`
`——
`
`Filing Date:
`
`T'tle °f Inventwn‘
`
`METHOD FOR ESTABLISHING SECURE COMMUNICATION LINK BETWEEN
`COMPUTERS OF VIRTUAL PRIVATE NETWORK
`
`_—
`
`inter partes reexam FIIIng Fees
`
`Description
`
`Fee Code
`
`Quantity
`
`Sub-Total in
`
`USD($)
`
`
`
`Basic Filing:
`
`Miscellaneous-Filing
`
`Patent Appeals-and-lnterference:
`
`Post-Al|owance-and-Post-lssuance:
`
`Extension-of—Time:
`
`Petitioner Apple Inc. — Exhibit 1023, p. 1
`
`Petitioner Apple Inc. - Exhibit 1023, p. 1
`
`
`
`Miscellaneous:
`
`8800
`
`Total in USD (5)
`
`Petitioner Apple Inc. — Exhibit 1023, p. 2
`
`Petitioner Apple Inc. - Exhibit 1023, p. 2
`
`
`
`Electronic Acknowledgement Receipt
`
`“—
`
`——
`
`T'tle °f Inventwn‘
`
`METHOD FOR ESTABLISHING SECURE COMMUNICATION LINK BETWEEN
`COMPUTERS OF VIRTUAL PRIVATE NETWORK
`
`
`
`——
`
`——
`
`Payment information:
`
`yes—
`Submitted with Payment
`
`Charge any Additional Fees required under 37 C.F.R. Section 1.17 (Patent application and reexamination processing fees)
`
`— T
`
`he Director of the USPTO is hereby authorized to charge indicated fees and credit any overpayment as follows:
`
`Charge any Additional Fees required under 37 C.F.R. Section 1.16 (National application filing, search, and examination fees)
`
`Petitioner Apple Inc. — Exhibit 1023, p. 3
`
`Petitioner Apple Inc. - Exhibit 1023, p. 3
`
`
`
`Charge any Additional Fees required under 37 C.F.R. Section 1.19 (Document supply fees)
`
`Charge any Additional Fees required under 37 C.F.R. Section 1.20 (Post Issuance fees)
`
`Charge any Additional Fees required under 37 C. F. R. Section 1. 21 (Miscellaneous fees and charges)
`
`.
`
`.
`
`File Size(Bytes)/
`
`Multi
`
`Pages
`
`NPL Documents
`
`Exhibit1Larson.pdf
`
`4244893
`
`9b62e67b2e288c2444923b8b039cdb5dcd
`979e58
`
`NPL Documents
`
`Exhibit2AventailConnectAd min
`Guide31.pdf
`
`622865
`
`8e07ec55b404a1379f3b321717a6b32c242
`b273f
`
`NPL Documents
`
`Exhibit3VirtualPrivateNetworki
`ngAnOverview.pdf
`
`1149224
`
`0242245ead3aa2adffd6065473a68b1e7e7
`anca
`
`File Listing:
`
`Document
`
`Information:
`
`Information:
`
`Information:
`
`Information:
`
`Information:
`
`Information:
`
`
`
`NPL Documents
`
`Exhibit4RFC1035.pdf
`
`13c7f89f3ac478d680feedbb39ca193a76be
`09d4
`
`NPL Documents
`
`Exhibit7GalvinPublicKeyDistrib
`utionwithSecure.pdf
`
`602f424067b8e2f6fa24f9a84d6b36277b05
`0998
`
`956965
`
`NPL Documents
`
`Exhibit8aGauntletFirewallforWi
`ndowsNTAdmin.pdf
`
`21350755
`
`603d7d4e94e2fl36cd62cf723521c1fc31be0
`5f2d
`
`NPL Documents
`
`Exhibit1OInstallingConfiguring
`andUsingPPTP.pdf
`
`ed4fda47368b292551eaQbeZOfc23c1ZaSS
`b7784
`
`2428789
`
`NPL Documents
`
`Exhibit11BuildingaMicrosoftVP
`NAComprehensiveCollection.
`
`23764386
`
`363ed
`09d54486aaf273a32e9a700ecd0c3ae32cb
`
`Petitioner Apple Inc. — Exhibit 1023, p. 4
`
`Petitioner Apple Inc. - Exhibit 1023, p. 4
`
`
`
`NPL Documents
`
`.
`.
`.
`Exhlblt14NotlceofA||owance48
`6.pdf
`
`438608
`
`3039337f4202dbb95770dc7e16f9bf4e6281
`1314
`
`NPL Documents
`
`Exhibit9.pdf
`
`8264306
`
`52ce8cb87c3265139426c80c16cb85c6033
`31563
`
`NPL Documents
`
`Exhibit8bGauntletFirewallforWi
`ndowsNTAdmin.pdf
`
`19719372
`
`9d90037358c6551b568d3ffbeb0db739564
`(8011
`
`NPL Documents
`
`ExhibitSBuiIdingaMicrosoftVPN
`
`6cf3308964b9f93791ddb9b56353878ced6
`3d677
`
`23778793
`
`NPL Documents
`
`ExhibitSKosiurBuildingandMan
`agingVPNs2.pdf
`
`04d835135bc2b9440b32190ce3600517139
`3307138
`
`11662304
`
`Information:
`
`Information:
`
`Information:
`
`Information:
`
`Information:
`
`Information:
`
`Information:
`
`Information:
`
`Information:
`
`
`
`.
`.
`.
`Exhlblt6KaufmanImplementlng
`IPsec1.pdf
`
`NPL Documents
`
`14401558
`
`11d6f856b09bdf26355c1c03c51632d04b2
`584d7
`
`NPL Documents
`
`.
`.
`.
`Exhlblt6KaufmanImplementlng
`|Psec2.pdf
`
`10427650
`
`7553db793e8104d3b359c5c50332123139 a
`
`NPL Documents
`
`Exhibit12$B08.pdf
`
`296349
`
`14ddd82198805663331e3d7ef6406725280
`830db
`
`NPL Documents
`
`.
`.
`.
`.
`Exhlblt13CIaImConstructIonOr
`der.pdf
`
`3809824
`
`e1502e14d91261820fd2e83bf322fbe320e3
`2384
`
`Petitioner Apple Inc. — Exhibit 1023, p. 5
`
`Petitioner Apple Inc. - Exhibit 1023, p. 5
`
`
`
`NPL Documents
`
`.
`.
`AppA180CIaImChartAventaII.
`
`3372015
`
`a81cf8bd089146dc2a198a36fc6b378e485 I
`
`NPL Documents
`
`.
`.
`AppB180CIaImChartVPNOverVI
`ewRFC1035.pdf
`
`3070716
`
`3e4bf5fc7c25442ed9858cad77fba3364bac
`c5b0
`
`NPL Documents
`
`AppC180C|aimChartKosiur.pdf b96ea6cdf6f8fee18b487b60b45a06f25e61
`3383
`
`2040813
`
`NPL Documents
`
`.
`AppD180CIaImChartKaufman.
`
`2284985
`
`(66841f9c4134e7d4834be3032bfe53e891a
`
`Information:
`
`Information:
`
`Information:
`
`Information:
`
`Information:
`
`Information:
`
`Information:
`
`Information:
`
`Information:
`
`
`
`NPL Documents
`
`.
`AppE180CIaImChartKaufmanG
`alvin.pdf
`
`2350205
`
`d7836d5d1d3b4d63580725599f0e0280d9
`e271 b1
`
`NPL Documents
`
`.
`AppF180CIaImChartGaunt|et.
`
`2046277
`
`d4de413ae130c4409bbd38aS3f032ec6188
`47ff3
`
`NPL Documents
`
`.
`AppG180CIaImChartHandsOn|
`nstallingNT.pdf
`
`2561466
`
`190f81e55c88275583d3851e32bdc432116
`1 1 aad
`
`NPL Documents
`
`.
`.
`AppH180CIaImChartMIcrosoftV
`PN.pdf
`
`872923
`
`211f7dcf33676256c78881238103cd1c9917
`8654
`
`..
`.
`Recelpt of Orlglnal Inter Partes Reexam
`Request
`
`6348049
`
`Reqforreexam180patent.pdf
`
`84f78dac47c46e549991a7ed096ec7a925c
`131439
`
`Petitioner Apple Inc. — Exhibit 1023, p. 6
`
`Petitioner Apple Inc. - Exhibit 1023, p. 6
`
`
`
`Information:
`
`Information:
`
`Miscellaneous Incoming Letter
`
`121 CertificateofServices.pdf
`
`150623
`
`74c37d1I7c3dl7145d9986ced73a8cfb850
`79985
`
`Fee Worksheet (PTO-875)
`
`fee-info.pdf
`
`f864f7395f4d4825244f74b6b6a8070b905a
`d6f‘2
`
`
`
`New International Application Filed with the USPTO as a Receiving Office
`lfa new international application is being filed and the international application includes the necessary components for
`an international filing date (see PCT Article 11 and MPEP 1810), a Notification of the International Application Number
`and ofthe International Filing Date (Form PCT/RO/105) will be issued in due course, subject to prescriptions concerning
`national security, and the date shown on this Acknowledgement Receipt will establish the international filing date of
`the application.
`
`This Acknowledgement Receipt evidences receipt on the noted date by the USPTO ofthe indicated documents,
`characterized by the applicant, and including page counts, where applicable. It serves as evidence of receipt similar to a
`Post Card, as described in MPEP 503.
`
`New Applications Under 35 U.S.C. 111
`lfa new application is being filed and the application includes the necessary components for a filing date (see 37 CFR
`1.53(b)—(d) and MPEP 506), a Filing Receipt (37 CFR 1.54) will be issued in due course and the date shown on this
`Acknowledgement Receipt will establish the filing date of the application.
`
`National Stage of an International Application under 35 U.S.C. 371
`lfa timely submission to enter the national stage of an international application is compliant with the conditions of 35
`U.S.C. 371 and other applicable requirements a Form PCT/DO/EO/903 indicating acceptance of the application as a
`national stage submission under 35 U.S.C. 371 will be issued in addition to the Filing Receipt, in due course.
`
`Petitioner Apple Inc. — Exhibit 1023, p. 7
`
`Petitioner Apple Inc. - Exhibit 1023, p. 7
`
`
`
`Request for Reexamination of 7,188,180
`
`Exhibit 1
`
`US. Patent No. 7,188,180
`
`Petitioner Apple Inc. — Exhibit 1023, p. 8
`
`Petitioner Apple Inc. - Exhibit 1023, p. 8
`
`
`
`US007188180B2
`
`(12) United States Patent
`US 7,188,180 B2
`(10) Patent No.:
`Larson et al.
`(45) Date of Patent:
`Mar. 6, 2007
`
`(54)
`
`(75)
`
`METHOD FOR ESTABLISHING SECURE
`COMMUNICATION LINK BETWEEN
`COMPUTERS OF VIRTUAL PRIVATE
`NETWORK
`
`Inventors: Victor Larson, Fairfax, VA (US);
`Robert Durham Short, III, Leesburg,
`VA (US); Edmund Colby Munger,
`Crownsville, MD (US); Michael
`Williamson, South Riding, VA (US)
`
`(73)
`
`Assignee: VimetX, Inc., Scotts Valley, CA (US)
`
`(*)
`
`Notice:
`
`Subject to any disclaimer, the term of this
`patent is extended or adjusted under 35
`U.S.C. 154(b) by 413 days.
`
`(21)
`
`Appl. No.: 10/702,486
`
`(22)
`
`Filed:
`
`Nov. 7, 2003
`
`(65)
`
`(60)
`
`(60)
`
`(51)
`
`(52)
`(58)
`
`Prior Publication Data
`
`US 2004/0107285 A1
`
`Jun. 3, 2004
`
`Related US. Application Data
`
`Division of application No. 09/558,209, filed on Apr.
`26, 2000, now abandoned, which is a continuation-
`in-part of application No. 09/504,783, filed on Feb.
`15, 2000, now Pat. No. 6,502,135, which is a con-
`tinuation-in-part of application No. 09/429,643, filed
`on Oct. 29, 1999, now Pat. No. 7,010,604.
`
`Provisional application No. 60/137,704, filed on Jun.
`7, 1999, provisional application No. 60/106,261, filed
`on Oct. 30, 1998.
`
`Int. Cl.
`
`(2006.01)
`G06F 15/173
`US. Cl.
`....................................... 709/227; 709/228
`Field of Classification Search ........ 709/2257229,
`709/245
`
`(56)
`
`References Cited
`U.S. PATENT DOCUMENTS
`
`4,933,846 A
`5,341,426 A
`5,588,060 A
`5,689,566 A
`
`6/1990 Humphrey et a1.
`8/1994 Barney et a1.
`12/1996 Aziz
`11/1997 Nguyen
`
`(Continued)
`FOREIGN PATENT DOCUMENTS
`
`DE
`
`199 24 575
`
`12/1999
`
`(Continued)
`OTHER PUBLICATIONS
`
`Search Report (dated Jun. 18, 2002), International Application No.
`PCT/US01/13260.
`
`(Continued)
`
`Primary ExamineriKrisna Lim
`(74) Attorney, Agent, or FirmiBanner & Witcoff, Ltd.
`
`(57)
`
`ABSTRACT
`
`A technique is disclosed for establishing a secure commu-
`nication link between a first computer and a second com-
`puter over a computer network. Initially, a secure commu-
`nication mode of communication is enabled at a first
`
`computer without a user entering any cryptographic infor-
`mation for establishing the secure communication mode of
`communication. Then, a secure communication link is estab-
`lished between the first computer and a second computer
`over a computer network based on the enabled secure
`communication mode of communication. The secure com-
`
`munication link is a virtual private network communication
`link over the computer network in which one or more data
`values that vary according to a pseudo-random sequence are
`inserted into each data packet.
`
`See application file for complete search history.
`
`41 Claims, 40 Drawing Sheets
`
`RECEIVE
`FORTARGET SITE
`DNS REQUEST
`
`ACCESS TO
`SECURE SITE
`REQUESTED?
`
`USER
`AUTHORIZED T0
`CONNECT?
`
`am
`
`2701
`
`2705
`
`TARGETSITE
`
`2700
`\
`PASSTHRU
`REQUESTTO
`DNS SERVER
`
`\
`
`2705
`
`RETURN
`”HOST UNKNOWN"
`ERROR
`I_—
`
`
`
`Petitioner Apple Inc. — Exhibit 1023, p. 9
`
`Petitioner Apple Inc. - Exhibit 1023, p. 9
`
`
`
`US 7,188,180 B2
`
`Page 2
`
`U.S. PATENT DOCUMENTS
`
`5,787,172 A
`5,796,942 A
`5,805,801 A
`5,842,040 A
`5,870,610 A
`5,878,231 A
`5,892,903 A
`5,898,830 A
`5,905,859 A
`6,006,259 A
`6,016,318 A
`6,052,788 A
`6,079,020 A
`6,092,200 A
`6,119,171 A
`6,119,234 A
`6,158,011 A
`6,178,409 B1
`6,178,505 B1
`6,226,751 B1
`6,243,749 B1
`6,256,671 B1 *
`6,286,047 B1
`6,330,562 B1
`6,332,158 B1
`6,353,614 B1
`
`7/1998 Arnold
`8/1998 Esbensen
`9/1998 Holloway et al.
`11/1998 Hughes et al.
`2/1999 Beyda et al.
`3/1999 Baehr et a1.
`4/1999 Klaus
`4/1999 Wesinger, Jr. et al.
`5/1999 Holloway et al.
`12/1999 Adelman et al.
`1/2000 Tomoike
`4/2000 Wesinger, Jr. et al.
`6/2000 Liu
`7/2000 Muniyappa et al.
`9/2000 Alkhatib ..................... 709/245
`9/2000 Aziz et a1.
`.................... 726/11
`12/2000 Chen et al.
`1/2001 Weber et al.
`1/2001 Schneider et al.
`5/2001 Arrow et al.
`6/2001 Sitaraman et al.
`.......... 709/227
`7/2001 Strentzsch et al.
`9/2001 Ramanathan et a1.
`12/2001 Boden et al.
`12/2001 Risley et al.
`3/2002 Borella et al.
`
`FOREIGN PATENT DOCUMENTS
`
`EP
`EP
`EP
`EP
`EP
`GB
`GB
`GB
`WO
`W0
`W0
`W0
`W0
`W0
`W0
`
`0 814 589
`0 814 589 A
`0 838 930
`0 838 930 A
`0 858 189
`2 317 792
`2 317 792 A
`2 334 181 A
`9827783 A
`WO 98/27783
`W0 98 55930
`W0 98 59470
`W0 99 38081
`W0 99 48303
`W0 01 50688
`
`12/1997
`12/1997
`4/1998
`4/1998
`8/1998
`4/1998
`4/1998
`8/1999
`6/1998
`6/1998
`12/1998
`12/1998
`7/1999
`9/1999
`7/2001
`
`
`
`OTHER PUBLICATIONS
`
`Search Report (dated Jun. 28, 2002), International Application No.
`PCT/US01/13261.
`Donald E. Eastlake, “Domain Name System Security Extensions”,
`DNS Security Working Group, Apr. 1998, 51 pages.
`D. B. Chapman et al., “Building Internet Firewalls”, Nov. 1995, pp.
`278-297 and pp. 351-375.
`P. Srisuresh et al., “DNS extensions to Network Address Transla-
`tors”, Jul. 1998, 27 pages.
`Laurie Wells, “Security Icon”, Oct. 19, 1998, 1 page.
`W. Stallings, “Cryptography And Network Security”, 2nd Edition,
`Chapter 13, IP Security, Jun. 8, 1998, pp. 399-440.
`
`W. Stallings, “New Cryptography and Network Security Book”,
`Jun. 8, 1998, 3 pages.
`Fasbender, Kesdogan, and Kubitz: “Variable and Scalable Security:
`Protection of Location Information in Mobile IP”, IEEE publica-
`tion, 1996, pp. 963-967.
`Search Report (dated Aug. 20, 2002), International Application No.
`PCT/US01/04340.
`Search Report (dated Aug. 23, 2002), International Application No.
`PCT/US01/13260.
`Shree Murthy et al., “Congestion-Oriented Shortest Multipath Rout-
`ing”, Proceedings of IEEE INFOCOM, 1996, pp. 1028-1036.
`Jim Jones et al., “Distributed Denial of Service Attacks: Defenses”,
`Global Integrity Corporation, 2000, pp. 1-14.
`James E. Bellaire, “New Statement of RulesiNaming Internet
`Domains”, Internet Newsgroup, Jul. 30, 1995, 1 page.
`D. Clark, “US Calls for Private Domain-Name System”, Computer,
`IEEE Computer Society, Aug. 1, 1998, pp. 22-25.
`August Bequai, “Balancing Legal Concerns Over Crime and Secu-
`rity in Cyberspace”, Computer & Security, vol. 17, No. 4, 1998, pp.
`293-298.
`Rich Winkel, “CAQ: Networking With Spooks: The NET & The
`Control Of Information”, Internet Newsgroup, Jun. 21, 1997, 4
`pages.
`Linux FreeS/WAN Index File, printed from http://liberty.freeswan.
`org/freeswanitrees/freeswan-1.3/doc/on Feb. 21, 2002, 3 Pages.
`J. Gilmore, “Swan: Securing the Internet against Wiretapping”,
`printed from http://liberty.freeswan.org/freeswanitrees/freeswan-
`1.3/doc/rationale.html on Feb. 21, 2002, 4 pages.
`Glossary for the Linux FreeS/WAN project, printed from http://
`liberty.freeswan.org/freeswanitrees/freeswan-1 .3/doc/glossary.
`html on Feb. 21, 2002, 25 pages.
`Alan 0. Frier et al., “The SSL Protocol Version 3.0”, Nov. 18, 1996,
`printed from http://www.netscape.com/eng/ss13/draft302.txt on
`Feb. 4, 2002, 56 pages.
`Search Report (dated Oct. 7, 2002), International Application No.
`PCT/US01/13261.
`F. Halsall, “Data Communications, Computer Networks And Open
`Systems”, Chapter 4, Protocol Basics, 1996, pp. 198-203.
`Reiter, Michael K. and Rubin, Aviel D. (AT&T LabsiResearch),
`“Crowds: Anonymity for Web Transmission”, pp. 1-23.
`Dolev, Shlomi
`and Ostrovsky, Rafil,
`“Eflicient Anonymous
`Multicast and Reception” (Extended Abstract), 16 pages.
`Rubin, Aviel D., Greer, Daniel, and Ranum, Marcus J. (Wiley
`Computer Publishing), “Web Security Sourcebook”, pp. 82-94.
`Fasbender, Kesdogan, and Kubitz: “Variable and Scalable Security”
`Protection of Location Information in Mobile IP, IEEE publication,
`1996, pp. 963-967.
`Laurie Wells (LANCASTERBIBELMAIL MSN COM); “Subject:
`Security Icon” USENET Newsgroup, Oct. 19, 1998, XP002200606.
`Davila J et al, “Implementation of Virtual Private Networks at the
`Transport Layer”, Information Security, Second International Work-
`shop, ISW’99. Proceedings (Lecture Springer-Verlag Berlin, Ger-
`many,
`[Online] 1999, pp. 85-102, XP002399276, ISBN 3-540-
`66695-B,
`retrieved
`from the
`Internet: URL:
`http://www.
`springerlink.com/content/4uac0tb0hecoma89/fulltext .pdf>
`(Abstract).
`
`* cited by examiner
`
`Petitioner Apple Inc. - Exhibit 1023, p. 10
`
`Petitioner Apple Inc. - Exhibit 1023, p. 10
`
`
`
`U.S. Patent
`
`Mar. 6, 2007
`
`Sheet 1 of 40
`
`US 7,188,180 B2
`
`
`
`ORIGINATING
`TERMINAL
`
`
`m
`
`IP PACKET
`
`IP ROUTER
`1
`
`IP ROUTER
`
`fl
`
`IP ROUTER
`
`g;
`
`IP ROUTER
`E
`
`IP ROUTER
`&
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`IP ROUTER
`R
`
`“OUTER
`25
`
`INTERNET
`m
`
`
`
`
`
`IP ROUTER
`
`1
`
`IP ROUTER
`E
`
`IP ROUTER
`Q
`
`IP ROUTER
`
`2Q _
`
`48 ENCRYPTION KEY
`
`DESTINATION
`
`TERMINAL
`
`
`m
`
`FIG. 1
`
`Petitioner Apple Inc. - Exhibit 1023, p. 11
`
`Petitioner Apple Inc. - Exhibit 1023, p. 11
`
`
`
`U.S. Patent
`
`Mar. 6, 2007
`
`Sheet 2 0f 40
`
`US 7,188,180 B2
`
` TARP
`
`TERMINAL
`
`
`100
`
`140
`
`
`TARP PACKET
`
`TP ROUTER
`
`
`
`TARP
`134
`
`
`
`146
`ROUTER
`
`
`LINK KEY
`22
`
`
`
` TARP
`
`ROUTER
`12;
`
`
`M11m TARP
`'PR%%TER
`ROUTER
`
`124
`
`
`
`
`
`
`ROUTER
`fl
`
`
` TARP
`
`TERMINAL
`11_0
`
`
`
`FIG. 2
`
`Petitioner Apple Inc. - Exhibit 1023, p. 12
`
`Petitioner Apple Inc. - Exhibit 1023, p. 12
`
`
`
`U.S. Patent
`
`Mar. 6, 2007
`
`Sheet 3 0f 40
`
`US 7,188,180 B2
`
`207a
`
`207b
`
`onc
`
`2070
`
`° ° °
`
` \ 330 SESSION-KEY-ENCRYPTED
`
`PAYLOAD DATA
`
`‘\ 340 TARP PACKET WITH
`ENCRYPTED PAYLOADS
`
`
`
`‘\ 350 LINK-KEY-ENCRYPTED
`TARP PACKETS
`
`\360 IP PACKETS WI
`ENCRYPTED TARP
`PACKETS AS PAYLOAD
`
`
`
`TARP
`TARP
`
`ROUTER 2
`ROUTER 1
`
`
`
`
`
`TARP
`DESTINATION
`
`
`
`FIG. 3A
`
`Petitioner Apple Inc. - Exhibit 1023, p. 13
`
`Petitioner Apple Inc. - Exhibit 1023, p. 13
`
`
`
`U.S. Patent
`
`Mar. 6, 2007
`
`Sheet 4 0f 40
`
`US 7,188,180 B2
`
`
`
`
`\520 BLOCK-ENCRYPTED
`(SESSION-KEY) PAYLOAD
`SEQUENCE
`
`
`
`
`DUMMY
`
`BLOCKS
`OR DATA
`MAY BE
`
`ADDED
`
`
`
`
`
`
`3 \523 ENCRYPTED BLOCK
`DIVIDED INTO PAYLOADS
`INTERLEAVED
`
`5"
`
`517
`
` 3""? \523 ENCRYPTED BLOCK
`
`DIVIDED INTO PAYLOADS
`INTERLEAVED
`
` J'if‘ \340 TARP PACKETS WITH
`ENCRYPTED PAYLOADS
`
`Petitioner Apple Inc. - Exhibit 1023, p. 14
`
`Petitioner Apple Inc. - Exhibit 1023, p. 14
`
`
`
`U.S. Patent
`
`Mar. 6, 2007
`
`Sheet 5 0f 40
`
`US 7,188,180 B2
`
`TARP TRANSCEIVER
`
`m
`
`fl NETWORK (IP) LAYER
`
`ONE ALTERNATIVE TO
`COMBINE
`TARP PROCESSING
`WITH O/S |P
`PROCESSOR
`
`OTHERALTERNATIVE
`TO COMBINE
`TARP PROCESSING
`WITH D.L. PROCESSOR
`(e.g., BURN INTO BOARD
`PROM)
`
`TARP LAYER
`m
`
`DATA LINK LAYER
`m
`
`FIG. 4
`
`450
`DATALINK
`PROTOCOLWRAPPER
`
`Petitioner Apple Inc. - Exhibit 1023, p. 15
`
`Petitioner Apple Inc. - Exhibit 1023, p. 15
`
`
`
`U.S. Patent
`
`Mar. 6, 2007
`
`Sheet 6 of 40
`
`US 7,188,180 B2
`
`BACKGROUND LOOP - DECOY
`GENERATION
`
`AUTHENTICATE TARP
`PACKET
`
`OUTER LAYER DECRYPTION
`OF TARP PACKET USING
`LINK KEY
`
`DUMP DECOY
`
`S2
`
`S3
`
`
`
`S0
`
`
`
`
`
`
`
`
`
`
`CHECK FOR DECOY AND
`INCREMENT PERISHABLE
`
`
`DECOY COUNTER AS-
`
`APPROPRIATE
`
`S4
`
`TRANSMIT DECOY?
`
`YES
`
`DECREMENT
`TTL TTL > 0?
`
`S5
`
`S7
`
`GENERATE NEXT-HOP TARP
`DETERMINE DESTINATION
`TARP ADDRESS AND STORE
`ADDRESS AND STORE LINK
`
`KEY AND IP ADDRESS
`LINK KEY AND IF ADDRESS
`
`
`
`
`S8
`
`
`
`
`GENERATE NEXT-HOP TARP
`ADDRESS AND STORE LINK
`KEYANDIPADDRESS
`
`
`
`
`
`GENERATE IP HEADER
`AND TRANSMIT
`
`
`S10
`
`811
`
`FIG. 5
`
`Petitioner Apple Inc. - Exhibit 1023, p. 16
`
`Petitioner Apple Inc. - Exhibit 1023, p. 16
`
`
`
`U.S. Patent
`
`Mar. 6, 2007
`
`Sheet 7 0f 40
`
`US 7,188,180 B2
`
`BACKGROUND LOOP - DECOY
`GENERATION
`
`820
`
`GROUP RECEIVED IP PACKETS
`INTO INTERLEAVE WINDOW
`
`821
`
`DETERMINE DESTINATION TARP
`ADDRESS, INITIALIZE TTL, STORE
`IN TARP HEADER
`
`322
`
`RECORD WINDOW SEQ. NOS. AND
`INTERLEAVE SEQ. NOS. IN TARP
`HEADERS
`
`32
`
`3
`
`
`
`CHOOSE FIRST HOP TARP
`ROUTER, LOOK UP IPADDRESS
`AND STORE IN CLEAR IP HEADER,
`OUTER LAYER ENCRYPT
`
`824
`
`INSTALL CLEAR IP HEADER AND
`TRANSMIT
`
`325
`
`FIG. 6
`
`Petitioner Apple Inc. - Exhibit 1023, p. 17
`
`Petitioner Apple Inc. - Exhibit 1023, p. 17
`
`
`
`U.S. Patent
`
`Mar. 6, 2007
`
`Sheet 8 0f 40
`
`US 7,188,180 B2
`
`BACKGROUND LOOP - DECOY
`GENERATION
`
`S40
`
`AUTHENTICATE TARP PACKET
`RECEIVED
`
`S42
`
`DECRYPT OUTER LAYER
`ENCRYPTION WITH LINK KEY
`
`INCREMENT PERISHABLE
`COUNTER IF DECOY
`
`S43
`
`S44
`
`DIVIDE BLOCK INTO PACKETS
`USING WINDOW SEQUENCE
`DATA, ADD CLEAR IP HEADERS
`
`GENERATED FROM TARP
`HEADERS
`
`S49
`
`
`S46
`
`S50 THROW AWAY DECOY OR KEEP
`
`HAND COMPLETED IP PACKETS
`TO IP LAYER PROCESS
`
`IN RESPONSE TO ALGORITHM
`
`S45
`
`CACHE TARP PACKETS UNTIL
`WINDOW IS ASSEMBLED
`
`S47
`
`DEINTERLEAVE PACKETS
`FORMING WINDOW
`
`DECRYPT BLOCK
`
`S48
`
`FIG. 7
`
`Petitioner Apple Inc. - Exhibit 1023, p. 18
`
`Petitioner Apple Inc. - Exhibit 1023, p. 18
`
`
`
`U.S. Patent
`
`Mar. 6, 2007
`
`Sheet 9 0f 40
`
`US 7,188,180 B2
`
`TEHEWAL
`
`SSYN
`PAgziiET
`
`SSYN ACK
`PACKET
`822
`
`SSYN ACK
`ACK PACKET
`823
`
`801
`
`
`
` TARP
`
`ROUTER
`m
`
`
`824
`825
`SECURE SESSION
`SECURE SESSION
`INITIATION
`INITIATION ACK
`
`Petitioner Apple Inc. - Exhibit 1023, p. 19
`
`Petitioner Apple Inc. - Exhibit 1023, p. 19
`
`
`
`U.S. Patent
`
`Mar. 6, 2007
`
`Sheet 10 0f 40
`
`US 7,188,180 B2
`
`CLIENT 1 A TARP ROUTER
`
`RECEIVE TABLE
`TRANSMIT TABLE
`924
`921
`—_3— #—
`
`13121820498
`131.218.204.221
`131.218.204.139
`131.218.204.12
`
`-
`.
`.
`.
`
`131.218.204.65
`131.218.204.97
`131.218.204.186
`131.218.204.55
`
`131.218.204.98
`131.218.204.221
`131.218.204.139
`131.218.204.12
`
`-
`.
`.
`.
`
`131.218.204.65
`131.218.204.97
`131.218.204.186
`131.218.204.55
`
`TRANSMIT TABLE
`RECEIVE TABLE
`923
`922
`_A— __L__
`
`.
`
`131.218.204.161
`131.218.204.66
`131.218.204.201
`131.218.204.119
`
`.
`.
`.
`.
`
`131.218.204.89
`131.218.204.212
`131.218.204.127
`131.218.204.49
`
`131.218.204.161
`131.218.204.66
`131.218.204.201
`131.218.204.119
`
`.
`.
`.
`.
`
`131.218.204.89
`131.218.204.212
`131.218.204.127
`131.218.204.49
`
`Petitioner Apple Inc. - Exhibit 1023, p. 20
`
`Petitioner Apple Inc. - Exhibit 1023, p. 20
`
`
`
`U.S. Patent
`
`Mar. 6, 2007
`
`Sheet 11 0140
`
`US 7,188,180 B2
`
`
`
` ISP A
`TARP
`
`ROUTER
`1021
`
`
`
`CLIENT
`1001
`
`
`
` ISP B
`TARP
`
`ROUTER
`
`
`
`1011
`
`1012
`
` ISP C
`
`TARP
`
`ROUTER
`
`
`
`1013
`
`FIG. 10
`
`Petitioner Apple Inc. - Exhibit 1023, p. 21
`
`Petitioner Apple Inc. - Exhibit 1023, p. 21
`
`
`
`U.S. Patent
`
`Diar.6,2007
`
`Sheet12 0f40
`
`US 7,188,180 B2
`
`mm:
`
`om:
`
`8:
`
`NEE:mzémEzmmzm
`
`
`
`mmemzmszEEzmmzm
`
`
`
`mm”mmmmeg2,:.omm
`
`immmggfwgso:<5:
`
`
`..mg:mg:
`
`$3:555n:
`
`
`
`gummmgzefiomg:<8::“3&2n:$58
`
`
`suaméaoma0%mm”:
`
`323%2:
`
`2:
`
`£295E
`
`Ill,
`
`
`
`mmofiz.5onn:
`
`<8:
`
`5:
`
`98:
`
`NE
`
`22353@3192n:.meo2”mmmmogn:momDOm
`2new:
`
`Q2821
`
`mmofixExofim_8”mmmmoga:9me8”3%”?a:.omm
`
`21853”3me2¢_.53S”mmmmogm_mumDOm
`R“ad:
`
`E.
`
`E
`
`Petitioner Apple Inc. - Exhibit 1023, p. 22
`
`Petitioner Apple Inc. - Exhibit 1023, p. 22
`
`
`
`
`
`
`U.S. Patent
`
`Mar. 6, 2007
`
`Sheet 13 of 40
`
`US 7,188,180 B2
`
`5%Es
`
`%%%Eam ~%%
`fig
`
` 8:E03:01::03:01::1
`
`
` V532:32%:
`
`New?
`
`82,
`
`mum:
`
`202.52%
`
`zo:.<o_._&<
`
`Em:
`
`
`
`ism?x82,
`
`mom—8N— m3:01;
`
`<3
`
`GE
`
`:2,23
`
`ggEaEa
`
`almi
`
`aa
`
` cD3:01;:03:01::
`
`allCmEQ
`<o._<moi
`
`Petitioner Apple Inc. - Exhibit 1023, p. 23
`
`‘
`
`Petitioner Apple Inc. - Exhibit 1023, p. 23
`
`
`
`U.S. Patent
`
`Mar. 6, 2007
`
`Sheet 14 0f 40
`
`US 7,188,180 B2
`
`MODE
`OR
`
`1. PROMISCUOUS
`
`
`
`
`
`
`2. PROMISCUOUS
`PER VPN
`
`
`
`3. HARDWARE
`HOPPING
`
`HARDWARE
`
`IF ADDRESSES
`
`DISCRIMINATOR FIELD
`
`SAME FOR ALL NODES
`0R wgww
`
`CAN BE VARIED
`[N SYNC
`
`CAN BE VARIED
`IN SYNC
`
`F'XEDFOREACHVPN
`
`
`
`CAN BE VARIED
`IN SYNC
`
`
`
`CAN BE VARIED
`IN SYNC
`
`CAN BE VARIED
`IN SYNC
`
`CAN BE VARIED
`IN SYNC
`
`CAN BE VARIED
`IN SYNC
`
`FIG. 123
`
`
`
`
`
`Petitioner Apple Inc. - Exhibit 1023, p. 24
`
`Petitioner Apple Inc. - Exhibit 1023, p. 24
`
`
`
`SU
`
`tnem
`
`mM
`
`mm6.,
`
`m
`
`0
`
`7
`
`2
`
`mE8
`
`P.a:82as
`
`52
`
`32mg
`
`s22
`
`m025825280
`
`moz22
`
`BIm2mmm,55%£25%
`
`$58;Ea:02”.
`E0532
`
`W:2
`
`5:53
`
`
`
`mmmmoo<momDOmm_
`
`
`
`mmmmonz“—men:
`
`m3;025
`
`205203$:
`
`
`
`was,02$
`
`2050322:
`
`$52:
`
`DmEEozm
`
`962E
`
`82
`
`82
`
`Petitioner Apple Inc. - Exhibit 1023, p. 25
`
`Petitioner Apple Inc. - Exhibit 1023, p. 25
`
`
`
`
`
`
`
`
`U.S. Patent
`
`Mar. 6, 2007
`
`Sheet 16 0f 40
`
`US 7,188,180 B2
`
`|P PAIR 1
`
`IP PAIR 2
`
`O 0
`
`IP PAIRW
`
`CURRENT IP PAIR
`
`ckpt_o
`ckpt_n
`
`TRANSMITTER
`
`RECIPIENT'S ISP
`
`CURRENT IP PAIR <~--‘
`
`WINDOW
`
`lP PAIR 1
`
`IP PAIR 2
`O
`0
`0
`
`IP PAIR W
`ckpt_o
`ckpt_n
`ckpt_r4
`
`RECEIVER
`
`SENDER'S ISP
`
`
`
`KEPT IN SYNC FOR SENDER TO RECIPIENT SYNCHRONIZER < ----------------------- >
`
`KEPTIN SYNC FOR RECIPIENT TO SENDER SYNCHRONIZER <——————->
`
`FIG. 14
`
`Petitioner Apple Inc. - Exhibit 1023, p. 26
`
`Petitioner Apple Inc. - Exhibit 1023, p. 26
`
`
`
`U.S. Patent
`
`Mar. 6, 2007
`
`Sheet 17 0f 40
`
`US 7,188,180 B2
`
`@
`
`@ WHEN SYNCHRONIZATION
`BEGINS TRANSMIT (RETRANSMIT
`PERIODICALLY UNTILACKed)
`SYNC_REQ USING NEw
`TRANSMITTER CHECKPOINT IP
`PAIR ckpt_n AND GENERATE
`NEw RECEIVER RESPONSE
`CHECKPOINTckpt_r
`
`#
`
`#WHEN SYNC_ACK
`ARRIVES WITH INCOMING
`HEADER = 0ka r;
`GENERATE NEW
`CHECKPOINTIPPAIR
`
`ckan lN TRANSMITTER
`
`SYNC_REQ
`
`1W
`
`w
`
`* WHEN SYNC_REQ ARRIVES
`WITH INCOMING HEADER =
`RECEIVER'S ckpt_n:
`,UPDATE WINDOW
`_GENERATE NEW
`CHECKPOINT lP PAIR
`ckpt_n IN RECEIVER
`-GENERATE NEW
`CHECKPOINT IP PAIR
`ckarIN TRANSMITTER
`-TRANSM|T SYNC_ACK
`USING NEW CHECKPOINT
`IP PAIR Ckar
`
`FIG. 15
`
`Petitioner Apple Inc. - Exhibit 1023, p. 27
`
`Petitioner Apple Inc. - Exhibit 1023, p. 27
`
`
`
`U.S. Patent
`
`Mar. 6, 2007
`
`Sheet 18 0f 40
`
`US 7,188,180 B2
`
`
`
`FIG. 16
`
`Petitioner Apple Inc. - Exhibit 1023, p. 28
`
`Petitioner Apple Inc. - Exhibit 1023, p. 28
`
`
`
`U.S. Patent
`
`Mar. 6, 2007
`
`Sheet 19 0f 40
`
`US 7,188,180 B2
`
`000 ‘ mill/Illa
`
`O
`
`
`
`
`
`
`I INACTIVE
`a ACTIVE
`
`fl USED
`
`VIII/[IIIIIA
`’IIIIIIIIIIIA
`VIII/I'llllll
`VIII/III,“
`mil/Ill“
`O
`
`WINDOW_S|ZE
`
`WINDOW_S|ZE
`
`
`
`
`
`
`
`
`VlllllllllllA
`
`VIII/[Illllfl
`VIII/[Illnfl
`
`VII/IllnlllA
`
`FIG. 17
`
`Petitioner Apple Inc. - Exhibit 1023, p. 29
`
`Petitioner Apple Inc. - Exhibit 1023, p. 29
`
`
`
`U.S. Patent
`
`Mar. 6, 2007
`
`Sheet 20 0f 40
`
`US 7,188,180 B2
`
`000
`
`WINDOW_SIZE
`
`WINDOW_SIZE
`
`VIII/I’ll,”
`
`O
`
`'IIIIIIIIIIIA
`VIII/[Illlfl
`VIII/IIIHIA
`VIII/III,“
`mun/I’ll.
`
`O
`
`.
`
`INACTIVE
`a ACTIVE
`
`fl USED
`
`Petitioner Apple Inc. - Exhibit 1023, p. 30
`
`Petitioner Apple Inc. - Exhibit 1023, p. 30
`
`
`
`U.S. Patent
`
`Mar. 6, 2007
`
`Sheet 21 0f 40
`
`US 7,188,180 B2
`
`OoO
`
`WINDOW_S|ZE
`
`WINDOW_S|ZE
`
`VIII/IIIIIIA
`O
`
`VIII/”I’m
`VII/I'IIIIIIA
`VIIIIIIIIIIA
`
`
`
`
`
`
`
`
`
`
`
`
`WII'IIIIIIIA
`
`
`VII/””1111
`VII/””011.
`
`
`VII/””1,”
`
`
`
`VIIIIIIIIIIA
`
`
`
`
`
`
`
`VIII/1111114
`
`I INACTIVE
`a ACTIVE
`fl USED
`
`000
`
`FIG. 19
`
`Petitioner Apple Inc. - Exhibit 1023, p. 31
`
`Petitioner Apple Inc. - Exhibit 1023, p. 31
`
`
`
`U.S. Patent
`
`Mar. 6, 2007
`
`Sheet 22 0f 40
`
`US 7,188,180 B2
`
`
` COMPUTER #2
`
`
`
`2008
`
`2005
`
`
`
` COMPUTER #1
`
`2011 FIG.20
`
`Petitioner Apple Inc. - Exhibit 1023, p. 32
`
`Petitioner Apple Inc. - Exhibit 1023, p. 32
`
`
`
`U.S. Patent
`
`Mar. 6, 2007
`
`Sheet 23 0f 40
`
`US 7,188,180 B2
`
`ADTABLE
`|_P1|P2
`
`2101
`
`AETABLE
`
`2102
`
`2103
`
`2109
`
`BDTABLE
`
`- 2104
`
`3——ABLE
`
`LINKDOWN >I‘ 210
`
`5
`
`BF TABLE
`
`2106
`
`2107
`
`2108
`
`Petitioner Apple Inc. - Exhibit 1023, p. 33
`
`Petitioner Apple Inc. - Exhibit 1023, p. 33
`
`
`
`U.S. Patent
`
`Mar. 6, 2007
`
`Sheet 24 0f 40
`
`US 7,188,180 B2
`
`
`
`
`MEASURE
`
`QUALITY OF
`TRANSMISSION
`PATH X
`
`
`
`
`
`MORE THAN
`ONE TRANSMITTER
`
`TURNED ON?
`
`2202
`
`YES
`2207
`
`2203
`
`
`
`PATH X
`QUALITY < THRESHOLD?
`SET WEIGHT
`
`TO MIN. VALUE
`
`
`
`
`
`PATH X
`VALUE?
`DECREASE WEIGHT
`WEIGHT LESS THAN
`STEADY STATE
`FOR PATH X 2208
`
`
`
`INCREASE
`WEIGHT FOR PATH X
`TOWARD STEADY
`STATE VALUE
`
`
`
`ADJUST WEIGHTS
`FOR REMAINING
`
`
`PATHS SO THAT
`WEIGHTS EQUAL ONE
`
`
`2206
`
`FIG. 22A
`
`Petitioner Apple Inc. - Exhibit 1023, p. 34
`
`Petitioner Apple Inc. - Exhibit 1023, p. 34
`
`
`
`U.S. Patent
`
`Mar. 6, 2007
`
`Sheet 25 0f 40
`
`US 7,188,180 B2
`
`(EVENT) TRANSMITTER
`FOR PATH X
`TURNS OFF
`
`2210
`
`
`
`
`
`
`
`AT LEAST
`
`ONE TRANSMITTER
`
`
`TURNED ON?
`
`
`
`DROP ALL PACKETS
`UNTILATRANSMITTER
`TURNS ON
`
`SET WEIGHT
`
`TO ZERO
`
`
`
`ADJUST WEIGHTS
`FOR REMAINING PATHS
`
`SO THAT WEIGHTS
`
`EQUAL ONE
`
`
`
`FIG. 228
`
`Petitioner Apple Inc. - Exhibit 1023, p. 35
`
`Petitioner Apple Inc. - Exhibit 1023, p. 35
`
`
`
`U.S. Patent
`
`Mar. 6, 2007
`
`Sheet 26 0f 40
`
`US 7,188,180 B2
`
`PATH X2
`
`
`
`2308
`PATH X1
`\
`
`TRANSMIT TABLE
`2302
`S
`D
`
`PACKET
`I
`PATH x3
`
`TRANSMITTER
`
`
`PATH X4
`
`
`
`PACKET
`RECEIVER
`
`
`
`
`
`W(X1)=0-2
`W(X2)=0.1
`w (x3) = 0.6
`
`w (x4) = 0.1
`
`w
`
`2301
`
`
`
`
`
`
`LINK QUALITY
`MEASUREMENT
`FUNCTION
`
`
`WEIGHT
`
`ADJUSTMENT
`FUNCTION
`
`
`
`
`
`FIG. 23
`
`Petitioner Apple Inc. - Exhibit 1023, p. 36
`
`Petitioner Apple Inc. - Exhibit 1023, p. 36
`
`
`
`U.S. Patent
`
`Mar. 6, 2007
`
`Sheet 27 0f 40
`
`US 7,188,180 B2
`
`
`
`
`COMPUTER
`
`2403
`
`2404
`
`2402
`
`9 100Mb/s MESST=32 9
`
`
`
`COMPUTER
`
`9 25Mb/s MESST=8
`
`FIG. 24
`
`Petitioner Apple Inc. - Exhibit 1023, p. 37
`
`Petitioner Apple Inc. - Exhibit 1023, p. 37
`
`
`
`U.S. Patent
`
`Mar. 6, 2007
`
`Sheet 28 0f 40
`
`US 7,188,180 B2
`
`2502
`
`DNS REQ
`
`
`
`
`
`TARGET
`
`- WEBSITE
`
`
`2504
`
`WEB
`BROWSER
`
`DNS RESP
`
`PAGE REQ
`
`PAGE RESP
`
`FIG. 25
`P(R|OR ART)
`
`Petitioner Apple Inc. - Exhibit 1023, p. 38
`
`Petitioner Apple Inc. - Exhibit 1023, p. 38
`
`
`
`U.S. Patent
`
`Mar. 6, 2007
`
`Sheet 29 0f 40
`
`US 7,188,180 B2
`
`
` DNS
`SERVER
`
`2609
`
`
`
`2602
`
`
`
`WEB
`
`BROWSER
`
`
`
`
`
`
`IP
`HOPHNG
`
`GATEKEEPER 2603
`
`
`
`
` SECURE
`TARGET
`SHE
`
`
`
`
`UNSECURE
`TARGET
`SHE
`
`26“
`
`FIG. 26
`
`Petitioner Apple Inc. - Exhibit 1023, p. 39
`
`Petitioner Apple Inc. - Exhibit 1023, p. 39
`
`
`
`U.S. Patent
`
`Mar. 6, 2007
`
`Sheet 30 0f 40
`
`US 7,188,180 B2
`
`RECEIVE
`DNS REQUEST
`
`FOR TARGET SITE
`
`2701
`
`2703
`
`N0
`
`ACCESS TO
`SECURE SITE
`REQUESTED?
`
`
`
`
`DNS SERVER 2702
`
`PASS THRU
`REQUEST TO
`
`YES
`
`2705
`
`
`ERROR 2704
` USER
`
`
`
`N0
`
`RETURN
`"HOSTUNKNOWN"
`
`
`AUTHORIZED TO
`
`CONNECT?
`
`YES
`
`ESTABLISH
`VPN WITH
`
`TARGET SITE
`
`2705
`
`FIG. 27
`
`Petitioner Apple Inc. - Exhibit 1023, p. 40
`
`Petitioner Apple Inc. - Exhibit 1023, p. 40
`
`
`
`U.S. Patent
`
`Mar. 6, 2007
`
`Sheet 31 0f 40
`
`US 7,188,180 B2
`
`2802
`
`2803
`
`2801
`
`HOST
`COMPUTER #1
`
`
`
`
`
`
`
`
`EDGE
`ROUTER
`
`2804
`
`HOST
`COMPUTER #2
`
`2805
`
`HIGH BW
`
`FIG. 28
`
`Petitioner Apple Inc. - Exhibit 1023, p. 41
`
`Petitioner Apple Inc. - Exhibit 1023, p. 41
`
`
`
`U.S. Patent
`
`Mar. 6, 2007
`
`Sheet 32 0f 40
`
`US 7,188,180 B2
`
`2901
`
` HOST COMPUTER #1
`
`
`EDGE
`ROUTER
`
`
`
`
`
`_\_, HOST COMPUTER #2
`
`
`IP TX
`100-200
`
`HIGH BW
`
`
`
`
`
` RX 2902 TX
`
`2912
`
`2913
`
`
`4/
` HACKER
`
`COMPUTER
`
`
`FLOOD [P
`TX100-200
`
`2903
`
`FIG. 29
`
`Petitioner Apple Inc. - Exhibit 1023, p. 42
`
`Petitioner Apple Inc. - Exhibit 1023, p. 42
`
`
`
`U.S. Patent
`
`2
`
`40.M
`
`17,SU
`
`2B000
`
`6,858%
`5%5555
`
`5555:3255”:
`
`528mm
`
`%matIE52mm828%;>85583
`M85.02%
`mm>momm
`
`1,.won95
`
`5555sz
`
`5555
`
`39:.xx
`
`Petitioner Apple Inc. - Exhibit 1023, p. 43
`
`Petitioner Apple Inc. - Exhibit 1023, p. 43
`
`
`
`U.S. Patent
`
`Mar. 6, 2007
`
`Sheet 34 0f 40
`
`US 7,188,180 B2
`
`3103
`
`3101
`
`
`CLIENT #1
`
`
`
`
`
`
`
`3105
`
`
`CLIENT #2
`
`
`TXIRX
`TXIRX
`TX/RX
`
`
`
`3102
`
`
` 3208
`3210
`3209
`
`
`3105
`
`HACKER
`
`FIG. 31
`
`Petitioner Apple Inc. - Exhibit 1023, p. 44
`
`Petitioner Apple Inc. - Exhibit 1023, p. 44
`
`
`
`U.S. Patent
`
`Mar. 6, 2007
`
`Sheet 35 0f 40
`
`US 7,188,180 B2
`
`CLIENT
`\
`
`SEND DATA PACKET
`USING ckpt_n
`CKPT_O=cka_n
`GENERATE NEW ckpt_n
`START TIMER, SHUT TRANSMITTER
`OFF
`
`IF CKPT_0 IN SYNC_ACK
`MATCHES TRANSMITTER'S
`
`ckpt_o
`UPDATE RECEIVER‘S
`
`ckpt_r
`KILL TIMER, TURN
`TRANSMITTER 0N
`
`SEND DATA PACKET
`USING ckpt_n
`ckpt_o=ckpt_n
`GENERATE NEW ckpt_n
`START TIMER, SHUT TRANSMITTER
`OFF
`
`WHEN TIMER EXPIRES
`TRANSMITSYNC_REQ
`USING TRANSMITTERS
`ckpt_o, START TIMER
`
`IF ckpt_o IN SYNC_ACK
`MATCHES TRANSMITTER'S
`
`ckpt_o
`UPDATE RECEIVERS
`ckpt_r
`KILL TIMER, TURN
`TRANSMITTER 0N
`
`SERVER
`\
`
`PASS DATA UP STACK
`ckpt_o=ckpt_n
`GENERATE NEW ckpt_n
`GENERATE NEW ckpt_r FOR
`TRANSMITTER SIDE
`
`TRANSMIT SYNC_ACK
`CONTAINING ckpt_o
`
`ckpt_o=ckpt_n
`GENERATE NEW ckpt_n
`GENERATE NEW ckpt_r FOR
`TRANSMITTER SIDE
`
`TRANSMITSYNC_ACK
`CONTAINING ckpt_n
`
`
`
`SYNQREQ
`
`FIG. 32
`
`Petitioner Apple Inc. - Exhibit 1023, p. 45
`
`Petitioner Apple Inc. - Exhibit 1023, p. 45
`
`
`
`U.S. Patent
`
`Mar. 6, 2007
`
`Sheet 36 of 40
`
`US 7,188,180 B2
`
`as
`
`as‘mzoem‘
`
`:gas$58
`
`._<zmmpz_
`
`28.258
`
`mmsomm
`
`Emma;
`
`8mm
`
`
`
` gg52%;;8mm
`
`22:82mm3mm:898mm.mv_n_
`
`«N2
`
`88
`
`mmmaomm
`
`manommoo
`
`2531
`
`52
`
`8%
`
`8mm
`
`Petitioner Apple Inc. - Exhibit 1023, p. 46
`
`Petitioner Apple Inc. - Exhibit 1023, p. 46
`
`
`
`
`
`
`U.S. Patent
`
`Mar. 6, 2007
`
`Sheet 37 0f 40
`
`US 7,188,180 B2
`
`3400
`
`3401
`
`
`
`DISPLAY WEB PAGE
`CONTAINING GO
`SECURE HYPERLINK
`
`
`
`
` P3402
`
`YES
`
`LAUNCH LINK TO
`.COM SITE
`
`3404
`
`DOWNLOAD AND
`INSTALL PLUG-IN
`
`3405
`
`CLOSE CONNECTION
`
`3406
`
`
`
`VPN
`PLUG-IN
`LOADED
`
`
`
`AUTOMATIC REPLACEMENT OF TOP-LEVEL
`DOMAIN NAMDUVMIAIIINSN/EMEE TOP-LEVEL
`
`3407
`
`3412
`
`DISPLAY "SECURE“ ICON
`
`ACCESS SECURE PORTAL AND
`SECURE NETWORK AND SECURE DNS
`
`3408
`
`OBTAIN SECURE COMPUTER NETWORK
`ADDRESS FOR SECURE WEBSITE
`
`ACCESS GATE KEEPER AND RECEIVE
`PARAMETERS FOR ESTABLISHING VPN
`WITH SECURE WEBSITE
`
`3409
`
`3410
`
`CONNECT TO SECURE WEBSITE
`USING VPN BASED ON PARAMETERS
`ESTABLISHED BY GATE KEEPER
`
`_
`
`3411
`
`N0
`
`3413
`
`
` TERMINATE
`SECURE
`CONNECTION
`
`YES
`REPLACE SECURETORLEVEL
`DOMAIN NAME WITH NON-SECURE
`TOP-LEVEL DOMAIN NAME
`
`3414
`
`3415
`
`DISPLAY "G0 SECURE" HYPERLINK
`
`Petitioner Apple Inc. - Exhibit 1023, p. 47
`
`Petitioner Apple Inc. - Exhibit 1023, p. 47
`
`
`
`U.S. Patent
`
`Mar. 6, 2007
`
`Sheet 38 0f 40
`
`US 7,188,180 B2
`
`3500
`
`\
`
`REQUESTORACCESSES WEBSITE
`
`
`
`AND LOGS INTO SECURE
`DOMAIN NAME REGISTRY SERVICE
`
`3501
`
`REQUESTER COMPLETES ONLINE
`REGISTRATION FORM
`
`
`
`QUERY STANDARD DOMAIN NAME
`
`
`SERVICE REGARDING OWNERSHIP
`OF EQUIVALENT NON-SECURE
`DOMAIN NAME
`
`
`
`
`
`
`
`
`RECEIVE REPLY FROM STANDARD
`DOMAIN NAME REGISTRY
`
`3505
`
`N0
`
`INFORM REQUESTOR
`OF CONFLICT
`
`3506
`
`VERIFY INFORMATION AND
`ENTER PAYMENT INFORMATION
`
`3507
`
`REGISTER SECURE DOMAIN NAME
`
`3508
`
`FIG. 35
`
`Petitioner Apple Inc. - Exhibit 1023, p. 48
`
`Petitioner Apple Inc. - Exhibit 1023, p. 48
`
`
`
`U.S. Patent
`
`Mar. 6, 2007
`
`Sheet 39 0f 40
`
`US 7,188,180 B2
`
`WEB SERVER
`
`SERVER PROXY
`
`3610
`
`3600
`
`VPN GUARD
`
`3611
`
`
`
`
`
`
`
`
`COMPUTER NETWORK
`
`3602
`
`FIREWALL
`
`3601
`
`I BROWSER I PROXYAPPLICATION I
`
`3607
`
`3606
`
`3605
`
`CLIENT COMPUTER
`
`3604
`
`FIG. 36
`
`Petitioner Apple Inc. - Exhibit 1023, p. 49
`
`Petitioner Apple Inc. - Exhibit 1023, p. 49
`
`
`
`U.S. Patent
`
`Mar. 6, 2007
`
`Sheet 40 0f 40
`
`US 7,188,180 B2
`
`3700
`/
`
`GENERATE MESSAGE PACKETS
`
`3701
`
`MODIFY MESSAGE PACKETS WITH PRIVATE
`CONNECTION DATA AT AN APPLICATION LAYER
`
`3702
`
`SEND TO HOST COMPUTER
`THROUGH FIREWALL
`
`RECEIVE PACKETS AND AUTHENTICATE
`AT KERNEL LAYER OF HOST COMPUTER
`
`RESPOND TO RECEIVED MESSAGE
`PACKETS AND GENERATE REPLY
`MESSAGE PACKETS
`
`MODIFY REPLY MESSAGE PACKETS WITH
`PRIVATE CONNECTION DATA AT A
`KERNEL LAYER
`
`SEND