throbber
UNITED STATES PATENT AND TRADEMARK OFFICE
`
`______________________
`
`BEFORE THE PATENT TRIAL AND APPEAL BOARD
`
`______________________
`
`LENOVO (UNITED STATES) INC. and EMC Corporation,
`
`Petitioners
`
`
`
`v.
`
`
`
`INTELLECTUAL VENTURES I, LLC
`
`Patent Owner
`
`______________________
`
`
`U.S. PATENT NO. 8,387,132
`______________________
`
`
`
`DECLARATION OF DR. SCOTT C. KARLIN
`REGARDING U.S. PATENT NO. 8,387,132
`
`
`
`
`
`LENOVO ET AL. EXHIBIT 1002
`Page 1 of 27
`
`

`
`TABLE OF CONTENTS
`
`Page
`
`I.
`
`QUALIFICATIONS ...................................................................................... 1
`
`II. MY ENGAGEMENT BY LENOVO ............................................................ 3
`
`III. MATERIALS CONSIDERED ...................................................................... 4
`
`IV. LEGAL PRINCIPLES ................................................................................... 5
`
`A.
`
`Level of Skill in the Art ....................................................................... 5
`
`B.
`
`C.
`
`Anticipation - 35 U.S.C. § 102 ............................................................ 6
`
`Obviousness - 35 U.S.C. § 103 ........................................................... 7
`
`V.
`
`SUMMARY OF MY OPINIONS ................................................................. 7
`
`VI. THE ’132 PATENT ....................................................................................... 7
`
`VII. THE ’132 PATENT PROSECUTION HISTORY ........................................ 9
`
`VIII. THE MEANING OF CERTAIN CLAIM TERMS ..................................... 10
`
`IX. EACH ELEMENT OF CLAIMS 1 AND 9 IS TAUGHT BY OR
`RENDERED OBVIOUS BY THE PRIOR ART ........................................ 11
`
`A.
`
`B.
`
`C.
`
`Background - Virtual and Multi-disk Network Attached
`Storage Devices ................................................................................. 11
`
`Cramer ............................................................................................... 12
`
`IBM Using iSCSI ............................................................................... 17
`
`D.
`
`Cramer and Banga ............................................................................ 22
`
`E.
`
`IBM Using iSCSI, Administrator’s Guide and Cramer..................... 24
`
`X. AVAILABILITY FOR EXAMINATION .................................................. 25
`
`XI. RIGHT TO SUPPLEMENT ........................................................................ 25
`
`XII. SWORN OATH ........................................................................................... 25
`
`i
`
`
`
`LENOVO ET AL. EXHIBIT 1002
`Page 2 of 27
`
`

`
`
`
`I, Scott C. Karlin, declare as follows:
`
`I.
`
`1.
`
`QUALIFICATIONS
`
`I received a Ph.D. in Computer Science from Princeton University in January 2003, a
`
`M.S. in Computer Science from Loyola Marymount University in May 1994, and a B.S. in
`
`Electrical Engineering from the California Institute of Technology in June 1986.
`
`2.
`
`I am the Senior Manager of Computing Facilities at the Department of Computer
`
`Science for Princeton University. I have held this position since January 2013.
`
`3.
`
`As Senior Manager, I oversee the group that installs, maintains, and upgrades the
`
`computing and networking infrastructure as well as develops and deploys applications for the
`
`department-wide academic, research, and administrative needs of the Princeton University
`
`Department of Computer Science. Included in the department infrastructure is a network file
`
`server with several hundred terabytes of storage. This storage is presented to other
`
`infrastructure hosts on the network using the Network File System (NFS) protocol. I also
`
`represent the department on various standing and ad hoc committees relating to technology
`
`and policy, including the Research Computing Advisory Group (RCAG) and the Data Center
`
`Advisory Group (DCAG).
`
`4.
`
`Before being named Senior Manager, I served as a Manager of Computing Facilities
`
`at the Department of Computer Science for Princeton University from October 2004 until
`
`December 2012. My duties were substantially the same as today.
`
`5.
`
`Before serving as Manager, I was a member of the Princeton University Department
`
`of Computer Science research staff from November 2003 until September 2004. During this
`
`time, I worked on the PlanetLab project. PlanetLab is an open platform for developing,
`
`deploying, and accessing planetary-scale network services. My duties included developing
`
`software for use by researchers using the testbed.
`
`1
`
`LENOVO ET AL. EXHIBIT 1002
`Page 3 of 27
`
`

`
`
`
`6.
`
`From November 2002 until October 2003, I was a Postdoctoral Research Associate in
`
`the Princeton University Department of Computer Science working on the PlanetLab project.
`
`My duties were substantially the same as in the previous paragraph.
`
`7.
`
`Prior to working at Princeton, I was employed by various private companies in the
`
`computer science and electrical engineering space from 1986 to 1996.
`
`8.
`
`My technical interests primarily lie near the interface between the hardware and the
`
`software in computer systems. I am specifically interested in operating systems, networking,
`
`security & privacy (and related policy), embedded systems, Internet-of-Things (IoT), and
`
`home automation.
`
`9.
`
`The focus of my Princeton Ph.D. thesis was on the low-level aspects of Internet
`
`routing and involved the design and implementation of an extensible router based on
`
`commodity PC hardware using intelligent network interface cards (NICs) containing local
`
`packet processing capability (either on general-purpose processors or on more specialized
`
`network processors). These components inspect and transform packet frames and headers to
`
`perform the routing of incoming packets to the proper destination interfaces. My thesis
`
`specifically considered extensible routers comprised of various types of intelligent NICs with
`
`varying capabilities (including different numbers of Ethernet ports per NIC). Collectively, all
`
`the ports across all NICs within a system were managed by a single device driver that
`
`presented separate virtualized network interfaces from the operating system to the routing
`
`software. Similar types of packet inspection, packet routing, and packet processing also
`
`occurs within the systems described by the ’132 patent.
`
`10.
`
`I have authored or co-authored 8 peer-reviewed academic publications in the field of
`
`computer science and engineering. I am a member of the IEEE, ACM, and USENIX
`
`professional societies. I was on the Program Committee for OPENARCH 2002 and
`
`OPENARCH 2003, the Fifth and Sixth IEEE Conference on Open Architectures and
`
`2
`
`LENOVO ET AL. EXHIBIT 1002
`Page 4 of 27
`
`

`
`
`
`Network Programming. As a member of the Program Committee, my primary contribution
`
`was to review papers and then attend meetings to select those that would be included in the
`
`program. Topics for papers accepted to OPENARCH described research in open and
`
`programmable network elements with the overall goal of redefining network software
`
`architectures and moving control and management systems for networks away from the
`
`(then) traditional closed/rigid solutions. Such research would be in the same space of topics
`
`(network packet processing, internal or external routing of packets and messages within a
`
`system, novel routing techniques including multicast) as included in the ’132 patent.
`
`11.
`
`In addition to my technical and management responsibilities, I also teach at Princeton
`
`University in the Department of Computer Science from time-to-time. I have been a
`
`preceptor for the following courses/semesters: COS 217, Introduction to Programming
`
`Systems, Spring 2016 (Lecturer appointment); COS 126, General Computer Science, Spring
`
`2008; COS 217, Introduction to Programming Systems, Fall 1998; COS 126, General
`
`Computer Science, Spring 1997; COS 471, Computer Architecture and Organization, Fall
`
`1996. COS 126 and COS 217, in particular, introduce the foundations of many aspects of
`
`computer science, including algorithms, algorithm design, data structures, theory of
`
`computation; they also teach practical aspects of programming including the Java and C
`
`languages, how these languages are compiled into machine executable instructions, and how
`
`to interact with operating services (including interacting with hardware such as disk storage).
`
`12.
`
`A copy of my curriculum vitae is attached as Exhibit 1003 to this submission.
`
`II. MY ENGAGEMENT BY LENOVO
`
`13.
`
`I have been asked by Lenovo (United States) Inc. (“Lenovo” or “Petitioner”) to serve
`
`as an independent expert in this proceeding and to review claims 1 and 9 of the ’132 patent in
`
`view of the prior art. I understand my inquiry is limited at this point to claims 1 and 9 as
`
`3
`
`LENOVO ET AL. EXHIBIT 1002
`Page 5 of 27
`
`

`
`
`
`those are the only claims presently asserted against Lenovo in a pending federal patent
`
`infringement lawsuit.
`
`14.
`
`I am being compensated by Petitioner at my normal consulting rate for my work on
`
`this matter.
`
`15. My compensation is based on my time spent on this matter.
`
`16. My compensation is not dependent upon the content of my statements set forth in this
`
`Declaration.
`
`17.
`
`I am not employed by Petitioners. I have no financial interest in the Petitioners (other
`
`than what may be in my mutual fund portfolio) or the ’132 patent.
`
`III. MATERIALS CONSIDERED
`
`18.
`
`I have reviewed the specification and claims of U.S. Patent No. 8,387,132 attached as
`
`Ex. 1001 to this submission.
`
`19.
`
`I understand that the ’132 patent claims priority to U.S. Patent Application No.
`
`12/574,622, which claims priority to U.S. Patent Application No. 11/139,206, filed on May
`
`26, 2005, now U.S. Patent No. 7,620,981.
`
`20.
`
`I have reviewed prosecution history for the ’132 patent attached as Ex. 1004 to this
`
`submission. I understand this prosecution history reflects the communications between the
`
`Applicants and the Patent Office regarding the decision to grant the ’132 patent.
`
`21.
`
`I have also reviewed the following documents, which I understand are prior art to the
`
`’132 patent:
`
`a.
`
`b.
`
`c.
`
`d.
`
`e.
`
`U.S. Patent No. 8,387,132 (the “’132 Patent,” Ex. 1001)
`
`U.S. Patent No. 7,707,263 to Cramer et al. (“Cramer,” Ex. 1005)
`
`Rowell Hernandez et al., Using iSCSI Solutions’ Planning and
`Implementation, by IBM Corporation (2002) (“IBM Using iSCSI,” Ex. 1006)
`
`IBM TotalStorage IP Storage 200i Administrator’s Guide, by IBM
`Corporation (2001) (“Administrator’s Guide,” Ex. 1007)
`
`U.S. Patent No. 6,895,429 to Banga et al. (“Banga,” Ex. 1008)
`
`4
`
`LENOVO ET AL. EXHIBIT 1002
`Page 6 of 27
`
`

`
`
`
`f.
`
`g.
`
`h.
`
`i.
`
`j.
`
`Andrew S. Tanenbaum et al., Computer Networks (3d. ed. 1997) (select pages)
`(“Computer Networks” Ex. 1009)
`
`Rodney Van Meter, et al., Derived Virtual Devices: A Secure Distributed File
`System Mechanism, (September 13, 1996), from Proceedings of the Fifth
`NASA Goddard Space Flight Center Conference on Mass Storage Systems
`and Technologies (September 1996) (“Derived Virtual Devices”, Ex 1010)
`
`John L. Hufferd, ISCSI: The Universal Storage Connection (2003)
`(“ISCSI: The Universal Storage Connection”, Ex 1011)
`
`Douglas Downing Ph.D. et al., Dictionary of Computer and Internet Terms,
`(7th ed. 2000) (select pages) (“Dictionary of Computer and Internet Terms”,
`Ex. 1017)
`
`David C. Plummer, Request For Comments (RFC) 826: An Ethernet Address
`Resolution Protocol, published by the Internet Engineering Task Force (IETF)
`(Nov. 1982)
`
`22.
`
`I believe based on my education and work experience that I am qualified to opine
`
`about the state of the art of the technology recited and claimed in the ’132 patent as of its
`
`filing and the other materials listed above.
`
`23.
`
`It is not my intention to offer any conclusions as to the ultimate determinations that I
`
`understand the Patent Trial and Appeal Board may make regarding the ’132 patent. For
`
`example, I am not offering opinions on ultimate issues of validity or claim construction. I am
`
`simply providing my opinions on certain technical aspects of the documents discussed herein
`
`as compared to claims 1 and 9 of the ’132 patent.
`
`IV.
`
`LEGAL PRINCIPLES
`
`A. Level of Skill in the Art
`
`24.
`
`I understand that one of the relevant factors in this proceeding is the level of skill in
`
`the pertinent art.
`
`25.
`
`I understand that the pertinent date for this determination is the date of alleged
`
`invention. For purposes of this declaration, Petitioners asked me to assume that the date of
`
`invention for the ’132 patent is approximately May 26, 2005; the earliest priority date
`
`identified on the face of the ’132 patent.
`
`5
`
`LENOVO ET AL. EXHIBIT 1002
`Page 7 of 27
`
`

`
`
`
`26.
`
`In my opinion, a person of ordinary skill in the art as of May 26, 2005 would have had
`
`a bachelor’s degree in computer science or electrical engineering and 3-5 years of
`
`professional experience in computer network or storage system design, or a master’s or
`
`doctorate degree in computer science or electrical engineering and 1-2 years of professional
`
`experience in computer network or storage system design, or equivalent academic
`
`experience.
`
`27.
`
`I believe I qualified as a person of ordinary skill in the art in 2005 based on my
`
`experiences listed above.
`
`B. Anticipation - 35 U.S.C. § 102
`
`28.
`
`I understand “prior art” refers to an earlier patent or printed publication predating an
`
`invention under 35 U.S.C. § 102.
`
`29.
`
`I understand that a claim is invalid as anticipated by the “prior art” under 35 U.S.C. §
`
`102(a) if “the invention was known or used by others in this country, or patented or described
`
`in a printed publication in this or a foreign country, before the invention thereof by the
`
`applicant for patent.” I have also been informed that a claim is invalid as anticipated under
`
`35 U.S.C. § 102(b) if “the invention was patented or described in a printed publication in this
`
`or a foreign country or in public use or on sale in this country, more than one year prior to the
`
`date of the application for patent in the United States.” Further, I have been informed that a
`
`claim is invalid as anticipated under 35 U.S.C. § 102(e) if “the invention was described in …
`
`an application for patent, published under section 122(b), by another filed in the United States
`
`before the invention by the applicant for patent.”
`
`30.
`
`I understand for a claim to be anticipated, all of the claimed limitations must be
`
`present in a single prior art reference either expressly or inherently. I understand material not
`
`explicitly contained in the single reference is still considered for anticipation purposes if the
`
`material is incorporated by reference.
`
`6
`
`LENOVO ET AL. EXHIBIT 1002
`Page 8 of 27
`
`

`
`
`
`C. Obviousness - 35 U.S.C. § 103
`
`31.
`
`I understand that a claim is invalid as obvious under 35 U.S.C. § 103: “if the
`
`differences between the subject matter sought to be patented and the prior art are such that the
`
`subject matter as a whole would have been obvious at the time the invention was made to a
`
`person having ordinary skill in the art to which [the] subject matter pertains.”
`
`32.
`
`I understand that a claimed invention would have been obvious, and therefore not
`
`patentable, if the subject matter claimed would have been considered obvious to a person of
`
`ordinary skill in the art at the time that the invention was made. I understand that when there
`
`are known elements that perform in known ways and produce predictable results, the
`
`combination of those elements is likely obvious.
`
`33.
`
`Further, I understand that when there is a predictable variation and a person would see
`
`the benefit of making that variation, implementing that predictable variation is likely not
`
`patentable. I have also been informed that obviousness does not require absolute
`
`predictability of success, but that what does matter is whether the prior art gives direction as
`
`to what parameters are critical and which of many possible choices may be successful.
`
`V.
`
`34.
`
`SUMMARY OF MY OPINIONS
`
`It is my opinion that a person of ordinary skill in the art would understand that
`
`Cramer alone, IBM Using iSCSI alone, the combination of Cramer and Banga, or the
`
`combination of IBM Using iSCSI, Administrator’s Guide and Cramer, discusses each
`
`limitation of claims 1 and 9 of the ’132 Patent.
`
`VI.
`
`THE ’132 PATENT
`
`35.
`
`According to the cover of the ’132 patent, the ’132 patent was patented on February
`
`26, 2013. It was filed on October 6, 2009 and is a continuation of another application filed on
`
`May 26, 2005.
`
`7
`
`LENOVO ET AL. EXHIBIT 1002
`Page 9 of 27
`
`

`
`
`
`36.
`
`The ’132 patent is titled “INFORMATION PACKET COMMUNICATION WITH
`
`VIRTUAL OBJECTS.” It describes providing “a network storage system” in which “[u]sers
`
`and applications can access the data store where data is spread over multiple hard disks
`
`located remotely from the user over a network in a manner that appears to be a single drive.”
`
`Ex. 1001, 19:24-28. The ’132 patent used an approach to route packets to virtual storage
`
`devices which aggregates storage capabilities of multiple target storage devices. Id., Abstract.
`
`37.
`
`Specifically, the system assigns different network routable host addresses, for
`
`example IP addresses, to multiple virtual objects. Id., Claim 1. One of the virtual objects is a
`
`logical drive partition representing an aggregation of storage capabilities of multiple storage
`
`devices. Id. These host addresses are associated with a common frame address, for example a
`
`MAC address. Id. When the system receives an incoming packet addressed to a virtual object,
`
`it transforms the packet into a device-level request to access one of the storage devices, and
`
`issues the request to that device. Id.
`
`38.
`
`Figure 5 below shows the logical structure of the ’132 patent. 528A-N are the virtual
`
`objects, and 540A-M are the storage devices. In the context of the ’132 patent, “virtual
`
`device” and “virtual object” are interchangeable.
`
`
`
`8
`
`LENOVO ET AL. EXHIBIT 1002
`Page 10 of 27
`
`

`
`
`
`VII. THE ’132 PATENT PROSECUTION HISTORY
`
`EX. 1001 AT FIG. 5.
`
`39.
`
`40.
`
`I understand that the ’132 patent issued from U.S. Patent Application No. 12/574,622.
`
`During prosecution of this patent application, the Examiner cited a reference U.S.
`
`Patent No. 7,111,303 (“Macchiano”) and rejected the original claims. Ex. 1004 at 541-63.
`
`Thereafter, the applicants amended claims 21 and 30 (which I understand became claims 1
`
`and 9 of the ’132 patent) to include “the first virtual object being a logical drive partition that
`
`represents an aggregation of storage capabilities of a plurality of storage devices,” and argued
`
`Macchiano did not include this feature. Id. at 512-16, 519.
`
`41.
`
`This argument did not persuade the Examiner. Id. at 468-72. The applicants then
`
`amended claims 21 and 30 to include “processing unit” or processing “device.” Id. at 115-19,
`
`450-54. Finally, in a paper titled “PRE-APPEAL BRIEF REVIEW REQUEST
`
`ACCOMPANYING NOTICE OF APPEAL,” the applicants argued “[t]here is nothing to
`
`teach or suggest that these virtual devices are directly addressable by remote devices,” and
`
`the Examiner eventually allowed the claims. Id. at 21-28, 50-51, 58-62.
`
`42.
`
`In the same paper, the applicants also stated:
`
`
`
`Ex. 1004 at 58-62.
`
`43.
`
`In my opinion, in view of prior art not before the examiner, the references do teach
`
`“assigning, by a packet processor …, a first host address to a first virtual object, the first
`
`virtual object being a logical drive partition that represents an aggregation of storage
`
`capabilities of a plurality of storage devices.” For example, Cramer and IBM Using iSCSI
`
`9
`
`LENOVO ET AL. EXHIBIT 1002
`Page 11 of 27
`
`

`
`
`
`both discuss the same structure performing the same steps as claims 1 and 9 of the ’132
`
`patent.
`
`VIII. THE MEANING OF CERTAIN CLAIM TERMS
`
`44.
`
`I have been informed and understand that for purposes of this proceeding, the claim
`
`terms should be given their “broadest reasonable construction in light of the specification”
`
`and “consistent with the interpretation that those skilled in the art would reach.”
`
`45.
`
`I further understand that to the extent there is any ambiguity regarding the broadest
`
`reasonable interpretation of a claim term, the ambiguity should be resolved in favor of the
`
`broader construction absent amendment by the patent owner to narrow the claim term.
`
`46.
`
`I have reviewed the constructions proposed by Petitioners in the Petition for Inter
`
`Partes Review, which are set forth below:
`
`
`
`“packet processor”: any combination of software or firmware that runs on a
`
`processing unit of an electronic device and processes packets.
`
`
`
`“network routable” “host address”: a physical interface independent address that is
`
`capable of directing information to a destination, such as any version of IP address, or any
`
`address that resolves to a network address based on applications or protocol.
`
`
`
`“frame address”: address associated with a physical media interface, such as a MAC
`
`address.
`
`
`
`“virtual object”: a logical construct that presents itself externally as an operational
`
`device.
`
`
`
`“control portion”: portion of a packet containing information used to determine how
`
`the packet should be routed.
`
`47.
`
`I believe Petitioners’ proposals are correct and consistent with the broadest reasonable
`
`interpretation a person of ordinary skill in the art would reach in view of the specification of
`
`the ’132 patent.
`
`10
`
`LENOVO ET AL. EXHIBIT 1002
`Page 12 of 27
`
`

`
`
`
`48.
`
`I understand every other claim term not construed above by Petition should be
`
`considered under its ordinary and customary meaning in light of the specification, as
`
`commonly understood by those of ordinary skill in the art. I have applied these constructions
`
`in my analysis of the prior art.
`
`IX.
`
`49.
`
`EACH ELEMENT OF CLAIMS 1 AND 9 IS TAUGHT BY OR
`RENDERED OBVIOUS BY THE PRIOR ART
`
`As part of my work in this matter, I have been asked to consider whether the Cramer
`
`patent, IBM Using iSCSI, Administrator’s Guide, and/or the Banga patent teaches each
`
`limitation of claims 1 and 9 of the ’132 Patent. For the reasons given below, it is my opinion
`
`that a person of ordinary skill in the art would understand that Cramer alone, IBM Using
`
`iSCSI alone, the combination of Cramer and Banga, or the combination of IBM Using iSCSI,
`
`Administrator’s Guide and Cramer, teaches each limitation of claims 1 and 9 of the ’132
`
`Patent.
`
`A. Background - Virtual and Multi-disk Network Attached Storage Devices
`
`50.
`
`By way of background, virtual storage devices were known for years before May
`
`2005. For example, by at least as early as 1996, the NetStation Project at the Information
`
`Sciences Institute at the University of Southern California had been working with network
`
`attached peripherals and distributed systems. See, e.g., Ex. 1010 Derived Virtual Devices
`
`(1996), at p. 1. These network attached peripherals are devices that communicate with the
`
`external world via a network interface rather than a bus, and could be assembled into
`
`precisely the type of distributed system described by the ’132 patent as a “decentralized
`
`system.” Compare Ex. 1010 at 1 (discussing how a “network attached peripheral” or “NAP”
`
`can be assembled into a “distributed system…brought together as a single system operating
`
`across a network”) with ’132 patent (Ex. 1001) at 2:46-57 (discussing how a decentralized
`
`system can distribute devices over a network, but “appear” as locally connected from the
`
`perspective of other devices). These network attached peripherals could connect with each
`
`11
`
`LENOVO ET AL. EXHIBIT 1002
`Page 13 of 27
`
`

`
`
`
`other over an IP network. Ex. 1010, 2 (“[W]e have chosen to support IP connectivity of these
`
`devices”).
`
`51.
`
`The authors of the NetStation project also taught that network attached peripherals
`
`represented as “virtual objects.” For example, the NetStation authors taught that “derived
`
`virtual devices” or “DVDs” can be used as an “abstraction of a physical device”, Ex. 1010 at
`
`3, and that DVDs can be used as an “enabling technology in file systems”, Ex. 1010 at 6; cf.
`
`’132 patent (2:54-55 (“Decentralization, by its very nature, includes the concept of
`
`virtualization”); 3:23-26 (“To fully realize the benefits and capabilities offered by
`
`decentralization, devices and virtual devices need to pass information to each other in an
`
`organized way, as if they exist on a virtualized bus.”). See e.g., Ex. 1002 at ¶ 50 discussing
`
`Ex. 1010 Derived Virtual Devices (1996) at p. 11.
`
`52.
`
`Likewise, multi-disk network attached storage appliances were also well known for
`
`years before May 2005. For example, John L. Hufferd, writes about multi-disk network
`
`attached storage appliances in his 2003 book, ISCSI: The Universal Storage Connection.
`
`Specifically, Hufferd explains in Chapter 1, “The Background of SCSI” that SCSI (Small
`
`Computer System Interface) is connection technique using a SCSI bus and a SCSI protocol to
`
`connect disk drives and other devices to server systems. See Ex. 1011, ISCSI: The Universal
`
`Storage Connection (2003) at 1. In Chapter 4, Hufferd describes iSCSI (Internet SCSI) as a
`
`transport protocol that carries SCSI commands from host computer systems to targets over an
`
`IP-based network. See Ex. 1011 at 49 and 51. In Chapter 2, “The Value and Position of
`
`iSCSI” Hufferd discusses pooled storage consisting “of simple iSCSI JBODs (just a bunch of
`
`disks) or RAID controllers, all connected to the same network via iSCSI.” See Ex. 1011, at
`
`19. In Chapter 3, Hufferd focuses on “The History of iSCSI” and discusses the 2001 launch
`
`by IBM of its iSCSI native RAID storage controller call the IP TotalStorage 200i. See Ex.
`
`1011 at 46. RAID is an acronym for Redundant Array of Inexpensive/Independent Disks, a
`
`12
`
`LENOVO ET AL. EXHIBIT 1002
`Page 14 of 27
`
`

`
`
`
`well-known technique for treating a group of disks as a single device. See e.g., Ex. 1017,
`
`Douglas Downing Ph.D. et al., Dictionary of Computer and Internet Terms, (7th ed. 2000)
`
`(select pages defining “RAID”).
`
`B. Cramer
`
`53.
`
`The Cramer patent generally describes a network storage system which assigns a
`
`network address to each volume, such that input/output operations can be directed to a
`
`particular volume using the network address. Ex. 1005, Abstract.
`
`54.
`
`Cramer states that a disadvantage of prior storage systems is that when a file server is
`
`taken out of the network, the data managed by the file server becomes unavailable. Id. at 4:9-
`
`25. Cramer’s solution to this problem is to identify storage devices by IP addresses or similar
`
`addresses, thus making storage devices network accessible by client devices. Id. at 4:47-52.
`
`55.
`
`The configuration in Cramer uses “filers” running a “storage operating system” to
`
`manage storage devices. Id. at 6:1-3, 46-52. The storage operating system first assigns
`
`network addresses (e.g., IP addresses) to “IP volumes.” Id. 8:58-64. One “IP volume” can
`
`designate multiple physical disks. Id. at 6:25-27. When the filer receives a data request
`
`message (e.g., a packet) containing a network address, it processes the message in a data path,
`
`and outputs a disk access request to a disk indicated by the network address. Id. at 1:31-31,
`
`8:1-38, 9:67-10:3, Fig. 3.
`
`
`
`packet processor
`
`56.
`
`In my opinion, Cramer discloses a packet processor executing on a processing unit of
`
`an electronic device. I have explained above that a “packet processor” means any
`
`combination of software or firmware that runs on a processing unit of an electronic device
`
`and processes packets. The “storage operating system” in Cramer, in my opinion, is this
`
`software or firmware. See id. at 6:33-52, Fig. 2. The electronic device is processor 222 of, for
`
`example, file server 110 (filer 1). Ex. 1005 at 6:33-52, Fig. 2. As shown in Fig. 3 (shown
`
`13
`
`LENOVO ET AL. EXHIBIT 1002
`Page 15 of 27
`
`

`
`
`
`below), the storage operating system running on processor 222 processes incoming messages
`
`(in the form of packets) by “a series of software layers” forming a data path. Id. at 3:61-64,
`
`8:1-2, Fig. 3.
`
`
`
`
`
`virtual object
`
`57.
`
`In my opinion, Cramer discloses a first virtual object being a logical drive partition
`
`that represents an aggregation of storage capabilities of a plurality of storage devices. As
`
`discussed, a “virtual object” means a logical construct that presents itself externally as an
`
`operational device. The concept of “IP volume” in Cramer is such a logical construct. An IP
`
`volume does not necessarily point to a particular physical disk. Rather, it can aggregate the
`
`storage space of a group of disks, and present a single operational storage device to external
`
`clients. See id. at 8:58-60.
`
`
`
`first and second host addresses
`
`58.
`
`In my opinion, Cramer discloses the packet processor assigning first and second host
`
`addresses to first and second virtual objects, respectively, wherein the first and second host
`
`14
`
`LENOVO ET AL. EXHIBIT 1002
`Page 16 of 27
`
`

`
`
`
`addresses are different network routable addresses. An example of a “network routable” “host
`
`address” is an IP address. In Cramer, the storage operating system assigns IP addresses to IP
`
`volumes, and this is repeated for each IP volume managed by the filer. Id. at 8:58-64, 9:33-
`
`34, Fig. 4.
`
`
`
`common frame address
`
`59.
`
`In my opinion, Cramer discloses the first and second host addresses are both
`
`associated with a common frame address that corresponds to a network interface that
`
`communicatively couples the packet processor to a network. An example of a “frame
`
`address” is a MAC address. In Cramer, the storage operating system maps the IP addresses
`
`to a MAC address of a network interface controller (NIC). Id. at 9:44-49, Fig. 4. An example
`
`of a NIC is network adapter 226 of filer 110 shown in Fig. 2, which connects filer 110 to the
`
`network to allow users to access the IP volumes. As shown by filer 110 of Fig. 2 and Fig. 9
`
`(below), the filer 110 has only one NIC, i.e., a single network adapter 226 in Fig. 2, or NIC
`
`E0 in Fig. 9. Id. at Figs. 2, 9. Therefore, a person of ordinary skill in the art reviewing figures
`
`2 and 9 would understand that in Cramer, the IP addresses assigned to the filer 110 are
`
`associated with a common MAC address, i.e., the MAC address of NIC E0.
`
`15
`
`LENOVO ET AL. EXHIBIT 1002
`Page 17 of 27
`
`

`
`
`
`
`
`
`
`
`
`receiving packet
`
`60.
`
`The NIC, having the single MAC address, operates to communicatively couple filer
`
`110 (and its storage operating system 230) to a network, i.e., LAN 102, so that clients may
`
`access the series of IP volumes using the series of assigned IP addresses remotely over
`
`Internet 109. Ex. 1005 at 7:1-7, Figs. 1, 2. For example, step 412 of FIG. 4, provides: “the
`
`IP address is then advertised over the appropriate NICs. This advertising can be
`
`accomplished through the use of the Address Resolution Protocol (ARP). ARP is further
`
`described in Request For Comments (RFC) 826: An Ethernet Address Resolution Protocol,
`
`published by the Internet Engineering Task Force (IETF) (Nov. 1982), which is incorporated
`
`herein by reference.” Ex. 1005 at 9:55-61.
`
`61.
`
`In my opinion, Cramer discloses receiving, by the packet processor, an information
`
`packet from the network interface, the information packet having a control portion including
`
`the first host address. The filer in Cramer receives messages in the form of packets, e.g.,
`
`“packets addressed to the volume’s IP address.” Id. 3:61-64, 9:67-10:3. As discussed, a
`
`“control portion” means a portion of a packet containing information used to determine how
`
`16
`
`LENOVO ET AL. EXHIBIT 1002
`Page 18 of 27
`
`

`
`
`
`the packet should be routed. It was well known that an IP packet has a control portion and a
`
`person of skill in the art would understand that the IP address was located in the control
`
`portion of the packet. A person of ordinary skill in the art would understand that in filer 110,
`
`network adapter 226 is responsible for receiving packets, because network adapter 226
`
`connects the filer to the network. See id. at Fig. 2. See e.g., Andrew S. Tanenbaum et al.,
`
`Computer Networks, (3d ed. 1997) discussing packets at p. 7.
`
`
`
`transforming packet
`
`62.
`
`In my opinion, Cramer discloses transforming, by the packet processor, the
`
`information packet into a device-level requ

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket