throbber
(12) United States Patent
`Slemmer
`
`USOO6226677B1
`(10) Patent No.:
`US 6,226,677 B1
`(45) Date of Patent:
`May 1, 2001
`
`(54) CONTROLLED COMMUNICATIONS OVERA
`GLOBAL COMPUTER NETWORK
`
`(75) Inventor: Michael W. Slemmer, Sioux Falls, SD
`(US)
`
`9/1998 Baehr et al. ......................... 709/249
`5,802,320
`9/1999 Merriman et al. ................... 709/219
`5.948,061
`6,014,698 * 1/2000 Griffiths ...........
`... 709/224
`6,098,172
`8/2000 Coss et al.
`713/201
`6,119,162
`9/2000 Li et al. ............................... 709/227
`
`(73) Assignee: LodgeNet Entertainment
`Corporation, Sioux Falls, SD (US)
`Subject to any disclaimer, the term of this
`patent is extended or adjusted under 35
`U.S.C. 154(b) by 0 days.
`
`(*) Notice:
`
`(21) Appl. No.: 09/232,386
`(22) Filed:
`Jan. 15, 1999
`O
`O
`Related U.S. Application Data
`(60) Provisional application No. 60/109,878, filed on Nov. 25,
`1998.
`(51) Int. Cl." .................................................. G06F 13/00
`(52) U.S. Cl. .............................................................. 709/227
`(58) Field of Search ............................... 705/14. 709/202,
`709/317, 227
`
`(56)
`
`References Cited
`U.S. PATENT DOCUMENTS
`5,781,550 * 7/1998 Templin et al. ..................... 370/401
`
`sk -
`
`cited by examiner
`Primary Examiner Kenneth R. Coulter
`(74) Attorney, Agent, or Firm-Sheridan Ross P.C.
`(57)
`ABSTRACT
`In one embodiment, a method related to controlling com
`munication of a TCP packet from a user machine is dis
`closed. During a browser request from the user machine, the
`TCP packet is sent via the intranet to a forced proxy server.
`The TCP packet having a number of fields including a first
`field related to a first destination IP address. The TCP packet
`and its first destination IP address is received by the forced
`proxy server and analyzed. If the first destination IP address
`is not from a “sandboxed’ domain, the first destination IP
`address is changed to a predetermined Second destination IP
`address to effectively reroute the TCP packet to another IP
`address on the Internet. The rerouted IP address provides
`content to the user machine in which at least a majority of
`the content is different from that expected to be obtained by
`the user machine.
`
`27 Claims, 4 Drawing Sheets
`
`Attach Computer 300
`to intranet
`
`304
`
`Red
`uest
`
`First UR
`
`Forced Proxying
`-
`Begin Forced Proxying by Redirecting 303
`Browser to Second URL
`312
`
`Requests
`Browser
`File at Second URL
`
`Proxy Server Retrieves File at Third
`URL Mapped to File at Second URL
`
`3.18
`
`32
`
`File from hird URL Presented to Browser
`as Originated from the Second URL
`
`324
`
`
`
`More Requests from
`Secord URL?
`
`No
`
`Redirect Browser
`to a Fourth URL
`
`328
`
`Disable Forced
`Proxying
`
`332
`
`
`
`Browser Displays File
`at Fourth URL
`
`336
`
`340
`
`User May
`Browse Freely
`
`GUEST TEK EXHIBIT 1009
`Guest Tek v. Nomadix, IPR2019-01191
`
`

`

`U.S. Patent
`
`May 1, 2001
`
`Sheet 1 of 4
`
`US 6,226,677 B1
`
`
`
`
`
`
`
`
`
`User
`Machine
`No. 1
`
`User
`Machine
`No. 2
`
`100
`
`140
`
`

`

`U.S. Patent
`
`May 1, 2001
`
`Sheet 2 of 4
`
`US 6,226,677 B1
`
`Attach Computer with
`Browser to Intranet
`
`2OO
`
`204
`
`Browser Request a First
`Content from internet
`
`Selective
`Sandboxing
`- -
`
`No
`
`
`
`
`
`220
`
`ls Content
`a Sandboxed
`Domain?
`
`Yes
`
`
`
`
`
`
`
`
`
`
`
`User Browses Sandboxed
`Domain Only
`
`Has the
`User Requested
`a Third Content?
`
`Browser Presented a Potentially
`Unwanted Second Content
`
`
`
`
`
`
`
`
`
`
`
`Desired
`Interaction
`Achieved?
`
`
`
`Forced Proxying
`" - - - - - - - - - - - - - - - - - - - - - - 1. - - - - -
`Yes
`216
`
`Fig. 2
`
`BrOWse Freel
`y
`
`

`

`U.S. Patent
`
`May 1, 2001
`
`Sheet 3 of 4
`
`US 6,226,677 B1
`
`Attach Computer 300
`to Intranet
`
`3O4
`
`First URL
`
`-
`
`-
`
`-
`
`- a
`
`a
`
`is
`
`a q
`
`is
`
`a
`
`Forced Proxying
`a 1- - - - - -
`
`Begin Forced Proxying by Redirecting
`Browser to Second URL
`312
`
`3O8
`
`Browser Requests
`File at Second URL
`
`Proxy Server Retrieves File at Third
`URL Mapped to File at Second URL
`
`
`
`31 6
`
`
`
`File from Third URL Presented to Browser
`as Originated from the Second URL
`
`
`
`
`
`More Requests from
`Second URL?
`
`
`
`No
`
`Redirect BrOWSer
`
`328
`
`Disable Forced 5'
`Proxying
`
`Browser Displays File 336
`at Fourth URL
`
`340
`
`Fig. 3
`
`User May
`Browse Freely
`
`

`

`U.S. Patent
`
`May 1, 2001
`
`Sheet 4 of 4
`
`US 6,226,677 B1
`
`997
`
`XINT.
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`#7 · 61
`
`99 #7
`
`

`

`1
`CONTROLLED COMMUNICATIONS OVERA
`GLOBAL COMPUTER NETWORK
`
`This application is related to and claims priority from
`Provisional Patent Application No. 60/109,878, filed Nov.
`25, 1998.
`
`FIELD OF THE INVENTION
`The present invention relates to networks, and in
`particular, to an apparatus and method for controlling inter
`action with a global computer network.
`
`BACKGROUND OF THE INVENTION
`Systems of various configurations are known to control
`access to a global computer network, Such as the Internet.
`Typically, Systems block access to predetermined content on
`the Internet, forward a user from the Selected address to a
`new address on the Internet or present advertising or other
`information to the user before accessing the Internet.
`Software which prevents access to predetermined web
`Sites based upon a Selected criteria is well known. The
`Software may reside on the user's computer or elsewhere to
`detect requests for content from prohibited or restricted IP
`(Internet Protocol) addresses. Periodic updates of the soft
`ware is required to keep the list of Such IP addresses current.
`Once a prohibited request is noted, the Software does not
`return the requested content, but instead returns an appro
`priate message. In this way, content on the Internet is
`blocked.
`Modern browsers have the capability for a web site to
`redirect the browser to a new web site. This feature is useful
`when the name or IP address of a web site has changed. The
`user may have Saved the former universal resource locator
`(URL) or its corresponding IP address into the user's
`browser. When the user attempts to return to the former
`URL, the desired content may no longer be located there and
`has moved to a different URL on the Internet. To redirect the
`user to the desired web page, the former web site can
`command the browser to point to the new URL where the
`web page currently resides. In this way, the user is able to
`browse the desired content at the new URL with only a small
`delay.
`Although redirection of a web browser is useful in direct
`ing the user to the desired content, it has not been used to
`direct the user to content that is not Sought by the user. It
`would be counterintuitive to redirect the user to undesired
`content. Even if redirection were performed to attempt to
`have the user view unwanted content, the user could change
`the URL and cause the browser to view another location on
`the Internet.
`Even though most browsers support the ability to redirect
`a user to a different web site, Some browserS do not Support
`this capability. Notably, older browsers and less popular
`browserS may not Support this capability. Additionally, Some
`browsers allow disabling the ability to redirect a user to
`another web site. In order to provide content from a different
`web site regardless of the browser's capability or
`configuration, there is a need for a browser independent
`redirection which cannot be disabled.
`Proprietary ISPs (Internet Service Providers), such as
`America Online TM, CompuServeTM and Prodigy'TM, require
`subscribers of the ISP to access their service with proprietary
`access Software. This Software typically has the capability of
`presenting the Subscriber with advertising or other poten
`tially unwanted information. Additionally this software has
`
`15
`
`25
`
`35
`
`40
`
`45
`
`50
`
`55
`
`60
`
`65
`
`US 6,226,677 B1
`
`2
`the capability of browsing the Internet. However, once the
`user has used the proprietary access Software to access the
`Internet, the user cannot be redirected to potentially
`unwanted content from the Internet. The proprietary acceSS
`Software can only present potentially unwanted or non
`requested content before access to the Internet. In other
`words, once Internet browsing has begun, the Subscriber
`may browse the Internet freely.
`Although browsing the Internet freely may be desirable to
`users, directing the user to content not specifically requested
`by the user may be valued by advertisers. This may also be
`of benefit to the user since income to the ISP derived from
`the advertisers might help defray the costs of providing
`Internet access to the user. Over time, users may view this
`diversion from anticipated content as advantageous in reduc
`ing their costs for using the Internet.
`In Summary, it appears desirable to develop a System
`which: (1) redirects the browser to potentially unwanted
`content regardless of the capabilities or configuration of the
`browser, and (2) requires the user to view or interact with the
`potentially unwanted content before the user can freely
`interact with any other content on the Internet.
`SUMMARY OF THE INVENTION
`In accordance with the present invention, a System which
`controls access to a global computer network is disclosed. In
`one embodiment, a method related to controlling commu
`nication of a TCP (Transmission Control Protocol) packet
`from a user machine is disclosed. During a browser request
`from the user machine, the TCP packet is sent via the
`intranet to a forced proxy server. The TCP packet has a
`number of fields including a first field related to a first
`destination IP address. The TCP packet and its first desti
`nation IP address are received by the forced proxy server and
`analyzed. If the first destination IP address is not from a
`“sandboxed” domain, the first destination IP address is
`changed to a predetermined Second destination IP address to
`effectively reroute the TCP packet to another IP address on
`the Internet. The rerouted IP address provides content to the
`user machine in which at least a majority of the content is
`different from that expected to be obtained by the user
`machine. In one embodiment, all or substantially all of the
`content is different from that the first or requested destina
`tion IP address.
`Relatedly, a system for controlling TCP packet transmis
`sions relative to the Internet is disclosed. The system
`includes a user machine, a forced proxy server, and an
`intranet. Typically, the intranet is protected from intrusion by
`systems or individuals who access the Internet. The forced
`proxy server includes a first port for receiving TCP packets
`from the user machine or other machines attached to the
`intranet. The proxy server receives at least a first TCP packet
`from the user machine where the TCP packet includes a first
`destination IP address. IP addresses point to a location on the
`Internet which typically includes content. Upon receipt of
`the TCP packet, the forced proxy server ascertains whether
`the TCP packet is directed to the intranet or Internet. If the
`TCP packet is directed to the Internet, the TCP packet is
`passed to a forced proxying Software program running on
`the proxy server. The Software program may modify or leave
`unchanged the TCP packet based upon a predetermined
`criteria before the TCP packet is passed to the Internet.
`Based upon the predetermined criteria, the forced proxy
`Server may return alternate content to the user machine from
`a Source different from the first destination address. At least
`a majority of the alternate content is different from that
`expected to be obtained by the user machine.
`
`

`

`US 6,226,677 B1
`
`3
`Based upon the foregoing Summary, a number of impor
`tant advantages of the present invention are readily dis
`cerned. The browser can be controlled so that the user views
`potentially unwanted content regardless of the capabilities or
`configuration of the browser. Additionally, the user can be
`required to view or interact with the potentially unwanted
`content at times when the user may wish to freely interact
`with other content on the Internet. A system which achieves
`these goals is expected to help finance access to the Internet
`and thus reduce costs to users.
`Additional advantages of the present invention will
`become readily apparent from the following discussion,
`particularly when taken together with the accompanying
`drawings.
`
`BRIEF DESCRIPTION OF THE DRAWINGS
`FIG. 1 is a block diagram which Schematically depicts an
`embodiment of the control System;
`FIG. 2 is a flow diagram which schematically depicts the
`operation an embodiment of the control System;
`FIG. 3 is a flow diagram which schematically depicts the
`operation of an embodiment which may be used in a
`multi-unit property; and
`FIG. 4 is a block diagram which Schematically depicts an
`embodiment deployed in a multi-unit property.
`
`4
`Internet 140. The intranet 110 is typically a private network
`isolated from the Internet 140 by a firewall. The firewall may
`be implemented on a forced proxy server 130. Each of the
`client machines 120 typically includes at least one computer
`processor, a monitor having a display Screen, Storage
`memory, Such as a hard drive and/or Semi-conductor
`memory, and input devices, Such as a keyboard and/or a
`mouse. The user machine 120 also has necessary or appro
`priate Software including operating System Software and a
`commercially available web browser. The system 100 also
`includes the forced proxy server 130 in communication with
`each of the one or more user machines 120. The server 130
`can handle all signal traffic to/from each of the user
`machines 120. On the outputside or port(s) of the server 130
`is an interface or connector hardware that enables the Server
`130 to communicate with the Internet 140. In that regard, the
`server 130 essentially acts as a proxy for Internet commu
`nications with each of the user machines 120.
`With regard to communications from the user machines
`120 to the Internet 140, messages are sent to the Internet 140
`from the user machines 120 by means of encapsulated
`parcels of data identified as “datagrams' or "packets. Each
`Such packet must pass through the proxy server 130 to
`access the Internet 140. In controlling communications, the
`system 100, particularly the server 130, is interested only in
`TCP (Transmission Control Protocol) packets, which are
`used to carry essentially all web traffic. Each TCP packet
`contains the following fields or integers: Source IP (Internet
`Protocol) address; source TCP port; destination IP address;
`and destination TCP port.
`Requests to the world wide web from the user machines
`120 are unique in that their destination TCP port is set to 80.
`When a packet is transmitted from a user machine 120, a
`transparent proxying software module in the server 130
`makes a determination regarding whether or not the trans
`mitted information relates to a web request. In that regard,
`the server 130 analyzes at least portions of each packet. If a
`packet TCP port is identified as 80, that packet is intercepted
`by the transparent proxying Software module and redirected
`to a different TCP port on the server 130. A software control
`program running on the Server 130 is in communication with
`that software port to which the packet is redirected. This
`Software port responds to requests as if they were the web
`server on the Internet 140. This proxy server program or
`control program assumes control of the web request by
`fulfilling the actual request from the user machine 120 or
`implementing other predetermined StepS. Such other prede
`termined Steps relate to providing information to the user
`machine 120 from one or more particular web pages of a
`web site different from the user machine's 120 requested
`site. The identification of the web pages to be directed to the
`particular user machine can be based on a number of factors
`including: the input to the user machine 120 by the user or
`operator of that machine and provided to the browser on the
`user machine 120; the Internet or MAC address associated
`with the particular user machine 120; and other factors such
`as whether or not the Internet 140 is accessible to the
`particular user machine 120. The server 130 also has the
`capability of deactivating or essentially bypassing Such
`controls in the Sense of allowing a particular user machine
`120 to freely access the Internet 140 as if the proxy server
`130 were not interposed between the particular user machine
`120 and the Internet 140.
`With reference to FIG. 2, an embodiment of the control
`system 100 is schematically depicted as a flow chart. The
`user attaches the computer 120 to a port to the intranet 110
`in step 200. Commonly, the port is a modem or network port,
`
`15
`
`25
`
`35
`
`40
`
`45
`
`50
`
`55
`
`60
`
`65
`
`DETAILED DESCRIPTION
`A System and methods of operation are described in which
`predetermined controls are exercised over a user's ability to
`communicate and obtain information over a global computer
`network, Such as the Internet. Generally, the System and
`methods of operation function to control information
`received by a user machine Such that information is returned
`to the user machine which was not requested by it. More
`particularly, a user machine may request a particular web
`page or Set of web pages using a browser, which pages are
`available on the world wide web accessible using the
`Internet. The present invention, depending on predetermined
`conditions, may cause information to be viewed on the user
`machine that was obtained from a different address or URL
`(Uniform Resource Locator) on the global computer
`network, Such as a different web site. A web site, Such as
`“www.abc.com', may be input into the browser on the user
`machine. However, instead of accessing this web site, the
`System would cause the user machine browser to actually
`display pages, HTML (HyperText Markup Language) text
`and/or images from a different Source, Such as a different
`address on the web.
`The system also provides selective “sandboxing” in which
`certain web sites are directly accessible by the browser of the
`user machine while other web sites that are requested for
`access will result in triggering the controls implemented by
`the present invention (i.e., forced proxying), Such as redi
`recting the request to another web site. In that regard, the
`user machine might receive as an input into its browser the
`name "www.xy Z.com', which has a corresponding web
`address or URL, and browse that site with no interference.
`On the other hand, when the user machine receives an input
`related to another web site address or Selection of a link that
`would take the user machine outside of the “www.xyz.com”
`Site, the user machine would again be Subject to the controls
`of the present invention (forced proxying).
`With reference'to the FIG. 1, the system 100 includes one
`or more of a number of user or client machines 120. The
`system 100 is generally divided into an intranet 110 and the
`
`

`

`S
`but could be any wired or wireleSS communication mecha
`nism. The browser on the user machine 120 requests a first
`content from the Internet 140 in step 204. A determination
`is made by the proxy server 130 as to whether the first
`content is from a “sandboxed’ domain in step 220. If the first
`content is from a Sandboxed domain, the user in Step 224 can
`freely browse that domain without being subject to forced
`proxying. When the user attempts to point the browser in
`order to receive a third content in Step 228, a new determi
`nation is made as to whether the third content is from
`another Sandboxed domain. In this way, the user may browse
`as many Sandboxed domains as desired without being Sub
`ject to forced proxying.
`However, if the forced proxy server 130 notices a request
`for a non-Sandboxed domain in Step 220, the forced proxy
`proceSS is begun. In proceeding to Step 208, the first or third
`non-Sandboxed content is Substituted with a Second content.
`The Second content is typically provided from an advertiser
`on the intranet 110 or Internet 140. A desired interaction with
`the Second content is required of the user before forced
`proxying may end in Step 212. The desired interaction with
`the Second content may simply be a passive time delay or
`positive requirement that certain Steps be taken. Providers of
`the Second content may embed the desired interaction in
`their web site Such that desired interaction is reprogramable.
`Once the desired interaction is achieved in Step 212, the user
`is allowed to browse the Internet 140 freely in step 216. As
`an added Step, the browser could present the first content
`(i.e., the content requested before forced proxying began)
`automatically after the desired interaction is achieved in Step
`212.
`While browsing the Internet with the user machine 120,
`both wanted and potentially unwanted content is presented
`to the user. For example, a particular web page may contain
`an article about Stocks which is the desired content of the
`user. However, the web page would typically contain poten
`tially unwanted or non-requested content in the form of
`advertising. In other words, the web page is mostly desired
`content and partially undesired content. RatioS of more than
`80% desired content to less than 20% potentially undesired
`content are typical on web pages today. Commonly, adver
`tising is in the form of banners or buttons which contain
`information related to the advertiser. If the user is interested
`in the advertised product or Service, clicking on the banner
`or button will point the web browser to another site.
`Although the advertising is potentially unwanted, the user
`enjoys reading the free article about StockS.
`The amicable exchange of mostly free desired content for
`a Small amount of potentially undesired advertising is appre
`ciated by users. AS those skilled in the art can appreciate, the
`advertising, even though potentially unwanted, has become
`expected by users in the normal course of web browsing.
`However, the user is not accustomed to Seeking a web page
`related to fly fishing, for example, with the associated
`advertising and instead receiving a web page related to the
`latest blockbuster movie with any associated advertising.
`Use of forced proxying in this way allows unexpected
`Substitution of a majority of the desired content (i.e. fly
`fishing information) for potentially unwanted content (i.e.,
`the latest blockbuster movie).
`With respect to examples of control Steps or algorithms,
`the Software control program to which the web request is
`transferred for control purposes can include the following
`controls when it receives a web request for content.
`The user machine 120 is caused to receive a returned
`HTTP (HyperText Transport Protocol) redirect message.
`
`15
`
`25
`
`35
`
`40
`
`45
`
`50
`
`55
`
`60
`
`65
`
`US 6,226,677 B1
`
`6
`This is a special command that directs the web browser of
`the user machine 120 to “jump to” or be provided with
`information from another web site location, without any
`display or other indication of this web site change to the
`particular user machine 120. For example, a user machine
`120 receiving a request to its browser in the form of
`www.abc.com could be directed by the control program in
`the proxy server 130 to access www.xyz.com as the web site
`address or URL to be displayed or from which information
`is to be obtained.
`Alternatively, the control program could return a web
`page to the user machine 120 based on a path that the user
`machine 120 selected. For example, if an input were
`received by the user machine 120 in the form of the web site
`address www.abc.com/index or www.def.com/index, the
`proxy server 130, by means of the software module that
`determines that this is a TCP packet and also by means of the
`Software control program, could instead access and fetch one
`or more web pages from the Web Site address www.xy Z.com/
`index. Similarly, an input to the particular user machine 120
`in form of www.abc.com/XXX, could result in the proxy
`server 130 obtaining www.xyz.com/XXX. In this way, the
`particular user machine 120 will always be forced to receive
`return information from the www.xyz.com web site. Except
`for the “location' URL typically displayed on a status line
`in the web browser, the web brouser will read something
`different, because it is reading from www.xy Z.com and not
`www.abc.com/XXX, it will appear to the user machine 120
`that the desired URL (i.e., www.abc.com/XXX) is being
`accessed properly.
`Alternatively, the proxy server 130 could return to the
`user machine 120 the actual web page that the user machine
`120 requested. In this case, the control program acts like a
`normal proxy server by connecting to the Internet 140 and
`fetching the requested page or pages. This functionality can
`be identified as “sandboxing” by which requests to certain
`one or more locations on the web are allowed or granted
`without modification, while others are not. For instance,
`connections to www.xy Z.com could be proxied in this
`manner, while other requests my generate a Set of pages
`from a web site different from the requested web site.
`Alternatively, the control program could return web
`page(s) based on particularly identified information about
`the user machine 120. The proxy server 130 may rely on the
`IP address that it receives to provide a response based
`thereon. Other information about the user machine 120
`might also be utilized in customizing a response to a web
`request from that user machine 120.
`With respect to describing in greater detail the method
`ology and operations of the present invention, two examples
`are provided:
`
`EXAMPLE 1.
`Log in to a network different from that to which the user
`machine is normally configured, Such as logging in at a hotel
`or other multi-unit property.
`With reference to FIG. 3, a user plugs in a laptop and runs
`the browser in step 300. The user's default web page is a first
`URL home.browserid.com/Index.htm. The user's laptop
`(user machine 120) attempts to connect to port 80 of
`home.browserid.com in step 304. The server 130 redirects
`this request to the forced proxying or control program. The
`control program determines that this is the first time it has
`Seen this user machine 120. The control program returns a
`HTTP redirect message sending the user machine 120 to a
`second URL at www.login.com in step 308. The user's
`
`

`

`US 6,226,677 B1
`
`5
`
`15
`
`25
`
`7
`laptop receives this message and now tries to fetch
`www.login.com by attempting to connect to port 80 of
`www.login.com in step 312. The server 130 redirects this
`request to the control program. The control program recog
`nizes the second URL at www.login.com. When it receives
`requests to www.login.com it knows to respond with a Set of
`pages Stored at a third offsite Server www.connect
`group.com. Next in Step 316, the control program connects
`to that third Server and fetches a third home page from that
`offsite Server, namely, www.connectgroup.com. The third
`home page is returned to the user machine 120 in step 320.
`Because the third home page contains two images,
`image1.gif and image2.gif, the user machine browser makes
`two additional connections to port 80 on www.iogin.com in
`Step 324, once for each image. In as Similar manner as
`described above, the server 130 redirects these requests to
`the control program. The control program recognizes
`www.login.com again. It also sees that the user machine 120
`is trying to acceSS /image1.gif and /image2.gif, respectively,
`on that server. It connects to the offsite server and fetches
`www.connect group.com/image 1.gif
`and
`www.connectgroup.com/image2.gif. It returns these images
`to the particular user machine 120. The user views this page
`and clicks on one of the links on the page, which directs the
`user to www.login.com/page2.html. The server 130 redirects
`this request to the control program. The control program
`recognizes www.login.com again. It also sees that the user
`machine 120 is trying to acceSS /page2.html on that Server.
`It connects to the offsite server and fetches
`www.connectgroup.com/page2.html. It returns this page to
`the particular user machine 120. The user sees on the
`monitor of the user machine 120 that this page contains a
`“login' button which upon activation ultimately results in
`the user being allowed to browse the Internet freely. The user
`Selects or clicks it. This action or Selection causes the user
`machine 120 to access www.login.com/login. The Server
`130 software module redirects this request to the server
`control program. The control or forced proxying program
`recognizes www.login.com and also the page being accessed
`as /login. The program realizes that this user machine 120 is
`trying to log in. In Step 328, the program forwards the user
`machine 120 a fourth web page by using a redirect com
`mand. This page will cause the user machine 120 to jump to
`a fourth URL www.lodgenet.com in five seconds, which is
`enough time for the control program to disable forced
`proxying for this user in Step 332. The control program
`disables forced proxying for this user machine IP address.
`The user machine 120 displays a “logging you in . . . '
`message for five Seconds and then the www.lodgenet.com
`home page is displayed in Step 336. The operator of this user
`machine 120 can then begin to use the Internet normally in
`step 340.
`
`8
`request to the forced proxying program. The forced proxying
`program recognizes www.community.com as a Sandboxed
`domain. It fetches www.community.com and returns this
`page to the user machine 120. This page includes a Selector
`element or button which allows the user machine 120 to
`access the Site it initially Sought, in this case, www.stock
`quote.com. The Server 130 overlays the appropriate codes in
`the www.community.com web page to make this button
`work properly.
`Loosing the user to non-Sandboxed domains is avoided by
`the proxy server 130. A preexisting advertising banner on the
`www.community.com web page may want to lure the user to
`www.flycast.com. The proxy server 130 intercepts the
`browser's request for the advertising banner to determine if
`www.flycast.com is recognized as another Sandboxed
`domain. If www.flycast.com is an approved Sandboxed
`domain, the proxy server fetches the advertising banner for
`www.flycast.com. The user machine browser displays the
`advertising banner on the monitor Screen. The user may
`View this advertisement, but wants to check Stock quotes.
`To proceed to the originally requested Web Site, the user
`clicks on the button on the www.community.com page
`which takes the user to WWW.Stock-quote.com. The Server
`130 redirects this request to the control program. The control
`program remembers that WWW.Stock-quote.com was the Site
`that the user initially wanted to access. It returns to the user
`machine 120 a “logging you in . . . ' page with a redirect
`which will point the user's browser to www.stock
`quote.com in five Seconds. The program then disables forced
`proxying for this user machine 120. In five Seconds, the user
`machine browser fetches the web page Stored at WWW.Stock
`quote.com. The user machine 120 can now use the Internet
`normally.
`With reference to FIG. 4, an embodiment of the control
`System implemented for a multi-unit property (e.g., a hotel,
`an apartment or the like) is shown in block diagram form.
`Located in each unit 404 is a phone 408 and the user
`machine 120. In this embodiment the phone 408 and user
`machine 120 are coupled to a filter 412 which serves to
`multiplex and demultipleX a voice Signal and a computer
`data Signal to and from a single pair of telephone wires. The
`filter 412 Supports an ethernet connector and an analog or
`digital phone Service connector. By using the ubiquitous pair
`of telephone wires to convey both voice and data, expensive
`rewiring of the property is avoided. It is noted however,
`Separate wires for voice and data Signals could be utilized
`where feasible.
`The combined Voice and data wires running from each
`unit 404 are attached to a punchdown block 416. The
`punchdown block 416 allows interchangeable interconnec
`tion of the incoming telephone wires with the outgoing
`telephone wires. AS those skilled in the art can appreciate,
`wiring and rewiring each unit 404 is made easier by using
`the punchdown block 416. The phone line from each unit
`404 passes from the punchdown block 416 to a concentrator
`420. The concentrator 420 takes the many phone lines from
`each unit and demultiplexes and multiple

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket