throbber
\
`
`'5'
`
`:4 uni-7'
`
`ELSEVIER
`DIGI'I‘AL
`PRESS
`
`John W. Rittinghouse
`
`James F. Ransome
`
`
`
`
`Sec rity
`
`
`
`
`
`
`Page 1 of 13
`
`Samsung Exhibit 1025
`
`Page 1 of 13
`
`Samsung Exhibit 1025
`
`

`

`
`
`
`
`
`
`
`
`
`
`
`Elsevier Digital Press
`30 Corporate Drive, Suite 400, Burlington, MA 01803, USA
`Linacre House, jordan Hill, Oxford OX2 8DP, UK
`
`Copyright © 2005, John W Rittinghouse and James F. Ransome. All rights reserved.
`
`No part of this publication may be reproduced, stored in a retrieval system, or
`transmitted in any Form or by any means, electronic, mechanical, photocopying,
`recording, or otherwise, without the prior written permission of the publisher.
`
`Permissions may be sought directly from Elsevier’s Science 8C Technology Rights
`Department in Oxford, UK: phone: (+44) 1865 843830, fax: {+44} 1865 853333,
`e—mail: permissions@elsevier.eom.ul(. You may also complete your request on-line
`via the Elsevier homepage (http:”clsevi€r.c0m), by selecting "Customer Support”
`and then “Obtaining Permissions.”
`
`Recognizing the importance of preserving what has been written, Elsevier prints its
`books on acid—free paper whenever possible.
`
`Library of Congress Cataloging-in-Publication Data
`Application Submitted.
`
`iSBN: 165558—3385
`
`British Library Cataloguing—in—Publication Data
`A catalogue record for this book is available from the British Library.
`
`
`
`
`
`
`
`Printed in the United States ofAmeriea
`
`For information on all Elsevier Digital Press publications
`visit our Web site at wwwboolrselsevieecom
`
`050607080910987654321
`
`
`
`Page 2 of 13
`
`Page 2 of 13
`
`

`

`Contents
`
`List of Figures and Tables
`
`Acknowledgments
`
`Foreword
`
`I
`
`Introduction
`
`_
`
`H Purpose and Audience
`|.2 What to Expect from This Book
`I3 What Is “‘1?
`
`IM and its History
`|.3.|
`IM as an Integrated Communications Platform
`|.3.2
`Common IM Application Approaches
`L33
`i.3.4 Who Uses IM?
`
`|.3.5 What Are the Advantages of Using IN?
`|.3.6 What Are the Risks of Using IN?
`Summary
`Endnotes
`
`1.4
`I5
`
`2 How Does IM Work!
`
`2.1
`
`High-LevelView of IM
`2.! .|
`The Presence Service
`
`2.2
`
`2.3
`
`The Instant Messaging Service
`2. I .2
`Basic IM Features
`
`Enterprise Instant Messaging Considerations
`2.3.!
`Operating System
`2.3.2
`Database
`
`2.3.3
`2.3.4
`
`Directory Services
`Interoperability
`
`xiii
`
`xv
`
`xvii
`
`I
`
`I
`
`2
`2
`
`3
`6
`7
`7
`
`|
`I
`IS
`27
`27
`
`3|
`
`3|
`32
`
`38
`40
`
`42
`42
`43
`
`43
`43
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Page 3 of 13
`
`Page 3 of 13
`
`

`

`Contents
`
`43
`44
`44
`44
`44
`4s
`46
`46
`47
`47
`47
`4s
`48
`49
`49
`5 l
`52
`
`53
`
`53
`S7
`58
`59
`65
`66
`68
`69
`
`69
`69
`7O
`70
`7|
`7|
`7|
`7]
`72
`
`3.4.4
`3.4.5
`3.4.6
`3.4.7
`3.4.8
`3.4.9
`3.4.10
`3.4.l |
`3.4.12
`
`3.4.[3
`
`73
`Middie-to-End Security
`73
`SIP Security Issues
`75
`3.5
`SIP for 11"! and Presence Leveraging Extensions
`
`
`
`2.3.5
`2.3.6
`2.3.7
`2.3.8
`2.3.9
`
`Schema Change Requirements
`Standards Based for Third-Party Support
`Compliance Management
`Remote Access
`Cost Considerations
`
`2.4
`2.5
`
`An Enterprise EIM Nightmare Scenario
`An Overview of Mobile and Wireless Instant Messaging
`2.5. I
`What ls Mobile Instant Messaging?
`2.5.2
`What lsWireless Instant Messaging?
`2.5.3
`Short Message Service
`2.5.4
`Wireless Application Protocol
`2.5.5
`General Packet Radio Service
`2.5.6
`The Future oleM
`2.5.7
`The Future of NM
`
`2.6
`2.7
`2.8
`
`Selecting and Securing aWIM Solution
`Summary
`Endnotes
`
`3
`
`IM Standards and Protocols
`
`3.[
`
`3.2
`
`3.3
`3.4
`
`Extensible Messaging and Presence Protocol—RFC 2778
`3.].[
`jabber and the IN Community
`Jabber Protocol and XMPP
`3.2.l
`Architectural Design
`Instant Messagingl'Presence Protocol—RFC 2779
`Session Initiation Protocol
`3.4.]
`3.4.2
`3.4.3
`
`SIP Security
`Existing Security Features in the SIP Protocol
`Signaling Authentication Using HTTP
`Digest Authentication
`SIMIME Usage within SIP
`Confidentiality of Media Data in SIP
`TLS Usage within SIP
`IPsec Usage within SIP
`Security Enhancements for SIP
`SIP Authenticated Identity Body
`SIP Authenticated Identity Management
`SIP Security Agreement
`SIP End-to—Middle, Middle-to-MiddIe,
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Page 4 of 13
`
`Page 4 of 13
`
`

`

`
`
`Contents
`
`
`
`3.6
`3.7
`
`The Future of IM Standards
`Endnotes
`
`76
`78
`
`8|
`
`8|
`83
`85
`86
`87
`88
`88
`88
`89
`9G
`90
`9|
`9|
`93
`93
`95
`96
`99
`l00
`l04
`I07
`I09
`I
`|
`l
`I
`|
`l
`
`“3
`
`ll6
`i|6
`
`l l9
`|20
`[22
`I22
`|24
`|24
`I25
`IZS
`
`Overview
`4.I.l
`Instant Messaging Opens New Security Holes
`4.|.2
`Legal Risk and Unregulated Instant Messaging
`The Use of IM as Malware
`4.2
`4.3 What Is Malware?
`Viruses
`4.3.l
`4.3.2
`Worms
`4.3.3
`Wabbits
`4.3.4
`4.3.5
`4.3.6
`4.3.7
`4.3.8
`4.3.9
`Exploits
`4.3. l0
`Rootkits
`4.4 How Is IM Used as Malware?
`4.4.l
`As a Carrier
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Contents
`
`
`4
`
`IM Malware
`
`4. |
`
`Trojan Horses
`Spyware
`Browser Hijackers
`Blended Threats
`Backdoors
`
`4.4.2
`4.4.3
`4.4.4
`4.4.5
`
`As a Staging Center
`As aVehicle for General Hacking
`As a Spy
`As a Zombie Machine
`
`As an Anonymizer
`4.4.6
`Summary
`End notes
`
`4.5
`4.6
`
`5
`
`IM Security for Enterprise and Home
`
`5.|
`
`5.2
`
`5.3
`
`How Can IM Be Used Safely in Corporate Settings?
`5.|.|
`Understanding IM and Corporate Firewalls
`5.|.2
`Understanding IM File Transfers and Corporate Firewalls
`5.|.3
`Blocking and Proxying Instant Messaging
`IM Detection Tools
`5.|.4
`
`Legal Risk and Corporate Governance
`5.2.l
`Legal issues with Monitoring lMTraffic
`Corporate IM Security Best Practices
`5.3.l
`Start from the Firewall
`5.3.2
`
`Consider the Desktop
`
`Page 5 of 13
`
`Page 5 of 13
`
`

`

`5.3.3
`5.3.4
`5.3.5
`5.3.6
`5.3.7
`5.3.8
`5.3.9
`5.3.10
`5.3.] l
`
`Install Patches to [M Software ASAP
`
`Enforce Client-Side [M Settings
`[M Proxy Gateways
`VPNS
`Antivirus
`
`Set up ContainmentWards
`Secure Information with Encryption
`[M System Rules, Policies. and Procedures
`Monitor to Ensure IM Client Policy Compliance
`Security Risks and Solutions for Specific Public [M Clients
`5.4.]
`MSN Messenger
`5.4.2
`Yahoo! Messenger
`5.4.3
`America Online instant Messaging
`5.4.4
`ICQ
`5.4.5
`
`Beware of [M Third-Party Clients and Services
`Home [M Security Best Practices
`Summary
`Endnotes
`
`6
`
`[M Security Risk Management
`
`[M [s a Form of E-mail
`
`IM Security and the Law
`Cybersecurity and the Law
`6.3.1
`The [996 National Information Infrastructure
`Protection Act
`President's Executive Order on Critical
`Infrastructure Protection
`The USA Patriot Act of 200[
`
`6.3.2
`
`6.3.3
`6.3.4
`
`The Homeland Security Act of 2002
`{M Must Be Managed as a Business Record
`[M Risk Management
`Summary
`Endnotes
`
`5.4
`
`5.5
`
`56
`5.7
`
`6.[
`6.2
`6.3
`
`6.4
`6.5
`6.6
`6.7
`
`Contents
`
`126
`126
`126
`I27
`128
`[28
`[29
`I30
`I31
`I32
`I32
`I37
`I45
`[53
`[56
`[58
`l6l
`I61
`
`{65
`
`[65
`I66
`I69
`
`I70
`
`[70
`I7[
`[75
`[88
`[89
`[9!
`[9|
`
`I95
`
`I 95
`200
`202
`204
`205
`
`
`
`viii
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`7 The Business Value of IM
`
`7. |
`7.2
`7.3
`7.4
`7.5
`
`Ubiquitous Presence andWorkflow
`lt‘s All about Culture
`Overall ROI for [M
`The Choice Is Yours
`Endnotes
`
`
`
`
`
`Page 6 of 13
`
`Page 6 of 13
`
`

`

`
`
`i
`
`Contents
`
`8
`
`The Future of IN
`8.l
`The Pervasive Network
`8.2
`Peer-to-Peer Instant Messaging
`8.3
`Peer-to-Application (the Human-Computer Interface)
`8.4 Machine-to-Machine (Application-to-Application)
`8.5
`Jabber
`8.6
`Security and Government Compliance
`8.7
`The Business Impact
`8.8
`Endnotes
`
`A General Network Security
`
`A.l
`A2
`A3
`
`Threats to Personal Privacy
`Fraud and Theft
`Internet Fraud
`
`AA Employee Sabotage
`A5
`Infrastructure Attacks
`A6 Malicious Hackers
`A.7 Malicious Coders
`
`AB Industrial Espionage
`A?
`Social Engineering
`A.9.|
`Educate Staff and Security Personnel
`A32
`Crafting Corporate Social Engineering Policy
`A.9.3
`Prevention
`A.9.4 Audits
`
`A95
`A.9.6
`
`A9]
`A38
`
`Privacy Standards and Regulations
`NAIC Model Act
`
`Gramm-Leach-Bliley Act
`HIPAA
`
`A.lO Summary
`Al I Endnotes
`
`B Managing Access
`B.I
`Access Control
`
`B. H
`B. l.2
`
`B. l.3
`3. L4
`B. l.5
`B. L6
`
`Purpose ofAccess Control
`Access Control Entities
`
`Fundamental Concepts of ACCess Control
`Access Control Criteria
`Access Control Models
`Uses of Access Control
`
`ix
`
`207
`209
`2| |
`2| l
`2|2
`2H
`2 I 5
`2l7
`2 I8
`
`2I9
`
`220
`220
`22|
`
`223
`224
`224
`225
`
`225
`228
`229
`23|
`232
`232
`
`232
`233
`
`234
`235
`
`237
`238
`
`24I
`24|
`
`24|
`242
`
`242
`244
`244
`249
`
`..
`
`.
`
`Contents
`
`
`
`Page 7 of 13
`
`Page 7 of 13
`
`

`

`
`
` x Contents
`
`3. | .7
`B. l .3
`B. | .9
`
`Access ControiAdministration Models
`Access Control Mechanisms
`Internal Access Controls
`
`3.2
`
`3| .10 Techniques Used to Bypass Access Controls
`Password Management
`B.2.[
`SmartCards
`
`B22
`3.2.3
`
`Biometric Systems
`Characteristics of Good Passwords
`
`Password Cracking
`3.2.4
`3.2.5 WindOWS NT L0phtCracl< (LC4)
`3.2.6
`Password Cracking for Self-Defense
`3.2.7
`UNiX Crack
`
`3.2.8
`3.2.9
`
`john the Ripper
`Password Attack Countermeasures
`
`3.3
`3.4
`3.5
`
`Physical Access
`Summary
`Endnotes
`
`C
`
`Security Management Issues
`
`C.[ Organizational Security Management
`C.I.|
`Perceptions of Security
`C.i.2
`Placement of a Security Group in the Organization
`C. 1.3
`Security Organizational Structure
`C. 1.4
`Convincing Management of the Need
`C. [.5
`Legal Responsibilities for Data Protection
`C. [.6
`DHS Office of Private Sector Liaison
`
`(:2 Security ManagementAreas of Responsibility
`C2}
`Awareness Programs
`C22
`Risk Analysis
`C23
`incident Handling
`C24 Alerts and Advisories
`
`C25 Warning Banners
`C26
`EmpioyeeTerrninacion Procedures
`C27
`Training
`C28
`Personnel Security
`C29
`Internet Use
`C2 IO E-mail
`C.2.| i Sensitive Information
`
`C2 | 2 System Security
`C2. | 3 Physical Security
`Security Policies
`
`C3
`
`249
`251
`25[
`
`256
`257
`253
`
`258
`258
`
`259
`260
`260
`26|
`
`262
`263
`
`263
`263
`264
`
`265
`
`266
`266
`266
`267
`268
`268
`269
`
`269
`270
`27|
`272
`273
`
`274
`274
`275
`275
`276
`276
`276
`
`277
`277
`278
`
`
`
`Page 8 of 13
`
`Page 8 of 13
`
`

`

`1
`
`_.
`
`Contents
`
`C4 Basic Approach to Policy Development
`C.4.I
`Identify What Needs Protection and Why
`C.4.2 Determine Likelihood ofThreats
`
`Implement Protective Measures
`C.4.3
`(2.4.4 What Makes a Good Security PolicyiI
`(2.4.5
`Review and Assess Regularly
`OS Security Personnel
`C.5.|
`Coping with InsiderThreats
`(2.5.2 How to Identify Competent Security Professionals
`C.5.3
`How to Train and Certify Security Professionals
`Security-Related Job Descriptions
`C.5.4
`C.6 Management of Security Professionals
`C.6.l
`Organizational Infrastructure
`C.6.2
`Reporting Relationships
`(2.6.3 Working Relationships
`C.6.4 Accountability
`Summary
`(3.7
`C.8 Endnotes
`
`278
`279
`279
`280
`28 I
`283
`283
`283
`285
`286
`289
`295
`295
`296
`297
`297
`298
`298
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`D IN Policy Essentials
`
`D.| ABC Inc. Information SecurityAcceptable Use Policy
`[)2 ABC Inc. E—maiIIIM Use Policy
`0.3 ABC Inc. E-maililM Retention Policy
`
`E Glossary, References, and Policy Issues
`
`IM Specific Glossary
`E.|
`E2 General Security Glossary
`E3
`References
`
`2.99
`
`300
`306
`308
`
`3H
`
`3H
`3|6
`342
`
`Index
`
`349
`
`
`
`
`
`
`,J
`
`Contents
`
`Page 9 of 13
`
`Page 9 of 13
`
`

`

`I.3 What IS IN?
`
`l.3.|
`
`IM and Its History
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`In our fast—paced world there are times when even the rapid response of e-
`mail is not Fast enough. There is no way for you to know if the person you
`are sending e-mail to is online at that moment. This is one of the reasons
`why 1M has gained popularity, acceptance, and become a desired tool in the
`workplace. 1M provides us with the ability to maintain a list of people,
`often called a buddy list or contact list, whom we want or need to interact
`with. IM monitors our list of people and their status of being online or
`offline. If they are online, we can send messages back and forth. Businesses
`today are increasingly viewing IM as an excellent productivity and commu—
`nication tool that complements voice mail and e-mail. In order for there to
`be complete acceptance, there needs to be specific security, accountability,
`and uniformity among 1M solution providers. There needs to be policies
`that protect critical organizational interests and comply with federal man-
`dates and regulations. Corporations want 1M solutions that provide seam—
`less sccurity, Full audit trails, identity controls, and administrative controls.
`Most corporations agree that message encryption is essential.
`
`There are three basic types of IM, as Follows:
`
`1.
`
`2.
`
`3.
`
`Public messaging
`
`Enterprise messaging
`
`Wireless messaging
`
`In 1987, a computer scientist at MIT developed an instant—messaging
`program called Zephyr in order to provide a system that was Faster than e—
`mail, which had begun to be bogged down, so that urgent messages
`regarding the school’s network and server could be received instantly in
`case, for example, the school’s network server was going down. Soon, stu-
`dents adopted Zephyr as a form of easy communication that could be used
`while they worked at
`their computers. This technology was quickly
`adopted by other universities, and the simple early warning system that
`Zephyr was originally designed to be was repurposcd, becoming a popular
`tool of conversation and information exchange called IM. IM as we know
`it today was created in july 1996 by four young Israeli entrepreneurs. Yair
`Goldfinger, Arik Vardi, Sefi Vigiser, and Arnnon Amir, started a company
`called Mirabilis in order to introduce a new way of communication over
`the Internet. They created a technology that would enable Internet users to
`locate each other online on the Internet and create peer—to—peer communi—
`
`
`__
`
`| Chapter |
`
`
`
`Page 10 of 13
`
`Page 10 of 13
`
`

`

`|.3 What IS IN? 4
`
`cation channels easily. They called their technology ICQ (I seek you) and
`released it in November 1996. Within six months, 850,000 users had been
`
`registered by Mirabilis. By June 1997, Mirabilis was able to handle
`100,000 concurrent users and had become the world’s largest Internet
`communications network. Mirabiiis and ICQ were acquired by America
`Online,1nc., in June 1998 for $287 million. AOL had also created its own
`Instant Messenger system. By that time, Microsoft had created its own IM
`client and service, MSN Messenger, and another Internet heavyweight,
`Yahool, created one as well. Because 1M services evolved From proprietary
`systems created by companies to make a profit,
`their systems remain
`unabie to interoperate because of the desire to control the 1M marlcet.
`AOL and ICQ, even though owned by the same company, are not interop-
`erable. ICQ currently has two clients: ICQ4 Lite Edition with Xtraz (Fig—
`ure 1.1} and ICQProTM {Figure 1.2) [5,6].
`
`The A01. and ICQ clients cannot communicate with one another, and
`AOL maintains both systems and market dominance in the 1M field. All
`this may change soon. Conditions of the AOL—Time Warner merger
`required AOL to open up its 1M systems [7]. in its analysis of 1M, the FCC
`concluded that the merger would combine an essential input of AOL’s
`dominant IM service and future IM—hased services—chiefly, the Names and
`Presence Directory (NPD)—with assets of Time Warner, including its cable
`
`—>
`
`Figure 1.2
`ICQTMPW,
`
`file-incalrglnn]
`
`fl} U.:r's L"-|':::Il 195?):I-thErJrl
`1‘; Nina-n:
`‘3‘; 0"an
`if U: at: [lure-Selim:
`
`
`
`
`
`Page 11 of13
`
`Page 11 of 13
`
`

`

`l.3 What Is IM?
`
`
`
`facilities and Road Runner ISP An IM provider’s NPD consists of a data-
`base of its users' unique IM names, their Internet addresses, and a “presence
`detection” function, which indicates to the provider that a certain user is
`online and allows the provider to alert others to this information. The FCC
`noted that these features created a market with strong network effects.
`AOL, with by far the largest NPI), resisted making its IM services interop—
`erable with other providers’ services. The merger brought Time Warner’s
`cable Internet platform and content library under AOL’s control and gave
`AOL Time Warner a significant and anticompetitive first~mover advantage
`in the market for advanced, iM—based highdspeed services (Ail-IS). Potential
`AIHS applications include those using streaming video (lengthy, high—
`quality, one— or two-way video). The merger would frustrate the objectives
`of the Communications Act by preventing the emergence of a competitive
`and innovative market for advanced, iM-basecl services. This would violate
`
`key Communications Act principles, including the further development of
`healthy competition in the Internet and interactive services arena. The FCC
`did not establish an interoperability protocol. Rather,
`the FCC’s remedy
`requires AOL Time Warner to follow a protocol developed by the industry
`or to create a protocol with other IM providers pursuant to contracts. Thus,
`the FCC did not create and will not review an Internet protocol.
`
`The FCC imposed an “IM condition” on the merger to avert market
`harm now so that it would not be required to regulate IM in the future.
`Given AOL Time Warner’s likely domination of the potentially competitive
`business of new, IM-based services, especially advanced, IM—based high—
`speed services applications, the FCC ruled that AOLTime Warner may not
`offer any MHS steaming video applications that use :1 Names and Presence
`Directory {NPD) over the Internet via AOL Time Warner broadband facil-
`ities until the company demonstrates that it has satisfied one of three pro—
`competitive options filed by the FCC. AOL Time Warner must file a
`progress report with the FCC, 180 days from the release date of the order
`and every 180 days thereafter, describing in technical depth the actions it
`has taken to achieve interoperability of its IM offerings and other offerings.
`These reports will be placed on public notice for comment. The IM condi-
`tion was set to sunset five years after the release of the order.
`
`AOL Time Warner was directed to show that it had implemented an
`industry—wide Standard for server-to-server interoperability. AOL Time
`Warner had to show that it had entered into a contract for server—to—server
`
`interoperability with at least one significant, unaffiliated provider of NPD—
`based services within 180 days of executing the first contract. AOL Time
`Warner also had to show that it entered into two additional contracts with
`
`| Chapter |
`
`
`
`Page 12 of 13
`
`Page 12 of 13
`
`

`

`I.3 What IS IN?
`
`significant, unaffiliated, actual or potential competing providers. AOL
`Time Warner was given the opportunity to seek relief by showing by clear
`and convincing evidence that this condition no longer serves the public
`interest, convenience, or necessity because there has been a material change
`in circumstances.
`
`several competing companies have joined
`Since the FCC ruling,
`together to advocate an IM protocol similar to those that allow the interop~
`erability of email systems. Other companies have taken a different
`approach rather than wait for an agreed-upon standard. Jabber is one com—
`pany that has created a client program capable of communicating with var-
`ious 1M systems. In less than two decades, the concept of 1M has become
`an international tool of communication.
`
`I.3.2
`
`IM as an Integrated Communications Platform
`
`The lM platform can be the basis For true integrated communications by
`incorporating additional technology (such as extending it into the wireless
`realm with mobile phones and personal digital assistants [PDAsD or by
`adding other means of communication (such as voice chat or video chat).
`With the addition of IP telephony (VoIP) capability, the messaging service
`can even extend to telephony, making it possible to communicate with any-
`one at any time. It can be used as a personal communications portal to cre—
`ate a single point of contact for all methods of communication, allowing a
`user to initiate any kind of communication From one place, using a single
`contact list. Using [M as an integrated communications platform allows for
`one—click communication. Instead of having to run through a list ofhome,
`office, mobile, pager numbers, and e-mail addresses, someone trying to
`reach another person can simply elicit on that person’s name. It also enables
`users to control how others communicate with them. If they prefer that
`calls go to their mobile phones when they are away from the office, they can
`set their profile so that the system directs calls that way. The system would
`route communications according to that person’s preferences. When addi-
`tional features such as integrated communications, reachability, and com-
`munications profiles are part of 1M, the market for IM will increase from
`personal to professional use, creating better business markets for messaging
`services and making these services more of a revenue—generating opportu—
`nity for service providers [8].
`
`
`
`Page 13 of 13
`
`Page 13 of 13
`
`

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket