throbber
Case 3:16-cv-02433 Document 1-8 Filed 05/04/16 Page 1 of 9
`Case 3:l6—cv—O2433 Document 1-8 Filed 05/04/16 Page 1 of 9
`
`  
`
`EXHIBIT H 
`
`EXHIBIT H
`

`

`
`

`
`Case 3:16-cv-02433 Document 1-8 Filed 05/04/16 Page 2 of 9
`Case 3‘16'°“'°2433 ”°°””‘e1l|l|l||||lfl|1|l||MIlW|I1|1llllfllllilllfilllll1|||||||||||||||
`
`US006985586B2
`
`(12) United States Patent
`Ififl
`
`(10) Patent N0.:
`
`(45) Date of Patent:
`
`US 6,985,586 B2
`Jan. 10, 2006
`
`(54) DISTRIBUTED INFORMATION AND
`STORAGE SYSTEM
`
`(75)
`
`Inventor: Michael John Hill, Coppet (CH)
`
`(73) Assignee: Nagracard S.A.,
`Cheseaux-sur-Lausanne (CH)
`
`( * ) Notice:
`
`Subject to any disclaimer, the term of this
`patent is extended or adjusted under 35
`U.S.C. 154(b) by 956 days.
`
`(21) Appl. No.: 09/796,261
`
`(22)
`
`Filed:
`
`Feb. 28, 2001
`
`(65)
`
`Prior Publication Data
`US 2002/0080962 A1 Jun. 27, 2002
`
`(30)
`
`Foreign Application Priority Data
`
`Dec. 22, 2000
`
`(CH) ............................................ .. 2518/00
`
`(51)
`
`Int. Cl.
`G06F 17/00
`
`(2006.01)
`
`W0
`
`WO 00/11871
`
`3/2000
`
`OTHER PUBLICATIONS
`
`A stream tapping protocol with partial preloading Paris,
`J.—F.; Modeling, Analysis and Simulation of Computer and
`Telecommunication Systems, 2001. Proceedings. Ninth
`International. *
`
`Improving Video—on—demand server efficiency through
`stream tapping Carter, S.W.; Long, D.D.E.; Computer Com-
`munications and Networks, 1997. Proceedings, Sixth Inter-
`national Conference on , Sep. 22-25, 1997.*
`Implementation of a terrestrial return channel for digital
`interactive video broadcast Allan, R.; Taylor, C.; Broadcast-
`ing Convention, 1997. International , Sep. 12-16, 1997.*
`Chang, Y —H., et al.: An Open—Systems Approach to Video
`on Demand, IEEE Communications Magazine, vol. 32, No.
`5, 68-80, May 1, 1994.
`
`* cited by examiner
`
`Primary Examiner—David Jung
`(74) Attorney, Agent, or Firm—Clifford W. Browning;
`Woodard, Emhardt, Moriarty, McNett & Henry LLP
`
`(57)
`
`ABSTRACT
`
`(52) U.S. Cl.
`
`......................... .. 380/231; 380/200; 725/2;
`725/4
`
`The aim of the present invention is to propose a method that
`allows the reduction of the bandwidth needs in a structure
`
`(58) Field of Classification Search ............... .. 380/200,
`380/231-234, 210-212, 255-264; 725/1-5,
`725/105-134; 370/200-205; 213/150-154
`See application file for complete search history.
`
`that implements an operating center and a plurality of user
`units, ensuring the availability for the final user, of a product
`amongst a vast choice and being able to be downloaded by
`said user in a short period of time.
`
`(56)
`
`References Cited
`U.S. PATENT DOCUMENTS
`
`5,341,425 A
`5,898,456 A
`
`8/1994 Wasilewski
`4/1999 Wahl
`
`FOREIGN PATENT DOCUMENTS
`
`EP
`EP
`EP
`
`0672991 A2
`0843449 A2
`0884669 A2
`
`9/1995
`5/1998
`12/1998
`
`This aim is achieved by a system that implements at least
`one operating center that has a great number of products, a
`plurality of user units comprising security and storage
`means, characterized in that the link between at least one
`group of user units is of the bidirectional type and that the
`operating center comprises means for the transfer of a
`product that is stored in the storage means of a user unit to
`another user unit.
`
`14 Claims, 3 Drawing Sheets
`
`9' ‘*1
`
`V
`J
`
`fi()flfl
`
`CC2
`
`

`
`Case 3:16-cv-02433 Document 1-8 Filed 05/04/16 Page 3 of 9
`Case 3:16—cv—O2433 Document 1-8 Filed 05/04/16 Page 3 of 9
`
`U.S. Patent
`
`Jan. 10, 2006
`
`Sheet 1 on
`
`US 6,985,586 B2
`
`CCS
`
`

`
`Case 3:16-cv-02433 Document 1-8 Filed 05/04/16 Page 4 of 9
`Case 3:16—cv—O2433 Document 1-8 Filed 05/04/16 Page 4 of 9
`
`U.S. Patent
`
`Jan. 10, 2006
`
`Sheet 2 on
`
`US 6,985,586 B2
`
`(X)CA m Fig, 2
`
`OOCA
`
`(CA)Kb
`
`Fig_ 3
`
`Fig_ 4
`
`000A
`
`IE3
`
`Fig. 5
`
`

`
`Case 3:16-cv-02433 Document 1-8 Filed 05/04/16 Page 5 of 9
`Case 3:16—cv—O2433 Document 1-8 Filed 05/04/16 Page 5 of 9
`
`U.S. Patent
`
`Jan. 10, 2006
`
`Sheet 3 of3
`
`US 6,985,586 B2
`
`BD
`
`BDB
`
`CC1..........-......»...«..»....m...m....-....u-
`
`DC1<3
`a5%.
`
`DC2
`
`CC2
`
`Fig.6
`
`

`
`Case 3:16-cv-02433 Document 1-8 Filed 05/04/16 Page 6 of 9
`Case 3:16—cv—O2433 Document 1-8 Filed 05/04/16 Page 6 of 9
`
`US 6,985,586 B2
`
`1
`DISTRIBUTED INFORMATION AND
`STORAGE SYSTEM
`
`This invention concerns a system and a method of
`management of distributed data, particularly in a system that
`involves an operating center and a plurality of user units.
`
`BACKGROUND OF THE INVENTION
`
`In a data distribution system from a central site to a great
`number of users,
`the organisers of such a resource are
`regularly occupied with two matters. The first concerns the
`security of the data, that is, to ensure that the targeted user
`is the only one to receive the requested data, and for his/her
`use only.
`The second matter is the capacity of the distribution
`means, that is,
`the galvanic or optic lines, cable, or the
`radio-relay network.
`The operating center has an important data base that
`contains the products offered to the users either subject to
`payment or free of charge. According to the recent structures
`of this type of center only one part of these products are
`stored locally, the other products being stored by the pro-
`ducer of these data and linked to the operating center by high
`speed communication means.
`The user sends a request to the operating center compris-
`ing his/her identity, address, and the desired product.
`The operating center determines the acceptability of this
`request, particularly according to the payment methods of
`this user. These methods can be by subscription, with
`unlimited access to the products, upon presentation of bills,
`payment by credit card, or pre-payment.
`The product is sent in encrypted form with a user’s key,
`that is, according to a key that is contained in a security
`module at the user’s location.
`
`This type of service is used for hiring video films through
`pay television. In this use the subscriber has a security
`module connected to his/her decoder that processes the
`encrypted data and sends the decryption keys to the decoder.
`This security module also administers credit information.
`This system works today with the so called form NVOD
`(Near Video On Demand) and VOD.
`In the first case
`(NVOD) the proposed product for buying is sent loopback
`to all the users, sometimes through several channels simul-
`taneously with a time delay. The buyer then can only buy
`this specific product and will wait for the next emission to
`start the visual display. An embodiment of this mode con-
`sists in sending several products during the time of inactivity
`of the system (generally in the morning), said products being
`stored in the mass memory of the decoder. The products thus
`memorised are then proposed to the user for buying and can
`be visualised at any given moment.
`In either of these embodiments the number of proposed
`products is lower than ten, taking into account the transmis-
`sion and storage possibilities of a product.
`The second case, which is particularly interesting, pro-
`poses supplying the product of your choice amongst a very
`important catalogue of products. Each user can then choose
`from this catalogue and the operating center sends him/her
`the desired product. This is only possible in a restricted
`environment with very important transmission capacities.
`The implementation on a large scale of such a system has
`very quickly collided with the bandwidth limits of the
`transmission means. Just to remember, it is reminded here
`that the transmission of a 2 hour film represents 1 gigabyte
`of high compressed data.
`
`10
`
`15
`
`20
`
`25
`
`30
`
`35
`
`40
`
`45
`
`50
`
`55
`
`60
`
`65
`
`2
`SUMMARY OF THE INVENTION
`
`The aim of this invention is to propose a system and a
`method that allows the reduction of the bandwidth needs
`
`ensuring a better availability for the final user of a product
`amongst a vast choice, and being said user able to receive
`this product in a short period of time without compromising
`the quality or the time to obtain this product.
`This aim is achieved by a system that implements at least
`one operating center that has a great number of products, of
`a plurality of user units comprising security and storage
`means, characterised in that the link between at least one
`group of user units is of the bidirectional type and that the
`operating center comprises means for transferring a product
`that is stored in the storage means of one user unit to another
`user unit.
`
`In this way, thanks to this system, the operating center
`uses the storage means of the user units as intermediate
`storage means. It is enough to send the product only once to
`a user amongst a group of users so that each request of the
`same product coming from this group of users does not
`cause the transmission from the operating center, but the unit
`containing the desired product will take the relays locally to
`transmit it to the final user.
`
`This invention includes also a method for the optimisation
`of the transmission on demand towards a final user, method
`consisting in:
`receiving by the operating center of a transmission request
`of a product from a first user unit connected to a local
`bi-directional network,
`determining if the requested product is already in a second
`user unit connected to the same local network,
`if the negative event,
`transmitting from the operating
`center to the first user unit and storing the product in
`said first user unit,
`if the positive event, ordering the transfer of the product
`from the second unit to the first user unit,
`transmitting by the operating center the necessary data for
`the decryption of the product.
`This method also comprises a detection phase, that is, a
`test phase in order to know which user units have such a
`product. This can be achieved in a centralised way as it is
`directed by the operating center, but
`it can equally be
`established by means of a request to the user units.
`In fact, a unit may be disconnected or may not be capable
`anymore of carrying out
`this transfer. In this case,
`the
`method according to the invention consists in determining
`which are the units that have the desired product and
`ordering the transfer from one unit to another.
`An important aspect of the invention is that
`security into account during these operations.
`Each product is sent in encrypted form. The encryption
`operation is ensured by a transport key CA normally gen-
`erated in a random way. According to an embodiment of the
`invention,
`it is under this form that the operating center
`stores the products.
`When the user Arequests a product X, the key CA, having
`been used to encrypt the product X, is encrypted by a key Ka
`of the user A and is enclosed with the encrypted data of the
`product X.
`When the user unit A is asked to transmit the product X
`to the unit B, only the encrypted product X is transmitted
`onto the bidirectional network. The operating center, know-
`ing the key CA, will encrypt it according to a key Kb of the
`user B and transmits it to him/her. Once the X product
`coming from the A unit and the Kb key arrive at unit B it is
`then possible for the B unit to dispose of product X.
`
`takes
`
`it
`
`

`
`Case 3:16-cv-02433 Document 1-8 Filed 05/04/16 Page 7 of 9
`Case 3:16—cv—O2433 Document 1-8 Filed 05/04/16 Page 7 of 9
`
`US 6,985,586 B2
`
`3
`The amount of information transmitted from the operating
`center is negligible compared to the transmitted data
`between unit A and unit B.
`
`It is necessary that the link between a group of users is of
`the high speed bidirectional type. On the contrary, it is not
`necessary that the link with the center is of the same type.
`It is also possible that only the link to the users is of the high
`speed type (for example by satellite link), the return path
`being carried out by a classical modem.
`According to an embodiment of implementation of the
`invention,
`the user units are linked to several networks.
`These networks are administered by different operators and
`the method according to the invention allows the use of the
`connection capacities by another operator to carry out the
`transfer.
`
`An example of such a configuration implements a unit
`that comprises a Hertzian receiver (or satellite) and an
`interface with a cable network. According to this example
`the operating center has a one way route to its subscriber
`with the Hertzian route. Nevertheless, the operating center
`has the necessary information for finding the subscriber on
`the cable network of another operator.
`It will then be possible to transfer the requests for prod-
`ucts to the operating center and inversely, the center will be
`able to request the transfer of a product from a subscriber of
`the cable network to another subscriber.
`
`BRIEF DESCRIPTION OF THE DRAWING
`FIGURES
`
`The invention will be better understood with the follow-
`
`ing detailed description that makes reference to the annexed
`figures in which:
`FIG. 1 represents the configuration of the system of the
`invention,
`FIGS. 2 to 4 represent the packages of exchanged data
`between the operating center and the user units.
`FIG. 5 represents a package of exchanged data between
`the operating center and the user units accompanied by a
`header and a transaction registration section.
`FIG. 6 represents a system architecture, according to the
`invention, implementing different operators.
`DETAILED DESCRIPTION OF THE
`PREFERRED EMBODIMENTS
`
`In FIG. 1 the operating center DS is linked upstream to the
`processing center CCS in charge of administering the
`requests of products to be sent coming from the users. For
`this purpose it has a local storage memory LBD that contains
`the most often requested products. This processing center
`CCS is equally linked to the on-line data base services MS
`which it can solicit at any time. These servers MS are linked
`to the processing center CCS by means of a high speed link.
`The operating center DS is linked by known means to the
`user units MC (cable, fibre optics, Hertzian, ADSL, T1 .
`.
`.
`These units have storage means HD of enough capacity for
`storing at least one product, for example several gigabytes.
`The link between each unit MC and the center can be
`
`either through the same channel in which the data are sent
`to the units or through an alternative channel such as by
`modem, by ADSL connection, or GSM represented by the
`doffed line.
`
`A request is sent by the unit MCa to the operating center
`DS for a product X. The center examines if this product is
`already present in one of the units connected to the same fast
`network NetA, in any of the units MCb, MCc and MCd in
`our example.
`
`10
`
`15
`
`20
`
`25
`
`30
`
`35
`
`40
`
`45
`
`50
`
`55
`
`60
`
`65
`
`4
`The concentrator BD in our example does not allow the
`link between the network NetA and NetM. In the inverse
`
`hypothesis, units MCm to MCp would equally be taken into
`account for determining the presence of the product X.
`If the product X is not found in any unit it is sent to the
`unit MCa, encrypted by a transport key CA, this key being
`itself encrypted by a key specific to the unit MCa.
`When the unit MCd requests the same product X to the
`operating center, the center transmits to the unit MCa the
`instruction to transfer the product X encrypted with the key
`CA. In parallel, the operating center sends to the unit MCd
`the transport key CA encrypted by a key specific to the unit
`MCd. The latter is from then on capable of disposing of
`product X.
`FIG. 2 represents a package sent by the operating center
`to a user unit MCa. The product X is encrypted by the key
`CA, itself being encrypted by the key specific to the unit
`MCa, the key Ka.
`The center asks the unit MCa to transfer the product X to
`the unit MCb and it is the package represented in FIG. 3 that
`is sent on the local network.
`
`The operating center sends the key CA, encrypted by the
`key specific to the unit MCb to the latter.
`It is then possible that one user unit contains several
`products in its storage unit. To administer this memory it is
`provided, according to the invention,
`to enclose to each
`product a persistence indicator. In fact, if this product is
`highly specialised, there will be few probabilities that it will
`be requested by another user. In this case, the product will
`be erased from the storage unit after a short period of time.
`Inversely, if this product is a well known novelty, the
`duration of storage will be long in order to satisfy a
`maximum of users.
`
`This persistence indicator can be turned to zero on every
`transfer request or by a command from the operating center.
`This structure allows to administer in an optimal way the
`storage capacities of the user units. In fact, when the product
`X is sent to the unit MCa, it is instantly available on the net.
`In order to anticipate another request from another group the
`MCm unit is requested to store the product X as well. The
`packet of the unit MCa containing the key CA encrypted
`with the key Ka is not stored in the unit MCm.
`The operating center is then ready to face a request from
`a member of the group A(NetA) and of the group M (NetM).
`This practice can be generalised for storing each product
`sent by at least one unit of each group.
`To determine which unit will be chosen, reference can be
`made to the available space in said unit, the preferences of
`the user or of a user group.
`When knowing the profile of the user, it is possible to
`anticipate his/her demand, if the product corresponds to a
`category that is regularly bought by said user. It is equally
`possible to use a unit having a very small use by its user.
`For the administration of a group of users’ profile, it is
`possible to establish the preferences of this group and to
`anticipate their eventual needs. According to the location of
`the considered local network, a group will be more inter-
`ested in sports, and it will be this category of products that
`will have priority of storage in the units of this group.
`One of the problems that
`the operating center may
`encounter in its attempt to transfer from one unit to another,
`is related to the activity of the unit containing the product.
`According to the executions, a unit may not be able to
`send a product on the network and at the same time display
`another product (or the same) for its owner.
`
`

`
`Case 3:16-cv-02433 Document 1-8 Filed 05/04/16 Page 8 of 9
`Case 3:16—cv—O2433 Document 1-8 Filed 05/04/16 Page 8 of 9
`
`US 6,985,586 B2
`
`5
`The center can know to a certain extent the supposed
`activity of each unit but the impulsive buying procedures
`may function without synchronised connection to the oper-
`ating center. The authorisation and the credit is administered
`in the user’s security module.
`This aspect is particularly important when the units have
`no high speed return route to the operating center. In this
`case, it is not desirable to ask each unit its status to know the
`activity on the unit that has the product in its storage means.
`This is why when a unit A requests a given product, said
`unit previously collects the list of products that are stored in
`the units belonging to the same network. This operation is
`very fast and does not penalise the performance of the
`network as the quantity of exchanged data is very small.
`In the data that is sent by the other units to unit A the state
`of each unit is equally included. A unit can then signal that
`it is not available for a download operation.
`Once these data have been collected, unit Asends them to
`the operating center with the request for the desired product.
`The center can verify the state of each unit depending on the
`picture it has in its data base and transmit
`the transfer
`instruction to the unit that is most capable of carrying out the
`transfer without disturbance to its user.
`
`This manner of proceeding allows the operating center to
`regularly dispose of reliable information on the totality of
`user units. It would also be possible to eliminate the picture
`for each unit of the sent products in order to use only the list
`that is received with each request.
`In an embodiment of the invention, unit A sends a request
`specifying the desired product to the local network. The
`other units that have this product make themselves known
`and also signal their availability. According to the chosen
`protocol, unit A immediately requests the transfer of product
`X from the unit that is capable of supplying it. Unit A
`contacts the operating center to inform it of its wish to use
`product X and informs it that this product is already in its
`storage unit. The center has only to transmit the key specific
`to unit A. This can be done through the same channel that is
`used by unit A (for example, by modem) or by the standard
`transmission route (cable, satellite, fibre optics .
`.
`.
`For operational reasons, once the list of stored products in
`their storage unit is transmitted,
`the user units block the
`persistence indicator during the pre-selected time in order to
`avoid that a product is erased during the interval separating
`this inquiry and a possible transfer order.
`When the transfer is carried out, unit A confirms that this
`transfer is successfully finished together with its signature.
`The latter will allow to retrace the use of all
`the sent
`
`products, for example, in order to assess a report to the
`on-line data base service.
`
`When a new film is issued, a previous transmission is
`carried out in order to store this film at least in one unit per
`group. When it is promotionally launched, the demand of the
`users can immediately be satisfied according to the embodi-
`ment.
`
`This method can be generalised in order to use the storage
`capacities of the user units. It is common to connect a great
`number of units to a local network. The use of only a part of
`the storage capacities (for example 50%) of each unit
`represents the possibility of storing a great number of
`products amongst all these units. For a hundred units con-
`nected to a network this means about 500 products imme-
`diately available.
`The preferences of units that have very little activity will
`be selected in order to not penalise the normal use of the
`
`60
`
`65
`
`6
`unit. It is also possible to store this film in several units per
`group in order to ensure that a distribution can be made at
`all times.
`
`According to an embodiment, different copies of the same
`product are encrypted by a different key CA. When the
`product X is sent to a member of the group NetA, the key
`CA1 is used. It is with a key CA2 that the same product X
`is encrypted and sent to a member of the group NetM. This
`allows to minimise the consequences of a malicious decryp-
`tion of product X. In this case only the members of a same
`group could obtain the key CA1 and dispose of product X
`without compensation.
`The encrypted product is accompanied by a header HD as
`illustrated in FIG. 5. This header is not encrypted so that the
`type of product that is stored in the unit can be recognised.
`It contains the title, the source of the product, the date of
`creation, the duration of validity (or persistence index), a
`signature of the operating center and of the on-line data base
`service with their certifications, and the number of possible
`transfers. This list is not comprehensive and can comprise
`other information.
`
`This block of data is accompanied by a signature in order
`to guarantee that these data are not modified.
`To follow and retrace the different transfers of a product
`from one unit to the other a transaction registration section
`TR is added to said product. This section is divided in to
`modules, each module allowing to retrace one transfer.
`Unit A contains the product X in its storage unit. When a
`transfer to unit B takes place, unit A inscribes its signature
`in the available module with the status “transmitted”. When
`
`the transmission is finished unit B inscribes its signature in
`the same module with the mention “received”.
`
`In this way, with each transfer, the transaction registration
`section is updated with the signature for the units through
`which the file will have passed. Once the maximum number
`of authorised transfers is obtained the transaction registra-
`tion section as well as the header of the product are sent to
`the operating center for their verification. These verifications
`arriving from the user units can be signed by the operating
`center and sent to the on-line data base server MS.
`
`According to an architecture that implements different
`operators such as illustrated in FIG. 6, the on-line data base
`server MS with its data base DB is linked to a processing
`center CCS. In our example, this center is linked to two
`distribution centers DC1 and DC2. The first is linked to user
`
`groups MC by a high speed bidirectional link. Generally a
`user group is linked to a head end BD whose functionality
`can be more or less advanced. The most simple version only
`works as relays between the distribution center and the user
`group below, the most sophisticated varieties allow to make
`transfers between two user groups and have their own
`storage means BDB.
`The user units MC can call the call collection center CC1
`
`10
`
`15
`
`20
`
`25
`
`30
`
`35
`
`40
`
`45
`
`50
`
`55
`
`for the operations of requesting products. According to the
`chosen authorisation modes the distribution center DS1 does
`
`not have the means to authorise the decryption of a product,
`it requests this to the processing center CCS. It is to be noted
`that the distribution center DS1 can propose a service palette
`coming from several sources and is administered by a
`different entity from the one administering the processing
`center. This is the reason why the latter cannot delegate the
`authorisation and demand to receive the requests for prod-
`ucts. This demand can equally be applied to the on-line data
`base service MS. According to an embodiment the product
`X is encrypted by a first key generated by the on-line data
`base service MS and by a second key coming from the
`processing center CCS.
`
`

`
`Case 3:16-cv-02433 Document 1-8 Filed 05/04/16 Page 9 of 9
`Case 3:16—cv—O2433 Document 1-8 Filed 05/04/16 Page 9 of 9
`
`US 6,985,586 B2
`
`7
`According to an embodiment of this configuration several
`processing centers CCS and on-line data base services MS,
`share the supply of these products. The distribution center
`DS receives the requests of the users and relays this demand
`depending on the place where these products are. The
`product header HD includes an indication of the source of
`this product (the on-line data base service) as well as the
`processing center in charge of the latter.
`The distribution center DS2 is connected to the users by
`a satellite link. This link arrives at a local server HE that
`
`regroups several services. This server then distributes these
`services for example by means of a cable network.
`For the return route to the processing center this server is
`connected to a call concentrator CC2.
`I claim:
`
`1. Asystem comprising at least one operating centre that
`has a great number of products and a plurality of user units
`including security and storage means, wherein all or a part
`of the user units are connected to at least one local network,
`the link between a first user unit and a second user unit is of
`
`the bi-directional type said user units comprise means for
`transferring a product encrypted with a transport key and
`stored in the storage means of the first user unit for sending
`to the second user unit,
`the operating centre comprises
`means for transmitting the authorization to the second unit
`to decrypt the product.
`2. A system according to claim 1, wherein the first user
`unit comprises means for transmitting the encrypted product
`to the second user unit, said unit comprising decryption
`means, in its security means, of the transport key sent by the
`operating centre and encrypted with a key specific to the
`second user unit.
`
`3. Asystem according to claim 1 or 2, wherein at least said
`second user unit comprises means for requiring and reading
`the list of products that are stored in the storage units of the
`other user units connected to the same local network and for
`
`sending this list to the operating centre.
`4. A method for optimizing the transmission upon request
`of products between an operating and distribution centre and
`a plurality of user units comprising the following steps:
`sending a request for transmission of a product to the
`operating centre from second user unit connected to a
`local bi-directional network,
`determining if the requested product is already in any first
`user unit connected to the same local network,
`in the negative event,
`transmitting from the operating
`centre to the second user unit and storing the product in
`encrypted form in said second user unit,
`
`8
`in the positive event, ordering the transfer of the product
`from the first unit to the user unit,
`
`transmitting by the operating centre the necessary data for
`the decryption of the product.
`5. Amethod according to claim 4, the product is encrypted
`by a transport key, which key being encrypted with a key
`specific to the second user unit and sent to the latter by the
`operating centre.
`6. A method according to claim 4, consisting in ordering
`the storage of the product one user unit among the user units
`connected to the same local network.
`
`7. Amethod according to claim 4 wherein the selection of
`the user unit, chosen among the user units connected to the
`same local network for receiving the product and not having
`requested the product, is carried out according to a con-
`sumption profile of said unit.
`8. A method according to claim 7, wherein the consump-
`tion profile is established according to the type of product
`normally consumed.
`9. A method according to claim 7, wherein the consump-
`tion profile is established according to the activity ratio of
`said user unit.
`
`10. A method according to claim 4 consisting in, prior
`sending a request to the operating centre, determining the
`products that are stored in the units connected to the same
`network and transmitting these data to the operating centre.
`11. A method according to claim 4 consisting in sending
`a product, prior to a user request, to at least one user unit
`among the user units connected to the same local network.
`12. A method according to claim 4, consisting in:
`encrypting the product with a second key by a data server
`connected to the operating center or processing center,
`transmitting the request for the product to the data server,
`which after verification,
`returns the second key
`encrypted with a transport key defined by the operating
`or processing centre.
`13. A method according to claim 12, wherein the product
`comprises a header and a transaction registration zone, and
`consisting in marking this zone with the signature of the
`emitting unit and with the signature of the receiving unit.
`14. A method according to claim 13, wherein the operat-
`ing centre can at any tune request the re-emission of the
`transaction zone accompanied by the product header to a
`user unit for verification.
`
`10
`
`15
`
`20
`
`25
`
`30
`
`35
`
`40
`
`45

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket