throbber
Designed for
`
`. ~ .. -:::::
`·:::~a~
`... ,.,,
`"
`Microsoft•
`Windows NT."
`Windows"98
`
`CD-ROM
`Included
`
`1nt:rnet
`Explorer5
`Resource
`Kit
`
`Comprehensive technical
`information and tools for deploying
`and supporting Internet Explorer
`in your organization
`
`Petitioner Apple - Ex. 1066, p. 1
`
`

`
`Microsoft
`
`Internet
`Explorer 5
`· Resource Kit
`
`Petitioner Apple - Ex. 1066, p. 2
`
`

`
`PUBLISHED BY
`Microsoft Press
`A Division of Microsoft Corporation
`One Microsoft Way
`Redmond, Washington 98052-6399
`
`Copyright© 1999 by Microsoft Corporation
`
`All rights reserved. No part of the. contents of this book may be reproduced or transmitted in any form or
`by any means without the written permission of the publisher.


`
`Library of Congress Cataloging-in-Publication Data
`Microsoft Internet Explorer 5 Resource Kit I Microsoft Corporation.
`p. em.
`Includes index.
`ISBN 0-7356-0587-4
`1. Microsoft Windows Internet Explorer. 2. Internet (Computer network)
`4. Browsers
`3. World Wide Web (information retrieval system)
`I. Microsoft Corporation.
`(Computer programs)
`TK5105.888.M54 1998
`005.7'13769--dc21
`
`98-31160
`. CIP
`
`Printed and bound in the United States of America.
`1 2 3 4 5 6.7 8 9 wcwc
`
`4 3 2 1 0 9
`
`Distributed in Canada by ITP Nelson, a division of Thomson Canada Limited.
`
`A CIP catalogue record for this book is available from the British Library.
`
`Microsoft Press books are available through booksellers and distributors worldwide. For further informa(cid:173)
`tion about international editions, contact your local Microsoft Corporation office or contact Microsoft
`Press International directly at fax (425) 936-7329. Visit our Web site at mspress.microsoft.com.
`
`Macintosh, QuickTime, and TrueType are registered trademarks of Apple Computer, Inc. Intel is a
`registered trademark of Intel Corporation. Active Accessibility, Active Channel, Active Desktop,
`ActiveMovie, ActiveX, Authenticode, BackOffice, DirectAnimation, DirectShow, SirectSound, DirectX,
`DriveSpace, FrontPage, Hotmail, JScript, Microsoft, Microsoft Internet Explorer logo, Microsoft Press,
`MSDN, MS-DOS, MSN, NetMeeting, Outlook, PowerPoint, Visual Basic, Visual C++, Visual InterDev,
`WebBot, Win32, Windows, Windows logo, Windows NT, and Windows Start logo are either registered
`trademarks or trademarks of Microsoft Corporation in the United States and/or other countries. Other
`product and company names mentioned herein may be the trademarks of their respective owners.
`
`The example companies, organizations, products, people, and events depicted herein are fictitious.
`No association with any real company; organization, product, person, or event is intended or should
`be inferred.
`
`Acquisitions Editor: Juliana Aldous
`Project Editor: Maureen Williams Zimmerman
`
`Petitioner Apple - Ex. 1066, p. 3
`
`

`
`CHAPTER 8
`
`Content Ratings and User Privacy
`
`143
`
`Using the content rating and user privacy features of Microsoft Internet
`Explorer 5, you can create a secure environment that protects users from
`inappropriate Web content and ensures the privacy of their information.
`This chapter des.cribes these features and explains how you can configure
`rating and privacy ~ettings.
`
`In This Chapter
`Using Content Ratings 144
`RSACi Rating System 144
`Other Rating Systems 145
`Supervisor Password 146
`Configuring Content Advisor Settings 146
`Ensuring User Privacy 152
`Secure Communications 152
`Zone-Based Password Security Protection 152
`Control Over Cookies 153
`Profile Assistant 153
`Microsoft Wallet 3.0 154
`Configuring Privacy Options 155
`Configuring Profile Assistant 156
`Configuring Microsoft Wallet 3.0 157
`Configuring Advanced Security Options for User Privacy 160
`
`See Also
`• For more information about managing your list of trusted digital certificates,
`see Chapter 6, "Digital Certificates."
`• For more information about configuring security zones and Java custom
`security, see Chapter 7, "Security Zones and Permission-Based Security
`for Microsoft Virtual Machine."
`
`Petitioner Apple - Ex. 1066, p. 4
`
`

`
`144
`
`Part 1 Getting Started
`
`• For more information about using the Internet Explorer Customization wizard
`to preconfigure security settings, see Chapter 15, "Running the Internet
`Explorer Customization Wizard."
`• For more information about using the Internet Explorer Administration Kit
`(lEAK) Profile Manager to preconfigure security settings, see Chapter 22,
`"Keeping Programs Updated."
`
`Using Content Ratings
`
`Using the Internet Explorer Content Advisor, you can control the types of content
`that users access on the Internet. You can adjust the content rating settings to
`reflect the appropriate level of content in four areas: language, nudity, sex, and
`violence. For example, businesses might want to block access to sites that offer no
`business value to their employees, and parents might want to block access to sites
`that display inappropriate content for their children.
`
`Historically, the motive for filtering sites on the basis of a site's content has been
`driven by a site's subject matter and the fact that some ideas and images are
`blatantly offensive to many people. In 1995, the World Wide Web Consortium
`(W3C) Platform for Internet Content Selection (PICS) began to define an
`infrastructure that would encourage Web content providers to voluntarily rate
`their sites. This is done by using a specific set of HTML meta tags that rate the
`content of Web sites. Software programs can then block access to Web sites based
`upon the values of those meta tags. Today, the most common content ratings are
`based on the PICS standard for defining and rating Web content. For more
`information about PICS, visit the W3C Web site.
`
`RSACi Rating System
`Internet Explorer is installed with a PICS-based content rating system known
`as the Recreational Software Advisory Council on the Internet (RSACi) system.
`This built-in PICS support can help you control the types of content that users can
`access on the Internet. When you enable Content Advisor, Internet Explorer reads
`the meta tags to determine whether Web sites meet your criteria for suitable
`content. You can also subscribe to independent ratings bureaus or use third-party
`ratings to control access to Web content.
`
`RSACi is an open, objective, content ratings system for the Internet developed by
`the Recreational Software Advisory Council (RSAC), an independent, nonprofit
`organization. The RSACi system provides information about the level of sex,
`nudity, violence, and offensive language (vulgar or hate-motivated) in software
`games and Web sites. For more information about RSAC and the RSACi rating
`system, see the RSAC Web site.
`
`Petitioner Apple - Ex. 1066, p. 5
`
`

`
`Chapter 8 Content Ratings and User Privacy
`
`145
`
`The following table shows the five levels of the RSACi rating system and
`describes the content allowed for each level. Level 0 is the most restrictive,
`and Level 4 the least restrictive.
`
`Level
`
`Violence rating
`
`Nudity rating
`
`Sex rating
`
`Language rating
`
`4
`
`3
`
`2
`
`1
`
`0
`
`Rape or wanton,
`gratuitous violence
`
`Aggressive violence
`or death of humans
`Destruction of
`realistic objects
`Injury to a human
`being
`None of the above
`
`Frontal nudity
`qualifying as
`provocative
`Frontal nudity
`
`Partial nudity
`
`Revealing attire
`
`None of the above
`
`Explicit sexual acts
`or sex crimes
`
`Non-explicit sexual
`acts
`Clothed sexual
`touching
`Passionate kissing
`
`None of the above
`or innocent kissing;
`romance
`
`Crude, vulgar
`language, or extreme
`hate speech
`Strong language
`or hate speech
`Moderate expletives
`or profanity
`Mild expletives
`
`None of the above
`
`You can set content ratings to any level for each of the four content areas. All
`content ratings are set to Level 0 by default. When Content Advisor is turned on
`and the PICS rating for a Web site exceeds the rating level you specify, Internet
`Explorer prevents users from accessing the site. Also, you can configure Internet
`Explorer to prevent or allow users to access unrated Web content. For more
`information, see "Configuring Content Advisor Settings" later in this chapter.
`
`Web site publishers can obtain PICS content ratings from RSAC, as well as from
`a number of other nonprofit and fee-based ratings services. Publishers can
`voluntarily add PICS ratings to their Web sites. You can also obtain independent
`PICS ratings from ratings bureaus. Ratings bureaus are typically fee-based and
`specialize in rating Internet sites. You can specify a ratings bureau other than
`RSAC that Internet Explorer can use to obtain PICS ratings. Because Internet
`Explorer must contact the ratings bureau to obtain the ratings, using other ratings
`bureaus can slow access to Web pages considerably.
`
`Other Rating Systems
`Some Web publishers rate their sites using rating systems that are not based on
`PICS. To use these rating systems, you must subscribe to ratings services that
`support the non-PICS rating systems and then import the rating systems so that
`Internet Explorer can use them to rate Web content. For more information, visit
`the Web sites of the rating services. You can also review "Configuring Content
`Advisor Settings" later in this chapter to learn how to specify different rating
`systems for Internet Explorer.
`
`Petitioner Apple - Ex. 1066, p. 6
`
`

`
`146
`
`Part 1 Getting Started
`
`Supervisor Password
`The first time you tum on Content Advisor, you must specify a supervisor
`password. This password allows administrators or supervisors to tum Content
`Advisor on or off and to change Content Advisor settings for users.
`
`In addition, you can configure Internet Explorer so that users can display
`restricted Web pages by typing the supervisor password. When users attempt to
`access restricted content, the Content Advisor dialog box prompts users to enter
`the supervisor password. For more information, see the next section.
`
`Configuring Content Advisor Settings
`
`You can configure Content Advisor settings in several ways:
`
`•
`
`In Internet Explorer, click the Tools menu, click Internet Options, and then
`click the Content tab.
`• You can use the Internet Explorer Customization wizard to create custom
`packages of Internet Explorer that include preconfigured Content Advisor
`settings for your user groups. You can also lock down these settings to
`prevent users from changing them.
`• After Internet Explorer is deployed, you can use the lEAK Profile Manager to
`update Content Advisor settings through the automatic browser configuration
`feature of Internet Explorer. You can automatically push the updated security
`zone settings to each user's desktop computer, enabling you to manage
`security policy dynamically across all computers on the network.
`
`You can accept the default Content Advisor settings, or you can configure the
`settings based on the needs of your organization and its users. The options for
`configuring Content Advisor are the same whether you access them from Internet
`Explorer 5, the Internet Explorer Customization wizard, or the lEAK Profile
`Manager. For more information about using the Internet Explorer Customization
`wizard and lEAK Profile Manager, see Chapter 15, "Running the Internet
`Explorer Customization Wizard," and Chapter 22, "Keeping Programs Updated."
`
`After you enable Content Advisor, you can use it to do the following:
`
`• Select content rating levels.
`• Configure the list of approved and disapproved Web sites.
`• Configure user options for content ratings.
`• Change the supervisor password.
`•
`Import new rating systems.
`• Specify a different ratings bureau.
`
`I A
`
`Petitioner Apple - Ex. 1066, p. 7
`
`

`
`Chapter 8 Content Ratings and User Privacy
`
`147
`
`~ To enable Content Advisor
`1. On the Tools menu, click Internet Options, and then click the Content tab.
`2. In the Content Advisor area, click Enable.
`3. Type the password you want to use.
`The following illustration shows the Create Supervisor Password dialog box.
`
`4. In the Confirm password box, type the same password again.
`
`~ To select content rating levels
`1. On the Tools menu, click Internet Options, and then click the Content tab.
`2. In the Content Advisor area, click Settings, and then click the Ratings tab.
`3. Select the Language, Nudity, Sex, or Violence ratings category.
`The following illustration shows the ratings categories for Content Advisor.
`
`Petitioner Apple - Ex. 1066, p. 8
`
`

`
`148
`
`Part 1 Getting Started
`
`4. Drag the slider to the appropriate content level for the selected category.
`The default setting for each category is Level 0, which is the most restrictive
`setting. For more information about ratings levels, see "RSACi Rating
`System" earlier in this chapter.
`
`ll> To configure the list of approved and disapproved Web sites
`1. On the Tools menu, click Internet Options, and then click the Content tab.
`2. In the Content Advisor area, click Settings, and then click the Approved
`Sites tab.
`The following illustration shows the Approved Sites tab for Content Advisor.
`
`3. Type the URL for each Web site that your users can view regardless of its
`rating level, and then click Always.
`4. Type the URL for each Web site that your users can never view regardless of
`its rating level, and then click Never.
`
`Note If you want to delete an approved or disapproved Web site, click the
`URL in the list, and then click Remove.
`
`Petitioner Apple - Ex. 1066, p. 9
`
`

`
`Chapter 8 Content Ratings and User Privacy
`
`149
`
`~ To configure user options for content ratings
`1. On the Tools menu, click Internet Options, and then click the Content tab.
`2. In the Content Advisor area, click Settings, and then click the General tab.
`3. In the User Options area, select the settings you want.
`The following illustration shows the User Options area for Content Advisor.
`
`Option
`
`Description
`
`Users can see sites that
`have no rating
`Supervisor can type
`a password to allow
`users to view restricted
`content
`
`Select or clear this option depending on whether you want
`users to access Web pages that are not rated.
`Select or clear this option depending on whether you
`want users to view restricted content by typing the
`supervisor password.
`
`~ To change the supervisor password
`1. On the Tools menu, click Internet Options, and then click the Content tab.
`2. In the Content Advisor area, click Settings, and then click the General tab.
`3. Click Change Password.
`
`Petitioner Apple - Ex. 1066, p. 10
`
`

`
`150
`
`Part 1 Getting Started
`
`The following illustration shows the Change Supervisor Password dialog box.
`
`4. In the Old password box, type the current password to verify that you are
`authorized to change Content Advisor settings.
`5. In the New password box, type the new password.
`6. In the Confirm new password box, type the new password again.
`
`~ To import new rating systems
`
`Important If necessary, install rating systems files following the directions
`provided by the ratings service. Then proceed with the following steps.
`
`1. On the Tools menu, click Internet Options, and then click the Content tab.
`2. In the Content Advisor area, click Settings, and then click the General tab.
`3. Click Rating Systems.
`·The following illustration shows the Rating Systems dialog box.
`
`4. If the rating system you want to add is displayed on the list, click it, and then
`click Add.
`If the rating system you want to add is not on the list, click OK, and then click
`Find Rating Systems.
`
`Petitioner Apple - Ex. 1066, p. 11
`
`

`
`Chapter 8 Content Ratings and User Privacy
`
`151
`
`~ To specify a different ratings bureau
`1. On the Tools menu, click Internet Options, and then click the Content tab.
`2. In the Content Advisor area, click Settings, and then click the Advanced tab.
`The following illustration shows the Advanced tab for Content Advisor.
`
`3. In the Ratings bureau box, type the name ofthe ratings bureau (other than
`RSAC) that Internet Explorer can use to obtain PICS ratings.
`4. In the PICSRules area, click Import, and then type the name of the PICSRules
`(.prf) file used by the new ratings bureau.
`
`Petitioner Apple - Ex. 1066, p. 12
`
`

`
`152
`
`Part 1 Getting Started
`
`Ensuring User Privacy
`
`When you communicate over the Web, you want to know that other people cannot
`intercept or decipher the information you send and receive and cannot use your
`passwords and other private information. You also want to ensure that no one can
`access information on your computer without your knowledge. Internet Explorer
`protects your privacy in the following ways:
`
`•
`
`•
`
`It supports a wide range of Internet security and privacy standards that provide
`secure information transfer and financial transactions over the Internet or
`intranet.
`It provides encryption and identification capabilities to help users ensure the
`privacy of their information on the Web.
`
`Secure Communications
`Internet Explorer supports the latest Internet security standards, including
`Secure Sockets Layer (SSL), Transport Layer Security (TLS), and Private
`Communications Technology (PCT). Internet Explorer uses these protocols to
`create a secure channel for information exchange over the Web. In addition,
`Internet Explorer supports Fortezza security technology through the Fortezza
`Cryptographic Service Provider (CSP) plug-in. Users with Fortezza Crypto
`Cards can install the Fortezza CSP plug-in to ensure secure Internet Explorer
`communications based on Fortezza security standards.
`
`When you browse a Web site that supports SSL, TLS, PCT, or Fortezza, Internet
`Explorer displays a lock icon in the browser's status bar at the bottom of your
`computer screen; in Fortezza mode, an "F" is overlaid on the lock icon. When you
`see this lock, you know that you can safely send information over the Internet to
`the site you are browsing.
`
`For more information about Internet Explorer support for SSL, TLS, PCT, and
`Fortezza, see Chapter 6, "Digital Certificates."
`
`Zone-Based Password Security Protection
`Internet Explorer prompts you before transmitting your user name or password
`to sites that are designated as trusted in the security zones settings. You can,
`however, also configure security zones to send information from trusted sites
`without prompting you. For more information about configuring security zones,
`see Chapter 7, "Security Zones and Permission-Based Security for Microsoft
`Virtual Machine."
`
`Petitioner Apple - Ex. 1066, p. 13
`
`

`
`Chapter 8 Content Ratings and User Privacy
`
`153
`
`Control Over Cookies
`An HTTP cookie is a small file that an individual Web site stores on your
`computer to provide customization features. For example, when you implement
`custom settings for MSN, that information is stored in a cookie file on your
`computer. MSN then reads the cookie each time you visit the site and displays
`the options you selected.
`
`You can configure Internet Explorer to handle cookies in the following ways:
`
`• Prevent cookies from being stored on your computer.
`• Prompt you about whether to accept cookies from the site.
`• Allow cookies to be stored on your computer without notifying you.
`
`For more information, see Chapter 7, "Security Zones and Permission-Based
`Security for Microsoft Virtual Machine."
`
`Note Accepting a cookie does not give a Web site access to your computer or
`any personal information about you other than what you have specified in the
`customized settings for that site.
`
`Profile Assistant
`You can use Profile Assistant to securely share registration and demographic
`information with Web sites while maintaining your computer's privacy and safety.
`Profile Assistant supports the Internet privacy model defined by the Platform for
`Privacy Preferences (P3), a W3C project. You can maintain your personal
`information in a user profile, which provides a secure, encrypted information
`store on your computer.
`
`A Web site can request information from your profile, but the Web site is not
`allowed to access profile information unless you specifically give your consent.
`Because Profile Assistant complies with the Internet's P3 privacy standards, it
`can also work with other Internet programs and servers.
`
`For information about how to write scripts to access Profile Assistant information,
`see the Microsoft Internet Client Software Development Kit, which is part of the
`MSDN Online Web site.
`
`When a Web site requests information from your user profile, the Profile
`Assistant dialog box opens. You can use the information in the Profile Assistant
`dialog box to verify which Web site is making the request, choose which
`information (if any) to share, and understand how the Web site intends to use
`the information.
`
`Petitioner Apple - Ex. 1066, p. 14
`
`

`
`154
`
`Part 1 Getting Started
`
`The following table describes the information displayed in the Profile Assistant
`dialog box.
`
`Option
`
`Description
`
`'Requester name' has
`requested information
`from you
`Site
`
`Profile information
`requested
`
`Always allow this site
`to see checked items
`Edit profile
`
`Privacy
`
`Displays the name of the requester, which can be an individual
`or an organization.
`
`Displays the URL of the site requesting inform~tion from the
`user profile.
`Displays the list of information items requested. Clear the
`check boxes for any items you do not want to send to the
`requester.
`Adds this site to a list of sites that you allow to access your
`user profile without notifying you.
`Opens the My Profile dialog box so you can edit the profile
`information that will be sent to this Web site. For example,
`you might want to send a different fax number.
`Displays a message that explains whether the information you
`are sharing will be secure when it is sent over the Internet. It
`also displays a message describing how the requester intends
`to use the information.
`
`Web sites can request up to 31 different items of information from your
`user profile. For more information, see "Configuring Profile Assistant" later
`in this chapter.
`
`Microsoft Wallet 3.0
`Microsoft Wallet 3.0 is a software payment program that you can use to conduct
`secure financial transactions over the Web with sites that support Wallet. You can
`use Wallet to securely store private information, such as credit card account data,
`for making payments over the Internet. Your private information is encrypted and
`stored in a protected storage area. You can decide what private information to put
`in Microsoft Wallet and who gets to view and use that information.
`
`Note Wallet requires the Windows Address Book (WAB), which is included in
`the standard installation, but not the minimum installation, of Internet Explorer.
`If users attempt to start Wallet without the W AB, Internet Explorer can download
`this component using the Automatic Install feature.
`
`Petitioner Apple - Ex. 1066, p. 15
`
`

`
`Chapter 8 Content Ratings and User Privacy
`
`155
`
`Wallet supports all industry-standard payment methods, including SSL and Secure
`Electronic Transaction (SET), which enable the secure electronic use of credit
`cards. Wallet also supports add-on payment methods, such as digital cash and
`electronic checks, which some merchants and financial institutions might require.
`For instructions about how to install and use add-ons, contact the appropriate
`merchant or financial institution.
`
`Wallet stores address and payment information separately. In the Addresses
`dialog box, you can enter, store, and access addresses that you want to reference
`for shipping and billing during online order entry. You can also view names,
`e-mail addresses, and telephone numbers of Wallet users in the Address Book.
`
`In the Payments dialog box, you can enter, securely store, and access various
`types of payment methods for making online purchases. This information is
`protected by a password that you define. When you shop at an Internet store that
`supports Wallet, the site can prompt you to select payment methods stored in
`Wallet and to authorizepayment by typing your password.
`
`For more information, see "Configuring Microsoft Wallet 3.0" later
`in this chapter.
`
`Configuring Privacy Options
`
`To configure Internet Explorer privacy options, click the Tools menu, click
`Internet Options, and then click the Content and Advanced tabs. From these
`dialog boxes you can do the following:
`
`• Configure Profile Assistant.
`• Configure Microsoft Wallet 3.0.
`• Configure advanced security options for user privacy.
`
`Petitioner Apple - Ex. 1066, p. 16
`
`

`
`156
`
`Part 1 Getting Started
`
`Configuring Profile Assistant
`You can use Profile Assistant to store or update the information you want to share
`with Web sites. Profile Assistant is used by other Internet programs, including
`NetMeeting and Outlook Express .
`
`.,.. To create or update a user profile
`1. On the Tools menu, click Internet Options, and then click the Content tab ..
`2. Click My Profile.
`The following illustration shows the summary of profile properties.
`
`3. In the appropriate boxes on the Personal, Home, Business, and Other tabs,
`type the information you want to share.
`
`_j .
`
`Petitioner Apple - Ex. 1066, p. 17
`
`

`
`Chapter 8 Content Ratings and User Privacy
`
`157
`
`Configuring Microsoft Wallet 3.0
`You can use Microsoft Wallet 3.0 to store the information you want to use for
`payments over the Internet.
`
`~ To add or update addresses used for payments
`1. On the Tools menu, click Internet Options, and then click the Content tab.
`2. Click Wallet, and then click Addresses.
`The following illustration shows the Addresses tab for Microsoft Wallet.
`
`3. To add a new address, click Add.
`To update an existing address, click Edit.
`
`Petitioner Apple - Ex. 1066, p. 18
`
`

`
`158
`
`Part 1 Getting Started
`
`The following illustration shows the Add a New Address dialog box.
`
`4. Type the name and address information, or click Address Book to select
`an existing address from the Address Book.
`5. In the Display name box, type a display name for this address.
`6. Click Home or Business depending on the type of address.
`
`Petitioner Apple - Ex. 1066, p. 19
`
`

`
`Chapter 8 Content Ratings and User Privacy
`
`159
`
`~ To add or update personal credit card information
`1. On the Tools menu, click Internet Options, and then click the Content tab.
`2. Click Wallet, and then click Payments.
`The following illustration shows the Payments tab for Microsoft Wallet.
`
`3. To add a credit card to the list of payment options, click Add.
`To update existing credit card information, click Edit.
`4. Click the credit card you want to add or update, and then follow the
`instructions on your screen.
`You must provide your credit card account information and a password. You
`will need to enter this password before you can use the credit card to make a
`payment or edit the credit card information. This password ensures that other
`people cannot make purchases on the Internet using your credit card
`information. Internet Explorer encrypts and stores this information in the
`protected storage area in Wallet.
`
`Petitioner Apple - Ex. 1066, p. 20
`
`

`
`160
`
`Part 1 Getting Started
`
`Configuring Advanced Security Options for User Privacy
`You can configure a variety of user-privacy security options for Internet Explorer.
`
`~ To configure advanced security options for user privacy
`1. On the Tools menu, click Internet Options, and then click the Advanced tab.
`2. In the Security area, review the options that are selected.
`The following illustration shows the Security options on the Advanced tab.
`
`Do not search from the Address bar
`0 Just display the results in the main window
`0 Just go to the most likely site
`Security
`D Check for publisher's certificate revocation
`0 Check for server certificate revocation (requires restart)
`D Do not save encrypted pages to disk
`D Empty Temporary Internet Files folder when browser is closed
`1i1J Enable Profile Assistant
`D Use Fortezza
`li1] Use PCT 1.0
`Use SSL2.0
`
`Warn about invalid site certificates
`
`3. Depending on your needs, select or clear the Security check boxes.
`For example, if you want to enable Profile Assistant, select the Enable
`Profile Assistant check box.
`
`Petitioner Apple - Ex. 1066, p. 21

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket