throbber
Case 3:17-cv-05659-WHA Document 126-18 Filed 06/28/18 Page 1 of 3
`
`Exhibit 14
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`

`

`Case 3:17-cv-05659-WHA Document 126-18 Filed 06/28/18 Page 2 of 3
`Case 3:17-cv-05659-WHA Document 126-18 Filed 06/28/18 Page 2 of 3
`
`The statements and documentscited below are solely provided by way of example and based on
`information available to Finjan, Inc. at the time this chart was created, and not to be used by way of
`limitation or for purposes of construing the claim terms. Finjan reservesits right to supplementthis chart
`as additional information becomes known to it.
`
`For purposesof this chart, “Websense Products” refers to the following Websense applications or
`services: TRITON Products, Web Security Gateway Products, Data Security Products, the CyberSecurity
`Intelligence (“CSI”) Service, the ThreatSeekerIntelligence Cloud Service and TRITON®
`ThreatScope™. See http://www.websense.com/content/websense-products.aspx (explaining that while
`Websense appliances/products comein different forms or series, each Websenseproductis “built on the
`unified Websense TRITON®architecture, and use key Websense technologies including Websense ACE
`(Advanced Classification Engine) and the Websense ThreatSeeker® Intelligence Cloud.”’)
`
`the need for processors:
`
`a l
`
`a. A computer processor-_|Websense Products meet the recited claim language because they perform
`based method, comprising|a computer processor-based method, comprising the stepsof.
`the stepsof:
`
`By the wayof example, and notlimitation, Websense Products meet the
`recited claim language because Websense Products operate the TRITON
`architecture which is executed on a processor. Additionally, CSI and the
`ThreatSeekerIntelligence Cloud Service both require processors.
`
`This is demonstrated in Websense’s public documents and at
`
`http://www.websense.com/content/websense-triton-security-products.aspx
`
`and http://www.websense.com/content/support.aspx.
`
`For example, the following Release Notes for the TRITON Unified
`Security Center
`(http://www.websense.com/content/support/library/shared/v78/triton_rnote
`s/v78_triton_rn.pdfat p. 2) describes hardware requirements for Web
`Security, Data Security, and Email Security managers, whichall include
`
`FINJAN-JN 191524
`
`

`

`Case 3:17-cv-05659-WHA Document 126-18 Filed 06/28/18 Page 3 of 3
`Case 3:17-cv-05659-WHA Document 126-18 Filed 06/28/18 Page 3 of 3
`
`paaliaa
`
`Threat Severity: i Medium
`Aoatime 6
`ty
`an
`Malidous Web Sites
`
`Classification
`Pandit
`rae CEA arene
`
`Aasessment Overvirw
`The UAL anahred is currently is compromised to serve malicious content to visitors
`
`Mafcious Web Stes
`Malicious Web Sites
`Suggert
`a dtferert
`
`caaslf catic
`
`P Adaress
`Hosted Country
`Bytes Recehred
`
`207
`ates
`
`216.17.106.
`=
`1h
`
`HTTP Status Code
`Tratted 354 Certificate
`Wald SSL Certiticate
`
`200 Ot
`nia
`
`Realtime security cereification
`Mrwew the specific threat identified within the UALor (iackiness.
`
`Associated throat type
`Shows the actual name and type af the security threat
`Threat Name
`nyectaan Redirection Web Geneee
`
`Malicious code cetection
`Highlights the code associated with the threats found at the UAL or iP address
`
`‘Snow Suspicious
`
`Expand All
`
`Header Orly
`
`$onpts Only
`
`iframes Only
`
`Collapse Al
`
`&<herl aelns=“http: //ww.wd.0rg/1999/xhtl “>
`=<head profile="http://gnpg.org/xfn/1l">
`<meta http-equiv="Content-Type” content="text/html; charset=UTF-B" />
`|-<title>JENNYS G</Title>
`| <meta name="generator” content="wordPress 2.1.2" />
`}<t-- leave this for stats -->
`|<link rel="alternate” type=“application/rss+orl” titles"R5s 2.0" href="http://ww, jennylee)
`@® .con/?feed=arss2" />
`rss”
`/>
`ALi pasearn type="text/xml" title="KSs5 .92" href="htrp://wew. jenny .com/7fe
`<link rele"alternare" rynee“annlicarion/arosawnl" ritles"ate 0 4" hrefe"hten: //wew dennvhan
`
`containing PDFs, obfuscated JavaScript and drive-by downloads. This is demonstrated in Websense’s public documents andat
`
`To the extent that Websense contendsthatit does notliterally infringe this
`claim, Websense infringes underthe doctrine of equivalents. The above
`described functionality of Websenseis at most insubstantially different
`from the claimed functionality and performs the same function in the same
`way to achieve the same result. Once Finjan receives non-infringement
`positions, if any, Finjan may supplementits disclosure. In addition, Finjan
`may supplementits disclosure once it receives Websense’s production of
`documents with relevant and non-public information, particularly related to
`its source code.
`Claim0
`10a. A system for
`WebsenseProducts meet the recited claim language because they contain a
`managing Downloadables,|system for managing Downloadables.
`comprising:
`
`By the way of example, and not limitation, Websense Products meet the
`recited claim language because Websense Products operate the TRITON
`architecture which is a system for managing downloadables.
`Additionally, CSI and the ThreatSeekerIntelligence Cloud Service are
`systems for managing downloadables, including suspicious web content
`
`17
`
`FINJAN-JN 191540
`
`

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket