throbber
j:5
`United States Patent
`6,157,721
`[11] Patent Number:
`Shearetal.
`[45] Date of Patent:
`Dec. 5, 2000
`
`
`US006157721A
`
`4,168,396
`4,196,310
`
`9/1979 Best.
`[54] SYSTEMS AND METHODS USING
`4/1980 Forman etal. .
`CRYPTOGRAPHY TO PROTECTSECURE
`(List continued on next page.)
`COMPUTING ENVIRONMENTS
`FOREIGN PATENT DOCUMENTS
`Inventors: Victor H. Shear, Bethesda, Md.; W.
`9.00479 s2/1088 Belsi
`Olin Sibert, Lexington, Mass.; David
`glum .
`p
`i
`‘ali
`:
`084441
`7/1983
`European Pat. Off. .
`Mi. Van Wie, Sunnyvale; Cait
`InterTrust Technologies Corp., Santa es
`Clara, Calif.
`(List continued on next page.)
`[21] Appl. No.: 08/689,754
`OTHER PUBLICATIONS
`2
`_No.:
`B
`22
`;
`Applications Requirements for Innovative Programming;
`[22]; dale:
`ANG Te4028
`How to Foster (or Cripple) Program Development Oppor-
`SU] Tate eavsccsipersiecagess HO04K 1/00; HO4L 9/00;
`tunities for Interactive Video Programs Delivered on Optical
`[51]
`g
`P
`/00;
`/00;
`GO6F 11/30
`Media; A Challenge for the Introduction of DVD (Digital
`[52] U.S. Ch. caceeceecccssccessse380/255; 380/251; 380/287;
`Video Disc) (Oct. 19-20, 1995, Sheraton Universal Hotel,
`713/155; 713/176; 713/180; 713/182; 713/194
`Universal City CA).
`Field of Searchy .....cccccccicsesscsnesenss 380/4, 23, 25,
`(List continued on next page.)
`380/49, 30, 255, 287, 251; 713/150-152,
`155, 156, 164-170, 175-182, 189-191,
`193, 200, 201, 194
`
`[75]
`
`[73] Assignee:
`
`[58]
`
`[56]
`
`References Cited
`U.S. PATENT DOCUMENTS
`4/1971 Adamsetal. .
`3,573,747
`9/1971 Blevins .
`3,609,697
`3/1974 Smith.
`3,796,830
`3/1974 Feistel .
`3,798,359
`3/1974 Feistel
`.
`3,798,360
`3/1974 Feistel .
`3,798,605
`4/1974 Clarke .
`3,806,882
`8/1974 Freeny, Ina
`3,829,833
`9/1975 Henriques.
`3,906,448
`10/1975 Freeny, Jr. .
`3,911,397
`12/1975 Freeny,Jr. .
`3,924,065
`1/1976 Jacoby.
`3,931,504
`3/1976 Brobeck et al
`3,946,220
`Ose.ais 5/06 re aa :
`vocenai
`Z197: Eh taper “
`3.970.002
`7rane Fai .d = al
`4048619
`9/1977 Forman vr et Als.
`4071911
`1/1978 Mazur.
`-
`4.112.421
`9/1978 Freeny, Jr. .
`4,120,030
`10/1978 Johnstone .
`4,163,280
`7/1979 Moriet al.
`
`.
`
`Primary Examiner—Stephen C. Buczinski
`Attorney, Agent, or Firm—Finnegan, Henderson, Farabow,
`Garrett & Dunner, L.L.P.
`(57]
`ABSTRACT
`Secure computation environments are protected from bogus
`or rogue load modules, executables and other data elements
`through use ofdigital signatures, seals andcertificates issued
`by a verifying authority. A verifying authority—which may
`be a trusted independent third party—tests the load modules
`or other executables to verify that their corresponding speci-
`fications are accurate and complete, and then digitally signs
`the load module or other executable based on tamperresis-
`tance work factor classification. Secure computation envi-
`ronments with different tamper resistance work factors use
`different verification digital signature authentication tech-
`niques(e.g., different signature algorithms and/or signature
`verification keys)—allowing one tamper resistance work
`“
`A
`.
`factor environment to protect itself against load modules
`from another, different tamper resistance work factor envi-
`ronment. Several dissimilar digital signature algorithms may
`be used to reduce vulnerability from algorithm compromise,
`and subsets of multiple digital signatures may be used to
`reduce the scope of any specific compromise.
`
`41 Claims, 15 Drawing Sheets
`
`Level |
`Digital Signature
`
`__Lewel Il
`Digital Signature
`
`Digital Signature W240} we(aey
`
`Level Ill
`
`CS-1004
`Cisco Systems, Inc. v. Finjan, Inc.
`Page 1
`
`CS-1004
`Cisco Systems, Inc. v. Finjan, Inc.
`Page 1
`
`

`

`6,157,721
`Page 2
`
`U.S. PATENT DOCUMENTS
`
`4,200,913
`4,209,787
`4,217,588
`4,220,991
`4,232,193
`4,232,317
`4,236,217
`4,253,157
`4,262,329
`4,265,371
`4,270,182
`4,278,837
`4,305,131
`4,306,289
`4,309,569
`4,319,079
`4,323,921
`4,328,544
`4,337,483
`4,361,877
`4,375,579
`4,433,207
`4,434,464
`4,442,486
`4,446,519
`4,454,594
`4,458,315
`4,462,076
`4,462,078
`4,465,901
`4,471,163
`4,484,217
`4,494,156
`4,513,174
`4,528,588
`4,528,643
`4,553,252
`4,558,176
`4,558,413
`4,562,306
`4,562,495
`4,577,289
`4,584,641
`4,588,991
`4,589,064
`4,593,183
`4,593,353
`4,593,376
`4,595,950
`4,597,058
`4,634,807
`4,644,493
`4,646,234
`4,652,990
`4,658,093
`4,670,857
`4,672,572
`4,677,434
`4,680,731
`4,683,553
`4,685,056
`4,688,169
`4,691,350
`4,696,034
`4,701,846
`4,712,238
`4,713,753
`4,740,890
`4,747,139
`4,757,533
`
`4/1980
`6/1980
`8/1980
`9/1980
`11/1980
`11/1980
`11/1980
`2/1981
`4/1981
`5/1981
`5/1981
`T/L981
`12/1981
`12/1981
`1/1982
`3/1982
`4/1982
`5/1982
`6/1982
`11/1982
`3/1983
`2/1984
`2/1984
`4/1984
`5/1984
`6/1984
`T/1984
`7/1984
`7/1984
`8/1984
`9/1984
`11/1984
`1/1985
`4/1985
`T/1985
`7/1985
`11/1985
`12/1985
`12/1985
`12/1985
`12/1985
`3/1986
`4/1986
`5/1986
`5/1986
`6/1986
`6/1986
`6/1986
`6/1986
`6/1986
`1/1987
`2/1987
`2/1987
`3/1987
`4/1987
`6/1987
`6/1987
`6/1987
`T/1987
`T/1987
`8/1987
`8/1987
`9/1987
`9/1987
`10/1987
`12/1987
`12/1987
`4/1988
`5/1988
`7/1988
`
`Kuharet al. .
`
`Freeny, Jr. .
`Freeny, Jr. .
`Hamanoetal. .
`Gerard .
`Freeny, Jr. .
`Kennedy .
`Kirschneret al. .
`
`.
`
`Bright et al. .
`Desai etal. .
`Asija .
`Best .
`Best .
`Lumley .
`Merkle .
`Best .
`Guillou .
`Baldwin et al.
`Guillou .
`.
`Dyer et al.
`Davida etal. .
`Best .
`Suzukiet al. .
`Mayer.
`Thomas.
`Heffron et al. .
`Uchenick .
`Smith, III.
`Ross .
`Best .
`Donald etal. .
`Block et al.
`.
`Kadison et al. .
`Herman.
`Lofberg .
`Freeny, Jr. .
`Egendorf .
`Arnold et al. .
`Schmidt et al. .
`Chouet al. .
`Bond et al. .
`Comerford et al.
`Guglielmino .
`Atalla .
`Chiba et al. .
`Fukatsu .
`Pickholtz .
`Volk .
`Lofberg .
`Izumiet al. .
`.
`Chorley et al.
`Chandra etal. .
`Tolman et al. .
`Pailen et al. .
`Hellman .
`Rackman .
`Alsberg .
`Fascenda .
`Izumiet al. .
`Mollier .
`Barnsdale et al. .
`Joshi .
`Kleijne etal. .
`Wiedemer .
`Tkeda et al. .
`Gilhousen etal. .
`Boebert et al.
`.
`William .
`Taaffe .
`Allenet al. .
`
`.
`
`4,757,534
`4,768,087
`4,791,565
`4,796,181
`4,799,156
`4,807,288
`4,817,140
`4,823,264
`4,827,508
`4,858,121
`4,864,494
`4,868,877
`4,903,296
`4,924,378
`4,930,073
`4,949,187
`4,977,594
`4,999,806
`5,001,752
`5,005,122
`5,005,200
`5,010,571
`5,023,907
`5,047,928
`5,048,085
`5,050,213
`5,091,966
`5,103,392
`5,103,476
`5,111,390
`5,119,493
`5,126,936
`5,128,525
`5,136,643
`5,136,646
`5,136,647
`5,136,716
`5,146,575
`5,148,481
`5,155,680
`5,168,147
`5,185,717
`5,201,046
`5,201,047
`5,208,748
`5,214,702
`5,216,603
`5,221,833
`5,222,134
`5,224,160
`5,224,163
`5,235,642
`5,241,671
`5,245,165
`5,247,575
`5,260,999
`5,263,158
`5,265,164
`5,276,735
`5,280,479
`5,285,494
`5,301,231
`5,311,591
`5,319,705
`5,335,169
`5,337,360
`5,341,429
`5,343,527
`5,347,579
`5,351,293
`5,355,474
`5,373,440
`
`7/1988
`8/1988
`12/1988
`1/1989
`1/1989
`2/1989
`3/1989
`4/1989
`5/1989
`8/1989
`9/1989
`9/1989
`2/1990
`5/1990
`5/1990
`8/1990
`12/1990
`3/1991
`3/1991
`4/1991
`4/1991
`4/1991
`6/1991
`9/1991
`9/1991
`9/1991
`2/1992
`4/1992
`4/1992
`5/1992
`6/1992
`6/1992
`7/1992
`8/1992
`8/1992
`8/1992
`8/1992
`9/1992
`9/1992
`10/1992
`12/1992
`2/1993
`4/1993
`4/1993
`5/1993
`5/1993
`6/1993
`6/1993
`6/1993
`6/1993
`6/1993
`8/1993
`8/1993
`9/1993
`9/1993
`11/1993
`11/1993
`11/1993
`1/1994
`1/1994
`2/1994
`4/1994
`5/1994
`6/1994
`8/1994
`8/1994
`8/1994
`8/1994
`9/1994
`9/1994
`10/1994
`12/1994
`
`seees 380/23 X
`
`Matyas et al. .
`Taub et al. .
`Dunham et al.
`Wiedemer .
`Shavit et al. .
`
`.
`
`.
`
`.
`
`Ugonet al. .
`Chandra et al.
`Deming .
`Shear .
`Barber et al. .
`Kobus.
`Fischer .
`.
`Chandra et al.
`Hershey et al. .
`CinaTL.
`ciiscsecsercassicens
`Cohen .
`Shear .
`Chernow etal. .
`Fischer .
`Griffin et al. .
`Fischer .
`Katznelson .
`Johnson et al. .
`Wiedemer .
`Abrahamet al. .
`Shear.
`Bloomberg et al.
`Mori .
`Waite et al. .
`Ketcham.
`.
`Janis et al.
`Champion et al. .
`Stearnset al. .
`Fischer .
`Haber et al. .
`Haber etal. .
`Harvey et al. .
`Nolan, Jr.
`.
`Abraham etal. .
`Wiedemer .
`Bloomberg .
`Mori .
`Goldberg et al. .
`Makiet al. .
`Flores et al. .
`Fischer .
`Flores et al. .
`Hecht .
`Waite et al. .
`Paulini et al. .
`Gasser et al.
`.
`Wobberet al. .
`Reed et al. .
`Zhang .
`Sprague et al. .
`Wyman .
`Janis .
`Matyaset al. .
`Boebertetal. .
`Mary .
`Sprecheret al. .
`Abraham et al. .
`Fischer .
`Halter et al. .
`
`Chong .
`Fischer .
`Stringer etal. .
`Moore .
`Blandford .
`Michener et al. .
`Thuraisngham et al. .
`Cohen etal. .
`
`CS-1004
`Cisco Systems, Inc. v. Finjan, Inc.
`Page 2
`
`CS-1004
`Cisco Systems, Inc. v. Finjan, Inc.
`Page 2
`
`

`

`6,157,721
` Page 3
`
`.
`
`.
`
`.
`
`3/1998 Tagawa.
`5,732,398
`4/1998 Reilly et al. .
`5,740,549
`4/1998 Rhoads .
`5,745,604
`5/1998 Rhoads .
`5,748,763
`5/1998 Rhoads .
`5,748,783
`2. cia on -
`ty
`yer eb 4 “
`5,757,914
`5/1998 MeMattis ......esssenereseerenseeens 280/23
`5,758,152
`5/1998 LeTourneau.
`5,765,152
`6/1998 Erickson .
`5,768,426
`6/1998 Rhoads.
`i174,
`/18
`olden et al. .
`.
`rere oe page! . al.
`9,842,173
`1
`Strum et al. .
`FOREIGN PATENT DOCUMENTS
`
`12/1994 Haberet al.
`5,373,561
`2/1995 Fischer .
`5,390,247
`=2/1995 Talati .
`5,390,330
`=2/1995 van den Hameret al.
`5,392,220
`2/1995 Crozier .
`5,392,390
`2/1995 Nagel et al.
`.
`5,394,469
`4/1995 Sh
`1
`5,410,598
`/
`oa
`“Ay?
`5/1995 Fischer .
`5,412,717
`5/1995 Allen.
`5,418,713
`5/1995 Jablon .
`5,421,006
`6/1995. Fischer
`5,422,953
`6/1995 Moskowitz .
`5,428,606
`8/1995 Wyman .
`5,438,508
`8/1995 Ugon.
`5,442,645
`8/199) Daniele.
`SAGTT?
`.
`9/1995 Hecht et al.
`5,449,895
`European Pat. Off. .
`3/1985
`0135422
`9/1995 Hecht et al. .
`5,449,896
`European Pat. Off. .
`5/1986
`0180460
`9/1995 Maher.
`5,450,493
`European Pat. Off. .
`11/1988
`0 370 146
`9/1995 Rosen .
`5,453,601
`European Pat. Off. .
`0399822A2 11/1990
`9/1995 Hechtet al.
`5,453,605
`European Pat. Off. .
`0421409A2
`4/1991
`5,455,407 10/1995 Rosen .
`European Pat. Off. .
`0 456 386 A2
`11/1991
`5,455,861
`10/1995 Faucheret al. .
`European Pat. Off. .
`0 469 864 A2
`2/1992
`5,455,953 10/1995 Russell .
`European Pat. Off. .
`0 565 314 A2
`10/1993
`5,457,746 10/1995 Dolphin .
`European Pat. Off. .
`0593 305 A2
`4/1994
`5,458,494
`10/1995 Krohn et al. .
`European Pat. Off. .
`0651554 Al
`5/1995
`5,463,565
`10/1995 Cookson etal. .
`European Pat. Off. .
`0 668 695 A2
`8/1995
`5,473,687 12/1995 Lipscombet al. .
`European Pat. Off. .
`0695 985 Al
`2/1996
`5,473,692 12/1995 Davis .
`European Pat. Off. .
`0696 798 Al
`2/1996
`5,479,509
`12/1995 Ugon.
`European Pat. Off. .
`O0715243A1
`6/1996
`5,485,622
`1/1996 Yamaki .
`European Pat. Off. .
`O715244A1
`6/1996
`5,491,800
`2/1996 Goldsmith et al. .
`European Pat. Off. .
`O715245A1
`6/1996
`5,497,479
`3/1996 Hornbuckle .
`European Pat. Off. .
`O0715246Al
`6/1996
`.
`5,497,491
`3/1996 Mitchell et al.
`European Pat. Off. .
`O715247A1L
`6/1996
`5,499,298
`3/1996 Narasimhalu et al. .
`European Pat. Off. .
`0725 376
`8/1996
`§,504,757
`4/1996 Cook etal. .
`European Pat. Off. .
`0749081A1
`12/1996
`§,504,818
`4/1996 Okano .
`European Pat. Off. .
`0778 513 A2_
`6/1997
`5,504,837
`4/1996 Griffeth et al. .
`European Pat. Off. .
`0795 873 A2
`9/1997
`5,508,913
`4/1996 Yamamotoetal. .
`3803982A1
`1/1990 Germany .
`§,509,070
`4/1996 Schull .
`57-726
`5/1982
`Japan .
`5,513,261
`4/1996 Maher.
`62-241061
`10/1987
`Japan .
`5,530,235
`6/1996 Stefik et al. .
`1-068835
`3/1989
`Japan .
`5,530,752
`6/1996 Rubin .
`64-68835
`3/1989
`Japan .
`5,533,123
`7/1996 Forceet al. .
`2-242352
`9/1990
`Japan .
`5,534,975
`7/1996 Stefik et al. .
`2-247763
`10/1990
`Japan .
`§,535,322
`7/1996 Hecht .
`2-294855
`12/1990
`Japan .
`5,537,526
`7/1996 Anderson et al. .
`4-369068 12/1992
`Japan .
`5,539,735
`7/1996 Moskowitz .
`5-181734
`7/1993
`Japan .
`5,539,828
`7/1996 Davis .
`5-257783
`10/1993
`Japan .
`5,550,971
`8/1996 Brunneret al. .
`5-268415
`10/1993
`Japan .
`§,553,282
`9/1996 Parrish etal. .
`6-175794
`6/1994
`Japan .
`5,557,518
`9/1996 Rosen .
`6-215010
`8/1994
`Japan .
`5,563,946 10/1996 Cooper etal. .
`6225059
`8/1994
`Japan .
`$5,568,552
`10/1996 Davis .
`7-056794
`3/1995
`Japan .
`5,572,673
`11/1996 Shurts .
`7-084852
`3/1995
`Japan .
`5,592,549
`1/1997 Nagel et al. .
`7-141138
`6/1995
`Japan .
`$5,606,609
`2/1997 Houser etal. .
`7-200317
`8/1995
`Japan .
`5,613,004
`3/1997 Coopermanet al. .
`7-200492
`8/1995
`Japan .
`5,621,797
`4/1997 Rosen .
`7-244639
`9/1995
`Japan .
`5,629,980
`5/1997 Stefik et al. .
`8-137795
`5/1996
`Japan .
`5,633,932
`5/1997 Davis et al. .
`8-152990
`6/1996
`Japan .
`5,634,012
`5/1997 Stefik et al. .
`8-185298
`7/1996
`Japan .
`5,636,292
`6/1997 Rhoads .
`2136175
`9/1984 United Kingdom .
`5,638,443
`6/1997 Stefik .
`22647964
`9/1993 United Kingdom.
`5,638,504
`6/1997 Scott et al. .
`2294348
`4/1996 United Kingdom.
`5,640,546
`6/1997 Gopinath etal. .
`2295947
`6/1996 United Kingdom .
`5,655,077
`8/1997 Jones et al. .
`wo
`5,687,236
`11/1997 Moskowitz et al. .
`5/1985 WIPO.
`AS502310
`5,689,587
`11/1997 Bender et al. .
`
`5,692,047 WO 85/03584=8/1985 WIPO.11/1997 McManis.
`
`5,692,180
`11/1997 Lee.
`WO 90/02382
`3/1990 WIPO.
`5,710,834
`1/1998 Rhoads .
`WO 92/06438
`4/1992 WIPO.
`5,715,403
`2/1998 Stefik .
`WO 92/22870 12/1992 WIPO.
`
`CS-1004
`Cisco Systems, Inc. v. Finjan, Inc.
`Page 3
`
`CS-1004
`Cisco Systems, Inc. v. Finjan, Inc.
`Page 3
`
`

`

`6,157,721
`Page 4
`
`WO 93/01550=1/1993, WIPO.
`Computer Systems Policy Project (CSSP), Perspectives on
`WO 94/01821
`1/1994. WIPO.
`the National Information Infrastructure: Ensuring Interop-
`WO 94/03859
`2/1994 WIPO.
`erability (Feb. 1994), February 1994.
`WO 94/06103
`3/1994 WIPO.
`Cunningham, Donna, et al., News Release, AT&T, Jan. 31,
`WO 94/16395
`7/1994 WIPO.
`1995, AT&T, VLSI Technology join to improve info high-
`WO 94/18620
`8/1994 WIPO.
`way security, 3 pages.
`WO 94/22266
`9/1994 WIPO.
`Data Sheet, About the Digital Notary Service, Surety Tech-
`WO 94/27406
`11/1994 WIPO.
`WO95/14289
`5/1995 WIPO.
`nologies, Inc., 1994-95, 6 pages.
`WO 96/00963
`1/1996 WIPO.
`Dempsey, et al., D-Lib Magazine, Jul./Aug. 1996 The
`WO 96/03835
`2/1996 WIPO.
`Warwick Metadata Workshop: A Framework for the Deploy-
`WO 96/05698
`2/1996 WIPO.
`ment of Resource Description, Jul. 15, 1966.
`WO 96/06503
`2/1996 WIPO.
`Denninget al., Data Security, 11 Computing Surveys No. 3,
`WO 96/13013
`5/1996 WIPO.
`Sep. 1979.
`WO 96/21192
`7/1996 WIPO.
`Diffie, Whitfield and Martin E. Hellman, IEEE Transactions
`WO 97/03423
`1/1997 WIPO.
`on Information Theory, vol. 22, No. 6, Nov. 1976, New
`WO097/07656
`3/1997 WIPO.
`WO097/32251
`9/1997 WIPO.
`Directions in Cryptography, pp. 644-651.
`WO 97/48203 12/1997 WIPO.
`Diffie, Whitfield and Martin E. Hellman, Proceedings of the
`IEEE,vol. 67, No. 3, Mar. 1979, Privacy and Authentication:
`An Introduction to Cryptography, pp. 397-427.
`Digest of Papers, VLSI: New Architectural Horizons, Feb.
`1980, Preventing Software Piracy With Crypto—Micropro-
`cessors, Robert M. Best, pp. 466-469.
`DiscStore (Electronic Publishing Resources 1991).
`Document from Internet, cgi(@@ncsa.uiuc.edu, CGI Common
`Gateway Interface, 1 page, 1996.
`DSP56000/DSP56001 Digital Signal
`Manual, Motorola, 1990, pp. 2-2.
`Dusse, Stephen R. and Burton S. Kaliski A Cryptographic
`Library for the Motorola 56000 in Damgard, I.M., Advances
`in Cryptology—Proceedings Eurocrypt 90, Springer—Ver-
`lag, 1991, pp. 230-244,
`Dyson, Esther, Intellectual Value, Wired Magazine, Jul.
`1995, pp. 136-141 and 182-184.
`Effector Online vol. 6 No. 6, A Publication of the Electronic
`Frontier Foundation, 8 pages, Dec. 6, 1993.
`EIA and TIA White Paper on National Information Infra-
`structure,published by the Electronic Industries Association
`and the Telecommunications Industry Association, Wash-
`ington, D.C., no date.
`Electronic Currency Requirements, X1WT(Cross Industry
`Working Group), no date.
`Electronic Publishing Resources Inc. Protecting Electroni-
`cally Published Properties Increasing Publishing Profits
`(Electronic Publishing Resources 1991).
`Firefly Network, Inc., www.ffly.com, What is Firefly? Fire-
`fly revision: 41.4 Copyright 1995, 1996.
`First CIT Honeywell Bull International Symposium on Com-
`puter Security and Confidentiality, Jan. 26-28, 1981, Con-
`ference Text, pp. 1-21.
`Information Infrastructure Ser-
`Framework for National
`vices, Draft, U.S. Department of Commerce, Jul. 1994,
`Framework for National Information Infrastructure Ser-
`vices, NIST, Jul. 1994, 12 slides.
`Garcia, D. Linda, testimony before a hearing on science,
`space and technology, May 26, 1994.
`Gleick, James, “Dead as a Dollar” The New York Times
`Magazine, Jun. 16, 1996, Section 6, pp. 26-30, 35, 42, 50,
`54.
`
`Processor User’s
`
`Green paper, Intellectual Property and the National Infor-
`mation Infrastructure, a Preliminary Draft of the Report of
`the Working Group on Intellectual Property Rights, Jul.
`1994,
`
`Greguras, Fred, Softic Symposium *95, Copyright Clear-
`ances and Moral Rights, Nov. 30, 1995 (as updated Dec. 11,
`1995), 3 pages.
`
`CS-1004
`Cisco Systems, Inc. v. Finjan, Inc.
`Page 4
`
`OTHER PUBLICATIONS
`
`Argent Information Q&A Sheet, http://www.digital—water-
`mark.com/, Copyright 1995, The DICE Company, 7 pages.
`Arneke, David, et al., News Release, AT&T, Jan. 9, 1995,
`AT&Tencryption system protects information services,
`1
`page.
`AT&T Technology, vol. 9, No. 4, New Products, Systems and
`Services, pp. 16-19.
`Baggett, Claude, Cable’s Emerging Role in the Information
`Superhighway, Cable Labs, 13 slides.
`Barassi, Theodore Sedgwick, Esq., The Cybernotary: Public
`Key Registration and Certification and Authentication of
`International Legal Transactions, 4 pages.
`Barnes, Hugh, memo to Henry LaMuth, subject: George
`Gilder articles, May 31, 1994.
`Bart, Dan, Comments in the Matter of Public Hearing and
`Request for Comments on the International Aspects of the
`National Information Infrastructure, Aug. 12, 1994,
`Baum, Michael, Worldwide Electronic Commerce: Law,
`Policy and Controls Conference, program details, Nov. 11,
`1993.
`
`Bisbey, II et al., Encapsulation: An Approach to Operating
`System Security, Oct. 1973, pp. 666-675.
`Blom et al., Encryption Methods in Data Networks, Ericsson
`Technics, No. 2, 1978, Stockholm, Sweden.
`Bruner, Rick E., PowerAgent, NetBot help advertisers reach
`Internet shoppers, Aug. 1997 (Document from Internet).
`Cable Television and America’s Telecommunications Infra-
`structure, National Cable Television Association, Apr. 1993.
`Caruso, Technology, Digital Commerce 2 plans for water-
`marks, which can bind proof of authorship to electronic
`works, New York Times (Aug. 1995).
`CD ROM, Introducing .
`.
`. The Workflow CD-ROM Sam-
`pler, Creative Networks, MCIMail: Creative Networks,Inc.,
`Pala Alto, California.
`Choudhury, et al., Copyright Protection for Electronic Pub-
`lishing over Computer Networks, AT&T Bell.
`Laboratores, Murray Hill, New Jersey 07974 (Jun. 1994).
`Clark, Tim, Ad service gives cash back, www.news.com,
`Aug. 4, 1997, 2 pages (Document from Internet).
`Codereard, Spec Sheet—Basic Coder Subsystem, No date
`given.
`Communications of the ACM, Intelligent Agents, Jul. 1994,
`vol. 37, No. 7.
`Communications of the ACM, Jun. 1996, vol. 39, No. 6.
`
`CS-1004
`Cisco Systems, Inc. v. Finjan, Inc.
`Page 4
`
`

`

`6,157,721
`
`Page 5
`
`Guillou, L.: Smart Cards and Conditional Access, pp.
`480-490 Advances in Cryptography, Proceedings of Euro-
`Crypt 84 (Beth et al, Ed., Springer—Verlag 1985).
`Harman, Harry H., Modern Factor Analysis, Third Edition
`Revised, University of Chicago Press Chicago and London,
`Third revision published 1976.
`Herzberg, Amir et al., Public Protection of Software, ACM
`Transactions on Computer Systems, vol. 5, No. 4, Nov.
`1987, pp. 371-393.
`Hofmann, Jud, Interfacing the NII to User Homes, Elec-
`tronic Industries Association, Consumer Electronic Bus
`Committee, 14 slides, no date.
`Holt, Stannie, Start-up promises user confidentiality in Web
`marketing service,
`Info World Electric, Aug. 13, 1997
`(Document from Internet).
`IBM Technical Disclosure Bulletin, Multimedia Mixed
`Object Envelopes Supporting a Graduated Fee Scheme via
`Encryption, vol. 37, No. 03, Mar. 1994, Armonk, NY.
`IBM Technical Disclosure Bulletin, Transformer Rules for
`Software Distribution Mechanism—Support Products, vol.
`37, No. 04B, Arp. 1994, Armonk, NY.
`IISP Break Out Session Report for Group No. 3, Standards
`Development and Tracking Systems, no date.
`Information Infrastructure Standards Panel: NI ‘The Infor-
`
`mation Superhighway’, Nations Bank—HGDeal—ASC X9,
`15 pages.
`Invoice? What is an Invoice? Business Week, Jun. 10, 1996.
`Jiang, et al, A concept—Based Approach to Retrieval from an
`Electronic Industrialn Directory, /nternational Journal of
`Electronic Commerce, vol. 1, No. 1, Fall 1996, pp. 51-72.
`Jones, Debra, Top Tech Stories, PowerAgent Introducts First
`Internet ‘Infomediary’ to Empower and Protect Consumers,
`Aug. 13, 1997 3 pages (Document from Internet).
`Kelly, Kevin, Whole Earth Review, E-Money,pp. 40-59,
`Summer 1993.
`
`Kent, Protecting Externally Supplied Software In Small
`Computers (MIT/LCS/TR-255 Sep. 1980).
`Kohntopp, M., Sag’s durch die Blume, Apr.
`marit@schulung.netuse.de.
`Kristol et al., Anonymous Internet Mercantile Protocol,
`AT&T Bell Laboratories, Murray Hill, New Jersey, Draft:
`Mar. 17, 1994.
`Lagoze, Carl, D-Lib Magazine, Jul./Aug. 1996, The War-
`wick Framework, A Container Architecture for Diverse Sets
`of Metadata.
`
`1996,
`
`Lanza, Mike, electronic mail, George Gilder’s Fifth
`Article—Digital Darkhorse—Newspapers, Feb. 21, 1994.
`Levy, Steven, Wired, E-Money, That’s What
`I Want, 10
`pages, Dec. 1994,
`Low et al., Anonymous Credit Cards and its Collusion
`Analysis, AT&T Bell Laboratories, Murray Hill, New Jer-
`sey, Oct. 10, 1994,
`Low et al., Anonymous Credit Cards, AT&T Bell Labora-
`tories, Proceedings of the 2nd ACM Conference on Com-
`puter and Communications Security, Fairfax, Virginia, Nov.
`2-4, 1994.
`Lowet al.,Document Marking and Identification using both
`Line and Word Shifting, AT&T Bell Laboratories, Murray
`Hill, New Jersey, Jul. 29, 1994.
`Maclachlan, Malcolm, PowerAgent Debuts Spam—Free
`Marketing, TechWire, Aug. 13, 1997, 3 pages (Document
`from Internet).
`Maxemchuk, Electronic Document Distribution, AT&TBell
`Laboratories, Murray Hill, New Jersey 07974.
`
`Micro Card—Micro Card Technologies, Inc., Dallas, Texas,
`No date given.
`Milbrandt, E., Stenanography Info and Archive, 1996.
`Mori, Ryoichi and Masaji Kawahara, The Transactions of
`the EIEICE, V, Superdistribution: The Concept and the
`Architecture, E73 (Jul. 1990), No. 7, Tokyo, Japan.
`Mossberg, Walter S., Personal Technology, Threats to Pri-
`vacy On-Line Become More Worrisome, Wall Street Jour-
`nal, Oct, 24, 1996.
`Negroponte, Electronic Word of Mouth, Wired Oct. 1996, p.
`218.
`Some
`Telecommunications,
`Nicholas,
`Negroponte,
`Thoughts on Likely and expected Communications sce-
`narios: A Rebuttal, pp. 41-42, Jan. 1993.
`Neumann,et al., A Provably Secure Operating System: The
`System, Its Applications, and Proofs, Computer Science
`Laboratory Report CSL—116, Second Edition, SRI Interna-
`tional (May 1980).
`News Release, Premenos Announces Templar 2.0—Next
`Generation
`Software
`for
`Secure
`Internet
`EDI,
`webmaster(@templar.net, 1 page, Jan. 17, 1996.
`News Release, The Document Company Xerox, Xerox
`Announces Software Kit for Creating Working Documents
`with Dataglyphs, Nov. 6, 1995, Minneapolis, MN, 13 pages.
`News Release, The White House, Office of the President,
`Background on the Administration’s Telecommunications
`Policy Reform Initiative, Jan. 11, 1994.
`NII, Architecture Requirements, XIWT, no date.
`Open System Environment Architectural Framework for
`National Information Infrastructure Services and Standards,
`in Support of National Class Distributed Systems, Distrib-
`uted System Engineering Program Sponsor Group, Draft
`1.0, Aug. 5, 1994,
`Pelton, Dr. Joseph N., Telecommunications, Why Nicholas
`Negroponte is Wrong About the Future of Telecommunica-
`tion, pp. 35-40, Jan. 1993.
`Portland Software’s ZipLock, Internet information, Copy-
`right Portland Software 1996-1997, 12 pages.
`PowerAgent Inc., Proper Use of Consumer Information on
`the Internet White Paper, Jun. 1997, Document from Inter-
`net, 9 pages (Document from Internet).
`PowerAgent Press Releases, What the Experts are Reporting
`on PowerAgent, Aug. 13, 1997, 6 pages (Document from
`Internet).
`PowerAgent Press Releases, What the Experts are Reporting
`on PowerAgent, Aug. 4, 1997, 5 pages (Document from
`Internet).
`PowerAgent Press Releases, What the Experts are Reporting
`on PowerAgent, Aug. 13, 1997, 3 pages (Document from
`Internet).
`Premenos Corp. White Paper: The Future of Electronic
`Commerce, A Supplement to Midrange Systems, Internet
`webmaster(@premenos.com, 4 pages.
`Press Release, National Semiconductor and EPR Partner For
`Information Metering/Data Security Cards (Mar. 4, 1994).
`Rankine, G., Thomas—A Complete Single-—Chip RSA
`Device, Advances in Cryptography, Proceedings of Crypto
`86, pp. 480-487 (A.M. Odlyzko Ed., Springer-Verlag
`1987).
`committee
`Standards
`K:;
`Arthur
`Reilly,
`T1-Telecommunications, Input to the ‘International Tele-
`communications Hearings,’ Panel 1: Component Technolo-
`gies of the NII/GII, no date.
`Resnick, et al., Recommender Systems, Communications of
`the ACM, vol. 40, No. 3, Mar. 1997, pp. 56-89.
`
`CS-1004
`Cisco Systems, Inc. v. Finjan, Inc.
`Page 5
`
`CS-1004
`Cisco Systems, Inc. v. Finjan, Inc.
`Page 5
`
`

`

`6,157,721
`Page 6
`
`ROI (Personal Library Software, 1987 or 1988).
`ROI-Solving Critical Electronic Publishing Problems (Per-
`sonal Library Software, 1987 or 1988).
`Rose, Lance, Cyberspace and the Legal Matrix: Laws or
`Confusion?, 1991.
`Rosenthal, Steve, New Media, Interactive Network: Viewers
`Get Involved, pp. 30-31, Dec. 1992.
`Rosenthal, Steve, New Media, Interactive TV: The Gold
`Rush Is On, pp. 27-29, Dec, 1992.
`Rosenthal, Steve, New Media, Mega Channels, pp. 36-46,
`Sep. 1993,
`Rothstein, Edward, The New York Times, Technology, Con-
`nections, Making th eInternet come to you, through ‘push’
`technology.. pp D5, Jan. 20, 1997,
`Internet
`Rutkowski, Ken, PowerAgent
`Introduces First
`‘Infomediary’ to Empower and Protect Consumers, Tech
`Talk News Story, Aug. 4, 1997 (Document from Internet).
`Sager, Ira (Edited by), Bits & Bytes, Business Week, Sep. 23,
`1996, p. 142E,
`Schlossstein, Steven, International Economy, America: The
`G7’s Comeback Kid, Jun./Jul. 1993.
`Schurmann, Jurgen, Pattern Classification, A Unified View
`of Statistical and Neural Approaches, John Wiley & Sons,
`Inc., 1996.
`Scnaumueller—Bichi et al., A Method of Software Protection
`Based on the Use of Smart Cards and Cryptographic Tech-
`niques, Nodate given.
`Serving the Community: A Public-Interest Vision of the
`National Information Infrastructure, Computer Profession-
`als for Social Responsibility, Executive Summary, nodate.
`Shear, Solutions for CD-ROM Pricing and Data Security
`Problems, pp. 530-533, CD ROM Yearbook 1988-1989)
`(Microsoft Press 1988 or 1989).
`Smith et al., Signed Vector Timestamps: A Secure Protocol
`for Partial Order Time, CMU—93-116, School of Computer
`Science Carnegie Mellon University, Pittsburgh, Pennsyl-
`vania, Oct. 1991; version of February 1993,
`Special Report, The Internet:Fulfulling the Promise The
`Internet: Bring Order From Chaos; Lynch, Clifford, Search
`the Internet; Resnick, Paul, Filtering Information on the
`Internet; Hearst, Marti A., Interfaces for Searching the Web;
`Stefik, Mark, Trusted Systems; Scientific American, Mar.
`1997, pp. 49-56, 62-64, 68-72, 78-81.
`Stefik, Internet Dreams: Archetypes, Myths, and Metaphors,
`Letting Loose the Light: Igniting Commerce in Electronic
`Publication, pp. 219-253, (1996) Massachusetts Institute of
`Technology.
`Stefik, Mark, Introduction to Knowledge Systems, Chapter 7,
`Classification, pp 543-607, 1995 by Morgan Kaufmann
`Publishers, Inc.
`Stefik, Mark, Letting Loose the Light, Igniting Commerce in
`Electronic Publication, (1994, 1995) Pala Alto, California.
`Stephenson, Tom, Advanced Imaging, The Info Infrastruc-
`ture Initiative: Data Superhighways and You, pp. 73-74,
`May 1993.
`Sterling, Bruce, Literary freeware: Not for Commercial Use,
`remarks at Computers, Freedom and Privacy Conference IV,
`Chicago, Mar. 26, 1994,
`Struif, Bruno The Use of Chipcards for Electronic Signa-
`tures and Encryption in: Proceedings for the 1989 Confer-
`ence on VSLI and Computer Peripherals, IEEE Computer
`Society Press, 1989, pp. 4/155-4/158.
`Suida, Karl, Mapping New Applications Onto New Tech-
`nologies, Security Services in Telecommunications Net-
`works, Mar. 8-10, 1988, Zurich.
`
`Templar Overview,: Premenos, Internet info@templar.net, 4
`pages.
`
`Templar Software and Services: Secure, Reliable, Stan-
`dards—Based EDI Over the Internet, Premenios, Internet
`info@templar.net, Lpage.
`The 1.1 Future of the Electronic Marketplace: Return to a
`Hunting and Gathering Society, 2 pages no date.
`
`The Benefits of ROI For Database Protection and Usage
`Based Billing (Personal Library Software, 1987 or 1988).
`The New Alexandria No. 1, Alexandria Institute, pp. 1-12,
`Jul—Aug. 1986.
`
`Tygaret al., Cryptography: It’s Not Just For Electronic Mail
`Anymore, CMU-CS-—93-107, School of Computer Science
`Carnegie Mellon University, Pittsburgh, Pennsylvania, Mar.
`1, 1993.
`
`Tygar et al, Dyad: A System Using Physically Secure
`Coprocessors, School of Computer Science, Carnegie Mel-
`lon University, Pittsburgh, PA 15213 (undated).
`Tygar et al., Dyad: A System for Using Physically Secure
`Coprocessors, School of Computer Science, Carnegie Mel-
`lon University, Pittsburgh, PA 15213 (May. 1991).
`
`Valovic T., Telecommunications, The Role of Computer
`Networking in the Emerging Virtual Marketplace, pp.
`40-44.
`
`Voight, Joan, Beyond the Banner, Wired, Dec. 1996,pp. 196,
`200, 204.
`
`Vonder Haar, Steven, PowerAgent Launches Commercial
`Service, Inter@ctive Week, Aug. 4, 1997 (Document from
`Internet).
`
`Weber, Dr. Robert, Digital Rights Management Technolo-
`gies, A Report to the International Federation of Reproduc-
`tion Rights Organisations, Oct. 1995,pp 1-49.
`
`Weber, Dr. Robert, Digital Rights Management Technolo-
`gies, Oct. 1995, 21 pages.
`
`Weber, Metering Technologies for Digital Intellectual Prop-
`erty, A Report to the International Federation of Reproduc-
`tion Rights Organisations, pp 1-29; Oct. 1994, Boston, MA,
`USA,
`
`Weber, Adele, Life on the InfoHighway, 4 pages, no date.
`
`Weingart, Physical Security for the :ABYSS System, IBM
`Thomas J. Watson Research Center, Yorktown Heights, New
`York 10598 (1987).
`
`Weitzner, Daniel J., A Statement on EFF’s Open Platform
`Campaign as of Nov., 1993, 3 pages.
`WEPIN Store, Stenography (Hidden Writing) (Common
`Law 1995).
`White, ABYSS: A Trusted Architecture for Software Pro-
`tection, IBM Thomas J. Watson Research Center, Yorktown
`Heights, New York 10598 (1987).
`
`Wired 1.02, Is Advertising Really dead?, Part 2, 1994.
`
`World Wide Web FAQ, How can I put an access counter on
`my home page?, 1 page, 1996.
`XIWT Cross Industry Working Team, 5 pages, Jul. 1994.
`
`Yee, Using Secure Coprocessors, CMU-—CS—94—-149,
`School of Computer Science, Carnegie Mellon University,
`Pittsburgh, PA15213.
`
`CS-1004
`Cisco Systems, Inc. v. Finjan, Inc.
`Page 6
`
`CS-1004
`Cisco Systems, Inc. v. Finjan, Inc.
`Page 6
`
`

`

`U.S. Patent
`
`Dec. 5, 2000
`
`Sheet 1 of15
`
`Problems
`
`FIG.1.Gefectiveor"Bogus"LoadModulesCanCause
`
`6,157,721
`
`CS-1004
`Cisco Systems, Inc. v. Finjan,
`Inc.
`age 7
`
`CS-1004
`Cisco Systems, Inc. v. Finjan, Inc.
`Page 7
`
`

`

`U.S. Patent
`
`Dec. 5, 2000
`
`Sheet 2 of 15
`
`6,157,721
`
`
`VERIFYINGAUTHORITY
`
`
`FIG.2VerifyingLoadModules
`
`CS-1004
`Cisco Systems, Inc. v. Finjan, Inc.
`Page 8
`
`

`

`
`
`PALIUsIgGSEHI[NPOjA]PeO7jj89SOLSxIBY)
`
`LNIWNNOUIANZONISSAIO“dGALIALOUd
`
`
`
`SYNLVNDISON |‘2INpoWPeo]YSaSp
`UaWUOJIAUZHulssadolgpaysajolgBoagEg“KDI-4
`
`
`
`Dec. 5, 2000
`
`Sheet 3 of 15
`
`6,157,721
`
`U.S. Patent
`
`801
`
`
`
`
`
`YOSS390Ud
`
`OLL
`
`
`
`SNVAWSYNLVYNDSIS
`
`ASNOLAVHOS.LI
`
`AsnLNOM|-
`
`CS-1004
`Cisco Systems, Inc. v. Finjan, Inc.
`Page 9
`
`CS-1004
`Cisco Systems, Inc. v. Finjan, Inc.
`Page 9
`
`

`

`U.S. Patent
`
`Dec.5, 2000
`
`Sheet 4 of15
`
`6,157,721
`
`54
`
`102
`
`
` Executable No. X5198
`
`created 6/26/96 by
`David Van Wie of
`
`Intertrust Technologies
`Corp.doesthe following:
`
`412
`
`
`
`FIG. 4
`
`Certifying Load Module by
`Checking it Against its Documentation
`
`CS-1004
`Cisco Systems, Inc. v. Finjan, Inc.
`Page 10
`
`CS-1004
`Cisco Systems, Inc. v. Finjan, Inc.
`Page 10
`
`

`

`U.S. Patent
`
`Dec. 5, 2000
`
`Sheet 5 of 15
`
` 6,157,721
`
`LOAD MODULE
`
`PRIVATE
`KEY
`
`FIG. 5
`
`Creating a Certifying
`Digital Signature
`
`CS-1004
`Cisco Systems, Inc. v. Finjan, Inc.
`Page 11
`
`CS-1004
`Cisco Systems, Inc. v. Finjan, Inc.
`Page 11
`
`

`

`U.S. Patent
`
`Dec. 5, 2000
`
`Sheet 6 of 15
`
`6,157,721
`
`a0~NAaMonanda
`
`
`
`80L-LNJIWNOYIANSDNISSZIO¥dG4aL03L0¥d
`
`
`
`
`
`
`
`ainjeubisjeyiigehuyesjuayjnyGG"KI-4
`
`CS-1004
`Cisco Systems, Inc. v. Finjan, Inc.
`Page 12
`
`CS-1004
`Cisco Systems, Inc. v. Finjan, Inc.
`Page 12
`
`
`

`

`U.S. Patent
`
`Dec. 5, 2000
`
`Sheet 7 of15
`
`6,157,721
`
`
`
`LOADMODULE
`
`tiated’
`
` SignedWith
`
`DifferentTechniques FIG.7SameLoadModuleCanBe
`
`CS-1004
`Cisco Systems, Inc. v. Finjan, Inc.
`Page 13
`
`CS-1004
`Cisco Systems, Inc. v. Finjan, Inc.
`Page 13
`
`

`

`U.S. Patent
`
`Dec.5, 2000
`
`Sheet 8 of15
`
`6,157,721
`
`FIG. 8 Same Load Module Can Be
`Distributed with Multiple Signatures
`
`1081)
`
`406(2)
`
`dog(ny
`
`
`
`
`124(N)
`
`FIG. 8A Different Processing Environments Can Have
`Different Subsets of Keys
`
`108(1)
`
`|_|
`
`108(N)
`
`CS-1004
`Cisco Systems, Inc. v. Finjan, Inc.
`Page 14
`
`CS-1004
`Cisco Systems, Inc. v. Finjan, Inc.
`Page 14
`
`

`

`U.S. Patent
`
`Dec.5, 2000
`
`Sheet 9 of15
`
`FIG. 9 Load Module Can Have Several
`Independently Signed Portions
`
`54 106(1)
`
`6,157,721
`
`CS-1004
`Cisco Systems, Inc. v. Finjan, Inc.
`Page 15
`
`CS-1004
`Cisco Systems, Inc. v. Finjan, Inc.
`Page 15
`
`

`

`U.S. Patent
`
`Dec. 5, 2000
`
`Sheet 10 of15
`
`6,157,721
`
`FIG. 10A Assurance Level|
`Software-Based
`
`Protected Processing Environment
`Protected Processing Environment
`Protected Processing Environment
`
`FIG. 10B AssuranceLevelII
`Software and Hardware-Based
`
`FIG.

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket