throbber
Thomas Patrick Yohe et al., U.S. Patent No. 5,835,943, “Apparatus and Method for
`Increased Data Access in a Network File Oriented Caching System,” issued Nov. 10, 1998 (“’943”)
`
`SUPP. DEFS. INTERROG. RESP., EXHIBIT E
`USP 5,835,943, Yohe et al.
`Aug. 15, 2012
`
`
`MICROSOFT
`
`
`
`EXHIBIT 1010
`
`
`
`
`
`1
`
`1 2 3 4 5 6 7 8 9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`

`
`SUPP. DEFS. INTERROG. RESP., EXHIBIT E
`USP 5,835,943, Yohe et al.
`Aug. 15, 2012
`
`
`
`
`2
`
`1 2 3 4 5 6 7 8 9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`

`
`SUPP. DEFS. INTERROG. RESP., EXHIBIT E
`USP 5,835,943, Yohe et al.
`Aug. 15, 2012
`
`
`
`
`3
`
`
`
`1 2 3 4 5 6 7 8 9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`

`
`SUPP. DEFS. INTERROG. RESP., EXHIBIT E
`USP 5,835,943, Yohe et al.
`Aug. 15, 2012
`
`
`Reference
`
`Yohe discloses all of the elements and all of the functions of this claim arranged as
`they are arranged in the claim. See below. E.g.: “the present invention is directed
`to an apparatus for increased data access in a network, which includes a file server
`computer having a permanent storage memory, a cache verifying computer
`operably connected to the file server computer in a manner to form a network for
`rapidly transferring data, the cache verifying computer having an operating
`system, a first memory and a processor with means for performing an operation on
`data stored in the permanent storage memory of the file server computer to
`produce a signature of the data characteristic of one of a file and directory, a
`remote client computer having an operating system, a first memory, a cache
`memory and a processor with means for performing an operation on data stored in
`the cache memory to produce a signature of the data, a communication server
`operably connected to the remote client computer to the cache verifying computer
`and the file server computer and comparators operably associated with the cache
`verifying computer and remote client computer for comparing the signatures of
`data with one another to determine whether the signature of data of the remote
`client is valid.” (’943, 2:41-61).
`
`Yohe discloses “an apparatus for increased data access in a network” (’943, 2:41-
`42), such as the World Wide Web (’943, 4:23-27). Yohe discloses “a network file
`oriented caching system” (’943, title) which “increases the speed in which data in
`the form of files and directories are accessed.” (’943, 1:12-15; see also id. at 3:8-
`21, 4:22-24, 5:45-50, 5:59-60, 6:22-23).
`
`On the client side of the network, Yohe discloses “a remote client computer.”
`(’943, 2:51). On the server side of the network, Yohe discloses “a file server
`
`4
`
`Claim
`
`Claim 1 as a Whole
`
`1. A system for data access in
`a packet-switched network,
`comprising:
`
`1 2 3 4 5 6 7 8 9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`

`
`Claim
`
`Reference
`
`SUPP. DEFS. INTERROG. RESP., EXHIBIT E
`USP 5,835,943, Yohe et al.
`Aug. 15, 2012
`
`
`(a) a sender/computer
`including
`
` (i) an operating unit,
`
`computer having a permanent storage memory, a cache verifying computer
`operably connected to the file server computer in a manner to form a network for
`rapidly transferring data.” (’943, 2:43-46). Also, “a communication server is
`operably connected to the remote client computer to the cache verifying computer
`and the file server computer.” (’943, 2:54-57, Fig. 2). (See also ’943, claim 1).
`
`See above. Yohe discloses “a network computer system 10 having at least one
`remote client computer 12, cache verifying computer 14, communication server 16
`and file server computer 18.” (’943, 4:42-44). The sender computer system may
`comprise a Cache Verifying Computer, a File Server Computer, and a
`Communication Server. (’943, Fig. 2).
`
`“The cache verifying computer 14 includes a cache verifying agent (CVA) 54
`having a BSG [(block signature generator)] 56 (of the type described herein), a
`directory signature generator (DSG) 57 and a comparator 58.” (’943, 5:14-17).
`Yohe discloses alternative embodiments wherein “the cache verifying agent 54
`could reside as part of the communication server 16 or as a stand alone processor
`with its own memory and operating system.” (’943 patent, 5:33-36). (See also
`‘943, claim 1).
`
`See above. While the ’717 patent does not define the meaning of “operating unit,”
`the ’717 does not describe anything reasonably called an “operating unit” which is
`not also disclosed in this reference.
`
`Yohe discloses that the cache verifying computer includes “an operating system.”
`(’943, 2:46-47). The cache verifying computer includes “an OS [(operating
`system)] 60 having an FSI [(file system interface)] 62 operatively connected to
`
`5
`
`1 2 3 4 5 6 7 8 9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`

`
`SUPP. DEFS. INTERROG. RESP., EXHIBIT E
`USP 5,835,943, Yohe et al.
`Aug. 15, 2012
`
`
`Claim
`
`Reference
`
`CVA [(cache verifying agent)] 54.” (’943, 5:17-18). “The file server computer 18
`includes an OS 70 having an FSI 72 which is operatively connected to an LFS 74.”
`(’943, 5:22-23). (See also ’943, claim 1).
`
` (ii) a first memory,
`
`See above. Yohe discloses that the cache verifying computer includes “a first
`memory.” (’943, 2:47).
`
`Yohe discloses alternative embodiments wherein the cache verifying agent could
`be “a stand alone processor with its own memory and operating system.” (’943,
`5:34-36). (See also ’943, claim 1).
`
` (iii) a permanent storage
`memory and
`
`See above. Yohe discloses that the cache verifying computer includes “means for
`performing an operation on data stored in the permanent storage memory of the
`file server computer.” (’943, 2:47-49).
`
`“‘Permanent storage memory,’ as used herein, includes, but not limited to, disk
`drive, flash RAM or bubble memory, for example.” (’943, 3:5-7).
`
`Yohe discloses the file server computer includes “a DD [(disk driver)] 78 and a
`PSD [(permanent storage disk)] 80.” (’943, 5:24). (See also ‘943, claim 1).
`
` (iv) a processor and a
`
`See above. Yohe discloses that the cache verifying computer includes “a
`processor.” (’943, 2:47).
`
`Yohe discloses alternative embodiments wherein the cache verifying agent could
`be “a stand alone processor with its own memory and operating system.” (’943,
`5:34-36). (See also ’943, claim 1).
`
`1 2 3 4 5 6 7 8 9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`6
`
`

`
`SUPP. DEFS. INTERROG. RESP., EXHIBIT E
`USP 5,835,943, Yohe et al.
`Aug. 15, 2012
`
`
`Claim
`
`Reference
`
`(b) remote receiver/computer
`including
`
`See above. Yohe discloses “a network computer system 10 having at least one
`remote client computer 12.” (’943, 4:42-43). (See also ’943, claim 1).
`
` (i) an operating unit,
`
`See above. Yohe discloses that the remote client computer includes “an operating
`system.” (’943, 2:51-52). “The remote client computer 12 has an operating
`system (OS) 24 with a file system interface (FSI) 26.” (’943, 4:58-59). (See also
`’943, claim 1).
`
` (ii) a first memory,
`
`See above. Yohe discloses that the remote client computer includes “a first
`memory.” (’943, 2:52).
`
`Yohe discloses that the receiver computer includes “a RAM based disk cacher
`(RBDC) 30.” (’943, 4:61-62). (See also ’943, claim 1).
`
` (iii) a permanent storage
`memory and
`
`See above. Yohe discloses that the receiver computer includes a “disk driver (DD)
`32 and permanent storage disk (PSD) 34.” (’943, 4:62-63).
`
` (iv) a processor,
`
`See above. Yohe discloses that the remote client computer includes “a processor.”
`(’943, 2:52). (See also ’943, claim 1).
`
`(c) said sender/computer and
`said receiver/computer
`communicating through said
`network;
`
`(d) said sender/computer
`further including means for
`
`See above. Yohe discloses that the server-side computer(s) communicate with the
`remote client computer through the network. “[A] communication server [is]
`operably connected to the remote client computer[,] the cache verifying computer
`and the file server computer.” (’943, 2:54-57). “The remote client computer 12
`communicates via communication link 22 to the communication server 16.” (’943,
`4:51-52).
`
`As this element apparently is construed by Proxyconn, this reference discloses it.
`
`The ’717 patent does not define in a consistent manner the meaning of a “digital
`
`1 2 3 4 5 6 7 8 9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`7
`
`

`
`SUPP. DEFS. INTERROG. RESP., EXHIBIT E
`USP 5,835,943, Yohe et al.
`Aug. 15, 2012
`
`
`Claim
`
`Reference
`
`creating digital digests on
`data;
`
`digest.” The only mathematical functions it identifies for calculating a “digital
`digest” (both of which it rules out as well) are MD5 and CRC. Nevertheless, if
`this element is disclosed in the ’717 patent, then it likewise is disclosed in this
`reference.
`
`Yohe discloses that the cache verifying computer includes “a processor with
`means for performing an operation on data stored in the permanent storage
`memory of the file server computer to produce a signature of the data
`characteristic of one of a file and directory.” (’943, 2:47-51).
`
`“The cache verifying computer 14 includes a cache verifying agent (CVA) 54
`having a BSG [(block signature generator)] 56 (of the type described herein), a
`directory signature generator (DSG) 57….” (’943, 5:14-16).
`
`Yohe discloses “a network file oriented caching system” (’943, title) which
`“increases the speed in which data in the form of files and directories are
`accessed.” (’943, 1:12-15; see also id. at 3:8-21, 4:22-24, 5:45-50, 5:59-60, 6:22-
`23). The BSG (block signature generator) calculates a signature on such a “file” or
`other data object or sub-object, constituting “data.” Files stored in the file system
`are of arbitrary size, as are file directories. Both a BSG-calculated and a DSG-
`calculated signature is a fixed-size binary value calculated from arbitrary-size
`binary data in such a way that it depends only on the contents of the data (e.g., file
`or directory) and a “low” probability (at least as “low” as MD5) that two different
`data have the same signature value.
`
`The BSG uses MD5 or CRC to calculate signatures from data. In one
`embodiment, the DSG uses the BSG to calculate the signature of each directory
`
`8
`
`1 2 3 4 5 6 7 8 9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`

`
`Claim
`
`Reference
`
`SUPP. DEFS. INTERROG. RESP., EXHIBIT E
`USP 5,835,943, Yohe et al.
`Aug. 15, 2012
`
`
`sub-object, and then the DSG incorporates the signature values of the sub-objects
`into the directory signature. Hence the directory signature is generated from
`exclusive-OR’ing the signatures of the directory sub-objects.
`
`In the directory request primitive, “the NFC 42 [of the receiving computer] ‘sends’
`720 a directory verify request to CVA 54 via NTL 38. This triggers the steps 750
`(Fig. 16) wherein NFC 42 waits and ‘receives’ 721 signature from CVA 54.”
`(’943 patent, 8:7-9). When the sender’s CVA receives such a request, the CVA
`computes a directory signature. “As seen in FIG. 16, the steps 750 are performed
`by the CVA 54. Particularly, the DSG 57 ‘initializes’ 751 signature of a directory.
`The DSG 57 ‘retrieves’ 752 the first directory sub-object from the FS 18 via NTL
`66. The DSG 57 ‘asks’ 753 is this the last sub-object? If no, DSG 57 ‘factors’
`754 the signature of this sub-object into the overall signature of the directory. The
`DSG 57 then ‘retrieves’ 755 the next sub-object from FS 18 and returns to step
`753. If the last sub-object, CVA 54 ‘sends’ 756 back signature of directory to
`NFC 42.” (’943, 7:19-8:3).
`
`Yohe discloses that the sender’s “cache verifying agent 54 could reside as part of
`the communication server 16 or as a stand alone processor with its own memory
`and operating system.” (’943, 5:33-36). Elements of the CVA are disclosed in
`’943 Fig. 2. Within the sender’s CVA, there is “a BSG 56 (of the type described
`herein), a directory signature generator (DSG) 57 and a comparator 58.” (’943,
`5:14-17). The CVA “[i]nvokes BSG 56 to obtain [s]ignature of data.” (’943, Fig.
`8, step 354), and uses the DSG 57 “to generate the Signature of Directory.” (’943,
`13:40).
`
`9
`
`1 2 3 4 5 6 7 8 9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`

`
`Claim
`
`Reference
`
`SUPP. DEFS. INTERROG. RESP., EXHIBIT E
`USP 5,835,943, Yohe et al.
`Aug. 15, 2012
`
`
`Yohe discloses a flowchart (’943, Fig. 16) that shows the sender’s steps for
`calculating a directory signature. When the directory signature generator (DSG)
`computes a directory signature, it retrieves all the directory sub-objects (’943, Fig.
`16, steps 752 and 755). If the retrieved sub-object is not the last sub-object (’943,
`Fig. 16, step 753), the DSG “factors the signature of [the] sub-object into the
`overall signature of the directory.” (’943, 7:24-25; Fig. 16, step 754). Since the
`BSG 56 is the only block within the CVA that computes a signature of an object (a
`block of data), the DSG uses the BSG to calculate the signature of the directory
`sub-objects.
`
`Collectively, all the directory sub-objects combined make up the content of a
`directory object. Yohe defines that an “‘object’ is a sequence of data of variable
`length” (’943, 3:19) and hence a directory object is of arbitrary length.
`
`When the client-receiver receives the directory signature, the “NFC 42 ‘invokes’
`722 DSC 46 to compare whether signature matches the retrieved signature in
`719?” (’943, 8:9-11). The client-receiver’s NFC sees only the directory signature
`as a whole and not individual directory sub-object signatures. The directory
`signature corresponds to the “digital digest” in the claim. If the client decides to
`retrieve data content from the server because of a mismatch in the directory
`signature, the client retrieves the content of the entire directory from which the
`directory signature had been calculated. (’943, Fig. 15, steps 724-727).
`
`Yohe discloses that the signature calculated by the BSG can be either a cyclic
`redundancy check (CRC) or a signature such as MD5, which are fixed length
`output strings that depend only on the data.
`
`10
`
`1 2 3 4 5 6 7 8 9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`

`
`Claim
`
`Reference
`
`SUPP. DEFS. INTERROG. RESP., EXHIBIT E
`USP 5,835,943, Yohe et al.
`Aug. 15, 2012
`
`
`“In order to generate the signature, each BSG 44 and 56 employ a protocol for
`performing a cyclic redundancy check (CRC) on the specified data which includes
`signature and coordinates (an offset into the file and specifying length of the data).
`The protocol the CRC employs is a fast method for generating a 64 bit CRC on a
`32 bit CPU, The existing bit structure on a 32 bit CPU is that of the type
`‘pppfcs32’ algorithm described in ‘RFC1662.TXT’ by W. Simpson. The
`invention modifies the structure as follows: The 64 bit value will consist of two
`parts:
`1. The existing 32 bit value will be utilized.
`2. An additional 32 bits will be derived by dividing the length by four and
`performing the operation on four groups of the byte stream. On each of the four
`instances the least significant 8 bytes of the ‘in progress’ frame check sequence (a
`32 bit value computed by repetitively exclusive-oring a constant retrieved by
`indexing a character stream into a table of contents) will be appended to a second
`32 bit number which was initialized to zero.” (’943, 11:56-12:65).
`
`In addition to the flow chart (’943, Fig. 16), Yohe discloses an example function
`CSXorDirEntry() (’943, 14:1-12) for generating a directory signature from the
`signatures of the directory sub-objects. Consider a directory that includes N sub-
`objects. As described in an example in the previous two paragraphs, the signature
`of each sub-object is a 64-bit CRC. For each sub-object in the directory, the
`“CVA 54 factors 754 the signature of the sub-object into the signature of directory
`by invoking the logic CSXorDirEntry.” (’943, 13:65-67).
`
`Given a signature of a directory sub-object, the function CSXorDirEntry() updates
`
`11
`
`1 2 3 4 5 6 7 8 9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`

`
`SUPP. DEFS. INTERROG. RESP., EXHIBIT E
`USP 5,835,943, Yohe et al.
`Aug. 15, 2012
`
`
`Claim
`
`Reference
`
`the directory signature using an exclusive-OR operation within the code segment:
`
`“int j=0;
`
`for (i=0;i<(sizeof(OD_DIR_INFO)/sizeof(DWORD));i++,lpdDirInfo++)
`
`{
`
` lpdSign[j] ^= *lpdDirInfo;
`
` j=1-j;
`
`}” (’943, 14:7-12).
`
`The type definition section at ’943 patent col. 8, DWORD indicates that DWORD
`is a 16-bit data type. In the for loop, lpdDirInfo is a DWORD array that holds the
`signature of a directory sub-object, and lpdSign is a DWORD array that holds the
`directory signature. When the for loop is executed, the instructions sweep over the
`number of DWORDs required to store the signature of the directory sub-object.
`For each iteration in the for loop, a 16-bit segment of lpdDirInfo is exclusive-
`ORed with a 16-bit segment of lpdSign. The logic in the for loop shows that the
`value of the index j alternates between the values 0 and 1 from iteration to
`iteration. This means that only two elements of lpdSign is used, and hence the
`length of the directory signature is a 32-bit fixed length quantity, in this
`embodiment.
`
`In addition to CRC, Yohe discloses that “other types of verification tools may be
`employed to carry out the present invention such as the MD5 algorithm which is
`
`12
`
`1 2 3 4 5 6 7 8 9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`

`
`Claim
`
`Reference
`
`SUPP. DEFS. INTERROG. RESP., EXHIBIT E
`USP 5,835,943, Yohe et al.
`Aug. 15, 2012
`
`
`(e) said receiver/computer
`further including
`
` (i) a network cache memory
`and
`
`described in ‘RFC1322.TXT’ by R. Rivest.” (’943, 13:36-39). (See also ’943,
`claim 1).
`
`Yohe discloses a receiver computer that includes the following elements.
`
`As this element apparently is construed by Proxyconn, this reference discloses it.
`
`To the extent that a “network cache” merely designates an intended use for a
`memory device, not a structural limitation on that memory device, such an
`intended use has no patentable weight or consequence when comparing the claim
`as a whole to the reference, although it is a limitation in any infringement analysis.
`
`Although the ’717 patent does not define “network cache memory” or disclose any
`structure thereof distinguishing it from any other memory, to the extent it is
`disclosed in the ’717 patent this reference also discloses it.
`
`Yohe discloses that the remote client computer includes “a cache memory.” (’943,
`2:52).
`
`Yohe discloses that the remote client computer includes “a local file system, which
`in turn is connected to a RAM based disk cacher (RBDC) 30.” (’943, 4:60-62).
`
`Yohe defines the meanings of the terms caching and cache as follows: “‘Caching’
`is the function of retrieving an object from a relatively high speed storage device
`from a list of most-recently-used objects. ‘Cache’ is a file which resides in
`permanent storage and contains the most-recently-used blocks of data read from a
`remote file server.” (’943, 3:13-18). Thus, Yohe’s “cache memory” is permanent
`
`13
`
`1 2 3 4 5 6 7 8 9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`

`
`Claim
`
`Reference
`
`SUPP. DEFS. INTERROG. RESP., EXHIBIT E
`USP 5,835,943, Yohe et al.
`Aug. 15, 2012
`
`
`storage for storing copies of data received over the network.
`
`Yohe’s claims also disclose cache memory located in the permanent memory of
`the receiver:
`
`“1. An apparatus for increased data access from one of a file and a directory in a
`file oriented network, which comprises:
`
`a file server computer having an operating system, a first memory, a
`permanent storage memory and a processor;
`
`a cache verifying computer operably connected to said file server computer
`in a manner to form a network for rapidly transferring data, said cache verifying
`computer having an operating system, a first memory and a processor with means
`for performing an operation on data stored in said permanent storage memory of
`said file server computer to produce a signature of said data from one of the file
`and the directory;
`
`a remote client computer having an operating system, a first memory, a
`cache memory and a processor with means for performing an operation on data
`stored in said cache memory to produce a signature of said data;
`
`a communication server operably connecting to said remote client computer
`to said cache verifying computer and said file server computer;
`
`a first comparator operably associated with said cache verifying computer
`for comparing said signatures of data of said file with one another to determine
`whether said signature of data of said file of said remote client is valid; and
`
`a second comparator operably associated with said remote client computer
`for comparing said signatures of said data of said directory with one another to
`determine whether said signature of data of said directory of said remote client is
`
`14
`
`1 2 3 4 5 6 7 8 9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`

`
`Claim
`
`Reference
`
`SUPP. DEFS. INTERROG. RESP., EXHIBIT E
`USP 5,835,943, Yohe et al.
`Aug. 15, 2012
`
`
` (ii) means for creating
`digital digests on data in said
`network cache memory; and
`
`valid.
`
`6. The invention in accordance with claim 1, wherein said first memory of said
`remote client computer is disposed in a RAM of said remote client computer, said
`first memory of said cache verifying computer is disposed in a RAM of said cache
`verifying computer, said first memory of said file server computer is disposed in a
`RAM of said file server computer and said permanent storage memory is disposed
`on a permanent storage disk of said file server computer and said cache memory is
`disposed on a permanent storage disk of said remote client computer.” (’943,
`14:40-15:3, 15:24-33).
`
`As this element apparently is construed by Proxyconn, this reference discloses it.
`
`The ’717 patent does not define in a consistent manner the meaning of a “digital
`digest.” The only mathematical functions it identifies for calculating a “digital
`digest” (both of which it rules out as well) are MD5 and CRC. Nevertheless, if
`this element is disclosed in the ’717 patent, then it likewise is disclosed in this
`reference.
`
`Yohe discloses that the remote client computer includes “means for performing an
`operation on data stored in the cache memory to produce a signature of the data.”
`(’943, 2:53-54).
`
`Yohe discloses that the remote client computer “includes a network file cacher
`(NFC) 42 which is operably disposed between and interconnects the FSI 26 and
`NFR 36. . . . The NFC 42 includes a block signature generator (BSG) 44.” (’943,
`
`15
`
`1 2 3 4 5 6 7 8 9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`

`
`Claim
`
`Reference
`
`4:66-5:5).
`
`SUPP. DEFS. INTERROG. RESP., EXHIBIT E
`USP 5,835,943, Yohe et al.
`Aug. 15, 2012
`
`
`Yohe discloses that the receiver’s block signature generator (BSG 44) is capable of
`creating CRC or MD5 (’943, 13:36-39) hashes on data in the receiver’s cache.
`E.g., “In the case of a READ 108 requests, the computer 12 follows the operation
`300. Via the FSI 26 and LFS 28, the NFC 42 ‘determines if the requested data is in
`cache?’ 302. …. If the data is in cache, NFC 42 is triggered to ‘invoke’ 316 the
`BSG 44 to generate a signature of data. NFC 42 via NFR 36 and NTL 38 ‘sends’
`320 a VERIFY request having the first signature of data therein to CVA 54 which
`triggers 350.” (’943, 6:8-26).
`
`Yohe’s claims also describe this element: “a remote client computer having an
`operating system, a first memory, a cache memory and a processor with means for
`performing an operation on data stored in said cache memory to produce a
`signature of said data;” (’943, 14:53-57).
`
`“8. A method, performed by computers in a file oriented network for increased
`speed of access of data, which comprises:
`
`using a file server computer having an operating system, a first memory, a
`permanent storage memory and a processor;
`
`using a cache verifying computer operably connected to said file server
`computer in a manner to form a network for rapidly transferring data, said cache
`verifying computer having an operating system, a first memory and a processor;
`
`using a remote client computer having an operating system, a first memory,
`a cache memory and a processor,
`
`using a communication server operably connected to said remote client
`
`16
`
`1 2 3 4 5 6 7 8 9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`

`
`Claim
`
`Reference
`
`SUPP. DEFS. INTERROG. RESP., EXHIBIT E
`USP 5,835,943, Yohe et al.
`Aug. 15, 2012
`
`
`computer to said cache verifying computer and said file server computer;
`
`establishing a processor element in said cache verifying computer which
`recognizes a READ REQUEST and a DIRECTORY REQUEST by said remote
`client computer and obtains said data from said file server computer associated
`with one of a file and a directory and generates a signature of said data associated
`with of one of the file and the directory;
`
`establishing a processor element on said remote client computer which
`initiates upon one of a READ REQUEST and a DIRECTORY REQUEST from
`the cache memory to generate a signature of said data associated with of one of the
`file and the directory;
`
`using a first comparator operably associated with said cache verifying
`computer for comparing said signatures of data of the file with one another to
`determine whether said signature of data of the file of said remote client is valid;
`and
`using a second comparator operably associated with said remote client
`
`computer for comparing said signatures of data of the directory with one another to
`determine whether said signature of data of the directory of said remote client is
`valid.” (’943, 15:37-16:23).
`
`As this element apparently is construed by Proxyconn, this reference discloses it.
`
`The ’717 patent does not disclose or define sufficiently this element but to the
`extent that this element includes a processor configured to compare two
`cryptographic message digests or CRC values to determine whether they are the
`same or not, this reference discloses this element.
`
`“[T]he present invention is directed to an apparatus for increased data access in a
`
`17
`
` (iii) said receiver/computer
`including means for
`comparison between digital
`digests.
`
`1 2 3 4 5 6 7 8 9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`

`
`Claim
`
`Reference
`
`SUPP. DEFS. INTERROG. RESP., EXHIBIT E
`USP 5,835,943, Yohe et al.
`Aug. 15, 2012
`
`
`network, which includes a file server computer having a permanent storage
`memory, a cache verifying computer operably connected to the file server
`computer in a manner to form a network for rapidly transferring data, the cache
`verifying computer having an operating system, a first memory and a processor
`with means for performing an operation on data stored in the permanent storage
`memory of the file server computer to produce a signature of the data
`characteristic of one of a file and directory, a remote client computer having an
`operating system, a first memory, a cache memory and a processor with means for
`performing an operation on data stored in the cache memory to produce a signature
`of the data, a communication server operably connected to the remote client
`computer to the cache verifying computer and the file server computer and
`comparators operably associated with the cache verifying computer and remote
`client computer for comparing the signatures of data with one another to determine
`whether the signature of data of the remote client is valid.” (’943, 2:41-61).
`
`Yohe discloses that the remote client computer includes “comparators … for
`comparing the signatures of data with one another to determine whether the
`signature of data of the remote client is valid.” (’943, 2:58-61).
`
`“The NFC 42 has operatively associated therewith a directory cacher (DC) 43 and
`directory signature comparator (DSC) 46.” (’943, 5:1-3). In a step associated with
`the directory request primitive, “NFC 42 ‘invokes’ 722 DSC 46 to compare
`whether signature matches the retrieved signature in 729?” (’943, 8:9-11).
`
`If the result of the comparison is “no and the [directory] signature does not match,
`NFC 42 ‘invokes’ 724 NFR 36 to retrieve the first directory sub-object. NFC 42
`
`18
`
`1 2 3 4 5 6 7 8 9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`

`
`Claim
`
`Reference
`
`SUPP. DEFS. INTERROG. RESP., EXHIBIT E
`USP 5,835,943, Yohe et al.
`Aug. 15, 2012
`
`
`‘stores’ 725 the sub-object into cache via LFS 28. NFC 42 ‘asks’ 726 whether this
`is the last sub-object? If no and it is not the last sub-object, NFC 42 invokes NFR
`36 to ‘retrieve’ the next directory sub-object and returns to step 725. If yes and it is
`the last sub-object, NFC 42 ‘stores’ 728 the signature obtained via 721 or 711 into
`cache via LFS 28.” (’943, 8:13-21). Hence, the comparison associated with the
`directory request is done on the basis of the directory signature, and the retrieval of
`data is also based on the entire directory object.
`
`Yohe’s Abstract and claims also disclose this element: “An apparatus for
`increased data access in a network includes a file server computer having a
`permanent storage memory, a cache verifying computer operably connected to the
`file server computer in a manner to form a network for rapidly transferring data,
`the cache verifying computer having an operating system, a first memory and a
`processor with means for performing an operation on data stored in the permanent
`storage memory of the file server computer to produce a signature of the data
`characteristic of one of a file and directory, a remote client computer having an
`operating system, a first memory, a cache memory and a processor with means for
`performing an operation on data stored in the cache memory to produce a signature
`of the data, a communication server operably connected to the remote client
`computer to the cache verifying computer and the file server computer and
`comparators operably associated with the cache verifying computer and remote
`client computer for comparing the signatures of data with one another to determine
`whether the signature of data of the remote client is valid.” (’943, Abstract).
`
`“1. An apparatus for increased data access from one of a file and a directory in a
`file oriented network, which comprises:
`
`19
`
`1 2 3 4 5 6 7 8 9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`

`
`Claim
`
`Reference
`
`SUPP. DEFS. INTERROG. RESP., EXHIBIT E
`USP 5,835,943, Yohe et al.
`Aug. 15, 2012
`
`
`a file server computer having an operating system, a first memory, a
`
`permanent storage memory and a processor;
`
`a cache verifying computer operably connected to said file server computer
`in a manner to form a network for rapidly transferring data, said cache verifying
`computer having an operating system, a first memory and a processor with means
`for performing an operation on data stored in said permanent storage memory of
`said file server computer to produce a signature of said data from one of the file
`and the directory;
`
`a remote client computer having an operating system, a first memory, a
`cache memory and a processor with means for performing an operation on data
`stored in said cache memory to produce a signature of said data;
`
`a communication server operably connecting to said remote client computer
`to said cache verifying computer and said file server computer;
`
`a first comparator operably associated with said cache verifying computer
`for comparing said signatures of data of said file with one another to determine
`whether said signature of data of said file of said remote client is valid; and
`
`a second comparator operably associated with said remote client computer
`for comparing said signatures of said data of said directory with one another to
`determine whether said signature of data of said directory of said remote client is
`valid.” (’943, 14:40-15:3).
`
`“8. A method, performed by computers in a file oriented network for increased
`speed of access of data, which comprises:
`
`using a file server computer having an operating system, a first memory, a
`permanent storage memory and a processor;
`
`using a cache verifying computer operably connected to said file server
`
`20
`
`1 2 3 4 5 6 7 8 9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`

`
`Claim
`
`Reference
`
`SUPP. DEFS. INTERROG. RESP., EXHIBIT E
`USP 5,835,943, Yohe et al.
`Aug. 15, 2012
`
`
`computer in a manner to form a network for rapidly transferring data, said cache
`verifying computer having an operating system, a first memory and a processor;
`
`using a remote client computer having an operating system, a first memory,
`a cache memory and a processor,
`
`using a

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket