throbber
I 1111111111111111 11111 1111111111 11111 lllll 111111111111111 111111111111111111
`US008756673B2
`
`c12) United States Patent
`Barrus et al.
`
`(IO) Patent No.:
`(45) Date of Patent:
`
`US 8,756,673 B2
`Jun.17,2O14
`
`(54) TECll:\IQUl<:S H>R SIi ARiNG DATA
`
`(75)
`
`Inventors: John W. Barrus, Menlo Park, CA (US):
`Tomohlko Sasaki, Tokyo (JP): Jamey
`Graham, Sc1n Jose, CA (US); Sh.iron
`Kojima, Sm1 Jose, CA (US)
`
`(73) Assignee: Ricoh Company, Ltd., Tokyo (JP)
`
`( * ) Notice:
`
`Subject to m1y disclc1i111cr, the Lcm1 of this
`patent is extended or mUusLetl under 35
`U.S.C. 154(b) by 661 days.
`
`EP
`FP
`
`(21) Appl. No.: 11/694,327
`
`(22) Filed:
`
`:\far. 30, 2007
`
`(65)
`
`Prior Publication Data
`
`US 2008/0244721 Al
`
`Oct. 2, 2008
`
`(51)
`
`Int. CI.
`G06F 21/00
`(52) U.S.Cl.
`USPC ............... 726/9; 71J/J5<J; 71:Vl60: 713/165;
`713/172: 713/176
`
`(2013.01)
`
`(58)
`
`(56)
`
`Field of Classification Search
`USPC .............................................................. 726/9
`See application file fi1r complete search history.
`
`Reforcnccs Cited
`
`U.S. PATENT DOCUMENTS
`
`4,974,878 A
`5,323.465 A •
`5,486,686 A
`5,490,217 A *
`5.590,197 A
`5,635.012 A
`5,694,470 A
`5,761,677 A •
`5,815,657 A
`
`12/199() Josephson
`6/1994 Ava.me ...
`1/1996 Zdybd el al.
`211996 Wang ct al. ...
`12/1996 Chcnctal.
`6/ 1997 Bellucci et al.
`12/1997 Jernbacker
`6/ 1998 Senalor el al.
`9/1998 Williams ct al.
`
`. 713/ 184
`
`.... 380/51
`
`... ......... 1/ I
`
`5,9'.B,829 A *
`8.11999 Durst ct al.
`5,940,507 A * 8/ 1999 Cane el al.
`212000 Checchio
`6,023,682 A
`6,035,290 A * 3/2000 PinLsov ...
`6.10S,656 A
`8/2000 Durst et al.
`9/ 2000 Neukermans el al.
`6,122,194 A
`(Continued)
`
`............ 111
`. 713/165
`
`. 705/405
`
`FOREIGN PATENT DOCUMENTS
`
`lQ:1998
`869 652 A2
`8/2()()()
`1 028 313 A2
`(Continued)
`OTHER PUBLICATIONS
`
`Meher et al.,A New Approach to Secure Distributed Storage. Sharing
`and Dissemination of Digital Image, \-lay 2006, IEEF International
`Symposium on Circuits and Systems, ISCAS 2006, pp. 171-176.*
`
`(Continued)
`
`Primary J::xaminer - Mohc1mmad L Rahnrnn
`Assistant Examiner - Kenneth Chang
`
`ABSTRACT
`(57)
`Techniques for sharing data between users in a manner that
`maintains m10nymiLy of the users. Tokens arc generated and
`provided to users for sharing data. A token comprises infor(cid:173)
`nuilion encoding an idenlifa:r and an encryption key. A user
`may use a Loken Lo upload data thc1t is to be shared. The data
`Lo be shared is encrypted using the encryption key c1ssLiciatcd
`with the Loken and !he encrypted dala is stored such that it can
`be accessed using !he idcnLi1icr <JSSU(:iatcd with !he Loken. A
`user may !hen use a token Lo access the shared data. '111e
`identifier associated with the token being used to c1cccss the
`shared data is used to access the data and the encryption key
`associated with the Loken is used to decrypt the data. Data is
`shared anonymously without revealing the identity nf the
`users using the tokens.
`
`10 Claims, 12 Drawing Sheets
`
`104
`
`STORAGE LOCA !ION r 106
`CO"PUTER SYSTEM -108
`
`lO<EN
`PROCESSOR
`
`,-,100
`
`112
`
`110
`
`102
`
`114
`
`t
`
`~ 1 16
`
`Google Exhibit 1022
`Google v. Ericsson
`
`

`

`US 8,756,673 B2
`Pagc2
`
`(56)
`
`References Cited
`
`U.S. PATENT DOCUMENTS
`
`2004/0205626 Al
`2004/0207873 Al"'
`2004/0224670 Al
`2005'0007624 Al
`2005/0010776 Al *
`2005/0013462 Al
`2005/0022008 Al
`2005/0062851 Al
`2005:008526:1 Al
`2005/0111034 Al
`2005'0114212 Al
`2005/0132194 Al
`2005:0171847 Al
`2005/0187792 Al
`2005'0200687 Al
`200 5/0200703 Al
`2005:0202804 Al
`2005/0257169 Al
`2005'0258246 Al
`200 5/0286463 Al
`2006/0000900 Al
`2006/0012813 Al
`2006'()015752 Al
`2006/0025 l 16 Al
`2006/0047977 Al
`2006/0054 702 Al
`2006'()055804 Al
`2006'0056728 Al
`2006/0098900 Al
`2006/0124 722 Al
`2006/0179048 Al
`2006'()19'.1004 Al
`2006/0218113 Al
`2006/0224962 Al
`2006/0233358 Al,:,
`2006'()265590 Al
`2006/0288236 Al "'
`2007 :oocn 1 02 Al
`2007/0013781 Al
`2007'0016470 Al
`2007/0050696 Al *
`2007!0067248 Al
`2007/0070218 Al
`2007'0078685 Al
`2007/0204 I 62 Al*
`2007 :02296 78 Al
`2007/0230703 Al
`2007/0233612 Al
`2007/0233613 Al
`2007/0234215 Al
`2007'0245882 Al
`2008/0086421 Al
`2008/0 l 07271 Al,:,
`2008/0141 117 Al
`2008/024'.1702 Al
`2011'0216960 Al
`
`,, ,_, .. _,_, ., _,,.
`
`10/2004 Klotz el al.
`10/2004 Kinjo
`11/2004 Ilull el al.
`l.'2005 Hcn1y
`1/2005 Kenen elal.
`1/2005 Rhoads
`1/2005 Goodman el al.
`3/2005 Silverbrook et al.
`4.' 2005 Kim el al.
`5/2005 Kara saki et al
`5.' 2005 McIntyre ct al.
`6/2005 Ward
`8.' 2005 T.ing
`8/2005 Harper
`9:2005 Si lvcrbrook ct al.
`9/2005 Kobaya shi et al.
`9.'2005 Si lvcrbrook ct al.
`11/2005 Tu
`\Vol ff ct al.
`11 :2005
`12/2005 Matsumoto
`1/2006 Fernandes et al.
`1/2006 Lapslun el al.
`1' 2006 Krueger
`2/2006 Silverbrook et al.
`3/2006 Hanasaki
`3/2006 Lei
`'.l'2006 Arai ct al.
`1/2006 Si lvcrbrook ct al.
`5:'2006 King et al.
`6/2006 \Villiams el al.
`8/2006 Doumuki
`8' 2006 w·asilcwski ct al.
`9/2006 Kishi
`10/2006 Oslojic el al.
`10/2006 Pradhan et al.
`I l.'2006 De Young ct al.
`12/2006 McCue ..... , ..... ,
`1:2007 Fujii ct al.
`1/2007 Kageyama et al.
`2:2007 Piersol ct al.
`3/2007 Piersol e;,l al. ..............
`'.l'2007 Chattc
`3/2007 Mei_jer
`4:2007 Dettinger ct al.
`8/2007 Rodriguez " '
`10:2001 Harn.is ct al.
`10/2007 I3arrus el al
`10/2007 Barms etal.
`10/2007 Ilarru s el al.
`10/2007 Graham ct al.
`10:2007 Odenwald
`4/2008 Gilder et al.
`5/2008 Mergen ....... ...............
`6' 2008 King ct al.
`10:2008 Hait ct al.
`9.'2011 Van Kirk ct al.
`
`358./ 1.15
`
`. 713/176
`
`"' 380:28
`
`.. 713/193
`
`. 715/500
`
`. 713/176
`
`. 380/278
`
`FOREIGN PATENT DOCUMENTS
`
`EP
`El'
`FP
`EP
`EP
`EP
`FP
`GB
`.IP
`JP
`JP
`JP
`JI'
`JP
`JP
`JP
`JP
`JP
`JP
`JP
`
`I 139 649 A2
`l 507 262 Al
`1 581 348 Al
`I 840 897 Al
`1840898 Al
`1883053 Al
`1975847 Al
`2417074 A
`SS-210779 A
`11-215351 A
`2000-113048 A
`2001-086113 A
`2002-024730 A
`2002-055609 A
`2002-117359 A
`2002-236960 A
`2003-316465 A
`2003-319330 A
`2004-062771 A
`2004-086708 A
`
`10i2001
`2/2005
`10/2005
`10:2007
`10/2007
`J:2008
`10/2008
`2:2006
`12/1981
`3,1999
`4/2000
`3:2001
`J:2002
`212002
`4:2002
`8/2002
`10:2002
`lli2003
`2:2004
`J/2004
`
`............. 340/572.1
`
`.. . .. 726:'10
`
`12:2000 \Valker et al.
`6,161,771 A
`2:2001 Stratigos et al.
`6,189,009 BJ
`2:2001 Walker ct al.
`6,193,155 HI
`5/200 I Sandrn
`6,233,340 BJ
`6,259,167 RI'' 7!2001 Klein ...
`6,330.544 !31
`12/2001 Walker el al.
`6,170,514 HI
`4!2002 Messner
`6,389.151 BJ
`5/2002 Carr et al.
`6,390,362 BJ
`5/2002 Ma1tin
`6,422,462 !31
`7/2002 Cohen
`6526,25'.l H2
`2:2001 Hayashi ct al.
`6,574.609 BJ
`6/2003 Downs
`6,618,078 BJ
`9/2003 Bud1ys
`6,628,377 !31
`9/2003 Sabalini el al
`6,744,910 HI
`6!2004 Mcclurg ct al.
`6,748,424 Tl I
`6!2004 lJsud.a
`6,755,341 BJ
`6/2004 Wong et al.
`6,760,843 !31 •
`7/2004 Carler ...........
`6,820.803 BJ
`I J:'2004 Browning et al.
`6,831,682 Fl I
`12:2004 Silvcrbrook ct al.
`6,873,430 B2
`3/2005 Grasso et al.
`6,917,691 I32
`7/2005 Evans el al.
`6,930.803 Bl
`8/2005 Suzuki
`6,937,989 H2
`8.'2005 M cl ntyrc ct al.
`6,970,573 B2
`l l/2005 Carr et al.
`6,980,011 H2
`12:2005 Fowler
`7,016.524 B2
`3/2006 Moore
`7,028,188 HI
`4!2006 Moore
`7,080,041 132
`7/2006 Nagd
`9.'2006 I ,inchan
`7,103,575 HI
`7,113,925 132
`9/2006 Waserstein et al.
`7,234,801 H2
`6!2007 Silvcrbrook
`9/2007 Ilal,e;,r
`7,273,162 Il2
`12!2007 Kishi
`7308,54'.l H2
`7,408,575 132
`8/2008 Kawada
`7,469.824 Bl
`12'2008 Crews et al.
`7,593,542 !32
`9/2009 Abe el al.
`7,599,580 H2
`10:2009 King ct al.
`7,603,414 H2
`10:2009 Svendsen
`7,712.675 B2
`5:'2010 Balinsky et al.
`6/2010 Mad al.
`7,735,721 !31
`7,797,642 Bl
`9/2010 Karam ct al.
`7,809,156 H2
`10:2010 Piersol ct al.
`7,865.124 B2
`J:'2011 Piersol et al.
`7,917,866 !31
`3/2011 Karam
`2001/0014878 Al
`8/2001 Mitra el al.
`2002:0080'.l87 Al
`6!2002 ( Trasso ct al.
`2002'0080959 Al
`6:'2002 Weller
`2002/0084330 Al
`7/2002 Chill
`2002/0103764 Al
`8/2002 Yen el al.
`2002.:0116618 Al
`8-'2002 Muratani
`2002'0143624 Al
`10/2002 Catan
`2002.:0154910 Al
`10:2002 Kawaoka
`2002/0174180 Al• I 1/2002 Ilrown el al. ....... , ..... , ... 709/203
`711.:160
`2002.'0 I 84494 Al* 12:2002 Awactalla
`2003/0001016 Al
`J:'2003 fraier el al.
`2()()3/0028543 Al
`2'2003 Uusbcrgcr
`2003/0037248 Al• 2/2003 Launchbury el al.
`2()(J'.l.'0069902 Al* 4.'2003 Narang ct al.
`2003/0079222 Al
`4/2003 I3oykin el al.
`2()()3/0130567 Al
`7/2003 J\.1ault et al.
`2003/0135420 Al
`7/2003 Culling el al.
`2003/0161475 Al•
`8/2003 Cmmly etal.
`2003/0164879 Al
`9/2003 Kilagmva
`2003/0223614 Al
`12'2003 Robins
`2()(J4.!004 7000 Al
`'.l.'2004 Watanabe ct al.
`2004/0135867 Al• 7/2004 Schmitt et al.
`7!2004 Md ntyre el al.
`2004!0141194 Al
`2004/0143451 Al
`7/2004 McIntyre et al.
`2004/0143552 Al
`7/2004 Weicherl et al.
`2004/0193571 Al
`9/2004 I3arrus el al
`20()4/0194026 Al
`9/2004 Barms et al.
`2004/0196490 Al
`10/2004 Lapstun et al.
`2004/020090 l Al
`10/2004 Lebaschi et al.
`2004/0201676 Al
`10/2004 Needham
`
`713/ 193
`707.' 201
`
`...... " ' 380/280
`
`347/ 107
`
`

`

`US 8,756,673 B2
`Page 3
`
`(56)
`
`References Cited
`
`FOREIGN PATENT DOCUMENTS
`
`.IP
`JP
`.IP
`JP
`.IP
`JP
`.IP
`JP
`JP
`\VO
`\VO
`WO
`\VO
`
`2004-102562 A
`2004-112644 A
`2005-295564 A
`2006-053851
`2006-150662 A
`2007-280391 A
`2008-00407 I A
`2008:071338 A
`2008:257720 A
`WO 98/16884 Al
`WO 01/52473 Al
`WO 02:098671 A2
`WO 2006:021383 Al
`
`4/2004
`4!2004
`10/2005
`2!2006
`6/2006
`10:2007
`1/2008
`3!2008
`10!2008
`4/1998
`7/2001
`12!2002
`3!2006
`
`OTHER PUBLICATIONS
`
`Lange et aL "Insight Lab: An Immersive Team Environment Linking
`Paper, l)isplays, and Data," Proceedings of the 1998 Conference on
`Human Factors in Computing Systems, 1998, 8 pages.
`Internet i\J·chive Wayback Machine archive of "How Computers
`\Vork: The CPC and Memory," available at CRL: http:!iweb.aschive.
`orgiweb/20031215230244/hllp://homepage.cs.uri.eduifm:ullyi
`wolfc/book!Readings/Rcading04.htrn, archived on Dec. I 5, 2003, 7
`pages.
`~ elson et al., "Palette: A Paper Interface for Giving Presentations,"
`Procccdingsofthc('.HI Conference on Human !'actors in Computing
`Systems, \fay 1999, 8 pages.
`~on-Final Office Action for U.S. Appl. No. IV396,375. mailed on
`I'eb. 22, 20 JO, 15 pages
`hnal Office Action for L.S. Appl. No. 11/396,381, mailed on Dec.
`22, 2009, 2 I pages.
`~on-Final Office Action for U.S. Appl. No. 11'608,409, mailed on
`Jan. 6, 2010, 31 pages
`:\on-Final Office Action for lJ.S. Appl. No. 11'495,611, mailed on
`Dec. 3 1, 2009, 39 pages.
`"\-on-final OfficeAclionforU.S. Appl. No. 11/396,375, cl.failed Mar.
`5. 2009, 12 pages.
`:\on-Final Office Action for lJ.S. Appl. No. l 1 !396,379, \1ailcd Dec.
`24, 2008, IO pages.
`:\on-Final Office for lJ.S. Appl. :\o. l {/694,076, \1ailcd Oct. 29,
`2008, 21 pages.
`l'inal Oflicc Adi on for CS. Appl. No. I 1/694,076, \failed Apr. 24,
`2009, 24 pages.
`Requirement for RcstrictioniElcction forlJ.S. Appl. No. I t.:396,179,
`mailed ~ov. 13, 2008, 6 pages.
`~on-Final Office Action for U.S. Appl. No. 11/396,379, mailed Jun
`I 0, 2009, I 2 pages.
`~on-Final Office Action for U.S. Appl. No. 11/396,381, mailed Jun.
`24, 2009, 24 pages.
`Requiremenl for ReslriclioniEleclion for U.S.Appl No. 11/694,076,
`mailed Sep. 5, 2008, 6 pages.
`Extended ruropean Search Report in European Applicalion '\o.
`07113300.3-1228, Mailed Dec. 12. 2007. 5 pages.
`Exlended European Sean:h Reporl of Jul. 28. 2008 in European
`Application No. 08251133.8-2212.
`"2 Dimensional Har Code", Internet Archive Wayhack \llachinc,
`archived on Jan. 24, 2002. 11 pages, al CRL: hllp:!/web.an:hive.org/
`wcb:'20020 I 24 I 90457:www.a<lamsI.com/puh:n1ssa.dam/stack.
`him!.
`Requirement for RestrictioniElection for U.S.Appl. No. 11/495,613,
`mailed on Ocl. 13, 2009, 6 pages.
`Final Office Action for U.S Appl ~o. JJ.:396,375, mailed on Sep I,
`2009, 16 pages.
`CS Appl. ~o. I J/694,076, filed cl·far. 30, 2007. Harl el al.
`Datacard,)(• SP60 Card Printer, product brochure by Datacan! (iroup
`(2004).
`Conununication Pursuant to Rule 44a EPC, dated Jun. 28, 2007,
`received in relaled European Application No 07251463.-2223 (10
`pages).
`
`Conununicalion Pursuanl lo Rule 44a EPC. dated Aug. 7. 2007.
`received in related Kuropcan Application No. 07105208.8-2221 (8
`pages).
`Hull ct al., 'Visualizing Multimedia Content on Paper Documents:
`Components of Key frame Selection for Video Paper," Proc. 7th Int.
`Conf on Document Analysis and Recognition, 4 pages (2003).
`MP cl·fini Prinlers Series, LowpowerUILra-Compacl Prinler, producl
`brochure by APS, revision 3.0 (Sep. 2004).
`Nelson ct al., "Palette: A Paper Intcit'acc for (iiving Presentations,"
`Proceeding of CHI '99 Conf on Human Factors in Computing .Sj,s(cid:173)
`rems AC\1 Press, pp. 354-361 ( I 999).
`Newlon-D,mn el al., "ntock Jam," SIGGRAPII 2002, held in SAn
`,\ntonio, TX (2002)
`Newlon-D,mn elal., ·'I3Jock Jam: A Tangible lnlerface for Inleraclive
`Music." J New Music Resean-/1, 32(4)383-393 (2003).
`Olympus & Polaroid digital printing camera: l)igitat Photography
`Review. downloaded from bttp:iiwv,w.dpreview.con1'news:0007i
`00072502c21 I zoom.asp on Apr. 5, 2007.
`Rekimolo el aL ·'Dala Tiles: A Modular Platform for Mixed Physical
`and Graphical Interactions," Pmceedings ofSIGCHI 'OJ, Mar. 31 to
`Apr.4.2001. SealUe WA.
`Sokoler ct al., ;,Physically Embodied Video Snippets Supporting
`Collaborative Exploration of Video \llatcriat l)uring Design Ses(cid:173)
`sions," Proceedings cfJVordCHI, Oct. 19-23, 2002, held in i\J-ht1s
`Denmal'k (2002).
`U lliner el itl .. "r;1edial3locks: Tangible lnlerfaces for Online Media,"
`Proceedings ofCHI '99, \fay 15-20, 1999.
`Non-final Office Aclion for C.S. Appl. :'fo. I J:396,264, mailed on
`Oct. 29. 2009. 16 pages.
`Adviso1y Action for L.S. Appl. :\o. I I :196,375, mailed on Nov. 18,
`2009, 3 pages.
`Final Office Action for L.S. Appl. No. I 1/396,179, mailod on Dec.
`15. 2009.14pages.
`Non-Final Office Action for L.S. Appl. "lo. 1 t:694,076, mailod on
`Nov. 2, 2009, 18 pages.
`"Exchangeable image file format for digital still cameras: Exif Ver(cid:173)
`sion 2.2," .JEITA CP-345 I, Standard of .Japan Klcctronics and Infor(cid:173)
`mation Technology Industries Association, ApL 2002, pp 1-148
`\Vhitc, "How Computers Work," Millennium Edition, Copyright
`1999, 37 pages.
`Notice of Allowance for lJ .S. Appl. No. I 1'495,611, mailed on Jul. L
`2010, 18 pages
`Non-Final Office Action for CS. Appl. :'fo. I J:396,264, mailed on
`Aug. 4, 20 I 0, 5 pages.
`Final Office Action for U.S. Appl. ~o. I 1/396,375, mailed on Aug. 2.
`20 I 0, 2 Ll pages.
`final OfficeAclion for U.S. Appl. No. I i/608,409, mailed on Jun 9,
`20 I 0, 23 pages.
`final Office Adion for CS. Appl. No. 11/694,076. mailed on c1fay
`10, 2010, 17 pages.
`Final Office Action for L.S. Appl. No. I t/396,264, mailod on Mar.
`31, 2010, 6 pages
`Non-Final Office Action for CS. Appl. "fo. I I /196,179, mailod on
`Mar 26, 2010, 17 pages.
`Non-Final Office Action in commonly owned L.S. Appl. :\o.
`I 1/608,409 mailed on Nov. 16, 20 I I, 18 pages.
`Office Action in commonly owned Japanese Application ~ o. 2007-
`096738 daled Ocl. 4, 2011, 3 pages.
`Final Office Action in conunonly owned U.S. Appl. ~o. 12:860,176
`mailed on Dec. 21, 20 I 1, 34 pages.
`OIIke Action in related Japanese application No. 2007-197790 daled
`Feb. 7, 2012, 6 pages.
`Oflice Ad ion in related Japanese appl icalion No. 2007-095 I 8:l dal ed
`Feb. 28, 2012, 3 pages.
`Advisory Action in commonly owned U.S. Appl. No. 12./860,176
`mailed on Mar 8, 2012, 3 pages.
`Fro! ct al. Prescient Paper: ';Multimedia Document Creation with
`Document Image Matching" 17th lnlemalional Conference on Pal(cid:173)
`tern Recognition (2004), pp. 1-4.
`Gormish et al. "An E-\Vriter for Documents Plus Strokes" ACc1-f doc
`Eng (2009), pp 1-4.
`Piersol. K. ·'Ot>jecl Oriented Spreadsheets" AC:V! OOPSLA Proceed(cid:173)
`ings ( 1986). pp. 1-6.
`
`

`

`US 8,756,673 B2
`Pagc4
`
`(56)
`
`References Cited
`
`OTHER PUBLICATIONS
`
`Ollice Action in commonly owned Japanese Applicalion No. 2007~
`197788 daLed Jul 26, 2011. 2 pages.
`Yon-final Office Action in commonly owned CS Appl Yo
`12:860.176 mailed on Jul. 15, 2011, 30 pages.
`bnal Office Action for U.S. Appl. No. I 1!608,409 mailed on Jun. 8,
`2012, 21 pages.
`Advisory Action for t:.s. Appl. No. 11!608,409 mailed on Aug. 31,
`2012, 3 pages.
`:\on-Final Office Action for lJ.S. Appl. No. 12./860,176 mailed on
`Aug. 15, 2012, 32 pages.
`CS. Appl. Yo. 12/860,176, filed Aug. 20, 2010, Piersol el al.
`I' inal Office Action for U.S. Appl. No. I J/396,264, mailed on I'eb 8,
`2011, 15 pages.
`Office Action in related.Japanese application No. 2008-0868:18 dated
`Yov. 13, 2012, 2 pages.
`How Computers Work, Millennium Edition. \Vhite, 1{011. Que f>ub(cid:173)
`lishing, Indianapolis, 1999. ISI3Y 0-7897-2112-0, 31 pages.
`
`Exchangeable Image file formal for Digilal SLill Cameras: [xif
`Version 2.2. Japan Electronics and lnfonnation Technology Indus(cid:173)
`tries Association (JEITA). Prepared by: Technical Standardization
`Committee on AV&. IT Storage Systems and Equipment. Apr. 2002.
`154 pages.
`Non-Final Office Action for U.S. Appl. :'-To. 11/396,375 mailed on
`Mar. I, 2013, 17 pages.
`Noticeof:\llo'>vance for U.S. Appl. No. 12/860,176 mailed on Mar.
`19, 2013, 8pages.
`Notice of Allowance for U.S. Appl No. I L'608,409 mailed on Oct. 8,
`2013, 9 pages.
`Non-Final Office Action for l J.S. Appl. 'fo. 1 l!:196,181 mailed on
`Nov.22.2013, 12 pages
`Office Action in related Japanese Application :-,; o. 2008-086838
`dated Jun. 25, 2013, 2 pages.
`Notice of Allowance for lJ.S. Appl. No. 1 l/:;96,375 mailed on .Jul. 9,
`2013, 15 pages.
`
`"cited by examiner
`
`

`

`U.S. Patent
`
`Jun. 17,2014
`
`Sheet 1 of 12
`
`US 8,756,673 B2
`
`f
`
`100
`
`STORAGE LOCATION r-106
`
`104
`~
`
`COMPUTER SYSTEM
`
`...._
`
`DIGITAL
`TOKEN
`
`\
`108
`
`102-----
`
`TOKEN
`PROCESSOR
`
`112
`(
`
`PRINTER
`
`110
`
`.. PHYSICAL
`
`TOKEN
`
`TOKEN
`READER r---- 114
`
`t
`
`8 - -116
`
`FIG. 1
`
`

`

`U.S. Patent
`
`Jun. 17,2014
`
`Sheet 2 of 12
`
`US 8,756,673 B2
`
`START
`
`,200
`
`RECEIVE A SIGNAL TO GENERATE A NEW TOKEN
`
`RECEIVE INFORMATION IDENTIFYING DATA THAT IS
`TO BE SHARED USING THE NEW TOKEN TO BE
`GENERATED
`
`202
`
`204
`
`DETERMINE STORAGE LOCATION FOR THE DATA TO
`BE SHARED
`
`206
`
`GENERATE AN IDENTIFIER FOR THE TOKEN TO BE
`GENERATED
`
`208
`
`GENERATE/IDENTIFY AN ENCRYPTION KEY FOR THE
`TOKEN TO BE GENERATED
`
`210
`
`ENCRYPT THE DATA IDENTIFIED IN 204 USING THE
`ENCRYPTION KEY GENERATED/DETERMINED IN 210
`
`212
`
`STORE THE ENCRYPTED DATA GENERATED IN 212
`TO THE STORAGE LOCATION DETERMINED IN 206
`
`214
`
`GENERATE ONE OR MORE TOKENS, EACH TOKEN
`COMPRISING THE IDENTIFIER GENERATED IN 208
`AND THE ENCRYPTION KEY GENERATED IN 210
`
`216
`
`END
`
`FIG. 2
`
`

`

`U.S. Patent
`
`Jun. 17,2014
`
`Sheet 3 of 12
`
`US 8,756,673 B2
`
`y-300
`
`( START )
`
`"
`RECEIVE A SIGNAL TO GENERATE A NEW TOKEN
`
`302
`
`"
`BE SHARED
`
`"
`
`GENERATED
`
`,,
`
`304
`
`306
`
`308
`
`DETERMINE STORAGE LOCATION FOR THE DATA TO -
`GENERATE AN IDENTIFIER FOR THE TOKEN TO BE -
`GENERATE/IDENTIFY AN ENCRYPTION KEY FOR THE -
`COMPRISING THE IDENTIFIER GENERATED IN 306 - 310
`
`TOKEN TO BE GENERATED
`
`,,
`GENERATE ONE OR MORE TOKENS, EACH TOKEN
`
`AND THE ENCRYPTION KEY GENERATED IN 308
`
`,.
`END
`
`(
`
`FIG. 3
`
`

`

`U.S. Patent
`
`Jun. 17,2014
`
`Sheet 4 of 12
`
`US 8,756,673 B2
`
`( START
`
`y-400
`
`,,
`RECEIVE A REQUEST TO SHARE DATA USING A
`PREVIOUSLY GENERATED TOKEN
`
`--402
`
`RECEIVE INFORMATION IDENTIFYING THE DATA TO
`BE SHARED
`
`,,
`OBTAIN INFORMATION FROM THE PREVIOUSLY
`GENERATED TOKEN
`
`DETERMINE AN IDENTIFIER AND AN ENCRYPTION
`KEY FROM THE INFORMATION OBTAINED FROM THE --408
`TOKEN IN 406
`
`,r
`ENCRYPT THE DATA IDENTIFIED IN 404 USING THE
`ENCRYPTION KEY DETERMINED IN 408
`
`,,
`THE ENCRYPTED DATA GENERATED IN 410 IS
`STORED TO THE STORAGE LOCATION
`CORRESPONDING TO THE IDENTIFIER DETERMINED
`IN408
`
`--412
`
`END
`
`FIG. 4
`
`

`

`U.S. Patent
`
`Jun. 17,2014
`
`Sheet 5 of 12
`
`US 8,756,673 B2
`
`START
`
`y-500
`
`RECEIVE A REQUEST TO ACCESS SHARED
`INFORMATION CORRESPONDING TOA TOKEN
`
`OBTAIN INFORMATION FROM THE TOKEN
`
`DETERMINE AN IDENTIFIER AND AN ENCRYPTION
`KEY FROM THE INFORMATION OBTAINED FROM THE
`TOKEN IN 504
`
`502
`
`504
`
`506
`
`ACCESS DATA IDENTIFIED BY THE IDENTIFIER
`DETERMINED IN 506
`
`508
`
`THE ENCRYPTED DATA ACCESSED IN 508 IS
`DECRYPTED USING THE ENCRYPTION KEY
`DETERMINED IN 506
`
`510
`
`DATA DECRYPTED IN 510 IS MADE ACCESSIBLE TO
`THE TOKEN HOLDER
`
`512
`
`END
`
`FIG. 5
`
`

`

`U.S. Patent
`
`Jun. 17,2014
`
`Sheet 6 of 12
`
`US 8,756,673 B2
`
`102
`(
`
`TOKEN PROCESSOR
`
`USER INTERFACE ----602
`
`IDENTIFIER PROCESSOR
`
`- - --604
`
`ENCRYPTION/DECRYPTION
`
`- ~ -606
`
`CAPTURE
`
`-608
`
`TOKEN INFORMATION --
`TOKEN GENERATOR ----610
`
`FIG. 6
`
`

`

`U.S. Patent
`
`Jun. 17,2014
`
`Sheet 7 of 12
`
`US 8,756,673 B2
`
`702-A
`
`704
`
`702-A
`
`752-A
`
`764
`
`760
`
`752-B
`
`764
`
`700
`
`702-B
`
`----704
`
`FRONT SIDE
`
`702-B
`
`BACK SIDE
`
`706
`
`FIG. 7A
`
`762
`
`750
`
`UNIQUE ID
`
`SYMMETRIC KEY
`
`UNIQUE ID
`
`SYMMETRIC KEY
`
`756
`754
`758
`
`756
`
`758
`
`762
`
`FIG. 7B
`
`

`

`U.S. Patent
`
`Jun. 17,2014
`
`Sheet 8 of 12
`
`US 8,756,673 B2
`
`y-800
`
`START
`
`RECEIVE A REQUEST TO GENERATE A NEW TOKEN
`
`GENERA TE A UNIQUE IDENTIFIER TO BE
`ASSOCIATED WITH THE NEW TOKEN TO BE
`GENERATED
`
`802
`
`804
`
`GENERATE A UNIQUE SYMMETRIC ENCRYPTION
`KEY TO BE ASSOCIATED WITH THE TOKEN TO BE
`GENERATED
`
`806
`
`CREATE A NULL RECORD THAT CAN BE ACCESSED
`USING THE UNIQUE IDENTIFIER GENERATED IN 804
`
`808
`
`STORE METADATA FOR THE NULL RECORD
`CREATED IN 808
`
`810
`
`GENERATE ONE OR MORE TOKENS (EITHER
`DIGITAL OR PHYSICAL) WITH EACH TOKEN
`COMPRISING THE UNIQUE IDENTIFIER GENERATED
`IN 804 AND THE ENCRYPTION KEY GENERA TED IN
`806
`
`812
`
`END
`
`FIG. 8
`
`

`

`U.S. Patent
`
`Jun. 17,2014
`
`Sheet 9 of 12
`
`US 8,756,673 B2
`
`START
`
`y-900
`
`RECEIVE INFORMATION IDENTIFYING THE DATA THAT IS TO
`BE UPLOADED AND MADE Al/AIL.ABLE AS SHARED DATA
`
`902
`
`OBTAIN INFORMATION FROM THE TOKEN THAT IS USED FOR
`UPLOADING THE DATA
`
`904
`
`DETERMINE AN IDENTIFIER AND AN ENCRYPTION KEY FROM
`THE INFORMATION OBTAINED FROM THE TOKEN IN 904
`
`906
`
`ENCRYPT THE DATA IDENTIFIED IN 902 USING THE
`ENCRYPTION KEY DETERMINED IN 906 TO PRODUCE
`ENCRYPTED SHARED DATA
`
`CREATE A NEW RECORD AND STORE THE ENCRYPTED DATA
`IN THE NEW RECORD
`
`GENERATE A UNIQUE IDENTIFIER FOR THE NEW RECORD
`
`STORE THE NEW RECORD CREATED IN 910 SUCH THAT IT
`CAN BE ACCESSED USING THE IDENTIFIER COMPUTED IN 912
`
`STORE METADATA FOR THE NEW RECORD
`
`ACCESS A RECORD CORRESPONDING TO THE UNIQUE
`IDENTIFIER DETERMINED IN 906
`
`READ METADATA ASSOCIATED WITH THE ACCESSED
`RECORD
`
`908
`
`910
`
`912
`
`914
`
`916
`
`918
`
`920
`
`No
`
`ACCESS RECORD POINTED TO BY
`THE "NEXT" POINTER IN METADATA
`
`UPDATE THE "NEXT" INFORMATION IN THE METADATA
`ASSOCIATED WITH THE LAST ACCESSED RECORD TO POINT
`TO THE NEW RECORD CREATED IN 910
`
`924
`
`926
`
`SET THE "NEXT' INFORMATION IN THE METADATA
`ASSOCIATED WITH THE RECORD CREATED IN 910 TO NULL
`
`928
`
`FIG. 9
`
`END
`
`

`

`U.S. Patent
`
`Jun. 17,2014
`
`Sheet 10 of 12
`
`US 8,756,673 B2
`
`IDo
`
`IDo
`
`1D1
`
`IDo
`
`1D1
`
`ID2
`
`1002
`
`EMPTY
`
`1002
`
`EMPTY
`
`1006
`
`METADATA FOR IDo RECORD
`NEXT: NULL
`PREV: NULL
`
`1004
`
`FIG. 10A
`
`METADATA FOR ID0 RECORD
`NEXT: ID1
`PREV: NULL
`
`1004
`
`ENCRYPTED SHARED
`DATA (151 VERSION)
`
`METAD
`NEXT: N
`PREV:I
`
`FIG. 10B
`
`1008
`
`1002
`
`EMPTY
`
`1006
`
`METADATA FOR ID0 RECORD
`NEXT:I01
`
`1004
`
`ENCRYPTED SHARED
`DATA (151 VERSION)
`
`1010
`
`ENCRYPTED SHARED
`DATA (2No VERSION)
`
`META
`NEXTI
`PREV: I
`
`METAD
`NEXT: N
`PREV: I
`
`FIG. 10C
`
`1008
`
`1012
`
`

`

`U.S. Patent
`
`Jun. 17,2014
`
`Sheet 11 of 12
`
`US 8,756,673 B2
`
`START
`
`,1100
`
`OBTAIN INFORMATION FROM A TOKEN BEING USED TO
`ACCESS SHARED DAT A
`
`1102
`
`DETERMINE AN IDENTIFIER AND AN ENCRYPTION KEY FROM
`THE INFORMATION OBTAINED IN 1102
`
`1104
`
`ACCESS A RECORD CORRESPONDING TO THE IDENTIFIER
`DETERMINED IN 1104
`
`1106
`
`READ METADATAASSOCIATED WITH THE ACCESSED
`RECORD
`
`1108
`
`111
`
`YES
`
`No
`
`ACCESS RECORD POINTED TO BY
`THE "NEXT" POINTER IN METADATA
`
`DECRYPT THE ENCRYPTED DATA FROM THE LAST
`ACCESSED RECORD USING THE ENCRYPTION KEY
`DETERMINED IN 1104
`
`1112
`
`1114
`
`THE DECRYPTED INFORMATION IS MADE ACCESSIBLE TO
`THE TOKEN HOLDER
`
`1116
`
`END
`
`FIG. 11
`
`

`

`U.S. Patent
`
`Jun. 17,2014
`
`Sheet 12 of 12
`
`US 8,756,673 B2
`
`1206
`
`DATA PROCESSING SYSTEM
`1200
`
`1208
`
`STORAGE SUBSYSTEM
`
`MEMORY SUBSYSTEM
`
`1210
`
`1212
`
`FILE STORAGE
`SUBSYSTEM
`
`USER INTERFACE
`INPUT DEVICES
`
`1202
`
`PROCESS0R(S)
`
`1216
`
`NETWORK
`INTERFACE
`
`USER INTERFACE
`OUTPUT DEi/iCES
`
`1214
`
`NETWORKS, SYSTEMS, DEVICES
`
`FIG. 12
`
`

`

`US 8,756,673 B2
`
`1
`Tl◄:CIII\JQUES FOR SIi ARING DATA
`
`BACKGROUND OF THE INVENTION
`
`2
`data is accessed using the identifier obtained from the token.
`The encrypted first data is then decrypted using the encryp(cid:173)
`tion key obtained from the token to produce decrypted first
`data. Access to the decrypted first data is enabled. In this
`manner, a token holder may use a token to access the shared
`data.
`The tokens that are generated and used may be digital
`(electronic) tokens or physical tokens. A physical token may
`be generated by priming the token on a physical medium. In
`one embodiment, a set of tokens may be generated by printing
`the set of tokens on a physical medimn, wherein the physical
`medium enables a token printed on the physical medimn lo be
`physically separated from other tokens printed on the physi(cid:173)
`cal medium.
`According to another embodiment ofthe present invention,
`Lcchniq ues arc provided for sharing data. In one cmbodimcnl,
`information is received idcnti1ying 1irst datll lo be shared .. A..!1
`idcnti1icr ,md an encryption key arc generated. The 1irst data
`is encrypted using the encryption key to produce encrypted
`1irst data. The cncrypled 1irst dala is sLOred such thllt the
`encrypted first data is accessible using the identifier. A set of
`one or more tokens is generated, each token in the set com(cid:173)
`prising the identifier and the encryption key. A generated
`token may then be used to access the shared data. In one
`25 embodiment, a 1irsl token may be prcscnLed for accessing
`shared data. lnfi1rmation may he obtained from the firsttoken.
`An identifier and encryption key may he determined from the
`information obtained from the first token. The encrypted first
`data may he accessed using the identifier obtained from the
`30 first token and decrypted using the encryption key obtained
`from the first token to produce decrypted first data. Access to
`the decrypted first data may he enabled.
`According to an embodiment of the present invention,
`different versions of the shared data may he stored and
`35 accessed. In one embodiment, a first record may be stored
`having first metadata associated with it. A first identifier may
`be generated. wherein the first record is accessible using the
`first identifier. An encryption key may be generated, wherein
`the encryption key is usable for encrypting data to be shared.
`40 A set of one or more tokens may be generated, each token in
`the set comprising the first identifier and the encryption key,
`where-in a token frum the sel of tokens enables slllring data
`such that the stored data is accessible using any token from
`the set of tokens.
`A token may then be used to stor-: versions of data to be
`shared. In one embodiment, a first identifier and the encryp(cid:173)
`Lion key is obtained from a Loken from the scl of tokens.
`Information is received idcnti1ying 1irsldata to be shar.xl. TI1e
`first tllltll is encrypted using the encryption key lo produce
`encrypted 1irsl daw. 111c encrypted Jirst data is stor-:d in a
`second record, wherein second mcladata is associaLed ,vith
`the second record. A second identifier is generated wherein
`the second record is accessible using the second identifier.
`The second identifier is stored in the first metadata associated
`55 with the first record. 'l he second mctadata may be encrypted
`using the encryption key obtained from the token.
`·1 ·he shared data may then he accessed using a token. In one
`embodiment, a first identifierand encryption key are obtained
`from a token in the set of tokens. ")he first record is accessed
`60 using the first identifier. 'Jhe second identifier is determined
`from the first metadata associated with the first record. The
`second record is accessed using the second identifier. 'Jhe
`encrypted first data in the second record is decrypted using the
`encryption key to produce decrypted first data. Access to the
`decrypted first data is enabled.
`A token may also be used to store another version of data to
`be shared. In one embodiment, the first identifier and the
`
`'Jhe present invention relates to data sharing, and more
`particularly to techniques for slmring data between multiple
`users in an anonymous and simple manner.
`']here are times when it is convenient for two people to
`arrange a future, secure (and pcrh,1ps anonymous) cxd1angc
`of data. Several conventional techniques may be used fi1r data 10
`exchange such as storing the data on a portable memory
`medium ( e.g., a CD, a memory stick) and sending the memory
`medium to one or more people using mail, attaching an
`encrypted data file to an email and communicating the email
`to the intended recipients.uploading secure data to an ftp site. 15
`to name a few. 1 lowever, each of the existing techniques is
`deficient in one way or another. Either it is not anonymous,
`requires a non-trivial exchange of detailed infonuation, or
`requires some setup effort in advance of the exchange.
`In light of the above, simplified techniques are desired that 20
`enable cxch,mgc of data bet wc'Cn users wh-:rcin the m1onym-
`ity of the users is maintained.
`
`13R1El SUMMARY OF TUE INVENTION
`
`I •:mbodiments of the present invention provide techniques
`fi1r sharing data between users in a manner that maintains
`anonymity of the users.· I i1kens are generated and provided to
`users fi1r sharing data. A token comprises information encod(cid:173)
`ing an identifier and an encryption key. A user may use a token
`to upload data that is to he shared. The data to he shared is
`encrypted using the encryption key associated with the token
`and the encrypted data is stored such that it can be accessed
`using the identifier associated ,vith the token. A user may then
`use a token to access the shared data. The identifier associated
`with the token being used to access the shared data is used to
`access the data and the encryption key associated with the
`token is used to decrypt the data. Data is shared anonymously
`without revealing the identity of the users using the tokens.
`According to an embodiment of the present invention,
`teclmiques are provided for sharing data. In one embodiment,
`an idcnti1icr is generated, whcr-:in the idcnti1icr is usable lo
`access data to be shared. An encryption key is generated that
`can be used for encrypting data to be shared. A set of one or
`mor-: Lokcns is genera Led, each token in the sci comprising the 45
`identifier and the encryption key, wherein a token from the set
`oftokens enables storing dala such thlll the dala is accessible
`using any token from the set oJt.okcns. In one embodiment, as
`part of genernt.ing the idcmificr, a storage location nrny be
`determined for storing the dll La to be shared and the idcnti1icr 50
`nrny be genernt.x.1 bas.xi upon the storage location. In one
`embodiment, a machine-readable-code may be generated
`encoding the idcnli1ier and the encryption key and the
`machine-readable code is associated with each token in the
`set of tokens.
`A token from the generated set may then he used to upload
`information to he shared. In one embodiment, an identifier
`and encryption key from a first token in the set of tokens.
`Information may also he received identifying first data to be
`shared. ·t11e first data is encrypted using the encryption key
`obtained from the first token to produce encrypted first data
`and the first encrypted data is stored such that the encrypted
`first data is accessible using the identifier.
`A token from the set of tokens may also he used to access
`the shared data. In one embodiment, an identifier and encryp- 65
`tion key is obtained from a token in the set of tokens that is
`presented for accessing the shared data. The encrypted first
`
`

`

`US 8,756,673 B2
`
`3
`encryption key are obtained from a token used for uploading
`the d.:1(a to be shanxl. In..limmLion is received idcntilying
`second data. TI1c second data is cncrypLcd using Lhc encryp(cid:173)
`tion key to produce encrypted second data. ·1he encrypted
`second data is sLonxl in a third record, wherein thirdmctadata
`is associated with Lhc Lhird record. A third idcntilicr is gener(cid:173)
`ated wherein the third record is accessible using the third
`idcnLilicr. TI1c third idcntilicr is stored in tk second meta da

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket