throbber
UNITED STATES PATENT AND TRADEMARK OFFICE
`____________
`
`BEFORE THE PATENT TRIAL AND APPEAL BOARD
`____________
`
`NETFLIX INC. AND HULU, LLC,
`Petitioners,
`
`v.
`
`DIVX, LLC,
`Patent Owner.
`____________
`
`Case IPR2020-00614
`Patent 7,295,673
`____________
`
`EXHIBIT 2008
`
`DECLARATION OF SETH NIELSON, PH.D.
`
`DivX, LLC Exhibit 2008
`Page 2008 - 1
`Netflix Inc. et al. v. DivX, LLC, IPR2020-00614
`
`

`

`
`
`I.
`
`II.
`
`TABLE OF CONTENTS
`
`Page
`
`INTRODUCTION ............................................................................................................... 1
`
`QUALIFICATIONS ............................................................................................................ 2
`
`III.
`
`APPLICABLE LEGAL STANDARDS ............................................................................ 10
`
`A.
`
`B.
`
`C.
`
`Priority Date of the Patent ..................................................................................... 10
`
`Level of Ordinary Skill in the Art ......................................................................... 10
`
`My Understanding of Legal Standards .................................................................. 12
`
`IV.
`
`THE CLAIMED INVENTION REDUCES THE PROCESSING AND
`SPECIALIZATION REQUIREMENTS FOR VIDEO ENCRYPTION. ......................... 14
`
`A.
`
`B.
`
`C.
`
`D.
`
`The Invention’s “Bounded Encryption Approach” Allows Partial Frame
`Encryption With Reduced Peak Processing Requirements. .................................. 16
`
`The Invention Allows Efficient Partial Encryption Without Special Decoders. ... 19
`
`The Invention Allowed Partial Frame Encryption On Low Power Consumer
`Devices. ................................................................................................................. 22
`
`Licensed Products Enjoying The Benefits Of The Invention Were Incorporated
`Into Millions Of Popular Consumer Video Devices. ............................................ 22
`
`V.
`
`THE PETITIONED GROUND FAILS TO SHOW THE “FRAME
`[ENCRYPTION][DECRYPTION] FUNCTION” (ALL CLAIMS). ................................ 24
`
`A.
`
`B.
`
`C.
`
`D.
`
`The Board Correctly Construes “Frame Encryption Function” To Require
`Specifying The Encryption Location Within The Frame. ..................................... 24
`
`The Petition And Dr. McDaniel’s Implicit Construction Of “Frame Encryption
`Function” Is Incorrect. ........................................................................................... 26
`
`Fetkovich Is Not Shown To Disclose The Claimed “Frame Decryption
`Function.”. ............................................................................................................. 29
`
`Demos And Ueno, Like Fetkovich, Are Not Shown To Disclose The Claimed
`“Frame Decryption Function.” .............................................................................. 34
`
`VI.
`
`THE PETITIONED GROUND FAILS TO SHOW THE “SYNCHRONIZED FRAME
`DECRYPTION STREAM” (ALL CLAIMS). .................................................................. 36
`
` i
`
`DivX, LLC Exhibit 2008
`Page 2008 - 2
`Netflix Inc. et al. v. DivX, LLC, IPR2020-00614
`
`

`

`
`
`A.
`
`B.
`
`C.
`
`The “Synchronized Frame Decryption Stream” Requires Decryption
`Information For Every Encrypted Frame. ............................................................. 36
`
`Fetkovich Has No “Synchronized Frame Decryption Stream.” ............................ 40
`
`The POSITA Would Not Have Modified Fetkovich In View Of Ueno To Add
`“A Synchronized Frame Decryption Stream.” ...................................................... 41
`
`1.
`
`2.
`
`The POSITA Would Not Have Modified Fetkovich To Achieve
`“Dynamically Changing Encryption Parameters” As Proposed. .............. 42
`
`The POSITA Would Not Have Modified Fetkovich To Improve
`Synchronization As Proposed. ................................................................... 45
`
`a.
`
`b.
`
`Ueno Does Not Teach Sending An Encryption Key With Each
`Frame To Achieve Synchronization. ............................................. 46
`
`The POSITA Would Not Have Supplemented Or Replaced
`Fetkovich’s Own Solution In Light Of Ueno. ............................... 48
`
`3.
`
`Petitioner’s Modifications Are Reverse-Engineered Hindsight. ............... 52
`
`D.
`
`Even If Motivation For It Were Shown, The Combination Is Not Shown To
`Meet The “Synchronized Frame Decryption Stream.” .......................................... 54
`
`VII.
`
`PETITIONER FAILS TO SHOW CLAIMS 5 OR 18 ARE OBVIOUS. ......................... 56
`
`VIII. PETITIONER FAILS TO SHOW CLAIMS 10 OR 19 ARE OBVIOUS. ....................... 58
`
`IX.
`
`CONCLUSION ................................................................................................................. 60
`
`
`
` ii
`
`DivX, LLC Exhibit 2008
`Page 2008 - 3
`Netflix Inc. et al. v. DivX, LLC, IPR2020-00614
`
`

`

`
`
`I.
`
`INTRODUCTION
`
`I, Seth Nielson, declare as follows:
`
`1.
`
`I have been retained on behalf of DivX, LLC (“DivX” and/or “Patent
`
`Owner”) for the above-captioned inter partes review to provide my expert opinions
`
`and expert knowledge. I understand that this proceeding involves U.S. Patent No.
`
`7,295,673 (“the ’673 patent”), EX1001. I understand that the ’673 patent is currently
`
`assigned to DivX.
`
`2.
`
`I understand that the present Petition for inter partes review challenges
`
`claims 1-6, 9-10, 13-19 (“the challenged claims” or “claims”) of the ’673 patent and
`
`was filed by Netflix Inc. and Hulu LLC (“Petitioners”) on February 29, 2020.
`
`3.
`
`I have been asked to provide my independent review, analysis, insights,
`
`and opinions regarding technical aspects of the ’673 patent and the Petition
`
`challenging the patentability of its claims. In particular, I have been asked to provide
`
`my analysis, insights, and opinions regarding the state of the art at the time of the
`
`alleged invention and how a person of ordinary skill in the art would have understood
`
`the ’673 patent disclosure at that time.
`
`4.
`
`In preparing this declaration, I have reviewed all of the references cited
`
`herein and in the Petition. In particular, I have reviewed and am familiar with the
`
`’673 patent and its prosecution history, and the references cited against it, discussed
`
`further below.
`
`
`
`1
`
`DivX, LLC Exhibit 2008
`Page 2008 - 4
`Netflix Inc. et al. v. DivX, LLC, IPR2020-00614
`
`

`

`
`
`5.
`
`In this declaration, I set forth the independent opinions that I have
`
`reached and the basis for those opinions in view of the information currently
`
`available to me. Such opinions are based, at least in part, on my experience for the
`
`past two decades with image and video processing, including video encryption. I
`
`reserve the right to supplement or revise my opinions should additional documents
`
`or other information be provided to me.
`
`6.
`
`I am being compensated at an hourly rate of $500/hour for my work on
`
`this case. My compensation is not dependent upon my opinions, my testimony, or
`
`the outcome of this case.
`
`II. QUALIFICATIONS
`
`7. My curriculum vitae (“CV”), a copy of which is provided as Attachment
`
`A hereto, provides details on my education, experience, publications that I have
`
`authored in the previous ten years, and a list of all cases in which, during the previous
`
`four years.
`
`8.
`
`I received a B.S. in Computer Science in 2000 and an M.S. in Computer
`
`Science in 2004, both from Brigham Young University in Provo, Utah. I received
`
`my Ph.D. in Computer Science in 2009 from Rice University in Houston, Texas.
`
`While working towards my Ph.D. at Rice University, I studied and published
`
`research related to networking and computer security. I am the recipient of the
`
`
`
`2
`
`DivX, LLC Exhibit 2008
`Page 2008 - 5
`Netflix Inc. et al. v. DivX, LLC, IPR2020-00614
`
`

`

`
`
`Brown Fellowship and a Graduate Fellowship from the Rice University Computer
`
`Science Department. I was also a John and Eileen Tietze Fellow at Rice University.
`
`9.
`
`I am a subject matter expert in cyber security, including the sub-fields
`
`of applied cryptography and network security. I am the Founder and Chief Scientist
`
`of Crimson Vista, a boutique computer security research and consulting company.
`
`Furthermore, I am an Adjunct Assistant Professor at the University of Texas at
`
`Austin, where I teach courses on computer security in both the Computer Science
`
`department and the Law School. I am also a Distinguished Scholar and
`
`Cybersecurity Fellow at the university’s Robert Strauss Center for International
`
`Security and Law.
`
`10.
`
`In all, I have twenty years of technical experience across engineering,
`
`consulting, and academic employment, engagements, and appointments.
`
`11. From 2001 through 2003, I worked as a software engineer at
`
`Metrowerks (formerly Lineo, Inc.), where I had substantial responsibilities relating
`
`to software architecture, computer networking, and technical project management.
`
`I also worked with our Set Top Box (STB) team investigating digital standards for
`
`transmitting video and audio data, including MPEG video streams.
`
`12. During the 2004 fall semester of my Ph.D. program at Rice University,
`
`I identified a security vulnerability in the Google Desktop Search that could have
`
`allowed hackers to compromise users’ computers and obtain private information.
`
`
`
`3
`
`DivX, LLC Exhibit 2008
`Page 2008 - 6
`Netflix Inc. et al. v. DivX, LLC, IPR2020-00614
`
`

`

`
`
`After contacting Google and assisting them in closing the vulnerability, we
`
`published the details of our investigation.
`
`13.
`
`In 2005, I completed an internship at Google, where I designed and
`
`implemented a solution to privacy loss in Google Web Accelerator. The Google
`
`Web Accelerator was designed to increase the speed of browsing the Internet. Once
`
`installed on a user’s computer, the browser would request all content through a
`
`Google Proxy. The proxy performed pre-fetching and extensive caching in order to
`
`provide fast and responsive service to the user. At the time of my internship, news
`
`reports had identified odd problems in which users of the Accelerator were accessing
`
`other individual’s private pages. During my internship, I designed and implemented
`
`a prototype solution for this issue in C++.
`
`14. From 2005 through 2011, I worked as a Security Analyst and later a
`
`Senior Security Analyst for Independent Security Evaluators. There, I developed a
`
`parallel-processing based security tool, developed a FIPS-certified encryption
`
`library, developed hardware-accelerated encryption algorithms, developed
`
`encrypted file-system prototypes, developed an encryption library for an ISE client,
`
`performed port-scanning analyses, evaluated security protocols using formal
`
`methods and hand analysis, and evaluated security failures.
`
`15.
`
`I also designed and managed the implementation of a secure
`
`communication technology that splits trust between multiple SSL Certificate
`
`
`
`4
`
`DivX, LLC Exhibit 2008
`Page 2008 - 7
`Netflix Inc. et al. v. DivX, LLC, IPR2020-00614
`
`

`

`
`
`Authorities, so that if one Certificate Authority is compromised, the communication
`
`stream can still be safely authenticated. My work on the secure communications
`
`technology project led to the issuance of multiple patents. In total, I wrote hundreds
`
`of thousands of lines of code in C, C++, and Python, including projects where I had
`
`to implement the same functionality in two separate languages.
`
`16.
`
`In 2011, I began work as a Research Scientist at Harbor Labs and
`
`continued with that consulting firm until fall 2015. I worked with a wide range of
`
`clients, specializing in network security, network communications, software
`
`architecture, and programming languages. I analyzed an extensive collection of
`
`commercial software, including software related to secure email, cloud-based
`
`multimedia delivery, document signing, anti-virus and anti-intrusion, high-
`
`performance routing, networking protocol stacks in mobile devices, PBX
`
`telecommunications software, VoIP, and peer-to-peer communications. I also
`
`analyzed security considerations for potential technology acquisitions, re-created
`
`heuristic signatures for 1995-era viruses, and re-created a 1995-era network for
`
`testing virus scanners of that time period in gateway virus scanning. I managed
`
`teams that reviewed technologies for compliance with various standards, such as
`
`HIPAA, and for security vulnerabilities.
`
`17. Also at Harbor Labs, I reviewed technology and source code for
`
`multiple clients related to accusations of theft and/or misappropriation of trade
`
`
`
`5
`
`DivX, LLC Exhibit 2008
`Page 2008 - 8
`Netflix Inc. et al. v. DivX, LLC, IPR2020-00614
`
`

`

`
`
`secrets. These engagements included an analysis of C, C++, Java, Python, and other
`
`source code languages in high-frequency trading, e-commerce, and other similar
`
`systems.
`
`18.
`
`I also assessed the security and privacy technologies and policies
`
`provided by a third-party vendor to the Center for Copyright Infringement (CCI).
`
`CCI represents content owners, such as the RIAA and the MPAA, in finding and
`
`reducing piracy online. Because this process necessarily involves collecting
`
`information about private individuals, I was asked to investigate and determine that
`
`the information collected from online computing devices was adequately
`
`safeguarded and protected.
`
`19. During my final year at Harbor Labs, I was engaged as the principal
`
`consultant with a large biomedical device firm in a twelve-month analysis of the
`
`security of their products. Notably, medical devices were for some time not
`
`considered significant threats in terms of computer security. However, recent
`
`demonstrations by security researchers of the various ways in which a malicious
`
`individual might harm a person using a medical device has shifted the thinking in
`
`the industry. Accordingly, I was engaged to assist this company in the analysis of
`
`their products, their process, and their future roadmap in order to ensure that patients
`
`are not harmed. I and my team analyzed design documents, hardware, and a broad
`
`range of additional resources in order to expose potential problems. The security of
`
`
`
`6
`
`DivX, LLC Exhibit 2008
`Page 2008 - 9
`Netflix Inc. et al. v. DivX, LLC, IPR2020-00614
`
`

`

`
`
`these systems depends, in part, on the architecture and deployment of the networks
`
`in which they operate.
`
`20.
`
`In March 2016, I founded Crimson Vista, Inc., a boutique technology
`
`consulting firm, with an emphasis in computer security topics. As the Chief Scientist
`
`of the company, I have consulted on computer-security topics such as the security
`
`of communications networks for financial technology (“FinTech”) companies,
`
`effective protections for website applications from intruders, and reverse
`
`engineering mobile phone security mechanisms.
`
`21.
`
`In addition to these kinds of consulting engagements, I provide training
`
`at data conferences such as Enterprise Data World and the Data Architecture
`
`Summit. I teach data specialists how to protect data and privacy in their applications
`
`and how to be aware of data security issues in practice.
`
`22. Through Crimson Vista, I also support the Crypto Done Right project,
`
`which aims to assist technology professionals in the correct and effective use of
`
`cryptography in their products and services. In 2019, I co-authored a book on
`
`Cryptography entitled, Practical Cryptography in Python: Learning Correct
`
`Cryptography by Example.
`
`23. At Crimson Vista, I also conduct research and development projects. In
`
`2018, I was awarded a grant from the United States Army for research into
`
`
`
`7
`
`DivX, LLC Exhibit 2008
`Page 2008 - 10
`Netflix Inc. et al. v. DivX, LLC, IPR2020-00614
`
`

`

`
`
`Ransomware Mitigation. We completed our research, in conjunction with Brigham
`
`Young University, in 2019.
`
`24.
`
`In addition to my consulting work, I maintain academic ties. In 2014, I
`
`received an appointment as a Lecturer at Johns Hopkins University and, in 2015, I
`
`advanced to an Adjunct Associate Research Scientist. From 2016 to 2019, I was
`
`also the Director of Advanced Research Projects for the Information Security
`
`Institute. During my time at Johns Hopkins University, I taught the Network
`
`Security and Advanced Network Security courses for which I created the curriculum
`
`from scratch. I published a paper about my curriculum entitled, “PLAYGROUND:
`
`Preparing Students for the Cyber Battleground.”
`
`25. One of the components of the students’ lab work is to create a protected
`
`“sandbox” for running untrusted code. The sandbox must provide access to the
`
`system in a manner that cannot be exploited. Conversely, the other half of their
`
`assignment is to design exploitative code that attempts to bypass and/or neutralize
`
`the protections of the sandbox environment. This experimental framework enables
`
`the students to learn about creating, identifying, and neutralizing malware such as
`
`viruses.
`
`26.
`
`In addition to my course instruction, I have also mentored Masters
`
`students at Johns Hopkins in their capstone projects. These projects include
`
`networking security and privacy concerns across a wide range of technologies
`
`
`
`8
`
`DivX, LLC Exhibit 2008
`Page 2008 - 11
`Netflix Inc. et al. v. DivX, LLC, IPR2020-00614
`
`

`

`
`
`including iOS security, Bitcoin, SSL vulnerabilities, and Twitter “botnets.” These
`
`are all contemporary issues in practical computer security.
`
`27. Although capstone projects from Masters students are not required to be
`
`publishable papers, I have had two different student teams with published results.
`
`These papers include “Potential forensic analysis of IoT data: an overview of the
`
`state-of-the-art and future possibilities” and “Cracking a Continuous Flow Reactor:
`
`A Vulnerability Assessment for Chemical Additive Manufacturing Devices.”
`
`28.
`
`In 2018, another group of students and I produced a technical report
`
`from their capstone entitled, “Securing ADS-B Based Airborne Collision Avoidance
`
`Systems.” This project added a cryptographic protocol on top of an otherwise
`
`unsecured communications system to protect the data transfer and prevent an
`
`attacker from faking the safety messages. Our work has been submitted to an
`
`industry partner that is promoting our design and submitting it for consideration with
`
`the FAA.
`
`29.
`
`I have since left Johns Hopkins University and have now taken an
`
`appointment as an Adjunct Assistant Professor at the University of Texas at Austin.
`
`In my new position, I teach the Network Security and Privacy class to
`
`undergraduates. My curriculum includes security topics related to cryptography and
`
`key management. I also teach the Technology of Cybersecurity in the Law School.
`
`
`
`9
`
`DivX, LLC Exhibit 2008
`Page 2008 - 12
`Netflix Inc. et al. v. DivX, LLC, IPR2020-00614
`
`

`

`
`
`30.
`
`In addition to my work in consulting and academia, I have also provided
`
`expertise and guidance to government bodies. In early 2019, I testified in front of
`
`both the Maryland House of Delegates and the Maryland State Senate on matters
`
`relating to a Ransomware bill. I have also advised government antitrust agents on
`
`the key features of certain hardware security modules.
`
`III. APPLICABLE LEGAL STANDARDS
`
`31. When considering the ’673 patent and stating my opinions, I rely on the
`
`following legal standards as described to me by the attorneys for DivX.
`
`A.
`
`32.
`
`Priority Date of the Patent
`
`I understand that the analysis of alleged obviousness of the Patent
`
`should be performed from the perspective of a POSITA as of the priority date of the
`
`Patent. The Patent claims priority to October 23, 2002.
`
`33. Because all of the references relied upon for the Petition’s grounds are
`
`alleged to quality as prior art as of the priority date of October 23, 2002, I have not
`
`had the occasion, and have not been asked, to form an opinion on the priority date
`
`of the ’673 Patent.
`
`B.
`
`Level of Ordinary Skill in the Art
`
`34.
`
`I understand that various factors should be considered when determining
`
`the person of ordinary skill in the art in connection with a particular patent. I
`
`understand that these include, without limitation: (a) the educational level of the
`
`
`
`10
`
`DivX, LLC Exhibit 2008
`Page 2008 - 13
`Netflix Inc. et al. v. DivX, LLC, IPR2020-00614
`
`

`

`
`
`inventors and that of practitioners and other inventors in the art (e.g., degrees,
`
`subjects, etc.); (b) the type of problems encountered in the art; (c) prior art solutions
`
`to such problems; (d) the speed at which innovations are made in the art; and (e) the
`
`sophistication of the invention.
`
`35. Dr. McDaniel opines that a Person of Ordinary Skill In The Art
`
`(“POSITA”) would have
`
`A bachelor’s degree in electrical engineering, computer science, or a
`similar field with at least two years of experience in streaming video
`security (which would include experience with video encoding and
`cryptography), or a person with a master’s degree in electrical
`engineering, computer science, or a similar field with a specialization
`in streaming video security.
`
`Ex. 1003 [McDaniel Decl.] ¶ 60.
`
`36.
`
`I disagree with Dr. McDaniel to the extent that he specializes the level
`
`of ordinary skill to “streaming video.” The Patent explains that the field of invention
`
`is “encryption and efficient decryption of video information.” Patent, 1:15-17. The
`
`Patent does not explain that it is, and I do not believe that it is, limited to “streaming
`
`video.” Therefore, a specialization in “streaming video” is overly specialized as
`
`relative to the field of the Patent. Rather, the POSITA would generally have some
`
`generalized knowledge in video security.
`
`
`
`11
`
`DivX, LLC Exhibit 2008
`Page 2008 - 14
`Netflix Inc. et al. v. DivX, LLC, IPR2020-00614
`
`

`

`
`
`37. As further discussed below, my opinions as stated in this declaration are
`
`valid even if the Board adopts a slightly different level of ordinary skill in the art,
`
`including if the Board adopts the level of ordinary skill proposed by Dr. McDaniel.
`
`C. My Understanding of Legal Standards
`
`38.
`
`I understand that a patent claim is unpatentable if the claimed invention
`
`would have been obvious to a person of ordinary skill in the art at the time of the
`
`purported invention.
`
`39.
`
`I understand that an obviousness analysis involves comparing a claim to
`
`the prior art to determine whether the claimed invention would have been obvious
`
`to a person of ordinary skill in the art at the time of the invention in view of the prior
`
`art and in light of the general knowledge in the art as a whole. I also understand that
`
`obviousness is ultimately a legal conclusion based on underlying facts of four
`
`general types, all of which must be considered: (1) the scope and content of the prior
`
`art; (2) the level of ordinary skill in the art; (3) the differences between the claimed
`
`invention and the prior art; and (4) any objective indicia of non-obviousness.
`
`40.
`
`I also understand that obviousness may be established under certain
`
`circumstances by combining or modifying the teachings of the prior art. Specific
`
`teachings, suggestions, or motivations to combine any first prior art reference with
`
`a second prior art reference can be explicit or implicit, but must have existed before
`
`the date of purported invention. I understand that prior art references themselves
`
`
`
`12
`
`DivX, LLC Exhibit 2008
`Page 2008 - 15
`Netflix Inc. et al. v. DivX, LLC, IPR2020-00614
`
`

`

`
`
`may be one source of a specific teaching or suggestion to combine features of the
`
`prior art, but that such suggestions or motivations to combine art may come from the
`
`knowledge that a person of ordinary skill in the art would have had.
`
`41.
`
`I understand that a reference may be relied upon for all that it teaches,
`
`including uses beyond its primary purpose, but also including teachings that lead
`
`away from the invention. I understand that a reference may be said to teach away
`
`when a person of ordinary skill, upon reading the reference, would be discouraged
`
`from following the path set out in the reference, although the mere disclosure of
`
`alternative designs does not teach away.
`
`42.
`
`I further understand that whether there is a reasonable expectation of
`
`success from combining references in a particular way is also relevant to the
`
`analysis.
`
`43.
`
`I understand that it is improper to use hindsight to combine references
`
`or elements of references to reconstruct the invention using the claims as a guide.
`
`My analysis of the prior art is made from the perspective of a person of ordinary skill
`
`in the art at the time of the invention.
`
`44.
`
`I am not offering any legal opinions in this declaration nor am I qualified
`
`to do so. I only consider such legal standards in framing my opinions and conclusions
`
`as well as placing assertions made by Petitioner in the Petition into the proper
`
`context. Additionally, from a subject matter perspective, I understand that the
`
`
`
`13
`
`DivX, LLC Exhibit 2008
`Page 2008 - 16
`Netflix Inc. et al. v. DivX, LLC, IPR2020-00614
`
`

`

`
`
`petitioner always has the burden of persuasion regarding a challenge of patentability
`
`of an invention under an inter partes review.
`
`IV. THE CLAIMED INVENTION REDUCES THE PROCESSING AND
`SPECIALIZATION REQUIREMENTS FOR VIDEO ENCRYPTION.
`
`45. The patent claims a novel approach to efficiently protecting compressed
`
`video from unauthorized access by only partially encrypting it yet still making it
`
`adequately secure.
`
`46. The person of ordinary skill in the art (POSITA) at the time of the
`
`invention was aware that computer security is an unpredictable, “ever-changing” art
`
`in which there is no generally accepted measure of when a certain level of security
`
`has been achieved, Ex2011 [Hofmeyr-1999], 2, and “researchers are still finding
`
`vulnerabilities in some of the oldest technologies used online,” EX2012 [Rossi-
`
`2015], 1. See EX2013 [Mirkovic-2010], 1, 3 (emphasizing “unpredictability and
`
`complexity” of cyber-security “challenges” and advocating “large-scale
`
`experimentation” to address them) (emphasis in original); Ex2014 [Benzel], 18.
`
`47. Encryption to protect valuable data from unauthorized access is one
`
`unpredictable aspect of computer security. See Ex2015 [Anderson-21001], 51, 59-
`
`50, 70-71 (explaining that in data security “[i]n general, the boundary between
`
`crypto and access control is a fault line where things can easily go wrong”).
`
`48. Encrypting less than all of a data stream, while still making the data as
`
`a whole adequately secure, adds more uncertainty. See Ex2016 [Gueron], 25 (noting
`
`
`
`14
`
`DivX, LLC Exhibit 2008
`Page 2008 - 17
`Netflix Inc. et al. v. DivX, LLC, IPR2020-00614
`
`

`

`
`
`that such “[a]rchitectural innovations bring performance gains but can also create
`
`new security vulnerabilities.”). Unsurprisingly, prior to the claimed invention there
`
`was a string of failed attempts to achieve this goal in video processing.
`
`49.
`
`In 1996, for example, an IEEE experimental study noted the need for an
`
`effective and efficient selective encryption method for secure video dissemination
`
`under the MPEG standard, and found that due to “[t]he very nature of MPEG
`
`encoding,” “commonly available software and hardware encryption mechanisms
`
`often c[ould] not encrypt entire MPEG streams without severely degrading
`
`performance and quality of service.” EX2017 [Agi], 1. The study’s authors tested,
`
`and rejected, numerous “previously proposed selective encryption schemes for
`
`MPEG video security” (including one the Petition cites as supposed evidence of
`
`obviousness, Pet., 6 (citing Ex. 1008)), as “inadequate for sensitive applications,”
`
`explaining that their experiments showed that each of these proposed schemes
`
`actually left valuable data “clearly visible even if the video sequence [wa]s
`
`‘encrypted.’” Id., 1–5. The authors then experimented with further “obvious ways
`
`of improvement,” but found through testing that their own proposed partial
`
`encryption scheme for effectively protecting video also failed to achieve that goal.
`
`Id., 7–8. They recommended further experimentation on “a wide range of video
`
`samples” to gain “insight” into the “interesting issues” involved in making selective
`
`or partial video encryption “efficient” and “effective.” Id., 1, 7–8.
`
`
`
`15
`
`DivX, LLC Exhibit 2008
`Page 2008 - 18
`Netflix Inc. et al. v. DivX, LLC, IPR2020-00614
`
`

`

`
`
`50. Despite this technological unpredictability, and these failures of others,
`
`the ’673 Patent’s inventors devised an undisputedly novel approach to partial
`
`encryption that solved some of these difficult problems.
`
`A. The Invention’s “Bounded Encryption Approach” Allows Partial
`Frame Encryption With Reduced Peak Processing Requirements.
`
`51. One specific benefit of the claimed invention arises from its “bounded
`
`encryption approach” to protect streaming video. Patent, 10:30. As the inventors’
`
`disclosure explained, “the maximum processing power required to both decrypt and
`
`decode a frame increases proportionally to its size.” Patent, 3:39-41. In other words,
`
`the more data in a frame, the more processing power can be required to decrypt and
`
`decode it. Id. To ensure that the largest expected frames can be successfully
`
`decrypted at the playback device, adequate decrypting/decoding processing power
`
`is needed. Patent, 3:42-45. “This requirement may significantly increase system
`
`cost and complexity, even though only a relatively small percentage of received
`
`frames may necessitate use of the full extent of available peak processing power.”
`
`Id., 3:45-48.
`
`52. The ’673 Patent addresses this longstanding problem with a “unique
`
`approach” to protecting streaming video that uses “bounded encryption,” which
`
`involves “bounding the resources consumed during decryption, thereby reducing
`
`peak processing requirements” compared to those “that would otherwise be required
`
`using standard encryption techniques” for protected video. Id., 3:49-51, 5:25-27,
`
`
`
`16
`
`DivX, LLC Exhibit 2008
`Page 2008 - 19
`Netflix Inc. et al. v. DivX, LLC, IPR2020-00614
`
`

`

`
`
`10:29-34. The invention, inter alia, allows the frame to be only partially encrypted
`
`and the location and size of partial encryption specified for each frame, including by
`
`byte offset and number of bytes, with the frame decryption information being
`
`synchronized with the set of encrypted frames into a synchronized frame decryption
`
`stream and the protected stream being assembled using the set of encrypted frames
`
`and the frame decryption information. Patent, e.g., 6:25-35, 6:61-67, 7:25-8:4, 8:57-
`
`64, 9:23-39, 10:29-34. This “unique approach” of the invention allows the
`
`processing power necessary to decrypt each frame to be bounded in advance, since
`
`each frame is only encrypted at the byte offset within the frame and for a specified
`
`number of bytes. See also Patent, 1:16-20, 3:49-51, 10:30-34.
`
`53. The benefits of the Patent’s “bounded encryption” were not possible
`
`with prior art partial frame encryption methods like Petitioner’s Fetkovich reference.
`
`A system like Fetkovich teaches partially encrypting a frame based on a given frame
`
`substructure, such as slices or macroblocks, as opposed to a set number of bytes.
`
`EX1005 [Fetkovich], 5:28-37. For example, each frame may have eight different
`
`slices, and Fetkovich may encrypt every fourth slice. Id., 6:24-40. But the same
`
`unpredictability that exists with respect to frame size, Patent, 3:33-49, also exists
`
`with respect to frame substructures. See Section V.C, infra. In other words, just as
`
`a decryption processor must allocate enough resources to decrypt the largest possible
`
`frame in a full encryption system, it must allocate enough resources to decrypt the
`
`
`
`17
`
`DivX, LLC Exhibit 2008
`Page 2008 - 20
`Netflix Inc. et al. v. DivX, LLC, IPR2020-00614
`
`

`

`
`
`largest possible frame substructure in a system like Fetkovich. Id. Thus, the
`
`decryption processing power cannot be bounded at a pre-determined level because
`
`the frame substructure, just like the frame itself, can vary in size. Id.
`
`54.
`
`In the ’673 Patent, the inventors reported that this “[b]ounded
`
`protection” required “substantially less leak processing power... during the
`
`decryption process than would otherwise be required using standard encryption
`
`techniques.” Patent, 10:18-34, FIGS. 3, 10. In addition—and significantly, in light
`
`of the unpredictable effectiveness of partial or selective encryption, see EX2

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket