throbber

`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`IRELL & MANELLA LLP
`
`A Registered Limited Liability
`
`Law Partnership Including
`
`Professional Corporations
`
`Case 3:17-cv-05659-WHA Document 183 Filed 08/21/18 Page 1 of 9
`
`IRELL & MANELLA LLP
`Jonathan S. Kagan (SBN 166039)
`jkagan@irell.com
`Joshua Glucoft (SBN 301249)
`jglucoft@irell.com
`Casey Curran (SBN 305210)
`ccurran@irell.com
`Sharon Song (SBN 313535)
`ssong@irell.com
`1800 Avenue of the Stars, Suite 900
`Los Angeles, California 90067-4276
`Telephone: (310) 277-1010
`Facsimile: (310) 203-7199
`
`Rebecca Carson (SBN 254105)
`rcarson@irell.com
`Kevin Wang (SBN 318024)
`kwang@irell.com
`840 Newport Center Drive, Suite 400
`Newport Beach, California 92660-6324
`Telephone: (949) 760-0991
`Facsimile: (949) 760-5200
`
`Attorneys for Defendant
`JUNIPER NETWORKS, INC.
`
`
`
`
`UNITED STATES DISTRICT COURT
`
`NORTHERN DISTRICT OF CALIFORNIA
`
`SAN FRANCISCO DIVISION
`
`FINJAN, INC., a Delaware Corporation,
`
`
`Plaintiff,
`
`vs.
`
`
`
`
`JUNIPER NETWORKS, INC., a Delaware
`Corporation,
`
`
`Defendant.
`
`
`
`
`
`
`
`
`
`
`
`
`)
`)
`)
`)
`)
`)
`)
`)
`)
`)
`)
`)
`)
`
`
`
`Case No. 3:17-cv-05659-WHA
`
`DEFENDANT JUNIPER NETWORKS,
`INC.’S RESPONSE RE EARLY MOTION
`FOR SUMMARY JUDGMENT RE ’494
`PATENT
`
`
`
`JUNIPER'S RESPONSE RE
`’494 PATENT SUMMARY JUDGMENT
`(Case No. 3:17-cv-05659-WHA)
`
`
`
`

`

`Case 3:17-cv-05659-WHA Document 183 Filed 08/21/18 Page 2 of 9
`
`
`
`1
`
`I.
`
`QUESTION 1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`A.
`
`Part 1: Regarding Juniper’s “database” construction, did the PTAB actually
`rely upon Finjan’s distinction between “flat file” and “flat file database?”
`
`The PTAB did not rely upon Finjan’s distinction between “flat file” and “flat file database”
`
`in upholding the validity of claim 10 in IPR2015-01892 because the PTAB found that the
`
`Swimmer reference disclosed a “database” even under Finjan’s narrower proposed construction.
`
`Ex. 1 (Final Written Decision, Paper 58) at 16-17, 39-41.
`
`B.
`
`Part 2: If not, on what authority can Juniper argue that Finjan’s distinction
`amounts to a true disclaimer?
`
`Although the PTAB distinguished claim 10 from Swimmer on grounds other than Finjan’s
`
`“database” argument, Finjan’s statements about the meaning of “database” nevertheless limit the
`
`meaning of the term. The Federal Circuit has made clear that “[b]ecause an IPR proceeding
`
`involves reexamination of an earlier administrative grant of a patent, it follows that statements
`
`made by a patent owner during an IPR proceeding can be considered during claim construction
`
`and relied upon to support a finding of prosecution disclaimer.” Aylus Networks, Inc. v. Apple
`
`Inc., 856 F.3d 1353, 1361 (Fed. Cir. 2017). This rule follows from the well-settled principle that,
`
`“[a]n applicant’s argument made during prosecution may lead to a disavowal of claim scope even
`
`if the Examiner did not rely on the argument.” Seachange Intern., Inc. v. C-COR, Inc., 413 F.3d
`
`1361, 1374 (Fed. Cir. 2005) (“The fact that the Examiner did not indicate reliance on the point-to-
`
`point distinction is of no consequence.”); Microsoft Corp. v. Multi–Tech Sys., 357 F.3d 1340, 1350
`
`(Fed.Cir.2004) (“We have stated on numerous occasions that a patentee’s statements during
`
`prosecution, whether relied on by the examiner or not, are relevant to claim interpretation.”);
`
`Barnes & Noble, Inc. v. LSI Corp., 2014 WL 1365422 at *12 n. 2 (N.D. Cal. April 7, 2014) (citing
`
`Anderson Corp. v. Fiber Composites, LLC, 474 F.3d 1361, 1374 (Fed. Cir. 2007) (fact that
`
`applicant amended claims and distinguished reference on other grounds did “not change the fact
`
`that the applicants advanced an express definition of the term ‘time stamp’ before the PTO in an
`
`attempt to distinguish prior art”).
`
`The Federal Circuit’s decision in American Piledriving Equip., Inc. v. Geoquip, Inc., 637
`
`F.3d 1324 (Fed. Cir. 2011) is instructive. In that case, the patentee attempted to distinguish a
`
`IRELL & MANELLA LLP
`
`A Registered Limited Liability
`
`Law Partnership Including
`Professional Corporations
`
`
`
`
`
`
`JUNIPER'S RESPONSE RE
`’494 PATENT SUMMARY JUDGMENT
`(Case No. 3:17-cv-05659-WHA)
`
`
`
`

`

`Case 3:17-cv-05659-WHA Document 183 Filed 08/21/18 Page 3 of 9
`
`
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`reference during a reexamination proceeding by arguing that the term “integral” meant that two
`
`components were “one-piece.” Id. at 1336. The patentee later argued that “integral” should not
`
`mean “formed or cast of one piece” on the grounds that its statement during reexamination was not
`
`a disavowal because it “was unnecessary to overcome the reference and that the examiner
`
`explicitly disagreed with it.” Id. The Federal Circuit squarely rejected this argument, explaining
`
`that “American Piledriving unambiguously argued that ‘integral’ meant ‘one-piece’ during
`
`reexamination and cannot attempt to distance itself from the disavowal of broader claim scope.”
`
`8
`
`Id.
`
`9
`
`Here, Finjan unambiguously argued during post-grant proceedings that a “database
`
`10
`
`schema” is defined as a “description of a database to a database management system (DBMS) in
`
`11
`
`the language provided by the DBMS” and that Swimmer did not satisfy the “database” element
`
`12
`
`because it did not store the data “in the form of a table, where only one table can be used for each
`
`13
`
`database.” Ex. 2 (Patent Owner’s Response, Paper 27) at 37-39. Just as in American Piledriving,
`
`14
`
`these statements constitute a disavowal of any broader meaning of “database” and support the
`
`15
`
`adoption of Juniper’s construction.
`
`16
`
`II.
`
`QUESTION 2
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`A.
`
`Part 1: A WRITE command is a legitimate command, but it is disclosed as a
`suspicious computer operation in the ’194 patent at column 5 line 59. Where in
`the ’194 patent does it explain how to distinguish between a suspicious versus
`non-suspicious operation?
`
`The ’194 Patent does not explain how to distinguish between suspicious versus non-
`
`suspicious operations. As the Court correctly notes, the ’194 Patent identifies a WRITE command
`
`as an example of a “suspicious computer operation,” even though a WRITE command, by itself is
`
`a legitimate command. The patent provides no teaching or explanation of how to distinguish
`
`between which legitimate commands are “suspicious” and which ones are not. Indeed, other than
`
`the “Example List of Operations Deemed Potentially Hostile,” the ’194 Patent’s only explanation
`
`of what constitutes “suspicious” is an almost unbounded description of computer operations:
`
`It will be further appreciated that a Downloadable is deemed suspicious if
`it performs or may perform any undesirable operation, or if it threatens or
`may threaten the integrity of an internal computer network 115
`
`IRELL & MANELLA LLP
`
`A Registered Limited Liability
`
`Law Partnership Including
`
`Professional Corporations
`
`
`
`
`- 2 -
`
`JUNIPER'S RESPONSE RE
`’494 PATENT SUMMARY JUDGMENT
`(Case No. 3:17-cv-05659-WHA)
`
`
`
`

`

`Case 3:17-cv-05659-WHA Document 183 Filed 08/21/18 Page 4 of 9
`
`
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`component. It is to be understood that the term “Suspicious” includes
`hostile, potentially hostile, undesirable, potentially undesirable, etc.
`
`’194 Patent at 3:12-16 (emphasis added). The patent offers no objective criteria for how one
`
`would determine whether something satisfies one of these sub-categories; for example, there is no
`
`explanation as to how one would objectively determine whether something is, e.g., “undesirable”
`
`or “potentially undesirable.” Without more, this statement is meaningless, as what constitutes an
`
`“undesirable” operation to one user may be very different than what is “undesirable” to another.
`
`Even Finjan’s expert Dr. Cole admitted that what is “suspicious” depends on the person making
`
`the evaluation, as well as the particular requirements of the network. Dkt. No. 126-8 (Cole Depo.
`
`Tr.) at 83:1-11 (whether something is suspicious “could depend on either the – the evaluation
`
`that’s performed, the level of sensitivity. For example, on highly sensitive government systems,
`
`you might have less tolerance for certain operations than in other environments and could also
`
`be deemed based on the code that was written to look for what is or is not suspicious”). Thus,
`
`what is “undesirable” differs depending on the personal opinions and subjective preferences of the
`
`particular user, and the patent does not provide a POSITA with any way to distinguish which
`
`operations are within the scope of the patent and which are outside the scope.1
`
`In the past, Finjan has identified Column 9, lines 24-29 of the ’194 Patent as providing
`
`evidence about how one would derive a list of suspicious operations. That passage states:
`
`The code Scanner 325 in step 710 resolves a respective command in the
`machine code, and in step 715 determines whether the resolved command
`is Suspicious (e.g., whether the command is one of the operations
`identified in the list described above with reference to FIG.3).
`
`But this passage merely refers back to the “Example List” without explaining how operations like
`
`WRITE got on that list in the first place.
`
`Finjan has previously admitted that the ’194 Patent does not set forth rules to explain how
`
`to distinguish between a suspicious versus non-suspicious operation or when a legitimate
`
`command like WRITE should be considered “suspicious.” Specifically, in IPR2015-01892,
`
`
`1 As noted in Juniper’s Opposition Brief, Dr. Cole admitted that the definition of “suspicious”
`differs from network security professional to network security professional. Dkt. No. 126-8 (Cole
`Depo. Tr.) at 79:1-11.
`
`IRELL & MANELLA LLP
`
`A Registered Limited Liability
`
`Law Partnership Including
`
`Professional Corporations
`
`
`
`
`- 3 -
`
`JUNIPER'S RESPONSE RE
`’494 PATENT SUMMARY JUDGMENT
`(Case No. 3:17-cv-05659-WHA)
`
`
`
`

`

`Case 3:17-cv-05659-WHA Document 183 Filed 08/21/18 Page 5 of 9
`
`
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`Finjan stated: “there is no a priori understanding of what constitutes a ‘suspicious computer
`
`operation.’” Ex. 2 at 11. No “a priori” understanding means that a “suspicious computer
`
`operation” cannot be determined from any general rule and can only be confirmed on subjective
`
`observation. If the ’194 Patent provided any real explanation as to what makes an operation
`
`“suspicious,” then one would be able to deduce in advance whether or not an operation was
`
`suspicious. Finjan thus admits that the ’194 Patent does not teach how to do that, including how
`
`to determine whether a WRITE command is legitimate or not.
`
`Finjan’s representations to the Federal Circuit further confirm that the ’194 Patent does not
`
`explain how to distinguish between a suspicious and non-suspicious operations. In particular,
`
`10
`
`Finjan argued that “computer operations are only ‘suspicious’ to the extent that they have been
`
`11
`
`deemed so.” Symantec Corp. v. Finjan, Inc., Appeal No. 17-2034, ECF 36 (Finjan’s Principal and
`
`12
`
`Response Brief) at 28 (Fed. Cir. Feb. 7, 2018). Finjan’s position makes clear that operations are
`
`13
`
`not “suspicious” because they meet some objective criteria set forth in the ’194 Patent; rather, they
`
`14
`
`are “suspicious” only because someone deemed them as suspicious. Thus, Finjan’s argument is
`
`15
`
`entirely circular.
`
`16
`
`Notwithstanding the circular nature of its argument, Finjan argues that “a list of suspicious
`
`17
`
`computer operations” should be construed as “a list of computer operations that are deemed hostile
`
`18
`
`or potentially hostile.” See Dkt. No. 154 at 4. This construction fails to eliminate the subjectivity
`
`19
`
`of the claim scope because it provides no objective criteria for how to “deem” something
`
`20
`
`suspicious or not. In fact, Finjan’s proposed construction creates more uncertainty because it does
`
`21
`
`not identify who is doing the “deeming” or place any restrictions on their determination. It is
`
`22
`
`well-settled law that a patent is indefinite when its scope depends on the “unpredictable vagaries
`
`23
`
`of any one person’s opinion.” See Datamize, LLC v. Plumtree Software, Inc., 417 F.3d 1342,
`
`24
`
`1350 (Fed. Cir. 2005). The subjective nature of Finjan’s proposed construction is further
`
`25
`
`evidenced in provisional application no. 60/030,639, which the ’194 Patent incorporates by
`
`26
`
`reference. In this application, Finjan concedes that the determination of which operations are
`
`27
`
`“potentially hostile” hinge on what “a user” thinks is “potentially hostile”: “potentially hostile
`
`28
`
`operations may include READ/WRITE operations on a system configuration file, READ/WRITE
`
`IRELL & MANELLA LLP
`
`A Registered Limited Liability
`
`Law Partnership Including
`
`Professional Corporations
`
`
`
`
`- 4 -
`
`JUNIPER'S RESPONSE RE
`’494 PATENT SUMMARY JUDGMENT
`(Case No. 3:17-cv-05659-WHA)
`
`
`
`

`

`Case 3:17-cv-05659-WHA Document 183 Filed 08/21/18 Page 6 of 9
`
`
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`operations on a document containing trade secrets, or any other operation that a user deems
`
`potentially hostile.” ’194 Patent at 1:15-20; Ex. 3 (’639 Provisional Application) at 8:21-9:3.
`
`B.
`
`Part 2: Is the failure to give such an explanation fatal to Claim 10?
`
`The ’194 Patent’s failure to provide objective criteria for distinguishing between a
`
`suspicious and non-suspicious operation is fatal to Claim 10. Without clear teachings in the
`
`specification, “suspicious computer operations” fails to inform those of skill in the art with
`
`reasonable certainty as to its scope. It is therefore indefinite. For example, in Interval Licensing
`
`LLC v. AOL, Inc., 766 F.3d 1364 (Fed. Cir. 2014), the Federal Circuit found a claim with the term
`
`of degree “unobtrusive manner” indefinite, noting:
`
`What if a displayed image takes up 20% of the screen space occupied by
`the primary application with which the user is interacting? Is the image
`unobtrusive? The specification offers no indication, thus leaving the skilled
`artisan to consult the ‘unpredictable vagaries of any one person’s opinion.’
`
`Id. at 1374. The Federal Circuit’s concern in Interval Licensing is remarkably similar to the issues
`
`raised by “suspicious.” Indeed, when asked if “determining whether something is suspicious
`
`involves a subjective determination,” Finjan’s expert Dr. Cole testified “There are absolutely
`
`degrees of suspicion with operations so something could be 80 percent suspicious or 20 percent
`
`suspicious. It could also change based on the circumstances.” Dkt. No. 126-8 (Cole Depo. Tr.) at
`
`82:5-13. If the Federal Circuit cannot determine whether something that obtrudes “20% of the
`
`screen” is “unobtrusive” with reasonable certainty, then how can anyone determine whether an
`
`operation that is “20% suspicious” should be included on the claimed list of suspicious computer
`
`operations? See also Int’l Test Sols., Inc. v. Mipox Int’l Corp., 2017 WL 1367975, *4 (N.D. Cal.
`
`Apr. 10, 2017) (holding that examples did not make the term “predetermined characteristics”
`
`definite because the subjective choice of characteristics “could affect whether a given product
`
`infringes the claims”).
`
`The cases on which Finjan relies are readily distinguishable. For example, in Cioffi v.
`
`Google, Inc., 632 Fed. Appx. 1013, 1022-23 (Fed. Cir. 2015), the Federal Circuit did not find the
`
`term “critical file” indefinite because “the experts from both sides agreed that ‘critical file’ had a
`
`well-understood and objective definition to one of skill in the art. … [N]either party’s expert
`
`IRELL & MANELLA LLP
`
`A Registered Limited Liability
`
`Law Partnership Including
`
`Professional Corporations
`
`
`
`
`- 5 -
`
`JUNIPER'S RESPONSE RE
`’494 PATENT SUMMARY JUDGMENT
`(Case No. 3:17-cv-05659-WHA)
`
`
`
`

`

`Case 3:17-cv-05659-WHA Document 183 Filed 08/21/18 Page 7 of 9
`
`
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`suggested that ‘critical file’ alone is subjective or indefinite.” By contrast, in this case, Finjan’s
`
`own expert Dr. Cole admits that what is “suspicious” can “change based on the circumstances”
`
`and neither Finjan nor its expert have been able to set out an objective test to determine what is
`
`suspicious. See Dkt. No. 126-8 (Cole Depo. Tr.) at 82:5-13. Sonix Tech. Co., Ltd. v. Publications
`
`International, Ltd., 844. F3d 1370 (Fed. Cir. 2017) is similarly distinguishable. In that case, the
`
`Federal Circuit held that “visually negligible” was not indefinite because that patent included
`
`“statements that provide guidance on how to create visually-negligible indicators, and specific
`
`examples that provide points of comparison for the result.” Id. at 1376-77. By contrast, neither
`
`the ’494 Patent nor the ’194 Patent provide any concrete guidance on how to determine whether
`
`10
`
`something is “suspicious,” and the examples provided in the ’194 specification cannot serve as
`
`11
`
`“points of comparison” because different functions do different things and there is no explanation
`
`12
`
`as to what the unifying theme is in the ’194 Patent’s list of examples.
`
`13
`
`III. QUESTION 3
`
`A. Why shouldn’t the Court hold that “suspicious computer operations” is
`inherently subjective and Claim 10 is therefore indefinite unless limited to the
`specific list set forth in the “Example List of Operations Deemed Potentially
`Hostile” (’194 patent at 5:58–6:4)?
`
`As noted above, the term “suspicious computer operations” is inherently subjective and the
`
`Court should therefore hold that it is indefinite.
`
`The problem with trying to preserve the validity of Claim 10 by limiting “suspicious
`
`computer operations” to the specific list set forth in the “Example List of Operations Deemed
`
`Potentially Hostile” of the ’194 Patent at 5:58–6:4 is that this construction would specifically
`
`exclude a preferred embodiment. Specifically, the ’194 Patent teaches that “The code scanner 325
`
`may generate the DSP data 310 as a list of all operations in the Downloadable code which could
`
`ever be deemed potentially hostile.” ’194 Patent at 5:50-53 (emphasis added); see also id. at 5:54-
`
`58 (“It will be appreciated that the code scanner 325 may search the code for any pattern, which is
`
`undesirable.”). Because “a claim interpretation that excludes a preferred embodiment from the
`
`scope of the claim is rarely, if ever, correct.” Accent Packaging, Inc. v. Leggett & Platt, Inc., 707
`
`F.3d 1318, 1326 (Fed. Cir 2013), Juniper believes that this would not be an appropriate
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`IRELL & MANELLA LLP
`
`A Registered Limited Liability
`
`Law Partnership Including
`
`Professional Corporations
`
`
`
`
`- 6 -
`
`JUNIPER'S RESPONSE RE
`’494 PATENT SUMMARY JUDGMENT
`(Case No. 3:17-cv-05659-WHA)
`
`
`
`

`

`Case 3:17-cv-05659-WHA Document 183 Filed 08/21/18 Page 8 of 9
`
`
`
`1
`
`2
`
`3
`
`4
`
`construction. Thus, the Court cannot save the patent in this way. See Interval, 766 F.3d at 1733
`
`(“[w]e decline to cull out a single ‘e.g.’ phrase from a lengthy written description to serve as the
`
`exclusive definition of a facially subjective claim term.”); Nautilus, Inc. v. Boisig Instruments,
`
`Inc., 134 S.Ct. 2120, 2130 (disfavoring ‘post hoc’ efforts to ‘ascribe some meaning to a patent’s
`
`5
`
`claims’)”).
`
`6
`
`7
`
`8
`
`9
`
`In fact, any construction that would exclude an embodiment where the list includes all
`
`operations in the Downloadable code which could ever be deemed potentially hostile would be
`
`improper. This includes Finjan’s proposed construction of “a list of computer operations that are
`
`deemed hostile or potentially hostile.” Finjan’s proposed construction also glaringly omits other
`
`10
`
`portions of the same sentence from the specification on which the construction is based: “It is to
`
`11
`
`be understood that the term ‘Suspicious’ includes hostile, potentially hostile, undesirable,
`
`12
`
`potentially undesirable, etc.” ’194 Patent at 3:12-16. In any event, as explained above, the patent
`
`13
`
`provides no objective criteria for how the sub-categories that Finjan cherry-picks for its proposed
`
`14
`
`construction could be satisfied, and the Federal Circuit has expressly warned against adopting
`
`15
`
`meaningless definitions in an attempt to overcome indefiniteness: “Even if a claim term’s
`
`16
`
`definition can be reduced to words, the claim is still indefinite if a person of ordinary skill in the
`
`17
`
`art cannot translate the definition into meaningfully precise claim scope.” Halliburton Energy
`
`18
`
`Services, Inc. v. M-I LLC, 514 F.3d 1244, 1251 (Fed. Cir 2008).
`
`19
`
`Juniper believes that, to the extent the Court thinks it necessary to provide a construction
`
`20
`
`that will preserve the validity of the patent, the Court should instead adopt the PTAB’s
`
`21
`
`construction from IPR2015-01892 (Paper 58 at 12) (Ex. 1) and IPR2016-00159 (Paper 50 at 35-
`
`22
`
`36) (Ex. 4), namely “a list of all operations that could ever be deemed potentially hostile.” The
`
`23
`
`PTAB specifically noted that “The inclusion of the phraseology ‘all operations…which could ever
`
`24
`
`be deemed potentially hostile’ in that passage renders it more objective.” Ex. 1 at 8. In other
`
`25
`
`words, the PTAB’s construction addresses the subjectivity issue that otherwise renders the claim
`
`26
`
`term indefinite. The PTAB’s construction also encompasses the preferred embodiment referenced
`
`27
`
`above.
`
`28
`
`Regardless of whether the Court adopts the narrower construction limited to only the
`
`IRELL & MANELLA LLP
`
`A Registered Limited Liability
`
`Law Partnership Including
`
`Professional Corporations
`
`
`
`
`- 7 -
`
`JUNIPER'S RESPONSE RE
`’494 PATENT SUMMARY JUDGMENT
`(Case No. 3:17-cv-05659-WHA)
`
`
`
`

`

`Case 3:17-cv-05659-WHA Document 183 Filed 08/21/18 Page 9 of 9
`
`
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`Example List or the broader construction of a list of all operations that could ever be deemed
`
`potentially hostile, there is no dispute that the accused systems do not meet this limitation. As Dr.
`
`Rubin noted, “The list [of suspicious computer operations] that Finjan cites does not even include,
`
`for example ‘CHANGE PROCESS/THREAD PRIORITY,’ which are specific examples of
`
`suspicious operations disclosed in the ‘494 Patent.” Dkt. No. 125-10 (Rubin Dec.) at ¶ 49
`
`(referring to Juniper Source Code at Dkt. 125-7 (Opposition Exhibit 7) showing a list of “APIs to
`
`alert on” that does not include CHANGE PROCESS/THREAD PRIORITY). And Finjan presents
`
`no evidence at all under the broader construction, as Finjan’s expert Dr. Cole admitted that he did
`
`not perform any analysis under that construction. Dkt. No. 126-8 (Ex. 4) at 72:13-73:17 (“My
`
`10
`
`understanding is it is not have to be a complete comprehensive list of every possible operation that
`
`11
`
`could ever be deemed suspicious.”).2
`
`12
`
`
`
`13
`
`Dated: August 21 2018
`
`Respectfully submitted,
`
`IRELL & MANELLA LLP
`
`By: /s/ Rebecca L. Carson
`Rebecca L. Carson (SBN 254105)
`rcarson@irell.com
`840 Newport Center Drive, Suite 400
`Newport Beach, California 92660-6324
`Telephone: (949) 760-0991
`Facsimile: (949) 760-5200
`
`Attorneys for Defendant
`JUNIPER NETWORKS, INC
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`
`2 Finjan cannot argue that Juniper's dynamic sandbox analysis creates a list of all operations that
`could ever be deemed potentially hostile because it allegedly logs all operations performed by the
`file under analysis. Finjan has already represented that such an approach would create “a different
`type of list…namely a list of computer operations as opposed to the required ‘list of suspicious
`computer operations.’” Finjan, Inc.’s Principal and Response Brief, ECF 36 at 28, Symantec Corp.
`v. Finjan, Inc., Appeal No. 17-2034 (Fed. Cir. Feb. 7, 2018) (emphasis in original). Moreover,
`Finjan disclaimed dynamic analysis as being outside the scope of the claimed “scanner.” Compare
`Symantec Corp. v. Finjan, Inc., IPR 2015-01892, Paper 27 at 29 (PTAB June 21, 2016)(“Swimmer
`does not disclose the ‘Downloadable scanner’”), with Dkt. No. 126-9 at 2 (“In this paper, the
`concept of dynamic analysis as applied to viruses is discussed.”); see generally Dkt. No. 126 at 3, 8.
`
`IRELL & MANELLA LLP
`
`A Registered Limited Liability
`
`Law Partnership Including
`
`Professional Corporations
`
`
`
`
`- 8 -
`
`JUNIPER'S RESPONSE RE
`’494 PATENT SUMMARY JUDGMENT
`(Case No. 3:17-cv-05659-WHA)
`
`
`
`

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket