throbber
Expert Witness Coversheet
`
`United States District Court for the District of
`Colorado
`
`Broadcast Innovation, LLC v. Echostar
`Communications Corp, Hughes Electronics Corp,
`Directv, Thomson Multimedia, Dotcast, Pegasus
`Satellite Television Inc.
`
`
`
`Court:
`
`
`Case Name:
`
`
`Docket Number:
`
`Docket Line Number: 159
`
`EXPERT WITNESS DOCUMENT:
`
`01-WY-2201 AJ
`
`
`
`
`___
`
`___
`
`__x
`____
`
`Expert transcript (ET)
`Expert deposition (ED)
`Expert report (ER)
`Partial expert testimony (EP)
`
`
`
`
`
`
`
`
`PMC Exhibit 2011
`Apple v. PMC
`IPR2016-00754
`Page 1
`
`

`
`IN THE UNITED STATES DISTRICT COURT
`FOR THE DISTRICT OF COLORADO
`
`No. 01-WY-2201 AJ (BNB)
`
`BROADCAST INNOVATION, L.L.C.,
`
`Plaintiff,
`
`vs.
`
`ECHOST AR COMMUNICATIONS CORPORATION,
`HUGHES ELECTRONICS CORPORATION,
`DIRECTV, INC.,
`THOMSON MULTIMEDIA, INC.,
`DOTCAST, INC.,
`PEGASUS SATELLITE TELEVISION, INC.,
`
`Defendants.
`
`EXPERT DECLARATION OF ANTHONY J. WECHSELBERGER
`
`IN SUPPORT OF DEFENDANTS DIRECTV, INC., HUGHES ELECTRONICS
`CORPORATION AND THOMSON MULTIMEDIA, INC.'S PRINCIPAL OPENING
`BRIEF ON CLAIM CONSTRUCTION
`
`I ,)
`
`PMC Exhibit 2011
`Apple v. PMC
`IPR2016-00754
`Page 2
`
`

`
`I, Anthony J. Wechselberger, depose and declare as follows:
`
`1.
`
`I have been retained by Defendants, Hughes Electronics Corp., DirecTV, Inc., and
`
`Thomson Multimedia, Inc. (collectively, "Defendants") to provide expert opinions in connection
`
`with the construction of Claims 9-11 of U.S. Patent No. 4,993,066 ("the '066 Patent"). The
`
`following sets forth my qualifications, opinions, and the bases for my opinions, in addition to my
`
`personal experience. I have also provided a list of the materials I have considered in preparing
`
`this declaration, my opinions concerning the subj eel matter of the invention, and the
`
`compensation I receive for my work in this matter.
`
`QUALIFICATIONS
`
`2.
`
`I am currently the President of Entropy Management Solutions ("EMS"), a
`
`position I have held since I founded the company in 1999. In this capacity, I perform consulting
`
`services related to commercial and consumer broadband technology, product and systems
`
`development. My focus is on broadband/multimedia product and networking solutions relating
`
`to content distribution and security systems
`
`for
`
`the
`
`Internet,
`
`satellite, cable and
`
`wireless/broadcast. This includes control and conditional access technology for pay television
`
`("TV") systems, which is the general subject matter of the '066 Patent. A copy of my
`
`curriculum vitae is attached hereto as Exhibit 1.
`
`3.
`
`My educational background includes Bachelors and Masters degrees in Electrical
`
`Engineering, received at the University of Arizona in 1974 and San Diego State University in
`
`1979, respectively, and completion of the Executive Program for Scientists and Engineers at the
`
`University ofCalifomia, San Diego in 1984.
`
`4.
`
`I have over twenty-eight years of high technology work experience in military,
`
`commercial and consumer communications systems and networks, and twenty years in
`
`PMC Exhibit 2011
`Apple v. PMC
`IPR2016-00754
`Page 3
`
`

`
`leadership and executive positions (Engineering, Operations, Sales & Marketing and Product
`
`Management) at leading companies in those fields, such as TV/COM International, Inc. (from
`
`1990-1998) and Oak Communications, Inc. (from 1982-1990). During that time, I published or
`
`presented a number of articles and papers related to the industry's transition from analog to
`
`digital content creation, transmission and consumption in various media arenas (e.g., cable,
`
`satellite, broadcast, and the cinema industry), and security, "command and control" and
`
`"conditional access" technologies (concepts that I will discuss in more detail below). More
`
`specifically, my major area of focus over the years has been the application of signal security
`
`technologies to analog and digital TV distribution systems. I am also a named inventor on two
`
`issued patents, and currently have three patent applications pending, that are related to such
`
`technology.
`
`5.
`
`As a result of my extensive experience and work in this industry, I also have
`
`personal knowledge concerning the technologies and activities of other companies that develop
`
`or utilize products associated with the transmission/reception of scrambled TV signals. My
`
`familiarity with such companies dates from the early 1980s through the present, and includes
`
`security equipment suppliers such as General Instruments (now Motorola), Scientific Atlanta,
`
`Zenith, Pioneer, Sony, Viaccess, SECA and Irdeto Access. My previous employers, Oak
`
`Communications, Inc. and TV/COM International, Inc., were also major players in this area.
`
`6.
`
`I have never testified in court as an expert witness, although I have worked as an
`
`independent expert and/or technical advisor, and have been deposed as an expert witness in that
`
`capacity. My company, Entropy, is being paid by Defendants an hourly fee of $225/hour, plus
`
`any out-of-pocket expenses, for my study and testimony. This fee follows the usual and
`
`customary rate Entropy charges for such services (which may vary from time to time). A list of
`
`2
`
`PMC Exhibit 2011
`Apple v. PMC
`IPR2016-00754
`Page 4
`
`

`
`all publications authored by me within the past ten years and of cases in which I have testified as
`
`an expert by deposition within the preceding four years, is attached hereto as Exhibit 2.
`
`7.
`
`I have carefully reviewed the '066 Patent, including the claims, specification and
`
`prosecution history (both the original prosecution and the reexamination), as well as the prior art
`
`cited in the prosecution history. I have also considered my personal knowledge and experiences
`
`in areas that relate to the particular issues of this case.
`
`8.
`
`The '066 Patent relates to systems for "controlling the distribution of pay-per-
`
`access information services" ('066 Patent, I :5-7) (Exhibit 3), and in particular pay TV systems. I
`
`was working in this field at the time the '066 Patent was filed in February 1987. Those
`
`knowledgeable of such systems and technologies of this time would have technical experience or
`
`training (equivalent to a Bachelors in Electrical Engineering or Computer Science Engineering)
`
`in broadband or broadcast communications systems (e.g. cable, satellite or over-the-air
`
`transmission), and the types of security and! or conditional access solutions applied thereto.
`
`BACKGROUND OF PAY TV SYSTEMS
`
`9.
`
`The first "premium" or "pay TV" systems, where the delivery and consumption of
`
`TV programming is conditional on a consumer paying a fee, were in use commercially by the
`
`early 1970s. Early pay TV networks were mostly local single channel operations or "community
`
`antenna TV" ("CATV") distribution networks for areas where local reception of off-air
`
`programming was unavailable. The large cable operations and pay networks that we know today
`
`did not take off until the availability and widespread use of satellites for national TV distribution
`
`(led by HBO) in the early 1970s. By the late 1970s, pay TV was common for both cable and
`
`terrestrial broadcast (i.e., over-the-air) delivery systems and, by the mid-1980s, it was also
`
`available for consumers via satellite.
`
`3
`
`PMC Exhibit 2011
`Apple v. PMC
`IPR2016-00754
`Page 5
`
`

`
`10.
`
`Since the programming in these pay TV systems is fee-based, some mechanism
`
`must be used to ensure that only consumers who pay for or "subscribe" to the programming
`
`service have access to the programming signals. In the industry, tbe term that is commonly used
`
`to describe this mechanism is "conditional access" (or "CA") because access by a user is
`
`conditioned or controlled in some manner.
`
`11.
`
`One of the most prevalent methods employed in tbe design and implementation of
`
`CA systems since the 1970s has been the "scrambling" of TV signals. The idea behind this
`
`metbod is to establish a base of subscribers who agree to pay a fee (e.g., monthly) for access to a
`
`particular programming service, and to install a "descrambling" device, such as a set-top box, at
`
`the homes of such subscribers. The TV signals are scrambled and transmitted, but only those
`
`subscribers with the installed descrambling devices should be able to descramble tbe signals and
`
`view them as "clear" TV signals on their TV screens.
`
`12.
`
`The use of scrambling in conjunction witb pay TV delivery has led to a cat and
`
`mouse situation - program suppliers want to offer attractive programming !bat has value to
`
`consumers such that they will pay for it, and "hackers" or program pirates have sought to
`
`develop ways to circumvent theCA or scrambling technologies developed to ensure payment.
`
`Thus, since the beginning of pay TV, there has been a trend towards increasing tbe sophistication
`
`of scrambling methods in an attempt to stay ahead of the hackers. As an introduction, and as I
`
`will describe in more detail below, simple analog scrambling processes (mid- to late-1970s) gave
`
`way to more elaborate time-varying analog scrambling processes (1980s), followed by
`
`combinations of analog scrambling and "hard encryption" based digital security processes (also
`
`in the 1980s), followed by all-digital television transmission with hard encryption (1990s).
`
`4
`
`PMC Exhibit 2011
`Apple v. PMC
`IPR2016-00754
`Page 6
`
`

`
`"SCRAMBLING"
`
`13.
`
`I understand that the construction of the term "scrambling," as that term is used in
`
`the asserted Claims 9-11 of the '066 Patent, is in dispute. As I will explain in more detail below,
`
`the term "scrambling" has different meanings in the art of pay TV systems, depending on t~e
`
`time period. For purposes of my opinion, the time period can be viewed as from the beginning
`
`of pay TV (i.e., the early 1970s, as described above) to the present. There have been important
`
`technological changes during this time period that involve both the manner in which security
`
`systems for television have been implemented, as well as the nature of how the TV signals
`
`themselves have been delivered. I have taken these differences into account to give meaning and
`
`definition to the term "scrambling" as it is used in the '066 Patent.
`
`"Scrambling" versus "Encryption"
`
`14.
`
`A major underlying issue in defining "scrambling" involves whether the signal to
`
`be scrambled is analog or digital. An analog signal is a "continuous" signal, and is usually
`
`pictured or described as a wavy line that is "analogous" (hence the term analog) to the actual
`
`information being represented. An example is an analog audio signal going to a speaker. The
`
`analog audio signal is a continuously varying electrical signal that will cause the speaker to
`
`impart similarly continuous "waves" into the air to our ears via the speaker's cone. But, as most
`
`of us are aware, with today's modem audio equipment, that audio signal may have originated in
`
`our living room in digital form, for example, from a CD. A music CD represents the audio
`
`signal "digitally." A digital signal is "discontinuous"- that is, it attempts to represent an analog
`
`waveform in a "binary" or "digital" way, which means using a succession of I 's and O's (or more
`
`accurately, computer words that are made up of groups of 1 'sand O's). The use of discontinuous
`
`digital representations of signals that are inherently analog (we live in an essentially analog
`
`5
`
`PMC Exhibit 2011
`Apple v. PMC
`IPR2016-00754
`Page 7
`
`

`
`world) may seem odd, but it turns out that if we need to electrically process signals (to transmit
`
`them, for example) there are many advantages to transforming signals into digital form, do the
`
`processing, and then transform them back to analog (or just leave them digital, for a while, as in
`
`the case of the CD) for purposes of human consumption (e.g., to listen to the music). Unlike
`
`human beings, computers are digital "processing machines" which require information in digital
`
`form.
`
`15.
`
`Until digital processing and digital computing became the preferred methodology
`
`of processing signals or information, most such signals/information were maintained in their
`
`original analog form. This is still true for TV signals, where 99% of our home "processing
`
`equipment" (e.g., a TV set or VCR) is analog. But, the transformation to digital has begun.
`
`Many forms of TV delivery are now digital, as with digital satellite and cable TV, and DVDs
`
`(like CDs for audio) are digital recording/playback devices. However, one cannot process
`
`analog signals using digital circuits (in a computer, for example), nor can one process digital
`
`signals using analog circuits. In other words, one must match the processing enviromnent with
`
`the signal type. Getting back to the issues of this case, it can now be understood that with TV
`
`signals being analog in nature until recently, the "scrambling processes" used - until recently -
`
`were also analog processes. This is true for the scrambling and descrambling processes used at
`
`the transmit and receive locations, respectively.
`
`16.
`
`Since TV signals were originally always analog signals, the term "scrambling"
`
`was initially associated only with analog TV signals and analog scrambling techniques. By the
`
`early 1980s, however, more advanced methods for implementing security systems for TV were
`
`under development that used digital signals and digital security processing. For example,
`
`begirming in 1980, at Oak Industries, Inc., I was involved with designing TV security products
`
`6
`
`PMC Exhibit 2011
`Apple v. PMC
`IPR2016-00754
`Page 8
`
`

`
`that transmitted analog TV video (image) signals in combination with digital TV audio signals.
`
`For securing these signals, we used traditional analog scrambling techniques for the analog video
`
`part of the signal, and we used digital "encryption" technology for securing the digital audio part
`
`of the signal. This is also how the Video-Cipher II system, described in the '066 Patent,
`
`operated.
`
`17.
`
`During the early 1980s, TV security systems also began to employ what is
`
`referred to as "time-varying scrambling," which is the varying of the scrambling process over
`
`time. Generally, these systems use "control channels" that accompany the scrambled TV
`
`programming signals. A control channel is an additional channel of information - that is, in
`
`addition to the TV video (image) and audio (sound) information- that is sent along with the TV
`
`programming. These control channels allow computers at the transmission location to control
`
`subscriber set-top boxes (which is where the "descrambling" process takes place). Part of what
`
`the transmission end can control at the descrambling location is this time-varying scrambling.
`
`This method is used to vary the scramblingldescrambling in ways that attempt to prevent would(cid:173)
`
`be signal pirates from keeping up with the requirements for illegally descrambling the signals.
`
`That is, if a pirate has compromised a scrambling method, it is the objective of time-varying
`
`scrambling to alter one or more parameters of the method in some way, and force the pirate to
`
`follow the variance. The control channels are used to enable this time-varying process to happen
`
`automatically within the descrambler (i.e., in the set-top box) without subscriber interaction.
`
`18.
`
`I introduced the term "encryption" above, in my reference to my work at Oak
`
`Communications with security systems that employed combinations of analog video scrambling
`
`and digitally encrypted audio. The advantages of this approach in terms of providing very good
`
`programming protection became well known, and it was adopted by many equipment suppliers.
`
`7
`
`PMC Exhibit 2011
`Apple v. PMC
`IPR2016-00754
`Page 9
`
`

`
`By the mid-1980s, a convention for using the terms "scrambling" for modifying analog signals
`
`and "encryption" for transforming digital signals had developed in the field of TV security
`
`systems. 1 As will be discussed below, the evolution of digital encryption-based security systems
`
`ultimately resulted in more than one meaning for "scrambling" in the TV security fteld. 2 The
`
`differences between these terms ("scrambling" for analog and "encryption" for digital) are
`
`important, because the nature of what happens, what is possible, and how one describes the
`
`characteristics of each is very different. These differences provide the context for determining
`
`whether an analog signal or digital signal is being described with respect to a particular TV
`
`security system.
`
`In, 15, I described how digital signals must be processed using digital processing
`
`19.
`
`circuits. It is understood and accepted by those knowledgeable in the art that "encryption" is a
`
`digital process, meaning that the signal to be secured is a binary or digital signal, and the process
`
`that "secures" the signal is a digital process. 3 The securing of a digital signal by the application
`
`of encryption uses what is called an "algorithm." The digital signal is said to be "encrypted" by
`
`1 See. e.g., V. Bhaskaran & M. Davidov, Video Scrambling- An Overview, 1984 NCTA Technical
`Papers (reprint) (Exhibit 4); Anthony Wechselberger, Encryption-Based Securitv Systems: What Makes
`Them Different And How Well Are They Working?, 1987 NCTA Technical Papers (reprint) (Exhibit 5);
`Lawrence W. Lockwood, Video Signal Securitv, Comm. Tech. 24 (June 1987) (Exhibit 6).
`2 ln February 1987, when the '066 Patent application was filed, "scrambling" was still generally accepted
`as limited to processes performed on analog signals. Nevertheless, I aclmowledge that due to the
`evolution of the technology it would not be surprising to find references from that time where
`"scrambling" was used (albeit, incorrectly) to also describe hard encryption processes performed on
`digital signals. However, the specific system described would typically indicate to one of skill in the art
`which meaning was intended.
`3 See. e.g .. Bhaslcaran, supra note 1 (Exhibit 4); M. Davidov et al., Commercial Applications of Encrypted
`Signals (Oak Indus. Inc.), 1984 (Exhibit 7); Wechselberger supra note 1 (Exhibit 5); Lockwood, supra
`note I (Exhibit 6); Anthony Wechselberger, Conditional Access and Encryption Options for Digital
`Systems, Comm. Tech. 20 (Nov. 1993 ) (Exhibit 8); EBU Project Group BICA, Functional Model of a
`Conditional Access System, 266 EBU Technical Review 2 (1995-96) (Exhibit 9); and David J. Cutts,
`DVB Conditional Access, Feb. 1997 Elec. & Comm. Eng' g Journal 21 (Exhibit 1 0).
`
`8
`
`PMC Exhibit 2011
`Apple v. PMC
`IPR2016-00754
`Page 10
`
`

`
`the algorithm; the algorithm is fixed and can be (and generally is) publicly known. The
`
`algorithm uses what is referred to as a "key variable" (or simply "key''), which is a parameter
`
`that is used by the algorithm and can be changed in order to make the encryption itself variable.
`
`An analogy is a door lock used to control access to a horne -
`
`the lock (algorithm) is a
`
`standardized item, the key is unique to a particular situation (my door vs. yours), and the lock
`
`can be re-keyed if necessary. In encryption systems, keys are long digital words (56 or more
`
`bits, typically) and they can and are changed frequently in broadcast applications.
`
`20.
`
`The basic characteristics of encryption-based security systems are as follows: (a)
`
`they are digital systems, and the signal to be secured must be digital in order to be encrypted; (b)
`
`the security or encryption process (algorithm) is not secret or time-varying (i.e., only one
`
`"technique" is employed, which often is publicly available); and (c) by the proper use of time-
`
`varying keys in the encryption and decryption processes, these systems stay secnre over long
`
`periods of tirne. 4 None of the above are characteristics one would use in a description of analog
`
`scrambling secnrity systems of the type described in the '066 Patent, which depend upon the
`
`secrecy of and changing of the scrambling techniques. See '066 Patent, 5:3-8 ("Note that even
`
`the knowledge of the full range of available scrambling techniques does one no good if one does
`
`not know which combination of techniques would be utilized at any given time in a given
`
`area.").
`
`21.
`
`Encryption is inherently a "randomizing process," so it can be used as part of (i.e.,
`
`to aid in) the time-varying analog scrambling process described above. The TV signal can still
`
`4 There are hundreds of thousands of networks and appliances today that utilize encryption-based
`security. The Data Encryption Standard ("DES") is the most commonly used algorithm, and it has been
`published since its introduction in about 1977.
`
`9
`
`PMC Exhibit 2011
`Apple v. PMC
`IPR2016-00754
`Page 11
`
`

`
`be analog, as well as the scrambling process, and the encryption can be used with the control
`
`channels previously described to control the time-varying analog scrambling. Importantly, the
`
`TV signal itself is not encrypted, but scrambled. It is this type of hybrid security technology(cid:173)
`
`where part of the overall transmitted signal (i.e., the command and control signal) is digital, and
`
`part of the signal (i.e., the TV programming signal) is analog - that is important to understand.
`
`Using this arrangement, it is possible to develop effective overall security systems and employ
`
`encryption with the digital control signals, and use the nature of this control to securely time vary
`
`the analog scrambling of analog TV signals.
`
`22.
`
`An example of hybrid security technology is provided in UK Patent Application
`
`No. GB 2 132 860 A to Chambers et a!. ("the Chambers Patent") (Exhibit 11), a prior-art
`
`reference that was cited in the reexamination application for the '066 Patent. The Chambers
`
`Patent shows, in Figs. 1 and 2, the "descrambler" and "decryptor" portions of the consumer
`
`reception part of a system for receiving satellite TV broadcasts. The former "descrambler"
`
`subsystem descrambles the analog video and audio portions of the information signal, and the
`
`latter "decryptor" subsystem is encryption-based (using the DES algorithm) and used to control
`
`the descrambling subsystem. The use of encryption in the second subsystem is made possible
`
`because the associated signals (control) are digital in nature, and readily adapted to digital
`
`encryption security techniques.
`
`I note that the Chambers Patent describes "scrambling,"
`
`"encryption," and "control" in the same manner that I have described above. See Chambers
`
`Patent, page 1, lines 17-27 (Exhibit 11).
`
`23.
`
`An important result from the above explanation that the TV security community
`
`has adopted from tbis terminology and usage scenario is that the term "scrambling," as the term
`
`is used today can mean either: (a) an analog signal process (e.g., "distortion or interference")
`
`10
`
`PMC Exhibit 2011
`Apple v. PMC
`IPR2016-00754
`Page 12
`
`

`
`used to make an analog signal unusable; or (b) a true "encryption" process applied to a digital
`
`TV programming or content signal itself (as distinct from the command and control part of the
`
`signal). The reason the latter context has been adopted is to separate the processes associated
`
`with what is done to the "content" (i.e., TV programming) signals from those associated with
`
`"command and control" signals. 5 I have explained that the signals used in pay TV networks are
`
`fundamentally "content" and "control," and I have shown how the latter can be used to control
`
`the scrambling/descrambling processes. It is worth noting that either of these signals might be
`
`attacked by a hacker, so both of these signals need to be protected from the hacker. Thus, it has
`
`become the convention in the art to refer to what is done to protect the content itself as
`
`"scrambling/descrambling,"
`
`and what
`
`ts
`
`done with
`
`the
`
`control
`
`channel(s)
`
`as
`
`"encryption/decryption." It is understood by those in the art that referring to the process for
`
`protecting the programming content as "scrambling," even though in modern all-digital networks
`
`this digital signal is actually "encrypted" is a holdover from the earlier analog days, and that the
`
`reference applies only to the content signal. However, determining which meaning of
`
`"scrambling" is being used in describing a particular system requires an analysis of the context in
`
`which it is being used.
`
`' See, M,_, Functional Model of a Conditional Access System, supra note 3 at 2 (Exhibit 9) (describing
`an all-digital system):
`A conditional access (CA) system comprises a combination of scrambling and encryption to
`prevent unauthorized reception. Scrambling is the process of rendering the sound, pictures and
`data unintelligible. Encryption is the process of protecting the secret keys that have to be
`transmitted with the scrambled signal in order for the descrambler to work. After descrambling,
`any defects on the sound and pictures should be imperceptible, i.e., the CA system should be
`transparent.
`
`11
`
`PMC Exhibit 2011
`Apple v. PMC
`IPR2016-00754
`Page 13
`
`

`
`"Scrambling" in the '066 Patent
`
`24.
`
`Separation of contextual meaning between "scrambling" and "encryption" for TV
`
`delivery systems developed as a result of the widespread use of what I have described above as
`
`hybrid security technologies.
`
`I wish to note that any confusion about whether the term
`
`"scrambling" refers to "analog scrambling" or "digital encryption" arose commensurate with the
`
`development of all-digital TV delivery technologies beginning in about 1990 well after the
`
`filing of the '066 Patent. For this reason, and those to follow, it is my opinion that one of skill in
`
`the art as of the filing of the '066 Patent application in 1987 would understand "scrambling" as
`
`used in the asserted claims of the '066 Patent to refer to an analog process applied to an analog
`
`signal.
`
`25.
`
`The specification of the '066 Patent effectively defines the "scrambling" process
`
`as introducing objectionable interference or distortion into the signals: "in practice any method
`
`of [scrambling], active or passive, can be utilized that introduces some kind of objectionable
`
`interference or distortion into the signal path."
`
`'066 Patent, 2:47-50 (Exhibit 3).6 Both
`
`"interference" and "distortion" are terms that have meaning in the context of analog scrambling
`
`techniques, but not with respect to processes for securing digital signals. For example, many
`
`references can be found for descriptions of approaches to TV signal security "at baseband" or
`
`"RF."7 These terms describe where in the signal's processing chain the scramblingldescrambling
`
`process is applied or removed (at the transmit or receive sites), and interference and distortion of
`
`a TV signal can be (and was) done at both baseband and RF locations in actual systems. On the
`
`6 Moreover, Claim 9 refers specifically to the "scrambling means" as "introducing some kind of
`interference or distortion into the signal." '066 Patent (Exhibit 3), 6:31-33.
`7 Bhaskaran, supra note 1 (Exhibit 4); Wechselberger supra note 1 (Exhibit 5); Lockwood, supra note 1
`(Exhibit 6).
`
`12
`
`PMC Exhibit 2011
`Apple v. PMC
`IPR2016-00754
`Page 14
`
`

`
`other hand, one does not "distort" or "interfere" with binary or digital signals in order to secure
`
`them - one encrypts them, or uses another similar digital technique (such as a modulo 2
`
`operation with a pseudo-random bit stream process) to "transform" the digital signal into another
`
`digital signal. This is not an analog process, for reasons which will become clearer below.
`
`26.
`
`The only examples of scrambling techniques provided in the specification- signal
`
`emphasis/deemphasis, voltage spikes, sync removal and frequency shifts (id. at 2:45-47) - are
`
`well-known analog scrambling techniques that are added to or superimposed upon analog signals
`
`(or the carriers thereof) to introduce interference or distortion into those signals. Each of these
`
`techniques will be described in more detail below.
`
`27.
`
`Signal ernpbasis/deernphasis. Signal emphasis/deemphasis are analog signal
`
`processing techniques which amplify (boost) or suppress (reduce) selected portions of an analog
`
`signal in either the time or frequency domain. Such techniques are common in the field of
`
`electronics and can be used to purposefully distort an analog signal to achieve a cleaner signal
`
`with less noise (e.g., Dolby noise reduction), or to scramble an analog TV signal. For example,
`
`scrambling systems were developed in the late 1970s based upon adding a sinusoid waveform to
`
`a TV signal, to "emphasize" the visible part of the TV signal and "deemphasize" the edges of the
`
`TV signal. This had the effect of causing the TV picture to roll and tear apart. The process was
`
`reversed by adding the same distortion waveform (but reversed in polarity) to the received signal
`
`at the receiver, thereby restoring (unscrambling) the TV signal.
`
`28.
`
`Voltage Spikes. Scrambling with a "voltage spike" can be accomplished by
`
`introducing a short duration burst of amplitude or frequency interference into an analog TV
`
`signal. This technique "jams" a TV set's ability to properly reconstruct a clearer picture, unless
`
`the spike is removed. At the receiver, removing the spike was/is commonly performed by using
`
`13
`
`PMC Exhibit 2011
`Apple v. PMC
`IPR2016-00754
`Page 15
`
`

`
`a timed "windowing" pulse (for removing an amplitude spike) or a narrow filter at the frequency
`
`location of the spike (for removing a frequency spike).
`
`29.
`
`Sync Removal. Sync removal was (and in some locations, still is) the most
`
`common form of analog scrambling. A TV signal contains both vertical and horizontal
`
`"synchronization pulses" (or "sync pulses"), and a TV set relies upon such pulses to lock to the
`
`incoming signal in order to present a clean, jitter-free picture. Removal of, or serious distortion
`
`or interference to, either vertical or horizontal synchronization pulses can cause loss of signal
`
`lock, and the picture will roll or tear.
`
`30.
`
`Frequency shifts. TV signals have standard locations where picture, sound and
`
`color RF "carriers" are placed. Interfering with these carrier frequencies by shifting them (or
`
`otherwise fooling the TV set so that it cannot find and/or lock to these carriers) can result in a
`
`loss of picture and/ or sound.
`
`31.
`
`All of the above techniques described in ~~ 27-30 are examples of analog
`
`scrambling techniques that are performed only on analog signals. None of these techniques
`
`would work to secure a digital signal, which is always a "binary" signal that is comprised of"l"s
`
`and/or "O"s (sometimes referred to as "on" or "off', or "set" or "reset"). Indeed, if "interference
`
`or distortion," such as any one of the above techniques, were used on a digital signal, the signal
`
`would be destroyed. Accordingly, one of skill in the art would understand that the scope of the
`
`invention of the '066 Patent is limited to analog scrambling techniques performed on analog
`
`signals.
`
`32.
`
`In ~~ 19-21, I described the characteristics of digital encryption-based systems
`
`and the use of control signals containing key variables as time-varying parameters that are used
`
`with a fixed algorithm as the basis of providing security for such systems. In such systems,
`
`14
`
`PMC Exhibit 2011
`Apple v. PMC
`IPR2016-00754
`Page 16
`
`

`
`using the inventor's terminology, the "technique," i.e., the algorithm, never changes - only the
`
`"seeds" or key variables change:
`
`The ['034 patent] shows only the use of a removable memory 26 for containing
`deencryption keys for use in a non-changeable microprocessor 22. The algorithm
`performed by the microprocessor using the seeds provided by the readable memory does
`not change. This is in contrast to the Jenkins invention, wherein the algorithm, provided
`on a removable card, would change with the insertion of a new card, thereby providing,
`with the change of cards, a very high degree of system security not obtainable with an
`unchangeable resonant deencryption algorithm.
`
`Response to Reexamination Office Action dated July 18, 2000 at 4 (Exhibit 12). Moreover, the
`
`specification emphasizes that it is the number of these teclmiques that defines the invention:
`
`In contrast with normal scrambling techniques the number of different techniques is more
`important to the invention than the sophistication of any particular one technique.
`
`'066 Patent, 2:51-54 (Exhibit 3). The implications of these positions taken on the part of the
`
`inventor are very important: (I) using time-varying keys with a fixed and publicly
`
`accepted/known algorithm is one of the basic foundational precepts for the use of encryption in
`
`broadcast systems - ev

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket