throbber
UNITED STATES PATENT AND TRADEMARK OFFICE
`_______________________
`BEFORE THE PATENT TRIAL AND APPEAL BOARD
`_______________________
`APPLE INC.,
`Petitioner
`v.
`UNILOC LUXEMBOURG S.A.
`Patent Owner
`_______________________
`Case No. IPR2018-00294
`Patent No. 6,736,759
`
`
`DECLARATION OF WILLIAM C. EASTTOM II (CHUCK EASTTOM)
`
`
`
`
`
`
`
`
`
`

`

`
`
`I.
`
`II.
`
`TABLE OF CONTENTS
`
`INTRODUCTION ........................................................................................................3
`
`BACKGROUND AND QUALIFICATIONS .....................................................................3
`
`III.
`
`CLAIM CONSTRUCTION ............................................................................................3
`
`IV.
`
`THE ‘759 PATENT .....................................................................................................4
`
`V.
`
`ONE OF ORDINARY SKILL IN THE ART ......................................................................5
`
`VI.
`
`GENERAL ISSUES ......................................................................................................6
`
`VII.
`
`SPECIFIC CLAIMS ......................................................................................................7
`
`A. Claim 1................................................................................................................7
`
`B. Claim 20 .............................................................................................................8
`
`C. Claim 22 .......................................................................................................... 11
`
`VIII.
`
`CONCLUSIONS ....................................................................................................... 13
`
`IX.
`
`APPENDIX A – EASTTOM CV .................................................................................. 14
`
`A. Education ........................................................................................................ 14
`1. University Degrees ........................................................................ 14
`2.
`Industry Certifications ................................................................... 14
`3. Security and Forensics Related Certifications............................... 16
`4. Software Certifications ................................................................. 16
`5. Licenses ......................................................................................... 16
`
`B. Publications ..................................................................................................... 16
`1. Books 17
`2. Papers, presentations, & articles. ................................................. 18
`
`C. Patents ............................................................................................................ 20
`
`D. Standards and Certification Creation.............................................................. 21
`
`E. Professional Awards and Memberships ......................................................... 22
`
`F. Speaking Engagements ................................................................................... 22
`
`
`
`1
`
`

`

`
`
`
`
`
`
`
`G. Litigation Support Experience ......................................................................... 25
`1. Testifying Experience .................................................................... 30
`
`H. Professional Experience .................................................................................. 32
`
`I. Continuing Professional Education ................................................................. 35
`
`J. References to my work ................................................................................... 36
`1. Media References ......................................................................... 36
`2. References to publications ........................................................... 37
`3. Universities using my books ......................................................... 43
`
`K. Training ........................................................................................................... 45
`
`L. Technical Skills ................................................................................................ 46
`
`
`
`2
`
`

`

`
`
`I.
`
`INTRODUCTION
`
`1.
`
`I have been retained by Uniloc to provide my expert opinions regarding
`
`validity of U.S. Patent No. 6,736,759 (“’759 Patent”).
`
`2.
`
`I am being compensated for my time at my standard consulting rate of
`
`$300 per hour. I am also being reimbursed for expenses that I incur during the course of
`
`this work. My compensation is not contingent upon the results of my study or the
`
`substance of my opinions.
`
`II.
`
`BACKGROUND AND QUALIFICATIONS
`
`3.
`
`I have 25+ years of experience in the computer science industry including
`
`extensive experience with computer security, computer programming, and computer
`
`networking. I have authored 26 computer science books, including textbooks used at
`
`universities around the world. I hold 42 different computer industry certifications,
`
`including many in networking subjects. I am experienced with multiple programming
`
`languages. I also have extensive experience in computer networking. I have extensive
`
`experience with mobile devices, including all aspects of mobile devices (hardware and
`
`software). I am a Distinguished Speaker for the Association of Computing Machinery
`
`(ACM), and a reviewer for the IEEE Security and Privacy journal, as well as a reviewer for
`
`the International Journal of Cyber Warfare and Terrorism (IJCWT). My CV is attached as
`
`appendix A.
`
`III.
`
`CLAIM CONSTRUCTION
`
`4.
`
`Fort the purposes of an IPR, claim terms are given their broadest
`
`reasonable meaning.
`
`
`
`3
`
`

`

`
`
`5.
`
`The petitioner has adopted the CAFC definition for “data acquisition unit.”
`
`The CAFC construed this term to mean “a structure or set of structures including at least
`
`the electronic positioning device and the physiological monitor.”
`
`6.
`
`The petitioner has adopted the CAFC definition for “Display unit.” The
`
`CAFC construed this term to mean “a structure or set of structures, separate from the
`
`data acquisition unit, for displaying real-time data provided by both the electronic
`
`positioning device and the physiological monitor independently or over a common
`
`transmission path.”
`
`7.
`
`The petitioner has adopted the CAFC definition for “Displaying real time
`
`data.” The CAFC construed this term to mean “displaying data without intentional delay,
`
`given the processing limitations of the system and the time required to accurately
`
`measure the data.””
`
`8.
`
`The petitioner has adopted and earlier courts definition of probe. A probe:
`
`““a ‘probe’ [‘sensor’] means a device used to obtain physiological information from a
`
`user.”
`
`9.
`
`For the purposes of this proceeding I will use the petitioners adopted
`
`definitions in performing my analysis and forming my opinions.
`
`IV.
`
`THE ‘759 PATENT
`
`10.
`
`The ’759 Patent was filed on November 9, 1999 and issued on May 18,
`
`2004. Therefore, I assume a priority date of November 1999. This invention is an exercise
`
`monitoring system which includes an electronic positioning device; a physiological
`
`
`
`4
`
`

`

`
`
`monitor; and a display unit configured for displaying data provided by the electronic
`
`positioning device and the physiological monitor.
`
`11.
`
`The ’759 Patent teaches an innovative exercise monitoring system, as well
`
`as training and analytical methods useful for subjects performing physical activities. As an
`
`example, the systems and methods of the invention, provides real-time data and
`
`feedback useful to individuals performing a physical activity (such as athletes). And the
`
`monitoring system may include an electronic positioning device (such as a GPS device)
`
`and/or a physiological monitor (such as an oximeter or a heart rate monitor).
`
`12.
`
`According to the invention of the ’759 Patent, one embodiment of the
`
`monitoring system includes both an electronic positioning device and a physiological
`
`monitor (such as an oximeter or heart rate monitor) as part of an integrated monitoring
`
`system. Such an integrated monitoring system allows velocity, pace, and/or distance
`
`traveled information provided by the electronic positioning device to be used in
`
`conjunction with data provided by the physiological monitor. In this manner, exercising
`
`subjects can monitor, control and/or analyze their performance while exercising at any
`
`location. The invention of the ’759 Patent also provides analytical and training methods
`
`which utilize data provided by: (a) a physiological monitor; (b) an electronic positioning
`
`device (such as a GPS device); or (c) the combination of an electronic positioning device
`
`and a physiological monitor (such as a heart rate monitor or an oximeter).
`
`V.
`
`ONE OF ORDINARY SKILL IN THE ART
`
`13.
`
`Patent claims must be viewed from the perspective of one of ordinary skill
`
`in the art. A Person of Ordinary Skill in the Art (POSA) in November 1999 would have been
`
`
`
`5
`
`

`

`
`
`one with a bachelor’s degree in engineering, computer science, or related technical area
`
`with 2 years of experience related to mobile devices and/or physiological monitoring.
`
`Additional experience can compensate for a lack of a degree.
`
`14.
`
`I am aware that Dr. Fyfe has a different view of a POSA. While I disagree
`
`with Dr. Fyfe, even if one adopts his view of a POSA, it would not alter my opinions.
`
`VI.
`
`GENERAL ISSUES
`
`15.
`
`Throughout the petition and Dr. Fyfe’s declaration, the phrase “would have
`
`been an obvious” appears quite frequently. However, what is conspicuously absent from
`
`Dr. Fyfe’s declaration and the petition is even the most cursory discussion of a) why a
`
`particular alteration or combination would have bene obvious; or b) why a POSA would
`
`have been motivated to combine two asserted pieces of prior art.
`
`A.
`
`Arcelus
`
`16.
`
`In many cases, the prior art being asserted is from vastly different fields,
`
`and a POSA would have not motivation at all to combine them. As one example, Arcelus
`
`is a patent regarding recording electrocardiograms. Dr. Fyfe, in his description of a POSA
`
`does not mention any experience or training at all in medical devices or medical software
`
`of any kind. A POSA, using Dr. Fyfe’s definition, would likely have been completely
`
`unaware of Arcelus, and would not have been qualified to use it, modify it, or combine it
`
`with other patents.
`
`17.
`
`Combining Arcelus with any of the other asserted prior art would not only
`
`not be obvious, as the petitioner claims, but would be counter intuitive. For example,
`
`Vock is “sport monitoring system for determining airtime, speed, power absorbed and
`
`other factors such as drop distance.” There is no motivation for a POSA to combine these
`
`
`
`6
`
`

`

`
`
`two very disparate inventions. And I note that neither the petitioner nor Dr. Fyfe ever
`
`articulate any motivation. Both the petitioner and Dr. Fyfe simply continually repeat “it
`
`would have been obvious…”.
`
`B.
`
`Motivation to combine
`
`18.
`
`In his declaration, Dr. Fyfe states “I am informed that the existence of an
`
`explicit teaching, suggestion, or motivation to combine known elements of the prior art is
`
`a sufficient, but not a necessary, condition to a finding of obviousness.” However, in his
`
`declaration and the petition there is no discussion of the motivation. Simply the repeated
`
`conclusory claim that one or more combination ‘would have been obvious’, without even
`
`a suggestion of why that would be true. Furthermore, as discussed in the following section,
`
`in at least some instances, the asserted prior art actually teaches away from the claim
`
`elements of the ‘759 patent.
`
`VII.
`
`SPECIFIC CLAIMS
`
`19.
`
`Several claims discussed in the petitioner’s brief and Dr. Fyfe’s declaration
`
`stand out as requiring specific commentary. Those claims are discussed in this section
`
`A.
`
`Claim 1
`
`20.
`
`Claim 1 includes the following segment “(b) a display unit configured for
`
`displaying real-time data provided by said electronic positioning device and said
`
`physiological monitor, said display unit separate from said data acquisition unit;”
`
`(emphasis added).
`
`21.
`
`The petitioner has claimed:
`
`Fry discloses a display unit configured for displaying real-time data from the
`GPS and heart rate monitor. As described in the following excerpt, Figure 3
`illustrates the logic used to update the display in real-time, including how the
`
`
`
`7
`
`

`

`
`
`sensor data are received using “interrupts” and how the display is updated,
`without intentional delay, every loop:
`the controller next executes . . . interrupts, . . . after which the
`display is updated in accordance with new and previously stored
`parameters. More particularly, at block 330, if, through a mode
`selection, a GPS position is to be received, an interrupt is
`generated, and the new coordinates are computed at block 3[3]4 and
`stored in memory at block 338.
`. . .
`the controller next inputs signals received from time-based sensors, if
`updates are warranted in response to block 340. If so, such inputs,
`which include vehicle speed, crank rate, the cyclist's heart rate, and
`so forth are decoded at block 342 and stored in memory of block 346
`
`22.
`
`The petitioner has failed to understand, or has omitted part of the Fry
`
`language. What fry actually states is “Having attended to mode-related functions, the
`
`controller next executes the most time-critical routines, preferably in the form of
`
`interrupts, followed by a scanning of less-time critical sensor inputs, after which the
`
`display is updated in accordance with new and previously stored parameters.” Note that
`
`Fry explicitly states that after it attends to mode-related functions the controller then
`
`executes most time critical functions then less time critical sensor inputs. Only after all of
`
`that is handled “the display is updated…”. There is significant data processing occurring
`
`before Fry even attempts to update the display. Not only is this not real-time, it is in fact
`
`the antithesis of real-time.
`
`B.
`
`Claim 20
`
`23.
`
`Claim 20 states “The exercise monitoring system of claim 19, wherein said
`
`data acquisition unit includes memory, and at least one processor for processing acquired
`
`data in accordance with instructions stored in said memory of the data acquisition unit,
`
`
`
`8
`
`

`

`
`
`and further wherein said display unit includes memory, and at least one processor for
`
`processing acquired data in accordance with instructions stored in said memory of the
`
`display unit.”
`
`24.
`
`In reference to claim 20, the petitioner states “As described above for
`
`Claim 19, Fry discloses a data acquisition unit that includes memory and at least one
`
`processor for processing acquired data in accordance with instructions stored in said
`
`memory of the data acquisition unit. As further described above with reference to Claim
`
`1, the proposed combination of Fry and Newell includes an eyeglass-mounted heads-up
`
`display for displaying real time information from the body-mounted sensors. A PHOSITA
`
`would understand that it would have been obvious to implement the heads-up display
`
`with its own display processor, which would process and display data using instructions
`
`stored in the display unit memory.”
`
`25.
`
`The petitioner has missed, or ignored a significant element of claim 20.
`
`Claim 20 begins with describing ‘at least one processor for processing acquired data in
`
`accordance with instructions stored in said memory of the data acquisition unit’ and then
`
`says ‘and at least one processor for processing acquired data in accordance with
`
`instructions stored in said memory of the display unit’
`
`26.
`
`Claim 20 is very clear there are at least two processors. At least one in the
`
`data acquisition unit and at least one in the display unit. The petitioner does not even
`
`claim that Fry or Newell describe two separate processors, but instead merely claim it
`
`would have been obvious to implement the heads-up display with its own display
`
`
`
`9
`
`

`

`
`
`processor. The petitioner nor Dr. Fyfe provide any rational for this an in fact ignore what
`
`is actually claimed in Fry or Newell.
`
`27.
`
`Fry only mentions the word processor one time “Signal lines 222 include
`
`power-up/satellite locating signals from the processor” This is in reference to figure 2,
`
`shown below.
`
`
`
`
`
`28.
`
`Fry has a single processor and in fact appears not to have contemplated
`
`two processors.
`
`29.
`
`The word processor does not appear at all in Newell, however, Newell does
`
`mention a CPU in Figure 2 "FIG. 2 illustrates an embodiment of the body-mounted
`
`computer 120 in greater detail. The computer includes a memory 270, a CPU 280, and a
`
`storage device 290" Figure 2 is shown below.
`
`
`
`10
`
`

`

`
`
`30.
`
`Newell is even more clear that Fry. Not only is there a single processor in
`
`Newell, it is very clear from Figure 2 that the single CPU 280 is used for the entire system.
`
`31.
`
`The petitioner and Dr. Fyfe claim it would have been obvious to a POSA
`
`that Fry and Newell could have two processors, when both inventions clearly teach a
`
`
`
`single processor.
`
`C.
`
`Claim 22
`
`32.
`
`Claim 22 states “The exercise monitoring system of claim 1, wherein said
`
`display unit is configured for communication with said data acquisition unit via a wired or
`
`wireless link, such that data indicative of at least one of a subject’s velocity or pace can
`
`be transmitted to said display unit.”
`
`
`
`11
`
`

`

`
`
`33.
`
`In reference to claim 22, the petitioner states “Fry discloses displaying
`
`velocity data from the GPS receiver in order to provide feedback to the athlete during
`
`exercise. Fry at 5:56-60 (EX1004). A PHOSITA would understand that the heads-up display
`
`in the proposed Fry and Newell combination would necessarily communicate with the
`
`data acquisition components via either a wired or wireless link. Fyfe Decl. at ¶48
`
`(EX1002).”
`
`34.
`
`Again, the petitioner and Dr Fyfe are ignoring what Fry and Newell actually
`
`teach. From the figures in each in Fry, the only connection mentioned is wired.
`
`Furthermore, the term wireless does not even appear in Fry, nor is it even suggested.
`
`35.
`
`Newell does mention wireless, specifically “In some embodiments, CDOS
`
`systems communicate between themselves, such as via a wireless medium or when
`
`cabled together.” However, the entire purpose of Newell is completely different from Fry.
`
`These are two inventions in very different fields. The petitioner has not described any
`
`motivation to combine, but rather has simply made the conclusory statement that it
`
`would have been obvious for one of ordinary skill in the art.
`
`36.
`
`The petitioner also attempts to combine Fry with Acrelus. Acrelus
`
`discusses a very limited and specific use of wireless communication “Wires or wireless
`
`interconnections are used to connect these two patches to an electrocardiogram
`
`amplifier.” Furthermore, Acrelus is an EEG machine for medical use, and is in a completely
`
`different area than Fry. The petitioner has not described any motivation to combine, but
`
`rather has simply made the conclusory statement that it would have been obvious for one
`
`of ordinary skill in the art.
`
`
`
`12
`
`

`

`
`
`VIII.
`
`CONCLUSIONS
`
`37.
`
`For the reasons discussed in this declaration it is my opinion that a POSA
`
`would have not been motivated to combine Fry and Newell. Furthermore, a POSA would
`
`not have been motivated to combine Fry and Acelus.
`
`38.
`
`For the reasons discussed in this declaration, it is my opinion that there are
`
`specific and important differences between the ‘759 patent and the asserted prior art.
`
`Including the use of at least two processors in the ‘759 patent.
`
`39.
`
`For the reasons discussed in this declaration, it is my opinion that Fry does
`
`not teach real-time display update. In fact, Fry teaches away from real-time display
`
`update, explicitly requiring multiple functions to be executed before the display is
`
`updated.
`
`
`
`_______________________
`
`
`
`
`
`William C. Easttom II (Chuck Easttom) 22 March 2018
`
`
`
`
`
`
`
`
`
`
`
`
`
`13
`
`

`

`
`
`IX.
`
`APPENDIX A – EASTTOM CV
`
`A.
`
`Education
`
`1.
`
`University Degrees
`
`• B.A. Southeastern Oklahoma State University. Major Communications with
`Minors in Chemistry and Psychology. Extensive coursework in science (chemistry,
`physics, and biology) as well as neuroscience (neurobiology of memory, cognitive
`science, etc.). Also, additional coursework in computer science including
`programming and database courses.
`• M.Ed. Southeastern Oklahoma State University. Coursework included technology
`related courses such as digital video editing, multimedia presentations, and
`computer graphics. A statistics course was also part of the coursework.
`• M.B.A. Northcentral University Emphasis in Applied Computer Science. Extensive
`course work in graduate computer science including graduate courses in: C++
`programming, C# programming, Computer Graphics, Web Programming,
`Network communication, Complex Database Management Systems, and
`Artificial Intelligence. Approximately 30 graduate hours of graduate computer
`science courses. Additionally, a doctoral level statistics course was included. A
`semester research project in medical software was also part of the curriculum. I
`also took several research courses beyond the requirements for the degree.
`• Doctor of Science (In progress) Capitol Technology University. Majoring in
`cybersecurity, dissertation topic is a study of post quantum computing
`asymmetric cryptographic algorithms.
`
`
`
`
`
`
`2.
`
`Industry Certifications
`
`The following is a list of computer industry certifications I have earned.
`
`
`
`a.
`
`Hardware and Networking Related Certifications
`
`1. CompTIA (Computer Technology Industry Associations) A+ Certified
`
`2. CompTIA Network + Certified
`
`3. CompTIA Server+ Certified
`
`4. CompTIA I-Net+ Certified
`
`
`
`b.
`
`Operating System Related Certifications
`
`5. CompTIA Linux + Certified
`
`
`
`14
`
`

`

`
`
`6. Microsoft Certified Professional (MCP) – Windows Server 2000 Professional
`Certification Number: A527-9546
`
`7. Microsoft Certified Systems Administrator (MCSA) Windows Server 2000
`Certification Number: A527-9556
`
`8. Microsoft Certified Systems Engineer (MCSE) Windows Server 2000 Certification
`Number: A527-9552
`
`9. Microsoft Certified Technology Specialist (MCTS) Windows Server 2008 Active
`Directory Microsoft Certification ID: 1483483
`
`10. Microsoft Certified Technology Specialist (MCTS) Windows 7 Microsoft Certification
`ID: 1483483
`
`11. Microsoft Certified IT Professional (MCITP) Windows 7 Microsoft Certification ID:
`1483483
`
`12. Microsoft Certified Solutions Associate Windows 7 Microsoft Certification ID:
`1483483
`
`13. National Computer Science Academy Windows 8 Certification Certificate #: 4787829
`
`
`
`Programming and Web Development Related
`c.
`Certifications
`
`14. Microsoft Certified Professional (MCP) – Visual Basic 6.0 Desktop Applications
`Microsoft Certification ID: 1483483
`
`15. Microsoft Certified Professional (MCP) – Visual Basic 6.0 Distributed Applications
`Microsoft Certification ID: 1483483
`
`16. Microsoft Certified Application Developer (MCAD) - C# Microsoft Certification ID:
`1483483
`
`17. Microsoft Certified Trainer (MCT 2005-2012) Microsoft Certification ID: 1483483
`
`18. Microsoft Certified Technology Specialist (MCTS) Visual Studio 2010 Windows
`Application Microsoft Certification ID: 1483483
`
`19. Microsoft Certified Technology Specialist (MCTS) Visual Studio 2010 Data Access
`Microsoft Certification ID: 1483483
`
`20. National Computer Science Academy HTML 5.0 Certification Certificate #: 4788000.
`
`21. National Computer Science Academy ASP.Net Certification Certificate #: 4788342
`
`22. Certified Internet Webmaster (CIW) Associate CIW0163791
`
`
`
`d.
`
`Database Related Certifications
`
`23. Microsoft Certified Database Administrator (MCDBA) SQL Server 2000 Microsoft
`Certification ID: 1483483
`
`
`
`15
`
`

`

`
`
`24. Microsoft Certified Technology Specialist (MCTS) Implementing SQL Server 2008
`Microsoft Certification ID: 1483483
`
`25. Microsoft Certified IT Professional (MCITP) SQL Server Administration Microsoft
`Certification ID: 1483483
`
`
`
`3.
`
`Security and Forensics Related Certifications
`
`26. CIW Certified Security Analyst CIW0163791
`
`27. EC Council Certified Ethical Hacker v5 (CEH) ECC942445
`
`28. EC Council Certified Hacking Forensics Investigator v4 (CHFI) ECC945708
`
`29. EC Council Certified Security Administrator (ECSA) ECC947248
`
`30. EC Council Certified Encryption Specialist (ECES)
`
`31. EC Council Certified Instructor
`
`32. CISSP – Certified Information Systems Professional #387731
`
`33. ISSAP – Certified Information Systems Architect #387731
`
`34. CCFP – Certified Cyber Forensics Professional #387731
`
`35. Certified Criminal Investigator (CCI)
`
`36. Forensic Examination of CCTV Digital VTR Surveillance Recording Equipment
`
`37. Oxygen Phone Forensics Certified
`
`38. Access Data Certified Examiner (ACE) 2014-2017
`
`39. OSForensics Certified Examiner (OSFCE)
`
`40. Certified Forensic Consultant (CFC)
`
`4.
`
`Software Certifications
`
`41. National Computer Science Academy Microsoft Word 2013 Certification Certificate
`#: 5078016
`
`42. National Computer Science Academy Microsoft Word 2000 Certification Certificate
`#: 5078187
`
`
`
`5.
`
`Licenses
`
`Texas State Licensed Private Investigator. Registration Number 827827. Associated with
`Allegiant Investigations & Security License Number: A18596
`
`B.
`
`Publications
`
`
`
`
`
`
`
`16
`
`

`

`
`
`
`
`1.
`
`Books
`
`Easttom, C. (2003). Moving from Windows to Linux. Newton Center, MA:
`1.
`Charles River Learning. 1st Edition, Charles River Media.
`Easttom, C., Hoff, B. (2006). Moving from Windows to Linux, 2nd Ed.
`2.
`Newton Center, MA: Charles River Learning. 1st Edition, Charles River Media.
`
`Easttom, C. (2003). Programming Fundamentals in C++. Newton Center,
`3.
`MA: Charles River Learning. 1st Edition, Charles River Media.
`
` Easttom C. (2002). JFC and Swing with JBuilder 8.0. Plano, Texas:
`4.
`WordWare Publishing.
`
`Easttom, C. (2002). JBuilder 7.0 EJB Programming. Plano, Texas:
`5.
`WordWare Publishing.
`
`Easttom, C. (2001). Beginning JavaScript, 1st Edition. Plano, Texas:
`6.
`WordWare Publishing.
`
`Easttom, C. (2002). Beginning VB.Net. Plano, Texas: WordWare
`7.
`Publishing.
`Easttom, C. (2001). Advanced JavaScript, 2nd Edition. Plano, Texas:
`8.
`WordWare Publishing.
`
`Easttom, C. (2005). Introduction to Computer Security. New York City,
`9.
`New York: Pearson Press.
`
`Easttom, C. (2006). Network Defense and Countermeasures. New York
`10.
`City, New York: Pearson Press.
`Easttom, C. (2005). Advanced JavaScript, 3rd Edition. Plano, Texas:
`11.
`WordWare Publishing.
`
`Easttom, C., Taylor, J. (2010). Computer Crime, Investigation, and the
`12.
`Law. Boston, Massachusetts: Cengage Learning.
`
`Easttom, C. (2013). Essential Linux Administration: A Comprehensive
`13.
`Guide for Beginners. Boston, Massachusetts: Cengage Learning.
`Easttom, C. (2011). Introduction to Computer Security, 2nd Edition. New
`14.
`York City, New York: Pearson Press.
`Easttom, C. (2012). Network Defense and Countermeasures, 2nd Edition.
`15.
`New York City, New York: Pearson Press.
`Easttom, C. (2013). System Forensics, Investigation, and Response, 2nd
`16.
`Edition. Burlington Massachusetts: Jones & Bartlett.
`
`Easttom, C. (2014). CCFP Certified Cyber Forensics Professional All-in-One
`17.
`Exam Guide. New York City, New York: McGraw-Hill Publishing.
`
`Easttom, C., Dulaney, E. (2015). CompTIA Security+ Study Guide: SY0-401.
`18.
`Hoboken, New Jersey: Sybex Press.
`
`17
`
`

`

`
`
`
`
`
`
`Easttom, C. (2015). Modern Cryptography: Applied Mathematics for
`19.
`Encryption and Information Security. New York City, New York: McGraw-Hill
`Publishing.
`Easttom, C. (2016). Computer Security Fundamentals, 3rd Edition. New
`20.
`York City, New York: Pearson Press.
`Easttom, C. (2017). System Forensics, Investigation, and Response, 3rd
`21.
`Edition. Burlington Massachusetts: Jones & Bartlett.
`
`Easttom, C., Dulaney, E. (2017). CompTIA Security+ Study Guide: SY0-501.
`22.
`Hoboken, New Jersey: Sybex Press.
`
`Easttom, C. (2018). Penetration Testing Fundamentals: A Hands On Guide
`23.
`to Reliable Security Audits. New York City, New York: Pearson Press. Writing
`complete, will be published in early 2018.
`
`Easttom, C., Christy, R. (2017). CompTIA Security+ Review Guide: SY0-
`24.
`501. Hoboken, New Jersey: Sybex Press.
`
`Easttom, C., Roberts, R. (2018). Networking Fundamentals, 3rd Edition.
`25.
`Goodheart-Wilcox Publishing. Writing complete, will be published in early 2018.
`
`26. Easttom, C. (2018). Network Defense and Countermeasures, 3rd Edition.
`New York City, New York: Pearson Press.
`
`2.
`
`Papers, presentations, & articles.
`
`1. Easttom, C. (2010). RSA and its Challenges. EC Council White Paper.
`
`2. Easttom, C. (2010). Finding Large Prime Numbers. EC Council White Paper
`
`3. Easttom, C. (2010). A Method for Finding Large Prime Numbers. Haking
`Magazine. Hands-On Cryptography Issue.
`
`4. Easttom, C. (2014). A method for finding large prime numbers. Open Source
`Article published by Academia.edu 2014.
`
`5. Easttom, C. (2011). The RSA Algorithm - The ups and Downs. CryptoMagazine.
`
`6. Easttom, C. (2011). Feistel Ciphers - An Overview. Presentation at Cast Security
`Conference. Washington, D.C.
`
`7. Easttom, C. (2011). Steganography- History and Modern Applications.
`Presentation at Takedown Security Conference.
`
`8. Easttom, C. (2012). Problems with RSA. Presentation at Takedown Security
`Conference – Dallas, TX.
`
`9. Easttom, C. (2013). Cryptanalysis. Presentation at Takedown Security
`Conference. Huntsville, Alabama.
`
`10. Easttom, C. (2014). An Overview of Cryptographic S-Boxes used in Block Ciphers.
`Research Gate. DOI RG.2.2.14084.94088.
`
`18
`
`

`

`
`
`
`
`11. Easttom, C. (2014). Cryptographic Backdoors. Presentation at ISC2 Security
`Congress. Atlanta, Georgia.
`
`12. Easttom, C. (2014). Cryptographic Backdoors. Presentation at University of Texas
`Dallas ACM Chapter Conference.
`
`13. Easttom, C. (2014). Windows Registry Forensics. Research Gate. DOI
`RG.2.2.29603.86561
`
`14. Easttom, C. (2014). Artificial Intelligence, Fuzzy Logic, Neural Networks and Fuzzy
`Neural Networks and their impact on Electronic Medical Records. Academia.edu.
`
`15. Easttom, C. (2014). A Basic Overview of Electro-Magnetic Interference.
`Academia.edu.
`
`16. Easttom, C. (2014). An Overview of Targeted Malware. Academia.edu.
`
`17. Easttom C. (2014). An Introduction to Mobile Forensics. Academia.edu.
`
`18. Easttom, C. (2015). Cryptographic Backdoors. Academia.edu.
`
`19. Easttom, C. (2015). The History of Computer Crime in America. Academia.edu.
`
`20. Easttom, C. (2015). Spyware Techniques. Academia.edu.
`
`21. Easttom, C. (2015). Recovering Deleted Files from NTFS. Academia.edu.
`
`22. Easttom, C. (2015). Multi-dimensional analysis of cyber-forensic evidence.
`Academia.edu.
`
`23. Easttom, C. (2016). Spyware coding techniques. Journal of Information Security
`Science & Digital Forensics (HJISSDF), 1 (1)
`
`24. Easttom, C. (2016). Cryptographic Backdoors – an overview. Journal of
`Information Security Science & Digital Forensics (HJISSDF), 1 (1)
`
`25. Easttom, C. (2016). A Look at Spyware Techniques. 2600 Magazine, 33(3).
`Autumn issue 2016.
`
`26. Easttom, C. (2016). Multi-Dimensional Analysis of Digital Forensic Evidence.
`Forensic Examiner Journal, 25 (4).
`
`27. Easttom, C. (2016). Applying Graph Theory to Evidence Evaluation. Research
`Gate DOI: RG.2.2.23391.0528
`
`28. Easttom, C. (2017). An Overview of Pseudo Random Number Generators.
`Research Gate. DOI: RG.2.2.13941.58087
`
`29. Easttom, C. (2017). A Model for Penetration Testing. Research Gate. DOI:
`RG.2.2.36221.15844
`
`30. Easttom, C. (2017). The RSA Algorithm Explored. International Journal of
`Innovative Research in Information Security. (IJIRIS). 4(1).
`
`31. Easttom, C. (2017). Utilizing Graph Theory to Model Forensic Examination.
`International Journal of Innovative Research in Information Security (IJIRIS), 4(2).
`
`32. Easttom, C. (2017). Applying Graph Theory to Modeling Investigations. IOSR
`Journal of Mathematics (IOSR-JM) 13,2 PP 47-51. doi:10.9790/5728-130205475
`
`19
`
`

`

`
`
`
`
`
`
`33. Easttom, C. (2017). Enhancing SQL Injection with Stored Procedures. 2600
`Magazine. 34(3).
`
`34. Easttom, C. (2017). An Overview of Key Exchange Protocols. IOSR Journal of
`Mathematics (IOSR-JM). 13(4). DOI: 10.9790/5728-1304021618
`
`35. Easttom, C. (2017). An Overview of Quantum Cryptography with Lattice Based
`Cryptography. IOSR Journal of Mathematics, 13(

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket