throbber
INFORMATION TO USERS
`
`This manuscript has been reproduced from the microfilm master. UMI
`films the text directly from the original or copy submitted. Urns, some
`thesis and dissertation copies are in typewriter face, while others may
`be from any type of computer printer.
`
`The quality of this reproduction Is dependent upon the quality of the
`copy submitted. Broken or indistinct print, colored or poor quality
`illustrations and photographs, print bleedthrough, substandard margins,
`and improper alignment can adversely affect reproduction.
`
`In the unlikely event that the author did not send UMI a complete
`manuscript and there are missing pages, these will be noted. Also, if
`unauthorized copyright material had to be removed, a note will indicate
`the deletion.
`
`Oversize materials (e.g^ maps, drawings, charts) are reproduced by
`sectioning the original, beginning at the upper left-hand comer and
`continuing from left to right in equal sections with small overlaps. Each
`original is also photographed in one exposure and is included in
`reduced form at the back of the book.
`
`Photographs included in the original manuscript have been reproduced
`xerographically in this copy. Higher quality 6" x 9" black and white
`photographic prints are available for any photographs or illustrations
`appearing in this copy for an additional charge. Contact UMI directly
`to order.
`
`A Bell & Howell information Company
`300 North Zeeb Road. Ann Arbor. Ml 48106-1346 USA
`313/761-4700 800/521-0600
`
`Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
`
`IBM-1008
`Page 1 of 191
`
`

`
`Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
`
`IBM-1008
`Page 2 of 191
`
`

`
`A COMMON APPROACH TO EXTENDING COMPUTER SECURITY
`
`CONCEPTS TO THE UNIVERSAL DISTRIBUTED
`
`NON-TRUSTED ENVIRONMENT
`
`A Praxis Presented to the Graduate Faculty of the
`
`School of Engineering and Applied Science
`
`Southern Methodist University
`
`in
`
`Partial Fulfillment of the Requirements
`
`for the degree of
`
`Doctor of Engineering
`
`with a
`
`Major in Electrical Engineering
`
`by
`
`Richard Dan Herschaft
`
`(B.S.E.E., The University of Texas at Arlington, 1984)
`(M .S.E.E., Southern Methodist University, 1986)
`
`December 17, 1994
`
`Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
`
`IBM-1008
`Page 3 of 191
`
`

`
`OMI Number: 9527269
`
`Copyright 1994 by
`Herschaft, Richard Dan
`All rights reserved.
`
`UMI Microform 9527269
`Copyright 1995, by OMI Company. All rights reserved.
`This microform edition is protected against unauthorized
`copying under Title 17, United States Code.
`
`UMI
`300 North Zeeb Road
`Ann Arbor, MI 48103
`
`Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
`
`IBM-1008
`Page 4 of 191
`
`

`
`A COMMON APPROACH TO EXTENDING COMPUTER SECURITY
`
`CONCEPTS TO THE UNIVERSAL DISTRIBUTED
`
`NON-TRUSTED ENVIRONMENT
`
`Approved by
`
`Dr I James Geo reef Dunham
`
`Dr. Eric Hall
`
`JL
`
`Dr. Alireza Khotanzad
`
`'^ .c A /y a r^ Lgxr~U/-\0
`Dr. Richard Levine
`
`Dr. David'Matula
`
`Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
`
`IBM-1008
`Page 5 of 191
`
`

`
`COPYRIGHT 1994
`
`Richard Dan Herschaft
`
`All Rights Reserved
`
`Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
`
`IBM-1008
`Page 6 of 191
`
`

`
`Herschaft, Richard Dan
`
`B.S.E.E., The University of Texas at Arlington, 1984
`M.S.E.E., Southern Methodist University, 1986
`
`A Common Approach to Extending Computer Security
`Concepts to the Universal Distributed
`Non-Trusted Environment
`
`Advisor: Associate Professor James G. Dunham
`
`Doctor of Engineering degree conferred December 17, 1994
`
`Praxis completed December 15, 1994
`
`Computer security involves internal controls and external controls. As a computer
`
`system grows distributively, the environment in which it exists can become less
`
`trustworthy. Less reliance can thus be placed on external controls, such as locked
`
`rooms. In the extreme, a highly distributed computer system operates on a worldwide
`
`scale. Information transfer exists between users, autonomous to varying degrees, where
`
`the only certain link is some form of communications channel from one user to another.
`
`The term distributed is appropriate since by each computer carrying out its own
`
`information processing needs, society as a whole is able to function.
`
`Although parties involved with information have a self-centered aspect, their
`
`actions result in a communal effort of information generation, where a unit of
`
`information is generated by one party and passed to another for regeneration. This
`
`process can trace out simple to complex paths. Along the way each party has rights in
`
`the information stemming from its role as "author" and user. Concern for these rights
`
`arises from the private or proprietary nature of information. In order for information
`
`transfer to be made efficient, the rights to information should be made a part of the
`
`informational unit, both technically and legally. As information traces its path, each
`
`author can add to the restrictions placed on the use of the information, and each user is
`
`constrained by the system to abide by these restrictions.
`
`iv
`
`Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
`
`IBM-1008
`Page 7 of 191
`
`

`
`This paper describes this universal computer system and devises a secure
`
`framework for it by expanding upon computer security concepts which were previously
`
`devised for a more limited environment. This architecture relies on the internalization
`
`and further systematization of external controls. The computer security concepts that are
`
`extended to work in this environment are the security watchdog, the access control list,
`
`and public key cryptography with its certification authority. Also developed are the
`
`concepts of a tamper proof device, a device validation authority, and the policy concerns
`
`regarding the mutual agreement over the formulation of an access control list. The result
`
`is a design which can effectively accomplish information security in the environment of
`
`the everyday world.
`
`Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
`
`IBM-1008
`Page 8 of 191
`
`

`
`TABLE OF CONTENTS
`
`LIST OF FIG U R E S........................................................................................................
`
`LIST OF ACRONYM S...............................................................................................
`
`CHAPTER
`
`1. INTRODUCTION.....................................................................................................
`
`1.1
`
`Introduction
`
`..................................................................................................
`
`1.2 Private and Proprietary Information Property
`
`........................................
`
`1.2.1 The Effect of the Computer on Information
`M isappropriation......................................................................
`
`1.2.2 Private Transactional Information..............................................
`
`1.2.3 Proprietary Information...............................................................
`
`1.3 Basic Objective of Proposed Technical Solution......................................
`
`1.3.1 Extensions to Computer Security C o n cep ts.............................
`
`1.3.2 Basic D e s ig n ................................................................................
`
`1.4 Background
`
`................................................................................................
`
`1.5 Overview of Threats and Countermeasures............................................
`
`2. THE INFORMATION PROTECTION T A G ....................................................
`
`2.1
`
`Introduction
`
`..............................................................................................
`
`2.1.1
`
`Information Usage States and Influences...............................
`
`2.1.2 The Information Access Control L is t.....................................
`
`2.2 A Selection of Groupings of Usage Influences.....................................
`
`2.3 The Data Base of Usage Influences
`
`......................................................
`
`2.4 Attribute Categories of the Information Distribution Directory . . . .
`
`2.4.1 Syntactical Attribute C ategory................................................
`
`xi
`
`xiii
`
`1
`
`1
`
`2
`
`3
`
`4
`
`6
`
`6
`
`7
`
`9
`
`16
`
`19
`
`26
`
`26
`
`26
`
`29
`
`32
`
`35
`
`37
`
`37
`
`vi
`
`Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
`
`IBM-1008
`Page 9 of 191
`
`

`
`2.4.2 Naming Attribute Category
`
`.....................................................
`
`2.4.3 Informational Attribute C a te g o ry ............................................
`
`2.4.4 Controlling Attribute Category
`
`...............................................
`
`2.5 Sections of the Information Protection T a g ............................................
`
`2.5.1 Identifying Information S e c tio n ...............................................
`
`2.5.2 Originators Link S e c tio n ...........................................................
`
`2.6 The Protected Information Unit
`
`..............................................................
`
`2.7 Abstract Syntax Notation One to Define the I P T ................................
`
`2.7.1 Brief Background on ASN.l and its E n co d in g .....................
`
`3. COMMUNICATIONS BETWEEN D EV IC ES................................................
`
`3.1
`
`Introduction
`
`...............................................................................................
`
`3.2 Public Key Cryptography for Secure Com m unications......................
`
`3.3 Aspects of Secure Communication.........................................................
`
`3.3.1 Data Confidentiality...................................................................
`
`3.3.2 Data Integrity...............................................................................
`
`3.3.3 N on-repudiation.........................................................................
`
`3.3.4 Access C o n tro l............................................................................
`
`3.3.5 Peer Entity A uthentication........................................................
`
`3.4 Authentication of the Receiving D ev ice ..................................................
`
`3.4.1 The Importance of Valid Device C redentials........................
`
`3.4.2 The Certificated T o k e n ..............................................................
`
`3.4.3 Access Rights are Device C entered.........................................
`
`3.4.4 Validated Usage Influences Belong to the D e v ic e ...............
`
`3.4.5 Validation of Usage Influences at a D e v ic e ..........................
`
`38
`
`48
`
`48
`
`53
`
`54
`
`55
`
`59
`
`60
`
`61
`
`64
`
`64
`
`64
`
`65
`
`66
`
`66
`
`68
`
`69
`
`69
`
`70
`
`70
`
`71
`
`73
`
`74
`
`74
`
`Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
`
`IBM-1008
`Page 10 of 191
`
`

`
`3.4.6 Considerations for Selecting the Time Period of Validity
`of a Usage In flu e n c e ...........................................................
`
`3.4.7 Examples of Usage Influence Validation Techniques
`
`. . . .
`
`3.4.8 Transfer of Device Credentials from Receiving to
`...................................................................
`Sending Device
`
`3.5 The PIU’s Place in the Open Systems Interconnection Reference
`...................................................................................................
`Model
`
`3.5.1 OSI Basic A rchitecture.............................................................
`
`3.5.2 The IACL at the Application Layer
`
`......................................
`
`3.5.3 The IACL at Other Relay L a y e rs............................................
`
`3.5.4 Encryption in the OSI Model
`
`..................................................
`
`3.6 Attaching a Protection Tag to Protected Inform ation...........................
`
`3.6.1 Attachment Using the Processor C h a n n e l.............................
`
`3.6.2 Devices Require Information W atchdog................................
`
`3.6.3 Input Control Needs are Similar to those of Output
`C ontrol.....................................................................................
`
`3.6.4 Connectionless and Connection-oriented Transactions . . . .
`
`4. THE INFORMATION W A TC H D O G ............................................................
`
`4.1 Information Protection at a D evice........................................................
`
`4.1.1 Internal C ontrols......................................................................
`
`4.1.2 External Controls
`
`...................................................................
`
`4.1.3 Current Systems at Risk
`
`.......................................................
`
`4.2 External Controls for Watchdog Resident Devices
`
`...........................
`
`4.2.1 A Design for Built-in Physical S e c u rity .............................
`
`4.2.2 Compliant Devices and M odularity......................................
`
`4.2.3 System Survival in a Compromised Device Environment .
`
`76
`
`78
`
`85
`
`86
`
`87
`
`88
`
`90
`
`92
`
`93
`
`94
`
`97
`
`98
`
`98
`
`101
`
`101
`
`102
`
`104
`
`104
`
`106
`
`106
`
`108
`
`109
`
`viii
`
`Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
`
`IBM-1008
`Page 11 of 191
`
`

`
`4.3 Internal Controls for Watchdog Resident Devices -- The General
`Purpose Computer
`............................................................................
`
`4.3.1
`
`Information M anagem ent......................................................
`
`4.3.2 Device M anagement...............................................................
`
`4.3.3 Memory M anagement............................................................
`
`4.3.4 Processor M anagem ent.........................................................
`
`4.3.5 Recap of Changes Needed to Systems Software
`
`..............
`
`4.4 Internal Controls for Watchdog Resident Devices — Other
`Processing A rchitectures...................................................................
`
`4.4.1 Multiple Information Watchdogs in a Single Device . . . .
`
`4.4.2
`
`Information Watchdogs in Multiple Devices
`
`...................
`
`4.4.3 Simple D evices.......................................................................
`
`4.5
`
`Examples of System Use
`
`..............................................................
`
`4.5.1 Control of Flow and Access of Information......................
`
`4.5.2 Compensation for Use of Software Product by End User .
`
`4.5.3 Transfer of Music to a Compromised D evice...................
`
`4.6 Adding Functionality to the Information W atchdog.............................
`
`5. CONCLUSION - PATHWAYS TOWARD GENERAL ACCEPTANCE
`AND TASK PLANNING FOR SYSTEM D EV ELO PM EN T......................
`
`5.1 Pathways
`
`Toward General Acceptance
`
`...................................
`
`5.2 Task Planning for System Development.............................................
`
`5.2.1 The Information Distribution D irectory..............................
`
`5.2.2 Biometric T echn o lo g y ...........................................................
`
`5.2.3 Encryption Techniques...........................................................
`
`5.2.4 Outer Casing of an IW Protected D evice...........................
`
`5.2.5
`
`Inner Casing of an IW Protected D e v ic e ...........................
`
`113
`
`115
`
`117
`
`120
`
`127
`
`129
`
`131
`
`131
`
`132
`
`134
`
`134
`
`134
`
`137
`
`139
`
`140
`
`142
`
`142
`
`145
`
`147
`
`147
`
`147
`
`148
`
`148
`
`ix
`
`Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
`
`IBM-1008
`Page 12 of 191
`
`

`
`5.2.6 Controlled M anufacturing..............................................
`
`149
`
`5.2.7 Compliance with Environmental and Quality Standards
`
`.
`
`149
`
`5.2.8 Operating System of an IW Protected D e v ic e ...........
`
`149
`
`5.2.9 Electronic Hardware Design
`
`...............................................
`
`5.2.10 Information Usage Influence Verification: Location . . .
`
`5.2.11 The Model of Information F lo w ..................................
`
`151
`
`APPENDIX
`
`A. HIGHLY TRUSTED INFORMATION SYSTEM S...............................
`
`155
`
`B. THE
`
`INFORMATION PROTECTION TAG STRUCTURE
`
`...............
`
`REFERENCES...............................................................................................................
`
`150
`
`150
`
`169
`
`173
`
`x
`
`Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
`
`IBM-1008
`Page 13 of 191
`
`

`
`LIST OF FIGURES
`
`Figure
`
`1.1. Sequential steps to establish system and transfer
`inform ation......................................................................................................
`
`2.1. The Organizational Unit hierarchical usage grouping......................................
`
`2.2. The Organizational Position grouping of usage influences.............................
`
`2.3. The Work Related Role grouping of usage influences
`
`...................................
`
`2.4. The Device Type grouping of usage characteristics........................................
`
`3.1. OSI Seven Layer Architecture
`
`...........................................................................
`
`3.2. Dual channels aid with the conduction of transactions including the
`attachment of the protection tag to the generated in fo rm ation ...............
`
`4.1. The Hierarchical Domain Architecture is based on the trustworthiness of
`groups of softw are.......................................................................................
`
`4.2. The Information Watchdog is implemented within the four
`resource managers of an operating sy stem ...............................................
`
`4.3. Protected Information Memory A c c e ss..........................................................
`
`4.4. Memory Management: 1st Phase of Context S w itc h ..................................
`
`4.5. Memory Management: 2nd Phase of Context Sw itch..................................
`
`4.6. Example of Memory M anagem ent..................................................................
`
`4.7. Example of steps to control flow and a cc e ss.................................................
`
`5.1. Time line of critical path for system development
`
`.......................................
`
`A .I. Hierarchical Information Processing T o p o lo g y .........................................
`
`A.2. An information service should be factored into separate
`processing activ ities....................................................................................
`
`A. 3. A model of how a PIU is generated and how it may be transferred . . . .
`
`Page
`
`15
`
`38
`
`41
`
`43
`
`50
`
`88
`
`97
`
`102
`
`114
`
`120
`
`122
`
`123
`
`124
`
`135
`
`153
`
`159
`
`164
`
`165
`
`xi
`
`Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
`
`IBM-1008
`Page 14 of 191
`
`

`
`A .4. Alteration to applicable branches of the previous model to allow
`for an H T IS ...................................................................................................
`
`A.5. Alignment of sectors of representational disk packs for two
`clients within the same or different HTISs
`............................................
`
`166
`
`167
`
`Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
`
`IBM-1008
`Page 15 of 191
`
`

`
`LIST OF ACRONYMS
`
`AAC Activity Anonymous Code. Part of an HTIS, it is a code which relates AIUs
`within the same topologic ring. It integrates activities which are part o f the same
`client service.
`
`AIU Activity Information Unit. A unit of information formulated by an HTIS in
`accordance with the principles of topology, aggregation, and stationarity. The
`aim is to better control information availability by creating units of information
`to which tighter fitting access control lists can apply.
`
`ASN. 1 Abstract Syntax Notation One. From CCITT Recommendation X.209 [3], ASN. 1
`(X.208 [2]) "specifies a notation for the definition of abstract syntaxes, enabling
`application layer specifications to define the types of information they need to
`transfer using the presentation service."
`
`CA
`
`Central (Certificating) Authority. The authority which oversees the content of the
`IDD and its corresponding information usage influence validation techniques.
`The structure within the CA can be decentralized.
`
`DAT Device Authentication Token. Contains a device’s credentials in the form of
`certificated usage influence tokens, as well as the public key o f a device. A
`receiving device must (directly or indirectly) submit a DAT to a sending device
`before it can receive a PIU.
`
`HTIS Highly Trusted Information System. A system of services offered by an
`organization where the information protection approach for each service revolves
`around each client.
`
`IACL Information Access Control List. It is a list of recipients (usage states) that have
`permission to receive logically associated protected information.
`It is a section
`of the IPT.
`
`IDD
`
`Information Distribution Directory. A universally accessible data base which
`contains the commonly identified information usage influences along with various
`associated attributes.
`
`IMAT Information Memory Assignment Table. A table used to determine the PIMA
`that a memory address is located within.
`
`IPT
`
`Information Protection Tag. It contains instructions to direct the actions of an IW
`in handling logically associated protected information. It is a section of the PIU.
`
`xiii
`
`Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
`
`IBM-1008
`Page 16 of 191
`
`

`
`IW
`
`Information Watchdog. A class of standard components which carry out the
`instructions in an IPT. A device compliant with the protected information
`environment, depending on its architecture, is required to have one of the IWs as
`part of its operating system.
`
`IWD
`
`Information Watchdog (protected) Device. A device which contains an IW and
`which is designed and manufactured according to rules specified to make the
`device tamper proof.
`
`LC
`
`IACL which has been formulated, by an information
`Least Common. An
`management function, from IACLs which are to be opened for reading at the
`same time. The LC IACL contains the common recipients across all the opened
`IACLs.
`
`PAAT PIMA Access Allowed Table. A list of PIMAs that are allowed to be accessed
`at a given time.
`
`PIE Protected Information Environment. A system which secures the transfer of
`private and proprietary information in a distributed non-trusted environment. It
`primarily involves the transfer of PIUs between information watchdog resident
`devices.
`
`PIMA Protected Information Memory Area. An area of memory, contiguous or
`dispersed, physical or virtual, to which an LC IACL has been assigned. The
`assigned LC IACL is used to determine to which PIUs the contents of the
`memory may be written.
`
`PIU Protected Information Unit. A generic term for a protected instance of a data
`structure.
`It can apply to frames, packets, records, files, etc.. for which an
`originator has decided to have protected information controls apply.
`It mainly
`consists of an IPT and protected information.
`
`SI
`
`System Information. Information existing within an HTIS which is not directly
`indicative of a client. The format is non-specific.
`
`TAC Transaction Anonymous Code. Part of an HTIS, it is a code associated with an
`AIU which relates it to a more complete parent AIU within an inner ring. It can
`be used to hide items of information including the identity of a client engaged in
`a specific transaction.
`
`Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
`
`IBM-1008
`Page 17 of 191
`
`

`
`CHAPTER 1
`INTRODUCTION
`
`1.1 Introduction
`
`The title of this paper is A Common Approach to Extending Computer Security
`
`Concepts to the Universal Distributed Non-trusted Environment. The qualifying terms
`
`in the title are intended to show the scope of the subject but ambiguity may still remain.
`
`Therefore each term is now discussed:
`
`•
`
`•
`
`"Common Approach" means that the technical solution should be applicable
`
`without significant modifications to a broad class of related problems.
`
`"Extending Computer Security Concepts" means that various computer security
`
`concepts that may be considered to already exist in some form are further
`
`developed to apply to the environment of interest. Only those concepts that will
`
`be altered or specifically applied to the new environment will be discussed; other
`
`concepts may be relevant as part of a complete design but will not be discussed.
`
`•
`
`"Universal Distributed Non-trusted Environment" refers to information usage on
`
`a worldwide scale where each information user may be autonomous both in
`
`technical configuration and administratively from other users with the only certain
`
`link being some form of communications channel to another user. The term
`
`distributed refers to the big picture of the worldwide computer network, where
`
`by each computer carrying out its own information processing needs, society as
`
`a whole is able to function. This environment may more simply be described as
`
`the everyday world. This environment is considered to be a superset of the
`
`limited trusted environment, to which the techniques developed should also be applicable.
`
`Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
`
`IBM-1008
`Page 18 of 191
`
`

`
`To these qualifying terms can be added -- with the aim of protecting private and
`
`proprietary information — to show the desired outcome of the technical solution. This
`
`category of information can be interpreted quite broadly but is meant to imply something
`
`less than information pivotal to the outcome of national crises. This influences the level
`
`of achieved security as well as the security features offered. The distinction between
`
`private and proprietary information and the increasing need to be concerned with their
`
`protection is discussed in the next section.
`
`1.2
`
`Private and Proprietary Information Property
`
`The concern that an owner of private information has is that its use not adversely
`
`affect him. The concern that an owner of proprietary information has is that he be
`
`rewarded for each use of the information. Both require that information distribution be
`
`restricted. The difference in compromise associated with each of these types o f
`
`information may be one of quality versus quantity. A single usurpation of private
`
`information into the wrong hands may destroy its value to its owner; each usurpation o f
`
`proprietary information may simply deprive its owner of another unit of value. Value
`
`in terms of proprietary information usually means monetary value; value in terms o f
`
`private information can mean monetary value or an intangible quality such as reputation.
`
`This is not so different from other classes of property which can have monetary as well
`
`as intangible value, i.e., a family heirloom. In terms of the business world, trade secrets
`
`would be considered private information while a data base for sale would be proprietary
`
`information.
`
`Individuals usually are concerned with the intangible value of private
`
`information which may or may not have financial implications. A large fear is that the
`
`available body of recorded information on a person may substitute for a person’s
`
`characteristics as expressed in a more personal or current manner. Additionally the
`
`recorded information may be incorrect. A connection exists between private information
`
`2
`
`Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
`
`IBM-1008
`Page 19 of 191
`
`

`
`and proprietary information — individual instances of private information may have
`
`insignificant value but when gathered and arranged may increase in financial value, thus
`
`encouraging a transformation of private information into proprietary information.
`
`1.2.1 The Effect of the Computer on
`Information Misappropriation
`
`Information is a form of property. As with any item of property, the degree to
`
`which it may be misappropriated is based on the value of the information and the ease
`
`with which it can be misappropriated. As a property group, more information can be
`
`misappropriated if there is more of it in existence. Computer technology has facilitated
`
`all of these factors.
`
`•
`
`Information has been made more valuable due to the ease with which it can be
`
`processed.
`
`Processing can reveal insights in
`
`information or can handle
`
`information in a production line manner by producing such outputs as addressed
`
`envelopes. The computer acts as a front end to human abilities where otherwise
`
`the type and amount of information would cause an overload condition. The
`
`technical concepts discussed in this paper will lose their effectiveness as the
`
`content of the involved information becomes simpler in terms of human
`
`manipulation and comprehension. At the extreme end of simple human
`
`comprehension, gossip will hardly be affected at all.
`
`•
`
`Information can be more easily misappropriated due to the ease with which
`
`telecommunication networks can transport it and due to the various available
`
`media for the output of data. Telecommunications networks are offering greater
`
`bandwidth and greater connectivity of diverse systems. Information has also been
`
`easy to misappropriate because owners of the information have not been
`
`safeguarding their claims to it. Just as the title to land that is not protected can
`
`pass into the hands of squatters, the same can and does happen to private
`
`Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
`
`IBM-1008
`Page 20 of 191
`
`

`
`information. Some mechanism is needed for information originators to lay claim
`
`to, as well as to secure, private and proprietary information.
`
`•
`
`Information in digital form is also becoming more available as a result of the
`
`positive trend in performance to price of software and electronics and the
`
`increasing portability of information related equipment. Due to the functional
`
`advantages of the telephone, word processor, point of sale terminal, etc., human
`
`interaction increasingly is either accompanied with or transpired using digital
`
`communications. The increasing degree to which human interactions are being
`
`reduced to a bit stream, posses an increasing privacy threat.
`
`1.2.2
`
`Private Transactional Information
`
`Some information is already protected by law or by contract under law such as
`
`through copyrights or nondisclosure statements. Usually in these cases, the information
`
`(or its physical manifestation) is generated with the direct intention of being offered for
`
`sale. The information may very well have not been generated in the first place if a
`
`means to claim ownership was not available. Much private information is generated as
`
`a by-product of the need to complete transactions. Businesses as well as individuals are
`
`at jeopardy of having their private information usurped in this manner.
`
`1.2.2.1 Characteristics of Transactional Information
`The characteristics of information which determine how it can be used for
`
`purposes consistent with the owner’s desires, also determine how the information can be
`
`used when misappropriated. Transactions can be classified as generating computer
`
`intelligible information or computer non-intelligible information. Computer intelligible
`
`information consists of symbols or numbers from which the computer can discern
`
`meaning. Computer non-intelligible information can as well be numerically manipulated
`
`but doing so does not lead to its being related in a significant way to an external idea.
`
`4
`
`Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
`
`IBM-1008
`Page 21 of 191
`
`

`
`Over time, as computers are becoming more "intelligent", non-intelligible information
`
`is becoming intelligible information. The line between computer intelligible and
`
`computer non-intelligible information presently occurs
`
`in
`
`the area of ffee-form
`
`information, such as natural human speech in a conversation. Telephone conversations
`
`have traditionally been an area for the invasion of private information through the use
`
`of the wiretap. The information derived from a wire

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket