throbber
determining whether the one or more APIs to which the software application requires
`
`access includes a sensitive API;
`
`determining whether the software application includes an authentic global signature; and
`
`determining whether the software application includes an authentic digital signature and
`
`access includes a sensitive API and the software application includes an authentic global
`
`signature; and
`
`the step of denying the software application access to the one or more APis comprises the
`
`steps of:
`
`denying the software application access to the one or more APIs where the software
`
`application does not include an authentic global signature; and
`
`denying the sofiware application access to the sensitive API where the one or more APES
`
`to which the software application requires access includes a sensitive API, the software
`
`application includes an authentic glohai signature, and the software application does not include
`
`an authentic digital signature and signature identifier required to access the sensitive APl.
`
`signature identification where the one or more APls to which the software application requires
`
`Cib 1513306V2
`
`£12.
`
`(New) A code signing system for controlling access to application programming
`
`interfaces (APIs) having signature identificaters by software applications, the code signing
`
`system comprising:
`
`a verification system for authenticating digital signatures provided by the respective
`
`software applications to access the APIs where the signature identifications correspond with the
`
`signature identificaters of the respective APIs and where a digital signature for a software
`
`application is generated with a. signature identification eerresponding to a signature identificater
`
`to access at least one API; and
`
`a controi system for allowing access to at least one of the APIs where the digital signature
`
`provided by the software application is authenticated by the verification system.
`
`113.
`
`(New) The code signing system of claim 112, wherein a virtual machine comprises the
`
`verification system and the control system.
`
`Page 1001 of 1415
`
`GOOGLE EXHIBIT 1004
`Part 3 of 3
`
`

`

`114.
`
`(New) The code signing system of claim 113, wherein the virtual machine is a Java
`
`virtual machine instailed on a mobile device.
`
`115.
`
`(New) The code signing system of claim 112, wherein the control system requires one
`
`digital signature and one signature identification for each library of at least one of the APis.
`
`116.
`
`(New) The code signing system of claim 1i2, wherein the code signing system is
`
`installed on a mobile device and the software application is a Java application for a mobile
`
`device.
`
`CLl— 1513306V2
`
`identification, and the verification system uses a public signature key to authenticate the digital
`
`117.
`
`(New) The code- signing system of claim 112, wherein the digital signature and the
`
`signature identification of the software appiication are generated by a code signing authority.
`
`liS.
`
`(New) The code signing system of claim 112, wherein the APIs access at ieast one of a
`
`cryptographic module, which implements cryptographic algorithms, a data store, a proprietary
`
`data model, and a user interface (U1).
`
`119.
`
`(New) The code signing system of clairn 112, wherein the digital signature is generated
`
`using a private signature key under a signature scheme associated with the signature
`
`signature.
`
`120.
`
`(New) The code signing system of ciaini 119, wherein:
`
`the digital signature is generated by applying the private signature key to a hash of the
`
`software application under the signature scheme; and
`
`the verification system authenticates the digital signature by generating a hash of the
`
`software application to obtain a generated hash, appiying the public signature key to the digital
`
`signature to obtain a recovered hash, and verifying that the generated hash with the recovered
`
`hash are the same.
`
`Page 1002 of 1415
`
`

`

`12 l.
`
`(New) The code signing system of claim 1 12, wherein at least one of the ANS further
`
`comprises:
`
`a description string that is displayed to a user when the software application attempts to
`
`access said at least one of the APIs,
`
`122.
`
`(New) The code signing system of claim 112, wherein the APis provides access to at
`
`a mobile device.
`
`least one of one or more core functions of a mobile device, an operating system, and hardware on
`
`CLE- 15 i3306v2
`
`123.
`
`(New) The code signing system of claim 1i2, wherein verification of a global digital
`
`signature provided by the software application is required for accessing any of the APls.
`
`124.
`
`(New) A method of controlling access to application programing interfaces (APIs)
`
`having signature identifiers by software applications, the method comprising:
`
`authenticating digital signatures provided by the respective software applications to
`
`access the APIs where the signature identifications correspond with the signature identifiers of
`
`the respective APEs and where a digital signature for a software application is generated with a
`
`signature identification corresponding to a signature identifier to access at least one API; and
`
`allowing access to at least one of the APis where the digital signature provided by the
`
`software application is authenticated.
`
`125.
`
`(New) The method of claim 124, wherein one digital signature and one signature
`
`identification are provided by the software application access a library of at least one of the
`
`APIs.
`
`l26.
`
`(New) The method of claim 1.24, wherein the digital signature and the signature
`
`identification of the software application are generated by a code signing authority.
`
`127'.
`
`(New) The method of claim 124, wherein the APIs access at least one of a cryptographic
`
`module that implements cryptographic algorithms, 3 data store, a proprietary data modei, and a
`
`user interface (U1).
`
`Page 1003 of 1415
`
`

`

`128.
`
`(New) The method of claim 124, wherein the digital signature is generated using a
`
`private signature key under a signature scheme associated with the signature identification, and a
`
`public signature key is used to authenticate the digital signature.
`
`129.
`
`(New) The method of claim 128, wherein:
`
`the digital signature is generated by applying the private signature key to a hash of the
`
`software application under the signature scheme; and
`
`the digital signature is authenticated by generating a hash of the software application to
`
`obtain a generated hash, applying the public signature key to the digitai signature to obtain a
`
`recovered hash, and verifying that the generated hash with the recovered hash are the same.
`
`130.
`
`(New) The method of claim 124, wherein at ieast one of the APIs thither comprises:
`
`a description string that is displayed to a user when the software application attempts to
`
`access said at least one of the APls.
`
`Ci J- 15133 GGVZ
`
`(New) The method of claim 124, wherein the APIs provides access to at least one of one
`
`131.
`
`or more core functions of a mobile device, an operating system, and hardware on a mobile
`
`device.
`
`132.
`
`(New) The method of ciaiin 124, wherein verification of a global digital signature
`
`provided by the software application is required for accessing any of the APIs
`
`133.
`
`(New) A management system for controlling access by software applications to
`
`application programming interfaces (APIs) having at least one signature identifier on a subset of
`
`a plurality of mobile devices, the management system comprising:
`
`a code signing authority for providing digital signatures and signature identifications to
`
`software applications that require access to at ieast one of the APIs with a signature identifier on
`
`the subset of the plurality of mobile devices, where a digital signature for a software application
`
`is generated with a signature identification corresponding to a signature identifier, and the
`
`signature identifications provided to the software applications comprise those signature
`
`Page 1004 of 1415
`
`

`

`identifications that correspond to the signature identifiers that are substantially only on the subset
`
`mobile devices comprises
`
`a verification system for authenticating digital signatures provided by the respective
`
`software applications to acoess respective APls where the digital identifications correspond to
`
`the digital identifiers of the respective APIs; and
`
`a control system for allowing the respective software applications to access at least one of
`
`the APIS where the digital signatures provided by the respective software applications are
`
`authenticated by the verification system.
`
`134.
`
`(New) The management system of claim 133, wherein a virtual machine comprises the
`
`verification system and the control system.
`
`135.
`
`(New) The management system of claim 134, wherein the virtual machine is a Java
`
`virtual machine and the software applications are Java applications.
`
`of the plurality of mobile devices; wherein each mobile device ofthe subset of the plurality of
`
`CLI- 1513306v2
`
`136.
`
`(New) The management system of claim 133, wherein the control system requires one
`
`digital signature and one signature identification for each library of at least one of the APls.
`
`137.
`
`(New) The management system of claim 133: wherein the APIs access at least one of a
`
`cryptographic module, which implements cryptographic algorithms, a data store, a proprietary
`
`data model, and a user interface (U1).
`
`138.
`
`(New) The management system of claim 133, wherein the digital signature is generated
`
`using a private signature key under a signature scheme associated with the signature
`
`identification, and the verification system uses a public signature key to authenticate the digitai
`
`signature.
`
`139.
`
`(New) The management system of claim 138, wherein:
`
`the digital signature is generated by applying the private signature key to a hash of the
`
`software application under the signature scheme; and
`
`Page 1005 of 1415
`
`

`

`the verification system authenticates the digital signature by generating a hash of the
`
`software application to obtain a generated hash, applying the public signature key to the digital
`
`signature to obtain a recovered hash, and verifying that the generated hash with the recovered
`
`hash are the same.
`
`140.
`
`(New) The management system of claim 133, wherein at least one of the APls further
`
`comprises:
`
`a description string that is displayed to a user when the software application attempts to
`
`access said at least one of the APls.
`
`mobile devices comprises mobile devices under the control of at least one of a corporation and a
`carrier.
`
`CLI- 1513306v2
`
`141.
`
`(New) The management system of claim 133, wherein the subset of the plurality of
`
`142.
`
`(New) The management system of claim 133, wherein a global digital signature provided
`
`by the software application has to be authenticated before the software application is allowed
`
`access to any of the ANS on a mobile device of the subset of the plurality of mobiie devices.
`
`143.
`
`(New) A method of controlling access by software applications to application
`
`programming interfaces (APIs) having at least one signature identifier on a subset of a plurality
`
`of mobile devices, the method comprising:
`
`generating digital signatures for software applications with signature identifications
`
`corresponding to respective signature identifiers of the APIs; and
`
`providing the digital signatures and the signature identifications to software applications
`
`that require access to at least one of the APIS on the subset ofthe piurality of mobile devices,
`
`where the signature identifications provided to the software applications comprise those
`
`signature identifications that correspond to the signature identifiers that are substantially only on
`
`the subset of the plurality of mobile devices; wherein each mobile device of the subset of the
`
`plurality of mobile devices comprises
`
`Page 1006 of 1415
`
`

`

`a verification system for authenticating digitai signatures provided by the reSpective
`
`the digital identifiers of the respective APIS; and
`
`a control system for allowing the software application to access at least one of the AFIS
`
`where the digital signature provided by the software application is authenticated by the
`
`verification system.
`
`144.
`
`(New) The method of claim 143, wherein a virtuai machine comprises the verification
`
`system and the control system.
`
`145.
`
`(New) The method of claim 144, wherein the virtual} machine is a Java virtual machine
`
`and the software applications are Java applications.
`
`146.
`
`(New) The method of claim 143, wherein the control system requires one digital
`
`signature and one signature identification for each library of at least one of the ANS.
`
`software applications to access respective APIs where the digital identifications correspond to
`
`CLl— 1513306v2
`
`147.
`
`(New) The method of claim 143, wherein the APIs access at ieast one of a cryptographic
`
`module, which implements cryptographic algorithms, a data store, a proprietary data model, and
`
`a user interface (UI).
`
`148.
`
`(New) The method of claim 143, wherein at ieast one of the digital signatures is
`
`generated using a private signature key under a signature scheme associated with a signature
`
`identification, and the verification system uses a public signature keys to authenticate said at
`
`least one of the digital signatures.
`
`149.
`
`(New) The method of claim 148, wherein:
`
`at least one of the digitai signatures is generated by applying the private signature key to
`
`a hash of a software appiication under the signature scheme; and
`
`the verification system authenticates said at least one of the digital signatures by
`
`generating a hash of the software appiication to obtain a generated hash, applying the public
`
`Page 1007 of 1415
`
`

`

`signature key to said at least one of the digitai signatures to obtain a recovered hash, and
`
`verifying that the generated hash with the recovered hash are the same.
`
`150.
`
`(New) The method of claim E43, wherein at least one of the APIs further comprises:
`
`a description string that is displayed to a user when the software application attempts to
`
`access said at least one of the APIs.
`
`CiJv 1513306v2
`
`where a digital signature provided by the software application is authenticated by the verification
`
`151.
`
`(New) The method of claim 143, wherein the subset of the plurality of mobile devices
`
`comprises mobile devices under the control of at least one of a corporation and a carrier.
`
`152.
`
`(New) A mobile device for a subset of a plurality of mobile devices, the mobiie device
`
`comprising:
`
`an application platform having appiication programming interfaces (APIS);
`
`a verification system for authenticating digital signatures and signature identifications
`
`provided by the respective software applications to access the APIs; and
`
`a controi system for allowing a software application to access at least one of the APIS
`
`system;
`
`wherein a code signing authority provides digitai signatures and signature identifications
`
`to software applications that require access to at ieast one of the APis such that the digital
`
`signature for the software application is generated according to a signature scheme of a signature
`
`identification, and wherein the signature identifications provided to the software applications
`
`comprise those signature identifications that are substantially only authorized to aiiow access on
`
`the subset of the pluraiity of mobile devices.
`
`153.
`
`(New) The mobile device of claim 152, wherein a virtual machine comprises the
`
`verification system and the control system
`
`154.
`
`(New) The mobile device of claim 153, wherein the virtual machine is a Java virtuai
`
`machine and the software application is a Java application.
`
`Page 1008 of 1415
`
`

`

`155.
`
`(New) The mobile device of claim 152, wherein the control system requires one digital
`
`signature and one signature identification for each library of at least one of the A913.
`
`156.
`
`(New) The mobile device of claim 152, wherein the APls of the application platform
`
`access at least one of a cryptographic module, which implements cryptographic algorithms, a
`
`data store, a proprietary data model, and a user interface (U1).
`
`157.
`
`(New) The mobile device of claim 152, wherein the digital signature is generated using a
`
`private signature key under the signature scheme, and the verification system uses a public
`
`signature key to authenticate the digital signature.
`
`software application to obtain a generated hash, applying the public signature key to the digital
`
`CLE- 15133G6v2
`
`158.
`
`(New) The mobile device of claim 157, wherein:
`
`the digital signature is generated by applying the private signature key to a hash ofthe
`
`software application under the signature scheme; and
`
`the verification system authenticates the digital signature by generating a hash of the
`
`signature to obtain a recovered hash, and verifying that the generated hash with the recovered
`
`hash are the same.
`
`l59.
`
`(New) The mobile device of claim 152, wherein at least one of the APIs further
`
`e omprises:
`
`a description string that is displayed to a user when the software application attempts to
`
`access said at least one of the APIs.
`
`160.
`
`(New) A method of controlling access to application programming interfaces (APls) of
`
`an application platform of a mobile device for a subset of a plurality of mobile devices, the
`
`method comprising:
`
`receiving digital signatures and signature identifications from software applications that
`
`require to access the APIs
`
`authenticating the digital signatures and the signature identifications; and
`
`Page 1009 of 1415
`
`

`

`allowing a software application to access at least one of the APIs where a digital
`
`signature provided by the software application is authenticated;
`
`wherein a code signing authority provides the digital signatures and the signature
`
`identifications to the software applications that require access to at least one of the APIs such
`
`that the digital signature for the software application is generated according to a signature
`
`scheme of a signature identification, and wherein the signature identifications provided to the
`
`software applications comprise those signature identifications that are snbstantiaily only
`
`authorized to ailow access on the subset of the pluraiity of mobile devices.
`
`161.
`
`(New) The method of claim 160, wherein one digital signature and one signature
`
`identification is required for accessing each library of at least one of the APis.
`
`i62,
`
`(New) The method of claim 160, wherein the APis ofthe application piatform access at
`
`proprietary data modei, and a user interface (Ui).
`
`least one of a cryptographic module, which implements cryptographic algorithms, 3 data store, a
`
`CLI- 15E3306v2
`
`163.
`
`(New) The method of ciaim 160, wherein the digital signature is generated using a
`
`private signature key under the signature scheme, and a public signature key is used to
`
`authenticate the digital signature.
`
`164.
`
`(New) The method of claim 163, wherein:
`
`the digital signature is generated by applying the private signature key to a hash of the
`
`software application. under the signature scheme; and
`
`the digital signature is authenticated by generating a hash of the software application to
`
`obtain a generated hash, applying the public signature key to the digital signature to obtain a
`
`recovered hash, and verifiing that the generated hash with the recovered hash are the same.
`
`Page 1010 of 1415
`
`

`

`165.
`
`(New) The method of claim I60, wherein at ieast one of the APIS further comprises:
`
`access said at least one of the AMS.
`
`a description string that is dispiayed to a user when the software application attempts to
`
`CLim 1513306V2
`
`Page 1011 of 1415
`
`

`

`REMARKS
`
`Respeetfilliy submit,
`
`Johm V; iernacki
`
`Regjo. 40,511
`
`Jon , Day
`North Point
`90} Lakeside Avenue
`
`Cleveland, OH 44114-1190
`(216) 586-7747
`
`This paper reSponds to the notice of n0n~e0mpliant amendment mailed May 21, 2007.
`The examiner is invited to contact the undersigned in case there are any questions or comments.
`
`C11- 15 E3306v2
`
`Page 1012 of 1415
`
`

`

`
`
`
`
`EFS ID: 1811276
`
`Application Number:
`
`10381219
`
`Title of Invention:
`
`Software code signing system and method
`
`Correspondence Address:
`
`David B Cochran
`
`Jones Day
`North Point
`
`901 Lakeside Avenue
`Cleveland
`
`US
`
`44114-1190
`
`Electronic Acknowledgement Receipt
`
`File Listing:
`
`Filer Authorized By:
`
`Stephen D. Scanlon
`
`
`
`Attorney Docket Number: 555255012423
`
`Receipt Date:
`
`25-MAY-2007
`
`Filing Date:
`
`20-MAR-2003
`
`Time Stamp:
`
`11:27:25
`
`Application Type:
`
`US. National Stage under 35 USC 371
`
`Payment information:
`
`Submitted with Payment
`
`Page 1013 of 1415
`
`

`

`
`
`Document
`
`Document Description
`
`File Name
`
`File Size(Bytes)
`
`Part/zip (if app”
`
`Document Description
`
`Preliminary Amendment
`
`Applicant Arguments/Remarks Made in an Amendment
`
`Warnings:
`Information:
`
`Total Files Size (in bytes):
`
`731624
`
`This Acknowledgement Receipt evidences receipt on the noted date by the USPTO of the indicated documents,
`characterized by the applicant, and including page counts, where applicable.
`It serves as evidence of receipt
`similar to a Post Card, as described in MPEP 503.
`
`New Applications Under 35 U.S.C. 111
`If a new application is being filed and the application includes the necessary components for a filing date (see
`37 CFR 1.53(b)-(d) and MPEP 506), a Filing Receipt (37 CFR 1.54) will be issued in due course and the date
`shown on this Acknowledgement Receipt will establish the filing date of the application.
`
`National Stage of an International Application under 35 U.S.C. 371
`If a timely submission to enter the national stage of an international application is compliant with the conditions
`of 35 U.S.C. 371 and other applicable requirements a Form PCT/D0/EO/903 indicating acceptance of the
`application as a national stage submission under 35 U.S.C. 371 will be issued in addition to the Filing Receipt,
`in due course.
`
`New International Application Filed with the USPTO as a Receiving Office
`If a new international application is being filed and the international application includes the necessary
`components for an international filing date (see PCT Article 11 and MPEP 1810), a Notification of the
`International Application Number and of the International Filing Date (Form PCT/RO/105) will be issued in due
`course, subiect to prescriptions concerning national security, and the date shown on this Acknowledgement
`
`
`
`Receipt will establish the international filing date of the application.
`
`Page 1014 of 1415
`
`

`

`7590
`_
`DaVId B Cochran
`
`05/2 I/2007
`
`Jones Day
`North Point
`90] Lakeside Avenue
`Cleveland, OH 44114-1190
`
`,
`
`'
`
`EXAMINER
`
`AVERY, JEREMIAH L
`ART UNIT
`PAPER NUMBER
`
`2m
`
`MAIL DATE
`
`05/21/2007
`
`DELIVERY MODE
`
`PAPER
`
`Please find below and/or attached an Office communication concerning this application or proceeding.
`
`The time period for reply, if any, is set in the attached communication.
`
`UNITED STATES PATENT AND TRADEMARK OFFICE
`
`APPLICATION NO.
`
`FILING DATE
`
`FIRST NAMED INVENTOR
`
`ATTORNEY DOCKET NO.
`
`CONFIRMATION N0.
`
`l0/381,2l9
`
`03/20/2003
`
`David P Yach
`
`555255012423
`
`976i
`
`UNITED STATES DEPARTMENT OF COMMERCE
`United States Patent and Trademark Office
`Address: COMMISSIONER FOR PATENTS
`PO. Box I450 ‘
`Alexandria. Virginia 22313- I450
`wwwiusplo.gov
`
`PTOL-90A (Rev. 04/07)
`
`Page 1015 of 1415
`
`

`

`' Notice of Non-Compliant
`
`10381219
`
`YACH ET AL.
`
`Jeremiah Ave
`
`2131
`
`E] 4. Amendments to the claims:
`[I A. A complete listing of all of the claims is not present.
`[:1 B. The listing of claims does not include the text of all pending claims (including withdrawn claims)
`[I C. Each claim has not been provided with the proper status identifier, and as such, the individual status
`of each claim cannot be identified. Note:
`the status of every claim must be indicated after its claim
`number by using one of the following status identifiers: (Original), (Currently amended), (Canceled),
`(Previously presented), (New), (Not entered), (Withdrawn) and (Withdrawn-currently amended).
`[:1 D. The claims of this amendment paper have not been presented in ascending numerical order.
`[:1 E. Other:
`
`Part of Paper No.
`
`— The MAILING DA TE of thls communication appears on the cover sheet with the correspondence address --
`
`The amendment document filed on 03 May 2007 is considered non-compliant because it has failed to meet the
`requirements of 37 CFR 1.121 or 1.4. In order for the amendment document to be compliant, correction of the following
`item(s) is required.
`
`THE FOLLOWING MARKED (X) ITEM(S) CAUSE THE AMENDMENT DOCUMENT TO BE NON-COMPLIANT:
`E] 1. Amendments to the specification:
`[:1 A. Amended paragraph(s) do not include markings.
`C] B. New paragraph(s) should not be underlined.
`[I C. Other
`
`[3 2. Abstract:
`[:1 A. Not presented on a separate sheet. 37 CFR 1.72.
`E] B. Other
`
`[I 3. Amendments to the drawings:
`1:! A. The drawings are 'not properly identified in the top margin as “Replacement Sheet," “New Sheet." or
`“Annotated Sheet" as required by 37 CFR 1.121(d).
`[:1 B. The practice of submitting proposed drawing correction has been eliminated. Replacement drawings
`showing amended figures, without markings, in compliance with 37 CFR 1.84 are required.
`[:1 C. Other___
`.
`
`8 5. Other (e.g., the amendment is unsigned or not signed in accordance with 37 CFR 1.4):
`Claims section should start on a seg’arate page from page 1.
`
`For further explanation of the amendment format required by 37 CFR 1.121, see MPEP § 714.
`
`TIME PERIODS FOR FILING A REPLY TO THIS NOTICE:
`
`1-. Applicant is given no new time period if the non-compliant amendment is an after-final amendment, an amendment
`filed after allowance, or a drawing submission (only).
`If applicant wishes to resubmit the non-compliant after-final
`amendment with corrections, the entire corrected amendment must be resubmitted.
`
`Applicant is given one month, or thirty (30) days, whichever is longer, from the mail date of this notice to supply the
`correction, if the non-compliant amendment is one of the following: a preliminary amendment, a non-final amendment
`(including a submission for a request for continued examination (RCE) under 37 CFR 1.114), a supplemental
`amendment filed within a suspension period under 37 CFR 1.103(a) or (c), and an amendment filed in response to a
`Quay/e action. If any of above boxes 1. to 4. are checked, the correction required is only the corrected section of the
`non-compliant amendment in compliance with 37 CFR 1.121.
`
`Extensions of time are available under 37 CFR 1.136(a) only if the non-compliant amendment is a non-final
`amendment or an amendment filed in response to a Quayle action.
`
`Failure to timely respond to this notice will result in:
`Abandonment of the application if the non-compliant amendment is a non-final amendment or an amendment
`filed in response to a Quay/e action; or
`Non-entry of the amendment if the non-compliant amendment is a preliminary amendment or supplemental
`amendment.
`
`Leal Instruments Examiner LIE if a licable
`U.S. Patent and Trademark Office
`
`Telehone No.
`
`Page 1016 of 1415
`
`

`

`Application No.
`
`»‘ Continuation Sheet (PTOL-324)
`PTOL-324 (04—06)
`
`Notice of Non-Compliant Amendment (37 CFR 1.121)
`
`Page 1017 of 1415
`
`

`

`v
`
`‘ Co'qtlnuanon Sheet (PTOL-324)
`
`Application No.
`
`Page 1018 of 1415
`
`

`

`PATENT
`
`IN THE UNITED STATES PATENT AND TRADEMARK OFFICE
`
`In the application of
`
`2
`
`David P. Yach; Michael S. Brown; Herbert A. Littie
`
`Internat'l. Appl'n‘ No. :
`
`PCT/CA01/01344
`
`Internat'l. Fiiing Date :
`
`09/20/2001
`
`US. Serial No.
`
`US. Filing Date
`
`10/381,219
`
`03/20f2003
`
`Priority Date Claimed:
`
`09/21f2000
`
`Gil—15 I 3306Vl
`
`This paper responds to the notice ofnonucornpliant amendment rnailed April 3, 2007.
`Any fees due should be charged to Jones Day Deposit Account No. 501432, ref: 555255-012423.
`
`:
`
`:
`
`:
`
`:
`
`:
`
`:
`
`Title
`
`Art Unit
`
`Examiner
`
`Docket No.
`
`Software Code Signing System And Method
`
`213 l
`
`J. Avery
`
`55525 5012423
`
`Commissioner for Patents
`
`Washington, DC. 20231
`
`Preiiminary Amendment
`
`Prior to taking up this case for initial examination, please amend the application as
`follows.
`
`The Claims
`
`Please oancei original oiaims 1—56.
`
`Please add the foliowing new claims 57—165.
`
`57,
`
`(New) A code signing system for operation in conjunction with a software application
`
`having a digital signature and a signature identification, where the digital signature is associated
`
`with the signature identification, comprising:
`
`Page 1019 of 1415
`
`

`

`an application platform;
`
`an application programing interface (API) having an associated signature identifier, the
`
`A131 is configured to link the software application with the application platform; and
`
`a virtual machine that verifies the authenticity of the digital signature in order to control
`
`access to the AH by the software application where the signature identifier corresponds to the
`
`signature identification.
`
`58.
`
`(New) The code signing system of claim 57, wherein the virtual machine denies the
`
`software application access to the API if the digital signature is not authenticated.
`
`59.
`
`(New) The code signing system of claim 57, wherein the virtual machine purges the
`
`software application if the digital signature is not authenticated.
`
`CLi-l513306v1
`
`identifier, each configured to link the software application with a resource on the application
`
`60.
`
`(New) The code signing system of ciairn 57, wherein the code signing system is installed
`
`on a mobile device.
`
`61.
`
`(New) The code signing system of claim 57, wherein the digital signature is generated by
`
`a code signing authority.
`
`62.
`
`(New) A code signing system for operation in conjunction with a software application
`
`having a digital signature and a signature identification where the digital signature is associated
`
`with the signature identification, comprising:
`
`an application platform;
`
`a plurality of application programming interfaces (APIs) associated with a signature
`
`platform; and
`
`a virtual machine that verifies the authenticity of the digital signature in order to control
`
`access to the APIs by the software application where the signature identification corresponds to
`
`the signature identifier,
`
`wherein the virtual machine verifies the authenticity of the digital signature in order to
`
`control access to the plurality of APIs by the software application.
`
`Page 1020 of 1415
`
`

`

`63.
`
`(New) The code signing system of claim 62, wherein the plurality of APIs are included
`
`in an AP! library.
`
`64.
`
`(New) The code signing system of claim 62, wherein one or more of the plurality of
`
`A1915 is classified as sensitive and having an associated signature identifier, and wherein the
`
`virtual machine uses the digital signature and the signature identification to control access to the
`
`sensitive APIs.
`
`65.
`
`(New) The code signing system of claim 64, wherein the code signing system operates
`
`in. conjunction with a plurality of software applications, wherein one or more of the plurality of
`
`software applications has a digital signature and a signature identification, and wherein the
`
`virtual machine verifies the authenticity of the digital signature of each of the one or more of the
`
`plurality of software applications, where the signature identification corresponds to the signature
`
`of the plurality of software applications.
`
`identifier of the respective sensitive APIs, in order to control access to the sensitive APIs by each
`
`CLE-lSifBGévi
`
`66.
`
`(New) The code signing system of claim 62, wherein the resource on the application
`
`platform comprises a wireless communication system.
`
`67.
`
`(New) The code signing system of claim 62, wherein the resource on the application
`
`platform comprises a cryptographic module which implements cryptographic algorithms.
`
`68.
`
`(New) The code signing system of claim 62, wherein the resource on the application
`
`platform comprises a data store.
`
`69.
`
`(New) The code signing system of claim 62, wherein the resource on the application
`
`platform comprises a user interface (U1).
`
`70.
`
`(New) The code signing system of claim 57, further comprising:
`
`Page 1021 of 1415
`
`

`

`a plurality of API libraries, each of the plurality of APE libraries includes a plurality of
`
`application.
`
`71.
`
`(New) The code signing system of claim 70, wherein at least one of the plurality of API
`
`libraries is classified as sensitive;
`
`wherein access to a sensitive API library requires a digital signature associated with a
`
`signature identification where the signature identification corresponds to a signature identifier
`
`associated with the sensitive APE library;
`
`wherein the software application includes at least one digital signature and at least one
`
`associated signature identification for accessing sensitive APi libraries; and
`
`wherein the virtual rnachine authenticates the software application for accessing the
`
`sensitive API library by verifying the one digital signature included in the software application
`
`that has a signature identification corresponding to the

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket