throbber
PTO/SB/16 (08-03)
`Approvedfor use through 07/31/2006. OMB 0651-0032
`U.S. Patent and Trademark Office; U.S. DEPARTMENT OF COMMERCE
`Underthe Paperwork Reduction Act of 1995, no persons are required to respond to a collection of information unless it displays a valid OMB control number.
`PROVISIONAL APPLICATION FOR PATENT COVER SHEET
`This is a requestforfiling a PROVISIONAL APPLICATION FOR PATENTunder 37 CFR 1.53(c).
`
`Express Mail Labet No. EV 167 295 313 US
`
`Given Name(first and middle[if any])
`
`Family Nameor Surname
`
`Residence
`and either State or Foreign Count
`
`City
`
`Additional inventors are beingnamedonthe _———S—SCSSBtely NUMbErOd Sheets attached hereto
`TITLE OF THE INVENTION (500 characters max)
`SERVICE PREFERENCE ARCHITECTURE FOR DATA TRAFFIC AND PROVISIONING CONTROL
`Directall correspondenceto:
`CORRESPONDENCE ADDRESS
`
`0)
`7
`
`Customer Number:
`
`OR
`
`.
`
`23488
`
`:
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Gerald B. Rosenberg, Esq.
`:
`.
`.
`
`285 Hamilton Avenue
`
`
`
`ea94301
`
`
`ENCLOSED APPLICATION PARTS(checkall that apphy
`
`
`
`
`
`Cl
`CD(s), Number
`14 —
`Specification Number of Pages
`.
`OC
`Other(specify)
`C] ‘Drawing(s) Number of Sheets
`
`a Application Date Sheet. See 37 CFR 1.76
`
`
`METHOD OF PAYMENTOFFILING FEES FOR THIS PROVISIONAL APPLICATION FOR PATENT
`
`
`
`Applicant claims small entity status. See 37 CFR 1.27.
`:
`FILING FEE
`.
`.
`Amount ($)
`
`A check or moneyorderis enclosed to cover thefiling fees.
`
`
`
`
`|v|The Director is herby authorized to chargefiling 80.00
`
`fees or crédit any overpayment to Deposit Account Number: 50-0890
`:
`.
` C] Paymentbycredit card. Form PTO-2038is attached.
` The invention was madeby an agency of the United States Governmentor undera contract with an agencyof the
`
`
`
`
`[v] No.
`CJ Yes, the nameof the U.S. Govemment agency and the Government contract numberare:
`
`
` :
`.
`[Page 1 of 2]
`,
`
`Respectfully submitted,
`.
`\
`Date.
`
`SIGNATURE REGISTRATION NO._30,320.
`
`.
`:
`(if appropriate)
`.
`TYPEDor PRINTED NAMEGerald B. Rosenberg
`_ Docket Number: BRDB3000
`TELEPHONE 650.325.2100
`
`.
`
`|
`
`United States Government.
`
`
`
`USE ONLY FORFILING A PROVISIONAL APPLICATION FOR PATENT
`This collection of information is required by 37 CFR 1.51. The information is required to obtain or retain a benefit by the public which is to file (and by the USPTO
`to process) an application. Confidentiality is govermed by 35 U.S.C. 122 and 37 CFR 1.14. This collection is. estimated to take 8 hours to complete,including
`gathering, preparing, and submitting the completed application form to the USPTO. Time will vary depending uponthe individual case. Any comments on the
`amountof time you require to complete this form and/or suggestions for reducing this burden, should be sent to the Chief Information Officer, U.S. Patent and
`Trademark Office, U.S. Department of Commerce, P.O. Box 1450, Alexandria, VA 22313-1450. DO NOT SEND FEES OR COMPLETED FORMS TO THIS
`ADDRESS. SEND TO: Mail Stop Provisional Application, Commissionerfor Patents, P.O. Box 1450, Alexandria, VA 22313-1450.
`
`ifyou needassistance in completing the form, call 1-800-PTO-9199 and selectoption 2.
`
`Unified Patents Ex. 1012, pg. 1
`
`Unified Patents Ex. 1012, pg. 1
`
`

`

`PTO/SB/17 (10-03)
`Approved for use through 07/31/2006. OMB 0651-0032
`U.S. Patent and Trademark Office; U.S. DEPARTMENT OF COMMERCE
`Under the Paperwork Reduction Act of 1995, no persons are required to respondto a collection of information unless it displays
`a valid OMB control number.
`
`
`
`
`
`
`
`
`First Named Inventor
`
`|Burke, Robert M.
`
`.
`
`-
`
`
`FEE TRANSMITTAL
`EffectiveonhorFY2004revision.
`2004
`
`
`
`
`
`
`
`
`
`
`
`
`coatWW
`
`A——ET—IE'E—eOR
`:
`|
`TOTAL AMOUNT OF PAYMENT.
`
`($) 80.00
`
`___-_|
`
`
`Attomey Docket No._|BRDB3000:
`
`
`
`
`
`[__]None
`
`Check [“] Credit card CJ Money [_] other
`Deposit Account:
`
`
`
`: Deposit
`50-0890
`Code ($)
`|Code (5)
`Fee Description
`
`
`
`
`
`
`
`Number
`1051. 130
`[2051
`65 Surcharge- late filing fee or oath
`
`
`
`
`Deposit
`:
`1052
`50
`|2052
`25 Surcharge- late provisionalfiling fee or
`
`;
`Account NewTechLaw
`.
`east
`
`
`
`1053
`130
`
`1053
`130 Non-English specification
`
`
`The Directoris authorized to: (check ail that apply)
`.
`wg
`
`1812 2,520
`1812 2,520 Forfiling a request for ex parte reexamination
`
`
`
`
`Charge fee(s) indicated below
`iv] Credit any overpayments
`
`
` 920°1804
`
`
`1804
`920* Requesting publication of SIR prior to
`
`
`[¥] charge any additional fee(s) or any underpaymentof fee(s)
`_ Examiner action
`
`
`[_]charge fee(s) indicated below, exceptfor thefiling fee |
`
`1805 4,840" Requesting publication of SIR after
`Examineraction
`
`to the above-identified deposit account.
`
`
`
`
`2251
`55 Extension for reply within first month
`
`
`FEE CALCULATION
`2252
`210 Extensionfor reply within second month
`
`1. BASIC FILING FEE
`2253
`475 Extensionfor reply within third month
`
`
`arge Entity Smali Entity
`
`F
`F
`
`2264
`740 Extensionfor reply within fourth month
`
`
`
`
`
`2255 1,005 Extension for reply within fifth month ,
`
`
`
`
`
`
`2401
`165 Notice of Appeal
`
`
`
`
`2402
`165 Filing a brief in support of an appeal.
`
`2403
`145 Requestfor oral hearing
`,
`
`
`
` 1451
`1,510 Petition to institute a public use proceeding
`
`
`
`2452
`55 Petitionto revive - unavoidable
`
`
`
`
`
`2453
`665 Petition to revive - unintentional
`
`2. EXTRA CLAIM FEES FOR UTILITY AND REISSUE]
`
`
`Fee from
`2501
`665 Utility issue fee (or reissue)
`
`Extra Clainis
`Fee Paid
`2502
`240 Design issue fee
`Total Claims
`[7] .20" =L.__]xa {__]
`
`
`
`2503
`320 Plant issue fee
`
`
`
`
`Independent FF] “ge ES]x
`
`
`1460
`130 Petitionsto the Commissioner
`
`
`Multiple Dependent
`‘
`Cc) ~—__]
`1807 50 Processing fee under 37 CFR 1.17(q)
`
`Large Enti
`Ss
`
`
`
`4806
`180 SubmissionofInformation Disclosure Stmt
`Fee Fee
`Fee Fee
`.
`:
`
`
`8021
`49 Recording each patent assignment per
`Code ($)
`Code ($)
`
`
`
`1202
`18
`2202
`9 Claims in excess of 20
`properly (times number of properties)
`
`
`
`
`2809
`385 Filing a submissionafterfinal rejection
`oo
`1201
`86
`2201
`43
`Independentclaimsin excess of 3
`(37 CFR 1.129(a))
`,
`
`
`2810
`1203 290
`2203 145 Multiple dependentclaim,if not paid
`385 For each additional invention to be
`
`
`
`
`
`.
`4204
`86
`2204
`43
` ** Reissue independentclaims
`examined (37 CFR 1.129(b))
`
`
`
`2801
`overoriginal patent
`385 Request for Continued Examination (RCE)
`
`
`
`
`1802
`900 Request for expedited examination
`** Reissue claimsin excess of 20
`
`
`of a design application
`and overoriginal patent
`
`
`
`Other fee (specify)
`:
`
`
`
`
`
`
`SUBTOTAL (2)
`_
`“Reduced by Basic Filing
`Fee
`Paid
`**or numberpreviously paid, if greater; For Reissues, see above
`u

`ming
`Fee
`Fal
`SUBTOTAL (3) CH
`
`
`
`a
`SUBMITTED BY
`(Complete(if applicable))
`
`
`
`
`
`
`|Name(Priwvtpe)|Gerald B. Rosenberg a|ResistrationNo.F30.320 Telephone 650.325.2100
`
`
`
`[signatureeeIVISEppocle poate|is/ecCn3
`
`
`
`
`
`
`
`
`WARNING:Informati nn this f rm may bec&mg\public. Credit card information sh _uld not
`be included onthis form. Provide credit card information and auth rization on PTO-2038.
`This collection of information is required by 37 CFR 1.17 and 1.27. The information is required to obtain or retain a benefit by the public whichis to file (and by the
`USPTOto process) an application. Confidentiality is governed by 35 U.S.C. 122 and 37 CFR 1.14. This collection is estimated to take 12 minutes to complete,
`including gathering, preparing, and submitting the completed application form to the USPTO. Timewill vary depending upon theindividual case. Any comments on
`the amountof time you require to complete this form and/or suggestions for reducing this burden, should be sent to the Chief Information Officer, U.S. Patent and
`Trademark Office, U.S. Department of Commerce, P.O. Box 1450, Alexandria, VA 22313-1450. DO NOT SEND FEES OR COMPLETED FORMS TOTHIS ADDRESS.
`SEND TO: Commissionerfor Patents, P.O. Box 1450, Alexandria, VA 22313-1450.
`‘
`ifyou need assistance in completing the form, call 1-800-PTO-9199 and select option 2.
`
`;
`
`-
`
`Fee Description
`
`Fee Paid
`
`* Utility filing fee
`Designfiling tee
`Plantfiling fee
`Reissuefiling fee
`Provisionalfiling fee
`SUBTOTAL(1)
`
`0.00
`
`Fee Description
`
`1205
`
`18
`
`2205
`
`9
`
`Unified Patents Ex. 1012, pg. 2
`
`Unified Patents Ex. 1012, pg. 2
`
`

`

`7
`
`BNS Intellectual Property Description
`
`- BROADBAND NETWORK SYSTEMS,|INC.
`‘Intellectual Property
`:
`
`Service Preference Architecture
`|
`(SPA)
`Description & Technology
`
`November17, 2003 |
`
`BNS Proprietary
`11/17/2003.
`
`.
`
`.
`
`:
`
`Page 1
`
`Unified Patents Ex. 1012, pg. 3
`
`Unified Patents Ex. 1012, pg. 3
`
`

`

`BNSIntellectual Property Description ©
`
`I.
`
`ll.
`
`/
`
`Ul.
`A.
`
`.
`
`Service Preference Architecture...............ccccccccccccsccsscesecseseereeceesesevsececednesuesaesaseseesenaceraes 4
`A. High Level Description oo... eccceeccecceceecescescesencapeseeseeaeccesssersescsacsaseevsesessesesacsaveaceasenecsaaes 4
`B. Service Control and Copyright Protection ..........cccccccscccsscessssesceesssessseesscsessesceeeaeceseveceacnrenetes 4
`C. Flexibility to add new Service Control and CopyrightTechniques...0..0..0.0.0.cceccseceeeseceerees 5
`SPA- Network & Product Architecture coca eneeveseesaeseceevaceecoseacescecacesnacedsaseqceecesseenssacneseesiseesieecses 5
`A. General Description oo... eee ccc ceeeseeseeceeceesesessesecsesaesassecesnesseracsesssssesssnsssvaesaeseeneasenenenaes 5
`Figure 1. Service Preference Architecture... ccccccssssssesessssetssesesecsessescsccnsrevacsessteveceneverees 6
`B. The ICP Controls Communication GatewayS......0..0..0..00cceecceccesescececeececsaceceesensessucaecaseacerees 6
`C. The ICP Controls ISP, BNS & EDC Service Deliveries ..00.....0...cccccccccsssscecsesceseesseeteetsuteeedsaanes 6
`D. The ICP Controls are determined by Regular and Active Human Intervention................ Leeeees 7 -
`E: ICPs UpdatedbyActive Intervention & Multiple ICPs Deliver High Availability....................... 7
`Figure 2. Active Intervention Updates and Backup ICPS.....0.......ceccccscessescseessesceseusnsvesecsnsvaves 7
`BNSInternet Control Techniques...............cccccceceecccssecssceuseseccaevacessaceasersavausauesnsseveeventanee E
`Digital Rights Management............ceccececeecescesesessussecoesesessesecseusassassucersuseseseateceestssetsenaeens 7
`1. Conditional Demial.......... ce ccscessesecsesesecsescseseeeseesnecsucesossessessccssensevsuescetausessessceasecsessevseeeeees 7
`Figure 3. DRM — Conditional Denial.beesaeesbaeeeesseneeneecaeeeccseeeusecscessaechaceseeneesaeessecssenseenserneesacsaess 8
`
`3. Packet Inspection........... wesevesecanesshdecececeneeeeeeaeeaeesesaeseseecetcrseveeeeses
`ceceeevteeeaeeeeenneeaees 8
`’ 4, E-Mail Server & Client Spoofing ............0.0.cceccecsssessecccseccesecsessesasaneceslessststssassesesseseusessesseseses 8
`Figure 4. DRM — Blocking E-Mail of Copyrighted Files ..0..0..0.0ccc ce cecccesccsecceesecsscsserensereeees 9
`5. Denial of Service.Attacks on Unlicensed “Pirate” Copyright Material SiteS...eens 9
`6. Copyright Registry oe ee eeecceeessececeeseeseseescneescsscsecsevevbansersesseaussesssevaveacanansesenensansns 9
`7. Copyrighted File Deletion .........0.0.0.0.cccccccsceesesecseseceesevecstecsesceesescssavasaacacstssssesarsessessasesseeceeeQ
`8. Event Notification0... cccesssesseseeseeseseseesnesseessesseseansnsssssesssscssssenssassneeccareaserssessserseieseeseaee 9
`Service Initialization 0.0... ccccceceessseesessescesesscseseesecssceesssesaeceevaesaseeneseedSevneeeneeseesaeeerertesnes 9
`
`Figure 5. Service Initialization............0....cccccccceccbecscscccececevescevesceveesevsesevsneeneneeey
`Active and Inactive Gateway Processing Control weneeesceevesnceecvenseeedseeeeseuseeecsareetessenedsaraneces 10
`Figure 6. Active and Inactive CG processing ........ccccccccccsscccscsecsscsscersecsaceasseceseaesersaseesesseseees 10
`First Portal Visibility (“First Portal”) .......0...cccccccsssesscsecsecsceccoeseceusevaccevsavacsevsucenseees Leseeeeees 10
`Figure 7. First Portal Visibility. .......0..c.cccccccccscscccceccecescessccscsssnsseseessracsauadecaessesearaesaeyassaternseenes 11
`AdVertiSing ......... ccc cececeeeeseeeeetete sees vesceceeeeseeseeeesneeseaeeesaeeseaessectenssseeetenssesnescensanteeees 1,
`‘Figure 8. Advertising IMSePtiOn......cssscssecescessvssessssesssssusssssvessssssssesssrsssusseussssesessasveseessssesesssseess AV
`es
`F. Browser, Program Communications & URL or IP Address Access Blocking
`
`Figure 9. URLor IP address Blocking ...0..........ccccccccsescsssssessssecscevscecavsevesendessasacsvesessanavananes 12
`G. Service Applet Downloads... cececccssssessssesesesessoessvessuvacsassusescesessscasserasatauseesvacaesacacseseaee 12
`Figure 10. Service Applet Downloads............Sseesaaeesees escaneneeceseeeesqusseesececeeeeiaeeecesaatacsensecostersavess 12
`
`B.
`.C.
`
`D
`
`E
`
`H. Virus Initiated Denial of Service Traffic Blocking caneaeenecenseeseeeecuceseaeseenetessesesaeentaeeleteeseeennss 13
`Figure 11. Virus Initiated Traffic BlOCKING ............ cc ccceecccccccsssesscssesessereecelessvascssestseeneerenspee 13
`L
`Law Enforcement Monitoring..........0...000.0.. ceeLeceeecessusenseseeseecncranaeteeserassatesseseuseneesans 13
`Figure 12. Law Enforcement MOnitoring...........cccccccssecssssssscssssssssessseresesseccssterusseesaeetsaereenes 13
`J. VOIP BIOCKING ..... cei ceccsceseetectssesseeetseeseeaesarseseceeseees veseaceseateceeseseetetatntessesseseecetetecsettescrseeee 14
`Figure 13. VoIP Blocking, sesaeeeseaesacsenesesaessseeseececusssasususcecsevessesassvacaeveed“eeceseeececesesesees“veseeeseaeeetens 14
`
`BNS Proprietary
`11/17/2003
`

`
`. Page 2
`
`Unified Patents Ex. 1012, pg. 4
`
`Unified Patents Ex. 1012, pg. 4
`
`

`

`BNSintellectual Property Description
`
`ABOUT THIS DOCUMENT
`This document describes BNS Product Features,Intellectual Property and ProductArchitecture.
`
`CONFIDENTIAL INFORMATION
`This Intellectual Property Description documentis the property of Broadband Network Systems.
`It is proprietary information and is strictly confidential.
`It contains information intended only for the
`person(s) to whom it
`is transmitted. With receipt of this Intellectual Property Description
`document , Recipient acknowledges and agreesthat:
`1) in the event that the recipient does not
`wish to pursue this matter, this document will be returned, at the addresslisted below as soon as
`possible; the recipient will not copy, fax, email, reproduce, divulge, or distribute this confidential
`Intellectual Property Description document
`,
`in whole or in part, without the express written
`consent of Broadband Network Systems; and_Ill) all of the information contained in this
`document will be treated as confidential material with no less care than that afforded to your
`companyor personal confidential material,
`
`TRADEMARKNOTICE
`BROADBAND NETWORK SYSTEMS, BROADBAND NETWORK SERVICESand the Broadband
`Network Logosare Trademarks of Broadband Network Systems:
`
`CONTACT INFORMATION
`
`’ Robert Burke
`C.E.0.
`21103 Old Well Road
`Los Gatos, CA 95033
`USA.
`--
`* (408) 353-3573
`
`URL: www.bbns.us
`
`BNS Proprietary
`11/17/2003
`
`,
`
`Page 3
`
`.
`
`Unified Patents Ex. 1012, pg. 5
`
`Unified Patents Ex. 1012, pg. 5
`
`

`

`BNS Intellectual Property Description
`
`l.
`
`Service Preference Architecture
`
`A. High Level Description
`
`Broadband Network Systems (BNS) plans to develop and to sell Broadband (high-speed)
`Residential and Business Communication Gateways (CGs) and Internet Control Points (ICPs) to
`Telecommunication Carriers such as the Regional Bell Operating Companies (RBOCs), other
`Telephone companies, ISPs and Cable TV companies. ICPs are network based routers or
`computers that control the operation of CGs. CGs,
`installed at a Subscriber's site and ICPs,
`installed in.the Carriers’ network are designed to enable Carriers to provide the so-called ‘Triple
`Play’ services (Voice+ Broadband Internet + Video) to their Subscribers using the Carrier's
`existing distribution network.
`In addition, new revenue generating Content Services (music,-
`video, games, and software services) can be offered by BNS.
`
`With BNS’s unique Service Preference Architecture (SPA), several new data traffic control
`techniques are available to Carriers, ISPs, Enterprises and Cable TV companiesfor their Internet
`Access networks.
`
`they provide an important new. feature- Digital Rights
`BNS products are unique in that
`Management,
`i.e., the assurance to both the Service Provider and the Content Provider that
`‘Intellectual Property (music, video, games, software, etc.) will be secure from illegal downloading
`and transmission over the Internet, a major source of lost revenues and the basis for hundreds of
`lawsuits. Service Providers will want this feature to halt the legal onslaught launched by music
`companies and because they want to offer Video/OSL and the Motion Picture Industry will not
`license the content for distribution over the unsecured Internet, having seen the negative impact
`piracy hasalready had on the Music Recording Industry. Content Providers will demand this
`feature to stop the illegal downloading and transmission of Intellectual Property over the Internet
`which has cost the music and movie industries billions of dollars annually.
`
`B. Service Control and Copyright Protection
`BNS'Service Preference Architecture (SPA) is a collection ofBNS software routines executed by -
`_ BNS CGs.in conjunction with SPA-based Internet Servers under the control of BNS Internet
`Control Points.
`
`The software routines perform eight functions:
`
`1. Digital from being_illegallyrights management- SPA protects. Copyrighted material
`
`downloaded anddistributed over the Internet.
`‘2. First portal visibility- SPA enables Consumers to receive the Carrier/BNS home page or
`video menu system every time their Computer or TV is turned on or wheneverthey re-initiate
`activity after an extendedidle period.
`3. Advertising- SPA allows desired advertisements to be delivered by the Carrier and/or by BNS
`to the Customers.
`4. Web site blocking- SPA enables Web Sites to be blocked by the Carrier, ISP or their
`corporate customers as required by Law or by the Subscriber’s own Policy.
`5. Services download- SPA allows Consumer and Business customers to download applets that
`facilitate their use of the BNS/Carrier Services portfolio.
`6. Virus — Initiated traffic BI cking— SPA prevents infected user machines from. repeatedly
`sending traffic at high data rates to sites which are the subject of Denial of Service attacks.
`7. Law enf rcement monitoring — SPA allows data passing through a CG to be copied to law
`enforcementor national security agencies.
`
`BNSProprietary
`11/17/2003
`
`. Page4
`.
`
`Unified Patents Ex. 1012, pg. 6
`
`Unified Patents Ex. 1012, pg. 6
`
`

`

`BNS Intellectual Property Description
`
`verinternet Protoc | (V IP) traffic blocking — SPA allows Carriers to restrict the use
`8.V ic
`of the Internet Access Service they offer Subscribers to “data transport only,” blocking VoIP and
`thereby protecting their voice revenue stream from encroachment and preserving their ability to
`migrate their voice customers from the Public Switched Telephone Network (PSTN) when they
`upgradetheir Internet Access Networksto offer Real Tome Quality of Service.
`
`In the sections that follow, we describe how the software routines work.
`
`C. Flexibility to add new Service Control and Copyright Techniques
`
`BNShascreated SPA to be highly flexible, adaptable and to deliver a high degree ofavailability
`and security. The BNS SPA Architecture allows new Internet Control techniques to be added as
`BNS,Content Providers or Service providers need them. More techniques will be added by BNS
`as it creates them to deliver value to BNS,
`its customers and partners. This flexibility-to add
`techniquesis a key feature of SPA and BNSIntellectual Property.
`
`ll.
`
`SPA 2 Network & Product Architecture
`
`A. General Description
`
`Telecommunication Carriers, Cable TV companies and Internet’ Service Providers can be
`equipped to deliver the BNS suite of features only by using a network service based system. This
`system is based on an architecture that employs an Internet Control Point (ICP) to control the
`access to websites and to deliver data to Subscribers. The ICP controls the processing of data
`sent between Customers (client PCs or LAN servers) using the BNS Communication Gateway
`(CG) and the ISPs, Enterprise Data Centers or Content Servers with which they are exchanging’
`information. The architecture is completed with a hardware/software implementation in the
`Communication Gateways that Carriers/ISPs use at their customers premises to deliver the
`service. The Communication Gateways cannot be tampered with by Users. Users are given no
`access to unload or modify the CG operating software by design and all ICP-CG communications
`takes place within the Carrier side of the network (DSL uplink), ICP-CG communications are
`secured with encryption and hashing. Furthermore, the ICP will not enable any service to an un-
`registered CG and an un-registered CG will not operate in an experimental environmentatall.
`
`This ensures secure control of the data flow between-both the ICP and the CG.This secure flow
`of data then enables Carriers, ISPs, Enterprise data Centers or Cable TV Companies to control
`the services their Users have accessto. Figure 1 illustrates the overall Network Architecture.
`
`BNS Proprietary
`11/17/2003
`
`=
`
`.
`
`Page 5
`
`Unified Patents Ex. 1012, pg. 7
`
`Unified Patents Ex. 1012, pg. 7
`
`

`

`BNS Intellectual Property Description
`
`Music, Movies, Books,
`Software, Games, Gaming, etc.
`
` Content Owners
`
`
`~ BNSInternet Control
`,
`“-'
`=> Points’
`-¢
`Subscriber Data Base”
`
`BNS Content Servers
`
`Secure Services
`
`
`
`
`
`
`
`
`Internet Based DRM
`
` Service -
`BlockedSites =
`First Portal

` Providers
`
`| Advertising 4 s
`
`Virus Traffic Blocking!
`
`
`
`
`
`preempts piracy
`and controls Services
`
`Figure 1. Service Preference Architecture
`
`oo,
`;
`- B. The ICP Controls Communication Gateways
`‘The Communication Gateway (CG) may be either: 1) a Gateway that combines TV, Video,
`Internet.and Voice, 2) a dial-up Remote Access Server, 3) an ADSL Modem/Router, 4) a Satellite
`TV Gateway, 5) a Cable TV Modem,or 6) a convergedset top + Internet Gateway.
`
`.
`
`The ICP is the source of Internet Service Control and Conditional Denial of Users access to
`Service Provider selected URLs or IP addresses. The ICP controls the CG to determine what web
`‘site data is allowed. through to Subscribers browsers. The ICP also controls the CGs packet
`inspection processing to determine which data can be allowed to flow through the CG to and from
`the Subcriber, specifically when e-mail orfile transfers are initiated. The (CP also controls what:
`activities are engaged in by idle CGs when Consumers are inactive.
`Idle CGs may receive
`software downloads from the ICP, may be used to collect data and to initiate communications
`activities that are disruptive to Content Servers that offer unauthorized copyrighted materials for
`illegal download by Consumers.
`Multiple ICPs are deployed geographically in the Carrier's network to support the Gateway
`
`management capacity of the ICP and the number of Broadband Usersin its service area.
`
`C. The ICP Controls ISP, BNS & EDC Service Deliveries
`Nextis the interaction of the ICP with the BNS Content Server (BCS), Service Provider's Internet
`Portal or Carrier (ISP) and Enterprise Data Centers (EDC). The ICP controls Consumersability to
`access services that are offered by the ISP or EDC. The ICP alsocontrols the CGsto deliver: 1)
`advertisements, 2) the home page for ISP/BCS/EDC web servers or 3) software downloads to
`Consumer's PCsfortheir use of ISP/BNS/EDC content services.
`
`BNSProprietary
`11/17/2003
`
`,
`
`,
`
`,
`
`Page 6
`
`Unified Patents Ex. 1012, pg. 8
`
`Unified Patents Ex. 1012, pg. 8
`
`

`

`BNSIntellectual Property Description
`
`D. The ICP C_ntr Is are determined by Regular and Activ Human Intervention
`
`The ICP is programmed either by human input or by operator-controlled web crawler software.
`Updates are determined from BNS’s active intervention service whereby changes to the control
`entries are discovered and implemented. This is a service delivered to ISPs and EDCs whereby
`the operation of BNS Features described below are controlled in a manner analogous to the
`regular updating of Virus Definitions for computer virus and worm protection.
`
`E. ICPs Updated by Active Intervention & Multiple ICPs Deliver High Availability
`
`The web crawlers, humanintervention and ICP/CG software/processing data base updates are
`controlled by an Active Intervention system consists of a set of centrally maintained computer
`systems which control the operation of the ICPs. Figure 2 illustratesthis.
`
`BNS Update System
`Manages Operation of
`
`
`
`
`
` Primary ICP
`
`
`& Control
`ICP Updates
`ICP Updates
`& Control
`
`For CGs
`
`Figure 2. Active Intervention Updates and Backup ICPs.
`
`ll. BNS Internet Control Techniques
`Digital Rights Management
`
`A. |
`
`1, Conditional Denial
`
`The CGs, under ICP control, deliver a network based Digital Rights Management Service (DRM)
`which denies Users the capability to send or to receive data from or to URLs orIP addressesthat
`are knownto contain unlicensed copyrighted material. When this “Conditional Denial” occurs, the
`Gatewaysubstitutes the URL or IP Address ofa site that offers licensed copyrighted materials for
`legal, authorized sale to the User. This list of URLs or IP addresses that are known to contain’
`
`BNSProprietary
`11/17/2003
`
`Page 7
`
`Unified Patents Ex. 1012, pg. 9
`
`Unified Patents Ex. 1012, pg. 9
`
`

`

`BNSIntellectual Property Description
`
`unlicensed copyrighted material will be regularly updated, similar to how virus definitions are
`regularly updated today.
`
`ICPs delivering DRM service use the Section F. Browser, Program Communications & URL or IP
`Address Access Blocking method to direct Users to authorized content sites. DRM uses both
`Active Human and Web Crawlerinput to find unauthorized content offered over the Internet and -
`to update the URLsorIP addresses that are knownto contain unlicensed copyrighted material.
`
`When programs other than browsers attempt to access the blocked sites, the requested URL or
`IP address may be substituted by a legal content provider's URL/IP Address or none atall.
`
`Uponregistration as an “Active” Gateway, the ICP updates the Communication Gateway’slist of
`DRM URLorIP Address substitutions.
`
`
`
` Browsé/ or Program Requests
` GW Substitutes
`
`
`GWin Active
`Mode ~*~
`
`connection to ORM Blocked URL
`
`
`_ or IP address?"
`Event is Logged
`
`
`requested URLor
`_.IRaddress —
`
`Figure 3. DRM — Conditional Denial
`3. Packet Inspection
`
`~
`
`Additional packet inspection processing is performed by the Gateways to determinethe file type
`of all files being transferred through the Gateway based uponthe files properties, such asfile
`extension, file format, headeror trailer contents and URL/IP addresses that are known sources of
`unauthorized Copyrighted material. The Gateway is programmed by the ICP withcertain Data
`Patterns. These data patterns may be any length and may contain exact matches plus regular
`expressions. When certain data patterns are recognized, the data transfer is stopped |or another
`action is taken, based upon rules delivered by the ICP to the Gateway.
`4. E-Mail Server & Client Spoofing
`CGspresent themselves to Users as the User's E-mail Server and present themselves to E-Mail
`servers as Users.
`In so doing, the CG acts as a 2- way encryption/decryption point to enable
`inspection of what would otherwise be encrypted data. When E-mail is sent through the Gateway,
`the Gateway inspectsall attachedfiles using Packet Inspection. Based upon rules delivered by
`the ICP to the Gateway, the Gateway can then deny access to incoming files; stop the transfer of
`outgoingfifiles or take other action,,.
`
`,
`
`'
`
`BNSProprietary
`11/17/2003
`
`.
`
`Page 8
`
`Unified Patents Ex. 1012, pg. 10
`
`Unified Patents Ex. 1012, pg. 10
`
`

`

`BNS Intellectual Property Description
`
`GW Re-Encrypts &
`E-mail passes
`
`
`
`GW De-Crpts &
`E-Mail Program send:
`>
`-
`Packet Inspection
`or receives
`aive podeas
`
`aret|tieata shmen finds Copyrighted fil
`
`
`
` Userreceives browser
`
`
`screen from
`GW stops
`Legal Source URL
`
`
`File
`or IP address;
`
`
`transfer
`Program is connected to
`
`
`Legal. Source or given
`no access atall
`
`
`
`
`
`Event is Logged
`
`
`
`
`Figure 4. DRM — Blocking E-Mail of Copyrighted Files
`
`5. Denial of Service Attacks on Unlicensed “Pirate” Copyri ht Material Sites
`
`Powered up and Inactive Gateways under ICP contro! can be directed to initiate repeated
`requests for service or for other transactions over the Internet Uplink to URLs of IP Addressesin
`the Conditional Denial of Service list which have been identified for interdiction. ICP control can
`activate the attacks on any of several bases: 1) scheduled with duration, 2) real time activation by
`the ICP or 3) event driven. tn this way, access to Users not served by BNS Gateways under ICP
`control are denied access to the copyrighted materials, greatly expanding the impact of the
`initially deployed Gateways to prevent access to Pirated material.
`6. Copyright Registry
`
`Users who have purchased copyrighted material are registered by the seller or can self register
`as owners of a license to use the material. This registry is centrally kept and the ICP has access
`to it. Furthermore, non-copyrighted material can be registered to identify files with nolimit on the.
`” numberof copies made or that may be.e-mailed or downloaded without intervention.
`
`_ 7. Copyrighted File Deletion
`A Powered up and Inactive Gateway, under ICP control, has the capability to inspect any User’s
`computerfile system available to it on the LAN to which they are attached. Notification to the ICP
`is made of file names that match Packet
`Inspection patterns to identify the presence of
`copyrighted material to which the User may not be entitled. Human intervention or the Copyright
`Registry may be used to verify User’s entitlement to copyrighted materials found on the file
`system. The Gateway deletes files to which the Useris not entitled.
`
`8. Event Notification -
`The Gateways deliver an eventnotification to the ICP whenever a Packed Inspection matchor an roo
`attempt to access a conditionally denied URLis made.
`,
`
`B.
`
`ServiceInitialization
`
`' CGsare required to be registered with the Internet Control Point when they are powered up for
`the first time They will remain inactive until they have received a registration confirmation from the
`BNS Registration URL. The registration process gathers information for a Warranty registration
`from the Consumer and for the CG’s hardware address and otheridentifying data. The CG is
`downloaded with the latest BNS Operating Software (if necessary) and is loaded with its initial
`
`BNS Proprietary
`11/17/2003
`
`Page 9
`
`Unified Patents Ex. 1012, pg. 11
`
`Unified Patents Ex. 1012, pg. 11
`
`

`

`BNSIntellectual Property Description
`
`operating parameters and processing data base. Subsequent re-registrations may be initiated
`under Consumercontrol for address or ISP changes. Operating parameters include the address
`of its ICP and other variables as described for the features below.
`
`GW
`Power Up
`
`GW IDto ICP
`
`ICP Collect
`Registration
`
`
`
`ICP Down-
`
`
`load S/W
`
`update & op
`parameters
`
`GW
`Operational
`
`
`
`
`
`Figure 5. Service Initialization.
`Cc.
`Active and Inactive Gateway Processing Control
`
`Upon power downorinactivity timeout of the CG, the CG registersitself as “Idle” to the ICP. The
`timeout will be preset and may be changed byinputto the ICP for distribution to all Gatewaysit
`controls.
`
`the Communication
`Upon subsequent re-activation, either upon power up or user activity,
`Gatewayidentifies itself as “Active” to the ICP that controls-it. Failureto ID-results in. re-try until a
`timeout.or maximum number of attempts occurs. This causes a diagnostic program to execute
`that advises the Consumerwhat to do next based on the deduced source ofthe failure.
`
`Processing by Inactive Gateways
`Processing by and Active CG controls Service Delivery.
`' controls eitherGateway maintenance oractivity that is delegated to inactive Gateways by design.
`
`May need to be re-checkedfrom timeto time or the registration is encrypted....
`
`“No.GW.traffic
`
`
`beforx2"
`
`
`
` «GWtraffic
`
`
`Resumption? |
`po ey
`
`Idle Processesare:
`- Denial of Service Attack
`OnPirate P2P Sites, or
`-Copyrighted File Deletion
`on Computers behind the
`_ Gateway
`
`Figure 6. Active and Inactive CG processing
`
`D.
`
`First Portal Visibility (“First Portal”)
`
`This feature is used to present a specific URL with ISP/EDC specified content to Consumers or
`employees as the “First Portal” page upon browser launch regardless of what they select as
`“Home”in the Browser.
`
`This technique is delivered by the CG, under ICP direction, to present any one of a list of URLs or
`IP addresses to the Consumer upon Browserlaunch or resumptionof activity (after.a timeout has
`
`BNS Proprietary
`11/17/2003
`
`,
`
`,
`
`. Page 10°
`
`Unified Pat

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket