throbber

`
`
`
`PALO ALTO’S INVALIDITY CONTENTIONS
`Exhibit A5: U.S. Patent No. 6,412,000 (“Riddle”)
`
`As demonstrated in the claim charts below, the Asserted Claims are invalid (a) under one or more sections of 35 U.S.C. § 102 as
`anticipated by Riddle and (b) under 35 U.S.C. § 103(a) as obvious over Riddle standing alone and as set forth herein, and/or combined
`with the knowledge of a person of ordinary skill in the art, admitted prior art, and/or the additional prior art references discussed in
`Exhibits A1-A16, and B, the contents of which are hereby incorporated by reference into this chart. Although the following charts
`illustrate where Riddle discloses the preambles of the Asserted Claims, Palo Alto does not imply by these contentions that the
`preambles are claim limitations.
`
`
`’099
`Claim
`
`[1.pre]
`
`Claim Element
`
`U.S. Patent No. 6,412,000 (“Riddle”)
`
`A packet monitor for examining
`packets passing through a
`connection point on a computer
`network in real-time, the
`packets provided to the packet
`monitor via a packet acquisition
`device connected to the
`connection point, the packet
`monitor comprising:
`
`Riddle discloses a packet monitor for examining packets passing through a
`connection point on a computer network in real-time, the packets provided to the
`packet monitor via a packet acquisition device connected to the connection point.
`
`For example, Riddle discloses:
`
`1:54-61 (“This invention relates to digital packet telecommunications, and
`particularly to management of network bandwidth based on information
`ascertainable from multiple layers of OSI network model. It is particularly useful in
`conjunction with bandwidth allocation mechanisms employing traffic classification
`in a digitally-switched packet telecommunications environment, as well as in
`monitoring [sic], security and routing.”);
`
`4:6-17 (“According to the invention, in a packet communication environment, a
`method is provided for automatically classifying packet flows for use in allocating
`bandwidth resources and the like by a rule of assignment of a service level. The
`method comprises applying individual instances of traffic classification paradigms
`to packet network flows based on selectable information obtained from a plurality of
`layers of a multi-layered communication protocol in order to define a characteristic
`class, then mapping the flow to the defined traffic class. It is useful to note that the
`
`1
`
`Packet Intelligence Ex. 2008 Page 1 of 187
`
`

`

`
`PALO ALTO’S INVALIDITY CONTENTIONS
`Exhibit A5: U.S. Patent No. 6,412,000 (“Riddle”)
`
`
`’099
`Claim
`
`Claim Element
`
`U.S. Patent No. 6,412,000 (“Riddle”)
`
`
`
`
`automatic classification is sufficiently robust to classify a complete enumeration of
`the possible traffic.”);
`
`5:54-61 (“The method for automatically classifying heterogeneous packets in a
`packet telecommunications environment of the present invention is implemented in
`the C programming language and is operational on a computer system such as
`shown in FIG. 1A. This invention may be implemented in a client-server
`environment, but a client-server environment is not essential. This figure shows a
`conventional client-server computer system which includes a server 20 and
`numerous clients, one of which is shown as client 25. The use of the term “server” is
`used in the context of the invention, wherein the server receives queries from
`(typically remote) clients, does substantially all the processing necessary to
`formulate responses to the queries, and provides these responses to the clients.
`However, server 20 may itself act in the capacity of a client when it accesses remote
`databases located at another node acting as a database server.”);
`
`6:1-16 (“The hardware configurations are in general standard and will be described
`only briefly. In accordance with known practice, server 20 includes one or more
`processors 30 which communicate with a number of peripheral devices via a bus
`subsystem 32. These peripheral devices typically include a storage subsystem 35,
`comprised of a memory subsystem 35a and a file storage subsystem 35b holding
`computer programs (e.g., code or instructions) and data, a set of user interface input
`and output devices 37, and an interface to outside networks, which may employ
`Ethernet, Token Ring, ATM, IEEE 802.3, ITU X.25, Serial Link Internet Protocol
`(SLIP) or the public Switched telephone network. This interface is shown
`schematically as a “Network Interface” block 40. It is coupled to corresponding
`interface devices in client computers via a network connection 45.”)
`
`2
`
`Packet Intelligence Ex. 2008 Page 2 of 187
`
`

`

`
`PALO ALTO’S INVALIDITY CONTENTIONS
`Exhibit A5: U.S. Patent No. 6,412,000 (“Riddle”)
`
`
`’099
`Claim
`
`Claim Element
`
`U.S. Patent No. 6,412,000 (“Riddle”)
`
`
`
`
`7:10-34 (“FIG. 1C is illustrative of the internetworking of a plurality of clients such
`as client 25 of FIGS. 1A and 1B and a plurality of servers such as server 20 of
`FIGS. 1A and 1B as described herein above. In FIG. 1C, network 60 is an example
`of a Token Ring or frame oriented network. Network 60 links host 61, such as an
`IBM RS6000 RISC workstation, which may be running the AIX operating system,
`to host 62, which is a personal computer, which may be running Windows 95, IBM
`0S/2 or a DOS operating system, and host 63, which may be an IBM AS/400
`computer, which may be running the OS/400 operating system. Network 60 is
`internetworked to network 70 via a system gateway which is depicted here as router
`75, but which may also be a gateway having a firewall or a network bridge.
`Network 70 is an example of an Ethernet network that interconnects host 71, which
`is a SPARC workstation, which may be running SUNOS operating system with host
`72, which may be a Digital Equipment VAX6000 computer which may be running
`the VMS operating system.
`
`Router 75 is a network access point (NAP) of network 70 and network 60. Router
`75 employs a Token Ring adapter and Ethernet adapter. This enables router 75 to
`interface with the two heterogeneous networks. Router 75 is also aware of the Inter-
`network Protocols, such as ICMP and RIP, which are described herein below.”);
`
`12:3-12 (“A traffic class may be inferred from determining the identity of the
`creator of a resource used by the traffic class. For example, the identity of traffic
`using a certain connection can be determined by finding the identity of the creator of
`the connection. This method is used to detect Real Time Protocol (RTP) for point-
`to-point telephony, RTP for broadcast streaming, CCITT/ITU H320-telephony over
`ISDN, H323-internet telephony over the internet (bidirectional) and RTSP real time
`streaming protocol for movies (unidirectional).”);
`
`3
`
`Packet Intelligence Ex. 2008 Page 3 of 187
`
`

`

`
`PALO ALTO’S INVALIDITY CONTENTIONS
`Exhibit A5: U.S. Patent No. 6,412,000 (“Riddle”)
`
`
`’099
`Claim
`
`Claim Element
`
`U.S. Patent No. 6,412,000 (“Riddle”)
`
`
`
`
`12:27-28 (“FIG. 3 depicts components of a system for automatically classifying
`traffic according to the invention.”);
`
`12:42-43 (“FIG. 4A depicts a flowchart 401 of processing steps for automatically
`classifying traffic.”);
`
`Fig. 1A:
`
`Fig. 1C:
`
`
`
`4
`
`Packet Intelligence Ex. 2008 Page 4 of 187
`
`

`

`
`PALO ALTO’S INVALIDITY CONTENTIONS
`Exhibit A5: U.S. Patent No. 6,412,000 (“Riddle”)
`
`
`’099
`Claim
`
`Claim Element
`
`U.S. Patent No. 6,412,000 (“Riddle”)
`
`
`
`
`[1.a]
`
`(a) a packet-buffer memory
`configured to accept a packet
`from the packet acquisition
`device;
`
`
`
`3:67-4:2 (“What is really needed is a method for analyzing real traffic in a
`customer's network and automatically producing a list of the ‘found traffic.’”); see
`also 10:57-59, 3:32-39;
`
`2:8-2 (“Early indication of the rate of data flow which can or must be supported is
`imperative”).
`
`Riddle discloses a packet-buffer memory configured to accept a packet from the
`packet acquisition device.
`
`For example, Riddle discloses:
`
`6:1-15 (“The hardware configurations are in general standard and will be described
`only briefly. In accordance with known practice, server 20 includes one or more
`processors 30 which communicate with a number of peripheral devices via a bus
`subsystem 32. These peripheral devices typically include a storage subsystem 35,
`comprised of a memory subsystem 35 a and a file storage subsystem 35 b holding
`computer programs (e.g., code or instructions) and data, a set of user interface input
`
`5
`
`Packet Intelligence Ex. 2008 Page 5 of 187
`
`

`

`
`PALO ALTO’S INVALIDITY CONTENTIONS
`Exhibit A5: U.S. Patent No. 6,412,000 (“Riddle”)
`
`
`’099
`Claim
`
`Claim Element
`
`U.S. Patent No. 6,412,000 (“Riddle”)
`
`
`
`
`and output devices 37, and an interface to outside networks, which may employ
`Ethernet, Token Ring, ATM, IEEE 802.3, ITU X.25, Serial Link Internet Protocol
`(SLIP) or the public switched telephone network. This interface is shown
`schematically as a “Network Interface” block 40. It is coupled to corresponding
`interface devices in client computers via a network connection 45.”);
`
`6:43-62 (“FIG. 1B is a functional diagram of a computer system such as that of FIG.
`1A. FIG. 1B depicts a server 20, and a representative client 25 of a plurality of
`clients which may interact with the server 20 via the Internet 45 or any other
`communications method. Blocks to the right of the server are indicative of the
`processing steps and functions which occur in the server's program and data storage
`indicated by blocks 35 a and 35 b in FIG. 1A. A TCP/IP “stack” 44 works in
`conjunction with Operating System 42 to communicate with processes over a
`network or serial connection attaching Server 20 to Internet 45. Web server software
`46 executes concurrently and cooperatively with other processes in server 20 to
`make data objects 50 and 51 available to requesting clients. A Common Gateway
`Interface (CGI) script 55 enables information from user clients to be acted upon by
`web server 46, or other processes within server 20. Responses to client queries may
`be returned to the clients in the form of a Hypertext Markup Language (HTML)
`document outputs which are then communicated via Internet 45 back to the user.”);
`
`7:10-34 (“FIG. 1C is illustrative of the internetworking of a plurality of clients such
`as client 25 of FIGS. 1A and 1B and a plurality of servers such as server 20 of
`FIGS. 1A and 1B as described herein above. In FIG. 1C, network 60 is an example
`of a Token Ring or frame oriented network. Network 60 links host 61, such as an
`IBM RS6000 RISC workstation, which may be running the AIX operating system,
`to host 62, which is a personal computer, which may be running Windows 95, IBM
`0S/2 or a DOS operating system, and host 63, which may be an IBM AS/400
`
`6
`
`Packet Intelligence Ex. 2008 Page 6 of 187
`
`

`

`
`PALO ALTO’S INVALIDITY CONTENTIONS
`Exhibit A5: U.S. Patent No. 6,412,000 (“Riddle”)
`
`
`’099
`Claim
`
`Claim Element
`
`U.S. Patent No. 6,412,000 (“Riddle”)
`
`
`
`
`computer, which may be running the OS/400 operating system. Network 60 is
`internetworked to network 70 via a system gateway which is depicted here as router
`75, but which may also be a gateway having a firewall or a network bridge.
`Network 70 is an example of an Ethernet network that interconnects host 71, which
`is a SPARC workstation, which may be running SUNOS operating system with host
`72, which may be a Digital Equipment VAX6000 computer which may be running
`the VMS operating system.
`
`Router 75 is a network access point (NAP) of network 70 and network 60. Router
`75 employs a Token Ring adapter and Ethernet adapter. This enables router 75 to
`interface with the two heterogeneous networks. Router 75 is also aware of the Inter-
`network Protocols, such as ICMP and RIP, which are described herein below.”);
`
`Fig. 1A:
`
`
`
`7
`
`Packet Intelligence Ex. 2008 Page 7 of 187
`
`

`

`
`PALO ALTO’S INVALIDITY CONTENTIONS
`Exhibit A5: U.S. Patent No. 6,412,000 (“Riddle”)
`
`
`’099
`Claim
`
`Claim Element
`
`U.S. Patent No. 6,412,000 (“Riddle”)
`
`Fig. 1B:
`
`
`
`
`Fig. 1C:
`
`
`
`8
`
`Packet Intelligence Ex. 2008 Page 8 of 187
`
`

`

`
`PALO ALTO’S INVALIDITY CONTENTIONS
`Exhibit A5: U.S. Patent No. 6,412,000 (“Riddle”)
`
`
`’099
`Claim
`
`Claim Element
`
`U.S. Patent No. 6,412,000 (“Riddle”)
`
`
`
`
`[1.b]
`
`(b) a parsing/extraction
`operations memory configured
`to store a database of
`parsing/extraction operations
`that includes information
`describing how to determine at
`least one of the protocols used
`in a packet from data in the
`packet;
`
`
`
`To the extent Packet Intelligence alleges that Riddle does not explicitly disclose this
`claim limitation, this limitation is inherent and/or it would have been obvious in
`view of the knowledge of one of ordinary skill in the art, in view of the references
`identified in Exhibit B, and/or it would have been obvious to one of ordinary skill in
`the art to combine the teaching of Riddle with the prior art identified in §C of Palo
`Alto’s Invalidity Contentions.
`
`Riddle discloses a parsing/extraction operations memory configured to store a
`database of parsing/extraction operations that includes information describing how
`to determine at least one of the protocols used in a packet from data in the packet.
`
`For example, Riddle discloses:
`
`6:1-15 (“The hardware configurations are in general standard and will be described
`only briefly. In accordance with known practice, server 20 includes one or more
`processors 30 which communicate with a number of peripheral devices via a bus
`subsystem 32. These peripheral devices typically include a storage subsystem 35,
`
`9
`
`Packet Intelligence Ex. 2008 Page 9 of 187
`
`

`

`
`PALO ALTO’S INVALIDITY CONTENTIONS
`Exhibit A5: U.S. Patent No. 6,412,000 (“Riddle”)
`
`
`’099
`Claim
`
`Claim Element
`
`U.S. Patent No. 6,412,000 (“Riddle”)
`
`
`
`
`comprised of a memory subsystem 35 a and a file storage subsystem 35 b holding
`computer programs (e.g., code or instructions) and data, a set of user interface input
`and output devices 37, and an interface to outside networks, which may employ
`Ethernet, Token Ring, ATM, IEEE 802.3, ITU X.25, Serial Link Internet Protocol
`(SLIP) or the public switched telephone network. This interface is shown
`schematically as a “Network Interface” block 40. It is coupled to corresponding
`interface devices in client computers via a network connection 45.”);
`
`9:14-67 (“The present invention provides a method for classifying traffic according
`to a definable set of classification attributes selectable by the manager, including
`selecting a subset of traffic of interest to be classified. The invention provides the
`ability to classify and search traffic based upon multiple orthogonal classification
`attributes.
`
`Traffic class membership may be hierarchical. Thus, a flow may be classified by a
`series of steps through a traffic class tree, with the last step (i.e., at the leaves on the
`classification tree) mapping the flow to a policy. The policy is a rule of assignment
`for flows. Web traffic may also be classified by HTTP header types such as
`Content-Type (MIME type) or User-Agent.
`
`A classification tree is a data structure representing the hierarchical aspect of traffic
`class relationships. Each node of the classification tree represents a class, and has a
`traffic specification, i.e., a set of attributes or characteristics describing the traffic
`associated with it. Leaf nodes of the classification tree may contain policies.
`According to a particular embodiment, the classification process checks at each
`level if the flow being classified matches the attributes of a given traffic class. If it
`does, processing continues down to the links associated with that node in the tree. If
`it does not, the class at the level that matches determines the policy for the flow
`
`10
`
`Packet Intelligence Ex. 2008 Page 10 of 187
`
`

`

`
`PALO ALTO’S INVALIDITY CONTENTIONS
`Exhibit A5: U.S. Patent No. 6,412,000 (“Riddle”)
`
`
`’099
`Claim
`
`Claim Element
`
`U.S. Patent No. 6,412,000 (“Riddle”)
`
`
`
`
`being classified. If no policy specific match is found, the flow is assigned the default
`policy.
`
`In a preferred embodiment, the classification tree is an N-ary tree with its nodes
`ordered by specificity. For example, in classifying a particular flow in a
`classification tree ordered first by organizational departments, the attributes of the
`flow are compared with the traffic specification in each successive department node
`and if no match is found, then processing proceeds to the next subsequent
`department node. If no match is found, then the final compare is a default “match
`all” category. If, however, a match is found, then classification moves to the
`children of this department node. The child nodes may be ordered by an orthogonal
`paradigm such as, for example, “service type.” Matching proceeds according to the
`order of specificity in the child nodes. Processing proceeds in this manner,
`traversing downward and from left to right in FIGS. 2A and 2B, which describe a
`classification tree, searching the plurality of orthogonal paradigms. Key to
`implementing this a hierarchy is that the nodes are arranged in decreasing order of
`specificity. This permits search to find the most specific class for the traffic before
`more general.
`
`Table 2 depicts components from which Traffic classes may be built. Note that the
`orientation of the server (inside or outside) is specified. And as noted above, any
`traffic class component may be unspecified, i.e. set to match any value.”);
`
`10:59-11:9 (“Network traffic is automatically classified under existing classes,
`beginning with the broadest classes, an inbound traffic class and an outbound traffic
`class, in protocol layer independent categories. For example, a particular instance of
`traffic may be classified according to its transport layer characteristics, e.g., Internet
`Protocol port number, as well as its application layer information, e.g., SMTP.
`
`11
`
`Packet Intelligence Ex. 2008 Page 11 of 187
`
`

`

`
`PALO ALTO’S INVALIDITY CONTENTIONS
`Exhibit A5: U.S. Patent No. 6,412,000 (“Riddle”)
`
`
`’099
`Claim
`
`Claim Element
`
`U.S. Patent No. 6,412,000 (“Riddle”)
`
`
`
`
`Characteristics such as MIME types may also be automatically identified. Standard
`protocols, such as, IPX, SNA, and services, such as, SMTP and FTP are recognized
`for automatic classification. Classification is performed to the most specific level
`determinable. For example, in select embodiments, non-IP traffic, such as SNA,
`may be classified only by protocol, whereas Internet Protocol traffic may be
`classified to the /etc/services level. Classification beyond a terminal classification
`level is detected and prevented. For example, in a select embodiment, a class
`matching “ipx” or “nntp” will not be further automatically classified.”);
`
`12:27-41 (“FIG. 3 depicts components of a system for automatically classifying
`traffic according to the invention. A traffic tree 302 in which new traffic will be
`classified under a particular member class node. A traffic classifier 304 detects
`services for incoming traffic. Alternatively, the classifier may start with a service
`and determine the hosts using it. A knowledge base 306 contains heuristics for
`determining traffic classes. The knowledge base may be embodied in a file or a
`relational database. In a particular embodiment, the knowledge is contained within a
`data structure resident in memory. A plurality of saved lists 308 stores classified
`traffic pending incorporation into traffic tree 302. In select embodiments, entries for
`each instance of traffic may be kept. In alternate embodiments, a copy of an entry
`and a count of duplicate copies for the entry is maintained.”);
`
`12:48-53 (“In a decisional step 406, a determination is made if traffic matches one
`of the classes being classified. If this is so, then in a step 408, an entry is made in a
`list of identifying characteristics, such as protocol type (SAP), IP protocol number,
`server port, traffic type if known, MIME type, a time of occurrence of the traffic.”)
`
`Table 2:
`
`12
`
`Packet Intelligence Ex. 2008 Page 12 of 187
`
`

`

`
`PALO ALTO’S INVALIDITY CONTENTIONS
`Exhibit A5: U.S. Patent No. 6,412,000 (“Riddle”)
`
`
`’099
`Claim
`
`Claim Element
`
`U.S. Patent No. 6,412,000 (“Riddle”)
`
`
`
`
`
`
`
`
`Fig. 1A:
`
`Fig. 2B:
`
`13
`
`Packet Intelligence Ex. 2008 Page 13 of 187
`
`

`

`
`PALO ALTO’S INVALIDITY CONTENTIONS
`Exhibit A5: U.S. Patent No. 6,412,000 (“Riddle”)
`
`
`’099
`Claim
`
`Claim Element
`
`U.S. Patent No. 6,412,000 (“Riddle”)
`
`
`
`
`
`
`
`
`Fig. 3:
`
`14
`
`Packet Intelligence Ex. 2008 Page 14 of 187
`
`

`

`
`PALO ALTO’S INVALIDITY CONTENTIONS
`Exhibit A5: U.S. Patent No. 6,412,000 (“Riddle”)
`
`
`’099
`Claim
`
`Claim Element
`
`U.S. Patent No. 6,412,000 (“Riddle”)
`
`Fig. 4A:
`
`
`
`
`
`
`To the extent Packet Intelligence alleges that Riddle does not explicitly disclose this
`claim limitation, this limitation is inherent and/or it would have been obvious in
`view of the knowledge of one of ordinary skill in the art, in view of the references
`identified in Exhibit B, and/or it would have been obvious to one of ordinary skill in
`the art to combine the teaching of Riddle with the prior art identified in §C of Palo
`Alto’s Invalidity Contentions.
`
`[1.c]
`
`(c) a parser subsystem coupled
`to the packet buffer and to the
`pattern/extraction operations
`
`Riddle discloses a parser subsystem coupled to the packet buffer and to the
`pattern/extraction operations memory, the parser subsystem configured to examine
`the packet accepted by the buffer, extract selected portions of the accepted packet,
`
`15
`
`Packet Intelligence Ex. 2008 Page 15 of 187
`
`

`

`
`PALO ALTO’S INVALIDITY CONTENTIONS
`Exhibit A5: U.S. Patent No. 6,412,000 (“Riddle”)
`
`
`’099
`Claim
`
`Claim Element
`
`U.S. Patent No. 6,412,000 (“Riddle”)
`
`
`
`
`memory, the parser subsystem
`configured to examine the
`packet accepted by the buffer,
`extract selected portions of the
`accepted packet, and form a
`function of the selected portions
`sufficient to identify that the
`accepted packet is part of a
`conversational flow-sequence;
`
`and form a function of the selected portions sufficient to identify that the accepted
`packet is part of a conversational flow-sequence.
`
`For example, Riddle discloses:
`
`6:1-16 (“The hardware configurations are in general standard and will be described
`only briefly. In accordance with known practice, server 20 includes one or more
`processors 30 which communicate with a number of peripheral devices via a bus
`subsystem 32. These peripheral devices typically include a storage subsystem 35,
`comprised of a memory subsystem 35a and a file storage subsystem 35b holding
`computer programs (e.g., code or instructions) and data, a set of user interface input
`and output devices 37, and an interface to outside networks, which may employ
`Ethernet, Token Ring, ATM, IEEE 802.3, ITU X.25, Serial Link Internet Protocol
`(SLIP) or the public Switched telephone network. This interface is shown
`schematically as a “Network Interface” block 40. It is coupled to corresponding
`interface devices in client computers via a network connection 45.”);
`
`Cl.8 (“a processor means operative to: parse a packet into a first flow specification,
`wherein said first flow specification contains at least one instance of any one of the
`following: a protocol family designation, a direction of packet flow designation, a
`protocol type designation, a pair of hosts, a pair of ports, in HTTP protocol packets,
`a pointer to a MIME type”);
`
`8:58-9:11 (“Traffic classes may be defined at any level of the IP protocol as well as
`for other non-IP protocols. For example, at the IP level, traffic may be defined as
`only those flows between a specified set of inside and outside IP addresses or
`domain names. An example of such a low level traffic class definition would be all
`traffic between my network and other corporate offices throughout the Internet. At
`the application level, traffic classes may be defined for specific URIs within a web
`
`16
`
`Packet Intelligence Ex. 2008 Page 16 of 187
`
`

`

`
`PALO ALTO’S INVALIDITY CONTENTIONS
`Exhibit A5: U.S. Patent No. 6,412,000 (“Riddle”)
`
`
`’099
`Claim
`
`Claim Element
`
`U.S. Patent No. 6,412,000 (“Riddle”)
`
`
`
`
`server. Traffic classes may be defined having “Web aware” class attributes. For
`example, a traffic class could be created such as all URIs matching “*.html” for all
`servers, or all URI patterns matching “*.gif” for server X, or for access to server Y
`with URI pattern “/sales/*” from client Z, wherein ‘*’ is a wildcard character, i.e., a
`character which matches all other character combinations. Traffic class attributes
`left unspecified will simply match any value for that attribute. For example, a traffic
`class that accesses data objects within a certain directory path of a web server is
`specified by a URI pattern of the directory path to be managed, e.g. “/sales/*” .”);
`
`11:10-23 (“A service aggregate is provided for certain applications that use more
`than one connection in a particular conversation between a client and a server. For
`example, an FTP client in conversation with an FTP server employs a command
`channel and a transfer channel, which are distinct TCP sessions on two different
`ports. In cases where two or three TCP or UDP sessions exist for each conversation
`between one client and one server, it is useful to provide a common traffic class i.e.,
`the service aggregate, containing the separate conversations. In practice, these types
`of conversations are between the same two hosts, but use different ports. According
`to the invention, a class is created with a plurality of traffic specifications, each
`matching various component conversations.”);
`
`11:48-67 (“In a preferable embodiment, classification can extend to examination of
`the data contained in a flow's packets. Certain traffic may be distinguished by a
`signature even if it originates with a server run on a non-standard port, for example,
`an HTTP conversation on port 8080 would not be otherwise determinable as HTTP
`from the port number. Further analysis of the data is conducted in order to
`determine classification in instances where: 1) FTP commands are used to define
`server ports, 2) HTTP protocol is used for non-web purposes. The data is examined
`for indication of push traffic, such as pointcast, which uses HTTP as a transport
`
`17
`
`Packet Intelligence Ex. 2008 Page 17 of 187
`
`

`

`
`PALO ALTO’S INVALIDITY CONTENTIONS
`Exhibit A5: U.S. Patent No. 6,412,000 (“Riddle”)
`
`
`’099
`Claim
`
`Claim Element
`
`U.S. Patent No. 6,412,000 (“Riddle”)
`
`
`
`
`mechanism. These uses may be isolated and classified into a separate class.
`Marimba and pointcast can be distinguished by looking into the data for a signature
`content header in the get request. Pointcast has URLs that begin with “/FIDO-1/.”
`Other applications in which protocol can be inferred from data include Telnet
`traffic. Both tn3270 and tn3270E (emulation) may be detected by looking into data
`and given a different class. Telnet traffic has option negotiations which may indicate
`an appropriate class.”);
`
`12:3-12 (“A traffic class may be inferred from determining the identity of the
`creator of a resource used by the traffic class. For example, the identity of traffic
`using a certain connection can be determined by finding the identity of the creator of
`the connection. This method is used to detect Real Time Protocol (RTP) for point-
`to-point telephony, RTP for broadcast streaming, CCITT/ITU H320-telephony over
`ISDN, H323-internet telephony over the internet (bidirectional) and RTSP real time
`streaming protocol for movies (unidirectional).”);
`
`12:27-60 (“FIG. 3 depicts components of a system for automatically classifying
`traffic according to the invention. A traffic tree 302 in which new traffic will be
`classified under a particular member class node. A traffic classifier 304 detects
`services for incoming traffic. Alternatively, the classifier may start with a service
`and determine the hosts using it. A knowledge base 306 contains heuristics for
`determining traffic classes. The knowledge base may be embodied in a file or a
`relational database. In a particular embodiment, the knowledge is contained within a
`data structure resident in memory. A plurality of saved lists 308 stores classified
`traffic pending incorporation into traffic tree 302. In select embodiments, entries for
`each instance of traffic may be kept. In alternate embodiments, a copy of an entry
`and a count of duplicate copies for the entry is maintained.
`
`18
`
`Packet Intelligence Ex. 2008 Page 18 of 187
`
`

`

`
`PALO ALTO’S INVALIDITY CONTENTIONS
`Exhibit A5: U.S. Patent No. 6,412,000 (“Riddle”)
`
`
`’099
`Claim
`
`Claim Element
`
`U.S. Patent No. 6,412,000 (“Riddle”)
`
`
`
`
`FIG. 4A depicts a flowchart 401 of processing steps for automatically classifying
`traffic. In a step 402, a flow specification is parsed from the flow being classified.
`Then in a step 404, the flow specification parsed from the flow in step 402 is
`compared with the traffic specifications in each node of the classification tree. Rules
`are checked starting from most specific to least specific. In a decisional step 406, a
`determination is made if traffic matches one of the classes being classified. If this is
`so, then in a step 408, an entry is made in a list of identifying characteristics, such as
`protocol type (SAP), IP protocol number, server port, traffic type if known, MIME
`type, a time of occurrence of the traffic. In an optional step 410, duplicate instances
`having the same identifying characteristics are suppressed, in favor of keeping a
`count of the duplicates and a most recent time traffic with these identifying
`characteristics was encountered. In an optional step 412, a byte count of traffic of
`this type has been detected is included. Otherwise, the automatic classification has
`failed to determine a class and processing returns.”);
`
`Fig. 3:
`
`19
`
`Packet Intelligence Ex. 2008 Page 19 of 187
`
`

`

`
`PALO ALTO’S INVALIDITY CONTENTIONS
`Exhibit A5: U.S. Patent No. 6,412,000 (“Riddle”)
`
`
`’099
`Claim
`
`Claim Element
`
`U.S. Patent No. 6,412,000 (“Riddle”)
`
`
`
`
`[1.d]
`
`(d) a memory storing a flow-
`entry database including a
`plurality of flow-entries for
`conversational flows
`encountered by the monitor;
`
`
`
`To the extent Packet Intelligence alleges that Riddle does not explicitly disclose this
`claim limitation, this limitation is inherent and/or it would have been obvious in
`view of the knowledge of one of ordinary skill in the art, in view of the references
`identified in Exhibit B, and/or it would have been obvious to one of ordinary skill in
`the art to combine the teaching of Riddle with the prior art identified in §C of Palo
`Alto’s Invalidity Contentions.
`
`Riddle discloses a memory storing a flow-entry database including a plurality of
`flow-entries for conversational flows encountered by the monitor.
`
`For example, Riddle discloses:
`
`6:1-15 (“The hardware configurations are in general standard and will be described
`only briefly. In accordance with known practice, server 20 includes one or more
`processors 30 which communicate with a number of peripheral devices via a bus
`subsystem 32. These peripheral devices typically include a storage subsystem 35,
`
`20
`
`Packet Intelligence Ex. 2008 Page 20 of 187
`
`

`

`
`PALO ALTO’S INVALIDITY CONTENTIONS
`Exhibit A5: U.S. Patent No. 6,412,000 (“Riddle”)
`
`
`’099
`Claim
`
`Claim Element
`
`U.S. Patent No. 6,412,000 (“Riddle”)
`
`
`
`
`comprised of a memory subsystem 35 a and a file storage subsystem 35 b holding
`computer programs (e.g., code or instructions) and data, a set of user interface input
`and output devices 37, and an interface to outside networks, which may employ
`Ethernet, Token Ring, ATM, IEEE 802.3, ITU X.25, Serial Link Internet Protocol
`(SLIP) or the public switched telephone network. This interface is shown
`schematically as a “Network Interface” block 40. It is coupled to corresponding
`interface devices in client computers via a network connection 45.”);
`
`8:48-57 (“A traffic class is broadly defined as traffic between one or more clients
`and one or more servers. A single instance of a traffic class is called a flow. Traffic
`classes have the property, or class attribute, of being directional, i.e. all traffic
`flowing inbound will belong to different traffic classes and be managed separately
`from traffic flowing outbound. The directional property enables asymmetric
`classification and control of traffic, i.e., inbound and outbound flows belong to
`different classes which may be managed independent

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket