throbber
United States Patent
`Rosenblum
`
`[19]
`
`[11]
`[45]
`
`4,182,933
`Jan. 8, 1980
`
`[54] SECURE COMMUNICATION SYSTEM WITH
`REMOTE KEY SETTING
`Inventor: Howard E. Rosenblum, Silver Spring,
`Md.
`
`[75]
`
`.
`.
`_
`.
`[73] Asslgnem The Umted Sums of menu”
`filmy‘ wt::figtt]:fnSe[§TC_ : of the
`’
`’
`{Z1} APPL N03 390371
`E22] Filed,
`pain 14' 1959
`
`[51]
`Int. CL3 .......................... HIMK 1/99: H041. 9/00
`""""""""""""" 179’1'5 R5 178/22
`[52] U_-5'0‘
`[58] Fleld of Search ........................... 179/1.5; 137235/'22;
`/32
`
`Primary E.mmi'ner—Howard A. Birrniel
`Attorney, Agent, or Fi'rm—John R. Utermohle
`
`ABSTRACT
`[57]
`An apparatus for maintaining secure communication
`between subscribers. A centrally located key distribu-
`tion center, which includes a data processor, is utilized
`as a source of remotely selected working variables
`which are utilized to enable secure communication
`between a plurality of selected subscribers. Each sub-
`scriber in the system has a unique variable which identi-
`fies him to the data processor. and enables a secure
`communication with the data processor, which will
`then provide him with the working variable of the sub-
`scrihel. that he wishes to can The key distribution Gem
`ter also reiteratively replaces the working variable of
`the caller’ and the called subscribm. if desired. each time
`contact is made with the key distribution center.
`
`10 Claims, 2 Drawing Figures
`
`0
`
`
`
`
`
`
`
`
`/2°
`"2
`F “““":;;.;;.'u"
`
`can‘
`u
`TLEPHDNE _
`
`‘$1
`I
`,’|,’cEuErm.
`“TELEPHONE :I
`233$:
`:',swI1'cHme Ill
`SWIYCHING
`"
`gjuerwonx I,
`Jr
`J!
`NE'iwORI(
`.
`.
`
`' sroeae
`L — _ — — H H _ - _
`..
`I (G
`I_____
`COMPUTER
`————— — _
`I
`svsreu
`E
`
`com Ron.
`I
`swI‘rcHING
`I
`I L———-f";Tp3,fiE“ ,
`uzrwomt
`:______L¢iE_NE_§£To§Ji:
`237
`25
`l
`.1
`
`F‘““““‘“fi
`Page 1
`
`
`
`KEY DISTRIBUTION CENTER
`
`SUBSCRIBER 2
`
`PMC Exhibit 2097
`
`Apple v. PMC
`|PR2016-00753
`
`PMC Exhibit 2097
`Apple v. PMC
`IPR2016-00753
`Page 1
`
`

`
`U.'S. Patent
`
`Jan.8, 1930
`
`Sheet 1 of2
`
`4,182,933
`
`
`
`
`
`E._.zuozo:._._m_E.m_a.35.mm
`
`moéxmzuo
`
`mrsfimIzoozqm
`mmt.:n_s_oo
`
`.<mon_2m:_
`
`mwmmmHmJ
`
`
`1xmozfiuzx__oz_:o._._.sm___
`
`___m_zo:n_m._.nF___:4¢mmzmo:
`
`oz=._2.:sm
`
`xmoafiz
`
`._oE.z8
`
`_2m_._.m>m
`
`PMC Exhibit 2097
`
`Apple v. PMC
`|PR2016-00753
`
`Page 2
`
`PMC Exhibit 2097
`Apple v. PMC
`IPR2016-00753
`Page 2
`
`
`
`
`
`
`
`

`
`
`
`.mobqmmzme
`
`1fia&uH_m&nm%%%_
` .mmlEx_I_|||_l|..|||.___1._mmmm.Eoooof_IIIIIIIIIIIIIIIIIIIIII|.1a-:I7fiI:LD.
`U.IIuI..|I.._n
`
`
`_Emacs._I>m§_on__2m»momnufi__._._o:>..mAw_x_:II_I_lIn_.ozazmzomm
`
`8WILLIIJ_amzzqzoomm
`.mm:_u__IIEImoéoz
`
`IIIII_U.9.
`
`2
`
`81
`
`_F|IIlL.m_Sm.//2//
`
`
`
`......_mw,,/nu/%_m_o_>m_oow//_motzoz
`
`__
`
`_//
`_w:m.m.m4mm_1..._m_.oJ_.IJ_mbansru,,
`
`
`
`9IIIIIIIII|I||III|l|!4fi1|II:|J
`
`3CAW3MI9.,P2NEu
`
`ED.2
`Xpo
`
`mmm
`wows
`WV.n_uP
`mmmm
`
`PMC Exhibit 2097
`Apple v. PMC
`IPR2016-00753
`Page 3
`
`
`

`
`1
`
`4,182,933
`
`SECURE COMMUNICATION SYSTEM WITH
`'
`REMOTE ‘KEY SETTING
`
`30
`
`5
`
`1°
`
`BACKGROUND OF THE INVENTION
`1. Field of the Invention
`The present invention is a communication system,
`more particularly it is a secure communications system
`for maintaining secure communication between sub-
`scribers.
`2. Prior Art
`Prior art secure communication systems which utilize
`at least one working variable for enciphering and deci-
`phering secure messages transmitted therein, do not
`remotely select these working variables for purposes of 15
`retransmission of a secure message between subscribers
`in the system. These prior art systems utilize a working
`variable which must be known to all subscribers receiv-
`ing the secure message. This working variable, known
`by the subscribers, must be inserted into their enci- 19
`plrering/deciphering means in order to maintain secure
`communication. If each subscriber to the system has a
`different working variable, the one initiating the mes-
`sage in such a system must have at his disposal the
`working variable of the subscriber he wishes to call so 35
`that he may insert it in his enciphering/deciphering
`means in order to maintain a secure message between
`subscribers. This requires a substantial
`inventory of
`working variables at the place of message initiation, and
`reception, thus minimizing the security of the system.
`Another feature of prior art secure communication
`systems, which has limited desirability from a security
`viewpoint, is the -requirement that in order to change
`the working variables utilized in these systems these
`variables must be changed in accordance with a prede- 35
`termined schedule, known to all subscribers in the sys-
`tem; thus, there
`once again a minimization ofsecurity.
`In the-secure communication system of the present
`invention, the security liabilities of prior art systems are
`overcome by providing for an automatic reiterative 40
`replacement for the working variables of the system
`subscribers, and by providing a, means by which the
`working variable of the subscriber which is called is
`remotely selected for purposes of retransmission by the
`subscriber initiating the call. By reiteratively replacing 45
`the working variables automatically. there is no need
`for conforming to a rigid schedule known to all parties.
`By accomplishing remote selection and reiterative re-
`placement by some means external to the subscribers to
`the system, at some central location, an absolute maxi- 50
`miration of system security is provided. This is due to
`the singular remote location of the necessary infon1ra-
`tion, as opposed to the multiplicity of locations, one at
`each subscriber, necessary in prior art systems, as well
`as the fact that the actual working variable which is 55
`utilized, at any given time, is unknown to all subscribers
`in -the system, the setting of the enciphering/decipher
`ing means of the subscribers being accomplished auto-
`matically with information received from a remote
`selection means. Furthermore, the security of the sys- 60
`tem of the present invention is enhanced due to the ease
`of reiterative replacement, which may occur as often as
`once per message instead of once per day, or once per
`plurality of messages, as in prior art systems.
`Prior art subscription television systems employing 65
`remote selection of switch setting information in order
`to allow the subscriber to receive a scrambled subscrip-
`tion television picture cannot provide for remote selec-
`
`2
`tion of a working variable in the sense that theswitch
`setting information received is not utilized to transmit a
`secure message between the subscriber and another
`subscriber, but rather merely to receive information
`already existent.
`SUMMARY OF THE INVENTION
`
`An object of this invention is to provide a new and
`improved secure communication system which over-
`comes the disadvantages of the prior art.
`Another object of the present invention is to provide
`a new and improved secure communication system
`wherein the information necessary to enable secure
`communication is remotely selected.
`Another object of the present invention is to provide
`a new and improved secure communication system
`wherein the information necessary to enable secure
`communication is reiteratively varied.
`SUMMARY
`
`With these objects in view a secure communication
`system may include a remotely selectable means for
`selecting a key-setting variable and a unique variable
`and transmitting the remotely selected key-setting vari-
`able, the remotely selectable means including a means
`for reiteratively replacing the key-setting variable when
`the key-setting variable is remotely selected, the reitera-
`tive key-setting variable replacement replacing the key-
`setting variable necessary to maintain secure communi-
`cation the next successive time remote selection occurs;
`a first means for initiating remote selection, for receiv-
`ing the transmitted remotely selected key-setting vari-
`able, and for transmitting a secure communication enci-
`phered in accordance with key-setting variable, the first
`receiving means being unique to the unique variable;
`and a second means for receiving communications from
`the first receiving means using the most recently ob-
`tained key~setting variable to enable secure communica-
`tion between the first and second receiving means.
`Other objects and many of the intended advantages
`of this invention will be readily appreciated as the in-
`vention becomes better understood by reference to the
`following description when taken in conjunction with
`the following drawings wherein:
`FIG. 1 is a functional diagram of a system which is a
`preferred embodiment of the present invention, and
`FIG. 2 is a functional diagram of a portion of the
`system shown in FIG. 1.
`Referring now to FIG. 1, which is a functional dia-
`gram of the entire system of the present invention, a
`general
`telephone switching network is shown. al-
`though the basic theory underlining the system is func-
`tional with any type of communication media. A sub-
`scriber has a secure module 1|] comprising a standard
`telephone transceiver 11; a standard vocoder 12, or
`other speech-to-digit converter means such as a delta-
`rnodulation codes‘, or other digital communication de-
`vice, such as a teletypewriter; a key generator 15; a
`modem 16, which is a standard modulator-demodulator
`communication device for accomplishing conversion of
`a digital signal to an analog type signal, and vice versa,
`for direct delivery to and from a telephone network;
`and a system control switching network 17, shown in
`more detail in FIG. 2, which supervises the overall
`operation of the subscriber module ltl. Each subscriber
`to the system has an identical secure module with re-
`
`Apple v. PMC
`|PR2016-00753
` Page 4
`
`PMC Exhibit 2097
`
`PMC Exhibit 2097
`Apple v. PMC
`IPR2016-00753
`Page 4
`
`

`
`3
`spect to structure, differing only in its associated secu-
`rity parameters, as will be explained herein below.
`The key distribution center 20 is the heart of the
`system in that it provides the remote selection capabil-
`ity, as well as the reiterative replacement capability, of 5
`the present invention. The key distribution center 20,
`which is centrally located with respect to the subscrib-
`ers to the system, comprises a standard computer 21,
`which has an associated storage means 22; a random
`state generator 24, for generating random variables to ID
`enable reiterative replacement, to be described later; a
`key generator 25; a modem 26; and a standard commu-
`nication line-finder device 27, which acts as a concen-
`trator and selects the open terminal pair of the modem
`26 when contacted by a subscriber,
`the modem 26 15
`shown as a singular modem having a plurality of termi-
`nal pairs, rather than a plurality of modems, for illustra-
`tive purposes. The key distribution center 20 may also
`contain an update generator 28, shown by hidden lines,
`when an alternate embodiment of the general system is 20
`utilized, to be explained later.
`Just as the key distribution center 20 is the heart of
`the entire system, the system control switching network
`17, shown in more detail in FIG. 2, is the heart of the
`subscriber module 10, as it controls the sequence of 25
`operations occurring in the subscriber module 10, from
`the initiation of a call to another subscriber in the sys-
`tem, until the cessation of contact with the called sub-
`scriber, and the going off line. The system control
`switching network 17 contains a storage device 29,
`which may be any type of standard storage device com-
`prising either a permanent storage (read only) and tem-
`porary storage (read-write) portion, or be completely of
`the read-write variety. The selection of storage device
`29 is merely a matter of choice, the system functioning
`equally well with other types of storage. For purposes
`of explanation, we will assume that a permanent stor-
`age-temporary storage type of storage device 29 is uti-
`lized.
`
`30
`
`35
`
`A subscriber module storage device 29 would have in
`its permanent storage a unique key-setting variable,
`designated U, this unique key-setting variable being of a
`predetermined bit length, and being used for purposes
`of secure communication with the key distribution cen-
`ter computer 21,
`to be explained subsequently;
`the
`unique telephone number of the subscriber, designated
`T,-, consisting of the predetermined number of digits
`which are necessary to uniquely identify the subscriber
`in the system, the number of digits being dependent on
`the number of subscribers in the system; and the number
`of digits necessary to contact any subscriber in a world-
`wide system, for example 12 digits-, and the unique tele-
`phone number of the key distribution center 20, desig-
`nated Txoc. consisting of the predeterrnined number of
`digits necessary to contact the key distribution center 20
`from any point in a world-wide system, for example 12
`digits. The temporary storage portion of the subscriber
`module storage device 29 would contain a key-setting
`variable, designated V, this key-setting variable being
`utilized to maintain a secure communication between
`any subscribers in the system having this key-setting
`variable; and, after a call has been initiated to another
`subscriber in the system,
`this operation to be subse-
`quently explained, the telephone number of the sub-
`scriber being called, designated Tx, consisting of the
`predetennined number of digits necessary for contact-
`ing the called subscriber anywhere in the secure com-
`munication network, for example, 12 digits.
`
`45
`
`50
`
`55
`
`65
`
`4,182,933
`
`4
`key-distribution-center-computer-associated
`The
`storage device 22, which may be a drum storage, a tape
`storage, a disc storage, or any other acceptable comput-
`er-associated-storage means, would contain the unique
`variables and key-setting variables, associated with the
`telephone identification numbers of the subscribers, '1",-,
`Tx, for all the subscribers in the secure communication
`system.
`The function of the various key-setting variables in
`this system is to determine the key that is produced by
`the associated key generators, the key that is generated
`being generated from the key-setting variable, whether
`directly or indirectly, the generated key being utilized
`to encipher the communication in order to enable a
`secure message to be transmitted, and/or received. The
`key-setting variables associated with the key generators
`can be electrically changed so as to alter the key which
`is produced by the associated key generator, and thus
`vary the enciphering/deciphering of the message, en-
`abling a more secure system than possible in prior art
`devices. In one embodiment of the general system, the
`key-setting variable of the called subscriber is directly
`utilized as the dynamic working variable, which is the
`variable which is ultimately utilized by the associated
`subscriber key generators to enable secure communica-
`tion between associated subscribers whose key genera-
`tors are set in accordance with the dynamic working
`variable.
`In an alternate embodiment of the general
`system, the key-setting variable of the called subscriber
`is not directly utilized as the dynamic working variable,
`but
`instead is combined with an indicator variable,
`which is a variable which denotes the function to be
`performed on the key-setting variable to update it, to
`obtain the dynamic working variable which is utilized
`to set the associated subscriber key generators.
`The normal operating condition of all the subscriber
`modules 10 in the secure cornrnunication system of the
`present invention, when the telephone transceiver I1 is
`on-hook, in the particular embodiment where the key-
`setting variable is directly utilized as the dynamic work-
`ing variable, is to have the associated working key-set-
`ting variable, V, filled into its associated key generator
`15 while the subscriber is on-hook. so that he may re-
`ceive a
`secure communication immediately after
`contact is established without any further operation
`being necessary in order to place him in the secure
`mode, unless it is desired to override this automatic
`operation with a manual switch means, to be explained
`later. The normal operating condition of all the sub-
`scriber modules III in the secure communication system
`of the present invention, when the telephone trans-
`ceiver II is on-hook, in the alternate embodiment where
`the key-setting variable of the called subscriber is com-
`bined with an indicator variable to obtain the dynamic
`working variable, is to have the associated key genera-
`tor 15 blank while the subscriber is on-hook.
`
`OPERATION
`
`The operation of the secure communication system of
`the present invention, in order to enable a secure com-
`munication between subscribers for the system, differs
`slightly for each embodiment,
`the differences to be
`subsequently explained,
`the choice of embodiment
`being dependent on the degree of security desired.
`
`PREFERRED EMBODIMENT
`
`The operation of the system when the particular
`embodiment, wherein the key-setting variable is di-
`
`PMC Exhibit 2097
`
`Apple v. PMC
`IPR2016-00753
`
`Page 5
`
`PMC Exhibit 2097
`Apple v. PMC
`IPR2016-00753
`Page 5
`
`

`
`5
`rectly utilized as the dynamic working variable, will be
`described first. In this embodiment, the subscriber‘ initi-
`ating the call, for the purposes of illustration to be
`known as subscriber 1, dials the telephone number of
`the subscriber he wishes to call, for purposes of illustra-
`tion to be known as subscriber 2, in any known manner.
`This operation inputs the called subscriber's telephone
`number, letting this number be represented by T1, into
`the temporary storage portion of the calling subscriber
`module storage device 29,
`through the programmed
`sequencing switch 30, the sequencing switch 30 control-
`ling the sequence of operations performed at the sub-
`scriber module Ill and being a standard sequencing
`means such asseries of cyclical counters, the input to
`the switch being via a terminal pair 31-31 to the stor-
`age device 29 via another terminal pair 32-32. Sirnulta-
`neously with the insertion of the called subscriber tele-
`phone number, Tx, into the storage device 29, the pro-
`grammed sequencing swilch 30 selects the unique vari-
`able, U1, of its associated subscriber, which is initiating
`the call, and routes it to its associated key generator 15,
`via another terminal pair 35-35 where it replaces the
`working key-setting variable, V1, of the caller by reset-
`ting the key generator 15 using the unique variable, U1,
`which is a key-setting variable.
`the pro-
`After this operation has been performed,
`grammed sequencing switch 30 selects the telephone
`number of the key distribution center, Tgpc, from the
`permanent storage portion of the storage device 29, and
`routes it to the line 37-37 via a variable rate clock 40.
`which determines the proper readout rate, along the
`associated terminal pair 41-41 at the proper network
`rate determined by the clock 40, which for the Bell
`Telephone System would be 16 pulses per second, to
`the modem 16, where it is output over the telephone line
`37-37 to connect the subscriber to the key distribution
`center 20 through the general telephone switching net-
`work 42 via the path shown, for purposes of illustration,
`by hidden lines 43-43. There is a monitor device 45
`associated with the subscriber modem 16 which senses
`when the key distribution center 20 is on-line, due to a
`supervisory signal being received from the key distribu-
`tion center 20, such as a sudden cessation of the com-
`pleted ringing circuit.
`When the key distribution center 20 is called, the line
`finder 27 locates an open terminal pair to its associated
`modem 26, and a supervisory signal. as was just previ-
`ously described, is sent to the subscriber who has trans-
`mitted the telephone number of the key distribution
`center, Time, enabling contact to be established.
`When the subscriber receives the supervisory signal,
`from the key distribution center 20, the programmed
`sequencing switch 30 selects the predetermined number
`of digits necessary to uniquely identify the caller, T3,
`for purposes of illustration we will assume five digits.
`from the permanent storage portion of the storage de-
`vice 29, and the same predetermined number of unique
`identifying digits from the telephone number of the
`called subscriber, T3, in the example being given five
`digits are selected, and routes these to the phone line
`37-37 via the clock 40, and through the modem 16 at
`a rate higher than the telephone switching network rate,
`this rate once again determined by the clock 40, via the
`established path 43-43 to the key distribution center 20
`where it is routed to the computer 21. A higher infor-
`mation transfer rate is utilized due to the fact that the
`computer 21 information acceptance rate is faster than
`that of the telephone switching network 42, and this
`
`5
`
`10
`
`20
`
`25
`
`30
`
`35
`
`45
`
`55
`
`65
`
`4,182,933
`
`6
`will minimize the time necessary to obtain the security
`parameters, which are the key-setting variables.
`The computer 21 looks up in its associated storage 22
`the unique key-setting variable of the caller, Us, and the
`working key-setting variable, of the party being called,
`for purposes of illustration designated Vx, from the
`identification contact variables it has received, Tu, and
`Tx. The computer 21 then feeds the caller’s unique
`key-setting variable, U1,
`into a high speed dynamic
`logic key generator 25, as the enciphering variable
`which will determine the key generated by the key
`generator 25. The computer 21 then draws a new work-
`ing key-setting variable for the caller, V13. from the
`random state generator 24, which may be any random
`source, and puts this quantity in its temporary storage
`47.
`
`At this point, the computer 21 will generate a parity
`word so that error correction, or parity checking, may
`be accomplished in order to maintain the integrity of the
`transmission. If there is sufficit faith in the integrity of
`the transmission with the equipment that is utilized, the
`error correction procedure may be eliminated.
`Several schemes may be utilized in order to accom-
`plish parity checking. In one such scheme the computer
`21 generates a parity word from the bit stream com-
`posed of the working key-setting variables of the called
`subscriber, Vx, and the reiteratively-replaced, working-
`key-setting variable, V13, of the caller, in order to pro-
`vide a subscriber check of the accuracy of the transmis-
`sion. This parity word is transmitted along with the
`information.
`
`The computer 21 then inserts the working key-setting
`variable of the called subscriber, Vx, the reiteratively—
`replaced. working-key-setting variable of the caller,
`V1.,, and the parity word into its associated key genera-
`tor 25 where it is enciphered in accordance with the
`unique key-setting variable of the caller subscriber, U1.
`The computer 21 then transmits this information from
`the key generator 25 at the high computer 21 informa-
`tion rate to the caller subscriber via the established path
`43-43.
`.
`After this information is sent from the computer 21,
`the enciphered stream is received by the caller sub-
`scriber through its modem 16, where this enciphered
`stream is immediately routed to the key generator 15
`and deciphered. In this instance, it is not necessary to
`first go through the programmed sequencing switch 3|],
`this being the only such instance in which programmed
`sequencing switch 30 is bypassed. After this information
`is deciphered, the key generator 15 sends this informa-
`tion to the programmed sequencing switch 3rlJ,.which
`then commences parity checking by routing the infor-
`mation to the parity check device 48, which could be
`any standard parity checking device.
`If the parity check results in a lack of parity condi-
`tion, then a signal is sent to the caller, indicating parity
`does not exist and he must initiate the call again; a signal
`is also sent to the key distribution center 20. Upon re-
`ceipt of the lack-of-parity signal by the key distribution
`center 20, the computer 21 clears the reiterative-work-
`ing-key-setting-variable replacement of the caller, V1,,
`from its temporary storage 4‘! location and goes off-line.
`The caller must then reinitiate the operation if he still
`desires to contact the called subscriber. Since parity did
`not exist, the working key-setting variable of the caller
`was not reiteratively replaced, as it was not-inserted into
`the computer associated storage device 22.
`
`
`
`PMC Exhibit 2097
`
`Apple v. PMC
`|PR2016-00753
`
`Page 6
`
`PMC Exhibit 2097
`Apple v. PMC
`IPR2016-00753
`Page 6
`
`

`
`4,182,933
`
`7
`If the parity check results in an existence of parity
`condition, then a parity check signal indicating this is
`sent to the key distribution center 2|], and the reitera-
`tively-replaced, working-key-setting variable of the
`caller, V1::. is entered in the subscriber's storage device
`29 in place of the previous subscriber working key-sen
`ting variable V1; and the working key-setting variable
`of the called subscriber, Vx. is routed to the key genera-
`tor 15 in order to reset the key generator 15 to a new
`key in accordance with the working key-setting vari-
`able of the called subscriber, V,,, in place of the unique
`key-setting variable of the caller subscriber, U1.
`The parity check signal indicating an existence of
`parity condition that is transmitted to the key distribu-
`tion center 29, is routed to the computer 21, the com-
`puter 21 then entering the caller subscriber reiterative-
`working-itey-setting-variable-replacement, V1,,-,
`in its
`associated storage device 22 in place of the previous
`working key-setting variable of the caller subscriber,
`Vi, clears its temporary storage 47, and causes the key
`distribution center 20 to go off-line.
`After the caller subscriber enters the working key-
`setting variable of the called subscriber, V1. in its key
`generator 15, the programmed sequencing switch 30
`removes the telephone number of the called subscriber,
`T,,, from the temporary storage portion of its storage
`device 29, and routes this phone number, T3, to the
`phone line 37-37, via the clock 40, at the proper tele-
`phone switching network rate through its modem 16.
`If the called subscriber telephone is off-hook and a
`busy signal is received, or if no answer is received, or at
`any time when the caller subscriber hangs up by placing
`his telephone 11 on-hook, the working key-setting vari-
`able of the called subscriber, V5, is cleared from the key
`generator 15; the called subscriber's telephone number,
`T,,, is cleared from the storage device 29; and the sub-
`scriber module 10 reverts to the normal condition, in
`this case resetting the key generator 15 in accordance
`with the most recently obtained working key-setting
`variable associated with it, V1,.
`If the called subscriber answers, then a connection is
`established via a. path 51—5l, shown for illustrative
`purposes in FIG. 1 by hidden lines, and the secure com-
`munication enciphered by the key, generated in accor-
`dance with the called subscriber key-setting working
`variable, V,,, is received through the called subscriber’s
`modem 53, which is identical with the caller subscrib-
`er's modem 16, and routed to a digital-signal-rate detec-
`tor 54, which is a device which merely recognizes the
`transmission of a digital signal as opposed to an audio
`signal indicating the presence of cipher, the digital rate
`detector 54 being any standard bit rate detection means,
`such as a narrow filter at the frequency of the desired bit
`rate. The caller subscriber also transmits a cipher syn-
`chronizing stream in order to synchronize the key gen-
`erators 15, 55, which are identical structurally, although
`this structural identity is not necessary for the operation
`of this system.
`When the digital-signal-rate detector 54 of the called
`subscriber recognizes that it is cipher which is being
`transmitted, it passes this signal and routes it to the key
`generator 55 where it is deciphered and then, in turn,
`routed to the vocoder 56, and then to the associated
`telephone transceiver 57, whereby a secure commI.mica-
`tion is received.
`A secure conversation may then be carried on be-
`tween the subscribers, enciphered by the key derived in
`accordance with the working key-setting variable of the
`
`5
`
`25
`
`30
`
`35
`
`45
`
`50
`
`S5
`
`65
`
`called subscriber, V,,, a message proceeding from the
`telephone transceiver; through the vocoder; to the key
`generator, where it is enciphered; through the modem;
`through the general telephone switching network into
`the other party's modem; through his key generator,
`where it is deciphered; through this vocoder; to his
`telephone transceiver. After the call is completed, and
`the caller hangs up, as was previously stated, his module
`10 reverts to the normal condition, his key generator 15
`being reset in accordance with his most recently ob-
`tained working key-setting variable, V1,. There is no
`need for the key generator 55 of the called subscriber to
`be reset as it is already in its normal state, V3, when the
`called subscriber hangs up.
`If it is desired, reiterative replacement can be applied
`to the working key-setting variable of the called sub-
`scriber, as well as the caller subscriber, so that it would
`not be necessary for the called subscriber to initiate a
`telephone call to another subscriber in order to have his
`working key-setting variable, Vx, reiteratively replaced.
`A possible procedure for accomplishing this, when the
`above-described embodiment is utilized, is to have the
`programmed sequencing switch of the called sub-
`scriber, after he goes off-line, select the telephone num-
`ber of the key distribution center, Tgpc, from his stor-
`age device and route it to the telephone line, then to the
`key distribution center 20 thus establishing a connection
`path 6lJ—6lJ, shown for illustrative purposes in FIG. 1
`by hidden lines, and the same reiterative replacement
`operation as was previously described for the caller
`subscriber would occur, with the exception that, since
`another subscriber is not being called, the computer 21
`will not receive any called subscriber telephone num-
`ber, T,,, but rather will recve a stream of zeros in its
`place, since this position has been cleared from the
`storage device of the subscriber.
`Upon receipt of this stream of zeros in place of Tx,
`the computer 21 will know that it is reiteratively replac-
`ing the called subscriber’s working key-setting variable
`Vx. When parity exists and the key distribution center
`20 goes off-line,
`the reiterative replacement of the
`working key setting variable, V,,, will be completed; the
`new reiterative replacement working key-setting vari-
`able, V,,,,, will have been inserted in the computer asso-
`ciated storage device 22 in place of the previous work-
`ing key-setting variable, V,,; and the key generator 55 of
`the called subscriber will have been reset in accordance
`with the new reiterat.ive-replacement-working-key-seb
`ting-variable, V”. The called subscriber will then also
`go off-line.
`ALTERNATE EMBODIMENT
`
`The operation of the system when the particular
`embodiment wherein the key-setting variable of the
`called subscriber is combined with an indicator variable
`to obtain the dynamic working variable is utilized will
`now be described. In this embodiment, the subscriber
`key generators 15, 55 are blank in the normal state, as
`was previously mentioned.
`The subscriber initiating the call, subscriber 1, does so
`in the same manner as in the previously described em-
`bodiment. The subsequent procedure for contacting the
`key distribution center 20, including selecting U: from
`the subscriber associated storage device 29 and routing
`it to the associated key generator 15, where it resets the
`key generator 15, is also accomplished in the same man-
`ner as for the previously described embodiment, with
`the exception that the key generator 15 is reset from its
`
`-
`
`-
`
`PMC Exhibit 209
`
`Apple v. PMC
`|PR2016-00753
`
`Page 7
`
`PMC Exhibit 2097
`Apple v. PMC
`IPR2016-00753
`Page 7
`
`

`
`4, 182,933
`
`10
`
`9
`normal blank state rather than the normal V1 state of the
`previous embodiment.
`The operation of the key distribution center 20 in this
`instance is similar to the operation previously described,
`with the exception of the selection of an indicator vari-
`able for the called subscriber and the derivation of the
`dynamic working variable of the called subscriber from
`the indicator variable and key-setting variable, this op-
`eration to be subsequently described.
`After the caller subscriber, subscriber L has transmit-
`ted the caller and called subscriber contact variables.
`T, and Tn‘, necessary to uniquely identify the subscrib-
`ers in the system, to the key distribution center 20, the
`computer 21 looks up in its associated storage 22 the
`unique key-setting variable of the caller, U1, and the
`key-setting variable of the party being called. V,., from
`the identification contact variables it has received, as in
`the previously described embodiment.
`The computer 21 then draws a new key-setting vari-
`able for the caller, V1,-,, and an indicator variable for the
`called subscriber, 1,

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket