`_____________
`
`BEFORE THE PATENT TRIAL AND APPEAL BOARD
`_____________
`
`GOOGLE LLC,
`Petitioner,
`
`v.
`
`VIRTAMOVE, CORP.,
`Patent Owner.
`_____________
`
`Case No. IPR2025-00487
`Patent No. 7,519,814
`_____________
`
`DECLARATION OF SAMRAT BHATTACHARJEE, PH.D.
`
`Google Exhibit 1003
`Google v. VirtaMove
`
`
`
`
`
`TABLE OF CONTENTS (CONDENSED)
`PERSONAL AND PROFESSIONAL BACKGROUND ................................. 1
`I.
`II. MATERIALS REVIEWED AND CONSIDERED .......................................... 6
`A. Public Accessibility of Non-Patent Prior Art Exhibits ............................... 6
`III. MY UNDERSTANDING OF PATENT LAW ................................................. 6
`A. Anticipation ................................................................................................. 8
`B. Obviousness ................................................................................................. 9
`IV. UNPATENTABILITY GROUNDS ................................................................ 12
`V. THE ’814 PATENT ......................................................................................... 13
`A. Background and Specification ................................................................... 13
`B. Person of Ordinary Skill in the Art (“POSA”) .......................................... 16
`C. Prosecution History ................................................................................... 17
`D. Challenged Claims ..................................................................................... 18
`E. The Independent Claims Are Not Supported By Provisional
`Application No. 60/502,619 ...................................................................... 19
`VI. CLAIM INTERPRETATION ......................................................................... 20
`A. Terms with Agreed Upon Constructions ................................................... 20
`1. Preamble of Claim 1 ............................................................................ 20
`2. “container” (claims 1, 2, 4, 6, 9, 10, 13, 14) ....................................... 20
`3. “a kernel a set of associated local system files [sic]” (claim 1) .......... 21
`4. “processor” (claim 1) .......................................................................... 21
`5. “servers” (claim 1) .............................................................................. 21
`6. “within a container” (claim 1) ............................................................ 21
`7. Terms whose antecedent refer to the same entity ............................... 22
`B. Terms with Disputed Constructions .......................................................... 22
`1. “operating system” (claims 1, 10) ....................................................... 22
`2. “kernel” / “operating system kernel” (claim 1) ................................... 23
`3. “disparate computing environments” (claim 1) .................................. 23
`4. “service” (claims 1, 14) ....................................................................... 24
`
`– i –
`
`
`
`
`
`5. “at least some of the different operating systems” (claim 1) .............. 24
`“at least some of the plurality of different operating systems” (claim
`1) 24
`6. “memory accessible to at least some of the servers” (claim 1) ........... 25
`7. “local kernel residing permanently on one of the servers”
`(claim 1) .............................................................................................. 25
`8. “secure containers of application software” (claim 1) ....................... 25
`9. “an operating system’s root file system” (claim 1) ............................. 25
`VII. Application of Prior Art to Challenged Claims ............................................... 27
`A. GROUND 1: Claims 1-4, 7-11, 14, and 16-30 would have been
`obvious to POSAs over the Blaser-Calder combination. .......................... 27
`1. Blaser (EX1005) .................................................................................. 27
`2. Calder (EX1006) ................................................................................. 30
`3. The Blaser-Calder Combination.......................................................... 37
`4. Mapping of Blaser-Calder to Claims 1-4, 7-11, 14, and 16-30 .......... 58
`a. Claim 1 ........................................................................................ 58
`b. Claim 2: “[C]laim 1, wherein each container has an
`execution file associated therewith for starting the one or
`more applications.” ................................................................... 152
`c. Claim 3: “[C]laim 2, wherein the execution file includes
`instructions related to an order in which executable
`applications within will be executed.” ...................................... 156
`d. Claim 4: “[C]laim 1 further comprising the step of pre-
`identifying applications and system files required for
`association with the one or more containers prior to said
`storing step [[1A]]. .................................................................... 159
`e. Claim 7: “[C]laim 2 further comprising the step of
`modifying at least some of the system files to define
`container specific mount points associated with the
`container.” ................................................................................. 161
`f. Claim 8: “[C]laim 1, wherein the one or more applications
`and associated system files are retrieved from a computer
`system having a plurality of secure containers.” ...................... 162
`
`– ii –
`
`
`
`
`
`g. Claim 9: “[C]laim 2, wherein server information related to
`hardware resource usage including at least one of CPU
`memory, network bandwidth, and disk allocation is
`associated with at least some of the containers prior to the
`applications within the containers being executed.” ................. 166
`h. Claim 10: “[C]laim 2, wherein in operation when an
`application residing within a container is executed, said
`application has no access to system files or applications in
`other containers or to system files within the operating
`system during execution thereof.” ............................................ 178
`i. Claim 11: “[C]laim 2, wherein containers include files
`stored in network file storage, and parameters forming
`descriptors of containers stored in a separate location.” ........... 181
`j. Claim 14 .................................................................................... 182
`k. Claim 16 .................................................................................... 194
`l. Claim 17 .................................................................................... 195
`m. Claim 18: “[C]laim 17 wherein the target server and the
`graphical user interface are at remote locations.” ..................... 203
`n. Claim 19: “[C]laim 18, wherein the graphical user
`interface is installed on a computing platform, and wherein
`the computing platform is a different computing platform
`than the target server.” .............................................................. 208
`o. Claim 20: “[C]laim 19, wherein the step of associating
`includes the step of relatively moving the unique icon
`representing the service to the unique icon representing a
`server.” ...................................................................................... 210
`p. Claim 21: “[C]laim 20 further comprising starting a
`distributed software application.” ............................................. 213
`q. Claim 22: “[C]laims 20 further comprising updating a
`console on the selected target server with information
`indicating that the service is resident on the selected target
`server.” ...................................................................................... 216
`r. Claim 23: “[C]laim 17, further comprising, the step of
`testing to determine if the selected target server is a valid
`computing platform, prior to causing the applications to be
`distributed to, and installed on the target server.” .................... 219
`
`– iii –
`
`
`
`
`
`s. Claim 24: “[C]laim 17 further comprising creating a user
`account for the service.” ............................................................ 222
`t. Claim 25: “[C]laim 17, further comprising the step of
`installing files specific to the selected application on the
`selected server.” ........................................................................ 224
`u. Claim 26: “[C]laim 17 further comprising the steps of
`setting file access permissions to allow a user to access the
`one of the applications to be distributed.” ................................ 224
`v. Claim 27 .................................................................................... 226
`w. Claim 28: “[C]laim 27 further comprising separating icon
`representing the service from the icon representing the
`server.” ...................................................................................... 231
`x. Claim 29: “[C]laim 27 further comprising testing whether
`the selected server is a valid computing platform for de-
`installation of the service.” ........................................................ 232
`y. Claim 30: “[C]laim 27 further comprising copying data
`file changes specific to the service back to a storage
`medium from which the data file changes originated prior
`to installation.” .......................................................................... 233
`B. GROUND 2: Claims 5-6, 12-13, 15, and 31-34 would have been
`obvious to POSAs over the Blaser-Calder-Schmidt combination. .........234
`1. Schmidt-449 (EX1007) .....................................................................234
`2. The Blaser-Calder-Schmidt Combination .........................................236
`3. Mapping of Blaser-Calder-Schmidt to Claims 5-6, 12-13, 15,
`and 31-34 ...........................................................................................238
`a. Claim 5: “[C]laim 2, further comprising the step of
`modifying at least some of the associated system files in
`plural containers to provide an association with a container
`specific identity assigned to a particular container.” ................ 238
`b. Claim 6: “[C]laim 2, comprising the step of assigning a
`unique associated identity to each of a plurality of the
`containers, wherein the identity includes at least one of IP
`address, host name, and MAC address.” .................................. 239
`
`– iv –
`
`
`
`
`
`c. Claim 12: “[C]laim 11, further comprising the step of
`merging the files stored in network storage with the
`parameters to affect the step of storing in claim 1.” ................. 243
`d. Claim 13: “[C]laim 1 further comprising the step of
`associating with a plurality of containers a stored history
`of when processes related to applications within the
`container are executed for at least one of, tracking
`statistics, resource allocation, and for monitoring the status
`of the application.” .................................................................... 244
`e. Claim 15 .................................................................................... 253
`f. Claim 31 .................................................................................... 255
`g. Claim 32: “[C]laim 31, further comprising a scheduler
`comprising values related to an allotted time in which
`processes within a container may utilize predetermined
`resources.” ................................................................................. 264
`h. Claim 33: “[C]laim 32, wherein the run time module
`includes an intercepting module associated with the
`plurality of containers for intercepting system calls from
`any of the plurality of containers and for providing values
`alternate to values the kernel would have assigned in
`response to the system calls, so that the containers can run
`independently of one another without contention, in a
`secure manner, the values corresponding to at least one of
`the IP address, the host name and the Mac_Address [sic].” ..... 266
`i. Claim 34 .................................................................................... 267
`VIII. APPENDIX: CLAIM LISTING ........................................................................ 1
`
`
`
`– v –
`
`
`
`
`
`TABLE OF CONTENTS (FULL)
`PERSONAL AND PROFESSIONAL BACKGROUND ................................. 1
`I.
`II. MATERIALS REVIEWED AND CONSIDERED .......................................... 6
`A. Public Accessibility of Non-Patent Prior Art Exhibits ............................... 6
`III. MY UNDERSTANDING OF PATENT LAW ................................................. 6
`A. Anticipation ................................................................................................. 8
`B. Obviousness ................................................................................................. 9
`IV. UNPATENTABILITY GROUNDS ................................................................ 12
`V. THE ’814 PATENT ......................................................................................... 13
`A. Background and Specification ................................................................... 13
`B. Person of Ordinary Skill in the Art (“POSA”) .......................................... 16
`C. Prosecution History ................................................................................... 17
`D. Challenged Claims ..................................................................................... 18
`E. The Independent Claims Are Not Supported By Provisional
`Application No. 60/502,619 ...................................................................... 19
`VI. CLAIM INTERPRETATION ......................................................................... 20
`A. Terms with Agreed Upon Constructions ................................................... 20
`1. Preamble of Claim 1 ............................................................................ 20
`2. “container” (claims 1, 2, 4, 6, 9, 10, 13, 14) ....................................... 20
`3. “a kernel a set of associated local system files [sic]” (claim 1) .......... 21
`4. “processor” (claim 1) .......................................................................... 21
`5. “servers” (claim 1) .............................................................................. 21
`6. “within a container” (claim 1) ............................................................ 21
`7. Terms whose antecedent refer to the same entity ............................... 22
`B. Terms with Disputed Constructions .......................................................... 22
`1. “operating system” (claims 1, 10) ....................................................... 22
`2. “kernel” / “operating system kernel” (claim 1) ................................... 23
`3. “disparate computing environments” (claim 1) .................................. 23
`4. “service” (claims 1, 14) ....................................................................... 24
`
`– vi –
`
`
`
`
`
`5. “at least some of the different operating systems” (claim 1) .............. 24
`“at least some of the plurality of different operating systems” (claim
`1) 24
`6. “memory accessible to at least some of the servers” (claim 1) ........... 25
`7. “local kernel residing permanently on one of the servers”
`(claim 1) .............................................................................................. 25
`8. “secure containers of application software” (claim 1) ....................... 25
`9. “an operating system’s root file system” (claim 1) ............................. 25
`VII. Application of Prior Art to Challenged Claims ............................................... 27
`A. GROUND 1: Claims 1-4, 7-11, 14, and 16-30 would have been
`obvious to POSAs over the Blaser-Calder combination. .......................... 27
`1. Blaser (EX1005) .................................................................................. 27
`2. Calder (EX1006) ................................................................................. 30
`3. The Blaser-Calder Combination.......................................................... 37
`4. Mapping of Blaser-Calder to Claims 1-4, 7-11, 14, and 16-30 .......... 58
`a. Claim 1 ........................................................................................ 58
`i.
`[1PREA] .............................................................................. 59
`(1) “1. In a system having a plurality of servers with
`operating systems that differ” ..................................... 59
`(2) “operating in disparate computing
`environments” ............................................................. 63
`(3) “wherein each server includes a processor and
`an operating system” .................................................. 66
`(4) “[OS] including a kernel [and] a set of
`associated local system files compatible with the
`processor” ................................................................... 69
`[1PREB] .............................................................................. 79
`(1) “a method of providing at least some of the
`servers in the system with secure, executable,
`applications” ............................................................... 79
`(2) “[applications] related to a service” ........................... 81
`
`ii.
`
`– vii –
`
`
`
`
`
`(3) “wherein the applications are executed in a
`secure environment” ................................................... 83
`(4) “wherein the applications each include an object
`executable by at least some of the different
`operating systems for performing a task related
`to the service” ............................................................. 85
`iii. [1A] 95
`(1) “storing in memory accessible to at least some
`of the servers a plurality of secure containers of
`application software” .................................................. 95
`a) Blaser-Calder’s layers (containers) are “stor[ed]
`in memory accessible to…the servers” ..................... 95
`b) Blaser-Calder’s layers are “containers of
`application software” ................................................. 99
`c) Blaser-Calder’s layers are “secure containers of
`application software” ...............................................118
`(2) “each container comprising one or more of the
`executable applications” ........................................... 124
`(3) “and a set of associated system files required to
`execute the one or more applications” ..................... 127
`(4) “for use with a local kernel residing
`permanently on one of the servers” .......................... 130
`iv. [1B] “wherein the set of associated system files are
`compatible with a local kernel of at least some of the
`plurality of different operating systems,” ......................... 133
`[1C] “the containers of application software
`excluding a kernel,” .......................................................... 135
`vi. [1D] “wherein some or all of the associated system
`files within a container stored in memory are utilized
`in place of the associated local system files that
`remain resident on the server,” ......................................... 138
`vii. [1E] “wherein said associated system files utilized in
`place of the associated local system files are copies or
`modified copies of the associated local system files
`that remain resident on the server,” .................................. 140
`
`v.
`
`– viii –
`
`
`
`
`
`viii. [1F] “and wherein the application software cannot be
`shared between the plurality of secure containers of
`application software,” ....................................................... 144
`ix. [1G] “and wherein each of the containers has a
`unique root file system that is different from an
`operating system’s root file system.” ............................... 146
`b. Claim 2: “[C]laim 1, wherein each container has an
`execution file associated therewith for starting the one or
`more applications.” ................................................................... 152
`c. Claim 3: “[C]laim 2, wherein the execution file includes
`instructions related to an order in which executable
`applications within will be executed.” ...................................... 156
`d. Claim 4: “[C]laim 1 further comprising the step of pre-
`identifying applications and system files required for
`association with the one or more containers prior to said
`storing step [[1A]]. .................................................................... 159
`e. Claim 7: “[C]laim 2 further comprising the step of
`modifying at least some of the system files to define
`container specific mount points associated with the
`container.” ................................................................................. 161
`f. Claim 8: “[C]laim 1, wherein the one or more applications
`and associated system files are retrieved from a computer
`system having a plurality of secure containers.” ...................... 162
`g. Claim 9: “[C]laim 2, wherein server information related to
`hardware resource usage including at least one of CPU
`memory, network bandwidth, and disk allocation is
`associated with at least some of the containers prior to the
`applications within the containers being executed.” ................. 166
`h. Claim 10: “[C]laim 2, wherein in operation when an
`application residing within a container is executed, said
`application has no access to system files or applications in
`other containers or to system files within the operating
`system during execution thereof.” ............................................ 178
`i. Claim 11: “[C]laim 2, wherein containers include files
`stored in network file storage, and parameters forming
`descriptors of containers stored in a separate location.” ........... 181
`
`– ix –
`
`
`
`
`
`ii.
`
`j. Claim 14 .................................................................................... 182
`i.
`[14PRE] “[C]laim 1 comprising the step of creating
`containers prior to said step of storing containers in
`memory” ........................................................................... 182
`[14A] “wherein containers are created by: a) running
`an instance of a service on a server;”................................ 183
`iii. [14B] “b) determining which files are being used;
`and,” .................................................................................. 187
`iv. [14C] “c) copying applications and associated system
`files to memory without overwriting the associated
`system files so as to provide a second instance of the
`applications and associated system files.” ........................ 191
`k. Claim 16 .................................................................................... 194
`i.
`[16A] “[C]laim 1 comprising the step of creating
`containers prior to said step of storing containers in
`memor,” ............................................................................ 194
`[16B] “wherein a step of creating containers includes:
`using a skeleton set of system files as a container
`starting point and installing applications into that set
`of files.”............................................................................. 194
`l. Claim 17 .................................................................................... 195
`i.
`[17A] “[C]laim 1 further comprising installing a
`service on a target server selected from one of the
`plurality of servers,” ......................................................... 195
`[17B] “wherein installing the service includes: using
`a graphical user interface, associating a unique icon
`representing a service with an unique icon
`representing a server for hosting applications related
`to the service and for executing the service, so as to
`cause the applications to be distributed to, and
`installed on the target server.” .......................................... 197
`m. Claim 18: “[C]laim 17 wherein the target server and the
`graphical user interface are at remote locations.” ..................... 203
`n. Claim 19: “[C]laim 18, wherein the graphical user
`interface is installed on a computing platform, and wherein
`
`ii.
`
`ii.
`
`– x –
`
`
`
`
`
`the computing platform is a different computing platform
`than the target server.” .............................................................. 208
`o. Claim 20: “[C]laim 19, wherein the step of associating
`includes the step of relatively moving the unique icon
`representing the service to the unique icon representing a
`server.” ...................................................................................... 210
`p. Claim 21: “[C]laim 20 further comprising starting a
`distributed software application.” ............................................. 213
`q. Claim 22: “[C]laims 20 further comprising updating a
`console on the selected target server with information
`indicating that the service is resident on the selected target
`server.” ...................................................................................... 216
`r. Claim 23: “[C]laim 17, further comprising, the step of
`testing to determine if the selected target server is a valid
`computing platform, prior to causing the applications to be
`distributed to, and installed on the target server.” .................... 219
`s. Claim 24: “[C]laim 17 further comprising creating a user
`account for the service.” ............................................................ 222
`t. Claim 25: “[C]laim 17, further comprising the step of
`installing files specific to the selected application on the
`selected server.” ........................................................................ 224
`u. Claim 26: “[C]laim 17 further comprising the steps of
`setting file access permissions to allow a user to access the
`one of the applications to be distributed.” ................................ 224
`v. Claim 27 .................................................................................... 226
`i.
`[27A] “[C]laim 1, further comprising de-installing a
`service from a server, comprising:” .................................. 226
`[27B] “displaying the icon representing the service;
`[and] displaying the icon representing the server on
`which the service is installed; and” .................................. 226
`iii. [27C] “utilizing the icon representing the service and
`the icon representing the server to initiating the de-
`installation of the selected service from the server on
`which it was installed.” ..................................................... 229
`
`ii.
`
`– xi –
`
`
`
`
`
`w. Claim 28: “[C]laim 27 further comprising separating icon
`representing the service from the icon representing the
`server.” ...................................................................................... 231
`x. Claim 29: “[C]laim 27 further comprising testing whether
`the selected server is a valid computing platform for de-
`installation of the service.” ........................................................ 232
`y. Claim 30: “[C]laim 27 further comprising copying data
`file changes specific to the service back to a storage
`medium from which the data file changes originated prior
`to installation.” .......................................................................... 233
`B. GROUND 2: Claims 5-6, 12-13, 15, and 31-34 would have been
`obvious to POSAs over the Blaser-Calder-Schmidt combination. .........234
`1. Schmidt-449 (EX1007) .....................................................................234
`2. The Blaser-Calder-Schmidt Combination .........................................236
`3. Mapping of Blaser-Calder-Schmidt to Claims 5-6, 12-13, 15,
`and 31-34 ...........................................................................................238
`a. Claim 5: “[C]laim 2, further comprising the step of
`modifying at least some of the associated system files in
`plural containers to provide an association with a container
`specific identity assigned to a particular container.” ................ 238
`b. Claim 6: “[C]laim 2, comprising the step of assigning a
`unique associated identity to each of a plurality of the
`containers, wherein the identity includes at least one of IP
`address, host name, and MAC address.” .................................. 239
`c. Claim 12: “[C]laim 11, further comprising the step of
`merging the files stored in network storage with the
`parameters to affect the step of storing in claim 1.” ................. 243
`d. Claim 13: “[C]laim 1 further comprising the step of
`associating with a plurality of containers a stored history
`of when processes related to applications within the
`container are executed for at least one of, tracking
`statistics, resource allocation, and for monitoring the status
`of the application.” .................................................................... 244
`e. Claim 15 .................................................................................... 253
`
`– xii –
`
`
`
`
`
`i.
`
`ii.
`
`[15A] “[C]laim 14 comprising the steps of: assigning
`an identity to the containers including at least one of
`a unique IP address, a unique Mac address and an
`estimated resource allocation;” ......................................... 253
`[15B] “installing the container on a server; and,” ............ 254
`ii.
`iii. [15C] “testing the applications and files within the
`container.” ......................................................................... 254
`f. Claim 31 .................................................................................... 255
`i.
`[31PRE] “A computing system for performing a
`plurality of tasks each comprising a plurality of
`processes comprising:” ..................................................... 255
`[31A] “a system having a plurality of secure
`containers of associated files accessible to, and for
`execution on, one or more servers, ” ................................ 256
`iii. [31B] “each container being mutually exclusive of
`the other, such that read/write files within a container
`cannot be shared with other containers,” .......................... 257
`iv. [31C] “each container of files is said to have its own
`unique identity associated therewith, said identity
`comprising at least one of an IP address, a host name,
`and a Mac_address;” ......................................................... 258
`[31D] “wherein, the plurality of files within each of
`the plurality of containers comprise one or more
`application programs including one or more
`processes,” ........................................................................ 259
`vi. [31E] “and associated system files for use in
`executing the one or more processes wherein the
`associated system files are files that are copies of
`files or modified copies of files that remain as part of
`the operating system,” ...................................................... 259
`vii. [31F] “each container having its own execution file
`associated therewith for starting one or more
`applications,” .................................................................... 260
`viii. [31G] “in operation, each container utilizing a kernel
`resident on the server and” ............................................... 260
`
`v.
`
`– xiii –
`
`
`
`
`
`x.
`
`ix. [31H] “wherein each container exclusively uses a
`kernel in an underlying operation system in which it
`is running and is absent its own kernel; and,” .................. 261
`[31I] “a run time module for monitoring system calls
`from applications associated with one or more
`containers and for providing control of the one or
`more applications.” ........................................................... 262
`g. Claim 32: “[C]laim 31, further comprising a scheduler
`comprising values related to an allotted time in which
`processes within a container may utilize predetermined
`resources.” ................................................................................. 264
`h. Claim 33: “[C]laim 32, wherein the run time module
`includes an intercepting module associated with the
`plurality of containers for intercepting system calls from
`any of the plurality of containers and for providing values
`alternate to values the kernel would have assigned in
`response to the system calls, so that the containers can run
`independently of one another without contention, in a
`secure manner, the values corresponding to at least one of
`the IP address, the host name and the Mac_Address [sic].” ..... 266
`i. Claim 34 .................................................................................... 267
`i.
`[34A] “[C]laim 31, wherein the run time module
`performs: monitoring resource usage of applications
`executing;” .....................................................