`
`(12) United States Patent
`Riggins
`
`(10) Patent N0.:
`(45) Date of Patent:
`
`US 7,287,271 B1
`*Oct. 23, 2007
`
`(54) SYSTEM AND METHOD FOR ENABLING
`SECURE ACCESS TO SERVICES IN A
`COMPUTER NETWORK
`
`75
`(
`)
`
`_
`-
`-
`Inventor. Mark D. Riggins, San Jose, CA (US)
`
`9/1992 Chan
`5,150,407 A
`6/1993 Parker ....................... .. 380/21
`5,220,603 A *
`5,263,157 A 11/1993 Janis ........................ .. 395/600
`5,265,159 A 11/1993 Kung
`5,333,266 A
`7/1994 BoaZ et a1.
`5,388,255 A
`21995 Py?ik et a1‘
`
`.
`.
`.
`(73) Asslgnee: V‘st" corporatlon’ Redwood Shores’
`CA (Us)
`
`5,392,390 A
`5,420,927 A
`5,425,102 A
`
`2/1995 C '
`5/1995
`6/1995 Moy
`
`....................... .. 380/23
`
`( * ) Notice:
`
`Subject to any disclaimer, the term of this
`patent is extended or adjusted under 35
`U.S.C. 154(b) by 0 days.
`
`(Continued)
`FOREIGN PATENT DOCUMENTS
`
`_
`
`_
`
`_
`
`Th1s patent 1s 511131601 to a termmal d1s
`claimer.
`
`_
`
`_
`
`CA
`
`2191505
`
`6/1997
`
`(Continued)
`OTHER PUBLICATIONS
`
`Article by Bellovin et al., entitled: “Network Firewalls” Published
`by IEEE Communications Magazine Sep. 1994, pp. 50-57.
`(Continued)
`Primary ExamineriT. B. Truong
`(74) Attorney, Agent, or F irmiManatt, Phelps & Phillips
`
`(57)
`
`ABSTRACT
`
`A global server includes a communications engine for
`establishing a communications link with a client; security
`means coupled to the communications engine for determin
`ing client privileges; a servlet host engine coupled to the
`security means for providing to the client, based on the client
`privileges, an applet which enables 1/0 with a secured
`service; and a keysafe for storing a key which enables access
`to the secured service. The global server may be coupled to
`multiple sites, wherein each site provides multiple services.
`Each site may be protected by a ?rewall. Accordingly, the
`global server stores the keys for enabling communication via
`the ?rewalls with the services.
`
`25 Claims, 8 Drawing Sheets
`
`100 f
`
`K118
`
`Company
`108a\
`sewer f110a r1141;
`
`(21) Appl. No.2 08/841,950
`
`(22) Filed:
`
`Apr. 8, 1997
`
`(51) Int. Cl.
`(2006.01)
`H04L 9/00
`(52) US. Cl. .......................... .. 726/3; 705/64; 713/168;
`15/749
`(58) Field of Classi?cation Search .......... .. 380/23i25,
`380/49, 255; 713/200, 201, 202, 161, 166;
`709/203, 229,201, 223, 225; 726/341, 11;
`705/50, 64, 67, 78
`See application ?le for complete search history.
`
`(56)
`
`References Cited
`
`U.S. PATENT DOCUMENTS
`
`3/1987 Hale et a1. .................. .. 380/24
`4,652,698 A
`4,714,995 A 12/1987 Materna et a1.
`4,817,050 A *
`3/1989 Komatsu et a1. ............ .. 707/10
`4,831,582 A
`5/1989 Miller et a1. .............. .. 364/900
`4,882,752 A 11/1989 Lindman et a1.
`4,897,781 A
`1/1990 Chang ...................... .. 364/200
`4,916,738 A
`4/1990 Chandra et a1.
`5,048,085 A
`9/1991 Abraham et a1. ........... .. 380/23
`
`Company
`\ 114agl
`
`Client
`
`112
`
`116
`
`K135
`Kiosk
`
`114d
`
`1149
`
`VMware Exhibit 1010 Page 1
`
`
`
`US 7,287,271 B1
`Page 2
`
`US. PATENT DOCUMENTS
`
`- 340/82531
`
`7/1995 Kung et al. ................. .. 380/25
`5,434,918 A
`1/1996 Rosenow et al.
`380/25
`5,483,596 A *
`2/1996 Kaufman et al. .
`380/30
`5,491,752 A
`2/1996 Linehan . . . . . . . . .
`. . . .. 380/21
`5,495,533 A
`4/1996 Pile er a1
`5,510,777 A *
`8/1996 Konrad
`5544320 A
`8/1996 Cheng et al. ........ .. 395/200.12
`5,544,322 A
`5,572,643 A 11/1996 Judson ----- -
`395/793
`5,581,749 A 12/1996 Hossain et al. ........... .. 395/600
`5,588,132 A 12/1996 CardoZa
`5,604,788 A
`2/1997 Te“
`5,613,012 A
`3/1997 Hoffman et al. .......... .. 382/115
`5,623,601 A
`4/1997 Vu ................. ..
`395/187.01
`5,627,658 A
`5/ 1997 Connors er a1- ---------- -- 358/407
`5627997 A
`5/1997 Pearson er 91-
`5,632,011 A
`5/1997 Land?eld et al.
`5,634,053 A
`5/1997 Noble er 91-
`...... .. 348/13
`5,644,354 A
`7/1997 Thompson et a1.
`5,647,002 A
`7/1997 Brunson .................... .. 380/49
`5,652,884 A
`7/1997 Palevich
`5,657,390 A *
`8/1997 Elgamal et al. ............. .. 380/49
`5664207 A
`9/ 1997 crumpler er 91-
`5,666,530 A
`9/1997 Clark et al. ............... .. 395/617
`5,666,553 A
`9/1997 CroZier ........ ..
`395/803
`5,675,782 A * 10/1997 Montague et al. ........ .. 395/609
`5,678,039 A 10/1997 Hinks er 91-
`5680542 A 10/1997 Mulchandani
`5,682,478 A * 10/1997 Watson et al. ........ .. 713/201 X
`5,682,524 A 10/1997 Freund et al. ............ .. 395/605
`5,684,951 A 11/1997 Goldman eta1~
`5684984 A 11/1997 1911989191
`5,684,990 A 11/1997 Boothby ................... .. 707/203
`5,687,322 A 11/1997 Deaton et al.
`5,701,400 A 12/1997 Amado
`395/335
`5,701,423 A 12/1997 CroZier
`395/187.01
`5,706,427 A
`1/1998 Tabuki ..... ..
`5,706,502 A
`1/1998 Foley et al. .............. .. 395/610
`5,710,922 A
`V1998 Alley er 91-
`5,713,019 A
`V1998 Keaten
`5,715,403 A
`2/1998 Ste?k ....................... .. 395/244
`5,717,925 A
`2/1998 Harperet 91-
`5,721,779 A
`2/1998 Funk ......................... .. 380/23
`5,727,202 A
`3/1998 Kucala
`5,729,735 A
`3/1998 Meyering
`5,742,668 A
`4/1998 Pepe eta1~
`5752059 A
`5/1998 Hollemn er 91-
`5752246 A
`5/1998 Rogers eta1~
`5,754,830 A
`5/1998 Butts et al. ............... .. 395/500
`5,757,916 A
`5/1998 MacDoran et al.
`...... .. 380/25
`5,758,150 A
`5/1998 Bell 9M1‘
`5,758,354 A
`5/1998 Huang et 91-
`5758355 A
`5/1998 Buchanan
`5,764,902 A
`6/1998 Rothrock
`5,765,171 A
`6/1998 Gehani et al.
`5,768,510 A
`6/1998 Gish ................... .. 395/200.33
`5,778,346 A
`7/1998 Frid-Nielsen et al. ..... .. 395/208
`5,784,463 A *
`7/1998 Chen et al. ........ ..
`380/21
`5,784,464 A *
`7/1998 Akiyama et al. ........... .. 380/25
`5,787,172 A
`7/1998 Arnold ...................... .. 380/21
`5,787,441 A
`7/1998 Beckhardt et al.
`5790974 A
`8/1998 Tognazzini
`5,794,252 A
`8/1998 Bailey et al.
`5,799,086 A
`8/1998 Sudia ........................ .. 380/23
`5,802,530 A
`9/1998 Van Holf .................. .. 707/513
`5,812,398 A
`9/1998 Nielsen
`5,812,668 A
`9/1998 Weber ....................... .. 380/24
`5,812,773 A
`9/1998 Norin
`5,815,683 A
`9/1998 Vogler ...................... .. 395/500
`5,818,935 A * 10/1998 Maa ......................... .. 380/200
`5,828,840 A * 10/1998 CoWan et al. ............ .. 709/203
`5,832,483 A 11/1998 Barker
`
`5,835,087 A 11/1998 Herz et a1.
`5,835,601 A 11/1998 Shimbo et al.
`5,845,282 A 12/199g Alley et a1‘
`5,857,201 A
`1/1999 Wright, Jr‘ et a1‘
`5,862,325 A
`1/1999 Reed et a1‘
`5,862,346 A
`V1999 Kley et 31‘
`
`2/1999 cnnis ................. .. 395/187.01
`5,870,544 A
`2/1999 Bauer et a1.
`5,870,759 A
`2/1999 Bauer et 31‘
`5,870,765 A
`2/1999 Boyle et a1. .............. .. 713/151
`5,872,847 A
`3/1999 Weber et 31‘
`5,878,230 A
`6/1999 Van RyZin
`5,909,689 A
`7/1999 Ahmed etal.
`5,924,103 A
`7/1999 Clark et a1‘
`5928329 A
`8/1999 Boothby
`5,943,676 A
`9/1999 Ingrassia et al. .......... .. 709/248
`5,951,652 A
`5,961,590 A 10/1999 Mendez etal.
`5,966,714 A 10/1999 Huang et 31‘
`5,968,131 A 10/1999 Mendez etal.
`5974238 A 10/1999 Chase, Jr‘
`5,982,898 A 11/1999
`5,987,609 A 11/1999 Hasebe
`5999932 A 12/1999 Paul
`5,999,947 A 12/1999 Zollinger et al. ......... .. 707/203
`6,006,017 A 12/1999 Joshi et 31‘
`6,020,885 A
`2/2()()() Honda
`6,021,427 A
`2/2000 Spagna et a1‘
`6,023,700 A
`2/2000 Owens etal.
`6,023,708 A
`2/2000 Mendez etal.
`6,034,621 A
`3/2000 Kaufman
`6,052,735 A
`4/2000 Ulrich et a1‘
`6,073,165 A
`6/2000 Narasirnhan et al.
`6,088,451 A
`7/2000 He etal. ..................... .. 726/8
`6,094,477 A
`7/2()()() Nada et 31‘
`6,108,691 A
`8/2000 Lee et 31‘
`6,108,709 A
`8/2000 Shinornura etal.
`6,118,856 A
`9/2000 Paarsmarkt et 31‘
`6,125,281 A
`9/2000 Wells et 31‘
`6,131,096 A 10/2000 Ng et 31‘
`6,131,116 A 10/2000 Riggins et a1.
`6,138,146 A 10/2000 Moon et a1.
`6,151,606 A U/ZOOO Mendez
`6,154,844 A 11/2000 Touboul etal.
`6,169,986 B1
`1/2001 Bowman et 31‘
`6,182,118 B1
`1/2001 Finney etal.
`6,212,529 B1
`4/2001 Boothby et a1.
`6,249,805 B1
`6/2001 Fleming
`6,295,541 B1
`9/2001 Bodnar etal.
`6,304,881 B1
`10/2001 Halim etal.
`6,311,186 B1
`10/2001 MeLampy et 31‘
`6,324,542 B1
`11/2001 Wright, Jr‘ et a1‘
`6,334,140 B1
`12/2001 Kawamata
`6,343,313 B1
`1/2002 Salesky et al.
`6,389,455 B1
`5/2002 Fuisz
`6,438,583 B1
`8/2002 McDowelletal.
`6,446,090 B1
`9/2002 Hart
`6,477,545 B1
`11/2002 LaRue
`6,510,455 B1
`1/2003 Chen et a1‘
`6,564,218 B1
`5/2003 Roth
`6,631,416 B2 10/2003 Bendinelli et 31‘
`6,697,942 B1
`2/2004 L’HeureuX et 31‘
`
`FOREIGN PATENT DOCUMENTS
`
`CA
`EP
`EP
`EP
`JP
`W0
`W0
`W0
`W0
`
`2210763
`0684558
`0801478
`0820028
`02000003314
`WO 96/17306
`WO 97/04389
`WO 97/24678
`WO 97/35265
`
`1/1999
`11/1995
`10/1997
`1/1998
`1/2000
`6/1996
`2/1997
`7/1997
`9/1997
`
`VMware Exhibit 1010 Page 2
`
`
`
`US 7,287,271 B1
`Page 3
`
`W0
`WO
`W0
`WO
`WO
`
`WO 99/05620
`99/45451
`WO 00/22543
`2002/0138599
`2002/0174372
`
`2/1999
`9/1999
`4/2000
`9/2002
`11/2002
`
`OTHER PUBLICATIONS
`
`Article by Steffen Stempel, entitled: “IPAccess-An Internet Service
`Access System for Firewall Installations” Published by IEEE Com
`munications Magazine Feb. 16, 1995, pp. 31-41.
`Article by Braun et al., entitled: “Web Traf?c Characterization: an
`assessment of the impact of caching documents from NCSA’s web
`server” Published by Elsevier Science B.V. 1995 pp. 37-51.
`Article by Nelson et al., entitled: “Security for In?nite Networks”
`Published by IEEE Communications Magazine on Aug. 22, 1995,
`pp. 11-19.
`Article by Greenwald et al., entitled: “Designing an Academic
`Firewall: Policy, Practice, and Experience with SURF” Published
`by IEEE Communications Magazine on Feb. 22, 1996, pp. 79-92.
`Article by Kiuchi et al., entitled: “C-HTTPiThe Development of
`a Secure, Closed HTTP-based Network on the Internet” Published
`by IEEE Proceedings of SNDSS on Feb. 22, 1996, pp. 64-75.
`Article by S. Cobb, entitled: “Establishing Firewall Policy” Pub
`lished by National Computer Security Assn. on Jun. 25-27, 1996,
`pp. 198-205.
`Article by Mark Brown, entitled: “Using NetScape 2” Published by
`Que Corporation 1995, pp. 885-907.
`Article by Douglas Kramer, entitled: “The Java Platform” Published
`by JavaSoft, Inc. May 1996, pp. 1-25.
`Package java.applet http://www-nrg.eelbl.gov/jef/apibook/javam.
`htm, published by Sun Microsystems, Inc. Apr. 1996.
`Package java.net http://www-nrg.eelbl.gov/jef/apibooldjavaf.htm,
`published by Sun Microsystems, Inc. Apr. 1996.
`Servlet Tutorial http://mech.postech.ac.kr/Java/java.sun.com/prod
`uct s/ j eeve s/ CurrentRelease/ doc/ servl etitutorial/ servletitutorial .
`html Aug. 20, 1996.
`Java Servlet Application Programming Interface White Paper,
`Document Version 0.45, URL: http://mech.postech.ac.kr/Java/java.
`sun.com/products/jeeves/CurrentRelease/doc/api.html, Dated: Aug.
`2, 1996, Page(s): 1-6.
`Tanenbaum, Andrew S., “Computer Network”, Third Edition,
`Prentice-Hall 1996, ISBN 0-13-349945-6, Chapter 7, Sections 7.1.4
`to 7.1.6, pp. 597-618.
`Knudsen, Jonathan, “Java Cryptography”, First Edition, O’Reilly &
`Assoc. 1998, ISBN 1-56592-402-9, pp. 79-91.
`Web page: www.verisign.com/press/product/isvhtml, Verisign
`Press Release, “Verisign Enhances Digital IDS to Enable Universal
`Website Login and One-Step Registration”, Nov. 3, 1998, 3 pages.
`Kohl, John T., et al.; “The Evolution of the Kerberos Authentication
`Service”; 1991; pp. 1-15; This paper is a revision of a paper
`presented at the Spring 1991 EurOpen Conference in Tromso,
`Norway.
`Adams, Charlotte; “Multilevel Secure Networking Charges Ahead”;
`Federal Computer Week; Apr. 12, 1993; 5 pages.
`Jaeger, Trent and Atul Prakash; “Implementation of a Discretionary
`Access Control Model for Script-based Systems”; IEEEE Jun.
`1995; 15 pages.
`Radosevich, Linda, “Users want uni?ed mail directories,”
`Computerworld, Aug. 30, 1993, p. 12.
`Bruno, Charles, “Firm pushes E-mail limits beyond rivals’,” Net
`work World, Aug. 12, 1991, pp. 33, 53.
`Sliwa, Carol and Cole, Barb, “MESA declares a groupware
`detente,” Network World, Aug. 5, 1996, p. 29.
`Grosse, Eric, “Repository Mirroring,” ACM Transactions on Math
`ematical Software, vol. 21, No. 1, Mar., 1995, pp. 89-97.
`Schilit, Bill N. and Theimer, Marvin M., “Disseminating Active
`Map Information to Mobile Hosts,” IEEE Network, Sep./Oct. 1994,
`pp. 22-32.
`Levy, Eliezer and Silberschatz, Abraham, “Distributed File Sys
`tems: Concepts and Examples,” ACM Computing Surveys, vol. 22,
`No.4, Dec. 1990, pp. 321-74.
`
`Rymer, John R., “The Muddle in the Middle,” Byte, Apr. 1996, pp.
`67-70.
`Baum, David, “Intranet Politics and Technologies,” Byte, May
`1997, pp. 88A-88H.
`Udell, Jon, “Push Me, Pull You,” Byte, Sep. 1996, pp. 117-120.
`Kador, John, “The Ultimate Middleware,” Byte, Apr. 1996, pp.
`79-83.
`Brown, Mark, “Using Netscape 2,” Que Corporation, 1995, pp.
`885-907.
`Kramer, Douglass, “The Java Platform,” Javasoft, May 1996, pp.
`1-25.
`http://www-nrg.ee.lbl.gov/j4/
`java.net,
`Package java.applet;
`apibooldjavafhtm, javamhtm, Apr. 22, 1996.
`Servlet Tutorial,
`http://mecch.postech.ac.kr/Java/java.sun.com/
`product s/ j eeve s/ current
`release/doc/servletitutorial/
`servletitutorial .htrnl.
`Freier et al., entitled “The SSL Protocol, Version 3.0,” Netscape
`Communications, dated Nov. 18, 1996, pp. 1-59, Downloaded from
`URLIhttp://www.home.netscape.com/eng/ss13/draft302.b<t.
`Java Servlet Application Programming Interface White Paper,
`http://mech.postech.ac.kr/Java.sun.com/products/jeeves/Cur
`rentRelease/doc/apihtml, Aug. 1996, pp. 1-6.
`Singhai, M., “Update transport: A new technique for update syn
`chronization in replicated database systems,” IEEE Transactions on
`Software Engineering, vol. 16, No. 12, dec. 1990, pp. 1325-1336.
`Rao, H. & Skarra, A., “A transparent service for synchronized
`replication across loosely-connected ?le systems,” IEEE Transac
`tions on Software engineering, Apr. 1995, pp. 110-117.
`Crispen, M., “Internet Message Access Protocol - RFC 1730 Ver
`sion 4,” Dec. 1994, pp. 1 -52, http://www.faqs.org/rfcs/rfc1730.
`html.
`Rao, Venkat & Aline, Mary, “Burrowing through ?rewalls,” Dec.
`1996, pp. 1-5, http://java.sun.com/developer/technicalArticles/In
`nerworkings/Burrowing/ .
`Brown, Margaret J ., “The Visto Briefcase Pro Puts Your PIM On the
`Internet,” Ayg. 13, 1998, 1 page, URL:http://www.zdnet.com/zdnn/
`stories/zdnnidisplay/0,3440,341892,00.html.
`Tanenbaum, Andrew, “Computer Networks,” Third Edition,
`Prentice-Hall, 1996, see entire document.
`Knudsen, Jonathan, “Java Cryptography,” O’Reilly, 1998, p. 112,
`160.
`Verisign Press Release, “Virisign Enhances Digital IDS to Enable
`Universal Website Login and One-step Registration,” <www.
`verisign.com/press/prodcutive/isv.html>, especially 2nd paragraph.
`Crispin, M., “IMAP4 Compatibility with IMAP2BIS”, Network
`Working Group RFC 2061, Dec. 1996, XP002154026, <URL:http://
`www.imc.org/rfc2061>, retrieved Nov. 28, 2000, p. 1, last para
`graph.
`“Con?guration of a wireless-connected mobile computer,” IBM
`Technical Disclosure Bulletin, US, IBM Corp., New York, vol. 38,
`No. 4, Apr. 1, 1995, pp. 15-17, XP000516057, ISSN: 0018-8689,
`the whole document.
`Mason, Justin, “Tunneling over HTTP,” Dec. 11, 1996, pp. 1-2
`http://www.netsys.com/?rewalls/?rewalls-9612/0488.html.
`Elgamal, Taher, “The Secure Sockets Layer Protocol (SSL),”
`agenda for the Danvers IETF meeting, Apr. 1995, pp. 1-5 - http://
`www.ietf.cnri .reston.va.us/proceeedings/9Sapr/sec/catelgamal.
`slides.html.
`Research Disclosure: “Provide Auto-Forwarding Based On Criteria
`Selected by the User”; Oct. 1, 1989; 1 page; No. 306; Kenneth
`Mason Publications; XP000085405; ISSN 0374-4353.
`Chan, MC. et al., “Appliaction of Compaction Technique to
`Optimizi ng Wireless Email Transfer,” IEEE Wireless Communi
`cations and Networking Conference 1999, 1535 Section A.
`Crispin, M., “Internet Message Access Protocol Version 4revl,”
`1996 Section 2.3.1.1.
`Jaeger and Prakash, “Implementation of a Discretionary Access
`Control Model for Script-based Systems,” IEEE Jun. 1995.
`Adams, Charlotte, “Multilevel Secure Networking Charges Ahead,”
`Federal Computer Week, Apr. 12, 1993.
`Kohl, John, “The Evolution of the Kerberos Authentication Ser
`vice,” 1991.
`
`VMware Exhibit 1010 Page 3
`
`
`
`US 7,287,271 B1
`Page 4
`
`Young et al., “Deniable Password Snatching: On the Possibility of
`Evasive Electronic Espionage,” 1997, IEEE, pp. 224-35.
`Abel, Amee, “E-mail anywhere,” May 1998, Time, pp. 1-4.
`Satyanarayanan, M., “Integrating Security in a Large Distributed
`System,” ACM Transactions on Computer Systems, vol. 7, No. 3,
`Aug. 1989, pp. 247-80.
`Kistler, James J. and Satyanarayanan, M., “Disconnected Operation
`in the Coda File System,” ACM Transactions on Computer Systems,
`vol. 10, No. 1, Feb. 1992, pp. 3-25.
`Hills, Alex and Johnson, David B., “Wireless Data Network Infra
`structure at Carnegie Mellon University,” IEEE Personal Commu
`nications, 3(1), Feb. 1996.
`Satyanarayanan, Mahadev, “Mobile Information Access,” IEEE
`Personal Communications, Feb. 1996, pp. 26-33.
`Satyanarayanan, Mahadev et al., “Coda: A Highly Available File
`System for a Distributed Workstation Enviroment,” IEEE Transac
`tions on Computers, vol. 39, No. 4, Apr. 1990, pp. 447-59.
`Satyanarayanan, Mahadev, “Scalable, Secure, and Highly Available
`Distributed File Access,” Computer, May 1990, pp. 9-21.
`Mummert, Lily B. et al., “Exploiting Weak Connectivity for Mobile
`File Access,” SIGOPS ’95, Dec. 1995, pp. 143-55.
`Terry, Douglas B. et al., “Managing Update Con?icts in Bayou, a
`Weakly Connected Replicated Storage System,” SIGOPS ’95, Dec.
`1995, pp. 172-183.
`Demers, Alan et al., “The Bayou Architecture: Support for Data
`Sharing among Mobile Users,” Proceeding of the Workshop on
`Mobile Computing Systems and Applications, Santa Cruz, Califor
`nia, Dec. 1994, pp. 2-7.
`Peterson, Karin et al., “Bayou: Replicated Database Services for
`World-wide Applications,” Proceedings Seventh ACM SIGOPS
`European Workshop (EuroSIGOPS ’96), Connemara, Ireland, Sep.
`1996, pp. 275-280.
`Crocker, David H., “RFC822: Standard for ARPA Internet Texi
`Messages,” http://www.w3.org/Protocols/rfc822/.
`Theisen, Tim, “AFS distributed ?lesystem FAQ (1/2),” posted to
`uwisc.general newsgroup, Jul. 25, 1994.
`Theisen, Tim, “AFS distributed ?lesystem FAQ (2/2),” posted to
`uwisc.general newsgroup, Jul. 25, 1994.
`Schubert, Eric, “re: telnet/internet and .
`.
`hp.mpe newsgroup, Jun. 30, 1995.
`Glazman, Daniel, “SOFTWARE: HHTPtool [sic] 1.1, a ?le transfer
`utility over HTTP using PUT and GET,” posted to comp.
`infosystems.www.announce newsgroup, May 17, 1995.
`Glazman, Daniel, “SOFTWARE: HTTPtool v1.0 for Windows3.x,
`?le transfer utility over HTTP,” posted to comp,infosystems.www.
`announce newsgroup, Mar. 21, 1996.
`Angus, Jeffrey G., “Sales force automation has a GoldMine,”
`Computerworld, Oct. 7, 1996, p. 59.
`Salamone, Salvatore, “Middle(ware) Management,” Byte, Apr.
`1996, pp. 71-76.
`Nance, Barry, “Balance the Load with Transaction Server,” Byte,
`Jun. 1997, pp. 81-84.
`Francett, Barbara, “Replication on the Run,” Software Magazine,
`Aug. 1996, pp. 63-66.
`Darling, Charles B., EDNSQL Loses a Little and Gaines a Lot,
`Datamation, May 1, 1996, p. 12.
`Varney, Sarah E., “Arm your salesforce with the Web,” Datamation,
`Oct. 1996, pp. 72-74.
`Fulcher, Jim, “Is it or isn’t?,” Manufacturing Systems, Oct. 1996,
`pp. 56-61.
`Lamb, John and Cusato, Tony, “LAN-Based Of?ce for Enterprise,
`A Case Study,” Proceedings, 19th Conference on Local Computer
`Networks, Minneapolis, Minnesota, Oct. 2-5, 1194, pp. 440-447.
`Kawell Jr., Leonard et al., “Replicated Document Management In A
`Group Communication Systems,” presented at the Second Confer
`ence on Computer-Supported Cooperative Work, Portland, Oregon,
`Sep. 26-28, 1988, as printed in Groupware: Software for Computer
`Supported Cooperative Work, IEEE Computer Society Press, pp.
`226-235.
`Hong, Jack et al., “Personal Electronic Notebook with
`Sharing,”Proceedings of the Fourth Workshop on Enabling Tech
`nologies: Infrastructure for Collaborative Enterprises, Berkeley
`Springs, West Virginia, Apr. 20-22, 1995, pp. 88-94.
`
`. ,” posted to comp.sys.
`
`Mace, Scott, “DataSync 2.0 enhances synchronization of data,”
`InfoWorld, Jun. 6, 1994, p. 28.
`Mace, Scott, “Database replication products debut.” InfoWorld,
`Nov. 15, 1993, p. 19.
`Gryphon, Robert, “DataSync line matches up,” InfoWorld, May 23,
`1994, p. 161.
`Patterson, John F. et al., “Noti?cation Servers for Synchronous
`Groupware,” Proceedings, ACM 1996 Conference on Computer
`Supported Cooperative Work, Boston, Massachusetts, Nov. 16-20,
`1996, pp. 122-129.
`Zhao, Jian and Hoppe, H. Ulrich, “Supporting Flexible Communi
`cation in Heterogeneous Multi-User Environments,” 1994 IEEE,
`pp. 442-449.
`Gong, Li, “Enclaves: Enabling Secure Collaboration Over the
`Internet,” IEEE Journal on Selected Areas in Communications, vol.
`15, No. 3, Apr. 1997, pp. 567-575.
`Bruno, Lee, “Directory Services Tie It All Together,” Data Com
`munications, Mar. 1997, pp. 75-83.
`Guy, Richard G. et al., “Implementation of the Ficus Replicated File
`System,” Proceedings of the Summer 1990 USENIX Conference,
`Anaheim, California, Jun. 11-15, 1990, pp. 63-70.
`Page, Thomas W. Jr. et al., “Management of Replicated Volume
`Location Data in the Ficus Replicated Data System,” Conference
`Proceedings, USENIX Summer 1991 Technical Conference, Nash
`ville, Tennessee, Jun. 10-14, 1991, pp. 17-29.
`Reiher, Peter et al., “Resolving File Con?icts in the Ficus File
`System,” Conference Proceedings, USENIX Summer 1994 Tech
`nical Conference, Boston, Massachusetts, Jun. 6-10, 1994, pp.
`183-195.
`Walker, Bruce et al., “The LOCUS Distributed Operating System,”
`Proceedings of the Ninth ACM Symposium on Operating Systems
`Principles, Bretton Woods, New Hampshire, Oct. 10-13, 1983, pp.
`49-70.
`Parker, D. Stott Jr. et al., “Detection of Mutual Inconsistency in
`Distributed Systems,” IEEE Transactions on Software Engineering,
`vol. SE-9, No. 3, May 1983, pp. 240-256.
`Ceri, Stefano et al., “The Case for Independent Updates”, Second
`Workshop on the Management of Replicated Data, Monterey,
`California, Nov. 12-13, 1992, pp. 17-19.
`Dowing, Alan R. et al., “OSCAR: A System for Weak-Consistency
`Replication”, Proceedings, Workshop on the Mangement of Repli
`cated Data, Houston, Texas, Nov. 8-9, 1990, pp. 26-30.
`Siegel, Alex et al., “Deceit: A Flexible Distributed File System”,
`Proceedings of the Summer 1990 USENIX Conference, Anaheim,
`California, Jun. 11-15, 1990, pp. 51-61.
`Chutani, Sailesh, “The Episode File System”, Conference Proceed
`ings, USENIX Winter 1992 Technical Conference, San Francisco,
`California, Jan. 20-24, 1992, pp. 43-59.
`Seltzer, Margo, “An Implementation of a Log-Structured File
`System for UNIX”, Conference Proceedings, USENIX Winter 1993
`Technical Conference, San Diego, California, Jan. 25-29, 1993, pp.
`307-326.
`Vahalia, Uresh, “Metadata Logging in an NFS Server”, Conference
`Proceedings, USENIX 1995 Technical Conference on UNIX and
`Advanced Computing Systems, New Orleans, Louisiana, Jan.
`16-20, 1995, pp. 265-276.
`Lotus Development Corporation, InterNotes Web Publishers
`Release 4, “InterNotes Web Publisher Guide”, 1996, Cambridge,
`MA.
`Lotus Development Corporation, Lotus Notes Release 4, “Database
`Manager’s Guide”, 1995, Cambridge, MA.
`Lotus Development Corporation, Lotus Notes Release 4, “Admin
`istrator’s Guide”, 1995, Cambridge, MA.
`IBM Lotus Technical Library, Lotus Notes Documentation, “Lotus
`Notes Internet Cookbook for Notes Release 3”, Jan. 16, 1996, pp.
`1-26 http://www-l2/lotus.com/ldd/doc/dominoinotes/cookboold
`cbookv4.nsf/el250032896bf7b3a385256.
`John Wiley & Sons, Inc. - Wiley Computer Publishing, Falkner,
`Mike, “How to Plan, Develop, and Implement Lotus Notes in Your
`Organization”, 1996, USA4.
`Lotus Development Corporation, Lotus Notes Release 4, “Deploy
`ment Guide”, 1995, Cambridge, MA.
`
`VMware Exhibit 1010 Page 4
`
`
`
`US 7,287,271 B1
`Page 5
`
`McGraw-Hill, Lamb, John P. and Lew, Peter W., “Lotus Notes
`Networks Design for Notes Release 3 and 4”, 1996, Quebecor
`Fair?eld, PA.
`Lotus Notes, “Overview - What is Lotus NotesPump?”, including
`“notes Pump 1.0 Release Notes”.
`Lotus Development Corporation, Lotus Notes Release 3.1, The
`groupware standard, “Site and System Planning Guide”, 1994,
`Cambridge, MA.
`Lotus Development Corporation, Lotus Notes Release 3.1. The
`groupwarestandard, “Administrator’s Guide Server for NetWare,
`OS/2, and UNIX”, 1994, Cambridge, MA.
`IBM Lotus Technical Library, Lotus Documentation, “Lotus Notes
`Internet Cookbook for Notes Release 4”, Fe. 14, 1996, pp. 1-30
`http://www-12.lotus.com.ldd.doc.dominoinotes/cookbook/
`cbookv4,nsf/el25003288bf7b3a385256.
`IntelliLink Corporation, IntelliLink for Windows Release 3.0,
`“User’sGuide”, 1994, Nashua, NH.
`Lotus Development Corporation, Lotus Notes Release 4, “Appli
`cation Developer’s Guide”, 1995, Cambridge, MA.
`Lotus Development Corporation, Lotus Notes Release 3.3 North
`American Server Edition, “Lotus Notes, The Groupware Standard”,
`1994, Cambridge, MA.
`Sams Publishing, Dahl, Andrew, “Lotus Notes 4 Administrator’s
`Survival Guide”, 1996, Indianapolis, IN.
`Sams Publishing, Tmaura, et al., “Lotus Notes 4 Unleashed”, 1996,
`Indianapolis, IN.
`Advisor Publications - Lotus Notes Advisor, Pyle, Hugh, “The
`Notes Architecture”, 1995.
`Advisor Pblications - Lotus Notes Advisor, Augun, Adury,
`“Intergrating Lotus Notes with Enetrprise Data”, 1996.
`Advisor Publications - Lotus Notes Advisor, Opyt, Barber and Dale,
`Robert, “Use the Internet as Your Lotus Notes WAN”, 1996.
`Lotus Development Corporation, Lotus Notes Knowledge Base,
`“What is The Notes Replicator?”, 1995, Cambridge, MA.
`Lotus Development Corporation, Lotus Notes Knowledge Base,
`“Firewall Security Overview and how Firewalls Relate to Lotus
`Notes”, 1996, Cambridge, MA.
`Networking Computing, Frenkel, Garry, “Pumping for Info: Notes
`and Database Integration”, 1996.
`IBM Corporation, Hawker, et al., “Secrets to Running Lotus Notes:
`The Decisions No One Tells You How To Make”, 1996, Research
`Triangle Park, NC.
`Lotus Notes Release 4, “Administrator’s Guide,” 1995 Lotus Devel
`opment Corporation, Cambridge, MA.
`Dahl, Andrew, “Lotus Notes 4 Administrator’s Survival Guide,”
`1996 Sams Publishing, Indianapolis, IN.
`P. Grous, “Creating and Managing a Web Site with Lotus’
`InterNotes WebNotes Web Publisher,” The Wew, vol. 1, Issue 4, pp.
`3-18 (Oct/Oct. 1995).
`Lambert, M. “PCMAIL: A Distributed Mail System for Personal
`Computers,” Network Working Group, Jun. 1998.
`
`Kumar, Puneet, “Mitigating the Effects of Optimistic Replication in
`a Distributed File System”, Ph.D, Thesis, School of Comp. Sci.,
`Carnegie Mellon Univ., Dec. 1994.
`Bruegge, Bernd and Bennington, Ben, “Applications of Mobile
`Computing and Communications,” IEEE Personal Communica
`tions, Feb. 1996.
`Husted, Bill “Calling up the Future FCC ruling will change the way
`we use Phones”, The Atlanta Journal and Constitution, Jul. 16,
`1992.
`Lotus Notes Internet Cookbook for Notes Release 3 (Jan 1996).
`L.Pyle, “A Jump start to the Top Ten R3-to-R4 Migration Consid
`erations,” The Wew, vol. 1., Issue 5 pp. 3-20 (Nov/Dec. 1995).
`H. Wong, “Cashahi’s Replic-Action: Delivering True Notes/DBMS
`Integration”, The Wew, vol. 2, Issue 1, pp. 33-50 (Jan/feb. 1996).
`IntelliLink Corporation, IntelliLink for Windows Release 3.0,
`“User’s Guide” 1994, Nashra, NH.
`K, Brown, et al., Mastering Lotus Notes published by Sybex Inc.,
`(1995).
`Lotus Development Corporation, Lotus Notes Released 4, “Appli
`cation Developer’s Guide”, 1995, Cambridge, MA.
`Lotus Develoment Corporation, Lotus Notes Released 3.3 North
`American Server Edition, “Lotus Notes, the Groupware Standard”,
`1994 Cambridge, MA.
`Sams Publishing, Tamura, et al., “Lotus Notes 4 Unleashed”, 1996,
`Indianapolis, IN.
`Advisor Publications - Lotus Notes Advisor, Pyle, Hugh, “the Notes
`Architecture”, 1995.
`Advisor Publications - Lotus Notes Advisor, Augun, Audry, “Inte
`grating Lotus with Enterprise Data”, 1996.
`Advisor Publications - Lotus Notes Advisor, Opyt, Barbara and
`Dale, Robert, “Use the Internet as Your Lotus Notes WAN”, 1996.
`Lotus Development Corporation, Lotus Notes Knowledge Base,
`“What is the Notes Replicator?” 1995, Cambridge, MA.
`Lotus Development Corporation, Lotus Notes Knowledge Base,
`“Firewall Security Overview and How Firewalls relate to Lotus
`Notes” 1996, Cambridge, MA.
`Network Computing, Frenkel, Garry, “Pumping for Infor: Notes and
`Database Integration”, 1996.
`IBM Corporation, Hawker, et al., “Secrets to Running Lotus Notes:
`The Decisions No One Tells You How to Make”, 1996, Research
`Triangle Park, NC.
`IBM Lotus Technical Library, “Lotus Notes Internet Cookbook for
`Notes
`Release
`4”,
`http://www-12.lotus.com/ldd/doc/
`dominoinotes/cookbook/cbookv4.
`nsf;e12503289bf7b3a3852562b3006b8fc5/
`9e9126d61cd7b8b9852562d00070f9b2?OpenDocument.
`HTTP://222-128.ibm.com/deloperworks/lotus/library/ls-NDHis
`tory/, “The History of Lotus notes and Domino”, Dec. 10, 2005.
`US 5,373,559, 12/1994, Kaufman et al. (withdrawn)
`
`* cited by examiner
`
`VMware Exhibit 1010 Page 5
`
`
`
`U.S. Patent
`
`Oct. 23, 2007
`
`Sheet 1 of 8
`
`US 7,287,271 B1
`
`m:N:
`
`Q3I\
`
`E>cmaEoo
`
`00:
`
`ES
`
`__m>>o._u_
`
`lcm__O
`
`oo_>$m
`
`FGE
`
`__m>>m._n_mm;
`
`g
`
`§
`
`Vl\/lware Exhibit 1010 Page 6
`
`VMware Exhibit 1010 Page 6
`
`
`
`
`
`
`U.S. Patent
`
`70023:2LC0
`
`¢I.
`
`S
`
`1B172,M
`
`Em__O
`
`v:
`
`
`
`.\5930:a:_
`
`
`
`sawmo_>on_Tmo_>mo
`
`
`
`
`
`Emamco=mo_::EEoomE2m>w9__§8_owo_>momomtmE_Smmfiowm
`
`
`
`
`
`
`
`fl.mm>>9m
`
`
`
`2mcacmco=mo_::EEoo
`
`
`
`U9m_qq<bzzomw
`
`
`
`£o_na<umumo_Esoo
`
`n,NSE
`
`
`
`osocmE_&<N9
`
`Vl\/lware Exhibit 1010 Page 7
`
`
`
`
`
`mc_m_._m_:o_E>.ocm_EEwE_oh
`
`VMware Exhibit 1010 Page 7
`
`
`
`
`
`U.S. Patent
`
`Oct. 23, 2007
`
`Sheet 3 of 8
`
`US 7,287,271 B1
`
`_mn_o_.0
`
`Eaow
`
`mS\.
`
`9%
`
`
`
`
`
`canoo_>on_ownoo_>on_
`
`59:059:
`
`Em
`
`3&0
`
`Em
`
`8m
`
`omm
`
`
`
`wc_mcm_wco_.mo_c:EEoo
`
`
`
`E9w>m3.980mmm,
`
`
`
`
`
`mwo_>._wmbzsowwmmm.
`
`
`
`._o>$mao>>omm.
`
`mam
`
`wmm
`
`mam
`
`wo_>mn_mmeewEma
`
`
`
`m«m_Qq<>E:owm
`
`m_nmumo_Esoo
`
`.o,§&<
`
`
`
`Emaco:m._:m_.Eoo
`
`
`
`mmm6v<wo_>$m
`
`co:mE.o.E_
`
`
`
`.....9...
`
`m:o:mu_c:EEoo
`
`oomtot:
`
`Vl\/lware Exhibit 1010 Page 8
`
`VMware Exhibit 1010 Page 8
`
`
`
`
`
`U.S. Patent
`
`70023,2LCO
`
`LI.
`
`s,7
`
`1B172,7
`
`mo_Emw
`
`52mm
`
`Q:\.8»
`
`59:0Sn_:_
`
`
`
`mo_>on_omvmo_>on_
`
`
`
`S8»Uvmvemw
`
`mmv_.
`
`
`.ommmoo_n_oo_Ewwmcacm
`
`momtmE_wo_>._wmwoémm
`
`2I
`
`
`
`mmwm:_mcmm:o=mo_c:EEo0
`
`
`
`mE2m>m9__§&o
`
`
`
`Smo_>wowomtmE_
`
`bcaomm0mmw4mcacmmco:mo_c:EEoo
`
`
`
`Qsommv:8vmwmEw__oo._.fmmo_>$m
`
`Vl\/lware Exhibit 1010 Page 9
`
`
`
`
`
`omm.o..mEmamco:mo__.5EEoo
`
`VMware Exhibit 1010 Page 9
`
`
`
`
`U.S. Patent
`
`Oct. 23, 2007
`
`Sheet 5 0f 8
`
`US 7,287,271 B1
`
`(
`
`Start )
`
`500
`f
`
`V
`Create Link Between
`Client and Global Server \ 505
`
`V
`Confirm User
`Access Privileges
`
`ll
`Download Web Page
`Data and Configuration \
`Data from
`515
`Global Server to Client
`
`ll
`Configure Client and
`Display Web Page
`
`ll
`Client User
`Selects a Service \ 525
`
`ll
`Download Corresponding Applet,
`Applet Configuration Data and
`User Data from the Global
`Server to the Client
`
`ll
`Execute the Applet \
`535
`
`ll
`
`Initiate the Service \
`537
`
`ll
`
`Select a Mode of Access \
`538
`
`V
`Provide Accese to the
`Service to the Client User \ 540
`
`ll
`
`FIG. 5
`
`VMware Exhibit 1010 Page 10
`
`
`
`U.S. Patent
`
`0a. 23, 2007
`
`Sheet 6 0f 8
`
`US 7,287,271 B1
`
`(
`
`Start )
`
`505
`V/
`
`V
`Call Global Sewer
`Using Known URL \ 605
`
`607
`ll
`/
`Create Communications
`Channel
`\
`~ 610
`
`v
`.
`Negotiate Secure
`Channel Parameters \\ 615
`
`‘V
`
`Create Secure Channel \
`\ 620
`
`End
`
`FIG. 6
`
`700
`f
`f 770
`710
`Web Page / /
`I
`720
`1. E-Mail
`/ /
`730
`2. Calendaring
`/
`740
`/ 715
`3. Internet Access
`_
`4. Paging
`_
`5. Sending Faxes
`
`750
`/
`f 760
`
`FIG. 7
`
`® [1 540a
`
`ll
`Applet Retrieves Service Address / 805
`and Authentication Information
`
`V
`810
`Client Creates Direct and Secure
`Connection with Service and /
`Uses the Authentication
`lnfomation to Authenticate Itself
`
`V
`Applet Acts as I/O Interface / 875
`with the Service Engine
`
`ll
`End
`
`FIG. 8A
`
`VMware Exhibit 1010 Page 11
`
`
`
`U.S. Patent
`
`Oct. 23, 2007
`
`Sheet 7 0f 8
`
`US 7,287,271 B1
`
`540D /
`
`\ 840
`
`Applet Retrieves Service Address
`Directing it to the Global Server
`l
`
`Applet Creates a Secure
`Connection to the Global Server
`
`l
`
`Global Server Retrieves
`the Service Address and the
`Authentication information
`
`\ 845
`
`-\ 850
`
`i
`
`Global Server Connects to
`the Service and Uses the
`\ 855
`Authentication Information to
`Authenticate Itself as the User
`
`' v
`
`Applet Acts as I/O interface
`with'Global Server
`
`\ 860
`
`Global Server
`Authorized to Perform
`the User’s Request
`?
`
`865
`Y
`es
`
`875
`F
`Global Server
`Acts as Proxy
`to Service
`
`FIG. 8B
`
`VMware Exhibit 1010 Page 12
`
`
`
`U.S. Patent
`
`Oct. 23, 2007
`
`Sheet 8 0f 8
`
`US 7,287,271 B1
`
`(
`
`Start )
`
`V
`Applet Retrieves Service Address
`Direc