`US008756673B2
`
`c12) United States Patent
`Barrus et al.
`
`(IO) Patent No.:
`(45) Date of Patent:
`
`US 8,756,673 B2
`Jun.17,2O14
`
`(54) TECll:\IQUl<:S H>R SIi ARiNG DATA
`
`(75)
`
`Inventors: John W. Barrus, Menlo Park, CA (US):
`Tomohlko Sasaki, Tokyo (JP): Jamey
`Graham, Sc1n Jose, CA (US); Sh.iron
`Kojima, Sm1 Jose, CA (US)
`
`(73) Assignee: Ricoh Company, Ltd., Tokyo (JP)
`
`( * ) Notice:
`
`Subject to m1y disclc1i111cr, the Lcm1 of this
`patent is extended or mUusLetl under 35
`U.S.C. 154(b) by 661 days.
`
`EP
`FP
`
`(21) Appl. No.: 11/694,327
`
`(22) Filed:
`
`:\far. 30, 2007
`
`(65)
`
`Prior Publication Data
`
`US 2008/0244721 Al
`
`Oct. 2, 2008
`
`(51)
`
`Int. CI.
`G06F 21/00
`(52) U.S.Cl.
`USPC ............... 726/9; 71J/J5<J; 71:Vl60: 713/165;
`713/172: 713/176
`
`(2013.01)
`
`(58)
`
`(56)
`
`Field of Classification Search
`USPC .............................................................. 726/9
`See application file fi1r complete search history.
`
`Reforcnccs Cited
`
`U.S. PATENT DOCUMENTS
`
`4,974,878 A
`5,323.465 A •
`5,486,686 A
`5,490,217 A *
`5.590,197 A
`5,635.012 A
`5,694,470 A
`5,761,677 A •
`5,815,657 A
`
`12/199() Josephson
`6/1994 Ava.me ...
`1/1996 Zdybd el al.
`211996 Wang ct al. ...
`12/1996 Chcnctal.
`6/ 1997 Bellucci et al.
`12/1997 Jernbacker
`6/ 1998 Senalor el al.
`9/1998 Williams ct al.
`
`. 713/ 184
`
`.... 380/51
`
`... ......... 1/ I
`
`5,9'.B,829 A *
`8.11999 Durst ct al.
`5,940,507 A * 8/ 1999 Cane el al.
`212000 Checchio
`6,023,682 A
`6,035,290 A * 3/2000 PinLsov ...
`6.10S,656 A
`8/2000 Durst et al.
`9/ 2000 Neukermans el al.
`6,122,194 A
`(Continued)
`
`............ 111
`. 713/165
`
`. 705/405
`
`FOREIGN PATENT DOCUMENTS
`
`lQ:1998
`869 652 A2
`8/2()()()
`1 028 313 A2
`(Continued)
`OTHER PUBLICATIONS
`
`Meher et al.,A New Approach to Secure Distributed Storage. Sharing
`and Dissemination of Digital Image, \-lay 2006, IEEF International
`Symposium on Circuits and Systems, ISCAS 2006, pp. 171-176.*
`
`(Continued)
`
`Primary J::xaminer - Mohc1mmad L Rahnrnn
`Assistant Examiner - Kenneth Chang
`
`ABSTRACT
`(57)
`Techniques for sharing data between users in a manner that
`maintains m10nymiLy of the users. Tokens arc generated and
`provided to users for sharing data. A token comprises infor(cid:173)
`nuilion encoding an idenlifa:r and an encryption key. A user
`may use a Loken Lo upload data thc1t is to be shared. The data
`Lo be shared is encrypted using the encryption key c1ssLiciatcd
`with the Loken and !he encrypted dala is stored such that it can
`be accessed using !he idcnLi1icr <JSSU(:iatcd with !he Loken. A
`user may !hen use a token Lo access the shared data. '111e
`identifier associated with the token being used to c1cccss the
`shared data is used to access the data and the encryption key
`associated with the Loken is used to decrypt the data. Data is
`shared anonymously without revealing the identity nf the
`users using the tokens.
`
`10 Claims, 12 Drawing Sheets
`
`104
`
`STORAGE LOCA !ION r 106
`CO"PUTER SYSTEM -108
`
`lO<EN
`PROCESSOR
`
`,-,100
`
`112
`
`110
`
`102
`
`114
`
`t
`
`~ 1 16
`
`Google Exhibit 1022
`Google v. Ericsson
`
`
`
`US 8,756,673 B2
`Pagc2
`
`(56)
`
`References Cited
`
`U.S. PATENT DOCUMENTS
`
`2004/0205626 Al
`2004/0207873 Al"'
`2004/0224670 Al
`2005'0007624 Al
`2005/0010776 Al *
`2005/0013462 Al
`2005/0022008 Al
`2005/0062851 Al
`2005:008526:1 Al
`2005/0111034 Al
`2005'0114212 Al
`2005/0132194 Al
`2005:0171847 Al
`2005/0187792 Al
`2005'0200687 Al
`200 5/0200703 Al
`2005:0202804 Al
`2005/0257169 Al
`2005'0258246 Al
`200 5/0286463 Al
`2006/0000900 Al
`2006/0012813 Al
`2006'()015752 Al
`2006/0025 l 16 Al
`2006/0047977 Al
`2006/0054 702 Al
`2006'()055804 Al
`2006'0056728 Al
`2006/0098900 Al
`2006/0124 722 Al
`2006/0179048 Al
`2006'()19'.1004 Al
`2006/0218113 Al
`2006/0224962 Al
`2006/0233358 Al,:,
`2006'()265590 Al
`2006/0288236 Al "'
`2007 :oocn 1 02 Al
`2007/0013781 Al
`2007'0016470 Al
`2007/0050696 Al *
`2007!0067248 Al
`2007/0070218 Al
`2007'0078685 Al
`2007/0204 I 62 Al*
`2007 :02296 78 Al
`2007/0230703 Al
`2007/0233612 Al
`2007/0233613 Al
`2007/0234215 Al
`2007'0245882 Al
`2008/0086421 Al
`2008/0 l 07271 Al,:,
`2008/0141 117 Al
`2008/024'.1702 Al
`2011'0216960 Al
`
`,, ,_, .. _,_, ., _,,.
`
`10/2004 Klotz el al.
`10/2004 Kinjo
`11/2004 Ilull el al.
`l.'2005 Hcn1y
`1/2005 Kenen elal.
`1/2005 Rhoads
`1/2005 Goodman el al.
`3/2005 Silverbrook et al.
`4.' 2005 Kim el al.
`5/2005 Kara saki et al
`5.' 2005 McIntyre ct al.
`6/2005 Ward
`8.' 2005 T.ing
`8/2005 Harper
`9:2005 Si lvcrbrook ct al.
`9/2005 Kobaya shi et al.
`9.'2005 Si lvcrbrook ct al.
`11/2005 Tu
`\Vol ff ct al.
`11 :2005
`12/2005 Matsumoto
`1/2006 Fernandes et al.
`1/2006 Lapslun el al.
`1' 2006 Krueger
`2/2006 Silverbrook et al.
`3/2006 Hanasaki
`3/2006 Lei
`'.l'2006 Arai ct al.
`1/2006 Si lvcrbrook ct al.
`5:'2006 King et al.
`6/2006 \Villiams el al.
`8/2006 Doumuki
`8' 2006 w·asilcwski ct al.
`9/2006 Kishi
`10/2006 Oslojic el al.
`10/2006 Pradhan et al.
`I l.'2006 De Young ct al.
`12/2006 McCue ..... , ..... ,
`1:2007 Fujii ct al.
`1/2007 Kageyama et al.
`2:2007 Piersol ct al.
`3/2007 Piersol e;,l al. ..............
`'.l'2007 Chattc
`3/2007 Mei_jer
`4:2007 Dettinger ct al.
`8/2007 Rodriguez " '
`10:2001 Harn.is ct al.
`10/2007 I3arrus el al
`10/2007 Barms etal.
`10/2007 Ilarru s el al.
`10/2007 Graham ct al.
`10:2007 Odenwald
`4/2008 Gilder et al.
`5/2008 Mergen ....... ...............
`6' 2008 King ct al.
`10:2008 Hait ct al.
`9.'2011 Van Kirk ct al.
`
`358./ 1.15
`
`. 713/176
`
`"' 380:28
`
`.. 713/193
`
`. 715/500
`
`. 713/176
`
`. 380/278
`
`FOREIGN PATENT DOCUMENTS
`
`EP
`El'
`FP
`EP
`EP
`EP
`FP
`GB
`.IP
`JP
`JP
`JP
`JI'
`JP
`JP
`JP
`JP
`JP
`JP
`JP
`
`I 139 649 A2
`l 507 262 Al
`1 581 348 Al
`I 840 897 Al
`1840898 Al
`1883053 Al
`1975847 Al
`2417074 A
`SS-210779 A
`11-215351 A
`2000-113048 A
`2001-086113 A
`2002-024730 A
`2002-055609 A
`2002-117359 A
`2002-236960 A
`2003-316465 A
`2003-319330 A
`2004-062771 A
`2004-086708 A
`
`10i2001
`2/2005
`10/2005
`10:2007
`10/2007
`J:2008
`10/2008
`2:2006
`12/1981
`3,1999
`4/2000
`3:2001
`J:2002
`212002
`4:2002
`8/2002
`10:2002
`lli2003
`2:2004
`J/2004
`
`............. 340/572.1
`
`.. . .. 726:'10
`
`12:2000 \Valker et al.
`6,161,771 A
`2:2001 Stratigos et al.
`6,189,009 BJ
`2:2001 Walker ct al.
`6,193,155 HI
`5/200 I Sandrn
`6,233,340 BJ
`6,259,167 RI'' 7!2001 Klein ...
`6,330.544 !31
`12/2001 Walker el al.
`6,170,514 HI
`4!2002 Messner
`6,389.151 BJ
`5/2002 Carr et al.
`6,390,362 BJ
`5/2002 Ma1tin
`6,422,462 !31
`7/2002 Cohen
`6526,25'.l H2
`2:2001 Hayashi ct al.
`6,574.609 BJ
`6/2003 Downs
`6,618,078 BJ
`9/2003 Bud1ys
`6,628,377 !31
`9/2003 Sabalini el al
`6,744,910 HI
`6!2004 Mcclurg ct al.
`6,748,424 Tl I
`6!2004 lJsud.a
`6,755,341 BJ
`6/2004 Wong et al.
`6,760,843 !31 •
`7/2004 Carler ...........
`6,820.803 BJ
`I J:'2004 Browning et al.
`6,831,682 Fl I
`12:2004 Silvcrbrook ct al.
`6,873,430 B2
`3/2005 Grasso et al.
`6,917,691 I32
`7/2005 Evans el al.
`6,930.803 Bl
`8/2005 Suzuki
`6,937,989 H2
`8.'2005 M cl ntyrc ct al.
`6,970,573 B2
`l l/2005 Carr et al.
`6,980,011 H2
`12:2005 Fowler
`7,016.524 B2
`3/2006 Moore
`7,028,188 HI
`4!2006 Moore
`7,080,041 132
`7/2006 Nagd
`9.'2006 I ,inchan
`7,103,575 HI
`7,113,925 132
`9/2006 Waserstein et al.
`7,234,801 H2
`6!2007 Silvcrbrook
`9/2007 Ilal,e;,r
`7,273,162 Il2
`12!2007 Kishi
`7308,54'.l H2
`7,408,575 132
`8/2008 Kawada
`7,469.824 Bl
`12'2008 Crews et al.
`7,593,542 !32
`9/2009 Abe el al.
`7,599,580 H2
`10:2009 King ct al.
`7,603,414 H2
`10:2009 Svendsen
`7,712.675 B2
`5:'2010 Balinsky et al.
`6/2010 Mad al.
`7,735,721 !31
`7,797,642 Bl
`9/2010 Karam ct al.
`7,809,156 H2
`10:2010 Piersol ct al.
`7,865.124 B2
`J:'2011 Piersol et al.
`7,917,866 !31
`3/2011 Karam
`2001/0014878 Al
`8/2001 Mitra el al.
`2002:0080'.l87 Al
`6!2002 ( Trasso ct al.
`2002'0080959 Al
`6:'2002 Weller
`2002/0084330 Al
`7/2002 Chill
`2002/0103764 Al
`8/2002 Yen el al.
`2002.:0116618 Al
`8-'2002 Muratani
`2002'0143624 Al
`10/2002 Catan
`2002.:0154910 Al
`10:2002 Kawaoka
`2002/0174180 Al• I 1/2002 Ilrown el al. ....... , ..... , ... 709/203
`711.:160
`2002.'0 I 84494 Al* 12:2002 Awactalla
`2003/0001016 Al
`J:'2003 fraier el al.
`2()()3/0028543 Al
`2'2003 Uusbcrgcr
`2003/0037248 Al• 2/2003 Launchbury el al.
`2()(J'.l.'0069902 Al* 4.'2003 Narang ct al.
`2003/0079222 Al
`4/2003 I3oykin el al.
`2()()3/0130567 Al
`7/2003 J\.1ault et al.
`2003/0135420 Al
`7/2003 Culling el al.
`2003/0161475 Al•
`8/2003 Cmmly etal.
`2003/0164879 Al
`9/2003 Kilagmva
`2003/0223614 Al
`12'2003 Robins
`2()(J4.!004 7000 Al
`'.l.'2004 Watanabe ct al.
`2004/0135867 Al• 7/2004 Schmitt et al.
`7!2004 Md ntyre el al.
`2004!0141194 Al
`2004/0143451 Al
`7/2004 McIntyre et al.
`2004/0143552 Al
`7/2004 Weicherl et al.
`2004/0193571 Al
`9/2004 I3arrus el al
`20()4/0194026 Al
`9/2004 Barms et al.
`2004/0196490 Al
`10/2004 Lapstun et al.
`2004/020090 l Al
`10/2004 Lebaschi et al.
`2004/0201676 Al
`10/2004 Needham
`
`713/ 193
`707.' 201
`
`...... " ' 380/280
`
`347/ 107
`
`
`
`US 8,756,673 B2
`Page 3
`
`(56)
`
`References Cited
`
`FOREIGN PATENT DOCUMENTS
`
`.IP
`JP
`.IP
`JP
`.IP
`JP
`.IP
`JP
`JP
`\VO
`\VO
`WO
`\VO
`
`2004-102562 A
`2004-112644 A
`2005-295564 A
`2006-053851
`2006-150662 A
`2007-280391 A
`2008-00407 I A
`2008:071338 A
`2008:257720 A
`WO 98/16884 Al
`WO 01/52473 Al
`WO 02:098671 A2
`WO 2006:021383 Al
`
`4/2004
`4!2004
`10/2005
`2!2006
`6/2006
`10:2007
`1/2008
`3!2008
`10!2008
`4/1998
`7/2001
`12!2002
`3!2006
`
`OTHER PUBLICATIONS
`
`Lange et aL "Insight Lab: An Immersive Team Environment Linking
`Paper, l)isplays, and Data," Proceedings of the 1998 Conference on
`Human Factors in Computing Systems, 1998, 8 pages.
`Internet i\J·chive Wayback Machine archive of "How Computers
`\Vork: The CPC and Memory," available at CRL: http:!iweb.aschive.
`orgiweb/20031215230244/hllp://homepage.cs.uri.eduifm:ullyi
`wolfc/book!Readings/Rcading04.htrn, archived on Dec. I 5, 2003, 7
`pages.
`~ elson et al., "Palette: A Paper Interface for Giving Presentations,"
`Procccdingsofthc('.HI Conference on Human !'actors in Computing
`Systems, \fay 1999, 8 pages.
`~on-Final Office Action for U.S. Appl. No. IV396,375. mailed on
`I'eb. 22, 20 JO, 15 pages
`hnal Office Action for L.S. Appl. No. 11/396,381, mailed on Dec.
`22, 2009, 2 I pages.
`~on-Final Office Action for U.S. Appl. No. 11'608,409, mailed on
`Jan. 6, 2010, 31 pages
`:\on-Final Office Action for lJ.S. Appl. No. 11'495,611, mailed on
`Dec. 3 1, 2009, 39 pages.
`"\-on-final OfficeAclionforU.S. Appl. No. 11/396,375, cl.failed Mar.
`5. 2009, 12 pages.
`:\on-Final Office Action for lJ.S. Appl. No. l 1 !396,379, \1ailcd Dec.
`24, 2008, IO pages.
`:\on-Final Office for lJ.S. Appl. :\o. l {/694,076, \1ailcd Oct. 29,
`2008, 21 pages.
`l'inal Oflicc Adi on for CS. Appl. No. I 1/694,076, \failed Apr. 24,
`2009, 24 pages.
`Requirement for RcstrictioniElcction forlJ.S. Appl. No. I t.:396,179,
`mailed ~ov. 13, 2008, 6 pages.
`~on-Final Office Action for U.S. Appl. No. 11/396,379, mailed Jun
`I 0, 2009, I 2 pages.
`~on-Final Office Action for U.S. Appl. No. 11/396,381, mailed Jun.
`24, 2009, 24 pages.
`Requiremenl for ReslriclioniEleclion for U.S.Appl No. 11/694,076,
`mailed Sep. 5, 2008, 6 pages.
`Extended ruropean Search Report in European Applicalion '\o.
`07113300.3-1228, Mailed Dec. 12. 2007. 5 pages.
`Exlended European Sean:h Reporl of Jul. 28. 2008 in European
`Application No. 08251133.8-2212.
`"2 Dimensional Har Code", Internet Archive Wayhack \llachinc,
`archived on Jan. 24, 2002. 11 pages, al CRL: hllp:!/web.an:hive.org/
`wcb:'20020 I 24 I 90457:www.a<lamsI.com/puh:n1ssa.dam/stack.
`him!.
`Requirement for RestrictioniElection for U.S.Appl. No. 11/495,613,
`mailed on Ocl. 13, 2009, 6 pages.
`Final Office Action for U.S Appl ~o. JJ.:396,375, mailed on Sep I,
`2009, 16 pages.
`CS Appl. ~o. I J/694,076, filed cl·far. 30, 2007. Harl el al.
`Datacard,)(• SP60 Card Printer, product brochure by Datacan! (iroup
`(2004).
`Conununication Pursuant to Rule 44a EPC, dated Jun. 28, 2007,
`received in relaled European Application No 07251463.-2223 (10
`pages).
`
`Conununicalion Pursuanl lo Rule 44a EPC. dated Aug. 7. 2007.
`received in related Kuropcan Application No. 07105208.8-2221 (8
`pages).
`Hull ct al., 'Visualizing Multimedia Content on Paper Documents:
`Components of Key frame Selection for Video Paper," Proc. 7th Int.
`Conf on Document Analysis and Recognition, 4 pages (2003).
`MP cl·fini Prinlers Series, LowpowerUILra-Compacl Prinler, producl
`brochure by APS, revision 3.0 (Sep. 2004).
`Nelson ct al., "Palette: A Paper Intcit'acc for (iiving Presentations,"
`Proceeding of CHI '99 Conf on Human Factors in Computing .Sj,s(cid:173)
`rems AC\1 Press, pp. 354-361 ( I 999).
`Newlon-D,mn el al., "ntock Jam," SIGGRAPII 2002, held in SAn
`,\ntonio, TX (2002)
`Newlon-D,mn elal., ·'I3Jock Jam: A Tangible lnlerface for Inleraclive
`Music." J New Music Resean-/1, 32(4)383-393 (2003).
`Olympus & Polaroid digital printing camera: l)igitat Photography
`Review. downloaded from bttp:iiwv,w.dpreview.con1'news:0007i
`00072502c21 I zoom.asp on Apr. 5, 2007.
`Rekimolo el aL ·'Dala Tiles: A Modular Platform for Mixed Physical
`and Graphical Interactions," Pmceedings ofSIGCHI 'OJ, Mar. 31 to
`Apr.4.2001. SealUe WA.
`Sokoler ct al., ;,Physically Embodied Video Snippets Supporting
`Collaborative Exploration of Video \llatcriat l)uring Design Ses(cid:173)
`sions," Proceedings cfJVordCHI, Oct. 19-23, 2002, held in i\J-ht1s
`Denmal'k (2002).
`U lliner el itl .. "r;1edial3locks: Tangible lnlerfaces for Online Media,"
`Proceedings ofCHI '99, \fay 15-20, 1999.
`Non-final Office Aclion for C.S. Appl. :'fo. I J:396,264, mailed on
`Oct. 29. 2009. 16 pages.
`Adviso1y Action for L.S. Appl. :\o. I I :196,375, mailed on Nov. 18,
`2009, 3 pages.
`Final Office Action for L.S. Appl. No. I 1/396,179, mailod on Dec.
`15. 2009.14pages.
`Non-Final Office Action for L.S. Appl. "lo. 1 t:694,076, mailod on
`Nov. 2, 2009, 18 pages.
`"Exchangeable image file format for digital still cameras: Exif Ver(cid:173)
`sion 2.2," .JEITA CP-345 I, Standard of .Japan Klcctronics and Infor(cid:173)
`mation Technology Industries Association, ApL 2002, pp 1-148
`\Vhitc, "How Computers Work," Millennium Edition, Copyright
`1999, 37 pages.
`Notice of Allowance for lJ .S. Appl. No. I 1'495,611, mailed on Jul. L
`2010, 18 pages
`Non-Final Office Action for CS. Appl. :'fo. I J:396,264, mailed on
`Aug. 4, 20 I 0, 5 pages.
`Final Office Action for U.S. Appl. ~o. I 1/396,375, mailed on Aug. 2.
`20 I 0, 2 Ll pages.
`final OfficeAclion for U.S. Appl. No. I i/608,409, mailed on Jun 9,
`20 I 0, 23 pages.
`final Office Adion for CS. Appl. No. 11/694,076. mailed on c1fay
`10, 2010, 17 pages.
`Final Office Action for L.S. Appl. No. I t/396,264, mailod on Mar.
`31, 2010, 6 pages
`Non-Final Office Action for CS. Appl. "fo. I I /196,179, mailod on
`Mar 26, 2010, 17 pages.
`Non-Final Office Action in commonly owned L.S. Appl. :\o.
`I 1/608,409 mailed on Nov. 16, 20 I I, 18 pages.
`Office Action in commonly owned Japanese Application ~ o. 2007-
`096738 daled Ocl. 4, 2011, 3 pages.
`Final Office Action in conunonly owned U.S. Appl. ~o. 12:860,176
`mailed on Dec. 21, 20 I 1, 34 pages.
`OIIke Action in related Japanese application No. 2007-197790 daled
`Feb. 7, 2012, 6 pages.
`Oflice Ad ion in related Japanese appl icalion No. 2007-095 I 8:l dal ed
`Feb. 28, 2012, 3 pages.
`Advisory Action in commonly owned U.S. Appl. No. 12./860,176
`mailed on Mar 8, 2012, 3 pages.
`Fro! ct al. Prescient Paper: ';Multimedia Document Creation with
`Document Image Matching" 17th lnlemalional Conference on Pal(cid:173)
`tern Recognition (2004), pp. 1-4.
`Gormish et al. "An E-\Vriter for Documents Plus Strokes" ACc1-f doc
`Eng (2009), pp 1-4.
`Piersol. K. ·'Ot>jecl Oriented Spreadsheets" AC:V! OOPSLA Proceed(cid:173)
`ings ( 1986). pp. 1-6.
`
`
`
`US 8,756,673 B2
`Pagc4
`
`(56)
`
`References Cited
`
`OTHER PUBLICATIONS
`
`Ollice Action in commonly owned Japanese Applicalion No. 2007~
`197788 daLed Jul 26, 2011. 2 pages.
`Yon-final Office Action in commonly owned CS Appl Yo
`12:860.176 mailed on Jul. 15, 2011, 30 pages.
`bnal Office Action for U.S. Appl. No. I 1!608,409 mailed on Jun. 8,
`2012, 21 pages.
`Advisory Action for t:.s. Appl. No. 11!608,409 mailed on Aug. 31,
`2012, 3 pages.
`:\on-Final Office Action for lJ.S. Appl. No. 12./860,176 mailed on
`Aug. 15, 2012, 32 pages.
`CS. Appl. Yo. 12/860,176, filed Aug. 20, 2010, Piersol el al.
`I' inal Office Action for U.S. Appl. No. I J/396,264, mailed on I'eb 8,
`2011, 15 pages.
`Office Action in related.Japanese application No. 2008-0868:18 dated
`Yov. 13, 2012, 2 pages.
`How Computers Work, Millennium Edition. \Vhite, 1{011. Que f>ub(cid:173)
`lishing, Indianapolis, 1999. ISI3Y 0-7897-2112-0, 31 pages.
`
`Exchangeable Image file formal for Digilal SLill Cameras: [xif
`Version 2.2. Japan Electronics and lnfonnation Technology Indus(cid:173)
`tries Association (JEITA). Prepared by: Technical Standardization
`Committee on AV&. IT Storage Systems and Equipment. Apr. 2002.
`154 pages.
`Non-Final Office Action for U.S. Appl. :'-To. 11/396,375 mailed on
`Mar. I, 2013, 17 pages.
`Noticeof:\llo'>vance for U.S. Appl. No. 12/860,176 mailed on Mar.
`19, 2013, 8pages.
`Notice of Allowance for U.S. Appl No. I L'608,409 mailed on Oct. 8,
`2013, 9 pages.
`Non-Final Office Action for l J.S. Appl. 'fo. 1 l!:196,181 mailed on
`Nov.22.2013, 12 pages
`Office Action in related Japanese Application :-,; o. 2008-086838
`dated Jun. 25, 2013, 2 pages.
`Notice of Allowance for lJ.S. Appl. No. 1 l/:;96,375 mailed on .Jul. 9,
`2013, 15 pages.
`
`"cited by examiner
`
`
`
`U.S. Patent
`
`Jun. 17,2014
`
`Sheet 1 of 12
`
`US 8,756,673 B2
`
`f
`
`100
`
`STORAGE LOCATION r-106
`
`104
`~
`
`COMPUTER SYSTEM
`
`...._
`
`DIGITAL
`TOKEN
`
`\
`108
`
`102-----
`
`TOKEN
`PROCESSOR
`
`112
`(
`
`PRINTER
`
`110
`
`.. PHYSICAL
`
`TOKEN
`
`TOKEN
`READER r---- 114
`
`t
`
`8 - -116
`
`FIG. 1
`
`
`
`U.S. Patent
`
`Jun. 17,2014
`
`Sheet 2 of 12
`
`US 8,756,673 B2
`
`START
`
`,200
`
`RECEIVE A SIGNAL TO GENERATE A NEW TOKEN
`
`RECEIVE INFORMATION IDENTIFYING DATA THAT IS
`TO BE SHARED USING THE NEW TOKEN TO BE
`GENERATED
`
`202
`
`204
`
`DETERMINE STORAGE LOCATION FOR THE DATA TO
`BE SHARED
`
`206
`
`GENERATE AN IDENTIFIER FOR THE TOKEN TO BE
`GENERATED
`
`208
`
`GENERATE/IDENTIFY AN ENCRYPTION KEY FOR THE
`TOKEN TO BE GENERATED
`
`210
`
`ENCRYPT THE DATA IDENTIFIED IN 204 USING THE
`ENCRYPTION KEY GENERATED/DETERMINED IN 210
`
`212
`
`STORE THE ENCRYPTED DATA GENERATED IN 212
`TO THE STORAGE LOCATION DETERMINED IN 206
`
`214
`
`GENERATE ONE OR MORE TOKENS, EACH TOKEN
`COMPRISING THE IDENTIFIER GENERATED IN 208
`AND THE ENCRYPTION KEY GENERATED IN 210
`
`216
`
`END
`
`FIG. 2
`
`
`
`U.S. Patent
`
`Jun. 17,2014
`
`Sheet 3 of 12
`
`US 8,756,673 B2
`
`y-300
`
`( START )
`
`"
`RECEIVE A SIGNAL TO GENERATE A NEW TOKEN
`
`302
`
`"
`BE SHARED
`
`"
`
`GENERATED
`
`,,
`
`304
`
`306
`
`308
`
`DETERMINE STORAGE LOCATION FOR THE DATA TO -
`GENERATE AN IDENTIFIER FOR THE TOKEN TO BE -
`GENERATE/IDENTIFY AN ENCRYPTION KEY FOR THE -
`COMPRISING THE IDENTIFIER GENERATED IN 306 - 310
`
`TOKEN TO BE GENERATED
`
`,,
`GENERATE ONE OR MORE TOKENS, EACH TOKEN
`
`AND THE ENCRYPTION KEY GENERATED IN 308
`
`,.
`END
`
`(
`
`FIG. 3
`
`
`
`U.S. Patent
`
`Jun. 17,2014
`
`Sheet 4 of 12
`
`US 8,756,673 B2
`
`( START
`
`y-400
`
`,,
`RECEIVE A REQUEST TO SHARE DATA USING A
`PREVIOUSLY GENERATED TOKEN
`
`--402
`
`RECEIVE INFORMATION IDENTIFYING THE DATA TO
`BE SHARED
`
`,,
`OBTAIN INFORMATION FROM THE PREVIOUSLY
`GENERATED TOKEN
`
`DETERMINE AN IDENTIFIER AND AN ENCRYPTION
`KEY FROM THE INFORMATION OBTAINED FROM THE --408
`TOKEN IN 406
`
`,r
`ENCRYPT THE DATA IDENTIFIED IN 404 USING THE
`ENCRYPTION KEY DETERMINED IN 408
`
`,,
`THE ENCRYPTED DATA GENERATED IN 410 IS
`STORED TO THE STORAGE LOCATION
`CORRESPONDING TO THE IDENTIFIER DETERMINED
`IN408
`
`--412
`
`END
`
`FIG. 4
`
`
`
`U.S. Patent
`
`Jun. 17,2014
`
`Sheet 5 of 12
`
`US 8,756,673 B2
`
`START
`
`y-500
`
`RECEIVE A REQUEST TO ACCESS SHARED
`INFORMATION CORRESPONDING TOA TOKEN
`
`OBTAIN INFORMATION FROM THE TOKEN
`
`DETERMINE AN IDENTIFIER AND AN ENCRYPTION
`KEY FROM THE INFORMATION OBTAINED FROM THE
`TOKEN IN 504
`
`502
`
`504
`
`506
`
`ACCESS DATA IDENTIFIED BY THE IDENTIFIER
`DETERMINED IN 506
`
`508
`
`THE ENCRYPTED DATA ACCESSED IN 508 IS
`DECRYPTED USING THE ENCRYPTION KEY
`DETERMINED IN 506
`
`510
`
`DATA DECRYPTED IN 510 IS MADE ACCESSIBLE TO
`THE TOKEN HOLDER
`
`512
`
`END
`
`FIG. 5
`
`
`
`U.S. Patent
`
`Jun. 17,2014
`
`Sheet 6 of 12
`
`US 8,756,673 B2
`
`102
`(
`
`TOKEN PROCESSOR
`
`USER INTERFACE ----602
`
`IDENTIFIER PROCESSOR
`
`- - --604
`
`ENCRYPTION/DECRYPTION
`
`- ~ -606
`
`CAPTURE
`
`-608
`
`TOKEN INFORMATION --
`TOKEN GENERATOR ----610
`
`FIG. 6
`
`
`
`U.S. Patent
`
`Jun. 17,2014
`
`Sheet 7 of 12
`
`US 8,756,673 B2
`
`702-A
`
`704
`
`702-A
`
`752-A
`
`764
`
`760
`
`752-B
`
`764
`
`700
`
`702-B
`
`----704
`
`FRONT SIDE
`
`702-B
`
`BACK SIDE
`
`706
`
`FIG. 7A
`
`762
`
`750
`
`UNIQUE ID
`
`SYMMETRIC KEY
`
`UNIQUE ID
`
`SYMMETRIC KEY
`
`756
`754
`758
`
`756
`
`758
`
`762
`
`FIG. 7B
`
`
`
`U.S. Patent
`
`Jun. 17,2014
`
`Sheet 8 of 12
`
`US 8,756,673 B2
`
`y-800
`
`START
`
`RECEIVE A REQUEST TO GENERATE A NEW TOKEN
`
`GENERA TE A UNIQUE IDENTIFIER TO BE
`ASSOCIATED WITH THE NEW TOKEN TO BE
`GENERATED
`
`802
`
`804
`
`GENERATE A UNIQUE SYMMETRIC ENCRYPTION
`KEY TO BE ASSOCIATED WITH THE TOKEN TO BE
`GENERATED
`
`806
`
`CREATE A NULL RECORD THAT CAN BE ACCESSED
`USING THE UNIQUE IDENTIFIER GENERATED IN 804
`
`808
`
`STORE METADATA FOR THE NULL RECORD
`CREATED IN 808
`
`810
`
`GENERATE ONE OR MORE TOKENS (EITHER
`DIGITAL OR PHYSICAL) WITH EACH TOKEN
`COMPRISING THE UNIQUE IDENTIFIER GENERATED
`IN 804 AND THE ENCRYPTION KEY GENERA TED IN
`806
`
`812
`
`END
`
`FIG. 8
`
`
`
`U.S. Patent
`
`Jun. 17,2014
`
`Sheet 9 of 12
`
`US 8,756,673 B2
`
`START
`
`y-900
`
`RECEIVE INFORMATION IDENTIFYING THE DATA THAT IS TO
`BE UPLOADED AND MADE Al/AIL.ABLE AS SHARED DATA
`
`902
`
`OBTAIN INFORMATION FROM THE TOKEN THAT IS USED FOR
`UPLOADING THE DATA
`
`904
`
`DETERMINE AN IDENTIFIER AND AN ENCRYPTION KEY FROM
`THE INFORMATION OBTAINED FROM THE TOKEN IN 904
`
`906
`
`ENCRYPT THE DATA IDENTIFIED IN 902 USING THE
`ENCRYPTION KEY DETERMINED IN 906 TO PRODUCE
`ENCRYPTED SHARED DATA
`
`CREATE A NEW RECORD AND STORE THE ENCRYPTED DATA
`IN THE NEW RECORD
`
`GENERATE A UNIQUE IDENTIFIER FOR THE NEW RECORD
`
`STORE THE NEW RECORD CREATED IN 910 SUCH THAT IT
`CAN BE ACCESSED USING THE IDENTIFIER COMPUTED IN 912
`
`STORE METADATA FOR THE NEW RECORD
`
`ACCESS A RECORD CORRESPONDING TO THE UNIQUE
`IDENTIFIER DETERMINED IN 906
`
`READ METADATA ASSOCIATED WITH THE ACCESSED
`RECORD
`
`908
`
`910
`
`912
`
`914
`
`916
`
`918
`
`920
`
`No
`
`ACCESS RECORD POINTED TO BY
`THE "NEXT" POINTER IN METADATA
`
`UPDATE THE "NEXT" INFORMATION IN THE METADATA
`ASSOCIATED WITH THE LAST ACCESSED RECORD TO POINT
`TO THE NEW RECORD CREATED IN 910
`
`924
`
`926
`
`SET THE "NEXT' INFORMATION IN THE METADATA
`ASSOCIATED WITH THE RECORD CREATED IN 910 TO NULL
`
`928
`
`FIG. 9
`
`END
`
`
`
`U.S. Patent
`
`Jun. 17,2014
`
`Sheet 10 of 12
`
`US 8,756,673 B2
`
`IDo
`
`IDo
`
`1D1
`
`IDo
`
`1D1
`
`ID2
`
`1002
`
`EMPTY
`
`1002
`
`EMPTY
`
`1006
`
`METADATA FOR IDo RECORD
`NEXT: NULL
`PREV: NULL
`
`1004
`
`FIG. 10A
`
`METADATA FOR ID0 RECORD
`NEXT: ID1
`PREV: NULL
`
`1004
`
`ENCRYPTED SHARED
`DATA (151 VERSION)
`
`METAD
`NEXT: N
`PREV:I
`
`FIG. 10B
`
`1008
`
`1002
`
`EMPTY
`
`1006
`
`METADATA FOR ID0 RECORD
`NEXT:I01
`
`1004
`
`ENCRYPTED SHARED
`DATA (151 VERSION)
`
`1010
`
`ENCRYPTED SHARED
`DATA (2No VERSION)
`
`META
`NEXTI
`PREV: I
`
`METAD
`NEXT: N
`PREV: I
`
`FIG. 10C
`
`1008
`
`1012
`
`
`
`U.S. Patent
`
`Jun. 17,2014
`
`Sheet 11 of 12
`
`US 8,756,673 B2
`
`START
`
`,1100
`
`OBTAIN INFORMATION FROM A TOKEN BEING USED TO
`ACCESS SHARED DAT A
`
`1102
`
`DETERMINE AN IDENTIFIER AND AN ENCRYPTION KEY FROM
`THE INFORMATION OBTAINED IN 1102
`
`1104
`
`ACCESS A RECORD CORRESPONDING TO THE IDENTIFIER
`DETERMINED IN 1104
`
`1106
`
`READ METADATAASSOCIATED WITH THE ACCESSED
`RECORD
`
`1108
`
`111
`
`YES
`
`No
`
`ACCESS RECORD POINTED TO BY
`THE "NEXT" POINTER IN METADATA
`
`DECRYPT THE ENCRYPTED DATA FROM THE LAST
`ACCESSED RECORD USING THE ENCRYPTION KEY
`DETERMINED IN 1104
`
`1112
`
`1114
`
`THE DECRYPTED INFORMATION IS MADE ACCESSIBLE TO
`THE TOKEN HOLDER
`
`1116
`
`END
`
`FIG. 11
`
`
`
`U.S. Patent
`
`Jun. 17,2014
`
`Sheet 12 of 12
`
`US 8,756,673 B2
`
`1206
`
`DATA PROCESSING SYSTEM
`1200
`
`1208
`
`STORAGE SUBSYSTEM
`
`MEMORY SUBSYSTEM
`
`1210
`
`1212
`
`FILE STORAGE
`SUBSYSTEM
`
`USER INTERFACE
`INPUT DEVICES
`
`1202
`
`PROCESS0R(S)
`
`1216
`
`NETWORK
`INTERFACE
`
`USER INTERFACE
`OUTPUT DEi/iCES
`
`1214
`
`NETWORKS, SYSTEMS, DEVICES
`
`FIG. 12
`
`
`
`US 8,756,673 B2
`
`1
`Tl◄:CIII\JQUES FOR SIi ARING DATA
`
`BACKGROUND OF THE INVENTION
`
`2
`data is accessed using the identifier obtained from the token.
`The encrypted first data is then decrypted using the encryp(cid:173)
`tion key obtained from the token to produce decrypted first
`data. Access to the decrypted first data is enabled. In this
`manner, a token holder may use a token to access the shared
`data.
`The tokens that are generated and used may be digital
`(electronic) tokens or physical tokens. A physical token may
`be generated by priming the token on a physical medium. In
`one embodiment, a set of tokens may be generated by printing
`the set of tokens on a physical medimn, wherein the physical
`medium enables a token printed on the physical medimn lo be
`physically separated from other tokens printed on the physi(cid:173)
`cal medium.
`According to another embodiment ofthe present invention,
`Lcchniq ues arc provided for sharing data. In one cmbodimcnl,
`information is received idcnti1ying 1irst datll lo be shared .. A..!1
`idcnti1icr ,md an encryption key arc generated. The 1irst data
`is encrypted using the encryption key to produce encrypted
`1irst data. The cncrypled 1irst dala is sLOred such thllt the
`encrypted first data is accessible using the identifier. A set of
`one or more tokens is generated, each token in the set com(cid:173)
`prising the identifier and the encryption key. A generated
`token may then be used to access the shared data. In one
`25 embodiment, a 1irsl token may be prcscnLed for accessing
`shared data. lnfi1rmation may he obtained from the firsttoken.
`An identifier and encryption key may he determined from the
`information obtained from the first token. The encrypted first
`data may he accessed using the identifier obtained from the
`30 first token and decrypted using the encryption key obtained
`from the first token to produce decrypted first data. Access to
`the decrypted first data may he enabled.
`According to an embodiment of the present invention,
`different versions of the shared data may he stored and
`35 accessed. In one embodiment, a first record may be stored
`having first metadata associated with it. A first identifier may
`be generated. wherein the first record is accessible using the
`first identifier. An encryption key may be generated, wherein
`the encryption key is usable for encrypting data to be shared.
`40 A set of one or more tokens may be generated, each token in
`the set comprising the first identifier and the encryption key,
`where-in a token frum the sel of tokens enables slllring data
`such that the stored data is accessible using any token from
`the set of tokens.
`A token may then be used to stor-: versions of data to be
`shared. In one embodiment, a first identifier and the encryp(cid:173)
`Lion key is obtained from a Loken from the scl of tokens.
`Information is received idcnti1ying 1irsldata to be shar.xl. TI1e
`first tllltll is encrypted using the encryption key lo produce
`encrypted 1irsl daw. 111c encrypted Jirst data is stor-:d in a
`second record, wherein second mcladata is associaLed ,vith
`the second record. A second identifier is generated wherein
`the second record is accessible using the second identifier.
`The second identifier is stored in the first metadata associated
`55 with the first record. 'l he second mctadata may be encrypted
`using the encryption key obtained from the token.
`·1 ·he shared data may then he accessed using a token. In one
`embodiment, a first identifierand encryption key are obtained
`from a token in the set of tokens. ")he first record is accessed
`60 using the first identifier. 'Jhe second identifier is determined
`from the first metadata associated with the first record. The
`second record is accessed using the second identifier. 'Jhe
`encrypted first data in the second record is decrypted using the
`encryption key to produce decrypted first data. Access to the
`decrypted first data is enabled.
`A token may also be used to store another version of data to
`be shared. In one embodiment, the first identifier and the
`
`'Jhe present invention relates to data sharing, and more
`particularly to techniques for slmring data between multiple
`users in an anonymous and simple manner.
`']here are times when it is convenient for two people to
`arrange a future, secure (and pcrh,1ps anonymous) cxd1angc
`of data. Several conventional techniques may be used fi1r data 10
`exchange such as storing the data on a portable memory
`medium ( e.g., a CD, a memory stick) and sending the memory
`medium to one or more people using mail, attaching an
`encrypted data file to an email and communicating the email
`to the intended recipients.uploading secure data to an ftp site. 15
`to name a few. 1 lowever, each of the existing techniques is
`deficient in one way or another. Either it is not anonymous,
`requires a non-trivial exchange of detailed infonuation, or
`requires some setup effort in advance of the exchange.
`In light of the above, simplified techniques are desired that 20
`enable cxch,mgc of data bet wc'Cn users wh-:rcin the m1onym-
`ity of the users is maintained.
`
`13R1El SUMMARY OF TUE INVENTION
`
`I •:mbodiments of the present invention provide techniques
`fi1r sharing data between users in a manner that maintains
`anonymity of the users.· I i1kens are generated and provided to
`users fi1r sharing data. A token comprises information encod(cid:173)
`ing an identifier and an encryption key. A user may use a token
`to upload data that is to he shared. The data to he shared is
`encrypted using the encryption key associated with the token
`and the encrypted data is stored such that it can be accessed
`using the identifier associated ,vith the token. A user may then
`use a token to access the shared data. The identifier associated
`with the token being used to access the shared data is used to
`access the data and the encryption key associated with the
`token is used to decrypt the data. Data is shared anonymously
`without revealing the identity of the users using the tokens.
`According to an embodiment of the present invention,
`teclmiques are provided for sharing data. In one embodiment,
`an idcnti1icr is generated, whcr-:in the idcnti1icr is usable lo
`access data to be shared. An encryption key is generated that
`can be used for encrypting data to be shared. A set of one or
`mor-: Lokcns is genera Led, each token in the sci comprising the 45
`identifier and the encryption key, wherein a token from the set
`oftokens enables storing dala such thlll the dala is accessible
`using any token from the set oJt.okcns. In one embodiment, as
`part of genernt.ing the idcmificr, a storage location nrny be
`determined for storing the dll La to be shared and the idcnti1icr 50
`nrny be genernt.x.1 bas.xi upon the storage location. In one
`embodiment, a machine-readable-code may be generated
`encoding the idcnli1ier and the encryption key and the
`machine-readable code is associated with each token in the
`set of tokens.
`A token from the generated set may then he used to upload
`information to he shared. In one embodiment, an identifier
`and encryption key from a first token in the set of tokens.
`Information may also he received identifying first data to be
`shared. ·t11e first data is encrypted using the encryption key
`obtained from the first token to produce encrypted first data
`and the first encrypted data is stored such that the encrypted
`first data is accessible using the identifier.
`A token from the set of tokens may also he used to access
`the shared data. In one embodiment, an identifier and encryp- 65
`tion key is obtained from a token in the set of tokens that is
`presented for accessing the shared data. The encrypted first
`
`
`
`US 8,756,673 B2
`
`3
`encryption key are obtained from a token used for uploading
`the d.:1(a to be shanxl. In..limmLion is received idcntilying
`second data. TI1c second data is cncrypLcd using Lhc encryp(cid:173)
`tion key to produce encrypted second data. ·1he encrypted
`second data is sLonxl in a third record, wherein thirdmctadata
`is associated with Lhc Lhird record. A third idcntilicr is gener(cid:173)
`ated wherein the third record is accessible using the third
`idcnLilicr. TI1c third idcntilicr is stored in tk second meta da