Scott’s U.S. Patent
Copied By Dropbox
|11. A system for providing load balanced, secure media content delivery in a distributed computing environment, the system comprising:||The general claims chart exemplified below is one of many claims charts on multiple intellectual property assets invented by Scott. In addition to other proofs of ‘first-to-invent’ status, signed NDA’s, leaked competitor emails, internal competitor documents, federal file wrappers, news videos, whistle-blower testimony, court records and voluminous other evidence exists to support the veracity of the assertions over IP rights.|
|a centralized control center that segments and encrypts media content into a set of individual encrypted segments, a plurality of the segments being a portion of or the entirety of the media content size, the centralized control center including an encryption module stored in memory and executable by a processor to encrypt each individual segment to a unique encryption key;||The “centralized control center” is akin to the “host system” described in the U.S. Patent No. 8,825,597.
“Segments” are akin to “blocks” described in the Dropbox ‘597 Patent. Even more specifically, “segments” are akin to “fragments” of “blocks”:
“Dropbox file data is stored in discrete file blocks that are fragmented and encrypted using 256-bit AES.” https://www.dropbox.com/security
As described at the Dropbox website:
“To protect file data in transit, Dropbox uses SSL/TLS for file transfer, creating a secure tunnel protected by 128-bit or higher AES encryption. Dropbox file data is stored in discrete file blocks that are fragmented and encrypted using 256-bit AES. Not all mobile media players support encrypted streaming, so media files streamed from our servers aren’t always encrypted. Additionally, we support perfect forward secrecy, flag all authentication cookies as secure, and enable HSTS.” https://www.dropbox.com/security
The following diagram of the Dropbox service similarly shows that file data is stored in encrypted blocks (or, if read in conjunction with the above language, in encrypted fragments of blocks):
These references demonstrate that Dropbox encrypts individual segments (blocks) as described in this limitation.
|a plurality of intermediate control nodes that stage the set of individual encrypted segments;
a plurality of intermediate servers that mirror individual encrypted segments from the staged set; and
|Dropbox includes a feature called LAN Sync as part of the Dropbox app. When toggled on, it allows users to download files from other computers on their network, saving time and bandwidth compared to downloading them from Dropbox servers. Here, the computers on the user’s network serve as intermediate control nodes and intermediate servers.
|at least one client that:|
|sends requests for the media content to the centralized control center,||With Dropbox, a client computer sends requests for the media content to the centralized control center (host system).
“A first user of a first client instantiates a folder to be shared, and the folder and its contents are synchronized with a host system.” ‘597 Patent, Abstract; 1:54-56.
“. . . receiving a request from the second client system for contents of the synchronized folder; . . .” ‘597 Patent, Claim 1.
|receives individual encrypted segments in the set from one of an intermediate control node and an intermediate server optimally sited from the requesting client, and||Dropbox includes a feature called LAN Sync as part of the Dropbox app. When toggled on, it allows users to download files from other computers on their network, saving time and bandwidth compared to downloading them from Dropbox servers. Here, the computers on the user’s network serve as intermediate control nodes and intermediate servers.
|reassembles the individual encrypted segments into the media content for media playback,||Since Dropbox users are able to access their data, the client computer must reassemble the individual (encrypted) segments into a form appropriate for usage.|
|a broadcasting module stored in memory and executable by a processor to broadcast a pulse prior to receiving individually encrypted segments, and||This limitation is present in the Dropbox application residing on the client computer (for example, through LAN Sync):
|a request processing module stored in memory and executable by a process to select the optimally sited one of intermediate control node and intermediate server based on responses to the pulse for subsequent receipt of individual encrypted segments in the set.|| The Dropbox application on the client computer contains a request processing module to select an intermediate control node and server.
SEE BRUCE’S REPORT, HERE: http___www.schneier.com_blog_archives_2011_05_dropbox_securit
IN THIS LAWSUIT, DROPBOX ALMOST GOT NAILED, BUT A NEW LAWSUIT COULD GET THEM:
THE DROPBOX ‘176 PATENT WAS COPIED FROM SCOTT’S TECHNOLOGY WITHOUT DISCLOSING SCOTT IN THE PRIOR ART…. OOPSIE DROPBOX: U.S. Patent 9,049,176