throbber
UNITED STATES PATENT AND TRADEMARK OFFICE
`_______________________
`BEFORE THE PATENT TRIAL AND APPEAL BOARD
`_______________________
`APPLE INC.,
`Petitioner
`v.
`UNILOC LUXEMBOURG S.A.
`Patent Owner
`_______________________
`Case No. IPR2018-01028
`U.S. Patent No. 7,881,902
`
`DECLARATION OF WILLIAM C. EASTTOM II (CHUCK EASTTOM)
`
`Apple v. Uniloc, IPR2018-01028
`Uniloc's Exhibit No. 2001
`
`

`

`
`
`I.
`
`II.
`
`TABLE OF CONTENTS
`
`INTRODUCTION ........................................................................................................3
`
`BACKGROUND AND QUALIFICATIONS .....................................................................3
`
`III.
`
`THE ‘902 PATENT .....................................................................................................4
`
`IV.
`
`CLAIM CONSTRUCTION ............................................................................................5
`
`V.
`
`ONE OF ORDINARY SKILL IN THE ART ......................................................................5
`
`VI.
`
`GENERAL ISSUES ......................................................................................................5
`
`A. Motivation to Combine ......................................................................................5
`
`B. Cadence Window ...............................................................................................8
`
`VII.
`
`SPECIFIC CLAIM ELEMENTS ......................................................................................9
`
`A. 8.0 The method of claim 5, wherein determining the dynamic step cadence
`window comprises:” ....................................................................................... 10
`
`B. 8.1 computing a rolling average of stepping periods of previously counted
`steps; and ........................................................................................................ 11
`
`C. 8.2 setting the dynamic step cadence window based on the rolling average of
`stepping periods. ............................................................................................ 12
`
`VIII.
`
`CONCLUSIONS ....................................................................................................... 12
`
`IX.
`
`APPENDIX A – EASTTOM CV .................................................................................. 13
`
`A. Education ........................................................................................................ 13
`1. University Degrees ........................................................................ 13
`2.
`Industry Certifications ................................................................... 14
`3. Licenses ......................................................................................... 16
`
`B. Publications ..................................................................................................... 16
`1. Books 16
`2. Papers, presentations, & articles. ................................................. 17
`3. Patents .......................................................................................... 20
`
`C. Standards and Certification Creation.............................................................. 20
`
`
`
`1
`
`

`

`
`
`D. Professional Awards and Memberships ......................................................... 21
`
`E. Speaking Engagements ................................................................................... 22
`
`F. Litigation Support Experience ......................................................................... 25
`
`G. Testifying Experience ...................................................................................... 30
`
`H. Professional Experience .................................................................................. 32
`
`X.
`
`CONTINUING PROFESSIONAL EDUCATION ........................................................... 36
`
`A. References to my work ................................................................................... 37
`1. Media References ......................................................................... 37
`2. References to publications ........................................................... 38
`3. Universities using my books ......................................................... 43
`
`B. Training ........................................................................................................... 45
`
`C. Technical Skills ................................................................................................ 46
`
`
`
`
`
`
`
`
`2
`
`

`

`
`
`I.
`
`INTRODUCTION
`
`1.
`
`I have been retained by Uniloc to provide my expert opinions regarding
`
`validity of U.S. Patent No. U.S. Patent No. 7,653,508 (“508 Patent”). Specifically, I have
`
`been asked to provide expert opinions regarding Claim 5. The ‘508 patent was granted
`
`January 26, 2010 filed December 22, 2006
`
`2.
`
`I am being compensated for my time at my standard consulting rate of
`
`$300 per hour. I am also being reimbursed for expenses that I incur during the course of
`
`this work. My compensation is not contingent upon the results of my study or the
`
`substance of my opinions.
`
`II.
`
`BACKGROUND AND QUALIFICATIONS
`
`3.
`
`I have 25+ years of experience in the computer science industry including
`
`extensive experience with computer security, computer programming, and computer
`
`networking. I have authored 26 computer science books, including textbooks used at
`
`universities around the world. I hold 42 different computer industry certifications,
`
`including many in networking subjects. I am experienced with multiple programming
`
`languages. I also have extensive experience in computer networking. I have extensive
`
`experience with mobile devices, including all aspects of mobile devices (hardware and
`
`software). I am a Distinguished Speaker for the Association of Computing Machinery
`
`(ACM), and a reviewer for the IEEE Security and Privacy journal, as well as a reviewer for
`
`the International Journal of Cyber Warfare and Terrorism (IJCWT). My CV is attached as
`
`appendix A.
`
`
`
`3
`
`

`

`
`
`III.
`
`THE ‘902 PATENT
`
`1.
`
`The '902 patent was issued on February 1, 2011. The '902 patent is a
`
`continuation of application No. 11/644,455 ,filed on Dec. 22, 2006. The '902 patent is
`
`about monitoring human activity. The '902 invention uses sensors with a dominant axis.
`
`To quote the patent itself "This invention relates to a method of monitoring human
`
`activity, and more particularly to counting periodic human motions such as steps.".
`
`2.
`
`The inventors of the ’902 patent observed that at the time, step counting
`
`devices that utilize an inertial sensor to measure motion to detect steps generally
`
`required the user to first position the device in a limited set of orientations. In some
`
`devices, the required orientations are dictated to the user by the device. In other devices,
`
`the beginning orientation is not critical, so long as this orientation can be maintained.
`
`EX1001, 1:23-30. Further, the inventors observed that devices at the time were often
`
`confused by motion noise experienced by the device throughout a user's daily routine.
`
`The noise would cause false steps to be measured and actual steps to be missed in
`
`conventional step counting devices. Conventional step counting devices also failed to
`
`accurately measure steps for individuals who walk at a slow pace. Id., 1:31-38.
`
`3.
`
`According to the invention of the ’902 Patent, a device to monitor human
`
`activity using an inertial sensor assigns a dominant axis after determining the orientation
`
`of an inertial sensor. he orientation of the inertial sensor is continuously determined, and
`
`the dominant axis is updated as the orientation of the inertial sensor changes. Id., 2:10-
`
`17.
`
`
`
`4
`
`

`

`
`
`IV.
`
`CLAIM CONSTRUCTION
`
`4.
`
`Fort the purposes of an IPR, claim terms are given their broadest
`
`reasonable meaning. No claim construction is given at this time.
`
`V.
`
`ONE OF ORDINARY SKILL IN THE ART
`
`5.
`
`Patent claims must be viewed from the perspective of one of ordinary skill
`
`in the art. A Person of Ordinary Skill in the Art (POSA) in December 2006 would have been
`
`one with a bachelor’s degree in engineering, computer science, or related technical area
`
`with 2 years of experience related to accelerometers or similar devices. Additional
`
`experience can compensate for a lack of a degree.
`
`6.
`
`I am aware that the petitioner and Dr. Paradiso have a slightly different
`
`view of the level of skill of a person of ordinary skill in the art. However, our differences
`
`are relatively minor. Even if one accepts the petitioners view of one of ordinary skill in the
`
`art, it would not change my opinions.
`
`VI.
`
`GENERAL ISSUES
`
`A.
`
`7.
`
`Motivation to Combine
`
`Throughout the petitioners IPR as well as in specific sections, the petitioner
`
`states that one of ordinary skill in the art would have been motivated to combine Fabio and
`
`Pasolini. They petitioner states the two patents are in the same general field. I agree with
`
`that statement. However, the petitioner does not explicitly identify a deficiency in one that
`
`is overcome by the other.
`
`8.
`
`In one instance the petitioner comes close to identifying a deficiency in
`
`one that is overcome by the other, stating “POSITA would have thus recognized that
`
`
`
`5
`
`

`

`
`
`Pasolini offers more specific teachings about improved step detection that would be
`
`beneficially implemented into Fabio’s device.” It should be noted that Pasolini was filed
`
`Oct. 2, 2006 and granted Dec. 9, 2008. Fabio was filed Oct. 2, 2006 and granted Apr.13,
`
`2010. Pasolini was filed the same day as Fabio. This is relevant because both Fabio and
`
`Pasolini are from the same inventors (despite the labels the petitioner has assigned). The
`
`petitioner filed both on the same day yet did not feel one needed to be combined with
`
`the other to overcome any deficiency. Clearly the inventors of Fabio and Pasolini did not
`
`feel that Fabio required the ‘improved step detection’ of Pasolini. This specific instance
`
`applies throughout the Petition.
`
`9.
`
`The petitioner also claims “A POSITA would have also combined Tsuji with
`
`Fabio and Pasolini because using Tsuji’s known technique of detecting a user’s step based
`
`on a moving average of the most recent walk cycles (i.e., stepping periods)”. However,
`
`the petitioner does not state what deficiency in Fabio or Pasolini is being corrected by this
`
`‘moving average of the most recent walk cycles’.
`
`10.
`
`The petitioner also claims “A POSITA would have found it obvious to
`
`combine Fabio, Pasolini, and Tsuji because, as described below, the combination is merely
`
`a simple substitution of one known element for another to obtain predictable results.”
`
`But then in the next paragraphs the petitioner describes first taking Pasolini's axis with
`
`Fabio’s pedometer and then further combining Tsuji's step process.
`
`11.
`
`The first problem with this claim is that the petitioner provides no
`
`explanation of why a POSITA would combine Fabio’s pedometer with Pasolini. This
`
`particularly important because Pasolini already is a pedometer. In fact, Pasolini is entitled
`
`
`
`6
`
`

`

`
`
`“Pedometer device and step detection method using an algorithm for self-adaptive
`
`computation of acceleration thresholds.” The petitioner fails to explain why POSITA
`
`would need to combine Fabio’s pedometer with Pasolini, since Pasolini already is itself a
`
`pedometer. In fact, a POSITA would not be motivated to combine Pasolini and Fabio's
`
`pedometer since both already have a pedometer.
`
`12.
`
`The second problem with the petitioner’s claim is the combining of Tsuji’s
`
`step counting process. Fabio and Pasolini both already have a step counter. For example,
`
`Pasolini, in the abstract describes “In a pedometer device for detecting and counting steps
`
`of a user on foot...”. Fabio states “A method for controlling a pedometer includes the
`
`steps of: generating a signal correlated to movements of a user of the pedometer.” The
`
`petitioner fails to explain why a POSITA would want to add a step counter to Pasolini or
`
`Fabio when both already have step counters. In fact, a POSITA would not be motivated to
`
`combine Fabio, Pasolini, and or Tsuji’s step counting process, since all three already have
`
`step counting processes.
`
`13.
`
`Aside from the fact that a POSITA would not have seen a need to combine
`
`Fabio, Pasolini, and/or Tjsuji, this would not have been a ‘simple substitution.’ The first
`
`issue is combining Pasolini and Fabio’s pedometer. Both devices are in fact pedometers.
`
`To combine the two different pedometers, would require extensive re-working of both
`
`inventions. Then to add in Tsuji’s step counting, when Fabio and Pasolini each already
`
`have their own step-counting would have required significant re-work. The petitioner
`
`points to core functionality for each of the three prior art references, then claims it would
`
`be ‘simple substitution’ to fundamentally change how each prior art reference
`
`
`
`7
`
`

`

`
`
`accomplishes this core functionality. A POSITA would readily see that this is a very difficult
`
`task requiring undue experimentation.
`
`B.
`
`Cadence Window
`
`14.
`
`Claim 5 recites “when the step count is at or above the step count
`
`threshold, determining a dynamic step cadence window and using the dynamic step
`
`cadence window to identify the time frame within which to monitor for the next step.”
`
`Claim 7 recites “examining previous acceleration data to determine whether any
`
`additional steps would have been counted if the dynamic step cadence window had been
`
`used when the previous acceleration data was received; and.” Claim 8 recites “The
`
`method of claim 5, wherein determining the dynamic step cadence window comprises,”
`
`15.
`
`In the body of the ‘902 patent is further discussion of the cadence Window
`
`including “Referring to FIG. 1, the cadence logic 132 may determine one or more sample
`
`periods to be used by the rolling average logic 135, and may determine a cadence window
`
`150 to be used by the step counting logic 130”
`
`16.
`
`The petitioner states “Thus, for the purposes of this proceeding, the term
`
`“cadence window” as used in the claims includes “a window of time since a last step was
`
`counted that is looked at to detect a new step.” Ex.1003, p.15.”
`
`17.
`
`The petitioner claims Fabio discloses this limitation. However, what Fabio
`
`actually states is shown here (note that portion underlined in red is the portion the
`
`petitioner cited):
`
`
`
`8
`
`

`

`
`
`
`
`18. What is being described is a test of the regularity of the individual step.
`
`This is the first validation test. Even if one supposes that “regularity of the individual step”
`
`to be synonymous with “cadence”, this excerpt is not describing updating the “regularity
`
`of the individual step”. This in no way describes updating anything even analogous to the
`
`cadence window. It must also be noted that Fabio only discusses updating with respect
`
`to updating the number of steps, not anything even analogous to the cadence window.
`
`VII.
`
`SPECIFIC CLAIM ELEMENTS
`
`19.
`
`The petitioner claims that “Claim 8 is obvious under 35 U.S.C. § 103(a)
`
`over Pasolini in view of Fabio, further in view of Tsuji.” I address claim 8 in detail in this
`
`section of my declaration.
`
`
`
`9
`
`

`

`
`
`8.0 The method of claim 5, wherein determining the dynamic step
`A.
`cadence window comprises:”
`
`20.
`
`Nothing in Fabio teaches or even suggests recording a user cadence,
`
`comparing to a user cadence, or similar functionality. Rather Fabio simply determines if
`
`there is too much time between two steps, to zero out the count. This actually teaches
`
`away from the ‘902 cadence window. The petitioner does not actually offer any
`
`arguments in this section of the petition, but rather states” See section [5.0] – [5.4]. As
`
`discussed in [5.4], Fabio discloses determining a dynamic step cadence window.
`
`Ex.1003, p.52.” In that section of the petition, the petitioner claims:
`
`
`
`21.
`
`Then Petitioner adds “Based on this, a POSITA would have understood that
`
`defining the validation interval in this way compensates for changes in each step”.
`
`However, this is not what Fabio is teaching. What Fabio is teaching is looking only at
`
`homogenous durations of steps, with no respect to a ‘dynamic cadence window’. In fact, a
`
`homogeneous duration is the antithesis of a ‘dynamic’ cadence window. In this respect,
`
`Fabio teaches away from the ‘902 patent.
`
`
`
`10
`
`

`

`
`
`8.1 computing a rolling average of stepping periods of previously
`B.
`counted steps; and
`
`22.
`
`The petitioner claims that “Tsuji discloses this limitation because it teaches
`
`that its pedometer computes a moving (i.e., rolling) average of the walk cycle (i.e.,
`
`stepping period) using a predetermined number of previous walk cycles recognized to be
`
`steps. Ex.1003, p.52.”
`
`23. What Tsuji actually discloses is “In addition, the reference cycle calculating
`
`means may include second cycle storing means for successively storing therein data on
`
`cycles of a predetermined number of newest signals each judged to be within the first
`
`reference cycle range by the first cycle judging means, and obtain a moving average of
`
`the cycles of the predetermined number of signals the data on which is stored in the
`
`second cycle storing means.”
`
`24.
`
`Even if one adopts the petitioners claim that a moving average in Tsuji is
`
`the same as the rolling average in the ‘902 patent, what Tsuji is averaging is “cycles of the
`
`predetermined number of signals”, not counted steps.
`
`25.
`
`Furthermore, Tsuji states “In this embodiment mode, Ta±10% (Ta is a
`
`moving average value of the cycles of a newest predetermined number of signals during
`
`a walk outputted from the filter portion 105) is set as the above first reference cycle
`
`range. Then, when the signal from the filter portion 105 is within the first reference cycle
`
`range, the walk cycle comparing portion 106 judges that the cycle of the signal from the
`
`filter portion 105 is similar to the reference walk cycle”
`
`
`
`11
`
`

`

`
`
`26.
`
`These are ‘cycles of the predetermined number of signals’ which are quite
`
`different from the ‘a rolling average of stepping periods of previously counted steps’ of
`
`claim 8 of the ‘902 patent.
`
`8.2 setting the dynamic step cadence window based on the rolling
`C.
`average of stepping periods.
`
`27.
`
`The petitioner states “The combination of Fabio, Pasolini, and Tsuji renders
`
`this limitation obvious. First, as discussed above in [5.4], Fabio teaches determining a
`
`dynamic step cadence window by determining a “validation interval TV” at each step. “As
`
`has already been discussed in this declaration a POSA would not have been motivated to
`
`combine Fabio, Pasolini, nor Tsuji.
`
`28.
`
`Also, as was discussed earlier in this declaration, Fabio does not disclose a
`
`dynamic step cadence window. Rather Fabio simply determines if there is too much time
`
`between two steps, to zero out the count. This actually teaches away from the ‘902
`
`cadence window.
`
`VIII.
`
`CONCLUSIONS
`
`29.
`
`Based on my analysis as well as my extensive experience and training, it is
`
`my opinion that neither Fabio, Pasolini, nor Tsuji alone or in any combination thereof
`
`anticipate or render obvious claim 8 of the ‘902 patent.
`
`30.
`
`Furthermore, it is my opinion that a POSA would not have been motivated
`
`to combine Fabio with Pasolini. Nor would a POSA be motivated to combine Fabio and/or
`
`Pasolini with Tsuji.
`
`
`
`
`
`
`
`12
`
`

`

`
`
`
`
`_______________________
`William C. Easttom II (Chuck Easttom) 15 August 2018
`
`
`
`
`
`
`
`
`IX.
`
`APPENDIX A – EASTTOM CV
`
`A.
`
`Education
`
`1.
`
`University Degrees
`
`• B.A. Southeastern Oklahoma State University. Major Communications with
`Minors in Chemistry and Psychology. Extensive coursework in science (chemistry,
`physics, and biology) as well as neuroscience (neurobiology of memory, cognitive
`science, etc.). Also, additional coursework in computer science including
`programming and database courses.
`• M.Ed. Southeastern Oklahoma State University. Coursework included technology
`related courses such as digital video editing, multimedia presentations, and
`computer graphics. A statistics course was also part of the coursework.
`• M.B.A. Northcentral University major in Applied Computer Science. Extensive
`course work in graduate computer science including graduate courses in: C++
`programming, C# programming, Computer Graphics, Web Programming,
`Network communication, Complex Database Management Systems, and
`Artificial Intelligence. Approximately 30 graduate hours of graduate computer
`science courses. Additionally, a doctoral level statistics course was included. A
`semester research project in medical software was also part of the curriculum. I
`also took several research courses beyond the requirements for the degree.
`• Doctor of Science (In progress) Capitol Technology University. Majoring in
`cybersecurity, dissertation topic is a study of lattice-based cryptography for post-
`quantum computing. Currently all but dissertation (ABD) which is 3/5ths
`complete and due to graduate in April.
`• MSSE Master of Science in Systems Engineering (In progress). University of Texas
`at El Paso. The coursework includes studies in software & system requirements;
`system integration, verification, and validation; system architecture and design;
`and systems modeling & simulation.
`
`
`
`
`
`
`13
`
`

`

`
`
`2.
`
`Industry Certifications
`
`The following is a list of computer industry certifications I have earned.
`
`
`
`a.
`
`Hardware and Networking Related Certifications
`
`1. CompTIA (Computer Technology Industry Associations) A+ Certified
`
`2. CompTIA Network + Certified
`
`3. CompTIA Server+ Certified
`
`4. CompTIA I-Net+ Certified
`
`
`
`b.
`
`Operating System Related Certifications
`
`5. CompTIA Linux + Certified
`
`6. Microsoft Certified Professional (MCP) – Windows Server 2000 Professional
`Certification Number: A527-9546
`
`7. Microsoft Certified Systems Administrator (MCSA) Windows Server 2000
`Certification Number: A527-9556
`
`8. Microsoft Certified Systems Engineer (MCSE) Windows Server 2000 Certification
`Number: A527-9552
`
`9. Microsoft Certified Technology Specialist (MCTS) Windows Server 2008 Active
`Directory Microsoft Certification ID: 1483483
`
`10. Microsoft Certified Technology Specialist (MCTS) Windows 7 Microsoft Certification
`ID: 1483483
`
`11. Microsoft Certified IT Professional (MCITP) Windows 7 Microsoft Certification ID:
`1483483
`
`12. Microsoft Certified Solutions Associate Windows 7 Microsoft Certification ID:
`1483483
`
`13. National Computer Science Academy Windows 8 Certification Certificate #: 4787829
`
`
`
`Programming and Web Development Related
`c.
`Certifications
`
`14. Microsoft Certified Professional (MCP) – Visual Basic 6.0 Desktop Applications
`Microsoft Certification ID: 1483483
`
`15. Microsoft Certified Professional (MCP) – Visual Basic 6.0 Distributed Applications
`Microsoft Certification ID: 1483483
`
`16. Microsoft Certified Application Developer (MCAD) - C# Microsoft Certification ID:
`1483483
`
`
`
`14
`
`

`

`
`
`17. Microsoft Certified Trainer (MCT 2005-2012) Microsoft Certification ID: 1483483
`
`18. Microsoft Certified Technology Specialist (MCTS) Visual Studio 2010 Windows
`Application Microsoft Certification ID: 1483483
`
`19. Microsoft Certified Technology Specialist (MCTS) Visual Studio 2010 Data Access
`Microsoft Certification ID: 1483483
`
`20. National Computer Science Academy HTML 5.0 Certification Certificate #: 4788000.
`
`21. National Computer Science Academy ASP.Net Certification Certificate #: 4788342
`
`22. Certified Internet Webmaster (CIW) Associate CIW0163791
`
`
`
`d.
`
`Database Related Certifications
`
`23. Microsoft Certified Database Administrator (MCDBA) SQL Server 2000 Microsoft
`Certification ID: 1483483
`
`24. Microsoft Certified Technology Specialist (MCTS) Implementing SQL Server 2008
`Microsoft Certification ID: 1483483
`
`25. Microsoft Certified IT Professional (MCITP) SQL Server Administration Microsoft
`Certification ID: 1483483
`
`
`
`e.
`
`Security and Forensics Related Certifications
`
`26. CIW Certified Security Analyst CIW0163791
`
`27. EC Council Certified Ethical Hacker v5 (CEH) ECC942445
`
`28. EC Council Certified Hacking Forensics Investigator v4 (CHFI) ECC945708
`
`29. EC Council Certified Security Administrator (ECSA) ECC947248
`
`30. EC Council Certified Encryption Specialist (ECES)
`
`31. EC Council Certified Instructor
`
`32. CISSP – Certified Information Systems Professional #387731
`
`33. ISSAP – Certified Information Systems Architect #387731
`
`34. CCFP – Certified Cyber Forensics Professional #387731
`
`35. Certified Criminal Investigator (CCI) 2015-2017
`
`36. Forensic Examination of CCTV Digital VTR Surveillance Recording Equipment
`
`37. Oxygen Phone Forensics Certified
`
`38. Access Data Certified Examiner (ACE) 2014-2017
`
`39. OSForensics Certified Examiner (OSFCE)
`
`40. Certified Forensic Consultant (CFC) 2015-2017
`
`
`
`15
`
`

`

`
`
`f.
`
`Software Certifications
`
`41. National Computer Science Academy Microsoft Word 2013 Certification Certificate
`#: 5078016
`
`42. National Computer Science Academy Microsoft Word 2000 Certification Certificate
`#: 5078187
`
`
`
`3.
`
`Licenses
`
`Texas State Licensed Private Investigator. Registration Number 827827. Associated with
`Allegiant Investigations & Security License Number: A18596
`
`
`
`
`
`
`
`B.
`
`Publications
`
`1.
`
`Books
`
`Easttom, C. (2003). Moving from Windows to Linux. Newton Center, MA:
`1.
`Charles River Learning. 1st Edition, Charles River Media.
`Easttom, C., Hoff, B. (2006). Moving from Windows to Linux, 2nd Ed.
`2.
`Newton Center, MA: Charles River Learning. 1st Edition, Charles River Media.
`
`Easttom, C. (2003). Programming Fundamentals in C++. Newton Center,
`3.
`MA: Charles River Learning. 1st Edition, Charles River Media.
`
` Easttom C. (2002). JFC and Swing with JBuilder 8.0. Plano, Texas:
`4.
`WordWare Publishing.
`
`Easttom, C. (2002). JBuilder 7.0 EJB Programming. Plano, Texas:
`5.
`WordWare Publishing.
`
`Easttom, C. (2001). Beginning JavaScript, 1st Edition. Plano, Texas:
`6.
`WordWare Publishing.
`
`Easttom, C. (2002). Beginning VB.Net. Plano, Texas: WordWare
`7.
`Publishing.
`Easttom, C. (2001). Advanced JavaScript, 2nd Edition. Plano, Texas:
`8.
`WordWare Publishing.
`
`Easttom, C. (2005). Introduction to Computer Security. New York City,
`9.
`New York: Pearson Press.
`
`Easttom, C. (2006). Network Defense and Countermeasures. New York
`10.
`City, New York: Pearson Press.
`Easttom, C. (2005). Advanced JavaScript, 3rd Edition. Plano, Texas:
`11.
`WordWare Publishing.
`
`16
`
`

`

`
`
`
`
`
`
`Easttom, C., Taylor, J. (2010). Computer Crime, Investigation, and the
`12.
`Law. Boston, Massachusetts: Cengage Learning.
`
`Easttom, C. (2013). Essential Linux Administration: A Comprehensive
`13.
`Guide for Beginners. Boston, Massachusetts: Cengage Learning.
`Easttom, C. (2011). Introduction to Computer Security, 2nd Edition. New
`14.
`York City, New York: Pearson Press.
`Easttom, C. (2012). Network Defense and Countermeasures, 2nd Edition.
`15.
`New York City, New York: Pearson Press.
`Easttom, C. (2013). System Forensics, Investigation, and Response, 2nd
`16.
`Edition. Burlington Massachusetts: Jones & Bartlett.
`
`Easttom, C. (2014). CCFP Certified Cyber Forensics Professional All-in-One
`17.
`Exam Guide. New York City, New York: McGraw-Hill Publishing.
`
`Easttom, C., Dulaney, E. (2015). CompTIA Security+ Study Guide: SY0-401.
`18.
`Hoboken, New Jersey: Sybex Press.
`
`Easttom, C. (2015). Modern Cryptography: Applied Mathematics for
`19.
`Encryption and Information Security. New York City, New York: McGraw-Hill
`Publishing.
`Easttom, C. (2016). Computer Security Fundamentals, 3rd Edition. New
`20.
`York City, New York: Pearson Press.
`Easttom, C. (2017). System Forensics, Investigation, and Response, 3rd
`21.
`Edition. Burlington Massachusetts: Jones & Bartlett.
`
`Easttom, C., Dulaney, E. (2017). CompTIA Security+ Study Guide: SY0-501.
`22.
`Hoboken, New Jersey: Sybex Press.
`
`Easttom, C. (2018). Penetration Testing Fundamentals: A Hands-on Guide
`23.
`to Reliable Security Audits. New York City, New York: Pearson Press.
`
`Easttom, C., Christy, R. (2017). CompTIA Security+ Review Guide: SY0-
`24.
`501. Hoboken, New Jersey: Sybex Press.
`
`Easttom, C., Roberts, R. (2018). Networking Fundamentals, 3rd Edition.
`25.
`Goodheart-Wilcox Publishing.
`Easttom, C. (2018). Network Defense and Countermeasures, 3rd Edition.
`26.
`New York City, New York: Pearson Press.
`
`2.
`
`Papers, presentations, & articles.
`
`1. Easttom, C. (2010). RSA and its Challenges. EC Council White Paper.
`
`2. Easttom, C. (2010). Finding Large Prime Numbers. EC Council White Paper
`
`3. Easttom, C. (2010). A Method for Finding Large Prime Numbers. Haking
`Magazine. Hands-On Cryptography Issue.
`
`17
`
`

`

`
`
`
`
`4. Easttom, C. (2014). A method for finding large prime numbers. Open Source
`Article published by Academia.edu 2014.
`
`5. Easttom, C. (2011). The RSA Algorithm - The ups and Downs. CryptoMagazine.
`
`6. Easttom, C. (2011). Feistel Ciphers - An Overview. Presentation at Cast Security
`Conference. Washington, D.C.
`
`7. Easttom, C. (2011). Steganography- History and Modern Applications.
`Presentation at Takedown Security Conference.
`
`8. Easttom, C. (2012). Problems with RSA. Presentation at Takedown Security
`Conference – Dallas, TX.
`
`9. Easttom, C. (2013). Cryptanalysis. Presentation at Takedown Security
`Conference. Huntsville, Alabama.
`
`10. Easttom, C. (2014). An Overview of Cryptographic S-Boxes used in Block Ciphers.
`Research Gate. DOI RG.2.2.14084.94088.
`
`11. Easttom, C. (2014). Cryptographic Backdoors. Presentation at ISC2 Security
`Congress. Atlanta, Georgia.
`
`12. Easttom, C. (2014). Cryptographic Backdoors. Presentation at University of Texas
`Dallas ACM Chapter Conference.
`
`13. Easttom, C. (2014). Windows Registry Forensics. Research Gate. DOI
`RG.2.2.29603.86561
`
`14. Easttom, C. (2014). Artificial Intelligence, Fuzzy Logic, Neural Networks and Fuzzy
`Neural Networks and their impact on Electronic Medical Records. Academia.edu.
`
`15. Easttom, C. (2014). A Basic Overview of Electro-Magnetic Interference.
`Academia.edu.
`
`16. Easttom, C. (2014). An Overview of Targeted Malware. Academia.edu.
`
`17. Easttom C. (2014). An Introduction to Mobile Forensics. Academia.edu.
`
`18. Easttom, C. (2015). Cryptographic Backdoors. Academia.edu.
`
`19. Easttom, C. (2015). The History of Computer Crime in America. Academia.edu.
`
`20. Easttom, C. (2015). Spyware Techniques. Academia.edu.
`
`21. Easttom, C. (2015). Recovering Deleted Files from NTFS. Academia.edu.
`
`22. Easttom, C. (2015). Multi-dimensional analysis of cyber-forensic evidence.
`Academia.edu.
`
`23. Easttom, C. (2016). Spyware coding techniques. Journal of Information Security
`Science & Digital Forensics (HJISSDF), 1 (1)
`
`24. Easttom, C. (2016). Cryptographic Backdoors – an introduction. Journal of
`Information Security Science & Digital Forensics (HJISSDF), 1 (1)
`
`25. Easttom, C. (2016). A Look at Spyware Techniques. 2600 Magazine, 33(3).
`Autumn issue 2016.
`
`18
`
`

`

`
`
`
`
`26. Easttom, C. (2016). Multi-Dimensional Analysis of Digital Forensic Evidence.
`Forensic Examiner Journal, 25 (4).
`
`27. Easttom, C. (2016). Applying Graph Theory to Evidence Evaluation. Research
`Gate DOI: RG.2.2.23391.0528
`
`28. Easttom, C. (2017). An Overview of Pseudo Random Number Generators.
`Research Gate. DOI: RG.2.2.13941.58087
`
`29. Easttom, C. (2017). A Model for Penetration Testing. Research Gate. DOI:
`RG.2.2.36221.15844
`
`30. Easttom, C. (2017). The RSA Algorithm Explored. International Journal of
`Innovative Research in Information Security. (IJIRIS). 4(1).
`
`31. Easttom, C. (2017). Utilizing Graph Theory to Model Forensic Examination.
`International Journal of Innovative Research in Information Security (IJIRIS), 4(2).
`
`32. Easttom, C. (2017). Applying Graph Theory to Modeling Investigations. IOSR
`Journal of Mathematics (IOSR-JM) 13,2 PP 47-51. doi:10.9790/5728-130205475
`
`33. Easttom, C. (2017). Enhancing SQL Injection with Stored Procedures. 2600
`Magazine. 34(3).
`
`34. Easttom, C. (2017). An Overview of Key Exchange Protocols. IOSR Journal of
`Mathematics (IOSR-JM). 13(4). DOI: 10.9790/5728-1304021618.
`
`35. Easttom, C. (2017). An Overview of Quantum Cryptography with Lattice Based
`Cryptography. IOSR Journal of Mathematics, 13(6).
`
`36. Easttom, C. (2018). A Generalized Methodology for Designing Non-Linear
`Elements in Symmetric Cryptographic Primitives. In Computing and
`Communication Workshop and Conference (CCWC), 2018 IEEE 8th Annual. IEEE.
`
`37. Easttom, C. (2018). The role of weapon

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket