throbber
United States Patent
`[19]
`[11] Patent Number:
`5,910,987
`
`Ginter et a1.
`[45] Date of Patent:
`Jun. 8, 1999
`
`U5005910987A
`
`[54]
`
`[75]
`
`SYSTEMS AND METHODS FOR SECURE
`TRANSACTION MANAGEMENT AND
`ELECTRONIC RIGHTS PROTECTION
`Inventors: Karl L. Ginter, Beltsville; Victor H.
`Shear, Bethesda, both of Md.; Francis
`J. Spahn, El Cerrito; David M. Van
`Wie, Sunnyvale, both of Calif.
`
`[73] Assignee:
`
`InterTrust Technologies Corp.,
`Sunnyvale, Calif.
`
`[21] Appl. No“ 08/760,440
`[22]
`Filed:
`Dec. 4, 1996
`
`.
`0128672 12/1984 European Pat. Off.
`.
`0135422
`3/1985 European Pat. Off.
`.
`0180460
`5/1986 European Pat. Off.
`List continued on next
`a e.
`p g )
`OTHER PUBLICATIONS
`
`(
`
`Applications Requirements for Innovative Video Program-
`ming; How to Foster (or Cripple) Program Development
`Opportunities for Interactive Video Programs Delivered on
`Optical Media; A Challenge for the Introduction of DVD
`(Digital Video Disc) (Oct. 19—20, 1995, Sheraton Universal
`Hotel, Universal City CA).
`Arneke, David, et al., News Release, AT&T, Jan. 9, 1995,
`At&T encryption system protects information services, 1
`page.
`
`Related US. Application Data
`
`(List continued on next page.)
`
`[63] Continuation of application No. 08/388,107, Feb. 13, 1995,
`abandoned
`Int. Cl.6 ............................... H04L 9/32; G06F 17/60
`[51]
`[52] US. Cl.
`................................................... 380/24; 380/4
`[58] Field of Search .................................... 380/4, 25, 24;
`395/683, 684; 705/26
`
`[56]
`
`References Cited
`
`U~S- PATENT DOCUMENTS
`
`.
`
`313% gig; 6} a1.
`3:233:23;
`3/1974 Smith .
`3,796,830
`3/1974 Feistel .
`3,798,359
`3/1974 Feistel .
`3,798,360
`3/1974 FeiStel -
`3,798,605
`4/1974 Clarke ~
`378067882
`.
`8/1974 Freeny, Jr.
`3,829,833
`9/1975 Henriques .
`3,906,448
`3,911,397 10/1975 Freeny, Jr.
`.
`3 924 065
`12/1975 Freeny Jr.
`.
`,
`’
`7
`(List continued on next page.)
`
`FOREIGN PATENT DOCUMENTS
`9 004 79
`12/1984 Belgium .
`0 84 441
`7/1983 European Pat. Off.
`
`.
`
`Primary Examiner—Gilberto Barron, Jr.
`Attorney, Agent, or Firm—Nixon & Vanderhye PC.
`[57]
`ABSTRACT
`
`The present invention provides systems and methods for
`secure transaction management and electronic rights protec-
`tion. Electronic appliances such as computers equipped in
`accordance with the present invention help to ensure that
`information is accessed and used only in authorized ways,
`and maintain the integrity, availability, and/or confidentiality
`of the information. Such electronic appliances provide a
`distributed virtual distribution environment (VDE) that may
`enforce a secure chain of handling and control, for example,
`to control and/or meter or otherwise monitor use of elec-
`tronically stored or disseminated information. Such a virtual
`distribution environment may be used to protect rights of
`various participants in electronic commerce and other elec-
`tronic or electronic-facilitated transactions. Distributed and
`other operating systems, environments and architectures,
`such as, for example, those using tamper-resistant hardware-
`based processors, may establish security at each node. These
`techniques may be used to support an all-electronic infor-
`mation distribution, for example, utilizing the “electronic
`g way.
`hi h
`2:
`
`2 Claims, 146 Drawing Sheets
`
`CREATOR
`
`
`I
`
`:
`
`CONTROLS
`
`I
`I
`qu mews
`comm 4. msmmuma
`,
`, moms ‘
`
`AND
`I
`ELECTRONIC]
`I
`oomsm I
`I
`
`PAYMENTS
`HIGHWAY‘
`‘
`I
`
`108
`K I
`
`
`
`
`
`
` —>
`
`
`we CONTENT
`, 7 USER
`
`‘
`
`mus
`
`RULES&
`CONTROLS
`
`PAYMEN‘IS
`120
`
`
`
`
`FINANCIAL
`CLEARINGHOUSE
`AND
`VDE ADMINISTRATOR
`
`
`
`moms
`
`1 14
`
`I
`
`
`
`“3
`
`SCEA Ex. 1009 Page 1
`
`SCEA Ex. 1009 Page 1
`
`

`

`5,910,987
`
`Page 2
`
`US. PATENT DOCUMENTS
`
`.
`
`Jacoby .
`.
`Brobeck et al.
`Anderson et al.
`Ehrsam et al.
`.
`Boothroyd et al.
`Forman, Jr. et al.
`Mazur .
`
`.
`
`.
`
`3,931,504
`3,946,220
`3,956,615
`3,958,081
`3,970,992
`4,048,619
`4,071,911
`4,112,421
`4,120,030
`4,163,280
`4,168,396
`4,196,310
`4,200,913
`4,209,787
`4,217,588
`4,220,991
`4,232,193
`4,232,317
`4,236,217
`4,253,157
`4,262,329
`4,265,371
`4,270,182
`4,278,837
`4,305,131
`4,306,289
`4,309,569
`4,319,079
`4,323,921
`4,328,544
`4,337,483
`4,361,877
`4,375,579
`4,433,207
`4,434,464
`4,442,486
`4,446,519
`4,454,594
`4,458,315
`4,462,076
`4,462,078
`4,465,901
`4,471,163
`4,484,217
`4,494,156
`4,513,174
`4,528,588
`4,528,643
`4,553,252
`4,558,176
`4,558,413
`4,562,306
`4,562,495
`4,577,289
`4,584,641
`4,588,991
`4,589,064
`4,593,353
`4,593,376
`4,595,950
`4,597,058
`4,634,807
`4,644,493
`4,646,234
`4,652,990
`4,658,093
`4,670,857
`4,672,572
`4,677,434
`4,680,731
`4,683,553
`4,685,056
`
`1/1976
`3/1976
`5/1976
`5/1976
`7/1976
`9/1977
`1/1978
`
`10/1978
`7/1979
`9/1979
`4/1980
`4/1980
`6/1980
`8/1980
`9/1980
`11/1980
`11/1980
`11/1980
`2/1981
`4/1981
`5/1981
`5/1981
`7/1981
`12/1981
`12/1981
`1/1982
`3/1982
`4/1982
`5/1982
`6/1982
`11/1982
`3/1983
`2/1984
`2/1984
`4/1984
`5/1984
`6/1984
`7/1984
`7/1984
`7/1984
`8/1984
`9/1984
`11/1984
`1/1985
`4/1985
`7/1985
`7/1985
`11/1985
`12/1985
`12/1985
`12/1985
`12/1985
`3/1986
`4/1986
`5/1986
`5/1986
`6/1986
`6/1986
`6/1986
`6/1986
`1/1987
`2/1987
`2/1987
`3/1987
`4/1987
`6/1987
`6/1987
`6/1987
`7/1987
`7/1987
`8/1987
`
`.
`
`.
`
`.
`
`.
`
`Johnstone .
`Mori et al.
`Best .
`Forman et al.
`Kuhar et al.
`.
`Freeny, Jr.
`.
`Freeny, Jr.
`.
`Hamano et al.
`Gerard .
`Freeny, Jr.
`Kennedy .
`Kirschner et al.
`Bright et al.
`.
`Desai et al.
`Asija .
`Best .
`Best .
`Lumley .
`Merkle .
`Best .
`Guillou .
`Baldwin et al.
`Guillou .
`.
`Dyer et al.
`Davida et al.
`Best .
`Suzuki et al.
`Mayer .
`Thomas .
`Heffron et al.
`Uchenick .
`Smith, III .
`Ross .
`Best .
`Donald et al.
`Block et al.
`.
`Kadison et al.
`Herman .
`Lofberg .
`Freeny, Jr.
`Egendorf .
`.
`Arnold et al.
`Schmidt et al.
`Chou et al.
`.
`Bond et al.
`.
`Comerford et al.
`Guglielmino .
`Atalla .
`Chiba et al.
`Pickholtz .
`Volk .
`Lofberg .
`.
`Izumi et al.
`Chorley et al.
`Chandra et al.
`Tolman et al.
`Pailen et al.
`.
`Hellman .
`Rackman .
`Alsberg .
`Fascenda .
`Izumi et al.
`Mollier .
`Barnsdale et al.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`4,688,169
`4,691,350
`4,696,034
`4,701,846
`4,712,238
`4,713,753
`4,740,890
`4,747,139
`4,757,533
`4,757,534
`4,768,087
`4,791,565
`4,796,181
`4,799,156
`4,807,288
`4,817,140
`4,823,264
`4,827,508
`4,858,121
`4,864,494
`4,868,877
`4,903,296
`4,924,378
`4,930,073
`4,949,187
`4,977,594
`4,999,806
`5,001,752
`5,005,122
`5,005,200
`5,010,571
`5,023,907
`5,047,928
`5,048,085
`5,050,213
`5,091,966
`5,103,392
`5,103,476
`5,111,390
`5,119,493
`5,128,525
`5,136,643
`5,136,646
`5,136,647
`5,136,716
`5,146,575
`5,148,481
`5,155,680
`5,168,147
`5,185,717
`5,201,046
`5,201,047
`5,208,748
`5,214,702
`5,216,603
`5,221,833
`5,222,134
`5,224,160
`5,224,163
`5,235,642
`5,245,165
`5,247,575
`5,260,999
`5,263,158
`5,265,164
`5,276,735
`5,280,479
`5,285,494
`5,301,231
`5,311,591
`5,319,705
`5,337,360
`
`8/1987
`9/1987
`9/1987
`10/1987
`12/1987
`12/1987
`4/1988
`5/1988
`7/1988
`7/1988
`8/1988
`12/1988
`1/1989
`1/1989
`2/1989
`3/1989
`4/1989
`5/1989
`8/1989
`9/1989
`9/1989
`2/1990
`5/1990
`5/1990
`8/1990
`12/1990
`3/1991
`3/1991
`4/1991
`4/1991
`4/1991
`6/1991
`9/1991
`9/1991
`9/1991
`2/1992
`4/1992
`4/1992
`5/1992
`6/1992
`7/1992
`8/1992
`8/1992
`8/1992
`8/1992
`9/1992
`9/1992
`10/1992
`12/1992
`2/1993
`4/1993
`4/1993
`5/1993
`5/1993
`6/1993
`6/1993
`6/1993
`6/1993
`6/1993
`8/1993
`9/1993
`9/1993
`11/1993
`11/1993
`11/1993
`1/1994
`1/1994
`2/1994
`4/1994
`5/1994
`6/1994
`8/1994
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`Joshi .
`Kleijne et al.
`Wiedemer .
`.
`Ikeda et al.
`Gilhousen et al.
`Boebert et al.
`.
`William .
`Taaffe .
`.
`Allen et al.
`Matyas et al.
`Taub et al.
`.
`Dunham et al.
`Wiedemer .
`ShaVit et al.
`.
`Ugon et al.
`Chandra et al.
`Deming .
`Shear .
`Barber et al.
`Kobus .
`Fischer .
`Chandra et al.
`Hershey et al.
`Cina, Jr.
`.
`Cohen .
`Shear .
`Chernow et al.
`Fischer .
`Griffin et al.
`Fischer .
`Katznelson .
`Johnson et al.
`Wiedemer .
`Abraham et al.
`Shear .
`Bloomberg et al.
`Mori .
`Waite et al.
`Ketcham .
`.
`Janis et al.
`Stearns et al.
`Fischer .
`.
`Haber et al.
`.
`Haber et al.
`Harvey et al.
`Nolan, Jr.
`.
`Abraham et al.
`Wiedemer .
`Bloomberg .
`Mori .
`Goldberg et al.
`Maki et al.
`.
`Flores et al.
`Fischer .
`Flores et al.
`Hecht .
`.
`Waite et al.
`Paulini et al.
`Gasser et al.
`Wobber et al.
`Zhang .
`Sprague et al.
`Wyman .
`Janis .
`Matyas et al.
`Boebert et al.
`Mary .
`Sprecher et al.
`Abraham et al.
`Fischer .
`Halter et al.
`Fischer .
`
`.
`
`.
`
`.
`
`.
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`SCEA Ex. 1009 Page 2
`
`SCEA Ex. 1009 Page 2
`
`

`

`5,910,987
`
`Page 3
`
`.
`
`5,710,834
`5,740,549
`5,745,604
`5,748,763
`597489783
`597549849
`5,757,914
`5,758,152
`597657152
`577687426
`
`.
`
`1/1998 Rhoads .
`4/1998 Reilly et al.
`4/1998 Rhoads .
`5/1998 Rhoads .
`5/1998 Rhoads -
`5/1998 Dyer etfiL ~
`5/1998 McManis .
`5/1998 LeTourneau .
`“1998 EHCkSOH ~
`6/1998 Rhoads~
`
`FOREIGN PATENT DOCUMENTS
`
`.
`
`.
`
`.
`
`.
`.
`
`.
`
`8/1994 Stringer et al.
`5,341,429
`8/1994 Moore .
`5,343,527
`9/1994 Blandford .
`5,347,579
`.
`9/1994 Michener et al.
`5,351,293
`5,355,474 10/1994 Thuraisngham et al.
`5,373,561
`12/1994 Haber et a1.
`.
`5,390,247
`2/1995 Fischer .
`5,390,330
`2/1995 Talati .
`5,392,220
`2/1995 van den Hamer et a1.
`5,392,390
`2/1995 Crozier.
`5,394,469
`2/1995 Nagel et al.
`5,410,598
`4/1995 Shear .
`5,412,717
`5/1995 Fischer .
`5,421,006
`5/1995 Jablon .
`5,422,953
`6/1995 Fischer ..
`5,428,606
`6/1995 MOSKOWItZ .
`5,438,508
`8/1995 Wymam .
`5,442,645
`8/1995 Ug0n~
`5,444,779
`8/1995 Daniele -
`5,449,895
`9/1995 Hecht et al.
`5,449,896
`9/1995 Hecht et al.
`5,450,493
`9/1995 Maher .
`5,453,601
`9/1995 Rosen .
`5,453,605
`9/1995 Hecht et a1.
`5,455,407 10/1995 Rosen .
`5,455,861
`10/1995 Faucher et al..
`5,455,953
`10/1995 Russell .
`5,457,746
`10/1995 Dolphin .
`5,463,565
`10/1995 Cookson et al.
`5,473,687 12/1995 Lipscomb et al.
`5,473,692 12/1995 Davis .
`
`.
`11/1988 European Pat. Off.
`0 370 146
`.
`0399822A2 11/1990 European Pat. Off.
`.
`0421409A2
`4/1991
`European Pat. Off.
`0 456 386 A2
`11/1991
`European Pat. ofl: .
`0 469 864 A2
`2/1992 European Pat. 011..
`A3
`0 565 314 A2 10/1993 European Pat. Off.
`.
`0 593 305 A2
`4/1994 European Pat. Off.
`.
`0 651 554 A1
`5/1995 European Pat. Off.
`.
`0 668 695 A2
`8/1995 European Pat. Off.
`.
`0 725 376
`1/1996 European Pat. Off.
`.
`0 695 985 A1
`2/1996 European Pat. Off.
`0 696 798 A1
`2/1996 Eur0pean Pat Off -
`0715243A1
`6/1996 European Pat Off--
`0715244A1
`6/1996 European Pat Off -
`0715245A1
`6/1996 European Pat. Off.
`.
`0715246A1
`6/1996 European Pat. Off.
`.
`0715247A1
`6/1996 European Pat. Off.
`.
`0749081A1
`12/1996 European Pat. Off.
`.
`0 778 513 A2
`6/1997 European Pat. Off.
`.
`0 795 873 A2
`9/1997 European Pat. Off.
`.
`3803982A1
`1/1990 Germany .
`57—726
`5/1982
`Japan .
`62-241061
`10/1987
`Japan .
`1—068835
`3/1989
`Japan .
`64—68835
`3/1989
`Japan .
`2—242352
`9/1990
`Japan .
`2—247763
`10/1990
`Japan .
`2—294855
`12/1990
`Japan .
`4—369068 12/1992
`Japan .
`5—181734
`7/1993
`Japan .
`5-257783
`10/1993
`Japan -
`5-268415
`10/1993
`Japan ~
`6475794
`6/1994
`Japan -
`6—215010
`8/1994
`Japan .
`6225059
`8/1994
`Japan .
`7—056794
`3/1995
`Japan .
`7—084852
`3/1995
`Japan .
`7—141138
`6/1995
`Japan .
`7_200317
`8/1995
`Japan .
`
`Japan .
`9/1995
`7—244639
`Japan .
`5/1996
`8—137795
`Japan .
`6/1996
`8—152990
`Japan .
`7/1996
`8—185298
`9/1984 United Kingdom .
`2136175
`9/1993 United Kingdom .
`2264796
`4/1996 United Kingdom .
`2294348
`6/1996 United Kingdom .
`2295947
`5/1985 WIPO ~
`W0A8502310
`8/1985 WIPO .
`WO 85/03584
`3/1990 WIPO ~
`WO 90/0382
`4/1992 WIPO .
`WO92/06438
`WO92/22870 12/1992 WIPO .
`WO93/01550
`1/1993 WIPO .
`WO 94/01821
`1/1994 WIPO .
`WO94/03859
`2/1994 WIPO .
`W09406103
`3/1994 WIPO .
`WO 94/16395
`7/1994 WIPO .
`WO 94/18620
`8/1994 WIPO .
`wo 94/22266
`9/1994 WIPO .
`WO 94/27406
`11/1994 WIPO .
`WO95/14289
`5/1995 WIPO .
`
`SCEA Ex. 1009 Page 3
`
`.
`
`.
`
`5,478,960 12/1995 Fischer .................................... 395/683
`574797509 ”“995 Ugo“ ~
`5,485,622
`1/1996 Yamaki .
`5,491,800
`2/1996 Goldsmith et al.
`5,497,479
`3/1996 Hornbuckle .
`.
`5,497,491
`3/1996 Mitchell et al.
`5,499,298
`3/1996 Narasimhalu et al.
`5,504,757
`4/1996 Cook et al.
`.
`5,504,818
`4/1996 Okano .
`.
`5,504,837
`4/1996 Griffeth et al.
`5,508,913
`4/1996 Yamamoto et al.
`5,509,070
`4/1996 Schull .
`5,513,261
`4/1996 Maher.
`5,530,235
`6/1996 Stefik et al.
`5,530,752
`6/1996 Rubin .
`5,533,123
`7/1996 Force et al.
`5,534,975
`7/1996 Stefik et a1.
`
`.
`
`.
`
`.
`
`.
`
`.
`.
`
`5,537,526
`5,539,735
`
`7/1996 Anderson et al.
`7/1996 Moskowitz .
`
`.
`
`.
`
`.
`
`.
`
`8/1996 Brunner et al.
`5,550,971
`9/1996 Parrish et a1.
`5,553,282
`9/1996 Rosen .
`5,557,518
`10/1996 Cooper et al.
`5,563,946
`5,568,552 10/1996 DaVis .
`5,572,673
`11/1996 Shurts .
`.
`5,592,549
`1/1997 Nagel et al.
`.
`5,606,609
`2/1997 Houser et a1.
`5,613,004
`3/1997 Cooperman et a1.
`5,621,797
`4/1997 Rosen .
`5,629,980
`5/1997 Stefik et a1.
`5,633,932
`5/1997 DaVis et al.
`5,634,012
`5/1997 Stefik et a1.
`5,636,292
`6/1997 Rhoads.
`
`.
`.
`.
`
`596387443
`5,638,504
`5,640,546
`5,655,077
`5,687,236
`5,689,587
`5,692,180
`
`6/1997 Stefik~
`.
`6/1997 Scott et al.
`6/1997 Gopinath et a1.
`8/1997 Jones et al.
`.
`11/1997 Moskowitz et a1.
`11/1997 Bender et al.
`.
`11/1997 Lee .
`
`.
`
`.
`
`.
`
`SCEA Ex. 1009 Page 3
`
`

`

`5,910,987
`
`Page 4
`
`WO 96/00963
`WO 96/03835
`WO 96/05698
`WO 96/06503
`WO96/13013
`WO96/21192
`WO 97/03423
`WO97/07656
`WO97/32251
`WO 97/48203
`
`1/1996 WIPO .
`2/1996 WIPO .
`2/1996 WIPO .
`2/1996 WIPO .
`5/1996 WIPO .
`7/1996 WIPO .
`1/1997 WIPO .
`3/1997 WIPO .
`9/1997 WIPO .
`12/1997 WIPO .
`
`OTHER PUBLICATIONS
`
`AT&T Technology, vol. 9, No. 4, New Products, Systems and
`Services, pp. 16—19.
`Barassi, Theodore Sedgwick, Esq., The Cybernotary: Public
`Key Registration and Certificaiton and Authentication of
`International Legal Transactions, 4 pages.
`Bruner, Rick E., PowerAgent, NetBot help advertisers reach
`Internet shoppers, Aug. 1997 (Document from Internet).
`CD ROM, Introducing .
`.
`. The Workflow CD—ROM Sam-
`pler, Creative Networks, MCIMail: Creative Networks, Inc.,
`Palo Alto, California.
`Clark, Tim, Ad service gives cash back, www.news.com,
`Aug. 4, 1997, 2 pages (Document from Internet).
`Communications of the ACM, Jun. 1996, vol. 39, No. 6.
`Cunningham, Donna, et al., News Release, AT&T, Jan. 31,
`1995, AT&T, VLSI Technology join to improve info high-
`way security, 3 pages.
`Data Sheet, About the Digital Notary Service, Surety Tech-
`nologies, Inc., 1994—95, 6 pages.
`Dempsey, et al., D—Lib Magazine, Jul/Aug. 1996 The
`Warwick Metadata Workshop: AFramework for the Deploy-
`ent of Resource Description, Jul. 15, 1966.
`DiscStore (Electronic Publishing Resources 1991).
`Document from Internet, cgi@ncsa.uiuc.edu, CGI Common
`Gateway Interface, 1 page, 1996.
`Electronic Publishing Resources Inc. Protecting Electroni-
`cally Published Properties Increasing Publishing Profits
`(Electronic Publishing Resources 1991).
`Firefly Network, Inc., www.ffly.com, What is Firefly? Firefly
`revision: 41.4 Copyright 1995, 1996.
`Gleick, James, “Dead as a Dollar” The New York Times
`Magazine, Jun. 16, 1996, Section 6, pp. 26—30, 35, 42, 50,
`54.
`
`Greguras, Fred, Softic Symposium ’95, Copyright Clear-
`ances and Moral Rights, Nov. 30, 1995 (as updated Dec. 11,
`1995), 3 pages.
`Harman, Harry H., Modern Factor Analysis, Third Edition
`Revised, University of Chicago Press Chicago and London,
`Third revision published 1976.
`Herzberg, Amir et al., Public Protection of Software, ACM
`Transactions on Computer Systems, vol. 5, No. 4, Nov.
`1987, pp. 371—393.
`Hofmann, Jud, Interfacing the N11 to User Homes, Elec-
`tronic Industries Association, Consumer Electronic Bus
`Committee, 14 slides, no date.
`Holt, Stannie, Start—up promises user confidentiality in Web
`marketing service, Info World Electric, Aug. 13, 1997
`(Document from Internet).
`HotJavaTM: The Security Story, 4 pages.
`Invoice? What is an Invoice? Business Week, Jun. 10, 1996.
`JavaSoft, Frequently Asked Questions—Applet Security,
`What’s Java”? Products and Services, Java/Soft News,
`Developer’s Cornier,Jun. 7, 1996, 8 pages.
`
`Jiang, et al, Aconcept—Based Approach to Retrieval from an
`Electronic Industrialn Directory, International Journal of
`Electronic Commerce, vol. 1, No. 1, Fall 1996, pp. 51—72.
`Jones, Debra, Top Tech Stories, PowerAgent Introducts First
`Internet ‘Infomediary’ to Empower and Protect Consumers,
`Aug. 13, 1997 3 pages (Document from Internet).
`Kohntopp, M., Sag’s durch die Blume, Apr.
`marit@schulung.netuse.de.
`Lagoze, Carl, D—Lib Magazine, Jul/Aug. 1996, The War-
`wick Framework, A Container Architecture for Diverse Sets
`of Metadata.
`
`1996,
`
`VIaclachlan, Malcolm, PowerAgent Debuts Spam—Free
`VIarketing, TechWire, Aug. 13, 1997, 3 pages (Document
`from Internet).
`VIilbrandt, E., Stenanography Info and Archive, 1996.
`VIossberg, Walter S., Personal Technology, Threats to Pri-
`vacy On—Line Become More Worrisome, Wall Street Jour-
`nal, Oct. 24, 1996.
`\Iegroponte, Electronic Word of Mouth, Wired Oct. 1996, p.
`218.
`
`
`
`\Iews Release, Premenos Announces Templar 2.0—Next
`Generation
`Software
`for
`Secure
`Internet
`EDI,
`webmaster@templar.net, 1 page, Jan. 17, 1996.
`\Iews Release, The Document Company Xerox, Xerox
`Announces Software Kit for Creating Working Documents
`With Dataglyphs, Nov. 6, 1995, Minneapolis, MN, 13 pages.
`PowerAgent Inc., Proper Use of Consumer Information on
`the Internet White Paper, Jun. 1997, Document from Inter-
`net, 9 pages (Document from Internet).
`PowerAgent Press Releases, What the Experts are Reporting
`on PowerAgent, Aug. 13, 1997, 6 pages (Document from
`Internet).
`PowerAgent Press Releases, What the Experts are Reporting
`on PowerAgent, Aug. 4, 1997, 5 pages (Document from
`Internet).
`PowerAgent Press Releases, What the Experts are Reporting
`on PowerAgent, Aug. 13, 1997, 3 pages (Document from
`Internet).
`Premenos Corp. White Paper: The Future of Electronic
`Commerce, A Supplement to Midrange Systems, Internet
`webmaster@premenos.com, 4 pages.
`Press Release, National Semiconductor and EPR Partner For
`Information Metering/Data Security Cards (Mar. 4, 1994).
`Resnick, et al., Recommender Systems, Communications of
`the ACM vol. 40, No. 3, Mar. 1997,pp. 56—89.
`ROI (Personal Library Software, 1987 or 1988).
`ROI—Solving Critical Electronic Publishing Problems (Per-
`sonal Library Software, 1987 or 1988).
`Rothstein, Edward, The New York Times, Technology, Con-
`nections, Making th eInternet come to you, through ‘push’
`technology.. p. D5, Jan. 20, 1997.
`Internet
`Rutkowski, Ken, PowerAgent
`Introduces First
`‘Infomediary’ to Empower and Protect Consumers, Tech
`Talk News Story, Aug. 4, 1997 (Document from Internet).
`Sager, Ira (Edited by), Bits & Bytes, Business Week, Sep. 23,
`1996, p. 142E.
`Schurmann, Jurgen, Pattern Classification, A Unified View
`of Statistical and NeuralApproaches, John Wiley & Sons,
`Inc., 1996.
`Shear, Solutions for CD—ROM Pricing and Data Security
`Problems, pp. 530—533, CD ROM Yearbook 1988—1989
`(Microsoft Press 1988 or 1989).
`
`SCEA Ex. 1009 Page 4
`
`SCEA Ex. 1009 Page 4
`
`

`

`5,910,987
`
`Page 5
`
`Special Report, The Internet:Fulfilling the Promise The
`Internet: Bring Order From Chaos; Lynch, Clifford, Search
`the Internet; Resnick, Paul, Filtering Information on the
`Internet; Hearst, Marti A., Interfaces for Searching the Web;
`Stefik, Mark, Trusted Systems; Scientific American, Mar.
`1997, pp. 49—56, 62—64, 68—72, 78—81.
`Stefik, Internet Dreams: Archetypes, Myths, and Metaphors,
`Letting Loose the Light: Igniting Commerce in Electronic
`Publication, pp. 219—253, (1996) Massachusetts Institute of
`Technology.
`Stefik, Mark, Introduction to Knowledge Systems, Chapter 7,
`Classification, pp. 543—607, 1995 by Morgan Kaufmann
`Publishers, Inc.
`Stefik, Mark, Letting Loose the Light, Igniting Commerce in
`Electronic Publication, (1994, 1995) Palo Alto, California.
`Templar Overview,: Premenos, Internet info@templar.net, 4
`pages.
`Templar Software and Services: Secure, Reliable, Stan-
`dards—Based EDI Over the Internet, Prementos, Internet
`info@templar.net, 1page.
`The Benefits of ROI For Database Protection and Usage
`Based Billing (Personal Library Software, 1987 or 1988).
`Voight, Joan, Beyond the Banner, Wired, Dec. 1996, pp. 196,
`200, 204.
`Vonder Haar, Steven, PowerAgent Launches Commercial
`Service, Inter@ctive Week, Aug. 4, 1997 (Document from
`Internet).
`Weber, Dr. Robert, Digital Rights Management Technolo-
`gies, A Report to the International Federation of Reproduc-
`tion Rights Organisations, Oct. 1995,pp. 1—49.
`Weber, Dr. Robert, Digital Rights Management Technolo-
`gies, Oct. 1995, 21 pages.
`Weber, Metering Technologies for Digital Intellectual Prop-
`erty, A Report to the International Federation of Reproduc-
`tion Rights Organisations, pp. 1—29; Oct. 1994, Boston, MA,
`USA.
`
`WEPIN Store, Stenography (Hidden Writing) (Common
`Law 1995).
`World Wide Web FAQ, How can I put an access counter on
`my home page?, 1 page, 1996.
`Yellin, F. Low Level Security in Java, 8 pages.
`Yee, “Using Secure Coprocessors,” CMU—CS—94—149,
`School of Computer Science, Carnegie Mellon University,
`Pittsburgh, PA 15213.
`Tygar et al., “Dyad: A System for Using Physically Secure
`Coprocessors,” School of Computer Science, Carnegie Mel-
`lon University, Pittsburgh, PA 15213 (May 1991).
`Maxemchuk, “Electronic Document Distribution,” AT&T
`Bell Laboratories, Murry Hill, New Jersey 07974.
`Choudhury, et al., “Copyright Protection for Electronic
`Publishing over Computer Networks,” AT&T Bell Labora-
`tores, Murray Hill, New Jersey 07974 (Jun. 1994).
`Weingart, “Physical Security for the MABYSS System,”
`IBM Thomas J. Watson Research Center, Yorktown Heights,
`New York 10598 (1987).
`White, “ABYSS: A Trusted Architecture for Software Pro-
`tection,” IBM Thomas J. Watson Research Center, Yorktown
`Heights, New York 10598 (1987).
`Neumann, et al., “A Provably Secure Operating System: The
`System, Its Applications, and Proofs,” Computer Science
`Laboratory Report CSL—116, Second Edition, SRI Interna-
`tional (May 1980).
`Caruso, “Technology, Digital Commerce 2 plans for water-
`marks, which can bind proof of authorship to electronic
`works,” New York Times (Aug. 1995).
`
`“Electronic Currency Requirements, XIWT (Cross Industry
`Working Group),” no date.
`“NII, Architecture Requirements, XIWT,” no date.
`Arthur
`K.
`Reilly,
`Standards
`committee
`TZ—Telecommunications, Input to the ‘International Tele-
`communications Hearings,’ Panel 1: Component Technolo-
`gies of the NII/GII, no date.
`Dan Bart, Comments in the Matter of Public Hearing and
`Request for Comments on the International Aspects of the
`National Information Infrastructure, Aug. 12, 1994.
`“Open System Environment Architectural Framework for
`National Information Infrastructure Services and Standards,
`in Support of National Class Distributed Systems,” Distrib-
`uted System Engineering Program Sponsor Group, Draft
`1.0, Aug. 5, 1994.
`“Information Infrastructure Standards Panel: N11 ‘The Infor-
`
`mation Superhighway’,” NationsBank—HGDeal—ASC
`X9, 15 pages.
`Jud Hofmann, “Interfacing the N11 to User Homes,” Elec-
`tronic Industries Association, Consumer Electronic Bus
`Committee, 14 slides, no date.
`“Framework for National Information Infrastructure Ser-
`vices,” NIST, Jul. 1994, 12 slides.
`Claude Baggett, “Cable’s Emerging Role in the Information
`Superhighway,” Cable Labs, 13 slides.
`“IISP Break Out Session Report for Group No. 3, Standards
`Development and Tracking System,” no date.
`“XIWT Cross Industry Working Team,” 5 pages, Jul. 1994.
`“Computer Systems Policy Project (CSSP), Perspectives on
`the National Information Infrastructure: Ensuring Interop-
`erability (Feb. 1994),” Feb. 1994.
`“Framework for National Information Infrastructure Ser-
`
`vices,” Draft, U.S. Department of Commerce, Jul. 1994.
`“EIA and TIA White Paper on National Information Infra-
`structure,” published by the Electronic Industries Associa-
`tion and the Telecommunications Industry Association,
`Washington, DC, no date.
`Michael Baum, “Worldwide Electronic Commerce: Law,
`Policy and Controls Conference,” program details, Nov. 11,
`1993.
`
`Bruce Sterling, “Literary freeware: Not for Commercial
`Use,” remarks at Computers, Freedom and Privace Confer-
`ence IV, Chicago, Mar. 26, 1994.
`“The 1:1 Future of the Electronic Marketplace: Return to a
`Hunting and Gathering Society,” 2 pages, no date.
`D. Linda Garcia, testimony before a hearing on science,
`space and technology, May 26, 1994.
`Wired 1.02, “Is Advertising Really dead?, Part 2,” 1994.
`Hugh Barnes, memo to Henry LaMuth, subject: George
`Gilder articles, May 31, 1994.
`Daniel J. Weitzner, A Statement on EFF’s Open Platform
`Campaign as of Nov., 1993, 3 pages.
`“Serving the Community: A Public—Interest Vision of the
`National Information Infrastructure,” Computer Profession-
`als for Social Responsibility, Executive Summary, no date.
`Steven Schlossstein,InternationalEconomy, “America: The
`G7’s Comeback Kid,” Jun./Jul. 1993.
`Lance Rose, “Cyberspace and the Legal Matrix: Laws or
`Confusion?,” 1991.
`“Cable Television and America’s Telecommunications
`
`Infrastructure,” National Cable Television Association, Apr.
`1993.
`
`SCEA Ex. 1009 Page 5
`
`SCEA Ex. 1009 Page 5
`
`

`

`5,910,987
`Page 6
`
`Adele Weder, “Life on the InfoHighway,” 4 pages, no date.
`T. Valovic, Telecommunications, “The Role of Computer
`Networking in the Emerging Virtual Marketplace,” pp.
`40—44.
`
`Dr. Joseph N. Pelton, Telecommunications, “Why Nicholas
`Negroponte is Wrong About the Future of Telecommunica-
`tion,” pp. 35—40, Jan. 1993.
`“Some
`Telecommunications,
`Nicholas
`Negroponte,
`Thoughts on Likely and expected Communications sce-
`narios: A Rebuttal,” pp. 41—42, Jan. 1993.
`Tom Stephenson, Advanced Imaging, “The Info Infrastruc-
`ture Initiative: Data SuperHighways and You,” pp. 73—74,
`May 1993.
`Steve Rosenthal, New Media, “Mega Channels,” pp. 36—46,
`Sep. 1993.
`News Release, The White House, Office of the President,
`“Background on the Administration’s Telecommunications
`Policy Reform Initiative,” Jan. 11, 1994.
`Steve Rosenthal, New Media, “Interactive Network: Viewers
`Get Involved,” pp. 30—31, Dec. 1992.
`Steve Rosenthal, New Media, “Interactive TV: The Gold
`Rush Is On,” pp. 27—29, Dec. 1992.
`Effector Online vol. 6 No. 6, “A Publication of the Elec-
`tronic Frontier Foundation,” 8 pages, Dec. 6, 1993.
`Mike Lanza, electronic mail, “George Gilder’s Fifth
`Article—Digital Darkhorse—Newspapers,” Feb. 21, 1994.
`Steven Levy, Wired, “E—Money, That’s What I Want,” 10
`pages, Dec. 1994.
`Kevin Kelly, Whole Earth Review, “E—Money,”pp. 40—59,
`Summer 1993.
`
`Green paper, “Intellectual Property and the National Infor-
`mation Infrastructure, a Preliminary Draft of the Report of
`the Working Group on Intellectual Property Rights,” Jul.
`1994.
`
`Communications of the ACIVI, “Intelligent Agents,” Jul.
`1994, vol. 37, No. 7.
`Low et al., “Anonymous Credit Cards,” AT&T Bell Labo-
`ratories, Proceedings of the 2nd ACM Conference on Com-
`puter and Communications Security, Fairfax, Virginia, Nov.
`2—4, 1994.
`Tygar et al., “Cryptography: It’s Not Just For Electronic
`Mail Anymore,” CMU—CS—93—107, School of Computer
`Science Carnegie Mellon University, Pittsburgh, Pennsyl-
`vania, Mar. 1, 1993.
`Smith et al., “Signed Vector Timestamps: ASecure Protocol
`for Partial Order Time,” CMU—93—116, School of Computer
`Science Carnegie Mellon University, Pittsburgh, Pennsyl-
`vania, Oct. 1991; version of Feb. 1993.
`Kristol et al., “Anonymous Internet Mercantile Protocol,”
`AT&T Bell Laboratories, Murray Hill, New Jersey, Draft:
`Mar. 17, 1994.
`Low et al., “Document Marking and Identification using
`both Line and Word Shifting,” AT&T Bell Laboratories,
`Murray Hill, New Jersey, Jul. 29, 1994.
`Low et al., “Anonymous Credit Cards and its Collusion
`Analysis,” AT&T Bell Laboratories, Murray Hill, New Jer-
`sey, Oct. 10, 1994.
`Ryoichi Mori and Masaji Kawahara, The Transactions of the
`EIEICE, W “Superdistribution: The Concept and the Archi-
`tecture,” E73 (Jul. 1990), No. 7, Tokyo, Japan.
`Argent Information Q&A Sheet, http://www.digital—water-
`mark.com/, Copyright 1995, The Dice Company, 7 pages.
`
`“Encapsulation: An Approach to Operating System Secu-
`rity,” Bisbey, II et al., Oct. 1973, pp. 666—675.
`“Encryption Methods in Data Networks,” Blom et al., Eric-
`sson Technics, No. 2, 1978, Stockholm, Sweden.
`First CII Honeywell Bull International Symposium on Com-
`puter Security and Confidentiality, Jan. 26—28, 1981, Con-
`ference Text, pp. 1—21.
`Codercard, Spec Sheet—Basic Coder Subsystem, No date
`given.
`“Micro Card”—Micro Card Technologies,
`Texas, No date given.
`“A Method of Software Protection Based on the Use of
`
`Inc., Dallas,
`
`Smart Cards and Cryptographic Techniques,” Scnaumuel-
`ler—Bichl et al., No date given.
`“The New Alexandria” No. 1, Alexandria Institute, pp. 1—12,
`Jul.—Aug. 1986.
`Denning et al., “Data Security,” 11 Computing Surveys No.
`3, Sep. 1979.
`Kent, “Protecting Externally Supplied Software In Small
`Computers” (MIT/LCS/TR—255 Sep. 1980).
`Proceedings of the IEEE, vol. 67, No. 3, Mar. 1979, “Privacy
`and Authentication: An Introduction to Cryptography,”
`Whitfield Diffle and Martin E. Hellman, pp. 397—427.
`Digest of Papers, VLSI: New Architectural Horizons, Feb.
`1980, “Preventing Software Piracy With Crypto—Micropro-
`cessors,” Robert M. Best, pp. 466—469.
`IEEE Transactions on Information Theory, vol. 22, No. 6,
`Nov. 1976, “New Directions in Cryptography,” Whitfield
`Diffie and Martin E. Hellman, pp. 644—651.
`Struif, Bruno “The Use of Chipcards for Electronic Signa-
`tures and Encryption” in: Proceedings for the 1989 Confer-
`ence on VSLI and Computer Peripherals, IEEE Computer
`Society Press, 1989, pp. 4/155—4/158.
`Dusse, Stephen R. and Burton S. Kaliski “A Cryptographic
`Library for
`the Motorola 56000” in Damgard,
`I. M.,
`Advances
`in Cryptology—Proceedings EuroCrypt
`90,
`Springer—Verlag, 1991, pp. 230—244.
`DSP56000/DSP56001 Digital Signal Processor User’s
`Manual, Motorola, 1990, p. 2—2.
`Rankine, G., “Thomas—A Complete Single—Chip RSA
`Device,” Advances
`in Cryptography, Proceedings of
`CRYPTO 86, pp. 480—487 (A.M. Odlyzko Ed., Spring-
`er—Verlag 1987).
`Guillou, L.: “Smart Cards and Conditional Access”, pp.
`480—490 Advances in Cryptography, Proceedings of Euro-
`Crypt 84 (Beth et al, Ed., Springer—Verlag 1985).
`Dyson, Esther, “Intellectual Value,” Wired Magazine, Jul.
`1995, pp. 136—141 and 182—184.
`IBM Technical Disclosure Bulletin, “Multimedia Mixed
`Object Envelopes Supporting a Graduated Fee Scheme via
`Encryption,” vol. 37, No. 03, Mar. 1994, Armonk, NY.
`IBM Technical Disclosure Bulletin, “Transformer Rules for
`Software Distribution Mechanism—Support Products,” vol.
`37, No. 04B, Apr. 1994, Armonk, NY.
`Suida, Karl, Mapping New Applications Onto New Tech-
`nologies, “Security Services in Telecommunications Net-
`works,” Mar. 8—10, 1988, Zurich.
`Portland Software’s ZipLock, Internet information, Copy-
`right Portland Software 1996—1997, 12 pages.
`
`SCEA Ex. 1009 Page 6
`
`SCEA Ex. 1009 Page 6
`
`

`

`US. Patent
`
`Jun.8,1999
`
`Sheet170f146
`
`5,910,987
`
`
`
`flangUUvUUUUUUH
`
`nflflflflfl
`
`thszmmogkSEQ—U.
`
`._<_OZ<ZE
`
`mmDSOmn.
`
`
`
`ZO_._.ODQOm_n_Own=>
`
`O_n_3._.w
`
`
`
`_‘.O_n_
`
`ZOF<EMOKE
`
`>t4FD
`
`
`
`mmDOI02.191531
`
`Eménmzoo
`
`mOIkD/x
`
`ZO_._.<_>_mOu_Z_
`
`>mm>3mo
`
`wo_>mwm
`
`’4'
`
`ll
`
`00—.
`
`3N
`
`SCEA Ex. 1009 Page 7
`
`SCEA Ex. 1009 Page 7
`
`
`
`
`
`
`
`
`

`

`US. Patent
`
`Jun. 8, 1999
`
`Sheet 2 of 146
`
`5,910,987
`
`ZO_._.O<wZ<N_._.
`
`
`
`..................................................................................................F.«mmmym.--::L
`
`mOwwm
`
`commnoon
`
`meow
`
`EEO;WNoam:aEezob.
`
`Ammvlotgm
`
`Ham
`
`mOON
`
`OZ_ZO_ww:>EmE
`
`._.zm0<
`
`mm>_w0wm
`
`SCEA Ex. 1009 Page 8
`
`
`
`zEEQEEme,EF55655ES9<_‘0—“—
`
`SCEA Ex. 1009 Page 8
`
`
`
`
`
`
`

`

`US. Patent
`
`Jun. 8, 1999
`
`Sheet 3 of 146
`
`5,910,987
`
`108
`
`ELECTRONIC
`CONTENT
`HIGHWAY
`
`.
`
`E
`I
`
`E
`E
`g
`E
`I
`I
`i
`i
`i
`i
`I
`I
`E
`E
`I
`I
`E
`E
`E
`E
`E
`E
`E
`E
`I
`!
`E
`E
`!
`E
`E
`E
`I
`I
`CONTENT
`E
`E
`i
`I
`E
`E
`E
`E
`I
`I
`E
`E
`I
`I
`I
`E
`i
`I
`i
`I
`E
`I
`I
`I
`I
`E
`E
`E
`E
`E
`E
`E
`j
`i
`I
`I
`E
`E
`i
`i
`i
`i
`i
`E
`I
`I
`E
`E
`i
`i
`E
`E
`
`i
`
`E
`E
`E
`!
`E
`I
`E
`E
`E
`‘
`
`I
`E
`-
`I
`E
`!
`I
`I
`E
`E
`I
`!
`.
`E
`E
`E
`!
`!
`E
`E
`E
`
`I
`I
`
`-
`
`E
`5
`
`VDE CONTENT
`CREATOR
`
`
`
`VDE RIGHTS
`DISTRIBUTOR
`
`102
`
`100
`
`J
`
`RULES&
`CONTROLS
`
`14
`
`REPORTS
`<— AND
`PAYMENTS
`
`106
`
`112
`
`1on
`RULES&
`CONTROLS
`
`——->
`
`VDE CONTENT
`
`r
`USER a
`
`
`
`118
`
`BILLS
`
`REPORTS
`
`114
`
`116
`
`PAYMENTS
`
`12°
`
`FINANCIAL
`CLEARINGHOUSE
`AND
`
`VDE ADMINISTRATOR
`
`____.
`
`SCEA Ex. 1009 Page 9
`
`SCEA Ex. 1009 Page 9
`
`

`

`US. Patent
`
`5,910,987
`
`FIG. 2A
`
`§mm
`
`TNOCDNAa
`
`LDUERDDA
`
`|vD
`
`2
`
`DEF
`
`|v
`
`SCEA Ex. 1009 Page 10
`
`
`

`

`US. Patent
`
`Jun. 8, 1999
`
`Sheet 5 of 146
`
`5,910,987
`
`REQUEST
`
`FIG. 3
`
`—> "NO GO"
`REPORT
`
`USAGE
`
`408 ._ ._ .— .pOVER BUDGET
`
`SUPPLY CONTENT TO USER
`
`SCEA Ex. 1009 Page 11
`
`SCEA Ex. 1009 Page 11
`
`

`

`US. Patent
`
`Jun.8,1999
`
`Sheet6 0f146
`
`5,910,987
`
`\1.05mg
`
`
`
`.22:"—0kwoo
`
`zm1>>
`
`Oz_mm._.m=>_
`
`wmjam
`
`wgomkzoo
`
`w.0.“—
`
`SCEA Ex. 1009 Page 12
`
`hzOmmmO...
`
`SCEA Ex. 1009 Page 12
`
`
`
`

`

`US. Patent
`
`Jun. 8, 1999
`
`Sheet 7 of 146
`
`5,910,987
`
`FIG. 5A
`
`300
`
`CONTENT
`
`302
`
`‘
`CONTAINER
`’
`> E 4
`
`INFORMATION CONTENT
`
`PERMISSIONS RECORD
`
`1000
`
`§Q§
`
`BUDGETS
`
`£98.
`
`OTHER METHODS
`
`SCEA Ex. 1009 Page 13
`
`SCEA Ex. 1009 Page 13
`
`

`

`US. Patent
`
`Jun.8,1999
`
`Sheet8 0f146
`
`5,910,987
`
`ZO:.<m._.m_z=>_o<
`
`
`
`mFZMSEEDOmmDOTEME
`
`
`
`wZO_._.n_ODOIHm—E
`
`w>m¥
`
`mhmoonm
`
`mam
`
`zo.Sm_Em_omommmmflmwwmmfiflwmm:
`
`Maw?28%mzoamsmma>232momzoE5%:
`
`.YflAme>_B<zomzoEEzn
`I>z<s_
`
`oooan—OIhms.mthO
`
`moOIHmfimMIHO
`
`oooP
`
`
`
`
`
`
`
`Oz_._.__mTE>>Dmk<m0mhz_
`
`
`
`
`
`I._.<n.._Om._.zOom>_._._w0n_
`
`com
`
`\
`
`hzwhzoo
`
`mmzzpzoo
`
`
`
`vow._.Zm._.ZOUZO_._.<_>_mOn_Z_
`
`
`
`mm<>>._.uow.Omn=>
`
`
`
`.O_QD<FXE.
`
`mm.07.
`
`
`
`.Qmmsfi.._.o<m._.Xm.mmmoo<,._.n_>m0mo
`
`
`
`
`
`
`
`
`
`.mmsommoHZEnEmOzEMmFQOmE
`
`
`
`
`
`._.Zm_._.ZOo.wmmoomm.wmo_>mmw
`
`ZO_._.<_>_m0n_z_
`
`
`
`_._.n_>mozmEDD<”Oz_._.__m.mm._.m_2
`
`
`
`
`
`SCEA Ex. 1009 Page 14
`
`SCEA Ex. 1009 Page 14
`
`
`
`
`
`
`
`
`
`
`
`

`

`US. Patent
`
`Jun. 8, 19

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket