`
`UTILITY PATENT APPLICATION TRANSMITTAL
`(Large Entity)
`
`(Only for new nonprovisional applications under 37 CFR 1.53(b))
`
`77530_066?$§§e.2i%p2DvCN2)
`
`Total Pages in this Submission
`
`COMMISSIONER FOR PATENTS
`P.O. Box 1450
`
`Alexandria, VA 22313-1450
`
`Transmitted herewith for filing under 35 USC. 111(a) and 37 CFR. 1.53(b) is a new utility patent application for an
`invention entitled:
`
`METHOD FOR ESTABLISHING SECURE COMMUNICATION LINK BETWEEN COMPUTERS OF VIRTUAL
`PRIVATE NETWORK
`
`d invented by:
`
`Victor Larson, Robert Dunham Short III, Edmund Colby Munger and Michael Williamson
`
`If a CONTlNUATlON APPLICATION, check appropriate box and supply the requisite information:
`
`Continuation
`
`:1 Divisional
`
`Cl Continuation-in-part (CIP)
`
`of prior application No.:
`
`11/679,416
`
`Which is a:
`
`Z Continuation 3 Divisional
`
`Cl Continuation-in-part (CIP)
`
`of prior application No.:
`
`10/702,486
`
`Which is a:
`
`3 Continuation
`
`XI Divisional
`
`Cl Continuation-in-part(ClP)
`
`ofpriorapplication No.:
`
`09/558,209
`
`Enclosed are:
`
`Filing fee as calculated and transmitted as described below
`
`Application Elements
`
`Specification having
`
`78
`
`pages and including the following:
`
`Descriptive Title of the invention
`
`Cross References to Related Applications (if applicable)
`
`Statement Regarding Federally-sponsored Research/Development (if applicable)
`
`Reference to Sequence Listing, a Table, or a Computer Program Listing Appendix
`
`Background of the Invention
`
`Brief Summary of the Invention
`
`Brief Description of the Drawings (if filed)
`
`Detailed Description
`
`Claim(s) as Classified Below
`
`Abstract of the Disclosure
`
`I>_<J|xJI>_<JI§JI§JI§JI_JI_J|zJI&
`
`Page] of4
`
`PO1ULRGIREVil
`
`Petitioner Apple Inc. — Exhibit 1028, p. 1
`
`Petitioner Apple Inc. - Exhibit 1028, p. 1
`
`
`
`
`
`UTILITY PATENT APPLICATION TRANSMITTAL
`
`77580-066 (VRNK-ICPZDVCNZ)
`
`Docket No.
`
`(Large Entity)
`
`(Only for new nonprovisional applications under 37 CFR 1.53(b))
`
`Total Pages in this Submission
`
`
`
`
`
`
` Application Elements (Continued)
`
`3
`Drawing(s) (when necessary as prescribed by 35 USC 113)
`
`a.
`
`Formal
`
`Number of Sheets
`
`40
`
`
`
`
`b.
`
`:l
`
`Informal
`
`Number of Sheets
`
`4 D Oath or Declaration
`
`a.
`
`:l
`
`Newly executed (original or copy)
`
`Cl Unexecuted
`
`b. C] Copy from a prior application (37 CFR ‘l.63(d)) (for continuation/divisional application only)
`
`CA
`
`I! With Power of Attorney
`
`CI Without Power of Attorney
`
`d. D DELET/ON OF /NVENTOR(S)
`Signed statement attached deleting inventor(s) named in the prior application,
`see 37 CNFHRI 1.63(d)(2) and 1.33(b).
`
`
`
`
`
`
`51
`
`
`
`incorporation By Reference (usable if Box 4b is checked)
`The entire disclosure of the prior application, from which a copy of the oath or declaration is supplied under
`Box 4b,
`is considered as being part of the disclosure of the accompanying application and is hereby
`incorporated by reference therein.
`
`CD ROM or CD-R in duplicate, large table or Computer Program (Appendix)
`wt]
`>1.
`
`Application Data Sheet (See 37 CFR 1.76)
`@
`
`,U'.°’U
`
`
`
`
`Nucleotide andlor Amino Acid Sequence Submission (if applicable, all must be included)
`
`D Computer Readable Form (CRF)
`
`Cl
`
`Specification Sequence Listing on:
`
`i. D CD-ROM or CD—R (2 copies); or
`
`
`
`
`
`
`ii. Cl
`
`Paper
`
`
`
`Statement(s) Verifying Identical Paper and Computer Readable Copy
`
`Accompanying Application Parts
`
` D Assignment Papers (cover sheet & document(s))
`10. D 37 CFR 3.73(B) Statement (when there is an assignee)
`
`11. D English Translation Document (if applicable)
`
`12, D Information Disclosure StatementlPTO-1449
`
`Cl Copies of IDS Citations
`
`13. D Preliminary Amendment
`
`14.
`
`Return Receipt Postcard (MPEP 503) (Should be specifically itemized)
`
`
`
`15. D Certified Copy of Priority Document(s) (if foreign priority is claimed)
`
`16.
`
`Certificate of Mailing
`
`Cl
`
`FirstClass
`
`Express Mail (Specify Label No):
`
`
`
`
`
`
`Page 2 of4
`
`P01ULRG/REVH
`
`Petitioner Apple Inc. — Exhibit 1028, p. 2
`
`
`
`
`
`
`Petitioner Apple Inc. - Exhibit 1028, p. 2
`
`
`
`UTILITY PATENT APPLICATION TRANSMITTAL
`(Large Entity)
`
`(Only for new nonprovisional applications under 37 CFR 1.53(b))
`
`775s0_065?\?1(:1:1e;fl%p2DVcN2)
`
`Total Pages in this Submission
`
`Accompanying Application Parts (Continued)
`
`17.
`
`1:] Additional Enclosures (please identify below):
`
`Request That Application Not Be Published Pursuant To 35 U.S.C. 122(b)(2)
`
`18.
`
`1:] Pursuant to 35 U.S.C. 122(b)(2), Applicant hereby requests that this patent application not be
`published pursuant to 35 U,S.C. ‘l22(b)(‘l). Applicant hereby certifies that the invention disclosed in
`this application has not and will not be the subject of an application filed in another country, or under
`a multilateral international agreement, that requires publication of applications 18 months after filing
`of the application.
`
`Warning
`
`An applicant who makes a request not to publish, but who subsequently files in a foreign
`country or under a multilateral international agreement specified in 35 U.S.C. 122(b)(2)(B)(i),
`must notify the Director of such filing not later than 45 days after the date of the filing of
`such foreign or international application. A failure of the applicant to provide such notice
`within the prescribed period shall result in the application being regarded as abandoned,
`unless it is shown to the satisfaction of the Director that the delay in submitting the notice
`was unintentional.
`
`19. C] Other:
`
`Page 3 of4
`
`PO1ULRGlREV11
`
`Petitioner Apple Inc. — Exhibit 1028, p. 3
`
`Petitioner Apple Inc. - Exhibit 1028, p. 3
`
`
`
`UTILITY PATENT APPLICATION TRANSMITTAL
`(Large Entity)
`
`(Only for new nonprovisional applications under 37 CFR 1.53(b))
`
`77580-06.?5’§'ff.§§‘$p2DVCN2,
`
`Total Pages in this Submission
`
`Fee Calculation and Transmittal
`
`CLAIMS AS FILED
`
`For
`
`#Filed
`
`#Allowed
`
`#Extra
`
`Rate
`
`=
`1
`i
`Total Claims
`=
`1
`i
`lndep. Claims
`Multiple Dependent Claims (check if applicable)
`Total # of Pages in Specification
`78
`L.
`Total # of Sheets
`i
`118
`
`OTHER FEE (specify purpose)
`
`$50.00
`$200.00
`
`Cl
`40
`i Total # of Drawing Sheets
`Application Size Feefi
`Basic Fee
`
`Search Fee
`
`Examination Fee
`
`$0.00
`$0.00
`$0.00
`
`$250.00
`$300.00
`
`$500.00
`
`$200.00
`
`$0.00
`
`TOTAL FILING FEE
`
`$1,250.00
`
`El A check in the amount of
`
`to cover the filing fee is enclosed.
`
`XI The Director is hereby authorized to charge and credit Deposit Account No.
`as described below.
`
`501133
`
`Charge the amount of
`
`$1,250.00
`
`as filing fee.
`
`|Zl Credit any overpayment.
`
`El Charge any additional filing fees required under 37 C.F.R. 1.16 and 117.
`
`CI Charge the issue fee set in 37 C.F.R. 1.18 at the mailing of the Notice of Allowance,
`pursuant to 37 C.F.R.1.311( ).
`
`Cl Payment by credit card. Form PTO-2038 is attached.
`WARNING: Information on this form may become public. Credit card ’nformation should not be
`included on this form. Provide credit card information and autho ‘ ation on PTO-2038.
`
`Dated: 3/16/07
`
`Customer Number: 23630
`
`/
`
`Signature
`
`Toby H. Kusmer, P.C.
`Reg. No. 26,418
`McDermott Will & Emery LLP
`
`28 State Street
`Boston, MA 02109
`Telephone: 617.535.4065
`Facsimile: 617.535.3800
`
`e-mail: tkusmer@mwe.com
`
`Page 4 Of 4
`
`P01ULRG/REV11
`
`Petitioner Apple Inc. — Exhibit 1028, p. 4
`
`Petitioner Apple Inc. - Exhibit 1028, p. 4
`
`
`
`ADS
`
`.
`
`r19t. @§§i9n¢d
`A999?!
`2997
` 99.ntinuati9ni
`iwtility
`
`
`
`V
`
`
`
`iAipp|eicati9n Information
`Aepliqatiqni Ngmberzz
`Pi!’ 9eP§t9;;._.e..
`Ap.p!i9§ti.9n
`.
`$99199! Matterzs
`$9 99$t¢s! Q!a§$ifi9atii9nie
`Art Unit.
`91 99:8.
`Nyrnb9re9f GP .Pi§.k§
`‘ Number 9f 99pi¢§.9f 9% 4\
`>1
`
`
`
`V
`
`1
`
`ii
`
`iI'\/iethodiifoir Iéstabblishingiéeeurei
`Communication Link Between
`
`.._\/.i.er’£t.4.fe1.i! Private t
`9.77589-9966(VRNK-1QP3P\/CPN2)
`i
`N9
`V N9
`. 1”.
`.. 61.9
`H N9
`
`(QRF)
`I, Iiumber 9f 99i?i¢$ 9f QRF
`e
`i Title::
`
`Ii *
`
`V7
`.Att9rn9y.P99k¢ti
`
`!3§qu9§t f9r E.ar!y....Put2!i<§ati9n::
`E§.§9H9$tef9[i.N9n:Put2!i9ati9n:2 77
`§u99¢stedi.Pr.awin9 Fi9w¢::
`*
`iT9ta!i,|2eirawin9 $.h99t§::
`IA
`
`§mia!I..Entity¢:
`
`,yar.i9ty P9n9minati9n
`'ti9ne.!.n9!u€i9d;:i
`V
`in
`
`
`
`,
`
`wk
`Agenqyéz-
`99ntra9t9r§ra.nt.iiNumb9er$:: #-
`‘: §<?9r99y Qrder in Parent A991.-3:
`
`i
`
`e‘!r1vi§:nt9r1n
`
`V
`
`I W! 9apa9ity_
`
`Vi<.?t9F
`
`
`'—@T§9U
`
`Fairiéx
`
`'
`
`J I
`
`Page 1 of4
`
`Initial 8/16/2007
`
`Petitioner Apple Inc. —
`
`Exhibit 1028, p. 5
`
`i Aippli¢ant|.nf9rrr1ation
`A.9e9!i9anti Aiutheriity Typezz
`’ E.rin1,;ary 9itiz9n$hiip Cswntryzé
`V-
`Naméé;
`Nam9;:
`Fi§mi!yi.N@.. 9:;
`
`
`
`
`I.
`i City 9f R¢$ic!¢n¢e:=
`
`BST99 1549648~l.O77580.0066
`
`Petitioner Apple Inc. - Exhibit 1028, p. 5
`
`
`
`L
`
`.
`
`LL
`
`
`
`Z §taLtL§ 9r PLr9Lvin99 9f R¢§i<i¢n99::
`'999LntryLL9fR9§id¢nL9§:;
`L
`12036
`X
`SLtLr<L¢<LL:tLL<LLL>f mLai!inL9L d<#r<LaL§$L::
`LLFL§urfax
`L
`LL
`Qity 9fmLailin9 a<!¢|r§$$::LL
`State 9r PLr9vin99 9f mLai!in9 Lad¢!r¢§§;:L L
`9tLLma.ilin9La<jLdr¢§L§;: LLL L
`L
`V] L
`P9§Lta! 9r §ipLCL?99!<? 9frr1LaLilLin9_ adLdr¢§§;:
`
`44
`
`L
`
`
`LL
`Mari? €?9urt
`
`L
`
`
`
`I!
`
`I LAL9pli9L§nt.LLLAutLh9rityLTyLp9:rLL LL
`[LLLErimaw C?itiLz9n$hLiLp CL?9!4ntry;;
`
`L
`L
`
`
`Namezé
`NaLmL¢rL;L
`
`
`
`L
`
`L
`
`LL
`
`
`
`
`
`L
`
`L
`
`LL
`
`L
`
`L
`
`J
`
`!LrL!L\L/LsLL3nt<LL>LrZ
`
`E9!LlCapa9ityL
`L Ei9P§rtLL
`V P9nhL§m
`
`L
`;C?LiLtLyL 9fRL<2§id¢n9§L::LLL LL
`LL$taLt¢L9r PLr<L2Lvin9¢ 9f R¢$id¢n99::
`Q9 nLtryLL9fR9§id¢n99::
`
`§tLr9L9tLL.9fm.ai!in9
`Qity 9fLrnL§i!inL9L L
`$tL=LLaLt<§<LL>r PLr9vinL¢¢L9frr1Lailin9L aLddr¢§$¢:
`V»
`LC?91L4Lntry 9tLLm@LLi!in9L @L<L1dr¢§L§;:
`L
`P9§t§! 9rLZLip€?9d9 9f waiting <L'LLaL<i<L?!r9§$;:
`
`L
`
`L
`
`L
`
`
`
`L
`
`LIIIL L L
`L_LLLs3L<?§PLur9
`I VLLALL
`
`LL
`LL
`44
`L
`L
`L
`L LL $8719 C599§9L§?r9<%k Lane L
`L" LLLLeL9§b9r9
`L VAL.
`L
`
`L
`
`L
`
`39175
`
`:LAppli9antLAuth9rity Tmzz
`C?itLiLzL<L?n§hip
`
`tlLLJL§L=L:LL L
`L
`
`LSLtL
`
`F9mLilyLLLN§Lm¢:;
`
`
`L
`
`
`
`LL
`
`LL
`
`
`
`L
`
`
`
`L
`
`Ins/L§nt9rL?r
`L
`L.LLLEu!LlL9a9a¢ity
`
`L
`
`L
`
`’
`
`L
`
`9L9!Lby
`L Mungér
`
`
`
`LL
`
`
`
`L
`9fR§§id9n¢¢::LLLL
`'$tate9rPLr9vin<2¢ 9fR¢$id¢n¢e::
`Q9unLtryLL9fLR<LL3§id¢nL9L¢::L
`LL
`L $tr§9tLLL9f LmLai!in9 LaLL<J9|r9§$:L:
`
`Qfmailing ad9!r9$§:;LLL
`‘ State or PLr9vinL9¢ 9f mLaLi!in9 a¢|LdLr¢$$:;
`9fLma.iL!in9 L<f:IL<LiL<LiLr9§§:;
`L
`44
`\ P9$taLlLL9r
`999'? cf mailing addre§$::
`
`V
`
`3 §2Lr9wn$vil!¢
`
`L
`1.191 QLp§9a 999$
`£2Lr9wLn§vill¢
`
`i
`
`21032
`
`L
`
`BST99 1549648—l.O77580.0066
`
`Page 2 of4
`
`Initial 8/16/2007
`
`Petitioner Apple Inc. — Exhibit 1028, p. 6
`
`Petitioner Apple Inc. - Exhibit 1028, p. 6
`
`
`
`6AV9V9ii9ahtV.AVuth9rity
`VV!?VriVn1aryQitiVz<?n§hip Qquntry
`$tatuV§,
`V
`
`V V
`
`V
`
`
`
`6
`
`V
`
`‘
`
`
`
`V
`
`1
`
`H
`
`6iVri\/.V9nt9r64
`
`V‘FyV!!V.9apa¢ity
`VMi9h.aV<?|VV
`
`V
`
`
`
`>
`
`VVWi|liarn§9n
`'
`
`FaVmi!yVVNam9
`!§!aVrnV9V$VuffixVV
`6
`'9iiyV9f6R§$i6den9§
`-V VV
`$tat¢.9rP.r9Vvin9e 9fRe§idV¢n99
`V
`‘H
`€?99ntry.V9VfVRV9§id§n99V
`4
`
`VV V262QV$_V9<V;alaV9ir9l¢
`V
`
`$tr9§tV.V0fMai!in9VAsidr¢$$
` Riding
`VV
`9ity9fMV§!!!n9
`.§tVaVtV§ 9r PVr9VvinV9§VV9f Mailing V/V‘~V<Vi<Jr9§$
`V
`
`£V?<.V>!VVJVr1t.r.>/V9VtVVMaViiin9VAddr9§§ V’
`A’ V.
`P9§t.a! 9r
`99¢? 9f Mailing A<Vidr¢§§
`
`6
`
`6
`
`V
`
`V
`
`I‘
`
`'
`
`>
`
`VI V2915?
`
`V
`
`t
`‘
`
`‘
`
`V
`
`V
`
`
`
`V
`
`11
`
`9orre$Vp9ndenV9eInforrnéition -4
`99!'T§§.P9Wd§”,9‘? QU§i9n1<?rNHVmb<?r:§
`
`V
`
`Vr
`
`4
`VV
`
`V
`
`-
`V V‘!
`
`V
`
`V
`
`Representative VlV6nforrriatié>h
`R§PF§§§Ui§iiY§ Cu§t9n1§VrVNumb¢r::
`
`
`
`V
`
`V
`1A
`123639 4
`
`Domestic Pfbfltylnformation
`Applicationzz
`i Continuity
`Type::
`
`* eppiication
`V
`V
`V.
`11/679,416
`‘ 10/709,466
`
`6
`
`1
`
`66/664,763
`
`09/429,643
`
`V
`
`iSVa°°“ii"VUaii°“ °i.
`a cpntinuation of
`6‘ isa divisionjai of b
`6
`is a c6ontinuation—in6—pe6rt6
`iof
`‘Ea continuatibn-in—part
`
`6
`
`claims the benefit under
`, 35 UVSVCV 119(e) to
`
`V
`
`Parent
`‘ Application::
`
`11/9/9241?
`I 10/702,486
`
`‘"666/664,766
`i
`
`6
`
`
`Parent Filing
`: Date::
`
`VFVebrUaVV'¥ VZZJ 2.99? >
`‘
`i}iovAember"7, V2003
`6 éé, §00.066
`February 16, 2666
`
`66/426,646“
`
`6 6¢tcber26, 1666
`
`66/166,261 66
`
`6, 6O6ctober30,19968 A
`
`09/429,643
`
`' claims the benefit under
`V
`€36
`LVVVJ:§:9.- V119(§‘) *0
`
`60/137,704
`
`= June 7, 1999
`'
`
`,Foreign Pfioritylnforrhatioh
`
`A A
`
`A
`
`i
`
`BST99 1549648-l.O77580.0066
`
`Page 3 of4
`
`Initial 8/16/2007
`
`Petitioner Apple Inc. — Exhibit 1028, p. 7
`
`Petitioner Apple Inc. - Exhibit 1028, p. 7
`
`
`
`§f’iiécsuntry::
`
`T
`
`l
`.
`
`AV
`
`.
`
`1 Agipiication n'umbier:i:“ ]'i5iiingii5até::
`1
`..
`{
`
`,
`
`,_
`
`1
`
`.
`
`isriomy éiaimedi:
`
`i‘
`
`Assignes lnformatiton
`
`VV
`
`V
`
`0:
`
`-V
`
`.. V4
`Valley Priva Suite 119
`V’
`. §tr99titt9f rnailintg
`1
`5 §,99tt§tVa!tl¢yt,
`‘Qty 9f m§i!i.n9
`State 9r .P.r9vince of mailing addr9§§:.=
`I 9A..’
`-1
`
`
`
`
`
`it
`
`9f...rnaI*!n9 @§!.dr9§.§;t:t
`P9§ta! 9r
`
`} U_-_S-
`.1
`
`it
`
`BST99 1549648-l . 077580 . 0066
`
`Page 4 of4
`
`Initial 8/16/2007
`
`Petitioner Apple Inc. — Exhibit 1028, p. 8
`
`Petitioner Apple Inc. - Exhibit 1028, p. 8
`
`
`
`Attorney Docket No. 077S80—0066 (VRNKJCPZDVCNZ)
`
`METHOD FOR ESTABLISHING SECURE COMMUNICATION LINK BETWEEN
`COMPUTERS OF VIRTUAL PRIVATE NETWORK
`
`CROSS~REFERENCE TO RELATED APPLICATIONS
`
`[0001]
`
`This application claims priority from and is a continuation of co—pending US.
`
`application seriai number 11/679,416, filed February 27, 2007, which is a continuation of U.S,.
`
`application serial number 10/702,486, filed November 7, 2003, now US, Patent No. 7,188,180,
`
`issued March 06, 2007, which is a divisional patent application of US. application serial number
`
`09/558,209,
`
`filed April 26, 2000, now abandoned, which is a continuation—in—part patent
`
`application of previously—filed US. application serial number 09/504,783, filed on February 15,
`
`2000, now US, Patent No. 6,502,135, issued December 31, 2002, which claims priority from
`
`and is a continuation—in-part patent application of previously/—t'1led US. application serial number
`
`09/429,643, filed on October 29, 1999, now US, Patent No. 7,010,604, issued March 03, 2006.
`
`The subject matter of US, application serial number 09/429,643, which is bodily incorporated
`
`herein, derives from provisional US. application numbers 60/ 106,261 (filed October 30, 1998)
`
`and 60/137,704 (filed June 7, 1999). The present application is also related to US. application
`
`serial number 09/558,210, filed April 26, 2000, now abandoned, and which is incorporated by
`
`reference herein.
`
`BACKGROUND OF THE INVENTION
`
`[0002]
`
`A tremendous variety of methods have been proposed and implemented to
`
`provide security and anonymity for communications over the Internet. The variety stems, in part,
`
`fi'om the different needs of different Internet users, A basic heuristic framework to aid in
`
`discussing these different security techniques is
`
`illustrated in FIG.
`
`1, Two terminals, an
`
`originating terminal 100 and a destination terminal 110 are in communication over the Internet.
`
`It
`
`is desired for the communications to be secure,
`
`that
`
`is,
`
`immune to eavesdropping. For
`
`example, terminal 100 may transmit secret information to terminal 110 over the Internet 107,
`
`Also, it may be desired to prevent an eavesdropper from discovering that terminal 100 is in
`
`communication with terminal 110. For example, if terminal 100 is a user and terminal 1 l0 hosts
`
`a web site, terminal 100’s user may not want anyone in the intervening networks to know what
`
`web sites he is “visiting.” Anonymity would thus be an issue, for exampie, for companies that
`
`want to keep their market research interests private and thus would prefer to prevent outsiders
`
`BST99 15-173-17-1 077580 0066
`
`Petitioner Apple Inc. — Exhibit 1028, p. 9
`
`Petitioner Apple Inc. - Exhibit 1028, p. 9
`
`
`
`Attorney Docket No. 077580-0066 (VRNK-ICPZDVCNZ)
`
`from knowing which websites or other Internet resources they are “visiting.” These two security
`
`issues may be called data security and anonymity, respectively.
`
`[0003]
`
`Data security is usually tackled using some form of data encryption. An
`
`encryption key 48 is known at both the originating and terminating terminals 100 and H0. The
`
`keys may be private and public at
`
`the originating and destination terminals 100 and 110,
`
`respectively or they may be symmetrical keys (the same key is used by both parties to encrypt
`
`and decrypt). Many encryption methods are known and usable in this context.
`
`[0004]
`
`To hide traffic from a local administrator or ISP, a user can employ a local
`
`proxy server in communicating over an encrypted channel with an outside proxy such that the
`
`local administrator or ISP only sees the encrypted traffic. Proxy servers prevent destination
`
`servers from determining the identities of the originating clients. This system employs an
`
`intermediate server interposed between client and destination server. The destination server sees
`
`only the Internet Protocol (IP) address of the proxy server and not the originating client. The
`
`target server only sees the address of the outside proxy. This scheme relies on a trusted outside
`
`proxy server. Also, proxy schemes are vulnerable to traffic analysis methods of determining
`
`identities of transmitters and receivers. Another important limitation of proxy servers is that the
`
`server knows the identities of both calling and called parties. In many instances, an originating
`
`terminal, such as terminal A, would prefer to keep its identity concealed from the proxy, for
`
`example, if the proxy server is provided by an Internet service provider (ISP).
`
`[0005]
`
`To defeat traffic analysis, a scheme called Chaum’s mixes employs a proxy
`
`server that transmits and receives fixed length messages, including dummy messages. Multiple
`
`originating terminals are connected through a mix (a server) to multiple target servers. It is
`
`difficult to tell which of the originating terminals are communicating to which of the connected
`
`target servers, and the dummy messages confuse eavesdroppers’ efforts to detect communicating
`
`pairs by analyzing traffic. A drawback is that there is a risk that the mix server could be
`
`compromised. One way to deal with this risk is to spread the trust among multiple mixes. If one
`
`mix is compromised, the identities of the originating and target terminals may remain concealed.
`
`This strategy requires a number of alternative mixes so that the intermediate servers interposed
`
`between the originating and target terminals are not determinable except by compromising more
`
`than one mix. The strategy wraps the message with multiple layers of encrypted addresses. The
`
`BST99 l547347—l 077580 0066
`
`- 2 ..
`
`Petitioner Apple Inc. — Exhibit 1028, p. 10
`
`Petitioner Apple Inc. - Exhibit 1028, p. 10
`
`
`
`Attorney Docket No. 077580-0066 [VRNK-ICPZDVCNZ)
`
`first mix in a sequence can decrypt only the outer layer of the message to reveal
`
`the next
`
`destination mix in sequence. The second mix can decrypt the message to reveal the next mix and
`
`so on. The target server receives the message and, optionally, a multi-«layer encrypted payload
`
`containing return information to send data back in the same fashion. The only way to defeat such
`
`a mix scheme is to collude among mixes. If the packets are all fixed~length and intermixed with
`
`dummy packets, there is no way to do any kind of traffic analysis.
`
`{(3006}
`
`Still another anonymity technique, called ‘crowds,’ protects the identity of the
`
`originating terminal from the intermediate proxies by providing that originating terminals belong
`
`to groups of proxies called crowds. The crowd proxies are interposed between originating and
`
`target terminals. Each proxy through which the message is sent
`
`is randomly chosen by an
`
`upstream proxy. Each intermediate proxy can send the message either to another randomly
`
`chosen proxy in the “crowd” or to the destination. Thus, even crowd members cannot determine
`
`if a preceding proxy is the originator of the message or if it was simply passed from another
`
`proxy.
`
`[0007]
`
`ZKS (Zero—Knowledge Systems) Anonymous IP Protocol allows users to
`
`select up to any of five different pseudonyms, while desktop software encrypts outgoing traffic
`
`and wraps it in User Datagram Protocol (UDP) packets. The first server in a 2+«-hop system gets
`
`the U1)? packets, strips off one layer of encryption to add another, then sends the traffic to the
`
`next server, which strips off yet another layer of encryption and adds a new one. The user is
`
`permitted to control
`
`the number of hops. At
`
`the final server,
`
`traffic is decrypted with an
`
`untraceable IP address. The technique is called onion—routing. This method can be defeated using
`
`traffic analysis. For a simple example, bursts of packets from a user during low-duty periods can
`
`reveal the identities of sender and receiver.
`
`[0008]
`
`Firewalls attempt
`
`to protect LANS from unauthorized access and hostile
`
`exploitation or damage to computers connected to the LAN. Firewalls provide a server through
`
`which all access to the LAN must pass. Firewalls are centralized systems that
`
`require
`
`administrative overhead to maintain. They can be compromised by virtualumachine applications
`
`(“applets”). They instill a false sense of security that leads to security breaches for example by
`
`users sending sensitive information to servers outside the firewall or encouraging use of modems
`
`i3SI'99 15473474 077580 0056
`
`Petitioner Apple Inc. — Exhibit 1028, p. 11
`
`Petitioner Apple Inc. - Exhibit 1028, p. 11
`
`
`
`Attorney Docket No. 077580-0066 (VRNK-ICPZDVCNZ)
`
`to sidestep the firewall security. Firewalls are not useful for distributed systems such as business
`
`travelers, extranets, small teams, etc.
`
`SUMMARY OF THE INVENTION
`
`[0009]
`
`A secure mechanism for communicating over the internet,
`
`including a
`
`protocol referred to as the Tunneled Agile Routing Protocol (TARP), uses a unique two~layer
`
`encryption format and special TARP routers. TARP routers are similar in function to regular IP
`
`routers. Each TARP router has one or more IP addresses and uses normal IP protocol to send IP
`
`packet messages (“pacl<ets” or “datagrams”), The IP packets exchanged between TARP
`
`terminals via TARP routers are actually encrypted packets whose true destination address is
`
`concealed except to TARP routers and sewers. The normal or “clear” or “outside” IP header
`
`attached to TARP IP packets contains only the address of a next hop router or destination server.
`
`That is, instead of indicating a final destination in the destination field of the IP header, the
`
`TARP packet’s IP header always points to a next~hop in a series of TARP router hops, or to the
`
`final destination. This means there is no overt indication from an intercepted TARP packet of the
`
`true destination of the TARP packet since the destination could always be next—hop TARP router
`
`as well as the final destination.
`
`[0010]
`
`Each TARP pacl<et’s
`
`true destination is concealed behind a layer of
`
`encryption generated using a link key. The link key is the encryption key used for encrypted
`
`communication between the hops intervening between an originating TARP terminal and a
`
`destination TARP terminal. Each TARP router can remove the outer layer of encryption to reveal
`
`the destination router for each TARP packet. To identify the link key needed to decrypt the outer
`
`layer of encryption of a TARP packet, a receiving TARP or routing terminal may identify the
`
`transmitting terminal by the senderfreceiver IP numbers in the cleartext IP header,
`
`[0011]
`
`Once the outer layer of encryption is removed, the TARP router determines
`
`the final destination, Each TARP packet 140 undergoes a minimum number of hops to help foil
`
`traffic analysis. The hops may be chosen at random or by a fixed value. As a result, each TARP
`
`packet may make random trips among a number of geographically disparate routers before
`
`reaching its destination. Bach trip is highly likely to be different for each packet composing a
`
`given message because each trip is independently randomly determined. This feature is called
`
`agile roaring. The fact that different packets take different routes provides distinct advantages by
`
`BST99 l5-57347~l 077580 0066
`
`- 4 -
`
`Petitioner Apple Inc. — Exhibit 1028, p. 12
`
`Petitioner Apple Inc. - Exhibit 1028, p. 12
`
`
`
`Attorney Docket No. 077580-0066 (VRNK«-1 CPZDVCNZ)
`
`making it difficult for an interloper to obtain all
`
`the packets forming an entire rnulti~packet
`
`message. The associated advantages have to do with the inner layer of encryption discussed
`
`below. Agile routing is combined with another feature that furthers this purpose; a feature that
`
`ensures that any message is broken into multiple packets.
`
`[0012]
`
`The IP address of a TARP router can be changed, a feature called 1}’ agility.
`
`Each TARP router, independently or under direction from another TARP terminal or router, can
`
`change its IP address. A separate, unchangeable identifier or address is also defined. This
`
`address, called the TARP address, is known only to TARP routers and terminals and may be
`
`correlated at any time by a TARP router or a TARP terminal using a Lookup Table (LUT). When
`
`a TARP router or terminal changes its IP address,
`
`it updates the other TARP routers and
`
`terminals which in turn update their respective LU Ts.
`
`[0013]
`
`The message payload is hidden behind an inner layer of encryption in the
`
`TARP packet that can only be unlocked using a session key. The session key is not available to
`
`any of the intervening TARP routers. The session key is used to decrypt the payloads of the
`
`TARP packets permitting the data stream to be reconstructed.
`
`[0014]
`
`Communication may be made private using link and session keys, which in
`
`turn may be shared and used according to any desired method. For example, public/private keys
`
`or symmetric keys may be used,
`
`[0015]
`
`To transmit a data stream, a TARP originating terminal constructs a series of
`
`TARP packets from a series of IP packets generated by a network (IP) layer process. (Note that
`H {J
`
`the terms “network layer,” “data link layer,
`
`application layer,” etc. used in this specification
`
`correspond to the Open Systems Interconnection (OSI) network terminology.) The payloads of"
`
`these packets are assembled into a block and chain-block encrypted using the session key. This
`
`assumes, of course, that all the IP packets are destined for the same TARP terminal. The block is
`
`then interleaved and the interleaved encrypted block is broken into a series of payloads, one for
`
`each TARP packet to be generated, Special TARP headers IP1 are then added to each payload
`
`using the IP headers from the data stream packets. The TARP headers can be identical to normal
`
`IP headers or customized in some way. They should contain a formula or data for deinterleaving
`
`the data at the destination TARP terminal, a time-to—live (TTL) parameter to indicate the number
`
`of hops still to be executed, a data type identifier which indicates whether the payload contains,
`
`BST99 lS47347-l 077580 0066
`
`- 5 -
`
`Petitioner Apple Inc. — Exhibit 1028, p. 13
`
`Petitioner Apple Inc. - Exhibit 1028, p. 13
`
`
`
`Attorney Docket No. 077580-0066 (VRNK-1CI’2DVCN2)
`
`for example, TCP or UDP data, the sender's TARP address, the destination TARP address, and
`
`an indicator as to whether the packet contains real or decoy data or a formula for filtering out
`
`decoy data if decoy data is spread in some way through the TARP payload data.
`
`[0016]
`
`Note that although chain-block encryption is discussed here with reference to
`
`the session key, any encryption method may be used, Preferably, as in chain block encryption, a
`
`method should be used that makes unauthorized decryption difficult without an entire result of
`
`the encryption process, Thus, by separating the encrypted block among multiple packets and
`
`making it difficult for an interloper to obtain access to all of such packets, the contents of the
`
`communications are provided an extra layer of security”
`
`[0017]
`
`Decoy or dummy data can be added to a stream to help foil traffic analysis by
`
`reducing the peak»to—average network load. It may be desirable to provide the TARP process
`
`with an ability to respond to the time of day or other criteria to generate more decoy data during
`
`low traffic periods so that communication bursts at one point in the Internet cannot be tied to
`
`communication bursts at another point to reveal the communicating endpoints.
`
`[0018]
`
`Dummy data also helps
`
`to break the data into a larger number of
`
`inconspicuously~sized packets permitting the interleave window size to be increased while
`
`maintaining a reasonable size for each packet. (The packet size can be a single standard size or
`
`selected from a fixed range of sizes.) One primary reason for desiring for each message to be
`
`broken into multiple packets is apparent if a chain block encryption scheme is used to form the
`
`first encryption layer prior to interleaving. A single block encryption may be applied to portion,
`
`or entirety, of a message, and that portion or entirety then interleaved into a number of separate
`
`packetsi Considering the agile IP routing of the packets, and the attendant difficulty of
`
`reconstructing an entire sequence of packets to form a single block—encrypted message element,
`
`decoy packets can significantly increase the difficulty of reconstructing an entire data stream.
`
`[0019]
`
`The above scheme may be implemented entirely by processes operating
`
`between the data link layer and the network layer of each server or terminal participating in the
`
`TARP system. Because the encryption system described above is insertable between the data link
`
`and network layers, the processes involved in supporting the encrypted communication may be
`
`completely transparent to processes at the IP (network) layer and above. The TARP processes
`
`may also be completely transparent to the data link layer processes as well, Thus, no operations
`
`BS'i"99 154734?-l 077580 0065
`
`_ 5 -
`
`Petitioner Apple Inc. — Exhibit 1028, p. 14
`
`Petitioner Apple Inc. - Exhibit 1028, p. 14
`
`
`
`Attorney Docket No. 077580-0066 (VRNK-ICPZDVCNZ)
`
`at or above the Network layer, or at or below the data link layer, are affected by the insertion of
`
`the TARP stack. This provides additional security to all processes at or above the network layer,
`
`since the difficulty of unauthorized penetration of the network layer (by, for example, a hacker)
`
`is increased substantially. Even newly developed servers running at the session layer leave all
`
`processes below the session layer vulnerable to attack. Note that in this architecture, Security is
`
`distributed. That is, notebook computers used by executives on the road, for example, can
`
`communicate over the Intemet without any compromise in security.
`
`[9020]
`
`EP address changes made by TARP terminals and routers can be done at
`
`regular
`
`intervals, at random intervals, or upon detection of “attacks.” The variation of IP
`
`addresses hinders traffic analysis that might reveal which computers are communicating, and
`
`also provides a degree of immunity from attack The level of immunity from attack is roughly
`
`proportional to the rate at which the IP address of the host is changing.
`
`[0021]
`
`As mentioned, IP addresses may be changed in response to attacks. An attack
`
`may be revealed, for example, by a regular series of messages indicating that a router is being
`
`probed in some way. Upon detection of an attack, the TARP layer process may respond to this
`
`event by changing its IP address. In addition, it may create a subprocess that maintains the
`
`original IP address and continues interacting with the attacker in some manner.
`
`[0022]
`
`Decoy packets may be generated by each TARP terminal on some basis
`
`determined by an algorithm, For example, the algorithm may be a random one which calls for the
`
`generation of a packet on a random basis when the terminal is idle, Alternatively, the algorithm
`
`may be responsive to time of day or detection of low traffic to generate more decoy packets
`
`during low traffic times. Note that packets are preferably generated in groups, rather than one by
`
`one, the groups being sized to simulate real messages, In addition, so that decoy packets may be
`
`inserted in normal TARP message streams, the background loop may have a latch that makes it
`
`more likely to insert decoy packets when a message stream is being received. Alternatively, if a
`
`large number of decoy packets is received along with regular TARP packets, the algorithm may
`
`increase the rate of dropping of decoy packets rather than forwarding them. The result of
`
`dropping and generating decoy packets in this way is to make the apparent incoming message
`
`size different from the apparent outgoing message size to help foil traffic analysis.
`
`BS F99 l5473«l7~l 077580 0066
`
`Petitioner Apple Inc. — Exhibit 1028, p. 15
`
`Petitioner Apple Inc. - Exhibit 1028, p. 15
`
`
`
`Attorney Docket No. 077580-0066 [VRNK-ICPZDVCNZ)
`
`{0023}
`
`In various other embodiments of the invention, a scalable version of the
`
`system may be constructed in which a piurality of IP addresses are preassigned to each pair of
`
`communicating nodes in the network. Each pair of nodes agrees upon an algorithm for
`
`“hopping” between IP addresses (both sending and receiving), such that an eavesdropper sees
`
`apparently continuously random IP address pairs (source and destination) for packets transmitted
`
`between the pair. Overlapping or “reusable” IP addresses may be allocated to different users on
`
`the same subnet, since each node merely verifies that a particular packet
`
`includes a valid
`
`sour