throbber
Trials@uspto.gov
`Tel: 571-272-7822
`
`
`
`
`
`Paper 10
`Entered: August 7, 2013
`
`UNITED STATES PATENT AND TRADEMARK OFFICE
`
`_______________
`
`BEFORE THE PATENT TRIAL AND APPEAL BOARD
`
`_______________
`
`VEEAM SOFTWARE CORPORATION
`Petitioner
`
`v.
`
`SYMANTEC CORPORATION
`Patent Owner
`_______________
`
`Case IPR2013-00150
`Patent 7,093,086
`_______________
`
`
`Before THOMAS L. GIANNETTI, SCOTT E. KAMHOLZ, and
`TRENTON A. WARD, Administrative Patent Judges.
`
`
`WARD, Administrative Patent Judge.
`
`
`
`DECISION
`Institution of Inter Partes Review
`37 C.F.R. § 42.108
`
`
`
`
`
`

`

`IPR2013-00150
`Patent 7,093,086
`
`
`I.
`
`INTRODUCTION
`
`A. Background
`
`Veeam Software Corporation filed a petition to institute an inter partes
`
`review of claims 1, 11, 12 and 22 of U.S. Patent 7,093,086 (the “ ’086 patent”).
`
`Paper 2 (“Pet.”). Patent Owner Symantec Corporation filed a preliminary
`
`response. Paper 9 (“Prelim. Resp.”). The standard for instituting an inter partes
`
`review is set forth in 35 U.S.C. § 314(a), which provides as follows:
`
`THRESHOLD -- The Director may not authorize an inter
`partes review to be instituted unless the Director
`determines that the information presented in the petition
`filed under section 311 and any response filed under
`section 313 shows that there is a reasonable likelihood
`that the petitioner would prevail with respect to at least
`1 of the claims challenged in the petition.
`
`
`Petitioner contends that the challenged claims are unpatentable under
`
`35 U.S.C. §§ 102 and/or 103 on the following specific grounds (Pet. 10-58):1
`
`Reference(s)
`
`Basis
`
`Claims challenged
`
`Lim
`
`§ 102
`
`1, 11, 12, and 22
`
`VMware ESX
`
`§ 102
`
`1, 11, 12, and 22
`
`VMware GSG
`
`§ 102
`
`1, 11, 12, and 22
`
`
`1 The references relied upon are: US 6,795,966 (Ex. 1004) (“Lim”), VMware ESX
`Server: User Manual (Ex. 1005) (“VMware ESX”), Getting Started Guide:
`VMware 2.0 for Linux (Ex. 1006) (“VMware GSG”), “Checkpoint for Network
`Transferable Computer” by Suzaki (Exs. 1007-1009) (“Suzaki”), and “Integrating
`Checkpointing with Transaction Processing” by Wang (Ex. 1010) (“Wang”); and
`US 6,917,963 (Ex. 1011) (“Hipp”). Additionally, Petitioner supports its challenge
`with a declaration by Dr. Prashant Shenoy (Ex. 1002) (“Shenoy Decl.”).
`
` 2
`
`
`
`
`
`

`

`IPR2013-00150
`Patent 7,093,086
`
`
`Reference(s)
`
`Basis
`
`Claims challenged
`
`Suzaki
`
`§ 102
`
`1 and 12
`
`Suzaki and Wang
`
`§ 103
`
`11 and 22
`
`Suzaki and Hipp
`
`§ 103
`
`11 and 22
`
`Hipp
`
`§ 102
`
`1, 11, 12, and 22
`
`For the reasons given below, we institute an inter partes review of claims 1,
`
`11, 12, and 22.
`
`B. Additional Proceedings
`
`In addition to this petition, Petitioner has filed petitions challenging the
`
`patentability of certain claims of Patent Owner’s U.S. Patents 6,931,558 (IPR2013-
`
`00141, IPR2013-00142), 7,254,682 (IPR2013-00144, IPR2013-00145), and
`
`7,191,299 (IPR2013-00143, IPR2013-00151).
`
`C. The Invention
`
`The ’086 patent is titled “Disaster Recovery and Backup Using Virtual
`
`Machines” and generally relates to computer systems and methods for backing up
`
`virtual machines. ’086 patent, col. 2, ll. 1-2. The patent describes a computer
`
`system that executes one or more virtual machines, having multiple applications,
`
`and to create a backup; the computer system may capture a state of each virtual
`
`machine and backup the state. Id. at col. 2, ll. 53-56. The state may include the
`
`information in a virtual image created in response to a suspension of the virtual
`
`machine. Id. at col. 2, ll. 60-62. Figure 1 of ’086 patent is reproduced below:
`
` 3
`
`
`
`
`
`
`
`
`
`

`

`IPR2013-00150
`Patent 7,093,086
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`’086 patent, Figure 1
`
`As illustrated above in Figure 1, the ’086 patent discloses that multiple virtual
`
`machines, 16A-C, can be controlled by Virtual Machine (“VM”) Kernel 18, which
`
`comprise software and/or data structures executed on the underlying hardware 20
`
`of the computer system 10. ’086 patent, col. 3, ll. 30-37. Figure 1 further
`
`illustrates that the computer system 10 can include a storage device 22 and backup
`
`medium 24. ’086 patent, col. 3, ll. 40-42. Claim 1 illustrates the claimed subject
`
`matter and is reproduced below:
`
`1. A computer readable medium storing a plurality of
`instructions comprising instructions which, when
`executed:
`(i) capture a state of a first virtual machine executing on a
`first computer system, the state of the first virtual
`machine corresponding to a point in time in the
`execution of the first virtual machine, wherein the first
`
` 4
`
`
`
`
`
`

`

`IPR2013-00150
`Patent 7,093,086
`
`
`virtual machine comprises at least one virtual disk
`storing at least one file used by at least one
`application executing in the first virtual machine, and
`wherein
`the state of
`the first virtual machine
`comprises the at least one file; and
`(ii) copy at least a portion of the state to a destination
`separate from a storage device to which the first
`virtual machine is suspendable, wherein suspending
`the first virtual machine is performed responsive to a
`suspend command.
`
`
`D. Claim Construction
`
`Consistent with the statute and the legislative history of the AIA, the Board
`
`will interpret claims of an unexpired patent using the broadest reasonable
`
`construction in light of the specification of the patent. See Office Patent Trial
`
`Practice Guide, 77 Fed. Reg. 48756, 48766 (Aug. 14, 2012); 37 CFR
`
`§ 42.100(b). There is a “heavy presumption” that a claim term carries its ordinary
`
`and customary meaning. CCS Fitness, Inc. v. Brunswick Corp., 288 F.3d 1359,
`
`1366 (Fed. Cir. 2002).
`
`1. “state of a virtual machine”
`
`Patent Owner alleges that the term “a state of [a] virtual machine” means
`
`“information regarding [the] virtual machine, including virtual disk(s), to permit
`
`the virtual machine to resume execution.” Prelim. Resp. 14. The ’086 patent
`
`states that “the virtual machine state includes all of the state used by the
`
`application (operating system and its configuration settings, the application and its
`
`configuration settings, etc.).” ’086 patent, col. 3, ll. 22-25. In the related litigation
`
`involving the ’086 patent in the District Court for the Northern District of
`
`California (“District Court”), the Court determined that the “the specification does
`
`not explicitly address what data a ‘state’ must contain, providing only examples,
`
`such as: ‘all the state needed to restart the application on the second computer
`
` 5
`
`
`
`
`
`

`

`IPR2013-00150
`Patent 7,093,086
`
`system (e.g., the operating system and its configuration settings, the application
`
`and its configuration settings, etc.).’” Symantec Corp. v. Veeam Software Corp.,
`
`Case No. 12-cv-00700-SI, March 8, 2013 Claim Construction Order, 9 (Ex. 2005)
`
`(“Claim Construction Order”) (quoting the ’086 patent, col. 2, ll. 60-62). The
`
`District Court ultimately found that “the specification clearly indicates that a ‘state’
`
`is recorded to permit the virtual machine to resume the interrupted application to
`
`the point in time the state was recorded.” Claim Construction Order 10.
`
`Accordingly, the District Court construed “‘a state of [first] virtual machine’ as
`
`‘information regarding the [first] virtual machine to permit the virtual machine to
`
`resume execution of the application at the point in time the state was captured.”
`
`Claim Construction Order 10 (brackets in original). On the record presented, we
`
`find this reasonable and, therefore, adopt the District Court’s construction.
`
`2. “copy[ing] at least a portion of the state to a destination separate
`from a storage device to which the first virtual machine is
`suspendable”
`
`Patent Owner argues that the claimed phrase “copy[ing] at least a portion of
`
`the state to a destination separate from a storage device to which the first virtual
`
`machine is suspendable” should be construed as the following:
`
`(1) if a previous copy of the virtual disk(s) resides on a destination
`that is separate from a storage device on which the state of the first
`virtual machine is stored when the first virtual machine is suspended,
`storing changes to the state at the separate destination, or
`(2) if a previous copy of the virtual disk(s) does not reside on the separate
`destination, storing the captured state at the separate destination.
`
`Prelim. Resp. 17. In the related litigation involving the ’086 patent, the parties
`
`agreed that “a destination separate from a storage device to which the
`
`first virtual machine is suspendable” means “a destination separate from a storage
`
`device on which the state of the first virtual machine is stored when the first virtual
`
` 6
`
`
`
`
`
`

`

`IPR2013-00150
`Patent 7,093,086
`
`machine is suspended.” Claim Construction Order 3. Patent Owner argues that in
`
`one embodiment described in the ’086 patent, if a previous copy of the state
`
`information being newly captured already resides on a separate destination, then
`
`only the information regarding changes in state would be copied to the separate
`
`destination. Prelim. Resp. 20 (citing ’086 patent, col. 6, ll. 52-63, col. 7, ll. 10-15,
`
`col. 13, ll. 20-25). Patent Owner further argues that in another embodiment
`
`described in the ’086 patent, if a previous copy of the virtual disks does not reside
`
`on the separate destination, then all of the state captured is copied. Prelim. Resp.
`
`20 (citing ’086 patent, col. 2, ll. 55 – col. 3, l. 7, col. 13, ll. 20-21). Patent Owner’s
`
`proposed claim construction attempts to import into the claims language from these
`
`two embodiments in the specification by attempting to insert multiple conditions
`
`about when and what to copy into the claim language “copy at least a portion.”
`
`This is not permissible. See Phillips v. AWH Corp., 415 F.3d 1303, 1323 (Fed. Cir.
`
`2005)(en banc)(“[A]lthough the specification often describes very specific
`
`embodiments of the invention, we have repeatedly warned against confining the
`
`claims to those embodiments.”).
`
`On the record presented, we conclude that the broadest reasonable
`
`interpretation of the phrase “copy[ing] at least a portion of the state to a destination
`
`separate from a storage device to which the first virtual machine is suspendable”
`
`consistent with the specification is “copy[ing] at least a portion of the state to a
`
`destination separate from a storage device on which the state of the first virtual
`
`machine is stored when the first virtual machine is suspended.”
`
`E. Other Matters
`
`Patent Owner contends that there is insufficient evidence that the VMware
`
`ESX is a printed publication. Prelim. Resp. 7. Patent Owner provides a similar
`
`challenge alleging insufficient evidence of publication for VMware GSG and
`
` 7
`
`
`
`
`
`

`

`IPR2013-00150
`Patent 7,093,086
`
`Suzaki. Prelim. Resp. 7-9. At this stage of the proceedings, in light of the indicia
`
`of publication exhibited on these documents and in the absence of any compelling
`
`evidence to the contrary, we choose to consider VMware ESX, VMware GSG, and
`
`Suzaki for the purpose of this decision.
`
`
`
`II. ANALYSIS
`
`A. Overview
`
`Petitioner contends that the claims of the ’086 patent combine two well-
`
`known computing concepts: (1) copying data to a separate destination, and (2)
`
`virtual machines. Pet. 3. To support this position, Patent Owner provides
`
`testimony of Dr. Prashant Shenoy, who states that he has more than two decades of
`
`experience in distributed/operating systems, networking, and data management,
`
`and is familiar with the technology disclosed in the ’086 patent. Shenoy
`
`Decl. ¶¶ 1-4.
`
`B. Anticipation by Lim of claims 1, 11, 12, and 22
`
`1. Overview of Lim
`
`Lim is titled “mechanism for restoring, porting, replicating, and
`
`checkpointing computer systems using state extraction” and discloses a virtual
`
`machine monitor on which multiple virtual computer systems are installed whose
`
`states can be checkpointed under control of the virtual machine monitor. Lim,
`
`Abstr. The checkpointed virtual machine may be restored into the system at a later
`
`time. Id. Figure 2 of Lim is reproduced below:
`
` 8
`
`
`
`
`
`
`
`
`
`

`

`IPR2013-00150
`Patent 7,093,086
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Lim, Figure 2
`
`As shown above in Figure 2, Lim discloses a virtual machine (“VM1”) 200,
`
`including a virtual operation system (“VOS”) 202, a virtual processor (“VPROC”)
`
`204, a virtual disk that is virtual memory (“VMEM”) 206, and virtual peripheral
`
`devices 208, “all of which are implemented in software to emulate the
`
`corresponding components of an actual computer.” Lim, col. 14, ll. 27-32.
`
`Additionally, as shown in Figure 2, Lim discloses a virtual machine monitor 250 in
`
`between the virtual machines 200 to 200n and the system hardware. Lim, col. 15,
`
`ll. 26-31. To enable computer system restoration, Lim discloses capturing the
`
`“total machine state” of a computer system, which is “the entire collection of all
`
`information that is necessary and sufficient to uniquely determine the status of all
`
`hardware and software components at the completion of any given processor
`
` 9
`
`
`
`
`
`

`

`IPR2013-00150
`Patent 7,093,086
`
`instruction.” Lim, col. 10, ll. 26-30. Therefore, if the processor’s execution is
`
`interrupted, the “total machine state is then the set of data that, when loaded at any
`
`time into the appropriate memory positions (both internal and external to the
`
`processor), will cause the processor, and all connected hardware and software
`
`components, to continue executing in exactly the same way as if there had been no
`
`interruption at all.” Lim, col. 10, ll. 32-38.
`
`2. Analysis
`
`a. Claims 1 and 12
`
`Claims 1 and 12 require that capturing the “state of a first virtual machine,”
`
`where the virtual machine comprises “at least one virtual disk storing at least one
`
`file used by at least one application executing in the first virtual machine.” Patent
`
`Owner argues that the “state of the first virtual machine” must include at least one
`
`“file” used by at least one application executing on the virtual machine. Prelim.
`
`Resp. 24. Patent Owner contends that Lim fails to teach capturing a file by an
`
`application because it teaches that the state is represented and stored as a vector,
`
`and the vector is a list or data structure of all of the parameters, register values, I/O,
`
`and other peripheral device settings. Prelim. Resp. 24. We disagree, as Patent
`
`Owner’s arguments are not consistent with the disclosures in Lim.
`
`Lim discloses that “[d]efined broadly, this invention encapsulates the entire
`
`computer system by enumerating and storing its total machine state using software
`
`(or dedicated hardware).” Lim, col. 10, ll. 62-64 (emphasis added). Furthermore,
`
`Lim discloses that encapsulating the entire computer system includes “data that is
`
`in application buffers or in the disk cache of the operating system, as well as the
`
`data that is on the disk, is included in the transaction.” Lim, col. 11, ll. 2-5
`
`(emphasis added). Accordingly, as noted by Dr. Shenoy, Lim discloses capturing
`
`the “total machine state” of a computer system, which is “‘the entire collection of
`
`
`
`10
`
`
`
`

`

`IPR2013-00150
`Patent 7,093,086
`
`all information that is necessary and sufficient to uniquely determine the status of
`
`all hardware and software components at the completion of any given processor
`
`instruction.’” Shenoy Decl. ¶ 15 (quoting Lim, col. 10, ll. 27-30). Therefore, Lim
`
`discloses that in addition to representing the machine state in a “list or data
`
`structure” such as a “state vector,” all associated data, including files, are captured.
`
`See Lim, col. 11, ll. 2-5.
`
`Patent Owner further argues that Lim discloses only capturing vectors, and
`
`contends that “a vector is a data structure that merely includes a list of elements
`
`according to Lim.” Prelim. Resp. 25. Additionally, Patent Owner argues that
`
`nowhere does Lim teach or suggest that the elements of the state vector are files.
`
`Prelim. Resp. 26. We do not agree. Patent Owner’s argument that Lim discloses
`
`merely storing a “list of elements” is not consistent with the disclosure in Lim that
`
`the system captures “the entire collection of all information that is necessary and
`
`sufficient to uniquely determine the status of all hardware and software
`
`components,” including “data in application buffers or in the disk cache of the
`
`operating system, as well as the data that is on the disk.” Lim, col. 10, ll. 27-30;
`
`col. 11, ll. 2-4. By disclosing the capture of all information including the data on
`
`the disk, Lim discloses the capture of files. Accordingly, we are not persuaded that
`
`Lim fails to disclose capturing files used by applications executing on the virtual
`
`machine.
`
`For these reasons, Petitioner has demonstrated that there is a reasonable
`
`likelihood that it will prevail with respect to claims 1 and 12 based on the ground
`
`that these claims are anticipated by Lim.
`
`b. Claims 11 and 22
`
`We have reviewed Petitioner’s analysis in relation to dependent claims 11
`
`and 22. Patent Owner does not argue claims 11 and 22 separately from claims 1
`
`
`
`11
`
`
`
`

`

`IPR2013-00150
`Patent 7,093,086
`
`and 12. We find Petitioner’s arguments reasonable with respect to claims 11 and
`
`22. Therefore, we determine that Petitioner has demonstrated that there is a
`
`reasonable likelihood that it will prevail with respect to claims 11 and 22 based on
`
`the ground that this claim is anticipated by Lim.
`
`C. Anticipation by VMware ESX of claims 1, 11, 12, and 22
`
`1. Overview of VMware ESX
`
`VMware ESX provides a user’s manual for installing and configuring the
`
`VMware ESX Server, including how to create and provision virtual machines and
`
`how to manage virtual machines. VMware ESX 18. VMware ESX discloses that
`
`a virtual machine can be suspended at any desired point in its operation and then
`
`later resumed at that same state. VMware ESX 97. In order to capture the state of
`
`a virtual machine, VMware ESX discloses storing information in two files: (1) an
`
`.std file, which “contains the entire state of the virtual machine,” and (2) a redo-log
`
`file (.redo file) used to save changes while the virtual machine is operation.
`
`VMware ESX 58, 97-98, 149. Furthermore, VMware ESX describes that the .std
`
`file and the .redo file can be stored locally or remotely. See VMware ESX 97, 106.
`
`VMware ESX discloses the creation of a redo log (.redo file), which
`
`“contains the incremental changes to the disk image.” VMware ESX 106.
`
`Furthermore, VMware ESX discloses that the ESX server captures changes during
`
`a working session in redo log and “continually adds changes to the redo log until
`
`you remove the redo-log file or commit the changes using the commit command.”
`
`VMware ESX 39.
`
`2. Analysis
`
`a. Claims 1 and 12
`
`Claims 1 and 12 require “copy[ing] at least a portion of the state to a
`
`
`
`12
`
`
`
`

`

`IPR2013-00150
`Patent 7,093,086
`
`destination separate from a storage device to which the first virtual machine is
`
`suspendable.” Petitioner argues that VMware ESX describes copying to a separate
`
`storage device by “disclosing that the .redo file can be copied to a remote location:
`
`‘The redo log can . . . be transported to a remote site and copied to the SCSI disk’
`
`of the remote site.” Pet. 19 (quoting VMware ESX 106). Patent Owner generally
`
`argues, however, that while VMware ESX discusses the possibility of suspending
`
`the virtual machine and saving its state to different possible storage devices,
`
`VMware ESX fails to disclose copying at least a portion of the captured state
`
`destination separate from a storage device on which the state is stored when the
`
`virtual machine is suspended. Prelim. Resp. 31. Specifically, Patent Owner makes
`
`two arguments with respect to the required claim limitation of copying to a
`
`“destination separate.”
`
`First, Patent Owner argues that VMware ESX fails to provide disclosure
`
`matching Patent Owner’s proposed construction for the claimed phrase “copy[ing]
`
`at least a portion of the state to a destination separate from a storage device to
`
`which the first virtual machine is suspendable.” Prelim. Resp. 31. As stated
`
`above, we do not adopt Patent Owner’s proposed claim construction, and we
`
`determine that the phrase “copy[ing] at least a portion of the state to a destination
`
`separate from a storage device to which the first virtual machine is suspendable”
`
`means “copy[ing] at least a portion of the state to a destination separate from a
`
`storage device on which the state of the first virtual machine is stored when the
`
`first virtual machine is suspended.” Accordingly, VMware ESX need not disclose
`
`choosing a destination for copying based on where the previous copy of the virtual
`
`disk resides, as argued by Patent Owner, but VMware ESX must merely disclose
`
`copying a portion of the state to a destination separate from the suspend storage
`
`device.
`
`
`
`
`
`13
`
`

`

`IPR2013-00150
`Patent 7,093,086
`
`
`Second, Patent Owner argues that VMware ESX fails to disclose copying to
`
`a “destination separate from a storage device” but discloses that the captured state
`
`is stored at the location where it is suspended. Prelim. Resp. 31-32. We are not
`
`persuaded by Patent Owner’s argument. VMware ESX discloses that at least a
`
`portion of the state can be stored in a variety of locations, including locations
`
`separate from the device storing the suspended virtual machine. See VMware ESX
`
`97, 106. For example, VMware ESX discloses that the .redo file containing the
`
`changes to the disk image can be “transported to a ‘remote site.’” VMware ESX
`
`106. Accordingly, we are not persuaded by Patent Owner’s argument that
`
`VMware ESX fails to disclose copying “at least a portion of the state to a
`
`destination separate from a storage device to which the first virtual machine is
`
`suspendable,” as required by claims 1 and 12.
`
`Patent Owner further contends that the “remote site” disclosed in VMware
`
`ESX is not remote at all. Prelim. Resp. 34. However, Patent Owner fails to
`
`provide any citations to VMware ESX that indicate that the disclosure there of a
`
`“remote site” is anything other than remote or, in other words, distant from the
`
`local device onto which the virtual machine is suspended.
`
`For these reasons, Petitioner has demonstrated that there is a reasonable
`
`likelihood that it will prevail with respect to claims 1 and 12 based on the ground
`
`that these claims are anticipated by VMware ESX.
`
`b. Claims 11 and 22
`
`We have reviewed Petitioner’s analysis in relation to dependent claims 11
`
`and 22. Patent Owner does not argue claims 11 and 22 separately. We find
`
`Petitioner’s arguments reasonable with respect to claims 11 and 22. Therefore, we
`
`determine that Petitioner has demonstrated that there is a reasonable likelihood that
`
`it will prevail with respect to claims 11 and 22 based on the ground that this claim
`
`
`
`14
`
`
`
`

`

`IPR2013-00150
`Patent 7,093,086
`
`is anticipated by VMware ESX.
`
`D. Anticipation by VMware GSG of claims 1, 11, 12, and 22
`
`1. Overview of VMware GSG
`
`Like VMware ESX, VMware GSG provides a user guide related to the
`
`VMware software for implementing virtual machines. VMware GSG 1-1.
`
`VMware GSG is titled “Getting Started Guide – Vmware 2.0 for Linux” and
`
`describes how to install, configure, and manage VMware 2.0 on computer systems
`
`executing the Linux operating system. VMware GSG 1-1. Similar to VMware
`
`ESX described above, VMware GSG discloses the ability to suspend and store
`
`virtual machines. VMware GSG 2-5 (“[u]sing Suspend and Instant Restore . . .
`
`[y]ou can save the current state of your virtual machine.”). Specifically, VMware
`
`GSG discloses that “[s]uspend to disk allows you to save the current state of a
`
`virtual machine across reboots of your host operating system” so that without
`
`having to wait for the virtual machine to boot “you can quickly pick up work right
`
`where you stopped, with all the applications and documents you were working on
`
`open and ready for use.” VMware GSG 3-25.
`
`VMware GSG further discloses that the “state of a virtual machine can be
`
`saved to disk or memory.” VMware GSG 3-25. “If you suspend to memory, the
`
`saved state of the virtual machine is available as long as the virtual machine is
`
`powered on,” and “[i]f you suspend a virtual machine to disk, you may power off
`
`after suspending.” VMware GSG 3- 25.
`
`2. Analysis
`
`Patent Owner does not argue against Petitioner’s challenge of anticipation
`
`based VMware GSG separately from the challenge based on VMware ESX, but
`
`rather argues them jointly. See Prelim. Resp. 27-38. Accordingly, Patent Owner
`
`argues that VMware GSG does not anticipate independent claims 1 and 12 for the
`
`
`
`15
`
`
`
`

`

`IPR2013-00150
`Patent 7,093,086
`
`same reasons as VMware ESX, namely, that VMware GSG fails to disclose
`
`copying at least a portion of the captured state to a destination separate from a
`
`storage device on which the state is stored when the virtual machine is suspended.
`
`Prelim. Resp. 27-28, 34-35. We are not persuaded by Patent Owner’s arguments.
`
`As does VMware ESX, VMware GSG discloses that a .redo log file is created to
`
`save changes while the virtual machine is in operation. Pet. 24 (citing VMware
`
`GSG 3-9 (“Writes to the disk are logged [] in a redo log file. While the VMware
`
`session is running, disk blocks that have been modified and written to the redo log
`
`are read from there instead of the disk.”)). Furthermore, VMware GSG discloses
`
`that “[t]he redo log file is placed in the same directory as the disk file by default.
`
`However, the location of the redo log file can be changed in the Configuration
`
`Editor under Misc.” VMware GSG 3-9 (emphasis added). Accordingly, we are
`
`not persuaded by Patent Owner’s argument, and determine that VMware GSG
`
`discloses that the .redo file (“at least a portion of the state”) can be stored at a
`
`destination separate from a storage device on which the state is stored when the
`
`virtual machine is suspended, as required by independent claims 1 and 12.2
`
`For the reasons above, we determine that Petitioner has demonstrated that
`
`there is a reasonable likelihood that it will prevail with respect to claims 1, 11, 12,
`
`and 22 based on the ground that these claims are anticipated by VMware GSG.
`
`
`
`E. Anticipation by Suzaki of claims 1, 11, 12, and 22
`
`1. Overview of Suzaki
`
`Suzaki is titled “Checkpoint for Network Transferable Computer,” and it
`
`describes a system, which enables the transfer of the running OS image (Snapshot)
`
`
`2 Patent Owner does not argue dependent claims 11 and 22 separately.
`
`
`
`16
`
`
`
`

`

`IPR2013-00150
`Patent 7,093,086
`
`to another machine through the use of a virtual machine. Suzaki 1. Suzaki
`
`discloses that the prior art had to stop the virtual machine to get the snapshot
`
`because the snapshot was taken in hibernation, but the “new version enables the
`
`taking of the snapshot without stopping the virtual machine.” Suzaki 1. Suzaki
`
`discloses that “‘Network transferable computer’ [1] is a system that makes it
`
`possible to continue working at home without physically bringing a computer from
`
`your office.” Suzaki 2. Figure 1 of Suzaki is reproduced below:
`
`Suzaki Figure 1
`
`
`
`Suzaki discloses taking a “snapshot” of “your office computer and recreating what
`
`you were doing on it on your home computer based on the executable image.”
`
`Suzaki 2. For example, Suzaki discloses that “[i]t is possible to pause a
`
`QuickTime movie on an X Window machine and continue to play it on another
`
`machine.” Suzaki 2. An example of movie playback process is illustrated in
`
`Figure 3 of Suzaki reproduced below:
`
`
`
`
`
`
`
`17
`
`

`

`IPR2013-00150
`Patent 7,093,086
`
`
`Suzaki Figure 3
`
`
`
`Suzaki discloses that its system makes it “possible to pause a QuickTime movie
`
`played by XAnim on a desktop computer, transfer the execution image via network
`
`or a PC card to a notebook computer, and resume the movie (FIG. 3).” Suzaki 5.
`
`Additionally, Suzaki discloses that the “[c]heckpoint function makes it
`
`possible to save current state information without stopping the execution of the
`
`process.” Suzaki 5. Furthermore, Suzaki discloses that the “‘[n]etwork
`
`transferable computer’ not only transfers a disk image but can also recreate the
`
`same OS environment on another computer.” Suzaki 3.
`
`2. Analysis
`
`Petitioner argues that Suzaki’s process of checkpointing and transferring the
`
`state of a virtual machine discloses the claimed steps of capturing state information
`
`of a virtual machine and copying the state information to a separate destination.
`
`Pet. 30. Petitioner additionally argues that Suzaki describes the required capturing
`
`state corresponding to a point in time of execution by disclosing that it is possible
`
`to capture the virtual machine during playback of a movie, transfer the state of the
`
`virtual machine, and continue to play the movie on another machine. Pet. 30
`
`(citing Suzaki 2 (“’[i]t is possible to pause a QuickTime movie on an X Window
`
`machine and continue to play it on another machine.’”).
`
`Patent Owner argues that Suzaki discloses that its Software Suspend
`
`
`
`18
`
`
`
`

`

`IPR2013-00150
`Patent 7,093,086
`
`(“SWSUP”) patch, cited by Petitioner as capturing the state of the virtual machine,
`
`does not capture the state at a “point in time in time of the execution of the first
`
`virtual machine,” as required by claims 1 and 12. Prelim. Resp. 39. Patent Owner
`
`argues that the SWSUP patch in Suzaki “kills” processes one at a time during
`
`capture, and thus the state of second process would be captured at a different point
`
`in time than the state of a first process. Prelim. Resp. 40.
`
`We are not persuaded by Patent Owner’s argument that Suzaki discloses
`
`such an incremental capture process. Patent Owner specifically argues that the
`
`“[t]he SWSUSP patch ‘consists of a Linux kernel patch,’ which enables a
`
`shutdown process to ‘kill’ processes as the state information for each process is
`
`captured.” Prelim. Resp. 39 (citing Suzaki 4). Contrary to Patent Owner’s
`
`arguments, the cited portions of Suzaki do not disclose “killing” processes one-by-
`
`one to capture their state. Suzaki discloses that a Checkpoint is created when the
`
`SWSUP patch “[m]oves all the state information to nonvolatile memory such as
`
`hard disks and turns off a computer.” Suzaki 4. Suzaki discloses that the
`
`Checkpoint “enables another virtual computer to resume the operation from the
`
`point at which Checkpoint was executed.” Suzaki 5 (emphasis added).
`
`Accordingly, we are not persuaded that Suzaki fails to disclose capture of the state
`
`of the virtual machine at a particular point in time.
`
`For these reasons, Petitioner has demonstrated that there is a reasonable
`
`likelihood that it will prevail with respect to claims 1 and 12 based on the ground
`
`that these claims are anticipated by Suzaki.
`
`F. Obviousness of claims 11and 22 over Suzaki and Wang
`
`1. Overview of Wang
`
`Wang is titled “Integrating Checkpointing with Transaction Processing” and
`
`discloses a transactional Unix-file manager. Wang 304. Wang discloses that its
`
`
`
`19
`
`
`
`

`

`IPR2013-00150
`Patent 7,093,086
`
`Unix-file manager is enabled to “implement per-application transactional file
`
`updates” and provides a “transactional critical-memory manager” for
`
`checkpointing memory. Wang. 304, 306. Wang further discloses that its process
`
`of checkpointing involves “recording critical memory and file state at a given point
`
`of program execution on stable storage.” Wang 304.
`
`As part of the transactional file update process, Wang discloses that an
`
`“UNDO log” is created. Wang 306. Specifically, Wang discloses that “[e]very
`
`file update operation is intercepted by libfcp_RM, and an idempotent undo
`
`operation is added to the UNDO log.” Wang 306.
`
`2. Analysis
`
`Petitioner argues that dependent claims 11 and 22 are obvious in view of
`
`Suzaki and Wang. Petitioner concedes that Suzaki fails to disclose “creating a new
`
`log of uncommitted updates,” as required by claim 11, but relies upon the
`
`combination of Wang as teaching or suggesting this claim limitation. Pet. 33-34.
`
`More particularly, Petitioner argues that the claim is made obvious by Wang’s
`
`teaching of the creation of an UNDO log. Pet. 35. Petitioner argues that “[e]ach of
`
`the operations in the UNDO log corresponds to u

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket