`
`US009794070B2
`
`( 12 ) United States Patent
`Lester et al .
`
`( 10 ) Patent No . :
`( 45 ) Date of Patent :
`
`US 9 , 794 , 070 B2
`Oct . 17 , 2017
`
`( 54 ) METHOD OF EPHEMERAL ENCRYPTED
`COMMUNICATIONS
`( 71 ) Applicant : Cyph , Inc . , Dover , DE ( US )
`( 72 )
`Inventors : Ryan Lester , Dover , DE ( US ) ; Marcus
`Carey , Dover , DE ( US )
`( 73 ) Assignee : Cyph , Inc . , Dover , DE ( US )
`Subject to any disclaimer , the term of this
`( * ) Notice :
`patent is extended or adjusted under 35
`U . S . C . 154 ( b ) by 0 days .
`( 21 ) Appl . No . : 14 / 841 , 302
`Aug . 31 , 2015
`( 22 )
`Filed :
`Prior Publication Data
`( 65 )
`US 2016 / 0197706 A1
`Jul . 7 , 2016
`Related U . S . Application Data
`( 60 ) Provisional application No . 62 / 100 , 689 , filed on Jan .
`7 , 2015 .
`( 51 ) Int . Ci .
`G06F 15 / 173
`H04L 9 / 32
`
`( 52 )
`
`( 2006 . 01 )
`( 2006 . 01 )
`( Continued )
`U . S . CI .
`CPC . . . . . . . . . . . . . . H04L 9 / 3247 ( 2013 . 01 ) ; G06F 8 / 60
`( 2013 . 01 ) ; G06F 21 / 45 ( 2013 . 01 ) ; G06F
`21 / 606 ( 2013 . 01 ) ;
`
`( Continued )
`( 58 ) Field of Classification Search
`CPC . . . . . . . GO6F 21 / 45 ; H04L 51 / 16 ; H04L 5 / 0037 ;
`H04L 63 / 0435 ; H04L 63 / 065
`( Continued )
`
`20 ore
`
`A first user on Device 1 requests
`opening an ephemeral
`communication session on a
`Server with a second usor on
`Device 2
`ro00000000000000000000oppooooo0000000000000000000
`
`00000000000000000000000 - 00000000000000000000000
`??????? acca?? ?cessary
`??? tg
`?
`a { ?????
`SECUNO communication session
`and generates a unique
`h
`ea }
`cation ,
`es???? ?????for for th? ?????? ???
`BROOOOOOOOOOOOO 000000OqpoooooooOOOOOOOOO
`
`COMMAN
`First user communicates the
`unique epssemeral co55555usticatisss
`session identifier to the second
`???? { F?g ?? ??? )
`com???????ation channel ,
`GOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOO
`
`( 56 )
`
`References Cited
`U . S . PATENT DOCUMENTS
`6 , 170 , 017 B1 *
`1 / 2001 Dias . . . . . . . . . . . . . . . . . . . . . . . H04L 29 / 06
`709 / 226
`7 , 366 , 110 B2 *
`4 / 2008 Gillespie . . . . . . . . . . . H04L 29 / 06027
`370 / 254
`( Continued )
`Primary Examiner — Tonia L Dollinger
`Assistant Examiner — Davoud Zand
`( 74 ) Attorney , Agent , or Firm — Brundidge & Stanger ,
`P . C .
`ABSTRACT
`( 57 )
`Embodiments herein provide , for example , a method that
`includes , comprising : sending a request , by a first user on a
`first device , to a server , the request comprising requesting
`the server open an ephemeral communication session with a
`second user on a second device ; allocating resources , by the
`server , to begin the ephemeral communication session
`between the first user and the second user ; generating a
`unique ephemeral communication session identifier by the
`server and transmitting the unique ephemeral communica
`tion session identifier to the first user ; transmitting , by the
`first user , the unique ephemeral communication session
`identifier to the second user using a second communication
`channel ; connecting , by the second user , to the first user
`through the ephemeral communication session using the
`unique ephemeral communication session identifier ; and
`connecting , by the first user , to the second user through the
`ephemeral communication session using the unique ephem
`eral communication session identifier . In such a method ,
`connecting , by the second user , to the first user through the
`ephemeral communication session may include connecting
`to the server ; and connecting , by the first user , to the second
`user through the ephemeral communication session may
`include connecting to the server .
`2 Claims , 5 Drawing Sheets
`
`40
`
`www
`????? Jet ?? ? ?????????
`( or first user ) using the unique
`| ?????????? c
`_ cat
`session identifier supplied by the
`first user
`
`00000000000000000000000 000000000000000000000000
`Communication through the
`ephenal commu???cation
`che { b?g at ga??? ????
`p
`acts ta each other af Server
`using the unique ephemeral
`Mommunication session identifier
`
`Zoom Video Commc’ns, Inc. - Ex. 1001, Page 1
`Zoom Video Commc’ns, Inc. v. Cyph, Inc. (IPR2023-00142)
`
`
`
`US 9 , 794 , 070 B2
`Page 2
`
`( 51 )
`
`Int . Ci .
`H04L 29 / 06
`H04L 5 / 00
`H04L 29 / 08
`H04L 9 / 08
`H04L 12 / 58
`G06F 21 / 45
`G06F 21 / 60
`G06F 9 / 445
`H04W 12 / 10
`( 52 ) U . S . CI .
`???
`
`( 2006 . 01 )
`( 2006 . 01 )
`( 2006 . 01 )
`( 2006 . 01 )
`( 2006 . 01 )
`( 2013 . 01 )
`( 2013 . 01 )
`( 2006 . 01 )
`( 2009 . 01 )
`
`H04L 5 / 0037 ( 2013 . 01 ) ; H04L 9 / 08
`( 2013 . 01 ) ; H04L 9 / 0861 ( 2013 . 01 ) ; H04L
`9 / 321 ( 2013 . 01 ) ; H04L 9 / 3215 ( 2013 . 01 ) ;
`H04L 9 / 3228 ( 2013 . 01 ) ; H04L 51 / 16
`( 2013 . 01 ) ; H04L 63 / 0281 ( 2013 . 01 ) ; H04L
`63 / 0435 ( 2013 . 01 ) ; H04L 63 / 0442 ( 2013 . 01 ) ;
`H04L 63 / 061 ( 2013 . 01 ) ; H04L 63 / 065
`( 2013 . 01 ) ; H04L 63 / 08 ( 2013 . 01 ) ; H04L
`63 / 0838 ( 2013 . 01 ) ; H04L 63 / 123 ( 2013 . 01 ) ;
`H04L 63 / 18 ( 2013 . 01 ) ; H04L 67 / 02 ( 2013 . 01 ) ;
`H04L 67 / 10 ( 2013 . 01 ) ; H04L 67 / 141
`( 2013 . 01 ) ; H04L 67 / 146 ( 2013 . 01 ) ; H04W
`12 / 10 ( 2013 . 01 ) ; H04L 67 / 42 ( 2013 . 01 )
`Field of Classification Search
`USPC . . . . . . . . 709 / 204 , 205 , 223 , 226 , 227 , 228 , 229
`See application file for complete search history .
`
`( 58 )
`
`( 56 )
`
`References Cited
`U . S . PATENT DOCUMENTS
`7 , 987 , 363 B2 *
`7 / 2011 Chauncey . . . . . . . . . . . H04L 63 / 0428
`380 / 270
`2002 / 0191797 A1 * 12 / 2002 Perlman . . . . . . . . .
`H04L 9 / 088
`380 / 281
`2003 / 0217171 A1 * 11 / 2003 Von Stuermer . . . . . . G11B 27 / 036
`709 / 231
`2006 / 0123082 A1 *
`6 / 2006 Digate . . . . . . . . . . . . . . . . . GO6Q 10 / 107
`709 / 205
`2007 / 0016401 A1 *
`1 / 2007 Ehsani . . . . . . . . . . . . . . . .
`5 / 005
`704 / 9
`2010 / 0031036 A1 *
`2 / 2010 Chauncey . . . . . . . . . . . HO4L 63 / 0428
`713 / 168
`2013 / 0254408 A1 *
`9 / 2013 Sreenivasan . . . . . . . . . . . GO6Q 50 / 01
`709 / 227
`2014 / 0115170 A1 *
`4 / 2014 Yang . . . . . . . . . . . . . . . . . . . . . . . H04W 4 / 00
`709 / 227
`2014 / 0164768 A1 *
`6 / 2014 Kruglick . . . . . . . . . . . . . . H04L 63 / 062
`713 / 168
`2014 / 0222916 A1 *
`8 / 2014 Foley . . . . . . . . . . . . . . . . . . . G06Q 10 / 101
`709 / 204
`2015 / 0074407 Al *
`3 / 2015 Palmeri . . . . . . . . . . . . . . . H04L 63 / 0807
`713 / 171
`2015 / 0188899 Al *
`7 / 2015 Bakar . . . . . . . . . . . . . . . . . . H04L 67 / 125
`726 / 9
`2015 / 0281372 A1 * 10 / 2015 Wilson . . . . . . . . . . . . . . . . . . H04L 67 / 141
`709 / 227
`2016 / 0182497 A1 *
`6 / 2016 Smith . . . . . . . . . . . . . . . . H04L 63 / 0853
`713 / 156
`2017 / 0019437 A1 *
`1 / 2017 Phadnis . . . . . . . . . . . . . H04L 65 / 1083
`* cited by examiner
`
`Zoom Video Commc’ns, Inc. - Ex. 1001, Page 2
`Zoom Video Commc’ns, Inc. v. Cyph, Inc. (IPR2023-00142)
`
`
`
`U . S . Patent
`
`Oct . 17 , 2017
`
`Sheet 1 of 5
`
`US 9 , 794 , 070 B2
`
`A first us on 1dvice . { requss
`opening an ephemeral
`communication session on a
`Server with a second user on
`
`Device 2 F 0000000000
`
`Server allocates necessary
`resources to begin a unique
`secure communication session
`and generates a unique
`ephemeral communication
`??????io identifier for t????
`?? { us? ,
`00000000000000000000000000oooooo000000000000000000000
`
`00000000
`
`30 cm
`
`$ connicates the
`Firs
`{ ????? ?phera { cofia
`sessn identifier to th? second
`ser usi??? ? ???????
`communication channel .
`
`40 cm
`
`gooooo00000000000
`
`c
`
`00000000000000000000000000000000000000000000
`
`Second user connects to Server
`for first user ) using the unique
`ephemeral communication
`session identifier supplied by the
`stuer .
`
`3
`
`Communication through the
`phera { caicat
`channel begins after sach user
`connects to each other or Server
`usg t??? u?ue heara {
`icatin sess?? ?antar ,
`
`B
`
`o
`
`goroooo9999999999999pod .
`
`FIG . 1
`
`100 x hos
`Blues / lespak com
`
`. com
`
`cyph
`
`Start private chat
`
`FIG . 2
`
`Zoom Video Commc’ns, Inc. - Ex. 1001, Page 3
`Zoom Video Commc’ns, Inc. v. Cyph, Inc. (IPR2023-00142)
`
`
`
`atent
`
`Oct . 17 , 2017
`
`Sheet 2 of 5
`
`US 9 , 794 , 070 B2
`
`O
`
`OD X
`
`( htps : / / eyph m / lqCP
`la 01
`Welline
`de
`?? , ?? ??
`Copy
`cyph 1o / ben milac
`
`FIG . 3
`
`3 : 37 AM
`
`1 . Verizon 30
`Messages
`
`tryin to
`hey baby im
`cheat on my wife tonite .
`u down ?
`
`uh . . . dude , just oyph
`http : / / cyph . im / lqCPuj .
`
`FIG . 4
`
`Zoom Video Commc’ns, Inc. - Ex. 1001, Page 4
`Zoom Video Commc’ns, Inc. v. Cyph, Inc. (IPR2023-00142)
`
`
`
`atent
`
`Oct . 17 , 2017
`
`Sheet 3 of 5
`
`US 9 , 794 , 070 B2
`
`O? X
`
`( https : / / cyphimpiaciut
`
`cyph
`
`Connected
`
`2
`
`FIG . 5
`
`OD X
`
`Etter dicyph mlaCpu
`
`to con los
`
`O
`
`neno ok
`????
`
`FIG . 6
`
`Zoom Video Commc’ns, Inc. - Ex. 1001, Page 5
`Zoom Video Commc’ns, Inc. v. Cyph, Inc. (IPR2023-00142)
`
`
`
`atent
`
`Oct . 17 , 2017
`
`Sheet 4 of 5
`
`US 9 , 794 , 070 B2
`
`Resource
`P??? C
`
`FIG . 7
`
`1000000000000000000000
`
`Resource
`Provider B
`5025
`ooooooooooooooooo
`
`Network
`508
`
`500
`
`goodGGCODD0000
`
`Resource
`Provider A
`502a
`
`Moon
`
`* * *
`
`WRRR
`
`?qc
`Manager
`506
`
`doonoooooo
`Www
`
`oooooo
`
`powWAHAKIKA WA
`Computing
`Device ( s )
`504a
`BONOMOOOONO
`to decoracion
`
`504
`
`2
`
`000 . 000 . 00
`
`Zoom Video Commc’ns, Inc. - Ex. 1001, Page 6
`Zoom Video Commc’ns, Inc. v. Cyph, Inc. (IPR2023-00142)
`
`
`
`U . S . Patent
`
`Oct . 17 , 2017
`
`Sheet 5 of 5
`
`US 9 , 794 , 070 B2
`
`#
`
`, #
`
`-
`
`- - - - .
`
`.
`
`-
`
`-
`
`P _ 8
`
`P??????
`12
`
`_ RA
`14
`
`R
`
`??
`
`VO ADAPTER
`???
`
`NETWORK
`25
`
`COMMUNICATIONS
`ADAPTER
`? }
`
`*
`
`*
`
`*
`
`*
`
`= = = ?? ? * *
`
`?
`
`say
`
`60o ?
`
`?ER
`
`-
`
`-
`
`-
`
`see
`
`SPLAY
`ADAPTER
`621
`
`-
`
`.
`
`4
`
`Zoom Video Commc’ns, Inc. - Ex. 1001, Page 7
`Zoom Video Commc’ns, Inc. v. Cyph, Inc. (IPR2023-00142)
`
`
`
`US 9 , 794 , 070 B2
`
`5
`
`METHOD OF EPHEMERAL ENCRYPTED
`communication may include , for example , whistleblowing ,
`providing credential information , payment information , or
`COMMUNICATIONS
`personal account management information . To protect sen
`CROSS - REFERENCE TO RELATED
`sitive information , the information can be transmitted over
`APPLICATIONS
`a secure transmission connection provided by an encryption
`system .
`This application claims priority to U . S . Provisional Appli
`Conventional encryption systems are often difficult to use
`cation No . 62 / 100 , 689 , entitled “ METHOD OF EPHEM and thereby introduce weaknesses in the overall systems .
`ERAL ENCRYPTED COMMUNICATIONS ” and filed Jan .
`For example , asymmetric encryption relies on complex
`7 , 2015 .
`10 mathematics applied to private and public information ( e . g . ,
`private and public keys ) and is inherently inefficient . Sym
`The subject matter of the present application is related to
`that disclosed in the following co - pending applications :
`metric encryption is significantly more efficient , but relies on
`Ser . No . 14 / 841 , 327 , entitled “ CROSS - CLIENT COM
`secret information ( e . g . , a password , passphrase , or private
`MUNICATION METHOD " and filed Aug . 31 , 2015 and
`U . S . Provisional Application No . 15 15 key ) that must remain private between all persons or devices
`claiming priority to
`with authorized access to the encrypted data .
`62 / 100 , 674 , filed on Jan . 7 , 2015 ;
`The difficulties of conventional encryption systems
`Ser . No . 14 / 841 , 318 , entitled
`“ CRYPTOGRAPHIC
`increase when the secret information is publicly known . For
`METHOD FOR SECURE COMMUNICATIONS ” and filed
`example , when the secret information is publicly known , the
`Aug . 31 , 2015 and claiming priority to U . S . Provisional
`Application No . 62 / 100 , 676 , filed on Jan . 7 , 2015 ;
`20 entire encryption system becomes compromised and must be
`Ser . No . 14 / 841 , 313 , entitled “ METHOD OF DENIABLE
`revised ( e . g . , resetting passwords , passphrases , private keys ,
`ENCRYPTED COMMUNICATIONS ” and filed Aug . 31 ,
`etc . ) . Since various methods to obtain this secret information
`2015 and claiming priority to U . S . Provisional Application
`are well known and frequently used — techniques such as
`such as man - in - the - middle attacks , social engineering ,
`No . 62 / 100 , 682 , filed on Jan . 7 , 2015 ;
`Ser . No . 14 / 841 , 281 , entitled “ ENCRYPTED GROUP 25 etc .
`it is therefore desirable to reduce exposure to an
`COMMUNICATION METHOD ” and filed Aug . 31 , 2015
`encryption system ' s private information and provide an
`and claiming priority to U . S . Provisional Application No .
`ephemeral communication channel , thereby reducing the
`potential attack surface and potential exposure of partici
`62 / 100 , 684 , filed on Jan . 7 , 2015 ;
`Ser . No . 14 / 841 , 310 , entitled “ METHOD OF GENER -
`pants employing such an encryption system .
`ATING A DENIABLE ENCRYPTED COMMUNICA - 30
`TIONS VIA PASSWORD ENTRY ” and filed Aug . 31 , 2015
`SUMMARY
`and claiming priority to U . S . Provisional Application No .
`In view of the foregoing , an embodiment herein provides
`62 / 100 , 686 , filed on Jan . 7 , 2015 ;
`Ser . No . 14 / 841 , 288 , entitled “ MULTI - KEY ENCRYP -
`a method , comprising : sending a request , by a first user on
`TION METHOD ” and filed Aug . 31 , 2015 and claiming 35 a first device , to a server , the request comprising requesting
`priority to U . S . Provisional Application No . 62 / 100 , 688 ,
`the server open an ephemeral communication session with a
`filed on Jan . 7 , 2015 ;
`second user on a second device ; allocating resources , by the
`Ser . No . 14 / 841 , 292 , entitled “ METHOD OF MULTI
`server , to begin the ephemeral communication session
`FACTOR AUTHENTICATION DURING ENCRYPTED
`between the first user and the second user ; generating a
`COMMUNICATIONS " and filed Aug . 31 , 2015 and claim - 40 unique ephemeral communication session identifier by the
`ing priority to U . S . Provisional
`server and transmitting the unique ephemeral communica
`Ser . No . 14 / 841 , 296 , entitled “ METHOD OF USING
`tion session identifier to the first user ; transmitting , by the
`SYMMETRIC CRYPTOGRAPHY FOR BOTH DATA
`first user , the unique ephemeral communication session
`ENCRYPTION AND SIGN - ON AUTHENTICATION ” and
`identifier to the second user using a second communication
`filed Aug . 31 , 2015 and claiming priority to U . S . Provisional 45 channel ; connecting , by the second user , to the first user
`Application No . 62 / 100 , 693 , filed on Jan . 7 , 2015 . and
`through the ephemeral communication session using the
`Ser . No . 15 / 001 , 015 , entitled “ SYSTEM AND METHOD
`unique ephemeral communication session identifier ; and
`OF CRYPTOGRAPHICALLY SIGNING WEB APPLICA -
`connecting , by the first user , to the second user through the
`TIONS ” and filed Aug . 31 , 2015 and a continuation appli -
`ephemeral communication session using the unique ephem
`cation of international Application Ser . No , PCT / US15 / 50 eral communication session identifier . In such a method ,
`47788 filed on Aug . 31 , 2015 and claiming priority to U . S .
`connecting , by the second user , to the first user through the
`Provisional Application No . 62 / 104 , 307 , filed on Jan . 16 ,
`ephemeral communication session may include connecting
`to the server ; and connecting , by the first user , to the second
`2015 .
`The content of the above applications are incorporated by
`user through the ephemeral communication session may
`reference in their entirety .
`55 include connecting to the server .
`BACKGROUND
`BRIEF DESCRIPTION OF THE DRAWINGS
`Technical Field
`The embodiments herein will be better understood from
`The embodiments herein generally relate to cryptography , 60 the following detailed description with reference to the
`and , more particularly , to a method of ephemeral encrypted
`drawings , in which :
`FIG . 1 illustrates a flow diagram illustrating a method of
`communications .
`Description of the Related Art
`ephemeral encrypted communication according to an
`With communication occurring through a variety of com -
`embodiment herein ;
`munication channels , information such as personal data , 65
`FIG . 2 illustrates a schematic diagram of initiating an
`sensitive conversations and other sensitive information may
`ephemeral communication session according to an embodi
`be passed across a public network , such as the Internet . Such
`ment herein ;
`
`Zoom Video Commc’ns, Inc. - Ex. 1001, Page 8
`Zoom Video Commc’ns, Inc. v. Cyph, Inc. (IPR2023-00142)
`
`
`
`US 9 , 794 , 070 B2
`
`20
`
`As show in FIG . 3 , one embodiment of step 20 includes a
`FIG . 3 illustrates an schematic diagram of a unique
`unique resource locator ( or URL ) for the communication
`ephemeral communication session identifier according to an
`session . The method show in FIG . 1 , however , is not limited
`embodiment herein ;
`to the embodiment show in FIG . 3 and other unique ephem
`FIG . 4 illustrates a schematic diagram of communicating
`eral communication session identifiers are possible . Further
`the ephemeral communication session identifier to another 5
`more , while not show in FIG . 1 , step 20 may further include
`party using a secondary communication channel according
`generating a unique ephemeral communication session iden
`to an embodiment herein ;
`tifier using a hash function or a random number generator ( to
`FIG . 5 illustrates a schematic diagram of establishing an
`reduce the likelihood the identifier could be predicted ) . In
`ephemeral communication session according to an embodi -
`10 addition , according to one embodiment herein , the necessary
`ment herein ;
`resources to create a unique secure communication session
`FIG . 6 illustrates a schematic diagram of communicating
`include creating the necessary URL redirection resources ,
`through an ephemeral communication session according to
`such as transmitting HTTP status codes in a communication
`an embodiment herein ;
`header ( e . g . , 301 , 302 or 307 codes ) — to enable users to
`FIG . 7 illustrates a schematic diagram of a network
`architecture used in accordance with the embodiments 15 communicate the unique ephemeral communication session
`identifier ( as described below ) and begin the unique ephem
`herein ; and
`FIG . 8 illustrates a schematic diagram of a computer
`eral communication session . Moreover , such URL redirec
`architecture used in accordance with the embodiments
`tion resources may be temporary ( e . g . , using an HTTP
`307 — or temporary redirect status code ) .
`herein .
`In step 30 , the first user communicates the unique ephem
`DETAILED DESCRIPTION OF PREFERRED
`eral communication session identifier to the second user
`EMBODIMENTS
`using a second communication channel ( e . g . , an SMS mes
`sage , as shown in FIG . 4 ) . Furthermore , in step 40 , the
`The embodiments herein and the various features and
`second user connects to Server using the unique ephemeral
`advantageous details thereof are explained more fully with 25 communication session identifier supplied by the first user
`reference to the non - limiting embodiments that are illus -
`( e . g . , as shown in FIG . 5 ) . Finally , in step 50 , communica
`trated in the accompanying drawings and detailed in the
`tion through the ephemeral communication channel begins
`following description . Descriptions of well - known compo -
`after each user connects to Server using the unique ephem
`nents and processing techniques are omitted so as to not
`eral communication session identifier ( e . g . , as shown in FIG .
`unnecessarily obscure the embodiments herein . The 30 6 ) .
`examples used herein are intended merely to facilitate an
`FIG . 7 illustrates an implementation of an exemplary
`understanding of ways in which the embodiments herein
`networking environment ( e . g . , cloud computing environ
`may be practiced and to further enable those of skill in the
`ment 500 ) for the embodiments described herein is shown
`art to practice the embodiments herein . Accordingly , the
`and described . The cloud computing environment 500 may
`examples should not be construed as limiting the scope of 35 include one or more resource providers 502a , 502b , 5020
`( collectively , 502 ) . Each resource provider 502 may include
`the embodiments herein .
`The embodiments herein provide a method of one - time
`computing resources . In some implementations , computing
`ephemeral encrypted communication ( e . g . , initiating an
`resources may include any hardware and / or software used to
`ephemeral session while in a chat room ) . For example , a user
`process data . For example , computing resources may
`( e . g . , " Alice " ) of an encrypted communication system ( e . g . , 40 include hardware and / or software capable of executing
`the CyphTM secure messaging platform ) would like to
`algorithms , computer programs , and / or computer applica
`engage another user to the system ( e . g . , " Bob " ) in an
`tions . In some implementations , exemplary computing
`ephemeral encrypted
`communication .
`Conventional
`resources may include application servers and / or databases
`encrypted communication systems , however , keep various
`with storage and retrieval capabilities . Each resource pro
`records of communications between Alice and Bob ( range 45 vider 502 may be connected to any other resource provider
`from detailed records of the content being communication
`502 in the cloud computing environment 500 . In some
`( in the forms of various system logs ) or records describing
`implementations , the resource providers 502 may be con
`communication activity ( such as system identifier contacted ,
`nected over a computer network 508 . Each resource provider
`the time and duration of communication , etc . ) . According to
`502 may be connected to one or more computing device
`the embodiments herein , however , Alice can conduct 50 504a , 504b , 504c ( collectively , 504 ) , over the computer
`ephemeral communications over encrypted channels .
`network 508 .
`Referring now to the drawings , and more particularly to
`The cloud computing environment 500 may include a
`FIGS . 1 through 8 , where similar reference characters
`resource manager 506 . The resource manager 506 may be
`denote corresponding features consistently throughout the
`connected to the resource providers 502 and the computing
`figures , there are shown preferred embodiments .
`55 devices 504 over the computer network 508 . In some
`FIG . 1 illustrates a flow diagram illustrating a method 1
`implementations , the resource manager 506 may facilitate
`of ephemeral encrypted communication according to an
`the provision of computing resources by one or more
`embodiment herein . As shown in FIG . 1 , in step 10 , Device
`resource providers 502 to one or more computing devices
`1a ( e . g . , a computing device shown in FIGS . 7 and 8 )
`504 . The resource manager 506 may receive a request for a
`associated with a first user ( e . g . , Alice ) requests opening an 60 computing resource from a particular computing device 504 .
`ephemeral communication session ( e . g . , on the CyphTM
`The resource manager 506 may identify one or more
`secure messaging platform , as shown in FIG . 2 ) on a Server
`resource providers 502 capable of providing the computing
`( e . g . , a computing device shown in FIGS . 7 and 8 ) with a
`resource requested by the computing device 504 . The
`second user ( e . g . , Bob ) . In step 20 , Server allocates neces -
`resource manager 506 may select a resource provider 502 to
`sary resources to begin a unique secure communication 65 provide the computing resource . The resource manager 506
`session and generates a unique ephemeral communication
`may facilitate a connection between the resource provider
`session identifier for the first user ( e . g . , as shown in FIG . 3 ) .
`502 and a particular computing device 504 . In some imple
`
`Zoom Video Commc’ns, Inc. - Ex. 1001, Page 9
`Zoom Video Commc’ns, Inc. v. Cyph, Inc. (IPR2023-00142)
`
`
`
`US 9 , 794 , 070 B2
`
`10
`
`5
`A data processing system suitable for storing and / or
`mentations , the resource manager 506 may establish a
`executing program code will include at least one processor
`connection between a particular resource provider 502 and
`coupled directly or indirectly to memory elements through a
`a particular computing device 504 . In some implementa
`system bus . The memory elements can include local
`tions , the resource manager 506 may redirect a particular
`computing device 504 to a particular resource provider 502 5 memory employed during actual execution of the program
`code , bulk storage , and cache memories which provide
`with the requested computing resource .
`temporary storage of at least some program code in order to
`The techniques provided by the embodiments herein may
`reduce the number of times code must be retrieved from bulk
`be implemented on an integrated circuit chip ( not shown ) .
`storage during execution .
`The chip design is created in a graphical computer program
`ming language , and stored in a computer storage medium m
`Input / output ( I / O ) devices ( including but not limited to
`keyboards , displays , pointing devices , etc . ) can be coupled
`( such as a disk , tape , physical hard drive , or virtual hard
`to the system either directly or through intervening I / O
`drive such as in a storage access network ) . If the designer
`controllers . Network adapters may also be coupled to the
`does not fabricate chips or the photolithographic masks used
`system to enable the data processing system to become
`to fabricate chips , the designer transmits the resulting design
`ng design 15 coupled to other data processing systems or remote printers
`by physical means ( e . g . , by providing a copy of the storage
`or storage devices through intervening private or public
`medium storing the design ) or electronically ( e . g . , through
`networks . Modems , cable modem and Ethernet cards are just
`the Internet ) to such entities , directly or indirectly . The
`a few of the currently available types of network adapters .
`stored design is then converted into the appropriate format
`A representative hardware environment for practicing the
`( e . g . , GDSII ) for the fabrication of photolithographic masks , 20 embodiments herein is depicted in FIG . 8 . This schematic
`which typically include multiple copies of the chip design in
`drawing illustrates a hardware configuration of an informa
`question that are to be formed on a wafer . The photolitho
`tion handling / computer system 600 in accordance with the
`graphic masks are utilized to define areas of the wafer
`embodiments herein . The system comprises at least one
`( and / or the layers thereon ) to be etched or otherwise pro
`processor or central processing unit ( CPU ) 610 . The CPUs
`cessed .
`25 610 are interconnected via system bus 612 to various
`The resulting integrated circuit chips can be distributed by
`devices such as a random access memory ( RAM ) 614 ,
`the fabricator in raw wafer form ( that is , as a single wafer
`read - only memory ( ROM ) 616 , and an input / output ( 1 / 0 )
`that has multiple unpackaged chips ) , as a bare die , or in a
`adapter 618 . The I / O adapter 618 can connect to peripheral
`packaged form . In the latter case the chip is mounted in a
`devices , such as disk units 611 and tape drives 613 , or other
`single chip package ( such as a plastic carrier , with leads that 30 program storage devices that are readable by the system . The
`are affixed to a motherboard or other higher level carrier ) or
`system can read the inventive instructions on the program
`in
`a multichip package ( such as a ceramic carrier that has
`storage devices and follow these instructions to execute the
`either or both surface interconnections or buried intercon -
`methodology of the embodiments herein . The system further
`nections ) . In any case the chip is then integrated with other
`includes a user interface adapter 619 that connects a key
`chips , discrete circuit elements , and / or other signal process - 35 board 615 , mouse 617 , speaker 624 , microphone 622 , and / or
`ing devices as part of either ( a ) an intermediate product , such
`other user interface devices such as a touch screen device
`as a motherboard , or ( b ) an end product . The end product can
`not shown ) to the bus 612 to gather user input . Additionally ,
`be any product that includes integrated circuit chips , ranging
`a communication adapter 620 connects the bus 612 to a data
`from toys and other low - end applications to advanced com
`processing network 625 , and a display adapter 621 connects
`puter products having a display , a keyboard or other input 40 the bus 612 to a display device 623 which may be embodied
`device , and a central processor .
`as an output device such as a monitor , printer , or transmitter ,
`The embodiments herein can take the form of an entirely
`for example .
`hardware embodiment , an entirely software embodiment or
`For example , FIG . 8 includes exemplary embodiments of
`an embodiment including both hardware and software ele -
`a computing device and a mobile computing device that can
`ments . The embodiments that are implemented in software 45 be used to implement the techniques described in this
`include but are not limited to , firmware , resident software ,
`disclosure . As a computing device , system 600 is intended to
`represent various forms of digital computers , such as lap
`microcode , etc .
`Furthermore , the embodiments herein can take the form
`tops , desktops , workstations , personal digital assistants ,
`servers , blade servers , mainframes , and other appropriate
`of a computer program product accessible from a computer
`usable or computer - readable medium providing program 50 computers . As a mobile computing device , system 600 is
`code for use by or in connection with a computer or any
`intended to represent various forms of mobile devices , such
`instruction execution system . For the purposes of this
`as personal digital assistants , cellular telephones , smart
`description ,
`a computer - usable or computer readable
`phones , and other similar computing devices . The compo
`medium can be any apparatus that can comprise , store ,
`nents shown here , their connections and relationships , and
`communicate , propagate , or transport the program for use by 55 their functions , are meant to be examples only , and are not
`or in connection with the instruction execution system ,
`meant to be limiting .
`Thus , as a computing device , system 600 includes a
`apparatus , or device .
`The medium can be an electronic , magnetic , optical
`processor ( e . g . , CPUS 610 ) , a memory 614 , storage units
`electromagnetic , infrared , or semiconductor system ( or
`( e . g . , ROM 616 , disk units 611 , tape drives 613 ) , a high
`apparatus or device ) or a propagation medium . Examples of 60 speed interface 618 connecting to the memory 614 and
`a computer - readable medium include a semiconductor or
`multiple high - speed expansion ports 619 , and a low - speed
`solid state memory , magnetic tape , a removable computer
`interface ( not shown ) connecting to a low - speed expansion
`diskette , a random access memory ( RAM ) , a read - only
`port ( not shown ) and a storage device . Each of the proces
`memory ( ROM ) , a rigid magnetic disk and an optical disk .
`sors , the memory 614 , the storage device , the high - speed
`Current examples of optical disks include compact disk -
`65 interface 618 , the high - speed expansion ports 619 , and the
`read only memory ( CD - ROM ) , compact disk — read / write
`low - speed interface , are interconnected using various busses
`( e . g . , bus 612 ) , and may be mounted on a common moth
`( CD - R / W ) and DVD .
`
`Zoom Video Commc’ns, Inc. - Ex. 1001, Page 10
`Zoom Video Commc’ns, Inc. v. Cyph, Inc. (IPR2023-00142)
`
`
`
`US 9 , 794 , 070 B2
`
`with a storage device , such as a micro - drive or other device ,
`erboard or in other manners as appropriate . The processor
`to provide additional storage . Each of the processor , the
`can process instructions for execution within the computing
`memory 614 , the display 623 , the communication interface
`device , including instructions stored in the memory 614 or
`620 , and the transceiver , are interconnected using various
`on the storage device to display graphical information for a
`GUI on an external input / output device , such as a display 5 buses ( e . g . , bus 612 ) , and several of the components may be
`623 coupled to the high - speed interface 619 . In other imple -
`mounted on a common motherboard or in other manners as
`mentations , multiple processors and / or mul