throbber
Case 3:17-cv-05659-WHA Document 393 Filed 03/14/19 Page 1 of 45
`
`
`
`PAUL ANDRE (State Bar No. 196585)
`pandre@kramerlevin.com
`LISA KOBIALKA (State Bar No. 191404)
`lkobialka@kramerlevin.com
`JAMES HANNAH (State Bar No. 237978)
`jhannah@kramerlevin.com
`KRISTOPHER KASTENS (State Bar No. 254797)
`kkastens@kramerlevin.com
`KRAMER LEVIN NAFTALIS & FRANKEL LLP
`990 Marsh Road
`Menlo Park, CA 94025
`Telephone: (650) 752-1700
`Facsimile: (650) 752-1800
`
`Attorneys for Plaintiff
`FINJAN, INC.
`
`
`IN THE UNITED STATES DISTRICT COURT
`
`FOR THE NORTHERN DISTRICT OF CALIFORNIA
`
`SAN FRANCISCO DIVISION
`
`FINJAN, INC., a Delaware Corporation,
`
`
`
`
`
`
`Plaintiff,
`
`v.
`
`
`JUNIPER NETWORKS, INC., a Delaware
`Corporation,
`
`
`Defendant.
`
`
`
`Case No.: 3:17-cv-05659-WHA
`
`PLAINTIFF FINJAN, INC.’S OPPOSITION
`TO DEFENDANT JUNIPER NETWORKS,
`INC.’S MOTION FOR SUMMARY
`JUDGMENT
`
`Date:
`Time:
`Courtroom:
`Before:
`
`
`May 2, 2019
`8:00 a.m.
`Courtroom 12, 19th Floor
`Hon. William Alsup
`
`
`
`
`
`
`
`REDACTED VERSION OF DOCUMENT SOUGHT TO BE SEALED
`
`FINJAN’S OPPOSITION TO JUNIPER’S
`MOTION FOR SUMMARY JUDGMENT
`
`
`
`CASE NO. 3:17-cv-05659-WHA
`
`1 2 3 4 5 6 7 8 9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`

`

`Case 3:17-cv-05659-WHA Document 393 Filed 03/14/19 Page 2 of 45
`
`TABLE OF CONTENTS
`
`STATEMENT OF THE ISSUES TO BE DECIDED............................................................................... i(cid:3)
`
`I.(cid:3)
`
`II.(cid:3)
`
`INTRODUCTION ....................................................................................................................... 1(cid:3)
`
`BACKGROUND ......................................................................................................................... 2(cid:3)
`
`A.(cid:3)
`
`B.(cid:3)
`
`C.(cid:3)
`
`D.(cid:3)
`
`E.(cid:3)
`
`Overview of the ‘780 Patent and the Elements of Claim 9 ............................................... 2(cid:3)
`
`Claim 9 of the ‘780 Patent ................................................................................................ 2(cid:3)
`
`Claim Construction ........................................................................................................... 3(cid:3)
`
`1.(cid:3)
`
`2.(cid:3)
`
`“Performing a hashing function on the Downloadable and the fetched
`software components to generate a Downloadable ID” ........................................ 3(cid:3)
`
`“Fetching at least one software component identified by the one or more
`references” ............................................................................................................ 4(cid:3)
`
`Benefits of the ‘780 Patent ................................................................................................ 9(cid:3)
`
`Overview of Juniper’s Accused Products ....................................................................... 10(cid:3)
`
`1.(cid:3)
`
`2.(cid:3)
`
`Juniper’s Acquisition of the ATP Appliance and Finjan’s Notice to
`Cyphort ............................................................................................................... 10(cid:3)
`
`Functionality of the ATP Appliance ................................................................... 12(cid:3)
`
`III.(cid:3)
`
`JUNIPER’S MOTION FAILS BECAUSE ITS PRODUCTS INFRINGE CLAIM 9 .............. 13(cid:3)
`
`A.(cid:3)
`
`The ATP Appliance Infringes Claim 9 of the ‘780 Patent .............................................. 13(cid:3)
`
`1.(cid:3)
`
`2.(cid:3)
`
`3.(cid:3)
`
`Preamble – “A system for generating a Downloadable ID to identify a
`Downloadable, comprising:” .............................................................................. 14(cid:3)
`
`Element 9(a) – “a communications engine for obtaining a Downloadable
`that includes one or more references to software components required to
`be executed by the Downloadable” ..................................................................... 14(cid:3)
`
`Element 9(b) – “an ID generator coupled to the communications engine
`that fetches at least one software component identified by the one or
`more references, and for performing a hashing function on the
`Downloadable and the fetched software components to generate a
`Downloadable ID” .............................................................................................. 16(cid:3)
`
`B.(cid:3)
`
`C.(cid:3)
`
`Juniper’s Non-Infringement Arguments ......................................................................... 17(cid:3)
`
`Doctrine of Equivalents .................................................................................................. 20(cid:3)
`
`FINJAN’S OPPOSITION TO JUNIPER’S
`MOTION FOR SUMMARY JUDGMENT
`
`i
`
`CASE NO. 3:17-cv-05659-WHA
`
`1 2 3 4 5 6 7 8 9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`

`

`Case 3:17-cv-05659-WHA Document 393 Filed 03/14/19 Page 3 of 45
`
`IV.(cid:3)
`
`CLAIM 9 IS ELIGIBLE UNDER 35 U.S.C. § 101................................................................... 20(cid:3)
`
`A.(cid:3)
`
`Claim 1 Is Directed to a Non-Abstract Idea at Step 1 ..................................................... 21(cid:3)
`
`1.(cid:3)
`
`The ’780 Patent Is Directed To Improvements In Computer
`Functionality. ...................................................................................................... 21(cid:3)
`
`a)(cid:3)
`
`b)(cid:3)
`
`Claim 9 Is A Specific Departure From Prior Techniques. ...................... 24(cid:3)
`
`Juniper’s Arguments Mischaracterize the Invention of Claim 9. ........... 25(cid:3)
`
`B.(cid:3)
`
`C.(cid:3)
`
`Claim 1 Contains Inventive Concepts ............................................................................. 29(cid:3)
`
`Questions of Material Fact Preclude Juniper’s Section 101 Challenge of Claim 9 ........ 30(cid:3)
`
`V.(cid:3)
`
`FINJAN COMPLIED WITH 35 U.S.C. § 287 AND IS ENTITLED TO PRE-SUIT
`DAMAGES ................................................................................................................................ 31(cid:3)
`
`VI.(cid:3)
`
`CONCLUSION .......................................................................................................................... 36(cid:3)
`
`
`
`FINJAN’S OPPOSITION TO JUNIPER’S
`MOTION FOR SUMMARY JUDGMENT
`
`ii
`
`CASE NO. 3:17-cv-05659-WHA
`
`1 2 3 4 5 6 7 8 9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`

`

`Case 3:17-cv-05659-WHA Document 393 Filed 03/14/19 Page 4 of 45
`
`TABLE OF AUTHORITIES
`
`
`
`Page(s)
`
`Cases
`
`24/7 Customer, Inc. v. LivePerson, Inc.,
`No. 15-cv-02897-JST, 2017 WL 2311272 (N.D. Cal. May 25, 2017) .............................................25
`
`Aatrix Software, Inc. v. Green Shades Software, Inc.,
`882 F.3d 1121 (Fed. Cir. 2018).........................................................................................................31
`
`Accent Packaging, Inc. v. Leggett & Platt, Inc.,
`707 F.3d 1318 (Fed. Cir. 2013)...........................................................................................................7
`
`Accuscan, Inc. v. Xerox Corp.,
`No. 96 CIV. 2579(HB), 1998 WL 60991 (S.D.N.Y. Feb. 11, 1998) ................................................35
`
`Alice Corp. v. CLS Bank Int'l,
`134 S.Ct. 2347 (2014) ...........................................................................................................20, 24, 25
`
`Ancora Techs., Inc. v. HTC Am., Inc.,
`908 F.3d 1343 (Fed. Cir. 2018).......................................................................................20, 24, 27, 29
`
`Anderson v. Liberty Lobby, Inc.,
`477 U.S. 242 (1986) ..........................................................................................................................13
`
`Arctic Cat Inc. v. Bombardier Recreational Prod. Inc.,
`876 F.3d 1350 (Fed. Cir. 2017).............................................................................................31, 34, 35
`
`Bascom Global Internet Servs., Inc. v. AT&T Mobility LLC,
`827 F.3d 1341 (Fed. Cir. 2016)...................................................................................................21, 30
`
`Berkheimer v. HP Inc.,
`881 F.3d 1360 (Fed. Cir. 2018).............................................................................................21, 30, 31
`
`Blitzsafe Texas, LLC v. Honda Motor Co.,
`No. 2:15-cv-1274-JRG-RSP, 2017 U.S. Dist. LEXIS 58358 (E.D. Tex. Jan. 26,
`2017) ...........................................................................................................................................35, 36
`
`Brocade Commc’ns Sys., Inc. v. A10 Networks, Inc.,
`873 F. Supp. 2d 1192 (N.D. Cal. 2012) ............................................................................................13
`
`Content Extraction & Transmission LLC v Wells Fargo Bank, Nat’l Ass’n,
`776 F.3d 1343 (Fed. Cir. 2014).........................................................................................................26
`
`Core Wireless Licensing S.A.R.L. v. LG Elecs., Inc.,
`880 F.3d 1356 (Fed. Cir. 2018).........................................................................................................20
`
`FINJAN’S OPPOSITION TO JUNIPER’S
`MOTION FOR SUMMARY JUDGMENT
`
`i
`
`CASE NO. 3:17-cv-05659-WHA
`
`1 2 3 4 5 6 7 8 9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`

`

`Case 3:17-cv-05659-WHA Document 393 Filed 03/14/19 Page 5 of 45
`
`Crane Security Techs., Inc. v. Rolling Optics AB,
`No. 14-12428-LTS, 2018 WL 575697 (D.Mass. Jan. 26, 2018) ......................................................33
`
`Creo Prods., Inc. v. Presstek, Inc.,
`305 F.3d 1337 (Fed. Cir. 2002).........................................................................................................20
`
`DDR Holdings, LLC v. Hotels.com, L.P.,
`773 F.3d 1245 (Fed. Cir. 2014)...................................................................................................23, 28
`
`Eastman Kodak Co. v. GAF Corp.,
`No. 75 Civ. 925, 1977 WL 22726 (S.D.N.Y. 2000) .........................................................................33
`
`Elec. Power Group, LLC v. Alstom S.A.,
`830 F.3d 1350 (Fed. Cir. 2016).........................................................................................................26
`
`Enfish, LLC v. Microsoft Corp.,
`822 F.3d 1327 (Fed. Cir. 2016).........................................................................................................23
`
`Exergen Corp. v. Kaz USA, Inc.,
`725 Fed. App’x 959 (Fed. Cir. 2018) ................................................................................................31
`
`Finjan Inc. v. Bitdefender, Inc.,
`No. 17-cv-04790-HSG, Dkt. No. 101 (N.D. Cal. February 14, 2019) ............................................4, 6
`
`Finjan, Inc. v. Blue Coat Sys., Inc.,
`879 F.3d 1299 (Fed. Cir. 2018)................................................................................................. passim
`
`Finjan, Inc. v. Blue Coat Sys., Inc.,
`No. 13-cv-03999-BLF, 2015 WL 3630000 (N.D. Cal. June 2, 2015) ................................................4
`
`Finjan, Inc. v. Cisco, Inc.,
`No. 17-cv-00072-BLF, Dkt. No. 134 (N.D. Cal July 22, 2018) .........................................................6
`
`Finjan, Inc. v. Cisco Systems, Inc.,
`No. 17-cv-00072-BLF, 2018 WL 3537142 (N.D. Cal July 23, 2018) ................................................4
`
`Finjan, Inc. v. Proofpoint, Inc.,
`No. 13-cv-05808-HSG, 2015 WL 7770208 (N.D. Cal. Dec. 3, 2005) ...........................................4, 8
`
`Intellectual Ventures I LLC v. Capital One Financial Corp.,
`850 F.3d 1332 (Fed. Cir. 2017).........................................................................................................26
`
`Intellectual Ventures I LLC v. Erie Indemnity Co.,
`200 F. Supp. 3d 565 (W.D. Penn. 2016) .....................................................................................26, 27
`
`Intellectual Ventures I LLC v. Symantec Corp.,
`100 F. Supp. 3d 371 (D. Del. 2015), reversed in part on other grounds by
`Intellectual Ventures I LLC v. Symantec Corp., 838 F.3d 1307 (Fed. Cir. 2016) ............................27
`
`FINJAN’S OPPOSITION TO JUNIPER’S
`MOTION FOR SUMMARY JUDGMENT
`
`ii
`
`CASE NO. 3:17-cv-05659-WHA
`
`1 2 3 4 5 6 7 8 9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`

`

`Case 3:17-cv-05659-WHA Document 393 Filed 03/14/19 Page 6 of 45
`
`Intellectual Ventures I LLC v. Symantec Corp,
`838 F.3d 1307 (Fed. Cir. 2016)...................................................................................................28, 29
`
`KSR Int’l Co. v. Teleflex Inc.,
`550 U.S. 398 (2007) ..........................................................................................................................28
`
`Landmark Tech. LLC v. Assurant, Inc.,
`No. 15-cv-76-RWS-SDL, 2015 WL 4388311 (E.D. Tex. July 14, 2015) ........................................27
`
`Maudlin v. Pac. Decision Scis. Corp.,
`137 Cal. App. 4th 1001 (2006) .........................................................................................................33
`
`Maxwell v. J. Baker, Inc.,
`86 F.3d 1098 (Fed. Cir. 1996)...........................................................................................................33
`
`McRO, Inc. v. Bandai Namco Games Am. Inc.,
`837 F.3d 1299 (Fed. Cir. 2016).........................................................................................................23
`
`Moe v. Transamerica Title Ins. Co.,
`21 Cal. App. 3d 289 (1971) ..............................................................................................................33
`
`Novo Nordisk A/S v. Becton Dickinson & Co.,
`96 F. Supp. 2d 309 (S.D.N.Y. 2000), aff'd, 304 F.3d 1216 (Fed. Cir. 2002) ...................................33
`
`Palo Alto Networks, Inc. v. Finjan, Inc.,
`IPR2016-00165, Paper 7 (P.T.A.B. Apr. 21, 2016) ..................................................22, 23, 25, 30, 31
`
`Realtime Data, LLC v. Actian Corp.,
`No. 15-cv-463 RWS-JDL, 2017 U.S. Dist. LEXIS 56950 (E.D.Tex. April 4, 2017) .................35, 36
`
`RecogniCorp, LLC v. Nintendo Co.,
`855 F.3d 1322 (Fed. Cir. 2017)...................................................................................................28, 29
`
`SRI Int’l v. Matsushita Elec. Corp.,
`775 F.2d 1107 (Fed. Cir. 1985).........................................................................................................20
`
`Symantec Corp. v. Zscaler, Inc.,
`No. 17-cv-04426-JST, 2018 WL 1456678 (N.D. Cal. Mar. 23, 2018) .................................27, 29, 30
`
`Thales Visionix Inc. v. United States,
`850 F.3d 1343 (Fed. Cir. 2017)...................................................................................................25, 28
`
`Trading Techs. Int'l, Inc. v. CQG, Inc.,
`675 F. App’x 1001 (Fed. Cir. 2017) ...............................................................................20, 21, 23, 28
`
`Tranxition, Inc. v. Lenovo (U.S.) Inc.,
`No. 12-cv-01065-HZ, 2015 WL 4203469 (D. Or. July 9, 2015) ......................................................27
`
`FINJAN’S OPPOSITION TO JUNIPER’S
`MOTION FOR SUMMARY JUDGMENT
`
`iii
`
`CASE NO. 3:17-cv-05659-WHA
`
`1 2 3 4 5 6 7 8 9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`

`

`Case 3:17-cv-05659-WHA Document 393 Filed 03/14/19 Page 7 of 45
`
`Von Holdt v. A-1 Tool Corp.,
`714 F. Supp. 2d 863 (N.D. Cal. 2010) ..............................................................................................32
`
`Wine Ry. Appliance Co. v. Enter. Ry. Equip. Co.,
`297 U.S. 387 (1936) ..........................................................................................................................36
`
`Statutes
`
`35 U.S.C. § 101 ............................................................................................................................... passim
`
`35 U.S.C. § 287 ............................................................................................................................... passim
`
`35 U.S.C. § 287(a) ............................................................................................................................33, 36
`
`
`
`FINJAN’S OPPOSITION TO JUNIPER’S
`MOTION FOR SUMMARY JUDGMENT
`
`iv
`
`CASE NO. 3:17-cv-05659-WHA
`
`1 2 3 4 5 6 7 8 9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`

`

`Case 3:17-cv-05659-WHA Document 393 Filed 03/14/19 Page 8 of 45
`
`STATEMENT OF THE ISSUES TO BE DECIDED
`
`1.
`
`Whether the Court should deny Juniper’s Motion for Summary Judgment (the
`
`“Motion”) because Juniper infringes Claim 9 of U.S. Patent No. 6,804,780 (the “‘780 Patent”), or at
`
`least there are issues of material fact that require Juniper’s Motion be denied.
`
`2.
`
`Whether the Court should deny Juniper’s Motion because Claim 9 of the ‘780 Patent is
`
`non-abstract and patent eligible.
`
`3.
`
`Whether the Court should deny Juniper’s Motion seeking to improperly limit damages
`
`for infringement, because Juniper’s argument under 35 U.S.C. § 287 is not a proper subject for this
`
`Motion, and in any event material facts exist that require Juniper’s Motion be denied.
`
`
`
`FINJAN’S OPPOSITION TO JUNIPER’S
`MOTION FOR SUMMARY JUDGMENT
`
`i
`
`CASE NO. 3:17-cv-05659-WHA
`
`1 2 3 4 5 6 7 8 9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`

`

`Case 3:17-cv-05659-WHA Document 393 Filed 03/14/19 Page 9 of 45
`
`I.
`
`INTRODUCTION
`Juniper’s ATP Appliance infringes Claim 9 of the ‘780 Patent because it includes a
`
`“communications engine” that obtains executable files with references to other software components,
`
`and also an “ID generator” that fetches those components so that the Downloadable and its components
`
`can be hashed together to generate a single ID that identifies both the Downloadable and its
`
`components.
`
`Juniper’s ATP Appliance, a product that was not at issue in the first showdown procedure
`
`pursuant to Court Order (Dkt. No. 85 at 4), infringes because it has “collectors” that operate as a
`
`“communications engine” to obtain Downloadables and software components referenced by the
`
`Downloadables. The ATP Appliance is
`
`
`
`, including information that contains executable code, i.e., a
`
`“Downloadable.” The ATP Appliance also has an “ID generator” because it fetches these
`
`Downloadables and their referenced software components from the collectors, and uses this
`
`information to generate a single hash value that operates to identify that Downloadable and its fetched
`
`components.
`
`Further, Claim 9 of the ‘780 Patent is patent eligible under 35 U.S.C. § 101. Claim 9 is not
`
`abstract at Step 1 because it is directed to an improvement in computer function, and specifically an
`
`improvement in computer security, which the Federal Circuit consistently holds is patent eligible.
`
`Although this inquiry should end at Step 1, Claim 9 also contains an inventive concept at Step 2
`
`because at the time of the invention no one knew how to protect against these new types of files called
`
`Donwloadables or to perform hashing on the Downloadable and its fetched components. Prior
`
`identification techniques were signature-based. At the very least, material questions of fact exist as to
`
`whether the combination of Claim 9’s elements was well-understood, routine, and conventional at the
`
`time, therefore summary judgment must be denied.
`
`Finally, Juniper’s argument regarding notice under 35 U.S.C. § 287 is an improper argument for
`
`this special early summary judgment procedure, as it is raising a defense to damages, and not
`
`addressing the liability issues which this procedure was intended to cover. Furthermore, Finjan
`
`FINJAN’S OPPOSITION TO JUNIPER’S
`MOTION FOR SUMMARY JUDGMENT
`
`1
`
`CASE NO. 3:17-cv-05659-WHA
`
`1 2 3 4 5 6 7 8 9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`

`

`Case 3:17-cv-05659-WHA Document 393 Filed 03/14/19 Page 10 of 45
`
`specifically identified the ‘780 Patent as infringing the ATP Appliance during a power point
`
`presentation with Cyphort, the predecessor company that developed and sold the ATP Appliance before
`
`Juniper acquired Cyphort. Over the next two years of licensing negotiations, Finjan held discussions
`
`with Cyphort on a license to Finjan’s patents, including the ‘780 Patent, for the ATP Appliance. Those
`
`negotiations ended abruptly when Juniper bought Cyphort in September 2017. Juniper incorporated
`
`and made, used, sold and offered for sale the ATP Appliance after this acquisition.
`
`II.
`
`BACKGROUND
`
`Overview of the ‘780 Patent and the Elements of Claim 9
`A.
`The ’780 Patent describes protecting computer systems against a brand new class of threats that
`
`were never thought to be harmful, specifically “Downloadables,” which are executable application
`
`programs that are downloaded from a remote server and run on a destination computer. Dkt. No. 371-
`
`5, ‘780 Patent, Col. 1, ll. 36-63 (“However, these [prior art] security systems are not configured to
`
`recognize computer viruses which have been attached to or configured as Downloadable application
`
`programs, commonly referred to as ‘Downloadables.’ A Downloadable is an executable application
`
`program which is downloaded from a source computer and run on the destination computer . . .
`
`Therefore, a system and method are needed to protect a network from hostile Downloadables.”). A
`
`Downloadable may identify various software components that are called during execution.
`
`Declaration of Michael Mitzenmacher in Support of Finjan’s Opposition to Juniper’s Motion for
`
`Summary Judgment (“Mitz. Decl.”) filed herewith, ¶ 11; ‘780 Patent, Abstract.
`
`Claim 9 of the ‘780 Patent
`B.
`The ‘780 Patent describes a system with a component for obtaining Downloadables and a
`
`component for generating an ID for a Downloadable with at least one referenced software component.
`
`Claim 9 of the ‘780 Patent, in particular, describes a system with two components: (1) a
`
`“communications engine” for obtaining a Downloadable and an (2) “ID generator” that fetches “at
`
`least one” software component identified by the references, and performs a hashing function on the
`
`Downloadable and the fetched software component to generate a Downloadable ID. ‘780 Patent,
`
`Claim 9. The ‘780 Patent describes the communication engine as an “external communications
`
`FINJAN’S OPPOSITION TO JUNIPER’S
`MOTION FOR SUMMARY JUDGMENT
`
`2
`
`CASE NO. 3:17-cv-05659-WHA
`
`1 2 3 4 5 6 7 8 9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`

`

`Case 3:17-cv-05659-WHA Document 393 Filed 03/14/19 Page 11 of 45
`
`interface 210 coupled between the communications channel 125 and the signal bus 220 for receiving
`
`Downloadables from external computer network 105.” ‘780 Patent, Col. 3, ll. 36-40. Therefore, the
`
`communications engine is described as the component that downloads files like Java Applets or HTML
`
`code from the Internet. See id., Claims 10 and 13. Next, the ‘780 Patent describes the ID generator as
`
`a component for creating a Downloadable ID that can be used to identify the Downloadable to
`
`determine if the Downloadable is already known to the system, and therefore does not require
`
`additional analysis. In particular, the “[t]he ID generator 315 receives a Downloadable (including the
`
`URL from which it came and the userID of the intended recipient) from the external computer network
`
`105 via the external communications interface 210, and generates a Downloadable ID for identifying
`
`each Downloadable.” ‘780 Patent, Col. 4, ll. 50-54. The ID generator is described in the specification
`
`of the ‘780 Patent as the component that “preferably prefetches all components embodied in or
`
`identified by the code for Downloadable ID generation.” ‘780 Patent, Col. 4, ll. 56-58. Notably,
`
`Claim 9 of the ‘780 Patent does not require that all components of the Downloadable to be fetched, but
`
`only at least one component.
`
`C.
`
`Claim Construction
`
`1.
`
`“Performing a hashing function on the Downloadable and the fetched
`software components to generate a Downloadable ID”
`For the purposes of this Opposition, Finjan applies the Court’s construction of “performing a
`
`hashing function on the Downloadable and the fetched software components” as “performing a
`
`hashing function on the Downloadable together with its fetched software components to generate a
`
`single hash value that identifies the contents of both the Downloadable and the fetched components.”
`
`Dkt. No. 180 at 10. Although it applied the Court’s construction herein, Finjan maintains the same
`
`objections to this construction, as set forth previously. Dkt. No. 129 at *12-14. Finjan, thus, reserves
`
`all rights to appeal the Court’s construction on the same grounds based on the arguments raised
`
`previously in connection with Claim 1 of the ‘780 Patent. Further, Finjan reserves all rights to raise
`
`additional infringement positions Finjan disclosed for Claim 9 of the ’780 Patent, applying Finjan’s
`
`construction of this term. Finjan’s construction for this term is the same as previous constructions
`
`FINJAN’S OPPOSITION TO JUNIPER’S
`MOTION FOR SUMMARY JUDGMENT
`
`3
`
`CASE NO. 3:17-cv-05659-WHA
`
`1 2 3 4 5 6 7 8 9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`

`

`Case 3:17-cv-05659-WHA Document 393 Filed 03/14/19 Page 12 of 45
`
`applied to this element. See Finjan Inc. v. Bitdefender, Inc., No. 17-cv-04790-HSG, Dkt. No. 101 at
`
`*14-16 (N.D. Cal. February 14, 2019)(“Bitdefender”)(declining to order that the Downloadable ID
`
`must consist of a single hash value)(citing and following the following claim construction orders:
`
`Finjan, Inc. v. Blue Coat Sys., Inc., No. 13-cv-03999-BLF, 2015 WL 3630000, at *6 (N.D. Cal. June 2,
`
`2015) and Finjan, Inc. v. Cisco Systems, Inc., No. 17-cv-00072-BLF, 2018 WL 3537142, at *13–14
`
`(N.D. Cal. July 23, 2018)). Thus, Juniper’s Sky ATP and ATP Appliance both infringe because they
`
`fetch software components that are
`
`
`
`. Dkt. No. 129 at *14-21.
`
`This understanding is consistent with the specification, which states that a “hash value” can be part of a
`
`Downloadable ID, but does not require that the entire Downloadable ID be single hash value. See, for
`
`example, ‘780 Patent, Col. 4, l. 50–Col. 5. l. 3; see also Bitdefender, Dkt. No. 101 at *14-16.
`
`2.
`
`“Fetching at least one software component identified by the one or more
`references”
`As Finjan previously set forth in its opposition to Juniper’s Motion for Summary Judgment on
`
`Claim 1 of the ‘780 Patent (Dkt. No. 129 at *9-11), the Court should find that this term has its plain
`
`and ordinary meaning because it is written in understandable language that does not require
`
`construction. “These are ordinary, simple English words whose meaning is clear and unquestionable
`
`. . . They mean exactly what they say.” Finjan, Inc. v. Proofpoint, Inc., No. 13-cv-05808-HSG, 2015
`
`WL 7770208, at *9 (N.D. Cal. Dec. 3, 2005)(“Proofpoint”)(citing Chef Am., Inc. v. Lamb-Weston,
`
`Inc., 358 F.3d 1371, 1373 (Fed. Cir. 2004)). While Finjan does not believe that the term necessarily
`
`requires any construction, “retrieving” may provide the factfinder with additional clarity when
`
`applying the term.
`
`The plain and ordinary meaning of this term is what the claim term recites: that the ID
`
`generator will fetch (or retrieve) at least one software component identified by one or more references
`
`in the Downloadable. Mitz. Decl., ¶ 32. This process is set out in the claims to be performed by the
`
`ID generator, a separate component form the communications engine that originally obtained the
`
`Downloadable for processing, but Claim 9 does not otherwise limit what it means to for the ID
`
`FINJAN’S OPPOSITION TO JUNIPER’S
`MOTION FOR SUMMARY JUDGMENT
`
`4
`
`CASE NO. 3:17-cv-05659-WHA
`
`1 2 3 4 5 6 7 8 9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`

`

`Case 3:17-cv-05659-WHA Document 393 Filed 03/14/19 Page 13 of 45
`
`Generator to “fetch” these software components so that they can be used as part of creating a
`
`Downloadable ID. This process performed by the ID generator is described with examples in the
`
`specification, where the ‘780 Patent states that “[t]he ID generator 315 preferably prefetches all
`
`components embodied in or identified by the code for the Downloadable ID generation.” ‘780 Patent,
`
`Col. 4, ll. 56-58. As shown, the ‘780 Patent specifically discloses fetching components that are
`
`“embodied” in the Downloadable, where the term “embodied” is consistently used throughout the
`specification of the ‘780 Patent to mean included in the code for the received Downloadable.1
`Similarly, the ‘780 Patent’s specification uses the term “embodied in” to describe certificates that are
`
`included with the received Downloadable and can be scanned to determine if the Downloadable was
`
`“signed” by a trusted authority. ‘780 Patent, Col. 2, ll. 22-24 (“(4) a comparison of a certificate
`
`embodied in the Downloadable against trusted certificates”). These certificates that are “embodied” in
`
`the Downloadable are included as part of the Downloadable and can be scanned. ‘780 Patent, Col. 6,
`
`ll. 39-43 (“In path 3, the certificate scanner 340 determines whether the received Downloadable was
`
`signed by a certificate authority, such as VeriSign, Inc., and scans for a certificate embodied in the
`
`Downloadable. The certificate scanner 340 forwards the found certificate to the certificate comparator
`
`345.” (Explaining that in 1996 VeriSign certificates are attached to files for signing); Mitz. Decl., ¶ 38.
`
`Juniper’s expert, Dr. Rubin, admitted that where the ‘780 Patent uses the term “embodied in” with
`
`reference to certificates, such as those signed by Verisign, Inc., it means that those certificates are
`
`transmitted with or inside the downloadable. Ex. 1, Rubin 3/9/19 Tr.at 60:8-20.
`
`Additionally, this understanding is consistent with examples provided in the specification of the
`
`‘780 Patent, where the ‘780 Patent describes a “Downloadable” as a “Java Applet.” ‘780 Patent, Col.
`
`1, ll. 55-56. As was known to those of skill in the art, Java Applets can be distributed as a JAR file (a
`
`“Java ARchive”), which include multiple referenced software components in a single JAR file. Mitz.
`
`Decl., ¶ 40; Dkt. 129-12, Java in a Nutshell at 100 (“all (or many) of the files an applet needs can be
`
`combined into a single JAR file, which a applet viewer or Web browser can download with a single
`
`
`1 The American Heritage Dictionary defines “embody” as “1. To give bodily form to. 2. to personify.
`3. to make part of a system or whole; incorporate.” Ex. 25 at 282.
`5
`
`CASE NO. 3:17-cv-05659-WHA
`
`FINJAN’S OPPOSITION TO JUNIPER’S
`MOTION FOR SUMMARY JUDGMENT
`
`1 2 3 4 5 6 7 8 9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`

`

`Case 3:17-cv-05659-WHA Document 393 Filed 03/14/19 Page 14 of 45
`
`HTTP request.”). For this Java Applet, multiple classes are aggregated into a single file for
`
`distribution, and can be referenced as a single file. Mitz. Decl., ¶¶ 40-41, 54. This understanding
`
`makes sense and is consistent with Claim 1 because when a JAR (a file with a .jar extension) file is
`
`first used it is “extracted,” thereby causing multiple class files to be exposed from a single file so that
`
`they can be retrieved to build the Java Applet. Mitz. Decl., ¶¶ 41, 60; Dkt. 129-12, Java in a Nutshell
`
`at 99-100. In fact, this is the same understanding of the patent as ascribed by the inventor, Shlomo
`
`Touboul, who was asked about what it meant for a Java applet to “reference” other Java classes, and
`
`Mr. Touboul responded that in the context of the ‘780 Patent, the “[Java Applet] can include class –
`
`other classes inside. It can be in a .jar file, if you know what’s a .jar. file.” Ex. 2, Touboul 7/23/18
`
`Eset Tr. at 156:2-16. As such, the specification supports that “fetching at least one software
`
`component identified by the one or more references” includes the fetching of a software component
`
`that is identified by a reference internal (i.e. embodied in) the Downloadable.
`
`Similarly, the ‘780 Patent identifies Downloadables as including HTML, which references
`
`scripts (like JavaScript and VBScript) as internal or separate software components using the same
`
`“<SCRIPT>” tags and are identified in the same way. ‘780 Patent, Claim 5 (Downloadable includes
`
`HTML); Dkt. 129-11, JavaScript for Dummies at 14-15 (“You can use <SCRIPT> and </SCRIPT>
`
`tags to include JavaScript code directly into an HTML file … [or] to include a separate exter

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket