throbber
IN THE UNITED STATES PATENT AND TRADEMARK OFFICE
`
`In re Inter Partes Reexamination of
`U.S. Patent No. 7,418,504
` Larson et al.
`Issued: August 26, 2008
`For: AGILE NETWORK PROTOCOL FOR
`SECURE COMMUNICATIONS
`USING SECURE DOMAIN NAMES
`
`)
`)
`)
`)
`)
`)
`)
`)
`
`
`COMMENTS BY THIRD PARTY REQUESTER PURSUANT TO 37 C.F.R. § 1.947
`
`
`Control No.: 95/001,788
`Group Art Unit: 3992
`Examiner: Roland Foster
`Confirmation No.: 5823
`
`
`Mail Stop Inter Partes Reexam
`Commissioner for Patents
`P.O. Box 1450
`Alexandria, VA 22313-1450
`Sir:
`On March 29, 20102, Patent Owner filed an overlength response (“Response”) to the
`
`December 29, 2012 Office action (“Office Action”) and a petition under 37 C.F.R. § 1.183
`seeking waiver of the page limit for that response. On May 25, 2012, the Examiner granted
`Patent Owner’s petition, and set the date for a response by the Requestor for 30 days from the
`date of decision, which fell on Sunday June 24, 2012. This response is timely filed on the next
`business day. 35 U.S.C. § 21. Third Party Requester believes that no fee is due in connection
`with the present response. However, any fee required for entry or consideration of this paper
`may be debited from Deposit Account No. 18-1260.
`
`I.
`
`Introduction
`For reasons set forth in detail below, Requestor urges the Examiner to maintain the
`rejections of claims 1-60 set forth in the Office Action. Provided herewith is Declaration of
`Michael Allyn Fratto under 37 C.F.R. § 1.132 (“Fratto”). Pages 1-6 of that declaration response
`to contentions of the Patent Owner regarding the status of Solana, Reed, and several RFC
`publications. Requester submits those pages do not count against the 50-page limit for Response
`under 37 C.F.R § 1.943(b), pursuant to MPEP §2667.
`
`
`
`Petitioner Apple - Ex. 1067, p. 1
`
`

`
`Control No. 95/001,788
`Comments of the Requestor on the Patent Owner Response
`II.
`Response to Patent Owner Contentions on Status of References as Prior Art.
`On pages 5-9 of the Response, Patent Owner argues that there is “no evidence” that the
`
`Solana, Reed, and “RFCs” are prior art under 35 U.S.C. § 102(a) or (b). The Patent Owner’s
`claims border on the frivolous – each of the contested references is unquestionably a printed
`publication, and only by a studied ignorance of the facts can Patent Owner assert otherwise.
`
`Patent Owner grossly misstates Requestor’s burden to establish that the cited publications
`were publicly disseminated. According to Patent Owner, Requestor was required to provide “a
`showing” with “evidence proving” the date each reference was made publically available.
`Response at 6 (citing 37 C.F.R. §11.18). This is plainly incorrect – all that is required is that
`Requester represent that the reference was published. In fact, 37 C.F.R. § 11.18 (the regulation
`patent owner cites) states precisely this – it provides that the submission of a paper by a party is a
`certification that “[t]o the best of the party’s knowledge, information and belief, formed after an
`inquiry reasonable under the circumstances… [t]he allegations and other factual contentions
`have evidentiary support or, if specifically so identified, are likely to have evidentiary support
`after a reasonable opportunity for further investigation or discovery.” 37 CFR 11.18(b)(2)(iii).
`Moreover, In re Wyer, 655 F.2d 221 (C.C.P.A. 1980) (cited by the Patent Owner) did not hold a
`party had to preemptively present evidence to prove public availability. To the contrary, it held
`only that “sufficient proof” as to the publication date must exist. Id. at 226-27. Thus, no
`authority supports Patent Owner’s contention that Requestor was required to present independent
`evidence with its request proving the date of public availability of each reference.
`Regardless, each of Solana, Reed and the RFC documents was publicly disseminated
`
`more than a year before February 15, 2000.1 A reference is publicly accessible if it was
`“disseminated or otherwise made available to the extent that persons interested and ordinarily
`skilled in the subject matter or art exercising reasonable diligence can locate it.” Kyocera
`Wireless Corp. v. Int'l Trade Comm’'n, 545 F.3d 1340, 1350 (2008) (internal quotation marks
`omitted). Each of Solana and Reed was formally published as part of a compilation of technical
`papers originally presented to conferences of experts in network and security techniques. Each
`paper on its face states this, and provides the dates of each conference. Each paper, thus, was
`made publicly available to the relevant public more than year before the effective filing date of
`
`
`1
`The Patent Owner did not contest Requester’s assertions that the effective filing date of
`the ’504 patent is no earlier than February 15, 2000, as set forth on page 10 of the Request.
`
`2
`
`
`Petitioner Apple - Ex. 1067, p. 2
`
`

`
`Control No. 95/001,788
`Comments of the Requestor on the Patent Owner Response
`the ‘504 patent. See e.g., In re Bayer, 568 F.2d 1357, 1361 (C.C. P.A.1978). Patent Owner does
`not seriously contest these facts. Instead, Patent Owner simply contends Requester did not
`present additional evidence with the Request proving that these statements were true. Requester
`had no such burden. Nonetheless, to remove any doubt, Requester presents additional evidence
`in the Declaration of Michael Fratto (“Fratto ”) which conclusively establishes that each of
`Solana and Reed was formally published and distributed years before February 15, 2000.
`Solana was published in a treatise called “Lecture Notes in Computer Science” (LCNS)
`
`by Springer-Verlag in 1998.2 Fratto at ¶9-10. The introduction to this treatise dated in
`December of 1997 indicates that Solana was first presented to the relevant public at a conference
`on networking in April of 1997. Id. at ¶11. As described, LCNS presents “the strictly refereed
`post-workshop proceedings of the 5th International Workshop on Security Protocols, held in
`Paris, France, in April 1997.” Id. at ¶10. Consequently, Solana is a printed publication that was
`made publicly available in 1997, and was formally published no later than 1998.
`Reed indicates that it was first distributed to the public at the 12th Annual Computer
`
`Security Applications Conference in December 1996. As Mr. Fratto explains, under the ACSA
`procedures, Reed would have been made publically available no later than the start date of the
`conference. Fratto at ¶12-13. Mr. Fratto also provides evidence showing the date and time that
`the Reed paper was presented at this conference. Additionally, Mr. Fratto provide evidences
`from the Association of Computing Machinery (ACM) website reporting the citation of the Reed
`paper, demonstrating its public availability. Thus, Reed is a printed publication that was made
`publicly available no later than December of 1996.
`
`Next, Patent Owner challenges the status of several Request for Comment (RFC)
`documents cited in the Request, claiming that “the record is devoid of evidence that any of these
`references are … printed publications as of” each publication date listed on each RFC. This is a
`frivolous challenge. As anyone working in the field of network communications would know,
`RFC documents are published and disseminated to the relevant public by the Internet
`Engineering Task Force (IETF) pursuant to a transparent and well-known process. Under these
`well-known procedures, RFCs are self-authenticating printed publications – each contains
`
`
`2
`Requester notes that the IDS submitted with the Request incorrectly lists the publication
`date of the LCNS treatise as “1997” – the actual publication date was 1998. This distinction has
`no consequence – Solana remains prior art under 35 U.S.C. § 102(b).
`
`3
`
`
`Petitioner Apple - Ex. 1067, p. 3
`
`

`
`Control No. 95/001,788
`Comments of the Requestor on the Patent Owner Response
`verifiable information documenting the date of its public distribution. Specifically: (i) each
`number assigned to an RFC is unique and is not “re-used” if the subject matter in an RFC is
`revised or updated, (ii) the date each RFC is distributed to the public is listed the front page of
`the RFC, (iii) RFCs are distributed to the public over the Internet, via numerous protocols, (iv)
`each RFC is announced via an email distribution list on the date it is released to the public, and
`(v) RFCs are maintained in numerous archives publicly accessible via the Internet. Id. at ¶18-
`22. Indeed, Patent Owner cites several RFCs as publications in the ‘504 disclosure. Given this,
`it is remarkable that Patent Owner can even suggest that RFCs are not publicly disseminated.3
`The evidence, thus, overwhelmingly establishes that Solana, Reed and the various RFCs are
`printed publications applicable as prior art to the ’504 patent claims.
`
`III. The Rejections Of the Claims Were Proper And Should Be Maintained
`A.
`Claim Interpretation
`Claims are given “their broadest reasonable interpretation, consistent with the
`
`specification, in reexamination proceedings.” In re Trans Texas Holding Corp., 498 F.3d 1290,
`1298 (Fed. Cir. 2007). In determining that meaning “it is improper to ‘confin[e] the claims to
`th[e] embodiments’ found in the specification.” Id. at 1299 (quoting Phillips v. AWH Corp., 415
`F.3d 1303, 1323 (Fed. Cir. 2005) (en banc)). While “the specification [should be used] to
`interpret the meaning of a claim,” the PTO cannot “import[] limitations from the specification
`into the claim.” Id. “A patentee may act as its own lexicographer and assign to a term a unique
`definition that is different from its ordinary and customary meaning; however, a patentee must
`clearly express that intent in the written description.” Helmsderfer v. Bobrick Washroom Equip.,
`Inc., 527 F.3d 1379, 1381 (Fed. Cir. 2008) (emphasis added). No such definitions of key claim
`terms is provided in the ’504 patent (i.e., “domain service system”, “secure communication link”,
`“indication”, “supports”, or “supporting”, “connectable” or “enables”).4 Thus, these terms must
`be given their broadest reasonable interpretation in these reexamination proceedings.
`
`
`3
`See, e.g., ’504 patent at page 3 (citing RFCs 2401 and 2543 as “publications”).
`4
`At trial, Patent Owner argued that a “DNS proxy server” is simply “a computer or
`program that responds to a domain name inquiry in place of a DNS.” Ex. A, Markman at 19-20.
`Patent Owner also argued that the phrase “Domain Name Service System” did not need a
`construction but if it did, it was just “a computer system that includes a domain name service
`(DNS).” Id. Patent Owner also asserted the claimed DNS systems did not have to be able to
`
`4
`
`
`Petitioner Apple - Ex. 1067, p. 4
`
`

`
`B.
`
`Control No. 95/001,788
`Comments of the Requestor on the Patent Owner Response
`Response to Patent Owner’s Arguments Regarding the Rejection of Claims
`1-2, 5-6, 8-9, and 14-60 Under 35 U.S.C. § 102(b) based on Solana (Ground
`Nos. 1, 5, 9, 13, 17, 21, 25, 30)
`1.
`Solana Describes the Claimed DNS Systems
`As explained in the Request, Solana describes domain name service systems (“DNS
`
`systems”) that establish secure communication links between an initiator (the source domain)
`and a responder (the destination domain). See Request at 39- 46; see also Declaration of
`Angelos D. Keromytis (“Keromytis”) at ¶ 20-21. Solana also describes that its DNS systems are
`connected to a communication network, store a plurality of domain names and corresponding
`network addresses, receive queries for a network address and comprises an indication that it (i.e.,
`the “domain name service system”) supports establishing secure communication links.
`Consequently, the Office properly found that Solana describes “DNS systems” that anticipate
`independent claims 1, 36 and 60. In response, Patent Owner asserts Solana does not teach DNS
`systems that: (1) “store domain names and corresponding network addresses”; 5 (2) “receive a
`query for network address” or (3) “comprise an indication that the domain name service system
`supports establishing a secure communication link.” Each of these is incorrect.
`a.
`Solana Describes DNS Systems that Store a Plurality of
`Domain Names and Corresponding Network Addresses and
`That Receive Requests for a Network Address
`
`The Office correctly found that Solana discloses both “a domain name service system
`
`configured to . . . store a plurality of domain names and corresponding network addresses” and
`that the system receives requests for a network address. As explained in the Request (see, e.g.,
`Request at 39- 46), Solana describes DNS systems that create domain-to-domain relationships to
`enable principals in different Internet domains to more efficiently and securely conduct “generic”
`Internet transactions. One of the elements of this scheme is the “Directory Service” (DS), which
`Solana explains publishes “naming information” and certificates that “securely bind domains to
`their public keys.” See Solana at 43 (Fig. 1). This published “naming information” is used to
`retrieve public keys associated with and establish secure links between the domains. Logically,
`
`distinguish between secure and unsecure sites. See Id. Patent Owner’s arguments at trial should
`be considered in determining the broadest reasonable construction of the claims.
`5
`The independent claims do not require the DNS system to actually resolve a domain
`name into an IP address – that is an additional step specified in dependent claims (e.g., claim 15).
`Thus, the independent claims only require DNS systems that, inter alia, store domain names and
`corresponding IP addresses.
`
`
`
`5
`
`Petitioner Apple - Ex. 1067, p. 5
`
`

`
`Control No. 95/001,788
`Comments of the Requestor on the Patent Owner Response
`the “naming information” published in the DS must contain at least the domain name of each of
`the domains being managed in this way. Fratto at ¶ 37-45. Solana also explains that the
`“naming information” may optionally include IP addresses associated with principals in a
`domain. See Solana at 43 (explaining that “information [i.e., a UNI consisting of a network
`address] may also be published in the Directory Service.”)6 Thus, Solana describes a DNS
`system comprising a DS that “stores domain names and corresponding network addresses.”
`In response, Patent Owner first argues (incorrectly) that “Solana does not disclose that
`the DS stores a plurality of domain names and corresponding network addresses” and instead
`“merely discloses that the DS stores ‘naming information and … certificates that securely bind
`domains to their public keys.’” Response at 12. This is incorrect, and to assert otherwise, Patent
`Owner and its expert must misrepresent or ignore key teachings of Solana. For example, Dr.
`Keromytis incorrectly states that “Solana explains that the ‘naming information’ is stored in the
`DS in the form of UNIs, which may include a “common name, an E-mail address or a network
`address.” Keromytis at ¶25. This is incorrect –Solana nowhere states that “naming information”
`is stored in the DS in the form of UNIs.7 Instead, Solana states that “naming information” may
`stored in the DS according to “existing naming infrastructures (DNS-sec, X.509)…” (emphasis
`added). To store the “naming information” in a DNS-sec compliant naming infrastructure
`requires the DS to include a DNS server that has incorporated DNS-sec security extensions
`termed “Key Resource Records.”8 Fratto at ¶ 45. Thus, Solana, by stating that “naming
`information” is stored in a DNS-sec compliant infrastructure in the DS, it is indicating that the
`DS necessarily includes a DNS server that maintains domain names and corresponding IP
`addresses and performs DNS name resolution (i.e., the functions of a DNS server). Fratto at ¶
`37-38. Indeed, this is why the DS is depicted as consisting of the multiple servers in Fig. 1 of
`Solana. Thus, the central premise of the Patent Owner’s response – that “naming information”
`
`
`6
`Dr. Keromytis contends the UNI holds only one data element – a common name, an
`email address or a network address – that is uniquely associated with a principal or the domain.
`See Keromytis at ¶ 25.
`7
`Solana explains that data in the UNI alone (i.e., as a single IP address) is stored in
`another location - the Local Authentication Database (LAD), where it is associated in tables in a
`1:1 relationship with the public keys of the principals that the UNIs “globally and unequivocally”
`identify. See Solana at 43.
`8
`This is also consistent with the representation of the DS in Fig. 1 of Solana (p.43) as
`comprising multiple servers.
`
`
`
`6
`
`Petitioner Apple - Ex. 1067, p. 6
`
`

`
`Control No. 95/001,788
`Comments of the Requestor on the Patent Owner Response
`published in the DS only contains a “UNI” (i.e., only an IP address) and the public certificate of
`a domain – is simply false. Fratto at ¶ 39-42.
`Patent Owner’s incorrect reading of Solana is also illogical given the role that “naming
`
`information” plays in the Solana DNS systems. Specifically, Solana shows that “naming
`information” is published in the DS to enable retrieval of public keys associated with secure
`domains needed to establish “domain-to-domain” relationships that are at the heart of the Solana
`scheme. This is done by querying the DS using “naming information” associated with a secure
`domain that allows retrieval of a certificate binding the public key to that domain. Fratto at ¶ 37-
`45. Under Patent Owner’s logic, the only “naming information” that is published in the DS will
`be a “UNI” (i.e., an IP address) but not a domain name. Keromytis at ¶ 25. Yet, as Solana
`clearly states, publishing “network addresses” in the DS is optional – which means that
`frequently the DS will have no “naming information” associated with a domain certificate.
`Solana at 43. Patent Owner’s tortured reading of Solana cannot possibly be correct for at least
`the reason that if “naming information” in DS contain no information that can be used to find the
`public keys of a secure domain, the Solana scheme would be rendered inoperative. Moreover, IP
`addresses, unlike domain names, frequently change, which would require a constant updating of
`the correlations between IP addresses and the public keys of domains, thus calling into question
`the accuracy of the data in the DS. By contrast, a DNS server within the DS can maintain
`associations between IP addresses in a domain and a domain name – perfectly in sync with the
`purpose of “naming information” in the Solana DNS systems.
`Patent Owner also contends that the Solana DNS systems do not receive “requests for a
`network address” required by the independent claims. Like its other assertions about Solana, this
`is incorrect. Solana’s DNS systems receive “requests for a network address” because they act on
`“generic Internet transactions” such as “WWW queries” that inherently contain “a request for a
`network address.” Fratto at ¶ 37-38; Solana at 42. “[I]n considering the disclosure of a
`reference, it is proper to take into account not only specific teachings of the reference but also the
`inferences which one skilled in the art would reasonably be expected to draw therefrom.” In re
`Preda, 401 F.2d 825, 826 (CCPA 1968)”). Here, Patent Owner simply ignores the statements in
`Solana that explain its DNS systems operate in an environment that require them to work within
`existing domain structures at the IP level (e.g., the public Internet structure). Fratto at ¶ 40.; see
`also Solana at p. 40-41 (“…we assume that the criteria to compose domains (for instance,
`
`
`
`
`7
`
`Petitioner Apple - Ex. 1067, p. 7
`
`

`
`Control No. 95/001,788
`Comments of the Requestor on the Patent Owner Response
`according to security or administrative needs) are already established and that a naming
`convention for domains has been defined.”)(emphasis added); see also id. at 42, FN2 (“the term
`“transaction has been preferred to application or service to stress the genericity (levels 4-6 of the
`TCP/IP stack) of the proposed concepts.”) Because Solana’s DNS systems must function in
`these standardized and established schemes, they necessarily receive “a request for a network
`address” when they act on a “generic Internet transaction … such as a WWW query,” Fratto at ¶
`35-37.
`
`The Patent Owner’s analysis is flawed because it assumes, incorrectly, that the claims
`require a particular configuration of components to make up a claimed “DNS system.” Thus,
`Patent Owner improperly (and incorrectly) criticizes Solana because one of the components in
`Solana (i.e., the DS) allegedly does not perform all of the functions recited in the claims. Indeed,
`in its response, Patent Owner consciously ignores features of the Solana DNS systems other than
`the DS that “store domain a plurality of domain names and corresponding network addresses”
`and “receive a query for a network address.” Specifically, as Figure 1 of Solana shows, the
`Solana DNS system receives a WWW query from a principal acting as an initiator. As explained
`above, a WWW query is “a request for a network address” and invariably will include a domain
`name requiring resolution into an IP address. Fratto at ¶ 37-48. In the Solana DNS systems,
`name resolution is performed not only to perform conventional Internet domain navigation
`functions, but also to enable the DBS to retrieve the initiator’s public key from the LAD – as is
`explained plainly at pp. 43-45 of Solana. Solana explains that the DBS is “the active player in
`the domain collaboration” and shows that the DBS receives and acts on requests (i.e., WWW
`queries) from initiators. Fratto at ¶ 38; Solana at Fig 1 (page 43). Being a computer system
`compatible with Internet standards governing communication and domain navigation, the DBS
`must inherently possess DNS name resolution capabilities – whether that resolution is done
`locally or, as is conventional, via a delegated DNS server is irrelevant to the claims, because the
`claims do not require all functions to be integrated into a single computer or process. Indeed,
`consistent with a design that integrates use of conventional DNS servers, Solana explains that its
`DNS systems can include multiple directory servers (i.e., multiple cylinders depicted in Figure 1
`at p. 43). And that this is not expressly stated in the text of Solana is irrelevant – a person of
`ordinary skill in the art would recognize that this is being described in Solana because of the
`context uses (i.e., explaining that its DNS systems handle WWW queries in a way that is
`
`
`
`
`8
`
`Petitioner Apple - Ex. 1067, p. 8
`
`

`
`Control No. 95/001,788
`Comments of the Requestor on the Patent Owner Response
`compatible with Internet protocols). Thus, Solana anticipates claims 1, 36 and 60 because it
`describes DNS systems configured to store a plurality domain names and corresponding network
`addresses, and to receive a query for a network address.
`The Patent Owner advances other incorrect theories about Solana to contest that the
`
`independent claims are anticipated. For example, Patent Owner claims that “requests sent from
`the initiator and responder … are queries for keys stored in the DS or the LAD.” See, e.g.,
`Response at ¶ 13-14. Solana, however, expressly states that requests can be WWW queries,
`which “generic Internet transactions” and inherently present domain names requiring name
`resolution as explained above. Fratto at ¶ 37-45. That an IP address provided in response to
`resolution of a WWW query will also used to retrieve keys needed to set up authenticated and
`encrypted inter-domain communications is thus irrelevant. Patent Owner’s discussion of the
`procedures depicted in Figures 2a and 2b of Solana is similarly flawed and irrelevant. These
`figures are again depicting events that occur after the initial WWW query has been sent by the
`initiator and has been acted upon by the DNS system (e.g., by the DBS). Fratto at ¶ 46. The
`Patent Owner statement, thus, that “the only query issued by the initiator is a query for a public
`key, and not a query for a network address” is thus plainly false, as a WWW query (i.e., the
`request sent by the initiator) inherently includes a request containing a domain name requiring
`resolution into an IP address. Fratto at ¶ 37-38. And, critically, nothing in the claims restricts the
`meaning of “request” to require it to only present a request a network address.
`
`Consequently, the findings of the Examiner that the independent claims are anticipated
`by Solana because the Solana DNS systems store domain names and corresponding IP addresses
`and receive requests for a network address should be maintained.
`b.
`Solana Discloses a Domain Name Service System That Includes
`An Indication That the Domain Name Service System
`Supports Establishing a Secure Communication Link
`
`The Examiner correctly found that Solana discloses “a Domain Name Service System
`
`configured to . . . comprise an indication that the domain name service system supports
`establishing a secure communication link.” Initially, Patent Owner’s responses strain to avoid
`stating what, exactly, constitutes “an indication that the [DNS system] supports establishing a
`secure communication link.” Instead, Patent Owner simply stands by its incorrect position that
`the systems described in Solana are not “DNS systems” and thus, whether they provide the
`required “indication” or not is irrelevant. See, e.g., Response at 15 (“These positions are
`
`9
`
`
`Petitioner Apple - Ex. 1067, p. 9
`
`

`
`Control No. 95/001,788
`Comments of the Requestor on the Patent Owner Response
`incorrect because Solana does not disclose the domain name service system recited in claim 1”).
`Notably, Patent Owner does not argue that Solana’s use of certificates and keys are not
`“indications” which would be understood by a person of ordinary skill to have constituted an
`“indication” required by the claims. Fratto at ¶ 49. Thus, because Solana describes DNS
`systems that provide the “indication” required by the claims, the Examiner’s finding of
`anticipation of claims 1, 36 and 60 was proper and should be maintained.
`
`2.
`Dependent Claims 5, 23, and 47 (Ground Nos. 1, 2, 5, 6)
`The Examiner correctly found that Solana discloses every limitation of dependent claims
`
`5, 23, and 47. In response, Patent Owner argues only that Solana does not disclose a query for a
`network address, and that the other cited references do not remedy that deficiency. Response at
`35. However, as discussed above, Solana discloses that its DNS systems act on WWW queries
`that inherently request network addresses. Fratto at ¶ 37-38. Thus, the Examiner’s rejection of
`these claims as being anticipated by Solana under 35 U.S.C. §102 and as being under §103 based
`on Solana in view of RFC 920 and/or RFC 2504 was proper and should be maintained.
`
`3.
`Dependent Claims 8 and 9 (Ground Nos. 1, 5)
`The Examiner correctly found that Solana discloses that the domain name service is
`
`connectable to a virtual private network. Patent Owner disagrees, arguing Solana only mentions
`the term VPN once in the context of organizations interacting with the Internet through
`restrictive firewalls. Response at 37. But again, Patent Owner fails to consider the teachings of
`Solana as a whole. Solana indisputably discusses the interplay of its system with VPNs. In
`particular, in discussing how its systems manage inter-domain confidentiality, Solana explains:
`The functionality offered by the DBSs in this scheme is often known as secure
`gatewaying. The main advantage of inter-domain confidentiality lies in the fact that
`services may be provided transparently to the parties involved in the transaction. This is
`especially convenient for:
`-
`Organizations having well protected private networks which are mostly concerned
`by securing bulk data exchanges beyond their borders at low management costs.
`See Solana at 45 (emphasis added). This explanation (which Patent Owner ignores) shows that
`the Solana DNS systems interface with and support communications over “private networks”
`(i.e., VPNs), and are thus “connectable” to VPNs. Moreover, the claims impose no requirements
`as to how the DNS systems must be “connectable” to a VPN. Consequently, the Examiner’s
`
`
`
`
`10
`
`Petitioner Apple - Ex. 1067, p. 10
`
`

`
`Control No. 95/001,788
`Comments of the Requestor on the Patent Owner Response
`rejection of claims 8 and 9 as anticipated by Solana, or as being obvious under §103 based on
`Solana in view of RFC 2504 was proper and should be maintained.
`
`4.
`Dependent Claims 16, 17, 27, 33, 40, 41, 51, and 57 (Ground Nos. 1, 5)
`The Examiner correctly found that Solana discloses every limitation of dependent claims
`16, 17, 27, 33, 40, 41, 51, and 57. In rebuttal, Patent Owner only argues that Solana does not
`describe a “domain name service system” and that the other cited references do not remedy that
`deficiency. Response at 41-42. Since Patent Owner’s assertions are incorrect, the Examiner’s
`rejection of these claims as anticipated by Solana, and as being obvious under §103 based on
`Solana in view of RFC 2504 was proper and should be maintained.
`
`5.
`Dependent Claims 18 and 42 (Ground Nos. 1, 5).
`The Examiner correctly found that Solana discloses every limitation of dependent claims
`18 and 42, including that “at least one of the plurality of domain names is reserved for secure
`communication links.” In response, Patent Owner asserts that Solana does not disclose that
`UNIs are used only for secure communications, thus one of the domain names is not “reserved.”
`Response at 45. As explained above, Patent Owner’s characterization of how UNI information is
`stored in the DS is incorrect, and ignores that when stored according to the DNS-sec
`infrastructure will associate security information with domain names. Fratto at ¶ 37. Also, the
`claims do not require that all domain names be used exclusively for secure communications.
`Because Solana describes at least one domain name being used to support secure communication
`links, it shows a domain name being “reserved” for that use. Consequently, the Examiner’s
`rejections of claims 18 and 42 as anticipated by Solana and as obvious under § 103 based on
`Solana in view of RFC 2504 were proper and should be maintained.
`
`6.
`Dependent Claims 24 and 48 (Ground Nos. 1, 2, 5, 6).
`The Examiner correctly found that Solana discloses every limitation of dependent claims
`24 and 48, including the requirement that “at least one of the plurality of domain names
`comprises an indication that the domain name service system supports establishing a secure
`communication link.” Patent Owner disagrees, arguing that the UNI “associated with” a
`certificate does not inherently provide an indication that the domain to which a certificate is
`associated is a “secure” domain. Response at 48. Again, Patent Owner incorrectly describes
`how naming information is published in the DS. Fratto at ¶ 37-45. Also, it ignores that Solana
`
`
`
`
`11
`
`Petitioner Apple - Ex. 1067, p. 11
`
`

`
`Control No. 95/001,788
`Comments of the Requestor on the Patent Owner Response
`teaches that as applied in its scheme the certificates associated with the domains in the DS are
`used to establish authenticated and encrypted communications between domains. They thus,
`“support” establishing a secure communication link as required by claims 24 and 48.
`Consequently, the Examiner’s rejections of these claims as anticipated by Solana, and as being
`obvious under § 103 based on Solana in view of RFC 920 and/or RFC 2504 was proper and
`should be maintained.
`
`7.
`Dependent Claims 26 and 50 (Ground Nos. 1, 5).
`The Examiner correctly found that Solana discloses every limitation of dependent claims
`26 and 50, including that “at least one of the plurality of domain names enables establishment of
`a secure communication link.” Patent Owner disagrees, contending that using a UNI “when”
`establishing a secure communication link does not mean that the UNI “itself” enables the secure
`communications link. Response at 53.

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket