throbber
THIRUTTUULLITTUR
`
`US009794070B2
`
`( 12 ) United States Patent
`Lester et al .
`
`( 10 ) Patent No . :
`( 45 ) Date of Patent :
`
`US 9 , 794 , 070 B2
`Oct . 17 , 2017
`
`( 54 ) METHOD OF EPHEMERAL ENCRYPTED
`COMMUNICATIONS
`( 71 ) Applicant : Cyph , Inc . , Dover , DE ( US )
`( 72 )
`Inventors : Ryan Lester , Dover , DE ( US ) ; Marcus
`Carey , Dover , DE ( US )
`( 73 ) Assignee : Cyph , Inc . , Dover , DE ( US )
`Subject to any disclaimer , the term of this
`( * ) Notice :
`patent is extended or adjusted under 35
`U . S . C . 154 ( b ) by 0 days .
`( 21 ) Appl . No . : 14 / 841 , 302
`Aug . 31 , 2015
`( 22 )
`Filed :
`Prior Publication Data
`( 65 )
`US 2016 / 0197706 A1
`Jul . 7 , 2016
`Related U . S . Application Data
`( 60 ) Provisional application No . 62 / 100 , 689 , filed on Jan .
`7 , 2015 .
`( 51 ) Int . Ci .
`G06F 15 / 173
`H04L 9 / 32
`
`( 52 )
`
`( 2006 . 01 )
`( 2006 . 01 )
`( Continued )
`U . S . CI .
`CPC . . . . . . . . . . . . . . H04L 9 / 3247 ( 2013 . 01 ) ; G06F 8 / 60
`( 2013 . 01 ) ; G06F 21 / 45 ( 2013 . 01 ) ; G06F
`21 / 606 ( 2013 . 01 ) ;
`
`( Continued )
`( 58 ) Field of Classification Search
`CPC . . . . . . . GO6F 21 / 45 ; H04L 51 / 16 ; H04L 5 / 0037 ;
`H04L 63 / 0435 ; H04L 63 / 065
`( Continued )
`
`20 ore
`
`A first user on Device 1 requests
`opening an ephemeral
`communication session on a
`Server with a second usor on
`Device 2
`ro00000000000000000000oppooooo0000000000000000000
`
`00000000000000000000000 - 00000000000000000000000
`??????? acca?? ?cessary
`??? tg
`?
`a { ?????
`SECUNO communication session
`and generates a unique
`h
`ea }
`cation ,
`es???? ?????for for th? ?????? ???
`BROOOOOOOOOOOOO 000000OqpoooooooOOOOOOOOO
`
`COMMAN
`First user communicates the
`unique epssemeral co55555usticatisss
`session identifier to the second
`???? { F?g ?? ??? )
`com???????ation channel ,
`GOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOO
`
`( 56 )
`
`References Cited
`U . S . PATENT DOCUMENTS
`6 , 170 , 017 B1 *
`1 / 2001 Dias . . . . . . . . . . . . . . . . . . . . . . . H04L 29 / 06
`709 / 226
`7 , 366 , 110 B2 *
`4 / 2008 Gillespie . . . . . . . . . . . H04L 29 / 06027
`370 / 254
`( Continued )
`Primary Examiner — Tonia L Dollinger
`Assistant Examiner — Davoud Zand
`( 74 ) Attorney , Agent , or Firm — Brundidge & Stanger ,
`P . C .
`ABSTRACT
`( 57 )
`Embodiments herein provide , for example , a method that
`includes , comprising : sending a request , by a first user on a
`first device , to a server , the request comprising requesting
`the server open an ephemeral communication session with a
`second user on a second device ; allocating resources , by the
`server , to begin the ephemeral communication session
`between the first user and the second user ; generating a
`unique ephemeral communication session identifier by the
`server and transmitting the unique ephemeral communica
`tion session identifier to the first user ; transmitting , by the
`first user , the unique ephemeral communication session
`identifier to the second user using a second communication
`channel ; connecting , by the second user , to the first user
`through the ephemeral communication session using the
`unique ephemeral communication session identifier ; and
`connecting , by the first user , to the second user through the
`ephemeral communication session using the unique ephem
`eral communication session identifier . In such a method ,
`connecting , by the second user , to the first user through the
`ephemeral communication session may include connecting
`to the server ; and connecting , by the first user , to the second
`user through the ephemeral communication session may
`include connecting to the server .
`2 Claims , 5 Drawing Sheets
`
`40
`
`www
`????? Jet ?? ? ?????????
`( or first user ) using the unique
`| ?????????? c
`_ cat
`session identifier supplied by the
`first user
`
`00000000000000000000000 000000000000000000000000
`Communication through the
`ephenal commu???cation
`che { b?g at ga??? ????
`p
`acts ta each other af Server
`using the unique ephemeral
`Mommunication session identifier
`
`Zoom Video Commc’ns, Inc. - Ex. 1001, Page 1
`Zoom Video Commc’ns, Inc. v. Cyph, Inc. (IPR2023-00142)
`
`

`

`US 9 , 794 , 070 B2
`Page 2
`
`( 51 )
`
`Int . Ci .
`H04L 29 / 06
`H04L 5 / 00
`H04L 29 / 08
`H04L 9 / 08
`H04L 12 / 58
`G06F 21 / 45
`G06F 21 / 60
`G06F 9 / 445
`H04W 12 / 10
`( 52 ) U . S . CI .
`???
`
`( 2006 . 01 )
`( 2006 . 01 )
`( 2006 . 01 )
`( 2006 . 01 )
`( 2006 . 01 )
`( 2013 . 01 )
`( 2013 . 01 )
`( 2006 . 01 )
`( 2009 . 01 )
`
`H04L 5 / 0037 ( 2013 . 01 ) ; H04L 9 / 08
`( 2013 . 01 ) ; H04L 9 / 0861 ( 2013 . 01 ) ; H04L
`9 / 321 ( 2013 . 01 ) ; H04L 9 / 3215 ( 2013 . 01 ) ;
`H04L 9 / 3228 ( 2013 . 01 ) ; H04L 51 / 16
`( 2013 . 01 ) ; H04L 63 / 0281 ( 2013 . 01 ) ; H04L
`63 / 0435 ( 2013 . 01 ) ; H04L 63 / 0442 ( 2013 . 01 ) ;
`H04L 63 / 061 ( 2013 . 01 ) ; H04L 63 / 065
`( 2013 . 01 ) ; H04L 63 / 08 ( 2013 . 01 ) ; H04L
`63 / 0838 ( 2013 . 01 ) ; H04L 63 / 123 ( 2013 . 01 ) ;
`H04L 63 / 18 ( 2013 . 01 ) ; H04L 67 / 02 ( 2013 . 01 ) ;
`H04L 67 / 10 ( 2013 . 01 ) ; H04L 67 / 141
`( 2013 . 01 ) ; H04L 67 / 146 ( 2013 . 01 ) ; H04W
`12 / 10 ( 2013 . 01 ) ; H04L 67 / 42 ( 2013 . 01 )
`Field of Classification Search
`USPC . . . . . . . . 709 / 204 , 205 , 223 , 226 , 227 , 228 , 229
`See application file for complete search history .
`
`( 58 )
`
`( 56 )
`
`References Cited
`U . S . PATENT DOCUMENTS
`7 , 987 , 363 B2 *
`7 / 2011 Chauncey . . . . . . . . . . . H04L 63 / 0428
`380 / 270
`2002 / 0191797 A1 * 12 / 2002 Perlman . . . . . . . . .
`H04L 9 / 088
`380 / 281
`2003 / 0217171 A1 * 11 / 2003 Von Stuermer . . . . . . G11B 27 / 036
`709 / 231
`2006 / 0123082 A1 *
`6 / 2006 Digate . . . . . . . . . . . . . . . . . GO6Q 10 / 107
`709 / 205
`2007 / 0016401 A1 *
`1 / 2007 Ehsani . . . . . . . . . . . . . . . .
`5 / 005
`704 / 9
`2010 / 0031036 A1 *
`2 / 2010 Chauncey . . . . . . . . . . . HO4L 63 / 0428
`713 / 168
`2013 / 0254408 A1 *
`9 / 2013 Sreenivasan . . . . . . . . . . . GO6Q 50 / 01
`709 / 227
`2014 / 0115170 A1 *
`4 / 2014 Yang . . . . . . . . . . . . . . . . . . . . . . . H04W 4 / 00
`709 / 227
`2014 / 0164768 A1 *
`6 / 2014 Kruglick . . . . . . . . . . . . . . H04L 63 / 062
`713 / 168
`2014 / 0222916 A1 *
`8 / 2014 Foley . . . . . . . . . . . . . . . . . . . G06Q 10 / 101
`709 / 204
`2015 / 0074407 Al *
`3 / 2015 Palmeri . . . . . . . . . . . . . . . H04L 63 / 0807
`713 / 171
`2015 / 0188899 Al *
`7 / 2015 Bakar . . . . . . . . . . . . . . . . . . H04L 67 / 125
`726 / 9
`2015 / 0281372 A1 * 10 / 2015 Wilson . . . . . . . . . . . . . . . . . . H04L 67 / 141
`709 / 227
`2016 / 0182497 A1 *
`6 / 2016 Smith . . . . . . . . . . . . . . . . H04L 63 / 0853
`713 / 156
`2017 / 0019437 A1 *
`1 / 2017 Phadnis . . . . . . . . . . . . . H04L 65 / 1083
`* cited by examiner
`
`Zoom Video Commc’ns, Inc. - Ex. 1001, Page 2
`Zoom Video Commc’ns, Inc. v. Cyph, Inc. (IPR2023-00142)
`
`

`

`U . S . Patent
`
`Oct . 17 , 2017
`
`Sheet 1 of 5
`
`US 9 , 794 , 070 B2
`
`A first us on 1dvice . { requss
`opening an ephemeral
`communication session on a
`Server with a second user on
`
`Device 2 F 0000000000
`
`Server allocates necessary
`resources to begin a unique
`secure communication session
`and generates a unique
`ephemeral communication
`??????io identifier for t????
`?? { us? ,
`00000000000000000000000000oooooo000000000000000000000
`
`00000000
`
`30 cm
`
`$ connicates the
`Firs
`{ ????? ?phera { cofia
`sessn identifier to th? second
`ser usi??? ? ???????
`communication channel .
`
`40 cm
`
`gooooo00000000000
`
`c
`
`00000000000000000000000000000000000000000000
`
`Second user connects to Server
`for first user ) using the unique
`ephemeral communication
`session identifier supplied by the
`stuer .
`
`3
`
`Communication through the
`phera { caicat
`channel begins after sach user
`connects to each other or Server
`usg t??? u?ue heara {
`icatin sess?? ?antar ,
`
`B
`
`o
`
`goroooo9999999999999pod .
`
`FIG . 1
`
`100 x hos
`Blues / lespak com
`
`. com
`
`cyph
`
`Start private chat
`
`FIG . 2
`
`Zoom Video Commc’ns, Inc. - Ex. 1001, Page 3
`Zoom Video Commc’ns, Inc. v. Cyph, Inc. (IPR2023-00142)
`
`

`

`atent
`
`Oct . 17 , 2017
`
`Sheet 2 of 5
`
`US 9 , 794 , 070 B2
`
`O
`
`OD X
`
`( htps : / / eyph m / lqCP
`la 01
`Welline
`de
`?? , ?? ??
`Copy
`cyph 1o / ben milac
`
`FIG . 3
`
`3 : 37 AM
`
`1 . Verizon 30
`Messages
`
`tryin to
`hey baby im
`cheat on my wife tonite .
`u down ?
`
`uh . . . dude , just oyph
`http : / / cyph . im / lqCPuj .
`
`FIG . 4
`
`Zoom Video Commc’ns, Inc. - Ex. 1001, Page 4
`Zoom Video Commc’ns, Inc. v. Cyph, Inc. (IPR2023-00142)
`
`

`

`atent
`
`Oct . 17 , 2017
`
`Sheet 3 of 5
`
`US 9 , 794 , 070 B2
`
`O? X
`
`( https : / / cyphimpiaciut
`
`cyph
`
`Connected
`
`2
`
`FIG . 5
`
`OD X
`
`Etter dicyph mlaCpu
`
`to con los
`
`O
`
`neno ok
`????
`
`FIG . 6
`
`Zoom Video Commc’ns, Inc. - Ex. 1001, Page 5
`Zoom Video Commc’ns, Inc. v. Cyph, Inc. (IPR2023-00142)
`
`

`

`atent
`
`Oct . 17 , 2017
`
`Sheet 4 of 5
`
`US 9 , 794 , 070 B2
`
`Resource
`P??? C
`
`FIG . 7
`
`1000000000000000000000
`
`Resource
`Provider B
`5025
`ooooooooooooooooo
`
`Network
`508
`
`500
`
`goodGGCODD0000
`
`Resource
`Provider A
`502a
`
`Moon
`
`* * *
`
`WRRR
`
`?qc
`Manager
`506
`
`doonoooooo
`Www
`
`oooooo
`
`powWAHAKIKA WA
`Computing
`Device ( s )
`504a
`BONOMOOOONO
`to decoracion
`
`504
`
`2
`
`000 . 000 . 00
`
`Zoom Video Commc’ns, Inc. - Ex. 1001, Page 6
`Zoom Video Commc’ns, Inc. v. Cyph, Inc. (IPR2023-00142)
`
`

`

`U . S . Patent
`
`Oct . 17 , 2017
`
`Sheet 5 of 5
`
`US 9 , 794 , 070 B2
`
`#
`
`, #
`
`-
`
`- - - - .
`
`.
`
`-
`
`-
`
`P _ 8
`
`P??????
`12
`
`_ RA
`14
`
`R
`
`??
`
`VO ADAPTER
`???
`
`NETWORK
`25
`
`COMMUNICATIONS
`ADAPTER
`? }
`
`*
`
`*
`
`*
`
`*
`
`= = = ?? ? * *
`
`?
`
`say
`
`60o ?
`
`?ER
`
`-
`
`-
`
`-
`
`see
`
`SPLAY
`ADAPTER
`621
`
`-
`
`.
`
`4
`
`Zoom Video Commc’ns, Inc. - Ex. 1001, Page 7
`Zoom Video Commc’ns, Inc. v. Cyph, Inc. (IPR2023-00142)
`
`

`

`US 9 , 794 , 070 B2
`
`5
`
`METHOD OF EPHEMERAL ENCRYPTED
`communication may include , for example , whistleblowing ,
`providing credential information , payment information , or
`COMMUNICATIONS
`personal account management information . To protect sen
`CROSS - REFERENCE TO RELATED
`sitive information , the information can be transmitted over
`APPLICATIONS
`a secure transmission connection provided by an encryption
`system .
`This application claims priority to U . S . Provisional Appli
`Conventional encryption systems are often difficult to use
`cation No . 62 / 100 , 689 , entitled “ METHOD OF EPHEM and thereby introduce weaknesses in the overall systems .
`ERAL ENCRYPTED COMMUNICATIONS ” and filed Jan .
`For example , asymmetric encryption relies on complex
`7 , 2015 .
`10 mathematics applied to private and public information ( e . g . ,
`private and public keys ) and is inherently inefficient . Sym
`The subject matter of the present application is related to
`that disclosed in the following co - pending applications :
`metric encryption is significantly more efficient , but relies on
`Ser . No . 14 / 841 , 327 , entitled “ CROSS - CLIENT COM
`secret information ( e . g . , a password , passphrase , or private
`MUNICATION METHOD " and filed Aug . 31 , 2015 and
`U . S . Provisional Application No . 15 15 key ) that must remain private between all persons or devices
`claiming priority to
`with authorized access to the encrypted data .
`62 / 100 , 674 , filed on Jan . 7 , 2015 ;
`The difficulties of conventional encryption systems
`Ser . No . 14 / 841 , 318 , entitled
`“ CRYPTOGRAPHIC
`increase when the secret information is publicly known . For
`METHOD FOR SECURE COMMUNICATIONS ” and filed
`example , when the secret information is publicly known , the
`Aug . 31 , 2015 and claiming priority to U . S . Provisional
`Application No . 62 / 100 , 676 , filed on Jan . 7 , 2015 ;
`20 entire encryption system becomes compromised and must be
`Ser . No . 14 / 841 , 313 , entitled “ METHOD OF DENIABLE
`revised ( e . g . , resetting passwords , passphrases , private keys ,
`ENCRYPTED COMMUNICATIONS ” and filed Aug . 31 ,
`etc . ) . Since various methods to obtain this secret information
`2015 and claiming priority to U . S . Provisional Application
`are well known and frequently used — techniques such as
`such as man - in - the - middle attacks , social engineering ,
`No . 62 / 100 , 682 , filed on Jan . 7 , 2015 ;
`Ser . No . 14 / 841 , 281 , entitled “ ENCRYPTED GROUP 25 etc .
`it is therefore desirable to reduce exposure to an
`COMMUNICATION METHOD ” and filed Aug . 31 , 2015
`encryption system ' s private information and provide an
`and claiming priority to U . S . Provisional Application No .
`ephemeral communication channel , thereby reducing the
`potential attack surface and potential exposure of partici
`62 / 100 , 684 , filed on Jan . 7 , 2015 ;
`Ser . No . 14 / 841 , 310 , entitled “ METHOD OF GENER -
`pants employing such an encryption system .
`ATING A DENIABLE ENCRYPTED COMMUNICA - 30
`TIONS VIA PASSWORD ENTRY ” and filed Aug . 31 , 2015
`SUMMARY
`and claiming priority to U . S . Provisional Application No .
`In view of the foregoing , an embodiment herein provides
`62 / 100 , 686 , filed on Jan . 7 , 2015 ;
`Ser . No . 14 / 841 , 288 , entitled “ MULTI - KEY ENCRYP -
`a method , comprising : sending a request , by a first user on
`TION METHOD ” and filed Aug . 31 , 2015 and claiming 35 a first device , to a server , the request comprising requesting
`priority to U . S . Provisional Application No . 62 / 100 , 688 ,
`the server open an ephemeral communication session with a
`filed on Jan . 7 , 2015 ;
`second user on a second device ; allocating resources , by the
`Ser . No . 14 / 841 , 292 , entitled “ METHOD OF MULTI
`server , to begin the ephemeral communication session
`FACTOR AUTHENTICATION DURING ENCRYPTED
`between the first user and the second user ; generating a
`COMMUNICATIONS " and filed Aug . 31 , 2015 and claim - 40 unique ephemeral communication session identifier by the
`ing priority to U . S . Provisional
`server and transmitting the unique ephemeral communica
`Ser . No . 14 / 841 , 296 , entitled “ METHOD OF USING
`tion session identifier to the first user ; transmitting , by the
`SYMMETRIC CRYPTOGRAPHY FOR BOTH DATA
`first user , the unique ephemeral communication session
`ENCRYPTION AND SIGN - ON AUTHENTICATION ” and
`identifier to the second user using a second communication
`filed Aug . 31 , 2015 and claiming priority to U . S . Provisional 45 channel ; connecting , by the second user , to the first user
`Application No . 62 / 100 , 693 , filed on Jan . 7 , 2015 . and
`through the ephemeral communication session using the
`Ser . No . 15 / 001 , 015 , entitled “ SYSTEM AND METHOD
`unique ephemeral communication session identifier ; and
`OF CRYPTOGRAPHICALLY SIGNING WEB APPLICA -
`connecting , by the first user , to the second user through the
`TIONS ” and filed Aug . 31 , 2015 and a continuation appli -
`ephemeral communication session using the unique ephem
`cation of international Application Ser . No , PCT / US15 / 50 eral communication session identifier . In such a method ,
`47788 filed on Aug . 31 , 2015 and claiming priority to U . S .
`connecting , by the second user , to the first user through the
`Provisional Application No . 62 / 104 , 307 , filed on Jan . 16 ,
`ephemeral communication session may include connecting
`to the server ; and connecting , by the first user , to the second
`2015 .
`The content of the above applications are incorporated by
`user through the ephemeral communication session may
`reference in their entirety .
`55 include connecting to the server .
`BACKGROUND
`BRIEF DESCRIPTION OF THE DRAWINGS
`Technical Field
`The embodiments herein will be better understood from
`The embodiments herein generally relate to cryptography , 60 the following detailed description with reference to the
`and , more particularly , to a method of ephemeral encrypted
`drawings , in which :
`FIG . 1 illustrates a flow diagram illustrating a method of
`communications .
`Description of the Related Art
`ephemeral encrypted communication according to an
`With communication occurring through a variety of com -
`embodiment herein ;
`munication channels , information such as personal data , 65
`FIG . 2 illustrates a schematic diagram of initiating an
`sensitive conversations and other sensitive information may
`ephemeral communication session according to an embodi
`be passed across a public network , such as the Internet . Such
`ment herein ;
`
`Zoom Video Commc’ns, Inc. - Ex. 1001, Page 8
`Zoom Video Commc’ns, Inc. v. Cyph, Inc. (IPR2023-00142)
`
`

`

`US 9 , 794 , 070 B2
`
`20
`
`As show in FIG . 3 , one embodiment of step 20 includes a
`FIG . 3 illustrates an schematic diagram of a unique
`unique resource locator ( or URL ) for the communication
`ephemeral communication session identifier according to an
`session . The method show in FIG . 1 , however , is not limited
`embodiment herein ;
`to the embodiment show in FIG . 3 and other unique ephem
`FIG . 4 illustrates a schematic diagram of communicating
`eral communication session identifiers are possible . Further
`the ephemeral communication session identifier to another 5
`more , while not show in FIG . 1 , step 20 may further include
`party using a secondary communication channel according
`generating a unique ephemeral communication session iden
`to an embodiment herein ;
`tifier using a hash function or a random number generator ( to
`FIG . 5 illustrates a schematic diagram of establishing an
`reduce the likelihood the identifier could be predicted ) . In
`ephemeral communication session according to an embodi -
`10 addition , according to one embodiment herein , the necessary
`ment herein ;
`resources to create a unique secure communication session
`FIG . 6 illustrates a schematic diagram of communicating
`include creating the necessary URL redirection resources ,
`through an ephemeral communication session according to
`such as transmitting HTTP status codes in a communication
`an embodiment herein ;
`header ( e . g . , 301 , 302 or 307 codes ) — to enable users to
`FIG . 7 illustrates a schematic diagram of a network
`architecture used in accordance with the embodiments 15 communicate the unique ephemeral communication session
`identifier ( as described below ) and begin the unique ephem
`herein ; and
`FIG . 8 illustrates a schematic diagram of a computer
`eral communication session . Moreover , such URL redirec
`architecture used in accordance with the embodiments
`tion resources may be temporary ( e . g . , using an HTTP
`307 — or temporary redirect status code ) .
`herein .
`In step 30 , the first user communicates the unique ephem
`DETAILED DESCRIPTION OF PREFERRED
`eral communication session identifier to the second user
`EMBODIMENTS
`using a second communication channel ( e . g . , an SMS mes
`sage , as shown in FIG . 4 ) . Furthermore , in step 40 , the
`The embodiments herein and the various features and
`second user connects to Server using the unique ephemeral
`advantageous details thereof are explained more fully with 25 communication session identifier supplied by the first user
`reference to the non - limiting embodiments that are illus -
`( e . g . , as shown in FIG . 5 ) . Finally , in step 50 , communica
`trated in the accompanying drawings and detailed in the
`tion through the ephemeral communication channel begins
`following description . Descriptions of well - known compo -
`after each user connects to Server using the unique ephem
`nents and processing techniques are omitted so as to not
`eral communication session identifier ( e . g . , as shown in FIG .
`unnecessarily obscure the embodiments herein . The 30 6 ) .
`examples used herein are intended merely to facilitate an
`FIG . 7 illustrates an implementation of an exemplary
`understanding of ways in which the embodiments herein
`networking environment ( e . g . , cloud computing environ
`may be practiced and to further enable those of skill in the
`ment 500 ) for the embodiments described herein is shown
`art to practice the embodiments herein . Accordingly , the
`and described . The cloud computing environment 500 may
`examples should not be construed as limiting the scope of 35 include one or more resource providers 502a , 502b , 5020
`( collectively , 502 ) . Each resource provider 502 may include
`the embodiments herein .
`The embodiments herein provide a method of one - time
`computing resources . In some implementations , computing
`ephemeral encrypted communication ( e . g . , initiating an
`resources may include any hardware and / or software used to
`ephemeral session while in a chat room ) . For example , a user
`process data . For example , computing resources may
`( e . g . , " Alice " ) of an encrypted communication system ( e . g . , 40 include hardware and / or software capable of executing
`the CyphTM secure messaging platform ) would like to
`algorithms , computer programs , and / or computer applica
`engage another user to the system ( e . g . , " Bob " ) in an
`tions . In some implementations , exemplary computing
`ephemeral encrypted
`communication .
`Conventional
`resources may include application servers and / or databases
`encrypted communication systems , however , keep various
`with storage and retrieval capabilities . Each resource pro
`records of communications between Alice and Bob ( range 45 vider 502 may be connected to any other resource provider
`from detailed records of the content being communication
`502 in the cloud computing environment 500 . In some
`( in the forms of various system logs ) or records describing
`implementations , the resource providers 502 may be con
`communication activity ( such as system identifier contacted ,
`nected over a computer network 508 . Each resource provider
`the time and duration of communication , etc . ) . According to
`502 may be connected to one or more computing device
`the embodiments herein , however , Alice can conduct 50 504a , 504b , 504c ( collectively , 504 ) , over the computer
`ephemeral communications over encrypted channels .
`network 508 .
`Referring now to the drawings , and more particularly to
`The cloud computing environment 500 may include a
`FIGS . 1 through 8 , where similar reference characters
`resource manager 506 . The resource manager 506 may be
`denote corresponding features consistently throughout the
`connected to the resource providers 502 and the computing
`figures , there are shown preferred embodiments .
`55 devices 504 over the computer network 508 . In some
`FIG . 1 illustrates a flow diagram illustrating a method 1
`implementations , the resource manager 506 may facilitate
`of ephemeral encrypted communication according to an
`the provision of computing resources by one or more
`embodiment herein . As shown in FIG . 1 , in step 10 , Device
`resource providers 502 to one or more computing devices
`1a ( e . g . , a computing device shown in FIGS . 7 and 8 )
`504 . The resource manager 506 may receive a request for a
`associated with a first user ( e . g . , Alice ) requests opening an 60 computing resource from a particular computing device 504 .
`ephemeral communication session ( e . g . , on the CyphTM
`The resource manager 506 may identify one or more
`secure messaging platform , as shown in FIG . 2 ) on a Server
`resource providers 502 capable of providing the computing
`( e . g . , a computing device shown in FIGS . 7 and 8 ) with a
`resource requested by the computing device 504 . The
`second user ( e . g . , Bob ) . In step 20 , Server allocates neces -
`resource manager 506 may select a resource provider 502 to
`sary resources to begin a unique secure communication 65 provide the computing resource . The resource manager 506
`session and generates a unique ephemeral communication
`may facilitate a connection between the resource provider
`session identifier for the first user ( e . g . , as shown in FIG . 3 ) .
`502 and a particular computing device 504 . In some imple
`
`Zoom Video Commc’ns, Inc. - Ex. 1001, Page 9
`Zoom Video Commc’ns, Inc. v. Cyph, Inc. (IPR2023-00142)
`
`

`

`US 9 , 794 , 070 B2
`
`10
`
`5
`A data processing system suitable for storing and / or
`mentations , the resource manager 506 may establish a
`executing program code will include at least one processor
`connection between a particular resource provider 502 and
`coupled directly or indirectly to memory elements through a
`a particular computing device 504 . In some implementa
`system bus . The memory elements can include local
`tions , the resource manager 506 may redirect a particular
`computing device 504 to a particular resource provider 502 5 memory employed during actual execution of the program
`code , bulk storage , and cache memories which provide
`with the requested computing resource .
`temporary storage of at least some program code in order to
`The techniques provided by the embodiments herein may
`reduce the number of times code must be retrieved from bulk
`be implemented on an integrated circuit chip ( not shown ) .
`storage during execution .
`The chip design is created in a graphical computer program
`ming language , and stored in a computer storage medium m
`Input / output ( I / O ) devices ( including but not limited to
`keyboards , displays , pointing devices , etc . ) can be coupled
`( such as a disk , tape , physical hard drive , or virtual hard
`to the system either directly or through intervening I / O
`drive such as in a storage access network ) . If the designer
`controllers . Network adapters may also be coupled to the
`does not fabricate chips or the photolithographic masks used
`system to enable the data processing system to become
`to fabricate chips , the designer transmits the resulting design
`ng design 15 coupled to other data processing systems or remote printers
`by physical means ( e . g . , by providing a copy of the storage
`or storage devices through intervening private or public
`medium storing the design ) or electronically ( e . g . , through
`networks . Modems , cable modem and Ethernet cards are just
`the Internet ) to such entities , directly or indirectly . The
`a few of the currently available types of network adapters .
`stored design is then converted into the appropriate format
`A representative hardware environment for practicing the
`( e . g . , GDSII ) for the fabrication of photolithographic masks , 20 embodiments herein is depicted in FIG . 8 . This schematic
`which typically include multiple copies of the chip design in
`drawing illustrates a hardware configuration of an informa
`question that are to be formed on a wafer . The photolitho
`tion handling / computer system 600 in accordance with the
`graphic masks are utilized to define areas of the wafer
`embodiments herein . The system comprises at least one
`( and / or the layers thereon ) to be etched or otherwise pro
`processor or central processing unit ( CPU ) 610 . The CPUs
`cessed .
`25 610 are interconnected via system bus 612 to various
`The resulting integrated circuit chips can be distributed by
`devices such as a random access memory ( RAM ) 614 ,
`the fabricator in raw wafer form ( that is , as a single wafer
`read - only memory ( ROM ) 616 , and an input / output ( 1 / 0 )
`that has multiple unpackaged chips ) , as a bare die , or in a
`adapter 618 . The I / O adapter 618 can connect to peripheral
`packaged form . In the latter case the chip is mounted in a
`devices , such as disk units 611 and tape drives 613 , or other
`single chip package ( such as a plastic carrier , with leads that 30 program storage devices that are readable by the system . The
`are affixed to a motherboard or other higher level carrier ) or
`system can read the inventive instructions on the program
`in
`a multichip package ( such as a ceramic carrier that has
`storage devices and follow these instructions to execute the
`either or both surface interconnections or buried intercon -
`methodology of the embodiments herein . The system further
`nections ) . In any case the chip is then integrated with other
`includes a user interface adapter 619 that connects a key
`chips , discrete circuit elements , and / or other signal process - 35 board 615 , mouse 617 , speaker 624 , microphone 622 , and / or
`ing devices as part of either ( a ) an intermediate product , such
`other user interface devices such as a touch screen device
`as a motherboard , or ( b ) an end product . The end product can
`not shown ) to the bus 612 to gather user input . Additionally ,
`be any product that includes integrated circuit chips , ranging
`a communication adapter 620 connects the bus 612 to a data
`from toys and other low - end applications to advanced com
`processing network 625 , and a display adapter 621 connects
`puter products having a display , a keyboard or other input 40 the bus 612 to a display device 623 which may be embodied
`device , and a central processor .
`as an output device such as a monitor , printer , or transmitter ,
`The embodiments herein can take the form of an entirely
`for example .
`hardware embodiment , an entirely software embodiment or
`For example , FIG . 8 includes exemplary embodiments of
`an embodiment including both hardware and software ele -
`a computing device and a mobile computing device that can
`ments . The embodiments that are implemented in software 45 be used to implement the techniques described in this
`include but are not limited to , firmware , resident software ,
`disclosure . As a computing device , system 600 is intended to
`represent various forms of digital computers , such as lap
`microcode , etc .
`Furthermore , the embodiments herein can take the form
`tops , desktops , workstations , personal digital assistants ,
`servers , blade servers , mainframes , and other appropriate
`of a computer program product accessible from a computer
`usable or computer - readable medium providing program 50 computers . As a mobile computing device , system 600 is
`code for use by or in connection with a computer or any
`intended to represent various forms of mobile devices , such
`instruction execution system . For the purposes of this
`as personal digital assistants , cellular telephones , smart
`description ,
`a computer - usable or computer readable
`phones , and other similar computing devices . The compo
`medium can be any apparatus that can comprise , store ,
`nents shown here , their connections and relationships , and
`communicate , propagate , or transport the program for use by 55 their functions , are meant to be examples only , and are not
`or in connection with the instruction execution system ,
`meant to be limiting .
`Thus , as a computing device , system 600 includes a
`apparatus , or device .
`The medium can be an electronic , magnetic , optical
`processor ( e . g . , CPUS 610 ) , a memory 614 , storage units
`electromagnetic , infrared , or semiconductor system ( or
`( e . g . , ROM 616 , disk units 611 , tape drives 613 ) , a high
`apparatus or device ) or a propagation medium . Examples of 60 speed interface 618 connecting to the memory 614 and
`a computer - readable medium include a semiconductor or
`multiple high - speed expansion ports 619 , and a low - speed
`solid state memory , magnetic tape , a removable computer
`interface ( not shown ) connecting to a low - speed expansion
`diskette , a random access memory ( RAM ) , a read - only
`port ( not shown ) and a storage device . Each of the proces
`memory ( ROM ) , a rigid magnetic disk and an optical disk .
`sors , the memory 614 , the storage device , the high - speed
`Current examples of optical disks include compact disk -
`65 interface 618 , the high - speed expansion ports 619 , and the
`read only memory ( CD - ROM ) , compact disk — read / write
`low - speed interface , are interconnected using various busses
`( e . g . , bus 612 ) , and may be mounted on a common moth
`( CD - R / W ) and DVD .
`
`Zoom Video Commc’ns, Inc. - Ex. 1001, Page 10
`Zoom Video Commc’ns, Inc. v. Cyph, Inc. (IPR2023-00142)
`
`

`

`US 9 , 794 , 070 B2
`
`with a storage device , such as a micro - drive or other device ,
`erboard or in other manners as appropriate . The processor
`to provide additional storage . Each of the processor , the
`can process instructions for execution within the computing
`memory 614 , the display 623 , the communication interface
`device , including instructions stored in the memory 614 or
`620 , and the transceiver , are interconnected using various
`on the storage device to display graphical information for a
`GUI on an external input / output device , such as a display 5 buses ( e . g . , bus 612 ) , and several of the components may be
`623 coupled to the high - speed interface 619 . In other imple -
`mounted on a common motherboard or in other manners as
`mentations , multiple processors and / or mul

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket