throbber
DECLARATION AND AFFIRMATION OF BRENDA RAY
`
`I, Brenda Ray, being over 18 year of age and duly s·worn, depose and say as
`
`
`follows:
`
`1.I am an employee of the Auburn University Library, and specifically the Document
`
`
`
`
`
`
`
`
`
`Delivery Unit, located at Auburn University, Auburn, Alabama 36849. I am familiar with
`
`
`
`
`
`
`the policies and procedures of the Library as they relate to the receipt, cataloging, and
`
`
`
`
`tracking of books and I have personal knowledge of the facts set forth below. I am
`
`
`
`
`
`familiar with these procedures because I have been employed by the Library since 1989,
`
`
`
`
`andthen the Science then moved to Serials, where I began in Binding and Receiving,
`
`
`
`
`
`Technology Department, then the Architecture Library and finally the Document
`
`
`
`
`
`Delivery Unit. I have held my current position in the Document Delivery Unit for the last
`17 years.
`
`that when an item is received by the2.It is and has been standard operating procedure
`
`
`
`
`
`
`
`
`Library, it is recei ed, cataloged, physically processed (spine label with call number,
`
`
`
`
`
`tattle-taped, ownership stamp, etc.). The item would then be stamped with date mark. The
`
`
`
`item would be made available to patrons within a few days of the item arriving
`at the library.
`
`3.The Auburn University Library holds an original copy of lectronic Design Volume 45,
`
`
`
`
`
`
`
`
`Issue 27, December 1, 1997. I have been asked for information about Electronic Design
`
`
`
`specifically when this volume was first made publicly available by the Auburn University
`
`
`
`
`
`
`Library. From my review of the Library's records, and my knowledge of the Library s
`
`
`
`
`
`standard procedures, this issue of Electronic Design was cataloged and publicly available
`
`
`
`
`
`in the Library by no later than December 20, 1997, and was in current issues, shelved in
`
`
`
`alphabetical order within a few days after the date of December 20, 1997.
`
`4.In my opinion, the journal lectronic Design was cataloged and available at the Auburn
`
`
`
`
`
`
`
`
`University Library on December 20, 1997 based on the date stamp on a preliminary page
`
`
`
`
`inside this volume of Electronic Design. I have not seen any indication that this volume
`
`
`
`
`of Electronic Design would have been an exception to the Library's standard practice.
`
`
`
`
`
`
`The Library maintains a searchable and publicly accessible catalog of its publications.
`
`
`
`
`Therefore, as of December 31, 1997 any member of the public could have located this
`
`
`
`
`
`volume of Electronic Design by searching our catalog by the title, call number, and/or
`subject matter.
`
`table of contents,copy of the cover, is a true and accurate 5.Exhibit A to this Declaration
`
`
`
`
`
`
`
`
`preliminary page with date stamp and the article "MCNS/DOCSIS MAC Clears A Path
`
`
`
`For The Cable-Modem Invasion" by Lee Goldberg on pages 69-70, 74, 78, 80 from the
`
`
`
`
`journal Electronic Design Volume 45, Issue 27, December 1, 1997, ISSN 0013-4872
`
`
`from the Auburn University Libraries collection.
`
`MEDIATEK EX. 1010
`Page 1 of 11
`
`

`

`I declare and affirm under penalty of perjury that all statements made herein of my own
`
`
`
`
`
`
`
`
`
`knowledge are true and that all statements made on information and belief are believed to be
`
`
`
`
`true; and further that these statements were made with the knowledge that willful false
`
`
`
`
`statements and the like are punishable by fine or imprisonment, or both, under Section 1001 of
`
`
`
`
`Title 18 of the United States Code. If called to testify, I could and would competently testify
`
`
`
`
`
`in this noted, the facts and statements under oath to the facts set forth above. Unless otherwise
`
`
`
`
`Declaration are based on my personal knowledge and my review of the documents discussed
`
`
`
`herein, and I am competent to testify to these facts.
`
`May 11, 2021
`
`Auburn University Libraries
`
`231 Mell Street
`Auburn, AL 36849-5606
`
`BrendaRay �
`
`
`Library Specialist, Tech II
`
`MEDIATEK EX. 1010
`Page 2 of 11
`
`

`

`
`
`
`
`
`
`EXHIBIT A
`EXHIBIT A
`
`MEDIATEKEX.1010
`Page 3 of 11
`
`MEDIATEK EX. 1010
`Page 3 of 11
`
`

`

`TECHNOLOGY• APPLICATIONS· PRODUCTS· SOLUTIONS
`
`DECEMBER l, 1997
`
`
`APENTON PUBLICATION
`$10.00
`
`,
`
`..
`
`.
`
`,.. Cl)�
`
`...
`
`'° *
`
`'°
`
`I etp►O
`II
`;1 ... <114<
`G� i oii51-4 m:c
`� $
`< :i�
`,.. �r-I'"' M
`..... *
`� *
`114 �
`� *
`�,<
`..... ... *N
`•
`
`* �
`
`
`�
`
`0
`
`,.. 0
`
`n
`Cl)
`
`... N
`In ■
`
`CNS/DOCSIS MAC Clears Path For Cable-Modem Invasion p. 69
`
`
`
`
`
`
`
`
`p. 39 Device Developments Annual IEDM Conference Examines Leading-Edge
`
`
`
`At IEDM: Memory, Logic Power Devices, EDA, Sensors, And Displays p. 40
`
`
`
`
`Line-Driver Design For Broadband Communications Applications p. 81
`
`
`
`Parasitic Extraction Tools Aid DSM IC Designs p.97
`
`
`
`
`Harness The Power Of The ACPI/Smart Battery Standard p. 113
`
`Pick The Perfect Chassis To Ensure System
`
`MEDIATEK EX. 1010
`Page 4 of 11
`
`

`

`s,
`
`If you're charged with designing low-power applicaticn
`• <.?.
`
`this little core is a mighty big friend. Motorola's new M h'"'�
`� -cf)
`microRISC engine reduces costs, lengthens battery life and gt ti-Jou �
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`pedormance for the future. A combination of brains and brawn.
`
`
`
`
`
`
`
`A 48MIPS/50MHz RISC core design with UO intelligence
`
`
`
`
`
`
`
`and interrupt performance built in. Plus, its development
`
`
`
`
`
`
`
`tool chains are fully complete and validated to interoperate,
`
`
`
`
`
`
`
`
`
`greatly reducing design time. In other words, it's ready to fly!
`
`
`
`
`
`To find out how Motorola can help you save the day,
`
`direct your mouse to www.motorola.com/mcore
`
`or call 800.521.6274.
`
`® MOTOROLA
`
`
`
`
`
`Semiconductor Products Sector
`
`
`
`What you never thought possible."'
`
`"1!117 MOTOflOIA. INC. Al1 RIGHTS ll!'SUMD. WOTDIIDlA AND ® /Jlf. REGlSTtRED TRADEMARKS
`
`
`
`
`
`AND THE M•CORE NAME AND lDG11 ARE 1111.DEMARKS Of MOTOROIA, INC. MIG1fTY MOUSE, TM & "1991 VIACOM INT'l. INC
`
`MEDIATEK EX. 1010
`Page 5 of 11
`
`

`

`
`
`ELECTRONIC DESIGN
`
`
`
`TECHNOLOGY• APPLICATIONS• PRODUCTS• SOLUTIONS
`
`December 1, 1997 Volume 45, umber 27
`
`EDITORIAL OVERVIEW
`
`DEPARTMENTS
`
`
`
`........ 16, 18, 54
`
`•Ti,ny Engines Fuel A
`
`Revolution
`
`•Consumer Electronics'
`Potential
`
`
`
`
`
`Upcoming Meetings ... 12,
`
`
`
`Editorial ............ 22
`
`
`Technology Briefing •..• 24
`Technology
`...... 27, 30
`Newsletter
`Technology
`
`
`Breakthrough ..•..... 33
`
`
`
`
`
`■MCNS/DOCSIS MAC Clears Path For Cable-Modem Invasion 69
`
`•85-GHz 0.5-W GaAs
`
`
`■ Annual IEDM Conference Examines
`Leading-Edge Device Developments 39
`
`
`
`pHEMTpoints the way
`
`
`
`
`
`■ At IEDM: Memory, Logic Power Devices, EDA, Sensors, And Displays 40
`
`toward low-cost volume
`
`production of MOCVD
`
`
`
`
`
`■ Line-Driver Design For Broadband Communications Applications 81
`MMICs
`
`
`
`
`■ Parasitic Extraction Tools Aid DSM IC Designs 97
`• 0.1-mm electrostatic
`
`microrelays switch at up
`
`
`
`■ H arness The Power Of The ACPI/Smart-Battery Standard 113
`to100GHz
`• Development of blue
`
`
`
`
`■ Pick The Perfect Chassis To Ensure System Longevity 127
`
`phosphor spawns full­
`color EL displays
`
`Info Page ........... 1 0
`
`39 Annual IEDM Conference Examines leading-Edge
`
`
`50 IEDM Focuses On Advanced Device Models
`
`
`
`
`Index of Advertisers •• 184
`Device Developments
`Reader
`
`Service Card .•.. 184A-D
`
`
`
`60 Sensors And Displays HighUghted At IEDM
`
`
`
`
`40 Memory And Logic Structures Are Getting Faster
`And Denser
`69 MCNS/DOCSIS MAC Paves The Way For A
`
`48 Rivalries Between Si1con And Exotic Semkonductors
`
`
`Cable-Modem Invasion ,
`Abound At IEDM
`•
`
`TECH INSIGHTS
`
`TECH INSIGHTS
`(how to find us)
`
`•Models offer new hope in tackling deep­
`•Hear about the latest in memory and logic
`
`s ubmicron issues dealing with process
`
`/Cs, compound semiconductor devices,
`accuracy and interconnect.
`
`
`simulation tools, and sensors and displays.
`
`•Advanced device structures and new
`
`
`technologies are opening the door for emer'(Ji,ng
`
`• Designers detail advanced process tech:niques
`
`
`display and sensor-based applications.
`
`and.finer-dimension design rules at IEDM t o
`
`build next-generation memories and logic.
`
`COMMUNICATIONS TECHNOLOGY
`
`• The frrst standards-compliant chip 1 •
`•SiGe and vanilla silicon move into RF and
`
`optica l applications as compound semi­
`
`means a ffordable, interoperable,
`,
`1
`conductors stake out their niches.
`cable modems, with s peed and
`security features.
`Co9.Yright 1997 by Penton Publishi� Inc. All ri!lhts reserved. The contents of this
`
`
`
`
`
`�lECTRONIC DESIGN (ISSN 0013-4872) is published twice monthly excep for 3
`
`
`
`
`
`
`issues in Mr;ry, 3 issues in August, 3 issues in October and 3 issues in November by
`
`
`
`
`publication may not be reproduced in whole or on part without the consent of the
`
`
`
`
`copyright owner. For subscriber change of address and subscription inguiries, call
`
`
`
`
`tenton Publishing Inc., 1100 Superior Ave., Cleveland, OH 44114-2543. Paid rates
`
`"" a one.year subscription are as follows: $105 U.S., $185 Canada, $210, $255
`
`
`to: Penton Publishing Subscription [216) 696-7000. Mail your subscription requests
`
`
`
`
`International. Periodicals postage poid at Cleveland, OH, and additional mailing
`
`ockbox, P.O. Box 96732, Chicago, ll 60693. POSTMASTER: Please send change
`
`
`
`
`offices. Editorial and advertising addresses: ELECTRONIC DESIGN, 611 Route #46
`
`
`
`
`of address to ELECTRONIC DESIGN. Penton Publishing Inc., 1100 Superior Ave.,
`
`Cleveland, OH 44114-2543.
`
`
`West, Hasbrouck Heights, NJ 07604. Telephone 1201) 393-0060. Facsimile 1201)
`
`
`393-0204. Printed in U.S.A. Title registered in U.S. Patent Office.
`
`MEDIATEK EX. 1010
`Page 6 of 11
`
`

`

`MCNS /DOCS IS MAC Clears A Path For
`
`
`The (Obie-Modem Invasion
`
`The First Standards-Compliant Chip Means Affordable, Interoperable,
`
`
`
`Cable Modems, With Speed And Security Features.
`
`Wt
`
`Lee Goldberg
`the IEE E's 802.14 cable data
`
`
`
`-· standards committee, a group
`
`of large cable interests formed
`
`the MCNS group. Comprised
`
`of heavyweights like Comcast
`
`and Time-Warner, MCNS
`teamed with the cable indus­
`
`
`try's research consortium, Ca­
`ble Labs, Louisville,
`Colo., to produce
`
`their own open standard for
`1 moving data between cable
`
`
`-"""llD:11.- network headends and sub­
`
`scriber's homes.
`
`h the introduction of
`
`the BCM3220 multime­
`dia cable networking
`
`
`systems/Data-Over-Cable-Ser­
`
`vice Interface Specification
`
`(MCNS/DOCSIS) compliant
`
`
`media-access controller (MAC)
`chip, the cable data revolution
`has begun in earnest. By rolling
`
`out the first integrated imple­
`
`mentation of the cable industry's
`
`
`recently developed DOCSIS,
`
`
`Broadcom Corporation has
`paved the way for the rapid de­
`
`
`velopment of inexpensive con­
`
`sumer-oriented cable dat.a appli­
`Enter DOCSIS
`
`ances. This move could provide a
`The first fruit of this alliance is
`
`--·�-
`
`
`critical jump-start for the
`
`
`the DOCSIS specification, de­
`
`emerging cable dat.a industry. If ,i,,s, n4 .: ',; -
`veloped by a group of manufac­
`
`the next year goes according to If J_:afL.
`
`
`turers, under the direction of
`II �
`
`plan, we may see a device that • _
`MCNS and Cable Labs. Partic-
`
`
`develop-down-%�. ;iua ;•.;-.; --m.. =--=-.. h:.:. .. .,-;.-;...;. � ipants in the initial
`
`delivers multimegabit
`
`
`
`stream Internet access being
`
`ment of DOCS IS included Gen­
`
`surfing began to erode cable's near-: eral Instruments,
`
`sold at K-Marts and electronic discount
`
`LAN City (now a
`
`: part of Bay etworks), and Broadcom
`
`
`stores at prices comparable to today's
`
`
`lock on passive leisure activities.
`
`
`
`
`
`After several ill-fated adventures : This spec outlines the physical layer in­
`li6-kbit POTS modems.
`
`proto­: terfaces, MAC and transport
`
`
`with video-on-demand, interactive
`
`
`shopping, and other attempt to die-: cols,
`
`
`security provisions, and other
`The Broadband Wars
`
`
`
`tate consumer taste, cable marketeers : specifications necessary for designing
`
`
`The development of DOC SIS and
`
`
`the introduction of the BCM3220 mark
`
`
`
`
`
`stumbled over the obvious hot applica-: interoperable cable data components.
`
`
`
`
`
`
`tion, broadband Internet access. Once : Subsequent fine-tuning was per­
`
`the first hopeful chapter in the trou­
`
`bled history of cable media's efforts to
`
`the eco-: formed in an open forum hosted by Ca­
`
`early trials demonstrated
`maintain its dominant role in captur­nomic potential, it became clear that : ble Labs and attended by most major ·­
`
`
`
`
`
`
`mass : players in the cable industry. The re­
`
`ing the hearts, minds, and eyes of the
`
`the only way to achieve a critical
`of users was to develop a transmission sult is a standard that meets the needs -
`
`
`
`American consumer. In the early
`
`
`
`standard that would enable the pro-of current users and anticipates the de­
`
`
`nineties, the cable television industry
`
`duction of mass-produced, in ex pen-mands of future applications.
`
`
`
`faced a double threat: While saturated
`
`
`
`sive, interoperable cable modems and DOCSIS is designed to employ one
`
`
`subscriber markets yielded flattening
`
`or more unused video channels within -
`
`
`set-top boxes (Fi,g. 1).
`
`revenues, satellite television, sophisti­
`
`
`cable broadcast Frustrated by the slow progress of the 54-to-860-MHz
`
`
`cated computer games, and Internet
`
`--
`
`MEDIATEK EX. 1010
`Page 7 of 11
`
`

`

`-S'l\'/WJ'!fll!/Jll'lit:W!MiHl'U'U!W :)IANUAKU:»-DA:»t:U 11.ADLt:-MUUt:M MA� J
`
`.---E
`
`L
`
`.J
`
`...
`
`=8
`
`spectrum to transmit IP-based
`
`
`
`
`data across hybrid fiber coax-
`
`ial networks. Complex
`11wn11m11
`modulation Clock p�
`Dlllstlllll
`phase/amplitude
`MAC "" � .
`..., Down• � -
`,Data I PHY I i -� header
`
`enables each 6-MHz down-BCM3116
`stream
`processing s C
` ;::;t""f'+!I
`in_te_r1a_ce
`r
`or 1,;'
`to bring data
`stream channel
`C, � -, 16
`
`into subscribers' homes at up BCM3118 Control
`� ''Data
`
`
`to 38 Mbits/s. Depending on -
`llemp,,._
`'t; �:IE
`
`the bit rate selected by the op­
`MAC MAC
`Timing
`
`
`erator, the shared downstream
`header
`,. message
`recovery
`processing
`processor
`
`
`channel uses either 64-or 256-
`
`circuit (TRC)
`
`(with CRC)
`point quadrature-amplitude
`To
`
`modulation (QAM). While little
`tuner and --
`- Control
`L.__ Serial
`is known about what actual EEPRDM
`, 16
`programming
`CPU inter1ace
`
`
`bandwidth requirements will -��--­SPI bus
`�1--i---..... --+1,,.,,0-ata-
`interface
`
`
`be, initial results from field tri­
`(SPI) I Map parser
`t 7..__ ____ -+'=20_'Address
`l
`
`
`als suggests that a single chan­
`llpltrm Management CPU bus
`1
`I
`
`nel will provide groups of 200
`alloallGII .,,....
`I f7e;l. DES infomalion
`Dual-por1
`Reference
`
`to 1000 subscribers with Inter­
`
`rl i., L'"" block (MIS)
`cont�olle
`clock
`
`net access that is substantially
`DES i _ Q u,slrlllll ◄ :I Up�t;:m
`Clock :---
`
`faster than today's best POTS­
`__.___. __ -,i- encrypt � � _., -
`based services.
`�S�er�ia'-1
`d-ata_,..
`� BCM3037
`
`For communication from the
`.___ __ __, ,-r
`
`T Control UpshamCIIIIDI
`
`home to headend, DOCSIS
`
`uses the 5-to-40-Hz sub-split
`
`
`band as a return path. Using '------------------ ------------ -----'
`
`QPSK today, or 16-QAM in sub­
`
`
`sequent versions, the upstream
`
`
`channel has a theoretical maxi­
`
`mum throughput of 10 Mbits/s
`
`businesses which need them.
`
`
`feature allows it to accommodate both
`
`
`traditional connectionless Internet
`
`
`traffic, as well as latency-sensitive
`
`
`One interesting aspect of DOCSIS
`
`
`Since DOCSIS also is intended to
`
`
`
`multimedia streams. Selectable QoS
`is that it uses MPEG II transport
`
`also will let cable companies offer
`
`
`
`support IP-based video, provisions
`
`streams to move IP data. While not es­
`
`
`
`tiered services with various guaran­
`
`have been made to support several
`
`
`
`sential for today's applications, the
`
`
`teed bit rates and levels of latency to
`
`
`
`
`levels of quality of service (QoS). This
`
`
`standard's developers were looking
`
`
`toward the future. Today, MPEG en­
`
`
`capsulation provides DOCSIS with a
`7 upstream
`BCM303
`Low-pass
`
`
`reliable, well-defined method of set­
`filler
`QPSK/16-QAM
`
`
`
`ting up multiple channels within a sin­
`modulator
`
`gle data stream. In the near future,
`
`MPEG encapsulation will allow a sin­
`Clock Data
`
`gle cable modem to support multiple
`BCM3220 Microcontroller
`sessions
`
`and multiple users, as well as
`
`MAC with Ethernet MAC
`
`
`
`delay-sensitive multimedia streams
`for voice or video over IP.
`
`
`Using MPEG II transport streams
`Clock Data
`ate
`also will allow DOCSIS to interoper
`
`
`with the Open Cable standard for digi­
`Low-pass
`
`
`tal cable television that is currently un­
`, BCM3116 10Base-T RJ45
`filler
`
`der development. Open Cable also em­
`: QAM receiver transceiver
`connector
`' with FEC
`
`
`ploys MPEG II transport streams for
`
`all of its media flows. This feature
`
`
`
`should greatly simplify traffic switch­
`
`
`ing and processing within tomorrow's
`cable networks
`
`
`Although it has some similarities to
`
`the carrier-sense multiple-access/colli­
`sion-detect (CSMA/CD) protocol em-
`
`I.A DOCSIS-c:ompliant cable modem receives its data over unused 6-MHz video channels within
`
`
`
`
`
`
`the normal cable spectrum. Upstream traffic is carried back to the system headend in the 5-to-
`
`
`
`
`
`
`
`
`
`
`
`
`
`45-MHz sub-split band. To ensure that the modem will operate properly and not interfere with
`
`
`
`
`
`other units, both the downstream receiver and upstream modulator/transmitter operate under
`
`
`
`the control of the BCM3220, or other DOCSIS-compatible MAC.
`
`OMA
`-�
`-=
`a,
`'E
`... a,
`�
`l!! E c;i-,e i ,20
`C: ... c::, � If l:z
`-
`• C:
`C>"' C,
`=e E
`:i
`JT
`
`:e
`cc
`a::
`
`en
`
`I!!
`
`....
`
`2. The BCM3220 MAC chip incorporates all control, stream-processing, and security fundions required for a
`
`
`
`
`
`
`
`
`
`
`
`
`
`MCNS /DOCSIS-compHant cable modem. A memory-based DMA interface assures efficient data transfers to
`
`
`
`and from the host controller. Both baseHne and high-security modes also are supported.
`
`(see "Broadband To The Home: Chal­
`
`
`
`lenges On the Last Mile," Electronic
`
`Desi.gn, Oct. 2, 1995,'JYP 67-83) ..
`
`MPEG Everywhere
`
`Coax Diplex
`connector
`filter
`
`54-860 MHz
`
`MEDIATEK EX. 1010
`Page 8 of 11
`
`

`

`STANDARDS-BASED CABLE-MODEM Mill
`■•iM4JIWRMM1,11u:1mic,x•
`
`I
`
`1byle
`
`2 bytes
`
`=1
`
`SID
`
`' ' '
`Request
`
`{upstream only)
`
`BP EH
`element
`
`Other EH elements
`(4 lo 5 byles)
`" .•· -'"""�..,
`
`
`Baseline Privacy
`
`DOCSIS Security:
`
`ecurity for the DOCSIS
`'
`'
`' 1byte
`
`cable modem system is
`'
`'
`'
`'
`'
`'
`'
`1 byla
`
`
`divided between an
`S
`elaborate Full-Security
`
`Type LEN KEY_SEQ Version E T
`
`Specification with remov­
`= 3 or 4
`able, renewable security
`�
`
`modules, and a low-cost, siJn­
`
`pler scheme called Baseline
`
`
`Privacy (BPI). BPI is based
`
`
`on full-bodied concepts, be­
`ginning with the 56-bit Digi­
`
`tal Encryption Standard
`I
`""
`
`(DES) Cipher Block Chain­
`
`FC MAC_PARM LEN Extended header
`Packet POU
`
`p byle) (1 byle) (2 bytes) (4 to 255 bytes) (2 bytes) (18 lo 1518 bytes)
`
`ing algorithm, yet unbur­
`dened by some of the more
`� flmllll
`/... c�
`
`costly and complex security
`, ...
`
`features of its heavy twin.
`�.
`OA SA TJpe,ten User dataCRC
`EHOR_ON
`All DOCSIS cable modems
`(Oto 1500(4 bytes)
`FC lype
`(6 bylesl
`(6 bytes) ( bytes)
`:00 FC PARM =1
`bytes)
`are required to support BPI,
`
`
`ensuring that basic data pri-
`
`
`
`: traffic originating from or destined to a particular modem to
`va£.y is maintained in the shared cable environment.
`
`
`
`
`Privacy is more than sufficient for Internet access appli-: identify a Traffic Encryption Key (TEK) to use. Each TEK
`on the ap-: is a pair of even and odd 56-bit keys. Each key also has a cor-
`cations because it makes a number of assumptions
`
`
`
`
`plication it serves, namely that Internet access is two way, : responding 56-bit initialization vector.
`
`
`
`
`header fields that are neverand therefore not usceptible to passive theft of service; that : All DOCS IS frames have
`
`
`
`
`
`it's not particularly valuable to anyone, but the u er; that re-: encrypted and include an optional field called an Extended
`
`
`
`
`
`
`
`ally important transactions over the Internet (like banking) : Header. Mainly for protocol expansion, this variable area in
`
`
`
`
`
`will be secured with end to end application layer security; : the DOC IS header is used to contain the Baseline Privacy
`
`
`
`
`inand that by changing keys often, individual keys are not : E ·tended H ader (s� the figure). The SID is contained
`
`worth the trouble of stealing. It also is much easier to detect : the BPI Extended Header for each frame to identify which
`
`clones and unauthoriz.ed users of cable modems because the : TEK to use.
`service is two-way.
`
`The modem system is unlike broadcast : Each DOCSIS frame that will be encrypted must contain
`
`
`
`
`pay-per-view video that can be hacked in private-done : a Privacy Extended Header. The header contains a type
`
`modems must not only listen, but speak to be useful.
`
`
`: and version field as well as the SID identifying a particular
`
`
`
`contain an en­that takes binary : encrypted data flow. The SID field also
`
`DES is a cryptographic algorithm
`
`
`
`
`coded data and applies a known algorithm using a ran-: able/di able bit that controls encryption for that particular
`
`
`
`
`domly generated 56--bit key to produce unintelligible or en-: frame and a toggle bit. The toggle bit is used to signify the
`
`
`
`
`crypted bits. The algorithm can be lmown by many but the : cur.rent epoch; that is whether the even or odd key is in use
`
`
`by both : for this frame. This toggle bit allows the protocol to set up a
`
`
`data will be unintelligible unless the key is shared
`
`
`
`
`
`parties. This mutually shared secret allows encrypted traf-: new TEK in the even key slot while actively
`using the odd
`
`: key. When the first frame to use the new key is received, the
`
`
`
`the keys. A 56-bit fie to remain private to those who have
`
`key has 70 quadrillion possible values, and the only guaran-: toggle bit indicates that the epoch has changed and that the
`
`
`
`
`
`
`
`
`teed way of cli covering a truly random key is to try all of ! other key is now in use. The toggle bit also is the 1east-sig­
`
`
`them. Changing keys often reduces the likelihood of sue-: nificant bit of the 4-bit sequence
`field that is used to track
`
`
`cess even further. The challenge in this type of cryptogra-: the history of up to 16 keys by the key exchange protocol.
`
`
`
`
`
`
`data in both up and down·encrypts : Baseline Privacy phy is how to exchange the secret keys easily, yet securely.
`
`
`: stream dir ctions of the cable plant using the extended
`
`Cipher Block Chaining is a form of DES that increases
`vec-: headers to indicate
`
`the strength of the encryption by u ing an initialization
`what to do. DOCSIS MAC messages al­
`
`
`
`
`
`between thetor sent down with the key to preset its ncryption hard-: low a simple key exchange protocol to operate
`
`
`
`
`
`
`ware state. For each eight-byte block encrypted, instead of : headend (or cable modem termination system) and the ca­
`
`resetting or reinitializing, the circuit retains the result from : ble modems. Keys are updated frequently
`and the regil tra­
`
`
`This pro­
`
`
`
`
`
`
`
`the pr vious block's encryption. This chaining of results : tion databases are watched vigilantly for clones.
`
`
`
`
`from one block to the start of the next makes the cryptogra- : vides subscribers with a low-co t but vey effective "lite"
`
`
`
`
`
`for ensuring data privacy. phy stronger since a hacker would need to reconstruct the : security solution
`
`
`entire sequence to break the code instead of just one block. : Contril;ut,ed
`Baseline Privacy uses a Service ID (SID) associated with : dential Broadband Busi:n£Ss
`
`. .-�. :•
`
`.. , .
`'
`
`HCS
`
`'
`
`by Thamas J. Quigley, director of the Resi·
`Unit at Broadcom Carp.
`
`MEDIATEK EX. 1010
`Page 9 of 11
`
`

`

`sTANDARDS-BAsEo CABLE-MODEM MAcJ
`m,,w,\IWA·iH«UEIIDmMt•XN
`■
`
`
`by most other 802-flavored me-:
`scription (UCD) mes ages are
`
`
`crypt logic and a DMA-based, shared­
`ployed
`used to
`:
`
`RAM host interface that has been op­
`
`tell the subscriber equipment
`
`dia, DOCSIS employs a time-slotted
`what
`
`
`the headend is expecting to see.
`
`
`timized for Motorola's QUI CC series
`
`noncontention access scheme for most :
`
`of 680xx and PowerPC-ba ed con­
`
`ofits communication. In order to main-:
`
`
`ta.in order on a busy cable, the MAC :
`
`
`
`trollers. To insure fast, efficient trans­
`
`SPIOn Board
`Part of the BCM3220's job is to in­
`
`
`
`fers, incoming and outgoing Ethernet
`
`chip in each subscriber's modem must :
`keep track of network timing, as well :
`
`
`
`
`terpret these messages and set the
`
`
`
`packets are exchanged whole-cloth in
`
`
`
`transmitter's modulation, timing, and
`a ingle operation, with no buffer
`
`
`as its place in the overall communica-:
`ly. With
`
`FEC parameters according
`
`copying or other overhead-intensive
`tions flow. In contra t to Ethernet's
`:
`
`this in mind, the MAC chip sports an
`
`intermediate steps.
`
`
`CSMA/CD protocol, this more orderly :
`:
`
`
`industry-standard serial program­
`
`The down tream section of the
`
`
`access scheme allows cable operators
`
`ming interface (SPI) bus master inter­
`
`
`BCM3220 interfaces directly with the
`
`to fill their pipeline at up to 75% of :
`face which can be used to configur e
`
`BCM3116 QAM receiver. Since DOC­
`
`
`
`their theoretical capacity. This factor :
`
`and control both the QAM receiver
`
`
`SIS requires that data be encapsu­
`
`
`is critical when subscribers are shar-:
`
`and Burst modulator chips on the fly.
`lated within MPEG II transport
`
`ing bandwidth with 200+ neighbors.
`:
`
`
`If SPI-capable components are used
`
`
`
`streams, the MAC is responsible for
`To satisfy even the t rminally para-
`
`noid, two layers of security are pro-:
`
`
`elsewhere in the modem' design,
`
`extracting it before passing IP frames
`
`the
`
`
`to the host system. Broadcom's de­
`
`BCM3220 also can be programmed to
`
`
`
`vided within DOCSIS, plus the poten-:
`
`set their operating value , such as
`
`
`signers went the spec one better and
`
`
`tial for a completely shielded :
`
`tuner frequencie and amplifier
`
`
`included an MPEG II filter port in
`
`
`
`"tunneling'' protocol for sensitive data '
`gains.
`
`The chip's up tream proce ing sec­
`
`
`transfers such as personal records or
`
`tion is responsible for passing
`
`credit card numbers.
`data to
`
`To S�tisiy Even The Ter-·
`
`
`the headend. Interfacing directly to
`If DOCS IS seems a bit complicated,
`the BCM3037 QAM/QPSK modulator,
`
`it's because it really is. The standard's
`
`
`� minally Paranoid, Two
`
`it transmits MPEG-encapsulated data
`
`
`
`rich feature set and traffic control
`
`a series of time slots that it
`within
`
`scheme require approximately
`
`
`·Layers Of ,security Are
`
`shares with the other modems in the
`
`
`100,000 gates (plus RAM) to imple­
`
`network. To accompli h this task
`
`
`ment, yielding an effective processing
`
`ifroviaed. Within• DOCS IS,
`
`smoothly, it places requests to the
`
`power of 30 to 40 MIPS. In practice,
`
`
`headend during specially designated
`
`you'd probably need a much faster
`-�us A Fully_ Sh�e�ed_
`time periods.
`
`
`CPU to make sure it was available for
`The BCM3220 MAC keep these
`
`
`all the demanding real-time opera­
`
`"Tunneling'"' Protocol.
`
`
`time period traight by referring to
`
`
`
`tions. Despite the complexity, Broad­
`
`
`the upstream bandwidth availability
`
`com was able to follow the evolution of
`
`map that the head end routinely broad­
`
`the standard and deliver a product
`
`
`
`casts. Stored in on-chip registers, this
`
`
`
`their device. This feature allows the
`
`
`
`within nine months of its finalization, :
`map tells the modem whei;i it can re­
`
`
`thanks to its close participation in the
`BCM3220 to be programmed to pass
`
`quest an upstream time slot, transmit
`
`through selected MPEG video ,
`
`development committee.
`
`its data, or perform network mainte­
`
`streams to an external decode
`
`Another factor that gave Broadcom
`
`nance and management functions. For
`
`circuit-a handy feature when de­
`
`
`an inside edge on delivering the MAC
`extended data transfers involving
`
`signing a combination cable
`
`
`chip is its proprietary silicon compiler
`more than one block of data, the
`
`modem/set-top box.
`
`
`technology. Their specially developed
`
`In addition to recovering and pro­
`
`BCM3220 automatically reque ts a se­
`
`
`
`
`software can translate algorithms di­
`
`
`ries of prescheduled piggyback time
`
`
`
`rectly to gate layouts optimized for
`ces ing data, the downstream proces­
`
`
`slots. Thi technique allows it to use a
`
`
`
`minimal cro -talk, propagation delay,
`
`
`sor must perform decryption func­
`single
`
`transfer r que t to move niulti­
`
`tions and receive synchronization and
`
`
`and other critical parameters. While it
`
`
`is primarily used to implement blind-
`
`control mes ages from the headend.
`
`
`block files, increasing throughput and
`
`
`reducing access latency.
`
`
`These messages enable the head end to
`
`
`ingly fast digital filtering and correlat-:
`tell the modem to adjust its data rates
`
`ing algorithms in CMOS logic arrays, :
`and other paramete1 to match chang­
`
`the same software also has been em-:
`Pretty Dam Good Privacy
`
`
`Of course, whenever you're using a
`ing line conditions.
`
`
`ployed to lay out Fast Ethemet MA Cs
`e
`
`
`broadcast media to transmit ensitiv
`
`To avoid conflicts in a shared-media
`
`
`and other control logic requiring com­
`
`data, the issue of security alway
`
`environment, the MAC uses several
`
`plex signal paths and tight timing.
`
`comes up. According to Tom Quigley,
`tools to keep the modem synchronized
`
`
`product manager at Broadcom, DOC­
`
`
`with its neighbors and headend. First,
`A Peek Inside
`
`
`
`SIS provides two grades of s curity at
`
`
`
`Examining the block diagram of the
`
`
`the time-ba e recovery (TRC) func-
`
`
`tion detects and interprets broadcast :
`
`BCM3220 reveals the basic function
`
`
`the hardware level. Both employ the
`
`
`date encryption standard (DES) algo­
`
`timing information. Since MCNS
`
`
`requir d to support full-duplex com­
`
`rithm and Rivest, Shamir, and Adel­
`
`modems can be programmed for a va­
`
`munication using the MCNS protocol
`:
`riety of data rates and transmission
`
`
`(Fig. 2). Many complex functions have :
`
`man (RSA) key exchange. The real
`
`
`difference between the ha eline and
`
`
`been implemented plus encrypt/de-:
`
`
`parameters, up tream channel de-
`
`' -
`
`MEDIATEK EX. 1010
`Page 10 of 11
`
`

`

`�-)I
`-==-1;]
`
`MAC J
`«-u,niiWA·OMl'1
`
`full security is the use of a highly
`
`se­
`cure, removable hardware key for
`, full
`
`
`sensitive applications. In addition
`security uses the full authentic
`ation
`key to encrypt
`
`protocol and a 1024-bit
`
`the exchange of traffic keys.
`
`The BCM3220 supports both levels
`
`
`of security. It performs the DES elec­
`(ECB) and cipher-­
`tronic-code-book
`block-chaining (CBC) functio
`ns in
`
`hardware, along with residual
`block
`(RBT). Normally, a 56-bit
`termination
`, although it can be
`key is employed
`programmed to run with a crippled 40-
`
`
`bit key for export applications.
`If de­
`
`sired, the MAC chip also lets design .
`
`
`ers include application-based security
`
`measures for a third layer of end-to­
`end protection (see "DOCSIS Secu◄
`
`
`
`rity: Baseline Aivacy,"p. 74).
`The advent of the DOCSIS stan­
`
`dard may prove to be a crucial turning
`
`point in the broadband wars between
`
`telephone and cable networks. While a
`
`shared-media system like cable will al­
`
`
`ways be a less than optimal way to de­
`
`liver data to homes, MCNS has done a
`very good job in making cable media
`
`
`
`as efficient, reliable, and secure as pos­
`
`
`sible. For more information, contact
`the MCNS group at: Cable Labs, 400
`
`
`
`Centennial Parkway, Louisville, CO
`
`
`80027;phone (303) 661-9100;jax (303)
`661-9199.
`
`Tum your excess inventory into a
`
`
`
`substantial tax break and help
`send needy kids to college as well.
`
`Rambo's Uzi
`
`Broadcom's first silicon
`,implemen­
`
`
`tation of the DOCSIS standard will
`
`
`surely give rise to a first generation of
`Call for your free guide to learn how
`interoperable cable modems.
`low-cost,
`
`
`
`Telco and xDSL advocates should not
`
`donating your slow moving inventory can
`
`
`take this news lightly. Given the ag­
`
`mean a generous tax write off for your company.
`
`
`gressive nature of the cable industry,
`
`providing them with a standards-com­
`
`pliant MAC chip like the BCM3220 will
`
`
`be like handing Rambo a loaded Uzi.
`
`Call (708) 690-0010
`Peter Roskam
`PRICE AND AVAILABILl'IY
`Executive Director
`now, (he
`
`Available in sample quantities
`durin{J
`BCM3220 will be in full production
`for the par/,
`of 1998. Pricing
`
`the first quarter
`is $30 each, in quantities
`of 10,000.
`Broadcom Corp., 16251 Laguna Canyon,
`
`(714) 450-8700;
`f(M:
`Rd., Irvine, CA 92618;
`(714) 450-8710;
`Internet: www.broadcom.com
`
`CIRCLE 55
`
`1,
`
`P.O. Box 3021. Glen Ellyn, IL 60138
`
`
`FAX (708) 690-0565
`
`
`
`Excess inventory today ... student opponuniry tomorrow
`
`
`
`CIRCLE
`How VALUABLE
`552
`HIGHLY
`553
`MODERATELY
`554
`SLIGHTLY
`
`MEDIATEK EX. 1010
`Page 11 of 11
`
`

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket