throbber

`UNITED STATES PATENT AND TRADEMARK OFFICE
`_______________
`
`BEFORE THE PATENT TRIAL AND APPEAL BOARD
`_______________
`
`APPLE INC.
`Petitioner,
`
`v.
`
`PERSONALIZED MEDIA COMMUNICATIONS LLC
`Patent Owner
`
`______________
`
`Case: IPR2016-01520
`Patent No. 8,559,635
`______________
`
`
`
`DECLARATION OF TIMOTHY D. DORNEY, PH.D., IN SUPPORT OF
`PATENT OWNER’S CONTINGENT MOTION TO AMEND THE CLAIMS
`
`
`
`
`
`PMC Exhibit 2223
`Apple v. PMC
`IPR2016-01520
`Page 1
`
`

`

`Introduction and Qualifications
`1.
`
`I, Timothy D. Dorney, submit the following sworn declaration in
`
`IPR2016-01520 in support of the validity of U.S. Patent No. 8,559,635 (“ ’635
`
`patent”). I am an employee of Patent Owner, Personalized Media
`
`Communications, L.L.C. (“PMC”).
`
`2.
`
`I am currently the Vice President - Intellectual Property of PMC,
`
`where I am responsible for both licensing and litigation support.
`
`3.
`
`I hold a Bachelor of Science degree in Electrical Engineering from
`
`Texas A&M University, a Master of Science in Electrical Engineering and Applied
`
`Physics from Case Western Reserve University, and Ph.D. in Electrical and
`
`Computer Engineering from Rice University. My doctoral thesis was focused on
`
`signal processing and imaging techniques for waveforms captured in the THz
`
`spectrum.
`
`4.
`
`I have nearly 10 years of experience working in product development,
`
`design, and advanced architecture of semiconductor memories. I’ve worked as
`
`both a product development engineer and design engineer in video RAM
`
`development, an IC design engineer in application specific DRAM design, and as a
`
`Circuits Center of Expertise engineer in memory products design at Texas
`
`Instruments Incorporated.
`
`
`
`
`2
`
`PMC Exhibit 2223
`Apple v. PMC
`IPR2016-01520
`Page 2
`
`

`

`5.
`
`I have over seven years of experience in circuit and product design of
`
`small wattage AC/DC converters and LED lighting systems as President of my
`
`own company.
`
`6.
`
`I am licensed to practice before the United States Patent & Trademark
`
`Office as a patent agent and I have ample experience drafting and prosecuting
`
`patent applications in various technologies, with an emphasis in technical fields
`
`including memory, analog circuits, processors, and digital systems. I am a named
`
`inventor on at least seven U.S. patents and have authored numerous journal and
`
`conference papers.
`
`7.
`
`8.
`
`A copy of my curriculum vitae is attached as Exhibit 2206.
`
`I am informed and understand that the claims of the patent are judged
`
`from the perspective of a hypothetical construct involving a “person of ordinary
`
`skill in the art.” The “art” is the field of technology to which the patent is related.
`
`I understand that the purpose of using the viewpoint of a Person of Ordinary Skill
`
`in the Art (“POSA”) is for objectivity and to avoid hindsight bias.
`
`9.
`
`Based on the Institution Decision (Paper #7 at 24), a person of
`
`ordinary skill in the art of the claimed invention would have a “bachelor’s degree
`
`or equivalent in digital electronics, electrical engineering, computer engineering,
`
`computer science, or a related technical degree, with 2-5 years of post-degree work
`
`experience in system engineering (or equivalent).”
`
`
`
`
`3
`
`PMC Exhibit 2223
`Apple v. PMC
`IPR2016-01520
`Page 3
`
`

`

`10.
`
`I am qualified as a person of at least ordinary skill in the art and my
`
`qualifications enable me to provide opinions regarding the claims of the Patents-In-
`
`Suit from the perspective of a POSA.
`
`Motion to Amend
`11.
`
`I have been informed and understand that if the Patent Trial and
`
`Appeal Board should accept the Petitioner’s arguments and cancel any of the
`
`issued ’635 patent claims as unpatentable, PMC has made a contingent motion to
`
`amend to substitute the canceled claim(s) with corresponding proposed amended
`
`claims 41-48 (“Substitute Claims”).
`
`12.
`
`I have reviewed all relevant papers and exhibits in connection with
`
`IPR2016-01520, including PMC’s Contingent Motion to Amend filed concurrently
`
`herewith.
`
`a. The Proposed Substitute Claims are Supported by the Written
`Description of the Application
`
`13.
`
`I have been informed and understand that to amend the claims, the
`
`Patent Owner must show, among other things, that the Substitute Claims are
`
`supported by the written description of the original disclosure of the patent, as well
`
`as any patent application to which the claim seeks the benefit of priority.
`
`14. To satisfy the written description requirement, I have been informed
`
`and understand that the Substitute Claims must be disclosed in sufficient detail
`
`
`
`
`4
`
`PMC Exhibit 2223
`Apple v. PMC
`IPR2016-01520
`Page 4
`
`

`

`such that a POSA can clearly conclude that the inventor invented the claimed
`
`invention as of the filing date sought.
`
`15. The proposed Substitute Claims of the ’635 patent are included below:
`
`2. (Parent of substitute claims 42 and 43) A method for controlling
`
`the decryption of programming at a subscriber station, said method
`
`comprising the steps of:
`
`receiving programming, said programming having a first encrypted
`
`digital control signal portion and an encrypted digital information
`
`portion;
`
`detecting said first encrypted digital control signal portion of said
`
`programming;
`
`passing said first encrypted digital control signal portion of said
`
`programming to a first decryptor at said subscriber station;
`
`decrypting said first encrypted digital control signal portion of said
`
`programming using said first decryptor at said subscriber station;
`
`passing said encrypted digital information portion of said
`
`programming and the decrypted control signal portion to a second
`
`decryptor at said subscriber station;
`
`
`
`
`5
`
`PMC Exhibit 2223
`Apple v. PMC
`IPR2016-01520
`Page 5
`
`

`

`decrypting said encrypted digital information portion of said
`
`programming using said second decryptor at said subscriber station
`
`based on the decrypted control signal portion; and
`
`presenting said programming.
`
`41. (Substitute for original claim 3, if found unpatentable) A method
`
`of controlling a remote transmitter station to communicate digital
`
`program material to a subscriber station and controlling said
`
`subscriber station to process or output a unit of digital programming,
`
`said method comprising the steps of:
`
`receiving a control signal which operates at the remote transmitter
`
`station to control the communication of a unit of digital programming
`
`and one or more first instruct signals and communicating said control
`
`signal to said remote transmitter station;
`
`receiving a code or datum identifying a unit of digital programming to
`
`be transmitted by the remote transmitter station, said remote
`
`transmitter station transferring said unit of digital programming to a
`
`transmitter;
`
`receiving at said remote transmitter station one or more second
`
`instruct signals which operate at the subscriber station to identify and
`
`decrypt said unit of digital programming or said one or more first
`
`
`
`
`6
`
`PMC Exhibit 2223
`Apple v. PMC
`IPR2016-01520
`Page 6
`
`

`

`instruct signals, said remote transmitter station transferring said one or
`
`more second instruct signals to said transmitter; and
`
`transmitting from said remote transmitter station an information
`
`transmission comprising said unit of digital programming, said one or
`
`more first instruct signals, and said one or more second instruct
`
`signals, said one or more first instruct signals being transmitted in
`
`accordance with said control signal, wherein said remote transmitter
`
`station encrypts, absent any scrambling, said unit of digital
`
`programming using one of a plurality of cipher algorithms
`
`preprogrammed at said subscriber station, wherein a cipher algorithm
`
`identification transmitted by said remote transmitter station may be
`
`changed to a different one of said plurality of cipher algorithms.
`
`42. (Substitute for original claim 4, if found unpatentable)
`
`The method of claim 2, wherein said programming further includes
`
`encrypted digital video, said subscriber station storing a computer file
`
`with a file extension, wherein said computer file comprises subscriber
`
`specific digital data, said encrypted digital information portion
`
`comprises encrypted digital audio, said second decryptor using one of
`
`a plurality of preprogrammed cipher algorithms chosen from said
`
`plurality at said subscriber station, said programming further
`
`
`
`
`7
`
`PMC Exhibit 2223
`Apple v. PMC
`IPR2016-01520
`Page 7
`
`

`

`comprises unique digital data, wherein said unique digital data is
`
`communicated to a remote site, said step of presenting includes
`
`outputting audio coordinated in time to bring meaning to video,
`
`wherein said audio and said video both result from decrypting, absent
`
`any descrambling, said programming, and said step of presenting is
`
`based in part on said subscriber specific digital data.
`
`43. (Substitute for original claim 7, if found unpatentable) The
`
`method of claim 2, wherein said subscriber station detects, in a
`
`transmission channel including said programming, a second control
`
`signal portion used to decrypt the first control signal portion, wherein
`
`said programming further includes unique digital data, said subscriber
`
`station communicating said unique digital data to a remote site
`
`through a digital information transmission automatically initiated by
`
`said subscriber station, said second decryptor decrypts, absent any
`
`descrambling, using one of a plurality of cipher algorithms
`
`preprogrammed at said subscriber station chosen based on said
`
`decrypted control signal portion.
`
`44. (Substitute for original claim 13, if found unpatentable) A
`
`method of processing digital signals at a receiver station comprising
`
`the steps of:
`
`
`
`
`8
`
`PMC Exhibit 2223
`Apple v. PMC
`IPR2016-01520
`Page 8
`
`

`

`receiving at least one information transmission;
`
`detecting a plurality of digital signals in said at least one information
`
`transmission;
`
`changing a decryption technique in response to at least a first of said
`
`plurality of digital signals, wherein said at least a first of said plurality
`
`of digital signals identifies a cipher algorithm and said changing said
`
`decryption technique comprises choosing from amongst a plurality of
`
`cipher algorithms preprogrammed at said receiver station;
`
`decrypting, absent any descrambling, a second of said plurality of
`
`digital signals on the basis of said changed decryption technique,
`
`wherein said decrypted second of said plurality of digital signals is
`
`embedded with executable instructions and unique digital data;
`
`communicating said unique digital data to a remote site;
`
`passing said decrypted second of said plurality of digital signals to a
`
`controllable device; [and]
`
`controlling said controllable device on the basis of said embedded
`
`executable instructions of said passed decrypted second of said
`
`plurality of digital signals; and
`
`
`
`
`9
`
`PMC Exhibit 2223
`Apple v. PMC
`IPR2016-01520
`Page 9
`
`

`

`presenting information dependent on said executable instructions and
`
`customized based on subscriber specific digital data stored at said
`
`receiver station prior in time to said step of receiving.
`
`45. (Substitute for original claim 18, if found unpatentable) A
`
`method of processing signals at a receiver station comprising the steps
`
`of:
`
`receiving at least one encrypted digital information transmission,
`
`wherein the at least one encrypted digital information transmission is
`
`unaccompanied by any non-digital information transmission;
`
`storing at said receiver station subscriber specific digital data, said
`
`storing preceding in time said step of receiving;
`
`locating code;
`
`passing said code to a processor at said receiver station;
`
`controlling a decryptor that decrypts encrypted digital data to decrypt
`
`in a specific fashion on the basis of said code, wherein said step of
`
`controlling comprises identifying a cipher algorithm from a plurality
`
`of preprogrammed cipher algorithms at said receiver station based on
`
`a received signal from external said receiver station;
`
`
`
`
`10
`
`PMC Exhibit 2223
`Apple v. PMC
`IPR2016-01520
`Page 10
`
`

`

`decrypting a portion of said at least one information transmission in
`
`said specific fashion, said decrypted portion having a first decrypted
`
`portion and a second decrypted portion; and
`
`passing said first decrypted portion of said at least one encrypted
`
`digital information transmission to one of said processor and an output
`
`device, wherein said second decrypted portion comprises unique
`
`digital data, said unique digital data communicated to a remote site,
`
`and said passing to said output device outputs information customized
`
`dependent on said step of storing.
`
`46. (Substitute for original claim 20, if found unpatentable) A
`
`method of processing signals at a receiver station comprising the steps
`
`of:
`
`receiving at least one encrypted digital information transmission,
`
`wherein the at least one encrypted digital information transmission is
`
`unaccompanied by any non-digital information transmission;
`
`storing at said receiver station a computer file with a file extension,
`
`said computer file comprising first unique digital data specific to said
`
`subscriber, said first unique digital data resulting from subscriber
`
`input at an input device at said receiver station preceding in time said
`
`
`
`
`11
`
`PMC Exhibit 2223
`Apple v. PMC
`IPR2016-01520
`Page 11
`
`

`

`step of receiving, said subscriber input absent any digital information
`
`provider assigned access information;
`
`detecting a plurality of signals on said at least one encrypted digital
`
`information transmission;
`
`decrypting at least one of said plurality of signals, said at least one
`
`decrypted signal embedded with at least one instruct signal which is
`
`effective to instruct, and embedded with second unique digital
`
`information;
`
`communicating said second unique digital information to a remote
`
`site;
`
`passing the at least one decrypted instruct signal to a controllable
`
`device; [and]
`
`controlling said controllable device on the basis of decrypted
`
`information included in said at least one decrypted instruct signal; and
`
`presenting a shopping list customized dependent on said computer
`
`file, wherein said step of presenting is dependent on said at least one
`
`decrypted instruct signal.
`
`47. (Substitute for original claim 32, if found unpatentable) A
`
`method of processing signals at a receiver station comprising the steps
`
`of:
`
`
`
`
`12
`
`PMC Exhibit 2223
`Apple v. PMC
`IPR2016-01520
`Page 12
`
`

`

`receiving one or more encrypted digital information transmissions at
`
`said receiver station, wherein said one or more encrypted digital
`
`information transmissions are unaccompanied by any non-digital
`
`information transmission;
`
`storing at said receiver station a computer file with a file extension,
`
`said computer file comprising first unique digital data specific to a
`
`subscriber, said first unique digital data resulting from subscriber
`
`input at an input device at said receiver station that precedes in time
`
`said step of receiving, and said subscriber input absent any digital
`
`information provider assigned access information;
`
`detecting a plurality of signals on said one or more encrypted digital
`
`information transmissions, at least a first of one of said plurality of
`
`signals including a control signal;
`
`controlling a decryptor that decrypts encrypted digital data in response
`
`to said control signal;
`
`decrypting or enabling communication of at least a second of said
`
`plurality of signals on the basis of said step of controlling said
`
`decryptor, wherein said decryptor decrypts using a cipher algorithm
`
`from a plurality of preprogrammed cipher algorithms at said receiver
`
`station identified dependent on said control signal, wherein decrypted
`
`
`
`
`13
`
`PMC Exhibit 2223
`Apple v. PMC
`IPR2016-01520
`Page 13
`
`

`

`at least said second of said plurality of signals comprises second
`
`unique digital data;
`
`communicating said second unique digital data to a remote site;
`
`passing said decrypted or enabled at least said second of said plurality
`
`of signals to a controllable device; [and]
`
`controlling said controllable device by processing instructions
`
`embedded in said passed decrypted or enabled at least said second of
`
`said plurality of signals; and
`
`outputting computer information dependent on said instructions,
`
`wherein said computer information is at least in part customized
`
`dependent on said computer file.
`
`48. (Substitute for original claim 33, if found unpatentable) A
`
`method of processing signals at a receiver station comprising the steps
`
`of:
`
`receiving at least one encrypted digital information transmission,
`
`wherein the at least one encrypted digital information transmission is
`
`unaccompanied by any non-digital information transmission;
`
`storing at said receiver station subscriber specific digital data
`
`preceding in time said step of receiving;
`
`
`
`
`14
`
`PMC Exhibit 2223
`Apple v. PMC
`IPR2016-01520
`Page 14
`
`

`

`identifying a plurality of signals in said at least one encrypted digital
`
`information transmission;
`
`selecting, by processing selection criteria, a first signal of said
`
`plurality of signals including downloadable code;
`
`passing said downloadable code to a processor;
`
`controlling a decryptor that decrypts encrypted digital data to decrypt
`
`in a specific fashion on the basis of said downloadable code, wherein
`
`said specific fashion comprises at least choosing one of a plurality of
`
`cipher algorithms preprogrammed at said receiver station;
`
`decrypting at least one second signal of said plurality of signals in said
`
`specific fashion, wherein decrypted at least one second signal
`
`comprises unique digital data, and comprises a shopping list at least in
`
`part customized dependent on said step of storing;
`
`communicating said unique digital data to a remote site; and
`
`passing said at least one second signal to one of said processor and an
`
`output device.
`
`16.
`
`It is my understanding that the ’635 Patent is based on U.S.
`
`Application No. 08/449,413 (“ ’413 application”) (Ex. 2208). I have reviewed the
`
`’413 application and it is my opinion that a POSA reading the ’413 application
`
`
`
`
`15
`
`PMC Exhibit 2223
`Apple v. PMC
`IPR2016-01520
`Page 15
`
`

`

`would have understood that the inventors of the ’635 patent, Mr. Harvey et al.,
`
`would have been in possession of the invention as recited in the Substitute Claims.
`
`17. Within the ’413 application, the primary embodiments used in the
`
`specification support below reside in Example #4, starting at page 197, Example
`
`#7, starting at page 288, description of an intermediate transmission station
`
`operation, starting at page 429, and the “Exotic Meals of India” embodiment,
`
`starting at page 469. Other portions of the specification are used, as those portions
`
`provide details and explanations that apply to all embodiments. More specifically,
`
`the “Exotic Meals of India” embodiment discloses recipe and shopping list
`
`instructions that are customized by executing the instructions on a microprocessor
`
`at the subscriber station. The recipe and shopping list instructions are delivered to
`
`a subscriber station on a digital data channel. As disclosed, the recipe and
`
`shopping list instructions may be encrypted / decrypted using any technique
`
`explained in the ’413 application. Example #7 discloses decryption of encrypted
`
`digital audio, which is digital information like the recipe and shopping list
`
`instructions. Example #7 discloses cipher algorithm C and cipher key Ca are used
`
`to decrypt the digital audio, selected from cipher algorithms A, B, and C
`
`preprogrammed at the subscriber station. Example #7 further discloses the cipher
`
`information is encrypted, to be decrypted at the subscriber station using key Z
`
`(instead of key J), as in Example #4. Substitute claim 41, instead of focusing on a
`
`
`
`
`16
`
`PMC Exhibit 2223
`Apple v. PMC
`IPR2016-01520
`Page 16
`
`

`

`subscriber station, focuses on an intermediate transmission station (“ITS”).
`
`Specification support for an ITS may be found, amongst other locations, starting at
`
`page 429. The output from this ITS embodiment dovetails into the input in
`
`Example #7. The ITS and Example #7 embodiments both use the “Wall Street
`
`Week” program as an example.
`
`18. For substitute claim 41, within the ’413 application, Harvey et al.
`
`discloses the operation of an ITS to receive digital audio of the “Wall Street Week”
`
`program, a control signal that controls communication, a code or datum that
`
`identifies a unit of digital programming, and at least one first instruct signal or at
`
`least one second instruct signal. The control signal includes particular time
`
`information (e.g., 8:30 PM) and instructions that regulate the timing of events at
`
`the ITS. The code or datum are meter-monitor information that identify specific
`
`information about the “Wall Street Week” program. The first instruct signal
`
`involves the “Select-WSW” instructions that are completed at the ITS to become
`
`the “please-fully-enable-WSW-on-CC13-at-particular-8:30” information
`
`transmitted to the receiver stations. (See 290:4-10). The second instruct signal
`
`involve the “Specific-WSW” instructions that are completed at the ITS to become
`
`the “local-cable-enabling-message (#7)”, which contains a cipher key amongst
`
`other instructions and information, transmitted to the receiver stations. (See 291:9-
`
`20). The ITS transmits an information transmission including the encrypted digital
`
`
`
`
`17
`
`PMC Exhibit 2223
`Apple v. PMC
`IPR2016-01520
`Page 17
`
`

`

`audio, absent any scrambling, and signals received at the ITS. Furthermore, the
`
`ITS encrypts the digital audio using one of a plurality of cipher algorithms
`
`preprogrammed at the subscriber station, and the ITS transmits a cipher algorithm
`
`identification that differs from station to station. Receipt of the information
`
`transmission is described in Example #7.
`
`19. For substitute claim 42, within the ’413 application, Harvey et al.
`
`disclose the “Wall Street Week” embodiment that is the focal point of Example #7.
`
`(Ex. 2208 starting at page 288, Figs. 1A, 1B, 1C, 4). Transmitted programming
`
`includes an encrypted message containing cipher key Ca. The message is
`
`decrypted using decryptor 39K to provide cipher key Ca, which indicates cipher
`
`algorithm C should be used from amongst the plurality of cipher algorithms
`
`preprogrammed at the subscriber station including cipher algorithms A, B, and C.
`
`The encrypted digital audio is decrypted using cipher algorithm C and cipher key
`
`Ca at decryptor 107. Under different decryption routines and hardware, encrypted
`
`digital video is also decrypted. The television show “Wall Street Week” is
`
`presented and unique meter record(s) for the “Wall Street Week” program are
`
`stored at the subscriber station to be communicated to a remote site. Furthermore,
`
`the subscriber station includes a microcomputer which stores the subscriber’s stock
`
`portfolio information in a computer file with a file extension. During the “Wall
`
`
`
`
`18
`
`PMC Exhibit 2223
`Apple v. PMC
`IPR2016-01520
`Page 18
`
`

`

`Street Week” television show presentation, a computer generated overlay graphic
`
`based on the subscriber’s stock portfolio is displayed.
`
`20. For substitute claim 43, the ’413 application discloses the “Wall Street
`
`Week” embodiment as described above in relation to substitute claim 42.
`
`Substitute claim 43 requires a second control signal used to decrypt the first control
`
`signal. As taught in Example #7, the encrypted message containing cipher key Ca
`
`contains an execution segment used to decrypt the encrypted message according to
`
`Example #4. The first control signal portion required in claim 2, the parent claim
`
`to substitute claim 43, is cipher key Ca, which is contained in an information
`
`segment that is received in encrypted form.
`
`21. For substitute claim 44, the ’413 application discloses the “Exotic
`
`Meals of India” embodiment, starting at page 469. In the embodiment, an “Exotic
`
`Meals of India” message includes recipe and shopping list instructions that are
`
`customized by executing the instructions on a microprocessor, containing
`
`subscriber specific data, at the subscriber station. The recipe and shopping list
`
`instructions are delivered to a subscriber station on a digital data channel. Figure
`
`7F in the ’413 application shows decryptor 224 interposed between cable converter
`
`box 222 and microcomputer 205. Decryptor 224 may operate using a selected
`
`cipher algorithm from preprogrammed cipher algorithms A, B, or C. As taught,
`
`the recipe and shopping list instructions may be encrypted / decrypted using any
`
`
`
`
`19
`
`PMC Exhibit 2223
`Apple v. PMC
`IPR2016-01520
`Page 19
`
`

`

`technique imparted by Harvey et al. Example #7 discloses decryption of encrypted
`
`digital audio, which is digital information like the “Exotic Meals of India”
`
`message. Example #7 discloses cipher algorithm C and cipher key Ca are used to
`
`decrypt the digital audio, selected from cipher algorithms A, B, and C
`
`preprogrammed at the subscriber station. Example #7 further discloses the cipher
`
`information is encrypted, to be decrypted at the subscriber station using key Z
`
`(instead of key J), as in Example #4. The decrypted “Exotic Meals of India”
`
`message containing the recipe and shopping list instructions also contains a unique
`
`meter record, which is communicated to a remote site. The microcomputer outputs
`
`a customized recipe and shopping list based on subscriber specific digital data
`
`using, at least, a printer. The subscriber specific data is stored on the
`
`microcomputer prior to receiving the “Exotic Meals of India” message.
`
`22. For substitute claim 45, the ’413 application discloses the “Exotic
`
`Meals of India” embodiment, starting at page 469. Substitute claim 45 uses
`
`support described above in substitute claim 44. Specifically, the same “Exotic
`
`Meals” embodiment is encrypted using the Example #7 message with cipher
`
`algorithm C and cipher key Ca. A different cipher algorithm and key could have
`
`been used such as cipher algorithm A or B, and respective keys Aa or Ba. The
`
`Example #7 also discloses its message is encrypted using key Z (and a related
`
`cipher algorithm) taught in Example #4. As in substitute claim 44, substitute claim
`
`
`
`
`20
`
`PMC Exhibit 2223
`Apple v. PMC
`IPR2016-01520
`Page 20
`
`

`

`45 is supported by disclosing the customization of the “Exotic Meals of India”
`
`recipe and shopping list instructions using subscriber specific digital data stored in
`
`advance of the “Exotic Meals of India” message transmission. Furthermore, for
`
`substitute claim 45, Harvey et al. disclose “one digital data channel”, which is an
`
`all-digital channel, for receipt of the “Exotic Meals of India” message. Also,
`
`unique meter records from the “Exotic Meals” transmission are communicated to a
`
`remote site. The claimed “code” is supported at least by instructions used to
`
`identify one of a preprogrammed cipher algorithms at the receiver station. An
`
`execution segment in Example #4 identifies a cipher algorithm. An information
`
`segment in Example #7 identifies a different cipher algorithm.
`
`23. For substitute claim 46, the ’413 application discloses the “Exotic
`
`Meals of India” embodiment, starting at page 469. Substitute claim 46 is similar to
`
`substitute claim 45. However, the “subscriber specific digital data” is disclosed in
`
`the ’413 application as being unique and stored in a computer file with a file
`
`extension. The user’s street address is stored in an IBM computer file named
`
`A:DATA_OF.URS, which is the same computer file containing the family size and
`
`dietary habits used to customize the information in the “Exotic Meals of India”
`
`message. Harvey et al. disclose delivery of a product may occur at the street
`
`address. Accordingly, the “subscriber specific digital data” is unique by including
`
`a street address that is different to all other street addresses. Also, “at least one
`
`
`
`
`21
`
`PMC Exhibit 2223
`Apple v. PMC
`IPR2016-01520
`Page 21
`
`

`

`instruct signal” is required in substitute claim 46. An “instruct signal” is supported
`
`by Harvey et al. using at least a decrypted execution segment of a SPAM message
`
`containing cipher information.
`
`24. For substitute claim 47, the ’413 application discloses the “Exotic
`
`Meals of India” embodiment, starting at page 469. Substitute claim 47 is similar to
`
`substitute claim 46. However, substitute claim 47 removes the requirement of an
`
`“instruct signal which is effective to instruct”, in favor of a “control signal”, which
`
`is supported by Harvey et al. using at least a header and/or encrypted execution
`
`segment of a SPAM message containing cipher information.
`
`25. For substitute claim 48, the ’413 application discloses the “Exotic
`
`Meals of India” embodiment, starting at page 469. Substitute claim 48 is similar to
`
`substitute claim 45. However, substitute claim 48 requires “downloadable code” in
`
`the transmitted signals, which is supported by Harvey et al. using at least an
`
`information segment of a SPAM message containing cipher information.
`
`26. Each limitation of the Substitute Claims is disclosed in the ’413
`
`applications. Support for the proposed substitute ’635 patent claims is shown
`
`below:
`
`Substitute Claim
`
`Disclosure in the 08/449,413 Application (Ex. 2208)
`
`2. (In support of
`substitute claims
`42 and 43) A
`
`286:34-287:7: “FIG. 4 shows five additional devices –
`three decryptors, 107, 224 and 231, a signal stripper, 229,
`and a signal generator, 230 associated with matrix switch,
`
`
`
`
`22
`
`PMC Exhibit 2223
`Apple v. PMC
`IPR2016-01520
`Page 22
`
`

`

`Substitute Claim
`
`Disclosure in the 08/449,413 Application (Ex. 2208)
`
`method for
`controlling the
`decryption of
`programming at a
`subscriber station,
`said method
`comprising the
`steps of:
`
`
`receiving
`programming,
`said programming
`having a first
`encrypted digital
`control signal
`portion and an
`encrypted digital
`information
`portion;
`
`
`258. Decryptors, 107, 224 and 231, are conventional
`decryptors, well known in the art, with capacity for
`receiving encrypted digital information, decrypting said
`information by means of a selected cipher algorithm and a
`selected cipher key, and outputting the decrypted
`information.”
`
`289:12-21: “In example #7, the intermediate station that
`retransmits "Wall Street Week" program information to the
`subscriber station of Fig. 4 is a cable television system head
`end (such as the head end of Fig. 6). Prior to
`retransmission, said station encrypts the digital audio
`information of said transmission, in a fashion well known in
`the art, using particular cipher algorithm C and cipher key
`Ca, then transmits the information of said program on cable
`channel 13, commencing at a particular 8:30 PM time on a
`particular Friday night.”
`
`“receiving programming”
`
`289:15-21: “Prior to retransmission, said station encrypts
`the digital audio information of said transmission, in a
`fashion well known in the art, using particular cipher
`algorithm C and cipher key Ca, then transmits the
`information of said program on cable channel 13,
`commencing at a particular 8:30 PM time on a particular
`Friday night.”
`
`“said programming having a first encrypted digital
`control signal portion and an encrypted digital
`information portion”
`
`288:30-35: “In example #7, the program originating
`studio that originates the "Wall Street Week"
`transmission transmits a television signal that consists of
`so-called "digital video" and "digital audio," well known
`in the art. Prior to being transmitted, the digital video
`
`
`
`
`23
`
`PMC Exhibit 2223
`Apple v. PMC
`IPR2016-01520
`Page 23
`
`

`

`Substitute Claim
`
`Disclosure in the 08/449,413 Application (Ex. 2208)
`
`information is doubly encrypted …”
`
`289:15-21: “Prior to retransmission, said station encrypts
`the digital audio information of said transmission, in a
`fashion well known in the art, using particular cipher
`algorithm C and cipher key Ca, then transmits the
`information of said program on cable channel 13,
`commencing at a particular 8:30 PM time on a particular
`Friday night.”
`
`290:15-291:8: “At a particular commence-enabling time
`that is a predetermined interval prior to the aforementioned
`8:30 PM time (when said originating studio commences
`transmitting the "Wall Street

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket