throbber
Case 6:21-cv-01101-ADA Document 42-1 Filed 07/07/22 Page 1 of 57
`Case 6:21-cv-01101-ADA Document 42-1 Filed 07/07/22 Page 1 of 57
`
`EXHIBIT 23
`EXHIBIT 23
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`

`

`Case 6:21-cv-01101-ADA Document 42-1 Filed 07/07/22 Page 2 of 57
`Case 6:21-cv-01101-ADA Document 42-1 Filed 07/07/22 Page 2 of 57
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`EXHIBIT B
`EXHIBIT B
`
`

`

`Case 6:21-cv-01101-ADA Document 42-1 Filed 07/07/22 Page 3 of 57
`
`U.S. Patent No. 8,205,249 (“’249 Patent”)
`
`Accused Products
`Apple products, including without limitation the Apple iPhone 6, 6 Plus, 6S, 6S Plus, SE (first and second generation), 7, 7 Plus,
`8, 8 Plus, X, XR, XS, XS Max, 11, 11 Pro, 11 Pro Max, 12, 12 mini, 12 Pro, 12 Pro Max, 13, 13 mini, 13 Pro, and 13 Pro Max (“Accused
`Products”), infringe at least Claims 1-12 of the ’249 Patent.
`
`Exemplary Evidence of Infringement
`To the extent the preamble is limiting, each Accused Product performs a method for effecting a
`secure electronic transaction on a terminal using a portable data carrier arranged to perform different
`quality user authentication methods, wherein the portable data carrier performs a user authentication
`using one of said different user authentication methods, the portable data carrier confirms the proof
`of authentication to the terminal, and the portable data carrier then performs a security-establishing
`operation within the electronic transaction.
`For example, the exemplary Apple iPhone 13 supports mobile payment applications, such as Apple
`Pay, which utilize different quality user authentication methods. For example, Apple Pay requires
`the user to authenticate using Face ID, Touch ID, or a passcode. In contrast, Express Mode does
`not require the user to authenticate using Face ID, Touch ID, or a passcode.
`See, e.g.:
`
`Claim 1
`
`Claim 1
`[1pre] A method for effecting
`a secure electronic transaction
`on a terminal using a portable
`data carrier arranged to
`perform different quality user
`authentication methods,
`wherein the portable data
`carrier performs a user
`authentication using one of
`said different user
`authentication methods, the
`portable data carrier confirms
`the proof of authentication to
`the terminal, and the portable
`data carrier then performs a
`security-establishing operation
`within the electronic
`transaction, comprising the
`steps of
`
`
`
`1
`
`

`

`Case 6:21-cv-01101-ADA Document 42-1 Filed 07/07/22 Page 4 of 57
`
`Claim 1
`
`Exemplary Evidence of Infringement
`
`See https://support.apple.com/en-us/HT204506.
`
`
`
`
`
`2
`
`

`

`Case 6:21-cv-01101-ADA Document 42-1 Filed 07/07/22 Page 5 of 57
`
`Claim 1
`
`Exemplary Evidence of Infringement
`
`See https://support.apple.com/en-us/HT203027.
`
`
`
`
`
`3
`
`

`

`Case 6:21-cv-01101-ADA Document 42-1 Filed 07/07/22 Page 6 of 57
`
`Claim 1
`
`Exemplary Evidence of Infringement
`
`See https://support.apple.com/en-us/HT212171.
`
`For example, the exemplary Apple iPhone 13 supports mobile payment applications, such as Apple
`Pay, which confirm the proof of authentication to a terminal.
`See, e.g.:
`
`
`
`
`
`
`4
`
`

`

`Case 6:21-cv-01101-ADA Document 42-1 Filed 07/07/22 Page 7 of 57
`
`Claim 1
`
`Exemplary Evidence of Infringement
`
`See https://support.apple.com/guide/security/secure-element-and-nfc-controller-
`seccb53a35f0/web.
`
`
`
`
`
`5
`
`

`

`Case 6:21-cv-01101-ADA Document 42-1 Filed 07/07/22 Page 8 of 57
`
`Claim 1
`
`Exemplary Evidence of Infringement
`
`See https://support.apple.com/en-us/HT201239.
`
`
`
`
`
`6
`
`

`

`Case 6:21-cv-01101-ADA Document 42-1 Filed 07/07/22 Page 9 of 57
`
`Claim 1
`
`Exemplary Evidence of Infringement
`
`See https://support.apple.com/en-us/HT209495.
`
`For example, the exemplary Apple iPhone 13 supports mobile payment applications, such as Apple
`Pay, which then perform a security-establishing operation within a secure electronic transaction.
`See, e.g.:
`
`
`
`
`
`7
`
`

`

`Case 6:21-cv-01101-ADA Document 42-1 Filed 07/07/22 Page 10 of 57
`
`Claim 1
`
`Exemplary Evidence of Infringement
`
`See https://support.apple.com/en-us/HT201239.
`
`
`
`
`
`8
`
`

`

`Case 6:21-cv-01101-ADA Document 42-1 Filed 07/07/22 Page 11 of 57
`
`Claim 1
`
`Exemplary Evidence of Infringement
`
`See https://support.apple.com/en-us/HT209495.
`
`[1a] creating authentication
`quality information by the
`portable data carrier about said
`user authentication method
`used and attaching said
`authentication quality
`information to the result of the
`security-establishing
`operation,
`
`Each Accused Product creates authentication quality information by the portable data carrier about
`said user authentication method used and attaching said authentication quality information to the
`result of the security-establishing operation.
`For example, the exemplary Apple iPhone 13 supports mobile payment applications, such as Apple
`Pay, which create authentication quality information about the user authentication method used and
`attach that information to the result of the security establishing operation in an electronic transaction.
`See, e.g.:
`
`
`
`
`
`9
`
`

`

`Case 6:21-cv-01101-ADA Document 42-1 Filed 07/07/22 Page 12 of 57
`
`Claim 1
`
`Exemplary Evidence of Infringement
`
`
`
`
`
`See https://support.apple.com/guide/security/payment-authorization-with-apple-pay-
`secc1f57e189/1/web/1.
`
`
`
`10
`
`

`

`Case 6:21-cv-01101-ADA Document 42-1 Filed 07/07/22 Page 13 of 57
`
`Claim 1
`
`Exemplary Evidence of Infringement
`
`See https://support.apple.com/guide/security/paying-with-cards-using-apple-pay-
`secfbd5c0e54/1/web/1.
`
`
`
`
`
`
`11
`
`

`

`Case 6:21-cv-01101-ADA Document 42-1 Filed 07/07/22 Page 14 of 57
`
`Claim 1
`
`Exemplary Evidence of Infringement
`
`See https://support.apple.com/guide/security/adding-transit-and-student-id-cards-to-wallet-
`seccba2be6de/1/web/1.
`
`For example, the exemplary Apple iPhone 13 supports mobile payment applications, such as Apple
`Pay, which support CDCVM and attach CDCVM information to the result of the security
`establishing operation.
`See, e.g.:
`
`
`
`
`
`12
`
`

`

`Case 6:21-cv-01101-ADA Document 42-1 Filed 07/07/22 Page 15 of 57
`
`Claim 1
`
`Exemplary Evidence of Infringement
`
`
`
`
`
`See https://web.archive.org/web/20201108133245/https:/support.apple.com/en-us/HT202527.
`
`
`
`13
`
`

`

`Case 6:21-cv-01101-ADA Document 42-1 Filed 07/07/22 Page 16 of 57
`
`Claim 1
`
`Exemplary Evidence of Infringement
`
`See https://practical_emv.gitlab.io/assets/practical_emv_rp.pdf.
`
`
`
`
`
`14
`
`

`

`Case 6:21-cv-01101-ADA Document 42-1 Filed 07/07/22 Page 17 of 57
`
`Claim 1
`
`
`
`Exemplary Evidence of Infringement
`
`
`See https://practical_emv.gitlab.io/assets/practical_emv_rp.pdf.
`
`
`
`
`
`15
`
`

`

`Case 6:21-cv-01101-ADA Document 42-1 Filed 07/07/22 Page 18 of 57
`
`Claim 1
`
`Exemplary Evidence of Infringement
`
`See https://technologypartner.visa.com/Download.aspx?id=573.
`
`
`
`
`
`16
`
`

`

`Case 6:21-cv-01101-ADA Document 42-1 Filed 07/07/22 Page 19 of 57
`
`Claim 1
`[1b] wherein the difference in
`quality of said user
`authentication methods varies
`between an inherently
`relatively lower quality and an
`inherently relatively higher
`quality from a security
`perspective.
`
`Exemplary Evidence of Infringement
`In each Accused Product, the difference in quality of said user authentication methods varies
`between an inherently relatively lower quality and an inherently relatively higher quality from a
`security perspective.
`For example, the exemplary Apple iPhone 13 supports mobile payment applications, such as Apple
`Pay, which utilize different authentication methods that vary in quality from a security perspective.
`For example, authentication using Face ID, Touch ID, or a passcode provides an inherently
`relatively higher quality from a security perspective. In contrast, Express Mode provides an
`inherently relatively lower quality from a security perspective.
`See, e.g.:
`
`See https://support.apple.com/en-us/HT203027.
`
`
`
`
`
`17
`
`

`

`Case 6:21-cv-01101-ADA Document 42-1 Filed 07/07/22 Page 20 of 57
`
`Claim 1
`
`Exemplary Evidence of Infringement
`
`See https://support.apple.com/en-us/HT212171.
`
`
`
`
`
`18
`
`

`

`Case 6:21-cv-01101-ADA Document 42-1 Filed 07/07/22 Page 21 of 57
`
`Claim 2
`
`Claim 2
`2. The method according to
`claim 1, wherein the security-
`establishing operation
`performed by the portable data
`carrier comprises creating a
`digital signature.
`
`Exemplary Evidence of Infringement
`In each Accused Product the security-establishing operation performed by the portable data carrier
`comprises creating a digital signature.
`For example, the exemplary Apple iPhone 13 supports mobile payment applications, such as Apple
`Pay, which includes the creation of a digital signature.
` See, e.g.:
`
`See https://support.apple.com/en-us/HT203027.
`
`
`
`
`
`19
`
`

`

`Case 6:21-cv-01101-ADA Document 42-1 Filed 07/07/22 Page 22 of 57
`
`Claim 2
`
`Exemplary Evidence of Infringement
`
`
`
`
`
`See https://support.apple.com/guide/security/payment-authorization-with-apple-pay-
`secc1f57e189/1/web/1.
`
`
`
`20
`
`

`

`Case 6:21-cv-01101-ADA Document 42-1 Filed 07/07/22 Page 23 of 57
`
`Claim 2
`
`Exemplary Evidence of Infringement
`
`See https://support.apple.com/en-us/HT212171.
`
`
`
`
`
`21
`
`
`
`
`
`

`

`Case 6:21-cv-01101-ADA Document 42-1 Filed 07/07/22 Page 24 of 57
`
`Claim 3
`
`Claim 3
`3. The method according to
`claim 1, wherein the
`authentication of the user is
`performed by presentation of a
`biometric feature.
`
`Exemplary Evidence of Infringement
`In each Accused Product the authentication of the user is performed by presentation of a biometric
`feature.
`For example, the exemplary Apple iPhone 13 supports mobile payment applications, such as Apple
`Pay, which authenticate the user with Face ID or Touch ID.
`See, e.g.:
`
`See https://support.apple.com/en-us/HT203027.
`
`
`
`
`
`
`
`22
`
`

`

`Case 6:21-cv-01101-ADA Document 42-1 Filed 07/07/22 Page 25 of 57
`
`Claim 4
`
`Claim 4
`4. The method according to
`claim 3, wherein the
`authentication of the user is
`performed by presentation of a
`physiological or behavior-
`based feature characteristic of
`a user.
`
`Exemplary Evidence of Infringement
`In each Accused Product the authentication of the user is performed by presentation of a
`physiological or behavior-based feature characteristic of a user.
`For example, the exemplary Apple iPhone 13 supports mobile payment applications, such as Apple
`Pay, which authenticates the user with Face ID or Touch ID.
` See, e.g.:
`
`See https://support.apple.com/en-us/HT203027.
`
`
`
`
`
`23
`
`

`

`Case 6:21-cv-01101-ADA Document 42-1 Filed 07/07/22 Page 26 of 57
`
`Claim 5
`
`Claim 5
`5. The method according to
`claim 1, wherein the
`authentication of the user is
`performed by proof of
`knowledge of a secret.
`
`Exemplary Evidence of Infringement
`In each Accused Product the authentication of the user is performed by proof of knowledge of a
`secret.
`For example, the exemplary Apple iPhone 13 supports mobile payment applications, such as Apple
`Pay, which authenticates the user with a passcode.
` See, e.g.:
`
`See https://support.apple.com/en-us/HT203027.
`
`
`
`
`
`
`
`24
`
`

`

`Case 6:21-cv-01101-ADA Document 42-1 Filed 07/07/22 Page 27 of 57
`
`Claim 6
`
`Claim 6
`6. The method according to
`claim 1, wherein at least two
`different authentication
`methods of different quality
`are offered for authentication
`of the user.
`
`Exemplary Evidence of Infringement
`In each Accused Product at least two different authentication methods of different quality are
`offered for authentication of the user.
`For example, the exemplary Apple iPhone 13 supports mobile payment applications, such as Apple
`Pay, which utilize different quality user authentication methods. For example, Apple Pay requires
`the user to authenticate using Face ID, Touch ID, or a passcode. Express Mode does not require the
`user to authenticate using Face ID, Touch ID, or a passcode.
`See, e.g.:
`
`See https://support.apple.com/en-us/HT204506.
`
`
`
`
`
`25
`
`

`

`Case 6:21-cv-01101-ADA Document 42-1 Filed 07/07/22 Page 28 of 57
`
`Claim 6
`
`Exemplary Evidence of Infringement
`
`See https://support.apple.com/en-us/HT203027.
`
`
`
`
`
`26
`
`

`

`Case 6:21-cv-01101-ADA Document 42-1 Filed 07/07/22 Page 29 of 57
`
`Claim 6
`
`Exemplary Evidence of Infringement
`
`See https://support.apple.com/en-us/HT212171.
`
`
`
`
`
`27
`
`

`

`Case 6:21-cv-01101-ADA Document 42-1 Filed 07/07/22 Page 30 of 57
`
`Claim 7
`
`Claim 7
`7. The method according to
`claim 6, wherein the particular
`authentication methods not
`used are disabled.
`
`Exemplary Evidence of Infringement
`In each Accused Product the particular authentication methods not used are disabled.
`For example, the exemplary Apple iPhone 13 supports mobile payment applications, such as Apple
`Pay, for which the particular authentication methods not used are disabled.
` See, e.g.:
`
`See https://support.apple.com/en-us/HT203027.
`
`
`
`
`
`28
`
`

`

`Case 6:21-cv-01101-ADA Document 42-1 Filed 07/07/22 Page 31 of 57
`
`Claim 7
`
`Exemplary Evidence of Infringement
`
`See https://support.apple.com/en-us/HT212171.
`
`
`
`
`
`
`
`29
`
`

`

`Case 6:21-cv-01101-ADA Document 42-1 Filed 07/07/22 Page 32 of 57
`
`Claim 8
`
`Claim 8
`8. The method according to
`claim 6, wherein no quality
`information is produced for an
`authentication method.
`
`Exemplary Evidence of Infringement
`In each Accused Product no quality information is produced for an authentication method.
`For example, the exemplary Apple iPhone 13 supports mobile payment applications, such as Apple
`Pay, wherein no quality information is produced for an authentication method.
` See, e.g.:
`
`See https://support.apple.com/en-us/HT212171.
`
`30
`
`
`
`
`
`

`

`Case 6:21-cv-01101-ADA Document 42-1 Filed 07/07/22 Page 33 of 57
`
`
`
`Claim 9
`
`Claim 9
`9. The method according to
`claim 1, wherein a user is
`asked to select an
`authentication method.
`
`Exemplary Evidence of Infringement
`In each Accused Product a user is asked to select an authentication method.
`For example, the exemplary Apple iPhone 13 supports mobile payment applications, such as Apple
`Pay, wherein a user is asked to select an authentication method such as Face ID, Touch ID or
`passcode.
` See, e.g.:
`
`
`
`
`
`See https://support.apple.com/en-us/HT203027.
`
`31
`
`
`
`

`

`Case 6:21-cv-01101-ADA Document 42-1 Filed 07/07/22 Page 34 of 57
`
`Exemplary Evidence of Infringement
`To the extent the preamble is limiting, each Accused Product includes a portable data carrier for
`performing a security-establishing operation within a secure electronic transaction and arranged to
`perform different quality user authentication methods, wherein the difference in quality of said user
`authentication methods varies between an inherently relatively lower quality and an inherently
`relatively higher quality from a security perspective.
`For example, the exemplary Apple iPhone 13 supports mobile payment applications, such as Apple
`Pay, which enable a security-establishing operation within a secure electronic transaction.
`See, e.g.:
`
`Claim 10
`
`Claim 10
`[10pre] A portable data carrier
`for performing a security-
`establishing operation within a
`secure electronic transaction
`and arranged to perform
`different quality user
`authentication methods,
`wherein the difference in
`quality of said user
`authentication methods varies
`between an inherently
`relatively lower quality and an
`inherently relatively higher
`quality from a security
`perspective, comprising:
`
`
`
`32
`
`

`

`Case 6:21-cv-01101-ADA Document 42-1 Filed 07/07/22 Page 35 of 57
`
`Claim 10
`
`Exemplary Evidence of Infringement
`
`See https://support.apple.com/en-us/HT201239.
`
`
`
`
`
`33
`
`

`

`Case 6:21-cv-01101-ADA Document 42-1 Filed 07/07/22 Page 36 of 57
`
`Claim 10
`
`Exemplary Evidence of Infringement
`For example, the exemplary Apple iPhone 13 supports mobile payment applications, such as Apple
`Pay, which utilize different quality user authentication methods. For example, Apple Pay requires
`the user to authenticate using Face ID, Touch ID, or a passcode. In contrast, Express Mode does
`not require the user to authenticate using Face ID, Touch ID, or a passcode.
`See, e.g.:
`
`See https://support.apple.com/en-us/HT204506.
`
`
`
`
`
`34
`
`

`

`Case 6:21-cv-01101-ADA Document 42-1 Filed 07/07/22 Page 37 of 57
`
`Claim 10
`
`Exemplary Evidence of Infringement
`
`See https://support.apple.com/en-us/HT203027.
`
`
`
`
`
`35
`
`

`

`Case 6:21-cv-01101-ADA Document 42-1 Filed 07/07/22 Page 38 of 57
`
`Claim 10
`
`Exemplary Evidence of Infringement
`
`See https://support.apple.com/en-us/HT212171.
`
`For example, the exemplary Apple iPhone 13 supports mobile payment applications, such as Apple
`Pay, which utilize different authentication methods that vary in quality from a security perspective.
`For example, authentication using Face ID, Touch ID, or a passcode provides an inherently
`relatively higher quality from a security perspective. In contrast, Express Mode provides an
`inherently relatively lower quality from a security perspective.
`See, e.g.:
`
`
`
`
`
`36
`
`

`

`Case 6:21-cv-01101-ADA Document 42-1 Filed 07/07/22 Page 39 of 57
`
`Claim 10
`
`Exemplary Evidence of Infringement
`
`See https://support.apple.com/en-us/HT203027.
`
`
`
`
`
`37
`
`

`

`Case 6:21-cv-01101-ADA Document 42-1 Filed 07/07/22 Page 40 of 57
`
`Claim 10
`
`Exemplary Evidence of Infringement
`
`See https://support.apple.com/en-us/HT212171.
`
`In each Accused Product, the portable data carrier is arranged to perform a user authentication using
`one of said implemented user authentication methods.
`
`
`
`[10a] the portable data carrier
`is arranged to perform a user
`authentication using one of
`said implemented user
`authentication methods and
`
`
`
`38
`
`

`

`Case 6:21-cv-01101-ADA Document 42-1 Filed 07/07/22 Page 41 of 57
`
`Claim 10
`
`Exemplary Evidence of Infringement
`For example, the exemplary Apple iPhone 13 supports mobile payment applications, such as Apple
`Pay, which utilize different authentication methods that vary in quality from a security perspective.
`For example, authentication using Face ID, Touch ID, or a passcode provides an inherently
`relatively higher quality from a security perspective. In contrast, Express Mode provides an
`inherently relatively lower quality from a security perspective.
`See, e.g.:
`
`See https://support.apple.com/en-us/HT203027.
`
`
`
`
`
`39
`
`

`

`Case 6:21-cv-01101-ADA Document 42-1 Filed 07/07/22 Page 42 of 57
`
`Claim 10
`
`Exemplary Evidence of Infringement
`
`[10b] the portable data carrier
`is arranged to confirm the
`authentication to a terminal,
`and
`
`See https://support.apple.com/en-us/HT212171.
`In each Accused Product, the portable data carrier is arranged to confirm the authentication to a
`terminal.
`For example, the exemplary Apple iPhone 13 supports mobile payment applications, such as Apple
`Pay, which confirm the authentication to a terminal.
`See, e.g.:
`
`
`
`
`
`40
`
`

`

`Case 6:21-cv-01101-ADA Document 42-1 Filed 07/07/22 Page 43 of 57
`
`Claim 10
`
`Exemplary Evidence of Infringement
`
`See https://support.apple.com/guide/security/secure-element-and-nfc-controller-
`seccb53a35f0/web.
`
`
`
`
`
`41
`
`

`

`Case 6:21-cv-01101-ADA Document 42-1 Filed 07/07/22 Page 44 of 57
`
`Claim 10
`
`Exemplary Evidence of Infringement
`
`See https://support.apple.com/en-us/HT201239.
`
`
`
`
`
`42
`
`

`

`Case 6:21-cv-01101-ADA Document 42-1 Filed 07/07/22 Page 45 of 57
`
`Claim 10
`
`Exemplary Evidence of Infringement
`
`See https://support.apple.com/en-us/HT209495.
`
`[10c] wherein the data carrier
`is arranged to create quality
`information about said user
`authentication method used
`and to attach such quality
`information to the result of the
`security establishing operation.
`
`In each Accused Product, the data carrier is arranged to create quality information about said user
`authentication method used and to attach such quality information to the result of the security
`establishing operation.
`For example, the exemplary Apple iPhone 13 supports mobile payment applications, such as Apple
`Pay, which create quality information about the type of authentication method used by a user and
`attach that information to the result of the security establishing operation in an electronic transaction.
`See, e.g.:
`
`
`
`
`
`43
`
`

`

`Case 6:21-cv-01101-ADA Document 42-1 Filed 07/07/22 Page 46 of 57
`
`Claim 10
`
`Exemplary Evidence of Infringement
`
`
`
`
`
`See https://support.apple.com/guide/security/payment-authorization-with-apple-pay-
`secc1f57e189/1/web/1.
`
`
`
`44
`
`

`

`Case 6:21-cv-01101-ADA Document 42-1 Filed 07/07/22 Page 47 of 57
`
`Claim 10
`
`Exemplary Evidence of Infringement
`
`See https://support.apple.com/guide/security/paying-with-cards-using-apple-pay-
`secfbd5c0e54/1/web/1.
`
`
`
`
`
`
`45
`
`

`

`Case 6:21-cv-01101-ADA Document 42-1 Filed 07/07/22 Page 48 of 57
`
`Claim 10
`
`Exemplary Evidence of Infringement
`
`See https://support.apple.com/guide/security/adding-transit-and-student-id-cards-to-wallet-
`seccba2be6de/1/web/1.
`
`For example, the exemplary Apple iPhone 13 supports mobile payment applications, such as Apple
`Pay, which support CDCVM and attach CDCVM information to the result of the security
`establishing operation.
`See, e.g.:
`
`
`
`
`
`46
`
`

`

`Case 6:21-cv-01101-ADA Document 42-1 Filed 07/07/22 Page 49 of 57
`
`Claim 10
`
`Exemplary Evidence of Infringement
`
`
`
`
`
`See https://web.archive.org/web/20201108133245/https:/support.apple.com/en-us/HT202527.
`
`
`
`47
`
`

`

`Case 6:21-cv-01101-ADA Document 42-1 Filed 07/07/22 Page 50 of 57
`
`Claim 10
`
`Exemplary Evidence of Infringement
`
`See https://practical_emv.gitlab.io/assets/practical_emv_rp.pdf.
`
`
`
`
`
`48
`
`

`

`Case 6:21-cv-01101-ADA Document 42-1 Filed 07/07/22 Page 51 of 57
`
`Claim 10
`
`
`
`Exemplary Evidence of Infringement
`
`
`See https://practical_emv.gitlab.io/assets/practical_emv_rp.pdf.
`
`
`
`
`
`49
`
`

`

`Case 6:21-cv-01101-ADA Document 42-1 Filed 07/07/22 Page 52 of 57
`
`Claim 10
`
`Exemplary Evidence of Infringement
`
`See https://technologypartner.visa.com/Download.aspx?id=573.
`
`
`
`
`
`
`
`50
`
`

`

`Case 6:21-cv-01101-ADA Document 42-1 Filed 07/07/22 Page 53 of 57
`
`
`
`Claim 11
`
`Claim 11
`11. The data carrier according
`to claim 10, wherein the
`portable data carrier is set up
`to create a digital signature.
`
`Exemplary Evidence of Infringement
`In each Accused Product the portable data carrier is set up to create a digital signature.
`For example, the exemplary Apple iPhone 13 supports mobile payment applications, such as Apple
`Pay, which includes the creation of a digital signature.
` See, e.g.:
`
`See https://support.apple.com/en-us/HT203027.
`
`
`
`
`
`51
`
`

`

`Case 6:21-cv-01101-ADA Document 42-1 Filed 07/07/22 Page 54 of 57
`
`Claim 11
`
`Exemplary Evidence of Infringement
`
`
`
`
`
`See https://support.apple.com/guide/security/payment-authorization-with-apple-pay-
`secc1f57e189/1/web/1.
`
`
`
`52
`
`

`

`Case 6:21-cv-01101-ADA Document 42-1 Filed 07/07/22 Page 55 of 57
`
`Claim 11
`
`Exemplary Evidence of Infringement
`
`See https://support.apple.com/en-us/HT212171.
`
`
`
`
`
`
`
`53
`
`

`

`Case 6:21-cv-01101-ADA Document 42-1 Filed 07/07/22 Page 56 of 57
`
`Claim 12
`
`Claim 12
`12. The data carrier according
`to claim 10, wherein the data
`carrier supports at least two
`qualitatively different
`authentication methods.
`
`Exemplary Evidence of Infringement
`In each Accused Product the data carrier supports at least two qualitatively different authentication
`methods.
`For example, the exemplary Apple iPhone 13 supports mobile payment applications, such as Apple
`Pay, which supports at least two qualitatively different authentication methods. For example, Apple
`Pay supports authentication using Face ID, Touch ID, or a passcode. Express Mode does not require
`the user to authenticate using Face ID, Touch ID, or a passcode.
`See, e.g.:
`
`See https://support.apple.com/en-us/HT203027.
`
`
`
`
`
`54
`
`

`

`Case 6:21-cv-01101-ADA Document 42-1 Filed 07/07/22 Page 57 of 57
`
`Claim 12
`
`Exemplary Evidence of Infringement
`
`See https://support.apple.com/en-us/HT212171.
`
`
`
`
`
`
`
`55
`
`

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket