throbber
(12) United States Patent
`Larson et al.
`
`(10) Patent No.:
`(45) Date of Patent:
`
`US 8,516,131 B2
`*Aug. 20, 2013
`
`US008516131B2
`
`(54) SYSTEM AND METHOD EMPLOYING AN
`AGILE NETWORK PROTOCOL FOR SECURE
`COMMUNICATIONS USING SECURE
`DOMAIN NAMES
`
`(75) Inventors: Victor Larson, Fairfax, VA (US);
`Robert Dunham Short, III, Leesburg,
`VA (US); Edmond Colby Munger,
`CroWnsville, MD (US); Michael
`
`(2006.01)
`
`(51) Int. Cl.
`G06F 15/16
`(52) US. Cl.
`USPC ........................................................ .. 709/227
`(58) Field of Classi?cation Search
`USPC ................................................ .. 709/223i227
`See application ?le for complete search history.
`R f
`Ct d
`e erences l e
`
`56
`(
`)
`
`WllllaIIlSOIl, South Rldlng, -
`.
`~
`
`(73) Assrgnee. VlrnetX, Inc., Zephyr Cove, NV (US)
`
`2,895,502 A
`4,677,434 A
`
`7/1959 Roper et a1.
`@1987 Fascenda
`
`( * ) Notice:
`
`Subject to any disclaimer, the term of this
`patent is extended or adjusted under 35
`U.S.C. 154(b) by 0 days.
`This patent is subject to a terminal dis-
`C1aimer~
`
`(21) APP1- NOJ 13/336,958
`
`(22) Filed:
`
`Dec. 23, 2011
`
`65
`(
`)
`
`.
`.
`.
`t D t
`P bl
`P
`nor u lea Ion a a
`US 2012/0117237 A1
`May 10, 2012
`
`Related US. Application Data
`_
`f
`1,
`_ N 13/049 552 ?l d
`63 C _
`(
`)
`Onnnuanon O aPP 192111011
`9'
`_
`>
`>
`_ e _On
`Man 16, 2011: Whlch 15 a Connnuanon of appl1cat1on
`N0~ 11/840,560, ?led 011 Aug- 17, 2007, HOW Pat- NO-
`7,921,211, Which is a continuation of application No.
`10/714,849, ?led on Nov. 18, 2003, noW Pat. No.
`7 ;418;504; which is a continuation of application NO_
`09/558,210s ?led on Apt 26’ 2000, now abandoned,
`Which is a continuationdmpem of application NO_
`09/504 783 ?led on Feb 15 2000 HOW Pat NO
`6 502 {35 ’ which is
`a‘ co’minua’tion_in_ ar't 0
`’
`1. ’ t.
`’ N 09/429 643 ?l d O t 25 1999
`app 10a Ion 0'
`’
`’
`e on C '
`’
`’
`now Pat‘ NO‘ 7’010’604'
`(60) Provisional application No. 60/106,261, ?led on Oct.
`30, 1998, provisional application No. 60/137,704,
`?led on Jun. 7, 1999.
`
`(Continued)
`FOREIGN PATENT DOCUMENTS
`
`DE
`EP
`
`12/1999
`19924575
`4/1988
`0838930
`(Continued)
`OTHER PUBLICATIONS
`US. Appl. No. 09/399,753, ?led Sep. 22, 1998, Graig Miller et a1.
`
`(Continued)
`
`Primary Examiner * Krisna Lim
`.
`(74) Attorney, Agent, or Firm *McDer'mottW1ll& Emery
`LLP
`ABSTRACT
`(57)
`A network device comprises a storage device storing an appli
`cation program for a secure communications service; and at
`least one processor con?gured to execute the appl1cat1on pro
`gram enabling the network device to: (a) send a request to
`look up a netWork address of a second netWork device based
`on an identi?er; (b) receive an indication that the second
`netWork device is available for the secure communications
`service, the indication including the requested netWork
`address of the second netWork device and provisioning infor
`mation for a secure communication link; (0) connect to the
`second netWork device over the secure communication link,
`using the received netWork address of the second netWork
`device and the provisioning information for the secure com
`munication link; and (d) communicate at least one of video
`data and audio data With the second netWork device using the
`Secure Commumcanons Sen/lee Vla the Secure Commumca'
`tion link.
`
`27 Claims, 40 Drawing Sheets
`
`nus
`2609_/ SERVER
`
`w’éiEiLlEsr
`W’ rommensne
`
`2601
`\
`
`2905
`\
`
`2am
`\
`
`/
`
`Pigglv
`
`was _7 IP
`
`BROWSER
`
`STACK \
`
`;
`
`2507
`
`LP
`HOPPING
`
`ACCESS TO
`SEUJRE SITE
`REQUESTED?
`
`PASSTHRU
`REQUESTTO
`DNS SERVER
`
`USER
`AUTHORIZED TO
`CONNECT?
`
`2105
`\
`
`RETURN
`‘HOST UNKNOWN"
`ERROR
`
`SECURE
`TARGET
`SITE
`
`STTE
`/
`2511
`
`W
`TARGET SITE
`
`Petitioner Apple Inc. - Exhibit 1003, p. 1
`
`

`

`US 8,516,131 B2
`Page 2
`
`(56)
`
`References Cited
`
`U.S. PATENT DOCUMENTS
`8/1988 Sagoi et al.
`4,761,334
`4,885,778
`12/ 1989 Weiss
`4,920,484
`4/ 1990 Ranade
`6/1990 Humphrey et al.
`4,933,846
`4,952,930
`8/1990 FranasZek et al.
`4,988,990
`1/ 1991 Warrior
`5,007,051
`4/1991 Dolkas et al.
`11/1992 Matyas
`5,164,988
`5,204,961
`4/ 1993 Barlow
`5,276,735
`1/1994 Boebert et al.
`5,303,302
`4/ 1994 Burrows
`5,311,593
`5/1994 Carmi
`5,329,521
`7/1994 Walsh et al.
`8/1994 Barney et al.
`5,341,426
`5,345,439
`9/ 1994 Marston
`11/1994 Chang et al.
`5,367,643
`5,384,848
`1/ 1995 Kikuchi
`5,511,122
`4/ 1996 Atkinson
`5,548,646
`8/1996 AZiZ et al.
`5,559,883
`9/1996 Williams
`10/1996 Lenney et al.
`5,561,669
`5,588,060
`12/ 1996 AZiZ
`5,590,285
`12/1996 Krause et al.
`5,625,626
`4/ 1997 Umekita
`5,629,984
`5/1997 McManis
`5,654,695
`8/1997 Olnowich et al.
`10/ 1997 Nakagawa
`5,682,480
`11/1997 Nguyen
`5,689,566
`11/1997 Ludwig et al.
`5,689,641
`5,740,375
`4/1998 Dunne et al.
`5/ 1998 Faybishenko
`5,757,925
`5,764,906
`6/1998 Edelstein et al.
`6/1998 Moroney et al.
`5,771,239
`5,774,660
`6/1998 Brendel et al.
`7/1998 Arnold
`5,787,172
`5,790,548
`8/1998 Sitaraman et al.
`8/1998 Esbensen
`5,796,942
`9/1998 Holloway et al.
`5,805,801
`5,805,803
`9/1998 Birrell et al.
`5,822,434
`10/1998 Caronni et al.
`5,838,796
`11/1998 Mittenthal
`11/1998 Hughes et al.
`5,842,040
`5,845,091
`12/1998 Dunne et al.
`5,864,666
`1/ 1999 Shrader
`5,867,650
`2/ 1999 Osterman
`2/1999 Beyda et al.
`5,870,610
`5,878,231
`3/1999 Baehr et al.
`3/1999 Kapoor
`5,884,038
`5,892,903
`4/1999 Klaus
`4/1999 Wesinger, Jr. et al.
`5,898,830
`5/1999 Holloway et al.
`5,905,859
`5,918,018
`6/1999 Gooderum et al.
`5,918,019
`6/1999 Valencia
`5,950,195
`9/1999 Stockwell et al.
`5,950,519
`9/1999 Anatoli
`9/1999 Yinger et al.
`5,960,204
`5,996,016
`11/1999 Thalheimer et al.
`6,006,259
`12/1999 Adelman et al.
`6,006,272
`12/1999 Aravamudan et al.
`6,016,318
`1/ 2000 Tomoike
`6,016,512
`1/ 2000 Huitema
`3/ 2000 Yamaguchi
`6,041,342
`6,052,788
`4/ 2000 Wesinger et al.
`6,055,574
`4/ 2000 Smorodinsky et al.
`6,061,346
`5/ 2000 Nordman
`6,061,736
`5/ 2000 Rochberger et al.
`6,079,020
`6/2000 Liu
`6,081,900
`6/2000
`Subramaniam et al.
`Muniyappa et al.
`6,092,200
`7/2000
`6,101,182
`8/2000
`SistaniZadeh et al.
`6,119,171
`Alkhatib
`9/2000
`6,119,234
`9/2000
`AZiZ et al.
`6,131,121
`Mattaway et al.
`10/2000
`6,147,976
`1 1/2000
`Shand et al.
`6,157,957
`12/2000
`Berthaud
`
`6,158,011
`6,168,409
`6,173,399
`6,175,867
`6,178,409
`6,178,505
`6,179,102
`6,182,141
`6,182,227
`6,199,112
`6,202,081
`6,222,842
`6,223,287
`6,226,748
`6,226,751
`6,233,618
`6,243,360
`6,243,749
`6,243,754
`6,246,670
`6,256,671
`6,262,987
`6,263,445
`6,266,699
`6,269,099
`6,286,047
`6,298,341
`6,301,223
`6,308,213
`6,308,274
`6,311,207
`6,314,463
`6,324,161
`6,330,562
`6,332,158
`6,333,272
`6,338,082
`6,353,614
`6,425,003
`6,430,155
`6,430,618
`6,487,598
`6,496,867
`6,499,108
`6,502,135
`6,505,232
`6,510,154
`6,549,516
`6,557,037
`6,560,634
`6,571,296
`6,571,338
`6,581,166
`6,606,708
`6,615,357
`6,618,761
`6,671,702
`6,687,551
`6,687,746
`6,701,437
`6,714,970
`6,717,949
`6,751,738
`6,752,166
`6,757,740
`6,760,766
`6,813,777
`6,826,616
`6,839,759
`6,937,597
`7,010,604
`7,039,713
`7,072,964
`7,133,930
`7,167,904
`7,188,175
`7,188,180
`7,197,563
`7,353,841
`
`12/2000
`1/2001
`1/2001
`1/2001
`1/2001
`1/2001
`1/2001
`1/2001
`1/2001
`3/2001
`3/2001
`4/2001
`4/2001
`5/2001
`5/2001
`5/2001
`6/2001
`6/2001
`6/2001
`6/2001
`7/2001
`7/2001
`7/2001
`7/2001
`7/2001
`9/2001
`10/2001
`10/2001
`10/2001
`10/2001
`10/2001
`11/2001
`11/2001
`12/2001
`12/2001
`12/2001
`1/2002
`3/2002
`7/2002
`8/2002
`8/2002
`11/2002
`12/2002
`12/2002
`12/2002
`1/2003
`1/2003
`4/2003
`4/2003
`5/2003
`5/2003
`5/2003
`6/2003
`8/2003
`9/2003
`9/2003
`12/2003
`2/2004
`2/2004
`3/2004
`3/2004
`4/2004
`6/2004
`6/2004
`6/2004
`7/2004
`11/2004
`11/2004
`1/2005
`8/2005
`3/2006
`5/2006
`7/2006
`11/2006
`1/2007
`3/2007
`3/2007
`3/2007
`4/2008
`
`Chen et al.
`Fare
`Gilbrech
`Taghadoss
`Weber et al.
`Schneider et al.
`Weber et al.
`Blum et al.
`Blair et al.
`Wilson
`Naudus
`Sasyan et al.
`Douglas et al.
`Bots et al.
`Arrow et al.
`Shannon
`Basilico
`Sitaraman et al.
`Guerin et al.
`Karlsson et al.
`StrentZsch et al.
`Mogul
`Blumenau
`Sevcik
`Borella et al.
`Ramanathan et al.
`Mann et al.
`Hrastar et al.
`Valencia
`Swift
`Mighdoll et al.
`Abbott et al.
`Kirch
`Boden et al.
`Risley et al.
`McMillin et al.
`Schneider
`Borella et al.
`HerZog et al.
`Davie et al.
`Carter
`Valencia
`Beser et al.
`Johnson
`Munger et al.
`Mighdoll et al.
`Mayes et al.
`Albert et al.
`Provino
`Broadhurst
`Dillon
`Shaio et al.
`Hirst et al.
`Devine et al.
`Boden et al.
`Munger et al.
`Kruglikov et al.
`Steindl
`Shuster et al.
`Hoke et al.
`Fiveash et al.
`Boden et al.
`Wesinger, Jr. et al.
`Lull et al.
`Parekh et al.
`Sahlqvist
`Weinberger et al. .......... .. 725/76
`Larson et al.
`Larson et al.
`Rosenberg et al.
`Munger et al.
`Van Gunter et al.
`Whittle et al.
`Munger et al.
`Devarajan et al.
`McKeeth
`Larson et al.
`Sheymov et al.
`Kono et al.
`
`Petitioner Apple Inc. - Exhibit 1003, p. 2
`
`

`

`US 8,516,131 B2
`Page 3
`
`8/2008 Larson et al.
`7,418,504 B2
`12/2008 Lu et al.
`7,461,334 B1
`2/2009 Munger et al.
`7,490,151 B2
`2/ 2009 Shull et al.
`7,493,403 B2
`9/2009 Dillon et al. .................... .. 726/3
`7,584,500 B2 *
`7/2010 Karr et al.
`7,764,231 B1
`7,852,861 B2 * 12/2010 Wu et al. ..................... .. 370/401
`7,921,211 B2
`4/2011 Larson et al.
`7,933,990 B2
`4/2011 Munger et al.
`8,051,181 B2 11/2011 Larson et al.
`2001/0049741 A1
`12/2001 Skene et al.
`1/ 2002 Bush
`2002/0002675 A1
`1/ 2002 Droge
`2002/0004898 A1
`10/2003 Wesinger, Jr. et al.
`2003/0196122 A1
`2004/0199493 A1
`10/2004 Ruiz et al.
`2004/0199520 A1
`10/2004 Ruiz et al.
`2004/0199608 A1
`10/ 2004 Rechterman et al.
`2004/0199620 A1
`10/2004 Ruiz et al.
`2005/0055306 A1
`3/ 2005 Miller et al.
`2005/0108517 A1*
`5/2005 Dillon et al. ................ .. 713/150
`3/ 2006 Poyhonen et al.
`2006/0059337 A1
`6/2006 Munger et al.
`2006/0123134 A1
`2007/0208869 A1
`9/ 2007 Adelman et al.
`9/2007 King et al.
`2007/0214284 A1
`2007/0266141 A1
`1 1/ 2007 Norton
`2008/0005792 A1
`1/2008 Larson et al.
`2008/0144625 A1*
`6/2008 Wu et al. ..................... .. 370/392
`2008/0235507 A1
`9/ 2008 Ishikawa et al.
`7/ 2009 Agarwal et al.
`2009/0193498 A1
`2009/0193513 A1* 7/2009 Agarwal et al. ............... .. 726/15
`2009/0199258 A1
`8/2009 Deng et al.
`2009/0199285 A1* 8/2009 Agarwal et al. ................. .. 726/9
`
`EP
`EP
`EP
`GB
`GB
`GB
`JP
`JP
`JP
`JP
`JP
`JP
`JP
`JP
`WO
`WO
`WO
`WO
`WO
`WO
`WO
`WO
`WO
`WO
`WO
`WO
`
`FOREIGN PATENT DOCUMENTS
`0814589
`12/1997
`836306
`4/1998
`0858189
`8/1998
`2317792
`4/1998
`2334181
`8/1999
`2340702
`2/2000
`62-214744
`9/1987
`04-117826
`4/1992
`04-363941
`12/1992
`09-018492
`1/1997
`09-270803
`10/1997
`10-070531
`3/1998
`10-111848
`4/1998
`10-215244
`8/1998
`WO9827783
`6/1998
`WO9843396
`10/1998
`WO9855930
`12/1998
`WO9859470
`12/1998
`WO9911019
`3/1999
`WO9938081
`7/1999
`WO9948303
`9/1999
`WO0017775
`3/2000
`WO0070458
`11/2000
`WO01/61922
`2/2001
`WO0116766
`3/2001
`WO0150688
`7/2001
`
`OTHER PUBLICATIONS
`
`U.S. Appl. No. 60/134,547, ?led May 17, 1999, Victory Sheyrnov.
`U.S. Appl. No. 60/151,563, ?led Aug. 31, 1999, Bryan Whittles.
`Alan 0. Frier et al., “The SSL Protocol Version 3.0”, Nov. 18, 1996,
`printed from http://www.netscape.com/eng/ss13/idraft302.txt on
`Feb. 4, 2002, 56 pages.
`August Bequai, “Balancing Legal Concerns Over Crime and Security
`in Cyberspace”, Computer & Security, vol. 17, No. 4, 1998, pp.
`293-298.
`D. B. Chapman et al., “Building Internet Firewalls”, Nov. 1995, pp.
`278-375.
`D. Clark, “US Calls for Private Domain-Name System”, Computer,
`IEEE Computer Society, Aug. 1, 1998, pp. 22-25.
`Davila J et al, “Implementation of Virtual Private Networks at the
`Transport Layer”, Information Security, Second International Work
`shop, ISW’99. Proceedings (Lecture Springer-Verlag Berlin, Ger
`many, [Online] 1999, pp. 85-102, XP002399276, ISBN 3-540-666.
`
`Dolev, Shlomi and Ostrovsky, Ra?l, “Ef?cient Anonymous Multicast
`and Reception” (Extended Abstract), 16 pages.
`Donald E. Eastlake, 3rd, “Domain Name System Security Exten
`sions”, Internet Draft, Apr. 1998, pp. 1-51.
`F. Halsall, “Data Communications, Computer Networks and Open
`Systems”, Chapter 4, Protocol Basics, 1996, pp. 198-203.
`Glossary for the Linux FreeS/WAN project, printed from http://
`liberty.freeswan .org/freeswanitrees/freeswan-1 .3/
`doc/glo ssary.
`htrnl on Feb. 21, 2002, 25 pages.
`J. Gilmore, “Swan: Securing the Internet against Wiretapping”,
`printed from http :/ / liberty. freeswan. org/ freeswanitree s/ free swan- 1 .
`3/doc/rationale.html on Feb. 21, 2002, 4 pages.
`James E. Bellaire, “New Statement of Rules-Naming Internet
`Domains”, Internet Newsgroup, Jul. 30, 1995, 1 page.
`Jim Jones et al., “Distributed Denial of Service Attacks: Defenses”,
`Global Integrity Corporation, 2000, pp. 1-14.
`Laurie Wells (LANCASTERBIBELMAIL MSN COM); “Subject:
`Security Icon” USENET Newsgroup, Oct. 19, 1998, XP002200606,
`1 page.
`Linux FreeS/Wan Index File, printed from http://liberty.freewan.org/
`freeswanitrees/freeswan-l.3/doc/ on Feb. 21, 2002, 3 Pages.
`P. Srisuresh et al., “DNS extensions to Network address Translators
`(DNSiALG)”, Internet Draft, Jul. 1998, pp. 1-27.
`Reiter, Michael K. And Rubin, Aviel D. (AT&T Labs-Research),
`“Crowds: Anonymity for Web Transactions”, pp. 1-23.
`RFC 2401 (dated Nov. 1998) Security Architecture for the Internet
`Protocol (RTP).
`RFC 2543-Sip (dated Mar. 1999): Session Initiation Protocol (SIP or
`SIPS).
`Rich Winkel, “CAQ: Networking With Spooks: The NET & The
`Control Of Information”, Internet Newsgroup, Jun. 21, 1997, 4
`pages.
`Rubin, Aviel D., Geer, Daniel, and Ranum, Marcus J. (Wiley Com
`puter Publishing), “Web Security Sourcebook”, pp. 82-94.
`Search Report (dated Aug. 20, 2002), International Application No.
`PCT/US01/04340.
`Search Report (dated Aug. 23, 2002), International Application No.
`PCT/US01/13260.
`Search Report (dated Oct. 7, 2002), International Application No.
`PCT/US01/13261.
`Search Report, IPER (dated Nov. 13, 2002), International Applica
`tion No. PCT/USO 1/ 04340.
`Search Report, IPER (dated Feb. 6, 2002), International Application
`No. PCT/US01/13261.
`Search Report, IPER (dated Jan. 14, 2003), International Application
`No. PCT/US01/13260.
`Shankar, A.U. “A veri?ed sliding window protocol with variable ?ow
`control”. Proceedings of ACM SIGCOMM conference on Commu
`nications architectures & protocols. pp. 84-91, ACM Press, NY, NY
`1986.
`Shree Murthy et al., “Congestion-Oriented Shortest Multi-path Rout
`ing”, Proceedings of IEEE INFOCOM, 1996, pp. 1028-1036.
`W. Stallings, “Cryptography and Network Security”, 2nd, Edition,
`Chapter 13, IP Security, Jun. 8, 1998, pp. 399-440.
`Microsoft Corporation’s Fourth Amended Invalidity Contentions
`dated Jan. 5, 2009, I/lrnetX Inc. and Science Applications Interna
`tional Corp. v. Microsoft Corporation.
`Appendix A of the Microsoft Corporation’s Fourth Amended Inval
`idity Contentions dated Jan. 5, 2009.
`Concordance Table for the References Cited in Tables on pp. 6-15,
`71-80 and 116-124 of the Microsoft Corporation’s Fourth Amended
`Invalidity Contentions dated Jan. 5, 2009.
`1. P. Mockapetris, “DNS Encoding of Network Names and Other
`Types,” Network Working Group, RFC 1101 (Apr. 1989) RFC1101,
`DNS SRV).
`R. Atkinson, “An Internetwork Authentication Architecture,” Naval
`Research Laboratory, Center for High Assurance Computing Sys
`tems (Aug. 5, 1993). (Atkinson NRL, KX Records).
`Henning Schulzrinne, Personal Mobility For Multimedia Services In
`The Internet, Proceedings of the Interactive Distributed Multimedia
`Systems and Services European Workshop at 143 (1996).
`(Schulzrinne 96).
`
`Petitioner Apple Inc. - Exhibit 1003, p. 3
`
`

`

`US 8,516,131 B2
`Page 4
`
`Microsoft Corp., Microsoft WrtualPrivateNetworking.‘ Using Point
`to-Point Tunneling Protocol for Low-Cost, Secure, Remote Access
`Across the Internet (1996) (printed from 1998 PDC DVD-ROM).
`(Point to Point, Microsoft Prior Art VPN Technology).
`“Safe Sur?ng: How to Build a Secure World Wide Web Connection,”
`IBM Technical Support Organization, (Mar. 1996). (Safe Sur?ng,
`Website Art).
`Goldschlag, et al., “Hiding Routing Information,” Workshop on
`Information Hiding, Cambridge, UK (May 1996). (Goldschlag II,
`Onion Routing).
`“IPSec Minutes From Montreal”, IPSEC Working Group Meeting
`Notes,
`http://www.sandleman.ca/ipsec/ l 996/08/msg000 l 8 .htrnl
`(Jun. 1996). (IPSec Minutes, FreeS/WAN).
`J. M. Galvin, “Public Key Distribution with Secure DNS,” Proceed
`ings of the Sixth USENIX UNIX Security Symposium, San Jose,
`California, Jul. 1996. (Galvin, DNSSEC).
`J. Gilmore, et al. “Re: Key Management, anyone? (DNS Keying),”
`IPSec Working Group Mailing List Archives (Aug. 1996). (Gilmore
`DNS, FreeS/WAN).
`H. Orman, et al. “Re: ‘Re: DNS? was Re: Key Management, anyone?”
`IETF IPSec Working Group Mailing List Archive (Aug. l996-Sep.
`1996). (Orman DNS, FreeS/WAN).
`Arnt Gulbrandsen & Paul Vixie, A DNS RR for specifying the location
`ofservices (DNS SRV), IETF RFC 2052 (Oct. 1996). (RFC 2052,
`DNS SRV).
`Freier, et al. “The SSL Protocol Version 3.0,” Transport Layer Secu
`rity Working Group (Nov. 18, 1996). (SSL, Underlying Security
`Technology).
`M. Handley, H. SchulZrinne, E. Schooler, Internet Engineering Task
`Force, Internet Draft, (Dec. 2, 1996). (RFC 2543 Internet Draft 1).
`MG. Reed, et al. “Proxies for Anonymous Routing,” 12th Annual
`Computer Security Applications Conference, San Diego, CA, Dec.
`9-13, 1996. (Reed, Onion Routing).
`Kenneth F. Alden & Edward P. Wobber, T heAlta VlSlLl Tunnel.‘ Using
`theInternet to Extend Corporate Networks, Digital Technical Journal
`(1997) (Alden, AltaVista).
`Automotive Industry Action Group, “ANX Release 1 Document Pub
`lication,” AIAG (1997). (AIAG, ANX).
`Automotive Industry Action Group, “ANX Release 1 Draft Docu
`ment Publication,” AIAG Publications (1997). (AIAG Release,
`ANX).
`Aventail Corp. “Aventail VPN Data Sheet,” available at http://www.
`archive.org/web/ l99702l20l3043/www.aventail.com/prod/
`vpndata.html (1997). (Data Sheet, Aventail).
`Aventail Corp., “Directed VPN Vs. Tunnel,” available at http://web.
`archive.org/web/ 199706200303 1 2/www.aventail.com/educate/
`directvpn.html (l997).(Directed VPN, Aventail).
`Aventail Corp., “Managing Corporate Access to the Internet,”
`Aventail AutoSOCKS White Paper available at http://web.archive.
`org/1997062003003 l2/www.aventail.com/educate/whitepaper/
`ipmw.html (l997).(Corporate Access, Aventail).
`Aventail Corp., “VPN Server V2.0 Administration Guide,” (1997).
`(VPN, Aventail).
`Goldschlag, et al. “Privacy on the Internet,” Naval Research Labo
`ratory, Center for High Assurance Computer Systems (1997).
`(Goldschtag I, Onion Routing).
`Microsoft Corp., Installing Con?guring and Using PPTP with
`Microsoft Clients and Servers (1997). (Using PPTP, Microsoft Prior
`Art VPN Technology).
`Microsoft Corp., IP Security for Microsoft Windows NT Server 5. 0
`(1997) (printed from 1998 PDC DVD-ROM). (IP Security, Microsoft
`Prior Art VPN Technology).
`Microsoft Corp., Microsoft Windows N T Active Directory.‘ An Intro
`duction to the Next Generation Directory Services (1997) (printed
`from 1998 PDC DVD-ROM). (Directory, Microsoft Prior Art VPN
`Technology).
`Microsoft Corp., Routing and Remote Access Service for Windows
`NT Server New Opportunities Today and Looking Ahead (1997)
`(printed from 1998 PDC DVD-ROM). Routing, Microsoft Prior Art
`VPN Technology).
`Microsoft Corp., Understanding Point-to-Point Tunneling Protocol
`PPTP (1997) (printed from 1998 PDC DVD-ROM). (Understanding
`PPTP, Microsoft Prior Art VPN Technology).
`
`J. Mark Smith et.al., Protecting a Private Network.‘ The Alta J/lsta
`Firewall, Digital Technical Journal (1997). (Smith, AltaVista).
`Naganand Doraswamy Implementation of J/lrtual Private Networks
`(VPNs) with IPSecurity, <draft-ietf-ipsec-vpn-00.txt> (Mar. 12,
`1997). (Doraswamy).
`M. Handley, H. SchulZrinne, E. Schooler, Internet Engineering Task
`Force, Internet Draft, (Mar. 27, 1997). (RFC 2543 Internet Draft 2).
`Aventail Corp., “Aventail and Cybersafe to Provide Secure Authen
`tication for Internet and Intranet Communication,” Press Release,
`Apr. 3, 1997. (Secure Authentication, Aventail).
`D. Wagner, et al. “Analysis ofthe SSL 3.0 Protocol,” (Apr. 15, 1997).
`(Analysis, Underlying Security Technologies).
`Automotive Industry Action Group, “ANXO Certi?cation Authority
`Service and Directory Service De?nition for ANX Release 1,” AIAG
`Telecommunications Project Team and Bellcore (May 9, 1997).
`(AIAG De?nition, ANX).
`Automotive Industry Action Group, “ANXO Certi?cation Process
`and ANX Registration Process De?nition for ANX Release l,”AIAG
`Telecommunications Project Team and Bellcore (May 9, 1997).
`(AIAG Certi?cation, ANX).
`Aventail Corp., “Aventail Announces the First VPN Solution to
`Assure Interoperability Across Emerging Security Protocols,” Jun. 2,
`1997. (First VPN, Aventail).
`Syverson, et al. “Private Web Browsing,” Naval Research Laboratory,
`Center for High 8 Assurance Computer Systems (Jun. 2, 1997).
`(Syverson, Onion Routing).
`Bellcore, “Metrics, Criteria, and Measurement Technique Require
`ments for ANX Release 1,” AIAG Telecommunications Project Team
`and Bellcore (Jun. 16, 1997). (AIAG Requirements, ANX).
`M. Handley, H. SchulZrinne, E. Schooler, Internet Engineering Task
`Force, Internet Draft, (Jul. 31, 1997). (RFC 2543 Internet Draft 3).
`R. Atkinson, “Key Exchange Delegation Record for the DNS,” Net
`work Working Group, RFC 2230 (Nov. 1997). (RFC 2230, KX
`Records).
`M. Handley, H. SchulZrinne, E. Schooler, Internet Engineering Task
`Force, Internet Draft, (Nov. 11, 1997). (RFC 2543 Internet Draft 4).
`1998 Microsoft Professional Developers Conference DVD (“1998
`PDC DVD-ROM”) (including screenshots captured there from and
`produced as MSFTVX 00018827-00018832). (Conference,
`Microsoft Prior Art VPN Technology).
`Microsoft Corp., J/lrtual Private Networking an Overview (1998)
`(printed from 1998 PDC DVD-ROM) (Overview, Micro soft Prior Art
`VPN Technology).
`Microsoft Corp., Windows NT 5.0 Beta Has Public Premiere at
`Seattle Mini-Camp Seminar attendees get ?rst look at the perfor
`mance and capabilities of Windows N T 5. 0(l998) (available at http://
`www.microsoft.com/presspass/features/ 1998/ l0-l9nt5.
`mspxpftrue). (NT Beta, Microsoft Prior Art VPN Technology).
`“What ports does SSL use” available at stason.org/TULARC/secu
`rity/ssl-talk/3-4-What-ports-does-ssl-use.html (1998). (Ports, DNS
`SRV).
`Aventail Corp., “Aventail VPN V2.6 Includes Support for More Than
`Ten Authentication Methods Making Extranet VPN Development
`Secure and Simple,” Press Release, Jan. 19, 1998. (VPN V2.6,
`Aventail).
`R. G. MoskowitZ, “Network Address Translation Issues with IPsec,”
`Internet Draft, Internet Engineering Task Force, Feb. 6, 1998.
`(MoskowitZ).
`H. SchulZrinne, et al, “Internet Telephony Gateway Location,” Pro
`ceedings of IEEE INfocom ’98, The Conference on Computer Com
`munications, vol. 2 (Mar. 29iApr. 2,
`1998). (Gateway,
`SchulZrinne).
`C. Huitema, 45 al. “Simple Gateway Control Protocol,”Version 1.0
`(May 5, 1998). (SGCP).
`DISA “Secret Internet Protocol Router Network,” SIPRNET Pro
`gram Management Of?ce (D3 1 l3) DISN Networks, DISN Transmis
`sion Services (May 8, 1998). DISA, SIPRNET).
`M. Handley, H. SchulZrinne, E. Schooler, Internet Engineering Task
`Force, Internet Draft, (May 14, 1998). (RFC 2543 Internet Draft 5).
`M. Handley, H. SchulZrinne, E. Schooler, Internet Engineering Task
`Force, Internet Draft, (Jun. 17, 1998). (RFC 2543 Internet Draft 6).
`D. McDonald, et al. “PFiKEY Key Management API, Version 2,”
`Network Working Group, RFC 2367 (Jul. 1998). (RFC 2367).
`
`Petitioner Apple Inc. - Exhibit 1003, p. 4
`
`

`

`US 8,516,131 B2
`Page 5
`
`M. Handley, H. SchulZrinne, E. Schooler, Internet Engineering Task
`Force, Internet Draft, (Jul. 16, 1998). (RFC 2543 Internet Draft 7).
`M. Handley, H. SchulZrinne, E. Schooler, Internet Engineering Task
`Force, Internet Draft, (Aug. 7, 1998). (RFC 2543 Internet Draft 8).
`Microsoft Corp., Company Focuses on Quality and Customer Feed
`back(Aug. 18, 1998). (Focus, Microsoft PriorArtVPN Technology).
`M. Handley, H. SchulZrinne, E. Schooler, Internet Engineering Task
`Force, Internet Draft, (Sep. 18, 1998). (RFC 2543 Internet Draft 9).
`Atkinson, et al. “Security Architecture for the Internet Protocol,”
`Network Working Group, RFC 2401 (Nov. 1998). (RFC 2401,
`Underlying Security Technologies).
`M. Handley, H. SchulZrinne, E. Schooler, Internet Engineering Task
`Force, Internet Draft, (Nov. 12, 1998). (RFC 2543 Internet Draft 10).
`Donald Eastlake, Domain Name System Security Extensions, IETF
`DNS Security Working Group (Dec. 1998). (DNSSEC-7).
`M. Handley, H. SchulZrinne, E. Schooler, Internet Engineering Task
`Force, Internet Draft, (Dec. 15, 1998). (RFC 2543 Internet Draft 11).
`Aventail Corp., “Aventail Connect 3.1/2.6 Administrator’s Guide,”
`(1999). (Aventail Administrator 3.1, Aventail).
`Aventail Corp., “Aventail Connect 3.1/2.6 User’s Guide,” (1999).
`(Aventail User 3.1, Aventail).
`Aventail Corp., “Aventail ExtraWeb Server v3.2 Administrator’s
`Guide,” (1999). (Aventail ExtraWeb 3.2, Aventail).
`Kaufman et al, “Implementing IPsec,” (Copyright 1999). (Imple
`menting IPSEC, VPN References).
`Network Solutions, Inc. “Enabling SSL,” NSI Registry (1999).
`(Enabling SSL, Underlying Security Technologies).
`Check Point Software Technologies Ltd. (1999) (Check Point,
`Checkpoint FW).
`Amt Gulbrandsen & Paul Vixie, A DNS RR for specifying the location
`of services (DNS SRV),<draft-ietf-dnsind-frc2052bis-02.txt> (Jan.
`1999). (Gulbrandsen 99, DNS SRV).
`C. Scott, et al. J/lrtual Private Networks, O’Reilly and Associates,
`Inc., 2nd ed. (Jan. 1999). Scott VPNs).
`M. Handley, H. SchulZrinne, E. Schooler, Internet Engineering Task
`Force, Internet Draft, (Jan. 15, 1999). (RFC 2543 Internet Draft 12).
`Goldschlag, et al., “Onion Routing for Anonymous and Private
`Internet Connections,” Naval Research Laboratory, Center for High
`Assurance Computer Systems (Jan. 28, 1999). (Goldschlag III,
`Onion Routing).
`H. SchulZrinne, “Internet Telephony: architecture and protocolsi an
`IETF perspective,” Computer Networks, vol. 31, No. 3 (Feb. 1999)
`(Telephony, SchulZrinne).
`M. Handley, et al. “SIP: Session Initiation Protocol,” Network Work
`ing Group, RFC 2543 and Internet Drafts (Dec. 1996-Mar. 1999).
`(Handley, RFC 2543).
`FreeS/Wan Project, Linux FreeS/WAN Compatibility Guide (Mar. 4,
`1999). (FreeS/WAN Compatibility Guide, FreeS/WAN).
`Telcordia Technologies, “ANX Release 1 Document Corrections,”
`AIAG (May 11, 1999). (Telcordia, ANX).
`Ken Hornstein & Jeffrey Altman, Distributing Kerberos KDC and
`Realm Information with DNS <draft-eitf-cat-krb-dns-locate-oo.txt>
`(Jun. 21, 1999). (Hornstein, DNS SRV).
`Bhattacharya, et al., “An LDAP Schema for Con?guration and
`Administration of IPSec Based Virtual Private Networks (VPNs)”,
`IETF Internet Draft (Oct. 1999). (Bhattcharya LDAP VPN).
`B. Patel, et al. “DHCP Con?guration of IPSEC Tunnel Mode,”
`IPSEC Working Group, Internet Draft 02 (Oct. 15, 1999). (Patel).
`Goncalves, et al. Check Point Fire Wall-1 Administration Guide,
`McGraw-Hill Companies (2000). (Goncalves, Checkpoint FW).
`“Building a Microsoft VPN: A Comprehensive Collection of
`Microsoft Resources,” FirstVPN, (Jan 2000). (FirstVPN Microsoft).
`Gulbrandsen, Vixie, & Esibov, A DNS RR for specifying the location
`ofservices (DNS SRV), IETF RFC 2782 (Feb. 2000). (RFC 2782,
`DNS SRV).
`MITRE Organization, “Technical Description,” Collaborative
`Operations in Joint Expeditionary Force Experiment (JEFX) 99 (Feb.
`2000). (MITRE, SIPRNet).
`H. SchulZrinne, et al. “Application-Layer Mobility Using SIP,”
`Mobile Computing and Communications Review, vol. 4, No. 3. pp.
`47-57 (Jul. 2000). (Application, SIP).
`
`Kindred et al, “Dynamic VPN Communities: Implementation and
`Experience,” DARPA Information Survivability Conference and
`Exposition II (Jun. 2001). (DARPA, VPN Systems).
`ANX 101: Basic ANX Service Outline. (Outline, ANX).
`ANX 201: Advanced ANX Service. (Advanced, ANX).
`Appendix A: Certi?cate Pro?le for ANX IPsec Certi?cates. (Appen
`dix, ANX).
`Assured Digital Products. (Assured Digital).
`Aventail Corp., “Aventail AutoSOCKS the Client Key to Network
`Security,” Aventail Corporation White Paper. (Network Security,
`Aventail).
`Cindy Moran, “DISN Data Networks: Secret Internet Protocol
`Router Network (SIPRNet).” (Moran, SIPRNet).
`Data Fellows F-Secure VPN+ (F-Secure VPN+).
`Interim Operational Systems Doctrine for the Remote Access Secu
`rity Program (RASP) Secret Dial-In Solution. (RASP, SIPRNet).
`Onion Routing, “Investigation of Route Selection Algorithms,” avail
`able at http://www.onion-routernet/Archives/Route/indexhtml.
`(Route Selection, Onion Routing).
`Secure Computing, “Bullet-Proo?ng an Army Net,” Washington
`Technology. (Secure, SIPRNet).
`SPARTA “Dynamic Virtual Private Network.” (SPARTA, VPN Sys
`tems).
`Standard Operation Procedure for Using the 1910 Secure Modems.
`(Standard, SIPRNet).
`FreeS/ WAN
`to
`relating
`email s
`Publically
`available
`(MSFTVX00018833 -MSFTVX00019206). (FreeS/WAN emails,
`FreeS/WAN).
`Kaufman et al., “Implementing IPsec,” (Copyright 1999) (Imple
`menting IPsec).
`Network Associates Gauntlet Firewall For Unix User ’s Guide Ver
`sion 5. 0 (1999). (Gauntlet User’s Guidei Unix, Firewall Products).
`Network Associates Gauntlet Firewall For VVl‘ndOWS NT Getting
`Started Guide Version 5.0 (1999) (Gauntlet Getting Started Guidei
`NT, Firewall Products).
`Network Associates Gauntlet Firewall For Unix Getting Started
`Guide Version 5.0 (1999) (Gauntlet Unix Getting Started Guide,
`Firewall Products).
`Network Associates Release Notes Gauntlet Firewall for Unix 5.0
`(Mar. 19, 1999) (Gauntlet Unix Release Notes, Firewall Products).
`Network Associates Gauntlet Firewall For Windows N T Administra
`tor ’s Guide Version 5. 0 (1999) (Gauntlet NT Administrator’s Guide,
`Firewall Products).
`Trusted Information Systems, Inc. Gauntlet Internet Firewall
`Firewall-to-Firewall Encryption Guide Version 3.1 (1996) (Gauntlet
`Firewall-to-Firewall, Firewall Products).
`Network Associates Gauntlet Firewall Global J/lrtual Private Net
`work User ’s Guide for Windows NT Version 5. 0 (1999) (Gauntlet NT
`GVPN, GVPN).
`Network Associates Gauntlet Firewall For UNIX Global J/lrtual Pri
`vate Network User ’s Guide Version 5.0 (1999) (Gauntlet Unix
`GVPN, GVPN).
`Dan Sterne Dynamic Wrtual Private Networks (May 23, 2000)
`(Sterne DVPN, DVPN).
`Darrell Kindred Dynamic J/lrtual Private Networks (DVPN) (Dec.
`21, 1999) (Kindred DVPN, DVPN).
`Dan Sterne et al. T IS Dynamic Security Perimeter Research Project
`Demonstration (Mar. 9, 1998) (Dynamic Security Perimeter,
`DVPN).
`Darrell Kindred Dynamic J/lrtual Private Networks Capability
`Description (Jan. 5, 2000) (Kindred DVPN Capability, DVPN) 11.
`Oct. 7, and 28, 1997 email from Domenic J. Turchi Jr.
`(SPARTA00001712-1714, 1808-1811) (Turchi DVPN email,
`DVPN).
`James Just & Dan Sterne Security Quickstart Task Update (Feb. 5,
`1997) (Security Quickstart, DVPN).
`Virtual Private Network Demonstration dated Mar. 21, 1998
`(SPARTA00001844-54) (DVPN Demonstration, DVPN).
`GTE Internetworking & BBN Technologies DARPA Information
`Assurance Program Integrated Feasibilit Demonstration (IFD) 1.1
`Plan (Mar. 10, 1998) (IFD 1.1, DVPN).
`
`Petitioner Apple Inc. - Exhibit 1003, p. 5
`
`

`

`US 8,516,131 B2
`Page 6
`
`Microsoft Corp. Windows NT Server Product Documentation:
`Administration Guide4Connection Point Services, available at
`http://www.microsoft.com/technet/archive/winntas/proddocs/
`inetconctservice/cpsops.mspX
`(Connection
`Point
`Services)
`(Although undated, this reference refers to the operation of prior art
`versions of Microsoft Windows. Accordingly, upon information and
`belief, this reference is prior art to the patents-in-suit.).
`Microsoft Corp. Windows NT Server Product Documentation:
`Administration Kit GuideiConnection Manager, available at http://
`www.micro soft.com/technet/archive/winntas/proddocs/
`inetconctservice/cmakmspx (Connection Manager) (Although
`undated, this reference refers to the operation of prior art versions of
`Microsoft Windows such as Windows NT 4.0. Accordingly, upon
`information and belief, this reference is prior art to the patents-in
`suit.).
`Microsoft Corp. Autodial Heuristics, available at http:// support.
`microsoft.com/kb/ 164249 (Autodial Heuristics) (Although undated,
`this reference refers to the operation of prior art versions of Microsoft
`Windows such as Windows NT 4.0. Accordingly, upon information
`and belief, this reference is prior art to the patents-in-suit.).
`Microsoft Corp., Cariplo: Distributed Component Object Model,
`(1996) available at http://msdn2.microsoft.com/en-us/library/
`ms809332(pri

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket