throbber
Case 3:17-cv-05659-WHA Document 355 Filed 01/11/19 Page 1 of 11
`
`
`
`PAUL ANDRE (State Bar No. 196585)
`pandre@kramerlevin.com
`LISA KOBIALKA (State Bar No. 191404)
`lkobialka@kramerlevin.com
`JAMES HANNAH (State Bar No. 237978)
`jhannah@kramerlevin.com
`KRISTOPHER KASTENS (State Bar No. 254797)
`kkastens@kramerlevin.com
`KRAMER LEVIN NAFTALIS & FRANKEL LLP
`990 Marsh Road
`Menlo Park, CA 94025
`Telephone: (650) 752-1700
`Facsimile: (650) 752-1800
`
`Attorneys for Plaintiff
`FINJAN, INC.
`
`
`IN THE UNITED STATES DISTRICT COURT
`
`FOR THE NORTHERN DISTRICT OF CALIFORNIA
`
`SAN FRANCISCO DIVISION
`
`FINJAN, INC., a Delaware Corporation,
`
`
`
`
`
`
`Plaintiff,
`
`v.
`
`
`JUNIPER NETWORKS, INC., a Delaware
`Corporation,
`
`
`Defendant.
`
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`
`Case No.: 3:17-cv-05659-WHA
`
`PLAINTIFF FINJAN, INC.’S REPLY CLAIM
`CONSTRUCTION BRIEF FOR U.S. PATENT
`NO. 7,418,731
`
`Date:
`Time:
`Courtroom:
`Before:
`
`
`TBD
`8:00 a.m.
`Courtroom 12, 19th Floor
`Hon. William Alsup
`
`
`
`
`
`
`
`
`
`CASE NO. 3:17-cv-05659-WHA
`
`
`
`FINJAN’S REPLY CLAIM CONSTRUCTION
`BRIEF FOR U.S. PATENT NO. 7,418,731
`
`

`

`Case 3:17-cv-05659-WHA Document 355 Filed 01/11/19 Page 2 of 11
`
`
`
`I.
`
`INTRODUCTION
`
`The Court should adopt the plain and ordinary meaning for the terms “cache,” “future access”
`
`and “restrictions” because those skilled in the art, the Court, and even laypersons can readily
`
`understand their meaning. Juniper’s proposed constructions, on the other hand, import limitations
`
`from the specification. For the term “cache,” Juniper relies heavily on extrinsic evidence instead to
`
`support its proposed construction, despite the fact that the extrinsic evidence conflicts with the use of
`
`the term in U.S. Patent No. 7,418,731 (Dkt. No. 347-2, “the ‘731 Patent”). For the remainder of the
`
`terms, Juniper is unable to identify any instance where the applicant acted as a lexicographer or clearly
`
`disavowed claim scope, such that there is no basis to deviate from the plain and ordinary meaning of
`
`the terms. Accordingly, the Court should adopt the plain and ordinary meaning of the terms at issue.
`
`II.
`
`ARGUMENT
`
`Term 1.
`
` “cache” (Claims 1, 17)
`
`Juniper’s Proposed Construction
`Finjan’s Proposed Construction
`high-speed memory used to temporarily store
`No construction necessary – Plain and ordinary
`duplicated data for quick access
`meaning.
`The Court should adopt the plain and ordinary meaning of “cache,” which as used throughout
`
`the ‘731 Patent, describes “memory for storing data, at least temporarily.” Dkt. No. 347, Finjan’s
`
`Opening Brief (“Opening Br.”) at 2-3. The plain and ordinary meaning applies to uses of the term
`
`“cache” in various contexts, including when used for a “file cache,” a “security profile cache,” and a
`
`“security policy cache,” which are all generally described as memory for storing data. Id. For
`
`example, the ‘731 Patent describes how the “file cache” can store data in the form of files that are
`
`retrieved from the Internet for later use. ‘731 Patent, at 4:18-19 (“storing the retrieved file within the
`
`file cache”). The ‘731 Patent also describes a “security profile cache” that allows for the storage of
`
`data in the form of security profiles that were generated for the files, so that these security profiles
`
`could be reused for as long as necessary. Id. at 9:43-45 (“the gateway computer stores the
`
`corresponding security profiles that it derived within its security profile cache.”). Finally, the ‘731
`
`Patent describes how data in the form of policies can be stored in a “policy cache” so that it can be
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`
`
`FINJAN’S REPLY CLAIM CONSTRUCTION
`BRIEF FOR U.S. PATENT NO. 7,418,731
`
`1
`
`CASE NO. 3:17-cv-05659-WHA
`
`

`

`Case 3:17-cv-05659-WHA Document 355 Filed 01/11/19 Page 3 of 11
`
`
`
`retrieved to make policy decisions. Id. at 2:65-67 (“retrieving a security policy for the intranet
`
`computer from a security policy cache …”). The ‘731 Patent contemplates storing information in a
`
`cache for different lengths of time, including examples involving temporary storage with “purg[ing]”
`
`of information periodically to save space, and other examples that are more permanent and do not
`
`require periodic purging of data. Opening Br. at 3 (citing ‘731 Patent, at 8:17-19, 8:40-45). As such,
`
`the plain of ordinary meaning of cache as “memory for storing data, at least temporarily” is consistent
`
`with how the term is used throughout the specification of the ‘731 Patent.
`
`Juniper’s proposed construction cannot be adopted because it conflicts with how the term is
`
`used in the specification. Juniper’s claim that the plain and ordinary meaning of “cache” must be
`
`limited to “high-speed memory used to temporarily store duplicated data for quick access” is incorrect.
`
`The lack of support for Juniper’s proposed construction is made apparent by the fact that Juniper is
`
`forced to rely primarily on extrinsic evidence in order to justify its proposed construction, which is at
`
`odds with the disclosure of the ‘731 Patent. Dkt. No. 349, Juniper’s Reply Brief (“Resp.”) at 2-3.
`
`Furthermore, it is notable that Juniper cannot rely on a single definition in support of its proposed
`
`construction, but strings together a hodge-podge of different constructions in an attempt to import new
`
`and unsupported limitations into the claims. For example, Juniper relies on some definitions that
`
`compare a “cache” with other forms of memory, and describe the cache as being faster than these other
`
`memory options. Id. However, the ‘731 Patent does not reference the cache as operating more quickly
`
`in relation to other types of memory. At no point in the specification does the ‘731 Patent describe that
`
`any of the caches used—“file cache,” “security profile cache,” or “policy cache,” —is serving as a
`
`faster alternative to some other type of memory for storing these files. Instead, the ‘731 Patent
`
`describes storing the files retrieved from the Internet in the file cache, storing the profiles generated in
`
`the profile cache, and the policies used in a policy cache. Accordingly, to inject terms such as “high-
`
`speed” and “quick access” is completely unsupported by anything in the specification.
`
`Further, for these same reasons, the specification of the ‘731 Patent does not support that the
`
`data stored in the cache is “duplicated data,” as the specification does not describe the caches storing
`
`data in different types of memory on the system, i.e., data that is “duplicated.” Instead, Juniper
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`
`
`FINJAN’S REPLY CLAIM CONSTRUCTION
`BRIEF FOR U.S. PATENT NO. 7,418,731
`
`2
`
`CASE NO. 3:17-cv-05659-WHA
`
`

`

`Case 3:17-cv-05659-WHA Document 355 Filed 01/11/19 Page 4 of 11
`
`
`
`incorrectly argues that the following description of the ‘731 Patent describes “duplicated data”: “At
`
`step 260 the gateway computer retrieves a security policy for the intranet client computer that
`
`requested the web page at step 205.” Resp. at 6 n.3 (citing ‘731 Patent, at 9:55-57). However, this is
`
`not a reference to data that is duplicated, but the data is simply being retrieved from the “policy cache”
`
`so that it can be applied. As this limitation is unsupported by the specification, Juniper is therefore
`
`once again forced to rely on importing limitations found in extrinsic evidence for its proposed
`
`construction. Resp. at 2 (citing Dkt. No. 249-2, Declaration of Rebecca Carson (“Carson Decl.”), Ex.
`
`1). However, again, nowhere in the specification does the ‘731 Patent describe the data being
`
`“duplicated” on the system, and as such, Juniper’s proposed limitation should be rejected.
`
`Juniper next argues that the PTAB’s adopted construction of the related term, “file cache,”
`
`should be given no weight because the petitioner did not argue for another construction of the term.
`
`Resp. at 3. Juniper’s suggestion that the PTAB would somehow construe a term in a way that is
`
`inconsistent with the ‘731 Patent or how a person of ordinary skill in the art would understand the term
`
`is unfounded. Id. That the PTAB readily accepted Finjan’s understanding of the term as the
`appropriate understanding of the term is evidence that it is an appropriate plain and ordinary meaning.1
`The PTAB includes those knowledgeable in the art, and they would not adopt a construction as the
`
`meaning of the term if that understanding was not consistent with the plain and ordinary meaning of
`
`the term.
`
`Further, the portions of the specification which Finjan provide support a plain and ordinary
`
`meaning that encompasses storing a file on a temporary and up to a permanent, or close to permanent,
`
`basis. In particular, Finjan cited to portions of the intrinsic record that the “profile cache” can store a
`
`security profile for a long as needed, and this cache does not require routine purging, and therefore is
`
`not limited to “temporary” storage of data as suggested by Juniper. ‘731 Patent, at 8:41-43 (“the
`
`security profile of the purged content need not be purged from security profile cache 150.”). Juniper’s
`
`identification of other portions of the ‘731 Patent are not contrary to Finjan’s plain and ordinary
`
`1 The PTAB adopted the same construction as Finjan, except the PTAB substituted “holding” for
`“storing” of the data. Dkt. No. 347-3, Declaration of Kristopher Kastens, Ex. 2 at 6. Finjan believes
`that both “storing” and “holding” are consistent with the plain and ordinary meaning of the term.
`3
`
`FINJAN’S REPLY CLAIM CONSTRUCTION
`BRIEF FOR U.S. PATENT NO. 7,418,731
`
`CASE NO. 3:17-cv-05659-WHA
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`
`
`

`

`Case 3:17-cv-05659-WHA Document 355 Filed 01/11/19 Page 5 of 11
`
`
`
`meaning of the term, as Finjan’s identification of the plain and ordinary meaning encompasses how
`
`the term is used throughout the specification of the ‘731 Patent. This is consistent with embodiments
`
`that the ‘731 Patent describes caches which are managed … “in order to appropriately purge items
`
`from cache when cache memory is full and new items arrive for storage,” and also those, which as
`
`described above, do not require “purging.” Juniper’s citation only demonstrates that the ‘731 Patent
`
`contemplates that purging items from a cache is possible—not that it is required to do so. Resp. at 5
`
`(citing ‘731 Patent, at 8:11-16). This is aligned with the plain and ordinary meaning proposed by
`
`Finjan, which includes caches that are periodically purged, and those that are not.
`
`Finally, Finjan’s statements in the Blue Coat action are not contrary to the plain and ordinary
`
`meaning Finjan proposes in this case. Resp. at 6. There, Finjan was merely describing that the cache
`
`can be temporary storage which is consistent with the plain and ordinary construction of “memory for
`
`storing data, at least temporarily.”
`
`Accordingly, the Court should reject Juniper’s proposed construction which is based on
`
`subjective terms and extrinsic evidence that contradicts the intrinsic record.
`
`Term 2.
` “a file cache for storing files that have been scanned by the scanner
`
`for future access” (Claim 1)
`
`Finjan’s Proposed Construction
`No construction necessary – Plain and ordinary
`meaning.
`
`Juniper’s Proposed Construction
`a file cache for storing files that have been
`scanned by the scanner for use in response to
`subsequent requests by a client to an Internet
`server
`The only portion of this term that Juniper is actually seeking to construe is what “future access”
`
`means in the context of the claims. However, “future access” is written in plain English and does not
`
`require additional construction deviating from the plain and ordinary meaning. Opening Br. at 5. This
`
`term is simply understood as something that can be accessed in the future, which is exactly also how
`
`the term is used in the claims. ‘731 Patent, Claims 1, 17.
`
`Juniper’s proposed construction takes these two basic words and rewrites them in a way that
`
`deviates from the plain reading of the claim language and which excludes preferred embodiments from
`
`the specification. Opening Br. at 5-6. Juniper does not dispute that its proposed construction is
`4
`
`FINJAN’S REPLY CLAIM CONSTRUCTION
`BRIEF FOR U.S. PATENT NO. 7,418,731
`
`CASE NO. 3:17-cv-05659-WHA
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`
`
`

`

`Case 3:17-cv-05659-WHA Document 355 Filed 01/11/19 Page 6 of 11
`
`
`
`contrary to the plain and ordinary meaning. But in an attempt to justify deviating from the plain and
`
`ordinary meaning, Juniper claims that when Finjan included “files that have been scanned by the
`
`scanner for future access”/“retrieved files” for “future access,” Finjan limited itself to a single type of
`
`future access, namely “for use in response to subsequent requests by a client to an Internet server.”
`
`However, the Court may not read in this new limitation based on the prosecution history because
`
`Finjan made no clear and unmistakable disavowal of claim scope. Avid Tech., Inc. v. Harmonic, Inc.,
`
`812 F.3d 1040, 1045-46 (Fed. Cir. 2016) (to limit the meaning of a claim term, the Court must find that
`
`the statements are both “a clear and unambiguous” disavowal of claim scope); see also Thorner v.
`
`Sony Computer Entm’t Am. LLC, 669 F.3d 1362, 1365–66 (Fed. Cir. 2012) (“There are only two
`
`exceptions to [the] general rule [of ordinary meaning]: (1) when a patentee sets out a definition and
`
`acts as his own lexicographer, or (2) when the patentee disavows the full scope of a claim term either
`
`in the specification or during prosecution.”) (citation omitted). Instead, Finjan made the common
`
`sense argument that the file is stored after it has been scanned for “future access” based on the plain
`
`reading of the claims. See Dkt. No. 349-8, Carson Decl., Ex. 7 at 3, 13-14 (the file cache holds files
`that “have been scanned by the scanner for future access”) (emphasis added). As such, the
`
`prosecution history does not support Juniper’s proposed construction.
`
`Juniper also argues that Finjan is limited to single example of what “future access” could be,
`
`otherwise the patent would be “invalid under the written description requirement and would be
`
`contrary to Federal Circuit precedent.” Resp. at 7. This is wrong, and flips the concept of disclosing
`
`example embodiments complete on its head. Finjan provided examples of what “future access” in the
`
`specification means and these examples can be used to support claims that cover all types of future
`
`access. Furthermore, the words “future access” are well-understood, and there are no issues with
`
`written description or enablement, as there was in Wang Laboratories. Wang Labs., Inc. v. Am.
`
`Online, Inc., 197 F.3d 1377, 1382 (Fed. Cir. 1999). In stark contrast to Wang Laboratories where the
`
`applicant distinguished over prior art by characterizing its invention to be a character-based frame, the
`
`applicant here only distinguished over Ji by stating that “the received files in Ji are not stored in a file
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`
`
`FINJAN’S REPLY CLAIM CONSTRUCTION
`BRIEF FOR U.S. PATENT NO. 7,418,731
`
`5
`
`CASE NO. 3:17-cv-05659-WHA
`
`

`

`Case 3:17-cv-05659-WHA Document 355 Filed 01/11/19 Page 7 of 11
`
`
`
`cache for future access,” not specifically stating how the file must be accessed. Dkt. No. 349-8,
`
`Carson Decl., Ex. 7 at 14; Wang Labs., 197 F.3d at 1384.
`
`Moreover, Juniper claims that its replacement of these two basic words with 13 words setting
`
`forth a specific embodiment is “consistent with the purpose of the ‘731 Patent.” However, it is black
`
`letter law that embodiments from the specification should not be imported into the claims. Teleflex,
`
`Inc. v. Ficosa N. Am. Corp., 299 F.3d 1313, 1326 (Fed. Cir. 2002) (“As we have often stated, the
`
`claims must be read in view of the specification … but limitations from the specification are not to be
`
`read into the claims”) (citations omitted). There are numerous usages of “file cache” within the
`
`specification that do not limit their storage only to be “in response to subsequent requests by a client to
`
`an Internet server.” ‘731 Patent, at 2:1-57; 3:21-4:27 (providing multiple example embodiments not
`
`requiring file to be served “in response to subsequent requests by a client to an Internet server.”).
`
`Furthermore, Juniper’s construction still excludes preferred embodiments in the specification
`
`from its construction. Opening Br. at 5-6; Resp. at 8. Juniper attempts to line up portions of the
`
`specification to specific claims (Resp. at 8), arguing that certain sections of the specification should
`
`only apply to certain claims. However, Juniper’s argument mischaracterizes the specification.
`
`Specifically, the section describes a system that can look at both incoming and outgoing content, and
`
`does not require that it be restricted to only looking at one or the other. ‘731 Patent, at 10:48-52
`
`(“More generally, it may be appreciated that FIG. 1 and FIG. 3 may be combined to provide a system
`
`in accordance with the present invention that controls bi-directional traffic; i.e., both incoming and
`
`outgoing content.”). As such, this section should still be considered when interpreting the claims, as it
`
`should not read out using the system for both purposes. For example, Column 10 lines 25-29 state: “In
`
`an alternative embodiment the present invention can be used to control outgoing traffic; i.e., for
`
`scanning outgoing web pages and web objects to control content that is sent from within an enterprise
`
`intranet to computers outside of the intranet,” which shows that the files in the file cache are not only
`
`limited to being accessed in the future based on requests or responses from external computers to the
`
`gateway. Opening Br. at 5-6. Further, the specification states that a file does not always need to
`
`requested by a user to a resource on the Internet, as suggested in Juniper’s proposed construction
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`
`
`FINJAN’S REPLY CLAIM CONSTRUCTION
`BRIEF FOR U.S. PATENT NO. 7,418,731
`
`6
`
`CASE NO. 3:17-cv-05659-WHA
`
`

`

`Case 3:17-cv-05659-WHA Document 355 Filed 01/11/19 Page 8 of 11
`
`
`
`because, “in some instances the gateway may receive a request for a web object without having
`
`received a request for a web page that references it.” ‘731 Patent, at 10:64-66.
`
`Finally, Juniper’s argument that its proposal is consistent with Finjan’s description of the ‘731
`
`Patent is beside the point because Finjan did not state that was the only way the “file cache” operates.
`
`Thus, because there has been no clear disavowal of the term “future access” and because Juniper’s
`
`proposed construction excludes preferred embodiments, the Court should reject Juniper’s construction.
`
`Term 3.
` “storing the retrieved file within a file cache for future access”
`(Claim 17)
`
`Finjan’s Proposed Construction
`No construction necessary – Plain and ordinary
`meaning.
`
`Juniper’s Proposed Construction
`storing the retrieved file within a file cache for
`use in response to subsequent requests by a
`client to an Internet server
`Juniper seeks only to construe the term “future access” in this claim limitation. For the same
`
`reasons stated for Term 2, the term does not require further construction and there is no basis to deviate
`
`from the plain and ordinary meaning of the term.
`
`Term 4.
`
` “the security policies each including a list of restrictions” (Claim 1)
`
`Finjan’s Proposed Construction
`No construction necessary – Plain and ordinary
`meaning.
`
`Juniper’s Proposed Construction
`the security policies each including a list of
`operations or computer commands that are to
`be blocked
`While Juniper has identified the entire claim limitation for construction, Juniper seeks to
`
`replace the term “restrictions” with “operations or computer commands that are to be blocked,” despite
`
`the fact that the term “restrictions” is a basic term that laypersons would understand to generally mean
`
`“limitations.” This is consistent with how a person of ordinary skill in the art would understand the
`
`term in view of the specification, which provides that the system places limitations on the files that are
`
`allowed to enter a network. The specification of the ‘731 Patent includes numerous examples where “a
`
`list of restrictions” are discussed and not limited beyond their plain and ordinary meaning of the term,
`
`that of limitations on files that can be transmitted. ‘731 Patent, at 2:1-4:67. In one particular example,
`
`the ‘731 Patent sets forth this plain and ordinary meaning, describing “the security policy defining
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`
`
`FINJAN’S REPLY CLAIM CONSTRUCTION
`BRIEF FOR U.S. PATENT NO. 7,418,731
`
`7
`
`CASE NO. 3:17-cv-05659-WHA
`
`

`

`Case 3:17-cv-05659-WHA Document 355 Filed 01/11/19 Page 9 of 11
`
`
`
`restrictions on files that can be transmitted to the intranet computer, and comparing the security profile
`
`for the requested file vis a vis the security policy for the intranet computer, to determine whether
`
`transmission of the requested file to the intranet computer is to be restricted.” ‘731 Patent, at 3:15-20.
`
`As shown, “restriction” is just used in its ordinary manner and does not require construction beyond its
`
`plain and ordinary meaning.
`
`Juniper’s proposed construction should be rejected because it improperly limits the scope of
`
`“restrictions” to “a list of operations or computer commands that are to be blocked” and excludes
`
`embodiments identified in the specification. Opening Br. at 7. Contrary to Juniper’s suggestion
`
`otherwise, the claim only requires that the security policies each include a list of restrictions:
`
`1. A computer gateway for an intranet of computers, comprising:
`
`
`
`a scanner for scanning incoming files from the Internet and deriving security profiles for
`the incoming files, wherein each of the security profiles comprises a list of computer
`commands that a corresponding one of the incoming files is programmed to perform;
`
` a
`
` file cache for storing files that have been scanned by the scanner for future access,
`wherein each of the stored files is indexed by a file identifier; and
`
` a
`
` security profile cache for storing the security profiles derived by the scanner, wherein
`each of the security profiles is indexed in the security profile cache by a file identifier
`associated with a corresponding file stored in the file cache; and
`
` a
`
` security policy cache for storing security policies for intranet computers within the
`intranet, the security policies each including a list of restrictions for files that are
`transmitted to a corresponding subset of the intranet computers.
`Resp. at 9; ‘731 Patent, Claim 1 (emphasis added).
`
`Further, Juniper’s claim that “Finjan fails to cite to any embodiment that contemplates a
`
`situation where the security policy of Claim 1 does not at least include the operations or computer
`
`commands to be blocked” rings hollow. Resp. at 10. First, the specification gives examples where the
`
`restriction are based on comparing the policy to the information in the security profile, which can
`
`include information beyond the operations or commands performed, including descriptions of things
`
`like whether the code is potentially malicious or what objects it references. ‘731 Patent, at 3:15-20
`
`(describing embodiment where the profile is compared to the policy). This is shown in TABLE I,
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`
`
`FINJAN’S REPLY CLAIM CONSTRUCTION
`BRIEF FOR U.S. PATENT NO. 7,418,731
`
`8
`
`CASE NO. 3:17-cv-05659-WHA
`
`

`

`Case 3:17-cv-05659-WHA Document 355 Filed 01/11/19 Page 10 of 11
`
`
`
`where specific files are given ratings such as “Potentially Malicious?” Juniper’s proposed construction
`
`excludes other embodiments where blocking does not occur based on restrictions, such that Juniper’s
`
`construction is flawed. As such, Juniper’s argument that only the “File System Commands,”
`
`“Operating System Commands,” and “Network Commands” in Table I are compared to the security
`
`policy is without basis, as multiple embodiments disclose comparing the profile to the policy, and do
`
`not restrict the comparison to this specific information in the profile. Juniper cites no support from the
`
`specification that the claims should be so limited.
`
`Furthermore, Juniper’s attempt to read limitations into the claims is improper because the
`
`patentee did not act as a lexicographer to specifically define “restrictions,” and accordingly, Juniper’s
`
`claim that Column 3, lines 50-51, do not “provid[e] any insight or description of what the restrictions
`
`are” only serves to demonstrate that the security policies do not need to include a list of operations or
`
`computer commands that are to be blocked. Resp. at 10; see also ‘731 Patent, Col. 10, ll. 13-21.
`
`Finally, Juniper’s argument that its proposed construction does not exclude preferred
`
`embodiments and that the portions of the ‘731 Patent that Finjan cited in its Opening Brief somehow
`
`support Juniper’s proposed construction is wrong. Resp. at 10. The ‘731 Patent merely states that
`
`“[a]t step 265 the gateway computer analyzes the web page security profile vis a vis the client
`
`computer security policy.” ‘731 Patent, at 9:61-62. This example does not describe any form of
`
`blocking and in no way means that this is “comparing the list of computer commands or operations in
`
`the security profile with the list of computer commands operations in the security policy to be blocked”
`
`as Juniper claims. Resp. at 10. Rather, the results include a security policy a determination if certain
`files are “Potentially Malicious” and may be allowed or blocked. ‘731 Patent, TABLE I; id. at 6:27-29
`
`(“As can be seen from Table I, web page P and web objects O1 and O4 are deemed potentially
`
`malicious. Web objects O2 and O3 are deemed safe.”). As such, the security policy can include
`
`information regarding what content would be safe.
`
`Therefore, Juniper’s proposed construction should be rejected and the plain and ordinary
`
`meaning should be adopted.
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`
`
`FINJAN’S REPLY CLAIM CONSTRUCTION
`BRIEF FOR U.S. PATENT NO. 7,418,731
`
`9
`
`CASE NO. 3:17-cv-05659-WHA
`
`

`

`Case 3:17-cv-05659-WHA Document 355 Filed 01/11/19 Page 11 of 11
`
`
`
`III. CONCLUSION
`As such, Finjan’s proposed constructions should be adopted.
`
`
`
`
`
`Dated: January 11, 2019
`
`
`
`
`Respectfully submitted,
`
`
`By: /s/ Kristopher Kastens
`Paul J. Andre (State Bar No. 196585)
`Lisa Kobialka (State Bar No. 191404)
`James Hannah (State Bar No. 237978)
`Kristopher Kastens (State Bar No. 254797)
`KRAMER LEVIN NAFTALIS
` & FRANKEL LLP
`990 Marsh Road
`Menlo Park, CA 94025
`Telephone: (650) 752-1700
`Facsimile: (650) 752-1800
`pandre@kramerlevin.com
`lkobialka@kramerlevin.com
`jhannah@kramerlevin.com
`kkastens@kramerlevin.com
`
`Attorneys for Plaintiff
`FINJAN, INC.
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`
`
`FINJAN’S REPLY CLAIM CONSTRUCTION
`BRIEF FOR U.S. PATENT NO. 7,418,731
`
`10
`
`CASE NO. 3:17-cv-05659-WHA
`
`

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket