`
`ii ,
`
`
`
`,.¢m1-...
`
`
`
`
`
`-Mfmmd:5"flrraHINDI-1H,”:GWJM'N.'..‘:¢'&',:_oM..
`
`
` .s-.-..-x-JW..=:J\-."}---.r-.....
`
`.1l'
`
`
`
`
`
`
`49"""9'TF.1'.~"'(I"-ft'i‘."I-Mr.-
`
`
`
`.:.wM-views-r«tr-raw.-:-.=.-
`
`PTOiAIAi‘l 5 {Di-12)
`Approved for use through 01i31t2014. 0MB 0651-0032
`us. Patent and Trademark Office. US. DEPARTMENT OF COMMERCE
`Under the Paerwcrk Reduction Act of 1995 no
`-ersons are re- uired to res u - nd to a collection of information unless it dis-Ia s a valid OMB control number.
`
`—4?583-5vsoz
`Paul Timothy Miller
`
`UTILITY
`
`PATENT APPLICATION
`
`TRANSMITTAL
`
`CRYPTOGRAPHIC SECURITY ......
`
`Electronically filed
`
`2.
`
`3.
`
`ACCOMPANYING APPLICATION PARTS
`
`10. El 37 CFR 3.73M Statement.
`{when there is an assign-ea)
`
`El Power of Attorney.
`
`11. 1:1 English Translation Document.
`(if appiicabl'e)
`
`13. El Preliminary Amendment.
`
`14- |:| Return Receipt Postcard.
`(near-r 503;- rsmurd lie spooficallyiremized)
`
`15. I: Certified Copy of Priority Documentis).
`{it foreign priority is claimed)
`
`7. El CD-ROM or co-n.
`in duplicate. large table or Computer Program (Appendix)
`
`I: Landscape Table on CD
`
`3. Nucleotide andior Amino Acid Sequence Submission.
`{if applicable, items a. — c. are required)
`a
`[:1 Computer Readable Form (CRF)
`b: Ci Specification Sequence Listing on:
`I. E co-nom orCD-R {2 copies); or
`ii. E]
`Paper
`
`
`
`
`
`
`
`(Only for new nonprovisionai applications under 3? CFR 153(1)»
`
`
`Commissioner for Patents
`
`' APPLICATION ELEMENTS
`ADDRESS TO:
`Po. Box 1450
`
`Alexandria VA 223115-145IJI
`See MFEP chapter 600 concerning utility patent application contents.
`
`
`
`
`
` Fee Transmittal Form.
`
`(FTOFSEIH? or equivalent}
`
`
`
`Applicant claims small entity status.
`Q. I: Assignment Papers.
`See 37 CFR 1.2r.
`(cover sheet a document{s})
`
`
`
`60 ]
`[Total Pages
`Specification.
`Name of Assignee
`
`
`
`Both the claims and abstract must start on a new page
`{Fortnfonnadon on the preferred arrangement. see MPEF' § 608.019»
`4.. Drawingis). (35 U.S.C. 113)
`[Total Sheets 11
`
`
`- 5. Inventor's Oath or Declaration.
`[Total Sheets 2
`
`
`{fluctuating substitute statemgnrs under .3? CFR 1.64 and assignments serving as an
`
`oath or declaration under 37 CFR 1.636)]
`
`a. I Newly executed (original or copy)
`
`
`b.
`A copy from a prior application (3? CFR 1.63{d})
`6'
`Application Data Sheet. is” No” he'bw'
`12. I: information Disclosure Statement.
`
`
`
`See 3? CFR 1.?6 [PTOlAIAH-l or equivalent)
`tPTOlSBlOE or PTO-1449)
`Copies of citations attached
`
`
`
`
`
`
`
`
`16. I] Nonpubllcation Request.
`
`
`
`
`Under 35 U313. 122(c)(2xayn. Applicant must attach lon‘n PTOlSBlB5 or
`equivalent.
`
`
`
`
`1?. Battier:
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`c. D Statements verifying identity of above copies
`
`
`
`
`
`
`'Note: {1) Benefit claims under 3? CFR 1.?B and foreign priority claims under 1.55 must be included in an Application Data Sheet (ADS).
`{2) For applications filed under 35 U.S.C. 111, the application must contain an ADS specifying the applicant if the applicant is an
`assignee, person to whom the inventor is under an obligation to assign. or person who otherwise shows sufficient proprietary
`interest in the matter. See 37 CFR 1.46lb).
`
`13. CORRESPONDENCE ADDRESS
`
`27683
`
`OR B Correspondence address below
`
`
`
`
`
`
`
`-E%E_- 3-18-16
`'
`Name
`.
`Registration No.
`PrimiTpe
`DaVld BOWIS
`Atiome iA-ent 39,915
`.
`
`
`This collection of information is required by 37 CFR 153(1)}. The information is required to obtain or retain a benefit by the public which is to file (a nd by the
`USPTO to process) an application. Confidentiality is governed by 35 U.S.C. 122 and 3? CFR 1.11 and 1.14. This collection is estimated to take 12 minutes to
`complete. including gathering. preparing. and submitting the completed application form to the USPTO. Time will vary depending upon the individual case. Any
`comments on the amount of time you require to complete this form andior suggestions for reducing this burden. should be sent to the Chief Information Officer,
`U.3. Patent and Trademark Office. U.S. Department ofCommerco. PO. Box 1450. Alexandria. VA 22313-1450. DO NOT SEND FEES OR COMPLETED
`FORMS TO THIS ADDRESS. SEND TO: Commissioner for Patents, P.0. Box 1450. Alexandria, VA 22313-1450.
`ii’you need assistance in completing the form, salt 1‘-300-PTO~9199 and select option 2.
`
`Page 1 of 591
`
`MIOOZ
`
`IA1002
`
`Page 1 of 591
`
`
`
`
`
`4-42.99.-N-l‘r‘AL-‘blfimm..:.-r-r7-,“.M'e-u.g.;.
`
`.1:.:sawn-v“9:.
`
`Elm-\N'J’A.'lv1#.'flfl/T'J
`
`-5.4-.
`
`
`
`-wrz.-=~m.:-».w:.1w_;4r.tmn-i...-...
`
`‘X‘.:‘-\1.W'm:e":'—.'.r:a
`93"-
`5-.‘ual
`'3;
`
`
`
`
`
`,3
`
`i t'
`
`2‘.
`
`.-.-v-w.-v.-.-..-:.uu-.tw-y.
`
`
`--r.t.-t:-.Wi'J:\.4m...”;..-:'-‘
`
`Under the Papenivork Reduction not or 1995. no persons are required to respond to a collection of information unless it contains a valid OMB control number.
`
`I Ulhlmi‘i [I I‘lU}
`I'
`Approved for use through D4l30i20‘l?. OMB 0551~0032
`US. Patent and Trademark Office; U.S. DEPARTMENT OF COMMERCE
`
`.
`_
`Application Data Sheet 37 CFR 1.76
`
`
`
`Attorney Docket Number
`_
`_
`
`
`
`47583.5U802
`
`Title of Invention
`
`CRYPTOGRAPHIC SECURITY FUNCTIONS BASED ON ANTICIPATED CHANGES IN DYNAMIC MINUTIAE
`
`
`
`
`
`
`The application data sheet is part of the provisional or nonprovisional application forvvhich it is being submitted. The following form contains the
`bibliographic data arranged In a format specified by the United States Patent and Trademark Office as outlined in 3? CFR 1.76.
`This document may be completed electronically and submitted to the Office in electronic format using the Electronic Filing System (EFS) or the
`
`document may be printed and included in a paper filed application.
`
`
`
`
`
`
`Secrecy Order 37 CFR 5.2:
`
`
`
`CI Portions or all ofthe application associated with this Application Data Sheet may fall under a Secrecy Order pursuant to
`37 CFR 5.2 (Paper filers only. Applications that fall under Secrecy Order may not be filed electronically.)
`
`Inventor Information:
`
`Inventor
`Legal Name
`
`1
`
`=1-
`
`'-
`
` attest
`
`__—
`Residence Information (Select One) © US Residency 0 Non US Residency 0 Active Us Military Service
`
`
`
`
`
`
`
`
`
`
`
`
`Residence information [Select One)
`(9 US Residency 0 Non US Residency 0 Active US Military Service
`
`
`
`
`
`
`
`
`
`Mailing Address of Inventor:
`
`Address 1
`2517 Clayton Arnold Road
`
`
`Address 2
`
`
`
`
`Mailing Address of Inventor:
`
`Address 1
`
`10Wandering Rill
`
`Address 2
`as _ atattPtPtaePt
`Posta- cats
`
`
`
`Inventor
`
`2
`
`Legal Name
`
`City
`Pasta cats
`
`Thompson's Station
`
`StatelProvince
`
`TN
`
`Inventor Information blocks may be
`All Inventors Must Be Listed — Additional
`generated within this form by selecting the Add button.
`
`__.gm
`'
`
`
`
`
`
`Correspondence Information:
`
`Enter either Customer Number or complete the Correspondence information section below.
`For fur—lgtarlgiélgfgpggtiton see 37 CFR 1.33(a).
`CEO “Huh '1’) 1‘)
`
`1
`
`M1002
`
`IA1002
`
`Page 2 of 591
`
`
`
`
`
`
`
`'I"Ioa=w.—.s-—ew'.‘.'.U-M:,-.m'wr1:!«3'3'76-1‘7'wwggru'u'wa'tfiw.‘
`
`mew'v.-
`
`
`
`
`
`\,.-:.,,‘._-rye-"mew.amen-cs..-
`
`
`:3,
`t3'5
`2':
`t,
`itre
`.3
`
`tg5
`
`:
`
`3“”.3'
`'r.L.
`3;
`
`
`
`
`
`
`
`-.\.’.r"?.".m"".'."m.e'”£hrr.:.r..-..,i-......
`
`i- IUrnlnI l-r ii I- rug
`Approved for use through 04i3fli201?. 0MB 0651-0032
`U.S. Patent and Trademark Office; U.5. DEPARTMENT OF COMMERCE
`Under the Paperwork Reduction Act of 1995, no persons are required to respond to a collection ol information unless it contains a valid OMB control number.
`
`
`
`
`
`
`
`Application Data Sheet 37 CFR 1.76
`
`,
`
`,
`
`Title of Invention
`
`
`
`
`
`
`
`
`
`
`
`
`
`CRYPTOGRAPHIC SECURITY FUNCTIONS BASED ON ANTICIPATED CHANGES IN DYNAMIC MINUTIAE
`
`El An Address is being provided for the correspondence information of this application.
`
`Email Address
`
`it:dooketing@hayneoboone.oom
`
`
`
`
`
`iviAdflW
`
`
`Application Information:
`
`
`
`Title of the Invention
`EWE'EIESRAPHIC SECURITY FUNCTIONS BASED ON ANTICIPATED CHANGES IN DYNAMIC
`
`Attorney Docket Number I47583.5U802
`Small Entity Status Claimed
`|:|
`
`
`
`Application Type
`
`Nonprovisional
`
`Total Number of Drawing Sheets (if any)
`
`Suggested Figure for Publication [if any)
`
`
`
`
`
`
`
`
`Filing By Reference:
`
`
`Only complete this section when filing an application by reference under 35 U.S.C. i 1 itc) and 37 CFR1.57[a). Do not complete this section if
`
`
`
`application papers including a specification and any drawings are being filed. Any domestic benefit or foreign priority information must be
`provided in the appropriate sectionisi below ii.e., ”Domestic Benefiti’National Stage Information” and ”Foreign Priority Info rmation "i.
`
`
`
`
`
`Forthe purposes ofa filing date under 37 CFR 1.53ibi, the description and any drawings ofthe present application are replaced by this
`reference to the previously filed application, subject to conditions and requirements of 37 CFR t.57(al.
`
`Filing date {WYY—MM-DD}
`
`Intellectual Property Authority or Country
`
`
`
` Application number ofthe previously
`
`
`
`
`filed application
`
`Publication Information:
`
`[I Request Early Publication (Fee required at time of Request 37 CFR 1.219)
`
`
`
`I:
`
`Request Not to Publish. I hereby request that the attached application not be published under
`35 U.S.C. 12203) and certify that the invention disclosed in the attached application has not and will not be the
`subject of an application filed in another country, or under a multilateral international agreement, that requires
`publication at eighteen months after filing.
`
`
`
`
`
`Representative Information:
`
`Representative information should be provided for all practitioners having a power of attorney in the application. Providing
`this information in the Application Data Sheet does not constitute a power of attorney in the application (see 37 CFR 1.32).
`Either enter Customer Number or complete the Representative Name section below. If both sections are completed the customer
`Number will be used for the Representative Information during processing.
`
`21-833
`
`Please Select One:
`
`Customer Number
`
`0 US Patent Practitioner 0 Limited Recognition (37 CFR 11.9)
`
`Page 3 of 591
`EEC lflhh fl 41 1'1
`
`M1002
`
`IA1002
`
`Page 3 of 591
`
`
`
`l' IUIHW "'9 'll I'IU}
`Approved for use through 04l30l2017. 0MB 0651-0032
`US. Patent and Trademark Office; U.S. DEPARTMENT OF COMMERCE
`Under the Paperwork Reduction Act of 1995, no persons are required to respond to a collection of information unless it contains a valid OMB control number.
`
`
`
` Title of Invention
`CRYPTOGRAPHIC SECURITY FUNCTIONS BASED ON ANTICIPATED CHANGES IN DYNAMIC MINUTEAE
`
`
`
`Applicatlon Data Sheet 37 CFR 1.76
`
`Application Number
`
`
`
`
`
`
`'.'asall?Le.In42yuan-”w.
`
`3.11.3“:w.'-.-m—'.‘-DIE
`
`Aria-awielkflaa'rfi'fl'Wane.mm:an,
`
`Domestic Benefit/National Stage Information:
`
`This section allows for the applicant to either claim benefit under 35 U.S.C. 119(e), 120, 121I 365(0). or 3880:) or indicate
`
`National Stage entry from a PCT application. Providing benefit claim information in the Application Data Sheet constitutes
`the specific reference required by 35 U.S.C. 119(e) or 120. and 37 CFR 1.78.
`
`When referring to the current application, please leave the “Application Number" field blank.
`
`
`Eileen-tails!
`Filing or 371 (0) Date
`
`(YYYY-MM-DD)
`
`
`..+-.....u:m..-u;
`
`
`
`Irena-.-:A
`
`.-.-;:-..o..~.
`
`x.L\-..'l."mrQWJJFM»!-,g-.--.-.-.
`
`
`
`I:..wm.:ur..meat-an”;
`
`-:.:-aw...';
`
`rior Application Status
`
`Pending
`
`'
`
`
`
`Application Number
`
`Continuity Type
`
`Prior Application Number
`
`
`
`
`Prior Application Status
`Application
`Number
`14458123
`
`.
`.
`Contrnurty Type
`
`Continuation of
`
`
`
`
`Stalemate;
`
`Prior Application
`
`Filing Date
`(YYYY—MM-DD)
`
`Issue Date
`Patent Number W-M M-D D)
`
`131368197
`
`2012-02-03
`
`
`
`8817984
`
`2014-08-28
`
`
`
`
`
`Prior Application Status
`
`Application Number
`
`Continuity Type
`
`Prior Application Number
`
`\
`Filing or 371 (c) Date
`(WW-MM-DD)
`
`
`
`
`
`
`
`1 33881 97
`
`Claims benefit of provisional
`
`817462474
`
`201 1 -02-03
`
`Additional Domestic Benefiti'National Stage Data may be generated within this form
`by selecting the Add button.
`
`Foreign Priority lnfonnation:
`
`constitutes the claim for priority as required by 35 U.S.C. 119th) and 37 CFR 155. When priority is claimed to a foreign application
`that is eligible for retrieval under the priority document exchange program (PDX)' the information will be used by the Office to
`automatically attempt retrieval pursuant to 37 CFR 1.55(i){1) and (2). Under the PDX program, applicant bears the ultimate
`responsibility for ensuring that a copy of the foreign application is received by the Office from the participating foreign intellectual
`property office, or a certified copy of the foreign priority application is filed, within the time period specified in 37 CFR 1.55(g)(1).
`
` This section allows for the applicant to claim priority to a foreign application. Providing this information in the application data sheet
`
`Application Number
`
`Additional Foreign Priority Data may be generated within this form by selecting the
`Add button.
`
`Statement under 37 CFR 1.55 or 1.78 for AIA (First Inventor to File) Transition
`
`Applications
`
`Page 4 of 591
`EEO think '3 '1 4")
`
`M1002
`
`IA1002
`
`Page 4 of 591
`
`
`
`rlUlnlnII-1\II‘IJ}
`Approved for use through 04:30:20”. OMB 0051-0032
`US. Patent and Trademark Office; U‘SY DEPARTMENT OF COMMERCE
`Under the Papemront Reduction Act of 1095. no persons are required to respond to a collection of information unless it contains a valid OMB control number.
`
`Application Data Sheet 37 lCFR 1.76
`
`Att
`
`D
`k tN n
`may DC e
`um er
`
`4753350302
`
`Application Number Title Of Invention
`
`
`CRYPTOGRAPHIC SECURITY FUNCTIONS BASED ON ANTICIPATED CHANGES IN DYNAMIC MINUTIAE
`
`
`
`This application (1) claims priority to or the benefit of an application filed before March 16, 2013 and (2) also
`contains, or contained at any time, a claim to a claimed invention that has an effective filing date on or after March
`
`
`|:| 16, 2013.
`
`
`NOTE: By providing this statement under 37 CFR 1.55 or 178, this application, with a filing date on or after March
`
`
`16. 2013, will be examined under the first inventor to file provisions of the AIA.
`
`
`Page 5 of 591
`EEI'.‘ ”uni-.0 0 1’}
`
`MIOOZ
`
`.-.‘..-..r.an.u;.1...“-
`
`“LAC-awn:
`.n-uc
`JA..-_.-2'.»
`:-Bun;
`
`4-3"
`
`.mwer"k-.‘lflp'.e.‘..f.'.‘_'|-r.->v.‘€v.Lana..
`
`
`
`
`2".r.gnu-+23.-.';fiF-{ml‘nearmm.44‘2‘...
`
`'.'Ml'-...|J~;fil'—VJQ',-.I'Tv(I..-pr.';.:;ug-o..-.
`
`.-.r:-_.
`
`
`
`may...mm}....I-.
`
`.;:.w.-a-matey—u.»:‘l‘rr'fie';
`
`'.'-|r”.4“?
`
`.aw.-.-.'
`
`
`
`-'-n.'o..ua..;,.a....-:--.-'£.1'_-It~|rl_"-.\
`
`-:'-h-5:.-_
`
`
`if
`
`pvt-mqr;-r-
`
`IA1002
`
`Page 5 of 591
`
`
`
`
`
`
`
`-:.v-u.v,tn-M..-a-..n4:..-,.awn.
`
`'-..."'f".‘I-:n1.0:.:r:
`
`2:7.arwJ-sc/ML:n.:.re'.'."m_'
`
`'a-r-.r::..
`t;
`
`
`
`
`
`
`
`.-:.
`
`r Iurniru l‘1 ti i-Iu;
`Approved for use through 04l30i201i'. OMB 0651-0032
`U.S. Patent and Trademark Office; U.S. DEPARTMENT OF COMMERCE
`Under the Paperwork Reduction Act of 1995, no persons are required to respond to a collection of information unless it contains a valid OMB control number.
`
`Application Data Sheet 37 CFR 1.76
`
`Attorney Docket Number
`
`47533.5U302
`
` Application Number
`
`CRYPTOGRAPHIC SECURITY FUNCTIONS BASED ON ANTICIPATED CHANGES IN DYNAMIC MINUTIAE
`
`
`Title Of invention
`
`
`
`Authorization or Opt-Out of Authorization to Permit Access:
`
`
`When this Application Data Sheet is properly signed and filed with the application, applicant has provided written
`authority to permit a participating foreign intellectual property (IP) office access to the instant application-as-filed (see
`paragraph A in subsection 1 below) and the European Patent Office (EPO) access to any search results from the instant
`application (see paragraph B in subsection 1 below).
`
`
`
`Should applicant choose not to provide an authorization identified in subsection 1 below1 applicant must opt-out of the
`authorization by checking the corresponding box A or B or both in subsection 2 below.
`
`NOTE: This section of the Application Data Sheet is ONLY reviewed and processed with the INITIAL filing of an
`application. After the initial filing of an application, an Application Data Sheet cannot be used to provide or rescind
`authorization for access by a foreign IP officels). Instead, Form PTOr'SBi'SQ or PTOISBIGS must be used as appropriate.
`
`1. Authorization to Permit Access by a Foreign Intellectual Property Office(s)
`
`A. Priority Dgcument Exchange (PDX1- Unless box A in subsection 2 (opt-out of authorization) is checked, the
`undersigned hereby gmnts the USPTO authority to provide the European Patent Office (EPO), the Japan Patent Office
`(JPO). the Korean Intellectual Property Office (KIPO), the State Intellectual Property Office of the People‘s Republic of
`China (SIPO)1 the World Intellectual Property Organization (WIPO). and any other foreign intellectual property office
`participating with the USPTO in a bilateral or multilateral priority document exchange agreement in which a foreign
`application claiming priority to the instant patent application is filed1 access to: (1) the instant patent application-as-filed
`and its related bibliographic data1 (2) any foreign or domestic application to which priority or benefit is claimed by the
`instant application and its related bibliographic data, and {3) the date of filing of this Authorization. See 37 CFR 1.14(h)
`(1).
`
`B. Seamh Results frgm U,S. Application to EPO — Unless box B in subsection 2 (opt~out of authorization) is checked,
`the undersigned hereby grants the USPTO authority to provide the EPO access to the bibliographic data and search
`results from the instant patent application when a European patent application claiming priority to the instant patent
`application is filed. See 37 CFR 1.14(h){2).
`
`The applicant is reminded that the EPO's Rule 141(1) EPC (European Patent Convention) requires applicants to submit a
`copy of search results from the instant application without delay in a European patent application that claims priority to
`the instant application.
`
`A. Applicant DOES NOT authorize the USPTO to permit a participating foreign IP office access to the instant
`I] application»as-filed.
`If this box is checked, the USPTO will not be providing a participating foreign IP office with
`any documents and information identified in subsection 1A above.
`
` 2. Opt-Out of Authorizations to Permit Access by a Foreign intellectual Property Offlcels)
`
`B. Applicant DOES NOT authorize the USPTO to transmit to the EPO any search results from the instant patent
`[3 application. If this box is checked, the USPTO will not be providing the EPO with search results from the instant
`application.
`
`NOTE: Once the application has published or is otherwise publicly available. the USPTO may provide access to the
`application in accordance with 37 CFR 1.14.
`
`Page 6 of 591
`:cc lfl‘nh r) r: en
`
`MIOOZ
`
` '..f”-u.3-'.'.'e”:i_l.\11":'W"-'W-_.-'_------,-r__-----!._j'r_‘-l1~__v;o
`
`
`
`it
`.3
`
`E
`
`IA1002
`
`Page 6 of 591
`
`
`
`:.'~..-..‘-maJamal-nouns-
`
`arr-meow
`
`
`
`
`
`-.v.rue.-_-_r.a4.14.131.
`
`:.-.
`—.r.
`
`w.wmr--.-.'.-.In..-”a
`
`
`.-«nir-12.".II'W
`
`9,-3.1
`
`ewar{_n;—1;r_§t"./,,_wa-
`
`. -
`
`i
`
`r.t
`
`3s S:
`
`‘t..
`
`
`
`'c-.r-.-.yu~.-.L-u:'-'-r:.-.A.«a..—-:-\.r::-;v-
`
`13‘r,
`
`
`
`
`
`.-.'rrx-rwu-r-r-.-.-.::..
`
`
`
`r rurnlm I't ii I‘M.”
`Approved for use through D4l30i201?. OMB 0651—0032
`US. Patent and Trademark Office; U.5. DEPARTMENT OF COMMERCE
`
`Under the Pape nvork Reduction Act of 1995. no persons are required to respond to a collection of information unless it contains a valid OMB control number.
`
`Application Data Sheet 37 CFR 1.76
`
`Attorney Docket Number
`g
`.
`
`47533.5U302
`
`Application Number Title Of invention
`
`CRYPTOGRAF’HIC SECURITY FUNCTIONS BASED ON ANTICIPATED CHANGES IN DYNAMIC MINUTIAE
`
`Applicant Information:
`
`Providing assignment information in this section does not substitute for compliance with any requirement of part 3 of Title 37 of CFR
`to have an assignment recorded by the Office.
`
`Applicant
`
`1
`
`
`
`
`
`
`
`If the applicant is the inventor (or the remainingjoinl inventor or inventors under 37 CFR 1.45). this section should not be completed.
`The information to be provided in this section is the name and address of the legal representative who is the applicant under 37 CFR
`1.43; or the name and address of the assignee. person to whom the inventor is under an obligation to assign the invention. or person
`who otherwise shows sufficient proprietary interest in the matter who is the applicant under 37 CFR 1.46. if the applicant is an
`applicant under 3? CFR 1.46 (assignee, person to whom the inventor is obligated to assign, or person who othenivise shows sufficient
`proprietary interest) together with one or more joint inventors, then thejoint inventor or inventors who are also the applicant should be
`identified in this section.
`
`
`
`
`
`
`
` 0 Joint Inventor
`
`@ Assignee
`
`0 Person to whom the inventor is obligated to assign.
`
`0 Legal Representative und
`
`er 35
`
`U.S.C.117
`
`
`
`0 Person who shows sufficient proprietary interest
`
`
`
`
`
`If applicant is the legal representative1 indicate the authority to file the patent application, the inventor is:
` .t
`
`Name of the Deceased or Legally lncapacitated Inventor:|:::
`
`If the Applicant is an Organization check here.
`
`E
`
`Mailing Address lnforrnatidn For Applicant:
`
`10 Wandering Rill
`
`Irvine
`
`Address 1
`
`Address 2
`
`City
`
`Countryl
`
`US
`
`Phone Number
`
`Email Address
`
`State!Province
`
`CA
`
`Postal Code
`
`92603
`
`Fax Number
`
`Additional Applicant Date may be generated within this form by selecting the Add button.
`
`
`
`Assignee Information including Non-Applicant Assignee Information:
`
`Providing assignment information in this section does not substitute for compliance with any requirement of part 3 of Title
`
`37 of CFR to have an assignment recorded by the Office.
`
`EEC Ink-uh fl
`
`Page 7 of 591
`’1 1’I
`
`'
`
`IAlooz
`
`IA1002
`
`Page 7 of 591
`
`
`
`
`
`
`rluinlWI‘i‘Ii-Iu;
`Approved for use through o4iaor2o1'r. OMB 0551-0032
`US. Patent and Trademark Office; US. DEPARTMENT OF COMMERCE
`Under the Paperwork Reduction Act of 1995r no persons are required to respond to a collection of information untess it contains a valid OMB control number.
` Attorney Docket Number
`
`47533.5USO2
`
`
`Application Number
`
`.
`_
`Application Data Sheet 37 CFR 1.76
`
`Title of Invention
`
`
`
`CRYPTOGRAF’HIC SECURITY FUNCTIONS BASED ON ANTICIPATED CHANGES IN DYNAMIC MINUTIAE
`
`Assignee
`
`1
`
`Complete this section if assignee information. including non-applicant assignee information, is desired to be included on the patent
`application publication. An assignee-appiicant identified in the "Applicant Information" section will appear on the patent application
`publication as an applicant. For an assignee-applicant, complete this section only if identification as an assignee is also desired on the
`patent application publication.
`
`If the Assignee or Non-Applicant Assignee is an Organization check here.
`Prefix m Middle Name
`
`Family Name
`
`[I
`Suffix
`
`
`
`
`
`Mailing Address information For Assignee including Non-Applicant Assignee:
`
`Address 1
`
`Address 2
`
`Phone Number
`
`Email Address
`
`Fax Number
`
`
`
`
`
`Additional Assignee or Non—Applicant Assignee Data may be generated within this form by
`selecting the Add button.
`
`
`
`
`
`
`
`
`
`
`
`
`
`Signature:
`
`
`
`NOTE: This Application Data Sheet must be signed in accordance with 37 CFR 1.33m). However. if this Application
`Data Sheet is submitted with the INITIAL filing of the application a_nd either box A or B is n_ot checked in
`
`subsection 2 of the “Authorization or Opt-Out of Authorization to Permit Access” section, then this form must
`
`also be signed in accordance with 37 CFR 1.14(c).
`This Application Data Sheet must be signed by a patent practitioner if one or more of the applicants is a juristic
`entity (e.g., corporation or association). If the applicant is two or more joint inventors this form must be signed by a
`patent practitioner, alljoint inventors who are the applicant, or one or more joint inventor-applicants who have been given
`power of attorney {e.g., see USPTO Form PTOJAIAJ81) on behalf ofafljolnt inventor-applicants.
`See 37 CFR 1.4(d) for the manner of making signatures and certifications.
`
`
`
`
`
`
`
`Date (YYYY-MM-DD)
`2015-03—13
`
`
`
`
`
`Additional Signature may be generated within this form by selecting the Add button
`
`Page 8 of 591
`CED Ulla-LII» '1 ’1 1"}
`
`MIOOZ
`
`
`
`
`.5,mus-jw-«we-.51arm
`.-.:.w—Mrt.nnmu.-.
`
`«1.1m:.-n\
`
`.-4.1-arm-rowan“:
`
`
`..,.-o-ne.n:-r.m..-.
`
`
`
`
`
`..-4."a-_'-A-.\_.r-A_vr.r..rx_:.,'.era-(cu:r.awn-tnutt.-.-q
`
`rune-cur:wasnu:-m-.‘.--..v-J
`
`
`
`-\W'.'ncan-.-an-.v.-u.u-=»:nw-a-ctr-c;
`
`..-t-.\-u..r~..w.-.-.-t-:-.-.we
`'r"-a,..;._-..-Ay-..~...
`
`IA1002
`
`Page 8 of 591
`
`
`
`Efr
`
`i.
`
`Ei
`
`,ti :
`
`s
`
`
`
`
`
`l' lUl'hlrln‘ |"\| I‘luj
`Approved for use through 04i3w201?. OMB 0551-0032
`U.S. Patent and Trademark Office; U.S. DEPARTMENT OF COMMERCE
`Under the Papenivork Reduction Act of 1995‘ no persons are required to respond to a collection of information unless it contains a valid OMB control number.
`
`Application Data Sheet 37 CFR 1.76
`
`.
`
`‘
`
`
`
`
`
`
`
`Title of Invention
`
`CRYPTOGRAPHIC SECURITY FUNCTIONS BASED ON ANTICIPATED CHANGES IN DYNAMIC MlNUTIAE
`
`This collection ofinformation is required by 37 CFR 1.76. The information is required to obtain or retain a benefit by the public which
`is to file (and by the USPTD to process) an application. Confidentiality is governed by 35 U.S.C. 122 and 37 CFR 1.14. This
`oollection is estimated to take 23 minutes to complete, including gathering, preparing, and submitting the completed application data
`sheet form to the USPTO. Time will vary depending upon the individual case. Any comments on the amount of time you require to
`complete this form andror suggestions for reducing this burden, should be sent to the Chief Information Officer, U.S. Patent and
`Trademark Office, U.S. Department of Commerce, P.0. Box 1450, Alexandria. VA 22313-1450. DO NOT SEND FEES 0R
`COMPLETED FORMS TO THIS ADDRESS. SEND TO: Commissioner for Patents, P.0. Box 1450, Alexandria, VA 22313-1450.
`
`5'
`'-
`
`;.
`
`Page 9 of 591
`Ell: lllfnlw ") "j 5')
`
`IA1002
`
`IA1002
`
`Page 9 of 591
`
`
`
`Attorney Docket No. 47583.5US02
`
`CRYPTOGRAPHIC SECURITY FUNCTIONS BASED ON ANTICIPATED CHANGES
`
`IN DYNAMIC MINUTIAE
`
`Paul Timothy Miller, George Allen Tuvell
`
`CROSS REFERENCE TO RELATED APPLICATIONS
`
`This application is a continuation of co-pending US. Patent Application No.
`
`14/458,123 filed August 12, 2014, which is a continuation of and claims benefit of priority to
`
`US. Patent Application No. 13f366,197 filed February 3, 2012, now US. Patent No.
`
`10
`
`8,817,984, issued August 26, 2014, which claims the benefit of U.S. Provisional Patent
`
`Application No. 61/462,424 filed February 3, 2011, all of which are incorporated by
`
`reference.
`
`15
`
`Technical Field
`
`_
`
`BACKGROUND
`
`The present disclosure generally relates to dynamic key cryptography used, for
`
`example, for authentication between a client electronic device and a service provider,
`
`encryption of data communications, and digital signatures and, more particularly, to
`
`cryptography using dynamic keys derived from dynamically changing key material.
`
`20
`
`Related Art
`
`Use of computers for connecting to a network (such as the Internet) and
`
`connnunicating with a variety of services risks the privacy of many types of information
`
`belonging to a user including, for example, the user’s relationships (e.g., social connections),
`
`25
`
`business secrets, banking details, payment options, and health records. The use of
`
`cryptography is common to authenticate identities, protect data, and digitally sign the
`
`summary (i.e. digest) of an action.
`
`Cryptography generally uses an algorithm (e.g., Advanced Encryption Standard
`
`(AES), Rivest Shamir Adelman (RSAD to combine cryptographic keys (which may be
`symmetric, public, or private, for example) with plain text to form cipher text. Cryptography
`
`3O
`
`keys are typically random numbers without any special meaning. The process of distributing
`
`Page 10 of 591
`
`M1002
`
`
`
`unwmm-«Wh-mw-p-.-.r-
`
`.-.--+..a--5/~:-.v:.
`
`w-\--,
`
`-'a»w-H-u:-v.w;:-s-mw:mv7.nm;..-.I..--.-.-..-'._...:-.(_.'\
`
`
`
`JIJAYWWa:2WL'-:I3‘emir.m..d.-.e._,au...-;._-a.-...
`
`
`
`W'J'TH.‘rm:w-:-.rm.eq=un-mu:nux:.-\.a-:._...
`
`marten
`
`_.'ts=.:x‘-s‘-'inr_-‘rrn-u-v-u.-.
`
`
`"'-.-man:45.-.-._..w...:-‘_\_-_jr-;;\-
`
`IA1002
`
`Page 10 of 591
`
`
`
`Attorney Docket No. 47583 .5US02
`
`cryptographic keys and storing them on a client computer (referred to as “key management”)
`
`is difficult to perform securely and is often the point-of—attack for breaking the security of a
`
`cryptographic system. The key represents a single sequence of data and thus a single point-
`
`of-failure for the cryptographic system. Since the key normally must be present at the client
`
`computer, finding the key and then copying it to another computer can allow an imposter
`
`entity to masquerade as a valid entity.
`
`Secure elements (e.g., smartcards) can securely store the cryptographic key and, in
`
`some instances, generate the key in a secure environment. Access to the key was typically
`
`controlled by requiring the user to enter a personal identification number (PIN); this ensured
`
`10
`
`that the user had to provide a secret before the secure element would allow use of the key.
`
`Such access to a key is commonly known as two-factor authentication, and the two factors
`
`are generally referred to as: “Something You Know” and “Something You Have”. A third
`
`factor, “Something You Are”, can include, for example, biometric information. The factors
`
`themselves are related in use but entirely separate in material. Possession of the physical
`
`15
`
`secure element (“Something You Have”) may be via validation of cryptographic functions
`
`using the random number cryptographic key provisioned to a particular secure element
`
`Whose use may be protected by a secret PIN (“Something You Know”). There is no implicit
`
`binding between the key and the user.
`
`The use of certificates in cryptography enabled the binding of a distinguished name
`
`20
`
`(e.g., a unique user) with a cryptographic key. Yet, still the cryptographic key is a random
`
`number, and when the key is validated, the cryptographic system attributes the user in the
`
`certificate to the usage of the key; the key matter itself has no relation to the user.
`
`On the Internet, ensuring a real-world identity for the user is critical for protecting
`
`data and privacy. Mobile users especially are at risk because they often do not use anti—virus
`
`25
`
`applications and many of the service providers use applications (apps) optimized for
`
`simplicity, not security. This leaves much of the private data meaningful to both a user's
`
`identity and a service's value inadequately protected. Since online service providers (OSP)
`
`incur much of the risk, safety has become their responsibility.
`
`The standard method for identifying a user to an online service is by entering a
`
`30
`
`usemame and password. The usemame is a known service index and, as such, can be stored
`
`on the computer for convenience. The password is a user secret verifiable by the OSP; it
`
`Page 11 of 591
`
`2
`
`M1002
`
`
`
`
`
`
`
` a
`
`
`vnew»w»owgww“4‘x»,5.:My.“war.2
`
`Ei
`.5.,.
`
`IA1002
`
`Page 11 of 591
`
`
`
`Attorney Docket No. 475 83.5USOZ
`
`should not be stored at the computer, where it can be compromised. However, because a
`
`quality password has many characters which should be a mix of upper, lower, punctuation
`
`and special characters, the password is often difficult and time—consuming to type. This is
`
`especially true on a mobile computer using touch keypads that have various ‘levels’ of
`
`keypads for characters beyond simple alpha-numeric. Thus, many mobile apps store the
`
`password on the computer. Because mobile operating systems require mobile apps to be
`
`signed in order to run, the apps themselves cannot be altered after installation. So, any data
`
`stored by the mobile app is separate from the mobile app and often can be vulnerable to
`
`attack. Furthermore, because the app cannot change, if encryption was used to protect the
`
`10
`
`cached password, there could only be one encryption key for all instances of the application.
`
`This commonality made harvesting and cracking stored passwords on a mobile computer
`
`relatively simple, even if the passwords were encrypted, since they all used the same key for
`
`decryption.
`
`Computer and computer identification has been attempted by calculating a hash of the
`
`15
`
`minutia found on a computer to uniquely identify the computer, often referred to as a
`
`computer fingerprint. Computer fingerprints typically are used, among other things, to ‘lock’
`
`software to a particular computer fingerprint and identify computers used in online actions to
`
`profile the history and potential risk of particular actions. A typical computer identifier is
`
`computed and remains static; to ensure reliability the computer fingerprint typically uses
`computer minutiae (e.g., serial numbers) that normally do not change. Thus, current
`
`20
`
`computer fingerprints typically use a relatively small set of static minutia which may be
`
`prone to spoofing. Some approaches to improving computer