`Case 5:18—md-02834-BLF Document 228-5 Filed 10/04/18 Page 1 of 71
`
`EXHIBIT 5
`EXHIBIT 5
`
`
`
`Case 5:18-md-02834-BLF Document 228-5 Filed 10/04/18 Page 2 of 71
`I tilll illilll lll lllll lllll llill lllll lllll lllll lill lllll llllll llll lil llll
`us00809942082
`
`(12) United States Patent
`Farber et al.
`
`1ro; Patent No.:
`1+s; Date of Patent:
`
`us 8,099,420 B2
`*Jan. 17,2012
`
`(54) ACCBSSTNG DATA INA DÄTA PROCBSSING
`SYSTEM
`(75) Inventors:
`
`David À. Farber, Ojai, CA (tJS);
`Ronald D. Lachman, Northbrook, IL
`(US)
`
`(73) Assignees:
`
`( * ) Notice:
`
`PersonalWeb Technologies, LLC, Tyler,
`TX (US); Level 3 Communications,
`LLC, Broomfield, CO (US)
`
`Subject to any disclairner, the tenn ofthis
`patent is extended or adjusted under 35
`U.S.C. 154(b) by 1312 days.
`This patent is subject to a temrinal dis-
`claimer.
`
`(21)
`
`(22)
`
`(6s)
`
`Appl. No.: 111017,650
`Filed: Dec.22,2004
`
`Prior Publication Data
`US 2005/0114296 Al
`May 26,2OOJ
`
`Related U.S. Application Data
`(60) Continuation of application No. 09/987,723, filed on
`Nov. 15, 2001, now Pat. No. 6,928,442, which is a
`continuation of application No. 09/283,160, filed on
`Apr. 1, 1999, now Pat. No. 6,41,5,280, which is a
`division of application No. 08/960,079, filed on Oct,
`24, 1997, now Pat. No. 5,978,791, which is a
`continnation of application No. 08/425,160, filed on
`Apr. 1 1, 1 995, now abandoned.
`
`(s 1)
`
`(52)
`(s8)
`
`Int. Cl.
`G06F l7/-10
`(2006.01)
`7 07 /7 58; 7 07 17 81 ; 7 07 l82r
`U.S. CI.
`Field of Classification Search
`7071758,
`707178r,821
`See application file for complete search history.
`
`(56)
`
`References Cited
`
`U.S. PATENT DOCUMENTS
`Evangelisti
`3,668,647 A.
`6/19'.72.
`3,835,260 A
`Prescher et al
`9/r9',74
`4,096,s68 A
`6/1918
`Bennett et al.
`'7n980
`4,2t5,402 A
`Mitchell
`4,22t,003 A.
`9/1980
`Chang et al.
`Cichelli
`91t981
`4,290,105 A.
`Rivest
`4,376,299 A.
`3/1983
`4,405,829 A
`fuvest
`911983
`4,4t2,285 A,
`I 0/l 983
`Neches
`(Continued)
`
`EP
`
`FOREIGN PATENT DOCUMENTS
`0268069 A2
`511988
`(Continued)
`
`OTHER PUBLICATIONS
`
`Affidavit of Tirnothy P Walker in SuppoÍ of CWIS' Opening Mark-
`man Brief Construing the Terms at Issue in U.S. Patent No
`6,415,280, d¿ted Jul. 25, 2003, from Civil Action No. 02-11430
`RWZ.
`
`(Continued)
`
`B Pham
`
`Berquist
`
`Prímaryt Examíner -KhanTt
`(74) Attorney, Agent, or Firm - Davidson
`Jackson & Gowdey, LLP; Brian Siritzþ
`(57)
`ABSTRACT
`Access to data items uses names based on the data in the data
`iterns; the name of a data item may be based, at least in part,
`on a function of some or all of the bits that comprise the data
`item. A data item may comprise an arbitrary sequence of bits.
`The function may include a hash function or a rnessage digest
`function. The name of a data item may be compared to a list
`of names of other data items.
`
`,J,
`
`DATA ITEM
`
`COMPUTE II,IID FUNCTON ON
`DATA ITEM
`
`APPEND LENGTH MODULO 32 OF
`DATA TTEM
`
`I
`
`L78 Claims,31 Drawing Sheets
`
`EXHIBIT 5 - 1
`
`
`
`Case 5:18-md-02834-BLF Document 228-5 Filed 10/04/18 Page 3 of 71
`
`725/92
`
`'709/2t9
`
`.... 7051s4
`.. 7091303
`
`8/ 1 995
`8/1 995
`9t r995
`9^995
`9ll99s
`9l t995
`9l 1995
`l0/1 995
`t1/1995
`1r/1995
`12/1995
`r2tr995
`2t t996
`3^996
`41t996
`6/1996
`7/1996
`7/1996
`811996
`9il996
`t0il996
`12t 1996
`tzl t996
`tzt t996
`t2/1996
`t2/1996
`1/t99't
`211997
`2n997
`2^9g',l
`st t99'l
`5/199',1
`6/199'.7
`6/r99',1
`7 I 1997
`10t 1997
`t0/ t997
`t0lt99'7
`t2l t997
`t2/1997
`t21199',7
`l/1 998
`3/1998
`3/t998
`4l t998
`4l t998
`5/1998
`5t t998
`7n998
`9/1998
`9/1998
`l0/1998
`r r/r998
`tl1999
`5l 1999
`511999
`81t999
`tll t999
`I U t999
`t2/1999
`10/2000
`l0/2000
`7/2002
`5/2004
`11/2004
`8/2005
`st2002
`6t2002
`4t2003
`4t2003
`5/2003
`7/2004
`1/2005
`5/2005
`3t2007
`3/2008
`3/2008
`3/2008
`3/2008
`
`AAAAAAAAAAAAAA AAAAA
`
`A A AAAAAAA AAAAAA AAAAAAAAAAAA AAAAAAAAB
`
`I
`BI
`BI
`B2
`AI
`AI
`A1
`AI
`A1
`AI
`A1
`AI
`AI
`A1
`AI
`AI
`AI
`
`8
`
`us 8,099,420 B2
`Page 2
`
`U,S, PATENT DOCUMENTS
`I l/1983
`Summer, Jr.
`Fletcher
`4/ 1984
`8i l 984
`Benhase
`Dixon
`t2t 1984
`Schmidt et al.
`t2l 1985
`2l t986
`Emry, Jr.
`Matick
`311986
`Ausla¡der
`2l t987
`Me¿den
`2t t98',1
`Hellma¡
`4t t98"/
`Grune¡
`6t198'7
`Rivest
`9n98',7
`Kronstadt
`211988
`Zamota
`9i 1988
`Clancy et al.
`4/ 1989
`Holloway
`t2t 1989
`Ba¡nes
`t2t 1989
`Ba¡atz et al.
`4t 1990
`Swineha¡t et al.
`4t 1990
`Holloway
`5l 1990
`Chu¡m et al. ..........
`5/ I 990
`Robef et al.
`6t t990
`Arnold et al,
`8/ 1990
`Ryder, Sr. et al.
`8/1990
`Burke
`I l/1990
`5t t99 |
`Ma¡sfield et al.
`6t 199 I
`Cho
`7t t99l
`Hecht et al.
`Schwarlz et al.
`9/ 199 1
`Marca
`9/ 199 1
`Dyson
`9/ 199 1
`Colwell
`t0/ 199 1
`t2t 199 I
`Bende¡t
`Mazzario
`1t 1992
`Miller
`5t 1992
`'il t992
`Kobayashi
`Tirfing
`7 I t992
`Pogue, Jr,
`9l 1992
`tU t992
`Orita
`Colwell
`v t993
`v 1993
`Tamura et al.
`Scott
`3/ 1993
`Gra.mlich et al. ......
`4/ 1993
`Wyman
`4/ 1993
`Cheng et al.
`4/ 1993
`4/t993
`Wittenberg et al.
`Volle¡t
`5l 1993
`6/t993
`Waite et al,
`7t 1993
`Quan
`8/ t993
`Nukui
`Reed et al,
`81 1993
`Fukuzawa et al.
`9l t993
`t ll 1993
`Wymao
`U t994
`Forrest et al.
`U t994
`Howell
`2t t994
`Nemes ..........,........
`2t t994
`Gram
`Ba¡non et al.
`3t t994
`4l t994
`Rajani
`Hamilton
`4i 1994
`Cuenod et ¿1.
`5/ 1994
`6/ 1994
`E¿st et al,
`Parker
`8/ 1994
`Pitkin et al. ............
`8/ 1994
`Moore
`8/ 1994
`Flynn et al.
`9/ 1994
`Leighton et al,
`9/ 1994
`10/ t994
`Talbott et al.
`10/ t994
`Megory-Cohen
`10/ t994
`Oprescu et al.
`10/ t994
`Talbott et al.
`Clrk et al.
`1 v t994
`B¡own et al.
`t2l t994
`12 t994
`Hunte¡ et al.
`I t995
`Cannon
`2t r995
`Hunter et al.
`Belsa¡ et al.
`4/ t995
`Kon¡ad
`41 1995
`
`4,414,624
`4,441,t 55
`4,464,7 13
`4,490,782
`4,558,413
`4,5'7 t,',100
`4,577,293
`4,642,'764
`4,642,793
`4,658,093
`4,675,8r0
`4,69t,299
`4,725,945
`4,7'13,039
`4,821 ,I 84
`4,887,235
`4,888,681
`4,9 14,57 r
`4,9 t4,586
`4,922,414
`4,922,417
`4,93'7,863
`4,949,302
`4,953,209
`4,9',72,367
`5,014,192
`5,025,421
`5,032,979
`5,04'7,9t8
`5,050,074
`5,050,212
`5,05?,837
`5,07'7,658
`5,084,8 15
`5,1 i7,351
`,129,081
`,r29,082
`,144,667
`,163,t47
`, r 79,6 80
`,182,799
`,199,073
`,202,982
`,204,897
`,204,958
`,204,966
`,208,858
`,222,134
`,230,051
`,239,648
`,241,6',/ I
`,24'/,620
`,260,999
`,216,869
`,276,901
`,287,499
`,287,514
`,291,279
`,301,286
`,301,316
`,3t7,693
`,32t,841
`,339,403
`,341,477
`,343,52'7
`,34'7,653
`,351,302
`,357,440
`,357,623
`,357,630
`,359,523
`,361,356
`,37t,891
`,3'75,206
`,384,565
`,394,555
`,403,639
`,404,508
`
`70711
`
`... 70"Ì12
`
`a^11)
`
`...... 7091226
`
`5,438,508
`5,442,343
`s,448,668
`5,448,7 18
`5,452,447
`5,454,000
`5,454,039
`5,459,860
`5,46s,365
`s,467 ,47 |
`s,4'/5,826
`s,419,654
`5,491,8 r7
`5,499,294
`5,504,879
`5,530,7 57
`5,5 37,5 85
`5,542,087
`s,s48,"t24
`5,s 53,143
`5,568,1 8l
`5,581,615
`5,5 8l,758
`5,581,764
`5,s 83,995
`5,588, l4?
`5,596,"/44
`5,600,834
`s,604,803
`s,604,892
`5,630,067
`s,632,031
`5,638,443
`5,640,564
`s,649,196
`5,67',r,952
`5,678,038
`5,678,046
`5,694,4'72
`5,694,596
`s,70r,316
`5,7 t0,922
`s,724,425
`5,'724,5s2
`5,742,807
`5,745,8',79
`5,7 57 ,9 t3
`5,7 57 ,9 t5
`5,781,629
`5,802,29t
`5,809,494
`5,826,049
`5,835,087
`s,864,683
`5,907,619
`s,907,704
`5,940,504
`5,978.791
`5,99t,414
`6,006,018
`6,134,603
`6,135,646
`6,415,280
`6,732,180
`6,8t6,872
`6,928,442
`2002/0052884
`2002/0082999
`2003/0078888
`2003/0078889
`2003/0095660
`2004/0139097
`2005100to792
`2005/0tt4296
`2007/01 85848
`2008/0065635
`2008/0066 i 9r
`2008/007 I 855
`2008/008255 1
`
`Wyman
`Cato et al.
`Perelson et ¿1.
`Coh¡ et al.
`Nelson et al. ................. 707/205
`Dorfma¡
`Coppersmith et al.
`Brunett
`Winte¡bottom
`Rader
`Fische¡
`Squibb
`Gopal et al.
`Friedman
`Eisenberg et al.
`Krawczyk
`Blickenst¿ff et ¿1.
`Neimat et al. .....
`Akizawa et al.
`Ross et al,
`Greenwood et al.
`Stern
`Burnett
`Fitzgerald et al.
`Gard¡rer et al. ....
`Neeman et al.
`Dao et al.
`Howa¡d
`Aziz
`Nuttall et al.
`Kinrlell et al.
`Velissaropoulos et al.
`Stefik et ¿1.
`Hamilton et al. ........
`Woodhill et al.
`Blakle¡ III et al.
`Dockter et al.
`Cahill et al.
`Joh¡son et al.
`Carnpbell
`Alferness et al.
`Alley et al,
`Chang et al.
`Taoda
`Masinter
`Wynarr
`Rellare et al.
`Aucsmith et al.
`Haber .................
`Balicketal.,.......
`Nguyen ..............
`Ogata et al.
`Her2 ...........,,,.,...
`Boeibe¡t et al.
`l)avis
`Gudmundson et al
`Griswold
`Fa¡ber et al.
`Garay et al.
`Burnett et al. . .....
`Jones et al. ..,..,...
`Kahn et ai.
`Falber et al,
`Hale et al.
`Squibb
`Fa¡ber et al.
`Farber et al.
`Lee et al.
`Lee et al.
`Lee et al.
`Lee et ¿1.
`Farber et al.
`Carpentier et al.
`Fa¡be¡ et al.
`Farbe¡ et al,
`Farber et al.
`Fa¡ber et al.
`Farber et al.
`Fa¡ber et al.
`
`7 13/t77
`709/202
`..707/1
`
`3461810
`
`... 39s/200.49
`..,. ... 709/330
`
`EXHIBIT 5 .2
`
`
`
`Case 5:18-md-02834-BLF Document 228-5 Filed 10/04/18 Page 4 of 71
`
`us 8,099,420 B2
`Page 3
`
`EP
`EP
`EP
`EP
`EP
`EP
`EP
`GB
`JP
`JP
`JP
`JP
`JP
`JP
`JP
`wo
`wo
`wo
`wo
`wo
`
`FOREIGN PATEN'I DOCUMENTS
`0 315 425
`5/1989
`0 558945 A2
`91t993
`0 566967 A2
`10t 1993
`0592045
`4t 1994
`o63t 226 A1
`12t 1994
`o 654 920
`5t 1995
`^2
`0 658 022 A2
`6/1995
`2294132 A
`4/1996
`4/1984
`59058564
`s/1 988
`63 - I 06048
`' 63-273961
`I 1/1988
`5/ t990
`2-t277 55
`6/t993
`0s162529
`06t87384 A2
`7 / t994
`06348558 A
`t2/ 1994
`t|t992
`wo 92120021
`wo 94106087
`31t994
`wo 94t209t3
`I I t994
`wo 95/01599
`1 I 1995
`wo 9'7143',717
`lllt997
`OTHER PUBLICATIONS
`
`Aka:¡ai a¡d MIT's Me¡norandurn in Support of Their Clairn Con-
`stur¡ction of USPÄT 5,978,791, d¿ted Aug, 31, 2001, f¡orn Civil
`Action No. 00-cv-l i851RWZ.
`Akar¡ai's Answer, Affirmalive Defenses and Counte¡claims to
`Amended Complaint, filed Dec. 6,2002,in Civil Action No.02-CV-
`1t43ORWZ.
`Akamai's Brief on Claim Construction, dated Aug. 8, 2003, from
`Civil Action No. 02-l1430 RWZ.
`A¡swer of Defenclant RIAA to Fi¡st Amended Complaint and Coun-
`terclaim, d¿ted Feb. 8. 2005, frorn Civil Action No. CV04-7456 JFW
`(crx).
`Berners-Lee, T. et al., "Hypefiext Tra¡sfer Protocol-HTTP/1.0,"
`May 1996, pp. l-54.
`Berners-Lee, T,, "Universal Resource Identifie¡s in WWW," Jun.
`1994,pp. l-25.
`Bowman, C. Mic, et al., "Harvest: A Scalable, Custornizable Discov-
`ery and Access Systern," Aug. 4, 1994, pp. 1-27 .
`Bowman, C. Mic, et al., "Harvest: A Scalable, Customizable Discov-
`ery and Access System," Mat. 12, 1995, pp. l-29.
`B¡isco, T., "DNS Support for Lo¿d Balancing," Apr. 1995, pp. 1-7.
`Browne, Shirley et al., "LocationJndependent Naming for Vifiual
`Distributed Software Repositories," 1995, 7 pages.
`Browne, Shirley et al., "Location-lndependent Naming for Vifiual
`Distributed Software Repositories," 1995, printed from htç:/www.
`netlib.org/utk/papers/lifn/main,html on Mar. 22, 2006, 18 pages.
`Civil Minutes General dated Jan. 25,2005, frotn Civil Action No. CV
`04-74s6-JFw (CTx).
`Cornplarnt for Palent Infringement, Permanent Injunction, and Darn-
`ages, dated Sep. 8, 2004, frorn Civil Action No. CV 04-7456 JFW
`(AJwx).
`CWIS' Opening Markma¡ Brief Constnring the Terms at Issue in
`U.S. P¿tentNo.6,415,280, dated Jul, 25,2003, f¡omCivil Action No.
`o2-11430 RW7..
`CWIS' Reply Ma¡krnan Brief Construing tlie Te¡ms at Issue in U.S.
`Patent No. 6,415,280, datedAug. 15, 2003, f¡om Civil Action No.
`02-11430 RWZ.
`Davis, James R., 'A Sen er for ¿ Distributed Digital Techlical Report
`Library," Jan. 15, 1994, pp. l-8.
`Declaration of Robert B.K. Dewar in Support of CWIS Construction
`of the Terms at Issue in U.S. Patent No. 6,415,280, d¿ted Jul. 25,
`2003. f¡om Civil Action No. 02-cv-11430RW2.
`Defendant Digitat Island's Opening Brief on Clairn Const¡uction
`Issues dated Aug. 17, 2001, frorn Civil Action No. 00-cv-11851-
`RWZ.
`Defendant Media Sentry Inc.'s Reply Memorandrim of Points and
`Authorities in Furthe¡ Support of Its Motion to Dismiss, d¿ted Nov.
`15,2004, f¡om Civil Action No. CV04-7456 JFW (CTx).
`Defendant MediaSentry Inc. 's Notice of Motion a¡d Motion to Dis-
`miss First Amended Complaint; Memo¡andum of Points and
`Arrthorities in Support The¡eof, dâted Dec. 13, 2004, f¡om Civil
`Action No. CV04-7456 JFW ,
`
`Defendant MediaSentry, Inc.'s A¡swer to Plaintiffs' Fi¡st Amended
`Complaint and Counterclaims, d¿ted Feb. 8, 2005, from Civil Action
`No. CV04-7456 JFW (CTx).
`Defendant RIAA's Notice of Motion and Motion to Disrniss First
`Amended Complaint; Memorardum of Points and Authorities in
`Snpport Thereof, dated Dec. 13, 2004, from Civil Action No. CV04-
`7456 JFw (CTx).
`Defenda¡ts Loudeye Corp.'s and Overpeer, Inc.'s A¡swer to Plain-
`tiffs' Fi¡st Amended Complaint a¡d Counterclaim' dåted Feb. 8,
`2005, f¡om Civil Action No. 04-'Ì456 JFW (AJWx).
`Defendants' PrelirninaryInvalidityContentions datedDec. 14,2006,
`from Civil Action No. CV 06-5086 SJO (Ex).
`European Search Report issued Dec. 23,2004 in correpsonding
`European Application No. 969 107 62.2 -220 l.
`Expert Report of P¡ofessor Ellis Ho¡owitz, dated Ma¡, 6, 2006, frorn
`Civil Action No, 04-7456 JFW (CTx).
`Expert Report of tle Honorable Gerald J. Mossinghoff, <lated Mar.
`13, 2006, frorn Civil Action No, 04-7456 JFW (CTx).
`Faltstlom, È et al., "How to Interact with a Whois++ Mesh," Feb.
`1996, pp. l-9.
`Fielding, R. et al., "Hypefiext Transfer Protocol-HTTP/l.1," Jan.
`1997, pp. l-163.
`Fielding, R. et a1., "HypertextTransfer Protocol-HTTP/I.1," Jun.
`1999, pp. l-157.
`First Amended Complaint fo¡ Patent Infringement, Pe¡manent
`Injunction and Darnages, datedNov.24,2004,ftom Civil Action No'
`CV 04-74s6 JFV/ (CTx).
`International Search Report dated Jun. 24, 1996 in coresponding
`international application PCTruS I 996/004733.
`Kha¡e, R. ard Lawrence, S., "Upgrading to TLS Witlin HTTP/l 1,"
`May 2000, pp, 1-12.
`Kim et al., "The Desigrr and Implementation of Tripwire: A file
`System Integrity Checker", COAST Labs. Dept. of Computer Sci-
`ences Prndue University, Feb, 23, 1995, pp, I - I 8.
`K¡uth, Donald 8., "The Art of Cotnputer Programming," 1973, vol.
`3,Ch.6.4, pp. 506-549.
`Mernorandum ofPoints and Authorities in Support ofLoudeye's and
`Overpeer's Motion to Dismiss the First A-rnended Complaint for
`Failure to State a Claim or, in the Alternative, for a More Definitive
`Statement, dated Dec. 13,2004, from Civil Action No. CV-04-7456
`JFW (AJWX).
`Moats, R., "URN Syntax," May 1997, pp. l-8.
`Myers, J. and Rose, M., "The Content-MD5 Header Field," Oct.
`1995, pp. l-4.
`Office Action in corresponding Japanese Application No. 531,073/
`1996 mailed on Apr. 25,2006.
`Office Communication in couesponding European Application No.
`969 107 62.2-1225 d¿ted Jan. 17, 2007.
`Order Re Claim Construction dated Nov. 8, 2001, from Civil Action
`No. 00-11851-RWZ.
`Patent Abstlacts of Japan, "Device fo¡ Generating Database and
`Method lor the Same," Application No. 03-080504, Sun Microsyst.
`Inc., published Jun. 1993, 38 pages.
`Patent Abstracts of Japan, "Method for Registering and Retrieving
`Data Base," Application No. 03-187303, Nippon Telegr. & Teleph
`Cory., published Feb. 1993, 1l pages.
`Plaintiffs' Memorandum of Points a¡d Authorities in Opposition to
`Londeye Defenda¡ts' Motion to Dismiss, dated Nov. 8, 2004, frorn
`Civil Action No, CV-04-7456 JFW (AJWX).
`Plaintiffs' Opposition to Media Sentry's Motion to Disrniss; Memo-
`¡andum ofPoints a¡d Ar¡thorities in Support Thereof, dated Nov 8,
`2004, fiom Civil Action No. CV 04-7456 JFW (CTx).
`Plaintifls Opposition to Recording Industry Association of Ame¡i-
`ca's Motion to Dismiss; Memorandum of Points and Authorities in
`Support Thereof, dated Nov. 8, 2004, fiom Civil Action No. CV-04-
`7456 JFW (CTx).
`Plaintiffs Reply to Defendant Loudeye Corp.'s and Overpeer, Inc.'s
`Counterclaims, d¿ted Ma¡. 3, 2005, from Civil Action No. CV
`04-74s6 JFw (CTx).
`Plaintiffs Reply to Defendant MediaSentry's Counterclaims, dated
`Ma¡. 3, 2005, from Civil Action No. CV 04-7456 JFW (CTx).
`Plaintiffs Reply to Defendant RIAA's Counterclaims, dated Ma¡.3,
`2005, from Civil Action No. 04-7456 JFW (CTx).
`EXHIBIT 5 - 3
`
`
`
`Case 5:18-md-02834-BLF Document 228-5 Filed 10/04/18 Page 5 of 71
`
`us 8,099,420 B2
`Page 4
`
`Reed W¿de (wade@cs.utk.eclu), "re: Dienst and BFD/LIFN docu-
`rnent," Aug. 8, 1994, printed from htç://www.webhistory.org/www.
`lists/www-talk1994c13/04l6.html on Mar. 22, 2006, (7 pages).
`Rivest, R., "The MD5 Message-Digest Algorithrni'Apr. 1992, pp.
`l-19 and erralâ sheel (l page),
`Rose, M,, "The Content-MD5 Header Field," Nov. 1993, pp. 1-3.
`Schneier, Bruce, "One-Way Hash Functions, Using Crypographic
`Algoritlrms for Hashing," 199 1, printed ftom httpl 1202.179 135.4 I
`datalDDJ/articlesl 1991 19 109 19 1909g/91 099.htm on Mar. 22, 2006.
`Sun Microsystems, Inc., "NFS: NetworkFile System Protocol Speci-
`ficalion," Ma¡. 1989, pp. 1-25,
`Vincenzetti, David and CoÍrozz| Massimo, "A¡ti Tampering Pro-
`gram," Proceedings of the Fourth {USENIX} Security Symposittrn,
`Santa Clara, CA, 1993, I 1 pages.
`Vincenzetti, David and Cotttozzi, Massimo, "Anti Tampering P¡o-
`gram," Proceedings of the Foruth {USENIXi Securiff Symposiurn.
`Santa Clara, CA, undated, printed from http://wwwja.nelcERl/
`VincenZetti a¡d Cotrozzi/N|P-Anti-Tarnp on Mar. 22,2006, 8
`pages.
`Berners-Lee, T. et ¿l., "Unifo¡m ResourceLocators (URL),"pp. I -25,
`Dec.1994.
`Danzig, PB., et al., ""Distlibuted indexing: A Scalable Mecha¡ism
`for Distributed Info¡rnation Retrieval,"" Proceedings of the l4th
`A¡nual International ACM SIGIR Conference on Research ¿nd
`Development in information Ret¡ieval, pp. 220-229, Oct. l3-16,
`199t,
`Hauzeur, B. M., 'A Model fo¡ Naming, Addressing, and Routing,"
`ACM Tra¡s. Inf. Syst. 4, Oct. 4, 1986), 293-3 I l.
`K-hoshafian, S. N. et al. 1986. Object identity. In Conf. Proc. on
`Object-Oriented Programming Systems, Languages and Applica-
`tions (Portland, Oregon, United States, Sep, 29-Oct. 2, 1986). N,
`Meyrowitz, Ed. OOPLSA '86. ACM Press, NewYork, NY, 406-416.
`Lantz, K. 4., et al., "Towa¡ds a univers¿l directory service." In Proc.
`4th A¡nual ACM Symp. on Principles of Distributed Computing
`(Minaki, Onta¡io, Canada). PODC '85. ACM P¡ess, NewYork, NY,
`250-260.
`Leach, P J., et al.. The file system ofan integrated local network, In
`Proc. 1985 ACM l3thA¡nual Conf. on Cornp. Sci, CSC'85. ACM
`Press, NY, NY,309-324.
`Leach, PJ., et al., "UIDs as Internal Names in a Distributed File
`System," In Proc. l st ACM SIGACT-SIGOPS Syrnp. on Principles of
`Distributed Computing (Ottawa, Canada, Aug, 18-20, 1982). PODC
`'82. ACM Press, NewYo¡k, NY, 34-41.
`}y'ra, C, 1992. On building very large naming systems. In P¡oc. 5th
`Workshop on ACM SIGOPS European Workshop: Models atrd Para-
`digms for Distributed Systerns Structuring (France, Sep. 21-23,
`1992). EW 5. ACM Press, NewYork, NY, 1-5.
`Peterson, L. L. 1988. A yellow-pages service for a local-area net-
`work. In P¡oc. ACM Workshop on Frontiers in Computer Colnmu-
`nications Technology (Vermont, 1987), J. J. Garcia-Luna-Aceves,
`Ed. SIGCOMM '87. ACM Press, NewYork,NY,235-242.
`Ravindran, K. and Ramakishna¡, K, K. 1991. A naming system for
`feature-based service specification in distributed operating systems.
`SIGSMALL/PC Notes 17, 3-4 (Sep. l99l), 12-21.
`Ross, K., "Hash-Routing for Collections of Sha¡ed Web Caches,"
`IEEE Network M agazine, pp. 37 44, Nov.-Dec. I 997.
`Schwartz, M., et al. 1987. A name service for evolving heterogeneous
`systems. In Proc. I lth ACM Syrnp. on OS Principles (Texas, Nov.
`8- 1 1, 1987). SOSP '87. ACM Pless, ¡{Y, l.IY, 52-62.
`Shaheen-Gouda, A. a¡d Loucks, L. 1992, Nzune borde¡s. In P¡oc, 5th
`Workshop on ACM SIGOPS European Workshop: Models and Para-
`digms for Distributed Systems Structuring (Mont Saint-Michel,
`France, Sep. 2l-23,1992). EW 5. ACM Press, NY, NY, 1-6.
`Terry D. B. 1984. An analysis of naming conventions for distrìbuted
`computer syste¡ns. In Proc. ACM SIGCOMM Symp.on Commu¡i-
`cations A¡chitech¡¡es and Protocols: Tutorials & Symp. SIGCOMM
`'84. ACM Press, NY, NY,218-224.
`Cheriton, David R. a¡d Mann, Tirnothy P, "Decentralizing a global
`naming service for improved performa¡ce a¡d fault tolerance", ACM
`T¡ansactions on Computer Systems, vol. 7, No. 2, May 1989, pp.
`147-l 83.
`Request for Reexamination of U.S. Patent No. 6,928,442: Reexam
`Control U.S. Appl. No. 90/010,260, ñledAug. 29,2008.
`
`Kim et al., "Experiences with Tripwire: Using Intergrity Checkers for
`Int¡usion Detection", COAST Labs. Dept, of Compnter Sciences
`Pr.rrdue Unive¡sily, F eb. 22, 1995, pp. l - i 2,
`Kim et at., "The Design and Lnplementation of Tripwire: A frle
`Systern Intergrity Checker", COAST Labs. Dept. of Computer Sci-
`ences Pudue Universiry Nov. 19, 1993, pp. l-21.
`Zhiyu Tian et al., A New Hashing Function: Statistic¿l Behavioiu a¡d
`Algorithm, pp, 3-13.
`G. L. F¡iedrnan, Digital Carnera with Apparatu fo¡ Authentication of
`Images Produced frotn an Image File, NASA Case No. NPO-I9108-
`l-CU, U.S. Appl. No. 08/159,980, filed Nov. 24,1993.
`H. Goodman, Ada, Object-Oriented Techniques, and Concurrency in
`Teaching Data St¡uchrres and File Management Repofi Documenta-
`tion p. AD-4275 385-94-042'77.
`Adv¿nces in Clyptology-EUROCRYPT'93; Workshop on the
`Theory and Application ofCryptographic Techniques Lofthus, No¡-
`way, May 23-2'7, 1993 Proceedings.
`Proceedings ofthe 1993 ACM SIGMOD International Conference on
`Management of Data, vol. 22, Issue 2, Jtt¡. 1993.
`Adva¡ces in Cryptology-AUSCRYPT
`'92-Workshop on the
`Theory and Application of Cryptographic 1'echniques Gold Coast,
`Queensland, Australi¿, Dec. 13-16, 1992 Proceedings.
`Witold Litwin et ¿1., Linea¡ Hashing for Distributed Files, ACM
`SIGMOD, May 1993, pp.327-336.
`Ming-Ling Lo et al., On Optimal Ptocessor Allocation to Suppofi
`Pipelined Hash Joins, ACM SIGMOD, pp.69-78' May 1993.
`Thom¿s A. Berson, Differential Cryptanalysis Mod232 with Appli-
`cations to MD5, pp.69-81.
`William Per¡izo et al., Dist¡ibuted Join Processing Performance
`Evalualion, Twenty-Seventh Hau'aii International Conference on
`System Sciences, vol. II, pp. 236-244.
`Vijay Krunar, A Concu'rency Control Mecha¡ism Based on Extend-
`ible Hashing for Main Memory Datab¿se SysteIns, ACM, vol 3,
`1989, pp. 109-l 13.
`Birgit Pfitzman, Sorting Out Signatu¡e Schemes, Nov. 1993, 1" Conf.
`Computer & Corrun. Securify '93, p. 74-85.
`Be¡t dem Boe¡et al., Collisions forthe compression function of MD5,
`pp.292-304.
`Sakti P¡amanik et al., Multi-Directory Hasing, 1993, Info. Sys', vol.
`l8,No. I,pp.63-74.
`Murlidhar Koushik, Dynarnic Hashing with Distrihrted Overflow
`Space: A File Organization with Good Insertion Performance, 1993,
`Info. Sys., vol. 18, No. 5,pp.299-317.
`Witold Litwin et al., LH*-Linear Hashing for Distributed Files, HP
`LabsTech. ReportNo. HPL-93-21, Jun. 1993; pp. l-22.
`Yuliang Zhen g et al., HAVAL Â One-Way Hashin g Al gorithm with
`Va¡iable Length of Output (Extended Abstract), pp. 83-105.
`Chris Cha¡nes and Josef Pieprzky, Linear Nonequivalence versus
`Nonlinearity, Pieprzþ pp. I 56-164.
`Gwertzrnan, James, et ¿1. "The Case for Geographical Push-Cach-
`ing." Technical Report I-lU TR 34-94 (excerpt), Harvard Universiry,
`DAS, Cambridge, MA 02138, 1994, 2 pgs.
`Grigni, Michelangelo, et al. "Tight Bounds on Minimurn Broadcasts
`Networks." SIAM Jou¡nal of Discrete Mathematics, vol, 4, No. 2,
`May 1991, pp.207-222.
`Devine, Robe¡t. "Design andlmplementation of DDH:A Distributed
`Dynamic Hashing Algorithm." In Proceedings of 4th International
`Conference on Foundations of Data Organizations and Algorithms,
`1993, pp. 101-l 14.
`Deering, Stephen, et al. "Multicast Routing in Datagram
`Internetworks and Extended t.ANs." ACM Transactions on Com-
`puter Systems, vol. 8, No. 2,May 1990, pp. 85-110.
`Cormen, Thornas H., et aL lntrcduction to AlSorithms, The MIT
`Press, Cambridge, Massachusetts, 1 994, pp. 2 19 -243, 99 1'993.
`Naor, Moni, et al. "The Load, Capacity and Availability of Quorum
`Systems." In Proceedings ofthe 35th IEEE Symposium on Found¿-
`tions ofComputer Science, Nov. 1994, pp,214-225.
`Nisan, Noam. "Psuedorandom Genʡators for Space-Bounded Com-
`putation." ln Proceedings of the Twenty-Second A¡nual ACM Sym-
`posium on Theory of Computing, May 1990, pp.204-212.
`Palmer, Mark, et al. "Fido: A Cache that Lea¡ns to Fetch." In Pro-
`ceedings ofthe lTtl International Confe¡ence on Very Large Data
`Bases, Sep. 1991. pp. 255-264.
`
`EXHIBIT 5 - 4
`
`
`
`Case 5:18-md-02834-BLF Document 228-5 Filed 10/04/18 Page 6 of 71
`
`us 8,099,420 B2
`Page 5
`
`Peleg, David, et al. "TheAvailabiltiy of Quorurn Systerns." Informa-
`tion and Computation 123, 1995,210-223.
`R¿bin, Michael. "Efficient Dispersal of Infonnation for Security,
`Load Balancing, and Fault Tolera¡ce." Journal of the ACM, vol. 36,
`No.2. Apr. 1989, pp, 335-348.
`R¿vi, R., "Rapid Rurnor Ramification: Approximating the Minimtmr
`Broadc¿st Tirne." In Proceedings of the 35th IEEE Syrnposium on
`Forrnd¿lion ofComputer Science, Nov. 1994, pp.202-213.
`Schrnidt, Jeanette, et al. "Chernoff-Hoeffding Bounds for Applica-
`tions witl Limited Independence." In Proceedings of the 4th ACS:
`SIAM Symposium on Discrete Algorithms, 1993, pp. 331-340.
`Tarjan, Robert Endre, et al, "Storing a Sparse Table." Communica-
`tions of the ACM, vol. 22, No. I l, Nov. 197 9, pp. 606-6 I l
`Wegman, Mark, et al. "New Hash Functions and TheirUse inAuthen-
`tication a¡d Set Equality." Journal ofComputer and System Sciences
`vol. 22, Jun. 1981, pp, 265-279.
`Vitter', Jeffrey Scott, et al. "Optimal Prefetching via Data Compres'
`sion." In Proceedings of32nd IEEE Synpositun on Foltndations of
`Cornpnter Science, Nov. 1991, pp. 121-130.
`Fredman, Michael, et al. "Storing a Sparse Table with 0(1) Worst
`Case Access Tirne," Journal of the Association i'or Colnputing
`Machinery, vol. 3 l, No. 3, Jul, 1984, pp. 538-544.
`Yao, A¡d¡ew Chi-Chih. "Should Tables be Sorted?" Journal ofthe
`Associalion for Computing Machinery vol, 28, No, 3, Jut. 198 t, pp.
`6 1 5-628.
`Floyd, Sally, et al.'â reliable Multicast F¡amewolkfor Light-Weight
`Sessions and Application Level Frarning." In Proceedings of ACM
`SIGCOMM'95, pp. 342-356.
`Feeley, Michael, et al. "lmplementing Global Memory Management
`in a Wo¡kstation Cluste¡." In Proceedings of the 1Sth ACM Syrnpo-
`sium on Operating Systems Principles, 1995, pp, 201-212.
`Ca:ter, J. Lawrence, et ¿1. "Universal Classes of Hash Fu¡ctions."
`Jorunal of Computer and System Sciences, vol. I 8, No, 2, Apr. 1 979
`pp.143-154.
`Patent Abst¡acts of Japan, "Electronic Mail Multiplexing System and
`Commrnication Control Method in The Systern." 06/30/19993, JP
`05162529.
`Kirn et a.l., "Experiencess with Tripwire: Using Intergrity Checkers
`for Intnrsion Detection", COAST Labs. Dept. of Computer Sciences
`Pu¡due Universily, F eb. 22, i 995, pp. I -12.
`Kim et al., "The Design and Implementation of Tripwire: A file
`System Intergrity Checker", COAST Labs, Dept. of Computer Sci-
`ences Pu¡due University, Nov. 19, 1993, pp. l-21.
`Bert Dem Boer et al., Collisions for the compression function of
`MDs, pp. 292-304.
`Sakti Pramanik et al., Multi-Directory Hashing, l993,Info. Sys., vol.
`18,No. I, pp.63-74.
`Mrulidha¡ Koushik, Dynamic Hashing with Distrubuted Overflow
`Space: A File Organization with Good Insertion Pe¡fo¡ma¡ce, 1993,
`Info. Sys,, vol. 18, No. 5,pp:299-317.
`Witold Litwin et ¿1., LFI*-Linea¡ Hashing fo¡ Dist¡ibuted Files, HP
`LabsTech. ReportNo. HPL-93-21, Jun. 1993, pp.1-22.
`Yuliang Zheng et al., HAVAL-A One-Way Hashing Algorithrn with
`Va¡iable Length ofOutput (ExtendedAbstract), 1993, pp. 83-105.
`Chris Cha¡nes and Josef Pieprzþ Linear Nonequivalence versus
`Nonlinearity, Pieprzþ 1993, pp. 156-164.
`Withold Litwin et al.; Linear Hashing for Dist¡ibuted Files, ACM
`SIGMOD, May 1993, pp.327-336.
`Ming-t,ing Lo et al., On Optimal Processor Allocation to Support
`Pipelined.Hash Joins, ACM SIGMOD, pp. 69-78, May 1993,
`Thorna.s A. Berson, Differential Cryptanalysis Mod 232 with Appli-
`cations to MD5, pp.69-81.
`Willia:n Perizo et al., Distributed Join Processing Performance
`Evaluation, Twenf-Seventh Hawaii International Conference on
`System Sciences, vol. II, pp. 236-244.
`Vijay Krunar, A Concurrency Ccintrol Mechanism Based on Extend-
`ible Hashing for Main Memory Database Systems, ACM, vol. 3,
`1 989, pp. 1 09- 1 13.
`Biryit Pfitznån, Sorting Out Signature Schemes, Nov. 1993, i"/ Conf.
`Cornputer & Comm, Security '93, p. 74-85.
`Zhiyu Tian et al,, A New Hashing Function: Statistical Behaviou¡ and
`Algorithm, Spring 1993, pp. 3-13.
`
`'
`
`G.L. F¡iedman, Digital Camera with Apparatus for Authenticaf ion of
`Lnages Produced frorn an Image File, NASA Case No. NPO-19108-
`l-CU, U.S. Appl. No.08/159,980, Nov. 24, 1993.
`H. Good:nan, Ad¿, Object-Oriented Techniques, and Concrurency in
`Teaching Data Structures and File Management Report Docttmenta-
`tion p. AD-4275 385-94-0427'1.
`Advances in Cryptology-EUROCRYPT '93, Workshop on the
`Theory and Application of Cryptographic Techniques Lofthus, Nor-
`way, May 23-2'/, 1993, Proceedings.
`Proceedings on the 1993 ACM SIGMOD International Conference
`on Maragement of Datq vol. 22, Issue 2, Jun. I 993'
`Adva¡ces of Cryptology-AUSCRYPT
`'92-Workshop on the
`Theory and Application of Cryptographic Techniques Gold Coast,
`Queensland, Australia, Dec. 13-16, 1992 Proceedings
`Tarjan, Robert Endre, et al., "storing a Spalse Table", Communica-
`tions of theACM,vol.22, No. ll, Nov. 1979,pp.606-611.
`Wegman, Malketal., "New Hash Functions andThei¡Use inAuthen-
`tication and Set Equality", Journal of Computer and System Sci-
`ences, vol.22, Jrur. 1981, pp.265-279.
`Vitter, Jeffrey Scott et al., "Optimal Prefetching via Data Compres-
`sion", In Proceedings of 32nd IEEE Symposirun on Fund¿tions of
`Computer Science, Nov. 1991, p. 121-130.
`Friedrnan, Michael et al., "Storing a Sparse Table with 0(1) Worst
`Case Access Tirne", Journal of the Association for Cornputing
`Machinery, vol. 31, No.3, Jul. 1984, pp. 538-544.
`Yao, Andrew Chi-Chih, "should Tables be Sorted?", Jou¡nal ofthe
`Association for Cornputing Machinery vol. 28, No. 3, Jul' 1981, pp'
`6t5-628.
`Floyd, Sally et al., 'A Reliable Multicast Framework for Light-
`Vy'eight Sessions and Application Level Framing", In Proceedings of
`ACM SIGCOMM'95, pp. 342-356.
`Feeley, Michael, et al., "Implementing Global Memory Managetnent
`in aWorkstation Cluster", In Proceedings of the l5thACM Sympo-
`siurn on Operating Systems Principles, 1995, pp. 201'212.
`Carter, J. Lauence, et al., "Universal Classes of Hash Functions",
`Journal of Computer ald System Sciences, vol l 8, No. 2, Apr. 19?9'
`pp.143-i54.
`Patent Abstracts of Japan, "Electronic Mail Multiplexing System and
`Commu¡ication Control Method in the System", Jun 30, 1993, JP
`05t62529.
`Kim et al., "Experiences with Tripwire: Using Integrity Checkers fo¡
`Intrusion Detection", COAST Labs. Dept. of Computer Sciences
`Purdue University, Feb. 22, 1995, pp. l -l 2.
`Kim et al., "The Design and Implementation of Tripwire: A File
`System Integrity Checke¡", COAST Labs. Dept. of Computer Sci-
`ences Ptudue University, Nov. 19, 1993, pp. I -2 1,
`Peter Deutsch (peterd@buryip,com), "Re: MD5 and l.lFNs (was:
`Misc Cornments)", www.acl.lanl.gov/lJRl/archive/uri-94q2 mes-
`sages/0 106.html, Apl 26, 199 4.
`Alex¿nder Dupuy (dupuy@smafs.cotn), "RE: MD5 and LIFNs
`(was: Misc Comments)", www.acl.lanl.gov/IJRl/archive/uri-94q2
`messages/O1 l3.htrnl, Apr. 26, 1994.
`Alexa¡der Dupuy (dupuy@smarts.com), "MD5 and LIFNs (was:
`Misc Comrnents)", www.acl.lanl.gov/uRl/archive/uri-94q2 mes-
`sages/0081 .html , Apl l7 , 1994.
`Albert Langer (cmf85l@anu.oz.au), http://groups.google.com/
`groups?selm: I 9 9 | Aug7,22 5 1 59.786olo40newshost.anu.edu.au&
`oe:UTF-8&ouþut:gplain, Aug. 7, 1991.
`Clifford Lynch (Calur@uccmvsa.bitnet), "ietf url/uri overview draft
`paper (long)", wwwacl.lanl.govÂJRl/a¡chive/uri-93ql.messages/
`00l5.html, Mar. 25, 1993.
`K. Sollins ¿nd L. Masintet "Functional Requirements fo¡ Uniform
`Resource Names", www.w3.org/Addressing/rfc173?,fit, Dec. 1994,
`pp.l-7.
`W3C:ID, HTTP: A protocol for networked infoimation, "Basic
`HTTP as delìred in 1992", www.w3.orglProtocols/HTTP2.html,
`1992.
`Defendant Lime Wire, LLC's Answer, Affi¡mative Defenses and
`Counterclaims datedNov. 15, 2007,from Civil Action No. 07-06161
`vBF (PLAX).
`
`EXHIBIT 5 - 5
`
`
`
`Case 5:18-md-02834-BLF Document 228-5 Filed 10/04/18 Page 7 of 71
`
`us 8,099,420 B2
`Page 6
`
`Kim, Gene H., and SpafTord, Eugene H., "Writing, Supporting, and
`Evaluating Tripwire: A Publicly Available Security Tool," COAST
`Labs. Dept. of Computer Sciences Purdne University, Mar. 12, 1994,
`pp. l-23.
`U.S. Appl, No. l1/980,679-May 6,2009 PTO Office Action.
`USPTO, Non-Final Office action rnailed Jun. 15, 2009 in U.S. Appl.
`No. I l/980,687.
`USPTO, Non-Final Office action mailed Jun. 18, 2009 in Reexam
`U.S. Appl. No. 90/01 0,260,
`Cornmu¡rication from EPO in European Application No. 96 910
`'162.2-1225 dated May 8, 2009 [4 pgs.].
`McGregor D. R. and Ma¡iani, J. A. "Fingerprinting A technique for
`file identification and maintena¡ce," Software: Practice and Experi-
`ence, vol. 12, No. 12, Dec. 1982, pp. t 165-l 166.
`[Proposed] Order Regarding Constntction of Terms, filed Mar. 29,
`2007 in C.D, Cal, caseNo. CV 06-5086 SJO (Ex) [9 pgs.].
`Analysis of Plaintiffs' Claim Cha¡t for the '280 Patent As Against
`Defendant Media Sentry, Inc. i1 pages.
`Analysis of Plaintiffs' Claim Cha¡t for the '791 Patent As Against
`Defendant Media Sentry, Inc. ( I I 9 16.00 1.0 I 50.a) pp, i -48.
`Analysis of Plaintiffs' Clairn Chart for the '791 Patent As Against
`Defendan( Overpeer pp. I -40.
`B¿¡ba¡a, D., et al., "Exploiting sytnmetries for low-cost cornparison
`of file copies," 8th Int'l Conf. on Dist¡ibuted Computing Systems,
`Jrrn. 1988, pp.411-419, San Jose, CA.
`Campbell, M., "The Design of Text Signatures for Text Retrieval
`Systems," Tech. Repof, Sep. 5, 1994, Deakin University, School of
`Computing & Math., Geelong, A