throbber
UNITED STATES PATENT AND TRADEMARK OFFICE
`
`BEFORE THE PATENT TRIAL AND APPEAL BOARD
`
`APPLE, INC.
`(“Apple”),
`Petitioner
`
`v.
`
`ERICSSON INC. AND TELEFONAKTIEBOLAGET LM ERICSSON
`(“Ericsson”),
`Patent Owner
`
`Case IPR2022-00618
`Patent No. 9,313,178
`
`DECLARATION OF AVIEL RUBIN, PH.D.
`
`1
`
`APPLE 1003
`
`

`

`
`
`TABLE OF CONTENTS
`
`
`
`Introduction ....................................................................................................... 6
`I.
`II. Qualifications .................................................................................................... 7
`A.
`Education ............................................................................................... 7
`B.
`Career .................................................................................................... 7
`C.
`Publications ......................................................................................... 11
`D.
`Curriculum Vitae ................................................................................. 12
`III. Level of Ordinary Skill in the Art ................................................................... 12
`IV. Materials Considered and Relied Upon .......................................................... 13
`V. Legal Standards ............................................................................................... 15
`A.
`Legal Standards for Prior Art .............................................................. 15
`B.
`Legal Standard for Priority Date ......................................................... 16
`C.
`Legal Standard for Obviousness ......................................................... 16
`VI. Overview of the ’178 patent ........................................................................... 19
`A.
`Subject Matter Overview .................................................................... 19
`B.
`File History of the ’178 patent ............................................................ 20
`C.
`Interpretation of the ’178 patent Claims at Issue ................................ 21
`VII. Overview of the Cited References .................................................................. 22
`A.
`Peterka (EX1004) ................................................................................ 22
`B.
`Bocharov (EX1005) ............................................................................ 31
`C.
`Peterka308 (EX1009) .......................................................................... 33
`D.
`Chen (EX1006) .................................................................................... 35
`
`
`
`2
`
`

`

`
`
`[1.P] A method for handling secure distribution of
`
`[1.1] initiating a media playback request and receiving a
`
`[1.2] parsing content information from the playback
`request response, the content information including
`content encryption keys, content encryption key
`identifiers, and content encryption key expiration
`
`[1.3] retrieving content and manifest files from a content
`
`Balraj (EX1007) .................................................................................. 36
`E.
`Kelly (EX1010) ................................................................................... 38
`F.
`Eisen (EX1011) ................................................................................... 38
`G.
`VIII. Analysis of Peterka-Bocharov Combination .................................................. 38
`A.
`Combination Overview ....................................................................... 39
`B.
`Claim Element Analysis ...................................................................... 45
`1.
`Independent Claim 1 ................................................................. 45
`content comprising: ........................................................ 46
`playback request response; ............................................. 47
`times; ............................................................................... 50
`delivery server; ............................................................... 61
`content; ........................................................................... 63
`encryption key rotation boundary is reached; and .......... 64
`the key rotation boundary is reached. ............................. 65
`Claim 2 ...................................................................................... 66
`Claim 3 ...................................................................................... 66
`Claim 4 ...................................................................................... 69
`
`[1.4] detecting content encryption key rotation
`boundaries between periods of use of different
`content encryption keys in decrypting retrieved
`
`[1.5] issuing requests to a license server ahead of a key
`rotation boundary to retrieve a second content
`encryption key to be used after a content
`
`[1.6] applying the second key for content decryption after
`
`2.
`3.
`4.
`
`
`
`3
`
`

`

`5.
`6.
`7.
`8.
`9.
`
`
`
`Claim 6 ...................................................................................... 69
`Claim 7 ...................................................................................... 70
`Claim 12 .................................................................................... 71
`Claim 13 .................................................................................... 72
`Independent Claim 16 ............................................................... 72
`comprising: ..................................................................... 73
`
`[16.P] A computerized device operable as a client for
`handling secure distribution of content,
`
`[16.1] memory operative to store computer program
`instructions; one or more processors; input/output
`interface circuitry; and interconnect circuitry
`coupling the memory, processors and input/output
`interface circuitry together, wherein the processors
`are operative to execute the computer program
`instructions from the memory to cause the
`
`[16.2] initiate a media playback request and receive a
`
`[16.3] parse content information from the playback
`request response, the content information including
`content encryption keys, content encryption key
`identifiers, and content encryption key expiration
`
`computerized device to: .................................................. 74
`playback request response; ............................................. 74
`times; ............................................................................... 75
`delivery server; ............................................................... 75
`encryption keys in decrypting retrieved content; ........... 75
`encryption key rotation boundary is reached; and .......... 75
`the key rotation boundary is reached. ............................. 75
`10. Claim 17 .................................................................................... 76
`
`[16.4] retrieve content and manifest files from a content
`
`[16.5] detect content encryption key rotation boundaries
`between periods of use of different content
`
`[16.6] issue requests to a license server ahead of a key
`rotation boundary to retrieve a second content
`encryption key to be used after a content
`
`[16.7] apply the second key for content decryption after
`
`
`
`4
`
`

`

`
`
`11. Claim 18 .................................................................................... 76
`12. Claim 19 .................................................................................... 76
`13. Claim 20 .................................................................................... 77
`IX. Analysis of Peterka-Bocharov-Peterka308-Chen Combination ..................... 77
`Combination Overview ....................................................................... 77
`A.
`Claim Element Analysis ...................................................................... 82
`B.
`1.
`Claim 7 ...................................................................................... 82
`2.
`Claim 8 ...................................................................................... 83
`3.
`Claim 9 ...................................................................................... 83
`4.
`Claim 14 .................................................................................... 85
`5.
`Claim 15 .................................................................................... 86
`6.
`Claim 19 .................................................................................... 90
`X. Analysis of Peterka-Bocharov-Balraj Combination ....................................... 90
`Claim Element Analysis ...................................................................... 90
`A.
`1.
`Claim 5 ...................................................................................... 90
`XI. Analysis of Peterka-Bocharov-Kelly Combination ........................................ 92
`A.
`Claim Element Analysis ...................................................................... 93
`1.
`Claim 10 .................................................................................... 93
`XII. Analysis of Peterka-Bocharov-Kelly-Eisen Combination .............................. 95
`A.
`Claim Element Analysis ...................................................................... 95
`1.
`Claim 11 .................................................................................... 95
`XIII. Additional Remarks ........................................................................................ 97
`
`
`
`
`
`
`
`
`
`5
`
`

`

`
`
`I, Aviel Rubin, Ph.D. of Baltimore, Maryland declare that:
`
`I.
`
`Introduction
`
`1. My name is Aviel Rubin and I have been retained by counsel for
`
`Petitioner Apple Inc. (“Apple” or “Petitioner”) as an expert witness to provide
`
`assistance regarding U.S. Patent No. 9,313,178 (“the ’178 patent”). Specifically, I
`
`have been asked to consider the validity of claims 1-20 of the ’178 patent (the
`
`“Challenged Claims”) in view of prior art, anticipation and obviousness
`
`considerations from the perspective of a person of ordinary skill in the art at the time
`
`of the invention (“POSITA”) as it relates to the ’178 patent.
`
`2.
`
`I consult through the company Harbor Experts LLC (“Harbor Experts”
`
`or “Harbor Labs”). Harbor Experts is compensated at the rate of $860 per hour for
`
`my time. Research and analysis for this report was also performed by Harbor
`
`Experts personnel under my direction and guidance. Rates for other staff working
`
`on this matter range from $375 to $485 per hour. Neither my compensation nor that
`
`of Harbor Experts is contingent upon my findings, the testimony I may give, or the
`
`outcome of this matter or pending litigation between the Petitioner or owner of the
`
`’178 patent.
`
`3. My analysis here is based on my years of education, research and
`
`experience, as well as my investigation and study of relevant materials, including
`
`those cited herein.
`
`
`
`6
`
`

`

`
`
`4.
`
`I may rely upon these materials, my knowledge and experience, and/or
`
`additional materials to rebut arguments raised by the owner of the ’178 patent.
`
`Further, I may also consider additional documents and information in forming any
`
`necessary opinions, including documents that may not yet have been provided to me.
`
`5. My analysis of the materials produced in this proceeding is ongoing and
`
`I will continue to review any new material as it is provided. This declaration
`
`represents only those opinions I have formed to date. I reserve the right to revise,
`
`supplement, and/or amend my opinions stated herein based on new information and
`
`on my continuing analysis of the materials already provided.
`
`II. Qualifications
`
`A. Education
`
`6.
`
`I possess the knowledge, skills, experience, training, and education to
`
`form expert opinions and give testimony in this matter. I have at least 30 years of
`
`experience in the field of computer science, and specifically in Internet and computer
`
`security. I received my Ph.D. in Computer Science and Engineering from the
`
`University of Michigan, Ann Arbor, in 1994, with a specialty in computer security
`
`and cryptographic protocols. My thesis was entitled “Nonmonotonic Cryptographic
`
`Protocols” and concerned authentication in long-running networking operations.
`
`B. Career
`
`7.
`
`I will discuss my current position as a professor first, followed by a
`
`
`
`7
`
`

`

`
`
`synopsis of my career and work from the time I received my Ph.D. to the present.
`
`8.
`
`I am currently employed as Professor of Computer Science at Johns
`
`Hopkins University (the “University”), where I perform research, teach graduate and
`
`undergraduate courses
`
`in computer science and related subjects, advise
`
`undergraduate and Masters students, and supervise the research of Ph.D. candidates
`
`and other students. I have taught courses including Networking, Security and
`
`Privacy in Computing, and Advanced Topics in Computer Security. I am also the
`
`Technical Director of the Johns Hopkins University Information Security Institute—
`
`the University’s focal point for research and education in information security,
`
`assurance, and privacy. The University, through the Information Security Institute’s
`
`leadership, has been designated as a Center of Academic Excellence in Information
`
`Assurance by the National Security Agency and leading experts in the field.
`
`9.
`
`I interned at IBM in 1989. During my time there, I worked on the IBM
`
`System/360 family of mainframe computer systems.
`
`10. After receiving my Ph.D., I began working at Bellcore in its
`
`Cryptography and Network Security Research Group from 1994 to 1996. During
`
`that period, I focused my work on Internet and Computer Security.
`
`11.
`
`In 1997, I moved to AT&T Labs, Secure Systems Research
`
`Department, where I continued to focus on Internet and computer security. From
`
`1995 through 1999, in addition to my commercial work, I served as Adjunct
`
`
`
`8
`
`

`

`
`
`Professor at New York University, where I taught undergraduate classes on
`
`computer, network, and Internet security issues.
`
`12.
`
`I stayed in my position at AT&T until 2003, when I left to accept a full-
`
`time academic position at the University. The University promoted me to full
`
`professor with tenure in April 2004.
`
`13.
`
`I serve, or have served, on several technical and editorial advisory
`
`boards. For example, I served on the Editorial and Advisory Board for the
`
`International Journal of Information and Computer Security. I also served on the
`
`Editorial Board for the Journal of Privacy Technology. In addition, I have been
`
`Associate Editor of the Institute of Electrical and Electronics Engineers’ (“IEEE”)
`
`Security and Privacy Magazine and served as Associate Editor of the Association
`
`for Computing Machinery’s (“ACM”) Transactions on Internet Technology. I also
`
`served as Associate Editor of the journal Communications of the ACM, and I was
`
`an Advisory Board Member of Springer’s Information Security and Cryptography
`
`Book Series. I also have served in the past as a member of the Defense Advanced
`
`Research Projects Agency’s Information Science and Technology Study Group, a
`
`member of the Government Infosec Science and Technology Study Group of
`
`Malicious Code, a member of the AT&T Intellectual Property Review Team,
`
`Associate Editor of the Electronic Commerce Research Journal, Co-editor of the
`
`Electronic Newsletter of the IEEE Technical Committee on Security and Privacy, a
`
`
`
`9
`
`

`

`
`
`member of the board of directors of the USENIX Association (the leading academic
`
`computing systems society), and a member of the editorial board of the Bellcore
`
`Security Update Newsletter.
`
`14.
`
`I have spoken on information security and electronic privacy issues at
`
`more than 50 seminars and symposia. For example, I presented keynote addresses
`
`on the topics “Security of Electronic Voting” at Computer Security 2004 Mexico in
`
`Mexico City, Mexico, in May 2004; “Electronic Voting” to the Secure Trusted
`
`Systems Consortium 5th Annual Symposium in Washington, D.C., in December
`
`2003; “Security Problems on the Web” to the AT&T EUA Customer conference in
`
`March 2000; and “Security on the Internet” to the AT&T Security Workshop in June
`
`1997. I also presented a talk about hacking devices at the TEDx conference in
`
`October 2011 and another TEDx talk on the same topic in September 2015.
`
`15. From 2005 to 2011, I served as founder and President of Independent
`
`Security Evaluators (“ISE”), a computer security consulting firm. In that capacity,
`
`I guided ISE through the qualification process to become an independent testing
`
`laboratory for Consumer Union, which produces the Consumer Reports magazine.
`
`As an independent testing laboratory for Consumer Union, I managed an annual
`
`project where we tested popular anti-virus products. Our results were published in
`
`Consumer Reports each year for three consecutive years.
`
`16.
`
`I am currently the founder and chief scientist of Harbor Labs, a software
`
`
`
`10
`
`

`

`
`
`and networking consulting firm specializing in medical device security and privacy
`
`of healthcare data.
`
`17. As is apparent from the above description, virtually my entire
`
`professional career has been dedicated to issues relating to software, networks,
`
`information security, and computer systems more generally.
`
`C.
`
`18.
`
`Publications
`
`I am a named inventor on ten United States patents. The patent
`
`numbers and titles as well as my co-inventors are listed on the attached curriculum
`
`vitae.
`
`19.
`
`In March 2004, I was asked by the Federal Trade Commission to submit
`
`a report commenting on the viability and usefulness of a national Do Not E-mail
`
`Registry. I submitted my report entitled “A Report to the Federal Trade Commission
`
`on Responses to Their Request for Information on Establishing a National Do Not
`
`E-mail Registry” on May 10, 2004.
`
`20.
`
`I have also testified before Congress regarding security issues with
`
`electronic voting machines, as well as in the United States Senate on the issue of
`
`censorship. Further, on November 19, 2013, I testified in Congress about security
`
`issues related to the government’s Healthcare.gov web site. It was my opinion that
`
`Healthcare.gov did not incorporate adequate security measures and that its poor
`
`architectural design allowed for potential compromises of private enrollment
`
`
`
`11
`
`

`

`
`
`information. I recommended several approaches for securing Healthcare.gov, one
`
`of which included a recurring security review to check for standard vulnerabilities
`
`such as structured query language (“SQL”) injections.
`
`21.
`
`I am the author or co-author of five books regarding information
`
`security issues: Brave New Ballot, Random House, 2006; Firewalls and Internet
`
`Security (second edition), Addison Wesley, 2003; White-Hat Security Arsenal,
`
`Addison Wesley, 2001; Peer-to-Peer, O’Reilly, 2001; and Web Security
`
`Sourcebook, John Wiley & Sons, 1997. I am also the author of numerous journal
`
`and conference publications.
`
`D. Curriculum Vitae
`
`22. Additional details of my education and employment history, recent
`
`professional service, patents, publications, and other testimony are set forth in my
`
`current curriculum vitae (“CV”), attached to this declaration as Appendix A.
`
`III. Level of Ordinary Skill in the Art
`
`23.
`
`In rendering the opinions set forth in this declaration, I was asked to
`
`consider the patent claims and the prior art through the eyes of a POSITA at the time
`
`of the alleged invention, which counsel for Petitioner has instructed me to assume is
`
`June 23, 2011 (the filing date of the earliest provisional application in the alleged
`
`priority chain of the ’178 patent).
`
`24.
`
`I understand that the factors considered in determining the ordinary
`
`
`
`12
`
`

`

`
`
`level of skill in a field of art include the level of education and experience of persons
`
`working in the field; the types of problems encountered in the field; the teachings of
`
`the prior art, and the sophistication of the technology at the time of the alleged
`
`invention. I understand that a POSITA is not a specific real individual, but rather is
`
`a hypothetical individual having the qualities reflected by the factors above. I
`
`understand that a POSITA would also have knowledge from the teachings of the
`
`prior art, including the art cited below.
`
`25. Taking these factors into consideration, on or before June 23, 2011, a
`
`POSITA relating to the technology of the ’178 patent would have had a Bachelor’s
`
`degree in computer science, computer engineering, or a related field, and 2-3 years
`
`of practical engineering experience, including experience designing or researching
`
`information security systems that employ cryptographic keys to encrypt and decrypt
`
`digital data. Additional education could substitute for professional experience, or
`
`significant experience in the field could substitute for formal education.
`
`26. Before June 23, 2011, my level of skill in the art was at least that of a
`
`POSITA. I am qualified to provide opinions concerning what a POSITA would have
`
`known and understood at that time, and my analysis and conclusions herein are from
`
`the perspective of a POSITA as of that date.
`
`IV. Materials Considered and Relied Upon
`
`27.
`
`In reaching the conclusions described in this declaration, I have relied
`
`
`
`13
`
`

`

`
`
`on the documents and materials cited herein as well as those identified in this
`
`declaration, including the ’178 patent, the prosecution history of the ’178 patent, and
`
`prior art references cited herein. These materials comprise patents, related
`
`documents, and printed publications. Each of these materials is a type of document
`
`that experts in my field would have reasonably relied upon when forming their
`
`opinions.
`
`28.
`
`I have also relied on my education, training, research, knowledge, and
`
`personal and professional experience in the relevant technologies and systems that
`
`were already in use prior to, and within the timeframe of the earliest priority date of
`
`the claimed subject matter in the ’178 patent, which is June 23, 2011.
`
` EX1001 U.S. Patent 9,313,178 to Ma et al. (“the ’178 patent”)
` EX1002 Prosecution History of the ’178 patent (Serial No. 14/266,368)
` EX1004 U.S. Pub. 2002/0172368 (“Peterka”)
` EX1005 U.S. Pub. 2010/0235528 (“Bocharov”)
` EX1006 European Patent Pub. 1 418 756 A2 (“Chen”)
` EX1007 U.S. Pub. 2009/0254708 (“Balraj”)
` EX1008 U.S. Pub. 2012/0254456 (“Visharam”)
` EX1009 U.S. Pub. 2008/0270308 (“Peterka308”)
` EX1010 U.S. Pub. 2005/0138362 (“Kelly”)
` EX1011 U.S. Pub. 2011/0067012 (“Eisen”)
` EX1012 U.S. Pub. 2011/0099594 (“Chen594”)
` EX1013 Chow et al., A White-Box DES Implementation for DRM
`Applications, Pre-Proceedings for ACM DRM-2002 Workshop (October
`15, 2002)
`
`
`
`14
`
`

`

`
`
` EX1014 RFC793: Transmission Control Protocol (September 1981)
` EX1015 RFC2616: Hypertext Transfer Protocol – HTTP/1.1 (June
`1999)
`
`
`V. Legal Standards
`
`29.
`
`I am not a lawyer and do not provide any legal opinions, but I have been
`
`advised that certain legal standards are to be applied by technical experts in forming
`
`opinions regarding meaning and validity of patent claims. I have applied the legal
`
`standards described below, which were provided to me by counsel for the Petitioner.
`
`30.
`
`It is my understanding that assessing the validity of a U.S. patent based
`
`on a prior art analysis involves two steps. First, one assesses what meaning one of
`
`ordinary skill in the art would have given the terms recited in the claims. Second,
`
`after assessing the meaning of the claim terms, one may then assess validity by
`
`comparing a patent claim to the “prior art.” I understand that the teaching of the
`
`prior art is viewed through the eyes of a POSITA at the time the invention was made.
`
`My analysis as to what constitutes a relevant POSITA is set forth above.
`
`A. Legal Standards for Prior Art
`
`31.
`
`I understand that a patent or other publication must first qualify as prior
`
`art before it can be used to invalidate a patent claim. For purposes of this declaration,
`
`counsel for Petitioner has instructed me to assume that each prior art reference cited
`
`in the combinations described below (i.e., Peterka, Bocharov, Peterka308, Chen,
`
`Balraj, Kelly, and Eisen) qualify as prior art to the ’178 patent.
`15
`
`
`
`

`

`
`
`B.
`
`Legal Standard for Priority Date
`
`32.
`
`I understand that the “priority date” (or “earliest effective filing date”
`
`or “Critical Date”) of a patent is the date on which it is filed, or the date on which an
`
`earlier application was filed if the patentee properly claims the benefit of the earlier
`
`application’s filing date. For purposes of my analysis in this declaration, I have
`
`assumed that the ’178 patent is entitled to a priority date of June 23, 2011.
`
`C. Legal Standard for Obviousness
`
`33. My understanding is that a patent claim is invalid as obvious only if the
`
`subject matter of the claimed invention “as a whole” would have been obvious to a
`
`POSITA at the time the invention was made. To determine the differences between
`
`a prior art reference (or a proposed combination of prior art references) and the
`
`claims, the question of obviousness is not whether the differences themselves would
`
`have been obvious, but whether the claimed invention as a whole would have been
`
`obvious. Also, obviousness grounds cannot be sustained by mere conclusory
`
`statements. Rather, it is necessary to provide some articulated reasoning with
`
`rational underpinning to support the legal conclusion of obviousness.
`
`34.
`
`I understand that a patent claim that comprises several elements is not
`
`proved obvious by simply showing that each of its elements was independently
`
`known in the prior art. In my evaluation of whether any claim of the ’178 patent
`
`would have been obvious, I considered whether the Petition, or any evidence
`
`
`
`16
`
`

`

`
`
`submitted in this proceeding, presented an articulated reason with a rational basis
`
`that would have motivated a POSITA to combine the elements or concepts from the
`
`prior art in the same way as in the claimed invention.
`
`35.
`
`It is my understanding that there is no single way to define the line
`
`between true inventiveness on one hand—which is patentable—and the application
`
`of common sense and ordinary skill to solve a problem on the other hand—which is
`
`not patentable. For instance, factors such as market forces or other design incentives
`
`may be the source of what produced a change, rather than true inventiveness.
`
`36.
`
`I understand that the decision-maker may consider whether the change
`
`was merely the predictable result of using prior art elements according to their
`
`known functions, or whether it was the result of true inventiveness. And, the
`
`decision-maker may also consider whether there is some teaching or suggestion in
`
`the prior art to make the modification or combination of elements recited in the claim
`
`at issue. Also, the decision-maker may consider whether the innovation applies a
`
`known technique that had been used to improve a similar device or method in a
`
`similar way. The decision-maker may also consider whether the claimed invention
`
`would have been obvious to try, meaning that the claimed innovation was one of a
`
`relatively small number of possible approaches to the problem with a reasonable
`
`expectation of success by those skilled in the art.
`
`37.
`
`I have been instructed by counsel for Petitioner that if any of these
`
`
`
`17
`
`

`

`
`
`considerations are relied upon to reach a conclusion of obviousness, the law requires
`
`that the analysis of such a consideration must be made explicit. I understand that the
`
`decision-maker must be careful not to determine obviousness using the benefit of
`
`hindsight and that many true inventions might seem obvious after the fact. I
`
`understand that the decision-maker should consider obviousness from the position
`
`of a POSITA at the time the claimed invention was made, and that the decision-
`
`maker should not consider what is known today or what is learned from the teaching
`
`of the patent.
`
`38.
`
`I understand that in order to determine whether a patent claim is
`
`obvious, one must make certain factual findings regarding the claimed invention and
`
`the prior art. Specifically, I understand that the following factors must be evaluated
`
`to determine whether a claim is obvious: the scope and content of the prior art; the
`
`difference or differences, if any, between the claim of the patent and the prior art;
`
`the level of ordinary skill in the art at the time the claimed invention was made; and,
`
`if available, the objective indicia of non-obviousness, also known as “secondary
`
`considerations.”
`
`39.
`
`I understand that the secondary considerations include: commercial
`
`success of a product due to the merits of the claimed invention; a long felt need for
`
`the solution provided by the claimed invention; unsuccessful attempts by others to
`
`find the solution provided by the claimed invention; copying of the claimed
`
`
`
`18
`
`

`

`
`
`invention by others; unexpected and superior results from the claimed invention;
`
`acceptance by others of the claimed invention as shown by praise from others in the
`
`field or from the licensing of the claimed invention; teaching away from the
`
`conventional wisdom in the art at the time of the invention; independent invention
`
`of the claimed invention by others before or at about the same time as the named
`
`inventor thought of it; and other evidence tending to show obviousness.
`
`40.
`
`I understand that, to establish a secondary consideration, the evidence
`
`must demonstrate a nexus between that secondary consideration and the claimed
`
`invention.
`
`VI. Overview of the ’178 patent
`
`A.
`
`Subject Matter Overview
`
`41. The ’178 patent describes technology related to “over-the-top (OTT)
`
`media delivery and more specifically to encryption key rotation for live streaming
`
`media.” APPLE-1001, 1:15-17. For example, a server streams to a client device
`
`segments of media content that are each encrypted with a different content
`
`encryption key. Id., 1:38-42, 1:63-65. The client device communicates with a
`
`licensing server during the stream to pre-fetch content encryption keys ahead of key
`
`rotation boundaries, and the client then applies a retrieved key to decrypt a
`
`corresponding segment of the media stream. Id., 11:3-25, 11:38-62. “The
`
`transitioning between use of different keys is also referred to … as key ‘rotation’.”
`
`
`
`19
`
`

`

`Id., 1:63-65.
`
`
`
`
`
`APPLE-1001, FIG. 1; generally id., 9:47-11:62.
`
`B.
`
`File History of the ’178 patent
`
`42. The application that led to the ’178 patent was filed on April 30, 2014.
`
`APPLE-1002, 104-108. The Examiner identified all original claims 1-20 as
`
`allowable in a first action dated May 26, 2015. Id., 61-65. The Examiner cited one
`
`reference in this action, i.e., U.S. Pub. 2005/0060316 to Kamath et al., but did not
`
`
`
`20
`
`

`

`
`
`substantively comment on the reference. Id., 65. The applicant responded to the
`
`first action with brief remarks, but amended none of the claims. Id., 56-58. The
`
`Examiner subsequently allowed the application in a notice dated October 28, 2015.
`
`Id., 19-25. The Examiner’s reasons for allowance stated “the prior art of record
`
`(Kamath 20050060316) does not teach detecting content key rotation boundaries
`
`and issuing requests to a license server ahead of the key rotation boundaries.” Id.,
`
`24.
`
`C.
`
`Interpretation of the ’178 patent Claims at Issue
`
`43. For purposes of my analysis in this IPR proceeding, I understand that
`
`the terms that appear in the claims of the ’178 patent should be interpreted according
`
`to their plain and ordinary meaning. I understand that the plain and ordinary
`
`meaning of a claim term reflects the ordinary meaning that the term would have had
`
`to a POSITA at the time of the alleged invention in the context of the technology
`
`described in the patent. I also understand that the structure of the claims, the
`
`specification and file history also may be used to better construe a claim insofar as
`
`the plain meaning of the claims cannot be understood. Moreover, I understand that
`
`even treatises and dictionaries may be used to determine the meaning attributed by
`
`a POSITA to a claim term at the time of the alleged invention. I have applied the
`
`plain and ordinary meaning to the terms of the Challenged Claims in light of the
`
`specification and file history of the ’178 patent.
`
`
`
`21
`
`

`

`
`
`44.
`
`I understand that the words of the claims should be interpreted as they
`
`would have been interpre

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket