throbber
IN THE UNITED STATES DISTRICT COURT
`FOR THE EASTERN DISTRICT OF TEXAS
`MARSHALL DIVISION
`
`
`PERSONALIZED MEDIA
`COMMUNICATIONS, LLC,
`
`
`
`
`
`
`
`
`Plaintiff,
`
`
`
`
`
`
`
`
`
`Defendant.
`
`
`
`vs.
`
`
`
`
`
`APPLE, INC.,
`
`
`
`
`
`
`
`
`
`
`PERSONALIZED MEDIA
`COMMUNICATIONS, LLC,
`
`
`
`
`
`
`
`
`Plaintiff,
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`










`
`
















`
`
`Case No. 2:15-cv-01366-JRG-RSP
`
`
`
`
`
`LEAD CASE
`
`
`
`
`
`
`
`
`
`
`
`Case No. 2:15-cv-01206-JRG-RSP
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`vs.
`
`
`
`
`
`
`
`
`
`TOP VICTORY ELECTRONICS (TAIWAN)
`CO. LTD., TPV INT’L (USA), INC.,
`
`ENVISION PERIPHERALS, INC., TOP
`VICTORY ELECTRONICS (FUJIAN) CO.
`LTD., TPV ELECTRONICS (FUJIAN) CO.
`LTD., TPV TECHNOLOGY LTD., and
`
`VIZIO, INC.
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Defendants.
`
`
`
`
`
`
`
`
`
`
`
`
`PLAINTIFF'S DISCLOSURES UNDER P.R. 3-1
`CONCERNING DEFENDANT APPLE, INC.
`
`
`
`
`
`
`APPLE EX. 1019
`Page 1
`
`

`
`
`
`Pursuant to Patent Rule 3-1, Plaintiff Personalized Media Communications, LLC,
`
`(“PMC”) hereby provides its Disclosure of Asserted Claims and Preliminary Infringement
`
`Contentions Concerning Defendant Apple, Inc. (“Apple”). PMC reserves the right to further
`
`supplement or alter its responses herein—including to supplement its infringement contentions
`
`pursuant to P.R. 3-6—based on additional information obtained through discovery or other
`
`means concerning Apple products or services.
`
`I.
`
`PMC’s P.R. 3-1(a) Disclosures
`
`Subject to ongoing discovery and investigation, PMC hereby contends that Apple directly
`
`and/or indirectly infringes the following claims under one or more of 35 U.S.C. § 271(a)-(c), (f)
`
`and (g) by making, using, selling, offering for sale, and/or importing into the United States the
`
`Accused Instrumentalities set forth in Part II below. PMC reserves the right to supplement its
`
`position as to infringement following further discovery.
`
`U.S. Patent No.
`
`Infringed Claims
`
`8,191,091
`
`8,559,635
`
`7,752,649
`
`8,752,088
`
`13, 14, 15, 16, 18, 20, 21, 23, 24, 26, 27, 30
`
`1, 2, 3, 4, 7, 13, 18, 20, 21, 28, 29, 30, 32, 33
`
`39, 54, 62, 67
`
`14
`
`
`II.
`
`PMC’s P.R. 3-1(b) Disclosures
`
`Subject to ongoing discovery and investigation, PMC hereby contends that the asserted
`
`patent claims are infringed by make, use, sale, offer for sale, and/or importation of the Accused
`
`Instrumentalities as identified for each claim in the chart below:
`
`
`
`
`
`- 2 -
`
`APPLE EX. 1019
`Page 2
`
`

`
`Patent
`
`Claims
`
`Accused Instrumentality of Apple
`
`8,191,091 13, 14, 15, 16,
`18, 20, 21, 23,
`24
`
`8,191,091 26, 27, 30
`
`8,559,635 1, 2, 4, 7, 18,
`20, 21, 28, 29,
`30, 32, 33
`
`8,559,635 3
`
`iTunes and/or QuickTime software
`application (installed on end users’ MacOS or
`non-Apple computers), Apple’s iOS products
`(including at least iPhone, iPod, iPad, and
`Apple TV), and MacOS products (including at
`least MacBook and iMac) which are
`compatible with Apple’s FairPlay DRM
`scheme; Apple computer server(s) which
`implement Apple’s FairPlay DRM scheme
`
`iTunes and/or QuickTime software
`application (installed on end users’ MacOS or
`non-Apple computers), Apple’s iOS products
`(including at least iPhone, iPod, iPad, and
`Apple TV), and MacOS products (including at
`least MacBook and iMac) which are
`compatible with Apple’s FairPlay DRM
`scheme and/or FairPlay Streaming (FPS) or
`HTTP Live Streaming (HLS) protocols;
`Apple computer server(s) which implement
`Apple’s FairPlay DRM scheme and/or FPS or
`HLS protocols
`
`iTunes and/or QuickTime software
`application (installed on end users’ MacOS or
`non-Apple computers), Apple’s iOS products
`(including at least iPhone, iPod, iPad, and
`Apple TV), and MacOS products (including at
`least MacBook and iMac) which are
`compatible with Apple’s FairPlay DRM
`scheme; Apple computer server(s) which
`implement Apple’s FairPlay DRM scheme
`
`Apple computer server(s) such as iTunes
`Store or App Store servers which implement
`Apple’s FairPlay DRM scheme
`
`
`
`- 3 -
`
`APPLE EX. 1019
`Page 3
`
`

`
`Patent
`
`Claims
`
`Accused Instrumentality of Apple
`
`8,559,635 13
`
`7,752,649 39, 62, 67
`
`7,752,649 54
`
`8,752,088 14
`
`Apple’s iOS products (including at least
`iPhone, iPod, iPad, and Apple TV) and
`MacOS products (including at least MacBook
`and iMac) which are capable of downloading
`and decrypting apps in accordance with
`Apple’s FairPlay DRM scheme; Apple
`computer server(s) which implement Apple’s
`FairPlay DRM scheme
`
`Apple’s QuickTime and Safari software
`applications (installed on end users’ MacOS
`or Windows computers), Apple’s iOS
`products (including at least iPhone, iPod,
`iPad, and Apple TV), and MacOS products
`(including at least MacBook and iMac) which
`are compatible with Apple’s HTTP Live
`Streaming (HLS) protocol; Apple computer
`server(s) which implement Apple’s HLS
`protocol
`
`Apple computer server(s) such as iTunes
`Store, Apple Music, or other content servers
`which implement HTTP Live Streaming
`(HLS) protocol
`
`Apple’s QuickTime and Safari software
`applications (installed on end users’ MacOS
`or Windows computers), Apple’s iOS
`products (including at least iPhone, iPod,
`iPad, and Apple TV), and MacOS products
`(including at least MacBook and iMac) which
`are compatible with Apple’s HTTP Live
`Streaming (HLS) protocol or the MPEG-2
`standard in general; Apple computer server(s)
`which implement Apple’s HLS protocol
`and/or or the MPEG-2 standard
`
`
`
`III.
`
`PMC’s P.R. 3-1(c) Disclosures
`
`Subject to ongoing discovery and investigation, PMC hereby contends that each element
`
`of each infringed claim is found within each Apple Accused Instrumentality as shown in
`
`
`
`- 4 -
`
`APPLE EX. 1019
`Page 4
`
`

`
`preliminary infringement claim charts attached hereto as Exhibits A, B, C, & D. PMC has
`
`tentatively identified the claim terms that may require claim construction, by underlining and
`
`bolding those claim terms in the “Asserted Claims” column of the infringement claim charts.
`
`These identifications are based on information currently available to PMC. PMC reserves the
`
`right to amend its asserted claims and infringement contentions pursuant to P.R. 3-6 as
`
`discovery progresses and additional information is gathered.
`
`IV.
`
`PMC’s P.R. 3-1(d) Disclosures
`
`Subject to ongoing discovery and investigation, PMC hereby contends that, except where
`
`it is indicated otherwise, each element of each asserted claim is literally present in each of the
`
`Accused Instrumentalities as specifically shown in Exhibits A, B, C, & D.
`
`At this time, PMC believes that the following elements of the asserted claims where
`
`infringement may depend on equivalents:
`
` Claim 2 of the ’635 Patent: “first decryptor” or “second decryptor”
`
` Claim 21 of the ’635 Patent: “first processor control” or “second processor control”
`
` Claims 39 and 67 of the ’649 Patent: “television receiver” [only if the preamble is
`
`found to be limiting]
`
`However, as indicated above, more discovery is required for PMC’s literal infringement
`
`position, and the Court have yet to issue any claim construction order. Pursuant to P.R. 3-6,
`
`PMC expressly reserves the right to augment and supplement its position on whether there is
`
`infringement under the doctrine of equivalents of any other elements of any asserted claims after
`
`further discovery from Apple and/or depending on this Court’s decision on all the claim
`
`construction issues.
`
`
`
`- 5 -
`
`APPLE EX. 1019
`Page 5
`
`

`
`V.
`
`PMC’s P.R. 3-1(e) Disclosures
`
`Pursuant to P.R. 3-1(e), PMC presently contends that the asserted claims of U.S. Patent
`
`Nos. 8,559,635 and 8,752,088 are entitled to the priority date of U.S. Patent Application No.
`
`06/317,510, filed November 3, 1981, which issued as U.S. Patent No. 4,694,490.
`
`PMC further contends that the asserted claims of U.S. Patent Nos. 7,752,649 and
`
`8,191,091 are at least entitled to the priority date of United States Patent Application Serial No.
`
`07/096,096, filed September 11, 1987, now U.S. Pat. No. 4,965,825, which was a continuation-
`
`in-part of U.S. Patent Application No. 06/829,531, filed February 14, 1986, now U.S. Patent No.
`
`4,704,725, which was a continuation of U.S. Patent Application No. 06/317,510, filed November
`
`3, 1981, now U.S. Pat. No. 4,694,490.
`
`VI.
`
`PMC’S P.R. 3-1(f) Disclosures
`
`PMC does not rely upon the assertion that its own instrumentalities practice the claimed
`
`
`
`
`
`Respectfully Submitted,
`
`invention.
`
`Dated: November 24, 2015
`
`
`
`By:
`
`_/s/ Stephen T. Schreiner_______________
`Stephen T. Schreiner (Admitted pro hac vice)
`Jennifer A. Albert (Admitted pro hac vice)
`Ce (Charles) Li (Admitted pro hac vice)
`GOODWIN PROCTER LLP
`901 New York Ave., N.W.
`Washington, DC 20001
`Tel.: (202) 346-4000
`Fax: (202) 346-4444
`Email: SSchreiner@goodwinprocter.com
`Email: JAlbert@goodwinprocter.com
`Email: CLi@goodwinprocter.com
`
`
`
`
`
`
`S.Calvin Capshaw, III
`State Bar No. 03788390
`Elizabeth L. DeRieux
`State Bar No. 05770585
`
`- 6 -
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`APPLE EX. 1019
`Page 6
`
`

`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
` Capshaw Derieux, LLP
` 1127 Judson Road, Suite 220
`
`Longview TX 75601-5157
`
`Tel.: (903) 233-4826
`
`Fax: (903) 236-8787
`
`E-mail: ccapshaw@capshawlaw.com
`
`E-mail: ederieux@capshawlaw.com
`
` Attorneys for Plaintiff
`
`Personalized Media Communications, L.L.C.
`
`
`- 7 -
`
`
`
`
`
`
`
`
`
`
`
`
`
`APPLE EX. 1019
`Page 7
`
`

`
`CERTIFICATE OF SERVICE
`
`The undersigned certifies that the foregoing disclosure and all supporting documents
`
`were served electronically on all counsel who have consented to electronic service pursuant to
`
`Local Rules on November 24, 2015.
`
`
`
`
`
`/s/ Ce Li
`
`
`
`
`
`
`
`
`
`APPLE EX. 1019
`Page 8
`
`

`
`EXHIBIT A
`
`Preliminary Infringement Claim Chart Concerning U.S. Pat. No. 8,191,091
`
`
`
`
`
`
`
`
`
`
`APPLE EX. 1019
`Page 9
`
`

`
`
`Exhibit A – Preliminary Infringement Claim Chart Concerning U.S. Pat. No. 8,191,091
`
`ASSERTED CLAIMS
`
`INFRINGEMENT
`
`13. A method of decrypting programming
`at a receiver station, said method
`comprising the steps of:
`
`Apple’s iTunes and/or QuickTime software application (installed on end users’ MacOS
`or Windows computers), Apple’s iOS products (including iPhone, iPod, iPad, and
`Apple TV), and MacOS products (including at least MacBook and iMac) implement
`the claimed method to decrypt digital content on end users’ computing or
`entertainment devices. The digital content may include movies, TV shows, e-books,
`music, and apps. Each user device is a “receiver station” as claimed.
`
`Users who use the Accused Instrumentality supplied by Apple to practice the
`claimed method directly infringe this claim, such users including Apple’s
`customers (e.g., consumers) and Apple itself. Apple directly infringes this claim
`by using its iTunes and/or QuickTime software application, MacOS and/or iOS
`products to perform each of the recited steps, for example, during product testing
`and demonstration or for other business purpose(s). By supplying the MacOS or
`iOS devices and/or iTunes/QuickTime software, as well as related technical
`support and/or maintenance services, which are used to practice the claimed
`method or by providing instructions (e.g., user manuals for the infringing
`hardware or software) on the infringing uses, Apple also induces and contributes
`to the direct infringement by its customers. Apple further induces and
`contributes to direct infringement by operating one or more servers to facilitate
`the claimed method of receiving and decrypting programming.
`
`Apple implements a digital rights management (DRM) technology, known as
`“FairPlay,” for decryption of protected content by user devices—
`“FairPlay is a digital rights management (DRM) technology created by Apple
`Inc., based on technology created by the company Veridisc. FairPlay is built into the
`QuickTime multimedia software and used by the iPhone, iPod, iPad, Apple TV,
`iTunes, iTunes Store and the App Store. Formerly, all songs in the iTunes Store were
`encoded with FairPlay . . . Apple no longer sells individual songs or albums with
`FairPlay encryption from the iTunes store. However, apps downloaded from the
`iTunes store and Apple Music subscription songs saved for offline listening are still
`
`A–2
`
`APPLE EX. 1019
`Page 10
`
`

`
`
`Exhibit A – Preliminary Infringement Claim Chart Concerning U.S. Pat. No. 8,191,091
`
`ASSERTED CLAIMS
`
`INFRINGEMENT
`
`encrypted with FairPlay.”
`(https://en.wikipedia.org/wiki/FairPlay) [PMCAPL00050135]
`
`The FairPlay DRM technology involves a decryption key management/distribution
`scheme for decryption of digital information—
`“FairPlay-protected files are regular MP4 container files with an encrypted AAC
`audio stream. The audio stream is encrypted using the AES algorithm in combination
`with MD5 hashes. The master key required to decrypt the encrypted audio stream is
`also stored in encrypted form in the MP4 container file. The key required to decrypt
`the master key is called the "user key".
`Each time a new customer uses iTunes to buy a track, a new random user key is
`generated and used to encrypt the master key. The random user key is stored, together
`with the account information, on Apple’s servers, and also sent to iTunes. iTunes
`stores these keys in its own encrypted key repository. Using this key repository, iTunes
`is able to retrieve the user key required to decrypt the master key. Using the master
`key, iTunes is able to decrypt the AAC audio stream and play it.
`When a user authorizes a new computer, iTunes sends a unique machine
`identifier to Apple’s servers. In return, it receives all the user keys that are stored with
`the account information. This ensures that Apple is able to limit the number of
`computers that are authorized and makes sure that each authorized computer has all the
`user keys that are needed to play the tracks they bought.
`When a user deauthorizes a computer, iTunes will instruct Apple’s servers to
`remove the unique machine identifier from their database, and at the same time it will
`remove all the user keys from the deauthorized computer's encrypted key repository.
`The iPod also has its own encrypted key repository. Every time a FairPlay-
`protected track is copied onto the iPod, iTunes will copy the user key from its own key
`repository to the key repository on the iPod. This makes sure that the iPod has
`everything it needs to play the encrypted AAC audio stream.
`FairPlay does not affect the ability of the file itself to be copied. It only manages
`the decryption of the audio content.”
`
`A–3
`
`APPLE EX. 1019
`Page 11
`
`

`
`
`Exhibit A – Preliminary Infringement Claim Chart Concerning U.S. Pat. No. 8,191,091
`
`ASSERTED CLAIMS
`
`INFRINGEMENT
`
`(https://en.wikipedia.org/wiki/FairPlay) [PMCAPL00050135]
`
`
`
`(R. Venkataramu, M. Stamp, P2PTunes: A Peer-to-Peer Digital Rights Management
`
`A–4
`
`APPLE EX. 1019
`Page 12
`
`

`
`
`Exhibit A – Preliminary Infringement Claim Chart Concerning U.S. Pat. No. 8,191,091
`
`ASSERTED CLAIMS
`
`INFRINGEMENT
`
`System, Handbook of Research on Secure Multimedia Distribution, IGI Global (March
`2009) [PMCAPL00049888 - PMCAPL00049912] at p. 8)
`
`While the hardware and software components of the Accused Instrumentality are
`designed by, and under control of, Apple, Apple uses third-party manufacturers or
`suppliers at least to make and assemble its iOS and MacOS products. At least some of
`those third parties are listed in Apple’s Supplier List 2015
`(https://www.apple.com/supplier-responsibility/pdf/Apple_Supplier_List_2015.pdf)
`It is believed that those third parties are in possession of discoverable information
`relevant to the proof of infringement.
`
`See also Apple Featured Manuals webpage (https://support.apple.com/manuals/);
`iPhone Manuals webpage (https://support.apple.com/manuals/iphone); iPad Manuals
`webpage (https://support.apple.com/manuals/ipad); iPod Manuals webpage
`(https://support.apple.com/manuals/ipod); Apple TV Manuals webpage
`(https://support.apple.com/manuals/appletv); iPhone User Guide [for iOS 8.4
`Software]
`(https://manuals.info.apple.com/MANUALS/1000/MA1565/en_US/iphone_user_guide
`.pdf); iPhone User Guide [for iOS 4.2 and 4.3 Software]
`(https://manuals.info.apple.com/MANUALS/1000/MA1539/en_US/iPhone_iOS4_Use
`r_Guide.pdf).
`
`A user device can receive content directly from Apple’s iTunes Store, App Store,
`Apple Music, or other Apple server(s). Alternatively, the user device, such as an iPod
`device, could receive encrypted content from another device, such as a computer with
`iTunes application, along with corresponding user keys.
`
`Under Apple’s FairPlay DRM scheme, such content itself is encrypted with a “master
`key” and the master key is encrypted with a random “user key” associated with the
`user’s Apple ID account and authorized device identifier (or unique machine ID).
`
`A–5
`
`receiving an encrypted digital
`information transmission including
`encrypted information;
`
`APPLE EX. 1019
`Page 13
`
`

`
`
`Exhibit A – Preliminary Infringement Claim Chart Concerning U.S. Pat. No. 8,191,091
`
`ASSERTED CLAIMS
`
`INFRINGEMENT
`
`Both the master key and user key are believed to be 12 bytes in length. Both the
`encrypted master key and the encrypted content (“encrypted information”) are
`packaged in an MP4 container file (or media file). The data transmission (either from
`Apple server(s) or from another device) that carries the container file is “an encrypted
`digital information transmission.”
`
`U.S. Patent No. 7,895,661 (“the ’661 Patent”) to Apple [PMCAPL00048873 -
`PMCAPL00048892] is believed to disclose the FairPlay DRM scheme in the
`embodiment illustrated in FIGs. 6A-6B and 7. FIGs. 6A-6B shows the procedure of a
`media file being prepared, with the encrypted media content portion, an encrypted
`“random content key,” and a user key reference, before the media file is downloaded to
`the user:
`
`A–6
`
`APPLE EX. 1019
`Page 14
`
`

`
`
`Exhibit A – Preliminary Infringement Claim Chart Concerning U.S. Pat. No. 8,191,091
`
`ASSERTED CLAIMS
`
`INFRINGEMENT
`
`detecting in said encrypted digital
`information transmission the presence of
`an instruct-to-enable signal;
`
`
`
`The user device, which is compatible with the FairPlay DRM technology, can
`recognize a DRM-protected MP4 container file.
`
`Case 1: The MP4 container file carrying the DRM-protected content includes key
`reference information (“an instruct-to-enable signal”) which enables the user device to
`identify the matching user key needed to decrypt the master key. The FairPlay-
`compatible user device can detect the presence of the key reference information.
`
`A–7
`
`APPLE EX. 1019
`Page 15
`
`

`
`
`Exhibit A – Preliminary Infringement Claim Chart Concerning U.S. Pat. No. 8,191,091
`
`ASSERTED CLAIMS
`
`INFRINGEMENT
`
`
`Case 2: The FairPlay-compatible user device can also detect the encrypted master key
`portion of the MP4 container file (another example of “an instruct-to-enable signal”)
`which, when decrypted, enables the decryption of the encrypted content.
`
`Case 3: When encrypted media content is downloaded to an iPod device, the
`corresponding user keys (yet another example of “an instruct-to-enable signal”) are
`also downloaded at the same time so that they could be stored in an encrypted key
`repository on the iPod.
`
`Case 4: Still another example of “an instruct-to-enable signal” (or a part thereof) is an
`AES Initialization Vector (IV) included in “iviv” field of the MP4 container file which
`is detected by the user device and subsequently used to obtain an initialization value
`necessary for the decryption of the master key. Thus, the AES Initialization Vector,
`either by itself or together with some or all of the exemplary instruct-to-enable signals
`in Cases 1-3, can be the “instruct-to-enable signal.”
`
`“2.2.2 Playing a Purchased Song
`The following steps occur when an iTunes client plays a purchased song [2].
`1. The user ID and the user key index are extracted from the protected m4p file on the
`client, and this information is sent to the iTunes server along with the system
`information.
`2. The iTunes server uses the user ID and the user key index to retrieve the user key
`from its key database. The server encrypts the user key using a system key generated
`from the system information and sends this encrypted key to the client.
`3. Upon receiving the encrypted user key, the client decrypts it using the system key.
`4. The client hashes the name and iviv atoms of the specific m4p file to obtain an
`initialization value.
`5. The key from step 3 and the initialization value from step 4 are used to decrypt the
`priv atom which yields the AES key—which is the key that was used to encrypt the
`
`A–8
`
`APPLE EX. 1019
`Page 16
`
`

`
`
`Exhibit A – Preliminary Infringement Claim Chart Concerning U.S. Pat. No. 8,191,091
`
`ASSERTED CLAIMS
`
`INFRINGEMENT
`
`content.
`6. The key from step 5 and the initialization value are used to decrypt the mdat atom,
`which yields the audio stream that can then be played.”
`(R. Venkataramu, M. Stamp, P2PTunes: A Peer-to-Peer Digital Rights Management
`System, Handbook of Research on Secure Multimedia Distribution, IGI Global (March
`2009) [PMCAPL00049888 - PMCAPL00049912] at p. 7)
`
`A–9
`
`APPLE EX. 1019
`Page 17
`
`

`
`
`Exhibit A – Preliminary Infringement Claim Chart Concerning U.S. Pat. No. 8,191,091
`
`ASSERTED CLAIMS
`
`INFRINGEMENT
`
`
`(R. Venkataramu, M. Stamp, P2PTunes: A Peer-to-Peer Digital Rights Management
`System, Handbook of Research on Secure Multimedia Distribution, IGI Global (March
`2009) [PMCAPL00049888 - PMCAPL00049912] at p. 4)
`
`A–10
`
`APPLE EX. 1019
`Page 18
`
`

`
`
`Exhibit A – Preliminary Infringement Claim Chart Concerning U.S. Pat. No. 8,191,091
`
`ASSERTED CLAIMS
`
`INFRINGEMENT
`
`passing said instruct-to-enable signal to a
`processor;
`
`
`(R. Venkataramu, M. Stamp, P2PTunes: A Peer-to-Peer Digital Rights Management
`System, Handbook of Research on Secure Multimedia Distribution, IGI Global (March
`2009) [PMCAPL00049888 - PMCAPL00049912] at p. 5)
`
`Case 1: The key reference information (“said instruct-to-enable signal”) from the MP4
`container file is passed to a processor in the user device which executes the iTunes
`and/or QuickTime applications (or iOS/MacOS software) in order to locate the
`matching user key.
`
`Case 2 / Case 4: To decrypt the master key using the matching user key, the user
`device has to pass the encrypted master key portion (“said instruct-to-enable signal”)
`of the container file, along with the AES Initialization Vector (or an initialization value
`derived therefrom), to a processor (or a decryptor which is a special-purpose
`processor).
`
`A–11
`
`APPLE EX. 1019
`Page 19
`
`

`
`
`Exhibit A – Preliminary Infringement Claim Chart Concerning U.S. Pat. No. 8,191,091
`
`ASSERTED CLAIMS
`
`INFRINGEMENT
`
`
`Case 3: When the iPod device attempts to playback an encrypted media file, it has to
`pass the matching user key (“said instruct-to-enable signal”) to a processor (or a
`decryptor which is a special-purpose processor) so that the encrypted master key
`portion of the MP4 container file can be decrypted with the user key.
`
`The Apple ’661 Patent [PMCAPL00048873 - PMCAPL00048892] confirms this media
`file playback procedure in FIG. 7 (“OBTAIN A USER KEY REFERENCE FROM
`THE SELECTED MEDIA FILE” 706 – Case 1; “OBTAIN AN ENCRYPTED
`RANDOM CONTENT KEY FROM THE SELECTED MEDIA FILE” 714 – Case 2;
`“LOCATE USER KEY IN LOCAL DATA STORAGE BASED ON THE USER KEY
`REFERENCE” 708 – Case 3):
`
`A–12
`
`APPLE EX. 1019
`Page 20
`
`

`
`
`Exhibit A – Preliminary Infringement Claim Chart Concerning U.S. Pat. No. 8,191,091
`
`ASSERTED CLAIMS
`
`INFRINGEMENT
`
`
`See also citations for the step of “detecting” above.
`
`
`
`determining a fashion in which said
`receiver station locates a first
`decryption key by processing said
`instruct-to-enable signal;
`
`Case 1: With the key reference information (“said instruct-to-enable signal”), the user
`device then determines what user key is required and how and where to locate the
`matching user key (“a first decryption key”) in a secure key storage location accessible
`by the iTunes and/or QuickTime applications (or iOS/MacOS). In some instances, the
`
`A–13
`
`APPLE EX. 1019
`Page 21
`
`

`
`
`Exhibit A – Preliminary Infringement Claim Chart Concerning U.S. Pat. No. 8,191,091
`
`ASSERTED CLAIMS
`
`INFRINGEMENT
`
`user key may not be available on the user device and has to be requested from Apple’s
`iTunes server (or key server) which maintains, for each user (i.e., Apple ID account-
`holder), a list of authorized machines, purchased content, and associated user keys.
`
`Case 2 / Case 3 / Case 4: Once the matching user key is obtained, the user device has
`to determine how to apply the user key along with the AES Initialization Vector in
`decryption of the encrypted master key portion of the MP4 container file in order to
`recover/locate a decrypted master key (an alternative example of “a first decryption
`key”).
`
`The Apple ’661 Patent [PMCAPL00048873 - PMCAPL00048892] confirms this media
`file playback procedure in FIG. 7 (“LOCATE USER KEY IN LOCAL DATA
`STORAGE BASED ON THE USER KEY REFERENCE” 708 – Case 1; “DECRYPT
`THE ENCRYPTED RANDOM CONTENT KEY WITH THE USER KEY” – Case 2 /
`Case 3):
`
`A–14
`
`APPLE EX. 1019
`Page 22
`
`

`
`
`Exhibit A – Preliminary Infringement Claim Chart Concerning U.S. Pat. No. 8,191,091
`
`ASSERTED CLAIMS
`
`INFRINGEMENT
`
`locating said first decryption key based on
`said step of determining;
`
`Case 1: Using the key reference information, the user device locates the matching user
`key (“said first decryption key”) and retrieves it from the secure key storage location in
`the device or from the user keys downloaded to an iPod device. Alternatively, the user
`key may be located on and retrieved from Apple’s iTunes server (or key server), for
`example, when the particular user device is being used for the first time on protected
`content associated with the user’s Apple ID account. In either scenario, the located
`
`A–15
`
`APPLE EX. 1019
`Page 23
`
`

`
`
`Exhibit A – Preliminary Infringement Claim Chart Concerning U.S. Pat. No. 8,191,091
`
`ASSERTED CLAIMS
`
`INFRINGEMENT
`
`user key may be in an encrypted form and therefore require decryption.
`
`Case 2 / Case 3 / Case 4: Once the corresponding user key has been identified, the
`encrypted master key portion of the MP4 container file can be decrypted and the
`master key (“said first decryption key”) is located in and obtained from the MP4
`container file. The encrypted master key is carried in the “priv” field (or atom) of the
`MP4 container file. Based on the container file format or structure, the user device has
`to detect the “priv” field first to obtain the encrypted master key portion and then
`attempt to decrypt it based on the user key and AES Initialization Vector.
`
`The Apple ’661 Patent [PMCAPL00048873 - PMCAPL00048892] confirms this media
`file playback procedure in FIG. 7 (“LOCATE USER KEY IN LOCAL DATA
`STORAGE BASED ON THE USER KEY REFERENCE” 708 or “SETUP USER
`ACCOUNT WITH MEDIA CENTER” 712 – Case 1; “DECRYPT THE
`ENCRYPTED RANDOM CONTENT KEY WITH THE USER KEY” 716 – Case 2 /
`Case 3)
`
`“2.2.2 Playing a Purchased Song
`The following steps occur when an iTunes client plays a purchased song [2].
`1. The user ID and the user key index are extracted from the protected m4p file on the
`client, and this information is sent to the iTunes server along with the system
`information.
`2. The iTunes server uses the user ID and the user key index to retrieve the user key
`from its key database. The server encrypts the user key using a system key generated
`from the system information and sends this encrypted key to the client.
`3. Upon receiving the encrypted user key, the client decrypts it using the system key.
`4. The client hashes the name and iviv atoms of the specific m4p file to obtain an
`initialization value.
`5. The key from step 3 and the initialization value from step 4 are used to decrypt
`the priv atom which yields the AES key—which is the key that was used to
`
`A–16
`
`APPLE EX. 1019
`Page 24
`
`

`
`
`Exhibit A – Preliminary Infringement Claim Chart Concerning U.S. Pat. No. 8,191,091
`
`ASSERTED CLAIMS
`
`INFRINGEMENT
`
`decrypting said encrypted information
`using said first decryption key; and
`
`encrypt the content.
`6. The key from step 5 and the initialization value are used to decrypt the mdat atom,
`which yields the audio stream that can then be played.”
`(R. Venkataramu, M. Stamp, P2PTunes: A Peer-to-Peer Digital Rights Management
`System, Handbook of Research on Secure Multimedia Distribution, IGI Global (March
`2009) [PMCAPL00049888 - PMCAPL00049912] at p. 7)
`
`See also citations for the step of “determining” above.
`
`Case 1: The encrypted content (“said encrypted information”) is decrypted based
`indirectly on the matching user key (“said first decryption key”) located in the
`preceding step. Also, the encrypted master key (another example of “said encrypted
`information”) is decrypted based on the matching user key.
`
`Case 2 / Case 3 / Case 4: The encrypted content (“said encrypted information”) is
`decrypted based directly on the now decrypted master key (“said first decryption key”)
`located in the preceding step.
`
`The Apple ’661 Patent [PMCAPL00048873 - PMCAPL00048892] confirms this media
`file playback procedure in FIG. 7 (“DECRYPT THE ENCRYPTED MEDIA
`PORTION OF THE MEDIA FILE WITH THE RANDOM CONTENT KEY” 718).
`
`“2.2.2 Playing a Purchased Song
`The following steps occur when an iTunes client plays a purchased song [2].
`1. The user ID and the user key index are extracted from the protected m4p file on the
`client, and this information is sent to the iTunes server along with the system
`information.
`2. The iTunes server uses the user ID and the user key index to retrieve the user key
`from its key database. The server encrypts the user key using a system key generated
`from the system information and sends this encrypted key to the client.
`
`A–17
`
`APPLE EX. 1019
`Page 25
`
`

`
`
`Exhibit A – Preliminary Infringement Claim Chart Concerning U.S. Pat. No. 8,191,091
`
`ASSERTED CLAIMS
`
`INFRINGEMENT
`
`3. Upon receiving the encrypted user key, the client decrypts it using the system key.
`4. The client hashes the name and iviv atoms of the specific m4p file to obtain an
`initialization value.
`5. The key from step 3 and the initialization value from step 4 are used to decrypt the
`priv atom which yields the AES key—which is the key that was used to encrypt the
`content.
`6. The key from step 5 and the initialization value are used to decrypt the mdat
`atom, which yields the audio stream that can then be played.”
`(R. Venkataramu, M. Stamp, P2PTunes: A Peer-to-Peer Digital Rights Management
`System, Handbook of Research on Secure Multimedia Distribution, IGI Global (March
`2009) [PMCAPL00049888 - PMCAPL00049912] at p. 7)
`
`
`
`(Rajaram Pejaver, Digital Rights Management: A Brief Introduction (November 2010)
`(http://pejaver.com/Papers/DRM.pps) [PMCAPL00049041 - PMCAPL00049055] at p.
`9)
`
`“Every iOS device has a dedicated AES 256 crypto engine built into the DMA path
`
`A–18
`
`APPLE EX. 1019
`Page 26
`
`

`
`
`Exhibit A – Preliminary Infringement Claim Chart Concerning U.S. Pat. No. 8,191,091
`
`ASSERTED CLAIMS
`
`INFRINGEMENT
`
`between the flash storage and main system memory, making file encryption highly
`efficient.”
`(iOS Security, Apple White Paper (October 2014) [PMCAPL00050360 -
`PMCAPL00050409] at p. 9 – retrieved from
`https://www.apple.com/br/privacy/docs/iOS_Security_Guide_Oct_2014.pdf)
`
`
`(iOS Security, Apple White Paper (October 2014) [PMCAPL00050360 -
`
`A–19
`
`APPLE EX. 1019
`Page 27
`
`

`
`
`Exhibit A – Preliminary Infringement Claim Chart Concerning U.S. Pat. No. 8,191,091
`
`ASSERTED CLAIMS
`
`INFRINGEMENT
`
`outputting said programming based on
`said step of decrypting.
`
`PMCAPL00050409] at p. 4 – retrieved from
`https://www.apple.com/br/privacy/docs/iOS_Security_Guide_Oct_2014.pdf)
`
`In all cases, the decrypted content is outputted on or from the user device (e.g., a music
`clip, movie or TV show is played back, an e-book is laid out, an app is installed and its
`UI presented).
`
`The Apple ’661 Patent [PMCAPL00048873 - PMCAPL00048892] confirms this media
`file playback procedure in FIG. 7 (“PLAY THE MEDIA PORTION OF THE MEDIA
`FILE AT THE CLIENT MACHINE” 720).
`
`See “Apple Presentation on A8, A8X and M8 Processors, iPhone 6, and iPad Air 2”
`[PMCAPL00050303 - PMCAPL00050339] at p. 17 (outputs to touch screen display,
`headphones, and speakers):
`
`A–20
`
`APPLE EX. 1019
`Page 28
`
`

`
`
`Exhibit A – Preliminary Infringemen

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket