throbber

`
`IN THE UNITED STATES PATENT AND TRADEMARK OFFICE
`PATENT TRIAL & APPEAL BOARD
`Bruce Anthony Wootton & William G. Colvin
`6,128,298
`October 3, 2000
`08/842,328
`April 24, 1997
`Internet Protocol Filter
`
`In re Patent of:
`U.S. Patent No.
`Issue Date:
`
`Appl. No.:
`
`Filing Date:
`
`Title:
`
`
`
`
`DECLARATION OF BOB KUMMERFELD, PH.D.
`
`
`I, Bob Kummerfeld, declare as follows:
`
`1.
`
`I am over the age of 21, and I have personal knowledge of the facts contained herein
`
`unless otherwise indicated.
`
`2.
`
`I am an Honorary Associate Professor in the School of Information Technologies at the
`
`University of Sydney, in Sydney, Australia. From 1991 through 1993 and from 1997 through
`
`1999 I was the head of the Department of Computer Science at the University of Sydney. I hold
`
`a Bachelor of Science and Ph.D. in computer science from the University of Sydney. I have
`
`published over 100 publications in the computer, distributed systems, and networking fields.
`
`3.
`
`4.
`
`A true and correct copy of my Curriculum Vitae is attached hereto as Exhibit 1.
`
`I have been asked to provide a factual declaration regarding the public availability of a
`
`publication entitled “A Transparent TCP/IP Gateway to Connect Private Networks to the
`
`Internet,” by Heon Yeom et al. (“Yeom paper”). The Yeom paper is attached to this declaration
`
`as Exhibit 2.
`
`5.
`
`Since approximately 1991 I have maintained a web page on the University of Sydney
`
`computer science department website. The current URL for this website is
`
`http://sydney.edu.au/engineering/it/~bob/. Though often updated the webpage has since 1991
`
`contained some information about myself, as well as various materials related to my teaching,
`
`research, and professional activities. Other professors in the computer science department (now
`
`
`
`Google Ex. 1428, pg. 1
`
`

`

`
`
`called the School of Information Technologies) have also maintained similar web pages since the
`
`early 90’s. Since that time the University of Sydney computer science department website has
`
`been an on-line public resource for students and others interested in computer science to learn
`
`about the research and professional activities of the computer science department faculty,
`
`including myself.
`
`6.
`
`In 1995 I served on the Conference Committee for a conference entitled “INET ’95
`
`Internet Society’s 1995 International Networking Conference” (“INET ‘95”). The Internet
`
`Society is an international, non-profit organization focused on Internet-related standards,
`
`education, and policy. Amongst computer science academics and professionals the Internet
`
`Society has been well-known since its founding in 1992 for its role in developing and promoting
`
`the expansion of the Internet. The INET ’95 conference was designed to bring together Internet
`
`Society members and others interested in developing and implementing Internet networks,
`
`technologies, applications, and policies. The Internet Society places no restrictions on
`
`membership, anyone can join and attend events such as INET ‘95.
`
`7.
`
`Among other things I was tasked with overseeing the review of abstracts submitted to
`
`INET ‘95. 206 abstracts were submitted , including the Yeom paper. The submitted abstracts
`
`were non-confidential. The submitters were not told that the abstracts would be kept
`
`confidential.
`
`8.
`
`I uploaded all the submitted abstracts, including the Yeom paper, to my University of
`
`Sydney web page on January 30, 1995 at the following URL:
`
`http://sydney.edu.au/engineering/it/~bob/Inet95/Abstracts/ (“Abstracts URL”). The abstracts
`
`were uploaded as searchable HTML files. The January 30, 1995 upload date is corroborated by
`
`the Abstracts URL, which shows that the abstracts – including the Yeom paper which was
`
`
`
`Google Ex. 1428, pg. 2
`
`

`

`
`
`uploaded as “018.html” – were “last modified” on “30-Jan-1995.” A printout of the Abstracts
`
`URL is attached as Exhibit 3.
`
`9.
`
`The Abstracts URL also includes various HTML documents that make it easy for a
`
`visitor to search by title, author, or topic amongst the uploaded abstracts. INET ’95 was
`
`organized into the following “tracks,” or subject matter areas: applications track, commercial
`
`track, education track, engineering track, policy track, regional track, technology track, and user
`
`track. The Yeom paper was listed in both the engineering and technology tracks. The Yeom
`
`paper was indexed in several ways and available from the Abstracts URL through a number of
`
`different search techniques, or through simple browsing. For example, a visitor to the Abstracts
`
`URL could learn of the Yeom paper by reviewing the paper itself, or by reviewing the abstracts
`
`index (“abstracts.html,” providing a full list of all abstracts by title, author, and track), the
`
`engineering index (“eng+.html”, providing a full list of engineering track abstracts by title,
`
`author, and track), or the technology index (“tech+.html”, providing a full list of technology
`
`track abstracts listed by title, author, and track).
`
`10. Within a few days of January 30, 1995, I emailed the Abstracts URL to a group of over
`
`seventy conference reviewers. The review group included the INET ’95 Conference Committee
`
`as well as additional persons who were asked to review abstracts. The Abstracts URL is not
`
`password protected or otherwise restricted from public access. It has been publicly accessible on
`
`the Internet since January 30, 1995, and is still accessible today.
`
`
`
`
`
`
`
`
`
`
`
`Google Ex. 1428, pg. 3
`
`

`

`
`
`I declare under penalty of perjury under the laws of the United States of America that the
`
`foregoing is true and correct.
`4th November 2014
`Executed on __________________________.
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Bob Kummerfeld, Ph.D.
`
`
`
`
`
`
`
`
`
`Google Ex. 1428, pg. 4
`
`

`

`
`
`Google Exhibit 1428
`Google Exhibit 1428
`
`
`
`Exh. 1
`
`EXh. 1
`
`

`

`Curriculum(Vitae:((
`
`(N
`
`ame:&&&
`
`&A
`
`ddress:&
`&
`&
`&
`
`&
`&
`&
`
`&D
`
`Robert&Kummerfeld&
`
`School&of&Information&Technologies&
`University&of&Sydney&
`NSW&2006&
`Australia&
`
`egrees:&
`
`BSc&(Hons&1)&1973,&PhD&1979&University&of&Sydney&
`
`ositions:&
`&
`&
`&
`
`Lecturer&1978&–&1983&
`Senior&Lecturer&1983&–&1989&
`Associate&Professor&1989&–&2013&
`Honorary&Associate&Professor&2013&–&present&
`
`&
`
`Head&of&Department&1991Q1993&and&1997Q1999&
`
`&P
`
`&
`&
`&
`
`&&
`
`& B
`
`ob Kummerfeld is an Honorary Associate Professor of Computer Science in the
`School of Information Technologies, at the University of Sydney. He is a principal in
`the CHAI: Computer Human Adapted Interaction Research Group, leading research
`in advanced technologies for human computer interaction, supporting personalisation,
`pervasive and mobile interaction. He creates new tools for interaction in support of
`lifelong learning, collaboration and personalised smart services. His diverse research
`ranges from flexible software for message handling to systems that enable users to
`control their personal data and its use and personalised teaching systems. Prof.
`Kummerfeld has extensive publications, in venues such as the conferences UbiComp,
`Pervasive, User Modeling and Personalisation (UM, AH, UMAP) and journals, such
`as IEEE Transactions on Knowledge and Data Engineering, International Journal of
`Artificial Intelligence in Education, User Modeling and User-Adapted Interaction,
`Personal and Ubiquitous Computing.
`
`(I
`
`n 1988 Bob and colleagues founded one of the first spin-off companies from the
`University of Sydney to commercialise message handling software. Over the next 10
`years this company spawned a further four companies in the area of networks,
`including one of the first ISPs in Australia in 1991.
`
`
`
`
`Google Ex. 1428, Exh. 1, pg. 1
`
`

`

`Refereed Publications
`Scholarly Books
`1. Judy Kay and Bob Kummerfeld, editors. Proceeding of the lifelong user modelling workshop at
`umap’09 user modeling adaptation, and personalization, 2009.
`2. J. Kay and R. J. Kummerfeld, editors. Adaptive hypertext for individualised instruction - workshop
`on adaptive hypertext and hypermedia, 1994.
`Scholarly Book Chapters
`3. Judy Kay and Bob Kummerfeld. Lifelong learner modeling, pages 140–164. Cambridge Univer-
`sity Press, 2012.
`4. Tsvi Kuflik, Judy Kay, and Bob Kummerfeld. Challenges and solutions of ubiquitous user mode-
`lling. In Antonio Kruger and Tsvi Kuflik, editors, Ubiquitous Display Environments, pages 7–30.
`Springer, 2012.
`5. Amit Tiroshi, Tsvi Kuflik, Judy Kay, and Bob Kummerfeld. Recommender systems and the social
`web. pages 60–70. Springer, 2012.
`6. Mark Assad, David Carmichael, Judy Kay, and Bob Kummerfeld. PersonisAD: Distributed, Acti-
`ve, Scrutable Model Framework for Context-Aware Services. In Proceedings of the 5th Interna-
`tional Conference on Pervasive Computing, pages 55–72. Springer-Verlag, 2007.
`7. J. Kay and R. J. Kummerfeld. User models for customized hypertext. Advances in hypertext for
`the World Wide Web. Springer Verlag, 1997.
`Refereed Journal Articles
`8. Judy Kay and Bob Kummerfeld. Creating personalised systems that people can scrutinise and
`control: drivers, principles and experience. ACM Transactions on Interactive Intelligent Systems
`(TiiS), Highlights of the Decade in Interactive Intelligent Systems, 2(4):24, 2013.
`9. Judy Kay and Bob Kummerfeld. Creating personalized systems that people can scrutinize and
`control: drivers, principles and experience. ACM Transactions on Interactive Intelligent Systems
`(TiiS), 2(4):24, 2012.
`10. D. J. Carmichael, J. Kay, and R. J. Kummerfeld. Consistent modelling of users, devices and
`sensors in a ubiquitous computing environment. User Modeling and User-Adapted Interaction,
`15(3-4):197–234, 2005.
`11. A. Fernando, D. Williams, A. Fekete, and B. Kummerfeld. Dynamic network service installation
`in an active network. Computer Networks, 36(1):35–48, 2001.
`Top Refereed Conference Papers
`These publications are from very competitive, leading international conferences, key venues for com-
`puting research publication. (The following section has other fully referred papers, at venues such as
`Australian conferences and workshops associated with leading conferences.)
`12. Rainer Wasinger, James Wallbank, Luiz Augusto Sangoi Pizzato, Judy Kay, Bob Kummerfeld,
`Matthias B¨ohmer, and Antonio Kr¨uger. Scrutable user models and personalised item recom-
`mendation in mobile lifestyle applications. In Sandra Carberry, Stephan Weibelzahl, Alessandro
`Micarelli, and Giovanni Semeraro, editors, User Modeling, Adaptation, and Personalization -
`21th International Conference, UMAP 2013, Rome, Italy, June 10-14, 2013, Proceedings, volu-
`me 7899 of Lecture Notes in Computer Science, pages 77–88. Springer, 2013.
`
`Google Ex. 1428, Exh. 1, pg. 2
`
`

`

`13. Rainer Wasinger, Michael Fry, Judy Kay, and Bob Kummerfeld. User modelling ecosystems:
`a user-centred approach.
`In Judith Masthoff, Bamshad Mobasher, Michel C. Desmarais, and
`Roger Nkambou, editors, User Modeling, Adaptation, and Personalization (UMAP 2012), pages
`334–339. Springer, 2012.
`14. Andrew Clayphan, Anthony Collins, Christopher Ackad, Bob Kummerfeld, and Judy Kay. Fires-
`torm: a brainstorming application for collaborative group work at tabletops. In Proceedings of the
`ACM International Conference on Interactive Tabletops and Surfaces, ITS ’11, pages 162–171,
`New York, NY, USA, 2011. ACM.
`15. Simon Gerber, Michael Fry, Judy Kay, Bob Kummerfeld, Glen Pink, and Rainer Wasinger. Perso-
`nisJ: mobile, client-side user modelling. In UMAP 2010, LNCS 6075, pages 111–122. Springer-
`Verlag Berlin Heidelberg, 2010.
`16. Glen Pink, Simon Gerber, Michael Fry, Judy Kay, Bob Kummerfeld, and Rainer Wasinger. Safe
`execution of dynamically loaded code on mobile phones. In MobiQuitous 7th International ICST
`Conference on Mobile and Ubiquitous Systems, 2010.
`17. Mark Assad, David J. Carmichael, Judy Kay, and Bob Kummerfeld. PersonisAD: distributed,
`active, scrutable model framework for context-aware services. In Proceedings of PERVASIVE
`07, 5th International Conference on Pervasive Computing, volume 4480 of Lecture Notes in
`Computer Science, pages 55–72. Springer, 2007.
`18. M. Hitchens, J. Kay, R. J. Kummerfeld, and A. Brar. Secure identity management for pseudo-
`anonymous service access.
`In D. Hutter, editor, Proceedings of SPC 2005, 2nd International
`Conference on Security in Pervasive Computing, volume 3450 of Lecture Notes in Computer
`Science, pages 48–55. Springer-Verlag (Berlin, Heidelberg), 2005.
`
`Refereed Conference Papers
`19. Daniel Brem, Kurt Gubi, Judy Kay, Bob Kummerfeld, Tsvi Kuflik, Joseph Michaels, and Rainer
`Wasinger. Personalized cultural heritage geonotes. In Pervasive Personalisation Workshop held
`in conjunction with Pervasive 2010, pages 1–9, 2010.
`20. T. Kuflik, J. Kay, and B. Kummerfeld. Lifelong personalized museum experiences. In Pervasive
`User Modeling and Personalization (PUMP’10) at UMAP2010, pages 9–16, 2010.
`In Pro-
`21. Peter Dolog, Judy Kay, and Bob Kummerfeld. Personal lifelong user model clouds.
`ceeding of the Lifelong User Modelling Workshop at UMAP’09 User Modeling Adaptation, and
`Personalization, pages 1–8, 2009.
`22. James Bunton, Judy Kay, and Bob Kummerfeld. Metaview: dynamic metadata based views of
`user files. In Rob McArthur, Paul Thomas, Andrew Turpin, and Mingfang Wu, editors, Australian
`Document Computing Symposium, pages 11–19, 2008.
`23. James Constable, Raymes Khoury, David Carmichael, Judy Kay, and Bob Kummerfeld. Infor-
`mation art based on community activity in a large workplace. In Proceedings of Workshop on
`Context-Aware Pervasive Communities: Infrastructures, Services and Applications, at Pervasive,
`2008.
`24. Glen Pink, David Carmichael, Judy Kay, and Bob Kummerfeld. Middleware framework for
`flexible integration of new sensor types. In Proceedings of Workshop on Context-Aware Pervasive
`Communities: Infrastructures, Services and Applications, at Pervasive, 2008.
`
`Google Ex. 1428, Exh. 1, pg. 3
`
`

`

`25. Mark Assad, David J. Carmichael, Judy Kay, and Bob Kummerfeld. MYPlace Locator: Flexible
`Sharing of Location Information. In Proceedings of UM 2007, 11th International Conference on
`User Modeling, pages 410–414. Springer, 2007.
`26. Mark Assad, Judy Kay, and Bob Kummerfeld. Models of people, places and devices for location-
`aware services.
`In Adjunct Proceedings of Pervasive 2006, 4th International Conference on
`Pervasive Computing, pages 37–43. Austrian Computer Society, 2006.
`27. David J. Carmichael, Judy Kay, and Bob Kummerfeld. A personalised public information display.
`In Third Workshop on Multi-User and Ubiquitous User Interfaces (MU3I) at IUI 2006, 2006.
`28. J. Kay and B. Kummerfeld. Scrutability, user control and privacy for distributed personalization.
`In A. Kobsa, R. Chellappa, and S. Spiekermann, editors, Online Proceedings of PEP 2006, CHI
`2006 Workshop on Privacy- Enhanced Personalization, 2006.
`29. Geoff Langdale, Judy Kay, and Bob Kummerfeld. Using an intergenerational communications
`system as a ’light-weight’ technology probe. In CHI ’06: CHI ’06 Extended Abstracts on Human
`Factors in Computing Systems, pages 1001–1006, New York, NY, USA, 2006. ACM Press.
`30. S. Goldrei, J. Kay, and R. J. Kummerfeld. Exploiting user models to automate the harvesting
`of metadata for learning objects. In Online Proceedings of the AIED (Artificial Intelligence in
`Education) 2005 Workshop on Adaptive Systems for Web-Based Education, 2005.
`31. T. Greening, J. Kay, and B. Kummerfeld.
`Integrating ethical content into computing curricu-
`la. In R. Lister and A. Young, editors, Proceedings of ACE 2004, 6th Australasian Computing
`Education Conference, pages 91–107. Australian Computer Society (Sydney), 2004.
`32. J. Davis, J. Kay, B. Kummerfeld, J. Poon, A. Quigley, G. Saunders, K. Yacef, L. Alem, and
`A. McLean. Using workflow, user modeling and tutoring strategies for just-in- time document
`delivery. In Proceedings of Artificial Intelligence in Education (AIED’03), pages 664–673, Syd-
`ney, 2003. University of Sydney, Australia.
`33. S. K. Kummerfeld and J. Kay. The neglected battle fields of syntax errors. In A. Greening and
`R. Lister, editors, Proceedings of ACE 2003, 5th Australasian Computing Education Conference,
`volume 140 of Conferences in Research and Practice in Information Technology Series, pages
`105–112. Australian Computer Society (Sydney), 2003.
`34. J. Kay, B. Kummerfeld, and P. Lauder. Personis: a server for user models. In P. De Bra, P. Brusi-
`lovsky, and R. Conejo, editors, Proceedings of AH 2002, 2nd International Conference on Adap-
`tive Hypermedia and Adaptive Web-Based Systems, volume 2347 of Lecture Notes in Computer
`Science, pages 203–212. Springer, 2002.
`35. J. Kay and R. J. Kummerfeld. User interface design and programming for computer science
`majors. In P. Strooper, editor, Third Australasian Conference in Computer Science Education
`(Proceedings), pages 121–126. ACM, 1998.
`36. J. Kay and R. J. Kummerfeld. Teaching user interface design and programming to computer
`science majors. In INTERACT97 (Proceedings), pages 172–179, 1997.
`
`Other Refereed Publications
`37. Trent Apted, James Bunton, Greg Darke, Judy Kay, and Bob Kummerfeld. Systems &methods
`for collaborative interaction, US patent 2012/0110471 A2, 2012.
`
`Google Ex. 1428, Exh. 1, pg. 4
`
`

`

`25. Mark Assad, David J. Carmichael, Judy Kay, and Bob Kummerfeld. MYPlace Locator: Flexible
`Sharing of Location Information. In Proceedings of UM 2007, 11th International Conference on
`User Modeling, pages 410–414. Springer, 2007.
`26. Mark Assad, Judy Kay, and Bob Kummerfeld. Models of people, places and devices for location-
`aware services.
`In Adjunct Proceedings of Pervasive 2006, 4th International Conference on
`Pervasive Computing, pages 37–43. Austrian Computer Society, 2006.
`27. David J. Carmichael, Judy Kay, and Bob Kummerfeld. A personalised public information display.
`In Third Workshop on Multi-User and Ubiquitous User Interfaces (MU3I) at IUI 2006, 2006.
`28. J. Kay and B. Kummerfeld. Scrutability, user control and privacy for distributed personalization.
`In A. Kobsa, R. Chellappa, and S. Spiekermann, editors, Online Proceedings of PEP 2006, CHI
`2006 Workshop on Privacy- Enhanced Personalization, 2006.
`29. Geoff Langdale, Judy Kay, and Bob Kummerfeld. Using an intergenerational communications
`system as a ’light-weight’ technology probe. In CHI ’06: CHI ’06 Extended Abstracts on Human
`Factors in Computing Systems, pages 1001–1006, New York, NY, USA, 2006. ACM Press.
`30. S. Goldrei, J. Kay, and R. J. Kummerfeld. Exploiting user models to automate the harvesting
`of metadata for learning objects. In Online Proceedings of the AIED (Artificial Intelligence in
`Education) 2005 Workshop on Adaptive Systems for Web-Based Education, 2005.
`31. T. Greening, J. Kay, and B. Kummerfeld.
`Integrating ethical content into computing curricu-
`la. In R. Lister and A. Young, editors, Proceedings of ACE 2004, 6th Australasian Computing
`Education Conference, pages 91–107. Australian Computer Society (Sydney), 2004.
`32. J. Davis, J. Kay, B. Kummerfeld, J. Poon, A. Quigley, G. Saunders, K. Yacef, L. Alem, and
`A. McLean. Using workflow, user modeling and tutoring strategies for just-in- time document
`delivery. In Proceedings of Artificial Intelligence in Education (AIED’03), pages 664–673, Syd-
`ney, 2003. University of Sydney, Australia.
`33. S. K. Kummerfeld and J. Kay. The neglected battle fields of syntax errors. In A. Greening and
`R. Lister, editors, Proceedings of ACE 2003, 5th Australasian Computing Education Conference,
`volume 140 of Conferences in Research and Practice in Information Technology Series, pages
`105–112. Australian Computer Society (Sydney), 2003.
`34. J. Kay, B. Kummerfeld, and P. Lauder. Personis: a server for user models. In P. De Bra, P. Brusi-
`lovsky, and R. Conejo, editors, Proceedings of AH 2002, 2nd International Conference on Adap-
`tive Hypermedia and Adaptive Web-Based Systems, volume 2347 of Lecture Notes in Computer
`Science, pages 203–212. Springer, 2002.
`35. J. Kay and R. J. Kummerfeld. User interface design and programming for computer science
`majors. In P. Strooper, editor, Third Australasian Conference in Computer Science Education
`(Proceedings), pages 121–126. ACM, 1998.
`36. J. Kay and R. J. Kummerfeld. Teaching user interface design and programming to computer
`science majors. In INTERACT97 (Proceedings), pages 172–179, 1997.
`
`Other Refereed Publications
`37. Trent Apted, James Bunton, Greg Darke, Judy Kay, and Bob Kummerfeld. Systems &methods
`for collaborative interaction, US patent 2012/0110471 A2, 2012.
`
`Google Ex. 1428, Exh. 1, pg. 5
`
`

`

`38. Trent Apted, James Bunton, Greg Darke, Judy Kay, and Bob Kummerfeld. Systems &methods
`for collaborative interaction, australian provisional patent 2008902468, smart internet technology
`crc pty ltd, sydney, nsw, australia, 2008.
`39. B. Landfeldt, J. Kay, R. J. Kummerfeld, A. Quigley, D. West, T. Apted, and G. Sinclair. Special
`issue on pervasive computing for successful aging, 2004.
`
`Google Ex. 1428, Exh. 1, pg. 6
`
`

`

`
`
`Google Exhibit 1428
`Google Exhibit 1428
`
`
`
`Exh. 2
`
`EXh. 2
`
`

`

`Inet95 Abstract
`
`Page 1 of 4
`
`Abstract: 018
`Tracks: engineering/technology
`Author: YEOM, Heon
`Title: A transparent TCP/IP gateway to connect private networks to the Internet
`
`A transparent TCP/IP gateway to connect private networks to the INTERNET
`Heon Y. Yeom and Ilhwan Kim
`Educational and Research Computing Center
`Seoul National University
`Seoul, Korea 151-742
`(Tel) 82-2-880-5583 (Fax) 82-2-887-1858
`yeom@arirang.snu.ac.kr
`As the use of the INTERNET grows exponentially and the remaining IP address
`space is getting smaller and smaller, there arises a need to devise a way
`to connect small private networks without giving full Internet access.
`The problem we are facing now is provide internet connection to thousands of
`K12 schools in Korea as part of the Korean Education Network(KREN) without
`wasting valuable IP addresses.
`In the RFC 1597, it was suggested to reserve certain class C or class B address
`space and use it repeatedly in a private network.
`Since all we need for each K12 schools is a class C address, we can use the
`same class C address for all the K12 schools we want to connect and give them
`just one or two real IP address. Since we have less than 10,000 K12 schools
`in Korea, it would only require one class B address to cover all the K12
`schools.
`However, no clear method was suggested to provide Internet services to the
`network nodes inside the private network. Since the IP address of the inside
`network are fake, it can not be used to communicate with outside network sites
`which have real IP address.
`
`-------- a fake class C network
`---------------- / .
` / \/ .
` / \ .
` | Network of |--------- a fake class C network
` INTERNET ------| Class B |--------- a fake class C network
` \ (real IP) / .
` \ / --------- a fake class C network
`---------------- .
`
`There are two ways proposed to handle this problem which is the same as
`providing internet connection to the sites inside the firewall.
`One is proposed in [KOKO92] where the gateway machine has a server named
`sockd which handles the socket allocation and port binding for the sites
`inside the firewall. When the inside site wants a network connection, it
`would use Rconnect(), and Rbind() to get the socket from the server.
`From the outside, all the network connection is from and to the gateway
`machine. It would be perfect except that all the network programs the
`inner sites use would be changed so that the socket allocation would be
`from the server and not from the inner site itself.
`Another solution is to install proxy server for all the network services
`inner sites want to have: proxy telnet, proxy ftp, proxy gopher, etc.
`
`http://sydney.edu.au/engineering/it/~bob/Inet95/Abstracts/018.html
`
`Google Ex. 1428, Exh. 2, pg. 1
`
`

`

`Inet95 Abstract
`
`Page 2 of 4
`
`What we are proposing is a way to transparently map the packets from the
`inner site so that it looks like as if it was from the gateway.
`By restricting the network services that need to be provided to the inner
`network, a simple mapping gateway could handle the translation as follows.
`Whenever an inner site I1 wants to make a TCP connection with outside host
`O2, it would send a request as if it is on a real IP network.
`The gateway G which has a real IP address G, when receiving the packet,
`would make an entry of the ((I1,p1),(O2,p2)) with a port of its own (G,p3).
`From that point on,
`all the packets with originator (I1,p1) and destination (O2,p2) would be
`transformed into a packet with originator (G,p3) and sent to the outside
`network. Likewise, all the packets from the outside network with
`originator (O2,p2) and destination (G,p3) would be transformed with
`destination (I1,p1) and feed into the inner network.
`Using this method, all the network services requested by the inner network
`site can be serviced if it only requires simple TCP connection.
`One significant problem with this approach is that it can not handle the
`FTP data connection. As identified in [CHBE94], FTP data connection is
`originated from the FTP server after the client sends a port number it will
`listen to. When the FTP server sends a connection request to that port,
`the gateway would have no idea where this particular packet should be sent.
`There are two solutions to this problem. One is to change the FTP client
`so that it will initiate the data connection using the PASSIVE command of
`the FTP client. Another is for the gateway to intercept FTP PORT command
`PORT I1,p4 and allocate another gateway port for it so that PORT I1,p4
`would be transformed into PORT G,p5. Another solution would be to use the
`proxy FTP program on the gateway. It would depend on what the gateway
`machine can do. If it's a full blown UNIX machine, it would be easier to
`use the proxy FTP. On the other hand, if it is just a PC with two ethernet
`connections looking at the packets, the second solution would be better.
`We believe that the cases where the inner network site acts as the network
`service host would be very rare. However, we can still provide limited
`service so that each well known service would be provided by one or few
`servers in one private network. The number of servers is restricted by
`the number of real IP addresses assigned to the inner network.
`As for the UDP services, since there is no clear indication for the
`beginning and end of the UDP connection, it would be very difficult to do
`port allocation and transformation. However, the only UDP service we can
`think of that might be needed for this kind of environment is DNS service.
`It can be handled by having a DNS server in the inner network with real
`IP and change the named server so that it will resolve all the DNS query
`without DNS query forwarding.
`We have outlined a simple interconnection method to connect private network
`with fake IP to the Internet. This solution is only temporary fix and we
`hope that the next generation IP would have enough address space for all
`the people in the world.
`
`Appendix
`A. pseudo code for fake IP gateway
`main()
`{
`
`do {
`
`http://sydney.edu.au/engineering/it/~bob/Inet95/Abstracts/018.html
`
`Google Ex. 1428, Exh. 2, pg. 2
`
`

`

`Inet95 Abstract
`
`Page 3 of 4
`
`packet = get_next_packet();
`if (packet is from inner network) {
`newpacket = i_to_o(packet);
`send_packet(newpacket, outer interface);
`newpacket = o_to_i(packet);
`send_packet(newpacket, inner interface);
`
`} else {
`
`}
`
`}
`
`} i
`
`_to_o(packet)
`{
`if (packet.flag == SYN) {
`alloc_port(packet);
`
`} n
`
`ewpacket.src_ip = gateway_ip;
`newpacket.src_port = get_gatewayport(packet.src_ip, packet.src_port);
`/* we should carefully design an algorithm to handle
`graceful shutdown of TCP connection..TBD */
`if ((packet.flag == FIN) || (packet.flag == RST)) {
`prepare_release_port(packet);
`f (packet.flag == ACK) {
`if (the packet is ACK to previous FIN..etc) {
`......
`release port w.r.t. packet flags;
`
`}i
`
`}
`
`} r
`
`eturn newpacket;
`
`} o
`
`}
`
`_to_i(packet)
`{
`if (port_table[packet.dst_port] == NULL) {
`/* no entry in table, which means there is no TCP client
` in inner network, so send back reset to source */
`newpacket.dst_ip = packet.src_ip;
`newpacket.dst_port = packet.src_port;
`newpacket.src_ip = packet.dst_ip;
`newpacket.src_port = packet.dst_port;
`newpacket.flag |= RST;
`return newpacket;
`
`} n
`
`ewpacket.dst_ip = port_table[packet.dst_port].inner_ip;
`newpacket.dst_port = port_table[packet.dst_port].inner_port;
`/* again, we should redesign following algorithm to handle
`graceful close of TCP connection */
`if ((packet.flag == FIN) || (packet.flag == RST)) {
`prepare_release_port(packet);
`
`} r
`
`eturn newpacket;
`
`http://sydney.edu.au/engineering/it/~bob/Inet95/Abstracts/018.html
`
`Google Ex. 1428, Exh. 2, pg. 3
`
`

`

`Inet95 Abstract
`
`Page 4 of 4
`
`References
`[REKH94] Y.Rekhter, B.Moskowitz, "Address Allocation for Private Internets,
` RFC1597", Mar. 1994.
`[KOKO92] D. Koblas, M.R. Koblas,"SOCKS", USENIX Security Proceedings, III,
` Sep. 1992.
`[CHBE94] W.R. Cheswick, S.M. Bellovin, "Firewall and Internet Security",
` Addison Wesley, 1994.
`[PORE85] J. Postel, J. Reynolds, "File Transfer Protocol, RFC959",
` Oct. 1985.
`
`http://sydney.edu.au/engineering/it/~bob/Inet95/Abstracts/018.html
`
`Google Ex. 1428, Exh. 2, pg. 4
`
`

`

`
`
`Google Exhibit 1428
`Google Exhibit 1428
`
`
`
`Exh. 3
`
`EXh. 3
`
`

`

`Index of l~b0bllnet95IAbstracts
`
`Name
`
`Last mfldified
`
`Size
`
`DescriEtiDn
`
`
`
`Parent Director
`
`04—Feb—1997
`
`18:
`
`33
`
`DD1
`
`.html
`
`DD2
`
`.html
`
`DD3
`
`.html
`
`DD4
`
`.html
`
`DD3
`
`.html
`
`DDS
`
`.html
`
`DDT
`
`.html
`
`DDB
`
`.htnfl
`
`DDS
`
`.html
`
`D1D
`
`.html
`
`D11
`
`.html
`
`D12
`
`.html
`
`D13
`
`.html
`
`D14
`
`.html
`
`.htnfl
`
`30—Jan—1995
`
`14:
`
`34
`
`15k
`
`30—Jan—1995
`
`12:
`
`DE
`
`30—Jan—1995
`
`12:
`
`DE
`
`30—Jan—1995
`
`12:
`
`DE
`
`30—Jan—1995
`
`12:
`
`DE
`
`30—Jan—1993
`
`12:
`
`DE
`
`30—Jan—1995
`
`12:
`
`DE
`
`30—Jan—1995
`
`12:
`
`DE
`
`30—Jan—1995
`
`12:
`
`DE
`
`30—Jan—1995
`
`12:
`
`DE
`
`1k
`
`4k
`
`2k
`
`1t
`
`6k
`
`5k
`
`1k
`
`4k
`
`Th
`
`30—Jan—1995
`
`12:
`
`DE
`
`22k
`
`30—Jan—1995
`
`12:
`
`DE
`
`30—Jan—1995
`
`12:
`
`DE
`
`30—Jan—1995
`
`12:
`
`DE
`
`30—Jan—1995
`
`12:
`
`DE
`
`it
`
`1k
`
`3k
`
`5t
`
`
`
`I'll"mmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmt;
`
`D13
`
`D16
`
`.html
`
`D17
`
`.html
`
`IE:- |_1 L'u
`
`.html
`
`D13
`
`.html
`
`D2D
`
`.html
`
`D21
`
`.html
`
`D22
`
`.html
`
`D23
`
`.html
`
`D24
`
`.html
`
`D23
`
`.html
`
`D26
`
`.htnfl
`
`D27
`
`.html
`
`D23
`
`.html
`
`D29
`
`.html
`
`D3D.html
`
`D31
`
`.html
`
`30—Jan—1995
`
`12:
`
`DE
`
`30—Jan—1993
`
`12:
`
`DE
`
`30—Jan—1995
`
`12:
`
`DE
`
`30—Jan—1995
`
`12:
`
`DE
`
`30—Jan—1995
`
`12:
`
`DE
`
`30—Jan—1995
`
`12:
`
`DE
`
`30—Jan—1995
`
`12:
`
`DE
`
`30—Jan—1995
`
`12:
`
`DE
`
`30—Jan—1993
`
`12:
`
`DE
`
`30—Jan—1995
`
`12:
`
`DE
`
`30—Jan—1995
`
`12:
`
`DE
`
`30—Jan—1995
`
`12:
`
`DE
`
`30—Jan—1995
`
`12:
`
`DE
`
`30—Jan—1995
`
`12:
`
`DE
`
`30—Jan—1995
`
`12:
`
`DE
`
`4t
`
`Th
`
`Bk
`
`1t
`
`5k
`
`4k
`
`5t
`
`4t
`
`3k
`
`5k
`
`Bk
`
`6t
`
`Th
`
`5k
`
`TI
`
`30—Jan—1995
`
`12:
`
`US
`
`20k
`
`Google Ex. 1428, Exh. 3, pg. 1
`
`Google Ex. 1428, Exh. 3, pg. 1
`
`

`

`U32.
`
`fltflu
`
`333
`
`.htnd
`
`33%
`
`.html
`
`333
`
`.html
`
`336
`
`.html
`
`337
`
`.html
`
`333
`
`.html
`
`333
`
`.html
`
`343
`
`.html
`
`dU—dan—lflflb
`
`ii:
`
`UH
`
`33—Jan—1993
`
`12:
`
`DB
`
`33—Jan—1993
`
`12:
`
`33
`
`33—Jan—1993
`
`12:
`
`DB
`
`33—Jan—1993
`
`12:
`
`33
`
`33—Jan—1993
`
`12:
`
`33
`
`33—Jan—1993
`
`12:
`
`33
`
`33—Jan—1993
`
`12:
`
`33
`
`33—Jan—1993
`
`12:
`
`DB
`
`33
`
`DE
`
`it
`
`6t
`
`3t
`
`Tk
`
`it
`
`3t
`
`Th
`
`6k
`
`TI
`
`341
`
`.html
`
`342
`
`.html
`
`343
`
`.html
`
`344
`
`.htnd
`
`343
`
`.html
`
`346
`
`.html
`
`347
`
`.html
`
`343
`
`.html
`
`343
`
`.html
`
`33—Jan—1993
`
`12:
`
`33—Jan—1993
`
`12:
`
`DB
`
`33—Jan—1993
`
`12:
`
`33
`
`33—Jan—1993
`
`12:
`
`DB
`
`33—Jan—1993
`
`12:
`
`33
`
`33—Jan—1993
`
`12:
`
`33
`
`33—Jan—1993
`
`12:
`
`DB
`
`33—Jan—1993
`
`12:
`
`33
`
`33—Jan—1993
`
`12:
`
`33
`
`12:
`
`33
`
`6k
`
`4k
`
`1k
`
`3k
`
`3k
`
`fit
`
`it
`
`3k
`
`6k
`
`"'”mmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmn
`
`333
`
`.html
`
`363
`
`.html
`
`361
`
`.html
`
`362
`
`.htnd
`
`333
`
`.html
`
`364
`
`.html
`
`363
`
`.html
`
`366.html
`
`367.html
`
`363.html
`
`33—Jan—1993
`
`12:
`
`DB
`
`33—Jan—1993
`
`12:
`
`33
`
`33—Jan—1993
`
`12:
`
`DB
`
`33—Jan—1993
`
`12:
`
`33
`
`3k
`
`3k
`
`3t
`
`7t
`
`33—Jan—1993
`
`12:
`
`DB
`
`11k
`
`33—Jan—1993
`
`12:
`
`33
`
`33—Jan—1993
`
`12:
`
`33
`
`33—Jan—1993
`
`12:
`
`33
`
`33—Jan—1993
`
`12:
`
`DE
`
`9k
`
`3t
`
`6t
`
`3t
`
`Google Ex. 1428, Exh. 3, pg. 2
`
`333
`
`.html
`
`331
`
`.htnd
`
`332
`
`.html
`
`333
`
`.html
`
`334
`
`.html
`
`333
`
`.htnd
`
`336
`
`.html
`
`337
`
`.html
`
`333
`
`.html
`
`33—Jan—1993
`
`33—Jan—1993
`
`12:
`
`DB
`
`33—Jan—1993
`
`12:
`
`33
`
`33—Jan—1993
`
`12:
`
`DB
`
`33—Jan—1993
`
`12:
`
`33
`
`3k
`
`3t
`
`2t
`
`Tk
`
`33—Jan—1993
`
`12:
`
`DB
`
`16k
`
`33—Jan—1993
`
`12:
`
`33
`
`33—Jan—1993
`
`12:
`
`33
`
`33—Jan—1993
`
`12:
`
`DB
`
`33—Jan—1993
`
`12:
`
`33
`
`6t
`
`4k
`
`3k
`
`TI
`
`Google Ex. 1428, Exh. 3, pg. 2
`
`

`

`363
`
`.htnd
`
`373
`
`.html
`
`371
`
`.html
`
`3T2
`
`.html
`
`373
`
`.htnfl
`
`374
`
`.html
`
`373
`
`.html
`
`376
`
`.html
`
`377
`
`.html
`
`33—Jan—1335
`
`12:
`
`33
`
`33—Jan—1335
`
`12:
`
`33
`
`33—Jan—1335
`
`12:
`
`DB
`
`33—Jan—1335
`
`12:
`
`33
`
`33—Jan—1335
`
`12:
`
`DB
`
`33—Jan—1335
`
`1

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket