throbber
i iia, iii
`
`DECLARATION OF SANDY GINOZA FOR IETF
`
`RFC 768: USER DATAGRAM PROTOCOL
`
`1, Sandy Ginoza, based on my personal knowledge and information, hereby declare as
`
`follows:
`
`i.
`
`I am an'employee of Association Management Solutions, LLC (AMS), which
`
`acts under contract to the Internet Society (ISOC) as the operator of the RFC Production
`
`Center. The RFC Production Center is part of the "RFC Editor" function, which prepares
`
`documents for publication and places files in an online repository for the authoritative
`
`Request for Comments (RFC) series of documents (RFC Series), and preserves records
`
`relating to these documents. The RFC Series includes, among other things, the series of
`
`Internet standards developed by the Internet Engineering Task Force (IETF), an organized
`
`activity of ISOC. I hold the position of Director of the RFC Production Center. I began
`
`employment with AMS in this capacity on 6 January 2010.
`
`2.
`
`Among my responsibilities as Director of the RFC Production Center, I act as
`
`the custodian of records relating to the RFC Series, and I am familiar with the record keeping
`
`practices relating to the RFC Series, including the creation and maintenance of such records.
`
`3.
`
`From June 1999 to 5 January 2010, I was an employee of the Information
`
`Sciences Institute at University of Southern California (I81). I held various position titles with
`
`the RFC Editor project at ISI, ending with Senior Editor.
`
`4.
`
`The RFC Editor function was conducted by 181 under contract to the United
`
`States government prior to 1998. In 1998, ISOC, in furtherance of its IETF activity, entered into
`the first in a series of contracts with 181 providing for ISI's performance ofthe RFC Editor
`
`function. Beginning in 2010, certain aspects of the RFC Editor function were assumed by the
`
`Apple Inc.
`EX. 1027 - Page 1
`
`Apple Inc.
`Ex. 1027 - Page 1
`
`

`

`il
`l
`
`
`
`RFC Production Center operation of AMS under contract to ISOC (acting through its IETF
`
`function and, in particular, the IETF Administrative Oversight Committee). The business records
`
`of the RFC Editor function as it was conducted by {Si are Currently housed on the computer
`
`systems of AMS, as contractor to ISOC.
`
`5.
`
`I make this declaration based on my personal knowledge and information
`
`contained in the business records of the RFC Editor as they are currently housed at AMS, or
`
`confirmation with other responsible RFC Editor personnel with such knowledge.
`
`6.
`
`Prior to 1998, the RFC Editor‘s regular practice was to publish RFCs, making
`
`them available from a repository via FTP. When a new RFC was published, an announcement
`
`of its publication, with information on how to access the RFC, would be typically sent out
`
`within 24 hours of the publication.
`
`7.
`
`Any RFC published on the RFC Editor website or via FT? was reasonably
`
`accessible to the public and was disseminated or otherwise available to the extent that persons
`
`interested and ordinarily skilled in the subject matter or art exercising reasonable diligence could
`
`have located it. In particular, the RFCs were indexed and placed in a public repository.
`
`8.
`
`The RFCs are kept in an online repository in the course of the RFC Editor's
`
`regularly conducted activity and ordinary course of business. The records are made pursuant to
`
`established procedures and are relied upon by the RFC Editor in the performance of its functions.
`
`9.
`
`It is the regular practice of the RFC Editor to make and keep the RFC records.
`
`10.
`
`Based on the business records of the RFC Editor and the RFC Editor’s course of
`
`conduct in publishing RFCs, 1 have determined that the publication date of RFC 768 was no
`
`later than October 1992, at which time it was reasonably accessible to the public either on the
`
`Apple Inc.
`EX. 1027 - Page 2
`
`Apple Inc.
`Ex. 1027 - Page 2
`
`

`

`RFC Editor website or via FTP from a repository. A copy of that RFC is attached to this
`
`declaration as an exhibit.
`
`Pursuant to Section 1746 of Title 28 of United States Code, I declare under penalty of
`
`perjury under the laws of the United States of America that the foregoing is true and correct
`
`and that the foregoing is based upon personal knowledge and information and is believed to be
`
`true.
`
`Date:
`
`ll
`
`9
`
`48278757379691
`
`7’0“”
`
`By:
`61
`ATTACHED CALIF. ACKNOWLEDGMENT g0 hill?
`
`Sa dy
`
`za
`
`Apple Inc.
`Ex. 1027 - Page 3
`
`Apple Inc.
`Ex. 1027 - Page 3
`
`

`

` CALIFORNIA ALL-PURPOSE ACKNOWLEDGMENT
`CIVIL CODE § 1189
`
`
`A notary pubiic or other officer completing this certificate verifies oniy the identity of the individual who signed the
`document to which this certificate is attached, and not the truthfulness, accuracy, or validity of that document.
`
`
`
`State of Caiifornia
`‘
`.,
`County ofW )
`On
`September trims/beam,
`cs. b'dgodlilw Name Nblic
`
`Here insert Name and Title of the Officer
`Date
`
`gmii
`personally appeared
`Ell/W191
`X Namefis)‘ofSignerjsj'
`who proved to me on the basis of satisfactory evidence to be the pe:on‘(sj whose namaéékB/‘afis'
`
`subs
`
`ibed to the within instrument and acknowled ed to me that he/ he
`
`executed the same In
`
`the instrument the persogis’),
`his .her heir authorized capacity/(Les), and that lay-his he theicsignaturefi
`ort
`entity upon behalf of which the person?) acts , executed the instrument.
`
`
`

`s s. DFLGADILLO
`I
`
`2
`Notary Public California
`g
`Los Angeles County
`
`F
`COMmission it 2221ii'20
`
`My Comm. Expires Dec 9. 2021
`'
`
`i certify under PENALTY OF PERJURY under the iaws
`of the State of Caiifornia that the foregoing paragraph
`is true and correct.
`
`WITNESS my hand and official seal.
`
`Signature
`
`8 -- S "
`
`(Add/U0
`
`Signature 0 Notary Pubiic
`
`Place Notan/ Seai Above
`
`OPTIONAL
`
`Though this section is optional, completing this information can deter aiteration of the document or
`frauduient reattachment of this form to an unintended document.
`
`Description of Attached Document
`
`Title or Type of Document: T60“than 9’1: Sand.
`
`01- V
`Document Date:
`Signer(s) Other Than Named Above: NM
`
`PFC wed/rad deifigriii’l
`Gil/111151 ‘f‘rf
`[EVE
`
`Number of Pages:
`
`5
`
`Capacityfies) Claimed by Signer(s)
`Signer’s Name:
`l3 Corporate Officer — Title(s):
`[3 Partner — l] Limited
`C] General
`
`Signer’s Name:
`:1 Corporate Officer — Title(s):
`3 Partner - E] Limited
`E] Generai
`
`
`
`’Cl Attorney in Fact
`:3 Individual
`l3 Attorney in Fact
`El Individual
`{:1 Trustee
`El Guardian or Conservator
`l3 Trustee
`[I] Guardian or Conservator
`
`[:2] Other:
`Cl Other:
`
`Signer ls Representing: Signer is Representing:
`
`
`@2016 National Notary Association-www.i\iationalNotary.org-1—800—US NOTARY (1800-8766827)
`Item #5907
`
`Apple Inc.
`EX. 1027 - Page 4
`
`Apple Inc.
`Ex. 1027 - Page 4
`
`

`

`RFC 768 J. Postel
` ISI
` 28 August 1980
`
` User Datagram Protocol
` ----------------------
`
`Introduction
`------------
`
`This User Datagram Protocol (UDP) is defined to make available a
`datagram mode of packet-switched computer communication in the
`environment of an interconnected set of computer networks. This
`protocol assumes that the Internet Protocol (IP) [1] is used as the
`underlying protocol.
`
`This protocol provides a procedure for application programs to send
`messages to other programs with a minimum of protocol mechanism. The
`protocol is transaction oriented, and delivery and duplicate protection
`are not guaranteed. Applications requiring ordered reliable delivery of
`streams of data should use the Transmission Control Protocol (TCP) [2].
`
`Format
`------
`
` 0 7 8 15 16 23 24 31
` +--------+--------+--------+--------+
` | Source | Destination |
` | Port | Port |
` +--------+--------+--------+--------+
` | | |
` | Length | Checksum |
` +--------+--------+--------+--------+
` |
` | data octets ...
` +---------------- ...
`
` User Datagram Header Format
`
`Fields
`------
`
`Source Port is an optional field, when meaningful, it indicates the port
`of the sending process, and may be assumed to be the port to which a
`reply should be addressed in the absence of any other information. If
`not used, a value of zero is inserted.
`
`Postel [page 1]
`
`Apple Inc.
`Ex. 1027 - Page 5
`
`

`

`
` 28 Aug 1980
`User Datagram Protocol RFC 768
`Fields
`
`Destination Port has a meaning within the context of a particular
`internet destination address.
`
`Length is the length in octets of this user datagram including this
`header and the data. (This means the minimum value of the length is
`eight.)
`
`Checksum is the 16-bit one’s complement of the one’s complement sum of a
`pseudo header of information from the IP header, the UDP header, and the
`data, padded with zero octets at the end (if necessary) to make a
`multiple of two octets.
`
`The pseudo header conceptually prefixed to the UDP header contains the
`source address, the destination address, the protocol, and the UDP
`length. This information gives protection against misrouted datagrams.
`This checksum procedure is the same as is used in TCP.
`
` 0 7 8 15 16 23 24 31
` +--------+--------+--------+--------+
` | source address |
` +--------+--------+--------+--------+
` | destination address |
` +--------+--------+--------+--------+
` | zero |protocol| UDP length |
` +--------+--------+--------+--------+
`
`If the computed checksum is zero, it is transmitted as all ones (the
`equivalent in one’s complement arithmetic). An all zero transmitted
`checksum value means that the transmitter generated no checksum (for
`debugging or for higher level protocols that don’t care).
`
`User Interface
`--------------
`
`A user interface should allow
`
` the creation of new receive ports,
`
` receive operations on the receive ports that return the data octets
` and an indication of source port and source address,
`
` and an operation that allows a datagram to be sent, specifying the
` data, source and destination ports and addresses to be sent.
`
`[page 2] Postel
`
`Apple Inc.
`Ex. 1027 - Page 6
`
`

`

`
`
`28 Aug 1980
`RFC 768 User Datagram Protocol
` IP Interface
`
`IP Interface
`-------------
`
`The UDP module must be able to determine the source and destination
`internet addresses and the protocol field from the internet header. One
`possible UDP/IP interface would return the whole internet datagram
`including all of the internet header in response to a receive operation.
`Such an interface would also allow the UDP to pass a full internet
`datagram complete with header to the IP to send. The IP would verify
`certain fields for consistency and compute the internet header checksum.
`
`Protocol Application
`--------------------
`
`The major uses of this protocol is the Internet Name Server [3], and the
`Trivial File Transfer [4].
`
`Protocol Number
`---------------
`
`This is protocol 17 (21 octal) when used in the Internet Protocol.
`Other protocol numbers are listed in [5].
`
`References
`----------
`
`[1] Postel, J., "Internet Protocol," RFC 760, USC/Information
` Sciences Institute, January 1980.
`
`[2] Postel, J., "Transmission Control Protocol," RFC 761,
` USC/Information Sciences Institute, January 1980.
`
`[3] Postel, J., "Internet Name Server," USC/Information Sciences
` Institute, IEN 116, August 1979.
`
`[4] Sollins, K., "The TFTP Protocol," Massachusetts Institute of
` Technology, IEN 133, January 1980.
`
`[5] Postel, J., "Assigned Numbers," USC/Information Sciences
` Institute, RFC 762, January 1980.
`
`Postel [page 3]
`
`Apple Inc.
`Ex. 1027 - Page 7
`
`

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket