throbber
UNITED STATES PATENT AND TRADEMARK OFFICE
`BEFORE THE PATENT TRIAL AND APPEAL BOARD
`
`U.S. Patent No. 9,934,408 B2
`
`: Attorney Docket No. 081841.0119
`
`In Re:
`
`Inventors: Moskowitz, Scott A.;
`
`Berry, Mike W.
`
`Filed:
`
`May 30, 2017
`
`Issued:
`
`Apr. 3, 2018
`
`
`
`
`
`
`
`Assignee: Wistaria Trading Ltd.
`
`Title:
`
`
`
`
`
`
`
`
`
`
`
`:
`
`:
`
`:
`
`: IPR No.: Unassigned
`
`:
`
`Secure personal content server :
`
`Mail Stop PATENT BOARD
`Patent Trial and Appeal Board
`U.S. Patent and Trademark Office
`P.O. Box 1450
`Alexandria, Virginia 22313-1450
`
`Submitted Electronically via the Patent Trial and Appeal Board End to End System
`
`
`DECLARATION OF SANDEEP CHATTERJEE., Ph.D.
`
`
`
`DISH-Blue Spike-408
`Exhibit 1004, Page 0001
`
`

`

`TABLE OF CONTENTS
`
`
`I. BACKGROUND AND QUALIFICATIONS ......................................... 1
`
`II. MATERIALS CONSIDERED ................................................................ 6
`
`III. LEGAL UNDERSTANDING ................................................................. 8
`
`A. Anticipation ........................................................................................ 9
`
`B. Obviousness ....................................................................................... 9
`
`IV. BACKGROUND ON THE RELEVANT TECHNOLOGY ................. 13
`
`V. THE PATENT AT ISSUE ..................................................................... 26
`
`A. The ’408 Patent ................................................................................ 26
`
`B. The ’408 Patent Prosecution History ............................................... 29
`
`C. Asserted Claims and Priority Date................................................... 31
`
`D. Prior Art Considered ........................................................................ 32
`
`VI. CONSTRUCTION OF CLAIMS .......................................................... 51
`
`A. Level of Ordinary Skill in the Art .................................................... 52
`
`B. Claim Terms ..................................................................................... 54
`
`VII. INVALIDITY ........................................................................................ 67
`
`
`
`
`
`i
`
`DISH-Blue Spike-408
`Exhibit 1004, Page 0002
`
`

`

`
`
`I, Sandeep Chatterjee, Ph.D., declare as follows:
`
`1.
`
`I make this declaration based upon my own personal knowledge
`
`and, if called upon to testify, would testify competently to the matters
`
`contained herein.
`
`2.
`
`I have been asked to provide technical assistance in the inter
`
`partes review of U.S. Patent No. 9,934,408 (“the ’408 Patent”).1
`
`3.
`
`This declaration is a statement of my opinions on issues related
`
`to the patentability of claims 1, 6, 8, and 17 of the ’408 Patent.
`
`I.
`
`Background and Qualifications
`
`1. My background and qualifications are stated more fully in my
`
`Curriculum Vitae.2 As reflected in my Curriculum Vitae (and as explained
`
`below), I have significant professional experience related to the technology
`
`described in the ’408 Patent, including architecting, developing, optimizing,
`
`deploying and managing complex computing systems (including hardware
`
`and software for these systems) for the secure distribution of digitized
`
`information, such as mobile and wireless computing systems, distributed
`
`computing systems and software-as-a-service (SaaS) systems using different
`
`technologies and platforms. Many of these systems included specific security
`
`
`
`1 Ex[1001].
`
`2 Ex[1007].
`
`
`
`1
`
`DISH-Blue Spike-408
`Exhibit 1004, Page 0003
`
`

`

`
`
`and policy requirements for different content and data sets. For example, one
`
`of the systems I architected and developed securely distributed and managed
`
`still image and audio content to different wireless and wireline devices.
`
`Policies associated with the content determined which users and devices could
`
`access and view the image and audio content. Another one of the systems I
`
`architected and developed limited access to certain audio and image content
`
`to certain users. User access was based upon specific triggers, e.g., time-of-
`
`day, content type, user restrictions, etc. I provide a brief summary of my
`
`experience and qualifications here.
`
`2.
`
`I am the Chief Executive Officer of Experantis LLC, a
`
`technology consulting company. I am also the Dean of the Mobility Center
`
`of Excellence at the International Institute of Digital Technologies.
`
`Previously, I was the Executive Vice President and Chief Technology Officer
`
`of SourceTrace Systems, Inc., a technology and services company enabling
`
`the delivery of secure remote electronic services over landline and wireless
`
`telecommunications networks.
`
`3.
`
`I received my bachelor’s degree in Electrical Engineering and
`
`Computer Science from the University of California, Berkeley in 1995. I
`
`received my master’s degree in Computer Science from the Massachusetts
`
`Institute of Technology (MIT) in 1997, and my doctorate in Computer Science
`
`
`
`2
`
`DISH-Blue Spike-408
`Exhibit 1004, Page 0004
`
`

`

`
`
`from MIT in 2001. I received a certificate of completion for an executive
`
`education program on global leadership from Harvard University in 2011. My
`
`doctoral dissertation at MIT, entitled “Composable System Resources for
`
`Networked Systems,” which involved networked client architectures and
`
`systems, was selected as one of the top inventions in the history of MIT’s
`
`Laboratory for Computer Science. This invention is showcased in a time
`
`capsule at the Museum of Science in Boston, Massachusetts.
`
`4.
`
`In 2011, I was named a Young Global Leader. This honor,
`
`bestowed each year by the World Economic Forum, recognizes and
`
`acknowledges the top leaders—all below the age of 40—from around the
`
`world for their professional accomplishments, commitment to society, and
`
`potential to contribute to shaping the future of the world. In 2016, I was
`
`appointed to the World Economic Forum’s expert network as an expert in
`
`technology and innovation, and I advise world leaders on issues related to
`
`technology and innovation.
`
`5.
`
`I have extensive experience
`
`in architecting, developing,
`
`optimizing, deploying, and managing complex computing systems, including
`
`mobile and wireless computing systems, throughout the world. I have
`
`developed mobile and distributed computing systems, including hardware and
`
`software for these systems. I have invented, architected, and led the
`
`
`
`3
`
`DISH-Blue Spike-408
`Exhibit 1004, Page 0005
`
`

`

`
`
`development (product, QA, documentation) as well as the initial sales &
`
`marketing efforts for key eBusiness, mobile, Web services, and J2EE
`
`middleware products and solutions at SourceTrace Systems, Cyndeo, Satora
`
`Networks, Bluestone Software, and Hewlett-Packard.
`
`6.
`
`I also have extensive experience in architecting and developing
`
`software-as-a-service (SaaS) systems using different technologies and
`
`platforms, including with Web services. Web services using the Simple
`
`Object Access Protocol (SOAP) or Representational State Transfer (REST)
`
`allow applications that run on different operating systems and using different
`
`programming languages to send messages to each other and communicate
`
`using the Hypertext Transfer Protocol (HTTP). This exchange of messages
`
`enables a form of remote procedure calls where one application or system can
`
`invoke the procedures or functionality offered by another application or
`
`system thereby utilizing the software as a service. In some systems, Web
`
`services, and specifically REST Web services, are used to locate, manage, and
`
`control the secure playing of content.
`
`7.
`
`I was part of the Expert Group that developed the JSR-02952
`
`J2ME (Java 2 Platform, Micro Edition) Web Services Specification, the
`
`worldwide standard for mobile Web services. I am the co-author, with James
`
`Webber, of the book “Developing Enterprise Web Services: An Architect’s
`
`
`
`4
`
`DISH-Blue Spike-408
`Exhibit 1004, Page 0006
`
`

`

`
`
`Guide” (published by Prentice-Hall in 2004). This book has been adopted by
`
`over 100 universities and colleges around the world and has been translated
`
`or reprinted in numerous countries around the world. I also have served as a
`
`columnist on mobile and enterprise software systems for a number of IT
`
`magazines, including Java Boutique and Dataquest.
`
`8.
`
`In 2001, I joined Bluestone Software’s Mobile Middleware Labs
`
`as a Senior Engineer developing applications and systems infrastructure for
`
`enterprise Java/J2EE, Web services, and enterprise mobile solutions. After
`
`the completion of Hewlett-Packard’s (“HP”) acquisition of Bluestone, I
`
`became a Senior Member of the Technical Staff at HP’s Middleware Division.
`
`I was responsible for architecting and developing the company’s next-
`
`generation Web services platform for enterprise as well as mobile
`
`environments, known as the Web Services Mediator.
`
`9.
`
`From 1997–1999, I was the Entrepreneur-in-Residence at
`
`FidelityCAPITAL, the venture capital arm of Fidelity Investments. In 1999, I
`
`founded and served as President and Chief Technology Officer (CTO) of
`
`Satora Networks, which developed tools and technologies for building
`
`appliances and services for the Internet using wireless and other technologies
`
`to extend it beyond the desktop.
`
`
`
`5
`
`DISH-Blue Spike-408
`Exhibit 1004, Page 0007
`
`

`

`
`
`10. Experantis is being compensated for my time working on this
`
`matter at my standard hourly rate plus expenses. Neither Experantis nor I
`
`have any personal or financial stake or interest in the outcome of the present
`
`proceeding, and the compensation is not dependent on the outcome of this IPR
`
`and in no way affects the substance of my statements in this Declaration.
`
`II. Materials Considered
`
`11.
`
`I have considered information from various sources in forming
`
`my opinions. Besides drawing from over two decades of research and
`
`development work and experience, including in the areas of content
`
`distribution and security, I also have reviewed the ’408 Patent, the prosecution
`
`file history of the ’408 Patent, DISH’s Petition for Inter Partes Review of
`
`the ’408 Patent (the “Petition”) to which this Declaration is being submitted
`
`as Exhibit No. 1004, and the other documents and references as cited herein,
`
`including those identified in the following table:
`
`Exhibit No.
`
`Description of Document
`
`1001
`
`U.S. Patent No. 9,934,408 by Scott A. Moskowitz and Mike W. Berry,
`entitled “Secure personal content server”
`
`1002
`
`[RESERVED]
`
`1003
`
`[RESERVED]
`
`1004
`
`Declaration of Dr. Sandeep Chatterjee
`
`1005
`
`[RESERVED]
`
`
`
`6
`
`DISH-Blue Spike-408
`Exhibit 1004, Page 0008
`
`

`

`
`
`Exhibit No.
`
`Description of Document
`
`1006
`
`[RESERVED]
`
`1007
`
`Curriculum Vitae of Dr. Sandeep Chatterjee
`
`1008
`
`File History for U.S. Patent Application No. 15/607,820
`
`1009
`
`[RESERVED]
`
`1010
`
`File History for U.S. Patent Application No. 10/049,101
`
`1011
`
`[RESERVED]
`
`1012
`
`[RESERVED]
`
`1013
`
`[RESERVED]
`
`1014
`
`1015
`
`1016
`
`U.S. Patent No. 6,668,246 by Minerva Ming-Yee Yeung et al., entitled
`“Multimedia data delivery and playback system with multi-level
`content and privacy protection” (“Yeung”)
`
`U.S. Patent No. 6,345,100 by Earl Levine, entitled “Robust watermark
`method and apparatus for digital signals” (“Levine”)
`
`U.S. Patent No. 6,311,214 by Geoffrey B. Rhoads, entitled “Linking of
`computers based on optical sensing of digital data” (“Rhoads”)
`
`1017
`
`[RESERVED]
`
`1018
`
`1019
`
`First Amended Complaint, Blue Spike LLC et al. v. DISH Network
`Corporation et al., No. 1:19-CV-00160-LPS-CJB
`(D. Del.)
`(“District Court Litigation”)
`
`First Amended Complaint, Blue Spike LLC v. DISH Network
`Corporation et al., Nos. 6:18-CV-00333-RWS-KNM (E.D. Tex.),
`1:18-CV-01512-LPS-CJB (D. Del.) (the “Prior Litigation”)
`
`1020
`
`Affidavit of Service of Complaint on DISH Network Corporation
`
`1021
`
`Affidavit of Service of Complaint on DISH Network L.L.C.
`
`1022
`
`Affidavit of Service of Complaint on Dish Network Service L.L.C.
`
`
`
`7
`
`DISH-Blue Spike-408
`Exhibit 1004, Page 0009
`
`

`

`
`
`Exhibit No.
`
`1023
`
`Description of Document
`
`Order Granting Joint Motion to Transfer to the District of Delaware and
`Stay All Deadlines, 6:18-CV-00333-RWS-KNM, ECF No. 19, entered
`in Prior District Court Litigation
`
`1024
`
`Notice of Voluntary Dismissal Without Prejudice, served in Prior
`District Court Litigation
`
`1025
`
`[RESERVED]
`
`1026
`
`[RESERVED]
`
`1027
`
`1028
`
`U.S. Patent No. 5,841,991 by William C. Russell, entitled “In an
`interactive network board, a method and apparatus for storing a media
`access control address in a remotely alterable memory” (“Russell”)
`
`U.S. Patent No. 6,128,148 by Hans-Joachim Platte et al., entitled
`“Memory Device Having Multiple Memory Regions for a Recording
`device” (“Platte”)
`
`1029
`
`[RESERVED]
`
`1030
`
`[RESERVED]
`
`12.
`
`I have reviewed the Petition in detail and agree with both its
`
`analysis and conclusions.
`
`III. Legal Understanding
`
`13. My opinions are also informed by my understanding of the
`
`relevant law. I understand that the patentability analysis is conducted on a
`
`claim-by-claim basis and that there are several possible reasons that a patent
`
`claim may be found to be unpatentable.
`
`
`
`8
`
`DISH-Blue Spike-408
`Exhibit 1004, Page 0010
`
`

`

`
`
`14.
`
`I understand that earlier publications and patents may act to
`
`render a patent unpatentable for one of two reasons: (1) anticipation and
`
`(2) obviousness.
`
`A. Anticipation
`
`15. First, I understand that a single prior art reference, article, patent,
`
`or publication “anticipates” a claim if each and every element of the claim is
`
`disclosed in that prior art. I further understand that, where a claim element is
`
`not explicitly disclosed in a prior art reference, the reference may nonetheless
`
`anticipate a claim if the missing claim element is necessarily present in the
`
`apparatus or a natural result of the method disclosed, i.e., the missing element
`
`is “inherent.”
`
`B. Obviousness
`
`16. Second, I understand that the prior art may render a patent claim
`
`"obvious." I understand that two or more prior art references, articles, patents,
`
`or publications that each disclose fewer than all elements of a patent claim
`
`may nevertheless be combined to render a patent claim obvious if the
`
`combination of the prior art collectively discloses all elements of the claim
`
`and one of ordinary skill in the art at the time would have been motivated to
`
`combine the prior art. I understand that this motivation to combine need not
`
`be explicit in any of the prior art but may be inferred from the knowledge of
`
`
`
`9
`
`DISH-Blue Spike-408
`Exhibit 1004, Page 0011
`
`

`

`
`
`one of ordinary skill in the art at the time the patent was filed. I also
`
`understand that one of ordinary skill in the art is not an automaton, but is a
`
`person having ordinary creativity. I further understand that one or more prior
`
`art references, articles, patents, or publications that disclose fewer than all of
`
`the elements of a patent claim may render a patent claim obvious if including
`
`the missing element would have been obvious to one of skill in the art (e.g.,
`
`the missing element represents only an insubstantial difference over the prior
`
`art or a reconfiguration of a known system).
`
`17. Under the doctrine of obviousness, a claim may be invalid if the
`
`differences between the invention and the prior art are such that the subject
`
`matter as a whole would have been obvious at the time the invention was made
`
`to a person having ordinary skill in the art to which the subject matter pertains.
`
`18.
`
`I understand that obviousness is based on the scope and content
`
`of the prior art, the differences between the prior art and the claim, the level
`
`of ordinary skill in the art, and secondary indicia of obviousness and
`
`non-obviousness to the extent they exist.
`
`19.
`
`I understand that secondary indicia of both obviousness and
`
`non-obviousness should be considered when evaluating whether a claimed
`
`invention would have been obvious to one of ordinary skill at the time of
`
`
`
`10
`
`DISH-Blue Spike-408
`Exhibit 1004, Page 0012
`
`

`

`
`
`invention. These secondary indicia of non-obviousness may include, for
`
`example:
`
`• A long felt but unmet need in the prior art that was satisfied by the
`
`claimed invention;
`
`• Commercial success of processes claimed by the patent;
`
`• Unexpected results achieved by the invention;
`
`• Praise of the invention by others skilled in the art;
`
`• The taking of licenses under the patent by others; and
`
`• Deliberate copying of the invention.
`
`20.
`
`I understand that there must be a relationship between any such
`
`secondary indicia and the claimed invention. I further understand that if the
`
`claimed invention produced expected results that this is also a secondary
`
`consideration supporting an obviousness determination.
`
`21.
`
`It
`
`is also my understanding
`
`that
`
`there are additional
`
`considerations that may be used as further guidance as to when the above
`
`factors will result in a finding that a claim is obvious, including the following:
`
`• The claimed invention is simply a combination of prior art elements
`
`according to known methods to yield predictable results;
`
`• The claimed invention is a simple substitution of one known element
`
`for another to obtain predictable results;
`
`
`
`11
`
`DISH-Blue Spike-408
`Exhibit 1004, Page 0013
`
`

`

`
`
`• The claimed invention uses known techniques to improve similar
`
`devices or methods in the same way;
`
`• The claimed invention applies a known technique to a known device or
`
`method that is ready for improvement to yield predictable results;
`
`• The claimed invention would have been "obvious to try" choosing from
`
`a finite number of identified, predictable solutions, with a reasonable
`
`expectation of success;
`
`• There is known work in one field of endeavor that may prompt
`
`variations of it for use in either the same field or a different one based
`
`on design incentives or other market forces if the variations would have
`
`been predictable to one of ordinary skill in the art;
`
`• There existed at the time of invention a known problem for which there
`
`was an obvious solution encompassed by the patent's claims; and
`
`• There is some teaching, suggestion, or motivation in the prior art that
`
`would have led one of ordinary skill to modify the prior art reference
`
`or to combine prior art reference teachings to arrive at the claimed
`
`invention.
`
`22. Finally, I understand that a claim may be deemed invalid for
`
`obviousness in light of a single prior art reference, without the need to
`
`combine references, if the elements of the claim that are not found in the
`
`
`
`12
`
`DISH-Blue Spike-408
`Exhibit 1004, Page 0014
`
`

`

`
`
`reference can be supplied by the knowledge or common sense of one of
`
`ordinary skill in the relevant art.
`
`IV. Background on the Relevant Technology
`
`23. The ’408 Patent’s “Field of the Invention” discloses (emphasis
`
`added):
`
`The present invention relates to the secure distribution of
`digitized value-added information, or media content, while
`preserving the ability of publishers to make available unsecured
`versions of the same value-added information, or media content,
`without adverse effect to the systems security.
`
`Authentication, verification and authorization are all handled
`with a combination of cryptographic and steganographic
`protocols to achieve efficient, trusted, secure exchange of digital
`information.3
`
`24. The ’408 Patent’s “Summary of the Invention” discloses
`
`additional detail (emphasis added):
`
`A method for creating a secure environment for digital content
`for a consumer is also disclosed. As part of the method, a LCS
`requests and receives a digital data set that may be encrypted
`or scrambled. The digital data set may be embedded with at
`least one robust open watermark, which permits the content to
`be authenticated. The digital data set is preferably be embedded
`with additional watermarks which are generated using
`information about the LCS requesting the copy and/or the SECD
`which provides the copy. Once received by the LCS, the LCS
`
`
`
`3 ’408 Patent, Ex[1001], 1:36-41.
`
`
`
`13
`
`DISH-Blue Spike-408
`Exhibit 1004, Page 0015
`
`

`

`
`
`exercises control over the content and only releases the data to
`authorized users.4
`
`25. The ’408 Patent discusses a variety of known and related
`
`information security techniques applied to digital content, including: public
`
`key encryption, scrambling, hashing, and watermarking. The ’408 Patent
`
`refers to encryption as “data scrambling using keys.”5 It refers to scrambling
`
`as “manipulations of the value-added or information rich data at the inherent
`
`granularity of the file format”6 and refers to hash functions as “a function
`
`which converts an input into an output.”7 Public key encryption, scrambling,
`
`and hashing are all cryptographic techniques. And as previously discussed,
`
`the ’408 Patent explains, “The digital data set may be embedded with at least
`
`one robust open watermark, which permits the content to be authenticated.”8
`
`26. Cryptography and watermarking techniques were established
`
`long before the advent of electronics and digital content. People have been
`
`communicating via encrypted and hidden messages for centuries as protection
`
`
`
`4 ’408 Patent, Ex[1001], 3:16-27.
`
`5 ’408 Patent, Ex[1001], 10:24-25.
`
`6 ’408 Patent, Ex[1001], 10:29-31.
`
`7 ’408 Patent, Ex[1001], 10:4-6.
`
`8 ’408 Patent, Ex[1001], 3:19-21.
`
`
`
`14
`
`DISH-Blue Spike-408
`Exhibit 1004, Page 0016
`
`

`

`
`
`against intercepting parties9 and people have been watermarking paper goods
`
`as a sign of authenticity, quality, and as an anti-counterfeiting measure for
`
`over 700 years.10 In addition, the application of these security concepts to
`
`digital information was widely known prior to the filing of the patent
`
`application that resulted in the ’408 Patent. Digital cryptography rapidly
`
`developed after Dr. Martin Hellman and Whitfield Diffie introduced
`
`public-key cryptography to the public in the 1970’s in a seminal paper, “New
`
`Directions in Cryptography.”11 Public-key cryptography relies on a pair of
`
`keys, one public and the other private. The public-key is used to encrypt a
`
`message and may be known by everyone. The private key for decrypting the
`
`content is kept secret and notably, the private key cannot be reverse
`
`engineered from the public key. Thus, only those with the private key can
`
`decrypt and access the unencrypted message. The use of asymmetric keys to
`
`
`
`9 See, e.g., Auguste Kerckhoffs, Cryptographie Militaire, J. SCI. MILITAIRES,
`Jan. 1883, at 5–38; P. GASPARIS SCHOTTI, SCHOLA STEGANOGRAPHICA (2d ed.
`1680).
`
`10 Martin Kutter & Frank Hartung, Introduction to Watermarking Techniques,
`in INFORMATION HIDING TECHNIQUES FOR STEGANOGRAPHY AND DIGITAL
`WATERMARKING 97, 98 (Stefan Katzenbeisser & Fabien A.P. Petitcolas eds.,
`2000).
`
`11 Whitfield Diffie & Martin E. Hellman, New Directions in Cryptography,
`22 IEEE TRANSACTIONS INFO. THEORY 644 (1976).
`
`
`
`15
`
`DISH-Blue Spike-408
`Exhibit 1004, Page 0017
`
`

`

`
`
`encrypt and decrypt messages continues to be one of the most successful
`
`developments in secure electronic communications.
`
`27.
`
`In 1954, Emil Hembrooke of the Muzac Corporation filed a
`
`patent entitled “Identification of sound and like signals” which describes a
`
`method for imperceptibly embedding an identification code into music for the
`
`purpose of proving ownership.12 Since that time, a number of watermarking
`
`technologies have been developed and deployed for a variety of applications.
`
`Interest in embedded signaling continued throughout the next 35 years. By
`
`the 1990’s there was significant interest in electronic watermarking
`
`(particularly digital watermarking).13
`
`28.
`
`“This increase in interest was motivated by copyright concerns
`
`that became acute with advances in computer technology and the development
`
`of the Web. These technologies enable the perfect copying and distribution
`
`of copyrighted material to almost anywhere in the world at almost no cost. To
`
`address these concerns, a number of industry technology groups were
`
`established, perhaps the best known being the Copy Protection Technical
`
`
`
`12 Ingemar J. Cox & Matt L. Miller, The First 50 Years of Electronic
`Watermarking, 2 EURASIP J. APPLIED SIGNAL PROCESSING 126, 126 (2002).
`
`13 See id.; see also K. Tanaka et al., Embedding Secret Information into a
`Dithered Multilevel Image, PROC. IEEE MIL. COMM CONF., Sept. 1990,
`at 216–220; A. Tirkel et al., Electronic Water Mark, PROC. DICTA, Dec.
`1993, at 666–672.
`
`
`
`16
`
`DISH-Blue Spike-408
`Exhibit 1004, Page 0018
`
`

`

`
`
`Working Group (CPTWG) and the Strategic Digital Music Initiative (SDMI).
`
`The former is concerned with digital video content stored on DVD discs and
`
`the latter with digital music. These industry groups recognized that
`
`cryptography can only protect the distribution of content and that once a
`
`customer decrypts it, all protection is lost. Watermarking can complement
`
`cryptography, providing protection after decryption, even after the content has
`
`entered the analog world.”14
`
`29.
`
`“The applications of watermarking have been well known and
`
`can be broadly classified as copyright control (owner identification, proof of
`
`ownership, transaction tracking, and copy control) broadcast monitoring and
`
`device control. Watermarks have been deployed for some of these
`
`applications for several decades.”15
`
`30. For example, “[i]n transaction tracking, or fingerprinting, a
`
`unique watermark is embedded into each copy of a Work. Typically, the
`
`watermark identifies the legal recipient of the copy, and can be used to trace
`
`
`
`14 Ingemar J. Cox & Matt L. Miller, The First 50 Years of Electronic
`Watermarking, 2 EURASIP J. APPLIED SIGNAL PROCESSING 126, 126 (2002);
`see also Frank Hartung et al., Multimedia Watermarking Techniques, 87
`PROC. IEEE 1079, 1080 (July 1999).
`
`15 Ingemar J. Cox & Matt L. Miller, The First 50 Years of Electronic
`Watermarking, 2 EURASIP J. APPLIED SIGNAL PROCESSING 126, 127 (2002).
`
`
`
`17
`
`DISH-Blue Spike-408
`Exhibit 1004, Page 0019
`
`

`

`
`
`the source of illegally redistributed content.” 16 An example of an
`
`implementation of transaction tracking was deployed by the DiVX
`
`Corporation in the late 1990’s. “Each DiVX-enabled DVD player embedded
`
`a unique watermark into video that it played. If the video was subsequently
`
`pirated and redistributed, the DiVX Corporation could use the watermark to
`
`identify the exact player used, and, thereby identify the source of the pirated
`
`Work.”17
`
`31. As another example, by at least May 8, 1998, the Digimarc
`
`Corporation had “emerged as the digital industry's de-facto copyright
`
`communication standard worldwide for individuals and corporations alike.”18
`
`Digimarc embeds a digital watermark that is invisible to the naked eye. It
`
`hides in the naturally occurring variations throughout an image. Using
`
`Digimarc’s tools, users could embed a digital watermark into their images and
`
`create “a copyright communication device.” Anyone who views the
`
`watermarked image containing the unique identifier will know who the
`
`
`
`16 See id. at 128.
`
`17 See id. at 128 n.3.
`
`18 See, e.g., DIGIMARC, https://web.archive.org/web/19980508125136/http://
`digimarc.com/.
`
`
`
`18
`
`DISH-Blue Spike-408
`Exhibit 1004, Page 0020
`
`

`

`
`
`copyright owner is and how to contact him or her.19 Digimarc explained that
`
`“[o]ver a million people can already ‘read’ a Digimarc® watermark since our
`
`‘reader’ is available for free on our website and our embedding and reading
`
`software is bundled in approximately 90% of all image editing software.”20
`
`Digimarc further provided technology to identify people who use images
`
`legally or illegally. Digimarc’s MarcSpider product crawled the Web looking
`
`for watermarked images and reported its findings to the copyright owner. This
`
`report gave the copyright owner a thumbnail picture of the found images,
`
`other image file data, and a hyperlink to the locations.21 On April 6, 1998,
`
`Digimarc had announced it had been issued a key patent on visual image
`
`watermarking. U.S. Patent No. 5,721,788 entitled, “Method and System for
`
`Digital Image Signatures,” was filed in 1992 and issued on February 24,
`
`1998.22
`
`
`
`19 See, e.g., DIGIMARC, https://web.archive.org/web/19980508125227/http://
`digimarc.com/about_wm.html.
`
`20 Id.
`
`21 See DIGIMARC, https://web.archive.org/web/19980508125227/http://digim
`arc.com/about_wm.html.
`
`22 See DIGIMARC, https://web.archive.org/web/19980508125444/http://digi
`marc.com/pr026.html; see also U.S. Patent No. 5,721,788 (filed July 31, 1992)
`(issued Feb. 24, 1998).
`
`
`
`19
`
`DISH-Blue Spike-408
`Exhibit 1004, Page 0021
`
`

`

`
`
`32. Cryptography and watermarking are both means of secure
`
`content distribution, copy protection, and content management. However,
`
`cryptography is the practice of securing a message through encryption while
`
`watermarking involves the practice of embedding information into a message.
`
`Essentially, cryptography secures a message by hiding the contents of a
`
`message, while watermarking secures a message by embedding information
`
`(either visible or invisible to the human eye) into the message.
`
`33. By 1999, I had significant experience with encryption and
`
`watermarking. For example, as part of my doctoral research, I developed
`
`hardware and software systems for intelligent environments, including for the
`
`encrypted distribution of digital information between various home and office
`
`devices, such as televisions, video cassette recorders (VCRs), digital picture
`
`frames, refrigerators and children’s toys. Additionally, I used watermarking
`
`tools, such as that offered by Digimarc, to add digital watermarks to digital
`
`images prior to encrypting and distributing those images to specialized digital
`
`picture frames.
`
`34. The development of electronic cryptography and watermarking
`
`techniques naturally accompanied the rise of computers and the internet.
`
`Generally, users held concerns over information privacy and security.
`
`Publishing businesses in particular were worried over the ease with which
`
`
`
`20
`
`DISH-Blue Spike-408
`Exhibit 1004, Page 0022
`
`

`

`
`
`people could now make and redistribute perfect copies of their protected
`
`information without authorization.
`
`35. During the 1990s, technology for the electronic distribution of
`
`digital content over the internet became widespread, enabling anyone with a
`
`computer to make unauthorized copies of copyright protected information and
`
`share it with others for free. Starting in 1996, numerous electronics companies
`
`had developed systems capable of making perfect copies of music and other
`
`media for storage on computers and portable music players.23
`
`36. The ’408 Patent background describes the rise of the digitization
`
`of media and its unprotected distribution over the web: “Internet technology
`
`enables anyone to distribute [copies of musical recordings] to their friends, or
`
`the entire world.”24 The ’408 Patent continues, “Hence, a need exists for a
`
`
`
`23 See, e.g., Nick Wingfield, Liquid Audio IPO a Big Success; Stock Price
`More Than Doubles, WSJ
`(July 12, 1999), https://www.wsj.com/
`articles/SB931524332574467915; VP Dream Job: Liquid Audio, WIRED (Jan.
`20,
`1997),
`https://www.wired.com/1997/01/vp-dream-job-liquid-audio/
`(“With the Liquid Audio products, users will be able to download music, listen,
`purchase, and eventually burn their own CDs at their desktops. The company
`also plans to enable musicians anywhere to record, copyright, protect, and
`distribute over the Net.”).
`
`24 ’408 Patent, Ex[1001], 2:27-29.
`
`21
`
`
`
`DISH-Blue Spike-408
`Exhibit 1004, Page 0023
`
`

`

`
`
`new and improved system for protecting digital content against unauthorized
`
`copying and distribution.”25
`
`37. However, by the time of the earliest related filing cited in
`
`the ’408 Patent, numerous electronic companies had also developed systems
`
`that protected against unauthorized copying and distribution in order to
`
`alleviate the media industry’s concern over unauthorized re-distribut

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket