throbber

`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
` UNITED STATES PATENT AND TRADEMARK OFFICE
`
`
`
`
`
`
`BEFORE THE PATENT TRIAL AND APPEAL BOARD
`
`
`
`
`
`
`APPLE INC.,
`Petitioner,
`
`v.
`
`ERICSSON AB,
`Patent Owner.
`____________________
`
`Case IPR2022-00618
`Patent No. 9,313,178
`____________________
`
`
`
`PATENT OWNER’S RESPONSE
`
`
`
`
`
`
`Google Exhibit 1029
`Google v. Ericsson
`
`

`

`TABLE OF CONTENTS
`
`
`Introduction
`Background of the ’178 Patent and the challenged claims
`Person of ordinary skill in the art
`
`The Petition fails to meet limitation 1.4 and 16.5, properly construed, and
`thus fails as to all challenged claims.
`“[D]etecting content encryption key rotation boundaries between
`periods of use” should be construed to mean detecting key rotation
`boundaries before normal period-based expiration
`Patent Owner’s claim construction is not inconsistent with the
`concerns expressed in the Institution Decision
`The Petition’s theory cannot meet the challenged claims under the
`correct interpretation of limitations 1.4 and 16.5
`
`I.(cid:3)
`II.(cid:3)
`III.(cid:3)
`IV.(cid:3) The Petition fails to meet claims 6, 12-15, and 20
`V.(cid:3)
`A.(cid:3)
`B.(cid:3)
`C.(cid:3)
`VI.(cid:3) Conclusion
`
`
`
`Case IPR2022-00618
`PATENT OWNER’S RESPONSE
`
`1(cid:3)
`3(cid:3)
`6(cid:3)
`7(cid:3)
`10(cid:3)
`11(cid:3)
`17(cid:3)
`21(cid:3)
`22(cid:3)
`
`
`
`
`
`
`
`
`
`
`
`
`
`- 1 -
`
`
`
`

`

`
`
` Case IPR2022-00618
`PATENT OWNER’S RESPONSE
`
`
`EXHIBIT LIST
`
`
`Description
`Declaration of Kayvan B. Noroozi in Support of Motion for
`Admission Pro Hac Vice
`U.S. Patent Publ. No. 2014/0237243 (publication of U.S.
`Application No. 14/266,368 filed April 30, 2014)
`U.S. Provisional Application Ser. No. 61/500,316, filed Jun.
`23, 2011
`U.S. Patent No 2012/0331293(Publication of U.S. Patent
`Application Ser. No.: 13/530,997, filed on Jun. 22, 2012)
`
`
`
`Exhibit No.
`2001
`
`2002
`
`2003
`
`2004
`
`
`
`
`
`
`
`- 2 -
`
`
`
`

`

`I.
`
`Introduction
`As the Board’s Institution Decision recognized, the Petition does not
`
`
`
`Case IPR2022-00618
`PATENT OWNER’S RESPONSE
`
`demonstrate unpatentability at least as to claims 6, 12-15, and 20.
`
`Claim 6 recites prefetching a next key “after the expected expiration of the
`
`content encryption key currently being applied. . . .” Ex. 1001 at 12:40-47
`
`(emphasis added). The claim is thus directed to the situation where a current key is
`
`not expired by the packager 104 at the expected expiration time suggested by the
`
`workflow manager 102, and a new key is prefetched (i.e., obtained prior to the
`
`retirement of the current key) after the expected expiration time of the current key.
`
`The Petition, by contrast, attempts to meet claim 6 by alleging that in the
`
`combination Peterka and Bocharov, “a client device would request a new content
`
`encryption key . . . before the expected expiration of the content encryption key
`
`currently being applied,” Pet. at 40 (emphasis added)—the exact opposite of what
`
`claim 6 requires. The Petition thus cannot prevail as to claim 6.
`
`The Petition likewise fails as to claims 12-15 and 20. Whereas those claims
`
`require that the client issue a request for a new key, the Petition’s theory relies on
`
`an embodiment in Peterka in which “new keys are not received in response to [a]
`
`request from the client for a new key,” as the Board has correctly found. Paper 11
`
`
`
`
`
`
`
`
`
`- 1 -
`
`
`
`

`

` Case IPR2022-00618
`PATENT OWNER’S RESPONSE
`at 26; see also id. at 22 n. 6. Accordingly, the Petition cannot establish
`
`
`
`unpatentability as to claims 12-15 and 20.
`
`Moreover, as this Response demonstrates, the Petition’s theory fails to meet
`
`independent claims 1 and 16, and thus all challenged claims, under the proper
`
`construction of “detecting content encryption key rotation boundaries between
`
`periods of use,” as recited in limitations 1.4 and 16.5. The ’178 patent’s
`
`specification consistently teaches that “period of use” and similar phrases refer to
`
`the normal period-based duration set for an encryption key. See Section V.A, infra.
`
`The claims’ requirement of “detecting content encryption key rotation boundaries
`
`between periods of use” is thus limited to detecting rotation boundaries that arise
`
`before the normal period-based expiration time for a current key, such as due to a
`
`key change notification issued by the server. Accordingly, the claims cannot be
`
`met by a method or a system that is incapable of detecting pre-expiration time
`
`rotation boundaries.
`
`At the same time, as demonstrated below, Patent Owner’s claim construction
`
`is not inconsistent with the concerns raised by the Board in its Institution Decision.
`
`See Section V.B, infra. As an initial matter, Patent Owner’s construction does not
`
`exclude from the scope of the claims the embodiment of changing encryption keys
`
`based on the expiration time of a current key. Rather, that embodiment is captured
`
`
`
`
`
`
`
`
`
`- 2 -
`
`
`
`

`

` Case IPR2022-00618
`PATENT OWNER’S RESPONSE
`by limitations 1.5 and 16.6 and is fully within the scope of the claims, provided
`
`
`
`that the “detecting” requirement of limitations 1.4 and 16.5 is met. Moreover,
`
`Patent Owner’s construction is also consistent with the Board’s grammatical
`
`analysis of limitations 1.4 and 16.5, as well as the specification’s teachings
`
`regarding steps 316 and 308 of Figure 3, which the Board had emphasized.
`
`By contrast, construing the claims to encompass a method or system that
`
`cannot detect pre-expiration time rotation boundaries would fail to give meaning
`
`to the phrase “between periods of use,” and would be inconsistent with core claim
`
`construction principles. SIPCO, LLC v. Emerson Elec. Co., 939 F.3d 1301, 1307
`
`(Fed. Cir. 2019) (quoting Innova/Pure Water, Inc. v. Safari Water Filtration Sys.,
`
`Inc., 381 F.3d 1111, 1119 (Fed. Cir. 2004)).
`
`Because the Petition’s only relevant theory—which relies on Peterka’s
`
`“pull” embodiment—exclusively requests new keys based on the expiration time
`
`of the current key, and lacks any ability to detect pre-expiration time key rotation
`
`boundaries, the Petition fails to demonstrate unpatentability under the proper
`
`construction of the challenged claims. See Section V.C, infra.
`
`II. Background of the ’178 Patent and the challenged claims
`United States Patent 9,313,178 (“the ’178 Patent”), titled “Method and
`
`System for Secure Over-The-Top Live Video Delivery,” is directed to a method
`
`
`
`
`
`
`
`
`
`- 3 -
`
`
`
`

`

` Case IPR2022-00618
`PATENT OWNER’S RESPONSE
`“for managing key rotation (use of series of keys) and secure key distribution in
`
`
`
`over-the-top content delivery.” Ex. 1001 at 1, Abstract. The ’178 Patent has 20
`
`claims. The only independent claims are claim 1, which is directed to a method for
`
`handling secure distribution of content, and claim 16, which is directed to a
`
`computerized device operable as a client for handling secure distribution of
`
`content.
`
`
`
`The ’178 Patent teaches that “[a]s content delivery models move away from
`
`streaming distribution over private networks to Web-based delivery of files over
`
`the public Internet, referred to as over-the-top (OTT) delivery, traditional content
`
`protection paradigms must be modified to support new delivery protocols, e.g.,
`
`HTTP Live Streaming. For live streaming content with long or indefinite durations,
`
`use of a single encryption key for the entire duration increases the probability that
`
`the key may be compromised.” Ex. 1001 at 1:15-26. The ’178 Patent teaches that
`
`“[t]here are many protocols and methods for generating segmented content . . .
`
`each segment is independently playable, and therefore needs to be independently
`
`encrypted and decryptable. Segments are typically of a fixed duration and, in the
`
`case of video content, begin with a key-frame and contain no inter-segment
`
`references. Segmentation is performed on each of the different encoding generated
`
`by the transcoder, by parsing the resultant encoding and determining segment
`
`
`
`
`
`
`
`
`
`- 4 -
`
`
`
`

`

` Case IPR2022-00618
`PATENT OWNER’S RESPONSE
`boundaries.” Ex. 1001, 2:46-58. “Segments are encrypted on segment boundaries
`
`
`
`using the current content encryption key and current initialization vector (IV). . . .
`
`The generation of new strongly random values for use as content encryption keys
`
`and the rotation of content encryption keys provides protection from content
`
`encryption keys being compromised in long lived streams.” Id., 2:62-3:5.
`
`Exemplary claim 1 correspondingly recites:
`
`Element Claim 1
`
`[1.P]
`
`[1.1]
`
`A method for handling secure distribution of content comprising:
`
`initiating a media playback request and receiving a playback request
`
`response;
`
`[1.2]
`
`parsing content information from the playback request response, the
`
`content information including content encryption keys, content
`
`encryption key identifiers, and content encryption key expiration
`
`times;
`
`[1.3]
`
`[1.4]
`
`retrieving content and manifest files from a content delivery server;
`
`detecting content encryption key rotation boundaries between periods
`
`of use of different content encryption keys in decrypting retrieved
`
`content;
`
`[1.5]
`
`issuing requests to a license server ahead of a key rotation boundary
`
`
`
`
`
`
`
`
`
`- 5 -
`
`
`
`

`

` Case IPR2022-00618
`PATENT OWNER’S RESPONSE
`to retrieve a second content encryption key to be used after a content
`
`
`
`encryption key rotation boundary is reached; and
`
`[1.6]
`
`applying the second key for content decryption after the key rotation
`
`boundary is reached.
`
`
`
`The Petition challenges claims 1-20 based on the Grounds below.
`
`Ground References
`
`Basis Challenged
`
`1A
`
`1B
`
`1C
`
`1D
`
`1E
`
`Claims
`
`Peterka, Bocharov
`
`§ 103
`
`1-4, 6-7, 12-13, 16-20
`
`Peterka, Bocharov,
`
`§ 103
`
`7-9, 14-15, 19
`
`Peterka308, Chen
`
`Peterka, Bocharov, Balraj
`
`§ 103
`
`5
`
`Peterka, Bocharov, Kelly
`
`Peterka, Bocharov, Kelly,
`
`§ 103
`
`§ 103
`
`10
`
`11
`
`Eisen
`
`III. Person of ordinary skill in the art
`For purposes of this Response, Patent Owner does not dispute the Petition’s
`
`proposed level of skill for a person of skill in the art (“POSA”), because the level
`
`of skill in the art is not necessary for addressing any disputes between the parties.
`
`
`
`
`
`
`
`
`
`- 6 -
`
`
`
`

`

` Case IPR2022-00618
`PATENT OWNER’S RESPONSE
`IV. The Petition fails to meet claims 6, 12-15, and 20
`Claim 6 recites the method of claim 4, further comprising “prefetching a
`
`
`
`next un-retrieved key within a period of time after the expected expiration of the
`
`content encryption key currently being applied, the period of time beginning at the
`
`expected expiration of the content encryption key currently being used, and
`
`ending at a duration calculated as a fixed percentage of a fixed periodic content
`
`encryption key expiration interval.” (emphasis added).
`
`In its Institution Decision, the Board expressed concern that “prefetching
`
`after expiration does not make sense in the context of the ’178 patent.” Paper 11 at
`
`26 (emphasis Board’s).
`
`Claim 6, however, does not recite prefetching after expiration. Rather, it
`
`recites prefetching after “expected expiration of the content encryption key
`
`currently being applied,” and giving weight and meaning to the term “expected”
`
`and the phrase “currently being applied” is critical to a correct understanding of the
`
`claim and the associated teachings of the specification.
`
`As the ’178 patent explains, content encryption keys are not necessarily
`
`expired at the exact time provided by the workflow manager 102 (WFM 102). Ex.
`
`1001 at 8:9-13, 9:1-3. For instance, the ’178 patent teaches that “the fixed duration
`
`for key rotation may be viewed as a ‘target’ period, as the packager 104 may not
`
`
`
`
`
`
`
`
`
`- 7 -
`
`
`
`

`

` Case IPR2022-00618
`PATENT OWNER’S RESPONSE
`expire a key on the exact boundary,” and “[g]enerally, the packager 104 will not
`
`
`
`expire a key earlier than the end of a target period.” Id. at 8:9-13 (emphasis
`
`added). Thus, the ’178 patent teaches that content encryption keys may be expired
`
`at a time that is different than the intended or expected rotation time provided by
`
`the WFM 102, and in particular at a time later than the intended or expected
`
`rotation time. Id. To the same effect, the ’178 patent teaches that “[t]he key
`
`expiration time from the WFM 102 may be viewed as a ‘suggested’ expiration
`
`time, as the packager 104 may not be able to expire the key at the exact specified
`
`time.” Id. at 9:1-3. Moreover, the ’178 patent further teaches that “if the packager
`
`104 is unable to obtain a new content encryption key from the WFM 102 prior to
`
`the expiration of the current content encryption key, the packager 104 will continue
`
`to use the current content encryption key until such time as it is able to obtain a
`
`new key from the WFM 102.” Id. at 6:33-37. Stated otherwise, a content
`
`encryption key can remain in use after its expected expiration until the packager
`
`104 has obtained a new key from the WFM 102.
`
`Claim 6 captures the specification’s above teachings. The term “prefetching”
`
`in the context of the claim makes sense as it refers to obtaining a new key before
`
`ceasing to use a current key, with the additional nuance that the “prefetching”
`
`occurs after the time when the current key was expected to expire.
`
`
`
`
`
`
`
`
`
`- 8 -
`
`
`
`

`

` Case IPR2022-00618
`PATENT OWNER’S RESPONSE
`As the Board has already recognized, the Petition’s combination of Peterka
`
`
`
`and Bocharov does not meet the requirements of claim 6. Paper 11 at 26. Indeed,
`
`the Petition asserts that under its combination, “a client device would request a
`
`new content encryption key . . . before the expected expiration of the content
`
`encryption key currently being applied. . . .” Pet. at 40 (emphasis added). The
`
`Petition’s theory is thus exactly the opposite of what claim 6 recites: whereas claim
`
`6 requires prefetching a new key after the expected expiration of the current key,
`
`the Petition proposes retrieving a new key “before the expected expiration” of the
`
`current key. Pet. at 40 (emphasis added). Accordingly, the Petition cannot establish
`
`that claim 6 is unpatentable.
`
`The Petition likewise fails to establish unpatentability as to claims 12-15 and
`
`20, as the Board has also recognized. Paper 11 at 26-27, 29. As the Board correctly
`
`found in its Institution Decision, the Petition’s theory as to claims 12-15 and 20
`
`“relies on the embodiment disclosed in Peterka wherein a parity bit or other means
`
`is used to notify the client that a new encryption key has been sent.” Paper 11 at
`
`26. But as the Board has further found, “this embodiment does not teach or suggest
`
`the subject matter of claim 1 [and claim 16] because the new keys are not received
`
`in response to [a] request from the client for a new key.” Id. at 26; see also id. at 22
`
`n. 6. Because claims 12-15 depend from claim 1 and claim 20 depends from claim
`
`
`
`
`
`
`
`
`
`- 9 -
`
`
`
`

`

` Case IPR2022-00618
`PATENT OWNER’S RESPONSE
`16, and because Peterka’s parity bit embodiment cannot meet the underlying
`
`
`
`requirements of claims 1 and 16, the Petition’s reliance on Peterka’s parity bit
`
`embodiment also cannot establish unpatentability as to claims 12-15 and 20. Id. at
`
`26-27, 29.
`
`Accordingly, at least original claims 6, 12-15, and 20 should be upheld.
`
`V. The Petition fails to meet limitation 1.4 and 16.5, properly construed, and
`thus fails as to all challenged claims.
`The Board’s Institution Decision correctly found that the Petition’s theory
`
`based on Peterka’s use of a predetermined bit to signal encryption key rotation
`
`boundaries “is not persuasive because the new keys being signaled are not received
`
`in response to request from the client for a new key,” as required by claims 1 and
`
`16. Paper 11 at 22 n. 6. The Board likewise correctly declined to consider any
`
`theory based on the “combination of the push and pull model” of Peterka, “which
`
`was not raised by Petitioner. . . .” Id.
`
`Thus, the only theory at issue with respect to claims 1 and 16, and
`
`limitations 1.4 and 16.5 in particular, is Peterka’s “pull model,” in which “each
`
`client keeps track of the keys and their expiration times and actively requests new
`
`keys before the current keys expire. . . .” Paper 11 at 22.
`
`As demonstrated below, however, the correct construction of limitations 1.4
`
`and 16.5 requires detecting key rotation boundaries before normal period-based
`
`
`
`
`
`
`
`
`- 10 -
`
`
`
`

`

` Case IPR2022-00618
`PATENT OWNER’S RESPONSE
`expiration, which Peterka’s pull model does not permit. Accordingly, the Petition’s
`
`
`
`theory based on Peterka’s pull model cannot demonstrate unpatentability as to any
`
`challenged claim.
`
`A.
`
`“[D]etecting content encryption key rotation boundaries between
`periods of use” should be construed to mean detecting key rotation
`boundaries before normal period-based expiration
`As a general rule of claim construction, “all claim terms are presumed to
`
`have meaning in a claim.” SIPCO, LLC v. Emerson Elec. Co., 939 F.3d 1301, 1307
`
`(Fed. Cir. 2019) (quoting Innova/Pure Water, Inc. v. Safari Water Filtration Sys.,
`
`Inc., 381 F.3d 1111, 1119 (Fed. Cir. 2004)). Thus, in SIPCO, the Federal Circuit
`
`reversed the Board’s claim construction as unreasonably broad because it failed to
`
`give meaning to the term “low-power” in “low-power transceiver.” SIPCO, 939
`
`F.3d at 1308. In particular, the Court found that a “low-power transceiver,”
`
`understood in view of the specification, was limited to a device with a limited
`
`transmission range. Id.
`
`Here, the claim language at issue in limitations 1.4 and 16.5 does not simply
`
`recite “detecting content encryption key rotation boundaries.” Rather, the relevant
`
`claim language recites “detecting content encryption key rotation boundaries
`
`between periods of use of different content encryption keys.” Accordingly, a
`
`proper construction must give meaning and weight not simply to the requirement
`
`
`
`
`
`
`
`
`
`- 11 -
`
`
`
`

`

` Case IPR2022-00618
`PATENT OWNER’S RESPONSE
`of detecting content encryption key boundaries, but more specifically to detecting
`
`
`
`such rotation boundaries “between periods of use.”
`
`As explained in the Preliminary Response, Paper 9 at 11, the ’178 patent
`
`teaches two methods by which a current content encryption key can be expired:
`
`“normal period-based expiration and an explicit key change notification.” Ex.
`
`1001 at 11:4-7 (emphasis added).
`
`The ’178 patent consistently uses the phrase “periods of use” to refer to the
`
`normal period-based duration of a content encryption key, i.e., the fixed duration
`
`lifespan intended for that key as defined by the expiration period set by the WFM
`
`102. For instance, the ’178 patent teaches “generating a series of content
`
`encryption keys and providing them serially to a packaging server for encrypting a
`
`content item, wherein each content encryption key is provided upon expiration of a
`
`period of use of a serially preceding content encryption key.” 1:45-50 (emphasis
`
`added). In the above teaching, the specification expressly refers to the “expiration”
`
`of a “period of use” of a content encryption key, and thus plainly teaches that the
`
`phrase “period of use” is synonymous with the normal period-based duration
`
`intended for a key, as defined by the expiration period set by the WFM 102.
`
`Similarly, the ’178 patent further teaches that “[t]he lifespan of the new content
`
`encryption key may be aligned to the periodic use period boundaries of the
`
`
`
`
`
`
`
`
`
`- 12 -
`
`
`
`

`

` Case IPR2022-00618
`PATENT OWNER’S RESPONSE
`previous content encryption keys.” Id. at 7:29-31 (emphasis added). The patent
`
`
`
`thus once again uses the term “periodic use period boundaries” to refer to the
`
`normal period-based expiration time of the content encryption key. The ’178 patent
`
`likewise teaches “a fixed period duration for key rotation,” id. at 8:7-10 (emphasis
`
`added), and “a periodic content encryption key expiration event.” Id. at 8:29-32.
`
`Thus, the ’178 patent repeatedly and exclusively uses the term “periods of
`
`use” and similar phrases such as “periodic use period boundaries” and “fixed
`
`period duration” to refer to the normal period-based expiration of a content
`
`encryption key.
`
`Given the patent’s consistent usage of “periods of use” and similar phrases
`
`to refer to the intended length of the normal period-based duration of an encryption
`
`key, it follows that the phrase “between periods of use” as recited in claim 6 must
`
`mean an event that occurs during the current use period (or fixed-duration
`
`intended lifespan) of a current encryption key. Accordingly, giving meaning to the
`
`phrase “between periods of use” as recited in claim 6 requires interpreting
`
`limitations 1.4 and 16.5 to require “detecting content encryption key rotation
`
`boundaries” that arise during the normal period-based duration of a current key
`
`(i.e., before the current key’s period-based rotation boundary would otherwise
`
`occur), such as due to an “explicit key change notification.” Ex. 1001 at 11:4-7.
`
`
`
`
`
`
`
`
`
`- 13 -
`
`
`
`

`

` Case IPR2022-00618
`PATENT OWNER’S RESPONSE
`That understanding of limitations 1.4 and 16.5 is well-supported by other
`
`
`
`teachings from the specification. The ’178 Patent teaches that the workflow
`
`manager may issue a new unsolicited content encryption key, id. at 7:3-4, which in
`
`one embodiment “is pushed ahead of the current content encryption key with
`
`explicit instructions to apply the key as soon as possible, in which case the
`
`packager 104 does not wait until the current content encryption key has expired
`
`before applying the new content encryption key.” Id. at 7:11-16 (emphasis added).
`
`The ’178 Patent further explains that the WFM 102 may, for instance,
`
`“push[ ] the new content encryption key to the packager 104 when the current
`
`content encryption key is deemed to be no longer secure (e.g., if the content
`
`encryption key has been compromised).” Id. at 7:17-20.
`
`Consistent with the above teachings, Fig. 3 of the Patent (shown below)
`
`depicts a flow chart describing a process for detecting the rotation of content
`
`encryption keys and retrieving updated content encryption keys.
`
`
`
`
`
`
`
`
`
`- 14 -
`
`
`
`

`

`
`
` Case IPR2022-00618
`PATENT OWNER’S RESPONSE
`
`
`
`At step 308, “the client 110 checks to see if a key change is signaled, i.e., a
`
`key change was requested outside of any fixed duration lifespan.” Id. at 10:39-43
`
`(emphasis added). “If a content encryption change request is detected, the client
`
`notes the need to expire the current content encryption key and the content
`
`
`
`
`
`
`
`
`
`- 15 -
`
`
`
`

`

` Case IPR2022-00618
`PATENT OWNER’S RESPONSE
`encryption key identifier of the new key to be used. The client 110 then proceeds
`
`
`
`to step 310.” Id. at 10:65-11:2 (emphasis added).
`
`“In step 310, the client 110 checks the expiration of current content key to
`
`see if a new key should be applied. There are two cases—normal period-based
`
`expiration and an explicit key change notification received in step 308 that
`
`applies to the current segment being decrypted. If the current content encryption
`
`key has not yet expired, processing proceeds to step 314. If the current content
`
`encryption key needs to be expired, processing proceeds to step 312 where the key
`
`is ‘rotated’, i.e., the current content encryption key is expired and a new one is put
`
`into use.” Id., 11:3-12 (emphasis added).
`
`Giving proper meaning to the phrase “between periods of use” as recited in
`
`claims 1 and 16 and in view of the specification’s relevant teachings thus requires
`
`interpreting limitations 1.4 and 16.5 to require detecting whether a key rotation
`
`boundary must occur before the time-based expiration of the current key (i.e.,
`
`“between periods of use of different content encryption keys”).
`
`By contrast, interpreting the claims to encompass methods or systems that
`
`are incapable of detecting pre-expiration time key rotation boundaries would fail to
`
`give meaning to the phrase “between periods of use,” and would thus be
`
`inconsistent with fundamental precepts of claim construction. SIPCO, LLC v.
`
`
`
`
`
`
`
`
`
`- 16 -
`
`
`
`

`

` Case IPR2022-00618
`PATENT OWNER’S RESPONSE
`Emerson Elec. Co., 939 F.3d 1301, 1307 (Fed. Cir. 2019) (quoting Innova/Pure
`
`
`
`Water, Inc. v. Safari Water Filtration Sys., Inc., 381 F.3d 1111, 1119 (Fed. Cir.
`
`2004)).
`
`B.
`
`Patent Owner’s claim construction is not inconsistent with the
`concerns expressed in the Institution Decision
`Patent Owner recognizes that the Board’s Institution Decision expressed
`
`several concerns with respect to adopting Patent Owner’s proposed construction of
`
`limitations 1.4 and 16.5. Respectfully, however, Patent Owner’s construction is not
`
`inconsistent with the Board’s concerns, as demonstrated below.
`
`First, Patent Owner’s construction does not “limit[] the scope of the claim to
`
`one aspect of the disclosed embodiment of the ’178 patent that deals with the
`
`special case of key changes requested for security reasons outside of any fixed
`
`duration lifespan.” Paper 11 at 20-21. As Patent Owner explained in its
`
`Preliminary Response, limitations 1.5 and 16.6 encompass issuing requests for a
`
`new encryption key due to either (1) normal period-based expiration (i.e., the end
`
`of the current key’s fixed duration lifespan) or (2) a key change instruction
`
`detected by the client in between the current key’s period of use (i.e., before the
`
`current key’s normal period-based expiration). Paper 9 at 15-16. In that respect,
`
`limitations 1.5 and 16.6 thus capture steps 316 and 318 of Fig. 3, which teach that
`
`“[i]f the current content encryption key is within a fixed threshold of expiring or a
`
`
`
`
`
`
`
`
`- 17 -
`
`
`
`

`

` Case IPR2022-00618
`PATENT OWNER’S RESPONSE
`content encryption key change request was detected in step 308, processing
`
`
`
`proceeds to step 318 where the client 110 requests a new content encryption key
`
`from the license server 106.” Id. at 11:48-53 (emphasis added).
`
`Thus, Patent Owner’s construction only limits the scope of limitations 1.4
`
`and 16.5, but it does not exclude the embodiment of requesting a new key based on
`
`the normal period-based expiration of the current key from the scope of claims 1
`
`and 16 as a whole.
`
`Stated otherwise, under Patent Owner’s construction claims 1 and 16 cannot
`
`be met where a client cannot detect whether a key rotation boundary has been set
`
`prior to the normal period-based expiration of a current key (i.e., “between periods
`
`of use” as recited in limitation 1.4 and 16.5), but claims 1 and 16 can be met where
`
`a client performs that detection step, concludes that no such pre-period-based
`
`rotation is necessary, and simply requests a new key prior to period-based
`
`expiration of the current key for use after the current key’s period-based expiration
`
`(as covered within the scope of limitations 1.5 and 16.6).
`
`Second, Patent Owner agrees with the Board that “it is the ‘boundaries’ that
`
`are ‘between periods of use of different content encryption keys,’ . . . .” Paper 11
`
`at 21 (emphasis Board’s). That observation is entirely consistent with Patent
`
`Owner’s construction, wherein limitations 1.4 and 16.5 require that the client
`
`
`
`
`
`
`
`
`
`- 18 -
`
`
`
`

`

` Case IPR2022-00618
`PATENT OWNER’S RESPONSE
`detect whether there is a key rotation boundary “between periods of use” of current
`
`
`
`keys, i.e., before the normal period-based expiration of a current key.
`
`By contrast, interpreting limitation 1.4 to encompass merely recognizing that
`
`the fixed duration set for a current key is close to expiration would not constitute
`
`detecting a boundary that is “between periods of use of different content
`
`encryption keys,” and would give no meaning to the crucial phrase “between
`
`periods of use,” in violation of the Federal Circuit’s repeated precedents. SIPCO,
`
`LLC v. Emerson Elec. Co., 939 F.3d 1301, 1307 (Fed. Cir. 2019) (quoting
`
`Innova/Pure Water, Inc. v. Safari Water Filtration Sys., Inc., 381 F.3d 1111, 1119
`
`(Fed. Cir. 2004)).
`
`Third, the “detecting” limitation does not correspond to step 316 of Figure
`
`3. Cf. Paper 11 at 21-22. Rather, step 316 corresponds to the next limitation of the
`
`claims (the “issuing requests” limitation, or limitations 1.5 and 16.6). The
`
`specification teaches that: “In step 316, the client 110 checks to see if the current
`
`content encryption key is going to expire in the near future or if a content
`
`encryption key change request for a future segment was detected in step 308.” Ex.
`
`1001 at 11:38-41 (emphasis added). The phrase “was detected” is only used in
`
`reference to a “key change request” requiring rotation of a current key prior to its
`
`normal period-based expiration. Thus, that is the only type of key rotation
`
`
`
`
`
`
`
`
`
`- 19 -
`
`
`
`

`

` Case IPR2022-00618
`PATENT OWNER’S RESPONSE
`boundary for which “detection” is taught to occur. Moreover, the use of the past
`
`
`
`tense—“was detected”—teaches that the “detecting” step has already occurred at
`
`step 308, prior to step 316. By contrast, at step 316 the client performs a further
`
`step—checking whether the current key is either set to expire soon or if a change
`
`request was received for key rotation prior to the key’s natural expiration. The
`
`“checking” aspect of step 316 is not expressly recited in any claim limitation, but is
`
`ultimately captured by limitations 1.5 and 16.6, which require issuing a request for
`
`a new key ahead of the rotation boundary of the current key. To that end, the
`
`specification teaches that as part of step 316, “[i]f the current content encryption
`
`key is within a fixed threshold of expiring or a content encryption key change
`
`request was detected in step 308, processing proceeds to step 318 where the client
`
`110 requests a new content encryption key from the license server 106.” Id. at
`
`11:48-53 (emphasis added).
`
`Thus, Patent Owner’s construction is not inconsistent with the Board’s
`
`concerns about reading the teachings of step 316 out of the claims. Rather, Patent
`
`Owner’s construction continues to encompass step 316’s method of proceeding to
`
`step 318, and requesting a new key, regardless of whether the current key is close
`
`to expiration or a key change request “was detected” at step 308, as encompassed
`
`by limitations 1.5 and 16.6.
`
`
`
`
`
`
`
`
`
`- 20 -
`
`
`
`

`

`
`
`C.
`
` Case IPR2022-00618
`PATENT OWNER’S RESPONSE
`The Petition’s theory cannot meet the challenged claims under the
`correct interpretation of limitations 1.4 and 16.51
`It is undisputed that under Peterka’s “pull” embodiment, which is the only
`
`embodiment relevant to this proceeding in view of the Board’s Institution
`
`Decision, the client device does not “detect” any key rotation boundaries prior to
`
`the normal period-based expiration of the current key.
`
`As the Petition itself admits, Peterka’s “pull” embodiment, as disclosed in
`
`Peterka’s paragraphs 105, 106, 114, and its Fig. 8, simply teaches that the client
`
`keeps track of “known key expiry times that allow the client to request new keys
`
`ahead of the expiration or key rotation boundary.” Pet. at 35 (emphasis added).
`
`Peterka’s paragraph 105 further teaches that in its “pull model,” “each client keeps
`
`track of the keys and their expiration times and actively requests new keys before
`
`the current keys expire so as to avoid service interruptions.” Ex. 1004 ¶ 105. The
`
`other passages the Petition cites—Peterka’s paragraph 106, 114, and Fig. 8—all
`
`teach the same.
`
`Peterka’s “pull” model does not include the possibility of any key change
`
`notification received by the client ahead of the natural key expiry time of a current
`
`key, nor any other non-time-based key rotation boundary, and there is thus no such
`
`
`1 The Petition solely relies on Peterka as teaching or suggesting limitations 1.4 and
`1.5. Pet. at 34-36.
`
`
`
`
`
`
`
`
`- 21 -
`
`
`
`

`

` Case IPR2022-00618
`PATENT OWNER’S RESPONSE
`non-time-based key rotation boundary for the client to “detect,” as required in
`
`
`
`limitations 1.4 and 16.5. To the contrary, Peterka teaches that in its “pull model,”
`
`the client makes all key change determinations, entirely based on the expiration
`
`time of the current key. Ex. 1004 ¶ 105 (“Under the pull model, each client keeps
`
`track of the keys and their expiration times and actively requests new keys before
`
`current keys expire so as to avoid service interruptions. Alternatively, the push
`
`model migrates responsibility to the server which keeps track of active clients and
`
`distributes new keys to them before the current keys expire.”); id. ¶ 106

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket