7:26-cv-00075
Mobility IP Holdings Inc v. Apple Inc
I. Executive Summary and Procedural Information
- Parties & Counsel:
- Plaintiff: Mobility IP Holdings, Inc. (Texas)
- Defendant: Apple Inc. (California)
- Plaintiff's Counsel: Ahmad, Zavitsanos & Mensing, PLLC
- Case Identification: 7:26-cv-00075, W.D. Tex., 03/04/2026
- Venue Allegations: Plaintiff alleges venue is proper in the Western District of Texas because Apple is subject to personal jurisdiction, has committed acts of infringement in the District, and maintains regular and established places of business in the District, including multiple campuses and locations in Austin, San Antonio, and El Paso.
- Core Dispute: Plaintiff alleges that Defendant's mobile devices and associated payment services, such as Apple Pay, infringe seven U.S. patents related to secure mobile payment transactions using near-field communication and biometric authentication.
- Technical Context: The lawsuit concerns the technology enabling contactless payments on mobile devices, a market segment that has seen significant growth and represents a substantial volume of consumer transactions.
- Key Procedural History: The complaint notes that the asserted patents originated with or were acquired by Neology, Inc. in the early 2000s and were subsequently assigned to Plaintiff Mobility IP Holdings, Inc.
Case Timeline
| Date | Event |
|---|---|
| 2002-07-09 | Earliest Priority Date for '772, '807, '513, '412, '187 Patents |
| 2007-01-25 | Earliest Priority Date for '345, '924 Patents |
| 2012-04-03 | U.S. Patent No. 8,151,345 Issues |
| 2013-10-01 | U.S. Patent No. 8,548,924 Issues |
| 2014-07-01 | U.S. Patent No. 8,766,772 Issues |
| 2014-09-09 | Apple launches Apple Pay mobile payment service |
| 2015-01-13 | U.S. Patent No. 8,933,807 Issues |
| 2015-10-01 | Card issuer deadline for merchants to upgrade payment terminals |
| 2019-03-19 | U.S. Patent No. 10,235,513 Issues |
| 2020-07-07 | U.S. Patent No. 10,706,412 Issues |
| 2020-09-01 | U.S. Patent No. 10,762,187 Issues |
| 2026-03-04 | Complaint Filing Date |
II. Technology and Patent(s)-in-Suit Analysis
U.S. Patent No. 8,151,345 - "Self-Authorizing Devices"
- Issued: April 3, 2012
The Invention Explained
- Problem Addressed: The patent background describes the need for secure methods to authorize transactions over the internet, noting that traditional smartcard systems require a separate "reader" to interact with the secure chip, which is not a standard component of most personal computers U.S. Patent No. 8,151,345, col. 1:25-45 This creates a barrier for using the high-security features of smartcards in e-commerce.
- The Patented Solution: The invention proposes a self-authorizing device, such as a cellular network adapter, that integrates a secure element (for storing financial data), a secure element reader, and a communications controller U.S. Patent No. 8,151,345, col. 2:25-41 This integrated "adapter" can interrogate its own secure element and then transmit the necessary transaction authorization information over a wireless network, bypassing the need for a separate physical reader connected to a computer U.S. Patent No. 8,151,345, abstract
- Technical Importance: This approach aimed to bridge the security of smartcard technology with the ubiquity of mobile devices and internet commerce, by embedding the reader function directly into the user's device.
Key Claims at a Glance
- The complaint asserts independent claim 23 Compl. ¶24
- The essential elements of claim 23 include:
- A cellular network adapter for a cellular network device.
- A secure element comprising a data file.
- A secure element reader configured to interrogate the secure element according to ISO 7816-4.
- A near field communications (NFC) controller bridge chip to convert file information to an RF signal.
- A communications controller to convert file information into transaction authorization information and transmit it over a wireless network.
- The secure element reader is configured to await a startup instruction with an unpredictable number from the wireless network before interrogating the secure element.
- The complaint reserves the right to assert additional claims Compl. ¶24, fn. 6
U.S. Patent No. 8,548,924 - "Self-Authorizing Token"
- Issued: October 1, 2013
The Invention Explained
- Problem Addressed: The patent addresses the same general problem as the '345 Patent: adapting secure chip technology for use with internet-based transactions where dedicated readers are not common U.S. Patent No. 8,548,924, col. 1:25-45
- The Patented Solution: This invention describes a "token" as a physical device that integrates all necessary components onto a single "mounting structure" U.S. Patent No. 8,548,924, col. 2:48-51 The token includes a secure element, a secure element interrogator (reader), and a communications controller, all affixed to this structure U.S. Patent No. 8,548,924, abstract The token is configured to read its own secure data and generate a "communications data package" for transmission to a host device, such as a point-of-sale terminal.
- Technical Importance: This patent focuses on the physical integration of the secure element and its reader into a single, self-contained "token," making the security architecture portable and self-sufficient.
Key Claims at a Glance
- The complaint asserts independent claim 60 Compl. ¶36
- The essential elements of claim 60 include:
- A token for transmitting a communications data package to a host device.
- A mounting structure.
- A secure element affixed to the mounting structure, including a data file with transaction information.
- A secure element interrogator affixed to the mounting structure, configured to acquire the transaction information and generate the communications data package.
- A communications controller affixed to the mounting structure, configured to receive the data package from the interrogator and transmit it to the host device.
- The complaint reserves the right to assert additional claims Compl. ¶36, fn. 13
U.S. Patent No. 8,766,772 - "System and Method for Providing Secure Transactional Solutions"
- Issued: July 1, 2014
- Technology Synopsis: The patent describes a mobile device that uses a biometric input (like a fingerprint) to authenticate a user before providing transaction information. The processor compares the received biometric data with stored data and, if it matches, provides the transaction information in response to a request received via a radio frequency antenna.
- Asserted Claims: Independent claim 9 is asserted Compl. ¶48
- Accused Features: The complaint alleges that Apple devices using Touch ID or Face ID for authentication in Apple Pay transactions infringe this patent Compl. ¶¶49-50 Compl. ¶¶58-61
U.S. Patent No. 8,933,807 - "System and Method for Providing Secure Transactional Solutions"
- Issued: January 13, 2015
- Technology Synopsis: This patent discloses a mobile device with both cellular and short-range RF circuitry. It stores biometric and transaction information, where the biometric data is "previously associated" with the transaction data. An authentication module uses a biometric reader to confirm the user's identity before a transaction module provides the transaction information via the short-range RF circuit.
- Asserted Claims: Independent claim 1 is asserted Compl. ¶66
- Accused Features: The complaint alleges that Apple devices, which contain cellular, Wi-Fi, and NFC radios and use biometric authentication (Touch ID/Face ID) for payment, infringe this patent Compl. ¶¶68-69 Compl. ¶¶73-78
U.S. Patent No. 10,235,513 - "System and Method for Providing Secure Identification Solutions"
- Issued: March 19, 2019
- Technology Synopsis: The invention covers a mobile device that receives a transaction request from a point-of-sale terminal via a short-range RF circuit. The device's processor then uses a biometric input to compare received biometric data with stored data. If they match, the processor transmits the transaction information back to the terminal.
- Asserted Claims: Independent claim 1 is asserted Compl. ¶85
- Accused Features: The complaint accuses Apple's mobile devices that use NFC to interact with POS terminals and use biometrics to authorize the transaction of infringing this patent Compl. ¶¶87-88 Compl. ¶¶93-98
U.S. Patent No. 10,706,412 - "System and Methods for Providing Secure Transactional Solutions"
- Issued: July 7, 2020
- Technology Synopsis: This patent describes a mobile device with short-range RF circuitry that establishes a connection with a POS device. The device prompts the user for biometric information, authenticates it against stored data, and in response, generates a key. It then secures payment information and transmits both the key and the secured information to the POS device.
- Asserted Claims: Independent claim 1 is asserted Compl. ¶104
- Accused Features: The complaint alleges that Apple devices performing EMV transactions, which involve generating a dynamic cryptogram (a "key") after biometric authentication, infringe this patent Compl. ¶¶106-107 Compl. ¶¶115-118
U.S. Patent No. 10,762,187 - "System and Method for Providing Secure Transactional Solutions"
- Issued: September 1, 2020
- Technology Synopsis: The invention pertains to a mobile device with distinct "modules" for handling a secure transaction. A biometric module reads biometric information, an authentication module determines if it corresponds to stored information, and a secure module then generates a key, encrypts the key and payment information, and provides the encrypted package for use in a transaction.
- Asserted Claims: Independent claim 1 is asserted Compl. ¶123
- Accused Features: The complaint alleges that Apple devices, through their use of processors and secure systems to authenticate biometrics, generate a cryptogram ("key"), and provide it for an EMV transaction, infringe this patent Compl. ¶¶130-131 Compl. ¶¶134-136 Compl. ¶140
III. The Accused Instrumentality
Product Identification
The accused products are a wide range of Apple mobile devices, including iPhones (from iPhone XR onwards), Apple Watch (Series 5 and later), and various iPad models (collectively, the "Accused Instrumentalities") Compl. ¶15 The complaint identifies the Apple Pay mobile payment service as the primary infringing functionality Compl. ¶19
Functionality and Market Context
The complaint describes the Accused Instrumentalities as having features including a processor, memory, a secure element, biometric security (Touch ID or Face ID), a display, and an NFC radio Compl. ¶18 The core accused functionality involves a user authenticating a payment on their device using biometrics and then holding the device near an NFC-enabled POS terminal to transmit payment data Compl. ¶9 Compl. ¶19 The complaint alleges this process utilizes a "Device Account Number" stored in the Secure Element, which is used to create a transaction-specific dynamic cryptogram compliant with EMV standards Compl. ¶¶26-29 The complaint also highlights the substantial growth of contactless payments, noting over 10 million contactless terminals in the U.S. by 2024 Compl. ¶17 The complaint provides an iPhone 14 Pro teardown image, identifying the Secure Element, NFC Controller, and A16 processor on the motherboard Compl. p. 8, Fig. 12
IV. Analysis of Infringement Allegations
U.S. Patent No. 8,151,345 Infringement Allegations
| Claim Element (from Independent Claim 23) | Alleged Infringing Functionality | Complaint Citation | Patent Citation |
|---|---|---|---|
| A cellular network adapter for a cellular network device configured with a cellular network application interface comprising; | The Accused Instrumentalities are alleged to be or contain cellular network adapters (e.g., the cellular modem and associated components). | ¶25 | col. 2:25-41 |
| a secure element comprising a data file; | The Accused Instrumentalities include a secure element that stores a "Device Account Number," which represents the user's credit card PAN and constitutes a data file. | ¶27 | col. 2:5-10 |
| a secure element reader...configured to interrogate the secure element by executing file system functions according to ISO 7816-4... | Processors in the Accused Instrumentalities allegedly access the secure element to retrieve the Device Account Number, emulating ISO 7816-4 card functionality. | ¶28; ¶29 | col. 2:30-34 |
| a near field communications controller bridge chip to convert the file information to an RF data signal for an external reader; | The Accused Instrumentalities include an NFC controller (e.g., NXP SN210V) that transmits payment data via NFC to a POS terminal. | ¶25; ¶29 | col. 2:25-41 |
| a communications controller configured to receive the file information from the secure element reader and to convert...into transaction authorization information and to transmit...over a wireless network... | The processors (e.g., A16) allegedly create a dynamic cryptogram from information retrieved from the secure element and transmit it via NFC. | ¶28; ¶30 | col. 2:34-41 |
| ...the secure element reader...is configured to await a startup instruction comprising an unpredictable number originating over the cellular wireless network prior to interrogating the secure element. | The complaint alleges this functionality is met by the Accused Instrumentalities. | ¶30 | col. 2:34-41 |
U.S. Patent No. 8,548,924 Infringement Allegations
| Claim Element (from Independent Claim 60) | Alleged Infringing Functionality | Complaint Citation | Patent Citation |
|---|---|---|---|
| A token for transmitting a communications data package to a host device... | The Accused Instrumentality (e.g., an iPhone) is alleged to be the claimed "token." | ¶37 | col. 2:48-51 |
| a mounting structure; | The motherboard of the Accused Instrumentality is alleged to be the mounting structure. | ¶38 | col. 2:48-51 |
| a secure element affixed to the mounting structure, the secure element including a data file containing transaction information; | A secure element chip (e.g., ST OCTA1) is affixed to the motherboard and contains the Device Account Number, which is transaction information. | ¶38; ¶40 | col. 2:52-54 |
| a secure element interrogator affixed to the mounting structure and configured to interrogate the secure element to acquire the transaction information...and to generate the communications data package... | The device's processor is alleged to act as the interrogator, accessing the secure element and creating a unique cryptogram (the data package). | ¶38; ¶41 | col. 2:55-61 |
| a communications controller affixed to the mounting structure and configured to receive the communications data package...and to transmit the...package to the host device. | The processor and NFC controller are alleged to transmit the cryptogram and other data to the POS terminal (the "host device"). | ¶38; ¶42 | col. 2:62-66 |
Identified Points of Contention
- Scope Questions: A primary point of dispute may be definitional. The claims of the '345 and '924 patents recite components such as a "cellular network adapter" and a "token," respectively. The defense may argue that these terms, in the context of the patents, refer to distinct, modular components, whereas the accused Apple products are highly integrated devices where these functions are performed by multi-purpose processors and systems-on-a-chip. This raises the question of whether an entire iPhone can be construed as a "cellular network adapter" or a "token."
- Technical Questions: For the '345 Patent, the complaint alleges the device awaits a "startup instruction comprising an unpredictable number originating over the cellular wireless network" before interrogation Compl. ¶30 The complaint does not specify the source or nature of this alleged instruction. This suggests a potential evidentiary question regarding whether the accused transaction flow actually includes this specific, claimed step. For the '924 Patent, the claim requires the "communications controller" to receive the data package from the "secure element interrogator." In Apple's architecture, where the main processor allegedly performs both roles, it raises the question of whether the processor is "receiving" a package from itself in the manner contemplated by the claim.
V. Key Claim Terms for Construction
The Term: "cellular network adapter" (from claim 23 of the '345 Patent)
- Context and Importance: This term appears in the preamble and is foundational to the claim's scope. The infringement theory hinges on whether an integrated smartphone like an iPhone constitutes a "cellular network adapter." Practitioners may focus on this term because Apple will likely argue its products are complete "cellular network devices," not mere "adapters" for such devices, potentially placing them outside the literal scope of the claim.
- Intrinsic Evidence for Interpretation:
- Evidence for a Broader Interpretation: The patent specification states that the adapter includes a secure element, a reader, and a communications controller, and is for use with a "cellular network device" U.S. Patent No. 8,151,345, abstract A plaintiff may argue that this describes a functional relationship, and any collection of components within a cellular device that performs these functions qualifies as the "adapter."
- Evidence for a Narrower Interpretation: The claim preamble recites "[a] cellular network adapter for a cellular network device," which suggests two distinct entities: the adapter and the device it is "for." The specification does not appear to explicitly define an "adapter" as being the entirety of a mobile phone, which may support a narrower construction limited to a component or accessory.
The Term: "token" (from claim 60 of the '924 Patent)
- Context and Importance: As the subject of the claim, the definition of "token" is critical. The complaint alleges the entire iPhone is the "token" Compl. ¶37 The defense may argue that a "token" in the art refers to a specific object for authentication (like a security key fob or the digital "Device Account Number" itself), not the general-purpose computing device that houses it.
- Intrinsic Evidence for Interpretation:
- Evidence for a Broader Interpretation: The claim describes the token as comprising a "mounting structure" with various components (secure element, interrogator, controller) "affixed" to it. A plaintiff could argue this broadly describes the physical assembly of a modern smartphone's motherboard and components Compl. ¶38
- Evidence for a Narrower Interpretation: The patent states that "the term 'token' is used to encompass all of these form factors [cards, fobs, cartridges, dongles]" U.S. Patent No. 8,548,924, col. 3:40-42 This list of discrete, specialized items could be used to argue for a narrower definition that excludes a general-purpose device like a smartphone. The complaint's visual of the EMV transaction flow also separately labels the phone and the digital "Payment Token" Compl. p. 9, Fig. 6
VI. Other Allegations
- Indirect Infringement: The complaint's seven counts are for direct infringement and do not contain explicit allegations or counts for inducement or contributory infringement Compl. ¶¶21-141
- Willful Infringement: The complaint alleges that Apple's infringement of the '345 and '924 patents is willful "as of the date of the service of Mobility IP's Original Complaint" Compl. ¶32 Compl. ¶44 This is a post-suit willfulness allegation based on the notice provided by the filing of the lawsuit itself, rather than on pre-suit knowledge. The prayer for relief seeks enhanced damages specifically for these two patents Compl. ¶146
VII. Analyst's Conclusion: Key Questions for the Case
- A core issue will be one of definitional scope: can terms like "cellular network adapter" and "token," which the patent specifications associate with modular or discrete items, be construed to cover the highly integrated architecture of the accused iPhones and other Apple devices, where processing, interrogation, and communication functions are consolidated?
- A key evidentiary question will be one of technical specificity: what evidence will be presented to demonstrate that Apple's transaction process performs the highly specific steps required by certain claims, such as the '345 Patent's requirement of "await[ing] a startup instruction comprising an unpredictable number originating over the cellular wireless network" before interrogating the secure element?
- A third central question will be one of component mapping: in an integrated System-on-a-Chip (SoC) architecture, how will the distinct claim elements of "secure element interrogator" and "communications controller" be mapped to the accused hardware, particularly when the complaint alleges the same processor performs functions of both? This may raise questions of whether the claimed structural arrangement is met.