throbber
March/April 1994 Vol. 8 No. 2
`
`THE MAGAZINE OF COMPUTER COMMUNICATIONS
`
`Mobile Communications
`
`"W.
`
`—
`
`‘
`
`
`
`.
`
`.
`
`-.
`
`.
`
`,.
`
`U
`
`,__ __
`
`-~
`
`.
`
`5-fiPR-1984 BLDSCBESQS”,
`IEEE NETHBRK
`"In.
`*-
`
`-2-rtf
`
`4361007500 "°L 5
`
`“*3 allllllllllllllllll
`
` ®
`
`Technologies
` 9.
`
` _
`
`'
`
`'‘
`
`_.--1.
`.-"
`'
`_‘_+_:_' F.
`- .'
`. _ :3-4."
`.
`-— "Z"-
`’__,
`_._._.—.._-...______
`'__
`;-_;_:_._
`._—
`-”d___-.15,
`_
`.. —
`__ ___.__.._._
`,._ _
`-___ _
`_..
`.
`_.
`_
`___
`‘-"—_“'
`_...
`..o _..:
`Vt
`
`_
`
`_
`_.
`1.
`.1I
`;‘\
`
`rl
`V
`,1
`,
`‘
`-"
`
`I
`
`I
`
`'
`
`I
`I
`I‘
`
`.
`
`"
`
`_-
`t_-
`‘_._L__
`:
`— ,_ ___...
`'
`.-::'r._._._‘*
`-.
`-7....
`-
`_.1''- __._,...a-_\
`
`Y, r,‘
`_ ~
`__
`
`_ _ T;_; :1.
`E .'.'_ -‘ ' “
`_L_
`
`-
`
`2'-
`
`A Publication of the IEEE
`
`C0n1n1unicatiQn5 Socieiv
`
`
`
`,_
`
`~~-,
`
`.
`
`-x
`
`‘
`
`Amazon.com, Inc. et al. Exhibit 1004
`
`

`
`at EDITOR'S NOTE
`
`
`
`Craig Partridge
`
`IEEE Fellows Announced
`
` very year, IEEE elects a number of outstanding engineers to become
`
`IEEE Fellows. Fellows are recognized for outstanding achievements in
`their field of engineerinu.
`Several Fellows this year were recognized for their contributions in
`data communications: Vincent W. S. Chan ofMlT Lincoln Labs, Yau-Chau
`Chlng of Bellcore, David J. Farber of the University of Pennsylvania. Michael G.
`Illuchyj of Motorola. Francis R. Vlagee. Jr. of AT&T Bell Labs {and a member
`of the editorial board of IEEE Nenvork). Kinichiro Ogawa of AT&T Bell Labs,
`and W. David Sincoskie of Bellcore. I hope you will all join me in congratulating
`these new Fellows on their achievements.
`
`A Bit of Personal Internationalization
`
`Data communications is a global issue, and that globalization is rellected in
`the membership of the IEEE Communications Society. More than one—third of
`the Communications Society members live outside North America.
`In most years I. personally. do not get much chance to visit with my col-
`leagues outside North America. But this summer I will be at two conferences out-
`side North America. In July 1 will be speaking at the Networ1d+lnterop
`conference in Tokyo. And in late August I will be at the annual ACM SIG-
`COMM Conference in London. (For information on Networltl+Interop in
`Tokyo, call +81-3-3288-720]: for information on ACM SIGCOMM. e-mail to
`sigctimm94-infota}-cs.ucl.ac.uk). I look forward to seeing members of the Commu-
`nications Society at both conferences.
`
`ISAC Special Issue
`Along with Gary Delp of IBM. Stephen Pink of the Swedish Institute of
`Computer Science, and Jonathan Smith of the University of Pennsylvania, 1 am
`guest editing a special issue of the IEEE Journal on Selected Areas in C0mmurrir:rt-
`trons on “Distributed Systems Built on Gigabit Networks." Our goal is to assem-
`hle much of the research done in recent years on the challenges that gigabit
`networks present for distributed systems. The submission deadline is October lst
`for an issue to be published in late 1995. Please contact me {craig(r}_i'l)h:1.com) if
`you are interested in possibly submitting a paper.
`.;-.-I
`
`;
`
`'I
`
`.*
`
`--
`
`". :1". ":2 2 :2
`
`' 2‘
`
`|'I
`
`';
`
`-r
`
`'3
`
`‘IHE it-'|AGA.i?lN'E OF COMPUTER COMMUNICATIONS
`Director of Plibllcations
`Thomas J. Plevyalt. Bell Atlantic
`Editomnvchiei
`Craig Partridge. Bolt Beranek and Newrnan, inc.
`Senior Editors
`John .-N’. l):rigJt:. The MITRE Corporation
`John D. Spragins. Clemson l.iniversity
`Executive Director
`{'..':rt1l M. Lot. IEEE
`IEEE Network Technical Editorial Boot-d
`jagan 1’. Agrawal. Unlwrsity of Missouri. USA
`Stdah Aitltirotls, ‘Bell Northern Rc.\'L'.trt.'h. (.‘£1:I'J.'I{.lEl
`Ken-ielii Aihara. Nippon Te]. and 't‘etegraph. Japan
`Steven M. I-}L:llovi1:. A"E‘&T l.-tell laboratories. USA
`Lillittn M. Cassel. Villanova Univ.. USA
`Jon Crowcroft. University College London. UK
`Steve Ducting. Xerox PA RC, USA
`Gary Delp. IBM Corporation. USA
`Julio list-nhar. Bolt Beranct: and Newman. Inc, USA
`David Greaves. University of Catnbrldge. LJK
`Alden Jackson. Santiiz: National l.aburatorles. USA
`r\nIJT:iJ:tyasumar1a. Colorado State University. USA
`I-"rank Magee, ATélt'|‘ Bell Laboratories. LISA
`Allison Mankin. The MITRF. Corporatiort. USA
`Jan Murzri. Wide Project, Japan
`K. .\«'iu1'[l‘ty. A'1'&T Bell l.ahoratories, USA
`Gerald Neufeld, Univ. of British Colun1hia.Canar.Ia
`t'it1yOniidyar. Computer Sciences tforporation, USA
`Peter U‘ReiiIy, (ETI-L Laboratories Inc. USA
`Cicrard I’-an. University of Ulster. Northern [rcland
`Guru Parulkar. Wasltington l_lrtiv.. St. Louis. USA
`Krzysztof i’aw'likoMFti. U. of Canterbury. New Zealand
`I,hornas F. Piatkowski. Western Micltigan L‘-niv.. USA
`xiuptien Pink, Swedish Inst. of Comp. Science. Sweden
`"KR. Ramaltrlshnart. Digital Equipment t..‘orp.. USA
`Frank Reichert. Televerket. Sweden
`Barry Shein. SuF1ware'1"ool 8: Die. USA
`Khosrow Sohrahy. IBM Corporation. USA
`Martha Steenslrup, Bolt Beranck and Newman. lne.. LISA
`.\r1ehrm.-I Toy, ATal;'l' Bell Laboratories. USA
`(iill Waters. Llniversity of Essex. UK
`Martina Zitterhatt. Universit_v of Karlsruhe. Cuermany
`Feature Editors
`John N. Uargle.“'I‘he ll-LEE Network Forum“
`John D. Spragins. “New Books“
`IEEE Production Stofi
`Joseph Milirzo. Managing Editor
`Elizahetil Wilher. Production Editor
`Alan E. Oirieh. Layout Editor
`Erie Levine. Advertising Sales Manager
`Joanne O'Rourke.Stal't'A~esis1ant
`Susan l_.ange. Publications Assistant
`19941 IEEE Communications Society Cliiieers
`Mam-izio Declna. Premlcrrr
`Celia L Desntontl. Vi’-t\«i‘enLbrr/1fi‘airs
`Stephen B. Weinstein, V!’-?'erh.rlr'c::lA_f}'alrs
`Roberto B. de Marcrt. Vi’-l'Hrr.'mrr:t'nuttl A,I'}'rr:'r5
`Carol M. l_t1f..‘.irrrerrr.ry'
`G. Allen Leadhetter, '.l"rcrr.mrer
`Paul Green, l"a.\'r Pres-l'a‘mt
`Board of Governors
`The elected ot'fit;er.u abnvr.‘ plus Members-at-Large:
`t.'.'l:m'nff99-I
`Allen ll. Cherin —RlCl1[tl’(lUi'llin
`Ray R. LEItt|'|l.' — Richard P. Skillen
`{.'lr.r.t.t of 1995
`Laurence H. Milstein — Blrendra Prasada
`Anne Aldridge Robrock — I-larry Rudin
`{Wars of {We
`Harvey A. FrL‘t:rntu'I. — Lin-slttm IJCL‘
`Joseph L. L.oClccm — Richard K. Snelllng
`1994 IEEE Officers
`H. Tray Naglc. Prt-'.\'r'dr3rrr
`J. Thornas (Sakai, .l’rt*.s1r.‘i“nl-.l':'tlt*(‘t
`Luis T. G-andia. .S'::(rerar3'
`V. Thomas Rhyme. Trea.ttm=r
`Mttrthti Sloan. Jr., Parr: .”re.tr't.lerrr
`Jrahn H. Powers. (Imeml Mttrtager
`John 5. Ryan. Di:-ector. Divmorl H.‘
`
`
`
`EEIEIEI fl'E1'WORKlSSNlI8‘Jl}-Kl.)-14 is puhlished bimonthly by
`the I nstltute of Electrical and Electronics Engi11eers.lnc. Head-
`quarters :iddrt:s.\': IEEE l’1.Ibli.\hing §iervit;cs. 345 East -'F’Il1
`Street. New York. NY !l}[Jl'.l—33‘J4. USA. '|'elcphnne: +1 2:2-
`TU5-7l}Iil'.e-Izmil: j.n1i1i:o'.o{r{'ieee.::1'g. Resgtnnsihility fnrthe con-
`tents rests upon authors of signed articles and not the |{3|_".]_-', o1‘
`ilsrncrnbr.-rs. Unlu ssoI:berwr-t«.: specified. Ila:
`neilherenrlors-
`:2: nor sa nc1ionsaraypositinnsor actinnsespoused irI!.‘E't':'l:'.’\-'errv'r;rk.
`RNHUEL SUBSCRIPTION: $22 in lilllllliflll to ll"-.F.F.
`(,‘on1mum'eations Society or any other ll’-_'F.F_ Society rnember
`dues. !\'on-member prices: 5 I I5. Single copy prices: Nlernv
`bet. Sill; Nonvmemlser. S20.
`EDITOEIKL CORRESPONDENCE: Address to Craig
`Partridge. Editor-in-(.‘hiel. L:-"L'ril.l;'.’£.l;' N¢’fM'U!h‘. 54."! Fast =I‘.lt|t
`Street New York. 5"? lI'll]I?-2394,USA:e-mail:craigli13'bhn.corn.
`COPYRIGHT IND BBFBIIH‘ FEIIIEISSIONE: Abstract-
`ing is permitted with credit to the source. Libraries are per-
`rniltctl to photocopy llC_\'l.l1'lij the limits of U..‘S. Cztpyrigltt lau
`
`
`I'or private llhL‘u[:l'.1!|'L‘HS'. lhr.
`'*‘
`'-rlirlcs that carry :I code. on the
`hollontol the first page prrwitled the per copy fee indicated in
`the code is paid through the t_‘opyrEghI Cletirancu Cellter. 222
`Rosewood Drix-‘e. Danx-ers, .\-I.—‘\l]l‘}2.'!.1.='St"\. I-'oro1l'a:reopying.
`rt_'§)nn[. or repulilicalion pt-.rrm's.~'.ion. write to Director. Pub-
`lishing SeI'vir.'t:s. at IEEE l-leudquarters. All rights reserved.
`I. opyrighl (5)1994 by the lnslilute of Electrical and l_il|:cIr‘oh-
`ics Engineers. inc.
`POS‘l'M'.HS'.l'ER: Send address cl::tngestol'£‘i3 ' Verlwadr. l
`445 Hoes Lane. Piscattnvay. NJ’ [].'il<5:i- I33]. l.l.‘iA. I’rii1ler.F iI1
`
`USA. Second-t.
`ss puslttge paitl in: New‘ Yorlt. NY and at
`additional ntitiling offices.
`SUESCRIPTIONS, orders. address cltanges should be
`sent to lEEE Service Center. ct-151-loesLune.I’iLacutaw::y.
`NJ Ill-i2i55- l.l-.'lI. USA. Tel. +1‘Jlltl-‘its!-lll]t:ll.(iST Raga?
`lljfifidlilll.
`ADVERTISING: A.'.l\-'r.'rtisin,-.I: is accepted at the discretion
`ofths: puljlisher. Address t.'{J|'l'l:bp<JT|dlL§lCC lol.l;'!'_'.'t“.'.-\-‘em-rJr.lr. 345
`East -17111 Street. New York. NY lI’l{lJ7-2394. USA.
`
`1iil:l_- '\lClW0l'l( * Mart:h#April 1994
`
`Amazoncom, lnc. ei al.
`
`EXH1B1i lllllz
`
`3
`
`Amazon.com, Inc. et al. Exhibit 1004
`
`

`
`Authentication of Mobile Users
`
`A new set of inic'r-domain security mecimnisnm is needed for users
`to venture mm remote domains while, inlireriting privileges from
`their heme domains.
`
`Refik Mali-'0. Didior 5on1£ctt. and Gene Tsudilc
`
`It-: rcccnl ulitcrgullcc n:-f nu:I\s-urli Incli-
`nulugyI|1::IF:1|ppurI::imc: rnnhilily has
`run ntplcd rII.:w -scamit)'r<ii~,tIirenIui1ls mid
`<-nncerns. Inniuly d.u r: ID IIII: luck ul
`[1hy::l::aI pmicclinn mcc|I:|nism5 :15 in Im-
`....4
`Llilimml Tim.-ml-tL'apnluy.y. sinlic-m;t:r nI:1\VI:I1”k5.
`Uxu:rnm|.1llily:m:_I univcrsuinum-nrk nc«:::s5a:r|:|ir1I_-,-
`u.-.~::|s:pi.-rate |.‘r:rl:Iil'J:iI:c'u|.’iI}' ll1l'I.':ll'5. c.|_1., illegal inccéss
`Uruudlnncl cuw.‘.'id re pping. llmdcliliml. ::_-nc new inc.-
`mr lIIlJl.1_gl'Il alisuul by nmliilily is the ::\'i:r-llltrcasa
`ingdislnllccllmlenn3::paru1:;nclu-L11'l:ilcc::s<<pninL~+.
`Since Ilcumrk |IL't‘€.'!~5 puilllsarctllll m!<:u5L\':1Iiiy umh;-r
`lh-1: cL1mru|nf1lu: -_:::_uu: :::ln|inisIr:I|i\-I: numm-iI_\-_
`a .In:w wt ufiI'H.u'.'-tiut11::i11 |'1li:4:lKIlll.‘i!'!}S is nu.-clad
`In allow users. In perfurm secuI'lLy<\1:c.r:IIi¢:ns-in
`visited r.|L1nI:1ins,Folentinlsnlulians must take
`lnInncI;mInI i1}‘«f.lI1'II.'\k‘]1III canImdic1urya:::curi[ycun-
`::Ir.:1int that calls For strict scprm-.Iion of mcurily
`dumuins In .-wnitl sharing, dn1n.'1in«.-qn:J:i:'sc sue-In rity
`inI‘urm:ninn_ ‘Flu: gmil nf this paper is to prupusn:
`-.1gu.-nv:r:1l uppr-:a:u:li fur the mlnlnmliuuiiml uf
`users in rcmnl: \|l5I11i1iIl‘.a \vI1ilu1|min1-.iini!I1: ~s1r‘::.-1
`.sc|1ur:aliun uf :v'uL‘€l1l'il)’ nlnlnnins.
`
`‘inn uI' sueurlly
`This nrtirlu lnsgins with :1 dis
`issuzzs specific In userIImlIlliI}'.\s'iIll i{lL‘rIliliC.'1‘ill1II1Il
`:uI1i:::nlic.'sliun rcquircmcnls. r‘\uI|Icnlic:;tlon
`sululiuin: its cxif-ling mubila.-—us::r cm-irormlcnls
`
`arr; s::n1runrizu:{|. our -.-nlmimt m:u.IIi1c.-I
`ninn nl’
`nml!iln'.- users is fircscrllcd. Illcn some mrintinns
`1.‘l1IIl’nd'li'Ii.‘.|‘|11: areinumluccd l"ul|w.w:\i by -.1 sumnmnr
`¢.1I'llIc:1rliclc.
`
`REFIK .\fI‘21l.l-9| i: am
`ilwlrualtpvbfma M5? in in.-
`rwjndnniiz mIrJa1rrIl1iL'nr|’i|mI
`u‘qDl'.-nrmrrii m‘ rive .';‘um.'I=m
`lrlffiflllc.
`
`User Mobflily and Its -Security
`fmplfcofions
`sitrnmlailiw can hr: <1I’l't.-re.-d in tlilfrrclti l||..'l\\I'lJ:I’l-‘u
`I:n\'irc:m_ncnv.~:. Smm: crwiram-.1un1s are, by dul-
`iIIiIi:'.In.uriuI1lL:¢I ii: molnilu: u::-.'.rs. 'l'l1::sc iIICll.lI.li:
`all lypn-'.-an :f\\'irI.'.i:':1«s m:t\:\’url-‘:.~‘. u.g.,iI1lr:m:L| :!II(l hIt|:'r.?.
`with cellular huing the must pupulur.
`(.'I:l1u.-r c_.:nvirumrucnle= can he iltlaptcd In 3-npptnrl
`In-'t:rInnhi|iI;', i.c.,:i\virr.':Iim: m:w.'ur|:um1i:s: uqnigrpa.-cl
`r.‘l-.‘.\‘I:‘ i".\‘Ul}?K it a n-mrrrfi
`H3 ulluw llIll\'I:r§IIl ism.-55 Ilirmngh 1|. v:uIuc,'-:sLi(|ut.l
`'sm;i'r-uerni>r: 11! l‘-iir myu
`m.-rvim: .\‘lI\i'lI us lllIi\.'l.'I'EiI‘Il
`|JI.’|”1il1I‘IiII Iclr:I:cn1muni-
`9.’-uririr nu rum-J: labawmu
`c1llicImz[1Jl"l'] {l|. .-119:0. :1 l:LlI‘l‘I£l1l-tl'I!tlLl. is II.) mix
`
`
`m.1'}.".’-.'H.\':IilI'."-‘.-Ii‘ is .1
`F’ia..lP. slllelclu in nu: l':'um¢-grn
`lumrrrri-.
`
`wlrelinc :iI|IJ'.I'ir1‘:Iu>iS-:I(:Ct:$a' wilIrin':mimcmc1-
`w:.Irl<.'l‘hus. to keep Ihcdiscmsiun 1':1ir|_\- gi: no ml. Ihis
`article plaiyn Iluwlrlin: iliuilucliun ltuiwecn wire-
`less nnd wirclim: .-n:t:4:ss.
`
`Establishing Temporary Residence
`Abroad
`Wu. btgin 113' slitting tin: lausic narnlmplinn of rise:
`niubiliiy: .'| usu.-r has bul om: llumc. A us::r's Imnu:
`is the I1d!niJIiN1‘t‘:*ni\-u:(lnIn:IiIIwhn:n:l|1c us::r.i:a
`rugisu-.rc\1nn::n lung-1crn11b::sis. “['ypin:nlIy,. i1 is ::!~;.u
`Il1l.‘.‘|)i€I(.‘.L' wlmn: antcnllllting and billing i:ll'orm:I-
`Linn is act \3!7‘l1.1liI_l(‘-Ll. In -‘3'U!I'1t 5-::1::c-,3 |1:_mu: damuin
`hears mnu: r::!l|)EIIl$1ili|iE)' for its C|Jn§lllU|.'{‘Il users.
`M n mobile user rnigr::tc.H1Irn1:g|1nuI. :B'iin:r.-r-
`n-.~'.wurk-. in: car she pcriudicaully f!U|!r6'I.lp inn new. fur-
`cigm|unIué|1.;\.us¢r r|1uybI:5ir|1p|_\- Irzmsilingu furuigni
`|.li}f1i§|ll'I or plnnninxy; to linger uivuln for eiumc
`li|}l=.?.]iI‘.{,,'ill'(1l.t‘:.?uS ml‘ the usu.*.r’:¢ inlnntinns or tin.-
`Iypc nl‘ |1ccu.5s{i.c., via it cclltilalr plmnc or :| fixed
`\mrl:si:|1i<Jn} lhi: gunl :11’ 5| nlobilu. u::::r is to oluluin
`mun: scr\'i:.'e l'run1 lllc Ituhrurk. To do Ilml.1|Iu
`user must I'iIs1 I:!i[.‘1l!1lil'| 1:-.n1pur:ir3' residence in
`llu: furcigrl nltunnin.
`Uscr:nnI'ai|i1yiIi1l:¢ ncuvnrk cnvirunmunt is
`not unlike Inability in the run! wur1d.whcrc :1 per-
`son t:::\'I:|ing fmluom:-cout'1|.ryl-:1 :mu(l1s:r II1u5lI‘.1llt:|'l
`n.'|1ga;_:C in some lmru.-:mcI:nliL: pmcedurc to C}il:Ii1-
`lisli Icmp(:r:m; playsicnl residence in ii“: new l(I|.'il-
`iir-n.inllu:rca'Iv~'nrid.1h'; prm':I.:d.urI‘.: ofus1:dnlisl1lu3
`-'.IlI:I1ljIOlj:l1'}‘I'(!E€iilt.5:l|£t:.\'i\!'iESl):'lE smulnlry to
`lnllulli-31'. ‘Flu: salrnc can he :>§:'|:cl':lI.-tl Lil‘ m:lwr)rk
`LlL>l'I1illlI‘$.
`z\.l 1hc'Il1‘.'+| gl:|nI:u:. llu: pruhlu_:m :i::::IIl$lulJL'
`easily snIv:I.l:lel1y :L-quiI_‘iIIgu:IL'|I Imihiit: IlSI:1‘ tn:-:1rr3'
`ll. univc'rsru.1ly-rcungnixc-:l crcdcnlinl. i.::.. :1 puiss-
`pnri. An clcclrmiic cquivul::nI {If n pnsspnn is
`cnllud :1II2lac!1'uI'.icuuriifir::ilu:.‘l'l1erc::rn ::lnc1mniu.'
`c<.°rIil"It=::{}n:aschcn1u:aim:¢nd nn public key as well
`as ctmvculinnal crypl I,1gl"lJ|.fIl'Ijr. Om: uutulal-.: wean!!-
`nlcis priwncy-c|IlI;II1L-cal Imnil {l’El\'l) [LL-1|.
`Giwil :1 <:I.'rii|'icnt<: of n l’un.-ignm:I:I'.nnyr.lun111iI'.
`can ve.ril'y lllr: ncdcnliul and confirm |i\i:: identity
`t!|'l]l'.1l user. I-Iasvcvur. llmrenru scvu-:n| issues
`Ilml tmnn-:JI he illlcllflfisflfi with elt:€ll'I)I'llu‘.' certifi-
`t.';uiun. While an m.-rlifiz:-.1lu‘s liiilhwticily is Ie:-.Llily
`
`25
`
`Amazon.com, Ihc. et al. EXE151t I004
`UHUIJ-.‘ilIIi~lr‘J-l.'S| l~l.Ill I-1.‘: I‘.|1J-1 IHIEIE
`I|'I|'-I[i‘»\'u.-marl: - n\i:m:I|!A[Iri| IEFM
`
`Amazon.com, Inc. et al. Exhibit 1004
`
`

`
`.....
`
`Mobility in
`
`the network
`
`environ-
`
`ment is not
`
`unlike
`
`mobility in
`
`the real
`
`world.
`
`where 21
`
`person
`
`traveling
`
`from one
`
`country to
`
`another
`
`must
`
`establish
`
`temporazy
`
`physical
`
`residence in
`
`the new
`
`location.
`
`2?
`
`
`
`M5 Idenlifltr -IMSI
`
`
`HLB
`
`DUE]
`
`DUE!
`H0":
`
`El
`
`U
`
`
`
`Am 01 IMND. mas. Kc]
`
`mm. um
`
`RAND
`
`!
`
`ms
`
`_
`L--__-
`I Figure 1. ftlaliiir .\'mII'm: m.'Il:mI:mIm:I in I‘ 5.331.
`
`SEES 1 R3 l K}, RMID l
`ICC
`
`AH (Ni. RM-ID]
`
`cru:diI\ihI_v I'n'IIl~l Inc mnflrnucclI-.'iII1uvuIycru:¢iIu,I
`oi domain hum1I|:IriI-.5. I n_1;::ncr.|l. \\u'I.‘l.':II‘lIlI|l ::~munc
`Ilml the Plllll 1:Ilu:II II_\'
`:1 muhilu: Ilwl‘ is ulrlliml»
`um,i.r.,IInxu.-rm:I}'nfIcr:1Icinu|1c (Inn'I;IiI\ uni!
`;.¢\'-:r:I| hum-I lulcr pop up in lIllUIllI.!r dm11::iI1
`Il'II'Il.I.\'{Il'Illh nI' milcs :m-:I‘\-. An sigh:-hnur f|is:I1t
`ftulll5\\ilZ|:ll:1IlIlln!1Iu Llliilutl Slalcn curries '.l
`uxcr In-tum-an l\|.'I.)Il1‘nliIl'nI. non-:n]jm.'-.-:\I dmmlins.
`.'iIImcII-II-1| t|ilTcrI.'IIl1Iyn:u'I1iI.’xl:I|i&‘p|:Icc inn
`l)';'rl.I.".|l win:lu:~.- uuvimm1t:nIwl|uts:.i:I:m:uI1:.If
`51'mp|_\‘pnp|1i:1pIIp.:1 uhcr ll'llI}"I\'.'|l|lll.'F lIllI‘11Il1.l:l\'
`(InmIIi|:.'|'l1uclill‘urI'I'n.‘uIslscalillllslrillullIlyl|II::xIIII|-
`plu. A cullulltr Ic|cpI1uI14: -eIII1.~(:rI'|'ln:I' L‘II;.;'.131<.'I1 in :I
`I'.'l.'fl'l\'I.'f:1'iIl.ll.‘Il I.'|'n-5L'.~' IIII: dI.I:II::iII |1m|JIIl:1I_\' in
`runl-Ii:11.I:wlIiluIlIwIm::Iv::Ir.'|'1Ii$l3.'pv:IlIl|n\'I:nlcIII
`<.'.'II1|Jc L‘l.'Is..-.ifI'::I|
`.15 CUI'lIl|'lIll.Iu5 .-1.x uppn.-u:I| In dis-
`l'fl.'II.' wlurrc II :\1I|1.u‘.'ri|1L'r .\i!:‘1§.:l5-'
`llIl'I1'h ull his collu-
`Inr plmut: I.1r:Iw.'wlruml1nrnc.(‘|'hc lulu-r :.':1su: is
`l'\\(.'llIlIIll}'Ill|:!IIIfllI!'l\lllIllflH‘lflflllIL'|.'Il|'lfl1DI'l!lCHI.)
`'|'|II.sI}'1lCnl1'\‘:IlvlII'I'IclIIlI:r(lI}I‘n:llI'I Ir:m.~iIinn
`1lL'I Muir. rI':I|-llmc |I.'|1:Il
`'cr of II:~L‘I"n s'I:1In‘.
`
`
`lIIt‘ll.II.§lT|!.: turn: Ill wsaininl :I.L
`I_\' IILI
`ml .'IuI|I::II-
`In-.n11um':mII1mi2:
`llIIIl|‘I'lnII'I'l{IIlIII‘I..-\:aIl'II[\lcl'£| Hi.-a
`\\-faunauserIamig:-:mr|gfromhislm:nc:hm1:Iin
`mun:nIlj;IcI:1'.|unc:tIIcl::1n(ln\--:r-can [Ia dam: in
`:1 Iri\-i:Il. I’IIfl.l1IIL'l . In :I molt: ;‘.I.'|n:r.'I1-.'I:I.'n:nriu.:I
`Im:r|1Ii;;r.IIcs!mnI um: I'IIru:i;.:11s.1t-ln:IiI: Inannllh
`u:r. iiol h Ilm11:IlII- L'.'|I'| bu: \'u:r}' I':!r :u-\'.'1y I'mnI lmnn:
`nllcliliannlulniml:-Iluwlu;1uIlIcI1IlI.':III::Iusurin
`.1II\:\\'tluII1;IiI1(lnrualIiI:I¢,'l\\'iIlIuLI.lillulningthc
`Im:rI'u::uI ulL'n|1l:1I:llIIgll1L' lmmr Ilunlzsin.
`
`Existing Approaches
`In tlIl.~:~c<'tiL\II.wI- I111";-I1_~,' review lnmt-::u:'rcm nmhil::-
`uwr n:nvirumncu1-s Iwuru-silu: ll-SL'I' 1:u:lnIiI3- with
`:nInII1c:mc:IliuIn.
`
`Groups Special‘ Mobfle
`('nItIIIpc.‘lpL'.¢:i:Il Mnllllc(G5hr1l['I.3l!1r.Il1cfirsI mnhlln:
`
`\'criI‘s::I1|u.-. in current saI.'III.I:. 12. Iml. In other words.
`.'olIIL'|.'
`In mulillv mI:r Ilclnilntls .'}L'I\|lE.‘I.‘ r.'Lllu:I I|I:u'\ u
`lruc I:Im1mIJIli I)", llu: ftsruigrl :|:mI'1|I1 may need In
`um-uIali::|1 Ilmr :1 III:\V‘l'_\-lI1'fi\‘I.‘t.l.\-'l!ilIll’l_[J Im:r is cur-
`rI:nl|3,"my.md :.:nnI|ing.‘l‘l:i-I cmmntlu::1=;compli.*l1r:n!
`willmul sonic l|m:r;IcIinn will: Iln: ut«cr'slmI1Iu
`iltmléllu. 5llIt'L' uul_\‘ lllL' lmnsc Ilmunin is able to
`I.'nnl|'lIl.‘I'II nn Ihc Inu:r\cIIrrcII1 :\1:Im.Ii|1::. If :1 u.-u:r
`ulsmlns m:r\-in: whllc ulvmml am} is l.'lll.'J billed for
`ll. Ihc hon:-.' I|m1'r.Iln m::_\' rcltlfiv In pay since 'Il'H.‘
`u:u'pI:ndi1un:s were not '.|IIIhnri.r.cI|.
`.‘i<urIc tltllnnlllli nI:Iy dc.-.-ir-: 1(I II-:.lriu'. ll'lL' mobili-
`
`Iyu[tluI:irc:m:ItiuIc|1I Isscrx: wc|1uuII:aIr;Ii
`m:u:.'hc
`I-::r,vIliI'ficuIl Io L‘rI{'tKlI: in :| nnE\':.-r.-ml curl:
`r\nuIhI:r prollhun wilh I:lL-clmllir u.‘I.'rli\'iL.
`IhuuI::lu:r1ying;usrm|11;1Iin|1IhmIlIcn::crlm
`:11u::IIs olI.".Irr}'ing lsix L'cr1iI'n::I1u.u:.g.,\riIl1in :LL'I:||n-
`liIl'|‘|lI|!III:.:1]'II:lSIJIILIlCullllillltlliiilluf.IlFflhIl'IiIf|L‘:IfI.l.
`In IIII: simplest nmhiln--usur cIIvfrunmcn1.::.g..
`l.1l'T 1l|. '.I uwr i~: ":nnIu:d" with nn|_\.' .1 [1iI\,\\I'nrr.I
`
`nr:Il’1l"-' —- ,\I.1ll1L‘ll1lTI_I_.:l.llIIll§ c‘ "lyIu||1cIIII1urcd.
`,I1nircI.s;:|1:_<1:rculli L':'IIiI1lll\flUl\'lIf-
`
`firin: In or u'n:||-:-ul!I‘d:'mcs-lallulisllillgI1.'n||1nr;:ryrc:a-
`IIlI:m‘:: in II [nr<:Iy.n dtililillll. The Ilincux-:1nn pm Is
`InIlu:m:udIocmII:u:II|1c um-r‘s|1n|1|edunI;Ii:1.Livcn
`if i.ICL‘I.!.\.N cmnrol is mu :m mun: and iI'I|Ic u.-.I:r's
`lll}lllI}’lI‘I1}.l}'r(.1IM‘|\'ltfI::\ cull he L'nnI'irn|cI.l un-
`Il1u.--spol. c.g.. u'i:|I |.'lI.'t.'Il0IIlt‘ I::I.\'|I[5,fj|.1|Iu:
`u!:n:r':+ |1on'sI.' domilin rnusl lvc L‘uI'II'.IcIcII l|'m1l_\' for
`I‘:-ucl:iug.‘I'l1i.-a la-lJL'i.‘IllI\I:inllhltrlslturlll-1ll)‘I‘
`' II-rm
`\!.'iIll.lIi$lllJI1'II: Ilum in HI! :1 lung.-Icnn l1'..
`.;.1ny-
`
`11III:u.':|nIlngt|)cnr'.I:
`|I:IlI.\'L'IlI:I.\II1|JI1Il.§lIlll'll‘ilIL‘I'|'!l!
`IJI.m1:Iin |1I:tI.T|IL‘n:fnrL'.il is Imllmll lo: :1 :InJn1:Iin
`to Iruck Ihu \-\'l'ICl'l.'.'Il}IllIl.'i of ils L'ur1:.IiIm:nI um.-r.»-.
`
`
`
`
`
`Migration Among Foreign Domains
`
`'l'l1urc i'
`'1 ::li;.:hI I|if|'I:n:ncI.- lu.-Iv.
`' “I1 is u1aI.'r:Inpn:ur-
`ing in :1 l'nrI.'ign IIunI.|in ilflll mu\'i|1g lu:Lwc::n lml
`:uIjI|I:I:nI fnnzigll dtllnlllllil. Wliilc ll
`I1!.I:1‘ Inznkcs lIi:-
`wuy l'I‘UIII nllc l'urcip_n Iluumill Io :mntIn::‘. his
`
`Il:lilF .\'cIu-upls - .\l.m'lr .-\prll !'.I'1.1
`
`Amazon.com, Inc. et al. Exhibit 1004
`
`

`
`
`.....
`
`A iimtl rentatrit on (‘ISM lms tu du -with till: use
`ut the "hunt:-rtrmvn” unpultlisitctl atgerithms.-l_r.
`1i§.:|I'ItM3lo obtain nutlte nllenlionnnulsecrccy. Hid-
`ing the ttiguriiltnr is certainly ctantrury la lite
`lt'l|Ici1-1i}¢l|I.'.'l'|‘lS phiiusnrlhy. The lime-lricd. aeturlly
`ivy-nbvcnrlty principle lures run prtwcn to he effec-
`tive in preventing hostile tIu|u:its.'
`
`C'eHu.icIr Digfiiai Pctciral Dcrlu
`Celluiur Digital Packet [lulu {CDPDI mcltileb
`tun:[9] imsbcenratentiydevclnpotlbvnenntsnrlinltr
`at several U.S.-btllttitl companies. As the mime
`suggesIs.ir is oriented tmvnrds tiara lI‘iIflit!.|'|¢‘iI mire
`IrtiiTtc. CDPD hritert atlvnntrlgc of free aims in cei-
`lulur vulce cetnrnunicnliun and use: them tn
`trnntrpurl tlnln. Like Ul"'l'. CDPD provides for
`nctwurlr dcctml thrnugit either rnnltllu or lined
`end -systems. hul it is not just il vltiI.n;~atkile¢| ser-
`vice: it ill I eumplele architecture irlcltltiingn
`i.lACinyer. nnttmg utlter thingn. The architecture
`supports several network lnyur prntnenla includ-
`ing II‘ | tiilnnd (.'I..NP[l1}.
`Security services In CDi’D are compared at’
`darn eunfitlenlinlity. key distritmtion. and mobile
`unit nul Itultliclrllrtn. CDFD requires it iugicuIiy-
`distinct entity. Lt-.. tun rtutlierllicntintl sen-er {AS}.
`in be present in every CDPD tiuntaln {area}. Art
`as istypien llyeu-iecnted withtlre nteltile tlata inter-
`mutiiate system (MD-is} in a service prnvldefs
`dnmain. Mnlrile unit (M-ES. in CD?!) pnrlnncc)
`autlutnticutiun uivvtiys i1'Wllit‘fltl ctnrlncling the AS
`in the unit‘: lmme dumain.
`Ar aitnwn in Fig. 2. the nutltenticmlen process
`begins with rite |)iifir.--I-Iellnrun iti.-y exchange pro-
`tncuillzi. Assn I'I:!€I.1II.tl1t:
`ivI-l':Suntl1|Iescwlngi\-lD-
`is ettme In slttlre :1 secret in.-3-. IQ.’
`Armed tvitlt int. M-ES suhntits iueredentinlat
`(encrypted with 14'.) int autltentlcutitm. The M—i€.‘i
`credentials celtttisl ol'n lripict: |Ni5'i..-IRN. .-1-SN .
`Efinctly haw ANN is generated is ntri spcciiie .
`I’i’¢illl‘i'|ati1l)'. it ili-illl tmpredlctnlrle rnnttnrn num-
`ber pwciucetl I35’ the humu A5-. i-luwet'er,.-Iii-\’ is
`not it true nttnue‘ since the saute value trl':iRN
`my be um! lnllltiplc times.
`‘I11: sewing MIJ-is deeryptit ihr: eretlentinis
`and rnrwru-us them In the heme MD-IS in the
`eleur. The itulne MD-IS then validates the cre-
`dentials und uplimmlly issues :1 nu.-w.«|KN. M433
`‘.t'tIIht:I\licitIlflll etnnplete-5 when the serving MD-
`IS receives. it pnsitivc confirm ntlon in-mt the
`hutne Mi}-ISnnatisignnhttuM-I£5[erIclt1.-tiugtlicrlew
`ANN innpplienlIiel.Tite M-ESttuIl1entit:atiuniruni-
`direetinnnl. i.e.. the serving MD-IS its not authen-
`ticated in the M-ES. Thiamcurralhui nu itttrudercan
`nmsquerrnie as the serving i\ID-IS and tlilcmrer
`the 5|-ES credentials.
`Like (ISM, CDPFJ makes an ttsluintptiun thin
`the "fitted" netttmrit it secure. 'l‘herel't.tre. transmu-
`nientiun between the :-erving MD-IS and the
`heme Mi)-IS in ct‘.|l'l¢ilIt:ltt‘t.| in the _clenr. Since this
`induder M»ESeredentittIs1Ni£!..-rim’.-.-l.i3V]. CDPIJ
`is susceptible to the same altnclttc ms (ISM.
`in l'n¢t. GSM hurt it alight ndvnnlnge Lwcr
`CDi'IJ.1tint:l.IliIl:l'I1t!i)iII:-!t1l1litiI'I'tiit‘II15‘.-ll:llllitt:y[.h.'f)
`in GSM is never revealed nutsidc the station.
`'I'iItr.\. anyone intercepting I’-LR H HM! traffic
`euu gttin nt inert tttwennl autiteutimnlnn ltifticttit
`|R.-IND. .t‘R£.S'. it'..| and imperttuntlte the multile
`sltttiuttttt-It1'.l!I1tii'II'h.‘snsII1creaI‘Elripit.Il:iiIlliteil1ieI*—
`L'I:{li.l.'i.i mexsuy.-.
`
`What is
`
`needed is
`
`a security
`
`architecture
`
`with
`
`minimal
`
`assumptions
`
`about the
`
`security
`
`of interme-
`
`diate
`
`transport
`
`networks.
`
`‘if the rlftflll Cilmwrpm
`part}! it urn-_v indinrriwr,
`rhetisdi ":rcm'.m|'ulr'uu
`airnfiuir I'll give WI
`rirfilrrrrrnl‘ cvrcinrrrerd mili-
`fi"t‘flH¢Ifl'iI'|t|: 0."!¢'¢I-W.“
`
`-‘Time err m.-r.vni'l3- ma
`my 3,; urrri IL‘... fuel:
`r.im't1.'ni_fmru K, 1'-hey IlI'I.'
`med fin nrn-I-:5 .— Mr!-
`is aurimnnimrirm and
`MD-ES -J .liD-.'.'i‘mltr-
`uranittrrlitrn. n-sperrfluftt
`
`‘Anu . li3l'I'i-
`naruitt-airrte -!Ilmi'u|Il-l‘II'lllr-
`iarr mi.
`
`Irrmtr fr are-nth invrerdfi
`attire nfier the irtirtui MS
`uurhmnmvm. the lfitfl
`mm: in «He mlmpttr
`illcwrtfuy wine with Kr:
`ntrirh um Ill!-iJ'iP€
`aiutuirlrqflium the rum‘
`fltiiafrfie with unit,
`
`digitaleellulnrnetworkarchiIeeturetnprt!vIricseeu-
`rity services smelt as user uutl1entieaI.inIt.trnit'ic
`euniitlentinlity. nnd key dtmihullnn.
`GSM atthrterihers {them} are Iraceli tinting their
`iI'Itm- nntl inter-dornltin movelnenltr. Erich nmhiitt
`nnunn ttststintnrmstlre uerwnrttnfitrrmsirirm: this
`In iammtiun is used In update the visiting lucntit:-it
`register (VLR) and the hm-ne ieeatinn register
`[I ILRJ. Furthermore. the establishment oi corn-
`ntutdcatiott is under eontrol iii the nutlteuticntian
`L-enter(AUe)whiehiseitenen-lucntcdurlththc lot.-ul
`muts:tnestvitdt|ngecnter{MSC3wlt¢ra mcetdutuain-
`wide policy it enforced.
`For each net Ive or pnuive M3. rcul-tirnc iticrt-
`Iiiientinn oi the visited domain tmtl authentica-
`tion nf hull: caller and called MS is perfumed in
`arder to weld fraud.
`Every (I-SM subscriber Inns in his MS n smart-
`cnrd (SIM) containing rt -secret key K, known only
`hy the HLR. when the MS Ituliiictt the local
`MSC in its presence. the lncal VLR contacts the
`mnhlle unit's Hut and trttnttntiht his twirl. ideuti.
`ly. the mobile station‘: lntcrnntiunnl MS identity
`(M5!) and pnsitlnn to the HLR. The Hi it asks
`its incul AU: for .1 set ui' II i|r|t.'ta' cunlaining: rt
`challettyc irantimtl number RAND}. ll signed
`response {SRE.'i]. and it cnrrespeltding seltttiofl
`iicflx.-I. The lriplelsnrc lhcn iotwurticd hrlcii iothe
`\.'i..Rnntiench tripierislxtednnlynnee fnrtlueauthew
`Iictttiolt uilhe MS.
`Fnrnmetcn SEES and K, are computed with
`the urtpulalisitcd alguriliilltwla nnd rig Ihnt imple-
`ment t'lI1.tMh'.it}l' functinm:
`' 5383 F 1| }[K3. KIIND)
`' K; ‘ -‘ipiiip
`Suhmquenliy. priwe}-hens-ecu the Msund tilt: it‘tc‘.‘t|
`MSC is neltleved by eneipllerlugitlnta with It’. ..-I,
`is nnulltcr unpubltshetl niguril
`II1 nan.-tl In enci-
`phcr data. speecli. and signalling, meninges:
`I Cirrlrerretr -= zig.(K,. Ch-:nrI't'Jfli
`' Citvrrrerr = .»-l5[It’... Cipiterretr)
`Figure 1 depicts. the MS unthenttcutiun proton-.3!
`in GSM. Message I'|mws|1ci\'vecnI'II.RInt.iVLR per-
`term the export of the sauluaeril-er‘: credentials.
`frtrnt the llonle domain In the rental: tltrlnuin
`It-"|Iiiethe interaction ireltveen hriSund Vi.Rctu1s-isls
`ttfchultengc-based eutltenticalion nf MS h_vVl..it.
`The main curtcern with the GSM i|l.Ililt:l1|it.‘.|iil'||‘I
`ttppnnnelt is its relinnce en the security in the inter-
`netwnrit that is traversed by the i«'!.R 4-+ NLR stem-
`l'l'|I.lt1i.¢l.|I'l|t1li..El\'l.'.I'tii|.iIi§'l|lu‘tE:l rettrttnnhlen-.a.Im|1tiun
`fer the signalling nelwurlts of tud:ty'r nruirile tele-
`phone strstennt. the same cannnthe guaranteed in
`il large er glnlsal st-ale. administratively l1etero1te-
`nenus. netwurlr environment. Winn it: needed is :1
`\-ttt.'I.|rii}«'iIl'¢ililt:I.'l.lil‘¢\IFiiilmii1im8litI!iStii1'IpIitJr|S:ti'IJltI
`the 5i.'mi1'il_|I at‘ intermediate lrllrtsptrrl rtetwurlts.
`Anatherpuintoreuntt-ntlunuriI!It'iSM i:nhemnn-
`tier of tlimlllnling user uullleuticatiun iIiiurl‘.Iilt-
`lior|..TItt.‘ Item: domain is: expected to generate
`tin-titc-fly in set at‘ cllrllicltgcireiponsc pairs that
`the foreign tlumain is than supposed to use in
`successive rlutltemielntinn news with the end-user.
`This snlutittn is. ineiiic'tI.'nI in terms uf built hunti-
`wirtth eonsmlnption uutltlu: etmritead ineurretlnt the
`itutnudelnuin. InaddItittn.sir1eeunly1t(prerun:uh|_v)
`-entail i1l.Il'I'Ilt¢l' ui such elmllengeircrpunse pair: in
`t:ur1tr11uIIit.‘lt1ctl.ii1eirstI
`yt1tnew:ntun|iybedepleI-
`edatnd the lurei l'|titllI1tIlfl\ll:tlilii.UIil\’|:l¢\t'l!l1ii\tl lite
`iI|.)t‘lJ.t.' domain are fresh ilIliL'iL
`
`26
`
`'
`
`'
`
`EXfi151f I004
`Amzon.com, in‘c. et al.
`|EF.l-2Nc1ItnwL I Rlrtlcltfiihprii IW-I
`
`Amazon.com, Inc. et al. Exhibit 1004
`
`

`
`An
`
`. I
`
`mportant
`
`Home MD-Is
`
`characteristic
`
`W of mobile
`
`MS-E5
`
`
`
`
`
`envtrornents
`
`is the speed
`
`at whlch
`users move
`-
`dcross
`dgmains
`
`'
`
`Mm, W m,,,,,g,, M,
`
`MD-ES Ia.-yuchange {EKH
`
`Cnrnnum Ks
`
`Ila ESH
`M-ES I1
`’
`‘
`-"
`11:4 1 g,_ I um. mm, A5" 1 3
`
`Illlfle-Hellman key exchange
`
`C0l'!'lpI.I1IK'5
`_
`_
`
`fiednoctlan request IRDIII
`I NEI. mm, ASIII I
`Validaia
`I ND. KEN. MN I
`
`
`M945 mnugm gs-Q
`OPIJOMI nca Ixs. I NEI. arm-. ASH‘ ll
`
`._”_‘
`optional I MEI. AIIN‘. ASH‘ I
`
`I
`
`
`MD-I5 ralnblle 6.11.1 uniermeduafyfsll-m_—
`M-ES Mulnle end-system
`
`
`NEI Network oqunprmlnl II.|l.'nI1fil.‘r
`
`
`ARN Aulhenticalion random numlm
`
`
`ASN fiullmntication seqmzntc number
`
`
`MN‘ NM mu».-
`ASN‘ New ASH
`
`
`
`'
`
`,
`
`‘I-5191!‘I';—2. a'|ufrJl'I-’h' tart!-.1_y.;tr:rlI muf3F{;}}Jn fol (:'DPD.—_—— —— I
`
`_ _ _ H
`
`_
`
`'
`
`_
`
`_ — _ _
`
`In cunlnuul. CDI'I'J clues nul require in lung» Aurhgnfjcafjon of Mobile Users
`lcrm h-‘LES key. "III!ifIIrt.If.lL1ril‘|1.¢I‘I:¢|‘1I:I- M-ES
`I1 llain xuclinn, we tlcvclup u gene:-Ic mllnllnn lur
`crudcnliltls unly Llncc. he l.‘Ill‘I Inlpcrmlliitu lhc
`lhu <‘|'|.lIl'|L‘I|IllJl|lll.l|'| nl'muIIlIc Iliurs. We try In
`vlclim M-l£ScIrJIIa}':':lIIIrIII. This in hccaulsc lha
`nvnid IhI:dru\\'lN|I:kmI'Cl5PcI nml(‘Dl-‘D. i.¢-.urcIrIuloc
`slullwnliclllssrs {ARl\' \.'III1n:s) in CI}I’D are I:orn-
`l'lI.'Ia‘I'HIll11'IfJIilI|'lI§IIl.I('I1II. Ilw -Iccurlly nf lhu: interme-
`pulcd hy Ihc lwnn: AS (M D45) and not by Ilw
`dl-I1I0.‘.fiM.'ll m:Iwurlr.I-. Surm: I.I!II.l|'Illll}'IL‘ill'lt.‘l.‘rII1a am:
`M-F.S: Ilius. mere ptm-cxskan til’ just um: cum.-nlly
`I:I|n:II ilno ncwunl. III tmlcr In mlnlniln: Iln: hur-
`vnlid Irlplul INEI. .-IRA’. .-l.‘:'.N'| is elmugll In uhlain
`th:nnnIl:u1m:mml fII‘||1-‘ilk’IIII"aI|'I:p:l|'¢I'I|.|iM:Ill'|I¢f-
`sulmaqucnt Iriplclsa and cunlinuu: impcrsunulirlg
`I‘:n:u:.
`Illc M-E5.
`_ _
`CDPD. like GEM. men unpuhlisllcd |.‘1Ir.'ry|'I-
`Ilun Iunclilon -- RC-l |l4]. As mentioned ahnvc. mm“! “'”“mP“°“‘
`Iln: Inilinl kc)! cI:ch:Ingc is performed via l)i[Ii::-
`Wm-.n accnssingtlic nclwnril. in Ihc llunn: domain.
`l‘I¢"Il'Il.|l'| plulucul. Snbscqur.-nl lrnlfic is e|N.'f)'|Il-
`we :I.\suI'r|c Ike mobile user ls nulhcnllcnled with
`cd using the {prupricuu-y] RC-I cncryptinn
`II Ir:-nlilinnulscn-or-lnuscd nullzclilllmlion rrn:clI-
`functiun.
`unism. u.-.g.. Ks-rln-ms [lblor Krypmlirlighl
`II'J'|. fliers 0! every nelumr dolmtlrl arr: regis-
`Unh"°““' P573933‘-'3 T¢h¢°'-"'m"'“¢U'u°”-'
`IL-n:d wilh Ihul I.InnInln's AS. Tln: AS M‘ a
`The unwming Eurupcan vnluc-added 54.-rvicI.'.
`dnnuiu run bl! l'E|'JIlCIlIL'll or purlitlmlcd wllhin
`UPT. ls nlrrnnl primnrlly nl Ibn: I.-Zumpcan n1.'u'lu:I.
`Iln: domain. hnm.'vur.lh1:u:I nflullpurlllltsncd um]
`II is. dc.-.i;-,|1cI.I lu pruvidc I.u1l1n:r:InI I.I.1t.'r anew; and
`dupllcnluul Ass Il!]'lfI.'hI:IlI :1 slngh: llnrnnlnn-|c\n:l
`In suppmi hnlli fixed and muhllu I.-nd-syslclns.
`nulllnrlly.
`'l'ln: Ul'T tlcslgn I.llIliL‘lj1IIl.I:x rllully types ul
`An lIII|1urI:1nl I.‘l1nIllCII:rlIlIlI:I1fl11L‘l1llL‘ environ-
`ll'I|I.uIlIlI.'I1l um: um! flllflgchlll .\'rI.|lI1I.‘ lu.-ncrnl .su|u-
`mulls is ill: spent! :11 which users nnwc .-nu.-tons
`llum rnrlglng [mill simple FIN-[mud Inlllnmlicalo
`tllllllllflli in Ihc nclwurk. We Iuummc Ilml iI:IerIJu-
`Iicm tu more involved twuvwny amlhunlicmiun
`nmin tram.-1 has In rulnllwl
`low frequency: [at n
`{III-cf 1-» UP'I‘-cqulplncull using 1IIIIIIr'lI:':Irtls | I.
`I_vpIcnI user. Iln: inirnclunmm migrullnma Iwilhiu u
`15]. llnllka: (ISM. Ul"l' has nnl mnlurcd lo :1
`home dI.111'llIiIl.l.'If Wlllllfl .1 rcrrlulc domain) will be
`IHIIII: wllcrc {l|'JI.'I;'illt' security snlutlnns have hccn
`nmn: frcquulll mul Iml Iungcr Ihnn Iho interdis-
`pmpuaucd.
`mnln Inigmlllans.
`
` 04
`I|:l;‘Ii Ncluullli 0 .\l.m:Im\pril WI-I
`
`Amazon.com, Inc. et al. Exhibit 1004
`
`

`
`
`
`Design Criteria
`
`l
`
`We base
`
`our design
`
`on top
`
`of existing
`
`two- and
`
`three-party
`
`authentica-
`
`tion and key
`
`distribution
`
`protocols.
`
`In :tt.|ditlott to avoitling the ttfurententimted dr:m'-
`becksofexistingsystenralike GSN‘i.Iill.'5l.‘IiLlliltlIlIIl|!ii
`take into account the followittg design criteria.
`0 Dnnniin Sepurutiatt -—- Drrmnin-specific secret
`or settsitivc irtfornltttinn welt in Ilte user's
`secret ht}: ur password shmtlti not he pmp:Igrtl-
`ed from the [same tlomnin to It turcigu tionmin
`or between foreign dortutitts.
`' Transparency to Users — Aulitettlietttitrn in
`foreign dotttttins should ltrtve miuitnnl intpnct
`on the user interfncc with respect tu authenti-
`entiurt in the |'lDl1'IL‘ dontttin.
`' User Identity Confidentiality -—|1i:i often
`desirable In keep both the rhm-entcnls .'l.I'Id|.i1€
`current wltc rt.‘ilbl1ttI$ oi tttotrile users tteeret.
`For this reason. all user identiI'ie:u:'on inl'orn1:r-
`tton must be protected frmu tliselttstrte.
`0 Minimal Om.-rltend -—- The distance between
`the home and the foreign dutrlltiti may be very
`large. He nee. the number of Inessagegxexeirrtnged
`between the heme tlonmin end the tetnotedottiuin
`For the purpose uf nutltenliuitlittn !iilt:l|1i(”il.'
`I-tept minimal.
`
`Protocol Building Blocks
`We httse our Llefiign urt Ittpt.-Iexi51ingl1.t.'u-tttttl three‘-
`party i\ll'li.‘tI:'|11.i.l::1li'.)I'tttrId key distribution pfl)tt'.li:i‘t|5.
`Tlrese protocols are borrowed

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket