throbber

`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`UNITED STATES PATENT AND TRADEMARK
`
`OFFICE BEFORE THE PATENT TRIAL AND
`
`APPEAL BOARD
`
`APPLE INC.
`Petitioner
`
`v.
`
`PERSONALIZED MEDIA COMMUNICATIONS, LLC
`Patent Owner
`
`Case No.: IPR2016-01520
`Patent No.: 8,559,635
`
`PATENT OWNER’S REPLY IN SUPPORT OF MOTION TO AMEND
`
`
`
`
`
`
`
`
`
`

`

`
`
`Table of Contents
`
`Page
`
`I. SUBSTITUTE CLAIMS ARE PATENTABLE UNDER 35 USC §101 ............ 1
`
`II. SUBSTITUTE CLAIMS ARE PATENTABLE UNDER 35 USC §112 ............ 2
`
`III. SUBSTITUTE CLAIMS ARE PATENTABLE UNDER 35 USC §§102-103 ... 9
`
`IV. SUBSTITUTE CLAIMS ARE PATENTABLE UNDER PRIOR ART ........... 12
`
`
`
`
`
`
`
`

`

`
`
`I.
`
`SUBSTITUTE CLAIMS ARE PATENTABLE UNDER 35 USC §101
`
`Petitioner directs its §101 arguments to U.S. Patent 7,801,304 (“’304”), not at
`
`issue here. Contrary to Petitioner’s assertions, the Substitute Claims are not
`
`“strikingly similar” to claim 1 of the ’304 patent, and may be distinguished by at
`
`least the following concrete features. Claims 41-45, 47 and 48 all require the
`
`concrete step of choosing from amongst a plurality of cipher algorithms
`
`preprogrammed at a subscriber station. Claim 41 includes at least a “first instruct
`
`signal,” at least a “second instruct signal,” and “a code or datum,” all of which must
`
`be received by the “remote transmitter station.” Claim 44 requires receipt and use
`
`of “executable instructions” and “unique digital data.” Claim 45 requires storing
`
`“subscriber specific digital data” at the “receiver station” to customize output
`
`information, decrypting a portion having a “first decrypted portion” and a “second
`
`decrypted portion,” and the “second decrypted portion” having “unique digital data”
`
`that is “communicated to a remote site.” Claims 46 and 47 require storage of a
`
`“computer file with a file extension,” which contains “unique digital data specific to
`
`a subscriber” resulting from subscriber input that is stored prior to receipt of a
`
`digital information transmission that instructs usage of the stored data. Claim 46
`
`also requires “presenting a shopping list customized dependent on [the] computer
`
`file.” Claim 47 also requires “outputting computer information” that is “customized
`
`dependent on [the] computer file.” Claim 48 requires storing “subscriber specific
`
`
`
`1
`
`

`

`
`
`digital data” and customizing “a shopping list” dependent on the storing. These
`
`claim limitations require the concrete steps of at least storing subscriber specific
`
`data, choosing an algorithm to decrypt received information, and customizing and
`
`outputting the decrypted information based on that stored data.
`
`Claims 42 and 43 depend from claim 2 and therefore require at least a “first
`
`decryptor” and a “second decryptor,” while the ’304 patent claims only a single
`
`decryptor. These claims also include the concrete step of “passing said encrypted
`
`digital information portion of said programming and the decrypted control signal
`
`portion to a second decryptor at said subscriber station,” which results in the
`
`concrete benefit of making it more difficult to hack a system. (Ex. 2213 at ¶¶ 161-
`
`62; Contingent Motion to Amend (“CMTA”) at 5.)
`
`Moreover, the method claims in the Substitute Claims were not conventional.
`
`While the use of decryptors may have been conventional, at least the passing of
`
`signals, the number of decryptors, and the personalized outputs were not
`
`conventional.
`
`Contrary to Apple’s assertions, PMC did not suggest in its CMTA that Judge
`
`Payne’s decision is controlling on the Board. However, Judge Payne’s decision,
`
`made based on the same legal standard as is appropriate in this proceeding, is highly
`
`persuasive authority and should be carefully considered by the Board.
`
`II.
`
`SUBSTITUTE CLAIMS ARE PATENTABLE UNDER 35 USC §112
`
`
`
`2
`
`

`

`
`
`In its CMTA, PMC relies on a single embodiment—the embodiment in
`
`Example #7—to support each original claim and its proposed amendment. It is the
`
`specification itself that points to disclosures of other Examples such as Example #4
`
`to fill in gaps in Example #7. (Ex. 2208 at 291:3-4 in original.) It is also the
`
`specification itself that points to disclosures of other Examples, such as Example
`
`#7, in the Exotic Meals illustration. (Id. at 478:1-4.) Further, the Exotic Meals
`
`illustration (id. at Fig. 7F) uses decryptor 224, and Example #7 uses decryptor 224
`
`(id. at Fig. 4), making Example #7 the obvious choice to fill in the gaps in the
`
`Exotic Meals illustration.
`
`Apple’s written description arguments are mostly directed to limitations
`
`found in the original claims; written description of these claim limitations is not at
`
`issue in this proceeding. (35 USC § 311(b) “A petitioner in an inter partes review
`
`may request to cancel as unpatentable 1 or more claims of a patent only on a ground
`
`that could be raised under section 102 or 103 …”). Respironics, cited by Petitioner,
`
`does not instruct otherwise. Respironics requires that the additional claim
`
`limitations are supported when in combination with the original limitations; it does
`
`not require a Patent Owner to show support for the original limitation. Regardless,
`
`for completion, PMC here replies to all of Apple’s written description arguments.
`
`Apple argues Claim 41 requires “receiving a control signal at a first location”
`
`and “communicating from the first location.” (Petitioner’s Opposition to CMTA
`
`
`
`3
`
`

`

`
`
`(“Opp.”) at 8-9.) Apple has mis-quoted the claim, which does not require “a first
`
`location” for both receiving and communicating. Even worse, the claim requires
`
`“communicating …to said remote transmitter station” (the remote transmitter
`
`station is the ITS), and not “from” any recited location. The specification supports
`
`the claim as written. (See Ex. 2223 at 33, explaining that the ’413 Application
`
`discloses an originating studio transmits a control signal to an ITS with the claimed
`
`function.)
`
`Apple’s expert argues the “second instruct signal” is not both received and
`
`transmitted by the ITS. (Opp. at 9.) Apple asserts that a signal is received and a
`
`message is transmitted by the ITS. PMC agrees. However, the transmitted message
`
`includes a signal, specifically the “enable-WSW instructions,” that was received by
`
`the ITS. The message incorporates that signal with other information and then
`
`transmits it. (Ex. 2223 at 39.) Therefore, the ITS both receives and transmits a
`
`signal. The “incorporate” instructions use station-specific data to transform the
`
`generic “enable-WSW instructions” into specific instructions. For example, a
`
`specific key (e.g., key Ca or Ta) is incorporated into the “enable-WSW
`
`instructions.” (Id. at 40.) While a new “message” may be created, the signal is
`
`received, then incorporated with specific information into the instructions, resulting
`
`in the transmission of “local-cable-enabling-message (#7).” (Id. at 43.)
`
`For Claims 42-43, Apple argues “local-cable-enabling-message (#7)” is
`
`
`
`4
`
`

`

`
`
`completely absent any encrypted portion. Apple has taken Dr. Dorney’s statement
`
`made regarding a different patent with different claims (Ex. 1059 at 12, 23, 34,
`
`regarding IPR2017-00755) out of context. According to Apple, Dr. Dorney stated
`
`that the “local-cable-enabling-message” is entirely not encrypted. Dr. Dorney’s
`
`statement, properly understood in context, was that the “local-cable-enabling-
`
`message” included an unencrypted portion. He did not say that the entire message
`
`is not encrypted. In any event, that statement is irrelevant to the claim term at issue
`
`here. Regarding the disclosure for the correct claims, Dr. Dorney stated in his
`
`declaration in IPR2016-00754 on the patent at issue in this case that “As shown
`
`above, local-cable-enabling- message (#7), processed according to ‘the fashion in
`
`which information of first message of example #4’, comprises both unencrypted and
`
`encrypted digital information.” (Ex. 2224 at 14-15.)
`
`Indeed, in a passage often quoted by Apple (see, e.g., Opp. at 10-11) from
`
`within Example #7 regarding the WSW program, Harvey et al. discloses control
`
`processor 39J causes the transfer of information to controller 20 “in the fashion in
`
`which information of first message of example #4 is transferred … to decryptor,
`
`39K.” (Ex. 2208 at 291:33-292:6, emphasis added.) There would be no reason to
`
`transfer the information to a decryptor unless that information is encrypted.
`
`Further, Example #4, referenced in this section of Example #7 and also regarding
`
`the WSW program, clearly discloses both encrypted and not encrypted information:
`
`
`
`5
`
`

`

`
`
`“the first message of example #4 is only partially encrypted.” (Ex. 2208 at 198:10-
`
`26, emphasis added.)
`
`Also regarding claims 42 and 43, Apple argues “digital video” is not enabled
`
`in the ’413 Application and was nascent in 1981. Apple’s argument is inapposite to
`
`the Substitute Claims, which claim priority to 1987. As of 1987, digital video was
`
`not “nascent;” Apple’s expert Mr. Wechselberger published a document in 1983
`
`regarding the tradeoffs for cost and quality of digital video, which could not be
`
`known without working systems. (Ex. 2006 at 4 in “ENCRYPTION IMPLIES
`
`DIGITAL”.) And PMC’s expert Prof. Weaver provides multiple sources teaching
`
`“digital video” (Ex. 2023 at ¶¶166-168).
`
`For Claims 44, 45, 47, and 48, Apple argues “identifying a cipher algorithm”
`
`is not supported by the ’413 Application. Apple is not correct: the specification
`
`discloses that the “Exotic Meals of India” second message can be encrypted using
`
`“any of the methods described above.” (Ex. 2208 at 478:1-5, Fig. 7F.) Regardless
`
`of chosen encryption embodiment, Harvey et al. discloses selection of at least
`
`cipher algorithms A, B, or C, or decryptor 39K, which has its own cipher algorithm.
`
`(Ex. 2208 at 286:34-287:7, 198:10-16, 206:32-207:9; CMTA at 9-10, B-36 to 38.)
`
`To decrypt properly, the receiver station must perform “identifying a cipher
`
`algorithm” to determine how to decrypt because a plurality of cipher algorithms
`
`exist at the receiver station. Apple’s arguments regarding the decryptor 39K
`
`
`
`6
`
`

`

`
`
`algorithm do not address that, regardless of whether choosing a “key” is the same as
`
`choosing an “algorithm” (it is not),1 a choice must still be made from between
`
`algorithms A, B, C, or the decryptor 39K algorithm.
`
`In Claims 45-48, Apple argues receiving an “encrypted digital information
`
`transmission … unaccompanied by any non-digital information transmission” is
`
`unsupported. As explained in PMC’s CMTA (p. 14-15), Fig. 7C of the ’413
`
`Application discloses cable converter box 222 outputting “one digital data channel.”
`
`Fig. 7F, regarding the “Exotic Meals of India” embodiment, discloses the same
`
`converter box 222 used with All signal decoder (shown in Fig. 7C, and described
`
`with respect to Fig. 7F) and outputs to digital decryptor 224 (Fig. 7F) that decrypts
`
`the digital second message. The converter 222 output in Fig. 7F must therefore be a
`
`digital data channel. (Ex. 2223 at 83-88.)
`
`Respecting claims 44-48, Apple asserts that there is no support for the term
`
`“communicating … unique digital data to a remote site.” As explained (Ex. 2223 at
`
`
`1 The decryptor 39K algorithm, which decrypts without “altering the number of
`
`bits,” is selected by matching particular message bits to invoke “decrypt-with-[key]-
`
`at-39K-instructions” using keys such as G, J, or Z. (Ex. 2208 at 45:4-46:16, 228:1,
`
`200:34-203:35; Ex. 2223 at 72-73, 95-96.) Simply identifying a decryption key is
`
`insufficient to identify a cipher algorithm.
`
`
`
`7
`
`

`

`
`
`75-76), this term is supported by the “Exotic Meals of India” embodiment,
`
`specifically the “unit code identification information” (Ex. 2208 at 473:3-13, 471:6-
`
`13) which enables a fee to be charged (CMTA at 10) by transmission of the meter-
`
`monitor information to a billing station (Ex. 2223 at 76-78). The cited portions of
`
`the specification all discuss the transmission of information regarding billing a
`
`subscriber for his content consumption and are therefore properly considered
`
`together.
`
`In Substitute Claim 48, contrary to Apple’s argument, Example #7 discloses a
`
`headend transmitting a message to a receiver station in one of several possible
`
`formats. It is the header that informs the receiving station which format and which
`
`“selection criteria” are appropriate to understand the pieces of a given transmission.
`
`(Ex. 2223 at 197; Ex. 2208 at 291:9-292:30, 45:4-20.) Example #7 supports the
`
`claim because the inventors allow decryption using “any of the methods described
`
`above.” (Ex. 2208 at 478:1-5.)
`
`With respect to Apple’s assertion that Dr. Dorney is not an expert in the field,
`
`PMC points the Board to Dr. Dorney’s CV at Ex. 2206. Among his other
`
`credentials and experience, Dr. Dorney has a Ph.D. in Electrical and Computer
`
`Engineering from Rice University. Dr. Dorney certainly is “qualified in the
`
`pertinent art.” See Husky Injection Molding Systs. v. Plastic Engineering and
`
`Technical Svcs., Inc., IPR2016-00431, Paper 41 at 13 (P.T.A.B. Jun. 15, 2017) (“A
`
`
`
`8
`
`

`

`
`
`person need not be a person of ordinary skill in the art in order to testify as an
`
`expert under Fed. R. Evid. 702, but rather must be “qualified in the pertinent art.”)
`
`III. SUBSTITUTE CLAIMS ARE PATENTABLE UNDER 35 USC §§102-103
`
`PMC addressed the prior art in its CMTA. Although Apple points to a
`
`number of prior art references listed on the ’635 patent, the Board has narrowed the
`
`field to the best three references that Apple relied on in its petition for IPR. PMC
`
`addressed these three references, Campbell, Seth-Smith, and Chandra, in its CMTA
`
`and explained how the Substitute Claims are patentable over these references. PMC
`
`also put together its best shot argument (see CMTA at 23-24) after reviewing all the
`
`prior art and explained how the Substitute Claims are patentable over this prior art.
`
`For Substitute Claim 41, Apple argues a “PHOSITA would have known …
`
`Campbell could be used to deliver digital programming” (Opp. at 18-19), but
`
`Campbell is completely silent as to any digital video or audio. Apple’s challenge
`
`relies on an argument that just because digital video was known, a PHOSITA would
`
`have been motivated to substitute digital video for Campbell’s analog video. This is
`
`a classic case of hindsight bias. The CAFC has warned that an analysis based on
`
`expert testimony that “based on the ‘modular’ nature of the claimed components,” a
`
`PHOSITA would have known how to combine references and would have been
`
`motivated to do so is “fraught with hindsight bias.” In re ActiveVideo Networks,
`
`Inc., 694 F.3d 1312, 1327 (Fed.Cir.2012).
`
`
`
`9
`
`

`

`
`
`Apple’s hindsight continues by combining Campbell’s scrambled TV system
`
`(excluded by amended claim 41) with Pailen’s mainframe/terminal system for
`
`computer programs. Apple simply inserts Pailen’s cipher algorithm for an APEC
`
`mainframe into Campbell’s scrambled TV subscriber’s converter. (Opp. at 19-20.)
`
`A computer system is not synonymous with a TV system, and a mainframe is not
`
`synonymous with a subscriber station. Further, Pailen’s terminals 18 may be
`
`similar to a subscriber station in some ways, but switch 52 prevents them from
`
`being involved in an authorization. (Ex. 1062 at 7:33-46, Fig. 1B.)
`
`Apple asserts that Seth-Smith renders Claims 42 and 43 obvious. But, Seth-
`
`Smith teaches only scrambled analog video (Ex. 1043 Fig. 17), pay-per-listen
`
`digital audio with no video component (id. at 9:46-55), and closed captioning
`
`textual information absent any graphics (id. at 2: 53-58; NAPLPS, Ex. 2101).
`
`Apple provides only hindsight analysis to arrive at the encrypted digital video as
`
`required by the claims, contrary to Fed. Cir. precedent in ActiveVideo.
`
`Further the claims require a computer file and Seth-Smith is silent as to a
`
`computer file, and instead repeatedly stores the fixed-size packets directly into
`
`RAM 124 without a computer file system. (Ex. 1043 at 39:64-40:68, 29:11-32.)
`
`Apple also argues that “authorized tiers” are “subscriber specific data”, but tier data
`
`is at most decoder-specific and lacks information corresponding to a subscriber.
`
`Moreover, with respect to Claims 42-43, Seth-Smith does not teach two-way
`
`
`
`10
`
`

`

`
`
`communications, and instead teaches an explicitly one-way system: “no uplink
`
`facility at the user's station need be provided.” This teaches away from a two-way
`
`communication. Citations in Seth-Smith to a “telephone” indicate human-to-human
`
`transactions, and not machine-to-machine transactions. Indeed, Seth-Smith states
`
`that “the user will only need to communicate with the broadcaster sporadically”
`
`(Ex. 1043 at 9:38-40, 10:19-27, emphasis added), further dissuading any need for a
`
`complicated and costly two-way communication system. Any combination of Seth-
`
`Smith with Pailen is forbidden hindsight. See ActiveVideo.
`
`With respect to Apple’s combination of Chandra and Thomas for claims 44-
`
`48, Chandra prefers that all software media be identical (Ex. 1041 at 8:45-60) while
`
`Thomas requires individual software serial number 17. (Ex. 1064 at 5:49-54.)
`
`Further, neither reference meets the limitation requiring the “unique digital data” to
`
`be in decrypted form and then communicated to a remote site. Thomas transfers
`
`serial numbers that were never decrypted (Ex. 1064 at 5:49-54), and Chandra
`
`requires the encrypted token “must be kept physically secure” (Ex. 1041 at 5:20-23,
`
`7:22-57).
`
`With respect to Apple’s reliance on Bergland, Bergland does not teach the
`
`required receiver station with storage for “subscriber specific data” and the ability
`
`to execute instructions/code. Bergland teaches terminals that receive only “data and
`
`voice” (Ex. 1065 Fig. 3 & pg. 2.) Bergland’s terminals don’t receive instructions;
`
`
`
`11
`
`

`

`
`
`therefore, the food service program must be executed at the central (Tandem)
`
`computer and cannot be executed at the home terminal. (Ex. 1065 Fig. 2 & pg. 1.)
`
`Chandra is designed to prevent piracy while Bergland’s Prestel hardware is a closed
`
`system, hosted elsewhere, and therefore already prevents piracy. Thus Chandra and
`
`Bergland cannot be combined.
`
`Pailen teaches terminals, but they are without a plurality of cipher algorithms.
`
`Chandra teaches away from transmitting decrypted information. Thus, their
`
`combination cannot teach “a plurality of preprogrammed cipher algorithms” at the
`
`user terminals 18 (supra); and Chandra is silent as to transmission of any token
`
`information.
`
`IV. SUBSTITUTE CLAIMS ARE PATENTABLE UNDER PRIOR ART
`
`Apple offers Exs. 1021, 1026, and 1079-1081 as additional prior art without
`
`comment. These exhibits all fail to even suggest at least choosing from plural
`
`cipher algorithms at a receiver station, communication to a remote site of decrypted
`
`unique digital data, and outputting information customized by subscriber specific
`
`digital data stored at a receiver station prior in time to receiving the information.
`
`These additional prior art references are cumulative to the prior art already known
`
`to PMC.
`
`
`
`
`
`12
`
`

`

`Respectfully submitted,
`
`
`
`/ Thomas J. Scott, Jr. /
`By
`Thomas J. Scott, Jr.
`Registration No.: 27,836
`Senior Vice President & General Counsel
`
`Personalized Media
`Communications, LLC
`
`11491 Sunset Hills Road, Suite 340
`Reston, Virginia 20190
`Telephone: (281) 201-2213
`tscott@pmcip.com
`
`
`
`
`
`Dated: August 31, 2017
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`

`

`
`
`
`
`
`
`CERTIFICATE OF SERVICE
`The undersigned hereby certifies that a copy of the foregoing PATENT
`
`OWNER’S REPLY IN SUPPORT OF MOTION TO AMEND, EXHIBIT
`
`2224 and SUBSTITUTE EXHIBIT 2208 was served on August 31, 2017 to the
`
`following attorneys of record by electronic transmission:
`
`Marcus E. Sernel, Joel R. Merkin, and Eugene Goryunov
`KIRKLAND & ELLIS LLP
`300 North LaSalle Street
`Chicago, Illinois 60654
`P: (312) 862-2000; F: (312) 862-2200
`marc.sernel@kirkland.com
`joel.merkin@kirkland.com
`eugene.goryunov@kirkland.com
`Apple-PMC-PTAB@kirkland.com
`
`Gregory S. Arovas
`KIRKLAND & ELLIS LLP
`601 Lexington Avenue
`New York, New York 10022
`P: (212) 446-4800; F: (212) 446-4900
`greg.arovas@kirkland.com
`
`Date: August 31, 2017
`
`
`
`/ Thomas J. Scott, Jr. /
`Thomas J. Scott, Jr.
`
`
`
`

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket