(PORTFOLIO) Who Invented And Built It First According To The U.S. Patent Office?

Who Invented And Built It First? Scott Or The Copy Cat Big Tech Bullies…

There are a handful of guys from Stanford University that all got offices together on Sand Hill Road In Palo Alto, around 2000 Sand Hill Road, or so. They all agreed to only invest in their friend’s things and to only allow certain politicians, that promise them certain kick-backs, to get elected. They signed contracts with every law firm in America that does Big Tech law so that nobody, outside of their group, could hire any tech law firm that they didn’t own and control. That is called “conflicting out a supply chain”. The only lawyers that could possibly help you fight Google, Facebook, Tesla, Twitter, YouTube, and your other competitors already work for Google, Facebook, Tesla, Twitter, YouTube, and your other competitors!

It is even worse when you find out that your Senators, and other public figures, COVERTLY OWN Google, Facebook, Tesla, Twitter, YouTube, and your other competitors, and that those politicians rig the law to help the Big Tech companies they own, while harming you for competing with them!

Investigators have discovered that those competitors hired moles to spy on companies and technologies and they engage in RICO-violating anti-competitive attacks.

Yes, your elected officials turn out to be either: financed by, friends, with, sleeping with, dating the staff of, holding stock market assets in, promised a revolving door job or government service contracts from, partying with, personal friends with, photographed at private events with, exchanging emails with, business associates of or directed by; our business adversaries, or the Senators and politicians that those business adversaries pay campaign finances to, or supply political digital search manipulation services to.

Criminal U.S. Senators and White House staff coordinated and profited in these schemes.

That is why no inventor can hire a big law firm to take on a Google, a Netflix, a Facebook, etc. It is illegal for this Cartel to blockade rights like that, it is an overt violation of RICO laws and anti-trust laws and other laws. The FBI is supposed to ARREST THEM! They never get arrested though, because they own all of the main politicians. Good for them – Bad for America! They are known as the “Silicon Valley Cartel“. They operate EXACTLY like a Mexican Cocaine Cartel but with technology. See more on the Cartel at http://www.usinventor.org

 

A few of Scott’s companies and inventions were a decade earlier than the Google’s, Oculus’s, Facebook’s, Netflix’s of the Silicon Valley Cartel. Scott’s technologies blew the competing technologies away. Scott’s products were faster, lower cost, easier, safer and just kicked the butts of the competitors. The Silicon Valley Cartel is great with Stock Market pump-and-dumps but they suck at inventing anything. They always choose to CHEAT RATHER THAN COMPETE! In a few key circumstances, Scott said “Nope”, you are not going to bully me…and Scott brought the FBI, FTC, DOJ, FTC, SEC and every 1.) law enforcement, 2.) regulatory, 3.) investigative news outlet and 4.) citizen sleuth group right to their front doors…

Scott does not engage in money laundering, bribes of Senators, insider trading, real estate bribe hiding, tax evasion, sex trafficking, valuation collusion, no poaching black-lists, RICO law racketeering violations, anti-trust law violations, mass domestic spying, spousal abuse, etc, like they do.… so it is pretty easy for justice to drop the hammer on EVERY SINGLE ONE OF THEM

 

Why does it matter?

Because patents on core technologies are worth hundreds of millions, or billions, of dollars. See these third-party analysts value studies of some of Scott’s patents:

 

—————————————-

 

These are the steps that the The Public must demand in order to strengthen public integrity by eliminating corrupt financial conflicts in Congress. These “Big Tech Gorilla” abusers steal technology because they can steal technology. They buy politicians, lobbyists and shill reporters to help them get away with it.

Congress must be ordered, by the voters, to eliminate both the appearance and the potential for financial conflicts of interest. Americans must be confident that actions taken by public officials are intended to serve the public, and not those officials. These actions counter-act the corrupt actions taken by tech oligarchs officials in illicit coordination with U.S. Senators.

Small business has experienced all of the damages from each of the abuse-of-power issues listed below. Your public officials are being paid BRIBES through their family stock market holdings. We asked every office of Congress what the worst of the problems are and this is what they told us, below.

CUT THEM OFF – Demand that Congress make it a felony for any politician, judge or regulator to own stocks, or to let their family own stocks. If they want to get rich, they can go into another line of work.

If the public can get these laws made, it will end 90% of American corruption. Politicians won’t allow these laws to be made because it will cut off their corruption. Thus: You have to force the politicians to make these laws and leverage them with investigations and recall elections.

These are the actions needed to resolve this corruption:

  • Ban individual stock ownership by Members of Congress, Cabinet Secretaries, senior congressional staff, federal judges, White House staff and other senior agency officials while in office. Prohibit all government officials from holding or trading stock where its value might be influenced by their agency, department, or actions.
  • Apply conflict of interest laws to the President and Vice President through the Presidential Conflicts of Interest Act, which would require the President and the Vice President to place conflicted assets, including businesses, into a blind trust to be sold off
  • Require senior Department of Energy government officials, employees, contractors and White House staff to divest from privately-owned assets that could present conflicts, including large companies like Tesla, Google, Facebook, Sony, Netflix, etc., and commercial real estate.
  • Make it a felony to not respond to a filing by a citizen within 48 hours. Former White House and Energy Department staff use ‘stone-walling’ to intentionally delay responses for a decade, or more.
  • Apply ethics rules to all government employees, including unpaid White House staff and advisors.
  • Require most executive branch employees to recuse from all issues that might financially benefit themselves or a previous employer or client from the preceding 4 years.
  • Create conflict-free investment opportunities for federal officials with new investment accounts managed by the Federal Retirement Thrift Investment Board and conflict-free mutual funds.
  • Close and lock the Revolving Door between industry and government and stop tech companies from buying influence in the government or profiting off of the public service of any official.
  • Lifetime ban on lobbying by Presidents, Vice Presidents, Members of Congress, federal judges, and Cabinet Secretaries; and, multi-year bans on all other federal employees from lobbying their former office, department, House of Congress, or agency after they leave government service until the end of the Administration, but at least for 2 years ( and at least 6 years for corporate lobbyists).
  • Limit the ability of companies to buy influence through former government officials.
  • Require income disclosures from former senior officials 4 years after federal employment.
  • Prohibit companies from immediately hiring or paying any senior government official from an agency, department, or Congressional office recently lobbied by that company.
  • Prohibit the world’s largest companies, banks, and monopolies (measured by annual revenue or market capitalization) from hiring or paying any former senior government official for 4 years after they leave government service.
  • Limit the ability of companies to buy influence through current government employees.
  • Prohibit current lobbyists from taking government jobs for 2 years after lobbying; 6 years for corporate lobbyists. Public, written waivers where such hiring is in the national interest are allowed for non-corporate lobbyists only.
  • Prohibit corporate outlaws like Google, Tesla, Facebook, Linkedin, Netflix, Sony, etc., from working in government by banning the hiring of top corporate leaders whose companies were caught breaking federal law in the last 6 years.
  • Prohibit contractor corruption by blocking federal contractor and licensee employees from working at the agency awarding the contract or license for 4 years.
  • Ban “Golden Parachutes” that provide corporate bonuses to executives for federal service.
  • Publicly expose all influence-peddling in Washington.
  • Strengthen and expand the federal definition of a “lobbyist” to include all individuals paid to influence government.
  • Create a new “corporate lobbyist” definition to identify individuals paid to influence government on behalf of for- profit entities and their front-groups.
  • Radically expand disclosure of lobbyist activities and influence campaigns by requiring all lobbyists to disclose any specific bills, policies, and government actions they attempt to influence; any meetings with public officials; and any documents they provide to those officials.
  • End Influence-Peddling by Foreign Actors such as that which occurred in the ENER1, Severstal, Solyndra and related scandals.
  • Fire the Fed officials that own, trade and pump stocks using the Fed itself for profiteering.
  • The most senior officials in the U.S. Government are the worshipers of Elon Musk, investor’s in Elon Musk’s companies and suppliers, deciders of the financing for Elon Musk, suppliers of staffing to Elon Musk, recipients of political campaign financing by Elon Musk and Musk’s covert Google And Facebook partnership, social friends of Elon Musk and the attackers of Elon Musk’s competitors. Make this a felony.
  • Combat foreign influence in Washington by banning all foreign lobbying.
  • End foreign lobbying by Americans by banning American lobbyists from accepting money from foreign governments, foreign individuals, and foreign  companies to influence United States public policy.
  • Prohibit current lobbyists from taking government jobs for 2 years after lobbying; 6 years for corporate lobbyists. Public, written waivers where such hiring is in the national interest are allowed for non-corporate lobbyists only.
  • End Legalized Lobbyist Bribery and stop lobbyists from trading money for government favors.
  • Ban direct political donations from lobbyists to candidates or Members of Congress.
  • End lobbyist contingency fees that allow lobbyists to be paid for a guaranteed policy outcome.
  • End lobbyist gifts to the executive and legislative branch officials they lobby.
  • Strengthen Congressional independence from lobbyists and end Washington’s dependence on
    lobbyists for “expertise” and information.
  • Make congressional service sustainable by transitioning Congressional staff to competitive salaries that track other federal employees.
  • Reinstate the nonpartisan Congressional Office of Technology Assessment to provide critical scientific and technological support to Members of Congress.
  • Level the playing field between corporate lobbyists and government by taxing excessive lobbying beginning at $500,000 in annual lobbying expenditures, and use the proceeds to help finance Congressional mandated rule-making, fund the National Public Advocate, and finance Congressional support agencies.
  • De-politicize the rulemaking process and increase transparency of industry efforts to influence federal agencies.
  • Require individuals and corporations to disclose funding or editorial conflicts of interest in research submitted to agencies that is not publicly available in peer-reviewed publications.
  • Prevent McKinsey-type sham research from undermining the public interest by requiring that studies that present conflicts of interest to undergo independent peer review to be considered in the rule-making process.
  • Require agencies to justify withdrawn public interest rules via public, written explanations.
  • Close loopholes exploited by powerful corporations like Google, Facebook, Tesla, Netflix, Sony, etc., to block public interest actions.
  • Eliminate loopholes that allow corporations, like Tesla and Google, to tilt the rules in their favor and against the public interest.
  • Restrict negotiated rule-making to stop industry from delaying or dominating the rule-making process by ending the practice of inviting industry to negotiate rules they have to follow.
  • Restrict inter-agency review as a tool for corporate abuse by  banning informal review, establishing a maximum 45-day review period, and blocking closed -door industry lobbying at the White House’s Office of Information and Regulatory Affairs.
  • Limit abusive injunctions from rogue judges, like Jackson, et al, by ensuring that only Appeals Courts, not individual District Court judges , can temporarily block agencies from implementing final rules.
  • Prevent hostile agencies from sham delays of implementation and enforcement by using the presence of litigation to postpone  the implementation of final rules.
  • Empower the public to police agencies for corporate capture.
  • Increase the ability of the public to make sure their interests are considered when agencies act.
  • Create a new Office of the Public Advocate  empowered to assist the public in meaningfully engaging in the rule-making process across the federal government.
  • Encourage enforcement by allowing private lawsuits from members of the public to hold agencies accountable for failing to complete rules or enforce the law, and to hold corporations accountable for breaking the rules.
  • Inoculate government agencies against corporate capture such as Google undertook against the White House.
  • Provide agencies with the tools and resources to implement strong rules that reflect the will of Congress and protect the public.
  • Boost agency resources to level the playing field between corporate lobbyists and federal agencies by using the proceeds of the tax on excessive lobbying and the anti-corruption penalty fees to help finance Congress-mandated rule-making and facilitate decisions by agencies that are buried in an avalanche of lobbyist activity.
  • Reform judicial review to prevent corporations from gaming the courts by requiring courts to presumptively defer to agency interpretations of laws and prohibiting courts from considering sham McKinsey studies and research excluded by agencies from the rule-making process.
  • Reverse the Congressional Review Act provision banning related rules that prevent agencies from implementing the will of Congress based on Congress’ prior disapproval of a different, narrow rule on a similar topic.
  • Improve judicial integrity and defend access to justice for all Americans.
  • Strengthen Judicial Ethics Requirements.
  • Enhance the integrity of the judicial branch by strengthening rules that prevent conflicts of interest.
  • Ban individual stock ownership by federal judges.
  • Expand rules prohibiting judges from accepting gifts or payments to attend private seminars from private individuals and corporations.
  • Require ethical behavior by the Supreme Court by directing the Court to follow the Code of Conduct that binds all other federal judges.
  • Boost the transparency of Federal Courts.
  • Enhance public insight into the judicial process by increasing information about the process and reducing barriers to accessing information.
  • Increase disclosure of non-judicial activity by federal judges by requiring the Judicial Conference to publicly post judges’ financial reports, recusal decisions, and speeches.
  • Enhance public access to court activity by mandating that federal appellate courts live-stream, on the web, audio of their proceedings, making case information easily-accessible to the public free of charge, and requiring federal courts to share case assignment data in bulk.
  • Eliminate barriers that restrict access to justice to all but the wealthiest individuals and companies.
  • Reduce barriers that prevent individuals from having their case heard in court by restoring pleading standards that make it easier for individuals and businesses that have been harmed to make their case before a judge.
  • Encourage diversity on the Federal Bench.
  • Strengthen the integrity of the judicial branch by increasing the focus on personal and professional diversity of the federal bench.
  • Create a single, new, and independent agency dedicated to enforcing federal ethics and anti-corruption laws.
  • Support stronger ethics and public integrity laws with stronger enforcement.
  • Establish the new, independent U.S. Office of Public Integrity, which will strengthen federal ethics enforcement with new investigative and disciplinary powers.
  • Investigate potential violations by any individual or entity, including individuals and companies with new subpoena authority.
  • Enforce the nation’s ethics laws by ordering corrective action, levying civil and administrative penalties, and referring egregious violations to the Justice Department for criminal arrest and enforcement.
  • Receive and investigate ethics complaints from members of the public.
  • Absorb the U.S. Office of Government Ethics as a new Government Ethics Division tasked with providing confidential advice to federal employees seeking ethics guidance.
  • Consolidate anti-corruption and public integrity oversight over federal officials, including oversight of all agency Inspectors General, all ethics matters for White House staff and agency heads, and all waivers and recusals by senior government officials.
  • Remain independent and protected from partisan politics through a single Director operating under strict selection, appointment, and removal criteria.
  • Provide easy online access to key government ethics and transparency documents, including financial disclosures; lobbyist registrations; lobbyist disclosures of meetings and materials; and all ethics records, recusals, and waivers.
  • Maintain a new government-wide Office of the Public Advocate, which would advocate for the public interest in executive branch rule-making.
  • Enforce federal open records and FOIA requirements by maintaining the central FOIA website and working with the National Archives to require agencies to comply with FOIA.
  • Strengthen legislative branch enforcement.
  • Expand an independent and empowered ethics office insulated from congressional politics.
  • Expand and empower the U.S. Office of Congressional Ethics, which will enforce the nation’s ethics laws in the Congress  and the entire Legislative Branch, including the U.S. Senate.
  • Conduct investigations of potential violations of ethics laws and rules by Members of Congress and staff with new subpoena power.
  • Refer criminal and civil violations to the Justice Department, the Office of Public Integrity, or other relevant state or federal law enforcement.
  • Recommend disciplinary and corrective action to the House and Senate Ethics Committees.
  • Boost transparency in government and fix Federal Open Records laws, public official and candidate tax disclosure.
  • Disclose basic tax return information for candidates for federal elected office and current elected officials.
  • Require the IRS to release tax returns for Presidential and Vice-Presidential candidates from the previous 8 years and during each year in federal elected office.
  • Require the IRS to release t ax returns for Congressional candidates from the previous 2 years and during each year in federal elected office.
  • Require the IRS to release tax returns and other financial information of businesses owned by senior federal officials and candidates for federal office.
  • Require the IRS to release tax filings for nonprofit organizations run by candidates for federal office.
  • Disclose the Cash behind Washington Advocacy and Lobbying.
  • Prevent special interests from using secret donations from corporations and billionaires to influence public policy  without disclosure.
  • Require nonprofit organizations to list donors who bankrolled the production of any specific rule-making comment, congressional testimony, or lobbying material, and to reveal whether the donors reviewed or edited the document.
  • Require individuals and corporations to disclose funding or editorial conflicts of interest in research submitted to agencies that is not publicly available in peer-reviewed publications.
  • Prevent sham research, like that from DNC shill McKinsey Consulting, from undermining the public interest by requiring that studies that present conflicts of interest to independent peer review to be considered in the rule-making process.
  • Improve the Freedom of Information Act (FOIA).
  • Close the loopholes in our open records laws that allow federal officials to hide tech industry and Silicon Valley oligarch industry influence.
  • Codify the default presumption of disclosure and affirmatively disclose records of public interest, including meeting agendas; government contracts; salaries; staff diversity; and reports to Congress.
  • Require all agencies to use a central FOIA website that is searchable and has downloadable open records databases with  all open FOIA requests and all records disclosed through FOIA.
  • Strengthen FOIA enforcement by limiting FOIA exemptions and loopholes, and by giving the National Archives the authority to overrule agency FOIA decisions and to compel disclosure.
  • Extend FOIA to private-sector federal contractors, including private federal prisons and immigration detention centers, and require large federal contractors to disclose political spending.
  • Make Congress more transparent by ending the corporate lobbyists leg up in the legislative process. The public deserves to know what Congress is up to and how lobbyists influence legislation.
  • Require all congressional committees to immediately post online more information, including hearings and markup schedules, bill or amendments text, testimonies, documents entered into the hearing record, hearing transcripts, written witness answers, and hearing audio and video recordings.
  • Require Members of Congress to post a link to their searchable voting record on their official websites.
  • Require lobbyists to disclose when they lobby a specific congressional office; specific topics of visit; the official action being requested; and all documents provided to the office during the visit.

Do these seem like common-sense rules that should have already been in place? They are!

These anti-corruption rules have been blocked by your own public officials because they work for themselves and not you!

News And Reports:

Report: Over 131 Federal Judges Broke The Law by Hearing Cases Where They Had A Financial Interest

https://www.businessinsider.com/congress-stock-act-violations-senate-house-trading-2021-9

71 Members of Congress Caught Violating Law on Stock Trades

congressional stock report lobbying federal government 4×3 … $200 is the standard amount — or waived by House or Senate ethics officials.

https://news.bloomberglaw.com/us-law-week/why-members-of-congress-should-not-trade-stocks

Why Members of Congress Should Not Trade Stocks – Bloomberg Law

Insider trading is a felony, but it is also difficult to prove. In 2012 Congress passed the Stop Trading on Congressional Knowledge Act (STOCK …

https://www.closeup.org/should-members-of-congress-be-banned-from-trading-stocks/

Should Members of Congress Be Banned from Trading Stocks?

They’re also the ones in charge of creating federal policy. The STOCK Act prohibits members of Congress from buying or selling stock on the …

https://www.opensecrets.org/news/2022/04/members-of-congress-increasingly-receptive-to-stock-trading-ban/

Members of Congress increasingly receptive to stock trading ban

Members of Congress may soon be barred from trading stocks while in office as bipartisan support for a stock trading ban continues to grow.

https://www.ny1.com/nyc/all-boroughs/news/2022/01/21/lawmakers-stock-trading-ban-legislation-hawley-ossoff-pelosi

Lawmakers can trade stocks, but many push for change – NY1

The bill itself does not ban members of Congress from trading stocks, but requires certain government officials – like lawmakers, the president …

https://www.nytimes.com/2022/02/18/opinion/congress-stock-trading-ban.html

Members of Congress Should Not be Trading Stocks, Ever

It has been a decade since Congress last made a significant effort at policing itself in this area. The Stock Act of 2012, among other measures, …

https://www.theatlantic.com/politics/archive/2022/01/congress-stock-trading-ban/621402/

The Bill That Congress Might Be Embarrassed Enough to Pass

Yet the supporters of a ban on lawmaker stock trading still have a ways to go. Public support for a bill can mask broader private opposition, …

https://www.cnbc.com/2022/02/09/congress-moves-towards-banning-members-from-trading-stocks.html

Congress moves to ban stock trading by members as Pelosi … – CNBC

After months of resistance, House Speaker Nancy Pelosi has greenlighted a plan to ban members of Congress fromtrading stock, CNBC confirmed …

 

Places Where You Can Research Ant-Corruption Tools:

http://www.majestic111.com
http://vcracket.weebly.com
https://www.transparency.org

Judicial Watch


https://wikileaks.org
https://causeofaction.org

The Big Green Con –– About the Green Corruption Files


http://peterschweizer.com/
http://globalinitiative.nethttps://fusion4freedom.com/the-green-corruption-files-archive/
https://propublica.org
https://www.allsides.com/unbiased-balanced-news
http://wearethenewmedia.com
http://ec.europa.eu/anti_fraud/index_en.html
http://gopacnetwork.org/
http://www.iaaca.org/News/
http://www.interpol.int/Crime-areas/Corruption/Corruption
http://www.icac.nsw.gov.au/
http://www.traceinternational.org/
http://www.oge.gov/
https://ogc.commerce.gov/

Home


http://www.anticorruptionintl.org/

HOMEPAGE


http://www.giaccentre.org/dealing_with_corruption.php
http://www.acfe.com/
https://www.oas.org/juridico/english/FightCur.html
https://www.opus.com/international-anti-corruption-day-businesses/
https://www.opengovpartnership.org/theme/anti-corruption
https://www.ethicalsystems.org/content/corruption
https://sunlightfoundation.com/
http://www.googletransparencyproject.org/
http://xyzcase.weebly.com
https://en.wikipedia.org/wiki/Angelgate
https://www.opensecrets.org/
https://en.wikipedia.org/wiki/High-Tech_Employee_Antitrust_Litigation
http://www.projectveritasaction.com

 

A CLAIMS CHART can very quickly resolve the issue of whether, or not, someone else copied an invention that Scott invented, built and offered in the market first. Let’s take a look at some CLAIMS CHARTS for products that Scott invented, built and offered in the market first and then Big Tech big bullies copied. A CLAIMS CHART usually looks like this:

The following chart compares certain claims of U.S. Patent , Xxxxxx,Inc.’s Xxxxxx protocol.

ROUGH DRAFT 1.1 CONFIDENTIAL- WORKING DOCUMENT- Right side protocol notesare still being researched.

PUBLISHED CLAIMS:

Claims

The invention claimed is:

1. A system for providing load balanced, secure media content deliveryin a distributed computing environment, the system comprising: a centralized control center that segments and encrypts media contentinto a set of individual encrypted segments, a plurality of the segments being a portion of or an entirety of a media content size,the centralized control center including an encryption module stored in memory and executable by a processor to encrypt each individualsegment to a unique encryption key; a plurality of intermediate control nodes that stage the set of individual encrypted segments; aplurality of intermediate servers that mirror individual encrypted segments from the staged set; at least one client that: sendsrequests for the media content to the centralized control center, receives the set of individual encrypted segments from one of anintermediate control node and an intermediate server optimally sited from a requesting client, and reassembles the set of individualencrypted segments into the media content for media playback, and includes: a broadcasting module stored in memory and executable tobroadcast a pulse prior to receiving individually encrypted segments, and a request processing module stored in memory and executable toselect the optimally sited one of intermediate control node and intermediate server based on responses to the pulse for subsequentreceipt of the set of individual encrypted segments; and a mirroring module stored in memory and executable to mirror individual encryptedsegments from a staged complete set to a plurality of peer clients, wherein the request processing module receives the set of individualencrypted segments from one of the intermediate control node, the intermediate server and the plurality of peer clients optimally sitedfrom the requesting client.

2. The system of claim 1, further comprising: a request queue stored inmemory and executable to queue requests from a plurality of clients on at least one of a single intermediate control node andintermediate server; and a multicasting module stored in memory and executable on at least one of the single intermediate control nodeand intermediate server and that multicasts the set of individual encrypted segments to the plurality of clients.

3. The system of claim 1, further comprising a segmentation modulestored in memory and executable to determine the media content size for each individual encrypted segment based on a running time of themedia content.

4. The system of claim 1, further comprising a codec module stored inmemory at each requesting client and executable to decode each individual encrypted segment.

5. The system of claim 1, wherein the centralized control centerbalances media content delivery between each intermediate control node and intermediate server.

6. The system of claim 1, further comprising a playback module stored inmemory and executable to allow for media playback at each requesting client prior to receipt of the individually encrypted segments.

7. The system of claim 1, further comprising a playback module stored inmemory and executable to provide flexible media playback at each requesting client, the flexible media playback including functionsselected from group consisting of pause, rewind, fast-forward, skip forward, skip backward, chapter stops, and shuttle.

8. The system of claim 1, wherein each segment has a same fixed size.

9. The system of claim 1, wherein the plurality of intermediate serversmirror individual encrypted segments from the staged set, the staged set being a staged complete set.

10. The system of claim 1, wherein the at least one client receives eachindividual encrypted segment from one of the intermediate control node and the intermediate server optimally sited from the requestingclient.

11. The system of claim 1, wherein the broadcasting module broadcasts thepulse prior to receiving each individually encrypted segment.

12. The system of claim 1, wherein the request processing module selectsthe optimally sited one of the intermediate control node and the intermediate server based on responses to the pulse for subsequentreceipt of each individual encrypted segment.

Patent: Claim 1

Xxxxxx Protocol

1. A system for providing load balanced, secure media content delivery in a distributed computing environment, the system comprising: a centralized control center

that segments and encrypts media content into a set of individual encrypted segments,

a plurality of the segments being a portion of or an entirety of a media content size, the centralized control center including an encryption module stored in memory and executable by a processor to encrypt each individual segment to a unique encryption key; a plurality of intermediate control nodes that stage the set of individual encrypted segments; a plurality of intermediate servers that mirror individual encrypted segments from the staged set; at least one client that: sends requests for the media content to the centralized control center, receives the set of individual encrypted segments from one of an intermediate control node and an intermediate server optimally sited from a requesting client, and reassembles the set of individual encrypted segments into the media content for media playback, and includes: a broadcasting module stored in memory and executable to broadcast a pulse prior to receiving individually encrypted segments, and a request processing module stored in memory and executable to select the optimally sited one of intermediate control node and intermediate server based on responses to the pulse for subsequent receipt of the set of individual encrypted segments; and a mirroring module stored in memory and executable to mirror individual encrypted segments from a staged complete set to a plurality of peer clients, wherein the request processing module receives the set of individual encrypted segments from one of the intermediate control node, the intermediate server and the plurality of peer clients optimally sited from the requesting client.

http://www.xxxxxx.com/btusers/guides/beginners-guide

“Other sites, like legaltorrents.com, offer torrents of all kinds of things – these sites are just repositories of torrents and usually don’t actually create any of the content available. They’re known as indexes or trackers – there is a subtle difference between the two. (The Wikipedia article on Xxxxxx trackers explains the difference.)”

http://www.xxxxxx.com/btusers/guides/beginners-guide

“To share a file or group of files, a peer first creates a small file called a “torrent” (e.g. MyFile.torrent). This file contains metadata about the files to be shared and about the tracker, the computer that coordinates the file distribution. Peers that want to download the file must first obtain a torrent file for it, and connect to the specified tracker, which tells them from which other peers to download the pieces of the file.”

http://en.wikipedia.org/wiki/Xxxxxx_(protocol)

“Torrent files are typically published on websites or elsewhere, and registered with a tracker. The tracker maintains lists of the clients currently participating in the torrent.” http://en.wikipedia.org/wiki/Xxxxxx_(protocol)

“[T]he official Xxxxxx client program uses a mechanism called “optimistic unchoking”, where the client reserves a portion of its available bandwidth for sending pieces to random peers (not necessarily known-good partners, so called preferred peers), in hopes of discovering even better partners and to ensure that newcomers get a chance to join the swarm.”

http://en.wikipedia.org/wiki/Xxxxxx_(protocol)

“A tracker should be differentiated from a Xxxxxx index by the fact that it does not necessarily list files that are being tracked. A Xxxxxx index is a list of .torrent files, usually including descriptions and other information. Trackers merely coordinate communication between peers attempting to download the payload of the torrents.”

http://en.wikipedia.org/wiki/Xxxxxx_tracker

“Many Xxxxxx websites act as both tracker and index. Sites such as these publicize the tracker’s URL and allow users to upload torrents to the index with the tracker’s URL embedded in them, providing all the features necessary to initiate a download.”

http://en.wikipedia.org/wiki/Xxxxxx_tracker

“Multi-tracker torrents feature multiple trackers in the one torrent. This way, should one tracker fail, the others can continue supporting file transfer.”

http://en.wikipedia.org/wiki/Xxxxxx_tracker

General Summary of the Xxxxxx Protocol’s Satisfaction of Claim Element: A Xxxxxx tracker is coupled to the central servers and end-user computers in the peer-to-peer network for the delivery of the requested media files, which includes accounting for network throughput conditions.

“Throughout the download process, Xxxxxx DNA carefully balances its use of peer and CDN or server resources, downloading from all, in parallel, to meet per-object or streaming media QoS requirements.”

http://www.xxxxxx.com/dna/technology/

“Xxxxxx DNA scales organically with demand, providing capacity exactly where and when you need it. . . . Xxxxxx DNA automatically scales its delivery capacity with demand to ensure a consistently high-quality user experience.”

http://www.xxxxxx.com/dna/technology/

“Our proprietary transport technology leverages the full available network capacity of all paths without disrupting other applications.”

http://www.xxxxxx.com/dna/technology/

“Xxxxxx DNA automatically moderates its use of the network to ensure that web browsing, voice over IP (VoIP), Internet gaming, and other applications are not disrupted.”

http://www.xxxxxx.com/dna/technology/

“Xxxxxx DNA contains a number of enhancements to mitigate the impact of peer networking on service provider networks. These enhancements include: Xxxxxx’s sophisticated congestion-avoiding transport technology; an intelligent peer selection algorithm that prefers peers on the same LAN, network, or AS; and work with vendors of Xxxxxx caching products to support local cache discovery. By keeping traffic local and non-congestive, Xxxxxx DNA reduces long-haul and peering traffic for service providers, while improving the end-user experience.”

http://www.xxxxxx.com/dna/technology/

“Seeding is where you leave your Xxxxxx client open after you’ve finished your download to help distribute it (you distribute the file while downloading, but it’s even more helpful if you continue to distribute the full file even after you have finished downloading).”

http://www.xxxxxx.com/btusers/guides/beginners-guide

“Xxxxxx (often abbreviated as BT) is a peer-to-peer (P2P) protocol (a description and set of rules on how to do things) created by Bram Cohen, designed to distribute data in such a way that the original distributor would be able to decrease bandwidth usage while still being able to reach at least the same amount of people. Cohen’s idea was to “break” the file being transferred into smaller segments called pieces. To save bandwidth, each person downloading (more commonly referred to as peers in the Xxxxxx community) would have the pieces that they acquired available for upload to other peers in the swarm (the entire network of people connected to a single torrent). In this way, much of the load of sharing the file to every peer interested in it is offloaded to the peers. Note that a seed is basically a peer with every piece, so when a peer successfully attains all data in the torrent contents, that peer becomes a seed as well.”

http://www.xxxxxx.com/btusers/guides/xxxxxx-user-manual/chapter-02-basic-guides/basics-xxxxxx

“In order for everyone to be able to locate one another, there needs to be some centralized location that peers could connect to in order to obtain the other peers’ IP addresses. Xxxxxx trackers serve as this centralized location. In the most basic explanation, for each given swarm, a tracker only needs to collect a peer’s IP address and port number to share with other peers connecting to that same swarm.”

http://www.xxxxxx.com/btusers/guides/xxxxxx-user-manual/chapter-02-basic-guides/basics-xxxxxx

“The initial distributor of the complete file or collection acts as the first seed. Each peer who downloads the data also uploads it to other peers, even after they have dismounted the original seed.”

http://en.wikipedia.org/wiki/Xxxxxx_(protocol)

“Each client is capable of preparing, requesting, and transmitting any type of computer file over a network, using the protocol.”

http://en.wikipedia.org/wiki/Xxxxxx_(protocol)

“To share a file or group of files, a peer first creates a small file called a “torrent” (e.g. MyFile.torrent). This file contains metadata about the files to be shared and about the tracker, the computer that coordinates the file distribution. Peers that want to download the file must first obtain a torrent file for it, and connect to the specified tracker, which tells them from which other peers to download the pieces of the file.”

http://en.wikipedia.org/wiki/Xxxxxx_(protocol)

“The peer distributing a data file treats the file as a number of identically-sized pieces, typically between 64 kB and 4 MB each. The peer creates a checksum for each piece, using the SHA1 hashing algorithm, and records it in the torrent file. Pieces with sizes greater than 512 kB will reduce the size of a torrent file for a very large payload, but is claimed to reduce the efficiency of the protocol. When another peer later receives a particular piece, the checksum of the piece is compared to the recorded checksum to test that the piece is error-free. Peers that provide a complete file are called seeders, and the peer providing the initial copy is called the initial seeder.”

http://en.wikipedia.org/wiki/Xxxxxx_(protocol)

Downloading torrents and sharing files

Users browse the web to find a torrent of interest, download it, and open it with a Xxxxxx client. The client connects to the tracker(s) specified in the torrent file, from which it receives a list of peers currently transferring pieces of the file(s) specified in the torrent. The client connects to those peers to obtain the various pieces. Such a group of peers connected to each other to share a torrent is called a swarm. If the swarm contains only the initial seeder, the client connects directly to it and begins to request pieces. As peers enter the swarm, they begin to trade pieces with one another, instead of downloading directly from the seeder.”

http://en.wikipedia.org/wiki/Xxxxxx_(protocol)

“A Xxxxxx tracker is a server which assists in the communication between peers using the Xxxxxx protocol. It is also, in the absence of extensions to the original protocol, the only major critical point, as clients are required to communicate with the tracker to initiate downloads. Clients that have already begun downloading also communicate with the tracker periodically to negotiate with newer peers and provide statistics; however, after the initial reception of peer data, peer communication can continue without a tracker.”

http://en.wikipedia.org/wiki/Xxxxxx_tracker

“Many Xxxxxx websites act as both tracker and index. Sites such as these publicize the tracker’s URL and allow users to upload torrents to the index with the tracker’s URL embedded in them, providing all the features necessary to initiate a download.”

http://en.wikipedia.org/wiki/Xxxxxx_tracker

“Multi-tracker torrents feature multiple trackers in the one torrent. This way, should one tracker fail, the others can continue supporting file transfer.”

http://en.wikipedia.org/wiki/Xxxxxx_tracker

Patent: Claim 2

Xxxxxx Protocol

The system of claim 1, further comprising: a request queue stored in memory and executable to queue requests from a plurality of clients on at least one of a single intermediate control node and intermediate server; and a multicasting module stored in memory and executable on at least one of the single intermediate control node and intermediate server and that multicasts the set of individual encrypted segments to the plurality of clients. See Claim 1.

General Summary of the Xxxxxx Protocol’s Satisfaction of Claim Element: Xxxxxx Protocol uses “torrent” files, which includes metadata about the files. These “torrent” files are treated as a number of identically sized pieces during distribution, wherein the metadata contained therein provides the necessary information to allow distribution to occur.

“To share a file or group of files, a peer first creates a small file called a “torrent” (e.g. MyFile.torrent). This file contains metadata about the files to be shared and about the tracker, the computer that coordinates the file distribution. Peers that want to download the file must first obtain a torrent file for it, and connect to the specified tracker, which tells them from which other peers to download the pieces of the file.”

http://en.wikipedia.org/wiki/Xxxxxx_(protocol)

“The peer distributing a data file treats the file as a number of identically-sized pieces, typically between 64 kB and 4 MB each. The peer creates a checksum for each piece, using the SHA1 hashing algorithm, and records it in the torrent file. Pieces with sizes greater than 512 kB will reduce the size of a torrent file for a very large payload, but is claimed to reduce the efficiency of the protocol. When another peer later receives a particular piece, the checksum of the piece is compared to the recorded checksum to test that the piece is error-free. Peers that provide a complete file are called seeders, and the peer providing the initial copy is called the initial seeder.”

http://en.wikipedia.org/wiki/Xxxxxx_(protocol)

“Many Xxxxxx websites act as both tracker and index. Sites such as these publicize the tracker’s URL and allow users to upload torrents to the index with the tracker’s URL embedded in them, providing all the features necessary to initiate a download.”

http://en.wikipedia.org/wiki/Xxxxxx_tracker

Patent: Claim 3

Kontiki’s Delivery Management System

The system of claim 1, further comprising a segmentation module stored in memory and executable to determine the media content size for each individual encrypted segment based on a running time of the media content.

See Claim 1.

General Summary of the Xxxxxx Protocol’s Satisfaction of Claim Element: Content delivery network servers (such as media servers) and end-user computers (“peers”) in the peer-to-peer network are configured to act as one or more media file databases for the storage of media files.1

“Xxxxxx DNA uses one or more existing origin servers or CDNs to seed a managed peer network.”

http://www.xxxxxx.com/dna/technology/

“Throughout the download process, Xxxxxx DNA carefully balances its use of peer and CDN or server resources, downloading from all, in parallel, to meet per-object or streaming media QoS requirements.”

http://www.xxxxxx.com/dna/technology/

“Xxxxxx DNA scales organically with demand, providing capacity exactly where and when you need it. . . . Xxxxxx DNA automatically scales its delivery capacity with demand to ensure a consistently high-quality user experience.”

http://www.xxxxxx.com/dna/technology/

“Our proprietary transport technology leverages the full available network capacity of all paths without disrupting other applications.”

http://www.xxxxxx.com/dna/technology/

“Xxxxxx DNA automatically moderates its use of the network to ensure that web browsing, voice over IP (VoIP), Internet gaming, and other applications are not disrupted.”

http://www.xxxxxx.com/dna/technology/

“Xxxxxx DNA contains a number of enhancements to mitigate the impact of peer networking on service provider networks. These enhancements include: Xxxxxx’s sophisticated congestion-avoiding transport technology; an intelligent peer selection algorithm that prefers peers on the same LAN, network, or AS; and work with vendors of Xxxxxx caching products to support local cache discovery. By keeping traffic local and non-congestive, Xxxxxx DNA reduces long-haul and peering traffic for service providers, while improving the end-user experience.”

http://www.xxxxxx.com/dna/technology/

“Seeding is where you leave your Xxxxxx client open after you’ve finished your download to help distribute it (you distribute the file while downloading, but it’s even more helpful if you continue to distribute the full file even after you have finished downloading).”

http://www.xxxxxx.com/btusers/guides/beginners-guide

“Xxxxxx (often abbreviated as BT) is a peer-to-peer (P2P) protocol (a description and set of rules on how to do things) created by Bram Cohen, designed to distribute data in such a way that the original distributor would be able to decrease bandwidth usage while still being able to reach at least the same amount of people. Cohen’s idea was to “break” the file being transferred into smaller segments called pieces. To save bandwidth, each person downloading (more commonly referred to as peers in the Xxxxxx community) would have the pieces that they acquired available for upload to other peers in the swarm (the entire network of people connected to a single torrent). In this way, much of the load of sharing the file to every peer interested in it is offloaded to the peers. Note that a seed is basically a peer with every piece, so when a peer successfully attains all data in the torrent contents, that peer becomes a seed as well.”

http://www.xxxxxx.com/btusers/guides/xxxxxx-user-manual/chapter-02-basic-guides/basics-xxxxxx

“The initial distributor of the complete file or collection acts as the first seed. Each peer who downloads the data also uploads it to other peers, even after they have dismounted the original seed.”

http://en.wikipedia.org/wiki/Xxxxxx_(protocol)

“To share a file or group of files, a peer first creates a small file called a “torrent” (e.g. MyFile.torrent). This file contains metadata about the files to be shared and about the tracker, the computer that coordinates the file distribution. Peers that want to download the file must first obtain a torrent file for it, and connect to the specified tracker, which tells them from which other peers to download the pieces of the file.”

http://en.wikipedia.org/wiki/Xxxxxx_(protocol)

“The peer distributing a data file treats the file as a number of identically-sized pieces, typically between 64 kB and 4 MB each. The peer creates a checksum for each piece, using the SHA1 hashing algorithm, and records it in the torrent file. Pieces with sizes greater than 512 kB will reduce the size of a torrent file for a very large payload, but is claimed to reduce the efficiency of the protocol. When another peer later receives a particular piece, the checksum of the piece is compared to the recorded checksum to test that the piece is error-free. Peers that provide a complete file are called seeders, and the peer providing the initial copy is called the initial seeder.”

http://en.wikipedia.org/wiki/Xxxxxx_(protocol)

Downloading torrents and sharing files

Users browse the web to find a torrent of interest, download it, and open it with a Xxxxxx client. The client connects to the tracker(s) specified in the torrent file, from which it receives a list of peers currently transferring pieces of the file(s) specified in the torrent. The client connects to those peers to obtain the various pieces. Such a group of peers connected to each other to share a torrent is called a swarm. If the swarm contains only the initial seeder, the client connects directly to it and begins to request pieces. As peers enter the swarm, they begin to trade pieces with one another, instead of downloading directly from the seeder.”

http://en.wikipedia.org/wiki/Xxxxxx_(protocol)

“A Xxxxxx tracker is a server which assists in the communication between peers using the Xxxxxx protocol. It is also, in the absence of extensions to the original protocol, the only major critical point, as clients are required to communicate with the tracker to initiate downloads. Clients that have already begun downloading also communicate with the tracker periodically to negotiate with newer peers and provide statistics; however, after the initial reception of peer data, peer communication can continue without a tracker.”

http://en.wikipedia.org/wiki/Xxxxxx_tracker

“Multi-tracker torrents feature multiple trackers in the one torrent. This way, should one tracker fail, the others can continue supporting file transfer.”

http://en.wikipedia.org/wiki/Xxxxxx_tracker

Patent: Claim 4

Xxxxxx Protocol

The system of claim 1, further comprising a codec module stored in memory at each requesting client and executable to decode each individual encrypted segment. General Summary of the Xxxxxx Protocol’s Satisfaction of Claim Element: Content delivery network servers (such as media servers) and end-user computers (“peers”) in the peer-to-peer network are configured to act as one or more media file databases. The Xxxxxx protocol is dependent on multiple peers participating in the distribution of a file, including when one peer or distribution server is no longer able to distribute the requested file.

“Seeding is where you leave your Xxxxxx client open after you’ve finished your download to help distribute it (you distribute the file while downloading, but it’s even more helpful if you continue to distribute the full file even after you have finished downloading).”

http://www.xxxxxx.com/btusers/guides/beginners-guide

“Multi-tracker torrents feature multiple trackers in the one torrent. This way, should one tracker fail, the others can continue supporting file transfer.”

http://en.wikipedia.org/wiki/Xxxxxx_tracker

Patent: Claim 5

Xxxxxx Protocol

The system of claim 1, wherein the centralized control center balances media content delivery between each intermediate control node and intermediate server. General Summary of the Xxxxxx Protocol’s Satisfaction of Claim Element: Content delivery network servers (such as media servers) and end-user computers (“peers”) in the peer-to-peer network are configured to act as one or more media file databases. The Xxxxxx protocol is dependent on multiple peers participating in the distribution of a file, including when one peer or distribution server is no longer able to distribute the requested file. When one peer or distribution server is no longer able to distribute the requested file, the Xxxxxx tracker identifies and utilizes other peers or distribution servers in the system.

“Seeding is where you leave your Xxxxxx client open after you’ve finished your download to help distribute it (you distribute the file while downloading, but it’s even more helpful if you continue to distribute the full file even after you have finished downloading).”

http://www.xxxxxx.com/btusers/guides/beginners-guide

“Multi-tracker torrents feature multiple trackers in the one torrent. This way, should one tracker fail, the others can continue supporting file transfer.”

http://en.wikipedia.org/wiki/Xxxxxx_tracker

Patent: Claim 6

Xxxxxx Protocol

The system of claim 1, further comprising a playback module stored in memory and executable to allow for media playback at each requesting client prior to receipt of the individually encrypted segments. General Summary of the Xxxxxx Protocol’s Satisfaction of Claim Element: Content delivery network servers (such as media servers) and end-user computers (“peers”) in the peer-to-peer network are configured to act as one or more media file databases. The Xxxxxx protocol is dependent on multiple peers participating in the distribution of a file, including when one peer or distribution server is no longer the optimal method for distribution of the requested file. When one peer or distribution server is no longer the optimal method for distribution of the requested file, the Xxxxxx tracker identifies and utilizes other peers or distribution servers in the system. The Xxxxxx Protocol’s delivery of content is scaled to leverage network capacity.

“Our proprietary transport technology leverages the full available network capacity of all paths without disrupting other applications.”

http://www.xxxxxx.com/dna/technology/

“Xxxxxx DNA automatically moderates its use of the network to ensure that web browsing, voice over IP (VoIP), Internet gaming, and other applications are not disrupted.”

http://www.xxxxxx.com/dna/technology/

“Xxxxxx DNA contains a number of enhancements to mitigate the impact of peer networking on service provider networks. These enhancements include: Xxxxxx’s sophisticated congestion-avoiding transport technology; an intelligent peer selection algorithm that prefers peers on the same LAN, network, or AS; and work with vendors of Xxxxxx caching products to support local cache discovery. By keeping traffic local and non-congestive, Xxxxxx DNA reduces long-haul and peering traffic for service providers, while improving the end-user experience.”

http://www.xxxxxx.com/dna/technology/

“A Xxxxxx tracker is a server which assists in the communication between peers using the Xxxxxx protocol. It is also, in the absence of extensions to the original protocol, the only major critical point, as clients are required to communicate with the tracker to initiate downloads. Clients that have already begun downloading also communicate with the tracker periodically to negotiate with newer peers and provide statistics; however, after the initial reception of peer data, peer communication can continue without a tracker.”

http://en.wikipedia.org/wiki/Xxxxxx_tracker

“Multi-tracker torrents feature multiple trackers in the one torrent. This way, should one tracker fail, the others can continue supporting file transfer.”

http://en.wikipedia.org/wiki/Xxxxxx_tracker

Patent: Claim 7

Xxxxxx Protocol

The system of claim 1, further comprising a playback module stored in memory and executable to provide flexible media playback at each requesting client, the flexible media playback including functions selected from group consisting of pause, rewind, fast-forward, skip forward, skip backward, chapter stops, and shuttle. General Summary of the Xxxxxx Protocol’s Satisfaction of Claim Element: Content delivery network servers (such as media servers) and end-user computers (“peers”) in the peer-to-peer network are configured to act as one or more media file databases. The Xxxxxx protocol is dependent on multiple peers participating in the distribution of a file, including when one peer or distribution server is no longer the optimal method for distribution of the requested file. When one peer or distribution server is no longer the optimal method for distribution of the requested file, the Xxxxxx tracker identifies and utilizes other peers or distribution servers in the system. The Xxxxxx Protocol’s delivery of content is scaled to leverage network capacity.

“Our proprietary transport technology leverages the full available network capacity of all paths without disrupting other applications.”

http://www.xxxxxx.com/dna/technology/

“Xxxxxx DNA automatically moderates its use of the network to ensure that web browsing, voice over IP (VoIP), Internet gaming, and other applications are not disrupted.”

http://www.xxxxxx.com/dna/technology/

“Xxxxxx DNA contains a number of enhancements to mitigate the impact of peer networking on service provider networks. These enhancements include: Xxxxxx’s sophisticated congestion-avoiding transport technology; an intelligent peer selection algorithm that prefers peers on the same LAN, network, or AS; and work with vendors of Xxxxxx caching products to support local cache discovery. By keeping traffic local and non-congestive, Xxxxxx DNA reduces long-haul and peering traffic for service providers, while improving the end-user experience.”

http://www.xxxxxx.com/dna/technology/

“A Xxxxxx tracker is a server which assists in the communication between peers using the Xxxxxx protocol. It is also, in the absence of extensions to the original protocol, the only major critical point, as clients are required to communicate with the tracker to initiate downloads. Clients that have already begun downloading also communicate with the tracker periodically to negotiate with newer peers and provide statistics; however, after the initial reception of peer data, peer communication can continue without a tracker.”

http://en.wikipedia.org/wiki/Xxxxxx_tracker

“Multi-tracker torrents feature multiple trackers in the one torrent. This way, should one tracker fail, the others can continue supporting file transfer.”

http://en.wikipedia.org/wiki/Xxxxxx_tracker

Patent: Claim 8

Xxxxxx Protocol

The system of claim 1, wherein each segment has a same fixed size General Summary of the Xxxxxx Protocol’s Satisfaction of Claim Element: Content delivery network servers (such as media servers) and end-user computers (“peers”) in the peer-to-peer network are configured to act as one or more media file databases. The Xxxxxx protocol is dependent on multiple peers participating in the distribution of a file, including when one peer or distribution server is no longer the optimal method for distribution of the requested file. When one peer or distribution server is no longer the optimal method for distribution of the requested file, the Xxxxxx tracker identifies and utilizes other peers or distribution servers in the system. The Xxxxxx Protocol’s delivery of content is scaled to leverage network capacity.

“Our proprietary transport technology leverages the full available network capacity of all paths without disrupting other applications.”

http://www.xxxxxx.com/dna/technology/

“Xxxxxx DNA automatically moderates its use of the network to ensure that web browsing, voice over IP (VoIP), Internet gaming, and other applications are not disrupted.”

http://www.xxxxxx.com/dna/technology/

“Xxxxxx DNA contains a number of enhancements to mitigate the impact of peer networking on service provider networks. These enhancements include: Xxxxxx’s sophisticated congestion-avoiding transport technology; an intelligent peer selection algorithm that prefers peers on the same LAN, network, or AS; and work with vendors of Xxxxxx caching products to support local cache discovery. By keeping traffic local and non-congestive, Xxxxxx DNA reduces long-haul and peering traffic for service providers, while improving the end-user experience.”

http://www.xxxxxx.com/dna/technology/

“A Xxxxxx tracker is a server which assists in the communication between peers using the Xxxxxx protocol. It is also, in the absence of extensions to the original protocol, the only major critical point, as clients are required to communicate with the tracker to initiate downloads. Clients that have already begun downloading also communicate with the tracker periodically to negotiate with newer peers and provide statistics; however, after the initial reception of peer data, peer communication can continue without a tracker.”

http://en.wikipedia.org/wiki/Xxxxxx_tracker

“Multi-tracker torrents feature multiple trackers in the one torrent. This way, should one tracker fail, the others can continue supporting file transfer.”

http://en.wikipedia.org/wiki/Xxxxxx_tracker

Patent: Claim 9

Xxxxxx Protocol

The system of claim 1, wherein the plurality of intermediate servers mirror individual encrypted segments from the staged set, the staged set being a staged complete set. General Summary of the Xxxxxx Protocol’s Satisfaction of Claim Element: Content delivery network servers (such as media servers) and end-user computers (“peers”) in the peer-to-peer network are configured to act as one or more media file databases. The Xxxxxx protocol is dependent on multiple peers participating in the distribution of a file, including when one peer or distribution server is no longer the optimal method for distribution of the requested file. When one peer or distribution server is no longer the optimal method for distribution of the requested file, the Xxxxxx tracker identifies and utilizes other peers or distribution servers in the system. The Xxxxxx Protocol’s delivery of content is scaled to leverage network capacity.

“Our proprietary transport technology leverages the full available network capacity of all paths without disrupting other applications.”

http://www.xxxxxx.com/dna/technology/

“Xxxxxx DNA automatically moderates its use of the network to ensure that web browsing, voice over IP (VoIP), Internet gaming, and other applications are not disrupted.”

http://www.xxxxxx.com/dna/technology/

“Xxxxxx DNA contains a number of enhancements to mitigate the impact of peer networking on service provider networks. These enhancements include: Xxxxxx’s sophisticated congestion-avoiding transport technology; an intelligent peer selection algorithm that prefers peers on the same LAN, network, or AS; and work with vendors of Xxxxxx caching products to support local cache discovery. By keeping traffic local and non-congestive, Xxxxxx DNA reduces long-haul and peering traffic for service providers, while improving the end-user experience.”

http://www.xxxxxx.com/dna/technology/

“A Xxxxxx tracker is a server which assists in the communication between peers using the Xxxxxx protocol. It is also, in the absence of extensions to the original protocol, the only major critical point, as clients are required to communicate with the tracker to initiate downloads. Clients that have already begun downloading also communicate with the tracker periodically to negotiate with newer peers and provide statistics; however, after the initial reception of peer data, peer communication can continue without a tracker.”

http://en.wikipedia.org/wiki/Xxxxxx_tracker

“Multi-tracker torrents feature multiple trackers in the one torrent. This way, should one tracker fail, the others can continue supporting file transfer.”

http://en.wikipedia.org/wiki/Xxxxxx_tracker

Patent: Claim 10

Xxxxxx Protocol

The system of claim 1, wherein the at least one client receives each individual encrypted segment from one of the intermediate control node and the intermediate server optimally sited from the requesting client. General Summary of the Xxxxxx Protocol’s Satisfaction of Claim Element: Content delivery network servers (such as media servers) and end-user computers (“peers”) in the peer-to-peer network are configured to act as one or more media file databases. The Xxxxxx protocol is dependent on multiple peers participating in the distribution of a file, including when one peer or distribution server is no longer the optimal method for distribution of the requested file. When one peer or distribution server is no longer the optimal method for distribution of the requested file, the Xxxxxx tracker identifies and utilizes other peers or distribution servers in the system. The Xxxxxx Protocol’s delivery of content is scaled to leverage network capacity.

“Our proprietary transport technology leverages the full available network capacity of all paths without disrupting other applications.”

http://www.xxxxxx.com/dna/technology/

“Xxxxxx DNA automatically moderates its use of the network to ensure that web browsing, voice over IP (VoIP), Internet gaming, and other applications are not disrupted.”

http://www.xxxxxx.com/dna/technology/

“Xxxxxx DNA contains a number of enhancements to mitigate the impact of peer networking on service provider networks. These enhancements include: Xxxxxx’s sophisticated congestion-avoiding transport technology; an intelligent peer selection algorithm that prefers peers on the same LAN, network, or AS; and work with vendors of Xxxxxx caching products to support local cache discovery. By keeping traffic local and non-congestive, Xxxxxx DNA reduces long-haul and peering traffic for service providers, while improving the end-user experience.”

http://www.xxxxxx.com/dna/technology/

“A Xxxxxx tracker is a server which assists in the communication between peers using the Xxxxxx protocol. It is also, in the absence of extensions to the original protocol, the only major critical point, as clients are required to communicate with the tracker to initiate downloads. Clients that have already begun downloading also communicate with the tracker periodically to negotiate with newer peers and provide statistics; however, after the initial reception of peer data, peer communication can continue without a tracker.”

http://en.wikipedia.org/wiki/Xxxxxx_tracker

“Multi-tracker torrents feature multiple trackers in the one torrent. This way, should one tracker fail, the others can continue supporting file transfer.”

http://en.wikipedia.org/wiki/Xxxxxx_tracker

Patent: Claim 11

Xxxxxx Protocol

The system of claim 1, wherein the broadcasting module broadcasts the pulse prior to receiving each individually encrypted segment. General Summary of the Xxxxxx Protocol’s Satisfaction of Claim Element: Content delivery network servers (such as media servers) and end-user computers (“peers”) in the peer-to-peer network are configured to act as one or more media file databases. The Xxxxxx protocol is dependent on multiple peers participating in the distribution of a file, including when one peer or distribution server is no longer the optimal method for distribution of the requested file. When one peer or distribution server is no longer the optimal method for distribution of the requested file, the Xxxxxx tracker identifies and utilizes other peers or distribution servers in the system. The Xxxxxx Protocol’s delivery of content is scaled to leverage network capacity.

“Our proprietary transport technology leverages the full available network capacity of all paths without disrupting other applications.”

http://www.xxxxxx.com/dna/technology/

“Xxxxxx DNA automatically moderates its use of the network to ensure that web browsing, voice over IP (VoIP), Internet gaming, and other applications are not disrupted.”

http://www.xxxxxx.com/dna/technology/

“Xxxxxx DNA contains a number of enhancements to mitigate the impact of peer networking on service provider networks. These enhancements include: Xxxxxx’s sophisticated congestion-avoiding transport technology; an intelligent peer selection algorithm that prefers peers on the same LAN, network, or AS; and work with vendors of Xxxxxx caching products to support local cache discovery. By keeping traffic local and non-congestive, Xxxxxx DNA reduces long-haul and peering traffic for service providers, while improving the end-user experience.”

http://www.xxxxxx.com/dna/technology/

“A Xxxxxx tracker is a server which assists in the communication between peers using the Xxxxxx protocol. It is also, in the absence of extensions to the original protocol, the only major critical point, as clients are required to communicate with the tracker to initiate downloads. Clients that have already begun downloading also communicate with the tracker periodically to negotiate with newer peers and provide statistics; however, after the initial reception of peer data, peer communication can continue without a tracker.”

http://en.wikipedia.org/wiki/Xxxxxx_tracker

“Multi-tracker torrents feature multiple trackers in the one torrent. This way, should one tracker fail, the others can continue supporting file transfer.”

http://en.wikipedia.org/wiki/Xxxxxx_tracker

Patent: Claim 12

Xxxxxx Protocol

The system of claim 1, wherein the request processing module selects the optimally sited one of the intermediate control node and the intermediate server based on responses to the pulse for subsequent receipt of each individual encrypted segment. General Summary of the Xxxxxx Protocol’s Satisfaction of Claim Element: Content delivery network servers (such as media servers) and end-user computers (“peers”) in the peer-to-peer network are configured to act as one or more media file databases. The Xxxxxx protocol is dependent on multiple peers participating in the distribution of a file, including when one peer or distribution server is no longer the optimal method for distribution of the requested file. When one peer or distribution server is no longer the optimal method for distribution of the requested file, the Xxxxxx tracker identifies and utilizes other peers or distribution servers in the system. The Xxxxxx Protocol’s delivery of content is scaled to leverage network capacity.

“Our proprietary transport technology leverages the full available network capacity of all paths without disrupting other applications.”

http://www.xxxxxx.com/dna/technology/

“Xxxxxx DNA automatically moderates its use of the network to ensure that web browsing, voice over IP (VoIP), Internet gaming, and other applications are not disrupted.”

http://www.xxxxxx.com/dna/technology/

“Xxxxxx DNA contains a number of enhancements to mitigate the impact of peer networking on service provider networks. These enhancements include: Xxxxxx’s sophisticated congestion-avoiding transport technology; an intelligent peer selection algorithm that prefers peers on the same LAN, network, or AS; and work with vendors of Xxxxxx caching products to support local cache discovery. By keeping traffic local and non-congestive, Xxxxxx DNA reduces long-haul and peering traffic for service providers, while improving the end-user experience.”

http://www.xxxxxx.com/dna/technology/

“A Xxxxxx tracker is a server which assists in the communication between peers using the Xxxxxx protocol. It is also, in the absence of extensions to the original protocol, the only major critical point, as clients are required to communicate with the tracker to initiate downloads. Clients that have already begun downloading also communicate with the tracker periodically to negotiate with newer peers and provide statistics; however, after the initial reception of peer data, peer communication can continue without a tracker.”

http://en.wikipedia.org/wiki/Xxxxxx_tracker

“Multi-tracker torrents feature multiple trackers in the one torrent. This way, should one tracker fail, the others can continue supporting file transfer.”

http://en.wikipedia.org/wiki/Xxxxxx_tracker

SO THAT IS THE GENERIC VERSION. LET’S TAKE A LOOK AT SOME SPECIFIC CHARTS AGAINST SCOTT’S BIGGEST COPYCATS:

Let’s take a look at one of Scott’s issued patent’s against Bittorrent, who many people say copied their whole tech and business model from Scott:

The following chart compares certain claims of one of Scott’s U.S. Patent’s to BitTorrent, Inc.’s BitTorrent protocol.

Scott Patent: Claim 1

BitTorrent Protocol

A media distribution system, comprising:

“BitTorrent is the global standard for delivering high-quality files over the Internet. With an installed base of over 160 million clients worldwide, BitTorrent technology has turned conventional distribution economics on its head. The more popular a large video, audio or software file, the faster and cheaper it can be transferred with BitTorrent.”

http://www.bittorrent.com/btusers/what-is-bittorrent/

“BitTorrent 6 is a client. A ‘client’ in this case is a computer program that follows the rules of a protocol. . . . The BitTorrent 6 client will give you access to the world of content on the protocol in a lightweight, fast and reliable package.”

http://www.bittorrent.com/btusers/what-is-bittorrent/

“BitTorrent is a peer-to-peer file sharing protocol used to distribute large amounts of data. BitTorrent is one of the most common protocols for transferring large files, and by some estimates it accounts for about 35% of all traffic on the entire Internet.”

http://en.wikipedia.org/wiki/BitTorrent_(protocol)

a media file database configured to store media files, wherein one or more of the media files have been compressed prior to storage in the media file database;

General Summary of the BitTorrent Protocol’s Satisfaction of Claim Element: Content delivery network servers (such as media servers) and end-user computers (“peers”) in the peer-to-peer network are configured to act as one or more media file databases.1

“Throughout the download process, BitTorrent DNA carefully balances its use of peer and CDN or server resources, downloading from all, in parallel, to meet per-object or streaming media QoS requirements.”

http://www.bittorrent.com/dna/technology/

http://www.bittorrent.com/dna/technology/

“BitTorrent DNA is designed to complement existing delivery mechanisms, including content delivery networks (CDNs) and traditional web servers. To provide maximum flexibility and robustness, BitTorrent DNA can seed its managed peer network from multiple CDNs in parallel.”

http://www.bittorrent.com/dna/technology/

“BitTorrent is a protocol (a set of rules and description of how to do things) allowing you to download files quickly by allowing people downloading the file to upload (distribute) parts of it at the same time.”

http://www.bittorrent.com/btusers/what-is-bittorrent/

http://www.bittorrent.com/btusers/guides/beginners-guide

“Seeding is where you leave your BitTorrent client open after you’ve finished your download to help distribute it (you distribute the file while downloading, but it’s even more helpful if you continue to distribute the full file even after you have finished downloading).”

http://www.bittorrent.com/btusers/guides/beginners-guide

“BitTorrent (often abbreviated as BT) is a peer-to-peer (P2P) protocol (a description and set of rules on how to do things) created by Bram Cohen, designed to distribute data in such a way that the original distributor would be able to decrease bandwidth usage while still being able to reach at least the same amount of people. . . . In this way, much of the load of sharing the file to every peer interested in it is offloaded to the peers. Note that a seed is basically a peer with every piece, so when a peer successfully attains all data in the torrent contents, that peer becomes a seed as well.”

http://www.bittorrent.com/btusers/guides/bittorrent-user-manual/chapter-02-basic-guides/basics-bittorrent

“The initial distributor of the complete file or collection acts as the first seed. Each peer who downloads the data also uploads it to other peers, even after they have dismounted the original seed.”

http://en.wikipedia.org/wiki/BitTorrent_(protocol)

“Each client is capable of preparing, requesting, and transmitting any type of computer file over a network, using the protocol.”

http://en.wikipedia.org/wiki/BitTorrent_(protocol)

“A peer is any computer running an instance of a client.”

http://en.wikipedia.org/wiki/BitTorrent_(protocol)

“To share a file or group of files, a peer first creates a small file called a “torrent” (e.g. MyFile.torrent). This file contains metadata about the files to be shared and about the tracker, the computer that coordinates the file distribution. Peers that want to download the file must first obtain a torrent file for it, and connect to the specified tracker, which tells them from which other peers to download the pieces of the file.”

http://en.wikipedia.org/wiki/BitTorrent_(protocol)

“Peers that provide a complete file are called seeders, and the peer providing the initial copy is called the initial seeder.”

http://en.wikipedia.org/wiki/BitTorrent_(protocol)

“Web seeding was implemented in 2006 as the ability of BitTorrent clients to download torrent pieces from an HTTP source in addition to the swarm. The advantage of this feature is that a site may distribute a torrent for a particular file or batch of files and make those files available for download from that same web server; this can simplify seeding and load balancing greatly once support for this feature is implemented in the various BitTorrent clients.”

http://en.wikipedia.org/wiki/BitTorrent_(protocol)

“Some clients, like Torrentflux, can be run straight from a server, allowing hosting companies to offer speeds unavailable to most users. Sites such as Torrent2FTP offer services to download torrents and then make them available to the customer on a FTP server.”

http://en.wikipedia.org/wiki/BitTorrent_(protocol)

a computing device configured to receive user requests for delivery of the one or more of the media files stored in the media file database,

the computing device further configured to: identify average network throughput between computing device and the requesting users;

and route the user requests for delivery of the requested one or more media files to a distribution server capable of servicing the user requests based upon at least the average network throughput;

General Summary of the BitTorrent Protocol’s Satisfaction of Claim Element: A BitTorrent tracker is a server that acts as a centralized locations configured to receive user requests for the delivery of media files in the media file databases. Delivery of content is scaled to leverage network capacity.

“A BitTorrent tracker is a server which assists in the communication between peers using the BitTorrent protocol. It is also, in the absence of extensions to the original protocol, the only major critical point, as clients are required to communicate with the tracker to initiate downloads. Clients that have already begun downloading also communicate with the tracker periodically to negotiate with newer peers and provide statistics; however, after the initial reception of peer data, peer communication can continue without a tracker.”

http://en.wikipedia.org/wiki/BitTorrent_tracker

“In order for everyone to be able to locate one another, there needs to be some centralized location that peers could connect to in order to obtain the other peers’ IP addresses. BitTorrent trackers serve as this centralized location. In the most basic explanation, for each given swarm, a tracker only needs to collect a peer’s IP address and port number to share with other peers connecting to that same swarm.”

http://www.bittorrent.com/btusers/guides/bittorrent-user-manual/chapter-02-basic-guides/basics-bittorrent

“Use of the peer network is tightly controlled by a specialized tracker operated by BitTorrent, Inc. and accessible to BitTorrent DNA customers through a web-based dashboard that provides control and reporting tools.”

http://www.bittorrent.com/dna/technology/

Downloading torrents and sharing files

Users browse the web to find a torrent of interest, download it, and open it with a BitTorrent client. The client connects to the tracker(s) specified in the torrent file, from which it receives a list of peers currently transferring pieces of the file(s) specified in the torrent. The client connects to those peers to obtain the various pieces. Such a group of peers connected to each other to share a torrent is called a swarm. If the swarm contains only the initial seeder, the client connects directly to it and begins to request pieces. As peers enter the swarm, they begin to trade pieces with one another, instead of downloading directly from the seeder.”

http://en.wikipedia.org/wiki/BitTorrent_(protocol)

“BitTorrent DNA scales organically with demand, providing capacity exactly where and when you need it. . . . BitTorrent DNA automatically scales its delivery capacity with demand to ensure a consistently high-quality user experience.”

http://www.bittorrent.com/dna/technology/

“Our proprietary transport technology leverages the full available network capacity of all paths without disrupting other applications.”

http://www.bittorrent.com/dna/technology/

“BitTorrent DNA automatically moderates its use of the network to ensure that web browsing, voice over IP (VoIP), Internet gaming, and other applications are not disrupted.”

http://www.bittorrent.com/dna/technology/

“BitTorrent DNA contains a number of enhancements to mitigate the impact of peer networking on service provider networks. These enhancements include: BitTorrent’s sophisticated congestion-avoiding transport technology; an intelligent peer selection algorithm that prefers peers on the same LAN, network, or AS; and work with vendors of BitTorrent caching products to support local cache discovery. By keeping traffic local and non-congestive, BitTorrent DNA reduces long-haul and peering traffic for service providers, while improving the end-user experience.”

http://www.bittorrent.com/dna/technology/

“BitTorrent DNA uses one or more existing origin servers or CDNs to seed a managed peer network.”

http://www.bittorrent.com/dna/technology/

How do I download files using BitTorrent?

Just like you need a URL like ‘www.google.com’ to go to a web site and download content, you need a ‘torrent file’, a small file that tells the BitTorrent client the necessary info to download the content you want. This is generally obtained from a torrent website.”

http://www.bittorrent.com/btusers/guides/beginners-guide

“Other sites, like legaltorrents.com, offer torrents of all kinds of things – these sites are just repositories of torrents and usually don’t actually create any of the content available. They’re known as indexes or trackers – there is a subtle difference between the two. (The Wikipedia article on BitTorrent trackers explains the difference.)”

http://www.bittorrent.com/btusers/guides/beginners-guide

“To share a file or group of files, a peer first creates a small file called a “torrent” (e.g. MyFile.torrent). This file contains metadata about the files to be shared and about the tracker, the computer that coordinates the file distribution. Peers that want to download the file must first obtain a torrent file for it, and connect to the specified tracker, which tells them from which other peers to download the pieces of the file.”

http://en.wikipedia.org/wiki/BitTorrent_(protocol)

“Torrent files are typically published on websites or elsewhere, and registered with a tracker. The tracker maintains lists of the clients currently participating in the torrent.” http://en.wikipedia.org/wiki/BitTorrent_(protocol)

“[T]he official BitTorrent client program uses a mechanism called “optimistic unchoking”, where the client reserves a portion of its available bandwidth for sending pieces to random peers (not necessarily known-good partners, so called preferred peers), in hopes of discovering even better partners and to ensure that newcomers get a chance to join the swarm.”

http://en.wikipedia.org/wiki/BitTorrent_(protocol)

“A tracker should be differentiated from a BitTorrent index by the fact that it does not necessarily list files that are being tracked. A BitTorrent index is a list of .torrent files, usually including descriptions and other information. Trackers merely coordinate communication between peers attempting to download the payload of the torrents.”

http://en.wikipedia.org/wiki/BitTorrent_tracker

“Many BitTorrent websites act as both tracker and index. Sites such as these publicize the tracker’s URL and allow users to upload torrents to the index with the tracker’s URL embedded in them, providing all the features necessary to initiate a download.”

http://en.wikipedia.org/wiki/BitTorrent_tracker

“Multi-tracker torrents feature multiple trackers in the one torrent. This way, should one tracker fail, the others can continue supporting file transfer.”

http://en.wikipedia.org/wiki/BitTorrent_tracker

and a distribution server coupled to the media file database, the distribution server configured to simultaneously deliver a single copy of the requested one or more of the media files identified in the routed user requests to the requesting users in less-than-real-time, wherein the distribution server automatically adjusts delivery of the requested one or more media files to the requesting users based on current average network throughput between the distribution server and the requesting users.

General Summary of the BitTorrent Protocol’s Satisfaction of Claim Element: A BitTorrent tracker is coupled to the central servers and end-user computers in the peer-to-peer network for the delivery of the requested media files, which includes accounting for network throughput conditions.

“Throughout the download process, BitTorrent DNA carefully balances its use of peer and CDN or server resources, downloading from all, in parallel, to meet per-object or streaming media QoS requirements.”

http://www.bittorrent.com/dna/technology/

“BitTorrent DNA scales organically with demand, providing capacity exactly where and when you need it. . . . BitTorrent DNA automatically scales its delivery capacity with demand to ensure a consistently high-quality user experience.”

http://www.bittorrent.com/dna/technology/

“Our proprietary transport technology leverages the full available network capacity of all paths without disrupting other applications.”

http://www.bittorrent.com/dna/technology/

“BitTorrent DNA automatically moderates its use of the network to ensure that web browsing, voice over IP (VoIP), Internet gaming, and other applications are not disrupted.”

http://www.bittorrent.com/dna/technology/

“BitTorrent DNA contains a number of enhancements to mitigate the impact of peer networking on service provider networks. These enhancements include: BitTorrent’s sophisticated congestion-avoiding transport technology; an intelligent peer selection algorithm that prefers peers on the same LAN, network, or AS; and work with vendors of BitTorrent caching products to support local cache discovery. By keeping traffic local and non-congestive, BitTorrent DNA reduces long-haul and peering traffic for service providers, while improving the end-user experience.”

http://www.bittorrent.com/dna/technology/

“Seeding is where you leave your BitTorrent client open after you’ve finished your download to help distribute it (you distribute the file while downloading, but it’s even more helpful if you continue to distribute the full file even after you have finished downloading).”

http://www.bittorrent.com/btusers/guides/beginners-guide

“BitTorrent (often abbreviated as BT) is a peer-to-peer (P2P) protocol (a description and set of rules on how to do things) created by Bram Cohen, designed to distribute data in such a way that the original distributor would be able to decrease bandwidth usage while still being able to reach at least the same amount of people. Cohen’s idea was to “break” the file being transferred into smaller segments called pieces. To save bandwidth, each person downloading (more commonly referred to as peers in the BitTorrent community) would have the pieces that they acquired available for upload to other peers in the swarm (the entire network of people connected to a single torrent). In this way, much of the load of sharing the file to every peer interested in it is offloaded to the peers. Note that a seed is basically a peer with every piece, so when a peer successfully attains all data in the torrent contents, that peer becomes a seed as well.”

http://www.bittorrent.com/btusers/guides/bittorrent-user-manual/chapter-02-basic-guides/basics-bittorrent

“In order for everyone to be able to locate one another, there needs to be some centralized location that peers could connect to in order to obtain the other peers’ IP addresses. BitTorrent trackers serve as this centralized location. In the most basic explanation, for each given swarm, a tracker only needs to collect a peer’s IP address and port number to share with other peers connecting to that same swarm.”

http://www.bittorrent.com/btusers/guides/bittorrent-user-manual/chapter-02-basic-guides/basics-bittorrent

“The initial distributor of the complete file or collection acts as the first seed. Each peer who downloads the data also uploads it to other peers, even after they have dismounted the original seed.”

http://en.wikipedia.org/wiki/BitTorrent_(protocol)

“Each client is capable of preparing, requesting, and transmitting any type of computer file over a network, using the protocol.”

http://en.wikipedia.org/wiki/BitTorrent_(protocol)

“To share a file or group of files, a peer first creates a small file called a “torrent” (e.g. MyFile.torrent). This file contains metadata about the files to be shared and about the tracker, the computer that coordinates the file distribution. Peers that want to download the file must first obtain a torrent file for it, and connect to the specified tracker, which tells them from which other peers to download the pieces of the file.”

http://en.wikipedia.org/wiki/BitTorrent_(protocol)

“The peer distributing a data file treats the file as a number of identically-sized pieces, typically between 64 kB and 4 MB each. The peer creates a checksum for each piece, using the SHA1 hashing algorithm, and records it in the torrent file. Pieces with sizes greater than 512 kB will reduce the size of a torrent file for a very large payload, but is claimed to reduce the efficiency of the protocol. When another peer later receives a particular piece, the checksum of the piece is compared to the recorded checksum to test that the piece is error-free. Peers that provide a complete file are called seeders, and the peer providing the initial copy is called the initial seeder.”

http://en.wikipedia.org/wiki/BitTorrent_(protocol)

Downloading torrents and sharing files

Users browse the web to find a torrent of interest, download it, and open it with a BitTorrent client. The client connects to the tracker(s) specified in the torrent file, from which it receives a list of peers currently transferring pieces of the file(s) specified in the torrent. The client connects to those peers to obtain the various pieces. Such a group of peers connected to each other to share a torrent is called a swarm. If the swarm contains only the initial seeder, the client connects directly to it and begins to request pieces. As peers enter the swarm, they begin to trade pieces with one another, instead of downloading directly from the seeder.”

http://en.wikipedia.org/wiki/BitTorrent_(protocol)

“A BitTorrent tracker is a server which assists in the communication between peers using the BitTorrent protocol. It is also, in the absence of extensions to the original protocol, the only major critical point, as clients are required to communicate with the tracker to initiate downloads. Clients that have already begun downloading also communicate with the tracker periodically to negotiate with newer peers and provide statistics; however, after the initial reception of peer data, peer communication can continue without a tracker.”

http://en.wikipedia.org/wiki/BitTorrent_tracker

“Many BitTorrent websites act as both tracker and index. Sites such as these publicize the tracker’s URL and allow users to upload torrents to the index with the tracker’s URL embedded in them, providing all the features necessary to initiate a download.”

http://en.wikipedia.org/wiki/BitTorrent_tracker

“Multi-tracker torrents feature multiple trackers in the one torrent. This way, should one tracker fail, the others can continue supporting file transfer.”

http://en.wikipedia.org/wiki/BitTorrent_tracker

Scott’s Patent: Claim 2

BitTorrent Protocol

The system of claim 1, wherein one or more of the media files is divided into a plurality of frames, at least one of the plurality of frames including a header.

See Claim 1.

General Summary of the BitTorrent Protocol’s Satisfaction of Claim Element: BitTorrent Protocol uses “torrent” files, which includes metadata about the files. These “torrent” files are treated as a number of identically sized pieces during distribution, wherein the metadata contained therein provides the necessary information to allow distribution to occur.

“To share a file or group of files, a peer first creates a small file called a “torrent” (e.g. MyFile.torrent). This file contains metadata about the files to be shared and about the tracker, the computer that coordinates the file distribution. Peers that want to download the file must first obtain a torrent file for it, and connect to the specified tracker, which tells them from which other peers to download the pieces of the file.”

http://en.wikipedia.org/wiki/BitTorrent_(protocol)

“The peer distributing a data file treats the file as a number of identically-sized pieces, typically between 64 kB and 4 MB each. The peer creates a checksum for each piece, using the SHA1 hashing algorithm, and records it in the torrent file. Pieces with sizes greater than 512 kB will reduce the size of a torrent file for a very large payload, but is claimed to reduce the efficiency of the protocol. When another peer later receives a particular piece, the checksum of the piece is compared to the recorded checksum to test that the piece is error-free. Peers that provide a complete file are called seeders, and the peer providing the initial copy is called the initial seeder.”

http://en.wikipedia.org/wiki/BitTorrent_(protocol)

“Many BitTorrent websites act as both tracker and index. Sites such as these publicize the tracker’s URL and allow users to upload torrents to the index with the tracker’s URL embedded in them, providing all the features necessary to initiate a download.”

http://en.wikipedia.org/wiki/BitTorrent_tracker

Scott’s Patent: Claim 14

Kontiki’s Delivery Management System

The system of claim 1, further comprising a second distribution server coupled to a second media file database, the second media file database configured to store media files, wherein one or more of the media files have been compressed prior to storage in the second media file database.

See Claim 1.

General Summary of the BitTorrent Protocol’s Satisfaction of Claim Element: Content delivery network servers (such as media servers) and end-user computers (“peers”) in the peer-to-peer network are configured to act as one or more media file databases for the storage of media files.2

“BitTorrent DNA uses one or more existing origin servers or CDNs to seed a managed peer network.”

http://www.bittorrent.com/dna/technology/

“Throughout the download process, BitTorrent DNA carefully balances its use of peer and CDN or server resources, downloading from all, in parallel, to meet per-object or streaming media QoS requirements.”

http://www.bittorrent.com/dna/technology/

“BitTorrent DNA scales organically with demand, providing capacity exactly where and when you need it. . . . BitTorrent DNA automatically scales its delivery capacity with demand to ensure a consistently high-quality user experience.”

http://www.bittorrent.com/dna/technology/

“Our proprietary transport technology leverages the full available network capacity of all paths without disrupting other applications.”

http://www.bittorrent.com/dna/technology/

“BitTorrent DNA automatically moderates its use of the network to ensure that web browsing, voice over IP (VoIP), Internet gaming, and other applications are not disrupted.”

http://www.bittorrent.com/dna/technology/

“BitTorrent DNA contains a number of enhancements to mitigate the impact of peer networking on service provider networks. These enhancements include: BitTorrent’s sophisticated congestion-avoiding transport technology; an intelligent peer selection algorithm that prefers peers on the same LAN, network, or AS; and work with vendors of BitTorrent caching products to support local cache discovery. By keeping traffic local and non-congestive, BitTorrent DNA reduces long-haul and peering traffic for service providers, while improving the end-user experience.”

http://www.bittorrent.com/dna/technology/

“Seeding is where you leave your BitTorrent client open after you’ve finished your download to help distribute it (you distribute the file while downloading, but it’s even more helpful if you continue to distribute the full file even after you have finished downloading).”

http://www.bittorrent.com/btusers/guides/beginners-guide

“BitTorrent (often abbreviated as BT) is a peer-to-peer (P2P) protocol (a description and set of rules on how to do things) created by Bram Cohen, designed to distribute data in such a way that the original distributor would be able to decrease bandwidth usage while still being able to reach at least the same amount of people. Cohen’s idea was to “break” the file being transferred into smaller segments called pieces. To save bandwidth, each person downloading (more commonly referred to as peers in the BitTorrent community) would have the pieces that they acquired available for upload to other peers in the swarm (the entire network of people connected to a single torrent). In this way, much of the load of sharing the file to every peer interested in it is offloaded to the peers. Note that a seed is basically a peer with every piece, so when a peer successfully attains all data in the torrent contents, that peer becomes a seed as well.”

http://www.bittorrent.com/btusers/guides/bittorrent-user-manual/chapter-02-basic-guides/basics-bittorrent

“The initial distributor of the complete file or collection acts as the first seed. Each peer who downloads the data also uploads it to other peers, even after they have dismounted the original seed.”

http://en.wikipedia.org/wiki/BitTorrent_(protocol)

“To share a file or group of files, a peer first creates a small file called a “torrent” (e.g. MyFile.torrent). This file contains metadata about the files to be shared and about the tracker, the computer that coordinates the file distribution. Peers that want to download the file must first obtain a torrent file for it, and connect to the specified tracker, which tells them from which other peers to download the pieces of the file.”

http://en.wikipedia.org/wiki/BitTorrent_(protocol)

“The peer distributing a data file treats the file as a number of identically-sized pieces, typically between 64 kB and 4 MB each. The peer creates a checksum for each piece, using the SHA1 hashing algorithm, and records it in the torrent file. Pieces with sizes greater than 512 kB will reduce the size of a torrent file for a very large payload, but is claimed to reduce the efficiency of the protocol. When another peer later receives a particular piece, the checksum of the piece is compared to the recorded checksum to test that the piece is error-free. Peers that provide a complete file are called seeders, and the peer providing the initial copy is called the initial seeder.”

http://en.wikipedia.org/wiki/BitTorrent_(protocol)

Downloading torrents and sharing files

Users browse the web to find a torrent of interest, download it, and open it with a BitTorrent client. The client connects to the tracker(s) specified in the torrent file, from which it receives a list of peers currently transferring pieces of the file(s) specified in the torrent. The client connects to those peers to obtain the various pieces. Such a group of peers connected to each other to share a torrent is called a swarm. If the swarm contains only the initial seeder, the client connects directly to it and begins to request pieces. As peers enter the swarm, they begin to trade pieces with one another, instead of downloading directly from the seeder.”

http://en.wikipedia.org/wiki/BitTorrent_(protocol)

“A BitTorrent tracker is a server which assists in the communication between peers using the BitTorrent protocol. It is also, in the absence of extensions to the original protocol, the only major critical point, as clients are required to communicate with the tracker to initiate downloads. Clients that have already begun downloading also communicate with the tracker periodically to negotiate with newer peers and provide statistics; however, after the initial reception of peer data, peer communication can continue without a tracker.”

http://en.wikipedia.org/wiki/BitTorrent_tracker

“Multi-tracker torrents feature multiple trackers in the one torrent. This way, should one tracker fail, the others can continue supporting file transfer.”

http://en.wikipedia.org/wiki/BitTorrent_tracker

944 Patent: Claim 15

BitTorrent Protocol

The system of claim 14, wherein the computing device is further configured to determine if the distribution server is no longer able to simultaneously deliver the requested one or more of the media files identified in the routed user requests to the requesting users in less-than-real-time after commencing delivery of the requested one or more media files.

See Claims 1 and 14.

General Summary of the BitTorrent Protocol’s Satisfaction of Claim Element: Content delivery network servers (such as media servers) and end-user computers (“peers”) in the peer-to-peer network are configured to act as one or more media file databases. The BitTorrent protocol is dependent on multiple peers participating in the distribution of a file, including when one peer or distribution server is no longer able to distribute the requested file.

“Seeding is where you leave your BitTorrent client open after you’ve finished your download to help distribute it (you distribute the file while downloading, but it’s even more helpful if you continue to distribute the full file even after you have finished downloading).”

http://www.bittorrent.com/btusers/guides/beginners-guide

“Multi-tracker torrents feature multiple trackers in the one torrent. This way, should one tracker fail, the others can continue supporting file transfer.”

http://en.wikipedia.org/wiki/BitTorrent_tracker

Scott’s Patent: Claim 16

BitTorrent Protocol

The system of claim 15, wherein the computing device is further configured to reroute responsibility for the continued delivery of the requested one or more media files to the second distribution server.

See Claims 1, 14 and 15.

General Summary of the BitTorrent Protocol’s Satisfaction of Claim Element: Content delivery network servers (such as media servers) and end-user computers (“peers”) in the peer-to-peer network are configured to act as one or more media file databases. The BitTorrent protocol is dependent on multiple peers participating in the distribution of a file, including when one peer or distribution server is no longer able to distribute the requested file. When one peer or distribution server is no longer able to distribute the requested file, the BitTorrent tracker identifies and utilizes other peers or distribution servers in the system.

“Seeding is where you leave your BitTorrent client open after you’ve finished your download to help distribute it (you distribute the file while downloading, but it’s even more helpful if you continue to distribute the full file even after you have finished downloading).”

http://www.bittorrent.com/btusers/guides/beginners-guide

“Multi-tracker torrents feature multiple trackers in the one torrent. This way, should one tracker fail, the others can continue supporting file transfer.”

http://en.wikipedia.org/wiki/BitTorrent_tracker

944 Patent: Claim 17

BitTorrent Protocol

The system of claim 14, wherein the computing device is further configured to determine if the distribution server is no longer able to optimally and simultaneously deliver the requested one or more of the media files identified in the routed user requests to the requesting users after commencing delivery of the requested one or more media files.

See Claims 1 and 14.

General Summary of the BitTorrent Protocol’s Satisfaction of Claim Element: Content delivery network servers (such as media servers) and end-user computers (“peers”) in the peer-to-peer network are configured to act as one or more media file databases. The BitTorrent protocol is dependent on multiple peers participating in the distribution of a file, including when one peer or distribution server is no longer the optimal method for distribution of the requested file. When one peer or distribution server is no longer the optimal method for distribution of the requested file, the BitTorrent tracker identifies and utilizes other peers or distribution servers in the system. The BitTorrent Protocol’s delivery of content is scaled to leverage network capacity.

“Our proprietary transport technology leverages the full available network capacity of all paths without disrupting other applications.”

http://www.bittorrent.com/dna/technology/

“BitTorrent DNA automatically moderates its use of the network to ensure that web browsing, voice over IP (VoIP), Internet gaming, and other applications are not disrupted.”

http://www.bittorrent.com/dna/technology/

“BitTorrent DNA contains a number of enhancements to mitigate the impact of peer networking on service provider networks. These enhancements include: BitTorrent’s sophisticated congestion-avoiding transport technology; an intelligent peer selection algorithm that prefers peers on the same LAN, network, or AS; and work with vendors of BitTorrent caching products to support local cache discovery. By keeping traffic local and non-congestive, BitTorrent DNA reduces long-haul and peering traffic for service providers, while improving the end-user experience.”

http://www.bittorrent.com/dna/technology/

“A BitTorrent tracker is a server which assists in the communication between peers using the BitTorrent protocol. It is also, in the absence of extensions to the original protocol, the only major critical point, as clients are required to communicate with the tracker to initiate downloads. Clients that have already begun downloading also communicate with the tracker periodically to negotiate with newer peers and provide statistics; however, after the initial reception of peer data, peer communication can continue without a tracker.”

http://en.wikipedia.org/wiki/BitTorrent_tracker

“Multi-tracker torrents feature multiple trackers in the one torrent. This way, should one tracker fail, the others can continue supporting file transfer.”

http://en.wikipedia.org/wiki/BitTorrent_tracker

Scott’s Patent: Claim 18

BitTorrent Protocol

The system of claim 14, wherein the computing device is further configured to determine if the distribution server is no longer able to optimally and simultaneously deliver the requested one or more of the media files identified in the routed user requests to the requesting users after commencing delivery of the requested one or more media files.

See Claims 1 and 14.

General Summary of the BitTorrent Protocol’s Satisfaction of Claim Element: Content delivery network servers (such as media servers) and end-user computers (“peers”) in the peer-to-peer network are configured to act as one or more media file databases. The BitTorrent protocol is dependent on multiple peers participating in the distribution of a file, including when one peer or distribution server is no longer the optimal method for distribution of the requested file. When one peer or distribution server is no longer the optimal method for distribution of the requested file, the BitTorrent tracker identifies and utilizes other peers or distribution servers in the system. The BitTorrent Protocol’s delivery of content is scaled to leverage network capacity.

“Our proprietary transport technology leverages the full available network capacity of all paths without disrupting other applications.”

http://www.bittorrent.com/dna/technology/

“BitTorrent DNA automatically moderates its use of the network to ensure that web browsing, voice over IP (VoIP), Internet gaming, and other applications are not disrupted.”

http://www.bittorrent.com/dna/technology/

“BitTorrent DNA contains a number of enhancements to mitigate the impact of peer networking on service provider networks. These enhancements include: BitTorrent’s sophisticated congestion-avoiding transport technology; an intelligent peer selection algorithm that prefers peers on the same LAN, network, or AS; and work with vendors of BitTorrent caching products to support local cache discovery. By keeping traffic local and non-congestive, BitTorrent DNA reduces long-haul and peering traffic for service providers, while improving the end-user experience.”

http://www.bittorrent.com/dna/technology/

“A BitTorrent tracker is a server which assists in the communication between peers using the BitTorrent protocol. It is also, in the absence of extensions to the original protocol, the only major critical point, as clients are required to communicate with the tracker to initiate downloads. Clients that have already begun downloading also communicate with the tracker periodically to negotiate with newer peers and provide statistics; however, after the initial reception of peer data, peer communication can continue without a tracker.”

http://en.wikipedia.org/wiki/BitTorrent_tracker

“Multi-tracker torrents feature multiple trackers in the one torrent. This way, should one tracker fail, the others can continue supporting file transfer.”

http://en.wikipedia.org/wiki/BitTorrent_tracker