throbber
UNITED STATES PATENT AND TRADEMARK OFFICE
`
`BEFORE THE PATENT TRIAL AND APPEAL BOARD
`
`COMPASS BANK, COMMERCE BANCSHARES, INC., and
`FIRST NATIONAL BANK OF OMAHA,
`Petitioners,
`
`v.
`
`INTELLECTUAL VENTURES II, LLC
`Patent Owner.
`
`Case IPR20 14-00724
`Patent 5,745,574
`
`DECLARATION OF JEFFREY WHITE
`
`Compass Bank, et al. Exhibit 1012
`Compass Bank, et al. v. Intellectual Ventures II LLC
`IPR2014-00724
`Page i
`
`

`

`I, Jeffrey White, do hereby declare as follows:
`
`1.
`
`I am an attorney at the law firm of Jones Day, 2727 North Harwood
`
`Street, Dallas, Texas 75201-1515. Other attorneys at my firm have been
`
`appointed as lead and backup counsel for Petitioners in IPR2014-00724.
`
`2.
`
`3.
`
`I am over twenty-one years of age and not under any legal disability.
`
`I have personal knowledge of the following facts and, if called to testifY
`
`as a witness, could and would testifY competently thereto.
`
`4.
`
`Attached hereto as Exhibit A is a true and correct copy of Exhibit 1004
`
`from IPR2014-00724.
`
`5.
`
`Exhibit A includes an article titled A Certificate 11!/anagement System:
`
`Structure, Functions and Protocols ("the Kapidzic Article"), which
`
`identifies Nada Kapidzic and Alan Davidson as its authors and appears at
`
`pages 153 through 160 of the Proceedings of the Symposium on Network
`
`and Distributed System Security.
`
`6.
`
`Exhibit A includes exhibit page numbers in the bottom right hand comer
`
`of each page. Using these exhibit page numbers, indications that the
`
`Proceedings of the Symposium on Network and Distributed System
`
`Security were published by the IEEE Computer Society Press appear on
`
`1-3 and 19-20.
`
`Compass Bank, et al. Exhibit 1012
`Compass Bank, et al. v. Intellectual Ventures II LLC
`IPR2014-00724
`Page 1
`
`

`

`7.
`
`Using the exhibit page numbers of Exhibit A once again, indications that
`
`the Symposium on Network and Distributed System Security took place
`
`from February 16, 1995, through February 17, 1995, appear on pages 1
`
`and 2, and a copyright date of 1995 appears on page 3.
`
`8.
`
`The Kapidzic Article is available to the public on the IEEE Xplore
`
`Digital Library website at the following URL:
`
`http://ieeexplore.ieee.org/xpl/login.jsp?tp=&amumber=390637&url=http
`
`%3A%2F%2Fieeexplore.ieee.orgo/o2Fxpls%2Fabs_all.jsp%3Farnumber
`
`%3D390637. Attached hereto as Exhibit B is a true and correct copy of
`
`this webpage, which was created on December 4, 2014 ("the IEEE
`
`Webpage"). Attached hereto as Exhibit C is a true and correct copy of
`
`the Kapidzic Article that was obtained via the IEEE W ebpage on
`
`December 4, 2014.
`
`9.
`
`The IEEE Webpage indicates that the Kapidzic Article was published at
`
`pages 153 through 160 of the Proceedings of the Symposium on Network
`
`and Distributed System Security; that the symposium took place from
`
`February 16, 1995, through February 1 1995; and that the IEEE is the
`
`publisher.
`
`10. The Kapidzic Article is also available to the public on the
`
`at
`
`URL:
`
`Compass Bank, et al. Exhibit 1012
`Compass Bank, et al. v. Intellectual Ventures II LLC
`IPR2014-00724
`Page 2
`
`

`

`http:/ /www.computer.org/csdl/proceedings/sndss/1995/7027 /00/7027015
`
`3-abs.html. Attached hereto as Exhibit Dis a true and correct copy of
`
`this webpage created on December 4, 2014 ("the Computer Society
`
`Webpage"). Attached hereto as Exhibit E is a true and correct copy of
`
`the Kapidzic Article that was obtained via the Computer Society
`
`Webpage on December 4, 2014.
`
`11. The Computer Society W ebpage indicates that the Kapidzic Article was
`
`published at page 153 of the Symposium on Network and Distributed
`
`System Security and that the conference took place from February 16,
`
`1995, through February 17, 1995.
`
`12. The Kapdzic Article obtained from the IEEE Webpage (Exhibit C) and
`
`the Kapidzic Article obtained from the Computer Society Webpage
`
`(Exhibit E) are both identical to the Kapidzic Article in Exhibit 1004
`
`from IPR2014-00724 (Exhibit A).
`
`13. Attached hereto as Exhibit F is a true and correct copy of an article titled
`
`Formalizing Certificate Afanagement Systems, which cites the Kapidzic
`
`Article in Section 1 and in the list of reterences. The list of references
`
`indicates that the Kapidzic Article was published in February 1995 in the
`
`Society Syn1posium on Network and Distributed System Security.
`
`Compass Bank, et al. Exhibit 1012
`Compass Bank, et al. v. Intellectual Ventures II LLC
`IPR2014-00724
`Page 3
`
`

`

`14. Attached hereto as Exhibit G is a true and correct copy of an article titled
`
`Creating Security Applications Based on the Global Certificate
`
`A1anagement System, which cites the Kapidizic Article in Section 1 and
`
`in the list of references. The list of references indicates that the Kapidzic
`
`Article was published in February 1995 in the Internet Society
`
`Symposium on Network and Distributed System Security.
`
`15. Attached hereto as Exhibit H is a true and correct copy of the Handbook
`
`of Applied Cryptography, which cites the Kapidzic Article on page 589
`
`and in Appendix A-Bibliography of Papers from Selected
`
`Cryptographic Forums on page 730. Appendix A (at page 730) indicates
`
`that the Kapidzic Article was published in 1995 in the Proceedings of the
`
`Internet Society Symposium on Network and Distributed System Security.
`
`16. Attached hereto as Exhibit I is a true and correct copy ofExhibit 1005
`
`from IPR20 14-00724.
`
`17.
`
`Exhibit I is titled Public Key Irifrastructure Study: Final Report ("the
`
`PKI Study") and identifies Dr. Shimshon Berkovits, Dr. Santosh
`
`Chokhani, Judith A. Furlong, Jisoo A. Geiter, and Jonathan C. Guild as
`
`its authors.
`
`18.
`
`PKI Study indicates that the National Institute of Standards and
`
`(NIST)
`
`it
`
`Compass Bank, et al. Exhibit 1012
`Compass Bank, et al. v. Intellectual Ventures II LLC
`IPR2014-00724
`Page 4
`
`

`

`Information Assurance Technology Analysis Center (IA T AC) was the
`
`performing organization and the Defense Technical Information Center
`
`(DTIC-IA) was the sponsoring I monitoring agency.
`
`19. The PKI Study is available to the public on the Defense Technical
`
`Information Center ("OTIC") website at the following URL:
`
`http://www.dtic.mil/dtic/tr/fulltext/u2/a391528.pdf. Attached hereto as
`
`Exhibit J is a true and correct copy of the PKI Study obtained from the
`
`URL in the previous sentence on December 4, 2014, and attached hereto
`
`as Exhibit K is a true and correct copy of a search for "public key
`
`infrastructure study" performed on the OTIC website on December 4,
`
`2014, which provides the URL in the previous sentence as its first result.
`
`20. The PKI Study available on the OTIC website (Exhibit J) is identical to
`
`Exhibit 1005 from IPR20 14-00724 (Exhibit I).
`
`21. Attached hereto as Exhibit L is a true and correct copy of Exhibit 1006
`
`from IPR20 14-00724.
`
`Exhibit L is titled Privacy Enhancement for Internet Electronic Alai!:
`
`Part IV: Key Certification and Related Services ("RFC 1424"), identities
`
`Burton S. Kaliski, Jr. as its author, and identifies the article as "Request
`
`for Comments: 1424" and "RFC 1424."
`
`Compass Bank, et al. Exhibit 1012
`Compass Bank, et al. v. Intellectual Ventures II LLC
`IPR2014-00724
`Page 5
`
`

`

`23. RFC 1424 is available to the public on the RFC Editor website at the
`
`following URL: http://www.rfc-editor.org/rfc/pdfrfc/rfc1424.txt.pdf.
`
`Attached hereto as Exhibit M is a true and correct copy of RFC 1424
`
`obtained from the URL in the previous sentence on December 4, 2014,
`
`and attached hereto as Exhibit N is a true and correct copy of the page on
`
`the RFC Editor website (http://\\<ww.rfc-editor.org/info/rfc1424) on
`
`which a link to the URL in the previous sentence is provided, which was
`
`obtained on December 4, 2014.
`
`24. The RFC Editor website includes a webpage explaining its publication
`
`process, and attached hereto as Exhibit 0 is a true and correct copy of
`
`this webpage, which was obtained on December 4, 2014.
`
`25.
`
`I hereby declare that all statements made herein of my own knowledge
`
`are true and that all statements made on information and belief are
`
`believed to be true, and I further declare that these statements were made
`
`with the knowledge that willful false statements and the like are
`
`punishable by fine or imprisonment, or both, under 18 U.S.C. § 1001.
`
`Date: December 5, 2014
`
`Compass Bank, et al. Exhibit 1012
`Compass Bank, et al. v. Intellectual Ventures II LLC
`IPR2014-00724
`Page 6
`
`

`

`Exhibit A
`
`Compass Bank, et al. Exhibit 1012
`Compass Bank, et al. v. Intellectual Ventures II LLC
`IPR2014-00724
`Page A-i
`
`

`

`, FJ<S- Li b ?ROCEEDINGS
`
`I
`
`"
`
`~ymposium on
`Network. and Distributed
`System Security
`
`1995
`
`-
`
`-·-· u--
`
`-11 ·--I
`
`,.
`
`February 16-17, 1995
`
`San Diego,California
`
`~ IEEE Computer Society Press
`
`. . The Institute of Electrical and Electronics Engineers, Inc.
`
`Compass Bank, et al.
`Exhibit 1004
`Page 1
`
`Compass Bank, et al. Exhibit 1012
`Compass Bank, et al. v. Intellectual Ventures II LLC
`IPR2014-00724
`Page A-1
`
`

`

`Proceedings of the
`
`Symposium on Network and Distributed
`System Security
`
`February 16-17, 1995
`
`San Diego, California
`
`Sponsored by
`The Internet Society
`
`f
`
`IEEE Computer Society Press
`Los Alamitos, California
`
`Washington
`
`•
`
`Brussels
`
`•
`
`Tokyo
`
`Compass Bank, et al.
`Exhibit 1004
`Page 2
`
`Compass Bank, et al. Exhibit 1012
`Compass Bank, et al. v. Intellectual Ventures II LLC
`IPR2014-00724
`Page A-2
`
`

`

`IEEE Computer Society Press
`10662 Los Vaqueros Circle
`P.O. Box 3014
`Los Alamitos, CA 90720-1264
`
`Copyright © 1995 by The Institute of Electrical and Electronics Engineers, Inc.
`All rights reserved.
`
`1
`
`Copyright and Reprint Permissions: Abstracting is permitted with credit to the source. Libraries may
`photocopy beyond the limits of US copyright Jaw, for private use of patrons, those articles in this volume
`that carry a code at the bottom of the first page, provided that the per-copy fee indicated in the code is paid
`through the Copyright Clearance Center, 222 Rosewood Drive, Danvers, MA 01923.
`
`IEEE Copyrights Manager, IEEE
`Other copying, reprint, or republication requests should be addressed to:
`Service Center, 445 Hoes Lane, P.O. Box 1331 , Piscataway, NJ 08855-1331.
`
`The papers in this book comprise the proceedings of the meeting mentioned on the cover and title page. They
`reflect the authors' opinions and, in the interests of timely dissemination, are published as presented and
`without change:. Their inclusion in this publication does not necessarily constitute endorsement by the
`editors, the IEEE Computer Society Press, or the Institute of Electrical and Electronics Engineers, Inc.
`
`IEEE Computer Society Press Order Number PR7027
`Library of Congress Number 94-74194
`ISBN 0-8186-7027-4 (paper)
`ISBN 0-8186-7028-2 (microfiche)
`
`Additional copies may be ordered from :
`
`IEEE Computer Society Press
`Customer Service Center
`10662 Los Vaqueros Circle
`P.O. Box 3014
`Los Alamitos, CA 90720-1264
`Tel : +l-714-821-8380
`Fax: +1-714-821-4641
`Email : cs.books@computer.org
`
`IEEE Computer Society
`13, Avenue de I'Aquilon
`B-1 200 Brussels
`BELGIUM
`Tel: +32-2-770-2198
`Fax: +32·2-770-8505
`
`IEEE Computer Society
`Ooshima Building
`2-19-1 Minami-Aoyama
`Minato-ku, Tokyo 107
`JAPAN
`Tel: +81-3-3408-3118
`Fax: +81 -3-3408-3553
`
`Editorial production by Mary E . Kavanaugh
`Cover design by Danny Nessett, additional layout by Joseph Daigle
`Printed in the United States of America by Braun-Brumfield, Inc.
`
`•
`
`The Institute of Electrical and Electronics Engineers, Inc.
`
`Compass Bank, et al.
`Exhibit 1004
`Page 3
`
`Compass Bank, et al. Exhibit 1012
`Compass Bank, et al. v. Intellectual Ventures II LLC
`IPR2014-00724
`Page A-3
`
`

`

`.. sJIS'
`\..\t3'
`/}(
`. 5)0552}
`~//6
`19"7C:'
`
`Table of Contents
`
`General Chair's Message .......... ................ ... ... .. .. .............. ........ ......... ...................................... vii
`Program Chairs' Message ................ .. ............. .............. .. ...... ......... .. .......... ............................. viii
`Organizing and Program Committee ...................................................... ...... .. .. ....................... ix
`PSRG Members ................... .... .... .. ... ... .. ... ... ........................ ... ...................................................... . x
`
`Session 1 - Diverse Approaches to Security at the Network Layer
`Chair: Stephen T. Kent- Bolt, Beranek and Newman, USA
`Multicast-Specific Security Threats and Counter-Measures .............. .. ...... ....... .... ............................... 2 y
`T. Ballardie anti J. Crowcroft
`Design of a Key Agile Cryptographic System for OC-12c Rate A TM ........ .. ...... .............................. 17 ;(
`D. Stevenson, N. Hillery, 'G. Byrd, F. Gong, and D. Winkelstein
`IpAccess - An Internet Service Access System for Firewall Installations ......... .................. .. .. ~ ...... 31
`S. Stempel
`
`Session 2 -Panel: Security Architecture for the Internet Infrastructure ......... .. ..... 43
`Chair: Robert W. Shirey- The MITRE Corporation, USA
`
`Security for the Internet Protocol (IP) and IP Next Generation
`P.A. Lambert
`fpresentation only]
`Security for the Internet Domain Name System
`J.M. Galvin
`fpresentation only]
`Security of Routing Protocols in the Internet
`G.S. Malkin
`fpresentation only]
`Security Approaches to Routing in the Internet
`S.L. Murphy
`fpresentation only]
`
`Session 3- Off-Line Object Distribution Security
`Chair: Jeffrey I. Schiller- Massachusetts Institute of Technology, USA
`Trusted Distribution of Software Over the Internet ...... .. ..... .. ..................... ................... .. ......... ....... .47
`A.D. Rubin
`Location-Independent Information Object Security .................. .. ........ ..... ,: .. ..................................... 54
`J. Lowry
`
`Internet Payments
`Session 4 -
`Chair: Ravi Ganesan -Bell Atlantic, USA
`Electronic Cash on the Internet .... .. ................. .. ....... ..... .. ....... .. ....... ................ .. .............. ...... ........... 64
`S. Brands
`Panel- Internet Payment Mechanisms: Requirements and Architectures ...... ....... ......................... 85
`Chair: Ravi Ganesan- Bell Atlantic, USA
`Panelists: Cliff Neuman - USC lSI
`Dave Crocker - Brandenburg Consulting
`[additional panelists to be announced]
`
`{
`
`v
`
`Compass Bank, et al.
`Exhibit 1004
`Page 4
`
`Compass Bank, et al. Exhibit 1012
`Compass Bank, et al. v. Intellectual Ventures II LLC
`IPR2014-00724
`Page A-4
`
`

`

`Session 5 - Security Monitoring Tools: Practice and Experience
`Chair: Michael St. Johns- Advanced Research Projects Agency, USA
`NERD: Network Event Recording Device- An Automated System for Network Anomaly
`Detection and Notification ... .. .......... .. .... , ........ ...... ............. .. ............. ...... .. ......... .. .. ... ... .... ... .. ........... 87
`D. G. Simmons and R. Wilkins
`An Overview of SNIF: A Tool for Surveying Network Information Flow .. .. .. ... ... ... ... ....... .. ............ 94
`J. Alves-Foss
`Distributed Audit Trail Analysis ....... .. ............................... .. .. .. ............ ....... .......... ... .... ........ .. ........ 102
`A. Mounji, B. Le Charlier, D. Zampunieris, and N. Habra
`
`J
`
`Session 6 -Authentication and Auth~rization
`Chair: B. Clifford Neuman -Information Sciences Institute, USA
`,.../ SESAME V2 Public Key and Authorisation Extensions to Kerberos ............... ............. ........... ...... 114
`P.V. McMahon
`Yaksha: Augmenting Kerberos with Public Key Cryptography .... .. ... .... .. ... ................................... 132
`R. Ganesan
`GSS-API Security for ONC RPC .... .. .. ..... .. .... .. ...... .. .... .. .. ..... ... ... ... ... ... ........................... ....... ....... 144
`B. Jaspan
`
`Session 7 - Mechanisms of Identity: The Certificate Infrastructure
`Chair: Hilarie Orman - University of Arizona, USA
`A Certificate Management System: Structure, Functions and Protocols ... : .. .......... .. ....................... 153
`N. Kapidzic and A. Davidson
`PEMToolKit: Building a Top-Down Certification Hierarchy for PEM from the
`Bottom Up .................. ............................................................................ .. ...................... .. ............ 161
`A. Bahreman
`A New Approach to the X.509 Framework: Allowing a Global Authentication
`Infrastructure Without a Global Trust Model .............................. .. ..................... .. .. ........................ 172
`S. Mendes and C. Huitema
`
`Session 8- Panel: Security Issues for Mosaic and the World Wide Web .............. 191
`Chair: Fred Avolio - Trusted Information Systems, USA
`Panelists: Peter J. Churchyard- Trusted Information Systems, USA
`Phillip M. Hallam-Baker- CERN, Switzerland
`Allan M. Schiffman- Enterprise Integration Technologies, USA
`
`Author Index ....................................................................................................................... 192
`
`I
`~ I
`
`vi
`
`Compass Bank, et al.
`Exhibit 1004
`Page 5
`
`Compass Bank, et al. Exhibit 1012
`Compass Bank, et al. v. Intellectual Ventures II LLC
`IPR2014-00724
`Page A-5
`
`

`

`General Chair's Message
`
`Welcome to the second ISOC Symposium on Network and Distributed System Security!
`Building on last year's very successful symposium and 1993's workshop, we are looking
`forward to another set of thought-provoking presentations and lively panel discussions.
`
`Connections to international distributed networks, and the Internet in particular, are no longer a
`luxury for many organizations. As these networks continue to grow, the need for security
`services will increase and become more complex. At the same time, this connectivity provides
`potential intruders with greater access to botQ other systems and other intruders. Sophisticated
`attacks which were once scarce due to the relatively small number of intruders able to mount
`them, have increased greatly because of the sharing of toolkits that implement the attacks.
`Increasingly, the- very infrastructure of the networks is being attacked and flaws exploited.
`Although much research has been done in network security and much practical experience is
`available, that knowledge has yet to be widely deployed and used.
`
`This symposium was created specifically to draw together researchers, implementors, and users
`of network and distributed system security facilities. The fact that we provide a unique focus on
`this widely shared need is reflected by growth in both attendance and responses to the Call for
`Papers. The number of submissions increased 50% this year and we continue to enjoy a strong
`international representation in the presentations.
`
`I am grateful to the Internet Society for again sponsoring the· symposium. I particularly
`appreciate the vision and guidance of the Privacy and Security Research Group (PSRG), which
`conceived this symposium, and especially Dan Nessett who led its development during the first
`two years.
`
`Organizing a symposium of this size is a time-consuming task, and I want to thank all the
`symposium chairs for the tremendous time and effort they have given to pull all the details
`together. Tom Hutton has taken care of the many local details, while Gloria Carriker and Heidi
`Stefani have done a superb job in handling the registration activities. Terry Mayfield navigated a
`maze of unexpected pitfalls to produce the proceedings you are now holding.
`
`A special thanks is in order for the Program Committee and its co-chairs, Dave Balenson and
`Rob Shirey, as they have put together another excellent program that is timely for Internet
`designers and implementors worldwide. Much behind-the-scenes effort went into working with
`the paper authors and panel leaders, and a huge debt of appreciation is owed to the members of
`this committee.
`
`Finally, I would like to thank all the authors who submitted papers and the panelists who are
`participating for sharing their knowledge and experiences with us.
`
`{
`
`James Ellis
`CERT Coordination Center- Carnegie Mellon University
`Pittsburgh, Pennsylvania
`E-mail: Jte@cert.org
`
`vii
`
`Compass Bank, et al.
`Exhibit 1004
`Page 6
`
`Compass Bank, et al. Exhibit 1012
`Compass Bank, et al. v. Intellectual Ventures II LLC
`IPR2014-00724
`Page A-6
`
`

`

`r
`I
`
`A
`
`D
`
`Sc
`
`~ S.E
`1
`
`Ya
`
`GS
`
`Ses
`
`AC
`
`PE!v
`Bott
`
`ANt
`Infra
`
`Sessi
`c
`
`Auth
`
`Program Co-Chairs' Message
`
`Everyone knows that the Internet is experiencing explosive growth. But it is more important
`to notice that the Internet is also changing from an academic research tool into a ubiquitous
`platform for education and commerce. Every day, more users become dependent upon
`Internet services to do their jobs and to carry their data. Every day, more of the data found on
`the Internet is sensitive data that needs protection. Thus, there is an urgent need to secure the
`Internet in all of its aspects.
`
`Happily, network security has been studied since before the Internet began. At the same time
`that computing and communication technology were developed to make the Internet's
`growth possible, security technology was also being developed. Now, the Internet
`community is beginning to apply that technology. There is security activity in many places,
`especially in the Internet Society's Internet Research Task Force (IRTF) and Internet
`Engineering Task Force (IETF). These activities are incorporating security techniques
`into Internet protocols and components, and are producing practical implementations of
`security technology.
`
`Many security tools and systems are already available for use, such as the Kerberos system,
`the Generic Security Service API, the Privacy-Enhanced Mail system, and security features
`for Point-to-Point Protocol, Telnet, and Simple Network Management Protocol. Additional
`security tools are in the works, including security for the underlying Internet Protocol (IP),
`the File Transfer Protocol (FTP), the Domain Name System, and routing protocols.
`
`Still, there is a much work to be done. The increasingly popular network information
`discovery and retrieval protocols -
`such as Gopher, W AIS, and World-Wide Web -
`need
`protection. So .do protocols for time services, transaction processing, and voice and video
`conferencing. And, in every case, the security must be made user-friendly and low-cost, or
`else users will avoid it.
`
`The organizers of this Symposium seek to enable and encourage the Internet community to
`deploy the available security technology, as well as develop new technology in areas where
`it is lacking. Hopefully, all protocols and components used in the Internet eventually will
`include or use suitable security facilities. This will make possible a protected Internet
`environment that can meet the wide range of security needs found among the diverse, global
`community of users.
`
`David Balenson
`Trusted Information Systems
`Glenwood, Maryland
`E-mail: Balenson@TIS.com
`
`Rob Shirey
`The MITRE Corporation
`McLean, Virginia
`E-mail: Shirey@MITRE.org
`
`viii
`
`Compass Bank, et al.
`Exhibit 1004
`Page 7
`
`Compass Bank, et al. Exhibit 1012
`Compass Bank, et al. v. Intellectual Ventures II LLC
`IPR2014-00724
`Page A-7
`
`

`

`'{
`I
`
`[l
`d
`0
`)f
`
`to
`:re
`•ill
`1et
`bal
`
`Organizing and Program Committee
`
`General Chair
`James T. Ellis
`CERT Coordination Center
`Carnegie Mellon University
`
`Program Co-Chairs
`David M. Balenson
`Trusted Information Systems
`
`Robert W. Shirey
`The MITRE Corporation
`
`Program Committee
`
`Thomas A. Berson- Anagram Laboratories
`Matt Bishop - University of California at Davis
`Ravi Ganesan -Bell Atlantic
`Stephen T. Kent- Bolt, Beranek and Newman
`Paul A. Lambert- Motorola
`John Linn- Open Vision Technologies
`B. Clifford Neuman -Information Sciences Institute
`Hilarie Orman- University of Arizona
`Michael Roe- University of Cambridge, UK
`Robert Rosenthal- U.S. National Institue of Standards and Technology
`Jeffrey I. Schiller- Massachusetts Institute of Technology
`Peter Yee- U.S. National Aeronautics and Space Administration
`Robert Zamparo - Telia Research, Sweden
`
`Publications Chair
`Terry Mayfield,
`Institute for Defense Analyses
`
`Registrations Chair
`Gloria Carrier,
`The MITRE Corporation .
`
`Local Arrangements Chair
`Thomas Hutton,
`San Diego Supercomputer Center
`
`Steering Group
`Internet Research Task Force, Privacy and Security Research Group
`
`ix
`
`Compass Bank, et al.
`Exhibit 1004
`Page 8
`
`Compass Bank, et al. Exhibit 1012
`Compass Bank, et al. v. Intellectual Ventures II LLC
`IPR2014-00724
`Page A-8
`
`

`

`Privacy and Security Research Group
`of the
`Internet Research Task Force
`
`1
`
`Chair
`Stephen T. Kent
`Bolt Beranek and Newman
`Kenl:@bbn.com
`
`Members
`
`David M. Balenson
`Trusi'ed Information Systems
`Balenson@ tis.com
`
`Matt Bishop
`University of California at Davis
`Bishop@cs.ucdavis.edu
`
`Russell D. Housley
`Spyrus
`Housley@ spyrus.com
`
`Danny M. Nessett
`Sun Microsystems
`Nessett@ jurassic .sun.com
`
`Michael Roe
`University of Cambridge, UK
`Michael.roe @cl.cam.ac. uk
`
`Burton S. Kaliski, Jr.
`RSA Laboratories
`Burt@rsa.com
`
`B. Clifford Neuman
`Information Sciences Institute
`Ben @isi.edu
`
`Robert Rosenthal
`U.S. National Institute of Standards
`and Technology
`Rosenthal @ecf.ncsl.nist.gov
`
`Jeffrey I. Schiller
`Massachusetts Institute of Technology
`Jis@mit.edu
`
`Robert V{. Shirey
`The MITRE Corporation
`Shirey@ mitre.org_
`
`Roberto Zamparo
`Telia Research
`Roberto.Zamparo@ haninge.trab.se
`
`X
`
`Compass Bank, et al.
`Exhibit 1004
`Page 9
`
`Compass Bank, et al. Exhibit 1012
`Compass Bank, et al. v. Intellectual Ventures II LLC
`IPR2014-00724
`Page A-9
`
`

`

`A Certificate Management System: Structure, Functions and Protocols
`
`Nada Kapidzic
`nadak @dsv.su.se
`
`Alan Davidson
`alan@dsv.su.se
`
`Department of Computer and System Sciences
`Stockholm University & Royal Institute of Technology
`Electrum 230, 164 40 Kista, Sweden
`
`Abstract
`The Certificate Management System (CMS) is a net(cid:173)
`worked syste_m for generation, distribution, storage and
`verification of certificates for use in a variety of security
`enhanced applications. The structure of a certificate is
`defined in the X.509 standard. The Internet PEM specifi(cid:173)
`cation describes the structure and functionality of a
`global certification hierarchy, as well as the structure of
`its internal messages. The approach described in this
`paper specifies new roles and responsibilities for certifi(cid:173)
`cation authorities. By extending the existing specifications
`with functions for the storage and retrieval of certificates,
`the CMS becomes functionally complete and immediately
`operable. Furthermore, it can operate either as an
`autonomous hierarchy, or integrated into a global system.
`
`1 Introduction
`
`Many security protocols, in particular those that
`support widely distributed security services,
`require
`authenticated public keys, i.e. certificates. The admini(cid:173)
`stration of certificates includes their creation, storage,
`distribution, and verification.
`The CCITT 1988 X.SOO series of recommendations
`(1] specify that creation of certificates should be performed
`by Certification Authorities (CAs). The format of certifi(cid:173)
`cates and the method for their verification are defined in
`the X.509 standard. The responsibility for storage and
`distribution of certificates is deferred to X.500 directories,
`though as yet such directories are not widely established.
`RFC 1422 [3] supplements the X.509 standard with a
`framework for the creation and verification of certificates.
`It specifies an Internet wide hierarchical infrastructure of
`CAs with the Internet Policy Registration Authority
`(IPRA) as the single root. RFCs 1421-1424 [2-5] define a
`set of functions for the administration of the certificates.
`They define the structure of PEM letters, which are in
`themselves a medium for the exchange of certificates. The
`
`PEM description of the administrative functions does not
`address the problem of certificate storage in the absence of
`'
`the X.500 directories.
`This paper presents a Certificate Management System
`that implements all necessary functions for the admini(cid:173)
`stration of certificates. This makes the system immediately
`operational without being dependant on other systems for
`certificate storage and distribution. By integrating all
`functions in one system it becomes possible to add new
`functionality as well as enhance the original functions.
`The paper contributes a description of relationships and
`roles of the system's agents, followed by a detailed and
`structured description of their functions .
`Compared to RFC 1422, the main differences in this
`approach are as follows:
`• It allows for the establishment of the autonomous
`hierarchies, each under a single PCA.
`• It defines additional functions for storage and distri(cid:173)
`bution of certificates.
`It elaborates on existing specifications by including
`design decisions that are relevant for the functional
`description of this system.
`
`2 The CMS structure
`
`{
`
`The CMS is comprised of a number of co-operating
`CAs. The CA's principle role is in signing certificates,
`either of users or of other CAs, and thereby testifying that
`the certificate has a legitimate binding to the owner's
`Distinguished Name (DN) [1]. The CAs are required to
`uphold a single root hierarchical infrastructure. This
`simplifies certificate verification, since all certificate
`verification paths within the system are known to con(cid:173)
`verge, in the worst case at the top.
`.It is assumed that the system infrastructure is a strict
`hierarchy with unlimited depth, where each CA is certified
`by only one parent CA. This is not (strictly speaking) the
`case in the PEM specifications where one CA may be
`
`0-8186-7027-4/95 $4.00 © 1995 IEEE
`
`153
`
`L
`
`Compass Bank, et al.
`Exhibit 1004
`Page 10
`
`Compass Bank, et al. Exhibit 1012
`Compass Bank, et al. v. Intellectual Ventures II LLC
`IPR2014-00724
`Page A-10
`
`

`

`certified by several PCAs. In fact from the PEM perspec(cid:173)
`tive this discussion is limited to cover only part of the
`global structure, i.e. the sub-hierarchy underneath a single
`PCA.
`Such a limitation may seem unreasonable if the CMS
`is primarily intended to support secure e-mail. However, a
`shift of perspective is warranted since this CMS is aimed
`not only to providing services for global security applica(cid:173)
`tions but also for other security enhanced applications that
`do not presuppose global inter-connectivity. A CMS
`according to this perspective can function as an autono(cid:173)
`mous system, though the section 7 discusses issues regard(cid:173)
`ing integration of such local systems to the global certifi(cid:173)
`cation hierarchy.
`
`2.1 The roles of CMS agents
`
`Within the certification hierarchy, some CAs are
`given special roles and responsibilities (see Figure 1). The
`Policy Certification Authority (PCA) is the root of the
`hierarchy, which makes it the common point of trust for
`verification of all certificates in the system. Leaf CAs are
`responsible for the administration of users. Because of
`their special role in relation to the users, these CAs are
`named User Certification Authorities (UCAs).
`
`1
`
`Figure 1 - A Certificate Management System
`
`The PCA defines the security policy that all the CAs
`in its hierarchy are bound to follow. The policy specifies,
`among other things, technical and procedural security
`measures that are imposed on all the CMS agents of that
`hierarchy. In a global system the PCA must be responsible
`for making its policy available to all users of the system.
`The importance of this role is reduced in autonomous
`hierarchies.
`The PCA is responsible for Jhe administration of the
`hierarchy structure. No CA can be added to the hierarchy
`without first registering its DN with the PCA. If a DN has
`
`1
`
`j
`
`not been previously assigned to that CA by some other
`authority, the PCA will create it by deriving it from the
`parent's DN. If the DN has been previously assigned, the
`PCA will check that it conforms to the DN subordination
`requirement. For each CA in the system the PCA stores its
`DN and address 1. The PCA uses this information to
`resolve certificate requests when the address of the certifi(cid:173)
`cate owner is not known (see 4.2).
`A separate role of the PCA is to serve as a repository
`for Certificate Revocation Lists (CRLs) [3] of all CAs in
`the system. Each CA and UCA periodically issues a CRL
`and sends it to the PCA. The users of the system can
`retrieve the CRLs from the PCA when needed for the
`verification of certificates.
`The registration of users' DNs is performed by t

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket