`
`(12) United States Patent
`Larson et al.
`
`(10) Patent No.:
`(45) Date of Patent:
`
`US 8,850,009 B2
`*Sep. 30, 2014
`
`(54) SYSTEM AND METHOD EMPLOYING AN
`AGILE NETWORK PROTOCOL FOR SECURE
`COMMUNICATIONS USING SECURE
`DOMAIN NAMES
`(71) Applicant: Virnetx, Inc., Zephyr Cove, NV (US)
`
`(58) Field of Classification Search
`USPC ........... .. 709/227—228, 225, 221, 229; 726/l5
`See application file for complete search history.
`References Cited
`U.S. PATENT DOCUMENTS
`
`(56)
`
`(72)
`
`Inventors: Victor Larson, Fairfax, VA (US);
`Robert Dunham Short, III, Lexington,
`VA (US); Edmund Colby Munger,
`Tarpon Springs, FL (US); Michael
`Williamson, South Riding, VA (US)
`
`(73) Assignee: VirnetX, Inc., Zephyr Cove, NV (US)
`
`( * ) Notice:
`
`Subject to any disclaimer, the term of this
`patent is extended or adjusted under 35
`U.S.C. l54(b) by 0 days.
`
`This patent is subject to a terminal dis-
`claimer.
`
`(21) Appl.No.: 13/911,792
`
`(22)
`
`Filed:
`
`Jun. 6, 2013
`
`2,895,502 A
`4,405,829 A
`
`7/1959 Roper et al.
`9/1983 Rivest
`
`(Continued)
`FOREIGN PATENT DOCUMENTS
`
`(Continued)
`OTHER PUBLICATIONS
`
`Office Action dated Jan. 28, 2014 from Corresponding U.S.App1. No.
`13/620,550.
`
`(Continued)
`
`Primary Examiner — Krisna Lim
`(74) Attorney, Agent, or Firm — McDermott Will & Emery
`LLP
`
`(65)
`
`Prior Publication Data
`
`(57)
`
`ABSTRACT
`
`Us 2013/0258533 A1
`
`Qct. 10, 2013
`
`Related U.S. Application Data
`
`(63) Continuation of application No. 13/903,788, filed on
`May 28, 2013, which is a continuation of application
`
`(51)
`
`Int_ C1_
`G0617 15/173
`G06F 15/16
`
`(Continued)
`
`(2006.01)
`(2006.01)
`
`(Continued)
`
`(52) US, C1,
`Cpc ........ N H041, 67/14 (2013 Q1); H041, 29/12216
`(2013.01), H04L 45/00 (2013.01), H04L
`63/1416 (2013.01), H04L 45/24 (2013.01),
`
`A network device comprises a storage device storing an appli-
`cation program for a secure communications service; and at
`least one processor configured to execute the application pro-
`gram enabling the network device to: (a) send a request to
`look up a network address of a second network device based
`on an identifier; (b) receive an indication that the second
`network device is available for the secure communications
`service,
`the indication including the requested network
`address of the second network device and provisioning infor-
`mation for a secure .COII1II111I11Cat1OI1 link; (c) connect to.the
`second network device over the secure communication link,
`using the received network address of the second network
`device and the provisioning information for the secure com-
`munication link; and ((1) Communicate at least one of video
`data and audio data with the second network device using the
`secure communications service via the secure communica-
`tion link.
`
`(Continued)
`
`25 Claims, 40 Drawing Sheets
`
`nus
`SERVER
`
`2°°9'/
`
`W
`
`\2scr2
`
`DNFS{Ef£$\l’J’lE-SST
`FORTARGETSITE
`
`ACCESSTO
`secunssnz
`REQUESTED?
`
`
`
`270?
`4:.
`PASSTHRU
`REQUESTTO
`DNSSEWER
`
`W\
`RETURN
`‘HOSTUNKNOWW
`ERROR
`
`
`
`GATEKEEFER
`
`RULES
`
`‘W
`
`zaoh
`
`35°‘
`SECURE
`TARGET
`sm1»
`HOFFJNG
`UNSEOJRE
`men
`SHE
`/2611
`
`ESTABLISH
`vmwrm
`TARGETSITE
`
`27%
`
`Petitioner Apple Inc. - Ex. 1003, p. 1
`
`Petitioner Apple Inc. - Ex. 1003, p. 1
`
`
`
`US 8,850,009 B2
`Page 2
`
`Related U.S.Application Data
`
`No. 13/336,790, filed on Dec. 23, 2011, now Pat. No.
`8,458,341, which is a continuation of application No.
`-
`-
`13/049,552,
`filed on Mar. 16, 2011, which is a
`continuation of application No. 11/840,560, filed on
`Aug. 17, 2007, HOW Pat. No. 7,921,211, which is a
`continuation of application No. 10/714,849, filed on
`Nov. 18, 2003, HOW Pat. No. 7,418,504, which is a
`continuation of application No. 09/558,210, filed on
`Apr.‘
`HOW abandoned,
`lS
`a
`continuation-in-part of application No. 09/504,783,
`filed on Feb. 15,2000, now Pat. No.6,502,135,which
`is
`a
`continuation-in-part
`of
`application No.
`09/429,643, filed on Oct. 29, 1999, now Pat. No.
`7,010,604.
`.
`.
`..
`(60) Provisional application No. 60/106,261, filed on Oct.
`30, 1998, provisional application No. 60/137,704,
`filed on Juh.7, 1999.
`
`<59
`
`(200601)
`H041’ 29/12
`(201301)
`H04L12/701
`(2006.01)
`H04L 29/06
`(2013.01)
`H04L 12/707
`Hm <2eeee1>
`G06F 21/60
`(201301)
`H04L 29/03
`(200601)
`H04L 12/703
`(2013.01)
`
`(52) U.S.Cl.
`CPC ....... .. H04L 29/12301 (2013.01);H04L 63/164
`(2013.01); H04L 61/35 (2013.01); H04L 41/00
`(2013.01); H04L 61/2076 (2013.01); H04L
`29/1232 (2013.01);H04L 63/0227(2013.01);
`H04L 63/0428 (2013.01);H04L 63/0272
`(2013.01); H04L 63/1408 (2013.01); H04L
`63/04 (2013.01); H04L 63/08 (2013.01); G06F
`21/606 (2013.01); H04L 63/1458 (2013.01);
`H04L 63/0407 (2013.01), H04L 61/2007
`(2013.01); H04L 29/12783 (2013.01); H04L
`63/1466 (2013.01); H04L 29/12801 (2013.01);
`H04L 29/12594 (2013.01);H04L 61/1511
`(2013.01);H04L 61/303 (2013.01), H04L
`63/105 (2013.01);H04L 61/6004 (201301),
`H04L 61/2092 (201301); H04L 45/28
`(2013.01);H04L 29/12066(2013.01)
`USPC ............ .. 709/225; 700/221; 700/229; 726/15
`
`<59
`
`Refeeeneee Cited
`
`US" PATENT DOCUMENTS
`4,677,434 A
`6/1987 Fascenda
`4,761,334 A
`8/1988 Sagoietal.
`41885778 A
`12/1989 Weiss
`4912752 A
`3/1990 Lee etele
`419201484 A
`4/1990 Renede
`4,933,846 A
`6/1990 Humphreyetal.
`4,952,930 A
`8/1990 Franaszeketal.
`4,988,990 A
`1/1991 Warrior
`5,007,051 A
`4/1991 Dolkasetal.
`5,070,528 A
`12/1991 Hawe et 31.
`5,164,988 A
`11/1992 Matyas
`5,204,961 A
`4/1993 Barlow
`5,276,735 A
`1/1994 Boebeit etal.
`5,303,302 A
`4/1994 Burrows
`5,311,593 A
`5/1994 Carmi
`5,329,521 A
`7/1994 Walsh etal.
`
`5,341,426 A
`5,345,439 A
`5,367,643 A
`A
`,
`,
`5,416,842 A
`5 420 926 A
`5:444:78; A
`5,455,861 A
`5,511,122 A
`2
`A
`5,561,669 A
`5,588,060 A
`2
`5’625’626 A
`5:629:984 A
`5,636,139 A
`5,654,695 A
`5,632,480 A
`5,689,566 A
`5,689,641 A
`233332 2
`5,764,906 A
`5,771,239 A
`5,774,660 A
`5,781,550 A
`2/33512::
`57965942 A
`5:805:801 A
`5,805,803 A
`5,805,820 A
`558125570 A
`A
`5,842,040 A
`5,845,091 A
`A
`5’870’610 A
`5,873,231 A
`5,884,038 A
`5,384,270 A
`A
`5:898:830 A
`5,905,359 A
`5,915,087 A
`A
`51940393 A
`5:950:195 A
`5,950,519 A
`5,960,204 A
`5,961,593 A
`2:333:33‘; 2‘
`6,003,084 A
`6,006,259 A
`g’g(1)?’§;§ A
`6’012’088 A
`6,016,318 A
`6,016,504 A
`6,016,512 A
`6’023’510 A
`6’032’118 A
`6041342 A
`e
`e
`6,052,788 A
`6,055,236 A
`6,055,518 A
`6,055,574 A
`6,055,575 A
`6,058,250 A
`6,061,346 A
`
`8/1994 Barney e1 31,
`9/1994 Marston
`11/1994 Chang et al.
`1I<i1<11C11i
`ones
`5/1995 Aziz
`5/1995 LOW et A1.
`3/1995 Adams, J,.e,,,1.
`10/1995 Faucher et al.
`4/1996 A11<1_ns0n
`iI:irZ”::’a‘{r' et 31'
`
`5
`
`l.
`
`5
`
`9/1996
`10/1996 Lenney eta1,
`12/1995 A212
`1%; $131155’ et 31
`A/1997 Ulrlnekita
`5/1997 McManis
`6/1997 ML h1'
`8/1997 Oljlostligh :1 :3
`10/1997 Nakagawa
`11/1997 Nguyen
`11/1997 Ludwig etal.
`2/132: ?:;,::::;:1,
`6/1998 Edelstein et al.
`6/1998 Moroney etal.
`6/1998 Brendel et al.
`7/1998 Templin etal.
`1/132:
`5‘-“see-‘ 11,1
`8/1998
`e
`9/1998 Holloway etal.
`9/1998 Birrellet al.
`9/1998 Bellovin etal.
`/1998 Micali
`9/
`.
`1
`§f§§’§,“§,:fa'
`11/1998 Hughes et al.
`12/1998 Dunne e1 81,
`ghflder
`2,1999 Bjyifinjtnal.
`3/1999 Baehr et 31.
`3/1999 Kapoor
`3/1999 Walker et 31.
`glilair
`4/1999 Wesingera Jr. et A1.
`5/1999 Houoway et 31,
`6/1999 Hammond et al.
`3010de_rumeta1,
`8,1999 D‘;f;e:a1
`9/1999 Stockwelletal.
`9/1999 Anatoli
`9/1999 Y1nge1e131~
`10/1999 Gabberetal.
`131333 3333352331 et ,1
`12/1999 Green et al.
`12/1999 Adelman etal.
`135333 §}:;f$‘”da" et 31‘
`1/2000 Metal
`1/2000 Tomoike
`1/2000 Arnoldetal
`1/2000 Huitema
`2/2000 E Stein
`1
`2/2000 Tpll
`t
`3/2000 Ye °e eh.
`em.egue 1
`4/2000 Weslnger et al.
`4/2000 Nessettet 3.1.
`4/2000 Franklin etal.
`4/2000 Smorodmsky etal.
`4/2000 Paulsen etal.
`5/2000 Harwood etal.
`5/2000 Nordman
`
`Petitioner Apple Inc. - Ex. 1003, p. 2
`
`Petitioner Apple Inc. - Ex. 1003, p. 2
`
`
`
`(56)
`
`References Cited
`
`U,S, PATENT DOCUMENTS
`
`6,061,736 A
`5,055,049 A
`5,073,175 A
`5,079,020 A
`6,081,900 A
`6,092,200 A
`6,101,182 A
`5,111,883 A
`6,119,171 A
`5,119,234 A
`6,131,121 A
`5,147,975 A
`5,148,342 A
`5,151,528 A
`5,154,839 A
`5,157,957 A
`5,158,011 A
`5,158,409 B1
`6,173,399 B1
`5,175,857 B1
`6,178,409 B1
`6,178,505 B1
`6,179,102 B1
`5,182,072 B1
`5,182,141 B1
`5,182,227 B1
`5,195,577 B1
`5,199,112 B1
`5,199,122 B1
`5,202,081 B1
`5,222,842 B1
`6,223,287 B1
`6,225,993 B1
`6,226,748 B1
`6,226,751 B1
`5,233,518 B1
`5,243,350 B1
`5,243,749 B1
`5,243,754 B1
`5,245,570 B1
`6,256,671 B1
`5,252,987 B1
`5,253,445 B1
`6,266,699 B1
`5,259,099 B1
`6,286,047 B1
`6,298,341 B1
`5,298,383 B1
`5,301,223 B1
`6,308,213 B1
`5,308,274 B1
`6,311,207 B1
`6,314,463 B1
`5,324,151 B1
`6,330,562 B1
`6,332,158 B1
`6,333,272 B1
`5,335,955 B1
`5,338,082 B1
`5,345,351 B1
`5,353,514 B1
`6,366,912 B1
`6,367,009 B1
`5,421,732 B1
`5,425,003 B1
`6,426,955 B1
`6,430,155 B1
`6,430,176 B1
`6,430,610 B1
`6,434,600 B2
`6,438,127 B1
`6,449,272 B1
`6,449,657 B2
`6,453,034 B1
`6,487,598 B1
`
`5/2000 Rochberger et al.
`5/2000 B5551 5131,
`5/2000 Tavs 51111,
`5/2000 L111
`6/2000 Subramaniam et a1.
`7/2000 Muniyappa et al.
`8/2000 Sistanizadeh et al.
`8/2000 T513113 5131,
`9/2000 Alkhatib
`9/2000 Aziz 5131,
`10/2000 Mattaway et al.
`11/2000 511111111 5131,
`11/2000 Ho
`11/2000 X11 51 111,
`11/2000 A11oW 5131,
`12/2000 B51111111111
`12/2000 C11511 5131,
`1/2001 1:515
`1/2001 Gilbrech
`1/2001 Taghadoss
`1/2001 Weber et al.
`1/2001 Schneider et al.
`1/2001 Weber et a1.
`1/2001 1351111 51 111,
`1/2001 B111111 5131,
`1/2001 B1311 51111,
`2/2001 1115111111
`3/2001 W11Son
`3/2001 Kobayashi
`3/2001 Naudus
`4/2001 Sasyan 51 31,
`4/2001 Douglas et al.
`5/2001 Lindblad et al.
`5/2001 Bots et al.
`5/2001 Arrow et a1.
`5/2001 Shannon
`5/2001 BaS111oo
`5/2001 51111111111511 5131,
`5/2001 G1151111 51111,
`5/2001 Ka11SSo11 51111,
`7/2001 Strentzsch et al.
`7/2001 Mogu1
`7/2001 B1111115111111
`7/2001 Sevcik
`7/2001 Bo1511a 5131,
`9/2001 Ramanathan et al.
`10/2001 Mann et al.
`10/2001 G1111111111 51 31,
`10/2001 111351111 5131,
`10/2001 Valencia
`10/2001 gW1f1
`10/2001 Mighdoll et al.
`11/2001 Abbott et al.
`11/2001 K11o11
`12/2001 Boden et a1.
`12/2001 Risley et al.
`12/2001 McMillin et al.
`1/2002 Toyoda
`1/2002 551111511151
`2/2002 J51g51 51111,
`3/2002 Bo1511a 5131,
`4/2002 Wallent et al.
`4/2002 Davis et a1.
`7/2002 A1k11a11b 51 111,
`7/2002 H51Zog 5131,
`7/2002 Gossett et al.
`8/2002 Davie et al.
`8/2002 Christie
`8/2002 Carter
`8/2002 Waite et al.
`8/2002 Le Goff et al.
`9/2002 Chuah et al.
`9/2002 Stanbach
`9/2002 Donovan et al.
`11/2002 Valencia
`
`US 8,850,009 B2
`Page 3
`
`6,490,290 B1
`6,496,491 B2
`6,496,867 B1
`6,499,108 B1
`6,502,135 B1
`6,505,232 B1
`6,510,154 B1
`6,546,003 B1
`6,549,516 B1
`6,557,037 B1
`6,560,634 B1
`6,564,261 B1
`6,571,296 B1
`6,571,338 B1
`6,581,166 B1
`6,590,588 B2
`6,591,306 B1
`6,606,660 B1
`6,606,708 B1
`6,609,196 B1
`6,615,357 B1
`6,618,761 B2
`6,636,505 B1
`6,640,302 B1
`6,643,701 B1
`6,671,702 B2
`6,687,551 B2
`6,687,746 B1
`6,687,823 B1
`6,693,878 B1
`6,701,437 B1
`6,714,970 B1
`6,717,949 B1
`6,751,729 B1
`6,751,738 B2
`5,752,155 B2
`6,754,212 B1
`5,757,740 B1
`6,760,766 B1
`6,801,509 B1
`6,804,783 B1
`6,813,777 B1
`6,826,616 B2
`6,829,242 B2
`6,834,271 B1
`6,839,759 B2
`6,917,600 B1
`6,930,998 B1
`6,937,597 B1
`6,959,184 B1
`7,010,604 B1
`7,028,182 B1
`7,039,713 B1
`7,065,784 B2
`7,072,964 B1
`7,100,195 B1
`7,103,770 B2
`RE39,360 E
`7,133,930 B2
`7,167,904 B1
`7,138,175 B1
`7,188,180 B2
`7,197,563 B2
`7,203,190 B1
`7,225,249 B1 *
`7,249,377 B1
`7,275,113 B1
`7,307,990 B2
`7,353,841 B2
`7,418,504 B2
`7,461,334 B1
`7,490,151 B2
`7,493,403 B2
`7,584,500 B2
`7,669,049 B2
`7,764,231 B1
`7,852,861 B2
`7,921,211 B2
`7,933,990 B2
`
`12/2002 Zhang et al.
`12/2002 Chuah et al.
`12/2002 Beser et al.
`12/2002 Johnson
`12/2002 Munger
`1/2003 Mighdoll et al.
`1/2003 Mayes et al.
`4/2003 Farris
`4/2003 1416611 61111,
`4/2003 P10V1110
`5/2003 B10a_c111111s1
`5/2003 Gudjonsson et a1.
`5/2003 D111011
`5/2003 Shaio et al.
`6/2003 H1131 61111,
`7/2003 Lincke et a1.
`7/2003 Redlich
`8/2003 Bowman-Amuah
`8/2003 Devine et al.
`8/2003 Dickinson, III et al.
`9/2003 Boden et al.
`9/2003 Munger et al.
`10/2003 Wang 61111,
`10/2003 Subrarnaniam et al.
`11/2003 A212 631211,
`12/2003 K111g111<0V 61111,
`2/2004 516111111
`2/2004 Shuster et al.
`2/2004 Al-Salqan et al.
`2/2004 Daruwalla et al.
`3/2004 Hoke et al.
`3/2004 F1Veash et al.
`4/2004 Boden et al.
`6/2004 G1n1ger et al.
`6/2004 Wesinger, Jr. et al.
`5/2004 L1111 61 €11,
`6/2004 Terada 61 111,
`5/2004 P€1fe1<11_e1a1,
`7/2004 Sa1_11c1V1s1
`10/2004 Rai et al.
`10/2004 Wesinger, Jr. et al.
`11/2004 Weinberger et al.
`11/2004 Larson et al.
`12/2004 DaV1son et al.
`12/2004 Hodgson 61111,
`1/2005 Larson et al.
`7/2005 Chuah et al.
`8/2005 Sy1Va111
`8/2005 Rosenberg et al.
`10/2005 Byers 61111,
`3/2006 Munger 61111,
`4/2006 Killcommons
`5/2006 Van Gunter et al.
`6/2006 Hopmarm 61111,
`7/2006 Whittle et al.
`3/2005 Underwood
`9/2006 13011111111
`10/2006 Aziz et al.
`11/2006 M1111ge_1e1a1,
`1/2007 Devaraian 61111,
`3/2007 MCKee111
`3/2007 Larson et al.
`3/2007 Sheymov et al.
`4/2007 Ruban et al.
`5/2007 Barry et al.
`7/2007 L11a61a1~
`9/2007 Arauio
`12/2007 Rosen et al.
`4/2008 Kono et al.
`8/2008 Larson 61 al.
`12/2008 Lu 6181,
`2/2009 Munger et al.
`2/2009 Shull et al.
`9/2009 Dillon et al.
`2/2010 Wang et al.
`7/2010 Karr et al.
`12/2010 Wu et al.
`4/2011 Larson et al.
`4/2011 Munger et al.
`
`................. .. 709/227
`
`Petitioner Apple Inc. - Ex. 1003, p. 3
`
`Petitioner Apple Inc. - Ex. 1003, p. 3
`
`
`
`US 8,850,009 B2
`Page 4
`
`(56)
`
`References Cited
`U.S. PATENT DOCUMENTS
`
`8,051,181 B2
`8,504,696 B2
`8,504,697 B2
`2001/0049741 A1
`2002/0002675 A1
`2002/0004826 A1
`2002/0004898 A1
`2002/0006132 A1
`2003/0005132 A1
`2003/0196122 A1
`2004/0199493 A1
`2004/0199520 A1
`2004/0199608 A1
`2004/0199620 A1
`2005/0055306 A1
`2005/0108517 A1
`2006/0059337 A1
`2006/0123134 A1
`2007/0208869 A1
`2007/0214284 A1
`2007/0266141 A1
`2008/0005792 A1
`2008/0144625 A1
`2008/0235507 A1
`2009/0193498 A1
`2009/0193513 A1
`2009/0199258 A1
`2009/0199285 A1
`
`11/2011 Larsonetal.
`8/2013 Larson et al.
`8/2013 Larson et al.
`12/2001 Skene et al.
`1/2002 Bush
`1/2002 Waite et al.
`1/2002 Droge
`1/2002 Chuah et al.
`1/2003 Nguyen et al.
`10/2003 Wesinger, Jr. et al.
`10/2004 Ruiz et al.
`10/2004 Ruiz et al.
`10/2004 Rechterman et al.
`10/2004 Ruiz et al.
`3/2005 Miller et al.
`5/2005 Dillon et al.
`3/2006 Poyhonen et al.
`6/2006 Munger et al.
`9/2007 Adelman et al.
`9/2007 King et al.
`11/2007 Norton
`1/2008 Larson et al.
`6/2008 Wu et al.
`9/2008 Ishikawa et al.
`7/2009 Agarwalet al.
`7/2009 Agarwalet al.
`8/2009 Deng et al.
`8/2009 Agarwalet al.
`
`FOREIGN PATENT DOCUMENTS
`
`EP
`EP
`EP
`GB
`GB
`GB
`GB
`JP
`JP
`JP
`JP
`JP
`JP
`JP
`JP
`JP
`JP
`JP
`JP
`JP
`JP
`JP
`JP
`JP
`W0
`W0
`W0
`W0
`W0
`W0
`W0
`W0
`W0
`W0
`W0
`W0
`W0
`
`0814589
`836306
`0858189
`2316841
`2317792
`2334181
`2340702
`62-214744
`04-117826
`04-363941
`09-018492
`09-266475
`09-270803
`09-275404
`10-32610
`10-070531
`10-70576
`10-111848
`10-126440
`10-215244
`11-167536
`11-261704
`11-355271
`11-355272
`W09827783
`W09843396
`W09855930
`W09859470
`W09911019
`W09938081
`W09948303
`W0 0014938
`W00017775
`W00070458
`W001/61922
`W00116766
`W00150688
`
`12/1997
`4/1998
`8/1998
`3/1998
`4/1998
`8/1999
`2/2000
`9/1987
`4/1992
`12/1992
`1/1997
`10/1997
`10/1997
`10/1997
`2/1998
`3/1998
`3/1998
`4/1998
`5/1998
`8/1998
`6/1999
`9/1999
`12/1999
`12/1999
`6/1998
`10/1998
`12/1998
`12/1998
`3/1999
`7/1999
`9/1999
`3/2000
`3/2000
`11/2000
`2/2001
`3/2001
`7/2001
`
`OTHER PUBLICATIONS
`
`U.S. Appl. No. 09/399,753, filed Sep. 22, 1998, Graig Miller et al.
`U.S. Appl. No. 60/151,563, filed Aug. 31, 1999, Bryan Whittles.
`U.S. Appl. No. 60/134,547, filed May 17, 1999, Victor Sheymov.
`
`Alan 0. Frier et al., “The SSL ProtocolVersion 30”, Nov. 18, 1996,
`printed from http://www.netscape.com/eng/ss13/ draft302.txt on
`Feb. 4, 2002, 56 pages.
`August Bequai, “Balancing Legal Concerns 0ver Crime and Security
`in Cyberspace”, Computer & Security, vol. 17, No. 4, 1998, pp.
`293-298.
`D. B. Chapman et al., “Building Internet Firewalls”, Nov. 1995, pp.
`278-375.
`D. Clark, “US Calls for Private Domain-Name System”, Computer,
`IEEE Computer Society, Aug. 1, 1998, pp. 22-25.
`Davila J et al, “Implementation of Virtual Private Networks at the
`Transport Layer”, Information Security, Second International Work-
`shop, ISW’99. Proceedings (Lecture Springer-Verlag Berlin, Ger-
`many, [0nline] 1999, pp. 85-102, XP002399276, ISBN 3-540-666.
`Dolev, Shlomi and 0strovsky, Rafil, “Efficient Anonymous Multicast
`and Reception” (Extended Abstract), 16 pages.
`Donald E. Eastlake, 3rd, “Domain Name System Security Exten-
`sions”, Internet Draft, Apr. 1998, pp. 1-51.
`F. Halsall, “Data Communications, Computer Networks and Open
`Systems”, Chapter 4, Protocol Basics, 1996, pp. 198-203.
`Glossary for the Linux FreeS/WAN project, printed from http://
`liberty.freeswan .org/freeswan_trees/freeswan-1 .3/
`doc/glo ssary.
`htrnl on Feb. 21, 2002, 25 pages.
`J. Gilmore, “Swan: Securing the Internet against Wiretapping”,
`printed from http ://liberty. freeswan. org/freeswan_trees/freeswan- 1 .
`3/doc/rationale.html on Feb. 21, 2002, 4 pages.
`James E. Bellaire, “New Statement of Rules-Naming Internet
`Domains”, Internet Newsgroup, Jul. 30, 1995, 1 page.
`Jim Jones et al., “Distributed Denial of Service Attacks: Defenses”,
`Global Integrity Corporation, 2000, pp. 1-14.
`Laurie Wells (LancasterBibelMail MSN COM); “Subject: Security
`Icon” USENET Newsgroup, Oct. 19, 1998, XP002200606, 1 page.
`Linux FreeS/WAN Index File, printed from http://liberty.
`freewan,org/freeswan_trees/freeswan-1,3/doc/ on Feb. 21. 2002, 3
`Pages.
`P. Srisuresh et al., “DNS extensions to Network address Translators
`(DNS_ALG)”, Internet Draft, Jul. 1998, pp. 1-27.
`Reiter, Michael K. and Rubin. Aviel D. (AT&T Labs-Research),
`“Crowds: Anonymity for Web Transactions”, pp. 1-23.
`RFC 2401 (dated Nov. 1998) Security Architecture for the Internet
`Protocol (RTP).
`RFC 2543-SIP (dated Mar. 1999): Session Initiation Protocol (SIP or
`SIPS).
`Rich Winkel, “CAQ: Networking With Spooks; The NET & The
`Control of Information”, Internet Newsgroup, Jun. 21, 1997, 4 pages.
`Rubin, Aviel D., Geer, Daniel, and Ranum, Marcus J. (Wiley Com-
`puter Publishing), “Web Security Sourcebook”, pp. 82-94.
`Search Report (dated Aug. 20, 2002), International Application No.
`PCT/US01/04340.
`Search Report (dated Aug. 23, 2002), International Application No.
`PCT/US01/13260.
`Search Report (dated Oct. 7, 2002), International Application No.
`PCT/US01/13261.
`Search Report. IPER (dated Nov. 13, 2002), International Applica-
`tion No. PCT/USO 1/04340.
`Search Report, IPER (dated Feb. 6, 2002), International Application
`No. PCT/US01/13261.
`Search Report, IPER (dated Jan. 14, 2003), International Application
`No. PCT/US01/13260.
`Shar1kar, A.U. “A verified sliding window protocol with variable flow
`control”. Proceedings of ACM SIGCOMM conference on Commu-
`nications architectures & protocols. pp, 84-91, ACM Press, NY, NY
`1986.
`Shree Murthy et al., “Congestion-0riented Shortest Multi-path Rout-
`ing”, Proceedings of IEEE INFOCOM, 1996, pp. 1028-1036.
`W. Stallings, “Cryptography and Network Security”, 2nd, Edition,
`Chapter 13, IP Security, Jun. 8, 1998, pp. 399-440.
`Microsoft Corporation’s Fourth Amended Invalidity Contentions
`dated Jan. 5, 2009, WrnetX Inc. and Science Applications Interna-
`tional Corp. v. Microsoft Corporation.
`Appendix A of the Microsoft Corporation’s Fourth Amended Inval-
`idity Contentions dated Jan. 5, 2009.
`
`Petitioner Apple Inc. - Ex. 1003, p. 4
`
`Petitioner Apple Inc. - Ex. 1003, p. 4
`
`
`
`US 8,850,009 B2
`Page 5
`
`(56)
`
`References Cited
`OTHER PUBLICATIONS
`
`Concordance Table for the References Cited in Tables on pp. 6-15,
`71-80 and 116-124 of the Microsoft Corporation’s Fourth Amended
`Invalidity Contentions dated Jan. 5, 2009.
`I. P. Mockapetris, “DNS Encoding of Network Names and Other
`Types,” Network Working Group, RFC 1101 (Apr. 1989) RFC1101,
`DNS SRV).
`R. Atkinson, “An Internetwork Authentication Architecture,” Naval
`Research Laboratory, Center for High Assurance Computing Sys-
`tems (Aug. 5, 1993). (Atkinson NRL, KX Records).
`Henning Schulzrinne, Personal Mobilityfor Multimedia Services in
`the Internet, Proceedings of the Interactive Distributed Multimedia
`Systems
`and Services European Workshop at
`143
`(1996).
`(Schulzrinne 96).
`Microsoft Corp., Microsoft WrtualPrivateNetworking.' Using Point-
`to—Point Tunneling Protocol for Low—Cost, Secure, Remote Access
`Across the Internet (1996) (printed from 1998 PDC DVD-ROM).
`(Point to Point, Microsoft Prior Art VPN Technology).
`“Safe Surfing: How to Build a Secure World Wide Web Connection,”
`IBM Technical Support Organization, (Mar. 1996). (Safe Surfing,
`Website Art).
`Goldschlag, et al., “Hiding Routing Information,” Workshop on
`Inforn1ation Hiding, Cambridge, UK (May 1996). (Goldschlag II,
`Onion Routing).
`“IPSec Minutes From Montreal”, IPSec Working Group Meeting
`Notes,
`http://www.sandleman.ca/ipsec/1996/08/msg00018.htrnl
`(Jun. 1996). (IPSec Minutes, FreeS/WAN).
`J. M. Galvin, “Public Key Distribution with Secure DNS,” Proceed-
`ings of the Sixth USENIX UNIX Security Symposium, San Jose,
`California, Jul. 1996. (Galvin, DNSSEC).
`J. Gilmore, et al. “Re: Key Management, anyone? (DNS Keying),”
`IPSec Working Group Mailing List Archives (Aug. 1996). (Gilmore
`DNS, FreeS/WAN).
`H. Orman, et al. “Re: ’Re: DNS? was Re: Key Management, any-
`one?” IETF IPSec Working Group Mailing List Archive (Aug. 1996-
`Sep. 1996). (Orman DNS, FreeS/WAN).
`Arnt Gulbrandsen & Paul Vixie, A DNSRRfor specifying the location
`ofservices (DNS SRV), IETF RFC 2052 (Oct. 1996). (RFC 2052,
`DNS SRV).
`Freier, et al. “The SSL Protocol Version 30,” Transport Layer Secu-
`rity Working Group (Nov. 18, 1996), (SSL, Underlying Security
`Technology).
`M. Handley, H. Schulzrinne, E. Schooler, Internet Engineering Task
`Force, Internet Draft, (Dec. 2, 1996). (RFC 2543 Internet Draft 1).
`M.G. Reed, et al. “Proxies for Anonymous Routing,” 12th Annual
`Computer Security Applications Conference, San Diego, CA, Dec.
`9-13, 1996. (Reed, Onion Routing).
`Kenneth F. Alden & Edward P. Wobber, TheAlta Wsta Tunnel.' Using
`theInternet to Extend Corporate Networks, Digital Technical Journal
`(1997) (Alden, AltaVista).
`Automotive Industry Action Group, “ANX Release 1 Document Pub-
`lication,” AIAG (1997). (AIAG, ANX).
`Automotive Industry Action Group, “ANX Release 1 Draft Docu-
`ment Publication,” AIAG Publications (1997).
`(AIAG Release,
`ANX).
`Aventail Corp. “Aventail VPN Data Sheet,” available at http://www.
`archive.org/web/19970212013043/www.aventail.com/prod/
`vpndata.html (1997). (Data Sheet, Aventail).
`Aventail Corp.. “Directed VPN Vs. Tunnel,” available at http://web.
`archive.org/web/ 19970620030312/www.aventail.com/educate/
`directvpn.htrnl (1997). (Directed VPN, Aventail).
`Aventail Corp., “Managing Corporate Access to the Internet,”
`Aventail AutoSOCKS White Paper available at http://web.archive.
`org/199706200300312/www.aventail.com/educate/whitepaper/
`ipmw.htrnl (1997). (Corporate Access, Aventail).
`Aventail Corp., “VPN Server V2.0 Administration Guide,” (1997).
`(VPN, Aventail).
`Goldschlag, et al, “Privacy on the Internet,” Naval Research Labo-
`ratory, Center
`for High Assurance Computer Systems (1997).
`(Goldschtag I, Onion Routing).
`
`Vlicrosoft Corp,, Installing Configuring and Using PPPTP with
`Microsoft Clients and Servers (1997). (Using PPTP, Microsoft Prior
`Art VPN Technology).
`Vlicrosoft Corp,, IP Securityfor Microsoft Windows NT Server 5.0
`(1997) (printed from 1998 PDC DVD-ROM). (IP Security, Microsoft
`Prior Art VPN Technology).
`Vlicrosoft Corp., Microsoft Windows NTActive Directory.‘ An Intro-
`duction to the Next Generation Directory Services (1997) (printed
`from 1998 PDC DVD-ROM). (Directory, Microsoft Prior Art VPN
`Technology).
`Vlicrosoft Corp., Routing and Remote Access Service for Windows
`NT Server New Opportunities Today and Looking Ahead (1997)
`(printed from 1998 PDC DVD-ROM). Routing, Microsoft Prior Art
`VPN Technology).
`Vlicrosoft Corp., Understanding Point—to—Point Tunneling Protocol
`PPTP (1997) (printed from 1998 PDC DVD-ROM). (Understanding
`PPTP, Microsoft Prior Art VPN Technology).
`J. Mark Smith et.al., Protecting a Private Network.‘ The Alta Wsta
`Firewall, Digital Technical Journal (1997). (Smith, AltaVista).
`Naganand Doraswamy Implementation of I/zrtual Private Networks
`(VPNs) with IPSecurity, <draft-ietf-ipsec-vpn-00.txt> (Mar. 12,
`1997). (Doraswamy).
`M. Handley, H. Schulzrinne, E. Schooler, Internet Engineering Task
`Force, Internet Draft, (Mar. 27, 1997). (RFC 2543 Internet Draft 2).
`Aventail Corp., “Aventail and Cybersafe to Provide Secure Authen-
`tication for Internet and Intranet Communication,” Press Release,
`Apr. 3, 1997. (Secure Authentication, Aventail).
`D. Wagner, et al. “Analysis ofthe SSL 3.0 Protocol,” (Apr. 15, 1997).
`(Analysis, Underlying Security Technologies).
`Automotive Industry Action Group, “ANXO Certification Authority
`Service and Directory Service Definition for ANX Release 1,” AIAG
`Telecommunications Project Team and Bellcore (May 9, 1997).
`(AIAG Definition, ANX).
`Automotive Industry Action Group, “ANXO Certification Process
`and ANX Registration Process Definition for ANX Release 1,”AIAG
`Telecommunications Project Team and Bellcore (May 9, 1997).
`(AIAG Certification, ANX).
`Aventail Corp., “Aventail Announces the First VPN Solution to
`Assure Interoperability Across Emerging Security Protocols” Jun. 2,
`1997. (First VPN, Aventail).
`Syverson, et al. “Private Web Browsing,” Naval Research Laboratory,
`Center for High 8 Assurance Computer Systems (Jun. 2, 1997),
`(Syverson, Onion Routing).
`Bellcore, “Metrics, Criteria, and Measurement Technique Require-
`ments for ANX Release 1,” AIAG Telecommunications Project Team
`and Bellcore (Jun. 16, 1997). (AIAG Requirements, ANX).
`M. Handley, H. Schulzrinne, E. Schooler, Internet Engineering Task
`Force, Internet Draft, (Jul. 31, 1997). (RFC 2543 Internet Draft 3).
`R. Atkinson, “Key Exchange Delegation Record for the DNS,” Net-
`work Working Group, RFC 2230 (Nov. 1997). (RFC 2230, KX
`Records).
`M. Handley, H. Schulzrinne, E. Schooler, Internet Engineering Task
`Force, Internet Draft, (Nov. 11, 1997), (RFC 2543 Internet Draft 4).
`1998 Microsoft Professional Developers Conference DVD (“1998
`PDC DVD-ROM”) (including screenshots captured there from and
`produced
`as MSFTVX 00018827-00018832),
`(Conference,
`Microsoft Prior Art VPN Technology).
`Microsoft Corp., Wrtual Private Networking An Overview (1998)
`(printed from 1998 PDC DVD-ROM) (Overview, Micro soft Prior Art
`VPN Technology).
`Microsoft Corp., Windows NT 5.0 Beta Has Public Premiere at
`Seattle Mini—Camp Seminar attendees get first look at the perfor-
`mance and capabilities ofWindows NT 5. 0(1998) (available at http://
`www.microsoft.com/presspass/features/ 1998/ 10-19nt5.
`mspxpftrue). (NT Beta, Microsoft Prior Art VPN Technology).
`“What ports does SSL use” available at stason.org/TULARC/secu-
`rity/ssl-talk/3-4-What-ports-does-ssl-use.html (1998). (Ports, DNA
`SRV).
`Aventail Corp., “Aventail VPN V2.6 Includes Support for More Than
`Ten Authentication Methods Making Extranet VPN Development
`Secure and Simple,” Press Release, Jan. 19, 1998. (VPN V2.6,
`Aventail).
`
`Petitioner Apple Inc. - Ex. 1003, p. 5
`
`Petitioner Apple Inc. - Ex. 1003, p. 5
`
`
`
`US 8,850,009 B2
`Page 6
`
`(56)
`
`References Cited
`OTHER PUBLICATIONS
`
`R, G. Moskowitz, “Network Address Translation Issues with IPsec,”
`Internet Draft,
`Internet Engineering Task Force, Feb. 6, 1998.
`(Moskowitz).
`H. Schulzrinne, et al, “Internet Telephony Gateway Location,” Pro-
`ceedings of IEEE INfocom ’98, The Conference on Computer Com-
`munications, vol. 2 (Mar. 29-Apr. 2, 1998). (Gateway, Schulzrinne).
`C. Huitema, 45 al. “Simple Gateway Control Protocol,” Version 1.0
`(May 5, 19 (SGCP).
`DISA “Secret Internet Protocol Router Network,” SIPRNET Pro-
`gram Management Office (D31 13) DISN Networks, DISN Transmis-
`sion Services (May 8, 1998). DISA, SIPRNET).
`VI. Handley, H. Schulzrinne, E. Schooler, Internet Engineering Task
`Force, Internet Draft, (May 14, 1998). (RFC 2543 Internet Draft 5).
`VI. Handley, H. Schulzrinne, E. Schooler, Internet Engineering Task
`Force, Internet Draft, (Jun. 17, 1998). (RFC 2543 Internet Draft 6).
`D. McDonald, et al. “PF_KEY Key Management API, Version 2,”
`\Ietwork Working Group, RFC 2367 (Jul. 1998). (RFC 2367).
`VI. Handley, H. Schulzrinne, E. Schooler, Internet Engineering Task
`Force, Internet Draft, (Jul. 16, 1998). (RFC 2543 Internet Draft 7).
`VI. Handley, H. Schulzrinne, E. Schooler, Internet Engineering Task
`Force, Internet Draft, (Aug. 7, 1998). (RFC 2543 Internet Draft 8).
`Vlicrosoft Corp., Company Focuses on Quality and Customer Feed-
`back (Aug. 18, 1998). (Focus, Microsoft PriorArtVPN Technology).
`VI. Handley, H. Schulzrinne, E. Schooler, Internet Engineering Task
`Force, Internet Draft, (Sep. 18, 1998). (RFC 2543 Internet Draft 9).
`Atkinson, et al. “Security Architecture for the Internet Protocol,”
`\Ietwork Working Group, RFC 2401 (Nov. 1998). (RFC 2401,
`Underlying Security Technologies).
`VI. Handley, H. Schulzrinne, E. Schooler, Internet Engineering Task
`Force, Internet Draft, (Nov. 12, 1998). (RFC 2543 Internet Draft 10).
`Donald Eastlake, Domain Name System Security Extensions, IETF
`DNS Security Working Group (Dec. 1998). (DNSSEC-7).
`VI. Handley, H. Schulzrinne, E, Schooler, Internet Engineering Task
`Force, Internet Draft, (Dec. 15, 1998). (RFC 2543 Internet Draft 11).
`Aventail Corp., “Aventail Connect 3.1/2.6 Administrator’s Guide,”
`(1999). (Aventail Administrator 3.1, Aventail).
`Aventail Corp., “Aventail Connect 3.1/2.6 User’s Guide,” (1999),
`(Aventail User 3.1, Aventail).
`Aventail Corp.. “Aventail ExtraWeb Server v3.2 Administrator’s
`Guide,” (1999). (Aventail ExtraWeb 3.2, Aventail).
`Kaufman et al, “Implementing IPsec,” (Copyright 1999). (Imple-
`menting IPsec, VPN References).
`Network Solutions,
`Inc. “Enabling SSL,” NSI Registry (1999).
`(Enabling SSL, Underlying Security Technologies).
`Check Point Software Technologies Ltd.
`(1999) (Check Point,
`Checkpoint FW).
`Arnt Gulbrandsen & Paul Vixie, A DNSRRfor specifying the location
`of services (DNS SRV),<draft-ietf-dnsind-frc2052bis-02.Ixt> (Jan.
`1999). (Gulbrandsen 99, DNS SRV).
`C. Scott, et al. Wrtual Private Networks, O’Reilly and Associates,
`Inc., 2nd ed. 1999), Scott VPNs).
`M. Handley, H. Schulzrinne, E. Schooler, Internet Engineering Task
`Force, Internet Draft, (Jan. 15, 1999). (RFC 2543 Internet Draft 12).
`Goldschlag, et al,, “Onion Routing for Anonymous and Private
`Internet Connections,” Naval Research Laboratory, Center for High
`Assurance Computer Systems (Jan. 28, 1999). (Goldschlag III,
`Onion Routing).
`H. Schulzrinne, “Internet Telephony: architecture and protocols—an
`IETF perspective,” Computer Networks, vol. 31, No. 3 (Feb. 1999).
`(Telephony, Schulzrinne).
`M. Handley, et al. “SIP: Session Initiation Protocol,” Network Work-
`ing Group, RFC 2543 and Internet Drafts (Dec. 1996-Mar. 1999).
`(Handley, RFC 2543).
`FreeS/WAN Project, LinuxFreeS/WAN Compatibility Guide (Mar. 4,
`1999). (FreeS/WAN Compatibility Guide, FreeS/WAN).
`Telcordia Technologies, “ANX Release 1 Document Corrections,”
`AIAG (May 11, 1999). (Telcordia, ANX).
`
`Ken Hornstein & Jeffrey Altman, Distributing Kerberos KDC and
`Realm Information with DNS <draft-eitf-cat-krb-dns-locate-oo.Ixt>
`(Jun. 21, 1999). (Hornstein, DNS SRV).
`Bhattacharya, et al., “An LDAP Schema for Configuration and
`Administration of IPSec Based Virtual Private Networks (VPNs)”,
`IETF Internet Draft (Oct. 1999). (Bhattcharya LDAP VPN).
`B. Patel, et al. “DHCP Configuration of IPsec Tunnel Mode,” IPsec
`Working Group, Internet Draft 02 (Oct. 15, 1999). (Patel).
`Goncalves, et al. Check Point Fire Wall—1 Administration Guide,
`McGraw-Hill Companies (2000). (Goncalves, Checkpoint FW).
`“Building a Microsoft VPN: A Comprehensive Collection of
`Microsoft Resources,” FirstVPN, (Jan. 2000). (FirstVPN Microsoft).
`Gulbrandsen, Vixie, & Esibov, A DNS RRfor specifying the location
`ofservices (DNS SRV), IETF RFC 2782 (Feb. 2000). (RFC 2782,
`DNS SRV).
`“Technical Description,” Collaborative
`MITRE Organization,
`Operations in Joint Expeditionary Force Experiment (JEFX) 99 (Feb.
`2000). (MITRE, SIPRNET).
`H. Schulzrinne, et al. “Application-Layer Mobility Using SIP,”
`Mobile Computing and Communications Review, vol. 4, No. 3. pp.
`47-57 (Jul. 2000). (Application, SIP).
`Kindred et al, “Dynamic VPN Communities: Implementation and
`Experience,” DARPA Information Survivability Conference and
`Exposition II (Jun. 2001). (DARPA, VPN Systems).
`ANX 101: Basic ANX Service Outline. (Outline, ANX).
`ANX 201: Advanced ANX Service. (Advanced, ANX).
`Appendix A: Certificate Profile for ANX IPsec Certificates. (Appen-
`dix, ANX).
`Assured Digital Products. (Assured Digital).
`Aventail Corp., “Aventail AutoSOCKS the Client Key to Network
`Security,” Aventail Corporation White Paper, (Network Security,
`Aventail).
`Cindy Moran, “DISN Data Networks: Secret Internet Protocol
`Router Network (SIPRNET).” (Moran, SIPNET).
`Data Fellows F-Secure VPN+ (F-Secure VPN+).
`Interim Operational Systems Doctrine for the Remote Access Secu-
`rity Program (RASP) Secret Dial-In Solution. (RASP, SIPRNET).
`Onion Routing. “Investigation ofRoute Selection Algorithms,” avail-
`able
`at
`http://www.onion-router.net/Archives/Route/index.html.
`(Route Selection, Onion Routing).
`Secure Computing, “Bullet-Proofing an Army Net,” Washington
`Technology, (Secure, SIPRNET).
`SPARTA “Dynamic Virtual Private Network.” (Sparta, VPN Sys-
`tems).
`Standard Operation Procedure for Using the 1910 Secure Modems.
`(Standard, SIPRNET).
`relating
`email s
`Publically
`available
`(MSFTVX00018833 -MSFTVX00019206).
`FreeS/WAN).
`Kaufman et al., “Implementing IPsec,” (Copyright 1999)