throbber
Appl'n No. 10/049,101
`Request for Continued Examination ("RCE") &
`Reply to Advisory Action of July 31, 2007 dated August 9, 2007
`
`10. (original) The system of claim 8, further comprising a SECD, said SECD capable
`of receiving a request to transfer at least one data set and capable of
`transmitting the at least one data set in a secured transmission.
`
`11. (original) The system of claim 10, wherein the SU includes means to send a
`message to the LCS indicating that the SU is requesting a copy of a content
`data set that is not stored on the LCS, but which the LCS can obtain from an
`SECD, said message including information about the identity of the SU;
`wherein the SECD comprises:
`means to retrieve a copy of the requested content data set;
`means to embed at least one robust open watermark into the
`copy of the requested content data set, said watermark indicating that the copy
`is authenticated;
`means to embed a second watermark into the copy of the
`requested content data set, said second watermark being created based upon
`information transmitted by the LCS; and
`means to deliver the watermarked content data set to the LCS for
`
`its use; and
`
`wherein the LCS comprises:
`means to analyze the message from the SU to confirm that the
`SU is authorized to use the LCS;
`means to receive a copy of the requested content data set as
`transmitted by the SECD;
`means to extract at least one watermark to confirm that the
`content data is authorized for use by the LCS;
`means to embed at least one robust open watermark into the
`copy of the requested content data set, said watermark indicating that the copy
`is authenticated;
`
`6
`
`DISH - Blue Spike-408
`Exhibit 1010, Page 1203
`
`

`

`Appl'n No. 10/049,101
`Request for Continued Examination ("RCE") &
`Reply to Advisory Action of July 31, 2007 dated August 9, 2007
`
`means to embed a second watermark into the copy of the
`requested content data set, said second watermark being created based upon
`information transmitted by the SU and information about the LCS; and
`means to deliver the watermarked content data set to the SU for
`
`its use.
`
`12. (currently amended) The system of claim 8, wherein the SU has means to
`sending a message to the LCS indicating that the SU is requesting to store a
`copy of a content data set on a storage unit of the LCS, said message including
`information about the identity of the SU, and wherein the LCS comprises:
`means to analyze the message from the SU to confirm that the SU is
`authorized to use the LCS;
`means to receive a copy of the content data set;
`means to determine if a robust open watermark is embedded in the
`content data set, and to extract the robust open watermark if is it is determined
`that one exists;
`means to analyze any extracted robust open watermarks to determine if
`the content data set can be authenticated;
`means to permit the storage of the content data set on a storage unit of
`the LCS if i) the LCS authenticates the content data set, or ii) the LCS
`determines that no robust open watermark is embedded in the content signal.
`
`13. (previously presented) The system of claim 4, further comprising at least one SU,
`each such SU being capable of communicating with the LCS, and being
`capable of using only data which has been authorized for use by the SU or
`which has been determined to be legacy content such that the data contains no
`additional information to permit authentication.
`
`14. (original) The system of claim 5, wherein the LCS further comprises:
`
`7
`
`DISH - Blue Spike-408
`Exhibit 1010, Page 1204
`
`

`

`Appl'n No. 10/049,101
`Request for Continued Examination ("RCE") &
`Reply to Advisory Action of July 31, 2007 dated August 9, 2007
`
`means to embed at least one robust open watermark into a copy of
`content data, said watermark indicating that the copy is authenticated;
`means to embed a second watermark into the copy of content data, said
`second watermark being created based upon information comprising
`information uniquely associated with the LCS; and
`means to embed a third watermark into the copy of content data, said
`third watermark being a fragile watermark created based upon information
`which can enhance the use of the content data on one or more SUs.
`
`15. (original) The system of claim 5, wherein the LCS further comprises:
`means for encrypting or scrambling content data, such that content data
`may be encrypted or scrambled before it is stored in the rewritable storage
`medium.
`
`16. (previously presented) A system for creating a secure environment for digital
`content, comprising:
`
`a Secure Electronic Content Distributor (SECD);
`a Local Content Server (LCS);
`a communications network interconnecting the SECD to the LCS; and
`
`a Satellite Unit (SU) capable of interfacing with the LCS;
`said SECD comprising: a storage device for storing a plurality of data
`sets; an input for receiving a request from the LCS to purchase a selection of at
`least one of said plurality of data sets; a transaction processor for validating the
`request to purchase and for processing payment for the request; a security
`module for encrypting or otherwise securing the selected at least one data set;
`and an output for transmitting the selected at least one data set that has been
`encrypted or otherwise secured for transmission over the communications
`network to the LCS;
`
`8
`
`DISH - Blue Spike-408
`Exhibit 1010, Page 1205
`
`

`

`Appl'n No. 10/049,101
`Request for Continued Examination ("RCE") &
`Reply to Advisory Action of July 31, 2007 dated August 9, 2007
`
`said LCS comprising: a domain processor; a first interface for connecting
`to a communications network; a second interface for communicating with the
`SU; a memory device for storing a plurality of data sets; and a programmable
`address module which can be programmed with an identification code uniquely
`associated with the LCS; and
`said SU being a portable module comprising: a memory for accepting
`secure digital content from a LCS, said digital content comprising data which
`can be authorized for use or which has been determined to be legacy content
`such that the data contains no additional information to permit authentication;
`an interface for communicating with the LCS; and a programmable address
`module which can be programmed with an identification code uniquely
`associated with the SU.
`
`17. (previously presented) A method for creating a secure environment for digital
`content for a consumer, comprising the following steps:
`sending a message indicating that a user is requesting a copy of a
`content data set;
`retrieving a copy of the requested content data set;
`embedding at least one robust open watermark into the copy of the
`requested content data set, said watermark indicating that the copy is
`authenticated;
`embedding a second watermark into the copy of the requested content
`data set, said second watermark being created based upon information
`transmitted by the requesting user;
`transmitting the watermarked content data set to the requesting
`consumer via an electronic network;
`receiving the transmitted watermarked content data set into a Local
`Content Server (LCS) of the user;
`extracting at least one watermark from the transmitted watermarked
`content data set;
`
`9
`
`DISH - Blue Spike-408
`Exhibit 1010, Page 1206
`
`

`

`Appl'n No. 10/049,101
`Request for Continued Examination ("RCE") &
`Reply to Advisory Action of July 31, 2007 dated August 9, 2007
`
`permitting use of the content data set if the LCS determines that use is
`authorized; and
`
`permitting use of the content data set at a predetermined quality level,
`said predetermined quality level having been set for legacy content if the LCS
`determines that use is not authorized.
`
`18. (previously presented) The method of claim 17, wherein the step of permitting use
`of the content data set if the LCS determines that use is authorized comprises:
`checking to see if a watermark extracted from the content data set
`includes information which matches unique information which is associated with
`the user; and
`
`permitting the storage of the content data set in a storage unit for the
`
`LCS.
`
`19. (previously presented) The method of claim 17, further comprising:
`connecting a Satellite Unit (SU) to an LCS,
`and wherein the step of permitting use of the content data set if the LCS
`determines that use is authorized comprises:
`checking to see if a watermark extracted from the content data set
`includes information which matches unique information which is associated with
`the user; and
`embedding a watermark into the content data set using information that
`is associated with the user and information that is associated with an SU;
`delivering the content data set to the SU for its use.
`
`20. (previously presented) A method for creating a secure environment for digital
`content for a consumer, comprising the following steps:
`connecting a Satellite Unit to an local content server (LCS),
`
`10
`
`DISH - Blue Spike-408
`Exhibit 1010, Page 1207
`
`

`

`Appl'n No. 10/049,101
`Request for Continued Examination ("RCE") &
`Reply to Advisory Action of July 31, 2007 dated August 9, 2007
`
`sending a message indicating that the SU is requesting a copy of a
`content data set that is stored on the LCS, said message including information
`about the identity of the SU;
`analyzing the message to confirm that the SU is authorized to use the
`LCS; and
`retrieving a copy of the requested content data set;
`assessing whether a secured connection exists between the LCS and
`the SU;
`if a secured connection exists, embedding a watermark into the copy of
`the requested content data set, said watermark being created based upon
`information transmitted by the SU and information about the LCS; and
`delivering the content data set to the SU for its use, said content data set
`delivered at a predetermined quality level, said predetermined quality level
`having been set for legacy content if the LCS determines that use is not
`authorized.
`
`21. (previously presented) The method of claim 20, further comprising:
`embedding an open watermark into the content data to permit enhanced
`usage of the content data by the user.
`
`22. (previously presented) The method of claim 21, further comprising:
`embedding at least one additional watermark into the content data, said
`at least one additional watermark being based on information about the user,
`the LCS and an origin of the content data, said watermark serving as a forensic
`watermark to permit forensic analysis to provide information on the history of
`the content data's use.
`
`23. (original) The method of claim 20, wherein the content data can be stored at a
`level of quality which is selected by a user.
`
`11
`
`DISH - Blue Spike-408
`Exhibit 1010, Page 1208
`
`

`

`Appl'n No. 10/049,101
`Request for Continued Examination ("RCE") &
`Reply to Advisory Action of July 31, 2007 dated August 9, 2007
`
`24. (previously presented) A method for creating a secure environment for digital
`content for a consumer, comprising the following steps:
`connecting a Satellite Unit (SU) to an local content server (LCS),
`sending a message indicating that the SU is requesting a copy of a
`content data set that is stored on the LCS, said message including information
`about the identity of the SU;
`analyzing the message to confirm that the SU is authorized to use the
`LCS; and
`
`retrieving a copy of the requested content data set;
`assessing whether a secured connection exists between the LCS and
`the SU;
`if a secured connection exists, embedding a watermark into the copy of
`the requested content data set, said watermark being created based upon
`information transmitted by the SU and information about the LCS; and
`delivering the watermarked content data set to the SU for its use, said
`watermarked content data set delivered at a predetermined quality level, said
`predetermined quality level having been set for legacy content if the LCS
`determines that use is not authorized.
`
`25. (original) The method of claim 24, further comprising:
`embedding at least one robust open watermark into the copy of the
`requested content data set before the requested content data is delivered to the
`SU, said watermark indicating that the copy is authenticated.
`
`26. (original) The method of claim 25, wherein the robust watermark is embedded
`using any one of a plurality of embedding algorithms.
`
`27. (original) The method of claim 24, further comprising:
`embedding a watermark which includes a hash value from a one-way
`hash function generated using the content data.
`
`12
`
`DISH - Blue Spike-408
`Exhibit 1010, Page 1209
`
`

`

`Appl'n No. 10/049,101
`Request for Continued Examination ("RCE") &
`Reply to Advisory Action of July 31, 2007 dated August 9, 2007
`
`28. (original) The method of claim 25, wherein the robust watermark can be
`periodically replaced with a new robust watermark generated using a new
`algorithm with payload that is no greater than that utilized by the old robust
`watermark.
`
`29. (original) The method of claim 24, further comprising the step of:
`embedding additional robust open watermarks into the copy of the
`requested content data set before the requested content data is delivered to the
`SU, using a new algorithm; and
`re-saving the newly watermarked copy to the LCS.
`
`30. (original) The method of claim 24, further comprising the step of:
`saving a copy of the requested content data with the robust watermark to
`the rewritable media of the LCS.
`
`31. (original) A method for creating a secure environment for digital content for a
`consumer, comprising the following steps:
`connecting a Satellite Unit (SU) to an local content server (LCS),
`sending a message indicating that the SU is requesting to store a copy
`of a content data on the LCS, said message including information about the
`identity of the SU;
`analyzing the message to confirm that the SU is authorized to use the
`LCS; and
`receiving a copy of the content data set;
`assessing whether the content data set is authenticated;
`if the content data is unauthenticated, denying access to the LCS
`storage unit; and
`
`13
`
`DISH - Blue Spike-408
`Exhibit 1010, Page 1210
`
`

`

`Appl'n No. 10/049,101
`Request for Continued Examination ("RCE") &
`Reply to Advisory Action of July 31, 2007 dated August 9, 2007
`
`if the content data is not capable of authentication, accepting the data at
`a predetermined quality level, said predetermined quality level having been set
`for legacy content.
`
`14
`
`DISH - Blue Spike-408
`Exhibit 1010, Page 1211
`
`

`

`Appl'n No. 10/049,101
`Request for Continued Examination ("RCE") &
`Reply to Advisory Action of July 31, 2007 dated August 9, 2007
`
`REMARKS/ARGUMENTS
`
`The Applicants thank Examiner Avery for the time and consideration in
`providing the Advisory Action Before the Filing of an Appeal Brief dated July 31, 2007
`(Paper No. 200070725). Applicants further appreciate the Examiner's suggestion to
`file a Request for Continued Examination ("RCE") on or about August 6, 2007. The
`Advisory Action is quoted here for reference [emphasis added]:
`
`"Continuation of 11. does NOT place the application in condition for
`allowance because: Though the Applicant provides further explanation
`with regards to the terminology found within the claim language (e.g.,
`'legacy content' and predetermined quality level'), said terminology can
`possess more than one broad interpretation. Although the claims are
`interpreted in light of the specification, limitations from the specification
`are not read in the claims. See in re Van Geuns, 988 F.2d 1181, 26
`USPQ2d 1057 (Fed. Cir. 1993). Additional
`language
`from
`the
`Specification inserted into the claim language and/or supplementary
`language would further elaborating upon said terminology would help
`further narrow the level of interpretation of said 'legacy content' and
`'predetermined quality level'."
`
`Clarification is earnestly sought for the contention that "said terminology can
`possess more than one broad interpretation". Applicants submit that under MPEP §
`2111.01, "...during examination the USPTO must give claims their broadest
`reasonable interpretation." In re Bass, 314 F.3d 575, 577 (Fed. Cir. 2002) (citing In re
`Yamamoto, 740 F.2d 1569, 1571 (Fed. Cir. 1984)) ("In examining a patent claim, the
`PTO must apply the broadest reasonable meaning to the claim language, taking into
`account any definitions presented in the specification."). Additionally, cited here for
`reference:
`
`See MPEP § 2111.01
`"While the claims of issued patents are
`interpreted in light of the specification, prosecution history, prior art and
`other claims, this is not the mode of claim interpretation to be applied
`during examination. During enamiroation, the caims must be
`interpreted as broady as their terms reasoruatdy aOOow. In re
`American Academy of Science Tech Center, **>367 F.3d 1359, 1369, 70
`USPQ2d 1827, 1834 (Fed. Cir. 2004)< (The USPTO uses a different
`standard for construing claims than that used by district courts; during
`enarnination the USPTO must give ciairros their broadest reasonabie
`interpretation.)."
`
`For at least the reason that the Advisory Action contends there is at least one broad
`interpretation, there can be no doubt there is support for the claim elements in the
`application as originally filed.
`
`15
`
`DISH - Blue Spike-408
`Exhibit 1010, Page 1212
`
`

`

`Appl'n No. 10/049,101
`Request for Continued Examination ("RCE") &
`Reply to Advisory Action of July 31, 2007 dated August 9, 2007
`
`Second, it is further submitted that Applicants are not "arguing limitations which
`are not claimed" (please see In re Van Geuns as presented at MPEP § 2145 VI &
`MPEP § 707.07(f) 91 7.37.08) as is apparently being asserted by the Office in
`referencing In re Van Geuns:
`
`See MPEP § 2145 VI "VP. ARGIJONIG LONOTATOOMS Wt-lOCH ARE
`MOT CLAMED Although the claims are interpreted in light of the
`specification, limitations from the specification are not read into the
`claims. In re Van Gems, 966 F.2d 1181, 26 USPQ2d 1057 (Fed. C.
`1993) (Claims to a superconducting magnet which generates a "uniform
`magnetic field" were not limited to the degree of magnetic field uniformity
`required for Nuclear Magnetic Resonance (NMR) imaging. Although the
`specification disclosed that the claimed magnet may be used in an NMR
`apparatus, the claims were not so limited.); Constant v. Advanced
`Micro-Devices, Inc., 848 F.2d 1560, 1571-72, 7 USPQ2d 1057, 1064-
`1065 (Fed. Cir.), cert. denied, 488 U.S. 892 (1988) (Various limitations
`on which appellant relied were not stated in the deigns; the
`specification did not provide evidence indicating these limitations
`must toe read into the claims to give meaning to the disputed
`terms.); Ex parte McCullough, 7 USPQ2d 1889, 1891 (Bd. Pat. App. &
`Inter. 1987) (Claimed electrode was rejected as obvious despite
`assertions that electrode functions differently than would be expected
`when used in nonaqueous battery since "although the demonstrated
`results may be germane to the patentability of a battery containing
`appellant's electrode, they are not germane to the patentability of the
`invention claimed on appeal.")"
`
`In fact, the pending application provides in haec vertu support for the claims,
`exemplary embodiments and definitions for the claim terminology. It is also the
`contention of the Applicants that one of ordinary skill in the art would readily
`understand the language of the claims as presented. Thus, it is respectfully requested
`that for at least these reasons the pending rejections be withdrawn.
`
`Third, as described in the MPEP and cited below, Applicants' choice of
`language is not a proper grounds for rejection. Applicants respectfully note that
`amendments to the claims were made as expressly suggested by the Office in at least
`one Interview (e.g., as best understood by the Applicants, suggestion of this nature
`conforms with MPEP 2173.02, cited below for reference). Applicants respectfully
`submit the clarification of the claim terminology should not result in prosecution history
`estoppel. However, it is unclear what standard the Office is applying "to narrow the
`level of interpretation", as directed by the Advisory Action. Applicants, thus,
`respectfully direct the Office to the following:
`
`See MPEP § 2173.01 "A fundamental principle contained in 35 U.S.C.
`112, second paragraph is that applicants are their own lexicographers.
`
`16
`
`DISH - Blue Spike-408
`Exhibit 1010, Page 1213
`
`

`

`Appl'n No. 10/049,101
`Request for Continued Examination ("RCE") &
`Reply to Advisory Action of July 31, 2007 dated August 9, 2007
`
`They can define in the cnaims what they regard as their invention
`essentianny in whatever terms they choose so gong as ">any
`specian meaning assngned to a term ns cnearny set forth in the
`specification. See MPEP § 2111.01.< Applicant may use functional
`language, alternative expressions, negative limitations, or any style of
`expression or format of claim which makes clear the boundaries of the
`subject matter for which protection is sought. As noted by the court in In
`re Swinehart, 439 F.2d 210, 160 USPQ 226 (CCPA 1971), a ciairro may
`not be rejected soneiy because of the type of language used to
`define the subject matter for which paterut protection is sought."
`
`See MPEP § 2173.02 "The examiner's focus during examination of
`claims for compliance with the requirement for definiteness of 35 U.S.C.
`112, second paragraph, is whether the claim meets the threshold
`requirements of clarity and precision, not whether more suitable
`language or modes of expression are available. When the examiner is
`satisfied that patentable subject matter is disclosed, and it is apparent to
`the examiner that the claims are directed to such patentable subject
`matter, he or she should allow claims which define the patentable
`subject matter with a reasonable degree of particularity and distinctness.
`Some latitude in the manner of expression and the aptness of terms
`should be permitted even though the claim language is not as precise as
`the examiner might desire. Enaminers are encouraged to suggest
`claim language to applicants to improve the clarity or precision of
`the language used, but should root reject ciaims or insist on their
`ow preferences if other modes off expression selected by
`applicants satisfy the statutory requirement."
`
`For the additional reasons outlined in the MPEP above, Applicants respectfully
`request the Office to reconsider the claims as currently presented and withdraw all
`outstanding rejections. Applicants respectfully seek clarification in the interests of
`expediting allowance of the pending claims.
`
`Last, as MPEP § 707.07(j) states: "When, during the examination of a pro se
`application it becomes apparent to the examiner that there is patentable subject
`matter disclosed in the application, the examiner should draft one or more claims for
`the applicant and indicate in his or her action that claims would be allowed if
`incorporated in the application by amendment." Applicants are proceeding pro se and
`request clarification on how the cited claims can be rewritten if the terms "legacy
`content" and "predetermined quality level" continue to be objectionable.
`
`17
`
`DISH - Blue Spike-408
`Exhibit 1010, Page 1214
`
`

`

`Appl'n No. 10/049,101
`Request for Continued Examination ("RCE") &
`Reply to Advisory Action of July 31, 2007 dated August 9, 2007
`
`DISH - Blue Spike-408
`Exhibit 1010, Page 1215
`
`

`

`Appl'n No. 10/049,101
`Request for Continued Examination ("RCE") &
`Reply to Advisory Action of July 31, 2007 dated August 9, 2007
`
`Pgior Asserted R*ctions under 35 U.S.C. i4 102
`
`§ 102 Repectbcns based on U.S. Patent 5,341,425 Q"Stuinger")
`
`Claims 1-31 stand rejected as allegedly anticipated by U.S. Patent No.
`5,341,429 issued to Stringer et al. (thereafter "Stringer"). See Page 2 of the final Office
`Action dated May 9, 2007.
`
`Claims 1-31
`In order for a reference to anticipate a claim, the reference must disclose each
`and every feature of the claimed invention, either expressly or inherently, such that a
`person of ordinary skill in the art could practice the invention without undue
`experimentation. See Atlas Powder Co. v. !recd Inc., 190 F.3d 1342, 1347, 51
`USPQ2d 1943, 1947 (Fed. Cir. 1999); In re Paulsen, 30 F.3d 1475, 1479, 31 USPQ2d
`1671, 1673 (Fed. Cir. 1994). Previously Presented Independent Claim 1 recites
`[emphasis added]: "A Docai content SOFVOT system (LCS) for creating a secure
`environment
`for digital content, comprising: a) a communications port
`in
`communication for connecting the system via a network to at least one Secure
`Electronic Content Distributor (SECD), said SECD capable of storing a plurality of data
`sets, capable of receiving a request to transfer at least one content data set, and
`capable of transmitting the at least one content data set in a secured transmission; b)
`a rewritable storage medium whereby content received from outside the LCS may be
`stored and retrieved; c) a domain processor that imposes rules and procedures for
`content being transferred between the LCS and devices outside the LCS; and d) a
`programmable address module which can be programmed with an identification code
`uniquely associated with the LCS; and said domain pvocessor permitting the LCS
`to receive digita0 content from outside the LCS provided the LCS first
`determines that the digita0 content being deilivered to the LCS is authoulzed for
`use by the LCS and if the digital content is root aasghoolzecl
`use by ttOne LCS,
`accepting
`the digital content at a predetermined quality level, said
`predetermined quality level having been set For legacy content." The Section 102
`rejection of Claim 1 is improper for at least the reason that Stringer fails to disclose or
`anticipate (1) "legacy content" or (2) "predetermined quality level".
`
`The final Office Action contends that Stringer discloses a conventional local
`content server ("LCS"), May 9, 2007 final Office Action at Page 2. This contention is
`respectfully traversed. First, Stringer allegedly teaches a thivd party that "[t]ransforms
`the original ephemeral material to its denatured version and wrapper and delivers both
`to user" (Col. 5 II. 58-60). Content received by users as taught by Stringer, is identical
`to that created by the author. Thus, there can be no anticipation that Stringer's alleged
`LCS could differentiate between users and authors, let alone legacy content and/or
`content prepared at some time after an LCS was in use. Specifically, Stringer teaches
`that a third party "...convert[s] purchased products to unlimited use and ownership"
`(see Stringer at Col. 9 II. 53-67; Col. 12 II. 4-12; and Col. 12 II. 40-48). Thus, the
`alleged authorization process of Stringer is apparently directed at a transaction without
`
`19
`
`DISH - Blue Spike-408
`Exhibit 1010, Page 1216
`
`

`

`Appl'n No. 10/049,101
`Request for Continued Examination ("RCE") &
`Reply to Advisory Action of July 31, 2007 dated August 9, 2007
`
`regards to the content's provenance. Stringer thus cannot anticipate an LCS as
`claimed.
`
`Applicants respectfully direct the Office to Stringer's eitpressly defined
`"parties" at Col. 5 II. 24-67: (1) "'Authors'. Authors, composers, producers, or creators
`of original material who have access to components needed to build original material'
`(2) "'Third Party'. Transforms original ephemeral material to its denatured version and
`wrapper and delivers both to user; does not need to be the author"; and, (3) "'User'.
`Neither a third party, nor an author, uses the trial, evaluation, and enabled versions of
`the ephemeral material; engages a transaction, either alone or in conjunction with a
`third party". Stringer's parties inherently undermine the asserted rejections of the
`claims, for at least the reason that a user can be an author and a third party. A
`practical example demonstrates why-- access to the World Wide Web via a
`conventional PC by a user who may have uploaded user-generated content further
`demonstrates anecdotal defects in the Stringer reference as asserted art. At the filing
`date of Stringer, it is not even clear a prima case for anticipation can be made for
`Internet browsers let alone an LCS for handling legacy content or digital watermarks.
`Applicants respectfully request clarification on how the Office interprets Stringer's
`express definitions.
`
`Second, Stringer fails to disclose any means to differentiate content already
`owned by users— even newly transacted content received by users under Stringer is
`of "unlimited use and ownership" (see Stringer at Col. 9 II. 53-67; Col. 12 II. 4-12; and
`Col. 12 II. 40-48). As disclosed in the originally filed specification, "it is the user's
`prerogative to decide how the system will treat non-authenticated content, as well as
`legacy content". Even, where Stringer allegedly provides identification— it is controlled
`by the third party and made without regards to the content. In fact, it is not possible to
`differentiate between parties, argued above, as no identifying information is made
`persistent under Stringer for the express reason that every transacted copy is of
`"unlimited use and ownership". No matter, identifying information is removed anyway.
`"To remove the watermark or other material and enable unlimited LA s e of the
`material, the denatured version of the material is subjected ... to ... any other
`technique that would serve to erase the watermark from the original material"
`(Col. 7 II. 51-57). Thus, the alleged parties of Stringer, whether they can even be
`identified as authors, third parties or users, can subsequently move content that is
`expressly disclosed as being identical to the original material -- in any manner they
`choose. This undermines the alleged utility of Stringer relating to an alleged ability to
`limit access to materials and any prima facie case for anticipation based on Stringer of
`the instant claims.
`
`Third, Applicants respectfully note that the "watermark[s]" of Stringer are not
`the "watermark[s]" of the instant invention[s], including the various types of
`watermarks described in the specification and claims, for at least the reason that the
`watermarks claimed herein are not removed or erased as expressly described by
`Stringer. Further, assuming for argument's sake, Stringer's alleged "digital watermark"
`
`20
`
`DISH - Blue Spike-408
`Exhibit 1010, Page 1217
`
`

`

`Appl'n No. 10/049,101
`Request for Continued Examination ("RCE") &
`Reply to Advisory Action of July 31, 2007 dated August 9, 2007
`
`is expressly "erased", the result would be an alleged conventional LCS that could not
`logically act on watermark information. Thus, Stringer does not teach, suggest or
`anticipate the digital watermarks of the claim[s]. If the Office continues to assert
`Stringer's "watermarks" as being the watermarks of the claims, Applicants respectfully
`request clarification on the interpretation being relied upon. Applicants respectfully
`point to 37 C.F.R. § 1.104 ("In rejecting claims for want of novelty or for obviousness,
`the examiner must cite the best references at his or her command. ... The pertinence
`of each reference, if not apparent, must be clearly explained and each rejected claim
`specified").
`
`Fourth, by teaching removal of identifying information, Stringer cannot
`anticipate the LCS of the claims which provides an environment for materials that are
`essentially identical save the version or status of the data (e.g., inter alia, initial, free,
`legacy, secure, compressed, unsecure, purchased, original, watermarked, signed,
`hashed, validated, etc.). It logically follows that Stringer fails to anticipate the claim
`element[s] "receive digital content from outside the LCS provided the LCS first
`determines that the digital content being delivered to the LCS is authorized for use by
`the LCS and if the digital content is not authorized for use by the LCS, accepting the
`digital content at a predetermined quality level". For these additional reasons,
`Applicants respectfully request the Section 102 rejections be withdrawn.
`
`Additional significant benefits over Stringer and the art are provided by
`example and reference to the originally filed specification and are intended to be
`exemplary not limiting in scope (please see for example Pages 11, 12, 15, 16, 23, 24,
`26 & 27 of the originally-filed specification):
`
`"These embodiments may include decisions about availability of a
`particular good or service through electronic means, such as the Internet,
`or means that can be modularized ... Consumers may view their
`anonymous marketplace transactions very differently becaus

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket