throbber
USOO7490151B2
`
`(12) United States Patent
`US 7,490,151 B2
`(10) Patent N0.:
`(45) Date of Patent:
`Feb. 10, 2009
`Munger et al.
`
`(54)
`
`ESTABLISHMENT OF A SECURE
`COMMUNICATION LINK BASED ON A
`
`DOMAIN NAME SERVICE (DNS) REQUEST
`
`(75)
`
`Inventors: Edward Colby Munger, Crownsville,
`MD (US); Robert Dunham Short, III,
`Leesburg, VA (US); Victor Larson,
`Fairfax, VA (US); Michael Williamson,
`South Riding, VA (US)
`
`(73)
`
`Assignee: Virnetx lnc., Scotts Valley Drive, CA
`(US)
`
`(*l
`
`Notice:
`
`Subject to any disclaimer, the term of this
`patent is extended or adjusted under 35
`U.S.C. 154(b) by 818 days.
`
`(21)
`
`Appl. N0.: 10/259,494
`
`(22)
`
`Filed:
`
`Sep. 30, 2002
`
`(65)
`
`(60)
`
`(60)
`
`(51)
`
`(52)
`(58)
`
`Prior Publication Data
`
`US 2003/0037142 A1
`
`Feb. 20, 2003
`
`Related US. Application Data
`
`Division of application No. 09/504,783, filed on Feb.
`15, 2000, now Pat. No. 6,502,135, which is a continu—
`ation-in—part of application No. 09/429,643, filed on
`Oct. 29, 1999, now Pat. No. 7,010,604.
`
`Provisional application No. 60/137,704, filed on Jun.
`7, 1999, provisional application No. 60/106,261, filed
`011 Oct. 30, 1998.
`
`Int. Cl.
`(2006.01)
`0an 15/173
`U.S. Cl.
`....................................... 709/225; 709/229
`Field of Classification Search ......... 709/2177225,
`709/229; 713/201
`See application file for complete search history.
`
`(56)
`
`References Cited
`U.S. PATENT DOCUMENTS
`
`4,933,846 A
`
`6/1990 Humphrey et a1.
`
`(Continued)
`FOREIGN PATENT DOCUMENTS
`
`DE
`
`199 24 575
`
`12/1999
`
`(Continued)
`OTHER PUBLICATIONS
`
`Search Report (dated Aug. 23, 2002), International Application No.
`PCTflJSOl/13260.
`
`(Continued)
`
`Primary ExamineriKr‘isna I ,im
`(74) Attorney, Agent, or FirmiMcDermott Will & Emery
`
`(57)
`
`ABSTRACT
`
`A plurality of computer nodes communicate using seemingly
`random Internet Protocol source and destination addresses.
`Data packets matching criteria defined by a moving window
`of valid addresses are accepted for further processing, while
`those that do not meet the criteria are quickly rejected.
`Improvements to the basic design include (1) a load balancer
`that distributes packets across different transmission paths
`according to transmission path quality; (2) a DNS proxy
`server that transparently creates a virtual private network in
`response to a domain name inquiry; (3) a large-to-small link
`bandwidth management feature that prevents denial-of—ser-
`vice attacks at system chokepoints; (4) a traffic limiter that
`regulates incoming packets by limiting the rate at which a
`transmitter can be synchronized with a receiver; and (5) a
`signaling synchronizer that allows a large number ofnodes to
`communicate with a central node by partitioning the commu-
`nication function between two separate entities.
`
`16 Claims, 35 Drawing Sheets
`
`ORIGINATING
`
`
`TERMINAL
`
`
`
`WI
`
`ENCRYPTION KEY
`
`
`
`
`110
`DESTINATION
`TBTMINAL
`
`New Bay Capital, LLC-EX.1001
`
`New Bay Capital, LLC-EX.1001
`
`

`

`US 7,490,151 132
`
`PageZ
`
`U.S. PATENT DOCUMENTS
`
`.............. 709/225
`
`6,502,135 B1* 12/2 02 Mungel'et a1.
`6,505,232 B1
`1/2 03 Mighdolletal.
`6,510,154 B1
`1/2 03 Mayesetal.
`6,549,516 B1
`4/2 03 Albert etal.
`6,557,037 B1
`4/2 03 ProVino
`6,571,296 B1
`5/2 03 Dillon
`6,571,338 B1
`5/2 03 Shaio etal.
`6,581,166 B1
`6/2 03 Hirstetal.
`6,606,708 B1*
`8/2 03 Devine etal.
`6,618,761 B2
`9/2 03 Mungeretal.
`6,671,702 B2
`12/2 03 Kruglikov etal.
`6,687,551 B2
`2/2 04 Steindl
`6,714,970 B1
`3/2 04 Fiveash et a1.
`5,717,949 B1
`4/2 04 Boden etal.
`6,751,738 B2*
`6/2 04 Wesinger et a1.
`6,760,766 B1
`7/2 04 Sahlqvist
`6,826,616 B2
`11/2 04 Larson etal.
`6,839,759 132
`1/2 05 Larson ct a1.
`7,010,604 B1
`3/2 06 Mungeretal.
`7,133,930 B2
`“/2 06 Munger et a1.
`7,188,180 B2
`3/2 07 Larson etal.
`7,197,563 B2
`3/2 07 Sheymov et a1.
`2002/0004898 A1
`1/2 02 Droge
`2003/0196122 A1* 10/2 03 Wesingeretal.
`2005/0055306 A1
`3/2 05 Miller et al.
`2006/0059337 A1*
`3/2 06 Poyhonen eta].
`
`
`
`............... 713/201
`
`............ 713/201
`
`............ 713/201
`
`........... 713/165
`
`....... 370/401
`
`.............. 726/15
`
`1/1991 Warrior
`4,988,990 A
`........................ 380/273
`5,164,986 A * 11/1992 Bright
`5,276,735 A
`1/1994 Boebert et a1.
`5,311,593 A
`50994 Carmi
`5,329,521 A
`7/1994 Walsh etal.
`5,341,426 A
`8/1994 Barneyetal
`5367.643 A
`ll/l994 Chang etal
`5,559,883 A
`9/1996 Williams
`5,561,669 A
`10/1996 Lenney et a1.
`5,588,060 A
`12/1996 Aziz
`5,625,626 A
`4/1997 Umekita
`5,654,695 A
`8/1997 Olnowich etal.
`5,682,480 A
`10/1997 Nakagawa
`5689566 A
`11/1997 Nguyen
`5,740,375 A
`4/1998 Dunn6 et a1.
`5,774,660 A
`6/1998 Brendelet all
`5,787,172 A
`7/1998 Arnolgl
`5,790,548 A *
`8/1998 Slsmnlzadeh et a1.
`5.796942 A
`8/1998 Esbensen
`5,805,801 A
`9/1998 Holloway etal
`5,842,040 A
`11/1998 Hughes et al.
`5,845,091 A
`12/1998 Dunne et a1.
`5,867,650 A
`2/1999 Osterman
`5,870,610 A
`2/1999 Beyda etal
`5,878,231 A
`3/1999 Baehr etal.
`5,892,903 A
`4/1999 Klaus
`5,898,830 A *
`4/1999 W'esingeretal.
`5,905,859 A
`5/1999 Holloway oral,
`5,918,019 A
`6/1999 Valencia
`5,996,016 A
`11/1999 Thalheimer etal.
`6,006,259 A
`12/1999 Adelman etal.
`6,006,272 A
`12/1999 Aravamudan et a1.
`6,016,318 A
`1/2000 'l'omoike
`6,016,512 A
`1/2000 Huitema
`6,041,342 A
`3/2000 Yamaguchi
`6,052,788 A
`4/2000 Wesinger, Jr. et a1.
`6,055,574 A
`4/2000 Smorodinsky etal.
`6.061.736 A
`5/2000 Rochberger etal.
`6,079,020 A *
`6/2000 Liu ............................ 713/201
`6,092,200 A
`7/2000 Muniyappa eta].
`6,101,182 A *
`8/2000 Sismnizadeh et a1.
`6,119,171 A
`9/2000 Alkhatib
`6,119,234 A *
`9/2000 Aziz etal.
`6,147,976 A
`11/2000 Shand etal.
`6,157,957 A
`12/2000 Berthaud
`6,158,011 A
`12/2000 Chen et a1.
`6,168,409 B1
`1/2001 Fare
`6,175,867 B1
`1/2001 Taghadoss
`6,178,409 B1
`1/2001 Weber etal.
`6.178.505 Bl
`[/2001 Schneider et 31
`651795102 Bl
`1/2001 WCbCT OWL
`62225842 B1
`4/2001 Sasyan et a1.
`6,226,751 B1
`5/2001 Arrowetal.
`62331618 Bl
`5/2001 Shannon
`6,243,360 B1
`6/2001 Basilico
`6,243,749 B1
`6/2001 Sitaraman et 31~
`62435754 B1
`6/2001 Guerin et aL
`6,256,671 131 *
`7/2001 StrentZSCh 61 a1.
`6,263,445 B1
`7/2001 Blumenau
`6,236,047 Bl
`9/2001 Ramanathan et a1.
`6,301,223 B1
`10/2001 Hrastar et 31'
`6,308,274 B1
`10/2001 Swift
`6311207 Bl
`10/2001 Mlghd0110t31~
`63245161 B1
`“/2001 KlTCh
`6,330,562 B1
`12/2001 Boden etal.
`6,332,158 B1 * 12/2001 RiSIBY et 31~
`6,353,614 B1
`3/2002 Borella etal.
`6,425,003 B1 *
`7/2002 HGI'ZOg 6t 31'
`6,430,155 B1
`8/2002 Davie etal.
`6,430,610 B1
`8/2002 Carter
`6,487,598 B1
`11/2002 Valencia
`
`....... 370/352
`
`.................. 713/201
`
`~~~~~~~~~~ 709/27-7
`
`~~~~~~~~~~~~~~~~ 709/219
`
`............... 709/27-3
`
`FOREIGN PATENT DOCUMENTS
`_
`,
`0 814 389
`1231997
`0814 ’89 A
`12,1997
`0 838 930
`49998
`0838 930 A
`411998
`836306 A1
`49998
`0858189
`811998
`2317 792
`“998
`2317 792 A
`49998
`2334181 A
`811999
`2334181 A
`89999
`, 98277553 A
`6,1993
`W0 98/277“
`631998
`W0 9827783 A
`9,1998
`W0 98 55950
`12,1998
`W0 98 594/0
`12,1998
`WO9938081
`711999
`W0 99 48393
`961999
`W0 00/177/5
`312000
`WO 00/70458
`“/9000
`W00150638
`”001
`
`EP
`EP
`EP
`EP
`EP
`EP
`GB
`GB
`GB
`GB
`W9
`W0
`W0
`W0
`W0
`W0
`W0
`W0
`W0
`W0
`
`OTHER PUBLICATIONS
`Donald E. Eastlake, 3“, “Domain Name System Security Exten-
`sions”, Internet Draft, Apr. 1998, pp. 1-51.
`D. B. Chapman eta1., “Building Internet Firewalls”. Nov. 1995, pp.
`273.375,
`P. Srisuresh etal., “DNA extensions to Network address Translators
`(DNLAtGy’. Internet Draft, Jul. 1998, pp. 127.
`James E. Bellaire, “New Statement of RulesiNarning Internet
`Domains”, Internet Newsgroup, Jul. 30, 1995, 1 page.
`D. Clark, “US Calls for Private Domain-Name System“, Computer
`Society, Aug. 1, 1998,1311 22.25
`AugustBequai,“BalancingLegal ConcernsOVerCrimeandSecurity
`in Cyberspace”, Computer & Security, vol. 17, No. 4, 1998, pp.
`293.298,
`Rich Winkel, “CAQ: Networking With Spooks: The NET & The
`Control Of Information”, Internet Newsgroup, Jun. 21, 1997, 4
`pages,
`Search Report (dated Jun. 18, 2002), International Application No.
`PCTMSOl/l3260.
`Search Report (dated Jun. 28, 2002), International Application No.
`PCTflISOl/13261.
`Donald E. Eastlake, “Domain Name System Security Extensions”,
`DNS Security Working Group, Apr. 1998, 51 pages.
`
`New Bay Capital, LLC-EX.1001
`
`New Bay Capital, LLC-EX.1001
`
`

`

`US 7,490,151 132
`Page 3
`
`D. B. Chapman et al., “Building Internet Firewalls”, Nov. 1995, pp.
`278-297 and pp. 351-375.
`P. Srisuresh eta1., “DNS extensions to Network Address Translators”.
`Jul. 1998. 27 pages.
`Laurie Wells. “Security Icon", Oct. 19, 1998, 1 page.
`W. Stallings, “Cryptography And Network Security”, 2nd Edition.
`Chapter 13, IP Security, Jun. 8, 1998, pp. 399-440.
`W. Stallings, “New Cryptography and Network Security Book", Jun.
`8, 1998, 3 pages.
`Search Report (dated Aug. 20, 2002), International Application No.
`PCT/US01/04340.
`Shree Murthy et al., “Congestion-Oriented Shortest Multipath Rout-
`ing”. Proceedings of IEEE Infocom. 1996. pp. 1028-1036.
`Jim Jones et al., “Distributed Denial of Service Attacks: Defenses”.
`Global Integrity Corporation, 2000, pp. 1-14.
`Fasbender, Kesdogan, and Kubitz: “Variable and Scalable Security:
`Protection of Location Information in Mobile IP”, IEEE publication.
`1996, pp. 963-967.
`Laurie Wells (Lancasterbibelmail MSN COM); “Subject: Security
`Icon” Usenet Newsgroup, Oct. 19, 1998, XP002200606.
`Davila J et al. “Implementation of Virtual Private Networks at the
`Transport Layer”, Information Security. Second International Work-
`shop, ISW ’99. Proceedings (Lecture Springer-Verlag Berlin, Ger-
`many,
`[Online] 1999, pp. 85-102, XP002399276, ISBN 3-540-
`66695-B, retrieved from the Internet: URL: http://wwwspringerlink.
`com/content/4uac0tb0heccma89/fu11text.pdf> (Abstract).
`Alan 0. Frier et al., “The SSL Protocol Version 3.0”, Nov. 18, 1996.
`printed from http://www.netscapecom/eng/ssl13/ draft302txt on
`Feb. 4, 2002, 56 pages.
`Davila J et al, “Implementation of Virtual Private Networks at the
`Transport Layer”. Information Security, Second International Work-
`shop, ISVV’99. Proceedings (Lecture Springer-Verlag Berlin, Ger-
`
`[Online] 1999, pp. 85-102, XP002399276, ISBN 3-540-
`many,
`66695-B, retrieved fromthe Internet: URL: http://VWWV. springerlink.
`com/content/4uac0tb0hecoma89/fulltext.pdf>.
`Dolev, Shlomi and Ostrovsky, Rafil, Efficient Anonymous Multicast
`and Reception (Extended Abstract), 16 pages.
`F. Halsall, “Data Communications, Computer Networks and Open
`Systems”, Chapter 4, Protocol Basics, 1996, pp. 198-203.
`Glossary for the Linux FreeS/WAN project, printed from http://
`liberty.freeswan .org/freeswanitrees/freeswan- 1 .3/
`doc/glo ssary.
`htrnl on Feb. 21, 2002, 25 pages.
`J. Gilmore, “Swan: Securing the Internet against W'iretapping”,
`printed from http://liberty.freeswan.org/freeswan trees/freeswan-l .
`3.doc/rationale.html on Feb. 21, 2002. 4 pages.
`Linux FreeS/WAN Index File. printed from http://libertyfreewan.
`org/freeswan Lrees/freeswan-l.3/doc/ on Feb. 21, 2002, 3 pages.
`Reiter. Michael K. and Rubin, Aviel D. (AT&T LabsiResearch),
`Crowds: Anonymity for Web Transactions, pp. 1-23.
`RFC 2401-Security Architecture for the Internet Protocol (RTP).
`RFC 2543-SIP: Session Initiation Protocol (SIP or SIPS).
`Rubin, Aviel D., Geer. Daniel, and Ranum, Marcus J. (Wiley Corn-
`puter Publishing), “Web Security Sourcebook”, pp. 82-94.
`Search Report, IPER (dataed Nov. 13, 2002), International Applica-
`tion No. PCT/US01/04340.
`Search Report. IPER (dated Feb. 6. 2002). International Application
`No. PCT/US01/13261.
`Search Report, IPER (dated Jan. 14, 2003), InternationalApplication
`No. PCT/US01/13260.
`Shankar, A.U. “A verified sliding window protocol with variable flow
`control”. Proceedings of ACM SIGCOMM conference on Commu-
`nications architectures & protocols. pp. 84-91, ACM Press, NY,NY
`1986.
`
`
`
`* cited by examiner
`
`New Bay Capital, LLC-EX.1001
`
`New Bay Capital, LLC-EX.1001
`
`

`

`US. Patent
`
`Feb. 10, 2009
`
`Sheet 1 of 35
`
`US 7,490,151 B2
`
`100
`
`ORlGlNATING
`TERMINAL
`
`40
`
`107
`
`
`
`IP
`
`IP
`
`ROUTER
`
`ROUTER
`25
`INTERNET
`
`29
`
`
`
`P PACKET
`
` 28
`
`
`
`IP
`ROUTER
`
`IP
`ROUTER
`
`IP
`ROUTER
`
`110
`
`ENORYPTTON KEY
`
`TERMlNAL
`
`FIG. 1
`
`New Bay Capital, LLC-EX.1001
`
`New Bay Capital, LLC-EX.1001
`
`

`

`US. Patent
`
`Feb. 10, 2009
`
`Sheet 2 of 35
`
`US 7,490,151 B2
`
`100
`
`TERMINAL
`
`A 140
`
`TARP PACKET
`
`146
`
`107
`
`131
`
`h
`LINK KEY
`
`
`
`TARP
`ROUTER
`
`‘29
`
`IP
`
`TARP
`
`127
`
`122
`
`TARP
`ROUTER
`
`
`
`123 3.11
`LINK KEY
`
`
`IP
`ROUTER
`a.“
`LINK KEY
`
`130
`
`
`|P
`
`
`ROUTER
`125
`INTERNET
`
`LINK KEY
`
`124
`
`
`
`128
`
`ROUTER
`
`TARP
`ROUTER
`132
`
`|P
`ROUTER
`
`126
`
`TARP
`
`RINK Pm
`
`LINK KEY
`
`148
`
`0.11
`
`LINK KEY
`
`11o
`TARP PACKET
`
`TARP
`
`
`
`0" '
`SESSION KEY
`
`
`
`
`
`
`
`FIG. 2
`
`New Bay Capital, LLC-EX.1001
`
`New Bay Capital, LLC-EX.1001
`
`

`

`U.S. Patent
`
`Feb. 10,2009
`
`Sheet 3 0f 35
`
`US 7,490,151 B2
`
`
`
`
`DATA STREAM 3_DD
`
`INTERLEAVED
`PAYLOAD DATA
`32_0
`
`
`
`
`
`SESSION-KEY—ENCRYPTED
`PAYLOAD DATA fl
`
`TARP PACKET WITH
`ENCRYPTED PAYLOADS 3_4_Q
`
`LlNK-KEY-ENCRYPTED
`TARP PACKETS 359
`
`.
`
`
`
`
`IP PACKETS W/ENCRYPTED
`TARP PACKETS AS
`PAYLOADQQ
`
`
`
`.OUTER1
` .ARP
`
`
`
`
`
`.ARPROU-ER4
`
`
`
`
`TARP
`ROUTER 2
`
`
`
`TARP
`ROUTER
`
`TARP
`ROUTER3
`
`
`
`TARP
`ROUTER 5
`
`TARP
`ROUTER 6
`
`TARP
`
`FlG. 3A
`
`New Bay Capital, LLC-EX.1001
`
`New Bay Capital, LLC-EX.1001
`
`

`

`U.S. Patent
`
`Feb. 10, 2009
`
`Sheet 4 0f 35
`
`US 7,490,151 B2
`
`
`
`
`
`80200£2
`
`<55mo@503>223
`
`
`E.29000000032020.v_0...,000
`
`
`OINw,mQZmDOmm23?;
`
`Ola5200555r‘...£8£8£8£8
`
`
`
`
`
`00020x0300050/0020
`
`
`
`
`
`mwlmumm><flmm2mo<o._><mo._.z_
`
`$35550.5BEEQZM
`
`
`
`NINA.“023?.02
`
`
`
`a>>OD2§>m><m._mm._.z_
`
`00020x030BEEZM
`
`
`«Mafia;0200?.02
`
`
`
`
`TE;05050%
`
`
`
`am020300053020
`
`
`
`New Bay Capital, LLC-EX.1001
`
`New Bay Capital, LLC-EX.1001
`
`
`
`
`
`

`

`U.S. Patent
`
`Feb. 10, 2009
`
`Sheet 5 0f 35
`
`US 7,490,151 B2
`
`mzazoo9m>:.<zmm_5<mzo
`
`wz_mmm_oomn_mas.
`
`memmmoommg90_.:._>>
`
`gammzmomzézmé
`
`mafia:EéoEmz
`
`585%v2:Ea
`
`mammal/E;
`
`v.OE
`
`30%
`
`025809:
`
`inmzazoo2mazzmmsémao
`
`685%.3Es
`
`9:897:EB:qu
`
`New Bay Capital, LLC-EX.1001
`
`New Bay Capital, LLC-EX.1001
`
`
`
`

`

`US. Patent
`
`Feb. 10, 2009
`
`Sheet 6 of 35
`
`US 7,490,151 B2
`
`
`
`BACKGROUND LOOP-DECOY
`GENERATION
`
`AUTHENTICATE TARP PACKET
`
`OUTER LAYER DECRYPTION OF
`TARP PACKET USING LINK KEY
`
`Sfi
`
`DUMP DECOY
`
`
`
`
`CHECK FOR DECOY AND
`INCREMENT PERISHABLE DECOY
`COUNTER AS APPROPRIATE
`
`TRANSMIT DECOY?
`
`YES
`
`SQ
`
`DECREMENT
`TI'L TI'L > 0?
`
`
`
`
`
`DETERMINE DESTINATION TARP
`GENERATE NEXT-HOP TARP
`ADDRESS AND STORE LINK KEY
`ADDRESS AND STORE LINK KEY
`AND IP ADDRESS
`AND IF ADDRESS
`
`GENERATE NEXT-HOP TARP
`ADDRESS AND STORE LINK KEY
`AND IF ADDRESS
`
`GENERATE IP HEADER
`AND TRANSMIT
`
`FIG. 5
`
`SO
`
`SZ
`
`S3
`
`S4
`
`S5
`
`ST
`
`S8
`
`810
`
`311
`
`New Bay Capital, LLC-EX.1001
`
`New Bay Capital, LLC-EX.1001
`
`

`

`US. Patent
`
`Feb. 10, 2009
`
`Sheet 7 of 35
`
`US 7,490,151 B2
`
`BACKGROUND LOOP-DECOY
`GENERATION
`
`320
`
`GROUP RECEIVED IP PACKETS
`INTO INTERLEAVE WINDOW
`
`821
`
`DETERMINE DESTINATION TARP
`ADDRESS, INITIALIZE TTL, STORE
`IN TARP HEADER
`
`RECORD WINDOW SEQ. NOS. AND
`INTERLEAVE SEQ. NOS IN TARP
`HEADERS
`
`CHOOSE FIRST HOP TARP
`ROUTER. LOOK UP IP ADDRESS
`AND STORE IN CLEAR IP HEADER,
`
`OUTER LAYER ENCRYPT
`
`822
`
`323
`
`324
`
`INSTALL CLEAR IP HEADER
`AND TRANSMIT
`
`325
`
`FIG. 6
`
`New Bay Capital, LLC-EX.1001
`
`New Bay Capital, LLC-EX.1001
`
`

`

`US. Patent
`
`Feb. 10, 2009
`
`Sheet 8 of 35
`
`US 7,490,151 B2
`
`840
`
`BACKGROUND LOOP-DECOY
`GENERATION
`
`S42
`
`AUTHENTICATE TARP PACKET
`RECEIVED
`
`S49
`
`DIVIDE BLOCK INTO PACKETS S43
`
`DECRYPT OUTER LAYER
`
`ENCRYPTION WITH LINK KEY
`
`USING WINDOW SEQUENCE DATA,
`ADD CLEAR IP HEADERS
`
`GENER’I‘HJEEQMTARP
`
`350
`
`HAN?OCHQ%EEE§$§£§§ETS
`
`INCREMENTPERISHABLE
`
`COUNTER IF DECOY
`
`S44
`
`S45
`
`THROW AWAY DECOY OR KEEP
`IN RESPONSE TO ALGORITHM
`
`S46
`
`CACHE TARP PACKETS UNTIL
`WINDOW IS ASSEMBLED
`
`S47
`
`S48
`
`DEINTERLEAYE PACKETS
`FORMING WINDOW
`
`DECRYPT BLOCK
`
`New Bay Capital, LLC-EX.1001
`
`New Bay Capital, LLC-EX.1001
`
`

`

`U.S. Patent
`
`Sheet 9 0f 35
`
`US 7,490,151 B2
`
`$58I22wWhasMasaixz:m,355525%mQED/aimaw
`
`ézgmmtzma
`
`
`
`
`
`aé292E;zgwmmmmmamm1‘
`
`
`
`mlmmxo<zo:<_.:z_293%#585
`
`m.OE
`
`New Bay Capital, LLC-EX.1001
`
`New Bay Capital, LLC-EX.1001
`
`
`

`

`U.S. Patent
`
`Feb. 10, 2009
`
`Sheet 10 0f 35
`
`US 7,490,151 B2
`
`nag
`
`
` 2250m:28
`
`sum\\\|I/rI
`
`
`
`
`252522252E222
`
`
`
`
`
`
`
`82.2.5_22.2.5A52.2.5_22.25
`
`
`
`32.2.5_22.2.552.2.5.22.2.5
`
`
`
`
`
`52.2.5_52.2.552.2.5.52.2.5
`
`
`
`52.2.5_52.2.522.2.5.52.2.5
`
`
`
`
`
`232E222“lg2522
`
`
`
`
`
`
`
`
`
`22.2.5.52.2.522.2.5.52.2.5
`
`
`
`22.2.5_22.2.522.2.5.22.2.5
`
`
`
`52.2.5_2.2.2.552.2.5.22.2.5
`
`
`
`
`
`52.2.5.22.2.522.2.5.22.2.5
`
`
`
`..m.o_u_..
`
`New Bay Capital, LLC-EX.1001
`
`New Bay Capital, LLC-EX.1001
`
`
`

`

`U.S. Patent
`
`m.
`
`m
`
`m
`
`1%mm19
`%$52as
`
`:o_
`
`<m2
`
`mm¢H
`
`awhaom
`
`22
`
`FNOF
`
`NNOF
`
`mmor
`
`or.9“.
`
`Hzmzo
`
`‘
`
`Paar
`
`New Bay Capital, LLC-EX.1001
`
`New Bay Capital, LLC-EX.1001
`
`
`
`

`

`U.S. Patent
`
`Feb. 10, 2009
`
`Sheet 12 0f 35
`
`US 7,490,151 B2
`
`mn:
`
`we:
`
`mzémEzmmIE
`
`mmofix
`
`
`
`mm”mmmmona>>I.omw
`
`
`
`mm”wwmmog>>I.53
`
`Eva/En__
`
`«mew:
`
`ziowa3”wwmmogg5%E”mmmmogn:momDOw
`3”ad:
`
`r8:
`
`flo<o._><n_
`
`2:£233
`
`:GE
`
`NE
`
`$232;
`
`IvEa:
`
`mmD<WI
`
`<8:
`
`Exam
`
`
`02:eEm:2285
`mg:2mama:5%E2”mamas:
`
`New Bay Capital, LLC-EX.1001
`
`2:
`
`
`03:0g:Famzzgwa
`
`
`
`No:ermwmgoiaomsow<$93: mg:mg::umwmmgiagi<3:
`
`Ea:
`
`
`
`“mm”mumwmmgiiomwmg:mm”3mg“:>>_._5%<3:
`
`
`
`mzémEzmmIE
`
`mmofix
`
`New Bay Capital, LLC-EX.1001
`
`
`
`
`
`
`
`

`

`U.S. Patent
`
`Feb
`
`. 10, 2009
`
`Sheet 13 0f 35
`
`US 7,490,151 B2
`
`SE
`
`CE
`
`23
`
`£2£2
`
`BE82
`
`mom?
`
`xfimr
`
`1mm:
`
`zo_._.<o:nE<
`
`8am<8:
`
`8awE
`
`mmw:
`
`23.53%?
`
`8aw8amEE
`
`SS 82
`
`<NF.OE
`
`8282
`
`New Bay Capital, LLC-EX.1001
`
`New Bay Capital, LLC-EX.1001
`
`

`

`U.S. Patent
`
`Feb. 10
`
`9
`
`2009
`
`Sheet 14 0f 35
`
`US 7,490,151 B2
`
`
`
`3m:mozzfiiowa
`
`mm3<>
`
`83%mmz<o
`
`02$2_
`
`83%mmz<o
`
`oz>m2_
`
`83%mm25
`
`02$2_
`
`moo:
`
`mmwmmmogn__
`
`82%mm25
`
`02$2_
`
`EE<>mm25
`
`2%z_
`
`om_m<>mm25
`
`02$2_
`
`mx<>>om<x
`
`wmmmmxoo<
`
`
`
`mmooz._._<moim2<m
`
`>._m_._.m._n_Eoomo
`
`282%
`
`2%10%moiBx:
`
`BE<>mm25
`
`02%z_
`
`
`
`mm?.OE
`
`mo
`
`._.2m_2_oom_2m
`
`msoamfiomm.F
`
`
`
`msozomiomm.N
`
`2n_>mm;
`
`
`
`mm<>>om<I.m
`
`szmoI
`
`New Bay Capital, LLC-EX.1001
`
`New Bay Capital, LLC-EX.1001
`
`

`

`U.S. Patent
`
`Feb. 10, 2009
`
`Sheet 15 0f 35
`
`US 7,490,151 B2
`
`3282
`
`No.2
`
`<._.2m__._o 52
`
`Ezmjo
`
`mmmoomm
`
`5x05
`
`mm;
`
`:2
`
`magma
`
`55$
`
`025825200
`
`
`
`6.202m
`
`REED
`
`
`
`mmmmoqqmomDOmn:
`
`
`
`mmmmagEmman:
`
`was,025
`
`
`
`205803%“:
`
`mi;02%
`
`
`
`295852%;
`
`5x22:
`
`omEEozm
`
`232m
`
`82
`
`82
`
`2.0E
`
`New Bay Capital, LLC-EX.1001
`
`New Bay Capital, LLC-EX.1001
`
`
`
`
`

`

`U.S. Patent
`
`Feb. 10, 2009
`
`Sheet 16 0f 35
`
`US 7,490,151 B2
`
`Nm_<n_n__
`
`u26oz;A:I
`
`Fm_<n_n__
`
`Nm_<n_n:
`
`mmt_§mz§._.
`
`FEEn__-{-7m_<n_n__Hzmmmso
`m_<n_n:Hzmmmao.26oz?
`12mPZMEGmmmgmmmozmm
`
`mm._.._.__>_mz<E
`
`5%3%
`
`3%A......
`
`
`
`
`
`A........................VmmN_zom_._oz>m._.2m__n__om_mo._.mmozmwmo;0252_Fax
`
`
`
`A|I|||Il|||ll|¥mmN_zomIoz>mmmozmmo._.Hzmaammmo;0252_5%
`
`
`
`
`
`3.GE
`
`New Bay Capital, LLC-EX.1001
`
`New Bay Capital, LLC-EX.1001
`
`

`

`U.S. Patent
`
`Feb. 10, 2009
`
`Sheet 17 0f 35
`
`US 7,490,151 B2
`
`”imamz_cEUEg5385
`EzEémzmo.
`
`ma;gHzamémxo
`
`mmtgmzé2:30
`x202%:zsz.
`
`_EU12%:
`
`2‘.GE
`
`55%me5202%
`$2;8m02%E1?
`"$3:0.258;TE;
`
`aoozfizons.;aEUmmsmomm
`52Hémzmo.
`
`8x023©295286232%;@
`
`Emzémmv:5220%
`
`n:25%anmmtgmzé
`
`30:233.559%;
`$22memmzmfimEz
`
`NEE/mo92c5.0mi
`
`02382.5;35%
`
`32025:am02%
`
`hE29:85
`
`v202$2%:
`
`mmtswzéz_5%mgn__55%?
`
`n.1%"fies:
`E2Esmzmo
`
`New Bay Capital, LLC-EX.1001
`
`New Bay Capital, LLC-EX.1001
`
`

`

`U.S. Patent
`
`Feb. 10, 2009
`
`Sheet 18 0f 35
`
`US 7,490,151 B2
`
`FIG.16
`
`New Bay Capital, LLC-EX.1001
`
`4095
`
`0 4
`
`095
`
`0
`
`4095
`
`0 4
`
`095
`
`20
`
`0
`
`20
`
`
`
`
`
`(ETHERNETLAN-TWOAADDRESSBLOCKS}
`
`New Bay Capital, LLC-EX.1001
`
`

`

`US. Patent
`
`Feb. 10, 2009
`
`Sheet 19 of 35
`
`US 7,490,151 B2
`
`000
`
`
`
`7/I/I/I/I/I/I/I/I/I/I/IA
`

`
`I INACTIVE
`% ACTIVE
`USED
`
`NDOW_SZE WW
`
`
`
`WI/I/I/I/I/I/I/I/I/I/I
`7/I/l/l/I/I/I/l/I/I/I/J
`
`WI/I/I/I/I/I/m
`
`WI/I/I/I/I/I/I/I/IA
`
`WI
`
`I
`
`W|NDOW_SIZE
`
`
`
`
`
`
`
`
`
`Vl/I/I/I/I/I/I/I/I/I/I/A
`
`V/I/I/I/I/I/I/I’l/I/Il/IA
`ll/l/I/l/I/l/I/I/I/l/IA
`
`
`VII/Ill/I/l/l/l/l/l/Illl,
`
`FIG. 17
`
`New Bay Capital, LLC-EX.1001
`
`New Bay Capital, LLC-EX.1001
`
`

`

`US. Patent
`
`Feb. 10, 2009
`
`Sheet 20 of 35
`
`US 7,490,151 B2
`
`000
`
`Vl/l/l/l/l/l/l/l/l/l/l/A
`
`WINDOW_SIZE
`
`WINDOW SIZE
`‘ WI/I/I/I/I/I/I/I/I/I/A
`Vl/I/I/I’l/I’l/I/Il/I/I/IA
`WI/I/I/I/I/I/I/I/I/l/ll.
`VIII/l/Illlll/l/l/Illfl
`Ill/Ill/Illlllllllllfl
`
`
`I INACTIVE
`
`
`FIG. 18
`
`New Bay Capital, LLC-EX.1001
`
`New Bay Capital, LLC-EX.1001
`
`

`

`US. Patent
`
`Feb. 10, 2009
`
`Sheet 21 of 35
`
`US 7,490,151 B2
`
`
`
`'l/[l/I/[I/I/I/I/I/Ill'l/A
`
`WI/I/I/I/I/I/I/I/[l/A
`Vl/I/I/I/I/I/I/I/I/I/I/A
`W/I'l/I/I/I/l/I/l/I/I/A
`
`
`
`
`
`
`000
`
`WINDOW_SIZE
`
`
`
`
`
`I INACTIVE
`% ACTIVE
`I USED
`
`
`
`
`'
`.
`7/l/l/l/l/I/l/l/I/I/l/IA
`
`WV
`
`
`
`
`/I/I/I/I/I/I/I/I/m
`f/I/I/I/I/I/I/I/I/I/I/fl
`
`
`r/l/l/l/I/l/l/I/I/Im
`
`
`WINDOW_SIZE
`
`
`
`
`
`000
`
`.r_,
`
`’1 I
`
`7/l/l/l/l/l/l/l/l/l/l/A
`
`FIG. 19
`
`New Bay Capital, LLC-EX.1001
`
`New Bay Capital, LLC-EX.1001
`
`

`

`U.S. Patent
`
`Feb. 10, 2009
`
`Sheet 22 0f 35
`
`US 7,490,151 B2
`
`
`
`COMPUTER #2
`
`2002
`
`2008
`
`2005
`
`
`
`2011
`
`FIG.20
`
`
`
`
`
`COMPUTER #1
`
`
`
`2001
`
`New Bay Capital, LLC-EX.1001
`
`New Bay Capital, LLC-EX.1001
`
`

`

`US. Patent
`
`Feb. 10, 2009
`
`Sheet 23 of 35
`
`US 7,490,151 B2
`
`
`
`
`
`
`
`2100 /
`
`2.
`LINK DOWN V
`
`AD TABLE
`
`1P1
`
`|P3
`
`1P2
`
`|P4
`
`AE TABLE
`
`AF TABLE
`
`BD TABLE
`
`BE TABLE
`
`CD TABLE
`
`CE TABLE
`
`CF TABLE
`
`FIG. 21
`
`
`
`
`
`
`
`
`2101
`
`2102
`
`2103
`
`2104
`
`2105
`
`2106
`
`2107
`
`2108
`
`2109
`
`New Bay Capital, LLC-EX.1001
`
`New Bay Capital, LLC-EX.1001
`
`

`

`US. Patent
`
`Feb. 10, 2009
`
`Sheet 24 of 35
`
`US 7,490,151 B2
`
`MEASURE
`
`QUALITY OF
`TRANSMISSION
`
`PATH X
`
`
`
`
`
`
`
`MORE
`
`THAN ONE
`
`TRANSMITTER
`
`TURNED
`
`ON?
`
`
`
`2209
`
`SET WEIGHT
`TO MIN. VALUE
`
`
`
`
`
`
`
`
`PATH X
`
`
`QUALITY <
`
`THRESHOLD?
`
`
`
`
`
`PATH X
`WEIGHT LESS
`DECREASE
`
`THAN STEADY
`WEIGHT FOR
`STATE
`PATH X
`VALUE?
`
`
`
`
`
`
`INCREASE WEIGHT
`FOR PATH X
`TOWARD STEADY
`
`STATE VALUE
`
`ADJUST WEIGHTS
`FOR REMAINING
`PATHS SO THAT
`
`WEIGHTS EQUAL ONE
`
`
`
`FIG. 22A
`
`New Bay Capital, LLC-EX.1001
`
`New Bay Capital, LLC-EX.1001
`
`

`

`US. Patent
`
`Feb. 10, 2009
`
`Sheet 25 of 35
`
`US 7,490,151 B2
`
`
`
`TURNS OFF
`
`(EVENT) TRANSMITTER
`FOR PATH x
`
`
`
`AT LEAST
`
`
`
`DROP ALL PACKETS
`ONE TRANSMITTER
`UNTILA TRANSMITTER
`
`
`TURNED ON?
`TURNS ON
`
`
`
`
`
`2210
`
`2211
`
`2212
`
`2213
`
`2214
`
`SET WEIGHT
`
`TO ZERO
`
`
`
`ADJUST WEIGHTS
`FOR REMAINING
`PATHS so THAT
`WEIGHTS EQUAL ONE
`
`FIG. 228
`
`New Bay Capital, LLC-EX.1001
`
`New Bay Capital, LLC-EX.1001
`
`

`

`U.S. Patent
`
`Feb. 10, 2009
`
`Sheet 26 0f 35
`
`US 7,490,151 B2
`
`FxI._.<n_
`
`8mm
`
`mx:2;
`
` vxI._.<n_
`
`55$
`
`mmtimz<E
`
`HESm>_momm
`
`._om‘
`
`82
`
`EOEmmm
`
`8mm\mmzmommmflflfl
`
`mm.OE
`
`
`
`20:02:;20:02:;
`
`
`
`pzmfikmsfio<Hzmzmm2m<m2
`
`>Fz<ao¥zz
`
`New Bay Capital, LLC-EX.1001
`
`New Bay Capital, LLC-EX.1001
`
`
`
`
`
`

`

`U.S. Patent
`
`Feb. 10, 2009
`
`Sheet 27 0f 35
`
`US 7,490,151 B2
`
`mEEzou
`
`mmhsmzoo
`
`vm.GE
`
`New Bay Capital, LLC-EX.1001
`
`New Bay Capital, LLC-EX.1001
`
`

`

`U.S. Patent
`
`F
`
`7SU
`
`m,
`
`m.E:mmfl
`
`New
`
`mEamm;fixmm:mmomsm8mmeg
`m18mmzo
`mm;
`
`xmmEOmm
`
`New Bay Capital, LLC-EX.1001
`
`New Bay Capital, LLC-EX.1001
`
`

`

`U.S. Patent
`
`Feb. 10, 2009
`
`Sheet 29 0f 35
`
`US 7,490,151 B2
`
`
`
`ggEmmmmfimamm
`
`:8mmzomaz:
`
`HE59x5
`
`om.GE
`
`88
`
`mmmmmgNEG
`
`E02%:
`
`mug
`
`mmmgomm
`
`New Bay Capital, LLC-EX.1001
`
`New Bay Capital, LLC-EX.1001
`
`
`
`
`

`

`US. Patent
`
`Feb. 10, 2009
`
`Sheet 30 of 35
`
`US 7,490,151 B2
`
`2701
`
`RECEIVE DNS
`REQUEST FOR
`
`TARGET SITE
`
`2702
`
`2704
`
`
`
`
`ACCESS TO
`SECURE SITE
`REQUESTED?
`
`YES
`
`2703
`
`
`
`PASS THRU
`REQUEST TO
`DNS SERVER
`
`2705
`
`
`
`
`
`RETURN
`"HOST UNKNOWN"
`ERROR
`
`USER
`AUTHORIZED TO
`CONNECT?
`
`YES
`
`2706
`
`ESTABLISH
`VPN WITH
`
`TARGET SITE
`
`FIG. 27
`
`New Bay Capital, LLC-EX.1001
`
`New Bay Capital, LLC-EX.1001
`
`

`

`U.S. Patent
`
`m.
`
`m7SU
`
`8mm
`
`Noam
`
`58.50:
`
`mmSom£$5128
`
`.50:
`
`%$5128
`
`mma:
`
`New Bay Capital, LLC-EX.1001
`
`New Bay Capital, LLC-EX.1001
`
`
`

`

`U.S. Patent
`
`Feb. 10, 2009
`
`Sheet 32 0f 35
`
`US 7,490,151 B2
`
`RE:2:
`
`88
`
`Bow
`
`8mm8282
`
`838XEn:
`
`T
`
`
`
`a“$5128.50:
`
`8%
`
`25ES
`
`$8
`
`E58
`
`3mm
`
`
`
`E$5158.50:
`
`Im
`
`
`
`1535.8Eva/E
`
`8mm
`
`8%
`
`New Bay Capital, LLC-EX.1001
`
`New Bay Capital, LLC-EX.1001
`
`
`
`
`
`

`

`U.S. Patent
`
`mF
`
`m
`
`9AW7SU
`
`2B
`
`22.0%
`
`
`
`-m2.55am07%BEEm,369:Emmzmo
`
`a.M,52cmGE
`M8208mmE”Emismemes
`mm>_m0mm
`
`mmEEmZ<E
`
`gamma
`
`ammuoz>m
`
`Eémzwo
`
`215%
`
`8%
`
`New Bay Capital, LLC-EX.1001
`
`New Bay Capital, LLC-EX.1001
`
`

`

`U.S. Patent
`
`Feb. 10, 2009
`
`Sheet 34 0f 35
`
`US 7,490,151 B2
`
`0')
`O‘—
`0')
`
`3105
`
`3104
`
`CLIENT#2
`
`FIG.31
`
`
`
`
`TX/RXTX/RXTX/RX
`
`‘—
`or-
`(‘0
`
`3102
`
`New Bay Capital, LLC-EX.1001
`
`New Bay Capital, LLC-EX.1001
`
`

`

`US. Patent
`
`Feb. 10, 2009
`
`Sheet 35 of 35
`
`US 7,490,151 B2
`
`CLIENT
`
`SERVER
`
`SEND DATA PACKET
`USING CKPT_N
`CKPT_O=CKPT_N
`GENERATE NEW CKPT_N
`START TIMER, SHUT
`TRANSMITTER OFF
`
`IF CKPT_O IN SYNC_ACK
`MATCHES TRANSMITTER'S
`CKPT_O
`UPDATE RECEIVER'S
`CKPT_R
`KILL TIMER, TURN
`TRANSMITTER ON
`
`SEND DATA PACKET
`USING CKPT_N
`CKPT_O=CKPT_N
`GENERATE NEW CKPT_N
`START TIMER, SHUT
`TRANSMITTER OFF
`
`WHEN TIMER EXPIRES
`TRANSMIT SYNC_REQ
`USING TRANSMITTERS
`CKPT_O, START TIMER
`
`IF CKPT_O IN SYNC_ACK
`MATCHES TRANSMITTER'S
`CKPT_O
`UPDATE RECEIVER'S
`CKPT_R
`KILL TIMER, TURN
`TRANSMITTER ON
`
`SYNC_REQ
`
`FIG. 32
`
`PASS DATA UP STACK
`CKPT_O=CKPT_N
`GENERATE NEW CKPT_N
`GENERATE NEW CKPT_R
`FOR TRANSMITTER SIDE
`TRANSMIT SYNC_ACK
`CONTAINING CKPT_O
`
`CKPT_O=CKPT_N
`GENERATE NEW CKPT_N
`GENERATE NEW CKPT_R
`FOR TRANSMITTER SIDE
`TRANSMIT SYNC_ACK
`CONTAINING CKPT_O
`
`New Bay Capital, LLC-EX.1001
`
`New Bay Capital, LLC-EX.1001
`
`

`

`US 7,490,151 B2
`
`1
`ESTABLISIIMENT OFA SECURE
`COMDIUNICATION LINK BASED ON A
`DOMAIN NAME SERVICE (DNS) REQUEST
`
`CROSS-REFERENCE TO RELATED
`APPLICATIONS
`
`This application is a divisional application of 09/504,783
`(filed Feb. 15, 2000), now U.S. Pat. No. 6,502,135, issued
`Dec. 31, 2002, which claims priority from and is a continua—
`tion-in-part of previously filed US. application Ser. No.
`09/429,643 (filed Oct. 29, 1999) now U.S. Pat. No. 7,010,604.
`The subject matter of the ’643 application, which is bodily
`incorporated herein, derives from provisional U.S. applica—
`tion No. 60/106,261 (filed Oct. 30, 1998) and 60/137,704
`(filed Jun. 7, 1999).
`
`GOVERNMENT CONTRACT RIGHTS
`
`This invention was made with Government support under
`Contract No. 360000-1999-000000-QC-000-000 awarded by
`the Central Intelligence Agency. The Government has certain
`rights in the invention.
`
`
`
` BACKGROUND OF THE INVENTION
`
`A tremendous variety of methods have been proposed and
`implemented to provide security and anonymity for commu-
`nications over the Internet. The variety stems, in part, from the
`different needs of different lntemet users. A basic heuristic
`framework to aid in discussing these different security tech-
`niques is illustrated in FIG. 1. Two terminals, an originating
`terminal 100 and a destination terminal 110 are in communi-
`cation over the Internet. It is desired for the communications
`to be secure, that is, immune to eavesdropping. For example,
`terminal 100 may transmit secret information to terminal 110
`over the lntemet 107. Also, it may be desired to prevent an
`eavesdropper from discovering that terminal 100 is in com—
`munication with terminal 110. For example, ifterminal 100 is
`a user and terminal 110 hosts a web site, terminal 100’s user
`may not want anyone in the intervening networks to know
`what web sites he is “visiting.” Anonymity would thus be an
`issue, for example, for companies that want to keep their
`market research interests private and thus would prefer to
`prevent outsiders from knowing which web-sites or other
`Internet resources they are “visiting.” These two security
`issues may be called data security and anonymity, respec-
`tively.
`Data security is usually tackled using some form of data
`encryption. An encryption key 48 is known at both the origi-
`nating and terminating terminals 100 and 110. The keys may
`be private and public at the originating and destination termi-
`nals 100 and 110, respectively or they may be symmetrical
`keys (the same key is used by both parties to encrypt and
`decrypt). Many encryption methods are known and usable in
`this context.
`To hide traffic from a local administrator or ISP, a user can
`employ a local proxy server in communicating over an
`encrypted channel with an outside proxy such that the local
`administrator or ISP only sees the encrypted traffic. Proxy
`servers prevent destination servers from determining the
`identities of the originating clients. This system employs an
`intermediate server interposed between client and destination
`server. The destination server sees only the Internet Protocol
`(IP) address ofthe proxy server and not the originating client.
`The target server only sees the address of the outside proxy.
`
`This scheme relies on a trusted outside proxy server. Also,
`
`10
`
`15
`
`20
`
`25
`
`30
`
`35
`
`40
`
`45
`
`50
`
`55
`
`60
`
`65
`
`2
`proxy schemes are vulnerable to traffic analysis methods of
`determining identities of transmitters and receivers. Another
`important limitation of proxy servers is that the server knows
`the identities of both calling and called parties. In many
`instances, an originating terminal, such as terminal A, would
`prefer to keep its identity concealed from the proxy, for
`example, ifthe proxy server is provided by an lntemet service
`provider (lSP).
`To defeat traffic analysis, a scheme called Chaum’s mixes
`employs a proxy server that transmits and receives fixed
`length messages, including dummy messages. Multiple origi-
`nating terminals are connected through a mix (a server) to
`multiple target servers. It is difiicult to tell which of the
`originating terminals are communicating to which ofthe con—
`nected target servers, and the dummy messages confuse
`eavesdroppers’ efforts to detect communicating pairs by ana-
`lyzing traffic. A drawback is that there is a risk that the mix
`server could be compromised. One way to deal with this risk
`is to spread the trust among multiple mixes. If one mix is
`compromised, the identities of the originating and target ter-
`minals may remain concealed. This strategy requires a num-
`ber of alternative mixes so that the intemrcdiate servers inter-
`posed between the originating and target terminals are not
`determinable except by compromising more than one mix.
`The strategy wraps the message with multiple layers of
`encrypted addresses. The first mix in a sequence can decrypt
`only the outer layer of the message to reveal the next desti-
`nation mix in sequence. The second mix can decrypt the
`message to reveal the next mix and so on. The target server
`receives the message and, optionally, a multi-layer encrypted
`payload containing return information to send data back in
`the same fashion. The only way to defeat such a mix scheme
`is to collude among mixes. If the packets are all fixed-length
`and intermixed with dummy packets, there is no way to do
`any kind of trafiic analysis.
`Still another anonymity technique, called ‘crowds,’ pro-
`tects the identity of the originating temrinal from the inter-
`mediate proxies by providing that originating terminals
`belong to groups ofproxies called crowds. The crowd proxies
`
`are interposed between originating and target terminals. Ea ch
`proxy through which the message is sent is randomly chosen
`by an up stream proxy. Each intermediate proxy can send the
`message either to another randomly chosen proxy in the
`“crowd” or to the destination. Thus, even crowd members
`cannot determine if a preceding proxy is the originator of the
`message or if it was simply passed from another proxy.
`ZKS (Zero—Knowledge Systems) Anonymous 1P Protocol
`allows users to select up to any of five different pseudonyms,
`while desktop software encrypts outgoing trafiic and wraps it
`in User Datagram Protocol (UDP) packets. The first server in
`a 2+—hop system gets the UDP packets, strips off one layer of
`encryption to add another, then sends the traffic to the next
`server, which strips off yet another layer of encryption and
`adds a new one. The user is permitted to control the number of
`hops. At the final server, trafiic is decrypted with an untraec-
`able IP address. The technique is called onion-routing. This
`method can be defeated using traffic analysis. For a simple
`example, bursts of packets from a user during low-duty peri-
`ods can reveal the identities of sender and receiver.
`
`Firewalls attempt to protect LANs from unauthorized
`access and hostile exploitation or damage to computers con-
`nected to the LAN. Firewalls provide a server through which
`all access to the LAN must pass. Firewalls are centralized
`systems that require administrative overhead to maintain.
`They can be compromised by virtual-machine applications
`(“applets”). They instill a false sense of security that leads to
`security breaches for example by users sending sensitive
`
`New Bay Capital, LLC-EX.1001
`
`New Bay Capital, LLC-EX.1001
`
`

`

`US 7,490,151 B2
`
`3
`information to servers outside the firewall or encouraging use
`of modems to sidestep the firewall security. Firewalls are not
`useful for distributed systems such as business travelers,
`extranets, small teams. etc.
`
`SUMMARY OF THE INVENTION
`
`A secure mechanism for communicating over the internet,
`including a protocol referred to as the TunneledAgile Routing
`Protocol (TARP), uses a unique two-layer encryption format
`and special TARP routers. TARP routers are similar in func-
`tion to regular IP routers. Each TARP router has one or more
`IP addresses and uses nomral IP protocol to send 1P packet
`messages
`(“packets” or “datagrams”). The IP packets
`exchanged between TARP terminals Via TARP routers are
`actually encrypted packets whose true destination address is
`concealed except to TARP routers and servers. The normal or
`“clear” or “outside” IP header attached to TARP IP

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket