DCT
7:24-cv-00030
VirtaMove Corp v. Amazon.com Inc
I. Executive Summary and Procedural Information
- Parties & Counsel:- Plaintiff: VirtaMove, Corp. (Canada)
- Defendant: Amazon.com, Inc.; Amazon.com Services LLC; and Amazon Web Services, Inc. (Delaware / Washington)
- Plaintiff’s Counsel: Russ August & Kabat
 
- Case Identification: 7:24-cv-00030, W.D. Tex., 05/03/2024
- Venue Allegations: Venue is alleged based on Defendant’s regular and established place of business in the district, specifically an Amazon Tech Hub located in Austin, Texas.
- Core Dispute: Plaintiff alleges that Defendant’s cloud computing services for application migration and containerization infringe patents related to creating isolated, portable software environments.
- Technical Context: The lawsuit concerns software containerization, a technology that encapsulates an application with its dependencies to run reliably across different computing environments, which is foundational to modern cloud services and DevOps.
- Key Procedural History: The complaint alleges that Defendant had pre-suit knowledge of the technology and at least one of the asserted patents through a series of meetings between the parties spanning from 2009 to 2021. It further alleges that the U.S. Patent and Trademark Office cited U.S. Patent No. 7,519,814 against Amazon during the prosecution of two separate Amazon-assigned patents, potentially strengthening the claim of pre-suit notice.
Case Timeline
| Date | Event | 
|---|---|
| 2003-09-15 | Priority Date for U.S. Patent No. 7,519,814 | 
| 2003-09-22 | Priority Date for U.S. Patent No. 7,784,058 | 
| 2006-05-03 | Amazon Web Services, Inc. allegedly began doing business in Texas | 
| 2009-04-14 | U.S. Patent No. 7,519,814 Issued | 
| Late 2009 | Alleged meetings between VirtaMove and Amazon representatives begin | 
| 2010-08-24 | U.S. Patent No. 7,784,058 Issued | 
| 2012-2015 | Alleged meetings between VirtaMove and Amazon representatives | 
| 2013-10-01 | ’814 Patent allegedly cited by USPTO against an Amazon patent application | 
| 2018-2021 | Alleged meetings between VirtaMove and Amazon representatives | 
| 2020-06-01 | ’814 Patent allegedly cited by USPTO against an Amazon patent application | 
| 2024-05-03 | Complaint Filed | 
II. Technology and Patent(s)-in-Suit Analysis
U.S. Patent No. 7,519,814 - "System for Containerization of Application Sets"
- Patent Identification: U.S. Patent No. 7,519,814, "System for Containerization of Application Sets," issued April 14, 2009.
The Invention Explained
- Problem Addressed: The patent describes the high cost and complexity of deploying multiple software applications on a single computer system, especially when those applications have conflicting requirements for shared resources or specific versions of operating system files (’814 Patent, col. 1:36-44). Existing solutions like virtual machines were noted to impose significant performance overhead and management burdens (’814 Patent, col. 1:51-64).
- The Patented Solution: The invention proposes a "secure container" that packages an application along with its necessary system files (e.g., libraries, configuration files) but explicitly excludes the operating system kernel (’814 Patent, Abstract). When deployed, this container uses the host server's existing kernel, but its own packaged system files are utilized in place of the server's native system files, creating an isolated environment that allows the application to run as if on its original system without the need for a full virtual machine (’814 Patent, col. 3:41-48).
- Technical Importance: This method provides application isolation and portability, key benefits of virtualization, but without the performance cost of emulating hardware and running a separate operating system for each application set (’814 Patent, col. 2:1-3).
Key Claims at a Glance
- The complaint incorporates a claim chart for an unspecified independent claim by reference as Exhibit 2, which was not filed with the complaint (Compl. ¶20). Claim 1 is the first independent claim of the patent.
- Essential elements of Independent Claim 1 include:- A method involving storing "a plurality of secure containers of application software."
- Each container comprises one or more executable applications and a "set of associated system files" required for execution.
- The containers of application software "exclud[e] a kernel."
- Some or all of the system files within the container are "utilized in place of the associated local system files resident on the server."
- Each container has a "unique root file system that is different from an operating system's root file system."
 
- The complaint does not explicitly reserve the right to assert dependent claims for the ’814 Patent.
U.S. Patent No. 7,784,058 - "Computing System Having User Mode Critical System Elements as Shared Libraries"
- Patent Identification: U.S. Patent No. 7,784,058, "Computing System Having User Mode Critical System Elements as Shared Libraries," issued August 24, 2010.
The Invention Explained
- Problem Addressed: The patent identifies limitations caused by the centralized control of "critical system elements" (CSEs) within a traditional operating system kernel (’058 Patent, col. 1:24-28). For example, two applications may require different versions of the same network service, leading to conflicts when forced to share a single, system-wide service provided by the kernel (’058 Patent, col. 1:29-33).
- The Patented Solution: The invention describes a system where "replicas" of these kernel-level CSEs are provided as user-mode "shared libraries" (termed SLCSES) (’058 Patent, Abstract). An application can link to a specific version of an SLCSE, which then runs in the application's own context. This provides each application with a unique, non-shared instance of a critical service, avoiding conflicts with other applications running on the same system (’058 Patent, col. 2:15-21).
- Technical Importance: This architecture enables greater application density and compatibility on a single OS by moving the potential points of conflict—the critical system services—from a shared kernel space into isolated, application-specific user-mode instances (’058 Patent, col. 1:46-54).
Key Claims at a Glance
- The complaint incorporates a claim chart for an unspecified independent claim by reference as Exhibit 4, which was not filed with the complaint (Compl. ¶30). Claim 1 is the first independent claim of the patent.
- Essential elements of Independent Claim 1 include:- A computing system with an operating system kernel having "OS critical system elements (OSCSEs)" for running in kernel mode.
- A "shared library" having "shared library critical system elements (SLCSES)" for use by applications in user mode.
- The SLCSES are "functional replicas" of the OSCSEs.
- An instance of an SLCSE provided to a first application "is run in a context of said at least first... application without being shared with other... applications."
- A second application can simultaneously have use of a "unique instance of a corresponding critical system element."
 
- The complaint does not explicitly reserve the right to assert dependent claims for the ’058 Patent.
III. The Accused Instrumentality
Product Identification
- The complaint names Amazon's "AWS End-of-Support Migration Program" ("EMP") as infringing the ’814 Patent and Amazon's "AWS Elastic Container Service" ("ECS") as infringing the ’058 Patent (Compl. ¶15, 25).
Functionality and Market Context
- The AWS EMP service is described as a tool that enables migration of legacy applications from older Windows Server systems to modern versions (Compl. ¶15). It functions by creating a "compatibility package" that contains the application and its dependencies. The complaint alleges this package "intercepts the API calls that the application makes to the underlying Windows Server OS, and redirects them to the files and registry within the created package," thereby isolating the application from the host OS (Compl. ¶15).
- The AWS ECS service is a container orchestration service for deploying, managing, and scaling containerized applications (Compl. ¶25). The complaint notes that ECS runs on purpose-built operating systems like "Bottlerocket," a minimal Linux-based OS designed specifically for running containers. A key allegation is that such a system provides applications with necessary system libraries and tools within the isolated container environment (Compl. ¶25, p.10).
- The complaint asserts the commercial importance of the technology by citing market growth statistics for application containers (Compl. ¶5). It also provides a screenshot from an Amazon case study, "Fire TV at Amazon Prime Video Modernizes Its Stack Using Amazon ECS with AWS Fargate," to allege that Amazon's own major services rely on the accused ECS technology (Compl. p.10).
IV. Analysis of Infringement Allegations
The complaint references but does not include claim chart exhibits. The following summary is based on the narrative allegations.
’814 Patent Infringement Allegations
| Claim Element (from Independent Claim 1) | Alleged Infringing Functionality | Complaint Citation | Patent Citation | 
|---|---|---|---|
| storing in memory... a plurality of secure containers of application software | The AWS EMP service creates a "package" that isolates an application and its dependencies from other applications on a server. | ¶15 | col. 2:41-45 | 
| each container comprising one or more of the executable applications and a set of associated system files | The EMP package is alleged to include "everything that the application needs to run on a modern operating system, including application files, runtimes, components, and deployment tools." | ¶15 | col. 2:23-29 | 
| the containers of application software excluding a kernel | The complaint alleges the EMP package "does not include the legacy operating system" and "does not contain any parts of the legacy operating system." | ¶15, p.6 | col. 2:35-36 | 
| some or all of the associated system files within a container... are utilized in place of the associated local system files | The EMP "redirection engine... intercepts the API calls that the application makes to the underlying Windows Server OS, and redirects them to the files and registry within the created package." | ¶15, p.6 | col. 3:41-48 | 
| each of the containers has a unique root file system that is different from an operating system's root file system | The complaint alleges the EMP package configuration includes "File, Registry, and Network redirections," which suggests the creation of a virtualized file and registry space separate from the host OS. | ¶15, p.6 | col. 17:58-61 | 
’058 Patent Infringement Allegations
| Claim Element (from Independent Claim 1) | Alleged Infringing Functionality | Complaint Citation | Patent Citation | 
|---|---|---|---|
| an operating system kernel having OS critical system elements (OSCSEs) for running in kernel mode | AWS ECS runs on Linux-based operating systems, such as Bottlerocket, which have a kernel that provides critical system services. | ¶25 | col. 2:6-9 | 
| a shared library having shared library critical system elements (SLCSES) stored therein for use by... applications in user mode | ECS containers are described as a "standardized unit... that holds everything that your software application requires to run. This includes relevant code, runtime, system tools, and system libraries." | p.10 | col. 2:10-14 | 
| wherein some of the SLCSEs... are functional replicas of OSCSEs | Bottlerocket is alleged to be a purpose-built OS that "only includes the minimum number of packages that's required to run containers," suggesting it provides user-mode versions of traditionally kernel-supplied services. | ¶25 | col. 9:48-51 | 
| wherein an instance of a SLCSE... is run in a context of said at least first... application without being shared | The isolation inherent in container technology, as described in the complaint, forms the basis for this allegation. The Prime Video case study notes ECS runs "secure, reliable, scalable, and highly fault-tolerant containers." | ¶15, p.6; ¶26, p.11 | col. 2:15-19 | 
| where at least a second... application... have use of a unique instance of a corresponding critical system element | ECS is a container orchestration service designed to run many different applications in separate containers simultaneously on the same host or cluster. | ¶25 | col. 2:19-21 | 
- Identified Points of Contention:- Scope Questions: For the '814 Patent, a dispute may arise over whether the AWS EMP "package" and its "redirection engine" meet the claim requirement of a "container" having a "unique root file system." Defendant may argue its redirection mechanism is technically distinct from creating a new root file system.
- Technical Questions: For the '058 Patent, a central issue may be whether the services provided within an ECS container, particularly on a minimal OS like Bottlerocket, are "functional replicas" of kernel services (OSCSEs). Defendant could argue its architecture is not a "replica" but an alternative design for providing services to containerized applications.
 
V. Key Claim Terms for Construction
’814 Patent: "secure container"
- The Term: "secure container"
- Context and Importance: This term defines the core inventive concept. The infringement case for the ’814 patent depends on whether the accused AWS EMP "package" qualifies as a "secure container."
- Intrinsic Evidence for Interpretation:- Evidence for a Broader Interpretation: The specification defines "container" broadly as "[a]n aggregate of files required to successfully execute a set of software applications" (’814 Patent, col. 2:23-26). This could support an argument that any self-contained application package falls within the scope.
- Evidence for a Narrower Interpretation: The patent defines a "secure application container" more specifically as an environment where "data within each application set is insulated from effects of other application sets" and where containers are "mutually exclusive" such that their internal files cannot be shared (’814 Patent, col. 2:41-45, 29-33). Defendant may argue that the accused EMP package does not meet this stricter standard of insulation.
 
’058 Patent: "functional replicas"
- The Term: "functional replicas"
- Context and Importance: This term is critical to distinguishing the invention from a system that simply uses different user-mode services. Plaintiff must establish that the user-mode services in ECS are "replicas" of kernel services. Practitioners may focus on this term because it appears to be the primary technical hurdle for proving infringement.
- Intrinsic Evidence for Interpretation:- Evidence for a Broader Interpretation: The specification suggests flexibility, stating that a replicated CSE is "not necessarily and preferably not an exact copy of a CSE in the operating system" and that it may "differ slightly from its counterpart in the OS" (’058 Patent, col. 2:1-3, col. 5:26-28). This supports a focus on similar functionality rather than identical implementation.
- Evidence for a Narrower Interpretation: The repeated use of "replica" and "replicated" could imply an act of copying or modeling functionality from the kernel, rather than developing a new, parallel service from scratch. Defendant may argue its container architecture is the latter and therefore does not create "replicas."
 
VI. Other Allegations
- Indirect Infringement: The complaint alleges that Defendant induces infringement of both patents by providing customers with documentation, user manuals, and online materials that instruct them on how to use the accused EMP and ECS services in an infringing manner (Compl. ¶18, 28).
- Willful Infringement: The complaint alleges willful infringement for the ’814 Patent, but not explicitly for the ’058 Patent in the prayer for relief (Prayer ¶b). The willfulness claim is supported by allegations of pre-suit knowledge based on: (1) a series of business and technical meetings between the parties from 2009-2021 where Plaintiff’s technology was allegedly demonstrated to Amazon; and (2) two separate instances in 2013 and 2020 where the USPTO cited the ’814 Patent against patent applications being prosecuted by Amazon (Compl. ¶12, 17).
VII. Analyst’s Conclusion: Key Questions for the Case
- A core issue will be one of technical equivalence: Does the "redirection engine" in Amazon's EMP service function in the same way as the claimed "secure container" with a "unique root file system" of the ’814 patent, or is there a fundamental mismatch in their technical operation?
- A second key issue will be one of architectural definition: Does Amazon's ECS and its purpose-built OS, Bottlerocket, implement "functional replicas" of kernel services as user-mode libraries as required by the ’058 patent, or does it represent a distinct, non-infringing architecture for containerization?
- A central evidentiary question for damages will be one of pre-suit knowledge and willfulness: What level of corporate knowledge can be established from the alleged meetings and, more significantly, from the USPTO’s citations of the ’814 patent against Amazon, and does Amazon's subsequent conduct constitute the objective recklessness required to prove willful infringement?