`
`Exhibit 14
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Case 3:17-cv-05659-WHA Document 126-18 Filed 06/28/18 Page 2 of 3
`Case 3:17-cv-05659-WHA Document 126-18 Filed 06/28/18 Page 2 of 3
`
`The statements and documentscited below are solely provided by way of example and based on
`information available to Finjan, Inc. at the time this chart was created, and not to be used by way of
`limitation or for purposes of construing the claim terms. Finjan reservesits right to supplementthis chart
`as additional information becomes known to it.
`
`For purposesof this chart, “Websense Products” refers to the following Websense applications or
`services: TRITON Products, Web Security Gateway Products, Data Security Products, the CyberSecurity
`Intelligence (“CSI”) Service, the ThreatSeekerIntelligence Cloud Service and TRITON®
`ThreatScope™. See http://www.websense.com/content/websense-products.aspx (explaining that while
`Websense appliances/products comein different forms or series, each Websenseproductis “built on the
`unified Websense TRITON®architecture, and use key Websense technologies including Websense ACE
`(Advanced Classification Engine) and the Websense ThreatSeeker® Intelligence Cloud.”’)
`
`the need for processors:
`
`a l
`
`a. A computer processor-_|Websense Products meet the recited claim language because they perform
`based method, comprising|a computer processor-based method, comprising the stepsof.
`the stepsof:
`
`By the wayof example, and notlimitation, Websense Products meet the
`recited claim language because Websense Products operate the TRITON
`architecture which is executed on a processor. Additionally, CSI and the
`ThreatSeekerIntelligence Cloud Service both require processors.
`
`This is demonstrated in Websense’s public documents and at
`
`http://www.websense.com/content/websense-triton-security-products.aspx
`
`and http://www.websense.com/content/support.aspx.
`
`For example, the following Release Notes for the TRITON Unified
`Security Center
`(http://www.websense.com/content/support/library/shared/v78/triton_rnote
`s/v78_triton_rn.pdfat p. 2) describes hardware requirements for Web
`Security, Data Security, and Email Security managers, whichall include
`
`FINJAN-JN 191524
`
`
`
`Case 3:17-cv-05659-WHA Document 126-18 Filed 06/28/18 Page 3 of 3
`Case 3:17-cv-05659-WHA Document 126-18 Filed 06/28/18 Page 3 of 3
`
`paaliaa
`
`Threat Severity: i Medium
`Aoatime 6
`ty
`an
`Malidous Web Sites
`
`Classification
`Pandit
`rae CEA arene
`
`Aasessment Overvirw
`The UAL anahred is currently is compromised to serve malicious content to visitors
`
`Mafcious Web Stes
`Malicious Web Sites
`Suggert
`a dtferert
`
`caaslf catic
`
`P Adaress
`Hosted Country
`Bytes Recehred
`
`207
`ates
`
`216.17.106.
`=
`1h
`
`HTTP Status Code
`Tratted 354 Certificate
`Wald SSL Certiticate
`
`200 Ot
`nia
`
`Realtime security cereification
`Mrwew the specific threat identified within the UALor (iackiness.
`
`Associated throat type
`Shows the actual name and type af the security threat
`Threat Name
`nyectaan Redirection Web Geneee
`
`Malicious code cetection
`Highlights the code associated with the threats found at the UAL or iP address
`
`‘Snow Suspicious
`
`Expand All
`
`Header Orly
`
`$onpts Only
`
`iframes Only
`
`Collapse Al
`
`&<herl aelns=“http: //ww.wd.0rg/1999/xhtl “>
`=<head profile="http://gnpg.org/xfn/1l">
`<meta http-equiv="Content-Type” content="text/html; charset=UTF-B" />
`|-<title>JENNYS G</Title>
`| <meta name="generator” content="wordPress 2.1.2" />
`}<t-- leave this for stats -->
`|<link rel="alternate” type=“application/rss+orl” titles"R5s 2.0" href="http://ww, jennylee)
`@® .con/?feed=arss2" />
`rss”
`/>
`ALi pasearn type="text/xml" title="KSs5 .92" href="htrp://wew. jenny .com/7fe
`<link rele"alternare" rynee“annlicarion/arosawnl" ritles"ate 0 4" hrefe"hten: //wew dennvhan
`
`containing PDFs, obfuscated JavaScript and drive-by downloads. This is demonstrated in Websense’s public documents andat
`
`To the extent that Websense contendsthatit does notliterally infringe this
`claim, Websense infringes underthe doctrine of equivalents. The above
`described functionality of Websenseis at most insubstantially different
`from the claimed functionality and performs the same function in the same
`way to achieve the same result. Once Finjan receives non-infringement
`positions, if any, Finjan may supplementits disclosure. In addition, Finjan
`may supplementits disclosure once it receives Websense’s production of
`documents with relevant and non-public information, particularly related to
`its source code.
`Claim0
`10a. A system for
`WebsenseProducts meet the recited claim language because they contain a
`managing Downloadables,|system for managing Downloadables.
`comprising:
`
`By the way of example, and not limitation, Websense Products meet the
`recited claim language because Websense Products operate the TRITON
`architecture which is a system for managing downloadables.
`Additionally, CSI and the ThreatSeekerIntelligence Cloud Service are
`systems for managing downloadables, including suspicious web content
`
`17
`
`FINJAN-JN 191540
`
`