DCT
1:19-cv-02047
Piracy Protection LLC v. Onkyo USA Corp
I. Executive Summary and Procedural Information
- Parties & Counsel:- Plaintiff: Piracy Protection LLC (Delaware)
- Defendant: Pioneer & Onkyo U.S.A. Corporation (Delaware)
- Plaintiff’s Counsel: Stamoulis & Weinblatt LLC
 
- Case Identification: 1:19-cv-02047, D. Del., 10/29/2019
- Venue Allegations: Plaintiff alleges venue is proper in the District of Delaware because Defendant is a Delaware corporation that conducts substantial business in the district, including committing at least a portion of the alleged infringements there.
- Core Dispute: Plaintiff alleges that Defendant’s Universal Disc Player infringes a patent related to methods for managing digital copyrights by selectively decrypting and re-encrypting data based on the intended use.
- Technical Context: The lawsuit concerns digital rights management (DRM) technology, specifically as applied to consumer electronics that play content from prerecorded optical media like Blu-ray discs.
- Key Procedural History: The complaint references a prior decision by the U.S. Patent and Trademark Office Board of Patent Appeals and Interferences (BPAI) concerning the patent-in-suit. Plaintiff asserts this decision supports the novelty of the claimed invention, stating the BPAI found that the prior art did not disclose or suggest permitting different forms of usage based on whether the data was in a decrypted or re-encrypted state.
Case Timeline
| Date | Event | 
|---|---|
| 1994-10-27 | '782 Patent Priority Date | 
| 2013-03-26 | '782 Patent Issue Date | 
| 2014 | Pioneer establishes an AACS Authorized Certification Entity | 
| 2019-10-29 | Complaint Filing Date | 
II. Technology and Patent(s)-in-Suit Analysis
U.S. Patent No. 8,407,782 - "Data Copyright Management"
The Invention Explained
- Problem Addressed: The patent addresses the problem that, unlike analog data which degrades with each copy, digital data can be copied, stored, and transferred repeatedly without any loss of quality. This creates a significant challenge for managing and controlling the copyrights of digital media, as there were "no means in the prior art for copyright management and control" of such actions. (’782 Patent, col. 2:16-25; Compl. ¶10).
- The Patented Solution: The invention proposes a method for managing data usage by employing a two-track cryptographic system. For a "first form of usage" (e.g., displaying or editing data), the system decrypts the protected data using a "first crypt key." However, for a "second set of usages" (e.g., storing, copying, or transferring data), the system does not permit use of the decrypted data. Instead, it generates a "re-encrypted version" of the data using a "second crypt key," and this re-encrypted version is used for the second form of usage. (’782 Patent, col. 29:53-30:5). This dual-path approach, illustrated in the patent's Figure 8(b), allows for controlled access based on the user's intended action. (’782 Patent, Fig. 8(b); col. 18:8-41).
- Technical Importance: This approach provided a granular control mechanism for digital content, allowing content owners to permit low-risk activities (like viewing) with decrypted data while requiring higher-risk activities (like copying) to be handled with re-encrypted, and thus still protected, data. (’782 Patent, col. 18:42-51).
Key Claims at a Glance
- The complaint asserts infringement of at least independent Claim 1. (Compl. ¶20).
- Claim 1 Elements:- A method performed by a first computing device, the method comprising:
- receiving an encrypted version of a first set of protected digital data;
- receiving a first crypt key specifically associated with the first set of protected digital data;
- decrypting the encrypted version of the first set of protected digital data using the first crypt key to produce decrypted digital data;
- managing forms of usage of the first set of protected digital data, wherein said managing includes, for a first form of usage requested by a user of the first computing device:- when the first form of usage is one of a first set of usages, permitting the first form of usage using the decrypted digital data; and
- when the first form of usage is one of a second set of usages distinct from usages in the first set, permitting the first form of usage on a re-encrypted version of the decrypted digital data generated by re-encrypting the decrypted digital data using a second crypt key.
 
 
- The complaint does not explicitly reserve the right to assert dependent claims.
III. The Accused Instrumentality
Product Identification
- The UDP-LX500 Universal Disc Player (the "Accused Device"). (Compl. ¶20).
Functionality and Market Context
- The Accused Device is a Blu-ray disc player that plays high-definition content. The complaint alleges its operation is governed by the Advanced Access Content System (AACS) specification, which is a DRM standard for managing content on optical media. (Compl. ¶22, p. 5).
- The infringement allegations focus on the device's process for handling encrypted content from a Blu-ray disc. This involves decrypting the AACS-protected content for processing and then managing its output to different connections, such as analog outputs or digital outputs like HDMI, which may be protected by a separate DRM scheme (HDCP). (Compl. ¶¶ 23-26). The complaint provides a technical diagram from the AACS specification illustrating the encryption and decryption process in a compliant playback device. (Compl. p. 7, Fig. 6-2). This diagram shows encrypted content from media being decrypted by the playback device to produce viewable content. (Compl. p. 7, Fig. 6-2).
- The complaint alleges Defendant established an AACS Authorized Certification Entity to verify that its Blu-ray products conform to AACS specifications, positioning the Accused Device as compliant with the industry standard for protected media playback. (Compl. ¶22, p. 5).
IV. Analysis of Infringement Allegations
- ’782 Patent Infringement Allegations
| Claim Element (from Independent Claim 1) | Alleged Infringing Functionality | Complaint Citation | Patent Citation | 
|---|---|---|---|
| receiving an encrypted version of a first set of protected digital data | The Accused Device receives an encrypted version of AACS Content on a pre-recorded Blu-Ray Read Only Media. | ¶23 | col. 29:54-55 | 
| receiving a first crypt key specifically associated with the first set of protected digital data | The Accused Device receives keys from the Blu-ray disc (e.g., Media Key Block) that are processed to derive a title key (Kt) used for decryption. This is alleged to be the "first crypt key." | ¶23 | col. 29:56-58 | 
| decrypting the encrypted version... using the first crypt key to produce decrypted digital data | The Accused Device uses the derived key (Kt) to decrypt the AACS Content, producing "Decrypted AACS Content." | ¶23 | col. 29:59-62 | 
| managing forms of usage... wherein said managing includes, for a first form of usage requested by a user... when the first form of usage is one of a first set of usages, permitting the first form of usage using the decrypted digital data | For a "first set of usages," such as outputting to analog connections, the AACS Adopter Agreement allegedly permits the player to pass "Decrypted AACS Content." | ¶¶24-25 | col. 30:1-3 | 
| and when the first form of usage is one of a second set of usages distinct... permitting the first form of usage on a re-encrypted version... generated by re-encrypting the decrypted digital data using a second crypt key | For a "second set of usages," such as outputting to digital connections (e.g., HDMI), the player must re-encrypt the content using a different protection scheme like HDCP. The complaint alleges HDCP constitutes re-encryption with a "second crypt key." A diagram illustrates the HDCP cipher structure. (Compl. p. 14, Fig. 3.2). | ¶26 | col. 30:3-5 | 
- Identified Points of Contention:- Scope Questions: A central question may be whether the two scenarios alleged by the plaintiff—outputting decrypted content to an analog port versus re-encrypting it with HDCP for a digital port—constitute two distinct "forms of usage" as contemplated by the patent. The patent provides examples like "displaying" vs. "storing" or "copying," which may raise the question of whether the claim is directed at user-initiated actions rather than different technical output pathways. (’782 Patent, col. 29:53-30:5).
- Technical Questions: The infringement theory relies on mapping two separate, industry-standard DRM schemes (AACS and HDCP) onto the patent's integrated, two-key system. A technical question will be whether the HDCP encryption process, which protects the signal leaving the player, is properly characterized as "re-encrypting the decrypted digital data" using a "second crypt key" within the meaning of a single, managing method claimed in the patent.
 
V. Key Claim Terms for Construction
- The Term: "managing forms of usage" - Context and Importance: This term is the preamble to the core functional limitations of the claim. Its construction will determine what types of activities qualify as the distinct "usages" that trigger either the decryption path or the re-encryption path. The viability of the infringement theory depends on whether outputting to different physical ports (analog vs. digital/HDCP) falls within the scope of "managing forms of usage."
- Intrinsic Evidence for Interpretation:- Evidence for a Broader Interpretation: The body of Claim 1 itself does not explicitly limit the "forms of usage" to specific user actions, which may support an interpretation that includes different technical modes of operation, like selecting different output types.
- Evidence for a Narrower Interpretation: The patent specification repeatedly gives examples of usages such as "displaying," "editing," "storing," "copying," and "transferring." (’782 Patent, col. 12:5-15, col. 18:35-41). Practitioners may focus on this language to argue that "forms of usage" refers to functionally different user objectives, not merely the selection of different output ports that achieve the same ultimate goal (displaying content). Dependent claims 2 and 3 explicitly recite these specific actions. (’782 Patent, col. 30:6-9).
 
 
- The Term: "second crypt key" - Context and Importance: The infringement theory equates the keying mechanism of the HDCP standard with the claimed "second crypt key." The case may turn on whether a key from a separate, secondary DRM standard (HDCP) can be considered the "second crypt key" of the single, integrated method claimed in the patent.
- Intrinsic Evidence for Interpretation:- Evidence for a Broader Interpretation: The patent does not appear to explicitly restrict the "second crypt key" to one that is generated or controlled by the same entity that provides the "first crypt key." The specification discusses a system where a first secret key (Ks1) is used for initial decryption and a second secret key (Ks2) is used for subsequent encryption/decryption for storage or transfer. (’782 Patent, col. 25:57-65). This could be argued to align with the AACS/HDCP model.
- Evidence for a Narrower Interpretation: The patent describes a unified system where the keys (Ks1, Ks2) are managed and distributed as part of a cohesive copyright management scheme. (’782 Patent, col. 25:20-31). It could be argued that the claimed invention contemplates a single, coherent system, not the combination of two independently developed standards like AACS and HDCP, which may have different key management and distribution protocols.
 
 
VI. Other Allegations
- Indirect Infringement: The complaint does not contain a specific count for indirect infringement (inducement or contributory). The allegations are focused on direct infringement under 35 U.S.C. § 271(a) through Defendant's acts of making, using, selling, and importing the Accused Device. (Compl. ¶20).
- Willful Infringement: The complaint does not explicitly allege willful infringement or plead facts indicating Defendant had pre-suit knowledge of the ’782 patent. It does, however, request in its prayer for relief a declaration that the case is "exceptional under 35 U.S.C. § 285" and an award of attorneys' fees. (Compl. p. 16, ¶C).
VII. Analyst’s Conclusion: Key Questions for the Case
- A core issue will be one of definitional scope: can the patent's concept of distinct "forms of usage," which the specification exemplifies with user actions like "viewing" versus "copying," be construed to cover the technical distinction between outputting unencrypted data to an analog port versus re-encrypting it under the HDCP standard for a digital port?
- A key question of technical mapping will be central to the infringement analysis: does the accused player's use of two separate DRM standards—AACS for disc decryption and HDCP for output protection—constitute the single, integrated "managing" method that uses a "first crypt key" and a distinct "second crypt key" as required by Claim 1, or is this an impermissible combination of disparate systems to meet the claim limitations?