throbber

`
`
`
`
`
`
`
`
`
`
`

`
`
`
`
`
`
`
`
`
`
`

`
`UNITED STATES PATENT AND TRADEMARK OFFICE
`
`
`
`
`
`
`
`
`
`
`
`BEFORE THE PATENT TRIAL AND APPEAL BOARD
`
`
`
`
`
`
`
`
`
`
`
`
`APPLE INC.
`Petitioner
`v.
`PERSONALIZED MEDIA COMMUNICATIONS, LLC
`Patent Owner
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Case No.: IPR2016-00755
`Patent No.: 8,191,091
`For: Signal Processing Apparatus and Methods
`
`
`
`
`
`
`
`
`
`
`
`
`
`DECLARATION OF ALFRED C. WEAVER, PH.D.,
`IN SUPPORT OF PATENT OWNER’S RESPONSE
`
`
`
`
`
`
`
`
`
`
`
`
`

`

`

`

`

`
`Mail Stop PATENT BOARD
`Patent Trial and Appeal Board
`United States Patent and Trademark Office
`P.O. Box 1450
`Alexandria, VA 22313-1450





`

`

`
`
`
`
`
`
`
`
`
`
`
`
`
`
`APPLE EXHIBIT 1061
`APPLE v. PMC
`IPR2016-01520
`Page 1
`
`

`

`Table of Contents
`
`
`
`Page
`
`I. Qualifications & Engagement ................................................................................................. 1
`II. Materials Reviewed and Relied upon .................................................................................. 5
`III.
`Summary of Conclusions ..................................................................................................... 6
`IV. Legal Standards .................................................................................................................... 8
`A.
`Priority Date ..................................................................................................................... 8
`B.
`Anticipation ...................................................................................................................... 8
`C.
`Obviousness ..................................................................................................................... 9
`D.
`Claim Construction ........................................................................................................ 11
`E. Persons of Ordinary Skill in the Art .................................................................................. 11
`V.
`Background Technology of the ’091 Patent ...................................................................... 12
`VI. Claim Construction ............................................................................................................ 14
`A.
`“an encrypted digital information transmission including encrypted information” ....... 14
`B.
`“decrypting” / “encrypted” ............................................................................................. 22
`C.
`“locate” / “locating” ....................................................................................................... 42
`D.
`“designated” ................................................................................................................... 43
`E. “processor” ......................................................................................................................... 44
`F. “processor instructions” ..................................................................................................... 46
`VII. Priority Date ....................................................................................................................... 47
`VIII.
`Gilhousen (Ground A) .................................................................................................... 83
`A.
`Gilhousen does not qualify as prior art and is cumulative. ............................................ 83
`
`Gilhousen fails to disclose “receiving an encrypted digital information transmission” as
`B.
`
`recited in claims 13 and 20. ....................................................................................................... 84
`C.
`Gilhousen fails to disclose “determining a fashion in which said receiver station locates
`
`a first decryption key …” or “locating said first decryption key …” as recited in claim 13. ... 89
`D.
`Gilhousen fails to disclose “decrypting said encrypted information …” as recited in
`
`claims 13 and 20 or “decrypt a video portion of said programming” as recited in claims 15 and
`23.
`93
` Gilhousen fails to disclose “passing said instruct-to-enable signal to a processor” as E.
`
`recited in claim 13. .................................................................................................................... 95
`F.
` Gilhousen fails to disclose “a first instruct-to-enable signal including first processor
`instructions” and “executing said first processor instructions …” or “a second instruct-to-
`
`i
`
`
`
`
`
`
`APPLE EXHIBIT 1061
`APPLE v. PMC
`IPR2016-01520
`Page 2
`
`

`

`
`
`enable signal including second processor instructions” and “executing said second processor
`instructions …” as recited in claim 20. ..................................................................................... 96
`IX. Mason (Ground B) ........................................................................................................... 100
`A.
` Mason does not qualify as prior art and is cumulative. ................................................ 100
` Mason fails to disclose “receiving an encrypted digital information transmission” as
`B.
`recited in claims 13 and 20. ..................................................................................................... 101
` Mason fails to disclose “decrypting said encrypted information …” as recited in claims C.
`
`13 and 20 or “decrypt a video portion of said programming” as recited in claims 15 and 23).
`
`104
` Mason fails to disclose “determining a fashion in which said receiver station locates a D.
`
`first decryption key …” or “locating said first decryption key …” as recited in claim 13. .... 105
` Mason fails to disclose “passing said instruct-to-enable signal to a processor” as recited in E.
`
`claim 13. .................................................................................................................................. 107
`F.
` Mason fails to disclose “a first instruct-to-enable signal including first processor
`instructions” and “executing said first processor instructions …” or “a second instruct-to-
`enable signal including second processor instructions” and “executing said second processor
`instructions …” as recited in claim 20. ................................................................................... 107
`X.
`Frezza (Ground C) ........................................................................................................... 110
`A.
`Frezza does not qualify as prior art and is cumulative. ................................................ 110
`
`Frezza fails to disclose “receiving an information transmission including encrypted
`B.
`
`information” or “decrypting said encrypted information …” as recited in claim 26. ............. 112
`C.
`Frezza fails to disclose “detecting the presence of an instruct-to-enable signal” as
`
`recited in claim 26. .................................................................................................................. 113
`D.
`Frezza fails to disclose “automatically tuning said receiver station to a channel
`
`designated by said instruct-to-enable signal” as recited in claim 26. ...................................... 115
`XI. Gilhousen in view of Block (Ground D) .......................................................................... 116
`A.
`The Gilhousen-Block combination does not qualify as prior art and is cumulative. ... 116
`
`Block does not teach or suggest “storing information evidencing said step of
`B.
`
`decrypting.” ............................................................................................................................. 118
`C.
`It would not be obvious to combine Gilhousen with Block. ........................................ 121
`
`XII. Mason in view of Block (Ground E)................................................................................ 125
`A.
`The Mason-Block combination does not qualify as prior art and is cumulative. ......... 125
`
`Block does not teach or suggest “storing information evidencing said step of
`B.
`
`decrypting.” ............................................................................................................................. 125
`C.
`It would not be obvious to combine Mason with Block. ............................................. 126
`
`XIII.
`Frezza in view of Block (Ground F) ............................................................................ 128
`A.
`The Frezza-Block combination does not qualify as prior art and is cumulative. ......... 128
`
`
`ii
`
`
`
`
`
`
`APPLE EXHIBIT 1061
`APPLE v. PMC
`IPR2016-01520
`Page 3
`
`

`

`
`
`Block does not teach or suggest “storing information evidencing said step of
`B.
`
`decrypting.” ............................................................................................................................. 129
`C.
`It would not be obvious to combine Frezza with Block. .............................................. 129
`
`XIV.
`SECONDARY CONSIDERATION CONFIRM NON-OBVIOUSNESS OF THE
`INVENTIONS. ........................................................................................................................... 131
`XV. CONCLUSION ................................................................................................................ 132
`
`
`
`iii
`
`
`
`
`
`
`APPLE EXHIBIT 1061
`APPLE v. PMC
`IPR2016-01520
`Page 4
`
`

`

`
`
`I, Alfred C. Weaver, Ph.D., declare as follows:
`
`1.
`
`I am making this declaration on behalf of Patent Owner Personalized
`
`Media Communications, LLC (hereinafter, “Patent Owner” or “PMC”) in support
`
`of Patent Owner’s Response to the Petition for Inter Partes Review of U.S. Patent
`
`No. 8,191,091 (“the ’091 Patent”) filed by Petitioner Apple Inc. (“Petitioner”).
`
`I.
`
`Qualifications & Engagement
`2.
`
`In terms of my background and experiences that qualify me as an
`
`expert in this case, I earned a Ph.D. in Computer Science in 1976 from the
`
`University of Illinois. I also obtained a Master of Science Degree in Computer
`
`Science from the University of Illinois in 1973 and a Bachelor of Science Degree
`
`in Engineering Science from the University of Tennessee in 1971.
`
`3. My fields of experience include computer science, computer systems,
`
`computer network architecture, and Internet and electronic commerce, among
`
`others.
`
`4.
`
`I am currently a Professor of Computer Science and Associate Chair
`
`of the Department of Computer Science at the University of Virginia (“UVa”). I
`
`have been employed at UVa continuously since 1977. I have taught more than 25
`
`different courses at UVa, including electronic commerce, operating systems,
`
`computer networks, and various programming courses. Moreover, I have been the
`
`graduate advisor for 69 Ph.D. and master’s students, all in Computer Science.
`
`1
`
`
`
`
`
`
`APPLE EXHIBIT 1061
`APPLE v. PMC
`IPR2016-01520
`Page 5
`
`

`

`
`
`5.
`
`I currently teach the University of Virginia’s CS 4753 course
`
`“Electronic Commerce Technologies.” This course explains the role of encryption
`
`in modern electronic commerce and covers the details of the mathematical
`
`algorithms that implement symmetric key encryption, public key encryption, and
`
`other encryption techniques. I was the Principal Investigator for “Secure E-
`
`Commerce: A Modular Course Supported by Virtual Laboratories,” a $500,000
`
`research project funded by the National Science Foundation to develop a course
`
`teaching secure e-commerce.
`
`6.
`
`In addition to my teaching activities at UVa, I am the Founding
`
`Director of the University of Virginia Applied Research Institute, a group of
`
`faculty who are pursuing research projects of national significance in the areas of
`
`homeland security and national defense and intelligence.
`
`7.
`
`I have authored or co-authored 16 books or book chapters in the
`
`computer science field and have authored or co-authored over 170 refereed journal
`
`and conference papers on various topics related to computer science, computer
`
`systems, computer networks, search agents, databases, the Internet and e-
`
`commerce, among other topics.
`
`8. With my co-authors Sam Dwyer and Kristen Hughes, I wrote a
`
`chapter entitled “Health Insurance Accountability and Portability Act” in the book
`
`Security Issues in the Digital Medical Enterprise, published by the Society for
`
`2
`
`
`
`
`
`
`APPLE EXHIBIT 1061
`APPLE v. PMC
`IPR2016-01520
`Page 6
`
`

`

`
`
`Computer Applications in Radiology in 2004. I wrote the paper “Secure Sockets
`
`Layer” in Computer in April 2006. With my co-author Andrew Jurik I wrote
`
`“Securing Mobile Devices with Biotelemetry,” presented at the International
`
`Workshop on Privacy, Security, and Trust in Mobile and Wireless Systems
`
`(MobiPST’11), in Maui, HI, in July, 2011. I presented the NATO Fellowship
`
`Lecture at Bogazici University, in Istanbul, Turkey, in May 2000 on the topic of
`
`“Internet Privacy and Security.” With my master’s student Andrew Snyder I wrote
`
`“The e-Logistics of Securing Distributed Medical Data,” presented at the IEEE
`
`International Conference on Industrial Informatics, Banff, Alberta, Canada, in
`
`August 2003. I supervised Andrew Snyder’s master’s thesis on the topic of
`
`“Performance Measurement and Workflow Impact of Securing Medical Data
`
`Using HIPAA Compliant Encryption in a .NET Environment,” in August 2003.
`
`9.
`
`I am a named inventor on U.S. Patent No. 4,217,658 that resulted
`
`from my Ph.D. research at the University of Illinois.
`
`10.
`
`I am a Fellow of the IEEE, an honor awarded to less than two percent
`
`of the IEEE membership. I am a member of the editorial board of the IEEE
`
`Computer magazine.
`
`11.
`
`I have presented papers at numerous conferences and have served as
`
`Program Chair or Technical Program Chair of a number of conferences around the
`
`world. For example, I was the Keynote Speaker at the International Workshop on
`
`3
`
`
`
`
`
`
`APPLE EXHIBIT 1061
`APPLE v. PMC
`IPR2016-01520
`Page 7
`
`

`

`
`
`Privacy, Security, and Trust for Mobile Devices (MobiPST’11), in Maui, Hawaii,
`
`in July 2011 on the topic of “Providing Privacy and Security for Mobile Devices.”
`
`I was the Keynote Speaker at the IEEE International Conference on Industrial
`
`Technology (ICIT'05), in Hong Kong, in December 2005 on the topic of
`
`“Achieving Data Privacy and Security Using Web Services.” I was the Keynote
`
`Speaker at the IEEE International Conference on Emerging Technologies and
`
`Factory Automation (ETFA’05), in Catania, Sicily, Italy, in September 2005 on the
`
`topic of “A Security Architecture for Distributed Data Security.”
`
`12.
`
`I have been an invited guest lecturer at numerous meetings sponsored
`
`by various corporations around the world. For example, I spoke on “Reliable
`
`Multicast and Reliable Group Management” for a meeting held at Sun
`
`Microsystems in Palo Alto, California in July, 1999. I gave a presentation entitled
`
`“Xpress Transport Protocol” at a meeting sponsored by General Electric Research
`
`and Development Laboratory, held in Schenectady, New York, in December, 1996.
`
`I was an invited speaker on the topic of “Medical Data Privacy and Security” at the
`
`Microsoft Healthcare Users’ Group meeting in Redmond, WA in 2006.
`
`13.
`
`I have also had the opportunity to consult with and/or work in the
`
`commercial sector. For example, I received a $200,000 research grant from
`
`Microsoft for my work in connection with development of a solution to the
`
`problems associated with the privacy and security of medical data. In the past, I
`
`4
`
`
`
`
`
`
`APPLE EXHIBIT 1061
`APPLE v. PMC
`IPR2016-01520
`Page 8
`
`

`

`
`
`have consulted for General Electric, Lockheed Martin, Honeywell, Raytheon, e-
`
`Systems and others. Additionally, I founded five companies of my own which
`
`focused on e-commerce. I was involved in all aspects of the life cycles of these
`
`companies from raising start-up capital funding, to designing and developing
`
`products, to commercializing these products in the marketplace. One of these
`
`companies, Reliacast, developed secure multimedia distribution software and was
`
`ultimately sold to Comcast.
`
`14. A detailed curriculum vitae showing more of my credentials in these
`
`fields and the cases in which I have testified in the past four years is attached as
`
`Ex. 2002.
`
`15.
`
`I am being compensated for my work in this matter at my standard
`
`rate of $400/hour for consulting services. My compensation is not determined by
`
`or contingent upon the outcome of this matter.
`
`II. Materials Reviewed and Relied upon
`16.
`In preparing this Declaration I reviewed and considered the following
`
`
`
`materials:
`
`Description
`Ex. / Doc.
`Paper 1 Petition for Inter Partes Review by Petitioner (“Pet.”)
`Paper 14 Decision on Institution of Inter Partes Review (“Dec.”)
`Paper 10 Petitioner's Preliminary Reply (“Reply”)
`
`5
`
`
`
`
`
`
`APPLE EXHIBIT 1061
`APPLE v. PMC
`IPR2016-01520
`Page 9
`
`

`

`
`
`1001
`
`1003
`1004
`1005
`1006
`1007
`1008
`1009
`1011
`1012
`1013
`1014
`-
`
`Declaration of Anthony J. Wechselberger in Support of
`Petition for Inter Partes Review of U.S. Patent No.
`8,191,091
`U.S. Patent No. 8,191,091
`U.S. Patent No. 4,613,901
`U.S. Patent No. 4,736,422
`U.S. Patent No. 4,712,239
`U.S. Patent No. 4,503,462
`U.S. Patent No. 4,484,217
`U.S. Patent No. 4,694,490
`IPR2014-01533, Paper No. 7
`IPR2014-01533, Paper No. 23
`IPR2014-01532, Paper No. 8
`IPR2014-01532, Paper No. 34
`All other documents cited and used in my Declaration.
`
`17.
`
`I have also relied on my years of education, teaching, research, and
`
`experience concerning software, computer architecture, networks, network
`
`protocols, electronic commerce, privacy and security.
`
`III. Summary of Conclusions
`18.
`I understand that Petitioner challenges the validity of claims 13-16,
`
`18, 20-21, 23-24, 26-27, and 30 (the “Challenged Claims”) of the ’091 Patent
`
`19.
`
`I also understand that the Board instituted trial on six grounds:
`
`(A) claims 13-15, 18, 20, 23 and 24 are allegedly anticipated by U.S.
`
`Patent No. 4,613,901 (Ex. 1004, hereinafter, “Gilhousen”) under 35 U.S.C.
`
`§ 102;
`
`6
`
`
`
`
`
`
`APPLE EXHIBIT 1061
`APPLE v. PMC
`IPR2016-01520
`Page 10
`
`

`

`
`
`(B) claims 13-15, 18, 20, 23 and 24 are allegedly anticipated by U.S.
`
`Patent No. 4,736,422 (Ex. 1005, hereinafter, “Mason”) under 35 U.S.C.
`
`§ 102;
`
`(C) claims 26 and 30 are allegedly anticipated by U.S. Patent No.
`
`4,712,239 (Ex. 1006, hereinafter, “Frezza”) under 35 U.S.C. § 102;
`
`(D) claims 16 and 21 are allegedly rendered obvious by Gilhousen in
`
`view of U.S. Patent No. 4,484,217 (Ex. 1008, hereinafter, “Block”) under 35
`
`U.S.C. § 103;
`
`(E) claims 16 and 21 are allegedly rendered obvious by Mason in
`
`view of Block under 35 U.S.C. § 103; and
`
`(F) claim 27 is allegedly rendered obvious by Frezza in view of
`
`Block under 35 U.S.C. § 103.
`
`20. As described in detail below, it is my opinion that the Challenged
`
`Claims are novel and non-obvious over the references cited by Petitioner.
`
`21. Also, for the reasons set forth below, I conclude that a person of
`
`ordinary skill in the art at the time of the invention would not have had reason to
`
`modify the references in the manner stated in the Petition and in Mr.
`
`Wechselberger’s Declaration (Ex. 1001).
`
`7
`
`
`
`
`
`
`APPLE EXHIBIT 1061
`APPLE v. PMC
`IPR2016-01520
`Page 11
`
`

`

`
`
`22. To the extent permitted by the applicable law and rules, I reserve the
`
`right to respond to any additional arguments and/or evidence introduced by
`
`Petitioner or the Board and to revise my opinions accordingly.
`
`IV. Legal Standards
`23.
`I am not an attorney. I have been advised of the following general
`
`principles of patent law to be considered in formulating my opinions as to whether
`
`the claims of the ’091 Patent are anticipated or would have been obvious to a
`
`person of ordinary skill in the art at the time of the invention in view of the prior
`
`art.
`
`A.
`24.
`
`Priority Date
`
`It is my understanding that, to qualify as prior art to a patent
`
`claim, a reference must be publicly available before the earliest priority
`
`date to which the patent claim is entitled. I understand that the standard to
`
`determine priority of a patent claim is whether the claimed invention is supported
`
`by the corresponding patent application: if the invention is supported, then the
`
`claim is entitled to the priority date when the supporting application was first filed.
`
`I also understand that the priority date is determined on a claim-by-claim basis.
`
`B. Anticipation
`25.
`I understand that to anticipate a patent claim, a single prior art
`
`reference must disclose every element of the claim, either explicitly or inherently
`
`to a person of ordinary skill in the art. I understand that an element of a claim is
`
`8
`
`
`
`
`
`
`APPLE EXHIBIT 1061
`APPLE v. PMC
`IPR2016-01520
`Page 12
`
`

`

`
`
`“inherent” in the disclosure of a prior art reference when the missing element is the
`
`inevitable outcome of the process and/or thing that is described in the prior art
`
`reference.
`
`C. Obviousness
`26.
`I understand that a prior art reference can render a patent claim
`
`obvious to one of ordinary skill in the art if the differences between the subject
`
`matter set forth in the patent claim and the prior art are such that the subject matter
`
`of the claim would have been obvious at the time the claimed invention was made.
`
`In analyzing obviousness, I understand that it is important to consider the scope of
`
`the claims, the level of skill in the relevant art, the scope and content of the prior
`
`art, the differences between the prior art and the claims, and any secondary
`
`considerations.
`
`27.
`
`I understand that when the claimed subject matter involves combining
`
`pre-existing elements to yield no more than one would expect from such an
`
`arrangement, the combination is obvious. I also understand that in assessing
`
`whether a claim is obvious, one must consider whether the claimed improvement is
`
`more than the predictable use of prior art elements according to their established
`
`functions. I understand that there need not be a precise teaching in the prior art
`
`directed to the specific subject matter of a claim because one can take account of
`
`the inferences and creative steps that a person of skill in the art would employ. I
`
`9
`
`APPLE EXHIBIT 1061
`APPLE v. PMC
`IPR2016-01520
`Page 13
`
`

`

`
`
`further understand that a person of ordinary skill is a person of ordinary creativity,
`
`not an automaton.
`
`28. However, I understand that obviousness cannot be based on the
`
`hindsight combination of components selectively culled from the prior art. I also
`
`understand that a combination is not obvious if it requires extensive additional
`
`problem-solving steps that are not taught in the references and that are not simple
`
`matters for a person of ordinary skill in the art. That is, a combination is not
`
`obvious if it requires the development of an additional complex infrastructure.
`
`29.
`
`I understand that in an obviousness analysis, neither the motivation
`
`nor the avowed purpose of the inventors controls the inquiry. Any need or
`
`problem known in the field at the time of the invention and addressed by the patent
`
`can provide a reason for combining elements. For example, I understand that it is
`
`important to consider whether there existed, at the time of the invention, a known
`
`problem for which there was an obvious solution encompassed by the patent’s
`
`claims. I understand that known techniques can have obvious uses beyond their
`
`primary purposes, and that a person of ordinary skill can fit the teachings of
`
`multiple pieces of prior art together like pieces of a puzzle.
`
`30.
`
`I understand that, when there is a reason to solve a problem and there
`
`are a finite number of identified, predictable solutions, a person of ordinary skill
`
`has good reason to pursue the known options within his or her technical grasp. I
`
`10
`
`
`
`
`
`
`APPLE EXHIBIT 1061
`APPLE v. PMC
`IPR2016-01520
`Page 14
`
`

`

`
`
`further understand that, if this leads to the anticipated success, it is likely the
`
`product, not of innovation, but of ordinary skill and common sense, which bears on
`
`whether the claim would have been obvious.
`
`31.
`
`I understand that secondary considerations can include, for example,
`
`evidence of commercial success of the invention, evidence of a long-felt need that
`
`was solved by an invention, evidence that others copied an invention, or evidence
`
`that an invention achieved a surprising result. I further understand that such
`
`evidence must have a nexus or causal relationship to the elements of a claim in
`
`order to be relevant.
`
`D. Claim Construction
`32.
`It is my understanding that in determining whether a patent claim is
`
`anticipated or obvious in view of the prior art, the Patent Office must construe the
`
`claim by giving the claim its broadest reasonable interpretation consistent with the
`
`specification from the standpoint of a person of ordinary skill in the art. For the
`
`purposes of this review, unless otherwise stated, I have construed each claim term
`
`in accordance with its plain and ordinary meaning under the required broadest
`
`reasonable interpretation.
`
`E.
`33.
`
`Persons of Ordinary Skill in the Art
`
`I believe that the ’091 Patent is addressed to a person of ordinary skill
`
`in the art (“POSITA”), i.e., a person with at least the equivalent of a Bachelor of
`
`11
`
`
`
`
`
`
`APPLE EXHIBIT 1061
`APPLE v. PMC
`IPR2016-01520
`Page 15
`
`

`

`
`
`Science in digital electronics, electrical engineering, computer engineering,
`
`computer science, or a related technical degree, with several years (e.g., 2-5 years)
`
`of post-degree experience in a similar field. In determining who would be a
`
`POSITA, I considered at least the following criteria: (a) the type of problems
`
`encountered in the art; (b) prior art solutions to those problems; (c) the rapidity
`
`with which innovations are made; (d) the sophistication of the technology; and
`
`(e) the education level of active workers in the field.
`
`34. Mr. Wechselberger suggests that “a person having ordinary skill in the
`
`relevant art at the time of the alleged invention is a person with a bachelor’s degree
`
`in electrical engineering, or equivalent experience, and two to four years of
`
`experience in the broadcast or cablecast television transmission fields.” Ex. 1001
`
`at ¶87.
`
`35. While I do not agree with Mr. Wechselberger that a POSITA
`
`necessarily has to have 2-4 years of experience in the fields of “broadcast or
`
`cablecast television transmission” because the claimed inventions are clearly not
`
`limited to those technical fields, the parties’ difference here does not seem to
`
`significantly impact the validity analysis based on the cited references.
`
`V. Background Technology of the ’091 Patent
`36. At a high level, the ’091 Patent describes an integrated system of
`
`programming communication that involves the fields of computer processing,
`
`12
`
`
`
`
`
`
`APPLE EXHIBIT 1061
`APPLE v. PMC
`IPR2016-01520
`Page 16
`
`

`

`
`
`computer communications, television, radio, and other electronic communications.
`
`Ex. 1003 at 1:25-32.
`
`37. The ’091 Patent describes the creation and delivery of content in a
`
`novel manner that provides protected, personalized, interactive, and/or combined
`
`medium programming. For instance, the ’091 Patent describes a number of
`
`embodiments including a signal processor capable of identifying, evaluating, and
`
`decrypting various control signals to facilitate secure delivery of programming
`
`content to subscriber stations. Ex. 1003 at 15:14-46.
`
`38. One type of control signals taught in the ’091 Patent provides
`
`enabling information for receiver operations such as content decryption. These
`
`signals are sometimes referred to as “instruct-to-enable signals” and may be
`
`embedded in the programing or may be elsewhere. Ex. 1009, 13:17-20.
`
`39. The signals may instruct a decryptor to decrypt the transmission or not
`
`to decrypt the transmission. Ex. 1009, 13:24-26. In addition, the “instruct-to-
`
`enable signals” may also inform a decryptor how to decrypt. Ex. 1009, 13:27-31.
`
`They may transmit a code or codes necessary for the decryption of the
`
`programming. Ex. 1009, 13:31-32. The “instruct-to-enable signals” may also
`
`inform the receiver apparatus of the fashion for identifying and processing
`
`enabling information (e.g., a decryption key) in the incoming transmission, such as
`
`13
`
`
`
`
`
`
`APPLE EXHIBIT 1061
`APPLE v. PMC
`IPR2016-01520
`Page 17
`
`

`

`
`
`where to look for the enabling information and when and how to transfer the
`
`information to the decryptor. Ex. 1009, 14:54-61.
`
`40. The Challenged Claims are generally directed to decryption key
`
`management techniques whereby a receiver station detects and processes one or
`
`more instruct-to-enable signals to obtain enabling information (e.g., decryption
`
`key) necessary for decryption of digital programming. See Ex. 1003, claims 13,
`
`20, 26.
`
`VI. Claim Construction
`A.
`“an encrypted digital information transmission including
`encrypted information”
`41. Both claims 13 and 20 recite “an encrypted digital information
`
`transmission including encrypted information.”
`
`42. A POSITA would understand the claim term “encrypted digital
`
`information transmission,” as recited in the ’091 Patent claims, to refer to a form of
`
`sending and/or receiving encrypted instructions/commands and data because
`
`digital information, in the context of the ’091 Patent specification, refers to
`
`instructions/commands and data. See Ex. 1003, 148:13-20.
`
`43.
`
`I understand that Petitioner wants to define this term as “an
`
`information transmission that is partially or entirely digital, at least a portion of
`
`which is encrypted.”
`
`14
`
`
`
`
`
`
`APPLE EXHIBIT 1061
`APPLE v. PMC
`IPR2016-01520
`Page 18
`
`

`

`
`
`44.
`
`I agree that the “encrypted digital information transmission” can be
`
`either partially or entirely encrypted. This is because the specification clearly
`
`states an exception applicable to the modifier “encrypted”:
`
`“A decrypter does not necessarily decrypt the entire transmission.
`Encrypted transmissions may be only partially encrypted.”
`
`Ex. 1009, 13:68-14:2. See also Ex. 1003, 160:19-20 (“a transmission of
`
`conventional rerecorded programming that has been encrypted (either fully or
`
`partially)”). Furthermore, it is not uncommon for transmissions to be only partially
`
`encrypted, for example, to include decryption-enabling information in unencrypted
`
`form along with encrypted data in the same transmission.
`
`45. However, I am of the opinion that the information content of the
`
`“encrypted digital information transmission” must be all-digital. In the phrase
`
`“encrypted digital information transmission,” the adjective “digital” indicates that
`
`the information content in the transmission is digital data instead of analog signals.
`
`Unlike the partial-encryption exception stated for the word “encrypted,” neither the
`
`claim language nor the specification indicates any intent for the word “digital” to
`
`modify only a part of the “information transmission.” Thus, the plain meaning of
`
`“digital information transmission” requires its content to be all-digital; it does not
`
`encompass partially digital content because it would otherwise make the modifier
`
`“digital” superfluous. Also, to a POSITA, “digital” means digital; one would not
`
`15
`
`
`
`
`
`
`APPLE EXHIBIT 1061
`APPLE v. PMC
`IPR2016-01520
`Page 19
`
`

`

`
`
`confusingly refer to a transmission with a mixture of both digital and analog
`
`signals simply as a “digital information transmission” without further clarification.
`
`46. This all-digital requirement is also what the patentee actually
`
`intended. In the “Amendment and Request for Consideration Pursuant to 37
`
`C.F.R. §1.129” submitted on December 21, 2011, PMC amended then claims 45
`
`and 52 (which issued as claims 13 and 20 in the ’091 Patent) to change previously
`
`recited “information transmission” to “encrypted digital information transmission”
`
`and further argued as follows:
`
`“Without abandoning their previous argument, Applicants
`acknowledge that it can be argued that Mason teaches encrypted
`elements as part of its analog information transmission. But it does
`not teach the encryption of an entire digital signal transmission. For
`the sake of advancing prosecution, Applicants amend independent
`claims 45 and 52 to clarify that the information transmission received
`is an encrypted digital information transmission. This amendment is
`fully supported by the specification.”
`
`Ex. 1039 at 10 (emphasis added).
`
`47. The above-quoted claim amendments and argument apparently
`
`persuaded the Examiner who then issued a Notice of Allowance on March

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket