`Case 5:18-cv-03462—BLF Document 31-5 Filed 10/04/18 Page 1 of 71
`
`EXHIBIT 5
`
`
`
`Case 5:18-cv-03462-BLF Document 31-5 Filed 10/04/18 Page 2 of 71
`Case 5:18-cv-03462-BLF Document 31-5 Filed 10/04/18 Page 2 of 71
`
`United States Patent
`(12)
`(10) Patent No.:
`Farber et a1.
`(45) Date of Patent:
`
`
`US 8,099,420 32
`*Jan. 17, 2012
`
`U8008099420B2
`
`(54) ACCESSING DATA IN A DATA PROCESSING
`SYSTEM
`
`(56)
`
`(75)
`
`Inventors: David A. Farber. Ojai, CA (US):
`Ronald D. Lachman‘ Northbrook. IL
`(US)
`
`( * ) Notice:
`
`(73) Assignees: l’ersonalWel) Technologies, LLC. 'l'yler,
`V
`TX (US); Level 3 Communications,
`LLC‘ Broomfield‘ CO (US)
`Subject to any disclaimer, the term of this
`patent is extended or adjusted under 35
`U.S.C. 154(b) by 1312 days.
`_
`Tl .
`_
`b'
`c1211isnglatent
`IS su Ject to a termma
`
`1 d'
`is-
`
`(2]) App1.No.: 11/017,650
`.
`.
`,,
`FflCd'
`Dec. ‘2’ 2004
`Prior Publication Data
`US 2005/0114296 A1
`May 26, 2005
`
`(22)
`(65)
`
`References Cited
`U.S. PATENT DOCUMENTS
`
`a 668 647 A
`1835:1260 A
`4096568 A
`4.215.402 A
`4.2211003 A
`a
`v.
`3332;); 2
`7 ’7
`4.405.829 A
`4'41”“85 A
`
`-
`1~
`6 977 E
`9:197; P;:::i:;:: al.
`6/1978 Bennett et al.
`7/1980 Mitchell
`9/1980 Chang et :11.
`3
`.
`vcs
`gjiggi Ewell“
`~
`~
`9/1983 Rivest
`[0/1983 .thfi
`(COUUDUCd)
`
`EP
`
`FOREIGN PATENT DOCUMENTS
`0 268 069 A2
`5/1988
`(Continued)
`
`OTHER PUBLICATIONS
`
`Affidavit ofTimothy P. Walker in Support ofCWIS’ Opening Mark-
`man Brief Construing the Terms at
`Issue in U S Patent No.
`6.415.280, datcd Jul. 25. 20031 from Civil Action No 02-11430
`W”.
`
`Related U.S. Application Data
`
`(Continued)
`
`(60) Continuation of application No. 09/987,723. filed on
`Nov. 15. 2001, HOW Pat. No. 6928,442. which is a
`continuation of application No. 09/283,160, filed on
`Apr. 1, 1999. how Pat. No. 6415280, which is a
`division of application No. 08/960,079. filed on Oct.
`24, 1997.
`110W Pat. No. 5,978,791, which is a
`continuation Of application NO- 08/421160, filed on
`Apr- 11, 1995.- 110W flbfllldOHEd-
`‘
`lnt. (2|.
`(2006-01)
`G06F 1 7/30
`707/7581 707/781; 707/321
`(52) U-S- 0-
`(58) Field of Classtfication Search .................. 707/758,
`707/78]. 821
`See application file for complete search history.
`
`(5] )
`
`
`
`.
`_
`y
`.
`_
`,
`Pr’mm E""””"""Kha‘mB P1131“
`(74) Attorney, Agem.
`or. Fir/H. — Dav1dson Berquist
`JaCkSOH‘g'GOVVdeYi LL13: BHKHSIUIZ‘W
`
`ABSTRACT
`(57)
`Access to data items uses names based 011 the data in the data
`items: the name of a data item may be based, at least in part,
`on a function oi'some or all oi'the bits that comprise the data
`item. A data item may comprise an arbitrary sequence ofbits.
`The function may include a hash function or a message digest
`function. The name ofa data item may be compared to a list
`ofnames ofother data items.
`
`178 Claims, 31 Drawing Sheets
`
`SIMPiE
`
`DA TA ITEM
`
`l
`
`:
`1
`
`3212
`COMPUTE MD FUNCTION ON
`DATA ITEM
`
`DATA ITEM
`
`3214
`AFFEND LENGTH MODULO 32 OF
`
`EXHIBIT 5 - l
`
`
`
`Case 5:18-cv-03462-BLF Document 31-5 Filed 10/04/18 Page 3 of 71
`Case 5:18-cv-03462-BLF Document 31-5 Filed 10/04/18 Page 3 of 71
`
`US 8,099,420 B2
`
`lege2
`
`-
`
`'
`
`..
`
`-
`
`--------
`
`U.S. PATENT DOCUMENTS
`,
`'1ng E'm'fnh-
`8",1984 Be‘; er
`1711984 D?“ 3“
`1331985 Slfion'dt 141
`3/1986 £21231er ‘
`:1
`.
`.
`.3‘
`3",”"6 Mm“
`21987 Auslandcr
`2/1987 Meaden
`4.1987 Hellman
`(/1987 C
`9219;” 1511::
`3,1988 Km“ ladt
`3/1988 Zamosra
`/
`‘
`11133 ICI'ITI‘CY,“ 31-
`13319;” 13211106251),
`8',
`31333 gafimf‘mfi :11
`-’
`‘
`591990 11:12:85 “
`5/1990 Churm et 11].
`61990 Robert 0181
`8’1990 4&1-
`1d 1
`1
`81990 ‘R’f Seam
`11/1990 Bi”: “6 “-
`'
`5/1991 Mansfield 61 a1
`6/1991 Cho
`7/1991 Hechl e1 .11.
`,
`91991 Schwartzetal.
`9/1991 Maren
`9,1991 D
`1031991 Cyls‘mu
`1231991
`13° ”3°“
`191994 M6512-
`531992 MEAN/”0
`~7’.199§ K'ber
`11'
`71.1992 Tpfflzfi’
`93.1992 1,”va
`“3199. 022112 r-
`131995 6‘1“)“
`131993 firm/161211
`1
`‘
`'
`3/1993 Soon
`4/1993 Gramlich etal.
`4,1993 W
`431993 02211311141
`‘
`’,
`.‘nge ‘
`41993 \Nltlenbergetal
`5/1993 V011e11
`6,199} W1 ”A
`73199;
`‘1'”
`55/199;
`3312121
`,
`8’,1993 Reed “a"
`91993 Fukumwa el :11.
`116533 gym? 1
`l
`131994 H°”°5ne a-
`231994 NOW
`#1994 63:1?“
`51,1994 Blmnonel'll
`41,1994 11:1
`.
`‘~
`431994 H'AJm'mn
`',
`.
`2133: 3:111:33? ‘11-
`',
`‘
`-
`391994 Wk.“
`&1994 Pltkln e121].
`3:33: gmret 1
`9x1994 Lima“ ”I 1
`101994
`16111210111212
`[0;]994 11:11:52) Acme“
`10:,1994 Opisgle't al
`10,1994 '1'11bolt etalV
`C
`‘
`'
`3:233: $322615].1].
`12/1994 Hunter et a1.
`1/1995 Cannon
`2/1995 Hunter et .11
`4/1995 Belsan e141
`4/1995 Konrad
`
`21222112222: A
`4464713 A
`4190-78; A
`4-“8-41: A
`4571700 A
`'
`'
`5
`45771293 A
`4.642.764 A
`4.642.793 A
`465A, 09; A
`4‘(7S.810 A
`4691999 A
`43,534; A
`47732039 A
`‘ "'
`.
`231:2 A
`42888001 A
`~
`1
`5
`241213220 A
`~ ‘3‘
`4922414 A
`4.922.417 A
`4.937.863 A
`4949302 A
`4553309 A
`462,337 A
`‘
`‘
`501421292 A
`5.025.421 A
`5032979 A
`’
`‘
`5.047.918 A
`5050074 A
`{050317 A
`"5057}? A
`5‘077’6gs A
`‘5‘034‘815 A
`52117351 A
`5129041 A
`5129082 A
`“346% A
`0.161.147 A
`3'17-9~680 A
`51821799 A
`-
`5
`5.199.073 A
`5.202.982 A
`5204 897 A
`5204958 A
`-~
`~
`5.204.966 A
`5208 858 A
`527.1134 A
`52330051 A
`0322392648 A
`"“ ‘
`5341-671 A
`5.247.620 A
`2332983 A
`55276561 A
`5287499 A
`$87314 A
`5‘397‘279 A
`5‘301‘386 A
`25301316 A
`-
`1
`'
`$1123? A
`/ ~ 1
`”39/403 A
`5.341.477 A
`2312222: A
`53512302 A
`53577140 A
`5357623 A
`5,357,630 A
`5‘359’573 A
`’
`‘7
`222%:232 2
`5.375.206 A
`5.384.565 A
`5.394.555 A
`5.403.639 A
`5.404.508 A
`
`5.438.508 A
`5.442.343 A
`5.448.668 A
`5.448.718 A
`5.452.447 A
`5.454.000 A
`5.454.039 A
`5.459.860 A
`5.465.365 A
`<46747l A
`“*
`‘
`5.475.826 A
`5.479.654 A
`5.491.817 A
`5.499.294 A
`$23-$32
`._
`.
`.
`5.537.585 A
`5.542.087 A
`5.548.724 A
`5.553.143 A
`5 581615 A
`5.568.181 A
`'
`1
`'
`5'551'758 A
`5.581.764 A
`5.583.995 A
`5.588.147 A
`2
`233$: A
`‘
`‘
`5604303 A
`5.604.892 A
`“20067 A
`"" ’
`‘
`5.632.031 A
`5.638.443 A
`5.640.564 A
`5.649.196 A
`5.677.952 A
`5.678.038 A
`5.678.046 A
`5.694.472 A
`5.694.596 A
`5.701.316 A
`5.710.922 A
`5.724.425 A
`,
`5'72455‘ A
`5.742.807 A
`5.745.879 A
`5.757.913 A
`57579” A
`" ’
`‘
`‘
`5.781.629 A
`5.802.291 A
`223220391 A
`.
`.
`5.835.087 A
`5864 683 A
`5.907.619 A
`5.907.704 A
`5.940.504 A
`5.978.791 A
`5.991.414 A
`6.006.018 A
`6.134.603 A
`6.135.646 A
`6.415.280 131
`6.732.180 B1
`6.816.872 Bl
`6978 442 132
`2002/0052884 A1
`2002/0082999 A1
`2003/0078888 A1
`2003/0078889 A1
`2003/0095660 A1
`2004/0139097 A1
`zoos/0010792 Al
`2005/0114296 A1
`2007/’0185848 A1
`2008/0065635 A1
`2008/0066191 A1
`2008/0071855 A1
`2008/0082551 A1
`
`707/1
`
`707/2
`
`707/2
`2
`
`709/226
`
`707/205
`
`.
`
`707/10
`
`725/92
`
`...... 709/219
`
`.. 705/54
`. 709/303
`
`8/1995 Wyman
`8/1995 Cato e181.
`91995 Perelson Bl 111.
`91995 Cohnel :11.
`__________
`9/1995 Nelson et a1.
`9/1995 Dorfman
`9/1995 Coppersmith e161.
`10/1995 Bumen
`11/1995 W'jnterborlorn
`“/1995 Bqder
`,
`.‘
`121995 F1sc_her
`12/1995 Sqlubb
`2/1996 601311161111.
`3/1996 Frledmnn
`3:333 Eisenberie‘al
`/
`"awczy
`7/1996 Bllckenslafielnl.
`7/1996 Neimal e1 :11.
`8/1996 Akizawa e1 51
`9/1996 Rossel 111.
`12/1996 Stern
`10/1996 Greenwood ct :11.
`.
`1
`.
`””96 3.11““
`12/1996 Fuzgeraldelal.
`12/1996 Gardnerelnl
`12/1996 Neemanelal.
`2/
`-owar
`3,133; 3“” e‘ 31‘
`.
`“997 Am
`2/1997 Nullallelal.
`“997 K. d 11
`1
`*
`f“. c C”
`5/1997 Vellssaxopoulosetal.
`6/1997 Stefiketal
`.............
`6/1997 Hamilton 6181
`.
`7/1997 Woodhillelal.
`10/1997 B1ak1ey.IIIetal.
`10/1997 Docklerelal.
`10/1997 Cahillctal.
`12/1997 Johnson e1a1
`12/1997 Campbell
`12/1997 Alfernessetal
`1/1998 Alleyetal
`3/1998 Changetal.
`,
`,
`3/1998 “”1“
`4/1998 Masmtcr
`4/1998 Wyrmn
`5/1998 Bellare et a1.
`1
`“998 A
`.th
`'
`"”5"“ “8
`7/1998 Haber .713/177
`
`9/1998 Balickelal.
`.. 709/202
`13:33: ggl'ye" 1......"
`' 707”
`/
`gataeta.
`11/1998 Hem ........................ 346/810
`1/1999 Boeberl el '11
`5/1999 Davis
`5/1999 Gudmundsonetal.
`81999 Griswold
`11/1999 Farberel n1.
`11/1999 Gumyetal.
`12/1999 Burnerlelal
`10/2000 Jones etal.
`.........
`10/2000 Km ct a].
`7/2002 Farber et a1.
`5/2004 Hale eta].
`11/2004 Squibb
`8/7005 Fmbereml
`5/2002 Faner el al.
`6/2002 Ieeetal.
`4/2003 Leeetal.
`4/2003 Leeelul.
`5/2003 Leeetnl.
`7/2004 Ferber e101.
`1/2005 c
`entieret a1
`572005 Fail-153191511.
`3/2007 FaIber et 211.
`3/2008 qu'bcr 61 al.
`3/2008 Faner e1 :11.
`3/2008 Farber 61 al.
`3/2008 quber el al.
`
`.395/20049
`709/330
`
`EXHIBIT 5 - 2
`
`
`
`Case 5:18-cv-03462-BLF Document 31-5 Filed 10/04/18 Page 4 of 71
`Case 5:18-cv-03462-BLF Document 31-5 Filed 10/04/18 Page 4 of 71
`
`US 8,099,420 B2
`Page 3
`
`EP
`EP
`EP
`EP
`EP
`EP
`EP
`GB
`JP
`JP
`JP
`JP
`JP
`JP
`JP
`W0
`W0
`W0
`W0
`W0
`
`FOREIGN PATENT DOCUMENTS
`0315 425
`5/1989
`0 558 945 A2
`9/1993
`0 566 967 A2
`10/ 1993
`0592045
`4/1994
`0631 226 A1
`12/1994
`0 654 920 A2
`5/1995
`0 658 022 A2
`6/1995
`2294132 A
`4/1996
`59058564
`4/1984
`63-106048
`5/1988
`63-273961
`11/1988
`2-127755
`5/1990
`05162529
`6/1993
`06187384 A2
`7/1994
`06348558 A
`12/1994
`WO 92/20021
`11/1992
`W0 94’06087
`3/1994
`WO 94/20913
`9/1994
`WO 95.01599
`1/ 1995
`WO 97/43717
`11/1997
`
`OTHER PUBLICATIONS
`
`Akatnai and M1 1 ‘s Memorandum in Support of'I'heir Claim Con-
`struction of IISPAT 5.978.791. dated Aug. 31. 2001. from Civil
`Action No. 00-cv-11851RWZ.
`Akamai’s Answer. Affirmative Defenses and C ounterclaims to
`Amended Complaint. filed Dec 6. 2002. in Civil Action No. 02-CV-
`11430RWZ
`Akamai’s Brief on Claim Construction. dated Aug. 8. 2003. from
`Civil Action No. 02-11430 RWZ
`Answer of Defendant RIAA to First Amended Complaint and Coun-
`terclaim. dated Feb 8. 2005. from Civil Action No. CV04—7456 .IFW
`(C'I'x).
`Berners-Lee. T et al.. “Hypertext Transfer ProtocolilITTP/lfl.”
`May 1996. pp. 1-54.
`Berners-Lee.
`'1‘. “Universal Resource Identifiers in WWW.” .Iun.
`1994.pp 1-25.
`Bowman. C. Mic. et al.. "Harvest: A Scalable, Customizable Discov—
`ery and Access System.” Aug. 4. 1994. pp. 1—27.
`Bowman. C Mic. et a1 . “Harvest: A Scalable. Customizable Discov-
`ery and Access System.” Mar. 12. 1995. pp. l-29.
`Brisco. T.. “DNS Support for Load Balancing.” Apr. 1995. pp. 1-7.
`Browne. Shirley et al.. "Location-Independent Naming for Virtual
`Distributed Software Repositories.” 1995. 7 pages.
`Browne. Shirley et al.. “Location-Independent Naming for Virtual
`Distributed Software Repositories," 1995. printed fiorn http:/www.
`netlib org/ullo'papers/lifn/main.html on Mar 22. 2006, 18 pages
`Civil Minutes General dated Jan. 25. 2005. fi'orn Civil Action No. CV
`04-7456-JFW (C'lx).
`Complaint for Patent Infringement. Permanent Injunction. and Dam-
`ages. dated Sep. 8. 2004. from Civil Action No. CV 04-7456 JFW
`(AJWx).
`CWIS' Opening Markman Brief Construing the Terms at Issue in
`11.8 Patent No. 6.41 5.280. dated Jill. 25. 2003. from Civil Action No.
`02-11430 RWZ.
`CWIS‘ Reply Markman Brief Construing the Terms at Issue in US.
`Patent No. 6.415.280. dated Aug. 15. 2003. from Civil Action No.
`02—11430 RWZ.
`Davis. James R.. "A Server for a Distributed Digital Technical Report
`Library.” Jan. 15. 1994. pp l-‘t.
`Declaration ofRobert B.K. Dewar in Support ofCWIS' Construction
`of the Terms at Issue in US Patent No. 6.415.280. dated Jul. 25.
`2003. from Civil Action No. 02-cv-1 1430RWZ
`Defendant Digital Island‘s Opening Brief on Claim Construction
`Issues dated Aug. 17. 2001. from Civil Action No. 00—cv-11851-
`RWZ.
`Defendant Media Sentry. Inc.‘s Reply Memorandum of Points and
`Authorities in Further Support of Its Motion to Dismiss. dated Nov.
`15. 2004. from Civil Action No. CV04-7456 JFW (CTx).
`Defendant MediaSentry Inc’s Notice ofMotion and Motion to Dis-
`miss First Amended Complaint; Memorandum of Points and
`Authorities in Support Thereof. dated Dec 13. 2004. from Civil
`Action No. CV04—7456 JFW .
`
`Defendant MediaSentry. Inc’s Answer to Plaintiffs’ First Amended
`Complaint and Counterclaims. dated Feb 8. 2005. from Civil Action
`No. CV04-7456 JFW (CTx).
`Defendant RIAA’s Notice of Motion and Motion to Dismiss First
`Amended Complaint: Memorandum of Points and Authorities in
`Support Thereof. dated Dec. 13. 2004. from Civil Action No. CV04—
`7456 JFW (CTx).
`Defendants Loudeye Corp.’s and Overpeer. Inc.’s Answer to Plain-
`tiffs’ Firsl Amended Complaint and Counterclaim. dated Feb. 8.
`2005. from Civil Action No. 04-7456 JFW (AJWx).
`Defendants’ Preliminary Invalidity Contentions dated Dec. 14. 2006.
`from Civil Action No. CV 06—5086 SJO (Ex)
`European Search Report
`issued Dec. 23. 2004 in correpsonding
`European Application No. 969107622-2201.
`Expert Report of Professor Ellis Horowitz. dated Mar 6. 2006. from
`Civil Action No. 04-7456 JFW (CTx).
`Expert Report of the Honorable Gerald J. Mossinghofl'. dated Mar.
`13, 2006. from Civil Action No 04-7456 JFW (CTx).
`Faltstrom. P. et aI . “How to Interact with a Whois++ Mesh." Feb
`1996. pp. 1-9.
`Fielding. R. et al.. “Hypertext Transfer Protocol—HTTP/l.1." Jan.
`I997.pp.1-163.
`Fielding. R et al.. “Hypertext Transfer ProtocoliHTTP/ 1.1.” Jun.
`1999. pp 1-157.
`Infringement. Permanent
`for Patent
`First Amended Complaint
`Injunction and Damages. dated Nov. 24. 2004. fi orn Civil Action No.
`CV 04-7456 JFW (CTx).
`International Search Report dated .Iun. 24. 1996 in corresponding
`international application PCf/USI996/004733.
`Khare. R. and Lawrence. S.. “Upgrading to TLS Within HTTP/1 1.”
`May 2000. pp. [-12
`Kim et al. “The Design and Implementation of Tripwire: A Iile
`System Integrity Checker". COAST Labs Dept. of Computer Sci-
`ences Purdue University. Feb. 23. 1995. pp. 1—18
`Knuth. Donald E.. “The Art ofComputer Progrzunming.” 1973. vol.
`3. Ch. 6.4. pp. 506-549.
`Memorandum ofPoints and Authorities in Support ofLoudeye’s and
`Overpeer’s Motion to Dismiss the First Amended Complaint for
`Failure to State a Claim or. in the Alternative. for a More Definitive
`Statement. dated Dec. 13. 2004. from Civil Action No CV—04-7456
`.IFW (AJWX).
`Moats. R.. “URN Syntax." May 1997. pp. 1-8.
`Myers. J and Rose. M. “The Content-MDS Header Field.” Oct
`1995. pp. [-4.
`Office Action in corresponding Japanese Application No. 531.073./
`1996 mailed on Apr. 25. 2006.
`Office Communication in corresponding European Application No.
`96910762.2-1225 dated Jan. I7. 2007.
`Order Re Claim Construction dated Nov. 8. 2001. from Civil Action
`No.00—11851-RWZ.
`Patent Aberacls of Japan. “Device for Generating Database and
`Method for the Same." Application No. 03-080504. Sun Microsyst.
`Inc.. published Jun. 1993. 38 pages.
`Patent Abstracts of Japan. “Method for Registering and Retrieving
`Data Base." Application No 03-18730}. Nippon Telegr. & Teleph.
`Corp.. published Feb. 1993. 11 pages
`PlaintilI's’ Memorandum of Points and Authorities in Opposition to
`Loudeye Defendants' Motion to Dismiss. dated Nov. 8. 2004. from
`Civil Action No. CV—04-7456 JFW (AJWX).
`Plaintitl‘s’ Opposition to Media Sentry’s Motion to Dismiss; Memo-
`randum of Points and Authorities in Support Thereof. dated Nov. 8.
`2004. from Civil Action No CV 04-7456 JFW (CTx)
`Plaintiff’s Opposition to Recording Industry Association of Ameri-
`ca‘s Motion to Dismiss; Memorandtun of Points and Authorities in
`Support Thereof. dated Nov 8. 2004. from Civil Action No CV-04-
`7456 .IFW (CTx).
`Plaintiff‘s Reply to Defendant Loudeye Corp.’s and Overpeer. Inc.’s
`Counterclairns. dated Mar. 3. 2005. from Civil Action No. CV
`04—7456 JFW (C Tx)
`I’laintifi‘s Reply to Defendant MediaSentry's Counterclairns. dated
`Mar. 3. 2005. from Civil Action No CV 04-7456 JFW (CTx).
`Plaintiff's Reply to Defendant RIAA’s Counterclaims. dated Mar. 3.
`2005. from Civil Action No. 04-7456 JFW (CTX).
`
`EXHIBIT 5 - 3
`
`
`
`Case 5:18-cv-03462-BLF Document 31-5 Filed 10/04/18 Page 5 of 71
`Case 5:18-cv-03462-BLF Document 31-5 Filed 10/04/18 Page 5 of 71
`
`US 8,099,420 32
`Page 4
`
`Reed Wade (wade@cs utk edu). “re: Dienst and BFD/LIFN docu-
`ment.” Aug 8. 1994. printed from http:/M'ww wcbhislorycrgv'www
`lists/\va-talkl994q3/O4l6.html on Mar. 22. 2006. (.7 pages).
`Rivest. R.. “The MD5 Message—Digest Algorithm.” Apr. 1992. pp.
`1-19 and errata sheet (1 page)
`Rose. M.. “The Content—MDS Header Field.” Nov. 1993. pp. 1-3.
`Schneier. Bruce. “One-Why Hash Functions. Using Crypographic
`Algorithms for Hashing.” 1991. printed from http://202 179135.4/
`data/DDJ/aiticles/l991t’9109/9l909g/9109g.htm on Mar. 22. 2006.
`Sun Microsystems. Inc .“NFS: Network File System Protocol Speci-
`fication.” Mar. 1989. pp 1-25.
`Vincenzerti. David and Cotrro7.7.i. Massimo. “Anti Tampering Pro-
`gram." Proceedings of the Fourth {USENIX} Security Symposium.
`Santa Clara. CA. 1993. 11 pages.
`Vincenzetti. David and Cotrrozzi. Massimo. “Anti Tampering Pro-
`gram." Proceedings ofthe Fourth {USENIX} Security Symposium.
`Santa Clara. CA. undated. printed from http://www.janet/CERI/
`VincanettiiandACotrozzi/ATP_Anti,Tzunp on Mar. 22. 2006. 8
`pages
`Berners-Lee. T. et al.. "Uniform Resource Locator 5 (URL).” pp. 1-25.
`Dec. 1994
`Danzig. RB. et al.. "“Distributed Indexing: A Scalable Mechanism
`for Distributed Information Retrieval.“ Proceedings of the 14th
`Annual International ACM SIGIR Conference on Research and
`Development
`in Information Retrieval. pp. 220-229. Oct. 13-16.
`I 99 I .
`IIauzeur. B. M.. “A Model for Naming. Addressing. and Routing.”
`ACM Trans. Inf. Syst. 4. Oct. 4. 1986). 293-311.
`Khoshafian. S. N. et al. 1986. Object identity. In Conf. Proc. on
`Object-Oriented Programming Systems. Languages and Applica-
`tions (Portland. Oregon. United States. Sep 29-Oct. 2. 1986). N.
`Meyrowitz. Ed. OOPLSA ’86. ACM Press. New York. NY. 406-416.
`Lantz. K. A.. et al.. “Towards a universal directory service” In Proc.
`4th Annual ACM Symp. on Principles of Distributed Computing
`(Minaki. Ontario. Canada). PODC ’85. ACM Press. New York. NY.
`250-260.
`Leach. P. J.. et al. The file system ofan integrated local network In
`Proc. 1985 ACM 13th Annual Conf. on Comp. Sci CSC ’85. ACM
`Press. NY. NY. 309-324.
`Leach. P.J.. ct al. “UIDs as Internal Names in a Distributed File
`System.” In Proc. lst ACM SIGACT—SIGOPS Symp. on Principles of
`Distributed Computing (Ottawa. Canada. Aug. 18-20. 1982). PODC
`’82 ACM Press. New York. NY. 34-41.
`Ma. C.
`[992. On building very large naming systems. In Proc. 5th
`Workshop on ACM SIGOPS European Workshop: Models and Para-
`digms for Distributed Systems Structuring (France. Sep. 21—23.
`1992). EW 5. ACM Press. New York. NY. l-5
`Peterson. L. L. 1988. A yellow-pages service for a local-area net-
`work. In Proc. ACM Workshop on Frontiers in Computer Commu-
`nications Technology (Vermont. 1987). J. J. Garcia—Luna-Aceves.
`Ed. SIGCOMM ’87. ACM Press. New York. NY. 235-242.
`Ravindran. K. and Ramakrishnan. K. K 1991. A naming system for
`feature—based service specification in distributed operating systems.
`SIGSMALL/PC Notes 17. 3-4 (Sep. 1991). 12-21.
`Ross. K.. “Hash-Routing for Collections of Shared Web Caches.”
`IEEE Network Magazine. pp. 37-44. Nov.-Dec. I997
`Schwartz. M.. et a1. 1987. Anarne service for evolving heterogeneous
`systems. In Proc. 11th ACM Symp on OS Principles (Texas. Nov.
`8-11. 1987). SOSP ‘87. ACM Press. NY. NY. 52-62.
`Shaheen-Gouda. A. and Loucks. L 1992. Name borders. In Proc. 5th
`Workshop on ACM SIGOPS Europezm Workshop: Models and Para—
`digms for Distributed Systems Structuring (Mont Saint-Michel.
`France. Sep. 21-23. 1992)_ EW 5 ACM Press. NY. NY.
`l—6.
`Terry. D. B. 1984. An analysis ofnaming conventions for distributed
`computer systems In Proc. AC M SIGCOMM Symp. on Communi-
`cations Architectures and Protocols: Tutorials & Symp SIGCOMM
`’84. ACM Press. NY. NY. 218-224.
`Cheriton. David R. and Mann. Timothy P.. "Decentralizing a global
`naming service for improved performance and fault tolerance". ACM
`'l'ransactions on Computer Systems. vol. 7. No. 2. May 1989. pp.
`147-1 83.
`Request for Reexamination ofU.S. Patent No 6.928.442: Reexam
`Control U.S. Appl. No. 90/010260. tiled Aug. 29. 2008
`
`Kim et al .. “Experiences with Tripwire: Using Intergrity Checkers for
`Intrusion Detection". COAST Labs Dept. of Computer Sciences
`Purdue University. Feb. 22. 1995. pp. 1-12.
`Kim et al. "The Design and Implementation of Tripwire: A file
`System Intergr'ity Checkcr". COAST Labs. Dept. of Computer Sci-
`ences Purdue University. Nov. 19. 1993. pp. 1-21.
`Zhiyu Tian et al.. A New Hashing Function: Statistical Behaviour and
`Algorithm. pp. 3-13.
`G. I._ Friedman. Digital Camera with Apparatu for Authentication of
`Images Produced from an Image File. NASA Case No NPO-19108-
`I—CU. U.S. Appl No. 08/159980. filed Nov. 24. 1993.
`H. Goodman Ada. Object -Oriented Techniques. and Concurrency in
`Teaching Data Structures and File Management Report Documenta-
`tion p AD-A275 385-94-04277.
`Advances
`in Cryptology-EUROCRYPT’93: Workshop on the
`Theory and Application of Cryptographic Techniques Lol'thus. Nor—
`way. May 23-27. 1993 Proceedings.
`Proceedings ofthe 1993 ACM SIGMOD International Conferenec on
`Management 01. Data. vol. 22. Issue 2. Jun. 1993.
`Advances
`in Cryptology-AUSCRYPT '927Workshop on the
`Theory and Application of Cryptographic Techniques Gold Coast.
`Queensland. Australia. Dec. 13—16. 1992 Proceedings.
`Witold Litwin et al.. Linear Hashing for Distributed Files. ACM
`SIGMOD. May 1993. pp 327-336.
`Ming-Ling Lo et al . On Optima] Processor Allocation to Support
`I’ipelinetl Hash Joins. ACM SIGMt )1). pp. 69-78. May 1993.
`Thomas A. Berson. Differential t'.‘r)1'rtanaly.~is Mod 25‘ with Appli-
`cations to MDS. pp. 69-81
`William Perrizo et al.. Distributed .loin Processing Performance
`Evaluation. Twenty-Seventh Hawaii International Conference on
`System Sciences. vol. II. pp. 236-244.
`Vijay Kumar. A Concurrency Control Mechanism Based on Extend—
`ible Hashing for Main Memory Database Systems. ACM. vol 3.
`1989. pp. 109-113.
`Birgit PIitzman. Sorting Out Signature Schemes. Nov. 1993. 1"Conl'.
`Computer & Corrun. Security '93. p. 74-85.
`Bert dern Boer et al.. Collisions for the compression function ofMDS.
`pp. 292-304.
`Sakti Pramanik et al.. Multi—Directory Hasing. 1993. Info Sys.. vol
`18. No 1.pp. 63-74.
`Murlidhar Koushik. Dynamic Hashing with Distributed Overllow
`Space: A File Organization with Good Insertion Performance. 1993.
`Info Sys.. vol. 18. No 5. pp. 299-317.
`Witold Litwin et al.. I.H*-I.inear Hashing for Distributed Files. HP
`Labs Tech. Report No. HPL-93-2I. .lun. 1993; pp l—22
`Yuliang Zheng et al.. HAVAL—A One-Way Hashing Algorithm with
`Variable Length of Output (Extended Abstract). pp 83-105.
`Chris Charnes and Josef Pieprzky. Linear Nonequivalence versus
`Nonlinearity. Pieprzky. pp. 156-164.
`Gwertzman. James. et al. “The Case for Geographical Push-Cach-
`ing.” Technical Report I-IU TR 34-94 (excerpt). Harvard University.
`DAS. Cambridge. MA 02138. 1994. 2 pgs.
`Grigni. Michelangelo. et al. “Tight Bounds on Minimum Broadcasts
`Networks.” SIAM Journal 01' Discrete Mathematics. vol. 4. No. 2.
`May 1991. pp. 207-222.
`Devine. Robert “Design and Implementation of DDI-I: A Distributed
`Dynamic Hashing Algorithm.” In Proceedings of 4th International
`Conference on Foundations of Data Organizations and Algorithms.
`1993. pp. 101-114.
`in Datagram
`“Multicast Routing
`al.
`et
`Deering. Stephen.
`Internetworks and Extended LANs.” ACM Transactions on Corn-
`puter Systems. vol 8. No 2. May 1990. pp. 85-110.
`Cormen. Thomas H.. et al. Introduction 70 Algor'r'lhms. The MIT
`Press. Cambridge. Massachusetts. 1994. pp 219-243. 991-993
`Naor. Moni. et al. “The Lead. Capacity and Availability of Quortun
`Systems.” In Proceedings of the 35th IEEE Symposium on Founda-
`tions of Computer Science. Nov. 1994. pp. 214-225.
`Nisan. Noam. “Psuedorandom Generators for Space-Bounded C orn-
`putation.” In Proceedings ofthe Twenty-Second Annual ACM Sym-
`posium on Theory of Computing. May 1990. pp. 204-212
`Patrner. Mark. et al. “Fido: A Cache that Learns to Fetch.” In Pro-
`ceedings of the 17th International Conference on Very Large Data
`Bases. Sep. 1991. pp. 255-264.
`
`EXHIBIT 5 - 4
`
`
`
`Case 5:18-cv-03462-BLF Document 31-5 Filed 10/04/18 Page 6 of 71
`Case 5:18-cv-03462-BLF Document 31-5 Filed 10/04/18 Page 6 of 71
`
`US 8,099,420 B2
`Page 5
`—————————————
`
`Peleg. David. et al. “The Availabiltiy of Quorum Systems.” Informa-
`tion and Computation 123. 1995. 210—223.
`Rabin. Michael. "Eflicient Dispersal of Information for Security.
`Load Balancing. and Fault Tolerance.” Joumal of the ACM. vol. 36.
`No. 2. Apr. I989. pp. 335-348.
`Ravi. R . “Rapid Rumor Ramification: Approximating the Minimum
`Broadcast Time” In Proceedings of the 35th IEEE Symposium on
`Foundation ofComputer Science. Nov. 1994. pp. 202-213.
`Schmidt. Jeanette. et a1. “Chernoff—Hoeffding Bounds for Applica-
`tions with Limited Independence.” In Proceedings of the 4th ACS-
`SIAM Symposium on Discrete Algorifluns. 1993. pp. 331-340.
`'l'arjan. Robert Eadie. et al. “Storing a Sparse Table.” Communica-
`tions ofthe ACM. vol. 22. No. 11. Nov. 1979. pp. 606-611.
`Wegman. Mark. et al. “New Hash Functions and Their Use in Authen-
`tication and Set Equality.” Journal of Computer and System Sciences
`vol. 22. Jun. 1981. pp. 265-279.
`Vitter. Jeffrey Scott. et al. “Optimal Prefetching via Data Cempres-
`sion," In Proceedings of 32nd IEEE Symposium on Foundations of
`Computer Science. Nov 1991. pp. 121-130.
`Fredman. Michael. cl al. “Storing a Sparse Table with 0(1) Worst
`Case Access Time." Journal of the Association for Computing
`Machinery. vol. 31. No 3. Jul. 1984. pp. 538-544.
`Yao. Andrew Chi-Chih. “Should Tables be Sorted?" Journal of the
`Association for Computing Machinery, vol. 28. No. 3. Jul. 1981. pp.
`615 -628.
`Floyd. Sally. et al. “A reliable Multicast Framework for Light-Weight
`Sessions and Application Level Framing.” In Proceedings of ACM
`SIGCOMM ’95. pp. 342-356.
`Feeley. Michael. et al. “Implementing Global Memory Management
`in aWorkstation Cluster.” In Proceedings of the 15th ACM Sympo-
`sium on Operating Systems Principles. 1995. pp. 201-212.
`Carter. J. Lawrence. et a1. “Universal Classes of Hash Functions”
`Journal ofCompuler and System Sciences. vol. 18. No. 2. Apr. I979.
`pp. 143-154.
`Patent Abstracts ofJapan. “Electronic Mail Multiplexing System and
`Communication Control Method in The System." 06/30/1999.“). JP
`05162529.
`Kim cl al.. "Experiencess with Tripwire: Using Intergrity Checkers
`for Intrusion Detection”. COAST Labs. Dept. ofComputer Sciences
`Purdue University. Feb. 22. 1995. pp. 1-12.
`Kim et al.. "The Design and Implementation of Tripwire: A file
`System Intergrit‘y Cheekcr”. COAST Labs. Dept. of Computer Sci-
`ences PurdueUniversity. Nov. 19. 1993. pp_ 1-21.
`Bert Dem Beer at al.. Collisions for the compression function of
`M05. pp. 292—304
`Sakti Pramanik el al.. Multi-Directory Hashing. 1993. Info Sys.. vol.
`18. No. 1. pp. 63-74
`Mttrlidhar Koushik. Dynamic Hashing with Distrubuted Overflow
`Space: A File Organi7ation with Good Insertion Performance. 1993.
`Info. Sys.. vol. 18. No. 5. pp 299-317.
`Witold Litwin et al.. LIV-Linear Hashing for Distributed Files. 11?
`Labs Tech. Report No HPI.—93—2l. Jun 1993. pp. l-22.
`Yuliang Zheng et al.. HAVAL-A One—Way Hashing Algorithm with
`Variable Length of Output (Extended Abstract). 1993. pp. 83-105.
`Chris Charnes and Josef Pieprzky. Linear Noncquivalcnce versus
`Nonlinearity. Pieprzky. 1993. pp. 156-164.
`Withold Litwin et al.. Linear Hashing for Distributed Files. ACM
`SIGMOD. May 1993. pp. 327-336.
`Ming-Ling Lo et al.. On Optimal Processor Allocation to Support
`Pimlincd Hash Joins. ACM SIGMOD. pp. 69-78. May 1993.
`Thomas A. Berson. Dill‘crential Cryptanalysis Mod 253 with Appli-
`cations to MDS. pp. 69-81.
`William Perrizo et al.. Distributed Join Processing Performance
`Evaluation. Twenty-Seventh Hawaii International Conference on
`System Sciences. vol. Ii. pp. arm-344.
`V'Ijay Kumar. A Conctu'rcut'y Control Mechanism Based on Extend-
`ible Hashing for Main Memory Database Systems. ACM. vol. 3.
`1989. pp. [09-1 13.
`Birgit Pfitzman. Sorting Out Signature Schemes. Nov. 1993. 1" Conf.
`Computer S: Comm. Securityr ’93. p. 74-85.
`7.hiyu Tian et al.. A New Hashing Function: Statistical Behaviour and
`Algorithm. Spring 1993. pp. 3—13.
`
`G.L. Friedman. Digital Camera with Apparatus for Authentication of
`Images Produced from an Image File. NASA Case No. NPO-I9108-
`I-CU. U S Appl No 08/159980. Nov 24. 1993.
`H. Goodman. Ada. Object—Oriented Techniques. and Concurrency in
`Teaching Data Structures and File Management Report Documenta—
`tion p. AD-A275 385-94-04277.
`Advances in Cryptology-EUROCRYPT '93. Workshop on the
`Theory and Application of Cryptographic Techniques Lofihus. Nor—
`way. May 23—27. 1993. Proceedings.
`Proceedings on the 1993 ACM SIGMOD International Conference
`on Management 01' Data vol. 22. Issue 2. Jun. 1993
`Advances of Cryptology-AUSC RYP’I'
`’927Workshop on the
`Theory and Application of Cryptographic Techniques Gold Coast.
`Queensland. Australia. Dec. 13-16. 1992 Proceedings.
`Tarj an. Robert Endre. et al.. "Storing a Sparse Table”. Communica-
`tions ofthe ACM. v01. 22. No. 11. Nov. 1979. pp. 606-611.
`Wegman. Mark et al.. "New Hash Functions and Their Use in Authen-
`tieation and Set Equality”. Journal of Computer and System Sci-
`ences. vol 22. Jun 1981. pp. 265-279.
`Vitter. Jeffrey Scott et al.. “Optimal Prefetching via Data Compres-
`sion”. In Proceedings of 32nd IEEE Symposium on Fundations of
`Computer Science. Nov. 1991. p 121-130.
`Friedman. Michael et al.. “Storing a Sparse Table with 0(1) Worst
`Case Access Time”. Journal of the Association for Computing
`Machinery. v01. 31. No. 3. Jul. 1984. pp. 538544.
`Yao. Andrew Chi —Chih. “Should Tables be Sorted?". Journal of the
`Association for Computing Machinery. vol. 28.510. 3. Jul. 1981. pp.
`615-628.
`Floyd. Sally et al.. “A Reliable Multicast Framework for Light-
`Weighl Sessions and Application Level Framing”. In Proceedings of
`ACM SIGCOMM ’95. pp 342-356
`Feeley. Michael. et al.. “Implementing Global Memory Management
`in a Workstation Cluster”. In Proceedings of the 15111 ACM Sympo-
`sitlm on Operating Systems Principles. 1995. pp. 201-212.
`Carter. J Lawrence. et al.. “Universal Classes of Hash Functions”.
`Journal ofComputer and System Sciences. vol. 18. No. 2. Apr, 1979.
`pp. 143-154.
`Patent Abstracts ofJapan. “Electronic Mail Multiplexing System and
`Communication Control Method in the System”. Jtrn. 30. 1993. JP
`05162529.
`Kim et al.. “Experiences widt Tripwire: Using Integrity Checkers for
`Intrusion Detection”. COAST Labs. Dept. of Computer Sciences
`Pttrdtte University. Feb. 22. 1995. pp. 1-12.
`Kim et al.. “The Design and Implementation of Tripwire: A File
`System Integrity Checker”. COAST Labs. Dept. 01‘ Computer Sci-
`ences Purdue University. Nov. 19. 1993. pp. 1—21.
`Peter Deutsch (peterd@bunyip.com). "Re: MD5 and LIFNs (was:
`Misc Comments)”. wvtwacllanl.gov/UIU/archive/uri-94q2.mes-
`sages/0106.11tm1. Apr. 26. 1994
`Alexander Dupuy (dupuy@smarts.com). “RE: MD5 and LIFNs
`(was: Misc Comments)”. wwwacl Ianl.gov/URI/archive/uri-94q2.
`messages/OI I3.htm1. Apr. 26. 1994.
`Alexander Dupuy (dupuy@sma.rts com). “MD5 and LIFNs (was:
`Misc Comments)”. wwwacllanl gov/URI/archive/uri-94q2.mes-
`sages/OOSIhlmI. Apr. 17. 1994
`Albert Langer
`(cmeSlQiganu 02 all). http://groups googlc com/
`groups?selm:199IAug7.225159.7869040newshoslanu.edu.au&
`oe=UTF-8&outpul=gplain. Aug. 7. 1991.
`Clifford Lynch ('Calur@uccmvsa.bitnet). “ietfurlluri overview drafl
`paper Gong)”. wwwacl lanl.gov/IIRI/archive/uri-93ql.messages/
`0015.html. Mar. 25. 1993.
`K Sollins and L Masinter. “Functional Requirements for Uniform
`Resource Names”. www.w3.org/Addressing/rfc l 737.txt. Dec 1994.
`pp. 1-7.
`W3C:ID. HTTP: A protocol for networked information. “Basic
`HTTP as defined in 1992”. vtwwnwlorgi’Protocols/HTTPthml.
`1992.
`Defendant Lime Wire. LLC's Answer. Affirmative Defenses and
`Counterclairns dated Nov. 15. 2007. from Civil Action No. 07-06 161
`VBF (PLAX)
`
`EXHIBIT 5 - 5
`
`
`
`Case 5:18-cv-03462-BLF Document 31-5 Filed 10/04/18 Page 7 of 71
`Case 5:18-cv-03462-BLF Document 31-5 Filed 10/04/18 Page 7 of 71
`
`US 8,099,420 B2
`Page 6
`
`Kim. Gene H . and Spafford. Eugene H . “Writing. Supporting, and
`Evaluating Tripwire: A Publicly Available Secrrrity Tool." COAST
`Labs. Dept. ofComputcr Sciences Purdrre University. Mar 12. 1994.
`pp. 1-23.
`US Appl No I 1/9806797May 6. 2009 PTO Office Action.
`USPTO. Non—Final Office action mailed Jun. 15. 2009 in US. App].
`No. 11/980687.
`USPTO. Non—Final Office action mailed Jun 18. 2009 in Reexam
`U.S. Appl. No. 90’010.260.
`Communication from EPO in Europezm Application No. 96 910
`762.2—1225 dated May 8. 2009 [4 pgs.].
`McGregor D. R. and Mariani. J .A “Fingerprinting—Atechnique for
`file identification and maintenance.” Softhue: Practice and Experi-
`ence. vol. 12. No.12.Dec. 1982. pp. 1165-1166.
`[Proposed] Order Regarding Construction of Terms. filed Mar. 29.
`2007 in CD Ca1.case No. CV 06-5086 SJO (Ex) [9 pgs.].
`Analysis of Plaintiffs’ Claim Chart for the ’280 Patent As Against
`Defendant Media Sentry, Inc 11 pages.
`Analysis of Plaintiffs’ Claim Chart for the ’791 Patent As Against
`Defendant Media Sentry. Inc (11916.001 0150 :1) pp. 1-48
`Analysis of Plaintiffs’ Claim Chart for the ’791 Patent As Against
`Defendant Overpeer pp. 1-40.
`Barbara, D.. et a1.. “Exploiting symmetries for low-cost comparison
`of file copies.” 8th Int’l Conf. on Distributed Computing Systems.
`Jun. 1988. pp. 471-479. San Jose. CA
`(Tarrrpbell. M.. “The Design of Text Signatures for Test Retrieval
`Systems.” Tech. Report. Sep. 5. 1994. Deakin University. School of
`Computing 8: Math.. Geelong. Australia.
`Chang. W. W. et al.. “A signature access method for the Starburst
`database system.” in Proc