throbber
USP 7181758
`U.S. Patent Application No. 08/224,280
`
`EFFICIENT CRYPTOGRAPHIC METHODS AND DEVICES
`
`Background of the Invention
`Description
`
`This application is a continuation of application Ser. No. 10/079,257 filed Feb. 19, 2002, now
`abandoned, which is a continuation of application Ser. No. 09/699,022 filed Oct. 27, 2000, now
`abandoned, which is a continuation of Ser. No. 09/480,226 filed Jan. 10, 2000, now U.S. Pat. No.
`6,347,215, which is a continuation of Ser. No. 08/939,368 filed Sep. 29, 1997, now U.S. Pat. No.
`6,021,307, which is a continuation in part of application Ser. No. 08/644,838 filed May 10, 1996,
`now abandoned, which is a continuation in part of application Ser. No. 08/279,424 filed Jul. 25,
`1994, now abandoned. All these patent applications are incorporated herein by reference.
`
`The presentThis invention relates generally to information processingdistribution, and more
`specifically to an efficient cryptographic system that is designed to process a large amount of
`information by selectively encrypting a portion of the information.particularly to distributing
`information using a broadcast channel and a bi-directional communication channel.
`It has long been recognized that information needs to be encrypted under some
`circumstances. For example, military messages are typically encrypted in order to prevent
`enemies from obtaining information contained in the message. Recently, commercial
`applications of encryption have been proposed. For example, several commercial software
`products were developed to encrypt all or a portion of the data stored on a storage device (e.g.,
`hard disk and floppy diskette). Some of the communication software packages also allow users
`the option of encrypting their electronic mails. Recently, new methods for marketing information
`have been proposed. In one of the proposed methods, encrypted information is distributed (e.g.,
`using CD·ROMs or via digital highway, such as the Internet) by a vendor to potential customers
`either free or at nominal cost. However, the customers are not provided with the key to decrypt
`the information. When the customers wish to purchase the information, they need to contact the
`vendor to obtain the necessary decryption key, typically upon payment of fees. In another
`proposed method, a secure hardware is connected to the computer of a potential customer.
`Encrypted information (e.g., software) is distributed by a vendor to the customer either free or at
`nominal cost. The secure hardware contains the necessary key for decrypting the information.
`When the customer uses the information, the secure hardware decrypts the information and
`measures one or more parameters (e.g., time) relating to the usage of the information. The
`charges incurred by the customer is based on these parameters. Because the decryption key and
`the decrypted information is never exposed to the customer, the customer has to pay each time
`the information is used.
`
`One of the major differences between commercial applications of encryption and other
`applications (e.g., military applications) is the amount of information needs to be encrypted.
`Typically, commercial information, such as a database or a digitized movie, may contain more
`than several hundred million bytes of information. On the other hand, military messages are
`relatively short. Another major difference is that commercial applications typically use low cost
`general purpose computers (such as microcomputers) to decrypt the encrypted data while
`
`Ex. 1024 - Page 1 of 12
`
`Groupon, Inc.
`Exhibit 1024
`
`

`

`military applications use high power computers specially designed for cryptographic
`applications. Even though the processing power of low cost computers is expected to increase at
`a fast pace, these computers take on more and more demanding tasks (e.g., video processing and
`high speed communication). As a result, the amount of processing power devoted to encryption
`in a commercial system may not increase with time, and in some situations, even decrease.
`
`Prior art cryptographic systems are mainly developed and designed for military
`applications, i.e. they are designed to use high power computers to handle a small amount of
`information. These systems may not be suitable for commercial applications. As a result, there is
`a need to develop an efficient method to handle commercial cryptographic needs.
`
`SummaryBACKGROUND OF THE INVENTION
`Recent advancements in modem and computer technology allow large amount of digital data to
`be transmitted electronically. A number of information providers (such as newspaper and
`magazine publishers) and on-line information distributors have formed partnerships to deliver
`newspaper and other information on-line. In this system, a subscriber uses a computer and a
`modem to connect, through a regular phone line, to the computer of an on-line information
`provider. The subscriber can retrieve information, including newspaper articles, stored in the
`computer of the information provider.
`Broadly stated. the present invention is a method and a signal processing device for encrypting
`information. Only a portion of the information needs to be encrypted because the information
`would not be useful if this portion is not decrypted. When the information has a low degree of
`correlation and error tolerance, even encrypting a small portion would be sufficient to render the
`information useless unless this small portion is decrypted. For information that is highly
`correlated, it would be difficult to take advantage of the correlation if substantially all the
`correlated portions are encrypted. As a result, the correlative nature of the information cannot
`be used to bypass decrypting the encrypted portion.
`On-line delivery of newspaper has many advantages. For example, the information can be
`updated throughout the day while the printed version is printed only once or twice a day. Further,
`it is possible to do text-based searches on the information. However, it is found that on-line
`deliver of newspaper and other information is slow. For example, a subscriber has to wait many
`seconds for a newspaper article to be delivered. The quality of the electronic newspaper is low.
`For example, in order to reduce storage and communication requirements, graphic images
`appeared in the printed version are not universally supplied in the on-line version of newspaper.
`One of the reasons for such poor performance is the limited bandwidth of communication
`channels used by on-line information distributors. Another reason is that information is centrally
`processed by the computer at the site of the information distributor, with the result that each
`subscriber only gets a small slice of the time of the computer.
`SUMMARY OF THE INVENTION
`The present invention uses two channels to deliver digital information: a broadcast channel and a
`bi-directional channel. The broadcast channel is used to deliver the bulb of the digital
`information to subscribers. The amount of information delivered is preferably sufficient to
`satisfy the needs of a large number of subscribers so that they do not have to obtain additional
`information using the bi-directional channel. The broadcasted information is stored on fast
`storage media located at subscriber sites. As a result, search and retrieval of the broadcasted
`information is quick. Further, the broadcasted information is processed locally using a dedicated
`on-site processor instead of relying on the computers of the information distributors. As a result,
`
`Ex. 1024 - Page 2 of 12
`
`

`

`the load on the computers of the information distributors is reduced. If the subscribers desire to
`receive additional information relating to the broadcasted information, the bi-directional
`communication channel is used to transmit the request and the requested information.
`
`The distribution costs of broadcast channels are typically much lower than that of a bi-directional
`communication channel. Consequently, the major portion of information is delivered using low
`cost distribution channels. For a large number of subscribers, the broadcasted information will
`provide all the information they normally need. Thus, expensive bi-directional communication
`channels are used only occasionally.
`
`These and other features and advantages of the present invention will be fully understood by
`referring to the following detailed description in conjunction with the accompanying drawings.
`BRIEF DESCRIPTION OF THE DRAWINGS
`FIG. 1 is a schematic drawing showing one embodimentan information distribution system of the
`present invention.
`
`FIG. 2 is A drawing showing an embodiment of the present invention as applied to videoshows
`a newspaper article as displayed on a monitor of the information distribution system shown in
`FIG. 1.
`
`FIG. 2B shows the contents of the broadcast information which corresponds to the newspaper
`article of FIG. 2A.
`
`FIG. 3 is a drawing showing anshows another embodiment of the information distribution
`system of the present invention where information is stored in a plurality of files.
`DETAILED DESCRIPTION OF THE INVENTION
`It has been observed that information generally has a certain degree of redundancy. For
`example, the structure of many languages dictates that redundant words or letters be used at
`predetermined positions of a sentence. A reader can still understand the sentence if some of these
`words and letters are removed. For example, the grammar of the English language imposes a set
`of rules which includes putting the letter “s” at the end of a noun to designate plural quantity. In
`many sentences, the noun is not the only place where plural quantity is indicated. For example,
`the sentence “there are two birds” uses the word “two” to indicate the existence of more than
`one bird, in addition to the letter “s” attached to the word “bird.” Thus, the letter “s” at the end
`of the word “bird” can be omitted without affecting the meaning of the sentence. In fact, there
`are languages in this world in which noun does not have a plural form.
`
`The degree of redundancy in a certain piece of information depends on the nature of the
`information. At one extreme, information may contain many redundant parts. An example is
`video information which consists of a series of pictures depicting time progression of a scene.
`Each picture typically differs slightly from an adjacent picture in the series because the time
`difference in the scene depicted by adjacent pictures is typically less than 0.1 second. As a result,
`video information contains many pictures which are substantially the same. Consequently, it is
`easy to recreate a picture missing from the series by interpolating from the pictures prior and
`subsequent to the missing picture. This type of information is considered to have a high degree
`of temporal correlation. Video information also has another type of redundancy. The spatial
`variation of a picture is typically very gentle. For example, if the picture is a human swimming in
`
`Ex. 1024 - Page 3 of 12
`
`

`

`water, there is little variation (in terms of color and intensity) in the portion of the picture relating
`to water. Consequently, it may be easy to recreate a missing portion of a picture by interpolating
`from portions of the picture surrounding the missing portion. This type of information is
`considered to have a high degree of spatial correlation.
`
`At the other extreme is information in which it is difficult to create a missing portion
`from other portions. This type of information has a low degree of correlation. An example of this
`type of information is the binary code of a piece of software. Typically, it is difficult to recreate
`a missing byte (or a series of missing bytes) from other bytes in the binary code.
`
`Information can also be classified according to its effect on intended uses if a portion of
`the information is missing. At one extreme is information which would be useless if a small
`portion is missing. An example is the binary code of a piece of software. A computer is unlikely
`to successfully execute the software if the binary code has a few erroneous bytes. This type of
`information is considered to be error intolerant. At the other II extreme is information that
`degrades gracefully. For example, when noise of TV signal increases (i.e., portions of video
`information is missing or has erroneous values), color TV pictures often become monochrome.
`However, it is still possible to watch and comprehend the TV pictures, even though they are less
`pleasing to the eyes. This type of information is considered to be error tolerant. Error toleration
`can also be different depending on 1 spatial or temporal types of errors.
`
`It should be pointed out that even though the degree of error tolerance has some
`relationship to the degree of correlation of information, it does not depend solely on the degree
`of correlation. For example, a reader is likely to tolerate a large number of missing words in a
`newspaper article. On the other hand, the same reader probably would not tolerate the same
`percentage of missing words in a poem. Thus, even though the degree of correlation of the
`newspaper article and poem may be the same (because they follow essentially the same grammar
`rules), the degree of error tolerance is different. This is because error tolerance depends, to a
`certain extent, on subjective considerations. As another example, a person typically does not
`tolerate a small distortion in a familiar song while may tolerate a large distortion in a new song,
`even though the degree of correlation of these two songs are the same.
`
`In the prior art cryptographic systems, every bit of information is encrypted. One aspect
`of the present invention is the realization that it may not be necessary to completely encrypt the
`information, especially when it has a low degree of correlation. This is because it is often
`difficult to recreate the encrypted portion of information (if it cannot be decrypted) based on the
`clear portion of information. In addition, information that has a low degree of error tolerance
`may only need to be encrypted at a few critical places (e.g., the destination address of a jump op
`code, or the last name field of a customer database). This is because a user would not accept the
`information if a small portion is missing or erroneous. Thus, even though most of the
`information is in the clear, it is still not commercially useful if isolated portions are unavailable
`because they cannot be decrypted (i.e., people are still willing to pay a high price to obtain the
`full information, even though they already have percent of the information). Since only a small
`portion of information need to be decrypted, the amount of computation power required to
`decrypt the information is reduced.
`
`Ex. 1024 - Page 4 of 12
`
`

`

`Encrypting a portion of information may also help to reduce the computation power
`required for other signal processing tasks. As an example, information which is massive and
`highly correlated (e.g., video information) is often compressed in order to reduce the amount of
`memory space used for storing and the bandwidth used for transmitting the information. Many
`compression methods make extensive use of the correlative nature of information. However,
`many encryption methods have a tendency to randomize information. For example, if the plain
`text is a string of identical letters, the encrypted text using algorithms such as DES may be a
`string of letters in which every letter is different. Consequently, it may be more difficult to
`compress the encrypted text.
`
`The word “encryption” is used broadly in the present invention to include different ways
`of transforming information so that it is difficult for an 1 unauthorized person to correctly
`understand the information. It includes 1 transformation in which a key is required, such as
`public key and secret key encryption methods. It also includes scrambling information according
`to a secret algorithm without using a particular parameter which may be classified as a “key.”
`
`The word “information” is used broadly in the present invention to include data that is
`organized in some logical manner. Examples of information include video signal, audio signal,
`picture, computer software, text, database, and multimedia composition.
`
`FIG. 1 is a block diagram showing one embodiment in whichof an information having a low
`degree of correlation is processed with a signal processor ofdistribution system 100 in
`accordance with the present invention. Fig. 1 shows the portion of information 1 containing
`sixteen pieces of plain text which are grouped into four blocks B1, B2, B3 and B4. Each block
`contains four pieces of plain text labeled as P1, P2, P3, and P4. Each of these sixteen pieces
`could contain a single bit or a plurality of bitsIn this embodiment, system 100 is designed to
`electronically distribute newspaper. It should be pointed out that the above grouping is
`exemplary, and any number of pieces could be grouped into any number of blocks. In addition, it
`is not necessary to require every block to have 1 the same number of pieces.system 100 can also
`be used advantageously to distribute other types of information. System 100 contains a plurality
`of subscriber units (such as units 102 and 104) each connected to a bi-directional communication
`channel (e.g., telephone connections 106 and 108 coupled to units 102 and 104, respectively) and
`a satellite transponder 110 for broadcasting digital data to these subscriber units. Telephone
`connections 106 and 108 (which could be line-based or wireless) are coupled to a central
`database 109. In system 100, satellite transponder 110 is used to broadcast the content of a
`newspaper to the subscriber units while telephone connections 106 and 108 are used to provide
`additional information (stored in central database 109) to subscriber units 102 and 104,
`respectively, on a demand basis.
`Processor 20 contains a program stored in memory, such as ROM 22. This 1 program is
`executed by a CPU 24. The program stored in ROM 22 could 1 be any program that can
`selectively encrypt some of the pieces of plain text in information 12. Preferably, an algorithm
`should be chosen such that it is difficult for an unauthorized person to determine which pieces
`are selected for encryption. Any encryption method can be used by processor 20.
`
`An exemplary program in ROM 22 is described below. The pieces in the blocks having
`an odd numeral in their label, e.g., B1 and B3, are not encrypted. They provide the “base” for
`selecting one or more pieces in the subsequent blocks (i.e., blocks B2 and B4) for encryption.
`
`Ex. 1024 - Page 5 of 12
`
`

`

`For example, the selected piece in block B2 can be calculated from the pieces in block B1 by
`adding the number of bits in all the pieces of block B1, and takes the remainder after dividing by
`four. It should be pointed out that the blocks used as base do not have to be adjacent to the
`blocks having pieces selected for encryption (e.g., the block B1 can be used to determine the
`selected piece in block B4). In addition, the pieces of more than one blocks can be used as base
`(e.g., blocks B1 and B3 can be used to determine the selected piece in block B2).
`
`In Fig. 1, it is assumed that the third piece of block B2 is selected (using the above
`described formula) for encryption. This piece is encrypted and is labeled as E3 in the encrypted
`information 40. Similarly, the fourth piece of block B4 is assumed to be selected (using the
`above described formula) for encryption and is labeled as E4. The selection of the third piece in
`block B2 and the fourth piece in block B4 should appear as random selection to persons who do
`not known the above formula.
`
`The decryption process is now described. Since blocks B1 and B3 are not encrypted, the “base”
`is not change by processor 20. Consequently, the above formula can be used by processor 30 to
`determine which pieces in blocks B2 and B4 are encrypted. As a result, processor 30 can decrypt
`the selected pieces and the original information 12 can be recovered.
`Because information 12 has a low degree of correlation, it would be difficult to create
`pieces P3 in block B2 and P4 in block B4 by interpolating information contained in other pieces
`if E3 and E4, respectively, are not decrypted. However, if information 12 is highly correlated, it
`may be possible to create pieces P3 in block B2 and P4 in block B4 by using information
`contained in the other pieces without decrypting E3 and E4. Methods to render such creation
`difficult even for highly correlated information will be discussed below.
`
`The structure of these subscriber units are substantially identical; consequently, only one of these
`units, such as unit 102, is described in detail. Unit 102 contains an antenna 116 for receiving
`broadcast signals from satellite transponder 110, a signal/data processor 118 for performing
`signal and data processing functions, a monitor 120 for displaying the electronic newspaper, and
`an input device 122 (such as a keyboard and/or a mouse).
`The ratio of the number of encrypted pieces to the number of plain text pieces is determined by
`the error tolerance of the information. If the error tolerance is low (i.e., it is unacceptable to miss
`a small amount of 1 information), only a small number of pieces need to be encrypted. On the
`other hand, if the error tolerance is high, it may be necessary to encrypt a larger number of plain
`text pieces.
`Signal/data processor 118 contains a transponder interface 132 for processing transponder signal
`received from antenna 116. Transponder interface 132 typically contains a low noise receiver for
`receiving high frequency (e.g., C or Ku band) transponder signal and a “universal data interface”
`for converting the transponder signal to digital data. The retrieved data is stored in nonvolatile
`storage 134, such as a hard disk or solid state flash memory. Preferably, satellite transponder 110
`broadcasts the newspaper data at predetermined times. Thus, a real-time dock 136 is preferably
`used to turn on interface 132 at the predetermined times. Processor 118 contains a
`microcomputer 140 which coordinates the operation of dock 136, nonvolatile storage 134, and
`interface 132. Processor 118 also contains a communication interface 142 for sending and
`receiving digital data from central database 109 through telephone connection 106.
`
`Ex. 1024 - Page 6 of 12
`
`

`

`The time for broadcast is preferably chosen when communication load of transponder 110 is at a
`low level (e.g., around mid-night). As a result, the cost of information delivery is low.
`Alternatively, the time of broadcasting is chosen by transponder 110 because it knows when
`communication load is light. In this case, transponder 110 first sends a signal to signal/data
`processor 118 for alerting processor 118 to receive and process the newspaper information.
`
`A user can use the input device 122 and monitor 120 to read the content of the electronic
`newspaper stored in nonvolatile storage 134. In this embodiment, the complete content of the
`newspaper is stored in nonvolatile storage 134. The term “complete content” means that the user
`is able to read the newspaper without relying on information stored in central database 109
`(although other embodiments may deliver less than the complete content). In this aspect, system
`100 functions in a similar way as the distribution of a conventional printed newspaper. However,
`the digital data of the electronic newspaper delivered by satellite transponder 110 preferably
`contains linkage reference which allows fast retrieval of additional information from central
`database 109.
`
`If the newspaper information received from satellite transponder 110 is sufficient to satisfy the
`needs of a user, signal/data processor 118 will not activate telephone connection 106. However,
`if the user wishes to receive additional information relating to an item mentioned in the
`electronic newspaper (e.g., by selecting at the item using the input device), process 118 will
`retrieve the information stored in central database 109 using the embedded linkage reference.
`
`In system 100 of the present invention, the complete content of the electronic newspaper
`(including graphics and other multimedia contents, if delivered) is stored in nonvolatile storage
`134, which has fast access time. Further, a dedicated processor (i.e., microcomputer 140) is used
`to process newspaper information. On the other hand, prior art on-line newspaper distribution
`systems rely on modem to deliver the content of the newspaper stored in a central site. Further,
`the processor in the central site has to serve many users in delivering the newspaper. As a result,
`system 100 has superior performance compared to the prior art on-line newspaper delivery
`systems.
`
`If it is desirable to limit circulation of the newspaper to a certain class of subscribers only (e.g.,
`paid subscribers), the data transmitted by transponder 110 could be encrypted. As a result, only
`subscribers who have a decryption key are able to read the newspaper. In the case,
`microcomputer 140 also performs decryption functions.
`
`FIG. 2A shows an example of a portion of a newspaper article as seen on monitor 120. In FIG.
`2A, the terms which a user may obtain additional information are underlined (or highlighted in
`other ways, such as setting in different colors, depending on the choice of the publishers). If
`desired, the user may select these terms using a pointing device, such as a mouse, and signal/data
`processor 118 will obtain the additional information from central database 109.
`
`FIG. 2B shows the same portion in FIG. 2A as transmitted by transponder 110 (for simplicity,
`the embedded formatting codes, such as center, bold, etc., are not shown). Each of the terms
`underlined in FIG. 2A are enclosed by a special symbol (e.g., the “Y” symbol) and followed by a
`
`Ex. 1024 - Page 7 of 12
`
`

`

`linkage reference enclosed by another special symbol (e.g., the “X” symbol). These symbols are
`invisible to the users and is recognizable only by microcomputer 140.
`
`When an underlined term in FIG. 2 is A diagram showing one embodiment in which information
`having a high degree of correlation, such as video information 110, is processed with a signal
`processor 130 of the present invention. Only three frame 112, 114, and 116 of video information
`110 are shown, although video information 110 typically contains a large number of frames.
`Frames 112, 114, and 116 have a centrally located region 122, 124, and 126, respectively, which
`are of the same size and shape. Only these regions are encrypted while the rest of the frames are
`in the clear. Since the area of each of these regions are small compared to the size of a full frame,
`the amount of encryption and decryption is reduced.is selected by a user, microcomputer 140
`extracts the linkage reference and transmits it to central database 109. The linkage reference
`allows central database 109 to retrieve the necessary information quickly without doing
`extensive searches. As a result, the response time of system 100 is fast. The retrieved information
`can itself contains linkage references and can be searched.
`The frames 112, 114, and 116 are processed by signal processor 130 which contains
`memory (such as ROM 132) and a CPU 134 for storing and processing the algorithm of the
`present invention. Signal processor 130 generates encrypted video information 150 with three
`frames 152, 154, and 156, each corresponding to frames 122, 124, and 126, respectively. Frames
`152, 154, and 156 contain encrypted regions 122, 124, and 126, respectively, which are resulted
`from encrypting regions 122, 124, and 126, respectively.
`
`The encrypted video information 150 can be decrypted using a decryption processor 140.
`Because the location, size and shape of the encrypted 1 region in each frame is predetermined,
`processor 140 is able to find the encrypted regions and decrypt them accordingly.
`
`In this embodiment, the same region of all the frames (i.e., for all times from beginning to
`end) are encrypted. Thus, it is not possible for an unauthorized person to take advantage of
`temporal correlation because there is no unencrypted data of the region for all times. It is also
`difficult to take advantage of spatial correlation near the center of the frame because there is
`little unencrypted data available at areas surrounding the center. The reason for positioning the
`encrypted region at the center is to take advantage of the fact that the most informative area of a
`picture is usually the center.
`
`The method disclosed in Fig. 2 encrypts substantially all the correlated portions of the
`information. Since almost none of the correlated portions are in the clear, it is impossible to
`bypass the correlated portions by using techniques such as interpolation.
`
`The size of the regions 122, 124 and 126 depends on the degree of error tolerance. If
`spatial error tolerance is low (i.e., a user will not tolerate even a small amount of erroneous
`spatial information), the size of the regions 122, 124 and 126 could be small. Further, for
`situations where temporal error tolerance is low, it is not necessary to encrypt all the frame.
`
`It may be advantageous to encrypt several regions (instead of only one centrally located
`region). This is because the most informative region may not be located at the center. Further,
`the size and shape of the encrypted regions may vary from frame to frame. The only requirement
`is to incorporate the same or a similar set of region selection rules in processor 130 and processor
`
`Ex. 1024 - Page 8 of 12
`
`

`

`140. In digital applications, information is preferably organized into one or more files. If the size
`of information is small, it could be stored in one file.
`
`However, if the size of information is large, it may be stored in a plurality: of files. Fig. 3
`shows a plurality of files 212-217 in a medium 210. Examples of medium 210 are magnetic
`storage, optical storage, RAM, and communication channel. Files 212-217 could be organized
`serially or in other formats. The files relating to the information may be linked in well known
`manners. For example, file 212 is linked to file 215 through a link 222 ; file 215 is linked to file
`216 through a link 223; and file 216 is linked to file 213 through a link 225. Alternatively, no
`link is needed if the files are organized sequentially. Links 222, 223 and 225 could be stored
`inside files 212, 215, and 216, respectively. Alternatively, information relating to the links can be
`stored in other locations, such as a separate file 230.
`
`If one or more of the files 212, 213, 215 and 216 are totally or partially encrypted, the
`information stored in these files may be commercially useless. Consequently, there may not be a
`need to encrypt all the files. Even if files 212, 213, 215 and 216 are in the clear, the information
`may be useless if the links are encrypted. This is the case if the size of each file is small and the
`number of links is large, i.e., it would be very difficult to 0 organize the information without the
`links.
`
`While the invention has been particularly described, it will be apparent to those skilled in
`the art that the disclosed invention may be modified in numerous ways and may assume many
`embodiments other than that specifically set out and described above. It is intended by the
`appended claims to cover all modifications which falls within the true spirit and scope of the
`invention.
`
`If the speed of searching and retrieving data by central database 109 is fast, it may not be
`necessary to include linkage reference in the information broadcasted by transponder 110. In this
`case, the user selects (e.g., using the mouse) words and terms he/she is interested in. Signal/data
`processor 118 transmits the selected items to central database 109, which searches for matches in
`its database. Matched information is sent to subscriber unit 102 for processing.
`
`The bi-directional channel also allows updating of the broadcasted information. There is
`typically a time difference between the broadcast and display of information. New information
`gathered during this time difference can be stored in central database 109 and later transmitted to
`signal/data processor 118.
`
`In this embodiment of the present invention, satellite transponder 110 is used as the vehicle to
`electronically broadcast newspaper. However, other broadcast distribution methods can be used.
`In the present invention, broadcast is defined as one-to-many distribution of information. The
`broadcast distribution channels do not have to be electrical. For example, the present invention
`allows the distribution of CDROMs encoded with digital information to the subscriber sites. In
`the case of electrical broadcast communication channels, both

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket