throbber
Trials@uspto.gov
`571-272-7822
`
`
`
`
`
`
`
`Paper 12
`Entered: May 16, 2014
`
`UNITED STATES PATENT AND TRADEMARK OFFICE
`____________
`
`BEFORE THE PATENT TRIAL AND APPEAL BOARD
`____________
`
`DELL INC., HEWLETT-PACKARD COMPANY, and NETAPP, INC.,
`Petitioners,
`
`v.
`
`ELECTRONICS AND TELECOMMUNICATIONS RESEARCH
`INSTITUTE,
`Patent Owner.
`____________
`
`Case IPR2014-00152
`Patent 6,978,346 B2
`
`
`
`Before BRIAN J. McNAMARA, MIRIAM L. QUINN, and
`GREGG I. ANDERSON, Administrative Patent Judges.
`
`ANDERSON, Administrative Patent Judge.
`
`
`
`DECISION
`Denying Institution of Inter Partes Review
`37 C.F.R. § 42.108
`
`

`

`Case IPR2014-00152
`Patent 6,978,346 B2
`
`
`I. INTRODUCTION
`
`On November 15, 2013, Dell, Inc., Hewlett-Packard Company and
`
`NetApp, Inc. (collectively “Petitioners”) filed a Petition requesting an inter
`
`partes review of claims 1 through 9 of U.S. Patent No. 6,978,346 B2
`
`(Ex. 1001, “the ’346 patent”). Paper 2 (“Pet.”). Electronics and
`
`Telecommunications Research Institute (“Patent Owner”), filed a
`
`Preliminary Response. Paper 11 (“Prelim. Resp.”). We have jurisdiction
`
`under 35 U.S.C. § 314.
`
`The standard for instituting an inter partes review is set forth in
`
`35 U.S.C. § 314(a), which provides as follows:
`
`THRESHOLD.—The Director may not authorize an inter
`partes review to be instituted unless the Director determines
`that the information presented in the petition filed under section
`311 and any response filed under section 313 shows that there
`is a reasonable likelihood that the Petitioners would prevail
`with respect to at least 1 of the claims challenged in the
`petition.
`
`Upon consideration of the Petition and Preliminary Response, we
`
`determine that the information presented in the Petition shows that there is
`
`not a reasonable likelihood that Petitioners would prevail in showing
`
`unpatentability of claims 1-9 of the ’346 patent. Accordingly, pursuant to 35
`
`U.S.C. § 314, we decline to institute an inter partes review of claims
`
`1-9 of the ’346 patent.
`
`A. Related Proceedings
`
`The ’346 patent is involved in the following co-pending cases: Safe
`
`Storage LLC v. StoneFly, Inc., 1-13-cv-01152; Safe Storage LLC v. Int’l
`
`Business Machines Corp., 1-13-cv-0 1151; Safe Storage LLC v. Emulex
`
`Corporation, 1-13-cv-01150; Safe Storage LLC v 3PAR Inc., 1-13-cv-
`
`
`
`
`2
`
`

`

`Case IPR2014-00152
`Patent 6,978,346 B2
`
`01088; Safe Storage LLC v Oracle America Inc., 1-13-cv-01089; Safe
`
`Storage LLC v ATTO Technology Inc., 1-13-cv-01090; Safe Storage LLC v.
`
`VMware Inc., 1-13-cv-00928; Safe Storage LLC v. Promise Technology Inc.,
`
`1-13-cv-00927; Safe Storage LLC v. Nexsan Corporation, 1-13-cv-00931 ;
`
`Safe Storage LLC v. Overland Storage Inc., 1-13-cv-00932; Safe Storage
`
`LLC v. IQSS LLC, 1-13-cv-00930; Safe Storage LLC v. Infortrend
`
`Corporation, 1-13-cv-00929; Safe Storage LLC v. Cisco Systems Inc., 1-13-
`
`cv-00926; Safe Storage LLC v. Silicon Graphics Int’l Corp., 1-12-cv-0
`
`1629; Safe Storage LLC v. Dot Hill Systems Corp., 1-12-cv-01625 ; Safe
`
`Storage LLC v. Hitachi Data Systems Corp., 1-12-cv-01627; Safe Storage
`
`LLC v. Dell Inc., 1-12-cv-01624; Safe Storage LLC v. NetApp Inc., 1-12-cv-
`
`01628; Safe Storage LLC v. Hewlett-Packard Company, 1-12-cv-01626, all
`
`pending in the United States District Court for the District of Delaware. Pet.
`
`1-2.
`
`Petitioners filed previously a Petition for Inter Partes review of the
`
`‘346 patent, IPR2013-00635. We instituted an inter partes review of claims
`
`1-3 and 5-8 of the ’346 patent. We diod not institute inter partes review of
`
`claims 4 and 9 of the ’346 patent.
`
`B. The ’346 Patent
`
`The ‘346 Patent describes an apparatus with “redundant
`
`interconnection between multiple hosts and a redundant array of inexpensive
`
`disks (hereinafter referred to as “RAID”).” Ex. 1001, Abstract. As a result
`
`of the redundant interconnection, the apparatus allows increased bandwidth
`
`in the event one of two RAID controllers 460 and 461 has a failure. Id. at
`
`3:1-9.
`
`
`
`
`
`
`3
`
`

`

`Case IPR2014-00152
`Patent 6,978,346 B2
`
`
`
`
`
`
`
`
`
`
`
`
`Figure 4 of the ’346 patent is reproduced below:
`
`
`
`Figure 4 is a block diagram of a host matching system including
`
`RAID 490 and its interconnection to host computers 400-405. Ex. 1001,
`
`2:643:6. RAID 490 includes two RAID controllers 460, 461 and hubs 440,
`
`441. Id. at 3:10-18. Each RAID controller includes a pair of network
`
`interface controllers. For example, RAID controller 460 includes network
`
`interface controllers 470, 471, and RAID controller 461 includes network
`
`interface controllers 480, 481. Id. at 3:10-13. Each host computer has its
`
`own network interface controller (410 to 415), which connects the host
`
`computer through the hubs and to the network interface controllers (470,
`
`
`
`
`4
`
`

`

`Case IPR2014-00152
`Patent 6,978,346 B2
`
`471, 480, 481) of RAID controllers 460, 461. Id. at 3:31-34.
`
`The ’346 patent describes that the result is two independent networks
`
`with twice the bandwidth of a single network and a “communication
`
`passage” between the two RAID controllers. Id. at 3:62-65. The
`
`communication passage creates a “fault tolerant function” should one of
`
`RAID controllers 460 or 461 fail. Id. at 3:64-66. According to Figure 4,
`
`communications line 450 interconnects network interface controller 480 of
`
`RAID controller 461 and network interface controller 470 of RAID
`
`controller 460. Id. at 4:2-6; fig. 4. Then, RAID controller 461 may send
`
`information to RAID controller 460. Id. In like manner, network interface
`
`controller 471 of RAID controller 460 may be connected over
`
`communication lines to network interface controller 481 of RAID controller
`
`461, allowing RAID controller 480 to send information to RAID controller
`
`461. Id. at 3:66-4:4.
`
`By the arrangement described, the apparatus continues to operate in
`
`the event either RAID controller 460 or 461 has an “occurrence of an error.”
`
`Ex. 1001, 4:19-25. The interconnected network interface controller of the
`
`operational RAID controller assumes the functions of the network interface
`
`controller of the failed RAID controller. Id.
`
`C. Illustrative Claim
`
`Claims 1 and 9 are the challenged independent claims. Claim 1 is
`
`reproduced below:
`
`1. An apparatus for a redundant interconnection between multiple
`hosts and a RAID, comprising:
`
` a
`
` first RAID controlling units and a second RAID controlling unit for
`processing a requirement of numerous host computers, the first RAID
`controlling unit including a first network controlling unit and a second
`
`
`
`
`5
`
`

`

`Case IPR2014-00152
`Patent 6,978,346 B2
`
`network controlling unit, and the second RAID controlling unit including a
`third network controlling unit and a fourth network controlling unit; and
`
` a
`
` plurality of connection units for connecting the first RAID
`controlling units and the second RAID controlling unit to the numerous host
`computers, wherein the first RAID controlling unit and the second RAID
`controlling unit directly exchange information with the numerous host
`computers through the plurality of connecting units, and the first network
`controlling unit exchanges information with the fourth network controlling
`unit, and the second network controlling unit exchanges information with the
`third network controlling unit.
`
`D. Prior Art Relied Upon
`
`Petitioners rely upon the following prior art references.
`
`Author
`
`Title of Reference
`
`Date
`
`Exhibit
`
`TruCluster
`
`Sicola
`
`OpenVMS
`
`
`
`TruCluster Hardware
`Configuration
`US 6,601,187 B1
`
`Guidelines for OpenVMS
`Cluster Configurations
`
`Apr. 2000
`
`Ex. 1003
`
`Mar. 31, 20001
`
`Ex. 1004
`
`Jan. 1999
`
`Ex. 1005
`
`E. The Alleged Grounds of Unpatentability
`
`Petitioners allege the following grounds for unpatentability.
`
`Claims
`
`Grounds
`
`References
`
`1-9
`
`1-9
`
`§ 103(a)
`
`TruCluster and Sicola
`
`§ 103(a)
`
`OpenVMS
`
`
`
`
`1 Filing date, which Petitioners rely on for prior art purposes under 35 U.S.C.
`§102(e). Pet. 8.
`
`
`
`
`6
`
`

`

`Case IPR2014-00152
`Patent 6,978,346 B2
`
`
`II. ANALYSIS
`
`A. Claim Construction
`
`Principles of Law
`
`In an inter partes review, claim terms in an unexpired patent are
`
`interpreted according to their broadest reasonable construction in light of the
`
`specification of the patent in which they appear. 37 C.F.R. § 42.100(b);
`
`Office Patent Trial Practice Guide, 77 Fed. Reg. 48,756, 48,766 (Aug. 14,
`
`2012). The terms also are given their ordinary and customary meaning, as
`
`would be understood by one of ordinary skill in the art in the context of the
`
`disclosure. In re Translogic Tech., Inc., 504 F.3d 1249, 1257 (Fed. Cir.
`
`2007). If an inventor acts as his or her own lexicographer, the definition
`
`must be set forth in the specification with reasonable clarity, deliberateness,
`
`and precision. Renishaw PLC v. Marposs Societa’ per Azioni, 158 F.3d
`
`1243, 1249 (Fed. Cir. 1998). An extraneous limitation should not be read
`
`into the claims from the specification. E.g., E.I. du Pont de Nemours & Co.
`
`v. Phillips Petroleum Co., 849 F.2d 1430, 1433 (Fed. Cir. 1988). An
`
`extraneous limitation is one that, the presence of which in a claim, is
`
`unnecessary for the purpose of making sense of the claim. See, e.g.,
`
`Renishaw PLC v. Marposs Societa’ per Azioni, 158 F.3d 1243, 1249 (Fed.
`
`Cir. 1998); In re Paulsen, 30 F.3d 1475, 1480 (Fed. Cir. 1994). The
`
`construction that stays true to the claim language and most naturally aligns
`
`with the inventor’s description is likely the correct interpretation. See
`
`Renishaw PLC, 158 F.3d at 1250.
`
`
`
`7
`
`
`
`
`

`

`Case IPR2014-00152
`Patent 6,978,346 B2
`
`
`1. “RAID” (Claims 1 and 9)2
`
`Petitioners propose “RAID” be construed as “at least a redundant
`
`array of independent disks.” Pet. 8 (citing Declaration of Dr. M. Ray
`
`Mercer, Ex. 1006, 20-22). A “RAID” may include “RAID controllers.” Id.
`
`(citing Ex. 1006, 20-21).
`
`Patent Owner proposes that “RAID” be construed as “a redundant
`
`array of independent disks, including RAID controllers, configured to be
`
`used as a single peripheral by the host computers.” Prelim. Resp. 17-18.
`
`Patent Owner argues that “RAID” includes RAID controllers, relying in part
`
`on the language of claim 9: “a first and a second RAID controllers, included
`
`in the RAID.” Prelim. Resp. 16. According to Patent Owner, a “RAID” is a
`
`peripheral to “host computers,” and therefore, “RAID controllers” should be
`
`a part of the construction. Prelim. Resp. 17. Patent Owner further argues
`
`that Petitioners’ proposed inclusion of “at least” should be excluded from the
`
`construction so as not to broaden the term unduly to include additional
`
`computer equipment. Id.
`
`“RAID” is well understood by a person of ordinary skill in the art as
`
`an acronym for “redundant array of inexpensive disks.” Ex. 1001, Abstract.
`
`We are not persuaded that any additional definition is needed to capture the
`
`ordinary meaning of RAID. Thus, we construe “RAID” to mean “redundant
`
`array of inexpensive disks.”
`
`2. “RAID controller/RAID controlling unit” (Claims 1 and 9)
`
`Petitioners contend that the term “RAID controlling unit” should be
`
`
`2 Our claim construction analysis is the same as for IPR2013-00635. The
`parties’ positions also are the same as those expressed in IPR2013-00635, as
`reflected in the citations to the Petition and Preliminary Response of this
`case.
`
`
`
`
`8
`
`

`

`Case IPR2014-00152
`Patent 6,978,346 B2
`
`construed as “a functional component including hardware that may be
`
`controlled by computer code, the functional component providing control to
`
`implement RAID storage in an array of storage drives.” Pet. 8 (citing Ex.
`
`1006, 18-20). Petitioners support their construction relying solely on the
`
`declaration of Dr. Mercer, which is conclusory as to the proposed
`
`construction, and states only that the ’346 patent does not define “RAID
`
`controlling unit.” See Ex. 1006, 18-20.
`
`Patent Owner argues that “RAID” and “RAID controller” should be
`
`interpreted synonomously. Prelim. Resp. 18. Citing claim 9, for example,
`
`Patent Owner contends that “RAID controllers” are hardware and connect to
`
`other hardware. Id. Thus Patent Owner’s interpretation is “a hardware unit
`
`within a RAID that controls operation of the RAID so as to make the RAID
`
`appear as a single disk storage peripheral to the host computers.” Id.
`
`Patent Owner does not explain why the specification of the
`
`’346 patent requires the “RAID controller” be hardware, when a
`
`combination of hardware and software is also possible. See Ex. 1001, figs.
`
`1-6. Patent Owner’s arguments are insufficient to require interpretating the
`
`’346 patent specification as requiring a hardware-only RAID. The parties’
`
`proposals, therefore, improperly include extraneous language unsupported
`
`by either the ’346 patent or extrinsic evidence.
`
`For purposes of this decision, applying the broadest reasonable
`
`interpretation in light of the specification, we, therefore, construe “RAID
`
`controlling unit” and “RAID controller” to mean “a component that controls
`
`operation of the RAID.”
`
`3. “exchange/exchanges information” (Claims 1 and 9)
`
`Patent Owner relies on the prosecution of the application for the
`
`
`
`
`9
`
`

`

`Case IPR2014-00152
`Patent 6,978,346 B2
`
`’346 patent to propose that “exchanges information” means “information is
`
`exchanged via one or more of the connection units.” Prelim. Resp. 20-21.
`
`Petitioners do not propose a construction for these terms.
`
`We are not persuaded that Patent Owner’s proposed construction is
`
`correct. The claims use “exchange” and “exchanges information” according
`
`to their ordinary sense: to transmit and receive information reciprocally.3
`
`The claim recites the structures between which information is exchanged,
`
`i.e., between the RAID controlling units and the host computers, between the
`
`first and fourth network controlling units, and between the second and third
`
`network controlling units. Additional claim language requires only the
`
`information to and from the host computers to be exchanged through the
`
`connection units. Therefore, it would be improper to limit the recited
`
`“exchange of information” to occur via connection units when such
`
`limitation is expressly addressed in the claims at issue. The specification of
`
`the ’346 patent is consistent with the ordinary meaning of transmitting and
`
`receiving information reciprocally, because it describes that information is
`
`transmitted to and from a network interface controller of a first RAID and
`
`another network interface controller of a second RAID. Ex. 1001,
`
`3:664:12.
`
`Based on the foregoing, applying the broadest reasonable construction
`
`in light of the specification, we construe “exchange/exchanges information”
`
`to mean “to transmit and receive information reciprocally.”
`
`
`
`
`
`3 Definition exchange (vb) (3), WEBSTER’S THIRD NEW INTERNATIONAL
`DICTIONARY, UNABRIDGED (1993), available at
`http://lionreference.chadwyck.com (Dictionaries/Webster’s Dictionary).
`
`
`
`
`10
`
`

`

`Case IPR2014-00152
`Patent 6,978,346 B2
`
`
`Other Terms for Proposed Construction
`
`For purposes of this decision, the other terms of the challenged claims
`
`need not be construed expressly at this time.
`
`B. Obviousness over TruCluster and Sicola
`
`Petitioners contend that claims 1-9 of the ’346 Patent are obvious over
`
`TruCluster and Sicola. Pet. 9-35. To support this position, Petitioners rely
`
`on the testimony of Dr. Mercer. Ex. 1006, 22-79.
`
`For the reasons discussed below, we determine that Petitioners have
`
`not shown a reasonable likelihood that they will prevail on their assertion
`
`that claims 1-9 are unpatentable as obvious over TruCluster and Sicola.
`
`1. TruCluster Overview
`
`TruCluster is a hardware server product provided originally by
`
`Compaq Computer Corporation. Ex. 1003, 2, 23.4 TruCluster describes
`
`how to set up and maintain hardware configurations for the server. Id. at 23.
`
`In conjunction with software, the server “extends single-system management
`
`capabilities to clusters.” Id.
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Figure 6-6 of TruCluster is reproduced below.
`
`
`4 Page references are to “DHPN-1003” as designated by Petitioners, and not
`to actual pages of TruCluster.
`
`
`
`
`11
`
`

`

`Case IPR2014-00152
`Patent 6,978,346 B2
`
`
`
`
`Figure 6-6 shows a hardware configuration of a multi-bus failover mode.
`
`Ex. 1003, 120, 122.
`
`Still referring to Figure 6-6, Member Systems 1 and 2 are servers, and
`
`components labeled KGPSA are Fibre Channel adapters for systems 1 and 2.
`
`Ex. 1003 at 43. The components labeled DSGGA are Fibre Channel
`
`switches. Id. “The Fibre Channel RAID Array 8000 (RA8000) midrange
`
`departmental storage subsystem and Fibre Channel Enterprise Storage Array
`
`12000 (ESA12000) house two HSG80 dual-channel controllers.” Id. at 45.
`
`Each HSG80 controller A and B provides two ports, left and right, or 1 and
`
`2, as shown in Figure 6-6. Id.
`
`In transparent failover mode, only one left port and one right port of
`
`each controller are active at any given time. Id. Thus only one port of each
`
`controller is active. Id. If one controller fails and can no longer
`
`communicate with the switch (DSGGA), the functions automatically fail
`
`over to the other controller. Id.
`
`
`
`
`12
`
`

`

`Case IPR2014-00152
`Patent 6,978,346 B2
`
`
`2. Sicola/’187 Patent Overview
`
`Sicola describes a redundant data replication system including dual
`
`Fibre Channel fabric links interconnecting each of the components of two
`
`data storage sites. Ex. 1004, Abstract. Each site includes a host computer
`
`and data storage array, with redundant array controllers and adapters. Id.
`
`Figure 3 of Sicola is reproduced below.
`
`
`
`Figure 3 is a block diagram of the system of Sicola. Ex. 1004, 7:65-66.
`
`Hosts 101 and 102 each has two adapters 308, which support dual fabric
`
`topology. Id. at 8:1-3. The hosts run software that allows fail over between
`
`storage paths for controller-based storage arrays 20l/202 and
`
`211/212. Id. at 8:34-37. There are two host ports 109 for each array
`
`controller 201, 202, 211, and 212. Id. at 8:11-13. One port of each
`
`controller is the host port that will serve local host 101/102. Id. at 8:45-48.
`
`The other port of each controller is the remote copy port, used for backup.
`
`Id. The configuration allows for applications using either of storage arrays
`
`
`
`
`13
`
`

`

`Case IPR2014-00152
`Patent 6,978,346 B2
`
`203/213 to continue running given any failure of either fabric 103A or 103B,
`
`or of either storage array. Id. at 8:7-10.
`
`The RAID controllers via their network ports include timed heartbeat
`
`signals. Ex. 1004, 9:35-36. Controller A1 sends a command or “heartbeat”
`
`to controller B1, for example to write data. Id. at 9:47-51. In case of
`
`failover, of controller A1 for example, control is transferred to controller A2.
`
`Id. at 10:13-15. Similarly controller B2 shares storage array 213 with
`
`controller B1, and B2 can access the storage array if B1 fails. Id. at 10:17-
`
`21.
`
`3. Claims 1-9 under § 103(a) (TruCluster and Sicola)
`
`Independent claims 1 and 9 each includes an “exchanges information”
`
`limitation. This limitation is dispositive of the grounds raised in the Petition,
`
`and is analyzed below. Claim 1 recites the “exchanges information”
`
`limitation as set out below:
`
`the first network controlling unit exchanges information with the
`fourth network controlling unit, and the second network controlling
`unit exchanges information with the third network controlling unit.
`(emphasis added).
`
`Claim 9 recites the limitation in similar language as set out below:
`
`wherein the first network controlling unit in the first RAID controlling
`unit exchanges information with the second network controlling unit
`in the second RAID controlling unit, and the second network
`controlling unit in the first RAID controlling unit exchanges
`information with the first network controlling unit in the
`second RAID controlling unit. (emphasis added).
`
`We now turn to the parties’ positions with respect to claim 1.
`
`Petitioners argue that the system shown in Fig. 6-6 of TruCluster includes
`
`the same connection topology as in Figure 4 of the ’346 Patent. Pet. 10, 17.
`
`
`
`
`14
`
`

`

`Case IPR2014-00152
`Patent 6,978,346 B2
`
`As a result, Petitioners argue TruCluster provides for the same
`
`“communication passages” described in the ’346 Patent’s specification at
`
`column 3, line 62, through column 4, line 12. Id. at 10-11 (citing Ex. 1006,
`
`23). Petitioners contend that the “arrangement of TruCluster’s system
`
`performs the ‘exchanges limitation’ of claim 1.” Id. at 11. Petitioners
`
`conclude that the “exchanges information element” is suggested, if not
`
`explicitly shown, by Figure 6-6 of TruCluster.5 Id. at 11, 17 (citing Ex.
`
`1006, 34-35).
`
`Dr. Mercer’s testimony on obviousness based on TruCluster is set
`
`forth below:
`
`A person of ordinary skill in the art would have understood that RAID
`controller A port 1 and RAID controller B port 1 could communicate
`through the first switch and also that RAID controller A port 2 and
`RAID controller B port 2 could communicate through the second
`switch, as shown in Figure 6-6. Such information exchange between
`the cited ports is strongly suggested by the architecture shown in
`Figure 6-6.
`
`Ex. 1006, 34.
`
`Petitioners specifically argue as the first ground of unpatentability that
`
`the “exchanges information” limitation would have been obvious to the
`
`person of ordinary skill based on TruCluster and Sicola.6 Pet. 11-13.
`
`Petitioners argue Sicola teaches using ports in dual-ported RAID controllers
`
`to communicate among the RAID controllers. Id. at 11. The ports of Sicola,
`
`5 Petitioners do not allege, as a ground of unpatentability, that TruCluster,
`absent Sicola, renders claims 1-9 obvious. We have set out the arguments
`made regarding TruCluster as relevant to the combination of TruCluster and
`Sicola.
`6 However, there are statements in the Petition relying on TruCluster alone,
`including, for example, that “every element of claim 1 is suggested, if not
`explicitly shown, by Fig. 6-6 of TruCluster.” Pet. 11.
`
`
`
`
`15
`
`

`

`Case IPR2014-00152
`Patent 6,978,346 B2
`
`it is further argued, are “a type of network controlling unit.” Id. (citing Ex.
`
`1006, 23-24). Petitioners argue Sicola’s disclosure of a host port and a
`
`“remote copy” port as “just like” the dual ported RAID controllers of
`
`TruCluster Figure 6-6. Id. at 11-12 (citing Ex. 1004, 4:33-41, 8:44-48, fig.
`
`3).
`
`As to the “exchanges information” limitation at issue, Petitioners
`
`argue that “the ’187 Patent [Sicola] demonstrates that it was also well known
`
`that RAID controllers in a storage system would communicate with each
`
`other using their respective network ports.” Id. at 18 (citing Ex. 1004, 4:33 -
`
`41, 8:44-48, fig. 3). Petitioners allege Sicola teaches that information is
`
`exchanged between the RAID controllers of Sicola via the network ports,
`
`including heartbeat signals, data for storage, write commands,
`
`acknowledgements, and failover information. Id. at 12 (citing Ex. 1004,
`
`9:35-52, 10:8-21; Ex. 1006, 24). The alleged exchange of information
`
`between port 1 of RAID controller A and port 1 of RAID controller B in
`
`Sicola occurs via the switch to which they are both connected. Id. (citing
`
`Ex. 1006, 24-25). Similarly, port 2 of RAID controller A exchanges
`
`information with port 2 of RAID controller B via the switch to which they
`
`are both connected. Id. at 12 and 18 (citing Ex. 1006, 24-25).
`
`Petitioners contend one of ordinary skill would have combined
`
`TruCluster and Sicola. Pet. 12. Petitioners first argue both are in the same
`
`field of endeavor, “storage systems with redundant pairs of storage
`
`controllers.” Id. at 12-13 (citing Ex. 1006, 24). Further, Petitioners allege
`
`TruCluster’s architecture shows connecting the “network controlling units,”
`
`i.e., ports 1 and 2 of Figure 6-6, through the DSGGA switches, providing
`
`“information paths among the network control units.” Id. (citing Ex. 1003,
`
`
`
`
`16
`
`

`

`Case IPR2014-00152
`Patent 6,978,346 B2
`
`25). Furthermore, Petitioners argue the combination would yield predictable
`
`results. Id. at 13 (citing Ex. 1006, 25; KSR International Co. v. Teleflex Inc.,
`
`550 U.S. 398, 416-417 (2007); MPEP § 2143).
`
`Relevant to the “exchanges information” limitation, Patent Owner
`
`argues that claims 1and 9 require the exchange of information between two
`
`“RAID controlling units” both of which are part of the same RAID. Prelim.
`
`Resp. 28. Patent Owner contends Figure 6-6 of TruCluster shows
`
`communication of the ports 1 and 2 of the HSG80 controllers with the host
`
`computers, but not between the HSG80 controllers. Id. at 28-29. Patent
`
`Owner argues the “mere connection does not suggest at all, let alone
`
`strongly suggest, exchanging information.” Id. at 29.
`
`Patent Owner contends TruCluster alone does not disclose the
`
`“exchanges information” limitation, or Petitioners would not have relied on
`
`the combination with Sicola for this limitation. Prelim. Resp. 30. Patent
`
`Owner argues that Sicola teaches something different from the claimed
`
`“exchanges information” limitation. Id. at 31. Specifically, Patent Owner
`
`argues Sicola Figure 3 discloses two RAIDs that communicate between each
`
`other. Id. at 31-32.
`
`Patent Owner also argues that substituting the RAID and RAID
`
`controllers of TruCluster and Sicola, as Petitioners claim would be known to
`
`one of ordinary skill, does not result in the “exchanges information”
`
`limitation. Prelim. Resp. 28-38
`
`In particular, Patent Owner points out that the evidence does not teach
`
`the information exchange that the claims require. To illustrate this point,
`
`Patent Owner provides an annotation of Figure 3 of Sicola, reproduced
`
`below.
`
`
`
`
`17
`
`

`

`Case IPR2014-00152
`Patent 6,978,346 B2
`
`
`
`
`
`
`Patent Owner states that the solid line in its annotation of Figure 3 of Sicola
`
`illustrates the exchange of information between two of the recited network
`
`controlling units, but argues that this “dedicated link” between a local array
`
`controller and a remote array controller does not meet the claimed
`
`“exchanges information” limitation. Prelim. Resp. 34-35 (citing Ex. 1006 at
`
`34 (quoting Ex. 1004, 4:33-34)). Patent Owner argues the dotted line in its
`
`annotation of Figure 3 “represents the claimed “exchang[e of] information”
`
`between network controlling units of RAID controllers of the same RAID.”
`
`Id. at 35. According to Patent Owner, the claimed communication
`
`illustrated by the dotted line is missing in Sicola. Id. We agree with Patent
`
`Owner that Petitioners have failed to provide sufficient information that four
`
`of the network controlling units of TruCluster would communicate as taught
`
`by Sicola to meet the “exchange information” limitation, when read in light
`
`of claim 1 and 9’s additional, express limitations regarding the network
`
`controlling units.
`
`
`
`
`18
`
`

`

`Case IPR2014-00152
`Patent 6,978,346 B2
`
`
`As stated above, the “exchanges information” limitation, when read in
`
`light of claim 1 and 9’s additional, express limitations regarding the
`
`network controlling units,” and its construction are dispositive of the
`
`obviousness ground based on TruCluster and Sicola.7 Accordingly, our
`
`analysis is directed to those limitations and related issues.
`
`First, we are not persuaded that TruCluster discloses the “exchanges
`
`information” limitation in addition to the network controlling unit
`
`limitations, as argued in a claim chart provided by Petitioner’s expert, Dr.
`
`Mercer. See Ex. 1006, 34. Each of the ports 1 and 2, i.e., network
`
`controlling units of claim 1, communicate with the host through the
`
`DSGGA, i.e., connecting units of claim 1. It has not been shown that the
`
`ports associated with each of the two HSG80 controllers, i.e., RAID
`
`controlling units of claim 1, communicate with the ports of the other
`
`HSG80. Furthermore, failover is a significant reason for the disclosed
`
`architecture. TruCluster discloses that if one controller fails and can no
`
`longer communicate with the switch (DSGGA), the functions automatically
`
`fail over to the other controller. Ex. 1003, 45. Dr. Mercer testifies that the
`
`architecture of Figure 6-6 of TruCluster shows:
`
`RAID controller A port 1 and RAID controller B port 1 could
`communicate through the first switch and also that RAID controller A
`port 2 and RAID controller B port 2 could communicate through the
`second switch, as shown in Figure 6-6. Such information exchange
`between the cited ports is strongly suggested by the architecture
`shown in Figure 6-6.
`
`Ex. 1006, 34 (emphasis added). Dr. Mercer’s testimony on this point, which
`
`is not supported by underlying facts or data, is not persuassive. See 37 CFR
`
`7 We need not address the other limitations or arguments made by Patent
`Owner regarding admissibility and prior art issues. See Prelim. Resp. 21-25.
`
`
`
`
`19
`
`

`

`Case IPR2014-00152
`Patent 6,978,346 B2
`
`§ 42.65(a). Showing the mere connection in TruCluster, without more, does
`
`not persuade us that the recited “exchanges information,” including the
`
`network controlling units limitation “could” occur.
`
`As to whether Sicola teaches the “exchanges information” limitation,
`
`Petitioners rely again on the testimony of Dr. Mercer. Ex. 1006, 34-37.
`
`There is no sufficient factual support for the explanation that a person of
`
`ordinary skill would combine the TruCluster system shown in Figure 6-6
`
`with the controller communication scheme disclosed in Sicola. An
`
`obviousness rationale may be reasonable if the combination of familiar
`
`elements according to known methods does no more than yield predictable
`
`results. KSR Int'l v. Teleflex Inc., 550 U.S. 398, 416 (2007). More
`
`specifically, “when a patent ‘simply arranges old elements with each
`
`performing the same function it had been known to perform’ and yields no
`
`more than one would expect from such an arrangement, the combination is
`
`obvious.” Id. at 417 (quoting Sakraida v. Ag Pro, Inc., 425 U.S. 273, 282
`
`(1976)). A general assertion that a patent simply arranges old elements
`
`must, therefore, follow a showing that each element performs the same
`
`function it had been known to perform. We do not see how the Petitioner’s
`
`assertion of obviousness shows that TruCluster’s system—which includes a
`
`multi-bus failover capability—would perform that failover function when
`
`Sicola’s inter-site controller communications require a dedicated link that
`
`would eliminate such a function. See Prelim. Resp. 35-37 (arguing that the
`
`use of Sicola’s dedicated links for the “exchange of information” would
`
`eliminate TruCluster’s multi-bus failover capability). And there is no
`
`sufficient factual support in either the Petition or the Declaration of Dr.
`
`Mercer to suggest that a person of ordinary skill in the art would find it
`
`
`
`
`20
`
`

`

`Case IPR2014-00152
`Patent 6,978,346 B2
`
`obvious to modify the TruCluster system to include the Sicola
`
`communications at the cost of losing the failover function.
`
`Claim 9 has the same single RAID requirement and “exchanges
`
`information” limitation. Petitioners make the same arguments for
`
`unpatentability made in connection with claim 1. Pet. 34-35. Claims 2-8 all
`
`depend from claim 1, and for reasons discussed, the challenges to claims 2-8
`
`also fail.
`
`In consideration of the above, we are not persuaded that Petitioners
`
`have shown a reasonable likelihood that they will be successful in
`
`demonstrating any of claims 1-9 would have been unpatentable as obvious
`
`over the combination of TruCluster and Sicola.
`
`C. Obviousness over OpenVMS
`
`Petitioners contend that claims 1-9 of the ’346 patent are obvious over
`
`OpenVMS. Pet. 8-9, 35-59. To support this position, Petitioners rely on the
`
`testimony of Dr. Mercer. Ex. 1006, 80-148.
`
`For the reasons discussed below, we are not persuaded that Petitioners
`
`have made a sufficient showing that there is a reasonable likelihood that they
`
`would prevail in challenging claims 1-9 based on obviousness over
`
`OpenVMS.
`
`
`
`1. OpenVMS Over

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket