`
`(12) United States Patent
`Balassanian
`
`(10) Patent No.:
`(45) Date of Patent:
`
`US 9,591,104 B2
`*Mar. 7, 2017
`
`(54) METHOD AND SYSTEM FOR DATA
`DEMULTIPLEXING
`
`(71) Applicant: Implicit, LLC, Seattle, WA (US)
`
`(72) Inventor: Edward Balassanian, Seattle, WA (US)
`
`(73) Assignee: Implicit, LLC, Seattle, WA (US)
`(*) Notice:
`Subject to any disclaimer, the term of this
`patent is extended or adjusted under 35
`U.S.C. 154(b) by 100 days.
`This patent is Subject to a terminal dis
`claimer
`
`(65)
`
`(21) Appl. No.: 15/050,027
`(22) Filed:
`Feb. 22, 2016
`O
`O
`Prior Publication Data
`US 2016/O173653 A1
`Jun. 16, 2016
`Related U.S. Application Data
`(63) Continuation of application No. 14/230.952, filed on
`Mar. 31, 2014, now Pat. No. 9,270,790, which is a
`continuation of application No. 13/911.324, filed on
`Jun. 6, 2013, OW Pat. No. 8,694,683, which is a
`continuation of application No. 13/236,090, filed on
`(Continued)
`
`(2006.01)
`(2006.01)
`(2006.01)
`(2006.01)
`
`(51) Int. Cl.
`H04L 2/58
`H04L 29/06
`H04L 29/08
`H04L 29/12
`(52) U.S. Cl.
`CPC .......... H04L 69/08 (2013.01). H04L 61/2007
`(2013.01); H04L 61/6063 (2013.01); H04L
`6702 (2013.01); H04L 69/16 (2013.01);
`H04L 69/18 (2013.01)
`
`(58) Field of Classification Search
`None
`See application file for complete search history.
`
`(56)
`
`References Cited
`
`U.S. PATENT DOCUMENTS
`5,298,674. A
`3, 1994 Yun
`5,392,390 A
`2, 1995 Crozi
`(Conti NC)
`O1
`FOREIGN PATENT DOCUMENTS
`
`EP
`EP
`EP
`
`0408132
`O807347
`O817031
`
`1, 1991
`11, 1997
`1, 1998
`
`OTHER PUBLICATIONS
`2015 WL 2194627, United States District Court, N.D. California,
`Implicit L.L.C., Plaintiff, v. F5 Networks, Inc., Defendant, Case No.
`14-cv-02856-SI, signed May 6, 2015, 14 pages.
`(Continued)
`Primary Examiner — Duc Duong
`
`ABSTRACT
`(57)
`A method and system for demultiplexing packets of a
`message is provided.
`The demultiplexing system receives packets of a message,
`identifies a sequence of message handlers for processing the
`message, identifies state information associated with the
`message for each message handler, and invokes the message
`handlers passing the message and the associated State infor
`mation. The system identifies the message handlers based on
`the initial data type of the message and a target data type.
`The identified message handlers effect the conversion of the
`data to the target data type through various intermediate data
`types.
`
`20 Claims, 16 Drawing Sheets
`
`450
`:
`y WER
`
`s
`
`ESSAGE
`SEND
`
`is
`
`14
`
`EUX
`
`AEiAP
`G
`
`is
`
`f
`
`-10
`
`MESSAGE
`SE
`
`ESSAGE
`3.
`
`SSAGE
`SE)
`
`
`
`
`
`S.
`
`fig
`
`$f
`
`fift
`
`EUX - LA
`
`(-i 14
`
`--
`
`i55-
`
`\S7
`
`SSAE
`SE:
`
`ESSAGE
`SE
`
`Juniper Ex. 1006-p. 1
`Juniper v Implicit
`
`
`
`US 9,591.104 B2
`Page 2
`
`Related U.S. Application Data
`Sep. 19, 2011, now abandoned, which is a continu
`ation of application No. 10/636,314, filed on Aug. 6,
`2003, now Pat. No. 8,055,786, which is a continu
`ation of application No. 09/474,664, filed on Dec. 29,
`1999, now Pat. No. 6,629,163.
`
`(56)
`
`References Cited
`
`U.S. PATENT DOCUMENTS
`
`Hershey et al.
`Hluchy et al.
`van Loo, Jr. et al.
`Pearson et al.
`Musa et al.
`Hasebe et al.
`Dedrick
`Pedersen et al.
`Shwed et al.
`Radia et al.
`Guck
`Callon et al.
`Feiken et al.
`Wesinger, Jr. et al.
`Radogna ................. HO4L 29/06
`370,389
`McHann, Jr. ....... HO4L 41,0213
`TO9,224
`
`Hartmann et al.
`Cheriton et al.
`Tsuruoka
`Schuetze et al.
`Alam et al.
`Buhler et al.
`Volftsun et al.
`Engel et al.
`Shipley
`Papierniak et al.
`Coss et al.
`Volftsun et al.
`Tanaka et al.
`Aditham et al.
`Khan et al.
`Segur
`Kihl et al.
`Spinney et al.
`Kerr et al.
`Erb et al.
`Crouch et al.
`Anderson et al.
`Heimendinger et al.
`Zarom
`Movshovich et al.
`Bellwood et al.
`Leslie et al.
`Hadland
`Spinney et al.
`Gelman et al.
`Cremin et al.
`Engel et al.
`Varghese et al.
`Clayton et al.
`Kloth
`Balassanian
`Dietz et al.
`Eerola
`Jorgensen
`Deng et al.
`Amir et al.
`Taylor
`Kist et al.
`Kerr et al.
`Delaney et al.
`Kivinen et al.
`Boike .
`
`6/2007 Swallow
`7,233,569 B1
`6/2007 Shamoon et al.
`7,233,948 B1
`7,281,036 B1 10/2007 Lu et al.
`7,383,341 B1
`6/2008 Saito et al.
`7,711,857 B2
`5/2010 Balassanian
`8,055,786 B2 11/2011 Balassanian
`8,694,683 B2
`4/2014 Balassanian
`2003. O142669 A1
`7/2003 Kubota et al.
`2004/0015609 A1
`1/2004 Brown .................... HO4L 69.08
`TO9,246
`
`2008/0250.045 A1 10, 2008 Balassanian et al.
`2009 OO83763 A1* 3, 2009 Sareen ................ HO4L 67.2823
`719,317
`
`2009,0265695 A1 10, 2009 Karino
`
`OTHER PUBLICATIONS
`
`Alexander, D. et al., “The SwitchWare Active Network Architec
`ture', Jun. 6, 1998, IEEE.
`Antoniazzi. S. et al., “An Open Software Architecture for Multi
`media Consumer Terminals'. Central Research Labs, Italy; Alcatel
`SEL Research Centre, Germany, ECMAST 1997.
`Arbanowski, Stefan, “Generic Description of Telecommunication
`Services and Dynamic Resource Selection in Intelligent Commu
`nication Environments'. Thesis, Technische Universitat Berlin, Oct.
`9, 1996 (3 documents).
`Arbanowski, S., et al...Service Personalization for Unified Messag
`ing Systems, Jul. 6-8, 1999. The Fourth IEEE Symposium on
`Computers and Communications, ISCC 99, Red Sea, Egypt.
`Atkinson, R. “Security Architecture for the Internet Protocol', Aug.
`1995, Naval Research Laboratory.
`Atkinson, R., “IP Authentication Header'. Aug. 1995, Naval
`Research Laboratory.
`Atkinson, R., “IP Encapsulating Security Payload (ESP)”. Aug.
`1995, Naval Research Laboratory.
`Back, G., et al., Java Operating Systems: Design and Implementa
`tion, Aug. 1998, Technical Report UUCS-98-015, University of
`Utah.
`Baker, Dr. Sean, “CORBA Implementation Issues”, 1994, IONA
`Technologies, O'Reilly Institute Dublin, Ireland.
`Barrett, R., et al., “Intermediaries: New Places for Producing and
`Manipulating Web Content”, 1998, IBM Almaden Research Center,
`Elsevier Science.
`Bellare, M., et al., “A Concrete Security Treatment of Symmetric
`Encryption: Analysis of the DES Modes of Operation'. Aug. 15.
`1997. Dept. of Computer Science and Engineering, University of
`California, San Diego.
`Bellare, M., et al., “A Concrete Security Treatment of Symmetric
`Encryption: Analysis of the DES Modes of Operation'. Aug. 15.
`1997, IEEE.
`Bellare, M., et al., “XOR MACs: New Methods for Message
`Authentication Using Finite Pseudorandom Functions”, 1995,
`CRYPTO 95, LNCS 963, pp. 15-28, Springer-Verlag Berlin
`Heidelberg.
`Bellissard, L., et al., “Dynamic Reconfiguration of Agent-Based
`Applications'. Third European Research Seminar on Advances in
`Distributed Systems, (ERSADS 99) Madeira Island.
`Bolding, Darren, “Network Security, Filters and Firewalls”, 1995,
`www.acm.org/crossroads/Xrds2-1/security.html.
`Booch, G., et al., “Software Engineering with ADA’. 1994. Third
`Edition, The Benjamin/Cummings Publishing Company, Inc. (2
`documents).
`Breugst, et al., “Mobile Agents—Enabling Technology for Active
`Intelligent Network Implementation'. May/Jun. 1998, IEEE Net
`work.
`“C Library Functions”, AUTH(3) Sep. 17, 1993, Solbourne Com
`puter, Inc.
`Chapman, D., et al., “Building Internet Firewalls'. Sep. 1995,
`O'Reilly & Associates, Inc.
`CheckPoint FireWall-1 Technical White Paper, Jul 18, 1994,
`CheckPoint Software Technologies, Ltd.
`CheckPoint FireWall-1 White Paper, Sep. 1995, Version 2.0,
`CheckPoint Software Technologies, Ltd.
`
`5,414,833
`5.425,029
`5,568.478
`5,627,997
`5,710,917
`5,761,651
`5,768,521
`5,826,027
`5,835,726
`5,848,233
`5,848,415
`5,854,899
`5,870.479
`5,898,830
`5.991,299
`
`5, 1995
`A
`6, 1995
`A
`A 10, 1996
`A
`5, 1997
`A
`1, 1998
`A
`6, 1998
`A
`6, 1998
`A 10, 1998
`A 11, 1998
`A 12, 1998
`A 12, 1998
`A 12, 1998
`A
`2, 1999
`A
`4, 1999
`A * 11, 1999
`
`5.991,806
`
`A * 11, 1999
`
`6,047,002
`6,091,725
`6,101,189
`6,101,320
`6,104,500
`6,104,704
`6,111,893
`6,115,393
`6,119,236
`6,128,624
`6,141,749
`6,151,390
`6,157,622
`6, 192,419
`6,199,054
`6.212,550
`6,222,536
`6,226,267
`6,243,667
`6,246,678
`6,259,781
`6,275,507
`6,278,532
`6,356,529
`6,359,911
`6,401,132
`6,404,775
`6.405,254
`6.426,943
`6,493,348
`6,504,843
`6,519,636
`6,560,236
`6,574,610
`6,598,034
`6,629,163
`6,651,099
`6,678,518
`6,680,922
`6,701432
`6,711,166
`6,785,730
`6,871, 179
`6,889, 181
`6,937,574
`6,957,346
`6.959,439
`
`4, 2000
`A
`T/2000
`A
`8, 2000
`A
`8, 2000
`A
`8, 2000
`A
`8, 2000
`A
`8, 2000
`A
`9, 2000
`A
`9, 2000
`A
`A 10, 2000
`A 10, 2000
`A 11, 2000
`A 12, 2000
`B1
`2, 2001
`B1
`3, 2001
`B1
`4, 2001
`B1
`4, 2001
`B1
`5, 2001
`B1
`6, 2001
`B1
`6, 2001
`B1
`T/2001
`B1
`8, 2001
`B1
`8, 2001
`B1
`3, 2002
`B1
`3, 2002
`B1
`6, 2002
`B1
`6, 2002
`B1
`6, 2002
`B1
`T/2002
`B1
`12, 2002
`B1
`1, 2003
`B2
`2, 2003
`B1
`5/2003
`B1
`6, 2003
`B1
`T/2003
`B1
`9, 2003
`B1
`11, 2003
`B2
`1, 2004
`B1
`1, 2004
`B1
`3, 2004
`B1
`3, 2004
`B1
`8, 2004
`B1
`3, 2005
`B2
`5/2005
`B1
`8, 2005
`B1
`10, 2005
`B1 * 10, 2005
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`. G06F 13,102
`
`T19,321
`
`Juniper Ex. 1006-p. 2
`Juniper v Implicit
`
`
`
`US 9,591.104 B2
`Page 3
`
`(56)
`
`References Cited
`
`OTHER PUBLICATIONS
`
`Command Line Interface Guide PN 093-001 1-000 Rev C Version
`2.5, 2000-2001, NetScreen Technologies, Inc.
`Coulson, G. et al., “A CORBA Compliant Real-Time Multimedia
`Platform for Broadband Networks'. Lecture Notes in Computer
`Science, 1996, Trends in Distributed Systems CORBA and Beyond.
`Cox, Brad, "SuperDistribution, Objects. As Property on the Elec
`tronic Frontier', 1996, Addison-Wesley Publishing Company.
`Cranes, et al., “A Configurable Protocol Architecture for CORBA
`Environments'. Autonomous Decentralized Systems 1997 Proceed
`ings ISADS. Third International Symposium Apr. 9-11, 1997.
`Curran, K., et al., “CORBA Lacks Venom'. University of Ulster,
`Northern Ireland, UK 2000.
`Dannert, Andreas, “Call Logic Service for a Personal Communica
`tion Supporting System'. Thesis, Jan. 20, 1998, Technische
`Universitat Berlin.
`DARPA Internet Program Protocol Specification, “Transmission
`Control Protocol'. Sep. 1981, Information Sciences Institute, Cali
`fornia.
`DARPA Internet Program Protocol Specification, “Internet Proto
`col”, Sep. 1981, Information Sciences Institute, California.
`Decasper, D., et al., “Crossbow: A Toolkit for Integrated Services
`over Cell Switched IPv6', 1997. Computer Engineering and Net
`works Laboratory, ETH Zurich, Switzerland.
`Decasper, D., et al., “Router Plugins A Software Architecture for
`Next Generation Routers”, 1998, Proceedings of ACM SIGCONM
`98.
`Deering, S., et al., Internet Protocol, Version 6 (IPv6) Specification,
`Dec. 1998, Nokia, The Internet Society.
`Deering, S., et al., Internet Protocol, Version 6 (IPv6) Specification,
`Dec. 1995, Network Working Group, RFC 1883.
`Dutton, et al., “Asynchronous Transfer Mode Technical Overview
`(ATM), Second Edition; IBM, Oct. 1995, 2" Edition, Prentice Hall
`PTR, USA.
`Eckardt, T., et al., “Application of X.500 and X.700 Standards for
`Supporting Personal Communications in Distributed Computing
`Environments', 1995, IEEE.
`Eckardt, T., et al., “Personal Communications Support based on
`TMN and TINA Concepts”, 1996, IEEE Intelligent Network Work
`shop (IN '96), Apr. 21-24, Melbourne, Australia.
`Eckardt, T., et al., “Beyond IN and UPT-A Personal Communi
`cations Support System Based on TMN Concepts”. Sep.1997, IEEE
`Journal on Selected Areas in Communications, vol. 15, No. 7.
`Egevang, K., et al., “The IP Network Address Translator (NAT)'.
`May 1994, Network Working Group, RFC 1631.
`Estrin, D., et al., “Visa Protocols for Controlling Inter-Organiza
`tional Datagram Flow”. Dec. 1998, Computer Science Department,
`University of Southern California and Digital Equipment Corpora
`tion.
`Faupel, M., “Java Distribution and Deployment”, Oct. 9, 1997.
`APM Ltd., United Kingdom.
`Felber, P. “The CORBA Object Group Service: A Service Approach
`to Object Groups in CORBA'. Thesis, 1998, Ecole Polytechnique
`Federate de Lausanne, Switzerland.
`Fish, R., et al., “DRoPS. Kernel Support for Runtime Adaptable
`Protocols”, Aug. 25-27, 1998, IEEE 24' Euromicro Conference,
`Sweden.
`Fiuczynski, M., et al., “An Extensible Protocol Architecture for
`Application-Specific Networking”. 1996, Department of Computer
`Science and Engineering, University of Washington.
`Franz, Stefan, “Job and Stream Control in Heterogeneous Hardware
`and Software Architectures”, Apr. 1998, Technische Universitat,
`Berlin (2 documents).
`Fraser, T., “DTE Firewalls: Phase Two Measurement and Evalua
`tion Report”. Jul 22, 1997, Trusted Information Systems, USA.
`Gazis, V., et al., “A Survey of Dynamically Adaptable Protocol
`Stacks', first Quarter 2010, IEEE Communications Surveys &
`Tutorials, vol. 12, No. 1, 1 Quarter.
`Gokhale, A., et al., “Evaluating the Performance of Demultiplexing
`Strategies for Real-Time CORBA”, Nov. 1997, GLOBECOM.
`
`Gokhale, A., et al., “Measuring and Optimizing CORBA Latency
`and Scalability Over High-Speed Networks”, Apr. 1998, IEEE
`Transaction on Computers, vol. 47, No. 4; Proceedings of the
`International Conference on Distributed Computing Systems
`(ICDCS 97) May 27-30, 1997.
`Gokhale, A., et al., “Operating System Support for High-Perfor
`mance, Real-Time CORBA’, 1996.
`Gokhale, A., et al., “Principles for Optimizing CORBA Internet
`Inter-ORB Protocol Performance'. Jan. 9, 1998, Proceedings of the
`HICSS Conference, Hawaii.
`Gong, Li, “Java Security: Present and Near Future', May/Jun. 1997.
`IEEE Micro.
`Gong, Li, "New Security Architectural Directions for Java
`(Extended Abstract), Dec. 19, 1996, IEEE.
`Gong, Li, "Secure Java Class Loading”, Nov./Dec. 1998, IEEE
`Internet.
`Goos, G., et al., “Lecture Notes in Computer Science: Mobile
`Agents and Security”, 1998, Springer-Verlag Berlin Heidelberg.
`Goralski, W., “Introduction to ATM Networking”. 1995, McGraw
`Hill Series on Computer Communications, USA.
`Hamzeh, K., et al., “Layer Two Tunneling Protocol L2TP, Jan.
`1998, PPP Working Group, Internet Draft.
`Harrison, T., et al., “The Design and Performance of a Real-Time
`CORBA Event Service”, Aug. 8, 1997.Proceedings of the OOPSLA
`97 Conference, Atlanta, Georgia in Oct. 1997.
`Huitema, Christian, “IPv6 The New Internet Protocol, 1997 Pren
`tice Hall, Second Edition.
`Hutchins, J., et al., “Enhanced Internet Firewall Design Using
`Stateful Filters Final Report', Aug. 1997, Sandia Report; Sandia
`National Laboratories.
`IBM, Local Area Network Concepts and Products: Routers and
`Gateways, May 1996.
`Juniper Networks Press Release, Juniper Networks Announces
`Junos, First Routing Operating System for High-Growth Internet
`Backbone Networks, Jul. 1, 1998, Juniper Networks.
`Juniper Networks Press Release, Juniper Networks Ships the Indus
`try's First Internet Backbone Router Delivering Unrivaled Scalabil
`ity, Control and Performance, Sep. 16, 1998, Juniper Networks.
`Karn, P., et al., “The ESP DES-CBC Transform”, Aug. 1995,
`Network Working Group, RFC 1829.
`Kelsey, J. et al., “Authenticating Outputs of Computer Software
`Using a Cryptographic Coprocessor'. Sep. 1996, CARDIS.
`Krieger, D., et al., “The Emergence of Distributed Component
`Platforms”, Mar. 1998, IEEE.
`Krupczak, B., et al., “Implementing Communication Protocols in
`Java”, Oct. 1998, IEEE Communications Magazine.
`Krupczak, B., et al., “Implementing Protocols in Java: The Price of
`Portability”, 1998, IEEE.
`Lawson, Stephen, “Cisco NetFlow Switching Speeds Traffic Rout
`ing”, Jul. 7, 1997, Infoworld.
`Li, S., et al., “Active Gateway: A Facility for Video Conferencing
`Traffic Control”. Feb. 1, 1997, Purdue University; Purdue e-Pubs;
`Computer Science Technical Reports.
`Magedanz, T., et al., “Intelligent Agents: An Emerging Technology
`for Next Generation Telecommunications?', 1996, IEEE.
`Mills, H., et al., “Principles of Information Systems Analysis and
`Design”, 1986, Academic Press, Inc. (2 documents).
`Mosberger, David, "Scout. A Path-Based Operating System'. Doc
`toral Dissertation Submitted to the University of Arizona, 1997 (3
`documents).
`Muhugusa, M., et al., “COMSCRIPT : An Environment for the
`Implementation of Protocol Stacks and their Dynamic Reconfigura
`tion', Dec. 1994.
`Nelson, M., et al., The Data Compression Book, 2" Edition, 1996,
`M&T Books, A division of MIS Press, Inc.
`NetRanger User's Guide, 1996, WheelGroup Corporation.
`NetScreen Command Line Reference Guide, 2000, PN 093-0000
`001 Rev A. NetScreen Technologies, Inc., USA.
`NetScreen Command Line Reference Guide, 2000, PN 093-0000
`001 NetScreen Technologies, Inc., USA.
`NetScreen Concepts and Examples ScreenOS Reference Guide,
`1998-2001, Version 2.5 P/N 093-0039-000 Rev. A., NetScreen
`Technologies, Inc.
`
`Juniper Ex. 1006-p. 3
`Juniper v Implicit
`
`
`
`US 9,591.104 B2
`Page 4
`
`(56)
`
`References Cited
`
`OTHER PUBLICATIONS
`
`NetScreen Products Webpage, wysiwyg://body bottom.3/http://
`www.een.com/products/products.html 1998-1999, NetScreen
`Technologies, Inc.
`NetScreen WebJI, Reference Guide, Version 2.5.0 P/N 093-0040
`000 Rev. A. 2000-2001, NetScreen Technologies, Inc.
`NetStalker Installation and User's Guide, 1996, Version 1.0.2,
`Haystack Labs, Inc.
`Niculescu, Dragos, "Survey of Active Network Research', Jul. 14.
`1999, Rutgers University.
`Nortel Northern Telecom, “ISDN Primary Rate User-Network Inter
`face Specification'. Aug. 1998.
`Nygren, Erik, “The Design and Implementation of a High-Perfor
`mance Active Network Node'. Thesis, Feb. 1998, MIT.
`Osbourne, E., “Morningstar Technologies Secure0onnect Dynamic
`Firewall Filter User's Guide”. Jun. 14, 1995, V. 14, Morning Star
`Technologies, Inc.
`Padovano, Michael, “Networking Applications on UNIX System V
`Release 4, 1993 Prentice Hall, USA (2 documents).
`Pfeifer, T., "Automatic Conversion of Communication Media',
`2000, GMD Research Series, Germany.
`Pfeifer, T., "Automatic Conversion of Communication Media',
`Thesis, 1999, Technischen Universitat Berlin, Berlin.
`Pfeifer, T., et al., “Applying Quality-of-Service Parametrization for
`Medium-to-Medium Conversion”, Aug. 25-28, 1996, 8' IEEE
`Workshop on Local and Metropolitan Area Networks, Potsdam,
`Germany.
`Pfeifer, T., “Micronet Machines New Architectural Approaches
`for Multimedia End-Systems', 1993 Technical University of Berlin.
`Pfeifer, T., "On the Convergence of Distributed Computing and
`Telecommunications in the Field of Personal Communications'.
`1995, KiVS, Berlin.
`Pfeifer, T. "Speech Synthesis in the Intelligent Personal Commu
`nication Support System (IPCSS)”, Nov. 2-3, 1995, 2" Speak!’
`Workshop on Speech Generation in Multimodal Information Sys
`tems and Practical Applications.
`Pfeifer, T., et al., “Generic Conversion of Communication Media for
`Supporting Personal Mobility”, Nov. 25-27, 1996, Proc. of the Third
`COST 237 Workshop: Multimedia Telecommunications and Appli
`cations.
`Pfeifer, T., et al., “Intelligent Handling of Communication Media'.
`Oct. 29-31, 1997, 6' IEEE Workshop on Future Trends of Distrib
`uted Computing Systems (FTDCS) Tunis.
`Pfeifer, T., et al., “Resource Selection in Heterogeneous Commu
`nication Environments using the Teleservice Descriptor. Dec.
`15-19, 1997, Proceedings from the 4' COST 237 Workshop: From
`Multimedia Services to Network Services, Lisboa.
`Pfeifer, T., et al., Mobile Guide—Location-Aware Applications
`from the Lab to the Market, 1998, IDMS '98, LNCS 1483, pp.
`15-28.
`Pfeifer, T., et al., “The Active Store providing Quality Enhanced
`Unified Messaging”, Oct. 20-22, 1998, 5' Conference on computer
`Communications, AFRICOM-CCDC 98, Tunis.
`Pfeifer, T., et al., “A Modular Location-Aware Service and Appli
`cation Platform', 1999, Technical University of Berlin.
`Plagemann, T., et al., “Evaluating Crucial Performance Issues of
`Protocol Configuration in DaCapo”, 1994, University of Oslo.
`Psounis, Konstantinos, "Active Networks. Applications, Security
`Safety, and Architectures”. First Quarter 1999, IEEE Communica
`tions Surveys.
`Rabiner, Lawrence, "Applications of Speech Recognition in the Area
`of Telecommunications”, 1997, IEEE.
`Raman. Suchitra, et al. "A Model, Analysis, and Protocol Frame
`work for Sofi State-based Communications'. Department of EECS,
`University of California, Berkeley.
`Rogaway, Phillip. “Bucket Hashing and its Application to Fast
`Message Authentication', Oct. 13, 1997. Department of Computer
`Science, University of California.
`Schneier, B., et al., “Remote Auditing of Software Outputs. Using a
`Trusted CoProcessor”, 1997, Elsevier Paper Reprint 1999.
`
`Tennenhouse, D., et al., “From Internet to ActiveNet, Laboratory of
`Computer Science, MIT, 1996.
`Tudor, P., “Tutorial MPEG-2 Video Compression”. Dec. 1995,
`Electronics & Communication Engineering Journal.
`US Copyright Webpage of Copyright Title, “IPv6. the New Internet
`Protocol, by Christian Huitema, 1998 Prentice Hall.
`Van der Meer, et al., “An Approach for a 4' Generation Messaging
`System'. Mar. 21-23, 1999. The Fourth International Symposium on
`Autonomous Decentralized Systems ISADS '99, Tokyo.
`Van der Meer, Sven, "Dynamic Configuration Management of the
`Equipment in Distributed Communication Environments”. Thesis,
`Oct. 6, 1996, Berlin (3 documents).
`Van Renesse, R. et al., “Building Adaptive Systems. Using
`Ensemble', Cornell University Jul. 1997.
`Venkatesan, R., et al., “Threat-Adaptive Security Policy”, 1997.
`IEEE
`Wetherall, D., et al., “The Active IP Option”, Sep.1996, Proceedings
`of the 7" ACM SIGOPS European Workshop, Connemara, Ireland.
`Welch, Terry, "A Technique for High-Performance Data Compres
`sion', 1984. Sperry Research Center, IEEE.
`Zeletin, R. et al., “Applying Location Aware Computing for Elec
`tronic Commerce. Mobile Guide”, Oct. 20-22, 1998, 5' Conference
`on Computer Communications, AFRICOM-CCDC 98, Tunis.
`Zell, Markus, "Selection of Converter Chains by Means of Quality
`of Service Analysis”. Thesis, Feb. 12, 1998, Technische Universitat
`Berlin.
`Feb. 4, 2008 Plaintiff's Original Complaint.
`Aug. 26, 2008 Defendant NVIDIA Corporation's Answer to Com
`plaint.
`Aug. 26, 2008 Defendant Sun Microsystems, Inc.'s Answer to
`Complaint.
`Aug. 27, 2008 Defendant Advanced Micro Devices, Inc.'s Answer
`to Complaint for Patent Infringement.
`Aug. 27, 2008 RealNetworks, Inc.'s Answer to Implicit Networks,
`Inc.'s Original Complaint for Patent Infringement, Affirmative
`Defenses, and Counterclaims.
`Aug. 27, 2008 Intel Corp.'s Answer, Defenses and Counterclaims.
`Aug. 27, 2008 Defendant RMI Corporation's Answer to Plaintiffs
`Original Complaint.
`Sep. 15, 2008 Plaintiffs Reply to NVIDIA Corporation's Counter
`claims.
`Sep. 15, 2008 Plaintiffs Reply to Sun Microsystems Inc.'s Coun
`terclaims.
`Sep. 16, 2008 Plaintiffs Reply to RealNetworks, Inc.'s Counter
`claims.
`Sep. 16, 2008 Plaintiffs Reply to Intel Corp.’s Counterclaims.
`Dec. 10, 2008 Order granting Stipulated Motion for Dismissal with
`Prejudice re NVIDIA Corporation, Inc.
`Dec. 16, 2008 Defendants AMD, RealNetworks, RMI, and Sun's
`Motion to Stay Pending the Patent and Trademark Office's Reex
`amination of the 163 Patent.
`Dec. 29, 2008 Order granting Stipulated Motion for Dismissal
`without Prejudice of Claims re Sun Microsystems, Inc.
`Jan. 5, 2009 Plaintiff's Opposition to Defendants AMD,
`RealNetworks, RMI, and Sun's Motion to Stay Pending Reexami
`nation and Exhibit A.
`Jan. 9, 2009 Reply of Defendants AMD, RealNetworks, RMI, and
`Sun's Motion to Stay Pending the Patent and Trademark Office's
`Reexamination of the 163 Patent.
`Feb. 9, 2009 Order Granting Stay Pending the United States Patent
`and Trademark Office's Reexamination of U.S. Pat. No. 6,629,163.
`Feb. 17, 2009 Order Granting Stipulated Motion for Dismissal of
`Advanced Micro Devices, Inc. with Prejudice.
`May 14, 2009 Order Granting Stipulated Motion for Dismissal of
`RMI Corporation with Prejudice.
`Oct. 13, 2009 Order Granting Stipulated Motion for Dismissal of
`Claims Against and Counterclaims by Intel Corporation.
`Oct. 30, 2009 Executed Order for Stipulated Motion for Dismissal
`of Claims Against and Counterclaims by RealNetworks, Inc.
`Nov. 30, 2009 Plaintiffs. Original Complaint, Implicit v Microsofi,
`Case No. 09-5628.
`Jan. 22, 2010 Order Dismissing Case, Implicit v Microsofi, Case No.
`O9-5628.
`
`Juniper Ex. 1006-p. 4
`Juniper v Implicit
`
`
`
`US 9,591.104 B2
`Page 5
`
`(56)
`
`References Cited
`
`OTHER PUBLICATIONS
`
`Aug. 16, 2010 Plaintiffs. Original Complaint, Implicit v. Cisco, Case
`No. 10-3606.
`Nov. 22, 2010 Defendant Cisco Systems, Inc.'s Answer and Coun
`terclaims, Implicit v. Cisco, Case No. 10-3606.
`Dec. 13, 2010 Plaintiff, Implicit Networks, Inc.'s, Answer to Coun
`terclaims, Implicit v. Cisco, Case No. 10-3606.
`Oct. 4, 2011 Order of Dismissal with Prejudice, Implicit v. Cisco,
`Case No. 10-3606.
`Aug. 24, 2010 Plaintiffs. Original Complaint, Implicit v Citrix, Case
`No. 10-3766.
`Dec. 1, 2010 Plaintiffs First Amended Complaint, Implicit v Citrix,
`Case No. 10-3766.
`Jan. 14, 2011 Defendant Citrix Systems, Inc.'s Answer, Defenses
`and Counter-complaint for Declaratory Judgment, Implicit v Citrix,
`Case No. 10-3766.
`Feb. 18, 2011 Plaintiff, Implicit Networks, Inc.'s, Answer to Defen
`dants Counterclaims, Implicit v Citrix, Case No. 10-3766.
`May 2, 2011 Order of Dismissal, Implicit v Citrix, Case No.
`10-3766.
`Jul. 30, 2010 Plaintiff's Original Complaint, Implicit v F5, Case No.
`10-3365.
`Oct. 13, 2010 Defendants' Answer and Counter-Complaint, Implicit
`v F5, Case No. 10-3365.
`Nov. 3, 2010 Plaintiffs Answer to Counter-Complaint, Implicit v
`F5, Case No. 10-3365.
`Dec. 10, 2010 Plaintiffs First Amended Complaint, Implicit v F5.
`Case No. 10-3365.
`Jan. 14, 2011 Defendants' Answer to 1 Amended Complaint and
`Counterclaim, Implicit v F5, Case No. 10-3365.
`Feb. 18, 2011 Plaintiff's Answer to F5's Amended Counter-Com
`plaint, Implicit v F5, Case No. 10-3365.
`Apr. 18, 2011 Defendants' Amended Answer to 1 Amended
`Complaint and Counter-Complaint, Implicit v F5, Case No.
`10-3365.
`May 5, 2011 Plaintiffs Answer to F5's Amended Counter-Com
`plaint, Implicit v F5, Case No. 10-3365.
`Jul. 22, 2011 F5 Networks, Inc.'s Invalidity Contentions, Implicit v
`F5, Case No. 10-3365.
`Jul. 22, 2011 F5 Networks, Inc.'s Invalidity Contentions, Exhibit A.
`Implicit v F5, Case No. 10-3365 (31 documents).
`Jul. 22, 2011 F5 Networks, Inc.'s Invalidity Contentions, Exhibit B,
`Implicit v F5, Case No. 10-3365.
`Oct. 18, 2011 Joint Claim Construction & Pre-Hearing Statement
`(PR4-3), Implicit v F5, Case No. 10-3365.
`Oct. 18, 2011 Joint Claim Construction & Pre-Hearing Statement
`(PR4-3) Exhibit A, Implicit v F5, Case No. 10-3365 (2 documents).
`Nov. 28, 2011 Plaintiff's Opening Claim Construction Brief,
`Implicit v F5, Case No. 10-3365.
`Nov. 29, 2011 Amended Joint Claim Construction & Pre-Hearing
`Statement, Implicit v F5, Case No. 10-3365.
`Nov. 29, 2011 Amended Joint Claim Construction & Pre-Hearing
`Statement, Exhibit A. Implicit v F5, Case No. 10-3365.
`Dec. 12, 2011 Defendants' Claim Construction Brief, Implicit v F5.
`Case No. 10-3365.
`Dec. 19, 2011 Plaintiffs Reply to Defendants' (F5, HP Juniper)
`Responsive Claim Construction Brief (4-5), Implicit v F5, Case No.
`10-3365.
`Jan. 27, 2012 Transcript of Proceeding Held on Jan. 17, 2012;
`Implicit v F5, Case No. 10-3365.
`Jan. 27, 2012 Transcript of Proceeding Held on Jan. 18, 2012;
`Implicit v F5, Case No. 10-3365.
`Jan. 27, 2012 Transcript of Proceeding Held on Jan. 19, 2012;
`Implicit v F5, Case No. 10-3365.
`Feb. 29, 2012 Claim Construction Order.
`Aug. 15, 2012 Storer Invalidity Report.
`Sep. 10, 2012 Implicit’s Expert Report of Scott M. Nettles.
`Mar. 13, 2013 Order Granting Defendants' Motion for Summary
`Judgment.
`Apr. 9, 2013 Notice of Appeal to the Federal Circuit.
`
`Aug. 23, 2010 Plaintiff's Original Complaint, Implicit v HP, Case
`No. 10-3746.
`Nov. 23, 2010 Plaintiffs First Amended Complaint, Implicit v HP,
`Case No. 10-3746.
`Jan. 14, 2011 Defendant HP's Answer and Counterclaims, Implicit
`v HP, Case No. 10-3746.
`Feb. 18, 2011 Implicit Networks, Inc.'s Answer to HP Counter
`claims, Implicit v HP, Case No. 10-3746.
`May 10, 2011 Plaintiffs Amended Disclosure of Asserted Claims
`and Infringement Contentions, Case No. 10-3746.
`Jun. 30, 2011 Defendant HP Company's Invalidity Contentions,
`Implicit v HP, Case No. 10-3746.
`Jun. 30, 2011 Defendant HP Company's Invalidity Contentions,
`A1-14, Implicit v HP, Case No. 10-3746.
`Jun. 30, 2011 Defendant HP Company's Invalidity Contentions,
`B1-21, Implicit v HP, Case No. 10-3746.
`Sep. 20, 2010 Plaintiff's Original Complaint, Implicit v Juniper,
`Case No. 10-4234.
`Nov. 12, 2010 Juniper Network's Motion to Dismiss For Failure to
`State a Claim Under Rule 12(B)(6): Memorandum of Points and
`Authorities; Implicit v Juniper, Case No. 10-4234.
`Nov. 12, 2010 Juniper Network's Request for Judicial Notice in
`Support of its Motion to Dismiss For Failure to State a Claim Under
`Rule 12(B)(6): Memorandum of Points and Authorities; Implicit v
`Juniper, Case No. 10-4234.
`Dec. 1, 2010 First Amended Complaint; Implicit v Juniper, Case
`No. 10-4234.
`Jan. 18, 2011 Juniper Networks, Inc.'s Answer and Affirmative
`Defenses to 1 Amended Complaint, Implicit v Juniper, Case No.
`10-4234.
`Feb. 18, 2011 Plaintiffs Answer to Defendant's Counterclaims,
`Implicit v Juniper, Case No. 10-4234.
`May 23, 2011 Plaintiff's Disclosure of Asserted Claims and
`Infringement Contentions, Implicit v Juniper, Case No. 10-4234.
`Nov. 15, 2011 Plaintiffs Amended Disclosure of Asserted Claim
`and Infringement Contentions, Implicit v Juniper, Case No.
`10-4234.
`Nov. 28, 2011 Spencer Hosie Declaration in Support of Plaintiffs
`Opening Claim Construction Brief), Implicit v Juniper, Case No.
`10-4234.
`Nov. 28, 2011 Spencer Hosie Declaration in Support of Plaintiffs
`Opening Claim Construction Brief Exhibit E, Implicit v Juniper,
`Case No. 10-4234.
`Nov. 28, 2011 Spencer Hosie Declaration in Support of Plaintiffs
`Opening Claim Construction Brief Exhibit J. Implicit v Juniper,
`Case No. 10-4234.
`Nov. 28, 2011 Spencer Hosie Declaration in Support of Plaintiffs
`Opening Claim Construction Brief Exhibit K. Implicit v Juniper,
`Case No. 10-4234.
`Nov. 28, 2011 Spencer Hosie Declaration in Support of Plaintiffs
`Opening Claim Construction Brief Exhibits M-O, Implicit v Juni
`per, Case No. 10-4234.
`Dec. 12, 2011 Holly Hogan Declaration in Support of Defendants'
`Claim Construction Brief, Implicit v Juniper, Case No. 10-4234.
`Dec. 12, 2011 Holly Hogan Declaration in Support of Defendants'
`Claim Construction Brief, Exhibit B, Implicit v Juniper, Case No.
`10-4234.
`Dec. 12, 2011 Holly Hogan Declaration in Support of Defendants'
`Claim Construction Brief, Exhibit F. Implicit v Juniper, Case No.
`10-4234.
`Dec. 12, 2011 Holly Hogan Declaration in Support of Defendants'
`Claim Construction Brief, Exhibit N. Implicit v Juniper, Case No.
`10-4234.
`Dec. 12, 2011 Holly Hogan Declaration in Support of Defendants'
`Claim Construction Brief, Exhibit P. Implicit v Juniper, Case No.
`10-4234.
`Dec. 12, 2011 Holly Hogan Declaration in Support of Defendants'
`Claim Construction Brief, Exhibit Q. Implicit v Juniper, Case No.
`10-4234.
`Dec. 12, 2011 Holly Hogan Declaration in Support of Defendants'
`Claim Construction Brief, Exhibit S., Implicit v Juniper, Case No.
`10-4234.
`
`Juniper Ex. 1006-p. 5
`Juniper v Implicit
`
`
`
`US 9,591.104 B2
`Page 6
`
`(56)
`
`References Cited
`
`OTHER PUBLICATIONS
`
`Dec. 12, 2011 Holly Hogan Declaration in Support of Defendants'
`Claim Construction Brief, Exhibit T-1, Implicit v Juniper, Case No.
`10-4234.
`Dec. 12, 2011 Holly Hogan Declaration in Support of Defendants'
`Claim Construction Brief, Exhibit T-2, Implicit v Juniper, Case No.
`10-4234.
`Dec. 12, 2011 Holly Hogan Declaration in Support of Defendants'
`Claim Construction Brief, Exhibit T-3, Implicit v Juniper, Case No.
`10-4234.
`Dec. 12, 2011 Holly Hogan Declaration in Support of Defendants'
`Claim Construction Brief, Exhibit T-4, Implicit v Juniper, Case No.
`10-4234.
`Dec. 12, 2011 Holly Hogan Declaration in Support of Defendants'
`Claim Construction Brief, Exhibit U, Implicit v Juniper, Case No.
`10-4234.
`Dec. 12, 2011 Holly Hogan Declaration in Support of Defendants'
`Claim Construction Brief, Exhibit V, Implicit v Juniper, Case No.
`10-4234.
`Dec. 12, 2011 Holly Hogan Declaration in Support of Defendants'
`Claim Construction Brief, Exhibit W. Implicit v Juniper, Case No.
`10-4234.
`Dec. 12, 2011 Holly Hogan Declaration in Support of Defendants'
`Claim Construction Brief, Exhibit X. Implicit v Juniper, Case No.
`10-4234.
`Dec. 12, 2011 Holly Hogan Declaration in Support of Defendants'
`Claim Construction Brief, Exhibit Y-1. Implicit v Juniper, Case No.
`10-4234.
`Dec. 12, 2011 Holly Hogan Declaration in Support of Defendants'
`Claim Construction Brief, Exhibit Y-2, Implicit v Ju