`Approvedfor use through 07/31/2006. OMB 0651-0032
`U.S. Patent and Trademark Office; U.S. DEPARTMENT OF COMMERCE
`Underthe Paperwork Reduction Act of 1995, no persons are required to respond to a collection of information unless it displays a valid OMB control number.
`PROVISIONAL APPLICATION FOR PATENT COVER SHEET
`This is a requestforfiling a PROVISIONAL APPLICATION FOR PATENTunder 37 CFR 1.53(c).
`
`Express Mail Labet No. EV 167 295 313 US
`
`Given Name(first and middle[if any])
`
`Family Nameor Surname
`
`Residence
`and either State or Foreign Count
`
`City
`
`Additional inventors are beingnamedonthe _———S—SCSSBtely NUMbErOd Sheets attached hereto
`TITLE OF THE INVENTION (500 characters max)
`SERVICE PREFERENCE ARCHITECTURE FOR DATA TRAFFIC AND PROVISIONING CONTROL
`Directall correspondenceto:
`CORRESPONDENCE ADDRESS
`
`0)
`7
`
`Customer Number:
`
`OR
`
`.
`
`23488
`
`:
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Gerald B. Rosenberg, Esq.
`:
`.
`.
`
`285 Hamilton Avenue
`
`
`
`ea94301
`
`
`ENCLOSED APPLICATION PARTS(checkall that apphy
`
`
`
`
`
`Cl
`CD(s), Number
`14 —
`Specification Number of Pages
`.
`OC
`Other(specify)
`C] ‘Drawing(s) Number of Sheets
`
`a Application Date Sheet. See 37 CFR 1.76
`
`
`METHOD OF PAYMENTOFFILING FEES FOR THIS PROVISIONAL APPLICATION FOR PATENT
`
`
`
`Applicant claims small entity status. See 37 CFR 1.27.
`:
`FILING FEE
`.
`.
`Amount ($)
`
`A check or moneyorderis enclosed to cover thefiling fees.
`
`
`
`
`|v|The Director is herby authorized to chargefiling 80.00
`
`fees or crédit any overpayment to Deposit Account Number: 50-0890
`:
`.
` C] Paymentbycredit card. Form PTO-2038is attached.
` The invention was madeby an agency of the United States Governmentor undera contract with an agencyof the
`
`
`
`
`[v] No.
`CJ Yes, the nameof the U.S. Govemment agency and the Government contract numberare:
`
`
` :
`.
`[Page 1 of 2]
`,
`
`Respectfully submitted,
`.
`\
`Date.
`
`SIGNATURE REGISTRATION NO._30,320.
`
`.
`:
`(if appropriate)
`.
`TYPEDor PRINTED NAMEGerald B. Rosenberg
`_ Docket Number: BRDB3000
`TELEPHONE 650.325.2100
`
`.
`
`|
`
`United States Government.
`
`
`
`USE ONLY FORFILING A PROVISIONAL APPLICATION FOR PATENT
`This collection of information is required by 37 CFR 1.51. The information is required to obtain or retain a benefit by the public which is to file (and by the USPTO
`to process) an application. Confidentiality is govermed by 35 U.S.C. 122 and 37 CFR 1.14. This collection is. estimated to take 8 hours to complete,including
`gathering, preparing, and submitting the completed application form to the USPTO. Time will vary depending uponthe individual case. Any comments on the
`amountof time you require to complete this form and/or suggestions for reducing this burden, should be sent to the Chief Information Officer, U.S. Patent and
`Trademark Office, U.S. Department of Commerce, P.O. Box 1450, Alexandria, VA 22313-1450. DO NOT SEND FEES OR COMPLETED FORMS TO THIS
`ADDRESS. SEND TO: Mail Stop Provisional Application, Commissionerfor Patents, P.O. Box 1450, Alexandria, VA 22313-1450.
`
`ifyou needassistance in completing the form, call 1-800-PTO-9199 and selectoption 2.
`
`Unified Patents Ex. 1012, pg. 1
`
`Unified Patents Ex. 1012, pg. 1
`
`
`
`PTO/SB/17 (10-03)
`Approved for use through 07/31/2006. OMB 0651-0032
`U.S. Patent and Trademark Office; U.S. DEPARTMENT OF COMMERCE
`Under the Paperwork Reduction Act of 1995, no persons are required to respondto a collection of information unless it displays
`a valid OMB control number.
`
`
`
`
`
`
`
`
`First Named Inventor
`
`|Burke, Robert M.
`
`.
`
`-
`
`
`FEE TRANSMITTAL
`EffectiveonhorFY2004revision.
`2004
`
`
`
`
`
`
`
`
`
`
`
`
`coatWW
`
`A——ET—IE'E—eOR
`:
`|
`TOTAL AMOUNT OF PAYMENT.
`
`($) 80.00
`
`___-_|
`
`
`Attomey Docket No._|BRDB3000:
`
`
`
`
`
`[__]None
`
`Check [“] Credit card CJ Money [_] other
`Deposit Account:
`
`
`
`: Deposit
`50-0890
`Code ($)
`|Code (5)
`Fee Description
`
`
`
`
`
`
`
`Number
`1051. 130
`[2051
`65 Surcharge- late filing fee or oath
`
`
`
`
`Deposit
`:
`1052
`50
`|2052
`25 Surcharge- late provisionalfiling fee or
`
`;
`Account NewTechLaw
`.
`east
`
`
`
`1053
`130
`
`1053
`130 Non-English specification
`
`
`The Directoris authorized to: (check ail that apply)
`.
`wg
`
`1812 2,520
`1812 2,520 Forfiling a request for ex parte reexamination
`
`
`
`
`Charge fee(s) indicated below
`iv] Credit any overpayments
`
`
` 920°1804
`
`
`1804
`920* Requesting publication of SIR prior to
`
`
`[¥] charge any additional fee(s) or any underpaymentof fee(s)
`_ Examiner action
`
`
`[_]charge fee(s) indicated below, exceptfor thefiling fee |
`
`1805 4,840" Requesting publication of SIR after
`Examineraction
`
`to the above-identified deposit account.
`
`
`
`
`2251
`55 Extension for reply within first month
`
`
`FEE CALCULATION
`2252
`210 Extensionfor reply within second month
`
`1. BASIC FILING FEE
`2253
`475 Extensionfor reply within third month
`
`
`arge Entity Smali Entity
`
`F
`F
`
`2264
`740 Extensionfor reply within fourth month
`
`
`
`
`
`2255 1,005 Extension for reply within fifth month ,
`
`
`
`
`
`
`2401
`165 Notice of Appeal
`
`
`
`
`2402
`165 Filing a brief in support of an appeal.
`
`2403
`145 Requestfor oral hearing
`,
`
`
`
` 1451
`1,510 Petition to institute a public use proceeding
`
`
`
`2452
`55 Petitionto revive - unavoidable
`
`
`
`
`
`2453
`665 Petition to revive - unintentional
`
`2. EXTRA CLAIM FEES FOR UTILITY AND REISSUE]
`
`
`Fee from
`2501
`665 Utility issue fee (or reissue)
`
`Extra Clainis
`Fee Paid
`2502
`240 Design issue fee
`Total Claims
`[7] .20" =L.__]xa {__]
`
`
`
`2503
`320 Plant issue fee
`
`
`
`
`Independent FF] “ge ES]x
`
`
`1460
`130 Petitionsto the Commissioner
`
`
`Multiple Dependent
`‘
`Cc) ~—__]
`1807 50 Processing fee under 37 CFR 1.17(q)
`
`Large Enti
`Ss
`
`
`
`4806
`180 SubmissionofInformation Disclosure Stmt
`Fee Fee
`Fee Fee
`.
`:
`
`
`8021
`49 Recording each patent assignment per
`Code ($)
`Code ($)
`
`
`
`1202
`18
`2202
`9 Claims in excess of 20
`properly (times number of properties)
`
`
`
`
`2809
`385 Filing a submissionafterfinal rejection
`oo
`1201
`86
`2201
`43
`Independentclaimsin excess of 3
`(37 CFR 1.129(a))
`,
`
`
`2810
`1203 290
`2203 145 Multiple dependentclaim,if not paid
`385 For each additional invention to be
`
`
`
`
`
`.
`4204
`86
`2204
`43
` ** Reissue independentclaims
`examined (37 CFR 1.129(b))
`
`
`
`2801
`overoriginal patent
`385 Request for Continued Examination (RCE)
`
`
`
`
`1802
`900 Request for expedited examination
`** Reissue claimsin excess of 20
`
`
`of a design application
`and overoriginal patent
`
`
`
`Other fee (specify)
`:
`
`
`
`
`
`
`SUBTOTAL (2)
`_
`“Reduced by Basic Filing
`Fee
`Paid
`**or numberpreviously paid, if greater; For Reissues, see above
`u
`¥
`ming
`Fee
`Fal
`SUBTOTAL (3) CH
`
`
`
`a
`SUBMITTED BY
`(Complete(if applicable))
`
`
`
`
`
`
`|Name(Priwvtpe)|Gerald B. Rosenberg a|ResistrationNo.F30.320 Telephone 650.325.2100
`
`
`
`[signatureeeIVISEppocle poate|is/ecCn3
`
`
`
`
`
`
`
`
`WARNING:Informati nn this f rm may bec&mg\public. Credit card information sh _uld not
`be included onthis form. Provide credit card information and auth rization on PTO-2038.
`This collection of information is required by 37 CFR 1.17 and 1.27. The information is required to obtain or retain a benefit by the public whichis to file (and by the
`USPTOto process) an application. Confidentiality is governed by 35 U.S.C. 122 and 37 CFR 1.14. This collection is estimated to take 12 minutes to complete,
`including gathering, preparing, and submitting the completed application form to the USPTO. Timewill vary depending upon theindividual case. Any comments on
`the amountof time you require to complete this form and/or suggestions for reducing this burden, should be sent to the Chief Information Officer, U.S. Patent and
`Trademark Office, U.S. Department of Commerce, P.O. Box 1450, Alexandria, VA 22313-1450. DO NOT SEND FEES OR COMPLETED FORMS TOTHIS ADDRESS.
`SEND TO: Commissionerfor Patents, P.O. Box 1450, Alexandria, VA 22313-1450.
`‘
`ifyou need assistance in completing the form, call 1-800-PTO-9199 and select option 2.
`
`;
`
`-
`
`Fee Description
`
`Fee Paid
`
`* Utility filing fee
`Designfiling tee
`Plantfiling fee
`Reissuefiling fee
`Provisionalfiling fee
`SUBTOTAL(1)
`
`0.00
`
`Fee Description
`
`1205
`
`18
`
`2205
`
`9
`
`Unified Patents Ex. 1012, pg. 2
`
`Unified Patents Ex. 1012, pg. 2
`
`
`
`7
`
`BNS Intellectual Property Description
`
`- BROADBAND NETWORK SYSTEMS,|INC.
`‘Intellectual Property
`:
`
`Service Preference Architecture
`|
`(SPA)
`Description & Technology
`
`November17, 2003 |
`
`BNS Proprietary
`11/17/2003.
`
`.
`
`.
`
`:
`
`Page 1
`
`Unified Patents Ex. 1012, pg. 3
`
`Unified Patents Ex. 1012, pg. 3
`
`
`
`BNSIntellectual Property Description ©
`
`I.
`
`ll.
`
`/
`
`Ul.
`A.
`
`.
`
`Service Preference Architecture...............ccccccccccccsccsscesecseseereeceesesevsececednesuesaesaseseesenaceraes 4
`A. High Level Description oo... eccceeccecceceecescescesencapeseeseeaeccesssersescsacsaseevsesessesesacsaveaceasenecsaaes 4
`B. Service Control and Copyright Protection ..........cccccccscccsscessssesceesssessseesscsessesceeeaeceseveceacnrenetes 4
`C. Flexibility to add new Service Control and CopyrightTechniques...0..0..0.0.0.cceccseceeeseceerees 5
`SPA- Network & Product Architecture coca eneeveseesaeseceevaceecoseacescecacesnacedsaseqceecesseenssacneseesiseesieecses 5
`A. General Description oo... eee ccc ceeeseeseeceeceesesessesecsesaesassecesnesseracsesssssesssnsssvaesaeseeneasenenenaes 5
`Figure 1. Service Preference Architecture... ccccccssssssesessssetssesesecsessescsccnsrevacsessteveceneverees 6
`B. The ICP Controls Communication GatewayS......0..0..0..00cceecceccesescececeececsaceceesensessucaecaseacerees 6
`C. The ICP Controls ISP, BNS & EDC Service Deliveries ..00.....0...cccccccccsssscecsesceseesseeteetsuteeedsaanes 6
`D. The ICP Controls are determined by Regular and Active Human Intervention................ Leeeees 7 -
`E: ICPs UpdatedbyActive Intervention & Multiple ICPs Deliver High Availability....................... 7
`Figure 2. Active Intervention Updates and Backup ICPS.....0.......ceccccscessescseessesceseusnsvesecsnsvaves 7
`BNSInternet Control Techniques...............cccccceceecccssecssceuseseccaevacessaceasersavausauesnsseveeventanee E
`Digital Rights Management............ceccececeecescesesessussecoesesessesecseusassassucersuseseseateceestssetsenaeens 7
`1. Conditional Demial.......... ce ccscessesecsesesecsescseseeeseesnecsucesossessessccssensevsuescetausessessceasecsessevseeeeees 7
`Figure 3. DRM — Conditional Denial.beesaeesbaeeeesseneeneecaeeeccseeeusecscessaechaceseeneesaeessecssenseenserneesacsaess 8
`
`3. Packet Inspection........... wesevesecanesshdecececeneeeeeeaeeaeesesaeseseecetcrseveeeeses
`ceceeevteeeaeeeeenneeaees 8
`’ 4, E-Mail Server & Client Spoofing ............0.0.cceccecsssessecccseccesecsessesasaneceslessststssassesesseseusessesseseses 8
`Figure 4. DRM — Blocking E-Mail of Copyrighted Files ..0..0..0.0ccc ce cecccesccsecceesecsscsserensereeees 9
`5. Denial of Service.Attacks on Unlicensed “Pirate” Copyright Material SiteS...eens 9
`6. Copyright Registry oe ee eeecceeessececeeseeseseescneescsscsecsevevbansersesseaussesssevaveacanansesenensansns 9
`7. Copyrighted File Deletion .........0.0.0.0.cccccccsceesesecseseceesevecstecsesceesescssavasaacacstssssesarsessessasesseeceeeQ
`8. Event Notification0... cccesssesseseeseeseseseesnesseessesseseansnsssssesssscssssenssassneeccareaserssessserseieseeseaee 9
`Service Initialization 0.0... ccccceceessseesessescesesscseseesecssceesssesaeceevaesaseeneseedSevneeeneeseesaeeerertesnes 9
`
`Figure 5. Service Initialization............0....cccccccceccbecscscccececevescevesceveesevsesevsneeneneeey
`Active and Inactive Gateway Processing Control weneeesceevesnceecvenseeedseeeeseuseeecsareetessenedsaraneces 10
`Figure 6. Active and Inactive CG processing ........ccccccccccsscccscsecsscsscersecsaceasseceseaesersaseesesseseees 10
`First Portal Visibility (“First Portal”) .......0...cccccccsssesscsecsecsceccoeseceusevaccevsavacsevsucenseees Leseeeeees 10
`Figure 7. First Portal Visibility. .......0..c.cccccccccscscccceccecescessccscsssnsseseessracsauadecaessesearaesaeyassaternseenes 11
`AdVertiSing ......... ccc cececeeeeseeeeetete sees vesceceeeeseeseeeesneeseaeeesaeeseaessectenssseeetenssesnescensanteeees 1,
`‘Figure 8. Advertising IMSePtiOn......cssscssecescessvssessssesssssusssssvessssssssesssrsssusseussssesessasveseessssesesssseess AV
`es
`F. Browser, Program Communications & URL or IP Address Access Blocking
`
`Figure 9. URLor IP address Blocking ...0..........ccccccccsescsssssessssecscevscecavsevesendessasacsvesessanavananes 12
`G. Service Applet Downloads... cececccssssessssesesesessoessvessuvacsassusescesessscasserasatauseesvacaesacacseseaee 12
`Figure 10. Service Applet Downloads............Sseesaaeesees escaneneeceseeeesqusseesececeeeeiaeeecesaatacsensecostersavess 12
`
`B.
`.C.
`
`D
`
`E
`
`H. Virus Initiated Denial of Service Traffic Blocking caneaeenecenseeseeeecuceseaeseenetessesesaeentaeeleteeseeennss 13
`Figure 11. Virus Initiated Traffic BlOCKING ............ cc ccceecccccccsssesscssesessereecelessvascssestseeneerenspee 13
`L
`Law Enforcement Monitoring..........0...000.0.. ceeLeceeecessusenseseeseecncranaeteeserassatesseseuseneesans 13
`Figure 12. Law Enforcement MOnitoring...........cccccccssecssssssscssssssssessseresesseccssterusseesaeetsaereenes 13
`J. VOIP BIOCKING ..... cei ceccsceseetectssesseeetseeseeaesarseseceeseees veseaceseateceeseseetetatntessesseseecetetecsettescrseeee 14
`Figure 13. VoIP Blocking, sesaeeeseaesacsenesesaessseeseececusssasususcecsevessesassvacaeveed“eeceseeececesesesees“veseeeseaeeetens 14
`
`BNS Proprietary
`11/17/2003
`
`°
`
`. Page 2
`
`Unified Patents Ex. 1012, pg. 4
`
`Unified Patents Ex. 1012, pg. 4
`
`
`
`BNSintellectual Property Description
`
`ABOUT THIS DOCUMENT
`This document describes BNS Product Features,Intellectual Property and ProductArchitecture.
`
`CONFIDENTIAL INFORMATION
`This Intellectual Property Description documentis the property of Broadband Network Systems.
`It is proprietary information and is strictly confidential.
`It contains information intended only for the
`person(s) to whom it
`is transmitted. With receipt of this Intellectual Property Description
`document , Recipient acknowledges and agreesthat:
`1) in the event that the recipient does not
`wish to pursue this matter, this document will be returned, at the addresslisted below as soon as
`possible; the recipient will not copy, fax, email, reproduce, divulge, or distribute this confidential
`Intellectual Property Description document
`,
`in whole or in part, without the express written
`consent of Broadband Network Systems; and_Ill) all of the information contained in this
`document will be treated as confidential material with no less care than that afforded to your
`companyor personal confidential material,
`
`TRADEMARKNOTICE
`BROADBAND NETWORK SYSTEMS, BROADBAND NETWORK SERVICESand the Broadband
`Network Logosare Trademarks of Broadband Network Systems:
`
`CONTACT INFORMATION
`
`’ Robert Burke
`C.E.0.
`21103 Old Well Road
`Los Gatos, CA 95033
`USA.
`--
`* (408) 353-3573
`
`URL: www.bbns.us
`
`BNS Proprietary
`11/17/2003
`
`,
`
`Page 3
`
`.
`
`Unified Patents Ex. 1012, pg. 5
`
`Unified Patents Ex. 1012, pg. 5
`
`
`
`BNS Intellectual Property Description
`
`l.
`
`Service Preference Architecture
`
`A. High Level Description
`
`Broadband Network Systems (BNS) plans to develop and to sell Broadband (high-speed)
`Residential and Business Communication Gateways (CGs) and Internet Control Points (ICPs) to
`Telecommunication Carriers such as the Regional Bell Operating Companies (RBOCs), other
`Telephone companies, ISPs and Cable TV companies. ICPs are network based routers or
`computers that control the operation of CGs. CGs,
`installed at a Subscriber's site and ICPs,
`installed in.the Carriers’ network are designed to enable Carriers to provide the so-called ‘Triple
`Play’ services (Voice+ Broadband Internet + Video) to their Subscribers using the Carrier's
`existing distribution network.
`In addition, new revenue generating Content Services (music,-
`video, games, and software services) can be offered by BNS.
`
`With BNS’s unique Service Preference Architecture (SPA), several new data traffic control
`techniques are available to Carriers, ISPs, Enterprises and Cable TV companiesfor their Internet
`Access networks.
`
`they provide an important new. feature- Digital Rights
`BNS products are unique in that
`Management,
`i.e., the assurance to both the Service Provider and the Content Provider that
`‘Intellectual Property (music, video, games, software, etc.) will be secure from illegal downloading
`and transmission over the Internet, a major source of lost revenues and the basis for hundreds of
`lawsuits. Service Providers will want this feature to halt the legal onslaught launched by music
`companies and because they want to offer Video/OSL and the Motion Picture Industry will not
`license the content for distribution over the unsecured Internet, having seen the negative impact
`piracy hasalready had on the Music Recording Industry. Content Providers will demand this
`feature to stop the illegal downloading and transmission of Intellectual Property over the Internet
`which has cost the music and movie industries billions of dollars annually.
`
`B. Service Control and Copyright Protection
`BNS'Service Preference Architecture (SPA) is a collection ofBNS software routines executed by -
`_ BNS CGs.in conjunction with SPA-based Internet Servers under the control of BNS Internet
`Control Points.
`
`The software routines perform eight functions:
`
`1. Digital from being_illegallyrights management- SPA protects. Copyrighted material
`
`downloaded anddistributed over the Internet.
`‘2. First portal visibility- SPA enables Consumers to receive the Carrier/BNS home page or
`video menu system every time their Computer or TV is turned on or wheneverthey re-initiate
`activity after an extendedidle period.
`3. Advertising- SPA allows desired advertisements to be delivered by the Carrier and/or by BNS
`to the Customers.
`4. Web site blocking- SPA enables Web Sites to be blocked by the Carrier, ISP or their
`corporate customers as required by Law or by the Subscriber’s own Policy.
`5. Services download- SPA allows Consumer and Business customers to download applets that
`facilitate their use of the BNS/Carrier Services portfolio.
`6. Virus — Initiated traffic BI cking— SPA prevents infected user machines from. repeatedly
`sending traffic at high data rates to sites which are the subject of Denial of Service attacks.
`7. Law enf rcement monitoring — SPA allows data passing through a CG to be copied to law
`enforcementor national security agencies.
`
`BNSProprietary
`11/17/2003
`
`. Page4
`.
`
`Unified Patents Ex. 1012, pg. 6
`
`Unified Patents Ex. 1012, pg. 6
`
`
`
`BNS Intellectual Property Description
`
`verinternet Protoc | (V IP) traffic blocking — SPA allows Carriers to restrict the use
`8.V ic
`of the Internet Access Service they offer Subscribers to “data transport only,” blocking VoIP and
`thereby protecting their voice revenue stream from encroachment and preserving their ability to
`migrate their voice customers from the Public Switched Telephone Network (PSTN) when they
`upgradetheir Internet Access Networksto offer Real Tome Quality of Service.
`
`In the sections that follow, we describe how the software routines work.
`
`C. Flexibility to add new Service Control and Copyright Techniques
`
`BNShascreated SPA to be highly flexible, adaptable and to deliver a high degree ofavailability
`and security. The BNS SPA Architecture allows new Internet Control techniques to be added as
`BNS,Content Providers or Service providers need them. More techniques will be added by BNS
`as it creates them to deliver value to BNS,
`its customers and partners. This flexibility-to add
`techniquesis a key feature of SPA and BNSIntellectual Property.
`
`ll.
`
`SPA 2 Network & Product Architecture
`
`A. General Description
`
`Telecommunication Carriers, Cable TV companies and Internet’ Service Providers can be
`equipped to deliver the BNS suite of features only by using a network service based system. This
`system is based on an architecture that employs an Internet Control Point (ICP) to control the
`access to websites and to deliver data to Subscribers. The ICP controls the processing of data
`sent between Customers (client PCs or LAN servers) using the BNS Communication Gateway
`(CG) and the ISPs, Enterprise Data Centers or Content Servers with which they are exchanging’
`information. The architecture is completed with a hardware/software implementation in the
`Communication Gateways that Carriers/ISPs use at their customers premises to deliver the
`service. The Communication Gateways cannot be tampered with by Users. Users are given no
`access to unload or modify the CG operating software by design and all ICP-CG communications
`takes place within the Carrier side of the network (DSL uplink), ICP-CG communications are
`secured with encryption and hashing. Furthermore, the ICP will not enable any service to an un-
`registered CG and an un-registered CG will not operate in an experimental environmentatall.
`
`This ensures secure control of the data flow between-both the ICP and the CG.This secure flow
`of data then enables Carriers, ISPs, Enterprise data Centers or Cable TV Companies to control
`the services their Users have accessto. Figure 1 illustrates the overall Network Architecture.
`
`BNS Proprietary
`11/17/2003
`
`=
`
`.
`
`Page 5
`
`Unified Patents Ex. 1012, pg. 7
`
`Unified Patents Ex. 1012, pg. 7
`
`
`
`BNS Intellectual Property Description
`
`Music, Movies, Books,
`Software, Games, Gaming, etc.
`
` Content Owners
`
`
`~ BNSInternet Control
`,
`“-'
`=> Points’
`-¢
`Subscriber Data Base”
`
`BNS Content Servers
`
`Secure Services
`
`
`
`
`
`
`
`
`Internet Based DRM
`
` Service -
`BlockedSites =
`First Portal
`©
` Providers
`
`| Advertising 4 s
`
`Virus Traffic Blocking!
`
`
`
`
`
`preempts piracy
`and controls Services
`
`Figure 1. Service Preference Architecture
`
`oo,
`;
`- B. The ICP Controls Communication Gateways
`‘The Communication Gateway (CG) may be either: 1) a Gateway that combines TV, Video,
`Internet.and Voice, 2) a dial-up Remote Access Server, 3) an ADSL Modem/Router, 4) a Satellite
`TV Gateway, 5) a Cable TV Modem,or 6) a convergedset top + Internet Gateway.
`
`.
`
`The ICP is the source of Internet Service Control and Conditional Denial of Users access to
`Service Provider selected URLs or IP addresses. The ICP controls the CG to determine what web
`‘site data is allowed. through to Subscribers browsers. The ICP also controls the CGs packet
`inspection processing to determine which data can be allowed to flow through the CG to and from
`the Subcriber, specifically when e-mail orfile transfers are initiated. The (CP also controls what:
`activities are engaged in by idle CGs when Consumers are inactive.
`Idle CGs may receive
`software downloads from the ICP, may be used to collect data and to initiate communications
`activities that are disruptive to Content Servers that offer unauthorized copyrighted materials for
`illegal download by Consumers.
`Multiple ICPs are deployed geographically in the Carrier's network to support the Gateway
`
`management capacity of the ICP and the number of Broadband Usersin its service area.
`
`C. The ICP Controls ISP, BNS & EDC Service Deliveries
`Nextis the interaction of the ICP with the BNS Content Server (BCS), Service Provider's Internet
`Portal or Carrier (ISP) and Enterprise Data Centers (EDC). The ICP controls Consumersability to
`access services that are offered by the ISP or EDC. The ICP alsocontrols the CGsto deliver: 1)
`advertisements, 2) the home page for ISP/BCS/EDC web servers or 3) software downloads to
`Consumer's PCsfortheir use of ISP/BNS/EDC content services.
`
`BNSProprietary
`11/17/2003
`
`,
`
`,
`
`,
`
`Page 6
`
`Unified Patents Ex. 1012, pg. 8
`
`Unified Patents Ex. 1012, pg. 8
`
`
`
`BNSIntellectual Property Description
`
`D. The ICP C_ntr Is are determined by Regular and Activ Human Intervention
`
`The ICP is programmed either by human input or by operator-controlled web crawler software.
`Updates are determined from BNS’s active intervention service whereby changes to the control
`entries are discovered and implemented. This is a service delivered to ISPs and EDCs whereby
`the operation of BNS Features described below are controlled in a manner analogous to the
`regular updating of Virus Definitions for computer virus and worm protection.
`
`E. ICPs Updated by Active Intervention & Multiple ICPs Deliver High Availability
`
`The web crawlers, humanintervention and ICP/CG software/processing data base updates are
`controlled by an Active Intervention system consists of a set of centrally maintained computer
`systems which control the operation of the ICPs. Figure 2 illustratesthis.
`
`BNS Update System
`Manages Operation of
`
`
`
`
`
` Primary ICP
`
`
`& Control
`ICP Updates
`ICP Updates
`& Control
`
`For CGs
`
`Figure 2. Active Intervention Updates and Backup ICPs.
`
`ll. BNS Internet Control Techniques
`Digital Rights Management
`
`A. |
`
`1, Conditional Denial
`
`The CGs, under ICP control, deliver a network based Digital Rights Management Service (DRM)
`which denies Users the capability to send or to receive data from or to URLs orIP addressesthat
`are knownto contain unlicensed copyrighted material. When this “Conditional Denial” occurs, the
`Gatewaysubstitutes the URL or IP Address ofa site that offers licensed copyrighted materials for
`legal, authorized sale to the User. This list of URLs or IP addresses that are known to contain’
`
`BNSProprietary
`11/17/2003
`
`Page 7
`
`Unified Patents Ex. 1012, pg. 9
`
`Unified Patents Ex. 1012, pg. 9
`
`
`
`BNSIntellectual Property Description
`
`unlicensed copyrighted material will be regularly updated, similar to how virus definitions are
`regularly updated today.
`
`ICPs delivering DRM service use the Section F. Browser, Program Communications & URL or IP
`Address Access Blocking method to direct Users to authorized content sites. DRM uses both
`Active Human and Web Crawlerinput to find unauthorized content offered over the Internet and -
`to update the URLsorIP addresses that are knownto contain unlicensed copyrighted material.
`
`When programs other than browsers attempt to access the blocked sites, the requested URL or
`IP address may be substituted by a legal content provider's URL/IP Address or none atall.
`
`Uponregistration as an “Active” Gateway, the ICP updates the Communication Gateway’slist of
`DRM URLorIP Address substitutions.
`
`
`
` Browsé/ or Program Requests
` GW Substitutes
`
`
`GWin Active
`Mode ~*~
`
`connection to ORM Blocked URL
`
`
`_ or IP address?"
`Event is Logged
`
`
`requested URLor
`_.IRaddress —
`
`Figure 3. DRM — Conditional Denial
`3. Packet Inspection
`
`~
`
`Additional packet inspection processing is performed by the Gateways to determinethe file type
`of all files being transferred through the Gateway based uponthe files properties, such asfile
`extension, file format, headeror trailer contents and URL/IP addresses that are known sources of
`unauthorized Copyrighted material. The Gateway is programmed by the ICP withcertain Data
`Patterns. These data patterns may be any length and may contain exact matches plus regular
`expressions. When certain data patterns are recognized, the data transfer is stopped |or another
`action is taken, based upon rules delivered by the ICP to the Gateway.
`4. E-Mail Server & Client Spoofing
`CGspresent themselves to Users as the User's E-mail Server and present themselves to E-Mail
`servers as Users.
`In so doing, the CG acts as a 2- way encryption/decryption point to enable
`inspection of what would otherwise be encrypted data. When E-mail is sent through the Gateway,
`the Gateway inspectsall attachedfiles using Packet Inspection. Based upon rules delivered by
`the ICP to the Gateway, the Gateway can then deny access to incoming files; stop the transfer of
`outgoingfifiles or take other action,,.
`
`,
`
`'
`
`BNSProprietary
`11/17/2003
`
`.
`
`Page 8
`
`Unified Patents Ex. 1012, pg. 10
`
`Unified Patents Ex. 1012, pg. 10
`
`
`
`BNS Intellectual Property Description
`
`GW Re-Encrypts &
`E-mail passes
`
`
`
`GW De-Crpts &
`E-Mail Program send:
`>
`-
`Packet Inspection
`or receives
`aive podeas
`
`aret|tieata shmen finds Copyrighted fil
`
`
`
` Userreceives browser
`
`
`screen from
`GW stops
`Legal Source URL
`
`
`File
`or IP address;
`
`
`transfer
`Program is connected to
`
`
`Legal. Source or given
`no access atall
`
`
`
`
`
`Event is Logged
`
`
`
`
`Figure 4. DRM — Blocking E-Mail of Copyrighted Files
`
`5. Denial of Service Attacks on Unlicensed “Pirate” Copyri ht Material Sites
`
`Powered up and Inactive Gateways under ICP contro! can be directed to initiate repeated
`requests for service or for other transactions over the Internet Uplink to URLs of IP Addressesin
`the Conditional Denial of Service list which have been identified for interdiction. ICP control can
`activate the attacks on any of several bases: 1) scheduled with duration, 2) real time activation by
`the ICP or 3) event driven. tn this way, access to Users not served by BNS Gateways under ICP
`control are denied access to the copyrighted materials, greatly expanding the impact of the
`initially deployed Gateways to prevent access to Pirated material.
`6. Copyright Registry
`
`Users who have purchased copyrighted material are registered by the seller or can self register
`as owners of a license to use the material. This registry is centrally kept and the ICP has access
`to it. Furthermore, non-copyrighted material can be registered to identify files with nolimit on the.
`” numberof copies made or that may be.e-mailed or downloaded without intervention.
`
`_ 7. Copyrighted File Deletion
`A Powered up and Inactive Gateway, under ICP control, has the capability to inspect any User’s
`computerfile system available to it on the LAN to which they are attached. Notification to the ICP
`is made of file names that match Packet
`Inspection patterns to identify the presence of
`copyrighted material to which the User may not be entitled. Human intervention or the Copyright
`Registry may be used to verify User’s entitlement to copyrighted materials found on the file
`system. The Gateway deletes files to which the Useris not entitled.
`
`8. Event Notification -
`The Gateways deliver an eventnotification to the ICP whenever a Packed Inspection matchor an roo
`attempt to access a conditionally denied URLis made.
`,
`
`B.
`
`ServiceInitialization
`
`' CGsare required to be registered with the Internet Control Point when they are powered up for
`the first time They will remain inactive until they have received a registration confirmation from the
`BNS Registration URL. The registration process gathers information for a Warranty registration
`from the Consumer and for the CG’s hardware address and otheridentifying data. The CG is
`downloaded with the latest BNS Operating Software (if necessary) and is loaded with its initial
`
`BNS Proprietary
`11/17/2003
`
`Page 9
`
`Unified Patents Ex. 1012, pg. 11
`
`Unified Patents Ex. 1012, pg. 11
`
`
`
`BNSIntellectual Property Description
`
`operating parameters and processing data base. Subsequent re-registrations may be initiated
`under Consumercontrol for address or ISP changes. Operating parameters include the address
`of its ICP and other variables as described for the features below.
`
`GW
`Power Up
`
`GW IDto ICP
`
`ICP Collect
`Registration
`
`
`
`ICP Down-
`
`
`load S/W
`
`update & op
`parameters
`
`GW
`Operational
`
`
`
`
`
`Figure 5. Service Initialization.
`Cc.
`Active and Inactive Gateway Processing Control
`
`Upon power downorinactivity timeout of the CG, the CG registersitself as “Idle” to the ICP. The
`timeout will be preset and may be changed byinputto the ICP for distribution to all Gatewaysit
`controls.
`
`the Communication
`Upon subsequent re-activation, either upon power up or user activity,
`Gatewayidentifies itself as “Active” to the ICP that controls-it. Failureto ID-results in. re-try until a
`timeout.or maximum number of attempts occurs. This causes a diagnostic program to execute
`that advises the Consumerwhat to do next based on the deduced source ofthe failure.
`
`Processing by Inactive Gateways
`Processing by and Active CG controls Service Delivery.
`' controls eitherGateway maintenance oractivity that is delegated to inactive Gateways by design.
`
`May need to be re-checkedfrom timeto time or the registration is encrypted....
`
`“No.GW.traffic
`
`
`beforx2"
`
`
`
` «GWtraffic
`
`
`Resumption? |
`po ey
`
`Idle Processesare:
`- Denial of Service Attack
`OnPirate P2P Sites, or
`-Copyrighted File Deletion
`on Computers behind the
`_ Gateway
`
`Figure 6. Active and Inactive CG processing
`
`D.
`
`First Portal Visibility (“First Portal”)
`
`This feature is used to present a specific URL with ISP/EDC specified content to Consumers or
`employees as the “First Portal” page upon browser launch regardless of what they select as
`“Home”in the Browser.
`
`This technique is delivered by the CG, under ICP direction, to present any one of a list of URLs or
`IP addresses to the Consumer upon Browserlaunch or resumptionof activity (after.a timeout has
`
`BNS Proprietary
`11/17/2003
`
`,
`
`,
`
`. Page 10°
`
`Unified Pat