throbber
US008560705B2
`
`(12) United States Patent
`Larson et al.
`
`(10) Patent N0.:
`(45) Date of Patent:
`
`US 8,560,705 B2
`*Oct. 15, 2013
`
`(54)
`
`(75)
`
`(73)
`( * )
`
`(21)
`(22)
`(65)
`
`(63)
`
`SYSTEM AND METHOD EMPLOYING AN
`AGILE NETWORK PROTOCOL FOR SECURE
`COMMUNICATIONS USING SECURE
`DOMAIN NAMES
`Inventors: Victor Larson, Fairfax, VA (US);
`Robert Dunham Short, III, Leesburg,
`VA (US); Edmond Colby Munger,
`CroWnsville, MD (US); Michael
`Williamson, South Riding, VA (US)
`Assignee: VirnetX, Inc., Zephyr Cove, NV (US)
`Notice:
`Subject to any disclaimer, the term of this
`patent is extended or adjusted under 35
`U.S.C. 154(b) by 0 days.
`This patent is subject to a terminal dis
`claimer.
`Appl. No.: 13/342,795
`Filed:
`Jan. 3, 2012
`Prior Publication Data
`
`Apr. 26, 2012
`US 2012/0102206 A1
`Related US. Application Data
`
`Continuation of application No. 13/049,552, ?led on
`Mar. 16, 2011, Which is a continuation of application
`No. 11/840,560, ?led onAug. 17, 2007, noW Pat. No.
`7,921,211, Which is a continuation of application No.
`10/714,849, ?led on Nov. 18, 2003, noW Pat. No.
`7,418,504, Which is a continuation of application No.
`09/558,210, ?led on Apr. 26, 2000, noW abandoned,
`Which is a continuation-in-part of application No.
`09/504,783, ?led on Feb. 15, 2000, noW Pat. No.
`6,502,135, Which is a continuation-in-part of
`application No. 09/429,643, ?led on Oct. 29, 1999,
`noW Pat. No. 7,010,604.
`
`(60)
`
`(51)
`
`(52)
`
`Provisional application No. 60/106,261, ?led on Oct.
`30, 1998, provisional application No. 60/137,704,
`?led on Jun. 7, 1999.
`
`Int. Cl.
`G06F 15/16
`US. Cl.
`USPC ........................................................ .. 709/227
`
`(2006.01)
`
`(58) Field of Classi?cation Search
`USPC ................................................ .. 709/223i227
`See application ?le for complete search history.
`References Cited
`
`(56)
`
`U.S. PATENT DOCUMENTS
`
`2,895,502 A
`4,677,434 A
`
`7/1959 Roper et al.
`6/ 1987 Fascenda
`(Continued)
`
`FOREIGN PATENT DOCUMENTS
`
`DE
`EP
`
`12/1999
`19924575
`4/1988
`0838930
`(Continued)
`OTHER PUBLICATIONS
`
`ITU-T Recommendation H.323, “Infrastructure of Audiovisual Ser
`vicesiSystems and Terminal Equipment for Audiovisual Services.
`Packet-Based Multimedia Communications System,” International
`Telecommunications Union, pp. 1-128, Feb. 1998.
`(Continued)
`Primary Examiner * Krisna Lim
`(74) Attorney, Agent, or Firm * McDermott Will & Emery
`LLP
`ABSTRACT
`(57)
`A client device comprises: (a) a memory, (b) an application
`program, and (c) a signal processing con?guration. The
`memory is con?gured and arranged to facilitate a connection
`of the client device With a target device over a secure com
`munication link created based on (i) an address request gen
`erated by the client device, and (ii) a determination as a result
`of the address request that the target device is a device With
`Which a secure communication link can be established When
`the requested address is identi?ed in an address lookup. The
`application program is con?gured and arranged so as to alloW
`participation in audio/video communications With the target
`device over the secure communication link once the secure
`communication link is established. The signal processing
`con?guration is arranged to execute the application program.
`
`30 Claims, 40 Drawing Sheets
`
`WE‘REEQ‘EST
`FORTARGETSlTE
`
`7101/
`
`ACCESS TO
`SEUJRE SlTE
`REOUESIED'I
`
`7702
`
`YES
`
`CONNECT 1
`
`11113
`\
`
`PASS THRU
`REQUEST TO
`DNS SERVER
`
`2705
`
`wosliul’k'llww
`
`ERROR
`
`27%’
`
`TARGETSI'VE
`
`WEB
`BROWSER
`
`_
`
`IP
`STACK
`
`2607
`
`IP
`HOPPING
`
`GATE KEEPER
`
`SECURE
`TARGET
`SITE
`
`UNSECURE
`TARGET
`SlTE
`
`2511
`
`Petitioner Apple Inc. - Exhibit 1050, p. 1
`
`

`

`US 8,560,705 B2
`Page 2
`
`(56)
`
`References Cited
`
`U.S. PATENT DOCUMENTS
`
`4,761,334
`4,885,778
`4,920,484
`4,933,846
`4,952,930
`4,988,990
`5,007,051
`5,164,988
`5,204,961
`5,276,735
`5,303,302
`5,311,593
`5,329,521
`5,341,426
`5,345,439
`5,367,643
`5,384,848
`5,511,122
`5,548,646
`5,559,883
`5,561,669
`5,588,060
`5,590,285
`5,625,626
`5,629,984
`5,654,695
`5,682,480
`5,689,566
`5,689,641
`5,740,375
`5,757,925
`5,764,906
`5,771,239
`5,774,660
`5,787,172
`5,790,548
`5,796,942
`5,805,801
`5,805,803
`5,822,434
`5,838,796
`5,842,040
`5,845,091
`5,864,666
`5,867,650
`5,870,610
`5,878,231
`5,884,038
`5,892,903
`5,898,830
`5,905,859
`5,918,018
`5,918,019
`5,950,195
`5,950,519
`5,960,204
`5,996,016
`6,006,259
`6,006,272
`6,016,318
`6,016,512
`6,041,342
`6,052,788
`6,055,574
`6,061,346
`6,061,736
`6,079,020
`6,081,900
`6,092,200
`6,101,182
`6,119,171
`6,119,234
`6,131,121
`6,147,976
`6,157,957
`
`8/1988
`12/1989
`4/1990
`6/1990
`8/1990
`1/1991
`4/1991
`11/1992
`4/1993
`1/1994
`4/1994
`5/1994
`7/1994
`8/1994
`9/1994
`11/1994
`1/1995
`4/1996
`8/1996
`9/1996
`10/1996
`12/1996
`12/1996
`4/1997
`5/1997
`8/1997
`10/1997
`11/1997
`11/1997
`4/1998
`5/1998
`6/1998
`6/1998
`6/1998
`7/1998
`8/1998
`8/1998
`9/1998
`9/1998
`10/1998
`11/1998
`11/1998
`12/1998
`1/1999
`2/1999
`2/1999
`3/1999
`3/1999
`4/1999
`4/1999
`5/1999
`6/1999
`6/1999
`9/1999
`9/1999
`9/1999
`11/1999
`12/1999
`12/1999
`1/2000
`1/2000
`3/2000
`4/2000
`4/2000
`5/2000
`5/2000
`6/2000
`6/2000
`7/2000
`8/2000
`9/2000
`9/2000
`10/2000
`11/2000
`12/2000
`
`Sagoi et al.
`Weiss
`Ranade
`Humphrey et al.
`FranasZek et al.
`Warrior
`Dolkas et al.
`Matyas
`Barlow
`Boebert et al.
`Burrows
`Carmi
`Walsh et al.
`Barney et al.
`Marston
`Chang et al.
`Kikuchi
`Atkinson
`AZiZ et al.
`Williams
`Lenney et al.
`AZiZ
`Krause et al.
`Umekita
`McManis
`Olnowich et al.
`Nakagawa
`Nguyen
`Ludwig et al.
`Dunne et al.
`Faybishenko
`Edelstein et al.
`Moroney et al.
`Brendel et al.
`Arnold
`SistaniZadeh et al.
`Esbensen
`Holloway et al.
`Birrell et al.
`Caronni et al.
`Mittenthal
`Hughes et al.
`Dunne et al.
`Shrader
`Osterman
`Beyda et al.
`Baehr et al.
`Kapoor
`Klaus
`Wesinger, Jr. et al.
`Holloway et al.
`Gooderum et al.
`Valencia
`Stockwell et al.
`Anatoli
`Yinger et al.
`Thalheimer et al.
`Adelman et al.
`Aravamudan et al.
`Tomoike
`Huitema
`Yamaguchi
`Wesinger et al.
`Smorodinsky et al.
`Nordman
`Rochberger et al.
`Liu
`Subramaniam et al.
`Muniyappa et al.
`SistaniZadeh et al.
`Alkhatib
`AZiZ et al.
`Mattaway et al.
`Shand et al.
`Berthaud
`
`6,158,011
`6,168,409
`6,173,399
`6,175,867
`6,178,409
`6,178,505
`6,179,102
`6,182,141
`6,182,227
`6,199,112
`6,202,081
`6,222,842
`6,223,287
`6,226,748
`6,226,751
`6,233,618
`6,243,360
`6,243,749
`6,243,754
`6,246,670
`6,256,671
`6,262,987
`6,263,445
`6,266,699
`6,269,099
`6,286,047
`6,298,341
`6,301,223
`6,308,213
`6,308,274
`6,311,207
`6,314,463
`6,324,161
`6,330,562
`6,332,158
`6,333,272
`6,338,082
`6,353,614
`6,425,003
`6,430,155
`6,430,610
`6,487,598
`6,496,867
`6,499,108
`6,502,135
`6,505,232
`6,510,154
`6,549,516
`6,557,037
`6,560,634
`6,571,296
`6,571,338
`6,581,166
`6,606,708
`6,615,357
`6,618,761
`6,671,702
`6,687,551
`6,687,746
`6,701,437
`6,714,970
`6,717,949
`6,751,738
`6,752,166
`6,757,740
`6,760,766
`6,813,777
`6,826,616
`6,839,759
`6,937,597
`7,010,604
`7,039,713
`7,072,964
`7,133,930
`7,167,904
`7,188,175
`7,188,180
`7,197,563
`7,353,841
`
`12/2000
`1/2001
`1/2001
`1/2001
`1/2001
`1/2001
`1/2001
`1/2001
`1/2001
`3/2001
`3/2001
`4/2001
`4/2001
`5/2001
`5/2001
`5/2001
`6/2001
`6/2001
`6/2001
`6/2001
`7/2001
`7/2001
`7/2001
`7/2001
`7/2001
`9/2001
`10/2001
`10/2001
`10/2001
`10/2001
`10/2001
`11/2001
`11/2001
`12/2001
`12/2001
`12/2001
`1/2002
`3/2002
`7/2002
`8/2002
`8/2002
`11/2002
`12/2002
`12/2002
`12/2002
`1/2003
`1/2003
`4/2003
`4/2003
`5/2003
`5/2003
`5/2003
`6/2003
`8/2003
`9/2003
`9/2003
`12/2003
`2/2004
`2/2004
`3/2004
`3/2004
`4/2004
`6/2004
`6/2004
`6/2004
`7/2004
`11/2004
`11/2004
`1/2005
`8/2005
`3/2006
`5/2006
`7/2006
`11/2006
`1/2007
`3/2007
`3/2007
`3/2007
`4/2008
`
`Chen et al.
`Fare
`Gilbrech
`Taghadoss
`Weber et al.
`Schneider et al.
`Weber et al.
`Blum et al.
`Blair et al.
`Wilson
`Naudus
`Sasyan et al.
`Douglas et al.
`Bots et al.
`Arrow et al.
`Shannon
`Basilico
`Sitaraman et al.
`Guerin et al.
`Karlsson et al.
`StrentZsch et al.
`Mogul
`Blumenau
`Sevcik
`Borella et al.
`Ramanathan et al.
`Mann et al.
`Hrastar et al.
`Valencia
`Swift
`Mighdoll et al.
`Abbott et al.
`Kirch
`Boden et al.
`Risley et al.
`McMillin et al.
`Schneider
`Borella et al.
`HerZog et al.
`Davie et al.
`Carter
`Valencia
`Beser et al.
`Johnson
`Munger et al.
`Mighdoll et al.
`Mayes et al.
`Albert et al.
`Provino
`Broadhurst
`Dillon
`Shaio et al.
`Hirst et al.
`Devine et al.
`Boden et al.
`Munger et al.
`Kruglikov et al.
`Steindl
`Shuster et al.
`Hoke et al.
`Fiveash et al.
`Boden et al.
`Wesinger, Jr. et al.
`Lull et al.
`Parekh et al.
`Sahlqvist
`Weinberger et al. .......... .. 725/76
`Larson et al.
`Larson et al.
`Rosenberg et al.
`Munger et al.
`Van Gunter et al.
`Whittle et al.
`Munger et al.
`Devarajan et al.
`McKeeth
`Larson et al.
`Sheymov et al.
`Kono et al.
`
`Petitioner Apple Inc. - Exhibit 1050, p. 2
`
`

`

`US 8,560,705 B2
`Page 3
`
`(56)
`
`References Cited
`
`U.S. PATENT DOCUMENTS
`
`8/2008 Larson et al.
`7,418,504 B2
`12/2008 Lu et al.
`7,461,334 B1
`2/2009 Munger et al.
`7,490,151 B2
`2/ 2009 Shull et al.
`7,493,403 B2
`9/2009 Dillon et al. .................... .. 726/3
`7,584,500 B2 *
`7/2010 Karr et al.
`7,764,231 B1
`7,852,861 B2 * 12/2010 Wu et al. ..................... .. 370/401
`7,921,211 B2
`4/2011 Larson et al.
`7,933,990 B2
`4/2011 Munger et al.
`8,051,181 B2 11/2011 Larson et al.
`2001/0049741 A1
`12/2001 Skene et al.
`1/ 2002 Bush
`2002/0002675 A1
`1/ 2002 Droge
`2002/0004898 A1
`10/2003 Wesinger, Jr. et al.
`2003/0196122 A1
`2004/0199493 A1
`10/2004 Ruiz et al.
`2004/0199520 A1
`10/2004 Ruiz et al.
`2004/0199608 A1
`10/ 2004 Rechterman et al.
`2004/0199620 A1
`10/2004 Ruiz et al.
`2005/0055306 A1
`3/ 2005 Miller et al.
`2005/0108517 A1*
`5/2005 Dillon et al. ................ .. 713/150
`3/ 2006 Poyhonen et al.
`2006/0059337 A1
`6/2006 Munger et al.
`2006/0123134 A1
`2007/0208869 A1
`9/ 2007 Adelman et al.
`9/2007 King et al.
`2007/0214284 A1
`2007/0266141 A1
`1 1/ 2007 Norton
`2008/0005792 A1
`1/2008 Larson et al.
`2008/0144625 A1* 6/2008 Wu et al. ..................... .. 370/392
`2008/0235507 A1
`9/2008 Ishikawa et al.
`2009/0193498 A1* 7/2009 Agarwal et al. ................. .. 726/1
`2009/0193513 A1* 7/2009 Agarwal et al.
`726/15
`2009/0199258 A1* 8/2009 Deng et al. .................. .. 725/142
`2009/0199285 A1
`8/2009 Agarwalet al.
`
`FOREIGN PATENT DOCUMENTS
`
`EP
`EP
`EP
`GB
`GB
`GB
`JP
`JP
`JP
`JP
`JP
`JP
`JP
`JP
`WO
`WO
`WO
`WO
`WO
`WO
`WO
`WO
`WO
`WO
`WO
`WO
`
`0814589
`836306
`0858189
`2317792
`2334181
`2340702
`62-214744
`04-117826
`04-363941
`09-018492
`09-270803
`10-070531
`10-111848
`10-215244
`WO9827783
`WO9843396
`WO9855930
`WO9859470
`WO9911019
`WO9938081
`WO9948303
`WO0017775
`WO0070458
`WO01/61922
`WO0116766
`WO0150688
`
`12/1997
`4/1998
`8/1998
`4/1998
`8/1999
`2/2000
`9/1987
`4/1992
`12/1992
`1/1997
`10/1997
`3/1998
`4/1998
`8/1998
`6/1998
`10/1998
`12/1998
`12/1998
`3/1999
`7/1999
`9/1999
`3/2000
`11/2000
`2/2001
`3/2001
`7/2001
`
`OTHER PUBLICATIONS
`
`ITU-T Recommendation H.225.0, “Infrastructure of Audiovisual
`ServicesiTransmission Multiplexing and Synchronization. Call
`Signaling Protocols and Media Stream Packetization for Packet
`Based Multimedia Communication systems,” International Telecom
`munication Union, pp. 1-155, Feb. 1998.
`ITU-T Recommendation H.235, “Infrastructure of Audiovisual Ser
`vicesiSystems Aspects. Security and Encryption for H-Series
`(H.323 and other H.245-based) Multimedia Terminals,” International
`Telecommunication Union, pp. 1-39, Feb. 1998.
`
`ITU-T Recommendation H.245, “Infrastructure of Audiovisual Ser
`vicesiCommunication Procedures. Control Protocol for Multime
`dia Communication,” International Telecommunication Union, pp.
`1-280, Feb. 1998.
`Request for Inter Partes Reexamination Under 35 U.S.C. § 311
`(Patent No. 8,051,181).
`Transmittal Letters (Patent No. 8,051,181).
`Exhibit X5, Droms, R., RFC 2131, “Dynamic Host Con?guration
`Protocol,” 1987.
`Cisco Comments and Petition for Reexamination 95/001,679 dated
`Jun. 14, 2012.
`Exhibit S, Declaration of Nathaniel Polish, Ph.D.
`Exhibit R, Excerpts from Patent Owner & Plaintiff VimetX Inc.’s
`First Amended P.R. 3-1 and 3-2 Disclosure of Asserted Claims and
`Infringement Contentions.
`Extended European Search Report dated Mar. 26, 2012 from Corre
`sponding European Application No. 110057932.
`Bergadano, et al., “Secure WWW Transactions Using Standard
`HTTP and Java Applets,” Proceedings of the 3rd USENIX Workshop
`on Electronic Commerce, 1998.
`Alexander Invalidity Expert Report dtd May 22, 2012 with Exhibits.
`Deposition of Peter Alexander dtd Jul. 27, 2012.
`Cisco ’151 Comments by Third Party Requester dtd Aug. 17, 2012
`with Exhibits.
`Cisco ’ 15 1 Petition to Waive Page Limit Requirement for Third Party
`Comments dtd Aug. 17,2012.
`Deposition of Stuart Stubblebine dtd Aug. 22, 2012.
`Defendants’ Motion for Reconsideration of the Construction of the
`Term “Secure Communication Link,” 7 pages, Jun. 2012.
`Green, “Cisco Leverages Altiga Technology for VPN’s,” 2 pages,
`2000 http://www.crn.com/news/channel-programs/l 8807923/cisco
`leverages-altiga-technology-for-vpns.htrn.
`Altiga Networks Archived at
`http://webarchiveorg/web/
`20000823023437/http:/www.altiga.com/products/
`1999
`and
`Retrieved by the Wayback Machine.
`Kiuchi, “C-HTTP The Development of a Secure, Closed HTTP
`Based Network on the Internet,” Department of Epidemiology and
`Biostatistics, Faculty of Medicine, University of Tokyo, Japan.
`Third Party Requester Comments dated Jun. 25, 2012iAfter Non
`Final Of?ce Action (US. Appl. No. 95/001,788).
`Reexam Af?davit/Declaration/ Exhibit Filed by 3rd Party on Jun. 25,
`2012 (US. Appl. No. 95/001,788).
`Hopen Transcript dated Apr. 11, 2012.
`VirnetX Claim Construction Opinion.
`Declaration of Angelos D. Keromytis, Ph.D.
`Declaration of Dr. Robert Dunham Short III.
`Exhibit A-1, Verdict Form from I/l/"netX, Inc. v. Microsoft Corp, No.
`6:07-CV-80 (E.D. Tex.).
`Exhibit A-3, Declaration of Jason Nieh, Ph.D. (US. Appl. No.
`95/001,269).
`Exhibit A-4, Redacted Deposition of Chris Hopen from I/l/"netX, Inc.
`v. Cisco Systems, Inc., No. 6:07-CV 417 (ED. Tex. Apr. 11, 2012).
`Exhibit B-l, Excerpt from Deposition of Defense FY 2000/2001
`Biennial Budget Estimates, (Feb. 1999).
`Exhibit B-2, Collection of Reports and Presentations on DARPA
`Projects.
`Exhibit B-3, Maryann Lawlor, Transient Partnerships Stretch Secu
`rity Policy Management, Signal Magazine (Sep. 2001) http://www.
`afcea.org/signal/articles/anmviewer.asp?a?l94&print:yes.
`Joel Snyder, Living in Your Own Private Idaho, Network World (Jan.
`28, 1998) http://www.networkworld.com/intranet/0126review.html.
`Time Greene, CEO’s Chew the VPN Fat, CNN.com (Jun. 17, 1999),
`http://www. cnn.com/ TECH/ computing/ 9906/ 1 7/vpnfat.ent.idg/ in
`dex.html?iref:allsearch.
`Lee et al., “Uniform Resource Locators (URL),” Network Working
`Group, RFC 1738, Dec. 1994 (25 pages).
`VPN 3000 Concentrator Series, User Guide; Release 2.5 Jul. 2000
`(489 pages).
`VPN 3000 Concentrator Series, Getting Started; Release 2.5 Jul.
`2000 (122 pages).
`Fratto, Altiga Concentrates on VPN Security (Hardware Review
`Evaluation), Network Computing, Mar. 22, 1999 (2 pages).
`
`Petitioner Apple Inc. - Exhibit 1050, p. 3
`
`

`

`US 8,560,705 B2
`Page 4
`
`(56)
`
`References Cited
`
`OTHER PUBLICATIONS
`
`Response to RFP: Altiga, Network World Fusion, May 10, 1999 (7
`pages).
`Altiga Proves Multi-Vendor Interoperability for Seamless VPN
`Deployment; VPN Workshop Marks Signi?cant Development in the
`VPN Market, Jul. 12, 1999 (2 pages).
`Altiga VPN Concentrator Series (C50) Versus Nortel Networks
`Contivity Extranet Switch 4000 and 4500, VPN Tunneling competi
`tive Evaluation, 1999 (6 pages).
`VPN 3000 Client User Guide, Release 2.5, Jul. 2000 (94 pages).
`Digital Certi?cates Design Speci?cation for Release 2.0, May 17,
`1999 (21 pages).
`Altiga IPSec Client Architecture, Revision 1.0, Apr. 5, 1999 (34
`pages).
`Altiga IPSec Functional Speci?cation, Revision 2.1, (17 pages).
`Altiga Product Requirements, Revision 1.7, May 26, 1998 (17
`pages).
`Altiga Network Lists Feature Functional Speci?cation, Revision 1.0,
`(7 pages).
`Altiga Split Tunneling Functional/Design Speci?cation, (15 pages).
`Altiga Digital Certi?cate Support for IPSec Client V2.1 Functional
`Speci?cation, Aug. 12, 1999 (24 pages).
`Altiga IPSec LAN to LAN Tunnel Autodiscovery Functional Speci
`?cation, (5 pages).
`Altiga Split Tunneling Testplan, Revision 1.0, (8 pages).
`Altiga VPN Concentrator Getting Started, Revision 1, Mar. 1999
`(116 pages).
`Altiga VPN Concentrator Getting Started, Version 2, Jun. 1999 (102
`pages).
`Altiga VPN Concentrator Getting Started, Version 3, Dec. 1999 (130
`pages).
`Altiga VPN Concentrator Getting Started, Version 4, Mar. 2000 (138
`pages).
`Altiga VPN Concentrator User Guide, Revision 1, Mar. 1999 (304
`pages).
`Altiga VPN Concentrator User Guide, Revision 1.1, Mar. 1999 (304
`pages).
`Altiga VPN Concentrator User Guide, Version 3, Jun. 1999 (478
`pages).
`Altiga VPN Concentrator User Guide, Version 4, Dec. 1999 (472
`pages).
`Altiga VPN Concentrator User Guide, Version 5, Mar. 2000 (606
`pages).
`Altiga VPN Client Installation and User Guide, Version 2, Jul. 1999
`(92 pages).
`Altiga VPN Concentrator VPN Client Installation and User Guide,
`Version 3, Dec. 1999 (113 pages).
`Altiga VPN Concentrator VPN Client Installation and User Guide,
`Version 4, Mar. 2000 (118 pages).
`Altiga Networks VPN Concentrator and VPN Client, as well as their
`Public Demonstrations and Testing, are also Described in Marketing
`Materials and Publications (4 pages).
`Peter Alexander Invalidity Report.
`Defendants’ Second Supplemental Joint Invalidity Contentions.
`Exhibit 118A, Altiga VPN System vs. Claims of the '135 Patent.
`Exhibit 119A, Altiga VPN System vs. Claims of the '15] Patent.
`Exhibit 120A, Altiga VPN System vs. Claims of the '180 Patent.
`Exhibit 121A, Altiga VPN System vs. Claims of the '21] Patent.
`Exhibit 122A, Altiga VPN System vs. Claims of the '504 Patent.
`Exhibit 123A, Altiga VPN System vs. Claims of the '759 Patent.
`Exhibit 12A, SSL 3.0 vs. Claims ofthe '135 Patent.
`Exhibit 13A, SSL 3.0 vs. Claims ofthe '504 Patent.
`Exhibit 14A, SSL 3.0 vs. Claims ofthe '21] Patent.
`Exhibit 228A, Understanding OSF DCE 1 . 1 for AIX and OS/Z
`(APPiVX0556531-804) vs. Claims ofthe '135 Patent.
`Exhibit 229A, Understanding OSF DCE 1 . 1 for AIX and OS/Z
`(APPiVX0556531-804) vs. Claims ofthe '15] Patent.
`Exhibit 230A, Understanding OSF DCE 1 . 1 for AIX and OS/Z
`(APPiVX0556531-804) vs. Claims ofthe '180 Patent.
`
`Exhibit 231A, Understanding OSF DCE 1.1 for AIX and OS/Z
`(APPiVX0556531-804) vs. Claims ofthe '21] Patent.
`Exhibit 232A, Understanding OSF DCE 1.1 for AIX and OS/Z
`(APPiVX0556531-804) vs. Claims ofthe '504 Patent.
`Exhibit 233A, Understanding OSF DCE 1.1 for AIX and OS/Z
`(APPiVX0556531-804) vs. Claims ofthe '759 Patent.
`Exhibit 255, Schulzrinne vs. Claims of the '135 Patent.
`Exhibit 256, Schulzrinne vs. Claims of the '504 Patent.
`Exhibit 257, Schulzrinne vs. Claims of the '21] Patent.
`Exhibit 258, Schulzrinne vs. Claims of the '15] Patent.
`Exhibit 259, Schulzrinne vs. Claims of the '180 Patent.
`Exhibit 260, Schulzrinne vs. Claims of the '759 Patent.
`Exhibit 261, SSL 3.0 vs. Claims ofthe '15] Patent.
`Exhibit 262, SSL 3. 0 vs. Claims of the '759 Patent.
`Exhibit 263, Wang vs. Claims of the '135 Patent.
`Wang vs. Claims of the '504 Patent.
`Wang vs. Claims of the '21] Patent.
`Exhibit 1, Alexander CV.pdf.
`Exhibit 2, Materials Considered by Peter Alexander.
`Exhibit 3, Cross Reference Chart.
`Exhibit 4, RFC 2543 vs. Claims ofthe '135 Patent.
`Exhibit 5, RFC 2543 vs. Claims ofthe '504 Patent.
`Exhibit 6, RFC 2543 vs. Claims ofthe '21] Patent.
`Exhibit 7, The Schulzrinne Presentation vs. Claims of the '135
`Patent.
`Exhibit 8, The Schulzrinne Presentation vs. Claims of the '5 04
`Patent.
`Exhibit 9, The Schulzrinne Presentation vs. Claims of the '21]
`Patent.
`Exhibit 10, The Schulzrinne Presentation vs. Claims of the '15]
`Patent.
`Exhibit 11, The Schulzrinne Presentation vs. Claims of the '180
`Patent.
`Exhibit 12, The Schulzrinne Presentation vs. Claims of the '759
`Patent.
`Exhibit 13, SSL 3.0 vs. Claims ofthe '135 Patent.
`Exhibit 14, SSL 3.0 vs. Claims ofthe '504 Patent.
`Exhibit 15, SSL 3.0 vs. Claims ofthe '21] Patent.
`Exhibit 16, SSL 3.0 vs. Claims ofthe '15] Patent.
`Exhibit 17, SSL 3.0 vs. Claims ofthe '759 Patent.
`Exhibit 18, Kiuchi vs. Claims of the '135 Patent.
`Exhibit 19, Kiuchi vs. Claims of the '504 Patent.
`Exhibit 20, Kiuchi vs. Claims of the '21] Patent.
`Exhibit 21, Kiuchi vs. Claims of the '15] Patent.
`Exhibit 22, Kiuchi vs. Claims of the '180 Patent.
`Exhibit 23, Kiuchi vs. Claims of the '759 Patent.
`Exhibit 24, US. Patent No. 6,119,234 (hereinafter “Aziz”) and RFC
`2401 vs. Claims ofthe '135 Patent.
`Exhibit 25, US. Patent No. 6,119,234 (hereinafter “Aziz”) and RFC
`24012 vs. Claims ofthe '504 Patent.
`Exhibit 26, US. Patent No. 6,119,234 (hereinafter “Aziz”) and RFC
`2401 vs. Claims of the '21] Patent.
`Exhibit 27, US. Patent No. 6,119,234 (hereinafter “Aziz”) and RFC
`2401 vs. Claims ofthe '15] Patent.
`Exhibit 28.
`Exhibit 29, The Altiga System vs. Claims ofthe '135 Patent.
`Exhibit 30, The Altiga System vs. Claims of the '5 04 Patent.
`Exhibit 31, The Altiga System vs. Claims of the '21] Patent.
`Exhibit 32, The Altiga System vs. Claims of the '759 Patent.
`Exhibit 33, US. Patent No. 6,496,867 (“Beser”) and RFC 2401 vs.
`Claims of the '135 Patent.
`Exhibit 34, US. Patent No. 6,496,867 (“Beser”) and RFC 2401 vs.
`Claims of the '504 Patent.
`Exhibit 35, US. Patent No. 6,496,867 (“Beser”) and RFC 2401 vs.
`Claims of the '21] Patent.
`Exhibit 36, US. Patent No. 6,496,867 (“Beser”) and RFC 2401 vs.
`Claims of the '15] Patent.
`Exhibit 37, US. Patent No. 6,496,867 (“Beser”) and RFC 2401 vs.
`Claims of the '180 Patent.
`Exhibit 38, Kent vs. Claims ofthe '759 Patent.
`Exhibit 39, RFC 2538, Storing Certi?cates in the Domain Name
`System (DNS) vs. Claims of the '504 Patent.
`
`Petitioner Apple Inc. - Exhibit 1050, p. 4
`
`

`

`US 8,560,705 B2
`Page 5
`
`(56)
`
`References Cited
`
`OTHER PUBLICATIONS
`
`Exhibit 40, RFC 2538, Storing Certi?cates in the Domain Name
`System (DNS) vs. Claims of the '21] Patent.
`Exhibit 41, Aziz (’646) vs. Claims ofthe '759 Patent.
`Exhibit 42, The PIXFireWall vs. Claims ofthe '759 Patent.
`Exhibit A-1, Kiuchi vs. Claims of the '135 Patent.
`Exhibit B-1, Kiuchi vs. Claims ofthe '21] Patent.
`Exhibit C-1, Kiuchi vs. Claims of the '504 Patent.
`Exhibit D, Materials Considered.
`Exhibit E, Expert Report of Stuart G. Stubblebine, PhD.
`Exhibit F, Expert Report of Stuart G. Stubblebine, Ph.D.
`Exhibit G, Opening Expert Report of Dr. Stuart Stubblebine Regard
`ing Invalidity ofthe ’135, ’211, and ’504 Patents.
`U.S. Appl. No. 09/399,753, ?led Sep. 22, 1998, Graig Miller et al.
`US. Appl. No. 60/134,547, ?led May 17, 1999, Victory Sheyrnov.
`U.S. Appl. No. 60/151,563, ?led Aug. 31, 1999, Bryan Whittles.
`Alan 0. Frier et al., “The SSL Protocol Version 3.0”, Nov. 18, 1996,
`printed from http://www.netscape.com/eng/ss13/ draft302.txt on
`Feb. 4, 2002, 56 pages.
`August Bequai, “Balancing Legal Concerns Over Crime and Security
`in Cyberspace”, Computer & Security, vol. 17, No. 4, 1998, pp.
`293-298.
`D. B. Chapman et al., “Building Internet Firewalls”, Nov. 1995, pp.
`278-375.
`D. Clark, “US Calls for Private Domain-Name System”, Computer,
`IEEE Computer Society, Aug. 1, 1998, pp. 22-25.
`Davila J et al, “Implementation of Virtual Private Networks at the
`Transport Layer”, Information Security, Second International Work
`shop, ISW’99. Proceedings (Lecture Springer-Verlag Berlin, Ger
`many, [Online] 1999, pp. 85-102, XP002399276, ISBN 3-540-666.
`Dolev, Shlomi and Ostrovsky, Ra?l, “Ef?cient Anonymous Multicast
`and Reception” (Extended Abstract), 16 pages.
`Donald E. Eastlake, 3rd, “Domain Name System Security Exten
`sions”, Internet Draft, Apr. 1998, pp. 1-51.
`F. Halsall, “Data Communications, Computer Networks and Open
`Systems”, Chapter 4, Protocol Basics, 1996, pp. 198-203.
`Glossary for the Linux FreeS/WAN project, printed from http://
`liberty.freeswan.org/freeswanitrees/freeswan-1.3/
`doc/ glossary.
`html on Feb. 21, 2002, 25 pages.
`J. Gilmore, “Swan: Securing the Internet against Wiretapping”,
`printed from http://liberty.freeswan.org/freeswanitrees/freeswan-1 .
`3/doc/rationale.html on Feb. 21, 2002, 4 pages.
`James E. Bellaire, “New Statement of Rules-Naming Internet
`Domains”, Internet Newsgroup, Jul. 30, 1995, 1 page.
`Jim Jones et al., “Distributed Denial of Service Attacks: Defenses”,
`Global Integrity Corporation, 2000, pp. 1-14.
`Laurie Wells (LANCASTERBIBELMAIL MSN COM); “Subject:
`Security Icon” USENET Newsgroup, Oct. 19, 1998, XP002200606,
`1 page.
`Linux FreeS/WAN Index File, printed from http://liberty.freewan.
`org/freeswanitrees/freeswan-1.3/doc/ on Feb. 21, 2002, 3 Pages.
`P. Srisuresh et al., “DNS extensions to Network address Translators
`(DNSiALG)”, Internet Draft, Jul. 1998, pp. 1-27.
`Reiter, Michael K. and Rubin, Aviel D. (AT&T LabsiResearch),
`“Crowds: Anonymity for Web Transactions”, pp. 1-23.
`RFC 2401 (dated Nov. 1998) Security Architecture for the Internet
`Protocol (RTP).
`RFC 2543-SIP (dated Mar. 1999): Session Initiation Protocol (SIP or
`SIPS).
`Rich Winkel, “CAQ: Networking With Spooks: The NET & The
`Control of Information”, Internet Newsgroup, Jun. 21, 1997, 4 pages.
`Rubin, Aviel D., Geer, Daniel, and Ranum, Marcus J. (Wiley Com
`puter Publishing), “Web Security Sourcebook”, pp. 82-94.
`Search Report (dated Aug. 20, 2002), International Application No.
`PCT/US01/04340.
`Search Report (dated Aug. 23, 2002), International Application No.
`PCT/US01/13260.
`Search Report (dated Oct. 7, 2002), International Application No.
`PCT/US01/13261.
`
`Search Report, IPER (dated Nov. 13, 2002), International Applica
`tion No. PCT/USO 1/ 04340.
`Search Report, IPER (dated Feb. 6, 2002), International Application
`No. PCT/US01/13261.
`Search Report, IPER (dated Jan. 14, 2003), International Application
`No. PCT/US01/13260.
`Shankar, A.U. “A veri?ed sliding window protocol with variable ?ow
`control”. Proceedings of ACM SIGCOMM conference on Commu
`nications architectures & protocols. pp. 84-91, ACM Press, NY, NY
`1986.
`Shree Murthy et al., “Congestion-Oriented Shortest Multi-path Rout
`ing”, Proceedings of IEEE INFOCOM, 1996, pp. 1028-1036.
`W. Stallings, “Cryptography and Network Security”, 2nd, Edition,
`Chapter 13, IP Security, Jun. 8, 1998, pp. 399-440.
`Microsoft Corporation’s Fourth Amended Invalidity Contentions
`dated Jan. 5, 2009, J/lrnetX Inc. and Science Applications Interna
`tional Corp. v. Microsoft Corporation.
`Appendix A of the Microsoft Corporation’s Fourth Amended Inval
`idity Contentions dated Jan. 5, 2009.
`Concordance Table for the References Cited in Tables on pp. 6-15,
`71-80 and 116-124 of the Microsoft Corporation’s Fourth Amended
`Invalidity Contentions dated Jan. 5, 2009.
`1. P. Mockapetris, “DNS Encoding of Network Names and Other
`Types,” Network Working Group, RFC 1101 (Apr. 1989) RFC1101,
`DNS SRV).
`R. Atkinson, “An Internetwork Authentication Architecture,” Naval
`Research Laboratory, Center for High Assurance Computing Sys
`tems (Aug. 5, 1993). (Atkinson NRL, KX Records).
`Henning SchulZrinne, Personal Mobility For Multimedia Services In
`The Internet, Proceedings of the Interactive Distributed Multimedia
`Systems and Services European Workshop at 143 (1996).
`(SchulZrinne 96).
`Microsoft Corp., Microsoft J/lrtual Private Networking.‘ Using Point
`to-Point Tunneling Protocol for Low-Cost, Secure, Remote Access
`Across the Internet (1996) (printed from 1998 PDC DVD-ROM).
`(Point to Point, Microsoft Prior Art VPN Technology).
`“Safe Sur?ng: How to Build a Secure World Wide Web Connection,”
`IBM Technical Support Organization, (Mar. 1996). (Safe Sur?ng,
`Website Art).
`Goldschlag, et al., “Hiding Routing Information,” Workshop on
`Information Hiding, Cambridge, UK (May 1996). (Goldschlag II,
`Onion Routing).
`“IPSec Minutes From Montreal”, IPSEC Working Group Meeting
`Notes,
`http://www.sandleman.ca/ipsec/1996/08/msg00018.html
`(Jun. 1996). (IPSec Minutes, FreeS/WAN).
`J. M. Galvin, “Public Key Distribution with Secure DNS,” Proceed
`ings of the Sixth USENIX UNIX Security Symposium, San Jose,
`California, Jul. 1996. (Galvin, DNSSEC).
`J. Gilmore, et al. “Re: Key Management, anyone? (DNS Keying),”
`IPSec Working Group Mailing List Archives (Aug. 1996). (Gilmore
`DNS, FreeS/WAN).
`H. Orman, et al. “Re: ’Re: DNS? was Re: Key Management, any
`one?” IETF IPSec Working Group Mailing List Archive (Aug. 1996
`Sep. 1996). (Orman DNS, FreeS/WAN).
`Arnt Gulbrandsen & PaulVixie, A DNS RR for specifying the location
`ofservices (DNS SRV), IETF RFC 2052 (Oct. 1996). (RFC 2052,
`DNS SRV).
`Freier, et al. “The SSL Protocol Version 3.0,” Transport Layer Secu
`rity Working Group (Nov. 18, 1996). (SSL, Underlying Security
`Technology).
`M. Handley, H. SchulZrinne, E. Schooler, Internet Engineering Task
`Force, Internet Draft, (Dec. 2, 1996). (RFC 2543 Internet Draft 1).
`MG. Reed, et al. “Proxies for Anonymous Routing,” 12th Annual
`Computer Security Applications Conference, San Diego, CA, Dec.
`9-13, 1996. (Reed, Onion Routing).
`Kenneth F. Alden & Edward P. Wobber, T heAlta J/lsta Tunnel .' Using
`theInternet to Extend Corporate Networks, Digital Technical Journal
`(1997) (Alden, AltaVista).
`Automotive Industry Action Group, “ANX Release 1 Document Pub
`lication,” AIAG (1997). (AIAG, ANX).
`Automotive Industry Action Group, “ANX Release 1 Draft Docu
`ment Publication,” AIAG Publications (1997). (AIAG Release,
`ANX).
`
`Petitioner Apple Inc. - Exhibit 1050, p. 5
`
`

`

`US 8,560,705 B2
`Page 6
`
`(56)
`
`References Cited
`
`OTHER PUBLICATIONS
`
`Aventail Corp. “Aventail VPN Data Sheet,” available at http://www.
`archive.org/web/ l99702l20l3043/www.aventail.com/prod/
`vpndata.html (1997). (Data Sheet, Aventail).
`Aventail Corp., “Directed VPN Vs. Tunnel,” available at http://web.
`archive.org/web/ 199706200303 1 2/www.aventail.com/educate/
`directvpnhtml (1997). (Directed VPN, Aventail).
`Aventail Corp., “Managing Corporate Access to the Internet,”
`Aventail AutoSOCKS White Paper available at http://webarchive.
`org/1997062003003 l2/www.aventail.com/educate/whitepaper/
`ipmw.html (1997). (Corporate Access, Aventail).
`Aventail Corp., “VPN Server V2.0 Administration Guide,” (1997).
`(VPN, Aventail).
`Goldschlag, et al. “Privacy on the Internet,” Naval Research Labo
`ratory, Center for High Assurance Computer Systems (1997).
`(Goldschtag I, Onion Routing).
`Microsoft Corp., Installing Con?guring and Using PPTP with
`Microsoft Clients and Servers (1997). (Using PPTP, Microsoft Prior
`Art VPN Technology).
`Microsoft Corp., IP Security for Microsoft Windows NT Server 5. 0
`(1997) (printed from 1998 PDC DVD-ROM). (IP Security, Microsoft
`Prior Art VPN Technology).
`Microsoft Corp., Microsoft Windows N T Active Directory.‘ An Intro
`duction to the Next Generation Directory Services (1997) (printed
`from 1998 PDC DVD-ROM). (Directory, Microsoft Prior Art VPN
`Technology).
`Microsoft Corp., Routing and Remote Access Service for Windows
`NT Server New Opportunities Today and Looking Ahead (1997)
`(printed from 1998 PDC DVD-ROM). Routing, Microsoft Prior Art
`VPN Technology).
`Microsoft Corp., Understanding Point-to-Point Tunneling Protocol
`PPTP (1997) (printed from 1998 PDC DVD-ROM). (Understanding
`PPTP, Microsoft Prior Art VPN Technology).
`J. Mark Smith et.al., Protecting a Private Network.‘ The AltaJTlsta
`Firewall, Digital Technical Journal (1997). (Smith, AltaVista).
`Naganand Doraswamy Implementation of Wrtual Private Networks
`(VPNs) with IPSecurity, <draft-ietf-ipsec-vpn-00.tXt> (Mar. 12,
`I997). (Doraswamy).
`M. Handley, H. SchulZrinne, E. Schooler, Internet Engineering Task
`Force, Internet Draft, (Mar. 27, 1997). (RFC 2543 Internet Draft 2).
`Aventail Corp., “Aventail and Cybersafe to Provide Secure Authen
`tication for Internet and Intranet Communication,” Press Release,
`Apr. 3, 1997. (Secure Authentication, Aventail).
`D. Wagner, et al. “Analysis ofthe SSL 3.0 Protocol,” (Apr. 15, 1997).
`(Analysis, Underlying Security Technologies).
`Automotive Industry Action Group, “ANXO Certi?cation Authority
`Service and Directory Service De?nition for ANX Release 1,” AIAG
`Telecommunications Project Team and Bellcore (May 9, I997).
`(AIAG De?nition, ANX).
`Automotive Industry Action Group, “ANXO Certi?cation Process
`and ANX Registration Process De?nition for ANX Release 1,” AIAG
`Telecommunications Project Team and Bellcore (May 9, I997).
`(AIAG Certi?cation, ANX).
`Aventail Corp., “Aventail Announces the First VPN Solution to
`Assure

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket