Soverain Software LLC v. eBay, Inc. et al

Filing 1

***FILED IN ERROR. PLEASE IGNORE.*** COMPLAINT against GSI Commerce, Inc., PayPal, Inc., Radioshack Corporation, eBay, Inc. ( Filing fee $ 350 receipt number 0540-3491095.), filed by Soverain Software LLC. (Attachments: # 1 Exhibit A - US 5,715,314, # 2 Exhibit B - Reexamination Certificate - US 5,715,314, # 3 Exhibit C - US 5,909,492, # 4 Exhibit D - Reexamination Certificate - US 5,909,492 CI, # 5 Civil Cover Sheet)(Ward, Thomas) Modified on 3/14/2012 (gsg).

Download PDF
EXHIBIT D 11I11II1 (12) EX PARTE REEXAMINATION CERTIFICATE (5845th) United States Patent (10) Number: US (45) Certificate Issued: Payne et al. (54) NETWOllK SAU :S SYST ..: M (75) Inventors: An d rew C. I'ayne. Lincoln. MA (US): Lll wrcnl"(: C. Sicwarl, Burlington. MA (US); ()avid J . i\1acklc. Brookdale, CA 5.297.249 A 5.309.437 A EI' EI' JP JP 11' 11' JP Assignee: So\,cra ill Softwan' LI .. C . Chicugo. IL (US) 0456920 0645688 3278230 05·158%3 5274275 6162059 6291776 \VO 93110503 \VO 94f03~59 \V09 SJ 16971 WO WO WO Rcexall1illlllion Ctrtificllh.' for: Palenl No.: 5,909,492 Issued: Jun. 1, 1999 App!. No.: 081878,396 Filed: .JUIl. IS, 1997 NOlice: 311994 Bernstein d aI . 511994 PerlJmn c( al. FOREIGN PATENT DOCUMENTS Rccxamlnlliioll Rl'qucst: No. 90/007.286. Nov. 3, 2004 (.) *A ug. 7, 2007 (Continued) (US) (73) 5,909,492 CI 1/ 1991 3/ 1995 1211991 6f l 993 10/ 1993 611994 10/ 1994 5/ 1993 2/ 1994 611995 OTHER PUBLICATIONS Sovcrllin Software LLC Y. Amazon.Com. Inc. and 7"he Gap. 'nc .. Fonn o f Stipubll'd Rt'quest for Final Dismissals of the Actions. filed Aug. 30. 2005. This palen! is slIbjl'CI \0 a \cmlinai disclaimer. (Conli nlllx:l ) Rl'Iall' d U.S. Appliclilion Dahl Primary (63) Continu ati on of application No. 081328.133. fil"d On Oct 24.1994. now l'al. No. 5,715,31 4. (51) 1111. C I. G06Q JOIOO G06Q /0/00 G06Q llJlOO A octwork-b~st-d sales system includes at kast one buyer compu ter for opel1ltio11 bya uscr desiring to buy a product. lit kast one merchant computer, and at lcast one payment compu ter. The buyer computer. the merchant computer. and the payment com puler ~rc inlerconnected by ;1 computer network. The buyer computl'r is prognllllnlcd to receive a uscr rt'(jut'St for purchasing a PrQ(hJCI. and 10 causc a paymclI! mes!wge to be scm to the payment compu\{' r that comprises a product identifil'r identifying the product. The payml'nt com pUler is progmmmed to f('(;eive the payment message. to cause an access message to be cmltcd that oomprisL'S the product identifier and an access mcsS:lge :mthcnticator bm;ed on a eryptogrnphic key. and 10 e:lUsc thc aoccss message 10 be scnt to the merchant com puter. 'ibe merd1.1111 computcr is programmed 10 n.'Ceivl' the acccss messagc. to Yl'rify the access message aUlhentica tor 10 ensufC that the access mess.1ge authcnticator was c[Cotcd using the cryplographic key. and to cause the product to be sent to the user desiring to buy the product. (2006.01) (52) U.S. C I. ... (58) ncld of C iassltkaliull Search ....................... None Sec applicntion fill' for completc scarch history. 705178 ; 705126; 705127; 705/39; 705/40; 705/44 Rdl' n' llces C iled (56) U.s. PATENT DOCUMENTS 4.484.304 4.566.078 4.941.089 5.035.515 5.204.947 A A A A A 11/ 1984 1/ 1986 7/ 1990 7/199 1 411993 Anderson ct ill. Crnbtree Fischer Crossman ct al. Bernstein d al. --- r" O'Neill AIlSTI{ACT (57) (2006.01) (2006.01) (2006.01) G0 7F 7/00 Exami/ler-Mich~c1 " ..-- " - ..... ...." r" " " r " US 5,909,492 Cl Page 2 u.s. PATENT DCX::UMENTS 5,325.362 A 5.347.632 A 61 1994 Aziz 9/ 1994 FilePl'd al. ............... 3951200 5.353.283 A 5.388.257 A 1011994 Tsuchiya 2/ 1995 ll.1u~'T 5.457.738 A 5,475,585 A 5,483.652 A 5.491.820 A 5.530,852 A 5,544.320 A 5.544.322 A 1011995 Sylvan 121 1995 Bush [11996 Sudam1 C1 al. 21 1996 Iklove "I al. 611996 Meske. Jr. d .11. 811996 Konrad fjJ I996 Cheng el .11. 5.5$0.984 5.560.008 " A 5.577.209 A 5.583.996 A 5.591.378 5.619.648 5,623,656 5,664.110 5.664.11 I 5.675.507 5.708.780 5.710.884 5.715.314 5.724.521 5.727.164 5.732.219 5.734.719 5.761.662 5.768.142 5.768.521 5.774.670 5.784.565 5.790.793 5,806,077 5.812.776 5.826.24 1 5.826.242 5.848.399 5.848.413 5.870.552 5.895.454 5.897.622 5.920.847 5.982.891 6,006.199 6.023.683 6.041.3 16 6.049.785 6.134.592 6.195.649 6.199.051 6.205.437 6.449.599 6,708.157 A A A A A A A A A A A A A A A A A A A A A A A A A A A A A A A A A A A III 131 "' 131 132 8/ 1996 G"lb • 9/ 1 996 Johnson CI .11. 1111996 Hoyk ~1 al. 121 1 996 Tsuchiya 1 11997 Cam"ron "I .11. ........... 3951227 411997 Canale d aI. 411997 Lyons 9/ 1997 Green C1 aI . 911997 l"ahlUl el .11. 1011997 Booo.1I 111998 L"""Ig<)<)<.1 ct 31. 111998 I),:drick 21 1 998 Payne el .11... .. .......... 705nS 311998 D<:drick 3/ 1998 Kaye el al. 311998 llIumcr ,,( aJ. 311998 Tscvdos l1 .11. 611998 Dasan 61 1 998 Jacobs 61 1 998 I:kd rick 6/1998 Monlulli 711998 Lcwine 811998 I!i~lcy 9/ 1998 Wl'Cker 9/ 1998 Gifford 10/ 1998 Slein C1 a!. 1011998 Monlulli 121 1998 Burke 705127 12/ 1 998 Wolfl' v im I)(>zi"r d al. 411999 l!arrin~lon 4/ 1999 l3Iinn "I .11 7/ 1999 Kolling C1 aJ. 1111999 Ginler e( .11. 121 1999 Berlin "( .11. V 2000 Johnson CI a!. 3/2000 Allen 4IlOOO Gilford 10/2000 Monmlli V2001 Gilford 312001 Gilford 312001 Gilford 912002 ]'ayne el aI . 312004 Slem: l1 a!. OTHER PU BLICATIONS Sowrtlin Software LLC v. AlI/a::on.ColII. Inc. and The Gap. f llc .. Order of Dismiss.11 with PrejtKlice filed AuS. 31, 2OOS. l3imL el al.. "Secure t\ccess 10 Data Over the Internel", Nail. Center fo r SlipercomputingAppls.. Univ. Of Illinois. ChamImign. Illinois, pp. 99- 102. Farbl'T. David. "Interesting- Poople Mcssage- RSNNCSAI EIT Annollnccm('nt on Seeure Mos.1ic" Palo Alto. California. Apr. 12. 1994.4 p..1ges. Kent. Sleph('n T.. "Int('rnel Privacy Enhanced Mail". 8070 ComJllunications of the ACM 36, New York, Aug. 1993, pp. 48--60. Kohn. Dan. "Prior An on Op('n Mark('t Pal('nls". e- mail message dalt.-d Mar. 9, 1998, I page. Lewis. Pe!Cr H .. "AI!Cotioo Shopp'('rs: In!('met is Open". 2 pages. Medviosky el al.. NctCHsh: A Design for Praclical EiL"Ctronic Currency on Ihe Inlcmel, Infomlation Sciences Instilule. Univcrsily of Soulhern California. 1993. pp. 102- 106. Schaeft.'f el a1.. "Networked Information Discovery and Relrieval Tools: Security Capabililio:'S and Need,". The MITRE Corporalion. 1994. pp. 14S- 153. Euro]X'ao Search Report daled Jun. 19.2006. Ohmori et al., "An On- line Shopping System Prott'Cling User's Privacy" Infomlation Communication Labor"lOry of M<llsushila Eleclric Irnluslri;t! Co.. Ltd. , pp. 25- 32, NOlc: 12 Pnges of Translalion ,'\I\.1ched. MOlada. Toshihiro el 31.. An £xperiJII<!lIIal VerijicllfiOI1 of Relational /JolarnlSe Access Over WJVJY, NTr So/lware L.1.boraloriL'S. Nippon Telegraph and Telephone Corporalion. 1995. pp. 47- S4 (wilh English Tr:l!lslation- 8 pag('s). Gifford, Stewart, Payne, Treese, "Payment Swilches for Open Networks," prt.'Senled al 40lh IEEE. IEEE. COMPCON '95, Ma r. 5- 9. 1995. San Francisco. CA. Defendanl AmaroOn.com Inc.'s UnopPOSL'() MOlion fo r Lc..we 10 Amend its Answer to Include Allegalions Regarding Sluff.com. Declaration of James E. Geringer in Suppon of AmaroOn.com. Inc's Motion for Leave 10 Amend ilS Answer and CouBlerclnims to Add Stuff.com. Exhibit I of Geringer o...'Claralion: Excerpts of Deposition of Michael Kuniavsky. Exhibil 2 of Geringer Declaralion: E- mail from Brooks Culler 10 Mikc Kuniavsky (Jun. 14. 1994). Exhibil 3 of Geringer Declaralion: Excerpts of Deposition of Rielmrd 1J0ake. Exhibil S of Geringer [X-clamlion: Excerpts of Deposition of Andr('w Payne. Exhibil 6 of Geringer [X-claral ion; E- mail from Andrew Payn(' 10 Winfield Trccsc, ('t al. (Jun. IS. 1994). Exhibil 7 of Geringer [X-clarnlion: Excerpls of Deposition of Winfield Tn-'C$c. Exhibil 8 of Geringer Dt.-clarn tion: Amazon.com. Inc.'s [Proposed] fourth Amended Answer. Atlirmative Defenso:'S. and Counterlaims 10 Soverain Software, LLCs Complaint (Rc<llined Version). Amazon.com's Motion for Pnrtial Sunullary Judgment that '314 claims 34-49. '492 claims 17- 18 and 36- 36. and '780 c1.1ims I, 4. and 22- 24 arc invalid under 35 U.S.c. 102. Amamn.com·s Molion for Partial Summary ludgmenllhal claims arc indefUlitc under 35 U.S.C. 112. Bemers- Lt.'C. T.. el al.. hllp: /lwww.ietf.org/rfc/ rfeI738.1)( I?nllmbers .. I738. Changes 10 wwwSlm al hlt p:llftp.ics.uci.edu!pub/websoft! wwwslm!Changes. I3cmers- Lec, T., RFC 1630: Universal Resource Idenlifiers in WWW: A Unifying Syntax for Ihe Expression of Names and ..\ ddrt:sscs of ObjL-cts on the NClwork as uS(."{1 in Ihe World- Wide Web. I3cmers- Lec. T.. et al. ROC 1738: Uniform Resource Locators. Fielding. R.. RFC 1808: Relalive Unifonn Resource Locators. Bemers- Lec. T.. et al. RFC 1945: Hypertext Tr:msfer Protocol- HITP/ I.O. US 5,909,492 Cl Page 3 Fielding. R .. ct at RFC 2608: ]-Jypcncxl Tmusfer ProlocolJ -ITrI>/ I.I. Fieldin g. R.. Ct al. RFC 2616: J-I ypcncxl Transfer I'rotocoil-rITI>III. Dcmcrs- Lt.'C. T. ·'draft- iclf- iiir- hup- OO.tx," (Nov. 5, 1993). wwwSlal Readme filc at bup:llftp.ics.uc i.cdu/puh/wcboofll wwwslalcfREADME. NCSA l·rJTPd rclCOI$C notes al hUp:ll hoohoo.ncsa.uiuc.cdui docslUpgradc.hllnl (Iasl updated Aug. L 1995). Crocker. GlclUl, 'wcb2mush: Serving interactive Resources to the Web," Electronic Proc. of [he 2nd World Wide Web Conf. '94: Mosaic and Ihe Web!. Developers Day. (Oct. 20. 1994). Dukach, Scymon; Prototype ImplcmCfll31ion of [he SNP!' Protocol: 1111spic.lcs.mit.cdu: 1992. Balclaan; l3ullcr: Chan: Evcochick: Hughes: Jcn: Jeng: MilicH: Riccio: Skoudis: Starace; Slodd1rd: "An 11l1('rn('l Billing Serving Prototype Design". Carnegie Mellon. O'Mahony. Donal. Michael Peirc('. & Hit('Sh Tewari. Ek'C· tronic Payment Systems, Artt'Ch I-Iotlse, In c" pp. 145- 155, J:.n. 1997. Marcn. Michael. "The Age of E- Mail." Home Ollice Com· puting. vol. I L No. 12, p. 63(5). FOSil'r. David & Stuart Finn. "Insurer.; Can Iknefit From E- M:.i[ Networks". National Underwriter ProP('rty & Casualty- Risk & Benefits Managemem. No.9, p. 46(2). Mar. 4. F('rr:orini, E .. "Flight of Fancy: Goodbye Travel Ag('nt", Business Computer Systems, vol. 2. No. I I. Pl'. 39- 40. Nov. 1993. Trip ct aI., ''Cookks'' (client- side pcr.;istent information) aocl their usc, Netscape Teclmical Note 200[9, Netscapc Commnnieations Corp .. Oct. 1995. Archive of WWWorder mailing list (lun. 18. 1994- lun. I]. 1994). Leggell, 10hn et al.. "Hyperlonn: Using Extensibility to Dcvclop Dynamic, Opo;>n alx! Distributoo Hypcrtexl Sys· terns" (1992). Bieber. Mich.1cl. "lssu('S in Modeling a 'Dynamic' Hyper· text Interface for Non- Hypertext Systems" (1991). Nielson.lacob. Hyper/ext & HJ1)erllledia (1990). "AlillOllncing: Internet Shopkt'Cper" (Aug. 2,1994) posting on comp.infosystems.www aocl mise.forsale. Eaasy S.1brc User's Guide and Eaasy Sabrc Reference Guide. Compuserve Manual (uoclated). The M;tior BBS: Collection of infonnation and Advertise· ments concerning The Major BBS (F<lll [993). Fielding. Roy, et al., "Principled Dcsign of the Modcm Web Architecturc" ACM Transactions on III/ernet Technalagy 1, 2 Pl'. I [5- [50 (May 2002). Smithson, Brian, and Singer. Barbara. An [nfonnation C[earinghouse Server for Industry Consortia. 2nd Im'l Conf. On the World Wide W('b. Chicago. [II., Oct. 1994. Sovernin's ANSWER to Counterclaim (Amm'.on·s Third Amendt-d Counterclaim) by Soverain Software LLC.(Sera. phine. Jennifer) (Enten.-d: Mar. 17.2005). NOTICE by Amamn.eom rc: Answer to Amended Com· phlin\, Counterclaim Of Rejection or Claims [- 45 Of U.s. Pawn! No. 4,708,780 (Ent('rcd: Mar. 25. 2005). MOTION to Stay [RellCwt.>d] by Ama7.on.com. (Etlteroo: Apr. S. 2005). Soverain's Opposition to Amazon's Rencwed Motion to Stay. Amazon.Com. [oc:s R('p[y in Support of R('ncwed Motion to Stay. DeIXlsition ofGI('nn Arlhur Hauman with Exhibi1S (Oct. 28. 2004). Dcposition ofGlcnn Crocker with Exhibits (Mar. [0.2005). Deposition of Glenn M. Trewill with Exhibits (Jan. 25 , 2005). Deposition of Guy Henry Timothy I-!askin with Exhib its (Mar. [8, 2005). Deposition of Joshua Smilh Wilh Exhibits (Mar. 2. 2005). Deposition of Kevin Ming- Wei Kadaja J-]ugh('s with Exh· bits (Mar. 21. 2005). Deposition of Mich<lcl Kuniavsky with Exhibits (Feb. 22, 2005). Dcpositioo of Mich<lC1 Lav.aro with Exhibits (M<lr. 9. 2005). Deposition of Phillip I-Iallam- Baker with Exhibits (Mar. II. 2005). Dcposi1ion of Rob('rt A[len Olson with Exhibits (Mar. 3. 2005). Dcposition of Thomas Soulnaille with Exh ibits (Mar. 14. 2005). Expert Report of AlexrUlder B. Truvor (Apr. 10. 2005). Reply to Response to Motion re: Motion to Stay [Ren'-'Wt-d] (Slirreply in Oppositio/l 10 Ama::o/l's Renewed Marion 10 Stay) filed by Soveruin Software LLC. Soveruin's Reply to Anurl:Qn's ·Ibird Amendt-d COIUller· claims. dated Mar. 17, 2005. Am.17,On.com·s Ren,-"Wed Motion to SillY Proceedings Until the Patenl and Tradema rk Olliee ComplelCs Rc-Examination of lhe 111rcc P<ltents in Suit, dated Apr. 5, 2005. NCSA "What's Ncw". hnp:/Iarchive.ncsa.uiuc.oouISDGI SoflwnrclMosaiclDocsJold- whats- ncwl wh~lts-llew-0294.hlml. Feb. 28, [994. 17 pag('s. 13usincss Wire, CommerceNct Urges Government to Ease Export R('Stric1ions on Encryption Products: Consortium's New While Pap.. r Articul.11es POSilion on the Export of Cryptography- l3asoo Products, Jun. 26. 1995. 2 pag('s. "Advanced Electronic Crtxlit Authori7.ation 111roUgh the AIIl.herst Group SNEr', New Releases. New Ha ven. CT. [k'C. 7, 1987.2 pages. Anderson. SCOt et ;1i., "SessiOlK'cr: Flexible Session Level Authentication With OU' the Shelf Servers and Clients", hl1l)/lwww.igd.fhg.ddarchivclI99S_ www9S/pap"rsI77/ Sl'Ssion('er2.hUnl. pp. 1- 7. B\lhlo;>, E. Loren. Jr.. "Wide Area Information Servers", Digital Sys1(,IlIS Journal. SepJOct. 1994. PI'. [3- [8. Comer, D., ct aI., "The Tilde File Naming Scheme", The 6'1. Intem.1tional Conference on Distributed Computer Systems. IEEE Computer Society, Cambridge, MA., May 1996, pp. 509- 514. Comer. D.E .. et al. "A Model of Name Resolution in Dislributoo Sys1ellls". T he 6'1. [nternmiona[ ConfercllC(' on Dislributoo Computer Systems. [EEE ComPlller Soci('ty, Cambridge. MA. May 1996, pp. 523- 530. Co mputer Fwud & St'Curity Bullctin. "Underlying Security Mt'Chansms". Mar. 1997.2 pages. Cookies and Privacy FAQ , hnp: /Isearch.nctsc<lpc.t"om/as. sistlsecllrityffaqsleookies.html Jan. 9, 1998 at 4:29 pm .. pp. 1- 3. Ne1 Market Company. "Numerous News Mooia Stories". New York Tinl('S. From Page of Business Section. Aug. 12. [994. 4 pag('S. Phillips, K., "Superl-lighw<lY Access Eases [ntemet Entry", PC Week. Ocl. 31 , 1994,3 pages. US 5,909,492 Cl Page 4 Paler. Ariel. "lmproviflS WWW Marketing Through US('r Information alXl Non- lnstrtlsivc ConmlUnicMiol1s", internet Profiles Corpor3lion (VI'RO). 2 d WWWConference. Chi· cago, lllinois, Oct. 1994. 4 pages. Sovcrnin's Disclosure of Asserted Claims and Preliminary Infringement Contentions dated Jun. 3, 2004. Supplemental [)i~closurc of Preliminary inv31idity Conlentions by Amazon and the Gap d'l\cd Jul. 26. 2004. Deposition of G. Winfield Tr<-'ese. daH:d Oct. 27. 2004. N Sovcmin's Reply 10 Amn:f.On.Com's Amended Counler- claims. dmcd Jan. 14.2005. Third Supplement [0 Dcfcnckmt Am,non's initial Disclosures. dated Mar. 4. 2005. VideoTaped D(:posilion of M:lrk Lcvcrgood dated Mar. 8, 2005 (2 parts). VideoTaped Deposition of Andrew Payne duted Mar. II. 2005. VideoTaped Deposition of Stephen Monis dated Mar. 9. 2005. VideoTaped Deposition of Glenn Trewill d<lt<.>O Jan. 25. 2005 (2 parts). Sovernin's Fourth Supplemental Responses to Amazon's First Set of Intcrrogatorcs (No~. 1- 14) daled Mar. 21. 2005. Sovcmin's ReslXlnses 10 Interrogatory Nos. 22. 23. 26 and 36 of Amawn's Third SCI of Inlerrog;IIOrcs (Nos. 17- 28) daled Mar. 21. 2005. Sovcrnin's Responses 10 Amazon's First Set of Rl'quests for Admission to Plainliif Soveruin Software (Nos. 1- 100) daled Mar. 21. 2005. Memorandum Opinion dat ed Apr. 7. 2005. "It willlJ.1ppell". article excerpt from infoHighway. vol. 2- 1. Jan. 1995. Aronson. Dan. el al.. Electronic Mail to multiple recipients of the www- t:llk list (www- w1k@info.cem.ch)on "Access and session control" dated Sep. IS. 1994. Derier. Christian. '~rhc World- Wide Web Galeway to Hyper- G: Usi ng a ConnLoctionless Protocol 10 Access Session-Orient<.'(] Services". Inslitut fUr Informationverarbei1\lI1g and Compmcrgestiit1,te neue Medien. Grm:. Auslria. dall'd Mar. 1995. English. Joe. Electronic Mail 1 mulliple TLocipienlS of the 0 www- lalk list (www- tn1k@ info.ccm.ch) on "Re: Identify. ing Mosaic session" daled Dec. 20. 1994. Fielding. Roy. software distribution arehive for the H1TP log file ;lIlalysis program, WWWS!'1t vIOl. dated Apr. 24, 1994. published at hllp:llwww.ies.uci.edulWebSoftfwwwstatl. Hall. Dcvm. et al.. "Build a Web Site: The Programmer's Guide to Creating. Building. and Maintaining a Web Pres· ellCe". published Apr. 1995. ISJ3N 0-7615-0064- 2. Hughes. Kevin. source code file for the ITlTI' log file an.1lysis program. getslals vl.O, dated Feb. 1. 1994. publislK>O at hllp:lleil.contlsofiware!getstatsigetstals.html- Version I. 64 pages. Hughes. Kevin. source code file for the 1-111'1' log file an.1lysis program. getstats vl.O. dated Feb. I. 1994. pub· lished at hup:lleit.com/ sofiwarc/getstatslgetstats.html- Version 2. 64 pages. McCartney, Todd. Mess:Jge posll'd 10 Uscnet public discussion youp, floc.mts.disncy, dmed Nov. 21 , 1994. Pitkow. et al.. "Results from the First World Wide Web Use Survey". presented at Ihe First International Conference on the World Wide Web. Geneva. Switzerland. Ma 25- 27. 1994, publishl'(] at hnp: /Iwww94.web.cern.ch/WWW941 PrclimProcs.html on Jun. 2, 1994. and rcprintl>O in the Journal of Computer Nctworks and ISDN Syslcms. vol. 27. No.2, Nov. 1994. Elsevier Science J3.Y. The NetMarket Company. NetMarkcl POP Help tHe. from hnl)://www.nclmarket.com.d.1led Dec. 10. 1994. "CompuScrve Videolex Network Oflm Marketing Research SelVice. ad Test". Marketing News. Nov. 25. 1983. p.21. "Ekoctronic In- Home Shopping: 'Our Stores are Always Open':' Chain Slore Age Executive, M<lr. 1985, pp. Ill. 116. "Mail Offers a Holiday Treat for I lackers." Advl,rtisinp,Agc. Nov. 13. 1985. p. 76. "Redcoats Join Communications Fighf·. Industry Week. Feb. 22. 1982. pp. 108- 109. "Suddenly. VideoTex is Finding an Audiencc". Business WL'Ck. Oct. 19. 1987. pp. 92--94. "Taking Adv;mtage of Ihe Pasf·.Advertising Age . .<\pr. II , 1983, PI'. M36- 37. American Nalional Sta ndard: "Financial Institution Rctail Message Authentic<ltion"; ANXI X9, 1986. American National SHLndard: "Interchange Message Spedficmion for Debit and Credit Card Message Exchange Among Financiallnstitulions": ANXI- X9. Feb. 1988. Anderson, Ross 1.: UE PS- A Second Genewtion Electronic Wallct: Pmc. of the Second European SymlXlsillm on Research in Computer SecurilY (ESORICS): Toulllse, France. pp. 411 - 418. und..1led. I3cllcorc Internal e- mail, Nov. 24. 1993.7 pages. I3cllder. M.. EFre: Electronic Funds Tran~fer SySlems:. Kennikat Press: I)ort Washington. New York. pp. 42--46. 1975. l3culclspacher et al.• "])ayment AppliC~l1ions with Multifunctional Smart Cards", Smart Card 2000. 1989. pp. 95- 101. I3ooz. Allen & lIamilton. "J-Iow 10 Buy Infonllation wilh <I Firsl Virtual Account". Apr. II. 1994,63 pages. Dos et al.. "Sm<lrtCast: A Practical EkclTOnic Payment System" Cemrc for Mathelltatics and Compuler Scicnee. Aug. 1990. pp. 1-8. Burk et al.. "Digital Payment Systems Enabling Sccurity and Unobscrvability··. Computcr & Security. 1989, PI'. 399--415. Burk et al.. "Value Exc hange Systems Enabling Security and Unobservability··. Computer & &ocurity. 1990. PI'. 715- 721. Chaum ct aL "UntrncL'llble Ekclronic Ca~h ": Adv1ulCcs in Cryptology. 1988, pp. 319- 327. Chaum et aL. "impkmcnting Capabilily- Based Protection Using Encryplion". Electronics Researd Laboratory. University of California. Berkelcy, \978. 12 pages. Cohen. D., "Computerizl'(] COmml'TCC". lSI Reprint Series ISlRS- 89- 243: Oct. 1989. Rcprinted from Infonllation Processing 89, PfOC(.'Cdings of the IFlP World Computer Congress. Held Aug. 28- Scp. l. 1989, 8 pages. Cohen. D.. "EIl'eITOnic Commeree", Uni versity of Southcnl California Informal ion Sciences InstitUle. Rcsearch Report ISIIRR- 89- 244. Oct. 1989.42 pages. Compu$elVe Inlernational: Compu$erve InfonmlliOIl Service Users Guide, Pl'. 109- 113: 1986. Computer Shopper, "Inlernet for Profit'·. Nov. 1994, pp. 180--182; 190- 192; 522- 528, 532. 534. US 5,909,492 Cl Page 5 "COIlSlllllers Plugging into New El('(;1ronic Mail", Advertising Age, Mar. 4. 1985. p. 74. Damsord. "Puymcnl Systems (lnd Credential Mcch(lnisms with Provable Sl'CurilY Against Abusc by Individuals", Advances in Cryplo1ogy- CRYI Y ln '88. 1988. pp. 328- 335. Davies (.1 aI., "&><::urilY for Computer Networks: An Introduction 10 Dala Security in Teleprocessing and Electronic Funds Transfer", John Wiley & Sons. Dec. 5. 1985, PI'. 304- 336. Dukach. S., "SNl'l': A Simple Network Paymellt Protocol": MIT Laborntory for CompUlcr Science: Cambridge. MA, 7 pages. Even (.1 <II.. "Electronic Walle,": Computer Science l)cparl- menl, !SI<ICI. PI'. 383- 386. Fcrrnnini. E.. "Direct COllm..'Clions for Software Selections", Business Computer Systems, Feb. 1985. PI'. 35- 38. Fujioka. et al.. "ESIGN: An Efiicicnt Digital Signature Implememation for Smart Cards." Advances in Cryptology- Eurocrypt '91. Apr. 1991: pp. 446-457. Gilloro et al.. '"Case Study; The Cimls B.1nking Network"_ Communications of the ACM. Aug_ 1995, 2 pages. Gillonl. David K., ·'Notes on Community Information Systems'·. MIT/LcsrrM- 419. [kc. 10. 1989.7 pages. Gifford. David K, "Cryptographic Scaling for Infomlation St'CI\.'Cy and Authenic.1tion". Stanford University and Xerox Palo Aho Research Center. Communications of the ACM. vol 25. No.4. Apr. 1982, pp. 274- 286. Hakala., el 31.. A System for Autom3lie Value EXch3nge Exchange. Proceedings- F;lll Joint Computer Confercnce, Nov. 1966, pp. 579- 589. Ilarty et al.. "Case Study: The VISA Transaction Proccssing Syst"Ill". May 1988. pp. 1- 23. Hirschfeld. "Making Ek'Ctronic Refunds Safer", Laboratory for CompUl.. r Sci.. nce, MIT. 1992, 4 pages. Information N..tworking Institute, Carnegie Mellon Univer· sity, Prototype Scope Document. INI Technic:d Report 1993- 1. Oct. 14. 1993. 29 pagt'S. International Organization for Standardil'.ation. International Stand1ro- Bank Card Originatt-d Messages- Interchange Message Specifications Content for Financi.11 Tran$.1ctions. ISO 8383 1987. Imuit Corp. Quick.. n Uso;>r's Guid.., "Paying lJil!s Electronically", no date, pp. 17 1- 191. Jansson, L , "General Electronic Paym('f1t Syst.. m". 7'h Procct-dings of the Intenmtional Conf.. rence on Computer Communication. 1985. pp. 832 835. KellliY, "EDI St'Curity: Risks and Solutions", SD- Scion UK Limitt-d. 1992, 12 pages. 11ioll of a Knapskog. ·'Privacy ProtecIL'(1 PlLynwnts- Relial'... Pro1ocol that Guarantees Payer Anonymity", [uroCrypt 1988. pp. 107- 121. Krajcwski. M .. '·Concept for a Smart Canl Kerberos". IS'}' National Compuler Security Conference. Oct. 1992,9 pagcs. Krajt'Wski, M., et aI., "Applicability of Smart CanIs to Network User Authentication'·, Computing Systems. vo l. 7. No. I. Winter 1994. pp. 75- 89. KmjL'wski. M .. "Smnrt Card Augmentation of Kerbcros". Privacy and Security Reso;>arch Group Workshop on Network and Distributed System Security. Feb. 1993,5 1"1gcs. Lai el al.. ·'Endors<.'ments. Licensing, and Insurallcc for Distributed System Serviecs", Infomlation Sciences Institute, U. of Southern Califomia. unda\l'd. 6 pages. Low et al.. "Anonymous Credit Cards", und11ed. pp. 1- 16. Mt-dvinsky et al.. ··Electronic Currency for the Interne!", Electronic Markets, Sep, 1993, pp. 30- 31. Messmer, "NIST Stumbles on Proposal for Public- Kt-y Encryption". Network World, Jul. 27. 1992, pp. 1- 6. Mos..1ic Communications Corp. Press Releasc. "Mosaic COlluuunications Unveils Network Navigator and Serv('r Software for the Inteme!"', Sep. 1994. 3 pages. Nntional Westminster Bank Group, ·'Cle3ring House AutomaH'd Payments Syst('m", undated, 31 pagcs. Nt'cdhlLm, Rogt'J" M .. "Adding CaplLbility Access to Con· vemional File Servers", Xerox Palo Alto Research Center. California. undatt'(l, pp. 3-4. Okamoto et al .. "Univer.;ity Elt'Ctronic Cash". NTf Labor.t1ories, pp. 324-337. P(lyment Syst<.'llIS, "UnitL-d Stat<.'s", undaled. pp. 217- 235. Perry. "Elt'Ctronic Brmking Goes to Markc!"·. IEEE Spectr\lm. Feb. 1988. pp. 46-49. Pfi1zmmUl et al.. "How 10 Break and R<.'I"1ir a Provably Secure Untraeeabl.. Payment System". pp. 338- 350. Ph. van I-icurck. "TRASEC: nclginn Security Systems fo r Ekctronic Flmds Twnsfer.;," Computer.; & s..'Curity. 1987, pp. 261 - 268. Pongratz. el al., "IC Cards in Videot<.'x Systems", Smart Card 2000. 1989. pp. 179- 186, I page. Recommendation X.509: The Directory- .<\utht'l1tication framcwork. Fascicle VIIl.8 (Melbourne 1988) pp. 48- 82. Remery, P.. et al.. ·'Le paIement electronique·'. L'Echo des Recherches, No. 134, 1988, pp. 15- 23. Rescorla E., et al.. '''[be Secure HyperTex t TrlLnsfer Proto001". Enterprise Inlt'gration Technologics, Dt'C. 1994, 35 pages. Rescorla. E., et al.. "The St'Cure I-Iyp<.'rText Transf<.'r Protocor·. Bmerprisc Integration TL'Chnologics. Jun. 1994. 22 pages. Rivest et al.. ·'A Method for Obtaining Digital Signalures and I.... lblic- Key Crypotosystems". Laboratory for Computer Science, MIT. undated, pp. I- IS, SchaulIluller- l3ichl, ·'IC Cardfs in Hish- St'Curity App lielLtions", Selt'Cted Paper.; from the Smart Caru Conference. Springer Verlag. 1991. pp. 177- 199. Shain, "Security inElectronie Funds Transfer: Mcssage Integrity in Money Transfer and Bond- Senlements through GE lilformal)on Services' Global N<.'twork". Compu ters & s..'Curity, vol. 8. No.3 1989, pp. 209- 221. Sirbu. Marvin A .. ·'Internet Billing Servicc Design and Prototype Implementation", PI', 1- 19. Society for Worldwide Interbank Financial Telecommunicatio ns S.C.: "A S.\V. I.F.T. Overview" no date, 34 plLgt'S. Staskauskas. "The Formal Specification and Dcsign of a Distributt-d Electronic Funds- Transfer System". EBE. 1988, pp. 1515- 1528. Slo1. ·'I'rivacy Protl'Clt-d Payments- A Possible Structure for a Real Implementation and Some Resource Consid<.'ralions", R<:produced by U.S. Department of Commerce, 83 pages. ·lackStrlLzewski. ·'Computerized Scrvice Sets Shopper.; 1 ing", Advertising Age. Feb. 22, 1988. p. 62. Takei. Videotex Information System and Credit System Connecting with M'-\RS 30l-of JNR, Japancse Railway Engineering, No. 95, Sep. 1985. pp. 9- 11. T,maka el al.. ' ·Untraceable Ek'Clronic Funds Transfer Systems", Electronics and Commlmic;ltions in Japan, Part 3, vol. 72. No.9, 1989, pp. 47- 54. US 5,909,492 Cl Page 6 TcocobaUlll cl aI. , "[)cvclopmcm of Ne1work Infrastructure aocl Services for R1tpid Acqu isition", Adapted from a White Paper Submillcd 10 DARPA by MeC ill Col1ubormio with E IT and lSI. Jan. 1992. PI'. 1- 19. Tunstall. "Electronic Currency", Smart Card 2000: The Future of Ie Cards, Oct. [987, pp. 47- 48. Villa!. "Active Message Processing: M(.'Ssagcs as Messengers", 1981. pp. 175- 195. Waidncr. ct al.. "Loss- To1cnmcc for Electronics Wallets", Fuult- Tolemnt Computing: 2(jh Inlcrn.1lionai Symposium. Jun. 26- 28, 1990, pp. 140-147. Weber. ''Controls in Electronic Funds Transfer Systems: A Survey and Synthesis", Computers & S<:clIriIY. 19&9. pp. 123- 137. Willi:UllS. "[)cbl Progrdrn Culs Froud- CompuScrvc Plan a Success", Pensions & Investment Age, Feb. 4, 1985. pp. 31- 33. Joint Claim Construction Chan (Patient Local Rule 4- 50» . filed Dec. 27. 2004 with Appendix A. Order Denying Amazon's Motion to Stay Proceedings Pend· ing Completion of the Ik-.:xamation. Tr.mscript of the Markmam Hearing Defore the Honomble Lt.-onard David Uni ttxl StalL's District Judge. J1m. 6. 2005. Complaint for Patent Infringement filed Jan. 12.2004. Ama1.On.com·sAnswer. Aninnativc Defenses. and Counterclaims to Soverain Software's Complaint filed Mar. 9. 2004. Amazon.com's ReSllOnSe to Plaintifl"s First Set of Interrogatories (Nos. 1- 22) filed JUll. 11.2004. Sovcmin's Responscs and Objt'Ctions to Am.1zon.com's First Sct of Interrogatories (Nos. 1- 14) filtxl Jun. 11 .2004. Dic\osure of Preliminary Invalidity Contentions by Defendants Amazon.com and thc Gap (with Exhibit A) filed Jul. 6. 2004. Sovemin's Supplemental Responses to Ama:f..On.eOll1'S First Set of Interrogatories (Nos. 1- 14) filed Aug. 13,2004. Sovcmin's Sccond-Supplemcntal Response to Amazon.com's First Set of Interrogatorit-'S (Nos. 1- 14) Iiled Scp. 21. 2004. Sovcmin 's 111ird Supplcmcnt.11 Response to Am<1wn.t'Qm's First Sct of Interrogatories (Nos. 1- 14). Sovemin's Preliminary Claim Constnlction (I'melll Local Rule 4- 2) ti!LxI ScI'. 2. 2004. Joint Disclosure of I)rcliminary Claim Construction and Extrinsic Evidence by DefendantsAm<1J'.on.com and the Gap (willI Exhibits A- B) fikd Sep. 2, 2004. Joint Claim Constntction and Prehearing Statement (P1llent Local Rule 4-3) (with Exhibits A- D) Iilcd Oct. 4. 2004. AnwJ'.on.com·s First Amcndtxl Answer. Allinnative Defenses. and Cou nlerelaims to Sovemin's Complaint filed Oct. 6. 2004. Declaralion of Jack O. Grimes Ph.D.. daled Nov. 15.2004. Sovemin's Claim Construction Brief ]lursu:mt to Patent Rule 4--5(a) dated Nov. 16. 2004. Dt-.:laration of Dr. Richard N. Taylor in Support of Defendants' Markman Brief datcd Nov. 29. 2004. Joint Claim Constmction Brief of Amazon.com and Gap dated Nov. 30. 2004. Soverai11's Claim Constnlction Reply Brief l"t,lsuanl to Patent Rule 4- 5(c) dated [)CC;. 7. 2004. "H1TP SWle Management Mechanism." hl1p:llwww.inter· nic.nt-lIrfc/rfc2109.txt (Jim. 9, I 998)- hl1p:llwww.cse.ohio- state.t,(lufegl- binlrfdrfc2965.ht ml. "m:IX.500-a Macimosh X.sOO Directory Cliem". comelus of WWW website, Il11p:l!www.umich.edlv--dirsvc/ldlpl max500/index.htlm as of Jul. 7. 1997. "MoSltic Communications Unveils Network Navigalor and Server Software for the Internet," Mosaic Conumtnications Press Relcase, Scp. 1994. Hn'p "Persislem Cliem State Cookies." hllp:l!seareh.netscape.com/newsreffstdlcOOkie spec.html (Jan. 9. 1998). 57 USPQ2D. "Ama:on. CQIII. Inc. v. llar/lcS(lIIdnoblr:. CQIII. Inc." Pl'. 1746--1763. Abadi M .. el al.. "Authemication and Delegation with Smart- Cards:' Oct. I 990. Chapter 67. Aho. A.Y., et al.. "Rc)lOrts and Databast"S:' in the AWK Programming Language. M.A. I-larrison, ed .. (Addison- Wesley). pp. 100- 101 ( 1988). Anderson. R .. "Why Cryptosystems Fail:' 1s t Conf.-Computer & Comm. Security. 1993- 11/93- VA. USA. pp. 215- 227. Andrade. et al.. ''Open On- Line Transaclion Processing with the TUXEOO System:' pp. 366- 371. Digcst of P:IPCrs, IEEE Computer Society Press, COMPSON Spring 1992, San Fmncisco. Calif. Demers- Lec, T., et al., '~rarget a Common Intemet Syntax Where the User Password is Appcndlxl to a Specific URL." hllp:llwww.ietf.org./r fcI738 .txt?numbcr- 1738. Bjom N. Freeman- Benson. "Using the Web 10 l'rovide Private Information," Finn InlCnmtional Conference on the World Wide Web. WWW94, May 1994. 5 pages. !Job Novick, (9503) Intcmct Marketing: The Clickstre:lm. Mar. 1995. [hllp:llwww.i- m.com/:trchivcs/9503/0375.htm] 3 pages. !Jowman. ct al.. "Univers: An Altribu tc- Bas...x1 Name Scrvl'r." Software Practice and Expcril·nce. vol. 20(4) 403-424 (Apr. 1990). Brian W. Kemighan and Dennis M. Ritchie. '~rhe C l'rogmmming Language" second cdilion. AT&T Bell Labora· tories, (N.1 .. I)rentice HaH) pp. 17- 21 (1998). Catkxlge L.D.. "Characteri~jng Browsing StmtegiL'S in the World- Wide Web." hup.www.igd.lhg.dcJarehivcJI995_ .. .1 Userl':ll1cms.P<lper4.fomlatllxl.htm, Chaum. D .. "Achieving Elcctronic Privacy:' Scientific American. Aug. 1992. pp. 96- 101. Cheriton D.R .. c\ al.. "Unifoml Access to Distributed Name Interpretation in lite V- System." pp. 290--297, 4th Intema· tional Conference on Distribuled Computing System, IEEE Computer Society, San Fmncisco, Calif.. May. 1984. Choudhury, Abhijit K .. Ct <II.. "Copyright Protcction for Ek'Ctronic Publishing Over Computer Networks." IEEE Network. The MagazillCofComputcrCommunications, vol. 9, No.3. pp. 12- 20. May 1995. Cliekstrcam. Oct. 1996. The word Spy. [http:www. wordspy--com/wordS/clickstream.asp]. 2 pages. COmPUler and Business Equipment Manufaclurers Associa· tion. "American National Standard for Infomlation Systems- Database Language SQL" (N.Y., American National Slandanis Institute) pp. 27- 28 ( 1988). Curtis. R., ct al.. "Naming in Distributed 1.... 1nguage Systems:' pp. 298- 302. 4th Intem:ltional Conference on DistribulCd Computing Systems, IEEE Computer Sociely, San Fmncisco. c.t\ May 1984. Droms. R.E. "Access to Heterogenous Directol)' Services." Proceedings IEEE INFOCOM '90. pp. 1054- 1061. San Fmncisco. Calif. Jun. 3- 7. 1990. US 5,909,492 Cl Page 7 Gary Welz. ''The Medin Business on the WWW", Proceedings of (hc Second World Wide Web Conference 1994: Mosaic and [he Web. Oct. \994. 6 pages. Gligor, VD., ''Obj<''C1 Migml ion and Amhcnicalion:' IEEE Ordille. U .. et al.. "Nomcnc!ater Descriptive Que ry Optimi7.. 1tion for Large X.500 Environments." pp. 185- 196. SIGCOM '91 Conference. Communication Arehitecillres & Protocols, vol. 21. No.4. Zurich, Switzerland. Sep. 1991. Tmnsaclions of Software Enginl'Cring. yol. 5£- 5. No.6. Nov. 1979. pp. 601- 61l. Petcrson. Larry L., "A Yellow- P;lgl'S Service for a LocaI- Arc<l Network:' ACM Proc\.-cdings of thc ACM SIGCOMM 87 Workshop. ACM PrL'Ss. ! 988. pp. 235- 242. Good. B.o "Experience with Bank of America's Distributive Computing System," pp. 2- 8. IEEE 1983. Hitchens, M .. c\ al.. "Bindings IktwC'l'[] Numcs (lnd Objcc\s in a Persistent System," Proceedings of the 2"" International Workshop on Objcct Oricnl~uion in Opcrllling Systems. IEEE Computer Society. pp. 26-37. Dourdan, FR. Sep. 1992. Housel. B.C., C[ al.. "SNA Distribution Services," 113M Pitkow. J.E .. "Webvi... : A Tool for World - Wide Web Aceess Log Analysis," First Internation31 World Wide Web ConL M3Y 1994. 7 pgs. Pilkow. J.E .. and Recker. M,M .. Using the Web as a Survey Tool: Results from Second WWW User Survey,: htlp: /! www.igd.lbg.del3rehivC/1995_ www95/papers/79/survey/ Systems lournal. pp. 319- 343. vol. 22. No.4, 1983. sllrvey~_paper.html. \nsclbcrg. A .. "An Approach 10 Successful Online Transaction Processing Applicmions." AFIPS Confervnce Proceedings. 1985 National Computcr Conference. pp. 419- 427. ChicllgO. 111.. Jul. 15- 18. 1985. Kahan. Jose. "A capability- based authori7..1tion model for the World- Wide Web." hnp:/!www.igd.fng.dc/arehivC/ 1995_ www95/proc<.·t:dingslpapcrsl861CaMWWWhtlm pp. 1- [4. Kahan. Jose. "A Distributed AlitliQrization Model lor WWW." http://W\vw.isoc.org/!-IMP/ PAPERlI07/ htmIlpaper.htm1. pp. 1- 16. Kahan. Jose. "A New Authori71tion Model for Distributed .. Muhimedia Infornlation Consultation SYStemS" English Tt"Jnsi:ttion, pp. 1- 21. Kahan. Jose. "Un nouveau modele d- au toris,1tion pour les systcmcs de consulation d- information muhim(:dia repartcc." Pl'. 45- 57. Kelley, A., and Po[d, 1.. "Arrays. Strings. and Pointers," in a Book on C. A, Apt. ed .. (the Benjamin/Cummings 1'lIblishing Company, [nc.) pp. 33- 37 ( 1984). Kluchi. T.. et al.. "C- J-IlT P- The Development of 3 Secure. Closed HITP- l3ased Network on the Internet." 1996 IEEE, pp. 64- 75. Lampson, B. "Designing ;t Global Name Service:' pp. 1- 10. Proc(:cdings of the 5'~ Annunl ACM Symposium on Principles of Distribued Computing, ACM. Cal gary, Albcr13. C311.1da. Aug. 1986. Lim. Jong---Gyun. "Using Coolists to Inde)( HTM L DoeumelllS in the Web:' hnp:/Iwww.ncsa.uiuc.edu/ SOOm·94/ i'rocL·\.'dingslSearching/lim/ ooolisL htm, pp. 1- 8. Lou Montlilli. Ek'Ctronic Mailto Multiple RL'Cipients of tbe www- talk list (www- talk.1995a2/0134.htm! on "SL'Ssion Tracking" (omi.mai1.www- talk. t\pr. 18. 1995). Menefec. C .. "New host for Internet Commercia! Site Inde)(:' Ncwsb)1L'S Nov. 9. !994. p. 15. Metcalf. R.M. "Commereializmion of the Internet Opens Gmeways to Interprcncurs:·lnfoWorid. Aug. 8.1994. p. 44. Michalski. J .. "Content in conte)(t: the Future of SGML and HTML," Releasc 1.0. Scpo 27, 1994, pp. [- 10. NCSA l-rrll'd 1.5 Beta How to Redirect, "The New Redirect Dirt.'Ctivcs." Neuman. B.C .. "Pro)(y- Based Authori7.ation und Accounting for Distributcd Systems:' Proceedings on the J3'h International Conference on Distributed Computing Systems. Pillsburg. May 1993. pp. 283- 291. Notkin. D .. "Pro)(ies: A Softw3re SlniClUre lor Accomodnting Hetergeneity," Software-Practice and E)(perience. vol. 20(4). 357~364. Apr. 1990. Ramanathan. Sirvivas, et al.. "Architectures for P~'rsonal­ i7.cd Multimedia." IEEE Multimedia. voL I. No. I. Computer Society. pp. 37-46.1994. w.. Rescorla. E" ct al.. "The Secure 1 -lypcrTest Transfer ProtOcol." Aug. 1999. Rivest. R .. "The MD5 M~'Ssagc--Digcst Algorithm." MIT Labomtory for ComPliler Science and RSA Oat,l $(.'Curity. Inc .. Apr. 1992. Schwar17_ et al.. "A Name Servicc for Evolving, I-icterogeneous Systcms." Proceedings of the II 'h ACM Symposium on Opcmting Systems Principles. vol. 21 , No.5. pp. 52- 62. Austin. TX, Nov. 1987. Schwar17_ M.L et aI., Experience with a Semantically Cogni7.< 1nt Internet White Pages Directory 1001. Journal of [nternctworking: Research and Experience. pp. 1- 22 (1990). $t.--dnyao, J.. "Mosaic Will Kill My Network!-Studying Network Trallic PlIlterns of Mosaic Usc". http://www.tICsa.uiuc.<.'d ulSDGr n94/P...qslDDay/scd.1yoo/ mos_ lraf_ paper.htm. Sheh7.cr. et al.. "Name Service Locality 300 Cache Dt.'Sign in a Oistriblltt-'d Opcmting System." University of Californi.1. Los Angeles. 8 pgs. Squillante. M.e., ct <11.. Integmting l-icterogen~'Ous Local Mail Systems. Pl'. 59- 67. IEEE Software, Nov. 1989. Terry. D.£L "Slmcture- frcc Name Management for Evolving Distributed En vrivonments." pp. 502- 508. 6'h International COllferenceon Distributed Computing Systcms. IEEE Computer Society. Cambridge. MA, May 1986. Voydock v., CI aI., "S~'Curity Mechanisms in Hi gh Level Network Protocols," Compltling Surveys. vol. 15. No.2. Jun. 1983, pp. 135- 171. Welch. 1 et al.. "Prclix Tables: A Simplc Mechanism for 3.. Loc.1ting Films in 3 Distributed System." pp. 184- 189. 6'h Intcrnational Conference Oil Distributed Compltling Systems. IEEE Compliler Society. Cambridgc. MA. May 1996. WordPerf~'Ct for Macintosh. pp. 153- 162 ( 1990). Zalli, et aI., "Naming and Registmtion for 113M Distributed Systems."IBM SyStems Journal. pp. 353- 380. vol. 31. No. 2, [992. "Here it LS. World" intcmet postings to com po infosyslems.www.usersdiscussion list re: Mosaic Nelscapc (Oct. 13. 1994-Oct. 17. 1994) avuilable a\: hllp:/!gmups. google.com/group/comp.inlosystems. www.uscrslbrowsc_ thrcadlthreadl3666fe4c2I b3age2l9a21 Oc5172278328?lnk_ st&mum .5& hI_en#9a2 1Oc5172278328. US 5,909,492 Cl Page 8 "Nc!scapc 0.93 Setup Questions" internet postings to COnIp.infosystcms.www,misc discussion list rc: Mosaic NClscapc (NO\', 21. J994- Nov. 25. 1994) :IW1ilablc m: http: // groups.googlc1oom/group/comp.infosystcllls.www.miscl browsc_ Ihrcadlthrcadlda4c82cfc6512 f671 8dabc34729 1409dS'!lnk_sl&rnum_t &hl. cllIl8dabc:l4729I 409dS. "Nctscapc and Cookks" internet postings 10 cornp.infosys· Icms.www.llscrs discussion list rc: Mosaic NClscapc (Dec. 11. J994- Dcc. 13. 1994) available at: ht1p:J/groups.googlc. com/grouplcomp.infosyslcms.www.lIscrslbrowsc_ lhrcad/ thrcadl534 7cb89bbacS72b/3583cabSc6c 13c941101;sl&rnum_3&hl-cnIl3583cab5t-6c 13c94. ··Cookit'S.lxf' internet poslings 10 comp.infosystcms.ww\V.users discussion list rc: Mosaic NClSC;IPC (Dec. 23, J994--Dcc. 27, 1994)nvnilnblcnl: http://groups.goog]e.contl grouplcomp.infosyslcms.www.uscrsibrowsc_ lhrcadi thrcndl613e81948c9cf6c4/ 134ade72dfc Ic58d?lnkSI&mum _2& hl_en# I 34ade72dfc I c58d. "How to gct stateful HTM L documents"' internel poslings to eomp.infosyslcms.www.rnisc discussion [isl (Jun. 24, I 994-1un. 25, 1994) avai[able at: hup:lIgroups.google.eontl grouplcomp.inlbsyslems.www.misclbrowse_ lhrcadllhrcadi fd304ftxlb645529a1b8f6da b2.1a 7Jae 71'!lnk_sl&mum_ 7&hl_t'n#b8I&lab2aa 73ac 71. "'Ilow 10 add stale iuror 1 .1 fOIlll" internel poslings 10 0 comp.iufosYSlCIllS.WWw.providcrs discllssion liSI (Jun. 30. 1994- 1ul. l. 1994) availab[e at: hup:lIgrollps.google.contl group/compo infosYSlcms. www.providcrs/browsc_ IhrC3d1 thrcadl2acad6cdc8cbb8a/bf368c630add2c94 ?Ink_ sl&mum.8&hl-cnJ# bf368c630add2c94. "'Transactiornl[ Services on WWW .. inlcIlletpostin)l.S 10 comp.infosyslems.www discussion list (M;IY 21, 1994-1un. I. 1994) availnblc at: htlp:/groups.google.contlgroupl comp.infosyslems.wwwlbrowse_ lhrendithrendi bf43OcGdfSc6c 7d11led77a97 f5dOb96?lnk-st&hlenJl&xl77 a97 fSdOb9d6. Dan Aronson. "nccess and session control" posting to www- talk discussion list (Scp. 14, 19(4) available al: hnp:!1 1997. webhistory.orglwww.lists!www- talk.1994q31 0901.html. Rick Troth. "'access and session control"' (Sep. 15. 1994) available at: hnp:l/ 1997.webhistory.orglwww.lists/ www- talk.1994q3/0923.html. alain@hypcnn.1n.co.il. "'IdentifYing Mosaic session" POSIing to www- talkdiscussion 1isl (Dec. 20. 1994) available at hnp:1I 1997. webhislory.orglwww.Jisls ) www- talk.1994q4! 1098.html. Joe English, "'Re: Identifying Mosaic session"', posting to www- talkdiscussion list (Dec. 20. 1994 available at: hl1p:1I 1997.webhistory.orglwww.lists!www- la[k.I994q4! 1109.html. Steven Majl.'Wski. "'Identifying Mosnic session" posting to www- Ia[k discussion lisl (Dec. 20. 1994) available al: hnp:11 1997. webhislory.orglwww.lisls!www- talk.1994q41 llll.html. Nick Amen, "Statelessness" posling to www- talk discussion list (May 16, 1994) available at: hl1p:!11997.webhistory .orglwww.Jists!www- ta[k.1994q2l0562.htllll. J:lrtxl Rhine, "Statelessness" posting 10 www- talk discus· sion list (May 16, 1994) aV<lilab!c at: hl1p:1Il997.webhistory .orglwww.lists/www- Ia[k.1994q2l0563.htllll. Simon Spero, "'Statelessness" posting to www- Ialk discussion lisl (May \7. 1994) available at: hl1p:1Il997.webhistory .orglwww.lists!WWW- lalk.\994q2l0579.hlml. Jim Md 3elllh, "Sllllelessness" poSling 1 www- talk discus0 sion list (May 27. 1994) available at: hl1p:1I1997.webhisto. ry.orglwww.listsiwww- ta[k.1994q2l0683.hlml. Philip I-Inllam- Baker, "Statclt'Ssncss" posling 10 www- Ialk discussion lisl (May 30, 1994) available at: hl1p:II I997 .webhistory.orglwww.lists!www- talk.I994q2l0705.hlml. Trcwil1. G[enn. Using 1CJ /0 Process fl1ML Forms. Digital EquipmeJl\ Corporation Network Systems Lllbormory TN- 14. dated Mar. 1994. Viescas, John L., The Ofiicinl Guide to the Prodigy Service. Microsoll 1'1\.'ss. 1991, [SIlN 1- 556 15- 374--0. llizNel Tcchnologit'S, Versatile Virt ual Vending. published at hl1p:!A\!ww.btll.t'Om. St-p. 12. 1994. • cited by examiner US 5,909,492 C l I 2 EX PARTE REEXAMINATION CERTIFICATE ISSUED UNDER 35 U,S,c' 307 49. A hyper/e.I·1 Slatemel1l syslem 0/ cI(lilll 44, ",here ill if a pllyment lImOllll1 exceeds a Ihreshold. Ihell Ihe IIser is prom/lIed/or seCllril)'-rela/i:d ill/Orl/Illlion; wherein at leasl one o/Ihe server comp"lers verifies Ihlll Ihe securily-rel(lIet/ in/orlllaliQ/I lII(IIches ,,"'Viously providl:d secllrily-re/all:d ill/orlllalioll, 50. A hnJ(!rlcxl Sialelllelli sysll:m ill accort/allce wilh claim 49. whereill iflhe n'Cllril)"-re/aled verificatioll/ails. Ihl:llihe 1)(I),melll COlllplller sends a dOClllllclllto the buyer COlllp'ller indicmillg Ihal access is 1101 allowed. 51. A h.lpI!r/( slalemelll sySle1ll in a("cort/allce wilh claim :.I·1 49. whereill al leaSI Olle 0/ the sen-er CQmplilcrs lrallsmils lite Slalemelli docllmenllO Ihe clienl Complller; alll/ihe clienl cOlllp"ler displays Ihe Slllll:nWIII docllmenl 10 Ihc IIser. 51. A hnJ(!rle.l"1 Slall:lllelli Sysll:lII illllceort/allce willt claim 5J. whereill Ihe cliel1l colllp"ler is a bllyer complller: whereill al least olle o/Ihe server comp"lers relrieves sell/emelll dala frOIll a sell/cmi'lII dlllllbase for IISC ill gl:lleraling /he statemelll t/ocllmenl. 53 . .4 h)pI!r/('xl staleml'1I1 sySlem ill accordallce wilh claim 15. ",herl:illihe lrallsaclioll delail h.lperle.l"l lillk illcllldl:s a /r(l/1sarlioll delail URI.; wherein Ihe IrallsaClioll delail URI. includes a URI. all/helllicalor Ihm is a digilllJ sigllall/re b(lsed 011 (I cryplographic key; wherein Ihe URI. muhelllicmor is (I hash 0/ ill/ormmioll fOlllailled ill Ihe IransaClioll detail URI.; wherein al /easl olle 0/ Ihe sen-'u complilers verifies whelher Ihe Irallsac /ioll detail alllhell/icalor WIlS Ctcaled /rom ill/ormalion eO lll(lilll:d in Ihe IrallS(lCliOIl detail URL based llpon fhe cryptographic key: whereill Ihe lrans(lc /ioll dl:lllil URL comprises a clielll lIelllvrk address: whereillihe clielll cOIII/Juter nelwork (lddress is verifil:d by lII(l/chillg il lI'ilh Ihe lIell>'Ork addreH SJIl.'Cified in Ihe lrallsaclion delail URI.: when-ill Ihe cliem compliler promplS Ihe IIser for till aCCOllnl 11111111: (llId p<ISSI,"Ord by crealillg all accolIlIl mil/II! prolllpi tIIld a J)(lsS\l'Ord prolllpt; wherein (II leasl 0111: o/Ihe sl:rver COlllplliuS verifie)' Ihal Ihe (lCCOIIIII nllllle (/lid 1)(ISS\I'ord elllered by Ihe IIser IIwlch a predOllsly provided (lCCOIIIII lIame and J)ilSSword; wherdn if(I /)(lYllwlll all10llll1 exceeds a Ihreshold, Ihelllhe lIser is prompted/or seCllrily-relaled ill/ormaliOIl; wherein al lellsl olle oj Ihe Sl:rver t;Ql1Ip"lers \'crifies I/,(II Ihe secllrily-relaled in/orlllalioll lIIalches prl:viollsly provided sI:Cllril)'-re/atl:d ill/ormalioll, 54. A hyperle.I·1 sla/l!lIIelll syslem illllCCOrd(IIICC wilh claim 53. whereill Ihe clielll COli/pliler is (I bllyer complller. (/1/(/ (1/ lellsl Olle o/Ihe sen'er comp"lers is a JNl)"IIICIII complller. 55. A h)lJ(!neXI stalemelil sySlem ill (Icconiallce wilh claim J5. whueill Ihe IIser reqlleSls Cllstomer service: wherein ill respollse 10 Ihe 1I$('r reql/esl. Ihe clienl COIIIpllicr sl:lIds (I cllstolller sl:rvice URL 10 al/l:llsl 0111: 0/ Ihe sl:,--.-er co mplilus. alld al leasl one o/Ihe server colllp"lers cremes (I CIiSlOlller service form alld sl:lIds Ihe /orm 10 Ihc cliclIl cOlllpllll:r; wherein Ihc /orm cOlllains an area/or Ihe IIser 10 prol'ide COII/meIllS. 56. A hJllCr/<'XI SWICI/ICIII system ill (lccon/aIlCC ...ilh claim 55, whereill Ihe clielll compuler sellds Ihe IIser 's commelllS 10 al leasl onc of Ihe server CO/1/plllers: wherein (ll/eosl 0111: o/Ihe server COII/lllllers processes Ihe IIser COIIII/WIIIS. THE PATENT IS HEREBY AMENDED AS INDICATED BELOW. 5 Maller l'nc1osl'd in h eavy brackl'ts [ ] a ppl.'arcd in Ih e p a le nt , but ha s bc('n d eleted and is no lon ger a part oflhe pa lent ; malll'r prinll'd in italics indicalU addil.iolls mad c 10 to till' palent. AS A RESULT OF REEXAMINATION. IT I-lAS BEEN DETERMINED THAT: "I1IC patentability of claims 1- 38 is confimllxl. 15 NL'W c1.. ims 39- 108 arc added and determined 10 be palcnlablc. 39. A hyper/ILl/ !i/a/emcnr sysle/JI in (lcevr</(WCe ",ilh claim J5. wherein II,,· Iw/work is an Inlemc/. 40. A h)1J(!rff!.d s/alel/llml syslcm in " ccon/allCe willt claim J5, ",hcrein the client compilier is a buyer cOlllpliler, and at fellsl one of lite sen-'cr complilers is /I paymem compllter. 41. A hypertext sra/emem systell/ in accordance wilh clllim J5, wherein Ihe sllllemelll docllmelll is selll by III lellsl one o/Ihe sen",r compulers 10 Ihe clielll compuler in response /(J II Sllllemel1l URI. sem by Ihe ciielll comp"I<'r 10 at lellsl one o/Ihe ser"':r colllpulers_ 42. A hHJ(!rle.1"I sllllelllelll syslelll iIlIlCCOrdIllIC(! wilh clllilll 4f, wherein /he Slalell/elll URi includes a URL all/hen/icalor Ihm is II digillli signlllllre based on II cryplographic key; whereill Ihe URL IIl1lhelllic(l{or is (I h(lsh 0/ ill/orll/(liioll conillined in Ihe Slmell/elll URI.; wherein III Jellst olle 0/ Ihe sen'<!r compmers I.er{!ies wllether Ihe Slil/emelll URI. IIIl1hel1licmor "'liS cre<lll'd based "11On Ihe in/ormalion ("oIJl(lined illihe stalelllenl UR/, usillg Ihe cI)1)lOgraphic key. 43. A hypi!rle.d Slaie/JIenl syslem in (lccordance ,..ilh claim 42, whereill if verifiClllion by III lellsl olle o/Ihe server cOlI/p"lers fails. Ihell III lellsl olle o/Ihe sen"<!r COmpl/lers sellds 0 doclllllelll 10 the clielll COlllpllfer indicatillg tllm occess is denied. 44. A hyper/exl SIOlemellt sySI<'m ill (lccordallcc wilh claim 42. wherein Ihe statellleni URL comprises II clienl compull!/" lIetwork address: whereillthe client compliler lIelllvrk address is verified by matching il wilh Ihe lIelwork address specified ill Ihe sillfemelll URL 45. A hyp<-r/e.l"1 slatemelll system ill lIccordllllCC willt clllim 44, ",hereill if \'erificlllioll )ilils. thell (1/ lellsl olle 0/ the server complllers sellds a dOClJlllellt 10 the clielll computer indicalillg Ih(l/ IIccess is dellied. 46. A hnx:rl<:xl S/(llelllenl syslem ill (Iccordllllce ,..ilh clllim 42, lI'hereill Ihe clielll compliler promplS Ihe IIser /or all (lCCIIIIIII IIl1l/1e IIlId password by creillillg 1111 (lcco/IIII IIl1l11e prompl IIlId 1I PIISSUVrd prolllpl. 47. A hyperle.\·1sllllelllem syslelll ill (lCCOrdWICC wilh clllilll 46, wherein at lellsl OI/C o/the server complllers verifies Ihllt lite IICCOlllllnllllle IIlId password provided by Ihe /IScr mlllch a prel'iolls{1' prodded accoum IIl1me lIIld J)ilssword. 48. A hY}J(!r/exl sllltemel1l syslem 0/ clailll 47, wherein if Ihe (Iceollnl 1IIIIIIe 11/11/ password ,'Crificalioll /Iliis. Ihen Of lellsl olle o/Ihe server comp"lers sellds II docl/lllelli 10 Ihe clielll comp"ler illdicOlillS Ih(ll (Iccess 10 alleasl a porlioll 0/ a lIelHvrk silies syslelll is dellied. " 40 45 55 00 65 US 5,909,492 C l 3 4 57. A hYjJ<'nL'xl S/aIClllcnl system jlll/ceardance with clailll 15, wherein Ihe IIser I1!lIlIes/s display of a product listed 011 pUlers sellds {/ dOCUlllelll 10 Ihe clielll complller indio c<IIillg fhOl access is dellied. 65. A it)perlext S/OIelllelll syslem 0/ claim 15. wherein if a pll)'welll amOllll1 provided by Ihe IIser exceeds a Ihreshold. thell the user is prompted for securil),.re/ated inforlllation, (Illd (II feasl aile of the sen-er compulers ,-erifies Ih(11 Ihe securily illforlllOlioll lIIotches previously provided secllril),roill/ed Ill/orlll<llioll. 66. A hypertexl sla"'melt/ system IlI1Iccon/1Il1Ce wilh elaim 15. whereill Ihe IrallSlIClion delaif docullletll illc/I/{Ies lratlslIcliotl illforllllllioll lind lIIerchllttl ill/Orll/lIIioll. 67. A hYf)(!rle.I·1 stalem!:1I1 system illaccon/(Jttce lI"i/h c/lIilll 66. whereitt Ihe IrallsaCliOIl ill/orlllolion inc/llties ollcoSI Olle of the fo/loll"ing l.llJCS of i'!fort/tutioll: 0 URL ...here a prodllcI is localed. a IrallSilclioll log idelllifier. a c urrellcy Iype IIsed. IllrallSiletioll dille. (II/ e:.pirotioll tillie, (III illiliotor //IllIIber. a prodllci descriplloll . a IrillISIIClioll alllOlIllI. II bem'jiciary lllIlIIber. lin II' lIddress, a IrmtSIlClioll I)'pe illdiclllOt; alld a dOlllaln correspolll/ing 10 Ihe prodllcl. 68. A h.\1K·rtexl SWU'mettl SYST{'III ill (lccon/allce wilh clailll 66, whereilt the merchllll/ inforlllolion includes (1/ leasl one oflhe fo/loll'illg Iypes of illfort/wtioll: a merchalltle/elJhone n/lll/ber. II merchonl address. a merchallt FAX lIumber. a merchalll e-Illail address, a II/erchalt/ principlIl lIallle. II merchalll hallie URI.. olld a mercholll colllllr)". 69. A hypertexl Sfll/elllell/ s),STem illllccon/lIl1Ce wilh clllilll 66. "'hereill Ihe trill/saclion deloil doelill/elll comprises II CIlSIOlller feedback form. including Ihe folloll"ing jidd.~ for dilla elliry by Ihe us!:r: accoulIl IIllllle. e-I/wi! address. subject. and comllleltlS. 70. A h.l1J(!rlexl Slalemelll s),slelll ill accon/allce ..-itll c/llim 69. wherein lite CldlOmer feedbockform illc/udes a hHJerlink Ih<ll a user aclivilles 10 selld Ihe fonll 10 III leasl olle of Ihe sen-er compillers. 71. A h)1)('rtexl sill/emettl sys/{'/11 Illaccon/allc': with claim 66, wherein Ihe IrllttSllClioll deMil doclllllelll comprises a messllge 10 Ihe IIser Invilillg comlllelllS by e-lI/lIi1 ami gh'illg (11/ e-lIIai! address. 72. A h.lJJCrleXI SI"lemenl sySlem in (Iccordattce ,..ith c/aim 66. whereill lite IransllClion deloil doel/melll further com prises a message 10 lite IIser illviting col/lmelllS by FAX alld giving a R4X nllmber. 73. A h.\JJ(!rteJ."1 Slil/emell/ sysTelll ill accon/allce ...llh claim 15....herein a digilllllllil'ertisillg doculllelll is prol'lded 10 Ihe dielll COli/pliler. 74. The melhod of claim 16. wherelll lite Ilelwork is ,l/I Inlemel. 75. Tlte melhod of clailll 16, wherein lite clienl COmplller is u bllyer compilier. lind lIllellsl olle oflile servercomplliers is a paymelll compll/er. 76. The melhod of clailll 16, whereill Ihe SIU/ement doclI mellf is sellf by 01 leasl aile O/Ihe sen'er complllers 10 Ihe dielll COlllplller ill response 10 a stotemellf UJU. sem by Ihe dielll compliler 10 (J/ leaSI Otle of Ihe server computers. 77. The melhod of claim 76. whereill the Sill/eli/eli/ URI. indudes (I URI. 1I11/hellliCOlor Ihal is I I digilll' sigttlllllre bllsed on a Cf")1)logruphic key; wllereill lite URL olllhl!nliclllor is u hash of illformlltioll collillilled ill /lle stotemelll URL; whereill III leasl olle o/Ihe sen'er complllers verifies whelher Ihe sla/emell' URL mlfhemlcU/or I\"as crealed based IIJlQII Ihe ill/orlllaliOIl COlllllilled ill Ihe Slalemelll URL usillg /he clJJ)lOgruphic key. 78. The me/hod of claim 77. wherein if~'erijic(ltioll by 1I1 leusl one of lite server comp"ters fuils, thell alleusl aile of Ihl! sl!rver COlllpulers Sl!lIds a doclIlIlI!lIl 10 the clielll compmer illdica/illg Ihal access is dellied. Ihe s/(l/emclI/ JOCl/mell/. 58. A hyper/ext !ill/femelll system in accordance wilh elaim 57, ,,-herein the client COm{JIIler sends (II/ access URL 10 II S second server complller. 59. A hyperle,I"' sll/Iel/llml syslcm in a ccordance wilh elailll 58, ....herein the access URI- comprises all awhelllicalor based on a cryptographic key; wherein the access URL IIlithcllficlllQr is II hosh of alher 10 inforlllalion in Ihe access URI.; ....herein Ihe second serwr CQlllplller \'('r!lit-s wk"llter Ihe access URL (1IIlhrmlicalor W(IS creall!d [rom informa. tion ("(mlained in Ihe access URL /Ising a cryptographiC key; ....herein Ihe access URI. comprises a duratioll oirillle for access indicator. alld Ihe st'Cond server compllter IY!rijies whelher Ihe dllration lime/or access has expired; wherein the (ICCeSS URI. comprises a buyer network IIddl'('ss iltdiclllor. lIttd lite second server complller verifies Ihal a buyer compuler m::lwork (Iddress is Ihe SU/lle liS /lte buyer network (lddress indirilled in lite access URL; wherein Ihe H"COlld server lrallsmils a /lIljilfmelll doc/Imenl /0 Ihe clienl compuler. 60. A hypt.'rIexl sta/emelll system in accordattc.: wilh claim 15, whereilllhl' slalemem doeumem illcludes in/ormllliOIl on II"lIl/Sllc/iolls by Ihe IIs<:r Ihlll look place ill a given /I1011/h. 61. A hyperIILI'/ Sia/<:meni syslelll in lIccon/allce ...illl cllIilll 60, wherein Ihe ill/ormOliOI/ all Irot/S(IClions by Ihe IIser includes (II h'(1SI olle of tile fo{{owillg types of illforlllolion; II dale of Irut/SilClioll. all idelllificutiot/ of Ille produCI. II pa)"l1/em {Itt/all/If. IIlId II lIIerchlm/ idellfifier. 62. A h)1)(!rle.rf slll/<:lIIenf syslem ill (lccon/ance willi clllilll 60. wherein Ihe Slalelllettl dOClllllelll also illcludes olle or more /illks 10 in/orlllOlioll regan/illg pre~'iolls lrullsacliolls by Ihe IIser. 63. A h)1J(!rlexl Sialemenl syslem ill u ccon/wtCe ...ilh elilim 60. wherein /01' a /l"lltlsoctiOtt there is II trtltlsaclioll delail URL Ihllt illellldes a transoctioll idellfifiet; U buyer 1Ie/ ...ork address. IIl1d (I IrOllsaClioll detail URI. IIlIthenlico lor. 64. A hyperle);! stotemettl sys/em illuccon/allce wilh claim 63. whel'('in 01 fellSI Olle O/Ihe server COlllpll/ers receiv<'S Ihe IrillIsaClioll detail URL; It'hereill lite Ir(UtSaClioll delllil URL includes a URL 1I111/1ellliCUlor Ihlll Is II dlgif<ll siglllllllre based 011 a cr),plogrophic key: ...herein the URL olilhelllicalor is U hllsh of illformillion cOlllailled ill the transaclioll de/IIi! URi: whereill lit feasl aile of /he sen-er comp"lers verifies whelher Ihe IrllnSIlClioll detail URI. 1I11/helllicalor \l"as creOled from illformllliOIl COltWilled ill Ihe /raIlSilc/ioll dc,tail URL using Ihe Cf")1Jlographic key; whereill Ihe transllClioll delllj{ URL comprise;' II c/ielll COmplller lIelwork (Iddress. allli Ih(' c/ietlt compuler lIet ...ork address is wrified by lIIalchillg il wilh Ihe lie/work address specifiell ill Ihe lransactiotl de/lli1 15 20 25 30 35 40 4S so 55 URL; whereill Ihe c/ielll complller prolllpls Ihe IIser /01' 1111 00 IICCOIIIII name 11/111 password by c re<lling 1111 IICCOIIIII natlle prompllllld a pllSSII'Ord prolllpl. and al fellSI aile of Ih.: server COlllplllers verifies 1It<ll Ihl' lICCOIIIII IIlIlIIe alld password ettlered by Ihe IIser lIIalch a previously f)rovided lI("CO/l/tl nllllle lind paSSIl'Qnl; 65 It'hereill if 0 verijicalioll by 01 leosl olle of the server complllers fails, Ihen <II leaSI aile of Ihe server COIII- US 5,909,492 C l 6 5 79. 7111: method of elailll 77. wherdn Ihe stalcmCIII URL comprises II ciiem cOli/pliler lie/work address; whcY(:in Ihl! client computer network address is ,Y,!rijied by lilli/ching ;1 lI'ilh the nCIYI'Ork address slJ£'Cificd in Ihe slalemen{ URL 80. The melhod oj claim 79, wherein if H"ijiC(llion fi,ifs. Ihen IIllcasl one of Ihe sen'cr compiliers sends II docl/men{ /0 the client compuler indicating Iha/access is denied. 81. The mel hod of claim 77, ....herein the client COli/pilfer prompts Ihe IIser for lin IICCOII/1/ name IIIld password by creating IIIl IICCOIlIIf //lillie prompt lind 1I paSSll'ord prompt. 8:!. The /lie/hod 0/ elajlll 81 .....herein III least aile of Ihe server computers w:ri/ies {hOI Ihe (lccount 110me m,d pass· word proVided by {he IIser IIIlI/eh II 1)f·e~·iOIl.rJ)' provided {lCCVII/II 1Il/1II1! and password. 83. The melhod oj claim 82, whereill iflhe aCCOIIIII lIallle alld password verification filils, Ihen 01 leasl aile o/Ihe sen-er co mplilers sellds a doclllllelli 10 Ihe clielll cOlllp'ller illdiclllillg Ihalllccess to II11eaS11l portion ofllllelwork sales syslelll is denied. 84. 17te method 0/eI(lilll 79. wherein iff' {XJ)"lIIeulllmount excl?eds a Ihreshold, Ihen Ihe user is prompted for seCllri~I'­ relllled ill/ormalion; wherein at lellst aile q( the server comp"lers verifies Ihat Ihe secllrily-relaled in/orlllation lIIalches previollsly provided secllrily-relatcd infort/lillioll. 85. 17,e melhod a/claim 84. wherein ifthe secllrity-related verificalioll fails. Ihell lite pU)"lIIell/ COlllplller sellds a dQCllmelll 10 Ihe bl/yer colIIl'mer indicatillg Ihat access is 1/01 allowed. 86. The melhod of elailll 84. whereill ul leaSI one of Ihe sen-er compllu:rs INlllsmilS Ihe Slalemenl dOClimell1 10 Ihe clielll compilier lind Ihe clielll cOlllplller displays Ihe sllltelIIelll docllmenl 10 Ihe IIser. 8 7. The melhod of clailll 86, wherein Ihe clielll colllp"ler is II bllyer co mplller; wherein 01 leasl aile O/Ihe sen"Cr COlllplllers refri<.'V(·s selllemelli dlllll from (' selllemellt dallloose /01' I/se ill gelleraling Ihe Siulelllelll doclllllelll. 88. 71,e melhod o/elaim 16, whereill the lrallsllclioll deillil h)1JCrl"..-/ link illell/des I' INII/Sor/ioll delllil URI.: It'herein Ihe Ifllllsactioll detail URi incilides a URi IIl11hellliClllOr /hlll is II digilOl signafllre hosed all II cryptographic key; whereill /he URI. olilhelllfeulor is a hash 0/ ill/orllla/iOIl conlllim:d in Ihe /rallsllction deMil URI.: whereill at leasl aile of Ihe senoer complllers verifies "'helher Ihe IrallsaClion detail URL IIl/thell/ic% r was O'ealed from ill/orlllllliOIl cOII/(,illed ill the IrllnSIICliOIl de/ail URi hosed Ihe CfJ1Jtogrllphic key: when'in Ihe IranSIlClioll de/ail URL cOlllprises a clielll lie/work IIddress; wherein Ihe clielll cOlllptller nelwork IIddress is ~"Crified by lIIalrhillg il wilh Ihe lIellt'Ork address sfJCcified ill the frllllSIlClioll dell/if UR'-: wherein Ihe elienl COlllpl/ler prompls Ihe lise fa r 1111 llceOllll1 1IIIIIIe alld passlt'Ord by c reoling lin IICCOlIIII nllme promplllnd II password prompt: whereill at leasl aile of Ihe server colllp"lers verifies Ihat /he llceOl/lI1 IIlIlIIe alld password elltered by Ihe IIser lIIalch a previOllsly provided IICCOIIIII IIlIlIIe alld {XJssII'Ord: wherein ifa pll)"melll 0111011111 exceedsalhreshold. Ihen Ihe IIser is prompled/or $ecurily-relllied in/ormil/ion; wherein allellst aile of the server comp"lers verifies Ihat Ihe secllrity-relaled infamWlion IIw/(:hes prt.'Viallsly provided secllrily-related illforlllatioll. 11""" 89. The melhod of claim 88, whereill Ihe clielll COIIIPIlI<"f' is a bll)"er complller; (Illd (lfleasl one oflhe servercolllplllers is 0 pll)'lI/elll COil/pliler. 90. The me/hod of clllilll 16. wherein the IIser requests 5 c lls/omer service; wherein ill Il.'spo"se 10 Ihe IIser reqllest, Ihe clielll COIIIpliler sellds a CIlSlomer ser....ice URL 10 III leasl one 0/ Ihe sen"Cr COmp"lerS, IIl1d III lellst aile o/Ihe server complll<!l's cmllles a CIISlomer sN"vice form (IIld sellds 10 Ihe forlll to Ihe clielll cOlllplller; ",herein Ihe form comains 1/11 llrea/or Ihe IIser 10 pro ~'ide COlllmenlS, 91. The melhod of claim 90, whereill Ihe ciielll compl/ler sellds the IIser 's comlllenlS to lit lellsl one of Ihe server 15 comp"ters; wherein IIllellsl one oflhe server comp"lers processes Ihe IIser COlllments. 92. The melhod of claim 16, "'herein the IIser reqlles/s displllY of a prodllcl liSled all Ihe S/ulelllelll dOClllllelll. 20 93. The mClhod of eI(lim 92, wherein Ihe elienl colllp"ler seuds III/ IICceSS URL 10 a s!."colld server compl/I!."r. 94. The melhod 0/ clllilll 93, wherein Ihe access URi comprises 1111 olliheillicalar based all a crJPlographic key; wherein Ihe access URi IlIIlhenticator is a hash 0/ other inforllllllioll in Ihe access URL; II'hen-in Ihe secolld server complller verifies whelher Ihe IIccess URL (lllIhelllic<l/or WIIS cre(lfed from illformalioll COlllllilled ill/hc IIccess URI. IIsi"g a cryptographic )0 key: whereill Ihe access URI. colllprises I' dl/r(l1ion of time/or IIccess indicalor, alld Ihe secolld server colllpllier ~'eri­ fies whelher Ihe dllraliolllillle/or access has e.lpired; wherein the aceess URL comprises II bllyer lIetwork IIddress illdic ll/or; (lIId Ihe seCOlld Selver COli/pliler w ri/ies Ih(l1 I' bl/yer comp"ler lIela'Ork (,ddress is Ihe smile liS Ihe buyer lIelwork address indiCllu-d ill Ihe " I,cces~' 45 SO 55 00 65 URL; whereill the second ser....er transllli/s a /Illfillmeni doci/ lIIelll/o the clielll comp"ler. 95. The melhod a/claim 16, wherein Ihe S/(/Ielllelll doclI mC1I1 illellldes ill/orllllliioll on IflllISIIC/iolls by Ihe IIser Ihat look plilce ill (/ gi~'ell lIIolllh. 96. The method of claim 95. II'herein Ihe illforll/lIIion 011 fr(I11SIlClioIlS by Ihe IIser illellldes IIllellSI aile o/Ihe/olloll'illg I}1Jes afillfomwlion: II dale o/Irallsac/ion, 1111 iden/ific atioll o/Ihe prodllel. II paYlllenl (11110'1111. IIl1d a merchllnt idenlifier. 97. The method 0/ clllilll 95, wherein the sllllellleni doclI mellllliso incllldes one or 1II0re links 10 ifiorlllation reg(lrding previolls trllllSllcliollS by the IIser. 98. The lIIethod 0/ c/ailll 95, whereill for a IranSilCliOIl Ihere is I' IrtmSaclioll dell/if URL Ihlll inc/udes {J trllnSilClioll idelllifier; /I blly('r lie/work IIddress, IIl1d 1/ frllllSIlClion deMil URI. alilhenlic/llor. 99, The melhod of c/llim 98, wherein (,, lellst aile of Ihe server COlllplllers recei~'Cs the IrllnSilc/ioll delilil URi ; wherein Ihe trallslIClioll dell/if URI. incllldes a URI. IIIlIhelllic(llOr Ihl/I is II digiwl signllilire hosed 011 II cr}1)/ographic key; ",hereill Ihe URL IIlIlhelllic alor is 0 hllsh 0/ ill/orlllll/ia/1 COlllailled ill lite IrallsaClioll deillil URI.: ",herein 1,1 leasl aile of lite sen.·cr compl/lers verifies ",helher Ihe lrallsllc/ion delail URL IIl1lhenliclllor WIIS crellted from in/orlllillioll cO lllailled in Ihe lransac/ion dell/il URL IIsillg the crJPlOgraphic key; US 5,909,492 C l 7 8 ....herein Ihe tral/saC/ion dewil URI. COII/prises {/ diem an expiration timc. all iniliator IIIIlIIber. a proliliCI compllfer nelll'ork address, and the diem compllfer description. (/ lrallsaclion 0/110'1/11. (Il><:mjiciory number. an lIetwork (lJdr.:ss is wrified by mutching il with Ihe lP address. a trallsoclion type indiClI/or. /JIld <I dOIl",ill network IIddll!ss sfX'Cified in Ihe lrun:;aclioll deNliI corresponding 10 the prodUN. URL; 5 103. "("he melhod 0/ elllilll 101 . whcrein Ihe lIIerehllfil It"herein Ihe clienl compuler prompts the IIser for Oil in/ormalion illdlldes III leaSI one 0/ Ihe /of/owing InkS 0/ aCCQlllli IIlIlIIe allli passU'ord by creating an IICCOIIIII ill/ormllliofl: II lIIerehllni Ielephone fllllllber. II lIIerehlllll nllllle promp/lllld 1/ passlI'ord prompt. lIlId at leasl ol/e address. a lIIerelllllll I::4X IlIIlIIber, <I mcrchlllll C-II/lli! of the server complilers verifies 111m Ihe lIcellllttl IIlIlIIe 10 address, IIl11erchalll principal flame . IIl11crehllnl hOlllc UNL. and password emered by the IIser //Ia/ch /I previously alld II tII('rchallf cOlllllry. provided ll('COll/ll IIlIme and ptlssl!'Qnl : 104. The /IIclhod 0/ eloim 101 ....hereill Ihe transaclion wherein if a verijicalion by (l/ least Olle of the server del,,;1 dOClltllc-nl cotllprisr.-s <I CIISIOlller /eedbllck form. colllI",ler!; fillJs. II1(W (1/ feasl one of fhe server roll/indllding Ihe /o/low;ng fields for dllill enll)' by Ihc m"cr: piliers sends a dOCllmen/lo the ciienl COII/lllller indi- 15 OCCOIIIII flllmc, c-mllil IIddress. sllbject. IIl1d COllllllelllS. caling Ihat llccess is JlmieJ. 105. The lIIelhod 0/ elllilll 104....herein Ihc Clistolllcr 100. The method of elaim 16, wherein if 1/ pllymem /ecdbllck/orlll inellides a hyperfillk tlllllil IIser IIcli\"ll/es to III/WI/III provided by Ihe user exceeds (/ threshold. Ih<'11 the sel/d Ihe form 10 01 IcaSI OIlC o/Ihe serVf:r co mplilers. IIser is prompled for secllrity-refllled in/ormation. 01111 .1/ 106. The /lie/hod o/elilim 101. wherein Ihe Irllnsllc/iOIl feaSI Olle o/Ihe sef'V(.'r compulers "erifles that Ihe securit), ill/armatiOIl matches previallsly provided security-refilled 20 delail rlocllmelll comprises " message 10 the IIser i"";lillg COlllllleniS by e-/JIlIil ami giving 1111 e-/IIlIi/address. in/ormlllion. 107. The melhod o/elaim 10/ . whereill Ihe IransaClion /01. The melhod 0/ eloim 16. wherein the transaction deloil doclllllclII /lirther compriscs II message 10 Ihe IIser dcloil docllmcnt inellides lrans(lction in/orl/lillion and merinviling COlllmcnlS by FAX (wd giving II I'llX nllmber. challl in/ormmion. 108. 71le lIIe/hod o/daim 16. wherein a digital odverlis102. The method 0/ eloim 101. wherein Ihe transaction 2S illg dOCllllle/1/ is provided to Ihe eliem compUier. ill/ormatiOIl inellides at lellst OIl<! 0/ Ihe /o{{oH"illg Iypes 0/ ill/orlll<llioll: a URL where II product is located. II /r{II/SIIClioll log idelllijier. (I cllrrellcy 1)1)(: IIsed. a /r{lI1Sllclion dllle. • • • • •

Disclaimer: Justia Dockets & Filings provides public litigation records from the federal appellate and district courts. These filings and docket sheets should not be considered findings of fact or liability, nor do they necessarily reflect the view of Justia.


Why Is My Information Online?