Skip to main content

Full text of "USPTO Patents Application 09870801"

See other formats


\ 

V \ 

\ 

INDEPENDENT 
FINANCIAL 
PROVIDER 

1 — ; 



□□□□ 
□□□□ 
□□□□ 


CD 






8 □ 


5 □ 


JLISHIh 






□tfni 



il 




RULES & 
CONTROLS 



FIG. 2A 


CONTENT CREATOR 
102 



REPLACED 


CONTENT USER 1 12 


FIG. 3 


REQUEST 




FIG- 5A 


CONTENT 
CONTAINER 


INFORMATION CONTENT 
304 


PERMISSIONS RECORD 


BUDGETS 
308 


OTHER METHODS 
1000 





FIG. 8 


CPU 
654 

1 


1 






POWER 


SUPPLY J 



€1 







FIG. 11 H 







• 


FIG. 14A 


DEVICE FIRM WIRE LOW LEVEL 
SERVICES 582 

INITIALIZATION 


DOWNLOAD 

CHALLENGE/RESPONSE AND 
AUTHENTICATION 


EEPROM/FLASH MEMORY 

MANAGER 

KERNEL/DISPATCHER 552 
INITIALIZATION 


TASK MANAGER 576 
(SLEEP/AWAKE/CONTEXT SWAP) 


INTERRUPT HANDLER 584 
(TIMER/BIU/POWER FAILAA/ATCHDOG 
TIMER/ENCRYPTION COMPLETED) 


BIU HANDLER 586 


MEMORY MANAGER 578 

INITIALIZATION (SETTING MMU 


VIRTUAL MEMORY MANAGER 580 


SWAP BLOCK PAGING 


EXTERNAL MODULE PAGING 


RPC AND TABLES 550 


MEMORY COMPRESS 


INITIALIZATION 


MESSAGING CODE /SERVICES 
MANAGER 


SEND/RECEIVE 


RPC DISPATCH TABLE 


RPC SERVICE TABLE 


TIME BASE MANAGER 554 

ENCRYTION/DECRYPTION MANAGER 556 


KEY AND TAG MANAGER 558 


KEY STORAGE IN EEPROM 


SUMMARY SERVICES MANAGER 560 


KEY LOCATOR 
KEY GENERATOR 


CONVOLUTION ALGORITHM 


EVENT SUMMARIES 


BUDGET SUMMARIES 


DISTRIBUTER SUMMARY SERVICES 


CHANNEL SERVICES MANAGER 562 


CHANNEL HEADERS 


CHANNEL DETAILS 


LOAD MODULE EXECUTION SERVICES 
568_ 


AUTHENTICATION MANAGER/SECURE 
COMMUNICATION MANAGER 564 


DATABASE MANAGER 566 


MANAGEMENT FILE SUPPORT 


TRANSACTION AND 
SEQUENCE NUMBER SUPPORT 


DTD INTERPRETER 590 


LIBRARY ROUTINES 574 


I/O CALLS(STRING SEARCH ETC.) 


MISC. ITEMS THAT ARE PROBABLY 

LIBRARY ROUTINES 

TAG CHECKING,MD5,CRC'S 


INTERNAL LM'S 572 FOR BASIC 
METHODS 


METER LOAD MODULE(S) 


BILLING LOAD MODULE(S) 


BUDGET LOAD MODULE(S) 


AUDIT LOAD MODULE(S) 


READ OBJECT LOAD MODULE(S) 


WRITE OBJECT LOAD MODULE(S) 


OPEN OBJECT LOAD MODULE(S) 
CLOSE OBJECT LOAD MODULE(S) 


® 


FIG. 14B 


PUBLIC KEY AND PRIVATE KEY, SYSTEM ID, 
AUTHENTICATION CERTIFICATE, VDE SYSTEM PUBLIC 
KEY, PRIVATE DES KEY 


TOP LEVEL KEYS FOR OBJECTS 


TOP LEVEL BUDGET INFO 

METER SUMMATION VALUES 

KEY RECORDS FOR BUDGET RECORDS, AUDIT 
RECORDS, STATIC MANAGEMENT RECORDS, UPDATED 
MANAGEMENT RECORDS, ETC. 


DEVICE DATA TABLE 

SITE ID 

TIME 

ALARMS 

TRANSACTION/SEQUENCE #'S 
MISCELLANEOUS ~ 

MEMORY MAP ~ 

MAP METERS 

LM/UDT TABLE 

TASK MANAGER 576 
CHANNEL(S) 

SUMMARY SERVICES 560 


SECURE DATABASE TAGS 

SRN ENTRIES 


HASH ENTRIES 


FIG. 14C 


STACK 

• 
• 

CHANNEL SWAP BLOCK 


CHANNEL LM 


CHANNEL HEADER & D1 

CONTROL SWAP BLOCK 


CONTROL LM 


CONTROL D1 


COMMIT LM 


COMMIT D1, D2, D3 

EVENT SWAP BLOCK 


EVENT LM 


MAP TABLE (SINGLE) D1 

METER SWAP BLOCK 


METER LM 


METER UDE DELTA, DELTA' 


METER TRAIL LM 


METER TRAIL UDE 
DELTA,DELTA' 

min^cT ciaiad cai nr If 


METER LM 


METER UDE DELTA.DELTA' 


METER TRAIL LM 


METER TRAIL UDE 
DELTA,DELTA' 

BILLING SWAP BLOCK 



BILLING LM 


METER UDE 


BUDGET UDE 


BILLING TABLE UDE 


BILLING TRAIL LM 


BILLING TRAIL UDE DELTA' 



FIG. 15A 


-< 


CHANNEL 

HEADER 
596 

598(1)- 
598(2)- 


CDRI 

594(1) 


CDR2 
594(2) 


RIGHT ID/REF. 


EVENT QUEUE 


EVENT CODE 1/PTR. TO CDR(1) 


EVENT CODE 2/PTR TO CDR(2) 


EVENT CODE N/PTR TO CDR(N) 


JUMP/REFERENCE TABLE 


CHANNEL DETAIL RECORD (1) 


CONTROL METHOD LOAD MODULE REF. 


REF TO OTHER DATA STRUCTURE(S) 


CHANNEL DETAIL RECORD (2) 


LM(1) REF. 


REF. TO DATA STRUCTURE(S) 


LM(2) REF 


REF. TO DATA STRUCTURE(S) 


LM(N) REF. 


REF. TO DATA STRUCTURE(S) 


,597(1) 
, 597(2) 
. 597(3) 
- 597(4) 

, 597(5) 


CDR(N) 
594(N) 


€1 


FIG. 15B 


f OPEN CHANNEL} 

(OBJECT, USER, RIGHT) 





OBTAIN CONTROL 
METHOD 



"BIND" CONTROL J 
METHOD TO 
CHANNEL J 


I 113 

J 


PASS "INIT" EVENT 
TO CHANNEL 


ACCESS 
COMPONENTS 


"BIND" COMPONENTS TO 
CHANNEL BY CONSTRUCTING 
CHANNEL DETAIL RECORD(S) 
FOR EACH EVENT 
WITHIN "RIGHT" 






o 
to 

NAME 
ERVICE 
ECORD 

CN 

m 

UJ 



CO 



BA 





go 



a: 

UJ 
Q 

DYNAMIC UDE 
1200b 

DYNAMIC 

100' 

DYNAMIC 

120: 

STATIC CORES 
1000' a 

STATIC MDEs 
1202a 

STATIC UDEs 
1200a 


CONTENT C 


X 


PUBLIC HEADER 


PRIVATE HEADER 


PRIVATE BODY 
(METHODS 1000) 


PERMISSIONS RECORDS 
I KEY BLOCK{S) 


_810 
812a 


DATA BLOCK 


FIG. 17 



• 


850^ 

PUBLIC HEADER 802 

PRIVATE HEADER 
804 

COPY OF IDENTIFICATION 
ELEMENTS FROM PUBLIC 
HEADER 


PRIVATE BODY(OBJECT LOCAL METHODS, 
LOAD MODULES, AND UDEs) 
806 

CONTENT 812a 

DATA BLOCK 1 


81 2n 

DATA BLOCK n 


PRIVATE 
HEADER 
KEY 

(1 OF MANY) 


PRIVATE BODY 
KEY (IN PERC) 


CONTENTS 
KEY 1 
(IN PERC) 


CONTENTS 

KEY n 
(IN PERC) 


FIG. 18 


PUBLIC HEADER 802 


PRIVATE HEADER 
804 

COPY OF IDENTIFICATION 
ELEMENTS FROM PUBLIC 
HEADER 

808^ 

PLUG 



| KEY BLOCKS 81 d| 

PRIVATE BODY(OBJECT METHODS, 
LOAD MODULES, AND UDEs) 
806 

CONTENT 812a 


DATA BLOCK 1 


81 2n 


DATA BLOCK n 


PRIVATE 
HEADER 
KEY 

(1 OF MANY) 


PRIVATE BODY 
KEY (IN PERC) 


CONTENTS 
KEY 1 
(IN PERC) 


CONTENTS 

KEY n 
(IN PERC) 


FIG. 19 


9 


880 


PUBLIC HEADER 802 


PRIVATE HEADER 
804 


COPY OF IDENTIFICATION 
ELEMENTS FROM PUBLIC 
HEADER 


PRIVATE BODY(OBJECT LOCAL METHODS, 
LOAD MODULES, AND UDEs) 


CONTENT 812a 


DATA BLOCK 1 


5NTE 
CONTAINER 
"TlTFORMATToi 


ADMINISTRATIVE 
OBJECT 


^ CONTEN T 

■pERKTTSSTONS' 
^RECORD 


BUDGETS 


METHODS 



DATA BLOCK n 


FIG. 20 


PUBLIC HEADER 802 


PRIVATE HEADER 
804 


COPY OF IDENTIFICATION 
ELEMENTS FROM PUBLIC 
HEADER 


PRIVATE BODY(OBJECT LOCAL METHODS, 
LOAD MODULES, AND UDEs) 


CONTENT 812 
872a ADMINISTRATIVE INFORMATION 


V EVENT 1 

PARAMETERS! 

DATA 

1 

■ EVENT 2 

PARAMETERS! 

DATA 



EVENT N 

PARAMETERS* 1 

DATA 


874^ 

876^ 

878 

T 


PRIVATE 
HEADER 
KEY 

(1 OF MANY) 


PRIVATE BODY 
KEY (IN PERC) 


CONTENTS 
KEY 

(IN PERC) 


FIG. 21 


FIG. 22 


PUBLIC HEADER 802 

PRIVATE HEADER 804 

COPY OF IDENTIFICATION 
ELEMENTS FROM PUBLIC HEADER 



EVENT 1 
1014 

1016 | 

1018a | 

1018b 


EVENT 2 

METH 

OD EVENT 

TABLE 


EVENT 3 





EVENT 4 

PERC/ 
LM REF. 




EVENT 5 


DATA 
REF 1 



EVENT 6 



DATA 
REF 2 


EVENT 7 










EVENT N 





8 

(MD 

METHOD LOCAL DATA AREA 
Es, UDEs, DTDs OR PORTIONS THEREOF, 
OR REFERENCES THERETO) 


CLEAR 
TEXT 


,1012(1) 

1012(2) 


1012(3) 
SITE 

SPECIFIC 
METHOD 
KEY 

-1012(4) 
-1012(5) 
1012(6) 

.1012(7) 


1012(N) 


SITE 

SPECIFIC 
METHOD 
KEY 


FIG. 23 

1100 


PUBLIC HEADER 802 


CLEAR 

PRIVATE HEADER 
804 

COPY OF IDENTIFICATION 
ELEMENTS FROM PUBLIC 
HEADER 


SITE SPECIFIC 
LM KEY 




ENCRYPTED EXECUTABLE BODY 
1106 


SITE SPECIFIC 
LM KEY 

DTD 1 1108(a) 


SITE SPECIFIC 
LM KEY 




DTD n 1108(n) 
— 


SITE SPECIFIC 
LM KEY 


FIG. 24 


1200, 1202 

\ 


PUBLIC HEADER 802 


CLEAR 

PRIVATE HEADER 
804 

COPY OF IDENTIFICATION 
ELEMENTS FROM PUBLIC 
HEADER 






DATA AREA 
1206 

(MAY REFERENCE ONE OR MORE DTDs) 


SITE SPECIFIC 
UDE KEY 


FIG. 25A 


USAGE BIT MAP 


ELEMENT REPRESENTING PAST 
USAGE OF ONE ATOMIC ELEMENT OF 
OBJECT 


FIG. 25B 

TIME 


JAN. FEB. MAR. APRIL MAY JUNE* 



1 

0 

2 

0 

1 

0 

-J 

RECORDING 

2 

0 

0 

5 

10 

3 


NUMBER 

3 

0 

3 

2 

1 

0 



4 

0 

0 

0 

1 

0 



5 

0 

0 

1 

0 



P6 

0 

0 

°J 




1206 


FIG. 25C 


USAGE PAID FOR 5 MONTHS AGO 

USAGE PAID FOR 4 MONTHS AGO 
I USAGE PAID FOR 3 MONTHS AGO 

I USAGE PAID FOR 2 MONTHS AGO 
\ 1 \USAGE PAID FOR IN PRIOR MONTH 
\ \ \ \USAGE PAID FOR IN CURRENT MONTH 









\ V 1206c 
\ ^ 1206d 
Vl206e 






















• 

• 
• 

WIDE BITMAP 1 
METER METHOD | 



• BILLING METHOD 


P 


FIG. 26 


902 f 


CS0 PRIVATE BODY KEYS 


RIGHTS RECORD HEADER 1 


CSR | RIGHT KEYS 
910a | 912a 


CONTROL SET HEADER 1 916(a)(1) 


CONTROL METHOD 918(a)(1) 


REQUIRED METHOD HEADER 1 922(a)(1)(f) 

924(a)(1)(i)(A) 
METHOD OPTION 

924(a)(1)(i)(B) 
METHOD OPTION 


REQUIRED METHOD HEADER 2 922(a)(1)(ii) 

924(a)(1)(li)(A) 
METHOD OPTION 

924(a)(1)(ii)(B) i 
METHOD OPTION j ' ' " 



CONTROL SET HEADER 2 916(a)(2) 

CONTROL METHOD 918(a)(2) 


REQUIRED METHOD HEADER 1 922(a)(2)(i) 

924(a)(2)(i)(A) 
METHOD OPTION 

924(a)(2)(i)(B) 
METHOD OPTION 


REQUIRED METHOD HEADER 2 922(a)(1)(H) 

924(a)(2)(ii)(A) 
METHOD OPTION 

924(a)(2)(ii)(B) 
METHOD OPTION 



RIGHTS RECORD HEADER 2 
908b 


CSR 
910b 


RIGHT KEYS 
912b 


916(b)(1) 

916(b)(2) 

CONTROL SET HEADER 1 

CONTROL METHOD 


FIG. 26A 


926 . 
928. 
930- 


914(0). 
924(o)(a). 


920(o)(b) 


906a 
906b _ 


HEADER 900 


SITE RECORD NUMBER 


LENGTH OF PRIVATE BODY KEY BLOCK 


LENGTH OF THIS RECORD 


EXPIRATION DATE/TIME FOR THIS RECORD 


LAST MODIFICATION DATE/TIME 


ORIGINAL DISTRIBUTOR ID 


LAST DISTRIBUTOR ID 


CLASS OR TYPE OF PERMISSIONS RECORD/INSTANCE ID 
FOR RECORD CLASS 


NUMBER OF RIGHTS RECORDS 


VALIDATION TAG FOR THE RECORD 


KEY BLOCKS FOR THE PRIVATE BODY(e.g., METHODS) IN OBJECT - — 


CONTROL SET RECORD 0 - COMMON TO ALL RIGHTS 


LENGTH OF THIS RECORD 


NUMBER OF REQUIRED METHOD RECORDS 


ACCESS TAG TO CONTROL MODIFICATION OF THIS RECORD . — 


REQUIRED METHOD RECORD 1 


LENGTH OF THIS RECORD 


NUMBER OF METHOD OPTION RECORDS 


ACCESS TAG TO CONTROL MODIFICATION OF THIS RECORD 


METHOD OPTION RECORD 1 


LENGTH OF THIS RECORD 


LENGTH OF DATA AREA 


METHOD ID (TYPE/OWNER/CLASS/INSTANCE) 


CORRELATION TAG FOR CORRELATION WITH REQUIRED METHOD 


ACCESS TAG TO CONTROL MODIFICATION OF THIS RECORD 


METHOD SPECIFIC ATTRIBUTES 


CHECK VALUE 


METHOD OPTION RECORD 2 


REQUIRED METHOD RECORD 2 


CHECK VALUE 


RIGHTS RECORD 1 
RIGHTS RECORD 2 


CHECK VALUE 


,.932 
,934 
, 936 
.938 


^944 
- 948 
^950 

^952 
• 954 


960 
. 962 


.970 
,972 
-974 
.976 
978 


FIG. 26B 


906a 

< 


908a ^_ 

_ HEADER 


982 


LENGTH OF KEY BLOCK 







LENGTH OF THIS RECORD 

^ 984 



EXPIRATION DATE/TIME FOR THIS RECORD 


^ 986 



RIGHT ID 

_^988 



NUMBER OF CONTROL SETS FOR THIS RIGHT 


- 990 



ACCESS TAG TO CONTROL MODIFICATION OF 
THIS RECORD 


- 992 


CONTROL SET FOR RIGHT 


-910 


KEY BLOCK FOR USE WITH THIS RIGHT 


-912 

914(a)(1)__ 

_ CONTROL SET 1 


914(a)(2)-_ 

CONTROL SET 2 






CHECK VALUE 


__994 


FIG. 27 


444A(1) 

L_ 


HEADER j 
444A ^ 


SITE RECORD NUMBER 


USER (GROUP) ID 


REF. TO "FIRST" COMPLETED OUTGOING SHIPPING RECORD 
REF. TO "LAST" COMPLETED OUTGOING SHIPPING RECORD 


REF. TO "FIRST" SCHEDULED OUTGOING SHIPPING RECORD 


REF. TO "LAST" SCHEDULED OUTGOING SHIPPING RECORD 


VALIDATION TAG FROM NAME SERVICES RECORD 


VALIDATION TAG FOR "FIRST" OUTGOING SHIPPING RECORD(S) _ 


CHECK VALUE 


SHIPPING 
RECORD < 
445(1) 


SITE RECORD NUMBER 

_ 445(1 )(A) 

FIRST DATE/TIME FOR SCHEDULED SHIPMENT 

^445(1)(B) 

LAST DATE/TIME FOR SCHEDULED SHIPMENT 

_ 445(1 )(C) 

ACTUAL DATE/TIME OF COMPLETED SHIPMENT 

_445(1)(D) 

OBJECT ID OF ADMINISTRATIVE OBJECT (TO BE) SHIPPED 

^ 445(1 )(E) 

REF. TO ENTRY IN ADMINISTRATIVE EVENT LOG 

_ 445(1 )(F) 

REF. TO NAME SERVICES RECORD NAMING RECIPIENT 

_ 445(1 )(G) 

PURPOSE OF SHIPMENT 

^ 445(1 )(H) 

STATUS OF SHIPMENT 

— 445(1 )(l) 

REF. TO "PREVIOUS" OUTGOING SHIPPING RECORD 

_445(1)(J) 

REF. TO "NEXT" OUTGOING SHIPPING RECORD 

_445(1)(K) 

VALIDATION TAG FROM HEADER 

^ 445(1 )(L) 

VALIDATION TAG TO ADMINISTRATIVE EVENT LOG 

_445(1)(M) 

VALIDATION TAG TO NAME SERVICES RECORD 

_^445(1)(N) 

VALIDATION TAG FROM PREVIOUS RECORD 

445(1 )(0) 

VALIDATION TAG TO NEXT RECORD 

— 445(1 )(P) 

CHECK VALUE 

^ 445(1 )(Q) 



SHIPPING RECORD N 

— 445(1 )(R) 


ft 


FIG. 28 


446A(1) 

I 

^.446 


SITE RECORD NUMBER 



USER (GROUP) ID 

446A(2) 


REF. TO "FIRST" COMPLETED INCOMING RECEIVING RECORD 

£ t £ }Dn^J ) 


REF. TO "LAST" COMPLETED INCOMING RECEIVING RECORD 

446A(4) 


REF. TO "FIRST" SCHEDULED INCOMING RECEIVING RECORD 

__^446A(5) 


oircr -rri »i act" crucni II Fn INPOMINC5 RECEIVING RECORD 

446A(6) 


VALIDATION TAG FROM NAME SERVICES RECORD 

__446A(7) 


VALIDATION TAG FOR "FIRST" INCOMING RECEIVING RECORD(S) _ 

___446A(8) 


CHECK VALUE 

— 446A(9) 





SITE RECORD NUMBER 

— 447(1 )(A) 


FIRST DATE/TIME FOR SCHEDULED RECEPTION 

_^447(1)(B) 


LAST DATE/TIME FOR SCHEDULED RECEPTION 

- 447(1)(C) 


ACTUAL DATE/TIME OF COMPLETED RECEPTION 

_447(1)(D) 


OBJECT ID OF ADMINISTRATIVE OBJECT (TO BE) RECEIVED 

_^ 447(1 )(E) 


REF. TO ENTRY IN ADMINISTRATIVE EVENT LOG 

_ 447(1 )(F) 


REF. TO NAME SERVICES RECORD NAMING SENDER 

447(1 )(G) 


PURPOSE OF RECEPTION 

_^ 44/(1 )(H) 


STATUS OF RECEPTION 

— 447(1)(l) 


REF. TO "PREVIOUS" INCOMING RECEIVING RECORD _ 

— 447(1 )(J) 


REF. TO "NEXT" INCOMING RECEIVING RECORD 

- 447(1 )(K) 


VALIDATION TAGS 

447(1 )(L) 


CHECK VALUE 

__447(1)(M) 





RECEIVING RECORD N 

447(2) 


FIG. 29 


HEADER 
443A " 


ADMIN. 
EVENT LOG 
RECORD < 
442(J) X 


SUBRECORD 
442(J)(1) 


ADMINISTRATIVE EVENT LOG RECORD 1 


ADMINISTRATIVE EVENT LOG RECORD 2 


SITE RECORD NUMBER 


RECORD LENGTH 


ID OF ADMINISTRATIVE OBJECT 


NUMBER OF EVENTS 


VALIDATION TAG FROM SHIPPING OR 
RECEIVING TABLE 


CHECK VALUE 


SUBRECORD LENGTH 


DATA AREA LENGTH 


RECORD TYPE 


CHECK VALUE 


SUBRECORD N 


ADMINISTRATIVE EVENT LOG RECORD N 


442 

r 

^442(1) 
_442(2) 


_ 443A(1) 
443A(2) 
_443A(3) 
^ 443A(4) 

_ 443A(5) 

_443A(6) 
- 442(J)(1)(a) 
_442(J)(1)(b) 
. 442(J)(1)(c) 
-442(J)(1)(d) 
~442(J)(1)(e) 
_442(J)(1)(f) 
_442(J)(1)(g) 



466(1) 

466(2) ^ 

466(3) _ 
466(4)^ 

f 

466(5) 

466(6) 
466(7) 

466(8) 


SITE RECORD NUMBER 


OBJECT TYPE 


CREATOR ID 


POINTER INTO SUBJECT 
TABLE 462 


ATTRIBUTE(S) 


MINIMUM REGISTRATION INTERVAL 


TAG TO SUBJECT TABLE 
RECORD 


CHECK VALUE 


TO SUBJECT 
TABLE RECORD(S) 


V460(N) 


FIG. 31 


FIG. 32 


SUBJECT 
RECORD ^ 
470(1) ^ 


SITE RECORD NUMBER 


CREATOR ID 


ORIGINAL DISTRIBUTOR ID 


LAST DISTRIBUTOR ID 


REF. TO "FIRST" SUBJECT 
RECORD 470 


TAG FROM OBJECT REGISTRATION 
TABLE RECORD 


TAG TO "FIRST" SUBJECT RECORD 


CHECK VALUE 


SITE RECORD NUMBER 


USER (USER GROUP) ID 


USER (USER GROUP) ATTRIBUTES 


REF. INTO USER RIGHTS TABLE 


REF. TO "NEXT' SUBJECT 
RECORD 


TAG FROM HEADER 


TAG TO USER RIGHTS TABLE RECORD 


TAG TO "NEXT" SUBJECT RECORD 


CHECK VALUE 


462 

468(1) 

^468(2) 

,468(3)^ 

_468(4) 

^468(5) 
,468(6) 


-468(7) 
t 468(8) 
.468(9) 


_ 472(3) 


^472(4) RECORDS 
- 472(5) 


. 472(6) 

^472(7) 

^472(8) 
. 472(9) 


FIG. 33 


FROM 
SUBJECT 
TABLE 



SITE RECORD NUMBER 



NUMBER OF RIGHTS RECORDS 

URT 

REF. TO "FIRST" RIGHT RECORD 


HEADER 

TAG FROM SUBJECT TABLE 



TAG TO RIGHTS RECORD 


CHECK VALUE 

• 

K 

RIGHTS 

SITE RECORD NUMBER FOR THIS 
RIGHTS RECORD 

RECORD 
HEADER 

RIGHT ID 



POINTER TO "NEXT" RIGHTS RECORD 


POINTER TO "FIRST" SET OF USER 
CHOICE RECORDS 



TAG FROM URT HEADER 



TAG TO "FIRST" SET OF USER 
CHOICE RECORDS 


476(7) 

CHECK VALUE 



2 

SET 

SITE RECORD NUMBER FOR THIS 
USER CHOICE RECORD 

OF 
USER 
CHOICE 

USER(USER GROUP) ID 


ATTRIBUTES 

RECORDS 

REF. TO "NEXT" SET OF USER CHOICE RECORDS 


NUMBER OF USER CHOICES 


TAG FROM RIGHTS RECORD HEADER 


USER CHOICE RECORD 1 



USER CHOICE RECORD 2 





USER CHOICE RECORD N 


CHECK VALUE 


464 
774(1 ) 

474(2) 

.474(3) 464(K 
474(4) ^/ 

,474(5) 

,474(6) 

■476(1) 

476(2) 
476(3) 
476(4) 

-476(5) 
476(6) 


^478(1) 

^ 478(2) 
^ 478(3) 

. 478(4) 
,478(5) 
, 478(6) 
_ 480(1) 
480(2) 


FIG. 34 


SITE RECORD TABLE 



© 


FIG. 34A 


482 


^ 482(J) 

/ 

TYPE OF RECORD 


484(1) 

OWNER OR CREATOR OF RECORD 


484(2) 

CLASS 


484(3) 

INSTANCE 


_484(4) 

TYPE SPECIFIC DESCRIPTOR (e.g., OBJECT ID) ASSOCIATED 
WITH RECORD 

484(5) 

TABLE IN WHICH THE RECORD IS LOCATED 


__484(6) 

POINTER - OFFSET, WITHIN THE TABLE, TO WHERE 
THE RECORD BEGINS 

^484(7) 

RECORD LENGTH 

484(8) 

VALIDATION TAG FOR RECORD 

484(9) 

CHECK VALUE 


_484(10) 




FIG. 34B 


486 




J 


486(J) 


SITE RECORD NUMBER 

488(1) 

NUMBER OF REFERENCE SUBRECORDS 

488(2) 

VALIDATION TAG FOR GROUP OF RECORDS 

488(3) 

REFERENCE SUBRECORD 1 

—488(4) 


REF.(SITE RECORD NUMBER 1) FOR 1ST RECORD IN 
GROUP 

^ 490(A) 


VALIDATION TAG FOR RECORD 

_^ 490(B) 

RE 

FERENCE SUBRECORD 2 

- 488(5) 


REF.(SITE RECORD NUMBER 2) FOR 1ST RECORD IN 
GROUP 

490(C) 


VALIDATION TAG FOR RECORD 

490(D) 

• 


CHECKSUM (CRC) 

__488(6) 




QSTART 


1152 
1154 


FIG. 35 


APPLIANCE CALLS CLEARINGHOUSE 


APPLIANCE AND CLEARINGHOUSE AUTHENTICATE ONE 
ANOTHER AND AGREE ON A MESSAGE KEY 



DOES APPLIANCE HAVE 
AUDIT INFO TO SEND? 


APPLIANCE SENDS ADMINISTRATIVE OBJECT(S) 
CONTAINING AUDIT INFO 


CLEARINGHOUSE SENDS RESPONSIVE ADMIN. OBJECT(S)| 


APPLIANCE UPDATES SECURE DATABASE 
BASED ON OBJECTS RECEIVED 



APPLIANCE SENDS ADMINISTRATIVE OBJECT(S) | 
REQUESTING BUDGETS AND/OR PERMISSIONS 


CLEARINGHOUSE SENDS RESPONSIVE 
ADMINISTRATIVE OBJECT(S) 


APPLIANCE UPDATES SECURE DATABASE BASED| 
ON OBJECTS RECEIVED I 


END 


rg a: w 

y 3 w 

!= O < 

j_ ai qq 

CO < 

w y < 


to 

CO 

CD 



i= < 

Z cq 

^ .< 


H LU 

LU 3 

CO O 

Z LU 

— CO 


>- ^ 


'§11 

e> o m 


LU CO CD 
z 2 < Z 
LU X < 


1^ 

CO 

d 










.AINTE 


UJ 

h- 


CL 


PLAN 

CL 

-EMENT 

o 


z 


m ^ o 


LU 


MANAGEMI 
FILE KEY /> 
ENCRYPTI 
DATA 


1 

\ 

READ ITEM 
FROM 
SECURE 
DATABASE 



S9i 


9 


FIG. 38 


STORE ITEM IN 
SECURE DATABASE 


GENERATE NEW KEY 


ENCRYPT RECORD 
WITH NEW KEY 



READ AND DECRYPT 
OTHER RECORD(S) 
FROM SECURE 
DATABASE 
USING OLD KEY(S) 


RE-ENCRYPT SAID 
OTHER RECORD(S) 
USING NEW KEY 


DISCARD OLD KEY(S) 


SAVE NEW KEY 


STORE ENCRYPTED 
RECORD(S) 
IN SECURE DATABASE 


FIG. 39 



ENCRYPT 
SERVICES j 
WITH BACY 
WRH 
BACKUP 

SUMMARY 
<MJDIT INFO. 
CUP KEY(S), 
rE TO 
3 STORE 



ENCRYPT BACKUP 
KEY(S) AND OTHER ID 
INFO. 
WITH PUBLIC KEY; 
WRITE TO 
BACKUP STORE 


ENCRYPT BACKUP 
KEY(S) WITH ADMIN. 
KEY; WRITE TO 
BACKUP STORE 


FIG. 40 


START ^ 


ESTABLISH 
SECURE 
COMMUNICATIONS 


EXTRACT 
"WORK IN PROGRESS" 
AND SUMMARY VALUES 




REQUEST 
BACKUP F 

CURRENT 
ROM SPU 


RESET SUMMARY 
VALUES AND COUNTERS 
CONSISTENT WITH LAST 
BACKUP 


RESTORE SECURE DB 
FROM BACKUP 


COMPUTE BILLS BASED 
ON RECOVERED 
VALUES 


PERFORIN 
ACTIONS TC 
FROM SPU 

n OTHER 
) RECOVER 
DOWNTIME 




600B N 


VDE Node 


1000B- 


METHOD 




Response -1 






\^ Event and 
optional information 


600A N 


VDE Node 


METHOD 



Request-1 








FIG. 41a 


il 


VDE Node 


1000B- 


\ 

METHOD 



^ Response -1 



Request-4 


-1468 


1469 > 


Event and 
opiional information 


Event and 
optional information 


VDE Node 


1000A- 


METHOD 




Request-1 



Response -4 




-1470 


FIG. 41b 


FIG. 41c 


VDE Node 


1000Cv 


1460 

\ 


\ 

METHOD 



^Response -2 



Request-3 


600B V 


1458 — 

1464-^ Event 
Event and 
and optional 
optional information 
information 


VDE Node 


1000B- 


r-1456 


METHOD 


r1466 


Response -3 1 


x Response -1 


Request-4 


■1468 


1452 ^ 


Event and 
optional information 


Event and 
optional information 


VDE Node 


r-1450 



Request-1 



Response-4 


•1470 


• 


FIG. 41d 


Content object creator VDE node 
1484A ^ 1480A 


\ 

BUDGET 
/ 


Use / 

\ ' Request 

^Response 

/ Reply 


Distribute 

/ 

1475A 

-1472A 


-Use- 


1482AB 


1474AB. 


1482AB 
N 


Request 
More More 
Grant Budget Budget 
Budget 


Content object distributor VDE node 

1484B V I-1480B r 1476B 


\ 

METHOD 
/ 


Use 1 

\ 

Request 

^Response 

/ Reply 


Distribute 

/ 

1475B 

-1472B 


1478B 
-Use * 


1482BC 


1474BC 


1482BC 
N 


Request 
More More 
Grant Budget Budget 
Budget 
__] 


Content use VDE node 


1510O 


-1480C 


BUDGET 


Use / 


Request 



Reply 




;I478C 
-Use-- 


-1475C 


€1 


Start BUDGET Method^ 
Use Process J 
i 

Atomic Element, 
Event Count 


,2250 


/2252 


Prime BUDGET 
Audit Trail 


- Write 


BUDGET Audit 
Trail UDE 



Save BUDGET 
Use Audit Record 


C 


- Write 


BUDGET Audit 
Trail UDE 


BUDGET Method 
Succeeded 


FIG. 42a 


Start BUDGET Method 
Administrative 
Request Process 


Prime BUDGET 
Administrative 
Audit Trail 


- Wriie - 


,.2284 


Queue Request 
for Administrative 
Processing 
of BUDGET 


Save BUDGET 
Administrative 
Audit Trail 


- Write 


- Write 


,2250 


-4" 


BUDGET 
Administrative 
Audit Trail 


BUDGET 
Administrative 
Request 


2290 


BUDGET 
Administrative 
Audit Trail 


Some time later 


Prime 
communications 
audit trail 




Write BUDGET 
Administrative 
Request into 
Administrative 
Object 


/2292 
— Write - 


- Read - 




Save 
communications 
audit trail 


2300 


f Communications 
audit trail 


BUDGET UDE, 
BUDGET Audit 
Trail UDE(s), 
and BUDGET 
Administrative 


, Request \ 
\ Record(s) \ 


2302 


Communications 
audit trail 


/2298 


2304 


End BUDGET Method 
Administrative 
. Request Process . 


FIG. 42b 


Start BUDGET Method 
Administrative 
Response Process 


Prime BUDGET 
Communications and 
Response Audit Trail 


/2306 


— Write - 


Unpack Admin. 
Object and retrieve 
BUDGET 
request(s), audit 
trail(s) and record(s) 


T 


✓2310 


Retrieve request and / 231 4 
determine the response 

method to run to H~ Read " 
process the request 


Send event(s) 
contained in 
Request record(s) 
to the Response 
Method and 
generate 
Response records 
and Response 
request 


^2318 
-Read/Write 


Write BUDGET 
Administrative 
Response records 
into Administrative 


-•-Read 


Save communications 

and response 
processing audit trail 


- Write - 


-2250 


Communications 
and Response 
v Audit Trail 


BUDGET 
Administrative 
Request, Budget [ 

records, and 
\. audit information \ 


Administrative 
Request 


H BUDGET Request [/ 2320 
and Response 
records 



2328 


I Communications I 
and response I 
processing I 
I audit trail \ 


2330 


End BUDGET Method 
Administrative 
Response Process 


FIG. 42c 


Start BUDGET Method 
Administrative 
Reply Process 


Prime BUDGET 
Administrative and 
Communications 
Audit Trail 


2332 


-2250 


/ BUDGET 


. write » ( Administrative and [ 
\ Communications I 
\ Audit Trail ] 


Extract Response Records 
and Requests from 

Administrative Object and 
write Reply records to 
the secure database 


f BUDGET Reply //2338 
- Write — *4 Records and Y 
\ Requests I 


Save BUDGET 
Administrative and 
Communications 
Audit Trail 


/2340 
— Write 


BUDGET I 
Administrative and / 
Communications \ 
Audit Trail \ 


Audit Trail UDE 


Some time later 


Prime audit trail 
(if required) 


( 

- Write —A Audit Trail UDE V 


Retrieve Reply record 
and determine method 
required to process it 


Send event(s) 
contained in Reply 
record(s) to the 
Reply Method 
and 

generate/update 
database records 


2348 


2346 


— Read / BUDGET Reply 

\ Record(s) 


2350 


/ 

— Read/Write— ^BUDGET Records 


Delete Reply record(s) 
from database 


— Delete— 4 BUDGET Reply 
V Record(s) 


Write 
I 


Prime audit trail 
(if required) 


f End BUDGET 
Method 
Administrative 
v Reply Process 

2356 


FIG. 42d 


/ Start REGISTER \ 
I Method Use Process J 


.2400 


FIG. 43a 


REGISTER Event 

I 


Prime REGISTER 
Audit Trail 


writn^f REGISTER 
- Write -H Traj|UDE 



2408 


PERC and/or 


Extract REGISTER 
record set from PERC U- Read -[ REGISTER MDE | 
or REGISTER MDE \ (catalog) 


required pieces > — No - 
available 



Queue REGISTER 
request record 


REGISTER 
Request 
Record 


(^REGISTER Method^ 2 ' 
V Suspended J 


User selects 
registration options 

from method 
options in PERC 


No 


-^Display 


2426 


Validate user selected 
registration options 


URT 


All 

selections 
validated 


✓2428 


Write URT 
containing user 
selections to 
database 


2432 
/ 


Write REGISTER 
Audit Record 


2434 

X 


Write 


' REGISTER 
i Trail UDE 


/REGISTER 
f Method 
\Completed 


2436 


® 


FIG. 43b 


Start REGISTER N 
I Method Administrative ) 


.2400 



/ 

Prime communications 
audit trail 


/ 


/2440 


^2446 


Determine site 

configuration as L_ n par { 

permitted by ^~ " eaa 

privacy filter 


Communications 
audit trail 


Stored data 


Write REGISTER 
Administrative 
Request into 
Administrative 
Object 


/ REGISTER 

j I Administrative 

\ Request 
\ Record(s) 


Save communications 
audit trail 


/2454 


Communications i 
audit trail 


^2456 

f End REGISTER ^\ 
f Method Administrative ) 
\^ Request Process 


f Start REGISTER ^\ 
Method Administrative J 
^Response Process y 

\ 


/2460 


Prime REGISTER 
Communications and 
Response Audit Trail 


.2400 


FIG. 43c 


/ Communications / 
and Response r 
[ Audit Trail \ 


Unpack Admin. 
Object and retrieve 
REGISTER 
request(s) 


REGISTER 
Administrative 
Requests and 
configuration 

information 


.2466 


Retrieve request 
and determine the 
response method to 
run to process 
the request 



Administrative 
Request 


Send event(s) 
contained in Request 
record{s) to the 
Response Method 

and generate 
Response records 
and Response 
Request 


Write failure 
response record 
to database 


Write REGISTER 

Administrative 
Response records 
into Administrative 
Object 


_Z1 


Read/Write - 


REGISTER 
Request and 
Response records 
(response records, 
PERC, UDE(s)) 


^2482 


PERC, UDE(s) 
Methods and 
REGISTER 
Administrative 
Response Records 


save communications 

and response 
processing audit trail 


- Write 



2488 


/" End REGISTER ^\ 
( Method Administration J 
X^Response Process y 


f Start REGISTER \ 
Method Administrative j 
Repiy Process y 


Prime REGISTER 
Administrative and 
Communications 
Audit Trail 


/2490 


- Write - 


,2400 


FIG. 43d 


/ REGISTER / 
J Administrative and l/ CH * c 
\ Communications I 
\ Audit Trail \ 


Extract Response 
Records and Requests 
from Administrative 
Object and write 
Reply records to 
the secure database 


- Write - 


REGISTER 
Reply Records 
and Requests 


2496 


Save REGISTER 
Administrative and 
Communications 
Audit Trail 


Some time later 


Prime Audit Trail 
(if required) 


- Write - 


✓2501 


Retrieve Reply record 
and determine method 
required to process it 


Send event(s) 
contained in Reply 

record(s) to the 
Reply method and 

generate/update 
database records 


Read/Write -H 


/ REGISTER / 
/Administrative and I 
\ Communications I 
\ Audit Trail \ 


Audit trail records \ 


REGISTER Reply I 
I records ' 


,2513 


Audit trail records 


✓2502 


I 

Write 


'REGISTER secure / 
database records , 
(Methods, Load 
Modules, MDE, 
UDE) 


2508 ' 


Delete Reply record(s) 
from database 


REGISTER 
Reply Record(s) 


2511 


Write Audit Trail 
(if required) 


2512 


/" End REGISTER ^\ 
f Method Administration ] 
\ ^ Reply Process y 


Start AUDIT Method 
Administrative 
Request Process 


.2520 


FIG. 44a 


Prime AUDIT 
Administrative 
Audit Trail 


- Write 


Queue Request for 

Administrative 
Processing of AUDIT 


AUDIT 
Administrative 
Audit Trail 


AUDIT 
Administrative 
Request 


^2524 


Save AUDIT 
Administrative 
Audit Trail 


- Write 


AUDIT 
Administrative 
Audit Trail 


Some time later 


Prime 
communications 
audit trail 


✓ 2534 


Communications 
. audit trail 


Write AUDIT 
Administrative 
Request(s) into 
Administrative 
Object 


- Read - 


^1 


Specific UDE, 
' Audit Trail UDE(s), / 
and Administrative! 
Request 
Record(s) 


f End AUDIT Method^ 
( Administration 
\^ Request Process ^ 


-2542 


Save communications 
audit trail 

/ Communications A/- 2544 
_ write —4 audit trail T 




Start AUDIT MethodN 
Administrative j 
Response Process ^/ 


FIG. 44b 


^2520 


Prime AUDIT 
Communications and 
Response Audit Trail 


Communications 
and Response 
, Audit Trail 


Unpack Admin. 
Object and retrieve 
AUDIT request(s) 

audit trail(s) and 
record(s) 


- Write - 


Retrieve request and 
determine the 

response method to 
run to process' 
the request 


2558 

V 

- Read - 


AUDIT / 
Administrative //2556 
Request, Budget | 
records, and audit \ 
information \ 


Administrative 
Request 


Send event(s) 
contained in 
Request record(s) 
to the Response 
Method and generate 
Response records 
and Response 
request 


Write AUDIT 
Administrative 
Response records 
into Administrative 
Object 


'2562 


— Read/Write 


2570 


Save communications 

and response 
processing audit trail 

~ 1 


AUDIT Request 
and Response 
records 


2568 


I AUDIT UDE(s), / 
and Administrative J 
Response \ 
V Record(s) \ 


/ Communications / 
and response I 
i processing I 
V audit trail \ 


_ 2574 

1 / 


End AUDIT Method 

Administration 
Response Process 


'Start AUDIT Method\ 
Administrative J 
^ Reply Process J 

V 


Prime AUDIT 
Administrative and 
Communications 
Audit Trail 


Extract Response 
Records and 
Requests from 
Administrative Object 
and write Reply to 
the secure database 



Save AUDIT 
Administrative and 
Communications 
Audit Trail 


2588 

V 

- Write 


2520 


FIG. 44c 


AUDIT 
Administrative 
Communications 
Audit Trail 


AUDIT Reply 
Records and 
Requests 


Save AUDIT / 
Administrative and I 
Communications 1 
Audit Trail * 


,2590 


Some time later 


Retrieve Reply record 
and determine method 
required to process it 


Send event(s) 
contained in Reply 

record(s) to the 
Reply method and 

generate/update 
database records 


- Read 


✓ 2595 


AUDIT Reply 
records 


secure database 
records 


Delete Reply record(s) f AUDIT Reply 

from database | delete— H Record(s) 


1 / 


End AUDIT Method 
Administration 
Reply Process 



II 


FIG. 46 


SYSTEM EVENT 
OCCURS 


CONTROL SET_ 
FROM PERC 


CONTROL 
METHOD 



(D 




f Start of OPEN A 
\Method Process J 


-1500 


OPEN Event 

1 


CONTROL Method 


Create Read Channel 
and establish read/ 

use controls |_ Bi |,j ng Va | U e , 

-•-Budget Value- 


■ Atomic Element and Count ■ 


EVENT 
Method 


• Atomic Element and Count ■ 
Meter Value 


— Meter Value - 

- Billing Amount - 


Read Channel 


1510 

z 


BUDGET 
Method 


1508 

z 


BILLING 
Method 


End of OPEN A 
Method Process J 


1506 
/ 


METER 
Method 


FIG. 49 



il 


1500 


( Start of OPEN "\ 
V Method Process J 


-1502 


Open Event 

i 


^1520 


Determine 
identification 
of object and user 
to be opened. 



1534 


Open Event, Object ID, User ID, Channel ID 

_L_ 


Audit UDE 


Write 


Prime Audit 
(if required) 


1533 


Start Secure 
Database Transaction 


1536 

V 


CONTROL Method 


FIG. 49a 


,1502 


1538 

Prime EVENT \ 
Audit Trail >— Write - 
(if required) / 


Map OPEN 
Event to Atomic 
Element* and 
event count using 
Map MDE 


T 


^1504 


'EVENT Method / 
, Audit Trail UDE 


EVENT Method 
Map MDE 


Event, Event Count, Atomic Element #, Object ID, User ID 


1546- 


Write EVENT 
Audit Trail 
(if required) 


EVENT Method 
Audit Trail UDE 


Atomic Element #, Event Count 



— No, Fail EVENT Method 


EVENT Method 



. . Roll back secure 

EVENT Method^ No _^ database 
.Succeeded?. 


1556 


>^QPEN Method Failed) 


CONTROL Method (cont'd) 


FIG. 49b 



Add EVENT 

Count to 
Meter Value 


/ METER / 
Read/Write-^ Method UDE 
\ (the Meter) \ 



1582- 


^ 1502 


.1508 


1578 


' Prime BILLING Y / BILLING 

Audit Trail )— Write— +1 Method Audit 
(if required) / \ Trail UDE 


Map Atomic 
Element #, Count, 
and Meter Value to 
Billing Amount 
using Map MDE 


I 

Billing Amount 

i 


-Read 


Write BILLING 
Audit Trail 
(if required) 


— Write 


Billing Amount 


.1590 


i — Yes, Pass 


— No, Fail BILLING Method 



_Z 


1580 


1584 


BILLING / 
Method Map 
MDE (Price list) \ 


BILLING 
Method Audit 
Trail UDE 


BILLING Method 


-nn i 1L ,\ Roll back secure 

BILLING Method^ No database 
- .Succeeded? 


/ 


»»(oPEN Method Failed) 


CONTROL Method (cont'd) 


FIG. 49d 


® 


,1502 


,1510 


1598 


1600 


'prime BUDGET \ / BUDGET 

Audit Trail )— Write— H Method Audit 
\ (if required) / \ Trail UDE 


1602- 


Add Billing 
Amount to 
Budget Value 


/ BUDGET / 
-Read/Write-H Method UDE 
V (the Budget) \ 



V©/ 


-1502 


Write OPEN Audit 
Trail (if required) 


— Write — *I Audit UDE 


Establish channel 
for READ Event 
Processing 


I 

Channel ID 


-Read 



^1 


URT, PERC for 
(object, user) I 


1628 


Roll back secure 
database 
transaction 


1630 
/ 


jf OPEN Method^ 
Failed J 


CONTROL Method (cont'd) 


FIG. 49f 


1634- 


Tear down 
channel for open 
processing 
(optional) 


> X 

f OPEN Method Process A 
V. Completed J 


f Start of READ A 
\Method Process/ 


-1650 


READ Event 

I 


CONTROL Method 


Decrypt, fingerprint 
and obscure content H Biliin 9 Value " 
-•-Budget Value- 


■ READ Event ■ 


■ Atomic Element and Count ■ 


• Atomic Element and Count • 
Meter Value 


— Meter Value - 

- Billing Amount - 


Decrypted Content 


f End of READ "\ 
V Method Process / 


1660 

z 


1658 

z 


^1654 


EVENT 
Method 


1656 
/ 



FIG. 50 


1650 


f Start of READ 
V Method Process ) 


- 1652 


READ Event 

i 


✓ 1662 


Determine 
identification of 
object and user ID 
for read 


READ Event, Object ID, User ID 
.1664 



FIG. 50a 


1678- 


.1652 


-1654 


Prime EVENT X J EVENT Method / 

Audit Traii V- Write Audjt Trai , UD£ 
(if required) / \ ' 


Map READ 
Event to Atomic 
Element # and 
event count using 
Map MDE 


T 


✓ 1680 


- Read - 


EVENT Method 
Map MDE 


Event, Event Count, Atomic Element #, Object ID, User ID 


1682- 


Write EVENT 
Audit Trail 
(if required) 


_z 


1684 


EVENT Method 
Audit Traii UDE 


Atomic Element #, Event Count 

\ 



J FIG. 50b 



/1 656 

/ 1694 /. 

Prime METER V / METER Method / 

Audit Trail V- Wnte Audit Traj| UDE 
(if required) / V \ 


Add EVENT 

Count to 
Meter Value 


1700 


«*- Read/ Writer 


/ METER 

Method UDE 
V (the Meter) \ 



1658 


,1716 


Prime BILLiNG \ / BILLING 

Audit Trail V- Write —H Method Audit 
if required) / \ Trail UDE 


/1720 


Map Atomic 
Element #, Count, 
and Meter Value to 
Billing Amount 
using Map MDE 


/ BILLING / 
- Read — Method Map 
\ MDE (Price !ist)\ 


Silling Amount 

i 


Write BILLING 
Audit Trail 
(if required) 


1 

Billing Amount 


- Write 


BILLING 
Method Audit 
Trail UDE 


Yes, Pass 


-•-No, Fail BILLING Method 



BILLING Method 


BILLING Method^ 
.Succeeded?., 


-No-*- 


Roll back secure 
database 
transaction 


1732 
/ 


»^READ Method Failed^ 


Yes 


FIG. 50d 


CONTROL Method (cont'd) 


(I 


, — Yes, FAILS 


,1562 


1734 

'Prime BUDGET^ 

Audit Trail >— Write 
(if required) 


,1660 




Add Billing 
Amount to 
Budget Value 



Write BUDGET 
Audit Trail 
(if required) 





1744 


- Write 



-No, PASS 



BUDGET Method 



No-* 


Roll back secure 
database 
transaction 


1752 


■^READ Method Failed) 


CONTROL Method (cont'd) 


FIG. 50e 


FIG. 50f 


1766 



READ Method ^\ 
I Process Completed J 


f Start of WRITERS 
I Method Process J 

WRITE Event 

1 


-1780 


CONTROL Method 

Encrypt content and 
update event 


■ Atomic Element and Count ■ 


■ Atomic Element and Count ■ 
Meter Value 


— Meter Value - 

- Billing Amount - 


— Billing Value - 
Budget Value- 


Encrypted Content 


f End of WRITER 
\Method Process J 


1790 

z 


1788 

z 


✓ 1784 


EVENT 
Method 


1786 
/ 



FIG. 51 


1780 


/ x /1 

( Start of WRITE y 
\Method Process 


WRiTE Event 


-1782 


_Z 


1804 


✓ 1794 


Determine 
identification of 
object and user ID 
for read 


WRITE Event, Object ID, User ID 
.1796 



Write -J P rimeAud j! 
\ (if required) 


Start Secure 
Database Transaction 


1798 


Call the 
OPEN 
Method for 
the Object. 
Restart the 
WRITE Method 
once the 
registration 
is complete. 


CONTROL Method 


FIG. 51a 


,1782 


, 1784 


1806 


Prime EVENT V_ / EVENT Method I 

Audit Trail V- Write - J Audjt Traj| UDE 
(if required) / \ ' 


Map WRiTE 
Event to Atomic 
Element # and 
event count using 
Map MDE 


- Read - 


f EVENT Method 
i Map MDE 


Event, Event Count, Atomic Element #, Object ID, User ID 


Write EVENT 
Audit Trail 
(if required) 


- Write - 


EVENT Method 
Audit Trail UDE 


Atomic Element #, Event Count 


Yes, Pass 



1820 


Update EVENT 
Method Map 
MDE to reflect 
new data 


PASS if update succeeded, FAIL otherwise ■ 


EVENT Method 


1822 



Roll back secure 
No -*\ database 
transaction 


/ 


1826 
/ 


-(WRITE Method Failed) 


CONTROL Method (cont'd) 


FIG. 51b 


,1782 


.1786 


/ 1828 L 

Prime METER V_ _J METER Method / 
Audit Trad Y- Write - J Audjt Traij UD£ 
(if required) / V \ 


Add EVENT 


Meter Value 


1836 


METER 


Count to Read/ Write -H Method UDE 



— Write — J ^ 


(the Meter) 


METER Method f 
Audit Trail UDE I 


Yes, Pass 


No, Fail METER Method 


METER Method 


1844 


,.. CTCD .. .. - Roll back secure 

METER Method^. No _^ database 
.Succeeded? 



/ 


18 
/ 


^WRITE Method Failed) 


CONTROL Method (cont'd) 


■ x ( C) /'~N FIG. 51c 


® 



Map Atomic 
Element #, Count, 
and Meter Value to 
Billing Amount 
using Map MDE 


-Read 



Billing Amount 


Write BILLING 
Audit Trail 
(if required) 


1 

Billing Amount 


- Write 


BILLING 
Method Audit 
Trail UDE 


1862 




Yes, Pass — Billing Amount 
Selected?^ 


— No, Fail BILLING Method 


BILLING Method 



/ 

Roll back secure 

database 

— ( 

transaction 



1868 
/ 


^WRITE Method Failed) 


CONTROL Method (cont'd) 


J FIG. 51 d 


• 


\0/ 


.1782 


.1790 


1874- 


1870 

Prime BUDGET \ 

Audit Trail >— Write 
(if required) / 




Add Billing 
Amount to 
Budget Value 



Write BUDGET 
Audit Trail 
(if required) 


^1 


BUDGET 
Method Audit 
Trail UDE 


_z 


1876 


BUDGET / 
Method UDE 
(the Budget) \ 





CONTROL Method (cont'd) 



FIG. 51e 


1D 



1890 


Write 
WRITE Audit 
Trail (if required) 


— Write - 


Determine key to 
use to encrypt 
content 


- Read - 


Audit UDE 


PERC for 
(object, user) 


Encrypt content 
using ENCRYPT 
method 


CONTROL Method (cont'd) 


Write content to 
object using 
ACCESS 
method 


Update container 
TOC and related 
information 


Commit secure 
database transaction 


1906 

A 


FIG. 51f 


C WRITE Method 
Process Completed J 


f Start CLOSE Method^) 
\^ Process J 


1920 



/ 

Prime Audit Trail 
(if required) 


/ 

Destroy channel 
and 

release resources 


/ 

Write Audit Trail . 
(if required) 




✓ 1926 


f End CLOSE Method^) 
V. Process ) 


1924 


Write — *H Audit UDE 


Write — +\ Audit UDE 


FIG. 52 


EVENT, Event Count, 
Event Parameters 


1942 

Prime EVENT ' 

Audit Trail ) Write - 

(if required) 


EVENT Method 
Audit Trail UDE 


^1 


Load MAP MDE DTD 


— Read — f 1 


Map Event to Atomic 
Element # and event 
count using Map MDE 


Event, Event Count, Atomic Element #, 
Object ID, User ID 


1970 


Write EVENT Audit 
Trail (if required) 


- Write - 


EVENT Method 
Map DTD i 


1952 


- — Read — ( 1 


EVENT Method 
Map MDE 


1972 


EVENT Method 
Audit Trail UDE 


Atomic Element #, 
Event Count 


Atomic Element 
Selected? 


. No „ ( EVENT Method } 
failed J 



FIG. 53a 


f Start of MAP ^| 
V Process J 


Event, Event Count, AE #, 
Object ID, User ID 



Compare event range 
to AE translation table 
and determine AE # 
and optional count 

1 

AE # 



FIG. 53b 


^BILLING Method StarT) 


-1980 


Meter Value 

\ . 

Prime BILLING 
Audit Trail 
(if required) 


Write J BILLING Method 

wnie Audjt Trajj UDE 



/1985 

Load MAP MDE DTD 



1988 




Map meter value to 


billing amount using 


Map MDE (and 


possibly database 


elements) 



-Read 


BILLING Method 
Map DTD 


1989 


/ BILLING Method / 

i Map MDE (and 

\optionally others) \ 


Billing Amount 

I / 


1990 


Write BILLING Audit 
Trail (if required) 


^1 


— Write - 


/ BILLING Method / 
*\ Audit Trail UDE \ 



Billing Amount 

| ^ 1998 

f BILLING Method A 
V Succeeded J 


FIG. 53c 


<2 


ACCESS Method Start 


.2000 


Prime ACCESS 
Audit Trail 
(if required) 


2004 


(ACCESS Method f 
Audit Trail UDE 1 


2006 


Load ACCESS Method 
MDE DTD 


o oqH I ACCESS Method [ 

- Read I djd I 


2010 


Load encrypted 
content source and 
routing information 


^1 


^ RpflH f ACCESS Method [ 

"~ Read_ 1 MDE \ 


Location of Content 

✓2014 



2016 


Open connection to 
the content service. 


- Failure -4 ACCE C S S Method 
V Failed 


Obtain encrypted 
content 


, /2022 

Write ACCESS Audit 
Trail (if required) 




- Write - 


/ACCESS Method 
Audit Trail UDE 


X 1 

( End of ACCESS \ 
V Method J 


FIG. 54 


f Start DECRYPT^ 
V Method J 

Block to decrypt 

| /2032 


Select key number 
from key block 


Load key from _ . 

PERC r— Read 


/2038 


Convolute key 
(if required) 


Decrypt block 


Decrypted Block 


f End of DECRYPT^ 
\^ Method J 


,.2030 


_z 


2036 


FIG. 55a 


f Start ENCRYPT^ 
\^ Method J 


.2050 


Block to Encrypt 


Determine key to 
use from key 
block 


i / 

Load key from PERC 
or 

Add key to PERC 


2054 


2056 


- Read/Write - 


PERC 


/2 058 

Convolute key 
(if required) 


/2 060 

Encrypt block 


Encrypted Block 



FIG. 55b 



Static 


2074 


Read content 
information from 
object 


Release content 
description 


f End of CONTENT^ 
y Method J 


2070 


Securely read 
information from 
container 
(according to 
synopsis algorithm) 
and produce 
synopsis 


Read 

I 


Object container 


FIG. 56 


( Start EXTRACT^ 
V Method Process ) 


Object ID, Source 
container ID 


,2080 


Prime Audit 


/2082 


-Read 


Audit UDE 


"7/2084 


Call BUDGET 
method to check 
extract budget for 

original object 



Write Failure 

— ( 

Audit record 



2104 


User specifies new 

or changed 
controls and calls a 
method to create a 
new PERC that 
reflects these 
controls 


2100 


(J 


End of EXTRACT ) 
Process J 


,/End of EXTRACT^ 
V. Method J 


User 
" Input 


✓2106 


Display 


FIG. 57a 


( Start EMBED } 
V Method Process J 


Object ID, Destination 
container ID 


.2110 


✓2112 
— Write 


Audit UDE 


Call BUDGET 
method to check 
embed budget for 
destination object 


2116 



/ 


Write object into 
destination 
container, abstracting 

controls (calling a 
method to abstract or 
change the controls) 


z 


2128 


User specifies new 

or changed 
controls and calls a 
method to create a 
new PERC that 
reflects these 
controls 



FIG. 57b 


z 


2122 


Write Failure 

, f End of EMBED 

Audit record 

V Method 


User 
" Input 


Display 



c 


Start FINGERPRINT A 
Method / 


,2160 


Call EVENT 
Method to 
determine if 
content is in range 
to be fingerprinted 


2162 



^_ Read { FINGERPRINT N o 

r— neau | MethodMDE(s) I 


Apply transform 


^End of 


2176 


FINGERPRINT \ 
Method / 


FIG. 58b 



f Start of DESTROY "\ 
\ ^ Method J 


Prime Audit 




Call ACCESS 
Method to write 
garbage at head 
of object 


2186 



/2188 

Mark URT or other 
control structures 
as damaged 

Write 


/2192 

Write Audit 

Write 


, /2196 

f End of DESTROY "\ 
y Method J 


.218 


^1 


Audit UDE 


2190 


URT or other 
I control structures 


Audit UDE 


FIG. 59 


c 


Start of PANIC 
Method 


3 


^2200 


Prime Audit 


2204 


- Write - 


Audit UDE 


Call CLOSE 
Method to close 
the channel 


Mark controls 
as damaged 


Write Audit 



9 


Start METER Method^ 
Use Process J 
i 

Atomic Element, 
Event Count 
\ 2222 


Prime METER 
Audit Trail 


- Write - 


2226 


Obtain DTD for 
METER 


Obtain METER 


- Read - 


.2220 


2224 


METER Audit 
Trail UDE 


2228 


DqqH / DTD for METER I 

.Read— I ude I 


2232 


METER UDE 



2236 
^ 


Commit METER 
Failure Audit Record 


Update METER using 
Atomic Element 
and count 


2242 


Save METER Use 
Audit Record 


METER Audit 
Trail UDE 


^2238 

JMETER MethooM 
\^ Failed J 


f METER Method "Y^ 
V. Succeeded J 


FIG. 61 


FIG. 62 


SECRET KEY 
CONVOLUTION SEED 
VALUE 



RTC 528 
HIGH BITS 


CURRENT 
CONVOLUTION 
KEY 


CONTENT KEY FROM 
PERC 808 


ACTUAL 
CONTENT 
KEY 



1 19 II ::U I ' M il' i r 


® 


LM CERT. PUB KEY(S) 
DOWNLOAD PUB KEY(S) 


FIG. 64 


^ 23- 

( MFG SITE CERT -V— 
f PUB KEY J 

2812 

>1 


MFG SITE CERT 
PRIV KEY 


/" SITE ID AND "\ 
I CHARACTERISTICS V 


PPE EXTENSION TO 
GEN SITE CERT 
DURING MFG 
(OPTIONAL) 


MFG CERT. GEN 
► (PKSIGN) 


2815 

^ SITE PUB KEY 


SITE ID 
CERT 


SITE PRIV KEY 


c 


SITE DB KEYS 


281 

> 


PPE ( SITE PRNG SEED"~Tp-- 
650 V V 


VDE 
CERTIF. 
DB 


SECURE 
NO N -VOLATILE 
KEY 
STORAGE 


® 


FIG. 65 


PRIV HDR KEYS 


VDE 
CERT1F 
DB 


SITE PUB KEY 


1l 


-n. 283 

y 


EXT. COMM KEYS 


FROM SITE CERT i 
2823 i 


^ ADMIN O BJ^EYS^^^y 


^ OTHER SHARED KEY^ 


PK ENCRYPT 


PK DECRYPT 


SITE PRIV KEY 2816 


SECURE 
NON-VOLATILE 
KEY 
STORAGE 


® 


FIG. 66 r 


ADMIN OBJECTI 
(CONTROLS) r 
870 


STATIONARY I 
CONTENT 
OBJECT 
850 


SECURE NON- 
VOLATILE KEY 
STORAGE 
2802 


PRIV HDR KEY 
2831 


SECURE DB KEY 
2817 


* 

DECRYPT 


▼ 

ENCRYPT 


PRIVATE BODY 
KEY FROM 
PERC 810 


DECRYPT 


SECURE 
DATABASE 
610 


111 III I. !' I !'!""! Ill" I!' 



TRAVELING 
OBJECT 
860 


SECURE DB 
610 


FIG. 67 


FIG. 68 


RESET 
SPU 


ESTABLISH 
SECURE 
COMMUNICATIONS 


UPDATE 
SPU INTERNAL 
BOOTSTRAP 


DOWNLOAD 
FIRMWARE 
INTO SPU 


DOWNLOAD ■ 1 380 
UNIQUE DEVICE 
ID INTO SPU 


DOWNLOAD/INIT. 
KEYS, TAGS 
AND CERTIFICATES 


INITIALIZE 
SPU 

REAL TIME CLOCK! 


INITIALIZE 
SUMMARY 
VALUES 


INITIALIZE 
SECURE 
DATABASE 


V 

~| 137 

r 

-. 1378 

y 
v 

k 131 

V 

H138 

h138C 

~| 1388 

Jr 



iwiirnr'i'inri 


2630 

\ 


600(1) 


600(2) 


654(1) 


CPU 


ROM 

658(1 


2632(1) 


500(1 
654(2). 


V INTER- 
FACE/ 
" CTRL 


2636 
653(2) 


STORAGE 



MECHANISM 


jj CONTROLLER 


2632(2) 


620 j 

I ROM 


RAM 


SPU 


658(2) 

656(2) 


500(2) J 


2634(2) | 


INTER- 
FACE/ 
CTRL 


2631 
(672) 


600(3) 


2638 
653(3) 


654(3) 


DISPLAY 
MECHANISM 


jj CONTROLLER 

II 


ROM 
658(3)7 


U 


BUS 


RAM 
656(3)7 


u 


SPU 
500(3)7 


2632(3) 

r 


2634(3) 


INTER- 
FACE/ 
CTRL 


FIG.70 


653(N) 
A 


PRINT 
MECHANISM 


I CONTROLLER 


ROM 
658(N)-^ 


RAM 
656(N)3? 


SPU 
500(Np r 


2632(N) 


INTER- 
FACE/ 
CTRL 


'linn: nun iiiibi 



LOG IN USER INTERFACE 


USER NAME: | SHEAR, V. 
PASSWORD: I * * * * * 


□ 


LOGIN AT STARTUP 


FIG. 72A 


FIG. 72B 


YOU HAVE REQUESTED THESE 
PROPERTIES: 


LOONEY TUNES NEWS! 


PROPERTY INFO 


2662 

Your Cost: $7.50 MORE OPTIONS 



9 



o 

I 


Q 

CM 

O 

Li. 


uj — . 

c/> CO 

Q ^ 

0 . 
uj >- 
DH Uj 

§ § 

1 3 


<3 


• • • • 

4 4 4 

in? 


4 4 


5 5 5 


^ in r- 


S S S 

5 55 


5 ^ 


II i inns 


9 


FIG. 73 


PUBLIC HEADER 


PRIVATE HEADER 


PRIVATE BODY 


RULES 
FOR 


CONTAINER 300 


RULES 
FOR 
CONTAINER 
300x 


RULES 

FOR 
RIGHTS 
NEGOTIATION 


RULES 
FOR 

CONTAINER 300y 


CONTENT 
OBJECT 


SOFTWARE AGENT 


RULES 
FOR 

CONTAINER 300w 


RULES 
FOR 

CONTAINER 300z 


RULES 

FOR 
AGENT 
EXECUTION 


CONTENT 
OBJECT 


RULES 
FOR 
INFORMATION " 
SEARCH 


INFORMATION (ROUTING) 
LOCATIONS AND RELATED DATA 


CONTENT 
OBJECT 


RULES 
FOR 
INFORMATION 
RETRIEVED 


INFORMATION RETRIEVED 


ADMIN. 
OBJECT 


AUDIT HISTORY OF 
AGENT 
EXECUTION 


RULES 

FOR 
AUDIT 
RETURNED 


. 300z(1) 


_ 300y{1) 
, 300y{2) 

- 300x(1) 

- 300x(2) 
^ 300w(1) 

300w(2) 


il 


FIG. 74 


SOFTWARE 
DESCRIPTION 
LIST 
DATABASE 


VDE SITE WITH AGENT 
EXECUTION SERVICE AND 
SOFTWARE DESCRIPTION 
LIST DATABASE 


SOFTWARE 
DESCRIPTION 
LIST 
DATABASE 


VDE SITE WITH AGENT 
EXECUTION SERVICE AND 
SOFTWARE DESCRIPTION 
LIST DATABASE 


INFORMATION 
LOCATOR 
DATABASE 


SMART OBJECT 
SEND TO SECOND VDE 
SITE AFTER FAILURE ON t 
FIRST VDE SITE 3022 


SMART OBJECT 
WITH DESIRED 
INFORMATION 
RETURNS TO 
SENDER 


VDE SITE WITH 
INFORMATION LOCATOR 
SERVICE 


SMART OBJECT 
. SENT TO VDE SITE - 
DESIRED SERVICES 


1 
3014 


SMART OFJECT SENT TO DETERMINE 
- LOCATION OF DATABASE TO USE 


USER VDE SITE 


9 


FIG. 75A 


PERC HEADER 


PRIVATE 
BODY KEYS 


USE RIGHT HDR 


PERMITTED CONTROL SET 
(USE W/O INFO. PASSBACK) 


CONTROL METHOD (VENDING) 


REQUIRED METHOD, BUDGET 

METHOD OPTION: 
VISA 

METHOD OPTION: 
MASTERCARD 

METHOD OPTION: 
AMEX 


REQUIRED METHOD, BILLING ($100 FIXED, ONE TIME) 



DESIRED CONTROL SET 
(USE WITH INFO. PASSBACK) 

CONTROL METHOD (VENDING _ 
WITH "RESPONSE CARD") 


REQUIRED METHOD, BUDGET 

METHOD OPTION: 
VISA 

METHOD OPTION: 
MASTERCARD 

METHOD OPTION: 
AMEX 

REQUIRED METHOD, AUDIT (COLLECTION 
PERSONAL INFORMATION) 

REQUIRED 
y FIELDS 

DESIRED FIELDS 



REQUIRED METHOD, BILLING ($25 FIXED, ONE TIME) 


9 


FIG. 75B 


PERC HEADER 


3125 

) 


PRIVATE 
BODY KEYS 


USE RIGHT HDR 


DESIRED METHOD, BUDGET 


METHOD OPTION: 
VISA 


DESIRED UDE: 
MYVISABUDGET 


REQUIRED METHOD, BILLING (<$150 FIXED, ONE TIME) 



DESIRED CONTROL SET 
(USE WITH INFO. PASSBACK) 

CONTROL METHOD {VENDING 
WITH "RESPONSE CARD") 


REQUIRED METHOD, AUDIT 
(COLLECTION PERSONAL INFORMATION) ^ 

PERMITTED 
FIELDS 



REQUIRED METHOD, BILLING (<$30, FIXED, ONE TIME) 


PERMITTED CONTROL SET 
(USE W/O INFO PASSBACK) 


CONTROL METHOD (VENDING) 


FIG. 75C 


PERC HEADER 


3150 

— { 


PRIVATE 
BODY KEYS 


NEGOTIATE 
RIGHT HDR 


PERMITTED CONTROL SET 
(TRUSTED NEGOTIATOR) 


CONTROL METHOD 
(NEGOTIATE) 


REQUIRED UDE 
PERC1 


REQUIRED UDE: 
PERC2 


PERMITTED CONTROL SET CONTROL METHOD (NEGOTIATE) 
(MULTIPLE NEGOT. PROCESSES) 1 


REQUIRED METHOD: NEGOTIATEI 

REQUIRED UDE: 
PERC1 



REQUIRED METHOD: NEGOTIATE2 

REQUIRED UDE: 
PERC2 



FIG. 75D 


URT HEADER 


DIGITAL 
SIGNATURE 


3162-^. 
3164 


USE 
RIGHT HDR 


CONTROL SET(USE WITH 
INFO. PASSBACK) 


CONTROL METHOD(VENDING 
WITH "RESPONSE CARD") 


REQUIRED METHOD, BUDGET 

METHOD OPTION: 
VISA 

DESIRED UDE: 
MYVISABUDGET 



REQUIRED METHOD, AUDIT (COLLECTION 
PERSONAL INFORMATION) 

PERMITTED 
FIELDS 



REQUIRED METHOD, BILLING($25, FIXED, ONE TIME) 


II' ' " I !' : I I I I i iiiy i iiMif i i ii 


3202(2) 


3202(N). 


CLAUSE N 


DIGITAL 
SIGNTURE 


DIGITAL 
SIGNATURE 


3204(1)- 


7 


3204(M) 


ELECTRONIC 
CONTRACT 


FIG. 75E 


3208(1) v 


3208(2) v_ STEP 2 


3208(3). 



3208(4) 


STEPS 

L_ 


3208(5) - 


FIG. 75F 


FIG. 76A 


/ PERCN / 80f 
/ 808a / 


RULES SET 1 

___J 


RULES SET N 


SHARED NEGOTIATION 
PROCESS 
3172 


CONTRACT 1 ELECTRONIC 


PERC/URT 1 


PERC/URT N 


/ NEGOTIATION 
/PROCESS RULES 
AND CONTROLS 


1 


FIG. 76B 





FIG. 79 



FIG. 80 



USER/DISTRIBUTOR B 
UD B (UD A (D A (C A ))) 


USERB 

U B (UD B (UD A (D A (C A )) 



.Mill : : '■?' ' ' : I . II - I 1 F ' M P f 



FIG. 83 


CREATOR D 


CREATOR B 
C R 


DISTRIBUTOR C 
Dc(CbC c C d ) 


USER B 
U B (D C (C B C C C D )) 


DISTRIBUTOR B 
D B (D C (C B C C C D )C E ) 


CREATOR C 


CREATOR E 


USER B 
U B (D B (D C {C B C C C D )C E )) 


CLIENT ADMINISTRATOR 
CA(D B (D C (C B C C C D )C E )) 


USERC 
U C (CA(D B (D C (C B C C C D )C E ))) 


USERE 
U E (D B (D C (C B C C C D )C E )) 


USER/DISTRIBUTOR C 
UD C (CA(D B (D C (C B C C C D )C E ))) 


USERD 
U D (CA(D B (D C (C B C C C D )C E ))) 


USER E 
U E (CA(D B (D C (C B C C C D )C E ))) 


USERD 

U D (UD C (CA(D B (D C (C B C C C D )C E )))) 



.iiiiuyiraifiT'iiiiiiiiiiii! .ii I'M' 


ID 


FIG. 85 


300(B) 



€5