throbber
Case3:12-cv-00700-SI Document105 Filed03/08/13 Page1 of 18
`
`IN THE UNITED STATES DISTRICT COURT
`FOR THE NORTHERN DISTRICT OF CALIFORNIA
`
`SYMANTEC CORPORATION,
`Plaintiff,
`
` v.
`VEEAM SOFTWARE CORPORATION,
`Defendant.
` /
`
`No. C 12-0700 SI
`CLAIM CONSTRUCTION ORDER
`
`On January 23, 2013, the Court held a Markman hearing regarding the construction of disputed
`terms in four patents owned by plaintiff. Having considered the arguments of counsel and the papers
`submitted, the Court construes the disputed terms as follows.
`
`BACKGROUND
`This is a patent infringement action initiated by plaintiff Symantec Corporation against defendant
`Veeam Corporation, pertaining to U.S. Patents No. 7,191,299 (‘299), No. 7,254,682 (‘682), No.
`6,931,558 (‘558) and No. 7,093,086 (‘086).1 The parties agree that none of the terms to be construed
`is case dispositive. Joint Claim Construction Statement (Dkt. 73) at 7. Symantec is a software provider
`which has developed and owns patents in backup and recovery software. The ‘299 patent (“Method and
`System of Providing Periodic Replication”) provides “solutions for storage life cycle management,” and
`the ‘682 patent (“Selective File and Folder Snapshot Image Creation”) teaches a “snapshot” method to
`
`1 The ‘299 and ‘682 patents are asserted in Case No. C 12-700. The ‘558 and ‘086 patents are
`asserted in Case No. 12-1035, which has been consolidated with Case No. C 12-700. All citations are
`to 12-700 unless otherwise indicated.
`
`1 2 3 4 5 6 7 8 9
`
`10
`11
`12
`13
`14
`15
`16
`17
`18
`19
`20
`21
`22
`23
`24
`25
`26
`27
`28
`
`For the Northern District of California
`For the Northern District of California
`
`United States District Court
`United States District Court
`
`Symantec 2001
`Veeam v. Symantec
`IPR2013-00150
`
`

`

`Case3:12-cv-00700-SI Document105 Filed03/08/13 Page2 of 18
`
`selectively back-up desired files. Compl. ¶¶ 25, 26. The ‘086 patent (“Disaster Recovery and Backup
`Using Virtual Machines”) teaches a method for a “distinct, remote backup” on a separate storage device,
`and the ‘558 patent (“Computer Restoration Systems and Methods”) provides for backup and restoration
`of an entire machine on a network in the event that the client device should become incapable of booting
`up on its own. Compl. ¶¶ 25, 26 (No. C 12-01035, Dkt. 1). Defendant Veeam produces the Backup &
`Replication software suite, which “provides image-based backup tools,” and competes with Symantec’s
`products in the market. Id. ¶ 28.
`
`LEGAL STANDARD
` Claim construction is a matter of law. Markman v. Westview Instr., Inc., 517 U.S. 370, 372
`(1996). Terms contained in claims are “generally given their ordinary and customary meaning. Phillips
`v. AWH Corp., 415 F.3d 1303, 1312 (Fed. Cir. 2005). “[T]he ordinary and customary meaning of a
`claim term is the meaning that the term would have to a person of ordinary skill in the art in question
`at the time of the invention.” Id. at 1312. In determining the proper construction of a claim, a court
`begins with the intrinsic evidence of record, consisting of the claim language, the patent specification,
`and, if in evidence, the prosecution history. Id. at 1313; see also Vitronics Corp. v. Conceptronic, Inc.,
`90 F.3d 1576, 1582 (Fed. Cir. 1996). “The appropriate starting point . . . is always with the language
`of the asserted claim itself.” Comark Communications, Inc. v. Harris Corp., 156 F.3d 1182, 1186 (Fed.
`Cir. 1998); see also Abtox, Inc. v. Exitron Corp., 122 F.3d 1019, 1023 (Fed. Cir. 1997).
`Accordingly, although claims speak to those skilled in the art, claim terms are construed in light
`of their ordinary and accustomed meaning, unless examination of the specification, prosecution history,
`and other claims indicates that the inventor intended otherwise. See Electro Medical Systems, S.A. v.
`Cooper Life Sciences, Inc., 34 F.3d 1048, 1053 (Fed. Cir. 1994). While claims are interpreted in light
`of the specification, this “does not mean that everything expressed in the specification must be read into
`all the claims.” Raytheon Co. v. Roper Corp., 724 F.2d 951, 957 (Fed. Cir. 1983). For instance,
`limitations from a preferred embodiment described in the specification generally should not be read into
`the claim language. See Comark, 156 F.3d at 1187; see also Decisioning.com, Inc. v. Federated Dep’t
`Stores, Inc., 527 F.3d 1300, 1314 (Fed. Cir. 2008) (“[The] description of a preferred embodiment, in the
`
`2
`
`1 2 3 4 5 6 7 8 9
`
`10
`11
`12
`13
`14
`15
`16
`17
`18
`19
`20
`21
`22
`23
`24
`25
`26
`27
`28
`
`For the Northern District of California
`
`United States District Court
`
`

`

`Case3:12-cv-00700-SI Document105 Filed03/08/13 Page3 of 18
`
`absence of a clear intention to limit claim scope, is an insufficient basis on which to narrow the
`claims.”); Howmedica Osteonics Corp. v. Wright Med. Tech., Inc., 540 F.3d 1337, 1345-46 (Fed. Cir.
`2008) (refusing to limit claim language to the disclosed embodiment in the absence on indication that
`the inventor meant to limit the claim language). However, it is a fundamental rule that “claims must be
`construed so as to be consistent with the specification.” Phillips, 415 F.3d at 1316.
`Finally, the Court may consider the prosecution history of the patent, if in evidence. Markman,
`52 F.3d at 980. In most situations, analysis of this intrinsic evidence alone will resolve claim
`construction disputes. See Vitronics, 90 F.3d at 1583. Courts should not rely on extrinsic evidence in
`claim construction to contradict the meaning of claims discernable from examination of the claims, the
`written description, and the prosecution history. See Pitney Bowes, Inc. v. Hewlett-Packard Co., 182
`F.3d 1298, 1308 (Fed. Cir. 1999) (citing Vitronics, 90 F.3d at 1583). However, it is entirely appropriate
`“for a court to consult trustworthy extrinsic evidence to ensure that the claim construction it is tending
`to from the patent file is not inconsistent with clearly expressed, plainly apposite, and widely held
`understandings in the pertinent technical field.” Id. Extrinsic evidence “consists of all evidence external
`to the patent and prosecution history, including expert and inventor testimony, dictionaries, and learned
`treatises.” Phillips, 415 F.3d at 1317. All extrinsic evidence should be evaluated in light of the intrinsic
`evidence. Id. at 1319.
`
`I.
`
`DISCUSSION
`Terms on Which the Parties Agree
`Construction
`Patent Term
`file or folder
`‘682
`item
`a destination separate from a storage device on
`‘086
`a destination separate from a
`which the state of the first virtual machine is
`storage device to which the
`stored when the first virtual machine is
`first virtual machine is
`suspended
`suspendable
`memory of the virtual machine volatile storage of the virtual machine
`virtual disk
`non-volatile storage of the virtual machine
`
`‘086
`‘086
`
`1 2 3 4 5 6 7 8 9
`
`10
`11
`12
`13
`14
`15
`16
`17
`18
`19
`20
`21
`22
`23
`24
`25
`26
`27
`28
`
`For the Northern District of California
`
`United States District Court
`
`3
`
`

`

`Case3:12-cv-00700-SI Document105 Filed03/08/13 Page4 of 18
`
`II.
`
`Terms for Construction
`A. ‘558 Patent
` The ‘558 patent (“Computer Restoration Systems and Methods”) is drawn to a method of
`restoring a client device on a network when the device has failed and is unable to boot on its own:
`The method includes booting the client device over the network in the restoration operation,
`[and] configuring the client device according to the boot program. . . . The client device is
`booted over the network, rather than locally to the client device by boot disk or otherwise . . . .
`Alternatively, the client device is reset and booted via a control device either locally or
`otherwise connected to the client device, and substantially according to the method of the
`network boot.
`‘558 (Abstract). The problem addressed by the ‘558 patent is computer system “crash” events that have
`conventionally required “system administrators to completely reconfigure the crashed computer,
`including, without limitation, by reconfiguring machine non-volatile random access memory (NVRAM)
`settings, loading the computer operating system, replacing applications and files, retrieving backed up
`data, and thoroughly re-configuring the operating system, application programs, drivers, and other
`operational settings.” ‘558, 1:21-28. The invention addresses this problem through the use of a storage
`manager application that is able to automatically record the configuration of a client device, and a boot
`program that is used to re-boot the client device after a crash; these applications function on a server
`device connected to the client device via a network. A representative claim states (terms to be construed
`are in bold):
`1. A device restoration system, for restoring a client device to a state prior to a major failure,
`comprising:
`a server device;
`a network communicatively interconnecting the client device and the server device;
`a storage manager accessible to the server device for saving the state, wherein the state includes
`client disk configuration information; and
`a network boot in which the server device causes the client device to boot.
`‘558, 9:60-10:2.
`1. client device
`Symantec
`“any processing or communications
`device capable of communicating with
`the server device over the network”
`
`Veeam
`“the physical computer that is to be restored”
`amended construction:
`“the computer (i.e. non-virtual machine) that is
`to be restored”
`
`1 2 3 4 5 6 7 8 9
`
`10
`11
`12
`13
`14
`15
`16
`17
`18
`19
`20
`21
`22
`23
`24
`25
`26
`27
`28
`
`For the Northern District of California
`
`United States District Court
`
`4
`
`

`

`Case3:12-cv-00700-SI Document105 Filed03/08/13 Page5 of 18
`
`Veeam contends that “client device” applies only to (1) computers, and excludes other devices,
`and (2) physical, not virtual, machines; Symantec disputes this contention. See Defendant Veeam’s
`Responsive Claim-Construction Brief (Dkt. 88, “Def. Br.”) at 3-4. As to the first issue, the Court finds
`that while in many of the embodiments the “client device” is depicted as a computer (see e.g., Figure
`3, component 106 [depicting “client device” as a standard computer tower]), the specification teaches
`that “client device” includes but is expressly not limited to computers.2 Moreover, the Federal Circuit
`has consistently advised against limiting claims to the preferred embodiments in figures. See Playtex,
`Inc. v. Proctor & Gamble Co., 400 F.3d 901, 907 (Fed. Cir. 2005) (“By its reliance on the figures, the
`district court improperly limited claim 1 to a preferred embodiment.”). Additionally, the Authoritative
`Dictionary of IEEE Standards Terms defines “device” as either a hardware component “that is capable
`of performing a specific function” or a software “mechanism or piece of equipment designed to serve
`a purpose or serve a function.” IEEE 100: The Authoritative Dictionary of IEEE Standard Terms (7th
`ed. 2000).3 Veeam’s point that the patent uses “client device” and “client computer” interchangeably,
`does not alter this conclusion because the specification clearly contemplates “devices” including devices
`other than “computers.”
`As to the second issue, the Court finds no reason to limit “client device” to physical devices and
`exclude virtual machines.4 Veeam argues that, in the context of the patent and as used in the figures
`(e.g., Figure 3, component 106), a computer is a physical machine rather than a virtual machine. Veeam
`
`2 ‘558 Patent at 9:15-22 teaches “combinations of client devices, such as the client computer
`106 and others, as well as server devices, such as the server computer 104, its various server components
`300, and others, including, for example, those elements, and even additional or alternative elements, and
`other combinations, are all possible in keeping with the scope of the embodiments herein.” Even
`component 106 - which shows a standard computer tower – is itself broadly defined as “any processing
`or communications device.” ‘558 Patent at 4:5-8 (emphasis added).
`
`3 “Dictionaries and technical treatises, which are extrinsic evidence, hold a special place and
`may sometimes be considered along with the intrinsic evidence when determining the ordinary meaning
`of claim terms.” Bell Atl. Network Services, Inc. v. Covad Communications Group, Inc., 262 F.3d 1258,
`1267 (Fed. Cir. 2001)
`4 The Authoritative Dictionary of IEEE Standards Terms defines “virtual machine” as “a
`functional simulation of a computer and its associated devices.” Symantec defines virtual machine,
`without citation, as “a collection of resources running on a physical machine that appears as an
`independent physical machine to executing top level operating systems and applications.” Symantec’s
`Opening Claim Construction Brief (Dkt. 81, “Pl. Br.”) at 3 (FN 1).
`
`5
`
`1 2 3 4 5 6 7 8 9
`
`10
`11
`12
`13
`14
`15
`16
`17
`18
`19
`20
`21
`22
`23
`24
`25
`26
`27
`28
`
`For the Northern District of California
`
`United States District Court
`
`

`

`Case3:12-cv-00700-SI Document105 Filed03/08/13 Page6 of 18
`
`notes that the patent does not mention “virtual” machines at any point, despite the fact that virtual
`machines were well known at the time. However, as noted above, the fact that none of the figures
`includes use of a virtual machine is not dispositive and Veeam’s argument that virtual machines were
`well known in the art supports Symantec’s position that “any device” would not have been limited to
`only physical devices. Symantec’s authority is persuasive. See Renishaw PLC v. Marposs Societa’per
`Azioni, 158 F.3d 1243, 1250 (Fed. Cir. 1998) (“[I]f an apparatus claim recites a general structure (e.g.,
`a noun) without limiting that structure to a specific subset of structures (e.g., with an adjective), we will
`generally construe the claim to cover all known types of that structure that are supported by the patent
`disclosure.”).
`In the absence of any support in the patent for limiting this term as Veeam proposes, the Court
`adopts Symantec’s proposed construction and construes client device as: any processing or
`communications device capable of communicating with the server device over the network.
`
`2. network boot
`Symantec
`“operation that starts or resets a
`client device over the network”
`
`Veeam
`“a process that retrieves and loads a boot image
`over a network accessed by the client device
`rather than from a local disk”
`amended construction:
`“a process on the client device that runs a
`custom boot program to retrieve information
`necessary to reconfigure the client device over a
`network, rather than from a local disk”
`
`Veeam contends that “network boot” requires more than merely starting or resetting a client
`device; it requires, according to Veeam, running a custom boot program on a client device. Def. Br. at
`6. Symantec responds that Veeam’s limitation is not supported by the patent language. Pl. Reply at 4.
`The specification uses “network boot” as a broad term for the entire boot operation: “The client
`boot program is delivered over the network 100 to the client computer 106 once the client computer 106
`initializes over the network in a network boot operation.” ‘558, 6:43-45 (emphasis added). This
`operation may include standard components in addition to any custom programs: “network boot
`performed by the client computer 106 in such manner uses the standard ‘bootp’ and/or ‘bootparams’
`
`6
`
`1 2 3 4 5 6 7 8 9
`
`10
`11
`12
`13
`14
`15
`16
`17
`18
`19
`20
`21
`22
`23
`24
`25
`26
`27
`28
`
`For the Northern District of California
`
`United States District Court
`
`

`

`Case3:12-cv-00700-SI Document105 Filed03/08/13 Page7 of 18
`
`protocols to network boot the client computer 106 from the boot server 304.” ‘558, 6:59-62. The
`initialization of the network boot operation may also precede the custom program step, as illustrated
`in Fig. 6, where “network boot” step 602 is shown taking place prior to the “runs customized boot
`program” step 608. Further, the network boot is described as “initiated by the client computer 106 via
`the boot server 304 in communication over the network 100 with the client computer 106.” ‘558, 8:7-9
`(emphasis added). Finally, Claim 1 itself states: “a network boot in which the server device causes the
`client device to boot.” ‘558, 9:60-67 (emphasis added). Therefore, Veeam’s amended construction is
`inappropriately limiting, as the patent language indicates that “network boot” operation may be broader
`than “a process on the client device.” In Veeam’s Tutorial document, p. 34, Veeam defines “network
`boot” as comprised of three steps from Fig. 4: steps 408 (client boot from boot server and runs program),
`410 (client mounts files from server), and 412 (client configures disk), circled in blue. But Veeam does
`not explain why it draws the line there, rather than including step 406 (BMR server creates client boot
`program and makes available boot image and file systems) or 404 (BMR server retrieves client
`configuration data from TSM server), which Symantec contends may be part of the network boot. The
`main focus of the patent is that the client device need not be started manually after crashing, but can be
`restarted remotely. Therefore, a network boot is not solely a custom or client-specific “process on the
`client device,” because the client device would remain in the crash state without further input delivered
`over the network.
`Symantec’s proposed definition, on the other hand, does not add clarity because it introduces
`new undefined terms. “Start” is not used anywhere in the specification, and “reset” is not explicitly
`defined, but may refer to the initial power-on of the device after the crash, rather than entire network
`boot operation.5
`
`5 The specification states:
`Remote re-boot and restoration can also occur according to the method 400, for
`example, in the case of a system like an AIX SP node, where the physical “front
`panel” (i.e., on, off, reset and similar control circuitry and equipment) of the
`client computer 106 can be manipulated through software from another device,
`so that the controlling device can electrically (and, if necessary, mechanically)
`initiate a reset as if the reset button on the client computer 106 is triggered.
`‘558, 5:58-66 (emphasis added).
`
`
`
`7
`
`1 2 3 4 5 6 7 8 9
`
`10
`11
`12
`13
`14
`15
`16
`17
`18
`19
`20
`21
`22
`23
`24
`25
`26
`27
`28
`
`For the Northern District of California
`
`United States District Court
`
`

`

`Case3:12-cv-00700-SI Document105 Filed03/08/13 Page8 of 18
`
`Neither proposed construction improves on the claim language. Therefore, the Court determines
`that it will not further define “network boot in which the server device causes the client device to
`boot.”6
`
`B. ‘086 Patent
` The ‘086 patent (“Disaster Recovery and Backup Using Virtual Machines”) is drawn to a method
`of backing up virtual machines. A representative claim reads (terms to be construed are in bold):
`1. A computer readable medium storing a plurality of instructions comprising instructions
`which, when executed:
`(i) capture a state of a first virtual machine executing on a first computer system, the
`state of the first virtual machine corresponding to a point in time in the execution of the
`first virtual machine,
`wherein the first virtual machine comprises at least one virtual disk storing at
`least one file used by at least one application executing in the first virtual
`machine, and
`wherein the state of the first virtual machine comprises the at least one file;
`and
`(ii) copy at least a portion of the state to a destination separate from a storage device to
`which the first virtual machine is suspendable,
`wherein suspending the first virtual machine is performed responsive to a
`suspend command.
`‘086, 14:43-59. The problem addressed by the ‘086 patent is hardware failures that render data stored
`on the hardware unreadable and the inability of prior-art systems to back up data in open applications.
`‘086, 1:41-45, 3:43-59.
`
`1. a state of [first] virtual machine
`Symantec
`Veeam
`“information regarding the first
`“at least a portion of a virtual machine’s memory
`virtual machine”
`and disk(s) to permit the virtual machine to
`resume execution of the application at the point in
`time the state was captured”
`
`Veeam contends that “a state of [first] virtual machine” requires both (1) data stored in virtual
`machine’s memory (volatile storage of virtual machine) and (2) data stored on virtual machine’s disk
`
`6Neither party requested a definition of the term “boot,” as used in the patent, and accordingly
`none is given. Should this matter go to trial, it might assist the jury in understanding the patent claims
`if such a definition were provided. The parties may propose an agreed-upon definition at that time.
`
`8
`
`1 2 3 4 5 6 7 8 9
`
`10
`11
`12
`13
`14
`15
`16
`17
`18
`19
`20
`21
`22
`23
`24
`25
`26
`27
`28
`
`For the Northern District of California
`
`United States District Court
`
`

`

`Case3:12-cv-00700-SI Document105 Filed03/08/13 Page9 of 18
`
`(non-volatile storage of the virtual machine). Def. Br. at 8. Symantec responds that the limitation of
`requiring both a portion of memory and a portion of the disk is not required by the specification, which
`uses the permissive “may” form for the embodiments.7 Pl. Reply at 5. Symantec also contends that
`“state” is defined more exactly in the context of the relevant claims:
`The “primary objective” [of the ‘086 patent] is backing up virtual machines . . .
`and the claims detail precisely what information is required from the state for
`each claim. [See ‘086] at 14:51-52 (state comprises a file used by an application);
`15:21-23 (state comprises a non-persistent virtual disk and log of uncommitted
`updates).
`
` Id.
`
`The specification indicates that the purpose of recording a state is to permit backup of the
`system: “[t]o create a backup, the computer system may capture a state of each virtual machine and
`backup the state.” ‘086, 2:55-56. But the specification does not explicitly address what data a “state”8
`must contain, providing only examples, such as: “all the state needed to restart the application on the
`second computer system (e.g. the operating system and its configuration settings, the application and
`its configuration settings, etc.),” ‘086, 1:64-67; “[t]he state may include the information in a virtual
`machine image created in response to a suspension of the virtual machine,” ‘086, 2:60-62; and “only
`a portion of the state . . . (e.g. non-persistent virtual disks may be backed-up by copying the COW files
`corresponding to those disks, if an initial copy of the disk file has been made),” ‘086, 3:3-7.9 Thus,
`“state” may contain information such as configuration settings, information in the virtual machine
`image, or updates to disk blocks in log form. Veeam does not explain why these types of
`“state”information require both a portion of the virtual machine’s disk and virtual machine’s memory.
`Therefore, Veeam’s proposed definition that a “state” must require both a portion of memory and a
`portion of the disk of the virtual machine is not supported by the specification.
`
`7 This patent avoids describing the invention definitively. See, e.g. ‘086, 2:4-7 (“backup may
`occur . . . in various embodiments”).
`
`8 With respect to software, “state” is a general term that means “a condition or mode of existence
`that a system, component, or simulation may be in” or “the values assumed at a given time by the
`variables that define the characteristics of a system, component, or simulation.” IEEE 100: The
`Authoritative Dictionary of IEEE Standard Terms (7th ed. 2000).
`9 The COW (Copy-On-Write) file “stores updated copies of disk blocks in a log form.” ‘086,
`6:65-66.
`
`9
`
`1 2 3 4 5 6 7 8 9
`
`10
`11
`12
`13
`14
`15
`16
`17
`18
`19
`20
`21
`22
`23
`24
`25
`26
`27
`28
`
`For the Northern District of California
`
`United States District Court
`
`

`

`Case3:12-cv-00700-SI Document105 Filed03/08/13 Page10 of 18
`
`Symantec’s proposed definition, on the other hand, is overly broad because some information
`regarding the virtual machine is not “state.” However, the specification clearly indicates that a “state”
`is recorded to permit the virtual machine to resume the interrupted application to the point in time the
`state was recorded.10 Therefore, the Court construes a state of [first] virtual machine as: information
`regarding the [first] virtual machine to permit the virtual machine to resume execution of the
`application at the point in time the state was captured.
`
`2. suspending the [first] virtual machine is performed responsive to a suspend
`command
`
`Symantec
`“in response to receiving a suspend
`command, pausing the execution of the
`virtual machine”
`
`Veeam
`“in response to receiving a suspend
`command, pausing the execution of the
`virtual machine and storing the state on a
`storage device to which the first virtual
`machine is suspendable”
`
`The parties agree that “suspending” includes pausing the execution of the virtual machine in
`response to a suspend command. Def. Br. at 10. Veeam argues that“suspending” itself also necessarily
`includes storing the information to a storage device. Id. However, the statements relied on by Veeam
`do not support Veeam’s argument. Veeam first quotes the specification:
`The VM kernel may support a command to suspend the virtual machine. In
`response to the command, the VM kernel may write an image of the virtual
`machine to the storage device 22 . . . thus capturing the current state of the virtual
`machine . . .
`‘086, 4:19-23. This statement, however, only indicates that in addition to suspending, i.e., pausing, the
`virtual machine may also write a copy to the storage device, but it does not indicate that copying is a
`required part of the “suspend” step itself. The patent treats “suspending” and “copying” as separate
`steps: “The checkpoints may be created by capturing state while the virtual machines continue to
`
`10 The specification states, for example: “In disaster recovery configurations, the state of data
`may periodically be checkpointed from a first computer system to a second computer system,” ‘086,
`1:50-53; “The recovery program 78 may select the desired checkpoint (block 100). The desired
`checkpoint may be passed to the recovery program 78 as an operand, or may be selected by the recovery
`program 78. Typically, the desired checkpoint may be the most recent checkpoint, unless that
`checkpoint appears to be corrupted.” ‘086, 10:42-47.
`
`.
`
`10
`
`1 2 3 4 5 6 7 8 9
`
`10
`11
`12
`13
`14
`15
`16
`17
`18
`19
`20
`21
`22
`23
`24
`25
`26
`27
`28
`
`For the Northern District of California
`
`United States District Court
`
`

`

`Case3:12-cv-00700-SI Document105 Filed03/08/13 Page11 of 18
`
`execute, or by suspending the virtual machines and copying the suspended image. As mentioned above,
`in some cases, only a portion of the state or image may be copied.” ‘086, 3:17-22 (emphasis added).
`Further, copying may occur without suspending: “while some embodiments may suspend the virtual
`machines to make copies of the images. . . other embodiments may cause the state of the virtual
`machines to be generated for copying without suspending the virtual machines.” ‘086, 11:4-5. Thus,
`the plain meaning of “suspending” as “pausing the execution,” is the most logical interpretation.11 The
`Court finds insufficient evidence that would require altering the plain meaning of “suspending.” While
`the claimed method entails a combination of pausing and copying steps, there is no indication that the
`patentee intended to use the term “suspending” in any other but the ordinary sense. Therefore, the Court
`construes suspending the [first] virtual machine is performed responsive to a suspend command
`as: in response to receiving a suspend command, pausing the execution of the virtual machine.
`
`C. ‘299 Patent
`The ‘299 patent (“Method and System of Providing Periodic Replication”) is drawn to a method
`of backup by means of multiple storage volumes and corresponding storage volume maps. A
`representative claim reads (terms to be construed are in bold):
`1. A method comprising:
`creating a storage object corresponding to a storage volume,
`wherein said storage object comprises a point- in-time copy of said storage volume
`and a storage volume map; and
`replicating said storage volume utilizing said storage object,
`wherein said creating a storage object comprises creating a first storage object
`corresponding to a first storage volume, said first storage object comprises a first
`point-in-time copy of said first storage volume and a first storage volume map, said
`replicating said storage volume comprises copying data from said first
`point-in-time copy of said first storage volume to a second storage volume, and
`said copying data from said first point-in-time copy comprises, synchronizing said
`first point-in-time copy of said first storage volume and said second storage
`volume.
`
`11 Veeam also contends that its proposed construction is supported by Symantec’s position
`during construction of the same claim in concurrent litigation, Symantec Corp. v. Acronis, Inc. (Case
`No. 11-cv-05310). Veeam argues that Symantec’s proposed definition of “destination separate from
`a storage device to which the first virtual machine is suspendable” as “a destination separate from a
`storage device on which the state of the first virtual machine is stored when the first virtual machine is
`temporarily prevented from executing” indicates that the storage step is part of “suspending.” Def. Br.
`at 12 (emphasis added). However, the Court finds that “suspendable to” is a separate term that does not
`bear on the definition of “suspending” in the present context.
`
`11
`
`1 2 3 4 5 6 7 8 9
`
`10
`11
`12
`13
`14
`15
`16
`17
`18
`19
`20
`21
`22
`23
`24
`25
`26
`27
`28
`
`For the Northern District of California
`
`United States District Court
`
`

`

`Case3:12-cv-00700-SI Document105 Filed03/08/13 Page12 of 18
`
`‘299, 11:9-27. The problem addressed by the ‘299 patent is consistent ordering of replication volumes.
`‘299, 1:46-50.
`
`1. storage object
`Symantec
`“information about the changes to a
`volume with respect to a point in time
`image of that volume”
`
`Veeam
`“a structure created to hold
`corresponding items”
`
`Veeam contends that the dispute between the parties is whether “storage object” is “merely
`information, as proposed by Symantec, or is a structure to hold information, as proposed by Veeam.”
`Def. Br. at 12. Veeam does not explain how “structure” is different from mere “information” in this
`context, but contends that a “storage object” is a “structure created to include specific information such
`as a point-in-time copy of a volume and a volume map.” Id. at 13-14. Veeam’s proposed definition,
`however, introduces further ambiguity by using the undefined terms “to hold” and “corresponding
`items.”
`Symantec’s proposed definition comes from a section of the specification that describes a type
`of storage object:
`A snappoint storage object provides information about the changes to a volume
`with respect to a point in time image of that volume. Such snappoints give
`applications the ability to create incremental images of a volume, retrieve the
`information about the changed regions between any two images and extract the
`changed regions.
`‘299, 5:11-16 (emphasis added). In its reply brief, Symantec argues that “snappoint storage object” is
`the same as the “storage object” claimed in the patent. Reply at 8. However, Symantec’s proposed
`definition is merely a description of one kind of information a storage object provides – e.g., information
`about changes to a volume – rather than a full definition of the term. The Court finds that “storage
`object” is adequately defined in the claim language itself: “creating a storage object corresponding to
`a storage volume, wherein said storage object comprises a point-in-time copy of said storage volume
`
`1 2 3 4 5 6 7 8 9
`
`10
`11
`12
`13
`14
`15
`16
`17
`18
`19
`20
`21
`22
`23
`24
`25
`26
`27
`28
`
`For the Northern District of California
`
`United States District Court
`
`12
`
`

`

`Case3:12-cv-00700-SI Document105 Filed03/08/13 Page13 of 18
`
`and a storage volume map.” No further definition or construction is required.12
`
`2 synchroniz[e][ing] said first point-in-time copy of said first storage volume and said
`second storage volume
`Symantec
`“transferring a full or
`incremental copy of
`data from the
`point-in-time copy to
`the second storage
`volume”
`
`Veeam
`“initially copying all data from the point-in-time copy to
`the second storage volume so that only changes to the
`first storage volume will be copied thereafter”
`amended construction:
`“initially copying all data from the point-in-time copy to
`the second storage volume so that only changed regions
`of the first storage volume will be copied thereafter”
`
`The parties dispute whether “synchronizing” is limited to “initial synchronization, as proposed
`by Veeam, or includes both initial synchroniz

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket