[go: up one dir, main page]

TW200528979A - System for regulating access to and distributing content in a network - Google Patents

System for regulating access to and distributing content in a network Download PDF

Info

Publication number
TW200528979A
TW200528979A TW93135289A TW93135289A TW200528979A TW 200528979 A TW200528979 A TW 200528979A TW 93135289 A TW93135289 A TW 93135289A TW 93135289 A TW93135289 A TW 93135289A TW 200528979 A TW200528979 A TW 200528979A
Authority
TW
Taiwan
Prior art keywords
network
processor
controller
user
access
Prior art date
Application number
TW93135289A
Other languages
Chinese (zh)
Inventor
Ii Burke
David Z Carman
Original Assignee
Ii Burke
David Z Carman
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ii Burke, David Z Carman filed Critical Ii Burke
Publication of TW200528979A publication Critical patent/TW200528979A/en

Links

Landscapes

  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

There is provided a system for regulating access and managing distribution of content in a network, such as the Internet. The system includes communication gateways, installed at a subscriber site, internet control points, installed remotely, and various network elements installed throughout the network. The communication gateways and network elements operate in conjunction with the internet control points to restrict or allow access to specified Internet sites and to manage efficient distribution of content such as music, video, games, broadband data, real-time audio and voice applications, and software to subscribers.

Description

200528979 (1) 九、發明說明 【發明所屬之技術領域】 本發明大致關於一種對一網路存取的規範,更明確而 言,關於有效率散佈內容且同時保護與該內容相關聯之數 位版權。 【先前技術】 一般大眾熟知爲網際網路的網路,或任何類似的私人 或受管理的網路,提供一種用以遞送舉凡音樂、遊戲、寬 頻資料、即時聲頻與視訊應用、以及軟體之電子資料或內 容給用戶的便利媒體。爲達成此等目的,網際網路係以數 個成分所組成,包括例如用以產生內容之內容提供者;用 以遞送內容之服務提供者;用以接收、顯示及播放內容之 用戶終端;以及在服務提供者與用戶間用以協助內容散佈 之種種額外的網路元件。服務提供者包括,例如,電話線 路提供者、企業資料中心、以及纜線電話提供者。用戶終 端係位於用戶端且包括,例如,個人電腦.、安裝有數據機 的電視、二者的組合、或能夠提供電子內容給用戶之消費 性電子之任何其它組合。 隨著網際網路的成長一直對經由網際網路提供內容遞 送保持高度的興趣。然而,在網際網路充分及快速遞送方 面完全生效之前,而在同時亦保護內容所有者,即,智慧 財產之所有者的權利方面,仍有數種問題待克服。保護此 智慧財產的技術常指像是數位版權管理(D RM )。近來音 200528979 (2) 樂業界對於盜版音樂的法律訴訟即證明了該等困難尙未被 目前的DRM技術所解決。 服務提供者與內容提供者需要確保智慧財產(音樂、 視訊、遊戲、軟體等)不會有透過網際網路被非法下載及 傳輸的危險,其爲損失收益的主要來源以及數以百件法律 訴訟的主要部分。服務提供者要此特性來終止由音樂公司 發動的合法抨擊以及來鼓勵電影業界許可他們透過不安全 的網際網路散佈之內容。眼見海盜行爲對於唱片業界的負 面衝擊,電影業界可理解地不願意。內容提供者因此要求 此特性來停止每年花費音樂與電影業界數十億美元之透過 網際網路非法下載及傳輸智慧財產。減少對於內容提供者 資源的濫用及降低大量的網路資料量的技術亦需要的,以 便增進網路中存取內容的速度與效率。 另一待解決的問題爲,提供一種給執法機關執行批准 竊聽諸如電子郵件與即時聲頻及視訊通訊的網際網路通訊 的手段。思及阻撓恐怖主義攻擊的重要性,對此問題的解 決方案係特別需要的。美國的愛國者法案(Patriot Act ) 及其它最近通過的立法指出了對執法機關提供此等能力的 需要性及重要性。 因此有需要提供能讓電話 路提供者、ISP、企業 界、有線電視公司針對他們的網際網路存取提供能取用的 新的存取規範及資料流量控制技術。此外,亦有需要提供 一種讓執法機關對抗盛行利用網際網路通訊在計畫非法運 作方面的手段。特別是,有需要符合此等使用服務提供者 冬 200528979 (3) 現存散佈網路的需求。 【發明內容】 發明槪述 根據本發明,提供一種用以規範對網路存取的系統。 該系統包合一耦合至該網路的控制器節點,該控制器節點 包含一用以產生控制器指令之第一處理器、以及一用以透 過該網路傳送該等控制器指令之第一網路介面。該系統亦 包含多數個閘道器單元,該等閘道器單元包含一接收使用 者輸入之網路存取請求之使用者介面、一親合至該網路及 接收來自該網路及一第二處理器之控制器指令的第二網路 介面。該第二處理器根據該等控制器指令選擇性地透過該 網路傳送至少一些網路存取請求,以及經由該第二網路介 面透過該網路傳輸回應被傳送之網路存取請求的內容資 料。 根據本發明另一觀點,提供一種用以規範對被多數使 用者存取之網路存取的系統。該系統包含一耦合至該網路 之控制器節點,該控制器節點包含一用以產生控制器指令 之第一處理器及一用以透過該網路傳送該等控制器指令之 第一網路介面。該系統亦包含多數個與一第一群組使用者 相關聯之網路單元,該等網路單元包含一耦合至該網路並 接收來自該網路與一第二處理器之控制指令的第二網路介 面。該第二處理器根據該等控制器指令禁止第二群組使用 者對該網路中的內容存取。 -7- 200528979 (4) 根據本發明又一觀點,亦提供一種用以透過網路散佈 內容的系統。該系統包含一耦合至該網路的控制器節點, 該控制器節點包含一用以產生控制器指令之第一處理器及 一用以透過該網路傳送該等控制器指令之第一網路介面。 該系統亦包含多數個網路單元,該等網路單元包含一耦合 至該網路之第二網路介面,於該等網路單元中至少一第一 網路單元之該第二網路介面接收來自該網路的控制器指令 且接收來自該等網路單元至少一第二網路單元及一第二處 理益的一內谷資料檔案的一部分,於該等網路單元中至少 一第一網路單元之第二處理器根據該等控制器指令選擇性 地轉送接收自該等網路單元至少第二個網路單元的內容資 料部分至該等網路單元至少一第三個網路單元。 應了解的是’前述的槪要說明與以下之詳細說明僅供 示範與說明而非限制所請求之本發明之用。 倂A且構成.本說明書一部分的附圖說明本發明的一個 (婁々個1 )實施例且與發明說明共同作爲解釋本發明的主旨 之用。 【實施方式】 系統架構 丰艮據本發明之主旨,設有一種包括一服務優喜好架構 (SpA )之系統^ SpA係一種硬體組件與由該等組件執行 @ ^ Μ胃β W _合。被安裝於用戶端的組件可被稱爲閘道 名吾卓兀,或者更明確而言,通訊閘道器(CG )。用戶可 200528979 (5) 以包括住家及商業用戶。C G可以包括一諸如一 裝置之資料儲存裝置,且可操作於活動與非活動 CG在”控制器節點”(下文稱爲網際網路控制點 的控制下連同以SPA爲基礎之網際網路服 (ISP)運作。ICP被安裝於ICP網路。ICP可 路爲基礎的路由器或控制C G之運作的電腦。 位於CG與ICP中的軟體常式提供一套特 統。舉凡電信線路提供者' 電子資料中心、以及 公司等ISP可以藉使用以網路服務爲基礎的系統 送該套特性。 一般而言,SPA使用ICP來控制用戶對網站 及遞送資料給用戶。使用 CG,ICP控制在諸 如,客戶端PC或LAN伺服器)與諸用戶用來交 ISP或內容伺月g器間發送之資料的處理。該ICP 用戶端的該等C G之硬體及軟體合作以提供該系 特性。 該等CG無法被用戶篡改。此係藉該等CG 點加以達成。首先,諸CG被特別設計以不准許 的程式規劃且不能對該C G硬體或軟體存取。取 是,該等 C G僅被供以自快閃記憶體、硬石 EEPROM載入的已編譯的程式碼。對此程式碼的 係得自於諸ICP,而且已加密的密碼被儲存於被 註明出處的位置以允許在C G控制程式更新之前 的鑑別。該等密碼於一"閒置處理控制”相位期間 •硬碟驅動 ί狀態間。 (1C?)) 務提供者 以是以網 性給該系 有線電視 備配以遞 的存取以 用戶(例 換資訊之 與位在一 統之特定 的二個觀 用戶啓始 而代之的 業裝置或 諸項更新 隱藏、無 I C Ρ存在 經常改變 200528979 (6) 且由一I C P追蹤。 第二個反篡改觀點在於設置供外殼給C G ,及由一或 多個”無反應”開關所組成之檢測器。”無反應"開關於開啓 該外殼或移除CG的硬碟裝置之際產生失誤。其電路可以 是被動式或是主動式的。 倘若該檢測器是被動式的,則其於再開始之際對一內 部控制器發出其已產生失誤之信號,且導致一事件通知於 下一個開機之際被送至一 IC P。於接收該事件通知之際, 若是已發生軟體篡改則該ICP始動診斷並停用該CG,或 是該C G停用其控制軟體及其內部硬碟驅動裝置以防止該 硬碟驅動裝置工作,直到其爲修復返回到該IS P。用戶合 約可以用來供應一指明篡改讓批准無效以及該用戶立契出 讓·一部分該 C G給該IS P且同意將被篡改之產品返還該 I S P的合約條款。 倘若該檢測器是主動式的,則該"無反應開關”例如以 電池或電容器保持供電。此失誤係用以立刻停用處理器中 的控制器軟體以及該C G的內部硬碟驅動裝置。二者皆僅 能以自動或人爲介入的方式被ICP重置。此等措施防止用 戶寫入、編譯、執行、修改、或者另外以CG的作業軟體 篡改。第二,該活動模式防止使用者得以對該硬碟驅動裝 置中的內容存取。 除了此等防篡改條款以外,所有的ICP-CG通訊在該 網路的ISP端進行,且;[CP — CG通訊係以加密及雜湊予以 保護。再者,所有的C G必須向IS P註冊。一 IC P將不會 -10- 200528979 (7) 賦能任何服務給一未註冊的C G而且未註冊的C G將根 不能於一實驗性的環境中作業。在開始開機時或自一不 動轉移至一活動狀態時,該C G對IC P發出信號且在進 步進行之前該ICP回送一 "OK”訊息。此交易需要一加 的密碼交換以便授權該C .G進入一能讓其播放、下載或 於遞送服務給使用者的”活動”狀態。此等措施確保在 Ϊ C P與該C G間資料流的安全控制。此安全資料流接著 能諸I S P有效且有效率地控制提供給用戶的服務。 現將詳細參照本發明實施例(示範實施例),其等 子係繪示於附圖中。只要有可能,相同的參考標號將使 於整個圖式以便參照相同或類似的組件。 第1圖說明一個本發明可以作業於其中的環境。一 務喜好架構(SPA )可以包括至少一個連接至一網路 的網際網路控制點(IC P )5 0。網路5 2可以,例如是 際網路、一都會區域網路、或一區域網路,且可以包括 數個S P A控制的網路元件5 4及非S P A控制的網路元 5 5。網路元件5 4、5 5可以包括,例如網路交換機及路 器。SPA控制網路元件54支援規範透過網路52的存取 散佈內容。 同時亦連接至網路5 2的是內容伺服器,該等內容 服器包括至少一 SPA控制內容伺服器56及多數個包 CG 58]、5 8 2、…581Ί的通訊閘道器(CG ) 58。一用戶 端60】、6 0 2、…60η可以連接到各個對應的CG58,或是 一未顯示的替代實施例中,可以與各對應的C G 5 8結合 本 活 密 用 該 賦 例 用 服 52 網 多 件 由 及 伺 括 終 於 以 -11 - 200528979 (8) 形成”融合式nCG 58。 一 S P A控制內容伺服器5 6可以是,例如,一用以遞 送內容服務的計算終端。一內容服務可以包括,例如,^ 送任何媒體檔案、(諸如電影、音樂、圖像、及H % )、 軟體檔案(諸如完整應用程式、作業參數、資料檔$、$ 部分應用/更新)或即時應用(諸如對一終端用戶@ 5雲力 資料處理、聲音通訊或視覺通訊)。於一替代實施例中, S Ρ Α控制內容伺服器5 6及I C Ρ 5 0的功能可以結合於一單 —組件中。 ICP 50典型上以遠離用戶終端60的方式設置且同時 規範用戶對網路5 2的存取以及在網路5 2中內容的散佈。 例如,該內容可以源自於SPA控制內容伺服器56,或是 源自於網路52中其它內容伺服器57。ICP 50藉產生指令 而連同C G 5 8及S P A控制網路元件54工作,該等指令係 透過網路52傳送至且於CG 58及SPA控制網路元件54, 該等指令於S P A控制網路元件5 4中被執行。 ICP 50可以構成網際網路服務控制源及對受ISP選擇 之URL或IP位址的用戶存取的條件式阻絕。ICP 50可控 制CG 5 8以決定什麼網站資料是被允許通過至例如使用執 行於用戶終端60中之網路瀏覽器程式的用戶。ICP 50亦 可控制在C G 5 8的封包檢查處理以決定哪個資料能被允許 流經CG 5 8至及自用戶終端60,特別是當一電子郵件或 檔案傳輸啓動時。ICP 50亦控制當對應的用戶終端60不 活動時,閒置的C G 5 8正從事何種活動。閒置的C G 5 8 - 12 - 200528979 (9) 可接收來自IC P 5 0的軟體下載、收集資料、以及啓動分 裂給特定的非S P A內容伺服器5 7的通訊活動,該等特定 非S P A內容伺服器5 7提供未獲授權之有版權資料給用戶 非法下載。多個I c P 5 0可依地理位置佈署於一 I s P的網 路中以支援ICP 50的CG管理能力以及其服務區域內的 用戶數目。 一 ISP可提供一 ISP入口 62以促進用戶對網路52的 存取。IS P入口 6 2例如可以是一企業資料中心。存取節 點66與提供ISP入口 62的ISP產生關聯。ICP 50與ISP 入口 62、與ISP相關聯之存取節點66、以及SPA控制內 容伺服器56互動,以控制用戶對ISP入口 62提供之諸服 務的存取的能力。ICP 5 0亦控制C G 5 8遞送種種服務, 例如包括廣告、給I S P入口 6 2或S P A控制內容伺服器5 6 網路伺服器的首頁、或是給用戶終端 6 0作爲它們使用 I S P 6 2或S P A控制內容伺服器5 6服務的軟體下載。 I C P 5 0亦與被I S P入口 6 2使用之S P A控制網路元件 54互動以遞送服務。ICP 50控制用戶對由ISP入口 供之服務存取的能力,並且藉控制經過被ISP入口 62使 用之SPA控制網路元件5 4的資料流來控制該等服務本身 的作業。 I C P 5 0可以以人爲輸入方式或以受操作者控制之網路 爬行者軟體而被程式化。對ICP 50內資料庫的更新可以 由一主動介入系統6 4提供,藉此發現及實施對I C P 5 0資 料庫輸入的改變。對I C P 5 0資料庫的更新可以以一種類 -13 - 200528979 (10) ,來 資 64 統 人 而 發 記 冊 於 庫 的 個 網 5 0 〇 面 戶 以 體 參 器 似對電腦病毒之一般更新病毒定義檔及蠕蟲防護的方式 進行。 網路爬行者、人爲介入、以及ICP 50與CG 58的 料庫更新可以被主動介入系統64控制。主動介入系統 可包括,例如一組受中央維護電腦系統。主動介入系 6 4可控制多種依地理位置佈署之ICP 5 0的作業。 程序開始於主動介入系統6 4。主動介入系統6 4被 爲操作者用來發現至’’盜版”網站之新的URL或IP位址 條件式地阻絕由CG 58對此等URL或IP位址的存取、 現實施數位版權管理(DRM )技術所需之改變、發現並 錄新的封包特性、依命令安裝竊聽器、處理新的版權註 輸入、改變加密技術、以及執行其它管理服務。ICP 50 是接著遞送主動及即時執行的網路管理、散佈新的資料 輸入及輸體改變至C G 5 8並追蹤S P A控制網路元件5 4 作業。雖然只繪示一個但可以有多個ICP 5 0。因此,多 ICP 50可以聯結起來以使它們能管理大量的SPA控制 路元件 54並提供冗餘、高度可靠的操作。再者,ICP 可全都使用完全一致的資料庫以致能不間斷的網路管理 如第2圖所繪示者,一 C G 5 8可包括一使用者介 1 〇 〇,其接收由用戶在一相關聯之用戶終端6 0輸入之用 請求,以存取網路5 2。C G 5 8亦可包括一網路介面1 0 2 與網路52交換資料且接收來自ICP 50的指令;一記憶 裝置1 04,包括一用以儲存ICP產生之指令、初始作業 數、及其它記錄的資料庫;一實施該等指令的處理 -14 - 200528979 (11) 1 0 6 ; —內容儲存裝置1 ο 8,具有用以儲存內容之 者分區與網路分區;以及如上述之一防止篡改的外 檢測器1 1 0。記憶體裝置1 04例如可以是一或多個 記憶體庫、一或多個硬碟驅動裝置庫、半導體記憶 碟驅動裝置或其它容納資料之裝置的一個組合。 106 例如可以是--般用途處理器(諸如1 (Pentium 4 )處理器、一積體電路、或諸積體電 合),其能執行程式指令且被設計能允許控制欲以 體實施之 C G 5 8且亦可供非 C G有關之一般用途 用。或者處理器1 0 6可以是一特殊用途處理器(積 或諸積體電路之集合),其能執行程式指令且被設 具有控制C G 5 8所需之電源、匯流排、邏輯及硬 器。內容儲存裝置1 〇 8例如可以是一或多個半導體 庫、一或多個硬碟驅動裝置庫、半導體記憶體與硬 裝置或任何其它容納資料之裝置的一組合。C G可 種形式來提供,例如像是一結合電視、視訊、網際 聲音存取、一撥接遠方存取伺服器、一 A D S L數據 由器、〜衛星電視閘道器、一有線電視數據機、一 機上加網際網路閘道器、一無線數據機、或其它包 電、電視、立體音響、無線電話、電話、DVD、 WLAN接取點、無線寬頻或窄頻數據機或類似裝置 或行動計算、播放、記錄、顯示或通訊裝置。 如第3圖所繪示,一 IC P 5 0可包括一或多個 面2 0 〇、一或多個處理器2 0 2、一記憶體裝置2 04 一使用 殼拆卸 半導體 體與硬 處理器 莽騰4 路的集 純粹軟 計算應 體電路 計成僅 體加速 記憶體 碟驅動 以以多 網路與 機/路 融合式 括無線 VCR、 之固定 網路介 。記憶 - 15- 200528979 (12) 體裝置2 (Η包括一用以儲存記錄之資料庫、以及一供諸處 理器與共享儲存裝置及記憶體間交通的非網際網路通訊鏈 結。該等記錄最好包括可以被主動介入系統64更新且被 散佈至CG 58及SPA控制網路元件54供執行的指令。 如第4圖所繪示,S P A控制網路元件5 4可包括一或 多個網路介面300、一或多個處理器302、一包括一資料 庫之記憶體裝置3 〇4、及一或多個用以提供路由與交換裝 置的交換機模組3 0 6。組件3 0 0、3 0 2及3 0 4可以以一類 似於C G的對應組件的方式作業。S p a控制網路元件.5 4 可以提供以多種形式,例如像是一用以遞送資料服務或內 容服務的電腦、一核心路由器或ATM交換機、一用以控 制對網路存取、在允許進入網路、D S L A Μ (數位用戶線 路接取多工器)、纜線數據機系統、無線數據機系統、或 任何其它多工處理或通道服務遞送系統之前鑑定用戶或裝 置的用戶管理系統、或倂入任何此等元件的衛星。 服務初始化 諸CG 58於第一次開機時可必須向Icp 5〇登錄。該 等C G 5 8將會保持不活動,直到其等接收到來自s p a控 制內容伺服器56或ICP 50的登錄確認。該登錄冊程序可 包括收集由ICP 50用於批准來自用戶之註冊的資訊,例 如CG 58硬體位址及其它辨識資料。如有必要,icp 5〇 接著將會對CG 5 8發送最新的作業軟體、以及其初始作業 參數以載入記憶體]04。初始作業參數例如可包括 -16 - 200528979 (13) 5 8、I CP 5 0的位址以及其它下述之變數。後續的再登錄可 以被CG 5 8在用戶的控制之下針對位址或ISP改變開始。 活動及不活動的C G處理控制 於CG 58電源切斷或不活動逾時之際,CG 58可以藉 發送一事件通知給ICP 5 0將其自己登錄爲”閒置”。一不 活動逾時的持續期間可以預設且可以在ICP 50的控制之 下因對ICP 50輸入用以向所有CG 58散佈而被改變。 於後來可藉開機或來自用戶終端的信號而開始的再致 動之際,CG 58藉發送一事件通知給ICP 50而將自己辨 識爲’’活動的”,I C P 5 0以一認可予以回應。若C G 5 8無法 接收到認可會導致一連串的重試,直到最後發生逾時或最 大次數的重試。當此發生時,一診斷程式可以於CG 5 8內 執行以基於該失誤的推論來源建議用戶接下來怎麼辦。活 動的C G 5 8可以處理及控制來自S P A控制內容伺服器5 6 或I S P入口 6 2之內容及服務的遞送。不活動的C G 5 8可 處理及控制CG維護或可以實行故意委託給不活動之CG 活動。 條件式阻絕 第5圖繪示一種根據本發明之用以規範使用者對網路 存取的方法。於步驟400,一與一使用者相關聯之閘道器 單元接收到來自網路的控制器指令。接下來,在步驟 4 02,該閘道器單元接收來自一使用者經由一用戶終端的 200528979 (14) —網路存取請求。在步驟404 ’該閘道器單元根據該等控 制器指令透過網路選擇性地傳送該等網路存取請求。最 後,在步驟4 〇 6,該閘道器單元自網路接收到回應該被傳 送之網路存取請求的內容資料。根據本發明,此部分、以 及接下來的其它部分會更詳細說明此方法的實施。 C G 5 8,在I C P 5 0的控制之下,可提供一以網路爲基 礎的數位版權管理(DRM )服務。DRM服務阻絕給用戶 發送或接收資料自或至已知含有未經許可之有版權資料的 ”盜版"URL或IP位址的能力。於實施此阻絕時,CG 58 刪除該”盜版” U RL或ί P位址並替代以一提供經許可之有 版權資料供合法、經授權銷售之網站的U R L或1 ρ位址。 已知包含有未經許可之有版權資料的”盜版’’URL或IP位 址的名單可以經常地被更新,類似於病毒定義檔被經常更 新的方式。 再者,當其它執行於用戶終端6 0中的非網路瀏覽器 程式企圖存取一被阻斷的網站時,對該被阻斷之網站的 U R L或I P位址的請求可以被重定向至一合法內容提供者 的URL或IP位址或是被忽略。 於一 CG 58登錄爲”活動的”之際,ICP 50可更新Cg 58內DRM URL或IP位址的替代者。 封包檢查 諸C G 5 8及S Ρ A控制網路元件5 4可基於包括例如檔 案延伸、檔案格式、標頭或標尾內容的檔案性質、以及已 -18 - 200528979 (15) 知爲未經授權之有版權資料的URL/ IP位址,執行封包 檢查以決定所有正要透過C G 5 8或S P A控制網路元件5 4 傳輸的檔案的檔案型態。ICP 5 0以特定資料形態來規劃 C G 5 8或S P A控制網路兀件5 4。此等資料形熊可以是任 何長度且可以包含精確匹配或一般描述。當特定的資料形 悲被認出時,根據被IC P 5 0遞送的指令,該資料傳輸可 能會被停止或採取另一動作。 電子郵件伺服器&客戶端造假 能夠在網路內部交換交通的一 CG 58或第—SPA控 制網路兀件5 4可將自己向用戶終端6 0呈現爲相關聯用戶 的電子郵件伺服器,其可以是一網路元件5 4。此外,能 夠在網路內部交換交通的該CG 58或第一 SPA控制網路 元件5 4可將自己向該用戶的電子郵件伺服器呈現爲一用 戶終端6 0。以此方式,能夠在網路內部交換交通的該c G 58或第一 SPA控制網路元件54充作爲一雙向加密/解密 點以便致能另外已加密資料的檢查。當電子郵件透過能夠 在網路內部交換交通的一 CG 58或第一 SPA控制網路元 件5 4發送時,所有附加檔案使用例如上述之封包檢查技 術被檢查。基於被I C P遞送的指令,能夠在網路內部交換 交通的一 C G 5 8或第一 S P A控制網路元件5 4接著可阻絕 對進來的檔案的存取、停止傳輸外送檔案、或採取其它行 動。 -19- 200528979 (16) 瀏覽器、程式通訊、及URL或IP位址位址阻丨 在ICP 50的控制之下,CG 58可阻斷用戶對 的URL或IP位址的存取。當CG 58向ICP 50登: 動的”時,CG 58接收來自ICP 50 —對其被阻絕 IP位址名單以及其替代名單的更新。該替代名單 如,要被CG 58替代阻絕給用戶之特定URL或IP URL或IP位址。於一網路瀏覽器程式中由用戶輸 示一被阻絕之URL或IP位址的請求或一由在用戶 執行之程式作出之要連接至一被阻絕URL或IP位 程式呼叫可以被允許逾時。或者是,CG 5 8可自其 單中提出一替代URL或IP位址顯示給用戶。當替 或IP位址不存在時可能會發生逾時。一 ISP可選 許一用戶送出輸入到該等被阻絕之URL或IP位址 供家長控制用途之用。融合的該等CG 5 8亦可使用 特性授予存取及遞送只有用戶已訂購之由I S P提供 服務,而排除所有其它者。此阻斷特性亦可被用來 公共政策、法院指令或I S P政策用途之用的網站。 事件通知 每當作出一封包檢查匹配或欲存取被條件式 URL的企圖被檢測到時,諸CG 58及SPA控制網 54遞送一事件通知給ICP 50。 病毒啓始的阻絕服務交通阻斷 一名單 錄爲”活 URL或 包括例 位址的 入要顯 終端6 0 址的一 替代名 代URL 擇地允 的名單 此阻斷 的視訊 阻斷供 阻絕之 路元件 -20 - 200528979 (17) 利用任何由CG 5 8伺服之用戶終端60重複及快 圖發送資料給〜或一短名單的URL或IP位址被CG 測到時’到該被認出之網站的交通便不會被轉送。 網際網路通訊協定語音(VoIP)阻斷 對於不是VoIP用戶的用戶而言,CG 58或SPA 網路元件54可藉著認出目的URL、來源URL、封 度 '標頭資訊或封包內容來辨識出欲使用V ο I P服務 圖。進入或外送的 VoIP封包可被拋棄並且一提供 訂購服務的廣告可被遞送且被顯示給用戶終端60。 即時視訊或聲頻串流阻斷 對於不是即時服務品質用戶的用戶而言,C G 5 SPA控制網路元件54藉著認出目的URL、來源URL 包長度、標頭資訊或封包內容可辨識出欲使用即時應 企圖。進入或外送即時封包可被拋棄並且一提供即時 訂閱服務的廣告可被遞送且被被顯示給用戶終端6 〇。 即時視訊或聲頻服務品質(Q 〇 S )降低 對於不是即時服務品質用戶或企圖存取已知提供 P 2 P檔案共享的用戶而言,CG 58或SPA控制網路 54藉著認出目的URL、來源URL、封包長度、標頭 或封包內容可辨識出欲使用即時應用的企圖。於辨 際’ C G 5 8或S P A控制網路元件5 4降低資料被傳輸 速企 5 8檢200528979 (1) IX. Description of the invention [Technical field to which the invention belongs] The present invention generally relates to a specification for accessing a network, and more specifically, about efficiently distributing content and simultaneously protecting digital copyrights associated with the content . [Prior art] A network known to the general public as the Internet, or any similar private or managed network, that provides an electronic device for delivering extraordinary music, games, broadband data, real-time audio and video applications, and software Convenient media for materials or content to users. To achieve these goals, the Internet is composed of several components, including, for example, content providers to generate content; service providers to deliver content; user terminals to receive, display, and play content; and Additional network components between service providers and users to assist with content distribution. Service providers include, for example, telephone line providers, corporate data centers, and cable phone providers. The user terminal is located at the user terminal and includes, for example, a personal computer, a television with a modem installed, a combination of the two, or any other combination of consumer electronics capable of providing electronic content to the user. As the Internet has grown, there has been a high level of interest in providing content delivery via the Internet. However, there are still several issues that need to be overcome before the full and fast delivery of the Internet is fully effective, while also protecting the rights of content owners, that is, owners of intellectual property. The technology that protects this intellectual property is often referred to as digital rights management (D RM). Recent news 200528979 (2) The music industry's legal action against pirated music proves that these difficulties have not been resolved by current DRM technology. Service providers and content providers need to ensure that intellectual property (music, video, games, software, etc.) is not at risk of being illegally downloaded and transmitted through the Internet. It is the main source of lost revenue and hundreds of legal proceedings. The main part. Service providers want this feature to end legal attacks by music companies and to encourage the film industry to allow them to distribute content via unsecured Internet. Seeing the negative impact of piracy on the record industry, the film industry is understandably reluctant. Content providers therefore demand this feature to stop the billions of dollars spent each year in the music and film industry from illegally downloading and transmitting intellectual property over the Internet. Techniques to reduce the abuse of content provider resources and the amount of large amounts of network data are also needed to increase the speed and efficiency of accessing content on the network. Another issue to be addressed is to provide a means for law enforcement agencies to authorize eavesdropping on Internet communications such as e-mail and instant audio and video communications. Given the importance of thwarting terrorist attacks, solutions to this problem are particularly needed. The Patriot Act of the United States and other recently passed legislation point to the need and importance for law enforcement agencies to provide these capabilities. Therefore, there is a need to provide new access specifications and data flow control technologies that can be used by telephone providers, ISPs, businesses, and cable companies for their Internet access. There is also a need to provide a means for law enforcement agencies to counter the prevalent use of Internet communications to plan illegal operations. In particular, there is a need to meet the needs of these service providers using winter 200528979 (3) existing distribution networks. SUMMARY OF THE INVENTION According to the present invention, a system for regulating access to a network is provided. The system includes a controller node coupled to the network. The controller node includes a first processor for generating controller instructions and a first processor for transmitting the controller instructions through the network. Web interface. The system also includes a plurality of gateway units. The gateway units include a user interface for receiving a network access request input by a user, an affinity to the network, and receiving from the network and a gateway. The second network interface of the two processor controller commands. The second processor selectively transmits at least some network access requests through the network according to the controller instructions, and responds to the transmitted network access requests through the network transmission through the second network interface. Content information. According to another aspect of the present invention, a system for regulating access to a network accessed by a large number of users is provided. The system includes a controller node coupled to the network. The controller node includes a first processor for generating controller instructions and a first network for transmitting the controller instructions through the network. interface. The system also includes a plurality of network units associated with a first group of users. The network units include a first network unit coupled to the network and receiving control instructions from the network and a second processor. Two network interfaces. The second processor prohibits the second group of users from accessing the content on the network according to the controller instructions. -7- 200528979 (4) According to still another aspect of the present invention, a system for distributing content through a network is also provided. The system includes a controller node coupled to the network. The controller node includes a first processor for generating controller instructions and a first network for transmitting the controller instructions through the network. interface. The system also includes a plurality of network units, the network units including a second network interface coupled to the network, and the second network interface of at least one first network unit in the network units Receiving a controller command from the network and receiving at least a second network unit and a portion of an inner valley data file of a second processing benefit from the network units, at least one of the network units being the first The second processor of the network unit selectively forwards the content data part received from at least a second network unit of the network units to at least one third network unit of the network units according to the instructions of the controllers. . It should be understood that 'the foregoing description and detailed description are for the purpose of illustration and description only and are not intended to limit the claimed invention.倂 A and structure. The accompanying drawings, which are part of the present specification, illustrate one embodiment of the present invention (Lou 1), and together with the description of the invention, serve to explain the gist of the present invention. [Embodiment] System architecture According to the gist of the present invention, Feng Gen is provided with a system including a service preference architecture (SpA). SpA is a hardware component and is executed by these components. The component that is installed on the client side can be called a gateway, or more specifically, a communication gateway (CG). Users may 200528979 (5) to include home and business users. The CG may include a data storage device such as a device, and is operable between active and inactive CGs under the control of a "controller node" (hereinafter referred to as an Internet control point together with an SPA-based Internet server ( ISP) operation. ICP is installed on the ICP network. ICP can be a router based on ICP or a computer that controls the operation of CG. Software routines located in CG and ICP provide a set of special rules. For example, telecommunication line providers' electronic information Centers, companies, and other ISPs can send this set of features by using a network service-based system. Generally speaking, SPA uses ICP to control users' websites and deliver information to users. Using CG, ICP is controlled on, for example, clients PC or LAN server) and the processing of data sent by users to the ISP or content server. The hardware and software of the CCs in the ICP client cooperate to provide the features. These CGs cannot be tampered with by users. This is achieved by these CG points. First, the CGs are specifically designed with disallowed programming and cannot access the CG hardware or software. Yes, these C Gs are only supplied with compiled code loaded from flash memory, hard rock EEPROM. The code is derived from the ICP, and the encrypted password is stored at the indicated source to allow authentication before the CC control program is updated. These passwords are in the "idle processing control" phase. The hard disk drive is in a state. (1C?)) The service provider uses the network to prepare the cable TV for the user (for example, The exchange of information and the location of the two unified users in the unification of the industry device or various updates hidden, without the presence of IC, often changing 200528979 (6) and tracked by an ICP. Second anti-tampering perspective It is to provide a housing for the CG and a detector composed of one or more "non-responsive" switches. "No response" switches cause errors when the housing is opened or the hard disk device of the CG is removed. The circuit can It is passive or active. If the detector is passive, it will send an error signal to an internal controller when it restarts, and an event notification will be sent to the next power-on. An IC P. Upon receiving the event notification, if software tampering has occurred, the ICP starts to diagnose and disable the CG, or the CG disables its control software and its internal hard disk drive device to prevent the hard disk drive The device works until it is returned to the ISP for repair. The user contract can be used to supply a specified tamper to invalidate the approval and the user's lease to transfer a portion of the CG to the ISP and agree to return the tampered product to the ISP. Contract terms. If the detector is active, the " non-response switch ", for example, keeps the battery or capacitor powered. This error is used to immediately disable the controller software in the processor and the internal hard disk of the CG Drive device. Both can only be reset by ICP by automatic or human intervention. These measures prevent users from writing, compiling, executing, modifying, or otherwise tampering with CG operating software. Second, this activity mode Prevent users from accessing the contents of the hard disk drive. In addition to these tamper-resistant provisions, all ICP-CG communications are performed on the ISP side of the network, and [CP — CG communications are encrypted and The hash is protected. Furthermore, all CGs must be registered with the ISP. An ICP will not be able to -10- 200528979 (7) Enable any service to an unregistered CG and the unregistered CG will be rooted Capable of operating in an experimental environment. The CG sends a signal to the IC P at the start of startup or from an immobile to an active state, and the ICP returns an "OK" message before progress is made. This transaction requires OnePlus password exchange in order to authorize the C.G into an "active" state where it can be played, downloaded or delivered to the user. These measures ensure the security control of the data flow between the CP and the CG. This The secure data stream can then effectively and efficiently control the services provided to the users by the ISPs. Reference will now be made in detail to embodiments (exemplary embodiments) of the present invention, the sub-systems of which are illustrated in the drawings. Wherever possible, the same reference numbers will be used throughout the drawings to refer to the same or similar components. FIG. 1 illustrates an environment in which the present invention can operate. A service preference architecture (SPA) may include at least one Internet control point (ICP) 50 connected to a network. The network 5 2 may be, for example, the Internet, a metropolitan area network, or a local area network, and may include several SPA-controlled network elements 5 4 and non-SPA-controlled network elements 5 5. The network elements 54, 55 may include, for example, network switches and routers. The SPA control network element 54 supports regulating access to the distributed content via the network 52. Also connected to the network 5 2 is a content server. These content servers include at least one SPA control content server 56 and a plurality of packets. CG 58], 5 8 2, ... 581Ί communication gateways (CG) 58. A client 60], 60, 2, 60n can be connected to each corresponding CG58, or in an alternative embodiment not shown, it can be used in combination with each corresponding CG 5 8 to use this example service 52 The network of multiple pieces finally formed "fusion nCG 58" with -11-200528979 (8). A SPA control content server 56 can be, for example, a computing terminal used to deliver content services. A content service can Include, for example, ^ send any media files (such as movies, music, images, and H%), software files (such as full applications, operating parameters, data files $, $ partial applications / updates) or real-time applications (such as For an end user @ 5 Yunli data processing, voice communication or visual communication). In an alternative embodiment, the functions of SPA controlling content server 56 and IC P50 can be combined in a single-component. The ICP 50 is typically set away from the user terminal 60 and at the same time regulates the user's access to the network 5 2 and the distribution of content in the network 52. For example, the content may originate from the SPA control content server 56 Or it is derived from the other content server 57 in the network 52. The ICP 50 works by generating instructions in conjunction with CG 58 and the SPA control network element 54. These instructions are transmitted to the CG 58 and SPA through the network 52. The control network element 54 is executed in the SPA control network element 54. The ICP 50 can constitute a source of Internet service control and conditional denial of access to users with URLs or IP addresses selected by the ISP ICP 50 can control CG 5 8 to determine what website data is allowed to pass to users using, for example, a web browser program running in user terminal 60. ICP 50 can also control the packet inspection process in CG 5 8 to determine Which material is allowed to flow through CG 58 to and from user terminal 60, especially when an email or file transfer is initiated. ICP 50 also controls when a corresponding user terminal 60 is inactive, idle CG 5 8 is engaged in What kind of activities. Idle CG 5 8-12-200528979 (9) Can receive software downloads from IC P 50, collect data, and initiate communication activities that are split to specific non-SPA content servers 5 7 Non-SPA content Server 5 7 provides unauthorized downloading of copyrighted materials for users. Multiple I c P 50 can be deployed in an I s P network according to geographical location to support CG 50 CG management capabilities and its services Number of users in the area. An ISP may provide an ISP portal 62 to facilitate user access to the network 52. The ISP portal 62 may be, for example, an enterprise data center. The access node 66 is associated with an ISP that provides an ISP portal 62. The ICP 50 interacts with the ISP portal 62, the access node 66 associated with the ISP, and the SPA control content server 56 to control the user's ability to access the services provided by the ISP portal 62. ICP 50 also controls CG 58 to deliver various services, such as including advertising, ISP portal 6 2 or SPA control content server 5 6 web server home page, or user terminal 60 as they use ISP 6 2 or SPA controls software download for 6 server services. I C P 50 also interacts with SP A control network element 54 used by I SP entry 62 to deliver services. The ICP 50 controls the user's ability to access services provided by the ISP portal, and controls the operation of these services by controlling the data flow through the SPA control network element 54 used by the ISP portal 62. I C P 50 can be programmed by human input or by web crawler software controlled by the operator. Updates to the database in ICP 50 can be provided by an active intervention system 64 to discover and implement changes to the I C P 50 database input. The ICP 50 database can be updated in a class of -13-200528979 (10), which is distributed to 64 individuals and registered in the library's network. 500 people have general updates of computer viruses with body-parameter devices. Virus definitions and worm protection. Web crawlers, human intervention, and library updates for ICP 50 and CG 58 can be controlled by the active intervention system 64. Active intervention systems may include, for example, a centrally maintained computer system. The active intervention system 64 can control a variety of ICP 50 operations deployed by geographical location. The procedure starts with the active intervention system 6 4. The active intervention system 64 is used by operators to discover new URLs or IP addresses to "piracy" websites. Conditionally blocks access to these URLs or IP addresses by CG 58. Digital copyright management is now implemented. (DRM) technology changes, discovery and recording of new packet characteristics, installation of eavesdroppers on command, processing of new copyright note input, change of encryption technology, and implementation of other management services. ICP 50 is then delivered proactively and immediately Network management, dissemination of new data input and input changes to CG 5 8 and tracking of SPA control network components 5 4 operations. Although only one is shown, there can be multiple ICP 50. Therefore, multiple ICP 50 can be linked So that they can manage a large number of SPA control circuit elements 54 and provide redundant, highly reliable operations. Furthermore, ICP can all use a completely consistent database to enable uninterrupted network management as shown in Figure 2 A CG 58 may include a user interface 100, which receives a usage request input by a user at an associated user terminal 60 to access the network 5 2. The CG 58 may also include a network Interface 1 0 2 and network 52 exchange data and receive instructions from ICP 50; a memory device 104, including a database for storing ICP-generated instructions, initial job counts, and other records; a process for implementing those instructions -14-200528979 ( 11) 1 0 6; content storage device 1 ο 8, having a partition for storing content and a network partition; and an external detector 1 1 0 for preventing tampering as described above. The memory device 104 may be, for example, A combination of one or more memory banks, one or more hard disk drive libraries, semiconductor memory disk drives, or other devices that hold data. 106 For example, a general-purpose processor such as 1 (Pentium 4) A processor, an integrated circuit, or a combination of integrated circuits) that can execute program instructions and is designed to allow control of the CG 5 8 to be implemented in a physical manner and is also available for non-CG related general purposes. 0 6 can be a special-purpose processor (integral or integrated circuit), which can execute program instructions and is provided with the power, bus, logic and hardware required to control CG 58. Content storage device 1 〇8 may be, for example, a combination of one or more semiconductor libraries, one or more hard disk drive device libraries, semiconductor memory and hard devices, or any other device that holds data. CG may be provided in various forms, such as Combining TV, video, Internet voice access, a dial-up remote access server, an ADSL data router, a satellite TV gateway, a cable TV modem, an Internet gateway on the machine, a Wireless modems, or other electrical, television, stereo, wireless phones, telephones, DVDs, WLAN access points, wireless broadband or narrowband modems or similar devices or mobile computing, playback, recording, display or communication devices. As shown in FIG. 3, an IC P 50 may include one or more surfaces 200, one or more processors 2 0, a memory device 2 04, and a semiconductor body and a hard processor using a case. The reckless 4-way set of purely soft-computing circuit should be counted as only a body-accelerated memory disk drive to multi-network and machine-to-circuit integration including wireless VCR and fixed network interface. Memory-15- 200528979 (12) Physical device 2 (Η includes a database for storing records, and a non-internet communication link for communication between processors and shared storage devices and memory. These records It preferably includes instructions that can be updated by the active intervention system 64 and distributed to the CG 58 and the SPA control network element 54 for execution. As shown in Figure 4, the SPA control network element 54 may include one or more networks. Road interface 300, one or more processors 302, a memory device 3 04 including a database, and one or more switch modules 3 06 for providing routing and switching devices. Components 3 0 0, 3 0 2 and 3 0 4 can be operated in a similar manner to the corresponding components of CG. Spa controls the network elements. 5 4 can be provided in various forms, such as a computer for delivering data services or content services, A core router or ATM switch, one to control access to the network, allow access to the network, DSLA M (Digital Subscriber Line Access Multiplexer), cable modem system, wireless modem system, or any other Multiplexing or channel services The user management system that authenticates the user or device before sending the system, or satellites that incorporate any of these components. The service initialization CG 58 may have to log in to Icp 50 when it is first turned on. These CG 58 will remain Activities until they receive a login confirmation from the spa control content server 56 or ICP 50. The registry process may include collecting information used by ICP 50 to approve registrations from users, such as CG 58 hardware addresses and other identification Data. If necessary, ICCP 5 will then send the latest operating software to CG 5 8 and its initial operating parameters to load the memory] 04. The initial operating parameters may include, for example, -16-200528979 (13) 5 8 , I CP 50 0 address and other variables described below. Subsequent re-login can be started by CG 5 8 under the user's control for address or ISP change. Active and inactive CG processing is controlled by CG 58 power In the event of a shutdown or inactivity timeout, CG 58 may register itself as "idle" by sending an event notification to ICP 50. The duration of an inactivity timeout can be preset and can be controlled by ICP 50 The following is changed because the input to the ICP 50 is used to disseminate to all CG 58. At a later reactivation which can be started by power-on or a signal from the user terminal, the CG 58 sends an event notification to the ICP 50 to change Recognizing itself as "active", ICP 50 responds with an approval. Failure to receive approval by CG 5 8 will result in a series of retries until the last timeout or maximum number of retries occurs. When this occurs, A diagnostic program can be executed within CG 58 to advise the user what to do next based on the source of the inference of the error. The active C G 5 8 can process and control the delivery of content and services from the SPA control content server 56 or the IS portal 62. Inactive C G 5 8 can handle and control CG maintenance or can perform CG activities that are deliberately entrusted to inactive. Conditional Blocking Figure 5 illustrates a method for regulating user access to the network in accordance with the present invention. At step 400, a gateway unit associated with a user receives a controller command from a network. Next, in step 402, the gateway unit receives a 200528979 (14) -network access request from a user via a user terminal. At step 404 ', the gateway unit selectively transmits the network access requests over the network according to the controller instructions. Finally, in step 406, the gateway unit receives the content data of the network access request which should be transmitted from the network. According to the present invention, this section, and other sections that follow, will explain the implementation of this method in more detail. C G 5 8, under the control of I C P 5 0, can provide a network-based digital rights management (DRM) service. The DRM service prevents the ability to send or receive data to or from users that contain "pirated" URLs or IP addresses that contain unauthorized copyrighted material. CG 58 removed the "pirated" U RL when implementing this blocking Or ί P address and replace with a URL or 1 ρ address of a website that provides licensed copyrighted material for legal and authorized sale. A "pirated" URL or URL known to contain unauthorized copyrighted material or The list of IP addresses can be updated frequently, similar to how virus definition files are frequently updated. Furthermore, when other non-web browser programs running in the user terminal 60 attempt to access a blocked website, requests for the URL or IP address of the blocked website may be redirected to The URL or IP address of a legitimate content provider is either ignored. When a CG 58 is registered as "active", the ICP 50 may update the DRM URL or IP address replacement in the Cg 58. The packet inspection CG 58 and SP A control network element 54 may be based on the nature of the file including, for example, file extension, file format, header or trailer content, and has been known to be unauthorized by -18-200528979 (15) URL / IP address of the copyrighted material, perform a packet check to determine the file type of all files that are to be transmitted via CG 5 8 or SPA control network element 5 4. ICP 50 plans C G 5 8 or SP A control network element 5 4 in a specific data format. These profile bears can be of any length and can contain exact matches or general descriptions. When a particular data message is recognized, the data transmission may be stopped or another action taken according to the instructions delivered by the IC P 50. The e-mail server & client forges a CG 58 or a SPA control network element capable of exchanging traffic within the network, can present itself to the user terminal 60 as the e-mail server of the associated user, It can be a network element 5 4. In addition, the CG 58 or the first SPA control network element 54 that can exchange traffic within the network can present itself to the user's e-mail server as a user terminal 60. In this way, the c G 58 or the first SPA control network element 54 capable of exchanging traffic within the network acts as a two-way encryption / decryption point to enable inspection of additional encrypted data. When the email is sent through a CG 58 or a first SPA control network element 5 4 capable of exchanging traffic within the network, all additional files are checked using, for example, the above-mentioned packet inspection technology. Based on the instructions delivered by the ICP, a CG 5 8 or a first SPA control network element 5 4 capable of exchanging traffic within the network can then block access to absolutely incoming files, stop transmitting outgoing files, or take other actions. . -19- 200528979 (16) Browser, program communication, and URL or IP address blocking 丨 Under the control of ICP 50, CG 58 can block users' access to the URL or IP address. When CG 58 logs on to ICP 50: Active ", CG 58 receives updates from ICP 50—the list of blocked IP addresses and its replacement list. The replacement list, for example, is to be replaced by CG 58 to block specific users. URL or IP URL or IP address. A request by a user to enter a blocked URL or IP address in a web browser program or a program made by the user to connect to a blocked URL or IP address. IP address program calls can be allowed to time out. Alternatively, CG 58 can propose an alternative URL or IP address to display to the user from the list. Timeout may occur when the replacement or IP address does not exist. An ISP Optionally allow a user to send input to these blocked URLs or IP addresses for parental control purposes. The fused CG 5 8 can also use features to grant access and delivery to services provided by the ISP only if the user has subscribed , But exclude all others. This blocking feature can also be used for websites for public policy, court order or ISP policy purposes. Event notifications whenever a packet is checked for a match or an attempt to access a conditional URL is denied When detected, CG 58 and S The PA control network 54 delivers an event notification to the ICP 50. The virus-initiated blocking service traffic blocking list is recorded as a "live URL or an alternative URL including a regular URL to the terminal 60 address. The list of this blocked video is blocked by the roadblock element-20-200528979 (17) Use any user terminal 60 served by CG 5 8 to repeat and quickly send data to ~ or a short list of URLs or IP addresses When detected by CG, 'traffic to the identified website will not be redirected. Voice over Internet Protocol (VoIP) Blocking For users who are not VoIP users, CG 58 or SPA network element 54 can be identified by recognizing the destination URL, source URL, encapsulation 'header information, or packet content Use the service map of V ο IP. Incoming or outgoing VoIP packets may be discarded and an advertisement providing a subscription service may be delivered and displayed to the user terminal 60. Real-time video or audio streaming blocking. For users who are not real-time service users, the CG 5 SPA control network element 54 can identify the intended URL by recognizing the destination URL, source URL packet length, header information or packet content. Immediately attempt. Incoming or outgoing instant packets can be discarded and an advertisement providing an instant subscription service can be delivered and displayed to the user terminal 60. Degradation of the quality of instant video or audio services (QOS) For non-immediate service quality users or users attempting to access known P2P file sharing, CG 58 or SPA control network 54 recognizes the destination URL, The source URL, packet length, header, or packet content identifies attempts to use the real-time application. In the discrimination ’C G 5 8 or SP A control network elements 5 4 reduce the data being transmitted.

控制 包長 的企 VoIP 8或 、封 用的 串流 非法 元件 資訊 識之 時的 -21 - 200528979 (18) 工作週期可降低交通遞送的速度。此可藉插植TCP/IP訊 息,Nak/Ack或 Χ-Οη/Χ-Off對加以完成。倘若被請求的 網站不是已知的非法P 2 P網站,一提供即時QoS訂閱 服務的廣告可被遞送。 網際網路或資料網路存取鑑定 此技術防止用戶替代外來的閘道器以及登入未對其資 料流加以控制的網際網路(遠端寬頻或窄頻)存取伺服 器。 在ICP 50已透過CG 58對該資料流授權之後,ICP 5 〇可發送授權指令至與提供與I S P入口 6 2之I S P相關聯 的存取節點6 6。存取節點6 6例如可以是一網際網路存取 伺服器或用戶管理系統。該等授權指令必須要在該用戶可 被鑑定及授予網際網路存取之前被存取節點6 6所接收。 對散佈未經許可之有版權資料之網站的阻絕服務及造 假攻擊 一種根據本發明之用以規範使用者對一網路中之多數 內容伺服器的方法係顯示於第6圖。首先,在步驟5 00, 一與一第一群組之使用者相關聯的網路單元接收來自該網 路的控制器指令。接著,在步驟5 0 2,該網路單元根據該 等控制器指令,選擇性地禁止一第二群組之使用者對該等 內容伺服器的一部分進行存取。根據本發明者,此部分更 加詳細說明此方法之實施。 -22 - 200528979 (19) 包括例如被開機及不活動的C G 5 8與s P A控制網路 元件5 4之諸網路單元,可被自一 I C P 5 0接收的指令指示 以便開始對’’盜版"網站之U R L或IP位址重複請求服務或 其它類似交易,亦即,該等”盜版’’網站即是已被辨認出爲 一 I C P遞送之條件式阻絕服務名單中阻禁的網站。I c P 5 0 可致動此等攻擊基於數種準則的任何準則:”以歷時期間 排程”、被I C P 5 0 "即時致動”、或”事件驅動”。當攻擊屬’’ 以歷時期間排程”時,I C P 5 0指示C G 5 8於一特定時間攻 擊且攻擊持續一指定的時間間隔。當攻擊屬被”即時致動" 時,IC P 5 0指示C G 5 8立刻開始或結束攻擊。當攻擊屬|, 事件驅動”時,I C P 5 0指示C G 5 8開始對一事件的例子攻 擊,例如進入一不活動的狀態。一 ”以歷時期間排程”的攻 擊可與一”事件驅動”攻擊聯合以便開始對一事件的例子攻 擊且在一由ICP 50指定的時間間隔之後結束。以此方 式’在ICP 5 0控制下非由CG 5 8伺服的用戶亦可能被阻 絕對有版權資料存取。因此,最初佈署之C G 5 8的衝擊大 大地擴大到防止對網路5 2中盜版資料的存取。 除了指示對於在條件式阻絕服務名單中的U R L或I P 位址阻絕服務攻擊以外,I C P 5 0還可指示C G 5 8及S P A 控制網路元件5 4對包括例如國防部的政府或執法單位所 指認的URL或IP位址執行類似的攻擊。此技術於例如一 被辨識出之URL或IP位址正被用來計畫犯罪或恐怖活動 時會需要。 許多P 2 P伺服器促進了有版權內容未經許可的散 -23^ 200528979 (20) 佈。使用主動介入系統6 4的人爲操作者可發現此等伺服 器的IP位址或U R L。此可經由數種方法來達成,包括例 如,從多樣來源訂閱P 2 P服務或使用P 2 P軟體。 經由P 2 P資源位址伺服器共享的檔案可接著被該等 人爲操作者檢查以發現哪個網際網路伺服器含有到未經許 可之有版權內容的連結。提供或包含到未經許可之有版權 資料的連結之P 2 P伺服器的URL或IP位址可藉由將其 等置於由IC P 50所維護之被阻斷位址名單上而被阻斷。 人爲操作者接著藉上傳替代檔案指標到多種p 2 P資 源位址伺服器而使用主動介入系統 64輸入造假攻擊指 令。該等替代檔案指標向諸伺服器明確指明哪個應該是未 經許可之有版權檔案,並且將來自P 2 P使用者搜尋該等 未經許可之有版權檔案的存取請求重新指向至替代檔案。 包括例如開機及不活動的C G 5 8與S P A控制網路元件5 4 的網路單元,亦可以自一 I C P 5 0接收之指令指示將替代 檔案指標上傳至多種P 2 P資源位址伺服器。 該等替代檔案,例如可以是,沒有效或有缺陷的有效 檔案,或是可以包含告知使用者存取已被阻止且合法拷貝 可以自其它地方獲得的訊息。 版權登錄 登錄値係由1C P 5 0在中央保存及允許存取。已購買 有版權資料的用戶可由賣方或自己註冊成爲特許使用該資 料的所有者。進一步言之,無版權資料可以被註冊以便辨 -24 - 200528979 (21) 識對於製造拷貝的數量沒有限制的檔案或是以便可以被電 子郵寄或下載。 版權檔案刪除 一開機的不活動C G 5 8可以在I C P 5 0的控制之下, 檢視與任何可被C G 5 8在C G 5 8附屬之網路中取用之用 戶終端60相關聯之電腦檔案系統。CG 58可通知ICP 50 符合封包檢查形態的檔案名稱以便辨識出相關聯之用戶可 能沒有權利享有的有版權資料的存在。經由主動介入系統 64的人爲介入,或者是,版權登錄値,可以被用來核對 用戶對在用戶檔案系統中找到之有版權資料的享用權利。 倘若沒有找到享用權利,與該檔案系統相關聯的一 C G 5 8 可接著刪除用戶無權享用的檔案。 第一入口可見度 ”第一入口 ”特性被用來對用戶提出一具有由I S P指定 之內容的指定URL,其於一開動網路瀏覽器之際作爲要顯 示給用戶的”第一入口 ’’頁,而不管用戶在用戶終端60執 行的網路瀏覽器程式中作爲’’首頁’’的選擇爲何。C G 5 8在 I C P 5 0的指示下遞送該”第一入口 ’’。該’’第一入口 ’’可以於 網路瀏覽器開動或例如已發生停止活動逾時的活動重新開 始之際自一 URL或IP位址的名單選取。ICP 50可週期性 地改變遞送到C G 5 8之U R L或ϊ P位址的名單。C G 5 8經 由使用者介面1 〇〇接收用戶的URL請求且取而代之遞送 -25- 200528979 (22) 該,,第一入口,,URL。用戶可被呈現以一 URL或IP位址的 轉動軸,其中在被ICP遞送之URL或IP位址名單中的各 URL係以循環方式呈現,每次產生一新的"第一入口 ”機 會。或者是,自ICP 50接收到的名單可由一 URL組成’ 或該名單中的諸URL或IP位址可進行一加權功能以便某 些URL較其它者更常出現。該特定的加權功能可選擇地 由一 I S P加以配置。 廣告 在I C P 5 0控制之下,於從該”第一入口 ” U RL的網頁 呈現期間以及於由ISP 62指定之事件期間,ISP 62可提 出一組槪括及/或定做的廣告給用戶終端6 0。C G 5 8經由 網路介面102可從ICP 50接收要呈現給與用戶終端60相 關用戶的一廣告或URL或IP位址名單。廣告可被icp 50 基於用戶檢視的IS P輸入、用戶輸入、郵遞區號、URL或 IP位址量身訂做。一組觸發該廣告在用戶終端6 0的瀏覽 器呈現的事件可以在操作者控制之下從;[C P 5 〇被轉移到 C G 5 8。事件可以是時間觸發式或是可包括諸如新的url 或IP ADDRESS^求或資料轉輸的開始或完成。廣告可經 由彈出視窗、瀏覽器視窗、電子郵件訊息或實體媒體被送 到用戶終端6 0。 服務小型應用程式下載 訂閱舉凡視訊電話、遊戲或賭博之以付費爲基礎的服 -26- 200528979 (23) 務的用戶可從ICP 50或SPA內容伺服器%接收小型應用 程式下載。該小型應用程式下載接著可被載至一相關聯的 用戶終端60或網路設備/控制器。該等小型應用程式典 型上係該項服務必須的長駐軟體。CG 58,在ICP 50的控 制之下,可將該小型應用程式的下載僅限定於用戶所訂閱 的服務。小型應用程式的更新可於其等在線上且CG 5 8向 ICP 50登錄爲活動時,被遞送到一用戶。 執法監控 全世界的執法或國家安全機關於”威脅,,情況期間會關 注監控網際網路及電子郵件的使用。此等機關在合法批准 情況下亦被負予得以存取網際網路通訊的責任。藉此特 性,一些或所有流經C G 5 8或S P A控制網路元件5 4的資 料可被拷貝至指定的執法或國家安全監控網站(未顯示於 圖式中)。爲了只發送一部分的交通,該資料流可受到在 C G 5 8或S P A控制網路元件5 4的一封包檢查引擎的監控 以便查究I P位址或資料並發送選取的交通至適合的機關 網站。該監控係經由主動介入系統64以ICP 50人爲介入 而被致動,且監控指令接著被發送至適合的CG 58或SPA 控制網路元件5 4。 計次付費(Pay Per View,PPV)廣告 此技術允許用戶以一可搜尋格式觀看廣告。諸廣告可 以是視訊、文字、聲頻或二種或所有三種媒體格式的組 -27- 200528979 (24) 合。一顯示對回送廣告的簡短描述的搜尋結果可被呈現給 該用戶。該用戶接著可選取有興趣觀看或收聽的廣告。 當與一視訊遞送服務一起包套時,用戶一般可略過嵌 在該視訊程式中的廣告且可搜尋具文字輸入的廣告並接收 符合他們興趣的廣告。針對每個被觀看的廣告,用戶可被 付費觀看。報償可能是微不足道的且用以刺激真正會購買 廣告呈現之產品的有興趣用戶觀看之廣告的高滲透力。 廣告的播放可以是一種’’點即播(click and play ) ”模 式、’’短播並跳到下一個(s h 0 r t p 1 a y a n d s k i ρ ί 〇 t h e n e x t ) ”、或’’播放直到我喊停(p 1 a y u n t i ] I s a y s t o p ) ·’ 模 式。播放模式間的對話可受到用戶控制。 PPV廣告客戶可購買高高在名單上面的配置。用戶可 輸入加權到搜尋項目以升高或降低供搜尋結果顯示之廣告 配置順序。 當PPV廣告與聲頻遞送服務包裝時,等效於顯示用 戶加權的聲頻可藉使用用戶終端 60或一遠端控制被遞 送。一用戶可選取廣告的持續播放模式或一”收聽並略過” 模式以允許用戶收聽任何部分接著跳到下一個廣告。 文字可藉使用嵌在該廣告播放裝置中的顯示器被加到 視訊或聲頻服務。 使用以C G爲基礎之抓取/儲存及供內容服務遞送存 取網路頻寬的充分內容遞送 一種根據本發明之用以透過網路散佈內容資料的方法 -28- 200528979 (25) 顯示於第7圖。首先,在步驟6 0 0,一第一網路單元接收 來自該網路的內容散佈指令。接著,在步驟6 0 2,該第一 網路單元儲存來自該網路的內容資料之第一部分。接著, 在步驟6 0 4 ’該第一網路單元根據該等內容散佈指令及回 應一使用者對該內容資料的其餘部分的請求透過該網路啓 始一請求。在步驟6 0 6,該第一網路單元自該網路接收該 內容資料的其餘部分。接著,於步驟60 8,該第一網路單 元將該內容資料的第一部分與該內容資料的其餘部分組 合。在步驟6 1 0,該第一網路單元供應該已組合之內容資 料給使用者。最後在步驟6 1 2,該第一網路單元根據該等 內容散佈指令選擇性地將內容資料第一部分轉送至一第= 網路單元。 更詳細地,根據本發明之此方法結合諸如C G 5 8之諸 網路單元的使用,諸C G 5 8儲存一部分或一片以IC P控 制內容遞送之遞送的內容,以便諸C G 5 8能使用以回應用 戶的要求彼此從它們小片的內容遞送內容。S P A控制內容 伺服器5 6首先接收到所有的進入內容。S P A控制內容伺 服器5 6可由任何數量的平台所組成。該進入內容可以是 視訊、音樂、書籍、軟體、遊戲等等。接在該內容的接收 之後,SPA控制內容伺服器5 6接著散佈相當大部分的內 容用以儲存在其用戶網路中CG 58內,以便減少透過其網 路連接對資料通訊的要求。個別的CG 58接收來自ICP 5 〇的控制器指令及該總內容的一小片或部分。因而下載 至CG 58的諸片內容達到被遞送之內容的100%。因而被 -29- 200528979 (26) 下載的該等小片內容被儲存於各CG 5 8內之內容儲存裝置 1 08的一網路分區,SPA控制內容伺服器56對於其只准 許”寫入”且用戶對其僅准許"讀取",且接著僅依對該內容 的要求且依指示從C G 5 8或以I C P 5 0從S P A控制內容伺 服器5 6將該內容下載至C G 5 8。用戶請求之內容亦可被 儲存於內容儲存裝置1 〇 8的此網路分區中。一用戶由於用 戶的請求可以刪除內容。基於將內容從C G 5 8散佈至額外 的CG以滿足其它用戶請求的需要,所有用戶的”刪除”可 立即被ICP 50允許或延遲至一稍後的事件。IP位址及其 它關於哪個C G 5 8保持有內容的哪個部分獨特的辨識資訊 由SPA控制內容伺服器56與ICP 50來追蹤。此技術進一 步將各個別檔案剖析成較小的大塊且接著將其等置於數組 的CG 58以便將數個”種子CG”置於含有相同內容的網路 之內。以此方式,猛烈的一陣封包可被產生,克服了被遞 送至CG 5 8之上游與下游位元率速度間的不平衡。許多具 較低上游(C G至網路)速率之 C G能下載資料至一請求 一較高下游(網路至 CG )速率的下載。此外,SPA控制 網路元件5 4可藉儲存要被散佈的種子、或小片的內容以 便減少對S P A控制內容伺服器5 6的要求,來有助於內容 的散佈。 回應一用戶對內容的請求,該用戶可以對所有儲存於 他們所擁有的C G及其它受I C P 5 0控制的C G之網路分區 中的內容進行存取。當有許多用戶請求相同的內容時,則 I C P 5 0指示一內容的複製,因其係要散佈給C G 5 8的。” -30- 200528979 (27) 複製”係一種藉以要接收特定內容的該第一 CG將該內容 轉送至其它C G的技術。此等其它C G可以依序下載內容 至幾個後續的C G。因而C G 5 8根據自IC P 5 0接收的指令 選擇性地轉送該部分的內容檔案。以此方式,所有的c G 在一段較短的時間週期內接收到內容。倘若該檔案無法從 任何其它的CG取得,則ICP 50指示內容從SPa控制內 容伺服器56遞送至提出請求的用戶。一旦一內容檔案長 駐於C G 5 8內,則相關聯的用戶可選擇將它播放。內容不 是被顯不於消費性電子產品上、顯示於用戶終端6 0,就 是被遞送到其它終端,只要該內容的特許授與的話。依一 用戶請求遞送的內容將會被儲存在該用戶之CG 5 8的網路 分區中。根據特許的授與,以消費性電子產品來使用內容 的播放,以及/或檔案傳輸是被允許的。 I C P 5 0保持追蹤哪些C G 5 8被開機且是活動及可利 用的。I C P 5 0亦保持追蹤被S P A控制內容伺服器5 6寫到 活動的C G的內容。內容可定期地以幾種方法自該等C G 網路分區淸除。首先,一”刪除日期”可用於各內容檔案。 第二,當新內容被遞送時,SPA控制內容伺服器56通知 CG 58該項淸除,SPA控制內容伺服器56可淸除內容。 第三,倘若在網路分區中的空間太小而不能接受新的內 容,則最老的內容可以被淸除。第四’用戶可刪除前依用 戶請求被下載的內容。 CG 5 8亦可包含一使用者分區,在其中一用戶可儲 存他或她擁有的內容。儲存於一使用者分區內的內容可以 -31 - 200528979 (28) 是任何包括例如媒體、及軟體、及資料檔案的檔案。 於一使用者分區內的內容亦可被用戶經由用戶終端 取’或可被傳輸到在要被播放或顯示的該用戶位置序 消費性電子產品。 ICP、CG及網路元件資料庫結構 各ICP 50可保持一用於控制SPA控制內容作 5 6、C G 5 8、及S P A控制網路元件5 4的主資料庫。 資料庫可以以被ICP軟體存取的資料庫系統管理。 是’沒有儲存空間配置給具空內容的記錄欄。各CG 網路元件54、及SPA控制內容伺服器56亦可保有3 庫的〜子集供處理之用。 以下部分說明在I C P 5 0主資料庫及在C G 5 8、 元件54、及SPA控制內容伺服器56內容伺服器內保 種種型式的資料。 個別管理式C G、網路元件、內容伺服器及提供 用戶識別符 ΜΡ 50、CG 58、網路元件54、及SPA控制內容 器56資料庫各可包含硬體記錄。ICP 50的主資料庫 可包括給各個C G 5 8、網路元件54、及S P A控制內 服器5 6的現用記錄,I C P 5 0以一 ”歷史檔案夾,,來管天 5 8、網路元件5 4、及S P A控制內容伺服器5 6,該, 檔案夾”包括高達十件過去的記錄向用戶解釋I s p 儲存 60存 3種種 服器 該主 最好 58 > 資料 網路 持的 者/ 伺服 記錄 容伺 I CG 歷史 入口 -32- 200528979 (29) 6 2、網路元件5 4、C G 5 8、以及S P A控制內容伺服器5 6 軟體改變。在主資料庫記錄內的資訊例如可包括,用戶/ 連絡人名稱、公司名稱、地址、城市、州、國家、郵遞區 號、電話號碼、電子郵件地址、C G 5 8、S P A控制網路元 件54、或SPA控制內容伺服器56的硬體位址、CG 58、 SPA控制網路元件54或SPA控制內容伺服器56的獨特 識別符、型號、序號、硬體發行版本、軟體發行版本、至 URL的執法機關拷貝、從cg 5 8登入的事件、網路元件 54或SPA控制內容伺服器56、認證預先認證URL或IP 位址、主動處理影像ID、非主動處理影像ID、作用/不 作用旗標、即時QoS旗標、以及VoIP QoS旗標。 CG 58、網路元件54、以及SPA控制內容伺服器56 資料庫記錄可各包括它們擁有的個別對應辨識資訊。 C G、網路元件或內容伺服器模型的目前再生軟體版 本及影像 此記錄僅保持在ICP 50主資料庫內。以下諸欄可保 持在該主資料庫記錄給各個受管理的CG 58、網路元件54 或S P A控制內容伺服器5 6 :型號、硬體發行版本、軟體 發行版本、目前碼影像、最號二碼影像、以及給客戶支援 用的發行註解。 管理I C P名單 管理ICP名單資料僅保持在CG 58、SPA控制網路元 -33- 200528979 (30) 件5 4、以及S P A控制內容伺服器5 6內。此資料包括給能 控制相關聯的C G 5 8、網路元件5 4或S P A控制內容伺服 器56之ICP 50的URL或IP位址。第一輸入係永久且允 許給與該特定C G、網路元件、或S P A控制內容伺服器5 6 相關聯之ISP的諸ICP位址的初始登錄及下載。 主動處理影像名單 ICP 50、CG 58、網路元件54、以及SPA控制內容伺 服器5 6資料庫各包含主動處理影像名單資料。主動處理 係於CG處於一活動狀態時可被執行於各CG 5 8中之再生 軟體執行的次常式。每當一 C G 5 8、S P A控制網路元件 5 4、或 S P A控制內容伺服器 5 6執行一’’我是活動的’’ (’’I’m Active”)登入時,該主動處理能被ICP 50改變, 而不會改變目前的再生軟體。諸主動處理常式的拷貝可被 下載至C G 5 8、S P A控制網路元件5 4、或S P A控制內容 伺服器5 6 ’如被一在主動介入系統6 4被人爲輸入而應用 於I C P 5 0的一影像散佈常式所指示者。一人爲操作者可 辨識一組可被載有各特定主動處理之”獨特的識別符”。該 主動處理影像名單可以是空的。 閒置處理影像名單 I C P 5 0、C G 5 8、網路元件5 4、以及S P A控制內容伺 服器5 6資料庫可各包含閒置處理影像名單資料。閒置處 理係被可於C G處於一活動狀態時被執行於各c G 5 8之再 -34- 200528979 (31) 生軟體執行的次常式。每當一 C G 5 8、S P A控制網路元件 54、或SPA控制內容伺服器56執行一 ”我是閒置的,, (”I’m Idle”)登入時,該等閒置處理能被icp 5〇改變, 而不會改變再生軟體。該等閒置處理影像被下載至C G 5 8、S P A控制網路元件5 4、或s p a控制內容伺服器5 6, 如被一在主動介入系統64被人爲輸入而應用於ICP 50的 一影像散佈常式所指示者。人爲操作者可辨識一組可被載 以各特定閒置處理之,,獨特的識別符”。該閒置處理影像名 單可以是空的。 P 2 P閒置處理攻擊URL名單 P 2 P閒置處理攻擊URL名單僅被保存在ICP 50與 CG 5 8資料庫中。該資料包含一可被該閒置處理攻擊之含 有非法散佈之未經許可資料之網站的U R L或I P位址的名 單。該名單可以是空的。此名單包含一組旗標以定義已被 主動介入系統64知道之該等非法網站要提供之內容的型 態。 國防部(DOD )閒置處理攻擊URL名單 DOD閒置處理攻擊URL名單資料僅被保存在icP 5 0、C G 5 8、以及S P A控制網路元件5 4資料庫中。此係 由DOD所產生之要於該閒置處理期間被攻擊之網站的 URL或IP位址的一名單。該名單可以是空的。 -35 - 200528979 (32) ”先睹爲快’’URL名單 "先睹爲快"URL名單資料僅被保存在ICP 50與CG 58資料庫中。該資料包含將被以”第一入口”瀏覽器螢幕呈 現給用戶的U R L或IP位址的名單。此名單可以是空的’ 或者可以具有一或多個輸入。多種輸入可被一建入Icp 50 或C G 5 8軟體內的常式整個循環過。 廣告插入URL名單 廣告插入URL名單資料僅被保存於ICP 50與CG 58 資料庫中。該資料包含以”廣告”瀏覽器螢幕被呈現給用戶 之URL或IP位址的一名單。此名單可以是空的,或者可 以具有一或多個登錄。多種登錄可被一建進CG58的常式 整個循環過。 合法內容URL名單 合法內容URL名單資料僅被保存在ICP 50與CG 58 資料庫中。該資料包含當用戶企圖將他們的瀏覽器連接到 在” P 2 P阻斷URL”名單上之一 URL或IP位址時,被呈 現給用戶作爲合法網站之URL或IP位址的名單。此名單 可以是空的,或者可以具有一或多個輸入。多種輸入可被 一建進 CG 58的常式整個循環過。來自該P2P阻斷 URL名單的內容旗標被活動的CG 58或SPA控制內容伺 服器5 6處理程序所使用以便以一含有到符合用戶試著要 存取之”合法內容URL”的瀏覽器螢幕來呈現給用戶。 -36 - 200528979 (33) p 2 P阻斷URL名單 P 2 P阻斷URL名單資料僅被保存在ICP 50與 5 8資料庫中。該資料包含要被主動處理阻斷存取之售 非法散佈之未經許可資料的網站URL或IP位址之-單。此名單可以是空的。此名單包含一組旗標以定義E 主動介入系統64得知之該等非法網站要提供之內容的 態。該等旗標被C G 5 8軟體使用來呈現一瀏覽器螢幕給 有’’合法內容網站”的用戶,當他們試著要將他們的瀏覽 指到在此名單上的一網站時,該等,,合法內容網站,,便提 類似於該P 2 P阻斷URL所提供之內容。 P 2 P QoS限制URL名單 P 2 P Q 〇 S限制U R L名單資料僅被保存在I c P 5 0 CG 5 8資料庫中。該資料包含一含有非法散佈之未經許 資料之網站的URL或IP位址的名單,該等非法散佈之 經許可資料之至及自諸用戶的輸出量係被該主動處理程 嚴格壓縮的。該名單可以是空的。此名單包含一組旗標 定義已被主動介入系統64得知之該等非法網站要提供 內容的型態。該等旗標被C G 5 8軟體用來呈現一 ”第一 口 ’’或廣告瀏覽器螢幕給含有”合法內容網站”的用戶, 等M合法內容網站’’提供類似於該p 2 P QoS限制URL 提供之內容。 CG 有 名 被 型 含 器 供 與 可 未 序 以 之 入 該 所 -37 - 200528979 (34) 入口阻斷URL名單 入口阻斷URL名單資料僅被保存在ICP 50、CG 58、 及網路元件5 4資料庫中。該資料包含一依IS P政策規定 或依管理者或法院命令要求而被阻斷之URL或IP位址的 名單。阻斷係由C G 5 8主動處理程序或網路元件5 4來執 行。該名單可以是空的。此名單被該主動處理程序使用來 將含有一”無可用URL”訊息的一瀏覽器螢幕呈現給用戶, 或是類似者給提出請求的用戶。 入口 QoS限制URL名單Controlling the packet length of the enterprise VoIP 8 or closed stream illegal components Information -21-200528979 (18) The duty cycle can reduce the speed of traffic delivery. This can be done by inserting TCP / IP messages, Nak / Ack or χ-Οη / χ-Off pairs. Provided that the requested website is not a known illegal P2P website, an advertisement providing an instant QoS subscription service can be delivered. Internet or Data Network Access Authentication This technology prevents users from replacing external gateways and logging on to the Internet (remote broadband or narrowband) access servers without controlling their data flow. After the ICP 50 has authorized the data stream through the CG 58, the ICP 50 may send an authorization instruction to the access node 6 6 associated with the I SP providing the I SP entry 62. The access node 66 may be, for example, an Internet access server or a user management system. These authorization instructions must be received by the access node 66 before the user can be authenticated and granted Internet access. Blocking services and counterfeiting attacks on websites that distribute unauthorized copyrighted material A method according to the present invention for regulating users to most content servers in a network is shown in FIG. First, at step 500, a network unit associated with a first group of users receives a controller command from the network. Then, in step 502, the network unit selectively prohibits a second group of users from accessing a part of the content servers according to the controller instructions. According to the inventors, this section explains the implementation of this method in more detail. -22-200528979 (19) Network units including, for example, CG 5 8 and s PA control network element 5 4 that are turned on and inactive, can be instructed by an instruction received from an ICP 50 to start pirating " The URL or IP address of the website repeatedly requests service or other similar transactions, that is, such "pirated" websites are those websites that have been identified as blocked by a list of conditional blocking services delivered by ICP. I c P 5 0 can trigger any of these attacks based on any of several criteria: "scheduled over time", ICP 5 0 " immediate actuation ", or" event driven ". When the attack is "scheduled by duration," ICP 50 instructs CG 5 8 to attack at a specific time and the attack continues for a specified time interval. When the attack is "immediately activated", IC P 5 0 Instructs CG 5 8 to immediately start or end the attack. When the attack is |, event-driven ", ICP 50 instructs CG 5 8 to start an example attack on an event, such as entering an inactive state. An" scheduled attack over a period of time "can be associated with an" event-driven " Attack syndication to start an example attack on an event and end after a time interval specified by ICP 50. In this way, users who are not served by CG 5 8 under ICP 50 control may also be blocked from having absolute copyrighted material Therefore, the impact of the initial deployment of CG 5 8 was greatly expanded to prevent access to pirated data on the network 5 2. In addition to instructing to block service attacks on URLs or IP addresses in the conditional block service list ICP 50 can also instruct CG 58 and SPA control network element 54 to perform similar attacks on URLs or IP addresses identified by governments or law enforcement agencies such as the Ministry of Defense. URLs or IP addresses are being used when planning criminal or terrorist activities. Many P2P servers facilitate the unauthorized distribution of copyrighted content. ^ 200528979 (20). Use of active intervention systems 6 4 Human operators can discover the IP address or URL of these servers. This can be achieved by several methods, including, for example, subscribing to P 2 P services from multiple sources or using P 2 P software. Via P 2 P resource bits The files shared by the address server can then be checked by these people to find out which Internet server contains a link to unauthorized copyrighted content. Provide or include links to unauthorized copyrighted material The URL or IP address of the P 2 P server can be blocked by placing them on the blocked address list maintained by the IC P 50. The human operator then uploads alternative file indicators to multiple p 2 P resource address server and use the active intervention system 64 to input counterfeit attack instructions. These alternative file indicators clearly indicate to servers which should be unauthorized copyrighted files, and will be searched from P 2 P users These unauthorized access requests for copyrighted files are redirected to alternative files. These include network units such as CG 5 8 and SPA Control Network Element 5 4 that are powered on and inactive, and can also be downloaded from an ICP 5 0 The received instruction instructs the uploading of alternate file indicators to various P 2 P resource address servers. Such alternate files may be, for example, invalid or defective valid files, or may include informing users that access has been blocked And legal copies of information that can be obtained from other places. Copyright registration login is not stored and allowed to access by the central 1C P 50. Users who have purchased copyrighted materials can be registered by the seller or the owner of the licensed use of the material. Further, non-copyrighted materials can be registered for identification purposes-200528979 (21) to identify archives with no limit on the number of copies made or to be mailed or downloaded electronically. Copyright file deletion-An inactive CG 5 8 can be viewed under the control of ICP 50, a computer file system associated with any user terminal 60 that can be accessed by CG 5 8 in a network attached to CG 5 8 . CG 58 may notify ICP 50 of the name of the file that conforms to the form of packet inspection in order to identify the existence of copyrighted material that the associated user may not be entitled to. Human intervention via the active intervention system 64, or a copyright registration card, can be used to check the user's right to enjoy copyrighted material found in the user's file system. If the right to enjoy is not found, a C G 5 8 associated with the file system can then delete files that the user is not entitled to. First Portal Visibility The "first portal" feature is used to present a specified URL to the user with the content specified by the ISP, which serves as the "first portal" page to be displayed to the user upon launching a web browser. Irrespective of the user's choice as the "home page" in the web browser program executed by the user terminal 60. CG 58 delivers the "first entry" under the instruction of ICP 50. The "'first entry'" can be selected from a list of URLs or IP addresses when a web browser is launched or, for example, a reactivation of a timed out event has occurred. The ICP 50 may periodically change the list of URLs or URL addresses delivered to C G 5 8. C G 58 receives the user's URL request through the user interface 100 and delivers it instead. -25- 200528979 (22) This, the first entry, URL. The user can be presented with the rotation axis of a URL or IP address, where each URL in the URL or IP address list delivered by the ICP is presented in a circular manner, each time a new " first entry "opportunity is created Or, the list received from ICP 50 may consist of a URL 'or the URLs or IP addresses in the list may be weighted so that certain URLs appear more often than others. The specific weighting function can be selected The location is configured by an ISP. The advertisement is under the control of ICP 50, during the web page presentation from the "first entry" U RL, and during the event designated by ISP 62, ISP 62 may propose a set of brackets and / Or customized advertisement to the user terminal 60. The CG 58 can receive an advertisement or URL or IP address list to be presented to the user related to the user terminal 60 from the ICP 50 via the network interface 102. The advertisement can be based on the user by the ICCP 50 Customized ISP input, user input, postal code, URL or IP address. A set of events that trigger the advertisement to be presented in the user terminal 60 ’s browser can be controlled by the operator; [CP 5 〇 was transferred to CG 58. The file can be time-triggered or can include, for example, the start or completion of a new URL or IP ADDRESS request or data transfer. Ads can be delivered to the user terminal via pop-up windows, browser windows, email messages or physical media 6 0. Service small application download subscription subscriptions to video-based phone, games or gambling fee-based services-26- 200528979 (23) Users of the service can receive small application downloads from ICP 50 or SPA content servers. The small Application downloads can then be downloaded to an associated user terminal 60 or network device / controller. These small applications are typically permanent software necessary for the service. CG 58, under the control of ICP 50 , The download of the small application can be limited to the service that the user subscribes to. The update of the small application can be delivered to a user when they are online and when CG 5 8 is registered as an ICP 50 event. Law enforcement or national security agencies around the world are concerned about "threats," during which situations they monitor the use of the Internet and email. These agencies are also responsible for having access to Internet communications with legal approval. With this feature, some or all of the information flowing through the C G 5 8 or SP A control network element 5 4 can be copied to a designated law enforcement or national security monitoring website (not shown in the drawing). In order to send only a portion of the traffic, the data stream can be monitored by a packet inspection engine at the CG 58 or SPA control network element 54 to investigate the IP address or data and send the selected traffic to the appropriate agency website. The monitoring system is activated with an ICP 50 human intervention via an active intervention system 64, and monitoring instructions are then sent to a suitable CG 58 or SPA control network element 54. Pay Per View (PPV) Advertising This technology allows users to view advertisements in a searchable format. The advertisements can be video, text, audio, or a combination of two or all three media formats. -27- 200528979 (24). A search result that displays a short description of the loopback advertisement can be presented to the user. The user can then select ads that are of interest to watch or listen to. When packaged with a video delivery service, users generally can skip ads embedded in the video program and can search for ads with text input and receive ads that match their interests. For each ad viewed, the user can be watched for a fee. The compensation may be insignificant and used to stimulate the high penetration of the ads viewed by interested users who would actually buy the products presented by the ads. The advertisement can be played in a `` click and play '' mode, `` short play and skip to the next (sh 0 rtp 1 ayandski ρ ί 〇thenext) '', or `` play until I stop ( p 1 ayunti] I saystop) · 'mode. Dialogue between playback modes can be controlled by the user. PPV advertisers can purchase configurations that are high above the list. Users can enter weights to search terms to increase or decrease the order in which ads are displayed for search results. When PPV advertisements are packaged with audio delivery services, audio equivalent to display user weighting can be delivered by using user terminal 60 or a remote control. A user may select a continuous play mode of the advertisement or a "listen and skip" mode to allow the user to listen to any part and then skip to the next advertisement. Text can be added to a video or audio service by using a display embedded in the advertising player. Full content delivery using CG-based capture / storage and content service delivery access to network bandwidth A method for distributing content data over the network according to the present invention-28- 200528979 (25) 7 Figure. First, in step 600, a first network unit receives a content distribution instruction from the network. Next, in step 602, the first network unit stores a first portion of content data from the network. Then, in step 604 ', the first network unit initiates a request through the network according to the content distribution instructions and responds to a user request for the rest of the content data. In step 606, the first network unit receives the rest of the content data from the network. Then, in step 608, the first network unit combines the first part of the content data with the rest of the content data. In step 610, the first network unit supplies the combined content data to the user. Finally, in step 6 1 2, the first network unit selectively forwards the first part of the content data to a first network unit according to the content distribution instructions. In more detail, this method according to the present invention incorporates the use of network units such as CG 5 8 to store a portion or piece of content delivered with IC P controlled content delivery so that the CG 5 8 can be used to Respond to users' requests to deliver content from their clips to each other. SP A Control content The server 56 first receives all incoming content. The SPA control content server 56 may be composed of any number of platforms. The incoming content can be video, music, books, software, games, and so on. After receiving the content, the SPA-controlled content server 56 then distributes a substantial portion of the content for storage in its user network CG 58 in order to reduce the data communication requirements through its network connection. An individual CG 58 receives a controller command from ICP 50 and a small piece or portion of the overall content. The content downloaded to the CG 58 thus reaches 100% of the delivered content. Therefore, the small pieces of content downloaded by -29- 200528979 (26) are stored in a network partition of the content storage device 108 in each CG 58, and the SPA control content server 56 is only allowed to "write" and The user only grants " read " to it, and then only downloads the content to CG 5 8 from CG 5 8 or ICP controlled content server 5 6 at ICP 50 from the request for that content and as directed. The content requested by the user can also be stored in this network partition of the content storage device 108. A user can delete content due to a user's request. Based on distributing content from C G 5 8 to additional CGs to meet the needs of other users, the "deletion" of all users can be immediately allowed or deferred to a later event by ICP 50. The IP address and other unique identifying information about which C G 5 8 holds which part of the content is tracked by the SPA control content server 56 and ICP 50. This technique further parses individual files into smaller chunks and then places them in an array of CG 58 to place several "seed CGs" within a network containing the same content. In this way, a violent burst of packets can be generated, overcoming the imbalance between the upstream and downstream bit rate speeds that are delivered to CG 58. Many CGs with lower upstream (CG to network) rates can download data to a request for a higher downstream (network to CG) rate download. In addition, the SPA control network element 54 can facilitate the distribution of content by storing the seeds or pieces of content to be distributed in order to reduce the requirements on the SPA control content server 56. In response to a user's request for content, the user can access all content stored in the C G and other C G network partitions controlled by IC P 50. When many users request the same content, then I C P 5 0 indicates a copy of the content because it is to be distributed to C G 5 8. "-30- 200528979 (27) Copying" is a technology by which the first CG to receive specific content transfers the content to other CCs. These other CGs can sequentially download content to several subsequent CGs. Therefore, C G 5 8 selectively forwards the content file of this part according to the instruction received from IC P 5 0. In this way, all c Gs receive content in a short period of time. If the file cannot be obtained from any other CG, the ICP 50 instructs the content to be delivered from the SPa control content server 56 to the requesting user. Once a content file resides in CG 58, the associated user can choose to play it. The content is not displayed on consumer electronics and displayed on the user terminal 60, but is delivered to other terminals as long as the content is licensed. Content delivered by a user request will be stored in the user's CG 5 8 network partition. Under license, playback of content and / or file transfers using consumer electronics is permitted. I C P 5 0 keeps track of which C G 5 8 is powered on and is active and available. I C P 5 0 also keeps track of the content written to the active C G by SP A control content server 56. Content can be regularly removed from these CC network partitions in several ways. First, a "Delete Date" is available for each content file. Second, when new content is delivered, the SPA control content server 56 notifies the CG 58 of the deletion, and the SPA control content server 56 can delete the content. Third, if the space in the network partition is too small to accept new content, the oldest content can be wiped out. A fourth ' user may delete content that was previously downloaded upon user request. CG 58 may also include a user partition where one user can store content that he or she owns. The content stored in a user partition can be -31-200528979 (28) Any file including, for example, media, and software, and data files. The content in a user zone can also be retrieved by a user via a user terminal 'or can be transmitted to a sequence of consumer electronic products at the location of the user to be played or displayed. ICP, CG and network component database structure Each ICP 50 can maintain a master database for controlling SPA control content 5 6, C G 5 8 and SP A control network component 5 4. The database can be managed as a database system accessed by the ICP software. Yes' no storage space is allocated for the record column with empty content. Each of the CG network elements 54 and the SPA control content server 56 may also hold 3 to a subset of the banks for processing. The following sections describe the various types of data maintained in the I C P 50 main database and in C G 5 8, components 54, and SPA control content servers 56 content servers. Individually managed CGs, network components, content servers and provisioning user identifiers MP 50, CG 58, network components 54, and SPA control content 56 databases may each contain hardware records. The main database of ICP 50 can include the current records for each CG 5 8, network component 54, and SPA control internal server 56. ICP 50 uses a "history folder" to manage the day 5 8. Network components 5, 4, and SPA control content server 5 6, the "file folder" includes up to ten past records to explain to the user I sp storage 60 storage 3 types of servers The owner is best 58 > Data Network Holder / Servo record Rongsi I CG history entry-32- 200528979 (29) 6 2. Network components 5 4, CG 5 8 and SPA control content server 5 6 Software changes. The information in the master database record may include, for example, user / contact name, company name, address, city, state, country, postal code, phone number, email address, CG 58, SPA control network element 54, Or hardware address of SPA control content server 56, CG 58, SPA control network element 54 or unique identifier, model, serial number, hardware release version, software release version, URL enforcement of SPA control content server 56 Agency copy, event logged in from cg 5 8, network element 54 or SPA control content server 56, authentication pre-authentication URL or IP address, active image ID, inactive image ID, active / inactive flag, Instant QoS flags, and VoIP QoS flags. The CG 58, network element 54, and SPA control content server 56 database records may each include individual corresponding identification information that they have. C G, current regenerative software versions and images of network components or content server models. This record is maintained only in the ICP 50 master database. The following columns can be kept in this master database for each managed CG 58, network component 54, or SPA-controlled content server 5 6: Model, hardware release version, software release version, current code image, last two Code images, and release notes for customer support. Manage I C P list Manage ICP list data is kept only in CG 58, SPA control network element -33- 200528979 (30) pieces 5 4 and SP A control content server 56. This information includes the URL or IP address to the ICP 50 that can control the associated C G 5 8, network element 5 4 or SP A control content server 56. The first input is permanent and allows initial registration and download of ICP addresses to an ISP associated with that particular CC, network element, or SPA control content server 56. Active image list ICP 50, CG 58, network element 54, and SPA control content server 5 6 databases each contain active image list data. Active processing is a subroutine that can be executed by the regeneration software executed in each CG 58 when the CG is in an active state. Whenever a CG 5 8, SPA control network element 5 4, or SPA control content server 56 performs a `` I'm Active '' login, the active processing can be ICP 50 changes without changing the current regeneration software. Copies of the active processing routines can be downloaded to CG 5 8, SPA control network element 5 4, or SPA control content server 5 6 ' The intervention system 64 is instructed by an image distribution routine applied to ICP 50 by human input. A human operator can identify a set of "unique identifiers" that can be carried by each specific initiative. The initiative The processing image list can be empty. The idle processing image list ICP 50, CG 5 8, network element 5 4, and SPA control content server 56 database can each contain the idle processing image list data. The idle processing system can be When the CG is in an active state, it is executed on each c G 5 8 -34- 200528979 (31) The subroutine executed by the software. Whenever a CG 5 8, SPA control network element 54, or SPA control content Server 56 runs an "I'm idle ,, ( "I'm Idle") when signing, such idle processing icp 5〇 be changed without changing the reproduction software. These idle processing images are downloaded to CG 5 8, SPA control network element 5 4, or spa control content server 56, and are distributed by an image applied to ICP 50 by human input in active intervention system 64. As indicated by the routine. The human operator can identify a set of unique identifiers that can be carried by each particular idle process. The list of idle process images can be empty. P 2 P idle process attack URL list P 2 P idle process attack URL The list is kept only in the ICP 50 and CG 5 8 databases. The data contains a list of URLs or IP addresses of websites containing illegally distributed unlicensed material that can be attacked by the idle processing. The list can be empty This list contains a set of flags to define the type of content that these illegal websites have to be provided by the active intervention system 64. The Department of Defense (DOD) idle processing attack URL list DOD idle processing attack URL list information is only used by Stored in the icP 50, CG 58, and SPA control network element 54 databases. This is a list of URLs or IP addresses generated by the DOD to be attacked during the idle processing period. The The list can be empty. -35-200528979 (32) "Sneak Peek" URL Lists "Seek Peek" URL lists are only stored in the ICP 50 and CG 58 databases. This information contains a list of URLs or IP addresses that will be presented to the user with a "first entry" browser screen. This list can be empty 'or can have one or more inputs. Multiple inputs can be cycled through a routine built into Icp 50 or C G 5 8 software. Ad Insert URL List The Ad Insert URL list data is only stored in the ICP 50 and CG 58 databases. This information contains a list of URLs or IP addresses that are presented to the user on an "advertising" browser screen. This list can be empty or it can have one or more logins. Multiple logins can be built into the routine of the CG58 through the entire cycle. List of legal content URLs The list of legal content URLs is only stored in the ICP 50 and CG 58 databases. This information contains a list of URLs or IP addresses that are presented to users as legitimate websites when they attempt to connect their browser to one of the URLs or IP addresses on the "P 2 P Blocking URLs" list. This list can be empty or it can have one or more inputs. Multiple inputs can be cycled through a routine built into the CG 58. The content flag from this P2P blocked URL list is used by the active CG 58 or SPA-controlled content server 56 to process a browser screen containing a URL that matches the "legal content URL" that the user is trying to access. To present to the user. -36-200528979 (33) p 2 P blocked URL list P 2 P blocked URL list data is only stored in the ICP 50 and 58 databases. This information contains a list of website URLs or IP addresses of illegally distributed unlicensed material to be actively processed to block access. This list can be empty. This list contains a set of flags that define the status of the content to be provided by these illegal websites that E-active intervention system 64 is aware of. These flags are used by CG 5 8 software to present a browser screen to users with "legal content sites". When they try to direct their browsing to a site on this list, etc., The legitimate content website mentions the content similar to the P 2 P blocking URL. P 2 P QoS restricted URL list P 2 PQ 〇S restricted URL list data is only stored in I c P 5 0 CG 5 8 In the database, this data contains a list of URLs or IP addresses of websites that contain illegally distributed unauthorized data, and the amount of such illegally distributed licensed data and the output from users is processed by the initiative Strictly compressed. The list can be empty. This list contains a set of flags that define the type of content that these illegal sites are to be provided by the active intervention system 64. These flags are used by CG 5 8 software to present A "first bite" or advertisement browser screen is provided to a user who contains a "legal content website", etc. The M legal content website `` provides content similar to that provided by the p 2 P QoS restriction URL. CG's famous quilt container can be used in this place. -37-200528979 (34) Entrance Block URL List The entrance block URL list data is only saved in ICP 50, CG 58, and network components 5 4 In the library. This information contains a list of URLs or IP addresses that have been blocked in accordance with ISP policy or requested by an administrator or court order. Blocking is performed by a C G 5 8 active processing program or a network element 5 4. The list can be empty. This list is used by the active handler to present a browser screen containing a "No URL Available" message to the user, or similar to the requesting user. Ingress QoS Restricted URL List

入口 QoS限制URL名單資料僅被保存在ICP 50、CG 5 8、及網路元件5 4資料庫中。該資料包含由於缺乏具一 相關聯I S P之契約的配置來遞送高輸出量或產生進入網路 的高階交通而其Q〇S要被CG 58主動處理程序或SPA控 制網路元件54嚴格限制之網站的URL或IP位址的一名 單。該名單可以是空的。此種限制控制I S P的核心網路成 本。 執法機關’’複製到”名單 執法機關”複製到”名單資料僅被保存在ICP 50、CG 58、及網路元件54資料庫中。該資料包含Cg 58、SPA 控制網路元件5 4或被一獨特識別符及交通要被複製到它 們的URL的該(等)執法網站的URL或IP位址被竊聽、 辨識出的S P A控制內容伺服器5 6的一名單。其係於接收 -38- 200528979 (35) 到一合法竊聽命令之際在主動介入系統6 4被人爲輸入。 該名單可以是空的。多於一個機關可被複製。 封包檢查形態名單 封包檢查形態名單資料僅被保存在ICP 50、CG 58、 及網路元件5 4資料庫中。該資料包含諸形態的一名單, 該等形態係在CG 58或SPA控制網路元件54中的封包檢 查常式使用來發現指出病毒的形態、病毒造成的交通、或 其它正被送進網路5 2的不想要的資料。 被接收事件記錄表 被接收事件記錄表資料僅被保存在ICP 50主資料庫 中。該資料包含由 CG 58、SPA控制內容伺服器 56或 S P A控制網路元件5 4報告給I C P 5 0的事件的一記錄。其 可包含三個欄:報告它的C G 5 8的獨特ID、一事件ID及 一事件敘述。 被發送事件記錄表 被發送事件記錄表資料僅被保存在C G 5 8、網路元件 5 4、及S P A控制內容伺服器5 6資料庫中。該資料包含由 CG 58、網路元件54、或SPA控制內容伺服器56報告給 I C P 5 0的事件的一記錄。其可包含三個欄:C G 5 8之獨特 ID '網路元件 54、或 SPA控制內容伺服器56的獨特 ID、一事件I D及一事件敘述。 - 39- 200528979 (36) 版權登錄 版権登錄資料僅被保存在ICP 50主資料庫中。該資 料包含來自版權持有者或用戶登錄者的辨識資訊以及已被 登錄之整個內容的一檔案。來自該等檔案之資訊係用來產 生檔案簽署,該封包檢查處理可使用檔案簽署來發現一有 版權的作品正藉電子郵件被發送或接收而加以阻斷。 網上內容 網上內容資料僅被保存在ICP 50主資料庫中。該資 料包含當下可取用給用戶下載的內容的元資料。而且該資 料可包含一組指標給各個元資料檔案,顯示哪個 S P A控 制內容伺服器5 6或CG 5 8具有該當下可取用給用戶下載 至C G 5 8之內容檔案的哪些部分。此外,該資料可包含一 組指標給各個元資料檔案,顯示SPA控制內容伺服器56 或C G 5 8的哪個要複製該內容及元資料檔案,以及包含內 容下載至其它C G 5 8之狀態的一進度指示器。 進入及正被下載的內容 進入及正被下載的內容資料僅被保存在CG 58及SP A 控制內容伺服器5 6資料庫中。 於CG 58中此資料可包含目前供用戶下載或觀看的內 容的元資料。該資料亦可包含一組指標(自1C P 5 0發 送)供各個正被下載之內容檔案,顯示哪個SPA控制內 -40- 200528979 (37) 容伺服器56或CG 58具有目前可供下載至cg 58之該內 容檔案的哪些部分。該資料亦可包含一組指標(自I C P 5 0 發送)供各個包含在C G 5 8內之”種子,,內容檔案,顯示其 它C G 5 8要將該內容及元資料檔案複製到哪裡,以及亦可 包含內容下載至其它CG 58之狀態的一進度指示器。 於S P A控制內容伺服器5 6中,此資料可包含目前可 自SPA控制內容伺服器56取用供用戶自對應的SpA控制 內容伺服器56下載至CG 58之內容的元資料。該資料亦 可包含一指標給各個元資料檔案,其顯示哪些C G 5 8要具 有被下載給它們之內容檔案及一指示內容下載至CG 58之 狀態的程式指示器。 預先授權旗標 預先授權旗標資料僅被保存於ICP 50、網路元件 54、及S P A控制內容伺服器5 6資料庫中。此資料係用來 保證正被用戶使用的C G 5 8係”受I C P管理的"。其於每次 C G從閒置進入活動或從活動進入閒置時被更新,其係一 個由C G 5 8啓始的父易。未佔用的預先授權旗標係由s P A 控制網路元件5 4或S PA控制內容伺服器5 6使用來阻絕 用戶企圖以無人管理的CG 58存取網路52的服務。 本發明並不受限於上述之實施例,但能利用多種組態 加以執行。熟於此技藝之人士可明瞭,可從事與本發明背 景有關之多種修改及變化,且於實施上不會背離本發明之 範疇與精神。 - 41 - 200528979 (38) 【圖式簡單說明】 第1圖說明實施本發明的整體環境。 第2圖說明根據本發明之通訊閘道器。 第3圖說明根據本發明之一網際網路控制點。 第4圖說明根據本發明之一網路元件。Ingress QoS restricted URL list data is only stored in the ICP 50, CG 58, and Network Components 5 4 databases. This information includes websites whose QOS is severely restricted by the CG 58 proactive process or the SPA control network element 54 due to the lack of a contracted configuration with an associated ISP to deliver high output or generate high-level traffic into the network. A list of URLs or IP addresses. The list can be empty. This restriction controls the core network cost of the I SP. Law enforcement agencies "copy to" list law enforcement agencies "copy to" list data is only stored in the ICP 50, CG 58, and network element 54 database. This data contains Cg 58, SPA control network element 5 4 or A list of unique identifiers and traffic to which the URL or IP address of the (etc.) law enforcement website is to be copied, and the identified SPA-controlled content server 5 6 is based on receiving -38- 200528979 (35) At the time of a legal eavesdropping order, it was manually entered in the active intervention system 64. The list can be empty. More than one agency can be copied. Packet inspection pattern list Packet inspection pattern list data is only stored in ICP 50, CG 58, and network element 54 database. This data contains a list of patterns that are used by the packet inspection routines in CG 58 or SPA control network element 54 to detect the indicated virus Morphology, traffic caused by viruses, or other unwanted data being sent to the network 5 2. Received event log sheet Received event log sheet data is only stored in the ICP 50 master database. This data containsA record of the event reported by CG 58, SPA control content server 56 or SPA control network element 54 to ICP 50. It may contain three columns: the unique ID of the CG 5 8 reporting it, an event ID, and a Event description. Sent event record table The sent event record table data is only stored in the database of CG 5 8, network element 5, 4 and SPA control content server 5 6. This data contains data from CG 58, network element 54 or a record of the event reported by the SPA control content server 56 to the ICP 50. It may contain three columns: the unique ID of the CG 58 'network element 54, or the unique ID of the SPA control content server 56, An event ID and an event description.-39- 200528979 (36) Copyright registration version 権 The registration information is only saved in the ICP 50 master database. This information contains identification information from the copyright holder or user registrant and has been registered A file of the entire content. Information from these files is used to generate file signatures. The packet inspection process can use file signatures to discover that a copyrighted work is being blocked by sending or receiving an email. The online content data of the above content is only stored in the ICP 50 master database. The data contains metadata that is currently available to users for downloading. And the data can include a set of indicators for each metadata file to show which SPA control The content server 56 or CG 58 has which parts of the content file that are currently available for download to the CG 58. In addition, the data may include a set of indicators for each metadata file, showing the SPA control content server 56 Or which of the CG 5 8 should copy the content and metadata file, and a progress indicator containing the status of the content downloaded to other CG 5 8. Incoming and Downloading Content The data of incoming and downloading content is only stored in the CG 58 and SP A Control Content Server 5 6 database. In CG 58 this material may contain metadata for content currently available for download or viewing by users. The data can also contain a set of indicators (sent from 1C P 50) for each content file being downloaded, showing which SPA control is within the range of 40- 200528979 (37) The content server 56 or CG 58 has a download currently available to cg 58 which parts of the content file. The data may also contain a set of indicators (sent from ICP 50) for each "seed", content file contained in CG 58, showing where other CG 5 8 will copy the content and metadata files, and also A progress indicator that can include the status of downloading content to other CG 58. In the SPA control content server 56, this data may include the SpA control content server that can currently be accessed from the SPA control content server 56 for users to self-correspond. The metadata of the content downloaded to the CG 58 by the browser 56. The data may also include an indicator to each metadata file, which shows which CG 58 needs to have the content file downloaded to them and an instruction to download the content to the CG 58 Program indicator. Pre-authorization flag data is only stored in the ICP 50, network element 54, and SPA control content server 5 6 database. This data is used to ensure that the CG being used by the user 5 8 Series "" Managed by ICP. It is updated each time C G enters an activity from idle or enters idle from an activity, and it is a parent that started with C G 5 8. Unoccupied pre-authorization flags are used by SPA to control network element 54 or SPA to control content server 56 to prevent users from attempting to access network 52 services with unmanaged CG 58. The invention is not limited to the embodiments described above, but can be implemented using a variety of configurations. Those skilled in the art can understand that they can engage in various modifications and changes related to the background of the present invention, and the implementation will not depart from the scope and spirit of the present invention. -41-200528979 (38) [Brief description of the drawings] Fig. 1 illustrates the overall environment in which the present invention is implemented. Figure 2 illustrates a communication gateway according to the present invention. Figure 3 illustrates an Internet control point according to the present invention. Figure 4 illustrates a network element according to the present invention.

第5圖係一根據本發明之一用以選擇性傳送網路存取 請求之方法的流程圖。 第6圖係一根據本發明之一用以禁止對一網路之內容 伺服器存取之方法的流程圖。 第7圖係一根據本發明之一用以在網路中散佈內容之 方法的流程圖。 【主要元件符號說明】 5 0 網際網路控制點 5 2 網路 54 SPA控制元件 5 5 非SPA控制元件 56 SPA控制內容伺服器 5 7 非S P A控制內容伺服器 58 通訊闡道器 60 用戶終端 6 2 網際網路服務提供者入口 64 主動介入系統 -42- 200528979 (39) 66 存取點 1 〇〇 使用者介面 102 網路介面 104 記憶體裝置 10 6 處理器 10 8 內容儲存裝置FIG. 5 is a flowchart of a method for selectively transmitting a network access request according to the present invention. Figure 6 is a flowchart of a method for disabling access to a content server of a network according to the present invention. FIG. 7 is a flowchart of a method for distributing content in a network according to one embodiment of the present invention. [Description of main component symbols] 5 0 Internet control point 5 2 Network 54 SPA control element 5 5 Non-SPA control element 56 SPA control content server 5 7 Non-SPA control content server 58 Communication interpreter 60 User terminal 6 2 Internet Service Provider Entrance 64 Active Intervention System-42- 200528979 (39) 66 Access Point 1 00 User Interface 102 Network Interface 104 Memory Device 10 6 Processor 10 8 Content Storage Device

110 外殼拆卸檢測器 200 網路介面 2 02 處理器 2 04 記憶體裝置 3 0 0 網路介面 3 0 2 處理器 3 04 記憶體裝置 3 06 交換機模組110 Case removal detector 200 Network interface 2 02 Processor 2 04 Memory device 3 0 0 Network interface 3 0 2 Processor 3 04 Memory device 3 06 Switch module

-43--43-

Claims (1)

200528979 (1) 十、申請專利範圍 1 · 一種用以規範對網路存取之系統,該系統包含: 一耦合至該網路之控制器節點,該控制器節點包括: • 一*桌一處理器,用以產生諸控制器指令;以及 一第一網路介面,用以透過該網路傳送該等控制器指 令;以及 多數個閘道器單元,該等閘道器單元包含: 一使用者介面,接收使用者輸入之網路存取請求; 一第二網路介面,稱合至該網路且接收來自該網路的 該等控制器指令;以及 一第二處理器,該第二處理器根據該等控制器指令透 過該網路選擇性地傳送至少一些網路存取請求,以及經由 該第二網路介面透過該網路傳送回應該等被傳送之網路存 取請求的內容資料。 2 .如申請專利範圍第1項之系統,其中: 該閘道器單元進一步包含一用以儲存指令之儲存裝 置; 該閘道器單元進一步包含一將該等閘道器單元獨特地 與一使用者相關聯之識別符;以及 該儲存裝置係可操作以儲存使用者特定資訊。 3 .如申請專利範圍第1項之系統,其中: 該等閘道器單元包含一使用者介面,接收要傳送資料 的請求;以及 該等閘道器單元包含一第二處理器,檢查該資料以根 -44 - 200528979 (2) 據該等控制器指令選擇性地傳送該資料。 4. 如申請專利範圍第1項之系統’其中: 該等閘道器單元包含一使用者介面,接收要接收資料 的請求;以及 該等閘道器單元包含一第二處理器,檢查該資料以根 據該等控制器指令選擇性地傳送該資料。 5. 如申請專利範圍第1項之系統,其中該第一處理器 自動地產生該等控制器指令。 6 .如申請專利範圍第1項之系統’其中該桌一處理器 回應一操作者輸入之請求產生該等控制器指令。 7 .如申請專利範圍第1項之系統,其中該等控制器節 點包含一第一處理器,藉操作者控制之網路爬行產生該等 控制器指令。 8 .如申請專利範圍第1項之系統,其中該等控制器節 點包含一第一處理器,產生該等控制器指令以阻絕使用者 對第一群組之網路伺服器的存取° 9 .如申請專利範圍第8項之系統,其中該等閘道器單 元包含一第二處理器,以便倘若一網路存取請求指定該第 一群組之網路伺服器的一網路伺服器,則對一控制器節點 產生一通知。 1 0 ·如申請專利範圍第8項之系統,其中該等閘道器 單元包含一第二處理器,以便: 檢測一指定一第一群組之網路伺服器的一網路伺服器 的網路存取請求;以及 -45 - 200528979 (3) 根據該等控制器指令將該存取請求重新指向至一第二 群組之網路伺服器。 11 ·如申請專利範圍第1項之系統,其中: 該等控制器節點包含一產生該等控制器指令的第一處 理器,該控制器指令包括一檔案識別符;以及 該系統包含多數個與一使用者檔案系統相關聯之閘道 器單兀’該等閘道器單元包含一第二處理器以檢測一使用 者檔案系統中對應於該檔案識別符的檔案。 1 2 ·如申請專利範圍第1 1項之系統,其中該等閘道器 單元係可操作於一活動狀態與一非活動狀態之間。 1 3 .如申請專利範圍第1 2項之系統,其中倘若該相關 聯之閘道器單元進入一非活動狀態,則該等第二處理器通 知一控制器節點。 1 4 ·如申請專利範圍第I 2項之系統,其中該等第二處 理器根據該等控制器指令從一使用者檔案系統刪除該等被 檢測到的檔案。 1 5 .如申請專利範圍第1 4項之系統,其中該等第二處 理器於該非活動期間自一使用者檔案系統刪除該等被檢測 到的檔案。 1 6 ·如申請專利範圍第1 1項之系統,其中倘若一對應 於該檔案識別符的檔案被刪除,則該等閘道器單元通知一 控制器節點。 1 7 .如申g靑專利範圍第1項之系統,其中該等閘道器 單元包含: -46 - 200528979 (4) 一外殼;以及 一檢測器,用以檢測一欲開啓該外殼的企圖。 1 8 .如申請專利範圍第1 7項之系統,其中該閘道器單 元在一使用者啓動之事件之後通知該控制器節點有一被檢 測到之欲開啓該外殼的企圖。 1 9 .如申請專利範圍第1 7項之系統,其中該等閘道器 單元包含一儲存裝置且當該檢測器檢測到一欲開啓該外殼 的企圖時,該第二處理器防止對該儲存裝置的存取。 2 〇 ·如申請專利範圍第1項之系統,其中該等閘道器 單元包含一第二處理器,其在接收來自該控制器節點的許 可之後進入一使用者控制操作模式。 2 1 ·如申請專利範圍第1項之系統,其中該控制器節 點包含一版權註冊,用以追蹤散佈至該系統中閘道器單元 之內容資料檔案的版權狀態。 2 2 .如申請專利範圍第2 1項之系統,其中該使用者介 面接收用以傳輸至該版權註冊之該等內容資料檔案的註 冊。 2 3 .如申請專利範圍第1項之系統,其中該第二處理 器根據該等控制器指令,致使該閘道器單元於網路瀏覽器 軟體啓動之際存取一預定網路。 24.如申請專利範圍第23項之系統,其中該第二處理 器從經由該等控制器指令接收之一預定網路站台的名單中 選取該預定的網路站台。 2 5 .如申請專利範圍第2 4項之系統,其中該第二處理 -47 - 200528979 (5) 器根據一加權功能選取該預定的網路綱站,使得該等預定 網路站台的至少一部分較其它者更常被選取。 2 6 .如申請專利範圍第1項之系統,其中該等閘道器 單元·· 經由該使用者介面接收一來自一使用者的註冊資訊; 以及 經由該第二網路介面接收初始作業參數。 2 7 .如申請專利範圍第1項之系統,其中該等閘道器 單元: 經由該使用者介面接收一來自一使用者的註冊資訊; 以及 經由該第二網路介面接收軟體更新。 2 8 .如申請專利範圍第1項之系統,其中: 該等閘道器單元經由該使用者介面傳送廣告至一使用 者顯示器,該廣告根據經由該第二網路介面與該使用者介 面的至少其中之一者接收之資訊定製的。 2 9 .如申請專利範圍第1項之系統,其中該等閘道器 單元: 經由該使用者介面傳送計次付費廣告給使用者的選擇 性顯示;以及 於該廣告被該使用者顯示之際產生簽帳額給該使用 者。 3 0 .如申請專利範圍第2 9項之系統,其中該等閘道器 單元回應一使用者選擇產生多數個觀看模式中的其中之一 -48 - 200528979 (6) 觀看模式以觀看該計次付費廣告。 3 1 .如申請專利範圍第1項之系統,其中該等閘道器 單元經由該第二網路介面接收軟體供在該第二處理器中執 行,該軟體建立其中之一以費用爲基礎之網路服務、網路 視訊電話、以及網路遊戲。 3 2 .如申請專利範圍第1項之系統,其中該第二處理 器檢測一阻絕服務攻擊。 3 3 ·如申請專利範圍第3 2項之系統,其中該第二處理 器檢測一由一病毒啓動的阻絕服務攻擊。 3 4 ·如申請專利範圍第1項之系統,其中該等閘道器 單元選擇性地將描述給該等閘道器單元之進入資料與外送 資料之至少其中之一的資訊傳送至執法終端。 3 5 ·如申請專利範圍第1項之系統,其中該等閘道器 σα - 早兀 : 檢測一使用者傳送與接收聲音交通至少其中之一的企 圖;以及 根據該等控制器指令選擇性地阻斷該被檢測到之企 圖。 3 6 .如申請專利範圍第3 5項之系統,其中該等閘道器 單元經由該使用者介面傳送一提供聲音傳輸服務的廣告。 3 7 .如申請專利範圍第1項之系統,其中該等閘道器 pg — 早兀: 檢測一使用者企圖傳送與接收聲頻與視訊交通其中之 一者的至少其中之一;以及 -49- 200528979 (7) 根據該等控制器指令選擇性地阻斷該被檢測到的企 圖。 3 8 .如申請專利範圍第3 7項之系統,其中該等閘道器 單元經由該使用者介面傳送一提供聲頻與視訊交通服務之 至少其中之一者的廣告。 3 9 ·如申請專利範圍第丨項之系統,其中該等閘道器 單元: 檢測流經該第二網路介面之聲頻與視訊交通之至少其 中之一者;以及 根據該等控制器指令選擇性地降低聲頻與視訊交通之 至少其中之一者的服務品質, 其中服務品質的降低包含以下至少其中之一:降低工 作週期、插入TCP/IP訊息於聲頻與視訊交通之至少其中 之一者中、插入Nak/Ack對於聲頻與視訊交通之至少其中 之一者中、以及插入X-On/X-Off對於聲頻與視訊交通之 至少其中之一者中。 4 〇 ·如申請專利範圍第1項之系統,進一步包含多數 個存取節點,其中該控制器節點包含一用以產生授權指令 及透過該網路傳送該等授權指令至該等存取節點之第一處 理器,且該等存取節點: 接收來自該控制器節點之該等授權指令;以及 根據該等授權指令選擇性地許可該等閘道器單元存取 該網路。 4 ].如申請專利範圍第1項之系統,其中該等閘道器 -50- 200528979 (8) 單兀包含被區分成一網路部分及一使用者部分的資料儲存 單元’且一群組之閘道器單元的至少其中之一者根據該等 控制器指令,經由該第二網路介面,選擇性地與一第二群 組之閘道器單元的至少其中之一者分享儲存於該網路分區 中的資料。 4 2.如申請專利範圍第丨項之系統,其中於該等閘道 器單元之至少一第一閘道器單元中的第二處理器根據該等 控制器指令選擇性地將接收自該等閘道器單元之至少一第 二閘道器單元的內容資料轉送至該等閘道器單元之至少一 第三閘道器單元。 4 3 .如申請專利範圍第4 2項之系統,其中於該等閘道 器單元之至少其中--第一閘道器單元中的該第二處理器: 根據該等控制器指令自一群組之聞道器單元接收一內 容資料檔案的部分;以及 基於該等被接收到之部分組合一資料檔案用以經由該 使用者介面傳輸給該使用者。 4 4 ·如申請專利範圍第1項之系統,進一步包含一介 入節點,該介入節點包含: 一操作者介面,用以接收操作者輸入的造假攻擊指 令;以及 一第二網路介面,用以根據該等造假攻擊指令傳送至 少一替代檔案指標至該網路中的位址。 4 5 ·如申請專利範圍第1項之系統,進一步包含網路 單元,該等網路單元包括: -51 - 200528979 Ο) 一網路介面,耦合至該網路並接收來自該網路之控制 器指令與來自一閘道器單元的網路交通;以及 一處理器,用以根據該等控制器指令選擇性地降低該 被接收到之網路交通的流量。 4 6.如申請專利範圍第45項之系統,其中該等網路單 元: 檢測聲音交通的流量;以及 根據該等控制器指令選擇性地阻斷該被檢測到的交 通。 4 7 .如申請專利範圍第4 5項之系統,其中該等網路單 元: 檢測聲頻與視訊交通之至少其中之一者的流量;以及 根據該等控制器指令選擇性地阻斷該被檢測到的交 通。 4 8 .如申請專利範圍第4 5項之系統,其中該等網路單 元: 檢測聲頻與視訊交通之至少其中之一者的流量;以及 根據該等控制器指令選擇性地降低該被檢測到之聲頻 與視訊之至少其中之一者的服務品質, 其中該服務品質的降低包含以下至少其中之一:降低 工作週期、插入TCP/IP訊息於聲頻與視訊交通之至少其 中之一者中、插入Nak/Ack對於聲頻與視訊交通之至少其 中之一者中、以及插入X-On/X-Off對於聲頻與視訊交通 之至少其中之一者中。 -52- 200528979 (10) 4 9 _ 一種用以規範對被多數個使用者存取之網路存取 之系統,該系統包含: 一耦合至該網路之控制器節點,該控制器節點包括: 一第一處理器,用以產生控制器指令;以及 一第一網路介面,用以透過該網路傳送該等控制器指 令;以及 多數個與第一群組之使用者相關聯之網路單元,該等 網路單元包括: 一第二網路介面,耦合至該網路且接收來自該網路的 該等控制器指令;以及 一第二處理器,該第二處理器根據該等控制器指令禁 止第二群組之使用者對該網路中之內容的存取。 5 0 .如申請專利範圍第4 9項之系統,其中網路中的該 第二處理器根據該等控制器指令藉執行阻絕服務攻擊來禁 止第二群組之使周者的存取。 5 1 .如申請專利範圍第5 0項之系統,其中該第二處理 器基於一排程執行攻擊,該排程包含以下至少其中之一 者: 一根據該等攻擊之期間的排程; 對控制器指令的即時回應·,以及 回應一事件。 5 2 ·如申請專利範圍第4 9項之系統’其中該等網路單 元之至少一部分包含獨特地與一使用者相關聯之鬧道器單 兀。 -53 - 200528979 (11) 5 3 .如申請專利範圍第5 2項之系統,其中該等閘道器 單元: 可操作於一活動狀態與一非活動狀態之間;以及 根據該等控制器指令於非活動狀期間執行阻絕服務攻 擊。 5 4 ·如申請專利範圍第4 9項之系統,其中該第二處理 器檢測一阻絕服務攻擊。 5 5 ·如申請專利範圍第5 4項之系統,其中該第二處理 器檢測一由一病毒啓動的阻絕服務攻擊。 5 6 ·如申請專利範圍第5 4項之系統,其中該第二處理 器於檢測之際防止一阻絕服務攻擊。 5 7 .如申請專利範圍第4 9項之系統,其中該等網路單 兀選擇性地將描述給該等閘道器單元之進入資料與外送資 料之至少其中之一的資訊傳送至執法終端。 5 8 · —種用以透過網路散佈內容之系統,該系統包 含: 一耦合至該網路之控制器節點,該控制器節點包括: 一弟一處理器’用以產生控制器指令;以及 一第一網路介面,用以透過該網路傳送該等控制器指 令;以及 多數個網路單元,該等網路單元包括: 一耦合至該網路之第二網路介面,於該等網路單元之 至少一第一網路單元中之該第二網路介面接收來自該網路 的該等控制器指令以及接收來自該等網路單元之至少一第 -54 - 200528979 (12) 一網路單兀的內容之〜第〜部分;以及 一%二處理器,於該等網路單元之至少第一網路單元 中根據以等控制益指令選將該內容資料槍案之該被接收到 之第4七培擇性地轉送至該等網路單元中之至少一第三 網路單元。 59·如申請專利範圍第58項之系統,其中: 該二網路介面根據該等控制器指令接收來自一群組之 網路之一內容資料檔案的多數個部分;以及 該第一處理器基於該等被接收到之部分組合一資料檔 案用以經由該使用者介面傳輸給該使用者。 60.如申請專利範圍第58項之系統,其中: 該第二網路單元之該第二網路介面接收來自一內容伺 服器之一內容資料檔案的一部分;以及 該第二網路單元之該第二處理根據該等控制器指令將 該內容資料檔案之該部分轉送至該等網路單元之至少第一 網路單元。 6 1 ·如申請專利範圍第5 8項之系統,其中該第二處理 器根據與該內容資料相關之預定刪除日期刪除部分的內容 資料。 62 .如申請專利範圍第5 8項之系統,其中當新的內容 資料被遞送時該第二處理器刪除部分的內容資料。 63 .如申請專利範圍第5 8項之系統,其中當儲存空間 仍然不充分時該第二處理器刪除部分內容資料,先刪除最 老的內容資料。 -55- 200528979 (13) 6 4 .如申請專利範圍第5 8項之系統,其中該第二處理 器根據一相關聯之使用者選擇刪除部分內容資料。 6 5 . —種用以規範對網路存取之閘道器單元,包含: 一使用者介面,接收要傳送資料的請求; 一網路介面,接收來自該網路之控制器指令;以及 一處理器,檢查該資料且根據該等被接收到之控制器 指令選擇性地傳送該資料。 66. —種用以規範對網路存取之閘道器單元,包含: 一使用者介面,接收要接收資料的請求; 一網路介面,接收來自該網路之控制器指令;以及 一處理器,檢查該資料且根據該等被接收到之控制器 指令選擇性地接收該資料。 .、 6 7 · —種用以規範對網路存取之控制器節點,該控制 器節點包含: 一處理器,產生控制器指令,用以致使多數個閘道器 單元選擇性地透過該網路傳輸使用輸入之網路存取請求, 該處理器藉至少其中之一自動產生指令產生該等控制器指 令並回應一使用者輸入之請求產生指令;以及 一網路介面,透過該網路傳送該等控制器指令至該等 多數個閘道器單元。 6 8 .如申請專利範圍第6 7項之控制器節點,其包含一 處理器,藉操作者控制之網路爬行產生該等控制器指令。 69 . —種用以規範對網路存取之控制器節點,包含: 一處理器,產生控制器指令;以及 -56- 200528979 (14) 一網路介面,透過該網路傳送該等控制器指令至多數 個閘道器單元,該等控制器指令致使至少一閘道器單元拒 絕對第一群組之網路伺服器的存取。 7 〇 .如申請專利範圍第6 9項之控制器節點,其中倘若 至少一閘道器單元檢測到一存取被阻絕之網路伺服器的請 求,則該網路介面接收來自至少一閘道器單元的通知。 7 1 .如申請專利範圍第69項之控制器節點,其中該處 理器根據該等控制器指令產生致使一閘道器單元將使用者 存取請求重新指向至第二群組之網路伺服器的指令。 72 · —種用以規範網路中檔案存取之系統,該系統包 含: 一耦合至該網路之控制器節點,該控制器節點包括: 一用以產生控制器指令之第一處理器,該等指令包括 一檔案識別符;以及 一用以透過該網路傳送該等控制器指令之第一網路介 面;以及 多數個與使用者檔案系統相關聯之閘道器單元,該閘 道器單元包括: 一第二網路介面,接收來自該網路之該等控制器指 令;以及 一第二處理器,檢測於該使用者檔案系統中對應於該 檔案識別符之檔案。 7 3 ·如申請專利範圍第7 2項之系統,其包含多數個可 操作於一活動狀態與一非活動狀態之間的閘道器單元。 -57 - 200528979 (15) 7 4 .如申請專利範圍第7 3項之系統,其中該等閘道器 單元於進入該作用狀態之際通知一控制器節點。 7 5 .如申請專利範圍第7 3項之系統,其中該等閘道器 單元包含一處理器以於該非活動狀態期間刪除該等被檢測 到之檔案。 7 6 .如申請專利範圍第72項之系統,其中倘若至少一 符合該檔案識別符之名單的檔案被刪除,則該等多數個閘 道器單元通知一控制器節點。 7 7 · —種用以規範對網路存取之閘道器單元,包含: 一使用者介面,接收使用者輸入之網路存取請求; 一網路介面’用以傳送該等網路存取請求至該網路; 一外殼;以及 一檢測器,用以檢測欲開啓該外殻之一使用者企圖。 7 8 .如申請專利範圍第7 7項之閘道器單元,其中該檢 測器在一後續的使用者啓動之事件之後,通知該控制器節 點一檢測到之欲開啓該外殼的企圖。 7 9 ·如申請專利範圍第7 7項之閘道器單元,進一步包 含一儲存裝置及一互鎖,用以當該檢測器檢測到一欲開啓 該外殼之企圖時防止對該儲存裝置之存取。 8 0 . —種用以規範對網路存取之閘道器單元,包含·· 一網路介面,用以提供對該網路的存取; 一使用者介面,接收使用者輸入之網路存取請求;以 及 一處理器,於經由該網路介面透過該網路接收來自一 -58- 200528979 (16) 控制器節點的許可之後,進入一使用者控制之操作模式。 8 1 . —種用以規範網路中檔案存取之控制器節點,包 含一版權註冊及一處理器,其中該處理器: 接收被散佈至多數個閘道器單元之內容資料檔案的註 冊;以及 追蹤該等內容資料檔案之版權狀態。 8 2 . —種用以規範對網路存取之閘道器單元,包含: 一網路介面,用以提供對該網路的存取以及用以接收 自該網路的控制器指令; 一使用者介面,用以在該網路與一使用者之間傳送內 容;以及 ——處理器,用以於網路瀏覽器軟體啓動之際,根據該 等被接收到之控制器指令連接到一預定的網路站台。 8 3 .如申請專利範圍第8 2項之閘道器單元,其中該處 理器從一預定網路站台名單中選取預定網路站台。 8 4 ·如申請專利範圍第8 3項之閘道器單元,其中該處 理器根據一加權功能自該預定網路站台名單中選擇,使得 該等預定網路站台之至少一部分較其它者更常被選取。 8 5 . —種用以規範對網路存取之閘道器單元,包含·· 一網路介面,提供對該網路之存取; 一使用者介面,在該網路與一使用者之間傳輸內容; 以及 一處理器’經由該使用者介面收集來自該使用者之註 冊資訊以及經由該網路介面接收初始作業參數。 -59- 200528979 (17) 8 6 . —種用以規範對網路存取之閘道器單元,包含: 一網路介面,提供對該網路之存取; 一使用者介面,在該網路與一使用者之間傳輸內容; 以及 一處理器,經由該使用者介面收集來自該使用者之註 冊資訊以及經由該網路介面接收軟體更新。 8 7 · —種用以規範對網路存取之閘道器單元,包含: 一網路介面,接收來自該網路之資訊; 一使用者介面,接收來自使用者之資訊;以及 一處理器,經由該使用者介面傳送廣告至一使用者顯 示器,其中該廣告係根據經由該網路介面與該使用者介面 之至少其中之一者被接收之資訊被訂製。 8 8 · —種用以規範對網路存取之閘道器單元,包含: 一網路介面,提供對該網路之存取以及接收來自該網 路之計次付費廣告; 一使用者介面,在該網路與一使用者之間傳輸內容; 以及 一處理器’經由該使用者介面傳送該計次付費廣告給 可由使用者選擇的顯示以及於該廣告被該使用者顯示之際 產生簽帳額給該使用者。 8 9 ·如申請專利範圍第8 8項之閘道器單元,其中該處 理器回應一使用者選擇產生多數個觀看模式之其中之一者 用以觀看該計次付費廣告。 9 0 . —種用以規範對網路存取之閘道器單元,包含: -60 - 200528979 (18) 一網路介面,提供對該網路之存取以及接收來自該網 路之軟體; 一使用者介面,在該網路與一使用者之間傳輸內容; 以及 一處理器,經由該使用者介面執行該軟體以致能該使 用者使用一以費用爲基礎之網路服務、網路視訊電話、以 及網路遊戲之至少其中之一者。 9 1 · 一種用以規範對網路存取之閘道器單元,包含: 一網路介面,提供對該網路之存取; 一使用者介面,接收來自一使用者之網路存取請求; 以及 一處理器,檢測自該使用者介面被接收以及經由該網 路介面被傳送至該網路之一阻絕服務攻擊。 9 2.如申請專利範圍第91項之多數個閘道器單元,其 中該處理器檢測到一由一病毒啓動之阻絕服務攻擊。 9 3 . —種用以規範對網路存取之閘道器單元,包含: 一網路介面,提供對該網路之存取以及接收控制器指 令; 一使用者介面,在一使用者與該網路介面之間傳輸進 入資料與外送資料;以及 一處理器’根據該等被接收到之控制器指令選擇性地 將描述進入資料與外送資料之至少其中之一者傳送至執法 終端。 94 . 一種用以規範對網路存取之閘道器單元,包含: -61 - 200528979 (19) 一網路介面,提供對該網路之存取以及接收控制器指 令; 一使用者介面,在該網路與一使用者之間傳輸交通; 以及 一處理器,檢測一使用者透過該網路傳送與接收聲音 交通之至少其中之一者的企圖,該處理器根據該等被接收 到之控制器指令選擇性地阻斷該被檢測到之企圖,以及經 由該使用者介面傳送一提供聲音傳輸服務之廣告。 95·—種用以規範對網路存取之閘道器單元,包含: 一網路介面,提供對該網路之存取以及接收控制器指 令; 一使用者介面,在該網路與一使用者之間傳輸交通; 以及 一處理器,檢測一使用者透過該網路傳送與接收音頻 與視訊交通之至少其中之一者的至少其中之一企圖,該處 理器根據該等被接收到之控制器指令選擇性地阻斷該被檢 測到之企圖’以及經由該使用者介面傳送一提供音頻與視 訊交通服務之至少其中之一者之廣告。 96·—種用以規範對網路存取之閘道器單元,包含: 一網路介面,提供對該網路之存取以及接收控制器指 令; 一使用者介面,在該網路與一使用者之間傳輸交通; 以及 一處理器,檢測流經該使用者介面之音頻及視訊交通 -62- 200528979 (20) 之至少其中之一者’該處理器根據該等被接收到之控制器 指令選擇性地降低該被檢測到之音頻及視訊交通之至少其 中之一的服務品質, 其中服務品質的降低包含以下至少其中之一:降低工 作週期、插入TCP/IP訊息於聲頻與視訊交通之至少其中 之一者中、插入Nak/A ck對於聲頻與視訊交通之至少其中 之一者中、以及插入Χ-Οη/Χ-Off對於聲頻與視訊交通之 至少其中之一者中。 9 7 . —種用以規範對網路存取之網路單元,包含: 一網路介面,提供對該網路之存取以及接收控制器指 令與網路交通;以及 一處理器,檢測透過該網路的聲音交通,該處理器根 據該等被接收到之控制器指令選擇性地阻斷該交通。 9 8 · —種用以規範對網路存取之網路單元,包含: 一網路介面,提供對該網路之存取以及接收控制器指 令與網路交通;以及 一處理器’檢測透過該網路的音頻與視訊交通之至少 其中之一者,該處理器根據該等被接收到之控制器指令選 擇性地阻斷該交通。 9 9 · 一種用以規範對網路存取之閘道器單元,包含: 一網路介面’提供對該網路之存取以及接收控制器指 令與網路交通;以及 一處理器’檢測音頻與視訊交通之至少其中之一者, 該處理器根據該等被接收到之控制器指令選擇性地降低該 200528979 (21) 被檢測到之音頻及視訊交通之至少其中之一的服務品質, 其中服務品質的降低包含以下至少其中之一:降低工 作週期、插入TCP/IP訊息於聲頻與視訊交通之至少其中 之一者中、插入Nak/Ack對於聲頻與視訊交通之至少其中 之一者中、以及插入Χ-Οη/Χ-Off對於聲頻與視訊交通之 至少其中之一者中。 1 0 0.—種用以規範對網路的用戶存取之控制器節點5 包含: 一處理器,產生代表一被鑑定之用戶的鑑定指令; 一網路介面,傳送該鑑定指令至一與該網路耦合的存 取節點;以及 其中該存取節點根據該等被接收.到‘之鑑定指令選擇性 地許可對該網路的用戶存取。 1 01 . —種用以規範對網路存取之閘道器單元,包含: 一網路介面,提供對該網路之存取以及接收控制器指 令; 一資料儲存單元,區分成一網路分區及一使用者分 區;以及 一處理器,根據該等被接收到之控制器指令經由該網 路介面選擇性地傳送被儲存於該網路分區內之資料。 1 0 2 . —種用以規範對網路存取之網路單元,包含: 一使用者介面,接收使用者輸入之網路存取請求; 一網路介面,耦合至該網路且接收來自該網路之控制 器指令,以及 -64 - 200528979 (22) 一處理器,該處理器根據該等控制器指令選擇性地透 過該網路傳送該等網路存取請求之至少一些者,以及經由 該網路介面透過該網路傳輸回應該被傳送之網路存取請求 的內容資料, 其中該網路單元根據該等控制器指令選擇性地將接收 自第一相關聯網路單元的內容資料轉送至至少一第二相關 聯單元。 1 0 3.如申請專利範圍第1〇2項之網路單元,其中該處 理器= 根據該等控制器指令接收來自一群組之第三相關聯網 路單元的一內容資料檔案的部分;以及 基於該等被接收到之部分組合一資料檔案供經由該使 用者介面傳輸至一使用者。 104.如申請專利範圍第102項之網路單元,其中該處 理器= 接收來自一內容伺服器之一內容資料檔案之一部分; 以及 根據該等控制器指令將該內容資料檔案之部分轉送至 該第一相關聯網路單元。 1 〇 5 . —種用以規範對網路存取之網路單元,包含: 一網路介面’提供對該網路之存取以及接收控制器指 令;以及 一處理器’根據該等被接收到之控制器指令執行阻絕 服務攻擊。 ~ 65 - 200528979 (23) 10 6.—種用以規範對網路存取之方法,該方法包含: 在一與一使用者相關聯之一閘道器單元接收來自一網 路之控制器指令; 在該閘道器單元接收來自一使用者之一網路存取請 求; 根據該等控制器指令選擇性地透過該網路傳送該網路 存取請求;以及 接收來自該網路之回應該被傳送之網路存取請求的內 容資料。 1〇 7.—種用以規範對多數個內容伺服器存取之方法, 該方法包含: 在一與第一群組之使用者相關聯之一網路單元接收來 自該網路之控制器指令;以及 根據該等控制器指令選擇性地禁止第二群組之使用者 對該等內容伺服器之一部分的存取。 1 0 8 .如申請專利範圍第1 0 7項之方法,其中禁止第二 群組之使用者之存取包含執行阻絕服務攻擊。 1 0 9.—種用以透過網路散佈內容資料之方法,該方法 包含: 接收來自該網路之內容散佈指令; 在第一網路單元儲存來自該網路之內容資料的第一 部分; 根據該等內容散佈指令及回應一使用者對該內容資料 的其餘部分的請求,透過該網路啓動一請求; - 66- 200528979 (24) 接收來自該網路之該內容資料的其餘部分; 組合內容資料的第一部分與該內容資料的其餘部分; 以及 供應該組合的內容資料給該使用者。 1 1 0 .如申請專利範圍第1 0 9項之方法,進一步包含根 據該等內容散佈指令選擇性地將內容資料的第一部分轉送 至一第二網路單元。 1 1 1 · 一種用以規範對網路存取之閘道器單元,該閘道 器單元包含: 一使用者介面,接收使用者輸入之網路存取指令; 一網路介面,耦合至該網路且接收來自該網路中一控 制器節點的控制器指令;以及 一處理器,該處理器根據該等控制器指令選擇性地透 過該網路傳送該等網路存取請求之至少一些者,以及經由 該網路介面透過該網路傳輸回應該等被傳送之網路存取請 求的內容資料。 1 1 2 . —種用以規範對網路存取之與第一群組之使用者 相關聯之網路單元,該網路單元包含: 一網路介面,耦合至該網路且接收來自與該第一群組 之使用者相關聯之一控制節點的控制器指令;以及 一處理器,該處理器根據該等控制器指令禁止第二群 組之使用者對該網路中內容的存取。 ]1 3 · —種用以規範對網路存取之控制器節點,該控制 器節點包含: -67 - 200528979 (25) 一處理器,用以產生控制器指令;以及 一網路介面,用以透過該網路傳送該等控制器指令, 該等控制器指令被組態以致使一與使用者相關聯之閘道器 單元選擇性地透過該網路傳送至少一些使甩者輸入的網路 存取請求。 1 1 4 .如申請專利範圍第1 1 3項之控制器節點,進一步 包含一內容伺服器,用以提供回應該等使用者輸入之網路 存取請求的內容資料。 1 1 5 . —種用以規範對網路存取之控制器節點,該控制 器節點包含: 一處理益’用以產生控制器指令;以及 一網路介面’用以透過該網路傳送該等控制器指令至 與一第一群組之使用者相關聯之網路單元,該等控制器指 令被組態以致使該等網路單元禁止一第二群組之使用者對 該網路中內容的存取。 -68 -200528979 (1) X. Patent application scope 1 · A system for regulating access to a network, the system includes: a controller node coupled to the network, the controller node includes: Controller for generating controller instructions; and a first network interface for transmitting the controller instructions through the network; and a plurality of gateway units, the gateway units including: a user Interface, receiving a network access request input by a user; a second network interface, said to be coupled to the network and receiving the controller instructions from the network; and a second processor, the second processing The device selectively transmits at least some network access requests through the network according to the controller instructions, and transmits content data in response to the transmitted network access requests through the network through the second network interface . 2 . For example, the system of claim 1, wherein: the gateway unit further includes a storage device for storing instructions; the gateway unit further includes a gateway unit uniquely associated with a user An associated identifier; and the storage device is operable to store user-specific information. 3. For example, the system of claim 1 in the patent scope, wherein: the gateway units include a user interface to receive a request to transmit data; and the gateway units include a second processor, which checks the data to root -44-200528979 (2) The data is selectively transmitted according to the controller instructions. 4.  For example, if the system of the patent application item 1 is used, wherein: the gateway units include a user interface to receive a request to receive data; and the gateway units include a second processor, the data is checked to The controller instructions selectively transmit the data. 5.  For example, the system of claim 1 in which the first processor automatically generates the controller instructions. 6. For example, the system of claim 1 of the patent scope, wherein the processor of the table generates the controller instructions in response to a request input by an operator. 7. For example, in the system of claim 1, the controller nodes include a first processor, and the controller instructions are generated by operator-controlled network crawling. 8 . For example, the system of claim 1 in the patent scope, wherein the controller nodes include a first processor, generating the controller instructions to prevent users from accessing the first group of network servers. 9 For example, the system of claim 8 in which the gateway unit includes a second processor, so that if a network access request specifies a network server of the network server of the first group, A notification is generated for a controller node. 10 · The system according to item 8 of the patent application, wherein the gateway units include a second processor in order to: detect the network of a network server specifying a network server of a first group Access request; and -45-200528979 (3) redirect the access request to a network server of a second group according to the controller instructions. 11 · The system according to item 1 of the patent application scope, wherein: the controller nodes include a first processor that generates the controller instructions, the controller instructions include a file identifier; and the system includes a plurality of and A gateway unit associated with a user file system'The gateway units include a second processor to detect a file corresponding to the file identifier in a user file system. 1 2 · The system of item 11 in the scope of patent application, wherein the gateway units are operable between an active state and an inactive state. 1 3. If the system of claim 12 is applied for, the second processor notifies a controller node if the associated gateway unit enters an inactive state. 14 · If the system of item I 2 of the scope of patent application is applied, wherein the second processor deletes the detected files from a user file system according to the instructions of the controller. 1 5. For example, if the system of claim 14 is applied for, the second processor deletes the detected files from a user file system during the inactive period. 16 · If the system of item 11 of the scope of patent application is applied, if a file corresponding to the file identifier is deleted, the gateway units notify a controller node. 1 7. For example, the system of item 1 of the patent scope, wherein the gateway units include: -46-200528979 (4) a casing; and a detector for detecting an attempt to open the casing. 1 8. For example, the system of claim 17 in the patent application scope, wherein the gateway unit notifies the controller node of a detected attempt to open the housing after an event initiated by a user. 1 9. For example, the system of claim 17 in the patent application, wherein the gateway unit includes a storage device, and when the detector detects an attempt to open the casing, the second processor prevents the storage device from being stored. take. 2 〇 The system according to item 1 of the patent application, wherein the gateway units include a second processor which enters a user-controlled operation mode after receiving a license from the controller node. 2 1 · If the system of item 1 of the patent application scope, the controller node includes a copyright registration to track the copyright status of the content data files distributed to the gateway unit in the system. twenty two . For example, in the system of claim 21, the user interface receives a registration of the content data files for transmission to the copyright registration. twenty three . For example, in the system of claim 1, the second processor causes the gateway unit to access a predetermined network when the web browser software is activated according to the instructions of the controllers. twenty four. For example, the system of claim 23, wherein the second processor selects the predetermined network station from a list of one predetermined network station received via the instructions of the controllers. 2 5. For example, the system of claim 24 in the scope of patent application, wherein the second processor -47-200528979 (5) selects the predetermined network platform according to a weighting function, so that at least a part of the predetermined network stations More often selected. 2 6. For example, the system of claim 1 in which the gateway unit receives registration information from a user via the user interface; and receives initial operating parameters via the second network interface. 2 7. For example, the system of claim 1, wherein the gateway units: receive registration information from a user through the user interface; and receive software updates through the second network interface. 2 8. For example, the system of claim 1 in the patent scope, wherein: the gateway units send advertisements to a user display via the user interface, and the advertisements are based on at least one of the second network interface and the user interface through the user interface. The information received by one is customized. 2 9. For example, the system of claim 1 in the patent scope, wherein the gateway units: selectively display pay-per-click advertisements to the user via the user interface; and generate billing when the advertisements are displayed by the user Amount to the user. 3 0. For example, the system of claim 29 of the patent scope, in which the gateway units respond to a user's choice to generate one of a plurality of viewing modes -48-200528979 (6) the viewing mode to view the pay-per-view advertisement. 3 1. For example, the system of claim 1 in which the gateway unit receives software for execution in the second processor via the second network interface, and the software establishes one of the fee-based network services , Online video calls, and online games. 3 2. For example, the system of claim 1, wherein the second processor detects a denial of service attack. 33. The system of claim 32, wherein the second processor detects a denial of service attack initiated by a virus. 3 4 · If the system of item 1 of the patent application scope, wherein the gateway units selectively transmit information describing at least one of the entry data and the outgoing data to the gateway units to the law enforcement terminal . 3 5 · The system according to item 1 of the patent application scope, wherein the gateways σα-early: detect an attempt by a user to transmit and receive at least one of sound traffic; and selectively according to instructions of the controllers Block the detected attempt. 3 6. For example, the system of claim 35, wherein the gateway units transmit an advertisement providing a sound transmission service through the user interface. 3 7. If the system of claim 1 is applied, the gateways pg — early: detect at least one of the audio and video traffic attempts by a user; and -49- 200528979 (7 ) Selectively block the detected attempt according to the controller instructions. 3 8. For example, the system of claim 37, wherein the gateway units transmit an advertisement of at least one of audio and video traffic services through the user interface. 3 9 · If the system under the scope of patent application, the gateway units: detect at least one of audio and video traffic flowing through the second network interface; and select according to the instructions of the controllers To reduce the service quality of at least one of audio and video traffic, wherein the degradation of service quality includes at least one of the following: reducing the duty cycle, inserting TCP / IP messages into at least one of audio and video traffic , Inserting Nak / Ack for at least one of audio and video traffic, and inserting X-On / X-Off for at least one of audio and video traffic. 4 〇 · If the system of item 1 of the patent application scope further includes a plurality of access nodes, the controller node includes a controller for generating authorization instructions and transmitting the authorization instructions to the access nodes through the network. The first processor and the access nodes: receive the authorization instructions from the controller node; and selectively grant the gateway units access to the network according to the authorization instructions. 4]. For example, the system of the first scope of the patent application, where the gateways-50-200528979 (8) The unit contains a data storage unit that is divided into a network part and a user part, and a group of gateways At least one of the units is selectively shared and stored in the network partition with at least one of the gateway units of a second group via the second network interface according to the controller instructions. data of. 4 2. If the system of the scope of patent application is applied for, the second processor in at least one first gateway unit of the gateway units will selectively receive from the gateways according to the instructions of the controllers. The content data of at least one second gateway unit of the unit is transferred to at least one third gateway unit of the gateway units. 4 3. If the system of claim 42 is applied, the second processor in at least one of the gateway units-the first gateway unit: according to the instructions of the controllers from a group of news The router unit receives a portion of a content data file; and combines a data file based on the received portions for transmission to the user via the user interface. 4 4 · If the system of the first patent application scope further includes an intervention node, the intervention node includes: an operator interface for receiving counterfeit attack instructions input by the operator; and a second network interface for According to the counterfeit attack instructions, at least one substitute file indicator is transmitted to an address in the network. 4 5 · If the system of item 1 of the patent application scope further includes a network unit, these network units include: -51-200528979 0) A network interface, coupled to the network and receiving control from the network Device instructions and network traffic from a gateway unit; and a processor to selectively reduce the received network traffic flow based on the controller instructions. 4 6. For example, the system under the scope of patent application No. 45, wherein the network units: detect the volume of sound traffic; and selectively block the detected traffic according to the instructions of the controllers. 4 7. For example, the system of claim 45, wherein the network units: detect the traffic of at least one of audio and video traffic; and selectively block the detected traffic according to the instructions of the controllers . 4 8. For example, the system of claim 45, wherein the network units: detect the traffic of at least one of audio and video traffic; and selectively reduce the detected audio and video frequency according to the instructions of the controllers. The service quality of at least one of the video, wherein the degradation of the service quality includes at least one of the following: reducing the duty cycle, inserting TCP / IP messages into at least one of audio and video traffic, inserting Nak / Ack For at least one of audio and video traffic, and insert X-On / X-Off for at least one of audio and video traffic. -52- 200528979 (10) 4 9 _ A system for regulating access to a network accessed by a plurality of users, the system includes: a controller node coupled to the network, the controller node including : A first processor for generating controller instructions; and a first network interface for transmitting the controller instructions through the network; and a plurality of networks associated with users of the first group The network unit includes: a second network interface coupled to the network and receiving the controller instructions from the network; and a second processor, the second processor according to the The controller command prohibits the users in the second group from accessing the content on the network. 5 0. For example, in the system of claim 49, the second processor in the network prohibits the access of the second group by performing a denial of service attack according to the controller instructions. 5 1. For example, the system of claim 50, wherein the second processor executes an attack based on a schedule, the schedule includes at least one of the following: a schedule based on the duration of the attacks; instructions to the controller Immediate response, as well as responding to an event. 5 2 · The system according to item 49 of the scope of the patent application, wherein at least a part of the network units includes a router unit uniquely associated with a user. -53-200528979 (11) 5 3. For example, the system of claim 52, in which the gateway units: are operable between an active state and an inactive state; and perform blocking service attacks during the inactive state according to the instructions of the controllers. 54. The system of claim 49, wherein the second processor detects a denial of service attack. 5 5. The system of claim 54, wherein the second processor detects a denial-of-service attack initiated by a virus. 56. The system according to item 54 of the patent application scope, wherein the second processor prevents a denial of service attack on detection. 5 7. For example, in the system of claim 49, the network units selectively transmit information describing at least one of the entry data and the outbound data to the gateway unit to the law enforcement terminal. 5 8 · A system for distributing content over a network, the system comprising: a controller node coupled to the network, the controller node comprising: a processor and a processor for generating controller instructions; and A first network interface for transmitting the controller commands through the network; and a plurality of network units, the network units including: a second network interface coupled to the network; The second network interface in at least one first network unit of the network unit receives the controller commands from the network and receives at least one first -54-200528979 (12) one from the network units. The content of the network unit is ~ part ~; and a% 2 processor selects the content data shooting case to be received in at least the first network unit of the network units according to the equal control instruction. The fourth one is selectively forwarded to at least one third network unit among the network units. 59. The system of claim 58 in the scope of patent application, wherein: the two network interfaces receive a plurality of parts of a content data file from a group of networks according to the controller instructions; and the first processor is based on The received parts combine a data file for transmission to the user via the user interface. 60. For example, the system of claim 58, wherein: the second network interface of the second network unit receives a part of a content data file from a content server; and the second network unit of the second network unit The processing transfers the portion of the content data file to at least a first network unit of the network units according to the controller instructions. 6 1 · The system according to item 58 of the scope of patent application, wherein the second processor deletes part of the content data according to a predetermined deletion date related to the content data. 62. For example, the system of claim 58 in which the second processor deletes part of the content data when new content data is delivered. 63. For example, if the system of claim 58 is applied for, the second processor deletes some content data when the storage space is still insufficient, and deletes the oldest content data first. -55- 200528979 (13) 6 4. For example, the system of claim 58 of the patent application scope, wherein the second processor deletes part of the content data according to an associated user selection. 6 5.  A gateway unit for regulating access to the network, including: a user interface that receives a request to send data; a network interface that receives a controller command from the network; and a processor, The information is checked and selectively transmitted in accordance with the received controller instructions. 66.  A gateway unit for regulating access to the network, including: a user interface that receives a request to receive data; a network interface that receives a controller command from the network; and a processor, The information is checked and selectively received according to the received controller instructions. . 6 7-A controller node for regulating access to a network, the controller node comprising: a processor that generates controller instructions to cause a plurality of gateway units to selectively pass through the network Transmitting a network access request using inputs, the processor generating the controller commands by at least one of them automatically generating commands and generating commands in response to a user input request; and a network interface transmitting the Wait for the controller to instruct the plurality of gateway units. 6 8. For example, the controller node of the patent application No. 67 includes a processor, and the controller instructions are generated by operator-controlled network crawling. 69.  —A controller node for regulating access to the network, including: a processor that generates controller instructions; and -56- 200528979 (14) a network interface that sends the controller instructions to the network through For a plurality of gateway units, the controller instructions cause at least one gateway unit to deny access to the network servers of the first group. 7 〇. For example, if the controller node of the scope of patent application No. 69 is applied, if at least one gateway unit detects a request to access a blocked network server, the network interface receives the request from the at least one gateway unit. Notice. 7 1. For example, the controller node of the scope of patent application 69, wherein the processor generates an instruction that causes a gateway unit to redirect the user access request to the network server of the second group according to the instructions of the controller. 72 · A system for regulating file access in a network, the system comprising: a controller node coupled to the network, the controller node comprising: a first processor for generating a controller instruction, The instructions include a file identifier; and a first network interface for transmitting the controller instructions through the network; and a plurality of gateway units associated with a user file system, the gateways The unit includes: a second network interface that receives the controller instructions from the network; and a second processor that detects a file corresponding to the file identifier in the user file system. 73. The system according to item 72 of the patent application scope, which comprises a plurality of gateway units operable between an active state and an inactive state. -57-200528979 (15) 7 4. For example, if the system of claim 73 is applied for, the gateway unit notifies a controller node when it enters the active state. 7 5. For example, the system of claim 73, wherein the gateway units include a processor to delete the detected files during the inactive state. 7 6. If the system of claim 72 is applied, if at least one file matching the list of file identifiers is deleted, the plurality of gateway units notify a controller node. 7 7 · —A gateway unit for regulating access to the network, including: a user interface that receives network access requests entered by the user; a network interface 'for transmitting such network storage A request to the network; a casing; and a detector for detecting an attempt by a user who wants to open the casing. 7 8. For example, the gateway unit of the patent application No. 77, wherein the detector informs the controller node of an attempt to open the casing after a subsequent user-activated event. 7 9 · The gateway unit according to item 7 of the patent application scope further includes a storage device and an interlock to prevent the storage device from being stored when the detector detects an attempt to open the casing. take. 8 0.  -A gateway unit for regulating access to the network, including a network interface to provide access to the network; a user interface to receive user-entered network access requests And a processor, after receiving a license from a -58- 200528979 (16) controller node through the network through the network interface, it enters a user-controlled operation mode. 8 1.  A controller node for regulating file access in the network, including a copyright registration and a processor, wherein the processor: receives registration of content data files distributed to a plurality of gateway units; and tracks the Copyright status of content files. 8 2.  -A gateway unit for regulating access to the network, including: a network interface to provide access to the network and to receive controller commands from the network; a user interface For transmitting content between the network and a user; and-a processor for connecting to a predetermined network according to the received controller instructions when the web browser software is started Road platform. 8 3. For example, the gateway unit of the patent application No. 82, wherein the processor selects a predetermined network station from a list of predetermined network stations. 8 4 · The gateway unit according to item 83 of the patent application scope, wherein the processor selects from the list of predetermined network stations according to a weighting function, so that at least a part of the predetermined network stations is more common than others Was selected. 8 5.  -A gateway unit for regulating access to the network, including a network interface that provides access to the network; a user interface that transfers content between the network and a user And a processor 'collects registration information from the user through the user interface and receives initial operating parameters through the network interface. -59- 200528979 (17) 8 6.  -A gateway unit for regulating access to the network, including: a network interface that provides access to the network; a user interface that transfers content between the network and a user; And a processor that collects registration information from the user through the user interface and receives software updates through the network interface. 8 7 · —A gateway unit for regulating access to the network, including: a network interface to receive information from the network; a user interface to receive information from the user; and a processor , Sending an advertisement to a user display via the user interface, wherein the advertisement is customized based on information received through at least one of the network interface and the user interface. 8 8 · —A gateway unit for regulating network access, including: a network interface that provides access to the network and receives pay-per-view advertisements from the network; a user interface , Transmitting content between the network and a user; and a processor 'transmitting the pay-per-view advertisement to a display selectable by the user via the user interface and generating a signature when the advertisement is displayed by the user The amount is credited to the user. 89. If the gateway unit of item 88 of the patent application scope, the processor responds to a user choosing to generate one of the plurality of viewing modes for viewing the pay-per-view advertisement. 9 0.  —A gateway unit for regulating access to the network, including: -60-200528979 (18) a network interface that provides access to the network and receives software from the network; a user An interface for transmitting content between the network and a user; and a processor, via the user interface, executing the software to enable the user to use a fee-based network service, network videophone, and At least one of them. 9 1 · A gateway unit for regulating access to a network, comprising: a network interface providing access to the network; a user interface receiving network access requests from a user And a processor that detects one of the service receiving attacks being received from the user interface and transmitted to the network via the network interface. 9 2. For example, in the case of a plurality of gateway units under the scope of the patent application No. 91, the processor detects a blocking service attack initiated by a virus. 9 3.  —A gateway unit for regulating access to the network, including: a network interface that provides access to the network and receives controller commands; a user interface that connects a user to the network Incoming data and outgoing data are transmitted between interfaces; and a processor 'selectively transmits at least one of the describing incoming data and outgoing data to the law enforcement terminal according to the received controller instructions. 94.  A gateway unit for regulating access to a network includes: -61-200528979 (19) A network interface that provides access to the network and receives controller commands; a user interface in the Transmitting traffic between a network and a user; and a processor that detects an attempt by a user to transmit and receive at least one of voice traffic through the network, the processor based on the received controllers The instruction selectively blocks the detected attempt, and sends an advertisement providing a sound transmission service through the user interface. 95 · —A gateway unit for regulating network access, including: a network interface that provides access to the network and receives controller commands; a user interface that communicates with the network Traffic between users; and a processor that detects at least one of an attempt by a user to transmit and receive at least one of audio and video traffic over the network, the processor receiving The controller instructs to selectively block the detected attempt 'and to send an advertisement providing at least one of audio and video traffic services through the user interface. 96 · —A gateway unit for regulating access to a network, including: a network interface that provides access to the network and receives controller commands; a user interface that communicates with a network Traffic between users; and a processor that detects at least one of audio and video traffic-62-200528979 (20) flowing through the user interface ', the processor is based on the controllers received The instruction selectively reduces the service quality of at least one of the detected audio and video traffic. The degradation of the service quality includes at least one of the following: reducing the duty cycle and inserting TCP / IP messages into audio and video traffic. Insert at least one of them, insert at least one of Nak / Ack for audio and video traffic, and insert at least one of X-Oη / χ-Off for audio and video traffic. 9 7.  —A network unit for regulating access to the network, including: a network interface that provides access to the network and receives controller instructions and network traffic; and a processor that detects through the network Voice traffic, the processor selectively blocks the traffic according to the received controller instructions. 9 8 · —A network unit for regulating access to the network, including: a network interface that provides access to the network and receives controller commands and network traffic; and a processor ' At least one of audio and video traffic on the network, the processor selectively blocks the traffic according to the received controller instructions. 9 9 · A gateway unit for regulating access to a network, comprising: a network interface 'providing access to the network and receiving controller instructions and network traffic; and a processor' detecting audio And at least one of video traffic, the processor selectively reduces the service quality of at least one of the audio and video traffic detected in 200528979 (21) according to the received controller instructions, where The degradation of service quality includes at least one of the following: reducing the duty cycle, inserting TCP / IP messages into at least one of audio and video traffic, inserting Nak / Ack into at least one of audio and video traffic, And insert X-On / X-Off for at least one of audio and video traffic. 1 0 0. A controller node 5 for regulating user access to the network includes: a processor that generates an authentication instruction representing an authenticated user; a network interface that transmits the authentication instruction to a coupling to the network The access node; and wherein the access node is received according to the. The authentication command to 'selectively grants access to users of the network. 1 01.  —A gateway unit for regulating access to the network, including: a network interface that provides access to the network and receives controller commands; a data storage unit that is divided into a network partition and a use A partition; and a processor to selectively transmit data stored in the network partition via the network interface according to the received controller instructions. 1 0 2.  —A network unit for regulating access to the network, including: a user interface that receives a network access request input by a user; a network interface that is coupled to the network and receives data from the network Controller instructions, and -64-200528979 (22) a processor that selectively transmits at least some of the network access requests over the network according to the controller instructions, and via the network The interface transmits the content data of the network access request that should be transmitted through the network, wherein the network unit selectively forwards the content data received from the first related network path unit to at least one according to the controller instructions. The second associated unit. 1 0 3. For example, the network unit under the scope of patent application No. 102, wherein the processor = a part of receiving a content data file from a group of third related network link units according to the instructions of the controllers; The received part combines a data file for transmission to a user via the user interface. 104. For example, the network unit of the scope of patent application No. 102, wherein the processor = receives a part of a content data file from a content server; and transfers the part of the content data file to the first according to the instructions of the controller Related networking unit. 1 0 5.  -A network unit for regulating access to the network, including: a network interface 'provides access to the network and receives controller instructions; and a processor' based on the received controllers Instruction execution prevents service attacks. ~ 65-200528979 (23) 10 6. A method for regulating access to a network, the method comprising: receiving a controller command from a network at a gateway unit associated with a user; receiving the command from a network at the gateway unit One of the users' network access request; selectively transmitting the network access request through the network according to the controller instructions; and receiving the content of the network access request which should be transmitted from the network data. 1〇 7. A method for regulating access to a plurality of content servers, the method comprising: receiving a controller instruction from the network at a network unit associated with a first group of users; and according to the And other controller instructions to selectively prohibit users of the second group from accessing a portion of these content servers. 1 0 8. For example, the method of applying patent scope item 107, wherein prohibiting the access of the users of the second group includes performing a denial of service attack. 1 0 9. -A method for distributing content data through a network, the method comprising: receiving a content distribution instruction from the network; storing a first part of the content data from the network in a first network unit; distributing according to the content Command and respond to a user's request for the rest of the content data, initiate a request through the network;-66- 200528979 (24) Receive the rest of the content data from the network; combine the first part of the content data With the rest of the content data; and supplying the combined content data to the user. 1 1 0. For example, the method for applying scope of patent No. 109 further includes selectively transferring the first part of the content data to a second network unit according to the content distribution instructions. 1 1 1 · A gateway unit for regulating access to a network. The gateway unit includes: a user interface that receives a network access command input by a user; a network interface that is coupled to the Network and receives controller instructions from a controller node in the network; and a processor that selectively transmits at least some of the network access requests through the network according to the controller instructions And the content data in response to the transmitted network access requests through the network transmission through the network interface. 1 1 2.  A network unit associated with users of the first group to regulate access to the network, the network unit comprising: a network interface coupled to the network and receiving data from the first group; A group of users is associated with a controller instruction of a control node; and a processor, according to the controller instructions, prohibits the users of the second group from accessing content on the network. ] 1 3 · —A controller node for regulating access to the network, the controller node includes: -67-200528979 (25) a processor for generating controller instructions; and a network interface for To transmit the controller instructions through the network, the controller instructions being configured to cause a gateway unit associated with the user to selectively transmit at least some networks for input by the user through the network Access request. 1 1 4. For example, the controller node in the scope of patent application item 113 further includes a content server for providing content data in response to network access requests input by these users. 1 1 5.  A controller node for regulating access to the network, the controller node comprising: a processing node for generating controller commands; and a network interface for transmitting the controller commands through the network To a network unit associated with a first group of users, the controller instructions are configured to cause the network units to prohibit a second group of users from accessing content on the network . -68-
TW93135289A 2003-11-18 2004-11-17 System for regulating access to and distributing content in a network TW200528979A (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US52305703P 2003-11-18 2003-11-18
US56306404P 2004-04-16 2004-04-16

Publications (1)

Publication Number Publication Date
TW200528979A true TW200528979A (en) 2005-09-01

Family

ID=52348303

Family Applications (1)

Application Number Title Priority Date Filing Date
TW93135289A TW200528979A (en) 2003-11-18 2004-11-17 System for regulating access to and distributing content in a network

Country Status (1)

Country Link
TW (1) TW200528979A (en)

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9454678B2 (en) 2011-12-22 2016-09-27 Intel Corporation Always-available embedded theft reaction subsystem
US9507918B2 (en) 2011-12-22 2016-11-29 Intel Corporation Always-available embedded theft reaction subsystem
US9507965B2 (en) 2011-12-22 2016-11-29 Intel Corporation Always-available embedded theft reaction subsystem
US9520048B2 (en) 2011-12-22 2016-12-13 Intel Corporation Always-available embedded theft reaction subsystem
US9552500B2 (en) 2011-12-22 2017-01-24 Intel Corporation Always-available embedded theft reaction subsystem
US9558378B2 (en) 2011-12-22 2017-01-31 Intel Corporation Always-available embedded theft reaction subsystem
US9569642B2 (en) 2011-12-22 2017-02-14 Intel Corporation Always-available embedded theft reaction subsystem
US9619671B2 (en) 2011-12-22 2017-04-11 Intel Corporation Always-available embedded theft reaction subsystem
US9734359B2 (en) 2011-12-22 2017-08-15 Intel Corporation Always-available embedded theft reaction subsystem
TWI685800B (en) * 2017-04-28 2020-02-21 大陸商北京嘀嘀無限科技發展有限公司 System and method for task scheduling and device management

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9454678B2 (en) 2011-12-22 2016-09-27 Intel Corporation Always-available embedded theft reaction subsystem
US9507918B2 (en) 2011-12-22 2016-11-29 Intel Corporation Always-available embedded theft reaction subsystem
US9507965B2 (en) 2011-12-22 2016-11-29 Intel Corporation Always-available embedded theft reaction subsystem
US9520048B2 (en) 2011-12-22 2016-12-13 Intel Corporation Always-available embedded theft reaction subsystem
US9552500B2 (en) 2011-12-22 2017-01-24 Intel Corporation Always-available embedded theft reaction subsystem
US9558378B2 (en) 2011-12-22 2017-01-31 Intel Corporation Always-available embedded theft reaction subsystem
US9569642B2 (en) 2011-12-22 2017-02-14 Intel Corporation Always-available embedded theft reaction subsystem
US9619671B2 (en) 2011-12-22 2017-04-11 Intel Corporation Always-available embedded theft reaction subsystem
US9734359B2 (en) 2011-12-22 2017-08-15 Intel Corporation Always-available embedded theft reaction subsystem
TWI610193B (en) * 2011-12-22 2018-01-01 英特爾股份有限公司 Always-available embedded theft reaction subsystem
TWI685800B (en) * 2017-04-28 2020-02-21 大陸商北京嘀嘀無限科技發展有限公司 System and method for task scheduling and device management

Similar Documents

Publication Publication Date Title
US10116659B2 (en) System for regulating access to and distributing content in a network
JP4920850B2 (en) System and procedure for distributing content over a network
EP1859351B1 (en) Network-distributed data routing
ES2356990T3 (en) MONITORING OF DIGITAL CONTENT PROVIDED BY A SUPPLIER OF CONTENTS ON A NETWORK.
US7895445B1 (en) Token-based remote data access
US7426750B2 (en) Network-based content distribution system
US7024466B2 (en) Network configured for delivery of content for download to a recipient
US20060010074A1 (en) Delivery and storage system for secured content library
CN102025749A (en) Anti-theft method of mobile streaming media service
US9400875B1 (en) Content routing with rights management
US20030217163A1 (en) Method and system for assessing a right of access to content for a user device
WO2001061913A2 (en) Network-based content distribution system
CN1701567B (en) Inter-device authentication system, method, and communication device
TW200528979A (en) System for regulating access to and distributing content in a network
EP1569414B1 (en) Information-processing apparatus, information-processing method, and computer program
WO2006011388A1 (en) Transmission history dependency processor
JP2004336619A (en) Device authentication system and device authentication method, communication device, and computer program
US20050108361A1 (en) Method and system for content delivery
JP2005227380A (en) Content distribution system and content reproducing device
JP2005235170A (en) Order type multimedia content providing system and its method
Nwogugu Economics Of Digital Content: New Digital Content-Control And Anti-P2P Systems/Methods
JP2008186216A (en) Content distribution system for contributing to sns formation
WO2006040587A1 (en) Content delivery system and method