throbber
UNITED STATES PATENT AND TRADEMARK OFFICE
`______________________________________________
`
`BEFORE THE PATENT TRIAL AND APPEAL BOARD
`______________________________________________
`
`Apple Inc.,
`Petitioner
`
`v.
`
`OpenTV, Inc.,
`Patent Owner.
`
`Case No. ______
`
`
`
`PETITION FOR INTER PARTES REVIEW
`OF U.S. PATENT NO. 6,148,081 CHALLENGING CLAIMS 1-3, 23 AND 24
`UNDER 35 U.S.C. § 312, 37 C.F.R. § 42.104
`
`

`
`U.S. Patent No. 6,148,081 (claims 1-9, 23-26)
`Petition for Inter Partes Review
`
`TABLE OF CONTENTS
`
`
`Introduction ..................................................................................................... 1
`I.
`II. Grounds for Standing, Mandatory Notices, and Fee Authorization ............... 1
`A. Grounds for Standing and Real Party-in-Interest ................................. 1
`B.
`Related Matters ..................................................................................... 1
`C.
`Counsel and Service Information ......................................................... 3
`D.
`Fee Authorization ................................................................................. 4
`III. Summary of Challenges .................................................................................. 4
`IV. The Challenged Patent .................................................................................... 4
`A. Overview of the ’081 Patent ................................................................. 4
`B.
`Level of Ordinary Skill In The Art ...................................................... 5
`C.
`Summary of the Prosecution History of the ’081 Patent ..................... 6
`Claim Construction Of Challenged Claims .................................................... 7
`A.
`“Credential” (claims 1-3 and 23) ......................................................... 8
`VI. Specific Explanation Of Grounds For Invalidity............................................ 9
`A. Ground 1: Rohatgi ’786 anticipates claims 1-3 and 23 ........................ 9
`1.
`Summary of Rohatgi ’786 .......................................................... 9
`2.
`Claim 1 ..................................................................................... 13
`3.
`Claim 2: “storing said information if said credential is
`valid” ........................................................................................ 18
`Claim 3: “wherein said credential contains an expiration
`date and wherein said step of verifying said credential
`further comprises determining whether said expiration
`date has passed” ....................................................................... 18
`Claim 23 ................................................................................... 19
`Claim 24: “wherein said control unit comprises a
`general-purpose computer” ...................................................... 23
`Claim Charts for Claims 1-3, 23, 24 Based On Rohatgi
`’786 .......................................................................................... 24
`
`5.
`6.
`
`V.
`
`
`
`4.
`
`7.
`
`

`
`U.S. Patent No. 6,148,081 (claims 1-9, 23-26)
`Petition for Inter Partes Review
`B. Ground 2: Apperson ’484 and Metz ’539 render obvious claims
`1-3, 23 and 24 ..................................................................................... 27
`1.
`Summary of Apperson ’484 ..................................................... 27
`2.
`Summary of Metz ’539 ............................................................ 28
`3.
`Reasons To Combine Apperson ’484 With Metz ’539 ........... 29
`4.
`Grounds 1 and 2 Are Not Redundant ....................................... 31
`5.
`Claim 1 ..................................................................................... 33
`6.
`Claim 2: “storing said information if said credential is
`valid” ........................................................................................ 41
`Claim 3: “wherein said credential contains an expiration
`date and wherein said step of verifying said credential
`further comprises determining whether said expiration
`date has passed” ....................................................................... 43
`Claim 23 ................................................................................... 44
`Claim 24: “wherein said control unit comprises a
`general-purpose computer” ...................................................... 50
`10. Claim Charts for Claims 1-3 and 23-24 Based On
`Apperson ’484 and Metz ’539 ................................................. 51
`VII. Conclusion .................................................................................................... 56
`
`8.
`9.
`
`7.
`
`ii
`
`
`
`
`
`

`
`U.S. Patent No. 6,148,081 (claims 1-9, 23-26)
`Petition for Inter Partes Review
`
`LIST OF EXHIBITS
`
`
`Exhibit No. Description
`
`U.S. Patent No. 6,148,081
`
`Prosecution File History of U.S. Patent No. 6,148,081
`
`Declaration of Richard Kramer
`
`Curriculum Vitae of Richard Kramer
`
`European Patent Application No. EP 0752786 (“Rohatgi ’786”)
`
`U.S. Patent No. 5,768,539 (“Metz ’539”)
`
`U.S. Patent No. 5,978,484 (“Apperson ’484”)
`
`U.S. Patent No. 5,625,693 (“Rohatgi ’693”)
`
`The American Heritage Dictionary (3d Ed. 1994) (excerpt)
`
`OpenTV, Inc. v. Apple Inc., No. 5:15-CV-02008-EJD, Dkt. No. 72
`
`(N.D. Cal. Jan. 28, 2016).
`
`1001
`
`1002
`
`1003
`
`1004
`
`1005
`
`1006
`
`1007
`
`1008
`
`1009
`
`1010
`
`
`
`iii
`
`

`
`U.S. Patent No. 6,148,081 (claims 1-9, 23-26)
`Petition for Inter Partes Review
`
`I.
`
`INTRODUCTION
`Pursuant to 37 C.F.R. § 42.100, et seq., Apple Inc. (“Petitioner” or “Apple”)
`
`hereby petitions the United States Patent and Trademark Office (the “Office”) to
`
`institute an inter partes review of claims 1-3 and 23-24 of U.S. Patent No.
`
`6,148,081 (“the ’081 Patent”). The ’081 Patent, attached as Ex. 1001, is assigned
`
`to OpenTV, Inc. (“Patent Owner”). The ’081 Patent relates to a method and
`
`system “for restricting or controlling the access rights of interactive television
`
`applications and carousels.” Ex. 1001 at Abstract. As set forth below, claims 1-3
`
`and 23-24 of the ’081 Patent are anticipated and rendered obvious by the prior art.
`
`This petition presents two non-cumulative grounds of invalidity. These grounds
`
`are each reasonably likely to prevail, and this petition, accordingly, should be
`
`granted on all grounds.
`
`II. GROUNDS FOR STANDING, MANDATORY NOTICES, AND FEE
`AUTHORIZATION
`A. Grounds for Standing and Real Party-in-Interest
`Petitioner certifies that the real party-in-interest is Apple Inc., and that the
`
`’081 Patent is available for inter partes review and that Petitioner is not barred or
`
`estopped from requesting an inter partes review challenging the patent claims on
`
`the grounds identified in this petition.
`
`B. Related Matters
`Patent Owner has asserted the ’081 Patent against Petitioner in OpenTV,
`
`1
`
`

`
`U.S. Patent No. 6,148,081 (claims 1-9, 23-26)
`Petition for Inter Partes Review
`Inc., et al. v. Apple Inc., 3:15-CV-02008-EJD (N.D. Cal., filed May 5, 2015) (the
`
`“District Court Action”).
`
`On January 28, 2016, the District Court for the Northern District of
`
`California found claims 1-3 and 23-24 of the ’081 patent invalid for claiming
`
`patent ineligible subject matter under 35 U.S.C. § 101. See OpenTV, Inc. v. Apple
`
`Inc., No. 5:15-CV-02008-EJD, 2016 WL 344845, at *1 (N.D. Cal. Jan. 28, 2016)
`
`(Ex. 1010). The District Court’s decision is not a final judgment—the decision did
`
`not address all patents asserted in the District Court Action. See Fed. R. Civ. P.
`
`54(b). Patent Owner has filed a motion for certification under Rule 54(b) to permit
`
`interlocutory appeal of the § 101 decision while other claims are still pending in
`
`the District Court. The District Court has yet to rule on Patent Owner’s motion,
`
`and a hearing is not scheduled until August 18, 2016.
`
`Petitioner’s one-year statutory period for seeking inter partes review is
`
`expected to expire before the District Court’s invalidity decision becomes a final
`
`judgment and before any appeal of that decision is completed. See 35 U.S.C. §
`
`315(b). Petitioner, therefore, respectfully requests that the Board institute review
`
`based on grounds set forth in this Petition while the invalidity decision remains
`
`pending before the District Court or the Federal Circuit. This Board has previously
`
`found it proper to consider the merits of a petition after the District Court found the
`
`challenged claims to be patent ineligible under § 101. In PNC Bank N.A. v. Parus
`
`2
`
`

`
`U.S. Patent No. 6,148,081 (claims 1-9, 23-26)
`Petition for Inter Partes Review
`Holdings., Inc., the Board issued an institution decision based on the merits of a
`
`CBM petition while the District Court’s patent ineligibility decision was pending
`
`before the Federal Circuit. Case CBM2015-00109 and -00149, Paper 10 at *3-4
`
`(P.T.A.B. Nov. 9, 2015).
`
`C. Counsel and Service Information
`Petitioner designates the following lead counsel: Mark E. Miller (Reg. No.
`
`31,401), O’Melveny & Myers LLP, Two Embarcadero Center, 28th Floor, San
`
`Francisco, CA 94111. (Telephone: 415-984-8700; Fax: 415-984-8701; Email:
`
`markmiller@omm.com.)
`
`Petitioner designates the following backup counsel: Ryan K. Yagura (Reg.
`
`No. 47,191), Anne E. Huffsmith (Reg. No. 57,041), Brian M. Cook (Reg. No.
`
`59,356), Xin-Yi Zhou (Reg. No. 63,366), and John Kevin Murray (Reg. No.
`
`69,529), O’Melveny & Myers LLP, 400 S. Hope Street, Los Angeles, CA 90071.
`
`(Telephone: 213-430-6000; Fax: 213-430-6407; Emails: ryagura@omm.com,
`
`ahuffsmith@omm.com, bcook@omm.com, vzhou@omm.com, and
`
`kmurray2@omm.com).
`
`Service of documents may be made to Apple’s counsel at O’Melveny &
`
`Myers LLP, Two Embarcadero Center, 28th Floor, San Francisco, CA 94111, with
`
`courtesy copies to the email addresses identified above.
`
`3
`
`

`
`U.S. Patent No. 6,148,081 (claims 1-9, 23-26)
`Petition for Inter Partes Review
`
`Fee Authorization
`
`D.
`The Office is authorized to charge an amount in the sum of $23,000 to
`
`Deposit Account No. 50-0639 for the fee set forth in 37 CFR § 42.15(a), and any
`
`additional fees that might be due in connection with this Petition.
`
`III. SUMMARY OF CHALLENGES
`Petitioner respectfully requests that claims 1-3 and 23-24 be cancelled on the
`
`following grounds:
`
`1.
`
`European Patent Application No. EP 0752786 (“Rohatgi ’786”) anticipates
`
`claims 1-3, 23, and 24 under 35 U.S.C. § 102 (see Section VI.A);
`
`2.
`
`U.S. Patent No. 5,978,484 (“Apperson ’484”) combined with U.S. Patent
`
`No. 5,768,539 (“Metz ’539”) render obvious claims 1-3, 23, and 24 under 35
`
`U.S.C. § 103 (see Section VI.B).
`
`Grounds 1 and 2 are not redundant for reasons set forth below in Section
`
`VI.B.4.
`
`IV. THE CHALLENGED PATENT
`A. Overview of the ’081 Patent
`The ’081 patent discloses an interactive television system that uses
`
`electronic “credentials” to control the access rights and permissions of
`
`applications. See Ex. 1001 [’081 Patent] at Abstract; see also id. at 2:47-49 (“The
`
`system utilizes a credential consisting of various pieces of information to identify
`
`an application and its respective privileges, rights and restrictions.”). Each
`
`4
`
`

`
`U.S. Patent No. 6,148,081 (claims 1-9, 23-26)
`Petition for Inter Partes Review
`application has defined access rights, such as permission to execute certain
`
`program modules, control other applications, use system resources, or access
`
`restricted data. Id. at 2:35-40. The disclosed system assigns to each application an
`
`electronic “credential” and uses that “credential” to identify the application and its
`
`access rights. Id. at 2:47-57. For example, an interactive shopping application
`
`may attempt to access restricted data stored on a user’s set-top box (e.g., credit
`
`card payment data); the application is granted access to the restricted data only if it
`
`holds a valid “credential” indicating that it has the relevant permission for the
`
`requested data. Id. at 3:17-24. In one embodiment, the “credential” includes “a
`
`producer identification number (ID) and an application ID for the application, an
`
`expiration date, a list of rights, a producer certificate and a signature.” Id. at 2:50-
`
`53; Fig. 6(a).
`
`Level of Ordinary Skill In The Art
`
`B.
`The level of ordinary skill in the art is evidenced by the references cited in
`
`Section VI below. Specifically, one of ordinary skill in the art would be someone
`
`with a bachelor’s degree or higher in computer science, computer engineering,
`
`electrical engineering, or the equivalent, plus two or more years of experience in
`
`the field of interactive system engineering and/or software development, or an
`
`equivalent amount of relevant work and/or research experience. Ex. 1003 [Kramer
`
`Decl.] ¶ 22. A hypothetical person having ordinary skill in the art at the time of the
`
`5
`
`

`
`U.S. Patent No. 6,148,081 (claims 1-9, 23-26)
`Petition for Inter Partes Review
`alleged invention shall be referred to herein as a “POSITA.”
`
`Summary of the Prosecution History of the ’081 Patent
`
`C.
`The ’081 Patent issued from U.S. Patent App. No. 09/196,964 (the “’964
`
`Application”). The ’964 Application was filed on November 20, 1998 as a
`
`continuation-in-part of App. No. 09/087,386. Ex. 1001 [’081 Patent] at Cover.
`
`On July 19, 1999, the Examiner issued a non-final office action rejecting all
`
`pending claims. Ex. 1002 [’081 File History] at 67-76. The Examiner found
`
`claims 20-26 to be anticipated by U.S. Patent No. 5,920,626 (Durden), claims 1-9
`
`to be obvious over Durden combined with U.S. Patent Nos. 5,625,693 (Rohatgi
`
`’693, Ex. 1008) and 5,046,090 (Walker), and claims 10-19 to be obvious over
`
`Durden and Walker. Id.
`
`The Examiner cited Rohatgi ’693 as a secondary reference in combination
`
`with Durden, and relied only on its disclosure of a “multifunctional interactive
`
`television system.”1 See Ex. 1002 at 71. The Examiner found that “Durden fails to
`
`teach an interactive television application attempting to perform the one or more
`
`functions,” and that “[i]t would have been obvious to modify Durden’s
`
`analog/digital system to include Rohatgi’s multifunctional interactive television
`
`system.” Id. The Examiner did not cite any other disclosure of Rohatgi ’693. Id.
`
`1 European Patent Application No. EP 0752786 (“Rohatgi ’786”), relied on by
`
`Petitioner for Grounds 1 and 2 in this Petition, claims priority to Rohatgi ’693.
`
`6
`
`

`
`U.S. Patent No. 6,148,081 (claims 1-9, 23-26)
`Petition for Inter Partes Review
`
`at 71-73.
`
`On August 30, 1999, Patent Owner responded to the Office Action by
`
`arguing that Durden “does not disclose a receiver which is configured to accept a
`
`request from an application to perform an operation and to allow this application to
`
`perform the operation if the application has a valid credential ….” Id. at 80.
`
`According to Patent Owner, Durden “fails to teach an application credential having
`
`information identifying an interactive television application.” Id. at 81. Patent
`
`Owner did not address Rohatgi ’693. Id. at 82-86.
`
`On October 25, 1999, the Examiner withdrew the pending rejections and
`
`rejected all claims based on obviousness-type double patenting over claims 1-23 of
`
`App. No. 09/087,386. Id. at 93-94. Patent Owner submitted a terminal disclaimer
`
`on January 24, 2000. Id. at 98-99. The Examiner issued a Notice of Allowance on
`
`April 10, 2000 (id. at 101-103), and the patent issued on November 14, 2000.
`
`V. CLAIM CONSTRUCTION OF CHALLENGED CLAIMS
`In the context of an inter partes review, “[a] claim in an unexpired patent
`
`shall be given its broadest reasonable construction in light of the specification of
`
`the patent in which it appear.” 37 C.F.R. § 42.100(b). Because the ’081 Patent has
`
`not expired, Petitioner proposes constructions for certain claim terms according to
`
`7
`
`

`
`U.S. Patent No. 6,148,081 (claims 1-9, 23-26)
`Petition for Inter Partes Review
`their broadest reasonable interpretation in light of the specification.2
`
`For terms not specifically construed below, Petitioner interprets them in
`
`accordance with their plain and ordinary meaning consistent with the broadest
`
`reasonable interpretation standard.
`
`“Credential” (claims 1-3 and 23)
`
`A.
`In light of the ’081 Patent specification, the broadest reasonable construction
`
`of “credential” is “information that identifies an object and its privileges, rights,
`
`and restrictions.” See Ex. 1001 [’081 Patent] at 2:47-49; Ex. 1003 [Kramer Decl.]
`
`at ¶¶ 25-28.
`
`Petitioner’s proposed construction is directly supported by the specification.
`
`The ’081 Patent describes a “credential” as information that serves two purposes:
`
`(1) identify an object (e.g., an application, an application carousel, or an
`
`application module), and (2) describe the privileges, rights, and restrictions of the
`
`identified object. See, e.g., Ex. 1001 at 2:47-49 (“The system utilizes a credential
`
`consisting of various pieces of information to identify an application and its
`
`2 Because the claim construction standard in this proceeding differs from the
`
`standard applicable to a district court litigation, see In re Am. Acad. of Sci. Tech
`
`Ctr., 367 F.3d 1359, 1364, 1369 (Fed. Cir. 2004), Petitioner expressly reserves the
`
`right to argue in litigation a different construction for any term recited by the
`
`claims of the ’081 Patent.
`
`8
`
`

`
`U.S. Patent No. 6,148,081 (claims 1-9, 23-26)
`Petition for Inter Partes Review
`respective privileges, rights and restrictions.”); 4:47-49 (“The credentials are sets
`
`of data which can be used to identify and verify the privileges and limitations of
`
`particular modules.”); 8:62-65 (“A credential is a collection of information which
`
`typically identifies the carousel and can be taken as proof of the module’s
`
`authorization to perform the restricted operation.”).
`
`Petitioner’s proposed construction is consistent with the plain and ordinary
`
`meaning of the claim term. The American Heritage Dictionary defines
`
`“credential” as: “(1) Something that entitles one to confidence or authority. (2)
`
`Credentials. Evidence concerning one’s authority.” Ex. 1009 at 203. Much like a
`
`credential given to a diplomat, the electronic “credential” described by the ’081
`
`Patent identifies its holder and provides information relating to the holder’s
`
`authorities to perform certain functions. See Ex. 1003 [Kramer Decl.] at ¶ 28.
`
`VI. SPECIFIC EXPLANATION OF GROUNDS FOR INVALIDITY
`A. Ground 1: Rohatgi ’786 anticipates claims 1-3 and 23
`Summary of Rohatgi ’786
`1.
`Rohatgi ’786, titled “Apparatus and method for authenticating transmitted
`
`applications in an interactive information system,” was published by the European
`
`Patent Office on January 8, 1997. Ex. 1005 [Rohatgi ’786] at cover. Because
`
`Rohatgi ’786 was published more than a year before the earliest priority date of the
`
`’081 Patent, it qualifies as prior art to the ’081 Patent under at least 35 U.S.C. §
`
`102(b).
`
`9
`
`

`
`U.S. Patent No. 6,148,081 (claims 1-9, 23-26)
`Petition for Inter Partes Review
`Rohatgi ’786 discloses an interactive television system that executes
`
`interactive television applications. Ex. 1005 at Abstract. Each application
`
`comprises multiple program “modules,” including “Code Modules” containing
`
`executable code, “Data Modules” containing non-executable data, and a “Directory
`
`Module” containing “information to interrelate respective transmission units and
`
`modules as an application.” Id. at 3:49-54; Fig. 4. In addition, the “Directory
`
`Module” of an interactive application includes data that can authenticate the
`
`application and specify its privileges, rights, and restrictions. See Id. at Abstract;
`
`5:39-40; Fig. 12. Before a television receiver executes an application, a
`
`“certificate” within the “Directory Module” of the application is “decoded and
`
`checked for authenticity.” Id. The “Directory Module” of the application also
`
`includes “authorization flags which grant/deny the receiver processors access to
`
`privileged actions.” Id. at 5:39-40; Fig. 12.
`
`Figure 12, reproduced below, illustrates the contents of a “Directory
`
`Module” as disclosed by Rohatgi ’786. It includes information identifying the
`
`application (e.g., “Application ID”), the producer of the application (e.g.,
`
`“Producer ID”), and the execution permissions and privileges of the application
`
`(e.g., “Application Authorization Mask”). Id. at Fig. 12; 5:56-57.
`
`10
`
`

`
`U.S. Patent No. 6,148,081 (claims 1-9, 23-26)
`Petition for Inter Partes Review
`
`FIGURE 12 OF ROHATGI ’786 (EX. 1005)
`Rohatgi ’786 was not cited during prosecution of the ’081 Patent. To the
`
`
`
`extent Patent Owner argues this Petition should be denied because Rohatgi ’693
`
`(Ex. 1008)—a U.S. patent related to Rohatgi ’786—was cited during prosecution,
`
`that argument should be rejected because the Board is “not required by statute to
`
`11
`
`

`
`U.S. Patent No. 6,148,081 (claims 1-9, 23-26)
`Petition for Inter Partes Review
`reject a petition based upon the fact that certain arguments or art were previously
`
`considered by the Office.” Micron Tech., Inc. v. The Bd. of Tr. of the Univ. of Ill.,
`
`IPR2013-00008, Paper 24 at *6-7 (P.T.A.B. Marc. 13, 2013); Int’l Bus. Machines
`
`Corp. v. Intellectual Ventures I LLC, IPR2015-00303, Paper 8 at *15 (P.T.A.B.
`
`June 2, 2015). The Board has consistently instituted reviews based on prior art
`
`considered during prosecution when the “record [of the petition] differs from the
`
`one before the Examiner.” Micron Tech., IPR2013-00008, Paper 24 at *7 (IPR
`
`record is different because of new expert testimony); see also, Chi Mei Innolux
`
`Corp. v. Semiconductor Energy Lab. Co., Ltd., IPR2013-00028, Paper 14 at *10
`
`(P.T.A.B. Mar. 21, 2013) (same); Macauto U.S.A. v. BOS GMBH & KG, IPR2012-
`
`00004, Paper 18 at *17-19 (P.T.A.B. Jan. 24, 2013) (IPR record is different
`
`because of new combinations and new application of prior art). The record of this
`
`Petition differs from that of the original prosecution—Petitioner is relying on a
`
`reference not cited by the Office, portions of disclosure not considered by the
`
`Office, expert testimony not available to the Office, and grounds of invalidity not
`
`addressed during prosecution. Thus, the Examiner’s citation of Rohatgi ’693—as a
`
`combination reference for its disclosure of a “multifunctional interactive television
`
`system” (see Ex. 1002 at 71)—does not serve as a valid reason for denying
`
`proposed grounds of invalidity based on Rohatgi ’786.
`
`For reasons set forth below, Rohatgi ’786 discloses each and every
`
`12
`
`

`
`U.S. Patent No. 6,148,081 (claims 1-9, 23-26)
`Petition for Inter Partes Review
`limitation recited by claims 1-3, 23, and 24 of the ’081 Patent.
`
`2.
`
`Claim 1
`
`a.
`
`Preamble: “A method for controlling functions of
`interactive television applications in an interactive
`television system, the method comprising:”
`
`To the extent limiting, Rohatgi ’786 discloses the preamble of claim 1. See
`
`Ex. 1003 [Kramer Decl.] at ¶ 46.
`
`Rohatgi ’786 discloses a method for controlling an “executable interactive
`
`program” in an “interactive television system” by preventing the program from
`
`operating with unauthorized data. Ex. 1005 [Rohatgi ’786] at Abstract (“An
`
`executable interactive program is combined with audio/video data for
`
`transmission.”); 2:3-4 (“This invention relates to a method and apparatus for
`
`insuring that data accepted by an interactive television system is authorized data.”).
`
`Specifically, Rohatgi ’786 discloses using “authorization flags” within the
`
`certificate of a “Directory Module” of the application to “grant/deny the receiver
`
`processors access to privileged actions.” Id. at 5:30-55; Fig. 12. These
`
`“authorization flags” control the functions of the interactive television application
`
`because “[a]n application must have the authorization flags set … before it is
`
`permitted to perform the privileged action.” Id. at 5:57-58. Examples of functions
`
`controlled by the “authorization flags” include “the ability to establish a remote
`
`connection” and “the ability to control external devices.” Id. at 5:50-51.
`
`13
`
`

`
`U.S. Patent No. 6,148,081 (claims 1-9, 23-26)
`Petition for Inter Partes Review
`Accordingly, Rohatgi ’786 discloses method for controlling functions of
`
`interactive television applications in an interactive television system.
`
`b.
`
`Element [1A]: “loading in said interactive television
`system an interactive television application having a
`credential associated therewith, said credential including
`information identifying one or more functions”
`
`Rohatgi ’786 discloses loading an interactive television application in an
`
`interactive television system. See Ex. 1005 [Rohatgi ’786] at 10:32-33 (“The
`
`audio, video and data packets are loaded into respective predetermined memory
`
`locations to enable the signal processors easy access to the component data.”).
`
`When an “application program is completely stored in memory,” the application is
`
`“checked for transmission integrity” and then “executed.” Id. at 11:52-59; Fig. 10.
`
`Rohatgi ’786 discloses that each loaded interactive television application has
`
`a credential associated therewith—in the form of identification and permission data
`
`contained within a “Data Module.” Rohatgi ’786 discloses that each application is
`
`composed of multiple program “modules,” including “Code Modules” containing
`
`executable code, “Data Modules” containing non-executable data, and a “Directory
`
`Module” containing “information to interrelate respective transmission units and
`
`modules as an application.” Ex. 1005 at 3:49-54; Fig. 4. A “signed certificate …
`
`is appended to the Directory Module” of each application. Id. at 6:54-57. When
`
`an application is received by the television receiver, the certificate included in the
`
`“Directory Module” is “decoded and checked for authenticity of provider” and the
`
`14
`
`

`
`U.S. Patent No. 6,148,081 (claims 1-9, 23-26)
`Petition for Inter Partes Review
`application is executed only if the certificate is verified to be authentic. Id. at
`
`Abstract.
`
`Each “Directory Module” includes, among other fields, identification
`
`information for the application (e.g. “Application ID” and “Application Name”).
`
`Id. at Fig. 12. The “Directory Module” also includes “authorization flags which
`
`grant/deny the receiver processors access to privileged actions.” Id. at 5:30-40. For
`
`example, these “authorization flags” may control whether the application has “the
`
`ability to establish a remote connection” or “the ability to control external
`
`devices.” Id. at 50-51. These “authorization flags” are stored in the “provider
`
`certificate” and “application authorization field”—both of which are within the
`
`“Directory Module.” See id. at 56-57; Fig. 12. “An application must have the
`
`authorization flags set at both locations before it is permitted to perform the
`
`privileged action.” Id. at 57-58. The “authorization flags” disclosed by Rohatgi
`
`’786 identify one or more functions of an interactive television application.
`
`Therefore, the “Directory Module” of each application includes data
`
`constituting a “credential”—i.e., information that identifies an application and its
`
`privileges, rights, and restrictions. See Ex. 1003 [Kramer Decl.] at ¶¶ 49-50. Thus,
`
`Rohatgi ’786 discloses loading in an interactive television system an interactive
`
`television application having a credential associated therewith, said credential
`
`including information identifying one or more functions. See id. at ¶¶ 47-50.
`
`15
`
`

`
`U.S. Patent No. 6,148,081 (claims 1-9, 23-26)
`Petition for Inter Partes Review
`Element [1B]: “verifying said credential”
`
`c.
`
`Rohatgi ’786 discloses verifying the credential within the “Directory
`
`Module” by “decod[ing] and check[ing] [its certificate] for authenticity of
`
`provider”; the user’s receiver executes an application only after completion of this
`
`verification process. Ex. 1005 [Rohatgi ’786] at Abstract; see also, id. at 11:19-22.
`
`Rohatgi ’786 also discloses using “hash values” to verify the integrity of modules,
`
`including the “Directory Module.”3 Id. at Abstract, 6:54-57. “If the hash values
`
`are identical and the certificate is authentic, the system is conditioned to execute
`
`the transmitted program.” Id. at 2:26-27.
`
`At execution time, Rohatgi ’786 verifies the “authorization flags” of an
`
`application before permitting the program to perform certain privileged actions.
`
`See id. at 57-58 (“An application must have the authorization flags set at both
`
`locations before it is permitted to perform the privileged action.”).
`
`Thus, Rohatgi ’786 discloses verifying the credential of an application. See
`
`Ex. 1003 [Kramer Decl.] at ¶¶ 51-53.
`
`
`3 A “hash value” is a fixed-length numerical value that uniquely identifies a blocks
`
`of data. Ex. 1003 [Kramer Decl.] at ¶ 52.
`
`16
`
`

`
`d.
`
`U.S. Patent No. 6,148,081 (claims 1-9, 23-26)
`Petition for Inter Partes Review
`Element [1C]: “ when said interactive television
`application attempts to perform said one or more
`functions, allowing said interactive television application
`to perform said one or more functions if said information
`indicates permission to perform said one or more
`functions”
`
`Rohatgi ’786 discloses “authorization flags” in the “Directory Module” of
`
`each application that specify whether that application is permitted to perform one
`
`or more functions. Ex. 1005 [Rohatgi ’786] at 5:30-58; Fig. 12. “An application
`
`must have the authorization flags set … before it is permitted to perform the
`
`privileged action.” Id. at 5:57-58. Each television receiver contains an
`
`“authorization mask” stored in nonvolatile memory that “is programmed to permit
`
`access to particular privileged, or to prevent certain privileged actions” based on
`
`the “authorization flags” in an application’s “Directory Module.” Id. at 5:58-6:1.
`
`For example, the “authorization flags” of an interactive application may
`
`specify whether the application is permitted to “establish a remote connection” or
`
`“control external devices”; that interactive application would not be permitted to
`
`perform these functions if the corresponding authorization flags are disabled. See
`
`id. at 5:50-51. Thus, Rohatgi ’786 discloses that, when an interactive television
`
`application attempts to perform one or more functions (e.g., establish a remote
`
`connection or control an external device), allowing said application to perform said
`
`functions only if information in its credential (i.e., “authorization flags” in the
`
`“Directory Module”) indicates permission to do so. See Ex. 1003 [Kramer Decl.]
`
`17
`
`

`
`U.S. Patent No. 6,148,081 (claims 1-9, 23-26)
`Petition for Inter Partes Review
`
`at ¶¶ 55-57.
`
`3.
`
`Claim 2: “storing said information if said credential is
`valid”
`Rohatgi ’786 discloses a receiver that stores received data in memory. See
`
`Ex. 1005 [Rohatgi ’786] at Figs. 8-9; 12:20 (“storing detected modules in
`
`memory”). Modules that cannot be verified are rejected and deleted. See id. at
`
`12:41-42 (“The apparatus … includes means to delete from said memory, modules
`
`for which corresponding hash values are not identical.”). In other words, if a
`
`received “Directory Module” is verified to be valid, the “authorization flags”
`
`contained therein would be stored in memory; otherwise, the entire module would
`
`be deleted. Ex. 1003 [Kramer Decl.] ¶ at 61.
`
`Thus, Rohatgi ’786 discloses storing “said information” recited by claim 1
`
`(i.e. “information identifying one or more function”) if the credential is verified to
`
`be valid. See id. at ¶¶ 59-62.
`
`4.
`
`Claim 3: “wherein said credential contains an expiration
`date and wherein said step of verifying said credential
`further comprises determining whether said expiration date
`has passed”
`
`Rohatgi ’786 discloses a “Directory Module” that includes a “certificate.”
`
`Ex. 1005 [Rohatgi ’786] at Fig. 12. The “certificate” includes a field specifying
`
`“the expiration date of the certificate.” Id. at 5:25-27. During the certificate
`
`verification process, the “expiration time and date … is compared against the
`
`18
`
`

`
`U.S. Patent No. 6,148,081 (claims 1-9, 23-26)
`Petition for Inter Partes Review
`current time and date.” Id. at 11:30-36; Fig. 12. The application identified by the
`
`“Directory Module” is not executed “if … the certificate has expired.” Id.
`
`As explained above for Claim 1, the

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket