throbber
UNITED STATES PATENT AND TRADEMARK OFFICE
`____________
`
`BEFORE THE PATENT TRIAL AND APPEAL BOARD
`____________
`
`CISCO SYSTEMS, INC. AND QUANTUM CORPORATION
`Petitioner,
`
`v.
`
`CROSSROADS SYSTEMS, INC.
`Patent Owner
`
`____________
`
`Case IPR2014-01544
`Patent No. 7,051,147
`____________
`
`
`
`DECLARATION OF DR. JOHN LEVY, PH.D.
`
`
`
`CROSSROADS EXHIBIT 2027
`Cisco Systems et al v. Crossroads Systems, Inc.
`IPR2014-01544
`
`1 of 98
`
`
`
`
`CROSSROADS SUBSTITUTE EXHIBIT _
`Cisco Systems et al. v. Crossroads Systems, Inc.
`IPR2014-01544
`
`2027
`
`

`
`I, John Levy, make the following declaration based on my personal
`
`knowledge and, if called to testify before the Patent Trial and Appeal Board, could
`
`and would testify as follows:
`
`I.
`
`INTRODUCTION
`
`
`1.
`
`I have been retained in connection with inter partes review
`
`proceeding, IPR2014-01544, which concerns United States Patent No. 7,051,147
`
`(the “’147 Patent”). This declaration contains my expert opinions concerning
`
`the ’147 Patent, the petition in this proceeding (the “Petition”), the prior art
`
`identified therein, and the facts alleged to support the Petition. I have been asked
`
`to evaluate and render an opinion concerning the grounds of unpatentability on
`
`which the present IPR has been instituted.
`
`2.
`
`
`
`It is my understanding that the Patent Trial and Appeal Board (the
`
`“Board”) instituted the present inter partes review on the following alleged ground
`
`of unpatentability:
`
`Claims 1-39 under 35 U.S.C. § 103(a) over the CRD-5500 Manual
`(Ex.1004) and the HP Journal (Ex. 1006).
`
`II. QUALIFICATIONS AND COMPENSATION
`A. Background and Experience
`
`3.
`
`I am the sole proprietor of John Levy Consulting, a consulting firm
`
`that specializes in consulting on managing development of high tech products,
`
`2
`
`
`2 of 98
`
`

`
`including computers and software. I have a Bachelor of Engineering Physics
`
`degree from Cornell University, a Master of Science degree in Electrical
`
`Engineering from California Institute of Technology, and a Ph.D. in Computer
`
`Science from Stanford University.
`
`4.
`
`
`
`From 1965 to 1966, at Caltech, my field of study was information
`
`processing systems. My coursework included systems programming, including the
`
`construction of compilers and assemblers. From 1966 to 1972, during my graduate
`
`study at Stanford, my field of study was computer architecture and operating
`
`systems. My coursework included computer systems design, programming and
`
`operating systems. During my employment at Stanford Linear Accelerator Center
`
`while I was a graduate student at Stanford University, I was a programmer and I
`
`participated in the design and implementation of a real-time operating system for
`
`use in data acquisition, storage and display. My Ph.D. thesis research related to
`
`computer systems organization and programming of multi-processor computers. I
`
`developed and measured the performance of several parallel programs on a
`
`simulated 16-processor system. I also studied file systems, disk and tape storage
`
`subsystems, and input/output.
`
`5.
`
`
`
`I have been an employee and a consultant for over thirty years in the
`
`computer systems, software and storage industry. After earning my doctorate from
`
`Stanford University in Computer Science, I worked as an engineer at a number of
`
`3
`
`
`3 of 98
`
`

`
`leading companies in the computer industry, including Digital Equipment
`
`Corporation, Tandem Computer, Inc., Apple Computer, Inc., and Quantum
`
`Corporation.
`
`6.
`
`
`
`From 1972 to 1974, at Digital Equipment Corporation, I supervised
`
`the development of an input/output channel for high-speed mass storage (disk,
`
`drum and tape), and its implementation for 7 different peripheral units and 3
`
`different computer systems. From 1974 to 1975, I was project engineer leading the
`
`development of a new computer system. From 1975 to 1976, I supervised an
`
`operating system development group. During this time, I reviewed design changes
`
`and bug reports and fixes for two operating systems. While working for Digital
`
`Equipment Corporation, I wrote a long-term strategic plan for input/output buses
`
`and controllers and operating systems, including the conversion of most I/O buses
`
`to serial implementations. I am the author of a chapter on computer bus design in
`
`the book Computer Engineering, published in 1978 by Digital Press.
`
`7.
`
`
`
`From 1977 to 1979, I was employed at Tandem Computer, Inc., where
`
`I worked on design of future multiprocessor systems. I also worked on problems
`
`related to distributed (networked) systems including rollback and recovery of
`
`distributed databases.
`
`8.
`
`
`
`From 1979 to 1982, I was employed at Apple Computer, Inc., where I
`
`worked on the design of a new computer system, the Lisa, which was a precursor
`
`4
`
`
`4 of 98
`
`

`
`to the Macintosh. I also supervised hardware and software engineers in the
`
`development of a new local area network.
`
`9.
`
`
`
`In 1980-81, I taught an upper-division course at San Francisco State
`
`University titled “Input/Output Architecture” which dealt with design of I/O
`
`channels, controllers, storage devices and their associated software.
`
`10.
`
` From 1982 to 1992, I consulted for a variety of client companies,
`
`including Apple Computer, Quantum Corporation and Ricoh Co., Ltd., on project
`
`management and product development. Consulting work for Quantum included
`
`working as a temporary supervisor of a firmware development team for a new hard
`
`disk drive. During this time I co-authored a paper, cited in my attached CV, on the
`
`design of a file system for write-once optical disk drives, related to work I did for
`
`client Ricoh.
`
`11.
`
` From 1993 to 1998, I was employed at Quantum Corporation, a
`
`manufacturer of hard disk drives, where I formed and managed a new group called
`
`Systems Engineering. While in this role I managed, among others, software and
`
`systems engineers who developed hard disk input/output drivers for personal
`
`computers and disk drive performance analysis and simulation software. While at
`
`Quantum, I also led the definition and implementation of high-speed improvements
`
`of the ATA disk interface standard, called Ultra-ATA/33 and /66, which also led to
`
`improvements in the SCSI interface standard. I was also involved in the design of
`
`5
`
`
`5 of 98
`
`

`
`file systems for hard disks, data compression schemes for disk data, and Ethernet-
`
`connected disk drives. I was Quantum’s representative to the Audio/Video
`
`Working Group of the 1394 (FireWire) Trade Association, a Consumer Electronics
`
`industry standards group, and participated in Quantum’s work in designing disks
`
`that could record and play back video and audio streams without needing an
`
`intervening computer system.
`
`12.
`
` My qualifications for forming the opinions set forth in this report are
`
`listed in this section and in Appendix A attached, which is my curriculum vitae.
`
`Appendix A also includes a list of my publications.
`
`13.
`
`
`
`I am a named inventor on seven United States patents, including
`
`several related to input/output buses and storage subsystems. I have been disclosed
`
`as an expert in over 50 cases and have testified at trial and in depositions. A list of
`
`my testimony is attached hereto as Appendix B. I also have served as a technical
`
`advisor to two United States District Court Judges.
`
`14.
`
`
`
`I regularly teach courses such as “Computers – the Inside Story” and
`
`“The Digital Revolution in the Home” at the Fromm Institute for Lifelong
`
`Learning at the University of San Francisco.
`
`B. Compensation
`
`15.
`
`I base my opinions below on my professional training and experience
`
`and my review of documents and materials produced in this litigation. My
`
`6
`
`
`6 of 98
`
`

`
`compensation for this assignment is $575 per hour. My compensation is not
`
`dependent on the substance of my opinions or my testimony or the outcome of the
`
`above-captioned case.
`
`III.
`
`INFORMATION CONSIDERED IN FORMING OPINION
`
`
`I have read the ’147 Patent, and its prosecution history. I have read
`
`16.
`
`the Petition, its exhibits, the Patent Owner’s Preliminary Response to the Petition,
`
`and its exhibits. I have also relied on my own knowledge and experience as well
`
`as published documents in forming my opinions. A list of materials considered in
`
`forming my opinions is attached as Appendix C.
`
`IV. ORDINARY SKILL IN THE ART
`
`17.
`
`It is my understanding that a person of ordinary skill in the art at the
`
`time of the invention is presumed to know the relevant art and would be capable of
`
`understanding the scientific and engineering principles applicable to the pertinent
`
`art. This person of ordinary skill in the art can perform routine tasks in the relevant
`
`field with a reasonable likelihood of success.
`
`18.
`
` Based on my experience, a person of ordinary skill in the art in the
`
`context of the patent under review would have a B.S. in electrical engineering or
`
`equivalent and at least three years of experience in the design of computer data
`
`storage and networks, or an M.S. or Ph.D. in electrical engineering or the
`
`equivalent, and at least one year of experience in design of computer data storage
`
`7
`
`
`7 of 98
`
`

`
`and networks. Unless otherwise stat ed, my testimony below refers to the
`
`knowledge of one of ordinary skill in the art.
`
`V. TECHNICAL BACKGROUND
` SCSI which stands for “Small Computer System Interface” is a
`19.
`
`standard input/output bus for interconnecting computer and peripheral devices.
`
`Although the term “SCSI” is often used without qualification, there are three
`
`versions of SCSI: SCSI-1, SCSI-2, and SCSI-3. Ex. 2047, SCSI-3 Architecture
`
`Model, at 20 (identifying the three different SCSI standards). According to the
`
`SCSI-2 standard, “The SCSI protocol is designed to provide an efficient peer-to-
`
`peer I/O bus with up to 16 devices, including one or more hosts.” Ex. 2037, SCSI-
`
`2 standard, at 3. It also describes SCSI as a “local I/O bus.” Id. at 34. SCSI
`
`communication takes place between “initiators” that request performance of
`
`operations by “targets.” Id. at 31, 33. For example, a host computer might act as a
`
`SCSI initiator that requests data from a target SCSI disk device on the same SCSI
`
`bus. The SCSI interface standard provides for the connection of multiple initiators
`
`and multiple targets on a single bus. Id. at 34; see also id. at 59 (Fig. 14), below. .
`
`20.
`
` While in practice it was unusual to have multiple SCSI initiators on a
`
`bus, it was certainly possible to do so. “Communication on the SCSI bus is allowed
`
`between only two SCSI devices at any given time. . . . There can be any
`
`8
`
`
`8 of 98
`
`

`
`combination of initiators and targets provided there is at least one of each.” Ex.
`
`2037 (SCSI-2 Standard) at 58.
`
`
`
`Id. at 59. “When two SCSI devices communicate on the SCSI bus, one acts as an
`
`initiator and the other acts as a target. The initiator originates an operation and the
`
`target performs the operation.” Id. at 58.
`
` Each device on a SCSI bus (targets and initiators has a unique SCSI ID on a
`
`particular bus. If a device is attached to multiple buses it can have the same or
`
`9
`
`
`9 of 98
`
`

`
`different SCSI ID on each of those buses. See, e.g., CRD-5500 Manual, Ex. 1003
`
`at 4-3. “Each target has one or more logical units, beginning with logical unit
`
`zero.” Ex. 2037 at 112. . A logical unit is “a physical or virtual peripheral device
`
`addressable through [the] target”. Ex. 2037, SCSI-2 Standard, at 32. A logical unit
`
`number (LUN) is used to identify a logical unit at the target. In SCSI-2, an
`
`initiator discovers the devices on the SCSI bus “by querying each SCSI ID and
`
`LUN” using the INQUIRY command.. Id. at 112. A SCSI-3 device can discover
`
`LUNs in a similar fashion or, if both the initiator and target support the SCSI-3
`
`command REPORT LUNs, the initiator can determine the supported logical units
`
`by sending one REPORT LUNs command to the target device. See Ex. 2063,
`
`SCSI-3 Primary Commands, at 83.
`
`VI. THE ’147 PATENT
`A. Background of the Invention
` As described in the background of the ’147 Patent, computers access
`21.
`
`local storage devices using a native low level block protocol (“NLLBP”). The
`
`Patents-In-Suit describe an NLLBP:
`
`
`
`10
`
`
`10 of 98
`
`

`
`Ex. 1001, 1:49-54. Thus, NLLBPs allow for simple and direct access to local
`
`storage in a fast and efficient manner.
`
`22.
`
`
`
`In the 1997 time frame, NLLBP requests were typically sent to local
`
`storage over parallel buses like SCSI, for example. Such parallel buses could not
`
`carry information very far and did not provide the capability of providing large
`
`distance separations (e.g., in excess of 10 kilometers as described in the patent
`
`under review). Ex. 1001, 2:40-42.
`
`23.
`
` Modern computer systems need networks that connect multiple
`
`computers to multiple remote storage devices over large distances. To solve this
`
`problem, modern networks use a serial network transport medium (e.g., a Fibre
`
`Channel transport medium) which can carry information over much longer
`
`distances than parallel busses.
`
`24.
`
` Before Crossroads’ invention of the ’147 Patent, a network server
`
`(also referred to as a network file server) was the basic way networked computers
`
`achieved remote storage. A network file server connects to multiple computers by
`
`a serial network transport medium and to storage devices using a storage transport
`
`medium, such as a SCSI bus. Figure 1 of the patent under review, reproduced
`
`below, illustrates one example of such a system:
`
`11
`
`
`11 of 98
`
`

`
`
` The network file server “provides a file system structure, access
`
`25.
`
`control and other miscellaneous capabilities that include the network interface.”
`
`Ex. 1001, 1:54-58. The ’147 Patent describes that the workstations use a “network
`
`protocol” to access data through the network server:
`
`
`
`Ex. 1001, 1:56-63. Thus, the workstation would translate its file system protocols
`
`into a “network protocol” which the network server must then translate into low
`
`level requests to the storage device.
`
`26.
`
` The ’147 Patent describes what is translated by the network server to
`
`provide network access by workstations.
`
`12
`
`
`12 of 98
`
`

`
`
`
`Ex. 1001, 3:30-34. A person of ordinary skill in the art at the time of filing would
`
`understand that a workstation with access to server storage must translate its file
`
`system requests into a “network protocol” that includes a high level file system
`
`protocol and it is the high level file system protocol requests from the workstations
`
`that are translated into low level block requests to access data on storage devices.
`
`27.
`
` One example of a protocol that provided remote file access was called
`
`Network File System (NFS). Ex. 2048 at 5. Using Figure 1 of the ’035 Patent as
`
`an example, when a program in a workstation 12 wants to access remote files (files
`
`whose data is stored on remote storage devices), a file system program in the
`
`workstation 12 translates its local file system requests to, for example, NFS
`
`commands to be sent to the network server 14 to request a file action. Id. at 20.
`
`28.
`
` These NFS commands invoke software procedures in the network
`
`server 14 using Remote Procedure Calls (RPCs), which are encapsulated and
`
`transported over network transport medium 16. The network server 14 de-
`
`encapsulates the RPCs, then invokes software procedures associated with the
`
`received NFS commands to perform file access on behalf of the workstation’s
`
`13
`
`
`13 of 98
`
`

`
`users. The network server 14 maintains one or more file systems on storage
`
`devices 20, which it uses to access the requested files. The network server 14
`
`accesses the storage devices 20 using NLLBP.
`
`29.
`
` A person of ordinary skill in the art would thus understand that the
`
`network server system described in Background of the Invention and Figure 1 of
`
`the Patents-In-Suit describes a system in which a workstation 12 translates its file
`
`system requests into high level file system protocols, such as NFS commands, sent
`
`to server 14; and it is the high level file system protocols (e.g., the high level
`
`network file system requests in NFS/RPC form) from workstation 12 that are
`
`translated by network server 14 into low level block protocol requests to access
`
`storage.
`
`30.
`
` Because it takes the computer time to create a high level network
`
`protocol containing a file system request, and it takes the network server time to
`
`construct an NLLBP from that network protocol (which the server needs to do in
`
`order to communicate with the storage device), the network server created a
`
`bottleneck, slowing down access to remote storage. Ex. 1001, 1:61-67, 3:29-38.
`
`B.
`
`31.
`
`The Claims of the ’147 Patent
` The claimed inventions are drawn to a device called a “storage router”
`
`and methods for providing virtual local storage on remote storage devices while
`
`providing access controls according to a map and allowing access using NLLBP.
`
`14
`
`
`14 of 98
`
`

`
`The term “storage router” did not exist in the industry until the Crossroads
`
`invention.
`
`32.
`
`
`
`It is my understanding that, in an inter partes review proceeding,
`
`claim terms are given their broadest reasonable interpretation consistent with the
`
`specification, and that claim language should be read in light of the specification as
`
`it would be interpreted by one of ordinary skill in the art.
`
`33.
`
` Table 1 below includes the claim constructions proposed by
`
`Petitioners in the present matter. Table 2 below includes related claim
`
`constructions proposed by Petitioners and Patent Owner in the co-pending
`
`Litigation. It is my understanding that the Board did not adopt any constructions in
`
`making the decision to institute the present proceeding.
`
`15
`
`
`15 of 98
`
`

`
`Table 1
`
`Petition
`
`Indirectly connected through a storage router to
`enable connections to storage devices at a
`distance greater than allowed by a conventional
`parallel network interconnect (Pet. at 13-14)
`
`To allocate storage on the storage devices to
`devices to facilitate routing and access controls.
`(Pet. at 11)
`
`A protocol in which storage space is accessed at
`the block level, such as the SCSI protocol. (Pet.
`at 12-13)
`
`
`Term
`
`Remote
`
`Map/Mapping
`
`Native Low Level Block
`Protocol (NLLBP)
`
`
`
`
`
`
`
`16
`
`
`16 of 98
`
`

`
`Term
`
`Remote
`
`Map/Mapping
`
`Table 2
`
`Patent Owner
`
`Petitioners
`
`Indirectly connected through
`at least one serial network
`transport medium
`
`To create a path from a device
`on one side of the storage
`router to a device on the other
`side of the router. A “map”
`contains a representation of
`devices on each side of the
`storage router, so that when a
`device on one side of the
`storage router wants to
`communicate with a device on
`the other side of the storage
`router, the storage router can
`connect the devices.
`
`Indirectly connected through a
`storage router to enable
`network connections from
`[devices/Fibre Channel
`initiator devices/workstations]
`to storage devices at a distance
`greater than allowed by a
`conventional parallel
`interconnect.
`
`To create a known path for
`block-addressed data and
`commands from a particular
`device on one side of the
`storage router to a particular
`remote physical storage device
`on the other side of the router.
`A “map” contains a
`representation of the particular
`devices on each side of the
`storage router, so that before a
`particular workstation/device
`on one side of the storage
`router tries to communicate
`with a particular remote
`physical storage device on the
`other side of the storage
`router, the storage router
`already has stored a path from
`the particular
`workstation/device to the
`particular remote physical
`storage device over which the
`storage router will route
`block-addressed requests and
`data between the devices.
`
`17
`
`
`17 of 98
`
`

`
`Access Controls Controls which limit a
`[device/Fibre Channel
`Initiator device/workstation]’s
`access to a specific subset of
`storage devices or sections of
`a single storage device
`according to a map.
`
`Native Low
`Level Block
`Protocol
`(NLLBP)
`
`Allowing
`Access . . .
`Using NLLBP
`
`
`
`A set of rules or standards that
`enable computers to exchange
`information and do not
`involve the overhead of high
`level protocols and file
`systems typically required by
`network servers.
`
`Permit access using the native
`low level, block protocol of
`the virtual local storage
`without involving a translation
`from high level network
`protocols to a native low level
`block protocol request.
`
`
`Controls which limit a
`[device/Fibre Channel initiator
`device/workstation]’s access
`to a specific subset of storage
`devices or sections of a single
`storage device according to a
`map for the [device/Fibre
`Channel initiator
`device/workstation].
`
`A set of rules or standards that
`enable computers to exchange
`information and do not
`involve the overhead of high
`level protocols and file
`systems typically required by
`network servers.
`
`To allow native low level
`block protocol requests to be
`routed from the [devices/Fibre
`Channel initiator
`devices/workstations] to the
`remote storage devices.
`
`C. Mapping Limitations
` Each of the independent claims under review recites a map limitation:
`34.
`
`to maintain a
`[a] supervisor unit operable
`Claim 1:
`configuration . . . that maps between the device and the remote
`storage devices;
`
`a storage router . . . operable to map between the
`Claim 6:
`workstations and the storage devices;
`
`18
`
`
`18 of 98
`
`

`
`Claim 10: maintaining a configuration for remote storage
`devices that maps between Fibre Channel devices and the
`remote storage devices;
`
`according to a map between the device and the
`Claim 14:
`remote storage device;
`
`[an] access control device operable to map
`Claim 21:
`between the at least one device and a storage space on the at
`least one storage device;
`
`Claim 28: mapping between a device connected to a first
`transport medium and a storage device connected to a second
`transport medium; and
`
`to maintain a
`[a] supervisor unit operable
`Claim 34:
`configuration that maps between the host device and at least a
`portion of the storage space on the storage device.
`
`35.
`
`
`
` A person of ordinary skill in the art would understand that the
`
`mapping associates representations of particular hosts on one side of the storage
`
`router with representations of storage on the other side to allocate storage to
`
`specific devices. That is, the map identifies with specificity the particular host that
`
`has access to storage represented in the map.
`
`36.
`
` As described in the specification of the ’147 Patent, in order to
`
`provide access controls, the storage router of the ’147 Patent uses a map that
`
`associates representations of hosts on one side of the storage router with
`
`19
`
`
`19 of 98
`
`

`
`representations of storage on the other side of the storage router, to define what
`
`storage is available to each particular host. See, e.g., Ex. 1001, 4:24-29, 35-38
`
`(describing “storage allocated to each attached workstation” through “mapping
`
`tables or other mapping techniques” so that allocated storage “can only be accessed
`
`by the associated workstation”) (emphasis added); see also id. at 9:11-17 (“The
`
`storage router can use tables to map, for each initiator, what storage access is
`
`available” so that “[i]n this manner, the storage space . . . can be allocated to [each
`
`initiator].”) (emphasis added).
`
`37.
`
` Thus, the map will include representations of the devices (e.g., the
`
`workstations) connected to the first transport medium and representations of the
`
`storage to associate the devices with storage (i.e., “to map, for each initiator, what
`
`storage access is available” for that initiator). Id. at 9:11-14. That is, the “map”
`
`must identify within the map the precise host to which storage has been allocated.
`
`38.
`
` Figure 3 (reproduced below) shows an example of mapping in which
`
`a storage router 56 maps workstations 58 to storage. Storage router 56 uses
`
`“mapping tables or other mapping techniques” (i.e., a map) to associate each of
`
`Workstations A-D with a subset of storage 66, 68, 70 and 72, so that each subset
`
`“is allocated to one of the workstations 58” and “can only be accessed by the
`
`associated workstation 58.” Ex. 1001, 4:24-38 (emphasis added). Similarly,
`
`workstation E can be associated with whole storage device 64. Id. at 4:39-40.
`
`20
`
`
`20 of 98
`
`

`
`
`
`In Figure 3, workstations 58 are interconnected with storage router 56 by the same
`
`interconnect, i.e., “a common [Fibre Channel high speed serial transport].” Ex.
`
`1001, 4:12-17. The storage router must identify the particular workstations on the
`
`first transport medium in order to allocate storage to the particular workstations.
`
`Id. at 9:11-17 (“The storage router can use tables to map, for each initiator, what
`
`storage access is available” so that “[i]n this manner, the storage space . . . can be
`
`allocated to [each initiator].”) (emphasis added). In other words, the map identifies
`
`with specificity the particular host that has access to storage represented in the map
`
`to “allocate(s) storage on storage devices to devices on the first transport medium.”
`
`39.
`
`
`
`In the example of Figure 3, the map is used to allocate partitions to
`
`workstations: “each partition is allocated to one of the workstations 58” and
`
`“appear[s] to the associated workstation 58 as local storage.” Ex. 1001, 4:32-38.
`
`Storage allocated in the map is expressly described as a logical storage definition:
`
`21
`
`
`21 of 98
`
`

`
`[T]he storage space considered by the workstation 58 to
`be its local storage is actually a partition (i.e., logical
`storage definition) of a physically remote storage device
`60, 62 or 64 connected through storage router 56.
`
`Ex. 1001, 4:63-66 (emphasis added).
`
`
`40.
`
` The specification goes on to distinguish the logical storage allocated
`
`in the map from physical storage:
`
`In the latter case, management station 76 can be a
`workstation or other computing device with special rights
`such that storage router 56 allows access to mapping
`tables and shows storage devices 60, 62 and 64 as they
`exist physically rather than as they have been allocated.
`
`Id. at 4:51-55 (emphasis added). One of ordinary skill in the art would understand
`
`that, in the map, the representations of storage allocated to the workstations are
`
`logical storage definitions.
`
`D. The Access Controls Limitations
` Each of the independent claims also recites an “access controls”
`
`41.
`
`limitation
`
`to maintain a
`[a] supervisor unit operable
`Claim 1:
`configuration . . . that implements access controls for storage
`space on the remote storage devices;
`
`22
`
`
`22 of 98
`
`

`
`a storage router . . . operable . . . to implement
`Claim 6:
`access controls for storage space on the storage devices;
`
`Claim 10: maintaining a configuration for remote storage
`devices . . . that implements access controls for storage space
`on the remote storage devices;
`
`[a] supervisor unit operable to control access from
`Claim 14:
`the device connected to the first transport medium to the
`remote storage device connected to the second transport
`medium;
`
`[an] access control device operable to . . . control
`Claim 21:
`access from the at least one device to the at least one storage
`device;
`
`implementing access controls for storage space on
`Claim 28:
`the storage device; and
`
`[a] supervisor unit operable to . . . implement
`Claim 34:
`access controls.
`
`42.
`
` The access controls of the claims of the ’147 Patent refer to device
`
`specific controls that limit a particular device’s access to a specific subset of
`
`storage according to a map. As described in the specification, the storage router
`
`implements access controls according to the map so that the allocated storage can
`
`only be accessed by the host(s) associated with that storage in the map. See, e.g.,
`
`id. at 4:35-37 (“These subsets 66, 68, 70 and 72 can only be accessed by the
`
`23
`
`
`23 of 98
`
`

`
`associated workstation . . . .”) (emphasis added), 4:42-44 (“[E]ach workstation 58
`
`has controlled access to only the specified partition of storage device 62 which
`
`forms virtual local storage for the workstation 58.”) (emphasis added). It can also
`
`be noted that Figure 3 illustrates controlling access both to sections of storage
`
`devices (e.g., subsets 66, 68, 70 and 72 of storage device 62) and to whole storage
`
`devices (e.g., whole storage device 64). Id. at 4:32-40.
`
`43.
`
` More particularly, the ’147 Patent provides access controls by
`
`controlling what virtual local storage each host sees. Id. at 4:60-66 (“Storage
`
`router 56 provides centralized control of what each workstation 58 sees as its local
`
`drive . . . . Consequently, the storage space considered by the workstation 58 to be
`
`its local storage is actually a partition (i.e., logical storage definition) of a
`
`physically remote storage device 60, 62 or 64 connected through storage router
`
`56.”).
`
`44.
`
`
`
`In Figure 3, each workstation 58 on common Fibre Channel
`
`interconnect 52 sees different storage. As illustrated below, for example, because
`
`Workstation A is mapped to storage subset 66, Workstation A is “shown” storage
`
`subset 66 by the storage router.
`
`24
`
`
`24 of 98
`
`

`
`
`
`Workstation A does not see, and therefore cannot access, Workstation B Storage
`
`68, Workstation C Storage 70, Workstation D Storage 72 or Workstation E
`
`Storage 74. In the example of Figure 3, storage router 56 shows available storage
`
`to each host as FCP logical units. Ex. 1001, 5:62-65.
`
`E. Allow Access . . . Using NLLBP
`
`45.
`
`“Allowing Access . . . Using NLLBP” means that the storage router
`
`permits access using the native low level, block protocol of the virtual local storage
`
`without involving a translation from high level network protocols (network
`
`protocols containing file system commands) to a native low level block protocol
`
`request.
`
`46.
`
` As described in the specification, the storage router controls the
`
`virtual local storage that each workstation “sees” as its local drive. Id. at 4:60-66.
`
`Crossroads’ invention presents the remote storage to the computers as “virtual
`
`local storage” so that the storage appears to the host computer to be locally
`
`25
`
`
`25 of 98
`
`

`
`connected to the host computer, even though the storage is actually remotely
`
`located. Id. at 4:24-26, 35-38 (partitions “appear to the associated workstation 58
`
`as local storage accessed using [NLLBPs]”). Because the virtual local storage
`
`appears as local storage, the workstation accesses the virtual local storage using the
`
`NLLBP of the virtual local storage. Id. at 4:36-38. That is, just as the workstation
`
`sends an NLLBP request in order to access its local storage, when using the storage
`
`router of present invention, the workstation similarly sends an NLLBP request to
`
`the storage router. This concept is illustrated below:
`
`
`
`Storage router 56 presents the storage available to Workstation A as virtual local
`
`storage. Accordingly, Workstation A sends requests for access to the virtual local
`
`storage using the NLLBP associated with the virtual local storage.
`
`47.
`
` The ’147 Patent contrasts allowing storage access using NLLBPs with
`
`the manner in which storage access was done using prior art network servers. The
`
`mechanism for actually accessing the storage devices in the prior art of Figure 1
`
`26
`
`
`26 of 98
`
`

`
`(i.e., network file server) and in the invention is the same – namely, by way of an
`
`NLLBP request. As described in the ’147 Patent, however, the storage access
`
`allowed by prior art network servers required the server to translate high level file
`
`system protocol requests received from the host into NLLBPs. Ex. 1001, 1:30-34,
`
`1:56-63. This process is discussed in more detail above in ¶¶ 25-30. In contrast,
`
`host computers send NLLBP to the storage router of the ’147 Patent as discussed
`
`above in paragraph 46, in order to be allowed access to storage. Accordingly, as
`
`described in the ’147 Patent, “[s]torage access involves native low level, block
`
`protocols and does not involve the overhead of high level protocols and file
`
`systems required by network servers.” Ex. 1001 at 5:13-17.
`
`F. Remote
` The ’147 Patent distinguishes accessing local storage from accessing
`48.
`
`storage through “network interconnects” that can be used to provide access to data
`
`on remote devices. Ex. 1001, 1:44-56. At the time of filing, a SCSI bus or similar
`
`parallel bus was typically used to connect to local storage. The

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket