throbber
UNITED STATES PATENT AND TRADEMARK OFFICE
`
`
`
`UNITED STATES DEPARTMENT OF COMMERCE
`United States Patent and Trademark Office
`Address: COMMISSIONER FOR PATENTS
`P.O. Box 1450
`Alexandria, Virginia 2231371450
`www.uspto.gov
`
`15/644,862
`
`07/10/2017
`
`TOSHIROH NISHIO
`
`2017-1430T
`
`1028
`
`05/01/2019
`- 759°
`”5044
`Wenderoth, L1nd & Ponack, L.L.P.
`1025 Connecticut Avenue, NW
`Suite 500
`
`Washington DC 20036
`
`NIPA' WASIKA
`
`2433
`
`PAPER NUMBER
`
`NOTIFICATION DATE
`
`DELIVERY MODE
`
`05/01/2019
`
`ELECTRONIC
`
`Please find below and/or attached an Office communication concerning this application or proceeding.
`
`The time period for reply, if any, is set in the attached communication.
`
`Notice of the Office communication was sent electronically on above—indicated "Notification Date" to the
`
`following e—mail address(es):
`eoa @ wenderoth. com
`kmiller @ wenderothcom
`
`PTOL-90A (Rev. 04/07)
`
`

`

`0,7709 A0170” Summary
`
`Application No.
`15/644,862
`Examiner
`WASIKA NIPA
`
`Applicant(s)
`NISHIO etal.
`Art Unit
`2433
`
`AIA (FITF) Status
`Yes
`
`- The MAILING DA TE of this communication appears on the cover sheet wit/7 the correspondence address -
`Period for Reply
`
`A SHORTENED STATUTORY PERIOD FOR REPLY IS SET TO EXPIRE g MONTHS FROM THE MAILING
`DATE OF THIS COMMUNICATION.
`Extensions of time may be available under the provisions of 37 CFR 1.136(a). In no event, however, may a reply be timely filed after SIX (6) MONTHS from the mailing
`date of this communication.
`|f NO period for reply is specified above, the maximum statutory period will apply and will expire SIX (6) MONTHS from the mailing date of this communication.
`-
`- Failure to reply within the set or extended period for reply will, by statute, cause the application to become ABANDONED (35 U.S.C. § 133).
`Any reply received by the Office later than three months after the mailing date of this communication, even if timely filed, may reduce any earned patent term
`adjustment. See 37 CFR 1.704(b).
`
`Status
`
`1). Responsive to communication(s) filed on 07/10/2017.
`[:1 A declaration(s)/affidavit(s) under 37 CFR 1.130(b) was/were filed on
`
`2a)D This action is FINAL.
`
`2b)
`
`This action is non-final.
`
`3)[:] An election was made by the applicant in response to a restriction requirement set forth during the interview on
`; the restriction requirement and election have been incorporated into this action.
`
`4)[:] Since this application is in condition for allowance except for formal matters, prosecution as to the merits is
`closed in accordance with the practice under Expat/7e Quay/e, 1935 CD. 11, 453 O.G. 213.
`
`Disposition of Claims*
`5)
`Claim(s)
`
`1—11 is/are pending in the application.
`
`5a) Of the above claim(s)
`
`is/are withdrawn from consideration.
`
`E] Claim(s)
`
`is/are allowed.
`
`Claim(s) fl is/are rejected.
`
`[:1 Claim(s) _ is/are objected to.
`
`) ) ) )
`
`6 7
`
`8
`
`
`
`are subject to restriction and/or election requirement
`[j Claim(s)
`9
`* If any claims have been determined aflowabie. you may be eligible to benefit from the Patent Prosecution Highway program at a
`
`participating intellectual property office for the corresponding application. For more information, please see
`
`http://www.uspto.gov/patents/init events/pph/index.jsp or send an inquiry to PPeredback@uspto.gov.
`
`Application Papers
`10)[:] The specification is objected to by the Examiner.
`
`11). The drawing(s) filed on 07/10/2017 is/are: a). accepted or b)[:] objected to by the Examiner.
`
`Applicant may not request that any objection to the drawing(s) be held in abeyance. See 37 CFR 1.85(a).
`Replacement drawing sheet(s) including the correction is required if the drawing(s) is objected to. See 37 CFR 1.121 (d).
`
`Priority under 35 U.S.C. § 119
`12). Acknowledgment is made of a claim for foreign priority under 35 U.S.C. § 119(a)-(d) or (f).
`Certified copies:
`
`a). All
`
`b)D Some**
`
`C)D None of the:
`
`1.. Certified copies of the priority documents have been received.
`
`2.[:] Certified copies of the priority documents have been received in Application No.
`
`3:] Copies of the certified copies of the priority documents have been received in this National Stage
`application from the International Bureau (PCT Rule 17.2(a)).
`
`** See the attached detailed Office action for a list of the certified copies not received.
`
`Attachment(s)
`
`1)
`
`Notice of References Cited (PTO-892)
`
`Information Disclosure Statement(s) (PTO/SB/08a and/or PTO/SB/08b)
`2)
`Paper No(s)/Mail Date_
`U.S. Patent and Trademark Office
`
`3) C] Interview Summary (PTO-413)
`Paper No(s)/Mail Date
`4) CI Other-
`
`PTOL-326 (Rev. 11-13)
`
`Office Action Summary
`
`Part of Paper No./Mai| Date 20190425
`
`

`

`Application/Control Number: 15/644,862
`Art Unit: 2433
`
`Page 2
`
`Detailed Action
`
`1.
`
`The present application, filed on or after March 16, 2013, is being examined
`
`under the first inventor to file provisions of the AIA.
`
`2.
`
`This is the initial office action that has been issued in response to patent
`
`application, 15/644,862, filed on 07/10/2017. Claims 1-11, as originally filed,
`
`are currently pending and have been considered below. Claim 1 and 8-11 are
`
`independent claim.
`
`Priority
`
`3.
`
`The application is a CON of PCT/JP2016/002948 filed on 06/20/2016 which
`
`claims the benefit of 62/213,825 filed on 09/03/2015.
`
`4.
`
`Claim 2-6, 9 are objected for the following informalities:
`
`Claim Objection
`
`Claim 2-6 do not use proper punctuation sign at the end of each limitation.
`
`Claim 9 recites “AV system”. Proper abbreviation is required to better
`
`understand the claim.
`
`Appropriate correction is required.
`
`Claim Rejections - 35 USC § 1 12
`
`5.
`
`The following is a quotation of 35 U.S.C. 112(b):
`
`(b) CONCLUSION - The specification shall conclude with one or more claims particularly pointing
`out and distinctly claiming the subject matter which the applicant regards as his invention.
`
`

`

`Application/Control Number: 15/644,862
`Art Unit: 2433
`
`Page 3
`
`Claim 3-6 recite “wherein a random number generated in the source
`
`device is acquired as the random number acquired in the acquiring of the random
`
`number, and a result of a first determination made by the source device is
`
`acquired as the result of the first determination acquired in the acquiring of the
`
`result of the first determination”. The claim limitation is vague and indefinite and
`
`as such incomprehensible. Examiner does not understand the meaning of the
`
`claim and can not interpret the claim.
`
`Claim Rejections - 35 USC § 103
`
`6.
`
`In the event the determination of the status of the application as subject
`
`to AIA 35 U.S.C. 102 and 103 (or as subject to pre-AIA 35 U.S.C. 102
`
`and 103) is incorrect, any correction of the statutory basis for the
`
`rejection will not be considered a new ground of rejection if the prior art
`
`relied upon, and the rationale supporting the rejection, would be the
`
`same under either status.
`
`The following is a quotation of 35 U.S.C. 103 which forms the basis for all obviousness
`rejections set forth in this Office action:
`
`A patent for a claimed invention may not be obtained, notwithstanding that the claimed
`invention is not identically disclosed as set forth in section 102 of this title, if the
`differences between the claimed invention and the prior art are such that the claimed
`invention as a whole would have been obvious before the effective filing date of the
`claimed invention to a person having ordinary skill in the art to which the claimed
`invention pertains. Patentability shall not be negated by the manner in which the
`invention was made.
`
`Claim 1-11 are rejected under 35 U.S.C. 103 as being unpatentable over
`
`Bourque (US Patent Application Publication No 2013/0080662 A1) in view
`
`of Priyadarshi (US Patent No 8,990,574 B1).
`
`

`

`Application/Control Number: 15/644,862
`Art Unit: 2433
`
`Page 4
`
`8. Regarding Claim 1, Bourque discloses a method for use in a source
`
`device, the method comprising:
`
`acquiring a random number (Bourque, 1l[0031], authenticator
`
`challenges peripheral by sending a random number over the
`
`authentication configured data lines. The peripheral computes a
`
`response with a secret key and returns that response. Authenticator
`
`receives that response, compares it with an expected response and if
`
`they match, determines that peripheral is authentic);
`
`transmitting the acquired random number to a sink device through a
`
`High Definition Multimedia Interface-Consumer Electronics Control
`
`(HDMI-CEC) bus (Bourque, 1l[0034], the media provided to peripheral
`
`may be configured based on an EDID previously received or based on a
`
`type or class of peripheral indicated by the identifier received. After
`
`peripheral is authenticated, authenticator may relinquish access of the
`
`non-media channel to HDMI module allowing a multimedia
`
`communication);
`
`receiving first signature information and capability information from
`
`the sink device through the HDMI-CEC bus, the first signature
`
`information being information in which the random number is encrypted
`
`with a first secret key correlated with the sink device, the capability
`
`information being information about a display capability of the sink device
`
`(Bourque, 1l[0049], an authentication response is communicated to the
`
`host device via the non-media channel. This response may include an
`
`

`

`Application/Control Number: 15/644,862
`Art Unit: 2433
`
`Page 5
`
`identifier, which may identify various aspects of peripheral including a
`
`peripheral type, a peripheral class, a manufacturer, functionalities made
`
`available by peripheral. This identifier is accessible from peripheral such
`
`as being stored in peripheral media, can be unique and cryptographically
`
`secure. Authentication module may also encrypt the identifier prior to
`
`communicating or include a cryptographic response if so requested by
`
`host device);
`
`Bourque does not explicitly teach the following limitation that
`
`Priyadarshi teaches:
`
`acquiring a result of a first determination whether first decrypted
`
`information is compatible with the transmitted random number, the first
`
`decrypted information being obtained by decrypting the received first
`
`signature information with a first public key paired with the first secret key
`
`(Priyadarshi, col 5, line 40-50, the source device then reads the memory
`
`and signature back across the BBC channel after waiting a period of
`
`time. The source device then verifies the signature using the display
`
`device’s public key. The display device’s status is then verified by
`
`searching through a database of trusted devices using the display
`
`device’s public key. The source device then determines whether to
`
`commence or continue sending the display device its digital audio/video
`
`data);
`
`when the result of the first determination is that the first decrypted
`
`information is compatible with the transmitted random number,
`
`

`

`Application/Control Number: 15/644,862
`Art Unit: 2433
`
`Page 6
`
`determining that the received capability information is correct information
`
`(Priyadarshi, col 6, line 40-60, transmitter transmits an authentication
`
`request to display/receiver to obtain the device ID of display/receiver
`
`along with the PKI public key of display/receiver and the signature block
`
`created by display/receiver. The device ID of display/receiver along with
`
`the PKI public key of display/receiver and the signature block created by
`
`display/receiver are sent via HDMI CEC channels. The transmitter
`
`checks the information sent from display/receiver to transmitter based on
`
`public key associated with display/receiver); and
`
`outputting video corresponding to the capability information
`
`determined to be correct information to the sink device (Priyadarshi, col
`
`5, line 40-50, the source device then reads the memory and signature
`
`back across the BBC channel after waiting a period of time. The source
`
`device then verifies the signature using the display device’s public key.
`
`The display device’s status is then verified by searching through a
`
`database of trusted devices using the display device’s public key. The
`
`source device then determines whether to commence or continue
`
`sending the display device its digital audio/video data).
`
`Bourque in view of Priyadarshi are analogous art because they are from
`
`the “same field of endeavor” and are from the same “problem solving area”.
`
`Namely, they pertain to the field of “copy control of audio video data”. It would
`
`have been obvious to a person of ordinary skill in the art before the effective
`
`filing date of the invention to modify the invention of Bourque in view of
`
`

`

`Application/Control Number: 15/644,862
`Art Unit: 2433
`
`Page 7
`
`Priyadarshi to include the idea of “copy control of audio video data”. That way
`
`illegal copying of AV data can be prevented because HDMI link provides
`
`transmission standard for high quality of diverse formats of video data, audio
`
`data and controlled signal. In such a wired interface environment for high quality
`
`content transmission, a technology for protecting illegal copy of contents is
`
`necessary.
`
`9. Regarding claim 2, Bourque in view of Priyadarshi discloses the method
`
`according to claim 1, further comprising acquiring a result of a second
`
`determination whether second decrypted information is correct information, the
`
`second decrypted information being obtained by decrypting second signature
`
`information with a second public key corresponding to a second secret key, the
`
`second public key being externally acquired with the source device (Bourque,
`
`1l[0031], authenticator challenges peripheral by sending a random number over
`
`the authentication configured data lines. The peripheral computes a response
`
`with a secret key and returns that response. Authenticator receives that
`
`response, compares it with an expected response and if they match,
`
`determines that peripheral is authentic. Also Priyadarshi, col 5, line 40-50, the
`
`source device then reads the memory and signature back across the BBC
`
`channel after waiting a period of time. The source device then verifies the
`
`signature using the display device’s public key. The display device’s status is
`
`then verified by searching through a database of trusted devices using the
`
`

`

`Application/Control Number: 15/644,862
`Art Unit: 2433
`
`Page 8
`
`display device’s public key. The source device then determines whether to
`
`commence or continue sending the display device its digital audio/video data),
`
`wherein certification information and the second signature information are
`
`received from the sink device in the receiving, the certification information
`
`including the first public key and the capability information, the second signature
`
`information including information in which the sink device encrypts the
`
`certification information with the second secret key, the second secret key being
`
`an externally-acquired second secret key (Bourque, 11[0031], authenticator
`
`challenges peripheral by sending a random number over the authentication
`
`configured data lines. The peripheral computes a response with a secret key
`
`and returns that response. Authenticator receives that response, compares it
`
`with an expected response and if they match, determines that peripheral is
`
`authentic. Also Priyadarshi, col 5, line 40-50, the source device then reads the
`
`memory and signature back across the BBC channel after waiting a period of
`
`time. The source device then verifies the signature using the display device’s
`
`public key. The display device’s status is then verified by searching through a
`
`database of trusted devices using the display device’s public key. The source
`
`device then determines whether to commence or continue sending the display
`
`device its digital audio/video data),
`
`the first determination is a determination whether the first decrypted
`
`information is compatible with the transmitted random number, the first
`
`decrypted information being obtained by decrypting the received first signature
`
`information with the first public key included in the certification information, and
`
`

`

`Application/Control Number: 15/644,862
`Art Unit: 2433
`
`Page 9
`
`when the result of the first determination is that the first decrypted information is
`
`compatible with the transmitted random number, and when the result of the
`
`second determination is that the second decrypted information is correct
`
`information, a determination that the received capability information is correct
`
`information is made in the determining (Bourque, 1i[0031], authenticator
`
`challenges peripheral by sending a random number over the authentication
`
`configured data lines. The peripheral computes a response with a secret key
`
`and returns that response. Authenticator receives that response, compares it
`
`with an expected response and if they match, determines that peripheral is
`
`authentic. Also Priyadarshi, col 5, line 40-50, the source device then reads the
`
`memory and signature back across the BBC channel after waiting a period of
`
`time. The source device then verifies the signature using the display device’s
`
`public key. The display device’s status is then verified by searching through a
`
`database of trusted devices using the display device’s public key. The source
`
`device then determines whether to commence or continue sending the display
`
`device its digital audio/video data).
`
`10.
`
`Regarding claim 3, Bourque in view of Priyadarshi discloses the method
`
`according to claim 1, wherein a random number generated in the source device
`
`is acquired as the random number acquired in the acquiring of the random
`
`number (Bourque, 1i[0031], authenticator challenges peripheral by sending a
`
`random number over the authentication configured data lines. The peripheral
`
`computes a response with a secret key and returns that response.
`
`

`

`Application/Control Number: 15/644,862
`Art Unit: 2433
`
`Page 10
`
`Authenticator receives that response, compares it with an expected response
`
`and if they match, determines that peripheral is authentic. Also Priyadarshi, col
`
`5, line 40-50, the source device then reads the memory and signature back
`
`across the BBC channel after waiting a period of time. The source device then
`
`verifies the signature using the display device’s public key. The display device’s
`
`status is then verified by searching through a database of trusted devices using
`
`the display device’s public key. The source device then determines whether to
`
`commence or continue sending the display device its digital audio/video data),
`
`and
`
`a result of a first determination made by the source device is acquired as
`
`the result of the first determination acquired in the acquiring of the result of the
`
`first determination (Bourque, 1i[0031], authenticator challenges peripheral by
`
`sending a random number over the authentication configured data lines. The
`
`peripheral computes a response with a secret key and returns that response.
`
`Authenticator receives that response, compares it with an expected response
`
`and if they match, determines that peripheral is authentic. Also Priyadarshi, col 5,
`
`line 40-50, the source device then reads the memory and signature back across
`
`the BBC channel after waiting a period of time. The source device then verifies
`
`the signature using the display device’s public key. The display device’s status is
`
`then verified by searching through a database of trusted devices using the
`
`display device’s public key. The source device then determines whether to
`
`commence or continue sending the display device its digital audio/video data).
`
`

`

`Application/Control Number: 15/644,862
`Art Unit: 2433
`
`Page 11
`
`11. Regarding claim 4, Bourque in view of Priyadarshi discloses the method
`
`according to claim 2, wherein a random number generated in the source device
`
`is acquired as the random number acquired in the acquiring of the random
`
`number (Bourque, 1i[0031], authenticator challenges peripheral by sending a
`
`random number over the authentication configured data lines. The peripheral
`
`computes a response with a secret key and returns that response.
`
`Authenticator receives that response, compares it with an expected response
`
`and if they match, determines that peripheral is authentic. Also Priyadarshi, col
`
`5, line 40-50, the source device then reads the memory and signature back
`
`across the BBC channel after waiting a period of time. The source device then
`
`verifies the signature using the display device’s public key. The display device’s
`
`status is then verified by searching through a database of trusted devices using
`
`the display device’s public key. The source device then determines whether to
`
`commence or continue sending the display device its digital audio/video data),
`
`a result of a first determination made by the source device is acquired as
`
`the result of the first determination acquired in the acquiring of the result of the
`
`first determination (Bourque, 1i[0031], authenticator challenges peripheral by
`
`sending a random number over the authentication configured data lines. The
`
`peripheral computes a response with a secret key and returns that response.
`
`Authenticator receives that response, compares it with an expected response
`
`and if they match, determines that peripheral is authentic. Also Priyadarshi, col
`
`5, line 40-50, the source device then reads the memory and signature back
`
`across the BBC channel after waiting a period of time. The source device then
`
`

`

`Application/Control Number: 15/644,862
`Art Unit: 2433
`
`Page 12
`
`verifies the signature using the display device’s public key. The display device’s
`
`status is then verified by searching through a database of trusted devices using
`
`the display device’s public key. The source device then determines whether to
`
`commence or continue sending the display device its digital audio/video data),
`
`and
`
`a result of a second determination made by the source device is acquired
`
`as the result of the second determination acquired in the acquiring of the result
`
`of the second determination (Bourque, 11[0031], authenticator challenges
`
`peripheral by sending a random number over the authentication configured data
`
`lines. The peripheral computes a response with a secret key and returns that
`
`response. Authenticator receives that response, compares it with an expected
`
`response and if they match, determines that peripheral is authentic. Also
`
`Priyadarshi, col 5, line 40-50, the source device then reads the memory and
`
`signature back across the BBC channel after waiting a period of time. The
`
`source device then verifies the signature using the display device’s public key.
`
`The display device’s status is then verified by searching through a database of
`
`trusted devices using the display device’s public key. The source device then
`
`determines whether to commence or continue sending the display device its
`
`digital audio/video data).
`
`12.
`
`Regarding Claim 5, Bourque in view of Priyadarshi discloses the
`
`method according to claim 1, further comprising transmitting the received
`
`first signature information and the capability information to an external
`
`

`

`Application/Control Number: 15/644,862
`Art Unit: 2433
`
`Page 13
`
`server through a network (Bourque, 1i[0031], authenticator challenges
`
`peripheral by sending a random number over the authentication
`
`configured data lines. The peripheral computes a response with a secret
`
`key and returns that response. Authenticator receives that response,
`
`compares it with an expected response and if they match, determines
`
`that peripheral is authentic. Also Priyadarshi, col 5, line 40-50, the source
`
`device then reads the memory and signature back across the BBC
`
`channel after waiting a period of time. The source device then verifies
`
`the signature using the display device’s public key. The display device’s
`
`status is then verified by searching through a database of trusted devices
`
`using the display device’s public key. The source device then determines
`
`whether to commence or continue sending the display device its digital
`
`audio/video data),
`
`wherein a random number generated with the external server is
`
`acquired, as the random number acquired in the acquiring of the random
`
`number, through the network (Bourque, 1i[0031], authenticator
`
`challenges peripheral by sending a random number over the
`
`authentication configured data lines. The peripheral computes a
`
`response with a secret key and returns that response. Authenticator
`
`receives that response, compares it with an expected response and if
`
`they match, determines that peripheral is authentic. Also Priyadarshi, col
`
`5, line 40-50, the source device then reads the memory and signature
`
`back across the BBC channel after waiting a period of time. The source
`
`

`

`Application/Control Number: 15/644,862
`Art Unit: 2433
`
`Page 14
`
`device then verifies the signature using the display device’s public key.
`
`The display device’s status is then verified by searching through a
`
`database of trusted devices using the display device’s public key. The
`
`source device then determines whether to commence or continue
`
`sending the display device its digital audio/video data), and
`
`a result of a first determination made by the external server is
`
`acquired, as the result of the first determination acquired in the acquiring
`
`of the result of the first determination, through the network (Bourque,
`
`11[0031], authenticator challenges peripheral by sending a random
`
`number over the authentication configured data lines. The peripheral
`
`computes a response with a secret key and returns that response.
`
`Authenticator receives that response, compares it with an expected
`
`response and if they match, determines that peripheral is authentic. Also
`
`Priyadarshi, col 5, line 40-50, the source device then reads the memory
`
`and signature back across the BBC channel after waiting a period of
`
`time. The source device then verifies the signature using the display
`
`device’s public key. The display device’s status is then verified by
`
`searching through a database of trusted devices using the display
`
`device’s public key. The source device then determines whether to
`
`commence or continue sending the display device its digital audio/video
`
`data).
`
`

`

`Application/Control Number: 15/644,862
`Art Unit: 2433
`
`Page 15
`
`13. Regarding claim 6, Bourque in view of Priyadarshi discloses the method
`
`according to claim 2, further comprising transmitting the received
`
`certification information and the second signature information to an
`
`external server through a network,
`
`wherein a random number generated with the external server is
`
`acquired, as the random number acquired in the acquiring of the random
`
`number, through the network (Bourque, 11[0031], authenticator
`
`challenges peripheral by sending a random number over the
`
`authentication configured data lines. The peripheral computes a
`
`response with a secret key and returns that response. Authenticator
`
`receives that response, compares it with an expected response and if
`
`they match, determines that peripheral is authentic. Also Priyadarshi, col
`
`5, line 40-50, the source device then reads the memory and signature
`
`back across the BBC channel after waiting a period of time. The source
`
`device then verifies the signature using the display device’s public key.
`
`The display device’s status is then verified by searching through a
`
`database of trusted devices using the display device’s public key. The
`
`source device then determines whether to commence or continue
`
`sending the display device its digital audio/video data),
`
`a result of a first determination made by the external server is
`
`acquired, as the result of the first determination in the acquiring of the
`
`result of the first determination, through the network (Bourque, 11[0031],
`
`authenticator challenges peripheral by sending a random number over
`
`

`

`Application/Control Number: 15/644,862
`Art Unit: 2433
`
`Page 16
`
`the authentication configured data lines. The peripheral computes a
`
`response with a secret key and returns that response. Authenticator
`
`receives that response, compares it with an expected response and if
`
`they match, determines that peripheral is authentic. Also Priyadarshi, col
`
`5, line 40-50, the source device then reads the memory and signature
`
`back across the BBC channel after waiting a period of time. The source
`
`device then verifies the signature using the display device’s public key.
`
`The display device’s status is then verified by searching through a
`
`database of trusted devices using the display device’s public key. The
`
`source device then determines whether to commence or continue
`
`sending the display device its digital audio/video data), and
`
`a result of a second determination made by the external server is
`
`acquired, as the result of the second determination in the acquiring of the
`
`result of the second determination, through the network (Bourque,
`
`1i[0031], authenticator challenges peripheral by sending a random
`
`number over the authentication configured data lines. The peripheral
`
`computes a response with a secret key and returns that response.
`
`Authenticator receives that response, compares it with an expected
`
`response and if they match, determines that peripheral is authentic. Also
`
`Priyadarshi, col 5, line 40-50, the source device then reads the memory
`
`and signature back across the BBC channel after waiting a period of
`
`time. The source device then verifies the signature using the display
`
`device’s public key. The display device’s status is then verified by
`
`

`

`Application/Control Number: 15/644,862
`Art Unit: 2433
`
`Page 17
`
`searching through a database of trusted devices using the display
`
`device’s public key. The source device then determines whether to
`
`commence or continue sending the display device its digital audio/video
`
`data).
`
`14.
`
`Regarding claim 7, Bourque in view of Priyadarshi discloses the method
`
`according to claim 1, wherein each of the first secret key and the first
`
`public key is an encryption key that the sink device previously retains
`
`(Bourque, 1i[0031], authenticator challenges peripheral by sending a
`
`random number over the authentication configured data lines. The
`
`peripheral computes a response with a secret key and returns that
`
`response. Authenticator receives that response, compares it with an
`
`expected response and if they match, determines that peripheral is
`
`authentic. Also Priyadarshi, col 5, line 40-50, the source device then
`
`reads the memory and signature back across the BBC channel after
`
`waiting a period of time. The source device then verifies the signature
`
`using the display device’s public key. The display device’s status is then
`
`verified by searching through a database of trusted devices using the
`
`display device’s public key. The source device then determines whether
`
`to commence or continue sending the display device its digital
`
`audio/video data).
`
`

`

`Application/Control Number: 15/644,862
`Art Unit: 2433
`
`Page 18
`
`15. Regarding Claim 8, Bourque discloses a method for use in a sink
`
`device, the method comprising:
`
`receiving a random number from the source device through a High
`
`Definition Multimedia Interface-Consumer Electronics Control (HDMI-
`
`CEC) bus (Bourque, 1i[0031], authenticator challenges peripheral by
`
`sending a random number over the authentication configured data lines.
`
`The peripheral computes a response with a secret key and returns that
`
`response. Authenticator receives that response, compares it with an
`
`expected response and if they match, determines that peripheral is
`
`authentic);
`
`encrypting the received random number with a first secret key
`
`corresponding to the sink device (Bourque, 1i[0049], an authentication
`
`response is communicated to the host device via the non-media channel.
`
`This response may include an identifier, which may identify various
`
`aspects of peripheral including a peripheral type, a peripheral class, a
`
`manufacturer, functionalities made available by peripheral. This identifier
`
`is accessible from peripheral such as being stored in peripheral media,
`
`can be unique and cryptographically secure. Authentication module may
`
`also encrypt the identifier prior to communicating or include a
`
`cryptographic response if so requested by host device); and
`
`Bourque does not explicitly teach the following limitation that
`
`Priyadarshi teaches:
`
`

`

`Application/Control Number: 15/644,862
`Art Unit: 2433
`
`Page 19
`
`transmitting first signature information and capability information to
`
`the source device through the HDMI-CEC bus, the first signature
`
`information being obtained by encrypting the random number, the
`
`capability information storing therein information about a display
`
`capability of the sink device (Priyadarshi, col 5, line 40-50, the source
`
`device then reads the memory and signature back across the BBC
`
`channel after waiting a period of time. The source device then verifies
`
`the signature using the display device’s public key. The display device’s
`
`status is then verified by searching through a database of trusted devices
`
`using the display device’s publ

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket