throbber
USOO7987274B2
`
`(12) United States Patent
`(10) Patent No.:
`US 7,987,274 B2
`
`Larson et al.
`(45) Date of Patent:
`*Jul. 26, 2011
`
`(54) METHOD FOR ESTABLISHING SECURE
`COMMUNICATION LINK BETWEEN
`COMPUTERS OF VIRTUAL PRIVATE
`NETWORK
`
`........................................ 709/227, 709/228
`(52) US. Cl.
`(58) Field of Classification Search .......... 709/2257229,
`709/245; 726/15
`See application file for complete search history.
`
`(75)
`
`Inventors: Victor Larson, Fairfax, VA (US);
`Robert Dunham Short, III, Leesburg,
`VA (US); Edmund Colby Munger,
`Crownsville, MD (US); Michael
`Williamson, South Riding, VA (US)
`
`(73) Assignee: Virnetx, Incorporated, Scotts Valley,
`CA (US)
`
`(56)
`
`References Cited
`
`U.S. PATENT DOCUMENTS
`
`2,895,502 A
`4,920,484 A
`4,933,846 A
`
`7/1959 Roper et al.
`4/1990 Ranade
`6/1990 Humphrey et al.
`(Continued)
`
`( * ) Notice:
`
`Subject to any disclaimer, the term of this
`patent is extended or adjusted under 35
`U.S.C. 154(b) by 15 days.
`
`DE
`
`This patent is subject to a terminal dis-
`claimer.
`
`FOREIGN PATENT DOCUMENTS
`19924575
`12/1999
`
`(Continued)
`
`OTHER PUBLICATIONS
`
`(21) Appl.No.: 11/839,9s7
`
`(22)
`
`Filed:
`
`Aug. 16, 2007
`
`(65)
`
`Prior Publication Data
`
`US 2008/0216168 A1
`
`Sep. 4, 2008
`
`Related US. Application Data
`
`(60) Continuation of application No. 11/679,416, filed on
`Feb. 27, 2007, which is a continuation of application
`No. 10/702,486, filed on Nov. 7, 2003, now Pat. No.
`7,188,180, which is a division of application No.
`09/558,209, filed on Apr. 26, 2000, now abandoned,
`which is a continuation-in—part of application No.
`09/504,783, filed on Feb. 15, 2000, now Pat. No.
`6,502,135, which is
`a
`continuation-in—part of
`application No. 09/429,643, filed on Oct. 29, 1999,
`now Pat. No. 7,010,604.
`
`(60) Provisional application No. 60/106,261, filed on Oct.
`30, 1998, provisional application No. 60/ 137,704,
`filed on Jun. 7, 1999.
`
`(51)
`
`Int. Cl.
`G06F 15/1 73
`
`(2006.01)
`
`U.S.App1. No. 60/134,547, filed May 17, 1999, Victor Sheymov.
`
`(Continued)
`
`Primary Examiner 7 Krisna Lim
`(74) Attorney, Agent, or Firm iMcDermott Will Emery
`LLP
`
`(57)
`
`ABSTRACT
`
`A technique is disclosed for establishing a secure communi-
`cation link between a first computer and a second computer
`over a computer network. Initially, a secure communication
`mode ofcommunication is enabled at a first computer without
`a user entering any cryptographic information for establish-
`ing the secure communication mode of communication.
`Then, a secure communication link is established between the
`first computer and a second computer over a computer net-
`work based on the enabled secure communication mode of
`communication. The secure communication link is a virtual
`
`private network communication link over the computer net-
`work in which one or more data values that vary according to
`a pseudo-random sequence are inserted into each data packet.
`
`18 Claims, 40 Drawing Sheets
`
`2701
`
`ACCESSTO
`SECURE SITE
`REQUESTED?
`
`
`PASS THRU
`REQUESTTO
`DNS SERVER
`
`REC
`DNS REQUEST
`
`I
`
`FORTARGETSITE
`
`
`
`
`
`USER
`AUTHORIZED T0
`CONNECT7
`
` 2106
`
`ESTABLISH
`VPNWIIH
`TARGET SITE
`
`Petitioner Apple Inc. - Exhibit 1027, p. 1
`
`Petitioner Apple Inc. - Exhibit 1027, p. 1
`
`

`

`US 7,987,274 B2
`
`Page2
`
`U.S. PATENT DOCUMENTS
`.
`18188: figget 31
`8,888,888 2
`1/1994 BoebeIt etal.
`5,276,735 A
`4/1994 B
`5303 302 A
`5/1994 C3385
`5,311,593 A
`7/1994 Walsh etal.
`5,329,521 A
`8/1994 Barney etal.
`5341426 A
`“/1994 Ch
`31
`5,367,643 A
`“1995 K.1:mgh‘?t
`~
`5,384,848 A
`4996 A831“
`5,511,122 A
`9/1996 W895”
`5,559,883 A
`1
`10/1996 L1 ”1mg
`55615669 A
`”/1996 Aem‘eyet”
`5,588,060 A
`”/1996 1(le
`1
`5,590,285 A
`4/1997 Uaulifeta~
`56255626 A
`5/1997 Mills/lag:
`56295984 A
`8/1997 Olnowich etal.
`5,654,695 A
`10/1997 Nak
`5682 480 A
`“/1997 N agawa
`56895566 A
`4998 1388828211
`5,740,375 A
`6/1998 Edelstein etal.
`5,764,906 A
`88888 84“???th
`5,774,883 2
`7/1998 [$1818 6 3'
`5787172 A
`8/1998 Sistanizadeh etal.
`5,790,548 A
`8/1998 Egbensen
`5796942 A
`9/1998 Holloway etal.
`5,805,801 A
`9/1998 Birrelletal
`5 805 803 A
`10/1998 Caronnietél
`5,822,434 A
`11/1998 Hughes etal.
`5,842,040 A
`12/1998 D
`1
`5 845091 A
`“1999 singed”
`58645666 A
`5867560 A mg” of er
`5,870,680 A
`2/1999 135‘ij
`1
`5,878,231 A
`”999 Bey}:
`5,892,903 A
`4999 Kasai
`5,898,830 A
`4/1999 Wesinger, Jr. et al.
`5,905,859 A
`5/1999 Holloway et al.
`5918018 A
`@999 G d
`1
`5,918,019 A
`@999 Vfign‘gfimeta'
`5,950,195 A
`9/1999 Stockwelletal.
`5,996,016 A
`11/1999 Thalheimeretal.
`6006259 A
`12/1999 Adelman etal
`6:006:272 A
`”/1999 Amvmudanetal.
`6016318 A
`“2000 T
`.k
`6,016,512 A
`“2000 H01?“ 6
`6,041,342 A
`”000 Yfizgfchi
`6,052,788 A
`4/2000 Wesingeretal.
`6,055,574 A
`4/2000 Smorodinskyetal.
`6,061,346 A
`5/2000 Noidnian ...................... 370/352
`6,061,736 A
`5/2000 Rochberger et al.
`6079020 A
`6/2000 Liu
`6,081,900 A
`6/2000 Subramaniam etal.
`6,092,200 A
`79000 Mumyappaetal'
`85188888 2
`88888 ilfinggdeh etal
`6,119,234 A
`”000 A. 3:31
`'1
`6,147,976 A
`“/2000 Sill:
`615797 A
`”/2000 B :81 38¢
`65158108118
`12/2000 Ci
`31:1
`6,168,409 B1
`“2001 F 6“ 3'
`6,173,399 B1
`1/2001 Gfigrech
`6’175’867 B1
`1,2001 Taghadoss
`6’178’409 B1
`1,2001 Weberetal.
`6,178,505 B1
`1/2001 Schneideretal.
`6,179,102 B1
`“2001 Weberetal.
`6,199,112 B1
`3/2001 Wilson
`6,202,081 B1
`3/2001 Naudus ......................... 709/200
`6,222,842 B1
`4/2001 Sasyan etal.
`6,223,287 B1
`4/2001 Douglas etal.
`6,226,748 B1
`5/2001 Bots et al.
`6,226,751 B1
`5/2001 Arrowetal.
`6,233,618 B1
`5/2001 Shannon
`6,243,360 B1
`6/2001 Basilico
`6,243,749 B1
`6/2001 Sitaraman etal.
`6,243,754 B1
`6/2001 Guerin etal.
`6,246,670 B1
`6/2001 Karlsson etal.
`6,256,671 B1
`7/2001 Strentzsch etal.
`
`7/2001 Mogul
`6,262,987 B1
`7/2001 Blumenau
`6,263,445 B1
`9/2001 Ramanathan etal.
`6,286,047 B1
`10/2001 Mann etal'
`6’298’341 B1
`10/2001 Hrastaretal.
`6,301,223 B1
`10/2001 Valencia
`6,308,213 B1
`1
`t
`888863,; E 18,3881 idwlfid 11
`e 3'
`’
`’
`‘gh 0
`6,314,463 B1
`11/2001 Abbottetal.
`6,324,161 B1
`11/2001 Kirch
`6,330,562 B1
`12/2001 Bodenetal.
`6,332,158 B1
`12/2001 Risleyetal.
`6,333,272 B1
`12/2001 McMillinetal.
`6,338,082 B1
`1/2002 Schneider
`6,353,614 B1
`3/2002 Borellaetal.
`6,425,003 B1
`7/2002 Herzogetal.
`6,430,155 B1
`8/2002 Davieetal.
`6’430’610 B1
`”002 carter-
`6,487,598 B1
`11/2002 Valencia
`6,502,135 B1
`12/2002 Mungeretal.
`6,505,232 B1
`1/2003 Mighdolletal.
`8241,3882 3 $88; X1181: 58:11
`6,557,037 B1
`4/2003 Provino ........................ 709/227
`6,571,296 B1
`5/2003 Dillon
`6’571’338 B1
`”003 Shaw “1'
`6,581,166 B1
`6/2003 lestetal.
`88833851; 3:
`3,388; Blew“ etali
`’
`’
`“Hg-met”
`6,671,702 B2
`12/2003 Krugllkovetal.
`6’687’551 B2
`”004 Stemdl
`6,687,746 B1
`2/2004 Shuster et al.
`6,701,437 B1
`3/2004 Hokeetal.
`6,714,970 B1
`3/2004 Fiveashetal.
`6,717,949 B1
`4/2004 Bodenetal.
`6,751,738 B2
`6/2004 Wesinger, Jr. etal.
`6,752,166 B2
`6/2004 Lulletal.
`8388388 31
`8,388: £38812: 31'
`’
`’
`q
`6,826,616 B2
`11/2004 Larsonetal.
`6,839,759 B2
`1/2005 Larsonetal.
`33838347, 3
`$882 fioseflberg e11 31'
`’
`’
`ungereta'
`7,039,713 B1
`5/2006 Van Gunter et al.
`7,072,964 B1
`7/2006 Whlttleetal.
`7,133,930 B2
`11/2006 Mungeretal.
`7,167,904 B1
`1/2007 Devarajanetal.
`7,188,175 B1
`3/2007 McKeeth
`1
`383882 3%
`3,388; 88““ et 31'
`7’353’841 B2
`4,2008 Koiané‘gleta'
`7’461’334 B1
`12,2008 Lu em '
`’
`’
`'
`7,490,151 B2
`2/2009 Mungeretal.
`2001330235478? 8%
`13,388? 381111683;
`'
`2002/0004898 A1
`1/2002 D182?
`2003/0196122 A1
`10/2003 Wesinger, Jr. et al.
`2004/0199493 A1
`10/2004 Ruiz etal.
`2004/0199520 A1
`10/2004 Ruizetal.
`2004/0199608 A1
`10/2004 Rechterman etal.
`2004/0199620 A1
`10/2004 Ruizetal.
`2005/0055306 A1
`3/2005 Milleretal.
`2006/0059337 A1
`3/2006 Poyhonen etal.
`2007/0208869 A1
`9/2007 Adelnian etal.
`2007/0214284 A1
`9/2007 King etal.
`2007/0266141 A1
`“/2007 N080“
`2008/0235507 A1
`9/2008 Ishikawa etal.
`
`EP
`EP
`EP
`EP
`GB
`GB
`GB
`JP
`JP
`JP
`
`FOREIGN PATENT DOCUMENTS
`0838930
`4/1988
`0814589
`12/1997
`836306
`4/1998
`0858189
`8/1998
`2317792
`4/1998
`2334181
`8/1999
`2340702
`2/2000
`62-214744
`9/1987
`04-363941
`12/1992
`09-018492
`1/1997
`
`Petitioner Apple Inc. - Exhibit 1027, p. 2
`
`Petitioner Apple Inc. - Exhibit 1027, p. 2
`
`

`

`US 7,987,274 B2
`
`Page 3
`
`JP
`WO
`WO
`WO
`WO
`WO
`WO
`WO
`W0
`W0
`W0
`WO
`
`10-070531
`WO98/27783
`WO9843396
`WO9855930
`WO9859470
`WO99/11019
`WO9938081
`WO9948303
`WO 00/17775
`WO 00/70458
`WO 01/16766
`W00150688
`
`3/1998
`6/1998
`10/1998
`12/1998
`12/1998
`3/1999
`7/1999
`9/1999
`3/2000
`11/2000
`3/2001
`7/2001
`
`OTHER PUBLICATIONS
`
`U.S. Appl. No. 60/151,563, filed Aug. 31, 1999, Bryan Whittles.
`U.S. Appl. No. 09/399,753, filed Sep. 22, 1998, Graig Miller et al.
`Microsoft Corporation’s Fourth Amended Invalidity Contentions
`dated Jan. 5, 2009, VzrnetX Inc. and Science Applications Interna—
`tional Corp. V. Microsoft Corporation.
`Appendix A of the Microsoft Corporation’s Fourth Amended Inval-
`idity Contentions dated Jan. 5, 2009.
`Concordance Table For the References Cited in Tables on pp. 6-15,
`71-80 and 116-124 of the Microsoft Corporation’s Fourth Amended
`Invalidity Contentions dated Jan. 5, 2009.
`1. P Mockapetris, “DNS Encoding of Network Names and Other
`Types,” NetworkWorking Group, RFC 1101 (Apr. 1989) (RFCl 101,
`DNS SRV).
`DNS-related correspondence dated Sep. 7, 1993 to Sep. 20, 1993.
`(Pre KX, KX Records).
`R Atkinson, “An Internetwork Authentication Architecture,” Naval
`Research Laboratory, Center for High Assurance Computing Sys-
`tems (Aug. 5, 1993), (Atkinson NRL, KX Records).
`Henning Schulzrinne, Personal Mobility For Multimedia Services In
`The Internet, Proceedings of the Interactive Distributed Multimedia
`Systems
`and Services European Workshop at
`143
`(1996).
`(Schulzrinne 96).
`Microsoft Corp , Microsoft Virtual Private Networking: Using Point—
`to—Point Tunneling Protocol for Low—Cost, Secure, Remote Access
`Across the Internet (1996) (printed from 1998 PDC DVD-ROM).
`(Point to Point, Microsoft Prior Art VPN Technology).
`“Safe Surfing: How to Build a Secure World Wide Web Connection,”
`IBM Technical Support Organization, (Mar. 1996). (Safe Surfing,
`Website Art).
`, “Hiding Routing Information,” Workshop on
`Goldschlag, et al
`Information Hiding, Cambridge, UK (May 1996). (Goldschlag II,
`Onion Routing).
`“IPSec Minutes From Montreal”, IPSEC Working Group Meeting
`Notes, http://www sandleman ca/ipsec/1996/03/msg00018 html
`(Jun. 1996) (IPSec Minutes, FreeS/WAN).
`J M Galvin, “Public Key Distribution with Secure DNS,” Proceed-
`ings of the Sixth USENIX UNIX Security Symposium, San Jose,
`California, Jul. 1996. (Galvin, DNSSEC).
`J Gilmore, et al “Re: Key Management, anyone? (DNS Keying),”
`IPSec Working Group Mailing List Archives (Aug. 1996). (Gilmore
`DNS, FreeS/WAN).
`H. Orman, et al. “Re: ’Re: DNS? was Re: Key Management, any-
`one?” IETF IPSec Working Group Mailing List Archive (Aug. 1996-
`Sep. 1996). (Orman DNS, FreeS/WAN).
`Arnt Gulbrandsen & Paul Vixie, A DNSRRfor specifying the location
`ofservices (DNS SRV), IETF RFC 2052 (Oct. 1996). (RFC 2052,
`DNS SRV).
`Freier, et al “The SSL Protocol Version 3.0,” Transport Layer Secu-
`rity Working Group (Nov. 18, 1996). (SSL, Underlying Security
`Technology).
`M. Handley, H Schulzrinne, E Schooler, Internet Engineering Task
`Force, Internet Draft, (Dec. 2, 1996) (RFC 2543 Internet Draft 1).
`M G Reed, et a1 “Proxies for Anonymous Routing,” 12th Annual
`Computer Security Applications Conference, San Diego, CA, Dec.
`9-13, 1996. (Reed, Onion Routing).
`Kenneth F Alden & Edward P. Wobber, TheAlta Vista Tunnel: Using
`theInternet to Extend Corporate Networks, Digital Technical Journal
`(1997) (Alden, AltaVista.
`
`
`
`Automative Industry Action Group, “ANX Release 1 Document Pub-
`lication,” AIAG (1997). (AIAG, ANX).
`Automative Industry Action Group, “ANX Release 1 Draft Docu-
`ment Publication,” AIAG Publications (1997).
`(AIAG Release,
`ANX).
`Aventail Corp., “AutoSOCKS v 2.1 Datasheet,” available at http://
`www.archive.org/web/19970212013409/www.aventail.com/prod/
`autosk2ds.html (1997). (AutoSOCKS, Aventail).
`Aventail Corp, “Aventail VPN Data Sheet,” available at http://www.
`archive.org/web/l9970212013043/www.aventail.com/prod/
`vpndata.html (1997) .(Data Sheet, Aventail).
`Aventail Corp , “Directed VPN Vs. Tunnel,” available at http://web.
`archive.org/web/l9970620030312/www.aventail.com/educate/
`directvpn.html (1997). (Directed VPN, Aventail).
`Aventail Corp , “Managing Corporate Access to the Internet,”
`Aventail AutoSOCKS White Paper available at http://web.archive.
`org/web/ 19970620030312/www.aventail.com/educate/whitepaper/
`ipmwp.html (1997). (Corporate Access, Aventail).
`Aventail Corp., “Socks Version 5,” Aventail Whitepaper, available at
`http://web.archive.org/web/19970620030312/www.aventail.com/
`educate/whitepaper/sockswp html (1997) (Socks, Aventail).
`Aventail Corp., “VPN Server V2.0 Administration Guide,” (1997)
`(VPN, Aventail).
`Goldschlag, et a1 “Privacy on the Internet,” Naval Research Labora-
`tory, Center
`for High Assurance Computer Systems
`(1997).
`(Goldschlag I, Onion Routing).
`VIicrosoft Corp , Installing Configuring and Using PPTP with
`Microsoft Clients and Servers (1997). (Using PPTP, Microsoft Prior
`Art VPN Technology).
`VIicrosoft Corp., IP Securityfor Microsoft Windows NT Server 5.0
`(1997) (printed from 1998 PDC DVD-ROM). (IP Security, Microsoft
`Prior Art VPN Technology).
`VIicrosoft Corp , Microsoft Windows NTActive Directory: An Intro—
`duction to the Next Generation Directory Services (1997) (printed
`from 1998 PDC DVD-ROM) (Directory, Microsoft Prior Art VPN
`Technology).
`VIicrosoft Corp , Routing andRemoteAccess Servicefor Windows NT
`Server NewOpportunities Today and Looking Ahead (1997) (printed
`from 1998 PDC DVD-ROM).(Routing, Microsoft Prior Art VPN
`Technology).
`VIicrosoft Corp. , Understanding Point—to—Point Tunneling Protocol
`PPTP (1997) (printed from 1998 PDC DVD-ROM). (Understanding
`PPTP, Microsoft Prior Art VPN Technology).
`J Mark Smith et a1 , Protecting a Private Network: The Alta Vista
`Firewall, Digital Technical Journal (1997). (Smith, AltaVista).
`Naganand Doraswamy Implementation of Virtual Private Networks
`(VPNs) with IPSecurity, <draft-ietf-ipsec-vpn-00.txt> (Mar. 12,
`1997). (Doraswamy).
`M. Handley, H. Schulzrinne, E Schooler, Internet Engineering Task
`Force, Internet Draft, (Mar. 27, 1997) (RFC 2543 Internet Draft 2).
`Aventail Corp., “Aventail and Cybersafe to Provide Secure Authen-
`tication For Internet and Intranet Communication,” Press Release,
`Apr. 3, 1997. (Secure Authentication, Aventail).
`D Wagner, et al. “Analysis of the SSL 3.0 Protocol,” (Apr. 15, 1997)
`(Analysis, Underlying Security Technologies).
`Automotive Industry Action Group, “ANXO Certification Authority
`Service and Directory Service Definition for ANX Release 1,” AIAG
`Telecommunications Project Team and Bellcore (May 9, 1997).
`(AIAG Defintion, ANX).
`Automotive Industry Action Group, “ANXO Certification Process
`and ANX Registration Process Definition for ANX Release 1,”AIAG
`Telecommunications Project Team and Bellcore (May 9, 1997).
`(AIAG Certification, ANX).
`Aventail Corp., “Aventail Announces the First VPN Solution to
`Assure Interoperability Across Emerging Security Protocols,” Jun. 2,
`1997, (First VPN, Aventail).
`Syverson, et al. “Private Web Browsing,” Naval Research Laboratory,
`Center for High 8 Assurance Computer Systems (Jun. 2, 1997).
`(Syverson, Onion Routing).
`Bellcore, “Metrics, Criteria, and Measurement Technique Require-
`ments for ANX Release 1,” AIAG Telecommunications Project Team
`and Bellcore (Jun. 16, 1997) (AIAG Requirements, ANX).
`
`Petitioner Apple Inc. - Exhibit 1027, p. 3
`
`Petitioner Apple Inc. - Exhibit 1027, p. 3
`
`

`

`US 7,987,274 B2
`
`Page 4
`
`M. Handley, H. Schulzrinne, E. Schooler, Internet Engineering Task
`Force, Internet Draft, (Jul. 31, 1997) (RFC 2543 Internet Draft 3).
`R. Atkinson, “Key Exchange Delegation Record for the DNS,” Net-
`work Working Group, RFC 2230 (Nov. 1997). (RFC 2230, KX
`Records).
`M. Handley, H Schulzrinne, E. Schooler, Internet Engineering Task
`Force, Internet Draft, (Nov. 11, 1997). (RFC 2543 Internet Draft 4).
`1998 Microsoft Professional Developers Conference DVD (“1998
`PDC DVD-ROM”) (including screenshots captured therefrom and
`produced
`as MSFTVX 00018827-00018832).
`(Conference,
`Microsoft Prior Art VPN Technology).
`Microsoft Corp , Virtual Private Networking An Overview (1998)
`(printed from 1998 PDC DVD-ROM) (Overview, Microsoft PriorArt
`VPN Technology).
`Microsoft Corp., Windows NT 5.0 Beta Has Public Premiere at
`Seattle Mini—Camp Seminar attendees get first look at the perfor—
`mance and capabilities ofWindows NT 5 0 (1998) (available at hap //
`www.micro soft
`com/presspass/features/l998/10-19nt5.
`mspxpftrue).(NT Beta, Microsoft Prior Art VPN Technology).
`“What ports does SSL use” available at stason.org/TULARC/secu-
`rity/ssl-talld3-4-What-ports-does-ssl-use.htrnl (1998). (Ports, DNS
`SRV).
`Aventail Corp., “Aventail VPNV2.6 Includes Support for More Than
`Ten Authentication Methods Making Extranet VPN Development
`Secure and Simple,” Press Release, Jan. 19, 1998. (VPN V2.6,
`Aventail).
`R. G. Moskowitz, “Network Address Translation Issues with IPsec,”
`Internet Draft,
`Internet Engineering Task Force, Feb. 6, 1998.
`(Moskowitz).
`H. Schulzrinne, et al, “Internet Telephony Gateway Location,” Pro-
`ceedings of IEEE INfocom ’98, The Conference on Computer Com-
`munications, vol. 2 ( Mar. 29-Apr. 2, 1998). (Gateway, Schulzrinne).
`C. Huitema, 45 a1 “Simple Gateway Control Protocol,” Version 1 0
`(May 5, 1998) (SGCP).
`DISA “Secret Internet Protocol Router Network,” SIPRNET Pro-
`gram Management Office (D31 13) DISN Networks, DISN Transmis-
`sion Services (May 8, 1998). (DISA, SIPRNET).
`VI. Handley, H. Schulzrinne, E. Schooler, Internet Engineering Task
`Force, Internet Draft, (May 14, 1998) (RFC 2543 Internet Draft 5).
`VI. Handley, H. Schulzrinne, E. Schooler, Internet Engineering Task
`Force, Internet Draft, (Jun. 17, 1998) (RFC 2543 Internet Draft 6).
`D. McDonald, et al. “PFiKEY Key Management API, Version 2,”
`\Ietwork Working Group, RFC 2367 (Jul. 1998). (RFC 2367).
`VI Handley, H. Schulzrinne, E. Schooler, Internet Engineering Task
`Force, Internet Draft, (Jul. 16, 1998). (RFC 2543 Internet Draft 7).
`VI Handley, H. Schulzrinne, E. Schooler, Internet Engineering Task
`Force, Internet Draft, (Aug. 7, 1998) (RFC 2543 Internet Draft 8).
`VIicrosoft Corp., Company Focuses on Quality and Customer Feed—
`back(Aug. 18, 1998). (Focus, Microsoft PriorArtVPN Technology).
`VI Handley, H Schulzrinne, E. Schooler, Internet Engineering Task
`Force, Internet Draft, (Sep. 18, 1998). (RFC 2543 Internet Draft 9).
`Atkinson, et a1. “Security Architecture for the Internet Protocol,”
`\Ietwork Working Group, RFC 2401 (Nov. 1998). (RFC 2401,
`Underlying Security Technologies).
`VI. Handley, H Schulzrinne, E. Schooler, Internet Engineering Task
`Force, Internet Draft, (Nov. 12, 1998) (RFC 2543 Internet Draft 10)
`9.
`Donald Eastlake, Domain Name System Security Extensions, IETF
`DNS Security Working Group (Dec. 1998). (DNSSEC-7).
`M Handley, H Schulzrinne, E. Schooler, Internet Engineering Task
`Force, Internet Draft, (Dec. 15, 1998). (RFC 2543 Internet Draft 11).
`Aventail Corp., “Aventail Connect 3.1/2.6Administrator’s Guide,”
`(1999). (Aventail Administrator 3 1, Aventail).
`Aventail Corp., “Aventail Connect 3 1/2.6 User’s Guide,” (1999)
`(Aventail User 3.1, Aventail).
`Aventail Corp., “Aventail ExtraWeb Server v3 2 Administrator’s
`Guide,” (1999) (Aventail ExtraWeb 3 2, Aventail).
`Kaufman et al, “Implementing IPsec,” (Copyright 1999). (Imple-
`menting IPSEC, VPN References).
`Network Solutions,
`Inc. “Enabling SSL,” NSI Registry (1999).
`(Enabling SSL, Underlying Security Technologies).
`Check Point Software Technologies Ltd.
`(1999) (Check Point,
`Checkpoint FW).
`
`
`
`Arnt Gulbrandsen & PaulVixie, A DNSRRfor specifying the location
`of services (DNS SRV), <draft-ietf-dnsind-frc2052bis-02.txt> (Jan.
`1999). (Gulbrandsen 99, DNS SRV).
`C. Scott, et al. Virtual Private Networks, O’Reilly and Associates,
`Inc, 2nd ed (Jan. 1999). (Scott VPNs).
`M. Handley, H. Schulzrinne, E Schooler, Internet Engineering Task
`Force, Internet Draft, (Jan. 15, 1999) (RFC 2543 Internet Draft 12).
`Goldschlag, et al
`, “Onion Routing for Anonymous and Private
`Internet Connections,” Naval Research Laboratory, Center for High
`Assurance Computer Systems (Jan. 28, 1999). (Goldschlag III,
`Onion Routing).
`H. Schulzrinne, “Internet Telephony: architecture and protocolsian
`IETF perspective,” Computer Networks, vol. 31, No. 3 (Feb. 1999).
`(Telephony, Schulzrinne).
`M. Handley, et al. “SIP: Session Initiation Protocol,” Network Work-
`ing Group, RFC 2543 and Internet Drafts (Dec. 1996-Mar. 1999).
`(Handley, RFC 2543).
`FreeS/WAN Project, LinuxFreeS/WAN Compatibility Guide (Mar. 4,
`1999) (FreeS/WAN Compatibility Guide, FreeS/WAN).
`Telcordia Technologies, “ANX Release 1 Document Corrections,”
`AIAG (May 11, 1999). (Telcordia, ANX).
`Ken Hornstein & Jeffrey Altman, Distributing Kerberos KDC and
`Realm Information with DNS <draft-eitf-cat-krb-dns-locate-oo.txt>
`(Jun. 21, 1999). (Hornstein, DNS SRV).
`Bhattacharya et. al. “An LDAP Schema for Configuration and
`Administration of IPSec Based Virtual Private Networks (VPNs)”,
`IETF Internet Draft (Oct. 1999) (Bhattcharya LDAP VPN).
`B. Patel, et al “DHCP Configuration of IPSEC Tunnel Mode,” IPSEC
`Working Group, Internet Draft 02 (Oct. 15, 1999). (Patel).
`Goncalves, et al. Check Point FireWall —1 Administration Guide,
`McGraw-Hill Companies (2000). (Goncalves, Checkpoint FW).
`“Building a Microsoft VPN: A Comprehensive Collection of
`Microsoft Resources,” FirstVPN, (Jan. 2000). (FirstVPN Microsoft).
`Gulbrandsen, Vixie, & Esibov, A DNS RRfor specifying the location
`ofservices (DNS SRV), IETF RFC 2782 (Feb. 2000). (RFC 2782,
`>
`DNS SRV).
`MITRE Organization,
`“Technical Description,’ Collaborative
`Operations in Joint Expeditionary Force Experiment (JEFX) 99 (Feb.
`2000). (MITRE, SIPRNET).
`H. Schulzrinne, et al. “Application-Layer Mobility Using SIP,”
`Mobile Computing and Communications Review, vol. 4, No. 3. pp.
`47-57 (Jul. 2000). (Application, SIP).
`Kindred et al, “Dynamic VPN Communities: Implementation and
`Experience,” DARPA Information Survivability Conference and
`Exposition II (Jun. 2001). (DARPA, VPN Systems).
`ANX 101: Basic ANX Service Outline. (Outline, ANX).
`ANX 201: Advanced ANX Service. (Advanced, ANX).
`Appendix A: Certificate Profile for ANX IPsec Certificates. (Appen-
`dix, ANX).
`Assured Digital Products. (Assured Digital).
`Aventail Corp., “Aventail AutoSOCKS the Client Key to Network
`Security,” Aventail Corporation White Paper. (Network Security,
`Aventail).
`Cindy Moran, “DISN Data Networks: Secret Internet Protocol
`Router Network (SIPRNet).” (Moran, SIPRNET).
`Data Fellows F-Secure VPN+ (F-Secure VPN+).
`Interim Operational Systems Doctrine for the Remote Access Secu-
`rity Program (RASP) Secret Dial-In Solution. (RASP, SIPRNET).
`Onion Routing, “Investigation ofRoute Selection Algorithms,” avail-
`able
`at
`http://www.onion-router.net/Archives/Route/index.html.
`(Route Selection, Onion Routing).
`Secure Computing, “Bullet-Proofing an Army Net,” Washington
`Technology (Secure, SIPRNET).
`Sparta “Dynamic Virtual Private Network” (Sparta, VPN Systems).
`Stande Operation Procedure for Using the 1910 Secure Modems.
`(Standard, SIPRNET).
`FreeS/WAN
`to
`relating
`emails
`Publically
`available
`(MSFTVX00018833 -MSFTVX0019206).
`(FreeS/WAN emails,
`FreeS/WAN).
`Kaufman et al., “Implementing lPsec,” (Copyright 1999) (Imple-
`menting IPsec).
`Network Associates Gauntlet Firewall For Unix User’s Guide Ver—
`sion 5.0 (1999). (Gauntlet User’s GuideiUnix, Firewall Products).
`
`Petitioner Apple Inc. - Exhibit 1027, p. 4
`
`Petitioner Apple Inc. - Exhibit 1027, p. 4
`
`

`

`US 7,987,274 B2
`
`Page 5
`
`Network Associates Gauntlet Firewall For Windows NT Getting
`Started Guide Version 5.0 (1999) (Gauntlet Getting Started Guidei
`NT, Firewall Products).
`Network Associates Gauntlet Firewall For Unix Getting Started
`Guide Version 5.0 (1999) (Gauntlet Unix Getting Started Guide,
`Firewall Products).
`Network Associates Release Notes Gauntlet Firewall for Unix 5.0
`(Mar. 19, 1999) (Gauntlet Unix Release Notes, Firewall Products).
`NetworkAssociates Gauntlet Firewall For Windows NTAdministra—
`tor ’s Guide Version 5. 0 (1999) (Gauntlet NT Administrator’ s Guide,
`Firewall Products).
`Internet Firewall
`Inc Gauntlet
`Trusted Information Systems,
`Firewall—to—Firewall Encryption Guide Version 3.1 (1996) (Gauntlet
`Firewall-to-Firewall, Firewall Products).
`Network Associates Gauntlet Firewall Global Virtual Private Net—
`work User ’s Guidefor Windows NT Version 5. 0 (1999) (Gauntlet NT
`GVPN, GVPN).
`Network Associates Gauntlet Firewall For UNIX Global Virtual Pri—
`vate Network User’s Guide Version 5. 0 (1999) (Gauntlet Unix
`GVPN, GVPN).
`Dan Sterne Dynamic Virtual Private Networks (May 23, 2000)
`(Sterne DVPN, DVPN).
`Darrell Kindred Dynamic Virtual Private Networks (DVPN) (Dec.
`21, 1999) (Kindred DVPN, DVPN).
`Dan Sterne et.al. TIS Dynamic Security Perimeter Research Project
`Demonstration (Mar. 9, 1998)
`(Dynamic Security Perimeter,
`DVPN).
`Darrell Kindred Dynamic Virtual Private Networks Capability
`Description (Jan. 5, 2000) (Kindred DVPN Capability, DVPN) 11.
`Oct.
`7,
`and 28,
`1997 email
`from Domenic
`J. Turchi
`Jr
`(SPARTA00001712-1714,
`1808-1811)
`(Turchi DVPN email,
`DVPN).
`James Just & Dan Sterne Security Quickstart Task Update (Feb. 5,
`1997) (Security Quickstart, DVPN).
`Virtual Private Network Demonstration dated Mar. 21, 1998
`(SPARTA00001844-54) (DVPN Demonstration, DVPN).
`GTE Internetworking & BBN Technologies DARPA Information
`Assurance Program Integrated Feasibility Demonstration (IFD) 1.]
`Plan (Mar. 10, 1998) (IFD 1.1, DVPN).
`Microsoft Corp Windows NT Server Product Documentation:
`Administration Guide%onnection Point Services, available at
`http://www
`microsoft.com/technet/archive/winntas/proddocs/
`inetconctservice/cpsops.mspx
`(Connection
`Point
`Services)
`(Although undated, this reference refers to the operation of prior art
`versions of Microsoft Windows Accordingly, upon information and
`belief, this reference is prior art to the patents-insuit.).
`Microsoft Corp. Windows NT Server Product Documentation:
`Administration Kit GuideiConnection Manager, available at http://
`www.micro soft.com/technet/archive/winntas/proddocs/
`(Although
`inetconctservice/cmak mspx (Connection Manager)
`undated, this reference refers to the operation of prior art versions of
`Microsoft Windows such as Windows NT 4.0. Accordingly, upon
`information and belief, this reference is prior art to the patents-in-
`suit.).
`Microsoft Corp. Autodial Heuristics, available at http://support.
`microsoft.com/kb/ 164249 (Autodial Heuristics) (Although undated,
`this reference refers to the operation ofprior art versions of Microsoft
`Windows such as Windows NT 4 0. Accordingly, upon information
`and belief, this reference is prior art to the patents-in-suit.).
`Microsoft Corp., Cariplo: Distributed Component Object Model,
`(1996)
`available
`at
`http://msdn2.microsoft.com/en-us/library/
`ms809332(printer).aspx (Cariplo I).
`Marc Levy, COM Internet Services (Apr. 23, 1999), available at
`http://msdn2.microsoft.com/en-us/library/ms809302(printer).aspx
`(Levy).
`Markus Horstmann and Mary Kirtland, DCOM Architecture (Jul. 23,
`1997),
`available
`at
`http://msdn2.microsoft.com/en-us/library/
`ms80931 1(printer).aspx (Horstmann).
`Microsoft Corp., DCOM: A Business Overview (Apr. 1997), avail-
`able at http://msdn2.microsoft com/en-us/library/ms809320(printer)
`aspx (DCOM Business Overview I).
`
`
`
`VIicrosoft Corp., DCOM Technical Overview (Nov. 1996), available
`at http://msdn2 micro soft com/en-us/iibrary/ms809340(printer) aspx
`(DCOM Technical Overview I).
`VIicrosoft Corp., DCOM Architecture White Paper (1998) available
`in PDC DVD-ROM (DCOM Architecture).
`VIicrosoft Corp, DCOMiThe Distributed Component Object
`VIodel, A Business Overview White Paper (Microsoft 1997) avail-
`able in PDC DVD-ROM (DCOM Business Overview II).
`VIicrosoft Corp., DCOMiCariplo Home Banking Over The Internet
`White Paper (Microsoft 1996) available in PDC DVD-ROM (Cariplo
`II).
`VIicrosoft Corp., DCOM Solutions in Action White Paper (Microsoft
`1996) available in PDC DVD-ROM (DCOM Solutions in Action).
`VIicrosoft Corp., DCOM Technical Overview White Paper
`(Microsoft 1996) available 12 in PDC DVD-ROM (DCOM Technical
`Overview II).
`125. Scott Suhy & Glenn Wood, DNS and Microsoft Windows NT 4
`0,
`(1996) available at http://msdn2.microsoft.com/en-us/library/
`ms810277(printer).aspx (Suhy).
`126. Aaron Skonnard, Essential WinInet 313-423 (Addison Wesley
`Longman 1998) (Essential WinInet).
`Microsoft Corp Installing, Configuring, and Using PPTP with
`Microsoft Clients and Servers, (1998) available at http://msdn2.
`microsoft.com/enus/library/ms811078(printer).aspx (Using PPTP).
`Microsoft Corp., Internet Connection Services for MS RAS, Stan-
`dard Edition, http://www.microsoft.com/technet/archive/winntas/
`proddocs/inetconctservice/bcgstart mspx (Internet Connection Ser-
`vices I).
`Microsoft Corp., Internet Connection Services for RAS, Commercial
`Edition,
`available
`athttp://www microsoft.com/technet/archive/
`winntas/proddocs/inetconctservice/bcgstrtc.mspx (Internet Connec-
`tion Services II).
`Microsoft Corp., Internet Explorer 5 Corporate Deployment Guidei
`Appendix B:Enabling Connections with the Connection Manager
`Administration Kit, available at http://www.microsoft.com/technet/
`prodtechnol/
`ie/deploy/deploy5/appendb.mspx
`(IE5 Corporate
`Development).
`Mark Minasi, Mastering Windows NT Server 4 1359-1442 (6th ed ,
`Jan. 15, 1999)(Mastering Windows NT Server).
`Hands On, Self—Paced Trainingfor Supporting Version 4.0 371-473
`(Microsoft Press 1998) (Hands On).
`Microsoft Corp., MS Point-to-Point Tunneling Protocol (Windows
`NT 4.0), available at http://www.microsoft.com/technet/archive/
`winntas/maintain/featusability/pptpwp3.mspx (MS PPTP).
`Kenneth Gregg, et al., Microsoft Windows NTServerAdministrator ’s
`Bible 173 -206, 883 -911, 974-1076 (IDG Books Worldwide 1999)
`(Gregg)
`Microsoft Corp., Remote Access (Windows), available at http://
`msdn2 microsoft.com/en-us/library/bb545687(VS.85,printer).aspx
`(Remote Access).
`Microsoft Corp., Understanding PPTP (Windows NT 4.0), available
`at http://www.microsoft.com/technet/archive/winntas/plan/pptpudst
`mspx (Understanding PPTP NT 4) (Although undated, this reference
`refers to the operation of prior art versions of Microsoft Windows
`such as Windows NT 4.0 Accordingly, upon information and belief,
`this reference is prior art to the patents-in-suit.).
`Microsoft Corp , Windows NT 4.0: Virtual Private Networking, avail-
`able at http://www.microsoft.com/technet/archive/winntas/ deploy/
`confeat/vpntwk mspx (NT4 VPN) (Although undated, this reference
`refers to the operation of prior art versions of Microsoft Windows
`such as Windows NT 4 0 Accordingly, upon information and belief,
`this reference is prior art to the patents-in-suit.).
`Anthony Northrup, NT Network Plumbing.‘ Routers, Proxies, and
`Web Services 299-399 (IDG Books Worldwide 1998) (Network
`Plumbing).
`Microsoft Corp., Chapter lilntroduction to Windows NT Routing
`with Routing and Remote Access Service, Available at http://www.
`micro soft. com/technet/archive/winntas/proddoc s/
`rras40/rrasch01 .
`mspx (Intro to RRAS) (Although undated, this reference refers to the
`operation of prior art versions of Microsoft Windows such as Win-
`dows NT 4 0. Accordingly, upon information and belief, this refer-
`ence is prior art to the patents-in-suit.) 13.
`
`Petitioner Apple Inc. - Exhibit 1027, p. 5
`
`Petitioner Apple Inc. - Exhibit 1027, p. 5
`
`

`

`US 7,987,274 B2
`
`Page 6
`
`(May 1999)
`
`(FSECURE
`
`(from FSECURE
`
`Microsoft Corp., Windows NT Server Product Documentation:
`Chapter 57Planning for Large-Scale Configurations, available at
`http://www.microsoft.com/technet/archive/winntas/proddocs/
`rras40/rrasch05.mspx (Large-Scale Configurations)
`(Although
`undated, this reference refers to the operation of prior art versions of
`Microsoft Windows such as Windows NT 4 0 Accordingly, upon
`information and belief, this reference is prior art to the patents-in-
`suit.).
`F-Secure, F—Secure Evaluation Kit
`00000003) (Evaluation Kit 3).
`F-Secure, F—Secure NameSurfer (May 1999)
`00000003) (NameSurfer 3).
`F-Secure, F—Secure VPN Administrator ’s Guide (May 1999) (from
`FSECURE 00000003) (F-Secure VPN 3).
`F-Secure, F—Secure SSH User’s & Administrator’s Guide (May
`1999) (from FSECURE 00000003) (SSH Guide 3).
`F-Secure, F—Secure SSH2 0 for Windows NT and 95 (May 1999)
`(from FSECURE 00000003) (SSH 2.0 Guide 3).
`F-Secure, F—Secure VPN+ Administrator’s Guide (May 1999) (from
`FSECURE 00000003) (VPN+ Guide 3).
`F-Secure, F—Secure VPN+ 4.1 (1999) (from FSECURE 00000006)
`(VPN+ 4.1 Guide 6).
`F-Secure, F—Secure SSH(1996) (from FSECURE 00000006) (F-Se-
`cure SSH 6).
`F-Secure, F—Secure SSH 2.0for Windows NT and 95 (1998) (from
`FSECURE 00000006) (F-Secure SSH 2.0 Guide 6).
`F-Secure, F—Secure Evaluation Kit
`(Sep.
`1998)
`00000009) (Evaluation Kit 9).
`F-Secure, F—Secure SSH User’s & Administrator’s Guide (Sep.
`1998) (from FSECURE 00000009) (SSH Guide 9).
`F-Secure, F—Secure SSH 2.0for Windows NT and 95 (Sep. 1998)
`(from FSECURE 00000009) (F-Secure SSH 2.0 Guide 9).
`F-Secure, F—Secure VPN+ (Sep. 1998) (from FSECURE 00000009)
`(VPN+ Guide 9).
`F-Secure, F—Secure Management Tools, Administra

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket