throbber
Case 1:10-cv-00652-SS Document 167 Filed 08/10/11 Page 1 of 2
`
`IN THE UNITED STATES DISTRICT COURT
`FOR THE WESTERN DISTRICT OF TEXAS
`AUSTIN DIVISION
`
`2011 AUG I 0 PM 12: 1 S
`
`CROSSROAD SYSTEMS, INC.
`
`~
`Case No.l:10-CV-65Bli.~ ---.
`'J r·F;7{---------~-
`
`v.
`
`Plaintiff,
`
`3PAR,INC.,
`AMERICAN MEGA TRENDS, INC.,
`RORKE DATA, INC.,
`D-LINK SYSTEMS, INC.,
`CHELSIO COMMUNICATIONS, INC. (a
`Delaware corporation).
`ISTOR NETWORKS, INC., and
`CHELSIO COMMUNICATIONS, INC. (a
`California corporation)
`
`Defendants.
`
`REPORT AND RECOMMENDATIONS OF THE SPECIAL MASTER
`REGARDING UNITED STATES PATENT NO.'S 7,051,147 & 6,425,035 B2
`
`Attached hereto is the Special Master's Report and Recommendations to United
`
`States District Judge Sam Sparks regarding the construction of claims in United States
`
`Patent No.'s 7,051,147 & 6,425,035 B2.
`
`The parties may file written ·objections to the recommendations made in this
`
`report within ten (1 0) days from the date of their receipt of it, as discussed at the
`
`conclusion of the Markman hearing.
`
`SIGNED this the 9t~ day of August, 2011.
`
`--
`
`(cid:20)(cid:3)(cid:82)(cid:73)(cid:3)(cid:22)(cid:26)(cid:22)
`
`
` CROSSROADS EXHIBIT 2008
`Oracle Corp. et al v Crossroads Systems, Inc.
` IPR2014-01207
`
`

`

`Case 1:10-cv-00652-SS Document 167 Filed 08/10/11 Page 2 of 2
`
`CERTIFICATE OF SERVICE
`
`I hereby certify that on the 9th day of August, 2011, I electronically filed the
`foregoing with the Clerk of Court using the CM/ECF system which will send notification
`of such filing to counsel of record in this action.
`
`Is/ Karl Bayer
`Karl Bayer
`
`2
`(cid:21)(cid:3)(cid:82)(cid:73)(cid:3)(cid:22)(cid:26)(cid:22)
`
`

`

`Case 1:10-cv-00652-SS Document 167-1 Filed 08/10/11 Page 1 of 20
`
`SPECIAL MASTER'S RECOMMENDED CONSTRUCTIONS
`PATENT NO. 6,425,035 B2
`
`Term
`
`Device
`
`Special Master's Recommended Construction
`
`No Construction Necessary.
`
`Implement access controls
`for storage space on the
`storage devices.
`Allow access from
`devices ... to the storage
`devices using native low
`level, block protocol.
`Native low level block
`protocol (NLLBP)
`
`Workstation
`
`Access control( s)
`
`"Provides controls which limit a device's access to a specific subset
`of storage devices or sections of a single storage device according to
`a map."
`"Permit or deny access using the NLLBP of the Virtual Local
`Storage without involving a translation from high level network
`protocols or file system protocols to a native low level block protocol
`request."
`"A set of rules or standards that enable computers to exchange
`information and do not involve the overhead of high level protocols
`and file systems typically required by network servers."
`"A computer having input/output devices intended for use by
`humans."
`
`"Controls which limit a device's access to a specific subset of
`storage devices or sections of a single storage device according to a
`map."
`
`(cid:22)(cid:3)(cid:82)(cid:73)(cid:3)(cid:22)(cid:26)(cid:22)
`
`

`

`Crossroads' Proposed
`Construction
`
`Defendants'
`
`Case 1:10-cv-00652-SS Document 167-1 Filed 08/10/11 Page 2 of 20
`
`Device:
`
`Intrinsic:
`
`Device:
`
`I Computer.
`
`Intrinsic Evidence
`
`
`
`1:37-392, 47-49, 57-60
`
`No Construction
`Necessary.
`
`Claim 1,1 Col. 9, 11. 27-
`30 ("devices" refers to
`the devices that make
`requests and are allowed
`access to storage
`devices).
`
`Col. 1, 11. 36-37; Col. 2,
`11. 4-5; Col. 4, II. 55-56;
`Col. 8, 11. 65-68 (the
`specification describes
`the devices that make
`requests to access the
`storage devices as
`"computing devices").
`
`Col. 1, 11. 57-60 ("from
`the perspective of a
`workstation, or other
`computing device,
`seeking to access such
`server data, the access is
`much slower than access
`to data on a local
`storage device ").
`
`4:29-33 ("Storage router
`56 combines access
`control with routing
`such that each
`workstation 58 has
`controlled access to only
`the specified partition of
`storage device 62 which
`forms virtual local
`storage for the
`workstation 58.")
`
`4:39-40
`
`4:58-59 ("no access
`from a workstation 58 is
`allowed to the virtual
`local storage of another
`workstation."
`
`Cf Fig. 2 and Fig. 3
`
`First Reexam Reply3 at
`8-9, 15
`
`A storage router for
`providing virtual local
`storage on remote
`storage devices to
`devices, comprising:
`
`Device:
`
`"Computing device that
`issues storage access
`requests."
`
`(cid:23)(cid:3)(cid:82)(cid:73)(cid:3)(cid:22)(cid:26)(cid:22)
`
`1 United States Patent No. 6.425,035 ("the '035 Patent") and United States Patent No. 7,051,147 ("the '14 7 Patent") share a common specification. To facilitate cross-referencing,
`unless noted otherwise, all Col:Line cites in the charts of proposed claim constructions are to the '035 Patent.
`2 As in the claim construction briefs previously submitted to the Court. all specification citations are to the '035 patent unless otherwise noted.
`3 For the sake of clarity, commonly cited documents are referenced in the "Defendants' Evidence" column by the abbreviated names used in prior briefing. A table of these
`abbreviations was included in Defendant's Reply Post-Hearing Brief and is also appended to this table.
`1
`
`

`

`Case 1:10-cv-00652-SS Document 167-1 Filed 08/10/11 Page 3 of 20
`
`I
`
`•
`
`Defendants'
`Evidence
`
`Special Master's
`Construction
`
`Second Reexam Reply
`at 7, 8, 8-15 passim, 16,
`17, 22, 23, 28, 39-40
`
`Second Reexam Reply
`at 7 ("The invention of
`the '035 patent further
`provides the security
`feature of providing
`access controls in order
`to control which storage
`devices (or portions
`thereof) any particular
`host computer can
`access.")
`
`Special Master's Proposed Construction of Disputed Terms
`Crossroads' Proposed
`Crossroads'
`Defendants' Proposed
`Construction
`Evidence
`Construction
`Claim 3, Col. 9, ll. 37-
`39 (principles of claim
`differentiation require
`"devices," as a group,
`must necessarily be
`broader than
`"workstations").
`
`CoL 6, 11. 31-41, 46-56
`(the specification
`describes "servers" as a
`type of computing
`device that can make
`storage access requests).
`
`Abstract, Col. 1, 11. 21-
`24, 11. 36-37, 11. 53-56;
`Col. 2, 11. 4-6; Col. 3, 11.
`3-6, 41-43; Col. 4, 11.
`38-42, 11. 55-56 Col. 6,
`11. 45-55; Col. 8, 11. 65-
`68 ("devices" is used
`broadly to refer to
`various computing
`devices such as
`workstations,
`input/output devices,
`"initiator" and "target"
`devices).
`
`April 6, 2005 Reply to
`Office Action at 8, 10,
`12, 22, Fore Decl. ISO
`Crossroads' Post-Hr'g
`Cl. Const., Ex. E; July
`22, 2005 Reply to
`Office Action at 7-15,
`
`2
`
`Second Reexam Reply
`at 8 ("Thus, the present
`invention ... allows the
`host computers to access
`the remote storage
`devices over the
`network ... ")
`
`Second Reexam Reply
`at 15 ("In summary, the
`invention ofthe '035
`Patent provides a
`networked storage
`solution that combines
`the ability to allow
`access from host
`computers to remote
`storage devices using
`NLLBPs with the ability
`- - to co!ltrol access - - -
`
`- -
`
`-
`
`Actual Claims
`Language
`
`(cid:24)(cid:3)(cid:82)(cid:73)(cid:3)(cid:22)(cid:26)(cid:22)
`
`

`

`Special Master's Proposed Construction of Disputed Terms
`Defendants' Proposed
`Crossroads' Proposed
`Crossroads'
`Construction
`Evidence
`Construction
`21-23, 27-29, 32, 33,
`35-37, 39, Fore Decl.
`ISO Crossroads' Post-
`Hr'g Cl. Const. Br., Ex.
`F ("Device" is used over
`ninety times in the
`reexamination
`prosecution history to
`refer to types of devices
`capable of making
`requests for storage).
`
`Defendants'
`Evidence
`between host computers
`and the remote storage
`devices .... " Second
`Reexam Reply at 16
`("The present invention
`as recited in Claim 1
`thus enables computers
`to access remote storage
`devices ... ")
`
`Extrinsic:
`
`April28, 2011 2d Supp.
`Decl. of John Levy,
`Ph.D.,, 4 (one of
`ordinary skill would
`understand that in the
`embodiments at Col. 6,
`11. 33-41; 46-56, it is the
`server that sends
`requests for storage
`access to the storage
`router using NLLBP).
`
`The McGraw-Hill
`Illustrated Dictionary of
`Personal ComQuters 126
`(4th ed. 1995), Fore
`Decl. ISO Crossroads'
`Cl. Const. Br., Ex. W
`(defining device as "a
`mechanical, electrical or
`electromechanical
`contrivance or
`appliance. Commonly
`
`3
`
`Actual Claims
`Langua_g_e
`
`(cid:25)(cid:3)(cid:82)(cid:73)(cid:3)(cid:22)(cid:26)(cid:22)
`
`Case 1:10-cv-00652-SS Document 167-1 Filed 08/10/11 Page 4 of 20
`
`Special Master's
`Construction
`
`I
`
`I
`
`I
`
`Second Reexam Reply
`at 35
`(Spring "does not teach
`access controls as
`defined by the '035
`Patent"; "in contrast to
`the invention of the '035
`Patent, this [access
`control] methodology
`described in Spring does
`not limit access of
`particular workstations
`to specific assigned
`subsets of storage
`devices or portions
`thereof.")
`
`Extrinsic Evidence
`
`Jt. Ex. 109, Crossroads
`v. Chaparral, Joint
`Claim Construction
`Order at 3 Crossroads'
`argument that
`"implements access
`controls" should be
`construed as "provides
`
`

`

`Special Master's Proposed Construction of Disputed Terms
`Crossroads' Proposed
`Crossroads'
`Defendants' Proposed
`Construction
`Evidence
`Construction
`used in reference to
`peripherals such as
`printers, CR TS and disk
`drives").
`
`Hr'g Tr. at 202:24-
`203:3,205:4-7, Mar. 8,
`20 11 (Defendants'
`counsel agreeing that
`the defining
`characteristic of a
`device is that it is the
`thing that issues storage
`requests).
`
`May 11,2011 3d Supp.
`Decl. of John Levy,
`Ph.D., ~3 (a "network
`server" is a server that
`can request access to
`storage).
`
`Microsoft ComQuter
`Dictionary 430 (3d Ed.
`1997), May 11, 2011 3d
`Supp. Decl. of John
`Levy, Ph.D., Ex. A
`(defining ••server" as
`"( 1) on a local area
`network (LAN), a
`computer running
`administrative software
`that controls access to
`the network and its
`resources, such as
`printers and disk drives,
`... _!lnd provides resources
`
`4
`
`Actual Claims
`Language
`
`(cid:26)(cid:3)(cid:82)(cid:73)(cid:3)(cid:22)(cid:26)(cid:22)
`
`- - - - - -
`
`- -
`
`Case 1:10-cv-00652-SS Document 167-1 Filed 08/10/11 Page 5 of 20
`
`Special Master's
`Construction
`
`Defendants'
`Evidence
`controls which limit a
`computer's access")
`
`Def. Ex. 19, Rudolf
`Graf, Modern
`Dictionary of
`Electronics (1999) at
`353
`
`Def. Ex. 20, Microsoft
`Computer Dictionary
`(5th ed. 2002) at 256
`
`Berg Decl. ~ 59-63.
`
`

`

`Case 1:10-cv-00652-SS Document 167-1 Filed 08/10/11 Page 6 of 20
`
`'
`
`I
`
`I
`
`Defendants'
`Evidence
`
`Special Master's
`Construction
`
`Actual Claims
`Lan2ua2e
`
`Special Master's Proposed Construction of Disputed Terms
`Crossroads' Proposed
`Crossroads'
`Defendants' Proposed
`Construction
`Evidence
`Construction
`to computers
`functioning as
`workstations on the
`network").
`Special Master's Report
`at 22, Dot Hill
`Litigation, Pl.'s CL
`Const. Hr' g Ex. P-15
`(Court previously
`construed "storage
`router" as "a data
`transmitting device that
`allows users to integrate
`different servers or
`workstations into a
`storage network").
`
`Implement access
`controls for storage
`space on the storage
`devices:
`
`a buffer providing
`memory work space
`for the storage router;
`a first controller
`operable to connect to
`and interface with a
`"Provides controls
`first transport medium; which limit a device's
`a second controller
`access to a specific
`operable to connect to
`subset of storage
`and interface with a
`devices or sections of a
`second transport
`single storage device
`medium;
`according to a map."
`and a supervisor unit
`coupled to the first
`controller, the second
`controller and the
`buffer, the supervisor
`unit operable to map
`between devices
`connected to the first
`
`Implement access
`controls for storage
`space on the storage
`devices:
`
`Intrinsic:
`
`Fig. 3, Col. 3, II. 7-59,
`Col. 4, ll. 7-27, 33-35,
`40-43, 48-50, 50-53
`(Fig. 3 shows
`embodiment in which
`all workstations can
`access global storage
`device).
`
`Col. 4, 11. 7-11 ("access
`controls" applies to
`shared storage).
`
`Access controls:
`
`Intrinsic Evidence
`
`Controls that use a map
`to permit a particular
`device to read data from
`or write data to a
`particular storage space
`assigned to the device,
`and to prevent the
`device from reading
`data to or writing data
`from storage space
`assigned to other
`devices.
`
`3:30-32, 56-59 ("FIG.
`2 ... , indicated generally
`at 30, with a storage
`router that provides
`global access and
`routing ....
`Storage router 44 uses
`tables to map devices
`from one medium to the
`other and distributes
`requests and data across
`Fiber Channel 32 and
`SCSI bus 34 without
`any security access
`controls.")
`
`4:17-24, 26-27 ("As
`shown in FIG. 3, fo_r_
`
`5
`
`"Provides controls
`which limit a device's
`access to a specific
`subset of storage
`devices or sections of a
`single storage device
`according to a map."
`
`(cid:27)(cid:3)(cid:82)(cid:73)(cid:3)(cid:22)(cid:26)(cid:22)
`
`

`

`Special Master's Proposed Construction of Disputed Terms
`Defendants' Proposed
`Crossroads' Proposed
`Crossroads'
`Evidence
`Construction
`Construction
`July 22, 2005 Reply to
`Office Action at 13-14,
`Fore Decl. ISO
`Crossroads' Post-Hr'g
`Cl. Const. Br., Ex. F
`(discussion during
`reexamination, that the
`"access controls" feature
`includes the concept of
`allowing multiple
`devices to have access
`to shared storage).
`
`Extrinsic:
`
`Chaparral Markman
`Order at 3-7, 15, Fore
`Decl. ISO Crossroads'
`Cl. Const. Br., Ex. L
`(Crossroads'
`construction parallels
`historic construction;
`the invention
`contemplates using
`access controls for an
`entire storage device as
`well as shared storage;
`Court has rejected a
`construction in which a
`particular subset of
`storage could only be
`accessed by a single
`workstation).
`
`Comments on Statement
`of Reasons for
`Patentability and/or
`
`6
`
`Actual Claims
`Language
`transport medium and
`the storage devices, to
`implement access
`controls for storage
`space on the storage
`devices and to process
`data in the buffer to
`interface between the
`first controller and the
`second controller to
`allow access from
`devices connected to
`the first transport
`medium to the storage
`devices using native
`low level, block
`protocols.
`
`(cid:28)(cid:3)(cid:82)(cid:73)(cid:3)(cid:22)(cid:26)(cid:22)
`
`Case 1:10-cv-00652-SS Document 167-1 Filed 08/10/11 Page 7 of 20
`
`Special Master's
`Construction
`
`Defendants'
`Evidence
`example, storage device
`50 can be configured to
`provide global data 65
`which can be accessed
`by all workstation 58.
`Storage device 62 can
`be configured to provide
`partitioned subsets 66,
`68, 70 and 72, where
`each partition is
`allocated to one ofthe
`workstations 58
`(workstations A, B, C
`and D). These subsets
`66, 68, 70 and 72 can
`only be accessed by the
`associated workstation
`58 and appear to the
`associated workstation
`58 .... Similarly, storage
`device 64 can be
`allocated as storage for
`the remaining
`workstation 58
`(workstation E)."
`
`Fig. 3
`--
`
`First Reexam Reply at
`13 ("[T] the access
`controls provide the
`capability to permit or
`deny each computer
`access to a particular
`storage device, a set of
`storage devices or
`
`

`

`Case 1:10-cv-00652-SS Document 167-1 Filed 08/10/11 Page 8 of 20
`
`Actual Claims
`Language
`
`Special Master's Proposed Construction of Disputed Terms
`Crossroads' Proposed
`Crossroads'
`Defendants' Proposed
`Construction
`Evidence
`Construction
`Confirmation, Fore
`Decl. ISO Pl.'s Cl.
`Const. Br., Ex. I
`(patentees expressly
`disagreed with any
`characterization of the
`claims that were
`"inconsistent with the
`claim language,
`specification or prior
`prosecution history.").
`
`Defendants'
`Evidence
`portions of a single
`storage device or
`devices (or any
`combination thereof).
`By assigning storage
`devices or portions
`thereof to particular
`computer workstations,
`the present invention
`prevents each computer
`workstation from
`overwriting or
`modifying data in
`storage assigned to
`another computer
`workstation.")
`
`Special Master's
`Construction
`
`First Reexam Reply at
`33 ("The access controls
`of claim 1 thus permit or
`deny access from
`particular host devices
`connected to the first
`data transport medium
`to particular storage
`devices (or subsets
`thereof) according to a
`map that associates the
`host devices with the
`remote storage
`devices .... ")
`--
`
`Second Reexam Reply
`at 13 ("By assigning
`storage devices or
`portions thereof to
`
`7
`
`(cid:20)(cid:19)(cid:3)(cid:82)(cid:73)(cid:3)(cid:22)(cid:26)(cid:22)
`
`

`

`Case 1:10-cv-00652-SS Document 167-1 Filed 08/10/11 Page 9 of 20
`
`Special Master's Proposed Construction of Disputed Terms
`Crossroads' Proposed
`Crossroads'
`Defendants' Proposed
`Construction
`Evidence
`Construction
`
`Defendants'
`Evidence
`particular computer
`workstations, the
`present invention
`prevents each computer
`workstations [sic] from
`overwriting or
`modifying data in
`storage assigned to
`another workstation").
`
`Special Master's
`Construction
`
`Second Reexam Reply
`at 33
`("To implement access
`controls requires more
`than simply allowing a
`host to have access to a
`storage device.
`Implementing access
`controls is a security
`measure designed to
`prevent unauthorized
`access from
`workstations to
`particular storage
`devices or subsets of
`storage as claimed and
`described in the '035
`Patent.")
`
`Second Reexam Reply
`at 33
`("The access controls of
`the '035 Patent depend
`on the map discussed
`above to control
`access .... In other words,
`the storage to which
`
`8
`
`Actual Claims
`Lan2ua2e
`
`(cid:20)(cid:20)(cid:3)(cid:82)(cid:73)(cid:3)(cid:22)(cid:26)(cid:22)
`
`

`

`Case 1:10-cv-00652-SS Document 167-1 Filed 08/10/11 Page 10 of 20
`
`Special Master's
`Construction
`
`Special Master's Proposed Construction of Disputed Terms
`Defendants' Proposed
`Crossroads' Proposed
`Crossroads'
`Construction
`Construction
`Evidence
`
`Defendants'
`Evidence
`each workstation is
`permitted access is
`controlled through the
`use ofthe map .... The
`access controls ... thus
`permit or deny access
`from particular host
`devices connected to the
`first data transport
`medium to particular
`storage devices (or
`subsets thereof)
`according to a map that
`associates the host
`devices with the remote
`storage devices.")
`
`Def. Ex. 8, NIIRC ("the
`map/mapping
`feature .. .is a one-to-one
`correspondence ... where
`by the router forms the
`connection between two
`separate entities over
`different transport
`mediums.")
`
`U.S. Pat. __ '036
`patent Reply to Office
`Action at 15
`
`U.S. Pat. 6,421,753
`Patent Reply to Office
`Action at 12
`
`U.S. Pat. 6,738,854
`
`9
`
`Actual Claims
`Language
`
`(cid:20)(cid:21)(cid:3)(cid:82)(cid:73)(cid:3)(cid:22)(cid:26)(cid:22)
`
`

`

`Case 1:10-cv-00652-SS Document 167-1 Filed 08/10/11 Page 11 of 20
`
`I
`!
`
`Special Master's
`Construction
`
`"Permit or deny access
`using the NLLBP of the
`Virtual Local Storage
`without involving a
`translation from high
`level network protocols
`or file system protocols
`to a native low level
`block protocol request."
`
`Actual Claims
`Language
`
`Special Master's Proposed Construction of Disputed Terms
`Crossroads' Proposed
`Crossroads'
`Defendants' Proposed
`Construction
`Evidence
`Construction
`
`Defendants'
`Evidence
`patent Reply to Office
`Action at 19
`
`Allow access ... to the
`storage devices using
`native low level, block
`protocols:
`
`Permit reading and
`writing of data in the
`native low level, block
`protocol of the storage
`device, without
`involving network
`servers, Ethernet
`networks, higher-level
`protocols such as
`TCP/IP, Ethernet
`protocols, network
`protocols or file system
`protocols, or translation
`from one protocol to
`another.
`
`Allow access from
`devices .•. to the
`storage devices using
`native low level block
`protocols:
`
`Intrinsic:
`
`Fig. 1, Col. 1, 11. 49-54;
`Col. 3, II. 17-23 (the
`"storage router" of the
`invention is contrasted
`with a "network server"
`that allowed access to
`storage devices by
`translating high level
`file system commands
`of the "network
`protocol" into low level
`requests (i.e., NLLBP)
`and sending the NLLBP
`to the physical storage
`devices).
`
`Claim 1, Col. 9, 11. 13-
`30 (storage router
`"allow[s] access from
`devices connected to the
`first transport medium
`to the storage devices
`using native low level,
`
`10
`
`U.S. Pat.5,942,972
`Reply to Office Action
`at 13.
`IN GENERAL-
`Intrinsic Evidence
`
`1:43-46
`--
`
`First Reexam Reply at 8
`("features of the present
`invention ... also allow a
`host (or hosts) to
`communicate with
`storage devices using
`only native low level
`block protocols.")
`(emphasis added)
`
`First Reexam Reply at
`10 (system in which "at
`least one high level to
`low level translation
`takes place between the
`workstation and the
`storage device" reflects
`prior art, not the alleged
`invention)
`
`First Reexam Reply at
`1 9 ("Petal, on the other
`hand, teaches a system
`in which a Petal client
`issues high level
`
`Allow access from
`devices ... to the
`storage devices using
`native low level block
`protocols:
`
`and a supervisor unit
`coupled to the first
`controller, the second
`controller and the
`buffer, the supervisor
`unit operable to map
`between devices
`"Permit or deny reading
`connected to the first
`or writing of data using
`transport medium and
`the NLLBP of the
`the storage devices, to Virtual Local Storage
`implement access
`without involving a
`controls for storage
`translation from a high
`space on the storage
`level file system
`devices and to process
`command to a native
`data in the buffer to
`low level, block
`interface between the
`protocol request."
`first controller and the
`second controller to
`allow access from
`devices connected to
`the first transport
`medium to the storage
`devices using native
`low level, block
`protocols.
`
`(cid:20)(cid:22)(cid:3)(cid:82)(cid:73)(cid:3)(cid:22)(cid:26)(cid:22)
`
`

`

`Case 1:10-cv-00652-SS Document 167-1 Filed 08/10/11 Page 12 of 20
`
`I
`
`Special Master's
`Construction
`
`Special Master's Proposed Construction of Disputed Terms
`Defendants' Proposed
`Crossroads' Proposed
`Crossroads'
`Construction
`Evidence
`Construction
`block protocols"
`(emphasis added); the
`storage router,
`specifically, the
`supervisor unit within
`the storage router,
`"uses" the NLLBP to
`permit or enable access).
`
`Defendants'
`Evidence
`commands .... Conseque
`ntly, the Petal server
`does not allow the Petal
`clients to access the
`storage devices using an
`NLLBP"),
`
`Col. 4, 11. 7-47
`(invention of patents-in-
`suit provides "virtual
`local storage" that
`appears to a workstation
`as local storage, and
`appears to have the
`same characteristics of
`local storage).
`
`Col. 4, 11. 44-57 ("virtual
`local storage" is
`"provided" by the
`storage router in a
`manner that is
`transparent to the
`devices requesting
`storage access).
`
`Col. 5, 11. 11-17, 11. 24-
`27 (supervisor unit
`within the storage router
`processes NLLBP
`requests from the
`devices to access
`permitted storage).
`
`Abstract; Col. 2, ll. 12-
`
`11
`
`First Reexam Reply at
`23
`--
`
`Second Reexam Reply
`at 16 ("Spring and
`Oeda, in contrast to the
`invention ofthe '035
`Patent ... require the use
`of higher level network
`protocols (and therefore
`cannot allow access to
`the remote storage
`devices using NLLBPs).
`Thus, these references
`suffer the shortcomings
`of exactly the type of
`prior art the present
`invention was designed
`to overcome.")
`
`IN GENERAL-
`Extrinsic Evidence
`
`Berg. Decl. ~~ 14-29,
`36-58
`
`Levy Decl. ~ 36 ("the
`invention of the Patents-
`
`Actual Claims
`Language
`
`(cid:20)(cid:23)(cid:3)(cid:82)(cid:73)(cid:3)(cid:22)(cid:26)(cid:22)
`
`

`

`Case 1:10-cv-00652-SS Document 167-1 Filed 08/10/11 Page 13 of 20
`
`I
`
`Special Master's
`Construction
`
`Special Master's Proposed Construction of Disputed Terms
`Crossroads' Proposed
`Crossroads'
`Defendants' Proposed
`Construction
`Evidence
`Construction
`15,17-20, 24-27; Col. 3,
`11. 59-63; Col. 3, 11. 51-
`53; Col. 4, ll. 2-6; Col.
`5, 11. 1-5; Col. 9, 11. 28-
`31; Col. 10, 11. 9-11
`(specification discloses
`that NLLBPs are used
`by, and at, the storage
`router to allow access).
`
`Defendants'
`Evidence
`in-Suit enables the
`workstation to send an
`NLLBP to the storage
`router in order to make a
`request for data.")
`
`WITHOUT
`INVOLVING
`NETWORK
`SERVERS-
`Intrinsic Evidence
`
`Col. 6, 11. 33-41, 46-56
`(specification describes
`two embodiments
`wherein "devices"
`making the storage
`access request are
`servers).
`
`Col. 1, 11. 57-60 ("from
`the perspective of a
`workstation, or other
`computing device,
`seeking to access such
`server data, the access is
`much slower than access
`to data on a local
`storage device ").
`
`Claim 3, Col. 9, 11. 37-
`39 (principles of claim
`differentiation require
`"devices," as a group,
`must necessarily be
`broader than
`"workstations").
`
`Col. 3, ll. 17-23 (the
`
`12
`
`1:47-60, 2:51-52, 2:67-
`3:9, 3:16-25 (describing
`problems of network
`server-based systems)
`
`1:50-54 ("Access to data
`through the network
`server is through a
`network protocol that
`the server must translate
`into low level requests
`to the storage device")
`
`3:32-34 ("significantly
`different from FIG. 1 in
`that there is no network
`server involved")
`
`5:1-5 (access is
`"accomplished without
`limiting the
`performance of
`workstations 58 because
`storage access involves
`native low level, block
`
`Actual Claims
`Language
`
`(cid:20)(cid:24)(cid:3)(cid:82)(cid:73)(cid:3)(cid:22)(cid:26)(cid:22)
`
`

`

`Case 1:10-cv-00652-SS Document 167-1 Filed 08/10/11 Page 14 of 20
`
`I
`
`Special Master's
`Construction
`
`Special Master's Proposed Construction of Disputed Terms
`Crossroads' Proposed
`Crossroads'
`Defendants' Proposed
`Construction
`Evidence
`Construction
`"network protocol'' used
`by the prior art
`"network servers" to
`allow access to storage
`devices is a protocol
`that includes a high
`level file system
`command that must be
`translated into low level
`storage requests).
`
`Defendants'
`Evidence
`protocols and does not
`involve the overhead of
`high level protocols and
`file systems required by
`network servers.")
`--
`
`April 6, 2005 Reply to
`Office Action at 10-11,
`Fore Dec I. ISO
`Crossroads' Post-Hr'g
`Cl. Const. Br., Ex. E;
`July 22, 2005 Reply to
`Office Action at 24-27,
`Fore Decl. ISO
`Crossroads' Post-Hr'g
`Cl. Const. Br., Ex. F
`(Crossroads
`distinguished Petal,
`Spring and Oeda as
`having a server that
`provided controlled
`access to storage was
`required to translate
`high level file system
`commands into low
`level commands in order
`to send the NLLBP to
`the storage devices).
`
`April6, 2005 Reply to
`Office Action at 8-11,
`19,22-23, Fore Decl.
`
`13
`
`First Reexam Reply at
`8-9 (distinguishing Petal
`on basis that
`workstation must create
`network protocols to
`communicate with
`network server)
`
`First Reexam Reply at
`9-10 (noting that use of
`a network server
`necessarily involves
`translation to higher
`level protocols)
`
`First Reexam Reply at
`11 ("the Petal system
`does not allow the client
`(i.e. workstation) to
`access the storage
`devices using an
`NLLBP .... [W]hile the
`Examiner has pointed
`out various portions of
`Petal that discuss using
`block level (i.e. low
`level) storage protocols,
`it is only in the context
`of the time period after
`high level RPCs have
`
`Actual Claims
`Language
`
`(cid:20)(cid:25)(cid:3)(cid:82)(cid:73)(cid:3)(cid:22)(cid:26)(cid:22)
`
`

`

`Defendants'
`Evidence
`been transformed to low
`level SCSI commands.
`The system of Petal is
`the type of system that
`the present invention
`was designed to
`overcome ... ")
`--
`
`Second Reexam Reply
`at 10, 12, 13, 22
`
`Special Master's Proposed Construction of Disputed Terms
`Crossroads' Proposed
`Crossroads'
`Defendants' Proposed
`Construction
`Evidence
`Construction
`ISO Crossroads' Post-
`Hr'g Cl. Const. Br., Ex.
`E; July 22, 2005 Reply
`to Office Action at 11-
`17,21-28, Fore Decl.
`ISO Crossroads' Post-
`Hr' g Cl. Const. Br., Ex.
`F (showing that
`Crossroads did not make
`a sweeping disclaimer
`of any use of a "network
`server"; Crossroads
`distinguished its
`invention from Oeda,
`Petal and Spring based
`on the requirement that
`the "network server"
`that provided controlled
`access to storage was
`required to translate the
`high level file system
`command into low level
`commands in order to
`send the NLLBP to the
`storage device, not the
`use of Ethernet
`networks, Ethernet or
`TCP/IP).
`
`Col. 2, ll. 17-20; Col. 5,
`II. 19-22, 50-57, 60-63;
`Col. 6, II. 32-37; '147
`Patent, Claim 1, Col. 9,
`II. 28-32 (disclosing and
`claiming embodiments
`using Fibre Channel; the
`inclusion of "without
`
`14
`
`Actual Claims
`Language
`
`(cid:20)(cid:26)(cid:3)(cid:82)(cid:73)(cid:3)(cid:22)(cid:26)(cid:22)
`
`Case 1:10-cv-00652-SS Document 167-1 Filed 08/10/11 Page 15 of 20
`
`Special Master's
`Construction
`
`Second Reexam Reply
`at 9-10 ("A problem
`with this prior art
`solution was that the
`network server creates a
`bottleneck which slows
`down remote access
`because, at least in part,
`the computer or
`workstation needs to
`create something called
`a 'network protocol' to
`send the data over the
`distance-capable
`transport medium.
`Thus, the introduction
`of a network server into
`the system creates a
`bottleneck which slows
`down access to remote
`storage devices.")
`(citing '035 patent at
`1:47-54)
`
`Second Reexam Reply
`
`---
`
`

`

`Case 1:10-cv-00652-SS Document 167-1 Filed 08/10/11 Page 16 of 20
`
`Special Master's
`Construction
`
`Special Master's Proposed Construction of Disputed Terms
`Crossroads' Proposed
`Crossroads'
`Defendants' Proposed
`Construction
`Evidence
`Construction
`involving ... network
`protocols" according to
`Defendants' expert
`would prohibit the use
`of Fibre Channel despite
`the fact that these are
`express embodiments).
`
`Defendants'
`Evidence
`at 11 ("It takes the
`computer time to create
`a network protocol")
`
`Second Reexam Reply
`at 13 (the invention
`"does away with the
`time consuming and
`complex steps of
`creating and processing
`higher-level network
`protocols at a server.")
`(emphasis added)
`
`Col. 5, 11. 53-56 (Fibre
`Channel is a protocol
`used for
`communications over
`"Fibre Channel based
`networks").
`
`Extrinsic:
`
`March 7, 2011 Supp.
`Decl. of John Levy,
`Ph.D.,~~ 9-13 (data
`transfer in networks best
`understood as having
`layers; when TCPIIP
`and Ethernet protocols
`were used by prior art
`systems to transport
`high level network file
`system requests, a
`network server would
`translate such requests
`into low level requests
`to access storage); ~~6-7
`(prior art "server"
`described in patents-in-
`suit was specifically a
`device that allowed
`access between the
`
`15
`
`Second Reexam Reply
`at 13 ("The present
`invention thus routes
`NLLBPs to the remote
`storage devices without
`involving a network
`server.")
`
`Second Reexam Reply
`at 10:-13 (Graphics 2-4).
`Second Reexam Reply
`at 22 (workstation must
`create network protocols
`to communicate with
`network server)
`
`Second Reexam Reply
`at 22 ("This ability to
`allow access from host
`computers to storage
`devices using a NLLBP,
`as recited in Claim 1,
`requires allowing access
`
`Actual Claims
`Language
`
`(cid:20)(cid:27)(cid:3)(cid:82)(cid:73)(cid:3)(cid:22)(cid:26)(cid:22)
`
`

`

`Special Master's Proposed Construction of Disputed Terms
`Crossroads' Proposed
`Crossroads'
`Defendants' Proposed
`Construction
`Evidence
`Construction
`device requesting
`"access to data" and the
`storage devices using
`something called a
`"network protocol";
`such "servers"
`implemented file
`systems and received
`high level file system
`protocols from devices
`requesting data access).
`
`Defendants'
`Evidence
`between the host and
`storage device(s) using a
`protocol (i.e., a set of
`rules) that does not
`involve the overhead of
`high level protocols and
`file systems typically
`required by network
`servers.")
`
`April28, 2011 2d Supp.
`Decl. of John Levy,
`Ph.D., ~4 (person of
`ordinary skill would
`understand that the
`specification discloses a
`server that sends
`requests for storage
`access to a storage
`router using NLLBP).
`
`May 11, 2011 3d Supp.
`Decl. of John Levy,
`Ph.D., ~3 (a "network
`server" is a server that
`can request access to
`storage).
`
`Microsoft ComQuter
`Dictionary 430 (3d Ed.
`1997), May 11,2011 3d
`Supp. Decl. of John
`Levy, Ph.D., Ex. A
`(defining "server" as
`"( 1) on a local area
`
`16
`
`Actual Claims
`Language
`
`(cid:20)(cid:28)(cid:3)(cid:82)(cid:73)(cid:3)(cid:22)(cid:26)(cid:22)
`
`Case 1:10-cv-00652-SS Document 167-1 Filed 08/10/11 Page 17 of 20
`
`I
`
`Special Master's
`Construction
`
`Second Reexam Reply
`at 22 ("As discussed
`above, in systems prior
`to the present invention,
`when making a request
`to storage through a
`network server ... , a
`workstation first had to
`

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket