throbber
Invalidity of the U.S. Patent No. 6,415,280 Over U.S. Pat. No. 5,649,196 to Woodhill et al.
`
`Exhibit B-1
`
`Each of the Asserted Claims is anticipated by United States Patent No. 5,649,196 to Woodhill et al. (“Woodhill”), which issued on
`July 15, 1997, is a continuation of U.S. Patent App. No. 08/085,596, filed on July 1, 1993, and thus is available as prior art at least
`under 35 USC § 102(e).
`
`To the extent PersonalWeb contends that Woodhill does not meet one or more limitations of the Asserted Claims, the claims are
`obvious over the Woodhill patent, alone, in combination with the knowledge of a person of ordinary skill in the art, and/or in
`combination with other prior art references identified in the cover pleading or herein including any of the following:
` Langer, “Re: dl/describe (File descriptions)”, was an article posted to the “alt.sources” newsgroup on August 7, 1991
`(cid:120)
`(“Langer”), and thus is available as prior art at least under 35 USC § 102(b).
`
`The charts below provide representative examples of where specifically each element of each asserted claim is found within Woodhill
`and the other references, at least under PersonalWeb’s apparent construction of the Asserted Claims as applied in PersonalWeb’s
`infringement contentions. The charts also identify, for each element governed by 35 U.S.C. § 112, ¶ 6, the structure(s), act(s), or
`material(s) that performs the claimed function in the prior art references. The charts also identify, for combinations of prior art items
`that make a claim obvious, the motivation to combine such items.
`
`The cited portions of the prior art references are only examples, and Defendants reserve the right to rely on any further uncited
`portions of the prior art references as additional evidence that the references disclose and/or render obvious a claim limitation.
`
`1
`
`PersonalWeb Technologies LLC v. EMC Corporation and VMware, Inc. (No. 6:11-cv-00660-LED) (E.D. Tex.)
`EMCVMW 1032
`
`

`

`The ‘280 Patent Claims
`[36a] A method of delivering a data file in
`a network comprising a plurality of
`processors, some of the processors being
`servers and some of the processors being
`clients, the method comprising:
`
`U.S. Pat. No. 5,649,196 to Woodhill et al.
`Woodhill discloses a method of delivering a data file in a network comprising a
`plurality of processors, some of the processors being servers and some of the
`processors being clients. For example, the data processing system of Woodhill
`includes a remote backup file server and one or more local computers (clients and
`servers) connected to one or more local area networks. For example:
`
`“FIG. 1 illustrates a simplified representation of a typical networked computer system
`10 in which the system and method of the present invention for distributed storage
`management on networked computer systems may be employed. A remote backup file
`server 12 is in communication, via data path 13, with a wide area network 14. The wide
`area network 14 is, in turn, in communication with a plurality of local area networks 16
`via data paths 15. Those of ordinary skill in the art will recognize that any number of
`wide area networks 14 may be in communication with remote backup file server 12 and
`that any number of local area networks 16 (from 1 to more than 100) may be in
`communication with each wide area network 14. Those of ordinary skill in the art will
`also recognize that the means for communication between remote backup file server 12,
`wide area network 14 and local area networks 16 over data paths 13 and 15 is well
`known.
`
`Each local area network 16 includes multiple user workstations 18 and local computers
`20 each in communication with their respective local area network 16 via data paths 17.
`Again, those of ordinary skill in the art will recognize that the means for communication
`between user workstations 18, local computers 20 and local area networks 16 via data
`paths 17 is well known.” (Woodhill at col. 3, lines 6-31).
`
`See also Woodhill at ‘Field of Invention,’ col. 1, line 66- col. 2, line 49, col. 3, lines 6-
`67, col. 4, line 62 – col. 5, line 11, col. 5, lines 13-20, col. 9, lines 30-44, and Figures 1
`and 2.
`
`2
`
`PersonalWeb Technologies LLC v. EMC Corporation and VMware, Inc. (No. 6:11-cv-00660-LED) (E.D. Tex.)
`
`

`

`The ‘280 Patent Claims
`
`U.S. Pat. No. 5,649,196 to Woodhill et al.
`
`[36b] storing the data file is [sic] on a first
`server in the network and storing copies of
`the data file on a set of servers in the
`network distinct from the first server; and
`
`Woodhill discloses storing the data file on a first server in the network and storing
`copies of the data file on a set of servers in the network distinct from the first
`server. For example, the data processing system runs a Backup/Restore routine on
`each local computer. During operation of this program, binary objects (data files)
`are stored somewhere on the local area network other than the local computer
`being backed up and on the remote backup server (servers). For example:
`
`“The Distributed Storage Manager program 24 performs two concurrent backup
`operations. In most cases, the Distributed Storage Manager program 24 stores a
`compressed copy of every binary object it would need to restore every disk drive 19 on
`every local computer 20 somewhere on the local area network 16 other than on the local
`computer 20 on which it normally resides. At the same time, the Distributed Storage
`Manager program 24 transmits every new or changed binary object to the remote
`backup file server 12.” (Woodhill at col. 9, lines 30-38).
`
`See also element [36a].
`
`To the extent PersonalWeb contends that the limitation of “storing the data file is
`[sic] on a first server and storing copies of the data file on a set of servers distinct
`from the first server” is not met by Woodhill, a person of ordinary skill in the art
`would have found it obvious to modify Woodhill to meet that limitation. For
`example, it would have been obvious to add an additional remote backup file
`server or servers to Woodhill’s system for additional data security. Adding
`additional remote backup file servers to Woodhill would constitute applying a
`known technique to a known device, method, or product ready for improvement to
`yield predictable results, and therefore it would be obvious to a person of ordinary
`
`3
`
`PersonalWeb Technologies LLC v. EMC Corporation and VMware, Inc. (No. 6:11-cv-00660-LED) (E.D. Tex.)
`
`

`

`The ‘280 Patent Claims
`
`U.S. Pat. No. 5,649,196 to Woodhill et al.
`skill in the art exercising ordinary creativity.
`
`[36c] responsive to a client request for the
`data file, the request including a hash of the
`contents of the data file, causing the data
`file to be provided to the client.
`
`Woodhill discloses, responsive to a client request for the data file, the request
`including a hash of the contents of the data file, causing the data file to be provided
`to the client. For example, the data processing system of Woodhill allows restores
`(client request) of binary objects (data files) using their Binary Object Identifiers
`during the Backup/Restore Routine. Also, the data processing system of Woodhill
`performs periodic self-audits by initiating a restore of a randomly selected binary
`object, identified by its Binary Object Identification Record, which includes its
`Binary Object Identifier. A Binary Object Identifier includes a hash value
`calculated by a hash function of the contents of the binary object that it identifiers.
`For example:
`
`“Since most restores of files on a local area network 16 consist of requests to restore the
`most recent backup version of a file, 30 the local copies of binary objects serve to
`handle very fast restores for most restore requests that occur on the local area network
`16.” (Woodhill at col. 10, lines 27 – 32).
`
`Binary objects backed up by a local computer are requested from another local
`computer or from the remote backup file server using their Binary Object
`Identification Record, which includes their Binary Object Identifier, to identify
`them. For example:
`
`“The Distributed Storage Manager program 24 is able to perform self-audits on a
`periodic basis to ensure that the binary objects that have been backed up can be restored.
`To perform an audit, the Distributed Storage Manager program 24 executes the steps
`illustrated in the flow chart of FIG. 5j. Program control begins at step 500 where the
`Distributed Storage Manager program 24 initiates a restore of a randomly selected
`binary object identified by a Binary Object Identification Record 58 stored in File
`
`4
`
`PersonalWeb Technologies LLC v. EMC Corporation and VMware, Inc. (No. 6:11-cv-00660-LED) (E.D. Tex.)
`
`

`

`The ‘280 Patent Claims
`
`U.S. Pat. No. 5,649,196 to Woodhill et al.
`Database 25. Program control continues with step 502 where the selected binary object
`is restored from either a compressed storage file 32 residing on one of the disk drives 19
`of one of the local computers 20 or from the remote backup file server 12.” (Woodhill
`patent at col. 18, lines 11-23).
`
`“In step 138, a Binary Object Identification Record 58 is created in File Database 25 for
`each of the binary objects currently being processed. Each of these Binary Object
`Identification Records 58 are associated with the Backup Instance Record 42 created in
`step 130. The Binary Object Identifier 74 portion of each Binary Object Identification
`Record 58 is comprised of the Binary Object Size field 64, the Binary Object CRC32
`field 66, the Binary Object LRC field 68 and the Binary Object Hash field 70. Each of
`the fields of the Binary Object Identifier 74 may be four (4) bytes in length and is
`calculated from the contents of each binary object. The Binary Object Size field 64 may
`be set equal to the byte-size of the binary object. The Binary Object CRC32 field 66
`may be set equal to the standard 32-bit Cyclical Redundancy Check number calculated
`against the contents of the binary object taken one (1) byte (8 bits) at a time. Those of
`ordinary skill in the art will readily recognize the manner in which the Cyclical
`Redundancy Check number is calculated. The Binary Object LRC field 68 may be set
`equal to the standard Longitudinal Redundancy Check number calculated against the
`contents of the binary object taken four (4) bytes (32 bits) at a time using the following
`algorithm:
`
`The Binary Object Hash field 70 is calculated against the contents of the binary object
`taken one (1) word (16 bits) at a time using the following algorithm:
`
`5
`
`PersonalWeb Technologies LLC v. EMC Corporation and VMware, Inc. (No. 6:11-cv-00660-LED) (E.D. Tex.)
`
`

`

`The ‘280 Patent Claims
`
`U.S. Pat. No. 5,649,196 to Woodhill et al.
`
`Since the Binary Object Identifier 74 is used to uniquely identify a particular binary
`object, it is important that the possibility of two different binary objects being assigned
`the same Binary Object Identifier 74 be very small. This is the reason for implementing
`the Binary Object Identifier 74 using 128 bits and four separate calculations. Although a
`Binary Object Identifier 74 may be calculated in various ways, the key notion is that the
`Binary Object Identifier is calculated from the contents of the data instead of from an
`external and arbitrary source. By incorporating the Binary Object Size field 64 within
`the Binary Object Identifier 74, only binary objects that are exactly the same size can
`generate duplicate Binary Object Identifiers 74. Further, the calculations used to
`determine the Binary Object CRC32 field 66, the Binary Object LRC field 68 and the
`Binary Object Hash field 70 are relatively independent of each other. Using the
`calculations set forth above, the probability that the Distributed Storage Manager
`program 24 will generate the same Binary Object Identifier 74 for two different binary
`objects is extremely low. Those of ordinary skill in the art will recognize that there exist
`many different ways of establishing the Binary Object Identifier 74 (e.g., establishing a
`Binary Object Identifier 74 of a different length or utilizing different calculations) and
`that the procedure set forth above is only one way of establishing the Binary Object
`Identifier 74. The critical feature to be recognized in creating a Binary Object Identifier
`74 is that the identifier should be based on the contents of the binary object so that the
`Binary Object Identifier 74 changes when the contents of the binary object changes. In
`this way, duplicate binary objects, even if resident on different types of computers in a
`heterogeneous network, can be recognized from their identical Binary Object Identifiers
`74.” (Woodhill at col. 7, line 60 – col. 8, line 65).
`
`6
`
`PersonalWeb Technologies LLC v. EMC Corporation and VMware, Inc. (No. 6:11-cv-00660-LED) (E.D. Tex.)
`
`

`

`The ‘280 Patent Claims
`
`U.S. Pat. No. 5,649,196 to Woodhill et al.
`
`(Woodhill at Figure 3).
`
`7
`
`PersonalWeb Technologies LLC v. EMC Corporation and VMware, Inc. (No. 6:11-cv-00660-LED) (E.D. Tex.)
`
`

`

`The ‘280 Patent Claims
`
`U.S. Pat. No. 5,649,196 to Woodhill et al.
`See also Woodhill at col. 4, lines 12-47, col. 11, lines 12-15,and Figures 5A and 5J.
`
`“The Distributed Storage Manager program 24 is able to perform self-audits on a
`periodic basis to ensure that the binary objects that have been backed up can be restored.
`To perform an audit, the Distributed Storage Manager program 24 executes the steps
`illustrated in the flow chart of FIG. 5j. Program control begins at step 500 where the
`Distributed Storage Manager program 24 initiates a restore of a randomly selected
`binary object identified by a Binary Object Identification Record 58 stored in File
`Database 25. Program control continues with step 502 where the selected binary object
`is restored from either a compressed storage file 32 residing on one of the disk drives 19
`of one of the local computers 20 or from the remote backup file server 12.” (Woodhill
`patent at col. 18, lines 11-23).
`
`To the extent Woodhill does not expressly disclose the request including a hash of
`the contents of the data file, it would have been obvious to combine Woodhill with
`the knowledge of a person of ordinary skill and/or other prior art references to
`meet that limitation. For example, Langer discloses that the request includes a
`hash of the contents of the data file (e.g., an MD5 hash of the contents). A person
`of ordinary skill would have found it obvious to apply the teachings of Langer to
`Woodhill. Langer provides an express motivation to do so, by disclosing that the
`MD5 signature provides a simple method of defining a unique identifier with
`negligible chances of collision. Such combination of Woodhill with Langer would
`have been the application of Langer’s known technique to the known device of
`Woodhill, ready for improvement, to yield the predictable result of requesting data
`files with a reduced change of collision. As such, the combination would have been
`the mere combination of prior art elements, according to known methods, to yield
`predictable results. Further, design incentives and market forces would have
`prompted the application of Langer to Woodhill, because the resulting system
`would have achieved the desired uniqueness of the identifiers at a minimum of
`complexity. Finally, the combination would have required no more than ordinary
`
`8
`
`PersonalWeb Technologies LLC v. EMC Corporation and VMware, Inc. (No. 6:11-cv-00660-LED) (E.D. Tex.)
`
`

`

`The ‘280 Patent Claims
`
`U.S. Pat. No. 5,649,196 to Woodhill et al.
`creativity, taking into account the inferences and creative steps that a person of
`ordinary skill in the art would employ. Langer discloses, for example:
`
`“A simple ftp implementation would just hardlink every file available for ftp to a
`filename encoding of it's MD5 token. Users would then ftp the directory path and
`filename of the MD5 token and obtain the file. An archie or similar lookup could first
`determine which nearby systems have the file (though come to think of it, that database
`lookup may as well also provide the local directory and filename for it). For dial-up
`sites a mail-server request could be chained until it reached a site with directory access,
`and the files requested added to temporary caches on the way back.” Langer at 4–5.
`
`Likewise the code for a tar or cpio or ZIP archive etc or a collection of shar files (with
`or without uuencoding etc) could be the code obtained by applying MD5 again to the
`concatenation of the codes of the extracted files, in numeric order. (This deliberately
`loses any date and mode or ownership information and also loses the filename and
`directory structure information although there are arguments for retaining the latter and
`it could be done easily enough by preceding each MD5 code with the filepath relative to
`directory . as the top of the package).” Langer at 5.
`
`See also Langer at 2-5.
`
`[38a] A method of delivering a data file in
`a network comprising a plurality of
`processors, some of the processors being
`servers and some of the processors being
`clients, the method comprising:
`
`Woodhill discloses a method of delivering a data file in a network comprising a
`plurality of processors, some of the processors being servers and some of the
`processors being clients. For example, the data processing system of Woodhill
`includes a remote backup file server and one or more local computers (clients and
`servers) connected to one or more local area networks. For example:
`
`See element [36a].
`[38b] storing the data file is [sic] on a first Woodhill discloses storing the data file on a first server and storing copies of the
`
`9
`
`PersonalWeb Technologies LLC v. EMC Corporation and VMware, Inc. (No. 6:11-cv-00660-LED) (E.D. Tex.)
`
`

`

`The ‘280 Patent Claims
`server and storing copies of the data file on
`a set of servers distinct from the first
`server; and
`
`U.S. Pat. No. 5,649,196 to Woodhill et al.
`data file on a set of servers distinct from the first server. For example, the data
`processing system runs a Backup/Restore routine on each local computer. During
`operation of this program, binary objects (data files) are stored somewhere on the
`local area network other than the local computer being backed up and on the
`remote backup server (servers). For example:
`
`[38c] responsive to a client request for the
`data file, the request including a value
`determined as a given function of the
`contents of the data file, providing the data
`file to the client.
`
`See element [36b].
`
`To the extent PersonalWeb contends that the limitation of “storing the data file is
`[sic] on a first server and storing copies of the data file on a set of servers distinct
`from the first server” is not met by Woodhill, a person of ordinary skill in the art
`would have found it obvious to modify Woodhill to meet that limitation. For
`example, it would have been obvious to add an additional remote backup file
`server or servers to Woodhill’s system for additional data security. Adding
`additional remote backup file servers to Woodhill would constitute applying a
`known technique to a known device, method, or product ready for improvement to
`yield predictable results, and therefore it would be obvious to a person of ordinary
`skill in the art exercising ordinary creativity.
`
`Woodhill discloses, responsive to a client request for the data file, the request
`including a value determined as a given function of the contents of the data file,
`providing the data file to the client. For example, the data processing system of
`Woodhill allows restores (client request) of binary objects (data files) using their
`Binary Object Identifiers during the Backup/Restore Routine. Also, the data
`processing system of Woodhill performs periodic self-audits by initiating a restore
`of a randomly selected binary object, identified by its Binary Object Identification
`Record, which includes its Binary Object Identifier. A Binary Object Identifier
`includes a hash value calculated by a hash function of the contents of the binary
`object that it identifiers. For example:
`
`10
`
`PersonalWeb Technologies LLC v. EMC Corporation and VMware, Inc. (No. 6:11-cv-00660-LED) (E.D. Tex.)
`
`

`

`The ‘280 Patent Claims
`
`U.S. Pat. No. 5,649,196 to Woodhill et al.
`
`See element [36c].
`
`To the extent Woodhill does not expressly disclose the request including a value
`determined as a given function of the contents of the data file, it would have been
`obvious to combine Woodhill with the knowledge of a person of ordinary skill
`and/or other prior art references to meet that limitation. For example, Langer
`discloses that the request includes a value determined as a given function of the
`contents of the data file (e.g., an MD5 hash of the contents). A person of ordinary
`skill would have found it obvious to apply the teachings of Langer to Woodhill.
`Langer provides an express motivation to do so, by disclosing that the MD5
`signature provides a simple method of defining a unique identifier with negligible
`chances of collision. Such combination of Woodhill with Langer would have been
`the application of Langer’s known technique to the known device of Woodhill,
`ready for improvement, to yield the predictable result of requesting data files with
`a reduced change of collision. As such, the combination would have been the mere
`combination of prior art elements, according to known methods, to yield
`predictable results. Further, design incentives and market forces would have
`prompted the application of Langer to Woodhill, because the resulting system
`would have achieved the desired uniqueness of the identifiers at a minimum of
`complexity. Finally, the combination would have required no more than ordinary
`creativity, taking into account the inferences and creative steps that a person of
`ordinary skill in the art would employ. Langer discloses, for example:
`
`See element [36c].
`
`11
`
`PersonalWeb Technologies LLC v. EMC Corporation and VMware, Inc. (No. 6:11-cv-00660-LED) (E.D. Tex.)
`
`

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket