`US007243236B 1
`
`c12) United States Patent
`Sibert
`
`(IO) Patent No.:
`(45) Date of Patent:
`
`US 7,243,236 Bl
`Jul. 10, 2007
`
`(54) SYSTEMS AND METHODS FOR USING
`CRYPTOGRAPHY TO PROTECT SECURE
`AND INSECURE COMPUTING
`ENVIRONMENTS
`
`(75)
`
`Inventor: W. Olin Sibert, Lexington, MA (US)
`
`(73) Assignee: Intertrust Technologies Corp.,
`Sunnyvale, CA (US)
`
`( *) Notice:
`
`Subject to any disclaimer, the term of this
`patent is extended or adjusted under 35
`U.S.C. 154(b) by 544 days.
`
`OTHER PUBLICATIONS
`
`Shimshon Berkovits, et al., Authentication of Mobile Agents,
`Mobile Agents and Security, Springer-Verlag, Giovanni Vigna, Ed.,
`1998, pp. 114-136.
`
`(Continued)
`
`Primary Examiner-Nasser Moazzami
`Assistant Examiner----Carl Colin
`(74) Attorney, Agent, or Firm-Finnegan, Henderson,
`Farabow, Garrett & Dunner LLP
`
`(21) Appl. No.: 09/628,692
`
`(22) Filed:
`
`Jul. 28, 2000
`
`Related U.S. Application Data
`
`(60) Provisional application No. 60/146,426, filed on Jul.
`29, 1999.
`
`(51)
`
`Int. Cl.
`H04L 9/00
`(2006.01)
`(52) U.S. Cl. ...................... 713/179; 713/168; 713/169;
`726/2; 380/255; 702/35
`( 58) Field of Classification Search ... ... ... ... .. .. 719/331;
`713/201, 179; 62/259.2; 324/760
`See application file for complete search history.
`
`(56)
`
`References Cited
`
`U.S. PATENT DOCUMENTS
`3,573,747 A
`4/1971 Adams et al.
`3,609,697 A
`9/1971 Blevins
`3,796,830 A
`3/1974 Smith
`3,798,359 A
`3/1974 Feistel
`3,798,360 A
`3/1974 Feistel
`3,798,605 A
`3/1974 Feistel
`3,806,882 A
`4/1974 Clarke
`(Continued)
`
`AU
`
`FOREIGN PATENT DOCUMENTS
`A-36815/97
`2/1998
`(Continued)
`
`(57)
`
`ABSTRACT
`
`Computation environments are protected from bogus or
`rogue load modules, executables, and other data elements
`through use of digital signatures, seals, and certificates
`issued by a verifying authority. A verifying authority(cid:173)
`which may be a trusted independent third party-tests the
`load modules and/or other items to verify that their corre(cid:173)
`sponding specifications are accurate and complete, and then
`digitally signs them based on a tamper resistance work
`factor classification. Secure computation environments with
`different tamper resistance work factors use different digital
`signature authentication techniques ( e.g., different signature
`algorithms and/or signature verification keys), allowing one
`tamper resistance work factor environment to protect itself
`against load modules from another tamper resistance work
`factor environment. The verifying authority can provide an
`application intended for insecure environments with a cre(cid:173)
`dential having multiple elements covering different parts of
`the application. To verify the application, a trusted element
`can issue challenges based on different parts of the authen(cid:173)
`ticated credential that the trusted element selects in an
`unpredictable (e.g., random) way, and deny service (or take
`other appropriate action) if the responses do not match the
`authenticated credential.
`
`27 Claims, 28 Drawing Sheets
`
`EXAMPLE CREDENTIAL VALIDATION
`
`Page 1 of 50
`
`GOOGLE EXHIBIT 1015
`
`
`
`U.S. PATENT DOCUMENTS
`
`3,829,833 A
`3,906,448 A
`3,911,397 A
`3,924,065 A
`3,931,504 A
`3,946,220 A
`3,956,615 A
`3,958,081 A
`3,970,992 A
`4,048,619 A
`4,071,911 A
`4,112,421 A
`4,120,030 A
`4,163,280 A
`4,168,396 A
`4,196,310 A
`4,200,913 A
`4,209,787 A
`4,217,588 A
`4,220,991 A
`4,232,193 A
`4,232,317 A
`4,236,217 A
`4,253,157 A
`4,262,329 A
`4,265,371 A
`4,270,182 A
`4,278,837 A
`4,305,131 A
`4,306,289 A
`4,309,569 A
`4,319,079 A
`4,323,921 A
`4,328,544 A
`4,337,483 A
`4,361,877 A
`4,375,579 A
`4,433,207 A
`4,434,464 A
`4,442,486 A
`4,446,519 A
`4,454,594 A
`4,458,315 A
`4,462,076 A
`4,462,078 A
`4,465,901 A
`4,471,163 A
`4,484,217 A
`4,494,156 A
`4,513,174 A
`4,528,588 A
`4,528,643 A
`4,553,252 A
`4,558,176 A
`4,558,413 A
`4,562,306 A
`4,562,495 A
`4,577,289 A
`4,584,641 A
`4,588,991 A
`4,589,064 A
`4,593,353 A
`4,593,376 A
`4,595,950 A
`4,597,058 A
`4,634,807 A
`4,644,493 A
`4,646,234 A
`4,652,990 A
`4,658,093 A
`4,670,857 A
`
`8/1974 Freeny, Jr.
`9/1975 Henriques
`10/1975 Freeny, Jr.
`12/1975 Freeny, Jr.
`1/1976 Jacoby
`3/1976 Brobeck et al.
`5/1976 Anderson et al.
`5/1976 Ehrsam et al.
`7/1976 Boothroyd et al.
`9/1977 Forman et al.
`1/1978 Mazur
`9/1978 Freeny, Jr.
`10/1978 Johnstone
`7/1979 Mori et al.
`9/1979 Best
`4/1980 Forman et al.
`4/1980 Kuhar et al.
`6/1980 Freeny, Jr.
`8/1980 Freeny, Jr.
`9/1980 Hamano et al.
`11/1980 Gerard
`11/1980 Freeny, Jr.
`11/1980 Kennedy
`2/1981 Kirschner et al.
`4/1981 Bright et al.
`5/1981 Desai et al.
`5/1981 Asija
`7/1981 Best
`12/1981 Best
`12/1981 Lumley
`1/1982 Merkle
`3/1982 Best
`4/1982 Guillou
`5/1982 Baldwin et al.
`6/1982 Guillou
`11/1982 Dyer et al.
`3/1983 Davida et al.
`2/1984 Best
`2/1984 Suzuki et al.
`4/1984 Mayer
`5/1984 Thomas
`6/1984 Heffron et al.
`7/1984 Uchenick
`7/1984 Smith, III
`7/1984 Ross
`8/1984 Best
`9/1984 Donald et al.
`11/1984 Block et al.
`1/1985 Kadison et al.
`4/1985 Herman
`7/1985 Liifberg
`7/1985 Freeny, Jr.
`11/1985 Egendorf
`12/1985 Arnold et al.
`12/1985 Schmidt et al.
`12/1985 Chou et al.
`12/1985 Bond et al.
`3/1986 Comerford et al.
`4/1986 Guglielmino
`5/1986 Atalla
`5/1986 Chiba et al.
`6/1986 Pickholtz
`6/1986 Volk
`6/1986 Liifberg
`6/1986 Izumi et al.
`1/1987 Chorley et al.
`2/1987 Chandra et al.
`2/1987 Tolman et al.
`3/1987 Pailen et al.
`4/1987 Hellman
`6/1987 Rackman
`
`US 7,243,236 Bl
`Page 2
`
`4,672,572 A
`4,677,434 A
`4,680,731 A
`4,683,553 A
`4,685,056 A
`4,688,169 A
`4,691,350 A
`4,696,034 A
`4,701,846 A
`4,712,238 A
`4,713,753 A
`4,740,890 A
`4,747,139 A
`4,757,533 A
`4,757,534 A
`4,768,087 A
`4,791,565 A
`4,796,181 A
`4,799,156 A
`4,807,288 A
`4,817,140 A
`4,823,264 A
`4,827,508 A
`4,858,121 A
`4,864,494 A
`4,868,877 A
`4,903,296 A
`4,924,378 A
`4,930,073 A
`4,949,187 A
`4,977,594 A
`4,999,806 A
`5,001,752 A
`5,005,122 A
`5,005,200 A
`5,010,571 A
`5,023,907 A
`5,047,928 A
`5,048,085 A
`5,050,213 A
`5,091,966 A
`5,103,392 A
`5,103,476 A
`5,111,390 A
`5,119,493 A
`5,128,525 A
`5,136,643 A
`5,136,646 A
`5,136,647 A
`5,136,716 A
`5,146,575 A
`5,148,481 A
`5,155,680 A
`5,163,091 A
`5,168,147 A
`5,185,717 A
`5,187,787 A
`5,201,046 A
`5,201,047 A
`5,208,748 A
`5,214,702 A
`5,216,603 A
`5,221,833 A
`5,222,134 A
`5,224,160 A
`5,224,163 A
`5,235,642 A
`5,245,165 A
`5,247,575 A
`5,257,369 A
`5,260,999 A
`5,263,158 A
`5,265,164 A
`
`6/1987 Alsberg
`6/1987 Fascenda
`7/1987 Izumi et al.
`7/1987 Mollier
`8/1987 Barnsdale et al.
`8/1987 Joshi
`9/1987 Kleijne et al.
`9/1987 Wiedemer
`10/1987 Ikeda et al.
`12/1987 Gilhousen et al.
`12/1987 Boebert et al.
`4/1988 William
`5/1988 Taaffe
`7/1988 Allen et al.
`7/1988 Matyas et al.
`8/1988 Taub et al.
`12/1988 Dunham et al.
`1/1989 Wiedemer
`1/1989 Shavit et al.
`2/1989 Ugon et al.
`3/1989 Chandra et al.
`4/1989 Deming
`5/1989 Shear
`8/1989 Barber et al.
`9/1989 Kobus
`9/1989 Fischer
`2/1990 Chandra et al.
`5/1990 Hershey et al.
`5/1990 Cina, Jr.
`8/1990 Cohen
`12/1990 Shear
`3/1991 Chernow et al.
`3/1991 Fischer
`4/1991 Griffin et al.
`4/1991 Fischer
`4/1991 Katznelson
`6/1991 Johnson et al.
`9/1991 Wiedemer
`9/1991 Abraham et al.
`9/1991 Shear
`2/1992 Bloomberg et al.
`4/1992 Mori
`4/1992 Waite et al.
`5/1992 Ketcham
`6/1992 Janis et al.
`7/1992 Stearns et al.
`8/1992 Fischer
`8/1992 Haber et al.
`8/1992 Haber et al.
`8/1992 Harvey et al.
`9/1992 Nolan, Jr.
`9/1992 Abraham et al.
`10/1992 Wiedemer
`11/1992 Graziano
`12/1992 Bloomberg
`2/1993 Mori
`2/1993 Skeen et al.
`4/1993 Goldberg et al.
`4/1993 Maki et al.
`5/1993 Flores et al.
`5/1993 Fischer
`6/1993 Flores et al.
`6/1993 Hecht
`6/1993 Waite et al.
`6/1993 Paulini et al.
`6/1993 Gasser et al.
`8/1993 Wobber et al.
`9/1993 Zhang
`9/1993 Sprague et al.
`10/1993 Skeen et al.
`11/1993 Wyman
`11/1993 Janis
`11/1993 Matyas et al.
`
`Page 2 of 50
`
`
`
`US 7,243,236 Bl
`Page 3
`
`5,276,735 A
`5,280,479 A
`5,285,494 A
`5,301,231 A
`5,311,591 A
`5,319,705 A
`5,337,360 A
`5,341,429 A
`5,343,527 A
`5,347,579 A
`5,351,293 A
`5,355,474 A
`5,373,561 A
`5,388,211 A
`5,390,247 A
`5,390,330 A
`5,392,220 A
`5,392,390 A
`5,394,469 A
`5,410,598 A
`5,412,717 A
`5,421,006 A
`5,422,953 A
`5,428,606 A
`5,432,950 A
`5,438,508 A
`5,442,645 A
`5,444,779 A
`5,449,895 A
`5,449,896 A
`5,450,493 A
`5,453,601 A
`5,453,605 A
`5,455,407 A
`5,455,861 A
`5,455,953 A
`5,457,746 A
`5,463,565 A
`5,473,687 A
`5,473,692 A
`5,479,509 A
`5,485,622 A
`5,491,800 A
`5,497,479 A
`5,497,491 A
`5,499,298 A
`5,504,757 A
`5,504,818 A
`5,504,837 A
`5,508,913 A
`5,509,070 A
`5,513,261 A
`5,517,518 A
`5,530,235 A
`5,530,752 A
`5,533,123 A
`5,534,975 A
`5,537,526 A
`5,539,735 A
`5,539,828 A
`5,550,971 A
`5,553,282 A
`5,557,518 A
`5,557,798 A
`5,563,946 A
`5,568,552 A
`5,572,673 A
`5,592,549 A
`5,603,031 A
`5,606,609 A
`5,613,004 A
`5,621,797 A
`5,629,980 A
`
`1/1994 Boebert et al.
`1/1994 Mary
`2/1994 Sprecher et al.
`4/1994 Abraham et al.
`5/1994 Fischer
`6/1994 Halter et al.
`8/1994 Fischer
`8/1994 Stringer et al.
`8/1994 Moore
`9/1994 Blandford
`9/1994 Michener et al.
`10/1994 Thurasingham et al.
`12/1994 Haber et al.
`2/1995 Hornbuckle
`2/1995 Fischer
`2/1995 Talati
`2/1995 Van den Hamer et al.
`2/1995 Crozier
`2/1995 Nagel et al.
`4/1995 Shear
`5/1995 Fischer
`5/1995 Jablon
`6/1995 Fischer
`6/1995 Moskowitz
`7/1995 Sibigtroth
`8/1995 Wyman
`8/1995 Ugon
`8/1995 Daniele
`9/1995 Hecht et al.
`9/1995 Hecht et al.
`9/1995 Maher
`9/1995 Rosen
`9/1995 Hecht et al.
`10/1995 Rosen
`10/1995 Faucher et al.
`10/1995 Russell
`10/1995 Dolphin
`10/1995 Cookson et al.
`12/1995 Lipscomb et al.
`12/1995 Davis
`12/1995 Ugon
`1/1996 Yamaki
`2/1996 Goldsmith et al.
`3/1996 Hornbuckle
`3/1996 Mitchell et al.
`3/1996 N arasirnhalu et al.
`4/1996 Cook et al.
`4/1996 Okano
`4/1996 Griffeth et al.
`4/1996 Yamamoto et al.
`4/1996 Schull
`4/1996 Maher
`5/1996 Morson et al.
`6/1996 Stefik et al.
`6/1996 Rubin
`7/1996 Force et al.
`7/1996 Stefik et al.
`7/1996 Anderson et al.
`7/1996 Moskowitz
`7/1996 Davis
`8/1996 Brunner et al.
`9/1996 Parrish et al.
`9/1996 Rosen
`9/1996 Skeen et al.
`10/1996 Cooper et al.
`10/1996 Davis
`11/1996 Shurts
`1/1997 Nagel et al.
`2/1997 White et al.
`2/1997 Houser et al.
`3/1997 Cooperman et al.
`4/1997 Rosen
`5/1997 Stefik et al.
`
`........... 713/200
`
`5/1997 Davis et al.
`5,633,932 A
`5/1997 Stefik et al.
`5,634,012 A
`6/1997 Brugger
`5,636,276 A
`6/1997 Rhoads
`5,636,292 A
`6/1997 Stefik et al.
`5,638,443 A
`6/1997 Scott et al.
`5,638,504 A
`6/1997 Gopinath et al.
`5,640,546 A
`8/1997 Jones et al.
`5,655,077 A
`11/1997 Moskowitz et al.
`5,687,236 A
`11/1997 Bender et al.
`5,689,587 A
`11/1997 Mc Manis
`5,692,047 A
`11/1997 Lee
`5,692,180 A
`1/1998 Rhoads
`5,710,834 A
`2/1998 Stefik
`5,715,403 A
`2/1998 Dedrick
`5,717,923 A
`3/1998 Chang et al.
`5,724,425 A
`4/1998 Reilly et al.
`5,740,549 A
`4/1998 Moskowitz et al.
`5,745,569 A
`4/1998 Rhoads
`5,745,604 A
`5,745,678 A * 4/1998 Herzberg et al.
`5,748,763 A
`5/1998 Rhoads
`5,748,783 A
`5/1998 Rhoads
`5,748,960 A
`5/1998 Fischer
`5/1998 Dyer et al.
`5,754,849 A
`5,757,914 A
`5/1998 Mc Manis
`5,758,152 A
`5/1998 LeTourneau
`5,765,152 A
`6/1998 Erickson
`5,768,426 A
`6/1998 Rhoads
`10/1998 Bromley et al.
`5,819,263 A
`5,842,173 A
`11/1998 Strum et al.
`5,892,900 A
`4/1999 Ginter et al.
`5,896,454 A
`4/1999 Cookson et al.
`5,910,987 A
`6/1999 Ginter et al.
`5,915,019 A
`6/1999 Ginter et al.
`5,917,912 A
`6/1999 Ginter et al.
`5,920,861 A
`7/1999 Hall et al.
`5,940,504 A
`8/1999 Griswold
`5,940,505 A
`8/1999 Kanamaru
`5,943,422 A
`8/1999 Van Wie et al.
`5,949,876 A
`9/1999 Ginter et al.
`5,970,145 A * 10/1999 McManis .................... 713/187
`5,982,891 A
`11/1999 Ginter et al.
`5,991,399 A * 11/1999 Graunke et al . ............ 380/279
`5,999,949 A
`12/1999 Crandall
`12/1999 Sako et al.
`6,009,170 A
`6,009,543 A * 12/1999 Shavit ........................ 712/200
`6,016,393 A
`1/2000 White et al.
`6,047,242 A * 4/2000 Benson ........................ 702/35
`6,112,181 A
`8/2000 Shear et al.
`6,138,119 A
`10/2000 Hall et al.
`6,148,083 A * 11/2000 Fieres et al. ................ 380/255
`6,157,721 A
`12/2000 Shear et al.
`6,185,683 Bl
`2/2001 Ginter et al.
`6,237,786 Bl
`5/2001 Ginter et al.
`6,240,185 Bl
`5/2001 Van Wie et al.
`6,253,193 Bl
`6/2001 Ginter et al.
`6,292,569 Bl
`9/2001 Shear et al.
`6,820,200 B2 * 11/2004 Takeuchi et al . ............ 713/179
`
`FOREIGN PATENT DOCUMENTS
`
`AU
`AU
`BE
`DE
`EP
`EP
`EP
`EP
`EP
`EP
`EP
`EP
`
`A-36816/97
`A-36840/97
`9 004 79
`3803982 Al
`0128672 Al
`0 084 441 Al
`0 135 422 Al
`0 180 460 Al
`0 370 146 Al
`0 398 645 Bl
`0399822 A2
`0421409 A2
`
`2/1998
`2/1998
`12/1984
`1/1990
`12/1980
`7 /1983
`3/1985
`5/1986
`5/1990
`11/1990
`11/1990
`4/1991
`
`Page 3 of 50
`
`
`
`EP
`EP
`EP
`EP
`EP
`EP
`EP
`EP
`EP
`EP
`EP
`EP
`EP
`EP
`EP
`EP
`EP
`EP
`EP
`EP
`EP
`EP
`GB
`GB
`GB
`GB
`JP
`JP
`JP
`JP
`JP
`JP
`JP
`JP
`JP
`JP
`JP
`JP
`JP
`JP
`JP
`JP
`JP
`JP
`JP
`JP
`JP
`JP
`JP
`JP
`JP
`WO
`WO
`WO
`WO
`WO
`WO
`WO
`WO
`WO
`WO
`WO
`WO
`WO
`WO
`WO
`WO
`WO
`WO
`WO
`WO
`WO
`WO
`
`0 456 386 A2
`0 469 864 A2
`0565314 Bl
`0 570 123 Bl
`0 593 305 A2
`0 651 554 Al
`0 668 695 A2
`0 695 985 Al
`0 696 798 Al
`0 714 204 A2
`0 715 243 Al
`0 715 244 Al
`0 715 245 Al
`0 715 246 Al
`0 715 247 Al
`0 749 081 Al
`0 725 376 A2
`0 763 936 A2
`0 778 513 A2
`0 795 873 A2
`0 800 312 Al
`0 913 757 A2
`2 136 175 A
`2264796 A
`2 294 348 A
`2 295 947 A
`57-000726
`62-225059
`62-241061
`01-068835
`64-068835
`02-242352
`02-247763
`02-294855
`04-369068
`05-181734
`05-257783
`05-268415
`06-175794
`06-215010
`06-225059
`07-056794
`07-084852
`07-141138
`07-200317
`07-200492
`07-244639
`08-137795
`08-152990
`08-185292
`08-185298
`WO 85/02310
`WO 85/03584
`WO 90/02382
`WO 92/06438
`WO 92/22870
`WO 93/01550
`WO 94/01821
`WO 94/03859
`WO 94/06103
`WO 94/16395
`WO 94/18620
`WO 94/22266
`WO 94/27406
`WO 95/14289
`WO 96/00963
`WO 96/03835
`WO 96/05698
`WO 96/06503
`WO 96/13013
`WO 96/21192
`WO 96/24092
`WO 96/27155
`
`11/1991
`2/1992
`10/1993
`11/1993
`4/1994
`5/1995
`8/1995
`2/1996
`2/1996
`5/1996
`6/1996
`6/1996
`6/1996
`6/1996
`6/1996
`6/1996
`8/1996
`9/1996
`6/1997
`9/1997
`10/1997
`5/1999
`9/1984
`9/1993
`4/1996
`6/1996
`1/1982
`10/1987
`10/1987
`3/1989
`3/1989
`9/1990
`10/1990
`12/1990
`12/1992
`7 /1993
`10/1993
`10/1993
`6/1994
`8/1994
`8/1994
`3/1995
`3/1995
`6/1995
`8/1995
`8/1995
`9/1995
`5/1996
`6/1996
`7 /1996
`7 /1996
`5/1985
`8/1985
`3/1990
`4/1992
`12/1992
`1/1993
`1/1994
`2/1994
`3/1994
`7 /1994
`8/1994
`9/1994
`11/1994
`5/1995
`1/1996
`2/1996
`2/1996
`2/1996
`5/1996
`7 /1996
`8/1996
`9/1996
`
`US 7,243,236 Bl
`Page 4
`
`WO
`WO
`WO
`WO
`WO
`WO
`WO
`WO
`WO
`WO
`WO
`WO
`WO
`
`WO 97/03423
`WO 97/07656
`WO 97/25816
`WO 97/32251
`WO 97/43761
`WO 97/48203
`WO 98/09209
`WO 98/10381
`WO 98/37481
`WO 98/45768
`WO 99/01815
`WO 99/24928
`WO 99/48296
`
`1/1997
`3/1997
`7 /1997
`9/1997
`11/1997
`12/1997
`3/1998
`3/1998
`8/1998
`10/1998
`1/1999
`5/1999
`9/1999
`
`OTHER PUBLICATIONS
`
`M. Blaze, et al., Decentralized Trust Management, Proc. IEEE
`Conference on Security and Privacy, 1996, pp. 164-173.
`David Chess, Security Issues in Mobile Code Systems, Mobile
`Agents and Security, Springer-Verlag, Giovanni Vigna, Ed., 1998,
`pp. 1-14.
`C. Ellison, et al., SPKI Certificate Theory, Internet Engineering
`Task Force (IETF) RFC 2693 -Sep. 1999, pp. 1-38, available at
`http://www.ietf.org/rfc/rfc2693 .txt?nurnbeF2693.
`Fritz Hohl, Time Limited Blackbox Security: Protecting Mobile
`Agents from Malicious Hosts, Lecture Notes in Computer Science,
`vol. 1419: Mobile Agents and Security, Springer-Verlag, 1998, G.
`Vigna, Ed., pp. 90-111.
`Li Gong, et al., Signing, Sealing and Guarding Java Objects,
`Mobile Agents and Security, G. Vigna, editor, Springer-Verlag,
`1998, vol. 1419 of LNCS, pp. 206-216.
`Tomas Sander et al., Towards Mobile Cryptography, IEEE Proceed(cid:173)
`ings of Security and Privacy, 1998, pp. 1-10.
`Tomas Sander et al., Protecting Mobile Agents Against Malicious
`Hosts, Mobile Agents and Security: Lecture Notes in Computer
`Science, Springer-Verlag, G. Vigna, Ed., vol. 1419, 1998, pp. 1-16.
`Steve R. White, ABYSS: A Trusted Architecture for Software Pro(cid:173)
`tection, IBM Thomas J. Watson Research Center, Yorktown
`Heights, New York 10598, 1987, pp. 38-51.
`"Microsoft Authenticode Technology", Microsoft Corporation, Oct.
`1996.
`Abadi, M. et al., "Authentication and Delegation with Smart-cards,"
`Technical Report 67, DEC Systems Research Center, available as of
`Oct.
`1990
`at
`<http://citeseer.nj.nec.com/article/
`abadi92authentication.html>, pp. 1-22.
`Ameke, D. et al., "AT&T Encryption System Protects Information
`Services," Jan. 9, 1995, 1 page.
`Baggett, D., "Cable's Emerging Role in the Information Superhigh(cid:173)
`way," Cable Labs, undated, 13 slides.
`Barassi, T.S., "The Cybernotary: Public Key Registration and
`Certification and Authentication of International Legal Transac(cid:173)
`tions," undated, prior to 1997, 4 pages.
`Barnes, H., memo to H. LaMuth, subject: George Gilder articles,
`May 31, 1994, 2 pages.
`Bart, D., "Comments in the Matter of Public Hearing and Request
`for Comments on the International Aspects of the National Infor(cid:173)
`mation Infrastructure," Aug. 12, 1994, 17 pages.
`Baum, M., "Worldwide Electronic Commerce: Law, Policy and
`Controls Conference," Nov. 11, 1993, 18 pages.
`Best, R.M., "Preventing Software Piracy With Crypto-Micropro(cid:173)
`cessors," Digest of Papers, VLSI: New Architectural Horizons, Feb.
`1980, pp. 466-469.
`Bisbey II, R.L. et al., "Encapsulation: An Approach to Operating
`System Security," USC/Information Science Institute, Marina Del
`Rey, CA, Oct. 1973, pp. 666-675.
`Blaze, M., "A Cryptographic File System for Unix," pre-print of
`paper for First ACM Conference on Computer and Communications
`Security, Fairfax, Virginia, Nov. 3-5, 1993, 8 pages.
`Blaze, M., "Key Management in an Encrypting File System,"
`available as of Aug. 23, 2002 at <http://www.usenix.org/
`publicaitons/libratry/proceedings/bos94/full_papers/blaze.asp>,
`pp. 1-12.
`
`Page 4 of 50
`
`
`
`US 7,243,236 Bl
`Page 5
`
`Blom, R. et al., "Encryption Methods in Data Networks," Ericsson
`Technics, No. 2, Stockholm, Sweden, 1978, pp. 72-105.
`Bruner, R.E., "Power Agent, NetBot Help Advertisers Reach
`Internet Shoppers," visited on Aug. 13, 1997, 2 pages.
`Caruso, D., "Technology, Digital Commerce: 2 Plans for Water(cid:173)
`marks, Which Can Bind Proof of Authorship to Electronic Works,"
`N.Y. Times, Aug. 7, 1995, p. D5.
`Castano, S. et al., Database Security, Addison-Wesley &Acm Press,
`1995.
`Champine, G., MIT Project Athena: A Model for Distributed Cam(cid:173)
`pus Computing, Digital Equipment Corporation, 1991.
`Chaum, D., "Achieving Electronic Privacy," Scientific American,
`Aug. 1992, pp. 96-101.
`Chaum, D., et al. "Wallet databases with observers," Ernest F.
`Brickell, editor, Advances in Cryptology -CRY.PTO '92, 12th
`Annual International Cryptology Conference, Santa Barbara, CA,
`Aug. 16-20, 1992, Proceedings, pp. 89-105.
`Chaum, D., "Security Without Identification Card Computers to
`Make Big Brother Obsolete," available at <http://www.chaum.com/
`articles/Security_ Without_Identification.htrn, visited on Aug. 23,
`2002, 24 pages.
`"List of Articles," <http://www.chaum.com/articles/list-of-articles.
`htrn>, visited on Aug. 23, 2002, 4 pages.
`Choudhury, A.K., et al., "Copyright Protection for Electronic Pub(cid:173)
`lishing Over Computer Networks," AT&T Bell Laboratories, Mur(cid:173)
`ray Hill, NJ, Jun. 1994, 18 pages.
`Clark, T., "Ad Service Gives Cash Back," <http://www.news.com/
`News/Item/0,4,13050,00.htrnl>, visited Aug. 13, 1997, 2 pages.
`Cohen, F.B., "Operating System Protection Through Program Evo(cid:173)
`lution," 8246 Computers & Security, No. 6, (Oxford, Great Britain)
`Oct. 1993, available at <http://all.net/books/IP/evolve.htrnl, visited
`on May 31, 2002, 22 pages.
`Cox, B., "What If There is a Silver Bullet and the competition gets
`it first?" Journal of Object-Oriented Progranuning, Jun. 1992,
`available
`at
`<http://www.virtualschool.edu/cox/
`CoxWhatifSilverBullet.html>, pp.1-5, visited on Aug. 23, 2002.
`Cunningham, D., et al., "AT&T, VLSI Technology Join To Improve
`Info Highway Security,"(News Release) Jan. 31, 1995, 3 pages.
`CUPID Protocols and Services (Version 1 ): "An Architectural
`Overview,"Nov. 1992, available at <http://www.cni.org/projects/
`CUPID>, 25 pages.
`Custer, H. Inside Windows NT, Microsoft Press, Redmond WA,
`1993.
`Davies, D. et al., Security for Computer Networks, John Wiley &
`Sons, 1989.
`Dempsey L .. , "The Warwick Metadata Workshop: A Framework for
`the Deployment of Resource Description," D-Lib Magazine, Jul./
`Aug. 1996, 8 pages.
`Denning, D.E., Cryptography and Data Security, Addison-Wesley,
`Reading MA. 1983.
`Denning, D.E. et al., Data Security, 11 Computing Surveys No. 3,
`Sep. 1979, pp. 227-249.
`Denning, D.E., "Secure Personal Computing in an Insecure Net(cid:173)
`work," Communications of the ACM, Aug. 1979, vol. 22, No. 8, pp.
`476-482.
`Diffie, W. et al., "New Directions in Cryptography," IEEE Trans(cid:173)
`actions on Information Theory, vol. 22, No. 6, Nov. 1976, pp.
`644-651.
`Diffie, W. et al., "Privacy and Authentication: An Introduction to
`Cryptography," Proceedings of the IEEE, vol. 67, No. 3, Mar. 1979,
`pp. 397-427.
`Dusse, S.R. et al., "A Cryptographic Library for the Motorola DSP
`56000," Advances in Cryptology-Proceedings of Eurocrypt 90,
`(I.M. Damgard, ed., Springer-Verlag) 1991, pp. 230-244.
`Dyson, E., "Intellectual Value," WIRED Magazine, Jul. 1995, pp.
`136-141 and 182-184.
`Garcia, D.L., "Before a Hearing on Science, Space and Technol(cid:173)
`ogy," Subcommittee on Technology, Environment, and Aviation,
`May 26, 1994, pp. 97-108.
`Gleick, J., "Dead as a Dollar," The New York Times Magazine, Jun.
`16, 1996, Sect. 6, pp. 26-30, 35, 42, 50, 54.
`Greguras, F., "Softic Symposium '95, Copyright Clearances and
`Moral Rights, "Dec. 11, 1995, 3 pages.
`
`Guillou, L.C., "Smart Cards and Conditional Access," Advances in
`Cryptography-Proceedings of EuroCrypt 84 (T. Beth et al, ed.,
`Springer-Verlag, 1985) 10 pages.
`Haar, S.V., "PowerAgent Launches Commercial Service," Interac(cid:173)
`tive Week, Aug. 4, 1997, 1 page.
`Harman, H., Modern Factor Analysis, Third Edition Revised,
`University of Chicago Press, Chicago and London, 1976, table of
`contents, 5 pages.
`Hearst, M.A., "Interfaces for Searching The Web," Scientific Ameri(cid:173)
`can, Mar. 1997, pp. 68-72.
`Herzberg, A. et al., "Public Protection of Software," ACM Trans(cid:173)
`actions on Computer Systems, vol. 5, No. 4, Nov. 1987, pp.
`371-393.
`Hofmann, J., "Interfacing the NII to User Homes," Consumer
`Electronic Bus. Committee Presentation, NIST, Jul. 1994, 14 slides,
`missing slide 14.
`Holt, S., "Start-Up Promises User Confidentiality in Web Marketing
`Service," InfoWorld Electric News, viewed Aug. 13, 1997, 2 pages.
`Ioannidis, J., et al. "The Architecture and Implementation of Net(cid:173)
`work-Layer Security Under Unix," Fourth USENIX Security Sym(cid:173)
`posium Proceedings (Oct.), USENIX, Berkeley, Calif. 1993, 11
`pages.
`Jiang, J.J. et al., "A Concept-based Approach to Retrieval from an
`Electronic Industrial Directory," International Journal of Electronic
`Commerce, vol. 1, No. 1 (Fall 1996) pp. 51-72.
`Jones, D., "Top Tech Stories, PowerAgent Introduces First Internet
`'Informediary' to Empower and Protect Consumers," viewed Aug.
`13, 1997, 3 pages.
`Kelly, K., "E-Money," Whole Earth Review, Sununer 1993, pp.
`40-59.
`Kent, S. T., Protecting Externally Supplied Software in Small
`Computers, Sep. 1980, 254 pages.
`Kohl, J. et al., "The Kerberos Network Authentication Service
`(V5)," Network Working Group Request for Comments RFC-1510,
`Sep. 1993, pp. 1-104.
`Kohl, U, et al., "Safeguarding Digital Library Contents and Users
`Protecting Documents Rather Than Channels," In D-lib Magazine,
`Sep. 1997, available at <http://www.dlib.org/dlib/september97 /ibm/
`09lotspiech.htrni>, visited Oct. 30, 2002, pp. 1-9.
`Kristo!, D.M. et al., "Anonymous Internet Mercantile Protocol,"
`AT&T Bell Laboratories, Murray Hill, NJ, Mar. 17, 1994, pp. 1-16.
`Lagoze, C., "The Warwick Framework, A Container Architecture
`for Diverse Sets of Metadata," D-Lib Magazine, Jul./ Aug. 1996, 7
`pages.
`Lanza, M., "George Gilder's Fifth Article-Digital Darkhorse,"
`Newspapers, Feb. 21, 1994, 2 pages.
`Lampson, B. et al., "Authentication in Distributed Systems: Theory
`and Practice," ACM Trans. Computer Systems, vol. 10, No. 4 (Nov.
`1992), pp. 1-46.
`Lehman, B., "Intellectual Property and the National Information
`Infrastructure, a Preliminary Draft of the Report of the Working
`Group on Intellectual Property Rights," Jul. 1994, 141 pages.
`Levy, S., "E-Money, That's What I Want," WIRED, Dec. 1994, 14
`pages.
`Low, S.H. et al., "Anonymous Credit Cards," AT&T Bell Labora(cid:173)
`tories, Proceedings of the 2nd ACM Conference on Computer and
`Communication Security, Fairfax, VA, Nov. 2-4, 1994, 10 pages.
`Low, S.H. et al., "Anonymous Credit Cards and Its Collusion
`Analysis" AT&T Bell Laboratories, Murray Hill, NJ, Oct. 10, 1994,
`18 pages.
`Low, S.H. et al., "Document Marking and Identification Using both
`Line and Word Shifting" AT&T Bell Laboratories, Murray Hill, NJ,
`Jul. 29, 1994, 22 pages.
`Lynch, C., "Searching The Internet," Scientific American, Mar.
`1997, pp. 52-56.
`Maclachlan, M., "PowerAgent Debuts Spam-Free Marketing,"
`TechWire, Aug. 13, 1997, 3 pages.
`Maxemchuk, N.F., "Electronic Document Distribution," AT&T Bell
`Laboratories, Murray Hill, NJ, Sep./Oct. 1994, 11 pages.
`Milbrandt, E., "Steganography Info and Archive," 1996, 2 pages.
`Mori, R. et al., "Superdistribution: The Concept and the Architec(cid:173)
`ture," The Transactons of the EIEICE, V, E73, No. 7, Tokyo, Japan,
`Jul. 1990, pp. 1133-1146.
`
`Page 5 of 50
`
`
`
`US 7,243,236 Bl
`Page 6
`
`Mossberg, W.S., "Personal Technology, Threats to Privacy On-Line
`Become More Worrisome," The Wall Street Journal, Oct. 24, 1996,
`2 pages.
`Negroponte, N., "Some Thoughts on Likely and Expected Com(cid:173)
`munications Scenarios: A Rebuttal," Telecommunications, Jan.
`1993, pp. 41-42.
`Negroponte, N., "Electronic Word of Mouth," WIRED, Oct. 1996,
`3 pages.
`Neumann, P.G. et al., A Provably Secure Operating System: The
`System, Its Applications, and Proofs, Computer Science Laboratory
`Report CSL-116, Second Edition, SRI International, Jun. 1980, 381
`pages.
`Olivier, M.S. et al., "A Taxonomy for Secure Object-oriented
`Databases," ACM Transactions on Database Systems, vol. 19, No.
`1, Mar. 1994, pp. 3-46.
`Olivier, M.S. et al., "Building a Secure Database using Self(cid:173)
`protecting Objects," Computers & Security, vol. 11, No. 3, 1992, pp.
`259-271.
`Olivier, M.S. et al., "Secure Object-oriented Databases," Ph.D.
`Thesis, Rand Afrikaans University, Johannesburg, Dec. 1991, pp. I
`to xiv and 1-183.
`Olivier, M.S. et al., "DISCO: A Discretionary Security Model for
`Object-oriented Databases," in GG Gable and WJ Caelli, Eds., IT
`Security: The Need for International Cooperation, pp. 345-357,
`Elsevier Science Publishers B.V. (North Holland), 1992, pp. 345-
`357, E-3.
`Pelton, J.N., "Why Nicholas Nergoponte is Wrong About the Future
`of Telecommunications," Telecommunications, Jan. 1993, pp.
`35-40.
`"Proceedings: Technological Strategies for Protecting Intellectual
`Property in the Networked Multimedia Environment," 1994, Coa(cid:173)
`lition for Networked Information, Interactive Multimedia Associa(cid:173)
`tion, John F. Kennedy School of Government, Journal of the
`Interactive Multimedia Association, available at <http://www.cni.
`org/docs/ima.ip-workshop> as of Oct. 10, 2002, 308 pages.
`Rankine, G., "Thomas-A Complete Single-Chip RSA Device,"
`Advances in Cryptography, Proceedings of CRYPTO 86, (A.M.
`Odlyzko Ed., Springer-Verlag) 1987, pp. 480-487, 4 pages.
`Reilly, A.K., "Input to the 'International Telecommunications Hear(cid:173)
`ings,' Panel 1: Component Technologies of the NII/GII," Standards
`Committee Tl-Telecommunications, Jul. 28, 1994, 14 pages.
`Resnick, P. et al., "Recommender Systems," Communications of the
`ACM, vol. 40, No. 3, Mar. 1997, pp. 56-58.
`Resnick, P., "Filtering Information on the Internet," Scientific
`American, Mar. 1997, pp. 62-64.
`Rose, L., "Cyberspace and the Legal Matrix: Laws or Confusion?,"
`1991, pp. 43-52.
`Rosenthal, S., "Interactive Network: "Viewers Get Involved," New
`Media," Dec. 1992, pp. 30-31.
`Rosenthal, S., "Interactive TV: "The Gold Rush is on," New
`Media," Dec. 1992, pp. 27-29.
`Rosenthal, S., "Mega Channels," New Media, Sep. 1993, pp. 36-46.
`Rothstein, E., "Technology Connections, Making The Internet
`Come To You Through 'Push' Technology," N.Y. Times, Jan. 20,
`1997, p. D5.
`Rutkowski, K., "PowerAgent Introduces First Internet 'Informedi(cid:173)
`ary' to Empower and Protect Consumers," Tech Talk News Story,
`Aug. 4, 1997, 1 page.
`Sager, I., Bits & Bytes, "Spying on the World Through a Cyber(cid:173)
`Lens," Business Week, Sep. 23, 1996, p. 142E.
`Schlosstein, S., "America: The G7's Comeback Kid," INTERNA(cid:173)
`TIONAL Economy, Jun./Jul. 1993, 5 pages.
`Schaumiieller-Bichl, S. et al., "A Method of Software Protection
`Based on the Use of Smart Cards and Cryptographic Techniques,"
`Advances in Cryptography, Proceedings of EUROCRYPT 84, Apr.
`9-11, 1984, 14 pages.
`Schiirmann, J., Pattern Classification, a Unified View of Statistical
`and Neural Approaches, John Wiley & Sons, Inc., 1996, table of
`contents, 9 pages.
`Shear, V., "Solutions for CD-ROM Pricing and Data Security
`Problems," CD ROM Yearbook 1988-1989 (Microsoft Press 1988
`or 1989) pp. 530-533.
`
`Sibert, 0. et al., "DigiBox: A Self-Protecting Container for Infor(cid:173)
`mation Commerce," Proceedings of the First USENIX Workshop on
`Electronic Commerce, New York, NY, Jul. 1995, 13 pages.
`Sibert, 0. et al., "Securing the Content, Not the Wire, for Informa(cid:173)
`tion Commerce," InterTrust Technologies Corporation, 1996, 12
`pages.
`Siuda, K., "Security Services in Telecommunications Networks,"
`Seminar: Mapping New Applications Onto New Technologies,
`edited by B. Plattner and P. Giinzburger; Zurich, Mar. 8-10, 1988,
`pp. 45-52.
`Smith, S. et al., "Signed Vector Timestamps: A Secure Protocol for
`Partial Order Time," CMU-93-116, School of Computer Science,
`Carnegie Mellon University, Pittsburgh, Pennsylvania, Oct. 1991;
`version of Feb. 1993, 16 pages.
`Stefik, M., "Trusted Systems," Scientific American, Mar. 1997, pp.
`78-81.
`Stefik, M., "Letting Loose the Light: Igniting Commerce in Elec(cid:173)
`tronic Publication," Xerox PARC, Palo Alto, CA, 1994-1995, 36
`pages.
`Stefik, M., "Letting Loose the Light: Igniting Commerce in Elec(cid:173)
`tronic Publication," Internet Dreams: Archetypes, Myths, and Meta(cid:173)
`phors. Massachusetts Institute of Technology, 1996, pp. 219-253.
`Stefik, M., "Chapter 7, Classification," Introduction to Knowledge
`Systems, Morgan Kauffman Publishers, Inc., 1995, pp. 543-607.
`Stephenson, T., "The Info Infrastructure Initiative: Data Super
`Highways and You," Advanced Imaging, May 1993, pp. 73-74.
`Sterling, B., "Literary Freeware: Not for Commercial Use," Com(cid:173)
`puters, Freedom and Private Conference IV, Chicago, IL, Mar. 26,
`1994, pp. 51-55.
`Struif, B., "The Use of Chipcards for Electronic Signatures and
`Encryption," Proceedings for the 1989 Conference on VSLI and
`Computer Peripherals, IEEE Computer Society-Press, 1989, pp.
`4-155 to 4-158.
`"Applications Requirements for Innovative Video Progranuning:
`How to Foster ( or Cripple) Program Development Opportunities for
`Interactive Video Programs Delivered on Optical Media: A Chal(cid:173)
`lenge for the Introduction of DVD (Digital Video Disc)," Oct.
`19-20, 1995, 74 pages.
`Tygar, J.D. et al., "Cryptography: It's Not Just for Electronic Mail
`Anymore," CMU-CS-93-107, School of Computer Science,
`Carnegie Mellon University, Pittsburgh, PA, Mar. 1, 1993, 23 pages.
`Tygar, J.D. et al., "Dyad: A System for Using Physically Secure
`Coprocessors," School of Computer Science Carnegie Mellon Uni(cid:173)
`versity, Pittsburgh, PA, May 1991, 43 pages.
`Tygar, J.D. et al., "Strongbox: A System for Self Securing Pro(cid:173)
`grams," CMU Computer Science: 25th Anniversary Commemora(cid:173)
`tive, R. Rashid (ed.) Addison-Wesley, 1991, pp. 163-197.
`Valovic, T., "The Role of Computer Networking in the Emerging
`Virtual Marketplace," Telecommunications, 1993, 3 pages.
`Voight, J., "Beyond the Banner," Wired, Dec. 1996, 4 pages.
`Weber, R., "Metering Technologies for Digital Intellectual Prop(cid:173)
`erty," Chapter XV, A Report to the International Federation of
`Reproduction Rights Organisations (Boston, MA), Oct. 1994, pp.
`1-29.
`Weber, R., "Digital Rights Management