`Case 5:18—md-02834-BLF Document 217-4 Filed 10/04/18 Page 1 of 71
`
`EXH|B|T4
`
`
`
`Case 5:18-md-02834-BLF Document 217-4 Filed 10/04/18 Page 2 of 71
`Case 5:18-md-02834—BLF Document 217-4 Filed 10/04/18 Page 2 of 71
`
`||||||||||||||||||||||||||||||lll||||l||||l|||||||||||l|||||||l||||||||||||
`
`USOO8099420B2
`
`(12) United States Patent
`US 8,099,420 B2
`(10) Patent No.:
`Farber et al.
`(45) Date of Patent:
`*Jan. 17, 2012
`
`(54)
`
`(75)
`
`ACCESSING DATA IN A DATA PROCESSING
`SYSTEM
`
`Inventors: David A. Farher, Ojai, CA (US);
`Ronald D. Lachman, Northbrook, IL
`(US)
`
`(73)
`
`Assignees:
`
`PersonalWeb Technologies, LLC. Tyler,
`TX (US); Level 3 Communications,
`LLC, Broomfield, C0 (US)
`
`(1‘)
`
`Notice:
`
`Subject to any disclaimer, the term ofthis
`patent is extended or adjusted under 35
`U.S.C. 154(b) by 1312 days.
`
`This patent is subject to a terminal dis-
`claimer.
`
`EP
`
`(56)
`
`References Cited
`
`U.S. PATENT DOCUMENTS
`
`3,668,647 A
`3,835,260 A
`4,096,568 A
`4,215,402 A
`4,221,003 A
`4,290,105 A
`4,376,299 A
`4,405,829 A
`4,412,285 A
`
`6/1972 Evangelisti
`9/1974 Prescher et a1
`6/1978 Bennett et :11.
`7/1980 Mitchell
`9/1980 Chang Ct :11.
`9/1981 Cichelli
`3/1983 Rivest
`9/1983 Rivesl
`10/1983 Neches
`
`(Continued)
`
`FOREIGN PATENT DOCUMENTS
`0 268 069 A2
`5/1988
`
`(Continued)
`
`OTHER PUBLICATIONS
`
`App1.No.: 11/017,650
`
`Filcd:
`
`Dec. 22, 2004
`
`Prior Publication Data
`
`US 2005/0114296 A1
`
`May 26, 2005
`
`Affidavit of Timothy P. Walker in Support of CWIS’ Opening Mark—
`man Brief Construing the Terms at
`Issue in U.S. Patent No.
`6,4l5,280, dated Jul 25, 2003, from Civil Action No. 02-11430
`RWZ.
`
`(21)
`
`(22)
`
`(65)
`
`(60)
`
`Related U.S. Application Data
`
`(Continued)
`
`Continuation of application No. 09/987,723. filed on
`Nov. 15, 2001, now Pat. No. 6,928,442, which is a
`continuation of application No. 09/283,160, filed on
`Apr. 1, 1999, now Pat. No. 6,415,280, which is a
`division of application No. 08/960,079, filed on Oct.
`24, 1997, now Pat. No. 5,978,791, which is a
`continuation of application No. 08/425,160, filed on
`Apr. 11, 1995. now abandoned.
`
`(51)
`
`(52)
`(58)
`
`Int. Cl.
`(2006.01)
`G06F 17/30
`707/758: 707/781; 707/821
`U.S. Cl.
`Field of Classification Search .................. 707/758,
`707/781, 821
`See application file for complete search history.
`
`Primary Examiner 7 Khanh B Pham
`(74) Aflorney. Agent.
`or Firm — Davidson
`Jackson & Gowdey, LLP; Brian Siritzlql
`
`Berquist
`
`ABSTRACT
`(57)
`Access to data items uses names based on the data in the data
`items; the name ol‘a data item may be based, at least in part,
`on a function of some or all of the bits that comprise the data
`item. A data item may comprise an arbitrary sequence of bits.
`The function may include a hash fimction or a message digest
`function. The name of a data item may be compared to a list
`of names of other data items.
`
`178 Claims, 31 Drawing Sheets
`
`SIMPlE
`
`DA TA ITEM
`
`8212
`COMPUTE MD FUNCTION ON
`DATA ITEM
`
`DATA ITEM
`
`3214
`APPEND LENGTH MODULO 32 OF
`
`TRUE NAME
`
`1
`
`EXHIBIT 4 - 1
`
`
`
`Case 5:18-md-02834-BLF Document 217-4 Filed 10/04/18 Page 3 of 71
`Case 5:18—md-02834-BLF
`Document 217-4 Filed 10/04/18 Page 3 of 71
`
`US 8,099,420 B2
`
`PageZ
`
`4.414.624
`4.441.155
`4.464.713
`4.490.782
`4.558.413
`4.571.700
`4.577.293
`4.642.764
`4.642.793
`4.658.093
`4.675.810
`4.691.299
`4.725.945
`4.773.039
`4.821.184
`4.887.235
`4.888.681
`4.914.571
`4.914.586
`4.922.414
`4.922.417
`4.937.863
`4.949.302
`4.953.209
`4.972.367
`5.014.192
`5.025.421
`5.032.979
`5.047.918
`5.050.074
`5.050.212
`5.057.837
`5.077.658
`5.084.815
`5.117.351
`5.129.081
`5.129.082
`5.144.667
`5.163.147
`5.179.680
`5.182.799
`5.199.073
`5.202.982
`5.204.897
`5.204.958
`5.204.966
`5.208.858
`5.222.134
`5.230.051
`5.239.648
`5.241.671
`5.247.620
`5.260.999
`5.276.869
`5.276.901
`5.287.499
`5.287.514
`5.297.279
`5.301.286
`5.3013 16
`5.317.693
`5.321.841
`5.339.403
`5.341.477
`5.343.527
`5.347.653
`5.351.302
`5.357.440
`5.357.623
`5.357.630
`5.359.523
`5.361.356
`5.371.897
`5.375.206
`5.384.565
`5.394.555
`5.403.639
`5.404.508
`
`U.S. PATENT DOCUMENTS
`A
`11/1983 Smmnenlr.
`A
`4’1984 Fletcher
`A
`8/1984 Benhase
`A
`12/1984 Dixon
`A
`12/1985 Schmidt e181.
`A
`2/1986 Emry. Jr.
`A
`3/1986 Matick
`A
`2/1987 Auslande1
`A
`21987 Meaden
`A
`4/1987 Hellman
`A
`6/1987 Gruner
`A
`9/1987 Rivest
`A
`2/1988 Kronstadl
`A
`9/1988 Zamora
`A
`4/1989 Clancyel :11.
`A
`12/1989 Holloway
`A
`12/1989 Barnes
`A
`4/1990 Bamlzel :11.
`A
`4/l990 Swinehartetal.
`A
`5/1990 Holloway
`A
`5/1990 Chunn el :11.
`A
`6/1990 Robert et :11
`A
`8/1990 Arnoldet a1
`A
`8/1990 Ryder. Sr el al.
`.A
`ll/l990 Burke
`A
`5/1991 Mansfieldel 211.
`A
`6/1991 Cho
`A
`7/1991 Hecht e151.
`A
`9/1991 Schwartzetal
`A
`9/1991 Mama
`A
`9/1991 Dyson
`A
`10/1991 Colwcll
`A
`12/1991 Bendert
`A
`1/1992 Mazzario
`A
`5/1992 Miller
`A
`7/1992 Kobayashi
`A
`71992 '111'fing
`A
`9/1992 PogueJr.
`A
`11/1992 Orita
`A
`1/1993 Colwell
`A
`1/1993 Tzunuraeial.
`A
`3/1993 Scott
`A
`4/1993 Gramlich et al.
`A
`4/1993 Wyman
`A
`4/1993 Chengelal.
`A
`4/1993 Wittcnbcrgct :11
`A
`5/1993 Vollen
`A
`6/1993 1511111661111.
`A
`7/1993 Quan
`A
`8/1993 Nukui
`A
`’/1993 Reedet :11.
`A
`9/1993 Fukuzawaetal.
`A
`“/1993 Wyman
`A
`1/1994 Forrestet :11.
`A
`1/1994 Howell
`A
`2/1994 Nemes
`A
`2/1994 Gram
`A
`3/1994 Bannon e1a1.
`A
`4/1994 Rajani
`A
`4/1994 Hamilton
`A
`5/1994 Cuenod elal.
`A
`6/1994 East et :11.
`A
`8/1994 Parker
`A
`8/1994 Pitkin cl :11.
`A
`8/1994 M00“
`A
`9/1994 Flynn el :11.
`A
`9/1994 leighton e1 :11.
`A
`[0/1994 Talbott etal
`A
`10/1994 Megory-Cohen
`A
`10/1994 Oprescuel :11.
`A
`10/1994 Talbott cl :11
`A
`11/1994 Clmkelal.
`A
`12/1994 Brown etal
`A
`12/1994 Hunteretnl.
`A
`1,11995 Cannon
`A
`2/1995 Hunter 61:11.
`A
`4/1995 Belsun 81:11.
`A
`41/1995 Konrad
`
`..
`
`..
`
`707/1
`
`................. 707/2
`
`707/2
`
`.
`
`.. 709/226
`
`>>>>>>>>>>>>>>>>>>>>3>>>>11>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>
`
`5.4.???“
`2229162;
`51448718
`{452‘447
`5‘454‘000
`5:454‘039
`5459860
`5.465.365
`754671471
`514751826
`9479654
`54911817
`5‘499‘294
`5,504,879
`5.5205757
`55975585
`5542087
`5.9485724
`5253.143
`9568.181
`5581615
`5281759
`5581764
`(.8359.
`5588147
`51596744
`56001814
`5604803
`56041892
`5630067
`56325031
`56385443
`5640564
`5649196
`5677952
`56785038
`51678046
`5‘694‘472
`56941596
`5701316
`’5‘710‘922
`5‘724'425
`5’724’552
`5742807
`5.7455879
`$757513
`2'7’57'915
`5781629
`5802291
`{809,494
`{825049
`51835087
`518641683
`5907619
`‘5‘907'704
`{9401504
`5978791
`5991414
`60065018
`6‘134‘603
`61135646
`61415280
`6732180
`68161872
`6.928.442
`2002/0052884
`7002/0082999
`2003/0078888
`7003/0078889
`9003/0095660
`$004,0139097
`;
`_’,
`AND/0010792
`30059114395
`2007/0135843
`2008/0065635
`2003/0066191
`2003/0071855
`200870082551
`
`8/ 1995
`8/1995
`9/1995
`9/1995
`9/1995
`9/1995
`9/1995
`10/1995
`1 1/1995
`1 1/1995
`12/1995
`12/1995
`2/1996
`3/1996
`4/1996
`6/1996
`7/1996
`7/1996
`8/ 1996
`9/1996
`1011996
`12/1996
`12/1996
`12/1996
`12/1996
`12/1996
`1/1997
`2/1997
`2/1997
`2/1997
`5/1997
`5/1997
`6/1997
`6/1997
`7/1997
`10/1997
`10/1997
`10/1997
`12/1997
`12/1997
`12/1997
`1/1998
`3/1998
`3/1998
`4/1998
`4/1998
`5/1998
`5/1998
`7/1998
`9/1998
`9/1998
`10/1998
`1 1/1998
`1/1999
`5/1999
`5/1999
`8/1999
`1 1/1999
`1 1/1999
`12/1999
`10/2000
`10/2000
`7/2002
`5/2004
`11/2004
`3/2005
`5/2002
`6/2002
`4/2003
`4/2003
`5/2003
`7/2004
`1/2005
`5/2005
`3/2007
`3/2008
`3/2008
`3/2008
`3/2008
`
`.
`
`707/205
`
`.. ..
`
`707/10
`
`.
`
`..
`
`.. 725/92
`
`709/219
`
`Wyman
`C1110 et :11.
`Pe1elson el :11.
`Cohn el :11.
`Nelson cl :1].
`Dorfman
`Coppersmith el :11.
`Burnett
`W'intcrbottom
`Bader
`Fischer
`Squibb
`Gopal e1 :11.
`F1ied.ma.n
`Fisenberg e1 :11.
`Krawczyk
`Blickensmff e1 :11.
`Neimat e1 .11.
`Akizawa et a1
`Ross et :11.
`Greenwood el :11.
`Stern
`Burnett
`Fitzgerald e1 :11.
`Gardner cl :11
`Neeman e1 :11.
`D110 e1 :11.
`Howard
`Aziz
`Nurlall el al.
`Kindcll ct :11.
`Velissaropoulos e1 :11.
`Stefik et :11
`..
`Hamilton e1 :11
`Woodhill el :11.
`Bl:1.kley. 111 et :11.
`Dockler e1 :11.
`Cahill e1 :11
`Johnson et :11
`Campbell
`Alfcrncss or £11
`Alley el al.
`Chang e1 :11.
`Taoda
`Masinter
`Wyrmm
`BellaIe e1 :11.
`Aucsmith e1 :11.
`Haber .
`.......
`Balick e1 :11.
`..
`Nguyen ...........
`Ogata or :11.
`Men . ........................... 346/810
`Boeben e1 :11.
`Davis
`Gudmundson Ct :11.
`Griswold
`Faber el :11.
`Garay e1 :11.
`Burnett e1 :1].
`Jones et :11.
`Kahn et :11.
`Farbcr at al.
`Hale et al.
`Squibb
`Farber e1 :11.
`Farber e1 :11.
`Lee et :11.
`Lee et :11.
`Lee et :11.
`Lee et :11.
`Faxber e1 :11.
`Carpentier e1 :11.
`Farber e1 :11.
`Fmber e1 :11.
`Huber et :11.
`Fm‘bcr ct :11
`Farber e1 :11
`Farbcr cl :11
`
`705/54
`. 709/303
`
`.
`
`713/177
`
`. 709/202
`.......... 707/1
`
`395/200 49
`709/330
`
`EXHIBIT 4 - 2
`
`
`
`Case 5:18-md-02834-BLF Document 217-4 Filed 10/04/18 Page 4 of 71
`Case 5:18—md-02834-BLF Document 217-4 Filed 10/04/18 Page 4 of 71
`
`US 8,099,420 B2
`Page 3
`
`EP
`EP
`EP
`EP
`EP
`EP
`EP
`GB
`JP
`JP
`JP
`JP
`JP
`JP
`JP
`W0
`W0
`W0
`W0
`W0
`
`FOREIGN PATENT DOCUMENTS
`0315425
`5/1989
`0 558 945 A2
`9/1993
`0 566 967 A2
`10/1993
`0592045
`4/1994
`0631 226 A1
`12/1994
`0 654 920 A2
`5/1995
`0 658 022 A2
`6/1995
`2294132 A
`4/1996
`59058564
`4/1984
`63-106048
`5/1988
`63-273961
`11'1988
`2-127755
`5/1990
`05162529
`6/1993
`06187384 A2
`7/1994
`06348558 A
`12/1994
`WO 92/20021
`11/1992
`WO 94/06087
`3/1994
`WO 94/20913
`9/1994
`WO 95/01599
`l/I995
`W0 97/43717
`11/1997
`
`OTHER PUBLICATIONS
`
`Akamai and MIT's Memorandum in Support of Their Claim Con-
`struction of L'SPAT 5.978.791. dated Aug. 31. 2001. from Civil
`Action No. 00-cv-11851RWZ.
`Akamai’s Answer. Affirmative Defenses and Counterclaims to
`Amended Complaint. filed Dec. 6. 2002. in Civil Action No. 02-CV—
`1 1430RWZ.
`Akamai’s Brief on Claim Construction. dated Aug. 8. 2003. from
`Civil Action No 02-11430 RWZ
`Answer ofDefendant RIAA to First Amended Complaint and Coun-
`tcrclaim. dated Feb. 8. 2005. from Civil Action No. CV04-7456 JFW
`(CTx).
`Berners-Lee. T. et al.. “Hypertext Transfer Protocol—HTTPF'IO.”
`May 1996. pp. 1-54.
`Berners-Lee. T. “Universal Resource Identifiers in W'WW.” Jun.
`1994.pp.1-25.
`Bowman. C. Mic. et al.. “Harvest: A Scalable. Customizablc Discov-
`ery and Access System.” Aug. 4. 1994. pp. 1-27.
`Bowman. C. Mic. et al.. “Harvest: A Scalable. Customizable Discov-
`ery and Access System." Mar 12. 1995. pp 1-29.
`Brisco. T.. “DNS Support for Load Balancing.”Apr. 1995. pp. 1-7.
`Browne. Shirley et al.. "Location-Independent Naming for Virtual
`Distributed Software Repositories.” 1995. 7 pages.
`Browne. Shirley et al.. “Location-Independent Naming for Virtual
`Distributed Software Repositories.” 1995. printed from http:/www.
`netlib.org/utk/papcrs/lifn/main html on Mar 22. 2006. 18 pages
`Civil Minutes General dated Jan. 25. 2005. from Civil Action No. CV
`04-7456-JFW (CTX).
`Complaint for Patent Infringement. Permanent Injunction. and Darn-
`ages. dated Sep. 8. 2004. from Civil Action No. CV 04-7456 JFW
`(AJWx).
`CWIS' Opening Markman Brief Constnring the Terms at Issue in
`US. Patent No. 6.415.280. dated Jul. 25. 2003. from Civil Action No.
`02-11430 RWZ.
`CWIS' Reply Markman Brief Constnring the Terms at Issue in US.
`Patent No. 6.415.280. dated Aug. 15. 2003. from Civil Action No.
`02-11430 RWZ.
`Davis. James R.. “A Server for a Distributed Digital Technical Report
`Library.” Jan. 15. 1994. pp. 1-8.
`Declaration ofRobert B.K. Dewar in Support ofCWIS’ Construction
`of the Terms at Issue in U S Patent No 6.415.280. dated Jul. 25.
`2003. from Civil Action No. 02-cv-11430RWZ.
`Defendant Digital Island’s Opening Brief on Claim Construction
`Issues dated Aug 17. 200i. from Civil Action No 00-cv-l 1851-
`RWZ.
`Defendant Media Sentry. Inc ’s Reply Memorandum of Points and
`Authorities in Further Support of Its Motion to Dismiss. dated Nov.
`15. 2004. from Civil Action No. CV04—7456 JFW (CTx).
`Defendant MediaSentry Inc. ’3 Notice of Motion and Motion to Dis-
`miss First Amended Complaint; Mcrnorandum of Points and
`Authorities in Support Thereof. dated Dec. 13. 2004. from Civil
`Action No CV04-7456 JFW _
`
`Defendant MediaSentry. Inc.’s Answer to Plaintiffs’ First Amended
`Complaint and Counter'claims. dated Feb. 8. 2005. from Civil Action
`No. CV04-7456 JFW (CTX).
`Defendant RIAA’s Notice of Motion and Motion to Dismiss First
`Amended Complaint; Memorandum of Points and Authorities in
`Support Thereof. dated Dec. 13.2004. from Civil Action No. CV04-
`7456 JFW (CTX)
`Defendants Loudeye Corp.’s and Overpeer. Inc.’s Answer to Plain—
`tiffs” First Amended Complaint and Counterclaim. dated Feb. 8.
`2005. from Civil Action No. 04-74 56 JFW (AJWX)
`Defendants‘ Preliminary InvalidityContentions dated Dec. 14. 2006.
`from Civil Action No. CV 06-5086 SJO (Ex).
`European Search Report
`issued Dec. 23. 2004 in correpsonding
`European Application No. 96910762.2-2201.
`Expert Report of Professor Ellis Horowitz. dated Mar 6. 2006. from
`Civil Action No. 04-7456 JFW (CTX).
`Expert Report ofthe Honorable Gerald J. Mossinghoif. dated Mar
`13. 2006. from Civil Action No. 04-7456 JFW (CTx).
`Faltstrom. P. el al.. “How to Interact with a Whois++ Mesh.” Feb.
`1996. pp. 1-9.
`Fielding. R et al.. “Hypertext Transfer ProtocoliHTTP/l . 1.” Jan.
`1997. pp. 1-163.
`Fielding. R. et al.. “Hypertext Transfer Protocol—IITTPMJ." Jun.
`1999. pp. 1-157.
`Infringement. Permanent
`for Patent
`First Amended Complaint
`Injunction and Damages. dated Nov. 24. 2004. from Civil Action No.
`CV 04-7456 JFW ('CTx).
`International Search Report dated Jun 24. 1996 in corresponding
`international application PC'1'/US1996/004733.
`Khare. R. and Lawrence. S.. “Upgrading to TLS Within HTTP/1 1.”
`May 2000. pp. [-12
`Kim et al. “The Design and Implementation of Tripwire: A file
`System Integrity Checker”. COAST Labs Dept. of Computer Sci-
`ences Purdue University. Feb 23. 1995. pp 1—18
`Knuth. Donald E.. “The Art ofComputer Programming.” 1973. vol.
`3. Ch. 6.4. pp. 506-549.
`Memorandum of Points and Authorities in Support ofLoudeye’s and
`Overpeer’s Motion to Dismiss the First Amended Complaint for
`Failure to State a Clairn or. in the Alternative. for a More Definitive
`Statement. dated Dec 13. 2004. from Civil Action No. CV-04-7456
`JFW (AJWX).
`Moats. R.. “URN Syntax.” May 1997. pp. 1-8
`Myers. J and Rose. M. “The Content-MD5 Header Field." Oct.
`1995. pp. 1-4.
`Ofi‘ice Action in corresponding Japanese Application No. 531.073/
`1996 mailed on Apr. 25. 2006.
`Office Communication in corresponding Eiu‘opetm Application No.
`96910762.2-1225 dated Jan. 17. 2007.
`Order Re Claim Construction dated Nov. 8. 2001. from Civil Action
`No. 00—11851-RWZ.
`Patent Abstracts of Japan. "Device for Generating Database and
`Method for the Same." Application No 03-080504. Sun Microsyst.
`Inc.. published Jun. 1993. 38 pages
`Patent Abstracts of Japan. “Method for Registering and Retrieving
`Data Base.” Application No 03-187303. Nippon Telegr. & Teleph.
`Corp.. published Feb. 1993. 11 pages
`Plaintiffs’ Memorandum of Points and Authorities in Opposition to
`Loudcye Dcfcndants’ Motion to Dismiss. dated Nov. 8. 2004. from
`Civil Action No. CV—04—7456 JFW (AJWX).
`Plaintiffs’ Opposition to Media Sentry’s Motion to Di smiss; Memo-
`randum of Points and Authorities in Support Thereof. dated Nov 8.
`2004. from Civil Action No. CV 04—7456 JFW (CTx)
`Plaintifl‘s Opposition to Recording Industry Association of Ameri-
`ca‘s Motion to Dismiss; Memorandum of Points and Authorities in
`Support Thereof. dated Nov. 8. 2004. from Civil Action No. CV—04-
`7456 JFW (CTx).
`Plaintiff‘s Reply to Defendant Loudeye Corp ’5 and Overpeer. Inc’s
`Counterclaims. dated Mar. 3. 2005. from Civil Action No. CV
`04-7456 JFW (CTx).
`Plaintiff‘s Reply to Defendant McdiaSentry’s Countcrclairns. dated
`Mar. 3. 2005. frorn Civil Action No CV 04-7456 JFW (CTx)
`Plaintiff‘s Reply to Defendant RIAA’S Counterclaims. dated Mar. 3.
`2005. from Civil Action No 04-7456 JFW (CTx).
`
`EXHIBIT 4 - 3
`
`
`
`Case 5:18-md-02834-BLF Document 217-4 Filed 10/04/18 Page 5 of 71
`Case 5:18—md-02834-BLF Document 217-4 Filed 10/04/18 Page 5 of 71
`
`US 8,099,420 B2
`Page 4
`
`Reed Wade (wade@cs rrtk edu). “re: Dienst and BFD/llFN docu»
`ment.” .Aug. 8. 1994. printed from http:.’/www.webhistory.orgr’www.
`lists’www—talk1994q3/O4161nm] on Mar. 22. 2006. (7 pages).
`Rivest. R. “The MDS Message-Digest Algorithm.” Apr. 1992. pp.
`1-19 and errata sheet (1 page)
`Rose. M.. “I‘he Content—MDS Header Field.” Nov. 1993. pp. 1-3.
`Sehncier. Bnrce. "One-Way Hash Frrnctions. Using Crypographic
`Algorithms for Hashing.” 1991. printed from http://202.l79135.4.I
`datar'DDl/articles/1991/9109/'91909g/9109g.lrtrn on Mar. 22. 2006.
`Sun Microsystems. Inc .“NFS: Network File System Protocol Speci-
`fication.” Mar. 1989. pp. 1-25.
`tampering Pro-
`Vincenzetti. David and Cotrrozzi. Massimo. "Anti
`gram.” Proceedings of the Fourth [USENIX} Security Symposium.
`Santa Clara. CA. 1993.
`l
`1 pages.
`Vincenzetti. David and Cotrrozzi. Massimo. "Anti Trunpering Pro-
`gam.” Proceedings ofthe Fourth {USENIX} Security Symposium.
`Santa Clara. CA. undated. printed from http://www.ja net/CERI/
`VincenZet‘ti_and_C0troni/ATP_Anti_Tamp on Mar. 22. 2006. 8
`pages.
`Bemers-Lee. T. et al.. “Uniform Resource Locators (URL)."pp. 1-25.
`Dec. 1994
`Danzig. P.B.. et al.. "“Distributed Indexing: A Scalable Mechanism
`for Dieributed Information Retrieval?” Proceedings of the 14th
`Annual International ACM SIGIR Conferencc on Research and
`Development in Information Retrieval. pp. 220-229. Oct
`13—16.
`1991.
`Hauzeur‘. B M . “A Model for Naming. Addressing. and Routing.”
`ACM Trans Inf. Syst. 4. Oct. 4. 1986). 293-31 1.
`Khoshafian. S. N. et a1. 1986. Object identity. In Conf. Proc. on
`Object-Oriented Prograrmning Systems. Languages and Applica-
`tions (Ponland. Oregon. United States. Sep 29—Oct. 2. 1986). N.
`Meyrowitz. Ed. OOPLSA ‘86. AC M Press. New York. NY. 406-4 16
`Lantz. K. A.. et a1 .. “Towards a universal directory service.” In Proc.
`4th Annual ACM Symp. on Principles of Distribrrted Computing
`(Minaki. Ontario. Canada). PODC ’85 ACM Press. New York. NY.
`250-260.
`Leach. P. J.. et al . The file system ofan integrated local network In
`Proc. 1985 ACM 13th Annual Conf. on Comp. Sci CSC ’85. ACM
`Press. NY. NY. 309-324.
`Leach. P.J.. et a1 . “Ule as Internal Names in a Distributed File
`System." In Proc. lst ACM SIGACT—SIGOPS Symp. on Principles of
`Distributed Computing (Ottawa. Canada. Aug. 18-20. 1982). PODC
`’82. ACM Press. NewYork. NY. 34-41.
`Ma. C. 1992. On building very large naming systems. In Proc. 5th
`Workshop on ACM SIGOPS European Workshop: Models and Para-
`digms for Distributed Systems Structuring (France. Scp 21-23.
`1992). EW 5. ACM Press. New York. NY. [—5.
`Peterson. L. L. 1988. A yellow-pages service for a local-area net-
`work. In Proc. ACM Workshop on Frontiers in Computer Commu-
`nications Technology (Vermont. 1987). J.
`.1. Garcia-Luna—Aeeves.
`Ed. SIGCOMM ’87. ACM Press. New York. NY. 235-242.
`Ravindran. K. and Ramakr'ishnan. K K. 1991. A naming system for
`feature-based service specification in distributed operating systems.
`SIGSMALL/PC Notes 17. 3-4 (Sep. 1991). 12-21.
`Ross. K. “Hash-Routing for Collections of Shared Web Caches."
`IEEE Network Magazine. pp. 37—44. Nov—Dec. 1997.
`Schwartz. M.. et al. 1987 Anzune service for evolvingheterogeneous
`systems. In Proc. 11th ACM Symp. on OS Principles (Texas. Nov
`8—11. 1987). SOSP ‘87. ACM Press. NY. NY. 52-62.
`Shaheen-Gouda.A. and Loucks. L 1992 Name borders In Proc. 5th
`Workshop on ACM SIGOPS European Workshop: Models and Para-
`digms for Distributed Systems Structuring (Mont Saint-Michel.
`France. Sep. 21-23. 1992). EW 5. ACM Press. NY. NY. 1-6
`Terry. D. B. 1984 An analysis ofnarning conventions for distributed
`computer systems. In Proc. ACM SIGCOMM Symp. on Corrurruni-
`cations Architectures and Protocols: Tutorials & Symp. SIGCOMM
`'84 ACM Press. NY. NY. 218-224
`Cheriton. David R. and Mann. Timothy P. “Decentralizing a global
`naming service for improved performance and fault tolerance”. AC M
`Transactions on Computer Systems. vol. 7. No. 2. May 1989. pp
`147-183.
`Request for Reexamination of US. Patent No 6.928.442: Reexanr
`Control U.S. Appl. No. 901010.260.fi1ed Aug 29. 2008
`
`Kim et al.. “Experiences with Tripwire: Using Intergrity Checkers for
`Intrusion Detection”. COAST Labs. Dept. of Computer Sciences
`Purdue University. Feb. 22. 1995. pp I-I2.
`Kim et al.. “The Design and Implementation of Tripwire: A file
`System Intergrity Checker”. COAST Labs. Dept. of Computer Sci-
`ences Purdue University. Nov. 19. 1993. pp 1-21.
`Zhiyu Tian ct al.. A New Hashing Function: Statistical Behaviour and
`Algorithm. pp. 3-13.
`G. L. Friedman. Di gitai Camera with Apparatu for Authentication of
`Images Produced from an Image File. NASA Case No NFC-19108-
`l-CU. U.S. App] No. 08/159980. filed Nov. 24. 1993.
`1-1. Goodman. Ada. Obj ect-Orierrted Techniques. and Concurrency in
`Teaching Data Structures and File Management Report Documenta-
`tion p. AD-A275 385-94-04277.
`Advances
`in Cryptology—EUROCRYPT’93: Workshop on the
`Theory and Application of Cryptographic Techniques Lofthus. Nor-
`way. May 23-27. 1993 Proceedings
`Proceedings ofthe 1993 ACM SIGMOD International Conference on
`Management of Data. vol. 22. Issrre 2. Jun. 1993.
`Advances
`in Cryptolog -AUSCRYPT ’927Workshop on the
`Theory and Application of Cryptographic Techniques Gold Coast.
`Queensland. Australia. Dec. 13-16. 1992 Proceedings.
`Witoid Litwin et al.. Linear Ilashing for Distributed Files. ACM
`SIGMOD. May 1993. pp. 327-336
`Ming-Ling Lo et al.. On Optimal Processor Allocation to Support
`Pipelined Hash Joins. ACM SIGMOD. pp. 69-78. May 1993.
`Thomas A. Berson. Differential Cryptanalysis Mod 232 with Appli-
`cations to MDS. pp. 69—31
`William Perrizo et al.. Distributed .loin Processing Performance
`Evaluation. Twenty-Seventh Hawaii International Conference on
`System Sciences. vol. II. pp. 236-244.
`Vijay Krunar. A Concurrency Control Mechanism Based on Extend-
`ibie Hashing for Main Memory Database Systems. ACM. vol. 3.
`1989. pp 109-113.
`Birgit Pfitzman. Sorting Out Signature Schemes. Nov. 1993. 1" Conf.
`Computer & Comm. Sectuity ’93. p 74-85.
`Ber1 dem Boer et al.. Collisions for-the compression function ofMD5.
`pp. 292-304.
`Sakti Prarnanik eta1..Multi-DirectoryHasing. 1993. Info. Sys.. vol.
`18. No 1. pp 63-74.
`Murlidhar Korrshik. Dynamic Hashing with Distributed Overflow
`Space: A File Organization with Good Insertion Performance. 1993.
`Info Sys . vol 18. No 5. pp. 299-317.
`Witoid Litwin et a1 . LH*-Linear Hashing for Distributed Files. HP
`Labs Tech Report No. HPL-93-21. Jun. 1993; pp. 1-22
`Yuliang Zheng ot a1 . HAVAL—A One-Way Hashing Algorithm with
`Variable Length of Output (Extended Abstract). pp. 83-105.
`Chris Charnes and Josef Pieprzky. Linear Nonequivalence versus
`Nonlinearity. Pieprzky. pp. 156-164.
`Gwertzrnan. James. et al. “The Case for Geographical Push-Cach-
`ing.” Technical Report HU TR 34-94 (excerpt). Harvard University.
`DAS. Cambridge. MA 02138. 1994. 2 pgs
`Grigni. Michelangelo. et al. “Tight Bounds on Minimum Broadcasts
`Networks.” SIAM Journal of Discrete Mathematics. vol. 4. No. 2.
`May 1991.pp. 207-222
`Devine. Robert “Design and Implementation of DDH: A Distributed
`Dynamic Hashing Algorithm.” In Proceedings of 4th International
`Confercncc on Foundations of Data Organizations and Algorithms.
`1993. pp. 101-114.
`“Multicast Routing in Datagram
`a1.
`et
`Deering. Stephen.
`Internetworks and Extended LANs” ACM Transactions on Com-
`puter Systems. vol. 8. No. 2. May 1990. pp. 85-1 10.
`Cormen. Thomas H.. et a1. Introduction to Algorithm. The MIT
`Press. Cambridge. Massachusetts. 1994. pp. 219-243. 991-993.
`Naor. Moni. et al. “The Lead. Capacity and Availability oI‘QuorLun
`Systems.” In Proceedings of the 35th IEEE Symposium on Founda-
`tions ofComputcr Science. Nov. 1994. pp. 214-225.
`Nisan. Noam. “Psuedorandom Generators for Space—Bounded Corn-
`put‘ation." In Proceedings of the Twenty-Second Annual ACM Sym-
`posium on Theory of Computing. May 1990. pp. 204—212.
`Palmer. Mark. at al. “Fido: A Cache that Learns to Fetch." In Pro-
`ceedings of the 17th International Conference on Very Lzu‘ge Data
`Bases. Sep 1991. pp 255-264.
`
`EXHIBIT 4 - 4
`
`
`
`Case 5:18-md-02834-BLF Document 217-4 Filed 10/04/18 Page 6 of 71
`Case 5:18—md-02834-BLF Document 217-4 Filed 10/04/18 Page 6 of 71
`
`US 8,099,420 BZ
`Page 5
`
`Peleg. David. et al. “The Availabiltiy onuorum Systems."1nforma-
`tion and Computation 123. 1995. 210-223.
`Rabin. Michael “Efiicient Dispersal of Information for Security.
`Load Balancing. and Fault Tolerance.” Journal of the ACM. vol. 36.
`No. 2. Apr. 1989. pp. 335-348.
`Ravi. R . "Rapid Rumor Rarnification: Approximating the Minimum
`Broadcast Time ” In Proceedings of the 35th IEEE Symposium on
`Foundation ofCornputer Science. Nov. 1994. pp 202-213
`Schmidt. Jeanette. et al. “Chernoff—Iloeffding Bounds for Applica—
`tions with Limited Independence” In Proceedings of the 4th AC S-
`SIAM Symposium on Discrete Algorithms. 1993. pp. 331-340
`Tarjart. Robert Endre. et al. “Storing a Sparse Table.” Communica-
`tions ofthe ACM. vol. 22. No 11. Nov 1979. pp 606-611
`Wegman. Mark. ct al. "New Hash Functions and Their Use in Au then-
`tication and Set Equality." Journal of Computer and System Sciences
`vol 22. .Iun 1981, pp 265-279
`Vitter. Jeffrey Scott. ct al. “Optimal Prcfetching via Data Cempres-
`sion.” In Proceedings of32nd IEFF. Symposium on Foundations of
`Computer Science. Nov 1991. pp. 121-130.
`Fredman. Michael. et a1. “Storing a Sparse Table with 0(1) Worst
`Case Access Time.” Journal of the Association for Computing
`Machinery. v01. 31. No. 3. Jul. 1984. pp. 538-544.
`Yao. Andrew Chi-Chih. "Should Tables be Sorted?" Journal of the
`Association for Computing Machinery. vol. 28. No. 3. Jul. 1981. pp.
`615-628.
`Floyd. Sally. et al. "A reliable Multicast Framework for Light-Wei ght
`Sessions and Application Level Framing.” In Proceedings of ACM
`SIGCOMM ’95. pp. 342-356.
`Feeley. Michael. et a1. “Implementing Global Memory Management
`in aWorkslation Cluster.” In Proceedings ofthe 15th ACM Sympo-
`>
`sium on Operating Systems Principles. 1995. pp. 201-212.
`Carter. J. Lawrence. et a1. “Universal Classes of Hash Functions.’
`Journal ofComputer and System Sciences. vol. 18. No. 2. Apr. 1979.
`pp. 143-154.
`Patent Abstracts ofJapan. “Electronic Mail Multiplexing System and
`Communication Control Method in The System." 06/30/19993. .IP
`05162529.
`Kim et al.. “Experiencess with ‘l'ripwire: Using Intergrity Checkers
`for Intrusion Detection”, COAST Labs. Dept of Cornpu ter Sciences
`Purdue University. Feb. 22. 1995. pp. 1—12.
`Kim et al.. “The Design and Implementation of'l‘ripwire: A file
`System Intergrity Checker”, COAST Labs. Dept. of Cornputer Sci-
`ences Purdue University. Nov. 19. 1993. pp. 1—21.
`Bert Dem Boer et al.. Collisions for the compression function of
`MD5. pp 292-304
`Sakti Pramanik eta1.. Multi-Directory Hashing. 1993. Info. Sys.. vol.
`18. No. 1. pp. 63-74
`Murlidhar Koushik. Dynamic Hashing with Distrubuted Overflow
`Space: A File Organization with Good Insertion Performance. 1993.
`Info. Sys.. vol. 18. No. 5. pp. 299-317.
`Witold Litwin et al.. LH*-Linear Hashing for Distributed Files. HP
`Labs Tech. Report No. HPL-93—21. Jun. 1993. pp. 1-22.
`Yuliang Zheng et al.. I-IAVAL-A One-Way Hashing Algorithm with
`Variable Length of Output (Extended Abstract). 1993. pp 83-105.
`Chris Charnes and Josef Pieprzky. Linear Nonequivalence versus
`Nonlinearity. Pieprzky. 1993. pp. 156-164.
`Withold Litwin ct al.. Linear Hashing for Distributed Files. ACM
`SIGMOD. May 1993. pp. 327-336.
`Ming-Ling Lo et al.. On Optimal Processor Allocation to Support
`Pipelincd Hash Joins. ACM SIGMOD. pp. 69-78. May 1993
`Thomas A. Berson. DilTerenlial Cryptanalysis Mod 232 with Appli-
`cations to MDS. pp. 69-81.
`Willizun Perrizo ct al. Distributed Join Processing Performance
`Evaluation. Twenty—Seventh Hawaii International Conference on
`System Sciences. vol. II. pp. 236—244.
`Vijay Kumar. A Concurrency Control Mechanism Based on Extend-
`ible Hashing for Main Memory Database Systems. ACM. vol. 3.
`1989. pp. 109-113
`Birgit Pfitzman. Sorting Out Signature Schemes. Nov. 1993. I" Conf.
`Computer & Comm. Security ‘93. p. 74-85.
`Zhiyu Tian et a1..A New Hashing Function: Statistical Behaviour and
`Algorithm. Spring 1993. pp. 3-13.
`
`G L. Friedman. Digital Camera with Apparatus for Authent ication of
`Images Produced from an Image File. NASA Case No NFC-19108-
`I-CU. U.S. Appl._\Io. 08/159980. Nov. 24, 1993.
`H. Goodman. Ada. Object-Oriented Techniques. and Concurrency in
`Teaching Data Structures and File Management Report Documenta-
`tion p. AD-A275 385-94-04277.
`Advances in Cryptology-EUROCRYPT ’)3. Workshop on the
`Theory and Application of Cryptographic Techniques Lofthus. Nor-
`way. May 23-27. 1993. Proceedings.
`Proceedings on the 1993 ACM SIGMOD International Conference
`on Management of Data. vol. 22. Issue 2. Jun. 1993
`Advances of Cryptology-AUSC RYPT ’92—Workshop on the
`Theory and Application of Cryptographic Techniques Gold Coast.
`Queensland. Australia. Dec. 13-16. 1992 Proceedings.
`Tarjan. Robert Endre. et al.. “Storing a Sparse Table". Communica-
`tions ofthc ACM. v01. 22. No. 11. Nov. 1979. pp. 606-611.
`chman. Mark ct a1 .“Ncw Ha sh Functions and Their Use in Authen-
`tication and Set Equality”. Journal of Computer and System Sci-
`ences. vol 22. Jun 1981. pp. 265-279.
`Virter. Jeffrey Scott et al.. “Optimal Prefetching via Data Compres-
`sion”. In Proceedings of 32nd [EFF Symposium on Fundations of
`Computer Science. Nov. 1991. p. 121-130.
`Friedman. Michael et al.. “Storing a Sparse Table with 0(1) Worst
`Case Access Time”. Journal of the Association for Computing
`Machinery. vol. 31. No. 3. Jul. 1984. pp. 538—544.
`Yao. Andrew Chi-Chih. “Should Tables be Sorted?”. Journal of the
`Association for Computing Machinery. vol 28. No 3. Jul 1981. pp.
`615-628
`Floyd. Sally et al.. “A Reliable Multicast Framework for Light-
`Weight Sessions and Application Level Framing”. In Proceedings of
`ACM SIGCOMM ’95. pp. 342-356.
`Feeley. Michael. et al.. “Implementing Global Memory Management
`in a Workstation Cluster”. In Proceedings of the 15th ACM Sympo-
`sium on Operating Systems Principles. 1995. pp. 201-212.
`Carter. J. Lawrence. et al.. “Universal Classes of flash Functions”.
`Joru'nal ofComputer and System Sciences. vol. 18. No. 2. Apr. 1979.
`pp. 143—154.
`Patent Abstracts ofJapan. “Electronic Mail Multiplexing System and
`Communication Control Method in the System". Jun 30. 1993. JP
`05162529.
`Kim et al.. “Experiences with Tripwire: Using Integrity Checkers for
`Intrusion Detection”. COAST Labs. Dept. of Computer Sciences
`Purdue University. Feb. 22. 1995. pp. 1-12.
`Kim el al.. “The Design and Implementation of Tripwire: A File
`System Integrity Checker”. COAS'I Labs. Dept. of Computer Sci-
`ences Purdue University. Nov. 19. 1993. pp. 1-21.
`Peter Deutsch (peterd@bunyip.com). “Re: MDS and LIFNs (was:
`Misc Comments)”. www ae1.1anl gov/URI/archive/uri-94q2.mes-
`sages/0106htm1. Apr. 26. 1994
`Alexander Dupuy (’dupuy@smarts com). “RE: MDS and LIFNs
`(was: Misc Comments)". www acl.lanl.gov/URI/archive/uri-94q2.
`messages/0113 htrnl. Apr. 26. 1994
`Alexander Dupuy (:dupuy@smar1s.com). “MD5 and LIFNs (was:
`Misc Comments)”. uwwnelJanl gov/I IRI/archive/‘uri -94q2.mes-
`sages/OOSIhtml. Apr. 17. 1994.
`Albert Langer
`(cmf851 a 1nu.oz.au). http://groups.google.com/
`groups?selm=199IAug7 225159.786%40newshost.anu.edu.au&
`oe=UTF-8&output=gplain. Aug. 7. 1991.
`Clifford Lynch (Calur@uccmvsa.bitnet). “ietf url/uri overview draft
`paper Gong)”. www.acl.lanl.gov/UlU/archive/uri-93q1.messages/
`0015.htm1, Mar. 25. 1993.
`K. Sollins and L. Masinter. “Functional Requirements for Uniform
`Resource Names”. www.w3.org/Addressing.’rfc1737.txt. Dec. 1994.
`pp. 1-7
`W3C:ID, HTTP: A protocol for networked information. “Basic
`HTTP as defined in 1992”. www.w3.org/Protocols/HTTP2.htm1.
`1992
`Defendant Lime Wire. LLC’s Answer. Affirmative Defenses and
`Counterclaims dated Nov. 15. 2007. from Civil Action No. 07-06161
`VBF (PLAx)
`
`EXHIBIT 4 - 5
`
`
`
`Case 5:18-md-02834-BLF Document 217-4 Filed 10/04/18 Page 7 of 71
`Case 5:18-md-02834-BLF Document 217-4 Filed 10/04/18 Page 7 of 71
`
`US 8,099,420 B2
`Page 6
`
`Kim. Gene H.. and Spafford. Eugene H . “Writing. Supporting. and
`Evaluating Tripwire: A Publicly Available Security Tool." COAST
`Labs. Dept. of Computer Sciences Purdue University. Mar. 12. 1994.
`pp. 1-23.
`U.S. Appl. No. 11/980.679—May 6. 2009 PTO Ollice Action.
`USP'I'O.Non-Fina10ffice action mailed Jun. 15. 2009 in US. Appl.
`No. 11/980687.
`USPTO. Non-Final Office action mailed Jun 18. 2009 in Reexam
`U.S. Appl No. 90/010260.
`Communication from EPO in European Application No. 96 910
`7622-1225 dated May 8. 2009 [4 pgs].
`MeGregor D R and Mariani. J A. “FingerprintingiA technique for
`file identification and maintenance." Sofiware: Practice and Experi-
`ence. vol 12. No 12. Dec 1982. pp. 1165-1166
`[Proposed] Order Regarding Construction of Terms. filed Mar. 29.
`2007 in C D Cal. case No CV 06-5086 $10 (Ex) [9 pgs]
`Analysis of Plaintiffs’ Claim Chart for the '280 Patent As Against
`Defendant Media Sentry. Inc.
`I
`| pages.
`Analysis of Plaintiffs’ Claim Chart for the ’791 Patent As Against
`Defendant Media Sentry. Inc. (:1 1916.0010150 a) pp 1-48
`Analysis of Plaintiffs' Claim Chan for the '791 Patent As Against
`Defendant Overpeer pp. 1-40.
`Barbzu a. D.. ct al.. “Exploiting symmetries for low-cost comparison
`of file copies.” 8th Int’l Conf on Distributed Computing Systems.
`Jun. 1988. pp. 471-479. San Jose. CA.
`Campbell. M.. “The Design of Text Signatures for Text Retrieval
`Systems.” Tech. Report. Se