throbber
69
`
`I
`
`EP0946022A2
`
`70
`
`16
`
`15
`
`. The procedure at NbkePAT. MergePAT and
`[0317]
`TransP/ii’ is similar to that descrbed above with refer-
`ence to Fig. 21, except that the AID should be replaced
`by the link information of the AID and the AID list shoutd
`be replaced by the link specifying AID list. Also. the pro-
`cedure of SpfrtPAT is similar to that described above
`with reference to H9. 22, except that the AID should be
`replaced by the fink information at the AID and the AID
`list should be replaced by the link spedlying AID list.
`[0318] Here. in the procedures of Fig. 21 and Fig. 2,
`the link specifying AID list generation is canried out
`acoordng to Fig. 49 as follows. Namely. a buffer length
`is determined first (step $9011) and a butter is gener-
`ated (step S9012). Then. the link information of the
`holder AID is copied to a vacant region of the generated
`bufler (sttp S9017). That, the link irrtonnation ol the
`member AID is copied to a vacant region olthe resulting
`bufler (step 59018). and it the next merrber AID exists
`(stq) S9015 YES). the stq) S9018 is repeated.
`.
`[0319] Next. the deternination of the link inlomiation
`at the holder AID will be descrtsed. Each or the Make-
`PAT. the MengePAT. the SpIitPAT, and the TransPAToom-
`wands is defined to have two or more arguments. where
`AID. PAT. or Enabler can be specified as an argument.
`In this case. the PAT procesang device specifies the link
`information ottheholderAlDotthe P/fitobeouuautted
`after executing each oorrvnand according to the follow-
`ing rules
`
`* Case at the MakePAT:
`For the MakePAT command. it is defined that
`AlDs are to be specified for thefirst argument to the
`N—thargumenl(N=2.3. -------~ )andEna—
`blers are to be specified tor the N+1-th and subse-
`quent arguments. For example.
`they can be
`as follows.
`
`- - - - - - - -, AIDN.
`MakePAT AID‘, AIDE,
`Enabler
`of
`AID2.
`Enabler
`ot
`AID1.
`-- - -- -- -,Enab|erotAIDN
`
`The PAT processing device interprets the link
`information of AID ot the first argument of the Make-
`PAT command as the link intormation the holder
`AID.
`
`Only when one of the Emblers ol the N+1-th
`and subsequent arguments corresponds to the AID
`of the tirst argument. the PAT processing device
`specifies the link information at this AID (that is the
`link information at the AID of the first argument) as
`the link intomtation of the holder AID at the PAT to
`be outputted alter arecuting the MakePAT com-
`rnand.
`
`50
`
`' Case of the MergePAT:
`For the MergePAT command. it is defined that
`PATs are to be specified for thefirst argument to the
`N-thangument(N=2.3. -- ------)andEna-
`bler is to be specified for the N+1-th argument
`
`Nan1ely.theycanbespecifiedasiollows.
`
`MergePAT PAT, PAT-2 - - - ~ - - - - PAT" Ena-
`HeroIAID
`
`The PAT prncessingdevice irlterprets the link
`irrtonnationottliel'olderAlDotthePATotthefrst
`argumentotthe MergePAToommand asthe link
`irrforrnationoltheholderAlDotll'iePAl'tobeout-
`|:1rttedafteexecutingtheMergeFA'l’oomrrar\d.
`OrilywhentheEnablerol1heN+1-thargument
`correspondstotheho&1erAIDotthePATofthef‘Ist
`argument.thePAT processing device specifies the
`Iinkiritorrriationoltl'iisAlD(tl1atistl'ielinkirrtorma-
`tionoftheholdeI'AIDqftt'iePATofthefirstargu-
`merIt)astheEnkintnrmafionallheholderAlDot
`the PATtobeoutputted atter executing theMerge~
`PATcomrrand.
`-
`CaseotthaSpli1PAT:
`FortheSplitPAToonimand.itisdefmedthat
`PATistobeq>ea'fiedtorthetirstargurneI'n.asetof
`meorrnoreAlDsgmuped’rngetherbysorriepre-
`sorbedsynt:ols($sumedtnbeparentheses0in
`this example) aretobesaeoifiedtortheseoond
`argumenttotheN-thargurnenl(N=3.4.
`--------).andEnabIerisl:obespea‘fiedtor
`tl'ieN+1—tl1argu:neratNarn«w.ttieycanbesper:i—
`fiedasfofiows
`
`(N021
`spmr Pm (N011)
`(NDN1 NDN2
`AioW)enauerorAID
`
`-N922)
`
`The Pltfproceséng device interprets the link
`intomiationottheholderAlDotthePATolthefist
`wgLIrIentcltheSpIitPATconrrrar1dastl1elir1I<‘nior-
`n'ationatthehoUerAlDotthePATtobeoutpulted
`after executing the SpIitPAT command.
`Only whentheEnablerolthe N+1-th argument
`correspcn<:lstotheholderAlDolthePKl'olthefirst
`argument.thePAT processing devicespecifiesthe
`link intorrnationolthis AID (thatisthe link informa-
`lior1ottheholderAIDdtheFAl'otthetirstargu-
`merit)asthe§nkirdom'iatioriotthehoIderAlDof
`thePKl'tobeoutputted after executing lheSpl‘rtPAl'
`command.
`-
`CaseoltheTransPAT:
`For the TransF'AT command. it is defined
`PATs aretobespecifiedforthelirst argumenland
`tl1eseoondargument,anAlDistobespeoitiedlor
`the third argument. and Enablers are to be speci-
`fiedforthe fourth argument and the fifth argument.
`Namelyflteycanbespecifiedasfollowa
`
`TransPAT PAT, PAT2 AID Enabler of AID1 Ena-
`bler of AID-2
`
`The PAT processing device interprets the link
`
`Petitioner Apple Inc. — Exhibit 1024, p. 3001
`
`Petitioner Apple Inc. - Exhibit 1024, p. 3001
`
`

`
`71
`
`EP0946022A2
`
`72
`
`irrforniatiortotAlDotthetl1irdargurnerrtastl1elirtk
`informationotlhe hclderAlDotthePATtobeout-
`
`putled atter executing the TransPAT command pro
`v'Ktaitfatthelir1kintormatiortotAlDotthethird
`argument ot the TransPATcommandiscontained in
`the PATof the secmd argument
`Ontywhenthe Enabletotthetourthargurnent
`corresponds to both the PAT ot the first argument
`and the PATotthesecondargumentand the Ena-
`bler otthefilth argumentoonapondstothe AID of
`the third argument.
`the PAT processing device
`ssedties the link information of the AID of the third
`argument as the link infomntion of the holder AID
`otthe PAT to beoutputted atter executing the Tram-
`PAT command.
`Next. the determination ot the link intormations
`ofthe merrberAlDswill bedescribed Thedefini-
`tions of the MakePAT, the MergePAT, the Sp§tPAT,
`andlheTransPATcommandsareasdescrioed
`above. The PA!‘ processing device specifies the link
`intormationsofthememberAlDsofthe PATtobe
`oulputted atter executing each command according
`to be following rules.
`Case of the MakePAT:
`Onlywhenthelinkinformaticnoltheholder
`AlDotthe Pkftobeoutputted after executingthe
`MekePAT command is tonmllydetermined, the PAT
`procesdng darice interprets all the link informa-
`tionsoftheAlDsofthesecondandsubsequent
`angurnerrtsottheMakePATconmar\dasthelink
`intornationsotthememberAlDsofthe PATtobe
`oulputted after executing the MalaePAT command.
`The HAT processing device specifies only the
`link intornrations at those AlDs among all the AlDs
`of the second and stbsequent arguments which
`correqaond to the Enablers specified by the N-r-1-th
`and subsequent arguments as the link inforrmtions
`ofthe member AIDs ot the PAT to be oulputted alter
`atecuting the MakePAT command.
`Case of the MergePAT:
`Only when the link intornation at the holder
`AJDotthePAl'tcbeoutputted aherexeculingthe
`MergePAT command is formally determined, the
`PAT processing dalice specifies the link interma-
`tions ot the member AlDs of all the PATs specified
`by the first to N-th arguments of the MergePAT as
`the link intcrmalions ot the member AlDs of the PAT
`to be outputted after executing the MergePAT com-
`mand.
`Case of the SplitPAT:
`Only when the link intormation of the holder
`AID of the PAT to be outputted after executing the
`SplitPAT command is lormally determined. the PAT
`processing device specifies the link inlormation of
`the member AID at the PAT specified by the first
`argument of the SplrtPAT conmand as the link infor-
`mation ofthe menber AID of the PAT to be output-
`ted after executing the SplitPAT commend. At this
`
`10
`
`15
`
`37
`
`poirlt.fl1elirtkirttt:rntatiortsotthemerr1:erAlDsare
`dstrbuted intod‘rlfererttPATsh'Iur1itsotpareI'lthe-
`ses(). Forexarrplejnthethseot:
`
`AlDa)
`(AIDZ1
`(AID11)
`SplitPAT Mr
`........ (Nam Alum ........
`AIDMQ EmtiaotAlD
`
`(AlD2, AIDZ2) and
`the lirit intormatiars ot (Alon),
`(AIDN1 AIDN2 - - - - - - - - AlDNM)nfllbethelirrkintnt-
`nationsofthemen'berAlDsolditterentPATshavinga
`oommonlinklrrlcnnationolholderAlD.
`'
`CasedTransPAT:
`Onty when the fink information of the holder
`AlDotthePKl'tobeoulputtedalteratearlirrgthe
`TrartsPATcontrnandistormatlydeterm'ned,thePAr
`processingdevicespet:’tiesallthelir:kirttcI'nlatims
`otthemenberAIDs remaining after excludingthe
`linkintohnatior1otthernerrt:aAlDthatissched-
`uledtobeanewholderAlDtromafltheEnkirrtor-
`matiorxsotthenrermer'AlDsotltrePATspeo§‘redby
`thetirstargtrrrrerItofttreTrartsPItl’corrIhar1dar1d
`tt-rerrrrl<irltorn1aticrIsotthememberAlDsottt-rePAl’
`aJeciliedbyttnewondarvgurrra'ttestl'refir1kir1tor-
`naticnsotthemenberAlDsotlhePATtobeout—
`pirttedatterexeoutingthaTrar'IsPATcon1rnand.
`TheveriflcaliorrotttreproperrressotttreErta-
`bler in this sarenth embodiment is the same as
`desa'i)edabowawitttreier'e1cetnFig.24.Also.this
`veriticafionotthepnpernessotttreEnabIer'iscon1-
`mor1tofl'teMatePlW.lheMergePAT.tf1eSpitPAT
`andlheTra1sPA[
`
`Next. the Qhfll enbotiment at the snail
`[0320]
`access oorttru scheme acconcing to the present ‘twen-
`tion will be @oribed in detaiL
`[0321]
`Irrttiseigtrttterrbofirrrerrtttieoloisghrenby
`a real entail address.
`-
`[0322]
`The PAT ’s an intcrnation comprising two or
`more real email addresseslheholderindex. thevafidity
`period, the transter control flag and the PAT processing
`device identilier (or the identifier ot the PAT processing
`obiectonthenetwork). whichissigned usingaseaet
`keyotthe PATprocessingdevice(orthe Pkrprocessing
`obiect on the network).
`[OQ3]
`Here. one of the real entail addresses is a
`holder email address of this PAT, where the change of
`the information contained inthePATsuchasan adwfion
`of entail azktress to the PAT. a deletion of ermit address
`from the PAT. a change of the validity period in the PAT,
`achangeotthetranstercorrtroltlagvalueinthe PKT.
`etc., can be made by presenting the holder email
`adzlress and an Enabler containing the holder email
`address to the PAT processing device (or the PAT
`processing obiecton the network).
`[0324] On the other hand. the email addresses other
`than the holder email address that are contained in the
`PAT are all member enail addresses. where a change
`
`Petitioner Apple Inc. — Exhibit 1024, p. 3002
`
`Petitioner Apple Inc. - Exhibit 1024, p. 3002
`
`

`
`73
`
`EP0946022A2
`
`74
`
`of the information contained in the PAT cannot be rnade
`even when the member email address and an Enabler
`containing the menber email address are presented to
`the PAT processing delice (or the PAT processing object
`on the network).
`[0325] The holder index is a numerical data for identi-
`fying the holder errail acktress. which is defined to take
`a value 1 when the holder email acflress is a top email
`address in the entail address fist formed from the holder
`email adciess and the member email addreses, a
`value 2 when the holder email address is a second
`email aldressfrornthetqtxafttteerrtailaddresslist. or
`a value n when the holder email address is an n—th email
`address from the top of the errail address list
`[0326] The transfer control flag value is defined totake
`eithero or 1.
`[0327] Theholderemailaddressisdetinedtobeareal
`
`email addresswhid1iswrittenataposrtJon'‘
`spedied by
`the holder index in the email arklress list The member
`email addresses are ‘defined to be all
`the email
`addresses other than the holder email address.
`[0328]
`The validity period is defined by any one or
`oombinatior1otlhenuntberoltimeslorwlid1thePATis
`available. the absolute time (UTC) by which the PAT
`becomes unavailable.'the absolute time (UTC) by which
`the PAT becomes available. and the relative time (life-
`time) since the PAT becomes available until it becomes
`unavailatie.
`
`[0329] The identifier olthe PAT processing device (or
`thePATprocessing objedmfltenetworlqisdefinedes
`aserial numberotthe PATprocessingdevice(or and‘.is-
`-tinguishedrrarrleottl'lePA‘l'processingobje'r:lontl1e
`network). The secret key oi the PAT processing device
`(orthe Pltrprocessing object on the network) is defined
`to be uniquely corresponéng to the identifier.
`_
`[0330] Also. in this eighth embodiment. an Enabler is
`defined as an identilier corresponrfing to the real email
`- address. The Enabler is an irttonnation comprising a
`character string uniquely indicating that it is an Enabler
`and a real email acklress itself, which is signed using the
`secret key of the PAT processing device or the PAT
`processing object on the network
`[0331] The generation of the PAT in this eighth embod-
`iment is carried out as follows.
`[0332] Here. a directory will be descrbed as an exam-
`ple of the PAT processing rbject on the network The
`directory nnnages the real email address and the dis-
`closed intorrnation of the user in correspondence. and
`outputs the PAT upon receiving the search conditions
`presented from an arbitrary user.
`[0333] The user transnits the real email address and
`the search conditions to the directory. Then, the direc-
`tory acquires all
`the real email acktrmes which
`uniquely correspond to the disclosed inlormation that
`satisfies these search conditions. Then. the directory
`generates a real email artlress list from the real email
`address of the user who presented the search condi-
`tions and all the real errail addresses acquired as a
`
`10
`
`15
`
`25
`
`40
`
`50
`
`55
`
`seardt result Themthedirectoryappendstheholder
`index value. the nfrdity period value. the transter control
`thgvalue.andtl1edisfinguishednameottttedirectory
`tottterealernaiaddtessllstl-‘nafiy.thedirectorysigrts
`theresultingdatarsingasecretlrayafthedlrectnry,
`andtransrrritsitesthePATtothet.lserwhopreset1ted
`thesearchcondtions
`‘
`[0334] Ne:t.theemai|messcontrolinthiseighth
`embodimentistarriedoutastollows.
`[D335] Thesendaspecifieslherealenafladdressof
`the sender in From: line. ant "[PA‘l]@[real danain of
`sender]"inTo:lineofamai!.
`[0336] Thescsaorpiresanmlallreceivedbyan
`MTA(Mesage Trans!erAgent)sud1asSM'l'P(Sin'ple
`MailTrarrslerProtoool),and¢:arriesouttl1eautherrtir:a-
`tionbythefollowingprocedure
`
`(1)ThesignatureotthePRTisverifiedusingthe
`pr.bliclaeyotthePAT.
`_
`WhenthePl-Tlfistoundtohavebeenaltered.
`theerrIailisd'rscardedardtheprocessingistern1i-
`nated
`.
`when the PAT is found to rave been not
`altered. thetotlowingproceséng (2) is exeaned.
`(2)‘l11esearchis<:arriedoutbypresartingthe
`sender‘srealemailaddrestothePRI’.
`When a real enail addres that completely_
`matr:t1eswitt1tt1eserI1er'srealerrxailarttre$isrlot
`corllairtedirttl1ePA‘|'.theerI1ailisdscardedarldthe
`processingisterrrirated.
`when a rut arw aidress that completely
`matches with thesenders real email address is
`oorrtair'ledirlthePAT.tl1eltlowingprocessing(3)is
`executed
`(8)The\alirityperiodvalueotttlePATisaratuated.
`W'henthePAl'isotnsidethevalidityperiod.the
`email is distarded and the processing is termi-
`nated
`'
`WhenthePAT is withinthevalidityperiod. the
`tollovvingprocr-zssing(4)iserewted.
`(4)Whetherornottoautt1enticatethesenderis
`determined by referring to the transfer control flag
`value of the PAT.
`Whenthevalueist.thechaI|engeIresporrse
`authentication between the S08 and the sender is
`canried out, and the signatureolthe sender is veri-
`tied. Vllhenthesignatureisvafidtherecipientis
`specified and the PAT is attached. when the signa-
`ture is invalid.
`the email
`is discarded and the
`processing is terminated.
`Whenthevalueis0.therec‘pientisspea'fied
`and the PAT is attached withwt erecuting the chal-
`lengelrespmse
`
`[0337] Anexernplary challengdrespcnse authentica-
`tion between the SOS and the sender in this eight
`, embodiment can be carried out as follows
`[0338]
`First, the SOS generates an arbitrary informa-
`
`Petitioner Apple Inc. — Exhibit 1024, p. 3003
`
`Petitioner Apple Inc. - Exhibit 1024, p. 3003
`
`

`
`75
`
`EP0946022A2
`
`76
`
`tionsucl1asatimestarrip.toriaran'ple.er1dtransnits
`the generated intormation to the sender.
`[0339] Then. the sender generates the secret key and
`theptbfickey. signsthereoeived information usingthe
`secretkey, ardtransmitsitalongwiththepublickey.
`[0310]
`The SCS then verifies the signatue of the
`received information using the public key presented
`from the sender. When the sigrature is valid. the recipi-
`ent is spedfied ard the PAT is attached When the sig-
`nature is invalid.
`the errnil
`is disrarded and the
`processing is terminated.
`[0341] The specifying of the recipient and the attach-
`ing at the PAT atthe SCS in this eighth anbodiment can
`be carried out as tollows.
`[0342]
`First, the SCS carries out the search by pre-
`sentingthesendersreal email addresstothePAT,soas
`toacquireallthereal email addresseswhichdonot
`oonpletely match the senders real anail address.
`Then, all these acquired real errail addresses are spec-
`ified as recipient‘: real email addresses.
`[0343] Next. the SCS attaches the PATto an arbitrary
`positionintheemaiiin ordertotransmitthe PATtoall
`the recipient's email addressessoastobeableto reat-
`ize the bidirectional communications Finafly. the SOS
`gives the email to the MTA
`[0344] The receiving refusal with respect tothe PAT at
`the SCS in this eighth embodiment can be carried out
`as follows.
`
`Receiving refusal setting: The bidirectional
`[0345]
`authenticationiscarriedoutbyarlarbilrarymeans
`betweentheuserandtheSCS5.Then,theusertrans-
`mits a registration command. his/her own real email
`addrem. and arbitrary PATs to the SCS 5. Then. the
`SCS 5 next verifies the signature at each received PAT
`using a public key of the ADS. Those PATs with the
`invalid signature are discarded by the SCS 5. When the
`signature is valid. the SCS 5 carries out the search by
`presenting the received real entail address to each PAT.
`For each at those PATs which contain the real email
`address that completely matches with the received real
`email address. the SOS 5 presents the registration com-
`mandandthe PATtothe storagedevicesucmhatthe
`PAT is registered into the storage device. Those PATs
`whidi do not contain the real email address that com-
`pletely matches with the received real email address
`are discarded by the SCS 5 without storing them into
`the storage device.
`[0346] Receiving refusal execution: The SCS 5 carries
`out the search by presenting the PAT to the storage
`device. when a PAT that oonpletely matches the pre-
`sented PAT is registered in the storage device. the mail
`is discarded. When a PAT that completely matches the
`presem PAT is not registered in the storage device. the
`mail is not discarded.
`
`Receiving refusal cancellation: The bidirec-
`[0347]
`tional authentication is carried out by an arbitrary
`means between the user and the SCS 5. Then. the user
`presents his/her own real email address to the SOS 5.
`
`Then.lheSCS5r1extpresentsthepresentedrealernail
`acktressasaseardiconcitiontottiestoragedeviceand
`acquire all the PATs that contain the presented real
`email addre$.andlhen rresettsallthe amuired PATs
`totheuser.Then.theuserselectsal|thePATstorvvhid'i
`thereceivingretusalistobe%etledbyreterringtoalI
`thePATspresentedlromtheSCS5.andtransrnitsall
`theselectedPATsalor1gwitt'Iadetetioncomrrandtothe
`Scsslhonreoeivingthedeletionoonmaridandall
`thePKI'storwl1id1tl1ereceiving rettsalistobecan
`celled,theSCS5presentsthedeletioncommandand
`all the PATs received truth the user to the storage
`derioesuohthatallthereceived PATsare cleletedtrom
`thestoragedevice.
`[0348] TheeditirigotthePATinthiseightherrbodi-
`mentrztnbemrriedoutastollows
`
`‘lheMakePA‘|'.theMergePRl'. the SptitPKl'.and
`[0349]
`theTrer1sPK|'processir1gsft:thePATusingrealen1ail
`addressesasitselementscanbeotiainedtromthethe
`MakePAT, the MergePAT.theSplitPAT.andtheTransPIu'
`proceshgs for the PAT t5'ng Alfls as its elements
`dscrbedabove.byrqb.cingtheAlDbythereaternail
`addressarIdlheEnabterolAlDbytheErtablerotrea|
`ermfladdres.
`a
`[0350] ANullqJe'atorisanintorrnahon‘ corrpnsrng‘'
`
`datawhictiisuriiqoelyirlrfitztir'igtltatitisNullar1dwhid1
`hasatornutottt1ereala1iaiad1iros.whid1issigned
`bythesecret|reyotthePKTprocessingdeviceorthe
`PATpi-ocessinadaiedorttheneturork
`[0351]
`S'¢rilarty.theGodoperatorisanintorna6ori
`oorr1prisingadahvmid1isur&}uelyir‘Idicati'tgtlBtitis
`GodarI1whid1l~matorrnatottt'ierealen'aila::lrtess.
`whichissignedbytheseaetkeyottheB$l'procesing
`derricerxthefitfgxooessirngwjedorittnertetwortc
`[0352] TheErrablerotN1£operatoI'isanir1torme.tior1
`composing" adatawhrch' isuniquely irIo’rcatmg' thatitis
`EndJterandtheNuiIrx>erattxitsell.vvhir:hissignedtry
`thesecretkeyotthePATprocessingdeviceorthePAT
`proce$ingobiectonthenetworK
`[0358]
`The processings involving the Nul operator
`ardthefiodoperatorcanbeobtainedtromthe
`processingsforthePAT isingAlDsasitselements
`desa'ibedabove_byredaa'rI_;]theAlDbytherealeI1tail
`address.'the EnablerotAlD bythe Enabler of real email
`address. the Null-AlDbythe Null operator.theGod-AID
`by the God operator. and the Enabler of Null-AID by the
`Enabler ot Null operator.
`[0354] As described, according to the present inven-
`tion,aPATisusedforverityingtheacoessrightofa
`sender and the email access control among users is
`caniedoutwhen the verification resultisvalidsothatit
`becomes possible to disclose the information indicative
`of characteristics of a user while concealing the true
`identification of a user and canying out communications
`appropriatety according to this disclosed intorrmtion
`while preventing conventionally possible attacl-6 from a
`third person. In adtition. even when a recipient receives
`an attack from a sender who maliciously utilizes the
`
`10
`
`15
`
`50
`
`39
`
`Petitioner Apple Inc. — Exhibit 1024, p. 3004
`
`Petitioner Apple Inc. - Exhibit 1024, p. 3004
`
`

`
`77
`
`A
`
`EPO946022A2
`
`'
`
`7e
`
`anonymity. chrnages at a recipient due to that attack
`can be minimized.
`
`, Also, amording to the present invention,_the
`[0355]
`generation and the content change of the pasonalized
`aocastidcetcanbemadebytheinitiativeotauserby
`using an AID asdgned to each user and an Enabler
`defined in correspondence to the AID, so that
`it
`becomes possble to appropriately nnnage information
`suchasthalotapointoicontactoleach merrberotthe
`group communication (mailing list. etc.) which changes
`dynarnically.
`[0356] Also, according tothe present invention. a Null-
`AID and an Erabler of Null-AID can be introduced in
`ordertorarryoutthegenerationofanew PAT(Make-
`PAT) and the merging at PATs (MergePAT) without giv-
`ing the merrber AlD and the Enabler afthe member AID
`tothe holderotlhe PAT. sothatitbeoomespossbleto
`prevent the pretending using the member AID.
`[0357]
`Also, acmrding to the present invention. the
`Null-AID can be used only as the holder AID of the PAT
`(the Null—A|D cannot be used as the merrber AID), that
`S
`A‘Dmel.n&n,
`' ' ' ' ‘ ‘ ‘ ‘ _
`AlDme,m,9,N > is allowed. but PAT<AlDhdde,
`| AIDNM.
`AlD,mm,,.,1. AlD,,,,,,,,,,,g.
`' ’ ‘ ‘ ‘ ‘ ’ ‘.
`>
`is not allowai, so thatthe holder oi PAT<AID,.,.de, | AID-
`member
`cannot pl'xIJC€
`PAT<AiDN|_m 1
`>
`from this PAT<Aroh,,.,,,, 1 Ain,,,,,,,,,e, > as long as the
`holderdoesnotknow EnablerurArD,m,,,,
`[0358]
`Also. according to the present invention, a
`.God~AlDcanbeirrtroducedinordertosetuparead
`onlyattributetothe PAl',sotha1itbeoomespossbleto
`tbrthepartioipantsinthegroupcommunication.
`[0359]
`Also, according to the present invention. the
`link information for uniquely specifying the 'AlD can be
`introduced and the PAT can be given in terms of the link
`information such that the PAT does not contain the AID
`itself. sotlat itbecomespossibleto realizethe receiving
`refusal function without using the AID itself.
`[0360]
`it is to be noted that. besides those already
`mentioned above, many modifications and variations at
`theabove ernbodimentsmeybemadewithoutdepart-
`ingtromthenovelandadvantageousfeaturesofthe
`present invention. Accordingly, all such modifications
`and variations are intended to be included within the
`scope of the appended claims.
`
`Claims
`
`1. A method of email access control, comprising the
`steps of:
`
`receiving a personalized access ticket contain-
`ing a sender's identification and a rec‘pient’s
`identification in correspordence. which is pre-
`serttedbyasertderwhowishestoserdan
`anail to a recipient so as to specify the recipi-
`ent as an intended destination ofthe entail, at a
`sewre communication service tor connecting
`
`communications betweenthe senderand the
`receivenand
`controllirg aoceses between the sender and
`therecipientbyverifyinganacoessrightotthe
`senderwith respecttothe reobient accorfitg
`tothepersonalizedacoesstickelatthesecure
`
`10
`
`15
`
`20
`
`35
`
`2. The method of claim 1, wheein at the contmllmg
`step the secure communiratbn service authenti-
`cates the personalized access ticket presented by
`l.’nesender.andre!usesadeliveryottheemail
`when the persoralized access ticket presented by
`the sender has been altered.
`
`3. Themettrodotdaimzwtiereinflwepersortafized
`accessticketissignedbyasecretkeyofasecure
`processing devicewhich issuedthepersonalized
`aocessticlcet.arIdattt1ecor1trolfirrgstepthesecure
`
`izedacoesstidtetbyverilyirigasigrtatttreottlie
`secure processing device it
`the personalized
`aocessticketusingaputalickeyotthasecure
`prooessingdevice.
`
`4. Themethodotclaimtwhereinatthereceiving
`step the secure communication service also
`reca'vesthesender‘sider:t§icaticnpresentedby
`thesenderalorrgvn'ttrthapersmafzedaoces
`tioket.andattt'iecorItrottingstq3theseourecom-
`rrunimtionservioe::t1eds\vl1ethea'theserIder‘s
`idea'ttificafi<:rtpreser1tedbyttIeseru$eriscornair1ed
`inthepersoralizedaocestidretpresentedbythe
`senda.andrdusesadeliveryottheana'lwtIer1
`thesendersideritifxztimpreseiatedbythesender
`isnotcontainedinthe-personatizedaccesslicket
`presentedbythesender.
`
`5. The method ot claim 1. wherein the personalized
`axx:essticketalsocontainsavalirfrtyperiodindicat-
`ingaperiodtorwhidithepersonalizedaocess
`ticlcetisvalid.andatthecor1tmliir1gsteptl'resecure
`cormrunirzztion service draws the vafioity period
`contained in he personaized access ticket pre-
`sentedbythesenderendretusesadeliveryofthe
`email when the persoralized aoce§ ticket pre-
`-serrtedbythesenderoontainstheiralidityperiod
`thathes alreedybeen expired.
`
`6. The methodofclairns. wherein the validity period
`otthepersonalizedacoessfidretissetbyatnrsted
`third party.
`
`55
`
`7. The method of claim 1. turther comprising the step
`of:
`
`issuing the personalized access ticket to the
`sender at a directory service tor managing an
`
`Petitioner Apple Inc. — Exnhibit 1024, p. 3005
`
`Petitioner Apple Inc. - Exhibit 1024, p. 3005
`
`

`
`79
`
`EP094-6022A2
`
`80
`
`Airterrtificationofeacttregistrarttartdacfiwosed
`irrformatiortofeachregistrarttwlrichhasa
`tower secrecy thanapersonatinformation, ina
`state which is accessibtetor search by unspec-
`ilied many.
`in response to search conditions
`specified by the sender. by using an identifica-
`tion of a registrant whose disclosed information
`matches the search conditions as the recipi-
`ent's identification and the senda‘s identifica-
`tion specified by the sender along with the
`search
`-
`
`Themethodotctairn1,furthercorrtprisingthestqr
`of:
`
`registering in advance the personalized awess
`ticket containing an identification of a saecitic
`userfrornwhichadeliveryotenaflstoas>e-
`citic registrant is to be refused as the sender's
`identification and an
`of the spe
`citic registrant as the recipients 'rder1tification,
`at the secure communication service;
`whereinthecontnotling stepthesecurecom
`munication service refuses a delivery at the
`errail from the sender when the personalized
`access ticket presented by the sender is regis-
`tered therein in advance atthe registering step
`
`The rnethodot claim 8. further comprising the step
`at
`
`deleting the personalized access ticket regis-
`tered at the secure corrmunication service
`upon request from the specific reg'strant who
`registered the personalized access ticket at the
`registering step.
`
`10. The method of ctaim 1. wherein the personalized
`ewess ticket also contains a transfer control flag
`indicatfing whether or not the sender shoutd be
`authenticated by the secure communication serv-
`ice. and at the controlling step. when the transfer ~
`control flag contained in the personalized access
`ticket indicates that the sender should be authenti-
`cated. the secure communication service authenti-
`cates the sender's identification presented by the
`sender and refuses a defrveryot the ermit when an
`authentication of the sender's
`fails.
`
`11.
`
`12.
`
`The method at claim 10, wherein the authentication
`of the sender's identification is realized by a chat-
`lengelresponse procedure between the sender and
`the secure communication service.
`
`The method of claim ‘to, wherein the transfer con-
`trol flag of the personalized access ticket is set by a
`trusted thirdparty.
`
`13.
`
`14.
`
`I0
`
`15
`
`15.
`
`Themethodofctaim1,whaeinthesender’s‘ztenti-
`flca1ionahdthereoipiertt’sideI'ttit'tw1ionintt'teper-
`somlized access tidtet are given by real email
`addreaesotthesenderandtherecipient
`
`Themev1odofdaim1,whereirrthesender‘sider1ti-
`ticatior1arrdtt'rerea‘pienfsidartrtix2tionintheper-
`sonalizedaccessticketaregivenbyanorrymous
`identifications of the sender and the redpierrt.
`wt-:e'eanerIonyrnousiderrtiTrr2tjortoteadrr.iser'
`oorrtainsatIeastonefragmerItofanotficialidentiti-
`catiorrofeadruserbywhidteachuserisuniquely
`iderttifiable'byacertifir:ationauthority.
`
`The method ct claim 14, wherein the anonymous
`iderrtificafiar1otead1rser'sartinfornatiortoontain-
`ingtheatleastonetragmentoftheoffia'aJidentiti-
`cation of each user which is signed by the
`oertifi<zti<x1auttu:rityusirtgase¢:retkeyoftttecer-
`
`16.
`
`1 7.
`
`Themethodotctaim 14,whereintheotfidal identi-
`frtztiortotaact1trserisact'aracter'stringu1iquety
`a$igrtedtoear:trLserbythece‘tifx:atior1euthority
`at-ztaputlictreyoteadtusawhichar'es‘gr1edbya
`secretlaeyofthecertifuationaufhority.
`
`Themethodofctaimt4,furthacorrprisingthestq)
`of:
`
`an identity at the
`prdaabitistirally
`senderbyreconstmctingtheotficial identifia-
`tiortottl'eserI$erbyir.rdgirtgidentityofeptr.n-al-
`itydautyrrursderetsotthesertder
`containedinaptualityotpersonaEzedacce$
`tidcetsusedbythesenda.
`
`18.
`
`Themettndotctaimt,whereina.nanonymous
`_iderttificatior1oteacturserthatconta.insatIeastor1e
`fragmentotanotfrcial identiticationofeach Lserby
`which each user is uniqudy identithble by a certifi-
`cationeuthorityandalinkirrforrmtionofeech
`anonymous identification by which each anony-
`mous
`tan be uniquely identified are
`defined. and the senders identification and the
`recipient's identification in the personalized access
`ticketaregivenbyalinkintormationotthe anony-
`mous identification at the sender and a link informa-
`tion of the anonymous identification of the redpient
`
`19.
`
`The method of claim 1. wherein the link information
`of each anonymous identification is an iderrttfier
`uniquely assigned to each anonymous identifica-
`tion by the certification authority.
`
`20. The method of ctairn 18. further comprising the step
`of:
`
`41
`
`Petitioner Apple Inc. — Exhibit 1024, p. 3006
`
`Petitioner Apple Inc. - Exhibit 1024, p. 3006
`
`

`
`81
`
`EP0946022A2
`
`82
`
`alizedaccessticlets..adiangingotthehot:le.roi
`tl1epersonarizedaocesstictcet.d'rangingotavalid-
`ityperiodotthepersonalizedaocessfidcet.anda
`changingotatranstercorrh'olflagolthepersonal-
`izedacoessticket.
`
`Themethodotdaim26.vohereinaspecialidertfiti—
`rationarrdaspecialeriatnieroorrespondirrgtottie
`specialidentificafionwhidiareknowntoallusers
`aredefnedsudittntthegewerationotanewper-'
`sonalized access ticket and the changing of the
`hotderotthepersona§zeda<:cesstici<etranbecar-
`riedoutbytheholdaotthepersonalizedaccess
`ticketbyusingthespecialidentificationandthe
`specialerrab|erwitlioutus'nganenahlerotamern-
`
`10
`
`15
`
`p
`
`robabilistically identifying an" identity of the
`sender by reconstructing the otticial identifia-
`tion 01 the sender by judging identity ot a plural-
`ityofanonymous identifirntionsolthe sander
`corresponding to the link information contained
`in a plurality oi personalized access tickets
`used by the sender.
`
`21.
`
`The method oi claim 1, wherein the personalized
`access ticket contains a single senders identifica-
`tion and a single recipient's identification in 1-to-1
`conespondeme.
`
`22 The method ol claim 1, wherein the personalized
`access ticket wntains a single sender's identr'fica—
`tion am a plurality of recipient's iderrtiticatiorrs in 1-
`to-N correspondence. where N is an integer greater
`than 1.
`
`23. The method olclaimzz. wherein one
`among the single satders identilication and the
`plurality at recipient's identilirations is a holder
`identificationforidentifying ahdderottttepersorak
`ized access ticket while other identifications among
`the single senders iieritiiirzlion art! the plurality of
`recipients identifirations are member identifica-
`tiorisioriderrtiiyingmerrrbersofagrouptowhich
`the holder belongs
`
`24. The method of claim 23. further comprising the step
`of.
`
`issuing an identification or each user and an
`embieroftheir.terttificatior1oteachuserirtdi-
`eating a -right to orange the personalized
`access ticket containing the identification of
`each useras the holder identification, to each
`
`user at a certification authority,‘such that pre-
`scribed processing at the personalized access .
`ticketcan be carried outat a secure processing
`deviceonlybyauserwhopresented boththe
`holder identification contained in the personal-
`ized access ticket am the enabler wrreswd
`ing to the holder identification to the secure
`processing device.
`
`45
`
`25. The method at claim 24. wherein the certification
`authority issues the enabler oi the identification of
`each user

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket