`
`•
`
`to said third computer of particular identifying information
`and a particular instruct-to-receive signal causing said
`third computer to determine that it is not prepared to
`receive information and to respond with a particular call-
`s back signal. Said call-back signal instructs controller, 20,
`to def er further execution of the third stage until a
`particular deferred time--the first waiting moment after 1:00
`AM the ·following morning--and causes controller, 20, to
`execute a preprogrammed time-check-and-determining sequence.
`1o Under control of said sequence, as a regular step in the
`sequence of the aforementioned polling fashion, controller,
`20, checks the time of clock, 18, and determines whether said
`clock time is after said deferred time.
`Having deferred further execution of the third stage,
`15 controller, 20, proceeds with other processing. The third
`stage is the final stage of said automatic telephone signal
`record transfer sequence. Accordingly, controller, 20,
`starts polling for instructions and commences regularly
`executing said redial and said time-check-and-determining
`
`20 se~ences.
`Subsequently, in the course of executing said redial
`instructions, controller, 20, and said second computer
`establish telephone communications in the fashion described
`in the first stage above. Controller, 20, then causes the
`25 transfer to said second computer of particular identifying
`information followed by a particular instruct-to-receive
`signal causing said second computer to respond with a
`particular start signal that causes controller, 20, to cause
`the transmitting of all recorded meter charge records to said
`30 second computer. When recorder, 20, finishes transmitting
`meter charge information, controller, 20, transmits a
`particular acknowledge receipt instruction to said second
`computer. Automatically said second computer responds with a
`particular transmission complete signal that causes
`controller, 20, to terminate said telephone call then to
`
`35
`
`- 275 -
`
`•
`
`•
`
`•
`
`•
`
`•
`
`•
`
`•
`
`•
`
`•
`
`•
`
`•
`
`PMC Exhibit 2135
`Apple v. PMC
`IPR2016-00754
`Page 302
`
`
`
`•
`
`•
`
`5
`
`cause recorder, 16, to erase from memory all said meter
`charge information. Then, in a preprogrammed fashion,
`controller, 20, deactivates the redial sequence instruction
`portion of said polling sequence.
`So completing the second stage causes controller, 20,
`once again to commence polling for instructions.
`Subsequently, controller, 20, determines that said
`clock time is after said def erred time which causes
`controller, 20, automatically to deactivate said time-check-
`10 and-determining sequence sequence and recommence said third
`stage. Automatically, controller, 20, reestablishes
`telephone communications with said third computer and causes
`said third computer to transfer to controller, 20, its
`particular start signal. Then controller, 20, causes the
`15 transmitting of all recorded monitor records to said third
`computer. When said transmitting is finished, controller,
`20, transmits a particular acknowledge receipt instruction to
`said third computer. Automatically said third computer
`responds with a particular transmission complete signal that
`20 causes controller, 20, to terminate said telephone call then
`to cause recorder, 16, to erase from memory all said monitor
`record information.
`Completing the final deferred instructions of said
`automatic telephone signal record transfer sequence causes
`25 controller, 20, to end said sequence and commence processing
`in the conventional fashion.
`In examples #3 and #4 (and #5 if information of said
`1st-new-program-message (#5) reaches buffer/comparator, 14,
`before any other instance of monitor information), receiving
`30 the first message of the "Wall Street Week" program causes
`the apparatu~ of the Fig. 3 subscriber station to carry out
`-
`said signal record transfer sequence. Simultaneously, other
`stations have reached a similar level of fullness, and said
`command causes said other stations also to execute said
`transfer sequence. Accordingly, not only does transmitting
`
`35
`
`- 276 -
`
`•
`
`•
`
`•
`
`•
`
`•
`
`•
`
`•
`
`•
`
`•
`
`•
`
`•
`
`•
`
`PMC Exhibit 2135
`Apple v. PMC
`IPR2016-00754
`Page 303
`
`
`
`••
`
`•
`
`10
`
`said first message cause all the functions described above in
`example #3 and #4 (and #5), transmitting said message also
`causes apparatus at one and more subscriber stations to
`transfer recorded information selectively to one and more
`5 remote stations at the time of execution and at def erred
`times, causes computers at said stations to process said
`information, and causes said computers to transfer
`information, point-to-point, to said subscriber station
`apparatus.
`Examples #3, #4, and #5 do not show the second message
`of the "Wall Street Week" program causing information to be
`recorded at the recorder, 16, of the subscriber station of
`Fig. 3. Accordingly, said message does not cause apparatus
`of said station to transfer of record information to one or
`15 more remote station computers .
`Nevertheless, it is clear from the above exposition
`that the transmission of any SPAM command (including the
`pseudo command) that includes meter-monitor information can
`cause monitor record information to be recorded at the
`20 recorder, 16, of selected stations-and can cause signal
`processors, 200, at selected ones of said stations (that is,
`at stations where recorders, 16, equal or exceed particular
`fullness information} to transfer meter and/or monitor record
`information selectively to one or more remote stations and
`25 cause computers at said stations to process the information
`in the fashions described herein.
`(Indeed, as the above exposition makes clear, the
`impact of the transmission of SPAM information can be yet
`more complex and meaningful.
`In example #4, receiving the
`30 second message does cause selected stations to record monitor
`record information the recorders, 16, of said stations. Said
`stations are those stations that are preprogrammed to collect
`monitor information at which the first message is not
`decrypted but the second message is; at which, as a
`35 consequence, program unit identification information does not
`
`- 277 -
`
`•
`
`•
`
`•
`
`•
`
`•
`
`•
`
`•
`
`•
`
`•
`
`•
`
`•
`
`•
`
`PMC Exhibit 2135
`Apple v. PMC
`IPR2016-00754
`Page 304
`
`
`
`•
`
`•
`
`exist at SPAM-first-precondition memories and, hence, where
`Fig. 1C combinings fail to occur because the first
`precondition is not satisfied; and at which, as a
`consequence, receiving said second messages causes a 2nd
`5 monitor information (#4) transmission and causes processing
`of said 2nd monitor information (#4) at buffer/comparators,
`14. At said stations, because no monitor information of the
`first "Wall Street Week" program message was previously
`processed--because none was decrypted--monitor record ·
`10 information of prior programming still exists at said
`buffer/comparators, 14, when said 2nd monitor information
`(#4) is received at said buffer/comparators, 14. At selected
`ones of said stations which ones where recorders, 16, will
`equal or exceed particular fullness information when the next
`15 instance of record information is recorded, receiving said
`second message causes the recording of said monitor record
`information of prior programming, causes the transferring of
`meter and/or monitor record information selectively to one or
`more remote stations, and causes computers at said stations
`20 to process the information in the fashions described herein.)
`
`REGULATING THE RECEPTION AND USE OF PROGRAMMING
`(INCLUDING EXAMPLE # 6)
`Examples #2 and #4, above, illustrate methods of
`25 controlling encryption and decryption means, well known in
`the art, within signal processing systems to regulate (and
`meter) the reception and use of control instructions that
`generate combined medium overlay information and cause
`combinings to commence and cease at selected stations. Said
`30 means and methods involve the operation of preprogrammed
`cipher keys (such as keys J and Z) and cipher algorithms to
`decrypt transmitted information.
`The present invention includes other apparatus and
`methods for regulating the reception and use of combined
`medium control instructions, and the apparatus and methods of
`
`35
`
`- 278 -
`
`•
`
`•
`
`•
`
`•
`
`•
`
`•
`
`•
`
`•
`
`•
`
`•
`
`•
`
`•
`
`PMC Exhibit 2135
`Apple v. PMC
`IPR2016-00754
`Page 305
`
`
`
`•
`
`•
`
`the present invention that are used to control (and meter)
`combined medium communication can also regulate the reception
`and use of prior art electronic programming transmissions .
`In the prior art, various means and methods exist for
`5 regulating the reception and use of electronically
`transmitted programming. Various scrambling means are well
`known in ~he art for scrambling, usually the video portion of
`analogue television transmissions in such a fashion that only
`subscriber stations with appropriate descrambling means have
`10 capacity to tune suitably to the television transmissions and
`display the transmitted television image information •
`Encryption/decryption means and methods, well known in the
`art, can regulate the reception and use of, for example,
`digital video and audio television transmissions, digital
`15 audio radio and phonograph transmissions, digital broadcast
`print transmission, and digital data communications. Other
`techniques, well known in the art, involve controlling
`interrupt means that may be as simple as on/off switches to
`interrupt or disconnect programming transmissions at stations
`20 that lack authorizing information or are determined in other
`fashions not to be duly authorized. Still other techniques,
`also well known in the art, involve controlling jamming means
`that spoil transmitted programming at stations that lack
`authorizing information or are determined not to be duly
`25 authorized, thereby degrading the usefulness of said
`programming. Such other techniques include, for example,
`inserting so-called "noise" into the transmitted programming
`which noise may be, for example, overlays of one or more
`separate transmissions.
`The means and methods of the present invention for
`regulating reception and use of programming relate, in
`particular, to three features of the present invention. The
`computer system of the present invention has capacity at each
`subscriber station to compute station specific information
`35 based on preprogrammed information that exists at each
`
`30
`
`- 279 -
`
`•
`
`•
`
`•
`
`•
`
`•
`
`•
`
`•
`
`•
`
`•
`
`•
`
`•
`
`PMC Exhibit 2135
`Apple v. PMC
`IPR2016-00754
`Page 306
`
`
`
`•
`
`•
`
`station and that differs from station to station. Given this
`capacity, any central control station of the present
`invention that originates a SPAM transmission can cause
`subscriber station apparatus to decrypt received SPAM
`5 information in different fashions with each station
`decrypting its received information is its own station
`specific fashion. A central station can cause different
`stations to compute different station specific decryption
`cipher keys and/or algorithms to use in any given step of
`lO decryption or to compute station specific key and/or
`algorithm identification information that differs from
`station to station and controls each station in identifying
`the key and/or algorithm to use for any given step of
`decrypting. A second feature of the present invention is
`15 that effective SPAM processing depends on the correspondence
`between the transmitted SPAM information that causes
`processing at the subscriber stations and the information
`preprogrammed at the various stations that controls the SPAM
`processing at each station.
`In order for any given SPAM
`20 execution segment to invoke any given controlled function at
`any given station, the received binary information of said
`segment (for example, "010011") must match preprogrammed
`controlled-function-invoking information ("010011") at each
`station. This feature permits each station to be
`25 preprogrammed with station specific controlled-function- ·
`invoking information that differs from station to station
`(which means that no single SPAM execution segment could
`invoke a given function at all stations without first being
`processed at selected stations to render its information to
`correspond to the station specific preprogrammed invoking
`information ·of said stations) . The third feature of the
`present invention is an extended system of means and methods
`for regulating the reception and use of SPAM information-(cid:173)
`including decryption key and algorithm information--that is
`illustrated in Fig. 4 and discussed more fully below •
`
`30
`
`35
`
`- 280 -
`
`•
`
`•
`
`•
`
`•
`
`•
`
`•
`
`•
`
`•
`
`•
`
`•
`
`•
`
`•
`
`PMC Exhibit 2135
`Apple v. PMC
`IPR2016-00754
`Page 307
`
`
`
`.• -
`
`•
`
`•
`
`•
`
`•
`
`•
`
`•
`
`•
`
`•
`
`•
`
`•
`
`•
`
`•
`
`•
`
`•
`
`- 281 -
`
`By themselves, the first and second features provide a
`technique whereby a message such as the second message of the
`"Wall Street Week" program can take affect at only selected
`stations (such as those stations preprogrammed with
`5 decryption key J) without being decrypted at said stations.
`(Hereinafter, this technique is called "covert control.")
`An example #6, that focuses on the second message of
`the "Wall Stree:t Week" program and is set within the context
`of example #4, illustrates the operation of covert control.
`In examples #1, #2, #3, and #4, the information of the
`execution segment of said second message, when unencrypted,
`is identical from example to example. For example, if said
`information is 11 100110 11 in example #1, it is 11 100110 11 in
`example #3 and, after decryption, in examples #2 and #4. And
`15 the preprogrammed execute-conditional-overlay-a~-205
`information that said information of the execution segment
`matches when compared -with controlled-function-invoking
`information is also 11 100110 11 •
`But in example #6 the information of the execution
`segment of said second message is different; for example,
`said information is 11 111111 11
`• And the particular binary
`n\1$er that is selected-- 11 111111 11 in the particular example-(cid:173)
`is selected because no subscriber station is preprogrammed,
`at the outset of the example, with any controlled-function-
`25 invoking information that is 11 111111 11
`(In other words, were
`said "111111 11 information of the execution segment
`transmitted without any other action taking place first,
`transmitting said information would cause no controlled
`function to be executed at any subscriber station because
`said information would not match any controller-function-
`invoking information at any station.)
`In example #6, two particular messages are transmitted
`each of which consists of a "Ol" header; execution, meter(cid:173)
`monitor, and information segments; and an end of file signal.
`(Hereinafter, said messages are called the "1st supplementary
`
`10
`
`20
`
`30
`
`35
`
`PMC Exhibit 2135
`Apple v. PMC
`IPR2016-00754
`Page 308
`
`
`
`•
`
`•
`
`In
`message (#6)" and the "2nd supplementary message (#6)".)
`each message, the information of said segments is encrypted
`prior to transmission in the same fashion that the
`information of the first message of example #4 is encrypted,
`5 except that the encryption is done with key J rather than key
`Z and the encrypted information of the execution segment
`instructs subscriber stations to decrypt with key J •
`The "Wall Street Week" program originating studio
`embeds and transmits the 1st supplementary message (#6)
`10 before transmitting said second message.
`Just as is the case with the first message of example
`#4, at the subscriber station of Fig. _3
`(and at other
`stations that are preprogrammed with decryption key J),
`receiving the 1st supplementary message (#6) causes the
`15 apparatus of said station to decrypt said message (using key
`J) and execute any controlled functions that are invoked by
`the unencrypted execution segment of said message.
`Automatically, control processor, 39J, causes decryptor, 39K,
`to receive the information of said message; decryptor, 39K,
`decrypts the encrypted information of said message and
`transfers said message to EOFS valve, 39H; and EOFS valve,
`39H, inputs the information of said message, unencrypted, to
`control processor, 39J, until the end of file signal of said
`message is detected. Automatically, control processor,_39J,
`compares the unencrypted information of the execution segment
`in said message to the aforementioned controlled-function(cid:173)
`invoking information, and a match occurs with particular
`preprogrammed execute-at-39J information that causes control
`processor, 39J, to execute particular preprogrammed load-and(cid:173)
`run-at-39J instructions.
`Executing said instructions causes control processor,
`39J, to record the received SPAM information of said 1st
`supplementary message (#6) in a fashion similar to the
`recording of the first message of example #4 except that the
`information of the information segment of said 1st
`
`20
`
`25
`
`30
`
`35
`
`- 282 -
`
`•
`
`•
`
`•
`
`•
`
`•
`
`•
`
`•
`
`•
`
`•
`
`•
`
`•
`
`•
`
`PMC Exhibit 2135
`Apple v. PMC
`IPR2016-00754
`Page 309
`
`
`
`•
`
`•
`
`supplementary message (#6) is recorded at particular RAM
`associated with control processor, 39J, rather than
`particular RAM of microcomputer, 205. Automatically, control
`processor, 39J, records all remaining command information of
`5 said 1st. supplementary message (#6) together with any padding.
`bits immediately following said command at the aforementioned
`SPAM-input-signal register memory then continues receiving
`the SPAM information of said message and loads said
`information (which is the information of the information
`10 segment of said message) at particular working memory of said
`RAM associated with control processor, 39J .
`In due course, EOFS valve, 39H, receives complete
`information of the end of file signal that ends said 1st
`supplementary message (#6). Receiving said information
`15 causes EOFS valve, 39H, to transmit the aforementioned
`interrupt signal of EOFS-signa1-detected information to
`control processor, 39J.
`Receiving said signal while under control of said
`load-and-run-at-39J instructions causes control processor,
`20 39J, to execute the information of the information segment of
`said 1st supplementary message {#6) that is loaded at said
`RAM as the so-called machine language instructions of one so(cid:173)
`called job •
`Executing said information causes control processor,
`25 39J, in the predetermined fashion of the said information
`that is preprogrammed at said RAM at the time of execution by
`virtue of being so loaded prior to being so executed, to
`locate the location of that particular instance of
`controlled-function-invoking information that is "lOOl.l.O"
`(which is the execute-conditional-overlay-at-205 information
`that causes control processor, 39J, to execute the controlled
`function of said conditional-overlay-at-205 instruction) and
`modify the information at said location to be "l.ll.l.ll. 11 •
`(Simultaneously, other control processors, 39J, and at other
`stations that are preprogrammed with decryption key J execute
`
`30
`
`35
`
`- 283 -
`
`•
`
`•
`
`•
`
`•
`
`•
`
`•
`
`•
`
`•
`
`•
`
`•
`
`•
`
`•
`
`PMC Exhibit 2135
`Apple v. PMC
`IPR2016-00754
`Page 310
`
`
`
`.-
`
`•
`
`•
`
`•
`
`•
`
`•
`
`•
`
`•
`
`•
`
`•
`
`•
`
`•
`
`•
`
`•
`
`5
`
`1o
`
`information of loaded information of said information segment
`and modify information of the execute-conditional-overlay-at-
`205 information, at said control processors, 39J, to be
`11 1.11111 11 . )
`In this fashion, the execute-conditional-overlay-at-
`205 information at the control processors, 39J, of those
`selected subscriber stations that are preprogrammed with
`information of decryption key J is altered from its standard
`11 10011.0" and becomes "l.l.1111 11 •
`Accordingly, when the second message of the "Wall
`Street Week" program of example #6 is transmitted with its
`11 111111 11 execution segment, said message is processed at
`those stations that are preprogrammed with said information
`of decryption key J precisely as the second message of
`(At all other
`15 example #3 is processed at said stations.
`stations, all information of said message is automatically
`discarded because the "11111.1" information of its execution
`segment fails to match any preprogrammed controlled-function(cid:173)
`invoking information.)
`The "Wall Street Week" program originating studio
`embeds and transmits the 2nd supplementary message (#6)
`after transmitting said second message.
`At the subscriber station of Fig. 3 (and at other
`stations that are preprogrammed with decryption key J),
`receiving said 2nd supplementary message (#6) causes
`precisely the same processing that is caused by receiving the
`1st supplementary message (#6) with just one exception •
`Whereas executing the loaded information of the information
`segment of the 1st supplementary message (#6) causes control
`processor, 39J, to locate that instance of controlled-
`function-invoking information that is 11 100110 11 and modify the
`information at the location of said 11 100110" to be 11 111111. 11 ,
`executing the loaded information of the information segment
`of the 2nd supplementary message (#6) causes control
`processor, 39J, to locate that instance of controlled-
`
`20
`
`25
`
`30
`
`35
`
`- 284 -
`
`PMC Exhibit 2135
`Apple v. PMC
`IPR2016-00754
`Page 311
`
`
`
`•
`
`•
`
`,
`
`function-invoking information that is 11 111111" and modify the
`information at the location of said 11 111111" to be 11 100110 11 •
`In this fashion, the execute-conditional-overlay-at-
`205 information at the control processors, 39J, of those
`5 selected subscriber stations that are preprogrammed with
`information of decryption key J is returned to its standard
`(Hereinafter, the normal binary value of a
`value: "10011.0" •
`given instance of information that invokes a preprogrammed
`function--such as, for example, the 11 100110 11 that is the
`10 normal value of said execute-conditional-overlay-at-205
`information--is called a "standard control-invoking value",
`and a value that temporary replaces a standard control(cid:173)
`invoking value in the course a covert control application-(cid:173)
`such as "111111." in example. #6--is _called a "covert control-
`15 invoking value".)
`Covert control provides significant benefits. One
`benefit is speed. For example, when covert control is
`employed, no time is spent decrypting messages (such as the
`second "Wall Street Week" message of examples #2 or #4) that
`convey combining synch commands. Thus the shortest
`possible interval of time can exist between the moment when a
`given combining synch command {such as the command of said
`second message) is embedded at the program originating studio
`and transmitted and the moment when it causes combining at
`those selected stations at which it causes combining. A
`second benefit arises out of the capacity to repeat.
`In
`example #6, after transmitting said 1st supplementary message
`{#6) and causing the covert control-invoking value, 11 111111 11
`to replace the standard control-invoking value of the
`execute-conditional-overlay-at-205 information at those
`selected subscriber stations that are preprogrammed with
`decryption key J, the "Wall Street Week" program originating
`studio can invoke the aforementioned conditional-overlay-at-
`205 instructions at said selected stations not just once but
`many time by transmitting execution segments that are
`
`20
`
`25
`
`30
`
`35
`
`- 285 -
`
`•
`
`•
`
`•
`
`•
`
`•
`
`•
`
`•
`
`•
`
`•
`
`•
`
`•
`
`•
`
`PMC Exhibit 2135
`Apple v. PMC
`IPR2016-00754
`Page 312
`
`
`
`•
`
`•
`
`"1111.11." before transmitting said 2nd supplementary message
`(#6) and causing the standard control-invoking value of said
`execute-conditional-overlay-at-205 information, "l.001.10", to
`replace said covert control-invoking value at said selected
`5 stations.
`Fig. 4 shows the Signal Processing Programming
`Reception and Use Regulating System that is the third feature
`of the present invention.
`The subscriber station of Fig. 4 has capacity for
`1o receiving wireless television programming transmissions at a
`conventional antenna, 1.99, and a multi-channel. cable
`transmission at converter boxes, 201. and 222. Said boxes,
`201 and 222, are conventional cable converter boxes with
`capacity, well known in the art, for receiving information of
`15 a selected channel of a multiplexed multi-channel
`transmission and converting the selected information to a
`given output frequency. The selected channels whose
`information is received at said boxes, 201. and 222
`respectively, are selected by tuners, 21.4 an~ 223
`20 respectively, which are conventional tuners, well known in
`the art, each with capacity for tuning to a selected channel.
`Antenna, 199, and boxes, 201. and 222, transmit their received
`information to matrix switch, 258, which is a conventional
`matrix switch, well known in the art, with capacity for
`25 receiving multiple inputs and outputting said inputs
`selectively to selected output apparatus. One apparatus that
`said switch has capacity for outputting to is television
`tuner, 21.5. However, the configuration Fig. 4 differs from
`the configuration of Figs. l. and 3 in that television tuner,
`215, outputs its audio and video outputs to said matrix
`switch, 258, rather than to monitor, 202M, and divider, 4,
`respectively.
`Instead, in Fig. 4, it is said switch, 258,
`that outputs the information that is input.to said monitor,
`202M, and divider, 4; Fig. 4 shows five additional devices-(cid:173)
`three decryptors, 107, 224 and 231., a signal stripper, 229,
`
`30
`
`35
`
`- 286 -
`
`•
`
`•
`
`•
`
`•
`
`•
`
`•
`
`•
`
`•
`
`•
`
`•
`
`•
`
`•
`
`PMC Exhibit 2135
`Apple v. PMC
`IPR2016-00754
`Page 313
`
`
`
`•
`
`•
`
`- 287 -
`
`and a signal generator, 230--associated with matrix switch,
`258. Decryptors, 107, 224 and 231, are conventional
`decryptors, well known in the art, with capacity for
`receiving encrypted digital information, decrypting said
`5 information by means of a selected cipher algorithm and a
`selected cipher key, and outputting the decrypted
`information. Signal stripper, 229, is a conventional signal
`stripper, well known in the art, with capacity for receiving
`a transmission of video information, removing embedded or
`10 otherwise inserted signal information selectively, and
`outputting the transmission absent the removed information .
`Signal generator, 230, is a conventional signal inserter,
`well known in the art, with capacity for receiving a
`transmission of video information, embedding or otherwise
`15 inserting signal information selectively, and outputting the
`transmission with the embedded or otherwise inserted
`information. Matrix switch, 258, has capacity for outputting
`selected inputted transmissions to each said five devices,
`and each of said devices processes its inputted information
`20 in its specific fashion and outputs its processed information
`to said switch, 258.
`As Fig. 4 shows, signal processor, 200, controls all
`the aforementioned apparatus. Signal processor, 200,
`controls the tuning of tuners, 21.4, 215,· and 223; controls
`the switching of matrix switch, 258; supplies cipher
`algorithm and cipher key information to and controls the
`decrypting of decryptors, 107, 224 and 230; controls signal
`stripper, 229, in selecting transmission locations and/or
`information to strip and in signal stripping; and controls
`signal generator, 230, in selecting transmission locations at
`which to insert signals, in generating specific signals to
`insert, and in inserting.
`In addition, Fig. 4 also shows divider, 4, monitor,
`202M, decoder, 203, and microcomputer, 205, all of which
`function and are controlled as in Figs. 1 and 3.
`
`25
`
`30
`
`35
`
`•
`
`•
`
`•
`
`•
`
`•
`
`•
`
`•
`
`•
`
`•
`
`•
`
`•
`
`•
`
`PMC Exhibit 2135
`Apple v. PMC
`IPR2016-00754
`Page 314
`
`
`
`·- -
`
`•
`
`•
`
`•
`
`•
`
`•
`
`•
`
`•
`
`•
`
`•
`
`•
`
`•
`
`•
`
`•
`
`Finally, Fig. 4 shows local input, 225, well known in
`the art, which has means for generating and transmitting
`control info~ation to controller, 20, of signal processor,
`ioo. The function of local input, 225, is to provide means
`5 whereby a subscriber may input information to the signal
`processor of his subscriber station, thereby controlling the
`functioning of his personal signal processor system is
`specific predetermined fashions that are described more fully
`below.
`In the preferred embodiment, local input, 225, is
`10 actuated by keys that are depressed manually by _the
`subscriber in the fashion of the keys of a so-called touch(cid:173)
`tone telephone or the keys of a typewriter (or microcomputer)
`keyboard. As Fig. 4 shows, microcomputer, 205, also has
`capacity for inputting control information to microcomputer,
`15 205, via decoder, 203, and in the preferred embodiment,
`microcomputer, 205, may also automatically substitute for
`local control, 225, in predetermined fashions in inputting
`control information to said controller, 20, on the basis of
`preprogrammed instructions and information previously
`inputted to said microcomputer, 205.
`
`20
`
`EXAMPLE #7
`OPERATING S. P. REGULATING SYSTEMS
`Example #7 illustrates the operation of the the signal
`processing regulating system of Fig. 4 and demonstrates the
`interaction of the aforementioned first and third features of
`the present invention--the capacity to compute station
`specific information at each subscriber station and the
`system of regulating (and metering) means and methods that is
`illustrated in Fig. 4.
`In example #7, the program originating studio that
`originates the "Wall Street Week" transmission transmits a
`television signal that consists of so-called "digital video"
`and "digital audio," well known in the art. Prior to being
`transmitted, the digital video information is doubly
`encrypted, by means of particular cipher algorithms A and B
`
`25
`
`30
`
`35
`
`- 288 -
`
`PMC Exhibit 2135
`Apple v. PMC
`IPR2016-00754
`Page 315
`
`
`
`•
`
`•
`
`and cipher keys Aa and Ba, in such a way that said
`information requires decryption at subscriber stations in the
`fashion described below. The digital audio is transmitted in
`the clear. Said studio transmits the information of said
`5 program to a plurality of intermediate transmission stations
`by so-called "landline" means and/or Earth orbiting satellite
`transponder means, well known in the art •
`Each of said intermediate transmission stations
`receives the transmission originated by said studio and
`10 retransmits the information of said transmission to a
`plurality of ultimate receiver stations •
`In example #7, the intermediate station that
`retransmits "Wall Street Week" program information to the
`subscriber station of Fig. 4 is a cable television system
`15 head end (such as the head end of Fig. 6). Prior to
`retransmission, said station encrypts the digital audio
`information of said transmission, in a fashion well known in
`the art, using particular cipher algorithm c and cipher key
`ca, then transmits the information of said program on cable
`20 channel 13, commencing at a particular 8:30 PM time on a
`particular Friday night.
`In example #7, the controller, 20, of the signal
`processor, 200, of Fig. 4 is preprogrammed at a particular
`time with particular information that indicates that the
`25 subscriber of said station wishes to view said "Wall Street
`Week" program when transmission of said program on cable
`cable 13 commences •
`(So preprogramming controller, 20, can occur in
`several fashions. For example, prior to a particular time,
`30 a subscriber may.enter particular please-fully-enable-WSW-on(cid:173)
`CC13-at-particular-8:30 information at local input, 225, and
`cause said information, in a predetermined fashion, to be
`inputted to controller, 20, by local input, 225.
`Alternately, microcomputer, 205, can be preprogrammed with
`particular specific-WSW information and, in a predetermined
`
`35
`
`- 289 -
`
`-·-
`
`•
`
`•
`
`•
`
`•
`
`•
`
`•
`
`•
`
`•
`
`•
`
`•
`
`•
`
`PMC Exhibit 2135
`Apple v. PMC
`IPR2016-00754
`Page 316
`
`
`
`•
`
`•
`
`- 290 -
`
`fashion that is described more fully below, caused to
`input said please-fully-enable-WSW-on-CC13-at-particular-8:30
`information to said controller, 20.)
`Receiving any given instance of please-fully-enable-
`5 WSW-on-CC13-at-particular-8:30 information causes controller,
`20, in a predetermined fashion, to select particular WSW-on(cid:173)
`CC13-at-particular-8:30 information in said received
`information, record said selected info~ation at particular
`memory, and execute particular receive-authorizing-info-at-
`10 appointed-time instructions.
`In a predetermined fashion, executing said
`instructions causes