throbber
Case3:12-cv-00700-SI Document81 Filed11/13/12 Page1 of 22
`
`
`
`QUINN EMANUEL URQUHART &
`SULLIVAN, LLP
`Jennifer A. Kash (Bar No. 203679)
`jenniferkash@quinnemanuel.com
`50 California Street, 22nd Floor
`San Francisco, California 94111
`Telephone: (415) 875-6600
`Facsimile: (415) 875-6700
`
`Amar L. Thakur (Bar No. 194025)
`amarthakur@quinnemanuel.com
`865 South Figueroa Street, 10th Floor
`Los Angeles, CA 90017-2543
`Telephone: (213) 443 3000
`Facsimile: (213) 443 3100
`
`Dave Nelson*
`davenelson@quinnemanuel.com
`Chris Lawnicki*
`chrislawnicki@quinnemanuel.com
`500 West Madison Street, Suite 2450
`Chicago, IL 60661
`Telephone: (312) 705-7400
`Facsimile: (312) 705-7401
`
`Kate Cassidy*
`katecassidy@quinnemanuel.com
`51 Madison Avenue, 22nd Floor
`New York, NY 10010
`Telephone: (212) 849-7000
`Facsimile: (212) 849-7100
`
`*Admitted pro hac vice
`
`Attorneys for Symantec Corporation.
`
`UNITED STATES DISTRICT COURT
`
`NORTHERN DISTRICT OF CALIFORNIA
`
`SAN FRANCISCO DIVISION
`
`
`
`Plaintiff
`
`vs.
`
`SYMANTEC CORPORATION,
`
`
`
`
`
`VEEAM SOFTWARE CORPORATION,
`
`
`
`
`
`SYMANTEC CORP.'S OPENING
`CLAIM CONSTRUCTION BRIEF
`
`Case No. 3:12-cv-00700-SI (consolidated for
`all purposes with Case No. 3:2012-cv-01035
`SI)
`
`Defendant.
`
`03869.30080/5053709.1 SYMANTEC CORP.'S OPENING
`CLAIM CONSTRUCTION BRIEF
`
`
`
`Case No. 3:12-cv-00700-SI
`
`1 2 3 4 5 6 7 8 9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`

`

`Case3:12-cv-00700-SI Document81 Filed11/13/12 Page2 of 22
`
`
`
`TABLE OF CONTENTS
`
`Page
`
`I.
`
`INTRODUCTION ...............................................................................................................1
`
`II.
`
`LEGAL STANDARDS .......................................................................................................1
`
`III.
`
`U.S. PATENT NO. 6,931,558 .............................................................................................2
`
`A.
`
`B.
`
`Overview of the '558 Patent Technology .................................................................2
`
`Terms for Construction ............................................................................................3
`
`1.
`
`2.
`
`Client device ................................................................................................3
`
`Network boot ...............................................................................................4
`
`IV.
`
`U.S. PATENT NO. 7,093,086 .............................................................................................5
`
`A.
`
`B.
`
`Overview of the '086 Patent Technology .................................................................5
`
`Terms for Construction ............................................................................................5
`
`1.
`
`2.
`
`a state of [first] virtual machine ...................................................................5
`
`suspending the [first] virtual machine is performed responsive to a
`suspend command ........................................................................................7
`
`V.
`
`U.S. PATENT NO. 7,191,299 .............................................................................................8
`
`A.
`
`B.
`
`Overview of the '299 Patent Technology .................................................................8
`
`Terms for Construction ............................................................................................8
`
`1.
`
`2.
`
`storage object ...............................................................................................8
`
`Synchroniz[e][ing] said first point-in-time copy of said first storage
`volume and said second storage volume ......................................................9
`
`VI.
`
`U.S. PATENT NO. 7,254,682 ...........................................................................................11
`
`A.
`
`B.
`
`Overview of the '682 Patent Technology ...............................................................11
`
`Terms for Construction ..........................................................................................11
`
`1.
`
`2.
`
`3.
`
`storage volume ...........................................................................................11
`
`deleting . . . item.........................................................................................12
`
`imag[ing] . . . item ......................................................................................13
`
`03869.30080/5053709.1
`SYMANTEC CORP.'S OPENING
`CLAIM CONSTRUCTION BRIEF
`
`i
`
`
`Case No. 3:12-cv-00700-SI
`
`1 2 3 4 5 6 7 8 9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`

`

`Case3:12-cv-00700-SI Document81 Filed11/13/12 Page3 of 22
`
`
`
`4.
`
`snapshot view .............................................................................................14
`
`VII. CONCLUSION ..................................................................................................................15
`
`
`03869.30080/5053709.1
`SYMANTEC CORP.'S OPENING
`CLAIM CONSTRUCTION BRIEF
`
`ii
`
`
`Case No. 3:12-cv-00700-SI
`
`1 2 3 4 5 6 7 8 9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`

`

`Case3:12-cv-00700-SI Document81 Filed11/13/12 Page4 of 22
`
`
`
`TABLE OF AUTHORITIES
`
`Cases
`
`Page
`
`CCS Fitness, Inc. v. Brunswick Corp.,
`288 F.3d 1359 (Fed. Cir. 2002)................................................................................................12
`
`Falana v. Kent State University,
`669 F.3d 1349 (Fed. Cir. 2012)..........................................................................................13, 15
`
`Kara Tech. Inc. v. Stamps.com Inc.,
`582 F.3d 1341 (Fed. Cir. 2009)..................................................................................................7
`
`MBO Laboratories, Inc. v. Becton, Dickinson & Co.,
`474 F.3d 1323 (Fed. Cir. 2007)................................................................................................11
`
`Martek Biosciences Corp. v. Nutrinova, Inc.,
`579 F.3d 1363 (Fed. Cir. 2009)..................................................................................................2
`
`Nazomi Communications, Inc. v. ARM Holdings, PLC,
`403 F.3d 1364 (Fed. Cir. 2005)..................................................................................................5
`
`Phillips v. AWH Corp.,
`415 F.3d 1303 (Fed. Cir. 2005)..........................................................................................1, 2, 6
`
`Thorner v. Sony Computer Entertainment America LLC,
`669 F.3d 1362 (Fed. Cir. 2012)..............................................................................................3, 4
`
`Verizon Services Corp. v. Vonage Holdings Corp.,
`503 F.3d 1295 (Fed. Cir. 2007)................................................................................................15
`
`Vitronics Corp. v. Conceptronic, Inc.,
`90 F.3d 1576 (Fed. Cir. 1996)..............................................................................................1, 12
`
`Rules
`
`Local Patent Rule 4-5(a) ..................................................................................................................1
`
`
`
`03869.30080/5053709.1
`SYMANTEC CORP.'S OPENING
`CLAIM CONSTRUCTION BRIEF
`
`iii
`
`
`Case No. 3:12-cv-00700-SI
`
`1 2 3 4 5 6 7 8 9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`

`

`Case3:12-cv-00700-SI Document81 Filed11/13/12 Page5 of 22
`
`EXPLANATION OF CITATION FORMS
`
`
`
`Emphasis
`
`•
`
`•
`
`For emphasis, text has been both bolded and italicized.
`
`Internal citations to quoted authorities have been omitted.
`
`Declarations and Exhibits
`
`•
`
`•
`
`•
`
`•
`
`•
`
`Citations to “Thakur Decl., Ex. ” are citations to exhibits to the Declaration of Amar L.
`Thakur in Support of Symantec Corp.’s opening Claim Construction Brief, submitted on
`November 13, 2012.
`
`Citations to “‘558 patent” are citations to Thakur Decl., Ex. B (‘558 Patent).
`
`Citations to “‘086 patent” are citations to Thakur Decl., Ex. C (‘086 Patent).
`
`Citations to “‘299 patent” are citations to Thakur Decl., Ex. D (‘299 Patent).
`
`Citations to “‘086 patent” are citations to Thakur Decl., Ex. E (‘086 Patent).
`
`Column and line citations to the patents appear as column:line-line. For example, column 5,
`lines 1-3 would be cited as 5:1-3.
`
`
`03869.30080/5053709.1
`SYMANTEC CORP.'S OPENING
`CLAIM CONSTRUCTION BRIEF
`
`1
`
`
`Case No. 3:12-cv-00700-SI
`
`1 2 3 4 5 6 7 8 9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`

`

`Case3:12-cv-00700-SI Document81 Filed11/13/12 Page6 of 22
`
`
`
`Plaintiff Symantec Corporation (“Symantec”) submits this opening brief in support of its
`
`proposed constructions for the disputed terms of its patents asserted against Defendant Veeam
`
`Software Corporation (“Veeam”) under Local Patent Rule 4-5(a).
`
`I.
`
`INTRODUCTION
`
`The four patents asserted by Symantec are U.S. Patent Numbers 6,931,558 (“the ‘558
`
`patent”), 7,093,086 (“the ‘086 patent”), 7,191,299 (“the ‘299 patent”) and 7,254,682 (“the ‘682
`
`patent”). These patents cover technologies for backing up and recovering data stored on
`
`computer systems.
`
`As set forth in the Joint Claim Construction Statement (Dkt. 73), the parties agree on the
`
`1 2 3 4 5 6 7 8 9
`
`10
`
`construction of four terms in these patents. They disagree on the remaining terms.
`
`11
`
`12
`
`II.
`
`LEGAL STANDARDS
`
`The words of a claim are generally given the “ordinary and customary meaning” they
`
`13
`
`would have to a person of ordinary skill in the art at the time of the invention. Phillips v. AWH
`
`14
`
`Corp., 415 F.3d 1303, 1312-13 (Fed. Cir. 2005) (en banc). For some claim terms, that meaning
`
`15
`
`may be readily apparent so that construction “involves little more than the application of the
`
`16
`
`widely accepted meaning of commonly understood words.” Id. at 1314. However, the meaning
`
`17
`
`of a claim term as understood by persons of skill in the art is not always immediately apparent.
`
`18
`
`Id. In such cases, “the court looks to those sources available to the public that show what a
`
`19
`
`person of skill in the art would have understood disputed claim language to mean.” Id. Those
`
`20
`
`sources include both intrinsic evidence (the claims, specification, and prosecution history) and
`
`21
`
`extrinsic evidence (e.g., dictionary definitions and treatises) concerning relevant scientific
`
`22
`
`principles and the meaning of technical terms. Id. at 1314; Vitronics Corp. v. Conceptronic, Inc.,
`
`23
`
`90 F.3d 1576, 1582-83 (Fed. Cir. 1996). However, courts should be cautious in using extrinsic
`
`24
`
`evidence because it “is unlikely to result in a reliable interpretation of patent claim scope unless
`
`25
`
`considered in the context of the intrinsic evidence.” Phillips, 415 F.3d at 1319.
`
`26
`
`The claims themselves, including the context surrounding the words of the claim, provide
`
`27
`
`substantial guidance as to the meaning of particular claim terms. Phillips, 415 F.3d at 1314.
`
`28
`
`03869.30080/5053709.1
`SYMANTEC CORP.'S OPENING
`CLAIM CONSTRUCTION BRIEF
`
`1
`
`
`Case No. 3:12-cv-00700-SI
`
`

`

`Case3:12-cv-00700-SI Document81 Filed11/13/12 Page7 of 22
`
`
`
`Other claims of the patent can also be instructive, because “claim terms are normally used
`
`consistently throughout the patent.” Id.
`
`The claims “must be read in view of the specification, of which they are a part.” Id. at
`
`1315, 1323. For example, “the specification may reveal a special definition given to a claim term
`
`by the patentee that differs from the meaning it would otherwise possess.” Id. at 1316. If so, the
`
`inventor’s definition governs. Martek Biosciences Corp. v. Nutrinova, Inc., 579 F.3d 1363,
`
`1382 (Fed. Cir. 2009); Phillips, 415 F.3d at 1316. Nevertheless, courts must be careful not to
`
`import limitations from the specification into the claim. Phillips, 415 F.3d at 1323. “For
`
`instance, although the specification often describes very specific embodiments of the invention,”
`
`1 2 3 4 5 6 7 8 9
`
`10
`
`the Federal Circuit has “repeatedly warned against confining the claims to those embodiments.”
`
`11
`
`Id.
`
`12
`
`13
`
`14
`
`III. U.S. PATENT NO. 6,931,558
`
`A.
`
`Overview of the '558 Patent Technology
`
`The ‘558 patent is entitled “Computer restoration systems and methods” and is directed
`
`15
`
`to recovering data after a major failure of a client device. ‘558 patent at 3:10-17. In traditional
`
`16
`
`computing systems, major failures could prevent the computing system from booting up, and this
`
`17
`
`presented problems to system administrators. Id. at 1:16-19. The administrator would be forced
`
`18
`
`to reconfigure the operating system, applications, drivers, and other settings. Id. at 1:21-27. In
`
`19
`
`addition, a boot disk was required at the location of the failed machine, and boot disks were not
`
`20
`
`typically present at the location of each computing system on a network. Id. at 1:28-35. These
`
`21
`
`problems made restoration of computing devices an inconvenient and time-consuming process.
`
`22
`
`Id. at 1:35-41.
`
`23
`
`The invention of the ‘558 patent solved these problems by simplifying the restoration of
`
`24
`
`data to a client device. Under the invention of the ‘558 patent, configuration and application data
`
`25
`
`could be backed up from a client device over a network, and later restored to a client device over
`
`26
`
`the network. Id. at 3:10-17. The backing up of configuration information saved the need for the
`
`27
`
`system administrator to reconfigure the device upon restoration, and the ability to restore the
`
`28
`
`03869.30080/5053709.1
`SYMANTEC CORP.'S OPENING
`CLAIM CONSTRUCTION BRIEF
`
`2
`
`
`Case No. 3:12-cv-00700-SI
`
`

`

`Case3:12-cv-00700-SI Document81 Filed11/13/12 Page8 of 22
`
`
`
`device over the network eliminated the need for the system administrator to be present at the
`
`location of the client device with a boot disk.
`
`B.
`
`Terms for Construction
`
`Client device
`
`1.
`
`Symantec's Proposed Construction
`any processing or communications device
`capable of communicating with the server
`device over the network
`
`
`Veeam's Proposed Construction
`the physical computer that is to be restored
`
`Every asserted claim from the ‘558 patent requires a client device. Symantec contends
`
`that, consistent with the specification, this term is broad enough to encompass both physical and
`
`virtual devices. Veeam argues that these are limited to physical devices despite a lack of
`
`disclaimer in the intrinsic evidence. Veeam’s attempt to read this unsupported limitation into the
`
`claims is important, because it is an attempt to exclude restoration of virtual machines1 from the
`
`scope of the claims.
`
`Symantec’s proposed construction reflects the scope of the description of the “client
`
`device” term in the specification. The specification defines a client computer as “any processing
`
`or communications device that is capable of communicating with the server computer 104 over
`
`the network 100.” ‘558 patent at 4:5-10 (emphasis added). Furthermore, the specification evinces
`
`no intent to limit these devices to any particular type of device, physical or otherwise. The full
`
`scope of the definition from the specification should apply. See Thorner v. Sony Computer
`
`Entertainment America LLC, 669 F. 3d 1362, 1367 (Fed. Cir. 2012).
`
`Veeam improperly narrows the scope of these terms in two ways. First, Veeam replaces
`
`the claim term “device” with the word “computer.” The specification discloses that the term
`
`“device” encompasses computers, but is not limited to computers:
`
`[C]ombinations of client devices, such as the client computer 106 and others, as
`well as server devices, such as the server computer 104, its various server
`components 300, and others, including, for example, those elements, pluralities of
`any, certain ones, all of those elements, and even additional or alternative
`
`
`1 A virtual machine is a collection of resources running on a physical machine that appears as an
`independent physical machine to executing top level operating systems and applications.
`03869.30080/5053709.1
`3
`SYMANTEC CORP.'S OPENING
`
`CLAIM CONSTRUCTION BRIEF
`
`Case No. 3:12-cv-00700-SI
`
`1 2 3 4 5 6 7 8 9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`

`

`Case3:12-cv-00700-SI Document81 Filed11/13/12 Page9 of 22
`
`
`
`elements, and other combinations, are all possible in keeping with the scope of the
`embodiments herein.
`
`‘558 patent at 9:15-22. Replacing “device” with the narrower “computer” is not justified here.
`
`Second, Veeam imports the requirement that this claim term is limited to a “physical”
`
`computer. As noted above, the specification describes a client computer as any processing device
`
`that is capable of communicating with a server computer. Any device that falls within this
`
`definition, whether physical or virtual, is within the scope of the claims. The full claim scope
`
`applies “unless the patentee explicitly redefines the term or disavows its full scope.” Thorner,
`
`669 F.3d at 1367. The patentee neither defined the term to include only physical devices, nor did
`
`the patentee disavow virtual devices.
`
`Network boot
`
`2.
`
`
`Claim
`Limitation
`network boot
`
`Symantec's Proposed
`Construction
`operation that starts or resets a
`client device over the network
`
`Veeam's Proposed Construction
`
`a process that retrieves and loads a boot
`image over a network accessed by the
`client device rather than from a local disk
`
`Claims 1 and 18 of the ‘558 patent recite the “network boot” limitation. Veeam imports
`
`an additional limitation (“boot image”), itself a disputed claim term, presumably to allow Veeam
`
`the non-infringement arguments available to it under its “boot image” construction.
`
`The plain meaning of “network boot” is an operation that starts or resets a device over the
`
`network, and the specification reflects this usage. See, e.g., ‘558 patent at Abstract (“The client
`
`device is booted over the network, rather than locally to the client device by boot disk or
`
`otherwise.”); 6:43-45 (“The client boot program is delivered over the network 100 to the client
`
`computer 106 once the client computer 106 initializes over the network in a network boot
`
`operation.”). Symantec’s construction captures the meaning used in the specification.
`
`Veeam’s proposed construction imports limitations not required by the intrinsic evidence.
`
`In particular, Veeam requires the network boot to “retrieve[] and load[] a boot image.” The
`
`patent specification treats the network boot and the boot image as separate and distinct concepts
`
`in the restore process. See, e.g., ‘558 patent at Fig. 6 (illustrating “network[] boot” as step 602,
`
`later followed by copying to the client “the boot image from boot server” at step 606). Moreover,
`
`03869.30080/5053709.1
`SYMANTEC CORP.'S OPENING
`CLAIM CONSTRUCTION BRIEF
`
`4
`
`
`Case No. 3:12-cv-00700-SI
`
`1 2 3 4 5 6 7 8 9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`

`

`Case3:12-cv-00700-SI Document81 Filed11/13/12 Page10 of 22
`
`
`
`claim 18 recites the “network boot” limitation, yet includes no reference to a boot image. Claim
`
`19, which depends on claim 18, adds the “boot image” limitation. This creates a presumption
`
`under the doctrine of claim differentiation that the boot image is not required by claim 18. See
`
`Nazomi Communications, Inc. v. ARM Holdings, PLC, 403 F.3d 1364, 1370 (Fed. Cir. 2005)
`
`(“The concept of claim differentiation ‘normally means that limitations stated in dependent
`
`claims are not to be read into the independent claim from which they depend.’”).
`
`IV. U.S. PATENT NO. 7,093,086
`
`A.
`
`Overview of the '086 Patent Technology
`
`The ‘086 patent is directed to backup and disaster recovery mechanisms in computer
`
`1 2 3 4 5 6 7 8 9
`
`10
`
`systems, particularly those involving virtual machines. ‘086 patent at 1:8-10. Virtual machines
`
`11
`
`are software implementations of physical machines, and include virtual hardware capable of
`
`12
`
`running operating systems and other applications. Id. at 3:27-4:6. These virtual machines include
`
`13
`
`virtual disks, which are mapped to physical disks. Id. at 3:61-63. Just as with physical machines,
`
`14
`
`the data on a virtual machine must be backed up in case the data is lost.
`
`15
`
`The ‘086 patent addresses issues related to backing up the state of a virtual machines so
`
`16
`
`that in the event of a disaster, the captured state from the virtual machine is preserved. Id. at
`
`17
`
`1:46-59. In particular, the ‘086 patent teaches that the state may be captured either while the
`
`18
`
`virtual machine continues execution, or by suspending the virtual machine and copying the state
`
`19
`
`from the suspended virtual machine. Id. at 3:17-20.
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`B.
`
`Terms for Construction
`
`1.
`
`Symantec's Proposed Construction
`information regarding the first virtual
`machine
`
`a state of [first] virtual machine
`
`Veeam's Proposed Construction
`at least a portion of a virtual machine's memory
`and disk(s) to permit the virtual machine to
`resume execution of the application at the point
`in time the state was captured
`
`
`Symantec contends that the term “a state of a first virtual machine” is used broadly by the
`
`specification to describe information regarding a first virtual machine. Veeam’s proposed
`
`construction imports limitations that improperly narrow the claims.
`
`03869.30080/5053709.1
`SYMANTEC CORP.'S OPENING
`CLAIM CONSTRUCTION BRIEF
`
`5
`
`
`Case No. 3:12-cv-00700-SI
`
`

`

`Case3:12-cv-00700-SI Document81 Filed11/13/12 Page11 of 22
`
`
`
`The ‘086 patent specification describes a variety of data that may be included as part of
`
`the state of a virtual machine:
`
`The state may include not only files written by the application, but uncommitted
`changes to files which may still be in the memory within the virtual machine, the
`state of the hardware (including the processor 32, the memory in the virtual
`machine, etc.) within the virtual machine, etc.
`
`
`‘086 patent at 4:28-33. Individual claims recite the particular data that is required of the state for
`
`that claim. For example, claim 1 of the ‘086 patent requires instructions that “capture a state of a
`
`first virtual machine . . . wherein the state of the first virtual machine comprises the at least one
`
`file.” ‘086 patent at claim 1. See also id. at claim 9 (reciting instructions for capturing the first
`
`state wherein “the first state includes the first virtual disk and a corresponding log of
`
`uncommitted updates to the first virtual disk”).
`
`“[T]he claims of a patent define the invention to which the patentee is entitled the right to
`
`exclude.’” Phillips, 415 F.3d at 1312. The language of the asserted claims requires “a state of a
`
`first virtual machine” to “comprise[]the at least one file.” This is reinforced by the prosecution
`
`history, which teaches that “[t]he state of the first virtual machine comprises the file.” See, e.g.,
`
`Thakur Decl., Ex. A (‘086 patent, 7/22/05 App. Br. at 3-4). See also Phillips, 415 F.3d at 1317
`
`(explaining that “a court ‘should also consider the patent's prosecution history, if it is in
`
`evidence.’”). The patent specification uses the term “state” broadly to potentially include any of
`
`a variety of information regarding the virtual machine, and the construction should reflect this
`
`usage. See Phillips, 415 F.3d at 1315.
`
`Veeam’s proposed construction should be rejected because it improperly restricts the
`
`scope of this limitation. The claims require the state to “comprise[] the at least one file.” See
`
`‘086 patent at claims 1, 12. Veeam argues that the state must also include “at least a portion of
`
`a virtual machine's memory.” The requirement that the state also include “at least a portion of the
`
`memory” is notably missing from these claims, and Veeam should not be permitted to add this
`
`limitation.
`
`Veeam’s proposed construction also adds the requirement that the captured state “permit
`
`the virtual machine to resume execution of the application at the point in time the state was
`
`03869.30080/5053709.1
`SYMANTEC CORP.'S OPENING
`CLAIM CONSTRUCTION BRIEF
`
`6
`
`
`Case No. 3:12-cv-00700-SI
`
`1 2 3 4 5 6 7 8 9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`

`

`Case3:12-cv-00700-SI Document81 Filed11/13/12 Page12 of 22
`
`
`
`captured.” This goes beyond the language of the claim, and has no basis or support in the
`
`specification, which requires only that the state comprise the at least one file.
`
`
`2.
`
`suspending the [first] virtual machine is performed responsive to a
`suspend command
`
`
`
`Symantec's Proposed Construction
`in response to receiving a suspend
`command, pausing the execution of the
`virtual machine
`
`
`
`Veeam's Proposed Construction
`in response to receiving a suspend command,
`pausing the execution of the virtual machine and
`storing the state on a storage device to which the
`first virtual machine is suspendable
`
`The parties agree that “suspending” requires pausing the execution of a virtual machine
`
`in response to a suspend command. Veeam, however, imports an additional limitation not
`
`required by the claims.
`
`Veeam attempts to read in the requirement that “suspending” the virtual machine not only
`
`suspends the virtual machine, but also stores the state to a particular storage device. The
`
`specification discloses that the state may be stored on a storage device in response to the suspend
`
`command, but there is no requirement that the state must be stored in response to the suspend
`
`command. See ‘086 patent at 4:18-28. Veeam’s attempt to import an embodiment from the
`
`specification should be rejected. See Kara Tech. Inc. v. Stamps.com Inc., 582 F.3d 1341, 1348
`
`(Fed. Cir. 2009) (“The patentee is entitled to the full scope of his claims, and we will not limit
`
`him to his preferred embodiment or import a limitation from the specification into the claims.”).
`
`Under Veeam’s construction, the system could receive a suspend command and pause the virtual
`
`machine, yet still not meet this limitation. The specification does not limit the term “suspending”
`
`in this manner.
`
`Veeam’s construction is inconsistent with the claim language as well. Claim 1 recites a
`
`“first virtual machine compris[ing] at least one virtual disk storing at least one file used by at
`
`least one application executing in the first virtual machine, and wherein the state of the first
`
`virtual machine comprises the at least one file” (emphasis added). The state comprises the file,
`
`and the file is already stored on a storage device; there is no need to store the state (which
`
`03869.30080/5053709.1
`SYMANTEC CORP.'S OPENING
`CLAIM CONSTRUCTION BRIEF
`
`7
`
`
`Case No. 3:12-cv-00700-SI
`
`1 2 3 4 5 6 7 8 9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`

`

`Case3:12-cv-00700-SI Document81 Filed11/13/12 Page13 of 22
`
`
`
`comprises the file) on another storage device when the virtual machine is suspended as Veeam
`
`proposes.
`
`V.
`
`U.S. PATENT NO. 7,191,299
`
`A.
`
`Overview of the '299 Patent Technology
`
`The ‘299 patent is entitled “Method and system of providing periodic replication” and
`
`teaches a system for replicating data from one computing system to another. The ‘299 patent
`
`teaches that by using replication, a “copy of data is distributed and stored at one or more remote
`
`sites.” ‘299 patent at 1:21-24. The benefit of replicated data is that in the event of a system crash
`
`at a primary computing system, applications may be brought back online immediately at the
`
`1 2 3 4 5 6 7 8 9
`
`10
`
`replicated system. Id. at 9:19-24.
`
`11
`
`The ‘299 patent teaches a specific way of performing data replication, through the use of
`
`12
`
`what it calls a “snappoint storage object.” Id. at 5:11-24. The storage object, as recited by the
`
`13
`
`asserted claims, consists of two structures: a preserved copy of the primary storage volume as it
`
`14
`
`existed at a specific time (called a “point-in-time copy”), and a map used to track which data
`
`15
`
`blocks have changed since that point-in-time copy was captured. See, e.g., ‘299 patent at claim 1.
`
`16
`
`The replication software uses the point-in-time copy to replicate data from the from the primary
`
`17
`
`storage volume to the secondary storage volume. Id. at 4:25-29. By using the point-in-time copy
`
`18
`
`rather than the primary storage volume itself, the system can replicate the primary storage
`
`19
`
`volume without suspending access. Id. The map is used to track changes to the storage volume
`
`20
`
`with respect to the point-in-time copy, allowing incremental replication to be performed. Id. at
`
`21
`
`6:25-39. Incremental replication is more efficient than full replication because less data needs to
`
`22
`
`be copied.
`
`B.
`
`Terms for Construction
`
`storage object
`
`1.
`
`Symantec's Proposed Construction
`information about the changes to a volume
`with respect to a point in time image of that
`volume
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`
`
`Veeam's Proposed Construction
`a structure created to hold corresponding items
`
`03869.30080/5053709.1
`SYMANTEC CORP.'S OPENING
`CLAIM CONSTRUCTION BRIEF
`
`8
`
`
`Case No. 3:12-cv-00700-SI
`
`

`

`Case3:12-cv-00700-SI Document81 Filed11/13/12 Page14 of 22
`
`
`
`The term “storage object” is recited in claims 1, 5, 12-14, and 16 of the ‘299 patent.
`
`Symantec proposes that this term be given the meaning provided by the specification. Veeam
`
`proposes that this term be construed to require structure that is not required by the claims.
`
`According to the specification, a “snappoint storage object provides information about
`
`the changes to a volume with respect to a point in time image of that volume.” ‘299 patent at
`
`5:11-13. Symantec’s construction captures this meaning. This construction is consistent with the
`
`use of the term throughout the claims and the specification.
`
`Veeam’s interpretation requires the storage object to have distinct structure beyond the
`
`point-in-time copy and storage volume map required by the claims and specification. This finds
`
`1 2 3 4 5 6 7 8 9
`
`10
`
`no support in the intrinsic evidence. For example, Figures 4a through 4d, which illustrate
`
`11
`
`“storage objects,” do not include any independent structure for the storage object beyond the
`
`12
`
`point-in-time copy and the storage volume map. Similarly, Figure 2 shows “a ‘snappoint’ storage
`
`13
`
`object including a point-in-time copy 216 or ‘snapshot’ of said primary data volume 210a and a
`
`14
`
`data volume map 218.” ‘299 patent at 4:33-39. These are illustrated as separate entities, not
`
`15
`
`within a single structure created to hold these items. ‘299 patent at Figure 2. Veeam’s
`
`16
`
`construction imports additional structural limitations beyond what are required by the claims and
`
`17
`
`specification.
`
`2.
`
`Synchroniz[e][ing] said first point-in-time copy of said first storage
`volume and said second storage volume
`
`
`Symantec's Proposed Construction
`transferring a full or incremental copy of
`data from the point-in-time copy to the
`second storage volume
`
`
`
`Veeam's Proposed Construction
`initially copying all data from the point-in-time
`copy to the second storage volume so that only
`changes to the first storage volume will be
`copied thereafter
`
`The “synchronizing” term is recited in claims 1 and 14 of the ‘299 patent. Symantec’s
`
`construction recognizes that, consistent with the specification, the term “synchronizing” is not
`
`limited to initial synchronization. Veeam’s proposed construction limits the synchronizing term
`
`to a single embodiment in the specification and imports limitations that conflict with other
`
`expressly disclosed embodiments.
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`03869.30080/5053709.1
`SYMANTEC CORP.'S OPENING
`CLAIM CONSTRUCTION BRIEF
`
`9
`
`
`Case No. 3:12-cv-00700-SI
`
`

`

`Case3:12-cv-00700-SI Document81 Filed11/13/12 Page15 of 22
`
`
`
`The specification uses the term “synchronize” in the context of performing both full and
`
`incremental replications. For example, the specification discusses initial synchronization in
`
`which a full replica of the first storage volume is transferred to the second storage volume. See
`
`‘299 patent at 4:16-25. The specification also teaches that some prior art systems maintained
`
`synchronization by sending each primary data volume update to the replicated copy:
`
`When replicating synchronously, volume replicators 108 are used to maintain
`primary and secondary site data synchronization. A write request from
`application 102a to a synchronously replicated volume such as primary data
`volume

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket