Skip to main content

Full text of "USPTO Patents Application 09870801"

See other formats


InterTrust Tech. Corp. v, Microsoft Corp. 
Case No. C 0M640 SBA (MEJ) 


APPENDIX OF PRIOk ART* 






Yes 

Lacy, Jack; Snyder, James; Maher, David; "Music on the Internet and the 
Intellectual Property Protection Problem" 

y 

Yes 

'The PowerTV White Paper", powertv.com website, Oct. 11, 1996 

Y 

Yes 

Coutrot, Francois; Michon, Vincent; "A Single Conditional Access System for 
Satellite-Cable and Terrestrial TV" IEEE Transactions on Consumer Electronics, 
Vol. 35. No. 3. Aue. 1989 

Y 

Yes 

*1S0 8583: Financial transaction card originated messages - Interchange message 
specifications", ISO, Dec. 15, 1993 

Y 

Yes 

Harry, Jvieran; Ho, Linda; Lase otudy: lne V1£>A transaction Processing 
System", May 30, 1988 

Y 

Yes 

U.S. 4,584,639; Apr. 22, 1986 


Yes 

Denning, Dorothy E.; "Secure Personal Computing in an Insecure Network", 
Coram, of the ACM, Vol. 22, No. 8, Aug. 1979 


Yes 

Mufti c, Sead; "Security Mechnisms for Computer Networks", Computer 
Communications and Networking, 1989 

Y 

I Co 

Kim, Gene H.; Spafford, Eugene H.; "The Design and Implementation of Tripwire: 
A r*ne oystem integrity (_necJcer , UUA6 J JLaooratory, Purdue university, Nov. 
19, 1993 

Y 

Yes 

L-noucnury, ADnijit Jv.; MaxcmcnuK, mcnoJas Jr.; 1 aul, oanjoy; ocnuizrmne, 
Henning G.; "Copyright Protection for Electronic Publishing Over Computer 
Networks , IEEE Network, May/Jun., 1995 


Yes 

Denning. Dorothy E.R.: CrvptOTeranhv and Data Security. Addison- Wesley 
Publishing Company, 1982, Reprinted with corrections, Jan. 1983 


Yes 

Hellman; "Multi-user Cryptographic Techniques" 


Yes 

Diffle, Whitfield; Hellman, Martin E; "New Directions in Cryptography", Stanford 
University, 1976 

Y 

Yes 

Kohl, J.; Neuman, C; "The Kerberos Network Authentication Service (V5)\ 
Network Working Group RFC 1510, Sep. 1993 


Yes 

Diffie, Whitfield; van Oorschot, Paul C; Weiner, Michael J.; "Authentication and 
Authenticated Key Exchanges", Sun Microsystems and Bell-Northern Research, 
Mar. 6. 1992 


Yes 

Diffie, Whitfield; "The First Ten Years of Public-Key Cryptography", Proceedings 
of the EEEE, Vol, 76. No. 5, May, 1988 


Yes 

Kohnfelder, Loren M.; "Towards a Practical Public-Key Cryptosystem\ May, 
1978 


Yes 

Kaliski, Jr., Burton S.; "A Layman's Guide to a Subset of ASN.l , BER, and DER*\ 
RSA Laboratories Technical Note, 1991, Revised Nov. 1, 1993 

Y 

Yes 

"PKCS #7: Cryptographic Message Syntax Standard", RSA Laboratories Technical 
Note, Ver. 1 .5 , Revised Nov. 1 , 1 993 


Yes 

Walker, Stephen; "Notes from RSA Data Security Conference", Trusted 
Information Systems, Jan. 18, 1994 

Y 

Yes 

Tygar, J.D.; Yee, Bennet; "Cryptography: It's Not Just for Electronic Mail 
Anymore", Carnegie Mellon University Tech. Report CMU-CS-93-107, Mar. 1, 
1993 


Yes 

U.S. 4,658,093; Apr. 14, 1987 

Y 

Yes 

U.S. 4,405,829; Sep. 20. 1983 

Y 

Yes 

Schneier, Bruce; Applied Crvptoeraphv: Protocols, Algorithms, and Source Code 

in C, John Wiley & Sons, Inc., 1994 


* Any possible "Y"s that were missed shall not negate the anticipatory nature of a reference, particularly where 
there is a chart in Appendix B. 1 



InterTrust Tech. Corp. v. Microsoft Corp. 
Case No. C 01-1640 SBA (MEJ) 


APPENDIX OF PRIOR ART* 


^^^^^^ 

^^^^ 


Y 

Yes 

Popek, Gerald J.; Kline, Charles S.; "Encryption and Secure Computer Networks", 
ACM Computing Surveys, Vol 1 1 , No. 4, Dec. 1979 


Yes 

Diffie, Whitfield; Hellman, Martin E; "New Directions in Cryptography", Stanford 

TTmi/orpiKr IOTA 

universiry, iv/o 


Yes 

Castano, Silvana; Fugini, Mariagrazia; Martella, Giancarlo; Samarati, Pierangela; 
Database Security. ACM Press, 1994 

Y 

Yes 

i nuraisingnam, ivi.i3., jvianuaiory occuniy in ^Djcci-wricnicu u&iauase oysicxns , 
yj\JroL>/\ oy JrroceeoinKS, AUm, vjci. i-o, lyoy 

Y 

1 

I Co 

Olivier, iYiajun »>., von ooims, ocoasiiaun n., i aAumonrny it>r ocLurc wujct*i* 
Oriented Databases", ACM Transactions on Database Systems, Vol. 19, No. 1, 
Mar. jyy4 

Y 

Yes 

Olivier, M.S.; von Solms, S.H.; "Building a Secure Database Using Self-Protecting 
wujects , v-ompuiers <x oecunry, vol. 11, jno. j, iyy* 

Y 

J CO 

Olivier, M.S.; von Solms, S.H.; "DISCO: A Discretionary Security Model for 
L/Djeci-onenteo uaiaoases , n security, inc iNeeo ior lntemauonai i^ooperauon, 
Elsevier Science Publishers B.V., 1992 

Y 

Yes 

Oliver, Martin S.; "Secure Object-oriented Databases", Thesis for the degree of 
Doctor of Philosophy in Computer Science, Rand Afrikaans University, Dec. 1991 


Yes 

R. Ahad, et aJ.; IRIS, 1992 

Y 

Yes 

ORION l.k.a. ITASCA, MCC-Austin TX & Itasca Corp., 1985-1995 

Y 

Yes 

Olivier. Martin S.; SECDB. 1990-1995 

Y 

Yes 

"THOR: A Distributed Object-Oriented Database System", MIT 

Y 

Yes 

Millen, Jonathan K.; Lunt, Teresa F.; "Security for Object-Oriented Database 

<2vct#»mc" TPT7P fLRl fifi.OROS-l * 1000 

oysiems , iszlziz i oo-zo^j-i , iyyz 


Yes 

Choy, D.M. et al.; "A Digital Library System for Periodicals Distribution", May 
1996 



Mathy, Laurent; "Features of The ACCOPI Multimedia Transport Service", 
Lecture Notes in Computer Science, No. 1045, Proc. Of European Workshop 
IDMS'96 Mar 1996' 

Y 

Yes 

"Access Control and COpyright Protection for Images Security Technology for 
Graphics and Communication Systems - RACE Ml 005: ACCOPI", webpage, 
Security Projects at Fraunhofer-IGD, 2002; 

ACCOPI RACE Project M1005 Warning of ACCOPI web pages removal, UCL 



"The Amide Products" web page; 

Y 

Yes 

'Forum on Technology-Based Intellectual Property Management - Electronic 
Commerce for Content", IMA Intellectual Property Proceedings, Vol. 2, Jun. 1996 

Y 

Yes 

Van Slype, Georges; "Natural Language Version of the generic CITED model — 
Vol. I: Presentation of the generic model, ver. 3.0"; and "Vol. II: CITED usage 
monitoring system design for computer based applications, ver. 1.0", Project 5469, 
The CITED Consortium, Sea 6. 1993 


* Any possible "Y"s that were missed shall not negate the anticipatory nature ot a reference, particularly where 
there is a chart in Appendix B. 2 



IntcrTrust Tech. Corp. v. Microsoft Corp. 
Case No. C 01-1640 SBA (MEJ) 


APPENDIX OF PRIOR ART* 




Y 

Yes 

"Technological Strategies for Protecting Intellectual Property in the Networked 
Multimedia Environment", IMA Intellectual Property Proceedings, Vol. 1, Issue 1, 
Jan. 1994 

Y 

Yes 

COPICAT - 8195: "Copyright Ownership Projection in Computer- Assisted 
Training", ESPRIT, Dec. 1993; 

Kelman, Alistair, "Electronic Copyright Management: Possibilities and Problems", 
Scientists for Labor Presentation* Nov. 14. 1996 

Y 

Yes 

Griswold, Gary N.; H A Method for Protecting Copyright on Networks", IMA 
Intellectual Property Proceedings, Vol. 1 , Issue 1 , Jan. 1994 


Yes 

Erickson, John S.; H A Copyright Management System for Networked Interactive 
Multimedia", Proceedings of the 1995 Dartmouth Institute for Advanced Graduate 
Studies, 1995 


Yes 

Bums, Christopher; "AAP Draft: Local Access and Usage Controls". Association 
of American Publishers Report, Apr. 13, 1995 

Y 

Yes 

Choudhury. A.K.; Maxenchuk, N.F.; Paul, S.; Schulzrinne, H.G.; "Copyright 
Protection for Electronic Publishing over Computer Networks", Submitted to IEEE 
Network Magazine, Jun, 1994 


Yes 

Wayner, Peter; Digital Copyright Protection. Academic Press, 1997 


Yes 

"Cryptolope Containers Technology: A White Paper", IBM InfoMarket Business 
Development Group 


Yes 

"Digital Rights Enforcement and Management: SupcrDistribution of CTyptolopes", 
IBM 


Yes 

Kaplan, Marc A.; "IBM Cryptolopes, SuperDistrjbution and Digital Rights 
Management", IBM, Dec. 30, 1996 


Yes 

IP Workshop - CUPID: "Protocols and Services (ver. 1): An Architectural 
Overview", CNI, last update Nov. 20, 1997 

Y 

Yes 

Patent Application EP 0 567 800 Al; Nov. 3, 1993 

Y 

Yes 

Sibert, Olin; Bernstein, David; Van Wie, David; "The DigiBox: A Self-Protecung 
Container for Information Commerce", First USENIX Workshop on Electronic 
Commerce, Jul. 11-12, 1995 

Y 

Yes 

Willett, Shawn; "Metered PCs: Is your system watching you?; Wave Systems beta 
tests new technology", IDG Communications, Inc. InfoWorld, May 2, 1994 

Y 

Yes 

Weber, Robert; "Metering Technologies for Digital Intellectual Property - A 
Report to the International Federation of Reproduction Rights Organisations", 
International Federation of Reproduction on Rights Organisations, Northeast 
Consulting Resources, Inc.. Oct. 1994 

Y 

Yes 

TULIP Final Report, ISBN 0-444-82540-1, 1991, revised Sep. 18, 1996 


Yes 

U.S. 5,634,012; May 27, 1997 


Yes 

U.S. 5,715,403; Feb. 3,1998 


Yes 

U.S. 5,845,281; Dec. 1. 1998 (For Priority, Feb. 1, 1995) 

Y 

Yes 

Brin, Sergey; Davis, James; Garcia-Molina^ Hector; "Copy Detection Mechanism 
for Digital Documents" , Stanford University 

Y 

Yes 

Weber, Robert; "Digital Rights Management Technologies - A Report to the 
International Federation of Reproduction Rights Organisations", Northeast 
Consulting Resources. Inc., Oct. 1995 


• Any possible "Y's that were missed shall not negate the anticipatory nature ot a reference, particularly where 
there is a chart in Appendix B. 3 



InterTrust Tech. Corp. v. Microsoft Corp. 
Case No. C 0M640 SBA (MEJ) 


APPENDIX OF PRIOR ART* 



f'i^Qj^tJLjfe,' 

H v ; ^ 'i? f vi : j 


Yes 

Erickson, John S.; "Rights Management Through Enhanced Attribution", Presented 
at INET 96 Proceeding Jun., 1996 


Yes 

White* James E.; "Tclescript; The Foundation for the Electronic Marketplace", » 
Ver. 5.0, General Magic, Inc., Nov. 30, 1993 


Yes 

Ketchpel, Steve P.; Garcia-Molina, Hector; Paepcke, Andreas; "Shopping Models: 
A Flexible Architecture for Information Commerce", Stanford University 


Yes 

Lagoze, Carl; "A Secure Repository Design for Digital Libraries", D-Lib 
Magazine, Dec. 1995 

Y 

Yes 

"Introduction to Smart Cards v. 1.0", Gemplus Card International, Mar. 21, 1991 



Abadi, M.; Burrows, M.; Kaufman, C; Lampson, B.; "Authentication and 
Delegation with Smart-cards", Digital Equipment Corporation 

v. 

Yes 

Tygar, J.D.; Yee, Bennct; "Dyad: A System for Using Physically Secure 
Coprocessors", IMA Intellectual Property Project Proceedings, Vol. 1, Issue 1, Jan. 
1994 


Yes 

St. Johns, M.; "Draft Revised IP Security Option", Network Working Group, RFC 
1038. Jan. 1988 


Yes 

Galvin, J.; McCloghrie, K.; Davin, J.; "SNMP Security Protocols", Network 
Working Group RFC 1352, Jul., 1992 


Yes 

U.S. 5,163,091; Nov. 10, 1992 


Yes 

U.S. 5,355,474; Oct 11 1994 

v 

J 

Yes 

U.S. 5,678,170; Oct 14, 1997 


Yes 

U.S. 5,765,152; Jun. 9,1998 


Yes 

Shear. Victor; "Solutions for CD-ROM Pricing and Data Security Problems" 


Yes 

Williams, Tony; "Microsoft Object Strategy", Microsoft PowerPoint presentation, 
1990 

Y 

Yes 

"OLE 2.0 Draft Content Object Linking & Embedding", Microsoft, Jun. 5, 1991 


Yes 

"Multimedia System Services Ver. 1.0", Hewlett-Packard, IBM, & SunSoft, 1993 


Yes 

Draft "Request for Technology: Multimedia System Services", Ver. 1.1, Interactive 
Multimedia Association Compatibility Proiect, Oct 16, 1992 


Yes 

"Request for Technology: Multimedia System Services", Ver. 2.0, Interactive 
Multimedia Association Compatibility Project, Nov. 9, 1992 


Yes 

Wobber, EdwaTd; Abadi, Martin; Burrows, Mike; Lampson, Butler; 
"Authentication in the Taos Operating System", Digital Equipment Corporation, 
Dec. 10, 1993 


Yes 

Custer. Helen: Inside Windows NT. Microsoft Press, oases 26-42 and 329-330, 
1993 

Y 

Yes 

Dynamic linking of SunOS 

Y 

Yes 

Blaze, Matt, "A Cryptographic File System for Unix", preprint of paper to be 
presented at First ACM Conference on Communications and Computing Security, 
Nov. 3-5, 1993 


Yes 

Gamble, Todd; "Implementing Execution Controls in Unix", USENIX Association, 
Proceedings of the Seventh Systems Administration Conference (LISA VII), Nov. 
1-5. 1993 


* Any possible "Y"s that were missed shall not negate the anticipatory nature ot a reference, particularly where 
there is a chart in Appendix B. 4 



InterTrust Tech. Corp. v. Microsoft Corp. 
Case No. C 01-1640 SBA (MED 


APPENDIX OF PRIOR ART» 



v 

I 

I CS 

Garfinkel. Simson; Spafford. Gene; Practical Unix Security. O'Reilly & Associates, 
Inc., 1994 


Yes 

Blaze, Matt; Ioannidis, John; "The Architecture and Implementation of Network- 
Layer Security Under Unix*, Columbia University and AT&T Bell Laboratories, 
1994 


Yes 

Sandhu, Ravi S>; "The Typed Access Matrix Model", Proceedings of IEEE 
Symposium on Security & Privacy, May 4-6, 1992 


Yes 

Currv: David A.; Unix System Security: A Guide for Users and Svstem 
Administrators, Addison- Wesley, 1992 

Y 

Yes 

FreeBSD System managers Manual "LDCONFIG", Oct. 3, 1993 


Yes 

"Requirements for the Software License Management System", System 
Management Work Group, Rev. 3 T Unix International, Jul. 23, 1992 

Y 

Yes 

Film canister 

Y 

Yes 

Safety deposit box 


Yes 

Central Point Anti-Virus, Central Point Software, 1993 


Yes 

Symantec Anti- Virus for Macintosh (a.k.a. SAM), Symantec, 1993 

Y 

Yes 

VirusCheck and VirusScan, McAfee, 1993 


Yes 

Goodman, Bill; Compactor Pro 


Yes 

Enigma V.25 


Yes 

Stufflt Deluxe v.1.5, v.3.0 f v.3.5, Aladdin Systems, 1988-1994 

Y 

Yes 

Harris, Jed; Ruben, Ira; "Bento Specification", Rev. 1.0d5, Apple Computer, Jul. 
15, 1993 


Yes 

Koenig, Andrew; "Automatic Software Distribution", USENDC Summer 
Conference Proceed ings, Jun. 12-15, 1984 


Yes 

Microsoft Internet Explorer v.2.0 


ies 

Think C: Obiect-Oriented Proin*amrnine Manual, Symantec Corporation, 1989 


Yes 

Think Pascal User Manual, Symantec Corporation, 1990 

Y 

Yes 

Mori, Ryoichi; Kawahara, Masaji; "Superdistribution: The Concept and the 
Architecture", The Transactions of the IEICE, Vol. E 73, No. 7. Jul., 1990 


Yes 

Epstein, Jeremy; Shugerman, Marvin; "A Trusted X Window System Server few- 
Trusted Mach". USENIX Association, Mach Workshop, Aue. 30, 1990 


Yes 

McCollum, Catherine J.; Messing, Judith R.; Notargiacomo, LouAnna; "Beyond 
the Pale of MAC and DAC - Defining New Forms of Access Control", IEEE, 1990 


Yes 

Abrams, Marshall D.; "Renewed Understanding of Access Control Policies", 
Proceedings of the 16th Computing National Security Conference, 1993 


Yes 

Blaze, Matt; Feigenbaum, Joan; Lacy, Jack; "Decentralized Trust Management", 
Proc. IEEE Conference on Security and Privacy, May 1996 

Y 

Yes 

Chaum, David; "Achieving Electronic Privacy", Scientific American, Aug. 1992 


Yes 

UniverCD: The interactive, online library of product information from Cisco 
Systems, Cisco Systems, 1993 

Y 

Yes 

DCE 


Yes 

Fine, Todd; Minear, Spencer E.; "Assuring Distributed Trusted Mach", Secure 
Computing Corporation 


Yes 

U.S. 5,412,717; May 2, 1995 


* Any possible "Y"s that were missed shall not negate the anticipatory nature of a reference, particularly where 
there is a chart in Appendix B. 5 



InterTrust Tech. Corp. v. Microsoft Corp. 
Case No. C 01-1640 SBA (MEJ) 


APPENDIX OF PRIOR ART* 






I cs 

Fugini, M.G,; Zicari, R.; "Authorization and Access Control in the Office-Net 
System", Computer Security in the Age of Information, IFIP, 1989 


Yes 

Abadi, M; Burros, M.; Lampson, B.; Plotkin, G.; "A Calculus for Access Control 
in Distributed Systems", Digital Equipment Corporation, Feb. 28, 1991, revised 
Aue. 28. 1991 

Y 

Yes 

Lampson, Butler; Abadi, Martin; Burrows, Michael; Wobber, Edward; 
"Authentication in Distributed Systems: Theory and Practice", Digital Equipment 
Corporation, 1992 


Yes 

Rivest, Ronald L.; Lampson, Butler; "SDSI - A Simple Distributed Security 
Infrastructure", MIT and Microsoft Corporation, Apr. 30, 1996 


Yes 

Thompson, Victoria P.; Wentz, F. Stan; "A Concept for Certification of an Army 
MLS Management Information System", Proceedings of the 16th National 
Computer Security Conference, Sep. 20-23. 1993 


Yes 

Frederick, Keith P.; "Certification and Accreditation Approach", Air Force 
Cryptologic Support Center (OL-FP) 

Y 

Yes 

PCT Application WO 96727155; Published Sep. 6, 1996 


Yes 

U.S. 5,910,987; Jun. 8, 1999 

Y 

Yes 

Rozenblit, Moshe; "Secure Software Distribution", TERR 0-7803-181 1-0/94, 1994 

Y 

Yes 

Stefik. Mark: Internet Dreams: Archetypes. Myths, and Metaphors, "Lettinu Loose 
the Light Igniting Commerce in Electronic Publication", The MTT Press, 1996 


Yes 

AT&T PersonaLink, [Before Feb. 13, 19951 


Yes 

Neuman, B. Clifford; "Proxy-Based Authorization and Accounting for Distributed 
Systems", Proceedings of the 13th Infl Conference on Distributed Computing 
Systems. May 1993 

Y 

i es 

Tygar, J.D.; Yee, Bennet S.; (R. Rashid, ed.); "Strongbox: A System for Self- 
Securing Programs" 


Yes 

Yee, Bennet; Tygar, J.D.; "Secure Coprocessors in Electronic Commerce 
Applications", Proceedings of the First USEN1X Workshop on Electronic 
Commerce, Jul. 1995 


Yes 

U.S. 4,278,837; Jul. 14, 1981 


Yes 

U.S. 3,806,874; Apr. 23, 1974 

Y 

Yes 

U.S. 4,748,561; May 31, 1988 

Y 
i 

Yes 

U.S. 4,796,220; Jan. 3, 1989 


Yes 

U.S. 4,817,140; Mar. 28, 1989 

Y 

Yes 

U.S. 4,866.769; Sep. 12, 1989 

Y 

Yes 

U.S. 5,014,234; May 7, 1991 

Y 

Yes 

U.S. 5,113,518; May 12, 1992 


Yes 

U.S. 5,204,897; Apr. 20, 1993 


Yes 

U.S. 5,218,605; Jun. 8,1993 

Y 

Yes 

U.S. 5,260,999; Nov. 9. 1993 

Y 

Yes 

U.S. 5,291,598; Mar. 1, 1994 

Y 

Yes 

U.S. 5,337,357; Aug. 9, 1994 


Yes 

U.S. 5,421,006; May 30, 1995 


Yes 

U.S. 5,438,508; Aur. 1,1995 


Yes 

U.S. 5,490,216; Feb. 6, 1996 

Y 

Yes 

U.S. 5,603,031; Feb. 11,1997 


* Any possible "Y"s that were missed shall not negate the anticipatory nature of a reference, particularly where 
there is a chart in Appendix B. 6 



InterTrust Tech. Corp. v. Microsoft Corp. 
Case No. C 01-1640 SBA (MEJ) 


APPENDIX OF PRIOR ART* 





Yes 

U.S. 5,692,047; Nov. 25, 1997 


Yes 

U.S. 5,724,425; Mar. 3, 1998 


Yes 

U.S. 5,940,504; Auj>. 17, 1999 


Yes 

U.S. 5,978,484; Nov. 2, 1999 1 


Yes 

U.S. 6,016,393; Jan. 18,2000 


Yes 

Woo, Thomas Y.C; Lam, Siman S.; "A Framework for Distributed Authorization", 
1 st Conf. Computer & Comm. Security, ACM, Nov., 1 993 


Yes 

Sandh'u, Ravi S.; Suri, Gurpreet S.; "Implementation Considerations for the Typed 
Access Matrix Model in a Distributed Environment", Proc. Of the 15th National 
Computer Security Conference. Oct. 1992 


Yes 

O'Conner, Mary Ann; "New Distribution Options for Electonic Publishers; iOpcner 
Data Encryption and Metering System for CD-ROM Use*", CD-ROM Professional, 
Vol 7, No. 2. ISSN 1409-0833, Mar. 1994 


Yes 

Herzberg, A; Karmi, G; "On Software Protection", Proceedings of the 4th 
Jerusalem Conference on Information Technology (JCIT), IEE Computer Society 
Press. Apr. 1984 


Yes 

Smith, Mary Grace; Weber,. Robert; "A New Set of Rules for Information 
Commerce: Rights-Protection Technologies and Personalized-Information 
Comerce Will Affect All Knowledge Workers", Communications Week, Nov. 6, 
1995 

Y 

Yes 

DOD "Rainbow Series" 


Yes 

Rosenthal, Doug; "EINet: A Secure, Open Network for Electronic Commerce", 
IEEE, 1994 

Y 

Yes 

Patent Application EP 0 367 700 A2; May 9, 1 990 . 

Y 

Yes 

Hauser, R.; Bauknecht, K.; ,f LTTP Protection - A Pragmatic Approach to 
Licensing , Institut fur Informatik, Univcrsitat Zurich, Jan. 13, 1994 


Yes 

"Multimedia Mixed Object Envelopes Supporting a Graduated Fee Scheme via 
Encryption"; IBM Technical Disclosure Bulletin, Vol. 37, No. 3, Mar. 1994 


Yes 

Cox, Brad; "No Silver Bullet Revistcd", American Programmer Journal, Nov. 1995 


Yes 

"Privacy and the Nil: Safeguarding Telecommunications-Related Personal 
Information", U.S. Dept of Commerce, Oct 1995 


Yes 

Joseph Bbersole, Protecting Intellectual Property Rights on the Information 
Superhighways, Mar. 1994 

Y 

Yes 

Herzberg. Amir: Printer. Shlomit S.: "Public Protection of Software". ACM 
Transactions on Computer Systems, Vol. 5, No. 4, Nov. 1987 


Yes 

Hickman, Kipp E.B.; SSL 2.0 Protocol Specification 


Yes 

Gosler. James: "Software Protection: Myth or Reality". Lecture Notes in Computer 
Science, Advances in CryptoIoEV - Crypto '85 Proceedings, 1985 


Yes 

A uc smith, David; "Tamper Resistent Software: An Implementation", IAL 


Yes 

U.S. Patent No. 5,671,279; Sept. 23, 1997 

Y 

Yes 

Kahn, Robert; Wilensky, Robert; "A Framework for Distributed Digital Object 
Services'*. Corporation for National Research Initiatives. May 13. 1995 

Y 

Yes 

Gasser, Morrie; Goldstein, Andy; Kaufman, Charlie; Lampson, B; "The Digital 
Distributed Svstem Security Architecture". Proceedings of 1989 National 
Computer Security Conference, 1989 


* Any possible "Y"s that were missed shall not negate the anticipatory nature of a reterence, particularly where 
there is a chart in Appendix B. 7 



InterTrust Tech. Corp. v. Microsoft Corp. 
Case No. C 01-1640 SBA (MEJ) 


APPENDIX OF PRIOR ART* 




Y 

Yes 

Neuman, B. Clifford; Ts f o, Theodore; "Kcrberos: An Authentication Service for 
Computer Networks", IEEE Communications Magazine. Sep. 1994 


Yes 

Reiher, Peter; Page, Jr., Thomas; Popek, Gerald; Cook, Jeff; Crocker, Stephen; 
"Truffles ~ Secure File Sharing With Minimal System Administrator Intervention", 
UCLA, Trusted Information Systems 

Y 

Yes 

Reiner, Peter; Page, Jr., Thomas; Popek, Gerald; Cook, Jeff; Crocker, Stephen; 
"Truffles - A Secure Service for Widespread File Sharing", UCLA, Trusted 
Information Svstems 

Y 

Yes 

"ISO, Open Systems Interconnection; Security Architecture, ISO 7498/r, 1988 

Y 

Yes 

"ISO, Open Systems Interconnection: Security Architecture, ISO 7498/2" , ISO, 
1988 


Yes 

U.S. 5,222,134; Jun. 22, 1993 


Yes 

Rindfirey, Jochen; "Security in the World Wide Web", Fraunhofcr Institute for 
Computer Graphics, Dec. 1996 


Yes 

Finin, Tim; Fritzson, Rich; McKay, Don; "A Language and Protocol to Support 
Intelligent Agent Interoperability", Proceedings of the CE & CALS Washington *92 
Conference, Apr. 3992 

Y 

Yes 

Winslet, Marianne; Smith, Kenneth; Qian, Xiaolei; "Formal Query Languages for 
Secure Relational Databases", ACM Transactions on Database Systems, Vol. 19, 
No. 4, Dec. 1994 


Yes 

Jones, V.E.; Ching, N.; Winslett, M.; "Credentials for Privacy and Interoperation", 
University of Illinois at Urbana-Champaign 


Yes 

Greenwald, Steven J.; Newman- Wolfe, Richard E.; "The Distributed Compartment 
Model for Resource Management and Access Control", Technical Report Number 
TR94-035, The University of Florida, Oct. 1994 

Y 

Yes 

Moffett, Jonathan D.; "Delegation of Authority Using Domain-Based Access 
RuJes", thesis, Imperial College of Science, Technology & Medicine, University of 
London, Jul., 1990 

Y 

Yes 

Lagoze, Carl; McGrath, Robert; Overly, Ed; Yeager, Nancy; "A Design for Inter* 
Operable Secure Object Stores (ISOS)*, Cornell University, NCSA, CNRI, Nov, 7, 
1995 


Yes 

Aharonian, Gregory; "Software Patents - Relative Comparison of EPO/PTO/JPO 
Software Searching Capabilities", Source Translation & Optimization 


Yes 

Gaster, Jens L.; "Authors' Rights and Neighbouring Rights in the Information 
Society", DG XV/E/4, European Commission 


Yes 

"Europe and The Global Information Society Recommendations to the European 
Council", Bamgemann Report, www.medicif.org web pages, Global Information 
Society, May, 26, 1994 


Yes 

Bernstein, David; Lenowitz, Erwin; "Copyrights, Distribution Chains, Integrity, and 
Privacy: The Need for a Standards-Based Solution", Electronic Publishing 
Resources 


Yes ] 

Rubin, A.D.; Honeyman, P.; "Long Running Jobs in an Authenticated 
Environment", CITI Technical Report 93-1, Center for Information Technology 
[nteeration. Mar. 29. 1993 


Yes 

] 

Sammer, Peter; Ausserhofer, Andreas; "New Tools for the Internet", Joanneum 
Research, Graz University of Technology 


* Any possible T's that were missed shall not negate the anticipatory nature of a reference, particularly where 
there is a chart in Appendix B. 8 


InterTrustTech. Corp, v. Microsoft Corp, 
Case No. C 01-1640 SBA (MEJ) 


APPENDIX OF PRIOR ART* 



Yes 


Eizenberg, Gerard, "Contribution of Information Technology Security to 
Intellectual Property Protection", CERT-DERI 


Yes 


Antonelli, C J.; Doster, WA; Honey man, P.; "Access Control in a Workstation- 
Based Distributed Computing Environment", CITI Technical Report 90-2, Jul. 17, 
1990 ■ 


Yes 


Lord, SJP.; Pope, N.H.; Stepney, Susan; "Access Management in Multi- 
Administration Networks", EEE 2nd International Conference on Secure 
Communication Systems, 1986 


Yes 


Stepney, Susan; Lord, Stephen P.; "Formal Specification of an Access Control 
System", Software-Practice and Experience, Vol 17(9), 1987 


Yes 


Brunnstein, Klaus; Sint, Peter P.; "Intellectual Property Rights and New 
Technologies", Proceedings of the KnowRight'95 Conference, Aug. 1995 


Yes 


Rubin, AD.; Honeyman, P.; "Formal Methods for the Analysis of Authentication 
Protocols CITI Technical Report 93-7", Center for Information Technology 
Integration, Nov. 8, 1993 


Yes 


Lexis/WestLaw 


Yes 


U.S. 6,135,646; Oct, 24, 2000 


Bishop, Matt; "Privacy-Enhanced Electronic Mail", Privacy and Security Rcsearh 
Group, IAB 


Yes 


Yes 


Kim, Won; Ballou, Nat; Chou, Hong-Tai; Garza, Jorge F.; Woelk, Darrell; 
"Features of the ORION Object-Oriented Database System" 


Yes 


"Key Management Using ANSI X9.17", Federal Information Processing Standards 
Publication 171, U.S. Department of Commerce, Apr. 27, 1992 


Yes 


S/PAY: RSA's Developer's Suite for Secure Electronic Transactions (SET)", RSA 
Data Security, Inc. 1997 


Yes 


Perlman, Bill; "A Working Anti-Taping System for Cable Pay-Per-View", IEEE 
Trans. On Consumer Electronics, Vol. 35, No.3, Aug. 1989 


Yes 


Organick, Elliott I.; "The Multics System: An Examination of Its Structure", MIT 
Press, 1972 __ 


Yes 


Cina Jr., Vincent J.; White, Star R.; Comerford, Liam; "ABYSS: A Basic 
Yorlctown Security System PC Software Asset Protection Concepts", IBM 
Research Report Number RC 12401, IBM Thomas J. Watson Research Center, 
Dec. 38, 1986 


Yes 


White, Steve R.; Comerford, Liam; "ABYSS: An Architecture for Software 
Protection", IEEE Transactions on Software Engineering, Vol. 16, No. 6, Jun. 1990 


Yes 


Davies, D.W.; Price, WL; Security for Computer Networks , John Wiley & Sons, 

1984 


Yes 


"MSDN - INF; LAN Manager 2,1 Server Autotuning (Part 2)", PSS ID Number 
080078, Microsoft, Feb. 1993 


Yes 


MSDN - License Service Application Programming Interface", API Specification 
vl.02, Microsoft, Jan. 1993 . 


* Any possible "Y"s thai were missed shall not negate the anticipatory nature ol a reference, particularly where 
there is a chart in Appendix B. 9 



InterTrust Tech. Corp. v. Microsoft Corp. 
Case No. C 01-1640 SBA (MEJ) 


APPENDIX OF PRIOR ART* 




"International Infrastructure Standards Panel: 
TT<JP "Mf>prl if^l - r^nntfliners or Secure Packaeine* 
IISP Need #32 - Authentication of Content; 
ESP Need #33 - Control Enforcement; 
IISP Need #34 - Billing and Payment; 
IISP Need #35 - Reporting" 

ANSI Online Sen. 18. 1995 — — 

Y 

Yes 

Cryptograpruc Ar J opeciiicauon * version u.o» xvucrosoii, iviar. xyyj 


Yes 

r,,oroM fi^wi/l Tl • "Cmarr PnrH Tntnrial - Part 1 " *Vn 1 0Q/> 
Everett, uaviu o . , omari \»-aru 1 uiuimi rdii ± , oc|j. 177* 

Y 

Yes 

Paradinas, Pierre; Vandewalle, Jean- Jacques; "New Directions for Integrated 

Y 

Yes 

Hauser, Ralf; "Control of Information Distribution and Access", Dissertation Der 
Wirtschaftswissenschaftlichen Fakultat Der Universitat Zurich, May 31, 1995 


Yes 

Rindfrey, Jochen; "Towards an Equitable System for Access Control and Copyright 

Tim* ar*tl r\*-\ .*« QmaH^act Tttioo^ *J*»rvi^*pc "i"h*» T^/iiiirrvnt Annrnflch** PrailTinofcr 

rrotecuon in oroaucasi jmage ocrvn/Cb. i nc jc*jiuwjf}M /\pyjuuv.» « * icmuwiti 


Yes 

w#*iie T3rtK- Or1\/<rci»v nf Pl^ttir PnrrVifl^ft- 20-5!eefmd Round-Trio. Associated 

T) r nor T"V»y~ 1 OOt 


Yes 

Dflirmant Ctrrfam r> • Qfrof^m'r' f^Virti/^C 'fnr tVif* PufltTP TTltflf*hl R^^PiirPn Institute* 




Yes 

"ir err M»t-u^i^rV r\*»ta Pi-inlr IQO^ "P/litinn" "Rant Network News Vol 11. No. 13. 
KL-it> 1 0OO 


Yes 

"Atn^rtran Matlrtnal Clan/Jar*)* ^IrMVifirMifm for PlTtanf^ifll \^GS*ia*?e ExCnailBS 
/unencan IN allUIJal o12IU1aJU. ijjJlAUiLoliUU »Ui -1 iJifliicioi lTivopugw ^AviiMigv 

Uaimoin p, r 4 a />^»mt/sr art<4 A/*niiir<^* YO 1 fl" Am^jirfln Ranker'** Association. 
13 ct ween v^-aru Acceptor auu Acquirer t /v_y. 1 j , /aiii&i jtau vauavi ° naauv«uww, 

iyyu , „„ .,. 


Yes 

"ten 7B 1*1.1 0fl*7 T^^ritifi^ftfriftTi Pan-l* - Pinflncial Transaction Cards". ISO. 1987 

Y 

Yes 

jur^DN Tr<:iip* 9nmTripr 1992* Vol No • 0 fBetaV 1 Disk. Microsoft, 1992 

Y 

Yes 

MSDN Issue- Seo 1992* Vol No ' 1* 1 Disk. Microsoft, Sep. 1992 

Y 

Yes 

MSDN Issue- Jan 1993* Vol. No. 2: 1 Disk, Microsoft, Jan. 1993 

Y 

Yes 

MSDN Issue: Apr. 1993; Vol. No. 3; 1 Disk, Microsoft, Apr. 1993 

Y 

Yes 

MSDN Issue: Summer 1993; Vol. No. 4; 1 Disk, Microsoft, Jul. 1993 

Y 

Yes 

MSDN 1 ssi if*; Fall 1993; Vol. No. 5; 1 Disk. Microsoft Oct. 1993 

Y 

Yes 

MSDN Issue; Winter 1994; Vol. No. 6; 1 Disk, Microsoft, Jan. 1994 

Y 

Yes 

MSDN Issue: Apr. 1994; Vol. No. -7; 1 Disk. Microsoft. Apr. 1994 

Y 

Yes 

MSDN Issue: Jul. 1994; Vol. 8; 1 Disk, Microsoft, Jul. 1994 

Y 

Yes 

MSDN Issue: Oct 1994; Vol. 9; 1 Disk, Microsoft, Oct. 1994 

Y 

Yes 

MSDN Issue: Jan 1995; Vol. 10; 1 Disk, Microsoft, Jan. 1995 

Y 

Yes 

MSDN Issue: Apr. 1995; Vol. 11; 1 Disk, Microsoft, Apr. 1995 

Y 

Yes 

MSDN Issue: Jul. 1995; Vol, 12; 1 Disk, Microsoft, Jul. 1995 

Y 

Yes 

MSDN Issue: Oct 1995; Vol. 13; 1 Disk, Microsoft, Oct. 1995 

Y 

Yes 

MSDN Issue: Jan 1996; Vol. 14; 2 Disks. Microsoft, Jan. 1996 

Y 

Yes 

MSDN Issue: Apr. 1996; Vol. 15; 2 Disks. Microsoft, Apr. 1996 

Y 

Yes 

MSDN Issue: Jul. 1996: Vol. 16; 1 Disk, Microsoft, Jul. 1996 

Y 

Yes 

MSDN Issue: Oct 1996; Vol. 17; 2 Disks, Microsoft, Oct. 1996 

Y 

Yes 

MSDN Issue: Jan 1997; Vol. 18; 2 Disks. Microsoft, Jan. 1997 

Y 

Yes 

MSDN Issue: 16-Bit Archive 1997; Vol. NA; 1 Disk, Microsoft, Jan. 1997 


* Any possible "Y*s that were missed shall no! negate the anticipatory nature of a reterence, particularly where 
there is a chart in Appendix B. 1 0 



InterTnist Tech. Corp. v. Microsoft Corp. 
Case No- C 01-1640 SBA (MEJ) 


APPENDIX OF PRIOR ART* 




Y 

Yes 

MSDN Issue: Apr. 1997; Vol. No. 20; 2 Disks, Microsoft, Apr. 1997 

y 

Yes 

MSDN Issue: Jul. 1997; Vol. No. 21; 2 Disks, Microsoft, Jul. 1997 

Y 

Yes 

MSDN Issue: Oct 1997; Vol. No. 24; 2 Disks, Microsoft, Oct. 1997 

Y 

Yes 

MSDN Issue- Visual Studio 1997: Vol. No. 191: 1 Disk, Microsoft, 1997 

Y 

Yes 

MSDN Issue: Jan. 1998; Vol. No. 27; 2 Disks, Microsoft, Jan. 1998 

Y 

Yes 

MSDN Issue: Apr. 1998; Vol. No. 30; 2 Disks, Microsoft, Apr. 1998 

Y 

Yes 

MSDN Issue: Jul. 1998; Vol. No. 33; 3 Disks, Microsoft, Jul. 1998 

Y 

Ym 

MSDN Issue: Oct 1998; Vol. No.: None; 3 Disks, Microsoft, Oct 1998 

Y 

Yes 

MSDN Issue: Jan 1999; Vol. No.: None; 3 Disks, Microsoft, Jan. 1999 

Y 

Yes 

MSDN Issue: Apr. 1999; Vol. No.: None; 3 Disks, Microsoft, Apr. 1999 ■ 

Y 

1 Co 

MSDN Issue: Jul. 1999; Vol. No.: None; 3 Disks, Microsoft. Jul. 1999 

Y 

Yes 

MSDN Issue: Oct 1999; Vol. No.: None; 3 Disks, Microsoft, Oct 1999 

Y 

Yes 

Chaum. David: Smart CaTd 2000^ Selected Papers from the Second International 
Smart Card 2000 Conference, Oct 4-6. 1989 . 

Y 

I Co 

PH TuVrWvr 


Yes 

U.S. Patent No. 4,926,480; May 15, 1990 


Yes 

l to 

US Patent No 4.529 870* Jul. 16 1985 


Yes 

vIawt Pari T4 • "MntvAQ Stenhp.n M-! fWntopranhv: A New Dimension in 
Computer Security, John Wiley & Sons. New York, 1982 


Yes 

"Interchange Message Specification for Debit and Credit Card Message Exchange 
Among Financial Institutions". American National Standard. Accredited Standards 
rVimmiffef XQ-Fin»neial Services Committee. ANSI X9.2-1988. American 
Bankers Association. May 16. 1988 

Y 

Yes 

Excerpts from Jul. 1993 MSDN disks, Jul. 1993 . 

Y 

Yes 

Cox, Benjamin; Tygar, J.D.; Sirbu, Marvin; "NetBill Security and Transaction 
Protocol", Carnegie Mellon University 


Yes 

Cox, Brad; "What if there is a Silver Bullet and the competition gets it first?", 
Journal of Obiect-oriented Programming, Jurt 1992 

Y 

Yes 

"CUED Final Report: A Guide to CITED Documentation" , ESPRIT, Project 5469, 
ISBN 0-7123-21 15-2. The CITED Consortium, Sep. 1994 

Y 

Yes 

Boisson, Jean-Francois; "1 - Business Perspectives and Requirements, 2 - The 
CITED Project: keys and knowledge", CITED 5469 

Y 

Yes 

Van Slype, Georges; "Knowledge Economy: future trends", CITED 5469 

Y 

Yes 

Boisson, Jean-Francois; "Software components: deliverable Trial Offer", CiXbD 
5469 

Y 

Yes 

Van Slype, Georges; The CITED approach, Ver. 4.0 M , ESPRIT II, Project 5469, 
The CITED Consortium, Apr. 20, 1994 

Y 

Yes 

Moens, Jan; "Report on the users requirements, Ver. 1.0", ESPRIT U, Project 
5469. The CITED Consortium. Nov. 27, 1991 

Y 

Yes 

Schulze, Dr. J.; "Case of application of the generic CITED Model to the 
CTTEDisation in the software distribution process", ESPRIT n, Project , Jan. 12, 
1993 

Y 

Yes 

Moens, Jan; "Case of application of the generic CITED Model to the CITEDisation 
of a directory database on CD-ROM, Ver. 2.0", ESPRIT n, Project 5469, The. 
CITED Consortium. Nov. 30, 1992 

Y 

Yes 

Pijnenborg, Mari FJ.; "CITED Final Report", Elsevier Science B.V., Apr. 1994 


# Any possible "Y"s that were missed shall not negate the anticipatory nature oi a reference, particularly where 
there is a chart in Appendix B. 1 1 



InterTrust Tech. Corp. v. Microsoft Corp, 
Case No. C 01-1640 SBA (MEJ) 


APPENDIX OF PRIOR ART* 


n^i;5;i:.'-j 



Y 

Yes 

Boisson, Jean-Francois; "How to CITEDise application: Guidelines and examples , 
CITED 5469 

Y 

Yes 

Nguyen, Thanh; Saint Etienne, Patricia Louise (SAGEM); "Guidelines for 
Validation of a CITED System", CITED 5469, SA-2MO-003, Jul. 4, 1994 

Y 

Yes 

Van Slype, Georges; "The future of CITED: a feasibility study, Ver. 1.1 - Vol. I: 
Summary rp.pnrt and Te^nmmftnf^ationR^ ESPRIT IL Project 5469. The CITED 
Consortium, Mar. 28, 1994 

Y 

Yes 

Van Slype, Georges; "The future of CllHD: a feasibility study, Ver. 1.1 - Vol. HI: 
TVaft TTTFT) intftrrhangft formats". ESPRIT II. Project 5469. The CITED 
Consortium. Mar. 28, 1994 

Y 

Yes 

"CITED: Copyright in Transmitted Electronic Documents, Special Interest Group", 
CITED, Meeting, Heathrow, Sep. 22, 1993 

Y 

Yes 

Miscellaneous letters from Georges Van Slype at Bureau Van Dijk, Mar. 30, 1995 

Y 

Yes 

Pijnenborg, Mari F.J.; "auteursrecht en de digitale bibliotheek?'. 195 Open, Jan. 37, 
1995 

Y 

Yes 

Miscellaneous letters from Georges Van Slype at Bureau Van Dijk, Feb. 13, 1995, 
Nov. 2, 1994 

Y 

Yes 

Van Slype, Georges; "PL4 RACE/ACCOPI Workshop on Conditional Access and 
r^pyri £ ht Prnt^tirm" PSPRrT IT. Project 5469. The CITED Consortium. Nov. 9. 
1994 

Y 

Yes 

Miscellaneous letters from G. Van Slype at Bureau Van Dijk, Sep. 12, 1994, Sep. 
1994, May 11, 1994, May 10, 1994, May 6, 1994, May 4, 1994, Apr. 21, 1994, 
Aw. 20, 1994 

Y 

Yes 

Letter re: ESPRIT III - Project 5469 (CITED) from A. Stajano at Commission of 
the European Communities, Oct. 7, 1993 

Y 

Yes 

ESPRIT Project: 5469: Contract Amendment Number: 2; (^mmission of the 
European Communities, Sep. 16, 1993 

Y 

Yes 

Miscellaneous letters from George Van Slype at Bureau Van Dijk, Apr. 19, 1994, 
Apr. 18, 1994, Apr. 11, 1994, Apr. 6, 1994 

Y 

Yes 

"Th+ Pnrnr^ of PitrH- A Fr.a nihility Smdy w T ESPRIT II. Project 5469. The CITED 
Consortium Apr. 15, 1994 

Y 

Yes 

Miscellaneous letters from Bureau Van Dijk, Mar. 30, 1994, Mar. 24, 1994, Feb. 
10, 1994, Feb. 10, 1994 

Y 

Yes 

Handwritten note re: GVS and AJL, Mar. 2, 1994 

Y 

Yes 

Miscellaneous letters from Bureau Van Dijk, Feb. 9, 1994, Jan. 27, 1994, Jan. 19, 
1994, Jan. 12, 1994, Dec. 22, 1993, Nov. 30, 1993, Nov. 22, 1993, Dec. 6. 1993, 
Nov. 16, 1993, Oct. 15, 1993, Oct. 7. 1993, Oct. 4, 1993, Sep. 20, 1993, Sep. 7, 
1993. Mav 19, 1993, Oct. 13. 1993 

Y 

Yes 

Bureau Van Dijk Management Report for Task 4.5: Feasibility Study of the Cited 
Asencv, 1992-1993 

Y 

. Yes 

Bureau van Dijk: Gestion des contrats; 497C C.C.E. : CITED (SUITE), Feb. 1993 

Y 

Yes 

"CITED- Preparation of the CITED mode) functional requirements specifications - 
Discussion paper (revision 1)'\ Bureau Van Dijk, Jan. 16, 1991 


* Any possible "Y"s that were missed shall not negate the anticipatory nature of a reference, particularly where 
there is a chart in Appendix B. 1 2 



InterTrust Tech. Corp. v. Microsoft Corp. 
Case No. C 01-1640 SBA (MEJ) 


APPENDIX OF PRIOR ART* 





Y 

Yes 

XITED: Preparation of the CITED Mode! Functional Requirements Specifications 
- Report of the interview with OXFORD UNIVERSITE PRESS, CITED part", 
Bureau Van Diik, Feb. 27, 1991 

Y 

Yes 

"CITED: Preparation of the CITED Model Functional Requirements Specifications 
- Reports of the interviews with five CITED Partners" (Partners: Sagem, 
Telesystemes, NTE, Elsevier, Oxford University Press), Bureau Van Dijk, Apr. 5, 
1991 

Y 

Yes 

XITED: Preparation of the CITED Model Functional Requirements Specifications 
- Reports of the interviews with Seven International Organizations: EBU, ECM A, 
ELDA. IFPI, IFTC, STM, WEPO". Bureau Van Dijk, May 27, 1991 

Y 

Yes 

Van Slype, Georges; Moens, Jan; Vannieuwenhuyse, Lawrence; 'The future of 
CITED: a feasibility study". ESPRIT II. Proiect 5469. The CITED Consortium. 
Nov. 15. 1993 

Y 

Yes 

Van Slype, Georges; "Draft CITED interchange formats, Ver. 1.0", ESPRIT II, 
Project 5469, The CITED Consortium, Jan. 28, 1994 

Y 

Yes 

Miscellaneous letter from Georges Van Slype at Bureau Van Dijk, Feb, 28, 1994 

Y 

Yes 

Van Slype, Georges; 'The future of CITED : a feasibility study, Ver. 1.0 - Vol. I: 
Summary report and recommendations". ESPRIT II. Project 5469. The CITED 
Consortium, Feb. 28. 1994 

Y 

Yes 

Van Slype, Georges; Moens, Jan; Vannieuwenhuyse, Laurence; 'The future of 
CITED: a feasibility study, Ver. 1.0 - Vol. II: Full report", ESPRIT n, Project 
5469. The CITED Consortium, Feb. 28, 3 994 

Y 

Yes 

Van Slype, Georges 'The future of CITED: a feasibility study, Ver. 1.1 - Vol. Ill: 
Draft CITED interchange formats". ESPRIT IL Proiect 5469. The CITED 
Consortium, Feb. 28, 1994 

Y 

Yes 

"The Future of Cited: A Feasibility Study", ESPRIT II, Project 5469, CITED 
Proiect Review, Apr. 15, 1994 

Y 

Yes 

Van Slype, Georges; "PL4 RACE/ACCOPI Workshop on Conditional Access and 
Copyright Protection 1 *, ESPRIT II. Project 5469, Presentation of the CITED, Nov. 
9, 1994 

I 

xes 

Van Slype, Georges; "Natural Language version of the generic CITED model, Ver. 
4.2 - Vol. I: Presentation of the generic model", ESPRIT II, Project 5469, The 
CITED Consortium. Mav 8. 1995 

Y 

Yes 

Van Slype, Georges; tf Natural language version of the generic CITED model, Ver. 
2.1 - Vol. II ECMS (Electronic Copyright Management System) design for 
computer based applications". ESPRIT II. Project 5469. The CITED Consortium. 
MayS, }995 


Yes 

Cousins, Sieve B.; Ketchpel, Steven P.; Paepcke, Andreas; Garcia-Molina, Hector; 
Hassan, Scott W.; Roscheisen, Martin; 'InterPay: Managing Multiple Payment 
Mechanisms in Digital Libraries" 


Yes 

TKCS #5: Password-Based Encryption Standard", An RSA Laboratories 
Technical Note, Ver. 1.5, 1991-1993, Revised Nov. 1, 1993 


Yes 

*PKCS #8: Private-Key Information Syntax Standard", An RSA Laboratories 
Technical Note, Ver. 1.2, 1991-1993. Revised Nov. 1, 1993 


Yes 

TKCS #10: Certification Request Syntax Standard", An RSA Laboratories 
Technical Note, Ver. 1.0, Nov. 1. 1993 


* Any possible "Y"s that were missed shall not negate the anticipatory nature ot a reference, particularly where 
there is a chart in Appendix B. 1 3 



InterTrust Tech. Corp. v. Microsoft Corp. 
Case No. C 01-1(540 SBA (MEJ) 


APPENDIX OF PRIOR ART* 




ft? 


Yes 

"PKCS #1 1 : Cryptographic Token Interface Standard", An RSA Laboratories 
Technical Note, Ver, 2.0, Apr. 15, 1997 


Yes 

"PKCS 12 vl.O: Personal Information Exchange Syntax", RSA Laboratories, Jim. 
24, 1999 


Yes 

'TKCS #13: Elliptic Curve Cryptography Standard", RSA Security, Jan. 12, 1998 


Yes 

"PKCS #15 vl.O: Cryptographic Token Information Format Standard", RSA 
Laboratories, Apr. 23, 1999 


Yes 

U.S. 5,335,346; Aug. 2, 1994 

Y 

Yes 

GarfinkeL Simson: Spafford. Gene: Practical UNIX Security. O'Reilly & 
Associates, Inc., 1991 

Y 

Yes 

Merkle, Ralph C, "Protocols for Public Key Cryptosystems", IEEE, 1980 . 


Yes 

Kaner. Cem; Falk. Jack: Nguyen. Hung Ouoc: Testine Computer Software. Second 
Edition, Van Nostrand Reinhold, 1988 


Yes 

Press, Jim; Bunting, Angela "A New Approach to Cryptographic Facility Design", 
ICL Mid-Range Systems Division Reading, Berks, UK 

v 


US 6,256,668; Jul. 3, 2001 

I 


Kim, Gene H.; Spafford, Eugene H.; "Experiences with Tripwire: Using Integrity 
Checkers for Intrusion Detection", Purdue Technical Report CSD-TR-94-012, Feb. 
21, 1994 

Y 


"Technical Description: Pay-Per-View Copy Protection", Macro vision, Jun. 1994 

Y 


Reali, Patti; "Copy Protection: The answer to pay per view's prayers?' 1 , TVRO 
Dealer, Dec. 1994 



Swedlow, Tracy; "2000: Interactive Enhanced Television: A Historical and Critical 
Perspective", Interactive TV Today 



various articles xrom cxi i lmes, weeK or \jc\. a iyyj 



"Digital Broadband Delivery System, Phase 1.0, System Overview", Revision 1.0, 

Cr>ioTit-5fi/> Atlanta 100/7 



Langelaar, G.C. "Overview of protection methods in existing TV and storage 
devices", SMS-TUD-609-1, Final Ver. 1.2, Feb. 26, 1996 

Y 


Solomon, A.; "PC Viruses: Detection, Analysis, and Cure", Springer Verlag 1991. 

Y 


GaJaxy, Opcode Systems, 1991-1994 

Y 


Unix System V & BSD & GNU versions prior to Feb 22, 1996 

Y 


US 5,673,316; Sep. 30, 1997 

Y 


17 USCA sections 1001 - 1010, Chapter 10 Digital Audio Recording Devices and 
Media, 1996 



Hill, Will; Hollan, Jim; "History-Enriched Digital Objects", Computer Graphics 
and Interactive Media Research Group; Bell Communications Research, 1993 



Hill, William; Hollan, James D.; "Edit Wear and Read Wear", Computer Graphics 
and Interactive Media Research Group, ACM; May 3-7, 1992 


* Any possible u Y"s that were missed shall not negate the anticipatory nature of a reference, particularly where 
there is a chart in Appendix B. 14 



InterTrust Tech. Corp. v, Microsoft Corp. 
Case No. C 01-1640 SBA (MEJ) 


APPENDIX OF PRIOR ART* 






Yes 

InterTrust Solutions for A2b, InterTrust; 

Competitive Analysis AT&T/a2b music; Jun. 16, 1998; • 

Email from Chris Drost-Hansen re press release: "AT&T Launches A2B Music 
Trial for Delivering Songs Over the Internet", Business Wire, Nov. 3, 1997; 

A2b's Recent Press Coverage, 1998 


Yes 

ISO 1 1568-1 & -2: "Key management (retail) - Part 1: Introduction to key 
management"; and Part 2: Key management techniques foT symmetric ciphers", 
ISO, Dec. 1, 1994 


Yes 

ISO 13491-1: "Secure cryptographic devices (retail) -Part 1: Concepts, 
requirements and evaluation methods", ISO, Jun. 15, 1998 


Yes 

ISO 8583-2: "financial transaction card originated messages - Interchange message 
specifications - Part 2: Application and registration procedures for Institution 
Identification Codes (I1C)", ISO, Jul. 1, 1998 


Yes 

ISO 8583-3: "Financial transaction card originated messages - Interchange message 
specifications - Part 3: Maintenance procedures for codes", ISO, Jul. 1, 1998 


Yes 

ISO 9564-1 & -2: "Personal Identification Number (PIN) management and security 
- Part 1: Basic principals and requirements for online PIN handling in ATM and 
POS systems; & -2 Approved algorithm(s) for PIN encipherment , \ ISO, Apr. 15, 
2002 & Dec. 15. 1991 


Yes 

ISO 9807: "Banking and related financial services - Requirements for message 
authentication (retail)," ISO, Dec. 15, 1991 


Yes 

Secure Electronic Transactions; Mastercard and Visa+C345 


Yes 

Tanenbaum, Andrew S; van Renesse, Robbert; van Staveren, Hans; Sharp, Gregory 
J.; Mullender, Sape J.; Jansen, Jack; van Rossuro, Guido; "Experiences with the 
Amoeba Distributed Operating System", Vrije Universiteit and Centrum voor 
Wiskunde enlnformatica 


Yes 

Tanenbaum, Andrew S; Mullender, Sape J.; van Renesse, Robbert; "Using Sparse 
Capabilities in a Distributed Operating System", Vrije Universiteit and Centre for 
Mathematics and Computer Science 

Y 

Yes 

Tanenbaum, Andrew S; van Renesse, Robbert; van Staveren, Hans; Sharp, Gregory 
J.; Mullender, Sape J.; Jansen, Jack; van Rossum, Guido; "Amoeba System", 
Communications of the ACM, Vol. 33, No. 12, Dec. 1990 


Yes 

"KeyKOS Principles of Operation", Key Logic document KL002-04, 1985, (Fourth 
Edition, Jan. 1987) 


Yes 

Landau, Charles R.; "Security in a Secure Capability-Based System", Operating 
Systems Review, Oct. 1989 


Yes 

"Security in KeyKOS" 


Yes 

Hardy, Norman; "The Keykos Architecture", Key Logic Document KL028-08, 
Eighth Edition, Dec. 1990 


Yes 

Johnson, Howard L.; Koegel, John R; Koegel, Rhonda M; "A Secure Distributed 
Capability Based System", ACM, 1985 


* Any possible "Y"s that were missed shall not negate the anticipatory nature ol a relerence, particularly where 
there is a chart in Appendix B. 15 



InterTrust Tech. Corp. v. Microsoft Corp. 
Case No, C 01-1640 SBA (MEJ) 


APPENDIX OF PRIOR ART* 






Yes 

Kim, Gene H.; Spafford, Eugene H.; "Experiences with Tripwire: Using Integrity 
Checkers for Intrusion Detection", COAST Laboratory, Purdue University, Feb. 
22. 1995 


Yes 

Blaze, Mart; "Key Management in an Encrypting File System", Proc. Summer 1994 
USENDC Technical Conference, Jun. 1994 


Yes 

Robinson, D.; Ullmann, R.; "Encoding Header Field for Internet Messages", 
Netwonc Worlang uroup Krc l ID4, Apr. lyyu, 

Rose, M.; McCloghrie, K.; "Structure and Identification of Management 
Information for TCP/IP-based Internets", Network Working Group RFC 1 155, 
May 1,990 . 


Yes 

Rose, M.; McCloghrie, K.; "Structure and Idcnufication of Management 
Information for TCP/IP-based Internets", Network Working Group RFC 1 155, 
May 1990; 

McCloghrie, K.; Rose, M.; "Management Information Base for Network 
Management of TCP/IP -based internets", Network Working Group RFC 1 156, 
May 1990; 

Case, J.; Fedor, M,; Schoffstall, M.; Davin, J.; "A Simple Network Management 
Protocol (SNMP)", Network Working Group RFC 1 157, May 1990 


I Co 

Davin, J.; Galvin, J.; McCloghrie, K.; "SNMP Administrative Model", Network 
Working Group RFC 1351, Jul., 1992; 

Galvin, J.; McCloghrie, K.; Davin, J.; "SNMP Security Protocols", Network 
Working Group RFC 1352, Jul, 1992; 

McCloghne, K.; Davin, J.; Galvin, J.; Definitions or Managed Uojects tor 
Administration of SNMP Parties , Network Working Group RJrC 1353, Jul., iyyz 


Yes 

"PKCS #1: RSA Encryption Standard", RSA Laboratories Technical Note, Ver. 
1.5, Revised Nov. 1, 1993 


Yes 

"PKCS #3: Diffie-Hellman Key- Agreement Standard", RSA Laboratories 
Technical Note, Ver. 1.4, Revised Nov. 1, 1993 


Yes 

"PKCS #6: Extended-Certificate Syntax Standard", RSA Laboratories Technical 
Note, Ver. 1.5, Revised Nov. 1, 1993 


Yes 

"PKCS #9: Selected Attribute Types", RSA Laboratories Technical Note, Ver. 1.1, 
Revised Nov. 1, 1993 


Yes 

Shneier, B.; "Description of new variable-length key, 64-bit block cipher 
(Blowfish)", Fast Software Encryption, Cambridge Security Workshop 
Proceedings, 1994 


Yes 

Feistel, H.; "Cryptographic Coding for Data-Bank Privacy", IBM document RC 
2827, Mar. 18, 1970 


Yes 

ACORN/ CLEAR, 1996-1998 


Yes 

Tuck, Bill; "Electronic Copyright Management Systems: Final Report of a Scoping 
Study for eLib", Jul., 1996 


* Any possible "Y"s that were missed shall not negate the anticipatory nature of a reference, particularly where 
there is a chart in Appendix B. 1 6 



Interims* Tech. Corp. v. Microsoft Corp* 
Case No. C 01-1*40 SBA (MEJ) 


APPENDIX OF PRIOR ART* 





Y 

■ 

Yes 

"CopySmart (CSM) suit", European Information Technology for Information 
Science; 

COPYSMART - 20517: "CITED based multi-media IPR management on cost 
effective smart device", European Information Technology for Information 
Science, start date Dec. 1, 1995; 

Summaries of Projects (FP Ill/TV) - Part I: "ESPIRIT Project 205 17 - 
COPYSMART CITED based multi-media PR management on cost effective smart 
device", European Information Technology for Information Science, Oct. 1998 


Yes 

"CREANET - Creative Rights European Agency KETwork - Project Profile" 
information society technologies, edited Feb. 18, 2000 


Yes 

"iOpener System Description", National Semiconductor, 1993 


Yes 

"iPower Technology" (National Semiconductor marketing brochure) 


Yes 

"The Standards Business; Time for Change," European Commission DG1 1 1 
Espirit Project 5th Consensus Forum, Nov. 3-4, 1998; 

"ESPIRIT Project 20676 - IMPRIMATUR - Intellectual Multimedia Property 
Rights Model and Terminology for Universal Reference", IMPRIMATUR 
Consortium, Oct 1998; 

Electronic Reserve Copyright Management System (ERCOMS), International 
Institute for Electronic Library Research, website updated by Ramsden, Anne, Jul. 
22, 1996; 

Achievements Archive, www.impriinatur.net/ web pages; 
impramatur news, IMPRIMATUR, Dec. 1998; 


Yes 

JUKEBOX-Music Across Borders, LIB- JUKEBOX/4-1 049 


Yes 

"ESPRIT Project 24378 - MENHIR European Multimedia network of high quality 
image registration", Museums On Line, Feb. 1, 1997 


Yes 

"ESPIRIT Project 22226 - MUSE - Developing standardized digital media 
management, signaling and encryption systems for the European music sector". 
International Federation of the Phonographic Industry, Oct. 1998 


Yes 

"STARFISH State of the Art Dinancial Services for the inHabitants of isolated 
areas - Project Profile" information society technologies, time schedule Jan. 21, 
2000 - Jun. 30, 2002 


* Any possible "Y"s that were missed shall not negate the anticipatory nature of a reference, particularly where 
there is a chart in Appendix B. 17 


InterTrust Tech. Corp. v. Microsoft Corp. 
Case No. C 01-1640 SBA (MEJ) 


APPENDIX OF PRIOR ART* 







"TALISMAN - Tracing Authors' rights by Labelling Image Services and 
Monitoring Access Network," ACTS Project No. AC019. Doc Reference AC019- 
THO-RGS-FR-P-001-bl.Sep.25, 1998; 


Yes 

Simon, C; Goray, E.; Vercken, G.; Delivet, B.; Delaigle, IF.; Boucqueau, JM.; 
"Digital Images protection managment in a broadcast framework: 
Overview/TALISMAN solution/ Thomson-CSF, RTBF, ART3000, UCL; 

"TALISMAN: Tracing Authors' rights by labelling image services and monitoring 
access network," ACTS, Swiss Participation in European Research Programmes, 

1 IQQf . Ann ^1 100S 



"TELENET TbLE training platform (on NET works) - Project Profile" information 
society technologies, time schedule Mar. 6, 2000 - Mar. 30, 2000; 



"Deliverable D3: Specification of the Infrastructure And explanation of trust and 
confidence building solutions" Ver. 0.1, Telenet, Jul. 18, 2000; 


Yes 

Email from Edmond Kouka to Jean-Francois Boisson re Affaire BC-CreaNet; Feb. 
10, 2001; 

Email from Bogdan Lutkiewicz to Jean-Francois Boisson re TELENET 
TELEtraining platform - Bogdan Lutkiewicz, Poland, Gdansk; Mar. 4, 2001 

Y 

Yes 

Boisson Jean-Francois* "Manapement of Intellectual Prnnprtv l^iphts in the 
Electronic Commerce: Textile Design Sales And Other Siimlar Initiatives," 


Yes 

U.S. Patent No. 5,251,294; Oct. 5, 1993 


Yes 

S.H. Low, N.F. Maxemchuk, J.T. Bassii, & L. O'Gonnan, Document Marking and 
Identification Using Both Line and Word Shifting. Infocom 95, 1994 


Yes 

Caroni, Maxemchuck & O'Gorman, Electronic Marking and Identification 
Techniques to Discourage Document Copying, Proc. Infocom 94, 1994 


Yes 

Wagner, Fingerprinting, IEEE Symp. On Info, and Privacy, Apr., 93 


Yes 

H. Berghal, L Ogorman, "Protecting Ownership Rights Through Digital 
Watermarking*, IEEE Computing v. 29, No.7, Jul., 1996, 


Yes 

Chor, Fiat & Naor, Tracing Traitors, Crypto 94, p. 257, 1994 


Yes 

David Chaum, "Security Without Identification: Transaction Systems to Make Big 
Brother Obsolete", Comm. Of the ACM, vol. 28, no. 10, Oct. 1985 


Yes 

'Wallet Databases with Observers". David Cbaum, Advances in CrvptoloRv - 
Proceedings of Crypto '92 (pp. 89-105), 1992 

Y 

Y« 

Sirbu, Marvin; Tygar, J.D.; "NetBill: An Internet Commerce System Optimized for 
Network Delivered Services" Carnegie Mellon University 


*» : 

LJlrich Kohl, Jeffrey Lotspiech, Marc Kaplan, "Safeguarding Digital Library 
Contents and Users", IBM Research Division, D-Lib Magazine, Sept. 97 



Daniel Schutzer, A Need for a Common Infrastructure: Digital Libraries and 
Electronic Commerce, Apr. 1996 


Yes 

vlichael Lesk, Digital Libraries Meet Electronic Commernce: On-Screen 
ntellectual Property, Dec. 15, 98 


* Any possible "Y"s that were missed shall not negate the anticipatory nature of a reference, particularly where 
there is a chart in Appendix B. 18 



InterTrust Tech. Corp. v. Microsoft Corp. 
Case No. C 01-1640 SBA (MEJ) 


APPENDIX OF PRIOR ART* 




)}^^/yy^-\.^ . . V. y \ 


Yes 

Lorcan Dempsey & Stuart L. Weibel; The Warwick Metadata Workshop: A 
Framework for the Deployment of Resource Description, Jul./ Aug. 96 


Yes 

"AT&T Smart Cards Systems & Solutions", AT&T, 1993 

Y 

Yes 

Gemplus; "MCOS: Multi Application Chip Operating System - Introduction", 
Gemplus Card International, 1990 


Yes 

Guillou, Louis C; "Smart Cards and Conditional Access", Springer- Veriag, 1988 


Yes 

David L. Chaum, "Untraceable Electronic Mail, Return Addresses, and Digital 
Pseudonyms", 1981 


Yes 

Kent, S.; "U.S. Department of Defense Security Options for the Internet Protocol", 
Network Working Group RFC 1 108, Nov. 1991 


l Co 

Deering, S.E.; "Host Extensions for IP Multicasting" > Network Working Group, 
RFC 1112, Aug. 1989 


I Co 

Pethia, R.; Crocker, S.; Fraser, B.; "Guidelines for the Secure Operation of the 
Internet", Network Working Group RFC 1281, Nov., 1991 


Yes 

Galvin, J.; McCloghrie, K.; "Security Protocols for version 2 of the Simple 
Network Management Protocol (SNMPv2)", Network Working Group RFC 1446, 
Apr., 1993 


i CD 

Eastlake III, D.; "Physical Link Security Type of Service", Network Working 
Group RFC 1455, May, 1993 


Yes 

Kastenholz, F.; "The Definitions of Managed Objects for the Security Protocols of 
the Point- to-Point Protocol", Network Working Group RFC 1472, Jun. 1993 

Y 

Yes 

Kohl, J., Neuman, C; "The Kerberos Network Authentication Service (V5)% 
Network Working Group RFC 1510, Sep., 1993 


Yes 

Eastlake m, D.; Crocker, S.; Schiller, J.; "Randomness Recommendations for 
Security", Network Working Group RFC 1750, Dec. 1994 


Yes 

Haller, N.; "The S/KEY One-Time Password System", Network Working Group 
RFC 1760. Feb., 1995 


Yes 

Atkinson, R.; "Security Architecture for the Internet Protocol", Network Working 
Group RFC 1 825, Aug., 1995 


Yes 

Crocker, S.; Freed, N.; Galvin, J.; Murphy, S.; "MIME Object Security Services", 
Network Working Group RFC 1848, Oct, 1995 


Yes 

U.S. Patent No. 5,251,294; Oct 5, 1993 


Yes 

S.H. Low, N.F. Maxemchuk, J.T. Bassil, & L. O'Gorman, "Document Marking and 
Identification Using Both Line and Word Shifting," AT&T Bell Laboratories, 
Infocom 95. Jul. 29.1994 


Yes 

Brassil, J.; Low, S.; Maxemchuck, N.; O'Gorman L.; "Electronic Marking and 
Identification Techniques to Discourage Document Copying," AT&T Bell 
Laboratories, Proc. Infocom 94, 1994 


Yes 

Wagner, Neal; "Fingerprinting," Drexel University, IEEE Symp. On Info, and 
Privacy, Apr., 1993 


Yes 

Berghal, Hal; Ogorman, Lawrence; "Protecting Ownership Rights Through Digital 
Watermarking," IEEE Computing v, 29, no.7, pp. 101-103, Jul., 1996 


Yes 

Chor, Benny; Fiat, Amos; Naor, Moni; "Tracing Traitors," Crypto 94, p. 257, 1994 


* Any possible "Y"s that were missed shall not negate the anticipatory nature of a reference, particularly where 
there is a chart in Appendix B. 19 


InterTrust Tech. Corp, v. Microsoft Corp, 
Case No. C 01-1(540 SBA (MEJ) 


APPENDIX OF PRIOR ART* 






Yes 

Chaum, David; "Security Without Identification: Transaction Systems to Make Big 
Brother Obsolete" Communications of the ACM vol 28 no 10. Oct. 1985 


Yes 

Fhaum David* Ped arson Torben Prvds' "Wallet Databases with Observers"* CWI. 
Aarhus University. David Chaum, Advances in Crvptologv — Proceedings of 

Prvmtrt "00 nn 1009 

i^rypio yz, pp. oy-ii/j, ivy/* 


Yes 

Kohl, Ulrich; Lotspiech, Jeffrey; Kaplan, Marc; "Safeguarding Digital Library 
contents ana users f uoivl Kesearcn revision, u-lao Magazine, oepu, x»/ 


Yes 

Schutzer, Daniel; "A Need for a Common Infrastructure: Digital Libraries and 
Electronic Commerce," Citibank. D-Lib Magazine, Apr., 1996 


Yes 

Paepcke, Andreas; "Summary of Stanford's Digital Library Testbed and Status", 
Stanford University, D-Lib Magazine, Jul- Aug., 1996 


Yes 

Dempsey, Lorcan; Weibel, Stuart L.; M Thc Warwick Metadata Workshop: A 
Framework for the Deployment of Resource Description", University of Bath, 
0CLC Office of Research, D-Lib Magazine, Jul.-Aug.. 1996 


Yes 

"AT&T Smart Cards Systems & Solutions", AT&T, 1993 


Yes 

Brad J. Cox, Dr., "What if there is a silver bullet?\ Dobbs Journal, Oct. 1992 


Yes 

Guillou, Louis C; "Smart Cards and Conditional Access", Springex-Verlag, 1988 


Yes 

Chaum, David; "Untraceable Electronic Mail, Return Addresses, and Digital 
j^seuaonyms ^ t^oniinunjcaiiOTjs or inc AdYt* voi. ino. j* rco M 1701 


Yes 

Kent, S.; "U.S. Department of Defense Security Options for the Internet Protocol", 
jNerwonc wonting oroup kj*\^ J juo, inov. jyyi 


Yes 

Deering, S.; "Host Extensions for IP Multicasting", Network Working Group RFC 

1 1 lO Ana . 1OR0 


Yes 

White, Steve R.; Comerford, Liam; "ABYSS: A Trusted Architecture for Software 
i^roiecnon ^ ir.ee, /\pr. z / , i yo / 


Yes 

Ross, Philip E.; 14 Cops versus robbers in cyberspace"; Forbes, Sep. 9, 1996 


Yes 

* r T>nt*i "NptwrvrVc nnH Orv»n Svttrm fVvrrirniiriirfl firing Dirertorv* Information 
TVj*finAlr\(rv Or\f>T\ ^v«t^mc TniprrrvrmpWirtn T*ViP DirftCtfiTV* OvWVIP.W nf* 

Concepts, Models, and Services", ITU-T Recommendation X.500, International 
Telecommunication Union, Nov. 1993 


Yes 

Bender, W.; Gruhl, D.; Morimoto, N.; Lu, A.; 'Techniques for data hiding", IBM 
Systems Journal, Vol. 35, Nos. 3&4, 1996 


Yes 

Maxemchuk, NJF.; "Electronic Document Distribution", AT&T Bell Laboratories 


Yes 

Doster, Bill; Rees, Jim; "Third-Party Authentication in the Institutional File 
System", Center for Information Technology Integration 


Yes 

Levy, Steven; "E-Money (That's What I Want)", Wired Magazine, Issue 2.12, Dec. 
94 


Yes 

Arms. William Y M "Key Concepts in the Architecture of the Digital Library", D- 
Lib Magazine, Jul. 1995 


Yes 

Weingart, S.H., "Physical Security for the uABYSS System", IEEE, 1987 


Yes 

B. Strohm, L. Comerford, S. R. White, "ABYSS: Tokens", IBM Research Report 
Number RC 12402, Dec. 18, 1986 


* Any possible "Y's that were missed shall not negate the anticipatory nature of a reference, particularly where 
there is a chart in Appendix B. 20 


InterTrust Tech. Corp. v. Microsoft Corp. 
Case No. C 01-1640 SBA (MEJ) 


APPENDIX OF PRIOR ART* 



Yes 


Gozani, Shai; day, Mary; Keshav, Srinivasari; Madisetti, Mijay; Munson, Ethan; 
Rosenblum, Mendel; Schoettier, Steve; Sullivan, Mark; Terry, Douglas; "GAFFES: 
The Design of a Globally Distributed File System", Report No. UCB/CSD 87/361; 
Computer Science Division (EECS), U.C. Berkley, Jua 1997 


Yes 


Chaura, David; Fiat, Amos; Naor, Moni; "Untraceable Electronic Cash", Lecture 
Notes in Computer Science, 403, Advances in Cryptology CRYPTO *88 
Proceedings, 1988 


Yes 


Chaum, David; "Privacy and Social Protection in Electronic Payment Systems" 
Chapter 12. The Future of Money in the Information Age 


Yes 


Bos, Jurjen.; Chaum, David; **SmartCash: a Practical Electronic Payment System" 
Center for Mathematics and Computer Science, Report CS-R9035, Aug. 


Yes 


Gircys, Gintaras R.; Understanding and Using COFF. O'Reilly & Associates, Inc.; 
Nov, 1988 


Yes 


Unix System V. Release 3>2, Programmer's Guide Vol. IL AT&T, Prentice Hall, 


1989 


Yes 


Richarson, Dennis W*; Electric Money: Evolution of an Electronic Funds-Transfer 
System, The MIT Press, 1970 : 


Yes 


Custer, Helen: Inside Windows NT. Microsoft Press, Redmond, WA. 1993 


Yes 


Pietrek, Matt; Windows Internals: The Implementation of the Windows Operating 
Environment Addison- Wesley, 1993 


Yes 


Gilde, R-, "DAT-Heads: Frequently Asked Questions", 1991, Release 3.1-Sep. 2, 
1992 . 


Yes 


Tardo, Joseph; Valente, Luis; "Mobile Agent Security and Telescript", General 
Magic, Inc. 


Yes 


Telescript Security", BYTE.com, Oct. 1994 


Yes 


Forum on Risks to the Public in Computers and Related Systems: ACM 
Committee on Computers and Public Policy, Peter G. Neumann, moderator". Risks- 
Forum Digest, Vol. 15, Issue 40, Jan. 24, 1994 


Yes 


Sahuguet, Arnaud; ''Piracy: the Dark Side of Electronic Commerce: CIS-70Q/2" 
Univ> of Pennsylvania, May 5, 1998 


Yes 


Rouaix, Francois; "A Web navigator with applets in Caml", 1NRIA 


Yes 


Fuchsberger, Andreas; Gollmann, Dieter; Lothian, Paul; Patcrson, Kenneth G.; 
Sidiropoulos, Abraham; 'Public-key Cryptography on Smart Cards", Information 
Security Group 


Yes 


'An Introduction to Safety and Security in Telescript**, Telescript Powered 


Yes 


Clarke, Roger; Bunting, Angela; "Cryptography issues in plain text", Privacy Law 
and Policy Reporter, 1996 


Yes 


Pratt & Witney Inuse 


Yes 


Use of ATM 


Yes 


Use of Set Top Box 


Yes 


Protective Envelope System 


PRIOR ART 


Yes 


3,573,747; Adams et al 


* Any possible M Y"s that were missed shall not negate the anticipatory nature of a reference, particularly where 
there is a chart in Appendix B. 21 



InterTrust Tech. Corp. v. Microsoft Corp. 
Case No. C 01-1640 SBA (MEJ) 


APPENDIX OF PRIOR ART* 





Yes 

3,609,697; Blevins 


Yes 

3,790,700; Callais et aL 


Yes 

3,796,830; Smith 


Yes 

3,798.359; Feistel 


Yes 

3,798,360; Feistel 


Yes 

3,798,605; Feistel 


Yes 

3,806,882; Clarke 

- 

Yes 

3,829,833; Freeny, Jr. 


Yes 

3,906,448; Henriques 


Yes 

3,91 1,397; Freeny, Jr. 


Yes 

3,924,065; Freeny, Jr. 


Yes 

3,931,504; Jacoby 


Yes 

3,946,200; Brobeck et al. 


Yes 

3,946,220; Brobeck et al. 


Yes 

3,956,615; Anderson el al. 


Yes 

3,958,081; Ehrsam et al. 


Yes 

3,970,992; Boothroyd et al. 


Yes 

4,048,619; Forman, Jr. et al. 


Yes 

4,071,911; Mazur 


Yes 

4,112,421; Freeny, Jr. 


Yes 

4,120,030; Johnstone 


Yes 

4,162,483; Entenman 


Yes 

4,163.280; Mori et al. 


Yes 

4,168,396; Best 


Yes 

4, 1 96,3 1 0; Forman et al. 


Yes 

4,200,913; Kuhar etal 


Yes 

4,209,787; Freeny, Jr. 


Yes 

4,217,588; Freeny, Jr. 


Yes 

4,220,99 1 ; Hamano et al. 


Yes 

4,232,193; Gerard 


Yes 

4,232,317; Freeny, Jr. 


Yes 

4,236,217; Kennedy 


Yes 

4,253,157; Kirschner et al. 


Yes 

4,262,329; Bright et al. 


Yes 

4,265,371; Desai etal. 


Yes 

4,270,182; Asija 


Yes 

4,278,837; Best 


Yes 

4,305,131; Best 


Yes 

4,306,289; Lumley 


Yes 

4,309,569; Meikle 


Yes 

4,319,079; Best 


Yes 

4,323,921; Guillou 


Yes 

4,328,544; Baldwin et al. 


Yes 

4,337,483; Guillou 


Yes 

4,361 ,877; Dyer et al. 


Yes 

4,375,579; Davida et al. 


Yes 

4,433,207; Best 


Yes 

4,434,464; Suzuki etal. 


* Any possible "Y"s thai were missed shall not negate the anticipatory nature oi a reference, particularly where 
there is a chart in Appendix B. 22 



IntcrTrust Tech. Corp. v. Microsoft Corp. 
Case No. C 01-1640 SBA (MEJ) 


APPENDIX OF PRIOR ART* 




I v. 



Yes . 

4,442,486 

; Mayer 


Yes 

4,446,519 

; Thomas 


Yes 

4,454,594 

, Heffron et al. 


Yes 

4,458,315 

, Uchenick 


Yes 

4,462,076 

, Smith, III 


Yes 

4,462,078 

, Ross 


Yes 

4,465,901 

.Best 


Yes 

4,471,163 

, Donald et al. 


Yes 

4,484,217 

, Block et al. 


Yes 

4,494,156 

; Kadison et al. 


Yes 

4,513.174 

, Herman 


Yes 

4,528,588 

, Lofberg 


Yes 

4,528,643 

. Frecny, Jr. 


Yes 

4,553,252 

, Egendorf 


Yes 

4,558,176 

t Arnold et al. 


Yes 

4,558,413 

, Schmidt et al. 


Yes 

4,562,306 

, Chou et al. 


Yes 

4,562,495 

, Bond et al. 


Yes 

4,577,289 

, Comer ford et al. 


Yes 

4,584,641 

Gufclielmino 


Yes 

4,588,991 

AtaDa 


Yes 

4,589,064 

Chiba et al. 


Yes 

4,593,183 

Fukatsu 


Yes 

4,593,353 

Pickholtz 


Yes 

4,593,376 

Volk 


Yes 

4,595,950 

Lofberg 


Yes 

4,597,058 

Izumi et a). 


Yes 

4,622,222 

Johnson 


Yes 

4,634,807 

Chorley et al. 


Yes 

4,644,493 

Chandra et al. 


Yes 

4,646,234 

Tolman et al. 


Yes 

4,652,990 

Pailen et al. 


Yes 

4,658,093 

Hellman 


Yes 

4,670,857 

Rackman 


Yes 

4,672,572 

Alsberg 


Yes 

4,677,434 

Fascenda 


Yes 

4,677,552 

Sibley, Jr. 


Yes 

4,680,731 

Izumi et al. 


Yes 

4,683,553 

Mollier 


Yes 

4,685,056 

Barnsdale et aL 


Yes 

4,688,169 

Joshi 


Yes 

4,691,350 

Kleijne et al. 


Yes 

4,696,034- 

Wiedemer 


Yes 

4,700,296; 

Palmer, Jr. et al. 


Yes 

4,701.846- 

Ikeda ct al. 


Yes 

4,712,238* 

Gilhousen et al. 


Yes 

4,713.753- 

Boebert et al. 


Yes 

4,727,550' 

Chang et al. 


* Any possible ,l Y"s that were missed shall not negate the anticipatory nature ot a reference, particularly where 
there is a chart in Appendix B. 23 



InterTrust Tech. Corp. v. Microsoft Corp* 
Case No. C 014640 SBA (MEJ) 


APPENDIX OF PRIOR ART* 






Yes 

4,740,890; William 


Yes 

4,747.139; Taaffe 


Yes 

4,757.533; Allen etaL 


Yes . 

4,757,534; Matyas et al. 


Yes 

4,768,087; Taub et al. 


Yes 

4,791,565; Dunham et al. 


Yes 

4,796,181; Wiedemer 

■ 

Yes 

4,798,209; Klinpenbeck et al. 


Yes 

4,799,156; Shavit et al. 


Yes 

4,807,288; Ufconet al. 


Yes 

4,817,140; Chandra et al. 


Yes 

4,823,264; Deming 


Yes 

4,827,508; Shear 


Yes 

4,858.121; Barber etal. 


Yes 

4,864,494; Kobus 


Yes 

4,866,769; Karp 


Yes 

4,868,877; Fischer 


Yes 

4,903,296; Chandra et al. 


Yes 

4,924,378; Hershey et al. 


Yes 

4,930,073; Cina, Jr. 


Yes 

4,949,187; Cohen 


Yes 

4,975,647; Downer et al. 


Yes 

4,977,594; Shear 


Yes 

4,999,806; Chernow et al. 


Yes 

5,001,752; Fischer 


Yes 

5,005,122; Griffin etal. 


Yes 

5,005,200; Fischer 


Yes 

5,010,571; Katznelson 


Yes 

5,023,907; Johnson et al. 


Yes 

5,047,928; Wiedemer 


Yes 

5,048,085; Abraham et al. 


Yes 

5,050,213; Shear 


Yes 

5,091,966; Bloomberg et al. 


Yes 

5,103,392; Mori 


Yes 

5,103,476; Wake etal. 


Yes 

5,11 1,390; Ketcham 


Yes 

5,119,493; Janis et al. 


Yes 

5,126,936; Champion et al. 


Yes 

5,128,525; Stearns et al. 


Yes 

5,136,643; Fischer 


Yes 

5,136,646; Haberet al. 


Yes 

5,136,647; Haber etal. 


Yes 

5,236,716; Harvey et al. 


Yes 

5,146,575; Nolan, Jr. 


Yes 

5,148,481; Abraham et al. 


Yes 

5,155,680; Wiedemer 

y 

Yes 

5,163,091; Graziano et al. 


Yes 

5,168,147; Bloomberg 


* Any possible M Y"s that were missed shall not negate the anticipatory nature ot a reference, particularly where 
there is a chart in Appendix B. 24 


InterTrust Tech. Corp. v. Microsoft Corp. 
Case No. C 01-1640 SBA (MEJ) 

APPENDIX OF PRIOR AftT* 



Yes 

5,185,717; Mori 


Yes 

5,187,787; Skeen etal. 


Yes 

5,203,046; Goldberg ct al. 


Yes 

5,201,047; Makietal. 


Yes 

5,208,748; Flores et al. 


Yes 

5,214,702; Fischer 


Yes 

5,216,603; Flores etal. 


Yes 

5,221;833;Hecht 


Yes 

5,222,134; Waite et al. 


Yes 

5,224,160; Paulini etal. 


Yes 

5,224,163; Gasser etal. 


Yes 

5,227,797; Murphy 


Yes 

5,235,642; Wobber etal. 


Yes 

5,241,671; Reed etal. 


Yes 

5,245,165; Zhang 


Yes 

5,247,575; Sprague et al. 


Yes 

5,257,369; Skeen et al. 


Yes 

5,260,999; Wyman 


Yes 

5,263,158; Janis 


Yes 

5,265,164; Matyas et al. 

Y 

Yes 

5,276,735; Boebert et al. 


Yes 

5,280,479; Mary 


Yes 

5,285,494; Sprecher et al. 


Yes 

5,301,231; Abraham et al. 


Yes 

5,311,591; Fischer 


Yes 

5,319,705; Halter etal. 


Yes 

5,319,785; Halter etal. 


Yes 

5,335,169; Chong 


Yes 

5337,360; Fischer 


Yes 

5,341,429; Stringer et al. 


Yes 

5,343,527; Moore 


Yes 

5,347,579; Blandford 


Yes 

5,351.293; Michener et al. 

Y 

Yes 

5,355,474; ThuraisnEham et al. 


Yes 

5,365,587; Campbell ct al. 


Yes 

5,373,440; Cohen etal. 


Yes 

5,373,561; Haber et al. 


Yes 

5,390,247; Fischer 


Yes 

5.390,330; Talati 


Yes 

5,392,220; van den Hamer et al. 


Yes 

5,392,390; Crozier 


Yes 

5.394,469; Nagel et al. 


Yes 

5,410,598; Shear 


Yes 

5,412,717; Fischer 


Yes 

5,418,713; Allen 


Yes 

5,420,927; Micali 


Yes 

5,421,006; Jablon 


Yes 

5,422,953; Fischer 


* Any possible w Y"s that were missed shall not negate the anticipatory nature of a reference, particularly where 
there is a chart in Appendix B, 25 



InterTrust Tech. Corp. v. Microsoft Corp. 
Case No. C 01-1640 SBA (MEJ) 


APPENDIX OF PRIOR ART* 






Yes 

5,428,606; Moskowitz 


Yes 

5,438,508; Wyman 


Yes 

5,442,645; Ugon 


Yes 

5,444,779; Daniele 


Yes 

5,449,895; Hechtet al. 


Yes 

5,449,896; Hecht et al. 


Yes 

5,450,493; Mahcr 


Yes 

5,453,601; Rosen 


Yes 

5,453,605; Hecht etal. 


Yes 

5,455,407; Rosen 


Yes 

5,455,861; Faucher et al. 


Yes 

5,455,953; Russell 


Yes 

5,457,746; Dolphin 


Yes 

5,457,747; Drexler et al. 


Yes 

5.458,494; Krohn etal. 


Yes 

5,463,565; Cookson et al. 


Yes 

5,473,687; Lipscomb et al. 


Yes 

5,473,692; Davis 


Yes 

5,479,509; Ugon 


Yes 

5,485,622; Yamaki 


Yes 

5,491,800; Goldsmith et al. 


Yes 

5,497,479; Hombuckle 


Yes 

5,497,491; Mitchell etal. 


Yes 

5,499,298; Narasimhalu et al. 


Yes 

5,504,757; Cook et al. 


Yes 

5,504,818; Okano 


Yes 

5,504,837; GxifTeth et al. 


Yes 

5,508,913; Yamamoto et al. 


Yes 

5,509,070; Schull 


Yes 

5,513,261; Maher 


Yes 

5^17,518; Rosen 


Yes 

5,530,235; Stefik et al. 


Yes 

5330,752; Rubin 


Yes 

5333,123; Force etal. 


Yes 

5334,855; Shockley et al. 


Yes 

5,534,975; Stefik et al. 


Yes 

5,535,322; Hecht 


Yes 

5,537326; Anderson et al. 


Yes 

5339,735; Moskowitz 


Yes 

5,539,828; Davis 


Yes 

5,550,971; Brunner et al. 


Yes 

5353,282; Parrish et al. 


Yes 

5 357,5 18; Rosen 


Yes 

5,557,798; Skeen et al. 


Yes 

5,563,946; Cooper et al 


Yes 

5368,552; Davis 


Yes 

5.572,673; Shurts 


Yes 

5,592,549; Naget etal. 


* Any possible "Y"s that were missed shall not negate the anticipatory nature of a reference, particularly where 
there is a chart in Appendix B. 26 



InterTrust Tech. Corp. v. Microsoft Corp. 
Case No. C 01-1640 SBA (MEJ) 


APPENDIX OF PRIOR ART* 






Yes 

5,606,609; Houser et al. 


Yes 

5,613,004; Coopemian et al. 


Yes 

5,621,797; Rosen 


Yes 

5,629,770; Brassil et al. 


Yes 

5.629,980; Stefik etal. 


Yes 

5,633,932; Davis etal. 


Yes 

5,634,012; Stefik ct al. 


Yes 

5,636,292; Rhoads 


Yes 

5.638.443; Stefik etal. 


Yes 

5,638,504; Scott etal. 


Yes 

5,640,546; Gopinath et ah 


Yes 

5,655,077; Jones etal. 


Yes 

5,678,170; Grube etal. 


Yes 

5,687,236; Moskowitz et al. 


Yes 

5,689,587; Bender etal. 

Y 

Yes 

5,692,047 ;McManis 


Yes 

5,692,180; Lee 


Yes 

5,710,834; Rhoads 


Yes 

5,715,403; Stefik 


Yes 

5,721,788; Powell etal. 


Yes 

5,732,398; Tagawa 


Yes 

5,740,549; Reilly etal. 


Yes 

5,745,604; Rhoads 


Yes 

5,748,763; Rhoads 


Yes 

5,748,783; Rhoads 


Yes 

5,748,960; Fischer 


Yes 

5,754,849; Dyer etal. 


Yes 

5,757,914; McManis 


Yes 

5.758,152; LeToumeau 

y 

Yes 

5,765,152; Erickson 


Yes 

5,768,426; Rhoads 


Yes 

5,774,872; Golden et al. 


Yes 

5,819,263; Bromley et al. 


Yes 

5,842,173; Strum etal. 


Yes 

BE9004 79 


I Co 

DE 3 803 982 


Yes 

DE 3 803 982 Al 


Yes 

EP 0 084 441 


Yes 

EP 0 084 441 Al 


Yes 

EP 0 128 672 


Yes 

EP0 128 672 Al 


Yes 

EP0 135 422 


Yes 

EP0135 422 Al 


Yes 

EP0 180 460 


Yes 

EP0180 460 Al 


Yes 

EP 0 370 146 


Yes 

EP0 370 146 Al 


Yes 

EP0 399 822 A2 


* Any possible "Y's that were missed shall not negate the anticipatory nature of a relerence, particularly where 
there is a chart in Appendix B. 27 



InterTrust Tech- Corp. v. Microsoft Corp. 
Case No. C 01-1640 SBA (MEJ) 


APPENDIX OF PRIOR ART* 




Rt-vfe-:^ 1 


Yes 

EP 0421 409 


Yes 

EP0421 409 A2 


Yes 

EP 0456 386 


Yes 

EP0456 386 A2 


Yes 

EP0 469 864 


Yes 

EP0 469 864 A2 


Yes 

EP0 469 864 A3 


Yes 

EP 0 565 314 


Yes 

EP 0565 314 A2 


Yes 

EP0593 305 


Yes 

EP0 593 305 A2 


Yes 

EP0 651 554 


Yes 

EP0 651 554A1 


Yes 

EP 0 668 695 


Yes 

EP 0 668 695 A2 


Yes 

EP 0 668 695 A3 


Yes 

EP 0 695 985 


Yes 

EP0 695 985 Al 


Yes 

EP 0 696 798 


Yes 

EP 0 696 798 Al 


Yes 

EP 0714 204 


Yes 

EP 0 714 204 A2 


Yes 

EP0 715 243 


Yes 

EP0 715 243 Al 


Yes 

EP0715 244 


Yes 

EP0715 244 Al 


Yes 

EP0715 245 


Yes 

EP0 715 245 Al 


Yes 

EP 0 715 246 


Yes 

EP0 715 246 Al 


Yes 

EP0715 247 


Yes 

EP0 715 247 Al 


Yes 

EP 0 725 376 


Yes 

EP 0 725 376 A2 


Yes 

EP0 749 081 


Yes 

EP0 749 081 Al 


Yes 

EP 0 763 936 


Yes 

EP 0 763 936 A2 


Yes 

EP 0 778 513 


Yes 

EP 0 778 513 A2 


Yes 

EP 0 795 873 


Yes 

EP0 795 873 A2 


Yes 

EP 0 800 312 


Yes 

EP 0 800 312 Al 


Yes 

GB 2,136,175 


Yes 

GB 2,264,796 


Yes 

GB 2,294,348 


Yes 

GB 2,295,947 


* Any possible "Y"s that were missed shall not negate the anticipatory nature of a reference, particularly where 
there is a chart in Appendix B. 28 



InterTrust Tech. Corp. v. Microsoft Corp. 
Case No. C 01-1640 SBA (MEJ) 


APPENDIX OF PRIOR ART* 






Yes 

JP 01-068835 


Yes 

JP 02-242352 


Yes 

JP 02-247763 


Yes 

JP 02-294855 


Yes 

JP 04-369068 


Yes 

JP 05- 18 1734 


Yes 

JP 05-257783 


Yes 

JP 05-268415 


Yes 

JP 06-175794 


Yes 

JP 06-215010 


Yes 

JP 06-225059 


Yes 

JP 07-056794 


Yes 

JP 07-084852 


Yes 

JP 07-141138 


Yes 

JP 07-200317 


Yes 

JP 07-200492 


Yes 

JP 07-244639 


Yes 

JP 08-137795 


Yes 

JP 08- 152990 


Yes 

JP 08-185292 


Yes 

JP 08-185298 


Yes 

JP 57-726 


Yes 

JP 62-241061 


Yes 

WO 85/02310 


Yes 

WO 85/03584 


Yes 

WO 90/02382 


Yes 

WO 92/06438 


Yes 

WO 92/22870 


Yes 

WO 93/01550 


Yes 

WO 94/01821 


Yes 

WO 94/03859 


Yes 

WO 94/06103 


Yes 

WO 94/16395 


Yes 

WO 94/18620 


Yes 

WO 94/22266 


Yes 

WO 94/27406 


Yes 

WO 95/14289 


Yes 

WO 96/00963 


Yes 

WO 96/03835 


Yes 

WO 96/05698 


Yes 

WO 96/06503 


Yes 

WO 96/13013 


Yes 

WO 96/21192 


Yes 

WO 96/24092 


Yes 

WO 97/03423 


Yes 

WO 97/07656 


Yes 

WO 97/25816 


Yes 

WO 97/32251 


* Any possible "Y"s that were missed shall not negate the anticipatory nature of a reference, particularly where 
there is a chart in Appendix B. 29 



InterTrust Tech. Corp. v. Microsoft Corp* 
Case No. C OM640 SBA (MEJ) 


APPENDIX OF PRIOR ART* 





Yes 

WO 97/48203 . 


I CS 

Amerke, David, et ah, News Release, AT&T, Jan. 9, 1995, AT&T encryption 
system protects information services, 1 page. 


Yes 

Applications Requirements for Innovative Video Programming; How to Foster (or 
Cripple) Program Development Opportunities for Interactive Video Programs 
Delivered on Optical Media; A Challenge for the Introduction of DVD (Digital 
Video DiscW19-20 Oct. 19 

< 

Yes 

Argent Information Q&A Sheet, http://www.digital-watermark.com/, Copyright 
1995, The DICE Company. 7 pages. 


Yes 

Automation of Securities Markets and Regulatory Implications, Financial Market 
Trends, n50, p. 20-33, Oct 1991- [File 148, Gale Group Trade & Industry DB, 
DialoeHO commercial databasel 


Yes 

Avery etal; Recommender Systems For Evaluating Computer Messages, 
Communications of the ACM, pp. 88-89 (Mar. 1997). 


Yes 

Background on the Administration's Telecommunications Policy Reform Initiative, 
News Release, The White House, Office of the President, Jan. 1 1, 1994 


Yes 

Baggett, Claude, Cable's Emerging Role in the Information Superhighway, Cable 
Labs, 13 slides. 


Yes 

Balabanovic et al, Content-based, Collaborative Recommendation, 
Communications of the ACM, pp. 66-72 (Mar. 1997). 


Yes 

Barassi, Theodore Sedgwick Esq., The Cybemotary: Public Key Registration and 
Certificaiton and Authentication of International Legal Transactions, 4 pages. 


Yes 

Barnes, Hugh, memo to Henry LaMuth, subject: George Gilder articles. May 31, • 
1994. 


Yes 

Bart, Dan, Comments in the Matter of Public Hearing and Request for Comments 
on the International Aspects of the National Information Infrastructure, Before the 
Department of Commerce, Aug. 12, 1994. 


Yes 

Baurn, Michael, Worldwide Electronic Commerce: Law, Policy and Controls 
Conference, program details, Nov. 1 1, 1993. 


Yes 

Best, Robert M., Digest of Papers, VLSI: New Architectural Horizons, Feb. 1980, 
Preventing Software Piracy With Crypto-Microprocessors, pp. 466-469. 


Yes 

Bisbey, Richard L., II and Gerald J Popek, Encapsulation; An Approach to 
Operating System Security, (USC/Information Science Institute, Marina Del Rey, 
CA) Oct. 1973, pp. 666-675. 


Yes 

Blom et al., Encryption Methods in Data Networks, Ericsson Technics, No. 2, 
1978. Stockholm, Sweden. 


Yes 

Bruner, RickE., TowerAgent, NetBot help advertisers reach Internet shoppers," 
Aug. 1997 (Document from Internet). 


Yes 

Cable Television and America's Telecommunications Infrastructure, (National 
Cable Television Association, Washington, D.C.), Apr. 1993, 19 pages. 


Yes 

Caruso, Denise, Technology, Digital Commerce: 2 plans for watermarks, which can 
bind proof of authorship to electronic works, N.Y. Times, Aug. 7, 1995, p. D5. 


Yes 

CD ROM, Introducing . . . The Workflow CD-ROM Sampler, Creative Networks, 
MCIMail: Creative Networks, Inc., Palo Alto, California. 


* Any possible "Y*s that were missed shall not negate the anticipatory nature of a reference, particularly where 
there is a chart in Appendix B. 30 



InterTrust Tech. Corp. v. Microsoft Corp, 
Case No. C OM<S40 SBA (MEJ) 


APPENDIX OF PRIOR AfeT* 


HH 




Yes 

r 1 /*!! Oftmmnn f»a**\i/flv interface Document from the Internet. 
<cgi@ncsa.uiuc.edu>. 1996. 1 page. . 

Y 

Yes 
Yes 

Chase Chevy, M.D., DiscStore (Electronic Publishing Resources 1991). 
Choudhury, et al., "Copyright Protection for Electronic Publishing over Computer 
Networks," AT&T Bell Laboratores, Murray Hill, New Jersey 07974 (Jun. 1994). 


Yes 

Clark, Tim, Ad service gives cash back, Document from the Internet 
<www.newsxomJNewsAten^O,4a3050,OO.html> (visited Aug. 4, 1997), 2 pages. 


Yes 

Codercard, Spec Sheet-Basic Coder Subsystem (Interstate iuecirorucs ^orp., 
Anaheim, CA). (undated) 4 pages. . — 



Yes - 

Collection of documents including: Protecting Electronically Published Properties, 
Increasing Pubtfshing Profits, (Electronic Publishing Resources Inc.) Jan. 1993, 25 
pages. -i_ ■ 


Yes 

Communications of the ACM, Intelligent Agents, Jul. lysw, voj. 3 /, imo. / . _ 


Yes 
Yes 

Communications of the ACM, Jun. 1996, vol. 39, No. 6. 

Computer Systems Policy Project (CSSP), Perpsectives on the National 

Information Infrastructure: Ensuring Interoperability (Feb. 1994), Feb. 1994. 


Yes 

Cunningham, Donna, et al., News Release, AT&T, Jan. 31, 1995, AT&T, VLSI 
Technology ioin to improve info hiphwav security, 3 pages, . 


Yes 

Data Sheet, About the Digital Notary Service, Surety Technologies, Inc., 1994- 
1995. 6 pages. 


Yes 

Dempsey, et al., "The Warwick Metadata Workshop: A Framework for the 
Deployment of Resource Description", D-Lib Magazine, Jul. 15, 1996. 


Yes 

Denning et al. f Data Security, 1 1 Computing Surveys No. 3, Sep. 1979, pp. 227- 
249. . — 


Yes 

Diffie, Whitfield and Martin E. Hellman, IfcfcJi Transactions on Information 
Theory, vol. 22, No. 6. Nov, 1976. New Directions in Cryptography, pp. 644-651. 


Yes 

Diffie, Whitfield and Martin E. Hellman, Proceedings of the IfcEE, vol- 67, No. 3, 
Mar. 1979, Privacy and Authentication: An Introduction to Cryptography, pp. 397- 
427. . — 


Yes 

DSP56000/DSP56001 Digital Signal Processor User's Manual, Motorola, 1990, pp. 
2-2. . — — 


Yes 

Dusse, Stephen R. and Burton S. Kaliski, A Cryptographic Library ior ine 
Motorola 56000 in Damgard, I. M., Advances in Cryptology-Proceedings 
EuTOcrypt 90 7 Springer-Verlae. 1991. PP. 230-244. 


Yes 

Dyson, Esther, Intellectual Value, Wired Magazine, Jul. 1995, pp. 136-141 and 182 
184. 


Yes 

EDS Provides PowerAgent with Internet Services to Support One-to-One 
Marketing (PowerAgent Inc. 1997* no later than Aue. 13, 1997). 


Yes 

EFFector Online vol. 6 No. 6, "A Publication of the Electronic Frontier 
Foundation," 8 pages, Dec. 6, 1993. 


Yes 

EIA and TIA White Paper on National Information Infrastructure, published by the 
Electronic Industries Association and the Telecommunications Industry 
Association, Washington, D.C., no date. 


* Any possible "Y"s that were missed shall not negate the anticipatory nalure of a relerence, particularly 
there is a chart in Appendix B. 31 



InterTrust Tech. Corp. v. Microsoft Corp. 
Case No, C 01-1$40 SB A (MEJ) 


APPENDIX OF PRIOR ART* 


BBS 




Yes 

Electronic Currency Requirements, XTWT (Cross Industry Working Group), (no 
date). 


Yes 

Electronic Publishing Resources Inc. Protecting Electronically Published Properties 
Increasing Publishing Profits (Electronic Publishing Resources 1991). 


Yes 

Firefly Network, Inc., www.ffly.com, What is Firefly? Firefly revision; 41.4 
Copyright 1995, 1996. 


i es 

First CII Honeywell Bull International Symposium on Computer Security and 
Confidentiality, Jan. 26-28, 1981, Conference Text, pp. 1-21- 


Yes 

Framework for National Information Infrastructure Services, Draft, U.S. 
Department of Commerce, Jul. 1994. 


Yes 

Framework for National Information Infrastructure Services, N1ST, Jul. 1994, 12 
slides. 


Yes 

Garcia, D. Linda, Science, space and technology, Hearing before Subcomm, on 
Technology, Environment, and Aviation, May 26, 1994 (testimony of D. Linda 
Garcia). 


Yes 

Gleick, James, Dead as a Dollar, The New York Times Magazine, Jun. 16, 1996, 
Section 6, pp. 26-30, 35, 42, 50. 54. 


Yes 

Greguras, Fred, Softie Symposium '95, Copyright Clearances and Moral Rights, 
Nov. 30, 1995 (as updated Dec. 1 1, 1995), 3 pages. 


Yes 

Guillou, Louis C, Smart Cards and Conditional Access, Advances in Cryptography- 
-Proceedings of EuroCrypt 84 (T. Beth et al, Ed., Springer- Verlag, 1985) pp. 480- 
490. 


Yes 

Haar, Steven Vonder, PowerAgent Launches Commercial Service, Interactive 
Week Aug. 4, 1997, (Document from the Internet) 1 page. 


Yes 

Hannan, Harry H., Modern Factor Analysis, Third Edition Revised, University of 
Chicago Press, Chicago and London, 1976. 


Yes 

Hearst, Interfaces For Searching the Web Scientific American pp. 68-72 (Mar. 
1997). 


I es 

Herzberg, Amir et al., Public Protection of Software, ACM Transactions on 
Computer Systems, vol. 5, No. 4, Nov. 1987, pp. 371-393. 


Yes 

Hofmann, Jud, Interfacing the NU to User Homes, (Consumer Electronic Bus. 
Committee) NIST, Jul. 1994, 12 slides. 


Yes 

Hofmann, Jud, Interfacing the Nil to User Homes, Electronic Industries 
Association, Consumer Electronic Bus Committee, 14 slides, no date. 


Yes 

Holt, Stannie, Start-up promises user confidentiality in Web marketing service, Info 
World Electric, Aug. 13, 1997 (Document from Internet)/ (Infoworld Publishing 
Co. Aug. 4, 1997). 


Yes 

Ho Java.TM.: The Security Story Document from the Internet, (no date) 4 pages. 


Yes 

How Can I Put an Access Counter on My Home Page?, World Wide Web FAQ, 
1996, 1 page. 


Yes 

Multimedia Mixed Objects Envelopes Supporting a Graduated Fee Scheme Via 
Encryption, IBM Technical Disclosure Bulletin, vol. 37, No. 3, Mar. 1, 1994, pp. 
413-417, XP000441522. 


Yes 

Transformer Rules Strategy for Software Distribution Mechanism-Support 
Products, IBM Technical Disclosure Bulletin, vol. 37, No. 48, Apr. 1994, pp. 523- 
525, XP00045 1335. 


* Any possible "Y"s that were missed shall not negate the anticipatory nature of a reference, particularly where 
there is a chart in Appendix B. 32 



InterTrust Tech. Corp. v. Microsoft Corp. 
Case No. C 01-1640 SBA (MEJ) 


APPENDIX OF PRIOR ART* 



mm 

Yes 

DSP Break Out Session Report for Group No. 3, Standards Development and 
Tracking System, no date. 


Yes 

Information Infrastructure Standards Panel: Nil "The Information Superhighway", 
NationsBank~HGDeal-ASC X9, (no date). 15 pages. 


Yes 

Intellectual Property and the National Information Infrastructure, a Preliminary 
Draft of the Report of the Working Group on Intellectual Property Rights, Green 
paper, Jul. 1994, 141 pages. 


I CO 

Invoice? What's an Invoice?, Business Week, Jun. 10, 1996, pp. 110-1 12. 


Yes 

Is Advertising Really Dead/, Wired 1.02, Part Z, 1994. 


Yes 

Javasoft, Frequently Asked Questions- Applet Security, What's Java.TM.? Products 
and Services, Java/Soft News, Developers Cornier, Jun. 7, 1996, 8 pages. 
Document from Internet, <iava@fava.sun.com.> 


Yes 

Jiang, ct al, A concept-Based Approach to Retrieval from an Electronic Industrial 
Directory, International Journal of Electronic Commerce, vol. 1, fNO. I, rail lvyo, 
dd. 51-72. 


Yes 

Jones, Debra, Top Tech Stories, Power A gent Introducts First Internet 
"Infomediary" to Empower and Protect Consumers, Aug. 13, 1997, 3 pages 
(Document from Internet). 


Yes 

Kautz, Referral Web: Combining Social Networks and Collaborative Filtering, 
Communjcations of the ACM, pp. 63-65 (Mar. 1997). 


Yes 

Kelly, Kevin, Whole Earth Review, fc-Money, pp. 4U-jy, oummer lyyj. 


Yes 

Kent, Stephen Thomas, Protecting Externally Supplied Software in Small 
Computers, (MIT/LCS/TR-255) Sep. 1980, 254 pages. 


Yes 

Kohntoj>p. M., Sag's durch die Blume. Apr. 1996, marit@schulung.netuse.de 


Yes 

Konstan et al. Applying Collaborative Filtering to Usenet News, Communications 
of the ACM, pp. 77-87 (Mar. 1997). 


Yes 

Kristol et al., Anonymous Internet Mercantile Protocol, AT&T Bell Laboratories, 
Murray Hill, New Jersey, J->ran: Mar. 17, iyy4. 


Yes 

L<agO£e, \_arj, jj-ud rviagazine, jujj/vug. u/yo, i nc warwiLjs. rtduicwuifc, n. 
Container Architecture for Diverse Sets of Metadata. 


Yes 

t o \vi;Va «ip./->f T r\rttr> rrvnil rVmo^ friMftr'^ Fifth Artirlp— Digital Darkhorse-- 
l rflnZfl, iyilkc, electronic man, vjcuj^jo vjnua a a ii ui < ruiiwi&~ju'i£Mcu i^«urkjiw*** 

Newspapers, Feb. 21, 1994. 


i es 

Taw Ci#»v<»t» P.Mnnpv That'* Whnt 1 want "WTRFD Dec 1994 10 DflgeS. 


Yes 

I />vi/ m al Annnvmrnuc Prprfit Pards and its Collusion Analysis. AT&T Bell 
Laboratories, Murray Hill, New Jersey, Oct 10, 1994. 


Yes 

Low et al., Anonymous Credit Cards, AT&T Bell Laboratories, Proceedings of the 
2nd ACM Conference on Computer and Communications Security, Fairfax, 
Virginia, Nov. 2-4, 1994. 


Yes 

Low et al.. Document Marking and Identificau'on using both Line and Word 
Shifting, AT&T Bell Laboratories, Murray Hill, New Jersey, Jul. 29, 1994. 


Yes 

Lynch, Searching the Internet Scientific American pp. 52-56 (Mar. 1997). 


Yes 

Maclachlan, Malcolm, PowerAgent Debuts Spam-Free Marketing, TechWire, Aug. 
13, 1997, 3 pages (Document from Internet). 


Yes 

Maxemchuk, Electronic Document Distribution, AT&T Bell Laboratories, Murray 
Hill, New Jersey 07974. 


Yes 

Micro Card (Micro Card Technologies, Inc., Dallas, TX), (no date), 4 pages. 


Yes 

Milbrandt, Eric, Stenanography Info and Archive, 1996, 2 pages. 


* Any possible "Y"s that were missed shall not negate the anticipatory nature of a reference, particularly where 
there is a chart in Appendix B. 33 



InterTrust Tech. Corp. v. Microsoft Corp, 
Case No. C 01-1^40 SBA (MEJ) 


APPENDIX OF PRIOR ART* 





Y 

Yes 

Mori, Ryoichi and Masaji Kawahara, Superdistribution: The Concept and the 
Architecture, The Transactions of the EIEICI, V, E73, No. 7, Tokyo, Japan, Jul. 
1990. 


Yes 

Mossberg, Walter Personal Technology, Threats to Privacy On-Line Become 
More Worrisome, Wall Street Journal, Oct. 24, 1996. 


Yes 

Negroponte, Nicholas, Electronic Word of Mouth, Wired, Oct. 1996, p. 218. 


Yes 

Negroponte, Nicholas, Some Thoughts on Likely and Expected Communications 
Scenarios: A Rebuttal, Telecommunications, Jan. 1993, pp. 41-42. 


Yes 

Neumann, et al., A Provably Secure Operating System: The System, Its 
Applications, and Proofs, Computer Science Labortory Report CSL-1 16, Second 
Edition, SRI International ("May 1980). 


Yes 

New Products* Systeras-and Services, AT&T Technology, vol. 9, No. 4, (undated), 
pp. 16-19. 


Yes 

News from The Document Company Xerox, Xerox Announces Software Kit for 
Creating Working Documents with Dataglyphs Document from Internet, Nov. 6, 
1995. 13 pases. 


Yes 

Nil, Architecture Requirements, XIWT, (no date). 


Yes 

Open System Environment Architectural Framework for National Information 
Infrastructure Services and Standards, in Support of National Class Distributed 
Systems, Distributed System Engineering Program Sponsor Group, Draft 1.0, Aug. 
5, 1994. 


Yes 

Pelton, Dr. Joseph N., Telecommunications, Why Nicholas Negroponte is Wrong 
About the Future of Telecommunication, pp. 35-40, Jan. 1993. 


Yes 

Portland Software's ZipLock, Internet Information, Copyright Portland Software, 
1996-1997. 12 pages. 


Yes 

PowerAgent Introduces First Internet v Infomediary* to Empower and Protect 
Consumers (PowerAgent Inc. Aug. 4, 1997). 


Yes 

PowerAgent Introduces First Internet *lnfomediary* to Empower and Protect 
Consumers (PowerAgent Inc., 1997 (no later than Aug. 13, 1997). 


Yes 

PowerAgent Introduces First Internet *Infomediary* to Empower and Protect 
Consumers (Tech Talk Aug. 4, 1997). 


Yes . 

PowerAgent Introduces First Internet "lnfomediary* to Empower and Protect 
Consumers (Techmall.com, Aug. 4, 1997). 


Yes 

PowerAgent Introduces Internet's First True 1:1 Marketing Network (PowerAgent 
Inc., Aug. 4, 1997). 


Yes 

PowerAgent Press Releases, "What the Experts are Reporting on PowerAgent," 
Aug. 13, 1997, 3 pages (Document from Internet). 


Yes 

PowerAgent Press Releases, What the Experts are Reporting on PowerAgent, Aug. 
13, 1997, 6 pages (Document from Internet). 


Yes 

PowerAgent Press Releases, What the Experts are Reporting on PowerAgent, Aug. 
4, 1997, 5 pages (Document from Internet). 


Yes 

Premenos Announces Templar 2.0-Next Generation Software for Secure Internet 
EDI, Document from Internet: < webmaster ©templar .net>, Jan. 17, 1996, 1 page. 


* Any possible "Y"s that were missed shall not negate the anticipatory nature of a reference, particularly where 
there is a chart in Appendix B. 34 



Intel-Trust Tech. Corp. v. Microsoft Corp. 
Case No. C 01-1640 SBA (MEJ) 


APPENDIX OF PRIOR ART* 






Yes 

Premenos Corp. White Paper: The Future of Electronic Commerce, A Supplement 
to Midrange Systems, Document from Internet, <webmaster@premenos.com>, 
4 pages, no date. 


Yes 

Press Release, "National Semiconductor and EPR Partner For Information 
Metering/Data Security Cards" (Mar. 4, 1994). 


Yes 

Proper Use of Consumer Information on the Internet, Document from the Internet, 
White Paper. (PowerAeent Inc., Melo Park, CA) Jun. 1997, 9 paj>es. 


Yes 

Rankine, Gordon, "Thomas- A Complete Single-Chip RSA Device," Advances in 
Cryptography, Proceedings of Crypto 86, pp. 480-487 (A.M. OdJyzko Ed., 
Springer- Verlae 1987). 


. .. I CS _ 

Reilly, Arthur K., Standards committee Tl-Tclecbmmunications, Input to the 
"International Telecommunications Hearings,* Panel 1: Component Technologies 
of theNII/GIL no date. 


Yes 

Resnick, et al., Recommender Systems.Communications of the ACM, vol. 40, No. 
3, Mar. 1997, dd. 56-89. 


Yes 

Resnick, Filtering the Information On the Internet Scientific American pp. 62-64 
(Mar. 1997). 


Yes 

ROI-Solving Critical Electronic Publishing Problems (Personal Library Software, 
1987 or 1988). 


I cS 

Rose, Lance, Cyberspace and the Legal Matrix: Laws or Confusion?, 1991. 


Yes 

Rosenthal, Steve, Interactive Newtork: Viewers Get Involved, New Media, Dec. 
1992, pp. 30-31. 


Yes 

Rosenthal, Steve, Interactive TV: The Gold Rush is on, New Media, Dec. 1992, pp. 
27-29. 


res 

Rosenthal, Steve, Mega Channels, New Media, Sep. 1993, pp. 36-46. 


Yes 

Rothstein, Edward, Technology, Connections, Making the Internet come to you 
through *pusrT technology, New York Times, Jan. 20. 1997, p. D5. 


Yes 

Rucker et al, Personalized Navigation For the Web, Communications of the ACM, 
pp. 73-75 (Mar. 1997). 


Yes 

Rutkowski, Ken, Power Agent Introduces First Internet ^Infomediary* to Empower 
and Protect Consumers, Tech Talk News Story, Aug. 4, 1997, 1 page. (Document 
from Internet) 


Yes 

Sager, Ira (Edited by), Bits & Bytes, Business Week, Sep. 23, 1996, p. 142E. 


Yes 

Schlosstein, Steven, America: The G7's Comeback Kid, International Economy, 
Jun7Jul. 1993, 5 pages. 


Yes 

Schurmann, Jurgen, Pattern Classification, A Unified View of Statistical and 
Neural Approaches, John Wiley & Sons, Inc., 1996. 


Yes 

Scnaumueller-Bichl, Ingrid, et al., A Method of Software Protection Based on the 
Use of Smart Cards and Cryptographic Techniques, (undated), 9 pages. 


Yes 

Serving the Community: A Public-Interest Vision of the National Information 
Infrastructure, Computer Professionals for Social Responsibility, Executive 
Summary, no date. 


Yes 

Shear, Victor, Solutions for CD-ROM Pricing and Data Security Problems, pp. 530- 
533, CD ROM Yearbook 1988-1989) (Microsoft Press 1988 or 1989). 


* Any possible "Y"s that were missed shall not negate the anticipatory nature of a reference, particularly where 
there is a chart in Appendix B. 35 



InterTrust Tech. Corp. v. Microsoft Corp. 
Case No. C 0M640 SBA (MEJ) 


APPENDIX OF PRIOR ART* 





Yes 

Siuda, Karl, Security Services in Telecommunications Networks, Seminar: 
Mapping New Applications Onto New Technologies, edited by B. Plattner and P 
Gunzburecr; Zurich, Mar. 8-10, 1988, pp. 45-52, XP00O215989. ' ' 


Yes 

Smith, Sean and J.D- Tyger, Signed Vector Timestamps: A Secure Protocol for 
Partial Order Time, CMU-93-1 16. School of Computer Science Carnegie Mellon 
University, Pittsburgh, Pennsylvania, Oct 1991; version of Feb. 1993, 15 pages. 


Yes 

Special Report, "The Internet: Fulfilling the Promise"; Lynch, Clifford; The 
Internet Bringing Order From Chaos"; Resnick, Paul; "Search the Internet", Hearst, 
Marti A; "Filtering Information on the Internet"; Stefik, Mark; "Interfaces for 
Searching the 


Yes 

Stefik, Mark, Introduction to Knowledge Systems, Chapter 7, Classification 
(Morgan Kaufmann Publishers, Inc., 1995) pp. 543-607. 


Yes 

Stefik, Mark, Letting Loose the Light Igniting Commerce in Electronic 
Publication. (Xerox PARC, Palo Alto, CA) 1994-1995, 35 pages. 


Yes 

Stefik, Mark, Letting Loose the Light: Igniting Commerce In Electronic 
Publication, Internet Dreams: Archetypes, Myths, and Metaphors. Massachusetts 
Institute of Technology, 1996. pp. 219-253. 


Yes 

Stefik, Trusted Systems Scientific American pp. 78-81 (Mar. 1997), 


Yes 

Stephenson, Tom, Advanced Imaging, The Info Infrastructure Initiative: Data 
SuperiFEghways and You, pp. 73-74. May 1993. 


Yes 

Sterling, Bruce, "Literary freeware: Not for Commercial Use", remarks at 
Computers, Freedom and Privacy Conference IV, Chicago, Mar. 26, 1994. 


Yes 

Struif, Bruno, The Use of Chipcards for Electronic Signatures and Encryption, 
Proceedings for the 1989 Conference on VLSI and Computer Peripherals, IEEE 
Computer Society Press, 1989. pp. (4M55-(4)158. 


Yes 

Templar Software and Services: Secure, Reliable, Standards-Based EDI Over the 
Internet, Prementos, Internet info @teniplar.net t .lpage> 


Yes 

Templar Overview,: Premenos, Internet info@templar.net, 4 pages. 


Yes . 

Terveen et al, A System For Sharing Recommendations, Communications of the 
ACM, pp. 59-62 (Mar. 1997). 


Yes 

The 1:1 Future of the Electronic Marketplace: Return to a Hunting and Gathering 
Society, 2 pages, no date. 


Yes 

The Benefits of ROI For Database Protection and Usage Based Billing (Personal 
Library Software, 1987 or 1988). 


Yes 

The New Alexandria No. 1, Alexandria Institute, pp. 1-12, JuJ.-Aug. 1986. 


Yes 

This Web Agent Knows What You Like, Business Week, p. 142E (Sep. 23, 1996). 


Yes 

Tygar, J.D. and Bennet Yee, Cryptography: It's Not Just For Electronic Mail 
Anymore, CMU-CS-93-107, School of Computer Science Carnegie Mellon 
University, Pittsburgh. PA, Mar. 1, 1993. 21 pages. 


Yes 

Tygar, J.D. and Bennet Yee, Dyad: A System for Using Physically Secure 
Coprocessors, School of Computer Science, Carnegie Mellon University, 
Pittsburgh, PA (undated), 41 pages. 


Yes 

Tygar, J D. and Bennet Yee, Dyad: A System for Using Physically Secure 
Coprocessors, School of Computer Science, Carnegie Mellon University, 
Pittsburgh, PA, May 1991, 36 pages. 


• Any possible "V's that were missed shall not negate the anticipaiory nature of a reference, particularly where 
there is a chart in Appendix B. 36 



InterTrust Tech* Corp. v. Microsoft Corp. 
Case No. C 0M640 SBA (MEJ) 


APPENDIX OF PRIOR ART* 






i Co 

Valovic, T., The Role of Computer Networking in the Emerging Virtual 
Marketplace, Telecommunications, (undated), pp. 40-44. 


Yes 

Voight, Joan, Beyond the Banner, Wired, Dec. 1996, pp. 196, 200, 204. 

Y 

Yes 

Weber, Metering Technologies for Digital Intellectual Property, A Report to the 
International Federation of Reproduction Rights. Organisations, pp 1-29; Oct. 1994, 
Boston, MA, USA. 

Y 

Yes 

Weber, Robert, Digital Rights Management Technologies, A Report to the 
International Federation of Reproduction Rights Organisations, Northeast 
Consulting Resources, Inc., Oct. 1995, 49 pages. 


res 

Weber, Robert, Document from the Internet Digital Rights Management 
Technologies, Oct. 1995, 21 pages. 


Yes 

Weder, Adele, Life on the Infohighway, INSITE; (no date), pp. 23-25. 


Yes 

Weingart, Steve H., Physical Security for the ABYSS System, (IBM Thomas J. 
Watson Research Center, Yorktown Heights', NY), 1987, pp. 52-58. 


Yes 

Weitzner, Daniel J., A Statement on EFFs Open Platform Campaign as a Nov., 
1993, 3 pages. 


Yes 

WEPIN Store, Stenography (Hidden Writing), Document from Internet (Common 
Law), 1995, 1 page. 


Yes 

White, Steve R. f ABYSS: A Trusted Architecture for Software Protection, (IBM 
Thomas J. Watson Research Center, Yorktown Heights, NY), 1987, pp. 38-50. 


Yes 

XIWT Cross Industry Working Team, 5 pages. Jul. 1994. 


Yes 

Yee. Bennet, Using Secure Coprocessors, CMU-CS-94-149, School of Computer 
Science, Carnegie Mellon University, Pittsburgh, PA, 1994, 94 pages. 


Yes 

Yellin, Frank, Document from the Internet; Low Level Security in Java, Sun 
Microsystems, 1996, 8 pages. 


* Any possible "Y"s that were missed shall not negate the anticipatory nature of a reference, particularly where 
there is a chart in Appendix B. 37