throbber
Docket No.: PMC-003C180
`
`IN THE UNITED STATES PATENT AND TRADEMARK OFFICE
`
`In re Patent Application of:
`John C. Harvey et al.
`
`Application No.: 08/485,507
`
`Confirmation No.: 5691
`
`Filed: May 24, 1995
`
`Art Unit: 2600
`
`For: SIGNAL PROCESSING APPARATUS AND
`METHODS
`
`Examiner: Groody, James J.
`
`AMENDMENT AFTER FINAL REJECTION AND REQUEST FOR
`RECONSIDERATION
`
`MSAF
`Commissioner for Patents
`P.O. Box 1450
`Alexandria, VA 22313-1450
`
`Dear Sir:
`
`In response to the Office Action mailed August 2, 2011, ("Office Action" or "the
`
`Action") from the Patent and Trademark Office ("the Office") rejecting Claims 33-63, please
`
`amend the above-identified U.S. patent application as follows:
`
`Amendment to the Claims are reflected in the listing of the claims that begins on page 2
`
`of this paper.
`
`Remarks begin on page 7.
`
`APPLE EX. 1037
`Page 1
`
`

`
`Docket No.: PMC-003Cl80
`
`AMENDMENT TO THE CLAIMS
`
`33.
`
`(Previously Presented) A method of inhibiting piracy of information or enabling a
`
`presentation of programming at a subscriber station, said method comprising the steps of:
`
`receiving an information transmission from a first remote station;
`
`detecting instruct-to-sample instructions in the information transmission;
`
`processing, under control of said instruct-to-sample instructions, a datum at said
`
`subscriber station;
`
`comparing, under control of said instruct-to-sample instructions, selected comparison
`
`information of said instruct-to-sample instructions to a selected sample of preprogrammed
`
`operating information at said subscriber station, said selected comparison information and said
`
`selected sample of preprogrammed operating information being selected based on said step of
`
`processing, whereby a successful match indicates that said subscriber station is properly
`
`programmed and a failed match suggests that said preprogrammed operating information at said
`
`subscriber station has been tampered with; and
`
`performing, under control of said instruct-to-sample instructions, at said subscriber
`
`station at least one of the steps of:
`
`(1) disabling the functionality of some portion of said subscriber station (i) when
`
`said step of comparing results in a determination that said subscriber station has been
`
`tampered with or (ii) when an instruction is executed based on said step of comparing and
`
`said subscriber station fails to respond in a predetermined fashion or within a
`
`predetermined period of time;
`
`(2) communicating appearance-of-tampering information to a second remote
`
`station when said step of comparing results in a determination that said subscriber station
`
`has been tampered with; and
`
`(3) enabling at least some of a programming presentation when said step of
`
`comparing results in a determination that said subscriber station is properly programmed.
`
`2
`
`APPLE EX. 1037
`Page 2
`
`

`
`Docket No.: PMC-003C180
`
`34. (Previously Presented) The method of claim 33, wherein said comparing step is
`
`performed under control of a selected subroutine of said instruct-to-sample instructions.
`
`35. (Previously Presented) The method of claim 34, wherein said subscriber station
`
`selects said selected subroutine based on said step of processing.
`
`36. (Previously Presented) The method of claim 35, wherein said datum comprises a
`
`station specific identifier.
`
`37. (Previously Presented) The method of claim 36, wherein said subscriber station
`
`selects said station specific identifier.
`
`38. (Previously Presented) The method of claim 33, wherein said step of performing
`
`includes said step of disabling and wherein said step of disabling includes erasing information
`
`from memory.
`
`39. (Previously Presented) The method of claim 38, wherein a read only memory is
`
`disabled.
`
`40. (Previously Presented) The method of claim 33, wherein said step of performing
`
`includes said step of disabling and wherein said step of disabling includes disabling a decryptor.
`
`41. (Previously Presented) The method of claim 33, wherein said step of performing
`
`includes said step of communicating and wherein said step of communicating includes
`
`establishing telephone communications.
`
`42. (Previously Presented) The method of claim 33, wherein said step of performing
`
`includes said step of communicating and wherein said step of communicating includes
`
`transmitting an identifier of said subscriber station to said second remote station.
`
`43. (Previously Presented) The method of claim 33, wherein said step of comparing
`
`results in a determination that said subscriber station may have been tampered with and said
`
`subscriber station performs both of said steps of disabling and communicating.
`
`3
`
`APPLE EX. 1037
`Page 3
`
`

`
`Docket No.: PMC-003C180
`
`44. (Previously Presented) The method of claim 33, wherein said step of performing
`
`includes said step of enabling and wherein said step of enabling includes controlling a decryptor.
`
`45. (Currently Amended) A method of decrypting programming at a receiver station,
`
`said method comprising the steps of:
`
`receiving an information transmission including encrypted information;
`
`detecting in said information transmission the presence of an instruct-to-enable signal;
`
`passing said instruct-to-enable signal to a processor;
`
`determining a fashion in which said receiver station locates a first decryption key by
`
`processing said instruct-to-enable signal;
`
`locating said first decryption key based on said step of determining;
`
`decrypting said encrypted information using said first decryption key; and
`
`outputting said programming based on said step of decrypting.
`
`46. (Previously Presented) The method of claim 45, further comprising the step of
`
`computing a second decryption key, and wherein said step of decrypting comprises decrypting
`
`said encrypted information using said first and second decryption keys.
`
`47. (Previously Presented) The method of claim 46, wherein said first and second
`
`decryption keys are used to decrypt a video portion of said programming.
`
`48. (Previously Presented) The method of claim 45, further comprising the step of storing
`
`information evidencing said step of decrypting.
`
`49. (Previously Presented) The method of claim 45, further comprising the step of
`
`determining if said receiver station is decrypting said encrypted information correctly, and if not,
`
`communicating appearance-of-tampering information to a remote station.
`
`50. (Previously Presented) The method of claim 45, wherein said encrypted information
`
`includes television programming.
`
`4
`
`APPLE EX. 1037
`Page 4
`
`

`
`Docket No.: PMC-003C180
`
`51. (Previously Presented) The method of claim 47, wherein a third decryption key is
`
`used to decrypt an audio portion of said programming, and said first decryption key is located
`
`based on decrypting said audio portion using said third decryption key.
`
`52. (Currently Amended) A method of decrypting programming at a receiver station,
`
`said method comprising the steps of:
`
`receiving an information transmission including encrypted information;
`
`detecting in said information transmission the presence of a first instruct-to-enable signal
`
`including first processor instructions;
`
`executing said first processor instructions of said first instruct-to-enable signal to provide
`
`a first decryption key;
`
`detecting in said information transmission the presence of a second instruct-to-enable
`
`signal including second processor instructions;
`
`executing said second processor instructions to provide a second decryption key;
`
`decrypting said encrypted information using said first and second decryption keys; and
`
`outputting said programming based on said step of decrypting.
`
`53. (Previously Presented) The method as in claim 52, further comprising the step of
`
`storing information evidencing said step of decrypting.
`
`54. (Previously Presented) The method as in claim 52, further comprising the step of
`
`determining if said receiver station is decrypting said encrypted information correctly, and if not,
`
`communicating appearance-of-tampering information to a remote station.
`
`55. (Previously Presented) The method of claim 52, wherein said first and second
`
`decryption keys are used to decrypt a video portion of said programming.
`
`56. (Previously Presented) The method of claim 52, wherein said encrypted information
`
`includes television programming.
`
`5
`
`APPLE EX. 1037
`Page 5
`
`

`
`Docket No.: PMC-003C180
`
`57. (Previously Presented) The method of claim 55, wherein a third decryption key is
`
`used to decrypt an audio portion of said programming, and said first decryption key is provided
`
`based on decrypting said audio portion using said third decryption key.
`
`58. (Previously Presented) A method of decrypting programming at a receiver station,
`
`said method comprising the steps of:
`
`receiving an information transmission including encrypted information;
`
`detecting the presence of an instruct-to-enable signal;
`
`passing said instruct-to-enable signal to a processor;
`
`automatically tuning said receiver station to a channel designated by said instruct-to(cid:173)
`
`enable signal;
`
`receiving enabling information based on said step of tuning;
`
`decrypting said encrypted information by processing said enabling information; and
`
`outputting said programming based on said step of decrypting.
`
`59. (Previously Presented) The method of claim 58, further comprising the step of storing
`
`information evidencing said step of decrypting.
`
`60. (Previously Presented) The method of claim 58, further comprising the step of
`
`determining if said receiver station is decrypting said encrypted information correctly, and if not,
`
`communicating appearance-of-tampering to a remote station.
`
`61. (Previously Presented) The method of claim 58, wherein said enabling information is
`
`received in an audio portion of said programming.
`
`62. (Previously Presented) The method of claim 58, wherein said encrypted information
`
`includes television programming.
`
`63. (Previously Presented) The method of claim 61, wherein said step of decrypting
`
`comprises decrypting a video portion of said programming.
`
`6
`
`APPLE EX. 1037
`Page 6
`
`

`
`Docket No.: PMC-003C180
`
`REMARKS
`
`I.
`
`Status of claims
`
`Claims 33-63 are pending in this application. Amendments are proposed for Claims 45
`
`and 52. Applicants respectfully request reconsideration of the present application in view of the
`
`following remarks. An amendment submitted after a final office action in an application must
`
`comply with 37 C.P.R. § 1.116, which states that:
`
`( 1) An amendment may be made canceling claims or complying with any requirement of
`form expressly set forth in a previous Office action;
`(2) An amendment presenting rejected claims in better form for consideration on appeal
`may be admitted; or
`(3) An amendment touching the merits of the application or patent under
`reexamination may be admitted upon a showing of good and sufficient reasons
`why the amendment is necessary and was not earlier presented.
`
`37 C.P.R.§ 1.116(b).
`
`Applicants submit that this Amendment After Final Rejection and Request for
`
`Reconsideration places this application in condition for allowance by amending claims in
`
`manners that are believed to render all pending claims allowable over the cited art and/or at least
`
`place this application in better form for consideration on appeal under 37 C.P.R. § 1.116(b )(2).
`
`This Amendment is necessary because it at least clarifies and/or narrows the issues for
`
`consideration by the Board and was not earlier presented because Applicants believed that the
`
`prior response(s) placed this application in condition for allowance, for at least the reasons
`
`discussed in those responses. Moreover, pursuant to 37 C.P.R.§ 1.116(b)(3), this Amendment is
`
`necessary to address the Office Action's new rejections that were not previously presented
`
`during the prosecution of this application. Accordingly, entry of the present Amendment, as an
`
`earnest attempt to advance prosecution and/or to reduce the number of issues, is requested under
`
`37 C.P.R.§ 1.116.
`
`7
`
`APPLE EX. 1037
`Page 7
`
`

`
`Docket No.: PMC-003C180
`
`Applicants earnestly solicit a favorable reconsideration and prompt allowance of the
`
`claims. Where the Office does not find that the claims are in condition for allowance, Applicants
`
`respectfully request that the Office withdraw the finality of the Office Action for the reasons set
`
`forth below.
`
`II.
`
`Double Patenting
`
`The Office Action provisionally rejected claims 33-63 on the ground of nonstatutory
`
`obviousness-type double patenting as being unpatentable over claims 2, 4-15, 22-26, 28, 38-40,
`
`45-48, and 51 of the copending Application No. 08/474,145, which issued on August 2, 2011, as
`
`U.S. Patent. No. 7,992,169. In particular, the Action alleges that although the conflicting claims
`
`are not identical, they are patentably distinct from each other because the instant claims and the
`
`'169 claims are directed at the same invention with a different scope and that they are an obvious
`
`variant thereof or an obvious variation of the invention defined in the '169 claims. Applicants
`
`acknowledge that a timely filed terminal disclaimer in compliance with 37 C.P.R. 1.32l(c) or
`
`1.32l(d) may be necessary to overcome the provisional nonstatutory double patenting rejection.
`
`However, Applicants request that the requirement for filing the terminal disclaimer be held in
`
`abeyance, pending an indication of allowable subject matter from the Office in the present
`
`application. If filed, the terminal disclaimer will disclaim, in essential terms, the terminal part of
`
`the statutory term of any patent granted on the instant application, extending beyond the earliest
`
`expiration date of the '169 patent.
`
`III.
`
`The Prior Art Does not Anticipate Claims 45-50 and 52-56
`
`The Office Action rejected (i) claims 45-50 and 52-56 under 35 U.S.C. 102(e) as
`
`allegedly being anticipated by Mason, U.S. Patent No. 4,736,422; and (ii) claims 58, 59, and 61-
`
`8
`
`APPLE EX. 1037
`Page 8
`
`

`
`Docket No.: PMC-003C180
`
`63 under 35 U.S.C. 102(e) as allegedly being anticipated by Pitts et al. ("Pitts"), U.S. Patent No.
`
`4,893,248. Applicants respectfully traverse the rejections for the following reasons.
`
`"A claim is anticipated only if each and every element as set forth in the claim is found,
`
`either expressly or inherently described, in a single prior art reference," Verdegaal Bros. v.
`
`Union Oil Co. of California, 814 F.2d 628,631,2 USPQ2d 1051, 1053 (Fed. Cir. 1987).
`
`Applicants respectfully submit that the cited art does not teach all the limitations of claims 45-50,
`
`52-56, 58, 59, and 61-63.
`
`A.
`
`Description of Prior Art - Mason
`
`Mason discloses "a conditional access system for transmitting and receiving scrambled
`
`television signals over-air includes means for addressing each of the receiving apparatus with an
`
`over-air signal whereby to permit reception and descrambling of the signal." The invention
`
`specifically describes "an over-air addressing DBS television encryption system."
`
`At a transmitter station, a session key S is generated and used to scramble an information
`
`signal A, a television signal. Col. 2, ll. 64-68. A second key Pis generated and used to scramble
`
`the session keyS. Col. 3, ll. 1-4. A third key D, the distribution key, is generated and used to
`
`scramble the second key P. Col. 3, ll. 8-10. The scrambled information signal A, the scrambled
`
`session key S, and the scrambled second key P are then transmitted to a receiver station. Col. 3,
`
`ll. 10-12.
`
`At the receiver station, a customer's individual distribution key D is used to "decrypt" the
`
`received scrambled second key P. Col. 3, ll. 13-18. The descrambled key Pis then used to
`
`"decrypt" the received session keyS. Col. 3, ll. 19-20. The descrambled session keyS is used to
`
`"decrypt" the received information signal A. Col. 3, ll. 21-22.
`
`9
`
`APPLE EX. 1037
`Page 9
`
`

`
`Docket No.: PMC-003C180
`
`B.
`
`Description of Prior Art - Pitts
`
`Pitts discloses "a system for monitoring and accumulating data indicative of viewer
`
`authorized pay per view TV programs at each of a plurality of remote terminals, wherein each
`
`remote terminal is coupled illustratively by non-dedicated telephone lines to a host computer at a
`
`central station." Col. 5, 11. 5-10. TV programs are transmitted via a coax cable in an encoded,
`
`scrambled, or encrypted manner to the receiver station. Col. 7, 11. 3-5.
`
`The receiver station receives a TV program signal embedded with a tag number. Col. 13,
`
`1. 18. The tag number identifies a particular pay per view program and its channel. Col. 13, 11.
`
`17-18. The receiver station processes the tag number and creates a command signal which
`
`causes the converter at the receiver station to descramble or decrypt the TV program signal. Col.
`
`13, 11. 21-26. The pay per view program is then output.
`
`C.
`
`Claims 45-50 and 52-56 Are Not Anticipated by Mason
`
`Applicants propose to amend the independent claim 45 to clarify that it claims detecting
`
`in the information transmission the presence of an instruct-to-enable signal. Applicants also
`
`propose to amend the independent claim 52 to clarify that it claims detecting in the information
`
`transmission the presence of the first instruct-to-enable signal and the second instruct-to-enable
`
`signal. No new matter is added by the proposed amendments. Applicants request entry of these
`
`amendments as they 1) are necessary under 37 C.P.R.§ 1.116(b)(3) to address the Office
`
`Action's new rejections under 35 U.S.C. 102(e) that were not previously presented; and 2) place
`
`this application in condition for allowance or at least place this application in better form for
`
`consideration on appeal under 37 C.P.R. § 1.116(b)(2).
`
`Claims 45-50 and 52-56 claim methods of decrypting programming at a receiver station.
`
`As mentioned in Applicants' Supplemental Amendment filed April 11, 2011, the Board of Patent
`
`10
`
`APPLE EX. 1037
`Page 10
`
`

`
`Docket No.: PMC-003C180
`
`Appeals and Interferences decided in Ex parte Personalized Media Communications, LLC
`
`(Appeal2008-4228, Ex parte Reexamination Control 90/006,536) at pages 53-54, that encryption
`
`requires a digital signal. Claims 45-50 and 52-56 address digital signals. The Board also said
`
`that "encryption and decryption are not broad enough to read on scrambling and unscrambling."
`
`Although Mason uses the terms "encrypting" and "scrambling" interchangeably, the
`
`invention's scope is limited to an analog television system. Mason characterizes the invention as
`
`a Direct Broadcast Satellite ("DBS") system. Col. 2, ll. 12-13; Fig. 1. DBS systems were
`
`originally designed only to accommodate analog transmissions. Mason does not contemplate
`
`digital transmissions, therefore it does not address encryption. Its scope is limited to scrambling
`
`and unscrambling. Mason does not anticipate claims 45-50 and 52-56.
`
`Even assuming, arguendo, that Mason teaches the encryption and decryption of digital
`
`signals, claims 45-50 and 52-56 are not anticipated by Mason for at least the following reasons:
`
`1.
`
`Claim 45
`
`The Office Action points to Mason's Figure 1 having a decryption circuit 20 that utilizes
`
`a distribution key D as teaching the instruct-to-enable signal of claim 45. However, the
`
`Applicant's proposed amendment of claim 45 clarifies that the instruct-to-enable signal is
`
`detected in the information transmission. But, Mason's distribution key D generated at the
`
`transmitter station is not transmitted with the scrambled information signal A, the scrambled
`
`session keyS, and the scrambled second key P. Mason's receiver station uses a customer's
`
`individual distribution key D to decrypt the received scrambled second key P, not the transmitter
`
`station's distribution key D. Therefore the cited section of Mason does not teach this limitation
`
`of claim 45 as clarified by the proposed amendment.
`
`11
`
`APPLE EX. 1037
`Page 11
`
`

`
`Docket No.: PMC-003C180
`
`Even if it were argued that Mason's scrambled second key P teaches the instruct -to(cid:173)
`
`enable signal, the scrambled session key S teaches the first decryption key, and the scrambled
`
`information signal A teaches the encrypted information, no other element of Mason further
`
`teaches the outputting of programming based on the step of decrypting the encrypted information
`
`using the first decryption key. Therefore, Mason fails to teach all the limitations of claim 45 as
`
`clarified by the proposed amendment.
`
`2.
`
`Claim 46
`
`Claim 46 claims the method of claim 45, "further comprising the step of computing a
`
`second decryption key, and wherein said step of decrypting comprises decrypting said encrypted
`
`information using said first and second decryption keys." Claim 46 is not rendered unpatentable
`
`by Mason for the same reasons as argued above in regard to claim 45. Further, Mason does not
`
`teach the limitation as set forth by claim 46. The Office Action points to the generation of the
`
`distribution key D at the transmitter station as teaching the second decryption key, but the
`
`distribution key D is not transmitted to the receiver station. It is not used to decrypt anything at
`
`the receiver station. It is the customer's individual distribution key D that is used at the receiver
`
`station to decrypt the second key P. Mason fails to teach a step of computing the customer's
`
`individual distribution key D. Therefore, Mason fails to teach all the limitations of claim 46.
`
`3.
`
`Claim 47
`
`Claim 4 7 claims the method of claim 46, "wherein said first and second decryption keys
`
`are used to decrypt a video portion of said programming." Claim 47 is not rendered unpatentable
`
`by Mason for the same reasons as argued above in regard to claims 45 and 46.
`
`12
`
`APPLE EX. 1037
`Page 12
`
`

`
`Docket No.: PMC-003C180
`
`4.
`
`Claim 48
`
`Claim 48 claims the method of claim 45, "further comprising the step of storing
`
`information evidencing said step of decrypting." Claim 48 is not rendered unpatentable by
`
`Mason for the same reasons as argued above in regard to claim 45.
`
`5.
`
`Claim 49
`
`Claim 49 claims the method of claim 45, "further comprising the step of determining if
`
`said receiver station is decrypting said encrypted information correctly, and if not,
`
`communicating appearance-of-tampering information to a remote station." Claim 49 is not
`
`rendered unpatentable by Mason for the same reasons as argued above in regard to claim 45.
`
`6.
`
`Claim 50
`
`Claim 50 claims the method of claim 45, "wherein said encrypted information includes
`
`television programming." Claim 50 is not rendered unpatentable by Mason for the same reasons
`
`as argued above in regard to claim 45.
`
`7.
`
`Claim 52
`
`The Office Action points to Figure 1 having a decryption circuit 20 that utilizes a
`
`distribution key D as teaching the first instruct-to-enable signal including first processor
`
`instructions of claim 52. However, the Applicant's proposed amendment of claim 52 clarifies
`
`that the first instruct-to-enable signal is detected in the information transmission. Mason's
`
`distribution key D generated at the transmitter station is not transmitted with the scrambled
`
`information signal A, the scrambled session keyS, and the scrambled second key P. Mason's
`
`receiver station uses a customer's individual distribution key D to decrypt the received
`
`13
`
`APPLE EX. 1037
`Page 13
`
`

`
`Docket No.: PMC-003C180
`
`scrambled second key P. Therefore the cited section of Mason does not teach this limitation of
`
`claim 52 as clarified by the proposed amendment.
`
`Even if it were argued that Mason's scrambled second key P teaches the first instruct-to(cid:173)
`
`enable signal, the scrambled session keyS teaches the second instruct-to-enable signal, and the
`
`scrambled information signal A teaches the encrypted information, no other element of Mason
`
`further teaches the outputting of programming based on the step of decrypting the encrypted
`
`information using the first and second instruct-to-enable signals. Moreover, Mason only teaches
`
`using scrambled session keyS to descramble the scrambled second key P, which is then used to
`
`descramble the scrambled information signal A. Mason does not teach decrypting information
`
`using first and second decryption keys together. Therefore, Mason fails to teach all the
`
`limitations of claim 52 as clarified by the proposed amendment.
`
`8.
`
`Claim 53
`
`Claim 53 claims the method of claim 52, "further comprising the step of storing
`
`information evidencing said step of decrypting." Claim 53 is not rendered unpatentable by
`
`Mason for the same reasons as argued above in regard to claim 52.
`
`9.
`
`Claim 54
`
`Claim 54 claims the method of claim 52, "further comprising the step of determining if
`
`said receiver station is decrypting said encrypted information correctly, and if not,
`
`communicating appearance-of-tampering information to a remote station." Claim 54 is not
`
`rendered unpatentable by Mason for the same reasons as argued above in regard to claim 52.
`
`14
`
`APPLE EX. 1037
`Page 14
`
`

`
`Docket No.: PMC-003C180
`
`10.
`
`Claim 55
`
`Claim 55 claims the method of claim 52, "wherein said first and second decryption keys
`
`are used to decrypt a video portion of said programming." Claim 55 is not rendered unpatentable
`
`by Mason for the same reasons as argued above in regard to claim 52.
`
`11.
`
`Claim 56
`
`Claim 56 claims the method of claim 52, "wherein said encrypted information includes
`
`television programming." Claim 56 is not rendered unpatentable by Mason for the same reasons
`
`as argued above in regard to claim 52.
`
`D.
`
`Claims 58, 59, and 61-63 Are Not Anticipated by Pitts
`
`1.
`
`Claim 58
`
`Claim 58 claims "receiving enabling information based on said step of tuning." The
`
`Office Action points to Pitt's receiver station sending "a command signal via the parallel
`
`input/output interface 26 and the data buffer 20" as teaching this limitation. Col. 13, 11. 23-24.
`
`But, as is evident from Fig. 1A, the control signal is generated by elements at the receiver
`
`station. The control signal is not received from a remote source. Therefore, Pitts fails to teach
`
`this limitation as set forth in claim 58.
`
`2.
`
`Claim 59
`
`Claim 59 claims the method of claim 58, "further comprising the step of storing
`
`information evidencing said step of decrypting." Claim 59 is not rendered unpatentable by Pitts
`
`for the same reasons as argued above in regard to claim 58.
`
`15
`
`APPLE EX. 1037
`Page 15
`
`

`
`Docket No.: PMC-003C180
`
`3.
`
`Claim 61
`
`Claim 61 claims the method of claim 58, "wherein said enabling information is received
`
`in an audio portion of said programming." As argued above, Pitts does not teach the receiving of
`
`enabling information, much less enabling information in audio portion of programming. Claim
`
`59 is not rendered unpatentable by Pitts for the same reasons as argued in regard to claim 58.
`
`4.
`
`Claim 62
`
`Claim 62 claims the method of claim 58, "wherein said encrypted information includes
`
`television programming." Claim 62 is not rendered unpatentable by Pitts for the same reasons as
`
`argued above in regard to claim 58.
`
`5.
`
`Claim 63
`
`Claim 63 claims the method of claim 61, "wherein said step of decrypting comprises
`
`decrypting a video portion of said programming." Claim 63 is not rendered unpatentable by Pitts
`
`for the same reasons as argued above in regard to claims 58 and 61.
`
`IV.
`
`Claims 60 Is Not Obvious
`
`The Office action rejected claim 60 under 35 U.S.C. 103(a) as allegedly being
`
`unpatentable over Pitts in view of Mason. Applicants respectfully traverse the rejection for the
`
`following reasons.
`
`The test that must be met for a reference or a combination of references to establish
`
`obviousness has not been satisfied in the instant matter. The MPEP states the proper test for
`
`obviousness includes making the following factual inquiries: (A) Determining the scope and
`
`contents of the prior art; (B) Ascertaining the differences between the prior art and the claims in
`
`issue; (C) Resolving the level of ordinary skill in the pertinent art; and (D) Evaluating evidence
`
`16
`
`APPLE EX. 1037
`Page 16
`
`

`
`Docket No.: PMC-003C180
`
`of secondary considerations. MPEP § 2141. The Office has erred substantively as to the factual
`
`findings.
`
`Claim 60 depends from claim 58. Claim 60 claims the method of claim 58, "further
`
`comprising the step of determining if said receiver station is decrypting said encrypted
`
`information correctly, and if not, communicating appearance-of-tampering to a remote station."
`
`As admitted by the Examiner, Pitts does not teach this limitation. Moreover, Claim 60 is not
`
`rendered unpatentable by Pitts for the same reasons as argued above in regard to claim 58.
`
`The Office Action argues that Mason makes up for Pitts deficiency because "Mason
`
`teaches a method of decryption in a broadcast television system, where there is detection of
`
`whether an encrypted block has been falsified and subsequent interrogation performed by the
`
`receiver as spoken of on column 6, lines 45-61." However, as argued above, Mason discloses an
`
`analog television system, therefore its scope is limited to scrambling and unscrambling. It would
`
`not have been obvious to apply the analog interrogation upon detection of falsified information
`
`as taught in Mason to the system of Pitts that is capable of processing digital television signals.
`
`Regardless, neither Pitts or Mason teaches all the limitations of claim 58. Mason does
`
`not address automatically tuning a receiver station to a channel designated by an instruct-to(cid:173)
`
`enable signal and receiving enabling information based on the step of tuning. Pitts does not
`
`address receiving enabling information based on a step of tuning. Therefore, even in
`
`combination, Pitts and Mason do not make obvious all the limitations of claim 60.
`
`17
`
`APPLE EX. 1037
`Page 17
`
`

`
`Docket No.: PMC-003C180
`
`V.
`
`Claims 33-44, 51, and 57 Are Allowable
`
`The Office Action identified claims 33-44 as allowable over the prior art of record. This
`
`Amendment does not affect claims 33-44. Applicants respectfully submit claims 33-44 as
`
`previously presented.
`
`The Office Action also identified claims 51 and 57 as objected to as being dependent
`
`upon a rejected base claim, but would be otherwise allowable if rewritten in independent form
`
`including all of the limitations of the base claim and any intervening claims. Applicants
`
`respectfully assert that the claims do not need to be rewritten.
`
`Claim 51 depends from claim 4 7, which depends from claim 46, which depends from
`
`independent claim 45. As argued above, claims 45-47 are allowable over Mason and the prior
`
`art of record. As identified by the examiner, the limitations of claim 51 are also allowable over
`
`the prior art of record. Applicants respectfully submit that claim 51 is allowable in its current
`
`dependent claim form.
`
`Claim 57 depends from claim 55, which depends from independent claim 52. As argued
`
`above, claims 52 and 55 are allowable over Mason and the prior art of record. As identified by
`
`the examiner, the limitations of claim 57 are also allowable over the prior art of record.
`
`Applicants respectfully submit that claim 57 is allowable in its current dependent claim form.
`
`VI.
`
`Conclusion
`
`Applicants respectfully submit that all claims are allowable over the cited art for the
`
`reasons set forth above. Applicants request reconsideration of this application in view of the
`
`amendment and arguments set forth above. In the event Applicants have overlooked the need for
`
`18
`
`APPLE EX. 1037
`Page 18
`
`

`
`Docket No.: PMC-003C180
`
`an extension of time, payment of fee, or additional payment of fee, Applicants hereby petition
`
`therefore and authorize that any charges be made to Deposit Account No. 50-4494.
`
`Should the Examiner have any questions regarding any of the above, the Examiner is
`
`respectfully requested to telephone the undersigned at 202-346-4000.
`
`Dated: October 3, 2011
`
`Respectfully submitted,
`
`By /Thomas J. Scott, Jr./
`
`Thomas J. Scott, Jr.
`Registration No.: 27,836
`GOODWIN PROCTER LLP
`901 New York Avenue, NW
`Washington, DC 20001
`(202) 346-4000
`Attorney for Applicants
`
`19
`
`APPLE EX. 1037
`Page 19

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket