throbber
EXHIBIT D-2
`Clark, “Live Migration of Virtual Machines” (Clark)
`Microsoft contends that the asserted claims of the ’209 Patent are invalid as anticipated or obvious by Clark et al., “Live Migration of
`Virtual Machines” (“Clark”) prior art reference under various subsections of 35 U.S.C. § 102 in view of other prior art references
`under 35 U.S.C. § 103 as set forth in Microsoft’s invalidity contentions.
`
`As Clark was published on May 3, 2005, Microsoft contends that it is prior art to the ’209 Patent under at least pre-AIA 35 U.S.C. §
`102(b).
`
`Patent No. 8,381,209
`Claim 1
`1[Pre] A computer
`implemented method of
`controlling network
`security of a virtual
`machine,
`
`1[a] the method
`comprising enforcing
`network security and
`routing at a hypervisor
`layer via dynamic
`updating of routing
`controls initiated by a
`migration of said virtual
`
`Clark
`
`To the extent the preamble is limiting, Clark discloses a computer implemented method of controlling
`network security of a virtual machine. Specifically, Clark discloses controlling network security during
`live migration of virtual machines. For example, Clark states:
`
`“We designed and implemented our pre-copying migration engine to integrate with the Xen virtual
`machine monitor. Xen securely divides the resources of the host machine amongst a set of resource-
`isolated virtual machines each running a dedicated OS instance. In addition, there is one special
`management virtual machine used for the administration and control of the machine.” Clark at 279.
`
`“Managed migration is performed by migration daemons running in the management VMs of the
`source and destination hosts. These are responsible for creating a new VM on the destination machine,
`and coordinating transfer of live system state over the network.” Clark at 280.
`
`To the extent that it is argued that Clark does not disclose this limitation, it would have been at least
`obvious to combine it with any other reference disclosing this limitation as explained in Microsoft’s
`Preliminary Invalidity Contention Cover Pleading.
`Clark discloses enforcing network security and routing at a hypervisor layer via dynamic updating of
`routing controls initiated by a migration of said virtual machine from a first device to a second device.
`Specifically, Clark teaches migration of a virtual machine from a first device to a second device; the
`virtual machine migration causes the routing controls to update continuously with each migration that
`occurs. For example, Clark states:
`
`“To address these requirements we observed that in a cluster environment, the network interfaces of
`the source and destination machines typically exist on a single switched LAN. Our solution for
`
`1
`
`IPR2021-00832
`
`Daedalus EX2008
`Page 1 of 8
`
`

`

`Patent No. 8,381,209
`Claim 1
`machine from a first
`device to a second device.
`
`EXHIBIT D-2
`Clark, “Live Migration of Virtual Machines” (Clark)
`Clark
`
`managing migration with respect to network in this environment is to generate an unsolicited ARP
`reply from the migrated host, advertising that the IP has moved to a new location. This will reconfigure
`peers to send packets to the new physical address, and while a very small number of in-flight packets
`may be lost, the migrated domain will be able to continue using open connections with almost no
`observable interference.” Clark at 276.
`
`“Some routers are configured not to accept broadcast ARP replies (in order to prevent IP spoofing), so
`an unsolicited ARP may not work in all scenarios. If the operating system is aware of the migration, it
`can opt to send directed replies only to interfaces listed in its own ARP cache, to remove the need for a
`broadcast. Alternatively, on a switched network, the migrating OS can keep its original Ethernet MAC
`address, relying on the network switch to detect its move to a new port.” Clark at 276.
`
`“We designed and implemented our pre-copying migration engine to integrate with the Xen virtual
`machine monitor. Xen securely divides the resources of the host machine amongst a set of resource-
`isolated virtual machines each running a dedicated OS instance. In addition, there is one special
`management virtual machine used for the administration and control of the machine.” Clark at 279.
`
`To the extent that it is argued that Clark does not disclose this limitation, it would have been at least
`obvious to combine it with any other reference disclosing this limitation as explained in Microsoft’s
`Preliminary Invalidity Contention Cover Pleading.
`
`Patent No. 8,381,209
`Claim 2
`2[a] The method
`according to claim 1,
`further comprising:
`routing traffic for the
`virtual machine to the
`second device at the
`hypervisor layer; and
`
`Clark
`
`Clark discloses routing traffic for the virtual machine to the second device at the hypervisor layer.
`Specifically, Clark discloses a hypervisor that migrates a virtual machine to a new physical host; once
`the migration is complete, other interfaces are notified of the migration, and peers are reconfigured to
`send packets to the new physical address. For example, Clark states:
`
`“By carrying out the majority of migration while OSes continue to run, we achieve impressive
`performance with minimal service downtimes; we demonstrate the migration of entire OS instances on
`
`2
`
`
`
`
`
`IPR2021-00832
`
`Daedalus EX2008
`Page 2 of 8
`
`

`

`EXHIBIT D-2
`Clark, “Live Migration of Virtual Machines” (Clark)
`Clark
`
`a commodity cluster, recording service downtimes as low as 60ms. We show that that our performance
`is sufficient to make live migration a practical tool even for servers running interactive loads.” Clark
`at 273.
`
`“Secondly, migrating at the level of an entire virtual machine means that in-memory state can be
`transferred in a consistent and (as will be shown) efficient fashion. This applies to kernel-internal state
`(e.g. the TCP control block for a currently active connection) as well as application-level state, even
`when this is shared between multiple cooperating processes.” Clark at 273.
`
`“To address these requirements we observed that in a cluster environment, the network interfaces of
`the source and destination machines typically exist on a single switched LAN. Our solution for
`managing migration with respect to network in this environment is to generate an unsolicited ARP
`reply from the migrated host, advertising that the IP has moved to a new location. This will reconfigure
`peers to send packets to the new physical address, and while a very small number of in-flight packets
`may be lost, the migrated domain will be able to continue using open connections with almost no
`observable interference.” Clark at 276.
`
`“We designed and implemented our pre-copying migration engine to integrate with the Xen virtual
`machine monitor. Xen securely divides the resources of the host machine amongst a set of resource-
`isolated virtual machines each running a dedicated OS instance. In addition, there is one special
`management virtual machine used for the administration and control of the machine.” Clark at 279.
`
`To the extent that it is argued that Clark does not disclose this limitation, it would have been at least
`obvious to combine it with any other reference disclosing this limitation as explained in Microsoft’s
`Preliminary Invalidity Contention Cover Pleading.
`To the extent that it is argued that Clark does not disclose this limitation, it would have been at least
`obvious to combine it with any other reference disclosing this limitation as explained in Microsoft’s
`Preliminary Invalidity Contention Cover Pleading.
`
`
`3
`
`Patent No. 8,381,209
`Claim 2
`
`2[b] setting firewalls to
`permit a network traffic
`for the virtual machine to
`go to the second device at
`the hypervisor layer.
`
`
`
`
`
`IPR2021-00832
`
`Daedalus EX2008
`Page 3 of 8
`
`

`

`EXHIBIT D-2
`Clark, “Live Migration of Virtual Machines” (Clark)
`Clark
`
`Clark discloses copying network security and routing for said virtual machine to said hypervisor layer.
`Specifically, Clark discloses a virtual machine that migrates from one host to another, copying
`migration tables and/or routing tables. For example, Clark states:
`
`“The pre-copying scheme that we implemented for self migration is conceptually very similar to that
`for managed migration. At the start of each pre-copying round every page mapping in every virtual
`address space is write-protected. The OS maintains a dirty bitmap tracking dirtied physical pages,
`setting the appropriate bits as write faults occur. To discriminate migration faults from other possible
`causes (for example, copy-on-write faults, or access-permission faults) we reserve a spare bit in each
`PTE to indicate that it is write-protected only for dirty-logging purposes.” Clark at 280.
`
`To log pages that are dirtied, Xen inserts shadow page tables underneath the running OS. The shadow
`tables are populated on demand by translating sections of the guest page tables. Translation is very
`simple for dirty logging: all page-table entries (PTEs) are initially read-only mappings in the shadow
`tables, regardless of what is permitted by the guest tables. If the guest tries to modify a page of
`memory, the resulting page fault is trapped by Xen. If write access is permitted by the relevant guest
`PTE then this permission is extended to the shadow PTE. At the same time, we set the appropriate bit
`in the VM’s dirty bitmap.
`
`When the bitmap is copied to the control software at the start of each pre-copying round, Xen’s bitmap
`is cleared and the shadow page tables are destroyed and recreated as the migratee OS continues to run.
`This causes all write permissions to be lost: all pages that are subsequently updated are then added to
`the now-clear dirty bitmap.” Clark at 280.
`
`To the extent that it is argued that Clark does not disclose this limitation, this would have at least been
`inherent because Clark discloses copying of all page tables managed by the virtual machine OS.
`Furthermore, to the extent that it is argued that Clark does not disclose all or part of this limitation, it
`would have been at least obvious to combine it with any other reference disclosing this limitation as
`explained in Microsoft’s Preliminary Invalidity Contention Cover Pleading.
`Clark discloses migrating said virtual machine from a first hardware device to a second hardware
`device. For example, Clark states:
`
`4
`
`Patent No. 8,381,209
`Claim 3
`3[a] The method
`according to claim 1,
`further comprising:
`copying network security
`and routing for said virtual
`machine to said
`hypervisor layer;
`
`3[b] migrating said virtual
`machine from a first
`
`
`
`IPR2021-00832
`
`Daedalus EX2008
`Page 4 of 8
`
`

`

`Patent No. 8,381,209
`Claim 3
`hardware device to a
`second hardware device.
`
`EXHIBIT D-2
`Clark, “Live Migration of Virtual Machines” (Clark)
`Clark
`
`
`
`“In this paper we explore a further benefit allowed by virtualization: that of live OS migration.
`Migrating an entire OS and all of its applications as one unit allows us to avoid many of the difficulties
`faced by process-level migration approaches. In particular the narrow interface between a virtualized
`OS and the virtual machine monitor (VMM) makes it easy avoid the problem of ‘residual
`dependencies’ in which the original host machine must remain available and network-accessible in
`order to service certain system calls or even memory accesses on behalf of migrated processes. With
`virtual machine migration, on the other hand, the original host may be decommissioned once migration
`has completed. This is particularly valuable when migration is occurring in order to allow maintenance
`of the original host.” Clark at 273.
`
`“Managed migration is performed by migration daemons running in the management VMs of the
`source and destination hosts. These are responsible for creating a new VM on the destination machine,
`and coordinating transfer of live system state over the network.” Clark at 280.
`
`Clark at Fig. 1:
`
`
`
`5
`
`IPR2021-00832
`
`Daedalus EX2008
`Page 5 of 8
`
`

`

`Patent No. 8,381,209
`Claim 3
`
`EXHIBIT D-2
`Clark, “Live Migration of Virtual Machines” (Clark)
`Clark
`
`
`Patent No. 8,381,209
`Claim 4
`4[a] The method
`according to claim 3,
`further comprising:
`updating routing controls
`for said virtual machine at
`the hypervisor level;
`
`See Claim element 1[a].
`
`
`
`
`
`
`
`Clark
`
`
`6
`
`IPR2021-00832
`
`Daedalus EX2008
`Page 6 of 8
`
`

`

`EXHIBIT D-2
`Clark, “Live Migration of Virtual Machines” (Clark)
`Clark
`
`To the extent that it is argued that Clark does not disclose this limitation, it would have been at least
`obvious to combine it with any other reference disclosing this limitation as explained in Microsoft’s
`Preliminary Invalidity Contention Cover Pleading.
`To the extent Clark does not disclose parts of this limitation, it would have at least been obvious to
`combine Clark with prior art disclosing this as demonstrated in Microsoft’s Invalidity Contentions
`Cover Pleading.
`
`See Claim element 2[b].
`
`Clark
`
`
`Clark
`
`To the extent that it is argued that Clark does not disclose this limitation, it would have been at least
`obvious to combine it with any other reference disclosing this limitation as explained in Microsoft’s
`Preliminary Invalidity Contention Cover Pleading.
`
`
`7
`
`Patent No. 8,381,209
`Claim 4
`4[b] updating traffic filters
`for said virtual machine at
`the hypervisor level; and
`4[c] advertising said
`migration of said virtual
`machine from said first
`hardware device to said
`second hardware device.
`
`Patent No. 8,381,209
`Claim 5
`5 The method according to
`claim 1, further
`comprising setting
`firewalls to permit
`network traffic for the
`virtual machine to go to
`the second hardware
`device at the hypervisor
`layer.
`
`Patent No. 8,381,209
`Claim 6
`6 The method according to
`claim 1, further
`comprising adding a
`network section to a
`Virtual Machine
`Description File.
`
`
`
`
`
`
`
`IPR2021-00832
`
`Daedalus EX2008
`Page 7 of 8
`
`

`

`EXHIBIT D-2
`Clark, “Live Migration of Virtual Machines” (Clark)
`
`Clark
`
`To the extent that it is argued that Clark does not disclose this limitation, it would have been at least
`obvious to combine it with any other reference disclosing this limitation as explained in Microsoft’s
`Preliminary Invalidity Contention Cover Pleading.
`
`
`Clark
`
`To the extent Clark does not disclose parts of this limitation, it would have at least been obvious to
`combine Clark with prior art disclosing this as demonstrated in Microsoft’s Invalidity Contentions
`Cover Pleading.
`
`8
`
`Patent No. 8,381,209
`Claim 7
`7 The method according to
`claim 1, further
`comprising storing
`network access control
`lists.
`
`Patent No. 8,381,209
`Claim 8
`8 The method according to
`claim 7, further
`comprising adding a
`command line interface to
`a Virtual Switch
`configuration to set and
`unset a respective one of
`the access control lists.
`
`
`
`
`
`
`
`
`
`IPR2021-00832
`
`Daedalus EX2008
`Page 8 of 8
`
`

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket