`
`APPLICATION NO.
`
`|
`
`95/000,659
`
`FILING DATE
`
`02/13/2012
`
`|
`
`FIRST NAMED INVENTOR
`
`6629163
`
`55959
`7590
`Newman Du Wors LLP
`1201 Third Avenue, Suite 1600
`SEATTLE, WA 98101
`
`04/03/2012
`
`UNITED STATES DEPARTMENT OF COMMERCE
`States Patent and Trademark
`Office
`United
`COMMISSIONER FOR PATENTS
`Address:
`1450
`P.O. Box
`Alexandria, Virginia
`WWW.
`
`22313-1450
`
`USplo.gov
`
`ATTORNEY DOCKET NO.| CONFIRMATION NO.
`
`|
`
`159291-0025(163)
`
`6219
`
`EXAMINER
`
`AHMED,
`
`|
`
`ART UNIT
`
`3992
`
`SALMAN
`
`PAPER NUMBER
`
`MAIL DATE
`
`04/03/2012
`
`DELIVERY MODE
`
`|
`
`PAPER
`
`|
`
`|
`
`Please find below and/or attached an Office communication concerning this application or proceeding.
`
`The time period for reply, if any,
`
`is set in the attached communication.
`
`PTOL-90A (Rev. 04/07)
`
`JNPR-IMPL_30024_02292245
`
`Page 1 of 188
`
`Implicit Exhibit 2002
`Juniper v. Implicit
`
`
`
`UNITED STATES PATENT AND TRADEMARK OFFICE
`
`DO NOT USE IN PALM PRINTER
`
`THIRD PARTY REQUESTER'S CORRESPONDENCE ADDRESS
`IRELL & MANELLA,
`DAVID MCPHIE
`840 NEWPORT CENTER DR., STE 400
`NEWPORT BEACH, CA 92660
`
`for
`Commissioner
`Patents
`United States Patents and Trademark Office
`P.O.Box
`1450
`Alexandria, VA 22313-1450
`www.uspto.gov
`
`Date: 4 ~
`
`Transmittal of Communication to Third Party Requester
`Inter Partes Reexamination
`REEXAMINATION CONTROL NO. : 95000659
`PATENT NO. : 6629163
`TECHNOLOGY CENTER : 3999
`ART UNIT : 3992
`
`Enclosed is a copy of the latest communication from the United States Patent and Trademark
`Office in the above identified Reexamination proceeding. 37 CFR 1.903.
`
`Prior
`
`to the filing of a Notice of Appeal, each time the patent owner
`responds to this
`the third party requester of the inter partes
`reexamination may once file
`communication,
`written comments within a period of 30 days from the date of service of the patent owner's
`response. This 30-day time period is statutory (35 U.S.C. 314(b)(2)), and, as such,
`it cannot
`be extended. See also 37 CFR 1.947.
`
`If an ex parte reexamination has been merged with the inter partes reexamination, no
`responsive submission by any ex parte third party requester is permitted.
`
`All correspondence relating to this inter partes reexamination proceeding should be directed
`to the Central Reexamination Unit at the mail, FAX, or hand-carry addresses given at the end
`of the communication enclosed with this transmittal.
`
`PTOL-2070(Rev.07-04)
`
`JNPR-IMPL_30024_
`
`Page 2 of 188
`
`Implicit Exhibit 2002
`Juniper v. Implicit
`
`
`
`ORDER GRANTING/DENYING | gsioop 659
`
`Control No.
`
`REQUEST FOR INTER PARTES
`REEXAMINATION
`
`Examiner
`
`SALMAN AHMED
`
`Patent Under
`
`Reexamination
`
`6629163
`Art Unit
`
`3992
`
`-- The MAILING DATE of this communication appears on the cover sheet with the correspondence address. --
`
`The request for infer partes reexamination has been considered.
`Identification of the claims, the
`references relied on, and the rationale supporting the determination are attached.
`
`Attachment(s):
`
`PTO-892
`
`PTO/SB/08
`
`[]Other:
`
`1. [X] The request for inter partes reexamination is GRANTED.
`
`An Office action is attached with this order.
`
`An Office action will follow in due course.
`
`2. [_] The request for inter partes reexamination is DENIED.
`
`This decision is not appealable. 35 U.S.C. 312(c). Requester may seek review of a denial by petition
`to the Director of the USPTO within ONE MONTH from the mailing date hereof. 37 CFR 1.927.
`In.due course, a refund under 37 CFR 1.26(c)
`EXTENSIONS OF TIME ONLY UNDER 37 CFR 1.183.
`will be made to requester.
`
`All correspondence relating to this inter partes reexamination proceeding should be directed to the
`Central Reexamination Unit at the mail, FAX, or hand-carry addresses given at the end of this
`Order.
`
`U.S. Patent and Trademark Office
`PTOL-2063
`(08/06)
`
`Paper No.
`
`20120312
`
`JNPR-IMPL_30024_02292247
`
`Page 3 of 188
`
`Implicit Exhibit 2002
`Juniper v. Implicit
`
`
`
`Application/Control Number: 95/000,659
`Art Unit: 3992
`
`Page 2
`
`DECISION GRANTING INTER PARTES REEXAMINATION
`
`1.
`
`The present
`
`request
`
`for inter partes
`
`reexamination establishes a
`
`reasonable
`
`likelihood that requester will prevail with respect to claims 1, 15 and 35 of United States
`
`Patent Number 6,629,163 (Balassanlan, Edward).
`
`2.
`
`Extensions of time under 37 CFR 1.136(a) will not be permitted in inter partes
`
`reexamination proceedings because the provisions of 37 CFR 1.136 apply only to “an
`
`applicant” and not to the patent owner in a reexamination proceeding. Additionally, 35
`
`U.S.C. 314(c)
`
`requires that inter partes reexamination proceedings “will be conducted
`
`with special dispatch” (37 CFR 1.937). Patent owner extensions of time in infer partes
`
`reexamination
`
`proceedings are provided for in 37 CFR 1.956.
`
`Extensions of time are
`
`not available for third party requester comments, because a comment period of 30 days
`
`from service of patent owner’s response is set by statute. 35 U.S.C. 314(b)(3).
`
`References Cited in the Request
`
`ge
`
`3.
`
`The Request identifies the following printed publications as providing teachings
`
`relevant to the claims of the ‘163 patent.
`
`[US
`
`A
`
`|YS 6,104,500 A
`|US
`
`US 6,243,667 B1
`A
`
`6,651,099
`
`03-29-1994
`08-15-2000 -
`06-05-2001
`11-10-1998
`
`[Yun
`
`[Alam
`
`[Ker
`
`Shwed
`
`[oietz
`
`JNPR-IMPL_30024_02292248
`
`Page 4 of 188
`
`Implicit Exhibit 2002
`Juniper v. Implicit
`
`
`
`Application/Control Number: 95/000,659
`Art Unit: 3992
`
`Page 3
`
`we ye
`ve
`we wen
`PFEIFER et al., Generic Conversion of Communication Media for Supporting Personal
`Telecommunication and Applications, COST 237 Workshop, Nov. 25-27, 1996
`Mobility, Multimedia
`
`ISON Primary Rate
`NORTHERN TELECOM, Digital Switching Systems,
`Interface Specification, NA011, Std 08.01, Aug. 1998
`User-Network
`NELSON et al., The Data Compression Book, 2nd Edition;
`Nov. 6, 1995, M&T Books, New York, NY
`
`COX, Superdistribution: objects as property on the electronic frontier;
`June 4, 1996, Addison-Wesley Publishing, Reading, MA
`In Heterogeneous Hardware and Software
`FRANZ, Job and Stream Control
`Architectures, April 22, 1998, Berlin, DE
`
`|van der MEER, Dynamic Configuration Management of the Equipment in Distributed
`Communication Environments, Oct. 6, 1996, Technische Universitat Berlin, DE
`
`Information Sciences Institute, RFC:793, Transmission Control Protocol, DARPA
`Internet Program Protocal Specification, Sept. 1981, Marina Del Rey, California
`MILLS et al., Principles of Information Systems Analysis and Design,
`Inc., San Diego, CA
`copyright 1986, Academic Press,
`
`ARBANOWSKI, Generic Description of Telecommunication Services and Dynamic
`Resource Selection in Intelligent Communication Environments, Oct. 9, 1996, Berlin, DE
`
`JNPR-IMPL_30024_
`
`Page 5 of 188
`
`Implicit Exhibit 2002
`Juniper v. Implicit
`
`
`
`Application/Control Number: 95/000,659
`Art Unit: 3992
`
`Page 4
`
`LAWSON, Cisco NetFlow Switching speeds. traffi
`7, 1997, ProQuest Center, pg. 19
`routing,
`BELLARE et al., A Concrete Security Treatment of Symmetric Encryption:
`Analysis of the DES Modes of Operation, IEEE, Aug.
`1997
`BELLARE, XOR MACS: New Methods for Message Authentication Using Finite-
`Pseudorandom Functions, CRYPTO
`LNCS 983, pp. 15-28, 1995, Berlin
`
`ic
`
`InfoWorld, July
`
`|
`
`DE
`
`Heidelberg
`IBM Raleigh Center, Local Area Network Concepts and Products: Routers
`and Gateways, ist Ed., May 1996, Research Triangle Park, NC
`NATIONAL INST. OF STDS AND TECH., CheckPoint FireWall-1 White Paper,
`Version 2.0, Sept. 1995, Germany
`
`BELLISSARD et al., Dynamic Reconfiguration of Agent-Based Applications,
`Proceedings of ACM European SIGOPS Workshop, Sinatra, Sept. 1998
`
`FRASER et ail., DTE Firewalls Phase Two Measurement and Evaluation Report,
`TIS Report #0682, July 22, 1997, Glenwood, MD
`
`DECASPER et al., Router Plugins A Software Architecture of Next Generation
`Routers, Proceedings of ACM SIGCOMM '98, Sept. 1998, Vancouver B.c.
`Security Architecture for the Internet Protocol, RFC: 1825,
`ATKINSON,
`-Standard Track, Naval Research Lab., Aug. 1995
`The ESP DES-CBC Transform, Aug.1995
`KARN et al, RFC:
`
`.
`
`1883:
`
`DEERING & HINDEN, Internet Protocol, Version 6 (IPv6)
`RFC: 1883, Standards Track, Dec. 1995
`The New Internet Protocol, Oct. 28, 1997, Prentice-Hall, “Upper
`
`HUITEMA,
`Saddle River, NJ
`DECASPER, Crossbow A Toolkit for Integrated Services over Cell Switched
`IEEE, 1997, Zurich, CH/St. Louis, MO
`IPv6,
`
`Specification,
`
`Scout: A Path-Based Operating System, Dissertation
`MOSBERGER,
`submitted to Dept of Computer Science, 1997, University of Arizona
`KRUPCZAK et al.,
`Implementing Communication Protocols in Java,
`Comminication Magazine, October 1998
`FIUCZYNSKI et al., An Extensible Protocol Architecture for Application-Specific
`Networking, Department of Computer Science and Engineering, Seattle, WA
`MUHUGUSA et al., COMSCRIPT’: An Environment for the
`Protocol Stacks and their Dynamic Reconfiguration, 1994
`
`implementation
`
`of
`
`IEEE
`
`JNPR-IMPL_30024_
`
`Page 6 of 188
`
`Implicit Exhibit 2002
`Juniper v. Implicit
`
`
`
`Application/Control Number: 95/000,659
`Art Unit: 3992
`
`Page 5
`
`Issues Raised in the Request
`
`1.
`
`The following issues for rejection were proposed in the Request for inter partes
`
`reexamination:
`
`issue 1:
`
`Claims 1, 15 and 35 are anticipated by Pfeifer et al.
`
`(Generic Conversion of
`
`Communication Media for Supporting Personal Mobility), hereinafter Pfeifer96.
`
`issue 2:
`
`Claims
`
`1, 15 and 35 are obvious over Pfeifer et al.
`
`(Generic Conversion of
`
`Communication Media for Supporting Personal Mobility), hereinafter Pfeifer96.
`
`issue 3:
`
`Claims
`
`1, 15 and 35 are obvious over Pfeifer et al.
`
`(Generic Conversion of
`
`Communication Media for Supporting Personal Mobility), hereinafter Pfeifer96 in view of
`
`Specification
`
`entitled "ISDN Primary Rate User-Network Interface Specification"
`
`from
`
`Northern Telecom ("ISDN98") and Book entitled "The Data Compression Book" by
`
`Mark Nelson and Jean-Loup Gailly ("Nelson").
`
`issue 4:
`
`Claims 1, 15 and 35 are obvious over Pfeifer et al.
`
`(Generic Conversion of
`
`Communication Media for Supporting Personal Mobility), hereinafter Pfeifer96 in view of
`
`JNPR-IMPL_30024_
`
`Page 7 of 188
`
`Implicit Exhibit 2002
`Juniper v. Implicit
`
`
`
`Application/Control Number: 95/000,659
`Art Unit: 3992
`
`Page 6
`
`Thesis
`
`entitled "Genetic Description of Telecommunication Services
`
`and Dynamic
`
`Resource Selection in Intelligent Communication Environments" by Stefan Arbanowksi
`
`("Arbanowski96").
`
`issue
`
`Claims 1, 15 and 35 are obvious over Pfeifer et al.
`
`(Generic Conversion of
`
`Communication Media for Supporting Personal Mobility), hereinafter Pfeifer96 in
`
`of
`
`view
`
`Article entitled "Resource Selection in Heterogeneous Communication
`
`Environments
`
`using the Teleservice Descriptor" by Tom Pfeifer, Stefan Arbanowski,
`
`and Radu
`
`Popescu-Zeletin
`
`("Pfeifer97").
`
`Issue 6:
`
`Claims 1, 15 and 35 are obvious over Pfeifer et al.
`
`(Generic Conversion of
`
`Communication Media for Supporting Personal Mobility), hereinafter Pfeifer96 in view of
`
`Book entitled "Superdistribution: Objects as Property on the Electronic Frontier" by Brad
`
`Cox ("Cox").
`
`issue 7:
`
`Claims 1, 15 and 35 are obvious over Pfeifer et al.
`
`(Generic Conversion of
`
`Communication Media for Supporting Personal Mobility), hereinafter Pfeifer96 in view of
`
`Thesis entitled "Dynamic Configuration Management of the Equipment in Distributed
`
`Communication
`
`Environments" by Sven van der Meer (Meer96").
`
`JNPR-IMPL_30024_02292252
`
`Page 8 of 188
`
`Implicit Exhibit 2002
`Juniper v. Implicit
`
`
`
`Application/Control Number: 95/000,659
`Art Unit: 3992
`
`Page 7
`
`issue 8:
`
`Claims
`
`1, 15 and 35 are obvious over Pfeifer et al.
`
`(Generic Conversion of
`
`Communication Media for Supporting Personal Mobility), hereinafter Pfeifer96 in view of
`
`Thesis entitled "Dynamic Configuration Management of the Equipment in Distributed
`
`Communication
`
`Environments" by Sven van der Meer ("Meer96") and Specification
`
`entitled
`
`RFC 793:
`
`"Transmission
`
`Control
`
`Protocol"
`
`by
`
`Information
`
`Sciences
`
`Institute ("RFC 793").
`
`Issue 9:
`
`Claims
`
`1, 15 and 35 are obvious over Pfeifer et al.
`
`(Generic Conversion of
`
`Communication Media for Supporting Personal Mobility), hereinafter Pfeifer96 in view of
`
`Thesis entitled "Job and Stream Control
`
`in Heterogeneous Hardware and Software
`
`Architectures" by Stefan Franz ("Franz98").
`
`issue 10:
`
`Claims
`
`1, 15 and 35 are obvious over Pfeifer et al.
`
`(Generic Conversion of
`
`Communication Media for Supporting Personal Mobility), hereinafter Pfeifer96 in view of
`entitled "ISDN Primary Rate User-Network Interface Specification"
`
`Specification
`
`from
`
`Northern
`
`Telecom ("ISDN98"), Book entitled "The Data Compression Book"
`
`by
`
`Mark Nelson and Jean-Loup Gailly ("Nelson"), Book entitled "Superdistribution: Objects
`
`as Property on the Electronic Frontier" by Brad Cox ("Cox"), Thesis entitled "Dynamic
`
`JNPR-IMPL_30024_
`
`Page 9 of 188
`
`Implicit Exhibit 2002
`Juniper v. Implicit
`
`
`
`Application/Control Number: 95/000,659
`Art Unit: 3992
`
`Page 8
`
`Configuration
`
`Management
`
`of
`
`the
`
`Equipment
`
`in
`
`Distributed
`
`Communication
`
`Environments"
`
`by Sven van der Meer ("Meer96"), Specification entitled RFC 793:
`
`"Transmission Control
`Thesis entitled "Job and Stream Control
`
`Protocol" by Information Sciences Institute ("RFC 793") and
`
`in Heterogeneous Hardware and Software
`
`Architectures" by Stefan Franz ("Franz98").
`
`issue 11:
`
`Claims 1, 15 and 35 are obvious over Pfeifer et al.
`
`(Generic Conversion of
`
`Communication Media for Supporting Personal Mobility), hereinafter Pfeifer96 in view of
`
`Article
`
`entitled "Resource Selection in Heterogeneous Communication
`
`Environments
`
`using the Teleservice Descriptor" by Tom Pfeifer, Stefan Arbanowski,
`
`and
`
`Radu
`
`Popescu-Zeletin
`
`("Pfeifer97") and U.S. Patent No. 6,104,500 entitled "Networked Fax
`
`Routing Via Email" by Hassam Alam, Horace Dediu, and Scot Yupaj
`
`("Alam")
`
`issue 12:
`
`Claims 1, 15 and 35 are obvious over Pfeifer et al.
`
`(Generic Conversion of
`
`Communication Media for Supporting Personal Mobility), hereinafter Pfeifer96 in view of
`
`Article entitled "Resource Selection in Heterogeneous Communication
`
`Environments
`
`using
`
`the Teleservice Descriptor" by Tom Pfeifer, Stefan Arbanowski, and Radu
`
`Popescu-Zeletin
`
`("Pfeifer97") and U.S. Patent No. 5,298,6'74 entitled "Apparatus for
`
`Discriminating
`
`an Audio Signal as an Ordinary Vocal Sound or Musical Sound" by
`
`Sang-Lak Yun ("Yun").
`
`JNPR-IMPL_30024_02292254
`
`Page 10 of 188
`
`Implicit Exhibit 2002
`Juniper v. Implicit
`
`
`
`Application/Control Number: 95/000,659
`Art Unit: 3992
`
`Page 9
`
`issue 13:
`
`Claims
`
`1, 15 and 35 are obvious over Pfeifer et al.
`
`(Generic Conversion of
`
`Communication Media for Supporting Personal Mobility), hereinafter Pfeifer96 in view of
`
`Thesis entitled "Job and Stream Control
`
`in Heterogeneous Hardware and Software
`
`Architectures"
`
`by Stefan Franz ("Franz98"), Thesis entitled "Dynamic
`
`Configuration
`
`Management of the Equipment in Distributed Communication Environments" by Sven
`
`van der Meer ("Meer96"), Thesis entitled "Genetic Description of Telecommunication
`
`Services and Dynamic Resource Selection in Intelligent Communication Environments"
`
`by Stefan Arbanowksi
`
`(“Arbanowski96")and Article entitled "Resource Selection in
`
`Heterogeneous Communication Environments using the Teleservice Descriptor" by Tom
`
`Pfeifer, Stefan Arbanowski, and Radu Popescu-Zeletin
`
`("Pfeifer97").
`
`issue 14:
`
`Claims
`
`1, 15 and 35 are obvious over Pfeifer et al.
`
`(Generic Conversion of
`
`Communication Media for Supporting Personal Mobility), hereinafter Pfeifer96 in view of
`
`Thesis
`
`entitled "Genetic Description of Telecommunication
`
`Services
`
`and Dynamic
`
`Resource Selection in intelligent Communication Environments" by Stefan Arbanowksi
`
`("Arbanowski96"),
`
`Article
`
`entitled
`
`"Resource
`
`Selection
`
`in
`
`Heterogeneous
`
`Communication
`
`Environments using the Teleservice Descriptor" by Tom Pfeifer, Stefan
`
`Arbanowski,
`
`and Radu Popescu-Zeletin ('Pfeifer97"),
`
`Specification
`
`entitled
`
`"ISDN
`
`Primary Rate User-Network Interface Specification” from Northern Telecom ("ISDN98"),
`
`JNPR-IMPL_30024_
`
`Page 11 of 188
`
`Implicit Exhibit 2002
`Juniper v. Implicit
`
`
`
`Application/Control Number: 95/000,659
`Art Unit: 3992
`
`Page 10
`
`Book entitled "The Data Compression Book" by Mark Nelson and Jean-Loup Gailly
`
`("Nelson"), Thesis entitled "Dynamic Configuration Management of the Equipment in
`
`Distributed
`
`Communication
`
`Environments" by Sven van der Meer ("Meer96"), Specification entitled
`
`RFC 793:
`
`"Transmission Control Protocol" by Information Sciences Institute ("RFC
`
`793"), Thesis entitled “Job and Stream Control
`
`in Heterogeneous Hardware and
`
`Software Architectures" by Stefan Franz ("Franz98"), U.S. Patent No. 6,104,500 entitled
`
`“Networked Fax Routing Via Email" by Hassam Alam, Horace Dediu, and Scot Yupaj
`
`("Alam") and U.S. Patent No. 5,298,6'74 entitled "Apparatus for Discriminating an Audio
`
`Signal as an Ordinary Vocal Sound or Musical Sound" by Sang-Lak Yun ("Yun")...
`
`issue 15:
`
`Claims
`
`1, 15 and 35 are anticipated over U.S. Pat. No. 6,243,667
`
`entitled
`
`"Network Flow Switching and Flow Data Export,” by Darren R. Kerr and Barry L. Bruins
`
`("Kerr').
`
`Issue 16:
`Claims 1, 15 and 35 are obvious over U.S. Pat. No. 6,243,667 entitled "Network
`
`Flow Switching and Flow Data Export," by Darren R. Kerr and Barry L. Bruins ("Kerr").
`
`issue 17:
`
`JNPR-IMPL_30024_
`
`Page 12 of 188
`
`Implicit Exhibit 2002
`Juniper v. Implicit
`
`
`
`Application/Control Number: 95/000,659
`Art Unit: 3992
`
`Page 11
`
`Claims 1, 15 and 35 are obvious over U.S. Pat. No. 6,243,667 entitled "Network
`
`Flow Switching and Flow Data Export," by Darren R. Kerr and Barry L. Bruins ("Kerr") in
`
`view of Article entitled "Cisco NetFlow Switching speeds traffic routing,”
`
`InfoWorld
`
`Magazine
`
`("NetFlow’).
`
`issue 18:
`
`Claims 1, 15 and 35 are obvious over U.S. Pat. No. 6,243,667 entitled "Network
`
`Flow Switching and Flow Data Export,” by Darren R. Kerr and Barry L. Bruins ("Kerr") in
`
`view of Specification entitled RFC 1825: "Security Architecture for the Internet Protocol" |
`
`by R. Atkinson ("RFC 1825") and Specification entitled RFC 1829: "The ESP DES-CBC
`
`Transform" by P. Kam et al.
`
`("RFC 1829").
`
`issue 19:
`
`Claims 1, 15 and 35 are obvious over U.S. Pat. No. 6,243,667 entitled "Network
`
`Flow Switching and Flow Data Export," by Darren R. Kerr and Barry L. Bruins ("Kerr") in
`
`view of Article entitled "A Concrete Security Treatment of Symmetric Encryption" by M.
`
`Bellare
`
`et
`
`al.
`
`("Bellare97")
`
`and Article
`
`entitled "XOR MACs: New Methods
`
`for
`
`Message
`
`Authentication Using Finite
`
`Pseudorandom Functions" by Mihir
`
`Bellare,
`
`Roch Guerin, and Phillip Rogaway ("Bellare95").
`
`issue 20:
`
`Claims 1, 15 and 35 are obvious over U.S. Pat. No. 6,243,667 entitled "Network
`
`Flow Switching and Flow Data Export," by Darren R. Kerr and Barry L. Bruins ("Kerr") in
`
`JNPR-IMPL_30024_
`
`Page 13 of 188
`
`Implicit Exhibit 2002
`Juniper v. Implicit
`
`
`
`Application/Control Number: 95/000,659
`Art Unit: 3992
`
`Page 12
`
`|
`
`view of Book entitled “Local Area Network Concepts and Products: Routers
`
`and
`
`Gateways" from IBM ("IBM96").
`
`issue 21:
`
`Claims 1, 15 and 35 are obvious over U.S. Pat. No. 6,243,667 entitled "Network
`
`Flow Switching and Flow Data Export," by Darren R. Kerr and Barry L. Bruins ("Kerr") in
`
`view of Book entitled “Local Area Network Concepts and Products: Routers
`
`and
`
`Gateways" from IBM ("IBM96") and Nelson.
`
`issue 22:
`
`Claims 1, 15 and 35 are obvious over U.S. Pat. No. 6,243,667 entitled "Network
`
`Flow Switching and Flow Data Export," by Darren R. Kerr and Barry L. Bruins ("Kerr") in
`
`view of Specification entitled RFC 1825:
`
`"Security Architecture for the Internet Protocol”
`
`by R. Atkinson ("RFC 1825"), Specification entitled RFC 1829: "The ESP DES-CBC
`
`Transform"
`
`by P. Kam et al.
`
`("RFC 1829"), Article entitled "A Concrete
`
`Security
`
`Treatment of Symmetric Encryption” by M. Bellare et al.
`
`("Bellare97") and Article entitled
`
`"XOR MACs: New Methods for Message Authentication Using Finite Pseudorandom
`
`Functions” by Mihir Bellare, Roch Guerin, and Phillip Rogaway ("Bellare95"), Book
`
`entitled "Local Area Network Concepts and Products: Routers and Gateways" from IBM
`
`("IBM96") and Book entitled "The Data Compression Book" by Mark Nelson and Jean-
`
`Loup Gailly ("Nelson").
`
`JNPR-IMPL_30024_
`
`Page 14 of 188
`
`Implicit Exhibit 2002
`Juniper v. Implicit
`
`
`
`Application/Control Number: 95/000,659
`Art Unit: 3992
`
`issue 23:
`
`Page 13
`
`Claims 1, 15 and 35 are obvious over U.S. Pat. No. 6,243,667 entitled "Network
`
`Flow Switching and Flow Data Export,” by Darren R. Kerr and Barry L. Bruins ("Kerr") in
`
`view of Article entitled "Dynamic Reconfiguration of Agent-Based Applications”) by Luc
`
`Bellisard, Noel de Paima, and Michel Riveill
`
`(“Bellisard").
`
`issue 24:
`
`Claims 1, 15 and 35 are obvious over U.S. Pat. No. 6,243,667 entitled "Network
`
`‘Flow Switching and Flow Data Export," by Darren R. Kerr and Barry L. Bruins ("Kerr") in
`
`view of Publication entitled "DTE Firewalls Phase Two Measurement and
`
`Evaluation
`
`Report" by Timothy L. Fraser et al. of Trusted Information Systems ("Fraser’).
`
`issue 25:
`
`Claims 1, 15 and 35 are obvious over U.S. Pat. No. 6,243,667 entitled "Network
`
`Flow Switching and Flow Data Export," by Darren R. Kerr and Barry L. Bruins ("Kerr") in
`
`view of Specification entitled RFC 1825: "Security Architecture for the Internet Protocol"
`
`by R. Atkinson ("RFC 1825"), Specification entitled RFC 1829: "The ESP DES-CBC
`
`Transform" by P. Kam et al.
`
`("RFC 1829"), Article entitled "A Concrete
`
`Security
`
`Treatment of Symmetric Encryption" by M. Bellare et al:
`
`("Bellare97") and Article entitled
`
`"XOR MACs: New Methods for Message Authentication Using Finite Pseudorandom
`
`Functions"
`
`by Mihir Bellare, Roch Guerin,
`
`and Phillip Rogaway ("Bellare95"), Book
`
`entitled "Local Area Network Concepts and Products: Routers and Gateways" from IBM
`
`("IBM96") and Book entitled "The Data Compression Book" by Mark Nelson and Jean-
`
`JNPR-IMPL_30024_
`
`Page 15 of 188
`
`Implicit Exhibit 2002
`Juniper v. Implicit
`
`
`
`Application/Control Number: 95/000,659
`Art Unit: 3992
`
`Page 14
`
`Loup Gailly
`
`("Nelson"), Article
`
`entitled
`
`"Dynamic
`
`Reconfiguration
`
`of Agent-Based
`
`Applications”)
`
`by Luc Bellisard, Noel de Palma, and Michel Riveill
`
`("Bellisard")
`
`and
`
`Publication entitled "DTE Firewalls Phase Two Measurement and Evaluation Report" by
`
`Timothy L. Fraser et al. of Trusted Information Systems ("Fraser").
`
`issue 26:
`
`Claims 1, 15 and 35 are obvious over U.S. Pat. No. 6,243,667 entitled "Network
`
`Flow Switching and Flow Data Export," by Darren R. Kerr and Barry L. Bruins ("Kerr") in
`
`view of Article entitled "Checkpoint Firewall-| White Paper, Version 2.0"
`
`("Checkpoint")
`
`and U.S. Pat. No. 5,835,726 entitled "System for securing the flow of and selectively
`
`modifying packets in a computer network,” by Shwed et al.
`
`("Shwed").
`
`issue 27:
`
`Claims 1, 15 and 35 are obvious over U.S. Pat. No. 6,243,667 entitled "Network
`
`Flow Switching and Flow Data Export," by Darren R. Kerr and Barry L. Bruins ("Kerr") in
`
`view of U.S. Pat. No. 6,651,099 entitled "Method and Apparatus for Monitoring Traffic in
`
`a Network" by Russell S. Dietz et al.
`
`("Dietz").
`
`issue 28:
`
`|
`
`Claims 1, 15 and 35 are obvious over U.S. Pat. No. 6,243,667 entitled "Network
`
`Flow Switching and Flow Data Export," by Darren R. Kerr and Barry L. Bruins ("Kerr") in
`
`view of Pfeifer et al.
`
`(Generic Conversion of Communication Media for
`
`Supporting
`
`Personal Mobility), hereinafter Pfeifer96.
`
`JNPR-IMPL_30024_02292260
`
`Page 16 of 188
`
`Implicit Exhibit 2002
`Juniper v. Implicit
`
`
`
`Application/Control Number: 95/000,659
`Art Unit: 3992
`
`Page 15
`
`issue 29:
`
`Claims
`
`1, 15 and 35 are anticipated by Article entitled "Router Plugins: A
`
`Software
`
`Architecture
`
`for Next Generation Routers"
`
`by Dan Decasper et
`
`al.
`
`("Decasper98").
`
`issue 30:
`
`Claims 1, 15 and 35 are obvious over Article entitled "Router Plugins: A Software
`
`Architecture for Next Generation Routers" by Dan Decasper et al.
`
`("Decasper98").
`
`issue 31:
`
`Claims 1, 15 and 35 are obvious over Article entitled "Router Plugins: A Software
`
`Architecture
`
`for Next Generation Routers" by Dan Decasper et al.
`
`("Decasper98")
`
`in
`
`view of Specification entitled RFC 1825: "Security Architecture for the Internet Protocol"
`
`by R. Atkinson ("RFC 1825"), Specification entitled RFC 1829: "The ESP DES-CBC
`
`Transform” by P. Kam et al.
`
`("REC 1829").
`
`issue 32:
`
`Claims 1, 15 and 35 are obvious over Article entitled "Router Plugins: A Software
`
`Architecture for Next Generation Routers" by Dan Decasper et al.
`
`("Decasper98")
`
`in
`
`view of
`
`Specification
`
`entitled RFC 1883:
`
`“Internet
`
`Protocol, Version 6
`
`(IPv6)
`
`JNPR-IMPL_30024_
`
`Page 17 of 188
`
`Implicit Exhibit 2002
`Juniper v. Implicit
`
`
`
`Application/Control Number: 95/000,659
`Art Unit: 3992
`
`Page 16
`
`Specification" by S. Deering and R. Hinden ("RFC 1883") and Book entitled "IPv6: The
`
`New Internet Protocol" by Christian Huitema ("Huitema’).
`
`issue 33:
`
`Claims 1, 15 and 35 are obvious over Article entitled "Router Plugins: A Software
`
`Architecture
`
`for Next Generation Routers" by Dan Decasper et al.
`view of Article entitled "Crossbow: A Toolkit for Integrated Services over Cell Switched
`
`("Decasper98")
`
`in
`
`IPv6" by Dan Decasper et al.
`
`("Decasper97").
`
`issue 34:
`
`Claims 1, 15 and 35 are obvious over Article entitled "Router Plugins: A Software
`
`Architecture
`
`for Next Generation Routers” by Dan Decasper et al.
`
`("Decasper98")
`
`in
`
`view of Article entitled "Crossbow: A Toolkit for Integrated Services over Cell Switched
`
`IPv6" by Dan Decasper et al.
`
`(“Decasper97"), Article entitled "A Concrete Security
`
`Treatment of Symmetric Encryption" by M. Bellare et al. ("Bellare97") and Article entitled
`
`"XOR MACs: New Methods for Message Authentication Using Finite Pseudorandom
`
`Functions" by Mihir Bellare, Roch Guerin, and Phillip Rogaway ("Bellare95").
`
`issue 35:
`
`Claims 1, 15 and 35 are obvious over Article entitled “Router Plugins: A Software
`
`Architecture
`
`for Next Generation Routers" by Dan Decasper et al.
`
`("Decasper98")
`
`in
`
`JNPR-IMPL_30024_
`
`Page 18 of 188
`
`Implicit Exhibit 2002
`Juniper v. Implicit
`
`
`
`Application/Control Number: 95/000,659
`Art Unit: 3992
`
`Page 17
`
`view of Book entitled "Local Area Network Concepts and Products: Routers
`
`and
`
`Gateways" from IBM ("IBM96").
`
`issue 36:
`
`Claims 1, 15 and 35 are obvious overArticle entitled "Router Plugins: A Software
`for Next Generation Routers" by Dan Decasper et al.
`Architecture
`
`("Decasper98")
`
`in
`
`view of Book entitled "Local Area Network Concepts and Products: Routers
`
`and
`
`Gateways” from IBM ("IBM96") and Book entitled "The Data Compression Book" by
`
`Mark Nelson and Jean-Loup Gailly ("Nelson’).
`
`issue 37:
`
`Claims 1, 15 and 35 are obvious over Article entitled "Router Plugins: A
`
`Software
`
`Architecture
`
`for Next Generation Routers" by Dan Decasper et al.
`
`("Decasper98")
`
`in
`
`view of Specification entitled RFC 1825: "Security Architecture for the Internet Protocol"
`
`by R. Atkinson ("RFC 1825"), Specification entitled RFC 1829, "Crossbow: A Toolkit for
`
`Integrated Services over Cell Switched IPv6" by Dan Decasper et al.
`
`("Decasper97"),
`
`Article entitled "A Concrete Security Treatment of Symmetric Encryption" by M. Bellare
`
`et al.
`
`("Bellare97")
`
`and Article entitled "XOR MACs: New Methods for Message
`
`Authentication Using Finite Pseudorandom Functions" by Mihir Bellare, Roch Guerin,
`
`and Phillip Rogaway ("Bellare95"), Book entitled "Local Area Network Concepts and
`
`Products: Routers and Gateways" from IBM ("IBM96") and Book entitled "The Data
`
`Compression Book" by Mark Nelson and Jean-Loup Gailly ("Nelson").
`
`JNPR-IMPL_30024_
`
`Page 19 of 188
`
`Implicit Exhibit 2002
`Juniper v. Implicit
`
`
`
`Application/Control Number: 95/000,659
`Art Unit: 3992
`
`issue 38:
`
`Page 18
`
`Claims 1, 15 and 35 are obvious over Article entitled "Router Plugins: A Software
`
`Architecture
`
`for Next Generation Routers" by Dan Decasper et al.
`
`("Decasper98")
`
`in
`
`view of Article entitled "Dynamic Reconfiguration of Agent-Based Applications”) by Luc
`
`Bellisard, Noel de Palma, and Michel Riveill
`
`("Bellisard").
`
`issue 39:
`
`Claims 1, 15 and 35 are obvious over Article entitled "Router Plugins: A Software
`
`Architecture
`
`for Next Generation Routers" by Dan Decasper et al.
`
`("Decasper98")
`
`in
`
`view of Publication entitled "DTE Firewalls Phase Two Measurement and
`
`Evaluation
`
`Report" by Timothy L. Fraser et al. of Trusted Information Systems ("Fraser’).
`
`Issue 40:
`
`Claims 71, 15 and 35 are obvious over Article entitled "Router Plugins: A Software
`
`Architecture
`
`for Next Generation Routers” by Dan Decasper et al.
`
`("Decasper98")
`
`in
`
`view of Specification entitled RFC 1825: "Security Architecture for the Internet Protocol"
`
`by R. Atkinson ("RFC 1825"), Specification entitled RFC 1829: "The ESP DES-CBC
`
`Transform" by P. Kam et al. ("RFC 1829"), Specification entitled RFC 1883: "Intemet
`
`Protocol, Version 6 (IPv6) Specification" by S. Deering and R. Hinden ("RFC 1883"),
`
`Book entitled "IPv6: The New Internet Protocol" by Christian Huitema
`
`("Huitema"),
`
`Article entitled "Crossbow: A Toolkit for Integrated Services over Cell Switched.
`
`IPv6" by
`
`Dan Decasper et al. ("Decasper97"), Article entitled "A Concrete Security Treatment of
`
`JNPR-IMPL_30024_
`
`Page 20 of 188
`
`Implicit Exhibit 2002
`Juniper v. Implicit
`
`
`
`Application/Control Number: 95/000,659
`Art Unit: 3992
`
`Page 19
`
`Symmetric Encryption" by M. Bellare et al.
`
`("Bellare97"), Article entitled "XOR MACs:
`
`New Methods for Message Authentication Using Finite Pseudorandom Functions” by
`
`Mihir Bellare, Roch Guerin, and Phillip Rogaway ("Bellare95"),
`
`Book entitled "Local
`
`Area Network Concepts and Products: Routers and Gateways” from IBM ("IBM96"),
`
`Book entitled "The Data Compression Book" by Mark Nelson and Jean-Loup Gailly
`
`("Nelson"), Article entitled "Dynamic Reconfiguration of Agent-Based Applications”) by
`
`Luc Bellisard, Noel de Palma, and Michel Riveill
`
`("Bellisard") and Publication entitled
`
`"DTE Firewalls Phase Two Measurement and Evaluation Report" by Timothy L. Fraser
`
`et al. of Trusted Information Systems ("Fraser").
`
`issue 41:
`
`Claims
`
`1,
`
`15
`
`and
`
`35 are
`
`anticipated
`
`by Article
`
`entitled
`
`"Implementing
`
`Communication
`
`Protocols in Java" by Bobby Krupezak et. al
`
`("HotLava").
`
`issue 42:
`
`Claims
`
`1, 15 and 35 are anticipated by Dissertation entitled "Scout: A Path-
`
`Based
`
`Operating System" by David Mosberger
`
`("Mosberger").
`
`Issue 43:
`
`Claims 1, 15 and 35 are obvious over Dissertation entitled "Scout: A Path-Based
`
`Operating System" by David Mosberger ("Mosberger").
`
`‘JNPR-IMPL_30024_02292265
`
`Page 21 of 188
`
`Implicit Exhibit 2002
`Juniper v. Implicit
`
`
`
`Application/Control Number: 95/000,659
`Art Unit: 3992
`
`Page 20
`
`issue 44;
`
`Claims 1, 15 and 35 are obvious over Dissertation entitled "Scout: A Path-Based
`
`Operating
`
`System"
`
`by David Mosberger
`
`("Mosberger")
`
`and
`
`Article
`
`entitled
`
`"Implementing Communication Protocols in Java" by Bobby Krupezak et. al ("HotLava’). .
`
`issue 45:
`
`Claims 1, 15 and 35 are obvious over Dissertation entitled "Scout: A Path-Based
`
`Operating
`
`System" by David Mosberger
`
`("Mosberger")
`
`and
`
`Article
`
`entitled "An
`
`Extensible
`
`Protocol Architecture
`
`for
`
`Application-Specific
`
`Networking”
`
`by Marc
`
`Fiuczynski
`
`("Plexus").
`
`issue 46:
`
`et.
`
`al
`
`Claims 1, 15 and 35 are obvious over Dissertation entitled "Scout: A
`
`Path-Based
`
`. Operating System" by David Mosberger ("Mosberger") and Article entitled "ComScript:
`
`An Environment
`
`for
`
`the
`
`Implementation
`
`of Protocol
`
`Stacks
`
`and their Dynamic
`
`Reconfiguration” by Murhimanya Muhugusa et. al (ComScript).
`
`JNPR-IMPL_30024_
`
`Page 22 of 188
`
`Implicit Exhibit 2002
`Juniper v. Implicit
`
`
`
`Application/Control Number: 95/000,659
`Art Unit: 3992
`
`Page 21
`
`Reasonable Likelihood that Requester will prevail Statement
`
`As noted on pages 24-271 of the Request, the Requester submits that Pfeifer96,
`
`Kerr, Decasper98, Mosberger and HotLava in combination with other prior art
`
`raise
`
`RLP based on proposed teachings.
`
`ISSUE 1
`
`Pfeifer96
`
`teaches the Intelligent Personal Communication Support System is
`
`introduced as an application for multiple media conversion tools, embedded in a context
`
`of personal mobility, service personalization and service interoperability support.
`
`(Mi, Fi, Sp | media:
`
`Ip (My, Fo,
`
`Fig.
`
`1.
`
`Media converter system
`
`After
`
`discussing models
`
`for
`
`conversion
`
`in
`
`theory,
`
`the current
`
`conversion
`
`technology
`
`is evaluated. The
`
`necessity of an
`
`integrated
`
`framework of
`
`flexible
`
`converters
`
`and a generic converter model are derived and automatic management
`
`of conversion quality is discussed (Abstract).
`
`Pfeifer96 further teaches
`
`JNPR-IMPL_30024_02292267
`
`Page 23 of 188
`
`Implicit Exhibit 2002
`Juniper v. Implicit
`
`
`
`Application/Control Number: 95/000,659
`Art Unit: 3992
`
`Page 22
`
`For converting one format of the same medium into another, tools exist for many
`for text, bitmap images and audio. They are mostly in the public domain,
`platforms
`an