throbber
UNITED STATES PATENT AND TRADEMARK OFFICE
`
`APPLICATION NO.
`
`|
`
`95/000,659
`
`FILING DATE
`
`02/13/2012
`
`|
`
`FIRST NAMED INVENTOR
`
`6629163
`
`55959
`7590
`Newman Du Wors LLP
`1201 Third Avenue, Suite 1600
`SEATTLE, WA 98101
`
`04/03/2012
`
`UNITED STATES DEPARTMENT OF COMMERCE
`States Patent and Trademark
`Office
`United
`COMMISSIONER FOR PATENTS
`Address:
`1450
`P.O. Box
`Alexandria, Virginia
`WWW.
`
`22313-1450
`
`USplo.gov
`
`ATTORNEY DOCKET NO.| CONFIRMATION NO.
`
`|
`
`159291-0025(163)
`
`6219
`
`EXAMINER
`
`AHMED,
`
`|
`
`ART UNIT
`
`3992
`
`SALMAN
`
`PAPER NUMBER
`
`MAIL DATE
`
`04/03/2012
`
`DELIVERY MODE
`
`|
`
`PAPER
`
`|
`
`|
`
`Please find below and/or attached an Office communication concerning this application or proceeding.
`
`The time period for reply, if any,
`
`is set in the attached communication.
`
`PTOL-90A (Rev. 04/07)
`
`JNPR-IMPL_30024_02292245
`
`Page 1 of 188
`
`Implicit Exhibit 2002
`Juniper v. Implicit
`
`

`

`UNITED STATES PATENT AND TRADEMARK OFFICE
`
`DO NOT USE IN PALM PRINTER
`
`THIRD PARTY REQUESTER'S CORRESPONDENCE ADDRESS
`IRELL & MANELLA,
`DAVID MCPHIE
`840 NEWPORT CENTER DR., STE 400
`NEWPORT BEACH, CA 92660
`
`for
`Commissioner
`Patents
`United States Patents and Trademark Office
`P.O.Box
`1450
`Alexandria, VA 22313-1450
`www.uspto.gov
`
`Date: 4 ~
`
`Transmittal of Communication to Third Party Requester
`Inter Partes Reexamination
`REEXAMINATION CONTROL NO. : 95000659
`PATENT NO. : 6629163
`TECHNOLOGY CENTER : 3999
`ART UNIT : 3992
`
`Enclosed is a copy of the latest communication from the United States Patent and Trademark
`Office in the above identified Reexamination proceeding. 37 CFR 1.903.
`
`Prior
`
`to the filing of a Notice of Appeal, each time the patent owner
`responds to this
`the third party requester of the inter partes
`reexamination may once file
`communication,
`written comments within a period of 30 days from the date of service of the patent owner's
`response. This 30-day time period is statutory (35 U.S.C. 314(b)(2)), and, as such,
`it cannot
`be extended. See also 37 CFR 1.947.
`
`If an ex parte reexamination has been merged with the inter partes reexamination, no
`responsive submission by any ex parte third party requester is permitted.
`
`All correspondence relating to this inter partes reexamination proceeding should be directed
`to the Central Reexamination Unit at the mail, FAX, or hand-carry addresses given at the end
`of the communication enclosed with this transmittal.
`
`PTOL-2070(Rev.07-04)
`
`JNPR-IMPL_30024_
`
`Page 2 of 188
`
`Implicit Exhibit 2002
`Juniper v. Implicit
`
`

`

`ORDER GRANTING/DENYING | gsioop 659
`
`Control No.
`
`REQUEST FOR INTER PARTES
`REEXAMINATION
`
`Examiner
`
`SALMAN AHMED
`
`Patent Under
`
`Reexamination
`
`6629163
`Art Unit
`
`3992
`
`-- The MAILING DATE of this communication appears on the cover sheet with the correspondence address. --
`
`The request for infer partes reexamination has been considered.
`Identification of the claims, the
`references relied on, and the rationale supporting the determination are attached.
`
`Attachment(s):
`
`PTO-892
`
`PTO/SB/08
`
`[]Other:
`
`1. [X] The request for inter partes reexamination is GRANTED.
`
`An Office action is attached with this order.
`
`An Office action will follow in due course.
`
`2. [_] The request for inter partes reexamination is DENIED.
`
`This decision is not appealable. 35 U.S.C. 312(c). Requester may seek review of a denial by petition
`to the Director of the USPTO within ONE MONTH from the mailing date hereof. 37 CFR 1.927.
`In.due course, a refund under 37 CFR 1.26(c)
`EXTENSIONS OF TIME ONLY UNDER 37 CFR 1.183.
`will be made to requester.
`
`All correspondence relating to this inter partes reexamination proceeding should be directed to the
`Central Reexamination Unit at the mail, FAX, or hand-carry addresses given at the end of this
`Order.
`
`U.S. Patent and Trademark Office
`PTOL-2063
`(08/06)
`
`Paper No.
`
`20120312
`
`JNPR-IMPL_30024_02292247
`
`Page 3 of 188
`
`Implicit Exhibit 2002
`Juniper v. Implicit
`
`

`

`Application/Control Number: 95/000,659
`Art Unit: 3992
`
`Page 2
`
`DECISION GRANTING INTER PARTES REEXAMINATION
`
`1.
`
`The present
`
`request
`
`for inter partes
`
`reexamination establishes a
`
`reasonable
`
`likelihood that requester will prevail with respect to claims 1, 15 and 35 of United States
`
`Patent Number 6,629,163 (Balassanlan, Edward).
`
`2.
`
`Extensions of time under 37 CFR 1.136(a) will not be permitted in inter partes
`
`reexamination proceedings because the provisions of 37 CFR 1.136 apply only to “an
`
`applicant” and not to the patent owner in a reexamination proceeding. Additionally, 35
`
`U.S.C. 314(c)
`
`requires that inter partes reexamination proceedings “will be conducted
`
`with special dispatch” (37 CFR 1.937). Patent owner extensions of time in infer partes
`
`reexamination
`
`proceedings are provided for in 37 CFR 1.956.
`
`Extensions of time are
`
`not available for third party requester comments, because a comment period of 30 days
`
`from service of patent owner’s response is set by statute. 35 U.S.C. 314(b)(3).
`
`References Cited in the Request
`
`ge
`
`3.
`
`The Request identifies the following printed publications as providing teachings
`
`relevant to the claims of the ‘163 patent.
`
`[US
`
`A
`
`|YS 6,104,500 A
`|US
`
`US 6,243,667 B1
`A
`
`6,651,099
`
`03-29-1994
`08-15-2000 -
`06-05-2001
`11-10-1998
`
`[Yun
`
`[Alam
`
`[Ker
`
`Shwed
`
`[oietz
`
`JNPR-IMPL_30024_02292248
`
`Page 4 of 188
`
`Implicit Exhibit 2002
`Juniper v. Implicit
`
`

`

`Application/Control Number: 95/000,659
`Art Unit: 3992
`
`Page 3
`
`we ye
`ve
`we wen
`PFEIFER et al., Generic Conversion of Communication Media for Supporting Personal
`Telecommunication and Applications, COST 237 Workshop, Nov. 25-27, 1996
`Mobility, Multimedia
`
`ISON Primary Rate
`NORTHERN TELECOM, Digital Switching Systems,
`Interface Specification, NA011, Std 08.01, Aug. 1998
`User-Network
`NELSON et al., The Data Compression Book, 2nd Edition;
`Nov. 6, 1995, M&T Books, New York, NY
`
`COX, Superdistribution: objects as property on the electronic frontier;
`June 4, 1996, Addison-Wesley Publishing, Reading, MA
`In Heterogeneous Hardware and Software
`FRANZ, Job and Stream Control
`Architectures, April 22, 1998, Berlin, DE
`
`|van der MEER, Dynamic Configuration Management of the Equipment in Distributed
`Communication Environments, Oct. 6, 1996, Technische Universitat Berlin, DE
`
`Information Sciences Institute, RFC:793, Transmission Control Protocol, DARPA
`Internet Program Protocal Specification, Sept. 1981, Marina Del Rey, California
`MILLS et al., Principles of Information Systems Analysis and Design,
`Inc., San Diego, CA
`copyright 1986, Academic Press,
`
`ARBANOWSKI, Generic Description of Telecommunication Services and Dynamic
`Resource Selection in Intelligent Communication Environments, Oct. 9, 1996, Berlin, DE
`
`JNPR-IMPL_30024_
`
`Page 5 of 188
`
`Implicit Exhibit 2002
`Juniper v. Implicit
`
`

`

`Application/Control Number: 95/000,659
`Art Unit: 3992
`
`Page 4
`
`LAWSON, Cisco NetFlow Switching speeds. traffi
`7, 1997, ProQuest Center, pg. 19
`routing,
`BELLARE et al., A Concrete Security Treatment of Symmetric Encryption:
`Analysis of the DES Modes of Operation, IEEE, Aug.
`1997
`BELLARE, XOR MACS: New Methods for Message Authentication Using Finite-
`Pseudorandom Functions, CRYPTO
`LNCS 983, pp. 15-28, 1995, Berlin
`
`ic
`
`InfoWorld, July
`
`|
`
`DE
`
`Heidelberg
`IBM Raleigh Center, Local Area Network Concepts and Products: Routers
`and Gateways, ist Ed., May 1996, Research Triangle Park, NC
`NATIONAL INST. OF STDS AND TECH., CheckPoint FireWall-1 White Paper,
`Version 2.0, Sept. 1995, Germany
`
`BELLISSARD et al., Dynamic Reconfiguration of Agent-Based Applications,
`Proceedings of ACM European SIGOPS Workshop, Sinatra, Sept. 1998
`
`FRASER et ail., DTE Firewalls Phase Two Measurement and Evaluation Report,
`TIS Report #0682, July 22, 1997, Glenwood, MD
`
`DECASPER et al., Router Plugins A Software Architecture of Next Generation
`Routers, Proceedings of ACM SIGCOMM '98, Sept. 1998, Vancouver B.c.
`Security Architecture for the Internet Protocol, RFC: 1825,
`ATKINSON,
`-Standard Track, Naval Research Lab., Aug. 1995
`The ESP DES-CBC Transform, Aug.1995
`KARN et al, RFC:
`
`.
`
`1883:
`
`DEERING & HINDEN, Internet Protocol, Version 6 (IPv6)
`RFC: 1883, Standards Track, Dec. 1995
`The New Internet Protocol, Oct. 28, 1997, Prentice-Hall, “Upper
`
`HUITEMA,
`Saddle River, NJ
`DECASPER, Crossbow A Toolkit for Integrated Services over Cell Switched
`IEEE, 1997, Zurich, CH/St. Louis, MO
`IPv6,
`
`Specification,
`
`Scout: A Path-Based Operating System, Dissertation
`MOSBERGER,
`submitted to Dept of Computer Science, 1997, University of Arizona
`KRUPCZAK et al.,
`Implementing Communication Protocols in Java,
`Comminication Magazine, October 1998
`FIUCZYNSKI et al., An Extensible Protocol Architecture for Application-Specific
`Networking, Department of Computer Science and Engineering, Seattle, WA
`MUHUGUSA et al., COMSCRIPT’: An Environment for the
`Protocol Stacks and their Dynamic Reconfiguration, 1994
`
`implementation
`
`of
`
`IEEE
`
`JNPR-IMPL_30024_
`
`Page 6 of 188
`
`Implicit Exhibit 2002
`Juniper v. Implicit
`
`

`

`Application/Control Number: 95/000,659
`Art Unit: 3992
`
`Page 5
`
`Issues Raised in the Request
`
`1.
`
`The following issues for rejection were proposed in the Request for inter partes
`
`reexamination:
`
`issue 1:
`
`Claims 1, 15 and 35 are anticipated by Pfeifer et al.
`
`(Generic Conversion of
`
`Communication Media for Supporting Personal Mobility), hereinafter Pfeifer96.
`
`issue 2:
`
`Claims
`
`1, 15 and 35 are obvious over Pfeifer et al.
`
`(Generic Conversion of
`
`Communication Media for Supporting Personal Mobility), hereinafter Pfeifer96.
`
`issue 3:
`
`Claims
`
`1, 15 and 35 are obvious over Pfeifer et al.
`
`(Generic Conversion of
`
`Communication Media for Supporting Personal Mobility), hereinafter Pfeifer96 in view of
`
`Specification
`
`entitled "ISDN Primary Rate User-Network Interface Specification"
`
`from
`
`Northern Telecom ("ISDN98") and Book entitled "The Data Compression Book" by
`
`Mark Nelson and Jean-Loup Gailly ("Nelson").
`
`issue 4:
`
`Claims 1, 15 and 35 are obvious over Pfeifer et al.
`
`(Generic Conversion of
`
`Communication Media for Supporting Personal Mobility), hereinafter Pfeifer96 in view of
`
`JNPR-IMPL_30024_
`
`Page 7 of 188
`
`Implicit Exhibit 2002
`Juniper v. Implicit
`
`

`

`Application/Control Number: 95/000,659
`Art Unit: 3992
`
`Page 6
`
`Thesis
`
`entitled "Genetic Description of Telecommunication Services
`
`and Dynamic
`
`Resource Selection in Intelligent Communication Environments" by Stefan Arbanowksi
`
`("Arbanowski96").
`
`issue
`
`Claims 1, 15 and 35 are obvious over Pfeifer et al.
`
`(Generic Conversion of
`
`Communication Media for Supporting Personal Mobility), hereinafter Pfeifer96 in
`
`of
`
`view
`
`Article entitled "Resource Selection in Heterogeneous Communication
`
`Environments
`
`using the Teleservice Descriptor" by Tom Pfeifer, Stefan Arbanowski,
`
`and Radu
`
`Popescu-Zeletin
`
`("Pfeifer97").
`
`Issue 6:
`
`Claims 1, 15 and 35 are obvious over Pfeifer et al.
`
`(Generic Conversion of
`
`Communication Media for Supporting Personal Mobility), hereinafter Pfeifer96 in view of
`
`Book entitled "Superdistribution: Objects as Property on the Electronic Frontier" by Brad
`
`Cox ("Cox").
`
`issue 7:
`
`Claims 1, 15 and 35 are obvious over Pfeifer et al.
`
`(Generic Conversion of
`
`Communication Media for Supporting Personal Mobility), hereinafter Pfeifer96 in view of
`
`Thesis entitled "Dynamic Configuration Management of the Equipment in Distributed
`
`Communication
`
`Environments" by Sven van der Meer (Meer96").
`
`JNPR-IMPL_30024_02292252
`
`Page 8 of 188
`
`Implicit Exhibit 2002
`Juniper v. Implicit
`
`

`

`Application/Control Number: 95/000,659
`Art Unit: 3992
`
`Page 7
`
`issue 8:
`
`Claims
`
`1, 15 and 35 are obvious over Pfeifer et al.
`
`(Generic Conversion of
`
`Communication Media for Supporting Personal Mobility), hereinafter Pfeifer96 in view of
`
`Thesis entitled "Dynamic Configuration Management of the Equipment in Distributed
`
`Communication
`
`Environments" by Sven van der Meer ("Meer96") and Specification
`
`entitled
`
`RFC 793:
`
`"Transmission
`
`Control
`
`Protocol"
`
`by
`
`Information
`
`Sciences
`
`Institute ("RFC 793").
`
`Issue 9:
`
`Claims
`
`1, 15 and 35 are obvious over Pfeifer et al.
`
`(Generic Conversion of
`
`Communication Media for Supporting Personal Mobility), hereinafter Pfeifer96 in view of
`
`Thesis entitled "Job and Stream Control
`
`in Heterogeneous Hardware and Software
`
`Architectures" by Stefan Franz ("Franz98").
`
`issue 10:
`
`Claims
`
`1, 15 and 35 are obvious over Pfeifer et al.
`
`(Generic Conversion of
`
`Communication Media for Supporting Personal Mobility), hereinafter Pfeifer96 in view of
`entitled "ISDN Primary Rate User-Network Interface Specification"
`
`Specification
`
`from
`
`Northern
`
`Telecom ("ISDN98"), Book entitled "The Data Compression Book"
`
`by
`
`Mark Nelson and Jean-Loup Gailly ("Nelson"), Book entitled "Superdistribution: Objects
`
`as Property on the Electronic Frontier" by Brad Cox ("Cox"), Thesis entitled "Dynamic
`
`JNPR-IMPL_30024_
`
`Page 9 of 188
`
`Implicit Exhibit 2002
`Juniper v. Implicit
`
`

`

`Application/Control Number: 95/000,659
`Art Unit: 3992
`
`Page 8
`
`Configuration
`
`Management
`
`of
`
`the
`
`Equipment
`
`in
`
`Distributed
`
`Communication
`
`Environments"
`
`by Sven van der Meer ("Meer96"), Specification entitled RFC 793:
`
`"Transmission Control
`Thesis entitled "Job and Stream Control
`
`Protocol" by Information Sciences Institute ("RFC 793") and
`
`in Heterogeneous Hardware and Software
`
`Architectures" by Stefan Franz ("Franz98").
`
`issue 11:
`
`Claims 1, 15 and 35 are obvious over Pfeifer et al.
`
`(Generic Conversion of
`
`Communication Media for Supporting Personal Mobility), hereinafter Pfeifer96 in view of
`
`Article
`
`entitled "Resource Selection in Heterogeneous Communication
`
`Environments
`
`using the Teleservice Descriptor" by Tom Pfeifer, Stefan Arbanowski,
`
`and
`
`Radu
`
`Popescu-Zeletin
`
`("Pfeifer97") and U.S. Patent No. 6,104,500 entitled "Networked Fax
`
`Routing Via Email" by Hassam Alam, Horace Dediu, and Scot Yupaj
`
`("Alam")
`
`issue 12:
`
`Claims 1, 15 and 35 are obvious over Pfeifer et al.
`
`(Generic Conversion of
`
`Communication Media for Supporting Personal Mobility), hereinafter Pfeifer96 in view of
`
`Article entitled "Resource Selection in Heterogeneous Communication
`
`Environments
`
`using
`
`the Teleservice Descriptor" by Tom Pfeifer, Stefan Arbanowski, and Radu
`
`Popescu-Zeletin
`
`("Pfeifer97") and U.S. Patent No. 5,298,6'74 entitled "Apparatus for
`
`Discriminating
`
`an Audio Signal as an Ordinary Vocal Sound or Musical Sound" by
`
`Sang-Lak Yun ("Yun").
`
`JNPR-IMPL_30024_02292254
`
`Page 10 of 188
`
`Implicit Exhibit 2002
`Juniper v. Implicit
`
`

`

`Application/Control Number: 95/000,659
`Art Unit: 3992
`
`Page 9
`
`issue 13:
`
`Claims
`
`1, 15 and 35 are obvious over Pfeifer et al.
`
`(Generic Conversion of
`
`Communication Media for Supporting Personal Mobility), hereinafter Pfeifer96 in view of
`
`Thesis entitled "Job and Stream Control
`
`in Heterogeneous Hardware and Software
`
`Architectures"
`
`by Stefan Franz ("Franz98"), Thesis entitled "Dynamic
`
`Configuration
`
`Management of the Equipment in Distributed Communication Environments" by Sven
`
`van der Meer ("Meer96"), Thesis entitled "Genetic Description of Telecommunication
`
`Services and Dynamic Resource Selection in Intelligent Communication Environments"
`
`by Stefan Arbanowksi
`
`(“Arbanowski96")and Article entitled "Resource Selection in
`
`Heterogeneous Communication Environments using the Teleservice Descriptor" by Tom
`
`Pfeifer, Stefan Arbanowski, and Radu Popescu-Zeletin
`
`("Pfeifer97").
`
`issue 14:
`
`Claims
`
`1, 15 and 35 are obvious over Pfeifer et al.
`
`(Generic Conversion of
`
`Communication Media for Supporting Personal Mobility), hereinafter Pfeifer96 in view of
`
`Thesis
`
`entitled "Genetic Description of Telecommunication
`
`Services
`
`and Dynamic
`
`Resource Selection in intelligent Communication Environments" by Stefan Arbanowksi
`
`("Arbanowski96"),
`
`Article
`
`entitled
`
`"Resource
`
`Selection
`
`in
`
`Heterogeneous
`
`Communication
`
`Environments using the Teleservice Descriptor" by Tom Pfeifer, Stefan
`
`Arbanowski,
`
`and Radu Popescu-Zeletin ('Pfeifer97"),
`
`Specification
`
`entitled
`
`"ISDN
`
`Primary Rate User-Network Interface Specification” from Northern Telecom ("ISDN98"),
`
`JNPR-IMPL_30024_
`
`Page 11 of 188
`
`Implicit Exhibit 2002
`Juniper v. Implicit
`
`

`

`Application/Control Number: 95/000,659
`Art Unit: 3992
`
`Page 10
`
`Book entitled "The Data Compression Book" by Mark Nelson and Jean-Loup Gailly
`
`("Nelson"), Thesis entitled "Dynamic Configuration Management of the Equipment in
`
`Distributed
`
`Communication
`
`Environments" by Sven van der Meer ("Meer96"), Specification entitled
`
`RFC 793:
`
`"Transmission Control Protocol" by Information Sciences Institute ("RFC
`
`793"), Thesis entitled “Job and Stream Control
`
`in Heterogeneous Hardware and
`
`Software Architectures" by Stefan Franz ("Franz98"), U.S. Patent No. 6,104,500 entitled
`
`“Networked Fax Routing Via Email" by Hassam Alam, Horace Dediu, and Scot Yupaj
`
`("Alam") and U.S. Patent No. 5,298,6'74 entitled "Apparatus for Discriminating an Audio
`
`Signal as an Ordinary Vocal Sound or Musical Sound" by Sang-Lak Yun ("Yun")...
`
`issue 15:
`
`Claims
`
`1, 15 and 35 are anticipated over U.S. Pat. No. 6,243,667
`
`entitled
`
`"Network Flow Switching and Flow Data Export,” by Darren R. Kerr and Barry L. Bruins
`
`("Kerr').
`
`Issue 16:
`Claims 1, 15 and 35 are obvious over U.S. Pat. No. 6,243,667 entitled "Network
`
`Flow Switching and Flow Data Export," by Darren R. Kerr and Barry L. Bruins ("Kerr").
`
`issue 17:
`
`JNPR-IMPL_30024_
`
`Page 12 of 188
`
`Implicit Exhibit 2002
`Juniper v. Implicit
`
`

`

`Application/Control Number: 95/000,659
`Art Unit: 3992
`
`Page 11
`
`Claims 1, 15 and 35 are obvious over U.S. Pat. No. 6,243,667 entitled "Network
`
`Flow Switching and Flow Data Export," by Darren R. Kerr and Barry L. Bruins ("Kerr") in
`
`view of Article entitled "Cisco NetFlow Switching speeds traffic routing,”
`
`InfoWorld
`
`Magazine
`
`("NetFlow’).
`
`issue 18:
`
`Claims 1, 15 and 35 are obvious over U.S. Pat. No. 6,243,667 entitled "Network
`
`Flow Switching and Flow Data Export,” by Darren R. Kerr and Barry L. Bruins ("Kerr") in
`
`view of Specification entitled RFC 1825: "Security Architecture for the Internet Protocol" |
`
`by R. Atkinson ("RFC 1825") and Specification entitled RFC 1829: "The ESP DES-CBC
`
`Transform" by P. Kam et al.
`
`("RFC 1829").
`
`issue 19:
`
`Claims 1, 15 and 35 are obvious over U.S. Pat. No. 6,243,667 entitled "Network
`
`Flow Switching and Flow Data Export," by Darren R. Kerr and Barry L. Bruins ("Kerr") in
`
`view of Article entitled "A Concrete Security Treatment of Symmetric Encryption" by M.
`
`Bellare
`
`et
`
`al.
`
`("Bellare97")
`
`and Article
`
`entitled "XOR MACs: New Methods
`
`for
`
`Message
`
`Authentication Using Finite
`
`Pseudorandom Functions" by Mihir
`
`Bellare,
`
`Roch Guerin, and Phillip Rogaway ("Bellare95").
`
`issue 20:
`
`Claims 1, 15 and 35 are obvious over U.S. Pat. No. 6,243,667 entitled "Network
`
`Flow Switching and Flow Data Export," by Darren R. Kerr and Barry L. Bruins ("Kerr") in
`
`JNPR-IMPL_30024_
`
`Page 13 of 188
`
`Implicit Exhibit 2002
`Juniper v. Implicit
`
`

`

`Application/Control Number: 95/000,659
`Art Unit: 3992
`
`Page 12
`
`|
`
`view of Book entitled “Local Area Network Concepts and Products: Routers
`
`and
`
`Gateways" from IBM ("IBM96").
`
`issue 21:
`
`Claims 1, 15 and 35 are obvious over U.S. Pat. No. 6,243,667 entitled "Network
`
`Flow Switching and Flow Data Export," by Darren R. Kerr and Barry L. Bruins ("Kerr") in
`
`view of Book entitled “Local Area Network Concepts and Products: Routers
`
`and
`
`Gateways" from IBM ("IBM96") and Nelson.
`
`issue 22:
`
`Claims 1, 15 and 35 are obvious over U.S. Pat. No. 6,243,667 entitled "Network
`
`Flow Switching and Flow Data Export," by Darren R. Kerr and Barry L. Bruins ("Kerr") in
`
`view of Specification entitled RFC 1825:
`
`"Security Architecture for the Internet Protocol”
`
`by R. Atkinson ("RFC 1825"), Specification entitled RFC 1829: "The ESP DES-CBC
`
`Transform"
`
`by P. Kam et al.
`
`("RFC 1829"), Article entitled "A Concrete
`
`Security
`
`Treatment of Symmetric Encryption” by M. Bellare et al.
`
`("Bellare97") and Article entitled
`
`"XOR MACs: New Methods for Message Authentication Using Finite Pseudorandom
`
`Functions” by Mihir Bellare, Roch Guerin, and Phillip Rogaway ("Bellare95"), Book
`
`entitled "Local Area Network Concepts and Products: Routers and Gateways" from IBM
`
`("IBM96") and Book entitled "The Data Compression Book" by Mark Nelson and Jean-
`
`Loup Gailly ("Nelson").
`
`JNPR-IMPL_30024_
`
`Page 14 of 188
`
`Implicit Exhibit 2002
`Juniper v. Implicit
`
`

`

`Application/Control Number: 95/000,659
`Art Unit: 3992
`
`issue 23:
`
`Page 13
`
`Claims 1, 15 and 35 are obvious over U.S. Pat. No. 6,243,667 entitled "Network
`
`Flow Switching and Flow Data Export,” by Darren R. Kerr and Barry L. Bruins ("Kerr") in
`
`view of Article entitled "Dynamic Reconfiguration of Agent-Based Applications”) by Luc
`
`Bellisard, Noel de Paima, and Michel Riveill
`
`(“Bellisard").
`
`issue 24:
`
`Claims 1, 15 and 35 are obvious over U.S. Pat. No. 6,243,667 entitled "Network
`
`‘Flow Switching and Flow Data Export," by Darren R. Kerr and Barry L. Bruins ("Kerr") in
`
`view of Publication entitled "DTE Firewalls Phase Two Measurement and
`
`Evaluation
`
`Report" by Timothy L. Fraser et al. of Trusted Information Systems ("Fraser’).
`
`issue 25:
`
`Claims 1, 15 and 35 are obvious over U.S. Pat. No. 6,243,667 entitled "Network
`
`Flow Switching and Flow Data Export," by Darren R. Kerr and Barry L. Bruins ("Kerr") in
`
`view of Specification entitled RFC 1825: "Security Architecture for the Internet Protocol"
`
`by R. Atkinson ("RFC 1825"), Specification entitled RFC 1829: "The ESP DES-CBC
`
`Transform" by P. Kam et al.
`
`("RFC 1829"), Article entitled "A Concrete
`
`Security
`
`Treatment of Symmetric Encryption" by M. Bellare et al:
`
`("Bellare97") and Article entitled
`
`"XOR MACs: New Methods for Message Authentication Using Finite Pseudorandom
`
`Functions"
`
`by Mihir Bellare, Roch Guerin,
`
`and Phillip Rogaway ("Bellare95"), Book
`
`entitled "Local Area Network Concepts and Products: Routers and Gateways" from IBM
`
`("IBM96") and Book entitled "The Data Compression Book" by Mark Nelson and Jean-
`
`JNPR-IMPL_30024_
`
`Page 15 of 188
`
`Implicit Exhibit 2002
`Juniper v. Implicit
`
`

`

`Application/Control Number: 95/000,659
`Art Unit: 3992
`
`Page 14
`
`Loup Gailly
`
`("Nelson"), Article
`
`entitled
`
`"Dynamic
`
`Reconfiguration
`
`of Agent-Based
`
`Applications”)
`
`by Luc Bellisard, Noel de Palma, and Michel Riveill
`
`("Bellisard")
`
`and
`
`Publication entitled "DTE Firewalls Phase Two Measurement and Evaluation Report" by
`
`Timothy L. Fraser et al. of Trusted Information Systems ("Fraser").
`
`issue 26:
`
`Claims 1, 15 and 35 are obvious over U.S. Pat. No. 6,243,667 entitled "Network
`
`Flow Switching and Flow Data Export," by Darren R. Kerr and Barry L. Bruins ("Kerr") in
`
`view of Article entitled "Checkpoint Firewall-| White Paper, Version 2.0"
`
`("Checkpoint")
`
`and U.S. Pat. No. 5,835,726 entitled "System for securing the flow of and selectively
`
`modifying packets in a computer network,” by Shwed et al.
`
`("Shwed").
`
`issue 27:
`
`Claims 1, 15 and 35 are obvious over U.S. Pat. No. 6,243,667 entitled "Network
`
`Flow Switching and Flow Data Export," by Darren R. Kerr and Barry L. Bruins ("Kerr") in
`
`view of U.S. Pat. No. 6,651,099 entitled "Method and Apparatus for Monitoring Traffic in
`
`a Network" by Russell S. Dietz et al.
`
`("Dietz").
`
`issue 28:
`
`|
`
`Claims 1, 15 and 35 are obvious over U.S. Pat. No. 6,243,667 entitled "Network
`
`Flow Switching and Flow Data Export," by Darren R. Kerr and Barry L. Bruins ("Kerr") in
`
`view of Pfeifer et al.
`
`(Generic Conversion of Communication Media for
`
`Supporting
`
`Personal Mobility), hereinafter Pfeifer96.
`
`JNPR-IMPL_30024_02292260
`
`Page 16 of 188
`
`Implicit Exhibit 2002
`Juniper v. Implicit
`
`

`

`Application/Control Number: 95/000,659
`Art Unit: 3992
`
`Page 15
`
`issue 29:
`
`Claims
`
`1, 15 and 35 are anticipated by Article entitled "Router Plugins: A
`
`Software
`
`Architecture
`
`for Next Generation Routers"
`
`by Dan Decasper et
`
`al.
`
`("Decasper98").
`
`issue 30:
`
`Claims 1, 15 and 35 are obvious over Article entitled "Router Plugins: A Software
`
`Architecture for Next Generation Routers" by Dan Decasper et al.
`
`("Decasper98").
`
`issue 31:
`
`Claims 1, 15 and 35 are obvious over Article entitled "Router Plugins: A Software
`
`Architecture
`
`for Next Generation Routers" by Dan Decasper et al.
`
`("Decasper98")
`
`in
`
`view of Specification entitled RFC 1825: "Security Architecture for the Internet Protocol"
`
`by R. Atkinson ("RFC 1825"), Specification entitled RFC 1829: "The ESP DES-CBC
`
`Transform” by P. Kam et al.
`
`("REC 1829").
`
`issue 32:
`
`Claims 1, 15 and 35 are obvious over Article entitled "Router Plugins: A Software
`
`Architecture for Next Generation Routers" by Dan Decasper et al.
`
`("Decasper98")
`
`in
`
`view of
`
`Specification
`
`entitled RFC 1883:
`
`“Internet
`
`Protocol, Version 6
`
`(IPv6)
`
`JNPR-IMPL_30024_
`
`Page 17 of 188
`
`Implicit Exhibit 2002
`Juniper v. Implicit
`
`

`

`Application/Control Number: 95/000,659
`Art Unit: 3992
`
`Page 16
`
`Specification" by S. Deering and R. Hinden ("RFC 1883") and Book entitled "IPv6: The
`
`New Internet Protocol" by Christian Huitema ("Huitema’).
`
`issue 33:
`
`Claims 1, 15 and 35 are obvious over Article entitled "Router Plugins: A Software
`
`Architecture
`
`for Next Generation Routers" by Dan Decasper et al.
`view of Article entitled "Crossbow: A Toolkit for Integrated Services over Cell Switched
`
`("Decasper98")
`
`in
`
`IPv6" by Dan Decasper et al.
`
`("Decasper97").
`
`issue 34:
`
`Claims 1, 15 and 35 are obvious over Article entitled "Router Plugins: A Software
`
`Architecture
`
`for Next Generation Routers” by Dan Decasper et al.
`
`("Decasper98")
`
`in
`
`view of Article entitled "Crossbow: A Toolkit for Integrated Services over Cell Switched
`
`IPv6" by Dan Decasper et al.
`
`(“Decasper97"), Article entitled "A Concrete Security
`
`Treatment of Symmetric Encryption" by M. Bellare et al. ("Bellare97") and Article entitled
`
`"XOR MACs: New Methods for Message Authentication Using Finite Pseudorandom
`
`Functions" by Mihir Bellare, Roch Guerin, and Phillip Rogaway ("Bellare95").
`
`issue 35:
`
`Claims 1, 15 and 35 are obvious over Article entitled “Router Plugins: A Software
`
`Architecture
`
`for Next Generation Routers" by Dan Decasper et al.
`
`("Decasper98")
`
`in
`
`JNPR-IMPL_30024_
`
`Page 18 of 188
`
`Implicit Exhibit 2002
`Juniper v. Implicit
`
`

`

`Application/Control Number: 95/000,659
`Art Unit: 3992
`
`Page 17
`
`view of Book entitled "Local Area Network Concepts and Products: Routers
`
`and
`
`Gateways" from IBM ("IBM96").
`
`issue 36:
`
`Claims 1, 15 and 35 are obvious overArticle entitled "Router Plugins: A Software
`for Next Generation Routers" by Dan Decasper et al.
`Architecture
`
`("Decasper98")
`
`in
`
`view of Book entitled "Local Area Network Concepts and Products: Routers
`
`and
`
`Gateways” from IBM ("IBM96") and Book entitled "The Data Compression Book" by
`
`Mark Nelson and Jean-Loup Gailly ("Nelson’).
`
`issue 37:
`
`Claims 1, 15 and 35 are obvious over Article entitled "Router Plugins: A
`
`Software
`
`Architecture
`
`for Next Generation Routers" by Dan Decasper et al.
`
`("Decasper98")
`
`in
`
`view of Specification entitled RFC 1825: "Security Architecture for the Internet Protocol"
`
`by R. Atkinson ("RFC 1825"), Specification entitled RFC 1829, "Crossbow: A Toolkit for
`
`Integrated Services over Cell Switched IPv6" by Dan Decasper et al.
`
`("Decasper97"),
`
`Article entitled "A Concrete Security Treatment of Symmetric Encryption" by M. Bellare
`
`et al.
`
`("Bellare97")
`
`and Article entitled "XOR MACs: New Methods for Message
`
`Authentication Using Finite Pseudorandom Functions" by Mihir Bellare, Roch Guerin,
`
`and Phillip Rogaway ("Bellare95"), Book entitled "Local Area Network Concepts and
`
`Products: Routers and Gateways" from IBM ("IBM96") and Book entitled "The Data
`
`Compression Book" by Mark Nelson and Jean-Loup Gailly ("Nelson").
`
`JNPR-IMPL_30024_
`
`Page 19 of 188
`
`Implicit Exhibit 2002
`Juniper v. Implicit
`
`

`

`Application/Control Number: 95/000,659
`Art Unit: 3992
`
`issue 38:
`
`Page 18
`
`Claims 1, 15 and 35 are obvious over Article entitled "Router Plugins: A Software
`
`Architecture
`
`for Next Generation Routers" by Dan Decasper et al.
`
`("Decasper98")
`
`in
`
`view of Article entitled "Dynamic Reconfiguration of Agent-Based Applications”) by Luc
`
`Bellisard, Noel de Palma, and Michel Riveill
`
`("Bellisard").
`
`issue 39:
`
`Claims 1, 15 and 35 are obvious over Article entitled "Router Plugins: A Software
`
`Architecture
`
`for Next Generation Routers" by Dan Decasper et al.
`
`("Decasper98")
`
`in
`
`view of Publication entitled "DTE Firewalls Phase Two Measurement and
`
`Evaluation
`
`Report" by Timothy L. Fraser et al. of Trusted Information Systems ("Fraser’).
`
`Issue 40:
`
`Claims 71, 15 and 35 are obvious over Article entitled "Router Plugins: A Software
`
`Architecture
`
`for Next Generation Routers” by Dan Decasper et al.
`
`("Decasper98")
`
`in
`
`view of Specification entitled RFC 1825: "Security Architecture for the Internet Protocol"
`
`by R. Atkinson ("RFC 1825"), Specification entitled RFC 1829: "The ESP DES-CBC
`
`Transform" by P. Kam et al. ("RFC 1829"), Specification entitled RFC 1883: "Intemet
`
`Protocol, Version 6 (IPv6) Specification" by S. Deering and R. Hinden ("RFC 1883"),
`
`Book entitled "IPv6: The New Internet Protocol" by Christian Huitema
`
`("Huitema"),
`
`Article entitled "Crossbow: A Toolkit for Integrated Services over Cell Switched.
`
`IPv6" by
`
`Dan Decasper et al. ("Decasper97"), Article entitled "A Concrete Security Treatment of
`
`JNPR-IMPL_30024_
`
`Page 20 of 188
`
`Implicit Exhibit 2002
`Juniper v. Implicit
`
`

`

`Application/Control Number: 95/000,659
`Art Unit: 3992
`
`Page 19
`
`Symmetric Encryption" by M. Bellare et al.
`
`("Bellare97"), Article entitled "XOR MACs:
`
`New Methods for Message Authentication Using Finite Pseudorandom Functions” by
`
`Mihir Bellare, Roch Guerin, and Phillip Rogaway ("Bellare95"),
`
`Book entitled "Local
`
`Area Network Concepts and Products: Routers and Gateways” from IBM ("IBM96"),
`
`Book entitled "The Data Compression Book" by Mark Nelson and Jean-Loup Gailly
`
`("Nelson"), Article entitled "Dynamic Reconfiguration of Agent-Based Applications”) by
`
`Luc Bellisard, Noel de Palma, and Michel Riveill
`
`("Bellisard") and Publication entitled
`
`"DTE Firewalls Phase Two Measurement and Evaluation Report" by Timothy L. Fraser
`
`et al. of Trusted Information Systems ("Fraser").
`
`issue 41:
`
`Claims
`
`1,
`
`15
`
`and
`
`35 are
`
`anticipated
`
`by Article
`
`entitled
`
`"Implementing
`
`Communication
`
`Protocols in Java" by Bobby Krupezak et. al
`
`("HotLava").
`
`issue 42:
`
`Claims
`
`1, 15 and 35 are anticipated by Dissertation entitled "Scout: A Path-
`
`Based
`
`Operating System" by David Mosberger
`
`("Mosberger").
`
`Issue 43:
`
`Claims 1, 15 and 35 are obvious over Dissertation entitled "Scout: A Path-Based
`
`Operating System" by David Mosberger ("Mosberger").
`
`‘JNPR-IMPL_30024_02292265
`
`Page 21 of 188
`
`Implicit Exhibit 2002
`Juniper v. Implicit
`
`

`

`Application/Control Number: 95/000,659
`Art Unit: 3992
`
`Page 20
`
`issue 44;
`
`Claims 1, 15 and 35 are obvious over Dissertation entitled "Scout: A Path-Based
`
`Operating
`
`System"
`
`by David Mosberger
`
`("Mosberger")
`
`and
`
`Article
`
`entitled
`
`"Implementing Communication Protocols in Java" by Bobby Krupezak et. al ("HotLava’). .
`
`issue 45:
`
`Claims 1, 15 and 35 are obvious over Dissertation entitled "Scout: A Path-Based
`
`Operating
`
`System" by David Mosberger
`
`("Mosberger")
`
`and
`
`Article
`
`entitled "An
`
`Extensible
`
`Protocol Architecture
`
`for
`
`Application-Specific
`
`Networking”
`
`by Marc
`
`Fiuczynski
`
`("Plexus").
`
`issue 46:
`
`et.
`
`al
`
`Claims 1, 15 and 35 are obvious over Dissertation entitled "Scout: A
`
`Path-Based
`
`. Operating System" by David Mosberger ("Mosberger") and Article entitled "ComScript:
`
`An Environment
`
`for
`
`the
`
`Implementation
`
`of Protocol
`
`Stacks
`
`and their Dynamic
`
`Reconfiguration” by Murhimanya Muhugusa et. al (ComScript).
`
`JNPR-IMPL_30024_
`
`Page 22 of 188
`
`Implicit Exhibit 2002
`Juniper v. Implicit
`
`

`

`Application/Control Number: 95/000,659
`Art Unit: 3992
`
`Page 21
`
`Reasonable Likelihood that Requester will prevail Statement
`
`As noted on pages 24-271 of the Request, the Requester submits that Pfeifer96,
`
`Kerr, Decasper98, Mosberger and HotLava in combination with other prior art
`
`raise
`
`RLP based on proposed teachings.
`
`ISSUE 1
`
`Pfeifer96
`
`teaches the Intelligent Personal Communication Support System is
`
`introduced as an application for multiple media conversion tools, embedded in a context
`
`of personal mobility, service personalization and service interoperability support.
`
`(Mi, Fi, Sp | media:
`
`Ip (My, Fo,
`
`Fig.
`
`1.
`
`Media converter system
`
`After
`
`discussing models
`
`for
`
`conversion
`
`in
`
`theory,
`
`the current
`
`conversion
`
`technology
`
`is evaluated. The
`
`necessity of an
`
`integrated
`
`framework of
`
`flexible
`
`converters
`
`and a generic converter model are derived and automatic management
`
`of conversion quality is discussed (Abstract).
`
`Pfeifer96 further teaches
`
`JNPR-IMPL_30024_02292267
`
`Page 23 of 188
`
`Implicit Exhibit 2002
`Juniper v. Implicit
`
`

`

`Application/Control Number: 95/000,659
`Art Unit: 3992
`
`Page 22
`
`For converting one format of the same medium into another, tools exist for many
`for text, bitmap images and audio. They are mostly in the public domain,
`platforms
`an

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket