throbber

`
`
`
`
`012204
`
`
`PTOISBI16 (0803)
`Approved for use through 07I31l2006. OMB 0651-0032
`US. Patent and Trademark Office; US. DEPARTMENT OF COMMERCE
`Under the Paperwork Reduction Act of 1995. no persons are required to respond to a collection 01 information unless it displays a valid OMB control number.
`PROVISIONAL APPLICATION FOR PATENT COVER SHEET
`This is a re- uest for filin- a PROVISIONAL APPLICATION FOR PATENT under 37 CFR 1.53 c .
`
`E mss Mall label No. EV ‘57 295 551 US
`
`Given Name (first and middle fif anyl)
`
`INVENTOR(S)
`Family Name or Sumame
`
`Residence
`and either State or Forei-n Count
`
`Ci
`
` Old'S'llV9133
`
`' _
`' - ..
`0‘)
`
`*
`
`'8
`
`(0
`
`separately numbered sheets attached hereto
`——
`Additional inventors are being named on the
`TITLE OF THE INVENTION (500 characters max)
`SERVICE PREFERENCE ARCHITECTURE FOR DATA TRAFFIC AND PROVISIONING CONTROL
`Direct all correspondence to:
`CORRESPONDENCE ADDRESS
`v
`.
`Customer Number
`
`23488
`
`OR
`
`
`
`
`
`
`
`Firm or
`Gerald B. Rosenberg, Esq.
`
`
`Individual Name
`
`Address
`285 Hamilton Avenue
`
`
`
`Suite 520
`Address
`
`
`
`
`
`ENCLOSED APPLICATION PARTS (check all that apply)
`
`
`
`CD(s), Number
`Specification Number of Pages
`17
`I]
`
`D Drawing(s) Number of Sheets
`Other (specify)
`D
`
`
`Q Application Date Sheet. See 37 CFR 1.76
`
`
`METHOD OF PAYMENT OF FILING FEES FOR THIS PROVISIONAL APPLICATION FOR PATENT
`
`
`
`Applicant claims small entity status. See 37 CFR 1.27.
`FILING FEE
`
`,
`Amount (5)
`
`A check or money order is enclosed to cover the filing fees.
`
`
`The Director is herby authorized to charge filing
`80 00
`
`
`
`fees or credit any overpayment to Deposit Account Number:
`5043890
`'
` D Payment by credit card. Form PTO-2038 is attached.
`The invention was made by an agency of the United States Government or under a contract with an agency of the
`
`United States Government.
`[I Yes, the name of the US. Government agency and the Government contract number are:
`
`
`No.
`
`SIGNATURE
`
`Date January 22, 2004
`
`REGISTRATION NO. 30,320
`(if appropriate)
`Docket Number: BRDB3001
`
`
`TYPED or PRINTED NAME Gerald B. Rosenberg
`
`TELEPHONE 650.325.2100
`
`USE ONLY FOR FILING A PROVISIONAL APPLICATION FOR PA TENT
`This collection of information is required by 37 CFR 1.51. The information is required to obtain or retain a benefit by the public which is to file (and by the USPTO
`to process) an application. Confidentiality is govemed by 35 U.S.C. 122 and 37 CFR 1.14. This oolledion is estimated to take 8 hours to complete, including
`gathering. preparing. and submitting the completed application form to the USPTO. Time will vary depending upon the individual case. Any comments on the
`amount of time you require to complete. this form and/or suggestions for reducing this burden, should be sent to the Chief lnfonnation Officer. US. Patent and
`Trademark Office. US. Department of Commerce. PO. Box 1450. Alexandria. VA 22313-1450. 00 NOT SEND FEES 0R COMPLETED FORMS To THIS
`ADDRESS. SEND To: Mail Stop Provisional Application. Commissioner tor Patents. PO. Box 1450. Alexandria. VA 22313-1450.
`
`Ifyou need assistance in completing the form. call 1-800-PTO—9199 and select option 2.
`
`Unified Patents Ex. 1013, pg. 1
`
`Unified Patents Ex. 1013, pg. 1
`
`

`

`llllllllllllilllllllllll
`
`
`17033to
`
`
`
`llllllll
`
`40
`
`A
`
`PTO/SB/17 (10-03)
`Approved for use through 07/31/2006. OMB 0651 —0032
`U.S. Patent and Trademark Office: U.S. DEPARTMENT OF COMMERCE
`. wired to res» -nd to a collection of information unless it disla
`a valid OMB control number.
`
`
`
`“(A
`
`January 22. 2004
`First Named Inventor Burke. Robert M.
`
`
`
`
`
`for FY 2004
`.
`.
`-
`.
`Effective 10l01/2003. Patent fees are sub/eel to annual rewsron.
`
`
`'.
`FR 1 27
`Applicant claims small entity status See 3 C
`.:
`
`($) 80'00
`TOT —°UNTOF PAYMENT
`METHOD OF PAYMENT (check all that apply)
`
`
`
`50-0890
`
`8021
`2809
`
`2810
`
`2801
`1802
`
`2205
`
`9
`
`summer
`-eid, ll roster; For Reissues, see above
`
`
`
`N/A
`Examiner Name
`N/A
`Art Unit
`
`BRDBBOO1
`Attome Docket No.
`FEE CALCULATION (continued)
`
`
`
`
`
`3. ADDITIONAL FEES
`Check momma D Money Dower Elm...
`
`
`Lar eEnti
`Small Enti
`o
`,t A
`‘
`order
`
`EDOSI
`CCOUTI Z
`.
`Fee
`Fee Fee
`Fee
`.
`Fee Description
`
`
`
`
`
`““6 ‘"
`°°°° ‘3’
`Eféfifii
`Number
`1051
`130
`2051
`65 Surcharge - late filing fee or oath
`
`
`
`
`0
`'t
`1052
`50
`2052
`25 Surcharge - late provisional filing fee or
`
`cover sheet
`
`
`Afcfih NewTechLaw
`
`
`Name
`1053
`130
`130 Non-English specification
`1053
`
`The Director is authorized to: (check all that apply)
`
`
`
`1812 2.520
`1812 2,520 For filing a request for ex parte reexamination
`
`
`'3 Charge fee(s) indicated below
`Credit any overpayments
`1804
`920'
`
`1804
`920' Requesting publication of SIR prior to
`
`Examiner action
`
`Charge any additional fee(s) or any underpayment of iee(s)
`
`
`1805 1.840‘
`1805 1,840‘ Requesting publication of SIR after
`Examiner action
`UCharge fee(s) indicated below, except for the filing fee
`
`
`
`
`to the above-identified deposit account.
`1251
`110
`2251
`55 Extension for reply within first month
`FEE CALCULATION
`
`
`
`
`
`1252
`420
`2252
`210 Extension for reply within second month
`
`1. BASIC FILING FEE
`
`
`
`1253
`950
`
`
`2253
`475 Extension for reply within third month
`rge Entity Small Entity
`
`
`
`Fee Description Fee Paid
`1254 1.480
`2254
`740 Extension for reply within fourth month
`
`
`
`
`1255 2.010
`2255 1,005 Extension for reply within fifth month
`2001 385
`Utility filing fee
`
`
`
`
`
`1401
`330
`165 Notice of Appeal
` 2401
`2002 170
`Design filing fee
`
`
`1402
`330
`2402
`165 Filing a bn’ef in support of an appeal
`2003 265
`Plant filing fee
`
`
`
`1403
`290
`2403
`145 Request for oral hearing
`2004 385
`Reissue filing fee
`
`
`
`
`1451 1,510
`1451
`1.510 Petition to institute a public use proceeding
`2005
`80
`Provisional filing fee
`
`
`
`
`1452
`110
`2452
`55 Petition to revive - unavoidable
`
`
`
`
`SUBTOTAL (1')
`
`2453
`665 Petition to revive - unintentional
`1453 1.330
`
`
`
`
`
`2. EXTRA CLAIM FEES FOR UTILITY AND REISSUE
`1501 1.330
`2501
`Fee from
`665 Utility issue fee (or reissue)
`
`
`
`
`1502
`480
`Extra Claims
`Fee Paid
`2502
`240 Design issue fee
`
`
`
`Total Claims [:1 20“ = :I X Ifl =I-:I
`1503
`640
`2503
`320 Plant issue fee
`
`
`
`
`
`
`1460
`130
`1460
`130 Petitions to the Commissioner
`
`
`
`mm... 1:] -3-- = :1 x :1 4:1
`
`
`Multiple Dependent
`1807
`50 .
`
`
`
`
`1807
`50 Processing fee under 37 CFR 1.17(q)
`
`
`1806
`180
`1806
`180 Submission of Information Disclosure Stmt
` Fee Description
`
`
`
`8021
`40
`40 Recording each patent assignment per
`
`
`propeny (times number of properties)
`
`2202
`9 Claims in excess of 20
`1809
`770
`
`385 Filing a submission aiter finai rejection
`
`
`
`
`2201
`43
`independent claims in excess of 3
`(37 CFR1.129(a))
`
`385 For each additional invention to be
`1810
`770
`2203 145 Multiple dependent claim. if not paid
`
`
`
`
`examined (37 CFR 1.12903»
`2204
`43 " Reissue independent claims
`
`
`
`
`
`385 Request for Continued Examination (RCE)
`_ over original patent
`
`
`“ Reissue claims in excess 01 20
`900 Request for expedited examination
`1802
`900
`
`
`
`
`of a design application
`and over original patent
`
`
`Other lee (specify)
`
`
`"or number ureviousl
`‘Reduced by Basic Filing Fee Paid
`SUBTOTAL (3)
`
`
`
`SUBMITTED BY
`(Complete (:1 applicable»
`
`
`
`
`.‘l-u:
`.'-=1
`
`Telephone 650.325.2100
`30,320
`
`.
`_G- aid B. R_snber-
`"59’5”” N°-
`4 4
`EAW.'}JIE§W1_ "mm
`WARNING: information on this form may '
`-
`- public. Credit card information should not
`be included n this f rm. Provide credit card
`ation and auth rization n PTO-2038.
`This collection of information is required by 37 CFR 1.17 and 1.27. The information is required to obtain or retain a benefit by the public which is to file (and by the
`USPTO to process) an application. Confidentiality is governed by 35 U.S.C. 122 and 37 CFR 1.14. This collection is estimated to take 12 minutes to complete.
`including gathering. preparing. and submitting the completed application form to the USPTO. Time will vary depending upon the individual case. Any comments on
`the amount of time you require to complete this form and/or suggestions for reducing this burden. should be sent to the Chief information Officer. US Patent and
`Trademark Office. U.S. Department of Commerce. PO. Box 1450. Alexandria. VA 22313-1450. DO NOT SEND FEES 0R COMPLETED FORMS TO THIS ADDRESS.
`SEND TO: Commissioner for Patents. P.0. Box 1450. Alexandria. VA 22313-1450.
`I! you need assistance in completing the form, call 1»800-PTO-9199 and select option 2.
`
`
`
`
`
`
`
`
`
`Unified Patents Ex. 1013, pg. 2
`
`Unified Patents Ex. 1013, pg. 2
`
`

`

`BNS Intellectual Property Description
`
`\xf
`BNS .
`
`BROADBAND NETWORK SYSTEMS, INC.
`intellectual Property
`
`Service Preference Architecture
`(SPA)
`Description & Technology
`
`January 14, 2004
`
`EMS Proprietary
`1/22/2004
`
`Page 1
`
`Unified Patents Ex. 1013, pg. 3
`
`Unified Patents Ex. 1013, pg. 3
`
`

`

`BNS Intellectual Property Description
`
`I.
`
`II.
`
`Service Preference Architecture ............................................................................................... 4
`A. High Level Description ............................................................................................................. 4
`B. Service Control and Copyright Protection ................................................................................ 4
`C. Flexibility to add new Service Control and Copyright Techniques .......................................... 5
`SPA - Network & Product Architecture ............................................................................... 5
`
`III.
`A.
`
`................................................................... 5
`A. General Description
`Figure 1. Service Preference Architecture ................................................................................ 6
`B. The ICP Controls Communication Gateways .......................................................................... 6
`C. The ICP Controls ISP, BNS & EDC Service Deliveries ........................................................... 7
`D. The ICP Controls are determined by Regular and Active Human Intervention ....................... 7
`E. lCPs Updated by Active Intervention & Multiple lCPs Deliver High Availability....................... 7
`Figure 2. Active Intervention Updates and Backup lCPs .......................................................... 7
`BNS Internet Control Techniques ....................................................................................... 8
`Digital Rights Management ................................................................................................. 8
`1. Conditional Denial ................................................................................................................. 8
`Figure 3. DRM — Conditional Denial ......................................................................................... 8
`3. Packet Inspection .................................................................................................................. 8
`4. E-Mail Server & Client Spoofing ........................................................................................... 9
`Figure 4. DRM — Blocking E-Mail of Copyrighted Files ............................................................ 9
`5. Denial of Service Attacks on Unlicensed “Pirate" Copyright Material Sites .......................... 9
`6. Copyright Registry ................................................................................................................ 9
`7. Copyrighted File Deletion ..................................................................................................... 9
`8. Event Notification ................................................................................................................ 10
`Service Initialization .......................................................................................................... 10
`
`B.
`
`C.
`
`D.
`
`Figure 5. Service Initialization. ................................................................................................ 10
`Active and Inactive Gateway Processing Control ............................................................. 10
`Figure 6. Active and Inactive CG processing ......................................................................... 11
`First Portal Visibility (“First Portal") ................................................................................... 11
`Figure 7. First Portal Visibility. ................................................................................................ 11
`Advertising
`..................................................................................................................... 12
`Figure 8. Advertising Insertion. ............................................................................................... 12
`F. Browser, Program Communications 8. URL or IP Address Access Blocking ........................ 12
`Figure 9. URL or IP address Blocking .................................................................................... 13
`G. Service Applet Downloads ..................................................................................................... 13
`Figure 10. Service Applet Downloads ..................................................................................... 13
`H. Virus Initiated Denial of Service Traffic Blocking ................................................................... 13
`Figure 11. Virus Initiated Traffic Blocking ............................................................................... 14
`Law Enforcement Monitoring ............................................................................................ 14
`Figure 12. Law Enforcement Monitoring ................................................................................ 14
`J. VoIP Blocking ......................................................................................................................... 15
`Figure 13. VolP Blocking. ....................................................................................................... 15
`K. Real Time Video or Audio Streaming Blocking ...................................................................... 15
`Figure 14. RT Video or Audio Blocking ...................._............................................................... 16
`Peer to Peer (P2P) Resource Address Server Blocking and False P2P Resource Address
`L.
`Spoofing ...................................................................................................................................... 16
`Figure 15. P2P Resource Address Server Blocking. .............................................................. 16
`Figure 16. P2P Resource False Address SpOofing. ............................................................... 17
`Internet Access Pre-Authentication ................................................................................... 17
`Figure 17. Internet Access Pre-Authentication ....................................................................... 17
`
`E
`
`I.
`
`M.
`
`BNS Proprietary
`1/22/2004
`
`Page 2
`
`Unified Patents Ex. 1013, pg. 4
`
`Unified Patents Ex. 1013, pg. 4
`
`

`

`BNS Intellectual Property Description
`
`ABOUT THIS DOCUMENT
`This document describes BNS Product Features, Intellectual Property and Product Architecture.
`
`'
`
`CONFIDENTIAL INFORMATION
`This Intellectual Property Description document is the property of Broadband Network Systems.
`It is proprietary information and is strictly confidential.
`It contains information intended only for the
`person(s) to whom it
`is transmitted. With receipt of this Intellectual Property' Description
`document , Recipient acknowledges and agrees that:
`I) in the event that the recipient does not
`wish to pursue this matter, this document will be returned, at the address listed below as soon as
`possible; the recipient will- not copy, fax, email, reproduce, divulge, or distribute this confidential
`Intellectual Property Description document
`,
`in whole or in part, without the express written
`consent of Broadband Network Systems; and
`III) all of the information contained in this
`document will be treated as confidential material with no less care than that afforded to your
`company or personal confidential material.
`‘
`
`TRADEMARK NOTICE
`BROADBAND NETWORK SYSTEMS, BROADBAND NETWORK SERVICES and the Broadband
`Network Logos are Trademarks of Broadband Network Systems.
`
`CONTACT INFORMATION
`Robert Burke
`C.E.O.
`21103 Old Well Road
`Los Gatos, CA 95033
`USA.
`“ (408) 353—3573
`
`URL: www.bbns.us
`
`BNS Proprietary
`1/22/2004
`
`Page 3
`
`Unified Patents Ex. 1013, pg. 5
`
`Unified Patents Ex. 1013, pg. 5
`
`

`

`BNS Intellectual Property Description
`
`I.
`
`S rvic Pr fer nc Archit cture
`
`A. High Level Descrigtion
`
`Broadband Network Systems (BNS) plans to develop and to sell Broadband (high-speed)
`Residential and Business Communication Gateways (063) and Internet Control Points (ICPs) to
`Telecommunication Carriers such as the Regional Bell Operating Companies (RBOCs), other
`Telephone companies,
`ISPs and Cable TV companies.
`ICPs are network based routers or
`computers that control the operation of 065. 065,
`installed at a Subscriber's site and ICPs,
`installed in the Carriers’ network are designed to enable Carriers to provide the so-called ‘Triple
`Play’ services (Voice+ Broadband Internet + Video) to their Subscribers using the Carrier’s
`existing distribution network.
`In addition, new revenue generating Content Services (music,
`video, games, and software services) can be offered by BNS.
`
`With BNS’s unique Service Preference Architecture (SPA), several new data traffic control
`techniques are available to Carriers, ISPs, Enterprises and Cable TV companies for their Internet
`Access networks.
`
`they provide an important new feature- Digital Rights
`BNS products are unique in that
`Management,
`i.e., the assurance to both the Service Provider and the Content Provider that
`Intellectual Property (music, video, games, software, etc.) will be secure from illegal downloading
`and transmission over the Internet, a major source of lost revenues and the basis for hundreds of
`lawsuits. Service Providers will want this feature to halt the legal onslaught launched by music
`companies and because they want to offer Video/DSL and the Motion Picture Industry will not
`license the content for distribution over the unsecured Internet, having seen the negative impact
`piracy has already had on the Music Recording Industry. Content Providers will demand this
`feature to stop the illegal downloading and transmission of Intellectual Property over the Internet
`which has cost the music and movie industries billions of dollars annually.
`
`B. Service Control and Copyright Protection
`
`BNS’ Service Preference Architecture (SPA) is a collection of BNS software routines executed by
`BNS CGs in conjunction with SPA-based Internet Servers under the control of BNS Internet
`Control Points.
`
`The software routines perform thirteen functions:
`
`rights management- SPA protects copyrighted material
`1. Digital
`downloaded and distributed over the Internet.
`
`from being illegally
`
`2. First portal visibility- SPA enables Consumers to receive the Carrier/BNS home page or
`video menu system every time their Computer or TV is turned on or whenever they re-initiate
`activity after an extended idle period.
`3. Advertising- SPA allows desired advertisements to be delivered by the Carrier and/or by BNS
`to the Customers.
`
`4. Web site blocking- SPA enables Web Sites to be blocked by the Carrier,
`corporate customers as required by Law or by the Subscriber’s own Policy.
`5. Services download- SPA allows Consumer and Business customers to download applets that
`facilitate their use of the BNS/Carrier Services portfolio.
`6. Virus — Initiated traffic Bl cking— SPA prevents infected user machines from repeatedly
`sending traffic at high data rates to sites which are the subject of Denial of Service attacks.
`7. Law enf rcement monitoring — SPA allows data passing through a CG to be copied to law
`enforcement or national security agencies.
`
`ISP or their
`
`BNS Proprietary
`1/22/2004
`
`Page 4
`
`Unified Patents Ex. 1013, pg. 6
`
`Unified Patents Ex. 1013, pg. 6
`
`

`

`BNS Intellectual Property Description
`
`8. V ice over Internet Prot c l (VolP) traffic bl cking - SPA allows Carriers to restrict the use
`of th Internet Access Service they offer Subscribers to "data transport only,” blocking VoIP and
`thereby protecting their voice revenue stream from encroachment and preserving their ability to
`migrate their voice customers from the Public Switched Telephone Network (PSTN) when they
`upgrade their lnternet Access Networks to offer Real Time Quality of Service.
`
`9. P2P Resource Address Server Blocking and False P2P Resource Address Spoofing —
`Requests by software programs or browsers to connect to P2P Resource Address servers are
`blocked. With SPA Active Intervention. false addresses are sent to the P2P Resource Servers.
`This foils access to unlicensed Copyrighted Materials.
`
`10. Internet Access Pre-Authentication — SPA prevents the use of non-SPA Gateways that
`would fail to enforce SPA features by delivering a Gateway Authentication to Carrier/ISP Remote
`Access I Authentication Servers that must precede any request for Authentication by a User. Only
`after receiving a Pre-Authentication from a Gateway would a User be allowed to successfully
`Authenticate and access the Internet.
`
`11. Real Time Audio or Video traffic blocking — SPA allows Carriers to restrict the use of the
`lnternet Access Service they offer Subscribers to “data transport only," blocking Real Time
`packets, normally used for Audio or Video and thereby delivering the ability to bill for traffic
`delivered from Internet Portal sites to their‘ Subscribers in a manner similar to today's “calling
`p'arty pays" method used for Voice Calls.
`
`12. Core Network Router & Firewall Processing Control — SPA can control the implementation
`of Routing and Firewall rules used by Core Network Routers to open and close paths to or from
`specific URL/IP addresses or as othen/vise needed to block virus and unwanted traffic.
`
`13. Copyrighted File Identifier Computation — Every Copyrighted File known to BNS has a File
`Identifier (FID) computed for it. The FID is computed using a complex Boolean algorithm and
`creates a result that is up to 2K bytes long. During Packet Inspection of traffic flowing through the
`CG, SPA Gateways will compute a FID for files as they are transferring. The FID is forwarded to
`the ICP controlling the Gateway and a "Stop" command is returned to the Gateway by the ICP if
`there is a match. Any FID that matches one in the ENS FID data base is stopped by the Gateway.
`
`In Sections II and III, we describe how the software routines work.
`
`C. Flexibility to add new Service Control and Copyright Technigues
`
`BNS has created SPA to be highly flexible, adaptable and to deliver a high degree of availability
`and security. The BNS SPA Architecture allows new Internet Control techniques to be added as
`BNS, Content Providers or Service providers need them. More techniques will be added by BNS
`as it creates them to deliver value to BNS,
`its customers and partners. This flexibility to add
`techniques is a key feature of SPA and BNS Intellectual Property. This flexibility can be extended
`to National security Agencies to conduct Electronic Internet Warfare against enemies during
`conflict.
`
`ll.
`
`SPA - Network & Product Architecture
`
`A. General Descrigtion
`
`Telecommunication Carriers, Cable TV companies and Internet Service Providers can be
`equipped to deliver the BNS suite of features only by using a network service based system. This
`system is based on an architecture that employs an Internet Control Point (ICP) to control the
`
`BNS Proprietary
`1/22/2004
`
`'
`
`Page 5
`
`Unified Patents Ex. 1013, pg. 7
`
`Unified Patents Ex. 1013, pg. 7
`
`

`

`BNS Intellectual Property Description
`
`access to web sites and to deliver data to Subscribers. The ICP controls the processing of data
`sent between Customers (client PCs or LAN servers) using the BNS Communication Gateway
`(CG) and the ISPs, Enterprise Data Centers or Content Servers with which they are exchanging
`information. The architecture is completed with a hardware/software implementation in the
`Communication Gateways that Carriers/ISPs use at their customers premises to deliver the
`service. The Communication Gateways cannot be tampered with by Users. Users are given no
`access to unload or modify the CG operating software by design and all ICP-CG communications
`takes place within the Carrier side of the network (DSL uplink).
`ICP-CG communications are
`secured with encryption and hashing. Furthermore, the ICP will not enable any service to an un-
`registered CG and an un-registered CG will not operate in an experimental environment at all.
`
`This ensures secure control of the data flow between both the ICP and the CG. This secure flow
`
`of data then enables Carriers, ISPs, Enterprise data Centers or Cable TV Companies to control
`the services their Users have access to. Figure 1 illustrates the overall Network Architecture.
`
`Content Owners
`Music. Movies, Books,
`
`Soflware. Games. Gaming. etc.
`
` BNS Content Servers
`BNS Internet Control
`Secure Services
`
`
`
`
`
`
`Points
`Sugscrlg'I Data Base
`Service Controls:
`Internet Sased'DRM
`Blocked Sites
`First PortaI
`Advertising
`Wrus Traific Blockingl
`VOIP Blocking
`Active CG Process Control
`Inactive cc process Control
`Law Enforcement Monitoring
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`2Wm'°" °"' ”W” B \ Network-based SPA
`
`
`Service
`
`Providers
`
`
`
`
`
`
`BNS Communication Gateway
`Si
`Ie CG Prooessl Data Base
`
`D
`F
`Iolfr
`C
`
`As Directed b ICP
`
`y
`
`.
`preempts piracy
`and controls Services
`
`Consumer
`
`Figure 1. Service Preference Architecture
`
`B. The ICP Controls Communication Gateways
`The Communication Gateway (CG) may be either: 1) a Gateway that combines TV. Video,
`Internet and Voice, 2) a dial-up Remote Access Server, 3) an ADSL Modem/Router, 4) a Satellite
`TV Gateway, 5) a Cable TV Modem, or 6) a converged set top + Internet Gateway.
`
`The ICP is the source of Internet Service Control and Conditional Denial of Users access to
`Service Provider selected URLs or IP addresses. The ICP controls the CG to determine what web
`
`site data is allowed through to Subscribers browsers. The ICP also controls the 065 packet
`inspection processing to determine which data can be allowed to flow through the CG to and from
`the Subscriber, specifically when e-mail or file transfers are initiated. The ICP also controls what"
`~activities are engaged in by idle 065 when Consumers are inactive.
`Idle CGs may receive
`
`BNS Proprietary
`1/22/2004
`
`Page 6
`
`Unified Patents Ex. 1013, pg. 8
`
`Unified Patents Ex. 1013, pg. 8
`
`

`

`BNS Intellectual Property Description
`
`software downloads from the ICP, may be used to collect data and to initiate communications
`activities that are disruptive to Content Servers that offer unauthorized copyrighted materials for
`illegal download by Consumers.
`
`Multiple lCPs are deployed geographically in the Carrier's netvmrk to support the Gateway
`management capacity of the ICP and the number of Broadband Users in its service area.
`
`C. The ICP Controls ISPI BNS & EDC Service Deliveries
`Next is the interaction of the ICP with the BNS Content Server (BCS), Service Provider's internet
`Portal or Carrier (ISP) and Enterprise Data Centers (EDC). The ICP controls Consumers ability to
`access services that are offered by the ISP or EDC. The ICP also controls the 063 to deliver: 1)
`advertisements. 2) the home page for ISP/BCS/EDC web servers or 3) software downloads to
`Consumer’s PCs for their use of lSP/BNS/EDC content services.
`
`D. The ICP Controls are determined by Regular and Active Human Intervention
`
`The ICP is programmed either by human input or by operator-controlled web crawler software.
`Updates are determined from BNS’s active intervention service whereby changes to the control
`entries are discovered and implemented. This is a service delivered to ISPs and E003 whereby
`the operation of BNS Features described below are controlled in a manner analogous to the
`regular updating of Virus Definitions for computer virus and worm protection.
`
`E. lCPs U dated b Active Intervention & Multi
`
`
`
`le lCPs Deliver Hi h Availabili
`
`
`The web crawlers, human intervention and ICP/CG software/processing data base updates are
`controlled by an Active Intervention system consists of a set of centrally maintained computer
`systems which control the operation of the lCPs. Figure 2 illustrates this.
`
`BNS Update System
`Manages Operation of
`lCPs
`
` BNS Active intervention Systems
`Web crawlers find Unlicensed Content
`Master
`
`
`
`Humans input ICP 8. CG Processing Data
`Data
`Bases
`
`
`Base Changes
`
`
`
`CG & Service Sottware Changes
`
`
`
`BNS internet Control
`
`
`
`BNS lntemet Control
`
`
`Points
`ICP Updates
`ICP Updates
`
`
`
`
`Points
`8. Control
`8. Control
`Subscriber Data Base
`
`
`
`Subscriber Data Base
`Service Controls:
`
`lntemet Based DRM
`Servlge Controls:
`
`
`Blocked Sites
`internet Based DRM
`
`First Portal
`Blocked Sites
`
`
`
`First Portal
`Advertising
`
`’
`,
`Advertising
`'
`
`
`
`
`
`\firus Traffic Blocking ML...
`:3:$3.13an
`
`
`Inactive CG Process 00ml
`VolP Blocking
`
`
`
`Law Enforcement Monitoring
`inactive CG process 0001““
`
`
`
`BN8 Communication Gateway
`Law Enforcement Monitoring
`
` Sln le (:6 Processin Data Base
`
`Data Flow toffrorn Consumer:
`
`As Directed by K)?
`
`
`
`
`/
`Multiple Control Points:
`‘— High availability to cos
`
`
`
`Figure 2. Activ Interv nti n Updates and Backup lCPs.
`
`BNS Proprietary
`1/22/2004
`
`Page 7
`
`Unified Patents Ex. 1013, pg. 9
`
`Unified Patents Ex. 1013, pg. 9
`
`

`

`BNS Intellectual Property Description
`
`lll. BNS lntern tControlT chniqu s
`
`A.
`
`Digital Rights Management
`
`1. Conditional Denial
`
`The 065, under ICP control, deliver a network based Digital Rights Management Service (DRM)
`which denies Users the capability to send or to receive data from or to URLs or IP addresses that
`are known to contain unlicensed copyrighted material. When this “Conditional Denial" occurs, the
`Gateway substitutes the URL or IP Address of a site that offers licensed copyrighted materials for
`legal, authorized sale to the User. This list of URLs or IP addresses that are known to contain
`unlicensed copyrighted material will be regularly updated, similar to how virus definitions are
`regularly updated today.
`
`ICPs delivering DRM service use the Section F. Browser, Program Communications & URL or IP
`Address Access Blocking method to direct Users to authorized content sites. DRM uses both
`Active Human and Web Crawler input to find unauthorized content offered over the lnternet and
`to update the URLs or IP addresses that are known to contain unlicensed copyrighted material.
`
`When programs other than browsers attempt to access the blocked sites, the requested URL or
`IP address may be substituted by a legal content provider's URL/IP Address or none at all.
`
`Upon registration as an “Active” Gateway, the ICP updates the Communication Gateway’s list of
`DRM URL or IP Address substitutions.
`
`
`
`
`GW in Active
`Mode
`
`
`
`Event is Logged
`
`
`
`
`
`
`
`Browser or Program Requests
`connection to DRM Blocked URL
`or IP address?
`
`
`User receives browser
`GW substitutes
`
`
`
`screen from
`
`
`refigeggjregg or
`Legal Source URL
`
`or IP address;
`
`to Legal Source
`
`Program is connected to
`URL or IP address
`
`
`Legal Source or given
`
`In 06 message
`
`no access at all
`
`
`
`Figure 3. DRM — Conditional Denial
`
`3. Packet lnsgection
`
`Additional packet inspection processing is performed by the Gateways to determine the file type
`of all files being transferred through the Gateway based upon the files properties, such as file
`extension, file format, header or trailer contents and URUIP addresses that are known sources of
`unauthorized Copyrighted material. The Gateway is programmed by the ICP with certain Data
`Patterns. These data patterns may be any length and may contain exact matches plus regular
`expressions. When certain data patterns are recognized, the data transfer is stopped or another
`action is taken, based upon rules delivered by the ICP to the Gateway.
`
`BNS Proprietary
`1/22/2004.
`
`Page 8
`
`Unified Patents Ex. 1013, pg. 10
`
`Unified Patents Ex. 1013, pg. 10
`
`

`

`BNS Intellectual Property Description
`
`4. E-Mail Server & Client Sg
`
`fing
`
`CGs present themselves to Users as the User‘s E-mail Sewer and present themselves to E-Mail
`servers as Users.
`In so doing, the CG acts as a 2- way encryption/decryption point to enable
`inspection of what would otherwise be encrypted data. When E-mail is sent through the Gateway,
`the Gateway inspects all attached files using Packet Inspection. Based upon rules delivered by
`the ICP to the Gateway. the Gateway can then deny access to incoming files, stop the transfer of
`outgoing files or take other action..
`
`
`
`GW In Active Mode as
`E-Mail Program send
`GW De-Crypts &
`
`Packet Inspection
`.
`.
`or re

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket