`Case 3:17-cv-05659-WHA Document 374-1 Filed 02/19/19 Page 1 of 30
`
`
`
`
`
`
`EXHIBIT A
`EXHIBIT A
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Case 3:17-cv-05659-WHA Document 374-1 Filed 02/19/19 Page 2 of 30
`Case 4:17-cv-04790-HSG Document 101 Filed 02/14/19 Page 1 of 29
`
`
`
`
`
`
`
`
`
`
`
`UNITED STATES DISTRICT COURT
`
`NORTHERN DISTRICT OF CALIFORNIA
`
`FINJAN, INC.,
`
`Plaintiff,
`
`v.
`
`BITDEFENDER INC., et al.,
`
`
`
`
`
`Defendants.
`
`
`
`Case No. 17-cv-04790-HSG
`
`CLAIM CONSTRUCTION ORDER
`
`
`
`On August 16, 2017, Plaintiff Finjan Inc. (“Finjan”) filed this patent infringement action
`
`against Defendants Bitdefender Inc. and Bitdefender S.R.L. (collectively, “Bitdefender”). Dkt.
`
`No. 1 (“Compl.”). The parties now seek construction of ten terms found in four patents: Patent
`
`Nos. 6,804,780 (“the ’780 Patent”), 7,930,299 (“the ’299 Patent”), 8,141,154 (“the ’154 Patent”),
`
`and 8,677,494 (“the ’494 Patent”) (collectively, “the Asserted Patents”). See Dkt. No. 73
`
`(“JCCS”). This order follows claim construction briefing and a claim construction hearing. See
`
`Dkt. Nos. 76 (“Op. Br.”), 81 (“Resp. Br.”), 84 (“Reply Br.”). The parties subsequently submitted
`
`several requests for judicial notice regarding recently filed orders interpreting the Asserted
`
`Patents. See Dkt. Nos. 90, 92–94.1
`
`I. LEGAL STANDARD
`
`
`Claim construction is a question of law to be determined by the Court. Markman v.
`
`Westview Instruments, Inc., 517 U.S. 370, 384 (1996). “The purpose of claim construction is to
`
`determine the meaning and scope of the patent claims asserted to be infringed.” O2 Micro Int’l
`
`
`1 The Court GRANTS the requests for judicial notice. The existence and contents of those orders
`are “not subject to reasonable dispute” because they “can be accurately and readily determined
`from sources whose accuracy cannot reasonably be questioned.” Fed. R. Evid. 201(b).
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`Northern District of California
`
`United States District Court
`
`
`
`Case 3:17-cv-05659-WHA Document 374-1 Filed 02/19/19 Page 3 of 30
`Case 4:17-cv-04790-HSG Document 101 Filed 02/14/19 Page 2 of 29
`
`
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`Ltd. v. Beyond Innovation Tech. Co., 521 F.3d 1351, 1360 (Fed. Cir. 2008) (quotation omitted).
`
`Generally, claim terms should be “given their ordinary and customary meaning”—in other
`
`words, “the meaning that the term[s] would have to a person of ordinary skill in the art in question
`
`at the time of the invention.” Phillips v. AWH Corp., 415 F.3d 1303, 1312–13 (Fed. Cir. 2005) (en
`
`banc) (quotation omitted). There are only two circumstances where a claim is not entitled to its
`
`plain and ordinary meaning: “1) when a patentee sets out a definition and acts as his own
`
`lexicographer, or 2) when the patentee disavows the full scope of a claim term either in the
`
`specification or during prosecution.” Thorner v. Sony Comput. Entm’t Am. LLC, 669 F.3d 1362,
`
`1365 (Fed. Cir. 2012).
`
`When construing claim terms, the Federal Circuit emphasizes the importance of intrinsic
`
`evidence such as the language of the claims themselves, the specification, and the prosecution
`
`history. Phillips, 415 F.3d at 1312–17. The claim language can “provide substantial guidance as
`
`to the meaning of particular claim terms,” both through the context in which the claim terms are
`
`used and by considering other claims in the same patent. Id. at 1314. The specification is likewise
`
`a crucial source of information. Id. at 1315–17. Although it is improper to read limitations from
`
`the specification into the claims, the specification is “the single best guide to the meaning of a
`
`disputed term.” Id. at 1315 (noting that “the specification is always highly relevant to the claim
`
`construction analysis,” and that “[u]sually, it is dispositive” (quotation omitted)); see also Merck
`
`& Co. v. Teva Pharm. USA, Inc., 347 F.3d 1367, 1371 (Fed. Cir. 2003) (explaining that “claims
`
`must be construed so as to be consistent with the specification”).
`
`Despite the importance of intrinsic evidence, courts may also consider extrinsic evidence—
`
`technical dictionaries, learned treatises, expert and inventor testimony, and the like—to help
`
`construe the claims. Phillips, 415 F.3d at 1317–18. For example, dictionaries may reveal what
`
`the ordinary and customary meaning of a term would have been to a person of ordinary skill in the
`
`art at the time of the invention. Frans Nooren Afdichtingssystemen B.V. v. Stopaq Amcorr
`
`Inc., 744 F.3d 715, 722 (Fed. Cir. 2014) (“Terms generally carry their ordinary and customary
`
`meaning in the relevant field at the relevant time, as shown by reliable sources such as
`
`dictionaries, but they always must be understood in the context of the whole document—in
`
`2
`
`Northern District of California
`
`United States District Court
`
`
`
`Case 3:17-cv-05659-WHA Document 374-1 Filed 02/19/19 Page 4 of 30
`Case 4:17-cv-04790-HSG Document 101 Filed 02/14/19 Page 3 of 29
`
`
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`particular, the specification (along with the prosecution history, if pertinent).”). Expert testimony
`
`can also help “to ensure that the court’s understanding of the technical aspects of the patent is
`
`consistent with that of a person of skill in the art, or to establish that a particular term in the patent
`
`or the prior art has a particular meaning in the pertinent field.” Phillips, 415 F.3d at 1318.
`
`Extrinsic evidence is, however, “less significant than the intrinsic record in determining the legally
`
`operative meaning of claim language.” Id. at 1317 (quotation omitted).
`
`II. AGREED TERMS
`
`The parties agree on the construction of three terms. JCCS at 1. In light of the parties’
`
`agreement, the Court adopts the construction of these terms as set forth in the following table:
`
`Patent
`
`Claim Term
`
`Agreed Construction
`
`’494 Patent
`
`“downloadable” [claims 1, 2, 5,
`6, 7, 10, 11, 14, 15, and 16]
`
`’494 Patent
`
`“database” [claims 1, 2, 10, and
`11]
`
`’780 Patent
`
`“downloadable” [claims 1, 2, 5,
`6, 9, 13, 14, and 18]
`
`“an executable application program,
`which is downloaded from a source
`computer and run on the destination
`computer”
`
`“a collection of interrelated data
`organized according to a database
`schema to serve one or more
`applications”
`
`“an executable application program,
`which is downloaded from a source
`computer and run on the destination
`computer”
`
`III. DISPUTED TERMS
`
`A.
`
`“suspicious computer operations” (’494 Patent)
`
`Finjan’s Construction
`
`Bitdefender’s Construction
`
`No construction necessary – Plain and
`ordinary meaning. Plain and ordinary
`meaning of “suspicious” is “hostile or
`potentially hostile.”
`
`
`
`Indefinite
`
`
`
`Alternatively, “a subset of all possible
`computer operations that have been deemed
`suspicious prior to their inclusion in the
`list”
`
`The Court adopts Finjan’s construction, finds the plain and ordinary meaning of
`
`“suspicious” is “hostile or potentially hostile,” and accordingly construes the term
`
`3
`
`Northern District of California
`
`United States District Court
`
`
`
`Case 3:17-cv-05659-WHA Document 374-1 Filed 02/19/19 Page 5 of 30
`Case 4:17-cv-04790-HSG Document 101 Filed 02/14/19 Page 4 of 29
`
`
`
`“suspicious computer operations” as “hostile or potentially hostile computer operations.”
`
`The disputed term appears in independent claims 1 and 10, and dependent claims 6 and 15
`
`of the ’494 Patent. JCCS at 1. Claim 1 is representative of how the term is used in the claim
`
`language:
`
`1. A computer-based method, comprising the steps of:
`
`receiving an incoming Downloadable;
`
`Claim 1
`
`deriving security profile data for the Downloadable, including a list of suspicious
`computer operations that may be attempted by the Downloadable; and
`
`storing the Downloadable security profile data in a database.
`
`
`Finjan asks the Court to give “suspicious computer operations” its plain and ordinary
`
`meaning, arguing that the plain meaning of “suspicious” in the context of the ’494 Patent is
`
`“hostile or potentially hostile.” Op. Br. at 3–5; Reply Br. at 1–3. Starting with the specification,
`
`Finjan notes that the ’494 Patent incorporates the ’780 Patent, which describes “suspicious”
`
`computer operations as “Operations Deemed Potentially Hostile.” See Op. Br. at 3; see also ’494
`
`Patent, 1:28–33 (incorporating the ’780 Patent by reference); ’780 Patent, 3:25–28 (“It is to be
`
`understood that the term ‘suspicious’ includes hostile, potentially hostile, undesirable, potentially
`
`undesirable, etc.”). Finjan further notes that the ’780 Patent discloses several examples of
`
`potentially hostile computer operations. See Op. Br. at 3; see also ’780 Patent, 5:55–60 (“DSP
`
`data 310 includes the list of all potentially hostile or suspicious computer operations that may be
`
`attempted by a specific Downloadable 307, and may also include the respective arguments of
`
`these operations. For example, DSP data 310 may include a READ from a specific file, a SEND
`
`to an unresolved host, etc.”), 6:1–14 (providing “An Example list of Operations Deemed
`
`Potentially Hostile”). According to Finjan’s expert, a person of ordinary skill in the art would,
`
`after reading the patentee’s specification, understand the term to possess its plain meaning: “as
`
`computer operations that are hostile or potentially hostile.” Dkt. No. 76-1 (“Medvidovic Decl.”)
`
`¶¶ 12–14.
`
`Bitdefender and its expert argue the term is indefinite because whether a computer
`
`operation is “suspicious”—or “hostile,” for that matter—“is an inherently subjective matter of
`
`4
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`Northern District of California
`
`United States District Court
`
`
`
`Case 3:17-cv-05659-WHA Document 374-1 Filed 02/19/19 Page 6 of 30
`Case 4:17-cv-04790-HSG Document 101 Filed 02/14/19 Page 5 of 29
`
`
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`opinion.” Resp. Br. at 1; Dkt. No. 81-3 (“Shaefer Decl.”) ¶ 17 (opining that “certain computer
`
`operations may be welcome in one environment, but unsafe in another”). In Bitdefender’s view,
`
`“suspicious” is just as subjective as terms previously found indefinite by the Federal Circuit.
`
`Resp. Br. at 1–2 (citing Interval Licensing LLC v. AOL, Inc., 766 F.3d 1364, 1371–74 (Fed. Cir.
`
`2014) (finding “in an unobtrusive manner” indefinite) and Datamize, LLC v. Plumtree Software,
`
`Inc., 417 F.3d 1342, 1350–56 (Fed. Cir. 2005) (finding “aesthetically pleasing look and feel”
`
`indefinite), abrogated by Nautilus, Inc. v. Biosig Instruments, Inc., 572 U.S. 898 (2014)). And as
`
`to Finjan’s reliance on the examples of suspicious computer operations in the ’780 Patent,
`
`Bitdefender responds that nonexclusive lists cannot render definite an otherwise subjective term.
`
`Id.
`
`Bitdefender alternatively argues that, if the Court finds the term definite, the Court should
`
`construe it as “a subset of all possible computer operations that have been deemed suspicious prior
`
`to their inclusion in the list.” Resp. Br. at 2. Bitdefender contends this would be consistent with
`
`the ’780 Patent’s list of operations that are “deemed potentially hostile,” as well as representations
`
`made by Finjan to the PTAB in Symantec Corp. v. Finjan, Inc., No. IPR2015-01892, 2017 WL
`
`1041718 (P.T.A.B. Mar. 15, 2017) (“Symantec IPR”). Id. at 2-3.
`
`The Court first finds the term is sufficiently definite. Contrary to Bitdefender’s arguments,
`
`the term “suspicious computer operations,” when read in light of the specification and file history,
`
`is not facially subjective to a person of ordinary skill in the art. As Finjan notes, to suggest that a
`
`person skilled in computer security somehow cannot apply the term “suspicious computer
`
`operations” without additional guidance is untenable. See Reply Br. at 1. The Court also finds
`
`Bitdefender’s purportedly comparable cases unavailing. A system displaying content in an
`
`“unobtrusive manner” or the look and feel of a kiosk screen being “aesthetically pleasing” are
`
`categorically unlike “suspicious computer operations,” which a person of ordinary skill in the art
`
`of computer security would have no issue objectively applying. See Medvidovic Decl. ¶¶ 12–14.
`
`Cf. Interval Licensing LLC, 766 F.3d at 1371–74; Datamize, LLC, 417 F.3d at 1350–56.
`
`The Court also finds that the term’s plain and ordinary meaning is “hostile or potentially
`
`hostile.” As Finjan notes, the ’494 Patent incorporates the ’780 Patent, which in turn expressly
`
`5
`
`Northern District of California
`
`United States District Court
`
`
`
`Case 3:17-cv-05659-WHA Document 374-1 Filed 02/19/19 Page 7 of 30
`Case 4:17-cv-04790-HSG Document 101 Filed 02/14/19 Page 6 of 29
`
`
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`states that “suspicious” operations are “hostile or potentially hostile.” Op. Br. at 3–5. And as
`
`Finjan’s expert explains, a skilled artisan would view the term to carry that meaning. See
`
`Medvidovic Decl. ¶¶ 12-14; Phillips, 415 F.3d at 1312–13 (instructing courts to typically give
`
`terms their ordinary and customary meaning).
`
`As to Bitdefender’s alternative proposal, the Court does not find that Finjan’s PTAB
`
`representations amounted to a disclaimer because Finjan did not directly contradict its position
`
`here. In the Symantec IPR, Finjan said, for instance, that there is “no a priori understanding of
`
`what constitutes a suspicious computer operation, but rather, some subset of all possible computer
`
`operations must first be deemed suspicious in order to derive a list of suspicious computer
`
`operations for a Downloadable.” Adamson Decl. Ex. A, at 8–9 (quotations and alterations
`
`removed). But that statement does not unambiguously contradict Finjan’s position here: that a
`
`skilled artisan would understand the term “suspicious computer operations” to mean “hostile or
`
`potentially hostile” when read in the context of the claims. See Reply Br. at 2–3.
`
`Finally, the Court observes that other judicial decisions support the Court’s conclusions
`
`here. See Finjan, Inc. v. Symantec Corp., No. 14-cv-02998-HSG, 2017 WL 550453, at *3 (N.D.
`
`Cal. Feb. 10, 2017) (“The court considers the prior claim construction order for its persuasive
`
`value, while still ultimately reaching its own independent judgment.”). For instance, in Finjan,
`
`Inc. v. Blue Coat Systems, LLC, Judge Freeman articulated this claim term as including
`
`“potentially hostile” operations. See No. 15-cv-03295-BLF, 2016 WL 7212322, at *2 (N.D. Cal.
`
`Dec. 13, 2016) (Blue Coat II). And several other courts in this district have not found this term
`
`indefinite when considering the ’494 Patent under 35 U.S.C. § 101. See Op. Br. at 4 (citing
`
`Finjan, Inc. v. Sophos, Inc., 244 F. Supp. 3d 1016, 1055–1061 (N.D. Cal. Mar. 14, 2017)).
`
`Construing U.S. Patent No. 6,092,194 (“the ’194 Patent”)—a parent of the ’494 Patent—a federal
`
`district court in Delaware gave a plain and ordinary meaning to the term “a list of suspicious
`
`computer operations that may be attempted by the Downloadable.” See Finjan, Inc. v. McAfee,
`
`Inc., No. 10-cv-00593 (GMS), 2012 WL 12905833, at *1 & n.3 (D. Del. Feb. 29, 2012) (emphasis
`
`added). In doing so, the court rejected the defendant’s proposed construction of this term as “a list
`
`of all operations that may be attempted by the received Downloadable that have been determined
`
`6
`
`Northern District of California
`
`United States District Court
`
`
`
`Case 3:17-cv-05659-WHA Document 374-1 Filed 02/19/19 Page 8 of 30
`Case 4:17-cv-04790-HSG Document 101 Filed 02/14/19 Page 7 of 29
`
`
`
`to be suspicious.” See id. at *1 n.3. The court found that Finjan had not “disavowed the plain and
`
`ordinary meaning of this term through its patent specification and prosecution history to
`
`distinguish it from the prior art.” Id. Most recently, in Finjan, Inc. v. Juniper Network, Inc.,
`
`Judge Alsup rejected an argument that “suspicious computer operations” was indefinite for being
`
`subjective—the very argument Bitdefender now advances. See No. C 17-05659 WHA, 2018 WL
`
`4184338, at *6 (N.D. Cal. Aug. 31, 2018) (Juniper).2
`
`B.
`
`“Downloadable scanner coupled with said receiver, for deriving security profile
`data for the Downloadable” (’494 Patent)
`
`Finjan’s Construction
`
`Bitdefender’s Construction
`
`No construction necessary – Plain and
`ordinary meaning.
`
`This phrase should be construed pursuant to
`35 U.S.C. § 112(6) to cover the
`corresponding structure disclosed in the
`’494 patent, namely the code scanner
`referred to in the ’194 patent at 5:36–57,
`9:20–33, and Fig. 7, and equivalents.
`
`
`
`Alternatively, “a code scanner that uses
`parsing techniques to decompose code into
`constituent operations and identifies
`specified operations or patterns of
`operations”
`
`
`
`The Court construes this term as “Downloadable software that searches code to
`
`identify suspicious patterns or suspicious computer operations, coupled with said receiver,
`
`for deriving security profile data for the Downloadable.”
`
`The disputed term appears in independent claim 10 of the ’494 Patent. JCCS at 1.
`
`//
`
`//
`
`//
`
`//
`
`
`2 Judge Alsup also construed “list of” in “list of suspicious computer operations,” and construed
`that term as a whole to be “list of computer operations in a received Downloadable that are
`deemed hostile or potentially hostile.” 2008 WL 4174338, at *3. The parties here, however, do
`not ask this Court to construe the “list of” language.
`7
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`Northern District of California
`
`United States District Court
`
`
`
`Case 3:17-cv-05659-WHA Document 374-1 Filed 02/19/19 Page 9 of 30
`Case 4:17-cv-04790-HSG Document 101 Filed 02/14/19 Page 8 of 29
`
`
`
`10. A system for managing Downloadables, comprising:
`
`a receiver for receiving an incoming Downloadable;
`
`Claim 10
`
`a Downloadable scanner coupled with said receiver, for deriving security profile data
`for the Downloadable, including a list of suspicious computer operations that may be
`attempted by the Downloadable; and
`
`a database manager coupled with said Downloadable scanner, for storing the
`Downloadable security profile data in a database.
`
`
`
`Finjan again argues that no construction is necessary, and that the Court can adopt the
`
`term’s plain and ordinary meaning. See Op. Br. at 5–7; Reply Br. 3–5. Finjan highlights that the
`
`parties have already agreed that the term “Downloadable” means an “executable application
`
`program, which is downloaded from a source computer and run on the destination computer.” See
`
`Op. Br. at 5. Finjan’s expert then opines that “a scanner is a well know[n] component in computer
`
`security and software, and has an associated structure for scanning content such as
`
`Downloadables.” See id. (citing Medvidovic Decl. ¶ 16). Finjan’s expert continues: “A scanner
`
`connotes a structure that is directed to scanning a downloadable received by the receiver.
`
`Moreover, reading the entire claim explains that it has three distinct steps: (1) a receiver receives
`
`Downloadables, (2) a scanner scans those Downloadables, and (3) a database manager stores the
`
`data obtained by the scanner in a database.” Medvidovic Decl. ¶ 17. Thus, in Finjan’s expert’s
`
`opinion, “there is no need to look any further for the structure of this term.” Id.
`
`Bitdefender argues this is a means-plus-function term subject to 35 U.S.C. § 112, despite
`
`the absence of the word “means.” See Resp. Br. at 3. And it contends that the claim terms are
`
`either purely functional (“deriving security profile data for the Downloadable”) or refer to the
`
`scanner’s “relation to other parts in the system, not its structure” (for instance, “coupled with said
`
`receiver”). Id. Bitdefender argues accordingly that the “Downloadable scanner” lacks sufficient
`
`“internal structure” to render the term definite. Id. at 4–5. Finally, Bitdefender contends that “[t]o
`
`the extent the Court finds that the features that Finjan attributed to the claims in order to defend
`
`their validity in [other matters] impart sufficient structure to avoid application of § 112, ¶ 6,” the
`
`Court should adopt the construction, “a code scanner that uses parsing techniques to decompose
`
`code into constituent operations and identifies specified operations or patterns of operations.” Id.
`
`8
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`Northern District of California
`
`United States District Court
`
`
`
`Case 3:17-cv-05659-WHA Document 374-1 Filed 02/19/19 Page 10 of 30
`Case 4:17-cv-04790-HSG Document 101 Filed 02/14/19 Page 9 of 29
`
`
`
`at 5.
`
`In assessing whether a claim invokes Section 112(6), the Court must determine if the claim
`
`limitation is drafted in the means-plus-function format. “The use of the term ‘means’ triggers a
`
`rebuttable presumption that § 112, ¶ 6 governs the construction of the claim term.” Robert Bosch,
`
`LLC v. Snap-On Inc., 769 F.3d 1094, 1097 (Fed. Cir. 2014). Conversely, there is a general
`
`presumption that the limitation does not invoke Section 112(6) where the claim language does not
`
`recite the term “means.” Id.; Zeroclick, LLC v. Apple Inc., 891 F.3d 1003, 1007 (Fed. Cir. 2018).
`
`This presumption is not strong, and it is rebuttable. Williamson v. Citrix Online, LLC, 792 F.3d
`
`1339, 1349 (Fed. Cir. 2015). “The standard is whether the words of the claim are understood by
`
`persons of ordinary skill in the art to have a sufficiently definite meaning as the name for
`
`structure.” Id. “When a claim term lacks the word ‘means,’ the presumption can be overcome and
`
`§ 112, para. 6 will apply if the challenger demonstrates that the claim term fails to ‘recite
`
`sufficiently definite structure’ or else recites ‘function without reciting sufficient structure for
`
`performing that function.”’ Id. (quoting Watts v. XL Sys., Inc., 232 F.3d 877, 880 (Fed. Cir.
`
`2000)).
`
`The Court finds that this is not a means-plus-function term subject to Section § 112(6). To
`
`begin, the claim term does not use the word “means.” “Presumptively, therefore, § 112, ¶ 6 does
`
`not apply . . . .” See Zeroclick, LLC, 891 F.3d at 1007. Nor does the term contain an equivalent
`
`nonce word for “means,” such as “module.” Cf. Williamson, 792 F.3d at 1350 (finding that
`
`“[m]odule is a well-known nonce word that can operate as a substitute for ‘means’ in the context
`
`of § 112, para. 6”); Zeroclick, LLC, 891 F.3d at 1008 (holding that a district court erred by
`
`effectively treating “program” and “user interface code” as nonce words and thus as substitutes for
`
`“means”).
`
`Bitdefender relies on Media Rights Technologies, Inc. v. Capital One Financial Corp., 800
`
`F.3d 1366, 1372 (Fed. Cir. 2015), for the proposition that “scanner” does not impart sufficient
`
`“internal structure,” but that case is inapposite in several respects. See Resp. Br. at 3–4. First, the
`
`Media Rights plaintiff did not dispute that the term to be construed—“compliance mechanism”—
`
`had “no commonly understood meaning and is not generally viewed by one skilled in the art to
`
`9
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`Northern District of California
`
`United States District Court
`
`
`
`Case 3:17-cv-05659-WHA Document 374-1 Filed 02/19/19 Page 11 of 30
`Case 4:17-cv-04790-HSG Document 101 Filed 02/14/19 Page 10 of 29
`
`
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`connote a particular structure.” Media Rights, 800 F.3d at 1372. Here, in contrast, Finjan’s expert
`
`opines that a “scanner” is recognized by those skilled in the art “as a structure for scanning a
`
`Downloadable.” See Medvidovic Decl. ¶¶ 16–17. Second, unlike in Media Rights, where the
`
`court found that the modifier “compliance” failed to impart additional structure to the term
`
`“mechanism,” the parties here agree that a “Downloadable” is “an executable application program,
`
`which is downloaded from a source computer and run on the destination computer.” Compare 800
`
`F.3d at 1373 (citing Mass. Inst. of Tech. v. Abacus Software, 462 F.3d 1344, 1354 (Fed. Cir.
`
`2006)), with JCCS at 1. Given the parties’ agreement that “Downloadable” has a tangible
`
`meaning, the Court finds that a skilled artisan could derive the proper scope of the claim term from
`
`the patent’s language.
`
`The Court also rejects Bitdefender’s alternative construction, which not only reads out
`
`several of the claim’s express elements—e.g., “Downloadable,” “security profile data,” and
`
`“coupled with said receiver”—but also reads in elements that appear nowhere in the claim
`
`language—e.g., “parsing” and “code.” For this construction, Bitdefender relies on technical
`
`dictionaries and features of the incorporated ’194 Patent. See Resp. Br. at 5. But this Court
`
`cannot sanction a wholesale reconstruction of a term on this basis, given the general proscription
`
`against importing extrinsic limitations into the claim terms. See Phillips, 415 F.3d at 1312–13.
`
`Although the Court agrees with Finjan that a skilled artisan could derive the proper scope
`
`of the claim term from the patent’s language, the Court finds deficient Finjan’s proposal that no
`
`construction is necessary. As Judge Freeman recently explained in construing “Downloadable
`
`scanner” in this claim, “[p]resenting that the scanner has a plain and ordinary meaning will not aid
`
`the jury.” Finjan, Inc. v. Cisco Sys., Inc., No. 17-cv-00072-BLF, 2018 WL 3537142, at *13 (N.D.
`
`Cal. July 23, 2018) (Cisco). And as Judge Freeman detailed, the specification of the ’194
`
`Patent—a parent of the ’494 Patent—disclosed that a code scanner “may search the code for any
`
`pattern, which is undesirable or suggests that the code was written by a hacker.” Id. (citing ’194
`
`Patent, 5:54–57). Because the scanner “may generate DSP data that includes suspicious computer
`
`operations,” Judge Freeman ultimately reasoned that a skilled artisan would understand
`
`“Downloadable scanner” to mean “software that searches code to identify suspicious patterns or
`
`10
`
`Northern District of California
`
`United States District Court
`
`
`
`Case 3:17-cv-05659-WHA Document 374-1 Filed 02/19/19 Page 12 of 30
`Case 4:17-cv-04790-HSG Document 101 Filed 02/14/19 Page 11 of 29
`
`
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`suspicious computer operations.” Id. (citing ’194 Patent, 5:50–54); see also Juniper, 2018 WL
`
`4184338, at *7–8 (adopting Cisco’s construction). The Court agrees.
`
`C.
`
` “database manager” (’494 Patent)
`
`Finjan’s Construction
`
`Bitdefender’s Construction
`
`No construction necessary – Plain and
`ordinary meaning. Plain and ordinary
`meaning of database manager is hardware
`and/or software that controls a database.
`
`
`“A program or programs that control a
`database so that the information it contains
`can be stored, retrieved, updated, and
`sorted”
`
`The Court adopts Bitdefender’s construction.
`
`The disputed term appears in independent claim 10 and dependent claim 11 of the ’494
`
`Patent. JCCS at 2. Claim 10 is representative of how the term is used in the claim language:
`
`10. A system for managing Downloadables, comprising:
`
`a receiver for receiving an incoming Downloadable;
`
`Claim 10
`
`a Downloadable scanner coupled with said receiver, for deriving security profile data for
`the Downloadable, including a list of suspicious computer operations that may be
`attempted by the Downloadable; and
`
`a database manager coupled with said Downloadable scanner, for storing the
`Downloadable security profile data in a database.
`
`
`
`Finjan again argues that no construction is necessary in view of the term’s plain and
`
`ordinary meaning: hardware and/or software that controls a database. Op. Br. at 8; Reply Br. at
`
`5–6. Finjan’s expert maintains that “database” is a well-known component in computer security
`
`and software. See Medvidovic Decl. ¶ 19. Finjan also claims that the Sophos court construed the
`
`term “database” consistent with its interpretation of “database manager” here. Op. Br. at 8; see
`
`Finjan, Inc. v. Sophos, Inc., No. 14-cv-01197-WHO, 2015 WL 890621, at *2–4 (N.D. Cal. Mar. 2,
`
`2015). The Sophos court’s construction of “database” parallels the parties’ agreed-upon
`
`construction of that term in this litigation. Compare id., with JCCS at 1 (agreeing that a
`
`“database” is “a collection of interrelated data organized according to a database schema to serve
`
`one or more applications”). And in construing “database,” the Sophos court stated that “[a]
`
`database manager uses the database to retrieve security profile data for an incoming
`
`11
`
`Northern District of California
`
`United States District Court
`
`
`
`Case 3:17-cv-05659-WHA Document 374-1 Filed 02/19/19 Page 13 of 30
`Case 4:17-cv-04790-HSG Document 101 Filed 02/14/19 Page 12 of 29
`
`
`
`Downloadable.” 2015 WL 890621, at *3. According to Finjan, it is undisputed that the
`
`“[d]atabase manager is something that ‘controls” or “manages’ a database for storing and
`
`retrieving information,” and thus any additional limitations are unnecessary. Op. Br. at 8.
`
` Finjan’s focus on the database manager’s function, however, obscures the central dispute:
`
`whether a database manager can encompass both hardware and software. Bitdefender contends
`
`that covering both is an impermissible expansion of the term that contradicts the position taken by
`
`Finjan and its expert in the Symantec IPR proceeding. Resp. Br. at 5. As Bitdefender notes,
`
`Finjan insisted in that IPR that the “database manager must be a program or programs, not
`
`hardware and/or software as it now contends.” Id. at 6 (quotations omitted). In Bitdefender’s
`
`view, that “[p]rosecution disclaimer precludes Finjan’s about-face.” Id.
`
`
`
`The Court agrees that Finjan’s position in the Symantec IPR sufficiently contradicted its
`
`current position to meet the high threshold for disavowal. See Poly-America, L.P. v. API Indus.,
`
`Inc., 839 F.3d 1131, 1136 (Fed. Cir. 2016) (“While disavowal must be clear and unequivocal, it
`
`need not be explicit.”). In arguing for the patentability of the claimed “database manager” over
`
`Morton Swimmer et al. Dynamic Detection and Classification of Computer Viruses Using General
`
`Behaviour Patterns (“Swimmer”), Finjan stated:
`
`[A] person skilled in the art at the time would understand the term
`database manager to mean a program or programs that control a
`database so that the information it contains can be stored, retrieved,
`updated and sorted, which definition is consistent with Dr.
`Davidson’s parenthetical definition of the term, a component that
`manages and controls the storage and retrieval of data in the database,
`but Swimmer does not have [such] a program or programs . . . .
`
`Symantec IPR, 2017 WL 1041718, at *20 (quotations omitted). Similarly, under the heading
`
`“Swimmer does not teach or suggest ‘database manager coupled with said downloadable scanner,
`
`for storing the downloadable security profile data in a database,’” Finjan’s expert opined in a
`
`declaration:
`
`
`
`
`159. I understand Petitioner and Dr. Davidson identify Swimmer’s
`“audit system or a portion thereof” as the claimed “database
`manager.” A person skilled in the art at the time would understand
`database manager to mean “a program or programs that control a
`database so that the information it contains can be stored, retrieved,
`updated and sorted.
`
`12
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13