`Farber et al.
`
`(10) Patent No.:
`
`(45) Date of Patent:
`
`US 8,099,420 B2
`*Jan. 17, 2012
`
`US008099420B2
`
`(54)
`
`(75)
`
`(73)
`
`ACCESSING DATA IN A DATA PROCESSING
`SYSTEM
`
`Inventors: David A. Farber, Ojai, CA (US);
`Ronald D. Lachman, Northbrook, IL
`(US)
`
`Assignees: PersonalWeb Technologies, LLC, Tyler,
`TX (US); Level 3 Communications,
`LLC, Broomfield, CO (US)
`
`(*)
`
`Notice:
`
`Subject to any disclaimer, the term of this
`patent is extended or adjusted under 35
`U.S.C. 154(b) by 1312 days.
`
`This patent is subject to a terminal dis-
`claimer.
`
`EP
`
`(56)
`
`References Cited
`
`U.S. PATENT DOCUMENTS
`
`3,668,647 A
`3,835,260 A
`4,096,568 A
`4,215,402 A
`4,221,003 A
`4,290,105 A
`4,376,299 A
`4,405,829 A
`4,412,285 A
`
`6/1972 Evangelisti
`9/1974 Prescher et al.
`6/1978 Bennett et al.
`7/1980 Mitchell
`9/1980 Chang et al.
`9/1981 Cichelli
`3/1983 Rivest
`9/1983 Rivest
`10/1983 Neches
`
`(Continued)
`
`FOREIGN PATENT DOCUMENTS
`0 268 069 A2
`5/1988
`
`(Continued)
`
`OTHER PUBLICATIONS
`
`Affidavit of Timothy P. Walker in Support of CWIS’ Opening Mark-
`man Brief Construing the Terms at Issue in U.S. Patent No.
`6,415,280, dated Jul. 25, 2003, from Civil Action No. 02-11430
`RWZ.
`
`(21)
`
`Appl. No.: 11/017,650
`
`(22)
`
`Filed:
`
`Dec. 22, 2004
`
`Prior Publication Data
`
`US 2005/0114296 A1
`
`May 26, 2005
`
`(65)
`
`(60)
`
`(51)
`
`(52)
`(58)
`
`Related U.S. Application Data
`
`(Continued)
`
`Continuation of application No. 09/987,723, filed on
`Nov. 15, 2001, now Pat. No. 6,928,442, which is a
`continuation of application No. 09/283,160, filed on
`Apr. 1, 1999, now Pat. No. 6,415,280, which is a
`division of application No. 08/960,079, filed on Oct.
`24, 1997, now Pat. No. 5,978,791, which is a
`continuation of application No. 08/425,160, filed on
`Apr. 11, 1995, now abandoned.
`
`Int. Cl.
`
`(2006.01)
`G06F 17/30
`U.S. Cl.
`....................... .. 707/758; 707/781; 707/821
`Field of Classification Search ................ .. 707/758,
`707/781, 821
`See application file for complete search history.
`
`Primary Examiner — Khanh B Pham
`(74) Attorney, Agent,
`or Firm — Davidson Berquist
`Jackson & Gowdey, LLP; Brian Siritzky
`
`ABSTRACT
`(57)
`Access to data items uses names based on the data in the data
`
`items; the name of a data item may be based, at least in part,
`on a function of some or all of the bits that comprise the data
`item. A data item may comprise an arbitrary sequence of bits.
`The function may include a hash function or a message digest
`function. The name ofa data item may be compared to a list
`of names of other data items.
`
`178 Claims, 31 Drawing Sheets
`
`SIMPAE
`
`DA TA ITEM
`
`COMPUTE MD FUNCTION ON
`DATA ITEM
`
`DATA ITEM
`
`S214
`APPEND LENGTH MODULO 32 OF
`
`TRUE NAME
`
`GOOG-T023-Page 1 ores
`
`GOOG-1023-Page 1 of 68
`
`
`
`US 8,099,420 B2
`Page2
`
`U.S. PATENT DOCUMENTS
`4414624 4
`11/1983 Summew
`4,441,155 A
`4/1984 Fletcher
`444544713 A
`871984 1301111500
`4,490,782 A
`12/1984 Dixon
`4,558,413 A
`12/1985 Schmidtetal.
`445714700 A
`271985 E1111Y4114
`445774293 A
`371985 M51101‘
`4,642,764 A
`2/1987 Auslander
`445424793 A
`271987 M0501011
`445584093 A
`471987 11011111511
`4,675,810 A
`6/1987 Gruner
`445914299 A
`971987 R1V001
`447254945 A
`271988 K101101501
`447734039 A
`971988 25111015
`448214184 A
`471989 C15110Y 0151
`448874235 A
`1271989 110110W5Y
`4a888a681 A
`12/1989 B3-H195
`449144571 A
`471990 135151201514
`449144585 A
`471990 SW1110115110151
`459225414 A
`5/1990 H0110W3y
`419221417 A
`5/1990 ChuTme131~ ~~~~~~~~~~~~~~~~~~~ ~~ 707/1
`4,937,863 A
`6/1990 Rober1e1al.
`449494302 A
`871990 A111010101514
`4,953,209 A
`8/1990 Ryder, Sr. et al.
`449724357 A
`1171990 13111110
`5,014,192 A
`5/1991 Mansfieldetal.
`540254421 A
`571991 C110
`540324979 A
`771991 110011101514
`540474918 A
`971991
`S011W5112 0151
`540504074 A
`971991 M5105
`540504212 A
`971991 DY0011
`5,057,837 A
`10/1991 C01We11
`510771658 A
`12/1991 Bendert
`540844815 A
`171992 M5225110
`541174351 A
`571992 M11101
`541294081 A
`771992 K01’5Y50111
`541294082 A
`771992 111111113
`541444557 A
`971992 P051104 114
`51153147 A
`1171992 01115
`541794580 A
`171993 C01W011
`5,182,799 A
`1/1993 Tanrurae1al.
`541994073 A
`371993 80011
`5202982 A
`4/1993 GT3-m11Che131~ ~~~~~~~~~~~~~~~ ~~ 707/2
`542044897 A
`471993 WY111511
`542044958 A
`471993 5110111301514
`542044955 A
`471993 W1110111’01g 0151'
`542084858 A
`571993 V011011
`5,222,134 A
`6/1993 W311ee131~
`5423114051 A
`771993 Q11511
`5,239,648 A
`8/1993 Nukui
`542414571 A
`871993 R00010151
`5,247,620 A
`9/1993 F11k11Z3W3e131~
`542504999 A
`1171993 WY111511
`542754859 A
`171994 1201100101514
`542754901 A
`171994 110“’011
`552875499 A
`2/1994 Nemes ~~~~~~~~~~~~~~~~~~~~~~~~~~~~ ~~ 707/2
`542874514 A
`271994 G15111
`542974279 A
`371994 1351111011 01514
`A
`5301316 A
`543174593 A
`543214841 A
`543394403 A
`5a341a477 A
`543434527 A
`543474553 A
`543514302 A
`543574440 A
`543574623 A
`5,357,630 A
`5,359,523 A
`
`4/1994 Hamilton
`571994 C110110010151
`571994 1350101514
`871994 P511101
`8/1994 P1tk1ne131~ ~~~~~~~~~~~~~~~~~ ~~ 709/226
`871994 M0010
`971994 F1Y11110151~
`971994 1015111011 0151
`1071994 1511501101514
`19/1994 M"g°1y'C°h"“
`10/1994 Oprescu e1al.
`10/1994 Talbot, eta,
`
`'
`
`707/205
`
`1
`
`.......... N
`
`707/10
`
`725/92
`
`709/219
`
`A
`
`A
`
`5
`
`A
`
`
`
`8/1995 Wyman
`5,438,508 A
`3/133?
`§3§r‘§i§§§1e1ai
`§’§1i§1i§’221§§
`9/1995 Cohnetal
`544484718 A
`9/1995 Nelson e1 al
`5,452,447 A
`............... N
`5
`9/1995 Dorfman
`5,454,000 A
`Ah t
`1
`9/1995 C
`5’454’039 A
`10/1995 B1(::)II1)eetrtSml
`e a5
`5,459,860 A
`11/1995 win1erbo11orn
`5,465,365 A
`“/1995 Bader
`5’467’471 A
`12/1995 Fischer
`5,475,826 A
`12/1995 Squibb
`5,479,654 A
`1
`t
`2/1996 G
`1
`5’491’817 A
`3/1996 Fr(i)§gm:na.
`5,499,294 A
`4/1996 Eisenberg e1 al
`5,504,879 A
`A
`6/1996 Krawczyk
`5,530,757 A
`7/1996 Blickenstaffetal
`5537585 A
`A
`7/1996 Neimatetal
`5,542,087 A
`8/1996 Akizawaetéll ................ N
`5,548,724 A
`9/1996 Rosse1al
`A
`5,553,143 A
`5,568,181 A 4 10/1996 Greenwoocle1al
`5,581,615 A
`12/1996 Stern
`5,581,758 A
`12/1996 Burnett
`1
`Id t
`5’581’764 A
`12/1996 Ft
`5,583,995 A 4 12/1996 c}la:8r::e18ala5
`5’588’147 A
`12/1996 Neeman et A1’ """"""" "
`5,596,744 A
`1/1997 Dao e1 al
`5
`5’600’834 A
`2/1997 Howard‘
`5,604,803 A
`2/1997 Aziz
`5,604,892 A
`2/1997 Nu11all e1 al
`5,630,067 A
`5/1997 Kinde11eta1
`5,632,031 A
`5/1997 Velissaropoulos e1 al
`705/54
`A
`5,638,443 A
`6/1997 Stefiketal
`. . . . . . 55709303
`5,640,564 A
`6/1997 Hamilton efal. . . . . . . .
`5,649,196 A
`7/1997 Woodhill etal.
`........... N
`5,677,952 A
`10/1997 Blakley 111e1al
`5,678,038 A
`10/1997 Dook1ere1al
`5,678,046 A
`10/1997 cahill e1 al
`5,694,472 A
`12/1997 Johnson e1al
`A
`5,694,596 A
`12/1997 Campbell
`5,701,316 A
`12/1997 Alferness e1 al
`5,710,922 A
`1/1998 Alleye1al
`5’724’425 A
`3/1998 Changed
`5,724,552 A
`3/1998 Taoda
`5,742,807 A
`4/1998 Masinter
`5,745,879 A
`4/1998 wynian
`5,757,913 A
`5/1998 Bellare e1al
`5,757,915 A
`5/1998 Aucsmith et.a1
`713/177
`5
`5781629 A
`7/1998 Haber
`......................... N 709/202
`5,802,291 A
`9/1998
`'
`5,809,494 A
`9/1998 Nguyen
`A
`707/1
`5’826’049 A
`10/1998
`"""""""""""""" "
`4
`5,835,087 A
`11/1998 Herz
`5
`346/810
`5,864,683 A
`1/1999 B0ebe.I:tme.t..,.1.1................. N
`5,907,619 A
`5/1999 Davis
`A
`5,907,704 A
`5/1999 Gudmundson e1 al
`5,940,504 A
`8/1999 Griswold
`5,978,791 A
`11/1999 Farber et al
`5,991,414 A
`11/1999 Garaye1 al.
`6,006,018 A
`12/1999 Burne11 e1 al
`A
`6,135,646 A
`6,415,280 B1
`6,732,180 B1
`6,816,872 B1
`6,928,442 B2
`2002/0052884 A1
`2002/0082999 A1
`2003/0078888 A1
`2003/0078889 A1
`2003/0095660 A1
`2004/0139097 A1
`
`A
`
`395/200 49
`
`. . . . . . . . . N
`1
`................. N
`
`A
`
`10/2000 Kahnetal.
`7/2002 Farber e1 al
`5/2004 Hale e1al
`A
`11/2004 Squibb
`8/2005 Farber et al
`5/2002 1=arbere1al
`6/2002 Lee e1al
`A
`4/2003 Lee e1 al
`4/2003 Lee e1 al
`5/2003 L
`1 1
`000 54
`7/2004 Farber e1 al.
`
`5,371,897 A
`5,375,205 A
`5334555 A
`5,394,555 A
`5,403,639 A
`5,404,508 A
`
`12/1994 Brown etal.
`12/1994 Hunter etal.
`1/1995 Cannon
`2/1995 Hun1ere1al.
`4/1995 Belsan e1al.
`4/1995 Konrad
`
`2005/0114296 Al
`2007/0185848 A1
`2008/0065635 A1
`2008/0066191 A1
`2008/0071855 A1
`2008/0082551 A1
`
`5/2005 Farber et al.
`3/2007 Farber et al.
`3/2008 Farber et al.
`3/2008 Farber e1 al.
`3/2008 Farber e1 al.
`3/2008 Farber e1 al.
`
`GOOG-T023-Page 2 ores
`
`GOOG-1023-Page 2 of 68
`
`
`
`US 8,099,420 B2
`Page 3
`
`EP
`EP
`EP
`EP
`EP
`EP
`EP
`GB
`JP
`JP
`JP
`JP
`JP
`JP
`JP
`W0
`W0
`W0
`W0
`W0
`
`FOREIGN PATENT DOCUMENTS
`0315425
`5/1989
`0 558 945 A2
`9/1993
`0 566 967 A2
`10/1993
`0592045
`4/1994
`0631 226 A1
`12/1994
`0 654 920 A2
`5/1995
`0 658 022 A2
`6/1995
`2294132 A
`4/1996
`59058564
`4/1984
`63-106048
`5/1988
`63-273961
`11/1988
`2-127755
`5/1990
`05162529
`6/1993
`06187384 A2
`7/1994
`06348558 A
`12/1994
`WO 92/20021
`11/1992
`WO 94/06087
`3/1994
`WO 94/20913
`9/1994
`WO 95/01599
`1/1995
`WO 97/43717
`11/1997
`
`OTHER PUBLICATIONS
`
`Akamai and MIT’s Memorandum in Support of Their Claim Con-
`struction of USPAT 5,978,791, dated Aug. 31, 2001, from Civil
`Action No. 00-cv-11851RWZ.
`Akamai’s Answer, Affirmative Defenses and Counterclaims to
`Amended Complaint, filed Dec. 6, 2002, in Civil Action No. 02-CV-
`1 1430RWZ.
`Akan1ai’s Brief on Claim Construction, dated Aug. 8, 2003, from
`Civil Action No. 02-11430 RWZ.
`Answer of Defendant RIAA to First Amended Complaint and Coun-
`terclaim, dated Feb. 8, 2005, from Civil Action No. CV04-7456 JFW
`(CTx).
`Berners-Lee, T. et al., “Hypertext Transfer Protocol—HTTP/1.0,”
`May 1996, pp. 1-54.
`Berners-Lee, T., “Universal Resource Identifiers in WWW,” Jun.
`1994, pp. 1-25.
`Bowman, C. Mic, et al., “Harvest: A Scalable, Customizable Discov-
`ery and Access System,” Aug. 4, 1994, pp. 1-27.
`Bowman, C. Mic, et al., “Harvest: A Scalable, Customizable Discov-
`ery and Access System,” Mar. 12, 1995, pp. 1-29.
`Brisco, T., “DNS Support for Load Balancing,” Apr. 1995, pp. 1-7.
`Browne, Shirley et al., “Location-Independent Naming for Virtual
`Distributed Software Repositories,” 1995, 7 pages.
`Browne, Shirley et al., “Location-Independent Naming for Virtual
`Distributed Software Repositories,” 1995, printed from http:/www.
`netlib.org/utk/papers/lifr1/main.htrnl on Mar. 22, 2006, 18 pages.
`Civil Minutes General dated Jan. 25, 2005, from Civil Action No. CV
`04-7456-JFW (CTx).
`Complaint for Patent Infringement, Permanent Injunction, and Dam-
`ages, dated Sep. 8, 2004, from Civil Action No. CV 04-7456 JFW
`(AJWx).
`CWIS' Opening Markman Brief Construing the Terms at Issue in
`U.S. Patent No. 6,415,280, dated Jul. 25, 2003, from Civil Action No.
`02-11430 RWZ.
`CWIS' Reply Markman Brief Construing the Terms at Issue in U.S.
`Patent No. 6,415,280, dated Aug. 15, 2003, from Civil Action No.
`02-11430 RWZ.
`Davis, James R., “A Server for a Distributed Digital Technical Report
`Library,” Jan. 15, 1994, pp. 1-8.
`Declaration of Robert B.K. Dewar in Support of CWIS' Construction
`of the Terms at Issue in U.S. Patent No. 6,415,280, dated Jul. 25,
`2003, from Civil Action No. 02-cv-11430RWZ.
`Defendant Digital Island’s Opening Brief on Claim Construction
`Issues dated Aug. 17, 2001, from Civil Action No. 00-cv-11851-
`RWZ.
`Defendant Media Sentry, Inc.’s Reply Memorandum of Points and
`Authorities in Further Support of Its Motion to Dismiss, dated Nov.
`15, 2004, from Civil Action No. CV04-7456 JFW (CTx).
`Defendant MediaSentry Inc. ’s Notice of Motion and Motion to Dis-
`miss First Amended Complaint; Memorandum of Points and
`Authorities in Support Thereof, dated Dec. 13, 2004, from Civil
`Action No. CV04-7456 JFW .
`
`Defendant MediaSentry, Inc.’s Answer to Plaintiffs’ First Amended
`Complaint and Counterclaims, dated Feb. 8, 2005, from Civil Action
`No. CV04-7456 JFW (CTX).
`Defendant RIAA’s Notice of Motion and Motion to Dismiss First
`Amended Complaint; Memorandum of Points and Authorities in
`Support Thereof, dated Dec. 13, 2004, from Civil Action No. CV04-
`7456 JFW (CTx).
`Defendants Loudeye Corp.’s and Overpeer, Inc.’s Answer to Plain-
`tiffs’ First Amended Complaint and Counterclaim, dated Feb. 8,
`2005, from Civil Action No. 04-7456 JFW (AJWx).
`Defendants’ Preliminary Invalidity Contentions dated Dec. 14, 2006,
`from Civil Action No. CV 06-5086 SJO (Ex).
`European Search Report issued Dec. 23, 2004 in correpsonding
`European Application No. 96910762.2-2201.
`Expert Report of Professor Ellis Horowitz, dated Mar. 6, 2006, from
`Civil Action No. 04-7456 JFW (CTx).
`Expert Report of the Honorable Gerald J. Mossinghoff, dated Mar.
`13, 2006, from Civil Action No. 04-7456 JFW (CTx).
`Faltstrom, P. et al., “How to Interact with a Whois++ Mesh,” Feb.
`1996, pp. 1-9.
`Fielding, R. et al., “Hypertext Transfer Protocol—HTTP/1.1,” Jan.
`1997, pp. 1-163.
`Fielding, R. et al., “Hypertext Transfer Protocol—HTTP/1.1,” Jun.
`1999, pp. 1-157.
`Infringement, Permanent
`for Patent
`First Amended Complaint
`Injunction and Damages, dated Nov. 24, 2004, from Civil Action No.
`CV 04-7456 JFW (CTx).
`International Search Report dated Jun. 24, 1996 in corresponding
`international application PCT/US1996/004733.
`Khare, R. and Lawrence, S., “Upgrading to TLS Within HTTP/1.1,”
`May 2000, pp. 1-12.
`Kim et al., “The Design and Implementation of Tripwire: A file
`System Integrity Checker”, COAST Labs. Dept. of Computer Sci-
`ences Purdue University, Feb. 23, 1995, pp. 1-18.
`Knuth, Donald E., “The Art of Computer Programming,” 1973, vol.
`3, Ch. 6.4, pp. 506-549.
`Memorandum of Points and Authorities in Support of Loudeye’s and
`Overpeer’s Motion to Dismiss the First Amended Complaint for
`Failure to State a Claim or, in the Alternative, for a More Definitive
`Statement, dated Dec. 13, 2004, from Civil Action No. CV-04-7456
`JFW (AJWX).
`Moats, R., “URN Syntax,” May 1997, pp. 1-8.
`Myers, J. and Rose, M., “The Content-MD5 Header Field,” Oct.
`1995, pp. 1-4.
`Office Action in corresponding Japanese Application No. 531,073/
`1996 mailed on Apr. 25, 2006.
`Office Communication in corresponding European Application No.
`96910762.2-1225 dated Jan. 17,2007.
`Order Re Claim Construction dated Nov. 8, 2001, from Civil Action
`No. 00-11851-RWZ.
`Patent Abstracts of Japan, “Device for Generating Database and
`Method for the Same,” Application No. 03 -080504, Sun Microsyst.
`Inc., published Jun. 1993, 38 pages.
`Patent Abstracts of Japan, “Method for Registering and Retrieving
`Data Base,” Application No. 03-187303, Nippon Telegr. & Teleph.
`Corp., published Feb. 1993, 11 pages.
`Plaintiffs’ Memorandum of Points and Authorities in Opposition to
`Loudeye Defendants’ Motion to Dismiss, dated Nov. 8, 2004, from
`Civil Action No. CV-04-7456 JFW (AJWX).
`Plaintiffs’ Opposition to Media Sentry’s Motion to Dismiss; Memo-
`randum of Points and Authorities in Support Thereof, dated Nov. 8,
`2004, from Civil Action No. CV 04-7456 JFW (CTx).
`Plaintiff’ s Opposition to Recording Industry Association of Ameri-
`ca’s Motion to Dismiss; Memorandum of Points and Authorities in
`Support Thereof, dated Nov. 8, 2004, from Civil Action No. CV-04-
`7456 JFW (CTx).
`Plaintiff’ s Reply to Defendant Loudeye Corp. ’s and Overpeer, Inc.’s
`Counterclaims, dated Mar. 3, 2005, from Civil Action No. CV
`04-7456 JFW (CTx).
`Plaintiff’ s Reply to Defendant MediaSentry’s Counterclaims, dated
`Mar. 3, 2005, from Civil Action No. CV 04-7456 JFW (CTx).
`Plaintiff’ s Reply to Defendant RIAA’s Counterclaims, dated Mar. 3,
`2005, from Civil Action No. 04-7456 JFW (CTx).
`
`GOOG-T023-Page 3 0f"68
`
`GOOG-1023-Page 3 of 68
`
`
`
`US 8,099,420 B2
`Page 4
`
`Reed Wade (wade@cs.utk.edu), “re: Dienst and BFD/LIFN docu-
`ment,” Aug. 8, 1994, printed from http://www.webhistory.org/www.
`lists/www-talkl994q3/0416.html on Mar. 22, 2006, (7 pages).
`Rivest, R., “The MD5 Message-Digest Algorithm,” Apr. 1992, pp.
`1-19 and errata sheet (1 page).
`Rose, M., “The Content-MD5 Header Field,” Nov. 1993, pp. 1-3.
`Schneier, Bruce, “One-Way Hash Functions, Using Crypographic
`Algorithms for Hashing,” 1991, printed from http://202.179135.4/
`data/DDJ/articles/1991/9109/91909g/9109g.htrn on Mar. 22, 2006.
`Sun Micro systems, Inc ., “NFS: Network File System Protocol Speci-
`fication,” Mar. 1989, pp. 1-25.
`Vincenzetti, David and Cotrrozzi, Massimo, “Anti Tampering Pro-
`gram,” Proceedings of the Fourth {USENIX} Security Symposium,
`Santa Clara, CA, 1993, 11 pages.
`Vincenzetti, David and Cotrrozzi, Massimo, “Anti Tampering Pro-
`gram,” Proceedings of the Fourth {USENIX} Security Symposium,
`Santa Clara, CA, undated, printed from http://www.ja.nel/CERI/
`VincenZetti_and_Cotrozzi/ATP_Anti_Tamp on Mar. 22, 2006, 8
`pages.
`Berners-Lee, T. et al ., “Uniform Resource Locators (URL),” pp. 1-25,
`Dec. 1994.
`Danzig, P.B., et al., ‘“‘Distributed Indexing: A Scalable Mechanism
`for Distributed Inforn1ation Retrieval,’”’ Proceedings of the 14th
`Annual International ACM SIGIR Conference on Research and
`Development in Information Retrieval, pp. 220-229, Oct. 13-16,
`1991.
`Hauzeur, B. M., “A Model for Naming, Addressing, and Routing,”
`ACM Trans. Inf. Syst. 4, Oct. 4, 1986), 293-311.
`Khoshafian, S. N. et al. 1986. Object identity. In Conf. Proc. on
`Object-Oriented Programming Systems, Languages and Applica-
`tions (Portland, Oregon, United States, Sep. 29-Oct. 2, 1986). N.
`Meyrowitz, Ed. OOPLSA ’86. ACM Press, NewYork, NY, 406-416.
`Lantz, K. A., et al., “Towards a universal directory service” In Proc.
`4th Annual ACM Symp. on Principles of Distributed Computing
`(Minaki, Ontario, Canada). PODC ’85. ACM Press, New York, NY,
`250-260.
`Leach, P J., et al.. The file system of an integrated local network. In
`Proc. 1985 ACM 13th Annual Conf. on Comp. Sci. CSC ’85. ACM
`Press, NY, NY, 309-324.
`Leach, P.J., et al., “UIDs as Internal Names in a Distributed File
`System,” In Proc. 1st ACM SIGACT-SIGOPS Symp. on Principles of
`Distributed Computing (Ottawa, Canada, Aug. 18-20, 1982). PODC
`’82. ACM Press, NewYork, NY, 34-41.
`Ma, C. 1992. On building very large naming systems. In Proc. 5th
`Workshop on ACM SIGOPS European Workshop: Models and Para-
`digms for Distributed Systems Structuring (France, Sep. 21-23,
`1992). EW 5. ACM Press, New York, NY, 1-5.
`Peterson, L. L. 1988. A yellow-pages service for a local-area net-
`work. In Proc. ACM Workshop on Frontiers in Computer Commu-
`nications Technology (Vermont, 1987). J. J. Garcia-Luna-Aceves,
`Ed. SIGCOMM ’87. ACM Press, NewYork, NY, 235-242.
`Ravindran, K. and Ramakrishnan, K. K. 1991. A naming system for
`feature-based service specification in distributed operating systems.
`SIGSMALL/PC Notes 17, 3-4 (Sep. 1991), 12-21.
`Ross, K., “Hash-Routing for Collections of Shared Web Caches,”
`IEEE Network Magazine, pp. 37-44, Nov.-Dec. 1997.
`Schwartz, M., et al. 1987. Aname service for evolving heterogeneous
`systems. I11 Proc. 11th ACM Symp. 011 OS Principles (Texas, Nov.
`8-11, 1987). SOSP ’87. ACM Press, NY, NY, 52-62.
`Shaheen-Gouda, A. and Loucks, L. 1992. Name borders. In Proc. 5th
`Workshop on ACM SIGOPS European Workshop: Models and Para-
`digms for Distributed Systems Structuring (Mont Saint-Michel,
`France, Sep. 21-23, 1992). EW 5. ACM Press, NY, NY, 1-6.
`Terry, D. B. 1984. An analysis of naming conventions for distributed
`computer systems. In Proc. ACM SIGCOMM Symp. on Communi-
`cations Architectures and Protocols: Tutorials & Symp. SIGCOMM
`’84. ACM Press, NY, NY, 218-224.
`Cheriton, David R. and Mann, Timothy P., “Decentralizing a global
`naming service for improved performance and fault tolerance”, ACM
`Transactions on Computer Systems, vol. 7, No. 2, May 1989, pp.
`147-183.
`Request for Reexamination of U.S. Patent No. 6,928,442: Reexam
`Control U.S. Appl. No. 90/010,260, filed Aug. 29, 2008.
`
`Kim et al ., “Experiences with Tripwire: Using Intergrity Checkers for
`Intrusion Detection”, COAST Labs. Dept. of Computer Sciences
`Purdue University, Feb. 22, 1995, pp. 1-12.
`Kim et al., “The Design and Implementation of Tripwire: A file
`System Intergrity Checker”, COAST Labs. Dept. of Computer Sci-
`ences Purdue University, Nov. 19, 1993, pp. 1-21.
`Zhiyu Tian et al., A New Hashing Function: Statistical Behaviour and
`Algorithm, pp. 3-13.
`G. L. Friedman, Digital Camera with Apparatu for Authentication of
`Images Produced from an Image File, NASA Case No. NPO—19108—
`1-CU, U.S. Appl. No. 08/159,980, filed Nov. 24, 1993.
`H. Goodman, Ada, Obj ect-Oriented Techniques, and Concurrency in
`Teaching Data Structures and File Management Report Documenta-
`tion p. AD-A275 385-94-04277.
`Advances
`in Cryptology-EUROCRYPT’93; Workshop on the
`Theory and Application of Cryptographic Techniques Lofthus, Nor-
`way, May 23-27, 1993 Proceedings.
`Proceedings ofthe 1993 ACM SIGMOD International Conference on
`Management of Data, vol. 22, Issue 2, Jun. 1993.
`Advances
`in Cryptology-AUSCRYPT ’92—Workshop on the
`Theory and Application of Cryptographic Techniques Gold Coast,
`Queensland, Australia, Dec. 13-16, 1992 Proceedings.
`Witold Litwin et al., Linear Hashing for Distributed Files, ACM
`SIGMOD, May 1993, pp. 327-336.
`Ming-Ling Lo et al., On Optimal Processor Allocation to Support
`Pipelined Hash Joins, ACM SIGMOD, pp. 69-78, May 1993.
`Thomas A. Berson, Differential Cryptanalysis Mod 232 with Appli-
`cations to MD5, pp. 69-81.
`William Perrizo et al., Distributed Join Processing Performance
`Evaluation, Twenty-Seventh Hawaii International Conference on
`System Sciences, vol. II, pp. 236-244.
`Vijay Kumar, A Concurrency Control Mechanism Based on Extend-
`ible Hashing for Main Memory Database Systems, ACM, vol. 3,
`1989, pp. 109-113.
`Birgit Pfitzman, Sorting Out Signature Schemes, Nov. 1993, 15’ Conf.
`Computer & Comm. Security ’93, p. 74-85.
`Bert dem Boer et al., Collisions for the compression function of MD5,
`pp. 292-304.
`Sakti Pramanik et al., Multi-Directory Hasing, 1993, Info. Sys., vol.
`18, No. 1, pp. 63-74.
`Murlidhar Koushik, Dynamic Hashing with Distributed Overflow
`Space: A File Organization with Good Insertion Performance, 1993,
`Info. Sys., vol. 18, No. 5, pp. 299-317.
`Witold Litwin et al., LH*-Linear Hashing for Distributed Files, HP
`Labs Tech. Report No. HPL-93-21, Jun. 1993; pp. 1-22.
`Yuliang Zheng et al., HAVAL—A One-Way Hashing Algorithm with
`Variable Length of Output (Extended Abstract), pp. 83-105.
`Chris Charnes and Josef Pieprzky, Linear Nonequivalence versus
`Nonlinearity, Pieprzky, pp. 156-164.
`Gwertzman, James, et al. “The Case for Geographical Push-Cach-
`ing.” Technical Report HU TR 34-94 (excerpt), Harvard University,
`DAS, Cambridge, MA 02138, 1994, 2 pgs.
`Grigni, Michelangelo, et al. “Tight Bounds on Minimum Broadcasts
`Networks.” SIAM Journal of Discrete Mathematics, vol. 4, No. 2,
`May 1991, pp. 207-222.
`Devine, Robert. “Design and Implementation of DDH: A Distributed
`Dynamic Hashing Algorithm” In Proceedings of 4th International
`Conference 011 Foundations of Data Organizations and Algorithms,
`1993, pp. 101-114.
`“Multicast Routing in Datagram
`al.
`et
`Deering, Stephen,
`Internetworks and Extended LANs” ACM Transactions on Com-
`puter Systems, vol. 8, No. 2, May 1990, pp. 85-110.
`Cormen, Thomas H., et al. Introduction to Algorithms, The MIT
`Press, Cambridge, Massachusetts, 1994, pp. 219-243, 991-993.
`Naor, Moni, et al. “The Load, Capacity and Availability of Quorum
`Systems.” In Proceedings of the 35th IEEE Symposium on Founda-
`tions ofComputer Science, Nov. 1994, pp. 214-225.
`Nisan, Noam. “Psuedorandom Generators for Space-Bounded Com-
`putation” In Proceedings of the Twenty-Second Annual ACM Syrn-
`posium on Theory of Computing, May 1990, pp. 204-212.
`Palmer, Mark, et al. “Fido: A Cache that Learns to Fetch” In Pro-
`ceedings of the 17th International Conference on Very Large Data
`Bases, Sep. 1991, pp. 255-264.
`
`GOOG-T023-Page 4 ores
`
`GOOG-1023-Page 4 of 68
`
`
`
`US 8,099,420 B2
`Page 5
`
`Peleg, David, et al. “The Availabiltiy of Quorum Systems.” Informa-
`tion and Computation 123, 1995, 210-223.
`Rabin, Michael. “Efficient Dispersal of Information for Security,
`Load Balancing, and Fault Tolerance.” Journal of the ACM, vol. 36,
`No. 2, Apr. 1989, pp. 335-348.
`Ravi, R., “Rapid Rumor Ramification: Approximating the Minimum
`Broadcast Time” In Proceedings of the 35th IEEE Symposium on
`Foundation of Computer Science, Nov. 1994, pp. 202-213.
`Schmidt, Jeanette, et al. “Chernoff-Hoeffding Bounds for Applica-
`tions with Limited Independence” In Proceedings of the 4th ACS-
`SIAM Symposium on Discrete Algorithms, 1993, pp. 331-340.
`Tarjan, Robert Endre, et al. “Storing a Sparse Table.” Communica-
`tions ofthe ACM, vol. 22, No. 11, Nov. 1979, pp. 606-611.
`Wegman, Mark, et al. “New Hash Functions and Their Use in Authen-
`tication and Set Equality.” Journal of Computer and System Sciences
`vol. 22, Jun. 1981, pp. 265-279.
`Vitter, Jeffrey Scott, et al. “Optimal Prefetching via Data Compres-
`sion” In Proceedings of 32nd IEEE Symposium on Foundations of
`Computer Science, Nov. 1991, pp. 121-130.
`Fredman, Michael, et al. “Storing a Sparse Table with 0(1) Worst
`Case Access Time” Journal of the Association for Computing
`Machinery, vol. 31, No. 3, Jul. 1984, pp. 538-544.
`Yao, Andrew Chi-Chih. “Should Tables be Sorted?” Journal of the
`Association for Computing Machinery, vol. 28, No. 3, Jul. 1981, pp.
`615 -628.
`Floyd, Sally, et al. “A reliable Multicast Framework for Light-Weight
`Sessions and Application Level Framing.” In Proceedings of ACM
`SIGCOMM ’95, pp. 342-356.
`Feeley, Michael, et al. “Implementing Global Memory Management
`in aWorkstation Cluster.” In Proceedings of the 15th ACM Sympo-
`sium on Operating Systems Principles, 1995, pp. 201-212.
`Carter, J. Lawrence, et al. “Universal Classes of Hash Functions”
`Journal of Computer and System Sciences, vol. 18, No. 2, Apr. 1979,
`pp. 143-154.
`Patent Abstracts of Japan, “Electronic Mail Multiplexing System and
`Communication Control Method in The System.” 06/30/ 19993, JP
`05162529.
`Kim et al., “Experiencess with Tripwire: Using Intergrity Checkers
`for Intrusion Detection”, COAST Labs. Dept. of Computer Sciences
`Purdue University, Feb. 22, 1995, pp. 1-12.
`Kim et al., “The Design and Implementation of Tripwire: A file
`System Intergrity Checker”, COAST Labs. Dept. of Computer Sci-
`ences Purdue University, Nov. 19, 1993, pp. 1-21.
`Bert Dem Boer et al., Collisions for the compression function of
`MD5, pp. 292-304.
`Sakti Pramanik et al., Multi-Directory Hashing, 1993, Info. Sys., vol.
`18, No. 1, pp. 63-74.
`Murlidhar Koushik, Dynamic Hashing with Distrubuted Overflow
`Space: A File Organization with Good Insertion Performance, 1993,
`Info. Sys., vol. 18, No. 5, pp. 299-317.
`Witold Litwin et al., LH*-Linear Hashing for Distributed Files, HP
`Labs Tech. Report No. HPL-93-21, Jun. 1993, pp. 1-22.
`Yuliang Zheng et al., HAVAL-A One-Way Hashing Algorithm with
`Variable Length of Output (Extended Abstract), 1993, pp. 83-105.
`Chris Charnes and Josef Pieprzky, Linear Nonequivalence versus
`Nonlinearity, Pieprzky, 1993, pp. 156-164.
`Withold Litwi11 et al., Linear Hashing for Distributed Files, ACM
`SIGMOD, May 1993, pp. 327-336.
`Ming-Ling Lo et al., On Optimal Processor Allocation to Support
`Pipelined Hash Joins, ACM SIGMOD, pp. 69-78, May 1993.
`Thomas A. Berson, Differential Cryptanalysis Mod 232 with Appli-
`cations to MD5, pp. 69-81.
`William Perrizo et al., Distributed Join Processing Performance
`Evaluation, Twenty-Seventh Hawaii International Conference on
`System Sciences, vol. II, pp. 236-244.
`Vij ay Kumar, A Concurrency Control Mechanism Based on Extend-
`ible Hashing for Main Memory Database Systems, ACM, vol. 3,
`1989, pp. 109-113.
`Birgit Pfitzman, Sorting Out Signature Schemes, Nov. 1993, 15’ Conf.
`Computer & Comm. Security ’93, p. 74-85.
`Zhiyu Tian et al., A New Hashing Function: Statistical Behaviour and
`Algorithm, Spring 1993, pp. 3-13.
`
`G.L. Friedman, Digital Camera with Apparatus for Authentication of
`Images Produced from an In1age File, NASA Case No. NPO-19108-
`1-CU,U.S.App1.No. 08/159,980, Nov. 24, 1993.
`H. Goodman, Ada, Obj ect-Oriented Techniques, and Concurrency in
`Teaching Data Structures and File Management Report Documenta-
`tion p. AD-A275 385-94-04277.
`Advances in Cryptology-EUROCRYPT ’93, Workshop on the
`Theory and Application of Cryptographic Techniques Lofthus, Nor-
`way, May 23-27, 1993, Proceedings.
`Proceedings on the 1993 ACM SIGMOD International Conference
`on Management of Data, vol. 22, Issue 2, Jun. 1993.
`Advances of Cryptology-AUSCRYPT ’92—Workshop on the
`Theory and Application of Cryptographic Techniques Gold Coast,
`Queensland, Australia, Dec. 13-16, 1992 Proceedings.
`Tarjan, Robert Endre, et al., “Storing a Sparse Table”, Communica-
`tions ofthe ACM, vol. 22, No. 11, Nov. 1979, pp. 606-611.
`Wegman, Mark et al., “New Hash Functions and Their Use in Authen-
`tication and Set Equality”, Journal of Computer and System Sci-
`ences, vol. 22, Jun. 1981, pp. 265-279.
`Vitter, Jeffrey Scott et al., “Optimal Prefetching via Data Compres-
`sion”, In Proceedings of 32nd IEEE Symposium on Fundations of
`Computer Science, Nov. 1991, p. 121-130.
`Friedman, Michael et al., “Storing a Sparse Table with 0(1) Worst
`Case Access Time”, Journal of the Association for Computing
`Machinery, vol. 31, No. 3, Jul. 1984, pp. 538-544.
`Yao, Andrew Chi-Chih, “Should Tables be Sorted?”, Journal of the
`Association for Computing Machinery, vol. 28, No. 3, Jul. 1981, pp.
`615 -628.
`Floyd, Sally et al., “A Reliable Multicast Framework for Light-
`Weight Sessions and Application Level Framing”, In Proceedings of
`ACM SIGCOMM ’95, pp. 342-356.
`Feeley, Michael, et al., “Implementing Global Memory Management
`in a Workstation Cluster”, In Proceedings of the 15th ACM Sympo-
`sium on Operating Systems Principles, 1995, pp. 201-212.
`Carter, J. Lawrence, et al., “Universal Classes of Hash Functions”,
`Journal ofComputer and System Sciences, vol. 18, No. 2, Apr. 1979,
`pp. 143-154.
`Patent Abstracts of Japan, “Electronic Mail Multiplexing System and
`Communication Control Method in the System”, Jun. 30, 1993, JP
`05162529.
`Kim et al., “Experiences with Tripwire: Using Integrity Checkers for
`Intrusion Detection”, COAST Labs. Dept. of Computer Sciences
`Purdue University, Feb. 22, 1995, pp. 1-12.
`Kim et al., “The Design and Implementation of Tripwire: A File
`System Integrity Checker”. COAST Labs. Dept. of Computer Sci-
`ences Purdue University, Nov. 19, 1993, pp. 1-21.
`Peter Deutsch (peterd@bunyip.com), “Re: MD5 and LIFNs (was:
`Misc Comments)”, www.acl.lanl.gov/URI/archive/uri-94q2.mes-
`sages/0106.htrnl, Apr. 26, 1994.
`Alexander Dupuy (dupuy@smarts.com), “RE: MD5 and LIFNs
`(was: Misc Comments)”, www.acl.lanl.gov/URI/archive/uri-94q2.
`messages/0113.html, Apr. 26, 1994.
`Alexander Dupuy (dupuy@smarts.com), “MD5 and LIFNs (was:
`Misc Comments)”, www.acl.lanl.gov/URI/archive/uri-94q2.mes-
`sages/0081.htrnl, Apr. 17, 1994.
`Albert Langer
`(cmf851@anu.oz.au), http://groups.google.com/
`groups?selm:1991Aug7.225159.786%40newshost.anu.edu.au&
`oe:UTF-8&output:gplain, Aug. 7, 1991.
`Clifford Lynch (Calur@uccmvsa.bitnet), “ietf url/uri overview draft
`paper
`(long)”, www.acl.lanl.gov/URI/archive/uri-93q1.messages/
`0015.html, Mar. 25, 1993.
`K. Sollins and L. Masinter, “Functional Requirements for Uniform
`Resource Names”, www.w3 .org/Addressing/rfc1737.b<t, Dec. 1994,
`pp. 1-7.
`W3C:ID, HTTP: A protocol for networked information, “Basic
`HTTP as defined in 1992”, www.w3.org/Protocols/HTTP2.html,
`1992.
`Defendant Lime Wire, LLC’s Answer, Affirmative Defenses and
`Counterclaims dated Nov. 15, 2007, from CivilAction No. 07-06161
`VBF (PLAx).
`
`GOOG-T023-Page 5 ores
`
`GOOG-1023-Page 5 of 68
`
`
`
`US 8,099,420 B2
`Page 6
`
`Kim, Gene H., and Spafford, Eugene H., “Writing, Supporting, and
`Evaluating Tripwire: A Publicly Available Security Tool.” COAST
`Labs. Dept. of Computer Sciences Purdue University, Mar. 12, 1994,
`pp. 1-23.
`U.S. Appl. No. 11/980,679—May 6, 2009 PTO Office Action.
`USPTO, Non-Final Office action mailed Jun. 15, 2009 in U.S. Appl.
`No. 11/980,687.
`USPTO, Non-Final Office action mailed Jun. 18, 2009 in Reexam
`U.S. Appl. No. 90/010,260.
`Communication from EPO in European Application No. 96 910
`7622-1225 dated May 8, 2009 [4 pgs.].
`McGregor D. R. and Mariani, J. A. “Fingerprinting—A technique for
`file identification and maintenance,” Software: Practice and Experi-
`ence, vol. 12, No. 12, Dec. 1982, pp. 1165-1166.
`[Proposed] Order Regarding Construction of Terms, filed Mar. 29,
`2007 in C.D. Cal. case No. CV 06-5086 SJO (Ex) [9 pgs.].
`Analysis of Plaintiffs’ Claim Chart for the ’280 Patent As Against
`Defendant Media Sentry, Inc. 11 pages.
`Analysis of Plaintiffs’ Claim Chart for the ’791 Patent As Against
`Defendant Media Sentry, Inc. (11916.001.0150.a) pp. 1-48.
`Analysis of Plaintiffs’ Claim Chart for the ’791 Patent As Against
`Defendant Overpeer pp. 1-40.
`Barbara, D., et al., “Exploiting symmetries for low-cost comparison
`of file copies,” 8th Int’l Conf. on Distributed Computing Systems,
`Jun. 1988, pp. 471-479. San Jose, CA.
`Campbell, M., “The Design of Text Signatures for Text Retrieval
`Systems,” Tech. Report, Sep. 5, 1994, Deakin University, School of
`Computing & Math., Geelong, Australia.
`Chang, W. W. et al., “A signature access method for the Starburst
`database system,” in Proc. 15th Int’l Conf. on Very Large Data Bases
`(Amsterdam, The Netherlands), pp. 145-153.
`Changes to Mar. 23, 2007 Deposition ofRobert B. K. Dewar, in C.D.
`Cal. case No. CV 06-5086 SJO (Ex) [3 pgs + cover letter.].
`Communication pursuant to Article 96(2) EPC from EPO (Examina-
`tion Report), Jan. 17, 2007, inApplication No. EP 96 910 762.2-1225
`[1 pg. with 5 pg. annex].
`Complaint for Patent Infringement, Permanent Injunction and Dam-
`ages, Aug. 8, 2006, in C.D. Cal. case No