throbber
USO09591 104B2
`
`(12) United States Patent
`Balassanian
`
`(10) Patent No.:
`(45) Date of Patent:
`
`US 9,591,104 B2
`*Mar. 7, 2017
`
`(54) METHOD AND SYSTEM FOR DATA
`DEMULTIPLEXING
`
`(71) Applicant: Implicit, LLC, Seattle, WA (US)
`
`(72) Inventor: Edward Balassanian, Seattle, WA (US)
`
`(73) Assignee: Implicit, LLC, Seattle, WA (US)
`(*) Notice:
`Subject to any disclaimer, the term of this
`patent is extended or adjusted under 35
`U.S.C. 154(b) by 100 days.
`This patent is Subject to a terminal dis
`claimer
`
`(65)
`
`(21) Appl. No.: 15/050,027
`(22) Filed:
`Feb. 22, 2016
`O
`O
`Prior Publication Data
`US 2016/O173653 A1
`Jun. 16, 2016
`Related U.S. Application Data
`(63) Continuation of application No. 14/230.952, filed on
`Mar. 31, 2014, now Pat. No. 9,270,790, which is a
`continuation of application No. 13/911.324, filed on
`Jun. 6, 2013, OW Pat. No. 8,694,683, which is a
`continuation of application No. 13/236,090, filed on
`(Continued)
`
`(2006.01)
`(2006.01)
`(2006.01)
`(2006.01)
`
`(51) Int. Cl.
`H04L 2/58
`H04L 29/06
`H04L 29/08
`H04L 29/12
`(52) U.S. Cl.
`CPC .......... H04L 69/08 (2013.01). H04L 61/2007
`(2013.01); H04L 61/6063 (2013.01); H04L
`6702 (2013.01); H04L 69/16 (2013.01);
`H04L 69/18 (2013.01)
`
`(58) Field of Classification Search
`None
`See application file for complete search history.
`
`(56)
`
`References Cited
`
`U.S. PATENT DOCUMENTS
`5,298,674. A
`3, 1994 Yun
`5,392,390 A
`2, 1995 Crozi
`(Conti NC)
`O1
`FOREIGN PATENT DOCUMENTS
`
`EP
`EP
`EP
`
`0408132
`O807347
`O817031
`
`1, 1991
`11, 1997
`1, 1998
`
`OTHER PUBLICATIONS
`2015 WL 2194627, United States District Court, N.D. California,
`Implicit L.L.C., Plaintiff, v. F5 Networks, Inc., Defendant, Case No.
`14-cv-02856-SI, signed May 6, 2015, 14 pages.
`(Continued)
`Primary Examiner — Duc Duong
`
`ABSTRACT
`(57)
`A method and system for demultiplexing packets of a
`message is provided.
`The demultiplexing system receives packets of a message,
`identifies a sequence of message handlers for processing the
`message, identifies state information associated with the
`message for each message handler, and invokes the message
`handlers passing the message and the associated State infor
`mation. The system identifies the message handlers based on
`the initial data type of the message and a target data type.
`The identified message handlers effect the conversion of the
`data to the target data type through various intermediate data
`types.
`
`20 Claims, 16 Drawing Sheets
`
`450
`:
`y WER
`
`s
`
`ESSAGE
`SEND
`
`is
`
`14
`
`EUX
`
`AEiAP
`G
`
`is
`
`f
`
`-10
`
`MESSAGE
`SE
`
`ESSAGE
`3.
`
`SSAGE
`SE)
`
`
`
`
`
`S.
`
`fig
`
`$f
`
`fift
`
`EUX - LA
`
`(-i 14
`
`--
`
`i55-
`
`\S7
`
`SSAE
`SE:
`
`ESSAGE
`SE
`
`Juniper Ex. 1006-p. 1
`Juniper v Implicit
`
`

`

`US 9,591.104 B2
`Page 2
`
`Related U.S. Application Data
`Sep. 19, 2011, now abandoned, which is a continu
`ation of application No. 10/636,314, filed on Aug. 6,
`2003, now Pat. No. 8,055,786, which is a continu
`ation of application No. 09/474,664, filed on Dec. 29,
`1999, now Pat. No. 6,629,163.
`
`(56)
`
`References Cited
`
`U.S. PATENT DOCUMENTS
`
`Hershey et al.
`Hluchy et al.
`van Loo, Jr. et al.
`Pearson et al.
`Musa et al.
`Hasebe et al.
`Dedrick
`Pedersen et al.
`Shwed et al.
`Radia et al.
`Guck
`Callon et al.
`Feiken et al.
`Wesinger, Jr. et al.
`Radogna ................. HO4L 29/06
`370,389
`McHann, Jr. ....... HO4L 41,0213
`TO9,224
`
`Hartmann et al.
`Cheriton et al.
`Tsuruoka
`Schuetze et al.
`Alam et al.
`Buhler et al.
`Volftsun et al.
`Engel et al.
`Shipley
`Papierniak et al.
`Coss et al.
`Volftsun et al.
`Tanaka et al.
`Aditham et al.
`Khan et al.
`Segur
`Kihl et al.
`Spinney et al.
`Kerr et al.
`Erb et al.
`Crouch et al.
`Anderson et al.
`Heimendinger et al.
`Zarom
`Movshovich et al.
`Bellwood et al.
`Leslie et al.
`Hadland
`Spinney et al.
`Gelman et al.
`Cremin et al.
`Engel et al.
`Varghese et al.
`Clayton et al.
`Kloth
`Balassanian
`Dietz et al.
`Eerola
`Jorgensen
`Deng et al.
`Amir et al.
`Taylor
`Kist et al.
`Kerr et al.
`Delaney et al.
`Kivinen et al.
`Boike .
`
`6/2007 Swallow
`7,233,569 B1
`6/2007 Shamoon et al.
`7,233,948 B1
`7,281,036 B1 10/2007 Lu et al.
`7,383,341 B1
`6/2008 Saito et al.
`7,711,857 B2
`5/2010 Balassanian
`8,055,786 B2 11/2011 Balassanian
`8,694,683 B2
`4/2014 Balassanian
`2003. O142669 A1
`7/2003 Kubota et al.
`2004/0015609 A1
`1/2004 Brown .................... HO4L 69.08
`TO9,246
`
`2008/0250.045 A1 10, 2008 Balassanian et al.
`2009 OO83763 A1* 3, 2009 Sareen ................ HO4L 67.2823
`719,317
`
`2009,0265695 A1 10, 2009 Karino
`
`OTHER PUBLICATIONS
`
`Alexander, D. et al., “The SwitchWare Active Network Architec
`ture', Jun. 6, 1998, IEEE.
`Antoniazzi. S. et al., “An Open Software Architecture for Multi
`media Consumer Terminals'. Central Research Labs, Italy; Alcatel
`SEL Research Centre, Germany, ECMAST 1997.
`Arbanowski, Stefan, “Generic Description of Telecommunication
`Services and Dynamic Resource Selection in Intelligent Commu
`nication Environments'. Thesis, Technische Universitat Berlin, Oct.
`9, 1996 (3 documents).
`Arbanowski, S., et al...Service Personalization for Unified Messag
`ing Systems, Jul. 6-8, 1999. The Fourth IEEE Symposium on
`Computers and Communications, ISCC 99, Red Sea, Egypt.
`Atkinson, R. “Security Architecture for the Internet Protocol', Aug.
`1995, Naval Research Laboratory.
`Atkinson, R., “IP Authentication Header'. Aug. 1995, Naval
`Research Laboratory.
`Atkinson, R., “IP Encapsulating Security Payload (ESP)”. Aug.
`1995, Naval Research Laboratory.
`Back, G., et al., Java Operating Systems: Design and Implementa
`tion, Aug. 1998, Technical Report UUCS-98-015, University of
`Utah.
`Baker, Dr. Sean, “CORBA Implementation Issues”, 1994, IONA
`Technologies, O'Reilly Institute Dublin, Ireland.
`Barrett, R., et al., “Intermediaries: New Places for Producing and
`Manipulating Web Content”, 1998, IBM Almaden Research Center,
`Elsevier Science.
`Bellare, M., et al., “A Concrete Security Treatment of Symmetric
`Encryption: Analysis of the DES Modes of Operation'. Aug. 15.
`1997. Dept. of Computer Science and Engineering, University of
`California, San Diego.
`Bellare, M., et al., “A Concrete Security Treatment of Symmetric
`Encryption: Analysis of the DES Modes of Operation'. Aug. 15.
`1997, IEEE.
`Bellare, M., et al., “XOR MACs: New Methods for Message
`Authentication Using Finite Pseudorandom Functions”, 1995,
`CRYPTO 95, LNCS 963, pp. 15-28, Springer-Verlag Berlin
`Heidelberg.
`Bellissard, L., et al., “Dynamic Reconfiguration of Agent-Based
`Applications'. Third European Research Seminar on Advances in
`Distributed Systems, (ERSADS 99) Madeira Island.
`Bolding, Darren, “Network Security, Filters and Firewalls”, 1995,
`www.acm.org/crossroads/Xrds2-1/security.html.
`Booch, G., et al., “Software Engineering with ADA’. 1994. Third
`Edition, The Benjamin/Cummings Publishing Company, Inc. (2
`documents).
`Breugst, et al., “Mobile Agents—Enabling Technology for Active
`Intelligent Network Implementation'. May/Jun. 1998, IEEE Net
`work.
`“C Library Functions”, AUTH(3) Sep. 17, 1993, Solbourne Com
`puter, Inc.
`Chapman, D., et al., “Building Internet Firewalls'. Sep. 1995,
`O'Reilly & Associates, Inc.
`CheckPoint FireWall-1 Technical White Paper, Jul 18, 1994,
`CheckPoint Software Technologies, Ltd.
`CheckPoint FireWall-1 White Paper, Sep. 1995, Version 2.0,
`CheckPoint Software Technologies, Ltd.
`
`5,414,833
`5.425,029
`5,568.478
`5,627,997
`5,710,917
`5,761,651
`5,768,521
`5,826,027
`5,835,726
`5,848,233
`5,848,415
`5,854,899
`5,870.479
`5,898,830
`5.991,299
`
`5, 1995
`A
`6, 1995
`A
`A 10, 1996
`A
`5, 1997
`A
`1, 1998
`A
`6, 1998
`A
`6, 1998
`A 10, 1998
`A 11, 1998
`A 12, 1998
`A 12, 1998
`A 12, 1998
`A
`2, 1999
`A
`4, 1999
`A * 11, 1999
`
`5.991,806
`
`A * 11, 1999
`
`6,047,002
`6,091,725
`6,101,189
`6,101,320
`6,104,500
`6,104,704
`6,111,893
`6,115,393
`6,119,236
`6,128,624
`6,141,749
`6,151,390
`6,157,622
`6, 192,419
`6,199,054
`6.212,550
`6,222,536
`6,226,267
`6,243,667
`6,246,678
`6,259,781
`6,275,507
`6,278,532
`6,356,529
`6,359,911
`6,401,132
`6,404,775
`6.405,254
`6.426,943
`6,493,348
`6,504,843
`6,519,636
`6,560,236
`6,574,610
`6,598,034
`6,629,163
`6,651,099
`6,678,518
`6,680,922
`6,701432
`6,711,166
`6,785,730
`6,871, 179
`6,889, 181
`6,937,574
`6,957,346
`6.959,439
`
`4, 2000
`A
`T/2000
`A
`8, 2000
`A
`8, 2000
`A
`8, 2000
`A
`8, 2000
`A
`8, 2000
`A
`9, 2000
`A
`9, 2000
`A
`A 10, 2000
`A 10, 2000
`A 11, 2000
`A 12, 2000
`B1
`2, 2001
`B1
`3, 2001
`B1
`4, 2001
`B1
`4, 2001
`B1
`5, 2001
`B1
`6, 2001
`B1
`6, 2001
`B1
`T/2001
`B1
`8, 2001
`B1
`8, 2001
`B1
`3, 2002
`B1
`3, 2002
`B1
`6, 2002
`B1
`6, 2002
`B1
`6, 2002
`B1
`T/2002
`B1
`12, 2002
`B1
`1, 2003
`B2
`2, 2003
`B1
`5/2003
`B1
`6, 2003
`B1
`T/2003
`B1
`9, 2003
`B1
`11, 2003
`B2
`1, 2004
`B1
`1, 2004
`B1
`3, 2004
`B1
`3, 2004
`B1
`8, 2004
`B1
`3, 2005
`B2
`5/2005
`B1
`8, 2005
`B1
`10, 2005
`B1 * 10, 2005
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`. G06F 13,102
`
`T19,321
`
`Juniper Ex. 1006-p. 2
`Juniper v Implicit
`
`

`

`US 9,591.104 B2
`Page 3
`
`(56)
`
`References Cited
`
`OTHER PUBLICATIONS
`
`Command Line Interface Guide PN 093-001 1-000 Rev C Version
`2.5, 2000-2001, NetScreen Technologies, Inc.
`Coulson, G. et al., “A CORBA Compliant Real-Time Multimedia
`Platform for Broadband Networks'. Lecture Notes in Computer
`Science, 1996, Trends in Distributed Systems CORBA and Beyond.
`Cox, Brad, "SuperDistribution, Objects. As Property on the Elec
`tronic Frontier', 1996, Addison-Wesley Publishing Company.
`Cranes, et al., “A Configurable Protocol Architecture for CORBA
`Environments'. Autonomous Decentralized Systems 1997 Proceed
`ings ISADS. Third International Symposium Apr. 9-11, 1997.
`Curran, K., et al., “CORBA Lacks Venom'. University of Ulster,
`Northern Ireland, UK 2000.
`Dannert, Andreas, “Call Logic Service for a Personal Communica
`tion Supporting System'. Thesis, Jan. 20, 1998, Technische
`Universitat Berlin.
`DARPA Internet Program Protocol Specification, “Transmission
`Control Protocol'. Sep. 1981, Information Sciences Institute, Cali
`fornia.
`DARPA Internet Program Protocol Specification, “Internet Proto
`col”, Sep. 1981, Information Sciences Institute, California.
`Decasper, D., et al., “Crossbow: A Toolkit for Integrated Services
`over Cell Switched IPv6', 1997. Computer Engineering and Net
`works Laboratory, ETH Zurich, Switzerland.
`Decasper, D., et al., “Router Plugins A Software Architecture for
`Next Generation Routers”, 1998, Proceedings of ACM SIGCONM
`98.
`Deering, S., et al., Internet Protocol, Version 6 (IPv6) Specification,
`Dec. 1998, Nokia, The Internet Society.
`Deering, S., et al., Internet Protocol, Version 6 (IPv6) Specification,
`Dec. 1995, Network Working Group, RFC 1883.
`Dutton, et al., “Asynchronous Transfer Mode Technical Overview
`(ATM), Second Edition; IBM, Oct. 1995, 2" Edition, Prentice Hall
`PTR, USA.
`Eckardt, T., et al., “Application of X.500 and X.700 Standards for
`Supporting Personal Communications in Distributed Computing
`Environments', 1995, IEEE.
`Eckardt, T., et al., “Personal Communications Support based on
`TMN and TINA Concepts”, 1996, IEEE Intelligent Network Work
`shop (IN '96), Apr. 21-24, Melbourne, Australia.
`Eckardt, T., et al., “Beyond IN and UPT-A Personal Communi
`cations Support System Based on TMN Concepts”. Sep.1997, IEEE
`Journal on Selected Areas in Communications, vol. 15, No. 7.
`Egevang, K., et al., “The IP Network Address Translator (NAT)'.
`May 1994, Network Working Group, RFC 1631.
`Estrin, D., et al., “Visa Protocols for Controlling Inter-Organiza
`tional Datagram Flow”. Dec. 1998, Computer Science Department,
`University of Southern California and Digital Equipment Corpora
`tion.
`Faupel, M., “Java Distribution and Deployment”, Oct. 9, 1997.
`APM Ltd., United Kingdom.
`Felber, P. “The CORBA Object Group Service: A Service Approach
`to Object Groups in CORBA'. Thesis, 1998, Ecole Polytechnique
`Federate de Lausanne, Switzerland.
`Fish, R., et al., “DRoPS. Kernel Support for Runtime Adaptable
`Protocols”, Aug. 25-27, 1998, IEEE 24' Euromicro Conference,
`Sweden.
`Fiuczynski, M., et al., “An Extensible Protocol Architecture for
`Application-Specific Networking”. 1996, Department of Computer
`Science and Engineering, University of Washington.
`Franz, Stefan, “Job and Stream Control in Heterogeneous Hardware
`and Software Architectures”, Apr. 1998, Technische Universitat,
`Berlin (2 documents).
`Fraser, T., “DTE Firewalls: Phase Two Measurement and Evalua
`tion Report”. Jul 22, 1997, Trusted Information Systems, USA.
`Gazis, V., et al., “A Survey of Dynamically Adaptable Protocol
`Stacks', first Quarter 2010, IEEE Communications Surveys &
`Tutorials, vol. 12, No. 1, 1 Quarter.
`Gokhale, A., et al., “Evaluating the Performance of Demultiplexing
`Strategies for Real-Time CORBA”, Nov. 1997, GLOBECOM.
`
`Gokhale, A., et al., “Measuring and Optimizing CORBA Latency
`and Scalability Over High-Speed Networks”, Apr. 1998, IEEE
`Transaction on Computers, vol. 47, No. 4; Proceedings of the
`International Conference on Distributed Computing Systems
`(ICDCS 97) May 27-30, 1997.
`Gokhale, A., et al., “Operating System Support for High-Perfor
`mance, Real-Time CORBA’, 1996.
`Gokhale, A., et al., “Principles for Optimizing CORBA Internet
`Inter-ORB Protocol Performance'. Jan. 9, 1998, Proceedings of the
`HICSS Conference, Hawaii.
`Gong, Li, “Java Security: Present and Near Future', May/Jun. 1997.
`IEEE Micro.
`Gong, Li, "New Security Architectural Directions for Java
`(Extended Abstract), Dec. 19, 1996, IEEE.
`Gong, Li, "Secure Java Class Loading”, Nov./Dec. 1998, IEEE
`Internet.
`Goos, G., et al., “Lecture Notes in Computer Science: Mobile
`Agents and Security”, 1998, Springer-Verlag Berlin Heidelberg.
`Goralski, W., “Introduction to ATM Networking”. 1995, McGraw
`Hill Series on Computer Communications, USA.
`Hamzeh, K., et al., “Layer Two Tunneling Protocol L2TP, Jan.
`1998, PPP Working Group, Internet Draft.
`Harrison, T., et al., “The Design and Performance of a Real-Time
`CORBA Event Service”, Aug. 8, 1997.Proceedings of the OOPSLA
`97 Conference, Atlanta, Georgia in Oct. 1997.
`Huitema, Christian, “IPv6 The New Internet Protocol, 1997 Pren
`tice Hall, Second Edition.
`Hutchins, J., et al., “Enhanced Internet Firewall Design Using
`Stateful Filters Final Report', Aug. 1997, Sandia Report; Sandia
`National Laboratories.
`IBM, Local Area Network Concepts and Products: Routers and
`Gateways, May 1996.
`Juniper Networks Press Release, Juniper Networks Announces
`Junos, First Routing Operating System for High-Growth Internet
`Backbone Networks, Jul. 1, 1998, Juniper Networks.
`Juniper Networks Press Release, Juniper Networks Ships the Indus
`try's First Internet Backbone Router Delivering Unrivaled Scalabil
`ity, Control and Performance, Sep. 16, 1998, Juniper Networks.
`Karn, P., et al., “The ESP DES-CBC Transform”, Aug. 1995,
`Network Working Group, RFC 1829.
`Kelsey, J. et al., “Authenticating Outputs of Computer Software
`Using a Cryptographic Coprocessor'. Sep. 1996, CARDIS.
`Krieger, D., et al., “The Emergence of Distributed Component
`Platforms”, Mar. 1998, IEEE.
`Krupczak, B., et al., “Implementing Communication Protocols in
`Java”, Oct. 1998, IEEE Communications Magazine.
`Krupczak, B., et al., “Implementing Protocols in Java: The Price of
`Portability”, 1998, IEEE.
`Lawson, Stephen, “Cisco NetFlow Switching Speeds Traffic Rout
`ing”, Jul. 7, 1997, Infoworld.
`Li, S., et al., “Active Gateway: A Facility for Video Conferencing
`Traffic Control”. Feb. 1, 1997, Purdue University; Purdue e-Pubs;
`Computer Science Technical Reports.
`Magedanz, T., et al., “Intelligent Agents: An Emerging Technology
`for Next Generation Telecommunications?', 1996, IEEE.
`Mills, H., et al., “Principles of Information Systems Analysis and
`Design”, 1986, Academic Press, Inc. (2 documents).
`Mosberger, David, "Scout. A Path-Based Operating System'. Doc
`toral Dissertation Submitted to the University of Arizona, 1997 (3
`documents).
`Muhugusa, M., et al., “COMSCRIPT : An Environment for the
`Implementation of Protocol Stacks and their Dynamic Reconfigura
`tion', Dec. 1994.
`Nelson, M., et al., The Data Compression Book, 2" Edition, 1996,
`M&T Books, A division of MIS Press, Inc.
`NetRanger User's Guide, 1996, WheelGroup Corporation.
`NetScreen Command Line Reference Guide, 2000, PN 093-0000
`001 Rev A. NetScreen Technologies, Inc., USA.
`NetScreen Command Line Reference Guide, 2000, PN 093-0000
`001 NetScreen Technologies, Inc., USA.
`NetScreen Concepts and Examples ScreenOS Reference Guide,
`1998-2001, Version 2.5 P/N 093-0039-000 Rev. A., NetScreen
`Technologies, Inc.
`
`Juniper Ex. 1006-p. 3
`Juniper v Implicit
`
`

`

`US 9,591.104 B2
`Page 4
`
`(56)
`
`References Cited
`
`OTHER PUBLICATIONS
`
`NetScreen Products Webpage, wysiwyg://body bottom.3/http://
`www.een.com/products/products.html 1998-1999, NetScreen
`Technologies, Inc.
`NetScreen WebJI, Reference Guide, Version 2.5.0 P/N 093-0040
`000 Rev. A. 2000-2001, NetScreen Technologies, Inc.
`NetStalker Installation and User's Guide, 1996, Version 1.0.2,
`Haystack Labs, Inc.
`Niculescu, Dragos, "Survey of Active Network Research', Jul. 14.
`1999, Rutgers University.
`Nortel Northern Telecom, “ISDN Primary Rate User-Network Inter
`face Specification'. Aug. 1998.
`Nygren, Erik, “The Design and Implementation of a High-Perfor
`mance Active Network Node'. Thesis, Feb. 1998, MIT.
`Osbourne, E., “Morningstar Technologies Secure0onnect Dynamic
`Firewall Filter User's Guide”. Jun. 14, 1995, V. 14, Morning Star
`Technologies, Inc.
`Padovano, Michael, “Networking Applications on UNIX System V
`Release 4, 1993 Prentice Hall, USA (2 documents).
`Pfeifer, T., "Automatic Conversion of Communication Media',
`2000, GMD Research Series, Germany.
`Pfeifer, T., "Automatic Conversion of Communication Media',
`Thesis, 1999, Technischen Universitat Berlin, Berlin.
`Pfeifer, T., et al., “Applying Quality-of-Service Parametrization for
`Medium-to-Medium Conversion”, Aug. 25-28, 1996, 8' IEEE
`Workshop on Local and Metropolitan Area Networks, Potsdam,
`Germany.
`Pfeifer, T., “Micronet Machines New Architectural Approaches
`for Multimedia End-Systems', 1993 Technical University of Berlin.
`Pfeifer, T., "On the Convergence of Distributed Computing and
`Telecommunications in the Field of Personal Communications'.
`1995, KiVS, Berlin.
`Pfeifer, T. "Speech Synthesis in the Intelligent Personal Commu
`nication Support System (IPCSS)”, Nov. 2-3, 1995, 2" Speak!’
`Workshop on Speech Generation in Multimodal Information Sys
`tems and Practical Applications.
`Pfeifer, T., et al., “Generic Conversion of Communication Media for
`Supporting Personal Mobility”, Nov. 25-27, 1996, Proc. of the Third
`COST 237 Workshop: Multimedia Telecommunications and Appli
`cations.
`Pfeifer, T., et al., “Intelligent Handling of Communication Media'.
`Oct. 29-31, 1997, 6' IEEE Workshop on Future Trends of Distrib
`uted Computing Systems (FTDCS) Tunis.
`Pfeifer, T., et al., “Resource Selection in Heterogeneous Commu
`nication Environments using the Teleservice Descriptor. Dec.
`15-19, 1997, Proceedings from the 4' COST 237 Workshop: From
`Multimedia Services to Network Services, Lisboa.
`Pfeifer, T., et al., Mobile Guide—Location-Aware Applications
`from the Lab to the Market, 1998, IDMS '98, LNCS 1483, pp.
`15-28.
`Pfeifer, T., et al., “The Active Store providing Quality Enhanced
`Unified Messaging”, Oct. 20-22, 1998, 5' Conference on computer
`Communications, AFRICOM-CCDC 98, Tunis.
`Pfeifer, T., et al., “A Modular Location-Aware Service and Appli
`cation Platform', 1999, Technical University of Berlin.
`Plagemann, T., et al., “Evaluating Crucial Performance Issues of
`Protocol Configuration in DaCapo”, 1994, University of Oslo.
`Psounis, Konstantinos, "Active Networks. Applications, Security
`Safety, and Architectures”. First Quarter 1999, IEEE Communica
`tions Surveys.
`Rabiner, Lawrence, "Applications of Speech Recognition in the Area
`of Telecommunications”, 1997, IEEE.
`Raman. Suchitra, et al. "A Model, Analysis, and Protocol Frame
`work for Sofi State-based Communications'. Department of EECS,
`University of California, Berkeley.
`Rogaway, Phillip. “Bucket Hashing and its Application to Fast
`Message Authentication', Oct. 13, 1997. Department of Computer
`Science, University of California.
`Schneier, B., et al., “Remote Auditing of Software Outputs. Using a
`Trusted CoProcessor”, 1997, Elsevier Paper Reprint 1999.
`
`Tennenhouse, D., et al., “From Internet to ActiveNet, Laboratory of
`Computer Science, MIT, 1996.
`Tudor, P., “Tutorial MPEG-2 Video Compression”. Dec. 1995,
`Electronics & Communication Engineering Journal.
`US Copyright Webpage of Copyright Title, “IPv6. the New Internet
`Protocol, by Christian Huitema, 1998 Prentice Hall.
`Van der Meer, et al., “An Approach for a 4' Generation Messaging
`System'. Mar. 21-23, 1999. The Fourth International Symposium on
`Autonomous Decentralized Systems ISADS '99, Tokyo.
`Van der Meer, Sven, "Dynamic Configuration Management of the
`Equipment in Distributed Communication Environments”. Thesis,
`Oct. 6, 1996, Berlin (3 documents).
`Van Renesse, R. et al., “Building Adaptive Systems. Using
`Ensemble', Cornell University Jul. 1997.
`Venkatesan, R., et al., “Threat-Adaptive Security Policy”, 1997.
`IEEE
`Wetherall, D., et al., “The Active IP Option”, Sep.1996, Proceedings
`of the 7" ACM SIGOPS European Workshop, Connemara, Ireland.
`Welch, Terry, "A Technique for High-Performance Data Compres
`sion', 1984. Sperry Research Center, IEEE.
`Zeletin, R. et al., “Applying Location Aware Computing for Elec
`tronic Commerce. Mobile Guide”, Oct. 20-22, 1998, 5' Conference
`on Computer Communications, AFRICOM-CCDC 98, Tunis.
`Zell, Markus, "Selection of Converter Chains by Means of Quality
`of Service Analysis”. Thesis, Feb. 12, 1998, Technische Universitat
`Berlin.
`Feb. 4, 2008 Plaintiff's Original Complaint.
`Aug. 26, 2008 Defendant NVIDIA Corporation's Answer to Com
`plaint.
`Aug. 26, 2008 Defendant Sun Microsystems, Inc.'s Answer to
`Complaint.
`Aug. 27, 2008 Defendant Advanced Micro Devices, Inc.'s Answer
`to Complaint for Patent Infringement.
`Aug. 27, 2008 RealNetworks, Inc.'s Answer to Implicit Networks,
`Inc.'s Original Complaint for Patent Infringement, Affirmative
`Defenses, and Counterclaims.
`Aug. 27, 2008 Intel Corp.'s Answer, Defenses and Counterclaims.
`Aug. 27, 2008 Defendant RMI Corporation's Answer to Plaintiffs
`Original Complaint.
`Sep. 15, 2008 Plaintiffs Reply to NVIDIA Corporation's Counter
`claims.
`Sep. 15, 2008 Plaintiffs Reply to Sun Microsystems Inc.'s Coun
`terclaims.
`Sep. 16, 2008 Plaintiffs Reply to RealNetworks, Inc.'s Counter
`claims.
`Sep. 16, 2008 Plaintiffs Reply to Intel Corp.’s Counterclaims.
`Dec. 10, 2008 Order granting Stipulated Motion for Dismissal with
`Prejudice re NVIDIA Corporation, Inc.
`Dec. 16, 2008 Defendants AMD, RealNetworks, RMI, and Sun's
`Motion to Stay Pending the Patent and Trademark Office's Reex
`amination of the 163 Patent.
`Dec. 29, 2008 Order granting Stipulated Motion for Dismissal
`without Prejudice of Claims re Sun Microsystems, Inc.
`Jan. 5, 2009 Plaintiff's Opposition to Defendants AMD,
`RealNetworks, RMI, and Sun's Motion to Stay Pending Reexami
`nation and Exhibit A.
`Jan. 9, 2009 Reply of Defendants AMD, RealNetworks, RMI, and
`Sun's Motion to Stay Pending the Patent and Trademark Office's
`Reexamination of the 163 Patent.
`Feb. 9, 2009 Order Granting Stay Pending the United States Patent
`and Trademark Office's Reexamination of U.S. Pat. No. 6,629,163.
`Feb. 17, 2009 Order Granting Stipulated Motion for Dismissal of
`Advanced Micro Devices, Inc. with Prejudice.
`May 14, 2009 Order Granting Stipulated Motion for Dismissal of
`RMI Corporation with Prejudice.
`Oct. 13, 2009 Order Granting Stipulated Motion for Dismissal of
`Claims Against and Counterclaims by Intel Corporation.
`Oct. 30, 2009 Executed Order for Stipulated Motion for Dismissal
`of Claims Against and Counterclaims by RealNetworks, Inc.
`Nov. 30, 2009 Plaintiffs. Original Complaint, Implicit v Microsofi,
`Case No. 09-5628.
`Jan. 22, 2010 Order Dismissing Case, Implicit v Microsofi, Case No.
`O9-5628.
`
`Juniper Ex. 1006-p. 4
`Juniper v Implicit
`
`

`

`US 9,591.104 B2
`Page 5
`
`(56)
`
`References Cited
`
`OTHER PUBLICATIONS
`
`Aug. 16, 2010 Plaintiffs. Original Complaint, Implicit v. Cisco, Case
`No. 10-3606.
`Nov. 22, 2010 Defendant Cisco Systems, Inc.'s Answer and Coun
`terclaims, Implicit v. Cisco, Case No. 10-3606.
`Dec. 13, 2010 Plaintiff, Implicit Networks, Inc.'s, Answer to Coun
`terclaims, Implicit v. Cisco, Case No. 10-3606.
`Oct. 4, 2011 Order of Dismissal with Prejudice, Implicit v. Cisco,
`Case No. 10-3606.
`Aug. 24, 2010 Plaintiffs. Original Complaint, Implicit v Citrix, Case
`No. 10-3766.
`Dec. 1, 2010 Plaintiffs First Amended Complaint, Implicit v Citrix,
`Case No. 10-3766.
`Jan. 14, 2011 Defendant Citrix Systems, Inc.'s Answer, Defenses
`and Counter-complaint for Declaratory Judgment, Implicit v Citrix,
`Case No. 10-3766.
`Feb. 18, 2011 Plaintiff, Implicit Networks, Inc.'s, Answer to Defen
`dants Counterclaims, Implicit v Citrix, Case No. 10-3766.
`May 2, 2011 Order of Dismissal, Implicit v Citrix, Case No.
`10-3766.
`Jul. 30, 2010 Plaintiff's Original Complaint, Implicit v F5, Case No.
`10-3365.
`Oct. 13, 2010 Defendants' Answer and Counter-Complaint, Implicit
`v F5, Case No. 10-3365.
`Nov. 3, 2010 Plaintiffs Answer to Counter-Complaint, Implicit v
`F5, Case No. 10-3365.
`Dec. 10, 2010 Plaintiffs First Amended Complaint, Implicit v F5.
`Case No. 10-3365.
`Jan. 14, 2011 Defendants' Answer to 1 Amended Complaint and
`Counterclaim, Implicit v F5, Case No. 10-3365.
`Feb. 18, 2011 Plaintiff's Answer to F5's Amended Counter-Com
`plaint, Implicit v F5, Case No. 10-3365.
`Apr. 18, 2011 Defendants' Amended Answer to 1 Amended
`Complaint and Counter-Complaint, Implicit v F5, Case No.
`10-3365.
`May 5, 2011 Plaintiffs Answer to F5's Amended Counter-Com
`plaint, Implicit v F5, Case No. 10-3365.
`Jul. 22, 2011 F5 Networks, Inc.'s Invalidity Contentions, Implicit v
`F5, Case No. 10-3365.
`Jul. 22, 2011 F5 Networks, Inc.'s Invalidity Contentions, Exhibit A.
`Implicit v F5, Case No. 10-3365 (31 documents).
`Jul. 22, 2011 F5 Networks, Inc.'s Invalidity Contentions, Exhibit B,
`Implicit v F5, Case No. 10-3365.
`Oct. 18, 2011 Joint Claim Construction & Pre-Hearing Statement
`(PR4-3), Implicit v F5, Case No. 10-3365.
`Oct. 18, 2011 Joint Claim Construction & Pre-Hearing Statement
`(PR4-3) Exhibit A, Implicit v F5, Case No. 10-3365 (2 documents).
`Nov. 28, 2011 Plaintiff's Opening Claim Construction Brief,
`Implicit v F5, Case No. 10-3365.
`Nov. 29, 2011 Amended Joint Claim Construction & Pre-Hearing
`Statement, Implicit v F5, Case No. 10-3365.
`Nov. 29, 2011 Amended Joint Claim Construction & Pre-Hearing
`Statement, Exhibit A. Implicit v F5, Case No. 10-3365.
`Dec. 12, 2011 Defendants' Claim Construction Brief, Implicit v F5.
`Case No. 10-3365.
`Dec. 19, 2011 Plaintiffs Reply to Defendants' (F5, HP Juniper)
`Responsive Claim Construction Brief (4-5), Implicit v F5, Case No.
`10-3365.
`Jan. 27, 2012 Transcript of Proceeding Held on Jan. 17, 2012;
`Implicit v F5, Case No. 10-3365.
`Jan. 27, 2012 Transcript of Proceeding Held on Jan. 18, 2012;
`Implicit v F5, Case No. 10-3365.
`Jan. 27, 2012 Transcript of Proceeding Held on Jan. 19, 2012;
`Implicit v F5, Case No. 10-3365.
`Feb. 29, 2012 Claim Construction Order.
`Aug. 15, 2012 Storer Invalidity Report.
`Sep. 10, 2012 Implicit’s Expert Report of Scott M. Nettles.
`Mar. 13, 2013 Order Granting Defendants' Motion for Summary
`Judgment.
`Apr. 9, 2013 Notice of Appeal to the Federal Circuit.
`
`Aug. 23, 2010 Plaintiff's Original Complaint, Implicit v HP, Case
`No. 10-3746.
`Nov. 23, 2010 Plaintiffs First Amended Complaint, Implicit v HP,
`Case No. 10-3746.
`Jan. 14, 2011 Defendant HP's Answer and Counterclaims, Implicit
`v HP, Case No. 10-3746.
`Feb. 18, 2011 Implicit Networks, Inc.'s Answer to HP Counter
`claims, Implicit v HP, Case No. 10-3746.
`May 10, 2011 Plaintiffs Amended Disclosure of Asserted Claims
`and Infringement Contentions, Case No. 10-3746.
`Jun. 30, 2011 Defendant HP Company's Invalidity Contentions,
`Implicit v HP, Case No. 10-3746.
`Jun. 30, 2011 Defendant HP Company's Invalidity Contentions,
`A1-14, Implicit v HP, Case No. 10-3746.
`Jun. 30, 2011 Defendant HP Company's Invalidity Contentions,
`B1-21, Implicit v HP, Case No. 10-3746.
`Sep. 20, 2010 Plaintiff's Original Complaint, Implicit v Juniper,
`Case No. 10-4234.
`Nov. 12, 2010 Juniper Network's Motion to Dismiss For Failure to
`State a Claim Under Rule 12(B)(6): Memorandum of Points and
`Authorities; Implicit v Juniper, Case No. 10-4234.
`Nov. 12, 2010 Juniper Network's Request for Judicial Notice in
`Support of its Motion to Dismiss For Failure to State a Claim Under
`Rule 12(B)(6): Memorandum of Points and Authorities; Implicit v
`Juniper, Case No. 10-4234.
`Dec. 1, 2010 First Amended Complaint; Implicit v Juniper, Case
`No. 10-4234.
`Jan. 18, 2011 Juniper Networks, Inc.'s Answer and Affirmative
`Defenses to 1 Amended Complaint, Implicit v Juniper, Case No.
`10-4234.
`Feb. 18, 2011 Plaintiffs Answer to Defendant's Counterclaims,
`Implicit v Juniper, Case No. 10-4234.
`May 23, 2011 Plaintiff's Disclosure of Asserted Claims and
`Infringement Contentions, Implicit v Juniper, Case No. 10-4234.
`Nov. 15, 2011 Plaintiffs Amended Disclosure of Asserted Claim
`and Infringement Contentions, Implicit v Juniper, Case No.
`10-4234.
`Nov. 28, 2011 Spencer Hosie Declaration in Support of Plaintiffs
`Opening Claim Construction Brief), Implicit v Juniper, Case No.
`10-4234.
`Nov. 28, 2011 Spencer Hosie Declaration in Support of Plaintiffs
`Opening Claim Construction Brief Exhibit E, Implicit v Juniper,
`Case No. 10-4234.
`Nov. 28, 2011 Spencer Hosie Declaration in Support of Plaintiffs
`Opening Claim Construction Brief Exhibit J. Implicit v Juniper,
`Case No. 10-4234.
`Nov. 28, 2011 Spencer Hosie Declaration in Support of Plaintiffs
`Opening Claim Construction Brief Exhibit K. Implicit v Juniper,
`Case No. 10-4234.
`Nov. 28, 2011 Spencer Hosie Declaration in Support of Plaintiffs
`Opening Claim Construction Brief Exhibits M-O, Implicit v Juni
`per, Case No. 10-4234.
`Dec. 12, 2011 Holly Hogan Declaration in Support of Defendants'
`Claim Construction Brief, Implicit v Juniper, Case No. 10-4234.
`Dec. 12, 2011 Holly Hogan Declaration in Support of Defendants'
`Claim Construction Brief, Exhibit B, Implicit v Juniper, Case No.
`10-4234.
`Dec. 12, 2011 Holly Hogan Declaration in Support of Defendants'
`Claim Construction Brief, Exhibit F. Implicit v Juniper, Case No.
`10-4234.
`Dec. 12, 2011 Holly Hogan Declaration in Support of Defendants'
`Claim Construction Brief, Exhibit N. Implicit v Juniper, Case No.
`10-4234.
`Dec. 12, 2011 Holly Hogan Declaration in Support of Defendants'
`Claim Construction Brief, Exhibit P. Implicit v Juniper, Case No.
`10-4234.
`Dec. 12, 2011 Holly Hogan Declaration in Support of Defendants'
`Claim Construction Brief, Exhibit Q. Implicit v Juniper, Case No.
`10-4234.
`Dec. 12, 2011 Holly Hogan Declaration in Support of Defendants'
`Claim Construction Brief, Exhibit S., Implicit v Juniper, Case No.
`10-4234.
`
`Juniper Ex. 1006-p. 5
`Juniper v Implicit
`
`

`

`US 9,591.104 B2
`Page 6
`
`(56)
`
`References Cited
`
`OTHER PUBLICATIONS
`
`Dec. 12, 2011 Holly Hogan Declaration in Support of Defendants'
`Claim Construction Brief, Exhibit T-1, Implicit v Juniper, Case No.
`10-4234.
`Dec. 12, 2011 Holly Hogan Declaration in Support of Defendants'
`Claim Construction Brief, Exhibit T-2, Implicit v Juniper, Case No.
`10-4234.
`Dec. 12, 2011 Holly Hogan Declaration in Support of Defendants'
`Claim Construction Brief, Exhibit T-3, Implicit v Juniper, Case No.
`10-4234.
`Dec. 12, 2011 Holly Hogan Declaration in Support of Defendants'
`Claim Construction Brief, Exhibit T-4, Implicit v Juniper, Case No.
`10-4234.
`Dec. 12, 2011 Holly Hogan Declaration in Support of Defendants'
`Claim Construction Brief, Exhibit U, Implicit v Juniper, Case No.
`10-4234.
`Dec. 12, 2011 Holly Hogan Declaration in Support of Defendants'
`Claim Construction Brief, Exhibit V, Implicit v Juniper, Case No.
`10-4234.
`Dec. 12, 2011 Holly Hogan Declaration in Support of Defendants'
`Claim Construction Brief, Exhibit W. Implicit v Juniper, Case No.
`10-4234.
`Dec. 12, 2011 Holly Hogan Declaration in Support of Defendants'
`Claim Construction Brief, Exhibit X. Implicit v Juniper, Case No.
`10-4234.
`Dec. 12, 2011 Holly Hogan Declaration in Support of Defendants'
`Claim Construction Brief, Exhibit Y-1. Implicit v Juniper, Case No.
`10-4234.
`Dec. 12, 2011 Holly Hogan Declaration in Support of Defendants'
`Claim Construction Brief, Exhibit Y-2, Implicit v Ju

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket