throbber
US 7,418,504 B2
`Page 3
`
`W. Stall ings, “New Cryptography and Network Security Book", Jun.
`8. .1998. 3 pages.
`Fasbendcr,Kcsdogan, and. Kubitz: ”Variable and Scalable Security:
`Protection ofLocation Information in Mobile 11"”, IEEE publication,
`1996. pp. 963—967.
`Linux FreeSJWAN Index File, printed Erom httpfllibcrtyfrecswan.
`org/freeswan treesifrccswaanBr’doc." on Feb. 21, 2002, 3 Pages.
`J. Gilmore, “Swan: Securing the Internet against wiretapping”,
`printed from http:fllibcrtyi'recswanorg/fieesmn, trees/fieeswan-
`l.3ldocfrationale.hnnl on Feb. 21, 2002, 4 pages.
`Glossary for the Linux FreeSI'WAN project, printed [from httpsz
`libertyireeswanorg/Ereeswani
`trees/freeswan-l Sfdoca'glossary.
`html on Feb. 21, 2002, 25 pages.
`Alan 0. Frier et at, “The 331.. ProtocolVersion 3.0”, NOV. 18, 1996,
`printedfrom httprwwnetscapecomJeng/ss13Jdrait302.txt onFeb.
`4, 2002, 56 pages.
`Search Report (dated Aug. 20, 2002), International Application No.
`PC‘I‘iUSOli'043-40.
`Search Report (dated Aug. 23, 2002), International Application No.
`PCTIUSOII'13260.
`Shree Murthy et 31., “Congestion-Oriented Shortest Milltipath Rout-
`ing", Proceedings of IEEE INFOCOM, 1996, pp. 1028-1036.
`Jim Jones et al., “Distributed Denial of Service Attacks: Defenses",
`Global Integrity Corporation, 2000,pp. 1-14.
`James E. Bellaire, "New Statement of RulesiNaming Internet
`Domains". Imernet Newsgroup, Jul. 30, 1995, 1 page.
`D. Clark, “US Calls for Private Domain-Name System", Computer,
`IEEE Computer Society, Aug. 1, 1998, pp. 22-25.
`August Bequai, “Balancing Legal Concerns Over Crime and Security
`in Cyberspace”, Computer & Security, vol. 17, No. 4, 1998, pp.
`293 0.98.
`Rich Winkcl, "CAQ: Networkinig With Spooks: The NET & The
`Control Of Information“, Internet Newsgroup, Jun. 21, 1997, 4
`pages.
`
`Search Report (dated Oct. ‘7, 2002), International Application No.
`PCT/11501113261.
`
`F. Halsall, “Data Communications, Computer Networks And Open
`Systems”, Chapter 4, Protocol Basics, 1996, pp. 198-203.
`Reiter, Mchael K. and Rubin, Avicl I). (Al‘és'c'l' Labs—Research),
`“Crowds: Anonymity for Web Transmissoins", pp. 1-23.
`Dolev. Shlomi andOstrovsky, Rafi], “Efficient Anonymous Multicast
`and Reception”(Extended Abstract), 16 pages.
`Rubin. Avie] D.. Greer, Daniel, and Ramon, Mini-cos J. (Wiley Com-
`puter Publishing), “Web Security Sourcebook”, pp. 82—94.
`Fasbondor, Kesdogan, and Kubitz: “Variable and Scalable Security"
`Protection 01‘ Location Information in Mobile IP, IEEE publication.
`1996, pp. 963-967.
`Eastlake, D. E., “Domain Name System Security Extensions”,
`Internet Draft, Apr. 1998, XPUOZ 199931, Sections 1, 2.3 and 2.4.
`RFC 2401 (dated Nov. 1998) Security Architecture for the Internet
`Protocol (RTP).
`RFC 2543—SIP (dated Mar. 1999): Session Initiation Protocol (SIP or
`SIPS).
`Search Report, [PER (clawed Nov. 13, 2002). International Applica-
`tion No. PCTJUSOl/04340.
`Search Report, IPER (dated Feb. 6, 2002), International Application
`No. PCT/USU “13261.
`
`Search Report, IPER (dated. Jan. 14, 2003), International Application
`No. PCTI'USO ”13250.
`
`Shankur, A.U. “Averified sliding winerWprotocoi with variable flow
`control". Proceedings of ACM SIGCOMM conference on Commu —
`nications architectures & protocols. pp. 84-91, ACM Press, NY, NY
`1986.
`
`W. Stallings, “Crytography and Network Security", 2nd, Edition,
`Chapter 13, IP Security, Jun. 3, 1998, pp. 399—440.
`
`Copv provided by USPTO from the PIFIS Imaue Database on 031231201 1
`
`Petitioner Apple Inc. - Exhibit 1002, p. 1940
`PX01 O_OOOOO4
`
`VX00056855
`
`Petitioner Apple Inc. - Exhibit 1002, p. 1940
`
`

`

`US. Patent
`
`Aug. 26, 2008
`
`Sheet 1 of 40
`
`US 7,418,504 B2
`
`ORIGINATING
`TERMINAL
`
`iP ROUTER
`
`3;
`
`IP ROUTER
`a
`
`IP ROUTER
`i
`
`IP ROUTER
`E
`
`'P ROUTER
`33 7
`
`IPROUTER
`a
`
`'NTIEIIET
`”“
`
`IPROUTER
`.3;
`
`IP ROUTER
`fi
`
`
`
`IP ROUTER
`
`21
`
`IP ROUTER
`
`15..
`
`.
`
`fl
` IP R01UTER
`
`
`
`
`
`
`
`
`
`
`
`
`
`48 ENCRYPTION KEY
`
`
`m
`
`
`
`DESTINATION
`TERMINAL
`
`FIG. ‘I
`
`I
`
`Conv nrovlded bv USPTO Tram the PIFIS lmaue Database on 0312812011
`
`Petitioner Apple Inc. - Exhibit 1002, p. 1941
`PX01 0_000005
`
`VX00056856
`
`Petitioner Apple Inc. - Exhibit 1002, p. 1941
`
`

`

`U.S. Patent
`
`Aug. 26, 2008
`
`Sheet 2 of 40
`
`US 7,418,504 132
`
`TARP
`
`TERMINAL
`
`
`fl
`
`140
`
`
` TARP PACKET
`
`
`
`TARP
`
`
`
`146
`ROUTER
`
`LINK KEY
`12g
`
`
`
`
`IP ROUTER
`jfl
`
`
`
`
`
`TARP
`
`ROUTER
`
`
`
`124
`
`INTERNET
`
`fl
`
`tP ROUTER
`123
`
`TARP
`ROUTER
`
`
`
`
`
`LINK KEY
`
`
`
`
`TARP PACKET
`TARP
`TERMINAL
`
`
`m
`
`FIG. 2
`
`Copy provided by USPTO from the PIHS Image Database on 032812011
`
`Petitioner Apple Inc. - Exhibit 1002, p. 1942
`PXO1 0_000006
`
`VX00056857
`
`Petitioner Apple Inc. - Exhibit 1002, p. 1942
`
`

`

`US. Patent
`
`Aug. 26, 2008
`
`Sheet 3 of 40
`
`US 7,418,504 B2
`
`207a
`2m
`207a
`
`
`207d
`
`' ° '
`
`INTERLEAVE WINDOW
`
`
`
` \330 SESSION-KEY—ENCRYPTED
`PAYLOAD DATA
`
`
`
`
`
`\340 TARP PACKET WITH
`ENCRYPTED PAYLOADS
`
`X350 LlNK—KEY—ENCRYPTED
`TARP PACKETS
`
`4“ 360 IP PACKETS WI
`EN CRYPTED TARP
`PACKETS AS PAYLOAD
`
`TARP
`ROUTER b‘
`
`
`
`TARP
`DESTINATION
`
`Copy provided by USPTO tram the PIRS Image Database on 0312812011
`
`Petitioner Apple Inc. - Exhibit 1002, p. 1943
`PXO1 0_000007
`
`VX00056858
`
`Petitioner Apple Inc. - Exhibit 1002, p. 1943
`
`

`

`U.S. Patent
`
`Aug. 26, 2008
`
`Sheet 4 of 40
`
`US 7,418,504 B2
`
`207a
`
`207k)
`
`207a
`
`207d
`
`- . -
`
`/3fl0 DATASTREAM
`
`fl_m_fl___- “ " "
`
`
`N520 BLOCK-ENCRYPTED
`SESSION-KEY) PAYLOAD
`EQUENCE
`1' \522 ENCRYPTED BLOCK
`DIVIDED INTO PAYLOADS
`
`I
`
`
`
`
`
` ‘
`
`I 3" 3" K523 ENCRYPTED BLOCK
`DIVIDED INTO PAYLOADS
`INTERLEAVED
`
`517
`
` " 33‘ “\523 ENCR‘I’PTED BLOCK
`
`DIVIDED INTO PAYLOADS
`INTERLEAVED
`
` "32?’:EE'=.- x340 TARP PACKETS WITH
`ENCRYPTED PAYLOADS
`
`Copy provided by USPTO from the PIFIS Image Database on 031282011
`
`Pxo1o_ooo£%titi0ner Apple Inc. - Exhibit 1002, p. 1944
`
`VX00056859
`
`Petitioner Apple Inc. - Exhibit 1002, p. 1944
`
`

`

`US. Patent
`
`Aug. 26, 2008
`
`Sheet 5 of 40
`
`Us 7,41 8,504 B2
`
`TARP TRANSCEIVER
`
`m
`
`fl NETWORK (IF) LAYER
`
`ONE ALTERNATIVE TO
`COMRNE
`TARP PROCESSING
`WITH ors IP
`PROCESSOR
`
`OTHERALTERNATIVE
`TO COMBINE
`TARP PROCESSING
`WITH D.L. PROCESSOR
`(9.9.. BURN lNTO BOARD
`PROM)
`
`TARP LAYER
`fl
`
`.-;:.:-:
`
`..
`
`v‘
`
`DATA LINK LAYER
`fl
`
`FIG. 4
`
`450
`DATA LINK
`PROTOCOL WRAPPER
`
`Copy provided by USPTO Irom the PIRS Imaue Database on 0312812011
`
`Petitioner Apple Inc. - Exhibit 1002, p. 1945
`PXO1 0_000009
`
`VXOOOSGBGO
`
`Petitioner Apple Inc. - Exhibit 1002, p. 1945
`
`

`

`US. Patent
`
`Aug. 26, 2008
`
`Sheet 6 of 40
`
`US 7,41 8,504 B2
`
`BACKGROUND LOOP - DECOY
`GENERATION
`
`80
`
`AUTHENTICATE TARP
`
`OUTER LAYER DECRYPTION
`0F TARP PACKET USING
`LINK KEY
`
`DUMP DECOY
`
`SE
`
`33
`
`PACKET
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`CHECK FOR DECOY AND
`
`INCREMENT PERISHABLE
`
`DECOY COUNTER AS
`
`APPROPRIATE
`
`TRANSMIT DECOY?
`
`YES
`
`DECREMENT
`TTL TI'L > D?
`
`35
`
`57
`
`
`DETERMINE DESTINATION
`GENERATE NEXT-HOP TARP
`TARP ADDRESS AND STORE
`ADDRESS AND STORE LINK
`
`
`KEY AND IP ADDRESS
`LINK KEY AND IF ADDRESS
`
`
`
`
`GENERATE NEXT-HOP TARP
`ADDRESS AND STORE LINK
`KEYAND IP ADDRESS
`
`GENERATE IP HEADER
`AND TRANSMIT
`
`
`
`S10
`
` S11
`
`FIG. 5
`
`Capv provided hv USPTO from the PIRS lmaae Daiabase on 03128l2011
`
`Petitioner Apple Inc. - Exhibit 1002, p. 1946
`PXO10_OOOO1 o
`
`VX00056861
`
`Petitioner Apple Inc. - Exhibit 1002, p. 1946
`
`

`

`US. Patent
`
`Aug. 26, 2008
`
`Sheet 7 of 40
`
`US 7,418,504 B2
`
`BACKGROUND LOOP - DECOY
`GENERATION
`
`520
`
`GROUP RECEIVED IP PACKETS
`INTO INTERLEAVE WINDOW
`
`DETERMINE DESTINATION TARP
`ADDRESS, INITIALIZE TIL, STORE
`IN TARP HEADER
`
`RECORD WINDOW SEQ. NOS.AND
`INTERLEAVE SEQ. NOS. IN TARP
`HEADERS
`
`
`
`CHOOSE FIRST HOP TARP
`ROUTERI LOOK UP IP ADDRESS
`AND STORE IN CLEAR IP HEADER.
`OUTER LAYER ENCRYPT
`
`INSTALL CLEAR IP HEADER AND
`TRANSMIT
`
`821
`
`822
`
`823
`
`824
`
`$25
`
`FIG. 6
`
`capy provided by USPTO from the PIHS Jmaae Database on 03/28/2011
`
`Petitioner Apple Inc. - Exhibit 1002, p. 1947
`PX01 O_OOOO‘I 1
`
`VX00056862
`
`Petitioner Apple Inc. - Exhibit 1002, p. 1947
`
`

`

`U.S. Patent
`
`Aug. 26,2008
`
`Sheet 8 of 40
`
`US 7,418,504 B2
`
`DIVIDE BLOCK INTO PACKETS
`USING WINDOW SEQUENCE
`DATA, ADD CLEAR lP HEADERS
`GENERATED FROM TARP
`
`HEADERS -
`
`349
`
`HAND COMPLETED IP PACKETS
`TO !P LAYER PROCESS
`
`350
`
`BACKGROUND LOOP - DECOY
`GENERATION
`
`S40
`
`AUTHENTICATE TARP PACKET -
`RECEIVED
`
`S42
`
`DECRYPT OUTER LAYER
`ENCRYPTION WITH LINK KEY
`
`843
`
`INCREMENT PERISHABLE
`COUNTER IF DECOY
`
`S44
`
`THROW AWAY DECOY OR KEEP
`IN RESPONSE TO ALGORITHM
`
`S45
`
`CACHE TARP PACKETS UNTIL
`WINDOW IS ASSEMBLED
`
`S46
`
`DEINTERLEAVE PACKETS
`FORMING WINDOW
`
`S47
`
`DECRYPT BLOCK
`
`545
`
`FIG. 7
`
`Copy provided by USPTO from the PIRS Image Database on 03l23l2011
`
`Petitioner Apple Inc. - Exhibit 1002, p. 1948
`PXO10_OOOO12
`
`VX00056863
`
`Petitioner Apple Inc. - Exhibit 1002, p. 1948
`
`

`

`U.S. Patent
`
`Aug. 26, 2008
`
`Sheet 9 of 40
`
`US 7,418,504 B2
`
`TEFlifilhl‘gL
`801
`
`SSYN
`PAginE-r
`
`SSYN ACK
`PACKET
`822
`
`SSYN ACK
`ACI'C PACKET
`823
`
`
`
`825
`SECURE SESSION
`INITIATION ACK
`
`324
`SECURE SESSION
`INETIATION
`
`F I G. 8
`
`COINI nrovided bV USPTO from the PIRS lrnacle Database on 03l23f2011
`
`Petitioner Apple Inc. - Exhibit 1002, p. 1949
`PXO10_OOOO1 3
`
`VX00056864
`
`Petitioner Apple Inc. - Exhibit 1002, p. 1949
`
`

`

`US. Patent
`
`Aug. 26, 2008
`
`Sheet 10 of 40
`
`US 7,418,504 B2
`
`CLIENT1 A TARP
`ROUTER
`
`RECEIVE TABLE
`TRANSMIT TABLE
`924
`921
`##— ___A__
`
`131.218.204.98
`131.218.204.221
`131.218.204.139
`131.218.204.12
`
`-
`I
`-
`-
`
`131.218.204.85
`131.218.204.97
`131.218.204.188
`131.218.204.55
`
`131.218.204.98
`131.218.204.221
`131.218.204.139
`131.218.204.12
`
`I
`-
`.
`-
`
`131 .21 8204.85
`131.218.204.97
`131.218.204.185
`131.218.204.55
`
`TRANSMIT TABLE
`RECEIVE TABLE
`923
`922
`__A—_ _.—A__
`
`131.218.204.181
`131.218.204.58
`131.218.204.201
`131.218.204.119
`
`0
`0
`0
`-
`
`131.218.204.89
`131.218.204.212
`131.218.204.127
`131.218.204.49
`
`131.218.204.181
`131.218.204.68
`131218204201
`131.218.204.119
`
`0
`0
`0
`0
`
`131.218.204.89
`131.218.204.212
`131 .21 8204.127
`131.218.204.49
`
`Copv provided bv USPTO from the PIHS Imaae Database on 03I2af2011
`
`Petitioner Apple Inc. - Exhibit 1002, p. 1950
`PXO10_OOOO1 4
`
`VX00056865
`
`Petitioner Apple Inc. - Exhibit 1002, p. 1950
`
`

`

`U.S. Patent
`
`Aug. 26, 2008
`
`Sheet 11 of 40
`
`US 7,418,504 B2
`
`
`
` ISP A
`TARP
`
`ROUTER
`1021
`
`
`
`CLIENT
`1001
`
`
`
` ISP B
`TARP
`
`ROUTER
`
`
`
`1011
`
`1012
`
`1013
`
`FIG. 10
`
`
`Cop? provided by USPTO from the PIFIS lmaae Database on 0312812011
`
`Petitioner Apple Inc. - Exhibit 1002, p. 1951
`PXO10_OOOO1 5
`
`VX00056866
`
`Petitioner Apple Inc. - Exhibit 1002, p. 1951
`
`

`

`U.S. Patent
`
`Aug. 26, 2008
`
`Sheet 12 of 40
`
`US 7,418,504 B2
`
`8:
`
`a:
`
`mmmfizmzsmmfimxm
`
`
`
`i$31was:52wa
`
`g:
`
`g:
`
`$3531?
`
`
`
`gummga2553
`
`memIBEEg
`
`3“8mmgamma5”mama:n:9me:”wagon:n:momaom
`
`g335m
`
`:.OE
`
`a:2:a2%:
`
`ii?ESQ:55$n:
`
`fix«a:2age:5.5
`
`
`“Hwy—H“Hm”.mm.mmmmonza:.53
`as:mem2am;25%a
`$2M:leg5:
`
`2.momlmmamg:3:
`331221.;a:
`
`
`
`NE£305;
`
`(g:2”magi$588:
`
`we:
`
`‘.2Eur—252a2«$122n=.53
`
`08:S
`
`Com! provided by USPTO from the PIFIS Image Database on 03/28)?!“ 1
`
`Petitioner A
`PXO10_OOOO1 6
`
`pple Inc. - Exhibit 1002, p. 1952
`
`VX00056867
`
`Petitioner Apple Inc. - Exhibit 1002, p. 1952
`
`
`
`
`
`
`
`
`
`
`
`
`

`

`US. Patent
`
`Aug. 26, 2008
`
`Sheet 13 of 40
`
`US 7,418,504 BZ
`
`
`
`
`
`EE034.51%852%gig":$32
`
`%%%EDm
`
`8am
`
`mmgmom
`
`fig
`
`20:52“;
`
`.1!EXZ.
`
`2%
`
`:2
`
`x8:
`
`N3
`
`EM:
`
`8?: xmofi
`
`<NF
`
`0E
`
`FE
`
`CE.
`
`8“—
`
`HEB.
`
`gang
`
`FREE
`
`a.92mama:
`
`
`
`0w._<“5:2,:m3“."Wei5.:meme
`
`maxmckm
`
`Copy provided by USPTO from the PIHS Image Databasa on 03128l2011
`
`Petitioner A
`PXO10_OOOO17
`
`pple Inc. - Exhibit 1002, p. 1953
`
`VX00056868
`
`Petitioner Apple Inc. - Exhibit 1002, p. 1953
`
`

`

`US. Patent
`
`Aug. 26,2008
`
`Sheet 14 of 40
`
`US 7,418,504 B2
`
`MODE
`OR
`EMBODIMENT
`
`HARDWARE
`ADDRESSES
`
`IF ADDRESSES
`
`DISCRIMINATOR FIELD
`VALUES
`
`SAME FOR ALL MODES
`0R CRafiEIEFJELY
`
`CAN BE VARIED
`IN SYNC
`
`”XE” FOR EACH VP”
`
`
`
`CAN BE VARIED
`IN SYNC
`
`CAN BE VARIED
`EN SYNC
`
`CAN BE VARIED
`IN SYNC
`
`FIG. 1 28
`
`CAN BE VARIED
`
`IN SYNC
`
`
`
`CAN BE VAREED
`IN SYNC
`
`
`
`
`CAN BE VARIED
`IN SYNC
`
`
`
`
`
`
`1. PROMISCUOUS
`
`2. PROMI cuous
`PER3PM
`
`3. HARDWARE
`HOPPING
`
`Copy provided by USPTO trom the PIHS Image Daiahase on 031281201 1
`
`Petitioner Apple Inc. - Exhibit 1002, p. 1954
`PXO10_000018
`
`VX00056869
`
`Petitioner Apple Inc. - Exhibit 1002, p. 1954
`
`

`

`U.S. Patent
`
`Mmm,m.A
`
`0
`
`7..
`
`2B4w
`
`:5
`
`m52.5
`
`82use
`
`52
`
`<:58
`
`$595mm;m=2
`
`as:
`
`m‘02
`
`s,5onn95%
`
`32
`
`
`
`92>”$2528
`
`.o._<wzm
`
`2.:
`
`3.QE
`
`SEED
`
`Be
`
`mama:$58a:
`
`
`
`wmmmonz.53E
`
`“3525
`
`20520sz
`
`magi
`
`2059:22ng
`
`E222:
`
`BEEozm
`
`$321
`
`82
`
`82
`
`Copy provided by USPTD from the PIFIS lmaue Database on 03.231201 1
`
`Petitioner A
`PXO10_OOOO1 9
`
`pple Inc. - Exhibit 1002, p. 1955
`
`VX00056870
`
`Petitioner Apple Inc. - Exhibit 1002, p. 1955
`
`
`
`
`
`
`
`
`
`

`

`US. Patent
`
`Aug. 26, 2008
`
`Sheet 16 of 40
`
`US 7,418,504 B2
`
`TRANSMITTER
`
`IP PAIRI
`IP PAIR2
`
`ckar
`RECEIVER
`
`CURRENT IF PAIR
`
`ckao
`clchn
`
`CURRENT IP PAIR “ —- --
`
`IP FAIR 1
`IP PAIR 2
`
`RECEIVER
`
`SENDER'S ISP
`
`RECIPIENT'S ISP
`
`KEPT IN SYNC FOR SENDER TO RECIPIENT SYNCHRONIZER <- ----------------------- IF
`
`
`
`KEPT IN SYNC FOR RECIPIENT T0 SENDER SYNCHRONIZER <--——--———>
`
`FIG. 14
`
`Copy provlded by LISPTO tram the PIHS [mane Database on 03/28/2011
`
`Petitioner Apple Inc. - Exhibit 1002, p. 1956
`PX01 O_OOO O2 0
`
`VX00056871
`
`Petitioner Apple Inc. - Exhibit 1002, p. 1956
`
`

`

`
`
`US. Patent
`
`Aug. 26, 2008
`
`Sheet 17 of 40
`
`US 7,418,504 B2
`
`@
`
`@ WHEN SYNCHRUNIZATION
`BEGINS TRANSMIT (RETRANSMH'
`SEfiEDEQES'fisEHE‘HEficm’
`TRANSMIWER CHECKPOINT IP
`
`NEW RECEIVER RESPONSE
`CHECKPOINT ckar
`
`# WHEN SYNC_ACK
`ARRIVES WITH INCOMING
`HEADER = ckpt r:
`GENERATE NEW
`CHECKPOINT IP PAIR
`
`SYNC_REO
`
`:
`5
`a
`
`1W
`
`wfifififlggflfifiRficflgies
`
`w
`
`'UPDATE WINDOW
`.GENERATE NEW
`CHECKPOINT IP PAIR
`ckan IN RECEIVER
`
`ckar IN TRANSMITFER
`-TRANSMIT SYNC_ACK
`USING NEW CHECKPOINT
`IP PAIR ckpt_r
`
`ckpt_n iN TRANSMITTER
`
`FIG. 15
`
`
`Copy provided by USPTO from the PIFIS Image Database on 03/28I2011
`
`Petitioner Apple Inc. - Exhibit 1002, p. 1957
`PXO1 0_00002 1
`
`VX00056872
`
`Petitioner Apple Inc. - Exhibit 1002, p. 1957
`
`

`

`US. Patent
`
`Aug. 26, 2008
`
`Sheet 18 of 40
`
`US 7,418,504 B2
`
`
`
`FIG. 16
`
`I
`
`Copy provided by USPTO from the PIRS Image Database on 0312812011
`
`Petitioner Apple Inc. - Exhibit 1002, p. 1958
`PXO1 0_00002 2
`
`VX00056873
`
`Petitioner Apple Inc. - Exhibit 1002, p. 1958
`
`

`

`U.S. Patent
`
`Aug. 26, 2008
`
`Sheet 19 of 40
`
`US 7,418,504 B2
`
`—V
`
`llflflllm
`
`C o
`
`000
`
`Vllll’llllfll INACTIVE
`
`WINDOW_SIZE willllllll‘
`Will/””11
`Willy/[”11
`Winn/[”14
`VIII/III,“
`O
`
`ACTIVE
`USED
`
`fl
`
`WINDOW_SIZE
`
`I
`
`Conv provided by USPTO from the PIFIS lmane Database on camera“
`
`Petitioner Apple Inc.-
`PXO10_000023
`
`Exhibit 1002, p. 1959
`
`VX00056874
`
`Petitioner Apple Inc. - Exhibit 1002, p. 1959
`
`

`

`U.S. Patent
`
`Aug. 26, 2008
`
`Sheet 20 of 40
`
`US 7,418,504 B2
`
`W'NDOW-S'ZE
`
`INACTIVE
`
`fl
`
`USED
`
`WIIIIIIIIIA
`VIII/[”1114
`'IIIIII’IIIIIA
`”nu/[”14
`
`O I
`
`—,
`VIIIIIIIIIIA
`
`I ’
`
`000
`
`WIN DOW‘SIZ‘E
`
`l
`
`Copy provided by USPTO tram the PIES Image Daiahase on 0312812011
`
`Petitioner Apple Inc. - Exhibit 1002, p. 1960
`PXO1 0_00002 4
`
`VX00056875
`
`Petitioner Apple Inc. - Exhibit 1002, p. 1960
`
`

`

`US. Patent
`
`Aug. 26, 2008
`
`Sheet 21 of 40
`
`US 7,418,504 B2
`
`WIIIIIIIIIJ
`
`I I
`
`’Illlll'fllll
`"”01,”
`VIIIIJHIIA
`
`
`
`INACTIVE
`
`ACTIVE
`fl USED
`
`I a
`
`000
`
`O
`
`Wfllllillll
`Vlllflllnll
`”fill/III”
`VIIIIIIIIIIA
`””0”“
`
`000
`
`WINDOW_SIZE
`
`WINDOW_SIZE
`
`VIII/”I’m
`
`FIG. 19
`
`Copy provided by USPTO from the PIFIS Image Database on 03f231'2n11
`
`
`Petitioner Apple Inc. - Exhibit 1002, p. 1961
`PXO1 0_00002 5
`
`VX00056876
`
`Petitioner Apple Inc. - Exhibit 1002, p. 1961
`
`

`

`US. Patent
`
`Aug. 26, 2008
`
`Sheet 22 of 40
`
`US 7,418,504 B2
`
`COMPUTER.
`
`
`
`oncDN
`
`2005
`
`2011 FIG.20
`
`
`Copy provided by USPTO from the PIFIS Image Database on 03i2812011
`
`Petitioner Apple Inc. - Exhibit 1002, p. 1962
`PX01 0_0 0002 6
`
`VX00056877
`
`Petitioner Apple Inc. - Exhibit 1002, p. 1962
`
`

`

`U.S. Patent
`
`Aug. 26, 2008
`
`Sheet 23 of 40
`
`US 7,418,504 B2
`
`
`
`AD TABLE
`
`|P1
`
`IPZ
`
`
`
`
`AE TABLE
`
`AF TABLE
`
`
`
`
`
`
`
`
`
`
`2102
`
`2103
`
`2104
`
`2105
`
`2105
`
`2107
`
`2108
`
`BB TABLE
`
`BE TABLE
`
`BF TABLE
`
`LINK DOWN
`
`2100/
`
`CD TABLE
`
`-
`
`CE TABLE
`
`CF TABLE
`
`
`Copy provided by USPTO from the PIHS Image Database on 03i28f201 1
`
`PX010_000027Petitioner Apple Inc. - Exhibit 1002, p. 1963
`
`VX00056878
`
`Petitioner Apple Inc. - Exhibit 1002, p. 1963
`
`

`

`U.S. Patent
`
`Aug. 26,2008
`
`Sheet 24 of 40
`
`US 7,418,504 B2
`
`
`
`
`MEASURE
`
`QUALITY OF
`
`TRANSMISSION
`PATH X
`
`
`
`
`
`
`
`
`
`MORE THAN
`
`
`ONE TRANSMITTER
`
`
`TURNED 0N?
`
`
`
`
`
`PATH X
`
`
`SET WEIGHT
`TO MIN. VALUE
`QUALITY < THRESHOLD?
`
`
`
`
`PATH X
`WEIGHT LESS THAN
`
`STE‘AELVI'JEEATE
`
`
`
`DECREASE WEIGHT
`
`FOR PATH X
`
`
`
`2203
`
`
`
`
`
`
`INCREASE
`WEIGHT FOR PATH X
`TOWARD STEADY
`STATE VALUE
`
`
`ADJUST WEIGHTS
`FOR REMAINING
`PATHS SO THAT
`WEIGHTS EQUAL ONE
`2205
`
`
`
`
`FIG. 22A
`
`
`Copy provided by USPTO from the PIRS image Database on 031281201 1
`
`Petitioner Apple Inc. - Exhibit 1002, p. 1964
`PX01 O_OOO O2 8
`
`VX00056879
`
`Petitioner Apple Inc. - Exhibit 1002, p. 1964
`
`

`

`US. Patent
`
`Aug. 26, 2008
`
`Sheet 25 of 40
`
`US 7,418,504 B2
`
`
`
`
`
`(EVENT) TRANSMITTER
`FOR PATH X
`TURNS OFF
`
`2210
`
`
`
`
`
`DROP ALL PACKETS
`UNTIL ATRANSMITI'ER
`TURNS ON
`
`
`
`
`
`
`AT LEAST
`ONE TRANSMITTER
`TURNED ON?
`
`
`
`
`
`SET WEIGHT
`TO ZERO
`
`
`ADJUST WEIGHTS
`FOR REMAINING PATHS
`SO THAT WEIGHTS
`EQUAL ONE
`
`
`
`
`FIG. 223
`
`
`copy provided by USPTCI from the PIFIS Image Database on 03I2BI2011
`
`Petitioner Apple Inc. - Exhibit 1002, p. 1965
`PXO1 0_00002 9
`
`VXOOOSGBBO
`
`Petitioner Apple Inc. - Exhibit 1002, p. 1965
`
`

`

`US. Patent
`
`Aug. 26, 2008
`
`Sheet 26 0f 40
`
`US 7,418,504 32
`
`
`
`2308
`\
`
`TRANSMIT TABLE
`2302
`
`
`PACKET
`TRANSMITTER
`
`PATH x1 _
`
`PACKET
`RECEIVER
`
`
`
`
`W (X1) = 0-2
`W(X2)=0.1
`
`
`
`
`
`
`w (x4) = 0.1
`
`2301
`
`
`
`
`WEIGHT
`LINK QUALITY
`
`ADJUSTMENT
`MEASUREMENT
`
`
`FUNCTION
`FUNCTION
`
`
`
`
`FIG. 23
`
`I
`
`Copy provided by USPTO from the PIES Image Dalabase on 03/23J2011
`
`Petitioner Apple Inc. - Exhibit 1002, p. 1966
`PXO1 O_000030
`
`VX00056881
`
`Petitioner Apple Inc. - Exhibit 1002, p. 1966
`
`

`

`U.S. Patent
`
`Aug. 26, 2008
`
`Sheet 27 of 40
`
`US 7,418,504 B2
`
`2402
`
`COMPUTER
`
`75mm MESST=24
`
`COMPUTER
`
`1
`
`Copy provided by USPTO irom the PIFIS Image Dalahase on 0:3!2812011
`
`Petitioner Apple Inc. - Exhibit 1002, p. 1967
`PX010_000031
`
`VX00056882
`
`Petitioner Apple Inc. - Exhibit 1002, p. 1967
`
`

`

`U.S. Patent
`
`Aug. 26, 2008
`
`Sheet 28 01'40
`
`US 7,418,504 B2
`
`2502
`
`
`
`
`
`
`PAGE RESP
`
`
`DNS REQ
`
`DNS RESP
`
`‘ WEB
`BROWSER
`
`PAGE REQ
`
`FIG. 25
`(PRIOR ART)
`
`'MW
`.1
`Copy provided by USPTO from the PIRS Image Database on 031281201 1
`
`Petitioner Apple Inc. - Exhibit 1002, p. 1968
`PX010_000032
`
`VX00056883
`
`Petitioner Apple Inc. - Exhibit 1002, p. 1968
`
`

`

`US. Patent
`
`Aug. 26,2008
`
`Sheet 29 of 40
`
`US 7,418,504 132
`
`2602
`I SERVER
`
`
`
`
`DNS
`
`
`
`'
`
`DNS
`PROXY
`
` WEB
`
`BROWSER
`
`
`
`
`
`
`HOPPING
`RULES
`
`GATE KEEPER
`
`2603
`
`
`
`UNSECURE
`TARGET
`SITE
`
`2611
`
`FIG. 26
`
`Copy provided by USPTO from the PIFIS Image Database on 03i281201 1
`
`Petitioner Apple Inc. - Exhibit 1002, p. 1969
`PXO10_OOOO33
`
`VX00056884
`
`Petitioner Apple Inc. - Exhibit 1002, p. 1969
`
`

`

`US. Patent
`
`Aug. 26, 2003
`
`Sheet 30 of 40
`
`US 7,418,504 B2
`
`
` RECEIVE
`
`DNS REQUEST
`FOR TARGET SITE
`
`2701
`
`
`
`
`
`
`
`PASS THRU
`ACCESS TO
`
`REQUEST TO
`SECURE SITE
`
`DNS SERVER
`REQUESTED?
`
`
`
`
`
`
`
`USER
`AUTHORIZED TO
`CONNECT?
`
`
`
`
`
`RETURN
`
`"HOST UNKNOWN"
`ERROR
`
`
`2705
`
`
`
`ESTABLISH
`VPN WITH
`TARGET SITE
`
`
`FIG. 27
`
`
`Copy provided by USPTO from than PIFIS Image Database on 03.?28/2011
`
`Petitioner Apple Inc. - Exhibit 1002, p. 1970
`PXO10_000034
`
`VX00056885
`
`Petitioner Apple Inc. - Exhibit 1002, p. 1970
`
`

`

`U.S. Patent
`
`Aug. 26, 2008
`
`Sheet 31 of40
`
`US 7,418,504 32
`
`2803
`
`2301
`
`HOST
`COMPUTER#1
`
`
`
`
`HIGH SW
`
`2804
`
`HOST
`COMPUTER #2
`
`FIG. 28
`
`WW
`Copy provided by USPTO from the PIHS Image Database on 0312312011
`
`Petitioner Apple Inc. - Exhibit 1002, p. 1971
`PX01 0_000035
`
`VX00056886
`
`Petitioner Apple Inc. - Exhibit 1002, p. 1971
`
`

`

`US. Patent
`
`Aug. 26, 2008
`
`Sheet 32 of 40
`
`US 7,418,504 B2
`
`
`HOST COMPUTER #1
`
`
` TX
`
`
`
`
`2913 291 2
`
`
`
`2903
`
`COMPUTER
`
`FLOOD IP
`TX 100-200
`
`FIG. 29
`
`Copy provided by USPTO {tom the PIT-IS Image Database on 03282011
`
`Petitioner Apple Inc. - Exhibit 1002, p. 1972
`PXO10_000036
`
`VX00056887
`
`Petitioner Apple Inc. - Exhibit 1002, p. 1972
`
`

`

`U.S. Patent
`
`Aug. 26, 2008
`
`Sheet 33 of 40
`
`US 7,418,504 B2
`
`330%
`
`8523=Eu
`
`“Ego
`
`8525
`
`SE:5.
`
`EEEmEE.
`
`mzmomm
`
`31.025
`
`Eamumm
`
`om.oE
`
`Emaa
`
`azoamwaE5
`
`5%wémzmo
`
`Copy provided by USPTO from the PIRS Image Database on 0312812011
`
`Petitioner A
`PXO10_000037
`
`pple Inc. - Exhibit 1002, p. 1973
`
`VX00056888
`
`Petitioner Apple Inc. - Exhibit 1002, p. 1973
`
`
`

`

`US. Patent
`
`Aug. 26, 2008
`
`Sheet 34 of 40
`
`US 7,418,504 32
`
`3103
`
`
`CLIENT #1
`
`
`3106
`
`
`
`
`CLIENT #2
`
`
`
` 3208
`3209
`3210
`
`
`3105
`
`HACKER
`
`FIG. 31
`
`Copy provided by USPTO from he PIRS Imaae Database on 0:3!2812011
`
`Petitioner Apple Inc. - Exhibit 1002, p. 1974
`PX010_000038
`
`VX00056889
`
`Petitioner Apple Inc. - Exhibit 1002, p. 1974
`
`

`

`U.S. Patent
`
`Aug. 26, 2008
`
`Sheet 35 of40
`
`US 7,418,504 B2
`
`CLIENT
`\
`
`SEND DATA PACKET
`
`USING ckan
`CKPT_0=cka_n
`GENERATE NEW ckan
`ELART TIMER, SHUTTRANSMITTER
`
`IF CKPT‘O IN SYNC_ACK
`MATCHES TRANSMITTER‘S
`
`.
`ckao
`UPDATE RECEIVERS
`ckar
`KILL TIMER. TURN
`TRANSMITTER 0N T
`
`SEND DATA PACKET
`USING ckpt_n
`NIpLo=chJLn
`GENERATE NEW ckan
`START TIMER. SHUTTRANSMITTER
`
`WHEN TIMER EXPIRES
`TRANSMIT SYNC_REQ
`USING TRANSMITTERS
`ckpt a START TIMER
`"
`
`IF ckao IN swam:
`MATCHES mmmms
`
`0ka 0
`UPDATE RECEIVERS
`
`ckar
`KILLTIMER. TURN
`TRANSMTTTER 0N
`
`SERVER
`\
`
`PASS DATA UP STACK
`cka_o=ckpl_n
`GENERATE NEW ckan
`GENERATE NEW ckar FOR
`TRANSMITTER SIDE
`TRANSMIT SYNC_ACK
`CONTAINING ckao
`
`
`
`dTpt_u=ckpt_n
`GENERATE NEW ckan
`GENERATE NEW ckar FOR
`TRANSMITTER SIDE
`TRANSMIT SYNCJICK
`CONTAINING thLo
`
`SYNG_REQ
`
`FIG. 32
`
`
`copy provided by USPTO from the PIFIS Image Database on 032812011
`
`Petitioner Apple Inc. - Exhibit 1002, p. 1975
`PXO10_OOOO39
`
`VX00056890
`
`Petitioner Apple Inc. - Exhibit 1002, p. 1975
`
`

`

`U.S. Patent
`
`5
`
`2
`
`mu.............HMmasua"2mmmmuman"mm.”
`an”mmmA“28m.“mu............in25::32.
`.pgamma
`
`m225285%is7EE$55a"I,.sas$.52U=222%;.
`MamE$3anin22mm.GE
`
`mEmma
`
`
`
`om%mgDmy&massm
`
`m
`
`asm
`
`Petitioner A
`PXO1 0_OOOO4O
`
`pple Inc. - Exhibit 1002, p. 1976
`
`VX00056891
`
`3%m
`
`
`an
`
`’r
`
`[Ixas
`fig/$395
`
`Petitioner Apple Inc. - Exhibit 1002, p. 1976
`
`
`
`

`

`US. Patent
`
`Aug. 26, 2008
`
`Sheet 37 of 40
`
`US 7,418,504 B2
`
`340\oK
`
`3401
`
` DISPLAY WEB PAGE
`
`CONTAINING GO
`SECURE HYPERLINK
`
`I
`
`
`
`LAUNCH LINK TO
`.COM SITE
`
`DOWNLOADAND
`INSTALL PLUG-IN
`
`CLOSE CONNECTION
`
`3404
`
`3405
`
`3406
`
` S
`
`AI’SNII’ITIIIIRIEPIII‘TIIEIIEEcIJR‘IfTEITEEv‘EEL
`‘
`DOMAIN NAME
`..
`
`3407
`
`3412
`
`.
`
`D|SPLAY SECURE ICON
`
` N0- CONNECTION
`
`
`ACCESS SECURE PORTALAND
`SECURE NETWORKAND SECURE DNS
`
`34%
`
`_
`
`TERMINATE
`SECURE
`
`3413
`
`'
`
`CSlADIg Sfiulgg COMFlgER NETWORK
`RE
`RSEC” EWEB SITE
`
`ACCESS GATE KEEPER AND RECEIVE
`PARAMETERS FOR ESTABLISHING VPN
`W“ SECURE WEBS'TE
`
`3409
`
`3410
`
`3414
`
`3415
`
`YES
`REPLACE SECURE TOP-LEVEL
`DOMAIN NAME WITH NON-SECURE
`TOP—LEVELDOMAIN NAME
`
`7
`
`DISPLAY "GO SECURE“ HYPERLINK
`
`CONNECT T0 SECURE WEBSITE
`USING VPN BASED ON PARAMETERS m
`ESTABLISHED av GATE KEEPER
`3411
`
`FIG. 34
`
`Copy provided by USPTO from the PIHS Image Database on 03128i2011
`
`Petitioner Apple Inc. - Exhibit 1002, p. 1977
`PXO1 o_000041
`
`VX00056892
`
`Petitioner Apple Inc. - Exhibit 1002, p. 1977
`
`

`

`US. Patent
`
`Aug. 26, 2008
`
`Sheet 33 of 40
`
`US 7,41 8,504 B2
`
`3500
`
`
`
`
`REQUESTOR ACCESSES WEBSITE
`AND LOGS INTO SECURE
`DOMAIN NAME REGISTRY SERVICE
`
`3501
`
`REQUESTER COMPLETES ONLINE
`REGISTRATION FORM
`
`
`
`
`
`QUERY STANDARD DOMAIN NAME
`SERVICE REGARDING OWNERSHIP
`OF EQUIVALENT NON-SECURE
`DOMAIN NAME
`
`RECEIVE REPLY FROM STANDARD
`DOMAIN NAME REGISTRY
`
`3505
`
`NO
`
`VERIFY INFORMATION AND
`ENTER PAYMENT INFORMATION
`
`350T
`
`
`
`
`INFORM REQUESTOR
`OF CONFLICT
`
`3506
`
`
`
`
`
`
`REGISTER SECURE DOMAIN NAME
`
`
`
`3508
`
`FIG. 35
`
`l
`
`Copy provided by USPTO from the PIRS Image Database on 0312812011
`
`Petitioner Apple Inc. - Exhibit 1002, p. 1978
`PXO1 0_000042
`
`VX00056893
`
`Petitioner Apple Inc. - Exhibit 1002, p. 1978
`
`

`

`US. Patent
`
`Aug. 26, 2008
`
`Sheet 39 of 40
`
`US 7,418,504 B2
`
`
`
`
`WEB SERVER
`
`SERVER PROXY
`
`3611
`
`
`3610
`
`VPN GUARD
`
`COMPUTER NETWORK
`
`3602
`
`FIREWALL
`
`3603
`
`3600
`
`3605
`
`3505
`
`
`
`
`
`3607
`
`36
`
`04
`
`CLIENT COMPUTER
`
`FIG. 36
`
` L
`
`Copy provided by USPTO from the PIFIS Image Database on 0328112011
`
`Petitioner Apple Inc. - Exhibit 1002, p. 1979
`PXO10_000043
`
`VX00056894
`
`Petitioner Apple Inc. - Exhibit 1002, p. 1979
`
`

`

`US. Patent
`
`Aug. 26, 2008
`
`Sheet 40 of 40
`
`US 7,418,504 B2
`
`3700
`
`GENERATE MESSAGE PACKETS
`
`3701
`
`MODIFY MESSAGE PACKETS WITH PRIVATE
`CONNECTION DATA AT AN APPLICATION LAYER
`
`'
`
`3702
`
`SEND TO HOST COMPUTER
`THROUGH FIREWALL
`
`RECEIVE PACKETS AND AUTHENTICATE
`AT KERNEL LAYER OF HOST COMPUTER
`
`RESPOND TO RECEIVED MESSAGE
`PACKETS AND GENERATE REPLY
`MESSAGE PACKETS
`
`MODIFY REPLY MESSAGE PACKETS WITH
`PRIVATE CONNECTION DATA AT A
`KERNEL LAYER
`
`SEND PACKETS TO CLIENT COMPUTER
`THROUGH FIREWIRE
`
`RECEIVE PACKETS AT CLIENT
`COMPUTER AND AUTHENTICATE AT
`APPLICATION LAYER
`
`FIG. 37
`
`3703
`
`3704
`
`3705
`
`3706
`
`3707
`
`3708
`
`I\—__——_———___—_________,_____
`Copy provided by USPTO from he PIRS Image Database on 03:2312011
`
`Petitioner Apple Inc. - Exhibit 1002, p. 1980
`PXO10_OOOO44
`
`VX00056895
`
`Petitioner Apple Inc. - Exhibit 1002, p. 1980
`
`

`

`US 7,413,504 132
`
`1
`AGILE NETWORK PROTOCOL FOR SECURE
`CODINIUNICATIONS USING SECURE
`DOMAIN NANIES
`
`CROSS—REFERENCE TO RELATED
`APPLICATIONS
`
`This application claims priority from and is a continuation
`patent application of US. application Ser. No. 09/558,210,
`filed Apr. 26, 2000 now abandoneed, which is a continuation-
`in-part patent application ofpreviously-filed U.S. application
`Ser. No. ($504,783, filed on Feb. 1 5, 2000, nowU.S. Pat. No.
`6,502,135, issued Dec. 3 1, 2002, which claims priority from
`and is a continuation-in-part patent application ofpreviously-
`filed US. application Ser. No. 09/429,643, filed on Oct. 29,
`1999 now U.S. Pat. No . 7,01 0, 604. The subject matter ofU.S.
`application Ser. No. 09/429,643 , which is bodily incorporated
`herein, derives from provisional U.5. application Nos.
`60/106,261 (filed Oct. 30, 1 998) and 602’] 37,704 (filed Jun. 7,
`1999). The present application is also related to U.S. appli-
`cation Ser. No. 09/558,209, filchpr. 26, 2000, and which is
`incorporated by reference herein.
`
`GOVERNLiENT‘ CONTRACT RIGHTS
`
`This invention was made with Government support under
`Contract No. 360000-1 999-000000-QC-000-000 awarded by
`the Central IntelligenccAgency. The Government has certain
`rights in the invention.
`
`BACKGROUND OF THE INVENTION
`
`A tremendous variety of methods have been proposed and
`implemented to provide security and anonymity for commu-
`nications overthe Internet. The variety stems, in part, from the
`different needs of different Internet users. A basic heuristic
`framework to aid in discussing these difi‘erent security tech-
`niques is illustrated in FIG. 1 . Two terminals, an originating
`tenmna] 100 and a destination terminal 110 are in communi-
`cation over the Internet. It is desired for the communications
`to be secure, that is, immune to eavesdropping. For example,
`terminal 100 may transmit secret information to terminal 110
`over the Internet 107. Also, it may be desired to prevent an
`eavesdropper from discovering that terminal 100 is in com-
`munication with terminal 110. For example, ifterminal 100 is
`a user and terminal 110 hosts a web site, terminal 100's user
`may not want anyone in the intervening networks to know
`what web sites he is “visiting.” Anonymity would thus he an
`issue, for example, for companies that want to keep their
`market research interests private and thus would prefer to
`prevent outsiders from knowing which web-sites or other
`Internet resources they are “visiting." These two security
`issues may be called data security and anonymity, respec-
`tivcly.
`Data security is usually tackled using some form of data
`encryption. An encryption key 48 is known at both the origi-
`nating and terminating terminals 100 and 110. The keys may
`be private and public at the originating and destination termi—
`nals 100 and 110, respectively or they may be synunctrical
`keys (the same key is used by both parties to encrypt and
`decrypt). Many encryption methods are known andusable in
`this context.
`To hide traffic from a local administrator or 15?, a user can
`employ a local proxy server in communicating over an
`encrypted channel with an outside proxy such that the local
`administrator or ISP only sees the encrypted tmfiic. Proxy
`servers prevent destination servers from determining the
`
`10
`
`15
`
`20
`
`25
`
`30
`
`35
`
`40
`
`45
`
`50
`
`55
`
`60
`
`65
`
`2
`identities of the originating clients. This system employs an
`intermediate server interposed between client and destination
`server. The destination server sees only the Internet Protocol
`(IP) address ofthe proxy server and not the originating client.
`The target server only sees the address of the outside proxy.
`This scheme relies on a trusted outside proxy server. Also,
`proxy schemes are vulnerable to traflic analysis methods of
`detemiining identities of transmitters and receivers. Another
`important limitation ofproxy servers is that the server knows
`the identities of both calling and called parties. In many
`instances, an originating terminal, such as terminal A, would
`prefer to keep its identity concealed from the proxy, for
`example, ifthe proxy server is provided by an Internet service
`provider (ISP).
`To defeat traffic analysis, a scheme called Chaum's mixes
`employs a proxy server that transmits and receives fixed
`lengthmessages, including dummy messages. Multiple origi-
`nating terminals are connected through a mix (a server) to
`multiple target servers. It is diflicult to tell which of the
`originating terminals are communicating to which ofthe con-
`nected target servers, and the dummy messages confuse
`eavesdroppers’ efforts to detect communicating pairs by ana-
`lyzing traffic. A drawback is that there is a risk that the mix
`server could be compromised. One way to deal with this risk
`is to spread the trust among multiple mixes. If one mix is
`compromised, the identifies of the originating and target ter—
`minals may remain concealed. This strategy requires a num-
`ber of alternative mixes so that the intermediate servers inter-
`posed between the originating and target terminals are not
`determinable except by compromising more than one mix.
`The strategy wraps the message with multiple layers of
`encrypted addresses. The first mix in a sequence can decrypt
`only the outer layer of the message to reveal the next'desti-
`nation mix in sequence. The second mix can decrypt the
`message to reveal the next mix and so on. The target server
`receives the message and, optionally, a multi—layer encrypted
`payload coniaining return information to send data back in
`the same fashion. The only way to defeat such a mix scheme
`is to collude among mixes. If the packets are all fixed—length
`and intermixed with dummy packets, there is no way to do
`any kind of traffic analysis.
`Still another anonymity technique, called ‘crowds,’ pro-
`tects the identity of the originating terminal from the inter-
`mediate proxies by providing that originating terminals
`belongto groups ofproxies called crowds. The crowd proxies
`are interposed between originating and target terminals. Each
`proxy through which the message is sent is randomly chosen
`by an upstream proxy. Each intermediate proxy can send the
`message either to another randomly chosen proxy in the
`“crowd" or to the destination. Thus, even crowd members
`cannot determine ifu preceding proxy is the originator ofthe
`message or if it was simply passed from another proxy.
`ZKS (Zero-Knowledge Systems) Anonymous ll? Protocol
`allows users to select up to any of five different pseudonyms,
`while desktop software encrypts outgoing traffic and wraps it
`in User Datagram Protocol (UDP) packets. The first server in
`'a 2+—hop system gets the UDP packets, strips off one layer of
`encryption to add another, then sends the traffic to the next
`server, which strips off yet another layer of encryption and
`adds a new one. The user is permitted to control the number of
`hops. At the final server, traffic is decrypted with an min-ace-
`able IP address. The technique is called onion-routing. This
`method can be defeated using trafl'ic analysis. For a simple
`example, bursts ofpackets fro m. a user during low-duty peri-
`ods can reveal the identities of sender and receiver.
`Firewalls attempt to protect LANs from unauthorized
`access and hostile exploitation or damage to computers con-
`
`Conv provided by USPTO from the PIHS Image Database on 03/232011
`
`Petitioner Apple Inc. - Exhibit 1002, p. 1981
`PX010_000045
`
`VX00056896
`
`Petitioner Apple Inc. - Exhibit 1002, p. 1981
`
`

`

`US 7,418,504 BQ
`
`3
`nected to the LAN. Firewalls provide a server through which
`all access to the LAN must pass. Firewalls are centralized
`systems that require administrative overhead to maintain.
`They can be compromised by virtual-machine applications
`(“applets”). They instill a false sense ofsecurity that leads to
`security breaches for example by users sending sensitive
`information to servers outside the firewall or encou

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket