throbber
UNITED STATES PATENT AND TRADEMARK OFFICE
`
`BEFORE THE PATENT TRIAL AND APPEAL BOARD
`
`
`Limelight Networks, Inc.,
`Petitioner
`
`v.
`
`Akamai Technologies, Inc.,
`Patent Owner.
`
`
`
`
`
`
`Patent No. 7,693,959 to Leighton et al.
`
`IPR Case No. IPR2017-00249
`
`Declaration of Michael J. Freedman, Ph.D.
`
`
`
`1
`
`
`
`
`
`Petitioner Limelight - LN1003
`
`

`
`TABLE OF CONTENTS
`
`TABLE OF CONTENTS
`
`II.
`
`RETENTION & COMPENSATION ........................................................... ..8
`
`III. MATERIAL CONSIDERED ....................................................................... ..8
`
`IV.
`
`OVERVIEW AND LEGAL STANDARDS ................................................ ..9
`
`V.
`
`DESCRIPTION OF THE RELEVANT FIELD AND THE
`
`RELEVANT TIME FRAME ..................................................................... .. 10
`
`VI.
`
`LEVEL OF ORDINARY SKILL IN THE ART ........................................ ..11
`
`VII. OVERVIEW OF THE ’959 PATENT ....................................................... ..13
`
`Declaration of Michael J. Freedman, Ph.D. ........................................................... 1 
`Declaration of Michael J. Freedman, Ph.D .......................................................... ..1
`BACKGROUND AND QUALIFICATIONS ................................................ 4 
`I. 
`BACKGROUND AND QUALIFICATIONS .............................................. ..4
`I.
`RETENTION & COMPENSATION ............................................................. 8 
`II. 
`III.  MATERIAL CONSIDERED ......................................................................... 8 
`IV.  OVERVIEW AND LEGAL STANDARDS .................................................. 9 
`V. 
`DESCRIPTION OF THE RELEVANT FIELD AND THE
`RELEVANT TIME FRAME ....................................................................... 10 
`LEVEL OF ORDINARY SKILL IN THE ART .......................................... 11 
`VI. 
`VII.  OVERVIEW OF THE ’959 PATENT ......................................................... 13 
`A.  The Challenged Claims ................................................................................ 15 
`A.
`The Challenged Claims .............................................................................. .. 15
`1.  Claim 1 ......................................................................................................... 15 
`2.  Claim 2 ......................................................................................................... 16 
`3.  Claim 4 ......................................................................................................... 17 
`4.  Claim 9 ......................................................................................................... 17 
`5.  Claim 10 ....................................................................................................... 17 
`6.  Claim 11 ....................................................................................................... 17 
`7.  Claim 12 ....................................................................................................... 17 
`8.  Claim 15 ....................................................................................................... 18 
`9.  Claim 16 ....................................................................................................... 18 
`10.  Claim 26 ....................................................................................................... 18 
`11.  Claim 28 ....................................................................................................... 18 
`12.  Claim 58 ....................................................................................................... 18 
`VIII.  BACKGROUND TECHNOLOGIES .......................................................... 19 
`A.  HTTP and URLs ........................................................................................... 19 
`B.  DNS, DNS resolution, and local name servers ............................................ 20 
`B. DNS, DNS resolution, and local name servers .......................................... ..2O
`IX. 
`THE SCOPE AND CONTENT OF THE PRIOR ART ............................... 28 
`
`VIII. BACKGROUND TECHNOLOGIES ........................................................ .. 19
`
`1. Claim 1 ....................................................................................................... ..15
`
`2. Claim 2 ....................................................................................................... .. 16
`
`3. Claim 4 ....................................................................................................... .. 17
`
`4. Claim 9 ....................................................................................................... .. 17
`
`5. Claim 10 ..................................................................................................... ..17
`
`6. Claim 11 ..................................................................................................... .. 17
`
`7. Claim 12 ..................................................................................................... ..17
`
`8. Claim 15 ..................................................................................................... ..18
`
`9. Claim 16 ..................................................................................................... ..18
`
`10. Claim 26 ..................................................................................................... ..18
`
`11. Claim 28 ..................................................................................................... ..18
`
`12. Claim 58 ..................................................................................................... ..18
`
`A. HTTP and URLs ......................................................................................... .. 19
`
`IX.
`
`THE SCOPE AND CONTENT OF THE PRIOR ART ............................. ..28
`
`2
`
`

`
`A.  U.S. Patent No. 6,154,777 (“Ebrahim-777”) [Ex. 1004] ............................. 28 
`B.  Rabinovich-Memo [Ex. 1005] ...................................................................... 32 
`C.  U.S. Patent No. 6,167,427 (“Rabinovich-427”) [Ex. 1006] ......................... 33 
`X. 
`CLAIM CONSTRUCTION ......................................................................... 34 
`XI.  UNPATENTABILITY BASED ON PRIOR ART
`IN THE
`PRESENT PROCEEDINGS ........................................................................ 37 
`A.  Ground 1: Ebrahim-777 in view of Rabinovich-427 and the
`Rabinovich-Memo ........................................................................................ 37 
`1.  Motivation to combine the prior art ............................................................. 38 
`2.  Claim-by-claim Analysis .............................................................................. 41 
`
`
`3
`
`

`
`I, Michael Freedman, Ph.D., declare as follows:
`
`I.
`
`1.
`
`BACKGROUND AND QUALIFICATIONS
`
`Counsel for Limelight Networks, Inc. (“Limelight”) has retained me as an
`
`expert to offer my opinion regarding the validity of U.S. Patent No. 7,693,959
`
`(“’959 patent”).
`
`2.
`
`I submit this declaration based on my personal knowledge and in support of
`
`Limelight’s inter partes review petition regarding the ’959 patent.
`
`3.
`
`I am a trained Computer Scientist and Engineer. I began programming
`
`online services in 1995, and received a Bachelor’s degree in 2001 and Master’s
`
`degree in 2002 from the Massachusetts Institute of Technology, both in Computer
`
`Science and Engineering. I subsequently received a Ph.D. in Computer Science
`
`from New York University in 2007. During 2005 through 2007, I spent my
`
`doctoral studies as a research scholar at Stanford University. Since 2007, I have
`
`been a professor of computer science at Princeton University, initially as an
`
`Assistant Professor (2007-2013), then as a tenured Associate Professor (2013-
`
`2015), and most recently as a Full Professor. I am also currently the co-founder
`
`and CEO of Iobeam, a startup company building a cloud-hosted data analysis
`
`platform for sensor and device data. My curriculum vitae is attached as Appendix
`
`A.
`
`4. My research interests and experience primarily focus on Internet services,
`
`4
`
`

`
`distributed systems, networking, and security. Since the year 2000, I have
`
`published over 75 peer-reviewed journal, conference, and workshop papers in
`
`these topics. According to my recent review of Google Scholar, these peer-
`
`reviewed papers have been cited more than 9000 times. A list of my publications
`
`is provided in Appendix A. Of particular note here, I have published multiple
`
`papers concerning web proxies and content delivery networks (CDNs), DNS
`
`services, server selection, distributed systems, Internet architecture, and network
`
`and communication protocols.
`
`5.
`
`At Princeton, I teach courses at both the undergraduate level in distributed
`
`systems and networking, as well as graduate courses in computer systems and
`
`networking. These courses include topics relevant to the ’959 patent, including
`
`HTTP, web proxies, CDNs, DNS, distributed systems, Internet architecture and
`
`routing, network and communication protocols, and server, middlebox, and
`
`gateway technologies.
`
`6.
`
`I have been on the technical program committee for numerous conferences
`
`with peer-reviewed proceedings, including the main academic computer science
`
`venues for networking (SIGCOMM), network systems (NSDI), and systems (OSDI
`
`and SOSP). I have been the technical program chair of multiple conferences,
`
`including the ACM Symposium on Cloud Computing (SOCC). I have served as a
`
`reviewer for numerous leading journals, including Communications of the ACM,
`
`5
`
`

`
`Transactions on Computer Systems (TOCS), and Transactions on Networking
`
`(TON).
`
`7.
`
`I have also served as a consultant and advisor for companies such as Netflix,
`
`CloudFlare, Blockstack Labs, the Institute for Defense Analyses, Intelligent
`
`Automation, and Quova. I am also the named inventor on U.S. Patent Nos.
`
`8,204,982 and 8,463,904, which deal with methods to detect network proxies and
`
`middleboxes, often coupled with
`
`technologies around
`
`IP-address-based
`
`geolocation.
`
`8.
`
`In my career, I have received numerous national awards for my work. Of
`
`particular note, I received the Presidential Early Career Award for Scientists and
`
`Engineers (PECASE), given by the White House’s Office of Science and
`
`Technology Policy. In receiving this award, I was one of 20 individuals nominated
`
`by the National Science Foundation. I have also been awarded National Science
`
`Foundation’s CAREER Award, the Office of Naval Research’s Young Investigator
`
`Award, an Alfred P. Sloan Research Fellowship, membership in the Computer
`
`Science Study Group of the U.S. Department of Defense’s Defense Advanced
`
`Research Projects Agency (DARPA), and multiple “Best Research Paper”-type
`
`awards from leading international conferences and symposia.
`
`9.
`
` My research and development has also led to deployed systems and
`
`industrial impact in Web and Internet services, as well as in the networking field.
`
`6
`
`

`
`For example, I designed, programmed, deployed, and operated an open Web
`
`content delivery system, CoralCDN, that had been publicly available between 2004
`
`and 2015, serving millions of unique users per day. I also designed, built, and
`
`operated two subsequent server-selection systems: OASIS devised efficient
`
`mechanisms to map the Internet topology cooperatively to determine geographic
`
`proximity, offering locality-based DNS service for thousands of service replicas
`
`for more than a dozen distributed services between 2005 and 2009; DONAR
`
`solved locality- and load-aware cost optimizations for server selection, providing
`
`DNS- and HTTP-based name resolution for services on the Measurement Lab
`
`testbed from 2009-2013, including those powering the Federal Communications
`
`Commission’s Consumer Broadband Test. My research on IP geolocation and
`
`intelligence for Web services led me to co-found Illuminics Systems, which was
`
`acquired by Quova (now part of Neustar) in 2006. My work on programmable
`
`enterprise networking helped form the basis for the OpenFlow / software-defined
`
`networking (SDN) architecture that was standardized by the Open Networking
`
`Foundation (an organization comprised of most major telecommunications
`
`companies, networking vendors, and Internet and Online Service Providers).
`
`10.
`
`I am particularly familiar with the design, deployment, and selection of
`
`Internet proxies, e.g., network-facing machines that interpose themselves on end-
`
`to-end traffic between clients and servers to provide additional functionality (such
`
`7
`
`

`
`as content caching and connection pooling). CoralCDN, for example, provided
`
`HTTP proxy-based content caching to both reduce load on Internet websites and
`
`speed up client access, while CoralCDN’s DNS service, as well as the OASIS and
`
`DONAR systems, performed locality- and load-aware proxy selection for clients.
`
`11. As can be seen from the above outline of my Educational Background and
`
`Employment, I have extensive experience in the fields of filesystems, web proxies
`
`and CDNs, DNS services, server selection, distributed systems, Internet
`
`architecture and routing, network and communication protocols, and server,
`
`middlebox, and gateway technologies. I deal frequently with the issues that are
`
`discussed in the ’959 patent.
`
`II. RETENTION & COMPENSATION
`
`12.
`
`I have been retained as an independent expert on behalf of Limelight for this
`
`matter. I am being compensated at my customary rate for the services I am
`
`providing in this case. The compensation is not contingent upon my performance,
`
`the outcome of this Inter Partes Review or any other proceeding, or any issues
`
`involved in or related to this Inter Partes Review, nor do I have a financial interest
`
`in the parties to this case.
`
`III. MATERIAL CONSIDERED
`
`13. The analysis provided in this Declaration is based on my education as
`
`well as my experience in the field. In addition to relying upon my knowledge based
`
`8
`
`

`
`on written materials and other information that was known in 1998, I have
`
`considered the exhibits to this Petition. A list of materials that I have considered for
`
`my analysis is attached as Appendix B.
`
`IV. OVERVIEW AND LEGAL STANDARDS
`
`14.
`
`I have been asked to provide opinions regarding the validity of claims
`
`of the ’959 patent in light of several prior art patents and publications.
`
`15.
`
`It is my understanding that a claimed invention is unpatentable under
`
`35 U.S.C. § 103 if the differences between the invention and the prior art are such
`
`that the subject matter as a whole would have been obvious at the time the alleged
`
`invention was made to a POSITA. This is sometimes described as “obviousness.”
`
`I understand that an obviousness analysis takes into account the level of ordinary
`
`skill in the art, the scope and content of the prior art, and the differences between
`
`the prior art and the claimed subject matter.
`
`16.
`
`It is my understanding that the Supreme Court, in KSR Int’l Co. v.
`
`Teleflex Inc., 550 U.S. 398 (2007) and other cases, has recognized several
`
`rationales for combining references or modifying a reference to show obviousness
`
`of the claimed subject matter. Some of these rationales include the following:
`
`combining prior art elements according to known methods to yield predictable
`
`results; simple substitution of one known element for another to obtain predictable
`
`results; a predictable use of prior art elements according to their established
`
`9
`
`

`
`functions; applying a known technique to a known device to yield predictable
`
`results; choosing from a finite number of identified, predictable solutions, with a
`
`reasonable expectation of success; and some teaching, suggestion, or motivation in
`
`the prior art that would have led a POSITA to modify the prior art or combine prior
`
`art teachings to arrive at the claimed invention. I also understand that a POSITA is
`
`a person of ordinary ingenuity and creativity, not an automaton.
`
`V. DESCRIPTION OF THE RELEVANT FIELD AND THE RELEVANT
`TIME FRAME
`
`17.
`
`I have carefully reviewed the specification, drawings, and claims of the ’959
`
`patent.
`
`18. Based on my review of these materials, and the materials listed in Appendix
`
`B, I believe that the relevant field for purposes of the ’959 patent is content storage
`
`and delivery over the Internet:
`
`“1. Technical Field
`
`This invention relates generally to information retrieval in a computer
`
`network. More particularly, the invention relates to a novel method of
`
`hosting and distributing content on the Internet that addresses the problems
`
`of Internet Service Providers (ISPs) and Internet Content Providers.” (Ex.
`
`1001 at 1:20-25).
`
`I have been informed that the relevant timeframe runs up to July 1998.
`
`19. As described above and in my C.V., I have extensive experience in the
`
`10
`
`

`
`relevant technical field. Based on my experience and expertise in this field, I have
`
`an understanding of the relevant field in the relevant timeframe.
`
`VI. LEVEL OF ORDINARY SKILL IN THE ART
`
`20.
`
`I understand that my analysis and opinions expressed in this declaration
`
`must be rendered based on the perspective of a POSITA at the time of the
`
`invention. I also understand that a POSITA is a hypothetical person who is
`
`presumed to have known the relevant art at the time of the alleged invention
`
`claimed in the ’959 patent.
`
`21.
`
`I further understand that in determining the level of ordinary skill in the art, I
`
`am to consider factors including:
`
`(a) the type of problems encountered in the art or field of invention,
`
`(b) prior art solutions to those problems,
`
`(c) the rapidity with which innovations are made,
`
`(d) sophistication of the technology, and
`
`(e) the educational level of active workers in the field.
`
`22.
`
`I understand that a POSITA is a person of ordinary creativity, but not an
`
`automaton, and that a POSITA can often fit multiple patents or prior art references
`
`together like pieces of a puzzle as a result of this ordinary creativity. I also
`
`understand that I may consider the inferences and creative steps that a POSITA
`
`would employ. In addition, I understand that a POSITA would necessarily have
`
`11
`
`

`
`been capable of understanding the scientific and engineering principles applicable
`
`to the pertinent art.
`
`23.
`
`I also understand that when I consider what would have been obvious to a
`
`POSITA, I am not considering what would have been obvious to me at the time,
`
`nor to the inventors, judges, laymen, those skilled in other arts, or to geniuses in
`
`the art.
`
`24.
`
`In my opinion, a POSITA working in the field of content delivery over the
`
`Internet at the time of the invention (see § IV) would have been familiar with
`
`common techniques for storing and delivering content over the Internet. For
`
`example, storage service providers and global traffic management/load balancing
`
`services were well-known before July, 1998. (Ex. 1001 at 1:46-61 (web hosting
`
`farms providing content storage/delivery services).
`
` Client-server systems
`
`operating on the Internet using known server and client devices were also well-
`
`known prior to July, 1998. (Id. at 4:64-5:29).
`
`25. Software and protocols for delivering content over the Internet was also
`
`well-known and understood by those of ordinary skill. For example, Hypertext
`
`Transfer Protocol (HTTP) and Hypertext Markup Language (HTML) (id. at 1:27-
`
`45), Uniform Resource Locators (URLs) (id. at 1:35-38), and Domain Name
`
`Service (DNS) (id. at 10:10-16 (describing standard features of DNS), 12:9-16
`
`(describing caching as a part of the standard DNS system)), were in widespread
`
`12
`
`

`
`use on the Internet and well-known to persons of ordinary skill before July, 1998.
`
`26.
`
`In my experience working and teaching in the field, most persons of
`
`ordinary skill in the art had at least a bachelor’s degree in Computer Science,
`
`Computer Engineering, or the equivalent. This was a rapidly-developing and
`
`highly technical field where that educational background would have been
`
`important.
`
`27.
`
`In addition to education, in my experience, a person of ordinary skill in the
`
`art had worked in the field for several years and had experience working with
`
`Internet content delivery.
`
`28. Thus, it is my opinion that a POSITA in the field of the ’959 patent would
`
`have at least a Bachelor’s degree in Computer Science, Computer Engineering, or
`
`the equivalent, and several years of experience in the field of distributed systems,
`
`name services, or Internet content delivery.
`
`29. My opinions have been rendered based on the perspective of a POSITA.
`
`VII. OVERVIEW OF THE ’959 PATENT
`
`30. The ’959 patent’s claims relate to a method and system for delivering
`
`content over the Internet. Internet content was known to include HTML files and
`
`embedded objects such as images, audio, video, and other HTML files, and this
`
`content was delivered over the Internet using known techniques that included
`
`HTTP, HTML, and URLs:
`
`13
`
`

`
`“In the Web environment, client machines effect transactions to Web
`servers using the Hypertext Transfer Protocol (HTTP), which is a
`known application protocol providing users access to files (e.g., text,
`graphics, images, sound, video, etc.) using a standard page description
`language known as Hypertext Markup Language (HTML). HTML
`provides basic document formatting and allows the developer to
`specify ‘links’ to other servers and files. In the Internet paradigm, a
`network path to a server is identified by a so-called Uniform Resource
`Locator (URL) having a special syntax for defining a network
`connection.” (Ex. 1001 at 1:28-38 (emphasis added) (Ex. 1001 at
`1:28-38; see also id. at 4:65-5:9 (describing FIG. 1) & 5:30-39
`(describing FIG. 2)).
`
`31. The claims of the ’959 patent, included below in § VII.A, involve a “content
`
`delivery network” or “CDN.” These terms are not used at all in the specification
`
`of the ’959 patent, but the claims show that a CDN includes two well-known types
`
`of servers: content servers and name servers.
`
`32. The ’959 patent explains that content servers are not limited to any particular
`
`type of server, and that content servers may consist of ordinary components
`
`including a processor, operating system (such as UNIX or Windows), and a web
`
`server application. (Ex. 1001 at 6:9-13).
`
`33. The ’959 patent also explains that name servers were well-known and
`
`commonly used as part of the Domain Name System (“DNS”). (See, e.g., Ex.
`
`1001 at 10:10-14, 12:9-16). I describe DNS and Name Servers in more detail in §
`
`14
`
`

`
`VIII regarding Background Technologies.
`
`34. Thus, a POSITA was familiar with the subject matter of the ’959 patent
`
`before July, 1998. (See also Ex. 1001 at 1:46-52 & 1:62-2:3).
`
`A. The Challenged Claims
`
`35.
`
`I understand that the claims at issue, i.e. the Challenged Claims, are claims
`
`1, 2, and 9 of the ’959 patent. The Challenged Claims, annotated for ease of
`
`reference, are set forth below:
`
`1.
`
`Claim 1
`
`[Claim 1-Preamble] 1. A computer-implemented method of delivering
`text, graphics, images, downloads, audio or video on behalf of
`multiple content providers, comprising:
`
`[1a] operating content delivery network (CDN) content servers in
`multiple locations, each location with connectivity to one or more
`networks;
`
`[1b] operating multiple CDN name servers;
`
`[1c] receiving a first domain name service (DNS) query at a first CDN
`name server, the first DNS query including a data string of the form
`“string1 string2 string3”, where:
`
`[1c-i] string3 is a generic top level domain (gTLD),
`
`[1c-ii] string2 is separated from string3 by a period and is a name
`maintained by a service provider that operates the CDN content
`servers and the CDN name servers, and
`
`15
`
`

`
`[1c-iii] string1 is separated from string2 by a period and comprises
`one or more sub-strings, where each sub-string is comprised of one of:
`letters, numbers, and combinations of letters and numbers, and any
`pair of sub-strings in string 1 are separated by a period;
`
`[1d] having the first CDN name server respond to the first DNS query
`by sending a response that includes a first set of one or more IP
`addresses, where a first end user request for content directed to one of
`the IP addresses of the first set causes the service provider to deliver
`the content to a first end user from a first CDN content server;
`
`[1e] receiving a second DNS query at a second CDN name server, the
`second DNS query also including the same data string that is received
`by the first CDN name server; and
`
`[1f] having the second CDN name server respond to the second DNS
`query by sending a response that includes a second set of one or more
`IP addresses, wherein a second end user request for content directed to
`one of the IP addresses of the second set causes the service provider to
`deliver the content to a second end user from a second CDN content
`server;
`
`[1g] the second set of one or more IP addresses differing from the first
`set of one or more IP addresses based on where the first and second
`DNS queries originate.
`
`2.
`
`Claim 2
`
`[Claim 2] The method as described in claim 1 wherein the CDN name
`servers are deployed at the multiple locations, and wherein the first
`
`16
`
`

`
`and second DNS queries are received from respective first and second
`local DNS name servers.
`
`3.
`
`Claim 4
`
`[Claim 4] The method as described in claim 1 wherein the first CDN
`content server is closer to the first end user than is the second CDN
`content server.
`
`4.
`
`Claim 9
`
`[Claim 9] The method as described in claim 1 wherein the multiple
`locations are part of a network associated with the service provider.
`
`5.
`
`Claim 10
`
`[Claim 10] The method as described in claim 1 wherein the multiple
`CDN name servers are an authority for string2.string3.
`
`6.
`
`Claim 11
`
`[Claim 11] The method as described in claim 1 wherein the portion
`string2.string3 of the data string is used by the service provider for
`two or more content providers that use the CDN content servers to
`deliver their respective content.
`
`7.
`
`Claim 12
`
`[Claim 12] The method as described in claim 1 wherein the content
`requested by the first end user and the content requested by the second
`end user are one of the following: (a) the same content, (b) different
`content from the same content provider, and (c) different content from
`different content providers.
`
`17
`
`

`
`8.
`
`Claim 15
`
`[Claim 15] The method as described in claim 4 wherein the first CDN
`content server is not overloaded.
`
`9.
`
`Claim 16
`
`[Claim 16] The method as described in claim 15 wherein the first
`CDN content server is likely to have the content requested by the first
`end user.
`
`10. Claim 26
`
`[Claim 26] The method as described in claim 1 where the data string
`includes a value that encodes information about the content.
`
`11. Claim 28
`
`[Claim 28] The method as described in claim 1 wherein the content
`requested by the first end user is an embedded object.
`
`12. Claim 58
`
`[Claim 58-Preamble] A system for content delivery operated by a
`content delivery network (CDN) service provider for multiple content
`providers, comprising:
`
`[58a] a plurality of CDN content servers organized into sets; and
`
`[58b] a CDN name service having a set of name servers, the CDN
`name service receiving first and second DNS queries and returning a
`response to each of the first and second DNS queries;
`
`[58c] where the first DNS query includes a name that points to the
`CDN, the name of the form “string 1 string2 string3”, where:
`
`18
`
`

`
`[58c-i] string3 is a generic top level domain (gTLD),
`
`[58c-ii] string2 is separated from string3 by a period and is a name
`maintained by the CDN service provider, and
`
`[58c-iii] string 1 is separated from string2 by a period and comprises
`one or more sub-strings, where each sub-string is comprised of one of:
`letters, numbers, and combinations of letters and numbers, and any
`pair of sub-strings in string1 are separated by a period;
`
`[58d] where the second DNS query also includes the name;
`
`[58e] where a response to the first DNS query leads to a first subset of
`CDN content servers;
`
`[58f] where a response to the second DNS query leads to a second
`subset of CDN content servers; and
`
`[58g] where information within the responses to the first and second
`DNS queries varies based on where the respective first and second
`DNS queries originate.
`
`VIII. BACKGROUND TECHNOLOGIES
`A. HTTP and URLs
`
`36. The Internet uses various naming schemes to identify resources, including IP
`
`addresses and domain names. Computers that are connected to the Internet have
`
`an IP address assigned to their network interfaces, such as “1.2.3.4.” Domain
`
`names, such as “www.example.com” are human-readable and easy to remember,
`
`while IP addresses are not. DNS provides a service that maps domain names to IP
`
`addresses, so that humans can use domains names while computer programs, after
`
`19
`
`

`
`using DNS to resolve a name to an IP address, can access remote resources at their
`
`appropriate IP addresses. An entity called the Internet Assigned Numbers
`
`Authority (“IANA”) oversees global IP address allocation and management of the
`
`DNS Root Zone, including maintaining the official list of the “top-level” domains
`
`such as “.com”, “.org”, “.net”, “.edu”, and the like.
`
`37. The World Wide Web, for example, names resources using URLs such as
`
`“http://www.example.com/a/b/”. (Id. at § 3). The URL provides the browser
`
`several pieces of information, including: the protocol to use (“http://”), the domain
`
`of the web server(s) associated with the request (“www.example.com”), and the
`
`path associated with the request (“/a/b/”).
`
`38. A user’s web browser then extracts the domain name from this URL, uses
`
`DNS to resolve this domain name to an IP address, then sends an HTTP request
`
`containing this URL to this IP address (which corresponds to a web server or web
`
`proxy).
`
`B. DNS, DNS resolution, and local name servers
`
`39. Before sending an HTTP request for a URL, a web browser first needs to
`
`learn the IP address of the server associated with the URL’s domain or hostname,
`
`e.g., the IP address of the domain “www.example.com.” It does so by resolving
`
`the domain name through the Domain Name System (DNS), which provides name
`
`resolution for the Internet in a decentralized fashion. There is not a single database
`
`20
`
`

`
`that maintains a mapping from all domain names to their corresponding network
`
`addresses. Rather, DNS is organized around the notion of hierarchical,
`
`administrative delegation. DNS is specified in two specifications from 1987, and
`
`these specifications specific well-known
`
`techniques
`
`for organizing and
`
`manipulating domain names. (See, e.g., RFC 1034 [Ex. 1007] at §§ 3.1-3.5 &
`
`4.2.2; RFC 1035 [Ex. 1008] at §§ 2 & 3).
`
`40. For example, once the fictional company “Example, Inc.” successfully
`
`applies to own the domain name “example.com,” it has the ability to host a website
`
`accessible to end users at the URL “http://www.example.com/”, as well as to create
`
`subdomains
`
`of
`
`that
`
`domain,
`
`e.g.,
`
`“www.example.com”
`
`and
`
`“images.example.com.” (RFC 1034 [Ex. 1007] at §§ 3.1-3.5). It also defines
`
`which DNS servers are responsible for providing authoritative name resolution for
`
`its domain and subdomain(s). (Id. at 2.4).
`
`41. This process introduces the notion of different DNS record types. These
`
`record types include NameServer (NS) records, which define the names of
`
`nameservers that can provide authoritative answers for a domain, e.g., an NS
`
`record specifies that “ns.example.com” is an authoritative nameserver for
`
`“example.com.” (Id. at §§ 2.4, 6.2 (showing query examples)). Address (A)
`
`records provide a mapping
`
`from domains
`
`to network addresses, e.g.,
`
`“www.example.com” has an IP address 1.2.3.4. This information about a
`
`21
`
`

`
`domain’s authoritative nameservers is communicated to its parent domain, e.g., the
`
`domain registrar used by Example, Inc. will detail information about example.com
`
`to the .com nameservers.
`
`42. DNS resolution
`
`therefore
`
`involves
`
`the process of finding (1)
`
`the
`
`authoritative nameserver(s) for a domain, and then (2) the IP address for the
`
`requested domain.
`
`43. To discover the initial NS record for a given domain name, DNS takes
`
`advantage of its hierarchical delegation and a process known as iterative
`
`resolut

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket