throbber
US007287271B1
`
`(12) United States Patent
`Riggins
`
`(10) Patent N0.:
`(45) Date of Patent:
`
`US 7,287,271 B1
`*Oct. 23, 2007
`
`(54) SYSTEM AND METHOD FOR ENABLING
`SECURE ACCESS TO SERVICES IN A
`COMPUTER NETWORK
`
`75
`(
`)
`
`_
`-
`-
`Inventor. Mark D. Riggins, San Jose, CA (US)
`
`9/1992 Chan
`5,150,407 A
`6/1993 Parker ....................... .. 380/21
`5,220,603 A *
`5,263,157 A 11/1993 Janis ........................ .. 395/600
`5,265,159 A 11/1993 Kung
`5,333,266 A
`7/1994 BoaZ et a1.
`5,388,255 A
`21995 Py?ik et a1‘
`
`.
`.
`.
`(73) Asslgnee: V‘st" corporatlon’ Redwood Shores’
`CA (Us)
`
`5,392,390 A
`5,420,927 A
`5,425,102 A
`
`2/1995 C '
`5/1995
`6/1995 Moy
`
`....................... .. 380/23
`
`( * ) Notice:
`
`Subject to any disclaimer, the term of this
`patent is extended or adjusted under 35
`U.S.C. 154(b) by 0 days.
`
`(Continued)
`FOREIGN PATENT DOCUMENTS
`
`_
`
`_
`
`_
`
`Th1s patent 1s 511131601 to a termmal d1s
`claimer.
`
`_
`
`_
`
`CA
`
`2191505
`
`6/1997
`
`(Continued)
`OTHER PUBLICATIONS
`
`Article by Bellovin et al., entitled: “Network Firewalls” Published
`by IEEE Communications Magazine Sep. 1994, pp. 50-57.
`(Continued)
`Primary ExamineriT. B. Truong
`(74) Attorney, Agent, or F irmiManatt, Phelps & Phillips
`
`(57)
`
`ABSTRACT
`
`A global server includes a communications engine for
`establishing a communications link with a client; security
`means coupled to the communications engine for determin
`ing client privileges; a servlet host engine coupled to the
`security means for providing to the client, based on the client
`privileges, an applet which enables 1/0 with a secured
`service; and a keysafe for storing a key which enables access
`to the secured service. The global server may be coupled to
`multiple sites, wherein each site provides multiple services.
`Each site may be protected by a ?rewall. Accordingly, the
`global server stores the keys for enabling communication via
`the ?rewalls with the services.
`
`25 Claims, 8 Drawing Sheets
`
`100 f
`
`K118
`
`Company
`108a\
`sewer f110a r1141;
`
`(21) Appl. No.2 08/841,950
`
`(22) Filed:
`
`Apr. 8, 1997
`
`(51) Int. Cl.
`(2006.01)
`H04L 9/00
`(52) US. Cl. .......................... .. 726/3; 705/64; 713/168;
`15/749
`(58) Field of Classi?cation Search .......... .. 380/23i25,
`380/49, 255; 713/200, 201, 202, 161, 166;
`709/203, 229,201, 223, 225; 726/341, 11;
`705/50, 64, 67, 78
`See application ?le for complete search history.
`
`(56)
`
`References Cited
`
`U.S. PATENT DOCUMENTS
`
`3/1987 Hale et a1. .................. .. 380/24
`4,652,698 A
`4,714,995 A 12/1987 Materna et a1.
`4,817,050 A *
`3/1989 Komatsu et a1. ............ .. 707/10
`4,831,582 A
`5/1989 Miller et a1. .............. .. 364/900
`4,882,752 A 11/1989 Lindman et a1.
`4,897,781 A
`1/1990 Chang ...................... .. 364/200
`4,916,738 A
`4/1990 Chandra et a1.
`5,048,085 A
`9/1991 Abraham et a1. ........... .. 380/23
`
`Company
`\ 114agl
`
`Client
`
`112
`
`116
`
`K135
`Kiosk
`
`114d
`
`1149
`
`VMware Exhibit 1010 Page 1
`
`

`
`US 7,287,271 B1
`Page 2
`
`US. PATENT DOCUMENTS
`
`- 340/82531
`
`7/1995 Kung et al. ................. .. 380/25
`5,434,918 A
`1/1996 Rosenow et al.
`380/25
`5,483,596 A *
`2/1996 Kaufman et al. .
`380/30
`5,491,752 A
`2/1996 Linehan . . . . . . . . .
`. . . .. 380/21
`5,495,533 A
`4/1996 Pile er a1
`5,510,777 A *
`8/1996 Konrad
`5544320 A
`8/1996 Cheng et al. ........ .. 395/200.12
`5,544,322 A
`5,572,643 A 11/1996 Judson ----- -
`395/793
`5,581,749 A 12/1996 Hossain et al. ........... .. 395/600
`5,588,132 A 12/1996 CardoZa
`5,604,788 A
`2/1997 Te“
`5,613,012 A
`3/1997 Hoffman et al. .......... .. 382/115
`5,623,601 A
`4/1997 Vu ................. ..
`395/187.01
`5,627,658 A
`5/ 1997 Connors er a1- ---------- -- 358/407
`5627997 A
`5/1997 Pearson er 91-
`5,632,011 A
`5/1997 Land?eld et al.
`5,634,053 A
`5/1997 Noble er 91-
`...... .. 348/13
`5,644,354 A
`7/1997 Thompson et a1.
`5,647,002 A
`7/1997 Brunson .................... .. 380/49
`5,652,884 A
`7/1997 Palevich
`5,657,390 A *
`8/1997 Elgamal et al. ............. .. 380/49
`5664207 A
`9/ 1997 crumpler er 91-
`5,666,530 A
`9/1997 Clark et al. ............... .. 395/617
`5,666,553 A
`9/1997 CroZier ........ ..
`395/803
`5,675,782 A * 10/1997 Montague et al. ........ .. 395/609
`5,678,039 A 10/1997 Hinks er 91-
`5680542 A 10/1997 Mulchandani
`5,682,478 A * 10/1997 Watson et al. ........ .. 713/201 X
`5,682,524 A 10/1997 Freund et al. ............ .. 395/605
`5,684,951 A 11/1997 Goldman eta1~
`5684984 A 11/1997 1911989191
`5,684,990 A 11/1997 Boothby ................... .. 707/203
`5,687,322 A 11/1997 Deaton et al.
`5,701,400 A 12/1997 Amado
`395/335
`5,701,423 A 12/1997 CroZier
`395/187.01
`5,706,427 A
`1/1998 Tabuki ..... ..
`5,706,502 A
`1/1998 Foley et al. .............. .. 395/610
`5,710,922 A
`V1998 Alley er 91-
`5,713,019 A
`V1998 Keaten
`5,715,403 A
`2/1998 Ste?k ....................... .. 395/244
`5,717,925 A
`2/1998 Harperet 91-
`5,721,779 A
`2/1998 Funk ......................... .. 380/23
`5,727,202 A
`3/1998 Kucala
`5,729,735 A
`3/1998 Meyering
`5,742,668 A
`4/1998 Pepe eta1~
`5752059 A
`5/1998 Hollemn er 91-
`5752246 A
`5/1998 Rogers eta1~
`5,754,830 A
`5/1998 Butts et al. ............... .. 395/500
`5,757,916 A
`5/1998 MacDoran et al.
`...... .. 380/25
`5,758,150 A
`5/1998 Bell 9M1‘
`5,758,354 A
`5/1998 Huang et 91-
`5758355 A
`5/1998 Buchanan
`5,764,902 A
`6/1998 Rothrock
`5,765,171 A
`6/1998 Gehani et al.
`5,768,510 A
`6/1998 Gish ................... .. 395/200.33
`5,778,346 A
`7/1998 Frid-Nielsen et al. ..... .. 395/208
`5,784,463 A *
`7/1998 Chen et al. ........ ..
`380/21
`5,784,464 A *
`7/1998 Akiyama et al. ........... .. 380/25
`5,787,172 A
`7/1998 Arnold ...................... .. 380/21
`5,787,441 A
`7/1998 Beckhardt et al.
`5790974 A
`8/1998 Tognazzini
`5,794,252 A
`8/1998 Bailey et al.
`5,799,086 A
`8/1998 Sudia ........................ .. 380/23
`5,802,530 A
`9/1998 Van Holf .................. .. 707/513
`5,812,398 A
`9/1998 Nielsen
`5,812,668 A
`9/1998 Weber ....................... .. 380/24
`5,812,773 A
`9/1998 Norin
`5,815,683 A
`9/1998 Vogler ...................... .. 395/500
`5,818,935 A * 10/1998 Maa ......................... .. 380/200
`5,828,840 A * 10/1998 CoWan et al. ............ .. 709/203
`5,832,483 A 11/1998 Barker
`
`5,835,087 A 11/1998 Herz et a1.
`5,835,601 A 11/1998 Shimbo et al.
`5,845,282 A 12/199g Alley et a1‘
`5,857,201 A
`1/1999 Wright, Jr‘ et a1‘
`5,862,325 A
`1/1999 Reed et a1‘
`5,862,346 A
`V1999 Kley et 31‘
`
`2/1999 cnnis ................. .. 395/187.01
`5,870,544 A
`2/1999 Bauer et a1.
`5,870,759 A
`2/1999 Bauer et 31‘
`5,870,765 A
`2/1999 Boyle et a1. .............. .. 713/151
`5,872,847 A
`3/1999 Weber et 31‘
`5,878,230 A
`6/1999 Van RyZin
`5,909,689 A
`7/1999 Ahmed etal.
`5,924,103 A
`7/1999 Clark et a1‘
`5928329 A
`8/1999 Boothby
`5,943,676 A
`9/1999 Ingrassia et al. .......... .. 709/248
`5,951,652 A
`5,961,590 A 10/1999 Mendez etal.
`5,966,714 A 10/1999 Huang et 31‘
`5,968,131 A 10/1999 Mendez etal.
`5974238 A 10/1999 Chase, Jr‘
`5,982,898 A 11/1999
`5,987,609 A 11/1999 Hasebe
`5999932 A 12/1999 Paul
`5,999,947 A 12/1999 Zollinger et al. ......... .. 707/203
`6,006,017 A 12/1999 Joshi et 31‘
`6,020,885 A
`2/2()()() Honda
`6,021,427 A
`2/2000 Spagna et a1‘
`6,023,700 A
`2/2000 Owens etal.
`6,023,708 A
`2/2000 Mendez etal.
`6,034,621 A
`3/2000 Kaufman
`6,052,735 A
`4/2000 Ulrich et a1‘
`6,073,165 A
`6/2000 Narasirnhan et al.
`6,088,451 A
`7/2000 He etal. ..................... .. 726/8
`6,094,477 A
`7/2()()() Nada et 31‘
`6,108,691 A
`8/2000 Lee et 31‘
`6,108,709 A
`8/2000 Shinornura etal.
`6,118,856 A
`9/2000 Paarsmarkt et 31‘
`6,125,281 A
`9/2000 Wells et 31‘
`6,131,096 A 10/2000 Ng et 31‘
`6,131,116 A 10/2000 Riggins et a1.
`6,138,146 A 10/2000 Moon et a1.
`6,151,606 A U/ZOOO Mendez
`6,154,844 A 11/2000 Touboul etal.
`6,169,986 B1
`1/2001 Bowman et 31‘
`6,182,118 B1
`1/2001 Finney etal.
`6,212,529 B1
`4/2001 Boothby et a1.
`6,249,805 B1
`6/2001 Fleming
`6,295,541 B1
`9/2001 Bodnar etal.
`6,304,881 B1
`10/2001 Halim etal.
`6,311,186 B1
`10/2001 MeLampy et 31‘
`6,324,542 B1
`11/2001 Wright, Jr‘ et a1‘
`6,334,140 B1
`12/2001 Kawamata
`6,343,313 B1
`1/2002 Salesky et al.
`6,389,455 B1
`5/2002 Fuisz
`6,438,583 B1
`8/2002 McDowelletal.
`6,446,090 B1
`9/2002 Hart
`6,477,545 B1
`11/2002 LaRue
`6,510,455 B1
`1/2003 Chen et a1‘
`6,564,218 B1
`5/2003 Roth
`6,631,416 B2 10/2003 Bendinelli et 31‘
`6,697,942 B1
`2/2004 L’HeureuX et 31‘
`
`FOREIGN PATENT DOCUMENTS
`
`CA
`EP
`EP
`EP
`JP
`W0
`W0
`W0
`W0
`
`2210763
`0684558
`0801478
`0820028
`02000003314
`WO 96/17306
`WO 97/04389
`WO 97/24678
`WO 97/35265
`
`1/1999
`11/1995
`10/1997
`1/1998
`1/2000
`6/1996
`2/1997
`7/1997
`9/1997
`
`VMware Exhibit 1010 Page 2
`
`

`
`US 7,287,271 B1
`Page 3
`
`W0
`WO
`W0
`WO
`WO
`
`WO 99/05620
`99/45451
`WO 00/22543
`2002/0138599
`2002/0174372
`
`2/1999
`9/1999
`4/2000
`9/2002
`11/2002
`
`OTHER PUBLICATIONS
`
`Article by Steffen Stempel, entitled: “IPAccess-An Internet Service
`Access System for Firewall Installations” Published by IEEE Com
`munications Magazine Feb. 16, 1995, pp. 31-41.
`Article by Braun et al., entitled: “Web Traf?c Characterization: an
`assessment of the impact of caching documents from NCSA’s web
`server” Published by Elsevier Science B.V. 1995 pp. 37-51.
`Article by Nelson et al., entitled: “Security for In?nite Networks”
`Published by IEEE Communications Magazine on Aug. 22, 1995,
`pp. 11-19.
`Article by Greenwald et al., entitled: “Designing an Academic
`Firewall: Policy, Practice, and Experience with SURF” Published
`by IEEE Communications Magazine on Feb. 22, 1996, pp. 79-92.
`Article by Kiuchi et al., entitled: “C-HTTPiThe Development of
`a Secure, Closed HTTP-based Network on the Internet” Published
`by IEEE Proceedings of SNDSS on Feb. 22, 1996, pp. 64-75.
`Article by S. Cobb, entitled: “Establishing Firewall Policy” Pub
`lished by National Computer Security Assn. on Jun. 25-27, 1996,
`pp. 198-205.
`Article by Mark Brown, entitled: “Using NetScape 2” Published by
`Que Corporation 1995, pp. 885-907.
`Article by Douglas Kramer, entitled: “The Java Platform” Published
`by JavaSoft, Inc. May 1996, pp. 1-25.
`Package java.applet http://www-nrg.eelbl.gov/jef/apibook/javam.
`htm, published by Sun Microsystems, Inc. Apr. 1996.
`Package java.net http://www-nrg.eelbl.gov/jef/apibooldjavaf.htm,
`published by Sun Microsystems, Inc. Apr. 1996.
`Servlet Tutorial http://mech.postech.ac.kr/Java/java.sun.com/prod
`uct s/ j eeve s/ CurrentRelease/ doc/ servl etitutorial/ servletitutorial .
`html Aug. 20, 1996.
`Java Servlet Application Programming Interface White Paper,
`Document Version 0.45, URL: http://mech.postech.ac.kr/Java/java.
`sun.com/products/jeeves/CurrentRelease/doc/api.html, Dated: Aug.
`2, 1996, Page(s): 1-6.
`Tanenbaum, Andrew S., “Computer Network”, Third Edition,
`Prentice-Hall 1996, ISBN 0-13-349945-6, Chapter 7, Sections 7.1.4
`to 7.1.6, pp. 597-618.
`Knudsen, Jonathan, “Java Cryptography”, First Edition, O’Reilly &
`Assoc. 1998, ISBN 1-56592-402-9, pp. 79-91.
`Web page: www.verisign.com/press/product/isvhtml, Verisign
`Press Release, “Verisign Enhances Digital IDS to Enable Universal
`Website Login and One-Step Registration”, Nov. 3, 1998, 3 pages.
`Kohl, John T., et al.; “The Evolution of the Kerberos Authentication
`Service”; 1991; pp. 1-15; This paper is a revision of a paper
`presented at the Spring 1991 EurOpen Conference in Tromso,
`Norway.
`Adams, Charlotte; “Multilevel Secure Networking Charges Ahead”;
`Federal Computer Week; Apr. 12, 1993; 5 pages.
`Jaeger, Trent and Atul Prakash; “Implementation of a Discretionary
`Access Control Model for Script-based Systems”; IEEEE Jun.
`1995; 15 pages.
`Radosevich, Linda, “Users want uni?ed mail directories,”
`Computerworld, Aug. 30, 1993, p. 12.
`Bruno, Charles, “Firm pushes E-mail limits beyond rivals’,” Net
`work World, Aug. 12, 1991, pp. 33, 53.
`Sliwa, Carol and Cole, Barb, “MESA declares a groupware
`detente,” Network World, Aug. 5, 1996, p. 29.
`Grosse, Eric, “Repository Mirroring,” ACM Transactions on Math
`ematical Software, vol. 21, No. 1, Mar., 1995, pp. 89-97.
`Schilit, Bill N. and Theimer, Marvin M., “Disseminating Active
`Map Information to Mobile Hosts,” IEEE Network, Sep./Oct. 1994,
`pp. 22-32.
`Levy, Eliezer and Silberschatz, Abraham, “Distributed File Sys
`tems: Concepts and Examples,” ACM Computing Surveys, vol. 22,
`No.4, Dec. 1990, pp. 321-74.
`
`Rymer, John R., “The Muddle in the Middle,” Byte, Apr. 1996, pp.
`67-70.
`Baum, David, “Intranet Politics and Technologies,” Byte, May
`1997, pp. 88A-88H.
`Udell, Jon, “Push Me, Pull You,” Byte, Sep. 1996, pp. 117-120.
`Kador, John, “The Ultimate Middleware,” Byte, Apr. 1996, pp.
`79-83.
`Brown, Mark, “Using Netscape 2,” Que Corporation, 1995, pp.
`885-907.
`Kramer, Douglass, “The Java Platform,” Javasoft, May 1996, pp.
`1-25.
`http://www-nrg.ee.lbl.gov/j4/
`java.net,
`Package java.applet;
`apibooldjavafhtm, javamhtm, Apr. 22, 1996.
`Servlet Tutorial,
`http://mecch.postech.ac.kr/Java/java.sun.com/
`product s/ j eeve s/ current
`release/doc/servletitutorial/
`servletitutorial .htrnl.
`Freier et al., entitled “The SSL Protocol, Version 3.0,” Netscape
`Communications, dated Nov. 18, 1996, pp. 1-59, Downloaded from
`URLIhttp://www.home.netscape.com/eng/ss13/draft302.b<t.
`Java Servlet Application Programming Interface White Paper,
`http://mech.postech.ac.kr/Java.sun.com/products/jeeves/Cur
`rentRelease/doc/apihtml, Aug. 1996, pp. 1-6.
`Singhai, M., “Update transport: A new technique for update syn
`chronization in replicated database systems,” IEEE Transactions on
`Software Engineering, vol. 16, No. 12, dec. 1990, pp. 1325-1336.
`Rao, H. & Skarra, A., “A transparent service for synchronized
`replication across loosely-connected ?le systems,” IEEE Transac
`tions on Software engineering, Apr. 1995, pp. 110-117.
`Crispen, M., “Internet Message Access Protocol - RFC 1730 Ver
`sion 4,” Dec. 1994, pp. 1 -52, http://www.faqs.org/rfcs/rfc1730.
`html.
`Rao, Venkat & Aline, Mary, “Burrowing through ?rewalls,” Dec.
`1996, pp. 1-5, http://java.sun.com/developer/technicalArticles/In
`nerworkings/Burrowing/ .
`Brown, Margaret J ., “The Visto Briefcase Pro Puts Your PIM On the
`Internet,” Ayg. 13, 1998, 1 page, URL:http://www.zdnet.com/zdnn/
`stories/zdnnidisplay/0,3440,341892,00.html.
`Tanenbaum, Andrew, “Computer Networks,” Third Edition,
`Prentice-Hall, 1996, see entire document.
`Knudsen, Jonathan, “Java Cryptography,” O’Reilly, 1998, p. 112,
`160.
`Verisign Press Release, “Virisign Enhances Digital IDS to Enable
`Universal Website Login and One-step Registration,” <www.
`verisign.com/press/prodcutive/isv.html>, especially 2nd paragraph.
`Crispin, M., “IMAP4 Compatibility with IMAP2BIS”, Network
`Working Group RFC 2061, Dec. 1996, XP002154026, <URL:http://
`www.imc.org/rfc2061>, retrieved Nov. 28, 2000, p. 1, last para
`graph.
`“Con?guration of a wireless-connected mobile computer,” IBM
`Technical Disclosure Bulletin, US, IBM Corp., New York, vol. 38,
`No. 4, Apr. 1, 1995, pp. 15-17, XP000516057, ISSN: 0018-8689,
`the whole document.
`Mason, Justin, “Tunneling over HTTP,” Dec. 11, 1996, pp. 1-2
`http://www.netsys.com/?rewalls/?rewalls-9612/0488.html.
`Elgamal, Taher, “The Secure Sockets Layer Protocol (SSL),”
`agenda for the Danvers IETF meeting, Apr. 1995, pp. 1-5 - http://
`www.ietf.cnri .reston.va.us/proceeedings/9Sapr/sec/catelgamal.
`slides.html.
`Research Disclosure: “Provide Auto-Forwarding Based On Criteria
`Selected by the User”; Oct. 1, 1989; 1 page; No. 306; Kenneth
`Mason Publications; XP000085405; ISSN 0374-4353.
`Chan, MC. et al., “Appliaction of Compaction Technique to
`Optimizi ng Wireless Email Transfer,” IEEE Wireless Communi
`cations and Networking Conference 1999, 1535 Section A.
`Crispin, M., “Internet Message Access Protocol Version 4revl,”
`1996 Section 2.3.1.1.
`Jaeger and Prakash, “Implementation of a Discretionary Access
`Control Model for Script-based Systems,” IEEE Jun. 1995.
`Adams, Charlotte, “Multilevel Secure Networking Charges Ahead,”
`Federal Computer Week, Apr. 12, 1993.
`Kohl, John, “The Evolution of the Kerberos Authentication Ser
`vice,” 1991.
`
`VMware Exhibit 1010 Page 3
`
`

`
`US 7,287,271 B1
`Page 4
`
`Young et al., “Deniable Password Snatching: On the Possibility of
`Evasive Electronic Espionage,” 1997, IEEE, pp. 224-35.
`Abel, Amee, “E-mail anywhere,” May 1998, Time, pp. 1-4.
`Satyanarayanan, M., “Integrating Security in a Large Distributed
`System,” ACM Transactions on Computer Systems, vol. 7, No. 3,
`Aug. 1989, pp. 247-80.
`Kistler, James J. and Satyanarayanan, M., “Disconnected Operation
`in the Coda File System,” ACM Transactions on Computer Systems,
`vol. 10, No. 1, Feb. 1992, pp. 3-25.
`Hills, Alex and Johnson, David B., “Wireless Data Network Infra
`structure at Carnegie Mellon University,” IEEE Personal Commu
`nications, 3(1), Feb. 1996.
`Satyanarayanan, Mahadev, “Mobile Information Access,” IEEE
`Personal Communications, Feb. 1996, pp. 26-33.
`Satyanarayanan, Mahadev et al., “Coda: A Highly Available File
`System for a Distributed Workstation Enviroment,” IEEE Transac
`tions on Computers, vol. 39, No. 4, Apr. 1990, pp. 447-59.
`Satyanarayanan, Mahadev, “Scalable, Secure, and Highly Available
`Distributed File Access,” Computer, May 1990, pp. 9-21.
`Mummert, Lily B. et al., “Exploiting Weak Connectivity for Mobile
`File Access,” SIGOPS ’95, Dec. 1995, pp. 143-55.
`Terry, Douglas B. et al., “Managing Update Con?icts in Bayou, a
`Weakly Connected Replicated Storage System,” SIGOPS ’95, Dec.
`1995, pp. 172-183.
`Demers, Alan et al., “The Bayou Architecture: Support for Data
`Sharing among Mobile Users,” Proceeding of the Workshop on
`Mobile Computing Systems and Applications, Santa Cruz, Califor
`nia, Dec. 1994, pp. 2-7.
`Peterson, Karin et al., “Bayou: Replicated Database Services for
`World-wide Applications,” Proceedings Seventh ACM SIGOPS
`European Workshop (EuroSIGOPS ’96), Connemara, Ireland, Sep.
`1996, pp. 275-280.
`Crocker, David H., “RFC822: Standard for ARPA Internet Texi
`Messages,” http://www.w3.org/Protocols/rfc822/.
`Theisen, Tim, “AFS distributed ?lesystem FAQ (1/2),” posted to
`uwisc.general newsgroup, Jul. 25, 1994.
`Theisen, Tim, “AFS distributed ?lesystem FAQ (2/2),” posted to
`uwisc.general newsgroup, Jul. 25, 1994.
`Schubert, Eric, “re: telnet/internet and .
`.
`hp.mpe newsgroup, Jun. 30, 1995.
`Glazman, Daniel, “SOFTWARE: HHTPtool [sic] 1.1, a ?le transfer
`utility over HTTP using PUT and GET,” posted to comp.
`infosystems.www.announce newsgroup, May 17, 1995.
`Glazman, Daniel, “SOFTWARE: HTTPtool v1.0 for Windows3.x,
`?le transfer utility over HTTP,” posted to comp,infosystems.www.
`announce newsgroup, Mar. 21, 1996.
`Angus, Jeffrey G., “Sales force automation has a GoldMine,”
`Computerworld, Oct. 7, 1996, p. 59.
`Salamone, Salvatore, “Middle(ware) Management,” Byte, Apr.
`1996, pp. 71-76.
`Nance, Barry, “Balance the Load with Transaction Server,” Byte,
`Jun. 1997, pp. 81-84.
`Francett, Barbara, “Replication on the Run,” Software Magazine,
`Aug. 1996, pp. 63-66.
`Darling, Charles B., EDNSQL Loses a Little and Gaines a Lot,
`Datamation, May 1, 1996, p. 12.
`Varney, Sarah E., “Arm your salesforce with the Web,” Datamation,
`Oct. 1996, pp. 72-74.
`Fulcher, Jim, “Is it or isn’t?,” Manufacturing Systems, Oct. 1996,
`pp. 56-61.
`Lamb, John and Cusato, Tony, “LAN-Based Of?ce for Enterprise,
`A Case Study,” Proceedings, 19th Conference on Local Computer
`Networks, Minneapolis, Minnesota, Oct. 2-5, 1194, pp. 440-447.
`Kawell Jr., Leonard et al., “Replicated Document Management In A
`Group Communication Systems,” presented at the Second Confer
`ence on Computer-Supported Cooperative Work, Portland, Oregon,
`Sep. 26-28, 1988, as printed in Groupware: Software for Computer
`Supported Cooperative Work, IEEE Computer Society Press, pp.
`226-235.
`Hong, Jack et al., “Personal Electronic Notebook with
`Sharing,”Proceedings of the Fourth Workshop on Enabling Tech
`nologies: Infrastructure for Collaborative Enterprises, Berkeley
`Springs, West Virginia, Apr. 20-22, 1995, pp. 88-94.
`
`. ,” posted to comp.sys.
`
`Mace, Scott, “DataSync 2.0 enhances synchronization of data,”
`InfoWorld, Jun. 6, 1994, p. 28.
`Mace, Scott, “Database replication products debut.” InfoWorld,
`Nov. 15, 1993, p. 19.
`Gryphon, Robert, “DataSync line matches up,” InfoWorld, May 23,
`1994, p. 161.
`Patterson, John F. et al., “Noti?cation Servers for Synchronous
`Groupware,” Proceedings, ACM 1996 Conference on Computer
`Supported Cooperative Work, Boston, Massachusetts, Nov. 16-20,
`1996, pp. 122-129.
`Zhao, Jian and Hoppe, H. Ulrich, “Supporting Flexible Communi
`cation in Heterogeneous Multi-User Environments,” 1994 IEEE,
`pp. 442-449.
`Gong, Li, “Enclaves: Enabling Secure Collaboration Over the
`Internet,” IEEE Journal on Selected Areas in Communications, vol.
`15, No. 3, Apr. 1997, pp. 567-575.
`Bruno, Lee, “Directory Services Tie It All Together,” Data Com
`munications, Mar. 1997, pp. 75-83.
`Guy, Richard G. et al., “Implementation of the Ficus Replicated File
`System,” Proceedings of the Summer 1990 USENIX Conference,
`Anaheim, California, Jun. 11-15, 1990, pp. 63-70.
`Page, Thomas W. Jr. et al., “Management of Replicated Volume
`Location Data in the Ficus Replicated Data System,” Conference
`Proceedings, USENIX Summer 1991 Technical Conference, Nash
`ville, Tennessee, Jun. 10-14, 1991, pp. 17-29.
`Reiher, Peter et al., “Resolving File Con?icts in the Ficus File
`System,” Conference Proceedings, USENIX Summer 1994 Tech
`nical Conference, Boston, Massachusetts, Jun. 6-10, 1994, pp.
`183-195.
`Walker, Bruce et al., “The LOCUS Distributed Operating System,”
`Proceedings of the Ninth ACM Symposium on Operating Systems
`Principles, Bretton Woods, New Hampshire, Oct. 10-13, 1983, pp.
`49-70.
`Parker, D. Stott Jr. et al., “Detection of Mutual Inconsistency in
`Distributed Systems,” IEEE Transactions on Software Engineering,
`vol. SE-9, No. 3, May 1983, pp. 240-256.
`Ceri, Stefano et al., “The Case for Independent Updates”, Second
`Workshop on the Management of Replicated Data, Monterey,
`California, Nov. 12-13, 1992, pp. 17-19.
`Dowing, Alan R. et al., “OSCAR: A System for Weak-Consistency
`Replication”, Proceedings, Workshop on the Mangement of Repli
`cated Data, Houston, Texas, Nov. 8-9, 1990, pp. 26-30.
`Siegel, Alex et al., “Deceit: A Flexible Distributed File System”,
`Proceedings of the Summer 1990 USENIX Conference, Anaheim,
`California, Jun. 11-15, 1990, pp. 51-61.
`Chutani, Sailesh, “The Episode File System”, Conference Proceed
`ings, USENIX Winter 1992 Technical Conference, San Francisco,
`California, Jan. 20-24, 1992, pp. 43-59.
`Seltzer, Margo, “An Implementation of a Log-Structured File
`System for UNIX”, Conference Proceedings, USENIX Winter 1993
`Technical Conference, San Diego, California, Jan. 25-29, 1993, pp.
`307-326.
`Vahalia, Uresh, “Metadata Logging in an NFS Server”, Conference
`Proceedings, USENIX 1995 Technical Conference on UNIX and
`Advanced Computing Systems, New Orleans, Louisiana, Jan.
`16-20, 1995, pp. 265-276.
`Lotus Development Corporation, InterNotes Web Publishers
`Release 4, “InterNotes Web Publisher Guide”, 1996, Cambridge,
`MA.
`Lotus Development Corporation, Lotus Notes Release 4, “Database
`Manager’s Guide”, 1995, Cambridge, MA.
`Lotus Development Corporation, Lotus Notes Release 4, “Admin
`istrator’s Guide”, 1995, Cambridge, MA.
`IBM Lotus Technical Library, Lotus Notes Documentation, “Lotus
`Notes Internet Cookbook for Notes Release 3”, Jan. 16, 1996, pp.
`1-26 http://www-l2/lotus.com/ldd/doc/dominoinotes/cookboold
`cbookv4.nsf/el250032896bf7b3a385256.
`John Wiley & Sons, Inc. - Wiley Computer Publishing, Falkner,
`Mike, “How to Plan, Develop, and Implement Lotus Notes in Your
`Organization”, 1996, USA4.
`Lotus Development Corporation, Lotus Notes Release 4, “Deploy
`ment Guide”, 1995, Cambridge, MA.
`
`VMware Exhibit 1010 Page 4
`
`

`
`US 7,287,271 B1
`Page 5
`
`McGraw-Hill, Lamb, John P. and Lew, Peter W., “Lotus Notes
`Networks Design for Notes Release 3 and 4”, 1996, Quebecor
`Fair?eld, PA.
`Lotus Notes, “Overview - What is Lotus NotesPump?”, including
`“notes Pump 1.0 Release Notes”.
`Lotus Development Corporation, Lotus Notes Release 3.1, The
`groupware standard, “Site and System Planning Guide”, 1994,
`Cambridge, MA.
`Lotus Development Corporation, Lotus Notes Release 3.1. The
`groupwarestandard, “Administrator’s Guide Server for NetWare,
`OS/2, and UNIX”, 1994, Cambridge, MA.
`IBM Lotus Technical Library, Lotus Documentation, “Lotus Notes
`Internet Cookbook for Notes Release 4”, Fe. 14, 1996, pp. 1-30
`http://www-12.lotus.com.ldd.doc.dominoinotes/cookbook/
`cbookv4,nsf/el25003288bf7b3a385256.
`IntelliLink Corporation, IntelliLink for Windows Release 3.0,
`“User’sGuide”, 1994, Nashua, NH.
`Lotus Development Corporation, Lotus Notes Release 4, “Appli
`cation Developer’s Guide”, 1995, Cambridge, MA.
`Lotus Development Corporation, Lotus Notes Release 3.3 North
`American Server Edition, “Lotus Notes, The Groupware Standard”,
`1994, Cambridge, MA.
`Sams Publishing, Dahl, Andrew, “Lotus Notes 4 Administrator’s
`Survival Guide”, 1996, Indianapolis, IN.
`Sams Publishing, Tmaura, et al., “Lotus Notes 4 Unleashed”, 1996,
`Indianapolis, IN.
`Advisor Publications - Lotus Notes Advisor, Pyle, Hugh, “The
`Notes Architecture”, 1995.
`Advisor Pblications - Lotus Notes Advisor, Augun, Adury,
`“Intergrating Lotus Notes with Enetrprise Data”, 1996.
`Advisor Publications - Lotus Notes Advisor, Opyt, Barber and Dale,
`Robert, “Use the Internet as Your Lotus Notes WAN”, 1996.
`Lotus Development Corporation, Lotus Notes Knowledge Base,
`“What is The Notes Replicator?”, 1995, Cambridge, MA.
`Lotus Development Corporation, Lotus Notes Knowledge Base,
`“Firewall Security Overview and how Firewalls Relate to Lotus
`Notes”, 1996, Cambridge, MA.
`Networking Computing, Frenkel, Garry, “Pumping for Info: Notes
`and Database Integration”, 1996.
`IBM Corporation, Hawker, et al., “Secrets to Running Lotus Notes:
`The Decisions No One Tells You How To Make”, 1996, Research
`Triangle Park, NC.
`Lotus Notes Release 4, “Administrator’s Guide,” 1995 Lotus Devel
`opment Corporation, Cambridge, MA.
`Dahl, Andrew, “Lotus Notes 4 Administrator’s Survival Guide,”
`1996 Sams Publishing, Indianapolis, IN.
`P. Grous, “Creating and Managing a Web Site with Lotus’
`InterNotes WebNotes Web Publisher,” The Wew, vol. 1, Issue 4, pp.
`3-18 (Oct/Oct. 1995).
`Lambert, M. “PCMAIL: A Distributed Mail System for Personal
`Computers,” Network Working Group, Jun. 1998.
`
`Kumar, Puneet, “Mitigating the Effects of Optimistic Replication in
`a Distributed File System”, Ph.D, Thesis, School of Comp. Sci.,
`Carnegie Mellon Univ., Dec. 1994.
`Bruegge, Bernd and Bennington, Ben, “Applications of Mobile
`Computing and Communications,” IEEE Personal Communica
`tions, Feb. 1996.
`Husted, Bill “Calling up the Future FCC ruling will change the way
`we use Phones”, The Atlanta Journal and Constitution, Jul. 16,
`1992.
`Lotus Notes Internet Cookbook for Notes Release 3 (Jan 1996).
`L.Pyle, “A Jump start to the Top Ten R3-to-R4 Migration Consid
`erations,” The Wew, vol. 1., Issue 5 pp. 3-20 (Nov/Dec. 1995).
`H. Wong, “Cashahi’s Replic-Action: Delivering True Notes/DBMS
`Integration”, The Wew, vol. 2, Issue 1, pp. 33-50 (Jan/feb. 1996).
`IntelliLink Corporation, IntelliLink for Windows Release 3.0,
`“User’s Guide” 1994, Nashra, NH.
`K, Brown, et al., Mastering Lotus Notes published by Sybex Inc.,
`(1995).
`Lotus Development Corporation, Lotus Notes Released 4, “Appli
`cation Developer’s Guide”, 1995, Cambridge, MA.
`Lotus Develoment Corporation, Lotus Notes Released 3.3 North
`American Server Edition, “Lotus Notes, the Groupware Standard”,
`1994 Cambridge, MA.
`Sams Publishing, Tamura, et al., “Lotus Notes 4 Unleashed”, 1996,
`Indianapolis, IN.
`Advisor Publications - Lotus Notes Advisor, Pyle, Hugh, “the Notes
`Architecture”, 1995.
`Advisor Publications - Lotus Notes Advisor, Augun, Audry, “Inte
`grating Lotus with Enterprise Data”, 1996.
`Advisor Publications - Lotus Notes Advisor, Opyt, Barbara and
`Dale, Robert, “Use the Internet as Your Lotus Notes WAN”, 1996.
`Lotus Development Corporation, Lotus Notes Knowledge Base,
`“What is the Notes Replicator?” 1995, Cambridge, MA.
`Lotus Development Corporation, Lotus Notes Knowledge Base,
`“Firewall Security Overview and How Firewalls relate to Lotus
`Notes” 1996, Cambridge, MA.
`Network Computing, Frenkel, Garry, “Pumping for Infor: Notes and
`Database Integration”, 1996.
`IBM Corporation, Hawker, et al., “Secrets to Running Lotus Notes:
`The Decisions No One Tells You How to Make”, 1996, Research
`Triangle Park, NC.
`IBM Lotus Technical Library, “Lotus Notes Internet Cookbook for
`Notes
`Release
`4”,
`http://www-12.lotus.com/ldd/doc/
`dominoinotes/cookbook/cbookv4.
`nsf;e12503289bf7b3a3852562b3006b8fc5/
`9e9126d61cd7b8b9852562d00070f9b2?OpenDocument.
`HTTP://222-128.ibm.com/deloperworks/lotus/library/ls-NDHis
`tory/, “The History of Lotus notes and Domino”, Dec. 10, 2005.
`US 5,373,559, 12/1994, Kaufman et al. (withdrawn)
`
`* cited by examiner
`
`VMware Exhibit 1010 Page 5
`
`

`
`U.S. Patent
`
`Oct. 23, 2007
`
`Sheet 1 of 8
`
`US 7,287,271 B1
`
`m:N:
`
`Q3I\
`
`E>cmaEoo
`
`00:
`
`ES
`
`__m>>o._u_
`
`lcm__O
`
`oo_>$m
`
`FGE
`
`__m>>m._n_mm;
`
`g
`

`
`Vl\/lware Exhibit 1010 Page 6
`
`VMware Exhibit 1010 Page 6
`
`
`
`
`

`
`U.S. Patent
`
`70023:2LC0
`
`¢I.
`
`S
`
`1B172,M
`
`Em__O
`
`v:
`
`
`
`.\5930:a:_
`
`
`
`sawmo_>on_Tmo_>mo
`
`
`
`
`
`Emamco=mo_::EEoomE2m>w9__§8_owo_>momomtmE_Smmfiowm
`
`
`
`
`
`
`
`fl.mm>>9m
`
`
`
`2mcacmco=mo_::EEoo
`
`
`
`U9m_qq<bzzomw
`
`
`
`£o_na<umumo_Esoo
`
`n,NSE
`
`
`
`osocmE_&<N9
`
`Vl\/lware Exhibit 1010 Page 7
`
`
`
`
`
`mc_m_._m_:o_E>.ocm_EEwE_oh
`
`VMware Exhibit 1010 Page 7
`
`
`
`

`
`U.S. Patent
`
`Oct. 23, 2007
`
`Sheet 3 of 8
`
`US 7,287,271 B1
`
`_mn_o_.0
`
`Eaow
`
`mS\.
`
`9%
`
`
`
`
`
`canoo_>on_ownoo_>on_
`
`59:059:
`
`Em
`
`3&0
`
`Em
`
`8m
`
`omm
`
`
`
`wc_mcm_wco_.mo_c:EEoo
`
`
`
`E9w>m3.980mmm,
`
`
`
`
`
`mwo_>._wmbzsowwmmm.
`
`
`
`._o>$mao>>omm.
`
`mam
`
`wmm
`
`mam
`
`wo_>mn_mmeewEma
`
`
`
`m«m_Qq<>E:owm
`
`m_nmumo_Esoo
`
`.o,§&<
`
`
`
`Emaco:m._:m_.Eoo
`
`
`
`mmm6v<wo_>$m
`
`co:mE.o.E_
`
`
`
`.....9...
`
`m:o:mu_c:EEoo
`
`oomtot:
`
`Vl\/lware Exhibit 1010 Page 8
`
`VMware Exhibit 1010 Page 8
`
`
`
`

`
`U.S. Patent
`
`70023,2LCO
`
`LI.
`
`s,7
`
`1B172,7
`
`mo_Emw
`
`52mm
`
`Q:\.8»
`
`59:0Sn_:_
`
`
`
`mo_>on_omvmo_>on_
`
`
`
`S8»Uvmvemw
`
`mmv_.
`
`
`.ommmoo_n_oo_Ewwmcacm
`
`momtmE_wo_>._wmwoémm
`
`2I
`
`
`
`mmwm:_mcmm:o=mo_c:EEo0
`
`
`
`mE2m>m9__§&o
`
`
`
`Smo_>wowomtmE_
`
`bcaomm0mmw4mcacmmco:mo_c:EEoo
`
`
`
`Qsommv:8vmwmEw__oo._.fmmo_>$m
`
`Vl\/lware Exhibit 1010 Page 9
`
`
`
`
`
`omm.o..mEmamco:mo__.5EEoo
`
`VMware Exhibit 1010 Page 9
`
`
`

`
`U.S. Patent
`
`Oct. 23, 2007
`
`Sheet 5 0f 8
`
`US 7,287,271 B1
`
`(
`
`Start )
`
`500
`f
`
`V
`Create Link Between
`Client and Global Server \ 505
`
`V
`Confirm User
`Access Privileges
`
`ll
`Download Web Page
`Data and Configuration \
`Data from
`515
`Global Server to Client
`
`ll
`Configure Client and
`Display Web Page
`
`ll
`Client User
`Selects a Service \ 525
`
`ll
`Download Corresponding Applet,
`Applet Configuration Data and
`User Data from the Global
`Server to the Client
`
`ll
`Execute the Applet \
`535
`
`ll
`
`Initiate the Service \
`537
`
`ll
`
`Select a Mode of Access \
`538
`
`V
`Provide Accese to the
`Service to the Client User \ 540
`
`ll
`
`FIG. 5
`
`VMware Exhibit 1010 Page 10
`
`

`
`U.S. Patent
`
`0a. 23, 2007
`
`Sheet 6 0f 8
`
`US 7,287,271 B1
`
`(
`
`Start )
`
`505
`V/
`
`V
`Call Global Sewer
`Using Known URL \ 605
`
`607
`ll
`/
`Create Communications
`Channel
`\
`~ 610
`
`v
`.
`Negotiate Secure
`Channel Parameters \\ 615
`
`‘V
`
`Create Secure Channel \
`\ 620
`
`End
`
`FIG. 6
`
`700
`f
`f 770
`710
`Web Page / /
`I
`720
`1. E-Mail
`/ /
`730
`2. Calendaring
`/
`740
`/ 715
`3. Internet Access
`_
`4. Paging
`_
`5. Sending Faxes
`
`750
`/
`f 760
`
`FIG. 7
`
`® [1 540a
`
`ll
`Applet Retrieves Service Address / 805
`and Authentication Information
`
`V
`810
`Client Creates Direct and Secure
`Connection with Service and /
`Uses the Authentication
`lnfomation to Authenticate Itself
`
`V
`Applet Acts as I/O Interface / 875
`with the Service Engine
`
`ll
`End
`
`FIG. 8A
`
`VMware Exhibit 1010 Page 11
`
`

`
`U.S. Patent
`
`Oct. 23, 2007
`
`Sheet 7 0f 8
`
`US 7,287,271 B1
`
`540D /
`
`\ 840
`
`Applet Retrieves Service Address
`Directing it to the Global Server
`l
`
`Applet Creates a Secure
`Connection to the Global Server
`
`l
`
`Global Server Retrieves
`the Service Address and the
`Authentication information
`
`\ 845
`
`-\ 850
`
`i
`
`Global Server Connects to
`the Service and Uses the
`\ 855
`Authentication Information to
`Authenticate Itself as the User
`
`' v
`
`Applet Acts as I/O interface
`with'Global Server
`
`\ 860
`
`Global Server
`Authorized to Perform
`the User’s Request
`?
`
`865
`Y
`es
`
`875
`F
`Global Server
`Acts as Proxy
`to Service
`
`FIG. 8B
`
`VMware Exhibit 1010 Page 12
`
`

`
`U.S. Patent
`
`Oct. 23, 2007
`
`Sheet 8 0f 8
`
`US 7,287,271 B1
`
`(
`
`Start )
`
`V
`Applet Retrieves Service Address
`Direc

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket