throbber
UNITED STATES PATENT AND TRADEMARK OFFICE
`
`———————
`
`BEFORE THE PATENT TRIAL AND APPEAL BOARD
`
`———————
`
`TESLA INC.,
`Petitioner,
`
`———————
`
`IPR2025-00341
`U.S. Patent No. 7,181,743
`_____________________
`
`DECLARATION OF DR. EREZ ZADOK,
`UNDER 37 C.F.R. § 1.68 IN SUPPORT OF PETITION FOR
`INTER PARTES REVIEW
`
`1
`
`

`

`Zadok Declaration
`
`
`I. 
`
`Inter Partes Review of U.S. 7,181,743
`
`
`
`TABLE OF CONTENTS
`Introduction ...................................................................................................... 8 
`A.  Materials Considered ............................................................................. 8 
`Qualifications and Professional Experience .................................................. 10 
`II. 
`III.  Level of Ordinary Skill in the Art ................................................................. 21 
`IV.  Relevant Legal Standards .............................................................................. 22 
`V. 
`Technical Background ................................................................................... 23 
`A.  General Computer Operations ............................................................. 23 
`1. 
`Networking Overview ........................................ 26 
`Networked and Distributed Systems ................................................... 30 
`1. 
`Clustering, Quality-of-Service,
`and
`Load
`Balancing ............................................................ 32 
`Virtualization ....................................................................................... 35 
`C. 
`VI.  Overview of the ’743 Patent .......................................................................... 39 
`A. 
`Summary of the ’743 patent ................................................................ 39 
`B. 
`Prosecution History ............................................................................. 46 
`C. 
`Priority Date of the ’743 Patent........................................................... 47 
`VII.  Claim Construction ........................................................................................ 49 
`VIII.  Identification of how the Claims are Unpatentable ....................................... 49 
`A.  Ground 1: Claims 10, 11, 14, 16, and 18 are obvious under 35
`U.S.C. § 103 over Welch alone and in combination with
`Ravindran. ........................................................................................... 51 
`1. 
`Summary of Welch ............................................ 51 
`2. 
`Summary of Ravindran ...................................... 59 
`
`B. 
`
`
`
`
`2
`
`
`
`

`

`Zadok Declaration
`
`
`3. 
`4. 
`
`Inter Partes Review of U.S. 7,181,743
`
`
`
`Motivation to Combine Welch and Ravindran .. 60 
`Claim 10. ............................................................ 61 
`(a) 
`[10.0] Software stored on at least one
`host for converting N networked hosts
`into a resource managed system
`instantiating
`M
`managed
`characteristic application computer
`programs,
`each
`managed
`characteristic application computer
`program managed by one of the N
`networked
`hosts,
`the
`software
`comprising: ............................................... 61 
`[10.1] a first function group which
`monitors
`the host and network
`resources; .................................................. 71 
`[10.2] a second function group which
`provides
`application
`computer
`program event reporting and event
`correlation capabilities; ............................ 77 
`[10.3] a third function group which
`provides
`reasoning and decision
`making capabilities for the resource
`managed system, ....................................... 85 
`[10.4] wherein the third function
`group comprises: a first function
`which determines a state and health of
`the N hosts, a network operatively
`coupling the N hosts to one another
`and the M managed characteristic
`application computer programs in the
`distributed environment; ........................... 91 
`[10.5] a second function which
`determines required allocation and
`reallocation
`actions
`needed
`to
`
`(b) 
`
`(c) 
`
`(d) 
`
`(e) 
`
`(f) 
`
`
`
`
`3
`
`
`
`

`

`Zadok Declaration
`
`
`5. 
`
`Inter Partes Review of U.S. 7,181,743
`
`
`
`maintain a plurality of Quality of
`Service
`(QoS)
`requirements
`established
`for
`the M managed
`characteristic application computer
`programs,
`the QoS
`requirement
`dictating
`parameters
`regarding
`service quality of the M management
`characteristic application programs;
`and .......................................................... 100 
`[10.6] a
`third
`function which
`generates automatic control signal
`requests corresponding to the actions
`dictated by the QoS requirements,
`such that the managed characteristic
`application computer programs are
`moved, shutdown, and started in
`accordance with satisfaction of the
`QoS requirements; and ........................... 106 
`[10.7] a fourth function group which
`provides program control capabilities
`permitting starting, stopping, and
`configuring of selected ones of the M
`managed characteristic application
`computer programs on respective
`ones of the N hosts in the resource
`managed system, ..................................... 110 
`[10.8] where M and N are positive
`integers and where M may be equal
`to, greater than, or less than N. ............... 113 
`Claim 11. .......................................................... 115 
`(a) 
`[11] The software as recited in claim
`10, wherein the first function receives
`system
`specification
`information
`comprising host configuration and
`capabilities. ............................................. 115 
`
`(g) 
`
`(h) 
`
`(i) 
`
`
`
`
`4
`
`
`
`

`

`Zadok Declaration
`
`
`6. 
`
`7. 
`
`8. 
`
`Inter Partes Review of U.S. 7,181,743
`
`
`
`Claim 14. .......................................................... 119 
`(a) 
`[14] The software as recited in claim
`10, wherein the first function receives
`program
`control
`information
`comprising application status and
`detected application faults for each of
`the M managed
`characteristic
`application computer programs, and
`detected failures regarding the N
`hosts. ....................................................... 119 
`Claim 16. .......................................................... 123 
`(a) 
`[16] The software as recited in claim
`10, wherein the first function receives
`application
`performance
`data
`representing each one of the M
`managed characteristic application
`computer programs. ................................ 123 
`Claim 18. .......................................................... 124 
`(a) 
`[18.0] The software as recited in
`claim 10, wherein the second function
`which determines
`the
`required
`allocation and reallocation actions
`established
`for
`the M managed
`characteristic application computer
`programs by: ........................................... 124 
`[18.1] responding to application and
`host failures by determining if and
`what recovery actions should be
`taken; ...................................................... 124 
`[18.2] determining if and where to
`place new copies of managed
`characteristic application computer
`programs
`or which managed
`characteristic application computer
`
`(b) 
`
`(c) 
`
`
`
`
`5
`
`
`
`

`

`Zadok Declaration
`
`
`Inter Partes Review of U.S. 7,181,743
`
`
`
`B. 
`
`programs should be shutdown when
`QoS Manager functions indicate that
`scale up or scale down ations should
`be
`taken based on measured
`application performance and QoS
`specifications established for the M
`managed characteristic application
`computer programs; ................................ 126 
`[18.3] determining where new
`application
`computer
`programs
`should be placed when requested to
`do so by the fourth function group;
`and .......................................................... 129 
`[18.4] determining which and how
`many application computer programs
`should run based on application
`system priorities. ..................................... 130 
`Ground 2: Claims 10, 11, 14, 16, and 18 are obvious under 35
`U.S.C. § 103 over Welch, Ravindran, and Hosokawa. ..................... 132 
`1. 
`Hosokawa ......................................................... 133 
`2. 
`Motivation to combine Welch, Ravindran, and
`Hosokawa ......................................................... 137 
`(a) 
`The number of applications are
`independent from the number of
`hosts. ....................................................... 138 
`Management software executing on a
`host .......................................................... 142 
`Claim 10 ........................................................... 146 
`(a) 
`[10.0] Software stored on at least one
`host for converting N networked hosts
`into a resource managed system
`instantiating
`M
`managed
`characteristic application computer
`
`(d) 
`
`(e) 
`
`(b) 
`
`3. 
`
`
`
`
`6
`
`
`
`

`

`Zadok Declaration
`
`
`Inter Partes Review of U.S. 7,181,743
`
`
`
`managed
`each
`programs,
`characteristic application computer
`program managed by one of te N
`networked
`hosts,
`the
`software
`comprising: ............................................. 146 
`Limitations [10.1]-[10.7] ........................ 148 
`[10.8] where M and N are positive
`integers and where M may be equal
`to, greater than, or less than N. ............... 148 
`Claims 11, 14, 16, and 18 ................................. 154 
`4. 
`IX.  Conclusion ................................................................................................... 155 
`
`
`
`(b) 
`(c) 
`
`
`
`
`7
`
`
`
`

`

`Zadok Declaration
`
`
`I, Dr. Erez Zadok, do hereby declare as follows:
`
`Inter Partes Review of U.S. 7,181,743
`
`
`
`I.
`
`INTRODUCTION
`1.
`
`I am making this declaration at the request of Tesla Inc. in the matter
`
`of the Inter Partes Review of U.S. Patent No. 7,181,743 (“the ’743 patent”) to
`
`Werme et al.
`
`2. My consulting company is being reimbursed for reasonable and
`
`customary expenses associated with my work and testimony in this investigation.
`
`My compensation is not contingent on the outcome of this matter or the specifics of
`
`my testimony, and I have no other interest in this case or the parties thereto.
`
`3.
`
`I have been asked to provide my opinions regarding whether claims 10,
`
`11, 14, 16, and 18 (“the Challenged Claims”) of the ’743 patent are unpatentable as
`
`they would have been obvious to a person having ordinary skill in the art
`
`(“POSITA”) at the time of the alleged invention, in light of the prior art. It is my
`
`opinion that all of the limitations of the challenged claims would have been obvious
`
`to a POSITA.
`
`A. Materials Considered
`4.
`
`In the preparation of this declaration, I have studied the following
`
`references:
`
`
`
`
`8
`
`
`
`

`

`Zadok Declaration
`
`
`Exhibit Description
`
`Inter Partes Review of U.S. 7,181,743
`
`Abbreviation
`
`
`
`1001
`
`1002
`
`1004
`
`1005
`
`1006
`
`1007
`
`1008
`
`1009
`
`1016
`
`1017
`
`1018
`
`
`
`
`U.S. Patent No. 7,181,743 to Werme et al.
`
`’743 patent
`
`Prosecution history of the ’743 patent
`
`’743 File History
`
`Zadok Curriculum Vitae
`
`“Distributed, Scalable, Dependable Real-Time
`Systems: Middleware Services and Applications.”
`Lonnie R. Welch et al., Proceedings 13th
`International Parallel Processing Symposium and
`10th Symposium on Parallel and Distributed
`Processing, April 1999
`“Specification and Modeling of Dynamic,
`Distributed Real-time Systems.”
` Lonnie R.
`Welch, Binoy Ravindran, et al. IEEE Real-Time
`Systems Symposium, 72-81, IEEE Computer
`Society Press, Dec. 1998
`U.S. Patent No. 6,088,727 to Hosokawa et al.
`
`Zadok CV
`
`Welch
`
`Ravindran
`
`Hosokawa
`
`U.S. Patent No. 6,269,396 to Shah et al.
`
`Shah
`
`U.S. Provisional Patent No. 60/207,891
`
`’891 provisional
`
`U.S. Patent Publication No. 2002/0064126 to
`Bhaatal
`U.S. Patent No. 6,041,306 to Du
`
`Bhaatal
`
`Du
`
`U.S. Patent No. 6,742,020 to Dimitroff
`
`Dimitroff
`
`9
`
`
`
`

`

`Zadok Declaration
`
`
`Exhibit Description
`
`Inter Partes Review of U.S. 7,181,743
`
`1019
`
`Microsoft Computer Dictionary, 3rd ed., 1997,
`excerpts
`
`1020
`
`Microsoft Computer Dictionary, 4th ed., 1999,
`excerpts
`
`Abbreviation
`
`
`
`Microsoft
`
`Computer
`
`Dictionary 1997
`
`Microsoft
`
`Computer
`
`Dictionary 1999
`
`
`
`5.
`
`In addition, I considered the relevant legal standards, including the
`
`standard for obviousness, and any additional authoritative documents as cited in the
`
`body of this declaration.
`
`6.
`
`Finally, I considered my own knowledge and experience based upon
`
`my work in the field of networking as described below.
`
`7.
`
`Unless otherwise noted, all emphasis in any quoted material has been
`
`added.
`
`II. QUALIFICATIONS AND PROFESSIONAL EXPERIENCE
`8. My complete qualifications and professional experience are described
`
`in my Curriculum Vitae, a copy of which can be found in EX1004. The following
`
`is a brief summary of my relevant qualifications and professional experience.
`
`9.
`
`I am a Professor in the Computer Science Department at Stony Brook
`
`
`
`
`10
`
`
`
`

`

`Zadok Declaration
`
`
`University (part of the State University of New York (“SUNY”) system). I direct
`
`Inter Partes Review of U.S. 7,181,743
`
`the File-systems and Storage Lab (FSL) at Stony Brook’s Computer Science
`
`Department. My research interests include file systems and storage systems,
`
`operating systems,
`
`transactional systems
`
`including database
`
`technologies,
`
`information technology and system administration, security/privacy and information
`
`assurance, networking, energy efficiency, performance and benchmarking,
`
`virtualization, cloud systems, compilers, applied machine learning, and software
`
`engineering.
`
`10.
`
`I studied at a professional high school in Israel, focusing on electrical
`
`engineering (“EE”), and graduated in 1982. I spent one more year at the high
`
`school’s college division, receiving a special Certified Technician’s degree in EE. I
`
`then went on to serve in the Israeli Defense Forces for three years (1983–1986). I
`
`received my Bachelor of Science degree in computer science (“CS”) in 1991, my
`
`Master’s degree in CS in 1994, and my PhD in CS in 2001—all from Columbia
`
`University in New York.
`
`11. When I began my undergraduate studies at Columbia University, I also
`
`started working as a student assistant in the various campus-wide computer labs,
`
`eventually becoming an assistant to the head labs manager, who was managing all
`
`public computer labs on campus. During that time, I also became more involved
`
`with research within the CS Department at Columbia University, conducting
`
`
`
`
`11
`
`
`
`

`

`Zadok Declaration
`
`
`research on operating systems, file and storage systems, distributed and networked
`
`Inter Partes Review of U.S. 7,181,743
`
`systems, security, and other topics. I also assisted the CS department’s computer
`
`administrators in managing the department’s computers, which included storage, IT,
`
`networking, and cyber-security related duties.
`
`12.
`
`In 1991, I joined Columbia University’s CS department as a full-time
`
`systems administrator, studying towards my MS degree part-time. My MS thesis
`
`topic is related to file system reliability, fault tolerance, replication, and failover in
`
`mobile networked storage systems using file virtualization. My main duties as a
`
`systems administrator involved installing, configuring, and managing many
`
`networked servers, proxies, and desktops running several operating systems, as well
`
`as network devices setup; this included many software and hardware upgrades,
`
`device upgrades, and BIOS firmware/chipset updates/upgrades. My duties also
`
`included ensuring
`
`reliable,
`
`secure, authenticated access
`
`to networked
`
`systems/storage and licensed software, as well as software updates, security and bug
`
`fixes. Examples of servers and their protocols included email (SMTP), file transfer
`
`(FTP), domain names (DNS), network file systems (NFS), network news systems
`
`(NNTP), and Web (HTTP).
`
`13.
`
`In 1994, I left my systems administrator position to pursue my doctoral
`
`studies at Columbia University. My PhD thesis topic was on versatile file system
`
`development using stackable (virtualized) file systems, with examples in the fields
`
`
`
`
`12
`
`
`
`

`

`Zadok Declaration
`
`
`of security and encryption, efficiency, reliability, and failover. I continued to work
`
`Inter Partes Review of U.S. 7,181,743
`
`part-time as a systems administrator at the CS department, and eventually I was
`
`asked to serve as manager to the entire information technology (“IT”) staff. From
`
`1991 to 2001, I was also a member of the faculty-level Facilities Committee that
`
`oversaw all IT operations at the CS department.
`
`14. As part of my PhD studies at Columbia, I collaborated on projects to
`
`develop advanced AI-like techniques to detect previously unknown viruses (a.k.a.
`
`“zero-day malware”), using data mining and rule-based detection. This work led to
`
`several highly cited papers (over 1,600 citations for one of the papers alone) and two
`
`patents. I also became a Teaching Assistant (“TA”) for a first-ever Computer
`
`Security course given at Columbia University’s CS department with Dr. Matt Blaze
`
`as instructor.
`
`15. From 1990 to 1998, I consulted for SOS Corporation and HydraWEB
`
`Technologies as a systems administrator and programmer, managing data storage
`
`use and backup/restore duties, databases, web servers, as well as information
`
`assurance and cyber-security (e.g., malware protection, software licensing). From
`
`1994 to 2000, I led projects at HydraWEB Technologies, and then became the
`
`Director of Software Development—overseeing the development of several
`
`products and appliances such as stateful firewalls and HTTP load-balancers,
`
`utilizing network-virtualization and high-availability techniques. From 2009 to
`
`
`
`
`13
`
`
`
`

`

`Zadok Declaration
`
`
`2019, I have consulted for Packet General Networks, a startup specializing in secure,
`
`Inter Partes Review of U.S. 7,181,743
`
`virtualized, network storage and applications’ data security in the cloud.
`
`16.
`
`In 2001, I joined the faculty of Stony Brook University, a position I
`
`have held since that time. In 2002, I joined the Operations Committee, which
`
`oversees the IT operations of the CS department at Stony Brook University. From
`
`2006 to 2010, I was the Director of IT Operations of the CS department. My day-
`
`to-day duties included setting policies regarding computing, hiring and training new
`
`staff, assisting any staff with topics of my specialty, defining requirements for new
`
`software/hardware, and purchasing. From 2010 to 2015, I had served as the Co-
`
`Chair to the Operations Committee. From 2016 to 2019, I oversaw the IT Operations
`
`as the Chair of the Operations Committee. A significant component of these duties
`
`included defining and helping implement policies for data management, to ensure
`
`the security of users and their data, and data reliability and availability, while
`
`minimizing the inconvenience and performance impact to users. I personally helped
`
`setup and maintain an initial virtual-host infrastructure in the department. Since late
`
`2019, I’ve been a member of the department’s Executive Committee that also
`
`oversees all IT operations.
`
`17.
`
`In 2017, I became the department’s Graduate Academic Adviser,
`
`advising all Master students (over 400 annually on average) and many other graduate
`
`students on an assortment of academic matters. In August 2024, I took over as the
`
`
`
`
`14
`
`
`
`

`

`Zadok Declaration
`
`
`department’s Graduate Program Director, overseeing the entire graduate CS
`
`Inter Partes Review of U.S. 7,181,743
`
`program (700-800 students annually on average).
`
`18. Since 2001, I have personally configured and managed my own
`
`research lab’s network. This includes setting up and configuring multiple storage
`
`systems (e.g., NFS, CIFS/SMB, NAS), virtual and physical environments,
`
`applications such as database (e.g., MySQL, Postgresql), Web servers (e.g.,
`
`Apache), and mail servers; user access control (e.g., NIS, LDAP), backups and
`
`restores, snapshot policies, and more. I’ve personally installed, configured, changed,
`
`replaced parts, and upgraded components in numerous devices including mobile
`
`devices, laptops, desktops, and servers, both physical and virtual.
`
`19. Since 1995, I have taught courses on operating systems, storage and file
`
`systems, advanced systems programming in Unix/C, systems administration, data
`
`structures, data/software security, and more. My courses often use storage, file
`
`systems, distributed systems, and system/network security as key teaching principles
`
`and practical examples for assignments and projects. I have taught these concepts
`
`and techniques to my students, both to my direct advisees as well as in my courses.
`
`For example, in my graduate Operating Systems course, I often cover Linux’s kernel
`
`mechanisms to protect users, applications, and data files, virtual file systems, as well
`
`as distributed storage systems (e.g., NFS). And in the System Administration
`
`undergraduate course, I covered many topics such as networking, storage, backups,
`
`
`
`
`15
`
`
`
`

`

`Zadok Declaration
`
`and configuring complex applications such as mail, web, and database servers.
`
`Inter Partes Review of U.S. 7,181,743
`
`
`
`20. My research often investigates computer systems from many angles:
`
`security, efficiency, energy use, scalability, reliability, portability, survivability,
`
`usability, ease-of-use, versatility, flexibility, and more. My research gives special
`
`attention to balancing five often-conflicting aspects of computer systems:
`
`performance, reliability, energy use, security, and ease-of-use.
`
`21. Since joining Stony Brook University in 2001, my group in the File-
`
`systems and Storage Lab (“FSL”) has developed many file systems and operating
`
`system extensions; examples include a highly-secure cryptographic file system, a
`
`portable copy-on-write (“COW”) versioning file system, a tracing file system useful
`
`to detect intrusions, a replaying file system useful for forensics, a snapshotting and
`
`sandboxing file system, a namespace unification file system (that uses stackable,
`
`virtualized, file-based COW), an anti-virus file system, an integrity-checking file
`
`system, a load balancing and replication/mirroring file system, network file system
`
`extensions for security and performance, distributed secure cloud-based storage
`
`systems, transactional key-value stores and file systems, OS-level embedded
`
`databases, a compiler to convert user-level C code to in-kernel efficient yet safe
`
`code, GCC plugins, stackable file system templates, and a Web-based backup
`
`system. Many of these projects used one form of virtualization or another (storage,
`
`network, host, etc.). I continue to maintain and release newer versions of some of
`
`
`
`
`16
`
`
`
`

`

`Zadok Declaration
`
`these file systems and software.
`
`Inter Partes Review of U.S. 7,181,743
`
`
`
`22.
`
`I have published over 120 refereed publications (in ACM, IEEE,
`
`USENIX, and more). To date, my publications have been cited more than 10,000
`
`times (as per Google Scholar as of December 14, 2024). My papers cover a wide
`
`range of related technologies such as file systems, storage systems, transactional
`
`systems, security, clouds and virtualization, performance benchmarking and
`
`optimization, energy efficiency, system administration, web systems, and more. I
`
`also published a book titled “Linux NFS and Automounter Administration” (Sybex,
`
`2001), covering systems administration topics related to network storage and data
`
`security.
`
`23. Some of my research has led to public software releases that have been
`
`used worldwide. I have publicly maintained the Amd Berkeley Automounter in a
`
`package called “am-utils” since 1992; this software helps administrators manage the
`
`multitude of file system mounts on dozens of different Unix systems, especially
`
`helping to automate access to multiple NFS/NAS storage volumes. Since 1997, I
`
`have maintained and released several stackable (virtualized) file system software
`
`projects for Linux, FreeBSD, and/or Sun Solaris, in a package called FiST. One of
`
`my stackable file system encryption projects, called Cryptfs, became the basis for
`
`IBM’s public release of eCryptfs, now part of Linux. Packet General Networks, for
`
`whom I have provided consulting services between 2009 and 2019, licensed another
`
`
`
`
`17
`
`
`
`

`

`Zadok Declaration
`
`
`encryption file system called Ncryptfs. Another popular file system released in
`
`Inter Partes Review of U.S. 7,181,743
`
`2003, called Unionfs, offers virtual namespace unification, transparent shadow
`
`copying (a.k.a. copy-on-write or COW), file system snapshotting (e.g., useful for
`
`forensics and disaster recovery), and the ability to save disk space by sharing a read-
`
`only copy of data among several computers, among other features.
`
`24. My research and teaching make extensive use of data security features.
`
`For example, each time I taught the graduate operating system course, the first
`
`homework assignment includes the creation of a new system call that performs new
`
`or added functionality, often for encrypting a file or verifying its integrity; many of
`
`my other assignments cover topics of user/process access control, anti-virus filtering,
`
`and more. Since 2001, over 1,000 graduate students were exposed to these principles
`
`directly through my teaching and research at Stony Brook University.
`
`25. Moreover, in an undergraduate course titled “Advanced Systems
`
`Programming in Unix/C,” I cover many topics of system security and vulnerabilities,
`
`such as the structure of UNIX processes, and memory segments such as the heap and
`
`stack. This course covers details of several hundred Linux system calls. Often, the
`
`first assignment for this course is to develop a tool to encrypt/decrypt files using
`
`advanced ciphers, use digital signatures to certify the cipher keys used, and reliably
`
`recover files in case of failures. Since 2001, several hundred undergraduate students
`
`were exposed to these principles directly through my teaching and research at Stony
`
`
`
`
`18
`
`
`
`

`

`Zadok Declaration
`
`Brook University.
`
`Inter Partes Review of U.S. 7,181,743
`
`
`
`26.
`
`In another undergraduate course, System Administration, I taught
`
`network configuration, security, and storage configuration and reliability. In a
`
`special topics course on Storage Systems, I covered many topics such as data
`
`deduplication, RAID, transactional storage, storage hardware including modern
`
`Flash based ones, virtual storage, backup/restore, snapshots and continuous data
`
`protection (“CDP”), NAS and SAN, and NFS.
`
`27. Overall, in addition to the aforementioned experience, my technical
`
`experience relevant to the ’743 patent at the time of the alleged invention included
`
`the configuration, use, research, development, and/or programming of the following
`
`technologies and systems: distributed storage systems; Web-server load balancing
`
`(e.g., Web farms); tracing, logging, event collection, and analysis; and quality-of-
`
`service software development. For example, in my work for a startup called
`
`HydraWEB, I’ve developed agents to monitor the load on hosts, then report it to a
`
`centralized load-balancer that monitored which Web servers were down or
`
`under/overloaded, and appropriately redirect Web requests. In another example, my
`
`Master’s thesis, titled “Discovery and Hot Replacement of Replicated Read-Only
`
`File Systems, with Application to Mobile Computing,” investigated techniques for
`
`mobile devices to discover resources in a distributed setting, then transparently
`
`switch to using the one closest and least loaded.
`
`
`
`
`19
`
`
`
`

`

`Zadok Declaration
`
`
`Inter Partes Review of U.S. 7,181,743
`
`
`28. My research has been supported by many federal and state grants as
`
`well as industry awards, including an NSF CAREER award, two IBM Faculty
`
`awards, two NetApp Faculty awards, a Western Digital award, a Facebook award,
`
`several Dell-EMC awards, and several equipment gifts. I received the 2008 SUNY
`
`Chancellor’s Excellence in Teaching award, and the 2022 SUNY Chancellor’s
`
`Award for Excellence in Scholarship and Creative Activities (both awards can be
`
`given only once in a lifetime). In 2021, I was named an ACM Distinguished Member
`
`for “Outstanding Scientific Contributions to Computing.”
`
`29. My service record to the community includes serving as the co-chair
`
`for the USENIX Annual Technical Conference in 2020 (ATC’20); serving as the co-
`
`chair for USENIX File and Storage Technologies (FAST’15) in 2015 and on the
`
`FAST Conference Steering Committee from 2015 to 2023; serving on the ACM
`
`HotStorage Steering Committee since 2021; and serving as the co-chair in 2012 and
`
`on the Steering Committee of the ACM SYSTOR conference since 2012. I have
`
`served as an Associate Editor to the ACM Transactions on Storage (“TOS”) journal
`
`from 2009 to 2022; in 2022, I was named the Editor-in-Chief for ACM’s TOS
`
`journal.
`
`30.
`
`I am a named inventor on four patents, two titled “Systems and Methods
`
`for Detection of New Malicious Executables” (U.S. Patent No. 7,487,544, issued
`
`February 3, 2009; and U.S. Patent No. 7,979,907, issued July 12, 2011); and two
`
`
`
`
`20
`
`
`
`

`

`Zadok Declaration
`
`
`more titled “Multi-Tier Caching,” (U.S. Patent No. 9,355,109, issued May 31, 2016;
`
`Inter Partes Review of U.S. 7,181,743
`
`and U.S. Patent 9,959,279, issued May 1, 2018).
`
`31.
`
`I have been disclosed as a testifying expert in 21 cases (including inter
`
`partes review (“IPR”) proceedings) in the past four years. I have been deposed 13
`
`times and testified in trial twice.
`
`III. LEVEL OF ORDINARY SKILL IN THE ART
`32.
`
`I understand there are multiple factors relevant to determining the level
`
`of ordinary skill in the pertinent art, including (1) the levels of education and
`
`experience of persons working in the field at the time of the invention; (2) the
`
`sophistication of the technology; (3) the types of problems encountered in the field;
`
`and (4) the prior art solutions to those problems.
`
`33.
`
` It is my understanding that the earliest possible priority date for the
`
`’743 patent is May 25, 2000. A person of ordinary skill in the art (“POSITA”) in
`
`the field of the ’743 patent, as of May 25, 2000, would have been someone
`
`knowledgeable and familiar with the areas of networking and distributed computing
`
`that are pertinent to the ’743 patent. That person would have a bachelor’s degree in
`
`computer science, computer engineering, electrical engineering, or equivalent
`
`training, and approximately 2-3 years of professional experience relating to
`
`distributed computing. Lack of work experience can be remedied by additional
`
`education, and vice versa.
`
`
`
`
`21
`
`
`
`

`

`Zadok Declaration
`
`
`Inter Partes Review of U.S. 7,181,743
`
`
`34. For purposes of this Declaration, in general, and unless otherwise noted,
`
`my statements and opinions, such as those regarding my experience and the
`
`understanding of a POSITA generally (and specifically related to the references I
`
`consulted herein), reflect the knowledge that existed in the field as of the alleged
`
`priority date of the ’743 patent (i.e., May 25, 2000). Unless otherwise stated, when
`
`I provide my understanding and analysis below, it is consistent with the level of a
`
`POSITA as of the alleged priority date of the ’743 patent.
`
`IV. RELEVANT LEGAL STANDARDS
`35.
`
`I am not an attorney. In preparing and expressing my opinions and
`
`considering the subject matter of the ’743 patent, I am relying on certain basic legal
`
`principles that counsel have explained to me. These principles are discussed below.
`
`36.
`
`I understand that prior art to the ’743 patent includes patents and printed
`
`publications in the relevant art that predate the priority date of the alleged invention
`
`recited in the ’743 patent.
`
`37.
`
`I have been informed that a claimed invention is unpatentable under 35
`
`U.S.C. § 103 if the differences between the invention and the prior art are such that
`
`the subject matter as a whole would have been obvious at the time the invention was
`
`made to a person having ordinary skill in the art to which the subject matter pertains.
`
`I have also been informed by counsel that the obviousness analysis takes into
`
`account factual inquiries including the level of ordinary skill in the art, the scope and
`
`
`
`
`22
`
`
`
`

`

`Zadok Declaration
`
`
`content of the prior art, and the differences between the prior art and the claimed
`
`Inter Partes Review of U.S. 7,181,743
`
`subject matter.
`
`38.
`
`I have been informed by counsel that the Supreme Court has recognized
`
`several rationales for combining references o

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket