throbber
Apollo Fellow, Apollo Computer/Hewlett-Packard, Chelmsford, MA
`
`Senior Research Engineer, Prime Computer, Framingham, MA
`
`Member, Adjunct Faculty, Boston University, 1979-80
`
`Undergraduate work at the Massachusetts Institute of Technology, Cambridge, MA
`Undergraduate work at the Massachusetts Institute of Technology, Cambridge, MA
`
`Distinguished Engineer, Microsoft Corporation, Seattle, WA
`
`Systems Programmer, Applicon, Burlington, MA
`Systems Programmer, Zurich American Insurance, Chicago, IL
`Systems Programmer, Datalogics, Chicago, IL
`
`Affiliate Professor, University of Washington Department of Computer Science
`
`Paul J. Leach
`
`Personal
`Born in Seattle, Washington, November 13, 1951.
`Married, no children.
`
`Education
`1969-1972
`1977-1978
`
`Employment
`1991-2012
`
`1980-1991
`
`1977-1980
`
`1972-1977
`
`
`
`
`
`
`1992-present
`
`1979-1980
`
`Research Interests
`
`Computer systems: operating systems, distributed systems, communications, security.
`
`Major Professional Activities
`
`Member of the Program Committee, 4th ACM Conference on Principles of Distributed Computing, August 1985
`
`Member of the Program Committee, ACM Workshop on Accommodating Heterogeneity, December 1985
`
`Program Chair, IEEE Workshop on Large Grained Parallelism, October, 1986
`
`Member of the Program Committee, 5th ACM Conference on Principles of Distributed Computing, August 1986
`
`Member of the Program Committee, IEEE Workshop on Workstation Operating Systems I, 1988
`
`Member of the Program Committee, IEEE Workshop on Workstation Operating Systems II, 1989
`
`Member of the Program Committee, 13th ACM Symposium on Operating System Principles, October 1991
`
`
`
`Member of the Program Committee, 14th ACM Symposium on Operating System Principles, October 1993
`
`Member of the Program Committee, First Symposium on Operating Systems Design and Implementation (OSDI),
`November, 1994
`
`Member of the Program Committee, Fifth Workshop on Hot Topics in Operating Systems (HotOS-V), May, 1995
`
`Member of the Program Committee, USENIX Conference on Object-Oriented Technologies (COOTS), June, 1995
`
`Google Inc.
`GOOG 1006
`IPR of U.S. Patent No. 6,286,045
`
`1
`
`

`
`Paul J. Leach
`
`2
`
`January, 2015
`
`
`Member of the Program Committee, First International Conference on Mobile Computing and Networking
`(MobiCom), November, 1995
`
`Program Co-Chair, Third Symposium on Operating Systems Design and Implementation (OSDI), February, 1999
`
`Member of the Program Committee, Usenix Annual Technical Conference (ATC), June, 2013
`
`Other Professional Activities, 1980-present
`
`Invited participant, Second ACM SIGOPS European Workshop on Distributed Computing, Amsterdam, 1986
`
`Invited participant, 4th Workshop on Berkeley Unix, September, 1987
`
`Invited participant, Workshop on Nationwide File Systems, Carnegie Mellon University, Pittsburgh, PA, 1988
`
`Invited participant, Sixth ACM SIGOPS European Workshop, Dagstuhl Castle, Germany, September 1994
`
`Invited participant, Seventh ACM SIGOPS European Workshop, Connemara, Ireland, September 1996
`
`Invited participant, Sixth Workshop on Hot Topics in Operating Systems, Cape Cod, MA, 1997
`
`Referee for IEEE Computer.
`
`Member of the Association for Computing Machinery.
`
`Member of the Institute of Electrical and Electronics Engineers.
`
`Treasurer, ACM Special Interest Group on Operating Systems (SIGOPS), 1997-1999
`
`Courses Taught
`
`CS 430, Operating Systems, Boston University, 1979-80.
`
`Publications
`
`Leach, P. J., Levine, P.H., Douros, B. D., Hamilton, J. A., Nelson, D. L., Stumpf, B.L.,
`"The Architecture of an Integrated Local Network,"
`IEEE Journal on Selected Areas in Communications,
`v.SAC-1, n.5, Nov. 1983, pp. 842-857.
`
`Nelson, D. L., Leach, P. J.,
`"The Architecture and Applications of the Apollo Domain,"
`IEEE Computer Graphics and Applications,
`April, 1984, pp. 58-66.
`
`Leach, P. J.,
`"The Whys and Wherefores of Distributed Resource Sharing,"
`UNIX Review,
`May 1985.
`
`Leach, P. J., Levine, P.H., Hamilton, J. A., Stumpf, B.L.,
`"The File System of an Integrated Local Network,"
`in Proceedings ACM Computer Science Conference,
`New Orleans, LA, March 13-15, 1985.
`
`

`
`Paul J. Leach
`
`3
`
`January, 2015
`
`
`Michael B. Jones, Paul J. Leach, Richard P. Draves, Joseph S. Barrera, III.
`“Modular Real-Time Resource Management in the Rialto Operating System,”
` in Proceedings of the Fifth Workshop on Hot Topics in Operating Systems,
`Orcas Island, WA, May, 1995.
`
`Michael B. Jones, Joseph S. Barrera III, Alessandro Forin, Paul J. Leach, Daniela la Rosu, and Marcel-Catalin Rosu,
`“An Overview of the Rialto Real-Time Architecture,”
`in Proceedings of the Seventh ACM SIGOPS European Workshop,
`Connemara, Ireland, September 1996.
`
`P. Leach and C. Wieder,
`“Query routing: Applying systems thinking to Internet search,”
`in Proceedings of the Sixth Workshop on Hot Topics in Operating Systems,
`Cape Cod, MA, 1997
`
`J. Franks, P. Hallam-Baker, J. Hostetler, P. Leach, A. Luotonen, E. Sink, L. Stewart,
`An Extension to HTTP : Digest Access Authentication,
`RFC 2029, January 1997
`
`J. Mogul, P. Leach,
`Simple Hit-Metering and Usage-Limiting for HTTP,
`RFC 2227, January 1997
`
`Roy T. Fielding, James Gettys, Jeffrey C. Mogul, Henrik Frystyk Nielsen, Larry Masinter, Paul J. Leach, and Tim
`Berners-Lee,
`Hypertext Transfer Protocol---HTTP/1.1,
`RFC 2616, June 1999.
`
`J. Franks, P. Hallam-Baker, J. Hostetler, S. Lawrence, P. Leach, A. Luotonen, L. Stewart,
`HTTP Authentication: Basic and Digest Access Authentication
`RFC 2617, June 1999
`
`J. Allen, P. Leach, R. Hedberg,
`CIP Transport Protocols
`RFC 2653, August 1999
`
`H. Nielsen, P. Leach, S. Lawrence,
`An HTTP Extension Framework,
`RFC 2774, February 2000
`
`P. Leach, C. Newman,
`Using Digest Authentication as a SASL Mechanism,
`RFC 2831, May 2000
`
`P. Leach, M. Mealing, R. Salz
`A Universally Unique IDentifier (UUID) URN Namespace
`RFC 4122, July 2005
`
`L. Zhu, P. Leach, K. Jaganathan, W. Ingersoll
`The Simple and Protected Generic Security Service Application Program Interface (GSS-API) Negotiation
`Mechanism
`RFC 4178, Octoiber 2005
`
`L. Zhu, P. Leach, K. Jaganathan
`
`

`
`Paul J. Leach
`
`4
`
`January, 2015
`
`Kerberos Cryptosystem Negotiation Extension
`RFC 4537, June 2006
`
`L. Zhu, P. Leach, S. Hartman
`Anonymity Support for Kerberos
`RFC 6112, April 2011
`
`Books, Pamphlets, and Invited Papers
`
`Zahn, Lisa; Dineen, T. H., Leach, P. J., Martin, E. A., Mishkin, N. W., Pato, J. N., Wyant, G. L.,
`Network Computing Architecture
`Prentice-Hall, 1990
`ISBN 0-13-611674-4
`
`Kong, Mike; Dineen, T. H., Leach, P. J., Martin, E. A., Mishkin, N. W., Pato, J. N., Wyant, G. L.,
`Network Computing System Reference Manual
`Prentice-Hall, 1990
`ISBN 0-13-617085-4
`
`Fully Refereed
`
`Leach, P. J., Levine, P.H., Hamilton, J. A., Stumpf, B.L.,
`"UIDs as Internal Names in a Distributed File System,"
`in Proceedings ACM SIGACT-SIGOPS Symposium on Principles of Distributed Computing,
`Ottawa, Ont., Aug. 18-20, 1982, pp. 34-41.
`
`Michael B. Jones, Paul J. Leach, Richard P. Draves, and Joseph S. Barrera, III,
`“Support for user-centric modular real-time resource management in the Rialto operating system,”
`In Proceedings of NOSSDAV '95, April 1995.
`
`Refereed
`
`Rees, J., Levine, P. H., Mishkin, N., Leach, P. J.,
`"An Extensible I/O System,"
`in Proceedings of the Usenix Association Summer Conference, Atlanta, Ga., June 1986.
`
`Dineen, T. H., Leach, P. J., Mishkin, N. W., Pato, J. N., Wyant, G. L.,
`"The Network Computing Architecture and System: an Environment for Developing Distributed Applications,"
` In Proceedings of the Usenix Association Summer Conference, June 1987.
`
`Leach, Paul J,. et. al.,
`“A Conceptual Authorization Model for Web Services,”
`In Computer Systems: Theory, Technology, and Applications, Springer-Verlag, New York, 2004.
`
`Patents
`
`5,511,197
`5,710,925
`5,802,367
`5,812,844
`scheduling
`
`5,968,121
`5,991,306
`
`Method and system for network marshalling of interface pointers for remote procedure calls
`Method and system for aggregating objects
`Method and system for transparently executing code using a surrogate process
`Method and system for scheduling the execution of threads using optional time-specific
`
`constraints
`Method and apparatus for representing and applying network topological data
`Pull based, intelligent caching system and method for delivering data over a network
`
`

`
`Paul J. Leach
`
`5
`
`January, 2015
`
`6,003,061
`
`6,108,715
`6,275,496
`6,282,561
`
`6,298,373
`6,324,182
`6,374,253
`6,401,211
`6,405,262
`6,490,589
`6,823,369
`6,892,230
`
`6,985,958
`7,062,539
`7,130,895
`7,136,859
`7,185,359
`7,251,822
`7,284,271
`7,302,634
`7,305,548
`7,308,709
`7,382,883
`7,383,586
`7,434,253
`7,441,019
`7,487,230
`7,543,333
`7,558,846
`7,571,438
`
`7,602,756
`7,617,522
`7,644,275
`7,664,724
`7,752,431
`7,752,442
`7,757,275
`7,757,281
`7,779,265
`7,802,294
`7,809,938
`7,810,153
`7,882,539
`
`7,900,257
`7,913,084
`7,971,230
`8,006,295
`8,117,666
`8,132,246
`8,214,641
`8,225,390
`
`Method and system for scheduling the use of a computer system resource using a resource planner
`and a resource provider
`Method and system for invoking remote procedure calls
`Content provider for pull based intelligent caching system
`Method and system for resource management with independent real-time applications on a
`common set of machines
`Local service provider for pull based intelligent caching system
`Pull based, intelligent caching system and method
`System and method for generating hierarchical forward knowledge
`System and method of user logon in combination with user authentication for network access
`Efficient inter-process object and interface pinging
`System and method for rewriting queries
`Using state information in requests that are transmitted in a distributed network environment
`Dynamic self-configuration for ad hoc peer networking using mark-up language formatted
`description messages
`Messaging infrastructure for identity-centric data access
`Using state information in a distributed environment
`XML-based language description for controlled devices
`Accessing heterogeneous data in a standardized manner
`Authentication and authorization across autonomous network systems
`System and methods providing enhanced security model
`Authorizing a requesting entity to operate upon data structures
`Schema-based services for identity-based data access
`Using atomic messaging to increase the security of transferring data across a network
`System and method for managing and authenticating services via service principal names
`Deriving a symmetric key from an asymmetric key for file encryption or decryption
`File system operation and digital rights management (DRM)
`User mapping information extension for protocols
`XML-based template language for devices and services
`Dynamic self-configuration for AD HOC peer networking
`Enhanced computer intrusion detection methods and systems
`Dynamic self-configuration for ad hoc peer networking
`Method and system for resource management with independent real-time applications on a
`common set of machines
`Dynamic self-configuration for ad hoc peer networking
`Authentication and authorization across autonomous network systems
`Pass-thru for client authentication
`Schema-based services for identity-based data access
`Virtual distributed security system
`Virtual distributed security system
`One time password integration with Kerberos
`Privilege restriction enforcement in a distributed system
`Access control list inheritance thru object(s)
`Controlling computer applications' access to data
`Virtual distributed security system
`Controlling execution of computer applications
`Abstracting security policy from, and transforming to, native representations of access check
`mechanisms
`Enhanced computer intrusion detection methods and systems
`Policy driven, credential delegation for single sign on and secure access to network resources
`System and methods providing enhanced security model
`Domain ID service
`File system operation and digital rights management (DRM)
`Kerberos ticket virtualization for network load balancers
`File access in multi-protocol environment
`Licensing protected content to application sets
`
`

`
`Paul J. Leach
`
`6
`
`January, 2015
`
`Method and system for controlling access privileges for trusted network nodes
`Predictive HTTP authentication mode negotiation
`Virtual distributed security system
`Translating role-based access control policy to resource authorization policy
`Resource access based on multiple scope levels
`Transformation of sequential access control lists utilizing certificates
`Fast-reconnection of negotiable authentication network clients
`Selective authorization based on authentication input attributes
`PassThru for client authentication
`Distributed computer systems with time-dependent credentials
`File system operation and digital rights management (DRM)
`Testing access policies
`Reputation checking of executable programs
`
`8,230,485
`8,266,680
`8,302,149
`8,381,306
`8,464,319
`8,468,579
`8,555,069
`8,621,561
`8,627,440
`8,640,210
`8,640,256
`8,813,170
`8,863,291
`
`
`Invited Panel Memberships, 1980-present
`
`Fifth International World Wide Web Conference.
`Panel Session: Distributed Object Technology and the Web.
`Paris, France, May, 1996
`
`First USENIX Symposium on Operating Systems Design and Implementation (OSDI)
`Panel Session: Radical Operating Systems Structures for Extensibility.
`Monterey, California, November, 1994.
`
`15th International Conference on Distributed Computing Systems.
`Panel Session: Distributed Computing in 2010.
`Vancouver, British Columbia, Canada, May 30 - June 2, 1995
`
`Invited Presentations, 1980-present
`
`"The File System of an Integrated Local Network",
`Department of Computer Science,
`University of Washington, April, 1986.
`
`"Research Directions in Distributed Computing at Apollo",
`Department of Computer Science,
`Yale University, 1986.
`
`"An Extensible I/O System",
`Digital Equipment Corporation Systems Research Center, 1986.
`
`"The Network Computing System"
`Tutorial, Usenix Association Winter Conference, January, 1989
`
`"Beyond RPC: Making Distributed Applications Still Easier",
`IBM Hawthorne Research Labs, 1989
`
`"The Network Computing System"
`Tutorial, Usenix Association Summer Conference, June, 1989
`
`"An Overview of the OSF Distributed Computing Environment",
`Department of Computer Science,
`University of Washington, 1990.
`
`
`

`
`Paul J. Leach
`
`7
`
`January, 2015
`
`"The Network Computing System RPC"
`MIT Lab for Computer Science, 1990
`
`"Comparing RPC Systems",
`Interop '90, September, 1990.
`
`"The Network Computing System"
`Tutorial, Usenix Association Winter Conference, January, 1991
`
`"The Network Computing System"
`Tutorial, Usenix Association Summer Conference, June, 1991

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket