`Case 3:17-cv-05659-WHA Document 500-7 Filed 05/30/19 Page 1 of 16
`
`EXHIBIT 19
`
`UNREDACTED VERSION OF
`DOCUMENT SOUGHT TO BE
`SEALED
`
`
`
`FOR THE NORTHERN DISTRICT OF CALIFORNIA
`
`SAN FRANCISCO DIVISION
`
`Case No.: 3:17-cv-05659-WHA
`
`FINJAN,
`
`INC., a Delaware Corporation,
`
`Plaintiff,
`
`V.
`
`JUNIPER NETWORKS,
`
`INC., a Delaware
`
`Corporation,
`
`Defendant.
`
`AUDIO-VISUAL DEPOSITION OF
`
`MICHAEL D. MITZENMACHER
`
`** HIGHLY CONFIDENTIAL **
`
`July 3, 2018
`
`9:32 a.m.
`
`Esquire Deposition Solutions
`
`50 Federal Street, 6th Floor
`
`Boston, Massachusetts
`
`Kristin M. Kelley, RPR, CRR
`
`
`
`
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`Ze
`
`23
`
`24
`
`
`
`Case 3:17-cv-05659-WHA Document 500-7 Filed 05/30/19 Page 2 of 16
`Case 3:17-cv-05659-WHA Document 500-7 Filed 05/30/19 Page 2 of 16
`
`July 03, 2018
`MICHAEL D. MITZENMACHER Highly Confidential
`FINJAN V. JUNIPER NETWORKS
`1
`
`IN THE UNITED STATES DISTRICT COURT
`
`
`
`BQ ESQUIRE
`
`Derositiow soLUTIONS
`
`800.211.DEPO (3376)
`
`EsquireSolutions.com
`
`
`
`Case 3:17-cv-05659-WHA Document 500-7 Filed 05/30/19 Page 3 of 16
`Case 3:17-cv-05659-WHA Document 500-7 Filed 05/30/19 Page 3 of 16
`
`July 03, 2018
`MICHAEL D. MITZENMACHER Highly Confidential
`124
`FINJAN V. JUNIPER NETWORKS
`
`and ordinary meaning could benefit from
`
`explanation and I provide particular
`
`explanation in paragraphs 39 to 41. But in
`
`particular in paragraph 39 I point out that
`
`this term has been construed before with a
`
`construction adopted by multiple courts
`
`00:
`
`:19
`
`00:
`
`:2l
`
`00:
`
`129
`
`00:
`
`232
`
`00;
`
`235
`
`00:
`
`38
`
`which I think really just clarifies what one
`
`00:
`
`would generally understand to be the plain
`
`and ordinary meaning.
`
`So I certainly kept
`
`that in mind in this context.
`
`And that construction that you identified
`
`was performing a hashing function on the
`
`Downloadable together with its fetched
`
`components to generate a Downloadable ID,
`
`correct?
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`00:
`
`48
`
`00:
`
`:51
`
`00:
`
`55
`
`00:
`
`157
`
`00:
`
`:00
`
`00:
`
`:03
`
`00:
`
`:08
`
`00:
`
`el
`
`113
`
`
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`MS. HEDVAT: Objection,
`
`form.
`
`Yeah.
`
`I think you might have missed a word.
`
`I
`
`think it's with its fetched software
`
`components, at least what
`
`I have in front of
`
`me, but otherwise I think that's right.
`
`10
`
`Okay. What does it mean to perform "a
`
`hashing function on the Downloadable
`
`together with its fetched software
`
`00:
`
`00:
`
`:13
`
`00:
`
`40:
`
`17
`
`00:
`
`40:
`
`19
`
`00:
`
`40:
`
`21
`
`00:
`
`AQ;
`
`23
`
`00:
`
`AQ:
`
`25
`
`00
`
`‘40;
`
`27
`
`00
`
`:40:
`
`33
`
`
`
`components"?
`
`Z
`
`ESQUIRE
`
`DEPOSITION SOLUTIONS
`
`800.211.DEPO (3376)
`Esquire Solutions. com
`
`
`
`Case 3:17-cv-05659-WHA Document 500-7 Filed 05/30/19 Page 4 of 16
`Case 3:17-cv-05659-WHA Document 500-7 Filed 05/30/19 Page 4 of 16
`
`MICHAEL D. MITZENMACHER Highly Confidential
`FINJAN V. JUNIPER NETWORKS
`
`July 03, 2018
`
`A.
`
`I would say in general that depends on the
`
`context.
`
`Does "together with" require it to occur at
`
`the same time?
`
`No.
`
`I don't believe that's a specific
`
`requirement or I didn't see any timing
`
`requirement in the claim language.
`
`Does it -- does "together with" require it
`
`to be the same type of hashing function?
`
`I would just add to the last answer,
`
`certainly together in time might be a way to
`
`achieve together with.
`
`I didn't want to
`
`suggest it wouldn't be related but it
`
`10
`
`11
`
`12
`
`13
`
`00:
`
`AQ;
`
`00
`
`:40;
`
`00
`
`:40:
`
`00:
`
`AQ;
`
`00:
`
`40:
`
`00:
`
`40;
`
`49
`
`00:
`
`AQ:
`
`51
`
`00:
`
`40;
`
`53
`
`00:
`
`40;
`
`58
`
`00:
`
`41:
`
`01
`
`00:
`
`41:
`
`10
`
`00:
`
`41;
`
`15
`
`00:
`
`41;
`
`16
`
`125
`
`
`00:
`
`41;
`
`18
`
`00:
`
`41;
`
`20
`
`00:
`
`41:
`
`22
`
`00:
`
`Al:
`
`25
`
`00:41
`
`127
`
`
`
`
`certainly wouldn't have to be the only way,
`
`sort of what
`
`I was thinking in that form.
`
`Just before we-move on to clarify.
`
`So,
`
`in
`
`other words, it wouldn't have to be --
`
`strike that.
`
`So,
`
`in other words,
`
`the hashing of the
`
`Downloadable and the fetched software
`
`components wouldn't have to occur at the
`
`game time in order for it to constitute
`
`"together with"?
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`MS. HEDVAT: Objection,
`form.
`
`ZESQUIRE
`800.211.DEPO (3376)
`EsquireSolutions.com
`
`DEPositiow sowUTiONS
`
`00;
`
`00:
`
`00:
`
`00:
`
`00:
`
`
`
`1:28
`
`1:30
`
`1:34
`
`1:38
`
`00:41
`
`732
`
`
`
`Case 3:17-cv-05659-WHA Document 500-7 Filed 05/30/19 Page 5 of 16
`Case 3:17-cv-05659-WHA Document 500-7 Filed 05/30/19 Page 5 of 16
`
`July 03, 2018
`MICHAEL D. MITZENMACHER Highly Confidential
`126
`FINJAN V. JUNIPER NETWORKS
`
`A.
`
`Right.
`
`I don't think it would have to be at
`
`the same time but that could certainly --
`
`yeah.
`
`I don't think that's a requirement.
`
`I don't see a temporal requirement.
`
`Okay. And so the second portion of that
`
`that I was asking about is whether "together
`
`with" would require performing the same type
`
`of hashing function on the Downloadable and
`
`the fetched software components?
`
`I think I need to you at least clarify what
`
`you mean by saying same type of hashing
`
`function.
`
`We talked a little earlier about MD5 or
`
`SHA-256.
`
`Those are different types of
`
`10
`
`11
`
`12
`
`13
`
`14
`
`00:
`
`00:
`
`00:
`
`00;
`
`00:
`
`Al:
`
`00:
`
`Al;
`
`00:
`
`42;
`
`04
`
`00:
`
`42:
`
`07
`
`00:
`
`42:
`
`12
`
`00:
`
`42:
`
`15
`
`00;
`
`42:
`
`17
`
`00:
`
`42:
`
`17
`
`00:
`
`42:
`
`21
`
`00:
`
`42:
`
`23
`
`0
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`
`
`
`00:
`
`42;
`
`24
`
`00:
`
`42;
`
`25
`
`00:
`
`A2:
`
`27
`
`00:
`
`42:
`
`30
`
`00:
`
`42:
`
`35
`
`00:
`
`42:
`
`37
`
`00:
`
`42:
`
`38
`
`00:
`
`42:
`
`4}
`
`00:
`
`42:
`
`45
`
`hashing functions, right?
`
`MS. HEDVAT: Objection,
`
`form.
`
`I would say they're different hashing
`
`functions.
`
`I'm not exactly clear what you
`
`mean by different types.
`
`If you just want
`
`to say those are two different hash
`
`functions,
`
`I agree.
`
`So does "together with" require that you use
`
`the same hashing function on the
`
`Downloadable and the fetched software
`
`Z
`
`ESQUIRE
`
`DEPOSITION SOLUTIONS
`
`800.211.DEPO (3376)
`EsquireSolutions.com
`
`
`
`Case 3:17-cv-05659-WHA Document 500-7 Filed 05/30/19 Page 6 of 16
`Case 3:17-cv-05659-WHA Document 500-7 Filed 05/30/19 Page 6 of 16
`
`July 03, 2018
`MICHAEL D. MITZENMACHER Highly Confidential
`127
`FINJAN V. JUNIPER NETWORKS
`
`components?
`No.
`I wouldn't think so.
`
`I wouldn't think
`
`
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`142:
`
`142:
`
`that would be a requirement.
`
`I could easily
`
`imagine possible schemes where you might use
`
`00:
`
`42:
`
`different subhash functions or suboperations
`
`on various different components and combine
`
`them in various different ways.
`
`Does the "together with" aspect require that
`
`the hashing function for the Downloadable
`
`and the fetched software components be
`
`completed by the same component
`
`in the
`
`source code?
`
`MS. HEDVAT: Objection,
`
`form.
`
`I feel like the way I've heard the question
`
`00:
`
`00:
`
`00:
`
`00:
`
`00:
`
`213
`
`00:
`
`:17
`
`00;
`
`43;
`
`21
`
`00
`
`:43:
`
`24
`
`00:
`
`43:
`
`25
`
`00:
`
`43
`
`126
`
`00:
`
`43:
`
`37
`
`
`
`you've gotten somewhat confused or using
`
`terms differently.
`
`You know,
`
`so there's a
`
`hashing function that's performed on the
`
`Downloadable together with its fetched
`
`components. There might be suboperations
`
`that are used in constructing or performing
`
`that hashing function.
`
`So,
`
`for instance, when you say does it
`
`require using the same hashing function on
`
`the components, it definitely needs to be
`
`Z ESQUIRE
`800.211.DEPO (3376)
`
`EsquireSolutions.com
`
`DEPOS|TION SOLUTIONS
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`00:
`
`43
`
`:40
`
`00:
`
`43;
`
`43
`
`00:
`
`43;
`
`45
`
`00:
`
`43;
`
`48
`
`00:
`
`43;
`
`51
`
`00:
`
`43;
`
`55
`
`143;
`
`57
`
`00:
`
`43;
`
`59
`
`00:
`
`44;
`
`03
`
`
`
`Case 3:17-cv-05659-WHA Document 500-7 Filed 05/30/19 Page 7 of 16
`Case 3:17-cv-05659-WHA Document 500-7 Filed 05/30/19 Page 7 of 16
`
`July 03, 2018
`MICHAEL D. MITZENMACHER Highly Confidential
`128
`FINJAN V. JUNIPER NETWORKS
`
`understood that there's sort of a global
`
`hashing function that's acting on the
`
`collection.
`
`Those may use suboperations or
`
`subcomponents which may involve hashing on
`
`the individual components, and so that was
`
`the sense in which I was saying you could --
`
`when you were saying can they use different
`
`types of hash functions or I would say
`
`different hash functions, certainly as
`
`subpieces of the global hash calculation you
`
`might do different things at different parts
`
`or different components.
`
`How would you be able to tell whether it's
`
`subparts of a global hashing function versus
`
`10
`
`11
`
`12
`
`13
`
`14
`
`00:
`
`00:
`
`00:
`
`00:
`
`00:
`
`00:
`
`44
`
`721
`
`00:
`
`AA;
`
`26
`
`00
`
`:44;
`
`28
`
`00;
`
`44:
`
`30
`
`00:
`
`44;
`
`33
`
`00:
`
`44;
`
`36
`
`00:
`
`44;
`
`40
`
`00:
`
`44;
`
`00:
`
`44;
`
`44
`
`00:
`
`44;
`
`46
`
`
`
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`oe
`
`23
`
`24
`
`separate hashing functions?
`
`Again by the code itself or how they're
`
`collected together.
`
`So would it have to be in the same
`
`directory?
`
`Would what have to be in the same directory?
`
`So I asked how you would tell if it was
`
`subhashing functions or two separate hashing
`
`functions and you said by looking at the
`
`code.
`
`So what would you look for in the
`
`00:
`
`44;
`
`48
`
`00:
`
`44;
`
`53
`
`00:
`
`44;
`
`53
`
`00:
`
`44
`
`56
`
`00:
`
`44:
`
`57
`
`00:
`
`45;
`
`02
`
`00:
`
`45;
`
`05
`
`00:
`
`45;
`
`08
`
`00:
`
`45;
`
`10
`
`
`
`800.211.DEPO (3376)
`EsquireSolutions.com
`
` Z
`
`ESQUIRE
`
`DEPOSITION SOLUTIONS
`
`
`
`Case 3:17-cv-05659-WHA Document 500-7 Filed 05/30/19 Page 8 of 16
`Case 3:17-cv-05659-WHA Document 500-7 Filed 05/30/19 Page 8 of 16
`
`MICHAEL D. MITZENMACHER Highly Confidential
`FINJAN V, JUNIPER NETWORKS
`
`July 03, 2018
`129
`
`code to see if it was a subhashing
`
`functionality versus two separate ones?
`
`MS. HEDVAT: Objection,
`
`form.
`
`That would depend on the context, but one
`
`thing I might
`
`look for is are the hashes
`
`again one thing we brought
`
`in was are they
`
`hashed over a certain time period. Another
`
`thing I would look at is are they hashed and
`
`combined into a collection of some form.
`
`Could you have two separate hash functions
`
`that are later combined?
`
`I think that would fit into what I was
`
`discussing. You'd be hashing together with.
`
`10
`
`11
`
`12
`
`13
`
`14
`
`00:
`
`45;
`
`00:
`
`45:
`
`00:
`
`45;
`
`00:
`
`45:
`
`00;
`
`45;
`
`00:
`
`45;
`
`00:
`
`A5;:
`
`00:
`
`45:
`
`00:
`
`45;
`
`00:
`
`45:
`
`00:
`
`45:
`
`00:
`
`A5;
`
`47
`
`00:
`
`AS;
`
`50
`
`00:
`
`45;
`
`57
`
`|
`
`
`00:
`
`46:
`
`00:
`
`46;
`
`00:
`
`105
`
`00:
`
`:09
`
`00:
`
`46;
`
`13
`
`00:
`
`46:
`
`16
`
`00:
`
`46:
`
`19
`
`00:
`
`A6:
`
`23
`
`00:
`
`46:
`
`28
`
`00:
`
`46:
`
`31
`
`
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`Yes. You might for various reasons not have
`
`them be hashed at the same point in time.
`
`That could be more effective or more
`
`efficient depending on when and where the
`
`fetch components were coming into the
`
`system,
`
`for instance.
`
`So it could certainly
`
`have the hashing done at different points in
`
`time or locations in the code,
`
`I guess I
`
`would say for efficiency and effectiveness
`
`reasons, and then combine them into a single
`
`hash of a Downloadable together with the
`
`@BESQUIRE
`
`DEPOSITION SOLUTIONS
`
`800.211.DEPO (3376)
`EsquireSolutions.com
`
`
`
`Case 3:17-cv-05659-WHA Document 500-7 Filed 05/30/19 Page 9 of 16
`Case 3:17-cv-05659-WHA Document 500-7 Filed 05/30/19 Page 9 of 16
`
`MICHAEL D. MITZENMACHER Highly Confidential
`FINJAN V. JUNIPER NETWORKS
`
`July 03, 2018
`
`130
`
`fetch components.
`
`It's your understanding even if you did
`
`separate hashing functions on the
`
`Downloadable and the fetched software
`
`components using different portions of the
`
`code, as long as you combine them together,
`
`then that would satisfy the "together with"
`
`aspect of the claim construction?
`
`MS. HEDVAT: Objection,
`
`form.
`
`I would think that could be one way of
`
`Satisfying it and, again,
`
`I think that has
`
`to be with the understanding that you're
`
`doing the sort of suboperations or what
`
`I
`
`might call subhashing functions in the
`
`course of creating the larger global
`
`ID,
`
`Downloadable ID.
`
`Is it your understanding that the
`
`Downloadable ID can consist of more than one
`
`hash value?
`
`So I sort of want
`
`to -- well, yes, and let
`
`me clarify with two different explanations
`
`depending on the interpretation of your
`
`question.
`
`So a Downloadable ID has to include a
`
`Z ESQUIRE
`
`DEPOSITION SOLUTIONS
`
`800.211.DEPO (3376)
`EsquireSolutions.com
`
`
`
`
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`
`
`Case 3:17-cv-05659-WHA Document 500-7 Filed 05/30/19 Page 10 of 16
`Case 3:17-cv-05659-WHA Document 500-7 Filed 05/30/19 Page 10 of 16
`
`MICHAEL D. MITZENMACHER Highly Confidential
`FINJAN V. JUNIPER NETWORKS
`
`July 03, 2018
`
`131
`
`BZ ESQUIRE
`
`DEPOSITION SOLUTIONS
`
`800.211.DEPO (3376)
`
`EsquireSolutions.com
`
`hash.
`
`It's supposed to be generated by
`
`hashing -- or what's the exact word
`
`something you perform a hashing function on
`
`the Downloadable and the fetch software
`
`components to generate a Downloadable ID?
`
`I
`
`think the patent specifically states that
`
`the Downloadable ID might contain other
`
`information.
`
`It might consist of more than
`
`just a hash so certainly you might have --
`
`as long as you have a hashing function on
`
`the Downloadable on the hashing components
`
`to generate a Downloadable ID, you might
`
`have additional stuff which might
`
`include
`
`additional values formed by hashing or
`
`elsewhere.
`
`Alternatively,
`
`the other way, again,
`
`the way I've been trying to be clear and
`
`explain it to you, you may have a single
`
`value which consists of a collection of
`
`subvalues or results of subcomputations that
`
`are combined. That is one of the ways of
`
`generating a hash value.
`
`So to the extent
`
`that I understand your question is saying
`
`can a single hash value arise from computing
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`Qe
`
`23
`
`24
`
`
`
`Case 3:17-cv-05659-WHA Document 500-7 Filed 05/30/19 Page 11 of 16
`Case 3:17-cv-05659-WHA Document 500-7 Filed 05/30/19 Page 11 of 16
`
`MICHAEL D. MITZENMACHER Highly Confidential
`FINJAN V. JUNIPER NETWORKS
`
`
`July 03, 2018
`132
`
`multiple like subhash functions or
`
`subcomputations that are later made into a
`
`hash,
`
`I would say yes. And,
`
`in fact,
`
`I
`
`think I've given one or more examples of how
`
`I know that's done in the art in my report.
`
`Okay.
`
`So just to make sure I understand,
`
`is
`
`it your understanding that a system that
`
`computed two different what you're calling
`
`subhash values and put
`
`them together to
`
`collectively identify the Downloadable and
`
`the fetched software components would meet
`
`the "together with" limitation?
`
`MS. HEDVAT: Objection,
`
`form.
`
`00:
`
`:14
`
`00:
`
`:16
`
`00:
`
`:20
`
`00:
`
`:23
`
`00:
`
`00:
`
`00:
`
`00;
`
`740
`
`00:
`
`743
`
`00:
`
`49
`
`746
`
`00:
`
`49;
`
`50
`
`00:
`
`49;
`
`53
`
`00:
`
`49:
`
`56
`
`00:
`
`49;
`
`57
`
`10
`
`11
`
`12
`
`13
`
`14
`
`So I would say as always when looking for
`
`infringement
`
`I would want to look fora
`
`specific implementation, but I believe at
`
`that level that would be certainly
`
`potentially one possible way of infringing.
`
`Taking a look at the infringement section
`
`for Element 1(c) of your declaration which
`
`begins on page 29 at paragraph 83, did you
`
`identify any source code in your declaration
`
`that performs a hashing function?
`
`MS. HEDVAT: Objection,
`
`form.
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`00:
`
`50;
`
`06
`
`00:
`
`50:
`
`08
`
`00:
`
`50:
`
`11
`
`00:
`
`50;
`
`12
`
`00:
`
`50:
`
`15
`
`00:
`
`50
`
`:42
`
`00:
`
`50:
`
`48
`
`00:
`
`50:
`
`58
`
`00;
`
`51:
`
`00
`
`00:
`
`51:
`
`06
`
`
`
`aaa!
`
`@ ESQUIRE
`
`DEPOSITION SOLUTIONS
`
`800.211.DEPO (3376)
`EsquireSolutions.com
`
`
`
`Case 3:17-cv-05659-WHA Document 500-7 Filed 05/30/19 Page 12 of 16
`Case 3:17-cv-05659-WHA Document 500-7 Filed 05/30/19 Page 12 of 16
`
`MICHAEL D. MITZENMACHER Highly Confidential
`FINJAN V. JUNIPER NETWORKS
`
`
`July 03, 2018
`221
`
`Reference No.: 2395311
`
`
`
`1
`
`2 3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`Case:
`
`FINJAN V.
`
`JUNIPER NETWORKS
`
`DECLARATION UNDER PENALTY OF PERJURY
`
`I declare under penalty of perjury that
`I have read the entire transcript of my Depo-
`sition taken in the captioned matter or the
`same has been read to me, and the same is
`
`true and accurate, save and except for
`changes and/or corrections, if any, as indi-
`cated by me on the DEPOSITION ERRATA SHEET
`hereof, with the understanding that I offer
`these changes as if still under oath,
`et LAE"
`
`
`
`Michael D. Mitzenmacher
`
`NOTARIZATION OF CHANGES
`
`(If Required)
`
`
`
`
`Subscribed and sworn to on the
`
`day of
`
`, 20~before me,
`
`(Notary Sign)
`
`
`
`(Print Name)
`
`Notary Public,
`
`Hassachuse FES
`in and for the State of
`
`BZ ESQUIRE
`800.211.DEPO (3376)
`
`EsquireSolutions. com
`
`DEPOSITION SOLUTIONS
`
`
`
`Case 3:17-cv-05659-WHA Document 500-7 Filed 05/30/19 Page 13 of 16
`Case 3:17-cv-05659-WHA Document 500-7 Filed 05/30/19 Page 13 of 16
`
`
`
`Change to:
`
`___yeese
`
`Line No. 24
`Page No. °
`"convenience" to Vaonvenient"
`Reason for change:
`typographical
`Page No. 19
`ine No. 16
`Change to:
`Noft Co wor"
`Reason for change:_typographical0______—
`Page No. 23
`Line No._3
`Change to:
`
`momPPWwWDN
`OoowoOON
`
`July 03, 2018222
`MICHAEL D. MITZENMACHER Highly Confidential
`EINJAN V. JUNIPER NETWORKS
`Reference No.: 2395311
`Case:
`FINJAN V.
`JUNIPER NETWORKS
`
` toe
`
`
`Reason for change:typographical0
`
`Page No. 40
`Line No. 14
`Change to:
`Nthe fetch" to "fetch"
`Reason for change:
`typographical
`Page No. 40
`Sine No. 16
`Change to:
`"tempo" to "temporal"
`
`Reason for change:
`typographical
`Page No. = Line No.
`19 Change to:
`"to restoring" to "to storing"
`Reason for change:
`typographical
`Page No. 56
`Line No. 21
`Change to:
`Ngites" to "cites"
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`Reason for change:
`
`typographical
`
`tw Wari
`SIGNATURE :
`Michael D. Mitzenmacher
`
`DATE: 7/t0/lF
`
`BQ ESQUIRE
`DEPOSITION SOLUTIONS
`
`300.211.DEPO (3376)
`EsquireSolutions.com
`
`
`
`Case 3:17-cv-05659-WHA Document 500-7 Filed 05/30/19 Page 14 of 16
`Case 3:17-cv-05659-WHA Document 500-7 Filed 05/30/19 Page 14 of 16
`
`July 03, 2018
`MICHAEL D. MITZENMACHER Highly Confidential
`223
`FINJAN V. JUNIPER NETWORKS
`
`.
`
`Reference No.: 2395311
`
`Case:
`
`FINJAN V.
`
`JUNIPER NETWORKS
`
`Change to:
`_Line No. +
`Page No. 58
`Van executable file" to "a text file"
`
`
`
`
`Reason for change:
`typographical
`Page No. 58
`Line No.
`8
`Change to:
`"wrote" to "was written"
`
`Reason for change:
`typographical
`
`Page No. 58
`
`Line No. 11
`
`Change to:
`
`"gealing which" to "C language"
`
`Reason for change:
`typographical
`Page No.
`58 Line No. 13
`Change to:
`"files contain" to "files can contain"
`
`
`Reason for change:
`
`typographical
`
`Page No. 61
`
`Line No. 5
`
`Change to:
`
`"original" to "additional"
`
`
`Reason for change:
`typographical
`Page No.
`62
`Line No. 11
`Change to:
`"typically" to "particularly"
`
`Reason for change:
`
`typographical
`Change to:
`Line No, 21
`Page No. 67
`to "such as gzip"
`"such as JSON"
`
`Reason for change:
`typographical
`
`Cc
`SIGNATURE: Me
`
`Michael D. Mitzenmacher
`
`DATE: T/20/1¥
`
`ESQUIRE
`
`DEPOSITION SOLUTIONS
`
`800.211.DEPO (3376)
`EsquireSolutions.com
`
`LB
`
`
`
`onyvnuFWND
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`a1
`
`22
`
`23
`
`24
`
`25
`
`
`
`
`
`
`Case 3:17-cv-05659-WHA Document 500-7 Filed 05/30/19 Page 15 of 16
`Case 3:17-cv-05659-WHA Document 500-7 Filed 05/30/19 Page 15 of 16
`
`July 03, 2018
`MICHAEL D. MITZENMACHER Highly Confidential
`FINJAN V. JUNIPER NETWORKS
`222
`
`Reference No.: 2395311
`
`Case:
`
`FINJAN V.
`
`JUNIPER NETWORKS
`
`Change to:
`Page No. 83__Line No. 13
`'varying" to "variant"
`
`Reason for change:
`
`typographical
`
`Page No.112 Line No.
`
`8
`
`Change to:
`
`“aontext" to "content"
`
`Reason for change:
`
`typographical
`Change to:
`Page No. 129 Line No. 18
`“fetch components" to "fetched components"
`Reason for change:
`typographical
`
`Page No. 130 Line No. 1
`
`Change to:
`
`"fetch components." to "fetched components."
`
`Reason for change:
`
`typographical
`Change to:
`Page No. 141 Line No. 20
`"fetch components." to "fetched components."
`
`Reason for change:
`
`typographical
`
`Change to:
`Page No. 147 Line No._9
`"drop files" to "dropped files"
`typographical
`Reason for change:
`Page No.154
`Line No.?
`Change to: "I'd say in different
`context." to "I'd say it's different in different context"
`
`Reason for change:
`
`
`typographical
`
`onyvnoOFFWDN
`
`10
`
`il
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`SIGNATURE:
`
`LUAce aaa”
`
`DATE:
`
`// Zo/!/
`
`25
`
`Michael D. Mitzenmacher
`
`
`ZB ESQUIRE
`
`pérasiriox socuTjons
`
`800.211.DEPO (3376)
`
`EsquireSolutions.com
`
`
`
`Case 3:17-cv-05659-WHA Document 500-7 Filed 05/30/19 Page 16 of 16
`Case 3:17-cv-05659-WHA Document 500-7 Filed 05/30/19 Page 16 of 16
`
`July 03, 2018
`MICHAEL D. MITZENMACHER Highly Confidential
`
`FINJAN V. JUNIPER NETWORKS 223
`
`Case:
`
`FINJAN V.
`
`JUNIPER NETWORKS
`
`Page No. 199 Line No.15
`
`Change to:
`
`"profile basis" to "per file basis"
`
`Reason for change:
`
`typographical
`
`Page No.179 Line No.
`
`17 Change to:
`
`"£unction is" to "function that is"
`
`Reason for change:
`
`typographical
`
`Page No. 186 Line No. 6
`
`Change to:
`
`"the junior products" to "the Juniper products"
`
`
`
` Reference No.: 2395311
`
`Reason for change:
`199
`
`typographical
`
`Change to:
`7
`Line No.
`Page No.
`"fetch components" to "fetched components"
`
`Reason for change:
`
`typographical
`
`Change to:
`Page No. 205 Line No. 6
`Yare a standard" to "and a standard"
`
`Reason for change:
`
`typographical
`
`Page No. 205 Line No.
`
`7
`
`Change to:
`
`"funetions.
`
`Can be by" to "functions, can be by"
`
`Reason for change:
`
`typographical
`
`Change to:
`Page No. 215 Line No. 17
`"made an argument." to "made in my argument."
`
`Reason for change:
`
`typographical
`
`SIGNATURE:
`
`Off geen
`
`DATE:
`
`// to7 ly
`
`Michael D. Mitzenmacher
`
`
`BESQUIRE
`
`oFposition soLuTions
`
`800.211.DEPO (3376)
`
`EsquireSolutions.com
`
`oayDHWHFFWDN
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`