throbber
Case 5:18-md-02834-BLF Document 228-5 Filed 10/04/18 Page 1 of 71
`Case 5:18—md-02834-BLF Document 228-5 Filed 10/04/18 Page 1 of 71
`
`EXHIBIT 5
`EXHIBIT 5
`
`

`

`Case 5:18-md-02834-BLF Document 228-5 Filed 10/04/18 Page 2 of 71
`I tilll illilll lll lllll lllll llill lllll lllll lllll lill lllll llllll llll lil llll
`us00809942082
`
`(12) United States Patent
`Farber et al.
`
`1ro; Patent No.:
`1+s; Date of Patent:
`
`us 8,099,420 B2
`*Jan. 17,2012
`
`(54) ACCBSSTNG DATA INA DÄTA PROCBSSING
`SYSTEM
`(75) Inventors:
`
`David À. Farber, Ojai, CA (tJS);
`Ronald D. Lachman, Northbrook, IL
`(US)
`
`(73) Assignees:
`
`( * ) Notice:
`
`PersonalWeb Technologies, LLC, Tyler,
`TX (US); Level 3 Communications,
`LLC, Broomfield, CO (US)
`
`Subject to any disclairner, the tenn ofthis
`patent is extended or adjusted under 35
`U.S.C. 154(b) by 1312 days.
`This patent is subject to a temrinal dis-
`claimer.
`
`(21)
`
`(22)
`
`(6s)
`
`Appl. No.: 111017,650
`Filed: Dec.22,2004
`
`Prior Publication Data
`US 2005/0114296 Al
`May 26,2OOJ
`
`Related U.S. Application Data
`(60) Continuation of application No. 09/987,723, filed on
`Nov. 15, 2001, now Pat. No. 6,928,442, which is a
`continuation of application No. 09/283,160, filed on
`Apr. 1, 1999, now Pat. No. 6,41,5,280, which is a
`division of application No. 08/960,079, filed on Oct,
`24, 1997, now Pat. No. 5,978,791, which is a
`continnation of application No. 08/425,160, filed on
`Apr. 1 1, 1 995, now abandoned.
`
`(s 1)
`
`(52)
`(s8)
`
`Int. Cl.
`G06F l7/-10
`(2006.01)
`7 07 /7 58; 7 07 17 81 ; 7 07 l82r
`U.S. CI.
`Field of Classification Search
`7071758,
`707178r,821
`See application file for complete search history.
`
`(56)
`
`References Cited
`
`U.S. PATENT DOCUMENTS
`Evangelisti
`3,668,647 A.
`6/19'.72.
`3,835,260 A
`Prescher et al
`9/r9',74
`4,096,s68 A
`6/1918
`Bennett et al.
`'7n980
`4,2t5,402 A
`Mitchell
`4,22t,003 A.
`9/1980
`Chang et al.
`Cichelli
`91t981
`4,290,105 A.
`Rivest
`4,376,299 A.
`3/1983
`4,405,829 A
`fuvest
`911983
`4,4t2,285 A,
`I 0/l 983
`Neches
`(Continued)
`
`EP
`
`FOREIGN PATENT DOCUMENTS
`0268069 A2
`511988
`(Continued)
`
`OTHER PUBLICATIONS
`
`Affidavit of Tirnothy P Walker in SuppoÍ of CWIS' Opening Mark-
`man Brief Construing the Terms at Issue in U.S. Patent No
`6,415,280, d¿ted Jul. 25, 2003, from Civil Action No. 02-11430
`RWZ.
`
`(Continued)
`
`B Pham
`
`Berquist
`
`Prímaryt Examíner -KhanTt
`(74) Attorney, Agent, or Firm - Davidson
`Jackson & Gowdey, LLP; Brian Siritzþ
`(57)
`ABSTRACT
`Access to data items uses names based on the data in the data
`iterns; the name of a data item may be based, at least in part,
`on a function of some or all of the bits that comprise the data
`item. A data item may comprise an arbitrary sequence of bits.
`The function may include a hash function or a rnessage digest
`function. The name of a data item may be compared to a list
`of names of other data items.
`
`,J,
`
`DATA ITEM
`
`COMPUTE II,IID FUNCTON ON
`DATA ITEM
`
`APPEND LENGTH MODULO 32 OF
`DATA TTEM
`
`I
`
`L78 Claims,31 Drawing Sheets
`
`EXHIBIT 5 - 1
`
`

`

`Case 5:18-md-02834-BLF Document 228-5 Filed 10/04/18 Page 3 of 71
`
`725/92
`
`'709/2t9
`
`.... 7051s4
`.. 7091303
`
`8/ 1 995
`8/1 995
`9t r995
`9^995
`9ll99s
`9l t995
`9l 1995
`l0/1 995
`t1/1995
`1r/1995
`12/1995
`r2tr995
`2t t996
`3^996
`41t996
`6/1996
`7/1996
`7/1996
`811996
`9il996
`t0il996
`12t 1996
`tzl t996
`tzt t996
`t2/1996
`t2/1996
`1/t99't
`211997
`2n997
`2^9g',l
`st t99'l
`5/199',1
`6/199'.7
`6/r99',1
`7 I 1997
`10t 1997
`t0/ t997
`t0lt99'7
`t2l t997
`t2/1997
`t21199',7
`l/1 998
`3/1998
`3/t998
`4l t998
`4l t998
`5/1998
`5t t998
`7n998
`9/1998
`9/1998
`l0/1998
`r r/r998
`tl1999
`5l 1999
`511999
`81t999
`tll t999
`I U t999
`t2/1999
`10/2000
`l0/2000
`7/2002
`5/2004
`11/2004
`8/2005
`st2002
`6t2002
`4t2003
`4t2003
`5/2003
`7/2004
`1/2005
`5/2005
`3t2007
`3/2008
`3/2008
`3/2008
`3/2008
`
`AAAAAAAAAAAAAA AAAAA
`
`A A AAAAAAA AAAAAA AAAAAAAAAAAA AAAAAAAAB
`
`I
`BI
`BI
`B2
`AI
`AI
`A1
`AI
`A1
`AI
`A1
`AI
`AI
`A1
`AI
`AI
`AI
`
`8
`
`us 8,099,420 B2
`Page 2
`
`U,S, PATENT DOCUMENTS
`I l/1983
`Summer, Jr.
`Fletcher
`4/ 1984
`8i l 984
`Benhase
`Dixon
`t2t 1984
`Schmidt et al.
`t2l 1985
`2l t986
`Emry, Jr.
`Matick
`311986
`Ausla¡der
`2l t987
`Me¿den
`2t t98',1
`Hellma¡
`4t t98"/
`Grune¡
`6t198'7
`Rivest
`9n98',7
`Kronstadt
`211988
`Zamota
`9i 1988
`Clancy et al.
`4/ 1989
`Holloway
`t2t 1989
`Ba¡nes
`t2t 1989
`Ba¡atz et al.
`4t 1990
`Swineha¡t et al.
`4t 1990
`Holloway
`5l 1990
`Chu¡m et al. ..........
`5/ I 990
`Robef et al.
`6t t990
`Arnold et al,
`8/ 1990
`Ryder, Sr. et al.
`8/1990
`Burke
`I l/1990
`5t t99 |
`Ma¡sfield et al.
`6t 199 I
`Cho
`7t t99l
`Hecht et al.
`Schwarlz et al.
`9/ 199 1
`Marca
`9/ 199 1
`Dyson
`9/ 199 1
`Colwell
`t0/ 199 1
`t2t 199 I
`Bende¡t
`Mazzario
`1t 1992
`Miller
`5t 1992
`'il t992
`Kobayashi
`Tirfing
`7 I t992
`Pogue, Jr,
`9l 1992
`tU t992
`Orita
`Colwell
`v t993
`v 1993
`Tamura et al.
`Scott
`3/ 1993
`Gra.mlich et al. ......
`4/ 1993
`Wyman
`4/ 1993
`Cheng et al.
`4/ 1993
`4/t993
`Wittenberg et al.
`Volle¡t
`5l 1993
`6/t993
`Waite et al,
`7t 1993
`Quan
`8/ t993
`Nukui
`Reed et al,
`81 1993
`Fukuzawa et al.
`9l t993
`t ll 1993
`Wymao
`U t994
`Forrest et al.
`U t994
`Howell
`2t t994
`Nemes ..........,........
`2t t994
`Gram
`Ba¡non et al.
`3t t994
`4l t994
`Rajani
`Hamilton
`4i 1994
`Cuenod et ¿1.
`5/ 1994
`6/ 1994
`E¿st et al,
`Parker
`8/ 1994
`Pitkin et al. ............
`8/ 1994
`Moore
`8/ 1994
`Flynn et al.
`9/ 1994
`Leighton et al,
`9/ 1994
`10/ t994
`Talbott et al.
`10/ t994
`Megory-Cohen
`10/ t994
`Oprescu et al.
`10/ t994
`Talbott et al.
`Clrk et al.
`1 v t994
`B¡own et al.
`t2l t994
`12 t994
`Hunte¡ et al.
`I t995
`Cannon
`2t r995
`Hunter et al.
`Belsa¡ et al.
`4/ t995
`Kon¡ad
`41 1995
`
`4,414,624
`4,441,t 55
`4,464,7 13
`4,490,782
`4,558,413
`4,5'7 t,',100
`4,577,293
`4,642,'764
`4,642,793
`4,658,093
`4,675,8r0
`4,69t,299
`4,725,945
`4,7'13,039
`4,821 ,I 84
`4,887,235
`4,888,681
`4,9 14,57 r
`4,9 t4,586
`4,922,414
`4,922,417
`4,93'7,863
`4,949,302
`4,953,209
`4,9',72,367
`5,014,192
`5,025,421
`5,032,979
`5,04'7,9t8
`5,050,074
`5,050,212
`5,05?,837
`5,07'7,658
`5,084,8 15
`5,1 i7,351
`,129,081
`,r29,082
`,144,667
`,163,t47
`, r 79,6 80
`,182,799
`,199,073
`,202,982
`,204,897
`,204,958
`,204,966
`,208,858
`,222,134
`,230,051
`,239,648
`,241,6',/ I
`,24'/,620
`,260,999
`,216,869
`,276,901
`,287,499
`,287,514
`,291,279
`,301,286
`,301,316
`,3t7,693
`,32t,841
`,339,403
`,341,477
`,343,52'7
`,34'7,653
`,351,302
`,357,440
`,357,623
`,357,630
`,359,523
`,361,356
`,37t,891
`,3'75,206
`,384,565
`,394,555
`,403,639
`,404,508
`
`70711
`
`... 70"Ì12
`
`a^11)
`
`...... 7091226
`
`5,438,508
`5,442,343
`s,448,668
`5,448,7 18
`5,452,447
`5,454,000
`5,454,039
`5,459,860
`5,46s,365
`s,467 ,47 |
`s,4'/5,826
`s,419,654
`5,491,8 r7
`5,499,294
`5,504,879
`5,530,7 57
`5,5 37,5 85
`5,542,087
`s,s48,"t24
`5,s 53,143
`5,568,1 8l
`5,581,615
`5,5 8l,758
`5,581,764
`5,s 83,995
`5,588, l4?
`5,596,"/44
`5,600,834
`s,604,803
`s,604,892
`5,630,067
`s,632,031
`5,638,443
`5,640,564
`s,649,196
`5,67',r,952
`5,678,038
`5,678,046
`5,694,4'72
`5,694,596
`s,70r,316
`5,7 t0,922
`s,724,425
`5,'724,5s2
`5,742,807
`5,745,8',79
`5,7 57 ,9 t3
`5,7 57 ,9 t5
`5,781,629
`5,802,29t
`5,809,494
`5,826,049
`5,835,087
`s,864,683
`5,907,619
`s,907,704
`5,940,504
`5,978.791
`5,99t,414
`6,006,018
`6,134,603
`6,135,646
`6,415,280
`6,732,180
`6,8t6,872
`6,928,442
`2002/0052884
`2002/0082999
`2003/0078888
`2003/0078889
`2003/0095660
`2004/0139097
`2005100to792
`2005/0tt4296
`2007/01 85848
`2008/0065635
`2008/0066 i 9r
`2008/007 I 855
`2008/008255 1
`
`Wyman
`Cato et al.
`Perelson et ¿1.
`Coh¡ et al.
`Nelson et al. ................. 707/205
`Dorfma¡
`Coppersmith et al.
`Brunett
`Winte¡bottom
`Rader
`Fische¡
`Squibb
`Gopal et al.
`Friedman
`Eisenberg et al.
`Krawczyk
`Blickenst¿ff et ¿1.
`Neimat et al. .....
`Akizawa et al.
`Ross et al,
`Greenwood et al.
`Stern
`Burnett
`Fitzgerald et al.
`Gard¡rer et al. ....
`Neeman et al.
`Dao et al.
`Howa¡d
`Aziz
`Nuttall et al.
`Kinrlell et al.
`Velissaropoulos et al.
`Stefik et ¿1.
`Hamilton et al. ........
`Woodhill et al.
`Blakle¡ III et al.
`Dockter et al.
`Cahill et al.
`Joh¡son et al.
`Carnpbell
`Alferness et al.
`Alley et al,
`Chang et al.
`Taoda
`Masinter
`Wynarr
`Rellare et al.
`Aucsmith et al.
`Haber .................
`Balicketal.,.......
`Nguyen ..............
`Ogata et al.
`Her2 ...........,,,.,...
`Boeibe¡t et al.
`l)avis
`Gudmundson et al
`Griswold
`Fa¡ber et al.
`Garay et al.
`Burnett et al. . .....
`Jones et al. ..,..,...
`Kahn et ai.
`Falber et al,
`Hale et al.
`Squibb
`Fa¡ber et al.
`Farber et al.
`Lee et al.
`Lee et al.
`Lee et al.
`Lee et ¿1.
`Farber et al.
`Carpentier et al.
`Fa¡be¡ et al.
`Farbe¡ et al,
`Farber et al.
`Fa¡ber et al.
`Farber et al.
`Fa¡ber et al.
`
`7 13/t77
`709/202
`..707/1
`
`3461810
`
`... 39s/200.49
`..,. ... 709/330
`
`EXHIBIT 5 .2
`
`

`

`Case 5:18-md-02834-BLF Document 228-5 Filed 10/04/18 Page 4 of 71
`
`us 8,099,420 B2
`Page 3
`
`EP
`EP
`EP
`EP
`EP
`EP
`EP
`GB
`JP
`JP
`JP
`JP
`JP
`JP
`JP
`wo
`wo
`wo
`wo
`wo
`
`FOREIGN PATEN'I DOCUMENTS
`0 315 425
`5/1989
`0 558945 A2
`91t993
`0 566967 A2
`10t 1993
`0592045
`4t 1994
`o63t 226 A1
`12t 1994
`o 654 920
`5t 1995
`^2
`0 658 022 A2
`6/1995
`2294132 A
`4/1996
`4/1984
`59058564
`s/1 988
`63 - I 06048
`' 63-273961
`I 1/1988
`5/ t990
`2-t277 55
`6/t993
`0s162529
`06t87384 A2
`7 / t994
`06348558 A
`t2/ 1994
`t|t992
`wo 92120021
`wo 94106087
`31t994
`wo 94t209t3
`I I t994
`wo 95/01599
`1 I 1995
`wo 9'7143',717
`lllt997
`OTHER PUBLICATIONS
`
`Aka:¡ai a¡d MIT's Me¡norandurn in Support of Their Clairn Con-
`stur¡ction of USPÄT 5,978,791, d¿ted Aug, 31, 2001, f¡orn Civil
`Action No. 00-cv-l i851RWZ.
`Akar¡ai's Answer, Affirmalive Defenses and Counte¡claims to
`Amended Complaint, filed Dec. 6,2002,in Civil Action No.02-CV-
`1t43ORWZ.
`Akamai's Brief on Claim Construction, dated Aug. 8, 2003, from
`Civil Action No. 02-l1430 RWZ.
`A¡swer of Defenclant RIAA to Fi¡st Amended Complaint and Coun-
`terclaim, d¿ted Feb. 8. 2005, frorn Civil Action No. CV04-7456 JFW
`(crx).
`Berners-Lee, T. et al., "Hypefiext Tra¡sfer Protocol-HTTP/1.0,"
`May 1996, pp. l-54.
`Berners-Lee, T,, "Universal Resource Identifie¡s in WWW," Jun.
`1994,pp. l-25.
`Bowman, C. Mic, et al., "Harvest: A Scalable, Custornizable Discov-
`ery and Access Systern," Aug. 4, 1994, pp. 1-27 .
`Bowman, C. Mic, et al., "Harvest: A Scalable, Customizable Discov-
`ery and Access System," Mat. 12, 1995, pp. l-29.
`B¡isco, T., "DNS Support for Lo¿d Balancing," Apr. 1995, pp. 1-7.
`Browne, Shirley et al., "LocationJndependent Naming for Vifiual
`Distributed Software Repositories," 1995, 7 pages.
`Browne, Shirley et al., "Location-lndependent Naming for Vifiual
`Distributed Software Repositories," 1995, printed from htç:/www.
`netlib.org/utk/papers/lifn/main,html on Mar. 22, 2006, 18 pages.
`Civil Minutes General dated Jan. 25,2005, frotn Civil Action No. CV
`04-74s6-JFw (CTx).
`Cornplarnt for Palent Infringement, Permanent Injunction, and Darn-
`ages, dated Sep. 8, 2004, frorn Civil Action No. CV 04-7456 JFW
`(AJwx).
`CWIS' Opening Markma¡ Brief Constnring the Terms at Issue in
`U.S. P¿tentNo.6,415,280, dated Jul, 25,2003, f¡omCivil Action No.
`o2-11430 RW7..
`CWIS' Reply Ma¡krnan Brief Construing tlie Te¡ms at Issue in U.S.
`Patent No. 6,415,280, datedAug. 15, 2003, f¡om Civil Action No.
`02-11430 RWZ.
`Davis, James R., 'A Sen er for ¿ Distributed Digital Techlical Report
`Library," Jan. 15, 1994, pp. l-8.
`Declaration of Robert B.K. Dewar in Support of CWIS Construction
`of the Terms at Issue in U.S. Patent No. 6,415,280, d¿ted Jul. 25,
`2003. f¡om Civil Action No. 02-cv-11430RW2.
`Defendant Digitat Island's Opening Brief on Clairn Const¡uction
`Issues dated Aug. 17, 2001, frorn Civil Action No. 00-cv-11851-
`RWZ.
`Defendant Media Sentry Inc.'s Reply Memorandrim of Points and
`Authorities in Furthe¡ Support of Its Motion to Dismiss, d¿ted Nov.
`15,2004, f¡om Civil Action No. CV04-7456 JFW (CTx).
`Defendant MediaSentry Inc. 's Notice of Motion a¡d Motion to Dis-
`miss First Amended Complaint; Memo¡andum of Points and
`Arrthorities in Support The¡eof, dâted Dec. 13, 2004, f¡om Civil
`Action No. CV04-7456 JFW ,
`
`Defendant MediaSentry, Inc.'s A¡swer to Plaintiffs' Fi¡st Amended
`Complaint and Counterclaims, d¿ted Feb. 8, 2005, from Civil Action
`No. CV04-7456 JFW (CTx).
`Defendant RIAA's Notice of Motion and Motion to Disrniss First
`Amended Complaint; Memorardum of Points and Authorities in
`Snpport Thereof, dated Dec. 13, 2004, from Civil Action No. CV04-
`7456 JFw (CTx).
`Defenda¡ts Loudeye Corp.'s and Overpeer, Inc.'s A¡swer to Plain-
`tiffs' Fi¡st Amended Complaint a¡d Counterclaim' dåted Feb. 8,
`2005, f¡om Civil Action No. 04-'Ì456 JFW (AJWx).
`Defendants' PrelirninaryInvalidityContentions datedDec. 14,2006,
`from Civil Action No. CV 06-5086 SJO (Ex).
`European Search Report issued Dec. 23,2004 in correpsonding
`European Application No. 969 107 62.2 -220 l.
`Expert Report of P¡ofessor Ellis Ho¡owitz, dated Ma¡, 6, 2006, frorn
`Civil Action No, 04-7456 JFW (CTx).
`Expert Report of tle Honorable Gerald J. Mossinghoff, <lated Mar.
`13, 2006, frorn Civil Action No, 04-7456 JFW (CTx).
`Faltstlom, È et al., "How to Interact with a Whois++ Mesh," Feb.
`1996, pp. l-9.
`Fielding, R. et al., "Hypefiext Transfer Protocol-HTTP/l.1," Jan.
`1997, pp. l-163.
`Fielding, R. et a1., "HypertextTransfer Protocol-HTTP/I.1," Jun.
`1999, pp. l-157.
`First Amended Complaint fo¡ Patent Infringement, Pe¡manent
`Injunction and Darnages, datedNov.24,2004,ftom Civil Action No'
`CV 04-74s6 JFV/ (CTx).
`International Search Report dated Jun. 24, 1996 in coresponding
`international application PCTruS I 996/004733.
`Kha¡e, R. ard Lawrence, S., "Upgrading to TLS Witlin HTTP/l 1,"
`May 2000, pp, 1-12.
`Kim et al., "The Desigrr and Implementation of Tripwire: A file
`System Integrity Checker", COAST Labs. Dept. of Computer Sci-
`ences Prndue University, Feb, 23, 1995, pp, I - I 8.
`K¡uth, Donald 8., "The Art of Cotnputer Programming," 1973, vol.
`3,Ch.6.4, pp. 506-549.
`Mernorandum ofPoints and Authorities in Support ofLoudeye's and
`Overpeer's Motion to Dismiss the First A-rnended Complaint for
`Failure to State a Claim or, in the Alternative, for a More Definitive
`Statement, dated Dec. 13,2004, from Civil Action No. CV-04-7456
`JFW (AJWX).
`Moats, R., "URN Syntax," May 1997, pp. l-8.
`Myers, J. and Rose, M., "The Content-MD5 Header Field," Oct.
`1995, pp. l-4.
`Office Action in corresponding Japanese Application No. 531,073/
`1996 mailed on Apr. 25,2006.
`Office Communication in couesponding European Application No.
`969 107 62.2-1225 d¿ted Jan. 17, 2007.
`Order Re Claim Construction dated Nov. 8, 2001, from Civil Action
`No. 00-11851-RWZ.
`Patent Abstlacts of Japan, "Device fo¡ Generating Database and
`Method lor the Same," Application No. 03-080504, Sun Microsyst.
`Inc., published Jun. 1993, 38 pages.
`Patent Abstracts of Japan, "Method for Registering and Retrieving
`Data Base," Application No. 03-187303, Nippon Telegr. & Teleph
`Cory., published Feb. 1993, 1l pages.
`Plaintiffs' Memorandum of Points a¡d Authorities in Opposition to
`Londeye Defenda¡ts' Motion to Dismiss, dated Nov. 8, 2004, frorn
`Civil Action No, CV-04-7456 JFW (AJWX).
`Plaintiffs' Opposition to Media Sentry's Motion to Disrniss; Memo-
`¡andum ofPoints a¡d Ar¡thorities in Support Thereof, dated Nov 8,
`2004, fiom Civil Action No. CV 04-7456 JFW (CTx).
`Plaintifls Opposition to Recording Industry Association of Ame¡i-
`ca's Motion to Dismiss; Memorandum of Points and Authorities in
`Support Thereof, dated Nov. 8, 2004, fiom Civil Action No. CV-04-
`7456 JFW (CTx).
`Plaintiffs Reply to Defendant Loudeye Corp.'s and Overpeer, Inc.'s
`Counterclaims, d¿ted Ma¡. 3, 2005, from Civil Action No. CV
`04-74s6 JFw (CTx).
`Plaintiffs Reply to Defendant MediaSentry's Counterclaims, dated
`Ma¡. 3, 2005, from Civil Action No. CV 04-7456 JFW (CTx).
`Plaintiffs Reply to Defendant RIAA's Counterclaims, dated Ma¡.3,
`2005, from Civil Action No. 04-7456 JFW (CTx).
`EXHIBIT 5 - 3
`
`

`

`Case 5:18-md-02834-BLF Document 228-5 Filed 10/04/18 Page 5 of 71
`
`us 8,099,420 B2
`Page 4
`
`Reed W¿de (wade@cs.utk.eclu), "re: Dienst and BFD/LIFN docu-
`rnent," Aug. 8, 1994, printed from htç://www.webhistory.org/www.
`lists/www-talk1994c13/04l6.html on Mar. 22, 2006, (7 pages).
`Rivest, R., "The MD5 Message-Digest Algorithrni'Apr. 1992, pp.
`l-19 and erralâ sheel (l page),
`Rose, M,, "The Content-MD5 Header Field," Nov. 1993, pp. 1-3.
`Schneier, Bruce, "One-Way Hash Functions, Using Crypographic
`Algoritlrms for Hashing," 199 1, printed ftom httpl 1202.179 135.4 I
`datalDDJ/articlesl 1991 19 109 19 1909g/91 099.htm on Mar. 22, 2006.
`Sun Microsystems, Inc., "NFS: NetworkFile System Protocol Speci-
`ficalion," Ma¡. 1989, pp. 1-25,
`Vincenzetti, David and CoÍrozz| Massimo, "A¡ti Tampering Pro-
`gram," Proceedings of the Fourth {USENIX} Security Symposittrn,
`Santa Clara, CA, 1993, I 1 pages.
`Vincenzetti, David and Cotttozzi, Massimo, "Anti Tampering P¡o-
`gram," Proceedings of the Foruth {USENIXi Securiff Symposiurn.
`Santa Clara, CA, undated, printed from http://wwwja.nelcERl/
`VincenZetti a¡d Cotrozzi/N|P-Anti-Tarnp on Mar. 22,2006, 8
`pages.
`Berners-Lee, T. et ¿l., "Unifo¡m ResourceLocators (URL),"pp. I -25,
`Dec.1994.
`Danzig, PB., et al., ""Distlibuted indexing: A Scalable Mecha¡ism
`for Distributed Info¡rnation Retrieval,"" Proceedings of the l4th
`A¡nual International ACM SIGIR Conference on Research ¿nd
`Development in information Ret¡ieval, pp. 220-229, Oct. l3-16,
`199t,
`Hauzeur, B. M., 'A Model fo¡ Naming, Addressing, and Routing,"
`ACM Tra¡s. Inf. Syst. 4, Oct. 4, 1986), 293-3 I l.
`K-hoshafian, S. N. et al. 1986. Object identity. In Conf. Proc. on
`Object-Oriented Programming Systems, Languages and Applica-
`tions (Portland, Oregon, United States, Sep, 29-Oct. 2, 1986). N,
`Meyrowitz, Ed. OOPLSA '86. ACM Press, NewYork, NY, 406-416.
`Lantz, K. 4., et al., "Towa¡ds a univers¿l directory service." In Proc.
`4th A¡nual ACM Symp. on Principles of Distributed Computing
`(Minaki, Onta¡io, Canada). PODC '85. ACM P¡ess, NewYork, NY,
`250-260.
`Leach, P J., et al.. The file system ofan integrated local network, In
`Proc. 1985 ACM l3thA¡nual Conf. on Cornp. Sci, CSC'85. ACM
`Press, NY, NY,309-324.
`Leach, PJ., et al., "UIDs as Internal Names in a Distributed File
`System," In Proc. l st ACM SIGACT-SIGOPS Syrnp. on Principles of
`Distributed Computing (Ottawa, Canada, Aug, 18-20, 1982). PODC
`'82. ACM Press, NewYo¡k, NY, 34-41.
`}y'ra, C, 1992. On building very large naming systems. In P¡oc. 5th
`Workshop on ACM SIGOPS European Workshop: Models atrd Para-
`digms for Distributed Systerns Structuring (France, Sep. 21-23,
`1992). EW 5. ACM Press, NewYork, NY, 1-5.
`Peterson, L. L. 1988. A yellow-pages service for a local-area net-
`work. In P¡oc. ACM Workshop on Frontiers in Computer Colnmu-
`nications Technology (Vermont, 1987), J. J. Garcia-Luna-Aceves,
`Ed. SIGCOMM '87. ACM Press, NewYork,NY,235-242.
`Ravindran, K. and Ramakishna¡, K, K. 1991. A naming system for
`feature-based service specification in distributed operating systems.
`SIGSMALL/PC Notes 17, 3-4 (Sep. l99l), 12-21.
`Ross, K., "Hash-Routing for Collections of Sha¡ed Web Caches,"
`IEEE Network M agazine, pp. 37 44, Nov.-Dec. I 997.
`Schwartz, M., et al. 1987. A name service for evolving heterogeneous
`systems. In Proc. I lth ACM Syrnp. on OS Principles (Texas, Nov.
`8- 1 1, 1987). SOSP '87. ACM Pless, ¡{Y, l.IY, 52-62.
`Shaheen-Gouda, A. a¡d Loucks, L. 1992, Nzune borde¡s. In P¡oc, 5th
`Workshop on ACM SIGOPS European Workshop: Models and Para-
`digms for Distributed Systems Structuring (Mont Saint-Michel,
`France, Sep. 2l-23,1992). EW 5. ACM Press, NY, NY, 1-6.
`Terry D. B. 1984. An analysis of naming conventions for distrìbuted
`computer syste¡ns. In Proc. ACM SIGCOMM Symp.on Commu¡i-
`cations A¡chitech¡¡es and Protocols: Tutorials & Symp. SIGCOMM
`'84. ACM Press, NY, NY,218-224.
`Cheriton, David R. a¡d Mann, Tirnothy P, "Decentralizing a global
`naming service for improved performa¡ce a¡d fault tolerance", ACM
`T¡ansactions on Computer Systems, vol. 7, No. 2, May 1989, pp.
`147-l 83.
`Request for Reexamination of U.S. Patent No. 6,928,442: Reexam
`Control U.S. Appl. No. 90/010,260, ñledAug. 29,2008.
`
`Kim et al., "Experiences with Tripwire: Using Intergrity Checkers for
`Int¡usion Detection", COAST Labs. Dept, of Compnter Sciences
`Pr.rrdue Unive¡sily, F eb. 22, 1995, pp. l - i 2,
`Kim et at., "The Design and Lnplementation of Tripwire: A frle
`Systern Intergrity Checker", COAST Labs. Dept. of Computer Sci-
`ences Pudue Universiry Nov. 19, 1993, pp. l-21.
`Zhiyu Tian et al., A New Hashing Function: Statistic¿l Behavioiu a¡d
`Algorithm, pp, 3-13.
`G. L. F¡iedrnan, Digital Carnera with Apparatu fo¡ Authentication of
`Images Produced frotn an Image File, NASA Case No. NPO-I9108-
`l-CU, U.S. Appl. No. 08/159,980, filed Nov. 24,1993.
`H. Goodman, Ada, Object-Oriented Techniques, and Concurrency in
`Teaching Data St¡uchrres and File Management Repofi Documenta-
`tion p. AD-4275 385-94-042'77.
`Adv¿nces in Clyptology-EUROCRYPT'93; Workshop on the
`Theory and Application ofCryptographic Techniques Lofthus, No¡-
`way, May 23-2'7, 1993 Proceedings.
`Proceedings ofthe 1993 ACM SIGMOD International Conference on
`Management of Data, vol. 22, Issue 2, Jtt¡. 1993.
`Adva¡ces in Cryptology-AUSCRYPT
`'92-Workshop on the
`Theory and Application of Cryptographic 1'echniques Gold Coast,
`Queensland, Australi¿, Dec. 13-16, 1992 Proceedings.
`Witold Litwin et ¿1., Linea¡ Hashing for Distributed Files, ACM
`SIGMOD, May 1993, pp.327-336.
`Ming-Ling Lo et al., On Optimal Ptocessor Allocation to Suppofi
`Pipelined Hash Joins, ACM SIGMOD, pp.69-78' May 1993.
`Thom¿s A. Berson, Differential Cryptanalysis Mod232 with Appli-
`cations to MD5, pp.69-81.
`William Per¡izo et al., Dist¡ibuted Join Processing Performance
`Evalualion, Twenty-Seventh Hau'aii International Conference on
`System Sciences, vol. II, pp. 236-244.
`Vijay Krunar, A Concu'rency Control Mecha¡ism Based on Extend-
`ible Hashing for Main Memory Datab¿se SysteIns, ACM, vol 3,
`1989, pp. 109-l 13.
`Birgit Pfitzman, Sorting Out Signatu¡e Schemes, Nov. 1993, 1" Conf.
`Computer & Corrun. Securify '93, p. 74-85.
`Be¡t dem Boe¡et al., Collisions forthe compression function of MD5,
`pp.292-304.
`Sakti P¡amanik et al., Multi-Directory Hasing, 1993, Info. Sys', vol.
`l8,No. I,pp.63-74.
`Murlidhar Koushik, Dynarnic Hashing with Distrihrted Overflow
`Space: A File Organization with Good Insertion Performance, 1993,
`Info. Sys., vol. 18, No. 5,pp.299-317.
`Witold Litwin et al., LH*-Linear Hashing for Distributed Files, HP
`LabsTech. ReportNo. HPL-93-21, Jun. 1993; pp. l-22.
`Yuliang Zhen g et al., HAVAL Â One-Way Hashin g Al gorithm with
`Va¡iable Length of Output (Extended Abstract), pp. 83-105.
`Chris Cha¡nes and Josef Pieprzky, Linear Nonequivalence versus
`Nonlinearity, Pieprzþ pp. I 56-164.
`Gwertzrnan, James, et ¿1. "The Case for Geographical Push-Cach-
`ing." Technical Report I-lU TR 34-94 (excerpt), Harvard Universiry,
`DAS, Cambridge, MA 02138, 1994, 2 pgs.
`Grigni, Michelangelo, et al. "Tight Bounds on Minimurn Broadcasts
`Networks." SIAM Jou¡nal of Discrete Mathematics, vol, 4, No. 2,
`May 1991, pp.207-222.
`Devine, Robe¡t. "Design andlmplementation of DDH:A Distributed
`Dynamic Hashing Algorithm." In Proceedings of 4th International
`Conference on Foundations of Data Organizations and Algorithms,
`1993, pp. 101-l 14.
`Deering, Stephen, et al. "Multicast Routing in Datagram
`Internetworks and Extended t.ANs." ACM Transactions on Com-
`puter Systems, vol. 8, No. 2,May 1990, pp. 85-110.
`Cormen, Thornas H., et aL lntrcduction to AlSorithms, The MIT
`Press, Cambridge, Massachusetts, 1 994, pp. 2 19 -243, 99 1'993.
`Naor, Moni, et al. "The Load, Capacity and Availability of Quorum
`Systems." In Proceedings ofthe 35th IEEE Symposium on Found¿-
`tions ofComputer Science, Nov. 1994, pp,214-225.
`Nisan, Noam. "Psuedorandom Genʡators for Space-Bounded Com-
`putation." ln Proceedings of the Twenty-Second A¡nual ACM Sym-
`posium on Theory of Computing, May 1990, pp.204-212.
`Palmer, Mark, et al. "Fido: A Cache that Lea¡ns to Fetch." In Pro-
`ceedings ofthe lTtl International Confe¡ence on Very Large Data
`Bases, Sep. 1991. pp. 255-264.
`
`EXHIBIT 5 - 4
`
`

`

`Case 5:18-md-02834-BLF Document 228-5 Filed 10/04/18 Page 6 of 71
`
`us 8,099,420 B2
`Page 5
`
`Peleg, David, et al. "TheAvailabiltiy of Quorurn Systerns." Informa-
`tion and Computation 123, 1995,210-223.
`R¿bin, Michael. "Efficient Dispersal of Infonnation for Security,
`Load Balancing, and Fault Tolera¡ce." Journal of the ACM, vol. 36,
`No.2. Apr. 1989, pp, 335-348.
`R¿vi, R., "Rapid Rurnor Ramification: Approximating the Minimtmr
`Broadc¿st Tirne." In Proceedings of the 35th IEEE Syrnposium on
`Forrnd¿lion ofComputer Science, Nov. 1994, pp.202-213.
`Schrnidt, Jeanette, et al. "Chernoff-Hoeffding Bounds for Applica-
`tions witl Limited Independence." In Proceedings of the 4th ACS:
`SIAM Symposium on Discrete Algorithms, 1993, pp. 331-340.
`Tarjan, Robert Endre, et al, "Storing a Sparse Table." Communica-
`tions of the ACM, vol. 22, No. I l, Nov. 197 9, pp. 606-6 I l
`Wegman, Mark, et al. "New Hash Functions and TheirUse inAuthen-
`tication a¡d Set Equality." Journal ofComputer and System Sciences
`vol. 22, Jun. 1981, pp, 265-279.
`Vitter', Jeffrey Scott, et al. "Optimal Prefetching via Data Compres'
`sion." In Proceedings of32nd IEEE Synpositun on Foltndations of
`Cornpnter Science, Nov. 1991, pp. 121-130.
`Fredman, Michael, et al. "Storing a Sparse Table with 0(1) Worst
`Case Access Tirne," Journal of the Association i'or Colnputing
`Machinery, vol. 3 l, No. 3, Jul, 1984, pp. 538-544.
`Yao, A¡d¡ew Chi-Chih. "Should Tables be Sorted?" Journal ofthe
`Associalion for Computing Machinery vol, 28, No, 3, Jut. 198 t, pp.
`6 1 5-628.
`Floyd, Sally, et al.'â reliable Multicast F¡amewolkfor Light-Weight
`Sessions and Application Level Frarning." In Proceedings of ACM
`SIGCOMM'95, pp. 342-356.
`Feeley, Michael, et al. "lmplementing Global Memory Management
`in a Wo¡kstation Cluste¡." In Proceedings of the 1Sth ACM Syrnpo-
`sium on Operating Systems Principles, 1995, pp, 201-212.
`Ca:ter, J. Lawrence, et ¿1. "Universal Classes of Hash Fu¡ctions."
`Jorunal of Computer and System Sciences, vol. I 8, No, 2, Apr. 1 979
`pp.143-154.
`Patent Abst¡acts of Japan, "Electronic Mail Multiplexing System and
`Commrnication Control Method in The Systern." 06/30/19993, JP
`05162529.
`Kirn et a.l., "Experiencess with Tripwire: Using Intergrity Checkers
`for Intnrsion Detection", COAST Labs. Dept. of Computer Sciences
`Pu¡due Universily, F eb. 22, i 995, pp. I -12.
`Kim et al., "The Design and Implementation of Tripwire: A file
`System Intergrity Checker", COAST Labs, Dept. of Computer Sci-
`ences Pu¡due University, Nov. 19, 1993, pp. l-21.
`Bert Dem Boer et al., Collisions for the compression function of
`MDs, pp. 292-304.
`Sakti Pramanik et al., Multi-Directory Hashing, l993,Info. Sys., vol.
`18,No. I, pp.63-74.
`Mrulidha¡ Koushik, Dynamic Hashing with Distrubuted Overflow
`Space: A File Organization with Good Insertion Pe¡fo¡ma¡ce, 1993,
`Info. Sys,, vol. 18, No. 5,pp:299-317.
`Witold Litwin et ¿1., LFI*-Linea¡ Hashing fo¡ Dist¡ibuted Files, HP
`LabsTech. ReportNo. HPL-93-21, Jun. 1993, pp.1-22.
`Yuliang Zheng et al., HAVAL-A One-Way Hashing Algorithrn with
`Va¡iable Length ofOutput (ExtendedAbstract), 1993, pp. 83-105.
`Chris Cha¡nes and Josef Pieprzþ Linear Nonequivalence versus
`Nonlinearity, Pieprzþ 1993, pp. 156-164.
`Withold Litwin et al.; Linear Hashing for Dist¡ibuted Files, ACM
`SIGMOD, May 1993, pp.327-336.
`Ming-t,ing Lo et al., On Optimal Processor Allocation to Support
`Pipelined.Hash Joins, ACM SIGMOD, pp. 69-78, May 1993,
`Thorna.s A. Berson, Differential Cryptanalysis Mod 232 with Appli-
`cations to MD5, pp.69-81.
`Willia:n Perizo et al., Distributed Join Processing Performance
`Evaluation, Twenf-Seventh Hawaii International Conference on
`System Sciences, vol. II, pp. 236-244.
`Vijay Krunar, A Concurrency Ccintrol Mechanism Based on Extend-
`ible Hashing for Main Memory Database Systems, ACM, vol. 3,
`1 989, pp. 1 09- 1 13.
`Biryit Pfitznån, Sorting Out Signature Schemes, Nov. 1993, i"/ Conf.
`Cornputer & Comm, Security '93, p. 74-85.
`Zhiyu Tian et al,, A New Hashing Function: Statistical Behaviou¡ and
`Algorithm, Spring 1993, pp. 3-13.
`
`'
`
`G.L. F¡iedman, Digital Camera with Apparatus for Authenticaf ion of
`Lnages Produced frorn an Image File, NASA Case No. NPO-19108-
`l-CU, U.S. Appl. No.08/159,980, Nov. 24, 1993.
`H. Good:nan, Ad¿, Object-Oriented Techniques, and Concrurency in
`Teaching Data Structures and File Management Report Docttmenta-
`tion p. AD-4275 385-94-0427'1.
`Advances in Cryptology-EUROCRYPT '93, Workshop on the
`Theory and Application of Cryptographic Techniques Lofthus, Nor-
`way, May 23-2'/, 1993, Proceedings.
`Proceedings on the 1993 ACM SIGMOD International Conference
`on Maragement of Datq vol. 22, Issue 2, Jun. I 993'
`Adva¡ces of Cryptology-AUSCRYPT
`'92-Workshop on the
`Theory and Application of Cryptographic Techniques Gold Coast,
`Queensland, Australia, Dec. 13-16, 1992 Proceedings
`Tarjan, Robert Endre, et al., "storing a Spalse Table", Communica-
`tions of theACM,vol.22, No. ll, Nov. 1979,pp.606-611.
`Wegman, Malketal., "New Hash Functions andThei¡Use inAuthen-
`tication and Set Equality", Journal of Computer and System Sci-
`ences, vol.22, Jrur. 1981, pp.265-279.
`Vitter, Jeffrey Scott et al., "Optimal Prefetching via Data Compres-
`sion", In Proceedings of 32nd IEEE Symposirun on Fund¿tions of
`Computer Science, Nov. 1991, p. 121-130.
`Friedrnan, Michael et al., "Storing a Sparse Table with 0(1) Worst
`Case Access Tirne", Journal of the Association for Cornputing
`Machinery, vol. 31, No.3, Jul. 1984, pp. 538-544.
`Yao, Andrew Chi-Chih, "should Tables be Sorted?", Jou¡nal ofthe
`Association for Cornputing Machinery vol. 28, No. 3, Jul' 1981, pp'
`6t5-628.
`Floyd, Sally et al., 'A Reliable Multicast Framework for Light-
`Vy'eight Sessions and Application Level Framing", In Proceedings of
`ACM SIGCOMM'95, pp. 342-356.
`Feeley, Michael, et al., "Implementing Global Memory Managetnent
`in aWorkstation Cluster", In Proceedings of the l5thACM Sympo-
`siurn on Operating Systems Principles, 1995, pp. 201'212.
`Carter, J. Lauence, et al., "Universal Classes of Hash Functions",
`Journal of Computer ald System Sciences, vol l 8, No. 2, Apr. 19?9'
`pp.143-i54.
`Patent Abstracts of Japan, "Electronic Mail Multiplexing System and
`Commu¡ication Control Method in the System", Jun 30, 1993, JP
`05t62529.
`Kim et al., "Experiences with Tripwire: Using Integrity Checkers fo¡
`Intrusion Detection", COAST Labs. Dept. of Computer Sciences
`Purdue University, Feb. 22, 1995, pp. l -l 2.
`Kim et al., "The Design and Implementation of Tripwire: A File
`System Integrity Checke¡", COAST Labs. Dept. of Computer Sci-
`ences Ptudue University, Nov. 19, 1993, pp. I -2 1,
`Peter Deutsch (peterd@buryip,com), "Re: MD5 and l.lFNs (was:
`Misc Cornments)", www.acl.lanl.gov/lJRl/archive/uri-94q2 mes-
`sages/0 106.html, Apl 26, 199 4.
`Alex¿nder Dupuy (dupuy@smafs.cotn), "RE: MD5 and LIFNs
`(was: Misc Comments)", www.acl.lanl.gov/IJRl/archive/uri-94q2
`messages/O1 l3.htrnl, Apr. 26, 1994.
`Alexa¡der Dupuy (dupuy@smarts.com), "MD5 and LIFNs (was:
`Misc Comrnents)", www.acl.lanl.gov/uRl/archive/uri-94q2 mes-
`sages/0081 .html , Apl l7 , 1994.
`Albert Langer (cmf85l@anu.oz.au), http://groups.google.com/
`groups?selm: I 9 9 | Aug7,22 5 1 59.786olo40newshost.anu.edu.au&
`oe:UTF-8&ouþut:gplain, Aug. 7, 1991.
`Clifford Lynch (Calur@uccmvsa.bitnet), "ietf url/uri overview draft
`paper (long)", wwwacl.lanl.govÂJRl/a¡chive/uri-93ql.messages/
`00l5.html, Mar. 25, 1993.
`K. Sollins ¿nd L. Masintet "Functional Requirements fo¡ Uniform
`Resource Names", www.w3.org/Addressing/rfc173?,fit, Dec. 1994,
`pp.l-7.
`W3C:ID, HTTP: A protocol for networked infoimation, "Basic
`HTTP as delìred in 1992", www.w3.orglProtocols/HTTP2.html,
`1992.
`Defendant Lime Wire, LLC's Answer, Affi¡mative Defenses and
`Counterclaims datedNov. 15, 2007,from Civil Action No. 07-06161
`vBF (PLAX).
`
`EXHIBIT 5 - 5
`
`

`

`Case 5:18-md-02834-BLF Document 228-5 Filed 10/04/18 Page 7 of 71
`
`us 8,099,420 B2
`Page 6
`
`Kim, Gene H., and SpafTord, Eugene H., "Writing, Supporting, and
`Evaluating Tripwire: A Publicly Available Security Tool," COAST
`Labs. Dept. of Computer Sciences Purdne University, Mar. 12, 1994,
`pp. l-23.
`U.S. Appl, No. l1/980,679-May 6,2009 PTO Office Action.
`USPTO, Non-Final Office action rnailed Jun. 15, 2009 in U.S. Appl.
`No. I l/980,687.
`USPTO, Non-Final Office action mailed Jun. 18, 2009 in Reexam
`U.S. Appl. No. 90/01 0,260,
`Cornmu¡rication from EPO in European Application No. 96 910
`'162.2-1225 dated May 8, 2009 [4 pgs.].
`McGregor D. R. and Ma¡iani, J. A. "Fingerprinting A technique for
`file identification and maintena¡ce," Software: Practice and Experi-
`ence, vol. 12, No. 12, Dec. 1982, pp. t 165-l 166.
`[Proposed] Order Regarding Constntction of Terms, filed Mar. 29,
`2007 in C.D, Cal, caseNo. CV 06-5086 SJO (Ex) [9 pgs.].
`Analysis of Plaintiffs' Claim Cha¡t for the '280 Patent As Against
`Defendant Media Sentry, Inc. i1 pages.
`Analysis of Plaintiffs' Claim Cha¡t for the '791 Patent As Against
`Defendant Media Sentry, Inc. ( I I 9 16.00 1.0 I 50.a) pp, i -48.
`Analysis of Plaintiffs' Clairn Chart for the '791 Patent As Against
`Defendan( Overpeer pp. I -40.
`B¿¡ba¡a, D., et al., "Exploiting sytnmetries for low-cost cornparison
`of file copies," 8th Int'l Conf. on Dist¡ibuted Computing Systems,
`Jrrn. 1988, pp.411-419, San Jose, CA.
`Campbell, M., "The Design of Text Signatures for Text Retrieval
`Systems," Tech. Repof, Sep. 5, 1994, Deakin University, School of
`Computing & Math., Geelong, A

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket