`
`(12) United States Patent
`Balassanian
`
`(10) Patent No.:
`(45) Date of Patent:
`
`US 8,694,683 B2
`*Apr. 8, 2014
`
`(54) METHOD AND SYSTEM FOR DATA
`DEMULTIPLEXING
`
`(71) Applicant: Implicit Networks, Inc., Bellevue, WA
`(US)
`(72) Inventor: Edward Balassanian, Seattle, WA (US)
`(73) Assignee: Implicit Networks, Inc., Bellevue, WA
`(US)
`Subject to any disclaimer, the term of this
`patent is extended or adjusted under 35
`U.S.C. 154(b) by 0 days.
`This patent is Subject to a terminal dis
`claimer.
`
`(*) Notice:
`
`(21)
`(22)
`(65)
`
`(63)
`
`(51)
`
`(52)
`
`(58)
`
`Appl. No.: 13/911,324
`
`Filed:
`
`Jun. 6, 2013
`
`Prior Publication Data
`US 2013/0266O25A1
`Oct. 10, 2013
`
`Related U.S. Application Data
`Continuation of application No. 13/236,090, filed on
`Sep.19, 2011, now abandoned, which is a continuation
`of application No. 10/636,314, filed on Aug. 6, 2003,
`now Pat. No. 8,055,786, which is a continuation of
`application No. 09/474,664, filed on Dec. 29, 1999,
`now Pat. No. 6,629,163.
`
`(2006.01)
`
`Int. C.
`G06F 15/16
`U.S. C.
`USPC ............................ 709/246; 709/238; 370/466
`Field of Classification Search
`USPC ............... 709/230, 228, 246, 238; 370/395.1,
`370/469, 231, 466:379/207.02,229;
`710/33
`See application file for complete search history.
`
`(56)
`
`References Cited
`
`U.S. PATENT DOCUMENTS
`
`3, 1994 Yun
`5,298,674. A
`5/1995 Hershey et al.
`5,414,833 A
`5/1997 Pearson et al.
`5,627,997 A
`6/1998 HaSebe
`5,761,651 A
`5,826,027 A 10, 1998 Pedersen et al.
`5,835,726 A 11/1998 Shwed et al.
`5,848,233 A 12/1998 Radia et al.
`(Continued)
`
`FOREIGN PATENT DOCUMENTS
`
`EP
`
`O817031
`
`1, 1998
`
`OTHER PUBLICATIONS
`
`RFC: 791, Internet Protocol: DARPA Internet Program Protocol
`Specification, Sep. 1981, prepared for Defense Advanced Research
`Projects Agency Information Processing Techniques Office by Infor
`mation Sciences Institute University of Southern California, 52
`pageS.
`
`(Continued)
`Primary Examiner — Jungwon Chang
`(74) Attorney, Agent, or Firm — Meyertons, Hood, Kivlin,
`Kowert & Goetzel, P.C.
`
`ABSTRACT
`(57)
`A method and system for demultiplexing packets of a mes
`sage is provided. The demultiplexing system receives packets
`of a message, identifies a sequence of message handlers for
`processing the message, identifies state information associ
`ated with the message for each message handler, and invokes
`the message handlers passing the message and the associated
`state information. The system identifies the message handlers
`based on the initial data type of the message and a target data
`type. The identified message handlers effect the conversion of
`the data to the target data type through various intermediate
`data types.
`
`30 Claims, 16 Drawing Sheets
`
`-1502
`path = entry -> Foth
`
`157
`1.E.NC
`tech SSR
`
`ListNecentry->
`
`akra Elul
`
`ÉE. tiny -
`SESYES
`En
`
`i505
`E.
`(e.g.
`Sof
`riding
`
`i56
`tly a
`(Ear ES
`<s-X P.
`em
`seria:
`entry = shortentry
`
`
`
`-isos
`
`sharEntry s
`entry
`
`YES
`
`rist
`fiti
`palh = entry X Path -- Return
`-151
`i513
`elem: flu
`park Address,
`rest
`He split is eagle
`Estir.
`PEnix Q03)
`path -> Stocklist)
`is is iss -
`ster = fathtry
`Extendah
`"big" cast,
`salus)
`( Return )
`
`Juniper Ex. 1003-p. 1
`Juniper v Implicit
`
`
`
`US 8,694,683 B2
`Page 2
`
`(56)
`
`References Cited
`
`U.S. PATENT DOCUMENTS
`
`5,848,415 A 12/1998 Guck
`5,854,899 A 12/1998 Callon et al.
`5,898,830 A
`4/1999 Wesinger, Jr. et al.
`6,091,725 A
`7/2000 Cheriton et al.
`6,104,500 A
`8, 2000 Alam et al.
`6,115,393 A * 9/2000 Engel et al. ................... 370/469
`6,119,236 A
`9/2000 Shipley
`6,141,749 A 10, 2000 COSS et al.
`6,151,390 A * 1 1/2000 Volftsun et al. ............... 379,229
`6,226,267 B1
`5/2001 Spinney et al.
`6,243,667 B1
`6, 2001 Kerr et al.
`6,259,781 B1* 7/2001 Crouch et al. ........... 379,207.O2
`6,356,529 B1* 3/2002 Zarom .......................... 370,231
`6,401,132 B1
`6, 2002 Bellwood et al.
`6.426,943 B1
`7/2002 Spinney et al.
`6,519,636 B2
`2/2003 Engel et al.
`6,598,034 B1
`7, 2003 Kloth
`6,629,163 B1
`9/2003 Balassanian .................... T10/33
`6,651,099 B1
`1 1/2003 Dietz et al.
`6,678,518 B2
`1/2004 Eerola
`6,680,922 B1
`1/2004 Jorgensen
`6,701432 B1
`3/2004 Deng et al.
`6,711,166 B1* 3/2004 Amir et al. ................. 370,395.1
`6,785,730 B1* 8/2004 Taylor ........................... TO9/230
`6,871,179 B1
`3/2005 Kist et al.
`6,889, 181 B2
`5, 2005 Kerr et al.
`7,383,341 B1* 6/2008 Saito et al. .................... TO9,228
`OTHER PUBLICATIONS
`
`Alexander, D. et al., “The SwitchWare Active Network Architec
`ture', Jun. 6, 1998, IEEE.
`Antoniazzi. S. et al., “An Open Software Architecture for Multimedia
`Consumer Terminals'. Central Research Labs, Italy; Alcatel SEL
`Research Centre, Germany, ECMAST 1997.
`Arbanowski, Stefan, “Generic Description of Telecommunication
`Services and Dynamic Resource Selection in Intelligent Communi
`cation Environments'. Thesis, Technische Universitat Berlin, Oct. 9,
`1996 (3 documents).
`Arbanowski, S., et al., Service Personalization for Unified Messaging
`Systems, Jul. 6-8, 1999. The Fourth IEEE Symposium on Computers
`and Communications, ISCC 99, Red Sea, Egypt.
`Atkinson, R. “Security Architecture for the Internet Protocol', Aug.
`1995, Naval Research Laboratory.
`Atkinson, R., “IP Authentication Header'. Aug. 1995, Naval
`Research Laboratory.
`Atkinson, R., “IP Encapsulating Security Payload (ESP). Aug.
`1995, Naval Research Laboratory.
`Back, G., et al., Java Operating Systems: Design and Implementa
`tion, Aug. 1998, Technical Report UUCS-98-015, University of
`Utah.
`Baker, Dr. Sean, "CORBA Implementation Issues', 1994, IONA
`Technologies, O'Reilly Institute Dublin, Ireland.
`Barrett, R., et al., “Intermediaries: New Places for Producing and
`Manipulating Web Content”, 1998, IBM Almaden Research Center,
`Elsevier Science.
`Bellare, M., et al., “A Concrete Security Treatment of Symmetric
`Encryption: Analysis of the Des Modes of Operation'. Aug. 15, 1997.
`Dept. of Computer Science and Engineering, University of Califor
`nia, San Diego.
`Bellare, M., et al., “A Concrete Security Treatment of Symmetric
`Encryption: Analysis of the DES Modes of Operation'. Aug. 15.
`1997, IEEE.
`Bellare, M., et al., “XORMACs: New Methods for Message Authen
`tication Using Finite Pseudorandom Functions”, 1995, CRYPTO
`'95, LNCS 963, pp. 15-28, Springer-Verlag Berlin Heidelberg.
`Bellissard, L., et al., “Dynamic Reconfiguration of Agent-Based
`Applications'. Third European Research Seminar on Advances in
`Distributed Systems, (ERSADS 99) Madeira Island.
`Bolding, Darren, “Network Security, Filters and Firewalls”, 1995,
`www.acm.org/crossroads/Xrds2-1/security.html.
`
`Booch, G., et al., “Software Engineering with ADA’. 1994. Third
`Edition, the Benjamin Cummings Publishing Company, Inc. (2 docu
`ments).
`Breugst, et al., “Mobile Agents—Enabling Technology for Active
`Intelligent Network Implementation'. May/Jun. 1998, IEEE Net
`work.
`“C Library Functions”, AUTH(3) Sep. 17, 1993, Solbourne Com
`puter, Inc.
`Chapman, D., et al., “Building Internet Firewalls'. Sep. 1995,
`O'Reilly & Associates, Inc.
`CheckPoint FireWall-1 Technical White Paper, Jul 18, 1994,
`CheckPoint Software Technologies, Ltd.
`CheckPoint FireWall-1 White Paper, Sep. 1995, Version 2.0,
`CheckPoint Software Technologies, Ltd.
`Command Line Interface Guide PN 093-001 1-000 Rev C Version
`2.5, 2000-2001, NetScreen Technologies, Inc.
`Coulson, G. et al., “A CORBA Compliant Real-Time Multimedia
`Platform for Broadband Networks”. LectureNotes in Computer Sci
`ence, 1996, Trends in Distributed Systems CORBA and Beyond.
`Cox, Brad, "SuperDistribution, Objects as Property on the Electronic
`Frontier', 1996, Addison-Wesley Publishing Company.
`Cranes, et al., “A Configurable Protocol Architecture for CORBA
`Environments'. Autonomous Decentralized Systems 1997 Proceed
`ings ISADS. Third International Symposium Apr. 9-11, 1997.
`Curran, K., et al., "CORBA Lacks Venom'. University of Ulster,
`Northern Ireland, UK 2000.
`Dannert, Andreas, "Call Logic Service for a Personal Communica
`tion Supporting System'. Thesis, Jan. 20, 1998, Technische
`Universitat Berlin.
`DARPA Internet Program Protocol Specification, “Transmission
`Control Protocol'. Sep. 1981, Information Sciences Institute, Cali
`fornia.
`DARPA Internet Program Protocol Specification, “Internet Proto
`col'. Sep. 1981, Information Sciences Institute, California.
`Decasper, D., et al., “Crossbow: A Toolkit for Integrated Services
`over Cell Switched IPv6', 1997, Computer Engineering and Net
`works Laboratory, ETH Zurich, Switzerland.
`Decasper, D., et al., “Router Plugins A Software Architecture for
`Next Generation Routers”, 1998, Proceedings of ACM SIGCONM
`98.
`Deering, S., et al., Internet Protocol, Version 6 (IPv6) Specification,
`Dec. 1998, Nokia, The Internet Society.
`Deering, S., et al., Internet Protocol, Version 6 (IPv6) Specification,
`Dec. 1995, Network Working Group, RFC 1883.
`Dutton, et al., “Asynchronous Transfer Mode Technical Overview
`(ATM), Second Edition; IBM, Oct. 1995, 2" Edition, Prentice Hall
`PTR, USA.
`Eckardt, T., et al., “Application of X.500 and X.700 Standards for
`Supporting Personal Communications in Distributed Computing
`Environments', 1995, IEEE.
`Eckardt, T., et al., “Personal Communications Support based on
`TMN and TINA Concepts”, 1996, IEEE Intelligent Network Work
`shop (IN '96), Apr. 21-24, Melbourne, Australia.
`Eckardt, T., et al., “Beyond IN and UPT A Personal Communica
`tions Support System Based on TMN Concepts”. Sep. 1997, IEEE
`Journal on Selected Areas in Communications, vol. 15, No. 7.
`Egevang, K., et al., “The IP Network Address Translator (NAT)'.
`May 1994, Network Working Group, RFC 1631.
`Estrin, D., et al., “Visa Protocols for Controlling Inter-Organizational
`Datagram Flow”. Dec. 1998, Computer Science Department, Uni
`versity of Southern California and Digital Equipment Corporation.
`Faupel, M., “Java Distribution and Deployment”, Oct. 9, 1997, APM
`Ltd., United Kingdom.
`Felber, P. “The CORBA Object Group Service: A Service Approach
`to Object Groups in CORBA'. Thesis, 1998, Ecole Polytechnique
`Federale de Lausanne, Switzerland.
`Fish, R., et al., “DRoPS. Kernel Support for Runtime Adaptable
`Protocols”, Aug. 25-27, 1998, IEEE 24' Euromicro Conference,
`Sweden.
`Fiuczynski, M., et al., “An Extensible Protocol Architecture for
`Application-Specific Networking”. 1996, Department of Computer
`Science and Engineering, University of Washington.
`
`Juniper Ex. 1003-p. 2
`Juniper v Implicit
`
`
`
`US 8,694,683 B2
`Page 3
`
`(56)
`
`References Cited
`
`OTHER PUBLICATIONS
`
`Franz, Stefan, “Job and Stream Control in Heterogeneous Hardware
`and Software Architectures”, Apr. 1998, Technische Universitat, Ber
`lin (2 documents).
`Fraser, T., “DTE Firewalls: Phase Two Measurement and Evaluation
`Report”. Jul. 22, 1997, Trusted Information Systems, USA.
`Gazis, V., et al., “A Survey of Dynamically Adaptable Protocol
`Stacks', first Quarter 2010, IEEE Communications Surveys & Tuto
`rials, vol. 12, No. 1, 1 Quarter.
`Gokhale, A., et al., “Evaluating the Performance of Demultiplexing
`Strategies for Real-Time CORBA”, Nov. 1997, GLOBECOM.
`Gokhale, A., et al., “Measuring and Optimizing CORBA Latency and
`Scalability Over High-Speed Networks”, Apr. 1998, IEEE Transac
`tion on Computers, vol. 47, No. 4; Proceedings of the International
`Conference on Distributed Computing Systems (ICDCS 97) May
`27-30, 1997.
`Gokhale, A., et al., “Operating System Support for High-Perfor
`mance, Real-Time CORBA’, 1996.
`Gokhale, A., et al., “Principles for Optimizing CORBA Internet
`Inter-ORB Protocol Performance'. Jan. 9, 1998, Proceedings of the
`HICSS Conference, Hawaii.
`Gong, Li, “Java Security: Present and Near Future', May/Jun. 1997.
`IEEE Micro.
`Gong, Li, "New Security Architectural Directions for Java (Extended
`Abstract), Dec. 19, 1996, IEEE.
`Gong, Li, "Secure Java Class Loading”, Nov./Dec. 1998, IEEE
`Internet.
`Goos, G., et al., “LectureNotes in Computer Science: Mobile Agents
`and Security”, 1998, Springer-Verlag Berlin Heidelberg.
`Goralski, W., “Introduction to ATM Networking”. 1995, McGraw
`Hill Series on Computer Communications, USA.
`Hamzeh, K., et al., Layer Two Tunneling Protocol"L2TP, Jan. 1998,
`PPP Working Group, Internet Draft.
`Harrison, T., et al., “The Design and Performance of a Real-Time
`CORBA Event Service”, Aug. 8, 1997.Proceedings of the OOPSLA
`97 Conference, Atlanta, Georgia in Oct. 1997.
`Huitema, Christian, “IPv6 The New Internet Protocol, 1997
`Prentice Hall, Second Edition.
`Hutchins, J., et al., “Enhanced Internet Firewall Design Using State
`ful Filters Final Report', Aug. 1997, Sandia Report; Sandia National
`Laboratories.
`IBM, Local Area Network Concepts and Products: Routers and Gate
`ways, May 1996.
`Juniper Networks Press Release, Juniper Networks Announces
`Junos, First Routing Operating System for High-Growth Internet
`Backbone Networks, Jul. 1, 1998, Juniper Networks.
`Juniper Networks Press Release, Juniper Networks Ships the Indus
`try's First Internet Backbone Router Delivering Unrivaled Scal
`ability, Control and Performance, Sep. 16, 1998, Juniper Networks.
`Karn, P. et al., “The ESP DES-CBC Transform”, Aug. 1995, Net
`work Working Group, RFC 1829.
`Kelsey, J. et al., “Authenticating Outputs of Computer Software
`Using a Cryptographic Coprocessor'. Sep. 1996, CARDIS.
`Krieger, D., et al., “The Emergence of Distributed Component Plat
`forms', Mar. 1998, IEEE.
`Krupczak, B., et al., “Implementing Communication Protocols in
`Java”, Oct. 1998, IEEE Communications Magazine.
`Krupczak, B., et al., “Implementing Protocols in Java: The Price of
`Portability”, 1998, IEEE.
`Lawson, Stephen, “Cisco NetFlow Switching Speeds Traffic Rout
`ing”, Jul. 7, 1997, Infoworld.
`Li, S., et al., “Active Gateway: A Facility for Video Conferencing
`Traffic Control”, Feb. 1, 1997, Purdue University; Purdue e-Pubs;
`Computer Science Technical Reports.
`Magedanz, T., et al., “Intelligent Agents: An Emerging Technology
`for Next Generation Telecommunications?', 1996, IEEE.
`Mills, H., et al., “Principles of Information Systems Analysis and
`Design”, 1986, Academic Press, Inc. (2 documents).
`
`Mosberger, David, "Scout. A Path-Based Operating System'. Doc
`toral Dissertation Submitted to the University of Arizona, 1997 (3
`documents).
`Muhugusa, M., et al., “ComScript: An Environment for the Imple
`mentation of Protocol Stacks and their Dynamic Reconfiguration'.
`Dec. 1994.
`Nelson, M., et al., The Data Compression Book, 2" Edition, 1996,
`M&T Books. A division of MIS Press, Inc.
`NetRanger User's Guide, 1996, WheelGroup Corporation.
`NetScreen Command Line Reference Guide, 2000, PN 093-0000
`001 Rev A. NetScreen Technologies, Inc., USA.
`NetScreen Command Line Reference Guide, 2000, PN 093-0000
`001 NetScreen Technologies, Inc., USA.
`NetScreen Concepts and Examples ScreenOS Reference Guide,
`1998-2001, Version 2.5 P/N 093-0039-000 Rev. A., NetScreen Tech
`nologies, Inc.
`NetScreen Products Webpage, wysiwyg://body bottom.3/http://
`www.een.com/products/products.html 1998-1999, NetScreen
`Technologies, Inc.
`NetScreen WebOI, Reference Guide, Version 2.5.0 P/N 093-0040
`000 Rev. A. 2000-2001, NetScreen Technologies, Inc.
`NetStalker Installation and User's Guide, 1996, Version 1.0.2, Hay
`Stack Labs, Inc.
`Niculescu, Dragos, "Survey of Active Network Research', Jul. 14.
`1999, Rutgers University.
`Nortel Northern Telecom, “ISDN Primary Rate User-Network Inter
`face Specification'. Aug. 1998.
`Nygren, Erik, “The Design and Implementation of a High-Perfor
`mance Active Network Node'. Thesis, Feb. 1998, MIT.
`Osbourne, E., “Morningstar Technologies Secure0onnect Dynamic
`Firewall Filter User's Guide”, Jun. 14, 1995, V. 1.4, Morning Star
`Technologies, Inc.
`Padovano, Michael, “Networking Applications on UNIX System V
`Release 4, 1993 Prentice Hall, USA (2 documents).
`Pfeifer, T., "Automatic Conversion of Communication Media', 2000,
`GMD Research Series, Germany.
`Pfeifer, T., "Automatic Conversion of Communication Media'. The
`sis, 1999, Technischen Universitat Berlin, Berlin.
`Pfeifer, T., et al., “Applying Quality-of-Service Parametrization for
`Medium-to-Medium Conversion”, Aug. 25-28, 1996, 8' IEEE Work
`shop on Local and Metropolitan Area Networks, Potsdam, Germany.
`Pfeifer, T., “Micronet Machines—New Architectural Approaches for
`Multimedia End-Systems', 1993 Technical University of Berlin.
`Pfeifer, T. “On the Convergence of Distributed Computing and Tele
`communications in the Field of Personal Communications', 1995,
`KiVS, Berlin.
`Pfeifer, T., "Speech Synthesis in the Intelligent Personal Communi
`cation Support System (IPCSS)”, Nov. 2-3, 1995, 2"Speak! Work
`shop on Speech Generation in Multimodal Information Systems and
`Practical Applications.
`Pfeifer, T., et al., “Generic Conversion of Communication Media for
`Supporting Personal Mobility”, Nov. 25-27, 1996, Proc. of the Third
`COST 237 Workshop: Multimedia Telecommunications and Appli
`cations.
`Pfeifer, T., et al., “Intelligent Handling of Communication Media'.
`Oct. 29-31, 1997, 6' IEEE Workshop on Future Trends of Distributed
`Computing Systems (FTDCS) Tunis.
`Pfeifer, T., et al., “Resource Selection in Heterogeneous Communi
`cation Environments using the Teleservice Descriptor'. Dec. 15.-19.
`1997, Proceedings from the 4 COST 237 Workshop: From Multi
`media Services to Network Services, Lisboa.
`Pfeifer, T., et al., Mobile Guide—Location-Aware Applications from
`the Lab to the Market, 1998, IDMS '98, LNCS 1483, pp. 15-28.
`Pfeifer, T., et al., “The Active Store providing Quality Enhanced
`Unified Messaging”, Oct. 20-22, 1998, 5' Conference on computer
`Communications, AFRICOM-CCDC 98, Tunis.
`Pfeifer, T., et al., “A Modular Location-Aware Service and Applica
`tion Platform”, 1999, Technical University of Berlin.
`Plagemann, T., et al., “Evaluating Crucial Performance Issues of
`Protocol Configuration in DaCapo”, 1994, University of Oslo.
`Psounis, Konstantinos, "Active Networks. Applications, Security,
`Safety, and Architectures”. First Quarter 1999, IEEE Communica
`tions Surveys.
`
`Juniper Ex. 1003-p. 3
`Juniper v Implicit
`
`
`
`US 8,694,683 B2
`Page 4
`
`(56)
`
`References Cited
`
`OTHER PUBLICATIONS
`
`Rabiner, Lawrence, "Applications of Speech Recognition in the Area
`of Telecommunications”, 1997, IEEE.
`Raman. Suchitra, etal, "A Model, Analysis, and Protocol Framework
`for Sofi State-based Communications'. Department of EECS, Uni
`versity of California, Berkeley.
`Rogaway, Phillip. “Bucket Hashing and its Application to Fast Mes
`sage Authentication', Oct. 13, 1997. Department of Computer Sci
`ence, University of California.
`Schneier, B., et al., “Remote Auditing of Software Outputs. Using a
`Trusted CoProcessor”, 1997, Elsevier Paper Reprint 1999.
`Tennenhouse, D., et al., “From Internet to ActiveNet, Laboratory of
`Computer Science, MIT, 1996.
`Tudor, P., “Tutorial MPEG-2 Video Compression”. Dec. 1995, Elec
`tronics & Communication Engineering Journal.
`US Copyright Webpage of Copyright Title, “IPv6. the New Internet
`Protocol, by Christian Huitema, 1998 Prentice Hall.
`Van der Meer, et al., “An Approach for a 4' Generation Messaging
`System'. Mar. 21-23, 1999. The Fourth International Symposium on
`Autonomous Decentralized Systems ISADS '99, Tokyo.
`Van der Meer, Sven, "Dynamic Configuration Management of the
`Equipment in Distributed Communication Environments'. Thesis,
`Oct. 6, 1996, Berlin (3 documents).
`Van Renesse, R. et al., “Building Adaptive Systems. Using Ensemble'.
`Cornell University Jul. 1997.
`Venkatesan, R., et al., “Threat-Adaptive Security Policy”, 1997.
`IEEE
`Wetherall, D., et al., “The Active IP Option”, Sep.1996, Proceedings
`of the 7" ACM SIGOPS European Workshop, Connemara, Ireland.
`Welch, Terry, "A Technique for High-Performance Data Compres
`sion', 1984, Sperry Research Center, IEEE.
`Zeletin, R. et al., “Applying Location-Aware Computing for Elec
`tronic Commerce. Mobile Guide”, Oct. 20-22, 1998, 5' Conference
`on Computer Communications, AFRICOM-CCDC 98, Tunis.
`Zell, Markus, "Selection of Converter Chains by Means of Quality of
`Service Analysis'. Thesis, Feb. 12, 1998, Technische Universitat
`Berlin.
`Feb. 4, 2008 Plaintiff's Original Complaint.
`Aug. 26, 2008 Defendant NVIDIA Corporation's Answer to Com
`plaint.
`Aug. 26, 2008 Defendant Sun Microsystems, Inc.'s Answer to Com
`plaint.
`Aug. 27, 2008 Defendant Advanced Micro Devices, Inc.'s Answer to
`Complaint for Patent Infringement.
`Aug. 27, 2008 RealNetworks, Inc.'s Answer to Implicit Networks,
`Inc.'s Original Complaint for Patent Infringement, Affirmative
`Defenses, and Counterclaims.
`Aug. 27, 2008 Intel Corp.'s Answer, Defenses and Counterclaims.
`Aug. 27, 2008 Defendant RMI Corporation's Answer to Plaintiffs
`Original Complaint.
`Sep. 15, 2008 Plaintiffs Reply to NVIDIA Corporation's Counter
`claims.
`Sep. 15, 2008 Plaintiffs Reply to Sun Microsystems Inc.'s Counter
`claims.
`Sep. 16, 2008 Plaintiff's Reply to RealNetworks, Inc.'s Counter
`claims.
`Sep. 16, 2008 Plaintiffs Reply to Intel Corp.’s Counterclaims.
`Dec. 10, 2008 Order granting Stipulated Motion for Dismissal with
`Prejudice re. NVIDIA Corporation, Inc.
`Dec. 16, 2008 Defendants AMD, RealNetworks, RMI, and Sun's
`Motion to Stay Pending the Patent and Trademark Office's Reexami
`nation of the 163 Patent.
`Dec. 29, 2008 Order granting Stipulated Motion for Dismissal with
`out Prejudice of Claims re Sun Microsystems, Inc.
`Jan. 5, 2009 Plaintiff's Opposition to Defendants AMD,
`RealNetworks, RMI, and Sun's Motion to Stay Pending Reexamina
`tion and Exhibit A.
`Jan. 9, 2009 Reply of Defendants AMD, RealNetworks, RMI, and
`Sun's Motion to Stay Pending the Patent and Trademark Office's
`Reexamination of the 163 Patent.
`
`Feb. 9, 2009 Order Granting Stay Pending the United States Patent
`and Trademark Office's Reexamination of U.S. Patent No.
`6,629,163.
`Feb. 17, 2009 Order Granting Stipulated Motion for Dismissal of
`Advanced Micro Devices, Inc. with Prejudice.
`May 14, 2009 Order Granting Stipulated Motion for Dismissal of
`RMI Corporation with Prejudice.
`Oct. 13, 2009 Order Granting Stipulated Motion for Dismissal of
`Claims Against and Counterclaims by Intel Corporation.
`Oct. 30, 2009 Executed Order for Stipulated Motion for Dismissal of
`Claims Against and Counterclaims by RealNetworks, Inc.
`Nov. 30, 2009 Plaintiff's Original Complaint, Implicit v Microsofi,
`Case No. 09-5628.
`Jan. 22, 2010 Order Dismissing Case, Implicit v Microsofi, Case No.
`O9-5628.
`Aug. 16, 2010 Plaintiff's Original Complaint, Implicit v. Cisco, Case
`No. 10-3606.
`Nov. 22, 2010 Defendant Cisco Systems, Inc's Answer and Counter
`claims, Implicit v Cisco, Case No. 10-3606.
`Dec. 13, 2010 Plaintiff, Implicit Networks, Inc.'s, Answer to Coun
`terclaims, Implicit v. Cisco, Case No. 10-3606.
`Oct. 4, 2011 Order of Dismissal With Prejudice, Implicit v. Cisco,
`Case No. 10-3606.
`Aug. 24, 2010 Plaintiff's Original Complaint, Implicit v Citrix, Case
`No. 10-3766.
`Dec. 1, 2010 Plaintiffs First Amended Complaint, Implicit v Citrix,
`Case No. 10-3766.
`Jan. 14, 2011 Defendant Citrix Systems, Inc.'s Answer, Defenses and
`Counter-complaint for Declaratory Judgment, Implicit v Citrix, Case
`No. 10-3766.
`Feb. 18, 2011 Plaintiff, Implicit Networks, Inc.'s, Answer to Defen
`dants Counterclaims, Implicit v Citrix, Case No. 10-3766.
`May 2, 2011 Order of Dismissal, Implicit v Citrix, Case No. 10-3766.
`Jul. 30, 2010 Plaintiff's Original Complaint, Implicit v F5, Case No.
`10-3365.
`Oct. 13, 2010 Defendants' Answer and Counter-Complaint, Implicit
`v F5, Case No. 10-3365.
`Nov. 3, 2010 Plaintiffs Answer to Counter-Complaint, Implicit v F5.
`Case No. 10-3365.
`Dec. 10, 2010 Plaintiffs First Amended Complaint, Implicit v F5.
`Case No. 10-3365.
`Jan. 14, 2011 Defendants' Answer to 1 Amended Complaint and
`Counterclaim, Implicit v F5, Case No. 10-3365.
`Feb. 18, 2011 Plaintiffs Answer to F5's Amended Counter-Com
`plaint, Implicit v F5, Case No. 10-3365.
`Apr. 18, 2011 Defendants' Amended Answer to 1 Amended Com
`plaint and Counter-Complaint, Implicit v F5, Case No. 10-3365.
`May 5, 2011 Plaintiffs Answer to F5's Amended Counter-Com
`plaint, Implicit v F5, Case No. 10-3365.
`Jul. 22, 2011 F5 Networks, Inc.'s Invalidity Contentions, Implicit v
`F5, Case No. 10-3365.
`Jul. 22, 2011 F5 Networks, Inc.'s Invalidity Contentions, Exhibit A.
`Implicit v F5, Case No. 10-3365 (31 documents).
`Jul. 22, 2011 F5 Networks, Inc.'s Invalidity Contentions, Exhibit B,
`Implicit v F5, Case No. 10-3365.
`Oct. 18, 2011 Joint Claim Construction & Pre-Hearing Statement
`(PR4-3), Implicit v F5, Case No. 10-3365.
`Oct. 18, 2011 Joint Claim Construction & Pre-Hearing Statement
`(PR4-3) Exhibit A, Implicit v F5, Case No. 10-3365 (2 documents).
`Nov. 28, 2011 Plaintiff's Opening Claim Construction Brief, Implicit
`v F5, Case No. 10-3365.
`Nov. 29, 2011 Amended Joint Claim Construction & Pre-Hearing
`Statement, Implicit v F5, Case No. 10-3365.
`Nov. 29, 2011 Amended Joint Claim Construction & Pre-Hearing,
`Exhibit A, Implicit v F5, Case No. 10-3365.
`Dec. 12, 2011 Defendants' Claim Construction Brief, Implicit v F5.
`Case No. 10-3365.
`Dec. 19, 2011 Plaintiffs Reply to Defendants' (F5, HP Juniper)
`Responsive Claim Construction Brief (4-5), Implicit v F5, Case No.
`10-3365.
`Jan. 27, 2012 Transcript of Proceeding Held on Jan. 17, 2012;
`Implicit v F5, Case No. 10-3365.
`
`Juniper Ex. 1003-p. 4
`Juniper v Implicit
`
`
`
`US 8,694,683 B2
`Page 5
`
`(56)
`
`References Cited
`
`OTHER PUBLICATIONS
`
`Jan. 27, 2012 Transcript of Proceeding Held on Jan. 18, 2012;
`Implicit v F5, Case No. 10-3365.
`Jan. 27, 2012 Transcript of Proceeding Held on Jan. 19, 2012;
`Implicit v F5, Case No. 10-3365.
`Feb. 29, 2012 Claim Construction Order.
`Aug. 15, 2012 Storer Invalidity Report.
`Sep. 10, 2012 Implicit’s Expert Report of Scott M. Nettles.
`Mar. 13, 2013 Order Granting Defendants' Motion for Summary
`Judgment.
`Apr. 9, 2013 Notice of Appeal to the Federal Circuit.
`Aug. 23, 2010 Plaintiff's Original Complaint, Implicit v HP, Case
`No. 10-3746.
`Nov. 23, 2010 Plaintiffs First Amended Complaint, Implicit v HP,
`Case No. 10-3746.
`Jan. 14, 2011 Defendant HP's Answer and Counterclaims, Implicit v
`HP, Case No. 10-3746.
`Feb. 18, 2011 Implicit Networks, Inc.'s Answer to HP Counter
`claims, Implicit v HP, Case No. 10-3746.
`May 10, 2011 Plaintiffs Amended Disclosure of Asserted Claims
`and Infringement Contentions, Case No. 10-3746.
`Jun. 30, 2011 Defendant HP Company's Invalidity Contentions,
`Implicit v HP, Case No. 10-3746.
`Jun. 30, 2011 Defendant HP Company's Invalidity Contentions,
`A1-14, Implicit v HP, Case No. 10-3746.
`Jun. 30, 2011 Defendant HP Company's Invalidity Contentions,
`B1-21, Implicit v HP, Case No. 10-3746.
`Sep. 20, 2010 Plaintiff's Original Complaint, Implicit v Juniper, Case
`No. 10-4234.
`Nov. 12, 2010 Juniper Network's Motion to Dismiss for Failure to
`State a Claim Under Rule 12(B)(6): Memorandum of Points and
`Authorities; Implicit v Juniper, Case No. 10-4234.
`Nov. 2, 2010 Juniper Network's Request for Judicial Notice in Sup
`port of its Motion to Dismiss for Failure to State a Claim Under Rule
`12(B)(6): Memorandum of Points and Authorities; Implicit v Juni
`per, Case No. 10-4234.
`Dec. 1, 2010 First Amended Complaint; Implicit v Juniper, Case No.
`10-4234.
`Jan. 18, 2011 Juniper Networks, Inc.'s Answer and Affirmative
`Defenses to 1 Amended Complaint, Implicit v Juniper, Case No.
`10-4234.
`Feb. 18, 2011 Plaintiffs Answer to Defendant's Counterclaims,
`Implicit v Juniper, Case No. 10-4234.
`May 23, 2011 Plaintiff's Disclosure of Asserted Claims and Infringe
`ment Contentions, Implicit v Juniper, Case No. 10-4234.
`Nov. 15, 2011 Plaintiffs Amended Disclosure of Asserted Claim and
`Infringement Contentions, Implicit v Juniper, Case No. 10-4234.
`Nov. 28, 2011 Spencer Hosie Declaration in Support of Plaintiffs
`Opening Claim Construction Brief), Implicit v Juniper, Case No.
`10-4234.
`Nov. 28, 2011 Spencer Hosie Declaration in Support of Plaintiffs
`Opening Claim Construction Brief Exhibit E, Implicit v Juniper,
`Case No. 10-4234.
`Nov. 28, 2011 Spencer Hosie Declaration in Support of Plaintiffs
`Opening Claim Construction Brief ExhibitJ, Implicit v Juniper, Case
`No. 10-4234.
`Nov. 28, 2011 Spencer Hosie Declaration in Support of Plaintiffs
`Opening Claim Construction Brief Exhibit K. Implicit v Juniper,
`Case No. 10-4234.
`Nov. 28, 2011 Spencer Hosie Declaration in Support of Plaintiffs
`Opening Claim Construction Brief Exhibits M-O, Implicit v Juniper,
`Case No. 10-4234.
`Dec. 12, 2011 Holly Hogan Declaration in Support of Defendants'
`Claim Construction Brief, Implicit v Juniper, Case No. 10-4234.
`Dec. 12, 2011 Holly Hogan Declaration in Support of Defendants'
`Claim Construction Brief, Exhibit B, Implicit v Juniper, Case No.
`10-4234.
`Dec. 12, 2011 Holly Hogan Declaration in Support of Defendants'
`Claim Construction Brief, Exhibit F. Implicit v Juniper, Case No.
`10-4234.
`
`Dec. 12, 2011 Holly Hogan Declaration in Support of Defendants'
`Claim Construction Brief, Exhibit N. Implicit v Juniper, Case No.
`10-4234.
`Dec. 12, 2011 Holly Hogan Declaration in Support of Defendants'
`Claim Construction Brief, Exhibit P. Implicit v Juniper, Case No.
`10-4234.
`Dec. 12, 2011 Holly Hogan Declaration in Support of Defendants'
`Claim Construction Brief, Exhibit Q. Implicit v Juniper, Case No.
`10-4234.
`Dec. 12, 2011 Holly Hogan Declaration in Support of Defendants'
`Claim Construction Brief, Exhibit S., Implicit v Juniper, Case No.
`10-4234.
`Dec. 12, 2011 Holly Hogan Declaration in Support of Defendants'
`Claim Construction Brief, Exhibit T-1, Implicit v Juniper, Case No.
`10-4234.
`Dec. 12, 2011 Holly Hogan Declaration in Support of Defendants'
`Claim Construction Brief, Exhibit T-2, Implicit v Juniper, Case No.
`10-4234.
`Dec. 12, 2011 Holly Hogan Declaration in Support of Defendants'
`Claim Construction Brief, Exhibit T-3, Implicit v Juniper, Case No.
`10-4234.
`Dec. 12, 2011 Holly Hogan Declaration in Support of Defendants'
`Claim Construction Brief, Exhibit T-4, Implicit v Juniper, Case No.
`10-4234.
`Dec. 12, 2011 Holly Hogan Declaration in Support of Defendants'
`Claim Construction Brief, Exhibit U, Implicit v Juniper, Case No.
`10-4234.
`Dec. 12, 2011 Holly Hogan Declaration in Support of Defendants'
`Claim Construction Brief, Exhibit V, Implicit v Juniper, Case No.
`10-4234.
`Dec. 12, 2011 Holly Hogan Declaration in Support of Defendants'
`Claim Construction Brief, Exhibit W. Implicit v Juniper, Case No.
`10-4234.
`Dec. 12, 2011 Holly Hogan Declaration in Support of Defendants'
`Claim Construction Brief, Exhibit X. Implicit v Juniper, Case No.
`10-4234.
`Dec. 12, 2011 Holly Hogan Declaration in Support of Defendants'
`Claim Construction Brief, Exhibit Y-1. Implicit v Juniper, Case No.
`10-4234.
`Dec. 12, 2011 Holly Hogan Declaration in Support of Defendants'
`Claim Construction Brief, ExhibitY-2, Implicit v Juniper, Case No.
`10-4234.
`Dec. 12, 2011 Holly Hogan Declaration in Support of Defendants'
`Claim Construction Brief, Exhibit Y-3, Implicit v Juniper, Case No.
`10-4234.
`Dec. 12, 2011 Holly Hogan Declaration in Support of Defendants'
`Claim Construction Brief, Exhibit Y-4, Implicit v Juniper, Case No.
`10-4234.
`Dec. 12, 2011 Holly Hogan Declaration in Support of Defendants'
`Claim Construction Brief, Exhibit Z. Implicit v Juniper, Case No.
`10-4234.
`Dec. 19, 2011 Spencer Hosie Declaration in Support of Plaintiffs
`Reply Claim Construction Brief, Implicit v Juniper, Case No.
`10-4234.
`Dec. 19, 2011 Spencer Hosie Declaration in Support of Plaintiffs
`Reply Claim Construction Brief, Exhibit P. Implicit v Juniper, Case
`No. 10-4234.
`Jan. 10, 2012 Plaintiffs Jan. 10, 2012 Amended Disclosure of
`Asserted Claims and Infringement Contentions, Implicit v Juniper,
`Case No. 10-4234.
`Feb. 10, 2012 Juniper Networks, Inc.'s Supplemental Invalidity Con
`tentions, Implicit v Juniper, Case No. 10-4234.
`Feb. 10, 2012 Juniper Networks, Inc.'s Supplemental Invalidity Con
`tentions, Exhibit A1. Implicit v Juniper, Case No. 10-234.
`Feb. 10, 2012 Juniper Networks, Inc.'s Supplemental Invalidity Con
`tentions, Exhibit A2, Implicit v Juniper, Case No. 10-4234.
`Feb. 10, 2012 Juniper Networks, Inc.'s Supplemental Invalidity Con
`tentions, Exhibit A3, Implicit v Juniper, Case No. 10-4234.
`Feb. 10, 2012 Juniper Networks, Inc.'s Supplemental Invalidity Con
`tentions, Exhibit A4. Implicit v Juniper, Case No. 10-4234.
`Feb. 10, 2012 Juniper Networks, Inc.'s Supplemental Invalidity Con
`tentions, Exhibit B1, Implicit v Juniper, Case No. 10-4234.
`
`Juniper Ex. 1003-p. 5
`Juniper v Implicit
`
`
`
`US 8,694,683 B2
`Page 6
`
`(56)
`
`References Cited
`
`O