`Case 6:21-cv-01101-ADA Document 42-1 Filed 07/07/22 Page 1 of 57
`
`EXHIBIT 23
`EXHIBIT 23
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Case 6:21-cv-01101-ADA Document 42-1 Filed 07/07/22 Page 2 of 57
`Case 6:21-cv-01101-ADA Document 42-1 Filed 07/07/22 Page 2 of 57
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`EXHIBIT B
`EXHIBIT B
`
`
`
`Case 6:21-cv-01101-ADA Document 42-1 Filed 07/07/22 Page 3 of 57
`
`U.S. Patent No. 8,205,249 (“’249 Patent”)
`
`Accused Products
`Apple products, including without limitation the Apple iPhone 6, 6 Plus, 6S, 6S Plus, SE (first and second generation), 7, 7 Plus,
`8, 8 Plus, X, XR, XS, XS Max, 11, 11 Pro, 11 Pro Max, 12, 12 mini, 12 Pro, 12 Pro Max, 13, 13 mini, 13 Pro, and 13 Pro Max (“Accused
`Products”), infringe at least Claims 1-12 of the ’249 Patent.
`
`Exemplary Evidence of Infringement
`To the extent the preamble is limiting, each Accused Product performs a method for effecting a
`secure electronic transaction on a terminal using a portable data carrier arranged to perform different
`quality user authentication methods, wherein the portable data carrier performs a user authentication
`using one of said different user authentication methods, the portable data carrier confirms the proof
`of authentication to the terminal, and the portable data carrier then performs a security-establishing
`operation within the electronic transaction.
`For example, the exemplary Apple iPhone 13 supports mobile payment applications, such as Apple
`Pay, which utilize different quality user authentication methods. For example, Apple Pay requires
`the user to authenticate using Face ID, Touch ID, or a passcode. In contrast, Express Mode does
`not require the user to authenticate using Face ID, Touch ID, or a passcode.
`See, e.g.:
`
`Claim 1
`
`Claim 1
`[1pre] A method for effecting
`a secure electronic transaction
`on a terminal using a portable
`data carrier arranged to
`perform different quality user
`authentication methods,
`wherein the portable data
`carrier performs a user
`authentication using one of
`said different user
`authentication methods, the
`portable data carrier confirms
`the proof of authentication to
`the terminal, and the portable
`data carrier then performs a
`security-establishing operation
`within the electronic
`transaction, comprising the
`steps of
`
`
`
`1
`
`
`
`Case 6:21-cv-01101-ADA Document 42-1 Filed 07/07/22 Page 4 of 57
`
`Claim 1
`
`Exemplary Evidence of Infringement
`
`See https://support.apple.com/en-us/HT204506.
`
`
`
`
`
`2
`
`
`
`Case 6:21-cv-01101-ADA Document 42-1 Filed 07/07/22 Page 5 of 57
`
`Claim 1
`
`Exemplary Evidence of Infringement
`
`See https://support.apple.com/en-us/HT203027.
`
`
`
`
`
`3
`
`
`
`Case 6:21-cv-01101-ADA Document 42-1 Filed 07/07/22 Page 6 of 57
`
`Claim 1
`
`Exemplary Evidence of Infringement
`
`See https://support.apple.com/en-us/HT212171.
`
`For example, the exemplary Apple iPhone 13 supports mobile payment applications, such as Apple
`Pay, which confirm the proof of authentication to a terminal.
`See, e.g.:
`
`
`
`
`
`
`4
`
`
`
`Case 6:21-cv-01101-ADA Document 42-1 Filed 07/07/22 Page 7 of 57
`
`Claim 1
`
`Exemplary Evidence of Infringement
`
`See https://support.apple.com/guide/security/secure-element-and-nfc-controller-
`seccb53a35f0/web.
`
`
`
`
`
`5
`
`
`
`Case 6:21-cv-01101-ADA Document 42-1 Filed 07/07/22 Page 8 of 57
`
`Claim 1
`
`Exemplary Evidence of Infringement
`
`See https://support.apple.com/en-us/HT201239.
`
`
`
`
`
`6
`
`
`
`Case 6:21-cv-01101-ADA Document 42-1 Filed 07/07/22 Page 9 of 57
`
`Claim 1
`
`Exemplary Evidence of Infringement
`
`See https://support.apple.com/en-us/HT209495.
`
`For example, the exemplary Apple iPhone 13 supports mobile payment applications, such as Apple
`Pay, which then perform a security-establishing operation within a secure electronic transaction.
`See, e.g.:
`
`
`
`
`
`7
`
`
`
`Case 6:21-cv-01101-ADA Document 42-1 Filed 07/07/22 Page 10 of 57
`
`Claim 1
`
`Exemplary Evidence of Infringement
`
`See https://support.apple.com/en-us/HT201239.
`
`
`
`
`
`8
`
`
`
`Case 6:21-cv-01101-ADA Document 42-1 Filed 07/07/22 Page 11 of 57
`
`Claim 1
`
`Exemplary Evidence of Infringement
`
`See https://support.apple.com/en-us/HT209495.
`
`[1a] creating authentication
`quality information by the
`portable data carrier about said
`user authentication method
`used and attaching said
`authentication quality
`information to the result of the
`security-establishing
`operation,
`
`Each Accused Product creates authentication quality information by the portable data carrier about
`said user authentication method used and attaching said authentication quality information to the
`result of the security-establishing operation.
`For example, the exemplary Apple iPhone 13 supports mobile payment applications, such as Apple
`Pay, which create authentication quality information about the user authentication method used and
`attach that information to the result of the security establishing operation in an electronic transaction.
`See, e.g.:
`
`
`
`
`
`9
`
`
`
`Case 6:21-cv-01101-ADA Document 42-1 Filed 07/07/22 Page 12 of 57
`
`Claim 1
`
`Exemplary Evidence of Infringement
`
`
`
`
`
`See https://support.apple.com/guide/security/payment-authorization-with-apple-pay-
`secc1f57e189/1/web/1.
`
`
`
`10
`
`
`
`Case 6:21-cv-01101-ADA Document 42-1 Filed 07/07/22 Page 13 of 57
`
`Claim 1
`
`Exemplary Evidence of Infringement
`
`See https://support.apple.com/guide/security/paying-with-cards-using-apple-pay-
`secfbd5c0e54/1/web/1.
`
`
`
`
`
`
`11
`
`
`
`Case 6:21-cv-01101-ADA Document 42-1 Filed 07/07/22 Page 14 of 57
`
`Claim 1
`
`Exemplary Evidence of Infringement
`
`See https://support.apple.com/guide/security/adding-transit-and-student-id-cards-to-wallet-
`seccba2be6de/1/web/1.
`
`For example, the exemplary Apple iPhone 13 supports mobile payment applications, such as Apple
`Pay, which support CDCVM and attach CDCVM information to the result of the security
`establishing operation.
`See, e.g.:
`
`
`
`
`
`12
`
`
`
`Case 6:21-cv-01101-ADA Document 42-1 Filed 07/07/22 Page 15 of 57
`
`Claim 1
`
`Exemplary Evidence of Infringement
`
`
`
`
`
`See https://web.archive.org/web/20201108133245/https:/support.apple.com/en-us/HT202527.
`
`
`
`13
`
`
`
`Case 6:21-cv-01101-ADA Document 42-1 Filed 07/07/22 Page 16 of 57
`
`Claim 1
`
`Exemplary Evidence of Infringement
`
`See https://practical_emv.gitlab.io/assets/practical_emv_rp.pdf.
`
`
`
`
`
`14
`
`
`
`Case 6:21-cv-01101-ADA Document 42-1 Filed 07/07/22 Page 17 of 57
`
`Claim 1
`
`
`
`Exemplary Evidence of Infringement
`
`
`See https://practical_emv.gitlab.io/assets/practical_emv_rp.pdf.
`
`
`
`
`
`15
`
`
`
`Case 6:21-cv-01101-ADA Document 42-1 Filed 07/07/22 Page 18 of 57
`
`Claim 1
`
`Exemplary Evidence of Infringement
`
`See https://technologypartner.visa.com/Download.aspx?id=573.
`
`
`
`
`
`16
`
`
`
`Case 6:21-cv-01101-ADA Document 42-1 Filed 07/07/22 Page 19 of 57
`
`Claim 1
`[1b] wherein the difference in
`quality of said user
`authentication methods varies
`between an inherently
`relatively lower quality and an
`inherently relatively higher
`quality from a security
`perspective.
`
`Exemplary Evidence of Infringement
`In each Accused Product, the difference in quality of said user authentication methods varies
`between an inherently relatively lower quality and an inherently relatively higher quality from a
`security perspective.
`For example, the exemplary Apple iPhone 13 supports mobile payment applications, such as Apple
`Pay, which utilize different authentication methods that vary in quality from a security perspective.
`For example, authentication using Face ID, Touch ID, or a passcode provides an inherently
`relatively higher quality from a security perspective. In contrast, Express Mode provides an
`inherently relatively lower quality from a security perspective.
`See, e.g.:
`
`See https://support.apple.com/en-us/HT203027.
`
`
`
`
`
`17
`
`
`
`Case 6:21-cv-01101-ADA Document 42-1 Filed 07/07/22 Page 20 of 57
`
`Claim 1
`
`Exemplary Evidence of Infringement
`
`See https://support.apple.com/en-us/HT212171.
`
`
`
`
`
`18
`
`
`
`Case 6:21-cv-01101-ADA Document 42-1 Filed 07/07/22 Page 21 of 57
`
`Claim 2
`
`Claim 2
`2. The method according to
`claim 1, wherein the security-
`establishing operation
`performed by the portable data
`carrier comprises creating a
`digital signature.
`
`Exemplary Evidence of Infringement
`In each Accused Product the security-establishing operation performed by the portable data carrier
`comprises creating a digital signature.
`For example, the exemplary Apple iPhone 13 supports mobile payment applications, such as Apple
`Pay, which includes the creation of a digital signature.
` See, e.g.:
`
`See https://support.apple.com/en-us/HT203027.
`
`
`
`
`
`19
`
`
`
`Case 6:21-cv-01101-ADA Document 42-1 Filed 07/07/22 Page 22 of 57
`
`Claim 2
`
`Exemplary Evidence of Infringement
`
`
`
`
`
`See https://support.apple.com/guide/security/payment-authorization-with-apple-pay-
`secc1f57e189/1/web/1.
`
`
`
`20
`
`
`
`Case 6:21-cv-01101-ADA Document 42-1 Filed 07/07/22 Page 23 of 57
`
`Claim 2
`
`Exemplary Evidence of Infringement
`
`See https://support.apple.com/en-us/HT212171.
`
`
`
`
`
`21
`
`
`
`
`
`
`
`Case 6:21-cv-01101-ADA Document 42-1 Filed 07/07/22 Page 24 of 57
`
`Claim 3
`
`Claim 3
`3. The method according to
`claim 1, wherein the
`authentication of the user is
`performed by presentation of a
`biometric feature.
`
`Exemplary Evidence of Infringement
`In each Accused Product the authentication of the user is performed by presentation of a biometric
`feature.
`For example, the exemplary Apple iPhone 13 supports mobile payment applications, such as Apple
`Pay, which authenticate the user with Face ID or Touch ID.
`See, e.g.:
`
`See https://support.apple.com/en-us/HT203027.
`
`
`
`
`
`
`
`22
`
`
`
`Case 6:21-cv-01101-ADA Document 42-1 Filed 07/07/22 Page 25 of 57
`
`Claim 4
`
`Claim 4
`4. The method according to
`claim 3, wherein the
`authentication of the user is
`performed by presentation of a
`physiological or behavior-
`based feature characteristic of
`a user.
`
`Exemplary Evidence of Infringement
`In each Accused Product the authentication of the user is performed by presentation of a
`physiological or behavior-based feature characteristic of a user.
`For example, the exemplary Apple iPhone 13 supports mobile payment applications, such as Apple
`Pay, which authenticates the user with Face ID or Touch ID.
` See, e.g.:
`
`See https://support.apple.com/en-us/HT203027.
`
`
`
`
`
`23
`
`
`
`Case 6:21-cv-01101-ADA Document 42-1 Filed 07/07/22 Page 26 of 57
`
`Claim 5
`
`Claim 5
`5. The method according to
`claim 1, wherein the
`authentication of the user is
`performed by proof of
`knowledge of a secret.
`
`Exemplary Evidence of Infringement
`In each Accused Product the authentication of the user is performed by proof of knowledge of a
`secret.
`For example, the exemplary Apple iPhone 13 supports mobile payment applications, such as Apple
`Pay, which authenticates the user with a passcode.
` See, e.g.:
`
`See https://support.apple.com/en-us/HT203027.
`
`
`
`
`
`
`
`24
`
`
`
`Case 6:21-cv-01101-ADA Document 42-1 Filed 07/07/22 Page 27 of 57
`
`Claim 6
`
`Claim 6
`6. The method according to
`claim 1, wherein at least two
`different authentication
`methods of different quality
`are offered for authentication
`of the user.
`
`Exemplary Evidence of Infringement
`In each Accused Product at least two different authentication methods of different quality are
`offered for authentication of the user.
`For example, the exemplary Apple iPhone 13 supports mobile payment applications, such as Apple
`Pay, which utilize different quality user authentication methods. For example, Apple Pay requires
`the user to authenticate using Face ID, Touch ID, or a passcode. Express Mode does not require the
`user to authenticate using Face ID, Touch ID, or a passcode.
`See, e.g.:
`
`See https://support.apple.com/en-us/HT204506.
`
`
`
`
`
`25
`
`
`
`Case 6:21-cv-01101-ADA Document 42-1 Filed 07/07/22 Page 28 of 57
`
`Claim 6
`
`Exemplary Evidence of Infringement
`
`See https://support.apple.com/en-us/HT203027.
`
`
`
`
`
`26
`
`
`
`Case 6:21-cv-01101-ADA Document 42-1 Filed 07/07/22 Page 29 of 57
`
`Claim 6
`
`Exemplary Evidence of Infringement
`
`See https://support.apple.com/en-us/HT212171.
`
`
`
`
`
`27
`
`
`
`Case 6:21-cv-01101-ADA Document 42-1 Filed 07/07/22 Page 30 of 57
`
`Claim 7
`
`Claim 7
`7. The method according to
`claim 6, wherein the particular
`authentication methods not
`used are disabled.
`
`Exemplary Evidence of Infringement
`In each Accused Product the particular authentication methods not used are disabled.
`For example, the exemplary Apple iPhone 13 supports mobile payment applications, such as Apple
`Pay, for which the particular authentication methods not used are disabled.
` See, e.g.:
`
`See https://support.apple.com/en-us/HT203027.
`
`
`
`
`
`28
`
`
`
`Case 6:21-cv-01101-ADA Document 42-1 Filed 07/07/22 Page 31 of 57
`
`Claim 7
`
`Exemplary Evidence of Infringement
`
`See https://support.apple.com/en-us/HT212171.
`
`
`
`
`
`
`
`29
`
`
`
`Case 6:21-cv-01101-ADA Document 42-1 Filed 07/07/22 Page 32 of 57
`
`Claim 8
`
`Claim 8
`8. The method according to
`claim 6, wherein no quality
`information is produced for an
`authentication method.
`
`Exemplary Evidence of Infringement
`In each Accused Product no quality information is produced for an authentication method.
`For example, the exemplary Apple iPhone 13 supports mobile payment applications, such as Apple
`Pay, wherein no quality information is produced for an authentication method.
` See, e.g.:
`
`See https://support.apple.com/en-us/HT212171.
`
`30
`
`
`
`
`
`
`
`Case 6:21-cv-01101-ADA Document 42-1 Filed 07/07/22 Page 33 of 57
`
`
`
`Claim 9
`
`Claim 9
`9. The method according to
`claim 1, wherein a user is
`asked to select an
`authentication method.
`
`Exemplary Evidence of Infringement
`In each Accused Product a user is asked to select an authentication method.
`For example, the exemplary Apple iPhone 13 supports mobile payment applications, such as Apple
`Pay, wherein a user is asked to select an authentication method such as Face ID, Touch ID or
`passcode.
` See, e.g.:
`
`
`
`
`
`See https://support.apple.com/en-us/HT203027.
`
`31
`
`
`
`
`
`Case 6:21-cv-01101-ADA Document 42-1 Filed 07/07/22 Page 34 of 57
`
`Exemplary Evidence of Infringement
`To the extent the preamble is limiting, each Accused Product includes a portable data carrier for
`performing a security-establishing operation within a secure electronic transaction and arranged to
`perform different quality user authentication methods, wherein the difference in quality of said user
`authentication methods varies between an inherently relatively lower quality and an inherently
`relatively higher quality from a security perspective.
`For example, the exemplary Apple iPhone 13 supports mobile payment applications, such as Apple
`Pay, which enable a security-establishing operation within a secure electronic transaction.
`See, e.g.:
`
`Claim 10
`
`Claim 10
`[10pre] A portable data carrier
`for performing a security-
`establishing operation within a
`secure electronic transaction
`and arranged to perform
`different quality user
`authentication methods,
`wherein the difference in
`quality of said user
`authentication methods varies
`between an inherently
`relatively lower quality and an
`inherently relatively higher
`quality from a security
`perspective, comprising:
`
`
`
`32
`
`
`
`Case 6:21-cv-01101-ADA Document 42-1 Filed 07/07/22 Page 35 of 57
`
`Claim 10
`
`Exemplary Evidence of Infringement
`
`See https://support.apple.com/en-us/HT201239.
`
`
`
`
`
`33
`
`
`
`Case 6:21-cv-01101-ADA Document 42-1 Filed 07/07/22 Page 36 of 57
`
`Claim 10
`
`Exemplary Evidence of Infringement
`For example, the exemplary Apple iPhone 13 supports mobile payment applications, such as Apple
`Pay, which utilize different quality user authentication methods. For example, Apple Pay requires
`the user to authenticate using Face ID, Touch ID, or a passcode. In contrast, Express Mode does
`not require the user to authenticate using Face ID, Touch ID, or a passcode.
`See, e.g.:
`
`See https://support.apple.com/en-us/HT204506.
`
`
`
`
`
`34
`
`
`
`Case 6:21-cv-01101-ADA Document 42-1 Filed 07/07/22 Page 37 of 57
`
`Claim 10
`
`Exemplary Evidence of Infringement
`
`See https://support.apple.com/en-us/HT203027.
`
`
`
`
`
`35
`
`
`
`Case 6:21-cv-01101-ADA Document 42-1 Filed 07/07/22 Page 38 of 57
`
`Claim 10
`
`Exemplary Evidence of Infringement
`
`See https://support.apple.com/en-us/HT212171.
`
`For example, the exemplary Apple iPhone 13 supports mobile payment applications, such as Apple
`Pay, which utilize different authentication methods that vary in quality from a security perspective.
`For example, authentication using Face ID, Touch ID, or a passcode provides an inherently
`relatively higher quality from a security perspective. In contrast, Express Mode provides an
`inherently relatively lower quality from a security perspective.
`See, e.g.:
`
`
`
`
`
`36
`
`
`
`Case 6:21-cv-01101-ADA Document 42-1 Filed 07/07/22 Page 39 of 57
`
`Claim 10
`
`Exemplary Evidence of Infringement
`
`See https://support.apple.com/en-us/HT203027.
`
`
`
`
`
`37
`
`
`
`Case 6:21-cv-01101-ADA Document 42-1 Filed 07/07/22 Page 40 of 57
`
`Claim 10
`
`Exemplary Evidence of Infringement
`
`See https://support.apple.com/en-us/HT212171.
`
`In each Accused Product, the portable data carrier is arranged to perform a user authentication using
`one of said implemented user authentication methods.
`
`
`
`[10a] the portable data carrier
`is arranged to perform a user
`authentication using one of
`said implemented user
`authentication methods and
`
`
`
`38
`
`
`
`Case 6:21-cv-01101-ADA Document 42-1 Filed 07/07/22 Page 41 of 57
`
`Claim 10
`
`Exemplary Evidence of Infringement
`For example, the exemplary Apple iPhone 13 supports mobile payment applications, such as Apple
`Pay, which utilize different authentication methods that vary in quality from a security perspective.
`For example, authentication using Face ID, Touch ID, or a passcode provides an inherently
`relatively higher quality from a security perspective. In contrast, Express Mode provides an
`inherently relatively lower quality from a security perspective.
`See, e.g.:
`
`See https://support.apple.com/en-us/HT203027.
`
`
`
`
`
`39
`
`
`
`Case 6:21-cv-01101-ADA Document 42-1 Filed 07/07/22 Page 42 of 57
`
`Claim 10
`
`Exemplary Evidence of Infringement
`
`[10b] the portable data carrier
`is arranged to confirm the
`authentication to a terminal,
`and
`
`See https://support.apple.com/en-us/HT212171.
`In each Accused Product, the portable data carrier is arranged to confirm the authentication to a
`terminal.
`For example, the exemplary Apple iPhone 13 supports mobile payment applications, such as Apple
`Pay, which confirm the authentication to a terminal.
`See, e.g.:
`
`
`
`
`
`40
`
`
`
`Case 6:21-cv-01101-ADA Document 42-1 Filed 07/07/22 Page 43 of 57
`
`Claim 10
`
`Exemplary Evidence of Infringement
`
`See https://support.apple.com/guide/security/secure-element-and-nfc-controller-
`seccb53a35f0/web.
`
`
`
`
`
`41
`
`
`
`Case 6:21-cv-01101-ADA Document 42-1 Filed 07/07/22 Page 44 of 57
`
`Claim 10
`
`Exemplary Evidence of Infringement
`
`See https://support.apple.com/en-us/HT201239.
`
`
`
`
`
`42
`
`
`
`Case 6:21-cv-01101-ADA Document 42-1 Filed 07/07/22 Page 45 of 57
`
`Claim 10
`
`Exemplary Evidence of Infringement
`
`See https://support.apple.com/en-us/HT209495.
`
`[10c] wherein the data carrier
`is arranged to create quality
`information about said user
`authentication method used
`and to attach such quality
`information to the result of the
`security establishing operation.
`
`In each Accused Product, the data carrier is arranged to create quality information about said user
`authentication method used and to attach such quality information to the result of the security
`establishing operation.
`For example, the exemplary Apple iPhone 13 supports mobile payment applications, such as Apple
`Pay, which create quality information about the type of authentication method used by a user and
`attach that information to the result of the security establishing operation in an electronic transaction.
`See, e.g.:
`
`
`
`
`
`43
`
`
`
`Case 6:21-cv-01101-ADA Document 42-1 Filed 07/07/22 Page 46 of 57
`
`Claim 10
`
`Exemplary Evidence of Infringement
`
`
`
`
`
`See https://support.apple.com/guide/security/payment-authorization-with-apple-pay-
`secc1f57e189/1/web/1.
`
`
`
`44
`
`
`
`Case 6:21-cv-01101-ADA Document 42-1 Filed 07/07/22 Page 47 of 57
`
`Claim 10
`
`Exemplary Evidence of Infringement
`
`See https://support.apple.com/guide/security/paying-with-cards-using-apple-pay-
`secfbd5c0e54/1/web/1.
`
`
`
`
`
`
`45
`
`
`
`Case 6:21-cv-01101-ADA Document 42-1 Filed 07/07/22 Page 48 of 57
`
`Claim 10
`
`Exemplary Evidence of Infringement
`
`See https://support.apple.com/guide/security/adding-transit-and-student-id-cards-to-wallet-
`seccba2be6de/1/web/1.
`
`For example, the exemplary Apple iPhone 13 supports mobile payment applications, such as Apple
`Pay, which support CDCVM and attach CDCVM information to the result of the security
`establishing operation.
`See, e.g.:
`
`
`
`
`
`46
`
`
`
`Case 6:21-cv-01101-ADA Document 42-1 Filed 07/07/22 Page 49 of 57
`
`Claim 10
`
`Exemplary Evidence of Infringement
`
`
`
`
`
`See https://web.archive.org/web/20201108133245/https:/support.apple.com/en-us/HT202527.
`
`
`
`47
`
`
`
`Case 6:21-cv-01101-ADA Document 42-1 Filed 07/07/22 Page 50 of 57
`
`Claim 10
`
`Exemplary Evidence of Infringement
`
`See https://practical_emv.gitlab.io/assets/practical_emv_rp.pdf.
`
`
`
`
`
`48
`
`
`
`Case 6:21-cv-01101-ADA Document 42-1 Filed 07/07/22 Page 51 of 57
`
`Claim 10
`
`
`
`Exemplary Evidence of Infringement
`
`
`See https://practical_emv.gitlab.io/assets/practical_emv_rp.pdf.
`
`
`
`
`
`49
`
`
`
`Case 6:21-cv-01101-ADA Document 42-1 Filed 07/07/22 Page 52 of 57
`
`Claim 10
`
`Exemplary Evidence of Infringement
`
`See https://technologypartner.visa.com/Download.aspx?id=573.
`
`
`
`
`
`
`
`50
`
`
`
`Case 6:21-cv-01101-ADA Document 42-1 Filed 07/07/22 Page 53 of 57
`
`
`
`Claim 11
`
`Claim 11
`11. The data carrier according
`to claim 10, wherein the
`portable data carrier is set up
`to create a digital signature.
`
`Exemplary Evidence of Infringement
`In each Accused Product the portable data carrier is set up to create a digital signature.
`For example, the exemplary Apple iPhone 13 supports mobile payment applications, such as Apple
`Pay, which includes the creation of a digital signature.
` See, e.g.:
`
`See https://support.apple.com/en-us/HT203027.
`
`
`
`
`
`51
`
`
`
`Case 6:21-cv-01101-ADA Document 42-1 Filed 07/07/22 Page 54 of 57
`
`Claim 11
`
`Exemplary Evidence of Infringement
`
`
`
`
`
`See https://support.apple.com/guide/security/payment-authorization-with-apple-pay-
`secc1f57e189/1/web/1.
`
`
`
`52
`
`
`
`Case 6:21-cv-01101-ADA Document 42-1 Filed 07/07/22 Page 55 of 57
`
`Claim 11
`
`Exemplary Evidence of Infringement
`
`See https://support.apple.com/en-us/HT212171.
`
`
`
`
`
`
`
`53
`
`
`
`Case 6:21-cv-01101-ADA Document 42-1 Filed 07/07/22 Page 56 of 57
`
`Claim 12
`
`Claim 12
`12. The data carrier according
`to claim 10, wherein the data
`carrier supports at least two
`qualitatively different
`authentication methods.
`
`Exemplary Evidence of Infringement
`In each Accused Product the data carrier supports at least two qualitatively different authentication
`methods.
`For example, the exemplary Apple iPhone 13 supports mobile payment applications, such as Apple
`Pay, which supports at least two qualitatively different authentication methods. For example, Apple
`Pay supports authentication using Face ID, Touch ID, or a passcode. Express Mode does not require
`the user to authenticate using Face ID, Touch ID, or a passcode.
`See, e.g.:
`
`See https://support.apple.com/en-us/HT203027.
`
`
`
`
`
`54
`
`
`
`Case 6:21-cv-01101-ADA Document 42-1 Filed 07/07/22 Page 57 of 57
`
`Claim 12
`
`Exemplary Evidence of Infringement
`
`See https://support.apple.com/en-us/HT212171.
`
`
`
`
`
`
`
`55
`
`