throbber
FoRK Archive: Microsoft Authenticode analyzed
`
`Page I of2
`
`l\1icrosoft Authenticode analyzed
`
`Rohit _l(hare (khareei_;pe: .. "tw3_org)
`Afon, 22 Ju! 96 17:52:07-0400
`
`• J'Vicssages SOI"tCd by: r dale U lh.read }r ~ubj ed _U auLhor}
`• Next message: :Rohit Khare: "Andreesen movinl! sioooowly to objects"
`• Previous message: Rohit Khare: "T1rn's co1nments 011 WJC appear i11 PCWeek"
`
`[private wJc editorial comments expurgated]
`
`July 22, 1996 10:00 AM ET
`TE 3.0 applets will earn certification
`By_ Norvin Leach_ and_ Michael Moeller_
`
`In preparation for the 1nid~_.A .. ugust launch of Internet Explorer 3.0~ :r-.tlicrosoft
`Corp. next V\,.eek vvil1 announce tools and services that let vendors digitally
`sign A.cLiveX, Java and l~etscape Connnunications Corp. plug-in cornponenLs.
`
`As a result, users oflnternet Explorer 3.0 will be able to identify the
`creator of an Internet-based applet before downloading it.
`
`Jerry Seinfeld
`Jerry Seinfeld concert
`tickets Close to Stage
`;:;bs~2sbtJe.;:;om
`
`JerrJI S"inleld Tickets
`Jerry Seinfeld Tickets.
`Where Fans Buy & Sell
`Tickets.
`
`But for some IS managers) this approach misses the point of Internet security
`by a long shot. 1Vfany say they are less interested in knowing vvho built a
`component than tn providing seamlt:~s prote(.jtiun fur user~-~ as the Java
`"sandbox" modei does.
`
`Take the Sei~feld Quiz
`Think you know all about
`Seinfeld? Take the quiz &
`see if you can win
`Tdvir;'J,St';l((';r;,an;d1, C(!n1
`
`The Microsoft model, designed to provide users with the same level of
`security found in shrink-wrapped software, is based primarily on a level of
`ttust and 1narket pressure to keep ISV s honest.
`
`To put the digital signature architecture in place, V'eriSign fnc. and, in the
`future, other certificate authorities wiii issue digital certificates to TSVs
`for a $20 fee. Several hundred ActiveX controls wiii be digitaiiy signed by
`the time Internet Explorer 3.0 ships, sources said.
`
`But such a certificate does not authenticate the specific applet--it only
`certifies that the vendor has pledged not to build any malicious code into its
`soft·vv·are. "If a user dovv·nloads a buggy piece of signed code_~ then he vvill
`n~ver go back to that vt:ndur again," ~aid Rub Pri(.j~, group product rrtanager fur
`
`Jerry S<!infeld
`Everything to do with
`Jerry Seinfeld items.
`Y:,hoo <;om
`
`Festivus Supplies
`Your One Stop Shop For
`Festivus F1nd Tees, Mugs
`& More Here!
`
`Internet security at Microsoft.
`
`Beyond the credibility aspect, the signature concept raises a broader issue
`for so1n e IS 1nanagers.
`
`BLUE COAT SYSTEMS - Exhibit 1033 Page 1
`
`

`
`FoRK Archive: Microsoft Authenticode analyzed
`
`Page 2 of2
`
`''Just the fact that they have to create this kind ofworkaround causes me
`concern," said Eric Goldreich, infomration manager with Sheppard, Mullin,
`Richter & Hampton, a Los Angeles law firm.
`
`Other lS 1nanagers are \Vorrled t..ha.t dlglta! signatures 1nay add co1np!exlty to
`an already complicated n1cthod of trying to rnanagc vvho downloads vvhat from the
`[ntenlet.
`
`Internet Explorer 3.0 will modity a user's system tiles to detect digital
`certiticates as components are downloaded. Once found, a dialog box will
`appear, stating where the component came from and asking if users want to
`continue downloading the co1nponent.
`
`Systenl administrations will be able to restrict users fronl downloading any
`components, and users will be able to list "trusted" cmnpan1es that can load
`components onto their ciient machine without confirmation.
`
`Security "should be something the end user isn't aware of." said Erik
`Goldotl computer specialist for the Centers for Disease Control, in Atlanta
`''End users don't even understand Internet busy signals today.''
`
`The issue of con1ponent security has not been widely discussed because the
`technoiogy is oniy beginning to mature; Internet Expiorer 3.0 is the first
`browser to apply the digital signature approach.
`
`Two Microsoft competitors, Netscape and Sun Microsystems Tnc are adding
`digital signature schetnes as a tneans of extending the functionality of
`soft;,vare and c01nponents found on the Internet. How·ever, officials at both
`companies believe digital signatures alone perpetuate a flawed nlodel found in
`shrink-wrapped software.
`
`"Digital signatures are just a pa1t of the answer, not the whole solution,"
`said Jeft'Treuhaft, director of security at Netscape, of Mountain View, Calif.
`"Besides, you need to sign the code, not the vendor."
`
`• Next 1nessage: Rohit .Khar~: 1'L;..ndreesen 1noving sloooo\vly to objects 1
`• Previous message: Rohit Khare: !!Tirrt 1S comments on \V3C. appear in PC~Ieek!!
`
`'
`
`BLUE COAT SYSTEMS - Exhibit 1033 Page 2

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket