A portion of the disclosure of this patent document contains material which is subject to copyright protection. This patent document may show and/or describe matter which is or may become trade dress of the owner. The copyright and trade dress owner has no objection to the facsimile reproduction by anyone of the patent disclosure as it appears in the Patent and Trademark Office patent files or records, but otherwise reserves all copyright and trade dress rights whatsoever.
1. Field of the Invention
This disclosure relates to peer-to-peer networks and the filtering of information available for storage on peer-to-peer networks.
2. Related Art
Peer-to-peer networks are an autonomous network of computers that communicate with one another. Users of peer-to-peer networks make their files available for sharing by advertising available files, that is, broadcasting the availability of the files to peers and by allowing downloads of available files by peers on the network. Peer-to-peer networks may contain a broad variety of content, the distribution of which may infringe the copyright of the owner of the content. Content may include music, photographs, books, magazines, movies, televisions shows, and other works which may be protected by copyright laws. Example peer-to-peer networks include FastTrack, eDonkey, Gnutella and BitTorrent. As peer-to-peer networks proliferate, copyright holders seek the means to remove infringing material availability on peer-to-peer networks.
For centralized networks an index of available content is held in a central database, and all searches for available content on the network are conducted through the central database. As such, the central database may identify and remove infringing content. However, for decentralized peer-to-peer networks, there is no central database of available content. Peer-to-peer networks provide a distributed, ad hoc indexing function. The indexing function is distributed in that typically no one node on the network contains a copy of the entire list of content that is available on the network. Instead, hundreds, thousands or even millions of nodes contain small indexes, each containing a subset of the total available content. The index functionality is ad hoc in the sense that indexing nodes may go offline or come online at any time, and that any particular node may or may not be capable of providing indexing functionality.
The unruly group of distributed ad hoc indexing nodes that provide the content on peer-to-peer networks has been viewed by some as uncontrollable, in that there has been no successfully widely deployed technique to prevent the distribution of copyright infringing content. Content owners and technology companies have focused their efforts on filtering content from peer-to-peer networks using two techniques. These two techniques are referred to herein as “point of search/download solutions” and “point of sharing solutions.”
A. Point of Search/Download Solutions
Point of search/download solutions attempt to filter out infringing content from being displayed in search results at the peer-to-peer network user's computer. An example point of search/download solution may perform the following actions:
A point of search/download solution removes search results and/or the ability to download infringing content by filtering out (that is, removing) from those results infringing entries so that infringing content is not displayed to the user in response to a search by that user.
Point of search/download solutions have numerous and obvious problems, including the following: a) A filter list of all infringing content must be distributed to the computer of every user on the network. b) Every node on the network may be required to check with a filter server to evaluate the search results before displaying the search results to the user. c) To achieve a) and b) requires that the filter server have enormous bandwidth and processing capacities which causes the point of search/download solution to be very expensive to run. d) There are privacy issues that may arise if users' search queries and/or search results are passed to a filter server. The owners of the filter server and/or the government authorities may inspect the search results and, by correlating those search requests and/or results with users' IP addresses, may monitor the behavior of users in a way that falls outside of their mandate of preventing the distribution of selected copyright infringing works. For example, a government authority in a repressive country may use such means to charge a particular user on the network with searching for homosexual content, or for searching for information on freedom charters, etc. e) Finally, any user who obtains a hacked version of the peer-to-peer application—i.e. a version of the peer-to-peer application where the filtering function has been removed or circumvented—may be able to obtain unfiltered search results. There is therefore a direct and obvious motive for hackers to attempt to create such a derivative unfiltered product and for users to download such a product en masse. In other words, shortly after the product has been hacked, as it inevitably would be, any user who wishes to obtain access to infringing content, or who wishes to avoid the privacy concerns outlined above, will replace their existing filtered version of the peer-to-peer application software with the hacked version. As a result of these problems, a point of search/download solution has no or limited success as a tool for preventing distribution of infringing content on peer-to-peer networks.
B. Point of Sharing Solutions
Point of sharing solutions provide another approach. Instead of trying to filter incoming search results on a user's personal computer, a point of sharing solution tries to prevent a user from sharing infringing files. That is, the point of sharing solutions block infringing files from being made available on the network by a given user, so that infringing files will not appear as a search result to users. Stated another way, point of sharing solutions prohibit peer-to-peer applications from advertising infringing content. However, to achieve this, as with point of search/download solutions, each computer must keep a large filter list or check with a server before advertising a particular file.
Point of sharing solutions suffer similar problems as point of search/download solutions, including: a) Requiring a filter server to handle a large amount of network traffic to evaluate advertised files before they are shared. b) High operating costs caused by the network traffic of a). b) Privacy issues like those described above, at least as great as those outlined above, and possibly greater, because the central authority now potentially has knowledge of each file shared by every user on the network. c) The incentive to create a hacked version of the peer-to-peer application is a little less than for the point of search/download solution, because there is little to be gained by using a hacked version. d) However, if even, say, 10% of users make use of a hacked version of the client peer-to-peer application and are able to share infringing content, then the content may become readily available on the network. As such, point of sharing solutions have no or limited success as a tool for preventing distribution of infringing content on a peer-to-peer network.
Throughout this description, the embodiments and examples shown should be considered as exemplars, rather than limitations on the apparatus and methods disclosed or claimed.
A server may implement a filter, which may be referred to as a point of indexing filter, to remove copyright infringing files and/or non-desirable files from a network, including peer-to-peer networks. The server implementing the filter may also replace copyright infringing files with alternate approved legal versions of the files. A system and method may achieve this filter by using indexing nodes on a peer-to-peer network to contact a server for authorization to index file entries that are advertised to indexing nodes by ordinary nodes connected to the indexing node. The system and method may also replace advertised file entries with alternate versions.
System
Referring now to
A client device 112 may include software and/or hardware for providing the functionality and features described herein. A client device 112 may include or have stored thereon or therein peer-to-peer software that allows the client device 112 to function as a node on a peer-to-peer network, as described herein. A client device 112 may be a computing device. A computing device as used herein refers to a device with a processor, memory and a storage device that may execute instructions. The term computing device includes, but is not limited to, personal computers 120, server computers 110, computing tablets, set top boxes, video game systems, personal video recorders, telephones, cellular telephones 134, digital telephones, personal digital assistants (PDAs) 132, portable computers, notebook computers 130, and laptop computers. These computing devices may run an operating system, including, for example, variations of the Linux, Unix, MS-DOS, Microsoft Windows, Palm OS, and Apple Mac OS X operating systems.
The techniques described herein may be implemented in software stored on storage media accessible either directly or via a storage device included with or otherwise coupled or attached to a computing device. These storage media include, for example, magnetic media such as hard disks, floppy disks and tape; optical media such as compact disks (CD-ROM and CD-RW) and digital versatile disks (DVD and DVD±RW); flash memory cards; and other storage media. As used herein, a storage device is a device that allows for reading and/or writing to a storage medium. Storage devices include, hard disk drives, DVD drives, flash memory devices (such as readers and writers), and others.
A client device 112 may include one or more of each of: logic arrays, memories, analog circuits, digital circuits, software, firmware, and processors such as microprocessors, field programmable gate arrays (FPGAs), application specific integrated circuits (ASICs), programmable logic devices (PLDs) and programmable logic arrays (PLAs). The hardware and firmware components of the client devices 112 may include various specialized units, circuits, software and interfaces for providing the functionality and features described here. The processes, functionality and features may be embodied in whole or in part in software which operates on a client device 112 and may be in the form of, for example, firmware, an application program, an applet (e.g., a Java applet), a browser plug-in, a COM object, a dynamic linked library (DLL), a script, one or more subroutines, an operating system component or service, and/or a combination thereof
Client devices 112 typically include a display, user input devices, and a storage media and storage device. For example, when the client device 112 is a personal computer 120, the personal computer 120 includes a display 128, a keyboard 124, a mouse 126 and a hard disk drive 122.
A server 110 is another computing device and refers to a device with a processor, memory and a storage device, and may execute instructions. A server is typically more robust than a client device and typically has greater processing capabilities, greater network throughput, and/or greater storage space when compared to a personal computer or other client device. Although shown as a single server, server 110 may be a server farm, group of servers (including application servers, database servers, content servers, and others), and may include a firewall, load balancer, and other network devices; and may include multiple devices in multiple locations. The server 110 may provide one or more database and other facilities to receive index requests and provide index responses as described herein.
In one embodiment, network 104 is the Internet. Network 104 may support various versions of the Ethernet protocol and other data and/or voice communications protocols. The client devices 112 and server 110 may communicate over the network 104 via wired and/or wireless communications. The client devices 112 and server 110 communicate data units over the network 104. As used herein, a data unit refers to a frame, cell, datagram, packet or other unit of information. The communications between the client devices 112 and the server 110 are pertinent to the techniques, features and functionality described herein.
As will be described in more detail below, the server 110 receives communications from client devices 112 acting as indexing nodes inquiring about files being advertised to the client devices 112 acting as indexing nodes by ordinary nodes—namely, index requests—and sends communications to the indexing nodes in response to the indexing nodes—namely, index responses. In one embodiment, the communications between the server 110 and client device 112 via server connector module 218 and client connector module 230 are encrypted and/or digitally signed. The encryption may prevent third parties on the network from obtaining access to the information in the communications between the server 110 and the client device 112. Other techniques for secure communication between the server 110 and the client device 112 may also be implemented.
The administration interface 212 may allow content filter partners and other participants in the filtering system to log in and add or edit entries for files that are to be filtered from the network. The administration interface 212 may be web-based such that it provides an interface for partners/participants to access the server 110 through a web browser. The communications between the administration interface 212 of server 110 with partners and participants via a web browser may be made secure via secure sockets layer (SSL) encryption and/or other techniques.
The search engine interface 214 may behave as a server-to-server interface. The search engine interface 214 may be a web services interface. The search engine interface 214 may allow other servers to connect to the server for the purpose of allowing servers and/or web sites to subscribe to the list of file entries in the database 220. A web site may subscribe to the server 110 to access the database 220 via search engine interface 214 to obtain information to determine whether it should remove infringing content. For example, the website may remove infringing content when an entry in its database is contained in the database 220. The search engine interface 214 may provide encrypted, secure communications with web servers and other servers.
The data input interface 216 may allow other servers to connect to the server to provide for the automated bulk entry of file entries to the database 220. The data input interface 216 may behave as a server-to-server interface. The data input interface 216 may be a web services interface. The data input interface 216 may provide encrypted, secure communications with web servers and other servers.
The server connector module 218 may provide an interface to client connector modules 230 on client devices. The server connector module 218 may provide encrypted, secure communications with to client connector modules 230 on client devices.
The database 220 may contain information about files that are to be filtered from the network. The database 220 may be used to store information about infringing files that should be removed from the peer-to-peer network. The database 220 may be used to store information about infringing files that should be replaced with licensed versions. The database 220 may also contain information concerning content filter partners and participants, including permissions to log into the server to add file identifiers to the database 220. The database 220 may store information in an encrypted or other secure manner to prevent unwanted access to the information in the database from being disseminated should network security or other security measures be breached.
In addition to an operating system and other software typical for the particular client device 112, the client device also includes client connector module 230. The client connector module 230 may be integrated with, distributed with and/or installed with peer-to-peer file sharing applications. The client connector module 230 may be resident on the computers of people who are running peer-to-peer file sharing applications. The client connector module 230 may be a plug-in to peer-to-peer file sharing applications.
Server 110 and client devices 112 may communicate with each other over a network through server connector module 218 and client connector module 230, respectively.
As to
A hierarchical network is a kind of distributed network. A distributed network is a network of autonomous nodes which are not under centralized control. In a flat peer-to-peer distributed network, all nodes are equal, have the same capabilities, and perform the same functions. In contrast, in a hierarchical peer-to-peer distributed network, some nodes—sometimes nodes with greater bandwidth and/or processing power—are given additional duties or responsibilities compared to other nodes. Nodes with additional duties or responsibilities may be referred to as indexing nodes. In a hierarchical peer-to-peer distributed network, only a small fraction of the total nodes may function as indexing nodes.
In a network, including distributed and peer-to-peer networks, an indexing node 320 is a node which may: (a) receive a listing of files advertised to it by other nodes, either or both indexing nodes and ordinary nodes (advertisement 316); and may (b) receive search requests 312 and 322 from other nodes, both ordinary and indexing, when those nodes have initiated a search for a particular file. An indexing node 320 may contain and maintain a database of files that have been advertised to it by nodes which are in communication with it. As used herein, to advertise means to inform other nodes on a network a file is available. To do this, the ordinary node advertises the availability of the file to nodes by communicating over the network 300 with indexing nodes 320 and/or ordinary nodes 310.
User search requests 312 for a particular file are initiated by an ordinary node 310 and are processed by an indexing node 320. Example search requests include one or more of each of words in the title of movies, songs, television shows; names of performers, actors, musicians; and the like. An indexing node 320 may respond to an incoming search request by searching its local database and providing in return a match list 324 of matching file entries. If an indexing node 320 does not have the file requested by an ordinary node 310, the indexing node 320 may contact other indexing nodes 320 via search request 322. That is, the indexing nodes 320 are in communication with each other so that if a given indexing node 320 does not have a requested file in its local database, it may forward the search request 322 to another indexing node 320.
In a flat peer-to-peer network, any node is capable of being an indexing node 320. That is, every node in a flat peer-to-peer network may function as an indexing node. However, because this is inefficient, many peer-to-peer networks elevate a subset (often on the order of a few percent) of the total number of nodes to act as indexing nodes 320. Examples of indexing nodes include “supernodes” in the FastTrack peer-to-peer network and “ultrapeer” nodes in the Gnutella peer-to-peer network.
Nodes in a peer-to-peer network which are not functioning as indexing nodes 320 may be referred to as ordinary nodes 310. As used herein, ordinary nodes 310 may be capable of sending advertisements 316 of available files to indexing nodes 320; sharing out available files; and sending search requests 312 to indexing nodes 320 on the network 300. Ordinary nodes 310 typically do not receive search requests from other nodes and do not maintain a database of content being shared by other nodes. As compared to indexing nodes 320, ordinary nodes 310 typically have less bandwidth and/or processing power. When users at an ordinary node 310 initiate a file search, a search term or search query may be sent as a search request 312 to an indexing node 320 with which that ordinary node is in communication. The ordinary node 310 may then receive in response to the search request 312 a match list 314 from the indexing node 320.
Indexing nodes are distinguished from ordinary nodes for illustrative purposes. The distinction is helpful to describe the systems and methods disclosed herein. There is no additional or special significance to this naming convention. That is, other names may be used to refer to these nodes. It is the functionality and features of the nodes that is pertinent to the description herein. Further, nodes, ordinary and indexing, may be a computing device capable of network communications. Although nodes may typically be personal computers, desktop computers, notebook computers, and server computers, they may also be any computing device.
The techniques described herein may be implemented using a server 430 to receive and process index requests 432 and to provide index responses 434 to indexing nodes 420. In one embodiment, the index requests and the index responses are encrypted and/or digitally signed. The encryption may prevent third parties on the network from obtaining access to the information in the index requests and the index responses. In one embodiment, the sequence of receiving an index request and providing an index response is a process whereby an indexing node 420 makes a call using its client connector module to ask the server 430 whether the indexing node 420 should index a particular file which has been advertised to it by a node with which it is in communication. In this embodiment, to send an index request, the indexing node 420 uses the client connector module to make a call to the server 430 to check on the status of the requested file. The server 430 may evaluate whether the file is an infringing file which should not be indexed by the indexing node. The server 430 may, via its server connector module, send an index response 434 to the client connector module. The index response 434 may instruct the indexing node 420 to either index or not index the file(s) for which permission was requested. The index response 434 may instruct the indexing node 420 to index an alternate, licensed, file instead of the original file for which permission was requested.
Description of Methods
As used herein, the term file means data identified by a unique identifier. The kind of data stored in a file may be any kind of content, including, for example, without limitation: music; video; text; graphics; a song; a full CD, album or DVD; a book; a magazine; a story; an article; a sporting event; a film; a television program; a concert recording; a newspaper; and others. The file may be in a well-known or proprietary format, including, for example, without limitation, ASCII, portable document format (PDF), MP3, MP4, MPEG, RAW, TIFF, JPEG, WAV, RealAudio, WidowsMedia, and others. References to files may include both the unique identifier of that file and associated meta data about the file. The meta data may include, for example, without limitation, file title, file author, file size, file creation date, file format, encryption used, and/or other information.
A unique identifier is a combination of alphabetic characters and/or numbers and/or symbols that uniquely identify a file. If two files are identical, they have the same unique identifier. The filehash of a file may be the unique identifier for that file. When a file refers to or is a website, the unique identifier may be the uniform resource locater (URL) or uniform resource identifier (URI) of the file. In a content management system or database the unique identifier may be a system created identifier of the file. The unique identifier may be formed from the name of the file concatenated with or otherwise combined with its file size and a cyclical redundancy check (CRC) value of the file. This patent is agnostic to the kind or type of unique identifier used or algorithm used to create the unique identifier.
The indexing node prepares an index request based on the advertisement and sends the index request to the server, as shown in block 520, seeking permission to index the advertised file. The indexing node may encrypt or otherwise secure the index request before transmission to the server. The index request may include a single advertised file or a group of advertised files. The indexing node may send index requests for advertised files immediately upon receipt of or shortly after receipt of a file advertisement from an ordinary node. The indexing node may periodically send index requests for advertised files received over a system defined period of time from one or more ordinary nodes. The system defined period of time may be, for example, one hour, four hours, 12 hours, one day, etc. The indexing node may periodically send index requests for advertised files when a system defined number of advertised files has been received. The system defined number of advertised files may be, for example, four files, 12 files, 16 files, 128 files, 278 files, 1000 files, etc.
The server may receive the search request and searches its database for the file specified in the index request, as shown in block 530. Before the server performs the search, the server may perform a security check to verify or otherwise authenticate that the index request came from an authorized source. The server may decrypt the index request. The server may prepare an index response including an action code and optional alternative data for the advertised file, as shown in block 540. The indexing node may receive the index response from the server, as shown in block 550. The indexing node takes appropriate action based on the index response, as shown in block 560. The appropriate action may be one of: (1) index, as shown in block 562; (2) do not index, as shown in block 564; and (3) substitute, as shown in block 566.
When the appropriate action based on the index response is to index the advertised file, the indexing node adds the file identifier for the advertised file to its database, as shown in block 572. When the appropriate action based on the index response is to not index the advertised file, the indexing node does not add the file identifier for the advertised file to its database, as shown in block 574. When the appropriate action based on the index response is to substitute a file for the advertised file, the indexing node adds a file identifier for a substitute file specified in the index response to its database, as shown in block 576. The file identifier for the substitute file may refer to a copyright protected, licensed or authorized file made available by a copyright owner, licensee, or other authorized legal source and may be provided by a participant or partner. The substitute file may be a URL of a web page or other location where an alternate version of the file may be obtained. The user may be given the option to buy a substitute file in the form of a licensed or otherwise authorized version of the advertised file. A URL may be provided to initiate the purchase of a substitute licensed file.
A method begins with the indexing node receiving an advertisement from an ordinary node, as shown in block 610. The indexing node forwards the advertisement to its client connector module, as shown in block 612. In this embodiment, the client connector module checks its local cache for the advertised file, as shown in block 614. The flow of actions then continues based on whether the file identifier of the advertised file is in the local cache of the client connector module, as shown in block 616.
When the client connector module determines that the advertised file is not in its local cache, the flow of actions continues at block 620, where the client connector module sends an index request to the server. The server then searches its database for the file identifier or identifiers specified in the index request, as shown in block 622. The server prepares an index response including an action code and optional alternative data for the advertised file and sends the index response to the client connector module via its server connector module, as shown in block 624. The client connector module receives the index response from the server, as shown in block 626, and creates a corresponding receipt timestamp for the index response. The client connector module then adds the index response and the receipt timestamp to its local cache, as shown in block 628. The client connector module then forwards the index response to the indexing node, as shown in block 636. The flow of actions continues at block 560 of
When the client connector module determines that the advertised file is in its local cache, the flow of actions continues at block 630, where the client connector module checks the timestamp of the cache entry for the advertised file. The check of the timestamp may be made to determine if the cache entry for the advertised file has expired. An entry may be deemed to have expired if it the timestamp shows that the entry was received more than a system defined amount of time earlier. The system defined period of time may be hours, days, or any portion thereof. In one embodiment, an entry is deemed to have expired if it has been in the cache longer than four days. The flow of actions continues based on whether the timestamp of the entry for the advertised file has expired, as shown in block 632.
When the entry has expired, the flow of actions continues at block 620, as if there was no entry for the advertised file in the local cache of the client connector module.
When the entry has not expired, the flow of actions continues at block 634, where the client connector module retrieves the cached record for the advertised file. The client connector module then prepares an index response based on the cached record for the advertised file. The client connector module then forwards the index response to the indexing node, as shown in block 636. The flow of actions continues at block 560 of
The indexing node receives an advertisement from an ordinary node, as shown in block 710. The indexing node searches its local database for the file identifier of the advertised file, as shown in block 712. The flow of actions then continues based on whether the file identifier of the advertised file is in the database of the indexing node, as shown in block 716.
When the indexing node determines that the file identifier of the advertised file is not in its database, the indexing node sends an index request to the server, as shown in block 720. The server searches its database, as shown in block 722. The server prepares an index response including an action code and optional alternative data for the advertised file and sends it to the indexing node, as shown in block 724. The indexing node receives the index response from the server, as shown in block 726, and prepares a receipt timestamp. The indexing node adds information from the index response and a corresponding receipt timestamp to its database as a record or entry for the advertised file, as shown in block 728. The flow of actions continues at block 560 of
When the indexing node determines that the advertised file is in its database, the flow of actions continues at block 730, where the indexing node checks the timestamp of the database entry for the advertised file. The check of the timestamp is made to determine if the entry for the advertised file has expired. An entry is deemed to have expired if its timestamp shows that the record was received more than a system defined amount of time earlier. The system defined amount of time may be hours, days, or any portion thereof. In one embodiment, an entry is deemed to have expired if it has been in the database longer than seven days. The flow of actions continues based on whether the timestamp of the entry for the advertised file has expired, as shown in block 732.
When the entry has expired, the flow of actions continues at block 720, as if there was no record for the advertised file in the database of the indexing node.
When the entry has not expired, the flow of actions continues at block 734, where the indexing node reviews the database record for the advertised file. The indexing node takes appropriate action based on the record for the advertised file, as shown in block 736. The appropriate action may be to do nothing; to update the database record for the advertised file; to index the advertised file; to remove the advertised file entry from the index; to replace the existing indexed entry with an entry for an alternate, possibly copy protected, file; to replace the existing indexed entry with a URL of a web page or other location where an alternate version of the file may be obtained; or other action. At this point, an additional check may be performed to determine whether the record for the indexed file is licensed or otherwise authorized. If warranted, an alternate file may be substituted for the indexed file. The substitute file may be a URL of a web page or other location where an alternate version of the file may be obtained. The user may be given the option to buy a substitute file in the form of a licensed or otherwise authorized version of the advertised file. A URL may be provided to initiate the purchase of a substitute licensed file.
When implementing and rolling out point-of-indexing filter software in servers and indexing nodes, some nodes on the network will not include a point-of-indexing filter. This may occur when introducing a new version of a peer-to-peer application that has added point-of-indexing filter functionality. In this case, existing nodes on the network will not include any point-of-indexing filtering; only the new nodes will include point-of-indexing filter. In addition, it is contemplated that hackers may modify peer-to-peer applications or indexing nodes to remove a point-of-indexing filter capability such that a subset of the nodes on the peer-to-peer network run hacked peer-to-peer applications without filtering methods, or with disabled filtering methods. To assist in the introduction of point-of-indexing filtering to peer-to-peer network, and/or to reduce or eliminate the impact of hacked versions of peer-to-peer applications and nodes, an embodiment of the peer-to-peer applications running on ordinary nodes may be implemented with a preferred indexing node feature. Peer-to-peer applications having the preferred indexing node feature may send search requests to indexing nodes which provide a point-of-indexing filter, and/or may not send requests to indexing nodes which do not provide point-of-indexing filter capability.
In a peer-to-peer network that includes ordinary nodes and indexing nodes in which some ordinary nodes and indexing nodes incorporate a point-of-indexing filter and others do not, the following method may be implemented in conjunction with the methods described above in
In one embodiment, the peer-to-peer application may engage in a challenge-response exchange with each prospective indexing node to learn whether the indexing node is an authenticated participant that provides point-of-indexing filter features. An embodiment of a challenge-response exchange may perform the following process.
A new ordinary node running a peer-to-peer application may contact an authentication server requesting a challenge string. The authentication server may be the same server as the server that implements the server described regarding
In other embodiments, the peer-to-peer application on ordinary nodes may include, store or access a locally stored black list and/or a locally stored white list of indexing nodes. Ordinary nodes running a peer-to-peer application may determine which indexing nodes to advertise to and/or receive match lists from based on reference to the black lists and/or white lists. In another embodiment, the peer-to-peer application may access a remotely stored and maintained black list and/or white list of indexing nodes which may be located at an authentication server.
In one embodiment, all ordinary nodes may function as indexing nodes. That is, in one embodiment, all nodes in a peer-to-peer network are indexing nodes. Stated yet another way, in one embodiment, all nodes function as both indexing nodes and ordinary nodes.
Example Data Units
The following is an example format of one embodiment of an index request data unit sent from the client connector module to the server in the embodiment shown in and described regarding
In one embodiment, the Data_type and Data_format fields are plain text, and the fields from client name through the signature are encrypted. In other embodiments, the Data_type and Data_format fields are alphabetic and/or numeric values that are system defined.
The following is the format of one embodiment of the Data_Element field of the index request data unit.
The following is the format of one embodiment of the index response data unit sent from the server to the client connector module in the embodiment shown in and described regarding
The following is the format of one embodiment of the Data_Element field of the index response data unit.
Closing Comments
The point of indexing systems and methods described above may reduce traffic to the server which maintains the list of infringing content which is to be removed from the network when compared to the point of search/download solution and the point of sharing solution described above. This may reduce the cost of running servers when compared to the point of search/download solution and the point of sharing solution described above and to other solutions which involve each node on the network having to individually make contact with a server to determine whether a file may be downloaded from and/or shared out to other nodes on a network.
The server in the point of indexing systems and methods described above may have no knowledge of the IP address or identity of individual users on the peer-to-peer network who are conducting searches, receiving files and/or sharing files. The point of indexing systems and methods described above may be implemented to maintain user privacy.
In one embodiment, users of a hacked version of the client peer-to-peer application gain no advantage when the point of indexing systems and methods described above are employed. As such, when one embodiment of the point of indexing systems and methods described above are employed, there is little motivation for hackers to create hacked versions and no motivation for users to install hacked versions of the client peer-to-peer application.
When one embodiment of the point of indexing systems and methods described above are employed, the point of indexing systems and methods described above are effective when less than all users of a peer-to-peer network install a version of the client peer-to-peer application which incorporates the point of indexing filtering described herein. In some embodiments of peer-to-peer networks, a success threshold is reached when a particular portion of users—on the order of 30%—have installed a version of the client peer-to-peer application which includes the point of indexing filter techniques described above. When the success threshold is reached, infringing content is filtered from the entire peer-to-peer network, such that infringing content is successfully filtered from all users—importantly, including users who are running peer-to-peer clients which do not include the point of indexing filter.
The foregoing is merely illustrative and not limiting, having been presented by way of example only. Although examples have been shown and described, it will be apparent to those having ordinary skill in the art that changes, modifications, and/or alterations may be made.
Although many of the examples presented herein involve specific combinations of method acts or system elements, it should be understood that those acts and those elements may be combined in other ways to accomplish the same objectives. With regard to flowcharts, additional and fewer steps may be taken, and the steps as shown may be combined or further refined to achieve the methods described herein. Acts, elements and features discussed only in connection with one embodiment are not intended to be excluded from a similar role in other embodiments.
As used herein, whether in the written description or the claims, “plurality” means two or more.
As used herein, whether in the written description or the claims, the terms “comprising”, “including”, “having”, “containing”, “involving”, and the like are to be understood to be open-ended, that is, to mean including but not limited to. Only the transitional phrases “consisting of” and “consisting essentially of”, respectively, are closed or semi-closed transitional phrases with respect to claims.
Use of ordinal terms such as “first”, “second”, “third”, etc., in the claims to modify a claim element does not by itself connote any priority, precedence, or order of one claim element over another or the temporal order in which acts of a method are performed, but are used merely as labels to distinguish one claim element having a certain name from another element having a same name (but for use of the ordinal term) to distinguish the claim elements.
As used herein, “and/or” means that the listed items are alternatives, but the alternatives also include any combination of the listed items.
This patent is a continuation of U.S. patent application Ser. No. 11/428,321, titled “Filter for a Distributed Network,” and filed Jun. 30, 2006, published as US 2007-0220116 A1 on Sep. 20, 2007, which claims the benefit of provisional application 60/782,545 filed Mar. 14, 2006, the entire contents of both of which are fully incorporated herein by reference for all purposes.
Number | Name | Date | Kind |
---|---|---|---|
3668647 | Evangelisti et al. | Jun 1972 | A |
3835260 | Prescher et al. | Sep 1974 | A |
4096568 | Bennett et al. | Jun 1978 | A |
4215402 | Mitchell et al. | Jul 1980 | A |
4221003 | Chang et al. | Sep 1980 | A |
4290105 | Cichelli et al. | Sep 1981 | A |
4376299 | Rivest | Mar 1983 | A |
4405829 | Rivest et al. | Sep 1983 | A |
4412285 | Neches et al. | Oct 1983 | A |
4414624 | Summer, Jr. et al. | Nov 1983 | A |
4441155 | Fletcher et al. | Apr 1984 | A |
4464713 | Benhase et al. | Aug 1984 | A |
4490782 | Dixon et al. | Dec 1984 | A |
4558413 | Schmidt et al. | Dec 1985 | A |
4571700 | Emry, Jr. et al. | Feb 1986 | A |
4577293 | Matick et al. | Mar 1986 | A |
4642793 | Meaden | Feb 1987 | A |
4658093 | Hellman | Apr 1987 | A |
4675810 | Gruner et al. | Jun 1987 | A |
4691299 | Rivest et al. | Sep 1987 | A |
4725945 | Kronstadt et al. | Feb 1988 | A |
4773039 | Zamora | Sep 1988 | A |
4821184 | Clancy et al. | Apr 1989 | A |
4887235 | Holloway et al. | Dec 1989 | A |
4888681 | Barnes et al. | Dec 1989 | A |
4914586 | Swinehart et al. | Apr 1990 | A |
4922414 | Holloway et al. | May 1990 | A |
4922417 | Churm et al. | May 1990 | A |
4949302 | Arnold et al. | Aug 1990 | A |
4972367 | Burke | Nov 1990 | A |
5014192 | Mansfield et al. | May 1991 | A |
5025421 | Cho | Jun 1991 | A |
5047918 | Schwartz et al. | Sep 1991 | A |
5050074 | Marca | Sep 1991 | A |
5050212 | Dyson | Sep 1991 | A |
5057837 | Colwell et al. | Oct 1991 | A |
5077658 | Bendert et al. | Dec 1991 | A |
5084815 | Mazzario | Jan 1992 | A |
5117351 | Miller | May 1992 | A |
5129081 | Kobayashi et al. | Jul 1992 | A |
5129082 | Tirfing et al. | Jul 1992 | A |
5144667 | Pogue, Jr. et al. | Sep 1992 | A |
5163147 | Orita | Nov 1992 | A |
5179680 | Colwell et al. | Jan 1993 | A |
5182799 | Tamura et al. | Jan 1993 | A |
5199073 | Scott | Mar 1993 | A |
5202982 | Gramlich et al. | Apr 1993 | A |
5204897 | Wyman | Apr 1993 | A |
5204958 | Cheng et al. | Apr 1993 | A |
5204966 | Wittenberg et al. | Apr 1993 | A |
5208858 | Vollert et al. | May 1993 | A |
5247620 | Fukuzawa et al. | Sep 1993 | A |
5260999 | Wyman | Nov 1993 | A |
5276869 | Forrest et al. | Jan 1994 | A |
5276901 | Howell et al. | Jan 1994 | A |
5287499 | Nemes | Feb 1994 | A |
5287514 | Gram | Feb 1994 | A |
5297279 | Bannon et al. | Mar 1994 | A |
5301286 | Rajani | Apr 1994 | A |
5301316 | Hamilton et al. | Apr 1994 | A |
5317693 | Cuenod et al. | May 1994 | A |
5341477 | Pitkin et al. | Aug 1994 | A |
5343527 | Moore | Aug 1994 | A |
5347653 | Flynn et al. | Sep 1994 | A |
5351302 | Leighton et al. | Sep 1994 | A |
5357440 | Talbott et al. | Oct 1994 | A |
5357623 | Megory-Cohen | Oct 1994 | A |
5359523 | Talbott et al. | Oct 1994 | A |
5361356 | Clark et al. | Nov 1994 | A |
5371897 | Brown et al. | Dec 1994 | A |
5384565 | Cannon | Jan 1995 | A |
5394555 | Hunter et al. | Feb 1995 | A |
5403639 | Belsan et al. | Apr 1995 | A |
5404508 | Konrad et al. | Apr 1995 | A |
5438508 | Wyman | Aug 1995 | A |
5442343 | Cato et al. | Aug 1995 | A |
5448668 | Perelson et al. | Sep 1995 | A |
5448718 | Cohn et al. | Sep 1995 | A |
5452447 | Nelson et al. | Sep 1995 | A |
5454000 | Dorfman | Sep 1995 | A |
5454039 | Coppersmith et al. | Sep 1995 | A |
5459860 | Burnett | Oct 1995 | A |
5465365 | Winterbottom | Nov 1995 | A |
5467471 | Bader | Nov 1995 | A |
5475826 | Fischer | Dec 1995 | A |
5479654 | Squibb | Dec 1995 | A |
5491817 | Gopal et al. | Feb 1996 | A |
5499294 | Friedman | Mar 1996 | A |
5504879 | Eisenberg et al. | Apr 1996 | A |
5530757 | Krawczyk | Jun 1996 | A |
5537585 | Blickenstaff et al. | Jul 1996 | A |
5542087 | Neimat et al. | Jul 1996 | A |
5553143 | Ross et al. | Sep 1996 | A |
5568181 | Greenwood et al. | Oct 1996 | A |
5581615 | Stern | Dec 1996 | A |
5581758 | Burnett | Dec 1996 | A |
5581764 | Fitzgerald et al. | Dec 1996 | A |
5583995 | Gardner et al. | Dec 1996 | A |
5588147 | Neeman et al. | Dec 1996 | A |
5600834 | Howard | Feb 1997 | A |
5604803 | Aziz | Feb 1997 | A |
5604892 | Nuttall et al. | Feb 1997 | A |
5630067 | Kindell et al. | May 1997 | A |
5632031 | Velissaropoulos et al. | May 1997 | A |
5638443 | Stefik et al. | Jun 1997 | A |
5640564 | Hamilton et al. | Jun 1997 | A |
5649196 | Woodhill et al. | Jul 1997 | A |
5677952 | Blakley, III et al. | Oct 1997 | A |
5678038 | Dockter et al. | Oct 1997 | A |
5678046 | Cahill et al. | Oct 1997 | A |
5694472 | Johnson et al. | Dec 1997 | A |
5694596 | Campbell | Dec 1997 | A |
5701316 | Alferness et al. | Dec 1997 | A |
5710922 | Alley et al. | Jan 1998 | A |
5724425 | Chang et al. | Mar 1998 | A |
5724552 | Taoda | Mar 1998 | A |
5742807 | Masinter | Apr 1998 | A |
5745879 | Wyman | Apr 1998 | A |
5757913 | Bellare et al. | May 1998 | A |
5757915 | Aucsmith et al. | May 1998 | A |
5781629 | Haber et al. | Jul 1998 | A |
5802291 | Balick et al. | Sep 1998 | A |
5809494 | Nguyen | Sep 1998 | A |
5826049 | Ogata et al. | Oct 1998 | A |
5835087 | Herz et al. | Nov 1998 | A |
5864683 | Boebert et al. | Jan 1999 | A |
5907619 | Davis | May 1999 | A |
5907704 | Gudmundson et al. | May 1999 | A |
5940504 | Griswold | Aug 1999 | A |
5978791 | Farber et al. | Nov 1999 | A |
5991414 | Garay et al. | Nov 1999 | A |
6006018 | Burnett et al. | Dec 1999 | A |
6134603 | Jones et al. | Oct 2000 | A |
6135646 | Kahn et al. | Oct 2000 | A |
6167438 | Yates et al. | Dec 2000 | A |
6415280 | Farber et al. | Jul 2002 | B1 |
6487643 | Khare et al. | Nov 2002 | B1 |
6675205 | Meadway | Jan 2004 | B2 |
6732180 | Hale et al. | May 2004 | B1 |
6816872 | Squibb | Nov 2004 | B1 |
6928442 | Farber et al. | Aug 2005 | B2 |
6950821 | Faybishenko | Sep 2005 | B2 |
6963975 | Weare | Nov 2005 | B1 |
7802310 | Farber et al. | Sep 2010 | B2 |
20020052884 | Farber et al. | May 2002 | A1 |
20020052885 | Levy | May 2002 | A1 |
20020082999 | Lee et al. | Jun 2002 | A1 |
20020184224 | Haff et al. | Dec 2002 | A1 |
20020188735 | Needham et al. | Dec 2002 | A1 |
20030078888 | Lee et al. | Apr 2003 | A1 |
20030078889 | Lee et al. | Apr 2003 | A1 |
20030095660 | Lee et al. | May 2003 | A1 |
20030149871 | Medvinsky | Aug 2003 | A1 |
20040098370 | Garland et al. | May 2004 | A1 |
20040139097 | Farber et al. | Jul 2004 | A1 |
20040193900 | Nair | Sep 2004 | A1 |
20050010792 | Carpentier et al. | Jan 2005 | A1 |
20050076082 | Le Pennec et al. | Apr 2005 | A1 |
20050108368 | Mohan | May 2005 | A1 |
20050114296 | Farber et al. | May 2005 | A1 |
20050114709 | Moore | May 2005 | A1 |
20050169467 | Risan et al. | Aug 2005 | A1 |
20050198020 | Garland et al. | Sep 2005 | A1 |
20060031381 | Van Luijt | Feb 2006 | A1 |
20060034177 | Schrempp | Feb 2006 | A1 |
20060101408 | Kotamarthi et al. | May 2006 | A1 |
20070061269 | Dimkovic | Mar 2007 | A1 |
20070185848 | Farber et al. | Aug 2007 | A1 |
20080059419 | Auerbach et al. | Mar 2008 | A1 |
20080065635 | Farber et al. | Mar 2008 | A1 |
20080066191 | Farber et al. | Mar 2008 | A1 |
20080071855 | Farber et al. | Mar 2008 | A1 |
20080082551 | Farber et al. | Apr 2008 | A1 |
Number | Date | Country |
---|---|---|
0 268 069 | May 1988 | EP |
0 315 425 | May 1989 | EP |
0 558 945 | Sep 1993 | EP |
0 566 967 | Oct 1993 | EP |
0592045 | Apr 1994 | EP |
0631 226 | Dec 1994 | EP |
0 654 920 | May 1995 | EP |
0 658 022 | Jun 1995 | EP |
2294132 | Apr 1996 | GB |
59058564 | Apr 1984 | JP |
63-106048 | May 1988 | JP |
63-273961 | Nov 1988 | JP |
2-127755 | May 1990 | JP |
05162529 | Jun 1993 | JP |
06187384 | Jul 1994 | JP |
06348558 | Dec 1994 | JP |
WO 9220021 | Nov 1992 | WO |
WO 9406087 | Mar 1994 | WO |
WO 9420913 | Sep 1994 | WO |
WO 9501599 | Jan 1995 | WO |
WO 9743717 | Nov 1997 | WO |
Entry |
---|
The Gnutella Protocol Specification v0.4, Document revision 1.2, (est. Jun. 2001) [10 pgs.]. |
[Proposed] Order Regarding Construction of Terms, filed Mar. 29, 2007 in C.D. Cal. case No. CV 06-5086 SJO (Ex) [9 pgs.]. |
Advances in Cryptology—AUSCRYPT '92—Workshop on the Theory and Application of Cryptographic Techniques Gold Coast, Queensland, Australia Dec. 13-16, 1992 Proceedings. |
Advances in Cryptology—EUROCRYPT '93, Workshop on the Theory and Application of Cryptographic Techniques Lofthus, Norway, May 23-27, 1993 Proceedings. |
Affidavit of Timothy P. Walker in Support of CWIS' Opening Markman Brief Construing the Terms at Issue in U.S. Patent No. 6,415,280, dated Jul. 25, 2003, from case No. 02-11430 RWZ. |
Akamai and MIT's Memorandum in Support of Their Claim Construction of USPAT 5,978,791, dated Aug. 31, 2001, from case No. 00-cv-11851RWZ. |
Akamai's Answer, Affirmative Defenses and Counterclaims to Amended Complaint, filed Dec. 6, 2002, in case No. 02-CV-11430RWZ. |
Akamai's Brief on Claim Construction, dated Aug. 8, 2003, from case No. 02-11430 RWZ [23 pgs.]. |
Alexander Dupuy (dupuy@smarts.com), “MD5 and LIFNs (was: Misc Comments)”, www.acl.lanl.gov/URI/archive/uri-94q2.messages/0081.html, Apr. 17, 1994. |
Alexander Dupuy (dupuy@smarts.com), “RE: MD5 and LIFNs (was: Misc Comments)”, www.acl.lanl.gov/URI/archive/uri-94q2.messages/0113.html, Apr. 26, 1994. |
Androutsellis-Theotokis, Stephanos and Diomidis Spinellis, A Survey of Peer-to-Peer Content Distribution Technologies, ACM Computing Surveys, vol. 36, No. 4, Dec. 2004. pp. 335-371. |
Answer of Defendant RIAA to First Amended Complaint and Counterclaim, Feb. 8, 2005, in C.D. Cal. Case No. CV 04-7456 JFW (CTx) [30 pgs.]. |
Baquero, Carlos and Nuno Lopes, Towards Peer-to-Peer Content Indexing, ACM SIGOPS Operating Systems Review, vol. 37, Issue 4 (Oct. 2003), pp. 90-96. |
Barbara, D., et al., “Exploiting symmetries for low-cost comparison of file copies,” 8th Int'l Conf. on Distributed Computing Systems, Jun. 1988, pp. 471-479, San Jose, CA. |
Berners-Lee, T. et al., RFC 1738, “Uniform Resource Locators (URL),” pp. 1-25, The Internet Engineering Task Force (IETF), Network Working Group, Dec. 1994. |
Berners-Lee, T. et al., RFC 1945, “Hypertext Transfer Protocol—HTTP/1.0,” The Internet Engineering Task Force (IETF), Network Working Group, May 1996, pp. 1-60. |
Berners-Lee, T., RFC 1630 “Universal Resource Identifiers in WWW,” The Internet Engineering Task Force (IETF), Network Working Group, Jun. 1994, pp. 1-28. |
Berson, Thomas A., Differential Cryptanalysis Mod 2^32 with Applications to MD5, in Proc. Advances in Cryptology—EUROCRYPT '92, Hungary, May 24-28, 1992, pp. 69-81. |
Bowman, C. Mic, et al., “Harvest: A Scalable, Customizable Discovery and Access System,” Aug. 4, 1994, pp. 1-27. |
Bowman, C. Mic, et al., “Harvest: A Scalable, Customizable Discovery and Access System,” Tech. Report CU-CS-732-94, Dept. Comp. Sci., U. of. Colorado—Boulder, original date Aug. 1994, revised Mar. 1995, pp. 1-29. |
Brisco, T., “DNS Support for Load Balancing,” The Internet Engineering Task Force (IETF), RFC 1794, Apr. 1995, pp. 1-7. |
Browne, Shirley et al., “Location-Independent Naming for Virtual Distributed Software Repositories,” Nov. 11, 1994, printed from http:/www.netlib.org/utk/papers/lifn/main.html on Mar. 22, 2006, 18 pages. |
Browne, Shirley et al., “Location-Independent Naming for Virtual Distributed Software Repositories,” Univ. of Tennessee, Dept. Comp. Sci., Feb. 1995, also in ACM-SIGSOFT 1995 Symp. on Software Reusability, Seattle, Wash. Apr. 1995, 7 pages. |
Campbell, M., “The Design of Text Signatures for Text Retrieval Systems,” Tech. Report, Sep. 5, 1994, Deakin University, School of Computing & Math., Geelong, Australia. |
Carter, J. Lawrence, et al. “Universal Classes of Hash Functions.” Journal of Computer and System Sciences, vol. 18, No. 2, Apr. 1979, pp. 143-154. |
Chang, W. W. et al., “A signature access method for the Starburst database system,” in Proc. 15th Int'l Conf. on Very Large Data Bases (Amsterdam, The Netherlands), pp. 145-153, 1989. |
Changes to Mar. 23, 2007 Deposition of Robert B. K. Dewar, in C.D. Cal. case No. CV 06-5086 SJO (Ex) [3 pgs + cover letter.]. |
Charnes, C., et al., Linear Nonequivalence versus Nonlinearity, pp. 156-164, Advances in Cryptology—AUSCRYPT '92, Workshop on the Theory and Application of Cryptographic Techniques, Queensland, Australia, Dec. 13-16, 1992, Proc. LNCS 718 Springer 1993, ISBN 3-540-57220-1. |
Cheriton, David R. and Mann, Timothy P., “Decentralizing a global naming service for improved performance and fault tolerance”, ACM Transactions on Computer Systems, vol. 7, No. 2, May 1989, pp. 147-183. |
Civil Minutes General dated Jan. 25, 2005, from case No. CV 04-7456-JFW (CTx) [2 pgs.]. |
Clifford Lynch (Calur@uccmvsa.bitnet), “ietf url/uri overview draft paper (long)”, www.acl.lanl.gov/URI/archive/uri-93q1.messages/0015.html, Mar. 25, 1993. |
Cohen, Bram, Incentives Build Robustness in BitTorrent, May 22, 2003 www.bittorrent.org/ bittorrentecon.pdf. |
Communication from EPO in European Application No. 96 910 762.2-1225 dated May 8, 2009 [4 pgs.]. |
Communication pursuant to Article 96(2) EPC from EPO (Examination Report), Jan. 17, 2007, in Application No. EP 96 910 762.2-1225 [1 pg. with 5 pg. annex]. |
Complaint for Patent Infringement, Permanent Injunction and Damages, Aug. 8, 2006, in C.D. Cal. case No. CV 06-5086 SJO (Ex) [11 pgs.]. |
Complaint for Patent Infringement, Permanent Injunction and Damages, filed Sep. 21, 2007 in C.D. Cal. Case No. CV 07-06161 VBF (PLAx) [10 pgs.]. |
Complaint for Patent Infringement, Permanent Injunction, and Damages, Sep. 8, 2004, from case No. CV 04-7456 JFW (AJWx) [18 pgs.]. |
Cormen, Thomas H., et al. Introduction to Algorithms, The MIT Press, Cambridge, Massachusetts, 1994, pp. 219-243, 991-993. |
CWIS' Opening Markman Brief Construing the Terms at Issue in U.S. Patent No. 6,415,280, dated Jul. 25, 2003, from case No. 02-11430 RWZ [15 pgs.]. |
CWIS' Reply Markman Brief Construing the Terms at Issue in U.S. Patent No. 6,415,280, dated Aug. 15, 2003, from case No. 02-11430 RWZ [15 pgs.]. |
Damiani, Ernesto, at al , A Reputation-Based Approach for Choosing Reliable Resources in Peer-to-Peer Networks, CCS '02, Nov. 18-22, 2002, Washington, DC, pp. 207-216. |
Danzig, P.B., et al., “Distributed Indexing: A Scalable Mechanism for Distributed Information Retrieval,” Proc. 14th Annual Int'l ACM SIGIR Conf. on Research and Development in Information Retrieval, pp. 220-229, Oct. 13-16, 1991. |
Davis, James R., “A Server for a Distributed Digital Technical Report Library,” Jan. 15, 1994, pp. 1-8. |
Declaration of Charles S. Baker in Support of Defendant Lime Wire's Motion to Stay Pending Reexamination of Patent and Request for Extension of Deadlines, Aug. 29, 2008, in C.D. Cal. Case No. CV 07-06161 VBF (PLAx) [2 pgs.]. |
Declaration of Robert B.K. Dewar in Support of CWIS' Construction of the Terms at Issue in U.S. Patent No. 6,415,280, dated Jul. 25, 2003, from case No. 02-cv-11430RWZ. |
Deering, Stephen, et al. “Multicast Routing in Datagram Internetworks and Extended LANs.” ACM Transactions on Computer Systems, vol. 8, No. 2, May 1990, pp. 85-110. |
Defendant Digital Island's Opening Brief on Claim Construction Issues dated Aug. 17, 2001, from case No. 00-cv-11851-RWZ [30 pgs.]. |
Defendant Lime Wire, LLC's Answer, Affirmative Defenses and Counterclaims dated Nov. 15, 2007, from case No. 07-06161 VBF (PLAx). |
Defendant Lime Wire, LLC's First Amended Answer, Affirmative Defenses and Counterclaims, Oct. 2, 2008, C.D. Cal. case No. 07-06161 VBF (PLAx) [13 pgs.]. |
Defendant Lime Wire, LLC's Second Amended Answer, Affirmative Defenses and Counterclaims, Oct. 27, 2008, from C.D. Cal. case No. 07-06161 VBF (PLAx) [13 pgs.]. |
Defendant Media Sentry, Inc.'s Reply Memorandum of Points and Authorities in Further Support of Its Motion to Dismiss, dated Nov. 15, 2004, from case No. CV04-7456 JFW (CTx) [12 pgs.]. |
Defendant MediaSentry Inc.'s Notice of Motion and Motion to Dismiss First Amended Complaint; Memorandum of Points and Authorities in Support Thereof, dated Dec. 13, 2004, from case No. CV04-7456 JFW (CTx) [29 pgs.]. |
Defendant MediaSentry, Inc.'s Answer to Plaintiffs' First Amended Complaint and Counterclaims, dated Feb. 8, 2005, from case No. CV04-7456 JFW (CTx) [28 pgs.]. |
Defendant Michael Weiss's Answer to Plaintiffs Complaint for Patent Infringement, Permanent Injunction and Damages; Demand for Jury Trial, Sep. 15, 2006, case No. CV 06-5086 SJO (Ex) [10 pgs.]. |
Defendant Recording Industry Association of America's Amended Notice of Motion and Motion for Partial Summary Judgment on Plaintiffs' Claims for Patent Infringement and Inducing Patent Infringement; Memorandum of Points and Authorities, May 22, 2006, redacted, original confidential, filed under seal, in C.D. Cal. case No. CV 04-7456 JFW (CTx) [19 pgs.]. |
Defendant Recording Industry Association of America's and Mediasentry, Inc.'s Notice of Motion and Motion for Partial Summary Judgment Based on Implied License or, In the Alternative, Based on Patent Misuse and Unclean Hands, May 22, 2006, Redacted, in C.D. Cal. case No. CV 04-7456 JFW (CTx) [21 pgs.]. |
Defendant Recording Industry Association of America's and Mediasentry, Inc's Notice of Motion and Motion for Partial Summary Judgment Based on Implied License or, In the Alternative, Based on Patent Misuse and Unclean Hands, May 8, 2006, in C.D. Cal. case No. CV 04-7456 JFW (CTx) [20 pgs.]. |
Defendant RIAA's Notice of Motion and Motion to Dismiss First Amended Complaint; Memorandum of Points and Authorities in Support Thereof, dated Dec. 13, 2004, from case No. CV04-7456 JFW (CTx) [33 pgs.]. |
Defendant StreamCast Networks Inc.'s Answer to Plaintiffs Complaint for Patent Infringement, Permanent Injunction and Damages; Demand for Jury Trial, Sep. 5, 2006, C.D. Cal. case No. CV 06-5086 SJO (Ex) [10 pgs.]. |
Defendants' Amended Preliminary Claim Constructions [Patent Rule 4-2], filed Feb. 7, 2007 in C.D. Cal. case No. CV 06-5086 SJO (Ex) [10 pgs.]. |
Defendants Loudeye Corp.'s and Overpeer, Inc.'s Answer to Plaintiffs' First Amended Complaint and Counterclaim, Feb. 8, 2005, in C.D. Cal. case No. CV 04-7456 [28 pgs.]. |
Defendants' Preliminary Invalidity Contentions, Dec. 14, 2006, in C.D. Cal. case No. CV 06-5086 SJO (Ex) [47 pgs.]. |
Defendant's Second Amended Preliminary Claim Constructions [Patent Rule 4-2], filed Feb. 9, 2007 in C.D. Cal. case No. CV 06-5086 SJO (Ex) [10 pgs.]. |
den Boer, B., et al., Collisions for the compression function of MD5, In Advances in Cryptology, Proc. EUROCRYPT '93, pp. 292-304, 1994. |
Deutsch, Peter (peterd@bunyip.com), “Re: MD5 and LiFNs (was: Misc Comments)”, www.acl.lanl.gov/URI/archive/uri-94q2.messages/0106.html, Apr. 26, 1994. |
Devine, Robert. “Design and Implementation of DDH: A Distributed Dynamic Hashing Algorithm.” In Proc. of 4th International Conference on Foundations of Data Organizations and Algorithms, 1993, pp. 101-114. |
Dewar, Rebuttal Expert Report of Robert B.K. Dewar, in C.D. Cal. case No. CV 04 -7456 JFW (CTx), Apr. 10, 2006 [87 pgs]. |
European Search Report issued Dec. 23, 2004 in correpsonding European Application No. 96910762.2-2201. |
Faloutsos, C. “Access methods for text,” ACM Comput. Surv. 17, 1 (Mar. 1985), 49-74. |
Faloutsos, C. et al., “Description and performance analysis of signature file methods for office filing,” ACM Trans. Inf. Syst. 5, 3 (Jul. 1987), 237-257. |
Faloutsos, C. et al., “Signature files: an access method for documents and its analytical performance evaluation,” ACM Trans. Inf. Syst. 2, 4 (Oct. 1984), 267-288. |
Falstrom, P. et al., RFC 1914, “How to Interact with a Whois++ Mesh,” The Internet Engineering Task Force (IETF), Network Working Group, Feb. 1996, pp. 1-10. |
Federal Information Processing Standards (FIPS) Publication 180-1; Secure Hash Standard, Apr. 17, 1995 [17 pgs.]. |
Feeley, Michael, et al. “Implementing Global Memory Management in a Workstation Cluster.” In Proc. of the 15th ACM Symp. on Operating Systems Principles, 1995, pp. 201-212. |
Feigenbaum, J. et al., “Cryptographic protection of databases and software,” in Distributed Computing and Cryptography: Proc. DIMACS Workshop, Apr. 1991, pp. 161-172, American Mathematical Society, Boston, Mass. |
Fielding, R. et al., RFC 2068, “Hypertext Transfer Protocol—HTTP/1.1,” The Internet Engineering Task Force (IETF), Network Working Group, Jan. 1997, pp. 1-163. |
Fielding, R. et al., RFC 2616, “Hypertext Transfer Protocol—HTTP/1.1,” The Internet Engineering Task Force (IETF), Network Working Group, Jun. 1999, pp. 1-176. |
First Amended Answer of Defendant Mediasentry to Second Amended Complaint and Counterclaim, Apr. 24, 2006, in C.D. Cal. case No. CV 04-7456 JFW (CTx) [29 pgs.]. |
First Amended Answer of Defendant RIAA to Second Amended Complaint and Counterclaim, Apr. 24, 2006, in C.D. Cal. Case No. CV 04-7456 JFW (CTx) [27 pgs.]. |
First Amended Complaint for Patent Infringement, Permanent Injunction and Damages, filed Sep. 8, 2008 in C.D. Cal. Case No. CV 07-06161 VBF (PLAx) [10 pgs.]. |
First Amended Complaint for Patent Infringement, Permanent Injunction and Damages, in C.D. Cal. case No. CV 04-7456 JFW (CTx), Nov. 24, 2004 [28 pgs.]. |
Floyd, Sally, et al. “A reliable Multicast Framework for Light-Weight Sessions and Application Level Framing.” In Proceeding of ACM SIGCOMM '95, pp. 342-356, 1995. |
Fowler, et al. “A User-Level Replicated File System,” AT&T Bell Laboratories Technical Memorandum 0112670-930414-05, Apr. 1993, and USENIX 1993 Summer Conference Proceedings, Cincinnati, OH, Jun. 1993. |
Fredman, Michael, et al. “Storing a Sparse Table with 0(1) Worst Case Access Time.” Journal of the Association for Computing Machinery, vol. 31, No. 3, Jul. 1984, pp. 538-544. |
Friedman, G.L., Digital Camera With Apparatus for Authentication of Images Produced From an Image File, NASA Case No. NPO-19108-1-CU, U.S. Appl. No. 08/159,980, Nov. 24, 1993. |
Greene, D., et al., “Multi-Index Hashing for Information Retrieval”, Nov. 20-22, 1994, Proceedings, 35th Annual Symp on Foundations of Computer Science, IEEE, pp. 722-731. |
Grigni, Michelangelo, et al. “Tight Bounds on Minimum Broadcasts Networks.” SIAM Journal of Discrete Mathematics, vol. 4, No. 2, May 1991, pp. 207-222. |
Gwertzman, James, et al. “The Case for Geographical Push-Caching.” Technical Report HU TR 34-94 (excerpt), Harvard University, DAS, Cambridge, MA 02138, 1994, 2 pgs. |
H. Goodman, Feb. 9, 1994 Ada, Object-Oriented Techniques, and Concurrency in Teaching Data Sructures and File Management Report Documentation P. AD-A275 385-94-04277. |
Harrison, M. C., “Implementation of the substring test by hashing,” Commun. ACM 14, Dec. 12, 1971, 777-779. |
Hauzeur, B. M., “A Model for Naming, Addressing, and Routing,” ACM Trans. Inf. Syst. 4, Oct. 4, 1986), 293-311. |
Helm, Burt, A Hard Ride for eDonkey, Oct. 24, 2005, Business Week Online, http://www. businessweek—com/print/magazine/content/05—43/b3956115htm?chanegI. |
Hirano, et al, “Extendible hashing for concurrent insertions and retrievals,” in Proc 4th Euromicro Workshop on Parallel and Distributed Processing, 1996 (PDP '96), Jan. 24, 1996 to Jan. 26, 1996, pp. 235-242, Braga , Portugal. |
Horowitz, Expert Report of Professor Ellis Horowitz, Mar. 13, 2006, in C.D. Cal. case No. CV 04-7456 JFW (CTx) [185 pgs.]. |
IEEE, The Authoritative Dictionary of IEEE Standards Terms, 7th ed., Copyright 2000, pp. 107, 176, 209, 240, 241, 432, 468, 505, 506, 682, 1016, 1113, 1266, and 1267. |
International Search Report dated Jun. 24, 1996 in international application PCT/US1996/004733. |
Ishikawa, Y., et al., “Evaluation of signature files as set access facilities in OODBs,” In Proc. of the 1993 ACM SIGMOD Inter. Conf. on Management of Data (Washington, D.C., U.S., May 1993). P. Buneman & S. Jajodia, Eds. SIGMOD '93. ACM, NY, NY, 247-256. |
Joint Claim Construction and Prehearing Statement, N.D. Cal. Rule 4-3, Feb. 12, 2007, in C.D. Cal. case No. CV 06-5086 SJO (Ex) [20 pgs.]. |
Karp, R. M. and Rabin, M. O., “Efficient randomized pattern-matching algorithms,” IBM J. Res. Dev. 31, Mar. 2, 1987, 249-260. |
Khare, R. and Lawrence, S., RFC 2817, “Upgrading to TLS Within HTTP/1.1,” The Internet Engineering Task Force (IETF), May 2000, pp. 1-12. |
Khoshafian, S. N. et al. 1986. Object identity. In Conf. Proc. on Object-Oriented Programming Systems, Languages and Applications (Portland, Oregon, United States, Sep. 29-Oct. 2, 1986). N. Meyrowitz, Ed. OOPLSA '86. ACM Press, New York, NY, 406-416. |
Kim et al., “Experiences with Tripwire: Using Integrity Checkers for Intrusion Detection”, COAST Labs. Dept. of Computer Sciences Purdue University, Feb. 22, 1995, pp. 1-12. |
Kim et al., “The Design and Implementation of Tripwire: A file System Integrity Checker”, COAST Labs. Dept. of Computer Sciences Purdue University, Feb. 23, 1995, pp. 1-18. |
Kim et al., “The Design and Implementation of Tripwire: A file System Integrity Checker”, COAST Labs. Dept. of Computer Sciences Purdue University, Nov. 19, 1993, pp. 1-21. |
Kim, Gene H., and Spafford, Eugene H., “Writing, Supporting, and Evaluating Tripwire: A Publicly Available Security Tool.” COAST Labs. Dept. of Computer Sciences Purdue University, Mar. 12, 1994, pp. 1-23. |
Kitsuregawa, M.; Tanaka, H.; Moto-Oka, T. (Mar. 1983). “Application of Hash to Data Base Machine and Its Architecture”. New Generation Computing 1 (1): 63-74, OHMSHA, Ltd. and Springer-Verlag. |
Knuth, D. E., “The Art of Computer Programming,” 1973, vol. 3 “Sorting and Searching,” Ch. 6.4 “Hashing,” pp. 506-549. |
Kumar, Vijay, A Concurrency Control Mechanism Based on Extendible Hashing for Main Memory Database Systems, ACM, vol. 3, 1989, pp. 109-113. |
Langer, A. (cmf851@anu.oz.au), http://groups.google.com/groups?selm=1991Aug7.225159.786%40newshost.anu. edu.au&oe=UTF-8&output=gplain, Aug. 7, 1991. |
Lantz, K. A., et al., “Towards a universal directory service.” In Proc. 4th Annual ACM Symp. on Principles of Distributed Computing (Minaki, Ontario, Canada). PODC '85. ACM Press, New York, NY, 250-260, 1985. |
Leach, P. J., et al.. The file system of an integrated local network. In Proc. 1985 ACM 13th Annual Conf. on Comp. Sci. CSC '85. ACM Press, NY, NY, 309-324. |
Leach, P.J., et al., “UIDs as Internal Names in a Distributed File System,” In Proc. 1st ACM SIGACT-SIGOPS Symp. on Principles of Distributed Computing (Ottawa, Canada, Aug. 18-20, 1982). PODC '82. ACM Press, New York, NY, 34-41. |
List of Asserted Claims and Infringement Chart for Each Asserted Claim, Jul. 28, 2008, in C.D. Cal. Case No. CV 07-06161 VBF (PLAx) [31 pgs.]. |
Ma, C. 1992. On building very large naming systems. In Proc. 5th Workshop on ACM SIGOPS European Workshop: Models and Paradigms for Distributed Systems Structuring (France, Sep. 21-23, 1992). EW 5. ACM Press, New York, NY, 1-5. |
McGregor D. R. and Mariani, J. A. “Fingerprinting—A technique for file identification and maintenance,” Software: Practice and Experience, vol. 12, No. 12, Dec. 1982, pp. 1165-1166. |
Memorandum of Points and Authorities in Support of Loudeye's and Overpeer's Motion to Dismiss the First Amended Complaint for Failure to State a Claim or, In the Alternative, for a More Definitive Statement, dated Dec. 13, 2004, from case No. CV-04-7456 JFW (AJWX) [30 pgs.]. |
Ming-Ling Lo et al., On Optimal Processor Allocation to Support Pipelined Hash Joins, ACM SIGMOD, pp. 69-78, May 1993. |
Moats, R., RFC 2141, “URN Syntax,” The Internet Engineering Task Force (IETF), Network Working Group, May 1997, pp. 1-8. |
Mossinghoff, Expert Report of the Honorable Gerald J. Mossinghoff, Mar. 13, 2006, from C.D. Cal. case No. 04-7456 JFW (CTx) [52 pgs.]. |
Murlidhar Koushik, Dynamic Hashing With Distributed Overflow Space: A File Organization With Good Insertion Performance, 1993, Info. Sys., vol. 18, No. 5, pp. 299-317. |
Myers, J. and Rose, M., RFC 1864, “The Content-MD5 Header Field,” The Internet Engineering Task Force (IETF), Oct. 1995, pp. 1-4. |
Naor, Moni, et al. “The Load, Capacity and Availability of Quorum Systems.” In Proceedings of the 35th IEEE Symposium on Foundations of Computer Science, Nov. 1994, pp. 214-225. |
Nejdl, Wolfgang, et al., Super-Peer-Based Routing and Clustering Strategies for RDF-Based Peer-To-Peer Networks, Wi'VW2003, May 20-24, 2903, Budapest, Hungary, pp. 536-543. |
Nisan, Noam. “Psuedorandom Generators for Space-Bounded Computation.” In Proceedings of the Twenty-Second Annual ACM Symposium on Theory of Computing, May 1990, pp. 204-212. |
Notice of Interested Parties, filed Sep. 21, 2007 in C.D. Cal. Case No. CV 07-06161 VBF (PLAx) [2 pgs.]. |
Notice of Motion and Motion of Defendant Lime Wire to Stay Litigation Pending Reexamination of Patent and Request for Extension of Deadlines, Sep. 22, 2008, C.D. Cal. Case No. CV 07-06161 VBF (PLAx) [11 pgs.]. |
Notice of Related Cases, filed Sep. 21, 2007 in C.D. Cal. Case No. CV 07-06161 VBF (PLAx) [2 pgs.]. |
Office Action in Japanese Application No. 531,073/1996 mailed on Apr. 25, 2006 [unofficial translation, 4 pgs.]. |
Office Communication in European Application No. 96910762.2-1225 dated Jan. 17, 2007 [6 pgs.]. |
Order Re Claim Construction dated Nov. 8, 2001, from case No. 00-11851-RWZ [2 pgs.]. |
Palmer, Mark, et al. “Fido: A Cache that Learns to Fetch.” In Proceedings of the 17th International Conference on Very Large Data Bases, Sep. 1991, pp. 255-264. |
Panagopoulos, G., et al., “Bit-sliced signature files for very large text databases on a parallel machine architecture,” In Proc. of the 4th Inter. Conf. on Extending Database Technology (EDBT), Cambridge, U.K., Mar. 1994, pp. 379-392 (Proc. LNCS 779 Springer 1994, ISBN 3-540-57818-8) [14 pgs.]. |
Patent Abstract, “Management System for Plural Versions,” Pub. No. 63273961 A, published Nov. 11, 1988, NEC Corp. |
Patent Abstracts of Japan, “Data Processor,” Appln. No. 05135620, filed Jun. 7, 1993, Toshiba Corp. |
Patent Abstracts of Japan, “Device for Generating Database and Method for the Same,” Application No. 03-080504, Sun Microsyst. Inc., published Jun. 1993, 38 pages. |
Patent Abstracts of Japan, “Electronic Mail Multiplexing System and Communication Control Method in The System.” Jun. 30, 1993, JP 05162529. |
Patent Abstracts of Japan, “Method for Registering and Retrieving Data Base,” Application No. 03-187303, Nippon Telegr. & Teleph. Corp., published Feb. 1993, 11 pages. |
Peleg, David, et al. “The Availability of Quorum Systems.” Information and Computation 123, 1995, 210-223. |
Peterson, L. L. 1988. A yellow-pages service for a local-area network. In Proc. ACM Workshop on Frontiers in Computer Communications Technology (Vermont, 1987). J. J. Garcia-Luna-Aceves, Ed. SIGCOMM '87. ACM Press, New York, NY, 235-242. |
Pfitzman, Birgit, Sorting Out Signature Schemes, Nov. 1993, 1st Conf. Computer & Comm. Security '93 pp. 74-85. |
Plaintiff Kinetech, Inc.'s Responses to Defendant Mediasentry's First set of Interrogatories, May 1, 2006, in C.D. Cal. Case No. CV 04-7456 JFW (CTx) [14 pgs.]. |
Plaintiff-Counterclaim Defendant Altnet, Inc.'s Supplemental Responses to Defendant-Counterclaim Plaintiff Overpeer Inc.'s First Set of Interrogatories, Mar. 8, 2006, redacted, in C.D. Cal. case No. CV 04-7456 JFW (CTx) [24 pgs.]. |
Plaintiff-Counterclaim Defendant Brilliant Digital Entertainment, Inc.'s Supplemental Responses to Defendant-Counterclaim Plaintiff Overpeer Inc.'s First Set of Interrogatories, Mar. 8, 2006, redacted, in C.D. Cal. case No. CV 04-7456 JFW (CTx) [24 pgs.]. |
Plaintiff-Counterclaim Defendant Kinetech, Inc.'s Supplemental Responses to Defendant-Counterclaim Plaintiff Overpeer Inc.'s First Set of Interrogatories Mar. 8, 2006, redacted, in C.D. Cal. case No. CV 04-7456 JFW (CTx) [24 pgs.]. |
Plaintiffs Altnet, Inc., Brilliant Digital, Inc., and Kinetech, Inc.'s Responses to Defendant Recording Industry Association of America's First Set of Requests for Admissions, Jan. 6, 2006, in C.D. Cal. case No. CV 04-7456 JFW (CTx) [26 pgs.]. |
Plaintiffs' Claim Construction Opening Brief and Exhibits A-D, F, G; May 7, 2007, in C.D. Cal. case No. CV 06-5086 SJO (Ex) [112 pgs.]. |
Plaintiffs' Memorandum of Points and Authorities in Opposition to Loudeye Defendants' Motion to Dismiss, dated Nov. 8, 2004, from case No. CV-04-7456 JFW (AJWX) [29 pgs.]. |
Plaintiffs' Opposition to Media Sentry's Motion to Dismiss; Memorandum of Points and Authorities in Support Thereof, dated Nov. 22, 2004, from case No. CV 04-7456 JFW (CTx) [22 pgs.]. |
Plaintiff's Opposition to Recording Industry Association of America's Motion to Dismiss; Memorandum of Points and Authorities in Support Thereof, dated Nov. 22, 2004, from case No. CV-04-7456 JFW (CTx). |
Plaintiffs' Preliminary Claim Constructions and Extrinsic Evidence, Feb. 6, 2006, in case CV 06-5086 SJO(Ex) [20 pgs.]. |
Plaintiff's Reply to Defendant Mediasentry's Counterclaims in its Answer to the Second Amended Complaint, May 1, 2006, in C.D. Cal. Case No. CV 04-7456 JFW (CTx) [11 pgs.]. |
Plaintiffs Reply to Defendant Mediasentry's Counterclaims, Mar. 3, 2005, in C.D. Cal. case No. CV 04-7456 JFW (CTx) [8 pgs.]. |
Plaintiff's Reply to Defendant RIAA's Counterclaims in its Answer to the Second Amended Complaint, May 1, 2006, in C.D. Cal. case No. CV 04-7456 JFW (CTx) [11 pgs.]. |
Plaintiffs Reply to Defendant RIAA's Counterclaims, Mar. 3, 2005, in C.D. Cal. Case No. CV 04-7456 JFW (CTx) [8 pgs.]. |
Plaintiffs' Reply to Defendants' Claim Construction Brief, filed Apr. 23, 2007 in C.D. Cal. case No. CV 06-5086 ODW (Ex) [15 pgs.]. |
Plaintiff's Reply to Defendants Loudeye Corp.'s and Overpeer, Inc.'s Counterclaims, Mar. 3, 2005, in C.D. Cal. case No. CV 04-7456 JFW (CTx) [8 pgs.]. |
Preneel et al., “The Cryptographic Hash Function RIPEMD-160”, appeared in CryptoBytes RSA Laboratories, vol. 3, No. 2, pp. 9-14, Fall, 1997 (also Bosselaers et al., “The RIPEMD-160 Cryptographic Hash Function”, Jan. 1997, Dr. Dobb's Journal, pp. 24-28). |
Proceedings of the 1993 ACM SIGMOD International Conference on Management of Data, vol. 22, Issue 2, Jun. 1993. |
Prusker et al., “The Siphon: Managing Distant Replicated Repositories” Nov. 8-9, 1990, Proc. Management of Replicated Data IEEE. |
Rabin, Michael. “Efficient Dispersal of Information for Security, Load Balancing, and Fault Tolerance.” Journal of the ACM, vol. 36, No. 2, Apr. 1989, pp. 335-348. |
Ravi, R., “Rapid Rumor Ramification: Approximating the Minimum Broadcast Time.” In Proc. of the 35th IEEE Symp. on Foundation of Computer Science, Nov. 1994, pp. 202-213. |
Ravindran, K. and Ramakrishnan, K. K. 1991. A naming system for feature-based service specification in distributed operating systems. SIGSMALL/PC Notes 17, Sep. 3-4, 1991, 12-21. |
Reed Wade (wade@cs.utk.edu), “re: Dienst and BFD/LIFN emails,” Aug. 8, 1994, printed from http://www.webhistory.org/www.lists/www-talk1994q3/0416.html on Mar. 22, 2006, (7 pages). |
Reply to Examination Report, Jul. 19, 2007, in Application No. EP 96 910 762.2-1225 [7 pgs.]. |
Reply to Examination Report, Munich, Nov. 18, 2009, in Application No. EP 96 910 762.2 [19 pgs.]. |
Request for Reexamination of U.S. Patent No. 6,928,442: Reexam Control No. 90/010,260, filed on Aug. 29, 2008. |
Response to Non-Final Office Action filed May 19, 2009 in U.S. Appl. No. 11/017,650 [19 pgs.]. |
Rich, K. et al, “Hobgoblin: A File and Directory Auditor”, Sep. 30-Oct. 3, 1991, Lisa V., San Diego, CA. |
Rivest, R., RFC 1320, “The MD4 Message-Digest Algorithm,” The Internet Engineering Task Force (IETF), Apr. 1992. |
Rivest, R., RFC 1321, “The MD5 Message-Digest Algorithm,” The Internet Engineering Task Force (IETF), Apr. 1992, pp. 1-19 and errata sheet (1 page). |
Rose, M., RFC 1544, “The Content-MD5 Header Field,” The Internet Engineering Task Force (IETF), Nov. 1993, pp. 1-3. |
Ross, K., “Hash-Routing for Collections of Shared Web Caches,” IEEE Network Magazine, pp. 37-44, Nov.-Dec. 1997. |
Sacks-Davis, R., et al., “Multikey access methods based on superimposed coding techniques,” ACM Trans. Database Syst. 12, Nov. 4, 1987, 655-696. |
Sakti Pramanik et al., Multi-Directory Hasing, 1993, Info. Sys., vol. 18, No. 1, pp. 63-74. |
Schmidt, Jeanette, et al. “Chernoff-Hoeffding Bounds for Applications with Limited Independence.” In Proceedings of the 4th ACS-SIAM Symposium on Discrete Algorithms, 1993, pp. 331-340. |
Schneier, B., “One-Way Hash Functions, Using Crypographic Algorithms for Hashing,” 1991, printed from http://202.179135.4/data/DDJ/articles/1991/9109/91909g/9109g.htm on Mar. 22, 2006 [9 pgs.]. |
Schwartz, M., et al. 1987. A name service for evolving heterogeneous systems. In Proc. 11th ACM Symp. on OS Principles (Texas, Nov. 8-11, 1987). SOSP '87. ACM Press, NY, NY, 52-62. |
Shaheen-Gouda, A. and Loucks, L. 1992. Name borders. In Proc. 5th Workshop on ACM SIGOPS European Workshop: Models and Paradigms for Distributed Systems Structuring (Mont Saint-Michel, France, Sep. 21-23, 1992). EW 5. ACM Press, NY, NY, 1-6. |
Siegel, A., et al., “Deceit: a Flexible Distributed File System,” Proc. Workshop on the Management of Replicated Data, Houston, TX, pp. 15-17, Nov. 8-9, 1990. |
Siegel, A., et al., “Deceit: a Flexible Distributed File System,” Technical Report, TR89-1042, Cornell University, Nov. 1989. |
SIGCOMM'01. Aug. 27-31, 2001, San Diego, California, USA, pp. 149-160. |
Sollins, K. et al., RFC 1737, “Functional Requirements for Uniform Resource Names”, www.w3.org/Addressing/rfc1737.txt, The Internet Engineering Task Force (IETF), Dec. 1994, pp. 1-7. |
Stipulation and Proposed order to (1) Amend the Complaint, (2) Amend pretrial Schedule, and (3) Withdraw Motion to Stay, filed Sep. 8, 2008 in C.D. Cal. Case No. CV 07-06161 VBF (PLAx) [6 pgs.]. |
Stoica, Ion et al., Chord. A Scalable Peer-to-peer Lookup Service for Internet Applications, SIGCOMM 2001, San Diego, CA, pp. 149-160. |
Streamcast Networks Inc.'s Supplemental Responses to Certain of Plaintiffs' First Set of Interrogatories, Apr. 16, 2007, in C.D. Cal. case No. CV 06-5086 SJO (Ex) [61 pgs.]. |
StreamCast's Brief Re Claim Construction, Apr. 12, 2007, in C.D. Cal. case No. CB 06-5086 SJO (Ex) [11 pgs.]. |
Sun Microsystems, Inc., RFC 1094, “NFS: Network File System Protocol Specification,” The Internet Engineering Task Force (IETF), Mar. 1989, pp. 1-27. |
Tarjan, Robert Endre, et al. “Storing a Sparse Table.” Communications of the ACM, vol. 22, No. 11, Nov. 1979, pp. 606-611. |
Terry, D. B. 1984. An analysis of naming conventions for distributed computer systems. In Proc. ACM SIGCOMM Symp. on Communications Architectures and Protocols: Tutorials & Symp. SIGCOMM '84. ACM Press, NY, NY, 218-224. |
Thompson, Clive, The BitTorrent Effect, Wired Magazine, Jan. 2005, htto-//wwwwired.com/wired/ archive/13.01/bittorrent—prhtml. |
Transcript of Deposition of David Farber, Feb. 16, 2006, in C.D. Cal. case No. CV 04-7456 JFW (CTx) [94 pgs.]. |
Transcript of Deposition of Robert B. K. Dewar, Mar. 23, 2007, in C.D. Cal. case No. CV 06-5086 SJO (Ex) [61 pgs.]. |
Transcript of Deposition of Ronald Lachman, Feb. 1, 2006, C.D. Cal. case No. CV 04-7456 JFW (CTx) [96 pgs.]. |
Truelove, Kelly, Gnutelia and the Transient Web, Mar. 22, 2001, http://vvww.openp2p.com/Ipt/a/ 705. |
U.S. Appl. No. 11/428,321—May 10, 2010 PTO Office Action. |
U.S. Appl. No. 11/428,321—Jan. 19, 2011 PTO Office Action. |
U.S. Appl. No. 11/428,321—Jul. 11, 2011 PTO Office Action. |
USPTO Final Office Action in U.S. Appl. No. 10/742,972, Dec. 22, 2009. |
USPTO, Advisory Action, Mar. 23, 2010, in U.S. Appl. No. 11/980,679. |
USPTO, Final Office Action in U.S. Reexam Control No. 90/010,260, Jan. 29, 2010. |
USPTO, Final Office Action mailed Jan. 12, 2010 in U.S. Appl. No. 11/980,679. |
USPTO, Final Office Action mailed Aug. 18, 2009 in U.S. Appl. No. 11/017,650. |
USPTO, Final Office Action mailed Sep. 30, 2009 in U.S. Apln. No. 11/724,232. |
USPTO, Final Office Action, Mar. 5, 2010 in U.S. Appl. No. 11/980,687. |
USPTO, Non-Final Office Action in U.S. Appl. No. 11/980,677, Jun. 4, 2010. |
USPTO, Non-Final Office Action mailed May 6, 2009 in U.S. Appl. No. 11/980,679. |
USPTO, Non-Final Office action mailed Jun. 15, 2009 in U.S. Appl. No. 11/980,687. |
USPTO, Non-Final Office action mailed Jun. 18, 2009 in Reexam No. 90/010,260. |
USPTO, Non-Final Office Action mailed Jul. 2, 2010 in U.S. Appl. No. 11/980,688. |
USPTO, Non-Final Office Action mailed Aug. 6, 2009 in U.S. Appl. No. 11/428,321. |
USPTO, Notice of Allowance mailed Apr. 30, 2010 in U.S. Appl. No. 11/980,687. |
USPTO, Notice of Allowance mailed Jun. 24, 2010 in U.S. Appl. No. 11/980,687. |
USPTO, Supplemental Notice of Allowability mailed May 27, 2010 in U.S. Appl. No. 11/980,687. |
USPTO, U.S. Reexam Control No. 90/010,260, Notice of Intent to Issue Ex Parte Reexamination Certificate, Apr. 8, 2010. |
Vincenzetti, D. et al., “Anti Tampering Program,” Proc. Fourth {USENIX} Security Symp. , Santa Clara, (USENIX Association) CA, Oct. 1993, 11 pages. |
Vincenzetti, D. et al., “Anti Tampering Program,” Proc. Fourth {USENIX} Security Symp., Santa Clara, CA, Oct. 1993, printed from http://www.ja.net/CERI/Vincenzetti—and—Cotrozzi/ATP—Anti—Tamp on Mar. 22, 2006, (USENIX Association) 8 pgs. |
Vitter, Jeffrey Scott, et al. “Optimal Prefetching via Data Compression.”In Proceedings of 32nd IEEE Symposium on Foundations of Computer Science, Nov. 1991, pp. 121-130. |
W1nslet, Marianne at al., PeerAccess: A Logic for Distributed Authorization, CCS'05, Nov. 7-11, 2005, Alexandria, Virginia, pp. 168-179. |
W3C:ID, HTTP: A protocol for networked information, “Basic HTTP as defined in 1992”, www.w3.org/Protocols/HTTP2.html, 1992. |
Wegman, Mark, et al. “New Hash Functions and Their Use in Authentication and Set Equality.” Journal of Computer and System Sciences vol. 22, Jun. 1981, pp. 265-279. |
William Perrizo, et al., Distributed Join Processing Performance Evaluation, 1994. Twenty-Seventh Hawaii International Conference on System Sciences, vol. II, pp. 236-244. |
WIPO, International Preliminary Examination Report (IPER), Jul. 1997, PCT/US96/04733 [5 pgs.]. |
Witold Litwin et al., Linear Hashing for Distributed Files, ACM SIGMOD, May 1993, pp. 327-336. |
Witold Litwin, et al., LH*—Linear Hashing for Distributed Files, HP Labs Tech. Report No. HPL-93-21 Jun. 1993 pp. 1-22. |
Yao, Andrew Chi-Chih. “Should Tables be Sorted?” Journal of the Association for Computing Machinery, vol. 28, No. 3, Jul. 1981, pp. 615-628. |
Zheng, Y., et al., Haval—A One-Way Hashing Algorithm with Variable Length of Output (Extended Abstract), pp. 83-105, Advances in Cryptology, AUSCRIPT '92, 1992. |
Zhiyu Tian, et al., A New Hashing Function: Statistical Behaviour and Algorithm, pp. 3-13, SIGIR Forum, Spring 1993. |
Number | Date | Country | |
---|---|---|---|
20120209966 A1 | Aug 2012 | US |
Number | Date | Country | |
---|---|---|---|
60782545 | Mar 2006 | US |
Number | Date | Country | |
---|---|---|---|
Parent | 11428321 | Jun 2006 | US |
Child | 13453069 | US |