throbber
INFORMATION DISCLOSURE
`STATEMENT BY APPLICANT
`(Use as many sheets as necessary)
`
`Amucamuumber
`Firmwares
`
`mum __
`ExaminerName
`
`Docket Number
`
`77580-145
`
`3992
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`U.S. PATENTS
`
`.
`
`‘
`
`Pages, Columns, Lines. Where Relevant
`Passages or Relevant Figures Appear
`
`——_———______—__—_—__—_—_—_
`
`____—____—__——__—
`
`05/13/1997—_
`
`5,311,593
`5.329 521
`5.341.426
`5,367,643
`5384.848 ——mm_
`_5 51 1 122 04/23/1996 Atklnson
`
`
`5 548 646
`08/20/1996
`5 559 883
`09/24/1996
`5.561 669
`10/01/1996
`5.588060
`12124/1996
`5.590 285
`12/31/1996
`04/29/1997
`
`5.629.984
`5 654.695
`5 682.480
`5689.566 ——m_
`5 689 641
`5740.375
`5.757 925
`5 764 906
`5771.239
`5 774 660
`5 787 172
`5 790.548
`5796 942
`5805801
`5 805.803
`5 822.434
`5 842.040
`5.845.091
`5.864.666
`
`08/18/1998m
`09/08/1998
`.
`. Hollowa etal
`09/08/1998
`Birrell et al.
`10/13/1998
`11/24/1998
`1201/1998
`01/1999
`
`Shrader. Theodore Jack
`London
`
`CITE
`
`Patent Number
`
`Publication/Pat Name of Patentee or Applicant of
`ent Date
`Cited Document
`
`
`
`
`
`
`08/31/1999
`
`-MEIF_
`
`.
`
`09/399 753
`60/151,563
`60/134547
`2 895.502
`4.751.334
`4 885,778
`4 920 484
`4.933.846
`4.952 930
`4.988.990
`5 164 988
`5.204.961
`5.276 735
`
`a)
`5.867 650 __EE_
`5 870.610
`2109/199
`5 878 231
`5/02/199
`5.892.903
`IDS/199
`5 898.830
`4/27/199
`
`
`
`
`5.905 859
`05/18/199
`ALL REFERENCES CONSIDgBEOQd-EXCEPT WHERE LINED THROUGH.
`VIRNETX EXHIBIT 2042
`Microsoft v. VirnetX
`Trial |PR2014-00616
`
`___———
`
`0200
`
`(01000
`
`(O
`
`
`
`
`
`
`/R.F./
`
`
`
`EXAMI
`
`NER'S
`
`IN ITIA
`LS
`
`A10
`
`A12
`A13
`
`A16
`
`>>>>>>>>>>>>>>>>>>>>
`
`A41
`
`>a
`
`43
`l
`>>>AOI
`-"O(D(D‘l0’
`
`Page 1 of 38
`
`
`
`
`
`Page 1 of 38
`
`VIRNETX EXHIBIT 2042
`Microsoft v. VirnetX
`Trial IPR2014-00616
`
`

`

`Complete ifKno 5‘" ’
`
`
`. = ' - ‘ '- 3992
`
`1mm“.
`Edmund c, Mung.alr
`—a~:_
`Roland G. Foster
`
`_—
`
`Pages. Columns, Lines, Where Relevant
`Passages or Relevant Figures Appear
`
`
`
`
`
`‘C I:
`Subramaniam et al.
`Muni ac ua et al.
`Sistanizadeh et al.
`Alkhalib
`Aziz el al.
`Mattawa at al.
`Shand et al.
`Benhaud
`Chen et al.
`Fare
`Gilbrech
`Ta - hadoss
`Weber et al.
`Schneider el al
`Weber et al.
`Blum et al.
`Wilson Sle nhen K.
`Naudus Slanle T.
`Sas an et al.
`Dou-Ias et al.
`Bots el al.
`Arrow et al..
`Shannon
`Basilica
`Sitaraman el al.
`Guerin el al
`Karlsson et al.
`Slrentzsch el al.
`Mo ul Jeffre C.
`Blumenau
`Borella et al.
`Ramanathan el al
`
`Hrastar et aI
`Valencia
`
`.
`
`a—l—l—h
`
`00°
`
`Palent Number
`
`-
`
`~
`
`6041342
`6.052.788
`6.055.574
`6.061346
`6.061.735
`6 079 020
`6.081.900
`6.092.200
`6 101 182
`6,119,171
`6.119.234
`
`6 147 976
`6 157.957
`6.158.011
`6.168.409
`6 173,399
`6 175 867
`6 178 409
`6.178.505
`6 179.102
`6.182.141
`
`6 202.081
`6 222 842
`6 223 287
`6.226 748
`6 226 751
`6 233 618
`6,243,360
`6 243 749
`6.243 754
`6 246 670
`6.256.671
`6 262 987
`6 263 445
`6.269.099
`6.286 047
`6 298 341
`
`CITE
`
`N0.
`
`
`
`
`Page 2 of 38
`
`/R.F./
`
`
`
`INFORMATION DISCLOSURE
`
`
`STATEMENT BY APPLICANT
`
`
`(Use as many sheets as necessary)
`
`
`
`
`-——-— "580-145
`
`
`U.S. PATENTS
`Publication/Pat
`EXAMI
`Name of Palenlee or Applicant of
`en! Date
`Cited Document
`NER’S
`
`
`INITIA
`
`LS
`
`
`
`
`
`
`
`
`—-_——_
`—————_
`-_M—
`-_—_-§=EEE-—
`—-_—_—_
`—_—___
`—__12/21/1999—_
`_- 6.006.272
`12/21/1999_—
`6.016318
`01/18/2000_—
`01/18/2000_—
`03/21/2000_—
`04/2000 _—
`04/25/2000
`05/2000
`05/09/200
`06I20l200
`06/2000
`07/1 8/2000
`08/2000
`09/1 2/2000
`09/1 2/2000
`10/1 0/2000
`1 1/14/2000
`12/05/2000
`12/05/2000
`01/02/2001
`01/09/2001
`01/16/2001
`01/23/2001
`01/23/2001
`01/30/2001
`1/30/2001
`03/2001
`03/2001
`04/24/200
`04/24/200
`05/01/200
`05l01/2001
`05/1 5/2001
`06/05I2001
`06/05I2001
`06/05/2001
`06l1 2/2001
`07/03/2001
`07/1 7/01
`7/1 7/2001
`7/31/2001
`9/04/2001
`1 0/02/01
`1 0/9/2001
`10/23/2001
`6 308 213
`Imm-
`6.308.274
`ALL REFERENCES CONSlBfigx’gEQQEXCEPT WHERE LINED THROUGH.
`
`
`
`
`
`
`
`
`>>
`
`A74
`A75
`A76
`A77
`A78
`A79
`A80
`A81
`A82
`
`A85
`A86
`A87
`A88
`A89
`A90
`
`:9>>>>>>>>>>
`
`>
`
`A98
`A99
`A100
`A101
`A102
`A103
`
`Page 2 of 38
`
`

`

`INFORMATION DISCLOSURE
`
`STATEMENT BY APPLICANT
`(Use as many sheets as necessary)
`
`
`
`
`
`
`
`
`
`Appncauommbe,
`magnate,
`FirstNamedmvemor
`
`mum —_
`Examinemame
`
`3992
`
`
`
`
`
`
`
`
`
`
`
`
`EXAM!
`NER'S
`
`
`INITIA
`LS
`
`CITE
`
`Patent Number
`
`Publication/Pat Name of Patentee or Applicant of
`ent Date
`Cited Document
`
`Pages, Columns, Lines, Where Re|evant
`Passages 0r Relevant Figures Appear
`
`U.S. PATENTS
`
`
`
`
`
`
`‘>>u-:386go:oonsra)omummgwn
`
`
`Mihdoll et aI
`Abbott et al.
`Kirch
`Boden et al.
`Risle et al.
`
`Schneider, Eric
`Borella et al.
`Herzo et al.
`Davie eta!
`Carter
`Valencia
`Beser et al.
`Johnson
`Mun . er et al.
`Mihdoll et al
`Ma es et al
`Albert et al
`Provino Joseh E.
`Broadhurst
`
`Shaio et al.
`Hirst et al.
`Devine et al.
`Boden et al.
`Munn er et al.
`Kru . likov et al
`
`Shuster et al.
`Hoke et al.
`Fiveash et al.
`Boden et al.
`Wesiner, Jr. et al..
`Lull et al.
`Parekh, et at.
`Sahlvist
`Weinberoer et al.
`Larson et al.
`Larson et al.
`Rosenben et al.
`
`Van Gunter et 61.
`Whittle et al.
`
`Devara'an et al.
`McKeelh James A.
`Larson et al.
`She mov et al.
`Kono, et al.
`Larson et al.
`Lu et at.
`
`
`
`6,549,516
`6 557 037
`6,560,634
`6 571 296
`6 571 338
`6,581,166
`6,606 708
`6,615,357
`6,618 761
`6,671,702
`6 687 551
`6 687 746 -
`6,701,437
`6 714 970
`6,717,949
`6 751 738
`6,752 166
`6,757,740
`6 760 766
`6,813,777
`6 826 616
`6 839 759
`6,937 597
`7 010 604
`7 039 713
`7,072,964
`7 133,930
`7 167 904
`7 188,175
`7 188,180
`7,197 563
`7,353,841
`7 418 504
`7 461,334
`7,490,151
`ALL REFERENCES CONSIDfifiE/QgEXCEPT WHERE LINED THROUGH.
`
`A104
`A105
`A106
`A107
`A108
`A109
`A110
`A111
`A112
`A113
`A114
`A115
`A116
`A117
`A118
`A119
`A120
`A121
`A122
`A123
`A124
`A125
`A126
`A127
`A128
`A129
`A130
`A131
`A13
`A13
`A1
`A13
`A13
`A13
`
`A140
`A141
`A142
`A143
`
`A14
`
`A14
`
`A15
`A151
`
`A1
`A1
`A155
`
`6,311,207
`6,314,463
`
`A
`
`6,333,272
`6 338.082
`6 353 614
`6,425,003
`6,430 155
`6 430 610
`6,487,598
`6.496.867
`6,499,108
`6,502,135
`
`12/17/2002
`12/24/2002
`12/2002
`01/07/2003
`01/21/2003
`3
`04/15/200
`04/2003
`05/06/2003
`05/27/2002
`05/27/2003
`
`11/7/2006
`01l23/O7
`03/06/07
`3/6/2007
`3/27/2007
`
`.
`
`Page 3 of 38
`
`/R.F./
`
`Page 3 of 38
`
`

`

`
`
`ApplicationNumber
`Finnsoates
`First Named Inventor
`Art Unit
`
`Examiner Name
`
`Roland G. Foster
`
`"580-145
`
`
`INFORMATION DISCLOSURE
`
`
`STATEMENT BY APPLICANT
`
`
`
`‘”“’””’""""““”"“““"”
`
`
`
`-_—-D°NNNNNW
`
`
`
`
`Publication/Pat Name of Patentee orApplicant of
`Pages, Columns. Lines, Where Relevant
`
`
`
`ent Date
`Cited Document
`Passages or Relevant Figures Appear
`
`
`
`
`
`————mm—_
`
`-———__
`_—_—-zma—_
`___——_
`-flEfl——__
`--_—-f—_
`-_———_
`
`3992
`
`-
`
`
`
`
`
`
`
`
`
`
`
`
`EXAMI
`NER':
`INITI
`
`CITE
`N0.
`
`Patent Number
`
`
`
`
`
`
`
`
`
`
`
`ALL REFERENCES CONSIBEBEoBQEXCEPT WHERE LINED THROUGH.
`
`/R.F./
`
`Page 4 of 38
`
`Page 4 of 38
`
`

`

`AppIication Number
`
`Complete if Known
`95I001,789
`
`95001789 - GAU: 3992
`
`
`
`
`
`
`—__
`
`Pages,Columns,Lines,Where
`Relevant Passages or Relevant
`
`
`
`
`
`
`
`
`
`Receipt date: 05/03/2012
`Subst. for form 1449/PTO
`
`
`
`INFORMATION DISCLOSURE .
`
`STATEMENT BY APPLICANT
`(Use as many sheets as necessary)
`
`EXAMI
`
`NER'S
`
`CITE
`NO.
`
`
`
`PatentNumber
`
`-———— "580-145
`U.S. PATENT APPLICATION PUBLICATIONS
`Publication
`NameofPatentee orAplecamof Cited
`
`
`OaIe
`Document
`
`—_________
`
`I31.___
`I_—_EE_
`
`IZI——_ME_
`IEI-I_—-ME—
`
`m—
`
`_—M_
`USZOO5/0055306
`3/10/05
`Miller et al.
`m-
`EEI——_—
`B11
`U32006/0123134
`06/2006—_
`
`——_
`
`. —
`
`_——__—
`
`
`
`13
`
`A
`03V
`A
`19
`
`W (
`
`11030!
`
`321
`
`
`
`ALL REFERENCES CONSIDfifiEQgEXCEPT WHERE LINED THROUGH.
`
`/R.F./
`
`Page 5 of 38
`
`
`
`
`Page 5 of 38
`
`

`

`Receipt date: 05/03/2012
`95001789 - GAU:~ 3992
`
`Subst. forfon‘n 1449IPTO
`
`Complete if Known
`
`
`
`INFORMATION DISCLOSURE
`
`
`
`
`
`
`(Use as many sheets as necessary)
`
`__
`
`
`Roland G. Foster
`
`
`
`
`.
`
`13-0ct-2o11
`
`.—
`
`
`
`FOREIGN PATENT DOCUMENTS
` EXAMI
`Pages.
`Translation
`Publication Date
`Name of Patentee or Applicant of
`Foreign Patent
`
`
`
`
`Cited Document
`Columns.
`Document
`NER'S
`
`
`Lines
`INITIAL
` Country Code3 —
`
`
`Where
`
`
`
`5
`
`Number 4 -Kind Codes
`Relevant
`
`
`(if known)
`Figures
`
`Appear
`
`
`———_
`
`.
`
`im
`
`m
`
`
`
`
`
`
`
`
`
`
`evosaesso
`
`682334181
`682340702
`
`08/11I1999
`
`NEC Technologies
`
`WOOO1_ 7775
`
`3/30/00
`
`Miller et al.
`
`International Co -oration
`
`wosaswo
`W09911019
`W09938081
`W09948303
`W001/61922
`
`mac/98
`03/04/1999
`7/29/99
`9/23/99
`02/12/2001
`
`V One Corp
`Paulsen et al
`Cox et al
`Science Application International
`Cor-oration
`
`
`cw
`‘3 d
`S? N
`9 (A
`.A
`
`09
`
`O .n O"
`‘3 ‘1
`9 on
`19
`O
`OM _.
`
`O iN
`
`iiMM(AIM
`
`OnA
`
`
`ALL REFERENCES CONSIBgEgEQQEXCEPT WHERE LINED THROUGH.
`
`/R.F./
`
`Page 6 of 38
`
`Page 6 of 38
`
`

`

`95001789 — GAU: 3992
`Receipt date: 05/03/2012
`
`Subst. for form 1449/PTO
`
` Complete if Known
`
`95/001,789
`
`Application Number
`
`
`INFORMATION DISCLOSURE
`Filing Date
`
`
`
`First Named Inventor
`
`Art Unit
`
`
`
`
`OTHER ART (Including Author, Title, Date, Pertinent Pages, Etc.)
`Include name of the author (in CAPITAL LETTERS), title of the article (when appropriate). title of the item (book.
`
`CITE magazine. journal. serial, symposium. catalog. etc). date, page(s). volumeissue number(s). publisher. city
`NO.
`and/or country where published.
`‘
`
`
`
`STATEMENT BY APPLICANT
`(Use as many sheets as necessary)
`
`
`
`Examiner Name
`
`Docket Number
`
`18-Oct-2011
`Edmund C. Munger
`
`_
`
`Roland G. Foster
`
`77580-145
`
`--
`
`
`
`Abstract). 16 pages.
`
`1998. pp. 1-51.
`
`Basics. 1996, pp. 198-203.
`Glossary for the Linux FreeS/WAN project. printed from
`http:/Iliberty.freeswan.orglfreeswan_trees/freeswan-1.3/ doc/glossaryhtml on Feb. 21. 2002. 25
`
`-
`
`J. Gilmore. "Swan: Securing the lntemet against Wiretapping", printed from
`http://Iiberty.freeswan.org/freeswan _treeslfreeswan-1.3/doc/rationale.html on Feb. 21. 2002. 4
`pages.
`
`James E. Bellaire. "New Statement of Rules-Naming Internet Domains". Internet Newsgroup. Jul. -
`
`30. 1995. 1 page.
`Jim Jones et al.. "Distributed Denial of Service Attacks: Defenses". Global Integrity Corporation,
`2000. Pp. 1-14._
`~
`Laurie Wells (LANCASTERBIBELMAIL MSN COM); "Subject: Security Icon" USENET Newsgroup.
`Oct. 19. 1998. XP002200606. 1 page.
`Linux FreeSNVAN index File, printed from http://|iberty.freewan.org/freeswan_trees/freeswan-
`1.3/docl on Feb. 21. 2002. 3 Pages.
`P. Srisuresh et al.. "DNS extensions to Network address Translators (DNS_ALG)". Internet Draft.
`Jul. 1998. pp. 1-27.
`Reiter, Michael K. and Rubin, Aviel D. (AT&T Labs-Research). "Crowds: Anonymity for Web
`Transactions”. pp. 1-23.
`RFC 2401 (dated Nov. 1998) Security Architecture for the Internet Protocol (RTP)
`RFC 2543-SIP (dated March 1999): Session Initiation Protocol (SIP or SIPS)
`Rich thkel. "CAO: Networking Vtfith Spooks: The NET 8. The Control Of Information". lntemet
`Newsgroup. Jun. 21. 1997. 4 pages.
`Rubin. Aviel D., Geer, Daniel. and Ranum. Marcus J. (Wiley Computer Publishing). “Web Security
`Sourcebook", pp. 82-94.
`.
`
`
`
`
`
`
`
`.A OI
`
`UU
`
`17
`D18
`
`
`
`
`ALL REFERENCES CONSIBAEREQQEXCEPT WHERE LINED THROUGH.
`
`/R.F./'
`
`Page 7 of 38
`
`
`
`
`
`Alan 0. Frier et al.. "The SSL Protocol Version 3.0". Nov. 18. 1996, printed from
`
`http:/Iwww.netscape.com/englss13/ draft302.txt on Feb. 4, 2002. 56 pages.
`August Bequai. "Balancing Legal Concerns Over Crime and Security in Cyberspace". Computer &
`Security. vol. 17. No. 4. 1998. pp. 293-298.
`D. B. Chapman et al.. "Building Internet Firewalls". Nov. 1995. pp. 278-375.
`D. Clark. "US Calls for Private Domain-Name System". Computer. IEEE Computer Society. Aug. 1,
`1998. pp. 22-25.
`Davila J et al. "Implementation of Virtual Private Networks at the Transport Layer". Information .
`Security, Second International Work-shop. ISW99. Proceedings (Lecture Springer-Veriag Berlin.
`Germany. [Online] 1999, pp. 85-102, XP002399276, ISBN 3-540-666
`
`
`
`
`
`
`
`I“ Dolev. Shlomi and Ostrovsky. Rafil. "Efficient Anonymous Multicast and Reception" (Extended
`
`
`.— Donald E. Eastlake. 3rd, "Domain Name System Security Extensions". INTERNET DRAFT, Apr.
`
`
`I“ F. Halsall. "Data Communications. Computer Networks and Open Systems", Chapter 4. Protocol
`
`
`pages.
`
`
`
`
`
`
`
`
`Page 7 of 38
`
`

`

`INFORMATION DISCLOSURE
`STATEMENT BY APPLICANT
`(Use as many sheets as necessary)
`
`Shankar. A.U. "A verified sliding window protocol with variable flow control". Proceedings of ACM
`SIGCOMM conference on Communications architectures & protocols. pp. 84-91. ACM Press, NY.
`NY 1986.
`
`Shree Murthy et al.. "Congestion-Oriented Shortest Multi-path Routing". Proceedings of IEEE
`INFOCOM. 1996. pp. 1028-1036.
`
`W. Stallings. "Cryptography And Network Security". 2nd, Edition. Chapter 13. IP Security. Jun. 8.
`1998. pp. 399-440.
`
`Microsoft Corporation's Fourth Amended Invalidity Contentions dated Jan. 5. 2009, VimetX Inc. and-
`
`Science Applications lntemational Corp. v. Microsoft Corporation.
`Appendix A of the Microsoft Corporation's Fourth Amended Invalidity Contentions dated Jan. 5.
`2009.
`
`Concordance Table For the References Cited in Tables on pages 6-15. 71-80 and 116-124 of the
`Microsoft Corporation's Fourth Amended Invalidity Contentions dated Jan. 5. 2009.
`I. P. Mockapetris. “DNS Encoding of Network Names and Other Types." Network Working Group.
`RFC 1101 (April 1989) RFC1101. DNS SRV)
`R. Atkinson. “An lnternetwork Authentication Architecture.” Naval Research Laboratory, Center for
`, KX Records)
`
`Henning Schulzrinne..Personal Mobility For Multimedia Services in The lntemet, Proceedings of the
`Interactive Distributed Multimedia Systems and Services European Workshop at 143 (1996).
`(Schulzrinne 96)
`
` OAu
`
`MicrosoftCorp.. Microsoft VirtualPrivate Networking:UsingPoint-to-Point TunnelingProtocolfor -
`
`Low-Cost. Secure, Remote Access Across the lntemet (1996) (printed from 1998 PDC DVD-ROM).
`(Point to Point. Microsoft Prior Art VPN Technology)
`“Safe Surfing: How to Build a Secure World Wide Web Connection.” IBM Technical Support
`Organization. (March 1996). (Safe Surfing. WEBSITE ART)
`Goldschlag. et al., “Hiding Routing Information.” Workshop on Information Hiding. Cambridge. UK
`(May 1996). (Goldschlag ll. Onion Routing)
`“lPSec Minutes From Montreal". IPSEC Working Group Meeting Notes.
`http://www.sandleman.cafipsecl1996l08/mngOO18.html (June 1996). (lPSec Minutes, FreeS/WAN)
`J. M. Galvin. “Public Key Distribution with Secure DNS.“ Proceedings of the Sixth USENIX UNIX
`Security Symposium. San Jose. California. July 1996. (Galvin. DNSSEC)
`‘
`J. Gilmore. et al. “Re: Key Management. anyone? (DNS Keying)." lPSec Working Group Mailing
`List Archives (8/96). (Gilmore DNS. FreeSNVAN)
`H. Orman, et al. ”Re: ‘Re: DNS? was Re: Key Management. anyone?" IETF lPSec Working Group
`Mailing List Archive (8/969/96). (Orrnan DNS. FreeS/WAN)
`Arnt Gulbrandsen & Paul \fixie. A DNS RR for specifying the location of services (DNS SRV). IETF
`RFC 2052 (October 1996). (RFC 2052. DNS SRV)
`Freier. et al. “The SSL Protocol Version 3.0." Transport Layer Security Working Group (November
`18. 1996). (SSL. UNDERLYING SECURITY TECHNOLOGY)
`M. Handley. H. Schulzrinne. E. Schooler. lntemet Engrneenng Task Force. Internet Draft.
`(12/02/1996). (RFC 2543 lntemet Draft 1)
`MG. Reed. et al. ‘Proxies for Anonymous Routing." 12th Annual Computer Security Applications
`Conference. San Diego. CA, Dec. 9-13. 1996. (Reed. Onion Routing)
`'
`Kenneth F. Alden & Edward P. Wobber. The AltaVista Tunnel: Using the lntemet to Extend
`Corporate Networks. Digital Technical Journal (1997) (Alden. AltaVista)
`Automotive Industry Action Group. “ANX Release 1 Document Publication.“ AIAG (1997). (AIAG.
`ANX)
`Automotive Industry Action Group. “ANX Release 1 Draft Document Publication." AIAG Publications
`(1997). (AIAG Release. ANX)
`Aventail Corp. “Aventail VPN Data Sheet," available at
`htt
`://www.archive.or lweb/19970212013043/www.aventail.coml rod/v ndata.htm| (1997). (Data
`Sheet, Aventail)
`
`D48
`
`ALL REFERENCES CONSIBaEfiEQQEXCEPT WHERE LINED THROUGH.
`
`/R.F./
`
`Page 8 of 38
`
`Page 8 of 38
`
`

`

`
`
`
`Complete if Kn .
`-
`
`13-0mm
`Edmund c. Munger
`__
`
`.—
`
`INFORMATION DISCLOSURE
`STATEMENT BY APPLICANT
`(Use as many sheets as necessary)
`
`.
`
`
`
`
`Aventail Corp.. "Directed VPN Vs. Tunnel," available at
`htt
`:Ilweb.archive.or lweb/19970620030312/www.aventail.com/educate/directv n.html (1997).
`(Directed VPN. Aventail)
`Aventail Corp.. "Managing Corporate Access to the Internet.“ Aventail AutoSOCKS White Paper
`available at
`htt
`:l/web.archive.or 1199706200300312/www.aventail.com/educate/white a mi: mw.htm| (1997).
`(Corporate Access, Aventail)
`Aventail Corp.. "VPN Server V2.0 Administration Guide,“ (1997). (VPN. Aventail)
`Goldschlag. et al. “Privacy on the lntemet.“ Naval Research Laboratory. Center for High Assurance
`Computer Systems (1997). (Goldschtag l. Onion Routing)
`Microsoft Corp.. Installing Configuring and Using PPTP with Microsoft Clients and Sewers (1997).
`
`(Using PPTP, Microsoft Prior Art VPN Technology)
`Microsoft Corp.. IP Security for Microsoft Windows NT Sen/er 5.0 (1997) (printed from 1998 PDC
`
`
`
`DVD-ROM). (IP Security. Microsoft Prior Art VPN Technology)
`Microsoft Corp.. Microsoft Windows NT Active Directory: An Introduction to the Next Generation
`Directory Services (1997) (printed from 1998 PDC DVD-ROM). (Directory. Microsoft Prior Art VPN
`Technology)
`Microsoft Corp.. Routing and Remote Access Service for IMndows NT Sen/er New Opportunities
`Today and Looking Ahead (1997) (printed from 1998 PDC DVD-ROM). Routing. Microsofl Prior Art
`VPN Technology)
`'
`Microsoft Corp.. Understanding Point-to-Point Tunneling Protocol PPTP (1997) (printed from 1998
`PDC DVD-ROM). (Understanding PPTP. Microsoft Prior Art VPN Technology)
`J. Mark Smith et.a|., Protecting a Private Network: The Alta Vista Firewall. Digital Technical Journal
`(1997). (Smith. AltaVista)
`Naganand Doraswamy Implementation of Virtual Private Networks (VPNs) with lPSecurity. <draft-
`ietf-ipsec-vpn-00.txt> (March 12. 1997). (Doraswamy)
`
`
`
`D57
`
`068
`
`070
`
`071
`
`D72
`
`D73
`
`
`
`
`
`
`
`
`
`I“ M. Handley. H. Schulzrinne. E. Schooler. lntemet Engineering Task Force. Internet Draft.
`(03/27/1997). (RFC 2543 lntemet Draft 2)
`
`Aventail Corp.. "Aventail and Cybersale to Provide Secure Authentication For Internet and Intranet
`
`
`Communication." Press Release. April 3. 1997. (Secure Authentication. Aventail)
`D. Wagner. et al. “Analysis of the SSL 3.0 Protocol." (April 15. 1997). (Analysis. UNDERLYING
`SECURITY TECHNOLOGIES)
`Automotive Industry Action Group. “ANXO Certification Authority Service and Directory Service
`Definition for ANX Release 1." AIAG Telecommunications Project Team and Bellcore (May 9.
`
`1997). (AIAG Definition. ANX)
`
`Automotive Industry Action Group, "ANXO Certification Process and ANX Registration Process
`Definition for ANX Release 1.” AIAG Telecommunications Project Team and Bellcore (May 9.
`1997). (AIAG Certification, ANX)
`
`Aventail Corp.. "Aventail Announces the First VPN Solution to Assure Interoperability Across
`.-
`
`
`Emerging Security Protocols.“ June 2. 1997. (First VPN. Aventail)
`
`Syvérson. et al. “Private Web Browsing.” Naval Research Laboratory, Center for High 8 Assurance
`
`
`Computer Systems (June 2. 1997). (Syverson, Onion Routing)
`
`Bellcore. “Metrics. Criteria. and Measurement Technique Requirements for ANX Release 1.‘ AIAG
`
`
`
`Telecommunications Project Team and Bellcore (June 16. 1997). (AIAG Requirements. ANX)
`M. Handley. H. Schulzrinne. E. Schooler. lntemet Engineering Task Force. Internet Draft.
`(07/31/1997). (RFC 2543 lntemet Draft 3)
`R. Atkinson. “Key Exchange Delegation Record for the DNS." Network Working Group, RFC 2230
`(November 1997). (RFC 2230. KX Records)
`M. Handley. H. Schulzrinne, E. Schooler. lntemet Engineering Task Force. lntemet Draft,
`(11/11/1997). (RFC 2543 lntemet Draft 4)
`1998 Microsoft Professional Developers Conference DVD (“1998 PDC DVD-ROM") (including
`screenshots captured there from and produced as MSFTVX 00018827-00018832). (Conference.
`Microsoft Prior Art VPN Technology)
`Microsoft Corp.. Virtual Private Networking An Overview(1998) (printed from 1998 PDC DVD-
` PVN Technolo.
`
`
`
`ROM) (Ovrveeiw Microsoft Prior A
`A
`-
`-
`i
`I‘
`sya‘;;.e9 '
`=
`vv-
`=
`V
`i "ii". /R.F.l
`
`Page 9 of 38
`
`Page 9 of 38
`
`

`

`INFORMATION DISCLOSURE
`
`
`
`STATEMENT BY APPLICANT
`(Use as many sheets as necessary)
`
`
`
`
`
`First Named Inventor
`
`Edmund C. Munger
`
`'
`
`Roland G. Foster
`
`
`.-._
`3’
`Completeirknfa'"
`
`
`AppIication Number
`95/001,789
`.
`
`
`Filing Date
`18-Oct-2011
`
`
`I D75
`"What ports does SSL use“ available at stasonorg/TULARC/securitylssI-talk/3-4-What-ports-does-
`I 076
`I. Aventail Corp.. “AventailVPNV2.6 Includes SupportforMoreThan TenAuthentication Methods
`
`
`
`
`
`
`MicrosoftCorp.WindowsNT5.0BetaHasPublicPremiereatSeattleMini-CampSeminar
`
`attendees get first look at the performance and capabilities of Windows NT 5.0 (1998) (available at
`http://Www.microsoflcomlpresspass/features/1998/10-19nt5mspxpftrue). (NT Beta. Microsoft Prior
`Art VPN Technology)
`
`ssl-use.htm| (1998). (Ports. DNS SRV)
`
`D78
`
`Making Extranet VPN Development Secure and Simple.” Press Release. January 19. 1998. (VPN
`V2.6. Aventail)
`R. G. Moskowitz. "Network Address Translation Issues with IPsec." lntemet Draft. Internet
`Engineering Task Force. February 6. 1998. (Moskowitz)
`
`I. H. Schulzrinne. et al. "InternetTelephony GatewayLocation." Proceedings ofIEEE leocom ‘98.
`
`The Conference on Computer Communications. Vol. 2 (March 29 — April 2. 1998). (Gateway,
`Schulzrinne)
` O80
`C. Huitema, 45 al. “Simple Gateway Control Protocol." Version 1.0 (May 5. 1998). (SGCP)
`DISA “Secret lntemet Protocol Router Network." SIPRNET Program Management Office (D3113)
`DISN Networks. DISN Transmission Services (May 8. 1998). DISA. SIPRNET)
`M. Handley, H. Schulzrinne. E. Schooler. lntemet Engineering Task Force. Internet Draft.
`(05I14/1998). (RFC 2543 Internet Draft 5)
`M. Handley, H. Schulzrinne. E. Schooler. Internet Engineering Task Force, Internet Draft.
`(06/17/1998). (RFC 2543 lntemet Draft 6)
`D. McDonald. et aI. ”PF__KEY Key Management API. Version 2." Network Working Group. RFC
`2367 (July 1998). (RFC 2367)
`M. Handley, H. Schulzrinne. E. Schooler. lntemet Engineering Task Force. Internet Draft.
`(07/16/1998). (RFC 2543 lntemet Draft 7)
`M. Handley, H. Schulzrinne. E. Schooler. lntemet Engineering Task Force. Internet Draft.
`(08/07/1998). (RFC 2543 lntemet Draft 8)
`Microsoft Corp.. Company Focuses on Quality and Customer Feedback (August 18. 1998). (Focus,
`Microsoft Prior Art VPN Technology)
`
`2
`
`Oona)
`
`m\l
`
`OU
`
`M. Handley, H. Schulzrinne. E. Schooler. lntemet Engineering Task Force. Internet Draft.
`(09/18l1998). (RFC 2543 Internet Draft 9)
`Atkinson. et al. “Security Architecture for the lntemet Protocol,” Network Working Group, RFC 2401
`(November 1998). (RFC 2401. UNDERLYING SECURITY TECHNOLOGIES)
`M. Handley, H. Schulzrinne. E. Schooler. lntemet Engineering Task Force. Internet Draft.
`(11/12/1998). (RFC 2543 lntemet Draft 10)
`Donald EastIake. Domain Name System Security Extensions. IETF DNS Security Working Group
`(December 1998). (DNSSEC-7)
`M. Handley. H. Schulzrinne. E. Schooler. lntemet Engineering Task Force. Internet Draft.
`(12/15/1998). (RFC 2543 lntemet Draft 11)
`Aventail Corp. "Aventail Connect 3.1/2.6 Administrator's Guide.” (1999). (Aventail Administrator
`3.1, Aventail)
`-|§fl- Aventail Corp..' "Aventail Connect 3.1/2.6 User's Guide.” (1999). (Aventail User 3.1. Aventail)
`Aventail Corp.. “Aventail ExtraWeb Server v3.2 Administrator’s Guide.“ (1999). (Aventail ExtraWeb
`3.2. Aventail)
`Kaufman et al. 'Implementing IPsec.” (Copyright 1999). (Implementing IPSEC. VPN
`REFERENCES)
`Network Solutions. Inc. "Enabling SSL.” NSI Registry (1999). (Enabling SSL, UNDERLYING
`SECURITY TECHNOLOGIES)
`Check Point Software Technologies Ltd. (1999) (Check Point. Checkpoint FW)
`Amt Gulbrandsen 8- Paul Vixie. A DNS RR for specifying the location of services (DNS SRV).<draft-
`ietf-dnsind-frc2052bis-02.b<_t> (January 1999). (Gulbrandsen 99. DNS SRV)
`C. Scott. et al. Virtual Private Networks. O'Reilly and Associates. Inc.. 2nd ed. (Jan. 1999). Scott
`VPNs)
`
`88
`
`on(O
`
`
`
`
`
`
`
`097
`
`U98
`
`
`
`
`
`
`
`ALL REFERENCES CONSIREBEJQEXCEPT WHERE LINED THROUGH.
`
`/R.F./
`
`Page 10 of 38
`
`Page 10 of 38
`
`

`

`
`
`Complete if Kn I ~
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`INFORMATION DISCLOSURE
`STATEMENT BY APPLICANT
`(Use as many sheets as necessary)
`
`18-Oct-2011
`
`.
`
`——E_
`
`-————_
`I D101
`M. Handley. H. Schulzrinne. E. Schooler, Internet Engineering Task Force. Internet Draft.
`
`(01/15/1999). (RFC 2543 Internet Draft 12)
`Goldschlag. et al., “Onion Routing for Anonymous and Private Internet Connections.” Naval
`Research Laboratory. Center for High Assurance Computer Systems (January 28. 1999).
`(Goldschlag III. Onion Routing)
`H. Schulzrinne. "Internet Telephony: architecture and protocols — an IETF perspective." Computer
`Networks. Vol. 31 . No. 3 (February 1999). (Telephony. Schulzrinne)
`M. Handley. et aI. “SIP: Session Initiation Protocol." Network Working Group. RFC 2543 and
`Internet Drafts (12/96-3/99). (Handley. RFC 2543)
`FreeSNVAN Project. Linux FreeS/WAN Compatibility Guide (March 4. 1999). (FreeSNVAN
`Compatibility Guide. FreeS/WAN)
`.
`
`
`
`
`0107
`
`D108
`
`'D109
`
`- 0114
`
`D117
`
`
`
`
`
`
`
`
`
`
`.W Telcordia Technologies. “ANX Release 1 Document Corrections." AIAG (May 11. 1999). (Telcordia.
`ANX)
`Ken Homstein & Jeffrey Altman. Distributing Kerberos KDC and Realm lnfonnation with DNS
`
`
`
`<draft-eitf-cat-krb-dns-locate-oo.txt> (June 21. 1999). (Homstein. DNS SRV)
`Bhattacharya. et al.. "An LDAP Schema for Configuration and Administration of lPSec Based Virtual
`Private Networks (VPNs)". IETF Internet Dratt (October 1999). (Bhattcharya LDAP VPN)
`8. Patel. et al. “DHCP Configuration of IPSEC Tunnel Mode." IPSEC Working Group. Internet Draft
`02 (10l15/1999). (Patel)
`Goncalves. et al. Check Point FireWall-1 Administration Guide. McGraw-Hill Companies (2000).
`(Goncalves. Checkpoint FVV)
`“Building a Microsoft VPN: A Comprehensive Collection of Microsoft Resources." FirstVPN. (Jan
`2000). (FirstVPN Microsoft)
`
`
`
`
`
`- D112 Gulbrandsen. Vixie. 8. Esibov. A DNS RR forspecifying the location ofservices (DNS SRV). IETF
`RFC 2782 (February 2000). (RFC 2782. DNS SRV)
`MITRE Organization. "Technical Description,” Collaborative Operations in Joint Expeditionary Force
`
`
`Experiment (JEFX) 99 (February 2000). (MITRE. SIPRNET)
`H. Schulzrinne. et al. “Application-Layer Mobility Using SIP." Mobile Computing and
`
`
`
`
`Communications Review. Vol. 4. No. 3. pp. 47-57 (July 2000). (Application. SIP)
`
`Kindred et al. “Dynamic VPN Communities: Implementation and Experience." DARPA Information
`
`
`
`Survivability Conference and Exposition II (June 2001). (DARPA. VPN SYSTEMS)
`ANX 101 Basic ANX Service Outline. (Outline ANX)
`ANX 201: Advanced ANX Service. (Advanced. ANX)
`Appendix A: Certificate Profile for ANX lPsec Certificates. (Appendix. ANX)
`Assured Digital Products. (Assured Digital)
`Aventail Corp.. “Aventail AutoSOCKS the Client Key to Network Security.“ Aventail Corporation
`
`0 _n NO White Paper. (Network Security. Aventail)
`
`Cindy Moran. 'DISN Data Networks: Secret Internet Protocol Router Network (SIPRNet)." (Moran.
`SIPRNET)
`Data Fellows F-Secure VPN+ (F-Secure VPN+)
`“Interim Operational Systems Doctrine for the Remote Access Security Program (RASP) Secret
`Dial-In Solution. (RASP. SIPRNET)
`Onion Routing. “Investigation of Route Selection Algorithms.” available at http://www.onion-
`router.net/Archives/Routefindex.html. (Route Selection. Onion Routing)
`Secure Computing. “Bullet-Proofing an Army Net.” Washington Technology. (Secure. SIPRNET)
`SPARTA "Dynamic Wrtual Private Network." (Sparta. VPN SYSTEMS)
`Standard Operation Procedure for Using the 1910 Secure Modems. (Standard. SIPRNET)
`Publically available emails relating to FreeS/WAN (MSFTVX00018833~MSFTVX00019206).
`(FreeSNVAN emails. FreeSNVAN)
`Kaufman et al.. "Implementing lPsec.” (Copyright 1999) (Implementing lPsec)
`D130 Network Associates Gauntlet Firewall For Unix User’s Gurde Verswn 5 0 (1999) (Gauntlet User’s
`Guide - Unix. Firewall Products)
`
`
`
`DU
`
`127
`128
`
`
`
`
`
`ALL REFERENCES CONSIQgREOQJEXCEPT WHERE LINED THROUGH.
`
`/R.F./
`
`Page 11 of 38
`
`Page 11 of 38
`
`

`

`a I
`II '1.q‘r. :1'
`I.
`
`
`
`
`
`
`
`
`
`
`
`
`Complete if Kn -
`
`=
`3’ Ii" 92
`
`
`___
`
`INFORMATION DISCLOSURE
`
`STATEMENT BY APPLICANT
`(Use as many sheets as necessary)
`
`U .. u01
`
`
`
`
`
`D131 Network Associates Gauntlet Firewall For Wndows NT Getting Started Guide Version 5.0 (1999)
`(Gauntlet Getting Started Guide — NT. Firewall Products)
`Network Associates Gauntlet Firewall For Unix Getting Started Guide Version 5.0 (1999) (Gauntlet
`Unix Getting Started Guide. Firewall Products)
`D133 Network Associates Release Notes Gauntlet Firewall for Unix 5.0 (March 19, 1999) (Gauntlet Unix
`Release Notes. Firewall Products)
`D134 Network Associates Gauntlet Firewall For andows NT Administrator’s Guide Version 5.0 (1999)
`(Gauntlet NT Administrator's Guide. Firewall Products)
`Trusted Information Systems. Inc. Gauntlet Internet Firewall Firewall-to-Firewall Encryption Guide
`Version 3.1 (1996) (Gauntlet Firewall-to-Firewall. Firewall Products)
`Network Associates Gauntlet Firewall Global Virtual Private Network User's Guide for Windows NT
`Version 5.0 (1999) (Gauntlet NT GVPN. GVPN)
`D137 Network Associates Gauntlet Firewall For UNIX Global Virtual Private Network User’s Guide
`Version 5.0 (1999) (Gauntlet Unix GVPN. GVPN)
`i—l (a)G)
`Dan Sterne Dynamic Virtual anate Networks (May 23 2000) (Sterne DVPN DVPN)
`D co1
`9 Darrell Kindred Dynamic Virtual Private Networks (DVPN) (December 21. 1999) (Kindred DVPN.
`DVPN)
`0140 Dan Sterne et al. TIS Dynamic Security Perimeter Research Project Demonstration (March 9. 1998)
`(Dynamic Security Perimeter, DVPN)
`Darrell Kindred Dynamic Virtual Private Networks Capability Description (January 5. 2000) (Kindred
`
`DVPN Capability. DVPN) 11
`D142 October 7. and 28 1997 email from Domenic J. Turchi Jr. (SPARTA00001712-1714. 1808-1811)
`(Turchi DVPN email. DVPN)
`James Just & Dan Sterne Security Qurckstart Task Update (February 5. 1997) (Security Quickstart.
`- DVPN)
`.
`.
`Virtual Private Network Demonstration dated March 21. 1998 (SPARTA00001844-54) (DVPN
`Demonstration, DVPN)
`GTE Internetworking & BBN Technologies DARPA lnfonnation Assurance Program Integrated
`Feasibilit Demonstration (IFD) 1.1 Plan (March 10. 1998) (IFD 1.1. DVPN)
`Microsoft Corp. Windows NT Server Product Documentation: Administration Guide - Connection
`Point Services. available at
`http://wwwmicrosoft.com/technetlarchive/winntaslproddocs/inetconctservicelcpsops.mspx
`(Connection Point Services) (Although undated. this reference refers to the operation of prior art
`versions of Microsoft Windows. Accordingly. upon information and belief. this reference is prior art
`
`to the patents-in-suit.)
`
`Microsoft Corp. Windows NT Server Product Documentation: Administration Kit Guide - Connection
`Manager. available at
`.
`
`http://www.microsoft.com/technet/archive/winntaslproddocsfrnetconctservicelcmak.mspx
`
`(Connection Manager) (Although undated. this reference refers to the operation of prior art versions
`
`of Microsofl Windows such as Windows NT 4.0. Accordingly. upon information and belief, this
`reference is prior art to the patents-in-suit.)
`
`Microsoft Corp. Autodial Heuristics. available at http:l/support.microsofl.com/kb/164249 (Autodial
`
`
`
`
`Heuristics) (Although undated. this reference refers to the operation of prior art versions of
`Microsoft Windows such as Windows NT 4.0. Accordingly. upon information and belief. this
`
`reference is prior art to the patents-in-suit.)
`-
`
`Microsoft Corp.. Cariplo: Distributed Component Object Model. (1996) available at
`
`http://msdnz.microsoft.comlen-usllibrarylms809332(printer).aspx (Cariplo I)
`
`Marc Levy. COM lnternet Services (Apr. 23. 1999). available at http:/lmsanmicrosoft.com/en-
`
`usllibrarylm5809302(printer).aspx (Levy)
`
`Markus Horstmann and Mary Kirtland. DCOM Architecture (July 23. 1997). available at
`
`http:/lmsdn2.microsoft.comlen-usllibrary/m5809311(printer).aspx (Horstmann)
`
`Microsoft Corp. DCOM: A Business Overview (Apr. 1997). available at
`
`
`http://msanmicrosoft.com/en-us/Iibrary/m5809320(printer).aspx (DCOM Business Overview I)
`
`Microsoft Corp.. DCOM Technical Overview (Nov. 1996). available at
`
`
`http://msan.rnicrosoft.comlen-us/Iibrarylms809340(printer).aspx (DCOM Technical Overview l)
`ALLR_“'
`V
`O‘SHQgE'.—.c..
`'
`-' ll'
`-
`V
`p
`
`U _s b ._n
`
`D143
`
`.3 AO)
`
`D147
`
`
`
`.
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Page 12 of 38
`
`/R.F./
`
`Page 12 of 38
`
`

`

`INFORMATION DISCLOSURE
`
`STATEMENT BY APPLICANT
`(Use as many sheets as necessary)
`
`Microsoft Corp, DCOM - The Distributed Component Object Model, A Business Overview White
`Paper (Microsoft 1997) available in PDC DVD-ROM (DCOM Business Overview II)
`Microsoft Corp.. DCOM - Cariplo Home Banking Over The Internet White Paper Microsoft 1996)
`available in PDC DVD-ROM (Cariplo II)
`Microsoft Corp.. DCOM Solutions in Action White Paper (Microsoft 1996) available in PDC DVD-
`ROM (DCOM Solutions in Action)
`'
`Microsoft Corp.. DCOM Technical Overview White Paper (Microsoft 1996) available 12 in PDC
`DVD-ROM (DCOM Technical Overview II)
`125. Scott Suhy & Glenn Wood, DNS and Microsoft Windows NT 4.0. (1996) available at
`http:/lmsdnz.microsoft.com/en-us/library/ms810277(printer).aspx (Suhy)
`
`0159
`
`
`
`.W 126. Aaron Skonnard. Essential Win/net 313-423 (Addison Wesley Longman 1998) (E

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket