throbber
US0058945 16A
`*
`5,894,516
`[11] Patent Number:
`United States Patent os
`Brandenburg
`[45] Date of Patent:
`*Apr. 13, 1999
`
`
`[54] BROADCAST SOFTWARE DISTRIBUTION
`
`[75]
`
`Inventor: Barbara B. Brandenburg, Columbia,
`S.C.
`
`i
`.
`‘
`:
`[73] Assignee: NCR Corporation, Dayton, Ohio
`[*] Notice:
`This patent issued on a continued pros-
`.
`ss
`ecution application filed under 37 CFR
`1.53(d). and is subject to the twenty year
`patent
`term provisions of 35 U.S.C.
`154(a)(2).
`[21] Appl. No.: 08/679,638
`‘
`[22] Filed
`Jul. 10, 1996
`
`ccccsesecccccccsceseenscnevesssensesecsensee H6¢4L 9/00
`Tint. C0S cnc
`[ST]
`vane 3580/4: 380/9; 380/21;
`[52] U.S. Cl.
`......
`380/23:“380/25: 380/49: 380/50; 348/6;
`455/3.1: 455/3.2
`[58] Field of Search ....cccncmennen 380/4, 21,9. 10,
`380/20, 49, 50, 59, 23. 25; 705/26, 27;
`348/6, 7. 8. 9, 12; 455/3.1. 3.2, 4.1, 4.2,
`5.1, 6.1, 63
`
`[56]
`
`References Cited
`
`.....---ssssssrsesecrerers 380/50
`6/1993 Hartman, Jr.
`5,224,166
`veeseeceesenseeeeseneees 380/23
`2/1995 Berson «0...
`5,388,158
`-» 380/4
`2/1995 Hasebe etal.
`5,392,351
`. 380/21
`3/1995 Pahn et al.
`.......
`5,400,403
`- 380/4
`5/1995 Came et al. ...
`5,416,840
`. 380/30
`12/1996 Yuval etal. .....
`5,586,186
`. 38004
`1/1997 Cooper et al.
`51598470
`380/25
`ootge vtooe ntetal.
`..
`w» 455/436
`ADL sas
`ceneeeree
`154,
`5.761301
`6/1998 Oshimaet al. ceceeceeee 380/4
`
`
`
`Primary Examiner—Bernarr E. Gregory
`Attorney, Agent, or Firm—Gates & Cooper
`B4I
`ABSTRACT
`A method. apparatus, and article of manufacture for broad-
`casting encrypted software to a target computer enables
`simultaneous transmission to a plurality of licensed target
`computers. An encryption key is generated to encrypt a
`software package. The encryption key is then itself
`encrypted using a target computer identification code, and
`_, the encrypted encryption key is loaded onto the target
`computer. The encrypted software is broadcast, for example,
`via satellite, and received at the target computer. The target
`computer uses its identification code to decrypt
`the
`encrypted encryption key (i.e., unlock the encryption key).
`Oncethe target computer unlocks the encryption key,it uses
`the encryption key to decrypt the software to be installed on
`the target computer.
`
`U.S. PATENT DOCUMENTS
`6/1991 Johnson et al.
`..........cssssesesseseee 380/4
`5,023,907
`
`
`3,034,980—7/I991 Kubotaeeseensscsesnseeseteeseseees 380/4 21 Claims, 4 Drawing Sheets
`
`
`
`PERIPHERAL COMPUTERS
`
`
`
`
`SOFTWARE
`DISTRIBUTION
`
`
`CENTER
`
`
`
`NSTALLER/RECEIVER
`
`ENCRYPTOR
`
`
`
`Zynga Ex. 1012, p. 1
`Zynga v. IGT
`IPR2022-00199
`
`Zynga Ex. 1012, p. 1
` Zynga v. IGT
` IPR2022-00199
`
`

`

`U.S. Patent
`
`Apr. 13, 1999
`
`Sheet 1 of 4
`
`5,894,516
`
`PERIPHERAL
`
`TARGET
`
`COMPUTER
`
`COMPUTERS
`
`
`ENCRYPTOR
`
` CENTER
`DISTRIBUTION
`SOFTWARE
`
`1
`
`FIG.
`
`Zynga Ex. 1012, p. 2
`Zynga v. IGT
`IPR2022-00199
`
`Zynga Ex. 1012, p. 2
` Zynga v. IGT
` IPR2022-00199
`
`

`

`U.S. Patent
`
`Apr. 13, 1999
`
`Sheet 2 of 4
`
`5,894,516
`
`60
`
`62
`
`INSTALL LICENSING AND RECEIVER/INSTALLER
`PROGRAM ON TARGET COMPUTER
`
`TARGET COMPUTER CALLS SOFTWARE
`DISTRIBUTION CENTER (SDC)
`
`64|TARGET COMPUTER ORDERS SOFTWARE AND PROVIDES
`SDC WITH TARGET COMPUTER ID NUMBER
`
`66
`
`68
`
`70
`
`SDC ENCRYPTS SOFTWARE USING
`TARGET COMPUTER ID NUMBER
`
`SDC PROVIDES ENCRYPTION KEY
`TO TARGET COMPUTER
`
`ENCRYPTION KEY ENTERED INTO
`TARGET COMPUTER
`
`72
`
`74
`
`TIME AND CHANNEL/FREQUENCY OF
`BROADCAST OF SOFTWARE PROVIDED TO
`USER OF TARGET COMPUTER
`
`SDC COMPRESSES AND
`TRANSMITS SOFTWARE
`
`76
`
`TARGET COMPUTER RECEIVES
`TRANSMITTED SOFTWARE
`
`
`
`
`
`
`82
`
`TARGET COMPUTER DISTRIBUTES
`SOFTWARE TO OTHER MACHINES
`
`84
`TARGET COMPUTER DECRYPTS
`AND DECOMPRESSES SOFTWARE
`
`TARGET COMPUTER
`INSTALLS SOFTWARE
`
`FIG. 2
`
`86
`
`Zynga Ex. 1012, p. 3
`Zynga v. IGT
`IPR2022-00199
`
`Zynga Ex. 1012, p. 3
` Zynga v. IGT
` IPR2022-00199
`
`

`

`QN3
`
`Q3SS3IYdNOD
`
`LOndodd
`WNSHO3HSD
`
`
`
`TIWLSNINOISYSA
`
`Qi
`
`Longodd
`
`U.S. Patent
`
`Apr. 13, 1999
`
`Sheet 3 of 4
`
`5,894,516
`
`isvodvoys
`
`Ii
`
`¢“Old
`
`Zynga Ex. 1012, p. 4
`Zynga v. IGT
`IPR2022-00199
`
`Zynga Ex. 1012, p. 4
` Zynga v. IGT
` IPR2022-00199
`
`

`

`US. Patent
`
`Apr. 13, 1999
`
`Sheet 4 of 4
`
`5,894,516
`
`FIG. 4
`
`TRANSMISSION OF COMPRESSED
`SOFTWARE PACKET
`
`TRANSMISSION OF
`CHECKSUM PACKET
`
`COMPUTERS
`
`DETERMINE IF TRANSMISSION
`SUCCESSFUL BY MATCHING
`CHECKSUM WITH COPIED FILE
`
`TARGET COMPUTER DECRYPTS
`AND DECOMPRESSES FILE
`OR DISTRIBUTES TO OTHER
`
`NO
`
`Zynga Ex. 1012, p. 5
`Zynga v. IGT
`IPR2022-00199
`
`Zynga Ex. 1012, p. 5
` Zynga v. IGT
` IPR2022-00199
`
`

`

`5,894,516
`
`1
`BROADCAST SOFTWARE DISTRIBUTION
`
`BACKGROUND OF THE INVENTION
`
`1. Field of the Invention
`
`This invention relates in general to broadcastdistribution,
`and in particular, to broadcast software distribution using
`encryption key locking and unlocking procedures.
`2. Description of Related Art
`The software industry as a whole has experienced tre-
`mendous growth in recent years. There is a continuous
`demand for new software products that address the needs in
`new or changing industries. Moreover. software companies
`routinely upgrade previously-released software products in
`response to specific user needs and/or to provide a product
`in a more efficient manner.
`
`Software companies havetraditionally distributed its soft-
`ware products through physical media such as tapes or
`diskettes, and, more recently, CD ROM. Companies store
`their software on these physical media and ship them to
`customers for installation onto their home computers.
`In distributing software by this method. however, various
`problems have been encountered. The cost of media
`duplication, shipping, and storage is quite high in many such
`applications. Moreover, the elimination of many types of
`such physical media has created unwanted environmental-
`waste concerns.
`In addition.
`this type of distribution
`involves unwanted delay associated with waiting for media
`copies. packing, addressing, and shipping to obtain new
`products or new versions of existing products.
`.
`An alternative method of distributing software is through
`phone lines. Software distribution centers, having a host
`computer with a modem,
`transmit the software through
`phone lines to a customer’s computer in response to the
`customer’s order for particular software packages.
`This alternative form of distribution has also encountered
`problems. The number of customers who can receive a given
`transmission is limited by the physical capabilities of the
`phonelines. If numerous customers order the same software
`package, such as when a company distributes an upgraded
`version to existing subscribers, the software company must
`repeatedly transmit the same software package until all its
`customers have received the product. This approach is both
`costly and time consuming.
`Accordingly, there is a need for an improved method and
`computer system for distributing software that overcomes
`the above-mentioned deficiencies associated with prior tech-
`niques. The present invention provides a solution to these
`and other problems, offering advantages over conventional
`implementations.
`
`SUMMARY OF THE INVENTION
`
`To overcome the limitations in the prior art described
`above, and to overcome other limitations that will become
`apparent upon reading and understanding the present
`specification,
`the present
`invention provides a unique
`method, apparatus, and article of manufacture for broadcast-
`ing encrypted software to a target computer. In one embodi-
`ment of the present invention, an encryption key, which is
`uniqueto the particular software package.is used to encrypt
`the software package.andis then itself encrypted using the
`unique identification code of the target computer. This key
`is loaded onto the target computer. to lock the particular
`software package to the target computer. The software is
`then broadcast from a send computer and received at the
`target computer. In a more particular implementation, the
`
`2
`software is broadcast via satellite. The target computer
`obtains the encryption key by decrypting the encryption key
`using its identification code. The encryption key is then used
`to decrypt the software to enable the software to be installed
`5 onto the target computer.
`
`BRIEF DESCRIPTION OF THE DRAWINGS
`
`Referring now to the drawings in which like reference
`numbers represent corresponding parts throughout:
`FIG. 1 illustrates an exemplary computer system envi-
`ronment for use in accordance with the present invention;
`FIG. 2 is a flow chart illustrating exemplary steps which
`may be used to program the computer system of FIG. 1.
`according to the present invention;
`FIG. 3 illustrates the packets of a compressedfile that are
`transmitted to a target computer in a broadcast session,
`according to the present invention; and
`FIG,4 is a flow chart illustrating exemplary steps, accord-
`ing to the present invention, for verifying that software has
`been successfully transmitted in the system of FIG. 1.
`
`DETAILED DESCRIPTION OF THE
`PREFERRED EMBODIMENT
`
`In the following detailed description of the drawings,
`reference is made to the accompanying drawings which
`form a part hereof. and in which is shown by way of
`illustration a specific embodiment in which the invention
`may be practiced. It is to be understood that other embodi-
`ments may be utilized and structural changes may be made
`without departing from the scope of the present invention.
`FIG. 1 illustrates an exemplary computer system envi-
`ronment that can be used in conjunction with the present
`invention. The exemplary environment includes a host com-
`puter 10 and an encryptor 12 at a Software Distribution
`Center (SDC), a satellite 14 for relaying transmitted
`software, a target computer 18. and peripheral computers
`20a—-n which are coupled to the target computer 18. As
`illustrated, the encryptor 12, which encrypts software pack-
`ages loaded on the host computer 16, is separate from the
`host computer 19. It is understood, however, that the encryp-
`tor 12 can be configured to be part of the host computer 10.
`In the exemplary computer environment of FIG. 1. the
`target computer 18 contains a licensing software program 22
`and a receiver/installer software program 24, which are
`typically embodied on one or more program storage devices,
`A customer is licensed or otherwise authorized to use the
`broadcast service of the present
`invention. With such
`authorization, the customer receives the licensing program
`22 and receiver/installer 24 program loads these programs
`onto the computer 18, thereby enabling receipt of software
`transmitted in accordance with this invention. The licensing
`program 22 provides for the entry and trackingof strings for
`all software products purchased. The licensing program 22
`also generates the unique computer identifier code (e.g..
`computer identification number) for the computer 10 that the
`installer/receiver program 24 runs. As described below, a
`customer provides this unique identification code whenever
`it places an order for a software package. The installer/
`receiver software program 24 enablesthe target computer 18
`to receive software that is broadcasted. for example via
`satellite 14, and to install
`the software onto the target
`computer 18. The peripheral computers 26a—n also contain
`installer/receiver software.
`
`The host computer 10 in FIG. 1 contains a library of
`stored software packages that customers may order. For each
`
`25
`
`30
`
`35
`
`45
`
`50
`
`55
`
`65
`
`Zynga Ex. 1012, p. 6
`Zynga v. IGT
`IPR2022-00199
`
`Zynga Ex. 1012, p. 6
` Zynga v. IGT
` IPR2022-00199
`
`

`

`5,894,516
`
`3
`software package, an encryption key is generated and the
`software package is encrypted using that encryption key.
`The encrypted software is then compressed and stored as
`one packet in a single compressed file. The compressedfile
`also includes a packet which identifies the particular soft-
`ware product included in the file. As described in more detail
`below in connection with FIGS. 3 and 4, each compressed
`file further includes a checksum packet which is generated
`at
`the time the software package is encrypted and
`compressed, enabling the target computer 18 to determine
`whether a software package is transmitted without error. A
`transmitting program on the host computer 10 contains
`information regarding the time at which each software
`package will be transmitted. The transmission and encryp-
`tion of software are performed using techniques well-known
`in the art.
`
`Referring now to FIG. 2, a flow chart is illustrated
`detailing the steps which may be used to program the
`computer system of FIG. 1, with the host computer 10
`tansmitting a software package to a target computer 18
`through a broadcast medium, according to the present inven-
`tion. Block 30 represents installation of a licensing program
`and receiver/installer program on the target computer 18. As
`explained above, only users having this software on their
`computer receive software according to this invention; the
`encrypted software that is transmitted via satellite is other-
`wise unusable.
`
`Blocks 32 and 34 represent the target computer 18 calling
`the SDC to order a particular software package. When the
`customer orders the software, the customer selects an option
`provided by the licensing program 22, which produces the
`identification code of the target computer 18. A customer
`gives his identification code to the operator receiving the
`software order at the SDC.
`Block 36 represents the SDC encrypting the encryption
`key specific to the ordered software package. When the SDC
`receives the identification number of the target computer 18.
`it produces a new key(e.g.. an ASCII string) by encrypting
`the software encryption key for the ordered software pack-
`age using the identification code of the target computer 18.
`The purpose of the new key (i.e., the encrypted encryption
`key) is to lock a particular computer (e.g., the computer with
`the identification code used to encrypt the encryption key) to
`a particular software package. Instead of allowing any
`computer having the encryption key to listen to the broad-
`cast and obtain software illegally, only the target computer
`18 whose identification code is used to encrypt the software
`encryption key, accesses the transmitted software. As rep-
`resented in block 38, the SDC provides the new key to the
`target computer 18. The SDC provides this string to the
`target computer 18, for example. via fax or e-mail.
`Block 40 represents the user of the target computer 18
`entering the encrypted encryption key (i.e.. new key) onto
`the target computer 18. The installer/receiver program on the
`target computer 18 provides a user interface requesting the
`user to insert the new key provided by the SDC. Thetarget
`computer 18 then stores this key.
`Block 42 represents the SDC providing to the user of the
`target computer 18 the time and channel/frequency that the
`ordered software will be broadcast. Software products are
`broadcast from the SDC, for example, during scheduled
`timeslots. Preferably, popular products are broadcast at
`regular intervals, while relatively uncommonsoftware prod-
`ucts are periodically scheduled at the request of a user.
`Block 44 representstransmission ofthe software from the
`SDC at the time and channel/frequency that was communi-
`
`4
`cated to the user in block 42. The software is broadcast as
`one compressed file via satellite. The bits of the file are
`pushed out on the line in a manner similar, for example, to
`transmission over TCP/IP or modem.
`
`Block 46 represents the target computer receiving the
`software that is broadcast via satellite. At the time specified
`for transmission, users “tune in” with their receivers to the
`specified frequency or channel. As an option, the receiver
`could be set up to look for and download a specific list of
`ordered products. or specific versions of a product, For
`example, a user may want to always download new versions
`of products that were already installed so that the user
`always has the latest version of the software product.
`Block 48 represents checking whether the transmissionis
`successful. If the transmission is not successful. then the
`SDC provides the user with the relevant information regard-
`ing the next broadcast of the software. The target computer
`18 then waits until that time that the software is retransmit-
`
`ted and subsequently receives the software as described in
`connection with block 46. If the transmission is successful.
`then, as represented in block 50,
`the target computer
`decrypts the encrypted encryption key using its identifica-
`tion code. Once this is performed,
`the target computer
`decrypts the software using the encryption key specific to
`the software product.
`The decryption of the software. represented in block 52,
`at the target computer 18 occurs as follows. The licensing
`program 22 generates the identification code of the target
`computer 18 which, in turn. is transmitted to the receiver/
`installer program on the target computer 18.
`In the
`alternative, the receiver/installer program itself generates the
`identification code. The receiver/installer program 14 on the
`target computer 18 utilizes this identification number to
`decrypt the encrypted encryption key. The encryption key in
`turn enables the target computer 18 to decrypt(i-e., unlock)
`the transmitted software. This process occurs virtually
`simultaneously,
`thereby making it extremely difficult to
`identify the encryption key during the process.
`Consequently, only the target computer 18 can decrypt the
`software,
`
`Block 54 represents determining whether there are other
`peripheral computers to receive the software. If there are no
`peripheral computers,the target computer 18, as represented
`in blocks 56 and 58, decompresses and installs the software
`onto the target computer 18. Specifically.
`the installer/
`receiver program 24 invokes a routine to decrypt and
`decompress the temporary data file. This part of the instal-
`lation copiesfiles to the file destination with the appropriate
`permissions and ownership on the target computer 18.
`Moreover, it kicks off any installation scripts required to
`complete the installation, configuration, or tuning specific
`for the application installed.
`As depicted in blocks 60, 62 and 64, if there are other
`peripheral computers connected to the target computer 18,
`then the target computer 18 distributes the software to the
`peripheral computers 20a—1 which in turn decompress and
`install the software. As mentioned previously, each of the
`peripheral computers 20e—7 has a receiver/installer software
`product to enable the decompression and installation of the
`software.
`
`Referring to FIG. 3. a compressed file for a software
`package is illustrated, having multiple packets. The com-
`pressed file. generally designated 70, includes a header 72,
`a compressedinstallable file packet 80. a checksum packet
`82, and an end-product broadcast packet 84. The header 72
`includes a begin product broadcast packet 74, a product
`
`20
`
`25
`
`30
`
`35
`
`45
`
`35
`
`65
`
`Zynga Ex. 1012, p. 7
`Zynga v. IGT
`IPR2022-00199
`
`Zynga Ex. 1012, p. 7
` Zynga v. IGT
` IPR2022-00199
`
`

`

`5.894.516
`
`5
`identification packet 76 and a version packet 78. The begin
`product broadcast packet 74 signals the beginning of the
`transmission of a new software product. The product iden-
`tification packet 76 identifies the software product that is
`transmitted. Version packet 78 identifies the particular ver-
`sion of the software product that is transmitted. For example,
`the version packet 78 notifies users when a software product
`upgrade is being transmitted. Other identifying information
`could also be included as part of the header 72. For example,
`there could be a vendor header packet to enable a target
`computer to monitor for all software products that a par-
`ticular vendoroffers.
`
`Packet 86 in the compressedfile contains the compressed
`installable file. This includes the compressed software and
`the configuration scripts.
`Packet 82 is the checksum packet. As described in more
`detail below with the respect to FIG. 4, the checksum packet
`$2 enables the user at the target computer 18 to verify that
`the transmission is successful. The end product broadcast
`packet 84 notifies the target computer that the transmission
`is complete.
`Referring now to FIG.4, a flow chart illustrates the steps
`for verifying that the software is successfully transmitted.
`Block 90 represents the transmission of the compressed
`software contained in the compressed installable file packet
`80. Block 92 represents transmission of the checksum
`packet 82. The checksum packet 82 is generated at the SDC
`whenthe software product is initially compressed and stored
`at the send computer. Based on the contents of the file
`received at the target computer 18, an algorithm contained in
`the receiver/installer program 24 generates a code or number
`based on the compressedfile received at the target computer
`18. This number. which is generated using the same algo-
`rithm that generates the checksum when the software is
`compressed, is compared to the checksum packet 82. If the
`transmission has been successful, the two numbers are the
`same. At block 94 of FIG. 4, it is determined whether the
`transmission is successful by matching the checksum packet
`82 with the code generated by the file copied to the target
`computer 18. If the codes are the same, the target computer
`18. as depicted in block 96, decrypts and decompresses the
`software and installs it on the target computer 18 or distrib-
`utes it to other peripheral computers for decompression and
`installation. If the checksum packet 82 does not match the
`file that was received from the host computer 10, then the
`target computer 18 deletes the file and waits for retransmis-
`sion of the software product.
`Unlike the prior art which provides transmission through
`phone lines,
`the present invention is not limited in the
`number of customers who can receive a given transmission.
`Each customer who orders a particular software product
`receives the software from the same broadcast. Therefore.
`theoretically a single broadcast transmits to an unlimited
`amountof users.
`
`The foregoing description of the preferred embodimentof
`the invention has been presented for the purposes of illus-
`tration and description.It is not intended to be exhaustive or
`to limit the invention to the precise form disclosed. Many
`modifications and variations are possible without departing
`from the scope of the invention as defined by the claims
`appended hereto.
`Whatis claimedis:
`1. A method of distributing software encrypted by a
`software encryption key to a target computer, comprising the
`steps of:
`receiving a number unique to the target computer;
`
`15
`
`20
`
`25
`
`30
`
`35
`
`45
`
`55
`
`65
`
`6
`encrypting the software encryption key using the number
`unique to the target computer unique number;
`transmitting the encrypted software encryption key to the
`target computer;
`communicating a timeslot and channel for broadcasting
`the encrypted software to the target computer; and
`broadcasting a messageat the communicated timeslot and
`channel, the message comprising the encrypted soft-
`ware.
`2. The method of claim 1, wherein the broadcasttimeslot
`is periodically scheduled according to a user request.
`3. The method of claim 1, wherein the transmission
`timeslot is regularly scheduled.
`4, The method of claim 1, wherein:
`the message further comprises a version packet notifying
`the target computer that an upgraded version of the
`software is being transmitted and enabling the target
`computer to download upgraded versions of software
`already instalied on the target computer; and
`the method further comprises the step of decrypting the
`software using the target computer unique number
`when the version indicator indicates that an upgraded
`version of software already installed on the target
`computer is being broadcast.
`5. The method of claim 1, wherein:
`the message further comprises a vendor header packet
`enabling the target computer to monitor broadcasts for
`software products offered by a vendor.
`6. The method of claim 1, further comprising the steps of:
`decrypting the software in the target computer using the
`target computer unique number;
`determining if there are peripheral computers coupled to
`the target computer to receive the decrypted software;
`and
`
`distributing the decrypted software to the peripheral com-
`puters when there are peripheral computers coupled to
`the target computer to receive the decrypted software.
`7. The method of claim 1, wherein the message further
`comprises a checksum packet for determiningif the target
`computer received the encrypted software without error, and
`the method further comprises the steps of:
`receiving the checksum packetin the target computer;
`processing the checksum packetin the target computer to
`determineif the encrypted software was received with-
`out error;
`providing the target computer information regarding a
`next broadcast of the software when the encrypted
`software was not received without error; and
`waiting for retransmission of the encrypted software.
`8. An apparatus for distributing software encrypted by a
`software encryption key to a target computer, comprising:
`means for receiving a number unique to the target com-
`puter;
`means for encrypting the software encryption key using
`the number unique to the target computer unique num-
`ber;
`meansfor transmitting the encrypted software encryption
`key to the target computer;
`means for communicating a timeslot and channel for
`broadcasting the encrypted software to the target com-
`puter; and
`means for broadcasting a message at the communicated
`timeslot and channel,
`the message comprising the
`encrypted software.
`
`Zynga Ex. 1012, p. 8
`Zynga v. IGT
`IPR2022-00199
`
`Zynga Ex. 1012, p. 8
` Zynga v. IGT
` IPR2022-00199
`
`

`

`5,894,516
`
`8
`transmitting the encrypted software encryption key to the
`target computer;
`communicating a timeslot and channel for broadcasting
`the encrypted software to the target computer; and
`broadcasting a messageat the communicated timeslot and
`channel, the message comprising the encrypted soft-
`ware.
`
`7
`9. The apparatus of claim 8, wherein the means for
`providing a timeslot and channel for broadcasting the
`encrypted software to the target computer comprises means
`for periodically scheduling the timeslot according to a user
`request.
`10. The apparatus of claim 8. wherein the means for
`providing a timeslot and channel for broadcasting the
`encrypted software to the target computer comprises means
`for regularly scheduling the transmission time.
`11. The apparatus of claim 8, wherein:
`the message further comprises a version packet notifying
`the target computer that an upgraded version of the
`software is being transmitted and enabling the target
`computer to download upgraded versions of software
`already installed on the target computer; and
`the apparatus further comprises means for decrypting the
`software using the target computer unique number
`when the version indicator indicates that an upgraded
`version of software already installed on the target
`computer is being broadcast.
`12. The apparatus of claim 8.wherein the message further
`comprises a vendor header packet enabling the target com-
`puter to monitor broadcasts for software products offered by
`a vendor.
`13. The apparatus of claim 8. further comprising:
`means for decrypting the software in the target computer
`using the target computer unique number;
`means for determining if there are peripheral computers
`coupled to the target computerto receive the decrypted
`software, and
`
`16. The program storage device of claim 15, wherein the
`broadcast timeslot is periodically scheduled according to a
`user request.
`17. The program storage device of claim 15, wherein the
`transmission timeslot is regularly scheduled.
`18. The program storage device of claim 15, wherein:
`the message further comprises a version packet notifying
`the target computer that an upgraded version of the
`software is being transmitted and enabling the target
`computer to download upgraded versions of software
`already installed on the target computer; and
`the method steps further comprises the method step of
`decrypting the software using the target computer
`unique number when the version indicator indicates
`that an upgraded version of software already installed
`on the target computer is being broadcast.
`19. The program storage device of claim 15, wherein:
`the message further comprises a vendor header packet
`enabling the target computer to monitor broadcasts for
`software products offered by a vendor.
`20. The program storage device of claim 15, wherein the
`means for distributing the decrypted software to the
`method steps further comprise the method steps of:
`peripheral computers when there are peripheral com-
`decrypting the software in the target computer using the
`puters coupled to the target computer to receive the
`decrypted software.
`target computer unique number;
`14. The apparatus of claim 8, wherein the message further
`determining if there are peripheral computers coupled to
`comprises a checksum packet for determining if the target
`the target computer to receive the decrypted software;
`computer received the encrypted software without error, and
`and
`th
`ises:
`
`© apparatus further comprises 49__distributing the decrypted software to the peripheral com-
`means for receiving the checksum packet in the target
`puters when there are peripheral computers coupled to
`computer;
`the target computer to receive the decrypted software.
`means for processing the checksum packet in the target
`21. The program storage device of claim 15, wherein the
`computer to determine if the encrypted software was
`message further comprises a checksum packet for determin-
`received without error;
`ing if the target computer received the encrypted software
`providing the target computer information regarding a
`without error, and the method steps further comprise the
`next broadcast of the software when the encrypted
`method steps of:
`software was not received without error; and
`receiving the checksum packet in the target computer;
`waiting for retransmission of the encrypted software.
`processing the checksum packetin the target computer to
`15. A program storage device. readable by computer, 59
`om
`.
`determineif the encrypted software was received with-
`tangibly embodying one or more programs of instructions
`executable by the computer to perform method steps of
`outerror;
`distributing software encrypted by a software encryption key
`providing the target computer information regarding a
`to a target computer, the method steps comprising the steps
`next broadcast of the software when the encrypted
`of:
`software was not received without error; and
`receiving a number unique to the target computer;
`waiting for retransmission of the encrypted software.
`encrypting the software encryption key using the number
`rd
`unique to the target computer unique number;
`
`—oa
`
`30
`
`35
`
`45
`
`55
`
`Zynga Ex. 1012, p. 9
`Zynga v. IGT
`IPR2022-00199
`
`Zynga Ex. 1012, p. 9
` Zynga v. IGT
` IPR2022-00199
`
`

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket