throbber
IN THE UNITED STATES PATENT AND TRADEMARK OFFICE
`
`Larson et al.
`In re Patent of:
`U.S. Patent No.: 7,418,504
`Issue Date:
`August 26, 2008
`Appl. Serial No.: 10/714,849
`Filing Date:
`November 18, 2003
`Title:
`AGILE NETWORK PROTOCOL FOR SECURE COMMUNICATIONS
`
`USING SECURE DOMAIN NAMES
`
` Attorney Docket No.: 38868-0005IP1
`
`
`
`DECLARATION OF DR. ROCH GUERIN
`
`1.
`
`My name is Dr. Roch Guerin. I am the chair of the Computer Science &
`
`Engineering department at Washington University in St. Louis. I have been asked to offer
`
`technical opinions relating to U.S. Patent No. 7,418,504, and prior art references relating to its
`
`subject matter. My current curriculum vitae is attached and some highlights follow.
`
`2.
`
`I earned my diplôme d'ingénieur (1983) from École nationale supérieure des
`
`télécommunications, in Paris, France. Thereafter, I earned my M.S. (1984) and PhD (1986) in
`
`electrical engineering from The California Institute of Technology in Pasadena, California.
`
`3.
`
`Prior to becoming a professor in engineering, I held various positions at the IBM
`
`T.J. Watson Research Center. Specifically, from 1986 to 1990, I was a research staff member
`
`within the Communication Department, where I worked to design and evaluate high-speed
`
`switches and networks. From 1990 to 1991, I was a research staff member within the IBM High
`
`Performance Computing and Communications Department, where I worked to develop and
`
`deploy an integrated broadband network. From 1992 to 1997, I was the manager of Broadband
`
`Networking within IBM’s Security and Networking Systems Department, where I led a group of
`
`researchers in the area of design, architecture, and analysis of broadband networks. One of the
`
`projects on which I worked, for example, led to U.S. Patent No. 5,673,318, which regards “[a]
`
`Page 1 of 25 
`
`MICROSOFT 1021
`
`Petitioner Apple Inc. - Exhibit 1021, p. 1
`
`

`
`Attorney Docket No.: 38868-0005IP1
`U.S. Patent No. 7,418,504                          
`
`method and system for providing data authentication, within a data communication environment,
`
`in a manner which is simple, fast, and provably secure,” and of which I am a named inventor.
`
`See U.S. Patent No. 5,673,318, abstract. From 1997 to 1998, I was the manager of Network
`
`Control and Services within IBM’s Security and Networking Systems Department, where I led a
`
`department responsible for networking and distributed applications, including topics such as
`
`advance reservations, policy support, including for Resource Reservation Protocol (RSVP),
`
`quality of service (QoS) routing, and security, and integrated switch and scheduling designs.
`
`4.
`
`I have been a professor of engineering for the past fifteen years. As such, but
`
`prior to becoming the chair of the Computer Science & Engineering department at Washington
`
`University in St. Louis, I was the Alfred Fitler Moore Professor of Telecommunications
`
`Networks (an honorary chair) in the Department of Electrical and Systems Engineering at the
`
`University of Pennsylvania. As a professor of engineering, I have taught many courses in
`
`networking, including Advanced Networking Protocols (TCOM 502), which addressed, among
`
`other things, virtual private networks.
`
`5.
`
`I have authored over fifty journal publications, including “On the Feasibility and
`
`Efficacy of Protection Routing in IP Networks,” which was honored as the IEEE INFOCOM
`
`2010 Best Paper Award. I have been named a Fellow by both the IEEE and ACM, and, from
`
`2009 to 2012, I was the Editor-in-Chief of the IEEE/ACM Transactions on Networking.
`
`Furthermore, I am a named inventor on over thirty issued U.S. patents.
`
`6.
`
`I am familiar with the content of U.S. Patent No. 7,418,504 (the “‘504 patent”).
`
`In addition, I have considered the various documents referenced in my declaration as well as
`
`additional background materials. I have also reviewed certain sections of the prosecution history
`
`of the ‘504 patent, the prosecution history of reexamination control numbers 95/001,788 and
`
`Page 2 of 25 
`
`Petitioner Apple Inc. - Exhibit 1021, p. 2
`
`

`
`Attorney Docket No.: 38868-0005IP1
`U.S. Patent No. 7,418,504                          
`
`95/001,851; and the claim construction orders from VirnetX Inc. v. Microsoft Corp., Docket No.
`
`6:07CV80 (E.D. Tex.) and VirnetX Inc. v. Cisco Systems, Inc. et al., Docket No. 6:10cv417 (E.D.
`
`Tex.).
`
`7. Counsel has informed me that I should consider these materials through the lens of one of
`
`ordinary skill in the art related to the ‘504 patent at the time of the invention, and I have
`
`done so during my review of these materials. I believe one of ordinary skill as of
`
`February 15, 2000 (the priority date of the ‘504 patent) would have a Master’s degree in
`
`computer science or computer engineering, or in a related field such as electrical
`
`engineering, as well as about two years of experience in computer networking and in
`
`some aspect of security with respect to computer networks. I base this on my own
`
`personal experience, including my knowledge of colleagues and others at the time.
`
`8.
`
`I have no financial interest in either party or in the outcome of this proceeding. I
`
`am being compensated for my work as an expert on an hourly basis. My compensation is not
`
`dependent on the outcome of these proceedings or the content of my opinions.
`
`9.
`
`My opinions, as explained below, are based on my education, experience, and
`
`background in the fields discussed above.
`
`10.
`
`This declaration is organized as follows:
`
`I.
`
`II.
`
`III.
`
`IV.
`
`V.
`
`Brief Overview of the ‘504 Patent
`
`Terminology
`
`Kiuchi and Combinations Involving Kiuchi
`
`Publication and Authenticity of Requests for Comment (RFCs)
`
`Conclusion
`
`Page 3 of 25 
`
`Petitioner Apple Inc. - Exhibit 1021, p. 3
`
`

`
`Attorney Docket No.: 38868-0005IP1
`U.S. Patent No. 7,418,504                          
`
`I.
`
`11.
`
`Brief Overview of the ‘504 Patent
`
`A section of the ‘504 patent’s specification titled “B. Use of a DNS Proxy to
`
`Transparently Create Virtual Private Networks” describes “the automatic creation of a virtual
`
`private network (VPN) in response to a domain-name server look-up function.,” with reference
`
`to FIG. 26. Ex. 1001, 39:4-6. Referring to FIG. 26 below, a “user's computer 2601 includes a
`
`conventional client (e.g., a web browser) 2605 and an IP protocol stack 2606 that preferably
`
`operates in accordance with an IP hopping function 2607 as outlined above.” Ex. 1001, 39:63-
`
`67. “A modified DNS server 2602 includes a conventional DNS server function 2609 and a
`
`DNS proxy 2610.” Ex. 1001, 39:67 to 40:2. “A gatekeeper server 2603 is interposed between
`
`the modified DNS server and a secure target site [2604].” Ex. 1001, 40:2-4. “An ‘unsecure’
`
`target site 2611 is also accessible via conventional IP protocols.” Ex. 1001, 40:4-5.
`
`Page 4 of 25 
`
`
`
`Petitioner Apple Inc. - Exhibit 1021, p. 4
`
`

`
`Attorney Docket No.: 38868-0005IP1
`U.S. Patent No. 7,418,504                          
`
`12.
`
`As described by the ‘504 patent:
`
`DNS proxy 2610 intercepts all DNS lookup functions from client 2605
`
`and determines whether access to a secure site has been requested. If access to a
`
`secure site has been requested (as determined, for example, by a domain name
`
`extension, or by reference to an internal table of such sites), DNS proxy 2610
`
`determines whether the user has sufficient security privileges to access the site. If
`
`so, DNS proxy 2610 transmits a message to gatekeeper 2603 requesting that a
`
`virtual private network be created between user computer 2601 and secure target
`
`site 2604. In one embodiment, gatekeeper 2603 creates “hopblocks” to be used by
`
`computer 2601 and secure target site 2604 for secure communication. Then,
`
`gatekeeper 2603 communicates these to user computer 2601. Thereafter, DNS
`
`proxy 2610 returns to user computer 2601 the resolved address passed to it by the
`
`gatekeeper (this address could be different from the actual target computer) 2604,
`
`preferably using a secure administrative VPN. The address that is returned need
`
`not be the actual address of the destination computer.
`
`Had the user requested lookup of a non-secure web site such as site 2611,
`
`DNS proxy would merely pass through to conventional DNS server 2609 the
`
`look-up request, which would be handled in a conventional manner, returning the
`
`IP address of non-secure web site 2611. If the user had requested lookup of a
`
`secure web site but lacked credentials to create such a connection, DNS proxy
`
`2610 would return a “host unknown” error to the user. In this manner, different
`
`users requesting access to the same DNS name could be provided with different
`
`look-up results.
`
`Page 5 of 25 
`
`Petitioner Apple Inc. - Exhibit 1021, p. 5
`
`

`
`Attorney Docket No.: 38868-0005IP1
`U.S. Patent No. 7,418,504                          
`
`Ex. 1001, 40:6-34
`
`II.
`
`13.
`
`Terminology
`
`I have been informed that claim terminology must be given the broadest
`
`reasonable interpretation during an IPR proceeding. I have been informed that this means the
`
`claims should be interpreted as broadly as their terms reasonably allow, but that such
`
`interpretation should not be inconsistent with the patent’s specification and with usage of the
`
`terms by one of ordinary skill in the art when considering the broadest reasonable construction. I
`
`have been informed that this may yield interpretations that are broader than the interpretation
`
`applied during a District Court proceeding, such as the pending VirnetX Inc. v. Microsoft Corp.
`
`litigation.
`
`14.
`
`I have been informed that it would be useful to provide some guidance in this
`
`proceeding with respect to the term below and its corresponding construction. As part of that, I
`
`considered this term’s context within the claim, use within the specification, and my
`
`understanding of how one of ordinary skill in the art would understand the term around the time
`
`of the purported invention under the broadest reasonable construction standard.
`
`15.
`
`I have considered whether a broadest reasonable interpretation of “system” would
`
`be broad enough to cover “one or more discrete computers or devices.” I believe that it would,
`
`since such an interpretation is not inconsistent with the ‘504 patent’s specification and the
`
`understanding one of ordinary skill in the art would ascribe to this term when looking for the
`broadest reasonable construction. For example, at col. 4, lines 35-48, the ‘504 patent describes a
`
`system that includes a modified DNS server 2602 and a separate gatekeeper server 2603, and
`
`specifically states that “although element 2602 [(the modified DNS server)] is shown as
`
`combining the functions of two servers [(the DNS proxy 2610 and DNS server 2609)], the two
`
`servers can be made to operate independently.” Ex. 1001 at col. 40, lines 46-48.
`
`Page 6 of 25 
`
`Petitioner Apple Inc. - Exhibit 1021, p. 6
`
`

`
`Attorney Docket No.: 38868-0005IP1
`U.S. Patent No. 7,418,504                          
`
`III. Kiuchi and Combinations Involving Kiuchi
`
`A.
`
`Kiuchi
`
`16.
`
`Kiuchi describes a system and a protocol called “C-HTTP” that “provides secure
`
`HTTP communication mechanisms within a closed group of institutions on the Internet, where
`
`each member is protected by its own firewall.” Ex. 1018 at p. 64, abstract. The system in Kiuchi
`
`allows a user agent computer in one private network to securely access private web pages (e.g.,
`
`HTML documents) stored on an origin server located in a different private network. As an
`
`example, Kiuchi describes that for “hospitals and related institutions,” there is a need for
`
`“[s]ecure transfer of patient information” between hospitals, and that “medical information has to
`
`be shared among some hospitals, but it should not be made available to other sites.” Ex. 1018 at
`
`p. 64, § 5. Kiuchi describes that the C-HTTP protocol allows members of different institutions
`
`to communicate using “secure HTTP communication mechanisms” by way of intermediate
`
`proxies that are associated with each institution. Ex. 1018 at p. 64, Abstract. In particular,
`
`client-side and server-side proxies, working in conjunction with a C-HTTP name server,
`
`automatically and transparently perform specialized functions, such as name resolution and
`
`establishment of secure connections. The following Diagram 1 illustrates relevant parts within
`
`the C-HTTP system described by Kiuchi, and will be used to describe the C-HTTP system.
`
`Page 7 of 25 
`
`Petitioner Apple Inc. - Exhibit 1021, p. 7
`
`

`
`Attorney Docket No.: 38868-0005IP1
`U.S. Patent No. 7,418,504                          
`
`(Diagram 1)
`
`
`
`17.
`
`In particular, Kiuchi describes a process by which a client-side proxy, in one
`
`institution, establishes a secure C-HTTP connection with a server-side proxy, in another
`
`institution, using the C-HTTP protocol over the Internet. See Ex. 1018 at p. 64, § 2.1; p. 69, § 5.
`
`The C-HTTP connection uses encryption to provide a secure connection. Ex. 1018 at p. 64 §§
`
`2.1, 2.2. Through the secure C-HTTP connection, a user agent associated with the client-side
`
`proxy may request information stored on one or more origin servers associated with the server-
`
`side proxy. See id. In order to establish a C-HTTP connection, Kiuchi teaches discrete steps that
`
`are described in the following block diagram. See Ex. 1018 at pp. 65-66, § 2.3; see also, Diagram
`
`2, where each step is numbered to indicate a temporal sequence of the steps taught by Kiuchi.
`
`Page 8 of 25 
`
`Petitioner Apple Inc. - Exhibit 1021, p. 8
`
`

`
`Attorney Docket No.: 38868-0005IP1
`U.S. Patent No. 7,418,504                          
`
`(Diagram 2)
`
`
`
`18.
`
`In Kiuchi, the user agent can display HTML documents to an end-user. See Ex.
`
`1018 at p. 65, § 2.3. Through interaction with the user agent, the end user may, for example,
`
`select a hyperlink URL included within an HTML document. See id. Kiuchi provides an
`
`example of the selected URL:
`
`“http://server.in.current.connection/sample.html=@=6zdDfldfcZLj8V!i”, where
`
`“server.in.current.connection” is the hostname, “sample.html” is the name of the resource being
`
`requested, and “6zdDfldfcZLj8V!i” is a connection ID. See Ex. 1018 at p. 65, § 2.3.
`
`19.
`
`Diagram 3 illustrates the initial steps performed by Kiuchi’s system after the user
`
`selects the hyperlink (assuming that no C-HTTP connection exists). These steps include: (1) a
`
`request sent from the user agent to the client-side proxy for the selected URL; (2) a request from
`
`the client-side proxy to the C-HTTP name server for an IP address corresponding to the
`
`hostname included in the selected URL; and (3) a response from the C-HTTP name server to the
`
`client-side proxy that either includes the IP address associated with the server-side proxy or an
`
`error message. In the last step, if the C-HTTP name server returns the IP address of the server-
`
`Page 9 of 25 
`
`Petitioner Apple Inc. - Exhibit 1021, p. 9
`
`

`
`Attorney Docket No.: 38868-0005IP1
`U.S. Patent No. 7,418,504                          
`
`side proxy, then the client-side proxy begins a C-HTTP connection with the server-side proxy,
`
`and otherwise, in case of an error message, the client-side proxy performs a DNS lookup using
`
`the standard/public DNS, as illustrated by the dashed line in Diagram 3, below. See Ex. 1018 at
`
`p. 65, § 2.3.
`
`(Diagram 3)
`
`
`
`20.
`
`Analyzing these steps in further detail, when the end user selects the hyperlink in
`
`the displayed HTML document, the user agent sends a request for the selected URL to the client-
`
`side proxy, as illustrated by arrow (1) in Diagram 3. See Ex. 1018 at p. 65, § 2.3. When the
`
`client-side proxy receives the URL (including a hostname) from the user agent, in some cases,
`
`the client-side proxy attempts to establish a new connection with the host corresponding to the
`
`hostname included in the URL. See id.
`
`21.
`
`To establish a new connection with the host, the client-side proxy sends a request,
`
`as illustrated by arrow (2) in Diagram 3, to resolve the hostname included in the URL. See Ex.
`
`1018 at p. 65, § 2.3(2). The request from the client-side proxy to the C-HTTP name server is a
`
`request for a network address associated with a domain name (the hostname in the URL from the
`
`Page 10 of 25 
`
`Petitioner Apple Inc. - Exhibit 1021, p. 10
`
`

`
`Attorney Docket No.: 38868-0005IP1
`U.S. Patent No. 7,418,504                          
`
`user agent). In some instances, the hostname corresponds to an origin server behind a server-
`
`side proxy and is associated with the IP address of the server-side proxy. Ex. 1018 at p. 65, § 2.3.
`
`In other instances, the hostname instead corresponds to a server on the Internet outside the C-
`
`HTTP network. Ex. 1018 at p. 65, § 2.3.
`
`22.
`
`The request from the client-side proxy to the C-HTTP name server is initiated,
`
`through a clear causal chain of events, by the user agent when the user agent sends the original
`
`request for content associated with a hostname to the client-side proxy. In addition, Kiuchi
`
`discloses that the user agent is located behind a client-side proxy, which is “on the firewall of
`
`one institution,” and that the origin server is located behind the server-side proxy, which is “on
`
`the firewall of another institution.” Ex. 1018 at p. 64, §2.1. From the point of view of the C-
`
`HTTP name server, the request that it receives from the client-side proxy is initiated from the
`
`institution in which the client-side proxy is a member.
`
`23.
`
`Upon receipt of the request from the client-side proxy (arrow (2)), the C-HTTP
`
`name server first authenticates the client-side proxy to determine if the request is legitimate. See
`
`Ex. 1018 at p. 65, § 2.3. For example, Kiuchi describes that the communication between the
`
`client-side proxy and the C-HTTP name server is certified. Ex. 1018 at p. 65. In particular, the
`
`client-side proxy signs a request before sending it to the C-HTTP name server, which then
`
`verifies the signature in the request using a public key. Id. If successful, the C-HTTP name
`
`server authenticates the request as being legitimate. Id. When the request is legitimate, the C-
`
`HTTP name server determines whether the “server-side proxy [associated with the hostname] is
`
`registered in the closed network.” Id.
`
`24.
`
`If the C-HTTP name server confirms that the server-side proxy is not registered in
`
`the closed network, or if the connection otherwise is not permitted, then the C-HTTP name
`
`Page 11 of 25 
`
`Petitioner Apple Inc. - Exhibit 1021, p. 11
`
`

`
`Attorney Docket No.: 38868-0005IP1
`U.S. Patent No. 7,418,504                          
`
`server returns an error message, in response to which the client-side proxy performs a look-up
`
`with a standard/public DNS server, behaving like an ordinary HTTP proxy (as illustrated by the
`
`dashed line in Diagram 3). See id. The standard/public DNS server then returns to the client-side
`
`proxy an IP address of the host that corresponds to the hostname, which the client-side proxy
`
`uses to connect to the host on behalf of the user agent. See Ex. 1018 at p. 65, § 2.3.
`
`25.
`
`On the other hand, if the C-HTTP name server confirms that the server-side proxy
`
`is registered in the closed network and is permitted to accept a connection from the client-side
`
`proxy, then the C-HTTP name server sends a response to the client-side proxy’s request that
`
`includes “the IP address and public key of the server-side proxy and both request and response
`
`Nonce values,” as illustrated by arrow (3) in Diagram 3. See Ex. 1018 at p. 65, § 2.3. The client-
`
`side proxy then uses the IP address, public key, and request Nonce value to contact the server-
`
`side proxy and create a C-HTTP connection with the server-side proxy. See Ex. 1018 at p. 65, §
`
`2.3. The steps for doing so are illustrated in Diagram 4.
`
`26.
`
`In particular, Kiuchi describes that the client-side proxy, in response to receiving
`
`the IP address and public key of the server-side proxy, sends a “[r]equest for connection to the
`
`server-side proxy” that includes a symmetric key and other information (indicated by arrow (4)
`
`in Diagram 4). See Ex. 1018 at pp. 65-66, § 2.3, steps 3-5. The server-side proxy then performs
`
`a “[l]ookup of client-side proxy information” with the C-HTTP name server to determine if the
`
`client-side proxy is authorized to access the server-side proxy (arrows 5 and 6). Id. If the client-
`
`side proxy is authorized, then the server-side proxy sends confirmation of the C-HTTP
`
`connection to the client-side proxy (arrow 7). Id.
`
`Page 12 of 25 
`
`Petitioner Apple Inc. - Exhibit 1021, p. 12
`
`

`
`Attorney Docket No.: 38868-0005IP1
`U.S. Patent No. 7,418,504                          
`
`(Diagram 4)
`
`
`
`27.
`
`Considering these steps in further detail, the client-side proxy, in response to
`
`receiving the IP address and associated information from the C-HTTP name server, sends a
`
`request for connection to the server-side proxy, as illustrated by arrow (4) in Diagram 4. See Ex.
`
`1018 at p. 65, § 2.3. After receiving the request, the server-side proxy “asks the C-HTTP name
`
`server whether the client-side proxy is an appropriate member of the closed network,” as
`
`illustrated by arrow (5) in Diagram 4, and, in response, the C-HTTP name server “examines
`
`whether the client-side proxy is permitted to access to the server-side proxy.” Ex. 1018 at pp. 65-
`
`66, § 2.3. If the C-HTTP server determines that “access is permitted, the C-HTTP name server
`
`sends the IP address and public key of the client-side proxy and both request and response Nonce
`
`values” to the server-side proxy, as illustrated by arrow (6) in Diagram 4. Ex. 1018 at p. 66, §
`
`2.3. The server-side proxy then responds to the client-side proxy with a message that contains a
`
`symmetric key and other information, thereby establishing the C-HTTP connection. Id.
`
`28.
`
`Subsequently, a user agent (in the same institution as the client-side proxy) is able
`
`to securely access an origin server (in the same institution as the server-side proxy) using the C-
`
`Page 13 of 25 
`
`Petitioner Apple Inc. - Exhibit 1021, p. 13
`
`

`
`Attorney Docket No.: 38868-0005IP1
`U.S. Patent No. 7,418,504                          
`
`HTTP connection. Id. As a result, members of different institutions on the Internet can
`
`communicate, via client-side and server-side proxies, using “secure HTTP communication
`
`mechanisms.” Ex. 1018 at p. 64, Abstract.
`
`29.
`
`Kiuchi’s C-HTTP name server and standard DNS name server store a plurality of
`
`domain names and corresponding network addresses to resolve hostnames into IP addresses. See
`
`Ex. 1018 at p. 65, § 2.3(1)-(2). With respect to the C-HTTP name server, Kiuchi explains that
`
`when an institution wants to participate in the closed network, “it must [] install a closed-side
`
`and/or server-side proxy on its firewall [and] register an IP address . . . and a hostname” with the
`
`C-HTTP name server. Ex. 1018 at p. 65, § 2.2. As a result, the C-HTTP name server stores a
`
`plurality of hostnames of secure destinations and corresponding IP addresses (e.g., addresses of
`
`server-side proxies in multiple institutions), and uses that information to resolve hostnames into
`
`IP addresses in response to queries from authorized proxies. See Ex. 1018 at p. 65, §§ 2.2-2.3.
`
`The standard/public DNS also performs domain name resolution and, in order to do so, would
`
`need to store a mapping between the IP address and domain name. See Ex. 1018 at p. 65, §
`
`2.2(1); see also Ex. 1010 at p. 5. It was well known to one of ordinary skill in the art that the
`
`Internet is composed of multiple IP addresses and domain names. See, e.g., 1010 at p. 5.
`
`Therefore the standard/public DNS server would necessarily store a plurality domain names and
`
`corresponding IP addresses to resolve hostnames into IP addresses.
`
`30.
`
`One of ordinary skill in the art, prior to February 2000, also would have
`
`understood that hostnames and IP addresses that are stored at the C-HTTP name server and the
`
`public/standard DNS server are stored in a database. In particular, one of ordinary skill would
`
`have understood that, in response to a query for domain name resolution, a name server (e.g., the
`
`C-HTTP name server or a standard/public DNS name server) is, by its nature, configured to
`
`Page 14 of 25 
`
`Petitioner Apple Inc. - Exhibit 1021, p. 14
`
`

`
`Attorney Docket No.: 38868-0005IP1
`U.S. Patent No. 7,418,504                          
`
`search for a particular domain name amongst the plurality of domain names and corresponding
`
`IP addresses that it stores. See, e.g., p. 65, § 2.2(1). To permit such searching, the name server
`
`would necessarily have stored its plurality of domain names and corresponding IP addresses in
`
`an organized and persistent structure (i.e., a database). For instance, this knowledge of a person
`
`of ordinary skill was reflected in the publically available RFC 1034 (Ex. 1010), which discloses
`
`that a domain name database is used for domain name resolution.. See Ex. 1010 at §§ 3.1, 4.1.
`
`31.
`
`Furthermore, prior to February of 2000, one of ordinary skill in the art would
`
`understand that domain names included in the URLs described by Kiuchi (and thus stored in the
`
`name servers described by Kiuchi) would contain top-level domains, as was standard for the
`
`Internet,. For instance, this knowledge is reflected in the publically available RFC 1591 (Ex.
`
`1011), which describes the domain name system structure and notes that in “the Domain Name
`
`System (DNS) naming of computers there . . . are a set of what are called ‘top-level domain
`
`names’ (TLDs)” Ex. 1011 at 1. By showing standard domain name resolution in connection
`
`with the Internet, Kiuchi discloses that the domain names include “a top-level domain name.”
`
`Moreover, Kiuchi shows several examples of domain names that may be stored at the C-HTTP
`
`name server, including: “University.of.Tokyo.Branch.Hospital”. Ex. 1018 at p. 73, Appendix 3.
`
`In this example, one of ordinary skill in the art would understand “.Hospital” to be a top level
`
`domain, under that term’s broadest reasonable interpretation.
`
`32.
`
`Kiuchi further explains that “[e]nd-users…do not even have to be conscious of
`
`using C-HTTP based communications” and that “C-HTTP is transparent to both” the user agent
`
`and the origin server. Ex. 1018 at p. 68, § 4.2.1018 Therefore, Kiuchi describes that the C-HTTP
`
`connection between the user agent (via the client-side proxy) and the origin server (via the
`
`server-side proxy) would be established transparently to a user.
`
`Page 15 of 25 
`
`Petitioner Apple Inc. - Exhibit 1021, p. 15
`
`

`
`Attorney Docket No.: 38868-0005IP1
`U.S. Patent No. 7,418,504                          
`
`33.
`
`Furthermore, within each institution, Kiuchi describes various ways the
`
`computers and communications can be secured. For example, Kiuchi describes that “each
`
`member is protected by its own firewall” within the institution. Ex. 1018 at p. 64, abstract. As a
`
`specific example, Kiuchi describes that “in-hospital networks are usually protected using a dual
`
`home gateway and packet filter (firewall).” Ex. 1018 at p. 67, § 4.2. In addition to the protection
`
`offered by the firewall within each institution, for further security, Kiuchi describes that “it is
`
`possible to develop C-HTTP proxies which can communicate with other secure HTTP
`
`compatible user agents and servers.” Ex. 1018 at p. 69, § 4.4. Kiuchi explains that this optional
`
`configuration can further “assure end-to-end or individual security.” Id.
`
`34.
`
`In addition, Kiuchi explains that its system uses computing devices and software,
`
`which necessarily include a machine-readable medium comprising instructions executable in a
`
`domain name service system. For example, Kiuchi’s client-side proxy and server-side proxy are
`
`each described as containing computer readable instructions that cause each to implement the
`
`functions performed by those items. See Ex. 1018 at p. 65, § 2.2. In particular Kiuchi describes
`
`that the C-HTTP proxy software is provided as source code and provides, in the Appendices, a
`
`summary of the source code that can be used by various components of its system in
`
`implementing the functions that it provides. See Ex. 1018 at p. 69, § 4.4, p. 67, § 3(1), pp. 70-75.
`
`One of ordinary skill in the art would similarly understand the C-HTTP name server as
`
`containing one or more computer readable instructions that cause it to implement the functions it
`
`performs.
`
`35.
`
`The computing devices and software can be configured to provide various types
`
`of services that utilize communication protocols, various sessions, and application programs,
`
`such as e-mail. Kiuchi explains that its system is built on HTTP because of its flexibility in
`
`Page 16 of 25 
`
`Petitioner Apple Inc. - Exhibit 1021, p. 16
`
`

`
`Attorney Docket No.: 38868-0005IP1
`U.S. Patent No. 7,418,504                          
`
`permitting “distributed multimedia information systems with user- friendly graphical interfaces.”
`
`Ex. 1018 at p. 67, § 4.1. Kiuchi explains that any type of data that is transmitted via HTTP can
`
`be sent through its system, such as electronic mail, HTML documents, and multimedia. See id.
`
`For example, Kiuchi describes that the C-HTTP supports a user agent application that provides
`
`e-mail: “Internet news and electronic mail services are available with an HTTP-based graphical
`
`user interface via gateways for protocol conversions. Electronic mail services within a given
`
`group of institutions can be also developed using HTTP and CGI (Common Gateway Interface).”
`
`Ex. 1018 at 67, § 4.1(1).
`
`36.
`
`Kiuchi describes that HTTP was chosen as the basis for the C-HTTP system
`
`because HTTP supports various user agent applications designed for different platforms and C-
`
`HTTP is transparent to these various user agents and servers. See Ex. 1018 at p. 67, § 4.1, p. 68,
`
`§ 4.2.
`
`37.
`
`Kiuchi teaches a plurality of services that may be accessed “via gateways for
`
`protocol conversions.” Ex. 1018 at 67. Kiuchi further teaches that the services supported over
`
`the secure communication link can utilize a variety of communication protocols: “C-HTTP is not
`
`an alternative to other secure HTTP proposals, but it can co-exist with them. Although the
`
`current C-HTTP implementation assumes the use of HTTP/1.0 compatible user agents and
`
`servers, it is possible to develop C-HTTP proxies which can communicate with other secure
`
`HTTP compatible user agents and servers. If C-HTTP is used with these protocols, which assure
`
`end-to-end or individual security, both institutional and personal level security protection can be
`
`provided.” Ex. 1018 at 69, § 4.4 (emphasis added).
`
`38.
`
`Kiuchi further teaches that a client-side proxy is configured to process multiple
`
`different sessions with multiple different server-side proxies: “In C-HTTP, as different from
`
`Page 17 of 25 
`
`Petitioner Apple Inc. - Exhibit 1021, p. 17
`
`

`
`Attorney Docket No.: 38868-0005IP1
`U.S. Patent No. 7,418,504                          
`
`ordinary HTTP, a session (virtual C-HTTP connection) is established between a client-side
`
`proxy and server-side proxy and, thus, it is not stateless. The session is finished when the client
`
`accesses another C-HTTP server or an ordinary WWW server or when the client-side or server-
`
`side proxy times out. The following ad-hoc mechanism is employed to define a session in
`
`stateless HTTP/1.0-based communication between a client-side proxy and user agent.” Ex. 1018
`
`at 65. In other words, the client-side proxy is configured to transition from a first session (virtual
`
`C-HTTP connection) with a first server-side proxy to a second session (virtual C-HTTP
`
`connection) with a second server-side proxy.
`
`39.
`
`Kiuchi also teaches that the HTTP protocol supported by the secure C-HTTP
`
`closed network is capable of supporting a variety of services: “Different application level
`
`protocols have been developed for individual network services, such as FTP, SMTP, NNTP or
`
`GOPHER [5], [6], [7], [8]. HTTP has the flexibility to be able to provide services similar to
`
`those which have been provided by these protocols . For example, file transfer by FTP is
`
`accomplished by the object transfer mechanism of HTTP and, from a functional viewpoint, the
`
`Gopher protocol can be considered a subset of HTTP. Internet news and electronic mail services
`
`are available with an HTTP-based graphi

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket