throbber
Case 5:18-md-02834-BLF Document 217-4 Filed 10/04/18 Page 1 of 71
`Case 5:18—md-02834-BLF Document 217-4 Filed 10/04/18 Page 1 of 71
`
`EXH|B|T4
`
`

`

`Case 5:18-md-02834-BLF Document 217-4 Filed 10/04/18 Page 2 of 71
`Case 5:18-md-02834—BLF Document 217-4 Filed 10/04/18 Page 2 of 71
`
`||||||||||||||||||||||||||||||lll||||l||||l|||||||||||l|||||||l||||||||||||
`
`USOO8099420B2
`
`(12) United States Patent
`US 8,099,420 B2
`(10) Patent No.:
`Farber et al.
`(45) Date of Patent:
`*Jan. 17, 2012
`
`(54)
`
`(75)
`
`ACCESSING DATA IN A DATA PROCESSING
`SYSTEM
`
`Inventors: David A. Farher, Ojai, CA (US);
`Ronald D. Lachman, Northbrook, IL
`(US)
`
`(73)
`
`Assignees:
`
`PersonalWeb Technologies, LLC. Tyler,
`TX (US); Level 3 Communications,
`LLC, Broomfield, C0 (US)
`
`(1‘)
`
`Notice:
`
`Subject to any disclaimer, the term ofthis
`patent is extended or adjusted under 35
`U.S.C. 154(b) by 1312 days.
`
`This patent is subject to a terminal dis-
`claimer.
`
`EP
`
`(56)
`
`References Cited
`
`U.S. PATENT DOCUMENTS
`
`3,668,647 A
`3,835,260 A
`4,096,568 A
`4,215,402 A
`4,221,003 A
`4,290,105 A
`4,376,299 A
`4,405,829 A
`4,412,285 A
`
`6/1972 Evangelisti
`9/1974 Prescher et a1
`6/1978 Bennett et :11.
`7/1980 Mitchell
`9/1980 Chang Ct :11.
`9/1981 Cichelli
`3/1983 Rivest
`9/1983 Rivesl
`10/1983 Neches
`
`(Continued)
`
`FOREIGN PATENT DOCUMENTS
`0 268 069 A2
`5/1988
`
`(Continued)
`
`OTHER PUBLICATIONS
`
`App1.No.: 11/017,650
`
`Filcd:
`
`Dec. 22, 2004
`
`Prior Publication Data
`
`US 2005/0114296 A1
`
`May 26, 2005
`
`Affidavit of Timothy P. Walker in Support of CWIS’ Opening Mark—
`man Brief Construing the Terms at
`Issue in U.S. Patent No.
`6,4l5,280, dated Jul 25, 2003, from Civil Action No. 02-11430
`RWZ.
`
`(21)
`
`(22)
`
`(65)
`
`(60)
`
`Related U.S. Application Data
`
`(Continued)
`
`Continuation of application No. 09/987,723. filed on
`Nov. 15, 2001, now Pat. No. 6,928,442, which is a
`continuation of application No. 09/283,160, filed on
`Apr. 1, 1999, now Pat. No. 6,415,280, which is a
`division of application No. 08/960,079, filed on Oct.
`24, 1997, now Pat. No. 5,978,791, which is a
`continuation of application No. 08/425,160, filed on
`Apr. 11, 1995. now abandoned.
`
`(51)
`
`(52)
`(58)
`
`Int. Cl.
`(2006.01)
`G06F 17/30
`707/758: 707/781; 707/821
`U.S. Cl.
`Field of Classification Search .................. 707/758,
`707/781, 821
`See application file for complete search history.
`
`Primary Examiner 7 Khanh B Pham
`(74) Aflorney. Agent.
`or Firm — Davidson
`Jackson & Gowdey, LLP; Brian Siritzlql
`
`Berquist
`
`ABSTRACT
`(57)
`Access to data items uses names based on the data in the data
`items; the name ol‘a data item may be based, at least in part,
`on a function of some or all of the bits that comprise the data
`item. A data item may comprise an arbitrary sequence of bits.
`The function may include a hash fimction or a message digest
`function. The name of a data item may be compared to a list
`of names of other data items.
`
`178 Claims, 31 Drawing Sheets
`
`SIMPlE
`
`DA TA ITEM
`
`8212
`COMPUTE MD FUNCTION ON
`DATA ITEM
`
`DATA ITEM
`
`3214
`APPEND LENGTH MODULO 32 OF
`
`TRUE NAME
`
`1
`
`EXHIBIT 4 - 1
`
`

`

`Case 5:18-md-02834-BLF Document 217-4 Filed 10/04/18 Page 3 of 71
`Case 5:18—md-02834-BLF
`Document 217-4 Filed 10/04/18 Page 3 of 71
`
`US 8,099,420 B2
`
`PageZ
`
`4.414.624
`4.441.155
`4.464.713
`4.490.782
`4.558.413
`4.571.700
`4.577.293
`4.642.764
`4.642.793
`4.658.093
`4.675.810
`4.691.299
`4.725.945
`4.773.039
`4.821.184
`4.887.235
`4.888.681
`4.914.571
`4.914.586
`4.922.414
`4.922.417
`4.937.863
`4.949.302
`4.953.209
`4.972.367
`5.014.192
`5.025.421
`5.032.979
`5.047.918
`5.050.074
`5.050.212
`5.057.837
`5.077.658
`5.084.815
`5.117.351
`5.129.081
`5.129.082
`5.144.667
`5.163.147
`5.179.680
`5.182.799
`5.199.073
`5.202.982
`5.204.897
`5.204.958
`5.204.966
`5.208.858
`5.222.134
`5.230.051
`5.239.648
`5.241.671
`5.247.620
`5.260.999
`5.276.869
`5.276.901
`5.287.499
`5.287.514
`5.297.279
`5.301.286
`5.3013 16
`5.317.693
`5.321.841
`5.339.403
`5.341.477
`5.343.527
`5.347.653
`5.351.302
`5.357.440
`5.357.623
`5.357.630
`5.359.523
`5.361.356
`5.371.897
`5.375.206
`5.384.565
`5.394.555
`5.403.639
`5.404.508
`
`U.S. PATENT DOCUMENTS
`A
`11/1983 Smmnenlr.
`A
`4’1984 Fletcher
`A
`8/1984 Benhase
`A
`12/1984 Dixon
`A
`12/1985 Schmidt e181.
`A
`2/1986 Emry. Jr.
`A
`3/1986 Matick
`A
`2/1987 Auslande1
`A
`21987 Meaden
`A
`4/1987 Hellman
`A
`6/1987 Gruner
`A
`9/1987 Rivest
`A
`2/1988 Kronstadl
`A
`9/1988 Zamora
`A
`4/1989 Clancyel :11.
`A
`12/1989 Holloway
`A
`12/1989 Barnes
`A
`4/1990 Bamlzel :11.
`A
`4/l990 Swinehartetal.
`A
`5/1990 Holloway
`A
`5/1990 Chunn el :11.
`A
`6/1990 Robert et :11
`A
`8/1990 Arnoldet a1
`A
`8/1990 Ryder. Sr el al.
`.A
`ll/l990 Burke
`A
`5/1991 Mansfieldel 211.
`A
`6/1991 Cho
`A
`7/1991 Hecht e151.
`A
`9/1991 Schwartzetal
`A
`9/1991 Mama
`A
`9/1991 Dyson
`A
`10/1991 Colwcll
`A
`12/1991 Bendert
`A
`1/1992 Mazzario
`A
`5/1992 Miller
`A
`7/1992 Kobayashi
`A
`71992 '111'fing
`A
`9/1992 PogueJr.
`A
`11/1992 Orita
`A
`1/1993 Colwell
`A
`1/1993 Tzunuraeial.
`A
`3/1993 Scott
`A
`4/1993 Gramlich et al.
`A
`4/1993 Wyman
`A
`4/1993 Chengelal.
`A
`4/1993 Wittcnbcrgct :11
`A
`5/1993 Vollen
`A
`6/1993 1511111661111.
`A
`7/1993 Quan
`A
`8/1993 Nukui
`A
`’/1993 Reedet :11.
`A
`9/1993 Fukuzawaetal.
`A
`“/1993 Wyman
`A
`1/1994 Forrestet :11.
`A
`1/1994 Howell
`A
`2/1994 Nemes
`A
`2/1994 Gram
`A
`3/1994 Bannon e1a1.
`A
`4/1994 Rajani
`A
`4/1994 Hamilton
`A
`5/1994 Cuenod elal.
`A
`6/1994 East et :11.
`A
`8/1994 Parker
`A
`8/1994 Pitkin cl :11.
`A
`8/1994 M00“
`A
`9/1994 Flynn el :11.
`A
`9/1994 leighton e1 :11.
`A
`[0/1994 Talbott etal
`A
`10/1994 Megory-Cohen
`A
`10/1994 Oprescuel :11.
`A
`10/1994 Talbott cl :11
`A
`11/1994 Clmkelal.
`A
`12/1994 Brown etal
`A
`12/1994 Hunteretnl.
`A
`1,11995 Cannon
`A
`2/1995 Hunter 61:11.
`A
`4/1995 Belsun 81:11.
`A
`41/1995 Konrad
`
`..
`
`..
`
`707/1
`
`................. 707/2
`
`707/2
`
`.
`
`.. 709/226
`
`>>>>>>>>>>>>>>>>>>>>3>>>>11>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>
`
`5.4.???“
`2229162;
`51448718
`{452‘447
`5‘454‘000
`5:454‘039
`5459860
`5.465.365
`754671471
`514751826
`9479654
`54911817
`5‘499‘294
`5,504,879
`5.5205757
`55975585
`5542087
`5.9485724
`5253.143
`9568.181
`5581615
`5281759
`5581764
`(.8359.
`5588147
`51596744
`56001814
`5604803
`56041892
`5630067
`56325031
`56385443
`5640564
`5649196
`5677952
`56785038
`51678046
`5‘694‘472
`56941596
`5701316
`’5‘710‘922
`5‘724'425
`5’724’552
`5742807
`5.7455879
`$757513
`2'7’57'915
`5781629
`5802291
`{809,494
`{825049
`51835087
`518641683
`5907619
`‘5‘907'704
`{9401504
`5978791
`5991414
`60065018
`6‘134‘603
`61135646
`61415280
`6732180
`68161872
`6.928.442
`2002/0052884
`7002/0082999
`2003/0078888
`7003/0078889
`9003/0095660
`$004,0139097
`;
`_’,
`AND/0010792
`30059114395
`2007/0135843
`2008/0065635
`2003/0066191
`2003/0071855
`200870082551
`
`8/ 1995
`8/1995
`9/1995
`9/1995
`9/1995
`9/1995
`9/1995
`10/1995
`1 1/1995
`1 1/1995
`12/1995
`12/1995
`2/1996
`3/1996
`4/1996
`6/1996
`7/1996
`7/1996
`8/ 1996
`9/1996
`1011996
`12/1996
`12/1996
`12/1996
`12/1996
`12/1996
`1/1997
`2/1997
`2/1997
`2/1997
`5/1997
`5/1997
`6/1997
`6/1997
`7/1997
`10/1997
`10/1997
`10/1997
`12/1997
`12/1997
`12/1997
`1/1998
`3/1998
`3/1998
`4/1998
`4/1998
`5/1998
`5/1998
`7/1998
`9/1998
`9/1998
`10/1998
`1 1/1998
`1/1999
`5/1999
`5/1999
`8/1999
`1 1/1999
`1 1/1999
`12/1999
`10/2000
`10/2000
`7/2002
`5/2004
`11/2004
`3/2005
`5/2002
`6/2002
`4/2003
`4/2003
`5/2003
`7/2004
`1/2005
`5/2005
`3/2007
`3/2008
`3/2008
`3/2008
`3/2008
`
`.
`
`707/205
`
`.. ..
`
`707/10
`
`.
`
`..
`
`.. 725/92
`
`709/219
`
`Wyman
`C1110 et :11.
`Pe1elson el :11.
`Cohn el :11.
`Nelson cl :1].
`Dorfman
`Coppersmith el :11.
`Burnett
`W'intcrbottom
`Bader
`Fischer
`Squibb
`Gopal e1 :11.
`F1ied.ma.n
`Fisenberg e1 :11.
`Krawczyk
`Blickensmff e1 :11.
`Neimat e1 .11.
`Akizawa et a1
`Ross et :11.
`Greenwood el :11.
`Stern
`Burnett
`Fitzgerald e1 :11.
`Gardner cl :11
`Neeman e1 :11.
`D110 e1 :11.
`Howard
`Aziz
`Nurlall el al.
`Kindcll ct :11.
`Velissaropoulos e1 :11.
`Stefik et :11
`..
`Hamilton e1 :11
`Woodhill el :11.
`Bl:1.kley. 111 et :11.
`Dockler e1 :11.
`Cahill e1 :11
`Johnson et :11
`Campbell
`Alfcrncss or £11
`Alley el al.
`Chang e1 :11.
`Taoda
`Masinter
`Wyrmm
`BellaIe e1 :11.
`Aucsmith e1 :11.
`Haber .
`.......
`Balick e1 :11.
`..
`Nguyen ...........
`Ogata or :11.
`Men . ........................... 346/810
`Boeben e1 :11.
`Davis
`Gudmundson Ct :11.
`Griswold
`Faber el :11.
`Garay e1 :11.
`Burnett e1 :1].
`Jones et :11.
`Kahn et :11.
`Farbcr at al.
`Hale et al.
`Squibb
`Farber e1 :11.
`Farber e1 :11.
`Lee et :11.
`Lee et :11.
`Lee et :11.
`Lee et :11.
`Faxber e1 :11.
`Carpentier e1 :11.
`Farber e1 :11.
`Fmber e1 :11.
`Huber et :11.
`Fm‘bcr ct :11
`Farber e1 :11
`Farbcr cl :11
`
`705/54
`. 709/303
`
`.
`
`713/177
`
`. 709/202
`.......... 707/1
`
`395/200 49
`709/330
`
`EXHIBIT 4 - 2
`
`

`

`Case 5:18-md-02834-BLF Document 217-4 Filed 10/04/18 Page 4 of 71
`Case 5:18—md-02834-BLF Document 217-4 Filed 10/04/18 Page 4 of 71
`
`US 8,099,420 B2
`Page 3
`
`EP
`EP
`EP
`EP
`EP
`EP
`EP
`GB
`JP
`JP
`JP
`JP
`JP
`JP
`JP
`W0
`W0
`W0
`W0
`W0
`
`FOREIGN PATENT DOCUMENTS
`0315425
`5/1989
`0 558 945 A2
`9/1993
`0 566 967 A2
`10/1993
`0592045
`4/1994
`0631 226 A1
`12/1994
`0 654 920 A2
`5/1995
`0 658 022 A2
`6/1995
`2294132 A
`4/1996
`59058564
`4/1984
`63-106048
`5/1988
`63-273961
`11'1988
`2-127755
`5/1990
`05162529
`6/1993
`06187384 A2
`7/1994
`06348558 A
`12/1994
`WO 92/20021
`11/1992
`WO 94/06087
`3/1994
`WO 94/20913
`9/1994
`WO 95/01599
`l/I995
`W0 97/43717
`11/1997
`
`OTHER PUBLICATIONS
`
`Akamai and MIT's Memorandum in Support of Their Claim Con-
`struction of L'SPAT 5.978.791. dated Aug. 31. 2001. from Civil
`Action No. 00-cv-11851RWZ.
`Akamai’s Answer. Affirmative Defenses and Counterclaims to
`Amended Complaint. filed Dec. 6. 2002. in Civil Action No. 02-CV—
`1 1430RWZ.
`Akamai’s Brief on Claim Construction. dated Aug. 8. 2003. from
`Civil Action No 02-11430 RWZ
`Answer ofDefendant RIAA to First Amended Complaint and Coun-
`tcrclaim. dated Feb. 8. 2005. from Civil Action No. CV04-7456 JFW
`(CTx).
`Berners-Lee. T. et al.. “Hypertext Transfer Protocol—HTTPF'IO.”
`May 1996. pp. 1-54.
`Berners-Lee. T. “Universal Resource Identifiers in W'WW.” Jun.
`1994.pp.1-25.
`Bowman. C. Mic. et al.. “Harvest: A Scalable. Customizablc Discov-
`ery and Access System.” Aug. 4. 1994. pp. 1-27.
`Bowman. C. Mic. et al.. “Harvest: A Scalable. Customizable Discov-
`ery and Access System." Mar 12. 1995. pp 1-29.
`Brisco. T.. “DNS Support for Load Balancing.”Apr. 1995. pp. 1-7.
`Browne. Shirley et al.. "Location-Independent Naming for Virtual
`Distributed Software Repositories.” 1995. 7 pages.
`Browne. Shirley et al.. “Location-Independent Naming for Virtual
`Distributed Software Repositories.” 1995. printed from http:/www.
`netlib.org/utk/papcrs/lifn/main html on Mar 22. 2006. 18 pages
`Civil Minutes General dated Jan. 25. 2005. from Civil Action No. CV
`04-7456-JFW (CTX).
`Complaint for Patent Infringement. Permanent Injunction. and Darn-
`ages. dated Sep. 8. 2004. from Civil Action No. CV 04-7456 JFW
`(AJWx).
`CWIS' Opening Markman Brief Constnring the Terms at Issue in
`US. Patent No. 6.415.280. dated Jul. 25. 2003. from Civil Action No.
`02-11430 RWZ.
`CWIS' Reply Markman Brief Constnring the Terms at Issue in US.
`Patent No. 6.415.280. dated Aug. 15. 2003. from Civil Action No.
`02-11430 RWZ.
`Davis. James R.. “A Server for a Distributed Digital Technical Report
`Library.” Jan. 15. 1994. pp. 1-8.
`Declaration ofRobert B.K. Dewar in Support ofCWIS’ Construction
`of the Terms at Issue in U S Patent No 6.415.280. dated Jul. 25.
`2003. from Civil Action No. 02-cv-11430RWZ.
`Defendant Digital Island’s Opening Brief on Claim Construction
`Issues dated Aug 17. 200i. from Civil Action No 00-cv-l 1851-
`RWZ.
`Defendant Media Sentry. Inc ’s Reply Memorandum of Points and
`Authorities in Further Support of Its Motion to Dismiss. dated Nov.
`15. 2004. from Civil Action No. CV04—7456 JFW (CTx).
`Defendant MediaSentry Inc. ’3 Notice of Motion and Motion to Dis-
`miss First Amended Complaint; Mcrnorandum of Points and
`Authorities in Support Thereof. dated Dec. 13. 2004. from Civil
`Action No CV04-7456 JFW _
`
`Defendant MediaSentry. Inc.’s Answer to Plaintiffs’ First Amended
`Complaint and Counter'claims. dated Feb. 8. 2005. from Civil Action
`No. CV04-7456 JFW (CTX).
`Defendant RIAA’s Notice of Motion and Motion to Dismiss First
`Amended Complaint; Memorandum of Points and Authorities in
`Support Thereof. dated Dec. 13.2004. from Civil Action No. CV04-
`7456 JFW (CTX)
`Defendants Loudeye Corp.’s and Overpeer. Inc.’s Answer to Plain—
`tiffs” First Amended Complaint and Counterclaim. dated Feb. 8.
`2005. from Civil Action No. 04-74 56 JFW (AJWX)
`Defendants‘ Preliminary InvalidityContentions dated Dec. 14. 2006.
`from Civil Action No. CV 06-5086 SJO (Ex).
`European Search Report
`issued Dec. 23. 2004 in correpsonding
`European Application No. 96910762.2-2201.
`Expert Report of Professor Ellis Horowitz. dated Mar 6. 2006. from
`Civil Action No. 04-7456 JFW (CTX).
`Expert Report ofthe Honorable Gerald J. Mossinghoif. dated Mar
`13. 2006. from Civil Action No. 04-7456 JFW (CTx).
`Faltstrom. P. el al.. “How to Interact with a Whois++ Mesh.” Feb.
`1996. pp. 1-9.
`Fielding. R et al.. “Hypertext Transfer ProtocoliHTTP/l . 1.” Jan.
`1997. pp. 1-163.
`Fielding. R. et al.. “Hypertext Transfer Protocol—IITTPMJ." Jun.
`1999. pp. 1-157.
`Infringement. Permanent
`for Patent
`First Amended Complaint
`Injunction and Damages. dated Nov. 24. 2004. from Civil Action No.
`CV 04-7456 JFW ('CTx).
`International Search Report dated Jun 24. 1996 in corresponding
`international application PC'1'/US1996/004733.
`Khare. R. and Lawrence. S.. “Upgrading to TLS Within HTTP/1 1.”
`May 2000. pp. [-12
`Kim et al. “The Design and Implementation of Tripwire: A file
`System Integrity Checker”. COAST Labs Dept. of Computer Sci-
`ences Purdue University. Feb 23. 1995. pp 1—18
`Knuth. Donald E.. “The Art ofComputer Programming.” 1973. vol.
`3. Ch. 6.4. pp. 506-549.
`Memorandum of Points and Authorities in Support ofLoudeye’s and
`Overpeer’s Motion to Dismiss the First Amended Complaint for
`Failure to State a Clairn or. in the Alternative. for a More Definitive
`Statement. dated Dec 13. 2004. from Civil Action No. CV-04-7456
`JFW (AJWX).
`Moats. R.. “URN Syntax.” May 1997. pp. 1-8
`Myers. J and Rose. M. “The Content-MD5 Header Field." Oct.
`1995. pp. 1-4.
`Ofi‘ice Action in corresponding Japanese Application No. 531.073/
`1996 mailed on Apr. 25. 2006.
`Office Communication in corresponding Eiu‘opetm Application No.
`96910762.2-1225 dated Jan. 17. 2007.
`Order Re Claim Construction dated Nov. 8. 2001. from Civil Action
`No. 00—11851-RWZ.
`Patent Abstracts of Japan. "Device for Generating Database and
`Method for the Same." Application No 03-080504. Sun Microsyst.
`Inc.. published Jun. 1993. 38 pages
`Patent Abstracts of Japan. “Method for Registering and Retrieving
`Data Base.” Application No 03-187303. Nippon Telegr. & Teleph.
`Corp.. published Feb. 1993. 11 pages
`Plaintiffs’ Memorandum of Points and Authorities in Opposition to
`Loudcye Dcfcndants’ Motion to Dismiss. dated Nov. 8. 2004. from
`Civil Action No. CV—04—7456 JFW (AJWX).
`Plaintiffs’ Opposition to Media Sentry’s Motion to Di smiss; Memo-
`randum of Points and Authorities in Support Thereof. dated Nov 8.
`2004. from Civil Action No. CV 04—7456 JFW (CTx)
`Plaintifl‘s Opposition to Recording Industry Association of Ameri-
`ca‘s Motion to Dismiss; Memorandum of Points and Authorities in
`Support Thereof. dated Nov. 8. 2004. from Civil Action No. CV—04-
`7456 JFW (CTx).
`Plaintiff‘s Reply to Defendant Loudeye Corp ’5 and Overpeer. Inc’s
`Counterclaims. dated Mar. 3. 2005. from Civil Action No. CV
`04-7456 JFW (CTx).
`Plaintiff‘s Reply to Defendant McdiaSentry’s Countcrclairns. dated
`Mar. 3. 2005. frorn Civil Action No CV 04-7456 JFW (CTx)
`Plaintiff‘s Reply to Defendant RIAA’S Counterclaims. dated Mar. 3.
`2005. from Civil Action No 04-7456 JFW (CTx).
`
`EXHIBIT 4 - 3
`
`

`

`Case 5:18-md-02834-BLF Document 217-4 Filed 10/04/18 Page 5 of 71
`Case 5:18—md-02834-BLF Document 217-4 Filed 10/04/18 Page 5 of 71
`
`US 8,099,420 B2
`Page 4
`
`Reed Wade (wade@cs rrtk edu). “re: Dienst and BFD/llFN docu»
`ment.” .Aug. 8. 1994. printed from http:.’/www.webhistory.orgr’www.
`lists’www—talk1994q3/O4161nm] on Mar. 22. 2006. (7 pages).
`Rivest. R. “The MDS Message-Digest Algorithm.” Apr. 1992. pp.
`1-19 and errata sheet (1 page)
`Rose. M.. “I‘he Content—MDS Header Field.” Nov. 1993. pp. 1-3.
`Sehncier. Bnrce. "One-Way Hash Frrnctions. Using Crypographic
`Algorithms for Hashing.” 1991. printed from http://202.l79135.4.I
`datar'DDl/articles/1991/9109/'91909g/9109g.lrtrn on Mar. 22. 2006.
`Sun Microsystems. Inc .“NFS: Network File System Protocol Speci-
`fication.” Mar. 1989. pp. 1-25.
`tampering Pro-
`Vincenzetti. David and Cotrrozzi. Massimo. "Anti
`gram.” Proceedings of the Fourth [USENIX} Security Symposium.
`Santa Clara. CA. 1993.
`l
`1 pages.
`Vincenzetti. David and Cotrrozzi. Massimo. "Anti Trunpering Pro-
`gam.” Proceedings ofthe Fourth {USENIX} Security Symposium.
`Santa Clara. CA. undated. printed from http://www.ja net/CERI/
`VincenZet‘ti_and_C0troni/ATP_Anti_Tamp on Mar. 22. 2006. 8
`pages.
`Bemers-Lee. T. et al.. “Uniform Resource Locators (URL)."pp. 1-25.
`Dec. 1994
`Danzig. P.B.. et al.. "“Distributed Indexing: A Scalable Mechanism
`for Dieributed Information Retrieval?” Proceedings of the 14th
`Annual International ACM SIGIR Conferencc on Research and
`Development in Information Retrieval. pp. 220-229. Oct
`13—16.
`1991.
`Hauzeur‘. B M . “A Model for Naming. Addressing. and Routing.”
`ACM Trans Inf. Syst. 4. Oct. 4. 1986). 293-31 1.
`Khoshafian. S. N. et a1. 1986. Object identity. In Conf. Proc. on
`Object-Oriented Prograrmning Systems. Languages and Applica-
`tions (Ponland. Oregon. United States. Sep 29—Oct. 2. 1986). N.
`Meyrowitz. Ed. OOPLSA ‘86. AC M Press. New York. NY. 406-4 16
`Lantz. K. A.. et a1 .. “Towards a universal directory service.” In Proc.
`4th Annual ACM Symp. on Principles of Distribrrted Computing
`(Minaki. Ontario. Canada). PODC ’85 ACM Press. New York. NY.
`250-260.
`Leach. P. J.. et al . The file system ofan integrated local network In
`Proc. 1985 ACM 13th Annual Conf. on Comp. Sci CSC ’85. ACM
`Press. NY. NY. 309-324.
`Leach. P.J.. et a1 . “Ule as Internal Names in a Distributed File
`System." In Proc. lst ACM SIGACT—SIGOPS Symp. on Principles of
`Distributed Computing (Ottawa. Canada. Aug. 18-20. 1982). PODC
`’82. ACM Press. NewYork. NY. 34-41.
`Ma. C. 1992. On building very large naming systems. In Proc. 5th
`Workshop on ACM SIGOPS European Workshop: Models and Para-
`digms for Distributed Systems Structuring (France. Scp 21-23.
`1992). EW 5. ACM Press. New York. NY. [—5.
`Peterson. L. L. 1988. A yellow-pages service for a local-area net-
`work. In Proc. ACM Workshop on Frontiers in Computer Commu-
`nications Technology (Vermont. 1987). J.
`.1. Garcia-Luna—Aeeves.
`Ed. SIGCOMM ’87. ACM Press. New York. NY. 235-242.
`Ravindran. K. and Ramakr'ishnan. K K. 1991. A naming system for
`feature-based service specification in distributed operating systems.
`SIGSMALL/PC Notes 17. 3-4 (Sep. 1991). 12-21.
`Ross. K. “Hash-Routing for Collections of Shared Web Caches."
`IEEE Network Magazine. pp. 37—44. Nov—Dec. 1997.
`Schwartz. M.. et al. 1987 Anzune service for evolvingheterogeneous
`systems. In Proc. 11th ACM Symp. on OS Principles (Texas. Nov
`8—11. 1987). SOSP ‘87. ACM Press. NY. NY. 52-62.
`Shaheen-Gouda.A. and Loucks. L 1992 Name borders In Proc. 5th
`Workshop on ACM SIGOPS European Workshop: Models and Para-
`digms for Distributed Systems Structuring (Mont Saint-Michel.
`France. Sep. 21-23. 1992). EW 5. ACM Press. NY. NY. 1-6
`Terry. D. B. 1984 An analysis ofnarning conventions for distributed
`computer systems. In Proc. ACM SIGCOMM Symp. on Corrurruni-
`cations Architectures and Protocols: Tutorials & Symp. SIGCOMM
`'84 ACM Press. NY. NY. 218-224
`Cheriton. David R. and Mann. Timothy P. “Decentralizing a global
`naming service for improved performance and fault tolerance”. AC M
`Transactions on Computer Systems. vol. 7. No. 2. May 1989. pp
`147-183.
`Request for Reexamination of US. Patent No 6.928.442: Reexanr
`Control U.S. Appl. No. 901010.260.fi1ed Aug 29. 2008
`
`Kim et al.. “Experiences with Tripwire: Using Intergrity Checkers for
`Intrusion Detection”. COAST Labs. Dept. of Computer Sciences
`Purdue University. Feb. 22. 1995. pp I-I2.
`Kim et al.. “The Design and Implementation of Tripwire: A file
`System Intergrity Checker”. COAST Labs. Dept. of Computer Sci-
`ences Purdue University. Nov. 19. 1993. pp 1-21.
`Zhiyu Tian ct al.. A New Hashing Function: Statistical Behaviour and
`Algorithm. pp. 3-13.
`G. L. Friedman. Di gitai Camera with Apparatu for Authentication of
`Images Produced from an Image File. NASA Case No NFC-19108-
`l-CU. U.S. App] No. 08/159980. filed Nov. 24. 1993.
`1-1. Goodman. Ada. Obj ect-Orierrted Techniques. and Concurrency in
`Teaching Data Structures and File Management Report Documenta-
`tion p. AD-A275 385-94-04277.
`Advances
`in Cryptology—EUROCRYPT’93: Workshop on the
`Theory and Application of Cryptographic Techniques Lofthus. Nor-
`way. May 23-27. 1993 Proceedings
`Proceedings ofthe 1993 ACM SIGMOD International Conference on
`Management of Data. vol. 22. Issrre 2. Jun. 1993.
`Advances
`in Cryptolog -AUSCRYPT ’927Workshop on the
`Theory and Application of Cryptographic Techniques Gold Coast.
`Queensland. Australia. Dec. 13-16. 1992 Proceedings.
`Witoid Litwin et al.. Linear Ilashing for Distributed Files. ACM
`SIGMOD. May 1993. pp. 327-336
`Ming-Ling Lo et al.. On Optimal Processor Allocation to Support
`Pipelined Hash Joins. ACM SIGMOD. pp. 69-78. May 1993.
`Thomas A. Berson. Differential Cryptanalysis Mod 232 with Appli-
`cations to MDS. pp. 69—31
`William Perrizo et al.. Distributed .loin Processing Performance
`Evaluation. Twenty-Seventh Hawaii International Conference on
`System Sciences. vol. II. pp. 236-244.
`Vijay Krunar. A Concurrency Control Mechanism Based on Extend-
`ibie Hashing for Main Memory Database Systems. ACM. vol. 3.
`1989. pp 109-113.
`Birgit Pfitzman. Sorting Out Signature Schemes. Nov. 1993. 1" Conf.
`Computer & Comm. Sectuity ’93. p 74-85.
`Ber1 dem Boer et al.. Collisions for-the compression function ofMD5.
`pp. 292-304.
`Sakti Prarnanik eta1..Multi-DirectoryHasing. 1993. Info. Sys.. vol.
`18. No 1. pp 63-74.
`Murlidhar Korrshik. Dynamic Hashing with Distributed Overflow
`Space: A File Organization with Good Insertion Performance. 1993.
`Info Sys . vol 18. No 5. pp. 299-317.
`Witoid Litwin et a1 . LH*-Linear Hashing for Distributed Files. HP
`Labs Tech Report No. HPL-93-21. Jun. 1993; pp. 1-22
`Yuliang Zheng ot a1 . HAVAL—A One-Way Hashing Algorithm with
`Variable Length of Output (Extended Abstract). pp. 83-105.
`Chris Charnes and Josef Pieprzky. Linear Nonequivalence versus
`Nonlinearity. Pieprzky. pp. 156-164.
`Gwertzrnan. James. et al. “The Case for Geographical Push-Cach-
`ing.” Technical Report HU TR 34-94 (excerpt). Harvard University.
`DAS. Cambridge. MA 02138. 1994. 2 pgs
`Grigni. Michelangelo. et al. “Tight Bounds on Minimum Broadcasts
`Networks.” SIAM Journal of Discrete Mathematics. vol. 4. No. 2.
`May 1991.pp. 207-222
`Devine. Robert “Design and Implementation of DDH: A Distributed
`Dynamic Hashing Algorithm.” In Proceedings of 4th International
`Confercncc on Foundations of Data Organizations and Algorithms.
`1993. pp. 101-114.
`“Multicast Routing in Datagram
`a1.
`et
`Deering. Stephen.
`Internetworks and Extended LANs” ACM Transactions on Com-
`puter Systems. vol. 8. No. 2. May 1990. pp. 85-1 10.
`Cormen. Thomas H.. et a1. Introduction to Algorithm. The MIT
`Press. Cambridge. Massachusetts. 1994. pp. 219-243. 991-993.
`Naor. Moni. et al. “The Lead. Capacity and Availability oI‘QuorLun
`Systems.” In Proceedings of the 35th IEEE Symposium on Founda-
`tions ofComputcr Science. Nov. 1994. pp. 214-225.
`Nisan. Noam. “Psuedorandom Generators for Space—Bounded Corn-
`put‘ation." In Proceedings of the Twenty-Second Annual ACM Sym-
`posium on Theory of Computing. May 1990. pp. 204—212.
`Palmer. Mark. at al. “Fido: A Cache that Learns to Fetch." In Pro-
`ceedings of the 17th International Conference on Very Lzu‘ge Data
`Bases. Sep 1991. pp 255-264.
`
`EXHIBIT 4 - 4
`
`

`

`Case 5:18-md-02834-BLF Document 217-4 Filed 10/04/18 Page 6 of 71
`Case 5:18—md-02834-BLF Document 217-4 Filed 10/04/18 Page 6 of 71
`
`US 8,099,420 BZ
`Page 5
`
`Peleg. David. et al. “The Availabiltiy onuorum Systems."1nforma-
`tion and Computation 123. 1995. 210-223.
`Rabin. Michael “Efiicient Dispersal of Information for Security.
`Load Balancing. and Fault Tolerance.” Journal of the ACM. vol. 36.
`No. 2. Apr. 1989. pp. 335-348.
`Ravi. R . "Rapid Rumor Rarnification: Approximating the Minimum
`Broadcast Time ” In Proceedings of the 35th IEEE Symposium on
`Foundation ofCornputer Science. Nov. 1994. pp 202-213
`Schmidt. Jeanette. et al. “Chernoff—Iloeffding Bounds for Applica—
`tions with Limited Independence” In Proceedings of the 4th AC S-
`SIAM Symposium on Discrete Algorithms. 1993. pp. 331-340
`Tarjart. Robert Endre. et al. “Storing a Sparse Table.” Communica-
`tions ofthe ACM. vol. 22. No 11. Nov 1979. pp 606-611
`Wegman. Mark. ct al. "New Hash Functions and Their Use in Au then-
`tication and Set Equality." Journal of Computer and System Sciences
`vol 22. .Iun 1981, pp 265-279
`Vitter. Jeffrey Scott. ct al. “Optimal Prcfetching via Data Cempres-
`sion.” In Proceedings of32nd IEFF. Symposium on Foundations of
`Computer Science. Nov 1991. pp. 121-130.
`Fredman. Michael. et a1. “Storing a Sparse Table with 0(1) Worst
`Case Access Time.” Journal of the Association for Computing
`Machinery. v01. 31. No. 3. Jul. 1984. pp. 538-544.
`Yao. Andrew Chi-Chih. "Should Tables be Sorted?" Journal of the
`Association for Computing Machinery. vol. 28. No. 3. Jul. 1981. pp.
`615-628.
`Floyd. Sally. et al. "A reliable Multicast Framework for Light-Wei ght
`Sessions and Application Level Framing.” In Proceedings of ACM
`SIGCOMM ’95. pp. 342-356.
`Feeley. Michael. et a1. “Implementing Global Memory Management
`in aWorkslation Cluster.” In Proceedings ofthe 15th ACM Sympo-
`>
`sium on Operating Systems Principles. 1995. pp. 201-212.
`Carter. J. Lawrence. et a1. “Universal Classes of Hash Functions.’
`Journal ofComputer and System Sciences. vol. 18. No. 2. Apr. 1979.
`pp. 143-154.
`Patent Abstracts ofJapan. “Electronic Mail Multiplexing System and
`Communication Control Method in The System." 06/30/19993. .IP
`05162529.
`Kim et al.. “Experiencess with ‘l'ripwire: Using Intergrity Checkers
`for Intrusion Detection”, COAST Labs. Dept of Cornpu ter Sciences
`Purdue University. Feb. 22. 1995. pp. 1—12.
`Kim et al.. “The Design and Implementation of'l‘ripwire: A file
`System Intergrity Checker”, COAST Labs. Dept. of Cornputer Sci-
`ences Purdue University. Nov. 19. 1993. pp. 1—21.
`Bert Dem Boer et al.. Collisions for the compression function of
`MD5. pp 292-304
`Sakti Pramanik eta1.. Multi-Directory Hashing. 1993. Info. Sys.. vol.
`18. No. 1. pp. 63-74
`Murlidhar Koushik. Dynamic Hashing with Distrubuted Overflow
`Space: A File Organization with Good Insertion Performance. 1993.
`Info. Sys.. vol. 18. No. 5. pp. 299-317.
`Witold Litwin et al.. LH*-Linear Hashing for Distributed Files. HP
`Labs Tech. Report No. HPL-93—21. Jun. 1993. pp. 1-22.
`Yuliang Zheng et al.. I-IAVAL-A One-Way Hashing Algorithm with
`Variable Length of Output (Extended Abstract). 1993. pp 83-105.
`Chris Charnes and Josef Pieprzky. Linear Nonequivalence versus
`Nonlinearity. Pieprzky. 1993. pp. 156-164.
`Withold Litwin ct al.. Linear Hashing for Distributed Files. ACM
`SIGMOD. May 1993. pp. 327-336.
`Ming-Ling Lo et al.. On Optimal Processor Allocation to Support
`Pipelincd Hash Joins. ACM SIGMOD. pp. 69-78. May 1993
`Thomas A. Berson. DilTerenlial Cryptanalysis Mod 232 with Appli-
`cations to MDS. pp. 69-81.
`Willizun Perrizo ct al. Distributed Join Processing Performance
`Evaluation. Twenty—Seventh Hawaii International Conference on
`System Sciences. vol. II. pp. 236—244.
`Vijay Kumar. A Concurrency Control Mechanism Based on Extend-
`ible Hashing for Main Memory Database Systems. ACM. vol. 3.
`1989. pp. 109-113
`Birgit Pfitzman. Sorting Out Signature Schemes. Nov. 1993. I" Conf.
`Computer & Comm. Security ‘93. p. 74-85.
`Zhiyu Tian et a1..A New Hashing Function: Statistical Behaviour and
`Algorithm. Spring 1993. pp. 3-13.
`
`G L. Friedman. Digital Camera with Apparatus for Authent ication of
`Images Produced from an Image File. NASA Case No NFC-19108-
`I-CU. U.S. Appl._\Io. 08/159980. Nov. 24, 1993.
`H. Goodman. Ada. Object-Oriented Techniques. and Concurrency in
`Teaching Data Structures and File Management Report Documenta-
`tion p. AD-A275 385-94-04277.
`Advances in Cryptology-EUROCRYPT ’)3. Workshop on the
`Theory and Application of Cryptographic Techniques Lofthus. Nor-
`way. May 23-27. 1993. Proceedings.
`Proceedings on the 1993 ACM SIGMOD International Conference
`on Management of Data. vol. 22. Issue 2. Jun. 1993
`Advances of Cryptology-AUSC RYPT ’92—Workshop on the
`Theory and Application of Cryptographic Techniques Gold Coast.
`Queensland. Australia. Dec. 13-16. 1992 Proceedings.
`Tarjan. Robert Endre. et al.. “Storing a Sparse Table". Communica-
`tions ofthc ACM. v01. 22. No. 11. Nov. 1979. pp. 606-611.
`chman. Mark ct a1 .“Ncw Ha sh Functions and Their Use in Authen-
`tication and Set Equality”. Journal of Computer and System Sci-
`ences. vol 22. Jun 1981. pp. 265-279.
`Virter. Jeffrey Scott et al.. “Optimal Prefetching via Data Compres-
`sion”. In Proceedings of 32nd [EFF Symposium on Fundations of
`Computer Science. Nov. 1991. p. 121-130.
`Friedman. Michael et al.. “Storing a Sparse Table with 0(1) Worst
`Case Access Time”. Journal of the Association for Computing
`Machinery. vol. 31. No. 3. Jul. 1984. pp. 538—544.
`Yao. Andrew Chi-Chih. “Should Tables be Sorted?”. Journal of the
`Association for Computing Machinery. vol 28. No 3. Jul 1981. pp.
`615-628
`Floyd. Sally et al.. “A Reliable Multicast Framework for Light-
`Weight Sessions and Application Level Framing”. In Proceedings of
`ACM SIGCOMM ’95. pp. 342-356.
`Feeley. Michael. et al.. “Implementing Global Memory Management
`in a Workstation Cluster”. In Proceedings of the 15th ACM Sympo-
`sium on Operating Systems Principles. 1995. pp. 201-212.
`Carter. J. Lawrence. et al.. “Universal Classes of flash Functions”.
`Joru'nal ofComputer and System Sciences. vol. 18. No. 2. Apr. 1979.
`pp. 143—154.
`Patent Abstracts ofJapan. “Electronic Mail Multiplexing System and
`Communication Control Method in the System". Jun 30. 1993. JP
`05162529.
`Kim et al.. “Experiences with Tripwire: Using Integrity Checkers for
`Intrusion Detection”. COAST Labs. Dept. of Computer Sciences
`Purdue University. Feb. 22. 1995. pp. 1-12.
`Kim el al.. “The Design and Implementation of Tripwire: A File
`System Integrity Checker”. COAS'I Labs. Dept. of Computer Sci-
`ences Purdue University. Nov. 19. 1993. pp. 1-21.
`Peter Deutsch (peterd@bunyip.com). “Re: MDS and LIFNs (was:
`Misc Comments)”. www ae1.1anl gov/URI/archive/uri-94q2.mes-
`sages/0106htm1. Apr. 26. 1994
`Alexander Dupuy (’dupuy@smarts com). “RE: MDS and LIFNs
`(was: Misc Comments)". www acl.lanl.gov/URI/archive/uri-94q2.
`messages/0113 htrnl. Apr. 26. 1994
`Alexander Dupuy (:dupuy@smar1s.com). “MD5 and LIFNs (was:
`Misc Comments)”. uwwnelJanl gov/I IRI/archive/‘uri -94q2.mes-
`sages/OOSIhtml. Apr. 17. 1994.
`Albert Langer
`(cmf851 a 1nu.oz.au). http://groups.google.com/
`groups?selm=199IAug7 225159.786%40newshost.anu.edu.au&
`oe=UTF-8&output=gplain. Aug. 7. 1991.
`Clifford Lynch (Calur@uccmvsa.bitnet). “ietf url/uri overview draft
`paper Gong)”. www.acl.lanl.gov/UlU/archive/uri-93q1.messages/
`0015.htm1, Mar. 25. 1993.
`K. Sollins and L. Masinter. “Functional Requirements for Uniform
`Resource Names”. www.w3.org/Addressing.’rfc1737.txt. Dec. 1994.
`pp. 1-7
`W3C:ID, HTTP: A protocol for networked information. “Basic
`HTTP as defined in 1992”. www.w3.org/Protocols/HTTP2.htm1.
`1992
`Defendant Lime Wire. LLC’s Answer. Affirmative Defenses and
`Counterclaims dated Nov. 15. 2007. from Civil Action No. 07-06161
`VBF (PLAx)
`
`EXHIBIT 4 - 5
`
`

`

`Case 5:18-md-02834-BLF Document 217-4 Filed 10/04/18 Page 7 of 71
`Case 5:18-md-02834-BLF Document 217-4 Filed 10/04/18 Page 7 of 71
`
`US 8,099,420 B2
`Page 6
`
`Kim. Gene H.. and Spafford. Eugene H . “Writing. Supporting. and
`Evaluating Tripwire: A Publicly Available Security Tool." COAST
`Labs. Dept. of Computer Sciences Purdue University. Mar. 12. 1994.
`pp. 1-23.
`U.S. Appl. No. 11/980.679—May 6. 2009 PTO Ollice Action.
`USP'I'O.Non-Fina10ffice action mailed Jun. 15. 2009 in US. Appl.
`No. 11/980687.
`USPTO. Non-Final Office action mailed Jun 18. 2009 in Reexam
`U.S. Appl No. 90/010260.
`Communication from EPO in European Application No. 96 910
`7622-1225 dated May 8. 2009 [4 pgs].
`MeGregor D R and Mariani. J A. “FingerprintingiA technique for
`file identification and maintenance." Sofiware: Practice and Experi-
`ence. vol 12. No 12. Dec 1982. pp. 1165-1166
`[Proposed] Order Regarding Construction of Terms. filed Mar. 29.
`2007 in C D Cal. case No CV 06-5086 $10 (Ex) [9 pgs]
`Analysis of Plaintiffs’ Claim Chart for the '280 Patent As Against
`Defendant Media Sentry. Inc.
`I
`| pages.
`Analysis of Plaintiffs’ Claim Chart for the ’791 Patent As Against
`Defendant Media Sentry. Inc. (:1 1916.0010150 a) pp 1-48
`Analysis of Plaintiffs' Claim Chan for the '791 Patent As Against
`Defendant Overpeer pp. 1-40.
`Barbzu a. D.. ct al.. “Exploiting symmetries for low-cost comparison
`of file copies.” 8th Int’l Conf on Distributed Computing Systems.
`Jun. 1988. pp. 471-479. San Jose. CA.
`Campbell. M.. “The Design of Text Signatures for Text Retrieval
`Systems.” Tech. Report. Se

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket