throbber
I IIIII IIIIIIII Ill lllll lllll lllll lllll lllll lllll lllll lllll 111111111111111111
`US007243236B 1
`
`c12) United States Patent
`Sibert
`
`(IO) Patent No.:
`(45) Date of Patent:
`
`US 7,243,236 Bl
`Jul. 10, 2007
`
`(54) SYSTEMS AND METHODS FOR USING
`CRYPTOGRAPHY TO PROTECT SECURE
`AND INSECURE COMPUTING
`ENVIRONMENTS
`
`(75)
`
`Inventor: W. Olin Sibert, Lexington, MA (US)
`
`(73) Assignee: Intertrust Technologies Corp.,
`Sunnyvale, CA (US)
`
`( *) Notice:
`
`Subject to any disclaimer, the term of this
`patent is extended or adjusted under 35
`U.S.C. 154(b) by 544 days.
`
`OTHER PUBLICATIONS
`
`Shimshon Berkovits, et al., Authentication of Mobile Agents,
`Mobile Agents and Security, Springer-Verlag, Giovanni Vigna, Ed.,
`1998, pp. 114-136.
`
`(Continued)
`
`Primary Examiner-Nasser Moazzami
`Assistant Examiner----Carl Colin
`(74) Attorney, Agent, or Firm-Finnegan, Henderson,
`Farabow, Garrett & Dunner LLP
`
`(21) Appl. No.: 09/628,692
`
`(22) Filed:
`
`Jul. 28, 2000
`
`Related U.S. Application Data
`
`(60) Provisional application No. 60/146,426, filed on Jul.
`29, 1999.
`
`(51)
`
`Int. Cl.
`H04L 9/00
`(2006.01)
`(52) U.S. Cl. ...................... 713/179; 713/168; 713/169;
`726/2; 380/255; 702/35
`( 58) Field of Classification Search ... ... ... ... .. .. 719/331;
`713/201, 179; 62/259.2; 324/760
`See application file for complete search history.
`
`(56)
`
`References Cited
`
`U.S. PATENT DOCUMENTS
`3,573,747 A
`4/1971 Adams et al.
`3,609,697 A
`9/1971 Blevins
`3,796,830 A
`3/1974 Smith
`3,798,359 A
`3/1974 Feistel
`3,798,360 A
`3/1974 Feistel
`3,798,605 A
`3/1974 Feistel
`3,806,882 A
`4/1974 Clarke
`(Continued)
`
`AU
`
`FOREIGN PATENT DOCUMENTS
`A-36815/97
`2/1998
`(Continued)
`
`(57)
`
`ABSTRACT
`
`Computation environments are protected from bogus or
`rogue load modules, executables, and other data elements
`through use of digital signatures, seals, and certificates
`issued by a verifying authority. A verifying authority(cid:173)
`which may be a trusted independent third party-tests the
`load modules and/or other items to verify that their corre(cid:173)
`sponding specifications are accurate and complete, and then
`digitally signs them based on a tamper resistance work
`factor classification. Secure computation environments with
`different tamper resistance work factors use different digital
`signature authentication techniques ( e.g., different signature
`algorithms and/or signature verification keys), allowing one
`tamper resistance work factor environment to protect itself
`against load modules from another tamper resistance work
`factor environment. The verifying authority can provide an
`application intended for insecure environments with a cre(cid:173)
`dential having multiple elements covering different parts of
`the application. To verify the application, a trusted element
`can issue challenges based on different parts of the authen(cid:173)
`ticated credential that the trusted element selects in an
`unpredictable (e.g., random) way, and deny service (or take
`other appropriate action) if the responses do not match the
`authenticated credential.
`
`27 Claims, 28 Drawing Sheets
`
`EXAMPLE CREDENTIAL VALIDATION
`
`Page 1 of 50
`
`GOOGLE EXHIBIT 1015
`
`

`

`U.S. PATENT DOCUMENTS
`
`3,829,833 A
`3,906,448 A
`3,911,397 A
`3,924,065 A
`3,931,504 A
`3,946,220 A
`3,956,615 A
`3,958,081 A
`3,970,992 A
`4,048,619 A
`4,071,911 A
`4,112,421 A
`4,120,030 A
`4,163,280 A
`4,168,396 A
`4,196,310 A
`4,200,913 A
`4,209,787 A
`4,217,588 A
`4,220,991 A
`4,232,193 A
`4,232,317 A
`4,236,217 A
`4,253,157 A
`4,262,329 A
`4,265,371 A
`4,270,182 A
`4,278,837 A
`4,305,131 A
`4,306,289 A
`4,309,569 A
`4,319,079 A
`4,323,921 A
`4,328,544 A
`4,337,483 A
`4,361,877 A
`4,375,579 A
`4,433,207 A
`4,434,464 A
`4,442,486 A
`4,446,519 A
`4,454,594 A
`4,458,315 A
`4,462,076 A
`4,462,078 A
`4,465,901 A
`4,471,163 A
`4,484,217 A
`4,494,156 A
`4,513,174 A
`4,528,588 A
`4,528,643 A
`4,553,252 A
`4,558,176 A
`4,558,413 A
`4,562,306 A
`4,562,495 A
`4,577,289 A
`4,584,641 A
`4,588,991 A
`4,589,064 A
`4,593,353 A
`4,593,376 A
`4,595,950 A
`4,597,058 A
`4,634,807 A
`4,644,493 A
`4,646,234 A
`4,652,990 A
`4,658,093 A
`4,670,857 A
`
`8/1974 Freeny, Jr.
`9/1975 Henriques
`10/1975 Freeny, Jr.
`12/1975 Freeny, Jr.
`1/1976 Jacoby
`3/1976 Brobeck et al.
`5/1976 Anderson et al.
`5/1976 Ehrsam et al.
`7/1976 Boothroyd et al.
`9/1977 Forman et al.
`1/1978 Mazur
`9/1978 Freeny, Jr.
`10/1978 Johnstone
`7/1979 Mori et al.
`9/1979 Best
`4/1980 Forman et al.
`4/1980 Kuhar et al.
`6/1980 Freeny, Jr.
`8/1980 Freeny, Jr.
`9/1980 Hamano et al.
`11/1980 Gerard
`11/1980 Freeny, Jr.
`11/1980 Kennedy
`2/1981 Kirschner et al.
`4/1981 Bright et al.
`5/1981 Desai et al.
`5/1981 Asija
`7/1981 Best
`12/1981 Best
`12/1981 Lumley
`1/1982 Merkle
`3/1982 Best
`4/1982 Guillou
`5/1982 Baldwin et al.
`6/1982 Guillou
`11/1982 Dyer et al.
`3/1983 Davida et al.
`2/1984 Best
`2/1984 Suzuki et al.
`4/1984 Mayer
`5/1984 Thomas
`6/1984 Heffron et al.
`7/1984 Uchenick
`7/1984 Smith, III
`7/1984 Ross
`8/1984 Best
`9/1984 Donald et al.
`11/1984 Block et al.
`1/1985 Kadison et al.
`4/1985 Herman
`7/1985 Liifberg
`7/1985 Freeny, Jr.
`11/1985 Egendorf
`12/1985 Arnold et al.
`12/1985 Schmidt et al.
`12/1985 Chou et al.
`12/1985 Bond et al.
`3/1986 Comerford et al.
`4/1986 Guglielmino
`5/1986 Atalla
`5/1986 Chiba et al.
`6/1986 Pickholtz
`6/1986 Volk
`6/1986 Liifberg
`6/1986 Izumi et al.
`1/1987 Chorley et al.
`2/1987 Chandra et al.
`2/1987 Tolman et al.
`3/1987 Pailen et al.
`4/1987 Hellman
`6/1987 Rackman
`
`US 7,243,236 Bl
`Page 2
`
`4,672,572 A
`4,677,434 A
`4,680,731 A
`4,683,553 A
`4,685,056 A
`4,688,169 A
`4,691,350 A
`4,696,034 A
`4,701,846 A
`4,712,238 A
`4,713,753 A
`4,740,890 A
`4,747,139 A
`4,757,533 A
`4,757,534 A
`4,768,087 A
`4,791,565 A
`4,796,181 A
`4,799,156 A
`4,807,288 A
`4,817,140 A
`4,823,264 A
`4,827,508 A
`4,858,121 A
`4,864,494 A
`4,868,877 A
`4,903,296 A
`4,924,378 A
`4,930,073 A
`4,949,187 A
`4,977,594 A
`4,999,806 A
`5,001,752 A
`5,005,122 A
`5,005,200 A
`5,010,571 A
`5,023,907 A
`5,047,928 A
`5,048,085 A
`5,050,213 A
`5,091,966 A
`5,103,392 A
`5,103,476 A
`5,111,390 A
`5,119,493 A
`5,128,525 A
`5,136,643 A
`5,136,646 A
`5,136,647 A
`5,136,716 A
`5,146,575 A
`5,148,481 A
`5,155,680 A
`5,163,091 A
`5,168,147 A
`5,185,717 A
`5,187,787 A
`5,201,046 A
`5,201,047 A
`5,208,748 A
`5,214,702 A
`5,216,603 A
`5,221,833 A
`5,222,134 A
`5,224,160 A
`5,224,163 A
`5,235,642 A
`5,245,165 A
`5,247,575 A
`5,257,369 A
`5,260,999 A
`5,263,158 A
`5,265,164 A
`
`6/1987 Alsberg
`6/1987 Fascenda
`7/1987 Izumi et al.
`7/1987 Mollier
`8/1987 Barnsdale et al.
`8/1987 Joshi
`9/1987 Kleijne et al.
`9/1987 Wiedemer
`10/1987 Ikeda et al.
`12/1987 Gilhousen et al.
`12/1987 Boebert et al.
`4/1988 William
`5/1988 Taaffe
`7/1988 Allen et al.
`7/1988 Matyas et al.
`8/1988 Taub et al.
`12/1988 Dunham et al.
`1/1989 Wiedemer
`1/1989 Shavit et al.
`2/1989 Ugon et al.
`3/1989 Chandra et al.
`4/1989 Deming
`5/1989 Shear
`8/1989 Barber et al.
`9/1989 Kobus
`9/1989 Fischer
`2/1990 Chandra et al.
`5/1990 Hershey et al.
`5/1990 Cina, Jr.
`8/1990 Cohen
`12/1990 Shear
`3/1991 Chernow et al.
`3/1991 Fischer
`4/1991 Griffin et al.
`4/1991 Fischer
`4/1991 Katznelson
`6/1991 Johnson et al.
`9/1991 Wiedemer
`9/1991 Abraham et al.
`9/1991 Shear
`2/1992 Bloomberg et al.
`4/1992 Mori
`4/1992 Waite et al.
`5/1992 Ketcham
`6/1992 Janis et al.
`7/1992 Stearns et al.
`8/1992 Fischer
`8/1992 Haber et al.
`8/1992 Haber et al.
`8/1992 Harvey et al.
`9/1992 Nolan, Jr.
`9/1992 Abraham et al.
`10/1992 Wiedemer
`11/1992 Graziano
`12/1992 Bloomberg
`2/1993 Mori
`2/1993 Skeen et al.
`4/1993 Goldberg et al.
`4/1993 Maki et al.
`5/1993 Flores et al.
`5/1993 Fischer
`6/1993 Flores et al.
`6/1993 Hecht
`6/1993 Waite et al.
`6/1993 Paulini et al.
`6/1993 Gasser et al.
`8/1993 Wobber et al.
`9/1993 Zhang
`9/1993 Sprague et al.
`10/1993 Skeen et al.
`11/1993 Wyman
`11/1993 Janis
`11/1993 Matyas et al.
`
`Page 2 of 50
`
`

`

`US 7,243,236 Bl
`Page 3
`
`5,276,735 A
`5,280,479 A
`5,285,494 A
`5,301,231 A
`5,311,591 A
`5,319,705 A
`5,337,360 A
`5,341,429 A
`5,343,527 A
`5,347,579 A
`5,351,293 A
`5,355,474 A
`5,373,561 A
`5,388,211 A
`5,390,247 A
`5,390,330 A
`5,392,220 A
`5,392,390 A
`5,394,469 A
`5,410,598 A
`5,412,717 A
`5,421,006 A
`5,422,953 A
`5,428,606 A
`5,432,950 A
`5,438,508 A
`5,442,645 A
`5,444,779 A
`5,449,895 A
`5,449,896 A
`5,450,493 A
`5,453,601 A
`5,453,605 A
`5,455,407 A
`5,455,861 A
`5,455,953 A
`5,457,746 A
`5,463,565 A
`5,473,687 A
`5,473,692 A
`5,479,509 A
`5,485,622 A
`5,491,800 A
`5,497,479 A
`5,497,491 A
`5,499,298 A
`5,504,757 A
`5,504,818 A
`5,504,837 A
`5,508,913 A
`5,509,070 A
`5,513,261 A
`5,517,518 A
`5,530,235 A
`5,530,752 A
`5,533,123 A
`5,534,975 A
`5,537,526 A
`5,539,735 A
`5,539,828 A
`5,550,971 A
`5,553,282 A
`5,557,518 A
`5,557,798 A
`5,563,946 A
`5,568,552 A
`5,572,673 A
`5,592,549 A
`5,603,031 A
`5,606,609 A
`5,613,004 A
`5,621,797 A
`5,629,980 A
`
`1/1994 Boebert et al.
`1/1994 Mary
`2/1994 Sprecher et al.
`4/1994 Abraham et al.
`5/1994 Fischer
`6/1994 Halter et al.
`8/1994 Fischer
`8/1994 Stringer et al.
`8/1994 Moore
`9/1994 Blandford
`9/1994 Michener et al.
`10/1994 Thurasingham et al.
`12/1994 Haber et al.
`2/1995 Hornbuckle
`2/1995 Fischer
`2/1995 Talati
`2/1995 Van den Hamer et al.
`2/1995 Crozier
`2/1995 Nagel et al.
`4/1995 Shear
`5/1995 Fischer
`5/1995 Jablon
`6/1995 Fischer
`6/1995 Moskowitz
`7/1995 Sibigtroth
`8/1995 Wyman
`8/1995 Ugon
`8/1995 Daniele
`9/1995 Hecht et al.
`9/1995 Hecht et al.
`9/1995 Maher
`9/1995 Rosen
`9/1995 Hecht et al.
`10/1995 Rosen
`10/1995 Faucher et al.
`10/1995 Russell
`10/1995 Dolphin
`10/1995 Cookson et al.
`12/1995 Lipscomb et al.
`12/1995 Davis
`12/1995 Ugon
`1/1996 Yamaki
`2/1996 Goldsmith et al.
`3/1996 Hornbuckle
`3/1996 Mitchell et al.
`3/1996 N arasirnhalu et al.
`4/1996 Cook et al.
`4/1996 Okano
`4/1996 Griffeth et al.
`4/1996 Yamamoto et al.
`4/1996 Schull
`4/1996 Maher
`5/1996 Morson et al.
`6/1996 Stefik et al.
`6/1996 Rubin
`7/1996 Force et al.
`7/1996 Stefik et al.
`7/1996 Anderson et al.
`7/1996 Moskowitz
`7/1996 Davis
`8/1996 Brunner et al.
`9/1996 Parrish et al.
`9/1996 Rosen
`9/1996 Skeen et al.
`10/1996 Cooper et al.
`10/1996 Davis
`11/1996 Shurts
`1/1997 Nagel et al.
`2/1997 White et al.
`2/1997 Houser et al.
`3/1997 Cooperman et al.
`4/1997 Rosen
`5/1997 Stefik et al.
`
`........... 713/200
`
`5/1997 Davis et al.
`5,633,932 A
`5/1997 Stefik et al.
`5,634,012 A
`6/1997 Brugger
`5,636,276 A
`6/1997 Rhoads
`5,636,292 A
`6/1997 Stefik et al.
`5,638,443 A
`6/1997 Scott et al.
`5,638,504 A
`6/1997 Gopinath et al.
`5,640,546 A
`8/1997 Jones et al.
`5,655,077 A
`11/1997 Moskowitz et al.
`5,687,236 A
`11/1997 Bender et al.
`5,689,587 A
`11/1997 Mc Manis
`5,692,047 A
`11/1997 Lee
`5,692,180 A
`1/1998 Rhoads
`5,710,834 A
`2/1998 Stefik
`5,715,403 A
`2/1998 Dedrick
`5,717,923 A
`3/1998 Chang et al.
`5,724,425 A
`4/1998 Reilly et al.
`5,740,549 A
`4/1998 Moskowitz et al.
`5,745,569 A
`4/1998 Rhoads
`5,745,604 A
`5,745,678 A * 4/1998 Herzberg et al.
`5,748,763 A
`5/1998 Rhoads
`5,748,783 A
`5/1998 Rhoads
`5,748,960 A
`5/1998 Fischer
`5/1998 Dyer et al.
`5,754,849 A
`5,757,914 A
`5/1998 Mc Manis
`5,758,152 A
`5/1998 LeTourneau
`5,765,152 A
`6/1998 Erickson
`5,768,426 A
`6/1998 Rhoads
`10/1998 Bromley et al.
`5,819,263 A
`5,842,173 A
`11/1998 Strum et al.
`5,892,900 A
`4/1999 Ginter et al.
`5,896,454 A
`4/1999 Cookson et al.
`5,910,987 A
`6/1999 Ginter et al.
`5,915,019 A
`6/1999 Ginter et al.
`5,917,912 A
`6/1999 Ginter et al.
`5,920,861 A
`7/1999 Hall et al.
`5,940,504 A
`8/1999 Griswold
`5,940,505 A
`8/1999 Kanamaru
`5,943,422 A
`8/1999 Van Wie et al.
`5,949,876 A
`9/1999 Ginter et al.
`5,970,145 A * 10/1999 McManis .................... 713/187
`5,982,891 A
`11/1999 Ginter et al.
`5,991,399 A * 11/1999 Graunke et al . ............ 380/279
`5,999,949 A
`12/1999 Crandall
`12/1999 Sako et al.
`6,009,170 A
`6,009,543 A * 12/1999 Shavit ........................ 712/200
`6,016,393 A
`1/2000 White et al.
`6,047,242 A * 4/2000 Benson ........................ 702/35
`6,112,181 A
`8/2000 Shear et al.
`6,138,119 A
`10/2000 Hall et al.
`6,148,083 A * 11/2000 Fieres et al. ................ 380/255
`6,157,721 A
`12/2000 Shear et al.
`6,185,683 Bl
`2/2001 Ginter et al.
`6,237,786 Bl
`5/2001 Ginter et al.
`6,240,185 Bl
`5/2001 Van Wie et al.
`6,253,193 Bl
`6/2001 Ginter et al.
`6,292,569 Bl
`9/2001 Shear et al.
`6,820,200 B2 * 11/2004 Takeuchi et al . ............ 713/179
`
`FOREIGN PATENT DOCUMENTS
`
`AU
`AU
`BE
`DE
`EP
`EP
`EP
`EP
`EP
`EP
`EP
`EP
`
`A-36816/97
`A-36840/97
`9 004 79
`3803982 Al
`0128672 Al
`0 084 441 Al
`0 135 422 Al
`0 180 460 Al
`0 370 146 Al
`0 398 645 Bl
`0399822 A2
`0421409 A2
`
`2/1998
`2/1998
`12/1984
`1/1990
`12/1980
`7 /1983
`3/1985
`5/1986
`5/1990
`11/1990
`11/1990
`4/1991
`
`Page 3 of 50
`
`

`

`EP
`EP
`EP
`EP
`EP
`EP
`EP
`EP
`EP
`EP
`EP
`EP
`EP
`EP
`EP
`EP
`EP
`EP
`EP
`EP
`EP
`EP
`GB
`GB
`GB
`GB
`JP
`JP
`JP
`JP
`JP
`JP
`JP
`JP
`JP
`JP
`JP
`JP
`JP
`JP
`JP
`JP
`JP
`JP
`JP
`JP
`JP
`JP
`JP
`JP
`JP
`WO
`WO
`WO
`WO
`WO
`WO
`WO
`WO
`WO
`WO
`WO
`WO
`WO
`WO
`WO
`WO
`WO
`WO
`WO
`WO
`WO
`WO
`
`0 456 386 A2
`0 469 864 A2
`0565314 Bl
`0 570 123 Bl
`0 593 305 A2
`0 651 554 Al
`0 668 695 A2
`0 695 985 Al
`0 696 798 Al
`0 714 204 A2
`0 715 243 Al
`0 715 244 Al
`0 715 245 Al
`0 715 246 Al
`0 715 247 Al
`0 749 081 Al
`0 725 376 A2
`0 763 936 A2
`0 778 513 A2
`0 795 873 A2
`0 800 312 Al
`0 913 757 A2
`2 136 175 A
`2264796 A
`2 294 348 A
`2 295 947 A
`57-000726
`62-225059
`62-241061
`01-068835
`64-068835
`02-242352
`02-247763
`02-294855
`04-369068
`05-181734
`05-257783
`05-268415
`06-175794
`06-215010
`06-225059
`07-056794
`07-084852
`07-141138
`07-200317
`07-200492
`07-244639
`08-137795
`08-152990
`08-185292
`08-185298
`WO 85/02310
`WO 85/03584
`WO 90/02382
`WO 92/06438
`WO 92/22870
`WO 93/01550
`WO 94/01821
`WO 94/03859
`WO 94/06103
`WO 94/16395
`WO 94/18620
`WO 94/22266
`WO 94/27406
`WO 95/14289
`WO 96/00963
`WO 96/03835
`WO 96/05698
`WO 96/06503
`WO 96/13013
`WO 96/21192
`WO 96/24092
`WO 96/27155
`
`11/1991
`2/1992
`10/1993
`11/1993
`4/1994
`5/1995
`8/1995
`2/1996
`2/1996
`5/1996
`6/1996
`6/1996
`6/1996
`6/1996
`6/1996
`6/1996
`8/1996
`9/1996
`6/1997
`9/1997
`10/1997
`5/1999
`9/1984
`9/1993
`4/1996
`6/1996
`1/1982
`10/1987
`10/1987
`3/1989
`3/1989
`9/1990
`10/1990
`12/1990
`12/1992
`7 /1993
`10/1993
`10/1993
`6/1994
`8/1994
`8/1994
`3/1995
`3/1995
`6/1995
`8/1995
`8/1995
`9/1995
`5/1996
`6/1996
`7 /1996
`7 /1996
`5/1985
`8/1985
`3/1990
`4/1992
`12/1992
`1/1993
`1/1994
`2/1994
`3/1994
`7 /1994
`8/1994
`9/1994
`11/1994
`5/1995
`1/1996
`2/1996
`2/1996
`2/1996
`5/1996
`7 /1996
`8/1996
`9/1996
`
`US 7,243,236 Bl
`Page 4
`
`WO
`WO
`WO
`WO
`WO
`WO
`WO
`WO
`WO
`WO
`WO
`WO
`WO
`
`WO 97/03423
`WO 97/07656
`WO 97/25816
`WO 97/32251
`WO 97/43761
`WO 97/48203
`WO 98/09209
`WO 98/10381
`WO 98/37481
`WO 98/45768
`WO 99/01815
`WO 99/24928
`WO 99/48296
`
`1/1997
`3/1997
`7 /1997
`9/1997
`11/1997
`12/1997
`3/1998
`3/1998
`8/1998
`10/1998
`1/1999
`5/1999
`9/1999
`
`OTHER PUBLICATIONS
`
`M. Blaze, et al., Decentralized Trust Management, Proc. IEEE
`Conference on Security and Privacy, 1996, pp. 164-173.
`David Chess, Security Issues in Mobile Code Systems, Mobile
`Agents and Security, Springer-Verlag, Giovanni Vigna, Ed., 1998,
`pp. 1-14.
`C. Ellison, et al., SPKI Certificate Theory, Internet Engineering
`Task Force (IETF) RFC 2693 -Sep. 1999, pp. 1-38, available at
`http://www.ietf.org/rfc/rfc2693 .txt?nurnbeF2693.
`Fritz Hohl, Time Limited Blackbox Security: Protecting Mobile
`Agents from Malicious Hosts, Lecture Notes in Computer Science,
`vol. 1419: Mobile Agents and Security, Springer-Verlag, 1998, G.
`Vigna, Ed., pp. 90-111.
`Li Gong, et al., Signing, Sealing and Guarding Java Objects,
`Mobile Agents and Security, G. Vigna, editor, Springer-Verlag,
`1998, vol. 1419 of LNCS, pp. 206-216.
`Tomas Sander et al., Towards Mobile Cryptography, IEEE Proceed(cid:173)
`ings of Security and Privacy, 1998, pp. 1-10.
`Tomas Sander et al., Protecting Mobile Agents Against Malicious
`Hosts, Mobile Agents and Security: Lecture Notes in Computer
`Science, Springer-Verlag, G. Vigna, Ed., vol. 1419, 1998, pp. 1-16.
`Steve R. White, ABYSS: A Trusted Architecture for Software Pro(cid:173)
`tection, IBM Thomas J. Watson Research Center, Yorktown
`Heights, New York 10598, 1987, pp. 38-51.
`"Microsoft Authenticode Technology", Microsoft Corporation, Oct.
`1996.
`Abadi, M. et al., "Authentication and Delegation with Smart-cards,"
`Technical Report 67, DEC Systems Research Center, available as of
`Oct.
`1990
`at
`<http://citeseer.nj.nec.com/article/
`abadi92authentication.html>, pp. 1-22.
`Ameke, D. et al., "AT&T Encryption System Protects Information
`Services," Jan. 9, 1995, 1 page.
`Baggett, D., "Cable's Emerging Role in the Information Superhigh(cid:173)
`way," Cable Labs, undated, 13 slides.
`Barassi, T.S., "The Cybernotary: Public Key Registration and
`Certification and Authentication of International Legal Transac(cid:173)
`tions," undated, prior to 1997, 4 pages.
`Barnes, H., memo to H. LaMuth, subject: George Gilder articles,
`May 31, 1994, 2 pages.
`Bart, D., "Comments in the Matter of Public Hearing and Request
`for Comments on the International Aspects of the National Infor(cid:173)
`mation Infrastructure," Aug. 12, 1994, 17 pages.
`Baum, M., "Worldwide Electronic Commerce: Law, Policy and
`Controls Conference," Nov. 11, 1993, 18 pages.
`Best, R.M., "Preventing Software Piracy With Crypto-Micropro(cid:173)
`cessors," Digest of Papers, VLSI: New Architectural Horizons, Feb.
`1980, pp. 466-469.
`Bisbey II, R.L. et al., "Encapsulation: An Approach to Operating
`System Security," USC/Information Science Institute, Marina Del
`Rey, CA, Oct. 1973, pp. 666-675.
`Blaze, M., "A Cryptographic File System for Unix," pre-print of
`paper for First ACM Conference on Computer and Communications
`Security, Fairfax, Virginia, Nov. 3-5, 1993, 8 pages.
`Blaze, M., "Key Management in an Encrypting File System,"
`available as of Aug. 23, 2002 at <http://www.usenix.org/
`publicaitons/libratry/proceedings/bos94/full_papers/blaze.asp>,
`pp. 1-12.
`
`Page 4 of 50
`
`

`

`US 7,243,236 Bl
`Page 5
`
`Blom, R. et al., "Encryption Methods in Data Networks," Ericsson
`Technics, No. 2, Stockholm, Sweden, 1978, pp. 72-105.
`Bruner, R.E., "Power Agent, NetBot Help Advertisers Reach
`Internet Shoppers," visited on Aug. 13, 1997, 2 pages.
`Caruso, D., "Technology, Digital Commerce: 2 Plans for Water(cid:173)
`marks, Which Can Bind Proof of Authorship to Electronic Works,"
`N.Y. Times, Aug. 7, 1995, p. D5.
`Castano, S. et al., Database Security, Addison-Wesley &Acm Press,
`1995.
`Champine, G., MIT Project Athena: A Model for Distributed Cam(cid:173)
`pus Computing, Digital Equipment Corporation, 1991.
`Chaum, D., "Achieving Electronic Privacy," Scientific American,
`Aug. 1992, pp. 96-101.
`Chaum, D., et al. "Wallet databases with observers," Ernest F.
`Brickell, editor, Advances in Cryptology -CRY.PTO '92, 12th
`Annual International Cryptology Conference, Santa Barbara, CA,
`Aug. 16-20, 1992, Proceedings, pp. 89-105.
`Chaum, D., "Security Without Identification Card Computers to
`Make Big Brother Obsolete," available at <http://www.chaum.com/
`articles/Security_ Without_Identification.htrn, visited on Aug. 23,
`2002, 24 pages.
`"List of Articles," <http://www.chaum.com/articles/list-of-articles.
`htrn>, visited on Aug. 23, 2002, 4 pages.
`Choudhury, A.K., et al., "Copyright Protection for Electronic Pub(cid:173)
`lishing Over Computer Networks," AT&T Bell Laboratories, Mur(cid:173)
`ray Hill, NJ, Jun. 1994, 18 pages.
`Clark, T., "Ad Service Gives Cash Back," <http://www.news.com/
`News/Item/0,4,13050,00.htrnl>, visited Aug. 13, 1997, 2 pages.
`Cohen, F.B., "Operating System Protection Through Program Evo(cid:173)
`lution," 8246 Computers & Security, No. 6, (Oxford, Great Britain)
`Oct. 1993, available at <http://all.net/books/IP/evolve.htrnl, visited
`on May 31, 2002, 22 pages.
`Cox, B., "What If There is a Silver Bullet and the competition gets
`it first?" Journal of Object-Oriented Progranuning, Jun. 1992,
`available
`at
`<http://www.virtualschool.edu/cox/
`CoxWhatifSilverBullet.html>, pp.1-5, visited on Aug. 23, 2002.
`Cunningham, D., et al., "AT&T, VLSI Technology Join To Improve
`Info Highway Security,"(News Release) Jan. 31, 1995, 3 pages.
`CUPID Protocols and Services (Version 1 ): "An Architectural
`Overview,"Nov. 1992, available at <http://www.cni.org/projects/
`CUPID>, 25 pages.
`Custer, H. Inside Windows NT, Microsoft Press, Redmond WA,
`1993.
`Davies, D. et al., Security for Computer Networks, John Wiley &
`Sons, 1989.
`Dempsey L .. , "The Warwick Metadata Workshop: A Framework for
`the Deployment of Resource Description," D-Lib Magazine, Jul./
`Aug. 1996, 8 pages.
`Denning, D.E., Cryptography and Data Security, Addison-Wesley,
`Reading MA. 1983.
`Denning, D.E. et al., Data Security, 11 Computing Surveys No. 3,
`Sep. 1979, pp. 227-249.
`Denning, D.E., "Secure Personal Computing in an Insecure Net(cid:173)
`work," Communications of the ACM, Aug. 1979, vol. 22, No. 8, pp.
`476-482.
`Diffie, W. et al., "New Directions in Cryptography," IEEE Trans(cid:173)
`actions on Information Theory, vol. 22, No. 6, Nov. 1976, pp.
`644-651.
`Diffie, W. et al., "Privacy and Authentication: An Introduction to
`Cryptography," Proceedings of the IEEE, vol. 67, No. 3, Mar. 1979,
`pp. 397-427.
`Dusse, S.R. et al., "A Cryptographic Library for the Motorola DSP
`56000," Advances in Cryptology-Proceedings of Eurocrypt 90,
`(I.M. Damgard, ed., Springer-Verlag) 1991, pp. 230-244.
`Dyson, E., "Intellectual Value," WIRED Magazine, Jul. 1995, pp.
`136-141 and 182-184.
`Garcia, D.L., "Before a Hearing on Science, Space and Technol(cid:173)
`ogy," Subcommittee on Technology, Environment, and Aviation,
`May 26, 1994, pp. 97-108.
`Gleick, J., "Dead as a Dollar," The New York Times Magazine, Jun.
`16, 1996, Sect. 6, pp. 26-30, 35, 42, 50, 54.
`Greguras, F., "Softic Symposium '95, Copyright Clearances and
`Moral Rights, "Dec. 11, 1995, 3 pages.
`
`Guillou, L.C., "Smart Cards and Conditional Access," Advances in
`Cryptography-Proceedings of EuroCrypt 84 (T. Beth et al, ed.,
`Springer-Verlag, 1985) 10 pages.
`Haar, S.V., "PowerAgent Launches Commercial Service," Interac(cid:173)
`tive Week, Aug. 4, 1997, 1 page.
`Harman, H., Modern Factor Analysis, Third Edition Revised,
`University of Chicago Press, Chicago and London, 1976, table of
`contents, 5 pages.
`Hearst, M.A., "Interfaces for Searching The Web," Scientific Ameri(cid:173)
`can, Mar. 1997, pp. 68-72.
`Herzberg, A. et al., "Public Protection of Software," ACM Trans(cid:173)
`actions on Computer Systems, vol. 5, No. 4, Nov. 1987, pp.
`371-393.
`Hofmann, J., "Interfacing the NII to User Homes," Consumer
`Electronic Bus. Committee Presentation, NIST, Jul. 1994, 14 slides,
`missing slide 14.
`Holt, S., "Start-Up Promises User Confidentiality in Web Marketing
`Service," InfoWorld Electric News, viewed Aug. 13, 1997, 2 pages.
`Ioannidis, J., et al. "The Architecture and Implementation of Net(cid:173)
`work-Layer Security Under Unix," Fourth USENIX Security Sym(cid:173)
`posium Proceedings (Oct.), USENIX, Berkeley, Calif. 1993, 11
`pages.
`Jiang, J.J. et al., "A Concept-based Approach to Retrieval from an
`Electronic Industrial Directory," International Journal of Electronic
`Commerce, vol. 1, No. 1 (Fall 1996) pp. 51-72.
`Jones, D., "Top Tech Stories, PowerAgent Introduces First Internet
`'Informediary' to Empower and Protect Consumers," viewed Aug.
`13, 1997, 3 pages.
`Kelly, K., "E-Money," Whole Earth Review, Sununer 1993, pp.
`40-59.
`Kent, S. T., Protecting Externally Supplied Software in Small
`Computers, Sep. 1980, 254 pages.
`Kohl, J. et al., "The Kerberos Network Authentication Service
`(V5)," Network Working Group Request for Comments RFC-1510,
`Sep. 1993, pp. 1-104.
`Kohl, U, et al., "Safeguarding Digital Library Contents and Users
`Protecting Documents Rather Than Channels," In D-lib Magazine,
`Sep. 1997, available at <http://www.dlib.org/dlib/september97 /ibm/
`09lotspiech.htrni>, visited Oct. 30, 2002, pp. 1-9.
`Kristo!, D.M. et al., "Anonymous Internet Mercantile Protocol,"
`AT&T Bell Laboratories, Murray Hill, NJ, Mar. 17, 1994, pp. 1-16.
`Lagoze, C., "The Warwick Framework, A Container Architecture
`for Diverse Sets of Metadata," D-Lib Magazine, Jul./ Aug. 1996, 7
`pages.
`Lanza, M., "George Gilder's Fifth Article-Digital Darkhorse,"
`Newspapers, Feb. 21, 1994, 2 pages.
`Lampson, B. et al., "Authentication in Distributed Systems: Theory
`and Practice," ACM Trans. Computer Systems, vol. 10, No. 4 (Nov.
`1992), pp. 1-46.
`Lehman, B., "Intellectual Property and the National Information
`Infrastructure, a Preliminary Draft of the Report of the Working
`Group on Intellectual Property Rights," Jul. 1994, 141 pages.
`Levy, S., "E-Money, That's What I Want," WIRED, Dec. 1994, 14
`pages.
`Low, S.H. et al., "Anonymous Credit Cards," AT&T Bell Labora(cid:173)
`tories, Proceedings of the 2nd ACM Conference on Computer and
`Communication Security, Fairfax, VA, Nov. 2-4, 1994, 10 pages.
`Low, S.H. et al., "Anonymous Credit Cards and Its Collusion
`Analysis" AT&T Bell Laboratories, Murray Hill, NJ, Oct. 10, 1994,
`18 pages.
`Low, S.H. et al., "Document Marking and Identification Using both
`Line and Word Shifting" AT&T Bell Laboratories, Murray Hill, NJ,
`Jul. 29, 1994, 22 pages.
`Lynch, C., "Searching The Internet," Scientific American, Mar.
`1997, pp. 52-56.
`Maclachlan, M., "PowerAgent Debuts Spam-Free Marketing,"
`TechWire, Aug. 13, 1997, 3 pages.
`Maxemchuk, N.F., "Electronic Document Distribution," AT&T Bell
`Laboratories, Murray Hill, NJ, Sep./Oct. 1994, 11 pages.
`Milbrandt, E., "Steganography Info and Archive," 1996, 2 pages.
`Mori, R. et al., "Superdistribution: The Concept and the Architec(cid:173)
`ture," The Transactons of the EIEICE, V, E73, No. 7, Tokyo, Japan,
`Jul. 1990, pp. 1133-1146.
`
`Page 5 of 50
`
`

`

`US 7,243,236 Bl
`Page 6
`
`Mossberg, W.S., "Personal Technology, Threats to Privacy On-Line
`Become More Worrisome," The Wall Street Journal, Oct. 24, 1996,
`2 pages.
`Negroponte, N., "Some Thoughts on Likely and Expected Com(cid:173)
`munications Scenarios: A Rebuttal," Telecommunications, Jan.
`1993, pp. 41-42.
`Negroponte, N., "Electronic Word of Mouth," WIRED, Oct. 1996,
`3 pages.
`Neumann, P.G. et al., A Provably Secure Operating System: The
`System, Its Applications, and Proofs, Computer Science Laboratory
`Report CSL-116, Second Edition, SRI International, Jun. 1980, 381
`pages.
`Olivier, M.S. et al., "A Taxonomy for Secure Object-oriented
`Databases," ACM Transactions on Database Systems, vol. 19, No.
`1, Mar. 1994, pp. 3-46.
`Olivier, M.S. et al., "Building a Secure Database using Self(cid:173)
`protecting Objects," Computers & Security, vol. 11, No. 3, 1992, pp.
`259-271.
`Olivier, M.S. et al., "Secure Object-oriented Databases," Ph.D.
`Thesis, Rand Afrikaans University, Johannesburg, Dec. 1991, pp. I
`to xiv and 1-183.
`Olivier, M.S. et al., "DISCO: A Discretionary Security Model for
`Object-oriented Databases," in GG Gable and WJ Caelli, Eds., IT
`Security: The Need for International Cooperation, pp. 345-357,
`Elsevier Science Publishers B.V. (North Holland), 1992, pp. 345-
`357, E-3.
`Pelton, J.N., "Why Nicholas Nergoponte is Wrong About the Future
`of Telecommunications," Telecommunications, Jan. 1993, pp.
`35-40.
`"Proceedings: Technological Strategies for Protecting Intellectual
`Property in the Networked Multimedia Environment," 1994, Coa(cid:173)
`lition for Networked Information, Interactive Multimedia Associa(cid:173)
`tion, John F. Kennedy School of Government, Journal of the
`Interactive Multimedia Association, available at <http://www.cni.
`org/docs/ima.ip-workshop> as of Oct. 10, 2002, 308 pages.
`Rankine, G., "Thomas-A Complete Single-Chip RSA Device,"
`Advances in Cryptography, Proceedings of CRYPTO 86, (A.M.
`Odlyzko Ed., Springer-Verlag) 1987, pp. 480-487, 4 pages.
`Reilly, A.K., "Input to the 'International Telecommunications Hear(cid:173)
`ings,' Panel 1: Component Technologies of the NII/GII," Standards
`Committee Tl-Telecommunications, Jul. 28, 1994, 14 pages.
`Resnick, P. et al., "Recommender Systems," Communications of the
`ACM, vol. 40, No. 3, Mar. 1997, pp. 56-58.
`Resnick, P., "Filtering Information on the Internet," Scientific
`American, Mar. 1997, pp. 62-64.
`Rose, L., "Cyberspace and the Legal Matrix: Laws or Confusion?,"
`1991, pp. 43-52.
`Rosenthal, S., "Interactive Network: "Viewers Get Involved," New
`Media," Dec. 1992, pp. 30-31.
`Rosenthal, S., "Interactive TV: "The Gold Rush is on," New
`Media," Dec. 1992, pp. 27-29.
`Rosenthal, S., "Mega Channels," New Media, Sep. 1993, pp. 36-46.
`Rothstein, E., "Technology Connections, Making The Internet
`Come To You Through 'Push' Technology," N.Y. Times, Jan. 20,
`1997, p. D5.
`Rutkowski, K., "PowerAgent Introduces First Internet 'Informedi(cid:173)
`ary' to Empower and Protect Consumers," Tech Talk News Story,
`Aug. 4, 1997, 1 page.
`Sager, I., Bits & Bytes, "Spying on the World Through a Cyber(cid:173)
`Lens," Business Week, Sep. 23, 1996, p. 142E.
`Schlosstein, S., "America: The G7's Comeback Kid," INTERNA(cid:173)
`TIONAL Economy, Jun./Jul. 1993, 5 pages.
`Schaumiieller-Bichl, S. et al., "A Method of Software Protection
`Based on the Use of Smart Cards and Cryptographic Techniques,"
`Advances in Cryptography, Proceedings of EUROCRYPT 84, Apr.
`9-11, 1984, 14 pages.
`Schiirmann, J., Pattern Classification, a Unified View of Statistical
`and Neural Approaches, John Wiley & Sons, Inc., 1996, table of
`contents, 9 pages.
`Shear, V., "Solutions for CD-ROM Pricing and Data Security
`Problems," CD ROM Yearbook 1988-1989 (Microsoft Press 1988
`or 1989) pp. 530-533.
`
`Sibert, 0. et al., "DigiBox: A Self-Protecting Container for Infor(cid:173)
`mation Commerce," Proceedings of the First USENIX Workshop on
`Electronic Commerce, New York, NY, Jul. 1995, 13 pages.
`Sibert, 0. et al., "Securing the Content, Not the Wire, for Informa(cid:173)
`tion Commerce," InterTrust Technologies Corporation, 1996, 12
`pages.
`Siuda, K., "Security Services in Telecommunications Networks,"
`Seminar: Mapping New Applications Onto New Technologies,
`edited by B. Plattner and P. Giinzburger; Zurich, Mar. 8-10, 1988,
`pp. 45-52.
`Smith, S. et al., "Signed Vector Timestamps: A Secure Protocol for
`Partial Order Time," CMU-93-116, School of Computer Science,
`Carnegie Mellon University, Pittsburgh, Pennsylvania, Oct. 1991;
`version of Feb. 1993, 16 pages.
`Stefik, M., "Trusted Systems," Scientific American, Mar. 1997, pp.
`78-81.
`Stefik, M., "Letting Loose the Light: Igniting Commerce in Elec(cid:173)
`tronic Publication," Xerox PARC, Palo Alto, CA, 1994-1995, 36
`pages.
`Stefik, M., "Letting Loose the Light: Igniting Commerce in Elec(cid:173)
`tronic Publication," Internet Dreams: Archetypes, Myths, and Meta(cid:173)
`phors. Massachusetts Institute of Technology, 1996, pp. 219-253.
`Stefik, M., "Chapter 7, Classification," Introduction to Knowledge
`Systems, Morgan Kauffman Publishers, Inc., 1995, pp. 543-607.
`Stephenson, T., "The Info Infrastructure Initiative: Data Super
`Highways and You," Advanced Imaging, May 1993, pp. 73-74.
`Sterling, B., "Literary Freeware: Not for Commercial Use," Com(cid:173)
`puters, Freedom and Private Conference IV, Chicago, IL, Mar. 26,
`1994, pp. 51-55.
`Struif, B., "The Use of Chipcards for Electronic Signatures and
`Encryption," Proceedings for the 1989 Conference on VSLI and
`Computer Peripherals, IEEE Computer Society-Press, 1989, pp.
`4-155 to 4-158.
`"Applications Requirements for Innovative Video Progranuning:
`How to Foster ( or Cripple) Program Development Opportunities for
`Interactive Video Programs Delivered on Optical Media: A Chal(cid:173)
`lenge for the Introduction of DVD (Digital Video Disc)," Oct.
`19-20, 1995, 74 pages.
`Tygar, J.D. et al., "Cryptography: It's Not Just for Electronic Mail
`Anymore," CMU-CS-93-107, School of Computer Science,
`Carnegie Mellon University, Pittsburgh, PA, Mar. 1, 1993, 23 pages.
`Tygar, J.D. et al., "Dyad: A System for Using Physically Secure
`Coprocessors," School of Computer Science Carnegie Mellon Uni(cid:173)
`versity, Pittsburgh, PA, May 1991, 43 pages.
`Tygar, J.D. et al., "Strongbox: A System for Self Securing Pro(cid:173)
`grams," CMU Computer Science: 25th Anniversary Commemora(cid:173)
`tive, R. Rashid (ed.) Addison-Wesley, 1991, pp. 163-197.
`Valovic, T., "The Role of Computer Networking in the Emerging
`Virtual Marketplace," Telecommunications, 1993, 3 pages.
`Voight, J., "Beyond the Banner," Wired, Dec. 1996, 4 pages.
`Weber, R., "Metering Technologies for Digital Intellectual Prop(cid:173)
`erty," Chapter XV, A Report to the International Federation of
`Reproduction Rights Organisations (Boston, MA), Oct. 1994, pp.
`1-29.
`Weber, R., "Digital Rights Management

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket