`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`UNITED STATES PATENT AND TRADEMARK
`
`OFFICE BEFORE THE PATENT TRIAL AND
`
`APPEAL BOARD
`
`APPLE INC.
`Petitioner
`
`v.
`
`PERSONALIZED MEDIA COMMUNICATIONS, LLC
`Patent Owner
`
`Case No.: IPR2016-01520
`Patent No.: 8,559,635
`
`PATENT OWNER’S REPLY IN SUPPORT OF MOTION TO AMEND
`
`
`
`
`
`
`
`
`
`
`
`
`
`Table of Contents
`
`Page
`
`I. SUBSTITUTE CLAIMS ARE PATENTABLE UNDER 35 USC §101 ............ 1
`
`II. SUBSTITUTE CLAIMS ARE PATENTABLE UNDER 35 USC §112 ............ 2
`
`III. SUBSTITUTE CLAIMS ARE PATENTABLE UNDER 35 USC §§102-103 ... 9
`
`IV. SUBSTITUTE CLAIMS ARE PATENTABLE UNDER PRIOR ART ........... 12
`
`
`
`
`
`
`
`
`
`
`
`I.
`
`SUBSTITUTE CLAIMS ARE PATENTABLE UNDER 35 USC §101
`
`Petitioner directs its §101 arguments to U.S. Patent 7,801,304 (“’304”), not at
`
`issue here. Contrary to Petitioner’s assertions, the Substitute Claims are not
`
`“strikingly similar” to claim 1 of the ’304 patent, and may be distinguished by at
`
`least the following concrete features. Claims 41-45, 47 and 48 all require the
`
`concrete step of choosing from amongst a plurality of cipher algorithms
`
`preprogrammed at a subscriber station. Claim 41 includes at least a “first instruct
`
`signal,” at least a “second instruct signal,” and “a code or datum,” all of which must
`
`be received by the “remote transmitter station.” Claim 44 requires receipt and use
`
`of “executable instructions” and “unique digital data.” Claim 45 requires storing
`
`“subscriber specific digital data” at the “receiver station” to customize output
`
`information, decrypting a portion having a “first decrypted portion” and a “second
`
`decrypted portion,” and the “second decrypted portion” having “unique digital data”
`
`that is “communicated to a remote site.” Claims 46 and 47 require storage of a
`
`“computer file with a file extension,” which contains “unique digital data specific to
`
`a subscriber” resulting from subscriber input that is stored prior to receipt of a
`
`digital information transmission that instructs usage of the stored data. Claim 46
`
`also requires “presenting a shopping list customized dependent on [the] computer
`
`file.” Claim 47 also requires “outputting computer information” that is “customized
`
`dependent on [the] computer file.” Claim 48 requires storing “subscriber specific
`
`
`
`1
`
`
`
`
`
`digital data” and customizing “a shopping list” dependent on the storing. These
`
`claim limitations require the concrete steps of at least storing subscriber specific
`
`data, choosing an algorithm to decrypt received information, and customizing and
`
`outputting the decrypted information based on that stored data.
`
`Claims 42 and 43 depend from claim 2 and therefore require at least a “first
`
`decryptor” and a “second decryptor,” while the ’304 patent claims only a single
`
`decryptor. These claims also include the concrete step of “passing said encrypted
`
`digital information portion of said programming and the decrypted control signal
`
`portion to a second decryptor at said subscriber station,” which results in the
`
`concrete benefit of making it more difficult to hack a system. (Ex. 2213 at ¶¶ 161-
`
`62; Contingent Motion to Amend (“CMTA”) at 5.)
`
`Moreover, the method claims in the Substitute Claims were not conventional.
`
`While the use of decryptors may have been conventional, at least the passing of
`
`signals, the number of decryptors, and the personalized outputs were not
`
`conventional.
`
`Contrary to Apple’s assertions, PMC did not suggest in its CMTA that Judge
`
`Payne’s decision is controlling on the Board. However, Judge Payne’s decision,
`
`made based on the same legal standard as is appropriate in this proceeding, is highly
`
`persuasive authority and should be carefully considered by the Board.
`
`II.
`
`SUBSTITUTE CLAIMS ARE PATENTABLE UNDER 35 USC §112
`
`
`
`2
`
`
`
`
`
`In its CMTA, PMC relies on a single embodiment—the embodiment in
`
`Example #7—to support each original claim and its proposed amendment. It is the
`
`specification itself that points to disclosures of other Examples such as Example #4
`
`to fill in gaps in Example #7. (Ex. 2208 at 291:3-4 in original.) It is also the
`
`specification itself that points to disclosures of other Examples, such as Example
`
`#7, in the Exotic Meals illustration. (Id. at 478:1-4.) Further, the Exotic Meals
`
`illustration (id. at Fig. 7F) uses decryptor 224, and Example #7 uses decryptor 224
`
`(id. at Fig. 4), making Example #7 the obvious choice to fill in the gaps in the
`
`Exotic Meals illustration.
`
`Apple’s written description arguments are mostly directed to limitations
`
`found in the original claims; written description of these claim limitations is not at
`
`issue in this proceeding. (35 USC § 311(b) “A petitioner in an inter partes review
`
`may request to cancel as unpatentable 1 or more claims of a patent only on a ground
`
`that could be raised under section 102 or 103 …”). Respironics, cited by Petitioner,
`
`does not instruct otherwise. Respironics requires that the additional claim
`
`limitations are supported when in combination with the original limitations; it does
`
`not require a Patent Owner to show support for the original limitation. Regardless,
`
`for completion, PMC here replies to all of Apple’s written description arguments.
`
`Apple argues Claim 41 requires “receiving a control signal at a first location”
`
`and “communicating from the first location.” (Petitioner’s Opposition to CMTA
`
`
`
`3
`
`
`
`
`
`(“Opp.”) at 8-9.) Apple has mis-quoted the claim, which does not require “a first
`
`location” for both receiving and communicating. Even worse, the claim requires
`
`“communicating …to said remote transmitter station” (the remote transmitter
`
`station is the ITS), and not “from” any recited location. The specification supports
`
`the claim as written. (See Ex. 2223 at 33, explaining that the ’413 Application
`
`discloses an originating studio transmits a control signal to an ITS with the claimed
`
`function.)
`
`Apple’s expert argues the “second instruct signal” is not both received and
`
`transmitted by the ITS. (Opp. at 9.) Apple asserts that a signal is received and a
`
`message is transmitted by the ITS. PMC agrees. However, the transmitted message
`
`includes a signal, specifically the “enable-WSW instructions,” that was received by
`
`the ITS. The message incorporates that signal with other information and then
`
`transmits it. (Ex. 2223 at 39.) Therefore, the ITS both receives and transmits a
`
`signal. The “incorporate” instructions use station-specific data to transform the
`
`generic “enable-WSW instructions” into specific instructions. For example, a
`
`specific key (e.g., key Ca or Ta) is incorporated into the “enable-WSW
`
`instructions.” (Id. at 40.) While a new “message” may be created, the signal is
`
`received, then incorporated with specific information into the instructions, resulting
`
`in the transmission of “local-cable-enabling-message (#7).” (Id. at 43.)
`
`For Claims 42-43, Apple argues “local-cable-enabling-message (#7)” is
`
`
`
`4
`
`
`
`
`
`completely absent any encrypted portion. Apple has taken Dr. Dorney’s statement
`
`made regarding a different patent with different claims (Ex. 1059 at 12, 23, 34,
`
`regarding IPR2017-00755) out of context. According to Apple, Dr. Dorney stated
`
`that the “local-cable-enabling-message” is entirely not encrypted. Dr. Dorney’s
`
`statement, properly understood in context, was that the “local-cable-enabling-
`
`message” included an unencrypted portion. He did not say that the entire message
`
`is not encrypted. In any event, that statement is irrelevant to the claim term at issue
`
`here. Regarding the disclosure for the correct claims, Dr. Dorney stated in his
`
`declaration in IPR2016-00754 on the patent at issue in this case that “As shown
`
`above, local-cable-enabling- message (#7), processed according to ‘the fashion in
`
`which information of first message of example #4’, comprises both unencrypted and
`
`encrypted digital information.” (Ex. 2224 at 14-15.)
`
`Indeed, in a passage often quoted by Apple (see, e.g., Opp. at 10-11) from
`
`within Example #7 regarding the WSW program, Harvey et al. discloses control
`
`processor 39J causes the transfer of information to controller 20 “in the fashion in
`
`which information of first message of example #4 is transferred … to decryptor,
`
`39K.” (Ex. 2208 at 291:33-292:6, emphasis added.) There would be no reason to
`
`transfer the information to a decryptor unless that information is encrypted.
`
`Further, Example #4, referenced in this section of Example #7 and also regarding
`
`the WSW program, clearly discloses both encrypted and not encrypted information:
`
`
`
`5
`
`
`
`
`
`“the first message of example #4 is only partially encrypted.” (Ex. 2208 at 198:10-
`
`26, emphasis added.)
`
`Also regarding claims 42 and 43, Apple argues “digital video” is not enabled
`
`in the ’413 Application and was nascent in 1981. Apple’s argument is inapposite to
`
`the Substitute Claims, which claim priority to 1987. As of 1987, digital video was
`
`not “nascent;” Apple’s expert Mr. Wechselberger published a document in 1983
`
`regarding the tradeoffs for cost and quality of digital video, which could not be
`
`known without working systems. (Ex. 2006 at 4 in “ENCRYPTION IMPLIES
`
`DIGITAL”.) And PMC’s expert Prof. Weaver provides multiple sources teaching
`
`“digital video” (Ex. 2023 at ¶¶166-168).
`
`For Claims 44, 45, 47, and 48, Apple argues “identifying a cipher algorithm”
`
`is not supported by the ’413 Application. Apple is not correct: the specification
`
`discloses that the “Exotic Meals of India” second message can be encrypted using
`
`“any of the methods described above.” (Ex. 2208 at 478:1-5, Fig. 7F.) Regardless
`
`of chosen encryption embodiment, Harvey et al. discloses selection of at least
`
`cipher algorithms A, B, or C, or decryptor 39K, which has its own cipher algorithm.
`
`(Ex. 2208 at 286:34-287:7, 198:10-16, 206:32-207:9; CMTA at 9-10, B-36 to 38.)
`
`To decrypt properly, the receiver station must perform “identifying a cipher
`
`algorithm” to determine how to decrypt because a plurality of cipher algorithms
`
`exist at the receiver station. Apple’s arguments regarding the decryptor 39K
`
`
`
`6
`
`
`
`
`
`algorithm do not address that, regardless of whether choosing a “key” is the same as
`
`choosing an “algorithm” (it is not),1 a choice must still be made from between
`
`algorithms A, B, C, or the decryptor 39K algorithm.
`
`In Claims 45-48, Apple argues receiving an “encrypted digital information
`
`transmission … unaccompanied by any non-digital information transmission” is
`
`unsupported. As explained in PMC’s CMTA (p. 14-15), Fig. 7C of the ’413
`
`Application discloses cable converter box 222 outputting “one digital data channel.”
`
`Fig. 7F, regarding the “Exotic Meals of India” embodiment, discloses the same
`
`converter box 222 used with All signal decoder (shown in Fig. 7C, and described
`
`with respect to Fig. 7F) and outputs to digital decryptor 224 (Fig. 7F) that decrypts
`
`the digital second message. The converter 222 output in Fig. 7F must therefore be a
`
`digital data channel. (Ex. 2223 at 83-88.)
`
`Respecting claims 44-48, Apple asserts that there is no support for the term
`
`“communicating … unique digital data to a remote site.” As explained (Ex. 2223 at
`
`
`1 The decryptor 39K algorithm, which decrypts without “altering the number of
`
`bits,” is selected by matching particular message bits to invoke “decrypt-with-[key]-
`
`at-39K-instructions” using keys such as G, J, or Z. (Ex. 2208 at 45:4-46:16, 228:1,
`
`200:34-203:35; Ex. 2223 at 72-73, 95-96.) Simply identifying a decryption key is
`
`insufficient to identify a cipher algorithm.
`
`
`
`7
`
`
`
`
`
`75-76), this term is supported by the “Exotic Meals of India” embodiment,
`
`specifically the “unit code identification information” (Ex. 2208 at 473:3-13, 471:6-
`
`13) which enables a fee to be charged (CMTA at 10) by transmission of the meter-
`
`monitor information to a billing station (Ex. 2223 at 76-78). The cited portions of
`
`the specification all discuss the transmission of information regarding billing a
`
`subscriber for his content consumption and are therefore properly considered
`
`together.
`
`In Substitute Claim 48, contrary to Apple’s argument, Example #7 discloses a
`
`headend transmitting a message to a receiver station in one of several possible
`
`formats. It is the header that informs the receiving station which format and which
`
`“selection criteria” are appropriate to understand the pieces of a given transmission.
`
`(Ex. 2223 at 197; Ex. 2208 at 291:9-292:30, 45:4-20.) Example #7 supports the
`
`claim because the inventors allow decryption using “any of the methods described
`
`above.” (Ex. 2208 at 478:1-5.)
`
`With respect to Apple’s assertion that Dr. Dorney is not an expert in the field,
`
`PMC points the Board to Dr. Dorney’s CV at Ex. 2206. Among his other
`
`credentials and experience, Dr. Dorney has a Ph.D. in Electrical and Computer
`
`Engineering from Rice University. Dr. Dorney certainly is “qualified in the
`
`pertinent art.” See Husky Injection Molding Systs. v. Plastic Engineering and
`
`Technical Svcs., Inc., IPR2016-00431, Paper 41 at 13 (P.T.A.B. Jun. 15, 2017) (“A
`
`
`
`8
`
`
`
`
`
`person need not be a person of ordinary skill in the art in order to testify as an
`
`expert under Fed. R. Evid. 702, but rather must be “qualified in the pertinent art.”)
`
`III. SUBSTITUTE CLAIMS ARE PATENTABLE UNDER 35 USC §§102-103
`
`PMC addressed the prior art in its CMTA. Although Apple points to a
`
`number of prior art references listed on the ’635 patent, the Board has narrowed the
`
`field to the best three references that Apple relied on in its petition for IPR. PMC
`
`addressed these three references, Campbell, Seth-Smith, and Chandra, in its CMTA
`
`and explained how the Substitute Claims are patentable over these references. PMC
`
`also put together its best shot argument (see CMTA at 23-24) after reviewing all the
`
`prior art and explained how the Substitute Claims are patentable over this prior art.
`
`For Substitute Claim 41, Apple argues a “PHOSITA would have known …
`
`Campbell could be used to deliver digital programming” (Opp. at 18-19), but
`
`Campbell is completely silent as to any digital video or audio. Apple’s challenge
`
`relies on an argument that just because digital video was known, a PHOSITA would
`
`have been motivated to substitute digital video for Campbell’s analog video. This is
`
`a classic case of hindsight bias. The CAFC has warned that an analysis based on
`
`expert testimony that “based on the ‘modular’ nature of the claimed components,” a
`
`PHOSITA would have known how to combine references and would have been
`
`motivated to do so is “fraught with hindsight bias.” In re ActiveVideo Networks,
`
`Inc., 694 F.3d 1312, 1327 (Fed.Cir.2012).
`
`
`
`9
`
`
`
`
`
`Apple’s hindsight continues by combining Campbell’s scrambled TV system
`
`(excluded by amended claim 41) with Pailen’s mainframe/terminal system for
`
`computer programs. Apple simply inserts Pailen’s cipher algorithm for an APEC
`
`mainframe into Campbell’s scrambled TV subscriber’s converter. (Opp. at 19-20.)
`
`A computer system is not synonymous with a TV system, and a mainframe is not
`
`synonymous with a subscriber station. Further, Pailen’s terminals 18 may be
`
`similar to a subscriber station in some ways, but switch 52 prevents them from
`
`being involved in an authorization. (Ex. 1062 at 7:33-46, Fig. 1B.)
`
`Apple asserts that Seth-Smith renders Claims 42 and 43 obvious. But, Seth-
`
`Smith teaches only scrambled analog video (Ex. 1043 Fig. 17), pay-per-listen
`
`digital audio with no video component (id. at 9:46-55), and closed captioning
`
`textual information absent any graphics (id. at 2: 53-58; NAPLPS, Ex. 2101).
`
`Apple provides only hindsight analysis to arrive at the encrypted digital video as
`
`required by the claims, contrary to Fed. Cir. precedent in ActiveVideo.
`
`Further the claims require a computer file and Seth-Smith is silent as to a
`
`computer file, and instead repeatedly stores the fixed-size packets directly into
`
`RAM 124 without a computer file system. (Ex. 1043 at 39:64-40:68, 29:11-32.)
`
`Apple also argues that “authorized tiers” are “subscriber specific data”, but tier data
`
`is at most decoder-specific and lacks information corresponding to a subscriber.
`
`Moreover, with respect to Claims 42-43, Seth-Smith does not teach two-way
`
`
`
`10
`
`
`
`
`
`communications, and instead teaches an explicitly one-way system: “no uplink
`
`facility at the user's station need be provided.” This teaches away from a two-way
`
`communication. Citations in Seth-Smith to a “telephone” indicate human-to-human
`
`transactions, and not machine-to-machine transactions. Indeed, Seth-Smith states
`
`that “the user will only need to communicate with the broadcaster sporadically”
`
`(Ex. 1043 at 9:38-40, 10:19-27, emphasis added), further dissuading any need for a
`
`complicated and costly two-way communication system. Any combination of Seth-
`
`Smith with Pailen is forbidden hindsight. See ActiveVideo.
`
`With respect to Apple’s combination of Chandra and Thomas for claims 44-
`
`48, Chandra prefers that all software media be identical (Ex. 1041 at 8:45-60) while
`
`Thomas requires individual software serial number 17. (Ex. 1064 at 5:49-54.)
`
`Further, neither reference meets the limitation requiring the “unique digital data” to
`
`be in decrypted form and then communicated to a remote site. Thomas transfers
`
`serial numbers that were never decrypted (Ex. 1064 at 5:49-54), and Chandra
`
`requires the encrypted token “must be kept physically secure” (Ex. 1041 at 5:20-23,
`
`7:22-57).
`
`With respect to Apple’s reliance on Bergland, Bergland does not teach the
`
`required receiver station with storage for “subscriber specific data” and the ability
`
`to execute instructions/code. Bergland teaches terminals that receive only “data and
`
`voice” (Ex. 1065 Fig. 3 & pg. 2.) Bergland’s terminals don’t receive instructions;
`
`
`
`11
`
`
`
`
`
`therefore, the food service program must be executed at the central (Tandem)
`
`computer and cannot be executed at the home terminal. (Ex. 1065 Fig. 2 & pg. 1.)
`
`Chandra is designed to prevent piracy while Bergland’s Prestel hardware is a closed
`
`system, hosted elsewhere, and therefore already prevents piracy. Thus Chandra and
`
`Bergland cannot be combined.
`
`Pailen teaches terminals, but they are without a plurality of cipher algorithms.
`
`Chandra teaches away from transmitting decrypted information. Thus, their
`
`combination cannot teach “a plurality of preprogrammed cipher algorithms” at the
`
`user terminals 18 (supra); and Chandra is silent as to transmission of any token
`
`information.
`
`IV. SUBSTITUTE CLAIMS ARE PATENTABLE UNDER PRIOR ART
`
`Apple offers Exs. 1021, 1026, and 1079-1081 as additional prior art without
`
`comment. These exhibits all fail to even suggest at least choosing from plural
`
`cipher algorithms at a receiver station, communication to a remote site of decrypted
`
`unique digital data, and outputting information customized by subscriber specific
`
`digital data stored at a receiver station prior in time to receiving the information.
`
`These additional prior art references are cumulative to the prior art already known
`
`to PMC.
`
`
`
`
`
`12
`
`
`
`Respectfully submitted,
`
`
`
`/ Thomas J. Scott, Jr. /
`By
`Thomas J. Scott, Jr.
`Registration No.: 27,836
`Senior Vice President & General Counsel
`
`Personalized Media
`Communications, LLC
`
`11491 Sunset Hills Road, Suite 340
`Reston, Virginia 20190
`Telephone: (281) 201-2213
`tscott@pmcip.com
`
`
`
`
`
`Dated: August 31, 2017
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`CERTIFICATE OF SERVICE
`The undersigned hereby certifies that a copy of the foregoing PATENT
`
`OWNER’S REPLY IN SUPPORT OF MOTION TO AMEND, EXHIBIT
`
`2224 and SUBSTITUTE EXHIBIT 2208 was served on August 31, 2017 to the
`
`following attorneys of record by electronic transmission:
`
`Marcus E. Sernel, Joel R. Merkin, and Eugene Goryunov
`KIRKLAND & ELLIS LLP
`300 North LaSalle Street
`Chicago, Illinois 60654
`P: (312) 862-2000; F: (312) 862-2200
`marc.sernel@kirkland.com
`joel.merkin@kirkland.com
`eugene.goryunov@kirkland.com
`Apple-PMC-PTAB@kirkland.com
`
`Gregory S. Arovas
`KIRKLAND & ELLIS LLP
`601 Lexington Avenue
`New York, New York 10022
`P: (212) 446-4800; F: (212) 446-4900
`greg.arovas@kirkland.com
`
`Date: August 31, 2017
`
`
`
`/ Thomas J. Scott, Jr. /
`Thomas J. Scott, Jr.
`
`
`
`