throbber
Invalidity of the U.S. Patent No. 6,415,280 Over the Enterprise Storage Manager Manual
`
`Exhibit B-55
`
`Each of the Asserted Claims is anticipated by the Enterprise Storage Manager Manual (“ESM Manual”), which was published in April
`1994, and thus is available as prior art at least under 35 USC § 102(a).
`
`To the extent PersonalWeb contends that Woodhill does not meet one or more limitations of the Asserted Claims, the claims are
`obvious over the Woodhill patent, alone, in combination with the knowledge of a person of ordinary skill in the art, and/or in
`combination with other prior art references identified in the cover pleading or herein.
`
`The charts below provide representative examples of where specifically each element of each asserted claim is found within Woodhill
`and the other references, at least under PersonalWeb’s apparent construction of the Asserted Claims as applied in PersonalWeb’s
`infringement contentions. The charts also identify, for each element governed by 35 U.S.C. § 112, ¶ 6, the structure(s), act(s), or
`material(s) that performs the claimed function in the prior art references. The charts also identify, for combinations of prior art items
`that make a claim obvious, the motivation to combine such items.
`
`The cited portions of the prior art references are only examples, and Defendants reserve the right to rely on any further uncited
`portions of the prior art references as additional evidence that the references disclose and/or render obvious a claim limitation.
`
`1
`PersonalWeb Technologies LLC v. EMC Corporation and VMware, Inc. (No. 6:11-cv-00660-LED) (E.D. Tex.)
`
`EMCVMW 1033
`
`

`
`The ‘280 Patent Claims
`[36a] A method of delivering a data file in
`a network comprising a plurality of
`processors, some of the processors being
`servers and some of the processors being
`clients, the method comprising:
`
`Enterprise Storage Manager Manual
`The ESM Manual discloses a method of delivering a data file in a network
`comprising a plurality of processors, some of the processors being servers and
`some of the processors being clients. The Enterprise Storage Manager system
`includes BOBs (data files) distributed across LAN servers and a corporate data
`center (clients and servers) connected through a corporate network. BOBs can be
`delivered in response to a BOB request. For example:
`
`Automated Protection Against Loss of Critical Data
`ESM protects data by completely automating the backup process, by saving the data in
`two locations, on the LAN and at the corporate data center, and by automatically
`auditing the data as it is saved.
`
`ESM automation facilities initiate the backup process without manual intervention.
`Daily backups are scheduled for most files, and checkpoint backups for critical, time-
`dependent files may be scheduled automatically.
`
`A dual backup process ensures data availability.
`
`2
`
`

`
`The ‘280 Patent Claims
`
`Enterprise Storage Manager Manual
`
`For added security, ESM transfers a copy of the data to the corporate data center, which
`is unmatched in its ability to assimilate large volumes of data over telecommunications
`lines, process and verify that data, and store it on tape for later retrieval. With high-
`speed, high reliability automated tape systems, mainframes can locate and retrieve data
`files from tape much faster than LANs, and are physically secure in ways that are
`difficult, if not impossible, to duplicate in typical office environments. Corporate data
`centers also provide established procedures for off-site disaster storage, a critical
`element in the ultimate protection of mission critical information.
`
`See also ESM Manual at 2-1, 2-2, and Figure 4-1.
`
`See also element [36c].
`
`3
`
`

`
`The ‘280 Patent Claims
`[36b] storing the data file is [sic] on a first
`server in the network and storing copies of
`the data file on a set of servers in the
`network distinct from the first server; and
`
`Enterprise Storage Manager Manual
`The ESM Manual discloses storing the data file is on a first server in the network
`and storing copies of the data file on a set of servers in the network distinct from
`the first server. The Enterprise Storage Manager system runs a dual backup
`process. During this process, BOBs (data files) are backed up (stored) once on LAN
`disk and once at the corporate data center (servers). For example:
`
`See element [36a].
`
`To the extent PersonalWeb contends that the limitation of “storing the data file is
`[sic] on a first server and storing copies of the data file on a set of servers distinct
`from the first server” is not met by the ESM Manual, a person of ordinary skill in
`the art would have found it obvious to modify the ESM Manual to meet that
`limitation. For example, it would have been obvious to add an additional server or
`servers to the corporate data center of the ESM Manual’s system for additional
`data security. Adding additional servers to the ESM Manual would constitute
`applying a known technique to a known device, method, or product ready for
`improvement to yield predictable results, and therefore it would be obvious to a
`person of ordinary skill in the art exercising ordinary creativity.
`The ESM Manual discloses, responsive to a client request for the data file, the
`request including a hash of the contents of the data file, causing the data file to be
`provided to the client. For example, the Enterprise Storage Manager system
`allows BOB (data file) restore requests (client requests) that include the BOBID for
`the requested BOB. A BOBID includes a hash value calculated by a hash function
`on the contents of the BOB that it identifiers. For example:
`
`[36c] responsive to a client request for the
`data file, the request including a hash of the
`contents of the data file, causing the data
`file to be provided to the client.
`
`4
`
`

`
`The ‘280 Patent Claims
`
`Enterprise Storage Manager Manual
`
`ESM decomposes files into binary objects, or BOBs, that it subsequently handles
`separately. For a given file, the EAs, ACLs and data are stored and handled as separate
`BOBs. For large files, the data portion is broken up into a number of BOBs of I
`megabyte. These BOBs then become the unit of processing, transmission, and
`restart/recovery. Only the file data base on the server on which it resides has the recipe
`for reconstituting a file from its constituent BOBs. Of course, this file data base is itself
`backed up and is restored to a lost server prior to restoring the remainder of the backup
`data.
`
`The BOBID Within ESM, BOBs are not assigned names based upon the name of the
`original file, an arbitrary numbering scheme, or other random criteria. Instead, the name
`of a BOB, the BOBID, is calculated from the contents of the BOB itself. All BOBIDs
`have exactly the same length, 128 bits (16 bytes). Each is equal to a 32-bit cyclical
`
`5
`
`

`
`The ‘280 Patent Claims
`
`Enterprise Storage Manager Manual
`redundancy check (CRC) of the BOB, followed by a 32-bit LRC (longitudinal
`redundancy check, or XOR), followed by a 32-bit hash value, followed by 32 bits
`containing the length of the BOB in bytes. In cases where the BOB is 12 bytes long or
`less, the entire BOB (padded with zeros if necessary) is used as the first 12 bytes of its
`own BOBID. Although the BOBID is very compact, it is extremely robust
`mathematically. For example, if an enterprise had a single ESM site (generally no
`bigger than a single LAN) with a trillion BOBs (which would occupy millions of
`gigabytes of disk space), there would be less than one chance in a quadrillion that a file
`might be restored incorrectly because one of its BOBs had been assigned the same
`BOBID as a different BOB.” (ESM Manual at pp. 3-3 – 3-4).
`
`ESM's architecture enables all restore requests to arrive as BOBID requests. To retrieve
`any data file, the user must already know the identity of the data, an identity only
`available to the ESM backup process on the LAN and protected by LAN-resident
`security systems.” (ESM Manual at pp. 3-9).
`
`See also ESM Manual at pp. 2-2, 3-3, 3-4, 3-8, 3-9, and Glossary 1.
`
`[38a] A method of delivering a data file in
`a network comprising a plurality of
`processors, some of the processors being
`servers and some of the processors being
`clients, the method comprising:
`
`The ESM Manual discloses a method of delivering a data file in a network
`comprising a plurality of processors, some of the processors being servers and
`some of the processors being clients. The Enterprise Storage Manager system
`includes BOBs (data files) distributed across LAN servers and a corporate data
`center (clients and servers) connected through a corporate network. BOBs can be
`delivered in response to a BOB request.
`
`[38b] storing the data file is [sic] on a first
`server and storing copies of the data file on
`a set of servers distinct from the first
`server; and
`
`See element [36]a.
`The ESM Manual discloses storing the data file is on a first server and storing
`copies of the data file on a set of servers distinct from the first server. The
`Enterprise Storage Manager system runs a dual backup process. During this
`process, BOBs (data files) are backed up (stored) once on LAN disk and once at the
`corporate data center (servers).
`
`6
`
`

`
`The ‘280 Patent Claims
`
`Enterprise Storage Manager Manual
`
`See element [36b].
`
`To the extent PersonalWeb contends that the limitation of “storing the data file is
`[sic] on a first server and storing copies of the data file on a set of servers distinct
`from the first server” is not met by the ESM Manual, a person of ordinary skill in
`the art would have found it obvious to modify the ESM Manual to meet that
`limitation. For example, it would have been obvious to add an additional remote
`backup file server or servers to the ESM Manual’s system for additional data
`security. Adding additional remote backup file servers to the ESM Manual would
`constitute applying a known technique to a known device, method, or product
`ready for improvement to yield predictable results, and therefore it would be
`obvious to a person of ordinary skill in the art exercising ordinary creativity.
`The ESM Manual discloses, responsive to a client request for the data file, the
`request including a value determined as a given function of the contents of the data
`file, providing the data file to the client. For example, the Enterprise Storage
`Manager system allows BOB (data file) restore requests (client requests) that
`include the BOBID for the requested BOB. A BOBID includes a hash value
`calculated by a hash function on the contents of the BOB that it identifiers.
`
`See element [36c].
`
`[38c] responsive to a client request for the
`data file, the request including a value
`determined as a given function of the
`contents of the data file, providing the data
`file to the client.
`
`7

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket