decoration decoration
Stories

GROKLAW
When you want to know more...
decoration
For layout only
Home
Archives
Site Map
Search
About Groklaw
Awards
Legal Research
Timelines
ApplevSamsung
ApplevSamsung p.2
ArchiveExplorer
Autozone
Bilski
Cases
Cast: Lawyers
Comes v. MS
Contracts/Documents
Courts
DRM
Gordon v MS
GPL
Grokdoc
HTML How To
IPI v RH
IV v. Google
Legal Docs
Lodsys
MS Litigations
MSvB&N
News Picks
Novell v. MS
Novell-MS Deal
ODF/OOXML
OOXML Appeals
OraclevGoogle
Patents
ProjectMonterey
Psystar
Quote Database
Red Hat v SCO
Salus Book
SCEA v Hotz
SCO Appeals
SCO Bankruptcy
SCO Financials
SCO Overview
SCO v IBM
SCO v Novell
SCO:Soup2Nuts
SCOsource
Sean Daly
Software Patents
Switch to Linux
Transcripts
Unix Books

Gear

Groklaw Gear

Click here to send an email to the editor of this weblog.


You won't find me on Facebook


Donate

Donate Paypal


No Legal Advice

The information on Groklaw is not intended to constitute legal advice. While Mark is a lawyer and he has asked other lawyers and law students to contribute articles, all of these articles are offered to help educate, not to provide specific legal advice. They are not your lawyers.

Here's Groklaw's comments policy.


What's New

STORIES
No new stories

COMMENTS last 48 hrs
No new comments


Sponsors

Hosting:
hosted by ibiblio

On servers donated to ibiblio by AMD.

Webmaster
Fortinet Picks Up the Baton From Barracuda - Pick Your Brain (Another Call for Prior Art) - Updated
Thursday, June 03 2010 @ 04:50 PM EDT

Do you remember a couple of years ago Barracuda Networks asked us to help find prior art to help deal with a Trend Micro patent on, believe it or not, blocking viruses at the gateway, of all obvious things?

You did find some, the ITC then said the patent, #5,623,600, was invalid, and you'd think that would be the end of that.

But no, software patents live in their own illogical alternate universe, and because Trend Micro and Barracuda settled instead of getting a court ruling of invalidity, Trend Micro was free to threaten others and to continue to take in royalties on that patent.

Some of you were asking the other day what would happen if a patent was ruled invalid, whether a prior licensee could stop paying. That's exactly what this Fortinet story is about. So we will find out, because Fortinet had earlier signed a license with Trend Micro, and when it noticed the ITC ruling and all the prior art Barracuda had presented, which it says hadn't been disclosed to it or the USPTO by Trend Micro, it didn't want to keep paying money for a license for nothing. It stopped paying, and there is ongoing litigation. In addition, Fortinet wants to finally invalidate this patent in court and at the USPTO, for the benefit of us all, and it would like your help.

First step is to read the 300-page petition for re-examination [PDF] Fortinet just filed with the USPTO on the '600 patent. I'll highlight some things in it, but there's a list of prior art they have already. And here's a Fortinet statement, along with many details on this latest development. A snip from the petition:

Reexamination is requested in view of the substantial new questions of patentability presented herein. Requestor reserves all rights and defenses available including, without limitation, defenses as to invalidity and unenforceability. By filing this Request in compliance with the Patent Rules, Requester does not represent, agree or concur that the ‘600 patent is enforceable, and by asserting the substantial new questions of patentability herein, Requester specifically asserts that claims 1-22 (all claims) of the ‘600 patent are in fact not patentable and as such the United States Patent and Trademark Office (USPTO) should reexamine and find claims 1-22 unpatentable and cancel such claims of the ‘600 patent, rendering the ‘600 patent null, void and otherwise unenforceable.
I'll bring you up to date, and then I'll tell you how you can help.

Actually, let's turn that around. For those who like to cut to the chase, here's what Fortinet could definitely use help finding: invalidating prior art (i.e., systems or publications including AV on gateways with proxies), and in particular, any information or evidence about the following:
  • MIMESweeper 1.0
  • TFS Gateway running with antivirus in the U.S.
  • Use of the Norman Firewall to scan email attachments

The relevant date you have to beat is September 26, 1995. And for those of you who may notice that they are on the prior art list and may wonder what more is needed, if you recall using any of these things, or have physical evidence like old ads, marketing materials, manuals, conference proceedings discussing them, or source code, or even contacts (people who recall using it or helped during the design, or system integrators), this would be the time to bring it forth.

Here's a list of prior art listed in the request for reexamination:

In accordance with 37 C.F.R. §§ 1.510(b)(1) and (b)(2), reexamination of claims 1-22 (all issued claims) of the ‘600 patent is requested in view of the following references:
  • Exhibit C - “The Design of a Secure Internet Gateway”, by Bill Cheswick, USENIX Summer Conference June 11-15, 1990 (“Cheswick”) ─ Not previously considered during examination.

  • Exhibit D - “Firewalls and Internet Security – Repelling the Wily Hacker”, by William R. Cheswick and Steven M. Bellovin, Copyright 1994 (“Cheswick and Bellovin”) ─ Not previously considered during examination.

  • Exhibit E - “A Gateway to Internet Health and Happiness”, by Robin Layland, published September 21,1994 in Data Communications, Internetworking Views (“Layland”) ─ Not previously considered during examination.

  • Exhibit F - Intel LANProtect Product Documentation (together, Intel LANProtect Product Overview and Intel LANProtect Software Users Guide), copyright 1992, by Intel Corporation (“LANProtect”) ─ Not previously considered during examination.

  • Exhibit G - “SPECIAL REPORT: Secure Computing Corporation And Network Security”, published December 1994, the LOCALNetter Newsletter, vol. 14, No. 12 (“Sidewinder”) ─ Not previously considered during examination.

  • Exhibit H - “TIS Firewall Toolkit Overview”, published June 30, 1994, by Trusted Information Systems, Inc. and USENIX Association, Proceedings of the Summer 1994 USENIX Conference, June 6-10, 1994 (collectively, “TIS Firewall”) ─ Not previously considered during examination.

  • Exhibit I - U.S. Patent No. 5,319,776, issued to Hile et al., filed in September 1992 and issued June 1994 (“Hile”) ─ Previously considered during examination.

  • Exhibit J - “TFS gateway”, by TenFour Sweden AB (“TFS Manual”) ─ Not previously considered during examination.

  • Exhibit K - “MIMEsweeper administrator guide” (“MIMEsweeper”)-published by Integralis Ltd Copyright 1995. ─ Not previously considered during examination.

  • Exhibit L - Request for Ex Parte Reexamination U.S. Patent No. 5,623,600 “MpScan-Email Security” (“MpScan”) ─ Published by Cybersoft- Not previously considered during examination.

  • Exhibit M - “Network security SunScreen SPF-100” (“SunScreen SPF-100”) - Not previously considered during examination.

The combination of Hile with newly cited art presents a substantial new question of patentability. Although Hile was cited during prosecution of the ‘600 patent and considered in combination with another prior art reference, the Examiner did not substantively consider Hile in combination with Cheswick, the Cheswick and Bellovin reference, the Layland reference, the LANProtect reference, the Sidewinder reference, the TIS Firewall reference, the MpScan reference or the SunScreen SPF-100 reference. These references present new, non-cumulative technological teachings that would have been considered important to a reasonable examiner at the time of prosecution as is shown by a consideration of the prosecution history and reasons for allowance. Accordingly, in light of the new, non-cumulative technological teachings of these references as discussed in detail below, the combination of newly cited art presented herein in combination with Hile presents a substantial new question of patentability as to claims 1-22 (all claims) of the ‘600 patent.

The highly relevant Hile reference previously applied by during prosecution of the ‘600 patent should be carefully reconsidered in combination with the prior art references provided herewith. Under 35 U.S.C. § 303(a), as amended in 2002 “[t]he existence of a substantial new question of patentability is not precluded by the fact that a patent or printed publication was previously cited by or to the Office or considered by the Office.” In so amending, Congress specifically stated that the amendment “overturns the holding of In re Portola Packaging Inc.” Rather than a strict prohibition against reexamination of a patent based on a publication that had been considered during the initial examination of a patent, “the appropriate test . . . should not merely look at the number of references or whether they were previously considered or cited but their combination in the appropriate context of a new light as it bears on the question of the validity of the patent.” A complete listing of all the Exhibits, including relevant publications and patents, is provided at the end of this Request.

The following other written evidence is also made of record, solely to help explain the content of certain of the references listed above. See MPEP § 2205.

  • Exhibit N - “An Introduction to the Norman Firewall: The secure way to connect to the Internet and other TCP/IP-based networks” (“Norman Firewall”) - published by Norman Data Defense, Inc. Copyright November 1995.

  • Exhibit O - Robert McMillan, “Trend Micro: Barracuda Suit Not About Open Source,” PC World, PCW Business Center, June 13, 2008 (“McMillan”).

  • Exhibit P - Steve Chang and Jenny Chang, “Trend Micro: History of the Global No. 1 Internet Security Company,” Trend Micro, Copyright 2002 (“Trend Micro History”).
I hope the justices on the US Supreme Court are following this saga. Look at how hard it is and how much time, effort and money is required to overturn an obvious and trivial software patent! Blocking viruses at the gateway. I mean... really. Here's how Fortinet describes the patent:
The ‘600 patent broadly claims a system, an apparatus and methods for detecting computer viruses during transmission over a network. The specification of the ‘600 patent describes a gateway computer consisting of: a prior art computer system, running a prior art operating system, such as Berkeley Software Distribution (BSD) UNIX, connecting two networks using prior art connection methods, providing prior art data transfer services, such as FTP and SMTP, via prior art proxy servers modified according to the teaching of the patent. In other words, the patent describes a basic and entirely routine network implementation. The specification also describes scanning for viruses, which was also in the prior art, at an intermediary node between computers or computer networks. The purportedly novel teaching of the patent application was simply the combination of a rudimentary and well known network implementation, with the addition of equally rudimentary and well known anti-virus scanning on a network gateway.

Independent claim 1 of the ‘600 patent is representative and instructive – demonstrating the obviousness over the prior art systems and publications presented herewith. Claim 1 broadly claims a system implemented on a proxy server for detecting viruses in data transfers—a system which performs the obvious steps of checking data to be transferred for the presence of a virus and performing various equally obvious actions depending on the result of the virus check. In a nutshell, this claim under the broadest reasonable construction arguably covers any anti-virus scanning performed by any network device. In fact, such a broad construction of the ‘600 patent has been openly adopted by applicant as part of its aggressive licensing program and associated litigation (“We [Trend] are litigating [with] Barracuda, who are selling a gateway and putting whatever type of AV, whether it’s ClamAV or Shophos [sic] of whomever’s AV, on there. “In the [‘600] patent, we are not claiming that we invented the antivirus scanner. We are not claiming that we invented the proxy server. But the concept of using these two together so that you can stop the virus during the transition [sic: transmission] is new.”).

Ah! The magic is in the combo! That's like getting a patent for walking while chewing gum *at the same time*. Who'd ever think of putting those two things *together*, eh? Is that innovative or what?

I know. You can't believe you are being asked to find prior art again for this stupidness. But there you are. It'd be nice to hop into their software patent world long enough to blast the patent to smithereens and then leave, knowing we never have to do it again, that it's really dead this time, not just mostly dead.

Here's more from Fortinet's statement on exactly what has been happening in the courts, for those interested in a more complete picture:

Trend Micro did not invent network antivirus functionality. In fact, in response to Barracuda’s calls for help, the open source community responded by, among other things, identifying a good deal of invalidating prior art — antivirus functionality invented well in advance of Trend Micro’s purported invention. Thanks to the help of the open source community, patent experts at the International Trade Commission (ITC) issued a pre-trial opinion [PDF] that Trend Micro’s patent was invalid. Unfortunately, this ruling was only beneficial to Barracuda, who settled the case before it could benefit the wider security community. Trend Micro, faced with patent uncertainty after the ITC decision, quickly settled with Barracuda.

Fortinet is working to finish the job that the open source community and Barracuda started, which is to drive a wooden stake through the heart of Trend Micro’s invalid patent once and for all. Yesterday, Fortinet filed with the U.S. Patent and Trademark Office (US PTO) a petition [PDF] to re-examine Trend Micro’s patent. The petition identifies prior art revealing the invalidity of Trend Micro’s patent and is one of several avenues Fortinet is pursuing to finally and publically defang Trend Micro and bring the invalidity of this patent into the sunlight.

Fortinet has also recently received favorable rulings [PDF] in federal and state courts in challenges to the validity of the same patent. Recently, the legal atmosphere has become much less favorable to patent aggressors like Trend Micro − case law has made clear that certain patent licensees need not pay something for nothing − they do not owe royalties for invalid patents.

You'll find a number of the legal filings on that page, including this favorable ruling [PDF] denying Trend Micro's motion to dismiss, and you can get the background of the case beginning on page 3 of this filing: Fortinet's Complaint for Declaratory Judgment [PDF]. It takes you through earlier litigation beginning in 2004 that ended with Fortinet redesigning its products. Trend Micro wasn't satisfied, sued for violation of an ITC exclusion order, and it was threatening ClearSwift also, so Fortinet took a license to the patent.

If you don't like legal intricacy, skip the rest, because this is where it gets complex, and I'm only going to hit the highlights. It's been a hard-fought litigation, in two courts, one federal and one state, both in California, and there is prior litigation also between the parties and an ITC complaint, all of which came into play. For the rest of us, here's an overview.

Late in 2008, after the Barracuda revelations, Fortinet told Trend Micro it thought its patent was invalid and that it didn't think it should have to pay royalties on an invalid patent, and when Trend Micro didn't agree, Fortinet filed suit, seeking a declaratory judgment of patent invalidity not only regarding the '600 patent about gateways, but also on a '943 patent, "Apparatus and Method for Electronic Mail Virus Detection and Elimination", which Fortinet describes as "a continuation-in-part of the application that eventually became the '600 patent". Trend Micro got some claims tossed by saying the license agreement Fortinet signed precluded them, and it added a counterclaim for breach of contract.

Beginning on page 7, Fortinet tells the court that Trend Micro tried to fool Fortinet and the court by issuing what Fortinet feels was a cynical covenant not to sue, one that Fortinet says doesn't give it or its partners or customers the protection it needs, since Fortinet is obligated to indemnify them, and Trend Micro then asked the court to dismiss Fortinet's claims, based on the covenant not to sue. The court granted Trend Micro's motion. Fortinet appealed, and beginning on page 12, they present the prior art. And it sets forth prior litigation against other companies brought by Trend Micro beginning on page 14, which Fortinet describes as anticompetitive. It includes the Barracuda story, that Barracuda asked the Open Source community for help finding prior art and thus discovered the TFS Gateway, which the ITC found dispositive. Groklaw is mentioned on page 20. Slashdot is referenced too. Trend Micro had not disclosed the TFS Gateway, Fortinet points out. Isn't it nice to know the call for prior art proved so helpful?

All of this is, as best I can make out, to establish Fortinet's standing to sue, since they signed a license, got a covenant not to sue, settled earlier litigation, etc. And as Fortinet's statement pointed out, it's made headway, but from what I'm reading, Trend Micro is a very aggressive and able opponent. I didn't say nice.

Another filing takes the story the next step more or less up to the present, Fortinet's MEMORANDUM OF POINTS AND AUTHORITIES IN SUPPORT OF ITS OPPOSITION TO PLAINTIFFS’ DEMURRERS TO FORTINET’S THIRD AFFIRMATIVE DEFENSE [PDF]. Here's what a demurrer is, if you are curious. What we learn from this document is that Fortinet in 2008 brought a Lear challenge in the Northern District of California, asserting the invalidity and unenforceability of Trend's patents. Here's what that is:

In Lear, Inc. v. Adkins, 395 U.S. 653 (1969), the Supreme Court held that a party that has entered into a license to pay royalties for the use of a patented invention could attack the validity of the licensed patent. In doing so, the Court rejected the contract-law doctrine of licensee estoppel. The Court also held that the licensee was not required to continue to pay royalties until its challenge to the validity of the patent was resolved. Thus, Lear allows a licensee to stop making royalty payments and to challenge the patent’s validity at any time.
And you can read the decision thanks to Google Scholar.

Fortinet basically says that Trend has been using all the legal machinations it can to avoid a court ruling on the patent, more or less telling the state court one thing, and the federal court another, a la the early SCO. So, Fortinet says, Trend would tell the state court the federal court should rule, and then it would tell the federal court it shouldn't, because the state court had the matter in hand, as best I can make out. I gather as long as there is no official court ruling, Trend Micro can continue to act like it has a patent it can ask people to take a license to use. A court at some point has to decide if the ITC was right or not.

You'll find all that beginning on page 7 of the PDF, page 3 of the filing, if you want to check my math, so to speak. In Lear, Fortinet writes, "the US Supreme Court articulated a strong federal policy encouraging licensees to challenge bad patents." And what Barracuda presented made Fortinet conclude this was a bad patent:

After finishing these cases with Fortinet, Trend instituted a new ITC proceeding on its ‘600 patent, this time against Barracuda Networks. (See TRJN Ex. 4 ¶ 23.) During this proceeding, Barracuda presented newly‐discovered, compelling evidence that the ‘600 patent was invalid. (See id. at ¶¶ 25‐26.) That evidence included a product called the “TFS Gateway,” which was on the market before Trend applied for its patent, and which performed the same functions Trend’s patent describes. (See id.) Based on an independent review of the evidence, including the TFS Gateway, an ITC 1 staff attorney concluded that each asserted claim of the ‘600 patent was invalid. (See Garber Decl. at ¶¶ 3‐4.) Soon after, Trend and Barracuda settled the ITC proceeding. (See id.)
Trend sued in California when Fortinet stopped paying royalties. And Fortinet refiled its federal litigation, with new information about threats to Fortinet's customers not in the record when the first federal case was dismissed. Trend moved to dismiss again. So, this is getting complicated. Fortinet explains the state court-federal court dance like this:
Evident from the above history is Trend’s dual strategy of extracting in [redacted] royalties from its patents while insulating those patents from judicial review. Trend settled with Barracuda just after the ITC staff attorney issued his invalidity findings, leaving no binding decision. (See Garber Decl. at ¶ 4.) Trend asserted res judicata to try to block Fortinet’s 2008 challenge to its patents. (See FRJN Ex. 1.) Upon losing that motion, Trend engineered the dismissal of the 2008 case without prejudice to its being refiled in state court. (See TRJN Ex. 6.) Now that the case is here, Trend argues that “only a federal court can invalidate a patent.” (Document No. 53 (Trend’s Mem. in Opposition to Fortinet’s Motion to Stay) at 8:24‐9:1.) And Trend renews its rejected res judicata challenge. (Dem. 6‐13.) These efforts, as we now show, must fail.
The lawyers will handle the legal machinations to ensure, ideally, that the court finally rules on this patent. But where you come in is with regard to prior art. You know things the lawyers don't, and some of you lived this history and remember. So, anyone have any information or evidence?

Update, September 23, 2010: Fortinet has now publicly acknowledged your help in searching for prior art, and they let us know that the USPTO has now ordered a reexamination of Trend Micro's patent, based on prior art submitted:

As a follow-up to my earlier blog post on the subject of Trend Micro’s history of patent aggression, there are a couple recent developments worth noting:

First, on September 16, the United States Patent and Trademark Office (US PTO) issued a formal order granting Fortinet’s petition to re-examine the validity of Trend Micro’s patent on antivirus functionality, the 5,623,600 patent, stating that a “substantial new question of patentability” exists with respect to the patent based on prior art currently being considered by the US PTO.

Second, and most notably, a member of the open source community has recently filed a separate petition (control number 90/011,022) with the US PTO to re-examine the same Trend Micro patent presenting even more evidence of the patent’s invalidity. This is significant because it validates Fortinet’s position and it shows the resolve and resourcefulness of the open source community to challenge invalid patents that are a menace to the community. Indeed, the open source community at large provided valuable assistance to Fortinet in researching its challenge to Trend Micro’s aggressive patent approach.

That last link is to this article, so don't bother clicking. You are here. And while the outcome ultimately is still to be determined, it's nice to know we at Groklaw were once again effective.

  


Fortinet Picks Up the Baton From Barracuda - Pick Your Brain (Another Call for Prior Art) - Updated | 158 comments | Create New Account
Comments belong to whoever posts them. Please notify us of inappropriate comments.
Almost...
Authored by: proceng on Thursday, June 03 2010 @ 05:03 PM EDT
Ah! The magic is in the combo! That's like getting a patent for walking while chewing gum *at the same time*. Who'd ever think of putting those two things *together*, eh? Is that innovative or what?
More like getting a patent for walking while chewing gum *at the same time* after chewing gum while walking was already patented. ;-(

---
And ye shall know the truth, and the truth shall make you free.
John 8:32(King James Version)

[ Reply to This | # ]

  • not quite... - Authored by: Anonymous on Friday, June 04 2010 @ 11:46 AM EDT
  • Almost... - Authored by: darkonc on Friday, June 04 2010 @ 04:07 PM EDT
Corrections Thread
Authored by: bugstomper on Thursday, June 03 2010 @ 05:16 PM EDT
Please summarize the correction in the title box as error->correction or
s/error/correction/ to make it easy for PJ and readers

[ Reply to This | # ]

Off Topic threads
Authored by: bugstomper on Thursday, June 03 2010 @ 05:18 PM EDT
Please stay off topic in these threads. Use HTML Formatted post mode to make
your clickies clickable

[ Reply to This | # ]

News Picks Thread
Authored by: bugstomper on Thursday, June 03 2010 @ 05:20 PM EDT
Please pick your news here and include the clickable link to the News Pick
article for convenience of readers after the article has scrolled off the
sidebar.

[ Reply to This | # ]

COMES goes here
Authored by: bugstomper on Thursday, June 03 2010 @ 05:22 PM EDT
There's more to COMES, there's more to go... COMES contributions here. Use HTML
markup posted as Plain Old Text to make it easy for PJ to copy and paste it.

[ Reply to This | # ]

One of the earliest worms and the resulting "inspecting firewall" code
Authored by: nl50294 on Thursday, June 03 2010 @ 05:22 PM EDT
In 1987, someone wrote a script called XMAS EXEC that acted like a worm by forwarding itself to all mail addresses of the receivers address book on execution by the receiver.
This script ran on VM and forwarded itself to other users on the system or on other systems via RSCS (Remote Spooling Communication Subsystem) that ran and still runs on virtually every VM system in the world.
As this of course not only flooded the communication network, but also the spool space on all the connected VM systems, a security exit was created to block files with the name "XMAS EXEC". And that exit is still present on the systems today.

See also Merry Christma: An Early Network Worm

[ Reply to This | # ]

A helpful reminder....
Authored by: Anonymous on Thursday, June 03 2010 @ 05:46 PM EDT

Recently there was a very clear ruling with regards invalidating a patent. It also appears - to this layman - that the silver bullet was an actual working computer from the time period under question which was used to visually show the Jury the functioning "invention".

Perhaps someone has a working version of a TFS Gateway complete with a virus scanner of the time they can pull from storage and dust off?

RAS

[ Reply to This | # ]

Fortinet Picks Up the Baton From Barracuda - Pick Your Brain (Another Call for Prior Art)
Authored by: Anonymous on Thursday, June 03 2010 @ 05:59 PM EDT
So why isn't Barracuda helping Fortinet?

[ Reply to This | # ]

I was a TFS Gateway User in the US
Authored by: Anonymous on Thursday, June 03 2010 @ 06:07 PM EDT
I definitely recall using the TFS Gateway product in the US early in 1995. It
was being marketed by a company called C2C Systems, which made a
"redirection" server for MS Mail (sort of an early Out of Office
Assistant).

I don't know if I can get permission to disclose the "who" as far as
the company I was working for at the time. However, as to the "when",
it was prior to the final release of Windows 95, because I was using the Public
Beta (build 347, I think) of Windows 95 to run the TFS modules and Redirection
server.

I know I implemented the anti-virus integration feature of the product, with (I
believe) Norton Antivirus; however, I don't remember if that happened before
Windows 95 RTM.

That's about as much detail I can remember from 15 years ago.

[ Reply to This | # ]

UUCP and Usenet
Authored by: YurtGuppy on Thursday, June 03 2010 @ 06:31 PM EDT

Network. Message passing.
Local repository/proxy that filters the messages
so that client programs don't have to look at tons of dangerous trash. 1980.





---

just swimming round and round

[ Reply to This | # ]

KSR v Teleflex
Authored by: Anonymous on Thursday, June 03 2010 @ 07:09 PM EDT
It really sounds like KSR v Teleflex is relevant here.

[ Reply to This | # ]

The first internet virus
Authored by: Anonymous on Thursday, June 03 2010 @ 07:19 PM EDT
Really a worm, was the Morris worm. That was 1988. I would suggest asking Gene Spafford at Purdue or Bruce Schneier for background and early responses.

[ Reply to This | # ]

MIMESweeper
Authored by: kds on Thursday, June 03 2010 @ 11:58 PM EDT
IT Link Volume 8 Number 7 dated September 1995 (yeah, too close for comfort) has the following in its Table of Contents:
                              News and Notes
MAID Links up with Microsoft....................................12
Libel on the Internet...........................................12
Wellcome Launches Recruitment Database..........................12
Wellcome's Annual Report Goes Electronic........................12-13
Mimesweeper for Viruses.........................................13
Netscape Goes Public............................................13
Knight-Ridder Acquires Uncover..................................13
Cix Announces Full Internet Service.............................13
You can see the full list here.

Network Week also had a blurb about MIMESweeper as listed in the Table of Contents of Volume 1 Number 2 issue dated 13 September 1995:
                            Virus Protection
MIMEsweeper recommended for cc:Mail users - Sweeper cleans out
viruses.........................................................11
I haven't been able to find an online copy of the publications, but maybe someone here good at searching library digital archives can find a copy of them. There may be something of use there.

[ Reply to This | # ]

Fortinet Picks Up the Baton From Barracuda - Pick Your Brain (Another Call for Prior Art)
Authored by: Yossarian on Friday, June 04 2010 @ 12:28 AM EDT
Fred Cohen from USC mentioned that sometimes in the 1980's,
but I can't find the source. All I found was
www.wired.com/thisdayintech/2009/11/1110fred-cohen-first-computer-virus/

[ Reply to This | # ]

I see no mention of the Internet Security Corporation's FIREWALL-1 Gateway
Authored by: Anonymous on Friday, June 04 2010 @ 01:02 AM EDT
This software ran on Sun Sparcstations back in the early 90s and this is what it
was:
1) An application gateway (ie it filtered at the gateway),
2) A packet filterer.

It used Open Outlook to give a GUI interface for managing it and it featured
secure packet filtering, added context information for stateless connections,
auditing and alerting, ability to define and add new protocols and services,
authenticated telnet and ftp, creation of encrypted channels.

Here's a link: Mar 1995 - this was a commercially released program in March of
1995 and that means it was in development before then.

ISC's Firewall-1 filtered at layers 2 thru 7 of the OSI model. By filtering at
layer 7 you can analyze whether this transmission is malware while still at the
gateway.

--Celtic_hackr

[ Reply to This | # ]

Exhibit I
Authored by: pem on Friday, June 04 2010 @ 01:55 AM EDT
I don't understand how the original examination got around this patent -- it
seems pretty comprehensive.

[ Reply to This | # ]

I don't know how much help this is but
Authored by: The Mad Hatter r on Friday, June 04 2010 @ 08:42 AM EDT

A long time ago a programmer called Wayne Bell wrote a BBS system called World
War IV. The original was in GWBasic, then he ported it to Turbo Pascal, then he
ported it to Turbo C. The Turbo C version had networking capabilities added, and
there were network nodes all over North America (I ran node 4651) connecting via
telephone lines to transfer mail, and later files.

One of the things that WWIV had was hooks - you could hook other programs like
PKZip, or an anti-virus in, so that they would run under certain circumstances
with certain parameters passed. So for example if a file was transfered WWIV
would call PKzip, unzip it, then call the Anti-Virus, check it, then add a file
saying it had been checked by the BBS, and zip it up again, getting rid of the
original zip.

I'm somewhat loose on dates - I know this was working before 1996 because it was
early 96 when I moved to Windows 95. I think it was about 90-91, but I can't
prove it. It was working on WWIV versions 4.10 and later, but that's all I can
be certain of.



---
Wayne

http://madhatter.ca/

[ Reply to This | # ]

LinkedIn profiles with pictures of the MS Jakob Nielsen and the REAL Jakob Nielsen
Authored by: bugstomper on Friday, June 04 2010 @ 08:26 PM EDT
Talk about raising FUD!

The Jakob Nielsen who works for Microsoft has a profile on LinkedIn (with picture) at http://www.linkedin.com/in/jakobnielsen

The famous usability guru Jakob Nielsen has a profile (with picture) at http://www.linkedin.com/in/jakobnielsenphd

You can't fault someone for having the same relatively common name as an acknowledged guru in one's same field, but Microsoft's use of his name in this way without clarification does smack of typical MS FUD tactics.

[ Reply to This | # ]

The SunScreen SPF-100 ...
Authored by: davecb on Friday, June 04 2010 @ 10:32 PM EDT
... was in beta on September 18, 1995: I have an email from Darren Suprina at
Sun which describes it to a mailing-list.
I'll enquire further.

--dave

---
davecb@spamcop.net

[ Reply to This | # ]

Stateful Packet Inspection and application firewalls
Authored by: artp on Saturday, June 05 2010 @ 01:21 AM EDT

Stateful Packet inspection started around the same time frame as the patent.

There is a good summary at Wikipedia on SPI. It refers to a Check Point SPI firewall, Check Point was founded in 1993, and had contracts with Sun in 1994 and HP in 1995.

The first reference has this interesting quote:

Early attempts at producing firewalls operated at the application level of the seven-layer OSI model ,but this required too much CPU speed., Packet filters operate at the network layer (layer-3) and function more efficiently because they only look at the header part of a packet.

So the barrier, according to this wasn't the idea, it was the processing speed available to a firewall.

If you look at the entry for an application firewall, you see this quote:

"Gene Spafford of Purdue University, Bill Cheswick at AT&T Laboratories, and Marcus Ranum described a third generation firewall known as an application layer firewall. Marcus Ranum's work on the technology spearheaded the creation of the first commercial product. The product was released by DEC who named it the DEC SEAL product. DEC’s first major sale was on June 13, 1991 to a chemical company based on the East Coast of the USA."

"TIS, under a broader DARPA contract, developed the Firewall Toolkit (FWTK), and made it freely available under license on October 1, 1993."

I don't know how useful this is, but I thought I'd share my efforts in running sround the Internet with everybody. Maybe tomrrow, I'll look up the FWTK.

-----

[I'd like to point out that the ISO/OSI network layers that they refer to don't apply to TCP networks. ISO/OSI uses a 7-layer model. TCP uses a 5-layer model. So even though it is easier to talk about the ISO/OSI layers, it shouldn't make a difference in a patent application because it doesn't apply. It has just been convention to use OSI layers for talking about network layers.]

So ISO/OSI Layer 3 is TCP layer 3, but ISO/OSI layer 7 is TCP layer 5.

---
Userfriendly on WGA server outage:
When you're chained to an oar you don't think you should go down when the galley sinks ?

[ Reply to This | # ]

Anyone have time to check these repositories?
Authored by: PJ on Sunday, June 06 2010 @ 03:16 PM EDT
Here's a link to a list of software museums and collections of old code. If someone could take the time to check each one to see if there is anything useful, that'd be wonderful. I'd do it, but you guys will recognize things I won't.

[ Reply to This | # ]

Fortinet Picks Up the Baton From Barracuda - Pick Your Brain (Another Call for Prior Art)
Authored by: Anonymous on Tuesday, June 08 2010 @ 01:33 AM EDT
Has anyone noticed that Fortinet is a habitual GPL violator?

http://www.allquests.com/question/163874/Fortinet-settles-GPL-violation-suit.htm
l

http://www.eweek.com/c/a/Linux-and-Open-Source/Fortinet-Under-Fire-for-Allegedly
-Violating-GPL-Terms/

Now they want help in their legal spat over something that is not even about
open source. I don't see how this is helping the open source community.

[ Reply to This | # ]

Fortinet Picks Up the Baton From Barracuda - Pick Your Brain (Another Call for Prior Art)
Authored by: Anonymous on Wednesday, June 09 2010 @ 11:06 PM EDT
Behind paywall two possibly useful articles about Norman.

UNITED STATES DEFENSE INFORMATION SYSTEMS AGENCY AWARDS DoD ANTI-VIRUS SOFTWARE
CONTRACT TO NORMAN DATA DEFENSE SYSTEMS, INC.

Article from: PR Newswire
Article date: June 22, 1995

http://www.highbeam.com/doc/1G1-17110730.html


NORMAN DATA DEFENSE SYSTEMS UNVEILS THE NORMAN FIREWALL
PR Newswire | March 21, 1995 |
http://www.encyclopedia.com/doc/1G1-16685275.html

[ Reply to This | # ]

Books by David Stang
Authored by: Anonymous on Friday, June 11 2010 @ 06:14 PM EDT
This information is likely known information.

Found this advertisement in Network World Jan 16, 1995.
Network Security Secrets by David J. Stang CEO of Norman.
published in 1993.

http://books.google.com/books?id=4BcEAAAAMBAJ&printsec=frontcover&lr=&am
p;rview=1#v=onepage&q&f=false

When checking for availability found many publications at Amazon by David Stang
some published in 1995.

I do not have the resources to check into these further myself.



[ Reply to This | # ]

Fortinet Picks Up the Baton From Barracuda - Pick Your Brain (Another Call for Prior Art)
Authored by: Anonymous on Saturday, June 12 2010 @ 07:41 PM EDT
Article: Business Wire January 11,1995

MCI announces joint marketing agreement with TenFour Sweden; Product allows LAN
users to access MCI Mail via popular word processing software

http://findarticles.com/p/articles/mi_m0EIN/is_1995_Jan_11/ai_16018979/

agreement with the Swedish MCI Mail reseller, TenFour U.S. Inc., a subsidiary of
TenFour Sweden AB.

No mention of antivirus or other specific customers

[ Reply to This | # ]

Fortinet Picks Up the Baton From Barracuda - Pick Your Brain (Another Call for Prior Art)
Authored by: Anonymous on Tuesday, June 15 2010 @ 09:19 AM EDT
Seems deep inspection in a proxy was commercially available in 1994 see:


http://www.checkpoint.com/press/1994/interop_press.html

[ Reply to This | # ]

Groklaw © Copyright 2003-2013 Pamela Jones.
All trademarks and copyrights on this page are owned by their respective owners.
Comments are owned by the individual posters.

PJ's articles are licensed under a Creative Commons License. ( Details )