throbber
UNITED STATES PATENT AND TRADEMARK OFFICE
`
`____________
`
`BEFORE THE PATENT TRIAL AND APPEAL BOARD
`
`____________
`
`ORACLE CORPORATION,
`NETAPP INC. and
`HUAWEI TECHNOLOGIES CO., LTD.
`
`Petitioners,
`
`v.
`
`CROSSROADS SYSTEMS, INC.
`
`Patent Owner.
`
`____________
`
`Case IPR2014-01209
`
`U.S. Patent No. 7,051,147
`
`____________
`
`PETITIONERS’ REPLY IN SUPPORT OF THE PETITION
`
`
`
`
`
`
`
`
`
`

`
`Table of Contents
`
`The Kikuchi-Bergsten Combination Renders Obvious the Claims Because
`Patent Owner’s Attempt to Antedate Kikuchi Fails and Patent Owner’s
`Critique of the Combined System Ignores the Express Teachings of the
`References ........................................................................................................ 1
`Patent Owner’s Evidence of Diligence Fails ............................................... 2
`Patent Owner Fails to Overcome the Fact that the Kikuchi-Bergsten
`System Restricts Access to Specific Host Devices ..................................... 9
`The Proposed Combination Does Not Change the References’ Principles
`of Operation ................................................................................................ 11
`
`I.
`
`A.
`B.
`
`C.
`
`
`II.
`
`A.
`
`The Bergsten-Hirai System is Identical in Relevant Respect to Devices
`Patent Owner Has Accused of Infringement and Patent Owner Only Attacks
`the References Individually ........................................................................... 13
`Patent Owner’s Primary Argument – that Bergsten doesn’t Identify a
`Particular Host – Fails because there is only a Single Host Device
`Attached to each Host Interface ................................................................. 14
`B. Hirai Does Not Teach that the Access Controls Are at the Network File
`System Level .............................................................................................. 16
`The Proposed Ground Applies Hirai’s Access Controls at the Block Level,
`not the File Level ........................................................................................ 16
`Bergsten is Not Limited to Applications in which All Users are Given
`Access to All Data ...................................................................................... 17
`
`C.
`
`D.
`
`
`III. The Petition Set Forth a Specific Reason to Combine the References
`Asserted Against Claim 5 .............................................................................. 19
`
`
`IV. Patent Owner Does Not Even Attempt to Establish any Nexus between the
`Alleged Secondary Considerations and the Claimed Invention .................... 20
`
`
`V.
`
`
`Conclusion ..................................................................................................... 25
`
`

`
`
`
`I.
`
`The Kikuchi-Bergsten Combination Renders Obvious the Claims
`Because Patent Owner’s Attempt to Antedate Kikuchi Fails and Patent
`Owner’s Critique of the Combined System Ignores the Express
`Teachings of the References
`
`Crossroads Systems, Inc.’s (Patent Owner’s) first argument with respect to
`
`the Kikuchi and Bergsten combination, is that Kikuchi is not prior art. Patent
`
`Owner’s attempt to antedate Kikuchi fails because, according to Patent Owner’s
`
`own purported timeline, about four months of the diligence period was dedicated
`
`only to developing a product that, Patent Owner also admits, was outside the scope
`
`of the claims. Patent Owner unduly delayed and failed to diligently reduce the
`
`invention to practice because it could have developed the claimed invention, but
`
`chose not to for reasons that the Federal Circuit has held does not excuse delay.
`
`Patent Owner made a business decision—unrelated and unnecessary to the testing
`
`of the invention—to prioritize the development of another product (and delay
`
`development of the claimed invention) in order to provide the company with an
`
`earlier return of revenue.
`
`On the merits of the combination, Patent Owner’s argument that the
`
`combined system does not identify a particular storage device is contrary to the
`
`express teachings of Kikuchi. Further, Patent Owner’s argument that the proposed
`
`combination would change the principle of operation of the base references is
`
`based on an unduly narrow view of the teaching and applicability of the references.
`
`In fact, the proposed combination involves primarily modification of a simple
`
`
`
`
`
`1
`
`

`
`
`
`mapping table which—Patent Owner and its expert do not dispute—is well within
`
`the level of ordinary skill in the art.
`
`A. Patent Owner’s Evidence of Diligence Fails
`The only diligence chronology provided by the Patent Owner is set forth in
`
`an exhibit prepared by Patent Owner’s counsel. Ex. 2311. This chronology spans
`
`seven pages and is a prejudicial attempt to circumvent the 60 page limit for the
`
`Patent Owner response. 37 C.F.R. § 42.6(a)(3); Fujian Newland Computer Co.,
`
`Ltd. v. Hand Held Products, Inc. IPR2013-00595 (Paper 28, June 13, 2014) at 2
`
`(“[W]e agree with Petitioner that, in the abstract, use of a pointer or citation to
`
`declaration testimony, without sufficient arguments and explanation in the
`
`response itself, improperly circumvents the page limit[.]”); Cisco Systems, Inc. v.
`
`C-Cation Technologies, LLC, IPR2014-00454 (Paper 12, Aug. 29, 2014) at 10,
`
`(Board refusing to “consider arguments . . . not made in the Petition, but . . .
`
`incorporated by reference[.]”). The diligence chronology therefore should not be
`
`considered.
`
`Even if the Board considers the chronology, it fails to establish reasonable
`
`diligence. Patent Owner’s position appears to be that from August 18, 1997 (the
`
`beginning of the critical period) to November 25, 1997, the inventors were
`
`engaged in a constructive reduction to practice of the Verrazano bridge product,
`
`which Patent Owner claims had to be completed before the claimed subject matter
`
`
`
`
`
`2
`
`

`
`
`
`of the ’147 Patent could be reduced to practice. Resp. at 29-32. The period from
`
`November 25 to December 31, 1997 (the end of the critical period) was allegedly
`
`spent making revisions to a patent application. Each of these two time periods are
`
`addressed in turn below.
`
`As a threshold matter, Patent Owner freely acknowledges that the Verrazano
`
`bridge does not embody the claimed invention because it lacks the recited access
`
`controls. Id. at 31; Ex. 2305 at ¶ 4. Rather, Patent Owner argues that it was not
`
`able to begin work on the access controls until it had competed its work on the
`
`Verrazano bridge and therefore, its work on that bridge should be credited as
`
`diligence toward reducing the claimed invention to practice. Resp. at 30.
`
`In Naber v. Cricchi, the Court determined that, because the inventor
`
`“admittedly ‘possessed the capability of conducting . . . a test [of functionality of
`
`the claimed invention],’ it was his burden to reconcile the waiting period with the
`
`‘reasonable diligence’ requirement.” 567 F.2d 382, 385 (Cust. & Pat. App. 1977),
`
`citing Litchfield v. Eigen, 535 F.2d 72, 76, 190 USPQ 113, 116 (Cust. & Pat.App.
`
`1976). The Court found lack of diligence where both the inventor and his
`
`supervisor “admitted that a simple transistor embodying the structure [of the
`
`claimed invention] could have been built and tested”, yet the inventor “chose not to
`
`proceed to a reduction to practice with a simple transistor, but to wait until work on
`
`layer deposition techniques progressed.” Id. As noted in Thompson v. Dunn, it is
`
`
`
`
`
`3
`
`

`
`
`
`not diligent to “delay the reduction to practice of the invention . . . and devote time
`
`and energy to the development of an auxiliary device which is not essential to the
`
`testing of the invention at issue.” 166 F.2d 443, 447 (Cust. & Pat. App. 1948)
`
`overruled on other grounds by Weil v. Fritz, 572 F.2d 856 (Cust. & Pat. App.
`
`1978). Similarly, in Oracle Corp. v. Click-to-Call Tech. L.P., No. IPR2013-00312
`
`(Paper 52, Oct. 28, 2014) at 25-26, citing In re Harry, 333 F.2d 920, 923 (Fed. Cir.
`
`1964), the Board noted that delaying development of the claimed invention until
`
`completion of the “overall system architecture design” does not establish
`
`reasonable diligence.
`
`That is the case here. The proffered evidence demonstrates that the Patent
`
`Owner made a conscious decision to prioritize development of the Verrazano
`
`bridge and delay development of the claimed subject matter. Patent Owner’s
`
`diligence declarant Mr. Middleton testified that he knew of no technical obstacle
`
`that would have prevented development and testing of the access control feature on
`
`a testbed during the critical period. Ex. 1220 at 54, 58-59, 63-65. Moreover, Patent
`
`Owner had five functioning Verrazano hardware prototypes during the critical
`
`period on which the bridge software (which lacked access controls) was being
`
`tested. Id. at 58-59; Ex. 2308 at 3. Mr. Middleton further testified that he was
`
`aware of no reason that the software running on the hardware prototypes during the
`
`
`
`
`
`4
`
`

`
`
`
`critical period could not have been modified to include access controls. Ex. 1220
`
`at 63-65.
`
`Indeed, the evidence suggests that Patent Owner opted to omit the access
`
`controls from the Verrazano product to accelerate commercial introduction of that
`
`product. The only evidence offered to demonstrate constructive reduction to
`
`practice is a two-page declaration of Mr. Middleton, who later admitted on cross
`
`examination that Crossroads’ management may have decided to omit the access
`
`controls from the Verrazano product (which was ultimately released as the model
`
`4100) because Crossroads, being a start-up, needed to generate revenue as quickly
`
`as possible.
`
`Q. (BY MR. GARDELLA) To your knowledge, was the software
`team dedicated entirely to work on the 4100 [Verrazano]?
`MR. HALL: Objection; form.
`A. Yes.
`Q. (BY MR. GARDELLA) And do you believe that that is because
`there was a desire to bring the 4100 product to market as quickly as
`possible?
`MR. HALL: Objection; calls for speculation.
`A. Yes.
`Q. (BY MR. GARDELLA) On what do you base that belief?
`A. As a startup, we were, you know, using investors’ funding. We
`were interested in becoming profitable as soon as possible and
`demonstrating that our product was viable.
`
`
`
`
`
`5
`
`

`
`
`
`Q. So is it fair to say that was a priority for Crossroads at that time?
`A. Yes.
`Q. So given that, is it possible that the software team made the
`decision not to build the access controls into the software in 1997
`because that may have lengthened the time to market for the product?
`MR. HALL: Objection; form.
`A. It’s possible.
`. . .
`Q. And in this specific circumstance, is it fair to infer that adding the
`access control functionality would have lengthened the development
`time for Verrazano?
`MR. HALL: Objection; form.
`A. I believe that to be true.
`Q. (BY MR. GARDELLA) So it’s possible then, isn’t it, that a
`decision was made within Crossroads to delay development of the
`access controls for reasons relating primarily to early revenue
`generation?
`MR. HALL: Objection; calls for speculation.
`A. It’s possible.
`Id. at 70:16-72:22.
`
`In the end, the evidence shows that Patent Owner could have built the access
`
`controls into the Verrazano/4100 bridge but chose not to do so for business
`
`reasons, i.e., because incorporation of access controls would delay the commercial
`
`launch of the product. Because access controls could have been built into the
`
`bridge software or otherwise separately developed and tested on existing hardware
`
`
`
`
`
`6
`
`

`
`
`
`prototypes, but were not, Patent Owner’s work on the Verrazano product does not
`
`establish reasonable diligence. See Oracle Corp. v. Click-to-Call Tech., IPR2013-
`
`00312 at 25-26.
`
`Turning next to the work on the patent application, which is offered as
`
`diligence evidence for the five weeks spanning November 25, 1997 to December
`
`31, 1997, the evidence shows that Patent Owner received the draft from counsel in
`
`July. Ex. 2303. Subsequent edits (shown in the redline submitted herewith as
`
`Exhibit 1228) – mostly grammatical and comprising approximately a dozen
`
`sentences worth of additions and three paragraphs of deletions – were so minimal
`
`that they could not have accounted for the five week delay. Moreover, Patent
`
`Owner offers no evidence regarding which, if any, of the revisions were made in
`
`the five week window at the end of the critical period during which no other
`
`evidence of diligence is offered. One could infer therefore that some of the
`
`revisions were made during the “patent application review meeting” (Ex. 2311 at
`
`6) but no evidence is offered in that regard.
`
`Given the minimal revisions made to the patent application between July
`
`1997 and December 1997, and Patent Owner’s failure to even allege which of
`
`these revisions were made in the five weeks preceding the end of the critical
`
`period, the proffered evidence fails to account for that five week period. A single
`
`patent application review meeting and the transmission of a draft patent application
`
`
`
`
`
`7
`
`

`
`
`
`with minimal revisions cannot have required more than a couple days of effort.
`
`Patent Owner offers no other evidence of diligence during the five week period.
`
`A showing of diligence requires specific details concerning work done rather
`
`than “mere pleadings” related to progress of patent application preparation. Oracle
`
`Corp. v. Click-to-Call Tech., IPR2013-00312 at 16-17, 19 (finding patent owner
`
`failed to demonstrate diligence between the date invention disclosure was received
`
`by patent counsel and filing date of the application because, over the course of
`
`several weeks, patent owner and counsel could only attest to having “continued to
`
`make progress on the preparation of [the] patent application.”), citing In re Harry,
`
`333 F.2d 920, 923 (Fed. Cir. 1964). Here, the evidence concerning work on the
`
`patent application likewise fails to establish diligence for the same reasons.
`
`Patent Owner’s diligence evidence fails: Patent Owner could have built
`
`access controls into the Verrazano/4100 software but chose not to do so, could
`
`have separately tested access controls on the prototypes but chose not to do so, and
`
`failed to account for the remaining five weeks of the critical period (from
`
`November 25 to December 31, 1997). Kikuchi remains a prior art reference
`
`against the claimed subject matter.
`
`
`
`
`
`8
`
`

`
`
`
`B. Patent Owner Fails to Overcome the Fact that the Kikuchi-
`Bergsten System Restricts Access to Specific
`Host Devices
`On the merits of the Kikuchi-Bergsten combination, Dr. Levy acknowledged
`
`during his cross examination that the argument that Kikuchi does not perform
`
`access controls is premised on his contention that Kikuchi’s use of the term “disk
`
`partition” is a misnomer. Resp. at 33-34; Ex. 2053 at ¶148; Ex. 1218 at 61-63. Dr.
`
`Levy reasons that, because Kikuchi is not “really” talking about disk partitions,
`
`“the correlation chart provides only an integer value to add to a requested block
`
`address” and that “offsets in the correlation chart do not prevent a host from
`
`accessing storage not ‘allocated’ to that specific host.” Resp. at 34-35,
`
`paraphrasing Ex. 2053 at ¶¶ 149-52, 156-57.
`
`Even assuming, arguendo, that Dr. Levy’s understanding of the operation of
`
`Kikuchi were correct (and it is not), that would not affect the manner in which the
`
`combined system operates. The petition explained in detail that, in the combined
`
`system , multi-protocol intercommunication capabilities of the command and
`
`interpretation unit described in Kikuchi are enhanced by incorporating Bergsten’s
`
`emulation drivers 21 and physical drivers 22. Pet. at 32-34. The correlation chart
`
`and address conversion units described in Kikuchi are modified to include the
`
`virtual mapping functionality of Bergsten’s storage controller, as shown in the
`
`figure below (reproduced from the petition). Id. at 33-34.
`
`
`
`
`
`9
`
`

`
`
`
`Accordingly, Dr. Levy’s
`
`criticism fails to address the
`
`combined system (shown at
`
`right) but rather attacks Kikuchi
`
`individually. It is axiomatic
`
`that one cannot show
`
`nonobviousness by attacking
`
`references individually where
`
`the rejections are based on
`
`combinations of references. In
`
`re Keller, 642 F.2d 413, 426
`
`(CCPA 1981); In re Merck &
`
`Co., Inc., 800 F.2d 1091, 1097
`
`(Fed. Cir. 1986). This is especially true where, as here, the Patent Owner’s expert
`
`does not dispute that the asserted combination was within the level of skill in the
`
`art. Ex. 1218 at 103:16-21; see also Ex. 1010 at ¶¶ 142-47.
`
`Moreover, Dr. Levy’s position is at odds with the express disclosure of
`
`Kikuchi. Kikuchi states that its apparatus “enables access authorization to be
`
`assigned solely to specific host devices.” Ex. 1006 at Abstract (emphasis added).
`
`Kikuchi explains that
`
`
`
`
`
`10
`
`

`
`
`
`[i]t is an object of the present invention to improve the
`deficiencies inherent in the conventional devices discussed
`above, and in particular to provide a disk apparatus in which
`each host device can be treated differently, so that for example
`access authorization can be assigned solely to specific host
`devices, or furthermore, each host device can gain access to a
`different partition while using the same interface.
`Ex. 1006 at 1:65-2:6 (emphasis added). Kikuchi expressly states that each disk
`
`partition is allocated to a different host device:
`
`[B]ecause a partition offset information value is stored for each
`host device, the disk apparatus is able to allocate a different
`disk partition to each host device. Consequently, a single disk
`apparatus can essentially appear as a different disk to each host
`device, enabling the efficient usage of modern large volume
`disk apparatus.
`Id. at 8:40-46 (emphasis added). The Kikuchi reference’s express teachings, that
`
`access to each partition is assigned to a different host device, contradict Dr. Levy’s
`
`interpretation, and are controlling. Krippelz, 667 F.3d at 1268-70; Arthrocare
`
`Corp., 406 F.3d at 1373-74.
`
`C. The Proposed Combination Does Not Change the References’
`Principles of Operation
`Patent Owner argues that the Kikuchi-Bergsten combination “changes
`
`Kikuchi’s fundamental principle of operation” because Patent Owner claims
`
`Kikuchi’s integer offset approach would have to be modified in various ways.
`
`
`
`
`
`11
`
`

`
`
`
`Resp. at 41-42, citing Ex. 2053 at ¶¶ 169-70. Patent Owner also complains that the
`
`combined system simplifies Bergsten’s two-stage mapping (since in the combined
`
`system there is only a single storage controller). Resp. at 43.
`
`To the contrary, making modifications of the type described by Patent
`
`Owner would have been rudimentary and well within the skill of an ordinary
`
`artisan in this field, as both parties’ experts have acknowledged. Ex. 1218 at 103;
`
`Ex. 1010 at ¶ 145; Ex. 2054 at 200, 214. Because alternating between a mapping
`
`tree and a mapping chart was a routine design choice, it cannot constitute a
`
`fundamental change in the principle of operation of a system. In re Mouttet, 686
`
`F.3d 1322, 1332 (Fed.Cir. 2012) (sustaining “Board’s determination that the
`
`difference in the circuitry—electrical versus optical—does not affect the overall
`
`principle of operation of a programmable arithmetic processor”).
`
`The only remaining and relevant question is whether a skilled artisan would
`
`have seen an apparent reason to undertake these modifications. KSR International
`
`Co. v. Teleflex Inc., 550 U.S. 398, 421-21 (2007) (explaining that the relevant
`
`inquiry is “whether there was an apparent reason to combine the known elements
`
`in the way a patent claims” and that “[i]t is common sense that familiar items may
`
`have obvious uses beyond their primary purposes, and a person of ordinary skill
`
`often will be able to fit the teachings of multiple patents together like pieces of a
`
`puzzle.”). Professor Chase explained that a skilled storage engineer would have
`
`
`
`
`
`12
`
`

`
`
`
`been motivated to incorporate the virtual storage emulation of Bergsten into the
`
`disk apparatus of Kikuchi to increase both the number of storage devices accessible
`
`to hosts connecting to the disk apparatus and the storage address range available
`
`within the combined system. Ex. 1010 at ¶ 146. The combined system also
`
`benefits from increased restructuring capabilities because an administrator could
`
`replace or update equipment and reassign host storage regions without requiring
`
`host-side involvement. Id.
`
`For the foregoing reasons, Patent Owner’s arguments concerning the
`
`Kikuchi-Bergsten combination should be rejected.
`
`II. The Bergsten-Hirai System is Identical in Relevant Respect to Devices
`Patent Owner Has Accused of Infringement and Patent Owner Only
`Attacks the References Individually
`
`Patent Owner argues that the Bergsten-Hirai combination does not teach
`
`identifying a particular host. Patent Owner’s argument, however, is belied by the
`
`fact that the Patent Owner previously has accused of infringement systems which
`
`operate in the same manner as the Bergsten-Hirai system. Consistent with that
`
`infringement allegation, Patent Owner’s expert Dr. Levy concedes that in systems
`
`where there is a single host device attached to host interface the host interface ID
`
`suffices to uniquely identify the host.
`
`Patent Owner next argues that Hirai only teaches NFS level access control,
`
`but this argument fails to address the proposed combination. In the proposed
`
`
`
`
`
`13
`
`

`
`
`
`combination, Bergsten’s block-level emulation drivers are modified to include
`
`access controls. Lastly, Patent Owner argues that adding access control to
`
`Bergsten would defeat its overarching purpose of providing all users access to all
`
`data. While that may be one benefit of Bergsten in certain implementations,
`
`however, the reference is by no means limited to systems that provide all users
`
`access to all data.
`
`A. Patent Owner’s Primary Argument – that Bergsten doesn’t
`Identify a Particular Host – Fails because there is only a Single
`Host Device Attached to each Host Interface
`
`Bergsten sufficiently identifies host devices because there is only a single
`
`host device attached to each “host interface.” Dr. Levy conceded this point on
`
`cross examination. Ex. 1218 at 93:20-96:4. Dr. Chase similarly explains that in
`
`Bergsten and in the combined Bergsten-Hirai system each host is identified
`
`because, among other things, each host interface is coupled to a single host device.
`
`Ex. 1010 at ¶¶ 140-41, 247.
`
`Consistent with Dr. Levy’s testimony, Patent Owner has accused of
`
`infringement systems which operate in the same manner, i.e., they identify the host
`
`devices by port or channel because there is only a single host device connected to
`
`each port or channel. Patent Owner previously asserted in district court that the
`
`Overland 9500D “map[s] between devices connected to the first transport medium
`
`and the storage devices” (the mapping recitation contained in the related ‘035
`
`
`
`
`
`14
`
`

`
`patent) because the system maps between a fibre channel port for a host and logical
`
`unit number (LUN) for an array of storage devices (tape libraries in the appliance):
`
`
`
`
`
`Ex. 1225 at 2; see also Ex. 1224.
`
`As shown in the figure at right,
`
`the “FC ports” referenced in the
`
`infringement contentions
`
`correspond to each FC adapter
`
`card in the back of the Overland
`
`appliance (ProtecTIER is the
`
`name of the software which runs on the Overland REO 9500D). Ex. 1226 at 19
`
`(authenticated by Ms. Gregory in a declaration attached as Ex. 1231), see also 7,
`
`16, 47, 85, 106, 108. Accordingly, the accused Overland system is identical to the
`
`Bergsten-Hirai combination in that the mapping is between remote storage devices
`
`and an FC adapter card port or channel, which is in turn connected to a single host
`
`device. Pet. at 46-47; Ex. 1010 at ¶ 247. By making this allegation of
`
`infringement, Patent Owner has joined its expert Dr. Levy in conceding that
`
`mapping to a fibre channel port or channel is sufficient to meet the mapping
`
`limitation at least where each port or channel is connected to a single host device.
`
`
`
`
`
`15
`
`

`
`
`
`B. Hirai Does Not Teach that the Access Controls Are at the Network
`File System Level
`
`Patent Owner argues at length that Hirai’s access controls are executed at
`
`the network file system (NFS) level, not the block level. Resp. at 14-18. Patent
`
`Owner alleges that “create” and “delete” commands would only make sense at the
`
`NFS level but ignores the fact that an administrator could use the “create” and
`
`“delete” commands to control the formation and removal of partitions. Ex. 1008 at
`
`¶¶ 12-13. This is consistent with the view that the partition control table of Hirai
`
`manages access rights at a block level. Pet. at 47-48. Moreover, “execute” would
`
`be nonsensical in a remotely located storage NFS-level solution. Hirai’s sharing
`
`device 3 would have no way of enforcing an execute permission because the
`
`remote devices would of course execute the files locally, without the intervention
`
`or cooperation of the sharing device 3. Accordingly, one skilled in the art would
`
`understand that Hirai’s access controls are applied at the block or partition level, as
`
`Professor Chase explained in his declaration. Ex. 1010 at ¶¶ 245-46.
`
`C. The Proposed Ground Applies Hirai’s Access Controls at the Block
`Level, not the File Level
`Patent Owner’s arguments as to the Bergsten-Hirai combination are similar
`
`to those advanced against the Kikuchi-Bergsten combination as neither address the
`
`combined system that is actually presented. Patent Owner’s argument that Hirai
`
`discloses access controls at the file level instead of the block-level ignores that the
`
`
`
`
`
`16
`
`

`
`
`
`combined system applies the access controls in the context of Bergsten, which
`
`involves low-level virtualized mapping. Resp. at 16-19, 14-20; Pet. at 32-33, 47-
`
`48. The petition explains that, to the extent Bergsten fails to describe the
`
`privileges associated with write-protecting data, Hirai’s access control may be
`
`incorporated into Bergsten’s storage controller (which operates at the block level,
`
`not the file level). Pet. at 47-48. Like the Kikuchi-Bergsten combination, Dr. Levy
`
`does not assert that the Bergsten-Hirai combination that was actually proposed in
`
`the petition (and by Dr. Chase) would have required anything beyond routine skill.
`
`Ex. 2053 at ¶¶ 130-36; Ex. 1010 at ¶¶ 247-51. Accordingly, Patent Owner’s
`
`argument that Hirai’s access controls are at the file system level is, as above, only
`
`an attack on the secondary reference individually. In re Keller, 642 F.2d 413at
`
`426; In re Merck & Co., 800 F.2d 1091at 1097 (attack on secondary reference
`
`individually is insufficient to demonstrate nonobviousness).
`
`D. Bergsten is Not Limited to Applications in which All Users are
`Given Access to All Data
`
`Patent Owner’s final argument regarding Bergsten-Hirai is that a skilled
`
`artisan would not consider modifying Bergsten so that access to certain data is
`
`granted on a per-host basis. Patent Owner posits that this would be antithetical to
`
`Bergsten’s supposedly fundamental purpose of permitting all hosts access to all
`
`data. Resp. at 24-25.
`
`
`
`
`
`17
`
`

`
`
`
`To the contrary, Bergsten is fully compatible with access controls. The first
`
`stated goal of Bergsten is “to ensure that valuable data is adequately protected
`
`against loss or damage.” Ex. 1007 at 1:20-22. Bergsten next identifies, as a
`
`problem solved by the systems described within, the “need for the capability to
`
`store multiple back-up copies of data in geographically separate locations, while
`
`still permitting quick and easy access by a host computer to any back-up copy.” Id.
`
`at 1:34-37. Only after highlighting these primary goals does Bergsten state that
`
`“[i]t is further desirable that such a storage controller allow multiple host
`
`computers at different locations to access any copy of stored data.” Id. at 1:39-
`
`42. Read in context, the objective of providing multiple host computers access to
`
`all data is subordinate to Bergsten’s primary goals of data protection and high
`
`availability. These primary goals are furthered by access controls that provide an
`
`additional layer of data protection.
`
`
`
`An artisan skilled in network storage during the relevant timeframe would
`
`combine the Bergsten and Hirai teachings in the above-described manner in order
`
`to provide additional levels of granularity to the block-level data access of
`
`Bergsten using the mapping-based access controls of Hirai. Ex. 1010 at ¶¶ 247-51.
`
`Professor Chase explained that one advantage of doing so would be that blocks of
`
`host computers may be allocated varying levels of access to particular sets of data,
`
`such that certain systems within a business entity could modify the data while other
`
`
`
`
`
`18
`
`

`
`
`
`systems within the business entity have read-only access, and further systems
`
`within the business entity may be denied access altogether (e.g., due to a level of
`
`sensitivity of the stored data). Id. at ¶ 249. In applying access controls at the
`
`logical addressing level, as Professor Chase explained, access controls may be
`
`applied uniformly throughout all of the copies of particular data within a daisy-
`
`chained networking system of storage controllers, thus supporting and enhancing
`
`Bergsten’s goal of “creat[ing] and manag[ing] multiple back-up copies…in a
`
`manner that is both non-disruptive of, and transparent to, the host computer
`
`systems and their users.” Ex. 1007 at 3:4-8; Ex. 1010 at ¶ 250; see also Pet. at 49.
`
`III. The Petition Set Forth a Specific Reason to Combine the References
`Asserted Against Claim 5
`
`With regard to claim 5, Patent Owner raises the additional argument that the
`
`Petition did not set forth reasons to add the functionality described in the Smith
`
`reference to the underlying combinations (Kikuchi-Bergsten and Bergsten-Hirai).
`
`Resp. at 52-53. To the contrary, the petition explained that “one of ordinary skill
`
`would understand that the emulation and physical drivers of Bergsten are designed
`
`to incorporate the functionality of the Tachyon chip of Smith,” citing paragraphs
`
`239-40 and 342-43 of the Chase declaration. Pet. at 43, 57. Those portions of the
`
`Chase declaration describe, in turn, that
`
`[i]n the combined system, the emulation drivers and physical
`drivers of Bergsten, to the extent that their internal
`
`
`
`
`
`19
`
`

`
`
`
`configurations are not disclosed in detail, would be designed to
`incorporate the functionality of the Tachyon chip of Smith. . . .
`One of skill in the art would have understood that the internal
`architecture of the Tachyon chip would readily combine with
`the disk apparatus of Kikuchi to provide for communication
`between the FC interface (e.g., the physical drivers and
`emulation drivers) and the internal operating system of
`Kikuchi’s disk apparatus.
`Ex. 1010 at ¶¶ 239-40 (internal paragraph numbering omitted, emphasis added).
`
`The Petition therefore specifically explained that the adding the Smith (Tachyon)
`
`functionality would enable communication between Bergsten’s physical/emulation
`
`derivers and the OS of Kikuchi’s disk apparatus. A similar explanation is set forth
`
`for the addition of Smith to the Bergsten-Hirai system. Ex. 1010 at ¶¶ 342-43.
`
`IV. Patent Owner Does Not Even Attempt to Establish any Nexus between
`the Alleged Secondary Considerations and the Claimed Invention
`
`Any objective evidence of nonobviousness must arise from the claimed
`
`features. Rambus Inc. v. Rea, 731 F.3d 1248, 1257-58 (Fed. Cir. 2013), citing
`
`Wyers v. Master Lock Co., 616 F.3d 1231, 1246 (Fed. Cir. 2010) (“for objective
`
`evidence . . . to be accorded substantial weight, its proponent must establish a
`
`nexus between the evidence and the merits of the claimed invention.”); Demaco
`
`Corp.v. F. Von Langsdorff Licensing Ltd., 851 F.2d 1387, 1392 (Fed. Cir. 1988).
`
`Objective evidence of nonobviousness must also be “reasonably commensurate
`
`with the scope of the claims.” Rambus Inc. v. Rea at 1257. “In order to be
`
`
`
`
`
`20
`
`

`
`
`
`commensurate in scope with the claims, the commercial success must be due to
`
`claimed features, and not due to unclaimed features.” Joy Technologies Inc. v.
`
`Manbeck, 751 F. Supp. 225, 229, 17 USPQ2d 1257, 1260 (D.D.C. 1990), aff’d,
`
`959 F.2d 226, 228, 22 USPQ2d 9483, 9486 (Fed. Cir. 1992) (Features responsible
`
`for commercial success were recited only in allowed dependent claims, and
`
`therefore the

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket