`Farber et al.
`
`(10) Patent No.:
`(45) Date of Patent:
`
`US 7,802,310 B2
`*Sep. 21, 2010
`
`US007802310B2
`
`(75)
`
`(54) CONTROLLINGACCESS TO DATA INA DATA
`PROCESSING SYSTEM
`Inventors: David A. Farber, Ojai, CA (US);
`Ronald D. Lachman, Northbrook, IL
`(US)
`(73) Assignees: Kinetech, Inc., Studio City, CA (US);
`Level 3 Communications, LLC,
`Broomfield, CO (US)
`Subject to any disclaimer, the term of this
`patent is extended or adjusted under 35
`U.S.C. 154(b) by 79 days.
`This patent is subject to a terminal dis-
`claimer.
`
`( * ) Notice:
`
`(21) Appl. No.: 11/980,687
`(22) Filed:
`Oct. 31, 2007
`(65)
`Prior Publication Data
`
`Mar. 13, 2008
`US 2008/0066191 A1
`Related U.S. Application Data
`
`(60) Continuation of application No. 11/724,232, filed on
`Mar. 15, 2007, which is a continuation of application
`No. 11/017,650, filed on Dec. 22, 2004, which is a
`continuation of application No. 09/987,723, filed on
`Nov. 15, 2001, now Pat. No. 6,928,442, which is a
`continuation of application No. 09/283,160, filed on
`Apr. 1, 1999, now Pat. No. 6,415,280, which is a divi-
`sion of application No. 08/960,079, filed on Oct. 24,
`1997, now Pat. No. 5,978,791, which is a continuation
`of application No. 08/425,160, filed on Apr. 11, 1995,
`now abandoned, application No. 11/980,687, which is
`a continuation of application No. 10/742,972, filed on
`Dec. 23, 2003, which is a division of application No.
`09/987,723, filed on Nov. 15, 2001, now Pat. No.
`6,928,442, which is a continuation of application No.
`09/283,160, filed onApr. 1, 1999, now Pat. No. 6,415,
`280, which is a division of application No. 08/960,079,
`filed on Oct. 24, 1997, now Pat. No. 5,978,791, which
`is a continuation of application No. 08/425,160, filed
`on Apr. 11, 1995, now abandoned.
`Int. Cl.
`H04L 29/06
`G06F 21/00
`
`(2006.01)
`(2006.01)
`
`(51)
`
`....................................... .. 726/28;711/163
`(52) U.S.Cl.
`(58) Field of Classification Search ................. .. 726/28,
`726/27, 29; 713/181
`See application file for complete search history.
`
`(56)
`
`References Cited
`U.S. PATENT DOCUMENTS
`
`3,668,647 A
`
`6/1972 Evangelisti et al.
`
`(Continued)
`FOREIGN PATENT DOCUMENTS
`
`EP
`
`0 268 069 A2
`
`5/1988
`
`(Continued)
`OTHER PUBLICATIONS
`
`Cheriton, David R. and Mann, Timothy P., “Decentralizing a global
`naming service for improved performance and fault tolerance”, ACM
`Transactions on Computer Systems, vol. 7, No. 2, May 1989, pp.
`147-183.
`
`(Continued)
`
`Primary Examiner—Gilberto Barron, Jr.
`Assistant Examiner—Samson B Lemma
`
`(74) Attorney, Agent, or Firm—Davidson Berquist Jackson &
`Gowdey, LLP; Brian Siritzky
`
`(57)
`
`ABSTRACT
`
`Access to and delivery of lice11sed co11te11t is controlled using
`content names that were determined based on the content. A
`name for a data item is obtained, the name having been
`determined based at least in part on the data which comprise
`the contents of the data item. Access to the data item is
`authorized based at least in part on the name. Once autho-
`rized, access may be granted from more than one computer.
`The name may have been determined using a hash or mes sage
`digest function such as MD4, MD5 or SHA. The data item
`may comprise a file, a portion of a file, a page in memory, a
`digital message, a digital image, a video signal or an audio
`signal.
`
`87 Claims, 31 Drawing Sheets
`
`102
`
`102
`
`PROCESSOR
`PROCESSOR
`
`
`
`106
`
`102
`
`
`
`PROCESSOR
`
`PROCESSOR
`
`
`PROCESSOR
`
`
`
`GOOG-1001-Page 1 of 61
`
`GOOG-1001-Page 1 of 61
`
`
`
`US 7,802,310 B2
`Page2
`
`U.S. PATENT DOCUMENTS
`
`9/1974 Prescheretal.
`3,835,260 A
`6/1978 Bennett etal.
`4,096,568 A
`7/1980 Mitchell etal.
`4,215,402 A
`9/1980 Chang etal,
`4,221,003 A
`9/1981 Cichellietal.
`4,290,105 A
`3/1983 Rivest
`4,376,299 A
`9/1983 Rivestetal.
`4,405,829 A
`10/1983 Neches Gt 31~
`4,412,285 A
`11/1983 Summer, Jr. et :11.
`4,414,624 A
`4/1984 Fletcher et al.
`4,441,155 A
`8/1984 Benhase etal.
`4,464,713 A
`12/1984 Dixon etal.
`4,490,782 A
`12/1985 Schmidtetal.
`4,558,413 A
`2/1986 Emry,Jr.etal.
`4,571,700 A
`3/1986 Maticketal.
`4,577,293 A
`2/1987 Meaden
`4,642,793 A
`4/1987 Hellman
`4,658,093 A
`6/1987 Gruneretal.
`4,675,810 A
`9/1987 Rivestetal.
`4,691,299 A
`2/1988 Kronstadtetal.
`4,725,945 A
`9/1988 Zamora
`4,773,039 A
`4/1989 Clancyetal.
`4,821,184 A
`12/1989 Hollowayet al.
`4,887,235 A
`12/1989 Barnes 9131
`4,888,681 A
`4/1990 Swinehartetal.
`4,914,586 A
`5/1990 Hollowayet al.
`4,922,414 A
`5/1990 Churmetal.
`4,922,417 A
`8/1990 Arnoldet al.
`4,949,302 A
`11/1990 Burke
`4,972,367 A
`4/1991 Bendert etal.
`5,007,658 A
`5/1991 Mansfieldetal.
`5,014,192 A
`6/1991 Cho
`5,025,421 A
`9/1991 Schwartz etal.
`5,047,918 A
`9/1991 Marca
`5,050,074 A
`9/1991 Dyson
`5,050,212 A
`10/1991 Colwelletal.
`5,057,837 A
`12/1991 Bendert
`5,077,658 A
`1/1992 Mazzario
`5,084,815 A
`5/1992 Miller
`5,117,351 A
`7/1992 Kobayashietal
`5,129,081 A
`7/1992 Tirfing etal,
`5,129,082 A
`9/1992 Pogue, Jr. et al.
`5,144,667 A
`5,163,147 A * 11/1992 Orita ........................... .. 707/9
`5,179,680 A
`1/1993 Colwelletal.
`5,182,799 A
`1/1993 Tamuraet a1.
`5,199,073 A
`3/1993 Scott
`5,202,982 A *
`4/1993 Gramlich etal.
`5,204,897 A
`4/1993 Wyman
`5,204,958 A
`4/1993 Cheng etal,
`5,204,966 A
`4/1993 Wittenberg etal.
`5,208,858 A
`5/1993 Vollert etal.
`5,247,620 A
`9/1993 Fukuzawaet 211.
`5,260,999 A
`11/1993 Wyman
`5,276,869 A
`1/1994 Forrestetal.
`5,276,901 A
`1/1994 Howell et al.
`5,287,499 A
`2/1994 Nemes
`5,287,514 A
`2/1994 Gram
`5,297,279 A
`3/1994 Bannon etal.
`5,301,286 A
`4/1994 Rajani
`5,301,316 A
`4/1994 Hamilton etal.
`5,317,693 A
`5/1994 Cuenodetal.
`5,341,477 A
`8/1994 Pitkin etal.
`5,343,527 A
`8/1994 Moore
`5,347,653 A
`9/1994 Flynn etal,
`5,351,302 A
`9/1994 Leighton etal,
`5,357,440 A
`10/1994 Talbott etal.
`5,357,623 A
`10/1994 Megory-Cohen
`5,359,523 A
`10/1994 Talbott etal.
`5,361,356 A
`11/1994 Clark etal.
`5,371,897 A
`12/1994 Brown etal.
`5,384,565 A
`1/1995 Cannon
`
`................. .. 1/1
`
`............. .. 714/21
`
`2/1995 Hunter et al.
`5,394,555 A
`4/1995 Belsan etal.
`5,403,639 A
`4/1995 Koriradetal,
`5,404,508 A
`8/1995 Wyrnan
`5,438,508 A
`8/1995 Cato e1a1,
`5,442,343 A
`9/1995 Perelson etal.
`5,448,668 A *
`9/1995 cohrietai,
`5,448,718 A
`9/1995 Nelson etal.
`5,452,447 A
`9/1995 Dorfman ................... .. 714/54
`5,454,000 A *
`9/1995 Coppersmith et al.
`5,454,039 A
`10/1995 Burnett
`5,459,850 A
`11/1995 Winterbottom
`5,465,365 A
`11/1995 Bader
`5,457,471 A
`12/1995 Fischer
`5,475,825 A
`5,479,654 A * 12/1995 Squibb ..................... .. 707/695
`5,491,817 A
`2/1996 Gopaletal.
`5,499,294 A
`3/1995 Friedman
`5,504,879 A
`4/1996 Eisenberg etal.
`5,530,757 A
`6/1996 Krawczyk ................. .. 713/188
`5,537,585 A
`7/1996 Blickenstaffetal.
`...... .. 707/205
`5,542,087 A
`7/1996 Neimatetal.
`5,553,143 A
`9/1996 Rossetal,
`5,568,181 A
`10/1996 Greenwoodetal.
`5,581,515 A
`12/1995 stern
`5,581,758 A
`12/1995 Burnett
`5,581,764 A
`12/1996 Fitzgeraldetal.
`5,583,995 A
`12/1995 Gardriereiai,
`5,588,147 A
`12/1996 Neerrian etal,
`5,500,834 A
`2/1997 Howard
`5,504,803 A
`2/1997 Aziz
`5,604,892 A
`2/1997 Nuttalletal.
`5,630,067 A
`5/1997 Kindelletal.
`5,632,031 A
`5/1997 Velissaropoulosetal.
`5,638,443 A
`6/1997 Stefiketal.
`5,640,564 A
`6/1997 Hamilton etal.
`5,649,196 A
`7/1997 Woodhilletal.
`5,677,952 A
`10/1997 B1ak1ey,IIIeta1.
`5,678,038 A
`10/1997 Dockteretal.
`5,678,046 A
`10/1997 Cahilletal.
`5,694,472 A * 12/1997 Johnson etal.
`5,694,596 A
`12/1997 Campbell
`5,701,316 A
`12/1997 Alfernessetal.
`5,710,922 A
`1/1998 Alley etal.
`5,724,425 A
`3/1998 Chang et a1,
`5,724,552 A
`3/1998 Taoda
`5,742,807 A *
`4/1998 Masinter ...................... .. 707/1
`5,745,879 A
`4/1998 wyrriari
`5,757,913 A
`5/1998 Bellare etal.
`5,757,915 A
`5/1998 AucSmi111e1a1,
`5,781,629 A
`7/1998 Haberetal.
`5,802,291 A
`9/1998 Balicketal.
`5,809,494 A
`9/1998 Nguyen
`5,826,049 A
`10/1998 Ogata etal.
`5,835,087 A
`11/1998 Herz etai,
`5,864,683 A
`1/1999 Bocbclt ct al.
`5,907,519 A
`5/1999 Davis
`5,907,704 A
`5/1999 Gudmundson etal.
`5,940,504 A
`8/1999 Griswold
`5,978,791 A
`11/1999 Farberetal.
`5,991,414 A
`11/1999 Garayet a1,
`6,006,018 A
`12/1999 Burnett etal.
`6,134,603 A
`10/2000 Jones et al.
`5,135,545 A
`10/2000 Kahri etai,
`6,415,280 B1
`7/2002 Farberetal.
`6,732,180 B1
`5/2004 Hale etal.
`6,816,872 131* 11/2004 Squibb ............................ .. 1/1
`6,928,442 B2
`8/2005 Farberetal.
`2002/0052884 A1
`5/2002 Farberetal.
`2002/0082999 A1
`6/2002 Lee etal.
`2003/0078888 A1
`4/2003 Lee etal.
`2003/0078889 A1
`4/2003 Lee etal.
`2003/0095660 A1
`5/2003 Lee etal.
`2004/0139097 A1
`7/2004 Farberetal.
`
`........... .. 713/189
`
`GOOG-1001-Page 2 of 61
`
`GOOG-1001-Page 2 of 61
`
`
`
`US 7,802,310 B2
`Page 3
`
`2005/0010792 A1*
`2005/0114296 A1
`2007/0185848 A1
`2008/0065635 A1
`2008/0066191 A1
`2008/0071855 A1
`2008/0082551 A1
`
`1/2005 Carpentier et al.
`5/2005 Farber et al.
`8/2007 Farber et al.
`3/2008 Farber et al.
`3/2008 Farber et al.
`3/2008 Farber et al.
`4/2008 Farber et al.
`
`........ .. 713/193
`
`FOREIGN PATENT DOCUMENTS
`
`EP
`EP
`EP
`EP
`EP
`EP
`EP
`GB
`JP
`JP
`JP
`JP
`JP
`JP
`JP
`W0
`W0
`W0
`W0
`W0
`
`0315425
`0 558 945 A2
`0 566 967 A2
`0592045
`0631 226 A1
`0 654 920 A2
`0 658 022 A2
`2294132 A
`59058564
`63-106048
`63-273961
`2-127755
`05162529
`06187384 A2
`06348558 A
`W0 92/20021
`W0 94/06087
`W0 94/20913
`W0 95/01599
`W0 97/43717
`
`5/1989
`9/1993
`10/1993
`4/1994
`12/1994
`5/1995
`6/1995
`4/1996
`4/1984
`5/1988
`11/1988
`5/1990
`6/1993
`7/1994
`12/1994
`11/1992
`3/1994
`9/1994
`1/1995
`11/1997
`
`OTHER PUBLICATIONS
`
`Request for Reexamination of U.S. Patent No. 6,928,442: Reexam
`U.S. Appl. No. 90/010,260, filed on Aug. 29, 2008.
`Advances
`in Cryptology-AUSCRYPT ’92—Workshop on the
`Theory and Application of Cryptographic Techniques Gold Coast,
`Queensland, Australia Dec. 13-16, 1992 Proceedings.
`Advances in Cryptology-EUROCRYPT ’93, Workshop on the
`Theory and Application of Cryptographic Techniques Lofthus, Nor-
`way, May 23-27, 1993 Proceedings.
`Affidavit of Timothy P. Walker in Support of CWIS’ 0pening Mark-
`man Brief Construing the Terms at Issue in U.S. Patent No.
`6,415,280, dated Jul. 25, 2003, from Civil Action No. 02-11430
`RWZ.
`Akamai and MIT’s Memorandum in Support of Their Claim Con-
`struction of USPAT 5,978,791, dated Aug. 31, 2001, from Civil
`Action No. 00-cv-11851RWZ.
`Akarnai’s Answer, Affirmative Defenses and Counterclaims to
`Amended Complaint, filed Dec. 6, 2002, in Civil Action No. 02-CV-
`1 1430RWZ.
`Akarnai’s Brief on Claim Construction, dated Aug. 8, 2003, from
`Civil Action No. 02-11430 RWZ.
`Albert Langer
`(cmf851@anu.oz.au), http://groups.google.com/
`groups?selm:1991Aug7.225159.786%40newshost.anu.
`edu.au
`&oe:UTF-8&output:gplain, Aug. 7, 1991.
`Alexander Dupuy (dupuy@smarts.com), “MD5 and LIFNs (was:
`Misc Comments)”, www.acl.lanl.gov/URI/archive/uri-94q2.mes-
`sages/0081.htrnl, Apr. 17, 1994.
`Alexander Dupuy (dupuy@smarts.com), “RE: MD5 and LIFNs
`(was: Misc Comments)”, www.acl.lanl.gov/URI/archive/uri-94q2.
`messages/0113.html, Apr. 26, 1994.
`Answer of Defendant RIAA to First Amended Complaint and Coun-
`terclaim, dated Feb. 8, 2005, from Civil Action No. CV04-7456 JFW
`(CTx).
`Berners-Lee, T. et al., “Hypertext Transfer Protocol—HTTP/1.0,”
`May 1996, pp. 1-54.
`Berners-Lee, T. et al., “Uniform Resource Locators (URL),”pp. 1-25,
`Dec. 1994.
`Berners-Lee, T., “Universal Resource Identifiers in WWW,” Jun.
`1994, pp. 1-25.
`Bert dem Boer, et al., Collisions for the compression function of
`MD.sub.5 pp. 292-304, 1994.
`
`Birgit Pfitzman, Sorting Out Signature Schemes, Nov. 1993, 1.sup.st
`Conf. Computer & Comm. Security ’93, p. 74-85.
`Birgit Pfitzmann, Sorting Out Signature Schemes, Nov. 1993, 1st
`Conf. Computer & Comm. Security ’93 pp. 74-85.
`Bowman, C. Mic, et al., “Harvest: A Scalable, Customizable Discov-
`ery and Access System,” Aug. 4, 1994, pp. 1-27.
`Bowman, C. Mic, et al., “Harvest: A Scalable, Customizable Discov-
`ery and Access System,” Mar. 12, 1995, pp. 1-29.
`Brisco, T., “DNS Support for Load Balancing,” Apr. 1995, pp. 1-7.
`Browne, Shirley et al., “Location-Independent Naming for Virtual
`Distributed Software Repositories,” 1995, 7 pages.
`Browne, Shirley et al., “Location-Independent Naming for Virtual
`Distributed Software Repositories,” 1995, printed from http:/www.
`netlib.org/utk/papers/lifn/main.html on Mar. 22, 2006, 18 pages.
`Carter, J. Lawrence, et al. “Universal Classes of Hash Functions.”
`Journal ofComputer and System Sciences, vol. 18, No. 2, Apr. 1979,
`pp. 143-154.
`Chris Charnes and Josef Pieprzky, Linear Nonequivalence versus
`Nonlinearity, Pieprzky, pp. 156-164, 1993.
`Civil Minutes General dated Jan. 25, 2005, from Civil Action No. CV
`04-7456-JFW (CTx).
`Clifford Lynch (Calur@uccmvsa.bitnet). “ietf url/uri overview draft
`paper
`(long)”, www.acl.lanl.gov/URI/archive/uri-93q1.messages/
`0015.html, Mar. 25, 1993.
`Complaint for Patent Infringement, Permanent Injunction, and Dam-
`ages, dated Sep. 8, 2004, from Civil Action No. CV 04-7456 JFW
`(AJWx).
`Cormen, Thomas H., et al. Introduction to Algorithms, The MIT
`Press, Cambridge, Massachusetts, 1994, pp. 219-243, 991-993.
`CWIS’ 0pening Markman Brief Construing the Terms at Issue in
`U.S. Patent No. 6,415,280, dated Jul. 25, 2003, from Civil Action No.
`02-11430 RWZ.
`CWIS’ Reply Markman Brief Construing the Terms at Issue in U.S.
`Patent No. 6,415,280, dated Aug. 15, 2003, from Civil Action No.
`02-11430 RWZ.
`Danzig, P.B., et al., ““Distributed Indexing: A Scalable Mechanism
`For Distributed Information Retrieval,”” Proceedings of the 14th
`Annual International ACM SIGIR Conference on Research and
`Development in Information Retrieval, pp. 220-229, Oct. 13-16,
`1991.
`Davis, James R., “A Server for a Distributed Digital Technical Report
`Library,” Jan. 15, 1994, pp. 1-8.
`Declaration of Robert B.K. Dewar in Support of CWIS’ Construction
`of the Terms at Issue in U.S. Patent No. 6,415,280, dated Jul. 25,
`2003, from Civil Action No. 02-cv-11430RWZ.
`Deering, Stephen,
`et
`al.
`“Multicast Routing in Datagram
`Internetworks and Extended LANs.” ACM Transactions on Com-
`puter Systems, vol. 8, No. 2, May 1990, pp. 85-110.
`Defendant Digital Island’s 0pening Brief on Claim Construction
`Issues dated Aug. 17, 2001, from Civil Action No. 00-cv-11851-
`RWZ.
`Defendant Lime Wire, LLC’s Answer, Affirmative Defenses and
`Counterclaims dated Nov. 15, 2007, from Civil Action No. 07-06161
`VBF (PLAx).
`Dcfcndant Mcdia Scntry, Inc.’s Rcply Memorandum of Points and
`Authorities in Further Support of Its Motion to Dismiss, dated Nov.
`15, 2004, from Civil Action No. CV04-7456 JFW (CTx).
`Defendant MediaSentry Inc.’s Notice of Motion and Motion to Dis-
`miss First Amended Complaint; Memorandum of Points and
`Authorities in Support Thereof, dated Dec. 13, 2004, from Civil
`Action No. CV04-7456 JFW.
`Defendant MediaSentry, Inc.’s Answer to Plaintiffs’ First Amended
`Complaint and Counterclaims, dated Feb. 8, 2005, from Civil Action
`No. CV04-7456 JFW (CTx).
`Defendant RIAA’s Notice of Motion and Motion to Dismiss First
`Amended Complaint; Memorandum of Points and Authorities in
`Support Thereof, dated Dec. 13, 2004, from Civil Action No. CV04-
`7456 JFW (CTx).
`Defendants Loudeye Corp.’s and 0verpeer, Inc.’s Answer to Plain-
`tiffs’ First Amended Complaint and Counterclaim, dated Feb. 8,
`2005, from Civil Action No. 04-7456 JFW (AJWx).
`Defendants’ Preliminary Invalidity Contentions dated Dec. 14,2006,
`from Civil Action No. CV 06-5086 SJO (Ex).
`
`GOOG-1001-Page 3 of 61
`
`GOOG-1001-Page 3 of 61
`
`
`
`US 7,802,310 B2
`Page 4
`
`Devine, Robert. “Design and Implementation of DDH: A Distributed
`Dynamic Hashing Algorithm.” In Proc. of 4th International Confer-
`ence on Foundations of Data Organizations and Algorithms, 1993,
`pp. 101-114.
`European Search Report issued Dec. 23, 2004 in correpsonding
`European Application No. 96910762.2-2201.
`Expert Report of Professor Ellis Horowitz, dated Mar. 6, 2006, from
`Civil Action No. 04-7456 JFW (CTx).
`Expert Report of the Honorable Gerald J. Mossinghoff, dated Mar.
`13, 2006, from Civil Action No. 04-7456 JFW (CTx).
`Faltstrom, P. et al., “How to Interact with a Whois++ Mesh,” Feb.
`1996, pp. 1-9.
`Feeley, Michael, et al. “Implementing Global Memory Management
`in aWorkstation Cluster.” In Proc. of the 15th ACM Symp. on Oper-
`ating Systems Principles, 1995, pp. 201-212.
`Fielding, R. et al., “Hypertext Transfer Protocol—HTTP/1.1,” Jan.
`1997, pp. 1-163.
`Fielding, R. et al., “Hypertext Transfer Protocol—HTTP/1.1,” Jun.
`1999, pp. 1-157.
`for Patent Infringement, Permanent
`First Amended Complaint
`Injunction and Damages, dated Nov. 24, 2004, from Civil Action No.
`CV 04-7456 JFW (CTx).
`Floyd, Sally, et al. “A reliable Multicast Framework for Light-Weight
`Sessions and Application Level Framing.” In Proceeding of ACM
`SIGCOMM ’95, pp. 342-356.
`Fredman, Michael, et al. “Storing a Sparse Table with 0(1) Worst
`Case Access Time.” Journal of the Association for Computing
`Machinery, vol. 31, No. 3, Jul. 1984, pp. 538-544.
`G. L. Friedman, Digital Camera With Apparatus for Authentication
`of Images Produced From an Image File, NASA Case No. NPO-
`19108-1-CU, U.S. Appl. No. 08/159,980, Nov. 24, 1993.
`Grigni, Michelangelo, et al. “Tight Bounds on Minimum Broadcasts
`Networks.” SIAM Journal of Discrete Mathematics, vol. 4, No. 2,
`May 1991, pp. 207-222.
`Gwertzman, James, et al. “The Case for Geographical Push-Cach-
`ing.” Technical Report HU TR 34-94 (excerpt), Harvard University,
`DAS, Cambridge, MA 02138, 1994, 2 pgs.
`H. Goodman, Ada, Obj ect-Oriented Techniques, and Concurrency in
`Teaching Data Structures and File Management Report Documenta-
`tion p. Ad-A275 385-94-04277.
`H. Goodman, Feb. 9, 1994 Ada, Object-Oriented Techniques, and
`Concurrency in Teaching Data Sructures and File Management
`Report Documentation P. AD-A275 385-94-04277.
`Hauzeur, B. M., “A Model for Naming, Addressing, and Routing,”
`ACM Trans. Inf. Syst. 4, Oct. 4, 1986), 293-311.
`International Search Report dated Jun. 24, 1996 in corresponding
`international application PCT/US1996/004733.
`K. Sollins and L. Masinter, “Functional Requirements for Uniform
`Resource Names”, www.w3.org/Addressing/rfc1737.txt, Dec. 1994,
`pp. 1-7.
`Khare, R. and Lawrence, S.. “Upgrading to TLS Within HTTP/1.1,”
`May 2000, pp. 1-12.
`Khoshafian, S. N. et al. 1986. Object identity. In Conf. Proc. On
`Object-Oriented Programming Systems, Languages and Applica-
`tions (Portland, Oregon, United States, Sep. 29-Oct. 2, 1986). N.
`Meyrowitz, Ed. OOPLSA ’86. ACM Press, NewYork, NY, 406-416.
`Kim et al., “Experiences with Tripwire: Using Integrity Checkers for
`Intrusion Detection”, COAST Labs. Dept. of Computer Sciences
`Purdue University, Feb. 22, 1995, pp. 1-12.
`Kim et al., “The Design and Implementation of Tripwire: A file
`System Integrity Checker”, COAST Labs. Dept. of Computer Sci-
`ences Purdue University, Feb. 23, 1995, pp. 1-18.
`Kim et al., “The Design and Implementation of Tripwire: A file
`System Integrity Checker”, COAST Labs. Dept. of Computer Sci-
`ences Purdue University, Nov. 19, 1993, pp. 1-21.
`Kim, Gene H., and Spafford, Eugene H., “Writing, Supporting, and
`Evaluating Tripwire: A Publicly Available Security Tool.” COAST
`Labs. Dept. of Computer Sciences Purdue University, Mar. 12, 1994,
`pp. 1-23.
`Knuth, Donald E., “The Art of Computer Programming,” 1973, vol.
`3, Ch. 6.4, pp. 506-549.
`
`Lantz, K. A., et al., “Towards a universal directory service.” In Proc.
`4th Annual ACM Symp. on Principles of Distributed Computing
`(Minaki, Ontario, Canada). PODC ’85. ACM Press, NewYork, NY,
`250-260.
`Leach, P J., et al.. The file system of an integrated local network. In
`Proc. 1985 ACM 13th Annual Conf. on Comp. Sci. CSC ’85. ACM
`Press, NY, NY, 309-324.
`Leach, P.J., et al., “UIDs as Internal Names in a Distributed File
`System,” In Proc. 1st ACM SIGACT-SIGOPS Symp. on Principles of
`Distributed Computing (Ottawa, Canada, Aug. 18-20, 1982). PODC
`’82. ACM Press, NewYork, NY, 34-41.
`Ma, C. 1992. On building very large naming systems. In Proc. 5th
`Workshop on ACM SIGOPS European Workshop: Models and Para-
`digms For Distributed Systems Structuring (France, Sep. 21-23,
`1992). EW 5. ACM Press, New York, NY, 1-5.
`Memorandum of Points and Authorities in Support of Loudeye’s and
`Overpeer’s Motion to Dismiss the First Amended Complaint for
`Failure to State a Claim or, In the Alternative, for a More Definitive
`Statement, dated Dec. 13, 2004, from Civil Action No. CV-04-7456
`JFW (AJWX).
`Ming-Ling Lo et al., On Optimal Processor Allocation to Support
`Pipelined Hash Joins, ACM SIGMOD, pp. 69-78, May 1993.
`Moats, R., “URN Syntax,” May 1997, pp. 1-8.
`Murlidhar Koushik, Dynamic Hashing With Distributed Overflow
`Space: A File Organization With Good Insertion Performance, 1993,
`Info. Sys.. vol. 18. No. 5. pp. 299-317.
`Myers, J. and Rose, M., “The Content-MD5 Header Field,” Oct.
`1995, pp. 1-4.
`Naor, Moni, et al. “The Load, Capacity and Availability of Quorum
`Systems.” In Proceedings of the 35th IEEE Symposium on Founda-
`tions of Computer Science, Nov. 1994, pp. 214-225.
`Nisan, Noam. “Psuedorandom Generators for Space-Bounded Com-
`putation.” In Proceedings of the Twenty-Second Annual ACM Syrn-
`posium on Theory of Computing, May 1990, pp. 204-212.
`Office Action in corresponding Japanese Application No. 53l,073/
`1996 mailed on Apr. 25, 2006.
`Office Communication in corresponding European Application No.
`96910762.2-1225 dated Jan. 17, 2007.
`Order Re Claim Construction dated Nov. 8, 2001, from Civil Action
`No. 00-11851-RWZ.
`Palmer, Mark, et al. “Fido: A Cache that Learns to Fetch.” In Pro-
`ceedings of the 17th International Conference on Very Large Data
`Bases, Sep. 1991, pp. 255-264.
`Patent Abstracts of Japan, “Device for Generating Database and
`Method for the Same,” Application No. 03 -080504, Sun Microsyst.
`Inc., published Jun. 1993, 38 pages.
`Patent Abstracts ofJapan, “Electronic Mail Multiplexing System and
`Communication Control Method in The System.” Jun. 30, 1993, JP
`051625293.
`
`Patent Abstracts of Japan, “Method for Registering and Retrieving
`Data Base,” Application No. 03-187303, Nippon Telegr. & Teleph.
`Corp., published Feb. 1993, 11 pages.
`Peleg, David, et al. “The Availability of Quorum Systems.” Informa-
`tion and Computation 123, 1995, 210-223.
`Peter Deutsch (peterd@bunyip.com), “Re: MD5 and LiFNs (was:
`Misc Comments)”, www.acl.lanl.gov/URI/archive/uri-94q2.mes-
`sages/0106.htrnl, Apr. 26, 1994.
`Peterson, L. L. 1988. A yellow-pages service for a local-area net-
`work. In Proc. ACM Workshop on Frontiers in Computer Commu-
`nications Technology (Vermont, 1987). J. J. Garcia-Luna-Aceves,
`Ed. SIGCOMM ’87. ACM Press, New York, NY, 235-242.
`Plaintiffs’ Memorandum of Points and Authorities in Opposition to
`Loudeye Defendants’ Motion to Dismiss, dated Nov. 8, 2004, from
`Civil Action No. CV-04-7456 JFW (AJWX).
`Plaintiffs’ Opposition to Media Sentry’s Motion to Dismiss; Memo-
`randum of Points and Authorities in Support Thereof, dated Nov. 8,
`2004, from Civil Action No. CV 04-7456 JFW (CTx).
`Plaintiff’ s Opposition to Recording Industry Association of Ameri-
`ca’s Motion to Dismiss; Memorandum of Points and Authorities in
`Support Thereof, dated Nov. 8, 2004, from Civil Action No. CV-04-
`7456 JFW (CTx).
`
`GOOG-1001-Page 4 of 61
`
`GOOG-1001-Page 4 of 61
`
`
`
`US 7,802,310 B2
`Page 5
`
`Plaintiff’ s Reply to Defendant Loudeye Corp.’s and Overpeer, Inc.’s
`Counterclaims, dated Mar. 3, 2005, from Civil Action No. CV
`04-7456 JFW (CTx).
`Plaintiff’ s Reply to Defendant MediaSentry’s Counterclaims, dated
`Mar. 3, 2005, from Civil Action No. CV 04-7456 JFW (CTx).
`Plaintiff’ s Reply to Defendant RIAA’s Counterclaims, dated Mar. 3,
`2005, from Civil Action No. 04-7456 JFW (CTx).
`Proceedings ofthe 1993 ACM SIGMOD International Conference on
`Management of Data, vol. 22, Issue 2, Jun. 1993.
`Rabin. Michael. “Efficient Dispersal of Information for Security,
`Load Balancing, and Fault Tolerance.” Journal of the ACM, vol. 36,
`No. 2, Apr. 1989, pp. 335-348.
`Ravi, R., “Rapid Rumor Ramification: Approximating the Minimum
`Broadcast Time.” In Proc. of the 35th IEEE Syrnp. on Foundation of
`Computer Science, Nov. 1994, pp. 202-213.
`Ravindran, K. and Ramakrishnan, K. K. 1991. A naming system for
`feature-based service specification in distributed operating systems.
`SIGSMALL/PC Notes 17, 3-4 (Sep. 1991), 12-21.
`Reed Wade (wade@cs.utk.edu), “re: Dienst and BFD/LIFN docu-
`ment,” Aug. 8, 1994, printed from http://www.webhistory.org/www.
`lists/www-talk1994q3/0416.html on Mar. 22, 2006, (7 pages).
`Rivest, R., “The MD5 Message-Digest Algorithm,” Apr. 1992, pp.
`1-19 and errata sheet (1 page).
`Rose, M., “The Content-MD5 Header Field,” Nov. 1993, pp. 1-3.
`Ross, K., “Hash-Routing for Collections of Shared Web Caches,”
`IEEE Network Magazine, pp. 37-44, Nov.-Dec. 1997.
`Sakti Prarnanik et al., Multi-Directory Hasing, 1993, Info. Sys., vol.
`18, No. 1, pp. 63-74.
`Schmidt, Jeanette, et al. “Chernoff-Hoeffding Bounds for Applica-
`tions with Limited Independence.” In Proceedings of the 4th ACS-
`SIAM Symposium on Discrete Algorithms, 1993, pp. 331-340.
`Schneier, Bruce, “One-Way Hash Functions, Using Crypographic
`Algorithms for Hashing,” 1991, printed from http://202.179135.4/
`data/DDJ/articles/1991/9109/91909g/9109g.htrn on Mar. 22, 2006.
`Schwartz, M., et al. 1987. Aname service for evolving heterogeneous
`systems. In Proc. 11th ACM Symp. on OS Principles (Texas, Nov.
`8-11, 1987). SOSP ’87. ACM Press, NY, NY 52-62.
`Search Report dated Jun. 24, 1996.
`Shaheen-Gouda, A. And Loucks, L. 1992. Name borders. In Proc. 5th
`Workshop on ACM SIGOPS European Workshop: Models and Para-
`digms For Distributed Systems Structuring (Mont Saint-Michel,
`France, Sep. 21-23, 1992). EW 5. ACM Press, NY, NY, 1-6.
`Sun Micro systems, Inc ., “NFS: Network File System Protocol Speci-
`fication,” Mar. 1989, pp. 1-25.
`Tarjan, Robert Endre, et al. “Storing a Sparse Table.” Communica-
`tions ofthe ACM, vol. 22, No. 11, Nov. 1979, pp. 606-611.
`Terry, D. B. 1984. An analysis of naming conventions for distributed
`computer systems. In Proc. ACM SIGCOMM Syrnp. on Communi-
`cations Architectures and Protocols: Tutorials & Symp. SIGCOMM
`’84. ACM Press, NY, NY, 218-224.
`Thomas A. Berson, Differential Cryptanalysis Mod 2.sup.32 with
`Applications to MD5, pp. 69-81, 1992.
`Vij ay Kumar, A Concurrency Control Mechanism Based on Extend-
`ible Hashing for Main Memory Database Systems, ACM, vol. 3,
`1989, pp. 109-113.
`Vij ay Kumar, A concurrency Control Mechanism based on Extend-
`ible Hashing for Main Memory Database Systems, pp. 109-113,
`ACM, vol. 3, 1989.
`Vincenzetti, David and Cotrrozzi, Massimo, “Anti Tampering Pro-
`gram,” Proceedings of the Fourth {USENIX} Security Symposium,
`Santa Clara, CA, 1993, 11 pages.
`Vincenzetti, David and Cotrrozzi, Massimo, “Anti Tampering Pro-
`gram,” Proceedings of the Fourth {USENIX} Security Symposium,
`Santa Clara, CA, undated, printed from http://wwwja.net/CERI/
`Vincenzetti_and_Cotrozzi/ATP_Anti_Tamp on Mar. 22, 2006, 8
`pages.
`Vitter, Jeffrey Scott, et al. “Optimal Prefetching via Data Compres-
`sion.” In Proceedings of 32nd IEEE Symposium on Foundations of
`Computer Science, Nov. 1991, pp. 121-130.
`W3C:ID, HTTP: A protocol for networked information, “Basic
`HTTP as defined in 1992”, www.w3.org/Protocols/HTTP2.htrnl,
`1992.
`
`Wegman, Mark, et al. “New Hash Functions and Their Use in Authen-
`tication and Set Equality.” Journal of Computer and System Sciences
`vol. 22, Jun. 1981, pp. 265-279.
`William Perrizo, et al., Distributed Join Processing Performance
`Evaluation, 1994. Twenty-Seventh Hawaii International Conference
`on System Sciences, vol. II, pp. 236-244.
`Witold Litwin et al., LH.sup.—Linear Hashing for Distributed Files,
`HP Labs Tech. Report No. HPL-93-21, Jun. 1993, pp. 1-22.
`Witold Litwin et al., Linear Hashing for Distributed Files, ACM
`SIGMOD, May 1993, pp. 327-336.
`Witold Litwin, et al., LH—Linear Hashing for Distributed Files, HP
`Labs Tech. Report No. HPL-93-21 Jun. 1993, pp. 1-22.
`Yao, Andrew Chi-Chih. “Should Tables be Sorted?” Journal of the
`Association for Computing Machinery, vol. 28, No. 3, Jul. 1981, pp.
`615 -628.
`Yuliang Zheng et al., Haval—A One-Way Hashing Algorithm with
`Variable Length of Output (Extended Abstract), pp. 83-105.
`Yuliang Zheng, et al., Haval—A One-Way Hashing Algorithm with
`Variable Length of Output
`(Extended Abstract), pp. 83-105,
`Advances in Cryptology, AUSCRIPT ’92, 1992.
`Zhiyu Tian, et al., A New Hashing Function: Statistical Behaviour
`and Algorithm, pp. 3-13, SIGIR Forum, 1993.
`Zhiyu Tian, et al., A New Hashing Function: Statistical Behaviour
`and Algorithm, pp. 3-13, SIGIR Forum, Spring 1993.
`[Proposed] Order Regarding Construction of Terms, filed Mar. 29,
`2007 in C.D. Cal. case No. CV 06-5086 SJO (Ex) [9 pgs.].
`Analysis of Plaintiffs’ Claim Chart for the ’280 Patent As Against
`Defendant Media Sentry, Inc. 11 pages.
`Analysis of Plaintiffs’ Claim Chart for the ’791 Patent As Against
`Defendant Media Sentry, Inc. (11916.001.0150.a) pp. 1-48.
`Analysis of Plaintiffs’ Claim Chart for the ’791 Patent As Against
`Defendant Overpeer pp. 1-40.
`Barbara, D., et al., “Exploiting symmetries for low-cost comparison
`of file copies”, 8th Int’l Conf. on Distributed Computing Systems,
`Jun. 1988, pp. 471-479, San Jose, CA.
`Campbell, M., “The Design of Text Signatures for Text Retrieval
`Systems,” Tech. Report, Sep. 5, 1994, Deakin University, School of
`Computing & Math., Geelong, Australia.
`Chang, W. W. et al., “A signature access method for the Starburst
`database system,” in Proc. 15th Int’l Conf. on Very Large Data Bases
`(Amsterdam, The Netherlands), pp. 145-153.
`Changes to Mar. 23, 2007 Deposition ofRobert B. K. Dewar, in C.D
`Cal. case No. CV 06-5086 SJO (Ex) [3 pgs + cover letter.].
`Communication from EPO in European Application No. 96 910
`762.2-1225 dated May 8, 2009 [4 pgs.].
`Communication pursuant to Article 96(2) EPC from EPO (Examina-
`tion Report), Jan. 17, 2007, in Application No. EP 96 910 762.2- 1225
`[1 pg. with 5 pg. annex].
`Complaint for Patent Infringement, Permanent Injunction and Dam-
`ages, Aug. 8, 2006, in C.D. Cal. case No. CV 06-5086 SJO (Ex) [11
`pgs].
`Complaint for Patent Infringement, Permanent Injunction and Dam-
`ages, filed Sep. 21, 2007 in C.D. Cal. Case No. Cv 07-06161 VBF
`(PLAx) [10 pgs.].
`Declaration ofCharles S. Baker in Support ofDefendant Lime Wire’ s
`Motion to Stay Pending Reexamination of Patent and Request for
`Extension of Deadlines, Aug. 29, 2008, in C.D. Cal. Case No. CV
`07-06161VBF (PLAx) [2 pgs.].
`Defendant Lime Wire, LLC’s First Amended Answer, Affirmative
`Defenses and Counterclaims, Oct. 2, 2008, C.D. Cal. case No.
`07-06161VBF (PLAx) [13 pgs.].
`Defendant Lime Wire, LLC’s Second AmendedAnswer, Affirmative
`Defenses and Counterclaims, Oct. 27, 2008, From C.D. Cal. case No.
`07-06161VBF (PLAx) [13 pgs.].
`Defendant Michael Weiss’s Answer to Plaintiff’ s Complaint for
`Patent Infringement, Permanent Injunction and Damages; Demand
`for Jury Trial, Sep. 15, 2006, case No. CV 06-5086 SJO (Ex) [10
`pgs].
`Defendant Recording Industry Association of America’s Amended
`Notice of Motion and Motion for Partial Summary Judgment on
`Plaintiffs’ Claims for Patent Infringement and Inducing Patent
`Infringement, Memorandum of Points and Authorities, May 22,
`2006, redacted, original confidential, filed under seal, in C.D. Cal.
`case No. CV 04-7456 JFW (CTx) [19 pgs ].
`
`GOOG-1001-Page 5 of 61
`
`GOOG-1001-Page 5 of 61
`
`
`
`US 7,802,310 B2
`Page 6
`
`Defendant Recording Industry Association of America’s and
`Mediasentry, Inc.’s Notice of Motion and Motion for Partial Sum-
`mary Judgment Based on Implied License or, In the Alternative,
`Based on Patent Misuse and Unclean Hands, May 22, 2006,
`Redacted, in C.D. Cal. case No. CV 04-7456 JFW (CTx) [21 pgs.].
`Defendant Recording Industry Association of America’s and
`Mediasentry, Inc’s Notice of Motion and Motion for Partial Sum-
`mary Judgment Based on Implied License or, In the Alternative,
`Based on Patent Misuse and Unclean Hands, May 8, 2006, in C.D.
`Cal. case No. CV 04-7456 JFW (CTx) [20 pgs.].
`Defendant StreamCast Networks Inc.’s Answer to Plaintiff’ s Com-
`plaint for Patent Infringement, Permanent Injunction and Damages;
`Demand for Jury Trial, Sep. 5, 2006, C.D. Cal. case No. CV 06-5086
`SJO (Ex) [10 pgs.].
`Defendants’ Amended Preliminary Claim Constructions [Patent
`Rule 4-2], filed Feb. 7, 2007 in C.D. Cal. case No. CV 06-5086 SJO
`(Ex) [10 pgs.].
`Defendant’s Second Amended Preliminary Claim Constructions
`[Patent Rule 4-2], filed Feb. 9, 2007 in C.D. Cal. case No. CV
`06-5086 SJO (Ex) [10 pgs.].
`Dewar, Rebuttal Expert Report of Robert B.K. Dewar, in C.D. Cal.
`case No. CV 04-7456 JFW (CTx), Apr. 10, 2006 [87 pgs].
`Faloutsos, C. “Access methods for text,” ACM Comput. Surv. 17, 1
`(Mar. 1985), 49-74.
`Faloutsos, C. et al., “Description and performance analysis of signa-
`ture file methods for office filing,” ACM Trans. Inf. Syst. 5, 3 (Jul.
`1987), 237-257.
`Faloutsos, C. et al., “Signature files: an access method for documents
`and its analytical performance evaluation,” ACM Trans. Inf. Syst. 2,
`4 (Oct. 1984), 267-288.
`Federal Inforn1ation Processing Standards (FIPS) Publication 180-1;
`Secure Hash Standard, Apr. 17, 1995 [17 pgs.].
`Feigenbaum, J. et al., “Cryptographic protection of databases and
`software,” in Distributed Computing and Cryptography: Proc.
`DIMACS Workshop, Apr. 1991, pp. 161-172, American Mathemati-
`cal Society, Boston, Mass.
`First Amended Answer o