`
`By: John D. Vandenberg (Reg. No. 31,312)
`
`john.vandenberg@klarquist.com
`Stephen J. Joncus (Reg. No. 44,809)
`stephen.joncus@klarquist.com
`Klarquist Sparkman LLP
`One World Trade Center, Suite 1600
`121 S.W. Salmon Street
`Portland, Oregon 97204
`Telephone: (503) 595-5300
`Facsimile: (503) 595-5301
`
`
`
`
`UNITED STATES PATENT AND TRADEMARK OFFICE
`
`____________
`
`BEFORE THE PATENT TRIAL AND APPEAL BOARD
`
`____________
`
`MICROSOFT CORPORATION
`Petitioner
`
`v.
`
`PROXYCONN, INC.
`Patent Owner
`
`____________
`
`
`Patent 6,757,717 B1
`
`____________
`
`Page 1 of 17
`
`
`
`
`
`
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`IN THE UNITED STATES PATENT AND TRADEMARK OFFICE
`
`FILED VIA THE PATENT REVIEW PROCESSING SYSTEM
`
`In re Inter Partes Review of:
`U.S. Patent No. 6,757,717
`
`Issued: June 29, 2004
`
`Applicant: Leonid Goldstein
`
`Application No. 09/398,007
`
`Filed: September 16, 1999
`
`Title: System And Method For Data
`
`Access
`
`Currently in Litigation Styled:
`Proxyconn Inc. v. Microsoft
`Corporation, et al., Central District
`of California, Case No. SA CV11-
`1681 DOC (JPRx) [Consolidated
`with Case Nos. SA CV11-1682
`DOC (JPRx), SA CV11-1683 DOC
`(JPRx), and SA CV11-1684 DOC
`(JPRx)]
`
`
`
`)
`)
`)
`)
`)
`)
`)
`)
`)
`)
`)
`)
`)
`)
`)
`)
`)
`)
`)
`)
`)
`)
`
`Declaration of Professor Darrell D. E. Long
`Regarding U.S. Patent No. 6,757,717
`
`I.
`
`QUALIFICATIONS
`
`I am a Professor of Computer Science and have served as Associate
`
`Dean for Research and Graduate Studies in the Jack Baskin School of
`
`Engineering at the University of California at Santa Cruz. I hold the Kumar
`
`Malavalli Endowed Chair of Storage Systems Research and I am the Director
`
`2
`
`Page 2 of 17
`
`
`
`
`
`
`
`1
`
`of the Storage Systems Research Center, an internationally recognized center
`
`2
`
`of excellence in data storage. I am also the Director of the Working-group on
`
`3
`
`Applied Security and Privacy (WASP), the laboratory at the University of
`
`4
`
`California at Santa Cruz that studies computer security. I teach graduate and
`
`5
`
`undergraduate courses in computer security, operating systems, data storage
`
`6
`
`and have taught courses in networking and distributed systems. I received my
`
`7
`
`B.S. degree in Computer Science from San Diego State University, and my
`
`8
`
`M.S. and Ph.D. from the University of California, San Diego. I am a Fellow
`
`9
`
`of the Institute of Electrical and Electronics Engineers and of the American
`
`10
`
`Association for the Advancement of Science. My research interests include
`
`11
`
`data storage systems, operating systems, computer security, distributed
`
`12
`
`systems and networking. My qualifications are further described in my
`
`13
`
`appended Curriculum Vitae.
`
`14
`
`
`
`I have published numerous papers including in the ACM Transactions
`
`15
`
`on Storage, and various IEEE journals, and I am the co-author of two books.
`
`16
`
`These publications are listed in Exhibit A. I am the founder of the premier
`
`17
`
`conference in the data storage field known as the Symposium on File Storage
`
`18
`
`Technologies (“FAST”). I have participated in organizing numerous
`
`19
`
`academic conferences including:
`
`20
`
`3
`
`Page 3 of 17
`
`
`
`
`
`
`
`1
`
`2
`
`2012:
`
`Steering Committee: Petascale Data Storage Workshop (PDSW),
`
`3
`
`Symposium on Modeling, Analysis and Simulation of Computer and
`
`4
`
`Telecommunication Systems (MASCOTS), Symposium on File and Storage
`
`5
`
`Systems Technology (FAST).
`
`6
`
`Program Committee: Symposium on File and Storage Systems
`
`7
`
`Technology (FAST).
`
`8
`
`9
`
`2011:
`
`Steering Committee: Petascale Data Storage Workshop (PDSW),
`
`10
`
`Symposium on Modeling, Analysis and Simulation of Computer and
`
`11
`
`Telecommunication Systems (MASCOTS), Symposium on File and Storage
`
`12
`
`Systems Technology (FAST).
`
`13
`
`Program Committee: Symposium on Modeling, Analysis and
`
`14
`
`Simulation of Computer and Telecommunication Systems (MASCOTS).
`
`15
`
`16
`
`2010:
`
`Program Chair: Symposium on Modeling, Analysis and Simulation of
`
`17
`
`Computer and Telecommunication Systems (MASCOTS).
`
`18
`
`Steering Committee: Petascale Data Storage Workshop (PDSW),
`
`19
`
`Symposium on Modeling, Analysis and Simulation of Computer and
`
`20
`
`4
`
`Page 4 of 17
`
`
`
`
`
`
`
`1
`
`Telecommunication Systems (MASCOTS), Symposium on File and Storage
`
`2
`
`Systems Technology (FAST).
`
`3
`
`4
`
`2009:
`
`Program Committee: International Workshop on Software Support for
`
`5
`
`Portable Storage (IWSSPS), Inaugural International Conference on
`
`6
`
`Virtualization and Cloud Computing, Symposium on Modeling, Analysis and
`
`7
`
`Simulation of Computer and Telecommunication Systems (MASCOTS),
`
`8
`
`Petascale Data Storage Workshop (PDSW).
`
`9
`
`10
`
`11
`
`Program Chair: Web Information Systems Engineering (WISE).
`
`General Chair: Symposium on Applications and the Internet (SAINT).
`
`Steering Committee: Symposium on Modeling, Analysis and
`
`12
`
`Simulation of Computer and Telecommunication Systems (MASCOTS),
`
`13
`
`Symposium on File and Storage Systems Technology (FAST).
`
`14
`
`I have also consulted for industry in the area of storage systems
`
`15
`
`including for Hewlett-Packard Laboratories and IBM. I have also been a
`
`16
`
`consultant to numerous agencies of the Federal government.
`
`17
`
`II. COMPENSATION
`
`18
`
`I am being compensated by counsel for Microsoft at my compensation
`
`19
`
`rate of $500/hour for consulting and $600/hour for testimony in deposition or
`
`20
`
`5
`
`Page 5 of 17
`
`
`
`
`
`
`
`1
`
`trial, plus reimbursement for reasonably incurred expenses. I have no interest
`
`2
`
`in the outcome of the related litigation or this proceeding.
`
`3
`
`4
`
`III. SUMMARY OF MY STUDY AND CONCLUSIONS
`
`I have read U.S. Patent No. 6,757,717. The patent concerns
`
`5
`
`technology within my areas of expertise. I have considered the patent’s
`
`6
`
`disclosures from the perspective of a person of ordinary skill in the art in
`
`7
`
`1998–99.
`
`8
`
`9
`
`10
`
`I have studied the following references and considered them from the
`
`perspective of the person of ordinary skill in the art in 1998–99.
`
`HTTP DRP (Ex. 1003): Arthur van Hoff, John Giannandrea, Mark
`
`11
`
`Hapner, Steve Carter, and Milo Medin, “The HTTP Distribution and
`
`12
`
`Replication Protocol,” W3C Note, http://www.w3.org/TR/NOTE-drp-
`
`13
`
`19970825.html, Aug. 1997 (“HTTP DRP”).
`
`14
`
`Mattis (Ex. 1004): Peter Mattis et al., U.S. Patent No. 6,292,880,
`
`15
`
`“Alias-Free Content-Indexed Object Cache,” issued Sept. 18, 2001 on
`
`16
`
`application filed Apr. 15, 1998 (“’880” or “Mattis”).
`
`17
`
`I have compared these references to claims 6, 7, 9, 11, 12 and 14 of the
`
`18
`
`’717 patent.
`
`19
`
`I have considered the perspective of the person of ordinary skill in the
`
`20
`
`art in 1998–99 (defined below) who was designing a system in which data is
`
`6
`
`Page 6 of 17
`
`
`
`
`
`
`
`1
`
`sent over a network from some source and is stored by a receiver computer
`
`2
`
`for possible later reuse, and having a design goal of reducing the transmission
`
`3
`
`of redundant data over the network. I have considered such a person having
`
`4
`
`read Mattis with an eye toward using and possibly expanding on its
`
`5
`
`teachings. I have also considered such a person having read HTTP DRP and
`
`6
`
`looking to use and possibly expand on its teachings.
`
`7
`
`These six ’717 patent claims recite nothing innovative compared to
`
`8
`
`these references. HTTP DRP discloses to the person of ordinary skill in the
`
`9
`
`art in 1998–99 everything required by these six claims. Mattis discloses to
`
`10
`
`the person of ordinary skill in the art in 1998–99 everything required by
`
`11
`
`claims 6, 7 and 9. Also, the natural combination of Mattis and HTTP DRP
`
`12
`
`taught the person of skill in the art the combinations claimed in these claims.
`
`13
`
`In other words, the person of skill in the art would have already possessed the
`
`14
`
`claimed subject matter upon reading Mattis and HTTP DRP, combined with
`
`15
`
`their knowledge of the conventional technology in the field, as explained
`
`16
`
`below.
`
`17
`
`Also, the patent is internally inconsistent and unclear on the meaning
`
`18
`
`of “digital digest,” as explained in my earlier declaration. For purposes of
`
`19
`
`my comparison of the claims to the prior art references, however, I have
`
`20
`
`assumed that this term includes a fixed-size digital fingerprint (e.g., hash,
`
`7
`
`Page 7 of 17
`
`
`
`
`
`
`
`1
`
`message digest, signature or identifier), of 32 or more bits, calculated using
`
`2
`
`an MD5 and/or CRC algorithm and calculated on arbitrary-size data, such
`
`3
`
`that it represents and depends only on the content of that data.
`
`4
`
`5
`
`IV. FIELD OF THE INVENTION
`
`The ’717 patent defines its “field of the invention” as accessing data in
`
`6
`
`communication networks. (’717, 1:10–15). The field also includes the areas
`
`7
`
`of distributed data storage systems and networking, coding theory including
`
`8
`
`9
`
`error detection and correction codes, and cryptographic hash functions
`
`commonly called message digest functions. These were all mature fields for
`
`10
`
`many years prior to 1998–99.
`
`11
`
`12
`
`V. LEVEL OF SKILL IN THE ART IN 1998–99
`
`A person of ordinary skill in this art in 1998–99 would hold a B.S.
`
`13
`
`degree in computer science and would have as part of his study courses in
`
`14
`
`operating systems, networking, data compression and computer security.
`
`15
`
`These studies would include the storage subsystem of computer operating
`
`16
`
`systems which is covered briefly in most undergraduate operating systems
`
`17
`
`courses, but few require the student to examine actual source code. In
`
`18
`
`addition he would have several years of practical experience working in
`
`19
`
`operating systems, in particular the data storage subsystem.
`
`20
`
`8
`
`Page 8 of 17
`
`
`
`
`
`
`
`1
`
`As a result, actual experience in working with this operating system
`
`2
`
`subsystem would normally occur after several years of experience working
`
`3
`
`for a company with a focus on systems software.
`
`4
`
`Alternatively, a person would develop the level of ordinary skill in the
`
`5
`
`art in 1998–99 by obtaining an M.S. in computer science and by writing his
`
`6
`
`or her thesis in an area related to data storage and/or computer security.
`
`7
`
`8
`
`9
`
`A person of ordinary skill in the art would understand network
`
`protocols. This was normally part of undergraduate programs in computer
`
`science in 1998–99. A person of ordinary skill in the art would also
`
`10
`
`understand coding theory; in particular error detection and correction codes,
`
`11
`
`as well as cryptographic hash functions and message digest functions.
`
`12
`
`Introduction to basic hash functions is a normal part of most undergraduate
`
`13
`
`curricula, but coding theory is normally part of specialized courses (although
`
`14
`
`it is commonly part of electrical engineering programs), and cryptographic
`
`15
`
`hash functions would normally be taught only in courses in computer
`
`16
`
`security.
`
`17
`
`I have first-hand experience teaching and working with such persons of
`
`18
`
`ordinary skill in the art. For example, I have taught students having about that
`
`19
`
`level of skill in this art since at least as early as 1990.
`
`20
`
`9
`
`Page 9 of 17
`
`
`
`
`
`
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`VI. MATTIS AND HTTP DRP TEACH
`
`THE CLAIMED SUBJECT MATTER
`
`A. Mattis And HTTP DRP Are A Natural Combination
`
`Each of Mattis and HTTP DRP alone teaches and discloses the entirety
`
`of the alleged invention recited in claims 6, 7 and 9 of the Goldstein ’717
`
`patent. And, at least HTTP DRP alone teaches and discloses the entirety of
`
`the alleged invention recited in claims 11, 12 and 14 of the ’717 patent.
`
`Nevertheless, I’ve been asked to assume, for argument sake, that Mattis’s
`
`disclosure of a server receiving an object’s MD5 digest within a request for
`
`that object, is somehow insufficient. And, I’ve been asked to assume, for
`
`argument sake, that HTTP DRP’s disclosure of the conventional elements of
`
`a web proxy server or other HTTP server is somehow insufficient to
`
`completely disclose the elements of these six patent claims. Given these
`
`assumptions, neither of which in my opinion is a reasonable assumption, the
`
`question posed is whether a person of ordinary skill in the art considering the
`
`problem addressed by these patent claims, and aware of these and other
`
`relevant prior art references (but not aware of the ’717 patent’s disclosure),
`
`would have had an apparent and natural reason to combine these two
`
`references (HTTP DRP and Mattis) in the manner claimed in these patent
`
`claims. In other words, would such a person starting with HTTP DRP or
`
`10
`
`Page 10 of 17
`
`
`
`
`
`
`
`1
`
`starting with Mattis, and applying ordinary skill and common sense, have
`
`2
`
`combined that reference with the other reference to reach the same
`
`3
`
`combination claimed in these claims. For example, would such a person have
`
`4
`
`seen a benefit of implementing the HTTP DRP protocol in the clients, web
`
`5
`
`proxy cache server, and other HTTP servers described in Mattis. The answer
`
`6
`
`is yes. For multiple reasons, a person having ordinary skill in the art looking
`
`7
`
`to expand upon Mattis would have looked to HTTP DRP and, conversely,
`
`8
`
`one looking to implement HTTP DRP would have looked to Mattis. As
`
`9
`
`explained below, some of these reasons are that these two references address
`
`10
`
`the same problem, present the same algorithmic solution to that problem, and
`
`11
`
`apply that shared solution to the same type of application. Further, nothing in
`
`12
`
`these two references teaches away from their combination.
`
`13
`
`Same Problem: First, each reference addresses the same problem as
`
`14
`
`the ’717 patent: the desire to reduce redundancy in network data
`
`15
`
`transmissions where certain data has been received over a network and is
`
`16
`
`stored by a proxy cache (or client cache) for possible later reuse. The ’717
`
`17
`
`patent identifies the following objects among others: “It is therefore a broad
`
`18
`
`object of the present invention to provide a method, system and apparatus for
`
`19
`
`increasing the speed of data access in a packet-switched network. Another
`
`20
`
`object of the present invention is to decrease data traffic throughout the
`
`11
`
`Page 11 of 17
`
`
`
`
`
`
`
`1
`
`network. Still another object of the present invention is to decrease the
`
`2
`
`required cache size.” (’717, 1:61-67). These were well-known goals in the
`
`3
`
`mid-1990s for designers of network caching systems. It was known that
`
`4
`
`redundant network transmissions and redundant cache storage could arise, for
`
`5
`
`instance, when downloaded data is subject to change at its original source
`
`6
`
`and/or the same downloaded data content exists on the network under two or
`
`7
`
`more different names. When the data is subject to change at the source, a
`
`8
`
`proxy cache might wastefully download that same data from the original
`
`9
`
`source each time it is requested by a client, for fear that the proxy cached
`
`10
`
`version is out of date. When the data exists and is requested by clients under
`
`11
`
`various names, the proxy cache might wastefully download the same data in
`
`12
`
`response to those requests, and cache duplicate copies of that data. Each of
`
`13
`
`these two references addresses how to avoid such redundant downloads and
`
`14
`
`storage of redundant copies. “[D]ifferent sites often refer to the same
`
`15
`
`standard libraries or images, and because their content identifiers match,
`
`16
`
`multiple redundant downloads can be avoided.” (Ex. 1003, 7:5–6). “The
`
`17
`
`technology described herein provides for a cache object store for a high-
`
`18
`
`performance, high-load application having the following general
`
`19
`
`characteristics: . . . Alias free, so that multiple objects or object variants, with
`
`20
`
`different names, but with the same content identical object content, will have
`
`12
`
`Page 12 of 17
`
`
`
`
`
`
`
`1
`
`the object content cached only once, shared among the different names.”
`
`2
`
`(Ex. 1004, 4:48-52, 64-68).
`
`3
`
`This shared problem would have motivated a person having ordinary
`
`4
`
`skill in the art to consider these references together.
`
`5
`
`Same Solution: Second, each reference proposes the same algorithmic
`
`6
`
`solution to this problem. Each uses MD5 digest fingerprints. Each calculates
`
`7
`
`an MD5 digest from the content in question to represent that content. Each
`
`8
`
`transmits MD5 digest fingerprints over the network. Each receiver of those
`
`9
`
`MD5 digests compares that network-transmitted MD5 digest to its own
`
`10
`
`cached MD5 digest fingerprint values. Each relies on a match between two
`
`11
`
`MD5 digital digest values to avoid an otherwise redundant transmission or
`
`12
`
`storage of duplicate copies of the same data content. This common
`
`13
`
`algorithmic solution would have motivated a person having ordinary skill in
`
`14
`
`the art to consider these references together.
`
`15
`
`Same Application: Third, each reference teaches that its techniques
`
`16
`
`can be used to distribute the same type of content over the same type of
`
`17
`
`distribution system, namely web server files and content over the existing
`
`18
`
`HTTP web architecture, including the Internet (with its routers, switches,
`
`19
`
`ISPs, proxies, etc.) and web proxy caches. HTTP DRP “provides a
`
`20
`
`specification of a protocol for the efficient replication of data over HTTP
`
`13
`
`Page 13 of 17
`
`
`
`
`
`
`
`1
`
`network routers” (Ex. 1003, 1:29) and describes “functionality that can be
`
`2
`
`deployed anywhere where HTTP is available today” (id., 2:22). With Mattis,
`
`3
`
`“a client may be able to access replicas from a topologically proximate cache
`
`4
`
`faster than possible from the original web server, while at the same time
`
`5
`
`reducing Internet server traffic.” (Ex. 1004, 1:62–65).
`
`6
`
`Mattis Contemplates HTTP-DRP Type Requests: Fourth, as noted,
`
`7
`
`Mattis expressly acknowledges that clients may request a particular object by
`
`8
`
`9
`
`identifying the object’s MD5 digest, but that clients typically instead request
`
`an object by its URL or other name. (Ex. 1004, 9:65–10:4). Therefore, as
`
`10
`
`shown in Fig. 9A, step 904, the Mattis system includes the capability of
`
`11
`
`converting an object name included in such a request to that object’s MD5
`
`12
`
`digest value (object key value). After that conversion step, the rest of Fig. 9A
`
`13
`
`uses the MD5 digest of the object. However Mattis obtains the MD5 digest
`
`14
`
`from the request, whether directly from the object request (e.g., an HTTP
`
`15
`
`DRP request) or indirectly by converting the object’s name to its MD5 digest,
`
`16
`
`the operation thereafter using that MD5 digest is the same. Therefore, Mattis
`
`17
`
`and HTTP DRP fully operate together without changing either.
`
`18
`
`No Teaching Away: Finally, nothing in either reference or outside
`
`19
`
`either reference teaches away from their combination. No essential feature in
`
`20
`
`Mattis conflicts with an essential feature of HTTP DRP. Nothing stated in
`
`14
`
`Page 14 of 17
`
`
`
`
`
`
`
`1
`
`Mattis would lead a person having ordinary skill in the art away from using it
`
`2
`
`to implement HTTP DRP and nothing stated in HTTP DRP would lead a
`
`3
`
`person having ordinary skill in the art away from implementing it using
`
`4
`
`Mattis.
`
`B.
`
`
`The Designer Naturally Would Have
`Combined Mattis and HTTP DRP In The Claimed Manner
`
`As seen in App. A (Ex. 1001), this combination of Mattis and HTTP
`
`DRP discloses each and every element of all six challenged claims. HTTP
`
`DRP discloses the only element in claims 6, 7 or 9 arguably not sufficiently
`
`described in Mattis (the object’s MD5 digest being received over the
`
`network). HTTP DRP discloses all elements of each of claims 6, 7, 9, 11, 12
`
`and 14 while Mattis discloses a particular set of instrumentalities for
`
`implementing the HTTP DRP protocol.
`
`The web proxy cache 30 and client 10 of Mattis each is suited for
`
`operating the HTTP DRP protocol. Modifying these elements of Mattis per
`
`HTTP DRP would of course provide and implement all of the functionality
`
`and benefits described in the HTTP DRP protocol. That is the very point of
`
`this protocol. It describes how to modify existing web servers and clients to
`
`achieve the benefits described in the protocol. The Mattis web proxy server
`
`already provides that functionality, and Mattis already describes that some
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`15
`
`Page 15 of 17
`
`
`
`
`
`
`
`1
`
`clients have the ability to request an object by its MD5 digest, but it is not
`
`2
`
`typical. Making that typical, by adopting the HTTP DRP protocol, would
`
`3
`
`provide all of the benefits of that protocol. And, it would not change how
`
`4
`
`any element in Mattis functions.
`
`5
`
`For the above reasons, this combination of Mattis and HTTP DRP in
`
`6
`
`this manner is no more than a predictable use of prior art elements according
`
`7
`
`to their established functions. A system designer of ordinary skill wishing to
`
`8
`
`improve the efficiency of network communications would have seen a benefit
`
`9
`
`of implementing HTTP DRP using the designs described in Mattis. Thus, the
`
`10
`
`challenged claims recite nothing innovative.
`
`11
`
`12
`
`
`
`I declare under penalty of perjury under the laws of the United States
`
`13
`
`of America that the foregoing is true and correct.
`
`
`
`14
`
`
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`16
`
`Page 16 of 17
`
`
`
`Executed on the 3-;“1 day of January, 2013, in Paris, France.
`
`Darre 1
`
`ong
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`17
`
`Page17of17
`
`Page 17 of 17
`
`