throbber
(12) United States Patent
`Farber et al.
`
`(10) Patent No.:
`
`(45) Date of Patent:
`
`US 8,099,420 B2
`*Jan. 17, 2012
`
`US008099420B2
`
`(54)
`
`(75)
`
`(73)
`
`ACCESSING DATA IN A DATA PROCESSING
`SYSTEM
`
`Inventors: David A. Farber, Ojai, CA (US);
`Ronald D. Lachman, Northbrook, IL
`(US)
`
`Assignees: PersonalWeb Technologies, LLC, Tyler,
`TX (US); Level 3 Communications,
`LLC, Broomfield, CO (US)
`
`(*)
`
`Notice:
`
`Subject to any disclaimer, the term of this
`patent is extended or adjusted under 35
`U.S.C. 154(b) by 1312 days.
`
`This patent is subject to a terminal dis-
`claimer.
`
`EP
`
`(56)
`
`References Cited
`
`U.S. PATENT DOCUMENTS
`
`3,668,647 A
`3,835,260 A
`4,096,568 A
`4,215,402 A
`4,221,003 A
`4,290,105 A
`4,376,299 A
`4,405,829 A
`4,412,285 A
`
`6/1972 Evangelisti
`9/1974 Prescher et al.
`6/1978 Bennett et al.
`7/1980 Mitchell
`9/1980 Chang et al.
`9/1981 Cichelli
`3/1983 Rivest
`9/1983 Rivest
`10/1983 Neches
`
`(Continued)
`
`FOREIGN PATENT DOCUMENTS
`0 268 069 A2
`5/1988
`
`(Continued)
`
`OTHER PUBLICATIONS
`
`Affidavit of Timothy P. Walker in Support of CWIS’ Opening Mark-
`man Brief Construing the Terms at Issue in U.S. Patent No.
`6,415,280, dated Jul. 25, 2003, from Civil Action No. 02-11430
`RWZ.
`
`(21)
`
`Appl. No.: 11/017,650
`
`(22)
`
`Filed:
`
`Dec. 22, 2004
`
`Prior Publication Data
`
`US 2005/0114296 A1
`
`May 26, 2005
`
`(65)
`
`(60)
`
`(51)
`
`(52)
`(58)
`
`Related U.S. Application Data
`
`(Continued)
`
`Continuation of application No. 09/987,723, filed on
`Nov. 15, 2001, now Pat. No. 6,928,442, which is a
`continuation of application No. 09/283,160, filed on
`Apr. 1, 1999, now Pat. No. 6,415,280, which is a
`division of application No. 08/960,079, filed on Oct.
`24, 1997, now Pat. No. 5,978,791, which is a
`continuation of application No. 08/425,160, filed on
`Apr. 11, 1995, now abandoned.
`
`Int. Cl.
`
`(2006.01)
`G06F 17/30
`U.S. Cl.
`....................... .. 707/758; 707/781; 707/821
`Field of Classification Search ................ .. 707/758,
`707/781, 821
`See application file for complete search history.
`
`Primary Examiner — Khanh B Pham
`(74) Attorney, Agent,
`or Firm — Davidson Berquist
`Jackson & Gowdey, LLP; Brian Siritzky
`
`ABSTRACT
`(57)
`Access to data items uses names based on the data in the data
`
`items; the name of a data item may be based, at least in part,
`on a function of some or all of the bits that comprise the data
`item. A data item may comprise an arbitrary sequence of bits.
`The function may include a hash function or a message digest
`function. The name ofa data item may be compared to a list
`of names of other data items.
`
`178 Claims, 31 Drawing Sheets
`
`SIMPAE
`
`DA TA ITEM
`
`COMPUTE MD FUNCTION ON
`DATA ITEM
`
`DATA ITEM
`
`S214
`APPEND LENGTH MODULO 32 OF
`
`TRUE NAME
`
`GOOG-T023-Page 1 ores
`
`GOOG-1023-Page 1 of 68
`
`

`
`US 8,099,420 B2
`Page2
`
`U.S. PATENT DOCUMENTS
`4414624 4
`11/1983 Summew
`4,441,155 A
`4/1984 Fletcher
`444544713 A
`871984 1301111500
`4,490,782 A
`12/1984 Dixon
`4,558,413 A
`12/1985 Schmidtetal.
`445714700 A
`271985 E1111Y4114
`445774293 A
`371985 M51101‘
`4,642,764 A
`2/1987 Auslander
`445424793 A
`271987 M0501011
`445584093 A
`471987 11011111511
`4,675,810 A
`6/1987 Gruner
`445914299 A
`971987 R1V001
`447254945 A
`271988 K101101501
`447734039 A
`971988 25111015
`448214184 A
`471989 C15110Y 0151
`448874235 A
`1271989 110110W5Y
`4a888a681 A
`12/1989 B3-H195
`449144571 A
`471990 135151201514
`449144585 A
`471990 SW1110115110151
`459225414 A
`5/1990 H0110W3y
`419221417 A
`5/1990 ChuTme131~ ~~~~~~~~~~~~~~~~~~~ ~~ 707/1
`4,937,863 A
`6/1990 Rober1e1al.
`449494302 A
`871990 A111010101514
`4,953,209 A
`8/1990 Ryder, Sr. et al.
`449724357 A
`1171990 13111110
`5,014,192 A
`5/1991 Mansfieldetal.
`540254421 A
`571991 C110
`540324979 A
`771991 110011101514
`540474918 A
`971991
`S011W5112 0151
`540504074 A
`971991 M5105
`540504212 A
`971991 DY0011
`5,057,837 A
`10/1991 C01We11
`510771658 A
`12/1991 Bendert
`540844815 A
`171992 M5225110
`541174351 A
`571992 M11101
`541294081 A
`771992 K01’5Y50111
`541294082 A
`771992 111111113
`541444557 A
`971992 P051104 114
`51153147 A
`1171992 01115
`541794580 A
`171993 C01W011
`5,182,799 A
`1/1993 Tanrurae1al.
`541994073 A
`371993 80011
`5202982 A
`4/1993 GT3-m11Che131~ ~~~~~~~~~~~~~~~ ~~ 707/2
`542044897 A
`471993 WY111511
`542044958 A
`471993 5110111301514
`542044955 A
`471993 W1110111’01g 0151'
`542084858 A
`571993 V011011
`5,222,134 A
`6/1993 W311ee131~
`5423114051 A
`771993 Q11511
`5,239,648 A
`8/1993 Nukui
`542414571 A
`871993 R00010151
`5,247,620 A
`9/1993 F11k11Z3W3e131~
`542504999 A
`1171993 WY111511
`542754859 A
`171994 1201100101514
`542754901 A
`171994 110“’011
`552875499 A
`2/1994 Nemes ~~~~~~~~~~~~~~~~~~~~~~~~~~~~ ~~ 707/2
`542874514 A
`271994 G15111
`542974279 A
`371994 1351111011 01514
`A
`5301316 A
`543174593 A
`543214841 A
`543394403 A
`5a341a477 A
`543434527 A
`543474553 A
`543514302 A
`543574440 A
`543574623 A
`5,357,630 A
`5,359,523 A
`
`4/1994 Hamilton
`571994 C110110010151
`571994 1350101514
`871994 P511101
`8/1994 P1tk1ne131~ ~~~~~~~~~~~~~~~~~ ~~ 709/226
`871994 M0010
`971994 F1Y11110151~
`971994 1015111011 0151
`1071994 1511501101514
`19/1994 M"g°1y'C°h"“
`10/1994 Oprescu e1al.
`10/1994 Talbot, eta,
`
`'
`
`707/205
`
`1
`
`.......... N
`
`707/10
`
`725/92
`
`709/219
`
`A
`
`A
`
`5
`
`A
`
`
`
`8/1995 Wyman
`5,438,508 A
`3/133?
`§3§r‘§i§§§1e1ai
`§’§1i§1i§’221§§
`9/1995 Cohnetal
`544484718 A
`9/1995 Nelson e1 al
`5,452,447 A
`............... N
`5
`9/1995 Dorfman
`5,454,000 A
`Ah t
`1
`9/1995 C
`5’454’039 A
`10/1995 B1(::)II1)eetrtSml
`e a5
`5,459,860 A
`11/1995 win1erbo11orn
`5,465,365 A
`“/1995 Bader
`5’467’471 A
`12/1995 Fischer
`5,475,826 A
`12/1995 Squibb
`5,479,654 A
`1
`t
`2/1996 G
`1
`5’491’817 A
`3/1996 Fr(i)§gm:na.
`5,499,294 A
`4/1996 Eisenberg e1 al
`5,504,879 A
`A
`6/1996 Krawczyk
`5,530,757 A
`7/1996 Blickenstaffetal
`5537585 A
`A
`7/1996 Neimatetal
`5,542,087 A
`8/1996 Akizawaetéll ................ N
`5,548,724 A
`9/1996 Rosse1al
`A
`5,553,143 A
`5,568,181 A 4 10/1996 Greenwoocle1al
`5,581,615 A
`12/1996 Stern
`5,581,758 A
`12/1996 Burnett
`1
`Id t
`5’581’764 A
`12/1996 Ft
`5,583,995 A 4 12/1996 c}la:8r::e18ala5
`5’588’147 A
`12/1996 Neeman et A1’ """"""" "
`5,596,744 A
`1/1997 Dao e1 al
`5
`5’600’834 A
`2/1997 Howard‘
`5,604,803 A
`2/1997 Aziz
`5,604,892 A
`2/1997 Nu11all e1 al
`5,630,067 A
`5/1997 Kinde11eta1
`5,632,031 A
`5/1997 Velissaropoulos e1 al
`705/54
`A
`5,638,443 A
`6/1997 Stefiketal
`. . . . . . 55709303
`5,640,564 A
`6/1997 Hamilton efal. . . . . . . .
`5,649,196 A
`7/1997 Woodhill etal.
`........... N
`5,677,952 A
`10/1997 Blakley 111e1al
`5,678,038 A
`10/1997 Dook1ere1al
`5,678,046 A
`10/1997 cahill e1 al
`5,694,472 A
`12/1997 Johnson e1al
`A
`5,694,596 A
`12/1997 Campbell
`5,701,316 A
`12/1997 Alferness e1 al
`5,710,922 A
`1/1998 Alleye1al
`5’724’425 A
`3/1998 Changed
`5,724,552 A
`3/1998 Taoda
`5,742,807 A
`4/1998 Masinter
`5,745,879 A
`4/1998 wynian
`5,757,913 A
`5/1998 Bellare e1al
`5,757,915 A
`5/1998 Aucsmith et.a1
`713/177
`5
`5781629 A
`7/1998 Haber
`......................... N 709/202
`5,802,291 A
`9/1998
`'
`5,809,494 A
`9/1998 Nguyen
`A
`707/1
`5’826’049 A
`10/1998
`"""""""""""""" "
`4
`5,835,087 A
`11/1998 Herz
`5
`346/810
`5,864,683 A
`1/1999 B0ebe.I:tme.t..,.1.1................. N
`5,907,619 A
`5/1999 Davis
`A
`5,907,704 A
`5/1999 Gudmundson e1 al
`5,940,504 A
`8/1999 Griswold
`5,978,791 A
`11/1999 Farber et al
`5,991,414 A
`11/1999 Garaye1 al.
`6,006,018 A
`12/1999 Burne11 e1 al
`A
`6,135,646 A
`6,415,280 B1
`6,732,180 B1
`6,816,872 B1
`6,928,442 B2
`2002/0052884 A1
`2002/0082999 A1
`2003/0078888 A1
`2003/0078889 A1
`2003/0095660 A1
`2004/0139097 A1
`
`A
`
`395/200 49
`
`. . . . . . . . . N
`1
`................. N
`
`A
`
`10/2000 Kahnetal.
`7/2002 Farber e1 al
`5/2004 Hale e1al
`A
`11/2004 Squibb
`8/2005 Farber et al
`5/2002 1=arbere1al
`6/2002 Lee e1al
`A
`4/2003 Lee e1 al
`4/2003 Lee e1 al
`5/2003 L
`1 1
`000 54
`7/2004 Farber e1 al.
`
`5,371,897 A
`5,375,205 A
`5334555 A
`5,394,555 A
`5,403,639 A
`5,404,508 A
`
`12/1994 Brown etal.
`12/1994 Hunter etal.
`1/1995 Cannon
`2/1995 Hun1ere1al.
`4/1995 Belsan e1al.
`4/1995 Konrad
`
`2005/0114296 Al
`2007/0185848 A1
`2008/0065635 A1
`2008/0066191 A1
`2008/0071855 A1
`2008/0082551 A1
`
`5/2005 Farber et al.
`3/2007 Farber et al.
`3/2008 Farber et al.
`3/2008 Farber e1 al.
`3/2008 Farber e1 al.
`3/2008 Farber e1 al.
`
`GOOG-T023-Page 2 ores
`
`GOOG-1023-Page 2 of 68
`
`

`
`US 8,099,420 B2
`Page 3
`
`EP
`EP
`EP
`EP
`EP
`EP
`EP
`GB
`JP
`JP
`JP
`JP
`JP
`JP
`JP
`W0
`W0
`W0
`W0
`W0
`
`FOREIGN PATENT DOCUMENTS
`0315425
`5/1989
`0 558 945 A2
`9/1993
`0 566 967 A2
`10/1993
`0592045
`4/1994
`0631 226 A1
`12/1994
`0 654 920 A2
`5/1995
`0 658 022 A2
`6/1995
`2294132 A
`4/1996
`59058564
`4/1984
`63-106048
`5/1988
`63-273961
`11/1988
`2-127755
`5/1990
`05162529
`6/1993
`06187384 A2
`7/1994
`06348558 A
`12/1994
`WO 92/20021
`11/1992
`WO 94/06087
`3/1994
`WO 94/20913
`9/1994
`WO 95/01599
`1/1995
`WO 97/43717
`11/1997
`
`OTHER PUBLICATIONS
`
`Akamai and MIT’s Memorandum in Support of Their Claim Con-
`struction of USPAT 5,978,791, dated Aug. 31, 2001, from Civil
`Action No. 00-cv-11851RWZ.
`Akamai’s Answer, Affirmative Defenses and Counterclaims to
`Amended Complaint, filed Dec. 6, 2002, in Civil Action No. 02-CV-
`1 1430RWZ.
`Akan1ai’s Brief on Claim Construction, dated Aug. 8, 2003, from
`Civil Action No. 02-11430 RWZ.
`Answer of Defendant RIAA to First Amended Complaint and Coun-
`terclaim, dated Feb. 8, 2005, from Civil Action No. CV04-7456 JFW
`(CTx).
`Berners-Lee, T. et al., “Hypertext Transfer Protocol—HTTP/1.0,”
`May 1996, pp. 1-54.
`Berners-Lee, T., “Universal Resource Identifiers in WWW,” Jun.
`1994, pp. 1-25.
`Bowman, C. Mic, et al., “Harvest: A Scalable, Customizable Discov-
`ery and Access System,” Aug. 4, 1994, pp. 1-27.
`Bowman, C. Mic, et al., “Harvest: A Scalable, Customizable Discov-
`ery and Access System,” Mar. 12, 1995, pp. 1-29.
`Brisco, T., “DNS Support for Load Balancing,” Apr. 1995, pp. 1-7.
`Browne, Shirley et al., “Location-Independent Naming for Virtual
`Distributed Software Repositories,” 1995, 7 pages.
`Browne, Shirley et al., “Location-Independent Naming for Virtual
`Distributed Software Repositories,” 1995, printed from http:/www.
`netlib.org/utk/papers/lifr1/main.htrnl on Mar. 22, 2006, 18 pages.
`Civil Minutes General dated Jan. 25, 2005, from Civil Action No. CV
`04-7456-JFW (CTx).
`Complaint for Patent Infringement, Permanent Injunction, and Dam-
`ages, dated Sep. 8, 2004, from Civil Action No. CV 04-7456 JFW
`(AJWx).
`CWIS' Opening Markman Brief Construing the Terms at Issue in
`U.S. Patent No. 6,415,280, dated Jul. 25, 2003, from Civil Action No.
`02-11430 RWZ.
`CWIS' Reply Markman Brief Construing the Terms at Issue in U.S.
`Patent No. 6,415,280, dated Aug. 15, 2003, from Civil Action No.
`02-11430 RWZ.
`Davis, James R., “A Server for a Distributed Digital Technical Report
`Library,” Jan. 15, 1994, pp. 1-8.
`Declaration of Robert B.K. Dewar in Support of CWIS' Construction
`of the Terms at Issue in U.S. Patent No. 6,415,280, dated Jul. 25,
`2003, from Civil Action No. 02-cv-11430RWZ.
`Defendant Digital Island’s Opening Brief on Claim Construction
`Issues dated Aug. 17, 2001, from Civil Action No. 00-cv-11851-
`RWZ.
`Defendant Media Sentry, Inc.’s Reply Memorandum of Points and
`Authorities in Further Support of Its Motion to Dismiss, dated Nov.
`15, 2004, from Civil Action No. CV04-7456 JFW (CTx).
`Defendant MediaSentry Inc. ’s Notice of Motion and Motion to Dis-
`miss First Amended Complaint; Memorandum of Points and
`Authorities in Support Thereof, dated Dec. 13, 2004, from Civil
`Action No. CV04-7456 JFW .
`
`Defendant MediaSentry, Inc.’s Answer to Plaintiffs’ First Amended
`Complaint and Counterclaims, dated Feb. 8, 2005, from Civil Action
`No. CV04-7456 JFW (CTX).
`Defendant RIAA’s Notice of Motion and Motion to Dismiss First
`Amended Complaint; Memorandum of Points and Authorities in
`Support Thereof, dated Dec. 13, 2004, from Civil Action No. CV04-
`7456 JFW (CTx).
`Defendants Loudeye Corp.’s and Overpeer, Inc.’s Answer to Plain-
`tiffs’ First Amended Complaint and Counterclaim, dated Feb. 8,
`2005, from Civil Action No. 04-7456 JFW (AJWx).
`Defendants’ Preliminary Invalidity Contentions dated Dec. 14, 2006,
`from Civil Action No. CV 06-5086 SJO (Ex).
`European Search Report issued Dec. 23, 2004 in correpsonding
`European Application No. 96910762.2-2201.
`Expert Report of Professor Ellis Horowitz, dated Mar. 6, 2006, from
`Civil Action No. 04-7456 JFW (CTx).
`Expert Report of the Honorable Gerald J. Mossinghoff, dated Mar.
`13, 2006, from Civil Action No. 04-7456 JFW (CTx).
`Faltstrom, P. et al., “How to Interact with a Whois++ Mesh,” Feb.
`1996, pp. 1-9.
`Fielding, R. et al., “Hypertext Transfer Protocol—HTTP/1.1,” Jan.
`1997, pp. 1-163.
`Fielding, R. et al., “Hypertext Transfer Protocol—HTTP/1.1,” Jun.
`1999, pp. 1-157.
`Infringement, Permanent
`for Patent
`First Amended Complaint
`Injunction and Damages, dated Nov. 24, 2004, from Civil Action No.
`CV 04-7456 JFW (CTx).
`International Search Report dated Jun. 24, 1996 in corresponding
`international application PCT/US1996/004733.
`Khare, R. and Lawrence, S., “Upgrading to TLS Within HTTP/1.1,”
`May 2000, pp. 1-12.
`Kim et al., “The Design and Implementation of Tripwire: A file
`System Integrity Checker”, COAST Labs. Dept. of Computer Sci-
`ences Purdue University, Feb. 23, 1995, pp. 1-18.
`Knuth, Donald E., “The Art of Computer Programming,” 1973, vol.
`3, Ch. 6.4, pp. 506-549.
`Memorandum of Points and Authorities in Support of Loudeye’s and
`Overpeer’s Motion to Dismiss the First Amended Complaint for
`Failure to State a Claim or, in the Alternative, for a More Definitive
`Statement, dated Dec. 13, 2004, from Civil Action No. CV-04-7456
`JFW (AJWX).
`Moats, R., “URN Syntax,” May 1997, pp. 1-8.
`Myers, J. and Rose, M., “The Content-MD5 Header Field,” Oct.
`1995, pp. 1-4.
`Office Action in corresponding Japanese Application No. 531,073/
`1996 mailed on Apr. 25, 2006.
`Office Communication in corresponding European Application No.
`96910762.2-1225 dated Jan. 17,2007.
`Order Re Claim Construction dated Nov. 8, 2001, from Civil Action
`No. 00-11851-RWZ.
`Patent Abstracts of Japan, “Device for Generating Database and
`Method for the Same,” Application No. 03 -080504, Sun Microsyst.
`Inc., published Jun. 1993, 38 pages.
`Patent Abstracts of Japan, “Method for Registering and Retrieving
`Data Base,” Application No. 03-187303, Nippon Telegr. & Teleph.
`Corp., published Feb. 1993, 11 pages.
`Plaintiffs’ Memorandum of Points and Authorities in Opposition to
`Loudeye Defendants’ Motion to Dismiss, dated Nov. 8, 2004, from
`Civil Action No. CV-04-7456 JFW (AJWX).
`Plaintiffs’ Opposition to Media Sentry’s Motion to Dismiss; Memo-
`randum of Points and Authorities in Support Thereof, dated Nov. 8,
`2004, from Civil Action No. CV 04-7456 JFW (CTx).
`Plaintiff’ s Opposition to Recording Industry Association of Ameri-
`ca’s Motion to Dismiss; Memorandum of Points and Authorities in
`Support Thereof, dated Nov. 8, 2004, from Civil Action No. CV-04-
`7456 JFW (CTx).
`Plaintiff’ s Reply to Defendant Loudeye Corp. ’s and Overpeer, Inc.’s
`Counterclaims, dated Mar. 3, 2005, from Civil Action No. CV
`04-7456 JFW (CTx).
`Plaintiff’ s Reply to Defendant MediaSentry’s Counterclaims, dated
`Mar. 3, 2005, from Civil Action No. CV 04-7456 JFW (CTx).
`Plaintiff’ s Reply to Defendant RIAA’s Counterclaims, dated Mar. 3,
`2005, from Civil Action No. 04-7456 JFW (CTx).
`
`GOOG-T023-Page 3 0f"68
`
`GOOG-1023-Page 3 of 68
`
`

`
`US 8,099,420 B2
`Page 4
`
`Reed Wade (wade@cs.utk.edu), “re: Dienst and BFD/LIFN docu-
`ment,” Aug. 8, 1994, printed from http://www.webhistory.org/www.
`lists/www-talkl994q3/0416.html on Mar. 22, 2006, (7 pages).
`Rivest, R., “The MD5 Message-Digest Algorithm,” Apr. 1992, pp.
`1-19 and errata sheet (1 page).
`Rose, M., “The Content-MD5 Header Field,” Nov. 1993, pp. 1-3.
`Schneier, Bruce, “One-Way Hash Functions, Using Crypographic
`Algorithms for Hashing,” 1991, printed from http://202.179135.4/
`data/DDJ/articles/1991/9109/91909g/9109g.htrn on Mar. 22, 2006.
`Sun Micro systems, Inc ., “NFS: Network File System Protocol Speci-
`fication,” Mar. 1989, pp. 1-25.
`Vincenzetti, David and Cotrrozzi, Massimo, “Anti Tampering Pro-
`gram,” Proceedings of the Fourth {USENIX} Security Symposium,
`Santa Clara, CA, 1993, 11 pages.
`Vincenzetti, David and Cotrrozzi, Massimo, “Anti Tampering Pro-
`gram,” Proceedings of the Fourth {USENIX} Security Symposium,
`Santa Clara, CA, undated, printed from http://www.ja.nel/CERI/
`VincenZetti_and_Cotrozzi/ATP_Anti_Tamp on Mar. 22, 2006, 8
`pages.
`Berners-Lee, T. et al ., “Uniform Resource Locators (URL),” pp. 1-25,
`Dec. 1994.
`Danzig, P.B., et al., ‘“‘Distributed Indexing: A Scalable Mechanism
`for Distributed Inforn1ation Retrieval,’”’ Proceedings of the 14th
`Annual International ACM SIGIR Conference on Research and
`Development in Information Retrieval, pp. 220-229, Oct. 13-16,
`1991.
`Hauzeur, B. M., “A Model for Naming, Addressing, and Routing,”
`ACM Trans. Inf. Syst. 4, Oct. 4, 1986), 293-311.
`Khoshafian, S. N. et al. 1986. Object identity. In Conf. Proc. on
`Object-Oriented Programming Systems, Languages and Applica-
`tions (Portland, Oregon, United States, Sep. 29-Oct. 2, 1986). N.
`Meyrowitz, Ed. OOPLSA ’86. ACM Press, NewYork, NY, 406-416.
`Lantz, K. A., et al., “Towards a universal directory service” In Proc.
`4th Annual ACM Symp. on Principles of Distributed Computing
`(Minaki, Ontario, Canada). PODC ’85. ACM Press, New York, NY,
`250-260.
`Leach, P J., et al.. The file system of an integrated local network. In
`Proc. 1985 ACM 13th Annual Conf. on Comp. Sci. CSC ’85. ACM
`Press, NY, NY, 309-324.
`Leach, P.J., et al., “UIDs as Internal Names in a Distributed File
`System,” In Proc. 1st ACM SIGACT-SIGOPS Symp. on Principles of
`Distributed Computing (Ottawa, Canada, Aug. 18-20, 1982). PODC
`’82. ACM Press, NewYork, NY, 34-41.
`Ma, C. 1992. On building very large naming systems. In Proc. 5th
`Workshop on ACM SIGOPS European Workshop: Models and Para-
`digms for Distributed Systems Structuring (France, Sep. 21-23,
`1992). EW 5. ACM Press, New York, NY, 1-5.
`Peterson, L. L. 1988. A yellow-pages service for a local-area net-
`work. In Proc. ACM Workshop on Frontiers in Computer Commu-
`nications Technology (Vermont, 1987). J. J. Garcia-Luna-Aceves,
`Ed. SIGCOMM ’87. ACM Press, NewYork, NY, 235-242.
`Ravindran, K. and Ramakrishnan, K. K. 1991. A naming system for
`feature-based service specification in distributed operating systems.
`SIGSMALL/PC Notes 17, 3-4 (Sep. 1991), 12-21.
`Ross, K., “Hash-Routing for Collections of Shared Web Caches,”
`IEEE Network Magazine, pp. 37-44, Nov.-Dec. 1997.
`Schwartz, M., et al. 1987. Aname service for evolving heterogeneous
`systems. I11 Proc. 11th ACM Symp. 011 OS Principles (Texas, Nov.
`8-11, 1987). SOSP ’87. ACM Press, NY, NY, 52-62.
`Shaheen-Gouda, A. and Loucks, L. 1992. Name borders. In Proc. 5th
`Workshop on ACM SIGOPS European Workshop: Models and Para-
`digms for Distributed Systems Structuring (Mont Saint-Michel,
`France, Sep. 21-23, 1992). EW 5. ACM Press, NY, NY, 1-6.
`Terry, D. B. 1984. An analysis of naming conventions for distributed
`computer systems. In Proc. ACM SIGCOMM Symp. on Communi-
`cations Architectures and Protocols: Tutorials & Symp. SIGCOMM
`’84. ACM Press, NY, NY, 218-224.
`Cheriton, David R. and Mann, Timothy P., “Decentralizing a global
`naming service for improved performance and fault tolerance”, ACM
`Transactions on Computer Systems, vol. 7, No. 2, May 1989, pp.
`147-183.
`Request for Reexamination of U.S. Patent No. 6,928,442: Reexam
`Control U.S. Appl. No. 90/010,260, filed Aug. 29, 2008.
`
`Kim et al ., “Experiences with Tripwire: Using Intergrity Checkers for
`Intrusion Detection”, COAST Labs. Dept. of Computer Sciences
`Purdue University, Feb. 22, 1995, pp. 1-12.
`Kim et al., “The Design and Implementation of Tripwire: A file
`System Intergrity Checker”, COAST Labs. Dept. of Computer Sci-
`ences Purdue University, Nov. 19, 1993, pp. 1-21.
`Zhiyu Tian et al., A New Hashing Function: Statistical Behaviour and
`Algorithm, pp. 3-13.
`G. L. Friedman, Digital Camera with Apparatu for Authentication of
`Images Produced from an Image File, NASA Case No. NPO—19108—
`1-CU, U.S. Appl. No. 08/159,980, filed Nov. 24, 1993.
`H. Goodman, Ada, Obj ect-Oriented Techniques, and Concurrency in
`Teaching Data Structures and File Management Report Documenta-
`tion p. AD-A275 385-94-04277.
`Advances
`in Cryptology-EUROCRYPT’93; Workshop on the
`Theory and Application of Cryptographic Techniques Lofthus, Nor-
`way, May 23-27, 1993 Proceedings.
`Proceedings ofthe 1993 ACM SIGMOD International Conference on
`Management of Data, vol. 22, Issue 2, Jun. 1993.
`Advances
`in Cryptology-AUSCRYPT ’92—Workshop on the
`Theory and Application of Cryptographic Techniques Gold Coast,
`Queensland, Australia, Dec. 13-16, 1992 Proceedings.
`Witold Litwin et al., Linear Hashing for Distributed Files, ACM
`SIGMOD, May 1993, pp. 327-336.
`Ming-Ling Lo et al., On Optimal Processor Allocation to Support
`Pipelined Hash Joins, ACM SIGMOD, pp. 69-78, May 1993.
`Thomas A. Berson, Differential Cryptanalysis Mod 232 with Appli-
`cations to MD5, pp. 69-81.
`William Perrizo et al., Distributed Join Processing Performance
`Evaluation, Twenty-Seventh Hawaii International Conference on
`System Sciences, vol. II, pp. 236-244.
`Vijay Kumar, A Concurrency Control Mechanism Based on Extend-
`ible Hashing for Main Memory Database Systems, ACM, vol. 3,
`1989, pp. 109-113.
`Birgit Pfitzman, Sorting Out Signature Schemes, Nov. 1993, 15’ Conf.
`Computer & Comm. Security ’93, p. 74-85.
`Bert dem Boer et al., Collisions for the compression function of MD5,
`pp. 292-304.
`Sakti Pramanik et al., Multi-Directory Hasing, 1993, Info. Sys., vol.
`18, No. 1, pp. 63-74.
`Murlidhar Koushik, Dynamic Hashing with Distributed Overflow
`Space: A File Organization with Good Insertion Performance, 1993,
`Info. Sys., vol. 18, No. 5, pp. 299-317.
`Witold Litwin et al., LH*-Linear Hashing for Distributed Files, HP
`Labs Tech. Report No. HPL-93-21, Jun. 1993; pp. 1-22.
`Yuliang Zheng et al., HAVAL—A One-Way Hashing Algorithm with
`Variable Length of Output (Extended Abstract), pp. 83-105.
`Chris Charnes and Josef Pieprzky, Linear Nonequivalence versus
`Nonlinearity, Pieprzky, pp. 156-164.
`Gwertzman, James, et al. “The Case for Geographical Push-Cach-
`ing.” Technical Report HU TR 34-94 (excerpt), Harvard University,
`DAS, Cambridge, MA 02138, 1994, 2 pgs.
`Grigni, Michelangelo, et al. “Tight Bounds on Minimum Broadcasts
`Networks.” SIAM Journal of Discrete Mathematics, vol. 4, No. 2,
`May 1991, pp. 207-222.
`Devine, Robert. “Design and Implementation of DDH: A Distributed
`Dynamic Hashing Algorithm” In Proceedings of 4th International
`Conference 011 Foundations of Data Organizations and Algorithms,
`1993, pp. 101-114.
`“Multicast Routing in Datagram
`al.
`et
`Deering, Stephen,
`Internetworks and Extended LANs” ACM Transactions on Com-
`puter Systems, vol. 8, No. 2, May 1990, pp. 85-110.
`Cormen, Thomas H., et al. Introduction to Algorithms, The MIT
`Press, Cambridge, Massachusetts, 1994, pp. 219-243, 991-993.
`Naor, Moni, et al. “The Load, Capacity and Availability of Quorum
`Systems.” In Proceedings of the 35th IEEE Symposium on Founda-
`tions ofComputer Science, Nov. 1994, pp. 214-225.
`Nisan, Noam. “Psuedorandom Generators for Space-Bounded Com-
`putation” In Proceedings of the Twenty-Second Annual ACM Syrn-
`posium on Theory of Computing, May 1990, pp. 204-212.
`Palmer, Mark, et al. “Fido: A Cache that Learns to Fetch” In Pro-
`ceedings of the 17th International Conference on Very Large Data
`Bases, Sep. 1991, pp. 255-264.
`
`GOOG-T023-Page 4 ores
`
`GOOG-1023-Page 4 of 68
`
`

`
`US 8,099,420 B2
`Page 5
`
`Peleg, David, et al. “The Availabiltiy of Quorum Systems.” Informa-
`tion and Computation 123, 1995, 210-223.
`Rabin, Michael. “Efficient Dispersal of Information for Security,
`Load Balancing, and Fault Tolerance.” Journal of the ACM, vol. 36,
`No. 2, Apr. 1989, pp. 335-348.
`Ravi, R., “Rapid Rumor Ramification: Approximating the Minimum
`Broadcast Time” In Proceedings of the 35th IEEE Symposium on
`Foundation of Computer Science, Nov. 1994, pp. 202-213.
`Schmidt, Jeanette, et al. “Chernoff-Hoeffding Bounds for Applica-
`tions with Limited Independence” In Proceedings of the 4th ACS-
`SIAM Symposium on Discrete Algorithms, 1993, pp. 331-340.
`Tarjan, Robert Endre, et al. “Storing a Sparse Table.” Communica-
`tions ofthe ACM, vol. 22, No. 11, Nov. 1979, pp. 606-611.
`Wegman, Mark, et al. “New Hash Functions and Their Use in Authen-
`tication and Set Equality.” Journal of Computer and System Sciences
`vol. 22, Jun. 1981, pp. 265-279.
`Vitter, Jeffrey Scott, et al. “Optimal Prefetching via Data Compres-
`sion” In Proceedings of 32nd IEEE Symposium on Foundations of
`Computer Science, Nov. 1991, pp. 121-130.
`Fredman, Michael, et al. “Storing a Sparse Table with 0(1) Worst
`Case Access Time” Journal of the Association for Computing
`Machinery, vol. 31, No. 3, Jul. 1984, pp. 538-544.
`Yao, Andrew Chi-Chih. “Should Tables be Sorted?” Journal of the
`Association for Computing Machinery, vol. 28, No. 3, Jul. 1981, pp.
`615 -628.
`Floyd, Sally, et al. “A reliable Multicast Framework for Light-Weight
`Sessions and Application Level Framing.” In Proceedings of ACM
`SIGCOMM ’95, pp. 342-356.
`Feeley, Michael, et al. “Implementing Global Memory Management
`in aWorkstation Cluster.” In Proceedings of the 15th ACM Sympo-
`sium on Operating Systems Principles, 1995, pp. 201-212.
`Carter, J. Lawrence, et al. “Universal Classes of Hash Functions”
`Journal of Computer and System Sciences, vol. 18, No. 2, Apr. 1979,
`pp. 143-154.
`Patent Abstracts of Japan, “Electronic Mail Multiplexing System and
`Communication Control Method in The System.” 06/30/ 19993, JP
`05162529.
`Kim et al., “Experiencess with Tripwire: Using Intergrity Checkers
`for Intrusion Detection”, COAST Labs. Dept. of Computer Sciences
`Purdue University, Feb. 22, 1995, pp. 1-12.
`Kim et al., “The Design and Implementation of Tripwire: A file
`System Intergrity Checker”, COAST Labs. Dept. of Computer Sci-
`ences Purdue University, Nov. 19, 1993, pp. 1-21.
`Bert Dem Boer et al., Collisions for the compression function of
`MD5, pp. 292-304.
`Sakti Pramanik et al., Multi-Directory Hashing, 1993, Info. Sys., vol.
`18, No. 1, pp. 63-74.
`Murlidhar Koushik, Dynamic Hashing with Distrubuted Overflow
`Space: A File Organization with Good Insertion Performance, 1993,
`Info. Sys., vol. 18, No. 5, pp. 299-317.
`Witold Litwin et al., LH*-Linear Hashing for Distributed Files, HP
`Labs Tech. Report No. HPL-93-21, Jun. 1993, pp. 1-22.
`Yuliang Zheng et al., HAVAL-A One-Way Hashing Algorithm with
`Variable Length of Output (Extended Abstract), 1993, pp. 83-105.
`Chris Charnes and Josef Pieprzky, Linear Nonequivalence versus
`Nonlinearity, Pieprzky, 1993, pp. 156-164.
`Withold Litwi11 et al., Linear Hashing for Distributed Files, ACM
`SIGMOD, May 1993, pp. 327-336.
`Ming-Ling Lo et al., On Optimal Processor Allocation to Support
`Pipelined Hash Joins, ACM SIGMOD, pp. 69-78, May 1993.
`Thomas A. Berson, Differential Cryptanalysis Mod 232 with Appli-
`cations to MD5, pp. 69-81.
`William Perrizo et al., Distributed Join Processing Performance
`Evaluation, Twenty-Seventh Hawaii International Conference on
`System Sciences, vol. II, pp. 236-244.
`Vij ay Kumar, A Concurrency Control Mechanism Based on Extend-
`ible Hashing for Main Memory Database Systems, ACM, vol. 3,
`1989, pp. 109-113.
`Birgit Pfitzman, Sorting Out Signature Schemes, Nov. 1993, 15’ Conf.
`Computer & Comm. Security ’93, p. 74-85.
`Zhiyu Tian et al., A New Hashing Function: Statistical Behaviour and
`Algorithm, Spring 1993, pp. 3-13.
`
`G.L. Friedman, Digital Camera with Apparatus for Authentication of
`Images Produced from an In1age File, NASA Case No. NPO-19108-
`1-CU,U.S.App1.No. 08/159,980, Nov. 24, 1993.
`H. Goodman, Ada, Obj ect-Oriented Techniques, and Concurrency in
`Teaching Data Structures and File Management Report Documenta-
`tion p. AD-A275 385-94-04277.
`Advances in Cryptology-EUROCRYPT ’93, Workshop on the
`Theory and Application of Cryptographic Techniques Lofthus, Nor-
`way, May 23-27, 1993, Proceedings.
`Proceedings on the 1993 ACM SIGMOD International Conference
`on Management of Data, vol. 22, Issue 2, Jun. 1993.
`Advances of Cryptology-AUSCRYPT ’92—Workshop on the
`Theory and Application of Cryptographic Techniques Gold Coast,
`Queensland, Australia, Dec. 13-16, 1992 Proceedings.
`Tarjan, Robert Endre, et al., “Storing a Sparse Table”, Communica-
`tions ofthe ACM, vol. 22, No. 11, Nov. 1979, pp. 606-611.
`Wegman, Mark et al., “New Hash Functions and Their Use in Authen-
`tication and Set Equality”, Journal of Computer and System Sci-
`ences, vol. 22, Jun. 1981, pp. 265-279.
`Vitter, Jeffrey Scott et al., “Optimal Prefetching via Data Compres-
`sion”, In Proceedings of 32nd IEEE Symposium on Fundations of
`Computer Science, Nov. 1991, p. 121-130.
`Friedman, Michael et al., “Storing a Sparse Table with 0(1) Worst
`Case Access Time”, Journal of the Association for Computing
`Machinery, vol. 31, No. 3, Jul. 1984, pp. 538-544.
`Yao, Andrew Chi-Chih, “Should Tables be Sorted?”, Journal of the
`Association for Computing Machinery, vol. 28, No. 3, Jul. 1981, pp.
`615 -628.
`Floyd, Sally et al., “A Reliable Multicast Framework for Light-
`Weight Sessions and Application Level Framing”, In Proceedings of
`ACM SIGCOMM ’95, pp. 342-356.
`Feeley, Michael, et al., “Implementing Global Memory Management
`in a Workstation Cluster”, In Proceedings of the 15th ACM Sympo-
`sium on Operating Systems Principles, 1995, pp. 201-212.
`Carter, J. Lawrence, et al., “Universal Classes of Hash Functions”,
`Journal ofComputer and System Sciences, vol. 18, No. 2, Apr. 1979,
`pp. 143-154.
`Patent Abstracts of Japan, “Electronic Mail Multiplexing System and
`Communication Control Method in the System”, Jun. 30, 1993, JP
`05162529.
`Kim et al., “Experiences with Tripwire: Using Integrity Checkers for
`Intrusion Detection”, COAST Labs. Dept. of Computer Sciences
`Purdue University, Feb. 22, 1995, pp. 1-12.
`Kim et al., “The Design and Implementation of Tripwire: A File
`System Integrity Checker”. COAST Labs. Dept. of Computer Sci-
`ences Purdue University, Nov. 19, 1993, pp. 1-21.
`Peter Deutsch (peterd@bunyip.com), “Re: MD5 and LIFNs (was:
`Misc Comments)”, www.acl.lanl.gov/URI/archive/uri-94q2.mes-
`sages/0106.htrnl, Apr. 26, 1994.
`Alexander Dupuy (dupuy@smarts.com), “RE: MD5 and LIFNs
`(was: Misc Comments)”, www.acl.lanl.gov/URI/archive/uri-94q2.
`messages/0113.html, Apr. 26, 1994.
`Alexander Dupuy (dupuy@smarts.com), “MD5 and LIFNs (was:
`Misc Comments)”, www.acl.lanl.gov/URI/archive/uri-94q2.mes-
`sages/0081.htrnl, Apr. 17, 1994.
`Albert Langer
`(cmf851@anu.oz.au), http://groups.google.com/
`groups?selm:1991Aug7.225159.786%40newshost.anu.edu.au&
`oe:UTF-8&output:gplain, Aug. 7, 1991.
`Clifford Lynch (Calur@uccmvsa.bitnet), “ietf url/uri overview draft
`paper
`(long)”, www.acl.lanl.gov/URI/archive/uri-93q1.messages/
`0015.html, Mar. 25, 1993.
`K. Sollins and L. Masinter, “Functional Requirements for Uniform
`Resource Names”, www.w3 .org/Addressing/rfc1737.b<t, Dec. 1994,
`pp. 1-7.
`W3C:ID, HTTP: A protocol for networked information, “Basic
`HTTP as defined in 1992”, www.w3.org/Protocols/HTTP2.html,
`1992.
`Defendant Lime Wire, LLC’s Answer, Affirmative Defenses and
`Counterclaims dated Nov. 15, 2007, from CivilAction No. 07-06161
`VBF (PLAx).
`
`GOOG-T023-Page 5 ores
`
`GOOG-1023-Page 5 of 68
`
`

`
`US 8,099,420 B2
`Page 6
`
`Kim, Gene H., and Spafford, Eugene H., “Writing, Supporting, and
`Evaluating Tripwire: A Publicly Available Security Tool.” COAST
`Labs. Dept. of Computer Sciences Purdue University, Mar. 12, 1994,
`pp. 1-23.
`U.S. Appl. No. 11/980,679—May 6, 2009 PTO Office Action.
`USPTO, Non-Final Office action mailed Jun. 15, 2009 in U.S. Appl.
`No. 11/980,687.
`USPTO, Non-Final Office action mailed Jun. 18, 2009 in Reexam
`U.S. Appl. No. 90/010,260.
`Communication from EPO in European Application No. 96 910
`7622-1225 dated May 8, 2009 [4 pgs.].
`McGregor D. R. and Mariani, J. A. “Fingerprinting—A technique for
`file identification and maintenance,” Software: Practice and Experi-
`ence, vol. 12, No. 12, Dec. 1982, pp. 1165-1166.
`[Proposed] Order Regarding Construction of Terms, filed Mar. 29,
`2007 in C.D. Cal. case No. CV 06-5086 SJO (Ex) [9 pgs.].
`Analysis of Plaintiffs’ Claim Chart for the ’280 Patent As Against
`Defendant Media Sentry, Inc. 11 pages.
`Analysis of Plaintiffs’ Claim Chart for the ’791 Patent As Against
`Defendant Media Sentry, Inc. (11916.001.0150.a) pp. 1-48.
`Analysis of Plaintiffs’ Claim Chart for the ’791 Patent As Against
`Defendant Overpeer pp. 1-40.
`Barbara, D., et al., “Exploiting symmetries for low-cost comparison
`of file copies,” 8th Int’l Conf. on Distributed Computing Systems,
`Jun. 1988, pp. 471-479. San Jose, CA.
`Campbell, M., “The Design of Text Signatures for Text Retrieval
`Systems,” Tech. Report, Sep. 5, 1994, Deakin University, School of
`Computing & Math., Geelong, Australia.
`Chang, W. W. et al., “A signature access method for the Starburst
`database system,” in Proc. 15th Int’l Conf. on Very Large Data Bases
`(Amsterdam, The Netherlands), pp. 145-153.
`Changes to Mar. 23, 2007 Deposition ofRobert B. K. Dewar, in C.D.
`Cal. case No. CV 06-5086 SJO (Ex) [3 pgs + cover letter.].
`Communication pursuant to Article 96(2) EPC from EPO (Examina-
`tion Report), Jan. 17, 2007, inApplication No. EP 96 910 762.2-1225
`[1 pg. with 5 pg. annex].
`Complaint for Patent Infringement, Permanent Injunction and Dam-
`ages, Aug. 8, 2006, in C.D. Cal. case No

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket