throbber

`
`•
`
`to said third computer of particular identifying information
`and a particular instruct-to-receive signal causing said
`third computer to determine that it is not prepared to
`receive information and to respond with a particular call-
`s back signal. Said call-back signal instructs controller, 20,
`to def er further execution of the third stage until a
`particular deferred time--the first waiting moment after 1:00
`AM the ·following morning--and causes controller, 20, to
`execute a preprogrammed time-check-and-determining sequence.
`1o Under control of said sequence, as a regular step in the
`sequence of the aforementioned polling fashion, controller,
`20, checks the time of clock, 18, and determines whether said
`clock time is after said deferred time.
`Having deferred further execution of the third stage,
`15 controller, 20, proceeds with other processing. The third
`stage is the final stage of said automatic telephone signal
`record transfer sequence. Accordingly, controller, 20,
`starts polling for instructions and commences regularly
`executing said redial and said time-check-and-determining
`
`20 se~ences.
`Subsequently, in the course of executing said redial
`instructions, controller, 20, and said second computer
`establish telephone communications in the fashion described
`in the first stage above. Controller, 20, then causes the
`25 transfer to said second computer of particular identifying
`information followed by a particular instruct-to-receive
`signal causing said second computer to respond with a
`particular start signal that causes controller, 20, to cause
`the transmitting of all recorded meter charge records to said
`30 second computer. When recorder, 20, finishes transmitting
`meter charge information, controller, 20, transmits a
`particular acknowledge receipt instruction to said second
`computer. Automatically said second computer responds with a
`particular transmission complete signal that causes
`controller, 20, to terminate said telephone call then to
`
`35
`
`- 275 -
`
`•
`
`•
`
`•
`
`•
`
`•
`
`•
`
`•
`
`•
`
`•
`
`•
`
`•
`
`PMC Exhibit 2135
`Apple v. PMC
`IPR2016-00754
`Page 302
`
`

`
`•
`
`•
`
`5
`
`cause recorder, 16, to erase from memory all said meter
`charge information. Then, in a preprogrammed fashion,
`controller, 20, deactivates the redial sequence instruction
`portion of said polling sequence.
`So completing the second stage causes controller, 20,
`once again to commence polling for instructions.
`Subsequently, controller, 20, determines that said
`clock time is after said def erred time which causes
`controller, 20, automatically to deactivate said time-check-
`10 and-determining sequence sequence and recommence said third
`stage. Automatically, controller, 20, reestablishes
`telephone communications with said third computer and causes
`said third computer to transfer to controller, 20, its
`particular start signal. Then controller, 20, causes the
`15 transmitting of all recorded monitor records to said third
`computer. When said transmitting is finished, controller,
`20, transmits a particular acknowledge receipt instruction to
`said third computer. Automatically said third computer
`responds with a particular transmission complete signal that
`20 causes controller, 20, to terminate said telephone call then
`to cause recorder, 16, to erase from memory all said monitor
`record information.
`Completing the final deferred instructions of said
`automatic telephone signal record transfer sequence causes
`25 controller, 20, to end said sequence and commence processing
`in the conventional fashion.
`In examples #3 and #4 (and #5 if information of said
`1st-new-program-message (#5) reaches buffer/comparator, 14,
`before any other instance of monitor information), receiving
`30 the first message of the "Wall Street Week" program causes
`the apparatu~ of the Fig. 3 subscriber station to carry out
`-
`said signal record transfer sequence. Simultaneously, other
`stations have reached a similar level of fullness, and said
`command causes said other stations also to execute said
`transfer sequence. Accordingly, not only does transmitting
`
`35
`
`- 276 -
`
`•
`
`•
`
`•
`
`•
`
`•
`
`•
`
`•
`
`•
`
`•
`
`•
`
`•
`
`•
`
`PMC Exhibit 2135
`Apple v. PMC
`IPR2016-00754
`Page 303
`
`

`
`••
`
`•
`
`10
`
`said first message cause all the functions described above in
`example #3 and #4 (and #5), transmitting said message also
`causes apparatus at one and more subscriber stations to
`transfer recorded information selectively to one and more
`5 remote stations at the time of execution and at def erred
`times, causes computers at said stations to process said
`information, and causes said computers to transfer
`information, point-to-point, to said subscriber station
`apparatus.
`Examples #3, #4, and #5 do not show the second message
`of the "Wall Street Week" program causing information to be
`recorded at the recorder, 16, of the subscriber station of
`Fig. 3. Accordingly, said message does not cause apparatus
`of said station to transfer of record information to one or
`15 more remote station computers .
`Nevertheless, it is clear from the above exposition
`that the transmission of any SPAM command (including the
`pseudo command) that includes meter-monitor information can
`cause monitor record information to be recorded at the
`20 recorder, 16, of selected stations-and can cause signal
`processors, 200, at selected ones of said stations (that is,
`at stations where recorders, 16, equal or exceed particular
`fullness information} to transfer meter and/or monitor record
`information selectively to one or more remote stations and
`25 cause computers at said stations to process the information
`in the fashions described herein.
`(Indeed, as the above exposition makes clear, the
`impact of the transmission of SPAM information can be yet
`more complex and meaningful.
`In example #4, receiving the
`30 second message does cause selected stations to record monitor
`record information the recorders, 16, of said stations. Said
`stations are those stations that are preprogrammed to collect
`monitor information at which the first message is not
`decrypted but the second message is; at which, as a
`35 consequence, program unit identification information does not
`
`- 277 -
`
`•
`
`•
`
`•
`
`•
`
`•
`
`•
`
`•
`
`•
`
`•
`
`•
`
`•
`
`•
`
`PMC Exhibit 2135
`Apple v. PMC
`IPR2016-00754
`Page 304
`
`

`
`•
`
`•
`
`exist at SPAM-first-precondition memories and, hence, where
`Fig. 1C combinings fail to occur because the first
`precondition is not satisfied; and at which, as a
`consequence, receiving said second messages causes a 2nd
`5 monitor information (#4) transmission and causes processing
`of said 2nd monitor information (#4) at buffer/comparators,
`14. At said stations, because no monitor information of the
`first "Wall Street Week" program message was previously
`processed--because none was decrypted--monitor record ·
`10 information of prior programming still exists at said
`buffer/comparators, 14, when said 2nd monitor information
`(#4) is received at said buffer/comparators, 14. At selected
`ones of said stations which ones where recorders, 16, will
`equal or exceed particular fullness information when the next
`15 instance of record information is recorded, receiving said
`second message causes the recording of said monitor record
`information of prior programming, causes the transferring of
`meter and/or monitor record information selectively to one or
`more remote stations, and causes computers at said stations
`20 to process the information in the fashions described herein.)
`
`REGULATING THE RECEPTION AND USE OF PROGRAMMING
`(INCLUDING EXAMPLE # 6)
`Examples #2 and #4, above, illustrate methods of
`25 controlling encryption and decryption means, well known in
`the art, within signal processing systems to regulate (and
`meter) the reception and use of control instructions that
`generate combined medium overlay information and cause
`combinings to commence and cease at selected stations. Said
`30 means and methods involve the operation of preprogrammed
`cipher keys (such as keys J and Z) and cipher algorithms to
`decrypt transmitted information.
`The present invention includes other apparatus and
`methods for regulating the reception and use of combined
`medium control instructions, and the apparatus and methods of
`
`35
`
`- 278 -
`
`•
`
`•
`
`•
`
`•
`
`•
`
`•
`
`•
`
`•
`
`•
`
`•
`
`•
`
`•
`
`PMC Exhibit 2135
`Apple v. PMC
`IPR2016-00754
`Page 305
`
`

`
`•
`
`•
`
`the present invention that are used to control (and meter)
`combined medium communication can also regulate the reception
`and use of prior art electronic programming transmissions .
`In the prior art, various means and methods exist for
`5 regulating the reception and use of electronically
`transmitted programming. Various scrambling means are well
`known in ~he art for scrambling, usually the video portion of
`analogue television transmissions in such a fashion that only
`subscriber stations with appropriate descrambling means have
`10 capacity to tune suitably to the television transmissions and
`display the transmitted television image information •
`Encryption/decryption means and methods, well known in the
`art, can regulate the reception and use of, for example,
`digital video and audio television transmissions, digital
`15 audio radio and phonograph transmissions, digital broadcast
`print transmission, and digital data communications. Other
`techniques, well known in the art, involve controlling
`interrupt means that may be as simple as on/off switches to
`interrupt or disconnect programming transmissions at stations
`20 that lack authorizing information or are determined in other
`fashions not to be duly authorized. Still other techniques,
`also well known in the art, involve controlling jamming means
`that spoil transmitted programming at stations that lack
`authorizing information or are determined not to be duly
`25 authorized, thereby degrading the usefulness of said
`programming. Such other techniques include, for example,
`inserting so-called "noise" into the transmitted programming
`which noise may be, for example, overlays of one or more
`separate transmissions.
`The means and methods of the present invention for
`regulating reception and use of programming relate, in
`particular, to three features of the present invention. The
`computer system of the present invention has capacity at each
`subscriber station to compute station specific information
`35 based on preprogrammed information that exists at each
`
`30
`
`- 279 -
`
`•
`
`•
`
`•
`
`•
`
`•
`
`•
`
`•
`
`•
`
`•
`
`•
`
`•
`
`PMC Exhibit 2135
`Apple v. PMC
`IPR2016-00754
`Page 306
`
`

`
`•
`
`•
`
`station and that differs from station to station. Given this
`capacity, any central control station of the present
`invention that originates a SPAM transmission can cause
`subscriber station apparatus to decrypt received SPAM
`5 information in different fashions with each station
`decrypting its received information is its own station
`specific fashion. A central station can cause different
`stations to compute different station specific decryption
`cipher keys and/or algorithms to use in any given step of
`lO decryption or to compute station specific key and/or
`algorithm identification information that differs from
`station to station and controls each station in identifying
`the key and/or algorithm to use for any given step of
`decrypting. A second feature of the present invention is
`15 that effective SPAM processing depends on the correspondence
`between the transmitted SPAM information that causes
`processing at the subscriber stations and the information
`preprogrammed at the various stations that controls the SPAM
`processing at each station.
`In order for any given SPAM
`20 execution segment to invoke any given controlled function at
`any given station, the received binary information of said
`segment (for example, "010011") must match preprogrammed
`controlled-function-invoking information ("010011") at each
`station. This feature permits each station to be
`25 preprogrammed with station specific controlled-function- ·
`invoking information that differs from station to station
`(which means that no single SPAM execution segment could
`invoke a given function at all stations without first being
`processed at selected stations to render its information to
`correspond to the station specific preprogrammed invoking
`information ·of said stations) . The third feature of the
`present invention is an extended system of means and methods
`for regulating the reception and use of SPAM information-(cid:173)
`including decryption key and algorithm information--that is
`illustrated in Fig. 4 and discussed more fully below •
`
`30
`
`35
`
`- 280 -
`
`•
`
`•
`
`•
`
`•
`
`•
`
`•
`
`•
`
`•
`
`•
`
`•
`
`•
`
`•
`
`PMC Exhibit 2135
`Apple v. PMC
`IPR2016-00754
`Page 307
`
`

`
`.• -
`
`•
`
`•
`
`•
`
`•
`
`•
`
`•
`
`•
`
`•
`
`•
`
`•
`
`•
`
`•
`
`•
`
`•
`
`- 281 -
`
`By themselves, the first and second features provide a
`technique whereby a message such as the second message of the
`"Wall Street Week" program can take affect at only selected
`stations (such as those stations preprogrammed with
`5 decryption key J) without being decrypted at said stations.
`(Hereinafter, this technique is called "covert control.")
`An example #6, that focuses on the second message of
`the "Wall Stree:t Week" program and is set within the context
`of example #4, illustrates the operation of covert control.
`In examples #1, #2, #3, and #4, the information of the
`execution segment of said second message, when unencrypted,
`is identical from example to example. For example, if said
`information is 11 100110 11 in example #1, it is 11 100110 11 in
`example #3 and, after decryption, in examples #2 and #4. And
`15 the preprogrammed execute-conditional-overlay-a~-205
`information that said information of the execution segment
`matches when compared -with controlled-function-invoking
`information is also 11 100110 11 •
`But in example #6 the information of the execution
`segment of said second message is different; for example,
`said information is 11 111111 11
`• And the particular binary
`n\1$er that is selected-- 11 111111 11 in the particular example-(cid:173)
`is selected because no subscriber station is preprogrammed,
`at the outset of the example, with any controlled-function-
`25 invoking information that is 11 111111 11
`(In other words, were
`said "111111 11 information of the execution segment
`transmitted without any other action taking place first,
`transmitting said information would cause no controlled
`function to be executed at any subscriber station because
`said information would not match any controller-function-
`invoking information at any station.)
`In example #6, two particular messages are transmitted
`each of which consists of a "Ol" header; execution, meter(cid:173)
`monitor, and information segments; and an end of file signal.
`(Hereinafter, said messages are called the "1st supplementary
`
`10
`
`20
`
`30
`
`35
`
`PMC Exhibit 2135
`Apple v. PMC
`IPR2016-00754
`Page 308
`
`

`
`•
`
`•
`
`In
`message (#6)" and the "2nd supplementary message (#6)".)
`each message, the information of said segments is encrypted
`prior to transmission in the same fashion that the
`information of the first message of example #4 is encrypted,
`5 except that the encryption is done with key J rather than key
`Z and the encrypted information of the execution segment
`instructs subscriber stations to decrypt with key J •
`The "Wall Street Week" program originating studio
`embeds and transmits the 1st supplementary message (#6)
`10 before transmitting said second message.
`Just as is the case with the first message of example
`#4, at the subscriber station of Fig. _3
`(and at other
`stations that are preprogrammed with decryption key J),
`receiving the 1st supplementary message (#6) causes the
`15 apparatus of said station to decrypt said message (using key
`J) and execute any controlled functions that are invoked by
`the unencrypted execution segment of said message.
`Automatically, control processor, 39J, causes decryptor, 39K,
`to receive the information of said message; decryptor, 39K,
`decrypts the encrypted information of said message and
`transfers said message to EOFS valve, 39H; and EOFS valve,
`39H, inputs the information of said message, unencrypted, to
`control processor, 39J, until the end of file signal of said
`message is detected. Automatically, control processor,_39J,
`compares the unencrypted information of the execution segment
`in said message to the aforementioned controlled-function(cid:173)
`invoking information, and a match occurs with particular
`preprogrammed execute-at-39J information that causes control
`processor, 39J, to execute particular preprogrammed load-and(cid:173)
`run-at-39J instructions.
`Executing said instructions causes control processor,
`39J, to record the received SPAM information of said 1st
`supplementary message (#6) in a fashion similar to the
`recording of the first message of example #4 except that the
`information of the information segment of said 1st
`
`20
`
`25
`
`30
`
`35
`
`- 282 -
`
`•
`
`•
`
`•
`
`•
`
`•
`
`•
`
`•
`
`•
`
`•
`
`•
`
`•
`
`•
`
`PMC Exhibit 2135
`Apple v. PMC
`IPR2016-00754
`Page 309
`
`

`
`•
`
`•
`
`supplementary message (#6) is recorded at particular RAM
`associated with control processor, 39J, rather than
`particular RAM of microcomputer, 205. Automatically, control
`processor, 39J, records all remaining command information of
`5 said 1st. supplementary message (#6) together with any padding.
`bits immediately following said command at the aforementioned
`SPAM-input-signal register memory then continues receiving
`the SPAM information of said message and loads said
`information (which is the information of the information
`10 segment of said message) at particular working memory of said
`RAM associated with control processor, 39J .
`In due course, EOFS valve, 39H, receives complete
`information of the end of file signal that ends said 1st
`supplementary message (#6). Receiving said information
`15 causes EOFS valve, 39H, to transmit the aforementioned
`interrupt signal of EOFS-signa1-detected information to
`control processor, 39J.
`Receiving said signal while under control of said
`load-and-run-at-39J instructions causes control processor,
`20 39J, to execute the information of the information segment of
`said 1st supplementary message {#6) that is loaded at said
`RAM as the so-called machine language instructions of one so(cid:173)
`called job •
`Executing said information causes control processor,
`25 39J, in the predetermined fashion of the said information
`that is preprogrammed at said RAM at the time of execution by
`virtue of being so loaded prior to being so executed, to
`locate the location of that particular instance of
`controlled-function-invoking information that is "lOOl.l.O"
`(which is the execute-conditional-overlay-at-205 information
`that causes control processor, 39J, to execute the controlled
`function of said conditional-overlay-at-205 instruction) and
`modify the information at said location to be "l.ll.l.ll. 11 •
`(Simultaneously, other control processors, 39J, and at other
`stations that are preprogrammed with decryption key J execute
`
`30
`
`35
`
`- 283 -
`
`•
`
`•
`
`•
`
`•
`
`•
`
`•
`
`•
`
`•
`
`•
`
`•
`
`•
`
`•
`
`PMC Exhibit 2135
`Apple v. PMC
`IPR2016-00754
`Page 310
`
`

`
`.-
`
`•
`
`•
`
`•
`
`•
`
`•
`
`•
`
`•
`
`•
`
`•
`
`•
`
`•
`
`•
`
`•
`
`5
`
`1o
`
`information of loaded information of said information segment
`and modify information of the execute-conditional-overlay-at-
`205 information, at said control processors, 39J, to be
`11 1.11111 11 . )
`In this fashion, the execute-conditional-overlay-at-
`205 information at the control processors, 39J, of those
`selected subscriber stations that are preprogrammed with
`information of decryption key J is altered from its standard
`11 10011.0" and becomes "l.l.1111 11 •
`Accordingly, when the second message of the "Wall
`Street Week" program of example #6 is transmitted with its
`11 111111 11 execution segment, said message is processed at
`those stations that are preprogrammed with said information
`of decryption key J precisely as the second message of
`(At all other
`15 example #3 is processed at said stations.
`stations, all information of said message is automatically
`discarded because the "11111.1" information of its execution
`segment fails to match any preprogrammed controlled-function(cid:173)
`invoking information.)
`The "Wall Street Week" program originating studio
`embeds and transmits the 2nd supplementary message (#6)
`after transmitting said second message.
`At the subscriber station of Fig. 3 (and at other
`stations that are preprogrammed with decryption key J),
`receiving said 2nd supplementary message (#6) causes
`precisely the same processing that is caused by receiving the
`1st supplementary message (#6) with just one exception •
`Whereas executing the loaded information of the information
`segment of the 1st supplementary message (#6) causes control
`processor, 39J, to locate that instance of controlled-
`function-invoking information that is 11 100110 11 and modify the
`information at the location of said 11 100110" to be 11 111111. 11 ,
`executing the loaded information of the information segment
`of the 2nd supplementary message (#6) causes control
`processor, 39J, to locate that instance of controlled-
`
`20
`
`25
`
`30
`
`35
`
`- 284 -
`
`PMC Exhibit 2135
`Apple v. PMC
`IPR2016-00754
`Page 311
`
`

`
`•
`
`•
`
`,
`
`function-invoking information that is 11 111111" and modify the
`information at the location of said 11 111111" to be 11 100110 11 •
`In this fashion, the execute-conditional-overlay-at-
`205 information at the control processors, 39J, of those
`5 selected subscriber stations that are preprogrammed with
`information of decryption key J is returned to its standard
`(Hereinafter, the normal binary value of a
`value: "10011.0" •
`given instance of information that invokes a preprogrammed
`function--such as, for example, the 11 100110 11 that is the
`10 normal value of said execute-conditional-overlay-at-205
`information--is called a "standard control-invoking value",
`and a value that temporary replaces a standard control(cid:173)
`invoking value in the course a covert control application-(cid:173)
`such as "111111." in example. #6--is _called a "covert control-
`15 invoking value".)
`Covert control provides significant benefits. One
`benefit is speed. For example, when covert control is
`employed, no time is spent decrypting messages (such as the
`second "Wall Street Week" message of examples #2 or #4) that
`convey combining synch commands. Thus the shortest
`possible interval of time can exist between the moment when a
`given combining synch command {such as the command of said
`second message) is embedded at the program originating studio
`and transmitted and the moment when it causes combining at
`those selected stations at which it causes combining. A
`second benefit arises out of the capacity to repeat.
`In
`example #6, after transmitting said 1st supplementary message
`{#6) and causing the covert control-invoking value, 11 111111 11
`to replace the standard control-invoking value of the
`execute-conditional-overlay-at-205 information at those
`selected subscriber stations that are preprogrammed with
`decryption key J, the "Wall Street Week" program originating
`studio can invoke the aforementioned conditional-overlay-at-
`205 instructions at said selected stations not just once but
`many time by transmitting execution segments that are
`
`20
`
`25
`
`30
`
`35
`
`- 285 -
`
`•
`
`•
`
`•
`
`•
`
`•
`
`•
`
`•
`
`•
`
`•
`
`•
`
`•
`
`•
`
`PMC Exhibit 2135
`Apple v. PMC
`IPR2016-00754
`Page 312
`
`

`
`•
`
`•
`
`"1111.11." before transmitting said 2nd supplementary message
`(#6) and causing the standard control-invoking value of said
`execute-conditional-overlay-at-205 information, "l.001.10", to
`replace said covert control-invoking value at said selected
`5 stations.
`Fig. 4 shows the Signal Processing Programming
`Reception and Use Regulating System that is the third feature
`of the present invention.
`The subscriber station of Fig. 4 has capacity for
`1o receiving wireless television programming transmissions at a
`conventional antenna, 1.99, and a multi-channel. cable
`transmission at converter boxes, 201. and 222. Said boxes,
`201 and 222, are conventional cable converter boxes with
`capacity, well known in the art, for receiving information of
`15 a selected channel of a multiplexed multi-channel
`transmission and converting the selected information to a
`given output frequency. The selected channels whose
`information is received at said boxes, 201. and 222
`respectively, are selected by tuners, 21.4 an~ 223
`20 respectively, which are conventional tuners, well known in
`the art, each with capacity for tuning to a selected channel.
`Antenna, 199, and boxes, 201. and 222, transmit their received
`information to matrix switch, 258, which is a conventional
`matrix switch, well known in the art, with capacity for
`25 receiving multiple inputs and outputting said inputs
`selectively to selected output apparatus. One apparatus that
`said switch has capacity for outputting to is television
`tuner, 21.5. However, the configuration Fig. 4 differs from
`the configuration of Figs. l. and 3 in that television tuner,
`215, outputs its audio and video outputs to said matrix
`switch, 258, rather than to monitor, 202M, and divider, 4,
`respectively.
`Instead, in Fig. 4, it is said switch, 258,
`that outputs the information that is input.to said monitor,
`202M, and divider, 4; Fig. 4 shows five additional devices-(cid:173)
`three decryptors, 107, 224 and 231., a signal stripper, 229,
`
`30
`
`35
`
`- 286 -
`
`•
`
`•
`
`•
`
`•
`
`•
`
`•
`
`•
`
`•
`
`•
`
`•
`
`•
`
`•
`
`PMC Exhibit 2135
`Apple v. PMC
`IPR2016-00754
`Page 313
`
`

`
`•
`
`•
`
`- 287 -
`
`and a signal generator, 230--associated with matrix switch,
`258. Decryptors, 107, 224 and 231, are conventional
`decryptors, well known in the art, with capacity for
`receiving encrypted digital information, decrypting said
`5 information by means of a selected cipher algorithm and a
`selected cipher key, and outputting the decrypted
`information. Signal stripper, 229, is a conventional signal
`stripper, well known in the art, with capacity for receiving
`a transmission of video information, removing embedded or
`10 otherwise inserted signal information selectively, and
`outputting the transmission absent the removed information .
`Signal generator, 230, is a conventional signal inserter,
`well known in the art, with capacity for receiving a
`transmission of video information, embedding or otherwise
`15 inserting signal information selectively, and outputting the
`transmission with the embedded or otherwise inserted
`information. Matrix switch, 258, has capacity for outputting
`selected inputted transmissions to each said five devices,
`and each of said devices processes its inputted information
`20 in its specific fashion and outputs its processed information
`to said switch, 258.
`As Fig. 4 shows, signal processor, 200, controls all
`the aforementioned apparatus. Signal processor, 200,
`controls the tuning of tuners, 21.4, 215,· and 223; controls
`the switching of matrix switch, 258; supplies cipher
`algorithm and cipher key information to and controls the
`decrypting of decryptors, 107, 224 and 230; controls signal
`stripper, 229, in selecting transmission locations and/or
`information to strip and in signal stripping; and controls
`signal generator, 230, in selecting transmission locations at
`which to insert signals, in generating specific signals to
`insert, and in inserting.
`In addition, Fig. 4 also shows divider, 4, monitor,
`202M, decoder, 203, and microcomputer, 205, all of which
`function and are controlled as in Figs. 1 and 3.
`
`25
`
`30
`
`35
`
`•
`
`•
`
`•
`
`•
`
`•
`
`•
`
`•
`
`•
`
`•
`
`•
`
`•
`
`•
`
`PMC Exhibit 2135
`Apple v. PMC
`IPR2016-00754
`Page 314
`
`

`
`·- -
`
`•
`
`•
`
`•
`
`•
`
`•
`
`•
`
`•
`
`•
`
`•
`
`•
`
`•
`
`•
`
`•
`
`Finally, Fig. 4 shows local input, 225, well known in
`the art, which has means for generating and transmitting
`control info~ation to controller, 20, of signal processor,
`ioo. The function of local input, 225, is to provide means
`5 whereby a subscriber may input information to the signal
`processor of his subscriber station, thereby controlling the
`functioning of his personal signal processor system is
`specific predetermined fashions that are described more fully
`below.
`In the preferred embodiment, local input, 225, is
`10 actuated by keys that are depressed manually by _the
`subscriber in the fashion of the keys of a so-called touch(cid:173)
`tone telephone or the keys of a typewriter (or microcomputer)
`keyboard. As Fig. 4 shows, microcomputer, 205, also has
`capacity for inputting control information to microcomputer,
`15 205, via decoder, 203, and in the preferred embodiment,
`microcomputer, 205, may also automatically substitute for
`local control, 225, in predetermined fashions in inputting
`control information to said controller, 20, on the basis of
`preprogrammed instructions and information previously
`inputted to said microcomputer, 205.
`
`20
`
`EXAMPLE #7
`OPERATING S. P. REGULATING SYSTEMS
`Example #7 illustrates the operation of the the signal
`processing regulating system of Fig. 4 and demonstrates the
`interaction of the aforementioned first and third features of
`the present invention--the capacity to compute station
`specific information at each subscriber station and the
`system of regulating (and metering) means and methods that is
`illustrated in Fig. 4.
`In example #7, the program originating studio that
`originates the "Wall Street Week" transmission transmits a
`television signal that consists of so-called "digital video"
`and "digital audio," well known in the art. Prior to being
`transmitted, the digital video information is doubly
`encrypted, by means of particular cipher algorithms A and B
`
`25
`
`30
`
`35
`
`- 288 -
`
`PMC Exhibit 2135
`Apple v. PMC
`IPR2016-00754
`Page 315
`
`

`
`•
`
`•
`
`and cipher keys Aa and Ba, in such a way that said
`information requires decryption at subscriber stations in the
`fashion described below. The digital audio is transmitted in
`the clear. Said studio transmits the information of said
`5 program to a plurality of intermediate transmission stations
`by so-called "landline" means and/or Earth orbiting satellite
`transponder means, well known in the art •
`Each of said intermediate transmission stations
`receives the transmission originated by said studio and
`10 retransmits the information of said transmission to a
`plurality of ultimate receiver stations •
`In example #7, the intermediate station that
`retransmits "Wall Street Week" program information to the
`subscriber station of Fig. 4 is a cable television system
`15 head end (such as the head end of Fig. 6). Prior to
`retransmission, said station encrypts the digital audio
`information of said transmission, in a fashion well known in
`the art, using particular cipher algorithm c and cipher key
`ca, then transmits the information of said program on cable
`20 channel 13, commencing at a particular 8:30 PM time on a
`particular Friday night.
`In example #7, the controller, 20, of the signal
`processor, 200, of Fig. 4 is preprogrammed at a particular
`time with particular information that indicates that the
`25 subscriber of said station wishes to view said "Wall Street
`Week" program when transmission of said program on cable
`cable 13 commences •
`(So preprogramming controller, 20, can occur in
`several fashions. For example, prior to a particular time,
`30 a subscriber may.enter particular please-fully-enable-WSW-on(cid:173)
`CC13-at-particular-8:30 information at local input, 225, and
`cause said information, in a predetermined fashion, to be
`inputted to controller, 20, by local input, 225.
`Alternately, microcomputer, 205, can be preprogrammed with
`particular specific-WSW information and, in a predetermined
`
`35
`
`- 289 -
`
`-·-
`
`•
`
`•
`
`•
`
`•
`
`•
`
`•
`
`•
`
`•
`
`•
`
`•
`
`•
`
`PMC Exhibit 2135
`Apple v. PMC
`IPR2016-00754
`Page 316
`
`

`
`•
`
`•
`
`- 290 -
`
`fashion that is described more fully below, caused to
`input said please-fully-enable-WSW-on-CC13-at-particular-8:30
`information to said controller, 20.)
`Receiving any given instance of please-fully-enable-
`5 WSW-on-CC13-at-particular-8:30 information causes controller,
`20, in a predetermined fashion, to select particular WSW-on(cid:173)
`CC13-at-particular-8:30 information in said received
`information, record said selected info~ation at particular
`memory, and execute particular receive-authorizing-info-at-
`10 appointed-time instructions.
`In a predetermined fashion, executing said
`instructions causes controller, 20

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket