throbber
Filed on behalf of: Wiz, Inc.
`By: Matthew A. Argenti (margenti@wsgr.com)
`
`Michael T. Rosato (mrosato@wsgr.com)
`Wesley E. Derryberry (wderryberry@wsgr.com)
`Joseph M. Baillargeon (jbaillargeon@wsgr.com)
`WILSON SONSINI GOODRICH & ROSATI
`650 Page Mill Road
`Palo Alto, CA 94304
`
`UNITED STATES PATENT AND TRADEMARK OFFICE
`
`————————————————
`
`BEFORE THE PATENT TRIAL AND APPEAL BOARD
`
`————————————————
`
`WIZ, INC.,
`Petitioner,
`
`v.
`
`ORCA SECURITY LTD.,
`Patent Owner.
`
`————————————————
`Case IPR2024-01109
`Patent No. 11,726,809
`————————————————
`
`PETITION FOR INTER PARTES REVIEW
`OF U.S. PATENT NO. 11,726,809
`
`

`

`TABLE OF CONTENTS
`
`V.
`
`INTRODUCTION ........................................................................................... 1
`I.
`II. MANDATORY NOTICES UNDER 37 C.F.R. §42.8 .................................... 2
`III. CERTIFICATIONS ......................................................................................... 3
`IV.
`IDENTIFICATION OF CHALLENGE; STATEMENT OF PRECISE
`RELIEF REQUESTED ................................................................................... 3
`THE ’809 PATENT ......................................................................................... 4
`A.
`Prosecution History ............................................................................... 5
`VI. NO BASIS EXISTS FOR DISCRETIONARY DENIAL .............................. 5
`A.
`Discretionary Denial Is Not Warranted under Fintiv ............................ 5
`B.
`Discretionary Denial Is Not Warranted under 35 U.S.C.
`§325(d) .................................................................................................. 6
`VII. LEVEL OF ORDINARY SKILL .................................................................... 8
`VIII. CLAIM CONSTRUCTION ............................................................................ 8
`A.
`Determining/Determine a “Location” of a Snapshot ............................ 9
`B.
`“[Analyze/Analyzing] the Snapshot” .................................................. 10
`IX. BACKGROUND ........................................................................................... 11
`A.
`Cloud Computing, Virtualization, and Snapshots ............................... 11
`B.
`Cyber Security ..................................................................................... 13
`PRIOR ART ................................................................................................... 15
`A.
`Veselov (U.S. Patent. No. 11,216,563; EX1007) ............................... 15
`B. Mohanty (U.S. Patent No. 9,692,778; EX1075) ................................. 19
`C.
`Czarny (U.S. Patent No. 9,749,349; EX1084) .................................... 20
`D.
`Hutchins (U.S. Publication No. US 2013/0024940;
`EX1070) .............................................................................................. 20
`XI. GROUND 1: CLAIMS 1-10 AND 12-23 WERE OBVIOUS OVER
`VESELOV AND MOHANTY ...................................................................... 21
`A.
`Reasons to Combine Veselov and Mohanty ....................................... 21
`B.
`Independent Claims 1, 16, and 19 ....................................................... 25
`-i-
`
`X.
`
`

`

`C.
`
`Preambles .................................................................................. 25
`1.
`Element 19.i .............................................................................. 26
`2.
`Elements 1.1, 16.1, and 19.1 ..................................................... 27
`3.
`Elements 1.2, 16.2, and 19.2 ..................................................... 32
`4.
`Elements 1.3, 16.3, and 19.3 ..................................................... 34
`5.
`Elements 1.4, 16.4, and 19.4 ..................................................... 37
`6.
`Elements 1.5, 16.5, and 19.5 ..................................................... 38
`7.
`Elements 1.6, 16.6, and 19.6 ..................................................... 40
`8.
`Elements 1.7, 16.7, and 19.7 ..................................................... 42
`9.
`Elements 1.8, 16.8, and 19.8 ..................................................... 43
`10.
`Dependent Claims ............................................................................... 45
`1.
`Claim 2 ...................................................................................... 45
`2.
`Claim 3 ...................................................................................... 46
`3.
`Claims 4 .................................................................................... 47
`4.
`Claims 5 .................................................................................... 48
`5.
`Claims 6 and 17......................................................................... 50
`6.
`Claims 7 and 18......................................................................... 51
`7.
`Claim 8 ...................................................................................... 52
`8.
`Claim 9 ...................................................................................... 54
`9.
`Claim 10 .................................................................................... 55
`10. Claim 12 .................................................................................... 55
`11. Claims 13 and 20....................................................................... 57
`12. Claims 14 and 21....................................................................... 58
`13. Claims 15 and 22....................................................................... 60
`14. Claim 23 .................................................................................... 64
`XII. GROUND 2: CLAIMS 1-10 AND 12-23 WERE OBVIOUS OVER
`VESELOV, MOHANTY, AND CZARNY .................................................. 65
`A.
`Reasons to Combine Veselov, Mohanty, and Czarny ......................... 65
`
`-ii-
`
`

`

`Claims 1, 16, and 19 ............................................................................ 68
`B.
`Claims 6 and 17 ................................................................................... 69
`C.
`Claims 7 and 18 ................................................................................... 70
`D.
`XIII. GROUNDS 3-4: CLAIM 11 WAS OBVIOUS OVER VESELOV,
`MOHANTY, AND HUTCHINS (WITH OR WITHOUT CZARNY) ......... 71
`A.
`Reasons to Combine Veselov, Mohanty, and Hutchins
`(with or without Czarny) ..................................................................... 71
`Claim 11 .............................................................................................. 73
`B.
`XIV. CONCLUSION .............................................................................................. 74
`
`-iii-
`
`

`

`LISTING OF CHALLENGED CLAIMS
`
`1. A method for securing virtual cloud assets against cyber vulnerabilities in
`a cloud computing environment, the method comprising:
`
`[1.1] determining, using an API or service provided by the cloud
`computing environment, a location of a snapshot of at least one virtual
`disk of a protected virtual cloud asset, wherein the protected virtual
`cloud asset is instantiated in the cloud computing environment;
`
`[1.2] accessing, based on the determined location and using an API or
`service provided by the cloud computing environment, the snapshot of
`the virtual disk;
`
`[1.3] analyzing the snapshot of the at least one virtual disk by matching
`installed applications with applications on a known list of vulnerable
`applications;
`
`[1.4] determining, based on the matching, an existence of a plurality of
`potential cyber vulnerabilities;
`
`[1.5] correlating the determined potential cyber vulnerabilities with a
`network location of the protected virtual cloud asset;
`
`[1.6] using the determined plurality of potential cyber vulnerabilities
`and the network location of the protected virtual cloud asset to
`determine a risk of the protected virtual cloud asset to the cloud
`computing environment;
`
`[1.7] prioritizing, by the determined risk, the plurality of potential cyber
`vulnerabilities; and
`
`the determined plurality of potential cyber
`reporting
`[1.8]
`vulnerabilities as alerts prioritized according to the determined risk
`
`2. The method of claim 1, wherein reporting the determined potential cyber
`vulnerabilities includes communicating the prioritized alerts to a user console
`or a security information and event management (SIEM) system.
`
`3. The method of claim 2, further comprising filtering the determined potential
`cyber vulnerabilities based on a determined risk level associated with each
`
`-iv-
`
`

`

`determined potential cyber vulnerability, such that a number of the prioritized
`alerts reported to a user console or a SIEM system is less than a total number
`of determined potential cyber vulnerabilities.
`
`4. The method of claim 3, wherein determining the risk of the protected virtual
`cloud asset to the cloud computing environment is based on external
`intelligence on the likelihood of the determined potential cyber vulnerabilities
`being exploited.
`
`5. The method of claim 4, wherein determining a risk of the protected virtual
`cloud asset to the cloud computing environment includes analyzing a
`configuration of the protected virtual cloud asset, and wherein the method
`further comprises: weighting a takeover risk of the protected virtual cloud
`asset.
`
`6. The method of claim 1, wherein analyzing the snapshot of the at least one
`virtual disk includes matching application files on the snapshot of the at least
`one virtual disk directly against application files associated with a known list
`of vulnerable applications.
`
`7. The method of claim 1, wherein analyzing the snapshot of the at least one
`virtual disk includes matching application files on the snapshot of the at least
`one virtual disk by: computing a cryptographic hash against at least one
`application file to be matched; and matching the computed cryptographic hash
`against a database of files associated with a known list of vulnerable
`applications.
`
`8. The method of claim 1, wherein analyzing the snapshot of the at least one
`virtual disk includes:
`
`[8.1] parsing the snapshot of the at least one virtual disk; and
`
`[8.2] scanning the parsed snapshot of the at least one virtual disk to
`detect the potential cyber vulnerabilities.
`
`9. The method of claim 8, wherein scanning the parsed snapshot further
`includes at least one of:
`
`[9.1] checking configuration files of applications and an operating
`system installed in the protected virtual cloud asset;
`
`-v-
`
`

`

`[9.2] verifying access times to files by the operating system installed in
`the protected virtual cloud asset; or
`
`[9.3] analyzing system logs to deduce applications and modules
`executed in the protected virtual cloud asset.
`
`10. The method of claim 1, further comprising mitigating a potential cyber
`vulnerability posing a risk to the protected virtual cloud asset.
`
`11. The method of claim 10, wherein mitigating a potential cyber vulnerability
`includes at least one of: blocking traffic from untrusted networks to the
`protected virtual cloud asset, halting operation of the protected virtual cloud
`asset, or quarantining the protected virtual cloud asset.
`
`12. The method of claim 1, wherein determining the location of the snapshot
`of at least one virtual disk further includes determining a virtual disk allocated
`to the protected virtual cloud asset.
`
`13. The method of claim 1, wherein determining the location of the snapshot
`of at least one virtual disk further includes: using an API or service provided
`by the cloud computing environment for taking the snapshot or requesting the
`taking of the snapshot.
`
`14. The method of claim 13, wherein determining the location of the snapshot
`of at least one virtual disk further includes obtaining the location of the
`snapshot after the snapshot is taken.
`
`15. The method of claim 1, wherein determining the location of the snapshot
`of at least one virtual disk further includes querying a cloud management
`console of the cloud computing environment for the location of the snapshot
`and the location of the virtual disk.
`
`16. A non-transitory computer readable medium containing instructions that
`when executed by at least one processor cause the at least one processor to
`perform operations for securing virtual cloud assets against cyber
`vulnerabilities in a cloud computing environment, the operations comprising:
`
`[16.1] determining, using an API or service provided by the cloud
`computing environment, a location of a snapshot of at least one virtual
`disk of a protected virtual cloud asset, wherein the protected virtual
`cloud asset is instantiated in the cloud computing environment;
`-vi-
`
`

`

`[16.2] accessing, based on the determined location and using an API or
`service provided by the cloud computing environment, the snapshot of
`the virtual disk;
`
`[16.3] analyzing the snapshot of the at least one virtual disk by
`matching installed applications with applications on a known list of
`vulnerable applications;
`
`[16.4] determining, based on the matching, an existence of a plurality
`of potential cyber vulnerabilities;
`
`[16.5] correlating the determined potential cyber vulnerabilities with a
`network location of the protected virtual cloud asset;
`
`[16.6] using the determined plurality of potential cyber vulnerabilities
`and the network location of the protected virtual cloud asset to
`determine a risk of the protected virtual cloud asset to the cloud
`computing environment;
`
`[16.7] prioritizing, by the determined risk, the plurality of potential
`cyber vulnerabilities; and
`
`the determined plurality of potential cyber
`[16.8] reporting,
`vulnerabilities as alerts prioritized according to the determined risk.
`
`17. The non-transitory computer readable medium of claim 16, wherein
`analyzing the snapshot of the at least one virtual disk further includes
`matching application files on the snapshot of the at least one virtual disk
`directly against application files associated with a known list of vulnerable
`applications.
`
`18. The non-transitory computer readable medium of claim 16, wherein
`analyzing the snapshot of the at least one virtual disk further includes
`matching application files on the snapshot of the at least one virtual disk by:
`computing a cryptographic hash against at least one application file to be
`matched; and matching the computed cryptographic hash against a database
`of files associated with a known list of vulnerable applications.
`
`19. A system for securing virtual cloud assets against cyber vulnerabilities in
`a cloud computing environment, the system comprising:
`
`-vii-
`
`

`

`[19.i] at least one processor configured to:
`
`[19.1] determine, using an API or service provided by the cloud
`computing environment, a location of a snapshot of at least one virtual
`disk of a protected virtual cloud asset, wherein the protected virtual
`cloud asset is instantiated in the cloud computing environment;
`
`[19.2] access, based on the determined location and using an API or
`service provided by the cloud computing environment, the snapshot of
`the virtual disk;
`
`[19.3] analyze the snapshot of the at least one virtual disk by matching
`installed applications with applications on a known list of vulnerable
`applications;
`
`[19.4] determine, based on the matching, an existence of a plurality of
`potential cyber vulnerabilities;
`
`[19.5] correlate the determined potential cyber vulnerabilities with a
`network location of the protected virtual cloud asset;
`
`[19.6] use the determined plurality of potential cyber vulnerabilities
`network location of the protected virtual cloud asset to determine a risk
`of the protected virtual cloud asset to the cloud computing environment;
`
`[19.7] prioritize, by the determined risk, the plurality of potential cyber
`vulnerabilities; and
`
`[19.8] report the determined plurality of potential cyber vulnerabilities
`as alerts prioritized according to the determined risk.
`
`20. The system of claim 19, wherein determining the location of the snapshot
`of at least one virtual disk further includes: using an API or service provided
`by the cloud computing environment for taking the snapshot or requesting the
`taking of the snapshot.
`
`21. The system of claim 20, wherein determining the location of the snapshot
`of at least one virtual disk further includes obtaining the location of the
`snapshot that is taken.
`
`-viii-
`
`

`

`22. The system of claim 19, wherein determining the location of the snapshot
`of at least one virtual disk further includes querying a cloud management
`console of the cloud computing environment for the location of the snapshot
`and the location of the virtual disk.
`
`23. The method of claim 1, further comprising copying the snapshot of the at
`least one virtual disk; and further wherein analyzing the snapshot of the at
`least one virtual disk comprises analyzing the copy of the snapshot.
`
`-ix-
`
`

`

`I.
`
`INTRODUCTION
`
`Petitioner Wiz, Inc. (“Wiz”) respectfully requests review of U.S. Patent No.
`
`11,726,809 (“the ’809 patent”), currently assigned to Orca Security Ltd. (“Orca”).
`
`This petition demonstrates that claims 1-23 are unpatentable.
`
`The ’809 claims describe well-known techniques for securing virtual cloud
`
`assets such as virtual machines (“VMs”). A “snapshot” of the asset’s virtual disk
`
`is located, accessed, and analyzed to determine vulnerabilities by matching
`
`installed applications with a known list of vulnerable applications. A risk is
`
`determined based on the determined vulnerabilities and correlating the determined
`
`vulnerabilities with a network location. The vulnerabilities are then prioritized and
`
`reported as prioritized alerts based on the determined risk.
`
`This type of snapshot-based analysis was already well known, as
`
`demonstrated by the combination of Veselov and Mohanty. Veselov discloses
`
`most aspects of the independent claims, though it does not expressly discuss
`
`correlating the detected vulnerabilities with a network location, determining a risk
`
`based on the network location and the detected vulnerabilities, and then
`
`prioritizing/reporting based on that risk. However, this type of network-location-
`
`based prioritization was well known, as shown for example by Mohanty. The
`
`dependent claims describe other well-known features.
`
`Accordingly, Wiz respectfully requests institution of inter partes review.
`
`-1-
`
`

`

`II. MANDATORY NOTICES UNDER 37 C.F.R. §42.8
`
`Real Party-in-Interest (37 C.F.R. §42.8(b)(1)): Petitioner Wiz is the real
`
`party-in-interest.
`
`Related Matters (37 C.F.R. §42.8(b)(2)): Wiz is involved in litigation
`
`involving the ’809 patent in Orca Security Ltd. v. Wiz, Inc., No. 1-23-cv-00758
`
`(DDE), filed and served on July 12, 2023. Wiz also recently filed several IPR
`
`petitions, including IPR2024-00220 against U.S. Patent No. 11,431,735, which is
`
`a related patent owned by Patent Owner that contains claims similar to those of the
`
`’809 patent. IPR2024-00220, Paper 2. Like the current petition, the petition in
`
`IPR2024-00220 included a Veselov-based ground. In response, Patent Owner
`
`disclaimed all challenged claims. IPR2024-00220, Paper 6. Wiz has also filed
`
`three petitions against other patents that are involved in the abovementioned
`
`litigation: IPR2024-00863 against U.S. Patent No. 11,663,031, IPR2024-00864
`
`against U.S. Patent No. 11,663,032, and IPR2024-00865 against U.S. Patent No.
`
`11,693,685.
`
`Lead and Back-Up Counsel (37 C.F.R. §42.8(b)(3)):
`
`Lead Counsel: Matthew A. Argenti (Reg. No. 61,836)
`
`Back-Up Counsel: Michael T. Rosato (Reg. No. 52,182); Wesley E.
`
`Derryberry (Reg. No. 71,594); Joseph M. Baillargeon (Reg. No. 79,685)
`
`-2-
`
`

`

`Service Information – 37 C.F.R. §42.8(b)(4): Wiz consents to electronic
`
`service. Please direct all correspondence to lead and back-up counsel at the
`
`contact information below. A power of attorney accompanies this petition.
`
`E-mail: margenti@wsgr.com; mrosato@wsgr.com; wderryberry@wsgr.com;
`
`jbaillargeon@wsgr.com
`
`Post: WILSON SONSINI GOODRICH & ROSATI, 650 Page Mill Road,
`
`Palo Alto, CA 94304
`
`Tel.: 650-354-4154
`
`Fax: 650-493-6811
`
`III. CERTIFICATIONS
`
`The ’809 patent is available for IPR, and Wiz is not barred or estopped from
`
`requesting IPR on these grounds.
`
`IV.
`
`IDENTIFICATION OF CHALLENGE; STATEMENT OF PRECISE RELIEF
`REQUESTED
`
`Wiz seeks cancellation of the challenged claims for the reasons stated below,
`
`which are supported with exhibits, including the Declaration of Dr. Angelos
`
`Stavrou (EX1002). The claims are unpatentable under 35 U.S.C. §311 and AIA §6
`
`based on at least the following grounds:
`
`Ground
`
`Claims
`
`1
`
`1-10, 12-23
`
`Basis
`§103(a): obviousness over Veselov and
`Mohanty.
`
`-3-
`
`

`

`2
`
`3
`
`4
`
`1-10, 12-23
`
`11
`
`11
`
`§103(a): obviousness over Veselov, Mohanty,
`and Czarny.
`§103(a): obviousness over Veselov, Mohanty,
`and Hutchins.
`§103(a): obviousness over Veselov, Mohanty,
`Czarny, and Hutchins.
`
`V.
`
`THE ’809 PATENT
`
`The ’809 patent issued from U.S. Application No. 18/055,201 (“the ’201
`
`application”), filed November 14, 2022. EX1001, Face. The ’201 application
`
`claims priority to Provisional Application No. 62/797,718, filed January 28, 2019.
`
`The ’809 patent thus has an effective filing date no earlier than January 28, 2019,
`
`and is subject to AIA §102 and §103. Id.; EX1002, ¶20.
`
`The ’809 patent describes securing virtual assets in a cloud environment.
`
`EX1001, Abstract. The specification describes well-known snapshot-based
`
`analysis that includes determining the location of a snapshot of an asset’s virtual
`
`disk, accessing/analyzing the snapshot to identify vulnerabilities, and issuing
`
`prioritized alerts. Id., Abstract, 3:48-54, 3:67-4:3, 4:38-42, 5:33-40, 6:40-43, 7:53-
`
`67; EX1002, ¶¶71-72.
`
`The ’809 patent includes 23 claims. Claims 1, 16, and 19 are independent.
`
`Claims 16 and 19 essentially mirror claim 1, but whereas claim 1 is written as a
`
`method claim, independent claim 16 is directed to a computer-readable medium,
`
`-4-
`
`

`

`and independent claim 19 is directed to a system. The dependent claims add other
`
`conventional aspects of cybersecurity and cloud computing. EX1002, ¶¶73-74.
`
`A.
`
`Prosecution History
`
`The ’201 application underwent a brief examination and never received a
`
`rejection under §102 or §103. The first office action rejected the claims based on
`
`statutory double patenting but indicated that the claims were otherwise allowable.
`
`EX1004, 109-14. The Applicant then filed terminal disclaimers to secure
`
`allowance. Id., 91-93, 98-100, 104. As to the basis of allowance, the Examiner
`
`simply identified three references as the closest art and indicated that they did not
`
`teach most of the independent claim elements as a whole. Id., 26-29; see also
`
`EX1002, ¶75.
`
`VI. NO BASIS EXISTS FOR DISCRETIONARY DENIAL
`
`A.
`
`Discretionary Denial Is Not Warranted under Fintiv
`
`This petition does not implicate the Board’s discretion according to Fintiv.
`
`Apple Inc., v. Fintiv, Inc., IPR2020-00019, Paper 11. See generally Memorandum
`
`on Interim Procedure for Discretionary Denials in AIA Post-Grant Proceedings
`
`with Parallel District Court Litigation (June 21, 2022) (Fintiv Memo). Patent
`
`Owner filed its complaint in the District of Delaware on July 12, 2023, then filed
`
`two amended complaints on September 15, 2023 (the first complaint that alleged
`
`infringement of the ’809 patent), and October 10, 2023, respectively. This petition
`
`-5-
`
`

`

`is filed two-and-a-half months before the one-year bar date and less than two
`
`months after receiving Patent Owner’s initial infringement contentions identifying
`
`the asserted claims.
`
`The district court litigation is also at an early stage, and the final written
`
`decision in this IPR should issue well before the district court trial. For example,
`
`under the current amended schedule, the claim construction hearing will not occur
`
`until December 27, 2024, and expert discovery will not close until August 5,
`
`2025. EX1083, 3; see also EX1005, 15-16 (previous schedule). The trial is not
`
`scheduled to begin until March 2, 2026, which is over 1.5 years from the filing of
`
`this petition and a projected two months after a final written decision. EX1083, 4.
`
`Moreover, this district’s average time to trial is 38 months—which would put the
`
`trial in September 2026 based on the filing of the original complaint—so the actual
`
`trial date is reasonably expected to be well after issuance of a final written decision
`
`here. EX1082, 14; see also Fintiv Memo (Fintiv factor two weighs against denial
`
`“if the median time-to-trial is around the same time or after the projected statutory
`
`deadline for the PTAB’s final written decision.”).
`
`B.
`
`Discretionary Denial Is Not Warranted under 35 U.S.C. §325(d)
`
`Under the two-part Advanced Bionics framework, §325(d) analysis considers
`
`several factors to determine:
`
`-6-
`
`

`

`(1) whether the same or substantially the same art previously was
`presented to the Office or whether the same or substantially the same
`arguments previously were presented to the Office; and (2) if either
`condition of [the] first part of the framework is satisfied, whether the
`petitioner has demonstrated that the Office erred in a manner material
`to the patentability of challenged claims.
`
`Advanced Bionics, LLC v. Med-El Elektromedizinische Geräte GmbH, IPR2019-
`
`01469, Paper 6 at 8 (precedential); 35 U.S.C. §325(d). While Veselov was
`
`disclosed as one of many references across multiple information disclosure
`
`statements, it was never applied in a rejection or substantively discussed. EX1004,
`
`73, 107-15, 156-57, 181-82. Veselov was also never considered in combination
`
`with Mohanty, Czarny, or Hutchins since these references were not disclosed. The
`
`Office also lacked additional evidence discussed herein, including the declaration
`
`provided by Wiz’s expert, Dr. Stavrou.
`
`Allowance of the claims also constituted material error under part two of the
`
`Advanced Bionics test. The ’201 application never received an art-based rejection,
`
`and no particular limitation was identified as a basis for allowance. Supra, §V.A.
`
`The notice of allowance simply lists the majority of the claim limitations as
`
`supposedly not disclosed by the “closest” art. EX1004, 26-29. By contrast, the
`
`present grounds teach all limitations of claims 1-23 as a whole. Infra, §§XI-XIII.
`
`-7-
`
`

`

`The claims therefore should not have issued, and they would not have issued if the
`
`Examiner had considered the present grounds.
`
`VII. LEVEL OF ORDINARY SKILL
`
`For purposes of this petition, Wiz assumes a priority date of January 28,
`
`2019. A POSA as of January 2019 would have held at least a bachelor’s degree in
`
`computer science, computer engineering, electrical engineering, or a related field,
`
`and would also have 2-3 years of professional experience working with cyber
`
`security analysis and virtualization. Additional experience could compensate for
`
`less education and vice versa. Relevant work experience includes, for example,
`
`malware analysis, security analysis of cloud computing systems, and security
`
`analysis of virtual machines. EX1002, ¶¶21-22. Dr. Stavrou meets these
`
`requirements and is qualified to credibly opine on the state of the art and the
`
`POSA’s perspective. Id., ¶¶1-19. Section IX below summarizes the state of the
`
`art, including background knowledge that would have informed a POSA’s
`
`understanding of the references’ teachings applied herein.
`
`VIII. CLAIM CONSTRUCTION
`
`Claim terms are given their ordinary and customary meaning, consistent with
`
`the specification, as a POSA understood them. 37 CFR §42.100(b); Phillips v. AWH
`
`Corp., 415 F.3d 1303, 1312-13 (Fed. Cir. 2005) (en banc). Unless otherwise stated,
`
`this petition applies the ordinary and customary meaning of the claim terms. See also
`
`-8-
`
`

`

`EX1002, ¶76. The following limitations warrant discussion.
`
`A.
`
`Determining/Determine a “Location” of a Snapshot
`
`Each independent claim recites determining (or a system configured to
`
`determine) “a location of a snapshot” of a virtual disk of a protected virtual cloud
`
`asset. A POSA reading the claims in light of the specification would have understood
`
`that the recited “location” encompasses at least a virtual location and a non-virtual
`
`location.
`
`A POSA would have understood that the ordinary and customary meaning of a
`
`“location” in this context broadly encompassed a virtual location and a non-virtual
`
`location. EX1002, ¶¶77-78; see also id., ¶¶30 (data locations), 38 (snapshot
`
`locations).
`
`The specification confirms this understanding. It states that the “management
`
`console 150 may be queried, by the security system 140, about as the location (e.g.,
`
`virtual address) of the virtual disk 118-1 in the storage 117.” EX1001, 4:29-32
`
`(emphasis added). This parenthetical makes it clear that the recited location at least
`
`encompasses a virtual address, and the “e.g.” indicates that the location is not limited
`
`to a virtual address. EX1002, ¶78. Indeed, snapshots of virtual assets were routinely
`
`stored in non-virtual storage and accessed by referencing non-virtual locations. Id. A
`
`POSA therefore would have interpreted the term “location” to encompass both virtual
`
`and non-virtual locations. Id., ¶¶78-79 (citing EX1009, 242, 246-57; EX1010, 3-4;
`
`-9-
`
`

`

`EX1015, 56; EX1021, 8).
`
`B.
`
`“[Analyze/Analyzing] the Snapshot”
`
`Each independent claim recites “analyzing the snapshot” (or a system
`
`configured to “analyze the snapshot”).
`
`The ordinary and customary meaning of this language encompasses direct
`
`analysis of the snapshot data (e.g., analyzing the snapshot as a data file without
`
`instantiating an assessment VM). EX1002, ¶¶80-81. This understanding is confirmed
`
`by the specification. See, e.g., EX1001, 5:20-21 (“The snapshot is parsed and
`
`analyzed by the security system 140 to detect vulnerabilities.”), 5:37-40 (direct or
`
`hash-based matching of application files); see also id., 6:5-12 (analyzing page file),
`
`6:36-39 (security system computes cryptographic hash of sensitive areas in virtual
`
`disk and checks for differences), 6:56-60 (analysis of logs “derived from the
`
`snapshot”); EX1002, ¶81.
`
`In the related litigation (supra, §II), Orca appears to treat this limitation as also
`
`encompassing analysis of a VM instantiated from a snapshot. For example, Orca
`
`alleges that the accused product satisfies “analyzing the at least one snapshot,” as
`
`recited in claim 9 of related U.S. Patent No. 11,693,685 because it “‘analyzes [the]
`
`operating system, application layer, and data layer’ of virtual machines to provide full
`
`visibility into vulnerabilities across the cloud computing environment.” EX1006, 23,
`
`57-58. For purposes of this IPR, Wiz also applies Orca’s interpretation. See also
`
`-10-
`
`

`

`EX1002, ¶82.
`
`Accordingly, the discussion below applies a construction of
`
`“[analyze/analyzing] the snapshot” encompassing both direct analysis of the snapshot
`
`data and analysis of a VM instantiated from the snapshot. EX1002, ¶83. Veselov
`
`describes both of these approaches. Infra, §XI.B.5.
`
`IX. BACKGROUND
`
`A.
`
`Cloud Computing, Virtualization, and Snapshots
`
`Cloud computing was well known long before 2019. EX1002, ¶¶23, 40-42;
`
`EX1021, 1, 18-19. The physical infrastructure was often provided by data centers
`
`that included large collections of physical resources. EX1002, ¶44; EX1013, 229;
`
`EX1021, 18-19.
`
`Cloud systems typically used a “virtualization” layer that abstracts the
`
`underlying resources to efficiently manage the operation of multiple applications
`
`across multiple physical servers. EX1002, ¶43; EX1010, 2; EX1011, 35; EX1021,
`
`19. Each physical server could emulate multiple virtualized computer systems
`
`(e.g., VMs), running their own operating system/applications:
`
`-11-
`
`

`

`EX1009, 505 (Fig. A-5); see also EX1002, ¶¶24-25; EX1010, 2; EX1013, 229.
`
`Virtual machines were commonly managed by a virtual machine manager
`
`(“VMM”)—sometimes called a hypervisor or virtual machine monitor. EX1002,
`
`¶¶26-29; EX1009, xxiv, 22, 505; EX1012, 9:9-25; EX1015, 55-58, 62-66, 118,
`
`138, 163; EX1016, ii; EX1021, 94-95; EX1022, 29; EX1048, ¶31. Virtualized
`
`resources—including VMs themselves, allocated virtual disks, and particular
`
`data—were commonly referenced via various types of virtual or non-virtual
`
`locations, including more general locations (e.g., the resource’s computing
`
`environment, storage service, or directory) and more specific locations (e.g., an
`
`address or file path). EX1002, ¶¶29-31; EX1009, 2,

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket