throbber
1 of 3
`
` CROSSROADS EXHIBIT 2300
`Oracle Corp., et al v. Crossroads Systems, Inc.
` IPR2014-01207 and IPR2014-1209
`
`

`

`·-
`
`Network storage device with routing and security controls
`
`Abstr.act
`
`High speed serial interconnects provide the capability to attach a large number of high speed
`devices to a common storage tr.wsport medium over large distances. Existing storage tr.msport mediums
`provide for a n:latively small nlDD~ of devices to be attached ova rdativdy short di.stuces. A stongc
`router serves to interconnect these mediums, providing devices on either medium global, transparent access
`to devices on the other medium, routing requests from specific devi~ on one medium to specific devic~
`on the other medium.
`
`Existing computer worbmtions access storage either locally or through network interconnects.
`Local stonge typically consists of a disk drive contained within, or locally coll.Dected lo, the wod:sotion.
`Access to local storage is though low level. block protocols mapping directly to the mec:h.anism.s used by tbc
`storage device, and consist of data n:quests with no specific stru.c:turc. Security controls a.re not provided.
`Network interconnects provide access for a luge number of worbtiitiocs to storage on :a. rt:mote server,
`which provides file system struc:turc, access control, and other miscella.oeous capabilities. Aeccs.s to the
`data on tbc server is through protocols th.at map to tbe file system coostru~ implemented by the server.
`
`The invention provides for a large number of computer work:sbtions to be interconnected on :a.
`common storage transport, acc:cssing a common data ston: tbn>ugh low levc~ block protocois. Access
`controls and routing are implemented such th.at each workstation has access to a specific subset of the data
`store, which bas the appearance and characteristics oflocal storage. Methods are provided that allow for
`configuration a.cd modification of the storage allocated lo each workstation attached.
`
`g
`
`~I~ l
`
`~ WO<l<s1allon
`
`[g]
`E :Qj
`
`[61)
`l~ 11ciE1 I
`
`WOticstL!lotl
`
`D
`t
`rH l
`
`w orti:statiOft
`
`II
`
`Drn-ing 1. Typical Network. Access to dati storage is through s.c:rvcr, which implements file
`system on disk and transfers data to wodc.statiocs via high level file system protocols.
`
`CROS ~11
`
`Crossroads SystctllS Inc.
`
`Coo.fidcntial Inf ormatio.o
`
`2 of 3
`
`CRDS-T 00335
`
`

`

`·-
`
`41
`
`g
`
`IC: cR i
`
`Disk
`
`c IE OR fl
`
`Wori<.stalion
`
`D
`E·:::m i
`
`D
`t I (Cg ~
`
`WOtXstadon
`W0!1<.Statlon
`Drawing 2. Storage Networi:: with global access and routing, Any wodcst2tion can access any storage
`device through low level block protocols.
`
`Worl..sulion t
`
`D D
`
`W~4 Wortcstdon5
`
`Woct..sta!ion 1
`Sll:nQe
`
`- - - .. 1---~
`:::JI m
`
`Drawing 3. Networi:: storage device with routing and security CODttols.. Worlcstations access storage through
`low·level protocols, with the appearance and methods oflocal &10rage aca:ss. Access control is co::nbi.ned
`with routi.og in the storage router, such that each workstation has controlled access only to specified storage
`devices or sectioc thc:~of.
`
`Concept by Geoffrey Hoese, Marcll 22., 1997. F~ draft May 15, 1997.
`
`CRDS -40~12
`
`Crossroad.> Systems Inc.
`
`Confidential Information
`
`3 of 3
`
`CRDS-T 00336
`
`

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket