`
`The following three steps are identical to standard WinScck communications
`steps described above; however. nested inside them are additional actions and
`options introduced by Aventail Connect.
`
`218.
`
`I explain each of these steps in detail below, but first provide a
`
`flowchart that I prepared illustrating these steps:
`
`Client wishes to establish
`cornrnunicat on channel with
`destiraticn
`
`Does client know
`hostnarne or IP
`address?
`
`Send DNS lockup
`lntercepted by Aventai
`
`Connect: IS hostname on
` Local Lcokup table7
`request to TCPIIP
`
`stack
`
`
`
`
`
`
`
`Retum IP address
`from local lockup
`
`
`.
`IP Address
`Perform conventional
`
`DNS lockup,
`
`returning lP address
`
`
`Yes
`
`Create and return
`“false” DNS entry
`
`
`match redirection
`
`rLIe.7
`
`
`
`Request connection, using
`lP address
`
`Create and return
`“false" DNS entry
`
`Ye
`
`
`
`
`
`
`
`
`Send hostname to Aventail
`E><traNet server for resolufi on
`
`
`
`Establish VPN connection
`
`via Aventail ExtraNet
`Server to access resource
`
`
`
`
`No
`
`Does address match
`redirection rule?
`
`
`
`‘
`
`
`
`Conventional TCP/IP
`
`stackwill ha-idle creating
`connection and
`communications
`
`
`
`O
`
`Page 1 of 2
`
`VIRNETX EXHIBIT 2014
`
`Apple v. VirnetX
`Trial lPR2015-00810,-00811, -oos12
`
`89
`
`Petitioner Apple Inc. - Exhibit 1005
`
`VIRNETX EXHIBIT 2021
`
`Apple V. VimetX
`Trial IPR2015-00871
`
`intercepted by Aventail
`Connect:
`
`“false" address
`
`
`VIRNETX EXHIBIT 2021
`Apple v. VirnetX
`Trial IPR2015-00871
`
`Page 1 of 2
`
`
`
`Petition for Inter Partes Review of U.S. Patent Nos. 8,868,705 and 8,850,009
`
`Ex. 1009 (ACAG) at 9.
`
`215. Because the Aventail Connect software sits between the application
`
`running on the computer and the TCP/IP stack, Aventail Connect can evaluate,
`
`route, and encrypt any communications that make use of TCP/IP. See Ex. 1009
`
`(ACAG) at 10:
`
`When the Aventail Connect LSP receives a connection request, it determines
`whether or not the connection needs to be redirected (to an Aventail ExtraNet
`Server) and/or encrypted (in SSL).
`
`216. Aventail Connect can therefore work with (any application running on
`
`Windows that makes use of the TCP/IP protocol, such as web browsers and email
`
`programs. See, e. g., Ex. 1009 (ACAG) at 8:
`
`Windows TCP/1P networking applications (such as telnet, e-mail, Web browsers,
`and ftp) use Winsock (Windows Sockets) to gain access to networks or the
`Internet. Winsock is the core component of TCP/IP under Windows, and is the
`interface that most Windows applications use to communicate to TCPIIP.
`
`See also Ex. 1031 gWindows NT for Dummies) at 14.
`
`217. As Aventail explains, the same three basic steps described above are
`
`still performed when Aventail Connect is running, but Aventail Connect modifies
`
`each of these steps in order to proxy certain network traffic to computers on a
`
`private network through the Aventail Extranet Server. See Ex. 1009 (ACAG) at
`
`11:
`
`Petitioner Apple Inc. — Exhibit 1005
`
`Page 2 of 2