throbber
Case 3:17-cv-05659-WHA Document 374-1 Filed 02/19/19 Page 1 of 30
`Case 3:17-cv-05659-WHA Document 374-1 Filed 02/19/19 Page 1 of 30
`
`
`
`
`
`
`EXHIBIT A
`EXHIBIT A
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`

`

`Case 3:17-cv-05659-WHA Document 374-1 Filed 02/19/19 Page 2 of 30
`Case 4:17-cv-04790-HSG Document 101 Filed 02/14/19 Page 1 of 29
`
`
`
`
`
`
`
`
`
`
`
`UNITED STATES DISTRICT COURT
`
`NORTHERN DISTRICT OF CALIFORNIA
`
`FINJAN, INC.,
`
`Plaintiff,
`
`v.
`
`BITDEFENDER INC., et al.,
`
`
`
`
`
`Defendants.
`
`
`
`Case No. 17-cv-04790-HSG
`
`CLAIM CONSTRUCTION ORDER
`
`
`
`On August 16, 2017, Plaintiff Finjan Inc. (“Finjan”) filed this patent infringement action
`
`against Defendants Bitdefender Inc. and Bitdefender S.R.L. (collectively, “Bitdefender”). Dkt.
`
`No. 1 (“Compl.”). The parties now seek construction of ten terms found in four patents: Patent
`
`Nos. 6,804,780 (“the ’780 Patent”), 7,930,299 (“the ’299 Patent”), 8,141,154 (“the ’154 Patent”),
`
`and 8,677,494 (“the ’494 Patent”) (collectively, “the Asserted Patents”). See Dkt. No. 73
`
`(“JCCS”). This order follows claim construction briefing and a claim construction hearing. See
`
`Dkt. Nos. 76 (“Op. Br.”), 81 (“Resp. Br.”), 84 (“Reply Br.”). The parties subsequently submitted
`
`several requests for judicial notice regarding recently filed orders interpreting the Asserted
`
`Patents. See Dkt. Nos. 90, 92–94.1
`
`I. LEGAL STANDARD
`
`
`Claim construction is a question of law to be determined by the Court. Markman v.
`
`Westview Instruments, Inc., 517 U.S. 370, 384 (1996). “The purpose of claim construction is to
`
`determine the meaning and scope of the patent claims asserted to be infringed.” O2 Micro Int’l
`
`
`1 The Court GRANTS the requests for judicial notice. The existence and contents of those orders
`are “not subject to reasonable dispute” because they “can be accurately and readily determined
`from sources whose accuracy cannot reasonably be questioned.” Fed. R. Evid. 201(b).
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`Northern District of California
`
`United States District Court
`
`

`

`Case 3:17-cv-05659-WHA Document 374-1 Filed 02/19/19 Page 3 of 30
`Case 4:17-cv-04790-HSG Document 101 Filed 02/14/19 Page 2 of 29
`
`
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`Ltd. v. Beyond Innovation Tech. Co., 521 F.3d 1351, 1360 (Fed. Cir. 2008) (quotation omitted).
`
`Generally, claim terms should be “given their ordinary and customary meaning”—in other
`
`words, “the meaning that the term[s] would have to a person of ordinary skill in the art in question
`
`at the time of the invention.” Phillips v. AWH Corp., 415 F.3d 1303, 1312–13 (Fed. Cir. 2005) (en
`
`banc) (quotation omitted). There are only two circumstances where a claim is not entitled to its
`
`plain and ordinary meaning: “1) when a patentee sets out a definition and acts as his own
`
`lexicographer, or 2) when the patentee disavows the full scope of a claim term either in the
`
`specification or during prosecution.” Thorner v. Sony Comput. Entm’t Am. LLC, 669 F.3d 1362,
`
`1365 (Fed. Cir. 2012).
`
`When construing claim terms, the Federal Circuit emphasizes the importance of intrinsic
`
`evidence such as the language of the claims themselves, the specification, and the prosecution
`
`history. Phillips, 415 F.3d at 1312–17. The claim language can “provide substantial guidance as
`
`to the meaning of particular claim terms,” both through the context in which the claim terms are
`
`used and by considering other claims in the same patent. Id. at 1314. The specification is likewise
`
`a crucial source of information. Id. at 1315–17. Although it is improper to read limitations from
`
`the specification into the claims, the specification is “the single best guide to the meaning of a
`
`disputed term.” Id. at 1315 (noting that “the specification is always highly relevant to the claim
`
`construction analysis,” and that “[u]sually, it is dispositive” (quotation omitted)); see also Merck
`
`& Co. v. Teva Pharm. USA, Inc., 347 F.3d 1367, 1371 (Fed. Cir. 2003) (explaining that “claims
`
`must be construed so as to be consistent with the specification”).
`
`Despite the importance of intrinsic evidence, courts may also consider extrinsic evidence—
`
`technical dictionaries, learned treatises, expert and inventor testimony, and the like—to help
`
`construe the claims. Phillips, 415 F.3d at 1317–18. For example, dictionaries may reveal what
`
`the ordinary and customary meaning of a term would have been to a person of ordinary skill in the
`
`art at the time of the invention. Frans Nooren Afdichtingssystemen B.V. v. Stopaq Amcorr
`
`Inc., 744 F.3d 715, 722 (Fed. Cir. 2014) (“Terms generally carry their ordinary and customary
`
`meaning in the relevant field at the relevant time, as shown by reliable sources such as
`
`dictionaries, but they always must be understood in the context of the whole document—in
`
`2
`
`Northern District of California
`
`United States District Court
`
`

`

`Case 3:17-cv-05659-WHA Document 374-1 Filed 02/19/19 Page 4 of 30
`Case 4:17-cv-04790-HSG Document 101 Filed 02/14/19 Page 3 of 29
`
`
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`particular, the specification (along with the prosecution history, if pertinent).”). Expert testimony
`
`can also help “to ensure that the court’s understanding of the technical aspects of the patent is
`
`consistent with that of a person of skill in the art, or to establish that a particular term in the patent
`
`or the prior art has a particular meaning in the pertinent field.” Phillips, 415 F.3d at 1318.
`
`Extrinsic evidence is, however, “less significant than the intrinsic record in determining the legally
`
`operative meaning of claim language.” Id. at 1317 (quotation omitted).
`
`II. AGREED TERMS
`
`The parties agree on the construction of three terms. JCCS at 1. In light of the parties’
`
`agreement, the Court adopts the construction of these terms as set forth in the following table:
`
`Patent
`
`Claim Term
`
`Agreed Construction
`
`’494 Patent
`
`“downloadable” [claims 1, 2, 5,
`6, 7, 10, 11, 14, 15, and 16]
`
`’494 Patent
`
`“database” [claims 1, 2, 10, and
`11]
`
`’780 Patent
`
`“downloadable” [claims 1, 2, 5,
`6, 9, 13, 14, and 18]
`
`“an executable application program,
`which is downloaded from a source
`computer and run on the destination
`computer”
`
`“a collection of interrelated data
`organized according to a database
`schema to serve one or more
`applications”
`
`“an executable application program,
`which is downloaded from a source
`computer and run on the destination
`computer”
`
`III. DISPUTED TERMS
`
`A.
`
`“suspicious computer operations” (’494 Patent)
`
`Finjan’s Construction
`
`Bitdefender’s Construction
`
`No construction necessary – Plain and
`ordinary meaning. Plain and ordinary
`meaning of “suspicious” is “hostile or
`potentially hostile.”
`
`
`
`Indefinite
`
`
`
`Alternatively, “a subset of all possible
`computer operations that have been deemed
`suspicious prior to their inclusion in the
`list”
`
`The Court adopts Finjan’s construction, finds the plain and ordinary meaning of
`
`“suspicious” is “hostile or potentially hostile,” and accordingly construes the term
`
`3
`
`Northern District of California
`
`United States District Court
`
`

`

`Case 3:17-cv-05659-WHA Document 374-1 Filed 02/19/19 Page 5 of 30
`Case 4:17-cv-04790-HSG Document 101 Filed 02/14/19 Page 4 of 29
`
`
`
`“suspicious computer operations” as “hostile or potentially hostile computer operations.”
`
`The disputed term appears in independent claims 1 and 10, and dependent claims 6 and 15
`
`of the ’494 Patent. JCCS at 1. Claim 1 is representative of how the term is used in the claim
`
`language:
`
`1. A computer-based method, comprising the steps of:
`
`receiving an incoming Downloadable;
`
`Claim 1
`
`deriving security profile data for the Downloadable, including a list of suspicious
`computer operations that may be attempted by the Downloadable; and
`
`storing the Downloadable security profile data in a database.
`
`
`Finjan asks the Court to give “suspicious computer operations” its plain and ordinary
`
`meaning, arguing that the plain meaning of “suspicious” in the context of the ’494 Patent is
`
`“hostile or potentially hostile.” Op. Br. at 3–5; Reply Br. at 1–3. Starting with the specification,
`
`Finjan notes that the ’494 Patent incorporates the ’780 Patent, which describes “suspicious”
`
`computer operations as “Operations Deemed Potentially Hostile.” See Op. Br. at 3; see also ’494
`
`Patent, 1:28–33 (incorporating the ’780 Patent by reference); ’780 Patent, 3:25–28 (“It is to be
`
`understood that the term ‘suspicious’ includes hostile, potentially hostile, undesirable, potentially
`
`undesirable, etc.”). Finjan further notes that the ’780 Patent discloses several examples of
`
`potentially hostile computer operations. See Op. Br. at 3; see also ’780 Patent, 5:55–60 (“DSP
`
`data 310 includes the list of all potentially hostile or suspicious computer operations that may be
`
`attempted by a specific Downloadable 307, and may also include the respective arguments of
`
`these operations. For example, DSP data 310 may include a READ from a specific file, a SEND
`
`to an unresolved host, etc.”), 6:1–14 (providing “An Example list of Operations Deemed
`
`Potentially Hostile”). According to Finjan’s expert, a person of ordinary skill in the art would,
`
`after reading the patentee’s specification, understand the term to possess its plain meaning: “as
`
`computer operations that are hostile or potentially hostile.” Dkt. No. 76-1 (“Medvidovic Decl.”)
`
`¶¶ 12–14.
`
`Bitdefender and its expert argue the term is indefinite because whether a computer
`
`operation is “suspicious”—or “hostile,” for that matter—“is an inherently subjective matter of
`
`4
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`Northern District of California
`
`United States District Court
`
`

`

`Case 3:17-cv-05659-WHA Document 374-1 Filed 02/19/19 Page 6 of 30
`Case 4:17-cv-04790-HSG Document 101 Filed 02/14/19 Page 5 of 29
`
`
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`opinion.” Resp. Br. at 1; Dkt. No. 81-3 (“Shaefer Decl.”) ¶ 17 (opining that “certain computer
`
`operations may be welcome in one environment, but unsafe in another”). In Bitdefender’s view,
`
`“suspicious” is just as subjective as terms previously found indefinite by the Federal Circuit.
`
`Resp. Br. at 1–2 (citing Interval Licensing LLC v. AOL, Inc., 766 F.3d 1364, 1371–74 (Fed. Cir.
`
`2014) (finding “in an unobtrusive manner” indefinite) and Datamize, LLC v. Plumtree Software,
`
`Inc., 417 F.3d 1342, 1350–56 (Fed. Cir. 2005) (finding “aesthetically pleasing look and feel”
`
`indefinite), abrogated by Nautilus, Inc. v. Biosig Instruments, Inc., 572 U.S. 898 (2014)). And as
`
`to Finjan’s reliance on the examples of suspicious computer operations in the ’780 Patent,
`
`Bitdefender responds that nonexclusive lists cannot render definite an otherwise subjective term.
`
`Id.
`
`Bitdefender alternatively argues that, if the Court finds the term definite, the Court should
`
`construe it as “a subset of all possible computer operations that have been deemed suspicious prior
`
`to their inclusion in the list.” Resp. Br. at 2. Bitdefender contends this would be consistent with
`
`the ’780 Patent’s list of operations that are “deemed potentially hostile,” as well as representations
`
`made by Finjan to the PTAB in Symantec Corp. v. Finjan, Inc., No. IPR2015-01892, 2017 WL
`
`1041718 (P.T.A.B. Mar. 15, 2017) (“Symantec IPR”). Id. at 2-3.
`
`The Court first finds the term is sufficiently definite. Contrary to Bitdefender’s arguments,
`
`the term “suspicious computer operations,” when read in light of the specification and file history,
`
`is not facially subjective to a person of ordinary skill in the art. As Finjan notes, to suggest that a
`
`person skilled in computer security somehow cannot apply the term “suspicious computer
`
`operations” without additional guidance is untenable. See Reply Br. at 1. The Court also finds
`
`Bitdefender’s purportedly comparable cases unavailing. A system displaying content in an
`
`“unobtrusive manner” or the look and feel of a kiosk screen being “aesthetically pleasing” are
`
`categorically unlike “suspicious computer operations,” which a person of ordinary skill in the art
`
`of computer security would have no issue objectively applying. See Medvidovic Decl. ¶¶ 12–14.
`
`Cf. Interval Licensing LLC, 766 F.3d at 1371–74; Datamize, LLC, 417 F.3d at 1350–56.
`
`The Court also finds that the term’s plain and ordinary meaning is “hostile or potentially
`
`hostile.” As Finjan notes, the ’494 Patent incorporates the ’780 Patent, which in turn expressly
`
`5
`
`Northern District of California
`
`United States District Court
`
`

`

`Case 3:17-cv-05659-WHA Document 374-1 Filed 02/19/19 Page 7 of 30
`Case 4:17-cv-04790-HSG Document 101 Filed 02/14/19 Page 6 of 29
`
`
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`states that “suspicious” operations are “hostile or potentially hostile.” Op. Br. at 3–5. And as
`
`Finjan’s expert explains, a skilled artisan would view the term to carry that meaning. See
`
`Medvidovic Decl. ¶¶ 12-14; Phillips, 415 F.3d at 1312–13 (instructing courts to typically give
`
`terms their ordinary and customary meaning).
`
`As to Bitdefender’s alternative proposal, the Court does not find that Finjan’s PTAB
`
`representations amounted to a disclaimer because Finjan did not directly contradict its position
`
`here. In the Symantec IPR, Finjan said, for instance, that there is “no a priori understanding of
`
`what constitutes a suspicious computer operation, but rather, some subset of all possible computer
`
`operations must first be deemed suspicious in order to derive a list of suspicious computer
`
`operations for a Downloadable.” Adamson Decl. Ex. A, at 8–9 (quotations and alterations
`
`removed). But that statement does not unambiguously contradict Finjan’s position here: that a
`
`skilled artisan would understand the term “suspicious computer operations” to mean “hostile or
`
`potentially hostile” when read in the context of the claims. See Reply Br. at 2–3.
`
`Finally, the Court observes that other judicial decisions support the Court’s conclusions
`
`here. See Finjan, Inc. v. Symantec Corp., No. 14-cv-02998-HSG, 2017 WL 550453, at *3 (N.D.
`
`Cal. Feb. 10, 2017) (“The court considers the prior claim construction order for its persuasive
`
`value, while still ultimately reaching its own independent judgment.”). For instance, in Finjan,
`
`Inc. v. Blue Coat Systems, LLC, Judge Freeman articulated this claim term as including
`
`“potentially hostile” operations. See No. 15-cv-03295-BLF, 2016 WL 7212322, at *2 (N.D. Cal.
`
`Dec. 13, 2016) (Blue Coat II). And several other courts in this district have not found this term
`
`indefinite when considering the ’494 Patent under 35 U.S.C. § 101. See Op. Br. at 4 (citing
`
`Finjan, Inc. v. Sophos, Inc., 244 F. Supp. 3d 1016, 1055–1061 (N.D. Cal. Mar. 14, 2017)).
`
`Construing U.S. Patent No. 6,092,194 (“the ’194 Patent”)—a parent of the ’494 Patent—a federal
`
`district court in Delaware gave a plain and ordinary meaning to the term “a list of suspicious
`
`computer operations that may be attempted by the Downloadable.” See Finjan, Inc. v. McAfee,
`
`Inc., No. 10-cv-00593 (GMS), 2012 WL 12905833, at *1 & n.3 (D. Del. Feb. 29, 2012) (emphasis
`
`added). In doing so, the court rejected the defendant’s proposed construction of this term as “a list
`
`of all operations that may be attempted by the received Downloadable that have been determined
`
`6
`
`Northern District of California
`
`United States District Court
`
`

`

`Case 3:17-cv-05659-WHA Document 374-1 Filed 02/19/19 Page 8 of 30
`Case 4:17-cv-04790-HSG Document 101 Filed 02/14/19 Page 7 of 29
`
`
`
`to be suspicious.” See id. at *1 n.3. The court found that Finjan had not “disavowed the plain and
`
`ordinary meaning of this term through its patent specification and prosecution history to
`
`distinguish it from the prior art.” Id. Most recently, in Finjan, Inc. v. Juniper Network, Inc.,
`
`Judge Alsup rejected an argument that “suspicious computer operations” was indefinite for being
`
`subjective—the very argument Bitdefender now advances. See No. C 17-05659 WHA, 2018 WL
`
`4184338, at *6 (N.D. Cal. Aug. 31, 2018) (Juniper).2
`
`B.
`
`“Downloadable scanner coupled with said receiver, for deriving security profile
`data for the Downloadable” (’494 Patent)
`
`Finjan’s Construction
`
`Bitdefender’s Construction
`
`No construction necessary – Plain and
`ordinary meaning.
`
`This phrase should be construed pursuant to
`35 U.S.C. § 112(6) to cover the
`corresponding structure disclosed in the
`’494 patent, namely the code scanner
`referred to in the ’194 patent at 5:36–57,
`9:20–33, and Fig. 7, and equivalents.
`
`
`
`Alternatively, “a code scanner that uses
`parsing techniques to decompose code into
`constituent operations and identifies
`specified operations or patterns of
`operations”
`
`
`
`The Court construes this term as “Downloadable software that searches code to
`
`identify suspicious patterns or suspicious computer operations, coupled with said receiver,
`
`for deriving security profile data for the Downloadable.”
`
`The disputed term appears in independent claim 10 of the ’494 Patent. JCCS at 1.
`
`//
`
`//
`
`//
`
`//
`
`
`2 Judge Alsup also construed “list of” in “list of suspicious computer operations,” and construed
`that term as a whole to be “list of computer operations in a received Downloadable that are
`deemed hostile or potentially hostile.” 2008 WL 4174338, at *3. The parties here, however, do
`not ask this Court to construe the “list of” language.
`7
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`Northern District of California
`
`United States District Court
`
`

`

`Case 3:17-cv-05659-WHA Document 374-1 Filed 02/19/19 Page 9 of 30
`Case 4:17-cv-04790-HSG Document 101 Filed 02/14/19 Page 8 of 29
`
`
`
`10. A system for managing Downloadables, comprising:
`
`a receiver for receiving an incoming Downloadable;
`
`Claim 10
`
`a Downloadable scanner coupled with said receiver, for deriving security profile data
`for the Downloadable, including a list of suspicious computer operations that may be
`attempted by the Downloadable; and
`
`a database manager coupled with said Downloadable scanner, for storing the
`Downloadable security profile data in a database.
`
`
`
`Finjan again argues that no construction is necessary, and that the Court can adopt the
`
`term’s plain and ordinary meaning. See Op. Br. at 5–7; Reply Br. 3–5. Finjan highlights that the
`
`parties have already agreed that the term “Downloadable” means an “executable application
`
`program, which is downloaded from a source computer and run on the destination computer.” See
`
`Op. Br. at 5. Finjan’s expert then opines that “a scanner is a well know[n] component in computer
`
`security and software, and has an associated structure for scanning content such as
`
`Downloadables.” See id. (citing Medvidovic Decl. ¶ 16). Finjan’s expert continues: “A scanner
`
`connotes a structure that is directed to scanning a downloadable received by the receiver.
`
`Moreover, reading the entire claim explains that it has three distinct steps: (1) a receiver receives
`
`Downloadables, (2) a scanner scans those Downloadables, and (3) a database manager stores the
`
`data obtained by the scanner in a database.” Medvidovic Decl. ¶ 17. Thus, in Finjan’s expert’s
`
`opinion, “there is no need to look any further for the structure of this term.” Id.
`
`Bitdefender argues this is a means-plus-function term subject to 35 U.S.C. § 112, despite
`
`the absence of the word “means.” See Resp. Br. at 3. And it contends that the claim terms are
`
`either purely functional (“deriving security profile data for the Downloadable”) or refer to the
`
`scanner’s “relation to other parts in the system, not its structure” (for instance, “coupled with said
`
`receiver”). Id. Bitdefender argues accordingly that the “Downloadable scanner” lacks sufficient
`
`“internal structure” to render the term definite. Id. at 4–5. Finally, Bitdefender contends that “[t]o
`
`the extent the Court finds that the features that Finjan attributed to the claims in order to defend
`
`their validity in [other matters] impart sufficient structure to avoid application of § 112, ¶ 6,” the
`
`Court should adopt the construction, “a code scanner that uses parsing techniques to decompose
`
`code into constituent operations and identifies specified operations or patterns of operations.” Id.
`
`8
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`Northern District of California
`
`United States District Court
`
`

`

`Case 3:17-cv-05659-WHA Document 374-1 Filed 02/19/19 Page 10 of 30
`Case 4:17-cv-04790-HSG Document 101 Filed 02/14/19 Page 9 of 29
`
`
`
`at 5.
`
`In assessing whether a claim invokes Section 112(6), the Court must determine if the claim
`
`limitation is drafted in the means-plus-function format. “The use of the term ‘means’ triggers a
`
`rebuttable presumption that § 112, ¶ 6 governs the construction of the claim term.” Robert Bosch,
`
`LLC v. Snap-On Inc., 769 F.3d 1094, 1097 (Fed. Cir. 2014). Conversely, there is a general
`
`presumption that the limitation does not invoke Section 112(6) where the claim language does not
`
`recite the term “means.” Id.; Zeroclick, LLC v. Apple Inc., 891 F.3d 1003, 1007 (Fed. Cir. 2018).
`
`This presumption is not strong, and it is rebuttable. Williamson v. Citrix Online, LLC, 792 F.3d
`
`1339, 1349 (Fed. Cir. 2015). “The standard is whether the words of the claim are understood by
`
`persons of ordinary skill in the art to have a sufficiently definite meaning as the name for
`
`structure.” Id. “When a claim term lacks the word ‘means,’ the presumption can be overcome and
`
`§ 112, para. 6 will apply if the challenger demonstrates that the claim term fails to ‘recite
`
`sufficiently definite structure’ or else recites ‘function without reciting sufficient structure for
`
`performing that function.”’ Id. (quoting Watts v. XL Sys., Inc., 232 F.3d 877, 880 (Fed. Cir.
`
`2000)).
`
`The Court finds that this is not a means-plus-function term subject to Section § 112(6). To
`
`begin, the claim term does not use the word “means.” “Presumptively, therefore, § 112, ¶ 6 does
`
`not apply . . . .” See Zeroclick, LLC, 891 F.3d at 1007. Nor does the term contain an equivalent
`
`nonce word for “means,” such as “module.” Cf. Williamson, 792 F.3d at 1350 (finding that
`
`“[m]odule is a well-known nonce word that can operate as a substitute for ‘means’ in the context
`
`of § 112, para. 6”); Zeroclick, LLC, 891 F.3d at 1008 (holding that a district court erred by
`
`effectively treating “program” and “user interface code” as nonce words and thus as substitutes for
`
`“means”).
`
`Bitdefender relies on Media Rights Technologies, Inc. v. Capital One Financial Corp., 800
`
`F.3d 1366, 1372 (Fed. Cir. 2015), for the proposition that “scanner” does not impart sufficient
`
`“internal structure,” but that case is inapposite in several respects. See Resp. Br. at 3–4. First, the
`
`Media Rights plaintiff did not dispute that the term to be construed—“compliance mechanism”—
`
`had “no commonly understood meaning and is not generally viewed by one skilled in the art to
`
`9
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`Northern District of California
`
`United States District Court
`
`

`

`Case 3:17-cv-05659-WHA Document 374-1 Filed 02/19/19 Page 11 of 30
`Case 4:17-cv-04790-HSG Document 101 Filed 02/14/19 Page 10 of 29
`
`
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`connote a particular structure.” Media Rights, 800 F.3d at 1372. Here, in contrast, Finjan’s expert
`
`opines that a “scanner” is recognized by those skilled in the art “as a structure for scanning a
`
`Downloadable.” See Medvidovic Decl. ¶¶ 16–17. Second, unlike in Media Rights, where the
`
`court found that the modifier “compliance” failed to impart additional structure to the term
`
`“mechanism,” the parties here agree that a “Downloadable” is “an executable application program,
`
`which is downloaded from a source computer and run on the destination computer.” Compare 800
`
`F.3d at 1373 (citing Mass. Inst. of Tech. v. Abacus Software, 462 F.3d 1344, 1354 (Fed. Cir.
`
`2006)), with JCCS at 1. Given the parties’ agreement that “Downloadable” has a tangible
`
`meaning, the Court finds that a skilled artisan could derive the proper scope of the claim term from
`
`the patent’s language.
`
`The Court also rejects Bitdefender’s alternative construction, which not only reads out
`
`several of the claim’s express elements—e.g., “Downloadable,” “security profile data,” and
`
`“coupled with said receiver”—but also reads in elements that appear nowhere in the claim
`
`language—e.g., “parsing” and “code.” For this construction, Bitdefender relies on technical
`
`dictionaries and features of the incorporated ’194 Patent. See Resp. Br. at 5. But this Court
`
`cannot sanction a wholesale reconstruction of a term on this basis, given the general proscription
`
`against importing extrinsic limitations into the claim terms. See Phillips, 415 F.3d at 1312–13.
`
`Although the Court agrees with Finjan that a skilled artisan could derive the proper scope
`
`of the claim term from the patent’s language, the Court finds deficient Finjan’s proposal that no
`
`construction is necessary. As Judge Freeman recently explained in construing “Downloadable
`
`scanner” in this claim, “[p]resenting that the scanner has a plain and ordinary meaning will not aid
`
`the jury.” Finjan, Inc. v. Cisco Sys., Inc., No. 17-cv-00072-BLF, 2018 WL 3537142, at *13 (N.D.
`
`Cal. July 23, 2018) (Cisco). And as Judge Freeman detailed, the specification of the ’194
`
`Patent—a parent of the ’494 Patent—disclosed that a code scanner “may search the code for any
`
`pattern, which is undesirable or suggests that the code was written by a hacker.” Id. (citing ’194
`
`Patent, 5:54–57). Because the scanner “may generate DSP data that includes suspicious computer
`
`operations,” Judge Freeman ultimately reasoned that a skilled artisan would understand
`
`“Downloadable scanner” to mean “software that searches code to identify suspicious patterns or
`
`10
`
`Northern District of California
`
`United States District Court
`
`

`

`Case 3:17-cv-05659-WHA Document 374-1 Filed 02/19/19 Page 12 of 30
`Case 4:17-cv-04790-HSG Document 101 Filed 02/14/19 Page 11 of 29
`
`
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`suspicious computer operations.” Id. (citing ’194 Patent, 5:50–54); see also Juniper, 2018 WL
`
`4184338, at *7–8 (adopting Cisco’s construction). The Court agrees.
`
`C.
`
` “database manager” (’494 Patent)
`
`Finjan’s Construction
`
`Bitdefender’s Construction
`
`No construction necessary – Plain and
`ordinary meaning. Plain and ordinary
`meaning of database manager is hardware
`and/or software that controls a database.
`
`
`“A program or programs that control a
`database so that the information it contains
`can be stored, retrieved, updated, and
`sorted”
`
`The Court adopts Bitdefender’s construction.
`
`The disputed term appears in independent claim 10 and dependent claim 11 of the ’494
`
`Patent. JCCS at 2. Claim 10 is representative of how the term is used in the claim language:
`
`10. A system for managing Downloadables, comprising:
`
`a receiver for receiving an incoming Downloadable;
`
`Claim 10
`
`a Downloadable scanner coupled with said receiver, for deriving security profile data for
`the Downloadable, including a list of suspicious computer operations that may be
`attempted by the Downloadable; and
`
`a database manager coupled with said Downloadable scanner, for storing the
`Downloadable security profile data in a database.
`
`
`
`Finjan again argues that no construction is necessary in view of the term’s plain and
`
`ordinary meaning: hardware and/or software that controls a database. Op. Br. at 8; Reply Br. at
`
`5–6. Finjan’s expert maintains that “database” is a well-known component in computer security
`
`and software. See Medvidovic Decl. ¶ 19. Finjan also claims that the Sophos court construed the
`
`term “database” consistent with its interpretation of “database manager” here. Op. Br. at 8; see
`
`Finjan, Inc. v. Sophos, Inc., No. 14-cv-01197-WHO, 2015 WL 890621, at *2–4 (N.D. Cal. Mar. 2,
`
`2015). The Sophos court’s construction of “database” parallels the parties’ agreed-upon
`
`construction of that term in this litigation. Compare id., with JCCS at 1 (agreeing that a
`
`“database” is “a collection of interrelated data organized according to a database schema to serve
`
`one or more applications”). And in construing “database,” the Sophos court stated that “[a]
`
`database manager uses the database to retrieve security profile data for an incoming
`
`11
`
`Northern District of California
`
`United States District Court
`
`

`

`Case 3:17-cv-05659-WHA Document 374-1 Filed 02/19/19 Page 13 of 30
`Case 4:17-cv-04790-HSG Document 101 Filed 02/14/19 Page 12 of 29
`
`
`
`Downloadable.” 2015 WL 890621, at *3. According to Finjan, it is undisputed that the
`
`“[d]atabase manager is something that ‘controls” or “manages’ a database for storing and
`
`retrieving information,” and thus any additional limitations are unnecessary. Op. Br. at 8.
`
` Finjan’s focus on the database manager’s function, however, obscures the central dispute:
`
`whether a database manager can encompass both hardware and software. Bitdefender contends
`
`that covering both is an impermissible expansion of the term that contradicts the position taken by
`
`Finjan and its expert in the Symantec IPR proceeding. Resp. Br. at 5. As Bitdefender notes,
`
`Finjan insisted in that IPR that the “database manager must be a program or programs, not
`
`hardware and/or software as it now contends.” Id. at 6 (quotations omitted). In Bitdefender’s
`
`view, that “[p]rosecution disclaimer precludes Finjan’s about-face.” Id.
`
`
`
`The Court agrees that Finjan’s position in the Symantec IPR sufficiently contradicted its
`
`current position to meet the high threshold for disavowal. See Poly-America, L.P. v. API Indus.,
`
`Inc., 839 F.3d 1131, 1136 (Fed. Cir. 2016) (“While disavowal must be clear and unequivocal, it
`
`need not be explicit.”). In arguing for the patentability of the claimed “database manager” over
`
`Morton Swimmer et al. Dynamic Detection and Classification of Computer Viruses Using General
`
`Behaviour Patterns (“Swimmer”), Finjan stated:
`
`[A] person skilled in the art at the time would understand the term
`database manager to mean a program or programs that control a
`database so that the information it contains can be stored, retrieved,
`updated and sorted, which definition is consistent with Dr.
`Davidson’s parenthetical definition of the term, a component that
`manages and controls the storage and retrieval of data in the database,
`but Swimmer does not have [such] a program or programs . . . .
`
`Symantec IPR, 2017 WL 1041718, at *20 (quotations omitted). Similarly, under the heading
`
`“Swimmer does not teach or suggest ‘database manager coupled with said downloadable scanner,
`
`for storing the downloadable security profile data in a database,’” Finjan’s expert opined in a
`
`declaration:
`
`
`
`
`159. I understand Petitioner and Dr. Davidson identify Swimmer’s
`“audit system or a portion thereof” as the claimed “database
`manager.” A person skilled in the art at the time would understand
`database manager to mean “a program or programs that control a
`database so that the information it contains can be stored, retrieved,
`updated and sorted.
`
`12
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket