throbber
Case 3:17-cv-05659-WHA Document 129 Filed 06/28/18 Page 1 of 49
`
`
`
`PAUL ANDRE (State Bar No. 196585)
`pandre@kramerlevin.com
`LISA KOBIALKA (State Bar No. 191404)
`lkobialka@kramerlevin.com
`JAMES HANNAH (State Bar No. 237978)
`jhannah@kramerlevin.com
`KRISTOPHER KASTENS (State Bar No. 254797)
`kkastens@kramerlevin.com
`KRAMER LEVIN NAFTALIS & FRANKEL LLP
`990 Marsh Road
`Menlo Park, CA 94025
`Telephone: (650) 752-1700
`Facsimile: (650) 752-1800
`
`Attorneys for Plaintiff
`FINJAN, INC.
`
`
`IN THE UNITED STATES DISTRICT COURT
`
`FOR THE NORTHERN DISTRICT OF CALIFORNIA
`
`SAN FRANCISCO DIVISION
`
`FINJAN, INC., a Delaware Corporation,
`
`
`
`
`
`
`Plaintiff,
`
`v.
`
`
`JUNIPER NETWORKS, INC., a Delaware
`Corporation,
`
`
`Defendant.
`
`
`
`Case No.: 3:17-cv-05659-WHA
`
`PLAINTIFF FINJAN, INC.’S OPPOSITION
`TO DEFENDANT JUNIPER NETWORKS,
`INC.’S MOTION FOR SUMMARY
`JUDGMENT
`
`Date:
`Time:
`Courtroom:
`Before:
`
`
`July 26, 2018
`8:00 a.m.
`Courtroom 12, 19th Floor
`Hon. William Alsup
`
`
`
`
`
`
`
`REDACTED VERSION OF DOCUMENT SOUGHT TO BE SEALED
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`
`
`FINJAN’S OPPOSITION TO JUNIPER’S
`MOTION FOR SUMMARY JUDGMENT
`
`
`
`CASE NO. 3:17-cv-05659-WHA
`
`

`

`Case 3:17-cv-05659-WHA Document 129 Filed 06/28/18 Page 2 of 49
`
`
`
`STATEMENT OF THE ISSUES TO BE DECIDED
`
`Should the Court deny Juniper’s motion for summary judgment because Claim 1 of
`1.
`U.S. Patent No. 6,804,780 (the “‘780 Patent”)1 is patent eligible?
`Due to Juniper’s infringement of Claim 1 of the ’780 Patent, are there issues of material
`2.
`fact that require Juniper’s Motion for Summary Judgment be denied?
`Are there undisputed facts that require the Court to deny Juniper’s Motion for Summary
`3.
`
`Judgment seeking to improperly limit damages for infringement of Claim 1 of the ‘780 Patent under
`
`35 U.S.C. § 287?
`
`
`1 Dkt. No. 96-5, Exhibit 1 to the Declaration of Rebecca Carson in Support of Juniper’s Motion for
`Summary Judgment (“Carson Decl.”).
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`
`
`FINJAN’S OPPOSITION TO JUNIPER’S
`MOTION FOR SUMMARY JUDGMENT
`
`i
`
`CASE NO. 3:17-cv-05659-WHA
`
`

`

`Case 3:17-cv-05659-WHA Document 129 Filed 06/28/18 Page 3 of 49
`
`
`
`TABLE OF CONTENTS
`
`STATEMENT OF THE ISSUES TO BE DECIDED................................................................................ i
`
`I.
`
`INTRODUCTION ............................................................................................................................ 1
`
`II. BACKGROUND .............................................................................................................................. 1
`
`A.
`
`B.
`
`C.
`
`D.
`
`Overview of the ‘780 Patent and The Elements of Claim 1 ............................................. 1
`
`Benefits of the ‘780 Patent ................................................................................................ 2
`
`Cases ‘780 Patent Found Infringed ................................................................................... 4
`
`Overview of Juniper’s Accused Products ......................................................................... 4
`
`1.
`
`2.
`
`SRX Gateways ...................................................................................................... 4
`
`Sky ATP ................................................................................................................ 5
`
`III. CLAIM CONSTRUCTION .............................................................................................................. 6
`
`A.
`
`B.
`
`C.
`
`Software Components Required to be Executed by the Downloadable ........................... 7
`
`Fetching at least One Software Component Identified by the One or More
`References ......................................................................................................................... 9
`
`Performing a Hashing Function on the Downloadable and the Fetched Software
`Components to Generate a Downloadable ID ................................................................ 12
`
`IV.
`
`The SRX Gateways with Sky ATP Infringe Claim 1 of the ‘780 Patent .................................... 14
`
`A.
`
`B.
`
`C.
`
`D.
`
`Preamble – “A computer-based method for generating a Downloadable ID to
`identify a Downloadable, comprising:” .......................................................................... 15
`
`Element 1(a) – “obtaining a Downloadable that includes one or more references
`to software components required to be executed by the Downloadable” ....................... 16
`
`Element 1(b) – “fetching at least one software component identified by the one
`or more references” ......................................................................................................... 17
`
`1.
`
`Doctrine of Equivalents ...................................................................................... 19
`
`Element 1(c) – “performing a hashing function on the Downloadable and the
`fetched software components to generate a Downloadable ID” ..................................... 20
`
`1.
`
`Juniper’s Non-Infringement Arguments ............................................................. 21
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`
`
`FINJAN’S OPPOSITION TO JUNIPER’S
`MOTION FOR SUMMARY JUDGMENT
`
`i
`
`CASE NO. 3:17-cv-05659-WHA
`
`

`

`Case 3:17-cv-05659-WHA Document 129 Filed 06/28/18 Page 4 of 49
`
`
`
`V. Claim 1 Is Eligible Under 35 U.S.C. § 101 .................................................................................... 23
`
`A.
`
`Claim 1 Is Directed to a Non-Abstract Idea .................................................................... 24
`
`1.
`
`The ’780 Patent Is Directed To Improvements In Computer
`Functionality. ...................................................................................................... 24
`
`a.
`
`b.
`
`Claim 1 Recites Specific, Concrete Steps. .............................................. 26
`
`Juniper’s Arguments Mischaracterize the Invention of Claim 1. ........... 27
`
`B.
`
`C.
`
`Claim 1 Contains Inventive Concepts............................................................................. 31
`
`Questions of Material Fact Preclude Juniper’s Section 101 Challenge of Claim 1 ........ 32
`
`Finjan Complied with 35 U.S.C. § 287 and Is Entitled to Pre-Suit Damages ............................ 33
`
`
`
`VI.
`
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`
`
`FINJAN’S OPPOSITION TO JUNIPER’S
`MOTION FOR SUMMARY JUDGMENT
`
`ii
`
`CASE NO. 3:17-cv-05659-WHA
`
`

`

`Case 3:17-cv-05659-WHA Document 129 Filed 06/28/18 Page 5 of 49
`
`
`
`TABLE OF AUTHORITIES
`
`
`
`Page(s)
`
`Federal Cases
`
`24/7 Customer, Inc. v. LivePerson, Inc.,
`No. 15-CV-02897-JST, 2017 WL 2311272 (N.D. Cal. May 25, 2017) ........................................... 27
`
`Aatrix Software, Inc. v. Green Shades Software, Inc.,
`882 F.3d 1121 (Fed. Cir. 2018)......................................................................................................... 32
`
`Accent Packaging, Inc. v. Leggett & Platt, Inc.,
`707 F.3d 1318 (Fed. Cir. 2013)..................................................................................................... 8, 10
`
`Alice Corp. v. CLS Bank Int'l,
`134 S.Ct. 2347 (2014) ..................................................................................................... 23, 24, 26, 27
`
`Amdocs (Israel) Ltd. v. Openet Telecom, Inc.,
`841 F.3d 1288 (Fed. Cir. 2016)......................................................................................................... 31
`
`Anderson v. Liberty Lobby, Inc.,
`477 U.S. 242 (1986) .......................................................................................................................... 15
`
`Arctic Cat Inc. v. Bombardier Recreational Prod. Inc.,
`876 F.3d 1350 (Fed. Cir. 2017)................................................................................................... 38, 39
`
`Arthrex, Inc. v. Smith & Nephew, Inc.,
`Case No. 15-cv-1047-RSP, Dkt. No. 275 (E.D. Tex. Nov. 29, 2016) .............................................. 36
`
`Bascom Global Internet Servs., Inc. v. AT&T Mobility LLC,
`827 F.3d 1341 (Fed. Cir. 2016)............................................................................................. 23, 31, 32
`
`Berkheimer v. HP Inc.,
`881 F.3d 1360 (Fed. Cir. 2018)............................................................................................. 23, 32, 33
`
`Blitzsafe Texas, LLC v. Honda Motor Co., Ltd.,
`No. 2:15-cv-1274-JRG-RSP, 2017 U.S. Dist. LEXIS 58358
`(E.D. Tex. Jan. 26, 2017) ............................................................................................................ 39, 40
`
`Bradford Co. v. Jefferson Smurfit Corp.,
`No. 2000-1511, 2001 WL 35738792 (Fed. Cir. Oct. 31, 2001).................................................. 33, 34
`
`Brocade Commc’n Sys., Inc. v. A10 Networks, Inc.,
`873 F. Supp. 2d 1192 (N.D. Cal. 2012) ............................................................................................ 15
`
`Content Extraction Transmission LLC v Wells Fargo Bank, Nat’l Ass’n,
`776 F.3d 1343 (Fed. Cir. 2014)......................................................................................................... 28
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`
`
`FINJAN’S OPPOSITION TO JUNIPER’S
`MOTION FOR SUMMARY JUDGMENT
`
`iii
`
`CASE NO. 3:17-cv-05659-WHA
`
`

`

`Case 3:17-cv-05659-WHA Document 129 Filed 06/28/18 Page 6 of 49
`
`
`
`Crown Packaging Tech., Inc. v. Rexam Beverage Can Co.,
`559 F.3d 1308 (Fed. Cir. 2009)......................................................................................................... 38
`
`DDR Holdings, LLC v. Hotels.com, L.P.,
`773 F.3d 1245 (Fed. Cir. 2014)................................................................................................... 26, 30
`
`Elec. Power Group, LLC v. Alstom S.A.,
`830 F.3d 1350 (Fed. Cir. 2016)......................................................................................................... 28
`
`Enfish, LLC v. Microsoft Corp.,
`822 F.3d 1327 (Fed. Cir. 2016)................................................................................................... 26, 30
`
`Exergen Corp. v. Kaz USA, Inc.,
`No. 2016-2315, 2018 WL 1193529 (Fed. Cir. 2018) ................................................................. 32, 33
`
`Finjan, Inc. v. Blue Coat Sys., Inc.,
`879 F.3d 1299 (Fed. Cir. 2018).................................................................................................. passim
`
`Finjan, Inc. v. Blue Coat Sys., Inc.,
`No. 13-cv-03999-BLF, 2016 WL 3880774 (N.D. Cal. July 18, 2016) ...................................... passim
`
`Finjan, Inc. v. Blue Coat Systems, Inc.,
`No. 13-cv-03999-BLF, 2014 WL 5361976 (N.D. Cal. Oct. 20, 2014)............................................. 12
`
`Finjan, Inc. v. Blue Coat Systems, Inc.,
`No. 13-cv-03999-BLF, 2015 WL 3630000 (N.D. Cal. June 2, 2015) .............................................. 14
`
`Finjan, Inc. v. ESET, LLC,
`No. 17-cv-00183-CAB-(BGS), 2017 WL 5501338 (S.D. Cal. Nov. 14, 2017) ............................... 12
`
`Finjan, Inc. v. Secure Computing Corp.,
`No. 06-369 GMS, 2008 WL 9878538 (D. Del. Mar. 12, 2008) ......................................................... 4
`
`Finjan, Inc. v. Secure Computing Corp.,
`No. 06-369 (GMS), Dkt. No. 142 (D. Del. Dec. 11, 2007) .............................................................. 12
`
`Finjan, Inc. v. Sophos, Inc.,
`244 F. Supp. 3d 1016 (N.D. Cal. 2017) ........................................................................................ 4, 14
`
`Finjan, Inc. v. Symantec Corp.,
`No. 14-cv-02998-HSG, 2017 WL 550453 (N.D. Cal. Feb. 10, 2017) ........................................ 12, 13
`
`Gart v. Logitech, Inc.,
`254 F.3d 1334 (Fed. Cir. 2001)................................................................................................... 34, 37
`
`Info-Hold, Inc. v. Applied Media Techs. Corp.,
`783 F.3d 1262 (Fed. Cir. 2015)......................................................................................................... 13
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`
`
`FINJAN’S OPPOSITION TO JUNIPER’S
`MOTION FOR SUMMARY JUDGMENT
`
`iv
`
`CASE NO. 3:17-cv-05659-WHA
`
`

`

`Case 3:17-cv-05659-WHA Document 129 Filed 06/28/18 Page 7 of 49
`
`
`
`Intellectual Ventures I LLC v. Capital One Financial Corp.,
`850 F.3d 1332 (Fed. Cir. 2017)......................................................................................................... 28
`
`Intellectual Ventures I LLC v. Erie Indemnity Co.,
`200 F. Supp. 3d 565 (W.D. Penn. 2016) ........................................................................................... 28
`
`Intellectual Ventures I LLC v. Symantec Corp.,
`100 F. Supp. 3d 371 (D. Del. 2015) ............................................................................................ 29, 30
`
`Intellectual Ventures I LLC v. Symantec Corp,
`838 F.3d 1307 (Fed. Cir. 2016)......................................................................................................... 30
`
`Landmark Tech. LLC v. Assurant, Inc.,
`No. 15-cv-76-RWS-SDL, 2015 WL 4388311 (E.D. Tex. July 14, 2015) ........................................ 29
`
`McRO, Inc. v. Bandai Namco Games Am. Inc.,
`837 F.3d 1299 (Fed. Cir. 2016)......................................................................................................... 26
`
`Oatey Co. v. IPS Corp.,
`514 F.3d 1271 (Fed. Cir. 2008)......................................................................................................... 13
`
`On-Line Techs., Inc. v. Bodenseewerk Perkin-Elmer GmbH,
`386 F.3d 1133, 1138 (Fed. Cir. 2004)................................................................................................. 8
`
`Palo Alto Networks, Inc. v. Finjan, Inc.,
`Case IPR2016-00165, Paper No. 7 (P.T.A.B. April 21, 2016) .................................................. passim
`
`Phillips v. AWH Corp.,
`415 F.3d 1303 (Fed. Cir. 2005)........................................................................................................... 8
`
`Realtime Data, LLC, v. Actian Corp.,
`No. 15-cv-463 RWS-JDL, 2017 U.S. Dist. LEXIS 56950 (E.D. Tex. April 4, 2017) ................ 39, 40
`
`RecogniCorp, LLC v. Nintendo Co.,
`855 F.3d 1322 (Fed. Cir. 2017)......................................................................................................... 30
`
`SAS Inst., Inc. v. ComplementSoft, LLC,
`825 F.3d 1341 (Fed. Cir. 2016)........................................................................................................... 8
`
`SRI Int’l v. Matsushita Elec. Corp. of Am.,
`775 F.2d 1107 (Fed. Cir. 1985)......................................................................................................... 19
`
`Symantec Corp. v. Zscaler, Inc.,
`No. 17-cv-04426-JST, 2018 WL 1456678 (N.D. Cal. Mar. 23, 2018) ....................................... 29, 31
`
`Tech. Props. Ltd. v. Huawei Techs. Co.,
`849 F.3d 1349 (Fed. Cir. 2017)......................................................................................................... 10
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`
`
`FINJAN’S OPPOSITION TO JUNIPER’S
`MOTION FOR SUMMARY JUDGMENT
`
`v
`
`CASE NO. 3:17-cv-05659-WHA
`
`

`

`Case 3:17-cv-05659-WHA Document 129 Filed 06/28/18 Page 8 of 49
`
`
`
`Tessenderlo Kerley, Inc. v. Or-Cal, Inc.,
`No. C 11-04100 WHA, 2012 WL 2054994 (N.D. Cal. June 5, 2012).............................................. 34
`
`Thales Visionix Inc. v. United States,
`850 F.3d 1343 (Fed. Cir. 2017)................................................................................................... 27, 30
`
`Trading Techs. Int'l, Inc. v. CQG, Inc.,
`675 F. App’x 1001 (Fed. Cir. 2017) ..................................................................................... 23, 26, 30
`
`Tranxition, Inc. v. Lenovo (U.S.) Inc.,
`No. 12-xc-01065-HZ, 2015 WL 4203469 (D. Ore. July 9, 2015) .................................................... 29
`
`Wine Ry. Appliance Co. v. Enter. Ry. Equip. Co.,
`297 U.S. 387 (1936) .......................................................................................................................... 40
`
`Federal Statutes
`
`35 U.S.C. § 101 ........................................................................................................................... 23, 32, 33
`
`35 U.S.C. § 287 ................................................................................................................................. 33, 38
`
`Other Authorities
`
`Federal Rule of Civil Procedure Rule 56 .......................................................................................... 33, 34
`
`Federal Rules of Evidence Rule 408 ....................................................................................................... 38
`
`
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`
`
`FINJAN’S OPPOSITION TO JUNIPER’S
`MOTION FOR SUMMARY JUDGMENT
`
`vi
`
`CASE NO. 3:17-cv-05659-WHA
`
`

`

`Case 3:17-cv-05659-WHA Document 129 Filed 06/28/18 Page 9 of 49
`
`
`
`I.
`
`INTRODUCTION
`Juniper’s Motion for Summary Judgment (“Motion”) should be denied because Juniper infringes
`
`patent eligible Claim 1 of the ‘780 Patent (“Claim 1”) and there are material issues of fact in dispute.
`
`Juniper infringes Claim 1 because its SRX Gateways, when used with Sky ATP, obtain Downloadables
`
`with references to “dropped” software components that are submitted to Sky ATP; Sky ATP performs
`
`dynamic analysis on the Downloadable, in which it fetches referenced dropped components; and Sky
`
`ATP creates a Downloadable ID in the security profile generated for the Downloadable, which includes
`
`a hash of the Downloadable together with its dropped software components.
`
`Juniper’s non-infringement arguments should be rejected because they rely on rewriting the
`
`language of Claim 1 in a manner that is contrary to the intrinsic record and the laws of claim
`
`construction. In fact, many of Juniper’s arguments are incompatible with the specification of the ‘780
`
`Patent and the stated purpose of the invention. Furthermore, even if Juniper’s claim constructions are
`
`adopted, there are still issues of fact that cannot be resolved on summary judgement. Juniper’s
`
`argument that Claim 1 is patent ineligible is without merit because Finjan’s pioneering technology is
`
`directed to improving computer functionality and Claim 1 recites specific steps showing how to
`
`accomplish the improvements. The ordered combination of Claim 1’s elements also provides an
`
`inventive concept, making it further patent eligible. Finally, Juniper’s damages argument is a tacit
`
`admission of infringement and a red herring because Finjan provided Juniper with actual notice of the
`
`‘780 Patent well before filing its complaint. Juniper’s attempts to suggest otherwise undercut its
`
`credibility, given the parties’ ongoing discussions about licensing Finjan’s Patents.
`
`II.
`
`BACKGROUND
`
`A.
`Overview of the ‘780 Patent and The Elements of Claim 1
`
`The ’780 Patent describes protecting computer systems against a brand new class of threats that
`
`were never thought to be harmful, specifically “Downloadables,” which are executable application
`
`programs that are downloaded from a remote server and run on a destination computer. Dkt. No. 96-5,
`
`‘780 Patent, Col. 1, ll. 36-63 (“However, these [prior art] security systems are not configured to
`
`recognize computer viruses which have been attached to or configured as Downloadable application
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`
`
`FINJAN’S OPPOSITION TO JUNIPER’S
`MOTION FOR SUMMARY JUDGMENT
`
`1
`
`CASE NO. 3:17-cv-05659-WHA
`
`

`

`Case 3:17-cv-05659-WHA Document 129 Filed 06/28/18 Page 10 of 49
`
`
`
`programs, commonly referred to as ‘Downloadables.’ A Downloadable is an executable application
`
`program downloaded from a source computer and run on the destination computer … Therefore, a
`
`system and method are needed to protect a network from hostile Downloadables.”). A Downloadable
`
`may identify various software components that are called during execution. Declaration of Michael
`
`Mitzenmacher in Support of Finjan’s Opposition to Juniper’s Motion for Summary Judgment (“Mitz.
`
`Decl.”) filed herewith, ¶ 19; ‘780 Patent, Abstract.
`
`Claim 1 specifically provides how to process these new types of threats to create an “ID” for
`
`them. This claim recites obtaining a “Downloadable” with references to software components,
`
`fetching software components for the Downloadable, and using a hash function to create a
`Downloadable ID for the Downloadable and its components. ‘780 Patent, Claim 1.2 This
`Downloadable ID can then be used to quickly determine whether subsequent Downloadables are a
`
`threat, which was a paradigm shift from conventional thinking at the time as there was no technology
`
`that could analyze Downloadables, much less generate an ID to prevent them from infecting a
`
`computer. Mitz. Decl., ¶¶ 18, 26-27.
`
`As described in the specification of the ‘780 Patent, a Downloadable ID should not only be
`
`generated for the Downloadable itself, but for other components as well. Otherwise, there is a risk that
`
`a required software component could be modified without the security system recognizing that a
`
`change had occurred, leaving the system vulnerable to attack. ‘780 Patent, Col. 4, ll. 61-66; Mitz
`
`Decl., ¶ 19. The ‘780 Patent describes how such a Downloadable ID will “hash” all or part of the
`
`Downloadable and its components to create this Downloadable ID. ‘780 Patent, Claim 1 (“at least one
`
`software component”) and Claim 8 (“fetching all software components”); Mitz. Decl., ¶¶ 18-19.
`
`Benefits of the ‘780 Patent
`B.
`
`The ‘780 Patent is part of Finjan’s pioneering technology related to protecting computers from
`
`Downloadables. The ‘780 Patent provides benefits to this system beyond what existed at the time
`
`because it specially addressed Downloadables, which was a new concept at the time the ‘780 Patent
`
`
`2 A hashing function is a particular function that is applied to data. Mitz. Decl., ¶ 20. It has many
`uses, but the ‘780 Patent uses a hash to create an identifier (or “ID”) for a Downloadable. Id.
`2
`
`FINJAN’S OPPOSITION TO JUNIPER’S
`MOTION FOR SUMMARY JUDGMENT
`
`CASE NO. 3:17-cv-05659-WHA
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`
`
`

`

`Case 3:17-cv-05659-WHA Document 129 Filed 06/28/18 Page 11 of 49
`
`
`
`was filed. Mitz. Decl., ¶¶ 26-27. The ‘780 Patent describes the benefits of generating a Downloadable
`
`ID for a Downloadable and its referenced components in the patent description, which include
`
`allowing the network security system to avoid expensive analysis operations for Downloadables that
`
`have been analyzed previously. Mitz. Decl., ¶ 27. A Downloadable ID achieves this efficiency by
`
`enabling the security system to allow or block the Downloadable without having to perform another
`
`analysis because the Downloadable ID can be used to determine if that Downloadable has already been
`
`processed by the security system. Mitz. Decl., ¶ 27; see also, e.g., ’780 Patent, Col. 8, ll. 7-20. In
`
`particular, the ‘780 Patent describes how a security system uses the “Downloadable ID of the incoming
`
`Downloadable to determine whether to allow the Downloadable . . . .” ‘780 Patent, Col. 8, 9-11.
`
`Furthermore, the security system uses the “the Downloadable ID of the incoming Downloadable for
`
`determining whether to block the Downloadable . . . .” Id., Col. 8, ll. 14-17. The benefits of the ‘780
`
`Patent was particularly important for Finjan’s new behavioral-based technology, which required more
`
`computational resources than traditional virus scanning, but in turn, provided greater security through
`
`its novel ability to protect against this new threat called Downloadables. ‘780 Patent, Col. 2, ll. 36-43;
`
`Mitz. Decl., ¶ 27. The ‘780 Patent increased security and provided drastic efficiency gains by not
`
`requiring the same file to be analyzed multiple times. Mitz. Decl., ¶¶ 26-27.
`
`Furthermore, virus scanning at the time the ‘780 Patent was filed was focused on “signature
`
`matching,” where a set of signatures was matched against a file. Mitz. Decl., ¶ 27. For traditional
`
`signature matching at the time, the signature scanner would match signatures on every file and it was
`
`not necessary to create an ID for a Downloadable. Mitz. Decl., ¶ 27. Thus, if the file was going to be
`
`signature scanned every time, there was no need to take the extra step of generating a separate
`
`Downloadable ID. Mitz. Decl., ¶ 27. The significant drawback, however, was that traditional
`
`signature scanning was unable to protect against Downloadables because these types of files can
`
`execute on a computer without the user’s knowledge and before the system could scan the file. ‘780
`
`Patent, Col 1, 43-63; Mitz. Decl., ¶ 27. Therefore, the ‘780 Patent’s Downloadable IDs enabled
`
`computers to identify Downloadables without the need to reanalyze them, which is computationally
`
`intensive, especially at the time of the invention in the late 1990’s. Mitz. Decl., ¶ 27.
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`
`
`FINJAN’S OPPOSITION TO JUNIPER’S
`MOTION FOR SUMMARY JUDGMENT
`
`3
`
`CASE NO. 3:17-cv-05659-WHA
`
`

`

`Case 3:17-cv-05659-WHA Document 129 Filed 06/28/18 Page 12 of 49
`
`
`
`C.
`Cases ‘780 Patent Found Infringed
`
`Finjan asserted the ‘780 Patent in three jury trials against products similar to Juniper’s accused
`
`products, and each time, the jury found in Finjan’s favor, with infringement upheld during all post-trial
`
`motions or appeals. In 2008, Secure Computing was found to infringe Claims 1-6, 9-14, and 18 of the
`
`‘780 Patent through its gateway product. Finjan, Inc. v. Secure Computing Corp., No. 06-369 GMS,
`
`2008 WL 9878538 (D. Del. Mar. 12, 2008). In 2015, the combination of Blue Coat’s ProxySG and
`
`ProxyAV products infringed Claims 9 and 13 of the ‘780 Patent when it generated hash values for
`
`downloaded files, including webpages (which are HTML) with referenced software components
`
`(which included JavaScript). Finjan, Inc. v. Blue Coat Sys., Inc., No. 13-cv-03999-BLF, 2016 WL
`
`3880774, at *9 (N.D. Cal. July 18, 2016). The Court upheld this verdict in post-trial motions and the
`
`decision was not appealed. Id. at *18. In 2016, Sophos was found to infringe Claims 9 and 18 of the
`
`‘780 Patent through its gateway product in part because “Sophos’ products fetch ‘dropped’ files….”
`
`Finjan, Inc. v. Sophos, Inc., 244 F. Supp. 3d 1016, 1050 (N.D. Cal. 2017).
`
`D.
`
`
`Overview of Juniper’s Accused Products
`
`SRX Gateways
`1.
`The SRX Gateways are network appliances and software that operate to protect computer on a
`network from receiving malicious content. Ex. 1,3 FINJAN-JN 005221. For example, a company can
`have an SRX Gateway in its network and when an employee of that company uses its computer to try
`
`and download a file, that SRX Gateway determines what to do with the file. Id. As part of this
`
`process, the SRX Gateway creates an identifier for the files that are being downloaded to perform
`
`security checks on that file. Ex. 2, JNPR-FNJN_29017_00552580. The SRX Gateway will perform
`
`an analysis on the file to determine if it is of a Downloadable type that the system should analyze (like
`
`HTML, Microsoft Documents, or EXE files). Dkt. No. 96-7 at 3. The SRX Gateway sends the entire
`
`file received for analysis in Sky ATP. Mitz. Decl., ¶ 43. To do this, the SRX Gateways “extract[]
`
`potentially malicious objects and files and send[] them to the cloud [Sky ATP] for analysis.” Mitz.
`
`
`3 All “Ex. __” references herein are to the Declaration of Kristopher Kastens in Support of Finjan’s
`Opposition to Juniper’s Motion for Summary Judgment (“Kastens Opp. Decl.”) filed herewith unless
`otherwise noted.
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`
`
`FINJAN’S OPPOSITION TO JUNIPER’S
`MOTION FOR SUMMARY JUDGMENT
`
`4
`
`CASE NO. 3:17-cv-05659-WHA
`
`

`

`Case 3:17-cv-05659-WHA Document 129 Filed 06/28/18 Page 13 of 49
`
`
`
`Decl., ¶ 43; Ex. 3, FINJAN-JN 005246 at 265.
`2.
`
`Sky ATP
`
`
`
`
`
`
`
` Sky ATP addressed this issue by scanning files with
`
`its “Malware Analysis Pipeline” of technologies to create a Downloadable security profile for the
`
`Downloadable. Mitz. Decl., ¶ 44; Dkt. No. 98-13 at FINJAN-JN 005438 at 38-39 (describing the Sky
`
`ATP “pipeline analysis”); Dkt. No. 97-17 at JNPR-FNJN_29017_00552807 (describing sample
`
`malware analysis processing pipeline). The SRX Gateways extract content from an incoming stream
`
`of a Downloadable and submits the file to Sky ATP for analysis. Mitz. Decl., ¶ 43; Ex. 3, FINJAN-JN
`
`005246 at 5266.
`
`The Malware Analysis Pipeline in Sky ATP scans the Downloadable using dynamic analysis,
`
`which runs the Downloadable in a sandbox and scans the file to see if the file performs any suspicious
`
`activity. Mitz. Decl., ¶ 45. The Malware Analysis Pipeline uses “dynamic analysis,” which is “often
`
`called sandboxing,” which studies a file “as it is executed in a secure environment.” Dkt. No. 98-14,
`
`FINJAN-JN 044744 at 63. This type of dynamic analysis is called sandboxing because, like a sandbox
`
`can limit children to a specific protected location, dynamic analysis limits a Downloadable to running
`
`in a protected environment to scan for the operations it performs. Mitz. Decl., ¶ 45. In doing so, Sky
`
`ATP will actually run the file in a “virtual” system or “sandbox” (i.e., a fake system that mimics a real
`
`computer system) that is meant to be infected. Dkt. No. 98-14 at FINJAN-JN 044744 at 63-64. Sky
`
`ATP runs the Downloadable in this sandbox, fetches its software components, and determines if the
`
`Downloadable is malicious. Id. at FINJAN-JN 044744 at 763-64. In this way, Sky ATP uses the
`
`dynamic analysis in a sandbox to determine “[w]hat happens when we execute the file in a real
`
`environment?” Dkt. No. 98-15, FINJAN-JN 005387 at 87.
`
`
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`
`
`FINJAN’S OPPOSITION TO JUNIPER’S
`MOTION FOR SUMMARY JUDGMENT
`
`
`
`
`
`5
`
`CASE NO. 3:17-cv-05659-WHA
`
`

`

`Case 3:17-cv-05659-WHA Document 129 Filed 06/28/18 Page 14 of 49
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`.
`
`III. CLAIM CONSTRUCTION
`Juniper’s non-infringement arguments are, in part, based upon unsupported claim construction
`
`arguments that effectively rewrites the entirety of Claim 1 of the ‘780 Patent to narrow its scope.
`
`Juniper seeks construction from this straightforward three-step method claim of the following terms:
`
`1. A computer-based method for generating a Downloadable ID to identify a
`Downloadable, comprising:
`1(a). obtaining a Downloadable4 that includes one or more references to software
`components required to be executed by the Downloadable;
`
`4 Only “Downloadable” requires construction as this was a term defined in the ‘780 Patent’s
`specification as “an executable application program, which is downloaded from a source computer and
`run on the destination computer.” ‘780 Patent, Col. 1, ll. 50-53. Juniper agrees with this construction.
`6
`
`CASE NO. 3:17-cv-05659-WHA
`
`FINJAN’S OPPOSITION TO JUNIPER’S
`MOTION FOR SUMMARY JUDGMENT
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`
`
`

`

`Case 3:17-cv-05659-WHA Doc

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket