throbber
IN THE. IINITEB STATES PATENT AND TRADEMARK OFFICE
`
`"in re Inner I’m-123 Reexaminaiinn of:
`
`Vietnr [amen et 211.
`
`Centre} Ne; 955001 ”7’88
`
`U. S. I’ni‘ent No 7.4! 8504
`
`Group Art Unit: 3992.
`
`Issued: August 26. ZIJIIS
`
`Examiner: Ruined Foster
`
`Fm: AIIIILE N'E‘I‘WCIRK PRO‘I‘OEIUL FOR SECURE-
`COS-"IIIUNICA’HONS USING SECURE
`
`Cnnfirmininn No. 5833
`
`DOMAIN NAMES
`
`Mail Step iI‘IIE'TI"1:’a:IFI€-S Iiieexem
`Connnissimier for Patents
`Pi). 33m:
`.1450
`
`Alexandria, VA 223 I 3445i}
`
`DECLARATION OF DR. ROBERT DUNHAM S‘HGRT HI.
`
`I Robert {)unnam Sheri. III, deeizn‘e as feiiows:
`
`I.
`
`I naive been the Chief Technology ()i'ii‘icer of Vii‘neIX Inc.
`
`(“\s’imeitX“} since June
`
`2010 and the Chief Scientist ibr Vin'ieis-‘I. since May 2006. Prior in inining \I’imeIX. frem 3994 in
`
`Aprii 3005,
`
`I Ireid various pneitinns including Assistant Vice President anti Division Manager at
`
`Science Appiications Internetienni {lirporinion (“Sr-\IC“). Prior tn SAII::, I worked at ARGO {Denier
`
`‘I‘ecimeiogies hie, Sperry {Ini‘pei‘erie 'I'eehnoingy Center. and Sperry Research Center.
`
`leave a 1311!).
`
`in Eiectrieei Engineering from Purciue University as weii as e .1‘»I.S.in i‘»-I.eriiemnrics and. a. 8.3. in
`
`Electrical Engineering from Virginia Tee i1.
`
`2.
`
`I am one of the named inventnrs of US. I’artenr Ne. 1?in 8504 (“the ”50% patent”),
`
`which I iinderstnnfi is the subject of the abevefiidemified reexamination. proceeding.
`
`I am i‘nmiiiar
`
`with the ’504 entrant. including its ciaime.
`
`3.
`
`Prior re and at the. time ni‘ the invem‘iens claimed in the ’504 parent, there was a
`
`significant and increasing concern with the seeui‘ii}? 0f computer net‘nmrk cemmenieaflon. The
`
`widespread centreciiviry between computers that was ennbied by the swift increase in netwnri; access
`
`in flames and businesses nisn ied in many security breaches as weii as concerns regarding; the safety ni‘
`
`cnnfidentiei infnmietioii sent ever computer networks. This pi‘ebiem received significant attention
`
`{mm the research and {ie‘\-'einpmeni ceilin‘umity. Practice} experience showed that there was: 21 need
`
`for a system that cnnid be easiiy and cerrectiy used to enabie secure enimmmientions, because a
`
`system that made it diffienir fer an end~nser in ennnie secure cnmmuniceriens would iikeiy Iead in 3
`
`Petitioner Apple Inc. - EX. 1053, p. 1
`
`Petitioner Apple Inc. - Ex. 1053, p. 1
`
`

`

`Control No. 95500} £88
`
`loci}: of use or inconect use. The inventions discioeed and claimed in the ’504 patent and other patents
`
`in this family met this need. For instance, tilt? insemions disciosed anti ciiaimet‘i in the €504 patent
`
`include a domain name service for estabiishing secure communication links, As an exampie,
`
`independent ciaim l recites “{a] system for providing a domain name service. for esrebiishirig a secure
`
`crn‘mmmicatioo link, the system comprising} a domain more service system configured a
`
`.
`
`.
`
`to
`
`comprise an indication that
`
`the clonmin Home service: system supports esiablishiog a secure
`
`communication fink.”
`
`(”304 patent S5:49*56.} Dependent oiairo 8 recites that the domain name
`
`service sysiem is eonnectable to a virtusi private network {VPN} through the communication network
`
`and dependent: claim 9 recites that
`
`the vii‘tiiai private oetr-vork is one of a pl'ureliiy of secure
`
`comimmieatioo links in a hierarchy of secure communication links.
`
`("504 patent 56:540} Further,
`
`dependent claim to recites that the “(Imperial name service system is configured to support estaliiisiiirig
`
`a. secure common}:icetioo link between, {a} first location anal {a} second location." {"304 patent 56:40—
`
`43.) As another exampie} cieim ‘2? recites that the domain name seWice system is configured to
`
`enable establishment of a secure communication link between a first ioeation anti a second iocetion
`
`iii‘fllilS'pElFEllliiy to a user at the first iocatioo.
`
`{”504 patent 5?:l3-l6.) The imseotions combine both
`
`esseofose and security aspects without sacrificing one or the other.
`
`4.
`
`As one exampie of the manifestation of the long—felt need? the Defense Advanced
`
`Research Projects Agency (“DARPA”) funded various. research programs to further the science and
`
`technology of inibrmstion assumoce tutti survivability. DARPA programs, such as the “Information
`
`Assurance” and “llynamie Coalitions” programs were iocused on the need to provide essy«to«eii£ibie
`
`secure comimmications.
`
`These proiects received significant
`
`funding to be spent oevelopiog
`
`technologies that could soive this need. For example, one such project eotitleii Next Generation
`
`Internet” received funding in fiscal year l993 of epprosirimteiy‘ $39.3 miilion, in fiscei year l999 of
`
`appronmaieiy $49.5 million, and. in fiscal year 2000 of approximately $40 million.
`
`(fix. 8—1 at
`
`VNETOl‘iElQBGl 319621.} Another program fimried. lo} EARPA, “lilyiisrriic Coalitions," was created
`
`to address the abiiity of the Deparm‘ieot of Defense to quickly and easily enable secure
`
`commmicetioos over the lntemet.
`
`(See, rag Ex. 3—: at 'VNE’YWZ 19244, 2845 298—209, 593, $25.)
`
`5‘
`
`According to DARPA officials at the time “existing group membership protocols
`
`{iliid} not support ilie security needs of milltidimensiooei organizations. The overarching chaileoge
`
`{Wills creating secure groups rapidly This {was a significant issue when countries [woke faced with
`
`so operation that requireld} immediate moltinetionsi attention.” {Ex 8:} at l.) DARPA contracted
`
`with some oi’rhe most skilied organizations in the area. oi‘secured commmiielations in an effim to meet
`
`its security needs (e.g., NA]. Labs, a division 017%}? Security; Network Associates incorporate-tit Les
`
`2
`
`Petitioner Apple Inc. - EX. 1053, p. 2
`
`Petitioner Apple Inc. - Ex. 1053, p. 2
`
`

`

`Control No. 95500} ,?88
`
`Ange‘LlS arid the Miemeieetrenies Center Lii‘Nm‘th Carmina, Research Triangle Park NLmli Carolina,
`
`as w ell as Julius Hopkins Limeiaiw fiziliimere; Northwestern Linn61%31‘9 803W}; and ‘i eridien- PSR
`
`Arlingme, Virginia).
`
`lid. at l.)
`
`in all, mere rlian 15 organizations were reseaiehiiig the 'V‘c'li’lQHS
`
`mmpeneiiis that made up the pmgi‘ams initiated by the Department of Defense. {lei} 'H‘Liwever, name
`
`01 these piesiiuieuq insuwimua came up Wltlla SOlu‘iiOl} Liming the Telexan: Lime flame clese to what
`
`is dlSClflSEfl and claimed in the ’504 patent
`
`{LIL}. ai l4} Thai is; they did 110*; dei-elep a seltitien {1131‘
`
`provided a domain name service for establieliing a secure eeiiiimmieatimi link,
`
`6.
`
`As a second exarn‘iple of the long-felt need for the ii‘iveniiw‘is ef line 7504 patent
`
`liti—Q—“l‘ei, which is a X-‘el'ltm’e Ltepitel fine that
`
`invesis in companies daiv'elepiiig cutting enge
`
`technele0g}, aimed at suppertiiig the United States intelligence emmn'uiiiiy,
`
`including the Central
`
`Intelligence Agency (GA), funded the original (lei-‘elopn'ient (if the teelnmlegr with approxiinaiely
`
`$34 million lfiii—Qii’el‘s willingness to ei'itei‘ him 3 relationgliip with SAIC {the miginal assignee of
`
`the applicatien that led to the ’504 patent) fer the development 0f this teeliimlegy fim’her ei-"iileiieee a.
`
`lei‘igvl‘elt need for teclmelogy that made it easy and convenient to enable secure e0111mm}ieatienx
`
`‘3.
`
`A tliiid example ii as the extent to whiLli SAP:inteiiiellv funded {lie ieseaiLli and
`
`Lleelepiiiem Ql the tLlenlog When l was empleyed at SAIC, its business madel was to sell. hours
`
`to the federal government. SMi was met simcluieLl Lie brim: pieduus to {the market. which typically
`
`requires significant internal investments in research and develepiiient.
`
`iii an avaiege year during the
`
`Llevelepmeiii of the technology that led to the ‘504 patent SAN: weuld spend approximately $2
`
`miiiien an internal research and developn‘ient eflhrte.
`
`In the
`
`arse Of the teleGliw claimed in. the
`
`’504 patent, SAlC invested. $1.7 mi'llimi, which represents eliiiest the entirety of SAXC’S internal
`
`research and development budget for one whole yeai: A technology review committee also Lippmvezl
`
`our team s patent dei‘elepmem el‘l‘mts and costs an an i‘ii‘iL{i‘iing beais s A third party {Casn‘il‘n‘idge
`
`Strategic Managemem Group or CSMG} also SubSlaiitlaieil the value ef‘ilie l3fll‘il‘10l0gyv MQI‘EO‘S-“EE‘, a
`
`significant percentage (if ali ei‘ SALEC’Lpatient Lienelepmem egffims lime focused Lin this iLleLiloL l
`
`unfilei‘sianil that SMC‘ Spent {)l}8~‘illll'tl of its Intel, peiem pi‘fl‘ti‘blii‘i e‘f‘lbns m: our patent pm‘ti’olie at that
`
`time.
`
`8
`
`in fact, as Liemoneii‘atecl iii an article “Linen before the claimed invemiens (if the ’504
`
`patent it was widely i‘eeeeiiized that: pmxicling seLVere remote access in a LAN or Vii-“A wee
`
`exiremely difficult for IT support desks,
`
`(lei; 8—4 at l l
`
`in ilmi time peiiod iemoteaCL 35 was “a
`
`nightmare fer suppm‘t LleleSL Staffers nevei‘ knlelw what. ceiiibii‘iatim‘i of CPU? modem? operating
`
`system and software emifiguieiien they {were} geing Le have to suppi'irt,” and adding the
`
`eemineral,a.il_\xvari-'ailable “TAN Sofiware only made matters worse.
`,,
`3
`
`{322i}
`
`Petitioner Apple Inc. - EX. 1053, p. 3
`
`Petitioner Apple Inc. - Ex. 1053, p. 3
`
`

`

`Control No. 95500} £88
`
`l1
`
`This. article precisely captured the computer and interim: security industry‘s attitude
`
`{CNS-{lid {lie li'azleofflieiween “ilk”: ease of use of a secure system? such as a. VPN system, for the average
`
`computei‘ user and the security that the VPN system provided. The article recognized. that the “ease of
`
`inslallation isn’t always a good thing:
`
`In many case-5* the easier the client is to install, the less secure
`
`it is.” (Ill. a: 2i} 'l’l‘ie claimed inventions oftlie ’Sllc'l patent, which provide a domain name sen-ice for;
`
`eslablisliing 2i secure communication loll»: {for example a ‘VPN communicalien link), combine boili
`
`case of use and security aspects without sacrificing one or the other.
`
`l0.
`
`Moreover, many where before and around the lime cf the inventiox‘is claimed in the
`
`2504 lament have attemptecl
`
`to solve the need of ecsy—lo-ese methods of enabling secure
`
`communications over the lntcmet. But, 35 discussed above, many of {liege attempts have failecl. For
`
`example despi'le ii'westing enormous amounts of money and enlisting the resources of numerous.
`
`prestigious insiituiions and their ialezitetl employees DARPA’S projects still fell for short of the
`
`claimed inventions Mike ”504 patent. {See “E $5, mpmj
`
`l l
`
`Additionally; as discussed above, no one had yet achieved the results ol‘tlie claimed
`
`inventions of {he ’Sllsl patent in that time period, because remote access was "a niglii‘mai‘e” for support
`
`desks to handle, and adding the cmmncrcialunavailable VPN wile-“arc was even more clifficuli.
`
`in.
`
`feel? al {his time, {he secm‘ll‘y industry generally viewed ease of use and VPN security as minimally
`
`exclusive,
`
`(Size “ 8—9, were} By providing a domain name service for establishing a secure
`
`communication link, the inventions ol’lhc ’384 paiem provided a system fin“ easily establishing secure
`
`coum‘mnication links without: sacrificing security, ihereb}! succeeding where others .l'i’iiled.
`
`l2.
`
`The claimed. inventioos of the "504 patent. have been commercially successfull for
`
`example, through the licensing revenues the}? have generated for VimelX.
`
`in luly 20(th SafeNet a
`
`leacling provider of internal security technology that is the cle facts standard in the VPN' industry,
`
`entered. into a portfolio license with SAEC‘. to incorporate features into Sal‘eNetls underlying \r'l’Ns.
`
`Sal‘cht licensed the patents because ol‘fealures disclosed and claimed in the patents, including those
`
`in the ’504 patent
`
`lx-ilicmsol‘t has also entered into a. similar: license {list includes the "filial potent.
`
`'ll-licrosoll entered into its license will} Vimetffii after it was found to have infi‘ingecl two other Violet};
`
`patents in the some lizmily, resulting in. a damages award ofowr one hundred million dollars, leading
`
`ultimalely to a license agreement of'lwo hundred million dollars.
`
`l3.
`
`The claimed *ii’ii-‘iziilrions of the 1504 pate‘ni were also contrary to the accepted wisdom
`
`in: the. time of tilt} inventions. For example, them: was a general uncietstamliog that reliable security
`
`could only be achieved through di'l’ficult—to-pnwision \PNs and easy—m-set~up c-i'iririeclioiis coulcl not
`
`lie secure. This belief was reinforced by the ll‘ offices of many large companies and institutions,
`
`4
`
`Petitioner Apple Inc. - EX. 1053, p. 4
`
`Petitioner Apple Inc. - Ex. 1053, p. 4
`
`

`

`Control No. 95500} ,?88
`
`whose iivelihood depended en the need for highiymtraineo. speeiaiisis to arrange secure network
`
`ccmnectioos.
`
`H.
`
`The industry had long accepted as a fact that secure systems, such as VPN systems.~
`
`would be difficult
`
`to set up, and.
`
`the secure communication modes eou‘id not be easily and.
`
`ca‘mvenimtly enableo in 2: i999 ai't'ieie entitled “CE-Os Chew the VPN Fat“ that predicted What the
`
`future heid for the start—up companies that deveiope‘d \I’\\ the wish iist (iid not even address the type
`
`of solutions provified by the ’504 patent: such as a domain name service for establishing secure
`
`cox‘lmiuoieation links. (Ex. 13-5 at 1—2.)
`
`ES.
`
`The teciii'lology of the ’304 patent was aiso met wish skepticism by those skiiled in
`
`the am who ieamed of our inventions. Semi Saydjafi, a. program manager for HARPER? infomied
`
`Edmund Monger, a oo-im—‘entor of the *504 patent, than. our ieeimoiogy would never be adopted.
`
`foriioreovei; the IT offices of 1,113,113 iarge companies anti instituiioos expressed skepticism that: secure
`
`connections couid ever be enabied easily-‘13}? regular computer users
`
`it“?
`
`Severai eveois aiso deii‘ioi‘isti‘aiie praise for the im-eniioos in {the T504 patent by those
`
`in the field As dismissed above, SAiC invested a dispropo‘i‘tioiiat'eiy iai‘ge pei‘eemage of its iniei‘na}
`
`resources in the teehuoiogy SafeNei and Microsofi: have both iiceiised the technology of the 3&4
`
`patent A stuéy done by CSMG also praised. {he inventioiis. Jim limit at Network Soiutiona \x-‘hich
`
`was acquired £33 Verisign, praised. and expressed significant interest in the technology and wouid have
`
`,iiwesieo but for a change in circumstances at his company.
`
`i?
`
`i deoiare {halt ail staliei‘nems made herein of my own kuowiedge are {me and that ail
`
`statements made on information and belief are believed to be true and further, that these statements
`
`were made with the knowiedge that x-viliful faise statements anti the like so made are punishable by
`
`fine or in‘lprismimen'i, or both, under Section 200} offii‘iiie is ofthe United States Code; one} that such
`
`wi‘iifiil faise statements may jeopardize the validity of the ’304 patent,
`
`Dated: March 293 2012.
`
`33*:
`
`i'Rohei‘t Duilham Short 111:"
`
`Robert Dimham Shim Hi
`
`‘Jj
`
`Petitioner Apple Inc. - EX. 1053, p. 5
`
`Petitioner Apple Inc. - Ex. 1053, p. 5
`
`

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket