throbber

`
`70910TMOld'S'lc66ch
`
`PTO/SB/16 (08-03)
`Approvedfor use through 07/31/2006. OMB 0651-0032
`U.S. Patent and Trademark Office; U.S. DEPARTMENT OF COMMERCE
`Underthe Paperwork Reduction Act of 1995, no persons are required to respond to a collection of information unless it displays a valid OMB control number.
`PROVISIONAL APPLICATION FOR PATENT COVER SHEET
`This is a requestforfiling a PROVISIONAL APPLICATION FOR PATENTunder 37 CFR 1.53(c).
`
`.
`Given Name(first and middle[if any})
`
`INVENTOR(S)
`Family Name or Sumame
`
`Residence
`and either State or Foreign Count
`
`City
`
`Vv
`
`
`
`
`
`22273U.S.PTO60/563064
`
`separately numbered sheets attached hereto
`——
`Additional inventors are being named on the
`TITLE OF THE INVENTION(500 characters max)
`SERVICE PREFERENCE ARCHITECTURE FOR DATA TRAFFIC AND PROVISIONING CONTROL
`Directail correspondenceto:
`CORRESPONDENCE ADDRESS
`N
`:
`:
`Customer Number:
`
`23488
`
`OR
`
`Finm or
`Individual Name
`Address
`Address
`
`
`
`
`
`
`
`
`
`
`.
`Gerald B. Rosenberg, Esq.
`
`
`285 Hamilton Avenue
`
`
`
`Suite 520
`
`
`
`
`
`
`
`
`
`ENCLOSED APPLICATION PARTS (checkall that apply)
`
`CD(s), Number
`Specification Number of Pages _24
`CJ
`Oo Drawing(s) Number ofSheets|Other(specify).
` CJ Application Date Sheet. See 37 CFR 1.76
`
`METHOD OF PAYMENTOFFILING FEES FOR THIS PROVISIONAL APPLICATION FOR PATENT
`
`
`
`
`Applicant claims smail entity status. See 37 CFR 1.27.
`FILING FEE
`
`Amount($)
`
`
`A check or moneyorderis enclosed to coverthefiling fees.
`
`
`
`
`
`CJ Paymentby credit card. Form PTO-2038is attached.
`
`
`
`[] Yes, the name of the U.S. Government agency and the Governmentcontract numberare:
`
`
`The Director is herby authorized to chargefiling
`fees or credit any overpayment to Deposit Account Number: 50-0890
`
`80.00
`.
`
`The invention was madeby an agencyof the United States Govemmentor under a contract with an agencyof the
`United States Government.
`
`No.
`
`Respectfully submitted,
`
`(Page 1 of 2]
`
`Date April 16, 2004
`
`
`
`SIGNATURE REGISTRATION NO._30,320
`(if appropriate)
`Docket Number. BRDB3002
`
`TYPEDor PRINTED NAME Gerald B. Rosenberg
`TELEPHONE 650.325.2100
`
`USE ONLY FOR FILING A PROVISIONAL APPLICATION FOR PATENT
`This collection of information is required by 37 CFR 1.51. The informationis required to obtain or retain a benefit by the public which is to file (and by the USPTO
`to process) an application. Confidentiality is governed by 35 U.S.C. 122 and 37 CFR 1.14. This collection is estimated to take 8 hours to complete, including
`gathering, preparing, and submitting the completed application form to the USPTO. Time will vary depending uponthe individual case. Any comments on the
`amountof time you require to complete this form and/or suggestions for reducing this burden, should be sent to the Chief Information Officer, U.S. Patent and
`Trademark Office, U.S. Department of Commerce, P.O. Box 1450, Alexandria, VA 22313-1450. DO NOT SEND FEES OR COMPLETED FORMS TO THIS
`ADDRESS. SEND TO: Mail Stop Provisional Application, Commissionerfor Patents, P.O. Box 1450, Alexandria, VA 22313-1450.
`
`if you need assistance in completing the form,call 1-800-PTO-9199 and select option 2.
`
`Unified Patents Ex. 1014, pg. 1
`
`Unified Patents Ex. 1014, pg. 1
`
`

`

`PTO/SB/17 (10-03)
`Approved for use through 07/31/2006. OMB 0651-0032
`U.S. Patent and Trademark Office; U.S. DEPARTMENT OF COMMERCE
`Under the Paperwork Reduction Act of 1995, no persons are required to respondto a collection of information unlessit displays a valid OMB control number.
`
`
`
`
`FEE TRANSMITTAL|ApplicationNumber|plication NumberSe=—
`
`
`
`
`Filing Date
`for FY 2004
`=
`
`Effective 10/01/2003. Patent fees are subject to annual revision.
`First Named
`
`
`
`
`FEE CALCULATION(continued)
`METHOD OF PAYMENT(checkail that apply)
`
`Check ["] Creditcard [_] Money [other [_]none|3. ADDITIONAL FEES
`
`
`
`Deposit Account Large Entity,Small Entirer
`
`
`
`
`
`eposit
`Account:
`Fee
`Fee
`vias
`
`
`eposi
`it
`D
`Fee
`Fee
`Code ($)
`Fee Description
`Code ($)
`Account|50-0890
`
`
`1051
`130
`|2051
`65 Surcharge- late filing fee or oath
`
`
`
`
`
`Deposit 50|20521052 25 Surcharge - late provisionalfiling fee or
`
`
`
`Account
`|NewTechLaw
`cover sheet
`.
`Name
`
`
`1053
`130
`[1053
`130 Non-English specification
`The Director is authorized to: (check all that apply)
`1812 2,520 |1812 2,520 Forfiling a request for ex parte reexamination
`Charge fee(s) indicated below
`Credit any overpayments
`
`
`
`1804
`920*| 1804
`920* Requesting publication of SIR prior to
`Examineraction
`[¥] charge any additional fee(s) ar any underpaymentof fee(s)
`[charge fee(s) indicated below, except for thefiling fee
`1805 1,840°} 1805 1,840* Requesting publication of SIR after
`
`
`Examineraction
`to the above-identified deposit account.
`
`2251
`110]
`1251
`55 Extension for reply within first month
`FEE CALCULATION
`
`
`2252
`420]
`4252
`210 Extension for reply within second month
`1. BASIC FILING FEE
`
`
`
`1253 950|2253 475 Extension for reply within third month
`arge Entity Small Entity
`
`
`
`Fee Description
`Fee Paid
`
`1254 1,480|2254 740 Extension for reply within fourth month
`
`1255 2,010|2255 1,005 Extension for reply within fifth month
`Utility filing fee
`Designfiling fee —
`1401
`330]
`2401
`165 Notice of Appeal
`
`1402
`330]
`2402
`165 Filing a brief in support of an appeal
`
`Plantfiling fee P|
`1403
`290]
`2403
`145 Requestfor oral hearing
`Reissuefiling fee fr
`Provisionalfiling fee
`80.00
`
`1451 1,510|1451 1,510 Petition to institute a public use proceeding
`1452
`110]
`2452
`55 Petition to revive - unavoidable
`
`
`
`SUBTOTAL (1)
`
`1453 1,330|2453 665 Petition to revive - unintentional
`2. EXTRA CLAIM FEES FORUTILITY AND REISSUE
`
`Fee from
`
`4501 1,330|2501 665 Utility issue fee (or reissue)
`Extra Claims
`Fee Paid
`1502
`480]
`2502
`240 Design issue fee
`1503
`640]
`2503
`320 Plantissue fee
`1460
`130]
`1460
`130 Petitions to the Commissioner
`
`
`
`Independent
`Claims — “3s Cc) x
`Multiple Dependent
`
`50 Processing fee under 37 CFR 1.17(q)
`Large Enti
`Smail Enti
`
`180 Submission of Information Disclosure Stmt
`
`
`
`Fee Fee
`Fee Fee
`Fee Description
`
`
`.
`Code ($)
`Code ($)
`40 eceny(amesnumberofpropertee)
`1202
`18
`9
`2202
`Claimsin excess of 20
`
`
`385 Filing a submission afterfinal rejection
`1201
`86
`43
`2201
`Independent claimsin excess of 3
`
`
`(37 CFR 1.129(a))
`1203 290
`385 For each additional invention to be
`2810
`770]
`1810
`2203 145 Muttiple dependent claim, if not paid
`
`
`1204
`86
`examined (37 CFR 1.129(b))
`2204 43=“* Reissue independentclaims
`
`
`
`over original patent
`385 Request for Continued Examination (RCE)
`1801
`770]
`2801
`
`
`1802
`900
`“* Reissue claimsin excess of 20
`1802
`900 Requestfor expedited examination
`
`
`of a design application
`and overorigina! patent
`
`
`Otherfee (specify)
`
`
`
`SUBTOTAL (2)
`
`previously paid, if greater; For Reissues, see above
`
`
`“Reduced by Basic Fiting Fee Paid
`SUBTOTAL (3)
`
`(Complete(# applicable)
`
`a
`
`(soraweeaeEagan lowe|4]/2/A0OE
`
`
`
`WARNING:Information on this form maby come public. Credit card information should not
`be included onthis form. Provide credit card information and authorization on PTO-2038.
`This collection of information is required by 37 CFR 1.17 and 1.27. The information is required to obtain or retain a benefit by the public which is tofile (and by the
`USPTOto process) an application. Confidentiality is govermed by 35 U.S.C. 122 and 37 CFR 1.14. This collection is estimated to take 12 minutes to complete,
`including gathering, preparing, and submitting the completed application form to the USPTO. Time will vary depending upon the individual case. Any comments on
`the amountoftime you require to complete this form and/or suggestions for reducing this burden, should be sentto the Chief Information Officer, U.S. Patent and
`Trademark Office, U.S. Department of Commerce, P.O. Box 1450, Alexandria, VA 22313-1450. DO NOT SEND FEES OR COMPLETED FORMS TO THIS ADORESS.
`SEND TO: Commissionerfor Patents, P.O. Box 1450, Alexandria, VA 22313-1450.
`'fyou need assistance in completing the form, call 1-800-PTO-9199 and select option 2.
`
`Applicant claims small entity status. See 37 CFR 1.27
`TOTAL AMOUNT OF PAYMENT
`($) 80.00
`
`
`
`oo [NewTechtaw
`
`1807
`1806
`oat
`1809
`
`1205
`
`18
`
`2205
`
`9
`
`
`
`“or number
`SUBMITTED BY
`
`
`
`50]
`180]
`40)
`770]
`
`April 16, 2004
`Burke, Robert M.
`
`Invento
`
`Art Unit
`
`
`
`BRDB3002
`
`
`
`
`
`1807
`1806
`8021
`2809
`
`Unified Patents Ex. 1014, pg. 2
`
`Unified Patents Ex. 1014, pg. 2
`
`

`

`BNIIntellectual Property Description
`
` &
`
`BROADBAND NETWORKS,INC.
`(formerly Broadband Network Systems,Inc.)
`Intellectual Property
`
`Service Preference Architecture
`|
`(SPA)
`Description & Technology
`
`April 1, 2004
`
`BNI Proprietary
`4/16/2004
`
`Page 1
`
`Unified Patents Ex. 1014, pg. 3
`
`Unified Patents Ex. 1014, pg. 3
`
`

`

`BNI Intellectual Property Description
`
`|.
`
`Il.
`
`Hl.
`A.
`
`Service Preference Architecture ..0.........ccccccccsssseseeeserees fo vesaesauesaeeasceseesaeaueecsseesessaceusecaeeseses 4
`A. High Level Description... cccecccseeseesscessecoeenseeseeeseesesasseascaeegecnecssecsaesneasneaseasensnsersenes 4
`B. Service Control and Copyright Protection ..........c.ccccccsssssecssessssessesessesessensssestceeceusersvasseveesens 4
`C. Flexibility to add new Service Control and Copyright Techniques..............0...0cccccccsecseseeeees 5
`SPA - Network & Product Architecture ............:ccccccecsccescesesseeeesenenseceeeesesececcesseusneeceesnseesnses 5
`A. General Description 0... ecceceeceeccecseseesenscnsssessesassssessesessesesesessessessesasersasestacescncessesaseevausenane 5
`Figure 1. Service Preference Architecture.........cccccscsscsssccssesssssessececseesscntetseseseecseeessearcesereeses 6
`B. The ICP Controls Communication Gateway..............ccccccceccececeecesesesecceceasesessaseneetansnseevases 6
`C. The ICP Controls ISP, BNS & EDC Service Deliveries ..............cccccccccessesessesssasssssesececcnservases 6
`D. The ICP Controls are determined by Regular and Active HumanIntervention ..........0.00000.0... 7
`E. I\CPs Updated by Active Intervention & Multiple ICPs Deliver High Availability........000000000000.. 7
`Figure 2. Active Intervention Updates and Backup ICPS.............0cccccccccesesessesssesssssseserseversanes 7
`BNS Internet Control TeEChniques ............c.cscccccesseseessressesssssssesssessessssecessaserateatenestausssaesanes 7
`Digital Rights Management...............cccsssssessscssssseseessssscssesscsessecsesenesscsesecsacssssevencarsnseseess 7
`1. Conditional Denial... eee ceecessceseseesececessescesaeessacevsesessasercesessasassuceuseeseausaueseasenansersenes 7
`Figure 3. DRM — Conditional Denial... cee ccccscsesessesssssssesssseccsecsesesseeessesscseveucetssavencessases 8
`3. Packet INSPection.............ccccsessssessesscssssssssesssceseseesessesseseesescsessssssseesessetssesaessuvessasessuassassereess 8
`4. E-Mail Server & Client Spoofing ........c ccc cee ce ceceeecseeeeseeeceeaeeeeaeeeceesesaseasssesseesasesesseeessneas®
`Figure 4. DRM — Blocking E-Mail of Copyrighted Files .......0........ccceccesesescsseessssesessersseseneeneenas 9
`5. Denial of Service Attacks on Unlicensed “Pirate” Copyright Material Sites.....0.0.00 00, 9
`6. Copyright Registry 0... eee eeeeseteesesesecsessesesaesesseceesensesesseseesssscessceecseesecsusavassassitsensenseses 9
`7. Copyrighted File Deletion 0.0.0.2... cece cece cesesecseceeseneeseseeseecsccecsevecsessasctacssvacssvaesansegens 9
`8. Event Notification .......00..0 cece cece eeseeenseetseeeeeeees Leeeeseee renee seesaaeeeseseneteseaeesenaauessaaeetsesatsens 9
`Service Imitialization 0.2... cccccessesessessessccesseestessesssssesccsecsevseseusssessesusnesaesesesazassasessereeeeeas 9
`Figure 5. Service Initialization. 00.0.0... cee geeccceecessecescesenseseseesessnscecescscescsscavsucsasinsevaesevauvavaases 10
`Active and Inactive Gateway Processing Control ..0..........ccccecessssssssssescesesesssesesessesesseaes 10
`Figure 6. Active and Inactive CG processing ........ccccccccssessssessssessssersesecsucessesseassacaesenesaeassaeens 10
`First Portal Visibility (“First Portal”) ...........c.cccccccssscssescsessscsecssessscesseecaesssssssececerseseeseeess 10
`Figure 7. First Portal Visibility. 0.0.0.0... ccc ccecceecsseesseesessscessesescssessaceecunecsusseastaesereeneesuesesnee 1
`Advertising oo... eeeecsecececesceeeseseesesetseseesestesaesesaesesceseceesesacsassusavscsecsasaeavscuvaansvneens ee
`Figure 8. Advertising INSertion. ...........cccccccsssssssscssesscecsesevecsereceesseestecertaceresdadeseaeeecaeacaesaeeeses 14
`Browser, Program Communications & URL or IP Address Access Blocking................... 12
`Figure 9. URL or IP address BIOCking ................:cccccccccccesescescscescssesvssssvsussnseseesaususevencavsaacsacas 12
`G.—Service Applet Downloads - 200... ccccceccesescescsecsersesssecsusecscsassevessavassesaraeenssscacassassesnataverss 12
`Figure 10. Service Applet Downloads. ............ccccccsssccessssetsssessscsesesessseneaseaevecesevseeeeseusessateseeas 12
`VirusInitiated Denial of Service Traffic Blocking ...........c.c:ccccccesesecssssesececcecesesseceesaneeseaes 13
`Figure 11. Virus Initiated Traffic Blocking .............cccccccssesceseceeseeceseesesecsasecsassssseveeesaseeseaneneeas 13
`Law Enforcement Monitoring .............:sceesesesscescesessesessessssacssseevsssssssanesavsnceseuseceavacsaveseasas 13
`Figure 12. Law Enforcement MOnitoring...........ccccccccsecsssssssscssesscssssssesesssscsseecessevseseneavenvavenses 13
`VOIP BIOCKING «2... eee cece eee ceccececceseseseeecestecssesesscseesesssusescessrsesecsssssssacaevaevesverveceattaseaneeneas 14
`Figure 13. VOIP BIOCKING. 0.0.0.0... ccceeescecesseseeseseestessseseesscaeseceesscaesecaesscsesecsssscssersescssesssseaesseasaes 14
`Real Time Video or Audio Streaming BIOCKING ...........c:cccccssesccessesssseesesscescsssscesstessaseaseses 14
`Figure 14. RT Video or Audio BIOCKING...........:ccccccssscsssssssscccsecseseccessesescacsscssessesesssesseesseesanees 14
`Real Time Video or Audio QOS Reduction..............cccccececscsscessesecessesesseceeceseeceeeeeeseceaseaes 15
`Figure 15. RT Video or Audio BIOCKING. ..............ccccccsecesesseseeeeessesscsssesssssuescessusessceevessasteneneuas 15
`Peer to Peer (P2P) Resource Address Server Blocking and False P2P Resource Address
`M.
`SPOOFING... ee eseetesecsesesecscscceseecsesesscacseseseseaecasacsesasasussaesescsenssacsssseccevscssacuvssestssavevseeevecevaveneess 15
`Figure 16. P2P Resource Address Server BIOCKING. ..............cccccceccsccecceseseesecessesesseenesacnseseeess 16
`Figure 17. P2P Resource False Address Spoofing. ..........:ccescscsssccsssssssessecasessessssersecevsersevers 16
`Internet or Data Network Access Authentication...... Lenesecsecetanesenscneeesoeseeaaeeseeesseeesseesenensee 17
`Figure 18. Internet Access Pre-Authorization ...............ccccccecccceesccsssecessecessscestscesssccnsesenseaeacens 17
`Communication Gateway Based Storage for Content Service Delivery........cccccceceecee 17
`Figure 19. Communication Gateway Based Content Storage and delivery............0...00000. 18
`ICP & CG Data Base Structures ..0........cceccecessssssssesescescscssessessesnsessscscesessusesstscscevereaveveess 19
`ICP Data Base SUMMALY............ cece ceccesesccessesescesacceseseesessssssceceeceassecessecescesscssearrereereee 19
`ICP Details 22... eee ccceccecsceeseeseesecuecsseesceseecsseassesescceuscueecescnsveescssersasevssvasessausasenenenenaes 19
`
`B.
`
`C.
`
`D.
`
`EE.
`
`F.
`
`H.
`
`I
`
`J.
`
`K.
`
`L.
`
`N.
`
`©.
`
`P.
`
`1.
`2.
`
`BNI Proprietary
`4/16/2004
`
`Page 2
`
`Unified Patents Ex. 1014, pg. 4
`
`Unified Patents Ex. 1014, pg. 4
`
`

`

`BNI Intellectual Property Description
`
`3.
`
`CG Details... cece ceceeeseseesecseeeseeseseeesseecsecsessesassusessaeeaseceeessacaueeessisesecseceetesteaeees 22
`
`BNI Proprietary
`4/16/2004
`
`.
`
`Page 3
`
`Unified Patents Ex. 1014, pg. 5
`
`Unified Patents Ex. 1014, pg. 5
`
`

`

`BNI Intellectual Property Description
`
`ABOUT THIS DOCUMENT
`This document describes BNS Product Features, Intellectual Property and Product Architecture.
`
`CONFIDENTIAL INFORMATION
`This Intellectual Property Description document is the property of Broadband Network Systems.
`It is proprietary information and is strictly confidential.
`It contains information intended only for the
`person(s) to whom it
`is transmitted. With receipt of this Intellectual Property Description
`document , Recipient acknowledges and agrees that:
`|) in the event that the recipient does not
`wish to pursue this matter, this documentwill be returned, at the addresslisted below as soon as
`possible; the recipient will not copy, fax, email, reproduce, divulge, or distribute this confidential
`Intellectual Property Description document
`,
`in whole or in part, without the express written
`consent of Broadband Network Systems; and
`Ill) all of the information contained in this
`document will be treated as confidential material with no less care than that afforded to your
`companyor personal confidential material.
`
`TRADEMARKNOTICE
`BROADBAND NETWORK SYSTEMS, BROADBAND NETWORKSERVICESandthe Broadband
`Network Logos are Trademarksof Broadband Network Systems.
`
`CONTACT INFORMATION
`Robert Burke
`C.E.O.
`21103 Old Well Road
`Los Gatos, CA 95033
`U.S.A.
`(408) 353-3573
`
`URL: www.bbns.us
`
`BNI Proprietary
`4/16/2004
`
`Page 4
`
`Unified Patents Ex. 1014, pg. 6
`
`Unified Patents Ex. 1014, pg. 6
`
`

`

`BNI Intellectual Property Description
`
`I.
`
`Service Preference Architecture
`
`A. High Level Description
`
`Broadband Network Systems (BNS) plans to develop and to sell Broadband (high-speed)
`Residential and Business Communication Gateways (CGs) and Internet Control Points (ICPs) to
`Telecommunication Carriers such as the Regional Bell Operating Companies (RBOCs), other
`Telephone companies, ISPs and Cable TV companies.
`ICPs are network based routers or
`computers that control the operation of CGs. CGs,
`installed at a Subscriber's site and ICPs,
`installed in the Carriers’ network are designed to enable Carriers to provide the so-called ‘Triple
`Play’ services (Voice+ Broadband Internet + Video) to their Subscribers using the Carrier's
`existing distribution network.
`In addition, new revenue generating Content Services (music,
`video, games, and software services) can be offered by BNS.
`
`With BNS’s unique Service Preference Architecture (SPA), several new data traffic control
`techniques are available to Carriers, ISPs, Enterprises and Cable TV companiesfortheir Internet
`Access networks.
`
`they provide an important new feature- Digital Rights
`BNS products are unique in that
`Management,
`i.e., the assurance to both the Service Provider and the Content Provider that
`Intellectual Property (music, video, games, software, etc.) will be secure from illegal downloading
`and transmission over the Internet, a major source of lost revenues and the basis for hundreds of
`lawsuits. Service Providers will want this feature tohalt the legal onslaught launched by music
`companies and because they want to offer Video/DSL and the Motion Picture Industry will not
`license the content for distribution over the unsecured Internet, having seen the negative impact
`piracy has already had on the Music Recording Industry. Content Providers will demand this
`feature to stop the illegal downloading and transmission of Intellectual Property over the Internet
`which has cost the music and movie industries billions of dollars annually.
`
`B. Service Control and Copyright Protection
`
`BNS’Service Preference Architecture (SPA)is a collection of BNS software routines executed by
`BNS CGsin conjunction with SPA-based Internet Servers under the control of BNS Internet
`Control Points.
`
`The software routines perform eight functions:
`
`from being illegally
`
`rights management- SPA protects copyrighted material
`1. Digital
`downloaded and distributed over the Internet.
`2. First portal visibility- SPA enables Consumers to receive the Carrier/BNS home page or
`video menu system every time their Computer or TV is turned on or wheneverthey re-initiate
`activity after an extendedidle period.
`3. Advertising- SPA allows desired advertisements to be delivered by the Carrier and/or by BNS
`to the Customers.
`4. Web site blocking- SPA enables Web Sites to be blocked by the Carrier,
`ISP or their
`corporate customers as required by Law or by the Subscriber's own Policy.
`5. Services download- SPA allows Consumer and Business customers to download applets that
`facilitate their use of the BNS/Carrier Services portfolio.
`6. Virus — Initiated traffic Blocking— SPA prevents infected user machines from repeatedly
`sendingtraffic at high data rates to sites which are the subject of Denial of Service attacks.
`_
`7. Law enforcement monitoring — SPA allows data passing through a CG to be copied to law
`enforcementor national security agencies.
`
`BNI Proprietary
`4/16/2004
`
`.
`
`Page 5
`
`Unified Patents Ex. 1014, pg. 7
`
`Unified Patents Ex. 1014, pg. 7
`
`

`

`BNt Intellectual Property Description
`
`8. Voice over Internet Protocol (VoIP) traffic blocking — SPA allows Carriers to restrict the use
`of the Internet Access Service they offer Subscribers to “data transport only,” blocking VoIP and
`thereby protecting their voice revenue stream from encroachment and preserving their ability to
`migrate their voice customers from the Public Switched Telephone Network (PSTN) when they
`upgradetheir internet Access Networksto offer Real Tome Quality of Service.
`In the sections that follow, we describe how the software routines work.
`
`C. Flexibility to add new Service Control and Copyright Techniques
`
`BNShas created SPAto be highly flexible, adaptable and to deliver a high degree of availability
`and security. The BNS SPA Architecture allows new Internet Control techniques to be added as
`BNS, Content Providers or Service providers need them. More techniques will be added by BNS
`as it creates them to deliver value to BNS,
`its customers and partners. This flexibility to add
`techniquesis a key feature of SPA and BNSIntellectual Property.
`
`ll.
`
`SPA-Network & Product Architecture
`
`A. General Description
`
`Telecommunication Carriers, Cable TV companies and Internet Service Providers can be
`equipped to deliver the BNS suite of features only by using a network service based system. This
`system is based on an architecture that employs an Internet Control Point (ICP) to control the
`access to web sites and to deliver data to Subscribers. The ICP controls the processing of data
`sent between Customers (client PCs or LAN servers) using the BNS Communication Gateway
`(CG) and the ISPs, Enterprise Data Centers or Content Servers with which they are exchanging
`information. The architecture is completed with a hardware/software implementation in the
`Communication Gateways that Carriers/ISPs use at their customers premises to deliver the
`service. The Communication Gateways cannot be tampered with by Users. Users are given no
`access to unload or modify the CG operating software by design and all ICP-CG communications
`takes place within the Carrier side of the network (DSL uplink), ICP-CG communications are
`secured with encryption and hashing. Furthermore, the ICP will not enable any service to an un-
`registered CG and an un-registered CG will not operate in an experimental environmentatall.
`
`This ensures secure control of the data flow between both the ICP and the CG. This secure flow
`of data then enables Carriers, ISPs, Enterprise data Centers or Cable TV Companiesto control
`the services their Users have accessto. Figure 1 illustrates the overall Network Architecture.
`
`BNIProprietary
`4/16/2004
`
`;
`
`Page 6
`
`Unified Patents Ex. 1014, pg. 8
`
`Unified Patents Ex. 1014, pg. 8
`
`

`

`BNI Intellectual Property Description
`
` Music,Movies; Books,
`
`:
` "ERS GontettSene
`Software, Games, Gaming, ete:
`
`"Secure Services
`
`and controls Services
`
`based SPA
`preempts piracy
`
`Figure 1. Service Preference Architecture
`
`B. The ICP Controls Communication Gateways
`The Communication Gateway (CG) may be either: 1) a Gateway that combines TV, Video,
`Internet and Voice, 2) a dial-up Remote Access Server, 3) an ADSL Modem/Router, 4) a Satellite
`TV Gateway, 5) a Cable TV Modem, or 6) a converged set top + internet Gateway.
`
`The ICP is the source of Internet Service Control and Conditional Denial of Users access to
`Service Provider selected URLs or IP addresses. The ICP controls the CG to determine what web
`site data is allowed through to Subscribers browsers. The ICP also controls the CGs packet
`inspection processing to determine which data can be allowedto flow through the CG to and from ©
`the Subscriber, specifically when e-mail orfile transfers are initiated. The ICP also controls what
`activities are engaged in by idle CGs when Consumers are inactive.
`Idle CGs may receive
`software downloads from the ICP, may be used to collect data and to initiate communications
`activities that are disruptive to Content Servers that offer unauthorized copyrighted materials for
`illegal download by Consumers.
`.
`
`Multiple ICPs are deployed geographically in the Carrier's network to support the Gateway
`managementcapacity of the ICP and the number of Broadband Usersin its service area.
`
`C. The ICP Controls ISP, BNS & EDC Service Deliveries
`Next is the interaction of the ICP with the BNS Content Server (BCS), Service Provider’s Internet
`Portal or Carrier (ISP) and Enterprise Data Centers (EDC). The ICP controls Consumersability to
`access services that are offered by the ISP or EDC. The ICP also controls the CGsto deliver: 1)
`advertisements, 2) the home page for ISP/BCS/EDC web servers or 3) software downloads to
`Consumer's PCsfor their use of ISP/BNS/EDC content services.
`
`BNI Proprietary
`4/16/2004
`
`Page 7
`
`Unified Patents Ex. 1014, pg. 9
`
`Unified Patents Ex. 1014, pg. 9
`
`

`

`BNI Intellectual Property Description
`
`D. The ICP Controls are determined by Regular and Active Human Intervention
`
`The !CP is programmed either by human input or by operator-controlled web crawler software.
`Updates are determined from BNS's active intervention service whereby changesto the control
`entries are discovered and implemented. This is a service delivered to ISPs and EDCs whereby
`the operation of BNS Features described below are controlled in a manner analogous to the
`regular updating of Virus Definitions for computer virus and worm protection.
`
`E. ICPs Updated by Active Intervention & Multiple ICPs Deliver High Availability
`
`The webcrawlers, humanintervention and ICP/CG software/processing data base updates are
`controlled by an Active Intervention system consists of a set of centrally maintained computer
`systems which control the operation of the ICPs. Figure 2 illustrates this.
`
`
`BNS Update System
`
`Humans input ICP & CG Processing Data
`Manages Operation of
`Base Changes
`ICPs
`
`CG&Service Software Changes
`
`
`BNS Active Intervention Systems
`Webcrawiers find Unlicensed Content
`
`
`
`
`ICP Updates
`ICP Updates
`
`
`& Control
`& Control
`
`
`Subscriber Data Base”
`
`}Service Controls:
`:
`
`
`
`Service Controls:
`;
`Intemet BasedDRM a
`internet Based DRM
`Blocked Sites:
`ees
`
`
`
`Blocked Sites
`|Eltst Portal
`First Portal
`
`
`
`
`
`| Advertising
`
`
`Primary ICP
`
`For CGs
`|
`
`
`
`
`
`Alnactive CG proces: Gon
`
`‘Law Enforcement Ménitoring
`
`
`
`irocessingDataBase 4K
`
`
`
`As Directed by ICP
`
`
`Multiple Control Points:
`High availability to CGs
`
`gle’
`
`Figure 2. Active Intervention Updates and Backup ICPs.
`
`lll. BNS Internet Control Techniques
`
`A.
`
`Digital Rights Management
`
`1. Conditional Denial
`
`The CGs, under ICP control, deliver a network based Digital Rights Management Service (DRM)
`which denies Users the capability to send or to receive data from or to URLs or IP addressesthat
`are knownto contain unlicensed copyrighted material. When this “Conditional Denial” occurs, the
`Gatewaysubstitutes the URL or IP Addressofa site that offers licensed copyrighted materials for
`legal, authorized sale to the User. This list of URLs or IP addrésses that are known to contain
`
`BNI Proprietary
`4/16/2004
`
`Page 8
`
`Unified Patents Ex. 1014, pg. 10
`
`Unified Patents Ex. 1014, pg. 10
`
`

`

`BNI Intellectual Property Description
`
`unlicensed copyrighted material will be regularly updated, similar to how virus definitions are
`regularly updated today.
`
`ICPs delivering DRM service use the Section F. Browser, Program Communications & URL or IP
`Address Access Blocking method to direct Users to authorized content sites. DRM uses both
`Active Human and Web Crawlerinput to find unauthorized content offered over the Internet and
`to update the URLsor IP addresses that are knownto contain unlicensed copyrighted material.
`
`When programs other than browsers attempt to access the blocked sites, the requested URL or
`IP address may be substituted by a legal content provider's URL/IP Address or noneatall.
`
`Upon registration as an “Active” Gateway, the ICP updates the Communication Gatewayslist of
`DRM URLor IP Address substitutions.
`
`
` GWiinActive.
`
`
`“ae>» Mode -
`
`Figure 3. DRM — Conditional Denial
`
`3. Packet Inspection
`
`Additional packet inspection processing is performed by the Gateways to determine the file type
`of ail files being transferred through the Gateway based uponthefiles properties, such asfile
`extension, file format, header or trailer contents and URL/IP addressesthat are known sources of
`unauthorized Copyrighted material. The Gateway is programmed by the ICP with certain Data
`Patterns. These data patterns may be any length and may contain exact matches plus regular
`expressions. When certain data patterns are recognized, the data transferis stopped oor another
`action is taken, based uponrules delivered by the ICP to the Gateway.
`
`4. E-Mail Server & Client Spoofing
`
`CGspresent themselves to Users as the User's E-mail Server and present themselves to E-Mail
`servers as Users.
`In so doing, the CG acts as a 2- way encryption/decryption point to enable
`inspection of what would otherwise be encrypted data. When E-mail is sent through the Gateway,
`the Gateway inspects all attached files using Packet Inspection. Based upon rules delivered by
`the ICP to the Gateway, the Gateway can then deny access to incomingfiles, stop the transfer of
`outgoing files or take other action,.
`
`BNI Proprietary
`4/16/2004
`
`,
`
`Page 9
`
`Unified Patents Ex. 1014, pg. 11
`
`Unified Patents Ex. 1014, pg. 11
`
`

`

`BNI Intellectual Property Description
`
`
`
`
`
`E-Mail-Program send
`GW De-Crypts &
`
`
`
`GWin Active Mode as
`.< -oF receives
`_ Packet Inspection.
`
`e-mail client &server.
`_-filé.attachme
`
`
`finds Copyrighted file
`
`
`‘GW Re-Encrypts &
`“E-mail:passes*.
`
`
`
`Figure 4, DRM — Blocking E-Mail of Copyrighted Files
`
`5. Denial of Service Attacks on Unlicensed “Pirate” Copyright Material Sites
`
`Powered up and Inactive Gateways under ICP control can be directed to initiate repeated
`requests for service or for other transactions over the Internet Uplink to URLs of IP Addressesin
`the Conditional Denial of Service list which have beenidentified for interdiction. ICP control can
`activate the attacks on any of several bases: 1) scheduled with duration, 2) real time activation by
`the ICP or 3) event driven. In this way, access to Users not served by BNS Gateways under ICP
`control are denied access to the copyrighted materials, greatly expanding the impact of the
`initially deployed Gateways to prevent accessto pirated material.
`
`6. Copyright Registry
`
`Users who have purchased copyrighted material are registered by the seller or can self register
`as ownersof a license to use the material. This registry is centrally kept and the ICP has access
`to it. Furthermore, non-copyrighted material can be registered to identify files with no limit on the
`numberof copies made or that may be e-mailed or downloaded without intervention.
`
`;
`7. Copyrighted File Deletion
`A Powered up and Inactive Gateway, under ICP control, has the capability to inspect any User's
`computerfile system available to it on the LAN to which they are attached. Notification to the ICP
`is made of file names that match Packet
`Inspection patterns to identify the presence of
`copyrighted material to which the User may not be entitled. Human intervention or the Copyright
`Registry may be used to verify User's entitlement to copyrighted materials found on thefile
`system. The Gatewaydeletesfiles to which the Useris notentitled.
`
`8. Event Notification
`
`The Gateways deliver an eventnotification to the ICP whenever a Packed Inspection match or an
`attempt to access a conditionally denied URL is made.
`
`B.
`
`Service Initialization
`
`CGsare required to be registered with the Internet Control Point when they are powered up for
`the first time They will remain inactive until they have received a registration confirmation from the
`BNS Registration URL. The registration process gathers information for a Warranty registration
`from the Consumer and for the CG's hardware address and other identifying data. The CG is
`downloaded with the latest BNS Operating Software (if necessary) and is loaded with i

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket