`
`D "I‘IRADEPviA_R'K OFFICE
`
`C::um‘0Ti N0; 9S.e"‘00J.f«’88
`
`{Iiroup A1‘t L3'm‘t: 3993
`
`E-x3mi.ne1': R.t:laI1CiF+:;ste1‘
`
`£fio.:1.fix'n1ation Na; 5823
`
`) )
`
`)
`,3
`_1
`3
`
`J
`4}
`)
`
`)
`
`In re Iszrer .Rar2*rg.>.s' Rs':exa:‘ni1.2at.im.: mi‘:
`
`Viattor Larson. at :11?
`
`US. fPa£:ent Na. ".5’.,4.§ 3,504
`
`Issueiii August 26, 2088
`
`Fm‘: ,»:=‘k_(}{{.F; NETW()RI<_ PR(}Tf3(?()I_.. FOR SE{jiL‘=”RE
`C{}?v_IMUNICATIONS UESING SECUREi
`’13()EV1A{N NA?»-"IE3
`
`Mai} Smp .3'm'er Pr:.rIes Reexan1
`{Iomn1issim‘1e1' for Patents
`fE’.O. Bcwx £450
`
`Al.e.xandria.¢
`
`223 § 33$ ‘~1¥5{}
`
`’l)ec.Iaratiun 01‘ Arweins D. Ke‘mrm*tis. PILI).
`
`I decla:‘e3 that the fhllawitxg state1m3nt?.s are true to the best m‘.‘m}= .k.mm.>Ee:ige, i.ni’o.r.:natim.1, anal
`
`beiief, fmlned afier reascrnabifis ixiqtziijy‘ L¥.l'1C}E‘~1'fl'18 ~2iYCl1lI1‘StafiC8S.
`
`AN’GE.L0-S D. K.E;ROE\-i.‘Y"1"1S, declare as foiiows:
`
`II halve been retained. by V.iI"r.n=:£'.‘—~‘;'_
`
`Inc.
`
`{"“v"i‘met'}i_’°)
`
`far
`
`the abm»'e«ref.‘<:~renced
`
`1‘€E=}2£i1i11ii1&Ii0~‘!1 procaedi:2.g.
`
`I uxzsierstaxzd that this :‘eexaz11i11ati:313 in‘w:3h.=es
`
`Patent No. 7,siiS,5U4
`
`{“*the ‘Seas; patent”).
`
`1. further und-ers’tan.dt|1atthe ‘S04 patent is as%signed tn ‘«;'i;‘ne:'X and that it is part
`
`of 3.
`
`ir‘a:n‘1i'iy :13" paients {“‘T\~‘iung,s=:1‘
`
`;7a?t.e11t fa,miE_v"'} that stema fi'Q'f]‘l
`
`prov‘is‘i:'maI appiicat.ic:sn nos.
`
`€>O..-“fHJ€s,261
`
`{:“L{31e E61 application”),
`
`filed an (j)ci:3beT1‘ 30., 1998, and 60..-"'}3‘§",7{34 (“me “.394
`
`app¥ication‘”j_1, filefi on June 7, 1999,
`
`I undetsmnd. tlmf the ‘S04 patent is a com‘i.m:a:i.0n af U_S_
`
`appiication rm. 09.-‘558,2i0 (“the “.220 app1'i::.m:im.z’"}, {Red April 216, 2£¥£¥0 {now abmxdmxed), \-vhiv.'.'.11 is
`
`2: comiuuation-.i:n~p::u't of US. application rm. G9.:"'50s1,?'S3 (‘now US. Imam: No. 6,502,135, “the ‘V335
`
`pa.’te1:t”A}.
`
`1 3150 zmd.e.2rs't;md that the ‘E35 patent is 3 cnntinnation-in~;:aa1't of US. a:ppi:ication nan.
`
`09.f429,643 {now US. 1-”’ate:1tf=.\‘=‘0. ”?,0l0,€s{}4}, which s:'iai.ms primiiy to the €261 and ‘704 applications.
`
`Petitioner Apple - Ex. 1052, p. 1
`
`Petitioner Apple - Ex. 1052, p. 1
`
`
`
`Con‘ir«:.u} No; 95.300} .7388
`TDec?i2m-itirm rofAng.;e¥~0$ TD. I<Zem1tn}.=t,is, Phi).
`
`I.
`
`’RESO{_ER(fES I HAY’ C{)NSL5L~’l‘fEfl)
`
`2.
`
`E hm-‘e rex-=i:2wc3d the X304 patent, incmding claims 1*60.
`
`I hax-‘e also reviewed a.
`
`Reqxzest for .:’mc:* I7’::zr*1:;%.s‘ Raéexeuninatiun uf the ‘S04 psxtent fiiecl by Ap«pl.e Inc. with the U Patem
`
`and T:‘ade'n1a1'k’ ()fl'1c¢;‘. 011 Qctobex‘ 18, Efiii {“Re3quesi.°’ or “Req."’). as wail
`
`its atsc-:'J:npany'i.ng
`
`ex.bii::i1*s.‘
`
`.Aa:idifim1a.Hy, I hax-—‘e reviewed an Citrder G.t7anti.n.g Request fim‘ Irma‘ P:::rr:2!.s‘ R.eexa.mi.11a1‘i.0:1
`
`of the ’5{}4 patent {"‘the Order”) and an Office Action (“the Office Amionfi, bath mailed on
`
`Des':emi‘:~er 29, 20% 1.3
`
`3.
`
`I have alse studied the f'mH0vm3g (iocuments cited in and inciudesd with the Request
`
`and.-50:‘ Office Action:
`
`Smaina at 3]., ‘“F§.e>:.ib}.e inremer Secu.re Tmn5acti{_ms Based on Ca}i.aharative
`
`D0m2:i;1s,” Lecture News ir1(.‘.0mp1;:1:ez‘ Eicmzcve, val. 1.361, at 3".?~5} {£997} {*‘:‘s‘r2i<:.u‘2<::"}.;
`
`l.‘ateni
`
`No.
`
`(i..‘5'»5'»’?,("J~?.~Tr' m Prcwina {"‘}3’r:2:.:£r2r)”’};
`
`(KS.
`
`.Pat‘e;t2.f N0.
`
`f§,i¥9f§,5§(§7 to Beam‘ an 3.3.
`
`{"‘1:?e..s'c?r‘":}; R.
`
`Atk‘ius0n., IETF RFC 223$,
`
`E>:<:ha.nge Dei.eg§:t§0n Record. for the DNS." N«L:=x-mnber $997
`
`{j“RfF{T 2230”}; D. Easilake at 233., IE'I‘}‘~' RFC 2538. ‘Staring (?«ax‘t.ifm:atas in the Dumain Nazne-. Syslterlz
`
`{'['}’:‘~’§S4},”‘ Ma1‘c}1 £999 (“RFC 2573 87}; S. Kent at 21%., IETF’ RFC: 240% , “SecL:17:i.ty' Architecture for the
`
`Imemet Prot{>c0i,"' Nm-=en::b~er
`
`’i.998 (“RFC 2.403}; D. Eastiake et 21%., IETF RFC 2065, ""D(_3r.11ain
`
`.T\izm1e S‘§e‘SiE5.l11 Security’ E...\:.te21sim1$._” I:.mua..ry :99? (“RFC 2.065”); 3,P::ssta1 et 3%.,
`
`‘£‘E’I'.F "Rf-‘C 91.10,
`
`“£)::smain Requirements.” October X984 (“RFC 8920"};
`
`Guttman at 211..
`
`.iE.'FF RFC 2f3{)«'$._ ""L§‘se3rs’
`
`Securify I-{a.:1.d.‘m)0}4.,” Fasbrtlarje 3999 {"‘RF(}'. 3504”); Vii. Reed.
`
`:31"
`
`211.. “Pmxties fm‘ A:_1o:1§.-111a113
`
`R::>uting.” .i2{;’a Annual (ffo1n_pute1‘ Sectnriiy Applisitatimis (.I011.fm‘e‘x1c-e, San Diegm, (IA. {1L}~es:embe.r 9—
`
`}3} {“.!i’a2':3a:i"’}; Goidschlaig er a1... “Hiding R.0u.ting Infcsn.n.a:i_ox1,” Wo1‘k.sh0_p cm Infortnaficyn H_id_ing,
`
`Ca'n1hs‘idge, UK... May 3996 (“G01dschIag”_}; P.
`
`:\~'§0ck‘z1;3et't'is, IETF RFC 3035, “Do:n;1inN:;1I:3.es
`
`}f1:,up’ie1:nen'tm:is:>n and S’p~ec.i‘fn:.a31i0.u,” Nm.=en1be1' £98‘? {L“'RF{.‘. E035“); R.iB.rade—11_.
`
`i.¥:‘TF RH.‘ 1123.
`
`“Requi1*em§:nts for Emanxet Heats —~ Appficmions and Su.pp0.rt,” October 3.989 (“RFC H_2.3“_};
`
`R. ,»:=‘*s.f1«;‘.in50n_. [ETF RFC 182:3, “i‘§ec11_1‘i1),»‘ ,%‘s.1‘ch.ite<:t11t‘<: for the ¥.mie‘m:.-11'. P1‘m'0c0L” .e'-\.1;.gu.st 3.995 (“RFC
`
`3825”); R. Housiey at 31., fiE'3T'E' RFC 2459, “fi.11iemei X509 .‘t":;:bii.s:i Key i.nfi'astrucmre Ciiertifisme and
`
`1’am::s R@€}(3Ini1‘lE1‘ii0‘fl
`1;-zine;-'
`for
`to the Re-:;'u:2st
`refer
`I
`1
`C0fI'i’S}_)O1:'1di1‘1g}.‘f,?, I wiii rr::'i'er to Agapie inc.
`“the .R.eqm:.<m:r..”
`The Ch€‘fE.ce Actigsn i.ncm*pm7ate;:: me-a.r¥y ail ofthe Request by referemze. For thar rezxsun,
`when I sometimes refer to “the Request,” i am aisu refen’i.11g to me {T31“fic.e Actimi.
`
`“$116 Request” and,
`
`as
`
`Petitioner Apple - Ex. 1052, p. 2
`
`Petitioner Apple - Ex. 1052, p. 2
`
`
`
`Con‘ir«:_u} No; 95.300} 388
`'DE2C’im‘ati.0i‘} rofAng.;e¥e0$ TD. I<Zem1tn}.=t,is, P121).
`
`CR1; .Pmfiie,“" .¥zmu.a1y 1999 {“RFC.': 2459’); and P. K-'1ucka:pet:‘is, ‘I‘ETLF' RFCf H33-—’l_, "'Ds;m13in Names ~
`
`Colxcepis and I?‘ac:iiii:ie5__"‘ Ntwember $98’? {’“RF(§ l03«'1"_1.3
`
`4.
`
`I am familiar with the ilevel of otdixlazjy skill in the an witii respe<:.t re the irwentio:1.s
`
`cftbe ‘S04 patent as of .Fe§:m,mry ’¥
`
`’300(L wlius,-.11t‘|1e a13p¥éca.t§r:sn for the parent ‘T1135 patent was fiied.
`
`Specifica.i§y., based on "1313: review cf the tec%1r1r;l:':g5;'e, the educational {eve} of ac-tire w'c‘ri<crs in the
`
`fieeide and d.;‘zw«§u.1g on 2113:’ own experience, I heiicx-‘e 3 perscen cf 0‘x‘di.n3ry s_ii<i.i'i
`
`in an: 31‘ ihet time
`
`wozild $13.“: had :1 mzistefis degree in. ccsmputer sciezme or computer e11gi.neeri.:1gc, as weeli. as two }-‘ears
`
`of expeerience in cmnputex‘ networkisng with some aecotn.pa:1_ving expos11;‘e to x1ec.\-'o;:‘k .~:er;u.rii3=.
`
`5.
`
`I have been asieeci to consider haw one cf cedixzary skiii
`
`in the art would have
`
`understood the refitrcnccs memigmed abave.
`
`s\-tiy findings are set forth belcw,
`
`.1 I.
`
`Q UAf{.f{Ff{(TATl(}NS
`
`6.
`
`3. have 21 great deaii mfexpericncc and f%.:n1ili_arit}«‘ with c.cm1p1;n:er and i1m*W0l‘]{ :::ec‘mfi.ty,
`
`211113 hen-‘e been w0rk§z1{g in {hie fieiid SHICEE 1?}?}3.
`
`T‘.
`
`i am curremxiy an .»'Xssccia:te Professor of Computer Sc-fence 31 Ccltxxnbia Lhxix-’ersity,
`
`as well as Qirecetcwr of the Un_iversi.ty’s New-=02‘k. Secufitg.-* I4-1 b0ratm.*§.=‘_
`
`I joineezfi eC‘.nl.1.1mbi:~.1 in 2081 as
`
`an Assisiaxlt Pmt"essm‘, after recciix-ting my M.S<:. ami i?h.I3. tiegrees in Computer Science, hath from.
`
`the Lmiexrersixy of Pennsy’lvaz1i:a..
`
`Phi). dissertation work was cm the topic of secure access
`
`contra? ihr distributed systenas and, in particular, an the .manageme.nt cfmtst in distfibutetd. c:_m1;)u.tcr
`
`lletvmfiszs.
`
`8.
`
`I received :11}; BBC. in Cfcxnputer Science from the Unive1‘sitj.-* cf Cirecte, in Cireece, in
`
`1996, During :11}! u.ndergr;1dua.te smdies, ‘I worked as systenr: aciministra.mr in the Ccmpming Center
`
`at the E..?=n.ive1‘sit;¢ cf (fkfete.
`
`Fcailoxa-‘i133; ihfit,
`
`I wmked as new-usik e.:1ginecr at the fiI’stt <:.cn1r11erc-$3.1
`
`"interact Service Provider {"‘ISI"’} in Greece, FO'R‘}‘Hne‘t SA, where I was exposeeéi to xxlany network
`
`security issxzes.
`
`9.
`
`3
`
`h3?\-“B actively participated in the intcmet ElI1gi.:1ecI‘i.:1g T331-: Fcnxe (“IE-TF7},
`
`£1
`
`standarcls-sett.i:ng {may for the intemet, since i 995.
`
`in the iiare 19985 and eagfly 2€}€)0s,
`
`111.5; wark vs-ith
`
`the }ETF was pri.z11ari!y within. me Intcmet Prcmcci Secu.n'ty {""§fPsec‘°} Working Group.
`
`in addi.ticn
`
`3 Although I iistcd dates in these citat.io.n.s, 1 am not testifying ta xx‘-heather a.n},.= ofthcse
`references were aa:.'ruaIi},~' -pubiic§y distributed cm the date listed
`
`Petitioner Apple - Ex. 1052, p. 3
`
`Petitioner Apple - Ex. 1052, p. 3
`
`
`
`Con‘ir«:_r} No; 95.300} 388
`eDeciarati.or:r ref ._>'Mf1gQ3~0S TD. I<Ze:‘01tn}.=t,is, P121).
`
`re ::mm‘ibuti11g to the speeifiearien of the {Fees standards, I wrere the firs: rmplemema.t;i:m of the
`
`‘J:
`I?’h0iu1‘is lazey n.2a1'ragen'1em; pmtecoi. {now RFC 2 .22}.
`
`1 else C~£'}l‘1t.i‘§b'{!’{ii!(§ tn the "first erpen-seuree
`
`.in1;3l.eme.utat.i0n of the ii.ii<.S:'-‘xF.‘v§il’;"Ii1§E. key .managemer1r "protocol for the epen-seuree BSD apereting
`
`system: (msw RFC: 2:109}, and developer} the first such in1p’!en1ent.etimr for the Linux ope:'ati:1g
`
`S_'§.’Sii8l'I'l.
`
`E\-'15; Linux. 1mp¥erne:1tatir3r1, "named Pinto, was adopted by the ’F\‘='ati0r1a‘i irrsfituie of Standmds
`
`and 'I'erc1mef{ogy 1: in 3999.
`
`in addi‘fi0.11, rny ie1r1p'ieme‘m'21ri.r;3r1 of i¥}’se—::< fer the open-source
`
`BSD operating system. is c1r.rrent}.3-= used
`
`mam}; c.empa.n.ies and. gmrerrlmrents e.t‘mm.d. the wot‘i:i, arid
`
`serves as the basis "far se+ver‘ai Cerm31er‘cia.1 products {hat em.pie_x-' C-‘£T,»‘§3t{‘3g_l‘3'§)§1iC e0‘mmr1.n_icattirms.
`
`in
`
`i€¥E¥E§,
`
`I erehrieeted and iniqaiemeniesii
`
`the fixer 0per1—so‘u1‘c.e
`
`fi'a.1rrewor§< for supperr:in;.g. h.arci\:v:2n‘e
`
`CI'j:p‘i.()‘gi‘af3hiC E‘rCC»t2k’1’{1t0I’S.
`
`This;
`
`franrewtsrrr
`
`is 1..lS'r3d
`
`in the open~sor;1rce C3pen.BSD,
`
`.=.\§etBS.{.‘:,
`
`F1'eeEsSD, and Linux. rwgaeratirrg $3.-stems.
`
`s“v1_vwo'I*k in i.rnple.rner1rir.1g' fi1*ev.-ails mu} erher <:=:'y_;7teg1‘aphis::
`
`and networic preteeois has resu3.te<’i in e0.rm.rrerc.ial sf,-‘st'em.s and publications in refereed z:es:‘i1:1ieai
`
`cenferences and academic joumalsr
`
`I.
`
`as Work.r'ng Cétrmrp Seeret.ary‘ fer the IETF Wses:
`
`\&-"e.r§»:.i'ng Group (.’l{){)3 —2‘,{}{}5} and as Sec.um_\; Area Adx~'iser't0Ii1e {iEi'I‘F at ;Ea‘rj._:;e (2003 —?.{3{)8}.
`
`$0.
`
`In x*nys;n;:e1'1're1rt peeiI:iorr er Celu.mbra. Ur1iv'er'srr§»; I work with a large gr0u:;_) of g.ra.d.u.ate
`
`and pestgreduate students in the area er“ ::}.=bez‘eecrrrit;r,
`
`1‘.vi§,-* pas: sru::ier1r.>:; new work in this field as
`
`Lrlrhiersiijr p:‘:3't7ese(3rs, as teci111i2i:£1!i
`
`r'eseare11ers
`
`for reseach i3h0mIm'ies_., or as engineers fer‘
`
`relrecummrmieetiens companies.
`
`I izave received federal, stare, and c-erperate spensorslrrp tr: cendrrct
`
`c§.=berseeuri.t3-' research free: the Department ef Defense, the Naetiorrai Security Agerrey, the Defense
`
`.-’-Xdvsilrced Research P'r0_§ects A§._1',e:1ey' {“D:’-\RPA"L}, the ?~£aIei(m:.1¥ Se.iem:e F()umizzt.ion, the Deparmneirt
`
`efHemela:nd. Secmity, the Air Fer‘ce, the {'}ffie:e for Neva! Research‘ rhe.A:*1r1;,« Research Office, the
`
`Dep§m:mem‘_ e.fr}1e Interior, the 3 Eatienei Re<:en.n.aiesance Officer,
`
`‘z:”Qr=I<; State? Gr_3:_3g,2re, Intel,
`
`(Trace, and omers.
`
`3{I‘l1‘:1}~’tc°:Jt} "year's as it prefessrrr, I have received even‘ 36 1ni‘ilie.n de1%e1‘s to sup-p-or:
`
`my re3earch in Cj.-‘§3El'SBC’t3i‘i€}’-
`
`3 aleo 1'egrrlafly teach ceurses on cy¥::e1'sectu‘iry, in arlriirien tn mere
`
`genera} courses in computer science.
`
`11.
`
`3 hawe published m-‘er 200 tecl1m7c-a§ pagzeers in .re.fereed jeurnels, corzihrences, and
`
`werkshops, 211} ef which are directed re \-'aris3us areas of e}-=berseer;1'it:r.
`
`I lmve {rise authereri a beak,
`
`coauthored a.net3.zer beak, and r:en.tril3ured c¥1.apters for n1z1.nyr.n:he.r brrrrks that reiare re cybe.:‘sec1rri.ty.
`
`Between 1999 and ROM), 1 have rirefier} er codrzzfied e.ighi etandarrds decr1r11e':1*{s their were puhiishedi
`
`Request fer {Ie.r1m1e.nts {"‘R}*‘C.‘s”)r. Severari of ihese }s’.F(eI3 are deireeriy rel.::zted re 1}’ ser:uri.t:r. For
`
`exerrxpie, RFC 6M2 reflexes to t’;f:-.1r:rs'pe.:f1 Ila}»‘e1' secL}_2‘.iry; RFC 5708, RFC 2792, and RFC ;'3?04 relate to
`
`l<;:':y signamre and em:Qd.irrg fer trust i¥1£u1i1ge§I1ei.1i; and RFC 3586 relates m {P ses:r1;r_i*iy policy
`
`Petitioner Apple - Ex. 1052, p. 4
`
`Petitioner Apple - Ex. 1052, p. 4
`
`
`
`Con‘ir«:.u} No; 95.300} .7388
`TDec?i2m-itirm rofAng.;e¥~0$ TD. I<Zem1tn}.=t.is, 912.1).
`
`requirenaents. Aciciitioxxafiy, E am a c.m'.m=entm" on tweh-‘e issueci ‘U18. patems, and have seve:‘a.i other
`
`appiicaiions pending. Most a‘:eft"i1ese patmlts and pending applica.tiu.ns are reiarted in I.::':i;w'mfi«; and
`
`53.-'stt3111s sexturity.
`
`112.
`
`1 have chairefi
`
`s.s~:evem}
`
`intema:tionai
`
`technical
`
`c:r::nfe:*$nces and wo:rI<shops
`
`in
`
`c3,¢‘t1e1‘secL1:‘i£y, inciudingg, '{'o'r €~X21.I3.1'p1s‘:,
`
`"the ’i.t1ten1atim‘1a'i Con.{"er<'c.nce on F.inzu1c.izzl Ck}-=ptog1‘a;7‘f1y and
`
`Data Security {Eff}, A{If:‘vi
`
`(:i)iI}§)‘L21E.t" and C 01xunL:.11ic.ati0n. Sec1:rity' {C(.TS). and the New Sec-uriI:y
`
`Parafiignius Wmkshop SPW}.
`
`I 113»-‘e M50 Sufism-=ed in wet eigh.f§.=‘ 1‘.ec¥mi.c.<.tl. progrzml Vc0n1m.ittees. Fm‘
`
`SBCI1 ex-‘ems.
`
`I~"rom3 2004—2{}}(}. 1 served as A.~‘;snci.ate Iiliim‘ far {ha pre.m.:Ee.r techni.s:ai. _§m:u*na} ms.
`
`03-'beV1'sec:u.:‘ity ---------T-the
`
`AC;’\~{I
`
`'1‘:‘a11.sacti0n.sM on
`
`Infm‘n1zmb;1
`
`and Sysselns
`
`Seszmrity
`
`{TISSECL}.
`
`A.cidition.a}iy,
`
`3 have sen-‘:22? on sex-*e:ra§ ad\=isoz‘_V va-=0.rk..s‘T!1csps to the Utxited.
`
`G=m-=enm1en.t on
`
`c3y=‘ti:ersecL1:‘i iy,
`
`inciuditxg.
`
`€n3.z01.:g
`
`0'ih:s.rs,
`
`the ()ffis:e of the ILh‘.rec—tu.r uf .‘f\‘='atim.1ai Zmeiligetmce
`
`({j5DNfi}:‘Natio;1a.} Sac121‘it3-'5-\ge13c~}= {NSA) Im"itatim1a§ Wwarkshop on {.T::;111pux‘zu;.io1x21l (.i'y‘be:‘se.s:u1‘.fiy in
`
`C.'.on1pmn1ised Enx-=irann3en.fs (C731'.~".f} (20! 3}, the Qffifle a;F‘N£n»-‘al Research {QNRE W'0x‘ksh{3p cm Has:
`
`CO1".t‘i§1U{i8T Secu.1‘.iij_@ ('2{}}{}},
`
`the h1?;eii1gem:e C(T§n.l‘£.1tII.1it}" Te::hn.icAai E.xc.ha‘:.1ge Cm Mex-'.i‘ng 'i."a.t‘get
`
`{Z010}, Lockheed Ma1‘{'in ‘Future Security '£‘hreats Workslaup {?-.009), and t}1e..ARO.f'FS'1‘(? W'cn‘i<;si1op
`
`an insider Attagtk am} Ciyber Sectxrityr.
`
`3n addition in this; m-‘ark,
`
`I have cofimmcied two c.0n1pa.n.ie3 in s:}='he‘rseCL;rity. Una
`
`C0*n1pa1}y, St2:c§cSa.fe
`
`inc.
`
`(f01‘me1'¥y Revive Systexns
`
`‘Inc._}_. was
`
`a. pm\«iidei' {if
`
`{:1 virm2:iize~d.
`
`pre1::mducti«:n1 sta3.;iu.g en\«‘ir0m‘nem. that i1:u:Iudes autmnated testixzg, atxalysis. and repoming fur Y1"
`
`«:)pe.1'aii<ms {:eams.
`
`I was \’-srith this c{}n1_pamy' from its .f’0unding;_g in EGGS untii 2.009. The SE3£'.0l1d
`
`c0=n1pa113~',
`
`.Mhu'e Seciurity 'I‘Veci1z1oEagie$ tjfounded in 2.0‘i{}}, dsevelups d.ece'ption-ibased. smlutimns for
`
`detecting and n1it*iga.t’i.n.g the m.a1ic.imzs cyber~insic.1e.:' t.h.z‘eat, commercializing teclnmlmgy deveioped at
`
`Cohgunbia thrwugfh. DHS and DAR}’A g.raz.z'is and 3 D.-'-‘\.¥{PA SBER contract.
`
`M,
`
`Niy curriculum vitae, which is zuapended to this decla1'a:n'o;1, details 113;; backgromzd
`
`and te<:¥mit:a¥ quaiifi cations. Aiitimugh I. am being cc.3m.pensated. at 131}: :~.:tand.sn‘d rate «ref $5f}f}:'hm1r for
`
`rny work on this decla::fatio'n. tile. (:m3.1'pe:‘1sat.i0z.z in no way-' afiects the siatemants in this deciaraticm.
`
`SH.
`
`BACTKGRO[?N13 OF 'I'HE ’5{}4 Pr-\'l‘TE’NT
`
`ii
`
`Befme: mming to a discussion. 0f the t‘ef‘cret1c.es relied. cm in the Request and. £116
`
`Ch“fi{:e A<:t.ic.m, I summarize my ’understa.n~;3.ing ufcenzxin em.b0ciiments d.iSC1{JSE3d in the ’5f}4 patrzznt.
`
`Generaliy 3pea¥»:ing._.
`
`the "'SG4 paisnt disckzses, amung other things, systems and rnethods fiat
`
`p1‘L$“»=iding a dcmain narne Sen-=ice 3"} for e»s’tabTEish:'n“1g .3! sectm: <:mnmuni::ati(m iiniz.
`
`Petitioner Apple - Ex. 1052, p. 5
`
`Petitioner Apple - Ex. 1052, p. 5
`
`
`
`Con‘ir«:_u} No; 95.300} 388
`TDec?i2m-itirm rofAng.;e¥~0$ TD. I<Zem1tn}.=t,is, P121).
`
`$6.
`
`The "SM patent disczio
`
`VJ5.? U}
`
`sex-reérai embadiments cf 3. domain name sen-‘ice system fur
`
`esta.b1isI'xing a ss':a:fure a:.ommun.icai:im'1 il’ir1£<;, such as a x\*.irtua1_pm«‘231a 1.:etwm‘k{“V”I’N”1} cm.mnun.ica.ii0.n
`
`fink.
`
`in me such elnhudiilaent, 3 um.-'e§._. spec.iaLli2eMci ii}'.=‘*4a' s::~.n-‘er Wceives a.11'aditim1ai
`
`request,
`
`and the
`
`sen-‘er a::.f0nt:atica1§3-= Vacilitates the estab‘!ish1ne:1t of a. secure c.nmnnmica:tio11 link, such
`
`21
`
`“v"P’s’\'s‘ 1'in}:, be'iwee1} a target made and a user.
`
`(‘S04 patent. 39:46-:71.)
`
`'Fh_is spe::.izxi.i:a:ed BN3
`
`sarvex‘
`
`d.i‘ffe2'en{ fmnl 21 canx.-'e13tim1a§. DNS server knaawn at the time of imwsntion for an least the
`
`reasm that the specialized DNS server suppI:::rtsM tin-2 est:.:¥:s§ish.111ent of a. secure c0m.:m1n.icati.on_ iink
`
`b:-‘.3-‘and mereiy retLu‘n.ing a. requested IPadd1‘es:=s or pub§ic
`
`H‘.
`
`For exmr11pie, in the exen1p‘lar$ at‘ FI(}iS. 26 and 2‘? cf the ‘S34 patent, 1‘epr<)du<:ed
`
`beiow, a DNS server 260‘: inci?ud.ing a DNS proxy,» 261.0 s‘L1ppm*ts es:a.blishing a
`
`link beta‘-=ee11 21
`
`cumpuier 3601 and a secwe target site 2604. {Id at 39:6?-41:59.}
`
`
`
`in me e1nbociin1ent, the DNS SE1'\-‘er 3602 receives 3. 8 request for a target site
`
`f1‘orn cm‘1m:;n':er 2603..
`
`(M. at 40:49-52.) The
`
`‘grruxy 2610 deta1‘m'm§*.s w'¥1athe—r 'tE'1eia.:‘gei site
`
`a
`
`sVecm‘e site.
`
`{fin}, at 4033-8, 40:~—‘¥9—5(w.}
`
`If access in a, secure siiie has been requested, the
`
`pm>:.y
`
`2.61 G detennmss whether the cumputer Zzfniil
`
`is authurjzeai ta §:1CC-E358 the site. {Id at 4G;S'.?*S9_} ‘ifso,
`
`the DNS pmxy 263.0 '£ransmi'is 3 n'1assag,e to 5.gai:ek::epe.r 2603 m {’a.c—i‘iita.t'e ‘the’: c.n':a:tim1 ofzx VPN 117111»:
`
`hem-‘ee.t1 C{}§'11put‘.e¥' 26303. and secure target site 2.604.
`
`(Id. as 40:i8—2.4.:}
`
`pm>:y 2610 than
`
`respnnds to the computer’s Z601 DNS request with an a.d.d.:‘ess rec.ei\-‘e+;i from the gatekeepet‘ 26%.
`
`(Kai. at 40: i9«22.:) A secme ‘JPN link is {hen esiabiiished be3i\;x~"es3.1} the c(m1pL:te‘r 2601 and the St*C1iT£E§
`
`-6-
`
`Petitioner Apple - Ex. 1052, p. 6
`
`Petitioner Apple - Ex. 1052, p. 6
`
`
`
`Con‘ir«:_u} No; 95.300} 388
`'DE2C’im‘ati.0i‘} ef 2'\l‘.1gQ3~0S TD. I<Ze:‘01tn}.=t,is, P121).
`
`target site :£6{}4.
`
`{R3, at sH:5—3.} As elmwn in ties e.\:am;:1le€
`
`the specialized D'N'S server sup;:m:'ts
`
`s':reat.in 2: secure camtmzniczatien 3.ink, mi, in e'il1e1‘we:‘ds, does more than‘; a. eem-‘emienai
`
`ee1r‘ve.:‘
`
`at the time of i.m«'ention..
`
`119.
`
`In} fact. the ‘SM patent heighlights this distémttion between the Spe(tiaii::e~d BN3 seam‘
`
`dies':'iosed in its specification and a cerwesxtiorxei
`
`st:-izeme, which IT}€I‘~E‘1}’
`
`reurms 8. requested 1}’
`
`address or pubfiic key:
`
`Com-‘enti_m1a.§ Domiiin s‘~E2un.e Servers {'UNSes‘} previde 3 kmk-u.p fm1ct‘icm that retu.m.s
`the IP address of a requested <:.0n:1pm.e1' or hast. For emmpie, when 2: cemputer user
`types in me web name “‘r'ehoo.c.r.m1,“ the user‘s web hmwser t.rans;mi.ts e reqxleet tie 2;
`DNS, which comerts the name ime El feux‘-pa.rt {P a.d.d1‘ess that is retumed $0 the user’s
`brmx-=se:~_ .
`.
`.
`
`se::.u.re x-:it‘iua‘i p.ri&*:ate .neiv.-‘m‘i<s mm‘ the
`{hie cmweniietmi scheme timt prm=ides;
`intzemet: pr;fo’x-isles the IJNS server w.i’d:1 "the public Ewzeys of the Iuech'i11es that the
`server‘ has the addresses .for.
`'l.‘hiseai’l0wshests1<::‘reu'iex=e aute1.netice1lyfi1e public lceys
`of 23 best that the hes?
`ti} cen1mu.n.ieate wit|1 so that the host can set up a VPN witheut
`liming the user enter the pub§.i<: key of the ciestmattimm host. One ir.npiememaI:i0n of
`this sliatiidard is p.x‘esen‘i!%_y being developed 215 part of the F‘reAeS:"W'.-°.uN ‘projeci {RFC
`3<'2~*sj,_
`
`The eemrentienal sx::her.11e s:1ffe.1‘s fium a:e1‘l:ain d1‘a\x='b::u:1~;s. Far exampie, any1:se‘r can
`perf»:3n31 21 DNS request.
`;\-:’¥0re0's-‘e:‘,
`reqlIeSi.S x‘es0§x~'e to {be male 1-'a_h:e 'for 3.1!
`USER'S.
`
`ACC01‘dinj.{: to certain aspects of the i,m=entio;n, 3 speciaiized ‘BN8 sezrver traps BN3
`requests and, if the request is x‘7ro.n.*s 3 special. type of user
`one For whielr: secure
`cummuniazeation sen-=‘ic:e:s are d&fi¥1E«C§}, the server dues not ‘return the true {P ad<:{ress of
`the target mode, but instead. auton1atic.a.1ly sets up a.vim1a§ private network between the
`I»E1$‘§_£fi3In{}{‘3e and the user.
`
`{if-;:;'. at 39:15.3 .} Compared with 3 com-*entional DNS KBUVV-“.I'i. at the time of the filing ef the ’504
`
`patem,
`
`the speeieiized.
`
`disclosed in the
`
`’SfJ43~ petem‘
`
`smnpperts
`
`e3i:ab¥.ish.ing as
`
`secure
`
`s3U111111Li11§C£lTi0’I} fink.
`
`'I'i1e ciaime of'ti1e 304 patent
`
`21330 clirected to 3 do.m.a‘i.n name semice for
`
`eetablislmzg a. secure c0:nn1unicetim3 link.
`
`(See,
`
`—“:~.“e«:1 pa.ferfi. 55:49-56,’ 57:-»“i8~:"i8Y (;{}:_;3—M_}.
`
`W‘.
`
`REFERENCES CITED AGMNST CLAIWS
`
`36,
`
`Sf}
`
`A.
`
`5’0L-me
`
`20.
`
`{i~e.ue;m11y,
`
`;S’oZarm disuieses e. dex.nain—beseé§
`
`sec-urity arc'i1ite::t11re
`
`fer
`
`Imemet
`
`transactions.
`
`{.‘.s'm'.'a>ea Ab:‘;Lrac.t_, Fig‘ .1.) Regarding
`
`1, 3‘.'£3}‘}T{}dLlCed beiow, S¢‘_}f£1f?£I diecfieses that.
`
`the amlxitecture includes a clirectmy service
`
`{hat ‘izlinds don1ains to their pubiic keys and 3.
`
`Petitioner Apple - Ex. 1052, p. 7
`
`Petitioner Apple - Ex. 1052, p. 7
`
`
`
`CO‘f.1‘iT§_t} No; 95.300} 388
`'DE2C}2i§".-iti.0t‘} t}fAt‘.1gQ¥~0S TD. t<Zem1tn}.=t,is, P121).
`
`tuna} a.ut¥tenttica’tiou. ciatabase (“LA[T”) that mcitxdes the putttlic keys for each 1:nr:i.uci_;:wa‘E witltin a
`
`do1‘x1ai1't.
`
`(Id. at 43.)
`
`SoitI.=m discioses that ea.cl1 s::curit§-' dotnaitl inciudes 2: demzxin key ttolctat‘
`
`{"‘DKi~{“") that stores the key ring of dottzaixt p{lb§iC«:"‘pl'iE-‘.R€€
`
`key pats attd £1 domztin 13tTi1'£ZtE.‘.i‘ system
`
`{“’i')BS’°) that perfomzs various tasks tetated to inter—doma§:1 ctotlaboration,
`
`(Id. at 43-44.} S'uI:::m:r
`
`aisa disciwses u2‘1i.fat‘tn natning infotmatimt
`
`that is used to destignate bath {iotna.itts and
`
`p.t‘.i11ci.p:«3}2§ within domains.
`
`(".13. at 43,} The ԤJ:"<'I 1113}? be
`
`commun t18I‘£1t2., an E——Inaii add:;‘es-3, :31‘ a
`
`network atttttessf‘ {.fd.}
`
`
`Vmtxs
`_
`333% .k~xi>cot3\\:L:a: Liuooe:
`
`mxmm Naming m‘.\~:~_mon'
`\..
`Local Ayazxfizem-:x\--A: :I~.~x&~.-e
`‘:
`.‘w<>>e«ir.»m_t xv: zrt.Y)\,:«v}'2:'r:-.\:».\z:‘
`R
`lbzoaéx Kc} N~:§5o-r
`L:
`3)~‘~$‘§Q-$'\!~1W\‘ot\t at-ch»:-rm
`E85:
`l))<m.'§K 8s\*<'w iwxoa
`
`
`
`
`
`
`
`HMu.”,...,,...W.»........,..,,.............4
`
`. § i
`
`3
`‘
`2
`E
`S
`§
`§
`X
`2
`
`
`
`.-
`e
`\\
`3
`3
`t
`L -was
`,-
`
`x
`n
`.
`S
`_.r'
`\-
`9-1,
`_
`Rcvz,-¢v:o:32;<,?’
`,
`.
`,_,
`‘\ .
`_,-r
`_
`t
`S
`
`;s:‘_,p'>¢.:~'.<-.:~:s*:-.<-.v{§.c-.\\xn-:9.-4-. »§:\\\‘-.-.
`g
`i
`~.......
`~
`\
`§
`
`
`
`,_
`
`
`
`-_'vv~_
`I
`
`21%.
`
`.S’m.‘mm d_iscio:«;es two ti11T.i3f£tt1f.i'V"E!S for ct1tt1t11ttx1icati1i:g between an initiator in a ..<_;mtt'ce
`
`d«:)ma.in and a. t'»aspund»a..t' in 23 destimtimt domain. Utiil. at Figs. 2a and 2b, below.) in the configuratiutt.
`
`reiating to Fig.
`
`the initiator sends a cmnmuni.c.ation 1‘) to a source DES {""S—DtBS""_}.
`
`(Id. at 4:1}
`
`The c.mmt1u:1i<:at.im1 tt1C1'iidES.
`
`z-1 iiiteader that co.nt't.ti_ns a sessiml key and umfettin. _n.at1:1i_ng m_{"c«t‘tna{'ir_st:t
`
`("L‘s'.T‘4il’"]: for the responder, and
`
`et1c.1'ypt:ed with a ‘p‘ubl.ic key 1::-fthe S0!;i1'C€
`
`x:¥+:n11ati.11.
`
`{.I<z'.} The 8--
`
`D83 receives the cmrt1tmm.icati.on, decrfqnts the he:-met‘ txsilxg its p.t‘iv:~.tte key‘,
`
`Ii:-\fi‘.l}CI‘y}3tS the samae
`
`header using the pubitc key of the d:':st‘i11at‘i.m1 dmmtin, anti sezmis the t1'am:actti0n to the destinatitm
`
`DB5 (“D-DiBS”b}.
`
`(1:11 at 45-4t3j} The D-{BBS li3<ew§se extracts the he-adet, finds; the 1:32:31 public key
`
`of the I.’E.’.S§3(3f.'idEt‘ in the LAB, re-encrypts the same header with the respmtder local pubtic ks},-i, and
`
`.tb1‘wat'ds the transactimt to the respm1det‘. (M. at 46.}
`
`Petitioner Apple - Ex. 1052, p. 8
`
`Petitioner Apple - Ex. 1052, p. 8
`
`
`
`Con‘ir«:_u} No; 95.300} 388
`TDec?i2m-itirm rofAng.;e¥~0$ TD. I<Zem1tn}.=t,is, P121).
`
`
`
`22.
`
`"in the cnnfigumtion reiaiing in Fig. 3b, the initiator sends a similar communicatiam
`
`di.res;tt1y to the respandrzr that inciiudes the same header as in the c0nfiVgu_t*aticm. of Fig. 2.3, except t'h:~.1t
`
`the header
`
`EilCl"jr‘}3{f'.’d \-x=-‘ith ‘the desiinatim1 d(n:na.m pllbiixz key.
`
`{I<:{. at 4546.} The resp0nLdLer
`
`forwarck the headm to the L)-JDBS. and the 'D—DBE: sends the hea.d.e.r back.‘ this time e:x+c.1*y;m:ed. with
`
`the respou.d.er kzcal public
`
`{Id}
`
`1.
`
`SaLw:;3 does not disclose 1: dmnaiu :1 arm service s3,-‘stem configu1*e1i in
`store 21 piuraiity 01‘ domain narmzs and currespuntlimlg network addresses.
`
`}l‘
`
`is 1115}? opmiml that Sr)Iam';
`
`tick-is not di.scAk1se3 3 d0.n.1ézu7.n name sen-‘ice system
`
`c0:;1fig;m'ed. to store 3. p;’mra1ity of d.omain names and cmwespumiing netws:sflx' ad<i1'esses5 as recited in
`
`K-"£i‘Fi(}11L-3 {:1-a.in1s of the ‘S04 patent‘. The (3'f.‘fi::e .s=\<:ti0n, by im:.m.';mrz1ting page -'12 cf rthe Reqtxest,
`
`asserts thai f§0}ana’s L§.11i.{’0rm ?’~££u‘31ing h3R1rn1a.itio11 {“UNI”_}_, which .:m1§;" be _puhl.ished ‘in. 3 directory
`
`seewice (’_“’i3S‘”), inciudes both ‘-'3-L‘<!lI}£1il‘1‘I1.EI'£‘;l‘x('3S :311c§<:m‘1‘eSpm1£iing zxetwsm; acichesses.
`
`ii disag1‘ee for the
`
`f3;>1iowi_:1g reasosia
`
`24.
`
`Fi1'st¢ Sc.»’am does not discmse that the D8 stores 3. p1'umE.ity mi‘ donlain namm-.5 and
`
`corrresposnding, network ac3c¥[x<esses.
`
`Instead; S'0z’mm n1e:*e§y discloses that the D8 smres “nanming
`
`i111bn11.al‘i0n. and .
`
`.
`
`. {.te':f:1?i‘icale3 that sec1m:iybi:1d dcninains 1'0 their public
`
`{.S':;ia,=1a 43.) Tlrus,
`
`if EiTI.‘£}"£§1iI}g, S:.2Jcm<;s’s D8 stmes xiaullixig inf0’I‘n1aitim1 1°01‘ dcumlins and cm“?-sspztknciingg pzxbfak‘ &Ie_3--as‘ far
`
`the domains. But Sofarza times ms»? dis-‘muse that the US stores 3 pl.u.raIity of donmin rmmes and.
`
`:1‘o;*re:gn<':;:c;?is1g Refit-wJ;*}c :;:c;?c;fr':;%,m?s,
`
`2:3.
`
`Second, the “‘11aming .iz.zfbI*I1‘1ai:i<‘:u';"’ stored in .-§i‘<;>:’:1rm1’s {BS aiso (Ines mt inciude both
`
`dcsmai.n names amd ('.':‘J‘i"i"<E?.S}?(‘fi}‘I<fi}?g m-22zwor‘Ic
`
`:;r;:FaFn‘:'..s',e::::e.s_
`
`S.<>!c::m:z explains
`
`that
`
`the “n.a:ming
`
`.infom1ati0.n.‘° is stored in the DS in the fawn of wlixich 111a§.<'i.11c}1:de “st comnmn mine, an E~
`
`rnafi afiid1‘es3.. or a r.1etwm‘1~: ac'id'r*essA.°’
`
`(See id.
`
`,empha.sis addvad} Thus, the {,?I\ifi disc-insed by s‘Eir.>Z<:m<::
`
`does net inciude Ema‘: a a:is:nn.ain name and a con‘espond.i;ng :1eiwo:‘§< address.
`
`..
`
`-
`
`Petitioner Apple - Ex. 1052, p. 9
`
`Petitioner Apple - Ex. 1052, p. 9
`
`
`
`Con‘ir«:_u} No; 95.300} 388
`4DecEemti.on ref 2'\l‘.1gQ3~0S TD. I<Zem1tn}.=t,is, P121).
`
`26.
`
`Funthere in
`
`L reprechzeed in part beige-F, S.::.!:;rz»m ciiescleses in greater detaii how
`
`UNIS and c-o1‘1‘es1')m':di11g keys may aise be s'mr«:‘:ui tegemex‘ in the fL..M), e.ne'ther ciatabase sepa:‘a.ie
`
`fimn the D8. But the iLAfi) also does not smre domain names and eo1i:‘es‘po‘nding netwczrk aededresses:
`
`~.. is
`,¢\\\\~~""
`\..?‘
`
`/.v//.r¢.'1ttzttrarznnavwtttnvtnnmnnu/Ammmmm
`
`
`
`X—
`
`.‘.“,.,3—,,..
`
`
`
`I
`5’
`
`{jl<:z'.} The 'L}‘NI.-*’P‘zzb~K tables in Fi;,~'_2,.
`
`E Shm-‘.-‘ how'il1e LAD e.ss0<::iates a E.5I\‘=‘ii Uf e panicuiar pr.inci'pal
`
`with fir} }3¥.i¥3]‘iC1~Z€jr‘.
`
`(Id. at 43-44.) As Shawn, the LEN}
`
`for a eprinciepai in the seuree domain
`
`CQTT~i3‘.-‘«}JQIIdS to public. key "‘a.:=.dfghj,°’ am? the UNI “azb:t:f§§:D" fer a prim:ipa.¥ in the destinatien d:_am.a.in
`
`s':u.rres_;m.m‘ie to pubfisr: keg;-' “;zx«:.x='b1.:."’ (Id. at Fig. 1.} But again, {he UI\‘=‘{ .itse—ifcIc3es net inciude both a
`
`domai..u name and a. c.on'espendi;ug .11etwork address, {Id at 43.} Morem-‘er, the
`
`stored in the
`
`LAD is assc_:<:i:».n‘_ed with 3 pubiiz: .1<ey; and not with e nemrerk‘ 21<icire.ss;:. {Id at Fig. 1.}
`
`27.
`
`Thi2‘d__ one of erdixmzfy ekfii in the art would me: have uI.:dersmm‘i S$‘<'2f.:z':-2.:z".<; D5 to be a
`
`d::smai.n name sen-‘fee systezn, As diseuseseed, »'.S‘m’::;r2:;r’s {'38 stores naming :i.m“-armatioen (TL'.3":\"¥sA} for
`
`domains and ee_ri:i'fic.m.es Eh:-.1t hind these dmnaiue te 'pubiic
`
`But S(1i:;zrm dues net di_sc:iese tliaait
`
`the D8 reeoives dmmzfm namee-------1'e$r.>15vi.x1;;§ cimnain. names into:
`
`if’ aeci;ci.:<esses is omzzide the Scope of
`
`Shfmm,
`
`3.
`
`Salmza does not disclose a demain name service system configureci te
`remix-‘e a query fer a network address.
`
`28,
`
`it is also .211}; 0p.inim1 that S<::!ama:z‘ does not d_isc.h_>se El donimn name serx»-‘ice sysi:em_
`
`c0=;:figL:z'ed. in receive a query for a. network address. The Gffice Acxien adapted pages 42-44 of the
`
`Request, which asserts that this cieim feature is disciosed in three difierem. figures e:FS‘0IL:m.:2r. Fer the
`
`foiiowing, reesens, I disagree with this aseertien.
`
`39,
`
`First, cm1tra.r_¢ te the Request’s assertions, Fi;gure i does net disclose a demain narne
`
`service system configured to receive a query for a network address. TheRequ.est3.sse1‘ts that ,.S"u.€¢:rm:r
`
`“explains that its SECLMQ DNS ezystems are designed to }.mndle the ‘genexic 4h1{'err_1e{' n'ansaen?en"
`
`wi1i.c}2 .
`
`.
`
`. is generated by requests iniiiaied£byt11e twe pri11.ei‘paIs—e-4-[the °ini‘tia:te1" and the ‘1‘es;::ende1*.
`
`(Reg. at 43.) The Request centilmeer "‘[i]11 Figure L the inieaetmsr and the responder entiteies are shown
`
`xtnaking requests that are :-lcted mam": by the
`
`S}-"S‘£f.1fi.'\
`
`tie estabiish an au.{'hem.ic21i:ed and
`
`enc1“;.-‘pied chzmtkei efcmmxmzxiee1ie.ns.” (lei) fiedisag.1‘ee.
`
`-10-
`
`Petitioner Apple - Ex. 1052, p. 10
`
`Petitioner Apple - Ex. 1052, p. 10
`
`
`
`Con‘ir«:_u} No; 95.300} .388
`VDEZCEEEY’.-iti.Gl‘} cf 2'\l‘.1gQ3~0S TD. I<Zem1tn}.=t,is, Phi).
`
`30.
`
`Nothing in 3§§r.>i:Ir:':3 suggests that the identified requests in .§’c.>Ia:ma:; inchide a query for s
`
`Isstxwmk aéiéiress. To "the c::mn‘a1fy, the “requests” semi. fmm the initiatm‘ and reswpondes, discussed in
`
`greater detail beimv with respect to Figs. 23 and 2b, are qa1eI‘iesf0r»§t£{i-*5 st-cn"edh1t‘he BS or the LAIJ.
`
`(B’e.=;.> §_;‘efI2c2‘i"£?1'i:}-’
`
`id. at 4546 {°"'I"he i:n.itiat0r .
`
`.
`
`. issues 3 BS query In .«:.>im=:zm {ms .:2’esIir2c::.i'm:< .-:fi:'m1.<Iir1
`
`,m:h;*.'f::- fc'ey.,” emphasis added.)
`
`{m‘ieed_. Fig.
`
`I ef JS’e:.'c:mc:: discleses an sire-l‘1h:ex:m‘:‘e (F1211; distribzrtes
`
`public keys used to estsbhsh authemiesied aniifer enexypteei ehanneis ---------T-113: an sn:11.hectuu‘e that
`
`receives quefies for :1et‘werk addresses.
`
`3}.
`
`Second, C0?3t3‘a.1‘ytU the Req;u.esi’s sessertiesas. Figure la in S«::«1‘azm dues set disciese 21
`
`domain name services system cm'1figu.1'e<§ in receive a !.}lI€§‘:x;’
`
`for 3. netwmk address. With respect io
`
`Fig. Es, the Request asserts that “the
`
`system
`
`en. requests to determine mztwork sddresses sf
`
`the inhisriol‘ and 2‘espcn'1a'ier p'ri.m:ipaIs."'
`
`(Id. at 44.‘)
`
`"I‘he Request hiss pomts to the three
`
`commu.n.icsat:.irms sh(:swx'1 in
`
`Es. and e:e;J§s.ined en pages 45-46 of Sm.’arm as s‘i1eged.1y ::hss:ieosi‘ng'
`
`these “requests tn determine netwaurk addresses of‘the initi.st‘mfs.m;i.res;:»e13+:iem* prh1ci.psis_.” Uzi’, st 43*
`
`46%.} Agzisins 1 disagrees.
`
`33.
`
`S.<.>h;m.:;s discisses t'l1s:t the first C-0n1.1111micsh'm1 in '§%'i;;. 2.3 is sent frsm. the senses
`
`dmnsin to the S083 and inciiudes “a header c.ont‘ain.ing the session [key ans the UNI of the
`
`respolsdes” amid a §._)s§,>I0a.(i. c0m.s.mi_ng encr§-‘ptetii data (depicted in Fig. 2:1 as "‘.E.;;(D.ATA}”}.
`
`(Soiczna
`
`45.)
`
`"Nothing in Soi¢;:s-m d.eserisbes or suggests that the c-sn1snunicati<:an im:h:.d.es 3 request firs‘ a
`
`netwmk address. Morem-‘er, the reinsimng two caxmnuuieatimtas shmm in Fig. Es ::n.e;re1y invoive
`
`'f«:)1"\-wirdhxg the cummu'I.1ic:ati0n ‘from the S~DBS to the {ILDBS and than .i’1‘»;m1 the IIZFDBS to the
`
`responder.
`
`(Id. at 45-46.} Each of these mmxmmieations inc.ludes the same header containing the
`
`same sessicm Em}: and
`
`ofthe respoz1cler-t?he mziy c,iifference being tlsst the header is sencrypted
`
`with the pu%3h'e key hfthe 'rec:.ipiem d1;:.1‘.iz.zg each c-mmmmis:=sI.ien {ji.e,., the public he hfiile desii11a.*iie11
`
`domain during cmmmmication. 2 and the public key afthe responder during c0m:nun.is:a.tim1 3). {mi}
`
`33.
`
`¥:‘1n1E1e.r., Figure Es dues not d.iscZ.e.se
`
`d.o.nr:;:1i.n name service s3,‘-‘stem c<mfigu.red tn
`
`1‘s::.ei>.-‘e 3 query fo=ra1'1e1:wh1‘1»: address" because when the Request sileges is the claimed donlsin name
`
`service system (..‘.~Ish2r2c2’s DS} class not .1'eee.i\-‘e ihe alleged quen-' for a settworl-2 s::i::h'ess.
`
`Soiamsv
`
`discloses that the c.enf1g1n*s.tims efFig. Es
`
`psrt_ie11iar.1y convenient for p.rim:ipsl.s h.«u:l<;i.ng access {:3
`
`2: glohsfi
`
`(14:17. at 46.} in etfler wards, the D3 ------the a.1§e§}_;ed efiitiillaiii name service system-----
`
`not
`
`.im-*0!»-ed. in the Inethod disclsseci in Fi 221.
`
`34.
`
`T.h.ird, erjsmrsrjg is the R.equest"s sssertinnss Figure 2b dues not [§.SCi{}5_€‘i.’:
`
`21 do-n1ain
`
`11211116 service system cm1.fig1:1‘ed to 1‘eeeix="e a query fat‘ 3 network address. For exsmpie, Soiarza
`
`_;;_
`
`Petitioner Apple - Ex. 1052, p. 11
`
`Petitioner Apple - Ex. 1052, p. 11
`
`
`
`Con‘ir«:_u} No; 95.300} 388
`'DE2C’im‘ati.0i‘} ef 2'\l‘.1gQ3~0S TD. I<Zem1tn}.=t,is, Phi).
`
`expiains that the first commu.u.ic.atjm1 in Fig lb im:¥ud.es the mifiat.o1* generating the same header as
`
`in the firs: ::.0mmzm.iee1:1m'1 in F.ig. 23.
`
`{MA}
`
`T§lti‘.l‘3¢ the i.:1iiiai0r issues 3 “US query ff) (trim-irirz the
`
`.
`.
`.
`J
`desriraaiinrz cfen-min £>1.;b}f(.‘§'aT£:‘}-’ hr }:ea.:;*'er e;-29cm