`
`"in re Inner I’m-123 Reexaminaiinn of:
`
`Vietnr [amen et 211.
`
`Centre} Ne; 955001 ”7’88
`
`U. S. I’ni‘ent No 7.4! 8504
`
`Group Art Unit: 3992.
`
`Issued: August 26. ZIJIIS
`
`Examiner: Ruined Foster
`
`Fm: AIIIILE N'E‘I‘WCIRK PRO‘I‘OEIUL FOR SECURE-
`COS-"IIIUNICA’HONS USING SECURE
`
`Cnnfirmininn No. 5833
`
`DOMAIN NAMES
`
`Mail Step iI‘IIE'TI"1:’a:IFI€-S Iiieexem
`Connnissimier for Patents
`Pi). 33m:
`.1450
`
`Alexandria, VA 223 I 3445i}
`
`DECLARATION OF DR. ROBERT DUNHAM S‘HGRT HI.
`
`I Robert {)unnam Sheri. III, deeizn‘e as feiiows:
`
`I.
`
`I naive been the Chief Technology ()i'ii‘icer of Vii‘neIX Inc.
`
`(“\s’imeitX“} since June
`
`2010 and the Chief Scientist ibr Vin'ieis-‘I. since May 2006. Prior in inining \I’imeIX. frem 3994 in
`
`Aprii 3005,
`
`I Ireid various pneitinns including Assistant Vice President anti Division Manager at
`
`Science Appiications Internetienni {lirporinion (“Sr-\IC“). Prior tn SAII::, I worked at ARGO {Denier
`
`‘I‘ecimeiogies hie, Sperry {Ini‘pei‘erie 'I'eehnoingy Center. and Sperry Research Center.
`
`leave a 1311!).
`
`in Eiectrieei Engineering from Purciue University as weii as e .1‘»I.S.in i‘»-I.eriiemnrics and. a. 8.3. in
`
`Electrical Engineering from Virginia Tee i1.
`
`2.
`
`I am one of the named inventnrs of US. I’artenr Ne. 1?in 8504 (“the ”50% patent”),
`
`which I iinderstnnfi is the subject of the abevefiidemified reexamination. proceeding.
`
`I am i‘nmiiiar
`
`with the ’504 entrant. including its ciaime.
`
`3.
`
`Prior re and at the. time ni‘ the invem‘iens claimed in the ’504 parent, there was a
`
`significant and increasing concern with the seeui‘ii}? 0f computer net‘nmrk cemmenieaflon. The
`
`widespread centreciiviry between computers that was ennbied by the swift increase in netwnri; access
`
`in flames and businesses nisn ied in many security breaches as weii as concerns regarding; the safety ni‘
`
`cnnfidentiei infnmietioii sent ever computer networks. This pi‘ebiem received significant attention
`
`{mm the research and {ie‘\-'einpmeni ceilin‘umity. Practice} experience showed that there was: 21 need
`
`for a system that cnnid be easiiy and cerrectiy used to enabie secure enimmmientions, because a
`
`system that made it diffienir fer an end~nser in ennnie secure cnmmuniceriens would iikeiy Iead in 3
`
`Petitioner Apple - EX. 1053, p. 1
`
`Petitioner Apple - Ex. 1053, p. 1
`
`
`
`Control No. 95500} £88
`
`loci}: of use or inconect use. The inventions discioeed and claimed in the ’504 patent and other patents
`
`in this family met this need. For instance, tilt? insemions disciosed anti ciiaimet‘i in the €504 patent
`
`include a domain name service for estabiishing secure communication links, As an exampie,
`
`independent ciaim l recites “{a] system for providing a domain name service. for esrebiishirig a secure
`
`crn‘mmmicatioo link, the system comprising} a domain more service system configured a
`
`.
`
`.
`
`to
`
`comprise an indication that
`
`the clonmin Home service: system supports esiablishiog a secure
`
`communication fink.”
`
`(”304 patent S5:49*56.} Dependent oiairo 8 recites that the domain name
`
`service sysiem is eonnectable to a virtusi private network {VPN} through the communication network
`
`and dependent: claim 9 recites that
`
`the vii‘tiiai private oetr-vork is one of a pl'ureliiy of secure
`
`communication links in a hierarchy of secure communication links.
`
`("504 patent 56:540} Further,
`
`dependent claim to recites that the “(Imperial name service system is configured to support estaliiisiiirig
`
`a. secure common}:icetioo link between, {a} first location panel {a} second location." {"304 patent 56:40—
`
`43.) As another exampie} cieim ‘2? recites that the domain name seWice system is configured to
`
`enable establishment of a secure communication link between a first ioeation anti a second iocetion
`
`iii‘fllilS'pElFEllliiy to a user at the first iocatioo.
`
`{”504 patent 5?:l3-l6.) The imseotions combine both
`
`esseofose and security aspects without sacrificing one or the other.
`
`4.
`
`As one exampie of the manifestation of the long—felt need? the Defense Advanced
`
`Research Projects Agency (“DARPA”) funded various. research programs to further the science and
`
`technology of inibrmstion assumoce tutti survivability. DARPA programs, such as the “Information
`
`Assurance” and “llynamie Coalitions” programs were iocused on the need to provide essy«to«eii£ibie
`
`secure comimmications.
`
`These proiects received significant
`
`funding to be spent oevelopiog
`
`technologies that could soive this need. For example, one such project eotitleii Next Generation
`
`Internet” received funding in fiscal year l993 of epprosirimteiy‘ $39.3 miilion, in fiscei year l999 of
`
`appronmaieiy $49.5 million, and. in fiscal year 2000 of approximately $40 million.
`
`(fix. 8—1 at
`
`VNETOl‘iElQBGl 319621.} Another program fimried. lo} EARPA, “lilyiisrriic Coalitions," was created
`
`to address the abiiity of the Deparm‘ieot of Defense to quickly and easily enable secure
`
`commmicetioos over the lntemet.
`
`(See, rag Ex. 3—: at 'VNE’YWZ 19244, 2845 298—209, 593, $25.)
`
`5‘
`
`According to DARPA officials at the time “existing group membership protocols
`
`{iliid} not support ilie security needs of milltidimensiooei organizations. The overarching chaileoge
`
`{Wills creating secure groups rapidly This {was a significant issue when countries [woke faced with
`
`so operation that requireld} immediate moltinetionsi attention.” {Ex 8:} at l.) DARPA contracted
`
`with some oi’rhe most skilied organizations in the area. oi‘secured commmiielations in an effim to meet
`
`its security needs (e.g., NA]. Labs, a division 017%}? Security; Network Associates incorporate-tit Les
`
`2
`
`Petitioner Apple - EX. 1053, p. 2
`
`Petitioner Apple - Ex. 1053, p. 2
`
`
`
`Control No. 95500} ,?88
`
`Ange‘LlS arid the Miemeieetrenies Center Lii‘Nm‘th Carmina, Research Triangle Park NLmli Carolina,
`
`as w ell as Julius Hopkins Limeiaiw fiziliimere; Northwestern Linn61%31‘9 803W}; and ‘i eridien- PSR
`
`Arlingme, Virginia).
`
`lid. at l.)
`
`in all, mere rlian 15 organizations were reseaiehiiig the 'V‘c'li’lQHS
`
`mmpeneiiis that made up the pmgi‘ams initiated by the Department of Defense. {lei} 'H‘Liwever, name
`
`01 these piesiiuieuq insuwimua came up Wltlla SOlu‘iiOl} Liming the Telexan: Lime flame clese to what
`
`is dlSClflSEfl and claimed in the ’504 patent
`
`{LIL}. ai l4} Thai is; they did 110*; develep a seltitien {1131‘
`
`provided a domain name service for establieliing a secure eeiiiimmieatimi link,
`
`6.
`
`As a second exarn‘iple of the long-felt need for the ii‘iveniiw‘is ef line 7504 patent
`
`liti—Q—“l‘ei, which is a X-‘el'ltm’e Ltepitel fine that
`
`invesis in companies daiv'elepiiig cutting enge
`
`technele0g}, aimed at suppertiiig the United States intelligence emmn'uiiiiy,
`
`including the Central
`
`Intelligence Agency (GA), funded the original (lei-‘elopn'ient (if the teelnmlegr with approxiinaiely
`
`$34 million lfiii—Qii’el‘s willingness to ei'itei‘ him 3 relationgliip with SAIC {the miginal assignee of
`
`the applicatien that led to the ’504 patent) fer the development 0f this teeliimlegy fim’her ei-"iileiieee a.
`
`lei‘igvl‘elt need for teclmelogy that made it easy and convenient to enable secure e0111mm}ieatienx
`
`‘3.
`
`A tliiid example ii as the extent to whiLli SAP:inteiiiellv funded {lie ieseaiLli and
`
`Lleelepiiiem Ql the tLlenlog When l was empleyed at SAIC, its business madel was to sell. hours
`
`to the fiademl government. SMi was met simcluieLl Lie brim: pieduus to {the market. which typically
`
`requires significant internal investments in research and develepiiient.
`
`iii an avaiege year during the
`
`Llevelepmeiii of the technology that led to the ‘504 patent SAN: weuld spend approximately $2
`
`miiiien an internal research and developn‘ient eflhrte.
`
`In the
`
`arse Of the teleGliw claimed in. the
`
`’504 patent, SAlC invested. $1.7 mi'llimi, which represents eliiiest the entirety of SAXC’S internal
`
`research and development budget for one whole yeai: A technology review committee also Lippmvezl
`
`our team s patent dei‘elepmem el‘l‘mts and costs an an i‘ii‘iL{i‘iing beais s A third party {Casn‘il‘n‘idge
`
`Strategic Managemem Group or CSMG} also SubSlaiitlaieil the value ef‘ilie l3fll‘il‘10l0gyv MQI‘EO‘S-“EE‘, a
`
`significant percentage (if ali ei‘ SALEC’Lpatient Lienelepmem egffims lime focused Lin this iLleLiloL l
`
`unfilei‘sianil that SMC‘ Spent {)l}8~‘illll'tl of its Intel, peiem pi‘fl‘ti‘blii‘i e‘f‘lbns m: our patent pm‘ti’olie at that
`
`time.
`
`8
`
`in fact, as Liemoneii‘atecl iii an article “Linen before the claimed invemiens (if the ’504
`
`patent it was widely i‘eeeeiiized that: pmxicling seLVere remote access in a LAN or Vii-“A wee
`
`exiremely difficult for IT support desks,
`
`(lei; 8—4 at l l
`
`in ilmi time peiiod iemoteaCL 35 was “a
`
`nightmare fer suppm‘t LleleSL Staffers nevei‘ knlelw what. ceiiibii‘iatim‘i of CPU? modem? operating
`
`system and software emifiguieiien they {were} geing Le have to suppi'irt,” and adding the
`
`eemineral,a.il_\xvari-'ailable “TAN Sofiware only made matters worse.
`,,
`3
`
`{322i}
`
`Petitioner Apple - EX. 1053, p. 3
`
`Petitioner Apple - Ex. 1053, p. 3
`
`
`
`Control No. 95500} £88
`
`l1
`
`This. article precisely captured the compi‘iter and interim: security industry‘s attitude
`
`{CNS-{lid {lie li'azleofflieiween “ilk”: ease of use of a secure system? such as a. VPN system, for the average
`
`computei‘ user and the security that the VPN system provided. The article recognized. that the “ease of
`
`inslallation isn’t always a good thing:
`
`In many case-5* the easier the client is to install, the less secure
`
`it is.” (Ill. a: 2i} 'l’l‘ie claimed inventions oftlie ’Sllc'l patent, which provide a domain name sen-ice for;
`
`eslablisliing 2i secure communication loll»: {for example a ‘VPN communicalien link), combine boili
`
`case of use and security aspects without sacrificing one or the other.
`
`l0.
`
`Moreover, many where before and around the lime cf the inventiox‘is claimed in the
`
`2504 lament have attemptecl
`
`to solve the need of ecsy—lo-ese methods of enabling secure
`
`communications over the lntcmet. But, 35 discussed above, many of {liege attempts have failecl. For
`
`example despi'le ii'westing enormous amounts of money and enlisting the resources of numerous.
`
`prestigious insiituiions and their ialezitetl employees DARPA’S projects still fell for short of the
`
`claimed inventions Mike ”504 patent. {See “E $5, mpmj
`
`l l
`
`Additionally; as discussed above, no one had yet achieved the results ol‘tlie claimed
`
`inventions of {he ’Sllsl patent in that time period, because remote access was "a niglii‘mai‘e” for support
`
`desks to handle, and adding the cmmncrcialunavailable VPN wile-“arc was even more clifficuli.
`
`in.
`
`feel? al {his time, {he secm‘ll‘y industry generally viewed ease of use and VPN security as minimally
`
`exclusive,
`
`(Size “ 8—9, were} By providing a domain name service for establishing a secure
`
`communication link, the inventions ol’lhc ’384 paiem provided a system fin“ easily establishing secure
`
`coum‘mnication links without: sacrificing security, ihereb}! succeeding where others .l'i’iiled.
`
`l2.
`
`The claimed. inventioos of the "504 patent. have been commercially successfull for
`
`example, through the licensing revenues the}? have generated for VimelX.
`
`in luly 20(th SafeNet a
`
`leacling provider of internal security technology that is the cle facts standard in the VPN' industry,
`
`entered. into a portfolio license with SAEC‘. to incorporate features into Sal‘eNetls underlying \r'l’Ns.
`
`Sal‘cht licensed the patents because ol‘fealures disclosed and claimed in the patents, including those
`
`in the ’504 patent
`
`lx-ilicmsol‘t has also entered into a. similar: license {list includes the "filial potent.
`
`'ll-licrosoll entered into its license will} Vimetffii after it was found to have infi‘ingecl two other Violet};
`
`patents in the some lizmily, resulting in. a damages award ofowr one hundred million dollars, leading
`
`ultimalely to a license agreement of'lwo hundred million dollars.
`
`l3.
`
`The claimed *ii’ii-‘iziilrions of the 1504 pate‘ni were also contrary to the accepted wisdom
`
`in: the. time of tilt} inventions. For example, them: was a general uncietstamlipg that reliable security
`
`could only be achieved through di'l’ficult—to-pnwision \PNs and easy—m-set~up c-i'iririeclioiis coulcl not
`
`lie secure. This belief was reinforced by the ll‘ offices of many large companies and institutions,
`
`4
`
`Petitioner Apple - EX. 1053, p. 4
`
`Petitioner Apple - Ex. 1053, p. 4
`
`
`
`Control No. 95500} ,?88
`
`whose iivelihood depended en the need for h.ighi}’-tt'ailfim‘i. speeiaiisis to arrange secure network
`
`ccmneciioos.
`
`H.
`
`The industry had long accepted as a fact that secure systems, such as VPN systems.~
`
`would be difficult
`
`to set up, and.
`
`the secure communication modes eou‘id not be easily and.
`
`conveniently ensbiei‘i
`
`in 2: i999 artieie entitled “CE-Os Chew the VPN Fat“ that predicted What the
`
`{more heii‘i for the start—up companies that deveioped \I’\\ the wish iist (iid not even address the type
`
`of solutions provified by the ’504 patent: such as a domain name service for establishing secure
`
`coi‘lmiimieation links. (Ex. 13-5 at 1—2.)
`
`ES.
`
`The teciii'iolog3-' of the ’304 patent was aiso met wiih skepticism by those skiiled in
`
`the am who ieai‘iied of our inventions. Semi Saydjafi, a. program manager for HARPER? infomied
`
`Edmund Monger, a oo-im—‘entor of the *504 patent, than. our ieeimoiogy would never be adopted.
`
`NIDFEGVH} the IT offices of 1,113,113 iarge companies anti instituiioos expressed skeptieism that: secure
`
`connections couid ever be enabied easily-‘13}? regular computer users
`
`it“?
`
`Severai eveois aiso den‘ioi‘isti‘aiie praise for the im-eniioos iii {the T504 patent by those
`
`in the field As dismissed above, SAiC invested a dispmpoi‘tioiiai'eiy iai‘ge pei‘eemage of its iniei‘na}
`
`resources in the teeiiiioiogy SafeNei and Microsofi: have both iiceiised the technology of the ’SL‘M
`
`patents A stuéy done by CSMG also praised. iiie i’ii‘i4"eiit.io'iis. Jim limit at Network Soiiliiiiiiiis,.
`
`\x-‘hich
`
`was acquired £33 Veiisign, praised. and expressed significant interest in the technology and wouid have
`
`,iiwesieo but for a change iii circumstances at his company.
`
`i?
`
`i deoiare “iiiaii {iii staliei‘nems made herein of my own jkiio‘cs-‘iedge are into and that ail
`
`statements made on information and belief are believed to be true and further, that these statements
`
`were made with the knowiedge that \sriliful faise statements anti the like so made are punishable by
`
`fine or in‘lprisoi‘iiiien'i, or both, under Section 200} of'i‘iiie is ofthe United States Code am} that such
`
`wi‘iifiil faise statements may jeopardize the validity of the ’304 patent,
`
`Dated: March 293 2012.
`
`33*:
`
`i'Rohei‘i Diiilham Short 111:"
`
`Robert Dunk-am Shim Hi
`
`‘Ji
`
`Petitioner Apple - EX. 1053, p. 5
`
`Petitioner Apple - Ex. 1053, p. 5
`
`