throbber

`
`
`
`IPR2021-00832
`U.S. Patent No. 8,381,209
`
`UNITED STATES PATENT AND TRADEMARK OFFICE
`
`
`BEFORE THE PATENT TRIAL AND APPEAL BOARD
`
`
`
`MICROSOFT CORPORATION,
`Petitioner,
`
`v.
`
`DAEDALUS BLUE, LLC,
`Patent Owner.
`
`
`
`Case IPR2021-00832
`Patent No. 8,381,209
`
`
`
`
`PATENT OWNER’S
`PRELIMINARY RESPONSE
`UNDER 37 C.F.R. §42.107
`
`
`
`
`
`
`
`

`

`TABLE OF CONTENTS
`
`IPR2021-00832
`U.S. Patent No. 8,381,209
`
`
`Page
`
`V.
`
`
`I.
`Introduction ...................................................................................................... 1
`The ’209 Patent ................................................................................................ 5
`II.
`File History ....................................................................................................10
`III.
`IV. Claim Construction ........................................................................................13
`A.
`Legal Standard .....................................................................................13
`B.
`Level of ordinary skill .........................................................................14
`C.
`“enforcing network security and routing at the hypervisor
`layer via dynamic updating of routing controls” ................................15
`Institution should be denied because Petitioner has failed to show a
`reasonable likelihood of success on any challenged claim ...........................16
`A.
`Petitioner’s cited references ................................................................16
`B.
`There is no reasonable likelihood that Petitioner will prevail in
`its contention that the challenged claims are rendered obvious
`by Dhawan in view of Clark and the “knowledge of a
`POSITA” (Ground 1). .........................................................................22
`1.
`Petitioner has not shown that Dhawan discloses “a
`computer implemented method of controlling network
`security of a virtual machine” [Element 1pre]. .........................23
`a)
`The preamble is limiting because it provides an
`antecedent basis for the claimed “said virtual
`machine.” ........................................................................24
`The file history further demonstrates that the
`preamble is limiting. .......................................................25
`Dhawan does not disclose the preamble [Element
`1pre]. ...............................................................................27
`
`b)
`
`c)
`
`i
`
`

`

`3.
`
`2.
`
`3.
`
`4.
`
`5.
`
`6.
`
`2.
`
`Petitioner has not shown that Dhawan alone or in view of
`Clark and the “knowledge of a POSITA” discloses or
`renders obvious Element 1A (Ground 1). .................................29
`Petitioner has not shown that a POSITA would have been
`motivated to combine Dhawan and Clark as argued. ...............40
`VI. The Board should exercise its discretion to deny institution under
`Section 314(a) ................................................................................................42
`A.
`The investment of the court and the parties in the district court
`litigation, addressing identical issues to be decided before the
`Board’s Final Written Decision, warrants discretionary denial
`under 35 U.S.C. §314(a). .....................................................................43
`1.
`Petitioner’s admissions in the district court indicate that
`no stay will issue (Fintiv factor 1). ...........................................44
`The district court has set a trial date—not an
`“estimate”—which precedes this Board’s Final Written
`Decision (Fintiv factor 2). .........................................................44
`The substantial investment in the parallel proceeding by
`the court and the parties favors institution denial (Fintiv
`factor 3). ....................................................................................45
`The overlap of issues raised in the Petition favors
`institution denial (Fintiv factor 4). ............................................47
`The petitioner and the defendant are the same party
`(Fintiv factor 5). ........................................................................49
`Discretionary denial is appropriate where, as here, merits
`of the lone ground are lacking and antedating issues
`should be addressed at the district court (Fintiv factor 6). .......49
`VII. Conclusion .....................................................................................................52
`
`
`
`IPR2021-00832
`U.S. Patent No. 8,381,209
`
`
`
`
`ii
`
`

`

`IPR2021-00832
`U.S. Patent No. 8,381,209
`
`TABLE OF AUTHORITIES
`
`Page(s)
`
`
`Cases
`Apple Inc. v. Fintiv, Inc.,
`IPR2020-00019 (P.T.A.B. Mar. 20, 2020) .................................................. passim
`ATI Techs. ULC v. Iancu,
`920 F.3d 1362 (Fed. Cir. 2019) ............................................................................50
`Bio-Rad Labs., Inc. v. 10X Genomics Inc.,
`967 F.3d 1353 (Fed. Cir. 2020) ............................................................................24
`Brassica Prot. Prods. LLC v. Sunrise Farms (In re Cruciferous Sprout Litig.),
`301 F.3d 1343 (Fed. Cir. 2002) .......................................................................... 25,
`General Plastic Industrial Co., Ltd. v. Canon Kabushiki Kaisha,
`IPR2016-01357 (P.T.A.B. Sept. 6, 2017) (Precedential) ....................................42
`Harmonic Inc. v. Avid Tech., Inc.,
`815 F.3d 1356 (Fed. Cir. 2016) ................................................................................
`In re Fought,
`941 F.3d 1175 (Fed. Cir. 2019) ............................................................................24
`NHK Spring Co., Ltd. v. Intri-Plex Technologies, Inc.,
`IPR2018-00752 (P.T.A.B. Sept. 12, 2018) ........................................................ 42,
`
`On Demand Mach. Corp. v. Ingram Indus.,
`442 F.3d 1331 (Fed. Cir. 2006) ............................................................................25
`Perfect Surgical Techniques, Inc. v. Olympus Am., Inc.,
`841 F.3d 1004 (Fed. Cir. 2016) ................................................................................
`Phillips v. AWH Corp.,
`415 F.3d 1303 (Fed. Cir. 2005) ............................................................................13
`Sandoz Inc. v. Abbvie Biotechnology Ltd.,
`IPR2017-01987, 2018 WL 1230583 (P.T.A.B. Mar. 9, 2018) ............................14
`
`iii
`
`

`

`IPR2021-00832
`U.S. Patent No. 8,381,209
`
`
`Vivid Techs., Inc. v. Am. Sci. & Eng’g, Inc.,
`200 F.3d 795 (Fed. Cir. 1999) ..............................................................................14
`Statutes
`35 U.S.C. §121 .........................................................................................................11
`35 U.S.C. §314(a) .....................................................................................................4,
`Regulations
`83 Fed. Reg. 51341 ..................................................................................................13
`
`
`
`iv
`
`

`

`IPR2021-00832
`U.S. Patent No. 8,381,209
`
`
`Patent Owner’s Exhibit List
`RESERVED
`RESERVED
`RESERVED
`Order Governing Proceedings, Daedalus Blue, LLC v.
`Microsoft Corporation, Case No. 6:20-CV-1152-ADA,
`Dkt. No. 23 (W.D. Tex. June 30, 2021)
`Microsoft Corporation’s Notice of Filing Petitions for
`Inter Partes Review, Daedalus Blue, LLC v. Microsoft
`Corporation, Case No. 6:20-cv-1152-ADA, Dkt. No. 19
`(W.D. Tex. May 7, 2021)
`Defendant’s Invalidity Contentions, Daedalus Blue, LLC
`v. Microsoft Corporation, Case No. 6:20-cv-1152-ADA
`Chart D-1 from Defendant’s Invalidity Contentions,
`Daedalus Blue, LLC v. Microsoft Corporation, Case No.
`6:20-cv-1152-ADA
`Chart D-2 from Defendant’s Invalidity Contentions,
`Daedalus Blue, LLC v. Microsoft Corporation, Case No.
`6:20-cv-1152-ADA
`Chart D-5 from Defendant’s Invalidity Contentions,
`Daedalus Blue, LLC v. Microsoft Corporation, Case No.
`6:20-cv-1152-ADA
`Defendant’s Revised Proposed Claim Constructions,
`Daedalus Blue, LLC v. Microsoft Corporation, Case No.
`6:20-cv-1152-ADA, dated August 11, 2021
`
`
`
`EX2001
`EX2002
`EX2003
`EX2004
`
`EX2005
`
`EX2006
`
`EX2007
`
`EX2008
`
`EX2009
`
`EX2010
`
`
`
`v
`
`

`

`Patent Owner Daedalus Blue, LLC. (“Daedalus” or “Patent Owner”)
`
`IPR2021-00832
`U.S. Patent No. 8,381,209
`
`
`respectfully submits this Preliminary Response to Microsoft Corporation’s
`
`(“Microsoft” or “Petitioner”) above-captioned Petition for Inter Partes Review of
`
`United States Patent No. 8,381,209 (“the ’209 Patent”).
`
`I.
`
`INTRODUCTION
`Institution should be denied because Petitioner has failed to establish it has
`
`a reasonable likelihood of demonstrating that even a single challenged claim is
`
`unpatentable.
`
`The ’209 Patent relates to a method of controlling network security of a
`
`Virtual Machine (VM) during migration. To the end user, a VM is like a typical
`
`computer; it appears to have its own processor, memory, and other resources but
`
`VMs are actually comprised of virtualized hardware that has been emulated in
`
`software and runs on shared hardware resources. A secure component called a
`
`hypervisor allows a server (the host) to run multiple VMs (guests), which results
`
`in more efficient use of the resources. The hypervisor maps resources to and
`
`thereby isolates guest VMs on a shared host, and each guest VM can belong to
`
`different users or entities, isolated from each other.
`
`Sometimes VMs need to be moved from one server to another (to perform
`
`maintenance on the server or in event of a hardware failure), which
`
`conventionally involved shutting down the VM and copying it to another server.
`
`1
`
`

`

`But doing so required complicated schemes to maintain the network-entangled
`
`IPR2021-00832
`U.S. Patent No. 8,381,209
`
`
`state of the VM and created significant security risks. As discussed further below,
`
`the ’209 Patent discloses inventive techniques that control network security of
`
`VMs as they are migrated from one host to another by utilizing the hypervisor in a
`
`way that conventional systems did not. In particular, network security and routing
`
`are enforced at a hypervisor layer at which a virtual machine partition is executed
`
`and which is independent of guest operating systems. See, e.g., EX1001,
`
`Abstract.
`
`Petitioner challenges the sole independent claim as allegedly obvious based
`
`on Dhawan as its primary reference, supplemented by Clark and the knowledge of
`
`a POSITA for portions of certain claim elements. Petitioner also challenges the
`
`seven dependent claims using this same combination or variations that add
`
`additional references. But none of the cited references, combined or otherwise,
`
`disclose the claimed inventions.
`
`Dhawan is concerned with data migration but does not address the claimed
`
`use of a hypervisor layer to enforce network security and routing. Dhawan
`
`discloses encapsulating data in a carrier VM and migrating the carrier VM using a
`
`predetermined route. In this process, the Dhawan hypervisor fulfills exactly the
`
`conventional role: allocating and mapping physical resources to a particular
`
`carrier VM. Dhawan does not teach, suggest, or otherwise render obvious the
`
`2
`
`

`

`’209 Patent’s “enforcing network security and routing at a hypervisor layer via
`
`IPR2021-00832
`U.S. Patent No. 8,381,209
`
`
`dynamic updating of routing controls initiated by a migration of said virtual
`
`machine from a first device to a second device” as required by the challenged
`
`claims here.
`
`Petitioner adds Clark to address the challenged claims’ “dynamically
`
`updating routing controls.” But Clark’s advertisement of a changed address
`
`following migration does not remedy the shortcomings of Dhawan. Clark’s
`
`address advertisement is neither sent by nor effectuates a change at the Clark
`
`hypervisor. It simply tells the network where the VM was delivered—another
`
`conventional step that must occur to route network traffic after a migration. But
`
`this does not solve any of the security issues or other network routing
`
`shortcomings that the ’209 claims resolve.
`
`Because the conventional hypervisor of Dhawan, with or without Clark or
`
`the knowledge of a POSITA, cannot meet the functions of the hypervisor as
`
`claimed in the ’209 Patent, Petitioner is forced to break up the claim elements and
`
`address select words in isolation and out of order to attempt to map these the cited
`
`references to the claims. Petitioner’s approach glosses over the crucial role of the
`
`claimed hypervisor in the ’209 Patent.
`
`Because the Petition fails to address these novel and critical requirements
`
`of the challenged claims, the Petition has no reasonable likelihood of prevailing
`
`3
`
`

`

`on any challenged claim. Neither Dhawan nor Clark disclose or would have
`
`IPR2021-00832
`U.S. Patent No. 8,381,209
`
`
`rendered obvious the challenged claims.
`
`The Petition’s lack of merit further supports Patent Owner’s request that the
`
`Board deny institution in exercise of its discretion under 35 U.S.C. §314(a). The
`
`Board should exercise discretionary denial because the scheduled jury trial in the
`
`related district court case will determine the same issues as raised in the
`
`Petition—and that district court trial is scheduled to be completed before any
`
`Final Written Decision here. The case has not been stayed, and Petitioner has not
`
`moved for a stay. Further, a stay is very unlikely, because Petitioner has filed
`
`inter partes review petitions on only three of five patents asserted in the related
`
`litigation, and has informed the court it will not challenge the other two patents.
`
`The challenged claims here are asserted in the district court litigation. Claim
`
`construction proceedings are well underway and the Markman hearing will be
`
`completed before the statutory deadline for the Board’s institution decision. The
`
`court and the parties have invested and will continue to invest substantial
`
`resources even before the institution decision deadline. Parallel proceedings on
`
`this timeline, with a complete overlap of issues, would waste resources, and risk
`
`inconsistent results. Under these circumstances, discretionary denial under
`
`§314(a) is warranted.
`
`4
`
`

`

`II. THE ’209 PATENT
`To move a VM from one physical device to another (e.g., from hardware 1
`
`IPR2021-00832
`U.S. Patent No. 8,381,209
`
`
`to hardware 2), some conventional methods and systems prior to the ’209 Patent
`
`would merely shut down and copy from hardware 1 to hardware 2. Id., 5:30-37.
`
`Peripheral state information and security could be maintained in this scenario, but
`
`it was not ideal and quite complicated. In order to perform maintenance on, or
`
`provide a fail-over for, a physical device hosting one or more VMs, it is desirable
`
`to move or migrate such VMs to another hardware device, but doing so can create
`
`significant network security risks. EX1001, 2:27-31.
`
`When a VM is running and connected to a network, it can be described as
`
`having a network entangled state, and various network components impact the
`
`routing and security of the VM. For example, Figures 2-3 of the patent depict
`
`conventional systems where each VM is linked to a network interface card (NIC),
`
`virtual NIC, switches and firewalls. And these network routing and security
`
`issues may be impacted by migration in conventional systems. Id., 2:41-45, 3:6-
`
`9. Various routing controls that relate to security and routing including, for
`
`example, VLAN TAGs and network ACLs. E.g., EX1001, 1:19-23. Networking
`
`access control lists (ACLs) are used to tell the networking components which
`
`types of traffic can access the network or parts of the network, and/or which
`
`activity is allowed.
`
`5
`
`

`

`Conventionally, ACLs are installed in the “real”1 network components,
`
`IPR2021-00832
`U.S. Patent No. 8,381,209
`
`
`such as switches, routers, or firewalls. E.g. id., 1:21-23. However, as shown in
`
`Figure 2, some conventional systems did not use ACLs and thus if a VM were
`
`migrated to a system without ACLs, it provided the VM with very little security.
`
`Id., 2:24-59. In other conventional systems, such as shown in Figure 3, the target
`
`device might have an ACL installed on a real network switch and have further
`
`restrictions in the firewall. Thus, when migrating a virtual machine from one
`
`device to another device, a complex update scheme was required to update the
`
`ACLs in the real switches and the filters in the firewalls. Id., 3:6-9.
`
`
`
`
`
`
`
`
`1 Traditionally, physical components such as the switches and firewalls are called
`
`“real” devices, to distinguish from logical or virtualized devices (e.g., switches,
`
`routers or firewalls implemented in software that run on shared hardware).
`
`6
`
`

`

`The ’209 patent describes improvements over systems that existed for
`
`IPR2021-00832
`U.S. Patent No. 8,381,209
`
`
`migrating VMs. For example, the technique of using the logical partition
`
`manager to manage migration was known. When utilizing this technique, known
`
`as “paravirtualization,” the logical partition manager trusts a partition OS to
`
`cooperate with other partitions. See EX1001, 3:58-4:10. But this created a
`
`serious security flaw because an undermined OS can manipulate an operating
`
`system in another partition. EX1001, 3:64-4:2. Other migration techniques, such
`
`as those available in local area network environments, did not address the need to
`
`update ACLs. Id., 4:11-18. Yet other systems could capture the state of the VM
`
`in a mass storage device, but could not capture the state external to addressable
`
`memory, such as the network state. Id., 3:40-33. Thus, there was a need for
`
`techniques for migrating VMs connected to a public network that use ACLs such
`
`that they remained secure. The claims of the ’209 Patent provide a solution to this
`
`problem.
`
`The ’209 Patent (entitled “Moveable Access Control List (ACL)
`
`mechanisms for hypervisors and virtual machines and virtual port firewalls”)
`
`enforces network security and routing at the hypervisor by dynamically updating
`
`routing controls, initiated by migration of the VM. The ’209 invention can
`
`initiate migration from one machine to another and in doing so, also capture an
`
`application state, such as the state of a firewall or routing pertaining to a particular
`
`7
`
`

`

`VM partition. EX1001, 10:1-11. The system can also establish logical rules that
`
`IPR2021-00832
`U.S. Patent No. 8,381,209
`
`
`govern the interaction of a migrated VM with the network infrastructure. Id.,
`
`10:11-13. This allows a logical device to be bootstrapped and allows a device
`
`state to be easily revoked upon migration. Id., 10:13-16. The invention can
`
`achieve these advantages by implementing such controls in the hypervisor layer.
`
`Id., 10:17-27. As shown in Figures 5 and 6, for example (annotated below),
`
`ACLs for the migrated VM can be stored with the serialized representation of the
`
`VM (Fig. 5) or in some other central repository (FIG. 6). Id., 11:24-33. And a
`
`hypervisor secured network layer can be used to provide filtered network
`
`connectivity. Id., 10:28-35.
`
`
`
`
`
`As noted above, the patent discusses how network access controls may
`
`have to be reset when copying a virtual machine from one computer. EX1001,
`
`4:5-10. Figures 12 and 13 further describe exemplary methods that may be used
`
`when VMs suspend/stop and start. Upon suspend, the method collects the
`
`8
`
`

`

`security and routing information for the VM and serializes them into a data
`
`IPR2021-00832
`U.S. Patent No. 8,381,209
`
`
`structure, meaning it converts the information into a more efficient form for
`
`storage, such as XML. EX1001, 12:54-67. When a new VM is started, the
`
`system may first create dummy virtual network interfaces it then can deserialize
`
`the security and routing information and install them in the hypervisor. EX1001,
`
`12:34-54.
`
`In one embodiment, the patent explains that VM network configurations
`
`can be updated at the hypervisor while the VM is running, and in a serialized
`
`representation of the VM. EX1001, 13:4-11; FIG 15B.
`
`By dynamically updating the routing controls at the hypervisor, the ’209
`
`invention can beneficially enforce network security and routing under the
`
`protection of the hypervisor. See EX1001, 6:3-15. For example, because
`
`operating systems running on the VM cannot alter or store any state at the
`
`hypervisor, the hypervisor layer can be trusted. Id., 10:36-40. Further, by
`
`utilizing the hypervisor layer for security and routing, the user will see no
`
`difference in operation between running the virtual machine on hardware 1 or
`
`hardware 2. Id., 5:38-46; 9:25-31. And, by enforcing network security and
`
`routing at the hypervisor layer, the real switches also would not need to be
`
`updated. Id., 5:59-62; 10:65-67. Additionally, the hypervisor security
`
`architecture is designed to provide a secure foundation, strong isolation, mediated
`
`9
`
`

`

`sharing and communication between VMs. Id., 4:55-60. These properties can be
`
`IPR2021-00832
`U.S. Patent No. 8,381,209
`
`
`strictly controlled by a flexible access control enforcement engine at the
`
`hypervisor, which can also enforce mandatory policies as disclosed in the ’209.
`
`Id., 4:60-62.
`
`Challenged Independent claim 1 of the ’209 Patent recites:
`
`[pre] A computer implemented method of controlling
`network security of a virtual machine, the method
`comprising
`
`[A] enforcing network security and routing at a hypervisor
`layer via dynamic updating of routing controls initiated by
`a migration of said virtual machine from a first device to a
`second device.
`
`EX1001, Cl. 1 (with brackets indicating the element numbering used in the
`
`Petition for clarity).
`
`Petitioner’s Grounds all rely on Dhawan as a primary reference. But as
`
`discussed below, Dhawan does not teach or suggest either the preamble or
`
`Element 1A, which is required by every challenged claim. Nor do Petitioner’s
`
`proposed combinations likewise remedy these shortcomings.
`
`III. FILE HISTORY
`Patent Owner herein addresses certain omissions in Petitioner’s summary
`
`of the ’209 Patent prosecution history for this stage in the proceedings. If the
`
`10
`
`

`

`Board chooses to institute trial, Patent Owner reserves the right to provide further
`
`IPR2021-00832
`U.S. Patent No. 8,381,209
`
`
`context from, and argument about, the prosecution that gave rise to the challenged
`
`claims in its §42.120 Response.
`
`The file history demonstrates that the Applicant relied on the preamble as a
`
`necessary and defining aspect of the invention, as well as to distinguish the Traut
`
`reference cited by the Examiner. As will be discussed below in Section V.A.3,
`
`the preamble is limiting, including based on these instances of reliance during
`
`prosecution.
`
`Following the May 27, 2010 Non-Final Rejection, and Applicant’s
`
`August 27, 2010 response, on November 8, 2010, the patent office required
`
`Applicant to make a claim election under 35 U.S.C. §121. EX1002, 123-126. At
`
`that time, the patent office noted that two sets of distinct inventions were
`
`identified—claims directed to “controlling network security” and claims directed
`
`to “virtual machine migration.” EX1002, 124-126. Comparison of the then-
`
`pending claims is recited below:
`
`“controlling network security”
`(Claim 1) A computer implemented
`method of controlling network security
`of a virtual machine,
`
`comprising enforcing network security
`and routing at a hypervisor layer via
`dynamic updating of routing controls
`initiated by a migration of said virtual
`
`“virtual machine migration”
`(Claim 2) A computer implemented
`method of virtual machine migration
`with filtered network connectivity,
`
`comprising enforcing network security
`and routing at a hypervisor layer which
`is independent of guest operating
`systems via dynamic updating of
`
`11
`
`

`

`“controlling network security”
`machine from a first device to a second
`device.
`
`IPR2021-00832
`U.S. Patent No. 8,381,209
`
`
`“virtual machine migration”
`routing controls initiated by a
`migration of said virtual machine from
`a first device to a second device.
`
`EX1002, 107. On November 11, 2010, Applicant elected to pursue the claims
`
`drawn to controlling network security. EX1002, 127-128.
`
`In a June 6, 2012, Non-Final Rejection, Examiner did not refer to Kurien,
`
`but relied on a different reference—Traut (U.S. Patent Application Pub. No.
`
`2006/0136653). EX1002, 185-88. In the Aug. 31, 2012 amendment, Applicant
`
`distinguished Traut by emphasizing that claim 1 was “directed to a method of
`
`controlling network security of a virtual machine, the method including enforcing
`
`network security and routing at a hypervisor layer via dynamic updating of
`
`routing controls initiated by a migration from one device to a second device.”
`
`EX1002, 200 (emphasis in original).
`
`In Response, Applicant again reemphasized that claim 1 recites, among
`
`other things “a computer implemented method of controlling network security…”
`
`with original emphasis on the preamble language, EX1002, 201, and further noted
`
`that the claimed invention exemplarily provides a hypervisor security architecture
`
`designed to provide a secure foundation for server platforms…” EX1002, 201.
`
`Applicant continued to distinguish Traut on grounds that it did not relate to
`
`security or secure foundations, and that it “completely faile[d] to disclose or
`
`12
`
`

`

`suggest the claimed “computer implemented method of controlling network
`
`IPR2021-00832
`U.S. Patent No. 8,381,209
`
`
`security of a virtual machine the method including enforcing network security and
`
`routing at a hypervisor layer via dynamic updating of routing controls initiated by
`
`a migration from one device to a second device.” The examiner found
`
`Applicant’s arguments persuasive and issued the claims without opinion.
`
`Accordingly, in order to distinguish its claims over Traut, Applicant
`
`emphasized and relied on the “controlling network security” language of the
`
`preamble.
`
`IV. CLAIM CONSTRUCTION
`A. Legal Standard
`Under Phillips, patent claims should be interpreted in light of the intrinsic
`
`evidence, including the specification and file history, and “the ordinary and
`
`customary meaning of a claim term is the meaning that the term would have to a
`
`person of ordinary skill in the art in question at the time of the invention, i.e., as
`
`of the effective filing date of the patent application.” Phillips v. AWH Corp., 415
`
`F.3d 1303, 1313, 1317 (Fed. Cir. 2005); see also 83 Fed. Reg. 51341 (Oct. 11,
`
`2018) (adopting Phillips standard for AIA proceedings before the Board).
`
`Below, Patent Owner addresses one issue regarding Petitioner’s proposed
`
`construction of a term in the related district court proceeding. However, for all
`
`other terms, the plain and ordinary meaning of those terms is sufficient for the
`
`13
`
`

`

`Board to analyze Petitioner’s Grounds at this stage. While Patent Owner notes
`
`IPR2021-00832
`U.S. Patent No. 8,381,209
`
`
`that construction of other terms in the challenged claims may be appropriate if the
`
`Board chooses to institute inter partes review, such constructions are not
`
`necessary at this juncture. See, e.g., Sandoz Inc. v. Abbvie Biotechnology Ltd.,
`
`IPR2017-01987, 2018 WL 1230583, at *5 (P.T.A.B. Mar. 9, 2018) (“[B]ecause
`
`neither of those phrases requires construction for us to resolve the instant dispute,
`
`we decline to construe them. See Vivid Techs., Inc. v. Am. Sci. & Eng’g, Inc., 200
`
`F.3d 795, 803 (Fed. Cir. 1999) (‘only those terms need be construed that are in
`
`controversy, and only to the extent necessary to resolve the controversy’).”). The
`
`Petition fails to demonstrate a reasonable likelihood that it would prevail under
`
`the plain meaning of the claims.
`
`Level of ordinary skill
`B.
`The Petition indicates that a person of ordinary skill in the art (“POSITA”)
`
`“would have had at least a Bachelor’s degree in computer science or computer
`
`engineering (or equivalent) and at least three years of work experience in the field
`
`of cloud computing, virtual machines, computer networks and systems, and/or a
`
`similar field.” Petition, 21. For the purpose of this Preliminary Response,
`
`applying this level of skill is sufficient for the Board to evaluate the Petition
`
`Grounds. Should the Board institute trial, Patent Owner reserves the right to
`
`provide its own POSITA definition and support for that definition in its §42.120
`
`14
`
`

`

`Response, including expert testimony regarding the appropriate definition along
`
`IPR2021-00832
`U.S. Patent No. 8,381,209
`
`
`with that Response.
`
`C.
`
`“enforcing network security and routing at the hypervisor layer
`via dynamic updating of routing controls”
`In its Petition, Petitioner does not advance any terms for construction and
`
`contends that it gives each claim term its plain and ordinary meaning. Petition,
`
`21. However, at the district court, Petitioner Microsoft identified the following
`
`term for construction: “enforcing…routing at the hypervisor layer via dynamic
`
`updating of routing controls.” See EX2010, 4.2 Microsoft contends that the term
`
`should be construed as: “upon migration, automatically changing the routing
`
`controls at a hypervisor layer to rout network traffic for the virtual machine to
`
`the second device.” 3 See EX2010, 4.
`
`Patent Owner does not believe the Board needs to construe this term to
`
`assess Petitioner’s Grounds at this stage, and further disputes that Microsoft’s
`
`
`2 Patent Owner notes that this term improperly omits “network security and” from
`
`the phrase for construction and is addressing that issue with Petitioner’s proposed
`
`construction at the district court, but for purposes of its analysis, the Board need
`
`not address that omission because the term does not require construction for
`
`purposes of this Preliminary Response.
`
`3 All bold italic emphasis herein added.
`
`15
`
`

`

`construction is the plain and ordinary meaning. However, Patent Owner notes
`
`IPR2021-00832
`U.S. Patent No. 8,381,209
`
`
`that Microsoft’s proposed construction highlights the way its arguments here
`
`conflict with the claim language “enforcing network security and routing at the
`
`hypervisor layer via dynamic updating of routing controls.” Petitioner’s
`
`arguments sidestep the claim language “at a hypervisor layer” and are also
`
`misaligned with its proposed construction at the district court referencing
`
`“network traffic for the virtual machine.”
`
`V.
`
`INSTITUTION SHOULD BE DENIED BECAUSE
`PETITIONER HAS FAILED TO SHOW A REASONABLE
`LIKELIHOOD OF SUCCESS ON ANY CHALLENGED CLAIM
`Petitioner’s cited references
`A.
`Dhawan discloses a system where data is migrated to new hardware across
`
`a network in an encapsulated form by what Dhawan calls a carrier VM. EX1005,
`
`[Abstract]. Critically, however, the hypervisor (which the Petition maps to the
`
`virtual machine monitor (VMM) of Dhawan) is used purely in its conventional
`
`role of allocating and mapping physical resources to a particular carrier VM.
`
`In Dhawan, data to be transported is encapsulated (and sometimes
`
`encrypted) in a carrier VM. EX1005, [0018]. That data is then transported across
`
`a network to its new location using the carrier VM; when it is being transferred,
`
`Dhawan refers to the data as “payload” just as any other network data transfer is
`
`16
`
`

`

`referred to as “payload.” A carrier VM must be allocated new hardware resources
`
`IPR2021-00832
`U.S. Patent No. 8,381,209
`
`
`at its new hardware location.
`
`Dhawan explains that the job of the virtual machine monitor (VMM) is to
`
`“map and remap carrier virtual machine 120 to available hardware resources as it
`
`is migrated across different physical machines.” EX1005, [0050]; see also id.,
`
`[0008], [0009] (job of VMM is to “create, quiesce, and destroy virtual machines”
`
`and map and remap VM to available physical resources.). Dhawan explains that
`
`the “VMM-managed resources can include processors, memory, network
`
`bandwidth, and I/O bandwidth, all aggregated into a single, unified resource
`
`pool.” EX1005, [0008]. In other words, the VMM in Dhawan acts in a
`
`conventional manner to assign the physical resources to the VMs. Indeed, the
`
`claims Dhawan set forth in its disclosure do not purport to claim any novel use of
`
`the VMM. See EX1005, claims 1-20. And Dhawan contemplates that its system
`
`could be implemented using known “infrastructure, such as that provided by
`
`VMware or the Xen open source environment, to create and manage virtual
`
`machines.” EX1005, [0018].
`
`Dha

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket