throbber
UNITED STATES PATENT AND TRADEMARK OFFICE
`_____________
`
`BEFORE THE PATENT TRIAL AND APPEAL BOARD
`_____________
`
`GOOGLE LLC,
`Petitioner,
`
`v.
`
`VIRTAMOVE, CORP.,
`Patent Owner.
`_____________
`
`Case No. IPR2025-00488
`Patent No. 7,519,814
`_____________
`
`DECLARATION OF SAMRAT BHATTACHARJEE, PH.D.
`
`Google Exhibit 1003
`Google v. VirtaMove
`
`

`

`
`
`TABLE OF CONTENTS (CONDENSED)
`PERSONAL AND PROFESSIONAL BACKGROUND ................................. 1
`I.
`II. MATERIALS REVIEWED AND CONSIDERED .......................................... 6
`A. Public Accessibility of Non-Patent Prior Art Exhibits ............................... 6
`III. MY UNDERSTANDING OF PATENT LAW ................................................. 6
`A. Anticipation ................................................................................................. 8
`B. Obviousness ................................................................................................. 9
`IV. UNPATENTABILITY GROUNDS ................................................................ 12
`V. THE ’814 PATENT ......................................................................................... 14
`A. Background and Specification ................................................................... 14
`B. Person of Ordinary Skill in the Art (“POSA”) .......................................... 17
`C. Prosecution History ................................................................................... 19
`D. Challenged Claims ..................................................................................... 20
`E. The Independent Claims Are Not Supported By Provisional
`Application No. 60/502,619 ...................................................................... 20
`VI. CLAIM INTERPRETATION ......................................................................... 21
`A. Terms with Agreed Upon Constructions ................................................... 22
`1. Preamble of Claim 1 ............................................................................ 22
`2. “container” (claims 1, 2, 4, 6, 9, 10, 13, 14) ....................................... 22
`3. “a kernel a set of associated local system files [sic]” (claim 1) ......... 22
`4. “processor” (claim 1) .......................................................................... 23
`5. “servers” (claim 1) .............................................................................. 23
`6. “within a container” (claim 1) ............................................................ 23
`7. Terms whose antecedent refer to the same entity ............................... 23
`B. Terms with Disputed Constructions .......................................................... 24
`1. “operating system” (claims 1, 10) ....................................................... 24
`2. “kernel” / “operating system kernel” (claim 1) ................................... 24
`3. “disparate computing environments” (claim 1) .................................. 25
`4. “service” (claims 1, 14) ....................................................................... 26
`
`– i –
`
`

`

`
`
`5. “at least some of the different operating systems” (claim 1) .............. 26
`“at least some of the plurality of different operating systems” (claim
`1) 26
`6. “memory accessible to at least some of the servers” (claim 1) ........... 26
`7. “local kernel residing permanently on one of the servers”
`(claim 1) .............................................................................................. 27
`8. “secure containers of application software” (claim 1) ....................... 27
`9. “an operating system’s root file system” (claim 1) ............................. 27
`VII. Application of Prior Art to Challenged Claims: Claims 1-34 would
`have been obvious to POSAs over the Schmidt-Tormasov and Schmidt-
`Tormasov-Calder combinations. ..................................................................... 29
`A. Schmidt-479 (EX1008) ............................................................................. 29
`B. Tormasov (EX1010) .................................................................................. 35
`C. Calder (EX1006) ........................................................................................ 39
`D. The Schmidt-Tormasov and Schmidt-Tormasov-Calder
`Combinations (Grounds 1-2) ..................................................................... 46
`1. The Schmidt-Tormasov Combination (Ground 1) .............................. 46
`2. The Schmidt-Tormasov-Calder Combination (Ground 2) .................. 69
`E. Grounds 1-2: Mapping of Schmidt-Tormasov (Ground 1) and
`Schmidt-Tormasov-Calder (Ground 2) to Claims 1-34 ............................ 74
`1. Claim 1 ................................................................................................ 74
`a. [1PREA] ...................................................................................... 75
`b. [1PREB] .................................................................................... 105
`c. [1A] ........................................................................................... 124
`d. [1B] “wherein the set of associated system files are
`compatible with a local kernel of at least some of the
`plurality of different operating systems,” ................................. 169
`e. [1C] “the containers of application software excluding a
`kernel,” ...................................................................................... 171
`[1D] “wherein some or all of the associated system files
`within a container stored in memory are utilized in place
`
`f.
`
`– ii –
`
`

`

`
`
`i.
`
`of the associated local system files that remain resident on
`the server,” ................................................................................ 176
`g. [1E] “wherein said associated system files utilized in place
`of the associated local system files are copies or modified
`copies of the associated local system files that remain
`resident on the server,” .............................................................. 185
`h. [1F] “and wherein the application software cannot be
`shared between the plurality of secure containers of
`application software,” ............................................................... 189
`[1G] “and wherein each of the containers has a unique root
`file system that is different from an operating system’s
`root file system.” ....................................................................... 192
`2. Claim 2: “[C]laim 1, wherein each container has an execution
`file associated therewith for starting the one or more
`applications.” .....................................................................................200
`3. Claim 3: “[C]laim 2, wherein the execution file includes
`instructions related to an order in which executable applications
`within will be executed.” ...................................................................205
`4. Claim 4: “[C]laim 1 further comprising the step of pre-
`identifying applications and system files required for
`association with the one or more containers prior to said storing
`step [[1A]]. ........................................................................................208
`5. Claim 5: “[C]laim 2, further comprising the step of modifying
`at least some of the associated system files in plural containers
`to provide an association with a container specific identity
`assigned to a particular container.” ...................................................211
`6. Claim 6: “[C]laim 2, comprising the step of assigning a unique
`associated identity to each of a plurality of the containers,
`wherein the identity includes at least one of IP address, host
`name, and MAC address.” .................................................................211
`7. Claim 7: “[C]laim 2 further comprising the step of modifying at
`least some of the system files to define container specific mount
`points associated with the container.” ...............................................219
`8. Claim 8: “[C]laim 1, wherein the one or more applications and
`associated system files are retrieved from a computer system
`having a plurality of secure containers.” ...........................................221
`
`– iii –
`
`

`

`
`
`9. Claim 9: “[C]laim 2, wherein server information related to
`hardware resource usage including at least one of CPU
`memory, network bandwidth, and disk allocation is associated
`with at least some of the containers prior to the applications
`within the containers being executed.” .............................................225
`10. Claim 10: “[C]laim 2, wherein in operation when an application
`residing within a container is executed, said application has no
`access to system files or applications in other containers or to
`system files within the operating system during execution
`thereof.” .............................................................................................238
`11. Claim 11: “[C]laim 2, wherein containers include files stored in
`network file storage, and parameters forming descriptors of
`containers stored in a separate location.” ..........................................242
`12. Claim 12: “[C]laim 11, further comprising the step of merging
`the files stored in network storage with the parameters to affect
`the step of storing in claim 1.” ..........................................................244
`13. Claim 13: “[C]laim 1 further comprising the step of associating
`with a plurality of containers a stored history of when processes
`related to applications within the container are executed for at
`least one of, tracking statistics, resource allocation, and for
`monitoring the status of the application.” .........................................245
`14. Claim 14 ............................................................................................254
`a. [14PRE] “[C]laim 1 comprising the step of creating
`containers prior to said step of storing containers in
`memory” .................................................................................... 254
`b. [14A] “wherein containers are created by: a) running an
`instance of a service on a server;” ............................................. 257
`c. [14B] “b) determining which files are being used; and,” ......... 261
`d. [14C] “c) copying applications and associated system files
`to memory without overwriting the associated system files
`so as to provide a second instance of the applications and
`associated system files.” ........................................................... 266
`15. Claim 15 ............................................................................................268
`a. [15A] “[C]laim 14 comprising the steps of: assigning an
`identity to the containers including at least one of a unique
`
`– iv –
`
`

`

`
`
`IP address, a unique Mac address and an estimated
`resource allocation;” ................................................................. 268
`b. [15B] “installing the container on a server; and,” .................... 268
`c. [15C] “testing the applications and files within the
`container.” ................................................................................. 268
`16. Claim 16 ............................................................................................270
`a. [16A] “[C]laim 1 comprising the step of creating
`containers prior to said step of storing containers in
`memor,” ..................................................................................... 270
`b. [16B] “wherein a step of creating containers includes:
`using a skeleton set of system files as a container starting
`point and installing applications into that set of files.” ............ 270
`17. Claim 17 ............................................................................................272
`a. [17A] “[C]laim 1 further comprising installing a service
`on a target server selected from one of the plurality of
`servers,” ..................................................................................... 272
`b. [17B] “wherein installing the service includes: using a
`graphical user interface, associating a unique icon
`representing a service with an unique icon representing a
`server for hosting applications related to the service and
`for executing the service, so as to cause the applications to
`be distributed to, and installed on the target server.”................ 273
`18. Claim 18: “[C]laim 17 wherein the target server and the
`graphical user interface are at remote locations.” .............................280
`19. Claim 19: “[C]laim 18, wherein the graphical user interface is
`installed on a computing platform, and wherein the computing
`platform is a different computing platform than the target
`server.”...............................................................................................284
`20. Claim 20: “[C]laim 19, wherein the step of associating includes
`the step of relatively moving the unique icon representing the
`service to the unique icon representing a server.” ............................286
`21. Claim 21: “[C]laim 20 further comprising starting a distributed
`software application.” ........................................................................289
`
`– v –
`
`

`

`
`
`22. Claim 22: “[C]laims 20 further comprising updating a console
`on the selected target server with information indicating that the
`service is resident on the selected target server.” ..............................293
`23. Claim 23: “[C]laim 17, further comprising, the step of testing to
`determine if the selected target server is a valid computing
`platform, prior to causing the applications to be distributed to,
`and installed on the target server.” ....................................................296
`24. Claim 24: “[C]laim 17 further comprising creating a user
`account for the service.” ....................................................................299
`25. Claim 25: “[C]laim 17, further comprising the step of installing
`files specific to the selected application on the selected server.” .....300
`26. Claim 26: “[C]laim 17 further comprising the steps of setting
`file access permissions to allow a user to access the one of the
`applications to be distributed.” ..........................................................301
`27. Claim 27 ............................................................................................302
`a. [27A] “[C]laim 1, further comprising de-installing a
`service from a server, comprising:” .......................................... 302
`b. [27B] “displaying the icon representing the service; [and]
`displaying the icon representing the server on which the
`service is installed; and” ........................................................... 303
`c. [27C] “utilizing the icon representing the service and the
`icon representing the server to initiating the de-installation
`of the selected service from the server on which it was
`installed.” .................................................................................. 305
`28. Claim 28: “[C]laim 27 further comprising separating icon
`representing the service from the icon representing the server.” ......307
`29. Claim 29: “[C]laim 27 further comprising testing whether the
`selected server is a valid computing platform for de-installation
`of the service.” ...................................................................................309
`30. Claim 30: “[C]laim 27 further comprising copying data file
`changes specific to the service back to a storage medium from
`which the data file changes originated prior to installation.” ...........309
`31. Claim 31 ............................................................................................310
`
`– vi –
`
`

`

`
`
`f.
`
`a. [31PRE] “A computing system for performing a plurality
`of tasks each comprising a plurality of processes
`comprising:” .............................................................................. 310
`b. [31A] “a system having a plurality of secure containers of
`associated files accessible to, and for execution on, one or
`more servers, ” .......................................................................... 311
`c. [31B] “each container being mutually exclusive of the
`other, such that read/write files within a container cannot
`be shared with other containers,” .............................................. 311
`d. [31C] “each container of files is said to have its own
`unique identity associated therewith, said identity
`comprising at least one of an IP address, a host name, and
`a Mac_address;” ........................................................................ 313
`e. [31D] “wherein, the plurality of files within each of the
`plurality of containers comprise one or more application
`programs including one or more processes,” ............................ 313
`[31E] “and associated system files for use in executing the
`one or more processes wherein the associated system files
`are files that are copies of files or modified copies of files
`that remain as part of the operating system,” ............................ 314
`g. [31F] “each container having its own execution file
`associated therewith for starting one or more
`applications,” ............................................................................. 314
`h. [31G] “in operation, each container utilizing a kernel
`resident on the server and” ........................................................ 315
`[31H] “wherein each container exclusively uses a kernel in
`an underlying operation system in which it is running and
`is absent its own kernel; and,” .................................................. 316
`[31I] “a run time module for monitoring system calls from
`applications associated with one or more containers and
`for providing control of the one or more applications.” ........... 317
`32. Claim 32: “[C]laim 31, further comprising a scheduler
`comprising values related to an allotted time in which processes
`within a container may utilize predetermined resources.” ................318
`33. Claim 33: “[C]laim 32, wherein the run time module includes
`an intercepting module associated with the plurality of
`
`i.
`
`j.
`
`– vii –
`
`

`

`
`
`containers for intercepting system calls from any of the
`plurality of containers and for providing values alternate to
`values the kernel would have assigned in response to the system
`calls, so that the containers can run independently of one
`another without contention, in a secure manner, the values
`corresponding to at least one of the IP address, the host name
`and the Mac_Address [sic].” .............................................................321
`34. Claim 34 ............................................................................................322
`a. [34A] “[C]laim 31, wherein the run time module performs:
`monitoring resource usage of applications executing;” ............ 322
`b. [34B] “intercepting system calls to kernel mode, made by
`the at least one respective application within a container,
`from user mode to kernel mode;” ............................................. 323
`c. [34C] “comparing the monitored resource usage of the at
`least one respective application with the resource limits;
`and, forwarding the system calls to a kernel on the basis of
`the comparison between the monitored resource usage and
`the resource limits.” .................................................................. 325
`F. Grounds 3-4: Mapping of the Combinations of Grounds 1-2 in
`Further View of Schmidt-629 to Claims 1-34 .........................................326
`1. Schmidt-629 (EX1116) and the Grounds 3-4 Combinations ............326
`2. Description of the Grounds 3-4 Combinations .................................329
`3. Claims 1-4, 7-30, 32-34 .....................................................................330
`4. Mapping of the Grounds 3-4 Combinations (the Ground 1-2
`Combinations in Further View of Schmidt-629) to Claims 1-34 .....331
`a. Claim 5: “A method as defined in claim 2, further
`comprising the step of modifying at least some of the
`associated system files in plural containers to provide an
`association with a container specific identity assigned to a
`particular container.” ................................................................. 331
`b. Claim 6: “A method as defined in claim 2, comprising the
`step of assigning a unique associated identity to each of a
`plurality of the containers, wherein the identity includes at
`least one of IP address, host name, and MAC address.” .......... 332
`c. Claim 31: ................................................................................... 333
`
`– viii –
`
`

`

`
`
`d. Claims 32-34 ............................................................................. 334
`VIII. APPENDIX: CLAIM LISTING ........................................................................ 1
`
`
`
`– ix –
`
`

`

`
`
`TABLE OF CONTENTS (FULL)
`PERSONAL AND PROFESSIONAL BACKGROUND ................................. 1
`I.
`II. MATERIALS REVIEWED AND CONSIDERED .......................................... 6
`A. Public Accessibility of Non-Patent Prior Art Exhibits ............................... 6
`III. MY UNDERSTANDING OF PATENT LAW ................................................. 6
`A. Anticipation ................................................................................................. 8
`B. Obviousness ................................................................................................. 9
`IV. UNPATENTABILITY GROUNDS ................................................................ 12
`V. THE ’814 PATENT ......................................................................................... 14
`A. Background and Specification ................................................................... 14
`B. Person of Ordinary Skill in the Art (“POSA”) .......................................... 17
`C. Prosecution History ................................................................................... 19
`D. Challenged Claims ..................................................................................... 20
`E. The Independent Claims Are Not Supported By Provisional
`Application No. 60/502,619 ...................................................................... 20
`VI. CLAIM INTERPRETATION ......................................................................... 21
`A. Terms with Agreed Upon Constructions ................................................... 22
`1. Preamble of Claim 1 ............................................................................ 22
`2. “container” (claims 1, 2, 4, 6, 9, 10, 13, 14) ....................................... 22
`3. “a kernel a set of associated local system files [sic]” (claim 1) ......... 22
`4. “processor” (claim 1) .......................................................................... 23
`5. “servers” (claim 1) .............................................................................. 23
`6. “within a container” (claim 1) ............................................................ 23
`7. Terms whose antecedent refer to the same entity ............................... 23
`B. Terms with Disputed Constructions .......................................................... 24
`1. “operating system” (claims 1, 10) ....................................................... 24
`2. “kernel” / “operating system kernel” (claim 1) ................................... 24
`3. “disparate computing environments” (claim 1) .................................. 25
`4. “service” (claims 1, 14) ....................................................................... 26
`
`– x –
`
`

`

`
`
`5. “at least some of the different operating systems” (claim 1) .............. 26
`“at least some of the plurality of different operating systems” (claim
`1) 26
`6. “memory accessible to at least some of the servers” (claim 1) ........... 26
`7. “local kernel residing permanently on one of the servers”
`(claim 1) .............................................................................................. 27
`8. “secure containers of application software” (claim 1) ....................... 27
`9. “an operating system’s root file system” (claim 1) ............................. 27
`VII. Application of Prior Art to Challenged Claims: Claims 1-34 would
`have been obvious to POSAs over the Schmidt-Tormasov and Schmidt-
`Tormasov-Calder combinations. ..................................................................... 29
`A. Schmidt-479 (EX1008) ............................................................................. 29
`B. Tormasov (EX1010) .................................................................................. 35
`C. Calder (EX1006) ........................................................................................ 39
`D. The Schmidt-Tormasov and Schmidt-Tormasov-Calder
`Combinations (Grounds 1-2) ..................................................................... 46
`1. The Schmidt-Tormasov Combination (Ground 1) .............................. 46
`2. The Schmidt-Tormasov-Calder Combination (Ground 2) .................. 69
`E. Grounds 1-2: Mapping of Schmidt-Tormasov (Ground 1) and
`Schmidt-Tormasov-Calder (Ground 2) to Claims 1-34 ............................ 74
`1. Claim 1 ................................................................................................ 74
`a. [1PREA] ...................................................................................... 75
`i.
`“1. In a system having a plurality of servers with
`operating systems that differ” ............................................. 75
`ii. “operating in disparate computing environments” ............. 81
`iii. “wherein each server includes a processor and an
`operating system” ............................................................... 85
`iv. “[OS] including a kernel [and] a set of associated
`local system files compatible with the processor” ............. 92
`b. [1PREB] .................................................................................... 105
`i.
`“a method of providing at least some of the servers in
`the system with secure, executable, applications” ............ 105
`
`– xi –
`
`

`

`
`
`ii. “[applications] related to a service” .................................. 111
`iii. “wherein the applications are executed in a secure
`environment” .................................................................... 114
`iv. “wherein the applications each include an object
`executable by at least some of the different operating
`systems for performing a task related to the service” ....... 117
`c. [1A] ........................................................................................... 124
`i.
`“storing in memory accessible to at least some of the
`servers a plurality of secure containers of application
`software” ........................................................................... 124
`(1) Schmidt-Tormasov/Schmidt-Tormasov-Calder
`VCEs-capsules (containers) are “stor[ed] in
`memory accessible to…the servers” ........................ 125
`(2) Schmidt-Tormasov/Schmidt-Tormasov-Calder
`VCEs-capsules are “containers of application
`software” ................................................................... 127
`(3) Schmidt-Tormasov’s and Schmidt-Tormasov-
`Calder’s VCE-capsules are “secure containers of
`application software” ................................................ 150
`ii. “each container comprising one or more of the
`executable applications” ................................................... 156
`iii. “and a set of associated system files required to
`execute the one or more applications” .............................. 158
`iv. “for use with a local kernel residing permanently on
`one of the servers” ............................................................ 164
`d. [1B] “wherein the set of associated system files are
`compatible with a local kernel of at least some of the
`plurality of different operating systems,” ................................. 169
`e. [1C] “the containers of application software excluding a
`kernel,” ...................................................................................... 171
`[1D] “wherein some or all of the associated system files
`within a container stored in memory are utilized in place
`of the associated local system files that remain resident on
`the server,” ................................................................................ 176
`
`f.
`
`– xii –
`
`

`

`
`
`i.
`
`g. [1E] “wherein said associated system files utilized in place
`of the associated local system files are copies or modified
`copies of the associated local system files that remain
`resident on the server,” .............................................................. 185
`h. [1F] “and wherein the application software cannot be
`shared between the plurality of secure containers of
`application software,” ............................................................... 189
`[1G] “and wherein each of the containers has a unique root
`file system that is different from an operating system’s
`root file system.” ....................................................................... 192
`2. Claim 2: “[C]laim 1, wherein each container has an execution
`file associated therewith for starting the one or more
`applications.” .....................................................................................200
`3. Claim 3: “[C]laim 2, wherein the execution file includes
`instructions related to an order in which executable applications
`within will be executed.” ...................................................................205
`4. Claim 4: “[C]laim 1 further comprising the step of pre-
`identifying applications and system files required for
`association with the one or more containers prior to said storing
`step [[1A]]. ........................................................................................208
`5. Claim 5: “[C]laim 2, further comprising the step of modifying
`at least some of the associated system files in plural containers
`to provide an association with a container specific identity
`assigned to a particular container.” ...................................................211
`6. Claim 6: “[C]laim 2, comprising the step of assigning a unique
`associated identity to each of a plurality of the containers,
`wherein the identity includes at least one of IP address, host
`name, and MAC address.” .................................................................211
`7. Claim 7: “[C]laim 2 further comprising the step of modifying at
`least some of the system files to define container specific mount
`points associated with the container.” ...............................................219
`8. Claim 8: “[C]laim 1, wherein the one or more applications and
`associated system files are retrieved from a computer system
`having a plurality of secure containers.” ...........................................221
`9. Claim 9: “[C]laim 2, wherein server information related to
`hardware resource usage including at least one of CPU
`
`– xiii –
`
`

`

`
`
`memory, network bandwidth, and disk allocation is associated
`with at least some of the containers prior to the applications
`within the containers being executed.” .............................................225
`10. Claim 10: “[C]laim 2, wherein in operation when an application
`residing within a container is executed, said application has no
`access to system files or applications in other containers or to
`system files within the operating system during execution
`thereof.” .............................................................................................238
`11. Claim 11: “[C]laim 2, wherein containers include files stored in
`network file storage, and parameters forming descriptors of
`containers stored in a separate location.” ..........................................242
`12. Claim 12: “[C]laim 11, further comprising the step of merging
`the files stored in network storage with the parameters to affect
`the step of storing in claim 1.” ..........................................................244
`13. Claim 13: “[C]laim 1 further comprising the step of associating
`with a plurality of containers a stored history of when processes
`related to applications within the container are executed for at
`least one of, tracking statistics, resource allocation, and for
`monitoring the status of the application.” .........................................245
`14. Claim 14 ............................................................................................254
`a. [14PRE] “[C]laim 1 comprising the step of creating
`containers prior to said step of storing c

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket