`_____________
`
`BEFORE THE PATENT TRIAL AND APPEAL BOARD
`_____________
`
`GOOGLE LLC,
`Petitioner,
`
`v.
`
`VIRTAMOVE, CORP.,
`Patent Owner.
`_____________
`
`Case No. IPR2025-00488
`Patent No. 7,519,814
`_____________
`
`DECLARATION OF SAMRAT BHATTACHARJEE, PH.D.
`
`Google Exhibit 1003
`Google v. VirtaMove
`
`
`
`
`
`TABLE OF CONTENTS (CONDENSED)
`PERSONAL AND PROFESSIONAL BACKGROUND ................................. 1
`I.
`II. MATERIALS REVIEWED AND CONSIDERED .......................................... 6
`A. Public Accessibility of Non-Patent Prior Art Exhibits ............................... 6
`III. MY UNDERSTANDING OF PATENT LAW ................................................. 6
`A. Anticipation ................................................................................................. 8
`B. Obviousness ................................................................................................. 9
`IV. UNPATENTABILITY GROUNDS ................................................................ 12
`V. THE ’814 PATENT ......................................................................................... 14
`A. Background and Specification ................................................................... 14
`B. Person of Ordinary Skill in the Art (“POSA”) .......................................... 17
`C. Prosecution History ................................................................................... 19
`D. Challenged Claims ..................................................................................... 20
`E. The Independent Claims Are Not Supported By Provisional
`Application No. 60/502,619 ...................................................................... 20
`VI. CLAIM INTERPRETATION ......................................................................... 21
`A. Terms with Agreed Upon Constructions ................................................... 22
`1. Preamble of Claim 1 ............................................................................ 22
`2. “container” (claims 1, 2, 4, 6, 9, 10, 13, 14) ....................................... 22
`3. “a kernel a set of associated local system files [sic]” (claim 1) ......... 22
`4. “processor” (claim 1) .......................................................................... 23
`5. “servers” (claim 1) .............................................................................. 23
`6. “within a container” (claim 1) ............................................................ 23
`7. Terms whose antecedent refer to the same entity ............................... 23
`B. Terms with Disputed Constructions .......................................................... 24
`1. “operating system” (claims 1, 10) ....................................................... 24
`2. “kernel” / “operating system kernel” (claim 1) ................................... 24
`3. “disparate computing environments” (claim 1) .................................. 25
`4. “service” (claims 1, 14) ....................................................................... 26
`
`– i –
`
`
`
`
`
`5. “at least some of the different operating systems” (claim 1) .............. 26
`“at least some of the plurality of different operating systems” (claim
`1) 26
`6. “memory accessible to at least some of the servers” (claim 1) ........... 26
`7. “local kernel residing permanently on one of the servers”
`(claim 1) .............................................................................................. 27
`8. “secure containers of application software” (claim 1) ....................... 27
`9. “an operating system’s root file system” (claim 1) ............................. 27
`VII. Application of Prior Art to Challenged Claims: Claims 1-34 would
`have been obvious to POSAs over the Schmidt-Tormasov and Schmidt-
`Tormasov-Calder combinations. ..................................................................... 29
`A. Schmidt-479 (EX1008) ............................................................................. 29
`B. Tormasov (EX1010) .................................................................................. 35
`C. Calder (EX1006) ........................................................................................ 39
`D. The Schmidt-Tormasov and Schmidt-Tormasov-Calder
`Combinations (Grounds 1-2) ..................................................................... 46
`1. The Schmidt-Tormasov Combination (Ground 1) .............................. 46
`2. The Schmidt-Tormasov-Calder Combination (Ground 2) .................. 69
`E. Grounds 1-2: Mapping of Schmidt-Tormasov (Ground 1) and
`Schmidt-Tormasov-Calder (Ground 2) to Claims 1-34 ............................ 74
`1. Claim 1 ................................................................................................ 74
`a. [1PREA] ...................................................................................... 75
`b. [1PREB] .................................................................................... 105
`c. [1A] ........................................................................................... 124
`d. [1B] “wherein the set of associated system files are
`compatible with a local kernel of at least some of the
`plurality of different operating systems,” ................................. 169
`e. [1C] “the containers of application software excluding a
`kernel,” ...................................................................................... 171
`[1D] “wherein some or all of the associated system files
`within a container stored in memory are utilized in place
`
`f.
`
`– ii –
`
`
`
`
`
`i.
`
`of the associated local system files that remain resident on
`the server,” ................................................................................ 176
`g. [1E] “wherein said associated system files utilized in place
`of the associated local system files are copies or modified
`copies of the associated local system files that remain
`resident on the server,” .............................................................. 185
`h. [1F] “and wherein the application software cannot be
`shared between the plurality of secure containers of
`application software,” ............................................................... 189
`[1G] “and wherein each of the containers has a unique root
`file system that is different from an operating system’s
`root file system.” ....................................................................... 192
`2. Claim 2: “[C]laim 1, wherein each container has an execution
`file associated therewith for starting the one or more
`applications.” .....................................................................................200
`3. Claim 3: “[C]laim 2, wherein the execution file includes
`instructions related to an order in which executable applications
`within will be executed.” ...................................................................205
`4. Claim 4: “[C]laim 1 further comprising the step of pre-
`identifying applications and system files required for
`association with the one or more containers prior to said storing
`step [[1A]]. ........................................................................................208
`5. Claim 5: “[C]laim 2, further comprising the step of modifying
`at least some of the associated system files in plural containers
`to provide an association with a container specific identity
`assigned to a particular container.” ...................................................211
`6. Claim 6: “[C]laim 2, comprising the step of assigning a unique
`associated identity to each of a plurality of the containers,
`wherein the identity includes at least one of IP address, host
`name, and MAC address.” .................................................................211
`7. Claim 7: “[C]laim 2 further comprising the step of modifying at
`least some of the system files to define container specific mount
`points associated with the container.” ...............................................219
`8. Claim 8: “[C]laim 1, wherein the one or more applications and
`associated system files are retrieved from a computer system
`having a plurality of secure containers.” ...........................................221
`
`– iii –
`
`
`
`
`
`9. Claim 9: “[C]laim 2, wherein server information related to
`hardware resource usage including at least one of CPU
`memory, network bandwidth, and disk allocation is associated
`with at least some of the containers prior to the applications
`within the containers being executed.” .............................................225
`10. Claim 10: “[C]laim 2, wherein in operation when an application
`residing within a container is executed, said application has no
`access to system files or applications in other containers or to
`system files within the operating system during execution
`thereof.” .............................................................................................238
`11. Claim 11: “[C]laim 2, wherein containers include files stored in
`network file storage, and parameters forming descriptors of
`containers stored in a separate location.” ..........................................242
`12. Claim 12: “[C]laim 11, further comprising the step of merging
`the files stored in network storage with the parameters to affect
`the step of storing in claim 1.” ..........................................................244
`13. Claim 13: “[C]laim 1 further comprising the step of associating
`with a plurality of containers a stored history of when processes
`related to applications within the container are executed for at
`least one of, tracking statistics, resource allocation, and for
`monitoring the status of the application.” .........................................245
`14. Claim 14 ............................................................................................254
`a. [14PRE] “[C]laim 1 comprising the step of creating
`containers prior to said step of storing containers in
`memory” .................................................................................... 254
`b. [14A] “wherein containers are created by: a) running an
`instance of a service on a server;” ............................................. 257
`c. [14B] “b) determining which files are being used; and,” ......... 261
`d. [14C] “c) copying applications and associated system files
`to memory without overwriting the associated system files
`so as to provide a second instance of the applications and
`associated system files.” ........................................................... 266
`15. Claim 15 ............................................................................................268
`a. [15A] “[C]laim 14 comprising the steps of: assigning an
`identity to the containers including at least one of a unique
`
`– iv –
`
`
`
`
`
`IP address, a unique Mac address and an estimated
`resource allocation;” ................................................................. 268
`b. [15B] “installing the container on a server; and,” .................... 268
`c. [15C] “testing the applications and files within the
`container.” ................................................................................. 268
`16. Claim 16 ............................................................................................270
`a. [16A] “[C]laim 1 comprising the step of creating
`containers prior to said step of storing containers in
`memor,” ..................................................................................... 270
`b. [16B] “wherein a step of creating containers includes:
`using a skeleton set of system files as a container starting
`point and installing applications into that set of files.” ............ 270
`17. Claim 17 ............................................................................................272
`a. [17A] “[C]laim 1 further comprising installing a service
`on a target server selected from one of the plurality of
`servers,” ..................................................................................... 272
`b. [17B] “wherein installing the service includes: using a
`graphical user interface, associating a unique icon
`representing a service with an unique icon representing a
`server for hosting applications related to the service and
`for executing the service, so as to cause the applications to
`be distributed to, and installed on the target server.”................ 273
`18. Claim 18: “[C]laim 17 wherein the target server and the
`graphical user interface are at remote locations.” .............................280
`19. Claim 19: “[C]laim 18, wherein the graphical user interface is
`installed on a computing platform, and wherein the computing
`platform is a different computing platform than the target
`server.”...............................................................................................284
`20. Claim 20: “[C]laim 19, wherein the step of associating includes
`the step of relatively moving the unique icon representing the
`service to the unique icon representing a server.” ............................286
`21. Claim 21: “[C]laim 20 further comprising starting a distributed
`software application.” ........................................................................289
`
`– v –
`
`
`
`
`
`22. Claim 22: “[C]laims 20 further comprising updating a console
`on the selected target server with information indicating that the
`service is resident on the selected target server.” ..............................293
`23. Claim 23: “[C]laim 17, further comprising, the step of testing to
`determine if the selected target server is a valid computing
`platform, prior to causing the applications to be distributed to,
`and installed on the target server.” ....................................................296
`24. Claim 24: “[C]laim 17 further comprising creating a user
`account for the service.” ....................................................................299
`25. Claim 25: “[C]laim 17, further comprising the step of installing
`files specific to the selected application on the selected server.” .....300
`26. Claim 26: “[C]laim 17 further comprising the steps of setting
`file access permissions to allow a user to access the one of the
`applications to be distributed.” ..........................................................301
`27. Claim 27 ............................................................................................302
`a. [27A] “[C]laim 1, further comprising de-installing a
`service from a server, comprising:” .......................................... 302
`b. [27B] “displaying the icon representing the service; [and]
`displaying the icon representing the server on which the
`service is installed; and” ........................................................... 303
`c. [27C] “utilizing the icon representing the service and the
`icon representing the server to initiating the de-installation
`of the selected service from the server on which it was
`installed.” .................................................................................. 305
`28. Claim 28: “[C]laim 27 further comprising separating icon
`representing the service from the icon representing the server.” ......307
`29. Claim 29: “[C]laim 27 further comprising testing whether the
`selected server is a valid computing platform for de-installation
`of the service.” ...................................................................................309
`30. Claim 30: “[C]laim 27 further comprising copying data file
`changes specific to the service back to a storage medium from
`which the data file changes originated prior to installation.” ...........309
`31. Claim 31 ............................................................................................310
`
`– vi –
`
`
`
`
`
`f.
`
`a. [31PRE] “A computing system for performing a plurality
`of tasks each comprising a plurality of processes
`comprising:” .............................................................................. 310
`b. [31A] “a system having a plurality of secure containers of
`associated files accessible to, and for execution on, one or
`more servers, ” .......................................................................... 311
`c. [31B] “each container being mutually exclusive of the
`other, such that read/write files within a container cannot
`be shared with other containers,” .............................................. 311
`d. [31C] “each container of files is said to have its own
`unique identity associated therewith, said identity
`comprising at least one of an IP address, a host name, and
`a Mac_address;” ........................................................................ 313
`e. [31D] “wherein, the plurality of files within each of the
`plurality of containers comprise one or more application
`programs including one or more processes,” ............................ 313
`[31E] “and associated system files for use in executing the
`one or more processes wherein the associated system files
`are files that are copies of files or modified copies of files
`that remain as part of the operating system,” ............................ 314
`g. [31F] “each container having its own execution file
`associated therewith for starting one or more
`applications,” ............................................................................. 314
`h. [31G] “in operation, each container utilizing a kernel
`resident on the server and” ........................................................ 315
`[31H] “wherein each container exclusively uses a kernel in
`an underlying operation system in which it is running and
`is absent its own kernel; and,” .................................................. 316
`[31I] “a run time module for monitoring system calls from
`applications associated with one or more containers and
`for providing control of the one or more applications.” ........... 317
`32. Claim 32: “[C]laim 31, further comprising a scheduler
`comprising values related to an allotted time in which processes
`within a container may utilize predetermined resources.” ................318
`33. Claim 33: “[C]laim 32, wherein the run time module includes
`an intercepting module associated with the plurality of
`
`i.
`
`j.
`
`– vii –
`
`
`
`
`
`containers for intercepting system calls from any of the
`plurality of containers and for providing values alternate to
`values the kernel would have assigned in response to the system
`calls, so that the containers can run independently of one
`another without contention, in a secure manner, the values
`corresponding to at least one of the IP address, the host name
`and the Mac_Address [sic].” .............................................................321
`34. Claim 34 ............................................................................................322
`a. [34A] “[C]laim 31, wherein the run time module performs:
`monitoring resource usage of applications executing;” ............ 322
`b. [34B] “intercepting system calls to kernel mode, made by
`the at least one respective application within a container,
`from user mode to kernel mode;” ............................................. 323
`c. [34C] “comparing the monitored resource usage of the at
`least one respective application with the resource limits;
`and, forwarding the system calls to a kernel on the basis of
`the comparison between the monitored resource usage and
`the resource limits.” .................................................................. 325
`F. Grounds 3-4: Mapping of the Combinations of Grounds 1-2 in
`Further View of Schmidt-629 to Claims 1-34 .........................................326
`1. Schmidt-629 (EX1116) and the Grounds 3-4 Combinations ............326
`2. Description of the Grounds 3-4 Combinations .................................329
`3. Claims 1-4, 7-30, 32-34 .....................................................................330
`4. Mapping of the Grounds 3-4 Combinations (the Ground 1-2
`Combinations in Further View of Schmidt-629) to Claims 1-34 .....331
`a. Claim 5: “A method as defined in claim 2, further
`comprising the step of modifying at least some of the
`associated system files in plural containers to provide an
`association with a container specific identity assigned to a
`particular container.” ................................................................. 331
`b. Claim 6: “A method as defined in claim 2, comprising the
`step of assigning a unique associated identity to each of a
`plurality of the containers, wherein the identity includes at
`least one of IP address, host name, and MAC address.” .......... 332
`c. Claim 31: ................................................................................... 333
`
`– viii –
`
`
`
`
`
`d. Claims 32-34 ............................................................................. 334
`VIII. APPENDIX: CLAIM LISTING ........................................................................ 1
`
`
`
`– ix –
`
`
`
`
`
`TABLE OF CONTENTS (FULL)
`PERSONAL AND PROFESSIONAL BACKGROUND ................................. 1
`I.
`II. MATERIALS REVIEWED AND CONSIDERED .......................................... 6
`A. Public Accessibility of Non-Patent Prior Art Exhibits ............................... 6
`III. MY UNDERSTANDING OF PATENT LAW ................................................. 6
`A. Anticipation ................................................................................................. 8
`B. Obviousness ................................................................................................. 9
`IV. UNPATENTABILITY GROUNDS ................................................................ 12
`V. THE ’814 PATENT ......................................................................................... 14
`A. Background and Specification ................................................................... 14
`B. Person of Ordinary Skill in the Art (“POSA”) .......................................... 17
`C. Prosecution History ................................................................................... 19
`D. Challenged Claims ..................................................................................... 20
`E. The Independent Claims Are Not Supported By Provisional
`Application No. 60/502,619 ...................................................................... 20
`VI. CLAIM INTERPRETATION ......................................................................... 21
`A. Terms with Agreed Upon Constructions ................................................... 22
`1. Preamble of Claim 1 ............................................................................ 22
`2. “container” (claims 1, 2, 4, 6, 9, 10, 13, 14) ....................................... 22
`3. “a kernel a set of associated local system files [sic]” (claim 1) ......... 22
`4. “processor” (claim 1) .......................................................................... 23
`5. “servers” (claim 1) .............................................................................. 23
`6. “within a container” (claim 1) ............................................................ 23
`7. Terms whose antecedent refer to the same entity ............................... 23
`B. Terms with Disputed Constructions .......................................................... 24
`1. “operating system” (claims 1, 10) ....................................................... 24
`2. “kernel” / “operating system kernel” (claim 1) ................................... 24
`3. “disparate computing environments” (claim 1) .................................. 25
`4. “service” (claims 1, 14) ....................................................................... 26
`
`– x –
`
`
`
`
`
`5. “at least some of the different operating systems” (claim 1) .............. 26
`“at least some of the plurality of different operating systems” (claim
`1) 26
`6. “memory accessible to at least some of the servers” (claim 1) ........... 26
`7. “local kernel residing permanently on one of the servers”
`(claim 1) .............................................................................................. 27
`8. “secure containers of application software” (claim 1) ....................... 27
`9. “an operating system’s root file system” (claim 1) ............................. 27
`VII. Application of Prior Art to Challenged Claims: Claims 1-34 would
`have been obvious to POSAs over the Schmidt-Tormasov and Schmidt-
`Tormasov-Calder combinations. ..................................................................... 29
`A. Schmidt-479 (EX1008) ............................................................................. 29
`B. Tormasov (EX1010) .................................................................................. 35
`C. Calder (EX1006) ........................................................................................ 39
`D. The Schmidt-Tormasov and Schmidt-Tormasov-Calder
`Combinations (Grounds 1-2) ..................................................................... 46
`1. The Schmidt-Tormasov Combination (Ground 1) .............................. 46
`2. The Schmidt-Tormasov-Calder Combination (Ground 2) .................. 69
`E. Grounds 1-2: Mapping of Schmidt-Tormasov (Ground 1) and
`Schmidt-Tormasov-Calder (Ground 2) to Claims 1-34 ............................ 74
`1. Claim 1 ................................................................................................ 74
`a. [1PREA] ...................................................................................... 75
`i.
`“1. In a system having a plurality of servers with
`operating systems that differ” ............................................. 75
`ii. “operating in disparate computing environments” ............. 81
`iii. “wherein each server includes a processor and an
`operating system” ............................................................... 85
`iv. “[OS] including a kernel [and] a set of associated
`local system files compatible with the processor” ............. 92
`b. [1PREB] .................................................................................... 105
`i.
`“a method of providing at least some of the servers in
`the system with secure, executable, applications” ............ 105
`
`– xi –
`
`
`
`
`
`ii. “[applications] related to a service” .................................. 111
`iii. “wherein the applications are executed in a secure
`environment” .................................................................... 114
`iv. “wherein the applications each include an object
`executable by at least some of the different operating
`systems for performing a task related to the service” ....... 117
`c. [1A] ........................................................................................... 124
`i.
`“storing in memory accessible to at least some of the
`servers a plurality of secure containers of application
`software” ........................................................................... 124
`(1) Schmidt-Tormasov/Schmidt-Tormasov-Calder
`VCEs-capsules (containers) are “stor[ed] in
`memory accessible to…the servers” ........................ 125
`(2) Schmidt-Tormasov/Schmidt-Tormasov-Calder
`VCEs-capsules are “containers of application
`software” ................................................................... 127
`(3) Schmidt-Tormasov’s and Schmidt-Tormasov-
`Calder’s VCE-capsules are “secure containers of
`application software” ................................................ 150
`ii. “each container comprising one or more of the
`executable applications” ................................................... 156
`iii. “and a set of associated system files required to
`execute the one or more applications” .............................. 158
`iv. “for use with a local kernel residing permanently on
`one of the servers” ............................................................ 164
`d. [1B] “wherein the set of associated system files are
`compatible with a local kernel of at least some of the
`plurality of different operating systems,” ................................. 169
`e. [1C] “the containers of application software excluding a
`kernel,” ...................................................................................... 171
`[1D] “wherein some or all of the associated system files
`within a container stored in memory are utilized in place
`of the associated local system files that remain resident on
`the server,” ................................................................................ 176
`
`f.
`
`– xii –
`
`
`
`
`
`i.
`
`g. [1E] “wherein said associated system files utilized in place
`of the associated local system files are copies or modified
`copies of the associated local system files that remain
`resident on the server,” .............................................................. 185
`h. [1F] “and wherein the application software cannot be
`shared between the plurality of secure containers of
`application software,” ............................................................... 189
`[1G] “and wherein each of the containers has a unique root
`file system that is different from an operating system’s
`root file system.” ....................................................................... 192
`2. Claim 2: “[C]laim 1, wherein each container has an execution
`file associated therewith for starting the one or more
`applications.” .....................................................................................200
`3. Claim 3: “[C]laim 2, wherein the execution file includes
`instructions related to an order in which executable applications
`within will be executed.” ...................................................................205
`4. Claim 4: “[C]laim 1 further comprising the step of pre-
`identifying applications and system files required for
`association with the one or more containers prior to said storing
`step [[1A]]. ........................................................................................208
`5. Claim 5: “[C]laim 2, further comprising the step of modifying
`at least some of the associated system files in plural containers
`to provide an association with a container specific identity
`assigned to a particular container.” ...................................................211
`6. Claim 6: “[C]laim 2, comprising the step of assigning a unique
`associated identity to each of a plurality of the containers,
`wherein the identity includes at least one of IP address, host
`name, and MAC address.” .................................................................211
`7. Claim 7: “[C]laim 2 further comprising the step of modifying at
`least some of the system files to define container specific mount
`points associated with the container.” ...............................................219
`8. Claim 8: “[C]laim 1, wherein the one or more applications and
`associated system files are retrieved from a computer system
`having a plurality of secure containers.” ...........................................221
`9. Claim 9: “[C]laim 2, wherein server information related to
`hardware resource usage including at least one of CPU
`
`– xiii –
`
`
`
`
`
`memory, network bandwidth, and disk allocation is associated
`with at least some of the containers prior to the applications
`within the containers being executed.” .............................................225
`10. Claim 10: “[C]laim 2, wherein in operation when an application
`residing within a container is executed, said application has no
`access to system files or applications in other containers or to
`system files within the operating system during execution
`thereof.” .............................................................................................238
`11. Claim 11: “[C]laim 2, wherein containers include files stored in
`network file storage, and parameters forming descriptors of
`containers stored in a separate location.” ..........................................242
`12. Claim 12: “[C]laim 11, further comprising the step of merging
`the files stored in network storage with the parameters to affect
`the step of storing in claim 1.” ..........................................................244
`13. Claim 13: “[C]laim 1 further comprising the step of associating
`with a plurality of containers a stored history of when processes
`related to applications within the container are executed for at
`least one of, tracking statistics, resource allocation, and for
`monitoring the status of the application.” .........................................245
`14. Claim 14 ............................................................................................254
`a. [14PRE] “[C]laim 1 comprising the step of creating
`containers prior to said step of storing c