Beruflich Dokumente
Kultur Dokumente
Personalized Media
IPR Petition U.S. Pat. 7,801,304
UNITED STATES PATENT AND TRADEMARK OFFICE
____________
BEFORE THE PATENT TRIAL AND APPEAL BOARD
____________
Unified Patents Inc.,
Petitioner
v.
Personalized Media Communications, LLC,
Patent Owner
IPR2015-00521
Patent 7,801,304
____________
PETITION FOR INTER PARTES REVIEW OF U.S. PATENT 7,801,304
B.
C.
D.
E.
II.
INTRODUCTION ...........................................................................................3
III.
IV.
PRIORITY .......................................................................................................9
V.
VI.
B.
C.
A Processor ...................................................................................... 12
Claims 1, 11, 18, 23, and 24 Would Have Been Obvious Over
Guillou in View of the Knowledge of a Person Having
Ordinary Skill in the Art...................................................................... 14
1.
Claim 1 ......................................................................................17
2.
Claim 11 ....................................................................................26
3.
Claim 18 ....................................................................................26
4.
Claim 23 ....................................................................................27
5.
Claim 24 ....................................................................................32
ii
C.
D.
IX.
X.
Claim 22 ....................................................................................40
Claim 11 ....................................................................................50
2.
Claim 16 ....................................................................................52
B.
CONCLUSION .............................................................................................60
iii
iv
1002
1003
1004
1005
1006
1007
1008
1009
1010
1011
1012
1013
1014
1015
1016
1017
1018
Description
The 304 patent is involved in the Amazon IPR, which is pending, as well as
in co-pending litigation captioned Personalized Media Commcns., LLC v.
Amazon.com, Inc., No. 1:13-cv-1608-RGA (D. Del. filed Sept. 23, 2013).
Back-up Counsel
D.
Please address all correspondence to lead counsel and back-up counsel at the
address shown above. Unified also consents to electronic service by email to:
cpdocketkiklis@oblon.com.
Unified certifies that the 304 patent is available for inter partes review and
that Unified is not barred or estopped from requesting an inter partes review
challenging the patent claims on the grounds identified in this petition.
II.
INTRODUCTION
In 1981, the inventors filed Patent Application No. 06/317,510, which had a
Ex. 1002.
effective date of the GATT legislation, PMC filed 328 patent applications, all
claiming priority to both the 1987 and 1981 applications.
PMC overwhelmed the Patent Office with a huge number of patent
applications, an unclear specification, thousands of prior-art references,
inconsistent definitions of claim terms, and thousands of pending claims. See Ex.
1003 at 2627. This, in conjunction with ex parte reexaminations filed against
PMCs earlier-issued patents, caused the Patent Office to suspend prosecution for
about ten years. Of PMCs 328 patent applications filed in 1995, one issued in
1999. The next one issued in 2010. Since then, the Patent Office has issued to
PMC approximately 80 additional patents. These 80 patents, along with about 20
pending patent applications, trace their roots back to the 328 patent applications
filed in 1995, and allegedly back to the 1987 and 1981 specifications.
3
2010. Ex. 1004. As discussed above, the 304 patent claims priority to a series of
continuation and continuation-in-part applications dating back to November 3,
1981, and includes a 285-column specification and 32 issued claims.
As issued, the 304 patent generally relates to the encryption and decryption
of programming. Claim 24 is representative:
4
PRIORITY
For this review, Petitioner only asserts prior art dated before the November
10
Unifieds position
regarding the scope of the claims should not be taken as an assertion regarding the
appropriate claim scope in other forums where a different standard of claim
construction applies. Unified sets forth the following to clarify certain claim terms
under the broadest reasonable interpretation standard.
A.
11
interpretation,
digital
programming,
digital
mass
medium
Said Decryptor
In the 304 patent, some embodiments use a single decryptor, while other
embodiments use multiple decryptors. See, e.g., Ex. 1004 at Figs. 3A, 4, 7. The
304 patent also discusses a decryptor as being part of a controller. See, e.g., Ex.
1004 at Fig. 2C; 137:5361. In light of these ambiguities and under the broadest
reasonable interpretation, said decryptor in limitations 1(e) and 1(f) of claim 1
can refer to a single decryptor as well as multiple decryptors. The term can also
refer to a single logical decryptor comprising a plurality of physical (or logical)
decrypting circuits.
C.
A Processor
district court litigation that processor in claim 24 of the 304 patent means any
device capable of performing operations on data.
13
Claims 1, 11, 18, 23, and 24 Would Have Been Obvious Over
Guillou in View of the Knowledge of a Person Having Ordinary
Skill in the Art.
Guillou was filed on January 31, 1980, and issued on June 29, 1982. Ex. 1007.
Guillou is therefore prior art to the 304 patent at least under 102(e). Guillous
disclosure is prior art under 102(b) by virtue of its publication on August 7, 1980
as WO 80/01636. See Ex. 1010, 1011. PMC never disputed that Guillou is prior
art during prosecution of the 304 patent.
Guillou traces its roots back to the development of the French ANTIOPE
system in the late 1970s. Ex. 1007 at 1:762 (stating that the invention could be
used with the ANTIOPE system and incorporating by reference a number of
documents relating to the ANTIOPE system). Guillou discloses an access-control
video-transmission system that controls a subscribers access to transmitted data.
Id. at Figs. 2, 7; 4:458. Figure 7 shows an embodiment of the invention:
14
Id. at Fig. 7. As shown above, Guillou discloses an apparatus for encrypting and
decrypting digital signals and data using a double-key (two layer) encryption
scheme2 that changes periodically. Id. at 8:524. Notably, Guillou contemplates
system. Ex. 1007 at 11:310; Ex. 1015. The use of double-key encryption was
well known, and numerous other prior-art references disclose double-key
encryption and the use of DES and its modes of operation, including FIPS PUB 81
15
(showing modes of operation based on FIPS PUB 46), Barnes (U.S. Pat. No.
4,172,213), and Rosenblum (U.S. Pat. No. 4,182,933). Exs. 1014, 1016, 1017.
16
Claim 1
Guillou
Guillou discloses a method for controlling the decryption of
programming at a subscriber station. Ex. 1007 at Abstract;
Figs. 2, 710; 9:4810:66; 15:4216:17.
Unified believes that Guillou discloses each and every limitation of claims
1, 11, 18, 23, and 24 as discussed herein and therefore anticipates these claims.
Nevertheless, Unified asserts Guillou under an obviousness ground of rejection
because Unified cannot predict which, if any, limitations PMC might argue are not
disclosed by Guillou, or how the Board might construe the claims.
17
Guillou
which controls the decryption of encrypted digital data, where
the encrypted digital data along with the encrypted digital key
are transmitted from an emitter center and are received by a
subscriber station. Id. at Figs. 1, 2, 7, 9; 2:814; 6:6268; 8:5
43; 9:6064.
first encrypted digital control signal portion
The encrypted digital control signal is message Mi, which
contains the operating key K (i.e., digital control signal). Mi is
encrypted but is detectable, readable, and capable of being
decrypted to obtain the key K. The messages Mi are sent from
the emitter center and are received by the subscriber station.
Both Mi and K are digital. Id. at Figs. 2, 7, 8, 10; 8:5558;
8:599:12; 15:4216:17; 16:6317:15; 18:1959; 20:53
21:14; claims 1, 68.
As soon as a distribution centre generates a new operating
key K, it calculates, for each current subscribers key in use Ci
for this service, a message Mi by means of an algorithm Mi =
FCi (K), with the keys Ci acting as parameters. Id. at 8:4448.
All the messages Mi in force together constitute the
information for access control associated with the service
being broadcast. This access control information is obviously
not locked up by the electronic lock. Id. at 8:5558.
encrypted digital information portion
The encrypted digital information is Dj, which is the encrypted
form of digital information dj. Both Dj and dj are digital. Dj is
transmitted from the emitter center and received by the
subscriber station. Id. at Figs. 2, 7, 8; 2:2327; 2:643:3;
5:5357; 6:5060; 7:3342; 10:2836; 11:310; see also claim
1.
Using d1, d2, d3 . . . to denote the clear octets of a row, C1, C2,
C3 to denote the encoding octets delivered by the generator,
and D1, D2, D3 . . . to denote the encoded octets, we have the
18
Guillou
following table of the series of codes . . . Id. at 14:2024.
1(b) detecting
said first
encrypted digital
control signal
portion of said
programming;
Then come the data octets d1, d2, . . . dn. These octets are
inserted between the start of the current line and either a line
endstart of new lineor the end of a page. These octets d1,
d2, . . . dn represent the information constituting the service
being broadcast. Thus the information element in a system of
this kind is the displayable line. Id. at 3:5561.
A video-data separator 142, a selection circuit 143, and a
decoding circuit 145 detect and extract data octets from the
transmitted signal. Some of these data octets contain the
encrypted digital control signal message Mi. This detecting
step is performed by any one of these three components or the
three of them in combination. Id. at Figs. 7, 9, 10; 8:559:12;
17:1918:51; 19:4220:17; 20:4052; see also claim 1.
The receiving station shown comprises, in the line 18 for
processing numerical signals, a video-data separator 142
(which operates by a known procedure to extract a series of
octets from the analog signal) the input of which is connected
to the video output of the circuit 14. This separator has its
output connected to a primary selection circuit 143 (which also
operates by a known procedure so as to extract the octets
carried in a numerical line). The output of the circuit 143 is
connected by a junction 144 to a page selecting and data
decoding circuit 145 whose output is connected to the input of
a page memory 146. Id. at 19:415.
19
Guillou
Id. at Fig. 9.
1(c) passing said The video-data separator 142 passes encrypted digital control
signal message Mi to the selection circuit 143, which passes
first encrypted
digital control
the encrypted digital control signal message to the decoding
signal portion of circuit 145, which passes the encrypted digital control signal to
said programming a Krestoring circuit 110. Id. at Figs. 7, 9, 10; 16:110; 20:6
to a decryptor at
17.
said subscriber
station;
At the level of processing the functional pages, the circuit 145
has programmes permitting analysis and use of the access
control pages. At the appropriate address in the memory 108 of
the card 106, the circuit locates a valid subscription block from
which it extracts the subscription index. Then, in the access
page, it searches for the line corresponding to this subscription
index (since, as has been seen, the lines are numbered by the
indices). There, it recovers the access block and extracts the
message Mi from it. This message is transmitted to the circuit
110 which calculates the key K using the subscribers key Ci
appearing in the subscription block which has just been located
in the card. Id. at 20:4052.
The message Mi is decrypted using the K-restoring circuit 110
1(d) decrypting
said first
to obtain the operation key K. Id. at Figs. 7, 9, 10; 8:599:12;
encrypted digital 16:6317:15; 20:617; 20:4052; claims 1, 5, 8.
control signal
portion of said
programming
using said
20
Guillou
Id. at 20:5321:14.
The video-data separator 142 passes encrypted digital
information Dj to the decoding circuit 145, which passes
information Dj to a discriminator 42. Id. at Figs. 2, 7, 9, 10;
7:4858; 10:4150; 19:430; 20:639.
21
Guillou
Guillou
In the present invention, in the presence of a new line of
information, the decoder 145 initialises the generator of
decoding octets 26 according to the process indicated above
with reference to FIG. 5, which uses nine successive orders.
Then, for each octet in the line, the decoder 145 causes the
generation of a decoding octet Cj (c6 = c7 = c8 = 0), and if the
octet Dj received is not a control code (columns 0 and 1),
which is verified by the comparator 42, the decoder combines
it, by OR-exclusive, with the decoding octet in the gate 46.
Id. at 20:2939.
At the level of decoding the pages of information: the decoder
should unlock the information line by line, using an octet
generator similar to that used on emission. Id. at 19:6568.
1(g) presenting
said
programming.
See also claim chart for Guillou limitation 1(e) and discussion
below with respect to said decryptor.
Guillou discloses that the digital information portion (i.e., from
digital line element 18) along with video programming (i.e.,
from video line element 16) are presented on a display device
20. Id. at Figs. 1, 2, 7, 9; 2:19; 7:4; 10:56; see also claim 1.
The receiver illustrated in FIG. 9 comprises the large
functional blocks already mentioned with regard to FIGS. 1
and 2, namely: a receiving and demodulating circuit 14, a line
16 for processing picture signals, a line 18 for processing
numerical signals and display means 20. The circuit 14
delivers, on the one hand, the sound to a loudspeaker 15 and,
on the other hand, the video signal to a colour decoder and
scanning generator 19. The colour signals B1, V1 and R1, and
the luminance L1 from the circuit 19 are transmitted to the tube
140 through a video switch 141. Id. at 18:6119:3.
The receiving station shown comprises, in the line 18 for
processing numerical signals, a video-data separator 142
(which operates by a known procedure to extract a series of
octets from the analog signal) the input of which is connected
23
Guillou
to the video output of the circuit 14. This separator has its
output connected to a primary selection circuit 143 (which also
operates by a known procedure so as to extract the octets
carried in a numerical line). The output of the circuit 143 is
connected by a junction 144 to a page selecting and data
decoding circuit 145 whose output is connected to the input of
a page memory 146. A subscribers keyboard 147 is connected
to the control inputs of blocks 143 and 145 and to the switch
141. The output of the memory 146 is connected to the input
of a character generator 148. The signal outputs of the
generator 148 are connected to the colour inputs R2, V2 and B2
of the video switch 141 and to a luminance input L2. Id. at
19:421.
In limitations 1(e) and 1(f), the claim refers to said decryptor, thereby
suggesting that the same decryptor that decrypted the encrypted digital control
signal portion must also decrypt the encrypted digital information portion.
Guillou discloses that decoder 145 performs these decrypting functions: The
circuit 145 therefore has to be completed in order to take these two new elements
into account. The necessary supplements are of two kinds: (1) At the level of
decoding the pages of information: the decoder should unlock the information line
by line, using an octet generator similar to that used on emission; (2) At the level
of processing the functional pages: the decoder should know the method of using
the access control pages and should also be able to hold a dialogue with a
subscription card in order to obtain K, the operating key. Id. at 19:6120:5.
24
decrypts the encrypted digital control signal message Mi. The second decryption
circuit is the automatic decryption means 38 (i.e., a discriminator 42 in
combination with an OR-exclusive-type logic circuit 46), which decrypts the
encrypted digital information Dj. Id. at Fig. 10; 20:621:14. Although these
circuits are described separately, these two circuits collectively comprise the
claimed decryptor that performs the steps recited in 1[e] and 1[f]. Ex. 1006 58.
To the extent it is alleged that Guillou lacks the said decryptor limitation
in 1(e) and 1(f) merely because Guillou discloses two decrypting circuits (one for
the encrypted digital control signal portion and one for the encrypted digital
information portion), it would have been obvious to a person having ordinary skill
in the art to combine both the K-restoring circuit 110 and the automatic decryption
means 38 (i.e., a discriminator 42 in combination with an OR-exclusive-type logic
circuit 46), to constitute a single multipurpose decryptor because this was merely a
matter of design tradeoffs such as signal processing requirements and cost. Ex.
1006 58, 6062, 67. It also would have been obvious to a person having
ordinary skill in the art to consider or refer to both the K-restoring circuit 110 and
the discriminator 42 logically as a single decryptor. Ex. 1006 58, 60, 6367.
25
3.
Claim 18
18(a) The
method as in
Claim 11
Guillou
The subscribers keys Ci is a signal necessary for decryption and is
received by the subscriber station from the subscription card 106
and card reader 36, by way of the subscription-card-charging
station 112 and subscription center 100, which are each sources
different than the emitting center 2, which transmits the
programming having a first encrypted digital control signal
portion and an encrypted digital information portion. Ex. 1007 at
Figs. 7, 10; 8:538; 15:4616:38; 16:5562; 20:4057; claim 6.
[A]t least one charging station 112 connected to the subscription
administration centre 100, from which it receives the signals
corresponding to the different subscribers keys Ci generated by
this centre; each of these stations is capable of temporarily
receiving subscription holders and recording in their memories 108
one of the subscribers keys Ci. Id. at 16:1117.
Claim 18
Guillou
The encrypted digital signals received via digital line 18 could
include computer data. Id. at Figs. 1, 2, 7; 1:1020.
26
Guillou
It also goes without saying that the disclosed broadcasting
system is used only by way of an example and that the invention
could be applied to other systems without any difficulty for the
man skilled in the art, and notably to the CEEFAX or ORACLE
systems or the VIEWDATA or PRESTEL systems. Id. at 21:23
28.
See also claim chart for Guillou limitation 1(a) with respect to
encrypted digital information portion.
4.
Claim 23
23(pre) A method
of processing
signals at a
receiver station,
said receiver
station having a
receiver, a digital
detector
operatively
connected to said
receiver for
detecting
encrypted digital
data, a decryptor
operatively
connected to said
digital detector
for decrypting
said encrypted
digital data, and a
controller
operatively
connected to said
digital detector or
Claim 23
Guillou
Guillou discloses a method for controlling the decryption of
programming at a receiver station, where the receiver station
includes the components claimed in this preamble. Figs. 7, 9,
and 10 show that the receiver station has a receiving circuit 14,
which is connected to a video-data separator 142, a selection
circuit 143, and a decoding circuit 145, each (or in
combination) serving as a digital detector for detecting
encrypted digital data. An automatic decryption means 38
(i.e., a discriminator 42 in combination with an OR-exclusivetype logic circuit 46) for decrypting the encrypted digital data
is connected to the decoding circuit 145. Finally, both the
decoding circuit 145 and a K-restoring circuit are operatively
connected to and control the automatic decryption means. Id.
at Figs. 2, 7, 9, 10; 7:4858; 10:4150; 19:430; 19:6520:52.
27
23(a) receiving a
plurality of
signals including
digital
programming and
inputting at least
some of said
plurality of
signals to said
digital detector;
Guillou
Guillou
varying pattern of timing
A new operating key K is generated (and therefore also
messages Mi) every five minutes. This transmission interval
does not have to be at a constant interval (aperiodic) and can
vary through the control of the headend system operator. Id. at
8:1114; 8:3943.
The advantage of the assembly described is that the user is in
control of the service life of the operating key K and of the
moments for inserting the access control page in the locked
magazine. Id. at 18:5255.
[A] generator 22 delivering a numerical signal representing
an operating key K, this key changing randomly at
predetermined intervals. Id. at 7:1012.
For each chargeable service, approximately every five
minutes, a new operating key K is generated at random, by
each distribution centre concerned. Thus, in the course of a
session of a service (one or more hours), several dozen
operating keys may succeed one another. Id. at 8:3943.
These keys have a relatively long service life (from 1 to 12
months), compared with the operating key (which is of the
order of a few minutes). Id. at 8:1114.
As soon as a distribution centre generates a new operating
key K, it calculates, for each current subscribers key in use Ci
for this service, a message Mi by means of an algorithm Mi =
FCi (K), with the keys Ci acting as parameters. Thus, for a
service using the subscription plan described above, there are
22 different messages in force at any one time. The duration of
a message is equal to that of the operating key K, and for a
given service, at any one time, there are as many messages as
there are subscribers keys in use. All the messages Mi in force
together constitute the information for access control
associated with the service being broadcast. This access
control information is obviously not locked up by the
29
Guillou
electronic lock. Id. at 8:4458.
varying pattern of . . . location
The receipt and storage of these messages into pages within
page memory 146 according to different subscriber
subscriptions results in a collection of messages stored across
an access control page. The messages are stored spatially in
different indexed page memory locations as part of the
detection process and before the decryption process. Id. at
8:559:2; 17:3943; 18:2551; claim 1.
In this instance, the messages Mi are grouped in a special
page, known as the access control page, which is updated each
time the operating key is changed. Id. at 8:6063.
However, among these functional pages, a new variety has
been introduced on emission for control purposes: this is the
access control page, whose structure is described hereinbefore.
Moreover, according to the invention, the pages of information
are locked up line by line, apart from the zero line which is
regarded as an integral part of the procedure. The circuit 145
therefore has to be completed in order to take these two new
elements into account. Id. at 19:5563
23(c) controlling
said decryptor to
Guillou
operating key K. This Cj is used to decrypt Dj to obtain
unencrypted digital data dj. Mi changes with each new
operating key K placed into service and causes the decoding
circuit 145 and a K-restoring circuit to alter the decryption
pattern or technique of the automatic decryption means 38
(i.e., a discriminator 42 in combination with an OR-exclusivetype logic circuit 46). Id. at Fig. 10; 20:621:14.
31
Claim 24
Guillou
Guillou discloses a method for controlling the decryption of
computer programming at a receiver station. Guillou teaches
the use of the disclosed access-control system with both
unidirectional broadcast systems and two-directional
32
24(a) storing a
procedure for
locating or
identifying a
specific digital
instruct-todecrypt signal in
a plurality of
signal types;
Guillou
interactive systems, including computer-programming
systems. Ex. 1007 at Abstract; Figs. 2, 710; 9:4810:66;
15:4216:17.
It also goes without saying that the disclosed broadcasting
system is used only by way of an example and that the
invention could be applied to other systems without any
difficulty for the man skilled in the art, and notably to the
CEEFAX or ORACLE systems or the VIEWDATA or
PRESTEL systems. Id. at 21:2328.
It can be used in the transmission and display of information
on television receivers for purposes of entertainment,
information or education. The invention applies essentially to a
broadcas[t] system (i.e. unidirectional) by means of which
alphanumerical information organised into pages and
magazines can be put into television lines and to interactive
system (i.e. two-directional) affording access to data bases
(general information, directories, etc.) and to interactive
services (transactions, messages, education) through the
telephone system. Id. at 1:1020.
The disclosed system has a stored procedure for locating or
identifying a specific digital instruct-to-decrypt signal. This
procedure involves decrypting only data octets Dj that are not
control codes (and therefore not encrypted). The decoding
circuit 145 and the automatic decryption means 38 (i.e., a
discriminator 42 in combination with an OR-exclusive-type
logic circuit 46) work together to identify which data octets
need to be decrypted and which can pass through without
decrypting. Id. at Abstract; Figs. 25, 7, 9, 10; 2:503:61;
5:4757; 6:2740; 7:1332; 7:478:4; 8:559:2; 10:927;
10:5115:35; 19:5563; 20:634.
Then, for each octet in the line, the decoder 145 causes the
generation of a decoding octet Cj (c6 = c7 = c8 = 0), and if the
octet Dj received is not a control code (columns 0 and 1),
which is verified by the comparator 42, the decoder combines
it, by OR exclusive, with the decoding octet in the gate 46.
33
Guillou
Id. at 20:3439.
[A]utomatic decryption means 38 comprising: (i) a
discriminator 42 with an input receiving the encrypted octets;
this discriminator is adapted to distinguish, among these coded
octets, those wherein the 7th and 6th binary elements are zero,
this discriminator having two outputs 43 and 44, the first
carrying these octets wherein the 7th and 6th binary elements
are zero, this first output being connected to the display means
20, the second carrying the coded octets Dj wherein the 7th
and/or 6th binary elements are not zero. Id. at 10:4150.
24(e) identifying
or locating said
specific digital
instruct-todecrypt signal by
processing said
detected data in
accordance with
said stored
information; and
Guillou
The encrypted digital control signal message Mi, encrypted
digital data octets Dj, and clear digital data octets are detected
by a video-data separator 142, a selection circuit 143, and a
decoding circuit 145 (either alone or in combination). These
components (either alone or in combination) pass Mi and Dj
and the clear octets to a decryptor (either a K-restoring circuit
110 or the automatic decryption means 38). See claim chart
for Guillou, limitation 1(b), with respect to detecting.
See also discussion below with respect to processor.
The data octets Dj that are not control codes (and therefore not
encrypted) are different and distinguishable from octets that
are control codes, which have a 0 in both columns 0 and 1.
The data in columns 0 and 1 of the data octets are digital
instruct-to-decrypt signals that indicate whether the data octet
would be encrypted (and later decrypted) or not; and these are
signals are identified or located by the discriminator to
determine whether to pass the data octet to the OR-exclusive
logic circuit for decryption. Id. at Fig. 10; see claim chart for
Guillou, limitation 24(a) and discussion below with respect to
storing a procedure for locating or identifying a specific
digital instruct-to-decrypt signal in a plurality of signal types
and claim chart for limitation 24(d) and discussion below with
respect to processor.
Id. at 5:4757.
The rules for decryption are analogous to the rules for
encryption; at each new octet received, belonging to an
encrypted line, a new decoding octet is generated. There are
35
Guillou
two possibilities: If the octet received belongs to columns 0
and 1, it is transmitted as it stands to the interpreting circuits;
If the octet received does not belong to columns 0 and 1
(because its 6th and/or 7th binary elements are not zero) it is
combined by an OR-exclusive circuit with the decoding octet
before interpretation is carried out. Id. at 6:2736.
The decryption of data octets Dj using the decoding octets Cj to
24(f) decrypting
at least some of
yield digital information dj. The decryption of Dj is instructed
said unit of digital to occur through the appropriate coding of columns 0 and 1 of
television or
the Dj. See claim chart for Guillou, limitation 1(f), with
computer
respect to decrypting and claim chart for limitation 24(e),
programming on with respect to identifying or locating said specific digital
the basis of said
instruct-to-decrypt signal.
identified or
located specific
digital instruct-todecrypt signal.
With respect to limitation 24(a), Guillou inherently discloses storing a
procedure for locating or identifying a specific digital instruct-to-decrypt signal in
a plurality of signal types because the system has a procedure for locating or
identifying a specific digital instruct-to-decrypt signal, therefore the procedure
must be stored for this functionality to exist. Ex. 1006 58. Specifically, the
decoding circuit 145 and the automatic decryption means 38 (i.e., a discriminator
42 in combination with an OR-exclusive-type logic circuit 46) work together to
identify which data octets Dj need to be decrypted and which data octets can pass
through without decrypting. Id.
36
37
U.S. Patent No. 4,225,884 (Block) is 102(b) prior art to the 304 patent
because it issued on September 30, 1980. Ex. 1008. Block describes a system for
subscription-television billing and access. Id. at Fig. 1; 2:3557. Fig. 1 shows an
embodiment of Blocks invention.
39
Claim 22
Claim 22
41
Id. at Fig. 2.
During the vertical retrace interval, various equalizing and
synchronization pulses are provided and it is in this interval
that the scrambled and program ID codes are preferably
combined with the transmitted program signal. These codes
are preferably encoded in a digital form as illustrated in FIG. 2
although it should be understood that any well known coding
technique such as the tone burst technique described in U.S.
Pat. No. 3,824,332 may be utilized. Id. at 4:675:7; Fig. 2.
Thus, for example, when the received scramble code RSC is
compared to the stored scramble code SSC and is identified as
an invert signal, the VCS signal causes the program video
unscramble 62 to invert the subsequent frame of video signals.
Similarly, when the received scramble code is compared with
the stored scramble code and is identified as a non-invert
signal, the video signal is passed by the program video
unscrambler 62 in an uninverted form. Id. at 7:1625.
See discussion below with respect to storing.
22(b) receiving at This limitation is rendered obvious by Guillou in view of
Block and Guillou 011 or by Guillou in view of Block,
said first remote
Guillou 011, and the knowledge of a person having ordinary
source a query
from said receiver skill in the art. See discussion below with respect to query.
Ex. 1007 at Figs. 7, 10; 15:6668; 16:1138; 20:617; 20:40
station;
52; claim 6.
42
Id. at Fig. 1.
43
Id. at Fig. 4.
The received scrambled code is supplied to a scramble code
comparator 66 and the received program code is supplied to a
conventional signal storage device 68 for storage and later
recall by the access unit 32. The scramble code comparator 66
receives a stored scramble code signal SSC from the signal
storage device 68 and generates the video and audio
unscramble control signals VCS and ACS, respectively.
These two signals are supplied to the respective program video
unscrambler 62 and the program audio unscrambler 60 in order
to reconstitute the scrambled video and audio signals to their
original form prior to scrambling by the program signal
scrambler 14 at the central station equipment. Id. at 6:68
7:14.
With respect to which is effective to enable decryption, this
limitation is satisfied as discussed in the claim chart for
Guillou, limitation 1(f).
22(d) transmitting With respect to transmitting . . . to said receiver station an
from a second
encrypted digital mass medium presentation signal, this
remote source to limitation is satisfied as discussed in the claim chart for
45
In Guillou, the
Claim 11
Guillou + Block + knowledge of one of skill in the art
Guillou discloses that the subscribers keys Ci is a signal
necessary for decryption and is received by the subscriber
station from the subscription card 106 and card reader 36, by
way of the subscription-card-charging station 112 and
subscription center 100. Ex. 1007 at Figs. 7, 10; 15:6668;
16:1138; 20:617; 20:4052.
In Block, the computer 20 sends scramble codes via telephone
lines to the access unit 32 of the subscriber station. The
computer 20 can be at a different location from the
broadcasting station. Ex. 1008 at Figs. 1, 4; 4:3236; 7:2668.
Similarly, the computer 20 may transmit a code to the access
unit 32 commanding it to generate a strobe or write signal STR
in order to transmit new scramble codes RSC through the
access unit to the signal storage device 68. During normal
operation, then, the signal storage devise may be supplied with
scramble codes for one months programs and at the end of
that month new scramble codes may be supplied for the next
50
Claim 16
Guillou + Block + knowledge of one of skill in the art
Block discloses a system where received program codes RPC
corresponding to programming that has been processed and
unscrambled are stored. These program codes RPC are stored
for transmittal to the billing computer 20 for billing. Ex. 1008
at Abstract; Figs. 1, 4; 2:3557; 3:5061; 4:1046; 5:2632;
6:1 39; 6:557:4; 7:2568; 10:3854; claims 1, 3, 4, 6, 10,
14.
The code detector 64, when enabled by the accept signal
ACC, detects the received scramble code RSC and the
received program code in the video signal. The received
scrambled code is supplied to a scramble code comparator 66
and the received program code is supplied to a conventional
signal storage device 68 for storage and later recall by the
access unit 32. Id. at 6:667:4.
To the extent that it is alleged that Guillou does not expressly teach the
limitation wherein said subscriber station stores information that evidences
processing said digital programming, it would have been obvious to a person
having ordinary skill in the art to combine the subscription-management subsystem
of Block with the Guillou system to achieve a system that performs the function of
stor[ing] information that evidences processing said digital programming
because Block stores program codes for billing purposes. Ex. 1006 79, 7578;
Ex. 1008 at 6:667:4. These program codes evidence processing said digital
programming because they indicate that the programs were unscrambled (or
52
81), U.S. Dept. of Commerce, Natl Bureau of Standards (Dec. 2, 1980) (FIPS
PUB 81) (Ex. 1014)
53
54
Id. at 15. With respect to claim 16, the exclusive-or operator stores, at least
temporarily, the I encryption input block, which evidences that the C cipher
was decrypted (evidencing processing said digital programming). With respect
to claim 18, FIPS PUB 81 discloses that the encrypted and decrypted digital
programming includes computer data. Id. at 1 (The Federal Data Encryption
55
FIPS PUB 81
Binary data may be cryptographically protected
(encrypted) using devices implementing the algorithm
specified in the Data Encryption Standard (DES)
(FIPS PUB 46) in conjunction with a cryptographic
key. Id. at 4; see id. at 1, 2, 7, 8, 14, 15.
FIPS PUB 81 teaches that the decrypt system
receives data, which comprises a C cipher block at
time = 1 and a C cipher block at time = 2. Id. at 7,
8, 15.
FIPS PUB 81
above.
FIPS PUB 81 teaches that the C cipher from time =
1 (encrypted digital information portion) is passed
forward to the exclusive-or operator at time = 2. Id.
at 7, 8.
FIPS PUB 81 teaches that an exclusive-or operation
is performed using this C cipher from time = 1 and
the I encryption input block at time = 2, and this
decrypts the C cipher from time = 1, resulting in
decrypted information (D data block at time = 2).
Id. at 7, 8.
[A]nd the resulting output block is exclusive-ORed
with the first cipher text block to produce the second
plain text data block. Id. at 8.
FIPS PUB 81 teaches that the decrypted data is
presented. Id. at 7, 8, 15.
Claim 16
16(a) The method as in
claim 1, or 14, wherein
said subscriber station
stores information that
evidences processing said
digital programming.
FIPS PUB 81
FIPS PUB 81 teaches that the exclusive-or operator
stores, at least temporarily, the I encryption input
block, which evidences that the C cipher was
processed and decrypted using the decryptor (DES
decrypt). Id. at 7, 8, 15.
Claim 18
18(a) The method as in
claims 1, or 14, wherein
said digital programming
includes computer data.
FIPS PUB 81
The Federal Data Encryption Standard (DES) (FIPS
46) specifies a cryptographic algorithm to be used for
the cryptographic protection of sensitive, but
unclassified, computer data. Id. at 1; see id. at 11, 15.
57
OBVIOUSNESS CONSIDERATIONS
A.
Reasons to Combine
A person having ordinary skill in the art would have had a reason to
combine Guillou and Block because they both relate to access-control systems for
broadcast- or cable-television-delivered programming. Ex. 1006 7678. More
specifically, both references relate to different techniques to encrypt/decrypt and
scramble/unscramble signals, embedded digital data, and programming that
enhance the convenience and security of the two systems.
Id.
A person of
ordinary skill in the art would have considered competitive designs for television
access-control systems and would have borrowed features from competitive
designs that they thought were useful, more efficient, or less costly. Id. Although
the teachings of Guillou and Block have some differences, the underlying accesscontrol technology and principles are identical.
Id.
As a result, various
components of the two references are compatible with and can be easily integrated
into the system of the other. Id.
Notably, the billing computer 20 and the access unit 32 of Block could be
considered a subscription-management subsystem that could be integrated into
other access-control program-distribution systems without difficulty. Ex. 1006
77.
59
CONCLUSION
Petitioner respectfully submits that this petition has demonstrated a
reasonable likelihood that claims 1, 11, 16, 18, and 2224 of the 304 patent are
unpatentable in view of the prior art. Thus, Unified requests that the Board grant
inter partes review for each of the proposed grounds for rejection.
Petitioner authorizes the Patent and Trademark Office to charge any required
fees to Deposit Account No. 15-0030, including the fee as set forth in 37 C.F.R.
42.15(a) and any excess claim fees.
60
22850
/Michael L. Kiklis/
Michael L. Kiklis (Reg. No. 38,939)
Attorney for UNIFIED PATENTS INC.
61
By:
62
/Michael L. Kiklis/
Michael L. Kiklis
Reg. No. 38,939