`Tel: 571-272-7822
`
`
`
`
`
`Paper 10
`Entered: August 7, 2013
`
`UNITED STATES PATENT AND TRADEMARK OFFICE
`
`_______________
`
`BEFORE THE PATENT TRIAL AND APPEAL BOARD
`
`_______________
`
`VEEAM SOFTWARE CORPORATION
`Petitioner
`
`v.
`
`SYMANTEC CORPORATION
`Patent Owner
`_______________
`
`Case IPR2013-00150
`Patent 7,093,086
`_______________
`
`
`Before THOMAS L. GIANNETTI, SCOTT E. KAMHOLZ, and
`TRENTON A. WARD, Administrative Patent Judges.
`
`
`WARD, Administrative Patent Judge.
`
`
`
`DECISION
`Institution of Inter Partes Review
`37 C.F.R. § 42.108
`
`
`
`
`
`
`
`IPR2013-00150
`Patent 7,093,086
`
`
`I.
`
`INTRODUCTION
`
`A. Background
`
`Veeam Software Corporation filed a petition to institute an inter partes
`
`review of claims 1, 11, 12 and 22 of U.S. Patent 7,093,086 (the “ ’086 patent”).
`
`Paper 2 (“Pet.”). Patent Owner Symantec Corporation filed a preliminary
`
`response. Paper 9 (“Prelim. Resp.”). The standard for instituting an inter partes
`
`review is set forth in 35 U.S.C. § 314(a), which provides as follows:
`
`THRESHOLD -- The Director may not authorize an inter
`partes review to be instituted unless the Director
`determines that the information presented in the petition
`filed under section 311 and any response filed under
`section 313 shows that there is a reasonable likelihood
`that the petitioner would prevail with respect to at least
`1 of the claims challenged in the petition.
`
`
`Petitioner contends that the challenged claims are unpatentable under
`
`35 U.S.C. §§ 102 and/or 103 on the following specific grounds (Pet. 10-58):1
`
`Reference(s)
`
`Basis
`
`Claims challenged
`
`Lim
`
`§ 102
`
`1, 11, 12, and 22
`
`VMware ESX
`
`§ 102
`
`1, 11, 12, and 22
`
`VMware GSG
`
`§ 102
`
`1, 11, 12, and 22
`
`
`1 The references relied upon are: US 6,795,966 (Ex. 1004) (“Lim”), VMware ESX
`Server: User Manual (Ex. 1005) (“VMware ESX”), Getting Started Guide:
`VMware 2.0 for Linux (Ex. 1006) (“VMware GSG”), “Checkpoint for Network
`Transferable Computer” by Suzaki (Exs. 1007-1009) (“Suzaki”), and “Integrating
`Checkpointing with Transaction Processing” by Wang (Ex. 1010) (“Wang”); and
`US 6,917,963 (Ex. 1011) (“Hipp”). Additionally, Petitioner supports its challenge
`with a declaration by Dr. Prashant Shenoy (Ex. 1002) (“Shenoy Decl.”).
`
` 2
`
`
`
`
`
`
`
`IPR2013-00150
`Patent 7,093,086
`
`
`Reference(s)
`
`Basis
`
`Claims challenged
`
`Suzaki
`
`§ 102
`
`1 and 12
`
`Suzaki and Wang
`
`§ 103
`
`11 and 22
`
`Suzaki and Hipp
`
`§ 103
`
`11 and 22
`
`Hipp
`
`§ 102
`
`1, 11, 12, and 22
`
`For the reasons given below, we institute an inter partes review of claims 1,
`
`11, 12, and 22.
`
`B. Additional Proceedings
`
`In addition to this petition, Petitioner has filed petitions challenging the
`
`patentability of certain claims of Patent Owner’s U.S. Patents 6,931,558 (IPR2013-
`
`00141, IPR2013-00142), 7,254,682 (IPR2013-00144, IPR2013-00145), and
`
`7,191,299 (IPR2013-00143, IPR2013-00151).
`
`C. The Invention
`
`The ’086 patent is titled “Disaster Recovery and Backup Using Virtual
`
`Machines” and generally relates to computer systems and methods for backing up
`
`virtual machines. ’086 patent, col. 2, ll. 1-2. The patent describes a computer
`
`system that executes one or more virtual machines, having multiple applications,
`
`and to create a backup; the computer system may capture a state of each virtual
`
`machine and backup the state. Id. at col. 2, ll. 53-56. The state may include the
`
`information in a virtual image created in response to a suspension of the virtual
`
`machine. Id. at col. 2, ll. 60-62. Figure 1 of ’086 patent is reproduced below:
`
` 3
`
`
`
`
`
`
`
`
`
`
`
`IPR2013-00150
`Patent 7,093,086
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`’086 patent, Figure 1
`
`As illustrated above in Figure 1, the ’086 patent discloses that multiple virtual
`
`machines, 16A-C, can be controlled by Virtual Machine (“VM”) Kernel 18, which
`
`comprise software and/or data structures executed on the underlying hardware 20
`
`of the computer system 10. ’086 patent, col. 3, ll. 30-37. Figure 1 further
`
`illustrates that the computer system 10 can include a storage device 22 and backup
`
`medium 24. ’086 patent, col. 3, ll. 40-42. Claim 1 illustrates the claimed subject
`
`matter and is reproduced below:
`
`1. A computer readable medium storing a plurality of
`instructions comprising instructions which, when
`executed:
`(i) capture a state of a first virtual machine executing on a
`first computer system, the state of the first virtual
`machine corresponding to a point in time in the
`execution of the first virtual machine, wherein the first
`
` 4
`
`
`
`
`
`
`
`IPR2013-00150
`Patent 7,093,086
`
`
`virtual machine comprises at least one virtual disk
`storing at least one file used by at least one
`application executing in the first virtual machine, and
`wherein
`the state of
`the first virtual machine
`comprises the at least one file; and
`(ii) copy at least a portion of the state to a destination
`separate from a storage device to which the first
`virtual machine is suspendable, wherein suspending
`the first virtual machine is performed responsive to a
`suspend command.
`
`
`D. Claim Construction
`
`Consistent with the statute and the legislative history of the AIA, the Board
`
`will interpret claims of an unexpired patent using the broadest reasonable
`
`construction in light of the specification of the patent. See Office Patent Trial
`
`Practice Guide, 77 Fed. Reg. 48756, 48766 (Aug. 14, 2012); 37 CFR
`
`§ 42.100(b). There is a “heavy presumption” that a claim term carries its ordinary
`
`and customary meaning. CCS Fitness, Inc. v. Brunswick Corp., 288 F.3d 1359,
`
`1366 (Fed. Cir. 2002).
`
`1. “state of a virtual machine”
`
`Patent Owner alleges that the term “a state of [a] virtual machine” means
`
`“information regarding [the] virtual machine, including virtual disk(s), to permit
`
`the virtual machine to resume execution.” Prelim. Resp. 14. The ’086 patent
`
`states that “the virtual machine state includes all of the state used by the
`
`application (operating system and its configuration settings, the application and its
`
`configuration settings, etc.).” ’086 patent, col. 3, ll. 22-25. In the related litigation
`
`involving the ’086 patent in the District Court for the Northern District of
`
`California (“District Court”), the Court determined that the “the specification does
`
`not explicitly address what data a ‘state’ must contain, providing only examples,
`
`such as: ‘all the state needed to restart the application on the second computer
`
` 5
`
`
`
`
`
`
`
`IPR2013-00150
`Patent 7,093,086
`
`system (e.g., the operating system and its configuration settings, the application
`
`and its configuration settings, etc.).’” Symantec Corp. v. Veeam Software Corp.,
`
`Case No. 12-cv-00700-SI, March 8, 2013 Claim Construction Order, 9 (Ex. 2005)
`
`(“Claim Construction Order”) (quoting the ’086 patent, col. 2, ll. 60-62). The
`
`District Court ultimately found that “the specification clearly indicates that a ‘state’
`
`is recorded to permit the virtual machine to resume the interrupted application to
`
`the point in time the state was recorded.” Claim Construction Order 10.
`
`Accordingly, the District Court construed “‘a state of [first] virtual machine’ as
`
`‘information regarding the [first] virtual machine to permit the virtual machine to
`
`resume execution of the application at the point in time the state was captured.”
`
`Claim Construction Order 10 (brackets in original). On the record presented, we
`
`find this reasonable and, therefore, adopt the District Court’s construction.
`
`2. “copy[ing] at least a portion of the state to a destination separate
`from a storage device to which the first virtual machine is
`suspendable”
`
`Patent Owner argues that the claimed phrase “copy[ing] at least a portion of
`
`the state to a destination separate from a storage device to which the first virtual
`
`machine is suspendable” should be construed as the following:
`
`(1) if a previous copy of the virtual disk(s) resides on a destination
`that is separate from a storage device on which the state of the first
`virtual machine is stored when the first virtual machine is suspended,
`storing changes to the state at the separate destination, or
`(2) if a previous copy of the virtual disk(s) does not reside on the separate
`destination, storing the captured state at the separate destination.
`
`Prelim. Resp. 17. In the related litigation involving the ’086 patent, the parties
`
`agreed that “a destination separate from a storage device to which the
`
`first virtual machine is suspendable” means “a destination separate from a storage
`
`device on which the state of the first virtual machine is stored when the first virtual
`
` 6
`
`
`
`
`
`
`
`IPR2013-00150
`Patent 7,093,086
`
`machine is suspended.” Claim Construction Order 3. Patent Owner argues that in
`
`one embodiment described in the ’086 patent, if a previous copy of the state
`
`information being newly captured already resides on a separate destination, then
`
`only the information regarding changes in state would be copied to the separate
`
`destination. Prelim. Resp. 20 (citing ’086 patent, col. 6, ll. 52-63, col. 7, ll. 10-15,
`
`col. 13, ll. 20-25). Patent Owner further argues that in another embodiment
`
`described in the ’086 patent, if a previous copy of the virtual disks does not reside
`
`on the separate destination, then all of the state captured is copied. Prelim. Resp.
`
`20 (citing ’086 patent, col. 2, ll. 55 – col. 3, l. 7, col. 13, ll. 20-21). Patent Owner’s
`
`proposed claim construction attempts to import into the claims language from these
`
`two embodiments in the specification by attempting to insert multiple conditions
`
`about when and what to copy into the claim language “copy at least a portion.”
`
`This is not permissible. See Phillips v. AWH Corp., 415 F.3d 1303, 1323 (Fed. Cir.
`
`2005)(en banc)(“[A]lthough the specification often describes very specific
`
`embodiments of the invention, we have repeatedly warned against confining the
`
`claims to those embodiments.”).
`
`On the record presented, we conclude that the broadest reasonable
`
`interpretation of the phrase “copy[ing] at least a portion of the state to a destination
`
`separate from a storage device to which the first virtual machine is suspendable”
`
`consistent with the specification is “copy[ing] at least a portion of the state to a
`
`destination separate from a storage device on which the state of the first virtual
`
`machine is stored when the first virtual machine is suspended.”
`
`E. Other Matters
`
`Patent Owner contends that there is insufficient evidence that the VMware
`
`ESX is a printed publication. Prelim. Resp. 7. Patent Owner provides a similar
`
`challenge alleging insufficient evidence of publication for VMware GSG and
`
` 7
`
`
`
`
`
`
`
`IPR2013-00150
`Patent 7,093,086
`
`Suzaki. Prelim. Resp. 7-9. At this stage of the proceedings, in light of the indicia
`
`of publication exhibited on these documents and in the absence of any compelling
`
`evidence to the contrary, we choose to consider VMware ESX, VMware GSG, and
`
`Suzaki for the purpose of this decision.
`
`
`
`II. ANALYSIS
`
`A. Overview
`
`Petitioner contends that the claims of the ’086 patent combine two well-
`
`known computing concepts: (1) copying data to a separate destination, and (2)
`
`virtual machines. Pet. 3. To support this position, Patent Owner provides
`
`testimony of Dr. Prashant Shenoy, who states that he has more than two decades of
`
`experience in distributed/operating systems, networking, and data management,
`
`and is familiar with the technology disclosed in the ’086 patent. Shenoy
`
`Decl. ¶¶ 1-4.
`
`B. Anticipation by Lim of claims 1, 11, 12, and 22
`
`1. Overview of Lim
`
`Lim is titled “mechanism for restoring, porting, replicating, and
`
`checkpointing computer systems using state extraction” and discloses a virtual
`
`machine monitor on which multiple virtual computer systems are installed whose
`
`states can be checkpointed under control of the virtual machine monitor. Lim,
`
`Abstr. The checkpointed virtual machine may be restored into the system at a later
`
`time. Id. Figure 2 of Lim is reproduced below:
`
` 8
`
`
`
`
`
`
`
`
`
`
`
`IPR2013-00150
`Patent 7,093,086
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Lim, Figure 2
`
`As shown above in Figure 2, Lim discloses a virtual machine (“VM1”) 200,
`
`including a virtual operation system (“VOS”) 202, a virtual processor (“VPROC”)
`
`204, a virtual disk that is virtual memory (“VMEM”) 206, and virtual peripheral
`
`devices 208, “all of which are implemented in software to emulate the
`
`corresponding components of an actual computer.” Lim, col. 14, ll. 27-32.
`
`Additionally, as shown in Figure 2, Lim discloses a virtual machine monitor 250 in
`
`between the virtual machines 200 to 200n and the system hardware. Lim, col. 15,
`
`ll. 26-31. To enable computer system restoration, Lim discloses capturing the
`
`“total machine state” of a computer system, which is “the entire collection of all
`
`information that is necessary and sufficient to uniquely determine the status of all
`
`hardware and software components at the completion of any given processor
`
` 9
`
`
`
`
`
`
`
`IPR2013-00150
`Patent 7,093,086
`
`instruction.” Lim, col. 10, ll. 26-30. Therefore, if the processor’s execution is
`
`interrupted, the “total machine state is then the set of data that, when loaded at any
`
`time into the appropriate memory positions (both internal and external to the
`
`processor), will cause the processor, and all connected hardware and software
`
`components, to continue executing in exactly the same way as if there had been no
`
`interruption at all.” Lim, col. 10, ll. 32-38.
`
`2. Analysis
`
`a. Claims 1 and 12
`
`Claims 1 and 12 require that capturing the “state of a first virtual machine,”
`
`where the virtual machine comprises “at least one virtual disk storing at least one
`
`file used by at least one application executing in the first virtual machine.” Patent
`
`Owner argues that the “state of the first virtual machine” must include at least one
`
`“file” used by at least one application executing on the virtual machine. Prelim.
`
`Resp. 24. Patent Owner contends that Lim fails to teach capturing a file by an
`
`application because it teaches that the state is represented and stored as a vector,
`
`and the vector is a list or data structure of all of the parameters, register values, I/O,
`
`and other peripheral device settings. Prelim. Resp. 24. We disagree, as Patent
`
`Owner’s arguments are not consistent with the disclosures in Lim.
`
`Lim discloses that “[d]efined broadly, this invention encapsulates the entire
`
`computer system by enumerating and storing its total machine state using software
`
`(or dedicated hardware).” Lim, col. 10, ll. 62-64 (emphasis added). Furthermore,
`
`Lim discloses that encapsulating the entire computer system includes “data that is
`
`in application buffers or in the disk cache of the operating system, as well as the
`
`data that is on the disk, is included in the transaction.” Lim, col. 11, ll. 2-5
`
`(emphasis added). Accordingly, as noted by Dr. Shenoy, Lim discloses capturing
`
`the “total machine state” of a computer system, which is “‘the entire collection of
`
`
`
`10
`
`
`
`
`
`IPR2013-00150
`Patent 7,093,086
`
`all information that is necessary and sufficient to uniquely determine the status of
`
`all hardware and software components at the completion of any given processor
`
`instruction.’” Shenoy Decl. ¶ 15 (quoting Lim, col. 10, ll. 27-30). Therefore, Lim
`
`discloses that in addition to representing the machine state in a “list or data
`
`structure” such as a “state vector,” all associated data, including files, are captured.
`
`See Lim, col. 11, ll. 2-5.
`
`Patent Owner further argues that Lim discloses only capturing vectors, and
`
`contends that “a vector is a data structure that merely includes a list of elements
`
`according to Lim.” Prelim. Resp. 25. Additionally, Patent Owner argues that
`
`nowhere does Lim teach or suggest that the elements of the state vector are files.
`
`Prelim. Resp. 26. We do not agree. Patent Owner’s argument that Lim discloses
`
`merely storing a “list of elements” is not consistent with the disclosure in Lim that
`
`the system captures “the entire collection of all information that is necessary and
`
`sufficient to uniquely determine the status of all hardware and software
`
`components,” including “data in application buffers or in the disk cache of the
`
`operating system, as well as the data that is on the disk.” Lim, col. 10, ll. 27-30;
`
`col. 11, ll. 2-4. By disclosing the capture of all information including the data on
`
`the disk, Lim discloses the capture of files. Accordingly, we are not persuaded that
`
`Lim fails to disclose capturing files used by applications executing on the virtual
`
`machine.
`
`For these reasons, Petitioner has demonstrated that there is a reasonable
`
`likelihood that it will prevail with respect to claims 1 and 12 based on the ground
`
`that these claims are anticipated by Lim.
`
`b. Claims 11 and 22
`
`We have reviewed Petitioner’s analysis in relation to dependent claims 11
`
`and 22. Patent Owner does not argue claims 11 and 22 separately from claims 1
`
`
`
`11
`
`
`
`
`
`IPR2013-00150
`Patent 7,093,086
`
`and 12. We find Petitioner’s arguments reasonable with respect to claims 11 and
`
`22. Therefore, we determine that Petitioner has demonstrated that there is a
`
`reasonable likelihood that it will prevail with respect to claims 11 and 22 based on
`
`the ground that this claim is anticipated by Lim.
`
`C. Anticipation by VMware ESX of claims 1, 11, 12, and 22
`
`1. Overview of VMware ESX
`
`VMware ESX provides a user’s manual for installing and configuring the
`
`VMware ESX Server, including how to create and provision virtual machines and
`
`how to manage virtual machines. VMware ESX 18. VMware ESX discloses that
`
`a virtual machine can be suspended at any desired point in its operation and then
`
`later resumed at that same state. VMware ESX 97. In order to capture the state of
`
`a virtual machine, VMware ESX discloses storing information in two files: (1) an
`
`.std file, which “contains the entire state of the virtual machine,” and (2) a redo-log
`
`file (.redo file) used to save changes while the virtual machine is operation.
`
`VMware ESX 58, 97-98, 149. Furthermore, VMware ESX describes that the .std
`
`file and the .redo file can be stored locally or remotely. See VMware ESX 97, 106.
`
`VMware ESX discloses the creation of a redo log (.redo file), which
`
`“contains the incremental changes to the disk image.” VMware ESX 106.
`
`Furthermore, VMware ESX discloses that the ESX server captures changes during
`
`a working session in redo log and “continually adds changes to the redo log until
`
`you remove the redo-log file or commit the changes using the commit command.”
`
`VMware ESX 39.
`
`2. Analysis
`
`a. Claims 1 and 12
`
`Claims 1 and 12 require “copy[ing] at least a portion of the state to a
`
`
`
`12
`
`
`
`
`
`IPR2013-00150
`Patent 7,093,086
`
`destination separate from a storage device to which the first virtual machine is
`
`suspendable.” Petitioner argues that VMware ESX describes copying to a separate
`
`storage device by “disclosing that the .redo file can be copied to a remote location:
`
`‘The redo log can . . . be transported to a remote site and copied to the SCSI disk’
`
`of the remote site.” Pet. 19 (quoting VMware ESX 106). Patent Owner generally
`
`argues, however, that while VMware ESX discusses the possibility of suspending
`
`the virtual machine and saving its state to different possible storage devices,
`
`VMware ESX fails to disclose copying at least a portion of the captured state
`
`destination separate from a storage device on which the state is stored when the
`
`virtual machine is suspended. Prelim. Resp. 31. Specifically, Patent Owner makes
`
`two arguments with respect to the required claim limitation of copying to a
`
`“destination separate.”
`
`First, Patent Owner argues that VMware ESX fails to provide disclosure
`
`matching Patent Owner’s proposed construction for the claimed phrase “copy[ing]
`
`at least a portion of the state to a destination separate from a storage device to
`
`which the first virtual machine is suspendable.” Prelim. Resp. 31. As stated
`
`above, we do not adopt Patent Owner’s proposed claim construction, and we
`
`determine that the phrase “copy[ing] at least a portion of the state to a destination
`
`separate from a storage device to which the first virtual machine is suspendable”
`
`means “copy[ing] at least a portion of the state to a destination separate from a
`
`storage device on which the state of the first virtual machine is stored when the
`
`first virtual machine is suspended.” Accordingly, VMware ESX need not disclose
`
`choosing a destination for copying based on where the previous copy of the virtual
`
`disk resides, as argued by Patent Owner, but VMware ESX must merely disclose
`
`copying a portion of the state to a destination separate from the suspend storage
`
`device.
`
`
`
`
`
`13
`
`
`
`IPR2013-00150
`Patent 7,093,086
`
`
`Second, Patent Owner argues that VMware ESX fails to disclose copying to
`
`a “destination separate from a storage device” but discloses that the captured state
`
`is stored at the location where it is suspended. Prelim. Resp. 31-32. We are not
`
`persuaded by Patent Owner’s argument. VMware ESX discloses that at least a
`
`portion of the state can be stored in a variety of locations, including locations
`
`separate from the device storing the suspended virtual machine. See VMware ESX
`
`97, 106. For example, VMware ESX discloses that the .redo file containing the
`
`changes to the disk image can be “transported to a ‘remote site.’” VMware ESX
`
`106. Accordingly, we are not persuaded by Patent Owner’s argument that
`
`VMware ESX fails to disclose copying “at least a portion of the state to a
`
`destination separate from a storage device to which the first virtual machine is
`
`suspendable,” as required by claims 1 and 12.
`
`Patent Owner further contends that the “remote site” disclosed in VMware
`
`ESX is not remote at all. Prelim. Resp. 34. However, Patent Owner fails to
`
`provide any citations to VMware ESX that indicate that the disclosure there of a
`
`“remote site” is anything other than remote or, in other words, distant from the
`
`local device onto which the virtual machine is suspended.
`
`For these reasons, Petitioner has demonstrated that there is a reasonable
`
`likelihood that it will prevail with respect to claims 1 and 12 based on the ground
`
`that these claims are anticipated by VMware ESX.
`
`b. Claims 11 and 22
`
`We have reviewed Petitioner’s analysis in relation to dependent claims 11
`
`and 22. Patent Owner does not argue claims 11 and 22 separately. We find
`
`Petitioner’s arguments reasonable with respect to claims 11 and 22. Therefore, we
`
`determine that Petitioner has demonstrated that there is a reasonable likelihood that
`
`it will prevail with respect to claims 11 and 22 based on the ground that this claim
`
`
`
`14
`
`
`
`
`
`IPR2013-00150
`Patent 7,093,086
`
`is anticipated by VMware ESX.
`
`D. Anticipation by VMware GSG of claims 1, 11, 12, and 22
`
`1. Overview of VMware GSG
`
`Like VMware ESX, VMware GSG provides a user guide related to the
`
`VMware software for implementing virtual machines. VMware GSG 1-1.
`
`VMware GSG is titled “Getting Started Guide – Vmware 2.0 for Linux” and
`
`describes how to install, configure, and manage VMware 2.0 on computer systems
`
`executing the Linux operating system. VMware GSG 1-1. Similar to VMware
`
`ESX described above, VMware GSG discloses the ability to suspend and store
`
`virtual machines. VMware GSG 2-5 (“[u]sing Suspend and Instant Restore . . .
`
`[y]ou can save the current state of your virtual machine.”). Specifically, VMware
`
`GSG discloses that “[s]uspend to disk allows you to save the current state of a
`
`virtual machine across reboots of your host operating system” so that without
`
`having to wait for the virtual machine to boot “you can quickly pick up work right
`
`where you stopped, with all the applications and documents you were working on
`
`open and ready for use.” VMware GSG 3-25.
`
`VMware GSG further discloses that the “state of a virtual machine can be
`
`saved to disk or memory.” VMware GSG 3-25. “If you suspend to memory, the
`
`saved state of the virtual machine is available as long as the virtual machine is
`
`powered on,” and “[i]f you suspend a virtual machine to disk, you may power off
`
`after suspending.” VMware GSG 3- 25.
`
`2. Analysis
`
`Patent Owner does not argue against Petitioner’s challenge of anticipation
`
`based VMware GSG separately from the challenge based on VMware ESX, but
`
`rather argues them jointly. See Prelim. Resp. 27-38. Accordingly, Patent Owner
`
`argues that VMware GSG does not anticipate independent claims 1 and 12 for the
`
`
`
`15
`
`
`
`
`
`IPR2013-00150
`Patent 7,093,086
`
`same reasons as VMware ESX, namely, that VMware GSG fails to disclose
`
`copying at least a portion of the captured state to a destination separate from a
`
`storage device on which the state is stored when the virtual machine is suspended.
`
`Prelim. Resp. 27-28, 34-35. We are not persuaded by Patent Owner’s arguments.
`
`As does VMware ESX, VMware GSG discloses that a .redo log file is created to
`
`save changes while the virtual machine is in operation. Pet. 24 (citing VMware
`
`GSG 3-9 (“Writes to the disk are logged [] in a redo log file. While the VMware
`
`session is running, disk blocks that have been modified and written to the redo log
`
`are read from there instead of the disk.”)). Furthermore, VMware GSG discloses
`
`that “[t]he redo log file is placed in the same directory as the disk file by default.
`
`However, the location of the redo log file can be changed in the Configuration
`
`Editor under Misc.” VMware GSG 3-9 (emphasis added). Accordingly, we are
`
`not persuaded by Patent Owner’s argument, and determine that VMware GSG
`
`discloses that the .redo file (“at least a portion of the state”) can be stored at a
`
`destination separate from a storage device on which the state is stored when the
`
`virtual machine is suspended, as required by independent claims 1 and 12.2
`
`For the reasons above, we determine that Petitioner has demonstrated that
`
`there is a reasonable likelihood that it will prevail with respect to claims 1, 11, 12,
`
`and 22 based on the ground that these claims are anticipated by VMware GSG.
`
`
`
`E. Anticipation by Suzaki of claims 1, 11, 12, and 22
`
`1. Overview of Suzaki
`
`Suzaki is titled “Checkpoint for Network Transferable Computer,” and it
`
`describes a system, which enables the transfer of the running OS image (Snapshot)
`
`
`2 Patent Owner does not argue dependent claims 11 and 22 separately.
`
`
`
`16
`
`
`
`
`
`IPR2013-00150
`Patent 7,093,086
`
`to another machine through the use of a virtual machine. Suzaki 1. Suzaki
`
`discloses that the prior art had to stop the virtual machine to get the snapshot
`
`because the snapshot was taken in hibernation, but the “new version enables the
`
`taking of the snapshot without stopping the virtual machine.” Suzaki 1. Suzaki
`
`discloses that “‘Network transferable computer’ [1] is a system that makes it
`
`possible to continue working at home without physically bringing a computer from
`
`your office.” Suzaki 2. Figure 1 of Suzaki is reproduced below:
`
`Suzaki Figure 1
`
`
`
`Suzaki discloses taking a “snapshot” of “your office computer and recreating what
`
`you were doing on it on your home computer based on the executable image.”
`
`Suzaki 2. For example, Suzaki discloses that “[i]t is possible to pause a
`
`QuickTime movie on an X Window machine and continue to play it on another
`
`machine.” Suzaki 2. An example of movie playback process is illustrated in
`
`Figure 3 of Suzaki reproduced below:
`
`
`
`
`
`
`
`17
`
`
`
`IPR2013-00150
`Patent 7,093,086
`
`
`Suzaki Figure 3
`
`
`
`Suzaki discloses that its system makes it “possible to pause a QuickTime movie
`
`played by XAnim on a desktop computer, transfer the execution image via network
`
`or a PC card to a notebook computer, and resume the movie (FIG. 3).” Suzaki 5.
`
`Additionally, Suzaki discloses that the “[c]heckpoint function makes it
`
`possible to save current state information without stopping the execution of the
`
`process.” Suzaki 5. Furthermore, Suzaki discloses that the “‘[n]etwork
`
`transferable computer’ not only transfers a disk image but can also recreate the
`
`same OS environment on another computer.” Suzaki 3.
`
`2. Analysis
`
`Petitioner argues that Suzaki’s process of checkpointing and transferring the
`
`state of a virtual machine discloses the claimed steps of capturing state information
`
`of a virtual machine and copying the state information to a separate destination.
`
`Pet. 30. Petitioner additionally argues that Suzaki describes the required capturing
`
`state corresponding to a point in time of execution by disclosing that it is possible
`
`to capture the virtual machine during playback of a movie, transfer the state of the
`
`virtual machine, and continue to play the movie on another machine. Pet. 30
`
`(citing Suzaki 2 (“’[i]t is possible to pause a QuickTime movie on an X Window
`
`machine and continue to play it on another machine.’”).
`
`Patent Owner argues that Suzaki discloses that its Software Suspend
`
`
`
`18
`
`
`
`
`
`IPR2013-00150
`Patent 7,093,086
`
`(“SWSUP”) patch, cited by Petitioner as capturing the state of the virtual machine,
`
`does not capture the state at a “point in time in time of the execution of the first
`
`virtual machine,” as required by claims 1 and 12. Prelim. Resp. 39. Patent Owner
`
`argues that the SWSUP patch in Suzaki “kills” processes one at a time during
`
`capture, and thus the state of second process would be captured at a different point
`
`in time than the state of a first process. Prelim. Resp. 40.
`
`We are not persuaded by Patent Owner’s argument that Suzaki discloses
`
`such an incremental capture process. Patent Owner specifically argues that the
`
`“[t]he SWSUSP patch ‘consists of a Linux kernel patch,’ which enables a
`
`shutdown process to ‘kill’ processes as the state information for each process is
`
`captured.” Prelim. Resp. 39 (citing Suzaki 4). Contrary to Patent Owner’s
`
`arguments, the cited portions of Suzaki do not disclose “killing” processes one-by-
`
`one to capture their state. Suzaki discloses that a Checkpoint is created when the
`
`SWSUP patch “[m]oves all the state information to nonvolatile memory such as
`
`hard disks and turns off a computer.” Suzaki 4. Suzaki discloses that the
`
`Checkpoint “enables another virtual computer to resume the operation from the
`
`point at which Checkpoint was executed.” Suzaki 5 (emphasis added).
`
`Accordingly, we are not persuaded that Suzaki fails to disclose capture of the state
`
`of the virtual machine at a particular point in time.
`
`For these reasons, Petitioner has demonstrated that there is a reasonable
`
`likelihood that it will prevail with respect to claims 1 and 12 based on the ground
`
`that these claims are anticipated by Suzaki.
`
`F. Obviousness of claims 11and 22 over Suzaki and Wang
`
`1. Overview of Wang
`
`Wang is titled “Integrating Checkpointing with Transaction Processing” and
`
`discloses a transactional Unix-file manager. Wang 304. Wang discloses that its
`
`
`
`19
`
`
`
`
`
`IPR2013-00150
`Patent 7,093,086
`
`Unix-file manager is enabled to “implement per-application transactional file
`
`updates” and provides a “transactional critical-memory manager” for
`
`checkpointing memory. Wang. 304, 306. Wang further discloses that its process
`
`of checkpointing involves “recording critical memory and file state at a given point
`
`of program execution on stable storage.” Wang 304.
`
`As part of the transactional file update process, Wang discloses that an
`
`“UNDO log” is created. Wang 306. Specifically, Wang discloses that “[e]very
`
`file update operation is intercepted by libfcp_RM, and an idempotent undo
`
`operation is added to the UNDO log.” Wang 306.
`
`2. Analysis
`
`Petitioner argues that dependent claims 11 and 22 are obvious in view of
`
`Suzaki and Wang. Petitioner concedes that Suzaki fails to disclose “creating a new
`
`log of uncommitted updates,” as required by claim 11, but relies upon the
`
`combination of Wang as teaching or suggesting this claim limitation. Pet. 33-34.
`
`More particularly, Petitioner argues that the claim is made obvious by Wang’s
`
`teaching of the creation of an UNDO log. Pet. 35. Petitioner argues that “[e]ach of
`
`the operations in the UNDO log corresponds to u