throbber
U.S. Patent No. 8,478,799
`Petition for Inter Partes Review
`
`DOCKET NO.: 2212123-00120 US2
`Filed on behalf of Springpath, Inc.
`By: Jason Kipnis, Reg. No. 40,680
`Theodoros Konstantakopoulos, Reg. No. 74,155
`Wilmer Cutler Pickering Hale and Dorr LLP
`950 Page Mill Road
`Palo Alto, CA 94304
`Tel: (650) 600-5036
`Email: Jason.Kipnis@wilmerhale.com
`
` Theodoros.Konstantakopoulos@wilmerhale.com
`
`UNITED STATES PATENT AND TRADEMARK OFFICE
`____________________________________________
`
`BEFORE THE PATENT TRIAL AND APPEAL BOARD
`____________________________________________
`
`Springpath, Inc.
`Petitioner
`
`v.
`
`SimpliVity Corporation,
`Patent Owner
`
`Case IPR2016-01780
`
`PETITION FOR INTER PARTES REVIEW OF
`U.S. PATENT NO. 8,478,799
`CHALLENGING CLAIMS 1–2, 7–13, 17–20, 27, and 33–35
`UNDER 35 U.S.C. § 312 AND 37 C.F.R. § 42.104
`
`CSCO-1021
`Page 1 of 66
`
`

`

`U.S. Patent No. 8,478,799
`Petition for Inter Partes Review
`
`TABLE OF CONTENTS
`
`Introduction ........................................................................................................ 1(cid:3)
`I.(cid:3)
`II.(cid:3) Mandatory Notices ............................................................................................. 2(cid:3)
`A.(cid:3) Real Party-in-Interest ..................................................................................... 2(cid:3)
`B.(cid:3) Related Matters .............................................................................................. 3(cid:3)
`C.(cid:3) Counsel ........................................................................................................... 3(cid:3)
`D.(cid:3) Service Information ....................................................................................... 3(cid:3)
`III.(cid:3)
`Certification of Grounds for Standing ........................................................... 3(cid:3)
`IV.(cid:3)
`Overview of Challenge and Relief Requested ............................................... 4(cid:3)
`A.(cid:3) Prior Art Patents and Publications ................................................................. 4(cid:3)
`B.(cid:3) Grounds for Challenge ................................................................................... 4(cid:3)
`V.(cid:3) Brief Description of Technology ....................................................................... 5(cid:3)
`A.(cid:3) Overview of Computer File Systems ............................................................. 5(cid:3)
`1.(cid:3) Basic Components of File Systems ............................................................ 5(cid:3)
`2.(cid:3) Files ............................................................................................................ 5(cid:3)
`3.(cid:3) Directories .................................................................................................. 6(cid:3)
`4.(cid:3)
`Inodes ......................................................................................................... 6(cid:3)
`5.(cid:3) Content-Addressable File System .............................................................. 7(cid:3)
`B.(cid:3) Overview of the ’799 Patent .......................................................................... 7(cid:3)
`1.(cid:3) Alleged Problem ......................................................................................... 8(cid:3)
`2.(cid:3) Summary of Alleged Invention of the ’799 Patent .................................... 8(cid:3)
`3.(cid:3) The Challenged Claims ............................................................................ 14(cid:3)
`4.(cid:3) Prosecution History .................................................................................. 15(cid:3)
`Overview of the Primary Prior Art References ........................................... 18(cid:3)
`VI.(cid:3)
`A.(cid:3) Overview of Atkin ....................................................................................... 19(cid:3)
`B.(cid:3) Overview of Li ............................................................................................. 21(cid:3)
`VII.(cid:3) Claim Construction ...................................................................................... 23(cid:3)
`A.(cid:3) “fingerprint” ................................................................................................. 25(cid:3)
`
`i
`
`Page 2 of 66
`
`

`

`U.S. Patent No. 8,478,799
`Petition for Inter Partes Review
`
`“namespace file system” .............................................................................. 25(cid:3)
`B.(cid:3)
`VIII.(cid:3) Level of Ordinary Skill In The Art .............................................................. 26(cid:3)
`IX.(cid:3)
`Specific Grounds for Petition ...................................................................... 26(cid:3)
`A.(cid:3) Ground I: Claims 1-2, 7-9, 12, 17-19, 27, and 35 are anticipated by Atkin
`
`27(cid:3)
`Independent Claim 1 ................................................................................ 27(cid:3)
`1.(cid:3)
`2.(cid:3) Claim 2: “The file system of claim 1, wherein: object references are
`mapped by the object fingerprints.” ................................................................. 40(cid:3)
`3.(cid:3) Claim 7: “The file system of claim 1, wherein: the file object mapping
`comprises a linear list, a tree structure or an indirection table.” ..................... 40(cid:3)
`4.(cid:3) Claim 8: “The file system of claim 1, wherein: the file objects include a
`root object having its own object fingerprint derived from all of the objects in
`the file system such that every object in the file system is accessible through
`the root object.” ................................................................................................ 41(cid:3)
`5.(cid:3) Claim 9: “The file system of claim 8, wherein a change of content of any
`file system object changes the root object and tracking changes in the root
`object provides a history of file system activity.” ........................................... 43(cid:3)
`6.(cid:3) Claim 12: “The file system of claim 1, wherein: the object size is
`variable. ............................................................................................................ 43(cid:3)
`7.(cid:3) Claim 17: The file system of claim 1, including: a stack wherein the
`object store comprises a lower portion of the stack and the file system
`comprises an upper portion of the stack. ......................................................... 44(cid:3)
`8.(cid:3) Claim 18: The file system of claim 1, wherein: the namespace file system
`and the object store are implemented in one or more of digital electronic
`circuitry, computer hardware, firmware, a computer program in a non-
`transitory machine readable storage device, or combinations thereof. ............ 44(cid:3)
`9.(cid:3)
`Independent Claim 19 .............................................................................. 45(cid:3)
`10.(cid:3) Claim 27: A computer program embodied in a non-transitory machine
`readable storage device comprising program code means which, when
`executed by a process, performs the steps of method claim 19. ...................... 47(cid:3)
`11.(cid:3) Claim 35: The method of claim 19, including: adding, modifying or
`deleting an object of the file and generating a new file object fingerprint. ..... 47(cid:3)
`B.(cid:3) Ground II: Claims 11, 20, and 33-34 are obvious over Atkin in view of Li
`
`48(cid:3)
`
`ii
`
`Page 3 of 66
`
`

`

`U.S. Patent No. 8,478,799
`Petition for Inter Partes Review
`
`1.(cid:3) Claim 11: The file system of claim 1, wherein: the fingerprint is an
`cryptographic hash digest of the object content. ............................................. 49(cid:3)
`2.(cid:3) Claim 20: The method of claim 19, comprising: maintaining a location
`index for mapping object fingerprints and physical locations of the objects. . 49(cid:3)
`3.(cid:3) Claim 33: The method of claim 19, including: maintaining in the object
`store a location index of object names and physical object locations. ............ 50(cid:3)
`4.(cid:3) Claim 34: The method of claim 19, wherein: the file object mapping is
`indexed by an offset into the content of the file, and comprises a linear list, a
`tree structure, or an indirection table. .............................................................. 51(cid:3)
`5.(cid:3) Motivation to Combine ............................................................................ 51(cid:3)
`C.(cid:3) Ground III: Claim 10 is obvious over Atkin in view of Sandberg ............. 53(cid:3)
`1.(cid:3) Claim 10: The file system of claim 1, wherein: the namespace file system
`is provided as a layer in a storage stack between a virtual file system layer and
`a block storage abstraction layer. ..................................................................... 53(cid:3)
`2.(cid:3) Motivation to Combine ............................................................................ 54(cid:3)
`D.(cid:3) Ground IV: Claim 13 is obvious over Atkin .............................................. 57(cid:3)
`1.(cid:3) Claim 13: The system of claim 1, wherein: the file system is a POSIX
`standard compliant file system. ....................................................................... 57(cid:3)
`X.(cid:3) Conclusion ....................................................................................................... 57(cid:3)
`
`iii
`
`Page 4 of 66
`
`

`

`U.S. Patent No. 8,478,799
`Petition for Inter Partes Review
`
`Springpath, Inc. (“Springpath”) respectfully requests Inter Partes Review of
`
`claims 1–2, 7–13, 17–20, 27, and 33–35 of U.S. Patent No. 8,478,799 (the “’799
`
`patent”) (Ex. 1101) pursuant to 35 U.S.C. §§ 311-19 and 37 C.F.R. § 42.1 et seq.
`
`I. INTRODUCTION
`
`The ’799 patent claims a purportedly novel computer file system for naming
`
`and storing of files on computer storage devices. But in fact, the claimed file
`
`system merely combines well known techniques disclosed by Jinyuan Li and
`
`others nearly four years before the alleged invention. Decl. ¶ 24 (Ex. 1102).
`
`The ’799 patent is directed to a stacked file system, comprising two distinct
`
`storage systems: a namespace file system and an underlying object store (also
`
`referred to in the ‘799 patent as an “object file system”). The object store is used
`
`to host the data in the form of objects. The name of the object is derived from the
`
`object’s content using, for example, a strong cryptographic hash, and represents a
`
`“fingerprint” of the content. These fingerprints of the objects are globally unique
`
`because: (i) no two objects can have the same content (because in that case, they
`
`would by definition have the same fingerprint and therefore be the same object);
`
`and (ii) two objects with different content will always have different fingerprints.
`
`Object stores have an “index” that tracks all of the objects and associates each
`
`object’s name with its location. Decl. ¶ 25 (Ex. 1102).
`
`The ’799 patent describes a “namespace file system” at the top of the storage
`
`1
`
`Page 5 of 66
`
`

`

`U.S. Patent No. 8,478,799
`Petition for Inter Partes Review
`
`stack, which manages the files and directories that are stored within the object
`
`store. This namespace file system uses object fingerprints, instead of logical block
`
`numbers, to access content stored in the object store. All internal data structures of
`
`the ’799 namespace file system are themselves objects. Decl. ¶ 26 (Ex. 1102).
`
`Before the ’799 patent’s June 26, 2009 priority date, others had already
`
`developed and used the same file system architecture. U.S. Patent No. 7,747,663
`
`to Atkin (“Atkin”) (Ex. 1104), filed before the priority of the ’799 patent, discloses
`
`a file system layered over a content addressable block store. Like Li, Atkin also
`
`discloses data structures identical to the structures claimed in the ’799 patent in the
`
`forms of files, directories, inodes, and imaps. Decl. ¶ 27 (Ex. 1102).
`
`Likewise, Secure Untrusted Data Repository (SUNDR), to Li et al. (“Li”)
`
`(Ex. 1103), for instance, which was published on 2004, describes a storage system
`
`that is constructed as a file system that is layered over an underlying content
`
`addressable block store. Specifically, as shown in Li’s drawings and
`
`corresponding description, Li discloses data structures that are identical to the ones
`
`claimed in the ’799 patent in the form of files, directories, inodes, and i-tables.
`
`Decl. ¶ 28 (Ex. 1102).
`
`II. MANDATORY NOTICES
`
`A. Real Party-in-Interest
`
`Springpath, Inc. (“Petitioner”) is the real party-in-interest.
`
`2
`
`Page 6 of 66
`
`

`

`U.S. Patent No. 8,478,799
`Petition for Inter Partes Review
`
`B. Related Matters
`SimpliVity has asserted the ’799 patent in SimpliVity Corp. v. Springpath,
`
`Inc., Civil Action No. 4:15-cv-13345-TSH (D. Mass. 2016). This proceeding may
`
`be affected by a decision in this instant proceeding. The Petitioner is filing another
`
`inter partes review petition for claims 1–2, 7–13, 17–20, 27, and 33–35 of the ’799
`
`patent. See IPR2016-01779.
`
`C. Counsel
`
`Lead Counsel: Jason Kipnis, (Registration No. 40,680).
`
`Backup Counsel: Theodoros Konstantakopoulos (Registration No.74,155);
`
`Mark D. Flanagan (pro hac vice to be requested); Louis W. Tompros (pro hac vice
`
`to be requested); and Keith L. Slenkovich (pro hac vice to be requested).
`
`D. Service Information
`
`E-mail: Jason.Kipnis@wilmerhale.com;
`
` Theodoros.Konstantakopoulos@wilmerhale.com.
`
`Post and hand delivery: Wilmer, Cutler, Pickering, Hale and Dorr, LLP
`
`
`
`
`
`
`
`
`
`950 Page Mill Road
`
`Palo Alto, CA 94304
`
`Telephone: 650-600-5036
`
`
`
`Fax: 650-858-6100
`
`Petitioner consents to service by E-mail.
`
`III. CERTIFICATION OF GROUNDS FOR STANDING
`
`3
`
`Page 7 of 66
`
`

`

`U.S. Patent No. 8,478,799
`Petition for Inter Partes Review
`
`Petitioner certifies pursuant to Rule 42.104(a) that the patent for which
`
`review is sought is available for inter partes review and that Petitioner is not
`
`barred or estopped from requesting an inter partes review challenging the patent
`
`claims on the grounds identified in this Petition.
`
`IV. OVERVIEW OF CHALLENGE AND RELIEF REQUESTED
`
`Pursuant to Rules 42.22(a)(1) and 42.104(b)(1)-(2), Petitioner challenges
`
`claims 1-2, 7-13, 17-20, 27, and 33-35 of the ’799 patent.
`
`A. Prior Art Patents and Publications
`
`Petitioner relies upon the patents listed in the Table of Exhibits, including:
`
`1.
`
`Secure Untrusted Data Repository (SUNDR), to Li et al. (“Li” (Ex.
`
`1103)), published in 2004. Li is prior art under 35 U.S.C. §102(b).
`
`2. U.S. Pat. No. 7,747,663 (“Atkin” (Ex. 1104)), which was filed on
`
`March 5, 2008, and issued on June 29, 2010, which incorporates by reference U.S.
`
`Pat. Application No. 12/023,141, which issued as U.S. Patent No. 8,140,625
`
`(“Dubnicki” (Ex. 1105)). Atkin is prior art under 35 U.S.C. § 102(e).
`
`3.
`
`Design and implementation of the Sun network filesystem, to Sandberg
`
`et al. (“Sandberg” (Ex. 1116)), published in 1985. Sandberg is prior art under 35
`
`U.S.C. §102(b).
`
`B. Grounds for Challenge
`
`Petitioner requests cancellation of claims 1-2, 7-13, 17-20, 27, and 33-35 of
`
`4
`
`Page 8 of 66
`
`

`

`U.S. Patent No. 8,478,799
`Petition for Inter Partes Review
`
`the ’799 patent (the “challenged claims”) as unpatentable under 35 U.S.C. § 102
`
`and § 103. This Petition, supported by the declaration of Dr. Darrell D. E. Long
`
`(“Decl.”) (Ex. 1102) filed herewith, demonstrates that there is a reasonable
`
`likelihood that Petitioner will prevail with respect to cancellation of at least one
`
`challenged claim. See 35 U.S.C. § 314(a).
`
`V. BRIEF DESCRIPTION OF TECHNOLOGY
`
`The ’799 patent generally relates to the field of computer file system data
`
`structures and claims particular computer file systems for naming and storing of
`
`files on one or more computer storage devices, as well as related methods for
`
`naming and storing of files. Decl. ¶ 29 (Ex. 1102).
`
`A. Overview of Computer File Systems
`
`1. Basic Components of File Systems
`
`File systems include several data structures. For example, file systems have
`
`user visible structures, such as files and directories, as well as internal structures,
`
`such as superblocks, inodes, allocation maps, and transaction logs. Decl. ¶ 30 (Ex.
`
`1102).
`
`2.
`
`Files
`
`A file is a named collection of related data that appears to the user as a
`
`single, contiguous set of information that is retained in storage. To a user, a file is
`
`seen as a unit of logical storage where each file is identified by a name that is
`
`5
`
`Page 9 of 66
`
`

`

`U.S. Patent No. 8,478,799
`Petition for Inter Partes Review
`
`unique within the directory in which the file is located. To the computer, however,
`
`individual files are identified by numbers, rather than by their names and
`
`directories. Typically, individual files are not stored as contiguous blocks of data,
`
`but rather they are stored as multiple fragments scattered in various locations in
`
`storage. Decl. ¶ 31 (Ex. 1102).
`
`3. Directories
`
`Directories are data structures that include references to files and/or other
`
`directories. Directories can be considered a particular type of a file. Decl. ¶ 32
`
`(Ex. 1102).
`
`4.
`
`Inodes
`
`An inode is a data structure that is used to represent a file. In the UNIX
`
`operating system, for example, the data structure has a number of fields, including
`
`a reference count, permissions (user, group, other), additional bits, all of which
`
`comprise metadata about the file, and a number of pointers that reference the actual
`
`data blocks that compose the file. Typically there are a number of pointers that
`
`point directly to data blocks. A pointer can also point to a block of pointers known
`
`as a “single indirect block,” wherein each pointer in the single indirect block points
`
`to other data blocks. A pointer can also point to a block of pointers known as a
`
`“double indirect block,” wherein each pointer in the double indirect block points to
`
`a single indirect block, which in turn has pointers to specific data blocks. Each
`
`6
`
`Page 10 of 66
`
`

`

`U.S. Patent No. 8,478,799
`Petition for Inter Partes Review
`
`additional layer of indirection increases the size of the file that can be represented
`
`by the inode. Over time, the term “inode” has come to mean any root data
`
`structure that provides basic access information to metadata and data blocks that
`
`represent a file. Decl. ¶ 33 (Ex. 1102).
`
`5. Content-Addressable File System
`
`In a content-addressable file system, each file is internally represented by a
`
`name (i.e., fingerprint), rather than by a pointer representing its location. Each file
`
`is assigned an integer number derived by a hash function, e.g., a cryptographic
`
`hash function, of the file’s contents. A cryptographic hash function maps data of
`
`arbitrary size (e.g., contents of a file), to a data of fixed size (e.g., an integer
`
`number). Human-readable names can then be associated to the integer number and
`
`be used to access the file. An advantage of this approach is that identical data will
`
`be stored only once, because two data objects that have the same content will end
`
`up having the same name, i.e., they will end up being represented as a single copy
`
`of the same object. Decl. ¶ 34 (Ex. 1102).
`
`B. Overview of the ’799 Patent
`
`The ’799 patent issued from U.S. App. No. 12/823,922, which was filed on
`
`June 25, 2010, and claims priority, as continuation-in-part application, to U.S.
`
`App. No. 12/823, 452 filed also on June 25, 2010, and to U.S. Provisional App.
`
`No. 61/269,633, filed on June 26, 2009. ’799 patent at cover page (Ex. 1101). The
`
`7
`
`Page 11 of 66
`
`

`

`U.S. Patent No. 8,478,799
`Petition for Inter Partes Review
`
`purported invention of the ’799 patent relates to computer file system data
`
`structures and to methods and apparatus for the naming and storing of files. ’799
`
`patent at 1:6-8 (Ex. 1101). Decl. ¶ 35 (Ex. 1102).
`
`1. Alleged Problem
`
`The ’799 patent purports to address inefficiencies of legacy file systems.
`
`Specifically, the ’799 patent concludes, without providing any particular
`
`explanation, that “legacy file systems have tight control of the what (content) and
`
`the where (placement of data). This co-mingling of what and where, largely an
`
`artifact of history, results in an architecture that is difficult to extend to modern
`
`storage needs.” See ’799 patent at 6:57-61 (Ex. 1101). Decl. ¶ 36 (Ex. 1102).
`
`2.
`
`Summary of Alleged Invention of the ’799 Patent
`
`The ’799 patent’s claimed file system includes components that are identical
`
`to those in the prior art. Specifically, both the claimed and prior art file systems
`
`have content addressable file systems implemented as a stack, where the stack is
`
`comprised of a file system layered over an underlying content addressable object
`
`store. Decl. ¶ 37 (Ex. 1102).
`
`Fig. 1 of the ’799 patent illustrates various storage components in an
`
`operating system kernel. ’799 patent at 10:25-26 (Ex. 1101). The claimed file
`
`system is composed of namespace file system 107 that is stacked on top of a
`
`lightweight object file system 108 (also referred to as an “Object Store”). ’799
`
`8
`
`Page 12 of 66
`
`

`

`U.S. Patent No. 8,478,799
`Petition for Inter Partes Review
`
`patent at 10:48-49 (Ex. 1101). An annotated Fig. 1 of the ’799 patent is
`
`reproduced below. Decl. ¶ 38 (Ex. 1102).
`
`’799 Patent: Fig. 1 (Ex. 1101)
`
`“The namespace file system […] has files, a directory structure, links, a
`
`superblock, and so forth. The namespace file system doesn’t contain data directly,
`
`instead all data is stored in objects.” ’799 patent at 8:48-51 (Ex. 1101). Decl. ¶ 39
`
`(Ex. 1102).
`
`“An object store […] is a flat collection of opaque data (objects). Each
`
`object is unique, and has reference counts […]. An object’s name is a
`
`cryptographic hash of the object’s content, i.e., change the content and the name
`
`9
`
`Page 13 of 66
`
`

`

`U.S. Patent No. 8,478,799
`Petition for Inter Partes Review
`
`must change. Any sufficiently strong cryptographic hash is acceptable for
`
`generating object names (fingerprints).” ’799 patent at 8:9-16 (Ex. 1101). Decl. ¶
`
`40 (Ex. 1102).
`
`An annotated Fig. 2, reproduced below, shows components of the object
`
`store. Specifically, “[o]bject store 108 contains binary, opaque objects, examples
`
`of which are P 201, Q 202 and R 203. […] Each object has a name (fingerprint),
`
`which is a cryptographic digest (hash) of the object’s entire content, plus some site
`
`specific salt. In FIG. 2, the object names are denoted by H(p), H(q) and H(r).”
`
`’799 patent at 11:1-13 (Ex. 1101). Decl. ¶ 41 (Ex. 1102).
`
`’799 Patent: Fig. 2 (Ex. 1101)
`
`10
`
`Page 14 of 66
`
`

`

`U.S. Patent No. 8,478,799
`Petition for Inter Partes Review
`
`“An index structure 204 keeps track of object names, object locations, and
`
`object references. An object’s reference is incremented every time the object is
`
`written. The namespace file system 107 may generate what it thinks are many
`
`copies of the same object; the object store 108 only stores one, but keeps track of
`
`how many the namespace actually thinks it has.” ’799 patent at 11:14-19 (Ex.
`
`1101). Decl. ¶ 42 (Ex. 1102).
`
`According to the ’799 patent, “[o]bjects are relatively small, and frequently
`
`larger data structures are needed. The structure that aggregates objects is called an
`
`hnode.” ’799 patent at 8:51-53 (Ex. 1101). “An hnode, in the present
`
`embodiment, is a data structure that ties together content, such as a file.” Id, at
`
`8:58-59. FIG. 4, which is reproduced below, illustrates components of an hnode
`
`structure 401. “The hnode uses object identifiers (fingerprints) to identify content,
`
`rather than physical/logical block addressing that legacy inodes use. An hnode is a
`
`sequence of content, like a file, that can be randomly read, written, appended to,
`
`created, deleted and truncated.” ’799 patent at 12:52-57 (Ex. 1101). Decl. ¶ 43
`
`(Ex. 1102).
`
`11
`
`Page 15 of 66
`
`

`

`U.S. Patent No. 8,478,799
`Petition for Inter Partes Review
`
`’799 Patent: Fig. 4 (Ex. 1101)
`
`As the ’799 patent explains, “[a] data sequence is broken into discrete
`
`objects, for example, S 410, T 411 and U 412 in FIG. 4. The names of each object
`
`[comprising the content of the object represented by the hnode] are stored in a
`
`mapping table 402, which records the fingerprints of each of S, T and U.” ’799
`
`patent at 12:63-66 (Ex. 1101). Decl. ¶ 44 (Ex. 1102).
`
`12
`
`Page 16 of 66
`
`

`

`U.S. Patent No. 8,478,799
`Petition for Inter Partes Review
`
`’799 Patent: Fig. 5 (Ex. 1101)
`
`“A file 504 may be a thin wrapper that makes an hnode appear as a normal
`
`[…] file that can be opened, closed, read, written, and so forth. A directory 505 is
`
`another interpretation of an hnode 401. A directory 505 is a mapping 501 of inode
`
`numbers (an integer) to file names (a string).” ’799 patent at 13:28-33 (Ex. 1101);
`
`Decl. ¶ 45 (Ex. 1102).
`
`“An imap (“inode map”) 502 translates inode numbers (from directory 501)
`
`into an object digest (fingerprint). The object may represent an hnode (and
`
`therefore by extension, a file, directory or other imap), a structure such as a
`
`superblock, or other data.” ’799 patent at 13:37-41 (Ex. 1101). Decl. ¶ 46 (Ex.
`
`13
`
`Page 17 of 66
`
`

`

`U.S. Patent No. 8,478,799
`Petition for Inter Partes Review
`
`1102).
`
`According to the ‘799 patent, an imap “converts an inode number into an
`
`object fingerprint (name),” ’799 patent at 9:9-10 (Ex. 1101) and “enables the rest
`
`of the namespace file system to deal with inode numbers, which is essential, as
`
`many user level utilities need to see such a construct. In some sense, this provides
`
`an additional layer of indirection (or virtualization) over a traditional static inode
`
`table.” Id. at 9:13-17 (Ex. 1101). Decl. ¶ 47 (Ex. 1102).
`
`But as explained below, there is nothing novel about a content addressable
`
`file system, implemented as a stack of two file systems, that provide mappings of
`
`fingerprints to file system structures. Decl. ¶ 48 (Ex. 1102).
`
`3.
`
`The Challenged Claims
`
`This petition challenges claims 1-2, 7-13, 17-20, 27, and 33-35 of the ’799
`
`patent. Independent claim 1 describes a computer file system for naming and
`
`storing of files on one or more computer storage devices. ’799 patent at claim 1
`
`(Ex. 1101). Claim 1 also specifies additional well known features, including an
`
`object store holding objects having object fingerprints derived from the content of
`
`the object, as noted below. Decl. ¶ 49 (Ex. 1102).
`
`1. A computer file system for naming and storing of files on
`one or more computer storage devices, the system comprising:
`a namespace file system accessing an object store, the system
`
`14
`
`Page 18 of 66
`
`

`

`U.S. Patent No. 8,478,799
`Petition for Inter Partes Review
`
`including a memory and a hardware processor in communication with
`the memory, the processor for executing program instructions for
`accessing the object store using object fingerprints, the object store
`holding files, data and metadata as objects, each object having a
`globally unique object fingerprint derived from the content of the
`object and used to access the object store, wherein:
`each file object comprising a mapping of object fingerprints for
`the data objects or metadata objects of the file and the file object
`having its own object fingerprint derived from the fingerprints of the
`objects in the file, and wherein the object store further includes:
`an inode map object comprising a mapping of file system inode
`numbers and object fingerprints enabling the inode numbers to stay
`constant while the object fingerprints change as the file content
`changes; and
`directory objects, each directory object comprising a mapping
`of inode numbers and file names;
`wherein each of the inode map object and directory object has
`its own object fingerprint derived from the content of the respective
`object.
`The dependent claims add well-known details such as a root object, a tree
`
`structure, an indirection table, and a virtual file system layer. Decl. ¶ 50 (Ex.
`
`1102).
`
`4.
`
`Prosecution History
`
`The ’799 patent issued from U.S. App. No. 12/823,922, which was filed on
`
`June 25, 2010. The ’799 patent is a continuation-in-part application, to U.S. App.
`
`15
`
`Page 19 of 66
`
`

`

`U.S. Patent No. 8,478,799
`Petition for Inter Partes Review
`
`No. 12/823, 452 filed also on June 25, 2010, and to U.S. Provisional App. No.
`
`61/269,633, filed on June 26, 2009. As explained below, Applicant identified the
`
`following allegedly novel features of the invention:
`
`(cid:120) content derived fingerprints;
`
`(cid:120) file objects comprising a mapping of object fingerprints for the data
`
`objects and/or metadata objects of the file;
`
`(cid:120) an inode map object comprising a mapping of file system inode
`
`numbers and object fingerprints; and
`
`(cid:120) directory objects comprising a mapping of inode numbers and file
`
`names.
`
`Each of these features was disclosed in the prior art years before the priority
`
`date of the ’799 patent. Decl. ¶ 52 (Ex. 1102).
`
`On August 30, 2012, the Examiner rejected the claims in light of various
`
`prior art references.1 (Office Action dated Aug. 30, 2012 (Ex. 1106)). For
`
`example, claim 1 (application claim 13) was rejected over U.S. Publication No.
`
`2004/0148306 (“Moulton”) (Ex. 1107) and “Venti: A New Approach to Archival
`
`Storage” (“Quinlan”) (Ex. 1108). The Office Action asserted that Moulton
`
`discloses a namespace file system where files, data and metadata are objects, each
`
`
`1 The claims were also rejected under 35 U.S.C. §§ 101 and 112.
`
`16
`
`Page 20 of 66
`
`

`

`U.S. Patent No. 8,478,799
`Petition for Inter Partes Review
`
`object having a globally unique fingerprint derived from the content of the object,
`
`and each file object having a globally unique fingerprint derived from the content
`
`of the object. (Id. at 12-14.) The Office Action also asserted that Quinlan
`
`discloses a mapping of inode numbers to file object fingerprints. (Id. at 15.)
`
`On December 18, 2012, the applicant responded by amending the claims to
`
`include features such as “an inode map object” and “directory objects comprising a
`
`mapping of inode numbers and file names.” (Applicant’s Response dated
`
`December 18, 2012 at 2 (Ex. 1109). The applicant also cancelled some claims and
`
`added new claims further specifying the file system. The applicant argued that the
`
`amended claims with the additional limitations were distinct from the prior art
`
`because allegedly the invention stored “metadata as objects” and because the prior
`
`art did not disclose file objects comprising a mapping of object fingerprints, an
`
`inode map object comprising a mapping of file system inode numbers and object
`
`fingerprints, and directory objects comprising a mapping of inode numbers and file
`
`names. (Id. at 11.)
`
`On February 22, 2013, the Examiner rejected the amended claims in light of
`
`various new prior art references.2 (Final Office Action dated Feb. 22, 2013 (Ex.
`
`1110)). For example, claim 1 (application claim 13) was rejected over “JFS
`
`
`2 The claims were also rejected under 35 U.S.C. §§ 101 and 112.
`
`17
`
`Page 21 of 66
`
`

`

`U.S. Patent No. 8,478,799
`Petition for Inter Partes Review
`
`Layout: How the Journaled File System Handles the On-Disk Layout” to Steve
`
`Best and Dave Kleikamp (“Best”) (Ex. 1111). The Office Action asserted that
`
`Best disclosed all the limitations of then-pending application claim 13 (patent
`
`claim 1). (Id. at 11-12.)
`
`On May 8, 2013, the applicant responded by amending the independent
`
`claims to include features such as “each of the inode map object and directory
`
`object has its own object fingerprint derived from the content of the respective
`
`object.” (Applicant’s Response dated May 8, 2013 at 8 (Ex. 1112.)
`
`On May 29, 2014, the newly amended claims were allowed. (Notice of
`
`Allowance dated May 29, 2013) (Ex. 1113). The Examiner further amended the
`
`claims to overcome the 35 U.S.C. § 101 rejections, namely by adding a memory
`
`and hardware processor components. (Id. at 3.)
`
`The Examiner, however, did not consider Atkin or Li. As discussed below,
`
`Atkin, alone or in combination with Li and other references, discloses the
`
`limitations the applicant has identified as allegedly novel, and, therefore, render the
`
`challenged claims unpatentable.
`
`VI. OVERVIEW OF THE PRIMARY PRIOR ART REFERENCES
`
`The claimed invention of the ’799 patent – using content addressing in a file
`
`system implemented as a stack including two distinct storage systems – was well-
`
`known as of the June 26, 2009 priority date. Decl. ¶ 59 (Ex. 1102). Each of the
`
`18
`
`Page 22 of 66
`
`

`

`U.S. Pa

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket