throbber
IN THE UNITED STATES PATENT AND TRADEMARK OFFICE
`
`Control Nos.: 95/001,714; 95/001,697
`
`Gm”? A” Um“ 3992
`
`Examiner: Michael J. Yigdall
`
`C°“firma“°“ N05" 3428; 2161
`
`) ) ) ) ) ) ) ) ) )
`
`)
`
`In re Inter Partes Reexaminations of:
`
`Edmund Colby Munger et al.
`
`U. s. Patent No. 7,490,151
`
`Issued: February 10, 2009
`
`For: ESTABLISHMENT OF A SECURE
`COMMUNICATION LINK BASED ON A
`DOMAIN NAME SERVICE (DNS) REQUEST
`
`Mail Stop Inter Partes Reexam
`Commissioner for Patents
`P.O. Box 1450
`Alexandria, VA 22313-1450
`
`DECLARATION OF DR. ROBERT DUNHAM SHORT III
`
`1, Robert Dunham Short III, declare as follows:
`
`1.
`
`I have been the Chief Technology Officer of VirnetX Inc. (“VirnetX”) since June
`
`2010 and the Chief Scientist for VirnetX since May 2007. Prior to joining VirnetX, from 1994 to
`
`April 2007, I held various positions including Assistant Vice President and Division Manager at
`
`Science'Applications International Corporation (“SAIC”). Prior to SAIC, I worked at ARCO Power
`
`Technologies Inc., Sperry Corporate Technology Center, and Sperry Research Center.
`
`I have a Ph.D.
`
`in Electrical Engineering from Purdue University as well as a M.S.
`
`in Mathematics and a B.S. in
`
`Electrical Engineering from Virginia Tech.
`
`2.
`
`I am one of the named inventors of U.S. Patent No. 7,490,151 (“the ’151 patent”),
`
`which I understand is the subject of the above-identified reexamination proceedings.
`
`I am familiar
`
`with the ’l5l patent, including its claims.
`
`3.
`
`Prior to and at the time of the inventions claimed in the ’l5l patent, there was a
`
`significant and increasing concern with the security of computer network communication. The
`
`widespread connectivity between computers that was enabled by the swift increase in network access
`
`in homes and businesses also led to many security breaches as well as concerns regarding the safety of
`
`confidential information sent over computer networks. This problem received significant attention
`
`from the research and development community. Practical experience showed that there was a need
`
`for a system that could be easily and correctly used to enable secure communications, because a
`
`system that made it difficult for an end-user to enable secure communications would likely lead to a
`
`Page 1 of 140
`
`VIRNETX EXHIBIT 2050
`
`Mangrove v. VimetX
`Trial IPR20 15-0 1047
`
`VIRNETX EXHIBIT 2050
`Mangrove v. VirnetX
`Trial IPR2015-01047
`
`Page 1 of 140
`
`

`
`Control Nos. 95/001,714; 95/001,697
`
`lack of use or incorrect use. The inventions disclosed and claimed in the ’151 patent and other patents
`
`in this family met this need. For instance, the inventions disclosed and claimed in the ’15l patent
`
`include systems and methods of automatically initiating an encrypted channel between a client and a
`
`secure server. As an example, independent claim 1 recites “[a] data processing device, comprising
`
`memory storing a domain name server (DNS) proxy module that intercepts DNS requests sent by a
`
`client and, for each intercepted DNS request, performs the steps of:
`
`(i) determining whether the
`
`intercepted DNS request corresponds to a secure server;
`
`. .. and (iii) when the intercepted DNS
`
`request corresponds to a secure server, automatically initiating an encrypted channel between the
`
`client and the secure server.” (’151 patent 46:55-67.) Likewise, independent claim 7 recites “[a]
`
`computer readable medium storing a domain name server (DNS) proxy module comprised of
`
`computer readable instructions that, when executed, cause a data processing device to perform the
`
`steps of:
`
`(i) intercepting a DNS request sent by a client; (ii) determining whether the intercepted DNS
`
`request corresponds to a secure server; .
`
`.
`
`. and (iv) when the intercepted DNS request corresponds to
`
`a secure server, automatically initiating an encrypted channel between the client and the secure
`
`server.” (Id. at 47:25-38.) And, independent claim 13 recites “[a] computer readable medium storing
`
`a domain name server (DNS) module comprised of computer readable instructions that, when
`
`executed, cause a data processing device to perform the steps of:
`
`(i) determining whether a DNS
`
`request sent by a client corresponds to a secure server; .
`
`.
`
`. and (i ii) when the intercepted DNS request
`
`corresponds to a secure server, automatically creating a secure channel between the client and the
`
`secure server.” (Id. at 48:18-29.)
`
`4.
`
`As one example of the manifestation of the long-felt need, the Defense Advanced
`
`Research Projects Agency (“DARPA”) funded various research programs to further the science and
`
`technology of information assurance and survivability. DARPA programs, such as the “Information
`
`Assurance” and “Dynamic Coalitions” programs, were focused on the need to provide easy-to-enable
`
`secure communications.
`
`These projects received significant funding to be spent developing
`
`technologies that could solve this need. For example, one such project entitled “Next Generation
`
`Internet” received funding in fiscal year 1998 of approximately $39.3 million, in fiscal year 1999 of
`
`approximately $49.5 million, and in fiscal year 2000 of approximately $40 million.
`
`(Ex. B-1 at
`
`VNET002l 9302, 319-321.) Another program funded by DARPA, “Dynamic Coalitions,” was created
`
`to address
`
`the ability of the Department of Defense to quickly and easily enable secure
`
`communications over the Internet.
`
`(See, eg., Ex. B-2 at VNET002l9244, 284, 298-299, 593, 625.)
`
`5.
`
`According to DARPA officials at the time, “existing group membership protocols
`
`d[id] not support the security needs of multidimensional organizations. The overarching challenge
`
`Page 2 of 140
`
`

`
`Control Nos. 95/001,714; 95/001,697
`
`[wa]s creating secure groups rapidly. This [wa]s a significant issue when countries [we]re faced with
`
`an operation that require[d] immediate multinational attention.” (Ex. B-3 at l.) DARPA contracted
`
`with some of the most skilled organizations in the area of secured communications in an effort to meet
`
`its security needs (e.g., NAI Labs, a division of PGP Security, Network Associates Incorporated, Los
`
`Angeles, and the Microelectronics Center of North Carolina, Research Triangle Park, North Carolina,
`
`as well as Johns Hopkins University, Baltimore; Northeastern University, Boston; and Veridian-PSR,
`
`Arlington, Virginia).
`
`(Id. at 1.)
`
`In all, more than 15 organizations were researching the various
`
`components that made up the programs initiated by the Department of Defense.
`
`(]a’.) However, none
`
`of these prestigious institutions came up with a solution, during the relevant time frame, close to what
`
`is disclosed and claimed in the ’l5l patent.
`
`(Id. at 1-4.) That is, they did not develop a solution that
`
`automatically initiated an encrypted channel between a client and a secure server when an intercepted
`
`DNS request sent by the client corresponds to a secure server.
`
`6.
`
`As a second example of the long—felt need for the inventions of the ’l5l patent,
`
`In—Q-Tel, which is a venture capital
`
`firm that
`
`invests in companies developing cutting edge
`
`technology aimed at supporting the United States intelligence community,
`
`including the Central
`
`Intelligence Agency (CIA), funded the original development of the technology with approximately
`
`$3.4 million.
`
`In~Q-Tel’s willingness to enter into a relationship with SAIC (the original assignee of
`
`the application that led to the ’l51 patent) for the development of this technology further evidences a
`
`long-felt need for technology that made it easy and convenient to enable secure communications.
`
`7.
`
`A third example was the extent to which SAIC internally funded the research and
`
`development of the technology. When I was employed at SAIC, its business model was to sell hours
`
`to the federal government. SAIC was not structured to bring products to the market, which typically
`
`requires significant internal investments in research and development.
`
`In an average year during the
`
`development of the technology that led to the ’l51 patent, SAIC would spend approximately $2
`
`million on internal research and development efforts.
`
`In the case of the technology claimed in the
`
`’l5l patent, SAIC invested $1.7 million, which represents almost the entirety of SAIC’s internal
`
`research and development budget for one whole year. A technology review committee also approved
`
`our team’s patent development efforts and costs on an ongoing basis. A third party (Cambridge
`
`Strategic Management Group or CSMG) also substantiated the value of the technology. Moreover, a
`
`significant percentage of all of SAIC’s patent development efforts have focused on this technology.
`
`I
`
`understand that SAIC spent one—third of its total patent portfolio efforts on our patent portfolio at that
`time.
`
`Page 3 of 140
`
`

`
`Control Nos. 95/001,714; 95/001,697
`
`8.
`
`In fact, as demonstrated in an article written before the claimed inventions of the ’l5 I
`
`patent,
`
`it was widely recognized that providing secure remote access to a LAN or WAN was
`
`extremely difficult for IT support desks.
`
`(Ex. B-4 at 1.)
`
`In that time period, remote access was “a
`
`nightmare for support desks. Staffers never kn[e]w what combination of CPU, modem, operating
`
`system and software configuration they [were] going to have to support,” and adding the
`
`commercially-available VPN software only made matters worse. (Int)
`
`9.
`
`This article precisely captured the computer and Internet security industry’s attitude
`
`toward the tradeoff between the ease of use of a secure system, such as a VPN system, for the average
`
`computer user and the security that the VPN system provided. The article recognized that the “ease of
`
`installation isn’t always a good thing:
`
`In many cases, the easier the client is to install, the less secure
`
`it is.” (Id. at 2.) The claimed inventions of the ‘I51 patent, which provide systems and methods of
`
`automatically initiating an encrypted channel between a client and a secure server, com bine both ease
`
`of use and security aspects without sacrificing one or the other.
`
`10.
`
`Moreover, many others before and around the time of the inventions claimed in the
`
`’15l patent have attempted to solve the need of easy-to-use methods of enabling secure
`
`communications over the Internet. But, as discussed above, many of these attempts have failed. For
`
`example, despite investing enormous amounts of money and enlisting the resources of numerous
`
`prestigious institutions and their talented employees, DARPA’s projects still fell far short of the
`
`claimed inventions of the ’ 1 S l patent. (See 1H] 4-5, supra.)
`
`11.
`
`Additionally, as discussed above, no one had yet achieved the results of the claimed
`
`inventions of the ’l51 patent in that time period, because remote access was “a nightmare” for support
`
`desks to handle, and adding the commercially-available VPN software was even more difficult.
`
`In
`
`fact, at this time, the security industry generally viewed ease of use and VPN security as mutually
`
`exclusive.
`
`(See W 8-9, supra.) By providing systems and methods of automatically initiating an
`
`encrypted channel between a client and a secure server, the inventions of the ’l5l patent provided a
`
`solution for easily establishing secure communication links without sacrificing security,
`
`thereby
`
`succeeding where others failed.
`
`12.
`
`The claimed inventions of the ’l5l patent have been commercially successful, for
`
`example, through the licensing revenues they have generated for VirnetX.
`
`In July 2002, SafeNet, a
`
`leading provider of Internet security technology that is the de facto standard in the VPN industry,
`
`entered into a portfolio license with SAIC to incorporate features into SafeNet’s underlying VPNS.
`
`SafeNet licensed the patents because of features disclosed and claimed in the patents, including those
`
`in the ’151 patent. Microsoft has also entered into a similar license that includes the ’15l patent.
`
`Page 4 of 140
`
`

`
`Control Nos. 95/001,714; 95/001,697
`
`Microsoft entered into its license with VirnetX after it was found to have infringed two other VirnetX
`
`patents in the same family, resulting in a damages award of over one hundred million dollars, leading
`
`ultimately to a license agreement of two hundred million dollars. And on May 3, 2012, Aastra USA,
`
`Inc. entered into a license with VirnetX that includes the ’l51 patent. Likewise, on July 11, 2012,
`
`Mitel Networks Corporation entered into a license with VirnetX that also includes the ’l5l patent.
`
`13.
`
`The claimed inventions of the ’151 patent were also contrary to the accepted wisdom
`
`at the time of the inventions. For example, there was a general understanding that reliable security
`
`could only be achieved through difficult-to—provision VPNs and easy-to-set-up connections could not
`
`be secure. This belief was reinforced by the IT offices of many large companies and institutions,
`
`whose livelihood depended on the need for highly-trained specialists to arrange secure network
`connections.
`
`14.
`
`The industry had long accepted as a fact that secure systems, such as VPN systems,
`
`would be difficult
`
`to set up, and the secure communication modes could not be easily and
`
`conveniently enabled.
`
`In a 1999 article entitled “CEOs Chew the VPN Fat” that predicted what the
`
`future held for the start-up companies that developed VPNS, the wish list did not even address the type
`
`of solutions provided by the ’ 151 patent, such as systems and methods for automatically initiating an
`
`encrypted channel between a client and a secure server. (Ex. B-5 at 1-2.)
`
`15.
`
`The technology of the ’151 patent was also met with skepticism by those skilled in
`
`the art who learned of our inventions. Sami Saydjari, a program manager for DARPA, informed
`
`Edmund Munger, a co-inventor of the ’151 patent, that our technology would never be adopted.
`
`Moreover, the IT offices of many large companies and institutions expressed skepticism that secure
`
`connections could ever be enabled easily by regular computer users.
`
`16.
`
`Several events also demonstrate praise for the inventions in the ’ 151 patent by those
`
`in the field. As discussed above, SAIC invested a disproportionately large percentage of its internal
`
`resources in the technology. SafeNet, Microsoft, and Aastra have all licensed the technology of the
`
`’151 patent. A study done by CSMG also praised the inventions.
`
`Jim Rutt at Network Solutions,
`
`which was acquired by Verisign, praised and expressed significant interest in the technology and
`would have invested but for a change in circumstances at his company.
`
`Page 5 of 140
`
`

`
`Control Nos. 95/001,714; 95/001,697
`
`17.
`
`I declare that all statements made herein of my own knowledge are true and that all
`
`statements made on information and belief are believed to be true, and further, that these statements
`
`were made with the knowledge that willful false statements and the like so made are punishable by
`
`fine or imprisonment, or both, under Section 1001 of Title 18 of the United States Code, and that such
`
`willful false statements may jeopardize the Validity of the ’151 patent.
`
`Dated: July 19, 2012
`
`By:
`
`/Robert Dunham Short 111/
`
`Robert Dunham Short 111
`
`Page 6 of 140
`
`

`
`EXHIBIT
`EXHIBIT
`B-1
`B-1
`
`Page 7 of 140
`
`

`
`UNCLASSIFIED
`
`Department of Defense FY 2000/2001 Biennial Budget Estimates
`February 1999
`
`RESEARCH, DEVELOPMENT, TEST AND EVALUATION, DEFENSE-WIDE
`Volume 1- Defense Advanced Research Projects Agency
`
`UNCLASSIFIED
`
`Approved for Public Release
`Distribution Unlimited
`
`EXHIBITB-1
`
`< z
`m
`--i
`0
`0
`1\.)
`....,),.
`«>
`(..)
`0
`0
`
`Page 8 of 140
`
`

`
`DEFENSE ADVANCED RESEARCH PROJECTS AGENCY
`
`Table of Contents for Volume I
`
`Table of Contents (by PE Number)
`Table of Contents (Alphabetical)
`R-1 Exhibit for DARPA
`
`Table of Contents (by PE Number)
`
`R-02
`R-07
`R-12
`R-13
`R-14
`R-16
`R-17
`R-18
`R-32
`R-41
`R-43
`R-48
`R-49
`R-50
`R-51
`R-52
`R-121
`
`0601101E
`0602110E
`0602301E
`0602302E
`0602383E
`0602702E
`0602708E
`0602712E
`0603285E
`0603739E
`0603747E
`0603760E
`0603761E
`0603762E
`0603763E
`0603764E
`0605898E
`
`Defense Research Sciences
`Next Generation Internet
`Computing Systems & Communications Technology
`Extensible Information Systems
`Biological Warfare Defense
`Tactical Technology
`Integrated Command and Control Technology
`Materials and Electronics Technology
`Advanced Aerospace Systems
`Advanced Electronics Technologies
`Electric Vehicles
`Command, Control and Communications Systems
`Communication and Simulation Technology
`Sensor and Guidance Technology
`Marine Technology
`Land Warfare Technology
`Management Headquarters
`
`< z
`m
`-1
`0
`
`0 "' ~
`
`<.0
`(N
`0
`
`~
`
`Page 9 of 140
`
`

`
`DEFENSE ADVANCED RESEARCH PROJECTS AGENCY
`
`Table of Contents (Alphabetical)
`
`Table of Contents (Alphabetical)
`
`0603285E
`0603739E
`0602383E
`0603760E
`0603761E
`0602301E
`0601101E
`0603747E
`0602302E
`0602708E
`0603764E
`0605898E
`0603763E
`0602712E
`0602110E
`0603762E
`0602702E
`
`Advanced Aerospace Systems
`Advanced Electronics Technologies
`Biological Warfare Defense
`Command, Control and Communications Systems
`Communication and Simulation Technology
`Computing Systems & Communications Technology
`Defense Research Sciences
`Electric Vehicles
`Extensible Information Systems
`Integrated Command and Control Technology
`Land Warfare Technology
`Management Headquarters
`Marine Technology
`Materials and Electronics Technology
`Next Generation Internet
`Sensor and Guidance Technology
`Tactical Technology
`
`< z
`m
`~
`0
`
`<.0
`(;.)
`
`0 "' ...lo.
`0 "'
`
`Page 10 of 140
`
`

`
`DEFENSE ADVANCED RESEARCH PROJECTS AGENCY
`RESEARCH, DEVELOPMENT, TEST AND EVALUATION, DEFENSE-WIDE
`PEJPROJECT LEVEL SUMMARY REPORT
`{$ in millions)
`
`LINE NUMBER PE
`
`TITLE
`
`FY '1998
`
`FY 1999
`
`FY 2000
`
`FY 2001
`
`2
`
`7
`
`12
`
`13
`
`14
`
`16
`
`17
`
`18
`
`32
`
`0601101E
`
`DEFENSE RESEARCH SCIENCES
`
`0602110E
`
`NEXT GENERATION INTERNET
`
`66.706
`
`39.313
`
`64.429
`
`49.504
`
`64.293
`
`40.000
`
`68.792
`
`0.000
`
`0602301E
`
`COMPUTING SYS & COMM TECHNOLOGY
`
`296.646
`
`323.959
`
`322.874
`
`331.023
`
`0602302E
`
`EXTENSIBLE INFORMATION SYSTEMS
`
`0602383E
`
`BIOLOGICAL WARFARE DEFENSE
`
`0.000
`
`58.452
`
`0.000
`
`70.000
`
`70.000
`
`84.754
`
`145.850
`
`151.000
`
`0602702E
`
`TACTICAL TECHNOLOGY
`
`140.997
`
`169.759
`
`137.626
`
`123.937
`
`0602708E
`
`INTERGRATED COMMAND & CONTROL TECH
`
`43.994
`
`39.607
`
`31.296
`
`32.000
`
`0602712E
`
`MATERIALS & ELECTRONICS TECHNOLOGY
`
`213.386
`
`278.286
`
`235.321
`
`219.063
`
`0603285E
`
`ADVANCED AEROSPACE SYSTEMS
`
`0.000
`
`0.000
`
`19.664
`
`19.000
`
`272.020
`
`41
`
`42
`
`43
`
`48
`
`49
`
`50
`
`51
`
`52
`
`53
`
`54
`
`0603739E
`
`ADVANCED ELECTRONICS TECHNOLOGY
`
`265.442
`
`246.023
`
`233.198
`
`0603746E
`
`MARITIME TECHNOLOGY
`
`0603747E
`
`ELECTRIC VEHICLES
`
`32.750
`
`15.000
`
`0.000
`
`9.000
`
`0.000
`
`0.000
`
`0.000
`
`0.000
`
`0603760E
`
`COMMAND, CONT'L & COMMUNICATION SYS
`
`147.525
`
`177.492
`
`222.888
`
`213.380
`
`0603761E
`
`COMMUNICATION & SIMULATION TECH
`
`70.165
`
`52.258
`
`0.000
`
`0.000
`
`0603762E
`
`SENSOR & GUIDANCE TECHNOLOGY
`
`160.881
`
`209.971
`
`232.319
`
`211.893
`
`0603763E
`
`MARINE TECHNOLOGY
`
`0603764E
`
`LAND WARFARE TECHNOLOGY
`
`0603765E
`
`CLASSIFIED
`
`0603800E
`
`JOINT STRIKE FIGHTER PROGRAM
`
`19.597
`
`79.319
`
`124.194
`
`21.134
`
`23.659
`
`88.613
`
`50.040
`
`0.000
`
`22.538
`
`97.825
`
`77.780
`
`0.000
`
`21.964
`
`101.376
`
`49.600
`
`0.000
`
`FY 2000/01 Pres Bud R-1 Exhibit
`
`<
`z
`m
`-f
`0
`0
`N
`....I.
`(.0
`CN
`0
`CN
`
`Page 11 of 140
`
`

`
`DEFENSE ADVANCED RESEARCH PROJECTS AGENCY
`RESEARCH, DEVELOPMENT, TEST AND EVALUATION, DEFENSE-WIDE
`PEiPROJECT LEVEL SUMMARY REPORT
`{$in millions)
`
`LINE NUMBER PE
`
`TITLE
`
`FY '1998
`
`FY 1999
`
`FY 2000
`
`FY 2001
`
`55
`
`102
`
`114
`
`121
`
`123
`
`0603805E
`
`DUAL USE APPLICATIONS PROGRAMS
`
`0605114E
`
`BLACKLITE
`
`0605502E
`
`SMALL BUSINESS
`
`0605898E
`
`MANAGEMENT HEADQUARTERS (R&D)
`
`0909999E
`
`CANCELLED ACCOUNTS
`
`115.784
`
`4.522
`
`45.869
`
`35.633
`
`0.146
`
`0.000
`
`4.985
`
`0.000
`
`38.498
`
`0.000
`
`0.000
`
`5.000
`
`0.000
`
`31.387
`
`0.000
`
`0.000
`
`5.000
`
`0.000
`
`32.632
`
`0.000
`
`AGENCY TOTAL
`
`2,004.033
`
`1,930.256
`
`2,002.684
`
`1,883.858
`
`TOTAL
`TOTAL
`TOTAL
`TOTAL
`
`66.706
`792.788
`1,058.369
`86.170
`
`64.429
`945.869
`876.475
`43.483
`
`64.293
`982.967
`919.037
`36.387
`
`68.792
`927.023
`850.411
`37.632
`
`AGENCY TOTAL
`
`2,004.033
`
`1,930.256
`
`2,002.684
`
`1,883.858
`
`< z
`m
`-;
`0
`0
`1\)
`.....lo.
`CD
`c..>
`0
`~
`
`FY 2000/01 Pres Bud R-1 Exhibit
`
`Page 12 of 140
`
`

`
`UNCLASSIFIED
`
`RDT&E BUDGET ITEM JUSTIFICATION SHEET (R-2 Exhibit)
`
`I DATE
`
`February 1999
`
`APPROPRIATION/BllDGET ACTIVITY
`RDT &E, Defense-wide
`BA1 Basic Research
`
`R-1 ITEM NOMENCLATURE
`Defense Research Sciences
`PE 0601101E, R1 #2
`
`COST (In Millions)
`
`FY 1998 FY 1999 FY 2000 FY 2001 FY 2002 FY 2003 FY 2004 FY 2005 Cost To
`Complete
`
`Total Cost
`
`Total Program Element (PE) Cost
`Information Sciences CCS-02
`Electronic Sciences ES-01
`Materials Sciences MS-01
`
`66.706
`
`16.376
`36.192
`14.138
`
`64.429
`
`18.627
`20.322
`25.480
`
`64.293
`
`19.002
`23.124
`22.167
`
`68.792
`
`19.500
`29.339
`19.953
`
`69.837
`
`19.700
`29.084
`21.053
`
`75.398
`
`19.700
`34.645
`21.053
`
`78.259
`
`20.700
`35.506
`22.053
`
`81.118
`
`Continuing Continuing
`
`21.700
`36.365
`23.053
`
`Continuing Continuing
`Continuing Continuing
`Continuing Continuing
`
`(U)
`
`Mission Description:
`
`The Defense Research Sciences Program Element is budgeted in the Basic Research Budget Activity because it provides the teclnical
`(U)
`foundation for long-term improvements through the discovery of new phenomena and the exploration of the potential of such phenomena for
`national security applications. It supports the scientific study and experimentation that is the basis for more advanced knowledge and understanding
`in information, electronic and materials sciences.
`
`The Information Sciences project supports basic scientific study and experimentation in information sciences technology areas such as
`(U)
`computational models, Quantum Computing, biological computing and human-language systems.
`
`The Electronic Sciences project explores and demonstrates electronic and optoelectronic devices, circuits and processing concepts that will
`(U)
`provide: (1) new technical options for meeting the information gathering, transmission and processing required to maintain nea--real time
`knowledge of the enemy and the ability to communicate decisions based on that knowledge to all forces in near-real time; and (2) a substantial
`increase in performance and cost reduction of military systems providing these capabilities.
`
`The Materials Sciences project is concerned with the development of: high power density/high energy density mobile and portable power
`(U)
`sources; processing and design approaches for nanoscale and/or biomolecular materials and interfaces; medical pathogen countermeasures; materials
`and measurements for molecular-scale electronics; advanced thermoelectric materials for cooling and power generation; and novel propulsion
`concepts.
`
`UNCLASSIFIED
`
`< z
`m
`-1
`0
`0 rv __,
`
`<.0
`(..)
`0
`0'1
`
`Page 13 of 140
`
`

`
`UNCLASSIFIED
`
`RDT&E BUDGET ITEM JUSTIFICATION SHEET (R-2 Exhibit)
`
`I DATE
`
`February 1999
`
`APPROPRIATION/BUDGET ACTIVITY
`RDT &E, Defense-wide
`BA1 Basic Research
`
`R-1 ITEM NOMENCLATURE
`Defense Research Sciences
`PE 0601101E
`
`(U)
`
`Program Change Summary: (In Millions)
`
`FY 1998
`
`FY 1999
`
`FY 2000
`
`Previous President's Budget
`
`Current Budget
`
`68.332
`
`66.706
`
`65.102
`
`64.429
`
`65.400
`
`64.293
`
`FY 2001
`
`70.036
`
`68.792
`
`(U)
`
`Change Summary Explanation:
`
`FY 1998
`FY 1999
`FY 2000/01
`
`Decrease reflects SBIR reprogramming and minor realignment of program priorities.
`Decrease reflects reductions associated with Congressional adjustments.
`Decreases reflect reductions associated with lower projected inflation rates.
`
`< z
`m
`-1
`0
`0
`1\.)
`--lo.
`«>
`eN
`0
`0>
`
`UNCLASSIFIED
`
`Page 14 of 140
`
`

`
`UNCLASSIFIED
`
`RDT &E BUDGET ITEM JUSTIFICATION SHEET (R-2 Exhibit)
`
`I DATE
`
`February 1999
`
`APPROPRIA TION/BllDGET ACTIVITY
`RDT &E, Defense-wide
`BA1 Basic Research
`
`COST (In Millions)
`
`FY 1998 FY 1999 FY 2000 FY 2001 FY 2002 FY 2003 FY 2004 FY 2005
`
`R-llTEM NOMENCLATURE
`Defense Research Sciences
`PE 0601101E, Project CCS-02
`Cost To
`Complete
`
`Total Cost
`
`Information Sciences CCS-02
`
`16.376
`
`18.627
`
`19.002
`
`19.500
`
`19.700
`
`19.700
`
`20.700
`
`21.700 Continuing Continuing
`
`(U)
`
`Mission Description:
`
`This project supports scientific study and experimentation that is the basis for more advanced knowledge and understanding in information
`(U)
`sciences technology areas related to long-term national security requirements such as computational models and new mechanisms for performing
`computation and communication involving quantum physics, biological and optical processes. This project is also exploring innovative approaches
`to the composition of software and novel human computer interface technologies.
`
`In the area of quantum computing, the project will identify and probe new classes of computing technologies, which may offer spectacular
`(U)
`performance/cost/size/weight/power improvements beyond the ultimate limitations of today' s semiconductor-based computing. Quantum logic,
`based on subatomic scale physical phenomena, could enable a tremendous leap in computational capacity. However, a number of significant
`hurdles, including the development of sequencing mechanisms, large scale storage, input/output channels and quantum-enabled approaches to
`algorithms and error correction must be overcome.
`
`In the area of biological computing, the project will support the scientific study and experimentation that is at the interface of information
`(U)
`technology and biological technology, with emphasis on biological software, computation based on biological materials, physical interfaces between
`electronics and biology, and interactive biology. It will also apply information technology to accelerate the analysis and synthesis of biological
`processes. The seamless integration of information technology and biological processes will provide the ability to exert computational control over
`biological and chemical processes.
`
`In the area of optical communication and computing, the project will explore new approaches to transmission based on solitons and
`(U)
`identify novel buffering technologies that can be substituted for optical delay lines.
`
`(U)
`
`In the areas of software engineering, the project will investigate formal techniques for the construction of safety critical systems.
`
`UNCLASSIFIED
`
`< z
`m
`-1
`0
`0
`1\J
`....loo
`(0
`(...)
`0
`-......1
`
`Page 15 of 140
`
`

`
`UNCLASSIFIED
`
`RDT &E BUDGET ITEM JUSTIFICATION SHEET (R-2 Exhibit)
`
`'DATE
`
`February 1999
`
`APPROPRIATION/BUDGET ACTIVITY
`RDT &E, Defense-wide
`BA1 Basic Research
`
`R-liTEM NOMENCLATURE
`Defense Research Sciences
`PE 0601101E, Project CCS-02
`
`In the area of human computer interfaces the project will study information management, interface technologies and their relationship to
`(U)
`cognitive processes.
`
`(U)
`
`(U)
`
`•
`•
`•
`•
`
`Program Accomplishments and Plans:
`
`FY 1998 Accomplishments:
`
`Investigated computational models suitable for implementation using Quantum computing techniques. ($ 5.681 Million)
`
`Developed architecture for low-power configurable computational elements. ($ 1.303 Million)
`
`Prototyped robust spoken and text language technologies with emphasis on affordable granunars and understanding. ($ 7.479 Million)
`
`Evaluated quality of service specifications; demonstrated real-time adaptive control and resource management; released version of
`defense-critical software based on scalable library technology.
`($ 1.913 Million)
`
`(U)
`
`FY 1999 Plans:
`
`•
`
`•
`•
`•
`
`Demonstrate and validate computing models, with emphasis on: DNA-based logic operations and cell-based computation .
`($ 4.410 Million)
`
`Investigate novel control mechanisms for self-organizing and autonomous systems. ($ 2.779 Million)
`
`Demonstrate human-computer interaction for crisis planning. ($ 3.690 Million)
`
`Investigate feedback-driven approaches to information management.
`
`($ 6.241 Million)
`
`UNCLASSIFIED
`
`< z
`m
`-1
`0
`0
`I'V
`
`-\, c.o w
`
`0
`(X)
`
`Page 16 of 140
`
`

`
`UNCLASSIFIED
`
`RDT&E BUDGET ITEM JUSTIFICATION SHEET (R-2 Exhibit)
`
`APPROPRIATION/BUDGET ACTIVITY
`RDT &E. Defense-wide
`BAl Basic Research
`
`'DATE
`
`February 1999
`R-1 ITEM NOMENCLATURE
`Defense Research Sciences
`PE 0601101E, Project CCS-02
`
`•
`
`Validate low-power configurable architecture; develop supporting software; and demonstrate automated mapping of 500K elements .
`($ 1.507 Million)
`
`(U)
`
`FY 2000 Plans:
`
`•
`
`•
`
`•
`
`Biological Computing. ($ 5.902 Million)
`Evaluate alternative approaches to DNA-based computing and identify the most promising research opportunities for enhancement
`and acceleration.
`Explore mechanisms for sequencing of DNA-based computations.
`Investigate novel approaches to real-time biological instrumentation in support of interactive biology.
`
`Quantum and Optical Computing. ($ 4.000 Million)
`Develop new algorithms for quantum-enabled computation.
`Design sequencing and input/output mechanisms for quantum computing.
`Identify alternative optical buffering technologies.
`
`Software Engineering and Human Computer Interface. ($ 9.100 Million)
`Investigate design of domain specific languages for use in safety critical systems.
`Investigate machine translation and relevance of new results in cognitive science research to spoken language and haptic interfaces.
`
`(U)
`
`FY 2001 Plans:
`
`•
`
`($ 6.900 Million)
`Biological Computing.
`Prototype demonstration of robot control sequencing of DNA-based computations.
`Demonstrate real-time multi-sensor imaging of cell processes in support of interactive biology.
`
`< z
`m
`-i
`0
`0
`....
`1\)
`
`<0
`V>
`0
`<0
`
`UNCLASSIFIED
`
`Page 17 of 140
`
`

`
`UNCLASSIFIED
`
`RDT &E BUDGET ITEM JUSTIFICATION SHEET (R-2 Exhibit)
`
`I DATE
`
`February 1999
`
`APPROPRIATION/BUDGET ACTIVITY
`RDT &E, Defense-wide
`BA 1 Basic Research
`
`R-1 ITEM NOMENCLATURE
`Defense Research Sciences
`PE 0601101E, Project CCS-02
`
`•
`
`•
`
`Quantum and Optical Computing. ($ 4.000 Million)
`Simulate new algorithlllS for quantum-enabled computation and evaluate potential speed-up over conventional methods.
`Prototype demonstration of sequencing and input/output mechanislllS enabling quantum computing.
`Laboratory demonstration of soliton-based packet multiplexing, incorporating optical buffering.
`
`Software Engineering and Human Computer Interface. ($ 8.600 Million)
`Develop formal methods to support domain specific languages for use in safety critical systems.
`Investigate interface technologies to facilitate the tasking and management of autonomous systems.
`
`(U)
`
`Other Program Funding Summary Cost:
`
`•
`
`Not Applicable .
`
`(U)
`
`Schedule Profile:
`
`•
`
`Not Applicable .
`
`< z
`m
`-1
`0
`0
`I'V
`~
`<.0 w
`0
`
`~
`
`UNCLASSIFIED
`
`Page 18 of 140
`
`

`
`UNCLASSIFIED
`
`RDT&E BUDGET ITEM JUSTIFICATION SHEET (R-2 Exhibit)
`
`I DATE
`
`February 1999
`
`APPROPRIA TIONIBUDGET ACTIVITY
`RDT &E, Defense-wide
`BA1 Basic Research
`
`COST (In Millions)
`
`FY 1998 FY 1999 FY 2000 FY 2001 FY 2002 FY 2003 FY 2004 FY 2005
`
`R-1 ITEM NOMENCLATURE
`Defense Research Sciences
`PE 0601101E, Project ES-01
`Cost To
`Complete
`
`Total Cost
`
`Electronic Sciences ES-01
`
`36.192
`
`20.322
`
`23.124
`
`29.339
`
`29.084
`
`34.645
`
`35.506
`
`36.365 Continuing Continuing
`
`(U)
`
`Mission Description :
`
`This project seeks to continue the phenomenal progress in microelectronics innovation that has characterized the last decades by exploring
`(U)
`and demonstrating electronic and optoelectronic devices, circuits and processing concepts that will: 1) provide new technical options for meeting the
`information gathering, transmission and processing required to maintain near real-time knowledge of the enemy and the ability to communicate
`decisions based on that knowledge to all forces in near real-time; and 2) provide new means for achieving substantial increases in perfonnance and
`cost reduction of military systems providing these capabilities. Research areas include new electronic and optoelectronic device and circuit
`concepts, operation of devices at higher frequency and lower power, extension of diode laser operation to new wavelength ranges relevant to
`military missions, development of uncooled and novel infrared detector materials for night vision and other sensor applications, development of
`innovative optical and electronic technologies for interconnecting modules in high performance systems, research to realize field portable electronics
`with reduced power requirements and research addressing affordability and reliability. Additionally, electronically controlled microinstruments
`offer the possibility of nanometer-scale probing, sensing and manipulation for ultra-high density information storage "on-a-chip", for nanometer(cid:173)
`scale patterning, and for mo

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket