throbber
Steve R. White
`
`Whitespace Associates
`225 East 57th Street, Suite 19F
`New York, NY 10022
`(917) 207-1892 (cell)
`SteveRichardWhite@gmail.com
`Curriculum Vitae
`
`Professional Experience
`
`2013 -
`Present
`
`Whitespace Associates
`President
`
`• Whitespace Associates specializes in technology consulting.
`Our core strengths are the future of technology, and technical
`expertise in patent strategy and litigation. Our clients include
`global corporations such as Apple and major law firms such
`as Kirkland & Ellis.
`
`2008 -
`2013
`
`Consultant
`
`• Retained by counsel as a technology and patent expert in
`ongoing patent litigation.
`
`2007 -
`2008
`
`IBM Watson Research Center,
`Yorktown Heights, NY
`Patent Strategist
`
`• Led a team of domain experts and patent attorneys in the
`evaluation of dozens of patentable ideas, in almost every case
`creating patent applications that greatly generalized the
`original ideas of the inventors. Asked to be a co-author on
`several patent applications because my ideas had so
`significantly changed the patents.
`
`2006
`
`IBM Watson Research Center,
`
`1
`
`Petitioner Microsoft Corporation - Ex. 1004, p. 1
`
`

`

`Yorktown Heights, NY
`Corporate Strategist
`
`• Led the Research Division software strategy for the 2006
`Technology Outlook, outlining the most important areas of
`technology to IBM in the subsequent years.Predicted
`pervasive virtualization to optimize large systems use and
`management, and the rise of applications that take advantage
`of multiple web services (e.g. maps, friend lists).
`
`1994 -
`2006
`
`IBM Watson Research Center,
`Yorktown Heights, NY
`Senior Manager, Massively Distributed Systems
`
`• Created and led the Research Division effort on Autonomic
`Computing, the goal of which is the dramatic simplification of
`the management of large IT systems by making IT resources
`self-managing. Developed an agent-based architecture in
`which IT resources continually adapt themselves to optimize
`the overall system according to high-level administrative
`goals.
`• Created a long-term research project to examine the
`implications of billions of economically motivated software
`agents interacting as part of a global digital economy. Results
`included the discovery of endemic price wars and other
`undesirable behaviors, which can be mitigated by giving the
`agents the ability to learn from their actions; a prototype
`environment for economic agents that is fundamentally
`decentralized and distributed; and work within the FIPA
`standards organization to standardize agent communications.
`• Turned IBM AntiVirus into a multi-million dollar business,
`doubling revenue every year for several years. IBM AntiVirus
`was licensed to millions of computers worldwide, making it
`one of the most widely licensed IBM products ever.
`• Responsible for IBM AntiVirus R&D management, a peer
`business executive position alongside Marketing and Sales.
`Grew R&D staff to 50 people, including a number of world-
`renowned scientists and technologists.
`• Led technical negotiations to license our anti-virus technology
`to Intel and Symantec, resulting in multi-million dollar deals
`for IBM.
`• Led anti-virus R&D for incorporation of our immune system
`
`2
`
`Petitioner Microsoft Corporation - Ex. 1004, p. 2
`
`

`

`technology into Symantec products, which shipped in 4Q
`2000. The immune system is a completely automated
`response to new viruses, capable of deriving and distributing a
`cure for a new virus in a matter of minutes after its first
`appearance anywhere in the world. This is all done
`automatically and is both faster and safer than the
`corresponding manual processes. Our immune system
`technology became Symantec’s corporate direction.
`
`1988 -
`1994
`
`IBM Watson Research Center,
`Yorktown Heights, NY
`Manager, Distributed Security Systems
`
`• Performed the first research into the epidemiology of
`computer viruses, predicting that the problem would become
`much worse as the world moved onto the Internet.
`• Led the development of anti-virus technology designed to
`meet the growing threat, including a unique immune system
`for the Internet.
`• Created the IBM AntiVirus product line on Windows,
`Netware, DOS and OS/2, and made it into an entrepreneurial
`business inside IBM.
`
`
`
`1984 -
`1988
`
`IBM Watson Research Center,
`Yorktown Heights, NY
`Research Staff Member
`
`•
`
`Invented architecture for physically secure cryptographic
`coprocessors and applied it to protecting rights to use digital
`media.
`• Created the organizing framework for NIST’s FIPS 140-1
`standard for the physical security of cryptographic systems.
`• Led the development of successful prototypes based on this
`architecture, resulting in the Integrated Cryptographic Feature
`for IBM System 390 and the IBM 4758 Cryptographic
`Coprocessor, the first systems rated at Security Level 4 (the
`highest) of the FIPS 140-1 standard.
`
`
`
`1982 -
`
`IBM Watson Research Center,
`
`
`
`3
`
`Petitioner Microsoft Corporation - Ex. 1004, p. 3
`
`

`

`1984
`
`Yorktown Heights, NY
`Postdoctoral Fellow
`
`• Created a physics-based analysis of the simulated annealing
`optimization algorithm, providing the first method for
`adapting the algorithm to a wide range of problems.
`
`
`
`Education
`
`
`1982 University of California, San Diego, CA
`Ph.D. Theoretical Condensed Matter Physics
`
`• Thesis: “Electronic Structure of Semiconductor
`Heterostructures”
`• Advisor: Lu J. Sham
`
`
`
`
`
`
`
`Awards
`
`2007 Research Accomplishment for making autonomic computing into a
`recognized academic discipline.
`
`2006 Elected to the Technical Council, the governing body of the IBM
`Academy of Technology.
`
`1996
`
`IBM Corporate Technical Award for IBM AntiVirus Technology and
`System Design. This is the highest technical award given in IBM and
`is given each year only to a handful of people.
`
`1996 Elected a member of the IBM Academy of Technology, an elite group
`that advises senior executives on technology issues.
`
`1995
`
`IBM Outstanding Technical Achievement Award for IBM AntiVirus
`Products.
`
`
`
`4
`
`Petitioner Microsoft Corporation - Ex. 1004, p. 4
`
`

`

`1987
`
`1986
`
`IBM Outstanding Technical Achievement Award for Enhancements to
`Simulated Annealing.
`
`IBM Outstanding Innovation Award for ABYSS – A Basic Yorktown
`Security System.
`
`
`
`Media Highlights
`
`Coverage of my work, along with interviews, has appeared regularly in the
`major media: Forbes, NBC, ABC, CNBC, CNNfn, Bloomberg TV, NPR,
`Wall Street Journal, New York Times, Washington Post, San Jose Mercury-
`News, Times (London), Financial Times (London), Los Angeles Times,
`Boston Globe, Philadelphia Inquirer, Atlanta Journal-Constitution, Nikkei
`Shinbun (Tokyo) and various Web sites. Other selected highlights include:
`
`• Time Magazine (August, 2000) “The New Hot Zone,” pp. 30-37.
`And (Nov. 11, 1996) “The Next Big Thing: Curing Digital Disease,”
`pp. TD 49, Two Cover Articles.
`• Science News (July 31, 1999) “Do Computers Need Immune
`Systems?” pp. 76-78. Cover Article.
`• Atlantic Monthly (April 1999) “The Virus Wars,” pp.32-37. Cover
`Article.
`• US News & World Report (April 12, 1999) “Why Melissa Is So
`Scary,” pp. 34-36.
`• New Scientist (24 May 1997) “The Internet Strikes Back,” pp. 35-
`37. Cover Article.
`
`
`
`Patents
`
`The following is a list of my issued U.S. patents and pending patent
`applications.
`
`US Patent 8458694 (6/4/2013): “Hypervisor with cloning-awareness
`notifications”
`
`US Patent 8434077 (4/30/2013): “Upgrading virtual resources”
`
`U.S. Patent 8392567 (3/5/2013): “Discovering and identifying manageable
`
`
`
`5
`
`Petitioner Microsoft Corporation - Ex. 1004, p. 5
`
`

`

`information technology resources”
`
`U.S. Patent 7996353 (8/9/2011): “Policy-based management system with
`automatic policy selection and creation capabilities by using singular value
`decomposition technique”
`
`U.S. Patent 7987461 (7/26/2011): “Automated design for deployment of a
`distributed application using constraint propagation”
`
`U.S. Patent 7928907 (4/19/2011): “Method for mapping machine rooms and
`locating machines within machine rooms”
`
`U.S. Patent 7861300 (12/28/2010): “Method and apparatus for
`determination of the non-replicative behavior of a malicious program”
`
`U.S. Patent 7515105 (4/7/2009): “Method for mapping machine rooms and
`locating machines within machine rooms”
`
`U.S. Patent 7487543 (2/3/2009): “Method and apparatus for the automatic
`determination of potentially worm-like behavior of a program”
`
`US Patent Application 20080270971 (10/30/2008): “Application-
`requirement based configuration designer for distributed computing
`systems”
`
`US Patent 7216343 (5/8/2007): “Method and apparatus for automatic
`updating and testing of software”
`
`U.S. Patent 7203662 (4/10/2007): “Apparatus, system and method for
`automatically making operational selling decisions”
`
`U.S. Patent 7117182 (10/3/2006): “Method for disaggregating customer data
`in online transactions to preserve privacy”
`
`U.S. Patent 7103913 (9/5/2006): “Method and apparatus for determination
`of the non-replicative behavior of a malicious program”
`
`U.S. Patent 7069585 (6/27/2006): “Physical key security management
`method and apparatus for information systems”
`
`US Patent Application 20060112286 (5/25/2006): “Method for dynamically
`reprovisioning applications and other server resources in a computer center
`in response to power and heat dissipation requirements”
`
`6
`
`Petitioner Microsoft Corporation - Ex. 1004, p. 6
`
`

`

`US Patent 7051277 (5/23/2006): “Automated assistant for organizing
`electronic documents”
`
`U.S. Patent 6900590 (1/24/2006): “Strategic internet persona assumption”
`
`U.S. Patent 6981279 (12/27/2005): “Method and apparatus for replicating
`and analyzing worm programs”
`
`US Patent Application 20050198530 (9/8/2005): “Methods and apparatus
`for adaptive server reprovisioning under security assault”
`
`US Patent 6772346 (8/3/2004): “System and method for managing files in a
`distributed system using filtering”
`
`US Patent Application 20040059704 (3/25/2004): “Self-managing
`computing system”
`
`US Patent 6678822 (1/13/2004): “Method and apparatus for securely
`transporting an information container from a trusted environment to an
`unrestricted environment”
`
`US Patent 6560632 (5/6/2003): “System and method for managing files in a
`distributed system using prioritization”
`
`US Patent Application 20030023499 (1/30/2003): “Apparatus, system and
`method for automatically making operational purchasing decisions”
`
`US Patent Application 20030018551 (1/23/2003): “Method of hosting
`digital businesses”
`
`US Patent Application 20020111818 (8/15/2002): “Method and apparatus
`for providing independent filtering of e-commerce transactions”
`
`US Patent 6279128 (8/21/2001): “Autonomous system for recognition of
`patterns formed by stored data during computer memory scrubbing”
`
`U.S. Patent 6275937 (8/14/2001): “Collaborative server processing of
`content and meta-information with application to virus checking in a server
`network”
`
`U.S. Patent 05907834 (5/25/1999): “Method and apparatus for detecting a
`presence of a computer virus”
`
`7
`
`Petitioner Microsoft Corporation - Ex. 1004, p. 7
`
`

`

`U.S. Patent 05802592 (9/01/1998): “System and method for protecting
`integrity of alterable ROM using digital signatures”
`
`U.S. Patent 05675711 (10/07/1997): “Adaptive statistical regression and
`classification of data strings, with application to the generic detection of
`computer viruses” This patent received an IBM top 5% patent award as
`one of the most valuable patents in IBM’s portfolio.
`
`European Patent EP 0354770 (3/27/1996): “Secure management of keys
`using extended control vectors”
`
`European Patent EP 0356065 (3/20/1996): “Secure management of keys
`using control vectors”
`
`U.S. Patent 05440723 (8/08/1995): “Automatic immune system for
`computers and computer networks” This patent was the focus of a major
`IBM ad campaign, including a full-page ad in the New York Times, in
`which IBM proclaimed five straight years of being first in the number of
`U.S. patents issued. The immune system was chosen as the sole example of
`innovative IBM technology.
`
`U.S. Patent 05442699 (8/15/1995): “Searching for patterns in encrypted
`data”
`
`U.S. Patent 05117457 (5/26/1992): “Tamper resistant packaging for
`information protection in electronic circuitry”
`
`U.S. Patent 05109413 (4/28/1992): “Manipulating rights-to-execute in
`connection with a software copy protection mechanism”
`
`U.S. Patent 04924515 (5/08/1990): “Secure management of keys using
`extended control vectors”
`
`U.S. Patent 04916738 (4/10/1990): “Remote access terminal security”
`
`U.S. Patent 04903296 (2/20/1990): “Implementing a shared higher level of
`privilege on personal computers for copy protection of software”
`
`U.S. Patent 04817140 (3/28/1989): “Software protection system using a
`single-key cryptosystem, a hardware-based authorization system and a
`secure coprocessor”
`
`U.S. Patent 04644493 (2/17/1987): “Implementing a shared higher level of
`
`
`
`8
`
`Petitioner Microsoft Corporation - Ex. 1004, p. 8
`
`

`

`privilege on personal computers for copy protection of software”
`
`U.S. Patent 04577289 (3/18/1986): “Hardware key-on-disk system for copy-
`protecting magnetic storage media”
`
`Presentations and Publications
`
`
`
`•
`
`•
`
`Jeffrey O. Kephart, Gerald Tesauro, David M. Chess, William E.
`Walsh, Rajarshi Das, Alla Segal, Ian Whalley, Steve R. White. “An
`Architectural Blueprint for Autonomic Computing,” IEEE Internet
`Computing 18(21) (2007).
`• David M. Chess, James E. Hanson, John A. Pershing Jr., Steve R.
`White, “Prospects for Simplifying ITSM-Based Management
`Through Self-Managing Resources,” IBM Systems Journal 46(3)
`(2007), pp. 599-608.
`• Steve R. White, “Biologically-Inspired Design: Getting It Wrong
`and Getting It Right,” Invited Book Chapter in Biologically
`Inspired Cooperative Computing, IFIP International Federation for
`Information Processing Vol. 216, (2006) pp. 21-32.
`• Steve R. White, James E. Hanson, Ian Whalley, David M. Chess,
`Alla Segal, Jeffrey O. Kephart, “Autonomic computing:
`Architectural Approach and Prototype,” Integrated Computer-Aided
`Engineering 13(2) (2006), pp. 173-188.
`Jeff Kephart, Steve White, Edith Stern, “A Research Agenda for
`Business-Driven Information Technology,”HotAC I: Hot Topics in
`Autonomic Computing 40 (2005), pp. 41.
`• Steve Weingart, Steve R. White, “Mind the Gap: Updating FIPS
`140,” IBM Thomas J. Watson Research Center (2005), accessed as
`http://csrc.nist.gov/groups/STM/cmvp/documents/fips140-
`3/physec/papers/physecpaper18.pdf (March 2013). This paper
`formed the basis for an update to NIST’s FIPS 140 standard for
`physical security of electronic systems.
`• David M. Chess, Steve R. White, Ian Whalley, and Alla Segal,
`“Designing and Implementing a Prototype Autonomic Computing
`System,” (2005) accessed as
`http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=5386561
`(March 2013).
`• Gerald Tesauro, David M Chess, William Walsh, Raja Das, Ian
`Whalley, Jeffrey O. Kephart, Steve R. White, “A Multi-Agent
`Systems Approach to Autonomic Computing,” IJCAI 2004, pp. 464-
`471.
`
`
`
`9
`
`Petitioner Microsoft Corporation - Ex. 1004, p. 9
`
`

`

`• David M. Chess, Alla Segal, Ian Whalley, Steve R. White, “Unity:
`Experiences with a Prototype Autonomic Computing System,” in
`Proceedings of the International Conference on Autonomic
`Computing, IEEE (2004), pp. 140-147
`• Steve R. White, James E. Hanson, Ian Whalley, David M. Chess,
`Jeffrey O. Kephart. “An Architectural Approach to Autonomic
`Computing," in Proceedings of the International Conference on
`Autonomic Computing, IEEE (2004) pp. 2-9.
`• Peter G. Capek, David M. Chess, Steve R. White, Alan Fedeli,
`“Merry Christma: an Early Network Worm,” Security & Privacy,
`IEEE 1(5) (2003), pp. 26-34.
`• David M. Chess, Charles C. Palmer, Steve R. White, “Security in an
`Autonomic Computing Environment,” IBM Systems Journal 42(1)
`(2003), pp. 107-118.
`• Steve R. White, “Virus Bulletin 2010: A Retrospective,”
`International Virus Bulletin Conference, Orlando, FL (Oct. 4-6,
`2000). This Invited Keynote Talk projected the virus problem, and
`anti-virus technology, ten years into the future.
`• David M. Chess, Steve R. White, “An Undetectable Computer
`Virus,” International Virus Bulletin Conference, Orlando, FL (Oct.
`4-6, 2000).
`• M.D. Durand, Steve R. White, “Trading Accuracy for Speed in
`Parallel Simulated Annealing with Simultaneous Moves,”Parallel
`Computing 26(1) (2000), pp. 135-150. This paper was the result of
`Durand’s Ph.D. thesis from Columbia University, which I
`supervised informally.
`• Steve R. White, Morton Swimmer, Edward J. Pring, William C.
`Arnold, David M. Chess, John F. Morar, “Anatomy of a
`Commercial-Grade Immune System,” International Virus Bulletin
`Conference, Vancouver, Canada (Sept. 28-30, 1999). This was the
`first live, public demonstration of the product-ready version of the
`immune system.
`Jeffrey O. Kephart, Gregory B. Sorkin, William C. Arnold, David M.
`Chess, Gerald J. Tesauro, Steve R. White, “Biologically Inspired
`Defenses Against Computer Viruses,”Book Chapter in Machine
`Learning and Data Mining: Methods and Applications, R.S.
`Michalski (ed.), John Wiley & Sons, Ltd., ISBN: 0471971995
`(1998)
`Jeffrey O. Kephart, Gregory B. Sorkin, Morton Swimmer, Steve R.
`White, “Blueprint for a Computer Immune System,”Book Chapter
`in Artificial Immune Systems and Their Applications by D.
`Dasgupta (ed.), Springer-Verlag, ISBN 3540643907 (1998)
`• Steve R. White, Jeffrey O. Kephart, John Morar, “Active Planet,”
`
`•
`
`•
`
`
`
`10
`
`Petitioner Microsoft Corporation - Ex. 1004, p. 10
`
`

`

`•
`
`•
`
`•
`
`•
`
`•
`
`Demo 98, Palm Springs, CA (Feb. 1-3, 1998). This was one of only
`two Invited Talks and Demos on forward-looking technology. We
`gave a live demonstration of our immune system prototype.
`• Steve R. White, “Open Problems in Computer Virus Research,”
`International Virus Bulletin Conference, Munich, Germany (Oct. 22-
`23, 1998).
`• Steve R. White, Jeffrey O. Kephart, David M. Chess, “Five Great
`Ages of Computer Viruses,” International Virus Prevention
`Conference, Orlando, FL (April 28-29, 1998).
`Jeffrey O. Kephart, James E. Hanson, David W. Levine, Benjamin
`N. Grosof, JakkaSairamesh, Richard B. Segal, Steve R. White,
`“Dynamics of an Information-Filtering Economy,” Second
`International Workshop on Cooperative Information Agents, Paris,
`France (July 4-7, 1998).
`Jeffrey O. Kephart, James E. Hanson, David W. Levine, Benjamin
`N. Grosof, JakkaSairamesh, Richard B. Segal, Steve R. White,
`“Emergent Behavior in Information Economies,” International
`Conference on Multi-Agent Systems (ICMAS '98), Paris, France,
`(July 3-8, 1998).
`Jeffrey O. Kephart, Gregory B. Sorkin, David M. Chess, Steve R.
`White, “Fighting Computer Viruses,”Scientific American, (Nov.
`1997), pp. 88-93. Invited cover article.
` Steve R. White, David M. Chess, Jeffrey O. Kephart, “Five Great
`Ages of Computer Viruses,” Symposium on the Future of
`Distributed Information Systems, Aspen, CO (June, 1997). Invited
`Talk.
`Jeffrey O. Kephart, Gregory B. Sorkin, Morton Swimmer, Steve R.
`White, “Blueprint for a Computer Immune System,” International
`Virus Bulletin Conference, San Francisco, CA (Oct. 1997). This was
`the first live, public demonstration of our immune system prototype.
`• Steve R. White, David M. Chess, Jeffrey O. Kephart, “Five Great
`Ages of Computer Viruses,” International Virus Bulletin
`Conference, San Francisco, CA (Oct. 1997)
`• Steve R. White, David M. Chess, Jeffrey O. Kephart, “Five Great
`Ages of Computer Viruses”, International Virus Prevention
`Conference, Washington DC (1997).
`• Steve R. White, Jeffrey O. Kephart, David M. Chess, “Computer
`Viruses - A Global Perspective,” International Virus Bulletin
`Conference, Boston, MA (1995). Invited Talk.
`Jeffrey O. Kephart, William C. Arnold, David M. Chess, Gerald J.
`Tesauro, Steve R. White, “Biologically Inspired Defenses Against
`Computer Viruses,” International Joint Conference on Artificial
`Intelligence, Montreal, Canada (1995). Invited Talk.
`
`•
`
`
`
`11
`
`Petitioner Microsoft Corporation - Ex. 1004, p. 11
`
`

`

`•
`
`•
`
`•
`
`• Steve R. White, “Computer Viruses - A Global View,” International
`Virus Bulletin Conference, Jersey, UK (1994). Invited Keynote
`Talk.
`• Steve R. White, “Computer Virus Prevalence,” Conference of the
`National Computer Security Association, Washington, D.C. Invited
`Talk.
`• Steve R. White, “Viruses and Anti-Virus Technology: A Vision of
`the Future,” International Virus Bulletin Conference, Amsterdam,
`the Netherlands (1993). Invited Talk.
`• Steve R. White, “Virus Trends in Distributed Environments,”
`Conference of the International Society of Security Auditors, New
`York, NY (1993). Invited Talk.
`Jeffrey O. Kephart, Steve R. White, David M. Chess, “Computer
`Viruses and Epidemiology,”IEEE Spectrum magazine (May 1993)
`pp. 20-26. Cover Article.
`Jeffrey O. Kephart, Steve R. White, “Measuring and Modeling
`Computer Virus Prevalence,” Proceedings IEEE Symposium on
`Research in Security and Privacy, Oakland, CA (1993), pp. 2-15.
`Jeffrey O. Kephart, Steve R. White, “Directed-Graph
`Epidemiological Models of Computer Viruses,” Proceedings, 1991
`IEEE Computer Society Symposium on Research in Security and
`Privacy (May 20-22, 1991).
`• Steve H. Weingart, Steve R. White, William C. Arnold, Glen P.
`Double, “An Evaluation System for the Physical Security of
`Computing Systems,” Proceedings of the Sixth AnnualComputer
`Security Applications Conference, (Dec. 3-7 1990) pp. 232-243.
`This paper formed the basis for the leveled evaluation system of the
`original NIST FIPS 140 standard for the physical security of
`electronic systems.
`• Steve R. White, Liam Comerford, “ABYSS: An Architecture for
`Software Protection,” IEEE Transactions on Software Engineering
`16(6), (June 1990), pp. 619-629.
`• Steve R. White, Liam Comerford, “ABYSS: A Trusted Architecture
`for Software Protection,” in Proceedings of the IEEE Computer
`Society Conference on Security and Privacy (1987) pp. 38–51. This
`and subsequent work formed the basis for a Ph.D. from CMU by
`Bennet Yee.
`• Steve R. White, “Concepts of Scale in Simulated Annealing,” AIP
`Conference Proceedings 122 (1984), pp. 261-270.
`
`• S.R. White, G.E. Margues, L.J. Sham, “Effective‐Mass Theory for
`
`Electrons in Heterostructures,” Journal of Vacuum Science and
`Technology 21(2) (July 1982), pp. 544-547.
`• S.R. White, L.J. Sham, “Electronic Properties of Flat-Band
`
`
`
`12
`
`Petitioner Microsoft Corporation - Ex. 1004, p. 12
`
`

`

`Semiconductor Heterostructures,” Physical Review Letters 47
`(1981), pp. 879–882.
`
`13
`
`Petitioner Microsoft Corporation - Ex. 1004, p. 13
`
`

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket