throbber
The abstract is missing from the original file history.
`
`Sorry for any inconvenience.
`
`Ex. 1018 - Page 1 of 23
`
`Groupon, Inc.
`Exhibit 1018
`
`

`

`:4 a
`
`”5531 20/
`
`fr
`
`ar/224280
`
`EFFICIENT CRYPTOGRAPHIC METHODS AND DEVICES
`
` 2
`
`4
`
`6
`
`7
`
`a
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`13
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`Background of the Invention
`
`The present invention relates generally to information processing and
`
`more specifically to an efficient cryptographic system that is designed to
`
`process a large amount of information by selectively encrypting a portion
`
`of the information.
`
`It has long been recognized that information needs to be encrypted under
`
`some circumstances. For example, military messages are typically
`
`encrypted in order to prevent enemies from obtaining information
`
`contained in the message. Recently, commercial applications of
`
`encryption have been proposed. For example, several commercial
`
`software products were developed to encrypt all or a portion of the data
`
`stored on a storage device (e.g., hard disk and floppy diskette). Some of
`
`the communication software packages also allow users the option of
`
`encrypting their electronic mails. Recently, new methods for marketing
`
`information have been proposed. In one of the proposed methods,
`
`encrypted information is distributed (e.g., using CD-ROMS or via digital
`
`highway, such as the Internet) by a vendor to potential customers either
`
`free or at nominal cost. However, the customers are not provided with the
`
`key to decrypt the information. When the customers wish to purchase the
`
`1
`
`Ex. 1018 - Page 2 of 23
`
`Ex. 1018 - Page 2 of 23
`
`

`

`information, they need to contact the vendor to obtain the necessary
`
`decryption key, typically upon payment of fees. In another proposed
`method. a secure hardware is connected to the computer of a potential
`
`customer. Encrypted information (e.g.. software) is distributed by a
`
`vendor to the customer either free or at nominal cost. Thelsecure
`
`hardware contains the necessary key for decrypting the information.
`
`When the customer uses the information, the secure hardware decrypts
`
`the information and measures one or more parameters (eLg., time) relating
`
`to the usage of the information. The charges incurred by the customer is
`
`based on these parameters. Because the decryption key and the
`
`decrypted information is never exposed to the customer, the customer has
`
`to pay each time the information is used.
`
`One of the major differences between commercial applications of
`
`encryption and other applications (e.g., military applications) is the
`
`amount of information needs to be encrypted. Typically, commercial
`
`information, such as a database or a digitized movie, may contain more
`
`than several hundred million bytes of information. On the other hand.
`
`military messages are relatively short. Another major difference is that
`
`commercial applications typically use low cost general purpose computers
`
`(such as microcomputers) to decrypt the encrypted data while military
`
`applications use high power computers specially designed for
`
`cryptographic applications. Even though the processing power of low cost
`
`computers is expected to increase at a fast pace, these computers take on
`
`1.0
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`Ex. 1018 - Page 3 of 23
`
`Ex. 1018 - Page 3 of 23
`
`

`

`more and more demanding tasks (e.g., video processing and high speed
`
`communication). As a result, the amount of processing power devoted to
`
`encryption in a commercial system may not increase with time, and in
`
`some situations, even decrease.
`
`' Prior art cryptographic systems are mainly developed and designed for
`
`military applications, i.e., they are designed to use high power computers
`
`to handle a small amount of information. These systems may not be
`
`suitable for commercial applications. As a result, there is a need to
`
`develop an efficient method to handle commercial cryptographic needs.
`
`Summary of the Invention
`
`- Broadly stated, the present invention is a method and a signal processing
`
`device for encrypting information. Only a portion of the information
`
`needs to be encrypted because the information would not be useful if this
`
`portion is not decrypted. When the information has a low degree of
`
`correlation and error tolerance, even encrypting a small portion would be
`
`sufficient to render the information useless unless this small portion is
`
`decrypted. For information that is highly correlated, it would be difficult
`
`to take advantage of the correlation if substantially all the correlated
`
`portions are encrypted. As a result, the correlative nature of the
`
`information cannot be used to bypass decrypting the encrypted portion.
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`1'7
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`Ex. 1018 - Page 4 of 23
`
`Ex. 1018 - Page 4 of 23
`
`

`

`Brief Description of the Drawings
`
`Fig. 1 is a drawing showing one embodiment of the present invention.
`
`Fig. 2 is a drawing showing an embodiment of the present invention as
`
`applied to video information.
`
`Fig. 3 is a drawing showing an embodiment of the present invention
`
`where information is stored in a plurality of files.
`
`Detailed Description of @Invention
`
`It has been observed that information generally has a certain degree of
`
`redundancy. For example, the structure of many languages dictates that
`
`redundant words or letters be used at predetermined positions of a
`
`sentence. A reader can still understand the sentence if some of these
`
`words and letters are removed. For example, the grammar of the English
`
`language imposes a set of rules which includes putting the letter "s" at the
`
`end of a noun to designate plural quantity. In many sentences, the noun
`
`is not the only place where plural quantity is indicated. For example, the
`
`sentence "there are two birds" uses the word "two" to indicate the
`
`existence of more than one bird, in addition to the letter "5“ attached to
`
`the word "bird." Thus, the letter "s" at the end of the word "bird" can be
`
`omitted without affecting the meaning of the sentence. In fact, there are
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`1'7
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`Ex. 1018 - Page 5 of 23
`
`Ex. 1018 - Page 5 of 23
`
`

`

`languages in this' world in which noun does not have a plural form.
`
`The degree of redundancy in a certain piece of information depends on the
`
`nature of the information. At one extreme, information may contain
`
`many redundant parts. An example is video information which consists of
`
`a series of pictures depicting time progression of a scene. Each picture
`
`typically differs slightly from an adjacent picture in the series because the
`
`time difference in the scene depicted by adjacent pictures istypically less
`
`than 0.1 second. As a result, video information contains many pictures
`
`which are substantially the same. Consequently, it is easy to recreate a
`
`picture missing from the series by interpolating from the pictures prior
`
`and subsequent to the missing picture. This type of information is
`
`considered to have a high degree of temporal correlation.
`
`Video information also has another type of redundancy. The spatial
`
`variation of a picture is typically very gentle. For example, if the picture
`
`is a human swimming in water, there is little variation (in terms of color
`
`and intensity) in the portion of the picture relating to water.
`
`Consequently, it may be easy to recreate a missing portion of a picture by
`
`interpolating from portions of the picture surrounding the missing
`
`portion, This type of information is considered to have a high degree of
`
`sp atial correlation.
`
`At the other extreme is information in which it is difficult to create a
`
`missing portion firom other portions. This type of information has a low
`
`10
`
`ll
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`Ex. 1018 - Page 6 of 23
`
`Ex. 1018 - Page 6 of 23
`
`

`

`degree of correlation. An example of this type of information is the binary
`
`code of a piece of software. Typically, it is difficult to recreate a missing
`
`byte (or a series of missing bytes) from other bytes in the binary code.
`
`Information can also be classified according to its effect on intended uses
`
`if a portion of the information is missing. At one extreme is information
`
`which would be useless if a small portion is missing. An example is the
`
`binary code of a piece of software. A computer is unlikely to successfully
`
`execute the software if the binary code has a few erroneous bytes. This
`
`type of information is considered to be error intolerant. At the other
`
`extreme is information that degrades gracefully. For example, when noise
`
`of TV signal increases (i.e., portions of video information is missing or has
`
`erroneous values), color TV pictures often become monochrome. However,
`
`it is still possible to watch and comprehend the TV pictures, even though
`
`they are less pleasing to the eyes. This type of information is considered
`
`to be error tolerant. Error toleration can also be different depending on
`
`spatial or temporal types of errors.
`
`It should be pointed out that even though the degree of error tolerance
`
`has some relationship to the degree of correlation of information, it does
`
`not depend solely on the degree of correlation. For example, a reader is
`
`likely to tolerate a large number of missing words in a newspaper article.
`
`On the other hand, the same reader probably would not tolerate the same
`
`perCentage of missing words in a poem. Thus, even though the degree of
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`Ex. 1018 - Page 7 of 23
`
`Ex. 1018 - Page 7 of 23
`
`

`

`
`
`correlation of the newspaper article and poem may be the same (because
`
`they follow essentially the same grammar rules), the degree of error
`
`tolerance is different. This is because error tolerance depends, to a
`
`certain extent, on subjective considerations. As another example, a
`
`person typically does not tolerate a small distortion in a familiar song
`
`while may tolerate a large distortion in a new song, even though the
`
`degree of correlation of these two songs are the same.
`
`In the prior art cryptographic systems, every bit of information is
`
`encrypted. One aspect of the present invention is the realization that it
`
`may not be necessary to completely encrypt the information, especially
`
`when it has a low degree of correlation. This is because it is often difficult
`
`to recreate the encrypted portion of information (if it cannot be decrypted)
`
`based on the clear portion of information. In addition, information that
`
`has a low degree of error tolerance may only need to be encrypted at a few
`
`critical places (e.g., the destination address of a jump op code, or the last
`
`name field of a Customer database). This is because a user would not
`
`accept the information if a small portion is missing or erroneous. Thus,
`
`even though most of the information is in the clear, it is still not
`
`commercially useful if isolated portions are unavailable because they
`
`cannot be decrypted (i.e., people are still willing to pay a high price to
`
`obtain the full information, even though they already have 99 percent of
`
`the information). Since only a small portion of information need to be
`
`decrypted, the amount of computation power required to decrypt the
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`1'7
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`Ex. 1018 - Page 8 of 23
`
`Ex. 1018 - Page 8 of 23
`
`

`

`1
`
`3
`
`4
`
`5
`
`6
`
`7
`
`3
`
`9
`
`10
`
`11
`
`12
`
`13
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`22
`
`23
`
`24
`
`information is reduced.
`
`Encrypting a portion of information may also help to reduce the
`
`computation power required for other signal processing tasks. As an
`
`example, information which is massive and highly correlated (e.g., video
`
`information) is often compressed in order to reduce the amount of memory
`
`space used for storing and the bandwidth used for transmitting the
`
`information. Many compression methods make extensive use of the
`
`correlative nature of information. However, many encryption methods
`
`have a tendency to randomize information. For example, if the plain text
`
`is a string of identical letters. the encrypted text using algorithms such as
`
`DES may be a string of letters in which every letter is different.
`
`Consequently, it may be more difficult to compress the encrypted text.
`
`The word "encryption" is used broadly in the present invention to include
`
`different ways of transforming information so that it is difficult for an
`
`unauthorized person to correctly understand the information. It includes
`
`transformation in which a key is required, such as public key and secret
`
`key encryption methods. It also includes scrambling information
`
`according to a secret algorithm without using a particular parameter
`
`which may be classified as a "key."
`
`The word "information" is used broadly in the present invention to include
`
`data that is organized in some logical manner. Examples of information
`
`Ex. 1018 - Page 9 of 23
`
`Ex. 1018 - Page 9 of 23
`
`

`

`include video signal, audio signal, picture, computer software, text,
`
`database, and multimedia composition.
`
`Fig. 1 is a diagram showing one embodiment in which information having
`
`a low degree of correlation is processed with a signal processor 20 of the
`
`present invention. Fig. 1 shows the portion of information 12 containing
`
`sixteen pieces of plain text which are grouped into four blocks B1, B2, B3
`
`and B4. Each block contains four pieces of plain text labeled as P1, P2,
`
`P3, and P4. Each of these sixteen pieces c0uld contain a single bit or a
`
`plurality of bits. It should be pointed out that the above grouping is
`
`exemplary, and any number of pieces could be grouped into any number
`
`of blocks. In addition, it is not necessary to require every block to have
`
`the same number of pieces,
`
`Processor 20 contains a program stored in memory, such as ROM 22. This
`
`program is executed by a CPU 24. The program stored in ROM 22 could
`
`be any program that can selectively encrypt some of the pieces of plain
`
`text in information 12. Preferably, an algorithm should be chosen such
`
`that it is difficult for an unauthorized person to determine which pieces
`
`are selected for encryption. Any encryption method can be used by
`
`processor 20.
`
`An exemplary program in ROM 22 is described below. The pieces in the
`
`blocks having an odd numeral in their label, e.g., B 1 and B3, are not
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`Ex.1018- Page 10 of23
`
`Ex. 1018 - Page 10 of 23
`
`

`

`encrypted. They provide the "base" for selecting one or more pieces in the
`
`subsequent blocks (i.e., blocks B2 and B4) for encryption. For example,
`
`the selected piece in block 82 can be calculated from the pieces in block
`
`Bl by adding the number of bits in all the pieces of block Bl, and takes
`
`the remainder after dividing by four. It should be pointed out that the
`
`blocks used as base do not have to be adjacent to the blocks having pieces
`
`selected for encryption (e.g., the block B1 can be used to determine the
`
`selected piece in block B4). In addition, the pieces of more than one blocks
`
`can be used as base (e.g., blocks B1 and B3 can be used to determine the
`
`selected piece in block B2).
`
`V In Fig. 1, it is assuméthat the third piece of block B2 is selected (using
`the above described formula) for encryption. This piece is encrypted and
`
`is labeled as E3 in the encrypted information 40. Similarly, the fourth
`
`piece of block B4 is assumed to be selected (using the above described
`
`formula) for encryption and is labeled as E4. The selection of the third
`
`piece in block B2 and the fourth piece in block B4 should appear as
`
`random selection to persons who do not known the above formula.
`
`The decryption process is now described. Since blocks B1 and B3 are not
`
`encrypted, the "base" is not change by processor 20. Consequently, the
`
`above formula can be used by processor 30 to determine which pieces in
`
`blocks B2 and B4 are encrypted. As a result, processor 30 can decrypt the
`
`selected pieces and the original information 12 can be recovered.
`
`10
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`Ex.1018- Page 11 of23
`
`Ex. 1018 - Page 11 of 23
`
`

`

`Because information 12 has a low degree of correlation, it would be
`difficult to create pieces P3 in block B2 and P4 in block B4 by
`
`interpolating information contained in other pieces if E3 and E4,
`
`respectively, are not decrypted. However, if information 12 is highly
`
`correlated, it may be possible to create pieces P3 in block B2 and P4 in
`
`block B4 by using information contained in the other pieces without
`
`decrypting E3 and E4. Methods to render such creation difficult even for
`
`highly correlated information will be discussed below.
`
`The ratio of the number of encrypted pieces to the number of plain text
`
`pieces is determined by the error tolerance of the information. Ifthe error
`
`tolerance is low (i.e., it is unacceptable to miss a small amount of
`
`information), only a small number of pieces need to be encrypted. On the
`
`other hand, if the error tolerance is high, it may be necessary to encrypt a
`
`larger number of plain text pieces.
`
`Fig. 2 is a diagram showing one embodiment in which information having
`
`a high degree of correlation, such as video information 110, is processed
`
`with a signal processor 130 of the present invention. Only three frame
`
`112, 114 and 116 of video information 110 are shown, although video
`
`information 110 typically contains a large number of frames. Frames 112,
`
`114, and 116 have a centrally located region 122, 124, and 126,
`
`respectively, which are of the same size and shape. Only these regions
`
`11
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`
`
`Ex.1018- Page 12 of23
`
`Ex. 1018 - Page 12 of 23
`
`

`

`are encrypted while the rest of the frames are in the clear. Since the area
`
`of each of these regions are small compared to the size of a full frame, the
`
`amount of encryption and decryption is reduced.
`
`The frames 112, 114, and 116 are processed by signal processor 130 which
`
`contains memory (such as ROM 132) and a CPU 134 for storing and
`
`‘
`
`processing the algorithm of the present invention. Signal processor 130
`
`generates encrypted video information 150 With three frames 152, 154,
`
`and 156, each corresponding to frames 122, 124, and 126, respectively.
`
`Frames 152, 154, and 156 contain encrypted regions 162, 164, and 166,
`
`respectively, which are resulted from encrypting regions 122, 124, and
`
`126, respectively.
`
`The encrypted video information 150 can be decrypted using a decryption
`
`processor 140. Because the location, size and shape of the encrypted
`
`region in each frame is predetermined, processor 140 is able to find the
`
`encrypted regions and decrypt them accordingly.
`
`In this embodiment, the same region of all the frames (i.e., for all times
`
`from beginning to end) are encrypted. Thus, it is not possible for an
`
`unauthorized person to take advantage of temporal correlation because
`
`there is no unencrypted data of the region for all times. It is also difficult
`
`to take advantage of spatial correlation near the center of the frame
`
`because there is little unencrypted data available at areas surrounding
`
`12
`
`10
`
`ll
`
`12
`
`13
`
`_14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`Ex.1018- Page 13 of23
`
`Ex. 1018 - Page 13 of 23
`
`

`

`the center. The reason for positioning the encrypted region at the center
`
`is to take advantage of the fact that the most informative area of a picture
`
`is usually the center.
`
`The method disclosed in Fig. 2 encrypts Substantially all the correlated
`
`portions of the information. Since almost none of the correlated portions
`
`are in the clear, it is impossible to bypass the correlated portions by using
`
`techniques such as interpolation.
`
`The size of the regions 122, 124 and 126 depends on the degree of error
`
`tolerance. If spatial error tolerance is low (i.e., a user will not tolerate
`
`even a small amount of erroneous spatial information), the size of the
`
`regions 122, 124 and 126 could be small. Further, for situations where
`
`temporal error tolerance is low, it is not necessary to encrypt all the
`
`frame.
`
`It may be advantageous to encrypt several regions (instead of only one
`
`centrally located region). This is because the most informative region
`
`may not be located at the center. Further, the size and shape of the
`
`encrypted regions may vary from frame to frame. The only requirement is
`
`to incorporate the same or a similar set of region selection rules in
`
`processor 130 and processor 140.
`
`In digital applications, information is preferably organized into one or
`
`more files. If the size of information is small, it could be stored in one file.
`
`13
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`Ex. 1018 - Page 14 of 23
`
`Ex. 1018 - Page 14 of 23
`
`

`

`However, if the size of information is large, it may be stored in a plurality
`
`of files, Fig. 3 shows a plurality of files 212-217 in a medium 210.
`
`Examples of medium 210 are magnetic storage, optical storage, RAM, and
`
`communication channel. Files 212-217 could be organized serially or in
`
`other formats The files relating to the information may be linked in well
`
`known manners. For example, file 212 is linked to file 215 through a link
`
`222; file 215 is linked to file 216 through a link 223; and file 216 is linked
`
`to file 213 through a link 225. Alternatively, no link isneeded if the files
`
`are organized sequentially. Links 222, 223, and 225 could be stored
`
`inside files 212, 2 15, and 216, respectively. Alternatively, information
`
`relating to the links can be stored in other locations, such as a separate
`
`file 230.
`
`If one or more of the files 212, 213, 215, and 216 are totally or partially
`
`encrypted, the information stored in these files may be commercially
`
`useless. Consequently, there may not be a need to encrypt all the files.
`
`Even iffiles 212, 213, 215, and 216 are in the clear, the information may
`
`be useless if the links are encrypted. This is the case if the size of each file
`
`is small and the number of links is large, i.e., it would be very difficult to
`
`organize the information without the links.
`
`While the invention has been particularly described, it will be apparent to
`
`those skilled in the art that the disclosed invention may be modified in
`
`numerous ways and may assume many embodiments other than that
`
`14
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`Ex.1018- Page 15 of23
`
`Ex. 1018 - Page 15 of 23
`
`

`

`1
`
`2
`
`3
`
`specifically set out and described above. It is intended by the appended
`
`claims to cover all modifications which falls within the true spirit and
`
`scope of the invention.
`
`15
`
`Ex.1018- Page 16 of23
`
`Ex. 1018 - Page 16 of 23
`
`

`

`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`| WHAT IS CLAIMED IS:
`
`1.
`
`A method of encrypting a file comprising the step of
`
`encrypting only a portion of said file.
`
`2.
`
`The method of Claim 1 wherein said file includes a first and
`
`a second block of bits, said first block being unencrypted and said second
`
`block further including at least two sub-blocks, said encrypting step
`
`comprising the steps of:
`
`selecting at least one of said sub-blocks based on saidliit of said
`//
`
`first block, and
`
`"‘“
`
`encrypting said selected sub-block.
`
`The method of Claim 2 wherein said file includes a serial
`3.
`stream of data, and said first and said second blocks being a portion of
`
`said serial stream of data.
`
`4.
`
`The method of Claim 1 wherein said file contains at least one
`
`set of data having a correlative relationship, and wherein said encrypting
`
`step comprises the step of encrypting substantially all said set of
`
`correlative data.
`
`5.
`
`A method of encrypting video information comprising the
`
`16
`
`Ex.1018- Page 17 of23
`
`Ex. 1018 - Page 17 of 23
`
`

`

`step of encrypting only a portion of said video information.
`
`6.
`
`The method of claim 5 wherein said video information
`
`includes a first frame followed by a second frame, said encrypting step
`
`comprising the steps of:
`
`encrypting a portion of said first frame; and
`
`encrypting a portion of said second frame which is located at
`
`substantially the same position as said portion of said first frame.
`
`10
`
`11
`
`12
`
`13
`
`1.4
`
`15
`
`16
`
`17
`
`18
`
`19
`
`2O
`
`21
`
`7.
`
`The method of Claim 6 wherein said portions of said first and
`
`said second frames are substantially centrally located.
`
`8.
`
`The method of Claim 5 wherein said video information
`
`includes a plurality of frames, and wherein said encrypting step
`
`comprises the step of encrypting substantially all of said plurality of
`
`frames at a substantially identical region.
`
`9.
`
`A method of encrypting information contained in a plurality
`
`offiles connected by links comprising the step of keeping at least one of
`
`said files and links un‘encrypted.
`
`l7
`
`Ex.1018- Page 18 of23
`
`Ex. 1018 - Page 18 of 23
`
`

`

`«TENT APPLICATION AND POWER OF A'i
`COMBINED DECLARATION Foi.
`(mu antenna to PC? tntoruttonai Apmatuonu
`
`A .ANEY
`
`As a below named inventor. I hereby declare that:
`
`My residence. post ofrice address and citizenship are as stated below next to my name.
`I believe I am the original. first and sole inventor (if only one name is lined below!) or an original. first and joint
`inventor (if plural names are listed below!) of the subject matter which is claimed and for Which a patent ts sought
`on the invention entitled:
`‘ ~
`‘
`.
`‘
`Eflruznf Craejoaanhm fifth“ gm iXi/tge;
`
`the specification of which (check only one item below}:
`
`3 is attached hereto.
`
`D was filed as United States application
`Seriai No.
`
`on
`
`and was amended
`
`on
`
`Ci Was filed as PCT international application
`Number
`
`on
`
`and was’amended under PCT Article l9
`
`(if applicable),
`
`PIIOI FONEIGNIPCT APPLICATIONS] AND ANY PRIORITY ELAINE UNDEI 35 U.S.C. 119:
`
`on
`
`(if applicable).
`
`I have miewcd and understand the contents of the above-identified specification. including
`l hereby state that
`the claims. as amendedby any amendment referred to above.
`
`l acknowlege the duty to disclose information which is materiai to the examination of this application in
`accordance with Title 37, Code of Federal Regulations. il.56(a).
`
`l hereby claim foreign priority benefits under Title 35. United States Code. 5| l9 of any foreign application“)
`for patent or inventor's certificate or of any PCT international applicationls) designating at
`least one country
`other than the United States of America listed below and have also identified below any foreign appliationfs) -
`for patent or inventor't certificate or any PCT international applicationts) designating at least one country other
`than the United States of America filed by me on the same Subjefl matter having a filing date before that of the
`application(s) of which priority is claimed:
`
`’m 'W‘lv '9 It
`
`.
`
`hum:
`
`us oerntunrovoonn-Iue—ur-wo-m
`
`(January 199!)
`
`Ex.1018- Page 19 of23
`
`Ex. 1018 - Page 19 of 23
`
`

`

`
`
`Combined Declaration For Patent Application and Pow" oi Attorney (Continued)
`Ivteludu lemme to 'CT trttmttonotduoltunonll
`
`
`
`
`
`l hereby claim the benefit under Title 35. United States Code. 5120 of any United States applicationlal or PCT
`international applicationts) dailnatina the United States of America that is/are listed below and. insofar as the
`subtect matter or each of the claims of this application is not disclosed in that/those prior applieationts) in the
`manner proVided by the first paragraph of Title 35. United States Code. ll 12.
`l acknowlege the duty to disclae
`material information I: defined in Title 37. Code of Federal Regulations. Sl.56(a) which occurred between the
`Filing date of the prior applicatiunls) and the national or PCT international filing date of this applicationr .
`
`:glgg'g.S‘.:A°PPUC‘TION5 05 PCT INTERNATIONAL APPUCATlONS DISIGNATING THE U.5. FOR BENEFIT UNDER
`
`m9 I”!
`mm_—_—
`
`
`POWEROF ATTORNEY: Man-Minoan)! Im-mmmMMalawqu-nmlwm
`
`Mowkafimandmnulhuimainmhtmmfmflmmm (valuation-ingleno-
`tionnunoul
`
`Direct Totem Call to:
`Mflww
`
`(Mom
`
`Howl
`
`
`
`I hereby declare that all statements made herein of my own knowledge are true and that all statements nude on
`information and belief are believed to be true: and further that these ttatetnents were made with the knowledge
`that willful false statements and the like so made are punishable by fine or imprisonment. or both. under section
`IOOI of Title ii of the United States Code. and that such willful false statements may jeopardize the validity of
`the application or anv patent issuing thereon.
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`(408') 197C5'7 58‘
`
`gm9”?“er
`
`
`
`
`
`
`4%..-
`‘
`W
`
`
`
`
`
`
`I“
`-_mm
`a_— W" ~W
`m are lost one: mas
`start stream-comm
`nodules
`
`“w t, rm --
`
`
`no tat‘u ton.
`up 1.”
`u! “tarantummv‘l’mu—
`
`Ex. 1018 - Page 20 of 23
`
`Ex. 1018 - Page 20 of 23
`
`

`

`V ' “'I’Oé
`
`.
`
`RECEIPT AND HANDLING OF MAIL AND PAPER.e
`
`50903
`NOISE/O9 (10-92)
`
`" VERIFIED STATEMENT CLAIMING SMALL ENTITY STATUS
`(37 CER 1.9(0 & 117(b))--INDEPENDENT INVENTOR
`
`Docket Number (Optional)
`
`91114 C CHHN
`Applimntot'Patentee:
`SerialmPatentNme
`
`Filedorlssued:
`mte; Efitcigfit
`
`av}! I. HEM
`(‘rfif+°%£°‘fbic Mngo/s and Quin;
`
`Duo
`
`As a below named inventor. I hereby declare that I qualify as an independent inventor asdel'med In 37 CFR 1.9(c) for
`putposes of paying teduced fees to the Patent and Trademark Office described in:
`'
`
`the specification filed herewith with title as listed above.
`
`D the appliation identified above.
`D the patent identified above.
`lhavenotassigned muted. conveyed oelicensedmd am undetnoobligau'nn tutderconn-actct lawtomtgn. grant.
`convey or license. any rights in the invention to any person who wettld not qualify as an independent Inventor under 37
`CPR 1.9(c) ilflm person had made the invmtion. nrtn any concern which would notqttalify as “null business
`concern nude 37 CFR 1.9(d) or a nmprntlt «satiation under 37 CPR 1.9(e).
`
`Each person. concern or organinttm to which I have assigned. granted. conveyed. or licensed (I am under an obliga-
`tion under contract or law to assign. gnnt. convey. or license any rights in the invention is listed below:
`
`[2] No such person. concern. or organiznnnn exists.
`U End: such person. concern or organizatim is listed below.
`
`Separate verified statements ate xequimd trntn etch named person. concern or organization having tights to the inven-
`tion avaring to their status as small entitles. (37 CFR 127)
`
`I acknowledge the duty to file. tn this application or pant. notificenoo orany change in status resulting in loss of
`entitlement to small entity status ptior to paying, tx at the time of paying, the eulleet «the issue fee may mainte-
`nance tee due after the date on which status as a small entity is no longer Wm. (37 CFR 1.286!»
`
`lhuehydeclaxethataustatunenumadeheretnofmyownknowledgeuen-ucmdthunllmtnnenuntatteontnfm
`tlonendhel'tettuebelievedtobettuenndftntbetthntthesemtetnentswuemdewifltthekncwledgethuwillmlfnlse
`mmuudmeukemmuemnbyfimmhnptmtummmonloot of'l'itlelsotthe
`UnltedStatesCode.andttmsndtwinnutalseuntancnnmyjeupuututhenltdttyofthuppuwtommypment
`issuhtgthaeononnypatenttawhlchthtsvaificdstatanmtisdimed.
`
`Hark (- C 113A
`NAME 09mm
`
`NAME or mum:
`
`NAME or ammo:
`
`Steam of invent»:
`Due
`
`Signenne atinventor
`Due
`
`Sipum orinventor
`
`PTO/SB! 09 ( 10-91)
`
`I
`
`500 - 15
`
`. Plant IN 1'th Olfla; U.S. DEPARTMENT OF COMMERCE
`Rev. 14, Nov. 1992
`
`Ex. 1018 - Page 21 of 23
`
`Ex. 1018 - Page 21 of 23
`
`

`

`

`

`PRINT OF DRAWINGS
`AS ORIGINAL
`LY FILED
`
`
`
`
`
`USZPZZ/BG
`
`Ex. 1018 - Page 23 of 23
`
`Ex. 1018 - Page 23 of 23
`
`

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket