throbber
UNITED STATES PATENT AND TRADEMARK OFFICE
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`BEFORE THE PATENT TRIAL AND APPEAL BOARD
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`APPLE INC.
`Petitioners
`
`v.
`
`PERSONALIZED MEDIA COMMUNICATIONS LLC
`Patent Owner
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Case No.: IPR2016-01520
`Patent No.: 8,559,635
`For: Signal Processing Apparatus and Methods
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`DECLARATION OF ALFRED WEAVER, PH.D.
`
`
`
`
`
`PURSUANT TO 37 C.F.R. § 1.68
`
`
`
`
`
`
`
`
`
`
`
`Mail Stop PATENT BOARD
`Patent Trial and Appeal Board
`United States Patent and Trademark Office
`P.O. Box 1450
`Alexandria, VA 22313-1450
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`PMC Exhibit 2001
`Apple v. PMC
`IPR2016-01520
`Page 1
`
`

`
`Table of Contents
`
`Page
`
`
`
`D.
`
`Qualifications & Engagement ....................................................................... 1
`I.
`II. Materials Reviewed and Relied upon .......................................................... 7
`III. Summary of Conclusions .............................................................................. 7
`IV. Legal Standards ............................................................................................. 8
` Anticipation ........................................................................................... 9
`A.
`Obviousness ........................................................................................... 9
`B.
`Claim Construction ............................................................................. 11
`C.
`Persons of Ordinary Skill in the Art .................................................... 12
`V.
`Background Technology of the ’635 Patent .............................................. 12
`VI. Claim Construction ..................................................................................... 19
` Decryption terms ................................................................................. 19
`A.
`unaccompanied by any non-digital information transmission” .......... 34
`VII. The ’635 Patent is Patentable Over the Prior Art .................................... 36
`Priority ................................................................................................. 36
`
`(a) Claim 3 ...................................................................................... 45
`(b) Claims 4 and 7 ........................................................................... 59
`(c) Claim 13 .................................................................................... 79
`(d) Claim 18 .................................................................................... 95
`(e) Claim 20 ..................................................................................110
`
`B.
`
`“receiving an encrypted digital information transmission …
`
`A.
`
`
`
`
`
`PMC Exhibit 2001
`Apple v. PMC
`IPR2016-01520
`Page 2
`
`

`
`
`
`B.
`
`
`
`
`C.
`
`D.
`
`
`
`Claims 21 and 28.....................................................................122
`(f)
`(g) Claim 32 ..................................................................................132
`(h) Claim 33 ..................................................................................145
`Claim 3 Is Patentable over Campbell ................................................ 160
`(a) Campbell Does Not Qualify As Prior Art ...............................161
`(b)
`
`“receiving at said remote transmitter station one or more
`second instruct signals which operate at the subscriber
`station to identify and decrypt said unit of programming
`or said one or more first instruct signals, said remote
`transmitter station transferring said one or more second
`
`instruct signals to said transmitter” .........................................163
`
`(c)
`
`“receiving a control signal which operates at the remote
`transmitter station to control the communication of a unit
`of programming and one or more first instruct signals and
`communicating said control signal to said remote
`
`“receiving a code or datum identifying a unit of
`programming to be transmitted by the remote transmitter
`station, said remote transmitter station transferring said
`
`transmitter station” ..................................................................165
`(d)
`unit of programming to a transmitter” ....................................166
`Claim 33 is Patentable over Chandra in view of Nachbar ................ 170
`(a) Chandra and Nachbar Do Not Qualify As Prior Art ...............173
`(b) Claim 33 ..................................................................................173
`Claims 13, 18, 20, 32 Are Patentable over Chandra ......................... 181
`(a) Chandra Does Not Qualify As Prior Art .................................181
`(b) Claim 18 ..................................................................................181
`(c) Claim 20 ..................................................................................183
`
`
`
`ii
`
`PMC Exhibit 2001
`Apple v. PMC
`IPR2016-01520
`Page 3
`
`

`
`
`
`E.
`
`
`
`(d) Claim 32 ..................................................................................184
`(e) Claim 13 ..................................................................................185
`Claims 4, 7, 21, and 28-30 Are Patentable over Seth-Smith ............ 187
`(a)
`Seth-Smith Does Not Qualify As Prior Art ............................187
`(b) Claim 4 ....................................................................................188
`(c) Claim 7 ....................................................................................189
`(d) Claim 21 ..................................................................................189
`(e) Claim 28 ..................................................................................190
`(f)
`Claims 29 and 30.....................................................................190
`VIII. CONCLUSION .......................................................................................... 191
`
`iii
`
`
`
`
`
`PMC Exhibit 2001
`Apple v. PMC
`IPR2016-01520
`Page 4
`
`

`
`
`
`I, Dr. Alfred C. Weaver, do hereby declare:
`
`1.
`
`I am making this declaration at the request of Patent Owner
`
`Personalized Media Communications, LLC (“PMC”) in the matter of the Inter
`
`Partes Review No. IPR2016-01520 of U.S. Patent No. 8,559,635 (“’635 Patent.”)
`
`I.
`
`QUALIFICATIONS & ENGAGEMENT
`2.
`
`I earned a Bachelor of Science in Engineering Science in 1971 from
`
`the University of Tennessee. I also earned a Master of Science in Computer
`
`Science from the University of Illinois at Urbana-Champaign in 1973. Thereafter,
`
`I earned a Ph.D. in Computer Science at the University of Illinois at Urbana-
`
`Champaign in 1976.
`
`3.
`
`I am currently a Professor of Computer Science and the Associate
`
`Chair of the Department of Computer Science at the University of Virginia
`
`(“UVa”). I have been employed at UVa continuously since 1977. Over the period
`
`of my employment at UVa, I have taught more than 25 different courses, including
`
`electronic commerce, operating systems, computer networks, and various
`
`programming courses. Moreover, I have been the graduate advisor for 69 Ph.D.
`
`and master’s students, all in Computer Science.
`
`4.
`
`In addition to my teaching duties, I am also the Founding Director of
`
`UVa’s Applied Research Institute, a group of faculty engaged in research areas
`
`related to national security and funded by both government and industry. To date,
`
`
`
`1
`
`PMC Exhibit 2001
`Apple v. PMC
`IPR2016-01520
`Page 5
`
`

`
`
`
`I have published 16 books and book chapters, 30 refereed journal articles, 139
`
`refereed conference publications, and 80 technical reports. I currently serve on the
`
`Advisory Council of the Editorial Board of IEEE Computer magazine.
`
`5.
`
`As a researcher, I have served as Principal Investigator or co-Principal
`
`Investigator of 130+ research projects funded by the federal government and
`
`private industry. Recent research projects include 3D printing, automated analysis
`
`of published scientific literature, secure mobile computing, crowdsourcing, data
`
`integrity, and trustworthy computing.
`
`6.
`
`I have founded five companies. One of these, Network Xpress, Inc.,
`
`was a spin- off from research work in computer networks funded by the U. S. Navy
`
`at UVa. At its peak, another company, Reliacast, Inc., employed 90 people and
`
`developed software for secure streaming of multimedia. Reliacast was ultimately
`
`sold to Comcast.
`
`7.
`
`I have served as an expert witness in 20+ patent infringement cases
`
`since 1988. Six of those cases have gone to trial. In the past four years I have
`
`testified in court in two cases:
`
` VS Technologies v. Twitter, Inc., No. 2:11-cv-00043-HCM-TEM in
`the United States District Court for the Eastern District of Virginia
`(Norfolk). In that case, I testified on behalf of Twitter.
` ePlus, Inc. v. Lawson Software, Inc., No. 3:09-cv-00620-REP in the
`United States District Court for the Eastern District of Virginia
`(Richmond). In that case, I testified on behalf of ePlus.
`
`
`
`2
`
`PMC Exhibit 2001
`Apple v. PMC
`IPR2016-01520
`Page 6
`
`

`
`
`
`8.
`
`A complete list of cases in which I have testified at deposition,
`
`hearing or trial in the past 4 years is attached hereto as Exhibit 2.
`
`9.
`
`I have authored or co-authored 16 books or book chapters in the
`
`computer science field and have authored or co-authored over 169 refereed journal
`
`and conference papers on various topics related to computer science, computer
`
`systems, computer networks, search agents, databases, the Internet and e-
`
`commerce, among other topics. I am a member of the editorial board of the IEEE
`
`Computer magazine.
`
`10.
`
`I have presented papers at numerous conferences and have served as
`
`Program Chair or Technical Program Chair of a number of conferences around the
`
`world. For example, I was the Keynote Speaker at the International Workshop on
`
`Privacy, Security, and Trust for Mobile Devices (MobiPST’11), in Maui, Hawaii,
`
`in July 2011 on the topic of “Providing Privacy and Security for Mobile Devices.”
`
`I was the Keynote Speaker at the IEEE International Conference on Industrial
`
`Technology (ICIT’05), in Hong Kong, in December 2005 on the topic of
`
`“Achieving Data Privacy and Security Using Web Services.” I was the Keynote
`
`Speaker at the IEEE International Conference on Emerging Technologies and
`
`Factory Automation (ETFA’05), in Catania, Sicily, Italy, in September 2005 on the
`
`topic of “A Security Architecture for Distributed Data Security.”
`
`
`
`3
`
`PMC Exhibit 2001
`Apple v. PMC
`IPR2016-01520
`Page 7
`
`

`
`
`
`11. With my co-authors, Sam Dwyer and Kristen Hughes, I wrote chapter
`
`two entitled “Health Insurance Accountability and Portability Act” in the book
`
`Security Issues in the Digital Medical Enterprise, published by the Society for
`
`Computer Applications in Radiology in 2004. I wrote the paper “Secure Sockets
`
`Layer” in Computer in April 2006. With my co-author, Andrew Jurik, I wrote
`
`“Securing Mobile Devices with Biotelemetry,” presented at the International
`
`Workshop on Privacy, Security, and Trust in Mobile and Wireless Systems
`
`(MobiPST’11), in Maui, Hawaii, in July, 2011. I presented the NATO Fellowship
`
`Lecture at Bogazici University, in Istanbul, Turkey, in May 2000 on the topic of
`
`“Internet Privacy and Security.” With my master’s student, Andrew Snyder, I
`
`wrote “The e-Logistics of Securing Distributed Medical Data,” presented at the
`
`IEEE International Conference on Industrial Informatics, Banff, Alberta, Canada,
`
`in August 2003. I supervised Andrew Snyder’s master’s thesis on the topic of
`
`“Performance Measurement and Workflow Impact of Securing Medical Data
`
`Using HIPAA Compliant Encryption in a .NET Environment,” in August 2003.
`
`12.
`
`I am a named inventor on U.S. patent 4,217,658 that resulted from my
`
`Ph.D. research at the University of Illinois.
`
`13.
`
`I am a Fellow of the IEEE, an honor awarded to less than two percent
`
`of the IEEE membership.
`
`
`
`4
`
`PMC Exhibit 2001
`Apple v. PMC
`IPR2016-01520
`Page 8
`
`

`
`
`
`14.
`
`I have been an invited guest lecturer at numerous meetings sponsored
`
`by various corporations around the world. For example, I spoke on “Reliable
`
`Multicast and Reliable Group Management” for a meeting held at Sun
`
`Microsystems in Palo Alto, California in July, 1999. I gave a presentation entitled
`
`“Xpress Transport Protocol” at a meeting sponsored by General Electric Research
`
`and Development Laboratory, held in Schenectady, New York, in December, 1996.
`
`I was an invited speaker on the topic of “Medical Data Privacy and Security” at the
`
`Microsoft Healthcare Users’ Group meeting in Redmond, Washington in 2006.
`
`15.
`
`I was the Lucian Carr III Professor of Engineering and Applied
`
`Science at the University of Virginia from 2002-2004. I was a member of the
`
`Provost’s Promotion and Tenure Committee of the University of Virginia during
`
`2003-2006. I served as the Chairman of the Department of Computer Science
`
`during 1984-85 and am now the Associate Chair of my department. In 1996-1999
`
`and again in 2012-2015, I served as a member of the Promotion and Tenure
`
`Committee for the School of Engineering and Applied Science at the University of
`
`Virginia and chaired that committee during 1998-1999 and 2014-2015.
`
`16.
`
`I teach the University of Virginia’s CS 4753 course “Electronic
`
`Commerce Technologies.” This course explains the role of encryption in modern
`
`electronic commerce and teaches the details of the mathematical algorithms that
`
`implement symmetric key encryption, public key encryption, and other encryption
`
`
`
`5
`
`PMC Exhibit 2001
`Apple v. PMC
`IPR2016-01520
`Page 9
`
`

`
`
`
`techniques. I was the Principal Investigator for “Secure E-Commerce: A Modular
`
`Course Supported by Virtual Laboratories,” a $500,000 research project funded by
`
`the National Science Foundation to develop a course teaching secure e-commerce.
`
`17.
`
`I have also had the opportunity to consult with and/or work in the
`
`commercial sector. For example, I received a $200,000 research grant from
`
`Microsoft for my work in connection with development of a solution to the
`
`problems associated with the privacy and security of medical data. In the past, I’ve
`
`consulted for General Electric, Lockheed Martin, Honeywell, Raytheon, E-
`
`Systems and others. Additionally, I founded five companies of my own which
`
`focused on e-commerce. I was involved in all aspects of the life cycles of these
`
`companies from raising start-up capital funding, to designing and developing
`
`products, to attempting to commercialize these products in the marketplace. One
`
`of these companies, Reliacast, developed secure multimedia distribution software
`
`and was ultimately sold to Comcast.
`
`18. A detailed curriculum vitae showing more of my credentials in these
`
`fields and the cases in which I have testified in the past four years is attached as
`
`Exhibit 2002.
`
`19.
`
`I am being compensated for my work in this matter at my standard
`
`hourly rate of $400/hour for consulting services. My compensation for this matter
`
`is not determined by or contingent upon the outcome of this case.
`
`
`
`6
`
`PMC Exhibit 2001
`Apple v. PMC
`IPR2016-01520
`Page 10
`
`

`
`II. MATERIALS REVIEWED AND RELIED UPON
`20.
`In preparing this Declaration I reviewed and considered the following
`
`
`
`
`
`materials:
`
`Description
`Ex. / Doc.
`Paper 1 Petition for Inter Partes Review by Petitioners (“Pet.”)
`1001 Declaration Of Anthony J. Wechselberger Under 37 C.F.R.
`§ 1.68 In Support Of Petition For Inter Review of U.S.
`Patent No. 8,559,635 and documents cited therein
`1003 U.S. Patent No. 8,559,635
`1004 U.S. Patent No. 4,694,490
`1041 U.S. Patent No. 4,817,140( “Chandra”)
`1042 Chandra in view of Daniel Nachbar, When Network File
`Systems Aren’t Enough: Automatic Software Distribution
`Revisited, USENIX Conference Proceedings, June 9-13,
`1986 (“Nachbar”)
`1043 U.S. Patent No. 4,866,770 to Seth-Smith et al. (“Seth-
`Smith”)
`
`1044 U.S. Patent No. 4,536,791 to Campbell et al. (“Campbell”)
`
`-
`21.
`
`All other documents cited and used in this Declaration.
`I have also relied upon my years of education, teaching, research, and
`
`experience concerning software, computer architecture, networks, network
`
`protocols, electronic commerce, privacy and security.
`
`III. SUMMARY OF CONCLUSIONS
`22.
`I understand that the Petitioner challenged claims 3-4, 7, 13, 18, 20,
`
`21, 28-30, 32, and 33 (the “Challenged Claims”) of the ’635 Patent on the
`
`following grounds:
`
`
`
`7
`
`PMC Exhibit 2001
`Apple v. PMC
`IPR2016-01520
`Page 11
`
`

`
`
`
`Prior Art
`Campbell et al.
`Chandra
`Chandra in view of Nachbar
`
`Seth-Smith
`
`Statute Claims
`§ 103
`3
`§ 102
`13, 18, 20, and 32
`§ 103
`33
`
`§ 102
`
`4, 7, 21, 28, 29, 30
`
`23.
`
`I have been asked by PMC to determine whether claims 3-4, 7, 13, 18,
`
`20, 21, 28-30, 32, and 33 of the ’635 Patent are rendered unpatentable as alleged
`
`by Petitioner Apple, Inc. (“Petitioner”). Petitioner cites to the declaration of Mr.
`
`Wechselberger (Ex. 1001). I have reviewed his declaration. I provide my opinion
`
`regarding many of Mr. Wechselberger’s positions below.
`
`24.
`
`I find that Petitioner has not set forth a reasonable likelihood that
`
`Petitioner would prevail as to at least one claim being challenged. I find that these
`
`claims are novel and are not rendered unpatentable over the grounds that Petitioner
`
`has set forth.
`
`IV. LEGAL STANDARDS
`25.
`I am not an attorney. I have been advised of the following general
`
`principles of patent law to be considered in formulating my opinions as to whether
`
`the claims of the ’635 Patent are anticipated or would have been obvious to a
`
`person of ordinary skill in the art at the time of the invention in view of the prior
`
`art.
`
`
`
`8
`
`PMC Exhibit 2001
`Apple v. PMC
`IPR2016-01520
`Page 12
`
`

`
`
`
` Anticipation
`A.
`26.
`I understand that to anticipate a patent claim, a single prior art
`
`reference must disclose every element of the claim, either explicitly or inherently
`
`to a person of ordinary skill in the art. I understand that an element of a claim is
`
`“inherent” in the disclosure of a prior art reference when the missing element is the
`
`inevitable outcome of the process and/or thing that is described in the prior art
`
`reference.
`
` Obviousness
`B.
`27.
`I understand that a prior art reference can render a patent claim
`
`obvious to one of ordinary skill in the art if the differences between the subject
`
`matter set forth in the patent claim and the prior art are such that the subject matter
`
`of the claim would have been obvious at the time the claimed invention was made.
`
`In analyzing obviousness, I understand that it is important to consider the scope of
`
`the claims, the level of skill in the relevant art, the scope and content of the prior
`
`art, the differences between the prior art and the claims, and any secondary
`
`considerations.
`
`28.
`
`I understand that when the claimed subject matter involves combining
`
`pre-existing elements to yield no more than one would expect from such an
`
`arrangement, the combination is obvious. I also understand that in assessing
`
`whether a claim is obvious, one must consider whether the claimed improvement is
`
`
`
`9
`
`PMC Exhibit 2001
`Apple v. PMC
`IPR2016-01520
`Page 13
`
`

`
`
`
`more than the predictable use of prior art elements according to their established
`
`functions. I understand that there need not be a precise teaching in the prior art
`
`directed to the specific subject matter of a claim because one can take account of
`
`the inferences and creative steps that a person of ordinary skill in the art would
`
`employ. I further understand that a person of ordinary skill is a person of ordinary
`
`creativity, not an automaton. However, I understand that obviousness cannot be
`
`based on the hindsight combination of components selectively culled from the
`
`prior art. I also understand that a combination is not obvious if it requires
`
`extensive additional problem-solving steps that are not taught in the references and
`
`that are not simple matters for a person of ordinary skill in the art. That is, a
`
`combination is not obvious if it requires the development of an additional complex
`
`infrastructure.
`
`29.
`
`I understand that in an obviousness analysis, neither the motivation
`
`nor the avowed purpose of the inventors controls the inquiry. Any need or
`
`problem known in the field at the time of the invention and addressed by the patent
`
`can provide a reason for combining elements. For example, I understand that it is
`
`important to consider whether there existed, at the time of the invention, a known
`
`problem for which there was an obvious solution encompassed by the patent’s
`
`claims. I understand that known techniques can have obvious uses beyond their
`
`
`
`10
`
`PMC Exhibit 2001
`Apple v. PMC
`IPR2016-01520
`Page 14
`
`

`
`
`
`primary purposes, and that a person of ordinary skill in the art can fit the teachings
`
`of multiple pieces of prior art together like pieces of a puzzle.
`
`30.
`
`I understand that, when there is a reason to solve a problem and there
`
`are a finite number of identified, predictable solutions, a person of ordinary skill in
`
`the art has good reason to pursue the known options within his or her technical
`
`grasp. I further understand that, if this leads to the anticipated success, it is likely
`
`that the product, not of innovation, but of ordinary skill and common sense, which
`
`bears on whether the claim would have been obvious.
`
`31.
`
`I understand that secondary considerations can include, for example,
`
`evidence of commercial success of an invention, evidence of a long-felt need that
`
`was solved by an invention, evidence that others copied an invention, or evidence
`
`that an invention achieved a surprising result. I further understand that such
`
`evidence must have a nexus or causal relationship to the elements of a claim in
`
`order to be relevant. I am unaware of any such secondary considerations.
`
` Claim Construction
`C.
`32.
`It is my understanding that in determining whether a patent claim is
`
`anticipated or obvious in view of the prior art, the Patent Office must construe the
`
`claim by giving the claim its broadest reasonable interpretation consistent with the
`
`specification from the standpoint of a person of ordinary skill in the art. For the
`
`purposes of this review, unless otherwise stated, I have construed each claim term
`
`
`
`11
`
`PMC Exhibit 2001
`Apple v. PMC
`IPR2016-01520
`Page 15
`
`

`
`
`
`in accordance with its plain and ordinary meaning under the required broadest
`
`reasonable interpretation.
`
`
`D.
`33.
`
`Persons of Ordinary Skill in the Art
`
`I believe that the ’635 Patent is addressed to a person of ordinary skill
`
`in the art (“POSITA”), i.e., a person of ordinary skill in the art with at least a
`
`bachelor’s degree or equivalent in digital electronics, electrical engineering,
`
`computer engineering, computer science, or a related technical degree, with 2-5
`
`years of post-degree work experience in system engineering (or equivalent). In
`
`determining who would be a POSITA, I considered at least the following criteria:
`
`(a) the type of problems encountered in the art; (b) prior art solutions to those
`
`problems; (c) the rapidity with which innovations are made; (d) the sophistication
`
`of the technology; and (e) the education level of active workers in the field.
`
`V. BACKGROUND TECHNOLOGY OF THE ’635 PATENT
`34. The’635 Patent comprises the vision of an end-to-end system that can
`
`distribute digital information over an analog or digital transmission system from a
`
`transmitter station to a receiver station, optionally passing through an intermediate
`
`station, and the methods for accomplishing that distribution. The transmitted
`
`digital information can be addressed to one or more receiver stations and can
`
`include commands, data, signals, computer programs, or encrypted programming.
`
`
`
`12
`
`PMC Exhibit 2001
`Apple v. PMC
`IPR2016-01520
`Page 16
`
`

`
`
`
`35. The digital information so transmitted can be encrypted by its
`
`originator, in whole or in part, and decrypted by its receiver using a decryption key
`
`sent from the transmitter to the receiver. The decryption key itself can be
`
`encrypted and it too can be decrypted by the receiver using information provided
`
`by the transmitter.
`
`36. The’635 Patent responded to the new possibilities opened up as
`
`transmission of digital content, instead of analog content, became more
`
`technologically feasible. The’635 Patent describes an entirely new signal-
`
`processing system having multiple layers of transmitter station devices that are
`
`able to control addressable receiver devices in large networks.
`
`37. The patented inventions addressed problems in the prior art by
`
`recognizing the significant improvements that could be accomplished if receivers
`
`could communicate with other devices in a network; if transmitters could control
`
`receivers such as, for example, by sending control instructions in the same
`
`information stream as programming content; and if receivers could use those
`
`control instructions to identify content addressed to individual users and to carry
`
`out controlled operations specific to a receiver device. Such a network, employing
`
`distributed computing and control, is able to provide customized user content,
`
`other new and useful types of content, and new modes of delivering that content.
`
`
`
`13
`
`PMC Exhibit 2001
`Apple v. PMC
`IPR2016-01520
`Page 17
`
`

`
`
`
`But such a system is enormously more complex than the one-to-many distribution
`
`structures in the prior art.
`
`38. The’635 Patent discloses methods and apparatuses for addressing
`
`specific technical issues that arose for the first time in the context of the inventors’
`
`systems and methods for distributing personalized media content in a networked
`
`environment.
`
`39. The layered signal decryption technology claimed in the’635 Patent –
`
`which allows encrypted content to be transmitted along with encrypted digital
`
`control signals and requires decryption of the digital control signals first in order to
`
`unlock the encrypted content – was initially conceived to inhibit piracy of TV
`
`content delivered in a cable, satellite or other networked system.
`
`40. At the time of the inventions of the’635 Patent, the secure delivery of
`
`programming content along with related control signals to control or enable
`
`specific signal processing operations at remote receiver stations was a technical
`
`challenge particular to a distributed computing environment such as, for example, a
`
`cable television network. And, the technical solutions the inventors conceived,
`
`developed and patented were novel and unconventional at the time. The patented
`
`inventions require specially-programmed equipment to implement various specific
`
`applications and functions, such as receiving incoming digital information
`
`transmissions, filtering or selecting control signals or other signals or specific
`
`
`
`14
`
`PMC Exhibit 2001
`Apple v. PMC
`IPR2016-01520
`Page 18
`
`

`
`
`
`content from the incoming information transmissions, and/or decrypting the
`
`incoming information transmissions.
`
`41. Recognizing the importance of protecting the programming being
`
`transmitted, the ’635 Patent discloses a sophisticated embodiment of access
`
`control, allowing for the delivery of personalized content to subscriber stations in a
`
`secure manner through unique encryption techniques. For instance, the conditional
`
`access technology claimed by the patents allows encrypted content to be
`
`transmitted along with encrypted digital control signals and requires decryption of
`
`the digital control signals first in order to unlock the encrypted content. The digital
`
`information so transmitted can be encrypted by its originator, in whole or in part,
`
`and decrypted by its receiver using decryption key information (e.g., the
`
`decryption key(s), or the location of the key(s), or a method of calculating a key)
`
`sent from the transmitter to the receiver. The decryption key information can itself
`
`be encrypted and it too can be decrypted by the receiver using information
`
`provided by the transmitter or stored at the receiver.
`
`42. FIG. 4A of the application that the ’635 Patent claims priority to, U.S.
`
`Appl. No. 317,510, which issued as U.S. Patent 4,694,490 (the “’490 Patent”)
`
`shows a receiver station’s signal processor, 100, and a programing decrypter and/or
`
`interrupt means, 101, each of which receives the transmissions of programing. Ex.
`
`1004 at 13:12-15. The devices, 100 and 101, may receive one channel of
`
`
`
`15
`
`PMC Exhibit 2001
`Apple v. PMC
`IPR2016-01520
`Page 19
`
`

`
`
`
`programing or multiple channels. The ’490 Patent describes that transmissions
`
`received at these receiver stations may contain “code or codes necessary for the
`
`decryption of the transmission.” Ex. 1004 at 13:31-32. FIG. 4D shows that a
`
`multi-stage decryption/interruption process may be used in which transmissions
`
`must be processed by one or more additional decryptor /interruptors, 111, that
`
`follow decryptor/interruptor, 110:
`
`
`
`43. The ’490 Patent further describes that the receiver station’s “signal
`
`processors, 100, 103, 106, 109, and 112, could also operate in a predetermined
`
`fashion and telephone a remote site to get an additional signal or signals necessary
`
`for the proper decryption and/or transfer of incoming programing transmissions.”
`
`Ex. 1004 at 15:21-25. See also, e.g., FIG. 1 (telephone connection 22 with digital
`
`recorder 16).
`
`44. The receiver station further receives and processes encrypted content
`
`through cable transmissions. Ex. 1004 at 6:30-32. FIG. 2A, for example, shows a
`
`decoder capable of receiving cable transmissions on different channels. The
`16
`
`
`
`PMC Exhibit 2001
`Apple v. PMC
`IPR2016-01520
`Page 20
`
`

`
`
`
`decoder forwards transmissions on one of three paths. The detectors of each path
`
`“are designed to act on the particular frequency ranges in which the encoded
`
`information may be found.” Ex. 1004 at 6:42-7:5. “Path C inputs the separately
`
`defined transmission to a digital detector, 38.” In contrast, analog television and
`
`audio transmissions containing embedded digital data are forwarded to paths A and
`
`B. Id.
`
`45. Through the disclosed access control system, the ’635 Patent allows
`
`users at these receiver stations to access materials through purchases or other
`
`means. For example, in one of the many examples provided, the disclosed
`
`invention allows a user to purchase, receive, decrypt, and output a printed cooking
`
`recipe:
`
`Suppose a viewer watches a television program on cooking techniques
`that is received on TV set, 202, via box, 201. Julia Childs's "The
`French Chef” is one such program. Halfway through the program, the
`host says, “If you are interested in cooking what we are preparing here
`and want a printed copy of the recipe for a charge of only 10 cents,
`press 567 on your Widget Signal Generator and Local Input.” The
`viewer then presses buttons 567 on local input, 225, which signal is
`conveyed to the buffer/comparator, 8 (referring to FIG. 1), of signal
`processor, 200, to hold and process further in a predetermined fashion.
`Five minutes later, a signal is identified in the incoming programing
`on TV set, 202, by decoder, 203, which is also transferred by
`processor, 204, to buffer/comparator, 8, of signal processor, 200. This
`
`
`
`17
`
`PMC Exhibit 2001
`Apple v. PMC
`IPR2016-01520
`Page 21
`
`

`
`
`
`signal instructs buffer/comparator, 8, that, if 567 has been received
`from signal generator, 225, signal processor, 200, should, in a
`predetermined fashion, instruct tuner, 223, to tune cable converter
`box, 222, to the appropriate channel to receive the recipe in encoded
`digital form and instruct control means, 226, to activate printer, 221.
`The signal transmission from processor, 204, also passes a signal
`word to signal processor, 200, which, in a predetermined fashion,
`signal processor, 200, decrypts and transfers to decrypter, 224, to
`serve as the code upon which decrypter, 224, will decrypt the
`incoming encrypted recipe. … When the transmission of the recipe is
`received, box 222, transfers the transmission to decrypter, 224, for
`decryption and thence to printer, 221, for printing.
`Ex. 1004 at 20:16-50.
`
`46. At the time of the inventions, the secure delivery of programming
`
`content along with related control signals to control or enable specific signal
`
`processing operations at remote rece

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket