throbber
1709
`
`I70lllllllllllllllllllllllllllllllllllllll Old311366%
`
`PTO/SBI16 (08-03)
`Approved for use through 07/31/2006. 0MB 0651-0032
`U.S. Patent and Trademark Office; U.S. DEPARTMENT OF COMMERCE
`Under the Paperwork Reduction Act of 1995, no persons are required to respond to a collection of information unless it displays a valid OMB control number.
`PROVISIONAL APPLICATION FOR PATENT COVER SHEET
`This is a reuest for filin a PROVISIONAL APPLICATION FOR PATENT under 37 CFR 1.53 c .
`
`.
`Given Name (first and middle [if any])
`
`INVENTOR(S)
`Family Name or Surname
`
`Residence
`and either State or Forei-n Count
`
`Ci
`
`US
`
`650.325.2107
`
`‘3'”
`
`Country
`
`
`
`
`
`22273U.S.PTO60/563064
`
`
`
`
`
`
`
`
`
`
`
`separately numbered sheets attached hereto
`——
`Additional inventors are belng named on the
`TITLE OF THE INVENTION (500 characters max)
`
`SERVICE PREFERENCE ARCHITECTURE FOR DATA TRAFFIC AND PROVISIONING CONTROL
`Direct all correspondence to:
`
`CORRESPONDENCE ADDRESS
`
`Customer Number:
`.
`
`23488
`
`
`OR
`
`Firm or
`
`
`. Gerald B. Rosenberg. Esq.
`Individual Name
`
`Address
`285 Hamilton Avenue
`
`
`
`Address
`Suite 520
`
`
`
`PanAlto
`
`
`650325.210
`Telephone
`
`
`ENCLOSED APPLICATION PARTS (check all that apply)
`
`
`Specification Number of Pages 24
`D
`CD(s), Number
`D Drawing(s) Numberof Sheets
`D
`Other (specify).
` Q Application Date Sheet. See 37 CFR 1.76
`
`METHOD OF PAYMENT OF FILING FEES FOR THIS PROVISIONAL APPLICATION FOR PATENT
`
`
`
`Applicant claims small entity status. See 37 CFR 1.27.
`FlLlNG FEE
`
`
`Amount (S)
`
`
`A check or money order is enclosed to cover the filing fees,
`
`
`
`
`
`D Payment by credit card. Form PTO—2038 is attached.
`The invention was made by an agency of the United States Government or under a contract with an agency of the
`
`
`United States Government.
`
`D Yes, the name of the U.S. Govemment agency and the Government contract number are:
`
`
`The Director is herby authorized to charge filing
`fees or credit any overpayment to Deposit Account Number: 50-0890
`
`80 00
`‘
`
`No.
`
`[Page 1 of 2]
`
`Date APH'I 16, 2004
`
`REGISTRATION NO. 30,320
`(if appropriate)
`Docket Number. BRDBaooz
`
`Respectfully submitted.
`
`SIGNATURE
`
`TYPED or PRINTED NAME Gerald B, Rosenberg
`TELEPHONE 550.325.2100
`
`USE ONLY FOR FILING A PROVISIONAL APPLICATION FOR PATENT
`This collection of information is required by 37 CFR 1.51. The information is required to obtain or retain a benefit by the public which is to file (and by the USPTO
`to process) an application. Confidentiality is govemed by 35 U.S.C. 122 and 37 CFR 1.14. This colleaion Is estimated to take 8 hours to complete. including
`gathering, preparing, and submitting the completed application form to the USPTO. Time will vary depending upon the individual case. Any comments on the
`amount of time you require to complete this form andlor suggestiors for reducing this burden. should be sent to the Chief Information Officer. U.S. Patent and
`Trademark Office, U.S. Department of Commerce. PO. Box 1450. Alexandrla. VA 223134450. DO NOT SEND FEES 0R COMPLETED FORMS TO THIS
`ADDRESS. SEND To: Mail Stop Provisional Application, Commissioner for Patents, P.O. Box 1450. Alexandria. VA 22313-1450.
`
`If you need assistance in completing the form, call 1-800-PTO—9199 and select option 2.
`
`Unified Patents Ex. 1014, pg. 1
`
`Unified Patents Ex. 1014, pg. 1
`
`

`

`PTO/SB/17 (10-03)
`Approved for use through 07/31/2006. OMB 0651-0032
`US. Patent and Trademark Office: U.S. DEPARTMENT OF COMMERCE
`Under the Pa-erwork Reduction Act of 1995 no nersons are re-uired to res» and to a collection of information unless it dis-la s a valid OMB control numier.
`
`
`
`
`F E E TRAN S M ITTAL _AIication Numbercornflete ifKnown
`for FY 2004
`Effective 10l01l2003. Patent fees are subject to annual revision.
`
`April 16, 2004
`Filing Date
`First Named Inventor Burk6. Robert M.
`WA
`
`
`
`Applicant claims small entity status. See 37 CFR 1.27
`TOTAL AMOUNT OF PAYMENT
`($) 80.00
`
`Art Unit
`
`
`
`
`
`50-0890
`
`SUBTOTAL (1)
`
`
`
`glgierggndem :1
`Multiple Dependent
`Lar e Enti
`Small En i
`
`Fee Descrlgtion
`Fee Fee
`Fee Fee
`'
`Code (S)
`Code (5)
`9 Claims in excess of 20
`1202
`16
`2202
`43
`Independent claims in excess of 3
`1201
`86
`2201
`1203 290
`2203 145 Multiple dependent claim. if not paid
`1204
`86
`2204
`43
`“Reissueindependentclaims
`over original patent
`“ Reissue claims in excess of 20
`and over original patent
`
`N,A
`BRDB3002
`
`
`METHOD OF PAYMENT (check all that apply)
`FEE CALCULATION (continued)
`
`
`
`
`
`Check DCredit card I: goney DOther DNone
`3. ADDITIONAL FEES
`
`
`
`o M t
`"jar
`Lar eEnti
`Small Enti
`eposr
`ccoun :
`
`.
`Fee Description
`
`Deposrt
`Code
`5
`-
`-
`.
`
`
`Account
`"
`.
`
`
`
`
`Number
`2051
`65 Surcharge ~ late filIng fee or oath
`
`
`
`Deposit
`2052
`25 Surcharge - late provisional filing fee or
`
`
`
`
`
`Afigfi’gt NewTechLaw
`cove, sheet
`1053
`130 Non-English specification
`The Director ls authorized to: (check all that apply)
`
`1812 2,520 For filing a request for ex parte reexamination
`
`DCharge fee(s) indicated below
`Credit any overpayments
`
`
`
`1804
`920' Requesting publication of SIR prior to
`
`Examiner action
`.Charge any additional fee(s) or any underpayment of fee(s)
`
`1805 1.840‘ Requesting publication of SIR after
`DCharge feats) indicated below. except for the filing fee
`Examiner action
`
`
`to the above-identified deposit account.
`55 Extension for reply within first month
`2251
`FEE CALCULATION
`
`
`
` 1252
`420
`
`210 Extension for reply within second month
`2252
`1. BASIC FILING FEE
`
`
`
`1 253
`950
`
`
`
`2253
`475 Extension for reply within third month
`rge Entity Small Entity
`
`
`Fee Description
`Fee Paid
`1254 1.480
`
`2254
`740 Extension for reply within fourth month
`
`
`1255 2.010
`1001 770
`2255 1,005 Extension for reply within fifth month
`Utility filing fee
`
`
`
`1401
`330
`1002 340
`2002 170
`Design filing fee
`2401
`165 Notice of Appeal
`
`
`
`
`
`1402
`330
`1003 530
`2402
`165 Filing a brief in support of an appeal
`2003 265
`Plant filing fee
`
`
`
`1403
`290
`1004 770
`2403
`145 Request for oral hearing
`2004 385
`Reissue filing fee
`
`
`
`
`
`1005 160
`1451 1.510
`2005
`80
`Provisional filing fee
`1451
`1.510 Petition to institute a public use proceeding
`
`
`
`
`
`
`1452
`110
`2452
`55 Petition to revive - unavoidable
`
`
`
`
`1453 1.330
`2453
`665 Petition to revive - unintentional
`
`
`
`2. EXTRA CLAIM FEES FOR UTILITY AND REISSUE
`1501 1.330
`Fee from
`2501
`665 Utility issue fee (or reissue)
`
`
`1502
`Fee Paid
`460
`Extr Cl ims
`2502
`240 Design issue fee
`
`
`
`
`2503
`320 Plant issue fee
`1503
`640
`
`
`
`
`
`1460
`130
`1460
`130 Petitions to the Commissioner
`
`
`I:I x :I 4:]
`
`1807
`50
`:1 4:]
`1807
`50 Processing fee under 37 CFR 1.17(q)
`
`
`
`1806
`180
`1806
`180 Submission of Information Disclosure Stmt
`
`
`
`
`
`8021
`40
`
`1809
`770
`
`
`
`
`
`
`1810
`770
`
`
`
`
`
`
`1801
`770
`
`1802
`900
`
`
`
`Other fee (specify)
`
`summer
`
`
`
`
`-aid. if Heater; For Reissues, see above
`'Reduced by Basic Filing Fee Paid
`SUBTOTAL (3)
`(Complete (if applicable»
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`“or number
`
`
`SUBMITTED BY
`
`
`
`
`
`—-Imm-
`..
`—r.s‘.g.g;us...
`«.
`
`
`WARNING: Information on this form ma come public. Credit card Information should not
`
`be included on this form. Provide credlt card Information and authorization on PTO-2038.
`This collection of information is required by 37 CFR 1.17 and 1.27. The information is required to obtain or retain a benefit by the public which is to file (and by the
`USPTO to process) an application. Confidentiality is governed by 35 U.S.C. 122 and 37 CFR 1.14. This collection is estimated to take 12 minutes to complete.
`including gathering. preparing, and submitting the completed application form to the USPTO. Time will vary depending upon the individual mse. Any comments on
`the amount of time you require to complete this form and/or suggestions for reducing this burden. should be sent to the Chief lnforrnation Officer. U.S. Patent and
`deemark Office. U.S. Department of Commerce. PO. Box 1450. Alexandria. VA 22313-1450. DO NOT SEND FEES OR COMPLETED FORMS TO THIS ADDRESS,
`SEND TO: Commissioner for Patenb. P.O. Box 1450. Alexandria. VA 22313—1450.
`ifyou need assistance in completing the form. call 1-800—PTO-9199 and select option 2.
`
`
`
`
`
`
`
`
`
`40 Recording each patent assignment per
`property (times nI‘Imber of properties)
`385 Filing a submission after final rejection
`(37 CFR 1.129(3))
`385 For each additional invention to be
`examined (37 CFR 1.129(b))
`385 Request for Continued Examination (RCE)
`900 Request for expedited examination
`of a design application
`
`Unified Patents Ex. 1014, pg. 2
`
`
`
`
`
`8021
`2309
`
`2810
`
`2801
`1802
`
`9
`
`2205
`
`1205
`
`18
`
`ureviousl
`
`Unified Patents Ex. 1014, pg. 2
`
`

`

`BNI‘Intellectual Property Description
`
` X
`
`BROADBAND NETWORKS, INC.
`(formerly Broadband Network Systems, Inc.)
`Intellectual Property
`
`Service Preference Architecture
`_
`(SPA)
`Description & Technology
`
`'
`
`April 1, 2004
`
`BNI Proprietary
`4/16/2004
`
`Page 1
`
`Unified Patents Ex. 1014, pg. 3
`
`Unified Patents Ex. 1014, pg. 3
`
`

`

`BNI Intellectual Property Description
`
`I.
`
`ll.
`
`III.
`A.
`
`Service Preference Architecture ......................................... _. ..................................................... 4
`A. High Level Description ............................................................................................................. 4
`B. Service Control and Copyright Protection ................................................................................ 4
`C. Flexibility to add new Service Control and Copyright Techniques .......................................... 5
`SPA — Network & Product Architecture ............................................................................... 5
`A. General Description ................................................................................................................. 5
`Figure 1. Service Preference Architecture ................................................................................ 6
`B. The |CP Controls Communication Gateways .......................................................................... 6
`C. The |CP Controls ISP, BNS & EDC Service Deliveries ........................................................... 6
`D. The |CP Controls are determined by Regular and Active Human intervention ....................... 7
`E. iCPs Updated by Active Intervention & Multiple lCPs Deliver High Availability ....................... 7
`Figure 2. Active Intervention Updates and Backup |CPs .......................................................... 7
`BNS Internet Control Techniques ....................................................................................... 7
`Digital Rights Management ................................................................................................. 7
`1. Conditional Denial ................................................................................................................. 7
`Figure 3. DRM — Conditional Denial ......................................................................................... 8
`3. Packet inspection .................................................................................................................. 8
`4. E-Mail Server & Client Spoofing8
`Figure 4. DRM — Blocking E-Mail of Copyrighted Files ............................................................ 9
`5. Denial of Service Attacks on Unlicensed “Pirate” Copyright Material Sites .......................... 9
`6. Copyright Registry ................................................................................................................ 9
`7. Copyrighted File Deletion ..................................................................................................... 9
`8. Event Notification .....................................................
`..................................... 9
`Service Initialization ............................................................................................................ 9
`Figure 5. Service initialization.
`............................................................................ 10
`Active and inactive Gateway Processing Control ............................................................. 10
`Figure 6. Active and inactive CG processing ......................................................................... 10
`First Portal Visibility (“First Portal”) ................................................................................... 10
`Figure 7. First Portal Visibility. .............................................................................................
`11
`Advertising ....................................................................................................................
`11
`Figure 8. Advertising insertion. ......................................................................g ......................... 1 1
`Browser, Program Communications & URL or IP Address Access Blocking ................... 12
`Figure 9. URL or lP address Blocking .................................................................................... 12
`Service Applet Downloads ................................................................................................ 12
`Figure 10. Service Applet Downloads ..................................................................................... 12
`Virus initiated Denial of Service Traffic Blocking .............................................................. 13
`Figure 11. Virus initiated Traffic Blocking ............................................................................... 13
`Law Enforcement Monitoring ............................................................................................ 13
`Figure 12. Law Enforcement Monitoring ................................................................................ 13
`VolP Blocking .................................................................................................................... 14
`Figure 13. VolPBlocking. ................................ 14
`Real Time Video or Audio Streaming Blocking ................................................................. 14
`Figure 14. RT Video or Audio Blocking ................................................................................... 14
`Real Time Video or Audio 003 Reduction ........................................................................ 15
`Figure 15. RT Video or Audio Blocking ................................................................................... 15
`Peer to Peer (P2P) Resource Address Server Blocking and False P2P Resource Address
`M.
`Spoofing ...................................................................................................................................... 15
`Figure 16. P2P Resource Address Server Blocking ............................................................... 16
`Figure 17. P2P Resource False Address Spoofing. ............................................................... 16
`internet or Data Network Access Authentication ...... '. ....................................................... 17
`Figure 18. internet Access Pre—Authorization ......................................................................... 17
`Communication Gateway Based Storage for Content Service Delivery ........................... 17
`Figure 19. Communication Gateway Based Content Storage and delivery. .......................... 18
`ICP & CG Data Base Structures ....................................................................................... 19
`ICP Data Base Summary .............................................................................................. 19
`|CP Details .................................................................................................................... 19
`
`B.
`
`C.
`
`D.
`
`E.
`
`F.
`
`G.
`
`H.
`
`i.
`
`J.
`
`K.
`
`L.
`
`N.
`
`0.
`
`P.
`
`‘i.
`2.
`
`'
`
`BNI Proprietary
`4/16/2004
`
`Page 2
`
`Unified Patents Ex. 1014, pg. 4
`
`Unified Patents Ex. 1014, pg. 4
`
`

`

`BNI Intellectual Property Description
`
`3.
`
`CG Details ..................................................................................................................... 22
`
`BNI Proprietary
`4/16/2004
`
`A
`
`Page 3
`
`Unified Patents Ex. 1014, pg. 5
`
`Unified Patents Ex. 1014, pg. 5
`
`

`

`BNI Intellectual Property Description
`
`ABOUT THIS DOCUMENT
`This document describes BNS Product Features, Intellectual Property and Product Architecture.
`
`CONFIDENTIAL INFORMATION
`
`This Intellectual Property Description document is the property of Broadband Network Systems.
`It is proprietary information and is strictly confidential.
`It contains information intended only for the
`person(s) to whom it
`is transmitted. With receipt of this Intellectual Property Description
`document , Recipient acknowledges and agrees that:
`I) in the event that the recipient does not
`wish to pursue this matter, this document will be returned, at the address listed below as soon as
`possible; the recipient will not copy, fax, email, reproduce, divulge, or distribute this confidential
`Intellectual Property Description document
`,
`in whole or in part, without the express written
`consent of Broadband Network Systems; and
`Ill) all of the information contained in this
`document will be treated as confidential material with no less care than that afforded to your
`company or personal confidential material.
`
`TRADEMARK NOTICE
`BROADBAND NETWORK SYSTEMS, BROADBAND NETWORK SERVICES and the Broadband
`Network Logos are Trademarks of Broadband Network Systems.
`
`CONTACT INFORMATION
`Robert Burke
`C.E.O.
`21103 Old Well Road
`Los Gatos, CA 95033
`USA.
`(408) 353-3573
`
`URL: www.bbns.us
`
`BNI Proprietary
`4/16/2004
`
`Page 4
`
`Unified Patents Ex. 1014, pg. 6
`
`Unified Patents Ex. 1014, pg. 6
`
`

`

`BNI Intellectual Property Description
`
`I.
`
`Service Preference Architecture
`
`A. High Level Description
`
`Broadband Network Systems (BNS) plans to develop and to sell Broadband (high-speed)
`Residential and Business Communication Gateways (C65) and Internet Control Points (ICPs) to
`Telecommunication Carriers such as the Regional Bell Operating Companies (RBOCs), other
`Telephone companies, ISPs and Cable TV companies.
`lCPs are network based routers or
`computers that control the operation of CGs, CGs,
`installed at a Subscriber's site and ICPs,
`installed in the Carriers' network are designed to enable Carriers to provide the so-called ‘Triple
`Play services (Voice+ Broadband Internet + Video) to their Subscribers using the Carriers
`existing distribution network.
`In addition new revenue generating Content Services (music,
`video, games, and software services) can be offered by BNS.
`
`With BNS’s unique Service Preference Architecture (SPA), several new data traffic control
`techniques are available to Carriers, ISPs, Enterprises and Cable TV companies for their Internet
`Access networks.
`
`they provide an important new feature- Digital Rights
`BNS products are unique in that
`Management,
`i.e., the assurance to both the Service Provider and the Content Provider that
`Intellectual Property (music, video, games, software, etc.) will be secure from illegal downloading
`and transmission over the Internet, a major source of lost revenues and the basis for hundreds of
`lawsuits. Service Providers will want this feature to- halt the legal onslaught launched by music
`companies and because they want to offer Video/DSL and the Motion Picture Industry will not
`license the content for distribution over the unsecured Internet, having seen the negative impact
`piracy has already had on the Music Recording Industry. Content Providers will demand this
`feature to stop the illegal downloading and transmission of Intellectual Property over the Internet
`which has cost the' music and movie industries billions of dollars annually.
`
`B. Service Control and Cogyright Protection
`
`BNS’ Service Preference Architecture (SPA) is a collectibn of BNS software routines executed by
`BNS CGs in conjunction with SPA-based Internet Servers under the control of BNS Internet
`Control Points.
`
`The software routines perform eight functions:
`
`rights management- SPA protects copyrighted material
`1. Digital
`downloaded and distributed over the Internet.
`
`from being illegally
`
`2. First portal visibility- SPA enables Consumers to receive the Carrier/BN8 home page or
`video menu system every time their Computer or TV is turned on or whenever they re-initiate
`activity after an extended idle period.
`3. Advertising- SPA allows desired advertisements to be delivered by the Carrier and/or by BNS
`to the Customers.
`4. Web site blocking- SPA enables Web Sites to be blocked by the Carrier,
`corporate customers as required by Law or by the Subscriber’s own Policy.
`5. Services download- SPA allows Consumer and Business customers to download applets that
`facilitate their use of the BNS/Carrier Services portfolio.
`6. Virus — Initiated traffic Blocking— SPA prevents infected user machines from repeatedly
`sending traffic at high data rates to sites which are the subject of Denial of Service attacks.
`_
`7. Law enforcement monitoring — SPA allows data passing through 3 CG to be copied to law
`enforcement or national security agencies.
`
`ISP or their
`
`BNI Proprietary
`4I16/2004
`
`Page 5
`
`Unified Patents Ex. 1014, pg. 7
`
`Unified Patents Ex. 1014, pg. 7
`
`

`

`BNI Intellectual Property Description
`
`8. Voice over Internet Protocol (VoIP) traffic blocking — SPA allows Carriers to restrict the use
`of the Internet Access Service they offer Subscribers to "data transport only,” blocking VoIP and
`thereby protecting their voice revenue stream from encroachment and preserving their ability to
`migrate their voice customers from the Public Switched Telephone Network (PSTN) when they
`upgrade their Internet Access Networks to offer Real Tome Quality of Service.
`
`In the sections that follow, we describe how the software routines work.
`
`C. Flexibility to add new Service Control and Cogyright Technigues
`
`BNS has created SPA to be highly flexible, adaptable and to deliver a high degree of availability
`and security. The BNS SPA Architecture allows new Internet Control techniques to be added as
`BNS, Content Providers or Service providers need them. More techniques will be added by BNS
`as it creates them to deliver value to BNS,
`its customers and partners. This flexibility to add
`techniques is a key feature of SPA and'BNS Intellectual Property.
`
`ll.
`
`SPA - Network & Product Architecture
`
`A. General Description
`
`Telecommunication Carriers, Cable TV companies and Internet Service Providers can be
`equipped to deliver the ENS suite of features only by using a network service based system. This
`system is based on an architecture that employs an Internet Control Point (ICP) to control the
`access to web sites and to deliver data to Subscribers. The ICP controls the processing of data
`sent between Customers (client PCs or LAN servers) using the BNS Communication Gateway
`(CG) and the ISPs, Enterprise Data Centers or Content Servers with which they are exchanging
`information. The architecture is completed with a hardWare/software implementation in the
`Communication Gateways that Carriers/ISPs use at their customers premises to deliver the
`service. The Communication Gateways cannot be tampered with by Users. Users are given no
`access to unload or modify the CG operating software by design and all ICP-CG communications
`takes place within the Carrier side of the network (DSL uplink), ICP-CG communications are
`secured with encryption and hashing. Furthermore, the ICP will not enable any service to an un—
`registered CG and an un-registered CG will not operate in an experimental environment at all.
`
`This ensures secure control of the data flow between both the ICP and the CG. This secure flow
`of data then enables Carriers, ISPs, Enterprise data Centers or Cable TV Companies to control
`the services their Users have access to. Figure 1 illustrates the overall Network Architecture.
`
`BNI Proprietary
`4/1 6/2004
`
`.
`
`Page 6
`
`Unified Patents Ex. 1014, pg. 8
`
`Unified Patents Ex. 1014, pg. 8
`
`

`

`BNI Intellectual Property Description
`
` Music; Movies, Socks.
`
`.,
`Software, Games. Gaming. etc.
`
`
`
` amounts”?
`
`
`*st meme: cdfié’éi
`» Secure Services
`.
`-Pointsf
`
`
`: ‘s‘ussc’ribémse
`“
`
`
`
`
`preempts piracy
`and controls Services
`
`based SPA
`
`Figure 1. Service Preference Architecture
`
`.
`B. The ICP Controls Communication Gateways
`The Communication Gateway (CG) may be either: 1) a Gateway that combines TV, Video,
`Internet and Voice, 2) a dial-up Remote Access Server, 3) an ADSL Modem/Router, 4) a Satellite
`TV Gateway, 5) a Cable TV Modem, or 6) a converged set top + Internet Gateway.
`
`The ICP is the source of Internet Service Control and Conditional Denial of Users access to
`Service Provider selected URLs or IP addresses. The ICP controls the CG to determine what web
`site data is allowed through to Subscribers browsers. The ICP also controls the CGs packet
`inspection processing to determine which data can be allowed to flow through the CG to and from 7
`the Subscriber, specifically when e—mail or file transfers are initiated. The ICP also controls what
`activities are engaged in by idle CGs when Consumers are inactive.
`Idle 065 may receive
`software downloads from the ICP, may be used to collect data and to initiate communications
`activities that are disruptive to Content Servers that offer unauthorized copyrighted materials for
`illegal download by Consumers.
`
`Multiple ICPs are deployed geographically in the Carrier‘s network to support the Gateway
`management capacity of the ICP and the number of Broadband Users in its service area.
`
`C. The ICP Controls ISPl BN8 8. EDC Service Deliveries
`Next is the interaction of the ICP with the BNS Content Server (808), Service Provider’s Internet
`Portal or Carrier (ISP) and Enterprise Data Centers (EDC). The ICP controls Consumers ability to
`access services that are offered by the ISP or EDC. The ICP also controls the 065 to deliver: 1)
`advertisements, 2) the home page for ISP/BCS/EDC web servers or 3) software downloads to
`Consumer's PCs for their use of ISP/BNS/EDC content services.
`
`BNI Proprietary
`4/ 1 6/2004
`
`Page 7
`
`Unified Patents Ex. 1014, pg. 9
`
`Unified Patents Ex. 1014, pg. 9
`
`

`

`BNI Intellectual Property Description
`
`D. The ICP Controls are determined by Regular and Active Human Intervention
`
`The lCP is programmed either by human input or by operator—controlled web crawler software.
`Updates are determined from BNS's active intervention service whereby changes to the control
`entries are discovered and implemented. This is a service delivered to ISPs and EDCs whereby
`the operation of BNS Features described below are controlled in a manner analogous to the
`regular updating of Virus Definitions for computer virus and worm protection.
`
`E. ICPs Updated by Active Intervention & Multiple ICPs Deliver High Availability
`
`The web crawlers. human intervention and ICP/CG software/processing data base updates are
`controlled by an Active Intervention system consists of a set of centrally maintained computer
`systems which control the operation of the ICPs. Figure 2 illustrates this.
`
` BNSActive lntewention Systems
`
`Web‘crawiers find Unlicensed Content
`Humans input ICP& CG Processing Data
`
`Base (Shams
`CG-EYSweinwée Software Changes
`
`
`BNS Update System
`Manages Operation of
`ICPs
`
`
`ICP Updates
`ICP Updates
`
`& Control
`& Control
`
`
`
`mamas.
`
`
`
`Servlce Controls:
`31%
`Internet BasedoRM'
`.
`Internet Based DRM
`V "
`8iod<ed Sites
`
`
`
`Blocked Sites
`;~Ejrst Portal
`
`
`
`:mesing
`_
`First Portal
`
`
`
` ,‘ICP Vi‘giflxs Traffic Blocking '
`
`
`
`3 Advertising
`
`
`
`
`
`fflnactive CG prams ‘m
`:Law Enforcement Mcéiitpnqg
`
`
`
`As Di
`
`Multiple Control Pomts:
`High availability to CGs
`
`bylcp
`
`Figure 2. Active Intervention Updates and Backup ICPs.
`
`III. BNS Internet Control Techniques
`
`A.
`
`Digital Rights Management
`
`1. Conditional Denial
`
`The CGs, under ICP control, deliver a network based Digital Rights Management Service (DRM)
`which denies Users the capability to send or to receive data from or to URLs or IP addresses that
`are known to contain unlicensed copyrighted material. When this “Conditional Denial" occurs, the
`Gateway substitutes the URL or IP Address of a site that offers licensed copyrighted materials for
`legal, authorized sale to the User. This list of URLs or IP addresses that are known to contain
`
`BNI Proprietary
`4/ 1 6/2004
`
`Page 8
`
`Unified Patents Ex. 1014, pg. 10
`
`Unified Patents Ex. 1014, pg. 10
`
`

`

`BNI Intellectual Property Description
`
`unlicensed copyrighted material will be regularly updated, similar to how virus definitions are
`regularly updated today.
`
`ICPs delivering DRM service use the Section F. Browser, Program Communications & URL or IP
`Address Access Blocking method to direct Users to authorized content sites. DRM uses both
`Active Human and Web Crawler input to find unauthorized content offered over the Internet and
`to update the URLs or lP addresses that are known to contain unlicensed copyrighted material.
`
`When programs other than browsers attempt to access the blocked sites, the requested URL or
`IP address may be substituted by a legal content provider’s URUlP Address or none at all.
`
`Upon registration as an “Active” Gateway, the ICP updates the Communication Gateway’s list of
`DRM URL or IP Address substitutions.
`
`
` GWiDAcfiV§
`
`’
`
`a Mode .,
`
`Figure 3. DRM - Conditional Denial
`
`3. Packet Inspection
`
`Additional packet inspection processing is performed by the Gateways to determine the file type
`of all files being transferred through the Gateway based upon the files properties. such as file
`extension, file format, header or trailer contents and URL/lP addresses that are known sources of
`unauthorized Copyrighted material. The Gateway is programmed by the ICP with certain Data
`Patterns. These data patterns may be any length and may contain exact matches plus regular
`expressions. When certain data patterns are recognized, the data transfer is stopped or another
`action is taken, based upon rules delivered by the lCP to the Gateway.
`-
`
`4. E-Mail Server & Client Spoofing
`
`CGs present themselves to Users as the User's E-mail Server and present themselves to E-Mail
`servers as Users.
`In so doing, the CG acts as a 2- way encryption/decryption point to enable
`inspection of what would othenlvise be encrypted data. When E-mail is sent through the Gateway,
`the Gateway inspects all attached files‘ using Packet Inspection. Based upon rules delivered by
`the ICP to the Gateway, the Gateway can then deny access to incoming files, stop the transfer of
`outgoing files or take other action,.
`
`BNI Proprietary
`4/16/2004
`
`‘
`
`Page 9
`
`Unified Patents Ex. 1014, pg. 11
`
`Unified Patents Ex. 1014, pg. 11
`
`

`

`BNI Intellectual Property Description
`
`
`
`
`E-Mail Program send
`GW De-Crypts &
`
`
`
`GIN in Active Mode as
`ii
`
`1 or receive:
`-
`Packet Inspiestimx. _
`e-mail clienttst server ,
`
`
`
`II are
`-
`finds Copyrighted file
`
`
`GW Re-Encrypts 8.
`
`, téE-mail.‘Da$Séé‘
`
`
`
`Figure 4. DRM — Blocking E-Mail of Cogyrighted Files
`
`5. Denial of Service Attacks on Unlicensed “Pirate” Cogyright Material Sites
`
`Powered up fl Inactive Gateways under ICP control can be directed to initiate repeated
`requests for service or for other transactions over the Internet Uplink to URLs of IP Addresses in
`the Conditional Denial of Service list which have been identified for interdiction. ICP control can
`activate the attacks on any of several bases: 1) scheduled with duration, 2) real time activation by
`the ICP or 3) event driven. In this way, access to Users not served by BNS Gateways under ICP
`control are denied access to the copyrighted materials, greatly expanding the impact of the
`initially deployed Gateways to prevent access to pirated material.
`
`6. Cogyright Registg
`
`Users who have purchased copyrighted material are registered by the seller or canself register
`as owners of a license to use the material. This registry is centrally kept and the ICP has access
`to it. Furthermore, non—copyrighted material can be registered to identify files with no limit on the
`number of copies made or that may be e-mailed or downloaded without intervention.
`
`.
`7. Copyrighted File Deletion
`A Powered up gfl Inactive Gateway, under ICP control, has the capability to inspect any User’s
`computer file system available to it on the LAN to which they are attached. Notification to the ICP
`is made of file names that match Packet
`Inspection patterns to identify the presence of
`copyrighted material to which the User may not be entitled. Human intervention or the Copyright
`Registry may be used to verify User's entitlement to copyrighted materials found on the file
`system. The Gateway deletes files to which the User is not entitled.
`
`8. Event Notification
`
`The Gateways deliver an event notification to the ICP whenever a Packed Inspection match or an
`attempt to access a conditionally denied URL is made.
`
`B.
`
`Service Initialization
`
`065 are required to be registered with the Internet Control Point when they are

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket