throbber
IN THE UNITED STATES PATENT AND TRADEMARK OFFICE
`
`PATENT
`
`Inventor:
`
`Edward Balassanian
`
`Serial Number: Unknown
`
`Filing Date:
`
`June 6, 2013
`
`Title: METHOD AND SYSTEM FOR
`DATA DEMULTIPLEXING
`
`Atty.Dkt.No.:
`
`6743-00105
`
`Examiner:
`
`Unknown
`
`Group/ Art Unit: Unknown
`
`Conf. No.:
`
`Unknown
`
`****CERTIFICATE OF E-FILING TRANSMISSION****
`
`I hereby certify that this correspondence is being transmitted
`via electronic filing to the United States Patent and
`Trademark Office on the date shown below:
`
`On: June 6, 2013
`Date
`
`/Dean M. Munyon/
`Dean M. Munyon,# 42,914
`















`
`PRELIMINARY AMENDMENT
`
`Please enter the following preliminary amendment in the above-captioned case.
`
`Please amend the case as listed below.
`
`Page 1 of 21
`
`Juniper Ex. 1004-p. 1
`Juniper v Implicit
`
`

`

`IN THE SPECIFICATION:
`
`Please amend the specification by replacing the first paragraph after the title with the
`
`following amended paragraph:
`
`[0001] +his- The present application is a continuation of U.S. patent application Ser. Aiml. No.
`13/236,090, filed September 19, 2011, which is a continuation of US. Appl. No. 10/636,314,
`
`filed August 6, 2003 (now U.S. Patent No. 8,055,786), titled Method and System: for Data
`
`Dem:ultiplmcing, for all purposes including but not limited to the right of priority and benefit of
`
`earlier filing date, and mcpressly incorporates by reference the entire content of Patent
`
`l\pplication Serial No.10/636,314 for all purposes. U.S. patent application Ser. No.10/636,314
`
`which is a continuation of U.S. Appl. patent application Ser. No. 09/474,664, filed December 29,
`
`1999 (now U.S. Patent No. 6,629,163);, filed December 29, 1999, titled Method and System: for
`
`Dem:ultiplmcing a First Sequence of Packet Components to Identify Specific Components
`
`:\!/herein Subsequent Components l\re Processed 'Nithout Re Identifying Components. This
`
`application claims the benefit of the follmving applications for all purposes including but not
`
`limited to the right of priority and benefit of earlier filing date, and mcpressly incorporates by
`
`reference the entire content of the follo1tving applications for all purposes: U.S. patent application
`
`Ser. No. 10/636,314; and U.S. patent application Ser. No. 09/474,664 the disclosures of each of
`
`the above-referenced applications are incorporated by reference herein in their entireties.
`
`Page 2 of 21
`
`Juniper Ex. 1004-p. 2
`Juniper v Implicit
`
`

`

`IN THE CLAIMS:
`
`The following is a current listing of claims and will replace all prior versions and listings
`
`of claims in the application. Please amend the claims as follows:
`
`1-25. (Canceled)
`
`26.
`
`(New) An apparatus, comprising:
`
`a processing unit; and
`
`a memory storing instructions executable by the processing unit to:
`
`create, based on an identification of information in a packet of a message, a path
`
`that includes a sequence of routines for processing packets in the message; and
`
`process packets in the message using the sequence of routines in the created path,
`
`wherein the sequence includes a routine that is used to execute a Transmission Control Protocol
`
`(TCP) to convert packets having a TCP format into a different format.
`
`27.
`
`(New) The apparatus of claim 26, wherein the sequence includes:
`
`a second routine that is used to execute a second, different protocol to convert packets of the
`
`different format into another format; and
`
`a third routine that is used to execute a third, different protocol to further convert the
`
`packets.
`
`28.
`
`(New) The apparatus of claim 27, wherein the second protocol is an Internet Protocol (IP)
`
`and the third protocol is an Ethernet Protocol.
`
`29.
`
`(New) The apparatus of claim 26, wherein the memory stores instructions executable by
`
`the processing unit to maintain state information associated with one or more routines in the
`
`sequence of routines, and wherein the state information is specific to the message.
`
`30.
`
`(New) The apparatus of claim 26, wherein the sequence of routines includes a routine
`
`that is executable to process the packets without converting a format of the packets.
`
`Page 3 of 21
`
`Juniper Ex. 1004-p. 3
`Juniper v Implicit
`
`

`

`31.
`
`(New) The apparatus of claim 26, wherein the routine is not executable to convert
`
`packets having the different format, and wherein the different format is an Internet Protocol (IP)
`
`format.
`
`32.
`
`(New) The apparatus of claim 26, wherein the memory stores instructions executable by
`
`the processing unit to identify an address associated with the information, wherein the address
`
`indicates the routines in the sequence of routines of the created path.
`
`33.
`
`(New) A non-transitory, computer-readable medium comprising software instructions for
`
`processmg a message, wherein the software instructions, when executed, cause a computer
`
`system to:
`
`obtain information from an initial packet of the message;
`
`use the obtained information to identify an address comprising a list of conversion
`
`routines;
`
`create a path that includes a sequence of sessions, wherein sessions in the sequence
`
`include respective ones of the conversion routines in the list;
`
`store the created path; and
`
`process packets of the message by routing packets through sessions in the created path,
`
`including:
`
`a session in which a transport layer protocol is executed to convert packets in a
`
`transport layer format into a different format; and
`
`another session in which a different protocol corresponding to the different format
`
`is executed.
`
`34.
`
`(New) The medium of claim 33, wherein one or more of the sessions comprises state
`
`information for one or more of the conversion routines, and wherein the state information is
`
`specific to the message.
`
`35.
`
`(New) The medium of claim 33, wherein the different protocol is associated with a layer
`
`selected from the group consisting of an application layer and a network layer.
`
`Page 4 of 21
`
`Juniper Ex. 1004-p. 4
`Juniper v Implicit
`
`

`

`36.
`
`(New) The medium of claim 33, wherein at least one of the routines associated with at
`
`least one of the sessions is not used to convert the packets.
`
`37.
`
`(New) The medium of claim 33, wherein the transport layer protocol is a Transmission
`
`Control Protocol (TCP).
`
`38.
`
`(New) The medium of claim 37, wherein the message comprises a stream of data.
`
`39.
`
`(New) The medium of claim 33, wherein using the obtained information to identify the
`
`address includes determining a plurality of protocols by analyzing headers of the initial packet,
`
`and wherein the plurality of protocols includes protocols executable at the transport layer and an
`
`application layer.
`
`40.
`
`(New) The medium of claim 33, wherein the different format is not compatible with the
`
`transport layer protocol, and wherein the different format is a network layer format.
`
`41.
`
`(New) An apparatus, comprising:
`
`a processing unit; and
`
`memory storing instructions that are executable by the processing unit to:
`
`obtain and analyze information from a packet of a message;
`
`identify an address based on the obtained information, wherein the address comprises a
`
`list of routines;
`
`create a sequence of sessions, wherein sessions in the sequence are associated with
`
`respective ones of the routines in the list; and
`
`process packets of the message using the sequence, wherein one of the sessions in the
`
`sequence is associated with a particular routine that is used to execute a protocol to convert the
`
`packets from an input format to an output format, wherein the particular routine is not executable
`
`to convert packets having the output format.
`
`42.
`
`(New) The apparatus of claim 41, wherein a different session is associated with a
`
`different routine that is used to execute a second, different protocol to convert the packets from
`
`the output format to a different output format, and wherein another session is associated with
`
`Page 5 of 21
`
`Juniper Ex. 1004-p. 5
`Juniper v Implicit
`
`

`

`another routine that is used to execute a third, different protocol corresponding to the different
`
`output format.
`
`43.
`
`(New) The apparatus of claim 42, wherein the protocols include a Transmission Control
`
`Protocol (TCP), an Internet Protocol (IP), and an Ethernet Protocol.
`
`44.
`
`(New) The apparatus of claim 41, wherein at least one of the sessions is associated with a
`
`routine that is executable to process packets of the message without converting the packets.
`
`45.
`
`(New) The apparatus of claim 41, wherein the particular routine is executable to convert
`
`packets by removing an outermost header of the packets.
`
`46.
`
`(New) The apparatus of claim 41, wherein the protocol is a transport layer protocol.
`
`47.
`
`(New) The apparatus of claim 46, wherein the transport layer protocol is a Transmission
`
`Control Protocol (TCP), and wherein the message comprises a stream of data.
`
`48.
`
`(New) The apparatus of claim 41, wherein the obtained information includes information
`
`from headers of the packet that are associated with a network layer and a transport layer.
`
`49.
`
`(New) The apparatus of claim 48, wherein the memory stores instructions executable by
`
`the processing unit to maintain state information associated with one or more routines in the
`
`sequence of sessions, and wherein the state information is specific to the message.
`
`50.
`
`(New) A non-transitory, computer-readable medium comprising program instructions
`
`executable by a computer system to:
`
`identify information from different headers associated with various layers of a packet of a
`
`message;
`
`create, using the identified information, a sequence of sessions of routines; and
`
`process packets of the message, including by removing an outermost header of a given
`
`packet using a first session corresponding to a protocol in a first layer and by removing the
`
`resulting outermost header using a second session corresponding to a different protocol in a
`
`different layer.
`
`Page 6 of 21
`
`Juniper Ex. 1004-p. 6
`Juniper v Implicit
`
`

`

`51.
`
`(New) The medium of claim 50, wherein the protocol in the first layer is a Transmission
`
`Control Protocol (TCP), and the message comprises a stream of data.
`
`52.
`
`(New) The medium of claim 50, wherein the protocol in the first layer is a transport layer
`
`protocol and the different protocol in the different layer is an application layer protocol.
`
`53.
`
`(New) The medium of claim 50, wherein processing packets of the message further
`
`includes removing the resulting outermost header using a third session corresponding to another
`
`protocol in another layer, and wherein the layers include a network layer, a transport layer, and
`
`an application layer.
`
`54.
`
`(New) The medium of claim 50, wherein at least one of the routines associated with at
`
`least one of sessions is not used to remove a header of the packets.
`
`55.
`
`(New) The medium of claim 50, wherein the outermost header has a format that is
`
`incompatible with a format of the resulting outermost header, and wherein the outermost header
`
`is associated with a network layer protocol.
`
`Page 7 of 21
`
`Juniper Ex. 1004-p. 7
`Juniper v Implicit
`
`

`

`REMARKS:
`
`Claims 1-25 were pending in this application. Claims 1-25 have been canceled. Claims
`
`26-55 have been added. Therefore, claims 26-55 are now pending in this application.
`
`Reexaminations of Related Cases
`
`Three reexaminations have been filed against cases related to the present case.
`
`In
`
`reexamination Control No. 90/010,356, ex parte reexamination was ordered on January 17, 2009,
`
`against U.S. Patent No. 6,629,163, which issued from the great-grandparent application of the
`
`present case. That reexamination largely concerned the reference "Scout: A Path-Based
`
`Operating System" by David Mosberger. In that proceeding, Patent Owner amended the claims
`
`to distinguish over Mosberger, resulting in a reexamination certificate being issued for the '163
`
`patent on June 22, 2010.
`
`In reexamination Control No. 95/000,659, inter partes reexamination was ordered against
`
`the '163 patent on April 3, 2012. Rejections in that proceeding, which is still pending, are
`
`largely based on the reference "Router Plugins: A Software Architecture for Next Generation
`
`Routers," by Dan Decasper et al. Similarly, in reexamination Control No. 95/000,660, an inter
`
`partes reexamination was ordered on May 10, 2012, for U.S. Patent No. 7,711,857, which issued
`
`from a continuation of the grandparent of the present application. Rejections in that proceeding,
`
`which remains pending, are also based on Decasper.
`
`Applicant plans to submit an Information Disclosure Statement in this application that
`
`includes Mosberger, Decasper, and other references from the above-noted reexaminations and
`
`the related litigations. The claims in this application are believed to distinguish over Mosberger
`
`and Decasper for at least the reasons set forth below.
`
`Page 8 of 21
`
`Juniper Ex. 1004-p. 8
`Juniper v Implicit
`
`

`

`

`

`

`

`See id. As its prototype suggests, a path is created by invoking the "pa thCrea te" software
`function on a module "m" with an attribute set1 "a." See id. Notably, the "pa thCrea te"
`
`software function does not take a message as a parameter, showing that the paths are created
`
`independently of the messages. See id.
`
`The "pa thCrea te" software function eventually invokes the "ere a teStage"
`
`software function, which has the following prototype:
`
`Stage
`
`(*CreateStageFunc)
`
`(Module m,
`
`int s, Attrs a, ModuleLink*
`
`n);
`
`See Mosberger at 80. This prototype shows that the parameters for the "createStage"
`
`software function are a module "m," a service index "s," a set of attributes "a," and a pointer
`
`"ModuleLink*" to the service index of the next stage in the path. See id. Like the
`
`"pa thCrea te" software function, the "ere a teStage" function also does not have an input
`
`parameter for a message, which further shows that the stages are created without regard to the
`
`particular messages. See id.
`
`The end result of invoking the "pa thCrea te" software function is that Scout will
`
`create a set of paths comprising various sequences of modules. See Mos berger at 81 ("At this
`
`point, the pa thCrea te function creates the actual path object, inserts the stages into it, and
`
`establishes the various chains through the path structure"). The knowledge of which modules to
`
`connect together is complied into the Scout kernel at compile time. This knowledge does not
`
`exist outside of the modules themselves. Importantly, this set of paths is finite; Mos berger does
`
`not teach creation of new paths after initialization. See id.
`
`The next section of Mosberger (Section 3.4), entitled "Demultiplexing," describes how to
`
`select the appropriate path from amongst the finite set of previously-created paths based on the
`
`contents of a particular message. See Mosberger at 85-99. This point is underscored by the first
`
`sentence of section 3.4: "So far, we have not discussed the issue of how the appropriate path is
`
`found for a given message." See id. at 85 (emphasis added). This sentence unequivocally
`
`establishes that the prior sections of Mosberger regarding creating paths are limited to "path
`
`creation" and do not relate to selecting ( or "finding") the appropriate (predefined) path for a
`
`particular message. See id.
`
`Instead, Section 3.4 teaches for the first time in Mosberger that,
`
`1 "The attribute set describes the kind of path that is desired. That is, the invariants ... are passed in this set."
`Mosberger at 80.
`
`Page 11 of 21
`
`Juniper Ex. 1004-p. 11
`Juniper v Implicit
`
`

`

`upon the receipt of a message, Scout uses a demultiplexing process to find the correct
`
`previously-created path to process the message. See id. at 85-92 ("a packet classifier that factors
`
`all demultiplexing operations . . . lets Scout pick a path and start processing a packet. .. " and "a
`
`classifier to decide whether a packet should be processed using path pl, p2, or p3"). Thus,
`
`Mosberger does not teach or suggest "instructions executable by [a] processing unit to: create,
`
`based on an identification of information in a packet of a message, a path that includes a
`
`sequence of routines for processing packets in the message" as recited in claim 26 ( emphasis
`
`added). Rather, Mosberger teaches that when a message is received, a path is selected (or
`
`"found" or "picked") from a set of possible paths, which were created before the message was
`
`received. See id. The "path" of claim 26, on the other hand, is "create[ d]" "based on an
`
`identification of information in a packet of a message"-in other words, after a packet of the
`
`message exists and is received.
`
`For at least the reasons given above, Applicant respectfully submits that Mosberger does
`
`not teach or suggest the combination of features recited in claim 26. Accordingly, Applicant
`
`submits that claim 26 and its dependent claims are patentably distinct over Mosberger. Claims
`
`33, 41, and 50 include features that are similar to the features recited in claim 26. Thus,
`
`Applicant submits claims 33, 41, and 50, along with their respective dependent claims, are
`
`patentably distinct over Mosberger for at least the reasons given above.
`
`Page 12 of 21
`
`Juniper Ex. 1004-p. 12
`Juniper v Implicit
`
`

`

`Decasper
`
`As described in detail below, Decasper includes an "IP core" that uses modules called
`
`"plugins" to operate on IP packets. Decasper therefore does not teach or suggest a path having a
`
`sequence of routines, "wherein the sequence includes a routine that is used to execute a
`
`Transmission Control Protocol (TCP) to convert packets having a TCP format into a different
`
`format," as recited in claim 26. Because Decasper operates on IP packets only ( and thus
`
`executes the IP protocol but not other protocols), that reference does not teach or suggest
`
`"process[ing] packets of [a] message, including by removing an outermost header of a given
`
`packet using a first session corresponding to a protocol in a first layer and by removing the
`
`resulting outermost header using a second session corresponding to a different protocol in a
`
`different layer."
`
`Decasper Overview
`
`Decasper is directed to "a high performance, modular, extended integrated services router
`software architecture." Decasper at § 1 (p. 1, first col., ,i 1 ).2 Decasper states that "In the past,
`
`the main task of a router was to simply forward packets based on a destination address lookup."
`
`Id. at§ 2 (p. 1, first col., ,i 3). This type of traditional router implementation is shown in the left
`
`half of Figure 1 of Decasper, which is reproduced below.
`
`In this "Monolit[h]ic Best-Effort
`
`Architecture," packets are shown as being received from the "Net" (i.e., the Internet), processed
`
`according to an Internet Protocol (specifically IPv4), and output back onto the "Net." See id. at
`
`Fig. 1. This prior art router architecture can thus be understood to execute an IP protocol in
`
`order to route packets to other locations in a network such as the Internet. Notably, the diagram
`
`in the left half of Decasper' s Figure 1 does not disclose that these prior art routers execute any
`
`type of networking protocols other than IP ( e.g., TCP).
`
`2 Decasper does not include page numbers. The primary citations to this reference are given by section number(§),
`with parenthetical citations by page number, column, and paragraph number. In determining paragraph numbers,
`each bullet point is considered a separate paragraph. Additionally, a split paragraph that begins a column is
`considered the first paragraph for that column.
`
`Page 13 of 21
`
`Juniper Ex. 1004-p. 13
`Juniper v Implicit
`
`

`

`

`

`

`

`Figure 2 also depicts four plugins. The IPOPT plugin "implement[s] IPv6 options," the
`
`PS plugin performs "packet scheduling," the BMP plugin "calculate[s] the best-matching prefix
`
`... used for packet classification and routing" and the IPSEC plugin is "for IP security." See
`Decasper at § 3.1 (p. 4, first col., ,i 1). Decasper uses a "packet classification algorithm" that
`
`"efficiently maps packets to code modules (plugins)." Id. at§ 2 (p. 2, second col., ,i 6). As will
`
`be discussed in further detail below, Decasper's method of mapping a packet to a plugin requires
`
`the presence of an IP header in order to perform the classification. Accordingly, it follows that
`
`each of the plugins disclosed in Decasper operates on an IP packet (i.e., a packet with an IP
`
`header). This conclusion makes sense given that the process of mapping a packet to one or more
`
`plugins is initiated by different points (referred to as "gates") within the IP core. Stated another
`
`way, it would be expected that plugins called from different points in the control path that
`
`implements an Internet Protocol would operate on IP packets.
`
`Decasper 's Packet Classification Scheme
`
`Decasper discloses that "[i]nstances of plugins can be created, configured, and bound to
`
`specific flows" (i.e., a group of related packets). Decasper at § 2 (p. 2, first col., ,i 2) ( emphasis
`
`in original). Specifically, the Association Identification Unit (AIU) shown in Figures 2 and 3
`
`"implements an innovative algorithm for packet classification which efficiently maps packets to
`
`code modules (plugins)." Id. at§ 2 (p. 2, second col., ,i 6). The mapping between a packet and a
`
`plugin is governed by a "filter," which Decasper discloses is specified by the following "six(cid:173)
`
`tuple":
`
`<source address, destination address, protocol, source port, destination port, incoming interface>.
`
`Id. at§ 5.1 (p. 7, first col., ,i 6). Values in a six-tuple field may include a wildcard character (a
`
`"*"), indicating that any value is acceptable for filter-matching purposes. See id. § 3 (p. 3,
`
`second col., ,i 1). Thus, one filter may be specified by source address 129.132.*, with the
`
`remaining tuple values being wildcards.
`
`In such an example, any flow from source address
`
`129.132. * will be mapped to the plugin specified by that filter. See Decasper at Fig. 3 (first filter
`
`table entry, which is mapped to IPSEC plugin "SEC2").
`
`Page 16 of 21
`
`Juniper Ex. 1004-p. 16
`Juniper v Implicit
`
`

`

`

`

`Figure 3, a packet having the six tuple (129.133.50.50.2, 128.252.50.21, TCP, 1234, 25, 0) maps
`
`to the following plugins: SECI, PSI, RTI, OPTI.
`
`If there is no cached entry in a flow table, a filter table is accessed and "the resulting
`
`plugin instance pointer is returned to the calling gate." See Decasper at§ 3.2 (p. 5, second col., ,i
`
`7) (description of step 3 depicted in Fig. 3). The gate then "calls the plugin instance, passing the
`
`packet as an argument." Id. This process is repeated at each gate in the IP core for a given
`
`packet. See id. at§ 3.2 (p. 5, second col., ,i 11) (description of step 7 depicted in Fig. 3). Figure
`
`3 depicts a separate filter table for each of four types of plugins: IP SEC, PS, BMP, IPOPT. See
`
`id. at Fig. 3. Instance pointers accessed from the filter table are cached in the flow table. See id.
`
`at§ 3.2 (p. 5, second col., ,i 8) (description of step 4 depicted in Fig. 3). Subsequently, "[w]hen
`
`a packet from a cached flow encounters the first gate" in the IP core, a "pointer to the [plugin]
`
`instance requested is already in the flow table." See id. at § 3.2 (p. 6, first col., ,i 3). "No filter
`
`table lookups are required." See id.
`
`Decasper 's Packet Classification Requires IP Packet Headers
`
`As described above, Decasper uses both filter tables and flow tables to classify packets.
`
`With respect to filter table implementations (used for finding the appropriate plugin when a
`
`packet for an uncached flow reaches a gate in the IP core), Decasper "requires packets to be
`
`classified based upon the same five packet header fields and the interface on which the packet
`
`was received." See Decasper at § 5 .1 (p. 7, first col., ,i 6). This six tuple includes the source
`
`address and destination address of the packet-information that is located in both IPv4 and IPv6
`
`headers. Internet Protocol RFC 791, 11 (Jon Postel ed., September 1981) (included in an IDS
`
`submitted with this response). Similarly, Decasper's flow table implementation also uses the
`
`source and destination IP addresses from the packet to calculate the hash index used to perform
`
`the lookup function. See id. at§ 3.2 (p. 5, second col., ,i 8) (description of step 4 depicted in Fig.
`3), § 5.2 (p. 9, first col., ,i 1, 2). Decasper emphasizes that all tuple values used to look up a filter
`
`in the flow table are fully specified-that is, no wildcards. See id. at§ 3.2 (p. 5, second col., ,i 8)
`
`( description of step 4 depicted in Fig. 3). Given the use of IP header information to implement
`
`both filter table and flow table lookups, Decasper does not contemplate classifying packets other
`
`than IP packets. For example, nothing in Decasper contemplates processing a non-IP packet
`
`format such as a TCP packet, since such headers do not have the source and destination IP
`
`Page 18 of 21
`
`Juniper Ex. 1004-p. 18
`Juniper v Implicit
`
`

`

`addresses needed for Decasper's packet classification scheme. 4 Because each gate in Decasper's
`
`IP core must receive an IP packet in order to perform such classification, it follows that
`
`Decasper's plugins do not convert an IP packet into a non-IP format (e.g., a TCP format). An
`
`initial gate in Decasper' s IP core, for example, must produce an output packet that can be
`
`processed by a subsequent gate. If the plugin tied to the initial gate in Decasper's IP core
`
`removed the IP header portion of a packet, for example, the resulting output packet would not be
`
`able to be classified at the subsequent gate. The conclusion that Decasper contemplates
`
`processing only IP packets is consistent with Decasper's implementation of an IP router using an
`
`IP core that executes an IP protocol.
`
`Claim 26
`
`Given the preceding discussion, Applicant submits that Decasper does not teach or
`
`suggest "process[ ing] packets in the message using [a] sequence of routines in the created path,
`
`wherein the sequence includes a routine that is used to execute a Transmission Control
`
`Protocol (TCP) to convert packets having a TCP format into a different format," as recited
`
`in claim 26.
`
`Assuming arguendo that Decasper's plugins or flows correspond to the "sequence of
`
`routines" of claim 26 (which Applicant does not concede), Decasper does not teach or suggest
`
`that any of the plugins operates on "packets having a TCP format" let alone "convert[ing]" such
`
`packets "into a different format," as recited in that claim. Rather, as discussed at length above,
`
`Decasper' s packet classification scheme relies on IP headers remaining with packets throughout
`
`the IP core. For at least these reasons, Applicant respectfully submits that Decasper does not
`
`teach or suggest the combination of features recited in claim 26. Accordingly, Applicant submits
`
`that claim 26 and its dependent claims are patentably distinct over Decasper. Independent claims
`
`33 and 41 include features that are similar to those recited in claim 26. Thus, Applicant submits
`
`4 Additionally, it is well known that the Transmission Control Protocol (TCP) is implemented at the endpoints of a
`connection. Decasper, on the other hand, discloses a router architecture that stands in contrast to "modular end(cid:173)
`system networking subsystems." See Decasper § 2 (p. 2, second col., ,r 5). Accordingly, the fact that Decasper
`refers to a plugin that can monitor "TCP congestion backoffbehavior," see id. § 3 (p. 4, first col., ,r 1 ), does not refer
`to a plugin that executes the TCP protocol (i.e., operates on a packet whose outermost header is a TCP header).
`Given the discussion ofDecasper's classification scheme provided above, plugins in Decasper's routing architecture
`operate on IP packets. The monitoring of TCP congestion backoffbehavior in Decasper can thus be considered akin
`to the statistics gathering functions of other disclosed plugins, and not as the implementation of the TCP protocol.
`
`Page 19 of 21
`
`Juniper Ex. 1004-p. 19
`Juniper v Implicit
`
`

`

`claims 33 and 41, along with their respective dependent claims, are patentably distinct over
`
`Decasper for at least reasons similar to those provided in support of claim 26.
`
`Claim 50
`
`With respect to claim 50, Applicant submits that Decasper does not teach or suggest
`
`"process[ing] packets of the message, including by removing an outermost header of a given
`
`packet using a first session corresponding to a protocol in a first layer and by removing the
`
`resulting outermost header using a second session corresponding to a different protocol in a
`
`different layer." Each of the gates in Decasper operates on a packet having an IP header. In fact,
`
`as explained above, Decasper's gates rely on the presence of IP headers in the packets to
`
`properly classify the packets.
`
`It therefore follows that Decasper's plugins do not operate to
`
`"remov[ e] an outermost header of a given packet" and "remov[ e] the resulting outermost
`
`header." Further, Decasper does not teach or suggest "using a second session corresponding to a
`
`different protocol" to "remov[ e] the resulting outermost header" at least because Decasper does
`
`not teach sessions corresponding to different protocols.
`
`For at least the reasons given above, Applicant respectfully submits that Decasper does
`
`not teach or suggest the combination of features recited in claim 50. Accordingly, Applicant
`
`submits that claim 50 and its dependent claims are patentably distinct over Decasper.
`
`Page 20 of 21
`
`Juniper Ex. 1004-p. 20
`Juniper v Implicit
`
`

`

`CONCLUSION
`
`Applicants submit the application is in condition for allowance, and an early notice to
`
`that effect is requested.
`
`The Commissioner is authorized to charge any fees that may be required, or credit any
`
`overpayment, to Meyertons, Hood, Kivlin, Kowert & Goetzel, P.C. Deposit Account No.
`
`501505/6743-00105/DMM.
`
`Date: June 6, 2013
`
`Respectfully submitted,
`
`By: /Dean M. Munyon/
`Dean M. Munyon
`Reg. No. 42,914
`
`Meyertons, Hood, Kivlin, Kowert & Goetzel, P.C.
`P. 0. Box 398
`Austin, Texas 78767
`(512) 853-8847
`
`Page 21 of 21
`
`Juniper Ex. 1004-p. 21
`Juniper v Implicit
`
`

`

`Electronic Patent Application Fee Transmittal
`
`Application Number:
`
`Filing Date:
`
`Title of Invention:
`
`METHOD AND SYSTEM FOR DATA DEMULTIPLEXING
`
`First Named Inventor/Applicant Name:
`
`Edward Balassanian
`
`Filer:
`
`Dean M. Munyon/Deena Beasley
`
`Attorney Docket Number:
`
`6743-00105
`
`Filed as Large Entity
`
`Track I Prioritized Examination - Non provisional Application under 35 USC 111 (a) Filing Fees
`
`Description
`
`Fee Code
`
`Quantity
`
`Amount
`
`Sub-Total in
`USO($)
`
`Basic Filing:
`
`Pages:
`
`Claims:
`
`Utility application filing
`
`Utility Search Fee
`
`Utility Examination Fee
`
`Request for Prioritized Examination
`
`Claims in Excess of 20
`
`Independent claims in excess of 3
`
`1011
`
`1111
`
`1311
`
`1817
`
`1202
`
`1201
`
`1
`
`1
`
`1
`
`1
`
`10
`
`1
`
`280
`
`600
`
`720
`
`280
`
`600
`
`720
`
`4000
`
`4000
`
`80
`
`420
`
`800
`
`420
`
`Juniper Ex. 1004-p. 22
`Juniper v Implicit
`
`

`

`Description
`
`Fee Code
`
`Quantity
`
`Amount
`
`Sub-Total in
`USO($)
`
`Miscellaneous-Filing:
`
`Publ. Fee- Early, Voluntary, or Normal
`
`OTHER PUBLICATION PROCESSING FEE
`
`1504
`
`1808
`
`1
`
`1
`
`300
`
`130
`
`300
`
`130
`
`Petition:
`
`Patent-Appeals-and-Interference:
`
`Post-Allowance-and-Post-Issuance:
`
`Extension-of-Time:
`
`Miscellaneous:
`
`Total in USD ($)
`
`7250
`
`Juniper Ex. 1004-p. 23
`Juniper v Implicit
`
`

`

`Electronic Acknowledgement Receipt
`
`EFSID:
`
`Application Number:
`
`15966847
`
`13911324
`
`International Application Number:
`
`Confirmation Number:
`
`4969
`
`Title of Invention:
`
`METHOD AND SYSTEM FOR DATA DEMULTIPLEXING
`
`First Named Inventor/Applicant Name:
`
`Edward Balassanian
`
`Customer Number:
`
`35690
`
`Filer:
`
`Dean M. Munyon/Deena Beasley
`
`Filer Authorized By:
`
`Dean M. Munyon
`
`Attorney Docket Number:
`
`6743-00105
`
`Receipt Date:
`
`06-JUN-2013
`
`Filing Date:
`
`Time Stamp:
`
`13:33:41
`
`Application Type:
`
`Utility under 35 USC 111 (a)
`
`Payment information:
`
`Submitted with Payment
`
`Payment Type
`
`Payment was successfully received in RAM
`
`RAM confirmation Number
`
`Deposit Account
`
`Authorized User
`
`yes
`
`Credit Card
`
`$7250
`
`11345
`
`501505
`
`MUNYON, DEAN M.
`
`The Director of the USPTO is hereby authorized to charge indicated fees and credit any overpayment as follows:
`
`Charge any Additional Fees required under 37 C.F.R. Section 1.16 (National application filing, search, and examination fees)
`
`Charge any Additional Fees required under 37 C.F.R. Section 1.17 (Patent application and reexamination processing fee

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket