throbber

`
`IN THE UNITED STATES PATENT AND TRADEMARK OFFICE
`––––––––––
`BEFORE THE PATENT TRIAL AND APPEAL BOARD
`––––––––––
`NETFLIX, INC. AND HULU, LLC,
`
`Petitioners,
`v.
`DIVX, LLC,
`Patent Owner.
`––––––––––
`Case No. IPR2020-00614
`U.S. Patent 7,295,673
`––––––––––
`
`PETITIONERS’ REPLY
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`

`

`
`
`
`
`
`
`
`
`TABLE OF CONTENTS
`
`
`I.
`
`II.
`
`Frame Encryption/Decryption Function ........................................................ 3
`A.
`The Petition is consistent with the Board’s construction. .................... 3
`B.
`The Board’s construction does not exclude encryption
`algorithms, nor should it. .................................................................... 5
`The challenged claims do not require location to be specified in
`bytes. .................................................................................................. 6
`PO contradicts its own arguments. .................................................... 10
`Using bytes was not a “unique approach.” ........................................ 11
`The claims cannot be limited to using bytes, regardless of
`purported benefits. ............................................................................ 12
`Synchronized Frame Decryption Stream ..................................................... 14
`A.
`PO admits this limitation is met by Ground 1.................................... 14
`B.
`Lossy channels are irrelevant to synchronization. ............................. 16
`C.
`Ground 1 includes sending decryption information with each
`frame. ............................................................................................... 16
`1.
`Demos provides express and unrebutted motivation................ 17
`2.
`Ground 1 improved reliability. ................................................ 18
`3.
`The combination improves security. ....................................... 19
`The claims do not require including decryption information
`with each frame................................................................................. 24
`III. Claims 5, 18 ................................................................................................ 25
`IV. Claims 10, 19 .............................................................................................. 26
`V.
`PO attempts at distraction fail. .................................................................... 26
`A.
`PO does not argue secondary considerations. .................................... 26
`B.
`Computer security and encryption were not unpredictable. ............... 27
`VI. Conclusion .................................................................................................. 29
`
`
`C.
`
`D.
`E.
`F.
`
`D.
`
`
`
`
`
`
`
`
`-2-
`
`
`
`
`
`

`

`
`
`
`
`
`
`
`
`PO only disputes two limitations: frame encryption/decryption function and
`
`synchronized frame decryption stream. PO’s arguments fail with respect to both
`
`because they are contradicted by the evidence and PO’s previous admissions.
`
`I.
`
`Frame Encryption/Decryption Function
`A. The Petition is consistent with the Board’s construction.
`The ID construed “frame encryption function” to require “specifying the
`
`location, by layout or offset, of a portion in a frame to which encryption is applied
`
`and the pattern of application of each layout or offset with respect to each type of
`
`frame in a set of frames.” Paper 11 (“DDI”), 7-11; Paper 13 (“ID”), 7. The Board
`
`correctly held that this construction is satisfied by Ground 1. ID, 13-16.1
`
`Petitioners explained how Ground 1 satisfies the frame
`
`encryption/decryption function by teaching, e.g., two aspects: (1) encryption
`
`algorithms and (2) a selection process that specifies portions of selected frames to
`
`encrypt/decrypt, e.g., with encryption parameters. Pet., 33-35; ID, 14-16; Ex-1019,
`
`¶¶15-16. This meets the Board’s construction because the selection process
`
`specifies the location, by layout and/or offset, of a portion in a frame to
`
`
`1
`Petitioners do not agree that the claims require “specifying … the pattern of
`application of each layout or offset with respect to each type of frame.” The ’673
`patent uses permissive rather than restrictive language in describing this feature.
`Ex-1001, 8:5-18 (“It may also be desired ….”). Nonetheless, this limitation is
`satisfied by Ground 1 (Ex-1019, ¶¶2-14), which PO does not dispute.
`
`
`
`
`
`
`-3-
`
`
`
`
`
`

`

`
`
`
`
`
`encrypt/decrypt (a selected portion) and the pattern of application for each layout
`
`
`
`or offset with respect to each type of frame in a set of frames (selected frames,
`
`including I and P frames). Ex-1019, ¶¶2-14; Paper 12, 2-11.
`
`For “frame encryption function,” Fetkovich and Demos teach the use of
`
`encryption algorithms “to encrypt selected portions of selected frames in
`
`accordance with encryption parameters.” Pet., 33;2 Ex-1003, ¶153. Demos teaches
`
`selecting frames, and “Fetkovich teaches encryption parameters to select which
`
`slices or macroblocks in a frame are encrypted…” Pet. 33; Ex-1003, ¶¶155-156.
`
`The combination therefore specifies location by layout and offset. Ex-1019, ¶5.
`
`Alternatively, Demos by itself specifies the location, by layout, of encrypted
`
`portions by, e.g., “using DES, Triple DES, or Blowfish to encrypt selected portions
`
`of selected frames.” Pet. 35; Ex-1003, ¶¶162-169; Ex-1019, ¶¶6, 16. For both
`
`alternatives, Demos specifies the pattern of application for I and/or P frame types.
`
`Ex-1019, ¶¶7-14; Ex-1003, ¶163; Ex-1006, 23:17-24:18.
`
`Petitioners analyzed the portions of the ’673 specification the Board also
`
`relied on. Pet., 34-35 (citing Ex-1001, 5:25-43, 8:5-18, 9:62-10:11); Ex-1003,
`
`¶161; cf. DDI, 7-11. Providing an implicit claim construction (ID, 7-8) is
`
`consistent with Federal Circuit precedent, which holds that petitions are not
`
`2 All emphasis added.
`
`
`
`
`
`
`
`
`-4-
`
`
`
`
`
`

`

`
`
`
`
`
`required to explicitly construe every term. See Ericsson Inc. v. Intelectual.
`
`
`
`Ventures I LLC, 901 F.3d 1374, 1381 (Fed. Cir. 2018).
`
`PO mischaracterized Dr. McDaniel’s declaration by omitting the portions of
`
`those sentences that explain, e.g., that DES is used “to encrypt selected portions of
`
`selected frames in accordance with encryption parameters.” See POR 16-17; Ex-
`
`1003, ¶153, ¶162; Ex-1019, ¶17. PO also cites to a discussion of Ueno’s
`
`encryption algorithm, while omitting the preceding and subsequent sentences, both
`
`of which discuss the use of encryption parameters because the frame encryption
`
`function includes both components. See POR, 21; Pet. 35; Ex-1019, ¶18.
`
`This was explained in Petitioners’ request for rehearing, which was timely
`
`and did not raise new arguments or evidence. Paper 12, 2-11. Liberty Mutual is
`
`inapposite because Petitioner’s position was not ambiguous. Regardless, “[p]arties
`
`are not barred from elaborating on their arguments on issues previously raised.”
`
`Chamberlain Grp., Inc. v. One World Techs., Inc., 944 F.3d 919, 925 (Fed. Cir.
`
`2019); Ericsson Inc. v. Intellectual Ventures I LLC, 901 F.3d 1374, 1381 (Fed. Cir.
`
`2018).
`
`B.
`
`The Board’s construction does not exclude encryption algorithms,
`nor should it.
`Consistent with the claims’ “comprising” transitions, the Board held that
`
`frame encryption function does not exclude “a combination that includes
`
`conventional encryption algorithms” and invited the parties to address this further.
`
`
`
`
`
`
`-5-
`
`
`
`
`
`

`

`
`
`
`
`
`ID, 14. PO declined the Board’s invitation, contending the frame encryption
`
`
`
`function “is not the same thing as an encryption transformation, such as … DES.”
`
`POR at 17. Notably, PO did not argue, and the ’673 patent never suggests, that the
`
`frame encryption function cannot include AES/DES.3
`
`The ’673 specification uses DES/AES to encrypt selected portions of frames.
`
`Ex-1001, 3:30-33, 8:19-30 (“[O]nce the encryption offset has been generated[,]”
`
`DES/AES “may be applied to the frame portion encrypted pursuant to step 718.”);
`
`Ex-1019, ¶¶15-21. Experts for Petitioners and PO agree that an encryption
`
`algorithm is required for encrypting selected portions of frames. Ex-1003, ¶¶75,
`
`115, 159-160; Ex-1019, ¶19; Ex-1029, 208:18-209:2.
`
`C. The challenged claims do not require location to be specified in
`bytes.
`For frame encryption/decryption function, PO only disputes whether Ground
`
`1 specifies the location by layout or offset. PO and Dr. Nielson argue that “[t]he
`
`Patent leaves no ambiguity that ‘offset’ refers to a byte offset.” POR, 59; Ex-2008,
`
`¶144. However, Dr. Nielson contradicted this opinion during his deposition. Ex-
`
`1029, 202:19-203:14 (“Q. Is it your opinion that when the claims refer to offset,
`
`
`3
`PO’s infringement contentions cite AES to argue that the frame encryption
`function is met. Ex-1024, 24-25; Ex-1023, 0022; Ex-1029, 171:22-172:6.
`
`
`
`
`
`
`-6-
`
`
`
`
`
`

`

`
`
`
`
`
`offset refers to nothing more than a byte offset? … A. … so I suppose that could
`
`
`
`be not in bytes.”).
`
`Dr. Nielson’s deposition answer was correct: while bytes are used in some
`
`embodiments, the ’673 specification uses broader language of “units” and makes
`
`clear that bytes are just one non-limiting example of the units in an encryption
`
`layout. Ex-1001, 6:25-38 (“In an exemplary embodiment… twelve data units (e.g.,
`
`bytes) would be encrypted at the location consistent with the applicable encryption
`
`layout format”); Ex-1019, ¶23. The specification provides an example where the
`
`“unit” is significantly larger than a byte: “if five units of data are to be encrypted
`
`and the frame size is ten units, any resulting offset will be constrained to be
`
`between one and five units.” Ex-1001, 7:53-8:4.4
`
`The ’673 patent allows location and size to be specified based on “units,”
`
`which PO admits includes slices and macroblocks. POR, 7 (“The partial frame
`
`encryption references raised by the Petition identify the partially encrypted
`
`portions of the frames based on frame sub-structures defined by video standards
`
`such as slices or macroblocks (or even more specialized units).”). Therefore, PO
`
`
`4 Here, the frame is 10 units. The “unit” cannot be a byte because 10 bytes would
`be on the order of pixels, not a frame. A pixel is 8, 16, or 32 bits (1-4 bytes), and
`typical frames had 640x480 (307,200) pixels. Ex-1001, 1:35-40. Ex-1019, ¶¶23-24.
`
`
`
`
`
`
`-7-
`
`
`
`
`
`

`

`
`
`
`
`
`admits the prior art specifies location, consistent with the Board’s construction and
`
`
`
`the ’673 specification.
`
`A POSITA would have understood “unit” as a broad term that includes
`
`known units in video data. Ex-1019, ¶¶22-25. The ’673 specification discloses
`
`encryption/decryption of MPEG video. See Ex-1001, 5:55-6:24, 7:15-52, 9:23-39,
`
`10:52-55, 10:60-11:16, FIG. 5. MPEG video frames are organized around units
`
`that determine the location of data within the frame. Ex-1019, ¶25. Slices and
`
`macroblocks are common units of video data. Id.; Ex-1006, 22:63-23:7 (“Such
`
`units may consist of … sub-frame units (such as … macro blocks…)”); Ex-1005
`
`(Fetkovich), 4:30-44 (“… an MPEG stream can be described as including the
`
`following units: … picture, slice, and macroblock.”).
`
`When asked whether slices were MPEG “video units,” Dr. Nielson referred
`
`to Demos and stated, “I would say that slices are either a unit in MPEG-4 or there
`
`is a similar concept.” Ex-1029, 148:22-149:20. “So for the timeframe for Demos
`
`here… definitely macroblocks are a unit in the MPEG-4 standard …” Ex-1029,
`
`150:5-19.
`
`Beyond offset, the ’673 patent explains that “[f]rames may support
`
`numerous encryption layout approaches” (Ex-1001, 5:41-43), including header,
`
`middle, and as Dr. Nielson admits, other layouts. Ex-1029, 198:12-199:6.
`
`Dr. Nielson admitted that “layout” is not synonymous with “offset”. Ex-1029,
`
`
`
`
`
`
`-8-
`
`
`
`
`
`

`

`
`
`
`
`
`201:12-202:15. Therefore, the ’673 patent encompasses broader notions of location
`
`
`
`that are not limited to bytes.
`
`Ignoring the broader disclosures in the specification, PO asks the Board to
`
`limit “frame encryption/decryption function” to specific examples. This is
`
`improper, and the Federal Circuit has repeatedly warned against it. See, e.g.,
`
`Phillips v. AWH Corp., 415 F.3d 1303, 1323 (Fed. Cir. 2005); Nazomi
`
`Communications, Inc. v. ARM Holdings, PLC, 403 F.3d 1364, 1369 (Fed. Cir.
`
`2005).
`
`PO concedes that Fetkovich “specif[ies] portions of the frame to be
`
`encrypted…” POR, 23, 31. PO only disputes whether it specifies “location” in
`
`bytes—which, as explained above, is not required by the claims. Therefore,
`
`Fetkovich satisfies the Board’s construction of frame encryption function.
`
`Demos teaches “location” because it specifies a location to encrypt based on
`
`“units” of video data including AC and DC coefficients. Ex-1006, 23:37-42 (“Sub-
`
`units of frames may be encrypted….”), 23:37-24:19. The ’673 patent states that the
`
`location of encrypted portions may be specified based on “units.” Ex-1001, 6:31-
`
`35, 8:1-4, 8:21-24. As noted in the ID, Demos specifies the portions to be
`
`encrypted by layout or offset. ID, 15-16. Therefore, Demos satisfies this limitation.
`
`Ex-1019, ¶6.
`
`
`
`
`
`
`-9-
`
`
`
`
`
`

`

`
`
`
`
`
`
`
`
`PO contradicts its own arguments.
`D.
`PO argues that slices and macroblocks do not “have a fixed ‘location’ in the
`
`frame.” POR, 23. However, the ’673 patent does not require the location of the
`
`encrypted portion to be the same for each frame—in some embodiments the
`
`location of the encrypted portion for each frame varies. See, e.g., Ex-1001, FIG. 5.
`
`6:3-24.
`
`Moreover, PO contradicts its own district court allegations, which rely on
`
`encrypting portions of slices within a frame (which, according to PO, change
`
`location). For the frame encryption function, PO accuses H.265 encryption of
`
`selected NAL units (slices), including parameters that specify portions of NAL
`
`units within a frame to encrypt. Ex-1024, 17-21 (“… For example, within the first
`
`sample, subsample 8 is an IDR slice (as shown below), a NAL unit containing
`
`video information. This subsample contains 80 encrypted bytes and 11
`
`unencrypted bytes.”). As PO admits, a NAL unit is a slice. Ex-1024, 22 (“The IDR
`
`slice and TRAIL_R slices discussed above are VCL NAL units and carry frame
`
`information.”); Ex-1025, 0023, 0029; Ex-1029, 178:14-180:17, 187:25-189:22.
`
`Therefore, PO alleged the frame encryption function is satisfied by
`
`specifying the location of encrypted portions of a frame based on slices. Those
`
`slices (NAL units) are variable in size and not “fixed” bytes that PO now contends
`
`are necessary. Ex-1025, 0052, 0082; Ex-1029, 193:10-194:8.
`
`
`
`
`
`
`-10-
`
`
`
`
`
`

`

`
`
`
`
`
`
`
`
`Even if “fixed” location were required, it is nonetheless met. Fetkovich
`
`teaches a delay parameter that includes a delay of zero. Ex-1005, 5:57-60
`
`(“Delay… This number is zero-origin”). In other words, encryption is applied to
`
`the first macroblock or slice of the selected frame—which has a fixed location.
`
`E. Using bytes was not a “unique approach.”
`PO concedes that partial encryption was known, contending the ’673 patent
`
`had a “unique approach” of using bytes instead of frame sub-structures. POR, 26.
`
`However, PO’s specification support does not mention bytes; it vaguely references
`
`“various encryption techniques” and an “encryption layout.” Ex-1001, 5:25-29.
`
`Indeed, the phrase “frame sub-structures” appears nowhere in the ’673 patent.
`
`During prosecution, the Applicant never mentioned bytes or sub-frame
`
`structures. The sole Office Action, in describing the “frame encryption function,”
`
`cited portions of Nardone that do not explicitly specify location/size using bytes.
`
`Ex-1002, 0072-0073; Ex-1010, 4:14-5:9. In response, the Applicant appears to
`
`have conceded that Nardone teaches the frame encryption function by amending
`
`claim 1 to add other limitations including, e.g., a key table. Ex-1002, 0092.
`
`The prior art is replete with partial frame encryption based on bytes. O’Brien
`
`encrypts a portion of selected frames “from one byte to an entire frame.” Ex-1007,
`
`¶¶0041-0042. Matsuda encrypts a fixed data length of N bytes in each I frame. Ex-
`
`1026, 145:3-8. Dr. Nielson’s opinion regarding the novelty of using bytes did not
`
`
`
`
`
`
`-11-
`
`
`
`
`
`

`

`
`
`
`
`
`include analysis of O’Brien, Matsuda, or other references (see Ex-2008, ¶80; Ex-
`
`
`
`1029, 231:21-233:7, 235:22-236:4, 237:18-238:24), even though O’Brien was
`
`discussed in the Petition. Pet., 7, 16-17.
`
`F.
`
`The claims cannot be limited to using bytes, regardless of
`purported benefits.
`None of the challenged claims mention byte-based encryption. The Board’s
`
`construction does not mention bytes. PO seeks to limit the Board’s construction to
`
`specific examples in the ’673 specification. Even if those examples had benefits, it
`
`would still be improper to limit the claims to those examples because none of the
`
`purported benefits constitute “clear and unmistakable” disavowal of embodiments
`
`lacking the benefits. i4i Ltd. P'ship v. Microsoft Corp., 598 F.3d 831, 844 (Fed.
`
`Cir. 2010), aff'd, 564 U.S. 91, 131 S. Ct. 2238, 180 L. Ed. 2d 131 (2011).
`
`PO’s supposed benefits are irrelevant and also incorrect. First, PO argues
`
`that “the main embodiment of the ’673 patent”—“header layout”—cannot function
`
`if modified to use sub-frame structures. POR, 27. But “header layout” is not a main
`
`embodiment; it is one of “numerous encryption layout approaches.” Ex-1001,
`
`5:41-43; Ex-1019, ¶27. Furthermore, Ground 1 combines prior art—it does not
`
`
`
`
`
`
`-12-
`
`
`
`
`
`

`

`
`
`
`
`
`modify the ’673 patent and does not require encrypting both the header and
`
`
`
`selected macroblocks/slices.5
`
`Second, PO claims that Fetkovich does not allow CPU processing to be
`
`bounded. POR, 27-28. Fetkovich states otherwise, explaining that “the ability to
`
`partially encrypt a transmission allows a system to control the amount of resources,
`
`for example, CPU cycles …” Ex-1005, 3:15-39. PO admits Fetkovich’s inventor
`
`was a POSITA “and more likely an expert in the field.” POR, 48; Ex-1029, 89:3-
`
`16. Therefore, experts in the field agreed that Fetkovich provided bounded
`
`encryption years before the ’673 patent.
`
`Third, without support, PO argues the ’673 patent enabled “generic
`
`decoders,” in contrast with “specialized decoder[s]” that “could perform both the
`
`decryption and decompression.” POR, 7-9. However, the only decoder in the ’673
`
`specification includes decryption and decompression—a specialized decoder
`
`according to PO. Ex-1001, 10:60-11:16 (“[V]ideo decoder 1230 containing a video
`
`decryption module 1237 … the decrypting digital video decoder 1230 also includes
`
`an entropy decompression unit 1235 and a video processing unit 1240.”), FIG. 12.
`
`Byte-based encryption would not enable “generic decoders” because it still
`
`
`5
`Even if required, the entire frame does not have to be decrypted at once—the
`frame header can readily be decrypted before slices/macroblocks within the frame
`are. Ex-1019, ¶¶26-27.
`
`
`
`
`
`
`-13-
`
`
`
`
`
`

`

`
`
`
`
`
`requires parsing the video structure to identify the frame boundaries of variable-
`
`
`
`sized frames—this requires both video decryption and decompression capabilities.
`
`Ex-1029, 156:14-16, 156:25-157:6, 156:13-22; Ex-1001, 2:5-7.
`
`II.
`
`Synchronized Frame Decryption Stream
`PO admits this limitation is met by Ground 1.
`A.
`Claim 1 recites “generating frame decryption information” and then
`
`“assembling” that information with video frames “to produce the protected
`
`stream.” PO stated in district court that frame decryption information is
`
`synchronized with encrypted frames by interleaving the information with
`
`corresponding frames, e.g., as opposed to appending the information after all video
`
`frames. Pet., 50; Ex-1011, ¶276 (“…Netflix synchronizes the frame decryption
`
`information by interleaving the PIFF Sample Encryption Boxes (uuid) and media
`
`data, or ‘mdat,’ boxes throughout the MP4 file.”); Pet., 50.
`
`Petitioners analyzed this element consistent with the PO’s admissions and
`
`the plain and ordinary meaning of “synchronized,” including express teachings of
`
`“synchronizing signals” in Ueno. See Pet., 46-51. PO does not dispute that Ground
`
`1 teaches generating, assembling, and interleaving the frame decryption
`
`information with corresponding video frames. Incredibly, PO argues against
`
`Ground 1 in direct contradiction of its district court representations, arguing that
`
`“[e]ven if the combination interleaves encryption keys with frames … that is not
`
`
`
`
`
`
`-14-
`
`
`
`
`
`

`

`
`
`
`
`
`shown to synchronize the two.” POR, 55. PO makes no attempt to explain this
`
`
`
`contradiction and cannot do so for the first time on Sur-Reply.
`
`PO argues frame decryption data must be sent with each frame and include
`
`frame numbers. POR, 45, 57-58. But PO never explains why this would be
`
`necessary, other than suggesting the claim should be limited to the embodiment of
`
`FIG. 9. POR, 33. This would be improper under Federal Circuit precedent. See
`
`supra, 9.
`
`PO also makes vague references to the word “stream” even though its expert
`
`Dr. Nielson admitted that “stream” has “little meaning” when interpreted by itself.
`
`Ex-1029, 216:19-217:8. Dr. McDaniel explained that the combination of Ground 1
`
`includes a synchronized stream. When asked “what makes [the frame encryption
`
`information] a stream,” Dr. McDaniel explained, “I would have to think about that
`
`some. You know, certainly what’s disclosed in the combination represents a stream
`
`of information which is sent with the video.” Ex-2009, 95:5-15. The POR omitted
`
`the italicized sentence, without ellipses or any other indication, and represented to
`
`the Board that Dr. McDaniel was unable to provide an answer. POR, 37. That is
`
`untrue.
`
`Lastly, contrary to PO’s representations (POR, 34-36), “synchronized frame
`
`decryption stream” was not the sole reason for allowance. It was but one of several
`
`
`
`
`
`
`-15-
`
`
`
`
`
`

`

`
`
`
`
`
`amendments including the addition of a “table of encryption keys.” Ex-1002, 0141-
`
`
`
`0148; Ex-1003 ¶¶84-85.
`
`Lossy channels are irrelevant to synchronization.
`B.
`PO argues about lossy channels, implying the requirements for synchronized
`
`frame decryption stream vary depending on whether it is sent over lossy or lossless
`
`channels. POR, 55-59. However, the challenged claims do not mention channels at
`
`all. Nor does the specification say anything about networking protocols, packets, or
`
`channels, either lossy or lossless. Thus, synchronization cannot include
`
`requirements about network delivery or packet ordering.
`
`There is simply no basis to argue that a synchronized frame decryption
`
`stream would need particular features to account for lossy or lossless channels.
`
`Instead, as PO admitted, synchronization is accomplished by interleaving frame
`
`decryption information with corresponding video frames. Ex-1011, ¶276.
`
`C. Ground 1 includes sending decryption information with each
`frame.
`The combination of Ground 1 starts with Ueno as the primary reference,
`
`with Ueno’s general encryption framework as a base and adding details of partial
`
`encryption and video streaming from Fektovich and Demos. Pet., 18; Ex-1003
`
`¶110. Therefore, the combination begins with Ueno’s key table and its teaching
`
`that, “in some cases, the cipher key number is … transmitted with each of frames.”
`
`Ex-1004, 2:5-9; Pet., 50-51. Fetkovich’s encryption parameters are included with
`
`
`
`
`
`
`-16-
`
`
`
`
`
`

`

`
`
`
`
`
`Ueno’s key number, which is sent with each frame. Pet., 20; Ex-1003, ¶115. Given
`
`
`
`that Ueno provides this teaching in the background section, there is no ambiguity
`
`that this feature was known in the art.6
`
`Petitioners explained at least three motivations for applying Ueno’s
`
`teachings, one of which remains entirely unrebutted. Pet., 50; Ex-1003 ¶186.
`
`Demos provides express and unrebutted motivation.
`1.
`Sending decryption information with each frame facilitated Demos’
`
`teachings of only encrypting frames from I and P frames, every other minute of
`
`frames, or frames of particularly important plot or action scenes. Ex-1003 ¶¶128-
`
`132, ¶188 (citing discussion for claim 3), ¶¶194-195; ID, 15; Pet., 51; Ex-1006,
`
`22:29-44, 23:26-24:18; Ex-1019, ¶¶7-9.7 Ueno provides a straightforward
`
`mechanism, which PO did not dispute, for turning encryption on/off using key
`
`number zero. Ex-1003 ¶195. Sending this information with each frame provides a
`
`simple mechanism that is flexible enough to turn encryption on/off on a per-frame
`
`basis for Demos’s selection of individual frames and potentially arbitrary selection
`
`of important frames or alternating periods. Ex-1003 ¶195; Ex-1019, ¶12. The
`
`
`6
`The ID found that Ueno explicitly teaches this limitation. ID, 19.
`7
`Fetkovich reinforces Demos with additional motivation: “an MPEG stream
`may be transmitted using varying levels of encryption depending upon the
`sensitivity of the video material.” Ex-1005, 4:30-63; Pet., 24.
`
`
`
`
`
`
`-17-
`
`
`
`
`
`

`

`
`
`
`
`
`combination of Ueno, Fetkovich, and Demos provides this synergy with small
`
`
`
`overhead in terms of bytes/second. Ex-1003 ¶195; Ex-1019, ¶¶10-13.
`
`PO ignored this motivation from Demos, which therefore remains
`
`unrebutted. PO cannot attempt to address it for the first time on Sur-Reply. Based
`
`on the unrebutted evidence, a POSITA had at least one motivation—all KSR
`
`requires. KSR Int'l Co. v. Teleflex Inc., 550 U.S. 398, 419-422 (2007).8
`
`2. Ground 1 improved reliability.
`Sending the key number with each frame minimizes data loss because any
`
`synchronization discrepancies would be automatically recovered at the next frame.
`
`Pet., 51; Ex-1003, ¶187. PO argues that the same number of frames would be lost
`
`“on average” compared to sending the key only when updated. POR, 50. However,
`
`PO’s focus on “average” loss ignores the number of consecutive lost frames. In
`
`PO’s example, sending the key when updated would result in 100 consecutive lost
`
`frames, until the next key update (over 3 seconds of interruption for 30 fps video).
`
`Sending the key with each frame results in randomly-distributed lost frames, with
`
`each loss recovered at the next frame—a barely noticeable 1/30 of a second. Ex-
`
`1019, ¶¶28-29.
`
`
`8
`Hulu v. Sound View is inapposite because the Petitioners explained several
`motivations to apply Ueno’s explicit teachings.
`
`
`
`
`
`
`-18-
`
`
`
`
`
`

`

`
`
`
`
`
`
`
`
`The prior art knew how to account for channel loss. Both Ueno and
`
`Fetkovich maintain synchronization in lossy channels, including, for example, with
`
`synchronization signals. Pet., 23, 43-48; Ex-1004, 1:67-2:9, 4:13-17, 6:34-39,
`
`7:28-32, Figs. 17, 4, 6; Ex-1005, 7:35-67.
`
`Moreover, the combination is not limited to lossy channels.9 Ueno and
`
`Demos both state that their teachings are not limited to any particular transmission
`
`system. Ex-1004, 1:21-31 (“A transmission line 3 connecting the transmitter 1 and
`
`the receiver 2 is not particularly limited …”); Ex-1006, 29:9-14.
`
`The combination improves security.
`3.
`Regular key changes make cracking the keys more difficult because
`
`cryptographic attacks rely on having large amounts of data encrypted using the
`
`same key. Ex-1003 ¶116. Ueno allows rapid key changes by sending a key
`
`number, rather than the key itself, and managing keys in a key table. Ex-1003
`
`¶116; Ex-1019 ¶¶32-33. Sending decryption information with each frame improves
`
`security by allowing frequent key changes. Ex-1003 ¶¶186-188.
`
`PO does not dispute that this method would improve security; PO only
`
`argues it was “not common”10 because of limited device capabilities in 2002,
`
`
`9 POSITAs knew how to use lossless channels for video streaming. Ex-1019, ¶30.
`10 Dr. Nielson could not provide any criteria to determine whether technology is
`“common.” Ex-1029, 104:8-106:8. He admitted he did no investigation before
`
`
`
`
`
`
`
`-19-
`
`
`
`
`
`

`

`
`
`
`
`
`including limited dial-up Internet connections in 2002. POR, 40-42. This argument
`
`
`
`is unsupported. In fact, Dr. Nielson admitted that broadband Internet, such as DSL,
`
`was available in 2002. Ex-1029, 224:19-21, 225:8-13. Moreover, PO did not cite
`
`any authority (it cannot) for the notion that a combination must be “common.”
`
`Regardless of whether sending key numbers with each frame was common,
`
`it makes sense for this particular combination as Petitioners explained based on the
`
`specific teachings of the references (Pet., 18-28), which PO did not address.
`
`Notably, PO argues that “[i]n downloadable systems, security was improved by
`
`increasing key size, not by changing the key with every frame.” POR, 40. This is
`
`irrelevant because the combination is based on video streaming, which PO
`
`distinguished from video downloads. Pet., 18; Ex-1030, 40 (“Lindahl is not even
`
`about streaming media… Lindahl utilizes a system that downloads an entire
`
`media…”), 40-43.
`
`Moreover, Fetkovich teaches changing the key frequently, including
`
`multiple times a frame: “the key is to be updated every n slices” (there are many
`
`slices per frame), or “the key is to be updated every n bytes” (there are many bytes
`
`per frame). See Ex-1005, 5:61-6:2; Ex-1019, ¶31. Fetkovich thus provides express
`
`motivation.
`
`
`arguing “it was not generally common in or around 2002 to send the encryption
`key with each and every frame of video.” Ex-1029, 107:9-22; Ex-2008, ¶127.
`
`
`
`
`
`
`-20-
`
`
`
`
`
`

`

`
`
`
`
`
`
`
`
`PO argues that three times as many processor cycles are needed to setup a
`
`key as compared to one decryption operation, which for AES encrypts a 128-bit
`
`block of data. POR, 43. However, many blocks are decrypted for each frame, and
`
`Dr. Nielson admits the “key setup cost” would only be incurred once “for each
`
`frame.” Ex-2008 ¶108; Ex-1019, ¶¶32-33. This would not have discouraged a
`
`POSITA—it certainly did not discourage Fetkovich, who PO admits was a
`
`POSITA. POR, 48.
`
`PO’s argument—that changing keys per frame was uncommon—is
`
`contradicted by positions it took in district court (CDCA-2:19-cv-1602), which
`
`allege infringement based on AES in CTR mode—the predominant mode for the
`
`most widely-used encryption algorithm in 2002. Ex-1027, 71:15-16; Ex-1023,
`
`0022-0023; Ex-1029, 173:6-18. According to PO, AES-CTR (prior art from before
`
`2002) changed encryption keys multiple times a frame, or even every byte
`
`according to Dr. Nielson. Ex-1029, 167:21-171:9. PO alleges that “[t]he AES-CTR
`
`cipher generates frame encryption keys (i.e., the key stream output of the AES-
`
`CTR cipher)” where each frame encryption key generated this way encrypts one
`
`block (128 bits) of data.11 Ex-1024, 25-26. Dr. Nielson testified that AES in CTR
`
`
`11 AES-CTR is an AES operation mode with 128-bit (16-byte) block size. Ex-
`1029, 169:11-15.
`
`
`
`
`
`
`-21-
`
`
`
`
`
`

`

`
`
`
`
`
`mode encrypts one byte of data using one byte of the keystream, “us[ing] one byte
`
`
`
`of the keystream and then the next[.]” Ex-1029, 171:22-172:14.
`
`PO argues at length against “sending the key” with each frame. POR, 39, 41,
`
`44, 45, 47-48, 50-58. For example, PO contends “keys should not be multiplexed
`
`in the stream in an ‘overt[]’ manner because that would reduce the ‘overall
`
`security.’” POR, 51.12 But PO ignores its own exhibit. PO relies on “security
`
`through obscurity,” which its exhibit admits is considered “a Bad Thing” in
`
`cryptography. Ex-2019, 2. “There are really no compelling arguments against
`
`public disclosure of security algorithms and protocols.” Id. Fetkovich never
`
`mentions “security through obscurity,” and PO offers no reason Fetkovich would
`
`follow a “Bad Thing.” Id.
`
`Moreover, Ground 1 is based on Ueno, which “changes keys by sending key
`
`numbers, rather than keys themselves.” Pet., 21. Sending key numbers are smaller
`
`and safer than keys. By storing keys in tables and using corresponding key
`
`numbers, Ueno enables rapid key changes (Ex-1003, ¶116) with less initialization
`
`time than using newly-received keys. Dr. McDaniel explained that, given the small
`
`size of key numbers, “the security and reliability benefits … far outweighed the
`
`
`12
`PO misrepresents Fetkovich, which cautions that overt transmissions may
`have less overall security but nonetheless teaches sending parameters in defined
`PES or transport packets. Ex-1005, 8:11-26.
`
`
`
`
`
`
`-22-
`
`
`
`
`
`

`

`
`
`
`
`
`miniscule increase in data size.” Ex-1003, ¶187, ¶138 n. 5. PO does not dispute
`
`
`
`this fact.
`
`Therefore, PO’s arguments about the difficulty of sending keys are irrelevant
`
`to the combination, which uses Ueno’s key tables and numbers.13 PO attacks
`
`Fetkovich by itself without consi

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket