throbber
Case 3:17-cv-05659-WHA Document 500-7 Filed 05/30/19 Page 1 of 16
`Case 3:17-cv-05659-WHA Document 500-7 Filed 05/30/19 Page 1 of 16
`
`EXHIBIT 19
`
`UNREDACTED VERSION OF
`DOCUMENT SOUGHT TO BE
`SEALED
`
`

`

`FOR THE NORTHERN DISTRICT OF CALIFORNIA
`
`SAN FRANCISCO DIVISION
`
`Case No.: 3:17-cv-05659-WHA
`
`FINJAN,
`
`INC., a Delaware Corporation,
`
`Plaintiff,
`
`V.
`
`JUNIPER NETWORKS,
`
`INC., a Delaware
`
`Corporation,
`
`Defendant.
`
`AUDIO-VISUAL DEPOSITION OF
`
`MICHAEL D. MITZENMACHER
`
`** HIGHLY CONFIDENTIAL **
`
`July 3, 2018
`
`9:32 a.m.
`
`Esquire Deposition Solutions
`
`50 Federal Street, 6th Floor
`
`Boston, Massachusetts
`
`Kristin M. Kelley, RPR, CRR
`
`
`
`
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`Ze
`
`23
`
`24
`
`
`
`Case 3:17-cv-05659-WHA Document 500-7 Filed 05/30/19 Page 2 of 16
`Case 3:17-cv-05659-WHA Document 500-7 Filed 05/30/19 Page 2 of 16
`
`July 03, 2018
`MICHAEL D. MITZENMACHER Highly Confidential
`FINJAN V. JUNIPER NETWORKS
`1
`
`IN THE UNITED STATES DISTRICT COURT
`
`
`
`BQ ESQUIRE
`
`Derositiow soLUTIONS
`
`800.211.DEPO (3376)
`
`EsquireSolutions.com
`
`

`

`Case 3:17-cv-05659-WHA Document 500-7 Filed 05/30/19 Page 3 of 16
`Case 3:17-cv-05659-WHA Document 500-7 Filed 05/30/19 Page 3 of 16
`
`July 03, 2018
`MICHAEL D. MITZENMACHER Highly Confidential
`124
`FINJAN V. JUNIPER NETWORKS
`
`and ordinary meaning could benefit from
`
`explanation and I provide particular
`
`explanation in paragraphs 39 to 41. But in
`
`particular in paragraph 39 I point out that
`
`this term has been construed before with a
`
`construction adopted by multiple courts
`
`00:
`
`:19
`
`00:
`
`:2l
`
`00:
`
`129
`
`00:
`
`232
`
`00;
`
`235
`
`00:
`
`38
`
`which I think really just clarifies what one
`
`00:
`
`would generally understand to be the plain
`
`and ordinary meaning.
`
`So I certainly kept
`
`that in mind in this context.
`
`And that construction that you identified
`
`was performing a hashing function on the
`
`Downloadable together with its fetched
`
`components to generate a Downloadable ID,
`
`correct?
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`00:
`
`48
`
`00:
`
`:51
`
`00:
`
`55
`
`00:
`
`157
`
`00:
`
`:00
`
`00:
`
`:03
`
`00:
`
`:08
`
`00:
`
`el
`
`113
`
`
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`MS. HEDVAT: Objection,
`
`form.
`
`Yeah.
`
`I think you might have missed a word.
`
`I
`
`think it's with its fetched software
`
`components, at least what
`
`I have in front of
`
`me, but otherwise I think that's right.
`
`10
`
`Okay. What does it mean to perform "a
`
`hashing function on the Downloadable
`
`together with its fetched software
`
`00:
`
`00:
`
`:13
`
`00:
`
`40:
`
`17
`
`00:
`
`40:
`
`19
`
`00:
`
`40:
`
`21
`
`00:
`
`AQ;
`
`23
`
`00:
`
`AQ:
`
`25
`
`00
`
`‘40;
`
`27
`
`00
`
`:40:
`
`33
`
`
`
`components"?
`
`Z
`
`ESQUIRE
`
`DEPOSITION SOLUTIONS
`
`800.211.DEPO (3376)
`Esquire Solutions. com
`
`

`

`Case 3:17-cv-05659-WHA Document 500-7 Filed 05/30/19 Page 4 of 16
`Case 3:17-cv-05659-WHA Document 500-7 Filed 05/30/19 Page 4 of 16
`
`MICHAEL D. MITZENMACHER Highly Confidential
`FINJAN V. JUNIPER NETWORKS
`
`July 03, 2018
`
`A.
`
`I would say in general that depends on the
`
`context.
`
`Does "together with" require it to occur at
`
`the same time?
`
`No.
`
`I don't believe that's a specific
`
`requirement or I didn't see any timing
`
`requirement in the claim language.
`
`Does it -- does "together with" require it
`
`to be the same type of hashing function?
`
`I would just add to the last answer,
`
`certainly together in time might be a way to
`
`achieve together with.
`
`I didn't want to
`
`suggest it wouldn't be related but it
`
`10
`
`11
`
`12
`
`13
`
`00:
`
`AQ;
`
`00
`
`:40;
`
`00
`
`:40:
`
`00:
`
`AQ;
`
`00:
`
`40:
`
`00:
`
`40;
`
`49
`
`00:
`
`AQ:
`
`51
`
`00:
`
`40;
`
`53
`
`00:
`
`40;
`
`58
`
`00:
`
`41:
`
`01
`
`00:
`
`41:
`
`10
`
`00:
`
`41;
`
`15
`
`00:
`
`41;
`
`16
`
`125
`
`
`00:
`
`41;
`
`18
`
`00:
`
`41;
`
`20
`
`00:
`
`41:
`
`22
`
`00:
`
`Al:
`
`25
`
`00:41
`
`127
`
`
`
`
`certainly wouldn't have to be the only way,
`
`sort of what
`
`I was thinking in that form.
`
`Just before we-move on to clarify.
`
`So,
`
`in
`
`other words, it wouldn't have to be --
`
`strike that.
`
`So,
`
`in other words,
`
`the hashing of the
`
`Downloadable and the fetched software
`
`components wouldn't have to occur at the
`
`game time in order for it to constitute
`
`"together with"?
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`MS. HEDVAT: Objection,
`form.
`
`ZESQUIRE
`800.211.DEPO (3376)
`EsquireSolutions.com
`
`DEPositiow sowUTiONS
`
`00;
`
`00:
`
`00:
`
`00:
`
`00:
`
`
`
`1:28
`
`1:30
`
`1:34
`
`1:38
`
`00:41
`
`732
`
`

`

`Case 3:17-cv-05659-WHA Document 500-7 Filed 05/30/19 Page 5 of 16
`Case 3:17-cv-05659-WHA Document 500-7 Filed 05/30/19 Page 5 of 16
`
`July 03, 2018
`MICHAEL D. MITZENMACHER Highly Confidential
`126
`FINJAN V. JUNIPER NETWORKS
`
`A.
`
`Right.
`
`I don't think it would have to be at
`
`the same time but that could certainly --
`
`yeah.
`
`I don't think that's a requirement.
`
`I don't see a temporal requirement.
`
`Okay. And so the second portion of that
`
`that I was asking about is whether "together
`
`with" would require performing the same type
`
`of hashing function on the Downloadable and
`
`the fetched software components?
`
`I think I need to you at least clarify what
`
`you mean by saying same type of hashing
`
`function.
`
`We talked a little earlier about MD5 or
`
`SHA-256.
`
`Those are different types of
`
`10
`
`11
`
`12
`
`13
`
`14
`
`00:
`
`00:
`
`00:
`
`00;
`
`00:
`
`Al:
`
`00:
`
`Al;
`
`00:
`
`42;
`
`04
`
`00:
`
`42:
`
`07
`
`00:
`
`42:
`
`12
`
`00:
`
`42:
`
`15
`
`00;
`
`42:
`
`17
`
`00:
`
`42:
`
`17
`
`00:
`
`42:
`
`21
`
`00:
`
`42:
`
`23
`
`0
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`
`
`
`00:
`
`42;
`
`24
`
`00:
`
`42;
`
`25
`
`00:
`
`A2:
`
`27
`
`00:
`
`42:
`
`30
`
`00:
`
`42:
`
`35
`
`00:
`
`42:
`
`37
`
`00:
`
`42:
`
`38
`
`00:
`
`42:
`
`4}
`
`00:
`
`42:
`
`45
`
`hashing functions, right?
`
`MS. HEDVAT: Objection,
`
`form.
`
`I would say they're different hashing
`
`functions.
`
`I'm not exactly clear what you
`
`mean by different types.
`
`If you just want
`
`to say those are two different hash
`
`functions,
`
`I agree.
`
`So does "together with" require that you use
`
`the same hashing function on the
`
`Downloadable and the fetched software
`
`Z
`
`ESQUIRE
`
`DEPOSITION SOLUTIONS
`
`800.211.DEPO (3376)
`EsquireSolutions.com
`
`

`

`Case 3:17-cv-05659-WHA Document 500-7 Filed 05/30/19 Page 6 of 16
`Case 3:17-cv-05659-WHA Document 500-7 Filed 05/30/19 Page 6 of 16
`
`July 03, 2018
`MICHAEL D. MITZENMACHER Highly Confidential
`127
`FINJAN V. JUNIPER NETWORKS
`
`components?
`No.
`I wouldn't think so.
`
`I wouldn't think
`
`
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`142:
`
`142:
`
`that would be a requirement.
`
`I could easily
`
`imagine possible schemes where you might use
`
`00:
`
`42:
`
`different subhash functions or suboperations
`
`on various different components and combine
`
`them in various different ways.
`
`Does the "together with" aspect require that
`
`the hashing function for the Downloadable
`
`and the fetched software components be
`
`completed by the same component
`
`in the
`
`source code?
`
`MS. HEDVAT: Objection,
`
`form.
`
`I feel like the way I've heard the question
`
`00:
`
`00:
`
`00:
`
`00:
`
`00:
`
`213
`
`00:
`
`:17
`
`00;
`
`43;
`
`21
`
`00
`
`:43:
`
`24
`
`00:
`
`43:
`
`25
`
`00:
`
`43
`
`126
`
`00:
`
`43:
`
`37
`
`
`
`you've gotten somewhat confused or using
`
`terms differently.
`
`You know,
`
`so there's a
`
`hashing function that's performed on the
`
`Downloadable together with its fetched
`
`components. There might be suboperations
`
`that are used in constructing or performing
`
`that hashing function.
`
`So,
`
`for instance, when you say does it
`
`require using the same hashing function on
`
`the components, it definitely needs to be
`
`Z ESQUIRE
`800.211.DEPO (3376)
`
`EsquireSolutions.com
`
`DEPOS|TION SOLUTIONS
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`00:
`
`43
`
`:40
`
`00:
`
`43;
`
`43
`
`00:
`
`43;
`
`45
`
`00:
`
`43;
`
`48
`
`00:
`
`43;
`
`51
`
`00:
`
`43;
`
`55
`
`143;
`
`57
`
`00:
`
`43;
`
`59
`
`00:
`
`44;
`
`03
`
`

`

`Case 3:17-cv-05659-WHA Document 500-7 Filed 05/30/19 Page 7 of 16
`Case 3:17-cv-05659-WHA Document 500-7 Filed 05/30/19 Page 7 of 16
`
`July 03, 2018
`MICHAEL D. MITZENMACHER Highly Confidential
`128
`FINJAN V. JUNIPER NETWORKS
`
`understood that there's sort of a global
`
`hashing function that's acting on the
`
`collection.
`
`Those may use suboperations or
`
`subcomponents which may involve hashing on
`
`the individual components, and so that was
`
`the sense in which I was saying you could --
`
`when you were saying can they use different
`
`types of hash functions or I would say
`
`different hash functions, certainly as
`
`subpieces of the global hash calculation you
`
`might do different things at different parts
`
`or different components.
`
`How would you be able to tell whether it's
`
`subparts of a global hashing function versus
`
`10
`
`11
`
`12
`
`13
`
`14
`
`00:
`
`00:
`
`00:
`
`00:
`
`00:
`
`00:
`
`44
`
`721
`
`00:
`
`AA;
`
`26
`
`00
`
`:44;
`
`28
`
`00;
`
`44:
`
`30
`
`00:
`
`44;
`
`33
`
`00:
`
`44;
`
`36
`
`00:
`
`44;
`
`40
`
`00:
`
`44;
`
`00:
`
`44;
`
`44
`
`00:
`
`44;
`
`46
`
`
`
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`oe
`
`23
`
`24
`
`separate hashing functions?
`
`Again by the code itself or how they're
`
`collected together.
`
`So would it have to be in the same
`
`directory?
`
`Would what have to be in the same directory?
`
`So I asked how you would tell if it was
`
`subhashing functions or two separate hashing
`
`functions and you said by looking at the
`
`code.
`
`So what would you look for in the
`
`00:
`
`44;
`
`48
`
`00:
`
`44;
`
`53
`
`00:
`
`44;
`
`53
`
`00:
`
`44
`
`56
`
`00:
`
`44:
`
`57
`
`00:
`
`45;
`
`02
`
`00:
`
`45;
`
`05
`
`00:
`
`45;
`
`08
`
`00:
`
`45;
`
`10
`
`
`
`800.211.DEPO (3376)
`EsquireSolutions.com
`
` Z
`
`ESQUIRE
`
`DEPOSITION SOLUTIONS
`
`

`

`Case 3:17-cv-05659-WHA Document 500-7 Filed 05/30/19 Page 8 of 16
`Case 3:17-cv-05659-WHA Document 500-7 Filed 05/30/19 Page 8 of 16
`
`MICHAEL D. MITZENMACHER Highly Confidential
`FINJAN V, JUNIPER NETWORKS
`
`July 03, 2018
`129
`
`code to see if it was a subhashing
`
`functionality versus two separate ones?
`
`MS. HEDVAT: Objection,
`
`form.
`
`That would depend on the context, but one
`
`thing I might
`
`look for is are the hashes
`
`again one thing we brought
`
`in was are they
`
`hashed over a certain time period. Another
`
`thing I would look at is are they hashed and
`
`combined into a collection of some form.
`
`Could you have two separate hash functions
`
`that are later combined?
`
`I think that would fit into what I was
`
`discussing. You'd be hashing together with.
`
`10
`
`11
`
`12
`
`13
`
`14
`
`00:
`
`45;
`
`00:
`
`45:
`
`00:
`
`45;
`
`00:
`
`45:
`
`00;
`
`45;
`
`00:
`
`45;
`
`00:
`
`A5;:
`
`00:
`
`45:
`
`00:
`
`45;
`
`00:
`
`45:
`
`00:
`
`45:
`
`00:
`
`A5;
`
`47
`
`00:
`
`AS;
`
`50
`
`00:
`
`45;
`
`57
`
`|
`
`
`00:
`
`46:
`
`00:
`
`46;
`
`00:
`
`105
`
`00:
`
`:09
`
`00:
`
`46;
`
`13
`
`00:
`
`46:
`
`16
`
`00:
`
`46:
`
`19
`
`00:
`
`A6:
`
`23
`
`00:
`
`46:
`
`28
`
`00:
`
`46:
`
`31
`
`
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`Yes. You might for various reasons not have
`
`them be hashed at the same point in time.
`
`That could be more effective or more
`
`efficient depending on when and where the
`
`fetch components were coming into the
`
`system,
`
`for instance.
`
`So it could certainly
`
`have the hashing done at different points in
`
`time or locations in the code,
`
`I guess I
`
`would say for efficiency and effectiveness
`
`reasons, and then combine them into a single
`
`hash of a Downloadable together with the
`
`@BESQUIRE
`
`DEPOSITION SOLUTIONS
`
`800.211.DEPO (3376)
`EsquireSolutions.com
`
`

`

`Case 3:17-cv-05659-WHA Document 500-7 Filed 05/30/19 Page 9 of 16
`Case 3:17-cv-05659-WHA Document 500-7 Filed 05/30/19 Page 9 of 16
`
`MICHAEL D. MITZENMACHER Highly Confidential
`FINJAN V. JUNIPER NETWORKS
`
`July 03, 2018
`
`130
`
`fetch components.
`
`It's your understanding even if you did
`
`separate hashing functions on the
`
`Downloadable and the fetched software
`
`components using different portions of the
`
`code, as long as you combine them together,
`
`then that would satisfy the "together with"
`
`aspect of the claim construction?
`
`MS. HEDVAT: Objection,
`
`form.
`
`I would think that could be one way of
`
`Satisfying it and, again,
`
`I think that has
`
`to be with the understanding that you're
`
`doing the sort of suboperations or what
`
`I
`
`might call subhashing functions in the
`
`course of creating the larger global
`
`ID,
`
`Downloadable ID.
`
`Is it your understanding that the
`
`Downloadable ID can consist of more than one
`
`hash value?
`
`So I sort of want
`
`to -- well, yes, and let
`
`me clarify with two different explanations
`
`depending on the interpretation of your
`
`question.
`
`So a Downloadable ID has to include a
`
`Z ESQUIRE
`
`DEPOSITION SOLUTIONS
`
`800.211.DEPO (3376)
`EsquireSolutions.com
`
`
`
`
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`

`

`Case 3:17-cv-05659-WHA Document 500-7 Filed 05/30/19 Page 10 of 16
`Case 3:17-cv-05659-WHA Document 500-7 Filed 05/30/19 Page 10 of 16
`
`MICHAEL D. MITZENMACHER Highly Confidential
`FINJAN V. JUNIPER NETWORKS
`
`July 03, 2018
`
`131
`
`BZ ESQUIRE
`
`DEPOSITION SOLUTIONS
`
`800.211.DEPO (3376)
`
`EsquireSolutions.com
`
`hash.
`
`It's supposed to be generated by
`
`hashing -- or what's the exact word
`
`something you perform a hashing function on
`
`the Downloadable and the fetch software
`
`components to generate a Downloadable ID?
`
`I
`
`think the patent specifically states that
`
`the Downloadable ID might contain other
`
`information.
`
`It might consist of more than
`
`just a hash so certainly you might have --
`
`as long as you have a hashing function on
`
`the Downloadable on the hashing components
`
`to generate a Downloadable ID, you might
`
`have additional stuff which might
`
`include
`
`additional values formed by hashing or
`
`elsewhere.
`
`Alternatively,
`
`the other way, again,
`
`the way I've been trying to be clear and
`
`explain it to you, you may have a single
`
`value which consists of a collection of
`
`subvalues or results of subcomputations that
`
`are combined. That is one of the ways of
`
`generating a hash value.
`
`So to the extent
`
`that I understand your question is saying
`
`can a single hash value arise from computing
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`Qe
`
`23
`
`24
`
`

`

`Case 3:17-cv-05659-WHA Document 500-7 Filed 05/30/19 Page 11 of 16
`Case 3:17-cv-05659-WHA Document 500-7 Filed 05/30/19 Page 11 of 16
`
`MICHAEL D. MITZENMACHER Highly Confidential
`FINJAN V. JUNIPER NETWORKS
`
`
`July 03, 2018
`132
`
`multiple like subhash functions or
`
`subcomputations that are later made into a
`
`hash,
`
`I would say yes. And,
`
`in fact,
`
`I
`
`think I've given one or more examples of how
`
`I know that's done in the art in my report.
`
`Okay.
`
`So just to make sure I understand,
`
`is
`
`it your understanding that a system that
`
`computed two different what you're calling
`
`subhash values and put
`
`them together to
`
`collectively identify the Downloadable and
`
`the fetched software components would meet
`
`the "together with" limitation?
`
`MS. HEDVAT: Objection,
`
`form.
`
`00:
`
`:14
`
`00:
`
`:16
`
`00:
`
`:20
`
`00:
`
`:23
`
`00:
`
`00:
`
`00:
`
`00;
`
`740
`
`00:
`
`743
`
`00:
`
`49
`
`746
`
`00:
`
`49;
`
`50
`
`00:
`
`49;
`
`53
`
`00:
`
`49:
`
`56
`
`00:
`
`49;
`
`57
`
`10
`
`11
`
`12
`
`13
`
`14
`
`So I would say as always when looking for
`
`infringement
`
`I would want to look fora
`
`specific implementation, but I believe at
`
`that level that would be certainly
`
`potentially one possible way of infringing.
`
`Taking a look at the infringement section
`
`for Element 1(c) of your declaration which
`
`begins on page 29 at paragraph 83, did you
`
`identify any source code in your declaration
`
`that performs a hashing function?
`
`MS. HEDVAT: Objection,
`
`form.
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`00:
`
`50;
`
`06
`
`00:
`
`50:
`
`08
`
`00:
`
`50:
`
`11
`
`00:
`
`50;
`
`12
`
`00:
`
`50:
`
`15
`
`00:
`
`50
`
`:42
`
`00:
`
`50:
`
`48
`
`00:
`
`50:
`
`58
`
`00;
`
`51:
`
`00
`
`00:
`
`51:
`
`06
`
`
`
`aaa!
`
`@ ESQUIRE
`
`DEPOSITION SOLUTIONS
`
`800.211.DEPO (3376)
`EsquireSolutions.com
`
`

`

`Case 3:17-cv-05659-WHA Document 500-7 Filed 05/30/19 Page 12 of 16
`Case 3:17-cv-05659-WHA Document 500-7 Filed 05/30/19 Page 12 of 16
`
`MICHAEL D. MITZENMACHER Highly Confidential
`FINJAN V. JUNIPER NETWORKS
`
`
`July 03, 2018
`221
`
`Reference No.: 2395311
`
`
`
`1
`
`2 3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`Case:
`
`FINJAN V.
`
`JUNIPER NETWORKS
`
`DECLARATION UNDER PENALTY OF PERJURY
`
`I declare under penalty of perjury that
`I have read the entire transcript of my Depo-
`sition taken in the captioned matter or the
`same has been read to me, and the same is
`
`true and accurate, save and except for
`changes and/or corrections, if any, as indi-
`cated by me on the DEPOSITION ERRATA SHEET
`hereof, with the understanding that I offer
`these changes as if still under oath,
`et LAE"
`
`
`
`Michael D. Mitzenmacher
`
`NOTARIZATION OF CHANGES
`
`(If Required)
`
`
`
`
`Subscribed and sworn to on the
`
`day of
`
`, 20~before me,
`
`(Notary Sign)
`
`
`
`(Print Name)
`
`Notary Public,
`
`Hassachuse FES
`in and for the State of
`
`BZ ESQUIRE
`800.211.DEPO (3376)
`
`EsquireSolutions. com
`
`DEPOSITION SOLUTIONS
`
`

`

`Case 3:17-cv-05659-WHA Document 500-7 Filed 05/30/19 Page 13 of 16
`Case 3:17-cv-05659-WHA Document 500-7 Filed 05/30/19 Page 13 of 16
`
`
`
`Change to:
`
`___yeese
`
`Line No. 24
`Page No. °
`"convenience" to Vaonvenient"
`Reason for change:
`typographical
`Page No. 19
`ine No. 16
`Change to:
`Noft Co wor"
`Reason for change:_typographical0______—
`Page No. 23
`Line No._3
`Change to:
`
`momPPWwWDN
`OoowoOON
`
`July 03, 2018222
`MICHAEL D. MITZENMACHER Highly Confidential
`EINJAN V. JUNIPER NETWORKS
`Reference No.: 2395311
`Case:
`FINJAN V.
`JUNIPER NETWORKS
`
` toe
`
`
`Reason for change:typographical0
`
`Page No. 40
`Line No. 14
`Change to:
`Nthe fetch" to "fetch"
`Reason for change:
`typographical
`Page No. 40
`Sine No. 16
`Change to:
`"tempo" to "temporal"
`
`Reason for change:
`typographical
`Page No. = Line No.
`19 Change to:
`"to restoring" to "to storing"
`Reason for change:
`typographical
`Page No. 56
`Line No. 21
`Change to:
`Ngites" to "cites"
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`Reason for change:
`
`typographical
`
`tw Wari
`SIGNATURE :
`Michael D. Mitzenmacher
`
`DATE: 7/t0/lF
`
`BQ ESQUIRE
`DEPOSITION SOLUTIONS
`
`300.211.DEPO (3376)
`EsquireSolutions.com
`
`

`

`Case 3:17-cv-05659-WHA Document 500-7 Filed 05/30/19 Page 14 of 16
`Case 3:17-cv-05659-WHA Document 500-7 Filed 05/30/19 Page 14 of 16
`
`July 03, 2018
`MICHAEL D. MITZENMACHER Highly Confidential
`223
`FINJAN V. JUNIPER NETWORKS
`
`.
`
`Reference No.: 2395311
`
`Case:
`
`FINJAN V.
`
`JUNIPER NETWORKS
`
`Change to:
`_Line No. +
`Page No. 58
`Van executable file" to "a text file"
`
`
`
`
`Reason for change:
`typographical
`Page No. 58
`Line No.
`8
`Change to:
`"wrote" to "was written"
`
`Reason for change:
`typographical
`
`Page No. 58
`
`Line No. 11
`
`Change to:
`
`"gealing which" to "C language"
`
`Reason for change:
`typographical
`Page No.
`58 Line No. 13
`Change to:
`"files contain" to "files can contain"
`
`
`Reason for change:
`
`typographical
`
`Page No. 61
`
`Line No. 5
`
`Change to:
`
`"original" to "additional"
`
`
`Reason for change:
`typographical
`Page No.
`62
`Line No. 11
`Change to:
`"typically" to "particularly"
`
`Reason for change:
`
`typographical
`Change to:
`Line No, 21
`Page No. 67
`to "such as gzip"
`"such as JSON"
`
`Reason for change:
`typographical
`
`Cc
`SIGNATURE: Me
`
`Michael D. Mitzenmacher
`
`DATE: T/20/1¥
`
`ESQUIRE
`
`DEPOSITION SOLUTIONS
`
`800.211.DEPO (3376)
`EsquireSolutions.com
`
`LB
`
`
`
`onyvnuFWND
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`a1
`
`22
`
`23
`
`24
`
`25
`
`
`
`
`

`

`Case 3:17-cv-05659-WHA Document 500-7 Filed 05/30/19 Page 15 of 16
`Case 3:17-cv-05659-WHA Document 500-7 Filed 05/30/19 Page 15 of 16
`
`July 03, 2018
`MICHAEL D. MITZENMACHER Highly Confidential
`FINJAN V. JUNIPER NETWORKS
`222
`
`Reference No.: 2395311
`
`Case:
`
`FINJAN V.
`
`JUNIPER NETWORKS
`
`Change to:
`Page No. 83__Line No. 13
`'varying" to "variant"
`
`Reason for change:
`
`typographical
`
`Page No.112 Line No.
`
`8
`
`Change to:
`
`“aontext" to "content"
`
`Reason for change:
`
`typographical
`Change to:
`Page No. 129 Line No. 18
`“fetch components" to "fetched components"
`Reason for change:
`typographical
`
`Page No. 130 Line No. 1
`
`Change to:
`
`"fetch components." to "fetched components."
`
`Reason for change:
`
`typographical
`Change to:
`Page No. 141 Line No. 20
`"fetch components." to "fetched components."
`
`Reason for change:
`
`typographical
`
`Change to:
`Page No. 147 Line No._9
`"drop files" to "dropped files"
`typographical
`Reason for change:
`Page No.154
`Line No.?
`Change to: "I'd say in different
`context." to "I'd say it's different in different context"
`
`Reason for change:
`
`
`typographical
`
`onyvnoOFFWDN
`
`10
`
`il
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`SIGNATURE:
`
`LUAce aaa”
`
`DATE:
`
`// Zo/!/
`
`25
`
`Michael D. Mitzenmacher
`
`
`ZB ESQUIRE
`
`pérasiriox socuTjons
`
`800.211.DEPO (3376)
`
`EsquireSolutions.com
`
`

`

`Case 3:17-cv-05659-WHA Document 500-7 Filed 05/30/19 Page 16 of 16
`Case 3:17-cv-05659-WHA Document 500-7 Filed 05/30/19 Page 16 of 16
`
`July 03, 2018
`MICHAEL D. MITZENMACHER Highly Confidential
`
`FINJAN V. JUNIPER NETWORKS 223
`
`Case:
`
`FINJAN V.
`
`JUNIPER NETWORKS
`
`Page No. 199 Line No.15
`
`Change to:
`
`"profile basis" to "per file basis"
`
`Reason for change:
`
`typographical
`
`Page No.179 Line No.
`
`17 Change to:
`
`"£unction is" to "function that is"
`
`Reason for change:
`
`typographical
`
`Page No. 186 Line No. 6
`
`Change to:
`
`"the junior products" to "the Juniper products"
`
`
`
` Reference No.: 2395311
`
`Reason for change:
`199
`
`typographical
`
`Change to:
`7
`Line No.
`Page No.
`"fetch components" to "fetched components"
`
`Reason for change:
`
`typographical
`
`Change to:
`Page No. 205 Line No. 6
`Yare a standard" to "and a standard"
`
`Reason for change:
`
`typographical
`
`Page No. 205 Line No.
`
`7
`
`Change to:
`
`"funetions.
`
`Can be by" to "functions, can be by"
`
`Reason for change:
`
`typographical
`
`Change to:
`Page No. 215 Line No. 17
`"made an argument." to "made in my argument."
`
`Reason for change:
`
`typographical
`
`SIGNATURE:
`
`Off geen
`
`DATE:
`
`// to7 ly
`
`Michael D. Mitzenmacher
`
`
`BESQUIRE
`
`oFposition soLuTions
`
`800.211.DEPO (3376)
`
`EsquireSolutions.com
`
`oayDHWHFFWDN
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket