throbber
UNITED STATES PATENT AND TRADEMARK OFFICE
`
`BEFORE THE PATENT TRIAL AND APPEAL BOARD
`
`Qualcomm Inc. and Qualcomm Technologies, Inc.,
`Petitioners,
`
`v.
`
`Apple Inc.,
`Patent Owner.
`
`U.S. PATENT NO. 7,383,453
`Filing Date: August 25, 2005
`Issue Date: June 3, 2008
`
`Title: CONSERVING POWER BY REDUCING VOLTAGE SUPPLIED TO AN
`INSTRUCTION-PROCESSING PORTION OF A PROCESSOR
`
`DECLARATION OF RICHARD BELGARD
`
`Qualcomm, Ex. 1003, Page 1
`
`

`

`Contents
`I.
`Introduction............................................................................................................................. 1
`II. Qualifications.......................................................................................................................... 1
`III. Materials Considered ........................................................................................................... 4
`IV.
`Relevant Legal Standards .................................................................................................... 5
`V. Summary of Opinions ............................................................................................................. 7
`Relevant Technology and ʼ453 Patent ................................................................................. 8
`VI.
`A.
`Dynamic vs. Static Power Consumption.......................................................................... 8
`B.
`Cache, Cache Tags, Cache Coherency & Snooping ........................................................ 9
`C.
`Processors, Microprocessors, Microcontrollers and CPUs ............................................ 13
`VII. Claim Construction ............................................................................................................ 14
`“Core” and “Area” ......................................................................................................... 14
`A.
`“Sufficient to maintain the state information of the instruction-processing circuitry” .. 14
`B.
`VIII.
`Person of Ordinary Skill in the Art ................................................................................ 15
`The ’453 Patent .................................................................................................................. 16
`IX.
`X. Overview of the Prior Art ..................................................................................................... 20
`A.
`Ober (U.S. 6,665,802) .................................................................................................... 20
`B.
`Fung (U.S. 7,134,011).................................................................................................... 25
`C.
`DeSchepper (U.S. 5,721,935)......................................................................................... 28
`Analysis of the ’453 Claims at Issue.................................................................................. 29
`XI.
`XII. Analysis of the Prior Art against the ’453 Claims at Issue ................................................ 32
`A.
`Claims 1 and 2 Are Invalid as Anticipated by Ober ...................................................... 32
`1. Claim 1 ........................................................................................................................... 32
`1p. “An instruction-processing system with minimized static power leakage, the instruction-
`processing system comprising”............................................................................................. 32
`1a. “a core with instruction-processing circuitry” ................................................................ 33
`1b. “an area coupled to the core” .......................................................................................... 34
`1c. “a core voltage provided to the core; and”...................................................................... 34
`1d. “an area voltage provided to the area” ............................................................................ 35
`1e. “wherein in a normal operation mode:” .......................................................................... 37
`1f. “wherein in a first power-saving mode that can be exited upon receipt of an interrupt
`signal:” .................................................................................................................................. 38
`1g. “wherein in a second power-saving mode that can be exited upon receipt of a signal that
`is not an interrupt signal:”..................................................................................................... 39
`2.
`Dependent Claim 2 ..................................................................................................... 40
`
`-ii-
`
`Qualcomm, Ex. 1003, Page 2
`
`

`

`B.
`
`1.
`2.
`
`E.
`
`1.
`3.
`4.
`
`Claims 3 and 4 are Obvious over Ober in View of DeSchepper.................................... 41
`Motivation to Combine Ober with DeSchepper ......................................................... 41
`Dependent Claim 3 ..................................................................................................... 42
`Dependent Claim 4 ..................................................................................................... 43
`Claim 8 and Claim 9 are Anticipated by Ober; Claims 10 and 11 are Obvious Over
`C.
`Ober in view of DeSchepper..................................................................................................... 44
`D.
`Claim Charts................................................................................................................... 46
`Claim Chart for 7,383,453, claims 1 and 2, against Ober .......................................... 46
`Claim Chart for 7,383,453, claims 3 and 4, against Ober in View of DeSchepper.... 63
`Claims 1 and 2 Are Invalid as Anticipated by Fung ʼ011.............................................. 65
`1. Claim 1 ........................................................................................................................... 65
`1p. “An instruction-processing system with minimized static power leakage, the instruction-
`processing system comprising”............................................................................................. 65
`1a. “a core with instruction-processing circuitry” ................................................................ 66
`1b. – “an area coupled to the core” ....................................................................................... 66
`1c – “a core voltage provided to the core; and”.................................................................... 66
`1d – “an area voltage provided to the area” .......................................................................... 67
`1e – “wherein in a normal operation mode:” ........................................................................ 68
`1f. “wherein in a first power-saving mode that can be exited upon receipt of an interrupt
`signal:” .................................................................................................................................. 70
`1g. “wherein in a second power-saving mode that can be exited upon receipt of a signal that
`is not an interrupt signal:”..................................................................................................... 73
`2.
`Dependent Claim 2 ..................................................................................................... 74
`F. Claims 3-4 Are Invalid as Obvious over Fung ʼ011 in view of DeSchepper .................... 75
`Motivation to Combine Fung ʼ011 with DeSchepper ................................................ 75
`1.
`3.
`Dependent Claim 3 ..................................................................................................... 76
`4.
`Dependent Claim 4 ..................................................................................................... 77
`Claim 8 and Claim 9 are Anticipated by Fung; Claims 10 and 11 are Obvious Over
`G.
`Fung in view of DeSchepper..................................................................................................... 78
`H.
`Claim Charts................................................................................................................... 78
`Claim Chart for 7,383,453, claims 1 and 2, against Fung ʼ011.................................. 78
`Claim Chart for 7,383,453, claims 3 and 4, against Fung ʼ011 in View of DeSchepper
`92
`Conclusions .................................................................................................................... 96
`Other Matters.................................................................................................................. 96
`
`1.
`2.
`
`XIII.
`XIV.
`
`-iii-
`
`Qualcomm, Ex. 1003, Page 3
`
`

`

`TABLE OF EXHIBITS1
`
`TITLE
`
`U.S. Patent No. 7,383,453 (’453 Patent), including Certificates of
`Correction and Reexamination Certificate
`
`Corrected Claims of the ʼ453 Patent, including corrections shown
`in blackline format.
`
`EXHIBIT
`NO.
`
`1001
`
`1002
`
`1004
`
`U.S. Patent No. 6,665,802 (Ober)
`
`1005
`
`U.S. Patent No. 7,134,011 (Fung ʼ011)
`
`1006
`
`U.S. Patent No. 5,721,935 (DeSchepper)
`
`1007
`
`ʼ453 Patent Prosecution History
`
`1014
`
`Order Construing Claims, Doc. 404, Qualcomm Inc. v. Apple Inc.,
`No. 3:17-cv-1375 (S.D. Cal. Oct. 11, 2018)
`
`1016
`
`U.S. Patent No. 6,079,025 (“’Fung ʼ025”)
`
`1017
`
`Alan J. Smith, Cache Memories, 14 COMPUTING SURVEYS 473-530
`(1982)
`
`1 Counsel has provided me with numbers corresponding to the exhibits in the
`petition requesting inter partes review of the ‘453 Patent. For consistency, I’ve
`used those exhibit numbers.
`
`1
`
`Qualcomm, Ex. 1003, Page 4
`
`

`

`1018
`
`Hennessy, John L. & Patterson, David A., COMPUTER
`ARCHITECTURE – A QUANTITATIVE APPROACH at 408-425, 467-474
`(1990).
`
`2
`
`Qualcomm, Ex. 1003, Page 5
`
`

`

`I, Richard A. Belgard, declare and state as follows:
`Introduction
`
`I.
`
`I am making this declaration at the request of Qualcomm Incorporated
`1.
`and Qualcomm Technologies, Inc. (collectively, “Qualcomm”) in connection with
`Qualcomm’s petitions for inter partes review of U.S. Patent No. 7,383,453 (the
`“ʼ453 Patent”) to inventor Lynn Youngs, and assigned to Apple, Inc. I have
`previously worked with Qualcomm, and may continue to do so, in its district court
`case related to the ʼ453 Patent, Case Number 3:17-cv-01375-DMS-MDD.
`2.
`I make this declaration based upon my personal knowledge. I am
`
`over the age of twenty-one and competent to make this declaration. In this
`declaration, I provide an overview of the ʼ453 Patent, the level of ordinary skill in
`the art of the ʼ453 Patent, an overview of certain prior art that discloses the
`elements of the claims of the ʼ453 Patent, and my opinion as to invalidity of the
`ʼ453 Patent. I have been asked by Qualcomm to consider claims 1-4 and 8-11 and
`provide my opinions as to whether these claims (i) were disclosed in certain prior
`art references that predate the earliest effective filing date of the ʼ453 Patent,
`and/or (ii) would have been obvious to a person of ordinary skill in the art at the
`
`time of the invention in view of certain prior art references that predate the
`effective filing date of the ʼ453 Patent.
`3.
`I am being compensated for my time at the usual rate of $650 per
`
`hour. My compensation does not depend in any way on the substance of my
`
`testimony or the outcome of this inter partes review.
`II. Qualifications
`
`4.
`
`I have been active in the computer industry for over 40 years. During
`
`this period, I have designed and/or managed the development of computer
`
`hardware, software and firmware at Burroughs Corporation (now UNISYS), Data
`
`1
`
`Qualcomm, Ex. 1003, Page 6
`
`

`

`General (now part of EMC), Tandem Computers (now part of Hewlett Packard)
`
`and Rational Software (now part of IBM).
`
`5.
`
`I received a Bachelor of Arts degree in Computer Science (1973) and
`
`a Master of Science degree in Electrical Engineering and Computer Science (1974)
`
`from the State University of New York at Buffalo. I attended the University of
`
`Utah in pursuit of a Ph.D. in Computer Science, and completed all necessary
`
`course work, but I chose to join Data General before completing my dissertation.
`
`6.
`
`In 1975, I was appointed a Lecturer in Computer Science at the
`
`University of California at Santa Barbara, where I taught a graduate sequence in
`
`computer architecture. During this same time period, I also worked on the design
`
`of a minicomputer at Burroughs Corporation.
`
`7.
`
`I am now an independent consultant in the computer industry. I
`
`consult primarily with professional and prospective investors, large and small
`
`computer companies, and law firms. As an independent consultant, I have
`
`contributed to the design of at least four microprocessors and additional
`
`microprocessor chipset designs.
`
`8.
`
`I have experience in the field of hardware, software, firmware,
`
`computers, and microprocessors. In addition to many others, I have consulted or
`
`currently consult to: 3Com, Altitude Capital, AT&T, Atmel, Broadcom, Cadence,
`
`Chiaro, Chips and Technologies, Cisco, Dell, EMachines, U.S. Federal Trade
`
`Commission, Gateway, Intergraph, NCR Corporation, NEC Corporation, Micron
`Technology, MicroUnity Systems Engineering, Packard Bell – NEC, Palm
`Computing, Research in Motion, Transmeta, VIA Technologies and Xerox
`
`Corporation. My current resume is attached to this declaration as Appendix 1.
`
`Attached to this declaration as Appendix 2 is a list of trial and deposition testimony
`
`that I have given over the past 7 years to the best of my recollection. Attached as
`
`2
`
`Qualcomm, Ex. 1003, Page 7
`
`

`

`Appendix 3 is a list of my publications, to the best of my recollection, for the last
`
`10 years.
`
`I have been a Fellow of the Institute of Electrical and Electronic
`9.
`Engineers (IEEE) since 2003. My nomination was “[f]or leadership in the
`computer engineering community and contributions to computer micro
`architectures.” I have also been a member of the Association for Computing
`Machinery (ACM) since 1974.
`
`10.
`
`I am a named inventor on 18 U.S. Patents for computer design work I
`
`did at Data General Corporation. I also have been granted 6 patents in the
`
`microprocessor area for work that I have done as an independent consultant.
`
`11.
`
`I have been an invited speaker at seminars on the topic of reverse
`
`engineering in computer-related technology and clean room design, including how
`
`to perform reverse engineering, and how to prevent it. I have also published
`
`articles in both engineering journals and legal publications. I have been a
`
`contributing editor of The Microprocessor Report, an award-winning computer
`
`industry publication, for over 30 years. The Office of Technology Assessment, an
`
`agency chartered by the U.S. Congress, invited me to provide ideas and comments
`
`on issues of intellectual property protection of software.
`
`12.
`
`I have been qualified in court cases and have given testimony as an
`
`expert in computer systems (hardware and software) in the U.S., Hong Kong,
`
`Canada, the U.K., and Germany.
`I have been a “Rule 706” court-appointed expert witness in a
`computer-technology patent case. I have also been a court-appointed expert in the
`
`13.
`
`Superior Court of California, San Mateo County in a computer software trade-
`
`secret case.
`
`3
`
`Qualcomm, Ex. 1003, Page 8
`
`

`

`III. Materials Considered
`
`14.
`
`In forming my opinions, I have relied on my personal knowledge and
`
`experience, including the experience described above.
`15. My opinions are also based on my review of the ʼ453 Patent (Ex.
`1001), its prosecution history (Ex. 1007), and the following patents and printed
`
`publications:
` U.S. Patent No. 6,665,802 to Robert E. Ober (“Ober”), which was
`filed on February 29, 2000 and issued on December 16, 2003 (Ex.
`
`1004);
` U.S. Patent No. 5,721,935 to Todd J. DeSchepper et al.
`(“DeSchepper”), which was filed on February 18, 1997 and issued on
`February 24, 1998 (Ex. 1006);
` U.S. Patent No. 7,134,011 to Henry T. Fung (“Fung ʼ011”), which
`was filed on May 18, 2001 and issued on November 7, 2006 (Ex.
`
`1005); and
` U.S. Patent No. 6,079,025 to Henry T. Fung (“Fung ʼ025”), which
`was filed on July 23, 1998 and issued on June 20, 2000 (Ex. 1016).
`
`16. Additionally, I have identified documents within this declaration that
`
`confirm my understanding of the state of the art as of April 2002. Those
`
`publications include the following:
` Cache Memories, by Alan J. Smith, Computing Surveys, Vol. 14, No.
`3, September 1982, pp. 473-530 (Ex. 1017); and
` Computer Architecture – A Quantitative Approach, by John L.
`Hennessy and David A. Patterson, © 1990 Morgan Kaufman
`
`Publishers, pp. 408-425 and 467-474 (Ex. 1018).
`
`4
`
`Qualcomm, Ex. 1003, Page 9
`
`

`

`I have also considered certain documents from the related litigation
`17.
`concerning the ʼ453 Patent, including the Order Construing Claims, Dkt. 404,
`Qualcomm Inc. v. Apple Inc., No. 3:17-cv-1375 (Oct. 11, 2018). Ex. 1014.
`IV. Relevant Legal Standards
`
`18.
`
`I have requested the attorneys from Jones Day, who represent
`
`Qualcomm, to provide me with guidance as to the applicable patent law in this
`
`matter, and they have done so. The paragraphs below express my understanding as
`
`gleaned from their guidance of how to apply current principles related to
`
`patentability to my analysis.
`
`I have been informed that I should assume that April 29, 2002 is the
`19.
`effective filing date of the ʼ453 Patent.
`20.
`I understand that in an inter partes review, the prior art that may be
`
`considered is limited to patents and printed publications.
`
`I understand that, for the purposes of this inter partes review, the
`21.
`terms and phrases of the claims of the ʼ453 Patent should be given their broadest
`reasonable interpretation in light of the claims and the specification of the patent in
`
`which they appear. For the purposes of my analysis, I have interpreted the terms
`and phrases of the claims of the ʼ453 Patent in accordance with their their broadest
`reasonable interpretation.
`
`22.
`
`I understand that a claim is invalid, and unpatentable, as anticipated
`
`under 35 U.S.C. § 102 if the claimed invention was described in a patent or printed
`publication before the invention by the patentee (i.e., is “prior art”). In order to
`anticipate the claimed invention, a single prior art reference must disclose each and
`
`every element of the claim, explicitly or inherently, and it must disclose those
`
`elements arranged as in the claim. I understand that a claim element is disclosed
`
`inherently when the prior art reference must necessarily include or disclose the
`
`unstated element.
`
`5
`
`Qualcomm, Ex. 1003, Page 10
`
`

`

`23.
`
`It is my understanding that a claim is unpatentable under 35 U.S.C.
`
`§ 103 if the claimed subject matter as a whole would have been obvious to a
`
`person of ordinary skill in the art at the time of invention. I also understand that an
`
`obviousness analysis takes into account the scope and content of the prior art, the
`
`differences between the claimed subject matter and the prior art, and the level of
`
`ordinary skill in the art at the time of the invention.
`
`24.
`
`In determining the scope and content of the prior art, it is my
`
`understanding that a reference is considered appropriate prior art for obviousness if
`it falls within the field of the inventor’s endeavor. In addition, a reference is prior
`art if it is reasonably pertinent to the particular problem with which the inventor
`
`was involved. A reference is reasonably pertinent if it logically would have
`presented itself to an inventor’s attention in considering his problem. If a reference
`relates to the same problem as the claimed invention, that supports use of the
`
`reference as prior art in an obviousness analysis.
`
`25.
`
`To assess the differences between prior art and the claimed subject
`
`matter, it is my understanding that 35 U.S.C. § 103 requires the claimed invention
`to be considered as a whole. This “as a whole” assessment requires showing that
`one of ordinary skill in the art at the time of invention, confronted by the same
`
`problems as the inventor and with no knowledge of the claimed invention, would
`
`have selected the elements from the prior art and combined them in the claimed
`
`manner.
`
`26.
`
`It is my further understanding that the law recognizes several
`
`rationales for combining references or modifying a reference to show obviousness
`
`of claimed subject matter. Some of these rationales include: combining prior art
`
`elements according to known methods to yield predictable results; simple
`
`substitution of one known element for another to obtain predictable results; a
`
`predictable use of prior art elements according to their established functions;
`
`6
`
`Qualcomm, Ex. 1003, Page 11
`
`

`

`applying a known technique to a known device (method or product) ready for
`
`improvement to yield predictable results; choosing from a finite number of
`
`identified, predictable solutions, with a reasonable expectation of success; and
`
`some teaching, suggestion, or motivation in the prior art that would have led a
`
`person of ordinary skill in the art to modify the prior art reference or to combine
`
`prior art reference teachings to arrive at the claimed invention. I further
`
`understand that choosing between a small number of predictable solutions requires
`
`only ordinary skill in the art and common sense, rather than innovation.
`
`27.
`
`I understand that when a patent incorporates another patent by
`
`reference, it is to be treated as if the referenced patent is included within the
`
`referencing patent just as if it were attached to the referencing specification.
`
`28.
`
`I have been informed that any relevant differences between the prior
`
`art and the claimed invention are to be analyzed from the view of a person of
`
`ordinary skill in the art at the time of the invention. As such, in forming my
`
`opinions below, I have placed myself in the position of a person of ordinary skill in
`
`the art are as of the time of the invention: April 29, 2002. Considering the state of
`
`the art and the knowledge of a person of ordinary skill in the art at the time of
`
`invention prevents improper reconstruction of the claimed invention with the
`
`benefit of hindsight.
`V.
`Summary of Opinions
`
`In my opinion, claims 1, 2, 8 and 9 of the ’453 Patent are anticipated
`29.
`by U.S. Patent No. 6,665,802 (“Ober”). (Ex. 1004.)
`In my opinion, claims 3, 4, 10, and 11 of the ’453 Patent are obvious
`30.
`over Ober in view of U.S. Patent No. 5,721,935 (“DeSchepper”). (Ex. 1006.)
`In my opinion, claims 1, 2, 8 and 9 of the ’453 Patent are anticipated
`31.
`by U.S. Patent No. 7,134,011 (“Fung ʼ011”). (Ex. 1005.)
`
`7
`
`Qualcomm, Ex. 1003, Page 12
`
`

`

`In my opinion, claims 3, 4, 10, and 11 of the ʼ453 Patent are obvious
`32.
`over Fung ʼ011 in view of DeSchepper.
`VI. Relevant Technology and ʼ453 Patent
`
`A.
`
`33.
`
`Dynamic vs. Static Power Consumption
`
`The hardware circuitry of typical computer processors and processing
`
`systems operates by a combination of millions, hundreds of millions, or even
`
`billions of transistors, each operating as an electronic switch. A combination of
`
`these transistors, with additional electrical circuits and additional software, controls
`
`the switches to perform binary (i.e., off, represented by 0, or on, represented by 1)
`
`operations. Together, these binary operations are combined to perform logic
`
`functions and circuits, called logic gates. These logic gates are then combined to
`
`form arithmetic units, registers, memories, instruction processing pipelines and
`
`input/output, among many others. Virtually all circuitry in a computer processor
`
`involved and continues to utilize these switches.
`In the early 1960’s, a switch technology that utilized two
`complementary technology transistors to form a switch. The technology was
`
`34.
`
`called CMOS technology, standing for Complementary Metal Oxide
`
`Semiconductor. CMOS was a great improvement in lowering power over earlier
`
`switch technology. Power is the arithmetic product of current and voltage.
`
`35. CMOS, in theory, only required current to flow when the switches
`
`were changing state, i.e., from on-to-off or from off-to-on. The earlier switch
`
`technology (using technologies called NMOS and PMOS) consumed power all the
`time – whether the switches were changing state or not. Because of the
`tremendous savings in electrical power, CMOS technology is still used today in
`
`almost every processor and processing system.
`
`8
`
`Qualcomm, Ex. 1003, Page 13
`
`

`

`36. When CMOS switches change state, from off-to-on (zero to one), or
`
`vice versa, they consume electric power because current momentarily flows
`
`through the transistors. This current causes power dissipation and this power is
`
`known as dynamic power.
`
`37. However, due to the CMOS arrangement of two complementary-
`
`technology transistors in each switch, when the switches are not changing state,
`
`theoretically no current flows, and the switches consume (theoretically) no power.
`
`However, these transistors actually do consume some power, although extremely
`
`small compared to dynamic power, due to physics and the physical implementation
`
`of the transistors themselves. The power that is dissipated when the transistors
`
`(and circuits) of CMOS switches are not switching is called static power.
`
`38. At any point in time in a processor many, and sometimes most,
`
`transistors are not switching. Therefore, reducing static power becomes important,
`
`especially as the number of transistors in the processors increases dramatically
`
`over generations of processors. Furthermore, as the scaling of transistor and circuit
`
`size has gotten smaller and smaller, static power dissipation becomes an important
`
`factor, especially in portable, battery-operated devices (such as laptops and cell
`
`phones). Static power consumption continues to be a problem today.
`B.
`Cache, Cache Tags, Cache Coherency & Snooping
`
`39.
`
`A cache, or more accurately, cache memory, is a small, fast memory
`
`structure located close to the core of a processor that is used to hold the most-
`
`recently accessed data, typically for subsequent use. Caches have been a
`cornerstone of computer processors since the 1960s.2 When the logic in a core
`
`2 For an early treatise on caches, see “Cache Memories” by Alan J. Smith,
`Computing Surveys, Vol. 14, No. 3, September 1982, pp. 473-530. Ex. 1017.
`Alternatively, see: Computer Architecture – A Quantitative Approach, by John L.
`
`9
`
`Qualcomm, Ex. 1003, Page 14
`
`

`

`requests data from memory, it consults the cache to see if that data has already
`
`been encached. If it has, then the cache delivers the data quickly to the core. If it
`has not, a so-called “cache-miss” occurs, and the data has to be retrieved from the
`next level of memory further from the core.
`
`40. Caches copy (or move) data from larger, slower memory locations
`into a smaller, faster memory that is called “closer to the processor” because
`caches, and therefore cached data, are more easily accessible to the processing
`
`elements that need it than the next further-away level of memory. The situation is
`similar to the relationship between a computer’s main memory and its hard disk
`drive – the hard disk can hold more information than main memory, but it is slower
`and “further away” from the processing elements that need the information than
`the main memory.
`
`41.
`
`There are many types and organizations of caches. However, because
`
`cache memories are inherently smaller than the memories whose data they
`
`encache, and the encached data is not generally linear, but scattered, there needs to
`
`be a way to address data in the cache, and, as well, determine if the requested data
`
`is in the cache at all. This checking and locating is done through an auxiliary
`structure common to, and inherent in, every cache, called “cache tags.”
`42. Cache memories, due to their nature of being smaller than the next
`
`level of memory that they encache, cannot hold data from all memory addresses.
`
`So, when a block of memory is encached in a cache, a location in the cache
`
`memory must be chosen to hold it. That position, called the block or line in the
`
`cache, is typically located by using at least some of the lower portion of the full
`
`Hennessy and David A. Patterson, © 1990 Morgan Kaufman Publishers, pp. 408-
`425 and 467-474. Ex. 1018.
`
`10
`
`Qualcomm, Ex. 1003, Page 15
`
`

`

`memory address. So, for example, data with a full memory location of 12345600
`could be cached in the cache at block address 456.
`43. However, different data with a different full memory location of, for
`
`example, 78945600 would also be cached in the cache at block address 456. The
`way to determine whether the cached data corresponds to the first data (i.e., with
`
`an address of 12345600), or the second data (i.e., with an address of 78945600), or
`
`some other data with yet a different address is via a cache tag comparison.
`
`44. Cache tags are ancillary memory inherent to all caches. Cache tags
`
`contain the remainder of the address of the memory location contained at a line or
`
`block in the cache, given that the index of the address determines its location in the
`
`cache, and is the remainder of the salient portion of the memory address. In the
`
`examples above, the cache tag for the cache location 456 would contain 123 if the
`
`first data was encached there, and would contain 789 if the second data was
`
`encached there. It could also be the case that the tag could contain something
`
`different from each if the cache were encaching different data than either. Further,
`
`the location in the cache could also not have any valid data, and caches also have
`
`an additional single bit, a valid bit, associated with the block location in the cache.
`
`45.
`
`It is important to note that there are various organizations of cache
`
`memories, where, for instance, multiple addresses with the identical index portion
`
`(in the examples above, 456) could be encached simultaneously, in different so-
`called “sets” of the cache. In order determine whether these caches encache
`specific memory locations, the cache tags (and valid bits) of each set must be
`
`compared to the tag memory address portion. Regardless of specific cache
`
`organization, every cache inherently has cache tags.
`
`46.
`
`In some processor organizations, caches hold copies of data from the
`
`main memory. When the cache is filled with data, the data from memory is copied
`
`into the cache. When the data is subsequently changed by the processor core, it is
`
`11
`
`Qualcomm, Ex. 1003, Page 16
`
`

`

`written immediately to the cache, and, simultaneously, but more slowly, written
`
`back to the memory. These types of caches are called write-through caches,
`because the data is “written through” the cache to the memory.
`47. Other processor organizations prefer to use what are called a “write-
`back” scheme for caching. In a write-back cache organization, data is copied into
`the cache when the cache is filled with data, just as in the write-through scheme.
`
`However, when the data is changed by the processor core, the data is only changed
`in the cache, and not written “through” into the memory. If and when necessary,
`such as when the locations in the cache are needed for caching different data, the
`
`data block from the cache is written back to the memory all at once. Hence the
`name “write-back” cache. In such a scheme, it is obvious that at certain points in
`time, data in the cache will be the correct data, but the data in the memory
`
`corresponding to the locations encached will be stale, and contain inconsistent and
`
`incorrect data.
`
`48. Cache coherency is the situation which ensures that the changes in the
`
`values of cached data are propagated throughout the system so that it is correct
`
`when it is used. It is particularly important in systems that have multiple
`
`processors, each with its own cache[s], but sharing a single common memory.
`
`49.
`
`Suppose that some processor has a cached copy of memory location
`
`12345600, and suppose that a different agent, either a different processor sharing
`
`the same memory, or an input-output device, changes the memory. Somehow, the
`
`initial processor (with the cached version) must be notified that the copy of the
`
`memory it has is incorrect, and stale. Similarly, if the different agent attempts to
`
`read a location of memory that is encached by a different processor, the agent must
`
`somehow be notified that it cannot read the data from memory because it is stale,
`and the current version of the data is in the other processor’s cache. One method
`
`12
`
`Qualcomm, Ex. 1003, Page 17
`
`

`

`of guaranteeing that all agents in a system that supports caching will maintain
`
`coherency is via a method called cache snooping.
`
`In the method of cache snooping, when an agent writes to the shared
`50.
`memory, the memory address that is being written is “snooped” among all the
`other sharers of the memory. The protocol provides a query, essentially stating, “if
`you have this address cached, invalidate

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket