throbber
(12) United States Patent
`Teppler
`
`USOO6792536B1
`US 6,792,536 B1
`Sep. 14, 2004
`
`(10) Patent No.:
`(45) Date of Patent:
`
`(54) SMART CARD SYSTEM AND METHODS
`FOR PROVING DATES IN DIGITAL FILES
`
`(75) Inventor: Steven W. Teppler, Washington, DC
`(US)
`(73) Assignee: TimeCertain LLC, Washington, DC
`(US)
`Subject to any disclaimer, the term of this
`patent is extended or adjusted under 35
`U.S.C. 154(b) by 0 days.
`
`(*) Notice:
`
`(21) Appl. No.: 09/421,279
`(22) Filed:
`Oct. 20, 1999
`(51) Int. Cl. .................................................. H04L 9/00
`(52) U.S. Cl. ...............
`... 713/178; 713/415; 713/201
`(58) Field of Search ................................. 713/178, 175,
`713/207; 705/44
`
`(56)
`
`References Cited
`U.S. PATENT DOCUMENTS
`
`5,001,752 A 3/1991 Fischer
`5,022,080 A 6/1991. Durst et al.
`5,136,643 A 8/1992 Fischer
`5,136,646 A 8/1992 Haber et al.
`5,136,647 A 8/1992 Haber et al.
`5,189,700 A
`2/1993 Blandford
`5,373,561 A 12/1994 Haber et al.
`RE34,954 E
`5/1995 Haber et al.
`5,422953 A 6/1995 Fischer
`5,500.897 A 3/1996 Hartman, Jr.
`5,619,571 A 4/1997 Sandstrom et al.
`5,748,738 A 5/1998 Bisbee et al.
`5,781,629 A 7/1998 Haber et al.
`5,781,630 A 7/1998 Huber et al.
`5,903,882 A * 5/1999 Asay et al. ................... 705/44
`5,910,988 A
`6/1999 Ballard
`5,923,763 A 7/1999 Walker et al.
`5,970,146 A 10/1999 McCall et al.
`6,047.282 A 4/2000 Wilson et al.
`6,081.899 A
`6/2000 Byrd
`6,209,090 B1
`3/2001 Aisenberg et al.
`6,209,091 B1 * 3/2001 Sudia et al. ................ 713/175
`6,226,744 B1 * 5/2001 Murphy et al. ............. 713/200
`
`6,237,096 B1 *
`6.253,331 B1
`6,263.438 B1
`6,356,937 B1
`6,393,126 B1
`6,393,566 B1
`6,408,388 B1
`6,442,691 B1
`6,449.255 B1
`6,490,355 B1
`6,530,023 B1
`6,601,172 B1
`2001/0011350 A1
`
`5/2001 Bisbee et al. ............... 713/178
`6/2001 Kotami
`7/2001 Walker et al.
`3/2002 Montville et al.
`5/2002 van der Kaay et al.
`5/2002 Levine
`6/2002 Fischer
`8/2002 Blandford
`9/2002 Waclawsky
`12/2002 Epstein
`3/2003 Nissl et al.
`7/2003 Epstein
`8/2001 Zabetian
`
`FOREIGN PATENT DOCUMENTS
`
`GB
`
`2323455 A 9/1998
`
`OTHER PUBLICATIONS
`D. Mills, “Simple Network Time Protocol (SNTP) Version
`4 for IPva, IPv6, and OSI, Oct. 1996.
`* cited by examiner
`Primary Examiner Kim Vu
`Assistant Examiner Thanhnga B. Truong
`(74) Attorney, Agent, or Firm-Venable LLP, James R.
`Burdett; W. Russell Swindell
`(57)
`ABSTRACT
`A Smart card System and methods for proving dates of digital
`data files includes a trusted time Source, a first Subsystem for
`Saving the file at a moment in time, a Second Subsystem for
`retrieving from the trusted time Source a date and a time
`corresponding to the moment in time, a third Subsystem for
`appending the date and the time retrieved from the trusted
`time Source to the Saved file, a fourth Subsystem for Signing
`the saved file with the date and the time retrieved from the
`trusted time Source appended thereto, a fifth Subsystem for
`hashing the signed file to produce a digest, a sixth Subsystem
`for Signing the digest with a key to produce a certificate, a
`Seventh Subsystem for appending the certificate to the Saved
`file, and an eighth Subsystem for Saving the file with the
`certificate appended thereto. All of the Subsystems are
`preferably Sealed together within a Smart card.
`
`20 Claims, 10 Drawing Sheets
`
`
`
`
`
`
`
`560 N.
`
`
`
`
`
`
`
`
`
`
`
`SECONDAPPENDING MEANS
`
`SAVING MEANS
`
`Samsung Ex. 1031, Page 1 of 33
`Samsung Electronics America, Inc. v. RFCyber Corp.
`IPR2021-00980
`
`

`

`U.S. Patent
`
`Sep. 14, 2004
`
`Sheet 1 of 10
`
`US 6,792,536 B1
`
`- - - - - - - - - - - - - - - - - - - - - - - - - - -
`
`
`
`
`
`30\/SSEW
`
`
`
`Samsung Ex. 1031, Page 2 of 33
`Samsung Electronics America, Inc. v. RFCyber Corp.
`IPR2021-00980
`
`

`

`U.S. Patent
`
`Sep. 14, 2004
`
`Sheet 2 of 10
`
`US 6,792,536 B1
`
`OZZ
`
`
`
`
`
`- - - - - - - - - - - - - a -sh - a - - e - r - is
`
`39WSSEW
`
`Samsung Ex. 1031, Page 3 of 33
`Samsung Electronics America, Inc. v. RFCyber Corp.
`IPR2021-00980
`
`

`

`U.S. Patent
`
`Sep. 14, 2004
`
`Sheet 3 of 10
`
`US 6,792,536 B1
`
`
`
`Samsung Ex. 1031, Page 4 of 33
`Samsung Electronics America, Inc. v. RFCyber Corp.
`IPR2021-00980
`
`

`

`U.S. Patent
`
`Sep. 14, 2004
`
`Sheet 4 of 10
`
`US 6,792,536 B1
`
`
`
`
`
`
`
`O)
`
`400 \-
`
`SIGNED
`DATA
`FILE
`
`420
`
`is
`
`N
`st
`
`ass
`
`N480
`
`FIG. 4
`PRIOR ART
`
`
`
`520
`
`500-N-
`
`COMPUTING
`MEANS
`
`VERIFICATION
`MEANS
`
`
`
`FRAUD
`PREVENTION
`MEANS
`
`
`
`
`
`
`
`
`
`
`
`
`
`54 O
`
`F.G. 5
`
`Samsung Ex. 1031, Page 5 of 33
`Samsung Electronics America, Inc. v. RFCyber Corp.
`IPR2021-00980
`
`

`

`U.S. Patent
`
`Sep. 14, 2004
`
`Sheet S of 10
`
`US 6,792,536 B1
`
`
`
`
`
`
`
`
`
`
`
`
`
`560-N-
`
`
`
`TRUSTEDLOCAL TIME SOURCE
`
`RETREVING MEANS
`
`FIRST APPENDING MEANS
`
`FIRST SIGNING MEANS
`
`HASHING MEANS
`
`SECOND SIGNING MEANS
`
`
`
`
`
`60
`
`62O
`
`630
`
`640
`
`650
`
`660
`
`670
`
`690
`
`--730
`
`FIG. 6
`
`FIG. 7
`PRIOR ART
`
`Samsung Ex. 1031, Page 6 of 33
`Samsung Electronics America, Inc. v. RFCyber Corp.
`IPR2021-00980
`
`

`

`U.S. Patent
`
`Sep. 14, 2004
`
`Sheet 6 of 10
`
`US 6,792,536 B1
`
`
`
`
`
`TIMECERTAIN
`
`FIG. 8
`
`
`
`
`
`BATTERY
`
`TRUSTED
`
`Samsung Ex. 1031, Page 7 of 33
`Samsung Electronics America, Inc. v. RFCyber Corp.
`IPR2021-00980
`
`

`

`U.S. Patent
`
`Sep. 14, 2004
`
`Sheet 7 of 10
`
`US 6,792,536 B1
`
`
`
`Samsung Ex. 1031, Page 8 of 33
`Samsung Electronics America, Inc. v. RFCyber Corp.
`IPR2021-00980
`
`

`

`U.S. Patent
`
`Sep. 14, 2004
`
`Sheet 8 of 10
`
`US 6,792,536 B1
`
`SMARTCARD.AWAREAPPLICATION
`
`1260
`
`
`
`SERVICE PROVIDER
`
`1240
`
`SMART CARD RESOURCEMANAGER
`
`FD
`HANDLER
`
`1230
`
`FD
`HANDLER
`
`1230
`
`FD
`HANDLER
`
`1230
`
`
`
`1210 || WIRELESS N1220
`SMART
`CARD
`
`800
`
`1000
`
`SMART
`CARD
`
`1210
`
`SMART
`CARD
`
`800
`
`FIG. 12
`
`Samsung Ex. 1031, Page 9 of 33
`Samsung Electronics America, Inc. v. RFCyber Corp.
`IPR2021-00980
`
`

`

`U.S. Patent
`
`Sep. 14, 2004
`
`Sheet 9 of 10
`
`US 6,792,536 B1
`
`e - a a
`
`a s - - - a w
`
`as a
`
`v
`
`v
`
`sr
`
`- r r - r - - - - - - - - -
`
`-
`
`-
`
`r
`
`
`
`
`
`
`
`ICC-AWARE
`APPLICATION
`
`SERVICE
`REQUESTS
`
`
`
`
`
`
`
`ICC APPLICATION
`
`: 1335
`
`1340
`
`
`
`
`
`
`
`
`
`
`
`ICC SERVICE
`PROVIDER
`
`ISO 7813
`APDU
`
`
`
`ECCOPERATING
`SYSTEM
`
`1325
`
`-1305
`1310
`
`1330
`
`INTERFACEDEVICE
`(FD)
`
`
`
`DATAEXCHANGE
`CONTROLLED BY
`ISO 7813
`PROTOCOL
`
`
`
`
`
`
`
`
`
`
`
`ICC COMMUNICATION
`CONTROLLER
`
`v
`
`roy an an up ou wa dih
`
`a
`
`us
`
`w w w w wo
`
`A
`
`up
`
`w up up was go up a up up up a la p we no
`
`1315
`
`
`
`1320
`
`FIG. 13
`
`1420
`
`Samsung Ex. 1031, Page 10 of 33
`Samsung Electronics America, Inc. v. RFCyber Corp.
`IPR2021-00980
`
`

`

`U.S. Patent
`
`Sep. 14, 2004
`
`Sheet 10 0f 10
`
`US 6,792,536 B1
`
`
`
`Samsung Ex. 1031, Page 11 of 33
`Samsung Electronics America, Inc. v. RFCyber Corp.
`IPR2021-00980
`
`

`

`1
`SMART CARD SYSTEM AND METHODS
`FOR PROVING DATES IN DIGITAL FILES
`
`CROSS REFERENCE TO RELATED
`APPLICATIONS
`This application claims the benefit of U.S. Provisional
`Application No. 60/142,132, filed on Jul. 2, 1999. This
`application is related to the following co-pending, com
`monly assigned applications: U.S. patent application Ser.
`No. 09/649,646, entitled 'METHOD AND SYSTEM FOR
`DETERMINING AND MAINTAINING TRUST IN DIGI
`TAL DATAFILES WITH CERTIFIABLE TIME,” filed Jul.
`3, 2000; U.S. patent application Ser. No. 09/429,360,
`entitled “PERSONAL COMPUTER SYSTEM AND
`15
`METHODS FOR PROVING DATES IN DIGITAL DATA
`FILES,” filed Oct. 28, 1999; and U.S. patent application Ser.
`No. 09/609,645, entitled “METHOD AND SYSTEM FOR
`DETERMINING AND MAINTAINING TRUST IN DIGI
`TAL IMAGE FILES WITH CERTIFIABLE TIME,” filed
`Jul. 3, 2000.
`
`BACKGROUND OF THE INVENTION
`
`1. Field of the Invention
`The present invention relates generally to digital data
`files, and more particularly to a Smart card System and
`methods for proving dates in Such digital data files.
`2. Statement of the Prior Art
`
`25
`
`Scope of the Problem
`Digital data files come in many formats. None of those
`formats currently provide means for proving-with
`certainty-dates and times associated with access, creation,
`modification, receipt, or transmission of Such digital data
`files. This is not only due to the variety of application
`programs which are available for digital data file access,
`creation, modification, receipt, and transmission, but also
`due to the much more varied “Standards' and protocols put
`forth in the vain attempt to provide uniformity worldwide.
`Illustrative of the enormity of the problem are the fol
`lowing operating environments, within which the System
`and methods according to the present invention can provide
`the much-needed but often ignored time certainty.
`Digital Document Processing
`“Processing” may be viewed as the manipulation of data
`within a computer System. Since virtually all computer
`Systems today process digital data, processing is the Vital
`Step between receiving the data in binary format (i.e., input),
`and producing results (i.e., output)—the task for which
`computers are designed.
`The Microsoft(R) press Computer Dictionary, 3d Edition
`(1997) defines the term document as “...any self-contained
`piece of work created with an application program and, if
`Saved on disk, given a unique filename by which it can be
`retrieved.” Most people think of documents as material done
`by word processors alone. To the typical computer, however,
`data is little more than a collection of characters. Therefore,
`a database, a graphic, or a spreadsheet can all be considered
`as much a document as is a letter or a report. In the
`Macintosh environment in particular, a document is any
`user-created work named and Saved as a separate file.
`Accordingly, for the purpose of the invention described
`herein, digital document processing Shall be interpreted to
`mean the manipulation of digital (i.e., binary) data within a
`
`35
`
`40
`
`45
`
`50
`
`55
`
`60
`
`65
`
`US 6,792,536 B1
`
`2
`computer System to create or modify any Self-contained
`piece of work with an application program and, if Saved on
`a disk or any other memory means, given a unique filename
`by which it can be retrieved. Examples of Such application
`programs with which the present invention may be used to
`assist in Such digital document processing are: MicroSoft(R)
`Access 97, Microsoft(R) Excel 97, and Microsoft(R) Word 97,
`each available from Microsoft Corporation, Redmond,
`Wash. U.S.A.
`
`Digital Communications
`“Communications” may be broadly defined as the vast
`discipline encompassing the methods, mechanisms, and
`media involved in information transfer. In computer-related
`areas, communications usually involve data transfer from
`one computer to another through a communications
`medium, Such as a telephone, microwave relay, Satellite link,
`or physical cable.
`Two primary methods of digital communications among
`computers presently exist. One method temporarily connects
`two computers through a Switched network, Such as the
`public telephone System. The other method permanently or
`Semi-permanently linkS multiple workStations or computers
`in a network. In reality, neither method is distinguishable
`from the other, because a computer can be equipped with a
`modem, which is often used to access both privately owned
`and public access network computers.
`More particular forms of digital communications (i.e.,
`eXchange of communications in which all of the information
`is transmitted in binary-encoded, digital format) include
`electronic mail (or less formally "e-mail'), facsimile,
`Voicemail, and multimedia communications.
`E-mail may be broadly defined as the exchange of text
`messageS/computer files over a communications network,
`Such as a local area network (LAN) or the Internet, usually
`between computers or terminals. Facsimile (or, again, less
`formally “fax”) comprises the transmission and reception of
`text or graphics over telephone lines in digitized form.
`Conventional fax machines Scan an original document,
`transmit an image of the document as a bit map, and
`reproduce the received image on a printer. Resolution and
`encoding of Such fax messages are Standardized in the
`CCITT Groups 1-4 recommendations. Fax images can like
`wise be sent and received by computers equipped with fax
`hardware and Software.
`The CCITT Groups 1-4 recommendations make up a set
`of standards recommended by the Comité Consultatif Inter
`national Télégraphique et Téléphonique (now known as the
`International Telecommunication Union) for encoding and
`transmitting images over fax machines. GroupS 1 and 2
`relate to analog devices, which are generally out of use.
`Groups 3 and 4 deal with digital devices, and are outlined
`below.
`Group 3 is a widespread Standard that Supports "standard”
`images of 203 horizontal dots per inch (dpi) by 98 vertical
`dpi, and “fine” images of 203 horizontal dpi by 198 vertical
`dpi. Group 3 devices Support two methods of data compres
`Sion. One is based on the Huffman code, and reduces an
`image to 10 to 20 percent of the original. The other, known
`as "READ" (for “relative element address designate”), com
`presses an image to about six to twelve percent (-6%–12%)
`of its original. Additionally, the READ method provides for
`password protection as well as polling, So that a receiving
`machine can request transmission as appropriate.
`Group 4 is a newer Standard, which Supports images of up
`to 400 dpi. Its method of data compression is based on a
`
`Samsung Ex. 1031, Page 12 of 33
`Samsung Electronics America, Inc. v. RFCyber Corp.
`IPR2021-00980
`
`

`

`3
`beginning row of white pixels, or "dots”, with each Suc
`ceeding line encoded as a Series of changes from the line
`before. Images are compressed to about three to ten percent
`(~3%-10) of the original. Group 4 devices do not include
`error-correction information in their transmission.
`Moreover, they require an Integrated Services Digital Net
`work (ISDN) phone line rather than a traditional dial-up line.
`FaX modems may also be used to Send and receive digital
`data encoded in known fax formats (e.g., one of the CCITT
`groups noted above). Such data is either sent or received by
`a fax machine or another modem, which then decodes the
`data and converts it to an image. If the data was initially sent
`by fax modem, the image must previously have been
`encoded on the computer hosting Such fax modem. Text and
`graphic documents can be converted into fax format by
`special software that is usually provided with the fax
`modem. Paper documents must first be Scanned in. AS is well
`known, fax modems may be internal or external and may
`combine fax and conventional modem capabilities.
`Voicemail generally comprises a System that records and
`Stores telephone messages in a computer's memory. Unlike
`a simple answering machine, Voicemail Systems include
`Separate mailboxes for multiple users, each of whom can
`copy, Store, or redistribute messages. Another type of digital
`communications involving voice is “voice messaging”, a
`term which generally refers to a System that sends and
`receives messages in the form of Sound recordings. Typical
`Voice messaging Systems may employ “voice modems',
`which are modulation/demodulation devices that Support a
`Switch to facilitate changes between telephony and data
`transmission modes. Such a device might contain a built-in
`loudspeaker and microphone for Voice communication, but
`more often it uses the computer's Sound card.
`Still another form of digital communications includes
`multimedia communications in the Style of “Video
`teleconferencing, as defined by the International Telecom
`munication Union (formerly CCITT) in “Visual Telephone
`Systems and Equipment for Local Area Networks Which
`provide a Non-Guaranteed Quality of Service,”
`(Recommendation H.323, Telecommunication Standardiza
`tion Sector of ITU, Geneva, Switzerland, May 1996) and
`other Similar Such Standards.
`Digital Imaging
`“Digital imaging encompasses those known processes
`involved in the capture, Storage, display, and printing of
`graphical images. They may involve devices known as a
`“digital camera', which broadly refers to a camera that
`Stores photographed images electronically instead of on
`traditional film. Digital cameras typically use charge
`coupled device (CCD) elements to capture the image
`through the lens when the operator releases the shutter in the
`camera. Circuits within the camera cause the image captured
`by the CCD to be Stored in a Storage medium, Such as
`Solid-State memory or a hard disk. After the image has been
`captured, it is downloaded by cable to the computer using
`Software Supplied with the camera. Once Stored in the
`computer, the image can be manipulated and processed
`much like the image from a Scanner or related input devices.
`Digital cameras come in the form of Still cameras and
`full-motion video recorders.
`Other forms of digital imaging include digitizing Systems,
`such as the “PhotoCD(R” system from Eastman Kodak
`Company, Rochester, N.Y. That system allows 35 mm film
`pictures, negatives, slides, and Scanned images to be stored
`on a compact disc. Images are then Stored in a file format
`
`4
`known as the Kodak PhotoCD Image pac File Format, or
`PCD. Many photography and film development businesses
`offer this service. Any computer with CD-ROM capabilities
`can usually view images stored on a PhotoCD and the
`Software required to read PCD. Additionally, Such images
`can be viewed by any one of a variety of players that are
`Specifically designed to display images Stored on CDs.
`Another photographic form of digital imaging is defined by
`the “Flashpix” specification, the cooperative endeavor of the
`Digital Imaging Group, MicroSoft, the Hewlett-packard
`Company, and Live picture, Inc. The Flashpix format builds
`on the best features of existing formats (e.g., Kodak Image
`pac, Live picture IVUE, Hewlett-packard JPEG, TIFF, TIFF/
`EP, etc.), and combines these features with an object orien
`tated approach.
`Still other forms of digital imaging include digital
`radiography, radiotherapy, X-ray, positron emission
`tomography, ultrasound, and magnetic resonance imaging
`according to the joint work of the American College of
`Radiology (ACR) and the National Electrical Manufacturers
`Association (NEMA), published in the Digital Imaging and
`Communications in Medicine PS 3-1998 (DICOM
`Standard).
`
`Digital Commerce
`An enormous amount of commercial activity now takes
`place by means of connected computers. Such commercial
`activity has been variously coined as digital commerce,
`electronic commerce, or just plain E-commerce. Regardless
`of its particular moniker, these activities generically involve
`a commercial transaction between a user and a Vendor
`through an online information Service, the Internet, or a
`BBS, or between vendor and customer computers through a
`Specialized form of E-commerce known as electronic data
`interchange (EDI).
`EDI is collectively known for its set of standards to
`control the transfer of business documents (e.g., purchase
`orders and invoices) between computers. The ultimate goal
`of EDI is the elimination of paperwork and increased
`response time. For EDI to be most effective, users must
`agree on certain Standards for formatting and exchanging
`information, such as the X.400 protocol and CCITT X
`SCCS.
`Other known forms of E-commerce include digital
`banking, Web-front Stores, and online trading of bonds,
`equities, and other Securities. Digital banking can take the
`form of access to a user's account, payment of bills
`electronically, or transfer of funds between a user's
`accounts. Web-front Stores (e.g., amazon.com) usually com
`prise a collection of web pages in the form of an electronic
`catalog, which offers any number of products for Sale. More
`often than not, transactions at Such web-front Stores are
`consummated when a purchaser enters his credit card
`number, and the issuing bank approves the purchase. These
`transactions may or may not be over Secure lines, Such as
`those designated “TRUSTe' participant web sites. Further
`details regarding known processes for establishing and
`maintaining Secure E-commerce connections may be found
`in the SET Secure Electronic Transaction Specification,
`Book 1: Business Description (Version 1.0), May 31, 1997,
`the contents of which are incorporated herein by reference.
`See also Book 2 (Programmer's Guide) and Book 3 (Formal
`Protocol Definition) of the SET Secure Electronic Transac
`tion Specification, as well as the External Interface Guide to
`SET Secure Electronic Transaction, Sep. 24, 1997, each of
`which is incorporated herein by reference.
`
`US 6,792,536 B1
`
`15
`
`25
`
`35
`
`40
`
`45
`
`50
`
`55
`
`60
`
`65
`
`Samsung Ex. 1031, Page 13 of 33
`Samsung Electronics America, Inc. v. RFCyber Corp.
`IPR2021-00980
`
`

`

`US 6,792,536 B1
`
`S
`One burgeoning form of E-commerce that has arisen in
`the past few years is that which involves dealing in Securities
`online. “Day traders” watch impatiently as ticker symbols
`Speed across their computer Screens. When the price is right,
`they electronically whisk their order off to a distant securi
`ties dealer-often buying and Selling the same Stock or bond
`in a fifteen-minute Span of time. One can only imagine the
`potential problems associated with the purchase or Sale of
`Securities when price-per-share movements on the order of
`a few cents make the difference to these day traders.
`Fortunately, the National Association of Securities Dealers
`(NASD) has come up with its Order Audit Trail Systems
`(OATS) to track all stock transactions. NASD Rule 6953
`also requires all member firms that have an obligation to
`record order, transaction, or related data under the NASD
`15
`Rules or Bylaws to Synchronize the business clocks that are
`used for recording the date and time of any market event.
`Computer System and mechanical clocks must be Synchro
`nized every business day before market open, at a minimum,
`in order to ensure that recorded order event timestamps are
`accurate.
`
`6
`Internet appliances, wireleSS telephones, pagers, PDAS, fax
`machines, digital Still/video cameras, digital Voice/video
`recorders, digital copierS/Scanners, interactive television,
`hybrid combinations of any of the above-noted computing
`means and an interactive television (e.g., Set-top boxes), and
`any other apparatus, which generally comprises a processor,
`memory, the capability to receive input, and the capability to
`generate Output.
`Such computing means typically include a real time clock
`(“RTC) for keeping track of the time and date. Likewise,
`operating Systems and/or applications programs used in Such
`computing means usually stamp the time and date (as
`derived from the RTC) that each of the digital data files is
`accessed, created, modified, received, or transmitted. Such
`Stamping of digital data files with times and dates
`(collectively referred to as "time-Stamping') has, thus,
`become an integral part of all of the above known computing
`environments.
`Although the existing framework of time-Stamping can be
`used to catalogue and Sort one's own files, for other critical
`needs it suffers from two fatal flaws. Files are typically
`“time-stamped” with a value read from the RTC. There is no
`simple way of determining whether the RTC is set to the
`correct date and time. Indeed, it is quite trivial for a user to
`reset the RTC to any desirable date and time. Even if the
`computing means RTC had been correctly Set, nothing
`would prevent a user from arbitrarily changing the "time
`Stamps' themselves. This is readily accomplished through
`the direct manipulation of the digital data where the time
`Stamp is Stored.
`Thus, the known time-stamping framework is useless for
`any situation where the accuracy of the date or time of a
`digital data file is critical. Court filings, medical records,
`files presented as incriminating or exculpatory evidence in
`court cases, legal documents Such as wills, billing records,
`patent, trademark, and copyright claims, and insurance
`documents are only a few of the areas where the date and
`time that is associated with the file is critical. Conventional
`Systems and methods that time-Stamp digital data files fail to
`meet this need. Furthermore, there is no “open”, croSS
`platform, interoperable global Standard in place to create
`trusted time-Stamps.
`Cryptographic Systems and KeyS
`One approach that has been used in the past to provide
`Some level of Security in digital data files is the use of
`cryptographic Systems and keys. In general, cryptographic
`Systems are used to encrypt or “lock” a digital data file. A
`key is used, conversely, to decrypt or “unlock an encrypted
`digital data file. Digital data files are merely bits of data in
`memory or on a network. If this data is viewed as the mere
`representation of large numbers, then mathematical func
`tions or algorithms can be easily applied to the data.
`For example, where a particular digital data file is a text
`file, its unencrypted or “cleartext' version can be viewed as
`the variable X. The resulting function of this variable X, when
`encrypted by its associated cryptographic algorithm and
`coupled with its key k will be f(k, x). Accordingly, the
`encrypted text or “cyphertext' can be defined by the equa
`tion:
`
`By choosing the cryptographic algorithm carefully-Such
`that there is no easily discovered inverse mapping (i.e., for
`any given y, it will be extremely difficult to calculate X
`without knowing k, while at the same time, with knowledge
`of k it will be possible)-the data may be encrypted.
`
`25
`
`Digital Justice
`Even legal Scholars and Systems around the World have
`been unable to escape the problems of an online world. Utah
`became the first jurisdiction in the United States of America
`to enact legislation creating “cybernotaries'. Similar laws in
`Georgia, Florida, and Massachusetts quickly followed Utah.
`In August 1996, the American Bar Association (through
`its Information Security Committee of the Electronic Com
`merce and Information Technology Division, Section of
`Science and Technology) published the Digital Signature
`Guidelines-Legal Infrastructure for Certification Authori
`ties and Secure Electronic Commerce. The European Union,
`35
`as well, in a final report on the Legal Issues Of Evidence And
`Liability In The provision Of Trusted Services (CA and TTP
`Services), let its position be known in October 1998.
`Each of the environments noted above is fraught with
`potential fraud. Any reliance they may have on dates and
`times is merely for the purpose of determining whether the
`transaction is valid (i.e., authorized within a specified range
`of time), or what specific time delays occur in the transmis
`Sion of data between the computer Systems communicating
`with one another. However, none of those environments
`currently provide means for proving with certainty-dates
`and times associated with access, creation, modification,
`receipt, or transmission of digital data files, which may be
`used therein.
`
`40
`
`45
`
`Prior Art Attempts to Solve the Problem
`Many-varied computing means pervade today's Society.
`PCS, web browsers, e-mail clients, e-mail Servers, network
`file Servers, network messaging Servers, mainframes, Inter
`net appliances, wireleSS telephones, pagers, PDAS, fax
`machines, fax modems, digital Still cameras, Video cameras,
`Voice recorders, Video recorders, copiers, and Scanners, and
`Virtually any other device using digital data files are fast
`becoming ubiquitous.
`Digital data is easy to modify. As a result, it has been
`nearly impossible in the prior art to establish with certainty
`the date and time a particular digital data file in a given
`computing means was accessed, created, modified, received,
`or transmitted. It should be understood that, by use of the
`term “computing means', the present invention is directed to
`general purpose computers, PCS, web browsers, e-mail
`clients/servers, network file/messaging Servers, mainframes,
`
`50
`
`55
`
`60
`
`65
`
`Samsung Ex. 1031, Page 14 of 33
`Samsung Electronics America, Inc. v. RFCyber Corp.
`IPR2021-00980
`
`

`

`7
`Symmetric Cryptography
`If the key for encryption and decryption is the same
`shared Secret, then the cryptographic System and associated
`algorithm will be referred to as “symmetric'. Both the
`Sender and the receiver must share the key in Such symmet
`ric cryptographic Systems. A Sender first applies the encryp
`tion function using the key to the cleartext to produce the
`cyphertext, which is then Sent to a receiver. The receiver
`applies the decryption function using the same shared key.
`Since the cleartext cannot be derived from the cyphertext
`without knowledge of the key, the cyphertext can be sent
`over public networkS Such as the Internet.
`The current United States standard for symmetric
`cryptography, in which the same key is used for both
`encryption and decryption, is the Data Encryption Standard
`(DES), which is based upon a combination and permutation
`of shifts and exclusive orS. This approach can be very fast,
`whether implemented directly on hardware (e.g., 1 GByte/
`Sec throughput or better) or in general purpose processors.
`The current key size of 56 bits (plus 8 parity bits) is
`Sufficient, yet Somewhat Small, but the growing use of larger
`keys with “triple DES' generate much greater Security.
`Since the implementation of DES is fast, it can easily be
`pipelined with Software codecs and not impact System
`performance.
`An alternative and yet stronger form of Symmetric block
`encryption is IDEA. Its Security is based upon combining
`exclusive orS with addition and multiplication in modulo-16
`arithmetic. The IDEA approach is also fast on general
`purpose processors. It is comparable in Speed to known DES
`implementations. One major advantage of IDEA is its keys,
`which are 128 bits and are, thus, much stronger (i.e., harder
`to break) than standard 56-bit DES keys.
`One particular problem with the use of Such Symmetric
`Systems is the problem of getting the Sender and the receiver
`to agree on the key without anyone else finding out.
`Moreover, the problem becomes greatly complicated when
`additional users (i.e., potential Senders and receivers) are
`added to the System. Such Symmetric cryptographic Systems,
`nevertheless, are by far easier to implement and deploy than
`their asymmetric counterparts Since they require far leSS
`infrastructure. Sometimes with a symmetric cryptographic
`System, however, keys are Submitted over the network.
`Avoidance of this security risk would be desirable.
`Asymmetric Cryptography
`Systems that generate and employ a Secure key pair (i.e.,
`a “private key for creating the “digital Signature' and a
`"public key to verify that digital signature) are typically
`known as asymmetric cryptographic Systems. There are
`many known cryptographic algorithms (e.g., RSA, DSA,
`and Diffie Hellman) that involve a key pair. In such asym
`metric cryptographic Systems, the private key and the public
`key are mathematically linked. Anything that is encrypted
`by the public key can only be decrypted by the private key.
`Conversely, anything that is signed by the private key can
`only be verified by the public key. Asymmetric crypto
`graphic Systems are, thus, inherently more Secure than
`Symmetric or shared Secret Systems. The Sensitive private
`key need exist in only one place. No form of the private key
`is ever transmitted over the network. Typical asymmetric
`cryptographic Systems also Scale to many users more easily
`than Shared Secret Systems. However, the infrastructure that
`is necessary to field Systems of this type, commonly called
`a “public Key Infrastructure” (PKI), is non-trivial to imple
`ment. See, e.g., RFC 1422, Privacy Enhancement for Inter
`
`15
`
`25
`
`35
`
`40
`
`45
`
`50
`
`55
`
`60
`
`65
`
`US 6,792,536 B1
`
`8
`net Electronic Mail: Part II: Certificate-Based Key Man
`agement (February 1996), the contents of which are
`incorporated herein by reference.
`Digital Signatures
`Referring now to FIGS. 1 and 2, wherein like reference
`characters or numbers represent like or corresponding parts
`throughout each of the Several views, an exemplary process
`100 for creating a digital signature is shown in FIG. 1. To
`Sign a document, or for that matter any other digital data file,
`a “signer” must first delimit the borders of the digital data
`file to be signed. AS used herein, the term Signer refers to any
`person who creates a digital Signature for a message, Such as
`message 110. The information delimited by the signer, in
`turn, refers to that message 110. A hash function 120 in the
`signer's Software is used to compute a hash result 130,
`which is unique for all practical pur

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket