DCT

6:21-cv-01194

Ward Participations BV v. Citigroup Inc

I. Executive Summary and Procedural Information

  • Parties & Counsel:
  • Case Identification: 6:21-cv-01194, W.D. Tex., 11/17/2021
  • Venue Allegations: Venue is alleged to be proper based on Defendant maintaining regular and established places of business within the Western District of Texas, including a specific facility in San Antonio.
  • Core Dispute: Plaintiff alleges that Defendant’s system for using Citi Cards with the Samsung Pay digital wallet infringes patents related to methods for securely performing electronic transactions and verifying access to digital data.
  • Technical Context: The technology concerns software-based methods for creating secure, traceable digital signatures for electronic transactions by using protected, user-inaccessible memory areas on an electronic device.
  • Key Procedural History: The patents-in-suit are continuations of an earlier application family. The complaint does not reference any prior litigation, inter partes review proceedings, or licensing history concerning the patents.

Case Timeline

Date Event
2003-06-13 Priority Date for '480 & '766 Patents
2021-04-27 U.S. Patent No. 10,992,480 Issued
2021-07-13 U.S. Patent No. 11,063,766 Issued
2021-11-17 Complaint Filed

II. Technology and Patent(s)-in-Suit Analysis

U.S. Patent No. 10,992,480 - "Method and System for Performing a Transaction and for Performing a Verification of Legitimate Access to, or Use of Digital Data"

  • Patent Identification: U.S. Patent No. 10,992,480, "Method and System for Performing a Transaction and for Performing a Verification of Legitimate Access to, or Use of Digital Data," issued April 27, 2021. (Compl. ¶12).

The Invention Explained

  • Problem Addressed: The patent describes the vulnerability of conventional electronic transactions that rely on personal identifiers like PINs, which can be intercepted on public networks, and the inability to trace illegally copied digital content. (’480 Patent, col. 1:19-39). It also notes that prior secure systems often required additional, dedicated hardware like tokens, which is a disadvantage. (’480 Patent, col. 2:48-56).
  • The Patented Solution: The invention proposes a method for securing transactions without new hardware by leveraging a protected area of a device's existing systems. It describes providing "authentication data" (a private key) and "authentication software" into a secure memory location, such as within the Basic In Out System (BIOS), that is inaccessible to the user and the main operating system. (’480 Patent, Abstract; col. 2:57-65). This software can then be activated to generate a unique digital signature for a transaction, which is provided to another party to authenticate the user and the device. (’480 Patent, col. 3:1-2).
  • Technical Importance: The described approach sought to provide strong, hardware-level security for transactions and digital rights management by using only the existing components of an electronic device, potentially increasing scalability over solutions requiring dedicated hardware. (’480 Patent, col. 2:5-18).

Key Claims at a Glance

  • The complaint asserts at least independent claim 1. (Compl. ¶17).
  • The essential elements of independent claim 1 include:
    • A method for performing an electronic transaction using a device operated by a first party.
    • Providing a "private key" in a "secure part of a Basic In Out System or any other secure location" on the device, where the key is inaccessible to the user.
    • The private key is encrypted and can be decrypted by a "decryption key" that is also inaccessible to the user.
    • The private key is decrypted within a "secure processing environment."
    • Providing "authentication software" in a secure memory, inaccessible to the operating system, which has access to the private key.
    • Activating this software to generate a "digital signature" from the private key.
    • Providing the digital signature to a second transaction party.
  • The complaint reserves the right to assert additional claims. (Compl. ¶26).

U.S. Patent No. 11,063,766 - "Method and System for Performing a Transaction and for Performing a Verification of Legitimate Access to, or Use of Digital Data"

  • Patent Identification: U.S. Patent No. 11,063,766, "Method and System for Performing a Transaction and for Performing a Verification of Legitimate Access to, or Use of Digital Data," issued July 13, 2021. (Compl. ¶12).

The Invention Explained

  • Problem Addressed: As a continuation, the ’766 Patent addresses the same problems of transaction security and digital data protection as the ’480 Patent. (’766 Patent, col. 1:12-34).
  • The Patented Solution: The '766 patent claims a method where the device's memory is functionally partitioned into a standard portion accessible by the main operating system and a "secure area" that is inaccessible. (’766 Patent, col. 18:20-29, Claim 1). The system is configured to selectively report memory locations, effectively hiding the secure area from the OS. A private key and authentication software reside in this secure area and run in a "separate operating environment" to generate a digital signature for transactions. (’766 Patent, col. 18:18-42, Claim 1).
  • Technical Importance: This method describes creating a protected execution enclave within a device's standard hardware, a foundational concept for modern trusted computing environments used to secure sensitive operations like payments. (’766 Patent, col. 2:51-60).

Key Claims at a Glance

  • The complaint asserts at least independent claim 1. (Compl. ¶28).
  • The essential elements of independent claim 1 include:
    • A method for performing an electronic transaction on a device with an operating system and "authentication software running in a separate operating environment, independent from and inaccessible to the operating system."
    • The device has a memory with a "secure area" that is inaccessible to the operating system.
    • The device uses a system to "selectively report the storage locations" of memory, thereby hiding the secure area from the OS.
    • Providing a "private key" and the "authentication software" in the secure area.
    • Activating the authentication software to generate a "digital signature" from the private key.
    • Providing the digital signature to the second transaction party.
  • The complaint reserves the right to assert additional claims. (Compl. ¶37).

III. The Accused Instrumentality

Product Identification

  • The accused instrumentalities are "Citi Cards compatible with Samsung Pay." (Compl. ¶15). This refers to the system and service that allows users to provision and use their Citibank-issued payment cards within the Samsung Pay digital wallet application.

Functionality and Market Context

  • The complaint alleges that Defendant "develops, designs, manufactures, distributes, markets, offers to sell and/or sells infringing products and services." (Compl. ¶3). It provides a URL to a marketing page for the service but offers no specific technical description of how the provisioning or transaction process operates. (Compl. ¶15). The allegations imply that the process of using a Citi card in Samsung Pay for a transaction involves the performance of the patented methods. The complaint alleges the accused products are available to individuals and businesses across the United States. (Compl. ¶23, ¶34).

IV. Analysis of Infringement Allegations

The complaint references claim chart exhibits that were not provided with the filed document (Compl. ¶26, ¶37), so this analysis is based on the complaint's narrative infringement theory. The complaint alleges that Defendant's "Accused Products" directly infringe, literally or under the doctrine of equivalents, at least claim 1 of the ’480 and ’766 patents. (Compl. ¶17, ¶28). The theory suggests that when a user conducts a transaction with a Citi card via Samsung Pay, the user's device, in conjunction with Defendant's systems, performs the claimed secure methods. This would involve using a secure hardware/software environment on the device (the "secure area" or "secure processing environment") to store payment credentials (the "private key") and generate a transaction-specific cryptogram (the "digital signature"), which is then sent to the payment network (the "second transaction party").

No probative visual evidence provided in complaint.

  • Identified Points of Contention:
    • Scope Questions: A primary issue will concern whether claim terms from a 2003-priority patent family, which use terminology like "Basic In Out System" (’480 Patent) and "separate operating environment" (’766 Patent), can be construed to read on the specific security architectures of modern mobile devices, such as Trusted Execution Environments (TEEs) or hardware Secure Elements, which are foundational to systems like Samsung Pay.
    • Technical Questions: The complaint does not specify how the accused system operates. A key evidentiary question will be whether Plaintiff can demonstrate that the accused process for generating payment tokens and transaction data functionally aligns with the specific steps recited in the claims, such as the decryption of a private key using an inaccessible decryption key as required by claim 1 of the ’480 Patent.

V. Key Claim Terms for Construction

  • The Term: "secure part of a Basic In Out System or any other secure location" ('480 Patent, Claim 1)

    • Context and Importance: This term defines the required location for the "private key." The viability of the infringement claim against a modern mobile device will depend on whether this term can encompass architectures like a Secure Element or a Trusted Execution Environment (TEE), which did not exist in their current form when the patent was filed.
    • Evidence for a Broader Interpretation: The specification's inclusion of the phrase "or any other secure location" suggests the inventors did not intend to limit the invention strictly to the BIOS. The patent also describes a "secure area 62" that is "only accessible to the BIOS" and not the operating system, which is conceptually analogous to a modern TEE. (’480 Patent, col. 8:61-67).
    • Evidence for a Narrower Interpretation: The repeated references to "BIOS" throughout the specification and figures could be used to argue that the invention is grounded in a PC-style architecture and its scope should be interpreted in that context, potentially excluding dissimilar mobile security architectures. (’480 Patent, Fig. 3; col. 4:50-58).
  • The Term: "authentication software running in a separate operating environment, independent from and inaccessible to the operating system" ('766 Patent, Claim 1)

    • Context and Importance: This term is central to the ’766 patent's infringement theory. Its construction will determine whether the software architecture of the accused Samsung Pay service, which runs applications in both the standard "rich" OS and a secure TEE, meets the claim's requirements for separation and inaccessibility.
    • Evidence for a Broader Interpretation: This language appears to align with the high-level description of a TEE, which runs trusted applications in an isolated environment to protect them from the main OS. The patent states the OS "does not know that the applications and data in the storage locations are present," supporting a strong separation. (’766 Patent, col. 13:64-col. 14:1).
    • Evidence for a Narrower Interpretation: Practitioners may focus on the required degree of "independence" and "inaccessibility." A defendant might argue that the necessary, controlled communication channels between the secure environment and the normal OS in a real-world implementation (e.g., to display prompts or receive transaction data) mean the environment is not fully "independent" or "inaccessible" as claimed.

VI. Other Allegations

  • Indirect Infringement: The complaint alleges induced infringement, stating Defendant provides "product manuals, brochures, videos, demonstrations, and website materials" that instruct and encourage customers to use the accused products in an infringing manner. (Compl. ¶19, ¶30). It also pleads contributory infringement, alleging Defendant supplies a material part of the infringing system with knowledge of the patents. (Compl. ¶18, ¶29).
  • Willful Infringement: Willfulness is alleged based on Defendant’s purported knowledge of its infringement. (Compl. ¶20, ¶31). The complaint includes a "willful blindness" allegation, stating Defendant "knows and/or will know that there is a high probability" of infringement "but took deliberate actions to avoid learning of these facts." (Compl. ¶19, ¶30). No specific facts supporting pre-suit knowledge, such as a notice letter, are pleaded.

VII. Analyst’s Conclusion: Key Questions for the Case

  • A core issue will be one of definitional scope: can claim terms rooted in the context of 2003-era PC security, such as "secure part of a Basic In Out System," be construed to cover the distinct Trusted Execution Environments and Secure Elements that form the security backbone of modern mobile payment systems?
  • A key challenge for the plaintiff will be one of evidentiary proof: given the complaint’s lack of technical specifics, the case will likely depend on what evidence can be developed in discovery to show that the complex, multi-component "Citi Cards compatible with Samsung Pay" system actually performs every step of the asserted method claims, particularly those related to the management and use of cryptographic keys in a secure environment.
  • The case may also raise questions of divided infringement: since the end-user's actions on their device are required to perform the claimed methods, the court may need to analyze whether Plaintiff can prove Defendant "directs or controls" its customers' actions sufficiently to be liable for direct infringement, or if the case will instead turn on proving the specific intent required for induced infringement.