throbber
The Wayback Machine - https://web.archive.org/web/20020311145325/http://www.pumatech.com:80/enterprise/wp-1.html
`
`Dropbox Exhibit 1025 - Page 1
`Dropbox, Inc. v. Entangled Media, LLC
`IPR2024-00285 - U.S. Patent No. 8,484,260
`
`

`

`Invasion of the Data Snatchers
`A Puma Technology White Paper
`April, 1999
`
`Contents
`
`KEEPING ENTERPRISE DATA IN ITS PLACE.......................................................................... 1
`
`THE EVOLUTION OF THE PROBLEM..................................................................................... 1
`
`Mobile Device Infiltration of the Enterprise............................................................................................................... 1
`
`Booming Sales of Mobile Devices................................................................................................................................ 2
`
`Dropbox Exhibit 1025 - Page 2
`Dropbox, Inc. v. Entangled Media, LLC
`IPR2024-00285 - U.S. Patent No. 8,484,260
`
`

`

`An Explosion of Diverse Devices.................................................................................................................................. 2
`
`MOVING TOWARD AN ENTERPRISE SOLUTION.................................................................... 2
`
`Characteristics of the Ideal Solution........................................................................................................................... 2
`Connect Anywhere..................................................................................................................................................... 3
`Support Mixed Devices.............................................................................................................................................. 3
`Allow Customized Content........................................................................................................................................ 3
`Integrate Wired & Wireless Networks.................................................................................................................... 4
`Deliver Centralized Management.............................................................................................................................. 4
`Implement Layered Security...................................................................................................................................... 4
`Provide more than just Synchronization................................................................................................................. 5
`Emphasize Performance & Scalability...................................................................................................................... 5
`Support Industry Standards...................................................................................................................................... 6
`
`MAKING THE TRANSITION: INTELLISYNC GOLD................................................................... 7
`
`Major Features................................................................................................................................................................ 7
`
`THE IDEAL SOLUTION: INTELLISYNC ANYWHERE................................................................ 7
`
`Major Features................................................................................................................................................................ 8
`
`An Emphasis on Performance & Scalability.............................................................................................................. 8
`Performance................................................................................................................................................................. 8
`Scalability..................................................................................................................................................................... 8
`
`Providing more than just Synchronization................................................................................................................ 8
`
`CONCLUSION........................................................................................................................ 9
`
`Dropbox Exhibit 1025 - Page 3
`Dropbox, Inc. v. Entangled Media, LLC
`IPR2024-00285 - U.S. Patent No. 8,484,260
`
`

`

`Dropbox Exhibit 1025 - Page 4
`Dropbox, Inc. v. Entangled Media, LLC
`IPR2024-00285 - U.S. Patent No. 8,484,260
`
`

`

`Keeping Enterprise Data in its Place
`
`Enterprises are on the verge of losing control of their data. The threat isn’t from sheer volume of data, or from industrial
`espionage, although both those things can be problems. Instead, the threat comes from all those cute little mobile devices
`that were little more than toys a few years ago. Personal Digital Assistants, cell phones, and pagers can all increase personal
`and corporate productivity. But these small devices can also compromise corporate data. Left uncontrolled, they can
`become miniature repositories of corporate information comfortably tucked in the insecure pockets of individuals.
`So, what’s changed over these last few years to turn these innocuous devices into a looming threat? Until recently, small
`devices tended to be used as standalone tools for improving individual productivity. Instead of carrying a paper calendar,
`for example, a person could carry an electronic organizer or palmtop computer that was smaller yet served the same
`purpose. Most small devices produced before 1996 were primarily a convenient way to store personal information. Limited
`in memory, and difficult to program, these devices rarely held more than a small amount of personal data.
`In 1996 the first mobile data snatcher was born. That was when Palm Computing—now part of 3Com—introduced the first
`device in what was to become the PalmPilot family. This device sported three compelling benefits that made it stand out
`from its predecessors. The first benefit was its extreme ease of use, which made it the productivity tool of choice for
`millions of users. The second benefit was its built-in connectivity, which made it easy to synchronize data between the
`device and a PC. The third benefit was the availability of excellent tools for creating new PalmPilot applications, including
`connectivity components for adding synchronization to those applications.
`The PalmPilot charted the way for a new class of connected organizers. Such devices immediately began filtering into the
`enterprise, oftentimes masked as individual purchases that quietly appeared on expense reports. Despite the promise of
`these exciting devices, their built-in connectivity features make them serious risks to the integrity of enterprise data.
`The threat these data snatchers pose demands action. Mobile devices are no longer limited to holding only simple personal
`information like addresses and schedules. They can now send and receive email messages, messages that may contain
`sensitive information. New utilities and toolkits extend the capabilities of the devices, allowing them to synchronize with
`any number of enterprise applications and databases. It’s now quite possible for users to compromise enterprise data
`without even knowing it.
`For companies that believe corporate data is a corporate asset, this situation is unacceptable. Some steps must be taken to
`prevent the “data chaos” that the unmanaged use of small devices can cause in the enterprise. Mobile devices are too
`valuable to ban outright. The challenge is to maximize and even extend the productivity benefits of these devices while
`minimizing the risks they pose for enterprise data.
`It’s time for a new breed of tools—tools that let an enterprise manage the ever-increasing number of mobile devices
`connected to its networks. Called Mobility Management Tools, these powerful applications can manage data snatching
`mobile devices, returning control of enterprise data to the company.
`
`The Evolution of the Problem
`
`Mobile computing began years ago with the introduction of the first portable computers. The widespread acceptance of
`notebook computers in recent years was Phase I of the evolution of mobile computing. In this PC Connectivity phase, it
`became clear that notebook computers could deliver real value to the enterprise, particularly when they had some level of
`access to corporate data.
`Attempts to further reduce the size and cost of mobile devices brought about Phase II. This Personal Mobility phase
`culminated in the successful development and deployment of connected organizers such as the PalmPilot. You can best
`characterize this phase as enabling synchronization of personal information between the mobile device and a locally
`connected PC (typically communicating over serial cable or infrared media).
`
`Dropbox Exhibit 1025 - Page 5
`Dropbox, Inc. v. Entangled Media, LLC
`IPR2024-00285 - U.S. Patent No. 8,484,260
`
`

`

`Phase III of the evolution is imminent. This phase, the Enterprise Mobility phase, is a response to three major factors:
`· Mobile device infiltration of the enterprise
`· Booming sales of mobile devices
`· An explosion of diverse devices
`Mobile Device Infiltration of the Enterprise
`
`Mobile devices have infiltrated virtually every company. They have almost certainly infiltrated your company. A large
`percentage of the 4 million plus mobile devices sold in 1998 were purchased by individuals for business purposes. Mobile
`devices are probably connecting to applications near you right now, synchronizing with data on a desktop PC or with an
`enterprise application somewhere on the network.
`Two facts make the mass infiltration of mobile devices unstoppable. First, they can probably increase individual
`productivity. Who in the enterprise can argue against that? Second, mobile devices are very affordable. With devices
`typically priced well under $500, it doesn’t take much of a productivity increase to justify buying a mobile device for just
`about any professional worker in the organization.
`The best strategy for the future is to manage mobile devices coming into the enterprise, rather than trying to prevent their
`deployment.
`Booming Sales of Mobile Devices
`
`The growth of the mobile device market is accelerating rapidly. Dataquest reports that some 3.9 million handheld units
`were sold worldwide in 1998. This represents a 61.4 percent increase over volumes reported in 1997. And more devices
`sold means more devices to infiltrate the enterprise.
`But this is only the tip of the iceberg. These numbers fail to capture the real magnitude of the threat because they don’t
`address the real data snatcher growth areas—two-way pagers and data phones.
`An Explosion of Diverse Devices
`
`Half a billion years ago, during the Cambrian explosion, multi-cellular life appeared, and promptly filled all available
`environmental niches in a frantic burst of evolution and diversification. Today’s mobile device market resembles the world
`at the beginning of the Cambrian period. The wild success of the PalmPilot proved the concept, and now developers are
`scrambling to add data capabilities to every kind of small device. Two-way pagers now support to do lists and address
`books. Cell phones are going even further, with some phones incorporating the complete functionality of a PalmPilot into
`their handsets.
`It makes no sense to standardize on one or a few devices. While limiting the choices of employees is one way to control the
`glut of small devices in the enterprise, this “solution” will ultimately fail.
`Since small devices typically fill relatively narrow and specific niches, they will rarely displace general-purpose computers.
`They will be companions to personal computers. Multi-function mobile devices, on the other hand, will tend to be more
`expensive than specialized mobile devices, while less functional than general-purpose computers. For maximum
`productivity, users will need to be able to use the device that best matches their specific needs.
`But the proliferation of devices will make it even harder to manage them. Dataquest reports that 1998 mobile phone sales
`exceeded 162 million units worldwide. And the leading phone makers are working to incorporate data handling ability into
`the next generation of phones. For example, Nokia, Motorola, and Ericsson all plan to introduce data phones in 1999. Many
`of those phones will be able to synchronize with your enterprise data. Add the number of new data phones to that of two-
`way pagers and standard mobile devices, and the number of potential data snatching devices in the world could increase
`100-fold over the next few years.
`The inevitable conclusion is that enterprises will need to deploy and manage a range of devices to support a variety of
`usage models. In some cases, a Personal Digital Assistant (PDA) may be the best choice of device, while in other cases a
`two-way pager or data phone might be more appropriate. Some devices will be optimized for sending and receiving
`wireless email, while others will be optimized for two-way synchronization of onboard data. Similarly, data phones may be
`optimized to support the combination of voice and personal data, while Web phones work best to facilitate Internet and
`intranet access. When it comes to small devices, one size definitely does not fit all.
`
`Dropbox Exhibit 1025 - Page 6
`Dropbox, Inc. v. Entangled Media, LLC
`IPR2024-00285 - U.S. Patent No. 8,484,260
`
`

`

`Moving Toward an Enterprise Solution
`
`The goal for the enterprise is to reap maximum benefit from the deployment of mobile devices, all the while retaining
`control over the distribution of corporate data. The resulting solution must be cost-effective, manageable and yet
`sufficiently flexible to address the varied needs of end-users.
`A related challenge for the enterprise is to choose a solution that can evolve with the changing spectrum of small devices
`and the changing needs of small device users. Many solutions exist that are limited to a specific device, a particular
`network, and a particular application. Given the rapid evolution of the small device market, the ability to absorb new
`devices, applications, networks, and industry standards will be a critical factor in the long-term viability of any enterprise
`connectivity solution.
`A third challenge is to get from where you are today to the ideal solution, in the manner most practical and appropriate for
`your organization.
`Characteristics of the Ideal Solution
`
`The ideal enterprise solution will deliver many capabilities. The most important of these capabilities are addressed in the
`next several sections. The ideal solution will:
`· Connect anywhere
`· Support mixed devices
`· Allow customized content
`· Integrate wired & wireless networks
`· Deliver centralized management
`· Implement layered security
`· Provide more than just synchronization
`· Emphasize performance & scalability
`· Support industry standards
`
`Connect Anywhere
`
`The primary usage model for mobile devices still requires a PC. This is because most devices synchronize their data using a
`serial cable or device cradle attached to the PC. While this model may have been adequate during the Personal Mobility
`phase of mobile computing, it clearly won’t meet the requirements of the Enterprise Mobility phase.
`
`Dropbox Exhibit 1025 - Page 7
`Dropbox, Inc. v. Entangled Media, LLC
`IPR2024-00285 - U.S. Patent No. 8,484,260
`
`

`

`A complete enterprise solution must support three distinct connection models:
`· Direct Connection. If authorized, end users should be able to synchronize data residing locally on their PCs by
`connecting their small devices to individual personal computers as they do today. Security concerns may limit the use of
`this connection model in some enterprises.
`· Local Area Network. When working in the office, users must be able to exchange data between their small device and
`server applications accessible through the local area network. This can be accomplished by using any PC connected to
`the LAN as a gateway to the network, or by using an Ethernet cradle that provides direct access to the LAN.
`· Wide Area Network. When out of the office, users must be able to exchange data with the small device over a wide
`area network. The simplest case is to allow small devices to dial into a modem pool at the enterprise, and after
`authentication, exchange data with a server application. A more advanced approach might involve connecting over a
`wireless network to deliver a notification message to a data phone.
`
`Support Mixed Devices
`
`Small devices are evolving at a furious pace. As a result, the small device market will be a “moving target” for years to
`come. Nothing guarantees that the devices that dominate the market today will prevail in the next phase of the mobile
`computing evolution. Furthermore, the small device market is split into multiple device categories, each having their own
`strengths, weaknesses and usage models. This leads us to these rhymed conclusions:
`· One device will not suffice. Mandating that one and only one small device will be supported for all enterprise users is
`doomed to failure. The approach cannot easily absorb innovations, and blatantly denies end users solutions optimized
`for their personal usage model.
`· Solution without dilution. The enterprise must select a connectivity solution that capably supports today’s dominant
`devices, but remains flexible enough to embrace the small devices of tomorrow. Connected organizers, data phones,
`two-way pagers, or some device not yet invented, the solution must support them all.
`· Manage to prevent damage. Since multiple devices and device types must coexist, the enterprise will need Mobility
`Management Tools to effectively manage the complexity. Without a standard set of tools for managing small devices and
`their associated data, chaos will reign.
`
`Allow Customized Content
`
`In the early years of Personal Mobility, small devices mainly held addresses, schedules, short notes, and task lists. More
`recently, some devices have added a level of support for electronic mail and Web access. As we move toward the Enterprise
`Mobility phase, solutions will need to address a broad range of applications. An acceptable solution must support the
`following applications:
`
`Dropbox Exhibit 1025 - Page 8
`Dropbox, Inc. v. Entangled Media, LLC
`IPR2024-00285 - U.S. Patent No. 8,484,260
`
`

`

`· PIM. As before, some small devices will continue to hold personal information like contacts, schedule, notes, and task
`lists. This means synchronization support for popular PIM applications on the PC and/or enterprise server will be
`required.
`· Messaging. Increasingly, small devices exchange data with enterprise messaging and group scheduling systems.
`Support for messaging systems make it possible for small devices to synchronize electronic mail messages with the
`enterprise server.
`· Web. The ubiquity of the Web makes it a highly compelling platform for online and offline browsing with small
`devices. Using a microbrowser on the device, it should be possible to dynamically access data residing on either the
`Internet or the corporate intranet.
`· Custom. The connectivity solution must be extensible, and support the addition of commercial (like ERP) and custom
`applications that may be mission-critical. The enterprise should have the tools to extend the connectivity solution
`without external assistance, thereby avoiding “lock-in” to a single supplier. These tools should include a Rapid
`Application Development (RAD) tool for creating device-side applications, and a Software Development Kit (SDK) for
`adding custom backend applications.
`
`Integrate Wired & Wireless Networks
`
`In addition to coping with a variety of small devices, the connectivity solution will also need to support multiple
`communication networks over time. Right now, connected organizers typically dial into an enterprise server using a
`wireline modem. But this will change as data phones and two-way pagers (both wireless devices) infiltrate the enterprise.
`Even connected organizers are starting to go wireless.
`A comprehensive solution must support several wireless media for short-distance connectivity. IrDA (infrared) and
`Bluetooth (short-range radio) are examples of wireless technology that will continue to be used to exchange data between
`nearby devices. Over wide area networks, a two-way paging device like the RIM Blackberry would likely use a wireless
`data network like Mobitex (operated by BellSouth Wireless Data). Likewise, a data phone from Nokia would operate over a
`network like GSM, which is a circuit switched cellular network.
`The inevitable conclusion is that any connectivity solution targeting the enterprise must support a large and changing list of
`wired and wireless networks. The solution should permit new network “modules” to be added as needed, without disrupting
`existing services. Given the performance and cost sensitivity of wireless networks, the connectivity solution must support
`wireless data transfer efficiently. In particular, the protocols used to exchange data between the small device and an
`enterprise server must be defined with narrow bandwidth communication in mind.
`
`Deliver Centralized Management
`
`During the Personal Mobility years, connectivity to small devices was controlled from an individual PC. The enterprise
`needs a new breed of “mobility management tools,” tools that orchestrate and regulate the deployment of small devices in
`the corporate setting. These tools must be independent of any device, application, or network while supporting any
`combination of them. In addition, the tools must reside on an administrator-controlled server rather than on an individual
`PC.
`Central management of small devices requires the system administrator to control a set of mobile services. The mobility
`management tools must address the following features and services:
`· Users. The tools must allow central management of user accounts. Devices must be assigned to a valid user account
`before they can exchange enterprise data. All synchronization or data access requires authentication. The tools must also
`support multiple devices of varying types for each registered user. Furthermore, it should be possible to define “groups”
`of users to make it easier to assign access and security privileges for an entire group rather than one user at a time.
`· Access Control. Once a user account exists, the administrator must be able to define the data the user has access to
`from each assigned device. At least three levels of access control are needed. One level determines the applications and
`databases the user has access to. Another level defines the read, write, change privileges for each selected application or
`database. In the final level, the administrator defines the items the user can work with in each application or database.
`For example, a user may only have rights to access data for the Central Region in the Sales database.
`· Security. The tools must enable the administrator to assign (possibly varying) levels of security to all users, specific
`groups, or selected users. Security typically involves features like authentication, encryption, compression, and digital
`certificates. For certain applications, the enterprise may require that both client and server certificates be used. In other
`cases, simpler encryption and compression techniques may be sufficient. The mobility management tools must allow the
`administrator to make these security choices, not the connectivity solution.
`· Inventory. The mobility management tools should permit the administrator to maintain a small device inventory (who
`has what device), and also to keep track of the applications installed on each device. In addition, the administrator
`
`Dropbox Exhibit 1025 - Page 9
`Dropbox, Inc. v. Entangled Media, LLC
`IPR2024-00285 - U.S. Patent No. 8,484,260
`
`

`

`should be able to define inventory rules that get enforced at connection time. For example, it should be possible for the
`administrator to specify that a device can only hold certain applications. The tools should check for compliance at
`administrator-defined intervals and report any violations.
`
`Implement Layered Security
`
`A connectivity solution targeting the enterprise needs to support multiple administrator-specified layers of security. The
`solution must address the three major objectives of any security system: authentication, data confidentiality, and data
`integrity.
`Numerous technologies support these objectives, each with its own costs and benefits. The connectivity solutions will have
`to support some or all of the security mechanisms outlined below to satisfy enterprise requirements:
`· Message Digest Functions. Message digest functions (also called hash functions) distill information into a single large
`number. These are most frequently used to create digital signatures and encryption keys, although the functions
`themselves are not used in encryption and decryption operations. Examples include MD5 (Message Digest #5) and
`SHA-1 (Security Hash Algorithm).
`· Symmetric Key Algorithms. Used in encryption and decryption operations, symmetric key algorithms use the same
`key to both encrypt and decrypt the message. These are typically designed to be very fast, but require that both parties
`first securely exchange the encryption key. Examples include DES (Data Encryption Standard) and RC5 (by RSA Data
`Security).
`· Public Key Algorithms. Public key cryptography is based on number theory. These algorithms use one key to encrypt
`the message and another key to decrypt it. This avoids the need to exchange the encryption key between parties, but
`tends to be slower than symmetric key algorithms. Examples of public key algorithms include Diffie-Hellman and DSS
`(Digital Signature Standard).
`· Digital Certificates. Digital certificates are used to securely identify (or authenticate) either party involved in the
`communication. They serve the same purpose as the picture ID you must present at the airport counter. A Certificate
`Authority, which either can be internal or external to the enterprise, must formally issue the digital certificates.
`Internet standards in the form of SSL (Secure Sockets Layer) and TSL (Transport Security Layer) encompass several of the
`advanced security layers needed to support the enterprise. However, these standard protocols are not necessarily available
`across the range of networks used with small devices.
`
`Provide more than just Synchronization
`
`Synchronization, first introduced with PalmPilot connected organizers, rapidly became a pivotal feature built into most
`small devices. The PalmPilot led the way by implementing a simple yet highly effective model for synchronizing
`application databases. The presence of unique identifiers in every PalmPilot record and the ability to track database changes
`are examples of simple features that made it possible for the PalmPilot to synchronize its data quickly and seamlessly.
`As the Enterprise Mobility phase arrives, synchronization remains an essential feature for the enterprise. The ability to
`synchronize information quickly and reliably between small devices and enterprise applications must be a primary
`characteristic of any connectivity solution. Advanced features such as the handling of conflicting changes and the
`application of filtering rules to control data distribution will be crucial in an enterprise setting, where thousands of users
`may be affected by the solution.
`Despite the importance of synchronization, the enterprise will need more than just synchronization to support its overall
`connectivity requirements in the future. Connectivity solutions must address these additional functions and usage models:
`· Notification. Notification involves sending time-sensitive messages to the small device without waiting for a batch
`synchronization operation. Two-way notification entails sending messages in the opposite direction as well. This usage
`model is particularly relevant to small devices connected over wireless networks, where an active connection is possible
`much of the time. Let’s say that an enterprise configures meeting invitations to automatically go to employees who have
`been issued data phones. When a new meeting invitation arrives at the group scheduling application, it is immediately
`transmitted to the data phones over the wireless network. Once received by the device, the user can accept or reject the
`invitation, with that action triggering an automatic response to the group scheduler. If the user accepts the invitation, the
`meeting is added to the calendar on the data phone itself. Notification will be an essential feature of any connectivity
`solution supporting wireless devices in the future.
`· Browsing. Certain classes of applications that require up-to-the-minute information or that may be infrequently
`accessed from small devices are not particularly well suited for either synchronization or notification. These applications
`are better supported using a browsing model, where a microbrowser (small-footprint browser application) is used to
`view data residing on the enterprise server. This solution is especially effective for viewing Web data (usually HTML
`documents) accessible on the Internet or the enterprise intranet. Let’s assume that an enterprise keeps a Contracts
`
`Dropbox Exhibit 1025 - Page 10
`Dropbox, Inc. v. Entangled Media, LLC
`IPR2024-00285 - U.S. Patent No. 8,484,260
`
`

`

`database somewhere on the intranet. If users need only infrequent access to this database, then viewing individual
`contracts on the device may be the best usage model when out of the office. It may also make sense to implement offline
`browsing, where the data is first brought down to the small device and stored for later viewing. This allows for reduced
`communication costs, since the user doesn’t need to stay connected while actually viewing the document. Browsing is
`an unavoidable usage model that must be supported as part of any enterprise connectivity solution.
`· Querying. The ability to query data residing on an enterprise server is especially important for supporting custom
`applications. This usage model is frequently called “query/response,” meaning that the user issues a query that is sent
`from the small device to the enterprise server. The server application replies with a tailored response. Let’s imagine that
`an enterprise maintains an automated inventory system to track office supplies. An application can then be installed on
`the small device to check the availability of any particular item. The user brings up a query form on the device and
`selects the inventory item from a list. The application then connects to the enterprise server, sends the query, receives a
`response containing the item quantity, then disconnects. This usage model is essential to support interactive client-server
`applications.
`· Installation. For programmable devices, the connectivity solution must allow an administrator to remotely install new
`applications or upgrade pre-installed applications on the small device. The administrator must be able to request that
`new applications be downloaded to all users, select groups, or only specific individuals. Once installed, the application
`is automatically enabled to exchange its data with the enterprise server as allowed by the access privileges, and without
`requiring further user intervention. This is the only practical way to install custom applications developed by the
`enterprise. This avoids the need to recall devices from the field for installations.
`· Backup. Experience has shown that small devices are easily lost or destroyed. When this happens, the contents of the
`device must be restored easily and without drama. For this reason, a remote backup and restore feature is a necessary
`feature of any enterprise connectivity solution. The administrator must be able to specify backup rules that get executed
`when the device is connected to the network. For example, it should be possible to specify that certain databases be
`copied to the server on a given schedule.
`
`Emphasize Performance & Scalability
`
`The performance of client-server applications inevitably involves some complex and interrelated factors. While there are no
`fixed or easy answers to questions surrounding performance, connectivity solutions for the enterprise must be “small device
`friendly.” The architecture must account for the specific needs of small device users and the characteristics of the networks
`they use to communicate. The final proof of good performance lies in the responsiveness of the system to its end-users

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket