`
`
`
`UNITED STATES DEPARTMENT OF COMMERCE
`United States Patent and Trademark Office
`Address: COMMISSIONER FOR PATENTS
`P.O. Box 1450
`Alexandria, Virginia 2231371450
`www.uspto.gov
`
`15/644,862
`
`07/10/2017
`
`TOSHIROH NISHIO
`
`2017-1430T
`
`1028
`
`05/01/2019
`- 759°
`”5044
`Wenderoth, L1nd & Ponack, L.L.P.
`1025 Connecticut Avenue, NW
`Suite 500
`
`Washington DC 20036
`
`NIPA' WASIKA
`
`2433
`
`PAPER NUMBER
`
`NOTIFICATION DATE
`
`DELIVERY MODE
`
`05/01/2019
`
`ELECTRONIC
`
`Please find below and/or attached an Office communication concerning this application or proceeding.
`
`The time period for reply, if any, is set in the attached communication.
`
`Notice of the Office communication was sent electronically on above—indicated "Notification Date" to the
`
`following e—mail address(es):
`eoa @ wenderoth. com
`kmiller @ wenderothcom
`
`PTOL-90A (Rev. 04/07)
`
`
`
`0,7709 A0170” Summary
`
`Application No.
`15/644,862
`Examiner
`WASIKA NIPA
`
`Applicant(s)
`NISHIO etal.
`Art Unit
`2433
`
`AIA (FITF) Status
`Yes
`
`- The MAILING DA TE of this communication appears on the cover sheet wit/7 the correspondence address -
`Period for Reply
`
`A SHORTENED STATUTORY PERIOD FOR REPLY IS SET TO EXPIRE g MONTHS FROM THE MAILING
`DATE OF THIS COMMUNICATION.
`Extensions of time may be available under the provisions of 37 CFR 1.136(a). In no event, however, may a reply be timely filed after SIX (6) MONTHS from the mailing
`date of this communication.
`|f NO period for reply is specified above, the maximum statutory period will apply and will expire SIX (6) MONTHS from the mailing date of this communication.
`-
`- Failure to reply within the set or extended period for reply will, by statute, cause the application to become ABANDONED (35 U.S.C. § 133).
`Any reply received by the Office later than three months after the mailing date of this communication, even if timely filed, may reduce any earned patent term
`adjustment. See 37 CFR 1.704(b).
`
`Status
`
`1). Responsive to communication(s) filed on 07/10/2017.
`[:1 A declaration(s)/affidavit(s) under 37 CFR 1.130(b) was/were filed on
`
`2a)D This action is FINAL.
`
`2b)
`
`This action is non-final.
`
`3)[:] An election was made by the applicant in response to a restriction requirement set forth during the interview on
`; the restriction requirement and election have been incorporated into this action.
`
`4)[:] Since this application is in condition for allowance except for formal matters, prosecution as to the merits is
`closed in accordance with the practice under Expat/7e Quay/e, 1935 CD. 11, 453 O.G. 213.
`
`Disposition of Claims*
`5)
`Claim(s)
`
`1—11 is/are pending in the application.
`
`5a) Of the above claim(s)
`
`is/are withdrawn from consideration.
`
`E] Claim(s)
`
`is/are allowed.
`
`Claim(s) fl is/are rejected.
`
`[:1 Claim(s) _ is/are objected to.
`
`) ) ) )
`
`6 7
`
`8
`
`
`
`are subject to restriction and/or election requirement
`[j Claim(s)
`9
`* If any claims have been determined aflowabie. you may be eligible to benefit from the Patent Prosecution Highway program at a
`
`participating intellectual property office for the corresponding application. For more information, please see
`
`http://www.uspto.gov/patents/init events/pph/index.jsp or send an inquiry to PPeredback@uspto.gov.
`
`Application Papers
`10)[:] The specification is objected to by the Examiner.
`
`11). The drawing(s) filed on 07/10/2017 is/are: a). accepted or b)[:] objected to by the Examiner.
`
`Applicant may not request that any objection to the drawing(s) be held in abeyance. See 37 CFR 1.85(a).
`Replacement drawing sheet(s) including the correction is required if the drawing(s) is objected to. See 37 CFR 1.121 (d).
`
`Priority under 35 U.S.C. § 119
`12). Acknowledgment is made of a claim for foreign priority under 35 U.S.C. § 119(a)-(d) or (f).
`Certified copies:
`
`a). All
`
`b)D Some**
`
`C)D None of the:
`
`1.. Certified copies of the priority documents have been received.
`
`2.[:] Certified copies of the priority documents have been received in Application No.
`
`3:] Copies of the certified copies of the priority documents have been received in this National Stage
`application from the International Bureau (PCT Rule 17.2(a)).
`
`** See the attached detailed Office action for a list of the certified copies not received.
`
`Attachment(s)
`
`1)
`
`Notice of References Cited (PTO-892)
`
`Information Disclosure Statement(s) (PTO/SB/08a and/or PTO/SB/08b)
`2)
`Paper No(s)/Mail Date_
`U.S. Patent and Trademark Office
`
`3) C] Interview Summary (PTO-413)
`Paper No(s)/Mail Date
`4) CI Other-
`
`PTOL-326 (Rev. 11-13)
`
`Office Action Summary
`
`Part of Paper No./Mai| Date 20190425
`
`
`
`Application/Control Number: 15/644,862
`Art Unit: 2433
`
`Page 2
`
`Detailed Action
`
`1.
`
`The present application, filed on or after March 16, 2013, is being examined
`
`under the first inventor to file provisions of the AIA.
`
`2.
`
`This is the initial office action that has been issued in response to patent
`
`application, 15/644,862, filed on 07/10/2017. Claims 1-11, as originally filed,
`
`are currently pending and have been considered below. Claim 1 and 8-11 are
`
`independent claim.
`
`Priority
`
`3.
`
`The application is a CON of PCT/JP2016/002948 filed on 06/20/2016 which
`
`claims the benefit of 62/213,825 filed on 09/03/2015.
`
`4.
`
`Claim 2-6, 9 are objected for the following informalities:
`
`Claim Objection
`
`Claim 2-6 do not use proper punctuation sign at the end of each limitation.
`
`Claim 9 recites “AV system”. Proper abbreviation is required to better
`
`understand the claim.
`
`Appropriate correction is required.
`
`Claim Rejections - 35 USC § 1 12
`
`5.
`
`The following is a quotation of 35 U.S.C. 112(b):
`
`(b) CONCLUSION - The specification shall conclude with one or more claims particularly pointing
`out and distinctly claiming the subject matter which the applicant regards as his invention.
`
`
`
`Application/Control Number: 15/644,862
`Art Unit: 2433
`
`Page 3
`
`Claim 3-6 recite “wherein a random number generated in the source
`
`device is acquired as the random number acquired in the acquiring of the random
`
`number, and a result of a first determination made by the source device is
`
`acquired as the result of the first determination acquired in the acquiring of the
`
`result of the first determination”. The claim limitation is vague and indefinite and
`
`as such incomprehensible. Examiner does not understand the meaning of the
`
`claim and can not interpret the claim.
`
`Claim Rejections - 35 USC § 103
`
`6.
`
`In the event the determination of the status of the application as subject
`
`to AIA 35 U.S.C. 102 and 103 (or as subject to pre-AIA 35 U.S.C. 102
`
`and 103) is incorrect, any correction of the statutory basis for the
`
`rejection will not be considered a new ground of rejection if the prior art
`
`relied upon, and the rationale supporting the rejection, would be the
`
`same under either status.
`
`The following is a quotation of 35 U.S.C. 103 which forms the basis for all obviousness
`rejections set forth in this Office action:
`
`A patent for a claimed invention may not be obtained, notwithstanding that the claimed
`invention is not identically disclosed as set forth in section 102 of this title, if the
`differences between the claimed invention and the prior art are such that the claimed
`invention as a whole would have been obvious before the effective filing date of the
`claimed invention to a person having ordinary skill in the art to which the claimed
`invention pertains. Patentability shall not be negated by the manner in which the
`invention was made.
`
`Claim 1-11 are rejected under 35 U.S.C. 103 as being unpatentable over
`
`Bourque (US Patent Application Publication No 2013/0080662 A1) in view
`
`of Priyadarshi (US Patent No 8,990,574 B1).
`
`
`
`Application/Control Number: 15/644,862
`Art Unit: 2433
`
`Page 4
`
`8. Regarding Claim 1, Bourque discloses a method for use in a source
`
`device, the method comprising:
`
`acquiring a random number (Bourque, 1l[0031], authenticator
`
`challenges peripheral by sending a random number over the
`
`authentication configured data lines. The peripheral computes a
`
`response with a secret key and returns that response. Authenticator
`
`receives that response, compares it with an expected response and if
`
`they match, determines that peripheral is authentic);
`
`transmitting the acquired random number to a sink device through a
`
`High Definition Multimedia Interface-Consumer Electronics Control
`
`(HDMI-CEC) bus (Bourque, 1l[0034], the media provided to peripheral
`
`may be configured based on an EDID previously received or based on a
`
`type or class of peripheral indicated by the identifier received. After
`
`peripheral is authenticated, authenticator may relinquish access of the
`
`non-media channel to HDMI module allowing a multimedia
`
`communication);
`
`receiving first signature information and capability information from
`
`the sink device through the HDMI-CEC bus, the first signature
`
`information being information in which the random number is encrypted
`
`with a first secret key correlated with the sink device, the capability
`
`information being information about a display capability of the sink device
`
`(Bourque, 1l[0049], an authentication response is communicated to the
`
`host device via the non-media channel. This response may include an
`
`
`
`Application/Control Number: 15/644,862
`Art Unit: 2433
`
`Page 5
`
`identifier, which may identify various aspects of peripheral including a
`
`peripheral type, a peripheral class, a manufacturer, functionalities made
`
`available by peripheral. This identifier is accessible from peripheral such
`
`as being stored in peripheral media, can be unique and cryptographically
`
`secure. Authentication module may also encrypt the identifier prior to
`
`communicating or include a cryptographic response if so requested by
`
`host device);
`
`Bourque does not explicitly teach the following limitation that
`
`Priyadarshi teaches:
`
`acquiring a result of a first determination whether first decrypted
`
`information is compatible with the transmitted random number, the first
`
`decrypted information being obtained by decrypting the received first
`
`signature information with a first public key paired with the first secret key
`
`(Priyadarshi, col 5, line 40-50, the source device then reads the memory
`
`and signature back across the BBC channel after waiting a period of
`
`time. The source device then verifies the signature using the display
`
`device’s public key. The display device’s status is then verified by
`
`searching through a database of trusted devices using the display
`
`device’s public key. The source device then determines whether to
`
`commence or continue sending the display device its digital audio/video
`
`data);
`
`when the result of the first determination is that the first decrypted
`
`information is compatible with the transmitted random number,
`
`
`
`Application/Control Number: 15/644,862
`Art Unit: 2433
`
`Page 6
`
`determining that the received capability information is correct information
`
`(Priyadarshi, col 6, line 40-60, transmitter transmits an authentication
`
`request to display/receiver to obtain the device ID of display/receiver
`
`along with the PKI public key of display/receiver and the signature block
`
`created by display/receiver. The device ID of display/receiver along with
`
`the PKI public key of display/receiver and the signature block created by
`
`display/receiver are sent via HDMI CEC channels. The transmitter
`
`checks the information sent from display/receiver to transmitter based on
`
`public key associated with display/receiver); and
`
`outputting video corresponding to the capability information
`
`determined to be correct information to the sink device (Priyadarshi, col
`
`5, line 40-50, the source device then reads the memory and signature
`
`back across the BBC channel after waiting a period of time. The source
`
`device then verifies the signature using the display device’s public key.
`
`The display device’s status is then verified by searching through a
`
`database of trusted devices using the display device’s public key. The
`
`source device then determines whether to commence or continue
`
`sending the display device its digital audio/video data).
`
`Bourque in view of Priyadarshi are analogous art because they are from
`
`the “same field of endeavor” and are from the same “problem solving area”.
`
`Namely, they pertain to the field of “copy control of audio video data”. It would
`
`have been obvious to a person of ordinary skill in the art before the effective
`
`filing date of the invention to modify the invention of Bourque in view of
`
`
`
`Application/Control Number: 15/644,862
`Art Unit: 2433
`
`Page 7
`
`Priyadarshi to include the idea of “copy control of audio video data”. That way
`
`illegal copying of AV data can be prevented because HDMI link provides
`
`transmission standard for high quality of diverse formats of video data, audio
`
`data and controlled signal. In such a wired interface environment for high quality
`
`content transmission, a technology for protecting illegal copy of contents is
`
`necessary.
`
`9. Regarding claim 2, Bourque in view of Priyadarshi discloses the method
`
`according to claim 1, further comprising acquiring a result of a second
`
`determination whether second decrypted information is correct information, the
`
`second decrypted information being obtained by decrypting second signature
`
`information with a second public key corresponding to a second secret key, the
`
`second public key being externally acquired with the source device (Bourque,
`
`1l[0031], authenticator challenges peripheral by sending a random number over
`
`the authentication configured data lines. The peripheral computes a response
`
`with a secret key and returns that response. Authenticator receives that
`
`response, compares it with an expected response and if they match,
`
`determines that peripheral is authentic. Also Priyadarshi, col 5, line 40-50, the
`
`source device then reads the memory and signature back across the BBC
`
`channel after waiting a period of time. The source device then verifies the
`
`signature using the display device’s public key. The display device’s status is
`
`then verified by searching through a database of trusted devices using the
`
`
`
`Application/Control Number: 15/644,862
`Art Unit: 2433
`
`Page 8
`
`display device’s public key. The source device then determines whether to
`
`commence or continue sending the display device its digital audio/video data),
`
`wherein certification information and the second signature information are
`
`received from the sink device in the receiving, the certification information
`
`including the first public key and the capability information, the second signature
`
`information including information in which the sink device encrypts the
`
`certification information with the second secret key, the second secret key being
`
`an externally-acquired second secret key (Bourque, 11[0031], authenticator
`
`challenges peripheral by sending a random number over the authentication
`
`configured data lines. The peripheral computes a response with a secret key
`
`and returns that response. Authenticator receives that response, compares it
`
`with an expected response and if they match, determines that peripheral is
`
`authentic. Also Priyadarshi, col 5, line 40-50, the source device then reads the
`
`memory and signature back across the BBC channel after waiting a period of
`
`time. The source device then verifies the signature using the display device’s
`
`public key. The display device’s status is then verified by searching through a
`
`database of trusted devices using the display device’s public key. The source
`
`device then determines whether to commence or continue sending the display
`
`device its digital audio/video data),
`
`the first determination is a determination whether the first decrypted
`
`information is compatible with the transmitted random number, the first
`
`decrypted information being obtained by decrypting the received first signature
`
`information with the first public key included in the certification information, and
`
`
`
`Application/Control Number: 15/644,862
`Art Unit: 2433
`
`Page 9
`
`when the result of the first determination is that the first decrypted information is
`
`compatible with the transmitted random number, and when the result of the
`
`second determination is that the second decrypted information is correct
`
`information, a determination that the received capability information is correct
`
`information is made in the determining (Bourque, 1i[0031], authenticator
`
`challenges peripheral by sending a random number over the authentication
`
`configured data lines. The peripheral computes a response with a secret key
`
`and returns that response. Authenticator receives that response, compares it
`
`with an expected response and if they match, determines that peripheral is
`
`authentic. Also Priyadarshi, col 5, line 40-50, the source device then reads the
`
`memory and signature back across the BBC channel after waiting a period of
`
`time. The source device then verifies the signature using the display device’s
`
`public key. The display device’s status is then verified by searching through a
`
`database of trusted devices using the display device’s public key. The source
`
`device then determines whether to commence or continue sending the display
`
`device its digital audio/video data).
`
`10.
`
`Regarding claim 3, Bourque in view of Priyadarshi discloses the method
`
`according to claim 1, wherein a random number generated in the source device
`
`is acquired as the random number acquired in the acquiring of the random
`
`number (Bourque, 1i[0031], authenticator challenges peripheral by sending a
`
`random number over the authentication configured data lines. The peripheral
`
`computes a response with a secret key and returns that response.
`
`
`
`Application/Control Number: 15/644,862
`Art Unit: 2433
`
`Page 10
`
`Authenticator receives that response, compares it with an expected response
`
`and if they match, determines that peripheral is authentic. Also Priyadarshi, col
`
`5, line 40-50, the source device then reads the memory and signature back
`
`across the BBC channel after waiting a period of time. The source device then
`
`verifies the signature using the display device’s public key. The display device’s
`
`status is then verified by searching through a database of trusted devices using
`
`the display device’s public key. The source device then determines whether to
`
`commence or continue sending the display device its digital audio/video data),
`
`and
`
`a result of a first determination made by the source device is acquired as
`
`the result of the first determination acquired in the acquiring of the result of the
`
`first determination (Bourque, 1i[0031], authenticator challenges peripheral by
`
`sending a random number over the authentication configured data lines. The
`
`peripheral computes a response with a secret key and returns that response.
`
`Authenticator receives that response, compares it with an expected response
`
`and if they match, determines that peripheral is authentic. Also Priyadarshi, col 5,
`
`line 40-50, the source device then reads the memory and signature back across
`
`the BBC channel after waiting a period of time. The source device then verifies
`
`the signature using the display device’s public key. The display device’s status is
`
`then verified by searching through a database of trusted devices using the
`
`display device’s public key. The source device then determines whether to
`
`commence or continue sending the display device its digital audio/video data).
`
`
`
`Application/Control Number: 15/644,862
`Art Unit: 2433
`
`Page 11
`
`11. Regarding claim 4, Bourque in view of Priyadarshi discloses the method
`
`according to claim 2, wherein a random number generated in the source device
`
`is acquired as the random number acquired in the acquiring of the random
`
`number (Bourque, 1i[0031], authenticator challenges peripheral by sending a
`
`random number over the authentication configured data lines. The peripheral
`
`computes a response with a secret key and returns that response.
`
`Authenticator receives that response, compares it with an expected response
`
`and if they match, determines that peripheral is authentic. Also Priyadarshi, col
`
`5, line 40-50, the source device then reads the memory and signature back
`
`across the BBC channel after waiting a period of time. The source device then
`
`verifies the signature using the display device’s public key. The display device’s
`
`status is then verified by searching through a database of trusted devices using
`
`the display device’s public key. The source device then determines whether to
`
`commence or continue sending the display device its digital audio/video data),
`
`a result of a first determination made by the source device is acquired as
`
`the result of the first determination acquired in the acquiring of the result of the
`
`first determination (Bourque, 1i[0031], authenticator challenges peripheral by
`
`sending a random number over the authentication configured data lines. The
`
`peripheral computes a response with a secret key and returns that response.
`
`Authenticator receives that response, compares it with an expected response
`
`and if they match, determines that peripheral is authentic. Also Priyadarshi, col
`
`5, line 40-50, the source device then reads the memory and signature back
`
`across the BBC channel after waiting a period of time. The source device then
`
`
`
`Application/Control Number: 15/644,862
`Art Unit: 2433
`
`Page 12
`
`verifies the signature using the display device’s public key. The display device’s
`
`status is then verified by searching through a database of trusted devices using
`
`the display device’s public key. The source device then determines whether to
`
`commence or continue sending the display device its digital audio/video data),
`
`and
`
`a result of a second determination made by the source device is acquired
`
`as the result of the second determination acquired in the acquiring of the result
`
`of the second determination (Bourque, 11[0031], authenticator challenges
`
`peripheral by sending a random number over the authentication configured data
`
`lines. The peripheral computes a response with a secret key and returns that
`
`response. Authenticator receives that response, compares it with an expected
`
`response and if they match, determines that peripheral is authentic. Also
`
`Priyadarshi, col 5, line 40-50, the source device then reads the memory and
`
`signature back across the BBC channel after waiting a period of time. The
`
`source device then verifies the signature using the display device’s public key.
`
`The display device’s status is then verified by searching through a database of
`
`trusted devices using the display device’s public key. The source device then
`
`determines whether to commence or continue sending the display device its
`
`digital audio/video data).
`
`12.
`
`Regarding Claim 5, Bourque in view of Priyadarshi discloses the
`
`method according to claim 1, further comprising transmitting the received
`
`first signature information and the capability information to an external
`
`
`
`Application/Control Number: 15/644,862
`Art Unit: 2433
`
`Page 13
`
`server through a network (Bourque, 1i[0031], authenticator challenges
`
`peripheral by sending a random number over the authentication
`
`configured data lines. The peripheral computes a response with a secret
`
`key and returns that response. Authenticator receives that response,
`
`compares it with an expected response and if they match, determines
`
`that peripheral is authentic. Also Priyadarshi, col 5, line 40-50, the source
`
`device then reads the memory and signature back across the BBC
`
`channel after waiting a period of time. The source device then verifies
`
`the signature using the display device’s public key. The display device’s
`
`status is then verified by searching through a database of trusted devices
`
`using the display device’s public key. The source device then determines
`
`whether to commence or continue sending the display device its digital
`
`audio/video data),
`
`wherein a random number generated with the external server is
`
`acquired, as the random number acquired in the acquiring of the random
`
`number, through the network (Bourque, 1i[0031], authenticator
`
`challenges peripheral by sending a random number over the
`
`authentication configured data lines. The peripheral computes a
`
`response with a secret key and returns that response. Authenticator
`
`receives that response, compares it with an expected response and if
`
`they match, determines that peripheral is authentic. Also Priyadarshi, col
`
`5, line 40-50, the source device then reads the memory and signature
`
`back across the BBC channel after waiting a period of time. The source
`
`
`
`Application/Control Number: 15/644,862
`Art Unit: 2433
`
`Page 14
`
`device then verifies the signature using the display device’s public key.
`
`The display device’s status is then verified by searching through a
`
`database of trusted devices using the display device’s public key. The
`
`source device then determines whether to commence or continue
`
`sending the display device its digital audio/video data), and
`
`a result of a first determination made by the external server is
`
`acquired, as the result of the first determination acquired in the acquiring
`
`of the result of the first determination, through the network (Bourque,
`
`11[0031], authenticator challenges peripheral by sending a random
`
`number over the authentication configured data lines. The peripheral
`
`computes a response with a secret key and returns that response.
`
`Authenticator receives that response, compares it with an expected
`
`response and if they match, determines that peripheral is authentic. Also
`
`Priyadarshi, col 5, line 40-50, the source device then reads the memory
`
`and signature back across the BBC channel after waiting a period of
`
`time. The source device then verifies the signature using the display
`
`device’s public key. The display device’s status is then verified by
`
`searching through a database of trusted devices using the display
`
`device’s public key. The source device then determines whether to
`
`commence or continue sending the display device its digital audio/video
`
`data).
`
`
`
`Application/Control Number: 15/644,862
`Art Unit: 2433
`
`Page 15
`
`13. Regarding claim 6, Bourque in view of Priyadarshi discloses the method
`
`according to claim 2, further comprising transmitting the received
`
`certification information and the second signature information to an
`
`external server through a network,
`
`wherein a random number generated with the external server is
`
`acquired, as the random number acquired in the acquiring of the random
`
`number, through the network (Bourque, 11[0031], authenticator
`
`challenges peripheral by sending a random number over the
`
`authentication configured data lines. The peripheral computes a
`
`response with a secret key and returns that response. Authenticator
`
`receives that response, compares it with an expected response and if
`
`they match, determines that peripheral is authentic. Also Priyadarshi, col
`
`5, line 40-50, the source device then reads the memory and signature
`
`back across the BBC channel after waiting a period of time. The source
`
`device then verifies the signature using the display device’s public key.
`
`The display device’s status is then verified by searching through a
`
`database of trusted devices using the display device’s public key. The
`
`source device then determines whether to commence or continue
`
`sending the display device its digital audio/video data),
`
`a result of a first determination made by the external server is
`
`acquired, as the result of the first determination in the acquiring of the
`
`result of the first determination, through the network (Bourque, 11[0031],
`
`authenticator challenges peripheral by sending a random number over
`
`
`
`Application/Control Number: 15/644,862
`Art Unit: 2433
`
`Page 16
`
`the authentication configured data lines. The peripheral computes a
`
`response with a secret key and returns that response. Authenticator
`
`receives that response, compares it with an expected response and if
`
`they match, determines that peripheral is authentic. Also Priyadarshi, col
`
`5, line 40-50, the source device then reads the memory and signature
`
`back across the BBC channel after waiting a period of time. The source
`
`device then verifies the signature using the display device’s public key.
`
`The display device’s status is then verified by searching through a
`
`database of trusted devices using the display device’s public key. The
`
`source device then determines whether to commence or continue
`
`sending the display device its digital audio/video data), and
`
`a result of a second determination made by the external server is
`
`acquired, as the result of the second determination in the acquiring of the
`
`result of the second determination, through the network (Bourque,
`
`1i[0031], authenticator challenges peripheral by sending a random
`
`number over the authentication configured data lines. The peripheral
`
`computes a response with a secret key and returns that response.
`
`Authenticator receives that response, compares it with an expected
`
`response and if they match, determines that peripheral is authentic. Also
`
`Priyadarshi, col 5, line 40-50, the source device then reads the memory
`
`and signature back across the BBC channel after waiting a period of
`
`time. The source device then verifies the signature using the display
`
`device’s public key. The display device’s status is then verified by
`
`
`
`Application/Control Number: 15/644,862
`Art Unit: 2433
`
`Page 17
`
`searching through a database of trusted devices using the display
`
`device’s public key. The source device then determines whether to
`
`commence or continue sending the display device its digital audio/video
`
`data).
`
`14.
`
`Regarding claim 7, Bourque in view of Priyadarshi discloses the method
`
`according to claim 1, wherein each of the first secret key and the first
`
`public key is an encryption key that the sink device previously retains
`
`(Bourque, 1i[0031], authenticator challenges peripheral by sending a
`
`random number over the authentication configured data lines. The
`
`peripheral computes a response with a secret key and returns that
`
`response. Authenticator receives that response, compares it with an
`
`expected response and if they match, determines that peripheral is
`
`authentic. Also Priyadarshi, col 5, line 40-50, the source device then
`
`reads the memory and signature back across the BBC channel after
`
`waiting a period of time. The source device then verifies the signature
`
`using the display device’s public key. The display device’s status is then
`
`verified by searching through a database of trusted devices using the
`
`display device’s public key. The source device then determines whether
`
`to commence or continue sending the display device its digital
`
`audio/video data).
`
`
`
`Application/Control Number: 15/644,862
`Art Unit: 2433
`
`Page 18
`
`15. Regarding Claim 8, Bourque discloses a method for use in a sink
`
`device, the method comprising:
`
`receiving a random number from the source device through a High
`
`Definition Multimedia Interface-Consumer Electronics Control (HDMI-
`
`CEC) bus (Bourque, 1i[0031], authenticator challenges peripheral by
`
`sending a random number over the authentication configured data lines.
`
`The peripheral computes a response with a secret key and returns that
`
`response. Authenticator receives that response, compares it with an
`
`expected response and if they match, determines that peripheral is
`
`authentic);
`
`encrypting the received random number with a first secret key
`
`corresponding to the sink device (Bourque, 1i[0049], an authentication
`
`response is communicated to the host device via the non-media channel.
`
`This response may include an identifier, which may identify various
`
`aspects of peripheral including a peripheral type, a peripheral class, a
`
`manufacturer, functionalities made available by peripheral. This identifier
`
`is accessible from peripheral such as being stored in peripheral media,
`
`can be unique and cryptographically secure. Authentication module may
`
`also encrypt the identifier prior to communicating or include a
`
`cryptographic response if so requested by host device); and
`
`Bourque does not explicitly teach the following limitation that
`
`Priyadarshi teaches:
`
`
`
`Application/Control Number: 15/644,862
`Art Unit: 2433
`
`Page 19
`
`transmitting first signature information and capability information to
`
`the source device through the HDMI-CEC bus, the first signature
`
`information being obtained by encrypting the random number, the
`
`capability information storing therein information about a display
`
`capability of the sink device (Priyadarshi, col 5, line 40-50, the source
`
`device then reads the memory and signature back across the BBC
`
`channel after waiting a period of time. The source device then verifies
`
`the signature using the display device’s public key. The display device’s
`
`status is then verified by searching through a database of trusted devices
`
`using the display device’s publ