining if there is a fingerprint match, requires the vendor-specific library on
`
`
`
`9
`
`Petitioner's Exhibit 1016, Page 11
`
`

`

`‘730 Patent Claim2
`
` responsive to a determination that the scan data matches
`the biometric data, wirelessly sending one or more codes
`from the plurality of codes and the other data values for
`authentication by an agent that is a third-party trusted
`authority possessing a list of device ID codes uniquely
`identifying legitimate integrated devices, wherein the one
`or more codes and other data values includes the device
`ID code; and
`
`Accused Instrumentality And Where Each Claim Element Is Found3
`the Samsung Pay preloaded smartphones compare scan data from the sensor to
`biometric data to determine whether the scan data matches the biometric data.
`
`responsive to a determination that the scan data matches the biometric data,
`wirelessly sending one or more codes from the plurality of codes and the other data
`values
`
`
`After authenticating payment, Samsung Pay preloaded smartphones
`wirelessly send one or modes codes, including device ID codes, regardless
`of where the user is shopping. To enhance security, “Samsung Pay uses
`three levels of security to enable secure payments: fingerprint or iris-
`scanning authentication, tokenization and Samsung Knox, Samsung’s
`defense-grade mobile security platform.” Samsung Pay Reaches One
`Year Anniversary in the United States, Samsung Newsroom (2016),
`http://news.samsung.com/global/samsung-pay-reaches-one-year-
`anniversary-in-the-united-states. “Samsung [was] among the first to
`implement EMV payment tokens in digital wallets that hold credentials for
`several payments use cases.” EMV Payment Tokenization Primer and
`Lessons Learned, U.S. Payments Forum (2019), page 12. Accordingly,
`Samsung Pay enabled smartphones contain payment tokens. EMV payment
`tokens, which, as detailed supra, are values uniquely identifying Samsung
`Pay preloaded smartphones provided during card enrollment, and thus are
`an identified embodiment of device ID codes.
`
`Using the EMV tokens to provide payment to merchants, Samsung Pay
`preloaded smartphones wirelessly transmit the token to merchants. When
`shopping online at a website, Samsung Pay preloaded smartphones receive
`a push notification requesting authorization by the user, as detailed supra.
`“After user authenticates payment data is encrypted with partner’s public
`key in user device, and will be sent it to Samsung server” and made
`available to the merchant’s website. Samsung Pay Web checkout
`Integration guide, Document version 1.4 (2018), page 7. Sending payment
`data to a server to be made available to the merchant’s website, Samsung
`Pay preloaded smartphone facilitate web payments by wirelessly
`transmitting data.
`
`
`
`10
`
`Petitioner's Exhibit 1016, Page 12
`
`

`

`‘730 Patent Claim2
`
`Accused Instrumentality And Where Each Claim Element Is Found3
`
`Similarly, when providing payment for in-app purchases, Samsung Pay
`preloaded smartphones wirelessly transmit EMV tokens to merchants as
`payment. Specifically, “Encrypted payment information is passed form the
`Samsung Pay to the PG [(Payment Gateway)] through the merchant app”.
`Samsung Pay Developers Onboarding and Project Integration Guide: In-
`App Payments for Merchants, Doc Rev 3.1-US (2017), page 17.
`
`In addition to providing payment information via virtual terminals,
`Samsung Pay preloaded smartphones utilize “combin[e] NFC with
`Samsung’s proprietary MST technologies [to provide] consumers a way to
`pay almost anywhere you can swipe or tap a card at millions of merchant
`locations.” Samsung Pay Reaches One Year Anniversary in the United
`States, Samsung Newsroom (2016),
`http://news.samsung.com/global/samsung-pay-reaches-one-year-
`anniversary-in-the-united-states. Tapping a credit card is an example of
`contactless payment. “In a contactless payment transaction, the
`consumer holds the contactless card, device, or mobile phone in close
`proximity (less than 2-4 inches) to the terminal and the payment account
`information is communicated wirelessly (via radio frequency [RF]) or
`NFC.” EMV Payment Tokenization Primer and Lessons Learned, U.S.
`Payments Forum (2019), page 39. Thus, by utilizing NFC, Samsung Pay
`preloaded smartphones wirelessly transmit payment information to in-store
`terminals.
`
`Transmitting payment information to servers, payment gateways, and NFC
`equipped in-store terminals, Samsung Pay preloaded smartphones therefore
`wirelessly transmit payment information regardless of where the user shops.
`
`
`wherein the one or more codes and other data values includes the device ID code
`
`Regardless of location, the merchant requires payment. But first, the
`merchant must seeks authorization for payment. The series of requests and
`responses permitting the merchant to get, as summarized in Figure 10.1 of
`the EMV Payment Tokenisation Specification: Technical Framework, v2.2
`
`
`
`11
`
`Petitioner's Exhibit 1016, Page 13
`
`

`

`‘730 Patent Claim2
`
`Accused Instrumentality And Where Each Claim Element Is Found3
`(2020), begins with the merchant submitting a Token Payment Request for
`transaction routing. The data included within the Token Payment Request,
`as detailed in Table 10.1 of EMV Payment Tokenisation Specification:
`Technical Framework, v2.2 (2020), is required to contain the payment
`token.
`
`During transaction routing within the payment network, the Token Payment
`Request is transformed to a Token Authorization Request, as detailed in
`Figure 10.1 of the EMV Payment Tokenisation Specification: Technical
`Framework, v2.2 (2020). As detailed in Table 10.3 of the EMV Payment
`Tokenisation Specification: Technical Framework, v2.2 (2020), a required
`field of the Token Authorization Request generated by the during routing
`the payment network is payment token. Accordingly, the payment token
`sent in the Token Payment Request from the merchant continues to persist
`during the token authorization request process. EMV payment tokens, as
`detailed supra, are values uniquely identifying Samsung Pay preloaded
`smartphones provided during card enrollment, and thus are an identified
`embodiment of device ID codes. Accordingly, an embodiment of device ID
`codes are included within the one or more codes and other data wireless
`sent.
`
`
`for authentication by an agent that is a third-party trusted authority possessing a list
`of device ID codes uniquely identifying legitimate integrated devices
`
`“The Token Authorisation request process continues until De-Tokenisation
`has been completed.” EMV Payment Tokenisation Specification: Technical
`Framework, v2.2 (2020), page 86. De-Tokenisation is performed by the
`token service provider. Visa, MasterCard, American Express and Discover
`each take on the role as token service providers. EMV Payment
`Tokenization Primer and Lessons Learned, U.S. Payments Forum (2019),
`page 23 (Figure 5 – identifying Visa, MasterCard, American Express and
`Discover as Token Service Providers). “Token Service Providers are
`responsible for a number of discrete functions which may include, but are
`not limited to: Maintenance and operation of a Token Vault … [and] De-
`
`
`
`12
`
`Petitioner's Exhibit 1016, Page 14
`
`

`

`‘730 Patent Claim2
`
`Accused Instrumentality And Where Each Claim Element Is Found3
`Tokenisation”. EMV Payment Tokenisation Specification: Technical
`Framework, v2.2 (2020), page 19.
`
`Maintaining the token vault and providing de-tokenisation, token service
`providers keep a list of device ID codes uniquely identifying legitimate
`integrated devices. The token vault maintained by Visa, MasterCard, and
`other token service providers is a “repository that maintains the established
`Payment Token / Token Expiry Date mapping to the underlying PAN /
`PAN Expiry Date and includes Payment Token related data”. Maintaining
`the mapping between payment tokens and underlying primary account
`numbers (PAN), the token vault represents a list of legitimate tokens. EMV
`payment tokens, as detailed supra, are values uniquely identifying Samsung
`Pay preloaded smartphones provided during card enrollment, and thus are
`an identified embodiment of device ID codes. As tokens are embodiments
`of device ID codes, the listing of legitimate payment tokens maintained by
`token service providers as part of the token vault is an identified
`embodiment of a list of device ID codes uniquely identifying legitimate
`integrated devices. Being responsible for maintaining such as listing as a
`token vault, token service providers are one embodiment of a third-party
`trusted authority possessing a list of device ID codes uniquely identifying
`legitimate integrated devices.
`
`Opening the token vault to perform de-tokenisation occurs in response to
`receiving the token authorization request containing the payment token.
`De-Tokenisation is “the process of converting a Payment Token and Token
`Expiry Date to its underlying PAN and PAN Expiry Date based on the
`Payment Token / Token Expiry Date mapping to the underlying PAN /
`PAN Expiry Date stored in the Token Vault.” Id, at 6. “The Payment
`Token SHALL be de-tokenised to the underlying PAN in the incoming
`Token Authorisation prior to sending the PAN Authorisation to the Card
`Issuer.” Id., at 91. Detokenizing in response to an incoming token
`authorization requests requires the token service provider be sent the token
`authorization. As noted supra, the token authorization sent to the token
`service provider contains the payment token wirelessly sent from a
`Samsung Pay preloaded smartphone after successful biometric
`
`
`
`13
`
`Petitioner's Exhibit 1016, Page 15
`
`

`

`‘730 Patent Claim2
`
` responsive to authentication of the one or more codes and
`the other data values by the agent, receiving an access
`message from the agent allowing the user access to an
`application, wherein the application is selected from a
`group consisting of a casino machine, a keyless lock, a
`garage door opener, an ATM machine, a hard drive,
`computer software, a web site and a file.
`
`
`
`Accused Instrumentality And Where Each Claim Element Is Found3
`authentication. Authenticating a user via biometrics, as noted above, entails
`a

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket