Apple, Inc. v. Motorola, Inc. et al

Filing 92

Declaration of Christine Saunders Haskett filed by Plaintiffs Apple, Inc., NEXT SOFTWARE, INC. re: 90 Motion Requesting Claims Construction (Attachments: # 1 Ex. 1 Moto Infring. Cont. Ex. A, # 2 Ex. 2 '157 patent, # 3 Ex. 3 '179 patent, # 4 Ex. 4 '329 patent, # 5 Ex. 5 '230 file history, # 6 Ex. 6 Oxford dictionary definition, # 7 Ex. 7 '559 file history, # 8 Ex. 8 The OSI Model, # 9 Ex. 9 ISO Standard, # 10 Ex. 10 Japanese file history, # 11 Ex. 11 Japanese prosecution appeal, # 12 Ex. 13 Moto Infring. Cont. Ex. E, # 13 Ex. 14 IEEE Standard, # 14 Ex. 15 '333 patent, # 15 Ex. 16 '721 file history, # 16 Ex. 17 '193 file history, # 17 Ex. 18 Moto Infring. Cont. Ex. F, # 18 Ex. 19 Merriam Webster Dictionary, # 19 Ex. 20 Webster's Dictionary) (Haslam, Robert)

Download PDF
EXHIBIT 10 2 Response to Office Action Accepted October 30, 2003 (H.15) Dear Mr. Shigenori Aoki Commissioner of the Japan Patent Office 1. Case Patent Office 15.10.31 Applicant Support Division Tanaka Patent Application H7-507561 (PCT/US 94/07672) 2. Title of the Invention Method and Apparatus for Providing Cryptographic Protection of a Data Stream in a Communication System 3. Applicant Address 1303 East Algonquin Road Shaumburg, Illinois 60196 United States of America Name (Nationality) 4. Agent Motorola Incorporated United States of America Address Ikeuchi International Patent Office Sekiuchi Kawashima Building 1-4-2 Ohta-cho, Chuo-ku Yokohama, Kanagawa 231-0011 Tel: 045 (211) 2795 Name of the Agent (8357) Yoshiaki Ikeuchi Yoshiaki Ikeuchi Patent Attorney 5. Date Office Action was received April 17, 2003 (H15) (sent on April 30, 2003) Examination Illegible 92 6. Reasons (1) We received the Office Action dated on April 17, 2003 (H15) (sent on April 30, 2003 (H15)) regarding the above referenced application. Claims 1-4, 9 and 10 were rejected on the ground in which they do not meet the requirements for patentability stipulated in the main clause of the Article 29(1) of the Patent Law (Reason A). Furthermore, the claims were rejected due to the inaccuracy of the Specification and Drawings in the application, which failed to meet the requirements for patentability stipulated in the Patent Law Article 36(4) (Reason B). Additionally the following references,: 1. D. W. Davies and W. L. Price authors / Tadahiro Uwazono, “Network Security” Japan, Nikkei, McGraw Hill. December 5, 1985, 1st Ed. 1st Printing, pg. 307-312 2. Publication of Japanese Laid Open Patent Application S63-167588 were cited in the Office Action, and the invention in relation to Claims 1-10 in this application was denied under the Patent Law Article 29 (2) (Reason C). Therefore, the Applicant has amended the Claims, Specification and Drawings in the application in order to clarify the nature of this invention by submitting this response and the amendment. Depending on the amended Claims, it is believed to resolve the reasons for rejection; thus, the detailed explanation will be provided in the following paragraphs. (2) All the Claims in the previously submitted application were reexamined in this response and the amendment, and Claims 1-3 and 9-10 were corrected based upon the Specification and Drawings in the previously submitted application in order to response to Reasons A and C in the Office Action. Further, in order to match the description with the drawing in the Specification to respond to Reason B 93 the reference number 158 indicating “RX ARQ Buffer” in Figure 1 was corrected to 168 . (3) It is thought that the aforementioned amended Claims should directly respond to the rejection reasons in the Office Action. First of all, Reason A were amended in order to explain clearly methods of invention relating to each of Claims 1, 9 and 10 which occur at a transmitting or receiving communication unit. The terminology used for these corrections are based upon those seen in Claims 5-8, Abstract, the Detail Description of the Invention and Figure 1 in the original Claims. It is believed that those corrections have clarified how specific apparatus, in other words hardware resources, should be applied in order to solve technical problems. Therefore, Claims 1-4, 9 and 10 should be considered an invention defined in the Patent Law Article 2 and it meets the patentability requirements defined in the Patent Law Article 29. Second, the following paragraphs response to Reason B. First, paragraph (1) includes “…as seen in Figure 1, …is performed,” which is found on lines 14-19 on page 7 of the Specification and Figure 1 itself do not agree. Thus, “on Layer 3” on line 18 on page 7 of the Specification was corrected to “within Layer 3” for further clarification. 94 As clearly drawn in Figure 1, a data stream 108 on Layer 3 is transferred to Layer 2 (102) by Layer 3 (110) and encryption (102) occurs at Layer 2 (102) to a data stream received from Layer 3 (a data stream on Layer 3). Therefore, the corrections match the figure with the description. Second, regarding paragraph (2), all the radio communications meet radio communication protocols. By meeting an appropriate protocol (this protocol depends on a type of communication systems, such as cdma 2000 communication system, GSM communication system, or UMTS communication system.), it makes a cellular phone manufactured by a company such as Motorola Incorporated possible to communicate with a base unit manufactured by another company such as Lucent Technologies, and all such devices must function in accordance with the protocols. All the radio protocols define bits transmitted by a radio, including identification of what bit corresponds to the one on Layer 2 and what bit corresponds to the one on Layer 3. In other words, the protocols identify where bits on Layer 2 should be embodied and where bits on Layer 3 should be embodied. Further, identifying where on Layer 2 bits are located and where on Layer 3, including higher Layers, the ones should be located enables all the receiving communication units to extract bits on Layer 2 from a receiving data packet prior to transmitting the remaining packet to Layer 3. The protocols do not require encryption. Encryption skills are owned properties, which means it belongs to a manufacturer of the device and it should never be controlled by the protocols. Consequently, even if a data is encrypted, it must still meet the appropriate radio protocols, 95 and accordingly bits on an encrypted Layer 3 or higher layers still remain the ones on Layer 3 or higher Layers respectively, and they are also embodied in a data packet on Layer 3 or the one on higher Layers. Therefore, even if bits are encrypted, how to distinguish bits on higher Layers from the ones on Layer 2 is well known so that it is followed by all the cellular systems. Hence, despite encryption, the method for separating bits on Layer 3 or the higher from the ones on Layer 2 is well known and it is perceived that those skilled in the art should easily achieve. Moreover, the reference number 158 indicating the “RX ARQ Buffer” in Figure 1 has been corrected to 168 as seen in paragraph (3). This is believed to solve the discrepancy between the Detail Explanation of the Invention and Figure 1. Further, the reference number 158 corresponds to the data stream which flows from Layer 2 (104) to Layer 130 (160). Next, a response to Reason C in the Office Action will be given below. It is described in the Office Action that “the reference 1 (network security) mentions an encryption method for encrypting only the data field (data link service data unit).” Further, as an input to a random sequence generator, it describes a transmission unit which applies a value by converting an initial value data which is updated intermittently by a key data as an input to a random sequence generator, and it outputs a random signal which is used to scramble and descramble a video signal. It is a matter of design choice as to whether what data should be adopted as an intermittently updated key data. 96 However, it should be addressed that deciding a function used during the data encryption process is not merely a matter of design choice. Specifically, because a radio transmission is extremely vulnerable to intrusion, a function to make search more complicated is always sought. Typically, the key must be selected and transmitted to each of the terminals of the communication path in order to encrypt information with the key. In other words, prior to exchanging data, it must be transmitted to both the transmitting and receiving communication units. Even if the key can be updated during the transmission process, it needs to be initialized to some value and the initial value must be transmitted to the terminals of each of the receiving portions prior to transmitting the encrypted data. For instance, as described in the Background of the Invention in this application, the encryption technology which was proposed to prove cellular at the time of this invention includes exchange in special messages between communication units, and the messages were used to generate the shared secret data. Because the key or the data used to generate keys must be divided among communication units which are involved in communications prior to the data exchange, it is critical that a secret key is only provided to an authorized user during encryption. This is specifically said to a radio communication because it can be intercepted by similar communication units and the division of the key was also intercepted by any units with a radio receiver. In order to solve the problem related to the key management, an encryption technology utilizing the packet sequence number, the transmit overflow sequence number and the session key for data encryption will be provided in Claim 1 of this application. The packet sequence number and transmit overflow sequence number are not the keys. They are neither identified nor divided by the communication units at each of the terminals of the communication path, nor they are derived from the divided data. 97 The packet sequence number is a data which is embodied in each of the exchanged data packets and which can be modified but not repeated by the data packets. Therefore, it is not necessary to exchange a key or a message to establish the key prior to communication and it also results in saving bandwidth as well as improving the stability. Additionally, the overflow sequence number is never transmitted to the terminals of the communication path. They are neither embodied in the data packet nor derived from the data embodied in the data packet. The overflow sequence number is determined by the transmitting communication unit and the receiving communication unit. Unlike the key or the packet sequence number, there is no chance to intercept the overflow sequence number; thus, it provides a higher level of security. Therefore, the use of the packet sequence number and the overflow sequence number to encrypt/decrypt data cannot be easily achieved by those skilled in the art, and it is merely not a choice to select a variable as a key among from many others. Thus, it is obvious that those skilled in the art cannot easily invent Claim 1 and relating Claims 24 in this application based upon the citations. Furthermore, Claims 5, 7 and 9 in this application also disclose the encryption/decryption skills utilizing the packet sequence number, the transmit overflow sequence number and the session key. Thus, it also cannot be easily invented by those skilled in the art on the same ground as the above. Moreover, since Claim 6 relates to Claim 5 and so as Claims 8 and 7, it is perceived that Claims 6 and 8 have patentability. 98 (4) As seen above, all the Claims amended by this response and the amendment should be recognized an invention as defined by the Patent Law Article 2 and they also clarify the Specification and Drawings. Further, it cannot be easily invented by those skilled in the art by relaying on the citations. Therefore, it is perceived that this invention should not be rejected under the scope of the main clause of the Article 29(1), 36(4) and 29(2) of the Patent Law. The Applicant requests a decision to grant a patent in this application. 99 Patent Application H07-507561 Dispatch No.: 435917 Dispatch Date: December 16, 2003 (H15) Office Action Patent Application Number Drafting Date Patent Examiner Applicant’s Agent Applicable Article 1/ 7th Year of Heisei (1995) Patent No. 507561 December 5 15th year of Heisei (2003) AOKI, Shigenori 4229 5M00 IKEUCHI, Yoshiaki (and 1 other) No. 36 The present application should be rejected for the reason given below. If the applicant has any objection against this notice, it should be submitted within three months from the date this notice was sent. Reason The present application does not comply with the requirements stipulated in the Patent Law Article 36(4) with respect to the following points described in the Specification and Drawings. Note In the invention according to Claims 1~10 of the Specification of the present application, a method for encrypting a packet at the transmitting communication unit as a function of a packet sequence number and a transmit overflow sequence number and a method for decrypting the encrypted packed as a function of the packet sequence number and the receiving overflow sequence number at the receiving communication unit. Here, it is mentioned in the Detailed Description of the Invention of the Specification of the present application that a pseudo random bit stream used to encrypt and decrypt packetized data stream segments must be identical to the one used at the transmitting communication unit and the receiving communication unit, and the packet sequence number is transmitted to the receiving communication unit as unencrypted header information. However, the pseudo random bit streams consist of values that depend on transmitting overflow sequence numbers and receiving overflow sequence numbers at the transmitting side and the receiving side respectively, and for example, according to the response to the Office Action submitted on October 30th of Heisei 15 (2003), the overflow sequence numbers are never transmitted to the terminals of the communication path without being embedded into the data packet and deriving from data embedded in the data packet, and judging from the description of the independent determination of the overflow sequence numbers by the respective transmitting and receiving communication units (see especially page 7 lines 6-13), the transmitting communication unit and the receiving communication unit generally take respective independent values; 109 Patent Application H07-507561 Dispatch No.: 435917 Dispatch Date: December 16, 2003 (H15) 2/E therefore, the pseudo random bit streams at the sending and receiving sides cannot generate the same value. Upon further examination, the method described in the Specification of the present application makes decryption impossible so that it cannot provide a method and apparatus for cryptographically protecting data stream in a communication system, which is the purpose of the invention of the present application. Therefore, a description is not provided to the extent those skilled in the art can achieve based on the Drawings and Specification of the present application. In the event that further reasons for rejection are discovered, you will be notified of such reasons. -------------------------------------------------------Prior Art Examination Results - Fields Searched: H0 4L9 / 22 - Prior Art IPC 7th Edition None in particular The prior art examination results do not constitute the grounds for rejection. Director / Agent Chief Examiner / Agent INOUE, Tadashi 8120 Examiner Asst. Examiner AOKI, Shigenori 4229 110 Response to Office Action Accepted June 14, 2004 (H.16) Dear Mr. Shigenori Aoki Commissioner of the Japan Patent Office 1. Case Patent Application H7-507561 (PCT/US 94/07672) 2. Title of the Invention Method and Apparatus for Providing Cryptographic Protection of a Data Stream in a Communication System 3. Applicant Address 1303 East Algonquin Road Shaumburg, Illinois 60196 United States of America Name (Nationality) 4. Agent Motorola Incorporated United States of America Address Ikeuchi International Patent Office Sekiuchi Kawashima Building 1-4-2 Ohta-cho, Chuo-ku Yokohama, Kanagawa 231-0011 Tel: 045 (211) 2795 Name of the Agent (8357) Yoshiaki Ikeuchi Yoshiaki Ikeuchi Patent Attorney 5. Date Office Action was Received December 5, 2003 (H15) (sent on December 16, 2003) Patent Office 16.6.15 Applicant Support Division Miyawaki Formality Examination Illegible 112 6. Reasons (1) We received the Office Action dated on December 5, 2003 (H15) (sent on December 16, (H15)) regarding the above referenced application. It states that the insufficiency in the Specification and the description about the Drawing failed to meet the requirements stipulated in the Patent Law Article 36 (4). Thus, the Applicant will provide the following explanation regarding the previously submitted response as it is believed to solve the reasons for rejection. (2) First, lines 6-13 on page 7 of the response submitted on October 30, 2003 will be given as follows. It describes that overflow sequence number is neither transmitted to the terminals of the communication paths, nor they are embodied in a data packet nor derived from a data embodied in the data packet. It is believed not to raise any issues. However, the description of the overflow sequence number being independently determined by either the transmitting communication unit or the receiving communication unit may be misleading; therefore, it will be explained in the following paragraphs. Regarding the claims, for example Claim 1, amended on October 30, 2003 (H15), it updates the transmit overflow sequence number as a function of the packet sequence number at the transmitting communication unit. Further, the packet sequence number is transmitted to the receiving communication unit. Also, it extracts the packed sequence number from the receiving communication unit and updates the receiving overflow sequence number as a function of the packet sequence number. Therefore, it is considered that the transmitting overflow sequence number and the receiving overflow sequence number are not independent of each other 113 in a sense that they should be determined by the same packet sequence number and they are the same at a specific receiving packet. Yet, it is understood that the transmitting communication unit and the receiving communication unit are able to determine independently the overflow sequence number in a sense that each of the transmitting communication unit and the receiving communication unit implements algorithms in order to determine the overflow sequence number while independent from an output of the algorithms implemented by other communication units without knowing the output. The Applicant meant in the response that the overflow sequence number is not derived from data embodied in a data packet because, unless the packet sequence number roles over, the overflow sequence number is neither embodied in the data packet nor derived from the data embodied in the data packet; thus, even if it intercepts a specific packet, the packet itself fails to detect the overflow sequence number used to encrypt and decrypt a packet. In other words, during the rollover of the packet sequence number, the overflow sequence number used to encrypt and decrypt a packet is independent from data embodied in a packet, and it is not a function of the data of the packet; therefore, it is not derived from data in the packet. Each of the transmitting overflow sequence number and the receiving overflow sequence number is a function of the packet sequence number of a packet. As described in the original Specification of this application, the overflow sequence number is the number which is incremented by each of the transmitting communication unit and the receiving communication unit each time the packet sequence number rolls over. For instance, for the purpose of providing an illustrative example, 114 if 100 is the maximum packet sequence number, each of the transmitting communication unit and the receiving communication unit increments the overflow sequence number each time the preceding transmit/receiving packets have a packet sequence number 100 and the following transmit/receiving packets have a sequence number 1. As a result, by examining the sequence numbers of each of the transmit/receiving packets, each of the transmitting communication unit and the receiving communication unit can determine independently whether or not the overflow sequence number should be incremented, and meanwhile, it keeps the overflow sequence numbers synchronized. This can be achieved without transmitting the overflow sequence number from one terminal of the communication path to another. Further, determining the overflow sequence number by the role over of the packet sequence number enables the overflow sequence number to determine and to maintain at the inside of each of the communication units so that it does not need to communicate outside of each of the communication units. It enables to prevent interception. (3) As seen above, the explanation and allegations are believed to solve the issues listed in the Office Action. Moreover, it is also believed that the Claims in the present application clearly state the purpose of this invention, which is to provide a method and apparatus for protecting data stream encryption in a communication system. Therefore, this application meets the requirements stipulated in the Patent Law 36(4). The applicant requests that a patent be granted. 115 1/ Decision of Refusal Patent Application Number Drafting Date Patent Examiner Applicant Agent 7th Year of Heisei (1995) Patent No. 507561 16th year of Heisei (2004) October 13 AOKI, Shigenori 4229 5M00 Title of Invention METHOD AND DEVICE TO PROVIDE ENCRYPTED PROTECTION OF A DATA STREAM IN A COMMUNICATION SYSTEM Motorola Incorporated IKEUCHI, Yoshiaki (and 1 other) The present application should be rejected according to Reason [C] described in the Office Action dated April 17, 2003 (H15). Moreover, despite reviewing the response and the amendment no sufficient basis to overturn the earlier rejections has been found. Remarks 1. The Applicant asserts in the response submitted on October 30, 2003 (H15) that the invention regarding Claims 1-10 of the present application (hereinafter referred to as “the invention of the present application”) has patentability and by relying on D. W. Davies and W. L. Price authors / Uwazono supervisor of translation, “Network Security”, Japan, Nikkei, McGraw Hill, December 5, 1985, 1st Ed. 1st Printing, pg. 307-312 (hereafter referred to as Citation 1”) and Publication of Japanese Laid Open Patent Application S63-167588 (hereafter referred to as “Citation 2”) which are cited in the aforementioned Office Action, the use of a packet sequence number and an overflow sequence number to encrypt and decrypt data is not a simple selection of one from among plurality and variety used as keys. Therefore, the following examination was conducted on the reason and the assertion. 2. First, the validity of the reason and the assertion will be examined. The response submitted on October 30, 2003 states that the packet sequence number is data embedded in each of the converted data packet, and the data are not transformed or repeated by the packet. Meanwhile, the initial value data in the scrambling process described in Citation 2 is data superimposed on the scrambled source video signal and is regularly modified. Upon further examination, the packet sequence number and the initial value data are both used as the data to generate a pseudo random bit stream, and additionally they also resemble in data modification and a method for exchanging with the other side so that the packet sequence SN 2/E ‖ Initial Value2/E Data (Handwritten) 116 2/E number of the invention of the present application corresponds to the initial value data described in Citation 2, with respect to the cryptographic protection of a data stream. Furthermore, in the response submitted on October 30, 2003, the overflow sequence number in the invention of the present application is [not] 1 transmitted to the terminal of the communication path, and they are neither embedded into the data packet nor derived from data embedded in the data packet, and are determined independently by the transmitting communication unit and the receiving communication unit respectively. On the other hand, with the scrambling process described in Citation 2, methods for controlling and counting total transmissions count and increment a vertical sync signal of a source video signal, and configuration settings for timing increments are determined independently by counting the vertical sync signal both at encoding and decoding sides without appearing in the communication path. Upon further examination, the overflow sequence number and the total transmissions are also used as data to create a pseudo random bit stream in addition to their similarities in which the information itself does not appear in the communication path but is independently detected and determined by the units so that the overflow sequence number of the invention of the present application concerning the cryptographic protection of a data stream corresponds to the total transmissions as described in Citation 2. Looking further, as I Field Encrypting Method for encrypting a packet described in Citation 1, the use of a functional composition in order to encrypt and decrypt information that corresponds to a packet sequence number, information which corresponds to an overflow sequence number and data by adopting technology to create a pseudo random bit stream described in Citation 2 does not surpass the category which could be easily achieved by those skilled in the art as indicated in the aforementioned Office Action. Therefore, since the above Reason states a functional composition which could be easily achieved by those skilled in the art based upon the descriptions given in Citation 1 and 2, it is not sufficient to validate the assertion. 3. Due to the foregoing, the above assertion, to the effect that the invention of the present application has patentability stated by the Applicant in the response submitted on October 30, 2003, is not based on a valid reason and therefore cannot be granted . END Director / Agent Examiner MIZUNO, Shigeo AOKI, Shigenori 8220 1 Chief Examiner / Agent Asst. Examiner OF.SN ‖ Total transmissions (Handwritten) 4229 Translator’s note: Office Action dispatch no.: 435917 from Dec 5, 2003 citing the same lines from the October 30, 2003 response states “the overflow sequence numbers are not transmitted to the terminal of the communication path” in contradiction to this citation of the October 2003 response. 117

Disclaimer: Justia Dockets & Filings provides public litigation records from the federal appellate and district courts. These filings and docket sheets should not be considered findings of fact or liability, nor do they necessarily reflect the view of Justia.


Why Is My Information Online?