`
`(12) United States Patent
`US 8,850,009 B2
`(10) Patent N0.:
`Larson et al.
`
`(45) Date of Patent: *Sep. 30, 2014
`
`(54) SYSTEM AND METHOD EMPLOYING AN
`AGILE NETWORK PROTOCOL FOR SECURE
`COMMUNICATIONS USING SECURE
`DOMAIN NAMES
`
`(58) Field of Classification Search
`USPC ............. 709/2277228, 225, 221, 229; 726/15
`See application file for complete search history.
`
`(71) Applicant: Virnetx, Inc., Zephyr Cove, NV (US)
`
`(72)
`
`Inventors: Victor Larson, Fairfax, VA (US);
`Robert Dunham Short, III, Lexington,
`VA (US); Edmund Colby Munger,
`Tarpon Springs, FL (US); Michael
`Williamson, South Riding, VA (US)
`
`(73) Assignee: VirnetX, Inc., Zephyr Cove, NV (US)
`
`( * ) Notice:
`
`Subject to any disclaimer, the term of this
`patent is extended or adjusted under 35
`U.S.C. 154(b) by 0 days.
`
`This patent is subject to a terminal dis-
`claimer.
`
`(21) Appl.No.: 13/911,792
`
`(22)
`
`Filed:
`
`Jun. 6, 2013
`
`(56)
`
`References Cited
`U.S. PATENT DOCUMENTS
`
`2,895,502 A
`4,405,829 A
`
`7/1959 Roper et al.
`9/1983 Rivest
`
`(Continued)
`FOREIGN PATENT DOCUMENTS
`
`DE
`EP
`
`19924575
`0838930
`
`12/1999
`4/1988
`
`(Continued)
`OTHER PUBLICATIONS
`
`Office Action dated Jan. 28, 2014 from Corresponding U.S.App1. No.
`13/620,550.
`
`(Continued)
`
`Primary Examiner 7 Krisna Lim
`(74) Attorney, Agent, or Firm 7 McDermott Will & Emery
`LLP
`
`(65)
`
`Prior Publication Data
`
`(57)
`
`ABSTRACT
`
`US 2013/0268683 A1
`
`Oct. 10, 2013
`
`Related US. Application Data
`
`(63) Continuation of application No. 13/903,788, filed on
`May 28, 2013, which is a continuation of application
`
`(51)
`
`Int. Cl.
`G06F 15/1 73
`G06F 15/16
`
`(Continued)
`
`(2006.01)
`(2006.01)
`
`(Continued)
`
`(52) US. Cl.
`CPC .......... H04L 67/14 (2013.01); H04L 29/12216
`(2013.01); H04L 45/00 (2013.01); H04L
`63/1416 (2013.01); H04L 45/24 (2013.01);
`
`A network device comprises a storage device storing an appli-
`cation program for a secure communications service; and at
`least one processor configured to execute the application pro-
`gram enabling the network device to: (a) send a request to
`look up a network address of a second network device based
`on an identifier; (b) receive an indication that the second
`network device is available for the secure communications
`service,
`the indication including the requested network
`address of the second network device and provisioning infor-
`mation for a secure communication link; (c) connect to the
`second network device over the secure communication link,
`using the received network address of the second network
`device and the provisioning information for the secure com-
`munication link; and (d) communicate at least one of video
`data and audio data with the second network device using the
`secure communications service via the secure communica-
`tion link.
`
`(Continued)
`
`25 Claims, 40 Drawing Sheets
`
`
`
`2601
`
`DNS
`
`2609_/
`SERVER
`
`/7
`
`W
`
`\2scrz
`
`RECEIVE
`DNS REQUEST
`
`
`FORTARGETSITE
`
`
`
`27112
`
`M
`
`111111
`111111
`
`
`REQUESTED?
`DNS SEWER
`
`
`
`
`
`
`
`13311
`/ 1
`
`
`4
`GATEKEEFER \
`
`
`
`
`
`
`1F
`HOPPING]
`RULES
`2607
`HOPPING
`
`26“
`
`
`SECURE
`TARGET
`
`SITE
`max
`
`
`HOFFJNG
`
`UNSEOJRE
`TARGET
`
`SHE
`/2611
`
`2993
`
`USER
`AUTHORIZEDTO
`CONNECT?
`
`
`2105
`\
`RETURN
`‘HOSTUNKNOWW
`ERROR
`
`ESTABLISH
`vmwrm
`11119113111
`
`2706
`
`Petitioner Apple Inc. - Ex. 1003, p. l
`
`Petitioner Apple Inc. - Ex. 1003, p. 1
`
`
`
`US 8,850,009 B2
`
`Page 2
`
`Related U.S.Application Data
`
`No. 13/336,790, filed on Dec. 23, 2011, now Pat. No.
`8,458,341, which is a continuation of application No.
`13/049,552,
`filed on Mar. 16, 2011, which is a
`continuation of application No. 11/840,560, filed on
`Aug. 17, 2007, HOW Pat. No. 7,921,211, which is a
`continuation of application No. 10/714,849, filed on
`Nov. 18, 2003, HOW Pat. No. 7,418,504, which is a
`continuation of application No. 09/558,210, filed on
`Apr.
`26,
`2000, now abandoned, which 15
`a
`continuation-in-part of application No. 09/504,783,
`filed on Feb. 15,2000, now Pat. No.6,502,135,which
`is
`a
`continuation-in-part
`of
`application No.
`09/429,643, filed on Oct. 29, 1999, now Pat. No.
`7,010,604.
`(60) Provisional application No. 60/106,261, filed on Oct.
`30, 1998, provisional application No. 60/137,704,
`filed on Jun.7, 1999.
`
`(51)
`
`Int. Cl.
`H04L 29/12
`H04L12/701
`H04L 29/06
`H04L 12/707
`H04L12/24
`G06F 21/60
`H04L 29/08
`H04L12/703
`
`(200601)
`(201301)
`(2006.01)
`(2013.01)
`(2006.01)
`(201301)
`(200601)
`(2013.01)
`
`(52) U'S'Cl'
`CPC ......... H04L 29/12301 (2013.01); H04L 63/164
`(2013.01); H04L 61/35 (2013.01); H04L 41/00
`(2013.01); H04L 61/2076 (2013.01); H04L
`29/1232 (2013.01);H04L 63/0227(2013.01);
`H04L 63/0428 (2013.01);H04L 63/0272
`(2013~01);H04L 63/1408(2013~01);H04L
`63/04 (2013.01); H04L 63/08 (2013.01); G06F
`21/606 (2013.01);H04L 63/1458 (2013.01),
`H04L 63/0407(2013.01); H04L 61/2007
`(2013.01); H04L 29/12783 (2013.01); H04L
`63/1466 (2013.01); H04L 29/12801 (2013.01);
`H04L 29/12594 (2013.01);H04L 61/1511
`(2013.01);H04L 61/303(2013.01);H04L
`63/105 (2013.01);H04L 61/6004(2013.01);
`H04L 61/2092 (201301); H04L 45/28
`(2013.01);H04L 29/12066 (2013.01)
`USPC .............. 709/225; 700/221; 700/229; 726/15
`
`(56)
`
`.
`References C‘ted
`
`US PATENT DOCUMENTS
`4677434 A
`6/1987 Fascenda
`4:761:334 A
`8/1988 Sagoietal.
`4,885,778 A
`”/1989 W31“ 31
`43202712221 2
`2,1338 giggle ~
`4:933:846 A
`6/1990 Humphrey etal.
`4,952,930 A
`8/1990 Franaszeketal.
`4,988,990 A
`l/l99l Warrior
`5,007,051 A
`4/l99l Dolkas et a1.
`5 070 528 A
`12/1991 Hawe et a1.
`5,164,988 A
`11/1992 Matyas
`5:204:961 A
`4/1993 Barlow
`5,276,735 A
`1/1994 Boebert et 31,
`5,303,302 A
`4/1994 Burrows
`5,311,593 A
`5/1994 Carmi
`5,329,521 A
`7/1994 Walsh et a1.
`
`5,341,426 A
`5,345,439 A
`5,367,643 A
`5,384,848 A
`31%;ng
`5,420,926 A
`5:444:782 A
`5,455,861 A
`5,511,122 A
`g’gig’gé :
`5:559:883 A
`5,561,669 A
`5,588,060 A
`5
`a
`gagggaégi :
`5,625,626 A
`5,629,984 A
`g’ggg’égg :
`5:682:480 A
`5,689,566 A
`5,689,641 A
`5,740,375 A
`5,757,925 A
`5,764,906 A
`5,771,239 A
`5,774,660 A
`5,781,550 A
`5,787,172 A
`5,790,548 A
`5,796,942 A
`5,805,801 A
`5,805,803 A
`5,805,820 A
`5 812 670 A
`5,822,434 A
`5:838:796 A
`5,842,040 A
`5,845,091 A
`232471228 2
`5’870’610 A
`5:878:231 A
`5,884,038 A
`5,884,270 A
`233333; 2
`5:898:830 A
`5,905,859 A
`5,915,087 A
`5,918,018 A
`23332;: 2
`5:950:195 A
`5,950,519 A
`5,960,204 A
`5,961,593 A
`5,974,454 A
`5,996,016 A
`6,003,084 A
`6,006,259 A
`6,006,272 A
`2853;; 2
`6,016,318 A
`6,016,504 A
`283213 :
`6,032,118 A
`5
`a
`6,041,342 A
`6,052,788 A
`6,055,236 A
`6,055,518 A
`6,055,574 A
`6,055,575 A
`6,058,250 A
`6,061,346 A
`
`8/1994 Barney et a1.
`9/1994 Marston
`11/1994 Chang et a1.
`1/1995 KikUChi
`gfiggg £011.65
`5/1995 L51: et a1.
`5,995 Adams, Jr, et ,1.
`10/1995 Faucher et a1.
`4/1996 Atkinson
`$832 Xgrzlfi’a‘lr' et 31'
`9/1996 Williams
`10/1996 Lenney et a1,
`12/1996 A212
`11
`1221/1335 gauge et 3L
`4,1997 Umekita
`5/1997 McManis-
`$133; giggi’gfil: :3 al'
`10/1997 Nakagawa
`'
`11/1997 Nguyen
`11/1997 Ludwig etal.
`4/1998 Dunneetal.
`5/1998 Faybishenko
`6/1998 Edelstein et a1.
`6/1998 Moroney et a1.
`6/1998 Brendel et a1.
`7/1998 Templin et a1.
`7/1998 Arnold
`8/1998 Sistanizadeh et al.
`8/1998 Esbensen
`9/1998 Holloway etal.
`9/1998 Birrellet a1.
`9/1998 Bellovin etal.
`9/1998 Micali
`10/1998 Caronnietal
`11/1998 Mittenthal
`11/1998 Hughes et a1.
`12/1998 Dunne et a1.
`$333 ghiader
`2,1999 13:53:13,,
`3/1999 Baehr et a1.
`3/1999 Kapoor
`3/1999 Walker et a1.
`$1333 “£13131?
`4/1999 Wesinger, Jr. et a1.
`5/1999 Holloway et al.
`6/1999 Hammond et a1.
`6/1999 Gooderum etal~
`@1333 63:52:: a,
`9/1999 Stockwelletal.
`9/1999 Anatoli
`9/1999 Yinger et a1.
`10/1999 Gabberetal.
`10/1999 Apfel et a1.
`11/1999 Thalheimer et a1.
`12/1999 Green et al.
`12/1999 Adelman etal.
`12/1999 Aravamudan et a1.
`$888 E5312;
`1/2000 Tomoike
`1/2000 Arnoldet a1.
`$888 32:?
`2,2000 Tpll
`e oet 31'.
`”000 Yamagmh‘
`4/2000 WeSlnger et a1.
`4/2000 Nessettet 3.1.
`4/2000 Franklin etal.
`4/2000 Smorodinskyet al.
`4/2000 Paulsen et al.
`5/2000 Harwood et a1.
`5/2000 Nordman
`
`Petitioner Apple Inc. - EX. 1003, p. 2
`
`Petitioner Apple Inc. - Ex. 1003, p. 2
`
`
`
`US 8,850,009 B2
`
`Page 3
`
`(56)
`
`References Cited
`
`us. PATENT DOCUMENTS
`
`6,061,736 A
`6,065,049 A
`6073175 A
`6:079:020 A
`6,081,900 A
`6,092,200 A
`6,101,182 A
`6111883 A
`6:119:171 A
`6,119,234 A
`6,131,121 A
`6147976 A
`6’148’342 A
`6:151:628 A
`6,154,839 A
`6 157 957 A
`6:158’011 A
`6,168:409 B1
`6,173,399 B1
`6,175,867 B1
`6,178,409 B1
`6,178,505 B1
`6,179,102 B1
`6,182,072 B1
`6,182,141 B1
`6182227 B1
`6:195’677 B1
`6,199,112 B1
`6,199:122 B1
`6202081 B1
`6:222:842 B1
`6,223,287 B1
`6,225,993 131
`6,226,748 B1
`6,226,751 B1
`6233 618 B1
`6:243:360 B1
`6,243,749 B1
`6,243,754 B1
`6,246,670 B1
`6,256,671 B1
`6,262,987 B1
`6,263,445 B1
`6,266,699 B1
`6,269,099 B1
`6,286,047 B1
`6,298,341 B1
`6,298,383 B1
`6,301,223 B1
`6,308,213 B1
`6,308,274 B1
`6,311,207 131
`6,314,463 B1
`6,324,161 B1
`6,330,562 B1
`6,332,158 B1
`6,333,272 B1
`6,335,966 B1
`6,338,082 B1
`6,345,361 B1
`6,353,614 131
`6,366,912 B1
`6,367,009 B1
`6,421,732 131
`6,425,003 B1
`6,426,955 B1
`6,430,155 B1
`6,430,176 B1
`6,430,610 B1
`6,434,600 B2
`6,438,127 B1
`6,449,272 B1
`6,449,657 B2
`6,453,034 B1
`6,487,598 B1
`
`5/2000 Rochberger et a1.
`5/2000 Beser et a1.
`6/2000 Tavs etal.
`@2000 Liu
`6/2000 Subrarnaniarn eta1.
`7/2000 Muniyappa eta1.
`8/2000 Sistanizadeh etal.
`8/2000 Terada et 31.
`9/2000 Alkhatib
`9/2000 AZiZ et 31.
`10/2000 Mattawayet a1.
`“/2000 Shand et 31.
`“/2000 H0
`“/2000 Xu eta1.
`“/2000 Arrowet 31.
`12/2000 Berthaud
`12/2000 Chenetal.
`1/2001 Fare
`1/2001 Gilbrech
`1/2001 Taghadoss
`1/2001 Weber et 31.
`1/2001 Schneideret a1.
`1/2001 Weberetal.
`1/2001 Leaketal.
`1/2001 Blumet 31.
`1/2001 Blair et 31.
`2/2001 Utsumi
`3/2001 Wilson
`3/2001 Kobayashi
`3/2001 Naudus
`4/2001 Sasyan eta1.
`4/2001 Douglas eta1.
`5/2001 Lindbladet a1.
`5/2001 Bots et 31.
`5/2001 Arrowetal.
`5/2001 Shannon
`6/2001 Basilico
`6/2001 Sitaraman et 31.
`6/2001 Guerin et 31.
`6/2001 Karlsson et 31.
`7/2001 Strentzsch eta1.
`7/2001 Mogul
`7/2001 Blumenau
`7/2001 Sevcik
`7/2001 Bore11aeta1.
`9/2001 Ramanathan eta1.
`10/2001 Mann eta1.
`10/2001 Gutrnan et 31.
`10/2001 Hrastar et 31.
`10/2001 Valencia
`10/2001 Swift
`10/2001 Mighdoll eta1.
`11/2001 Abbott eta1.
`”/2001 Kirch
`12/2001 Boden eta1.
`12/2001 Ris1eyeta1.
`12/2001 McMillin eta1.
`1/2002 Toyoda
`1/2002 Schneider
`2/2002 Jergeretal.
`3/2002 Borella etal.
`4/2002 Wa11enteta1.
`4/2002 Davis eta1.
`7/2002 Alkhatib etal.
`7/2002 Herzog et 31.
`7/2002 Gossett et 31.
`8/2002 Davie eta1.
`8/2002 Christie
`8/2002 Carter
`8/2002 Waite eta1.
`8/2002 Le Goffet a1.
`9/2002 Chuah eta1.
`9/2002 Stanbach
`9/2002 Donovan etal.
`11/2002 Valencia
`
`6,490,290 B1
`6,496,491 B2
`6,496,867 B1
`6,499,108 B1
`6,502,135 B1
`6,505,232 B1
`6,510,154 B1
`6,546,003 B1
`6,549,516 Bl
`6,557,037 Bl
`65605634 Bl
`6,564,261 B1
`6,571,296 Bl
`6,571,338 B1
`6,581,166 Bl
`6,590,588 B2
`6,591,306 131
`6,606,660 B1
`6,606,708 B1
`6,609,196 B1
`6,615,357 B1
`6,618,761 B2
`6,636,505 B1
`6,640,302 B1
`6,643,701 B1
`6,671,702 B2
`6,687,551 132
`6,687,746 B1
`6,687,823 B1
`6,693,878 B1
`6,701,437 B1
`6,714,970 B1
`6,717,949 B1
`6,751,729 B1
`6,751,738 B2
`6,752,166 132
`6,754,212 Bl
`6,757,740 B1
`6,760,766 B1
`6,801,509 B1
`6,804,783 B1
`6,813,777 B1
`6,826,616 B2
`6,829,242 B2
`6,834,271 B1
`6,839,759 B2
`6,917,600 B1
`6,930,998 B1
`6,937,597 B1
`6,959,184 Bl
`7,010,604 B1
`7,028,182 B1
`7,039,713 B1
`7065784 132
`7,072,964 B1
`7,100,195 Bl
`7,103,770 132
`RE39,360 E
`7,133,930 B2
`7,167,904 B1
`7,188,175 Bl
`7,188,180 B2
`7,197,563 B2
`7101190 Bl
`7,225,249 B1*
`7,249,377 Bl
`7,275,113 B1
`7307990 32
`7,353,841 B2
`7,418,504 B2
`7,461,334 B1
`7,490,151 132
`7,493,403 B2
`7,584,500 B2
`7,669,049 B2
`7,764,231 B1
`7,852,861 B2
`7,921,211 B2
`7,933,990 B2
`
`12/2002 Zhang et a1.
`12/2002 Chuah eta1.
`12/2002 Beser et a1.
`12/2002 Johnson
`12/2002 Mnnger
`1/2003 Mlghdolletal.
`1/2003 Mayes etal.
`4/2003 Farris
`4/2003 Albert etnl~
`“003 Pr0V1n0
`5/2003 Brondhnrst
`5/2003 Gudjonsson et al.
`5/2003 Dillon
`5/2003 Shaio etal.
`6/2003 Hnstetal~
`7/2003 Lincke et al.
`7/2003 Redlich
`8/2003 Bowman-Amuah
`8/2003 DeVine et al.
`8/2003 Dickinson, 111 et a1.
`9/2003 13odeneta1.
`9/2003 Munger et al.
`10/2003 Wang etal;
`10/2003 Subramaniametal.
`11/2003 Aziz et a1.
`12/2003 Krngllkov etal~
`20004 Stelndl
`2/2004 Shusteretal.
`2/2004 Al-Salqan etal.
`2/2004 Daruwalla et a1.
`3/2004 Hoke eta1.
`3/2004 Fiveash et al.
`4/2004 Boden et al.
`6/2004 Giniger et a1.
`6/2004 Wesinger, Jr. et a1.
`60004 Lnlletal~
`6/2004 Teradnetnl~
`6/2004 Parekh et a1.
`7/2004 Sahlqvist
`10/2004 Rai et a1.
`10/2004 Wesinger, Jr. et a1.
`11/2004 Weinberger et al.
`11/2004 Larson et a1.
`12/2004 DaVison et a1.
`12/2004 Hodgson etal~
`1/2005 Larson et al.
`7/2005 Chuah etal.
`8/2005 Sylvain
`8/2005 Rosenberg etal.
`10/2005 ByersetaL
`3/2006 MungeretaL
`4/2006 Killcommons
`5/2006 Van Gunter et al.
`60006 HOPnlnnn etal~
`7/2006 Whittle et a1.
`8/2006 Underwood
`90006 C0nrath
`10/2006 A212 etal.
`11/2006 MungeretaL
`1/2007 Devaraian etal~
`3/2007 McKeeth
`3/2007 Larson et al.
`3/2007 SheymoV etal.
`4/2007 Rnbnn etal~
`5/2007 Barry etal.
`7/2007 Lita etal~
`9/2007 Amnio
`12/2007 Rosen etal~
`4/2008 Kono et a1.
`8/2008 Larson et al.
`12/2008 Lu etal.
`2/2009 Munger et a1.
`2/2009 Shu11eta1.
`9/2009 Di11on eta1.
`2/2010 Wang eta1.
`7/2010 Karretal.
`12/2010 Wu eta1.
`4/2011 Larson et al.
`4/2011 Munger et a1.
`
`................... 709/227
`
`Petitioner Apple Inc. - EX. 1003, p. 3
`
`Petitioner Apple Inc. - Ex. 1003, p. 3
`
`
`
`US 8,850,009 B2
`
`Page 4
`
`(56)
`
`References Cited
`U.S. PATENT DOCUMENTS
`
`8,051,181 B2
`8,504,696 B2
`8,504,697 B2
`2001/0049741 A1
`2002/0002675 A1
`2002/0004826 A1
`2002/0004898 A1
`2002/0006132 A1
`2003/0005132 A1
`2003/0196122 A1
`2004/0199493 A1
`2004/0199520 A1
`2004/0199608 A1
`2004/0199620 A1
`2005/0055306 A1
`2005/0108517 A1
`2006/0059337 A1
`2006/0123134 A1
`2007/0208869 A1
`2007/0214284 A1
`2007/0266141 A1
`2008/0005792 A1
`2008/0144625 A1
`2008/0235507 A1
`2009/0193498 A1
`2009/0193513 A1
`2009/0199258 A1
`2009/0199285 A1
`
`11/2011 Larsonetal.
`8/2013 Larson et al.
`8/2013 Larson et al.
`12/2001 Skene et a1.
`1/2002 Bush
`1/2002 Waite et a1.
`1/2002 Droge
`1/2002 Chuah et a1.
`1/2003 Nguyen et al.
`10/2003 Wesinger, Jr. et al.
`10/2004 Ruiz et a1.
`10/2004 Ruiz et a1.
`10/2004 Rechterman et al.
`10/2004 Ruiz et a1.
`3/2005 Miller et al.
`5/2005 Dillon et al.
`3/2006 Poyhonen et al.
`6/2006 Munger et al.
`9/2007 Adelman et a1.
`9/2007 King et al.
`11/2007 Norton
`1/2008 Larson et al.
`6/2008 Wu et al.
`9/2008 Ishikawa et al.
`7/2009 Agarwalet al.
`7/2009 Agarwalet al.
`8/2009 Deng et al.
`8/2009 Agarwalet al.
`
`FOREIGN PATENT DOCUMENTS
`
`EP
`EP
`EP
`GB
`GB
`GB
`GB
`JP
`JP
`JP
`JP
`JP
`JP
`JP
`JP
`JP
`JP
`JP
`JP
`JP
`JP
`JP
`JP
`JP
`WO
`WO
`WO
`WO
`WO
`WO
`WO
`W0
`WO
`WO
`WO
`WO
`WO
`
`0814589
`836306
`0858189
`2316841
`2317792
`2334181
`2340702
`62-214744
`04-117826
`04-363941
`09-018492
`09-266475
`09-270803
`09-275404
`10-32610
`10-070531
`10-70576
`10-111848
`10-126440
`10-215244
`11-167536
`11-261704
`11-355271
`11-355272
`WO9827783
`WO9843396
`WO9855930
`WO9859470
`WO9911019
`WO9938081
`WO9948303
`W0 0014938
`W00017775
`W00070458
`W001/61922
`W00116766
`W00150688
`
`12/1997
`4/1998
`8/1998
`3/1998
`4/1998
`8/1999
`2/2000
`9/1987
`4/1992
`12/1992
`1/1997
`10/1997
`10/1997
`10/1997
`2/1998
`3/1998
`3/1998
`4/1998
`5/1998
`8/1998
`6/1999
`9/1999
`12/1999
`12/1999
`6/1998
`10/1998
`12/1998
`12/1998
`3/1999
`7/1999
`9/1999
`3/2000
`3/2000
`11/2000
`2/2001
`3/2001
`7/2001
`
`OTHER PUBLICATIONS
`
`U.S. Appl. No. 09/399,753, filed Sep. 22, 1998, Graig Miller et al.
`US. Appl. No. 60/151,563, filed Aug. 31, 1999, Bryan Whittles.
`U.S. Appl. No. 60/134,547, filed May 17, 1999, Victor Sheymov.
`
`Alan 0. Frier et al., “The SSL ProtocolVersion 3.0”, Nov. 18, 1996,
`printed from http://www.netscape.com/eng/ss13/ draft302.txt on
`Feb. 4, 2002, 56 pages.
`August Bequai, “Balancing Legal Concerns Over Crime and Security
`in Cyberspace”, Computer & Security, vol. 17, No. 4, 1998, pp.
`293 -298.
`D. B. Chapman et al., “Building Internet Firewalls”, Nov. 1995, pp.
`278-375.
`D. Clark, “US Calls for Private Domain-Name System”, Computer,
`IEEE Computer Society, Aug. 1, 1998, pp. 22-25.
`Davila J et al, “Implementation of Virtual Private Networks at the
`Transport Layer”, Information Security, Second International Work-
`shop, ISW’99. Proceedings (Lecture Springer-Verlag Berlin, Ger-
`many, [Online] 1999, pp. 85-102, XP002399276, ISBN 3-540-666.
`Dolev, Shlomi and Ostrovsky, Rafil, “Efficient Anonymous Multicast
`and Reception” (Extended Abstract), 16 pages.
`Donald E. Eastlake, 3rd, “Domain Name System Security Exten-
`sions”, Internet Draft, Apr. 1998, pp. 1-51.
`F. Halsall, “Data Communications, Computer Networks and Open
`Systems”, Chapter 4, Protocol Basics, 1996, pp. 198-203.
`Glossary for the Linux FreeS/WAN project, printed from http://
`liberty.freeswan .org/freeswanitrees/freeswan-1 .3/
`doc/glo ssary.
`htrnl on Feb. 21, 2002, 25 pages.
`J. Gilmore, “Swan: Securing the Internet against Wiretapping”,
`printed from http ://liberty. freeswan. org/freeswanitrees/freeswan- 1 .
`3/doc/rationale.html on Feb. 21, 2002, 4 pages.
`James E. Bellaire, “New Statement of Rules-Naming Internet
`Domains”, Internet Newsgroup, Jul. 30, 1995, 1 page.
`Jim Jones et al., “Distributed Denial of Service Attacks: Defenses”,
`Global Integrity Corporation, 2000, pp. 1-14.
`Laurie Wells (LancasterBibelMail MSN COM); “Subject: Security
`Icon” USENET Newsgroup, Oct. 19, 1998, XP002200606, 1 page.
`Linux FreeS/WAN Index File, printed from http://liberty.
`freewan,org/freeswanitrees/freeswan-1,3/doc/ on Feb. 21. 2002, 3
`Pages.
`P. Srisuresh et al., “DNS extensions to Network address Translators
`(DNS,ALG)”, Internet Draft, Jul. 1998, pp. 1-27.
`Reiter, Michael K. and Rubin. Aviel D. (AT&T Labs-Research),
`“Crowds: Anonymity for Web Transactions”, pp. 1-23.
`RFC 2401 (dated Nov. 1998) Security Architecture for the Internet
`Protocol (RTP).
`RFC 2543-SIP (dated Mar. 1999): Session Initiation Protocol (SIP or
`SIPS).
`Rich Winkel, “CAQ: Networking With Spooks; The NET & The
`Control of Information”, Internet Newsgroup, Jun. 21, 1997, 4 pages.
`Rubin, Aviel D., Geer, Daniel, and Ranum, Marcus J. (Wiley Com-
`puter Publishing), “Web Security Sourcebook”, pp. 82-94.
`Search Report (dated Aug. 20, 2002), International Application No.
`PCT/USOl/04340.
`Search Report (dated Aug. 23, 2002), International Application No.
`PCT/USOl/13260.
`Search Report (dated Oct. 7, 2002), International Application No.
`PCT/USOl/13261.
`Search Report. IPER (dated Nov. 13, 2002), International Applica-
`tion No. PCT/USO 1/04340.
`Search Report, IPER (dated Feb. 6, 2002), International Application
`No. PCT/USOl/13261.
`Search Report, IPER (dated Jan. 14, 2003), International Application
`No. PCT/USOl/13260.
`Shankar, A.U. “A verified sliding window protocol with variable flow
`control”. Proceedings of ACM SIGCOMM conference on Commu-
`nications architectures & protocols. pp, 84-91, ACM Press, NY, NY
`1986.
`Shree Murthy et al., “Congestion-Oriented Shortest Multi-path Rout-
`ing”, Proceedings of IEEE INFOCOM, 1996, pp. 1028-1036.
`W. Stallings, “Cryptography and Network Security”, 2nd, Edition,
`Chapter 13, IP Security, Jun. 8, 1998, pp. 399-440.
`Microsoft Corporation’s Fourth Amended Invalidity Contentions
`dated Jan. 5, 2009, VirnetX Inc. and Science Applications Interna—
`tional Corp. v. Microsoft Corporation.
`Appendix A of the Microsoft Corporation’s Fourth Amended Inval-
`idity Contentions dated Jan. 5, 2009.
`
`Petitioner Apple Inc. - Ex. 1003, p. 4
`
`Petitioner Apple Inc. - Ex. 1003, p. 4
`
`
`
`US 8,850,009 B2
`Page 5
`
`(56)
`
`References Cited
`OTHER PUBLICATIONS
`
`Concordance Table for the References Cited in Tables on pp. 6-15,
`71-80 and 116-124 of the Microsoft Corporation’s Fourth Amended
`Invalidity Contentions dated Jan. 5, 2009.
`I. P. Mockapetris, “DNS Encoding of Network Names and Other
`Types,” Network Working Group, RFC 1101 (Apr. 1989) RFC1101,
`DNS SRV).
`R. Atkinson, “An Internetwork Authentication Architecture,” Naval
`Research Laboratory, Center for High Assurance Computing Sys-
`tems (Aug. 5, 1993). (Atkinson NRL, KX Records).
`Henning Schulzrinne, Personal Mobilityfor Multimedia Services in
`the Internet, Proceedings of the Interactive Distributed Multimedia
`Systems
`and Services European Workshop at
`143
`(1996).
`(Schulzrinne 96).
`Microsoft Corp., Microsoft Virtual PrivateNetworking: Using Point—
`to—Point Tunneling Protocol for Low—Cost, Secure, Remote Access
`Across the Internet (1996) (printed from 1998 PDC DVD-ROM).
`(Point to Point, Microsoft Prior Art VPN Technology).
`“Safe Surfing: How to Build a Secure World Wide Web Connection,”
`IBM Technical Support Organization, (Mar. 1996). (Safe Surfing,
`Website Art).
`Goldschlag, et al., “Hiding Routing Information,” Workshop on
`Information Hiding, Cambridge, UK (May 1996). (Goldschlag II,
`Onion Routing).
`“IPSec Minutes From Montreal”, IPSec Working Group Meeting
`Notes,
`http://www.sandleman.ca/ipsec/1996/08/msg00018.html
`(Jun. 1996). (IPSec Minutes, FreeS/WAN).
`J. M. Galvin, “Public Key Distribution with Secure DNS,” Proceed-
`ings of the Sixth USENIX UNIX Security Symposium, San Jose,
`California, Jul. 1996. (Galvin, DNSSEC).
`J. Gilmore, et al. “Re: Key Management, anyone? (DNS Keying),”
`IPSec Working Group Mailing List Archives (Aug. 1996). (Gilmore
`DNS, FreeS/WAN).
`H. Orman, et al. “Re: ’Re: DNS? was Re: Key Management, any-
`one?” IETF IPSec Working Group Mailing List Archive (Aug. 1996-
`Sep. 1996). (Orman DNS, FreeS/WAN).
`Arnt Gulbrandsen & Paul Vixie, A DNSRRfor specifying the location
`ofservices (DNS SRV), IETF RFC 2052 (Oct. 1996). (RFC 2052,
`DNS SRV).
`Freier, et al. “The SSL Protocol Version 3.0,” Transport Layer Secu-
`rity Working Group (Nov. 18, 1996), (SSL, Underlying Security
`Technology).
`M. Handley, H. Schulzrinne, E. Schooler, Internet Engineering Task
`Force, Internet Draft, (Dec. 2, 1996). (RFC 2543 Internet Draft 1).
`MG. Reed, et al. “Proxies for Anonymous Routing,” 12th Annual
`Computer Security Applications Conference, San Diego, CA, Dec.
`9-13, 1996. (Reed, Onion Routing).
`Kenneth F. Alden & Edward P. Wobber, TheAlta Vista Tunnel: Using
`theInternet to Extend Corporate Networks, Digital Technical Journal
`(1997) (Alden, AltaVista).
`Automotive Industry Action Group, “ANX Release 1 Document Pub-
`lication,” AIAG (1997). (AIAG, ANX).
`Automotive Industry Action Group, “ANX Release 1 Draft Docu-
`ment Publication,” AIAG Publications (1997).
`(AIAG Release,
`ANX).
`Aventail Corp. “Aventail VPN Data Sheet,” available at http://www.
`archive.org/web/19970212013043/www.aventail.com/prod/
`vpndata.html (1997). (Data Sheet, Aventail).
`Aventail Corp.. “Directed VPN Vs. Tunnel,” available at http://web.
`archive.org/web/ 19970620030312/www.aventail.com/educate/
`directvpnhtml (1997). (Directed VPN, Aventail).
`Aventail Corp., “Managing Corporate Access to the Internet,”
`Aventail AutoSOCKS White Paper available at http://web.archive.
`org/199706200300312/www.aventail.com/educate/whitepaper/
`ipmw.html (1997). (Corporate Access, Aventail).
`Aventail Corp., “VPN Server V2.0 Administration Guide,” (1997).
`(VPN, Aventail).
`Goldschlag, et al, “Privacy on the Internet,” Naval Research Labo-
`ratory, Center
`for High Assurance Computer Systems (1997).
`(Goldschtag I, Onion Routing).
`
`
`
`VIicrosoft Corp,, Installing Configuring and Using PPPTP with
`Microsoft Clients and Servers (1997). (Using PPTP, Microsoft Prior
`Art VPN Technology).
`VIicrosoft Corp,, IP Securityfor Microsoft Windows NT Server 5.0
`(1997) (printed from 1998 PDC DVD-ROM). (IP Security, Microsoft
`Prior Art VPN Technology).
`VIicrosoft Corp., Microsoft Windows NTActive Directory: An Intro—
`duction to the Next Generation Directory Services (1997) (printed
`from 1998 PDC DVD-ROM). (Directory, Microsoft Prior Art VPN
`Technology).
`VIicrosoft Corp., Routing and Remote Access Service for Windows
`NT Server New Opportunities Today and Looking Ahead (1997)
`(printed from 1998 PDC DVD-ROM). Routing, Microsoft Prior Art
`VPN Technology).
`VIicrosoft Corp., Understanding Point—to—Point Tunneling Protocol
`PPTP (1997) (printed from 1998 PDC DVD-ROM). (Understanding
`PPTP, Microsoft Prior Art VPN Technology).
`J. Mark Smith et.al., Protecting a Private Network: The Alta Vista
`Firewall, Digital Technical Journal (1997). (Smith, AltaVista).
`Naganand Doraswamy Implementation of Virtual Private Networks
`(VPNs) with IPSecurity, <draft-ietf-ipsec-vpn-00.txt> (Mar. 12,
`1997). (Doraswamy).
`M. Handley, H. Schulzrinne, E. Schooler, Internet Engineering Task
`Force, Internet Draft, (Mar. 27, 1997). (RFC 2543 Internet Draft 2).
`Aventail Corp., “Aventail and Cybersafe to Provide Secure Authen-
`tication for Internet and Intranet Communication,” Press Release,
`Apr. 3, 1997. (Secure Authentication, Aventail).
`D. Wagner, et al. “Analysis ofthe SSL 3.0 Protocol,” (Apr. 15, 1997).
`(Analysis, Underlying Security Technologies).
`Automotive Industry Action Group, “ANXO Certification Authority
`Service and Directory Service Definition for ANX Release 1,” AIAG
`Telecommunications Project Team and Bellcore (May 9, 1997).
`(AIAG Definition, ANX).
`Automotive Industry Action Group, “ANXO Certification Process
`and ANX Registration Process Definition for ANX Release 1,”AIAG
`Telecommunications Project Team and Bellcore (May 9, 1997).
`(AIAG Certification, ANX).
`Aventail Corp., “Aventail Announces the First VPN Solution to
`Assure Interoperability Across Emerging Security Protocols.” Jun. 2,
`1997. (First VPN, Aventail).
`Syverson, et al. “Private Web Browsing,” Naval Research Laboratory,
`Center for High 8 Assurance Computer Systems (Jun. 2, 1997),
`(Syverson, Onion Routing).
`Bellcore, “Metrics, Criteria, and Measurement Technique Require-
`ments for ANX Release 1,” AIAG Telecommunications Project Team
`and Bellcore (Jun. 16, 1997). (AIAG Requirements, ANX).
`M. Handley, H. Schulzrinne, E. Schooler, Internet Engineering Task
`Force, Internet Draft, (Jul. 31, 1997). (RFC 2543 Internet Draft 3).
`R. Atkinson, “Key Exchange Delegation Record for the DNS,” Net-
`work Working Group, RFC 2230 (Nov. 1997). (RFC 2230, KX
`Records).
`M. Handley, H. Schulzrinne, E. Schooler, Internet Engineering Task
`Force, Internet Draft, (Nov. 11, 1997), (RFC 2543 Internet Draft 4).
`1998 Microsoft Professional Developers Conference DVD (“1998
`PDC DVD-ROM”) (including screenshots captured there from and
`produced
`as MSFTVX 00018827-00018832),
`(Conference,
`Microsoft Prior Art VPN Technology).
`Microsoft Corp., Virtual Private Networking An Overview (1998)
`(printed from 1998 PDC DVD-ROM) (Overview, Micro soft Prior Art
`VPN Technology).
`Microsoft Corp., Windows NT 5.0 Beta Has Public Premiere at
`Seattle Mini—Camp Seminar attendees get first look at the perfor—
`mance and capabilities ofWindows NT 5. 0(1998) (available at http://
`www.microsoft.com/presspass/features/1998/10-19nt5.
`mspxpftrue). (NT Beta, Microsoft Prior Art VPN Technology).
`“What ports does SSL use” available at stason.org/TULARC/secu-
`rity/ssl-talk/3-4-What-ports-does-ssl-usehtml (1998). (Ports, DNA
`SRV).
`Aventail Corp., “Aventail VPN V2.6 Includes Support for More Than
`Ten Authentication Methods Making Extranet VPN Development
`Secure and Simple,” Press Release, Jan. 19, 1998. (VPN V2.6,
`Aventail).
`
`Petitioner Apple Inc. - EX. 1003, p. 5
`
`Petitioner Apple Inc. - Ex. 1003, p. 5
`
`
`
`US 8,850,009 B2
`Page 6
`
`(56)
`
`References Cited
`OTHER PUBLICATIONS
`
`
`
`R, G. Moskowitz, “Network Address Translation Issues with IPsec,”
`Internet Draft,
`Internet Engineering Task Force, Feb. 6, 1998.
`(Moskowitz).
`H. Schulzrinne, et a1, “Internet Telephony Gateway Location,” Pro-
`ceedings of IEEE INfocom ’98, The Conference on Computer Com-
`munications, vol. 2 (Mar. 29-Apr. 2, 1998). (Gateway, Schulzrinne).
`C. Huitema, 45 al. “Simple Gateway Control Protocol,” Version 1.0
`(May 5, 19 (SGCP).
`DISA “Secret Internet Protocol Router Network,” SIPRNET Pro-
`gram Management Office (D31 13) DISN Networks, DISN Transmis-
`sion Services (May 8, 1998). DISA, SIPRNET).
`VI. Handley, H. Schulzrinne, E. Schooler, Internet Engineering Task
`Force, Internet Draft, (May 14, 1998). (RFC 2543 Internet Draft 5).
`VI. Handley, H. Schulzrinne, E. Schooler, Internet Engineering Task
`Force, Internet Draft, (Jun. 17, 1998). (RFC 2543 Internet Draft 6).
`D. McDonald, et al. “PFiKEY Key Management API, Version 2,”
`\Ietwork Working Group, RFC 2367 (Jul. 1998). (RFC 2367).
`VI. Handley, H. Schulzrinne, E. Schooler, Internet Engineering Task
`Force, Internet Draft, (Jul. 16, 1998). (RFC 2543 Internet Draft 7).
`VI. Handley, H. Schulzrinne, E. Schooler, Internet Engineering Task
`Force, Internet Draft, (Aug. 7, 1998). (RFC 2543 Internet Draft 8).
`VIicrosoft Corp., Company Focuses on Quality and Customer Feed—
`back (Aug. 18, 1998). (Focus, Microsoft PriorArtVPN Technology).
`VI. Handley, H. Schulzrinne, E. Schooler, Internet Engineering Task
`Force, Internet Draft, (Sep. 18, 1998). (RFC 2543 Internet Draft 9).
`Atkinson, et al. “Security Architecture for the Internet Protocol,”
`\Ietwork Working Group, RFC 2401 (Nov. 1998). (RFC 2401,
`Underlying Security Technologies).
`VI. Handley, H. Schulzrinne, E. Schooler, Internet Engineering Task
`Force, Internet Draft, (Nov. 12, 1998). (RFC 2543 Internet Draft 10).
`Donald Eastlake, Domain Name System Security Extensions, IETF
`DNS Security Working Group (Dec. 1998). (DNSSEC-7).
`VI. Handley, H. Schulzrinne, E, Schooler, Internet Engineering Task
`Force, Internet Draft, (Dec. 15, 1998). (RFC 2543 Internet Draft 11).
`Aventail Corp., “Aventail Connect 3.1/2.6 Administrator’s Guide,”
`(1999). (Aventail Administrator 3.1, Aventail).
`Aventail Corp., “Aventail Connect 3.1/2.6 User’s Guide,” (1999),
`(Aventail User 3.1, Aventail).
`Aventail Corp.. “Aventail ExtraWeb Server v3.2 Administrator’s
`Guide,” (1999). (Aventail ExtraWeb 3.2, Aventail).
`Kaufman et al, “Implementing IPsec,” (Copyright 1999). (Imple-
`menting IPsec, VPN References).
`Network Solutions,
`Inc. “Enabling SSL,” NSI Registry (1999).
`(Enabling SSL, Underlying Security Technologies).
`Check Point Software Technologies Ltd.
`(1999) (Check Point,
`Checkpoint FW).
`Arnt Gulbrandsen & Paul Vixie, A DNSRRfor specifying the location
`of services (DNS SRV),<draft-ietf-dnsind-frc2052bis-02.txt> (Jan.
`1999). (Gulbrandsen 99, DNS SRV).
`C. Scott, et al. Virtual Private Networks, O’Reilly and Associates,
`Inc., 2nd ed. 1999), Scott VPNs).
`M. Handley, H. Schulzrinne, E. Schooler, Internet Engineering Task
`Force, Internet Draft, (Jan. 15, 1999). (RFC 2543 Internet Draft 12).
`Goldschlag, et al,, “Onion Routing for Anonymous and Private
`Internet Connections,” Naval Research Laboratory, Center for High
`Assurance Computer Systems (Jan. 28, 1999). (Goldschlag III,
`Onion Routing).
`H. Schulzrinne, “Internet Telephony: architecture and protocolsian
`IETF perspective,” Computer Networks, vol. 31, No. 3 (Feb. 1999).
`(Telephony, Schulzrinne).
`M. Handley, et al. “SIP: Session Initiation Protocol,” Network Work-
`ing Group, RFC 2543 and Internet Drafts (Dec. 1996-Mar. 1999).
`(Handley, RFC 2543).
`FreeS/WAN Project, LinuxFreeS/WAN Compatibility Guide (Mar. 4,
`1999). (FreeS/WAN Compatibility Guide, FreeS/WAN).
`Telcordia Technologies, “ANX Release 1 Document Corrections,”
`AIAG (May 11, 1999). (Telcordia, ANX).
`
`Ken Hornstein & Jeffrey Altman, Distributing Kerberos KDC and
`Realm Information with DNS <draft-eitf-cat-krb-dns-locate-oo.txt>
`(Jun. 21, 1999). (Hornstein, DNS SRV).
`Bhattacharya, et al., “An LDAP Schema for Configuration and
`Administration of IPSec Based Virtual Private Networks (VPNs)”,
`IETF Internet Draft (Oct. 1999). (Bhattcharya LDAP VPN).
`B. Patel, et al. “DHCP Configuration of IPsec Tunnel Mode,” IPsec
`Working Group, Internet Draft 02 (Oct. 15, 1999). (Patel).
`Goncalves, et al. Check Point Fire Wall—1 Administration Guide,
`McGraw-Hill Companies (2000). (Goncalves, Checkpoint FW).
`“Building a Microsoft VPN: A Comprehensive Collection of
`Microsoft Resources,” FirstVPN, (Jan. 2000). (FirstVPN Microsoft).
`Gulbrandsen, Vixie, & Esibov, A DNS RRfor specifying the location
`ofservices (DNS SRV), IETF RFC 2782 (Feb. 2000). (RFC 2782,
`>
`DNS SRV).
`MITRE Organization,
`“Technical Description,’ Collaborative
`Operations in Joint Expeditionary Force Experiment (JEFX) 99 (Feb.
`2000). (MITRE, SIPRNET).
`H. Schulzrinne, et al. “Application-Layer Mobility Using SIP,”
`Mobile Computing and Communications Review, vol. 4, No. 3. pp.
`47-57 (Jul. 2000). (Application, SIP).
`Kindred et al, “Dynamic VPN Communities: Implementation and
`Experience,” DARPA Information Survivability Conference and
`Exposition II (Jun. 2001). (DARPA, VPN Systems).
`ANX 101: Basic ANX Service Outline. (Outline, ANX).
`ANX 201: Advanced ANX Service. (Advanced, ANX).
`Appendix A: Certificate Profile for ANX IPsec Certificates. (Appen-
`dix, ANX).
`Assured Digital Products. (Assured Digital).
`Aventail Corp., “Aventail AutoSOCKS the Client Key to Network
`Security,” Aventail Corporation White Paper, (Network Security,
`Aventail).
`Cindy Moran, “DISN Data Networks: Secret Internet Protocol
`Router Network (SIPRNET).” (Moran, SIPNET).
`Data Fellows F-Secure VPN+ (F-Secure VPN+).
`Interim Operational Systems Doctrine for the Remote Access Secu-
`rity Program (RASP) Secret Dial-In Solution. (RASP, SIPRNET).
`Onion Routing. “Investigation ofRoute Selection Algorithms,” avail-
`able
`at
`http://www.onion-routernet/Archives/Route/index.html.
`(Route Selection, Onion Routing).
`Secure Computing, “Bullet-Proofing an Army Net,” Washington
`Technology, (Secure, SIPRNET).
`SPARTA “Dynamic Virtual Private Network.” (Sparta, VPN Sys-
`tems).
`Standard Operation Procedure for Using the 1910