MAZ Encryption Technologies LLC v. Apple Inc.
Filing
1
COMPLAINT FOR PATENT INFRINGEMENT filed with Jury Demand against Apple Inc. - Magistrate Consent Notice to Pltf. ( Filing fee $ 400, receipt number 0311-1466080.) - filed by MAZ Encryption Technologies LLC. (Attachments: # 1 Exhibit A, # 2 Civil Cover Sheet)(els)
Exhibit A
111111
1111111111111111111111111111111111111111111111111111111111111
US008359476B2
United States Patent
(10)
Zizzi
(12)
(45)
(54)
USER AUTHENTICATION SYSTEM AND
METHOD FOR ENCRYPTION AND
DECRYPTION
(75)
Inventor:
(73)
Assignee: Empire IP LLC, Austin, TX (US)
( *)
Notice:
(21)
Appl. No.: 12/957,479
(22)
Filed:
(58)
Patent No.:
Date of Patent:
US 8,359,476 B2
Jan. 22,2013
Field of Classification Search ................... 7131186
See application file for complete search history.
References Cited
(56)
Stephen Zizzi, Albany, NY (US)
U.S. PATENT DOCUMENTS
(65)
4,969,188
5,778,072
5,995,630
6,031,910
6,202,151
Subject to any disclaimer, the term of this
patent is extended or adjusted under 35
U.S.c. 154(b) by 0 days.
*
1111990
7/1998
1111999
212000
3/2001
Schobi .......................... 380/277
Samar ............................. 380/30
Borza
Deindl et al. ................. 3801255
Musgrave et al.
Primary Examiner - Matthew Smithers
(74) Attorney, Agent, or Firm - John R. Kasha; Kasha Law
LLC
Prior Publication Data
Mar. 31, 2011
(57)
(63)
Continuation of application No. 121128,501, filed on
May 28, 2008, now Pat. No. 7,865,728, which is a
continuation of application No. 111382,691, filed on
May 10, 2006, now abandoned, which is a
continuation of application No. 10/658,246, filed on
Sep. 8, 2003, now Pat. No. 7,096,358, which is a
continuation-in-part of application No. 09/259,991,
filed on Mar. 1, 1999, now Pat. No. 6,981,141, which is
a continuation-in-part of application No. 091074,191,
filed on May 7, 1998, now Pat. No. 6,185,681.
(51)
ABSTRACT
A system configured to authenticate a user for encryption or
decryption includes a user authentication apparatus, a computer-readable medium operable to communicate with the
user authentication apparatus, and an encryption and decryption computer communicating with the user authentication
apparatus. The computer-readable medium may store user
identifying infonnation and encryption and decryption data.
The encryption and decryption computer may be configured
to receive an application programming interface (API) for
interfacing with the user authentication apparatus and receive
the user identifying information from the computer-readable
medium via the API. A user may be authenticated based on
the user identifYing infonnation and, once the user is authenticated, the encryption and decryption data may be read.
Related U.S. Application Data
Int. Cl.
H04L 9/32
(2006.01)
U.S. Cl. ....................................................... 713/186
(52)
*
*
* cited by examiner
Dec. 1, 2010
US 201110078780 Al
A
A
A
A
B1
8 Claims, 5 Drawing Sheets
~30
10
Should
-0)
-coc.
Q.ca
.!1 "C
"0 ca
....
0
0
en
en
Q)
(0
N
N
t.)
(9
U.
....
0
~I
a.
....
"0
C'O
0
....
1::0>
:2
«
~
0>
0
ca"O
E C'O
en ~
ca
z't:
~~
0
LO
N
LO
(0
N
LO
..0
..C\I
N
u.s. Patent
Jao.22,2013
US 8,359,476 B2
Sheet 3 of 5
~I
a
T-4
L
Lt'l
N
M
~I
~
7Jl
•
05
f30
>
10 I
Should
Disclaimer: Justia Dockets & Filings provides public litigation records from the federal appellate and district courts. These filings and docket sheets should not be considered findings of fact or liability, nor do they necessarily reflect the view of Justia.
Why Is My Information Online?