throbber
Date Filed: October 22, 2015
`Filed on behalf of: Patent Owner FARSTONE TECH., INC.
`By:
`Tonia A. Sayour
`tsayour@cooperdunham.com
`Ivan Kavrukov
`ikavrukov@cooperdunham.com
`Cooper & Dunham LLP
`30 Rockefeller Plaza
`New York, NY 10112
`(212)278-0400
`
`
`UNITED STATES PATENT AND TRADEMARK OFFICE
`____________
`BEFORE THE PATENT TRIAL AND APPEAL BOARD
`____________
`APPLE, INC.
`Petitioner,
`v.
`FARSTONE TECH., INC.
`Patent Owner.
`____________
`Case IPR2015-00599
`U.S. Patent 7,120,835
`____________
`DECLARATION OF MATTHEW D. GREEN, PH.D IN SUPPORT OF
`FARSTONE TECH., INC.’S RESPONSE PURSUANT TO 37 C.F.R. §42.120
`
`
`

`

`I, Matthew D. Green, declare as follows:
`
`I.
`
`INTRODUCTION
`
`IPR2015-00599
`U.S. Patent No. 7,120,835
`
`1.
`
`I have been retained as an expert by counsel for Patent Owner Farstone
`
`Tech., Inc.’s (“Farstone” or “Patent Owner”) to provide my opinion on certain issues
`
`concerning U.S. Patent No. 7,120,835 (“the ‘835 Patent”) in connection with the
`
`above-captioned inter partes review. Specifically, I have been asked to provide my
`
`opinions regarding the patentability of claims 1-7 and 9-13 of the ‘835 Patent (“the
`
`Challenged Claims”) in view of U.S. Patent No. 6,785,786 to Gold (“Gold”).
`
`2.
`
`This report is based upon information known to me as of the date of
`
`this report. I expect I will continue my review and analysis in view of any additional
`
`materials and information I become aware of after the date of this report. I also
`
`expect to review further reports submitted by Petitioner Apple, Inc. (“Apple” or
`
`“Petitioner”) and its expert(s). Accordingly, I reserve the right to amend and/or
`
`supplement this report in view of any additional materials and information, including
`
`any further reports submitted by Petitioner’s expert(s), and to respond to any
`
`arguments or opinions raised by Petitioner regarding the subject matter of this report.
`
`3. My compensation as an expert is in no way dependent upon the results
`
`of any investigations I undertake, the substance of any opinion I express, or the
`
`ultimate outcome of this case. Thomson Reuters bills Patent Owner for my time by
`
`the hour, plus reimbursement for travel and other out-of-pocket expenses incurred
`
`1
`
`

`

`during my work on this matter. Thomson-Reuters and I are each compensated
`
`IPR2015-00599
`U.S. Patent No. 7,120,835
`
`regardless of the facts I know or discover and/or the conclusions or opinions I reach.
`
`I have no personal or financial stake or interest in the outcome of this matter.
`
`II. BACKGROUND AND QUALIFICATIONS
`
`4.
`
`Attached as Exhibit A to this report is my up-to-date curriculum vitae,
`
`which includes a complete list of my publications and past testimony as an expert.
`
`The following paragraphs briefly summarize my relevant expertise.
`
`5.
`
`I am an Assistant Professor of Computer Science at Johns Hopkins
`
`University in Baltimore, MD. My professional responsibilities in this position
`
`include: advising graduate students, teaching, conducting research, and preparing
`
`papers. In my role as a faculty member and researcher, I gained expertise in several
`
`fields including distributed storage systems and backup technology. In my daily
`
`work in the laboratory, I work with backup systems to handle data management and
`
`retention. I have also worked with backup technology and file storage technology
`
`in my research. In one research project, I developed a distributed data backup system
`
`capable of storing information in a peer-to-peer network of computers, such that
`
`even deliberate attempts to destroy the data would be resisted. Additionally, I
`
`designed an encrypted file storage system for backing up large quantities of data in
`
`a secure manner. I have also taught several courses at Johns Hopkins University,
`
`2
`
`

`

`including courses that address file discovery, backup, and techniques for maintaining
`
`IPR2015-00599
`U.S. Patent No. 7,120,835
`
`information in distributed file stores.
`
`6.
`
`I hold a Ph. D. in Computer Science from Johns Hopkins University, a
`
`Master of Science degree in Computer Science from Johns Hopkins University and
`
`a Bachelor of Arts in Computer Science from Oberlin College. I have authored a
`
`number of research papers in top Computer Science journals and conferences,
`
`including journals and conferences of the Institute of Electrical and Electronics
`
`Engineers (IEEE) and the Association for Computing Machinery (ACM).
`
`7.
`
`A complete list of my research publications, conference papers, patents,
`
`and grant support is included in my curriculum vitae. Several of the publications
`
`and conference papers listed are related to the technology underlying file storage and
`
`backup technology.
`
`8.
`
`Prior to joining the faculty at Johns Hopkins, I worked for a number of
`
`years as a software developer and technology consultant. Through this work, I
`
`gained expertise in several fields, including computer backup technology, and
`
`disaster recovery technology.
`
`9.
`
`From 1999-2003 I held the position of Senior Technical Staff Member
`
`at AT&T Laboratories in Florham Park, NJ, where my responsibilities included
`
`developing software for audiovisual content distribution systems, desktop and
`
`mobile devices, secure text messaging systems for mobile devices, AT&T’s
`
`3
`
`

`

`Interactive Voice Response (IVR) system, researching technology transfer for audio
`
`IPR2015-00599
`U.S. Patent No. 7,120,835
`
`coding, and secure content delivery. Development of these projects included
`
`computer backup technology, and disaster recovery technology. Specifically, in
`
`developing the content distribution system, which transferred data to geographically
`
`distant sites, I designed software to perform computer backup and disaster recovery.
`
`The system implemented processes for replicating, copying, and distributing files
`
`across networks. I also managed the backup of files and software on servers and
`
`computers using various backup software and operating system copy capabilities.
`
`10. From 2005-2011, I served as Principal Analyst and CTO of
`
`Independent Security Evaluators, a custom security evaluation and design
`
`consultancy. In this position, I also provided expertise in backup technologies, such
`
`as the storage of information in database technology, distributing and maintaining e-
`
`books in devices, and securing stored data files.
`
`11.
`
`In addition to the experience above, I have more than twenty years of
`
`software development experience, programming in languages including C/C++,
`
`Java, Pascal, PL/1, Python and various machine assembly languages.
`
`
`
`
`
`4
`
`

`

`III. LEVEL OF ORDINARY SKILL IN THE ART
`
`IPR2015-00599
`U.S. Patent No. 7,120,835
`
`12. Based on my experience, it is my opinion that a person of ordinary skill
`
`in the art at the time the ‘835 Patent was invented would have been a person having
`
`an undergraduate degree in computer science or the equivalent and approximately
`
`two years of industry experience in software development (or the equivalent).
`
`13. At the time of the priority date of the ‘835 Patent, I was a person of
`
`ordinary skill in the art.
`
`IV. APPLICABLE LEGAL STANDARDS
`
`14. Although I am not an attorney, I have been advised of certain legal
`
`principles relating to patentability upon which I relied in forming the opinions set
`
`forth in this report.
`
`15.
`
`I understand that in an inter partes review, claims are given their
`
`broadest reasonable interpretation in view of the specification and how it would be
`
`understood by a person of ordinary skill in the art.
`
`16.
`
`I understand that the Patent Trial and Appeal Board (“the Board”) has
`
`construed the terms “selecting means” and “status.” I understand the Board has
`
`construed “selecting means” to mean “a general purpose computer operation that
`
`does not require description of corresponding structure (such as an algorithm) in the
`
`specification,” and “status” to mean “state or condition.”
`
`
`
`
`
`5
`
`

`

`
`A. Obviousness
`
`IPR2015-00599
`U.S. Patent No. 7,120,835
`
`17.
`
`I understand that the question of obviousness involves a determination
`
`of whether in light of the differences between the patented invention and the prior
`
`art, a person having ordinary skill in the art would have found the invention obvious
`
`at the time of the invention. I also understand that obviousness is determined based
`
`on four underlying factual inquiries: (1) the scope and content of the prior art, (2)
`
`the differences between the prior art and the claims at issue, (3) the level of ordinary
`
`skill in the relevant art, and (4) secondary considerations of non-obviousness.
`
`V. OVERVIEW OF THE ‘835 PATENT
`
`18. The ‘835 Patent is directed to the area of computer backup and
`
`recovery. It teaches an invention that includes at least one recovery unit to hold
`
`backup data from a processing system. The patent also teaches a displaying system
`
`which is used to display the status of said backed up data within the recovery unit.
`
`19. The ‘835 Patent addresses difficulties and shortcomings in backup and
`
`recovery systems in existence at the time the ‘835 Patent was filed. A noteworthy
`
`advantage of the ‘835 Patent over the prior art is the ability to display the backed up
`
`data, including contents of backed up data without performing a recovery of backup
`
`data. (‘835 Patent at 2:17-21, 4:6-21, 4:22-30, 5:37-66, 6:61-67, and 8:40-44). The
`
`ability to view the backed up data, including contents substantially exceeds a mere
`
`listing of backed up files. Indeed, the user not only views the structure of this data,
`
`6
`
`

`

`but may also “view the contents thereof” and/or access it directly, e.g., by “open[ing]
`
`IPR2015-00599
`U.S. Patent No. 7,120,835
`
`executable files, pictures or documents.” (Id. at 5:55-62).
`
`20. Additionally,
`
`the
`
`‘835 Patent
`
`teaches backing up hardware
`
`configuration as well as data files. (Id. at 2:45-49 and 6:31-37). This additional data
`
`is information that is not stored in a file, and represents the configuration of hardware
`
`devices. This configuration information is stored in a recovery unit, representing a
`
`specific recovery point. (Id. at 6:31-33). When multiple recovery units are used,
`
`different recovery units may reflect different configurations of the system hardware.
`
`(Id. at 2:45-48, 4:46-49, and 6:23-43). The prosecution history distinguishes this
`
`information and clarifies that this information does not merely consist of files stored
`
`in a first storage device to be backed up. (Exhibit 2002 at p.37).
`
`VI. OVERVIEW OF GOLD
`
`21. Gold describes a differential backup system capable of backing up and
`
`restoring files to a backup utility. Unlike the ‘835 Patent, the information backed up
`
`by Gold is limited to files. (Gold at 1:5-8, 1:39-51, 6:15-21, 8:44-45, 12:31-35, and
`
`Fig. 3, 5, and 6). Specifically, Gold describes a backup agent that includes, among
`
`other modules, a Block Differencing Module (BDM) and a File Differencing Module
`
`(FDM) that record portions of files to a backup system. (Id. at 4:32-39). Gold
`
`records files in portions, or chunks, that are subsequently restored by reconstructing
`
`7
`
`

`

`the partial file chunks from many different backup versions to restore original files
`
`IPR2015-00599
`U.S. Patent No. 7,120,835
`
`on the computing system. (Id. at 6:65-72, 6:15-22, 7:65-8:42, and Fig. 4).
`
`22. All of the modules described in Gold relate to backing up files. For
`
`example, the Active File Manager (AFM) “monitors which files are to be opened by
`
`the backup agent 215a, for the purpose of backing up.” (Id. at 5:27-29). The Backup
`
`Storage Module (BSM) requires that the “backup data comprises the stream of file
`
`data to be backed up.” (Id. at 11:28-29). The Merge Control Module (MCM) also
`
`describes its operations as file-specific, namely, because it “compares the directory
`
`tree of files of the baseline full backup with the directory tree files of the delta
`
`backups.” (Id. at 12:30-33). In describing the File Differencing Module (FDM),
`
`Gold states that it “selects the files to be backed up by determining which files have
`
`changed or been added since the last backup” by “reading the current directory tree
`
`of the local file system 322 and checking each file’s modified time/date against the
`
`entries in a cached Directory Tree File (DTF) generated from the last backup.” (Id.
`
`at 6:15-22). Gold also discloses a Disaster Recovery Module (DRM) that “recovers
`
`requested files from the baseline full backup for the client and any deltas.” (Id. at
`
`13:64-66).
`
`23. Although Gold states that the File Differencing Module (FDM)
`
`identifies “any modifications to the system information used to rebuild the system
`
`8
`
`

`

`in disaster recovery, Gold’s “disaster recovery module” does not describe how this
`
`IPR2015-00599
`U.S. Patent No. 7,120,835
`
`“system information” is used in disaster recovery.
`
`24. Gold also features a limited viewing functionality that allows users to
`
`view the directory tree of a backed up system. (Id. at 8:65-9:4, 12:19-22, 13:55-58).
`
`However, unlike the ‘835 Patent, Gold does not describe any mechanism by which
`
`the user may view the contents of the files prior to restoration. The files stored by
`
`Gold are placed into Backup Directory Files (BDF) and metadata about the files are
`
`stored in a Directory Tree File (DTF), which are responsible only for storing file
`
`data from the backed up system. (Id. at 6:18-60).
`
`VII. GOLD DOES NOT RENDER CLAIM 1-7 AND 9-13 OF THE ‘835
`PATENT OBVIOUS
`
`25.
`
`I disagree with Petitioner’s contention that Gold renders the Challenged
`
`Claims of the ‘835 Patent obvious. It is my opinion that Gold has numerous
`
`shortcomings and fails to teach or suggest several features recited in the Challenged
`
`Claims of the ‘835 Patent. Namely, Gold fails to teach or suggest: (1) backing up
`
`hardware configuration in a “recovery unit”; (2) displaying backed up data; and (3)
`
`providing an outcome of a recovery operation beforehand.
`
`A. Gold does not describe backing up hardware configuration
`
`26.
`
`I understand that claims 3 and 11 of the ‘835 Patent recite a recovery
`
`unit having data that includes “configuration corresponding to said at least one
`
`9
`
`

`

`hardware resource.” Within the context of the ‘835 Patent, one of ordinary skill in
`
`IPR2015-00599
`U.S. Patent No. 7,120,835
`
`the art would understand “configuration corresponding to said at least one hardware
`
`resource” to be configuration information that is not stored in a file. The
`
`specification of the ‘835 Patent explains that “data contained in the processing
`
`system corresponding to the recovery unit includes configuration corresponding to
`
`the hardware resource and the backup data held in the recovery unit respectively.”
`
`(‘835 Patent at 5:43-47). Plainly then, as described in the ‘835 Patent, hardware
`
`resource configuration information is different from backup data, i.e., data stored in
`
`files, and thus, must be non-file information.
`
`27. The prosecution history is also instructive to one of ordinary skill in the
`
`art. Specifically, the file history notes that “data contained in the processing system,
`
`which includes configuration of hardware resources as well as backup data, is
`
`contained within each recovery unit and can thereby be used to restore their status at
`
`the time of creation of that recovery unit” (Exhibit 2002 at p.37) (emphasis in
`
`original). The applicant contrasts this mechanism to that of an earlier patent, U.S.
`
`Patent 6,611,850 to Shen (“Shen”), which “merely allows the user to select files
`
`stored in a first storage device to be backed up.” (Exhibit 2002 at p.37).
`
`Accordingly, one of ordinary skill in the art would understand “backup data” to be
`
`files, and “configuration corresponding to the hardware resource” to be non-file data.
`
`10
`
`

`
`28.
`
`I disagree with Petitioner’s contention that Gold’s description of
`
`IPR2015-00599
`U.S. Patent No. 7,120,835
`

`
`“system information” can be viewed as the hardware configuration recited in claims
`
`3 and 11 of the ‘835 Patent. (Petition at pp. 22 and 25). It is my opinion that this
`
`argument fails for several reasons, which I will describe below.
`
`29. First, Petitioner identifies the “DTF and BDF” as the recovery unit of
`
`Gold. Yet, Gold does not at any point describe storing this “system information” to
`
`the DTF and BDF. Indeed, based on the description of the DTF and BDF in the Gold
`
`specification, a skilled artisan would recognize that these two elements store only
`
`file information, and therefore would not store non-file information such as hardware
`
`configuration. Specifically, the DTF (“Directory Tree File”) is described as storing
`
`file and directory hierarchy metadata, such as file tree layout, filenames, and creation
`
`and modification times (Gold at 6:18-26), while the BDF (“Backup Directory File”)
`
`explicitly stores differences in changed files. (Gold at 8:12-32). The inputs used to
`
`construct the DTF and BDF come from the File Differencing Module (FDM) and
`
`Block Differencing Module (BDM), which in turn receive their backup data inputs
`
`from the filesystem (Gold at Figure 3), or by intercepting file write operations within
`
`the Operating System (Id. at 7:10-16) as depicted in Figure 3 of the Gold patent:
`
`11
`
`

`

`
`IPR2015-00599
`U.S. Patent No. 7,120,835
`
`
`
`30. Second, Gold never describes storing its “system information.” Gold
`
`only describes that the FDM “identifies” modifications to the “system information
`
`used to rebuild the system in disaster recovery.” (Gold at 6:58-63). Furthermore,
`
`Petitioner does not provide any additional support for the notion that Gold stores
`
`such identified system information in the recovery unit. Such information might be
`
`printed out, or recorded in a separate location so that the user might, at a later point,
`
`manually reconfigure the system prior to initiating recovery.
`
`31. Third, Gold does not describe the process by which this information is
`
`applied to the recovery system by the Disaster Recovery Module. Since this
`
`information is not used by the Disaster Recovery Module as described by Gold, there
`
`12
`
`

`

`is no reason to believe that the system information identified by the FDM would be
`
`IPR2015-00599
`U.S. Patent No. 7,120,835
`
`stored as part of the DTF and BDF as petitioner contends.
`
`32. The concept of storing system information to restore a computing
`
`system to normal operation is not disclosed by Gold to one of ordinary skill in the
`
`art. Significantly, as noted by the patent examiner in connection with the ‘835
`
`Patent, other prior art (the Shen patent) also failed to incorporate such a mechanism.
`
`As Gold explains, an appropriate operating system must be installed on the system
`
`“prior” to performing a disaster recovery operation. (Gold at 13:66-14:57). As a
`
`result, one of ordinary skill in the art would understand that the user manually installs
`
`and configures such “system information” for the operating system on the recovery
`
`machine prior to disaster recovery. There is no reason to understand Gold to teach
`
`or disclose that the “system information” is stored in the claimed “recovery unit.”
`
`33. Accordingly, for the reasons set forth above, it is my opinion that Gold
`
`does not teach or suggest “wherein said data contained in said processing system
`
`corresponding
`
`to said at
`
`least one recovery unit
`
`includes configuration
`
`corresponding to said at least one hardware resource,” as recited in claims 3 and 11
`
`of the ‘835 Patent.
`
`
`
`
`
`13
`
`

`
`B. Gold does not describe displaying backed up data
`
`IPR2015-00599
`U.S. Patent No. 7,120,835
`

`
`34.
`
`I understand claims 1 and 9 require displaying backed up data. It is my
`
`opinion that Gold does not describe displaying backed up data because it does not
`
`describe displaying the contents of files.
`
`35. This understanding is reflected in the specification of the ‘835 Patent,
`
`which describes the ability to allow users to access and view contents of files prior
`
`to performing a recovery operation. (‘835 Patent at 5:57-61). This is consistent with
`
`displaying backed up files of the computer system, since, as described in the ‘835
`
`Patent, the user has the ability to actually view and observe backed up data in situ,
`
`i.e., to view the contents of backed up files of the computer system at a given
`
`recovery point, without recovering them. The specification describes an
`
`embodiment of this display operation explicitly, noting that: “[t]he users can
`
`conveniently extract directory or files inside the recovery points. The users can
`
`rename or remove any of them, view contents thereof, or perform recovery operation,
`
`simultaneously and immediately.” (Id. at 5:53-61) (emphasis added).
`
`36. The specification also explains that “the drawbacks faced by the prior
`
`arts can be solved completely” by allowing the “files contained in the recovery
`
`points” to “be easily opened, viewed, copied or the like.” (‘835 Patent at 4:27-30).
`
`This overcomes a limitation in the prior art noted by the inventors, namely that in
`
`the prior art, recovery points must be loaded and executed before they may be
`
`14
`
`

`

`previewed, and system resources are wasted consequently. In order to solve the
`
`IPR2015-00599
`U.S. Patent No. 7,120,835
`
`problems of the prior art, displaying the backed up data therefore includes a display
`
`of the contents thereof.
`
`37.
`
`In view of the teachings of the ‘835 Patent, it is my opinion that one of
`
`ordinary skill in the art would understand displaying of “backed up data” to include
`
`displaying the contents of backed up data files.
`
`38. By contrast, Gold does not describe anything beyond the displaying and
`
`viewing of a directory tree of files, which can be viewed in a graphical user interface
`
`such as Windows Explorer. I understand Petitioner to be relying on this functionality
`
`of Gold of viewing a directory tree of files as teaching displaying of “backed up
`
`data.” As described above, one of ordinary skill in the art would understand that the
`
`description in Gold referenced by Petitioner is merely describing the ability to view
`
`files and folders in directories as generally depicted in the screenshot below (which
`
`depicts a modern file viewer, not the viewer available at the time of the Gold patent)
`
`and does not teach displaying of backed up data as understood by one of ordinary
`
`skill in the art, in view of the specification of the ‘835 Patent. Gold’s functionality
`
`of displaying files and file folders is not comparable to displaying backed up data,
`
`i.e., displaying contents of the files as understood by one of ordinary skill in the art.
`
`15
`
`

`

`
`
`
`IPR2015-00599
`U.S. Patent No. 7,120,835
`
`
`
`39. Petitioner does not propose or identify any alternate teaching of Gold
`
`that can be compared to the displaying of backed up data, i.e., the contents of files.
`
`40. Accordingly, for the reasons set forth above, it is my opinion that Gold
`
`does not teach or suggest displaying backed up data as recited in claims 1 and 9 of
`
`the ‘835 Patent.
`
`C. Gold does not describe providing a user with an outcome of a
`recovery operation beforehand
`
`I understand claim 9 requires “providing a user with an outcome of
`
`41.
`
`recovery operation beforehand.” It is my opinion that Gold does not describe
`
`providing an outcome of a recovery operation beforehand.
`
`16
`
`

`
`42. One of ordinary skill in the art would understand that this limitation of
`
`IPR2015-00599
`U.S. Patent No. 7,120,835
`

`
`claim 9 allows users to avoid restoring a computer system to a corrupted recovery
`
`point and allow users to access and view contents of files, such as enabling users to
`
`even run executable files or open pictures, all without performing a restore operation.
`
`(‘835 Patent at 5:61-62, 8:40-44). As noted above, the specification describes a
`
`process wherein “the users can conveniently extract directory or files inside the
`
`recovery points. The users can rename or remove any of them, view contents
`
`thereof, or perform recovery operation, simultaneously and immediately.” (Id. at
`
`5:53-61) (emphasis added). A person of ordinary skill in the art would understand
`
`based on the specification that a user may view the actual contents of the backed up
`
`files in order to determine whether they contain a version of a file that a user is
`
`interested in restoring, or are corrupted prior to – or even as an alternative to —
`
`initiating a recovery operation. Thus, a user might evaluate the contents of a file to
`
`determine whether files are damaged, or infected with a virus, prior to overwriting
`
`the current state of a computer. This allows a user to rapidly identify non-corrupted
`
`recovery points, without the overhead and risk of a full recovery.
`
`43.
`
`I disagree with Petitioner’s view that “Gold discloses providing a user
`
`with an outcome of a recovery operation beforehand by allowing the user to view
`
`the files that will be restored.” As one of ordinary skill in the art would understand,
`
`the description in Gold referenced by Petitioner is merely describing the ability to
`
`17
`
`

`

`view the names and locations of files and folders which can be restored, in a
`
`IPR2015-00599
`U.S. Patent No. 7,120,835
`
`graphical user interface such as Windows Explorer, as generally depicted in the
`
`screenshot above. Gold’s functionality of displaying files and file folders is not
`
`comparable to providing an outcome of a restore operation beforehand. Gold only
`
`shows the presence of certain files and folders, and that alone does not provide the
`
`benefit of viewing the file contents before doing a restore or remove the risk
`
`associated with performing a recovery operation of a corrupted file. Moreover, Gold
`
`acknowledges the possibility that a backup could be corrupted, and thus allow the
`
`user to restore from an earlier backup point, however, Gold does not describe any
`
`mechanism by which the user could detect such corruption prior to completing the
`
`restore operation. (Gold at 14:6-11). Indeed, at no point does Gold teach any
`
`solution that would enable a user to see the outcome of a restore operation before
`
`actually performing such restore. (Gold at 14:7-11). The Gold system merely
`
`provides access to multiple restore points to allow a user to restore the system to an
`
`older system state if the “latest state of the system were corrupted.” (Gold at 14:7-
`
`11).
`
`44. Also, the Gold system does not allow a user to view the contents of a
`
`file prior to performing a restore operation because Gold describes backing up file
`
`data in “chunks” in BDFs. (Gold at 7:55-8:35). Further, Gold only describes piecing
`
`these chunks together during a restore operation. (Id. at 8:17-33) Thus, one of
`
`18
`
`

`

`ordinary skill in the art would understand that the architecture of the Gold system
`
`IPR2015-00599
`U.S. Patent No. 7,120,835
`
`does not allow for viewing the contents of files prior to a restore operation.
`
`45. Accordingly, for the reasons set forth above, it is my opinion that Gold
`
`does not teach or suggest “providing a user with an outcome of recovery operation
`
`beforehand,” as recited in claim 9 of the ‘835 Patent.
`
` hereby declare that all statements made herein of my knowledge are true and
`
` I
`
`that all statements made on information and belief are believed to be true.
`
`
`Dated: October 22, 2015
`
`
`
`
`
`
`
`
`
`
`
`
`
` _______________________
`
`Matthew D. Green
`
`19
`
`

`
`IPR2015-00599
`U.S. Patent No. 7,120,835
`

`
`
`
`EXHIBIT A
`
`
`
`

`
`Dr. Matthew Green
`
`Summary
`
`
`
`Assistant Professor of computer science and author of numerous peer-reviewed conference papers and journal
`articles. Recognized internationally as an expert in the fields of cryptography and computer security. Expertise
`and experience includes virtual machines, computer backup, disaster recovery, and distributed storage.
`Experienced as a testifying expert witness and litigation consultant includes court cases involving issues ranging
`from patent infringement and validity to mobile devices and operating system software including theft of
`copyrighted source code to computer security, interception of encrypted signals, virtual machines, and backup
`technology.
`
`Johns Hopkins University, Assistant Professor, July 2015 – present; Assistant Research Professor, Sep 2010 – June
`2015; Instructor, Spring 2009
`
`Work Experience
`
`Grant. PI. Google ATAP. Secure cryptographic co-processor. Amount: $108,000.
`
`Grant. Co-PI. Mozilla. Analysis of Cryptographic Protocols. Amount: $68,000, .
`
`Grant. Co-PI. Mozilla. Scientific Analysis of the TLS protocol. Amount: $74,000, .
`
`Grant. Co-PI, National Science Foundation award CNS-1010928, “Self Protecting Electronic Medical Records”.
`Amount: $1,733,881.
`
`Grant. Investigator, Office of Naval Research, $680,000. Automating the development of cryptographic
`protocols.
`
`Grant. Co-PI, DARPA PROgramming Computation on EncryptEd Data (PROCEED). Amount: $344,000.
`
`Grant. Senior Personnel, Department of Health and Human Services Strategic Healthcare Information
`Technology Advanced Research Projects on Security (SHARPS), Research Focus Area: Security of Health
`Information Technology. Amount: $1,600,399.
`
`Instructor for Practical Cryptographic Systems (Spring 2009, 2010, 2011, 2012, 2013, 2014), which examines the
`issues surrounding the design and evaluation of industrial cryptographic products, and the ways that
`these systems fail in practice
`
`Cryptography Engineering, Owner, Jan 2012-present
`
`Scientific consulting work, largely related to data security and encryption
`
`Cryptography Engineering Current Client List
`• Akamai
`• CipherCloud Inc.
`
`
`
`

`
`
`
`
`
`
`
`
`
`• Content Guard v. Samsung
`• Dunbar
`• Microstrategy Inc.
`• PNC Bank
`• Stach & Liu
`• Knobbe Martens
`• Venable LLP
`• Blackberry
`• US Federal Reserve Bank of New York
`• Xsette
`
`Barr Group, Consulting Chief Scientist, Feb 2012-present
`
`Technical consultant to embedded systems developers and attorneys
`
`Barr Group Client List
`• Acacia Research Group
`• Advanced Auctions v. Ebay
`• Appistry
`• Brainscope
`• CCE Consolidated Cases
`• Edward Selmani and Nevila Celaj
`• Evolutionary Intelligence
`• Ford
`• Hagens Berman Sobol Shapiro LLP
`• Knology!
`• Mederi
`• Rembrandt IP Management
`• Smartphone LLC
`• Symantec
`
`Zeutro LLC, Founder, July 2010 – present
`
`Functional encryption technology development
`
`Harbor Edge Group, Partner, Jan 2010 – Jan 2012
`
`Expert witness and litigation support.
`
`Harbor Edge Group Client List
`• Aristocrat
`• Bell ExpressVu
`• McAfee
`
`Independent Security Evaluators (ISE), CTO, Apr 2005 – Sep 2011
`
`White hat hacking and independent evaluation of cryptography-based digital security systems
`
`Partial ISE Client List
`
`Dr. Matthew Green
`
`Page 2 of 8
`
`

`
`
`
`
`
`
`
`• Adobe Systems!
`• Barnes & Noble
`• Bell ExpressVu
`• Brother Industries
`• Dunbar
`• MediData Solutions!
`• Motorola
`• Qualcomm!
`• Riverbed Technologies
`• Samsung
`• SecurityFirst Corporation
`• Symbol Technologies
`• Walt Disney Publishing
`• Symbol Technologies
`
`AT&T Labs, Senior Technical Staff Member, Jun 1999 – Jun 2003; Contractor, Summer 1998 – May 1999
`
`Advanced research in telecommunications, IP-based telephony, distributed storage, and virtual machines
`including development of software for desktop and mobile devices, a secure text messaging system for
`mobile devices, and AT&T’s Interactive Voice Response (IVR) system, and researching technology
`transfer for audio coding, secure content delivery, and content distribution network
`
`
`
`Advisory Board Experience
`
`Open Crypto Audit Project, Co-Founder and Board of Directors, October 2013-present
`
`CipherCloud, Technical Advisory Board, June 2015-present
`
`Linux Foundation Core Infrastructure Initiative, Technical Advisory Board, June 2014-present
`
`Mozilla Cybersecurity Delphi, Technical Advisory Board, June 2014-present
`
`Expert Witness Engagements
`
`Multiple current engagements involving patent litigation and related to Android, iOS, WiFi hotspots, and
`other mobile devices/technologies. A sample of public engagements includes those below:
`
`Testimony at Trial
`
`Videotron, et.al. v. Bell ExpressVu (security of satellite TV), Quebec Superior Court, 13-14 Dec 2011
`
`Testimony at Deposition
`
`Keith Dunbar v. Google, Inc. (class action), U.S. District Court for the Eastern District of Texas. Case
`#5:10CV00194
`
`Keith Dunbar v. Google, Inc. (class action), U.S. District Court for the No

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket