throbber
Case 3:17-cv-05659-WHA Document 67-20 Filed 04/19/18 Page 1 of 93
`Case 3:17-cv-05659-WHA Document 67-20 Filed 04/19/18 Page 1 of 93
`
`
`
`
`
`
`EXHIBIT 18
`EXHIBIT 18
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`

`

`Case 3:17-cv-05659-WHA Document 67-20 Filed 04/19/18 Page 2 of 93
`
`
`
`PAUL ANDRE (State Bar No. 196585)
`pandre@kramerlevin.com
`LISA KOBIALKA (State Bar No. 191404)
`lkobialka@kramerlevin.com
`JAMES HANNAH (State Bar No. 237978)
`jhannah@kramerlevin.com
`KRAMER LEVIN NAFTALIS & FRANKEL LLP
`990 Marsh Road
`Menlo Park, CA 94025
`Telephone: (650) 752-1700
`Facsimile: (650) 752-1800
`
`Attorneys for Plaintiff
`FINJAN, INC.
`
`
`IN THE UNITED STATES DISTRICT COURT
`
`FOR THE NORTHERN DISTRICT OF CALIFORNIA
`
`FINJAN, INC., a Delaware Corporation,
`
`
`
`
`
`
`Plaintiff,
`
`v.
`
`
`JUNIPER NETWORKS, INC., a Delaware
`Corporation,
`
`
`Defendant.
`
`
`
`
`
`
`Case No.: 3:17-cv-05659-WHA
`
`FIRST AMENDED COMPLAINT
`FOR PATENT INFRINGEMENT
`
`DEMAND FOR JURY TRIAL
`
`
`
`____________________________________________________________________________________
`FIRST AMENDED COMPLAINT
`CASE NO. 3:17-cv-05659-WHA
`FOR PATENT INFRINGEMENTCASE NO.
`
`1 2 3 4 5 6 7 8 9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`

`

`Case 3:17-cv-05659-WHA Document 67-20 Filed 04/19/18 Page 3 of 93
`
`
`
`COMPLAINT FOR PATENT INFRINGEMENT
`
`Plaintiff Finjan, Inc. (“Finjan”) files this Complaint for Patent Infringement and Demand for
`
`Jury Trial against Juniper Networks, Inc. (“Defendant” or “Juniper”) and alleges as follows:
`
`THE PARTIES
`
`1.
`
`Finjan is a Delaware Corporation with its principal place of business at 2000 University
`
`Avenue, Suite 600, E. Palo Alto, California 94303.
`2.
`
`Defendant is a Delaware Corporation with its headquarters and principal place of
`
`business at 1133 Innovation Way, Sunnyvale, California 94089. Defendant may be served through its
`
`agent for service of process, CT Corporation System, at 818 W. 7th Street, Suite 930, Los Angeles,
`
`California 90017.
`
`JURISDICTION AND VENUE
`
`3.
`
`This action arises under the Patent Act, 35 U.S.C. § 101 et seq. This Court has original
`
`jurisdiction over this controversy pursuant to 28 U.S.C. §§ 1331 and 1338.
`4.
`5.
`
`This Court has personal jurisdiction over Defendant. Upon information and belief,
`
`Venue is proper in this Court pursuant to 28 U.S.C. §§ 1391(b) and (c) and/or 1400(b).
`
`Defendant is headquartered and has its principal place of business in this District (Sunnyvale,
`
`California). Defendant also regularly and continuously does business in this District and has infringed
`
`or induced infringement, and continues to do so, in this District. In addition, this Court has personal
`
`jurisdiction over Defendant because minimum contacts have been established with this forum and the
`
`exercise of jurisdiction would not offend traditional notions of fair play and substantial justice.
`
`INTRADISTRICT ASSIGNMENT
`
`6.
`
`Pursuant to Local Rule 3-2(c), Intellectual Property Actions are assigned on a district-
`
`wide basis.
`
`
`
`
`FIRST AMENDED COMPLAINT
`FOR PATENT INFRINGEMENTCASE NO.
`
`1
`
`CASE NO. 3:17-cv-05659-WHA
`
`1 2 3 4 5 6 7 8 9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`

`

`Case 3:17-cv-05659-WHA Document 67-20 Filed 04/19/18 Page 4 of 93
`
`
`
`FINJAN’S INNOVATIONS
`
`7.
`
`Finjan was founded in 1997 as a wholly-owned subsidiary of Finjan Software Ltd., an
`
`Israeli corporation. In 1998, Finjan moved its headquarters to San Jose, California. Finjan was a
`
`pioneer in developing proactive security technologies capable of detecting previously unknown and
`
`emerging online security threats, recognized today under the umbrella term “malware.” These
`
`technologies protect networks and endpoints by identifying suspicious patterns and behaviors of
`
`content delivered over the Internet. Finjan has been awarded, and continues to prosecute, numerous
`
`patents covering innovations in the United States and around the world resulting directly from Finjan’s
`
`more than decades-long research and development efforts, supported by a dozen inventors and over
`
`$65 million in R&D investments.
`8.
`
`Finjan built and sold software, including application program interfaces (APIs) and
`
`appliances for network security, using these patented technologies. These products and related
`
`customers continue to be supported by Finjan’s licensing partners. At its height, Finjan employed
`
`nearly 150 employees around the world building and selling security products and operating the
`
`Malicious Code Research Center, through which it frequently published research regarding network
`
`security and current threats on the Internet. Finjan’s pioneering approach to online security drew
`
`equity investments from two major software and technology companies, the first in 2005 followed by
`
`the second in 2006. Finjan generated millions of dollars in product sales and related services and
`
`support revenues through 2009, when it spun off certain hardware and technology assets in a merger.
`
`Pursuant to this merger, Finjan was bound to a non-compete and confidentiality agreement, under
`
`which it could not make or sell a competing product or disclose the existence of the non-compete
`
`clause. Finjan became a publicly traded company in June 2013, capitalized with $30 million. After
`
`Finjan’s obligations under the non-compete and confidentiality agreement expired in March 2015,
`
`Finjan re-entered the development and production sector of secure mobile products for the consumer
`
`market.
`
`
`
`
`FIRST AMENDED COMPLAINT
`FOR PATENT INFRINGEMENTCASE NO.
`
`2
`
`CASE NO. 3:17-cv-05659-WHA
`
`1 2 3 4 5 6 7 8 9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`

`

`Case 3:17-cv-05659-WHA Document 67-20 Filed 04/19/18 Page 5 of 93
`
`
`
`FINJAN’S ASSERTED PATENTS
`
`9.
`
`On November 28, 2000, U.S. Patent No. 6,154,844 (“the ‘844 Patent”), titled SYSTEM
`
`AND METHOD FOR ATTACHING A DOWNLOADABLE SECURITY PROFILE TO A
`
`DOWNLOADABLE, was issued to Shlomo Touboul and Nachshon Gal. A true and correct copy of
`
`the ‘844 Patent is attached to this Complaint as Exhibit 1 and is incorporated by reference herein.
`10.
`
`All rights, title, and interest in the ‘844 Patent have been assigned to Finjan, who is the
`
`sole owner of the ‘844 Patent. Finjan has been the sole owner of the ‘844 Patent since its issuance.
`11.
`
`The ‘844 Patent is generally directed toward computer networks, and more particularly,
`
`provides a system that protects devices connected to the Internet from undesirable operations from
`
`web-based content. One of the ways this is accomplished is by linking a security profile to such web-
`
`based content to facilitate the protection of computers and networks from malicious web-based
`
`content.
`12.
`
`On October 12, 2004, U.S. Patent No. 6,804,780 (“the ‘780 Patent”), titled SYSTEM
`
`AND METHOD FOR PROTECTING A COMPUTER AND A NETWORK FROM HOSTILE
`
`DOWNLOADABLES, was issued to Shlomo Touboul. A true and correct copy of the ‘780 Patent is
`
`attached to this Complaint as Exhibit 2 and is incorporated by reference herein.
`13.
`
`All rights, title, and interest in the ‘780 Patent have been assigned to Finjan, who is the
`
`sole owner of the ‘780 Patent. Finjan has been the sole owner of the ‘780 Patent since its issuance.
`14.
`
`The ‘780 Patent is generally directed toward methods and systems for generating a
`
`Downloadable ID. By generating an identification for each examined Downloadable, the system may
`
`allow for the Downloadable to be recognized without reevaluation. Such recognition increases
`
`efficiency while also saving valuable resources, such as memory and computing power.
`15.
`
`On January 12, 2010, U.S. Patent No. 7,647,633 (“the ‘633 Patent”), titled
`
`MALICIOUS MOBILE CODE RUNTIME MONITORING SYSTEM AND METHODS, was issued
`
`to Yigal Mordechai Edery, Nimrod Itzhak Vered, David R. Kroll, and Shlomo Touboul. A true and
`
`correct copy of the ‘633 Patent is attached to this Complaint as Exhibit 3 and is incorporated by
`
`reference herein.
`
`FIRST AMENDED COMPLAINT
`FOR PATENT INFRINGEMENTCASE NO.
`
`3
`
`CASE NO. 3:17-cv-05659-WHA
`
`1 2 3 4 5 6 7 8 9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`

`

`Case 3:17-cv-05659-WHA Document 67-20 Filed 04/19/18 Page 6 of 93
`
`
`
`16.
`
`All rights, title, and interest in the ‘633 Patent have been assigned to Finjan, who is the
`
`sole owner of the ‘633 Patent. Finjan has been the sole owner of the ‘633 Patent since its issuance.
`17.
`
`The ‘633 Patent is generally directed toward computer networks and, more particularly,
`
`provides a system that protects devices connected to the Internet from undesirable operations from
`
`web-based content. One of the ways this is accomplished is by determining whether any part of such
`
`web-based content can be executed and then trapping such content and neutralizing possible harmful
`
`effects using mobile protection code.
`18.
`
`On November 3, 2009, U.S. Patent No. 7,613,926 (“the ‘926 Patent”), titled METHOD
`
`AND SYSTEM FOR PROTECTING A COMPUTER AND A NETWORK FROM HOSTILE
`
`DOWNLOADABLES, was issued to Yigal Mordechai Edery, Nimrod Itzhak Vered, David R. Kroll,
`
`and Shlomo Touboul. A true and correct copy of the ‘926 Patent is attached to this Complaint as
`
`Exhibit 4 and is incorporated by reference herein.
`19.
`
`All rights, title, and interest in the ‘926 Patent have been assigned to Finjan, who is the
`
`sole owner of the ‘926 Patent. Finjan has been the sole owner of the ‘926 Patent since its issuance.
`20.
`
`The ‘926 Patent is generally directed toward methods and systems for protecting a
`
`computer and a network from hostile downloadables. One of the ways this is accomplished is by
`
`performing hashing on a downloadable in order to generate a downloadable ID, retrieving security
`
`profile data, and transmitting an appended downloadable or transmitting the downloadable with a
`
`representation of the downloadable security profile data.
`21.
`
`On March 20, 2012, U.S. Patent No. 8,141,154 (“the ‘154 Patent”), titled SYSTEM
`
`AND METHOD FOR INSPECTING DYNAMICALLY GENERATED EXECUTABLE CODE, was
`
`issued to David Gruzman and Yuval Ben-Itzhak. A true and correct copy of the ‘154 Patent is attached
`
`to this Complaint as Exhibit 5 and is incorporated by reference herein.
`22.
`
`All rights, title, and interest in the ‘154 Patent have been assigned to Finjan, who is the
`
`sole owner of the ‘154 Patent. Finjan has been the sole owner of the ‘154 Patent since its issuance.
`23.
`
`The ‘154 Patent is generally directed toward a gateway computer protecting a client
`
`computer from dynamically generated malicious content. One of the ways this is accomplished is by
`
`FIRST AMENDED COMPLAINT
`FOR PATENT INFRINGEMENTCASE NO.
`
`4
`
`CASE NO. 3:17-cv-05659-WHA
`
`1 2 3 4 5 6 7 8 9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`

`

`Case 3:17-cv-05659-WHA Document 67-20 Filed 04/19/18 Page 7 of 93
`
`
`
`using a content processor to process a first function and invoke a second function if a security
`
`computer indicates that it is safe to invoke the second function.
`24.
`
`On March 18, 2014, U.S. Patent No. 8,677,494 (“the ‘494 Patent”), titled MALICIOUS
`
`MOBILE CODE RUNTIME MONITORING SYSTEM AND METHODS, was issued to Yigal
`
`Mordechai Edery, Nimrod Itzhak Vered, David R. Kroll, and Shlomo Touboul. A true and correct
`
`copy of the ‘494 Patent is attached to this Complaint as Exhibit 6 and is incorporated by reference
`
`herein.
`
`25.
`
`All rights, title, and interest in the ‘494 Patent have been assigned to Finjan, who is the
`
`sole owner of the ‘494 Patent. Finjan has been the sole owner of the ‘494 Patent since its issuance.
`26.
`
`The ‘494 Patent is generally directed toward a method and system for deriving security
`
`profiles and storing the security profiles. One of the ways this is accomplished is by deriving a
`
`security profile for a downloadable, which includes a list of suspicious computer operations, and
`
`storing the security profile in a database.
`
`27.
`
`On July 5, 2011, U.S. Patent No. 7,975,305 (“the ‘305 Patent”), titled METHOD AND
`
`SYSTEM FOR ADAPTIVE RULE-BASED CONENT SCANNERS FOR DESKTOP COMPUTERS,
`
`was issued to Moshe Rubin, Moshe Matitya, Artem Melnick, Shlomo Touboul, Alexander Yermakov,
`
`and Amit Shaked. A true and correct copy of the ‘305 Patent is attached to this Complaint as Exhibit 7
`
`and is incorporated by reference herein.
`
`28.
`
`All rights, title, and interest in the ‘305 Patent have been assigned to Finjan, who is the
`
`sole owner of the ‘305 Patent. Finjan has been the sole owner of the ‘305 Patent since its issuance.
`
`29.
`
`The ‘305 Patent is generally directed toward network security and, in particular, rule
`
`based scanning of web-based content for exploits. One of the ways this is accomplished is by using
`
`parser and analyzer rules to describe computer exploits as patterns of types of tokens. Additionally,
`
`the system provides a way to keep these rules updated.
`
`30.
`
`On July 17, 2012, U.S. Patent No. 8,225,408 (“the ‘408 Patent”), entitled METHOD
`
`AND SYSTEM FOR ADAPTIVE RULE-BASED CONTENT SCANNERS, was issued to Moshe
`
`Rubin, Moshe Matitya, Artem Melnick, Shlomo Touboul, Alexander Yermakov and Amit Shaked. A
`
`FIRST AMENDED COMPLAINT
`FOR PATENT INFRINGEMENTCASE NO.
`
`5
`
`CASE NO. 3:17-cv-05659-WHA
`
`1 2 3 4 5 6 7 8 9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`

`

`Case 3:17-cv-05659-WHA Document 67-20 Filed 04/19/18 Page 8 of 93
`
`
`
`true and correct copy of the ‘408 Patent is attached to this First Supplemental Complaint as Exhibit 8
`
`and is incorporated by reference herein.
`
`31.
`
`All rights, title, and interest in the ‘408 Patent have been assigned to Finjan, who is the
`
`sole owner of the ‘408 Patent. Finjan has been the sole owner of the ‘408 Patent since its issuance.
`
`32.
`
`The ‘408 Patent is generally directed toward network security and, in particular, rule
`
`based scanning of web-based content for a variety of exploits written in different programming
`
`languages. One of the ways this is accomplished is by expressing the exploits as patterns of tokens.
`
`Additionally, the system provides a way to analyze these exploits by using a parse tree.
`27.
`
`33.The ‘844 Patent, the ‘780 Patent, the ‘633 Patent, the ‘926 Patent, the ‘154 Patent,
`
`the ‘494 Patent, the ‘305 Patent, and the ‘408 Patent, as described in paragraphs 9-32 9-27 above, are
`
`collectively referred to as the “Asserted Patents” herein.
`
`FINJAN’S NOTICE OF INFRINGEMENT TO DEFENDANT
`
`28.
`
`34.Finjan and Defendant’s patent discussions date back to June 2014. Finjan contacted
`
`Defendant on or about June 10, 2014, regarding a potential license to Finjan’s patents.
`29.
`
`35.On or about July 2, 2014, Finjan provided Defendant with an exemplary claim chart
`
`detailing how Defendant’s products relate to U.S. Patent Number 6,965,968 (the “‘968 Patent”). In the
`
`email attaching that exemplary claim chart, Finjan told Defendant: “We believe a license to Finjan’s
`
`patent portfolio could be beneficial to some [of] Juniper’s security products and services. Besides, we
`
`could also explore possible common interests relating to other patent collaborations such as co-
`
`investments or M&A activities in technology companies.” Finjan also offered to provide Defendant
`
`with additional exemplary claim charts, under a non-disclosure agreement, so that Defendant could
`
`evaluate Finjan’s patent portfolio.
`30.
`
`36.On or about January 12, 2015, Finjan met with Defendant’s Senior Director of IP,
`
`Litigation and Strategy regarding Defendant’s products and how they relate to Finjan’s patents. Finjan
`
`again offered to enter into a non-disclosure agreement, so that Defendant could evaluate Finjan’s
`
`patent portfolio in detail, but Defendant declined to enter into a non-disclosure agreement at that time.
`
`FIRST AMENDED COMPLAINT
`FOR PATENT INFRINGEMENTCASE NO.
`
`6
`
`CASE NO. 3:17-cv-05659-WHA
`
`1 2 3 4 5 6 7 8 9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`

`

`Case 3:17-cv-05659-WHA Document 67-20 Filed 04/19/18 Page 9 of 93
`
`
`
`31.
`
`37.On or about February 13, 2015, Defendant sent a letter to Finjan listing ten patents
`
`that Defendant believed would be considered “prior art” to the ‘968 Patent. Finjan contacted
`
`Defendant again on February 18, 2015, and February 20, 2015, in an attempt to follow up on
`
`Defendant’s letter, but Defendant declined to respond to Finjan’s February 20, 2015, email.
`32.
`
`38.Having heard no response from Defendant’s Senior Director of IP, Litigation and
`
`Strategy, on or about September 30, 2015, Finjan sent a letter to Defendant distinguishing the ten
`
`patents that Defendant had identified as potential “prior art” and stating how those ten patents were not
`
`relevant to the ‘968 Patent. Again, Defendant’s Senior Director of IP, Litigation and Strategy declined
`
`to respond to Finjan’s letter.
`33.
`
`39.On or about October 15, 2015, Finjan contacted Defendant’s Deputy General
`
`Counsel to discuss Defendant’s products and how they read on Finjan’s patents. Defendant’s Deputy
`
`General Counsel referred Finjan back to Defendant’s Senior Director of IP, Litigation and Strategy to
`
`continue licensing discussions.
`34.
`
`40.On or about November 24, 2015, Finjan spoke again with Defendant’s Senior
`
`Director of IP, Litigation and Strategy by telephone, to discuss Defendant’s products and how they
`
`relate to Finjan’s patents. During that telephone call, Defendant’s Senior Director of IP, Litigation and
`
`Strategy indicated that he did not think Finjan was worth Defendant’s time and he expressed no
`
`interest in understanding the analysis that Finjan had prepared regarding Defendant’s products and
`
`how they relate to Finjan’s patents. Defendant’s Senior Director of IP, Litigation and Strategy also
`
`repeatedly turned that telephone conversation toward the topic of litigation, referenced his own
`
`hypothetical deposition, refused to sign an non-disclosure agreement, and stated that if Finjan shared
`
`any more exemplary claim charts with him, he would share them with other entities.
`35.
`
`41.On or about February 2, 2016, Finjan contacted Defendant’s Deputy General
`
`Counsel again to express concern that Defendant did not seem to be taking Finjan’s efforts to engage
`
`in licensing discussions seriously, and to discuss how Defendant’s products related to Finjan’s patents.
`
`FIRST AMENDED COMPLAINT
`FOR PATENT INFRINGEMENTCASE NO.
`
`7
`
`CASE NO. 3:17-cv-05659-WHA
`
`1 2 3 4 5 6 7 8 9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`

`

`Case 3:17-cv-05659-WHA Document 67-20 Filed 04/19/18 Page 10 of 93
`
`
`
`36.
`
`42.Despite Finjan’s earnest and consistent efforts since June 2014, Defendant has
`
`refused to take a license to Finjan’s patents. At no time has Defendant provided any explanation as to
`
`how any of the Accused Products do not infringe any of the Asserted Patents.
`
`JUNIPER
`
`37.
`
`43.Defendant makes, uses, sells, offers for sale, and/or imports into the United States
`
`and this District products and services that utilize the SRX Series Services Gateways, Sky Advanced
`
`Threat Prevention (“Sky ATP”), and Junos Space Security Director, and Contrail products. See:
`
`http://www.juniper.net/us/en/products-services/security/srx-series/;
`
`http://www.juniper.net/us/en/products-services/security/sky-advanced-threat-prevention/;
`
`http://www.juniper.net/us/en/products-services/security/security-director/; and
`
`http://www.juniper.net/us/en/products-services/sdn/contrailhttps://www.juniper.net/us/en/products-
`
`services/security/advanced-threat-prevention-appliance/; and http://www.juniper.net/us/en/products-
`
`services/security/security-director/, attached hereto as Exhibits 9-12.
`
`SRX Gateways
`
`38.
`
`44.Defendant’s SRX Series Services Gateways are Defendant’s next-generation
`
`gateway platforms designed for small, medium, and large enterprises. Defendant’s SRX Gateways
`
`include the: SRX110; SRX220; SRX300; SRX550; SRX1400; SRX1500; SRX3400; SRX3600;
`
`SRX4000; SRX5400; SRX5600; and SRX5800 gateway appliances, as well as the vSRX Virtual
`
`Firewall and cSRX Container Firewall (collectively, “SRX Gateways”). See
`
`http://www.juniper.net/us/en/products-services/security/srx-series/, attached hereto as Exhibit 9. SRX
`
`Gateways perform malware detection by processing network traffic using static and dynamic analysis.
`
`SRX Gateways integrate with Defendant’s Sky ATP service for malware detection and with Junos
`
`Space Security Director to maintain databases and manage security policies across the network.
`
`FIRST AMENDED COMPLAINT
`FOR PATENT INFRINGEMENTCASE NO.
`
`8
`
`CASE NO. 3:17-cv-05659-WHA
`
`1 2 3 4 5 6 7 8 9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`

`

`Case 3:17-cv-05659-WHA Document 67-20 Filed 04/19/18 Page 11 of 93
`
`
`
`See http://www.juniper.net/assets/us/en/local/pdf/datasheets/1000281-en.pdf at 3, attached hereto as
`Exhibit 13.
`
`
`
`
`See http://www.juniper.net/assets/us/en/local/pdf/datasheets/1000489-en.pdf at 2, attached hereto as
`Exhibit 14.
`
`FIRST AMENDED COMPLAINT
`FOR PATENT INFRINGEMENTCASE NO.
`
`9
`
`CASE NO. 3:17-cv-05659-WHA
`
`
`
`1 2 3 4 5 6 7 8 9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`

`

`Case 3:17-cv-05659-WHA Document 67-20 Filed 04/19/18 Page 12 of 93
`
`
`
`
`
`FIRST AMENDED COMPLAINT
`FOR PATENT INFRINGEMENTCASE NO.
`
`10
`
`CASE NO. 3:17-cv-05659-WHA
`
`1 2 3 4 5 6 7 8 9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`

`

`Case 3:17-cv-05659-WHA Document 67-20 Filed 04/19/18 Page 13 of 93
`
`
`
`
`
`FIRST AMENDED COMPLAINT
`FOR PATENT INFRINGEMENTCASE NO.
`
`11
`
`CASE NO. 3:17-cv-05659-WHA
`
`1 2 3 4 5 6 7 8 9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`

`

`Case 3:17-cv-05659-WHA Document 67-20 Filed 04/19/18 Page 14 of 93
`
`
`
`
`See http://www.juniper.net/assets/us/en/local/pdf/datasheets/1000281-en.pdf at 3 and 6-7, attached
`hereto as Exhibit 14.
`
`Sky ATP
`
`39.
`
`45.Defendant’s Sky ATP is a cloud-based service that is integrated with SRX Gateways
`
`to provide “complete advanced malware protection” and deliver “a dynamic anti-malware solution that
`
`can adapt to an ever-changing threat landscape.” http://www.juniper.net/us/en/products-
`
`services/security/sky-advanced-threat-prevention/, attached hereto as Exhibit 10;
`
`https://www.youtube.com/watch?v=efXR9F1WM80. As shown below, SRX Gateway’s integrate with
`
`Sky ATP to deliver inspection, inline malware blocking, and actionable reporting.
`
`FIRST AMENDED COMPLAINT
`FOR PATENT INFRINGEMENTCASE NO.
`
`12
`
`CASE NO. 3:17-cv-05659-WHA
`
`1 2 3 4 5 6 7 8 9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`

`

`Case 3:17-cv-05659-WHA Document 67-20 Filed 04/19/18 Page 15 of 93
`
`
`
`Sky ATP Admin Manual at 8, attached hereto as Exhibit 15.
`40.
`46.Sky ATP analyzes network traffic and extracts suspicious code for analysis across a
`
`broad range of files contained within this network traffic. Sky ATP uses a pipeline approach to
`
`analyzing malware using cache lookups, traditional antivirus scanning, static analysis, and dynamic
`
`analysis using a sandbox.
`
`
`
`FIRST AMENDED COMPLAINT
`FOR PATENT INFRINGEMENTCASE NO.
`
`13
`
`CASE NO. 3:17-cv-05659-WHA
`
`1 2 3 4 5 6 7 8 9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`

`

`Case 3:17-cv-05659-WHA Document 67-20 Filed 04/19/18 Page 16 of 93
`
`
`
`Sky ATP Admin Manual at 9, attached hereto as Exhibit 15.
`41.
`
`47.As shown below, Sky ATP creates a file hash of incoming downloadables (using
`
`SHA256) and stores the hash value in a database.
`
`
`
`Sky ATP Admin Manual at 9, attached hereto as Exhibit 15.
`42.
`
`48.Sky ATP uses static analysis to examine files for suspicious operations, such as
`
`modifying the Windows registry or creating a file. The output of the static analysis performed by Sky
`
`ATP is a security profile that is fed into Juniper’s systems to protect an internal network and/or to
`
`allow for further analysis or intelligence.
`
`
`
`FIRST AMENDED COMPLAINT
`FOR PATENT INFRINGEMENTCASE NO.
`
`14
`
`CASE NO. 3:17-cv-05659-WHA
`
`1 2 3 4 5 6 7 8 9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`

`

`Case 3:17-cv-05659-WHA Document 67-20 Filed 04/19/18 Page 17 of 93
`
`
`
`Sky ATP Admin Manual at 10, attached hereto as Exhibit 15.
`43.
`
`49.Sky ATP also uses dynamic analysis (e.g., sandboxing) to monitor and “record” the
`
`activity of a downloadable, including suspicious operations indicative of malware. The output of the
`
`dynamic analysis performed by Sky ATP is a security profile that is fed into Juniper’s systems to
`
`protect an internal network and/or allow for further analysis or intelligence.
`
`
`
`Sky ATP Admin Manual at 10, attached hereto as Exhibit 15.
`44.
`
`50.The security profiles are fed into Juniper’s systems to generate a “threat level” for
`
`
`
`each downloadable.
`
`FIRST AMENDED COMPLAINT
`FOR PATENT INFRINGEMENTCASE NO.
`
`15
`
`CASE NO. 3:17-cv-05659-WHA
`
`1 2 3 4 5 6 7 8 9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`

`

`Case 3:17-cv-05659-WHA Document 67-20 Filed 04/19/18 Page 18 of 93
`
`
`
`
`
`Sky ATP Admin Manual at 11, attached hereto as Exhibit 15.
`
`Junos Space Security Director
`
`45.
`
`51.Defendant’s Junos Space Security Director provides security policy management
`
`through a centralized interface that gives administrators security management and policy control,
`
`network-wide. Junos Space Security Director integrates with Sky ATP, storing and using information
`
`gathered and reported by Sky ATP to learn about and respond to new threats. With this information,
`
`Junos Space Security Director automatically updates policies and deploys new enforcements, thereby
`
`quarantining and tracking infected hosts to stop the progress of threats.
`
`FIRST AMENDED COMPLAINT
`FOR PATENT INFRINGEMENTCASE NO.
`
`16
`
`
`
`CASE NO. 3:17-cv-05659-WHA
`
`1 2 3 4 5 6 7 8 9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`

`

`Case 3:17-cv-05659-WHA Document 67-20 Filed 04/19/18 Page 19 of 93
`
`
`
`http://www.juniper.net/assets/us/en/local/pdf/datasheets/1000332-en.pdf), at 1, attached hereto as
`
`Exhibit 16.
`
`
`
`Contrail
`
`17
`
`CASE NO. 3:17-cv-05659-WHA
`
`FIRST AMENDED COMPLAINT
`FOR PATENT INFRINGEMENTCASE NO.
`
`1 2 3 4 5 6 7 8 9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`

`

`Case 3:17-cv-05659-WHA Document 67-20 Filed 04/19/18 Page 20 of 93
`
`
`
`52.
`
`Defendant’s Contrail system is a cloud-based security platform that allows users to
`
`apply security policies uniformly across multiple networking environments. Contrail provides control
`
`over application traffic flow, enforces security policies, and selectively redirects suspicious network
`
`traffic to Defendant’s SRX Gateways. Contrail also provides deep insight into application interactions
`
`and uses machine learning to detect anomalies and take corrective action.
`
`http://www.juniper.net/us/en/products-services/sdn/contrail/contrail-security/, attached hereto as
`
`Exhibit 17.
`
`ATP Appliance
`
`46.
`
`Defendant’s ATP Appliance is an hardware appliance and associated software that can
`
`integrate with SRX Gateways to provide analysis of for potential malware through static analysis,
`
`dynamic payload analysis through sandboxing, and machine learning and behavioral analysis.
`
`1000627-en.pdf at 2, attached hereto as Exhibit 29. ATP Appliance inspects downloaded traffic across
`
`multiple vectors like web and email. ATP Appliance will analyze multiple executable file types to
`
`identify exploits. ATP Appliance also correlates events across kill chain stages to monitor threat
`
`progress and risk, calculating a score based on threat severity, threat progress, asset value, and other
`
`contextual data.
`
`3510633-en.pdf at 4, attached hereto as Exhibit 30.
`
`FIRST AMENDED COMPLAINT
`FOR PATENT INFRINGEMENTCASE NO.
`
`18
`
`
`
`CASE NO. 3:17-cv-05659-WHA
`
`1 2 3 4 5 6 7 8 9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`

`

`Case 3:17-cv-05659-WHA Document 67-20 Filed 04/19/18 Page 21 of 93
`
`
`
`JUNIPER’S INFRINGEMENT OF FINJAN’S PATENTS
`
`47.
`
`53.Defendant has been and is now infringing, and will continue to infringe, the ‘844
`
`Patent, the ‘780 Patent, the ‘633 Patent, the ‘926 Patent, the ‘154 Patent, and the ‘494 Patent, the ‘305
`
`Patent, and the ‘408 Patent (collectively, the “Asserted Patents”) in this Judicial District and elsewhere
`
`in the United States by, among other things, making, using, importing, selling, and/or offering for sale
`
`the SRX Gateways, Sky ATP, ATP Appliance, and Junos Space Security Director products.
`
`54.
`
`In addition to directly infringing the Asserted Patents pursuant to 35 U.S.C. § 271(a),
`
`either literally or under the doctrine of equivalents, or both, Defendant indirectly infringes all the
`
`Asserted Patents by instructing, directing, and/or requiring others, including its customers, purchasers,
`
`users, and developers, to perform all or some of the steps of the method claims, either literally or under
`
`the doctrine of equivalents, or both, of the Asserted Patents.
`
`COUNT I
`(Direct Infringement of the ‘844 Patent pursuant to 35 U.S.C. § 271(a))
`55.Finjan repeats, realleges, and incorporates by reference, as if fully set forth herein,
`
`48.
`
`the allegations of the preceding paragraphs, as set forth above.
`49.
`
`56.Defendant has infringed Claims 1-44 , 15, and 41 of the ‘844 Patent in violation of
`
`35 U.S.C. § 271(a).
`50.
`
`57.Defendant’s infringement is based upon literal infringement or infringement under
`
`the doctrine of equivalents, or both.
`51.
`
`58.Defendant’s acts of making, using, importing, selling, and/or offering for sale
`
`infringing products and services have been without the permission, consent, authorization, or license of
`
`Finjan.
`52.
`
`59.Defendant’s infringement includes the manufacture, use, sale, importation and/or
`
`offer for sale of Defendant’s products and services, including the SRX Gateways and also the SRX
`
`Gateways using Sky ATP and ATP Appliance, or Sky ATP and ATP Appliances alone, or in
`
`combination with Junos Space Security Director (collectively, the “‘844 Accused Products”).
`
`FIRST AMENDED COMPLAINT
`FOR PATENT INFRINGEMENTCASE NO.
`
`19
`
`CASE NO. 3:17-cv-05659-WHA
`
`1 2 3 4 5 6 7 8 9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`

`

`Case 3:17-cv-05659-WHA Document 67-20 Filed 04/19/18 Page 22 of 93
`
`
`
`53.
`
`60.The ‘844 Accused Products embody the patented invention of the ‘844 Patent and
`
`infringe the ‘844 Patent because they practice a method of receiving by an inspector a downloadable,
`
`generating by the inspector (e.g., Sky ATP’s and ATP Appliance’s static and dynamic analyzers) a first
`
`downloadable security profile that identifies suspicious code in the received downloadable, and linking
`
`by the inspector the first downloadable security profile to the downloadable before a web server makes
`
`the downloadable available to web clients. See Sky ATP Admin Manual) at 9-11, attached hereto as
`
`Exhibit 15. For example, as shown below, the ‘844 Accused Products provide gateway security to end
`
`users, where incoming downloadables (e.g., PDFs with JavaScript, EXE files, or JavaScript embedded
`
`within an HTML file) are received by the ‘844 Products.
`
`FIRST AMENDED COMPLAINT
`FOR PATENT INFRINGEMENTCASE NO.
`
`20
`
`CASE NO. 3:17-cv-05659-WHA
`
`1 2 3 4 5 6 7 8 9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`

`

`Case 3:17-cv-05659-WHA Document 67-20 Filed 04/19/18 Page 23 of 93
`
`
`
`
`
`FIRST AMENDED COMPLAINT
`FOR PATENT INFRINGEMENTCASE NO.
`
`21
`
`CASE NO. 3:17-cv-05659-WHA
`
`1 2 3 4 5 6 7 8 9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`

`

`Case 3:17-cv-05659-WHA Document 67-20 Filed 04/19/18 Page 24 of 93
`
`
`
`
`
`FIRST AMENDED COMPLAINT
`FOR PATENT INFRINGEMENTCASE NO.
`
`22
`
`CASE NO. 3:17-cv-05659-WHA
`
`1 2 3 4 5 6 7 8 9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`

`

`Case 3:17-cv-05659-WHA Document 67-20 Filed 04/19/18 Page 25 of 93
`
`
`
`See http://www.juniper.net/documentation/en_US/release-independent/sky-atp/topics/concept/sky-atp-
`about.html at 3-4, attached hereto as Exhibit 18.
`54.
`61.Sky ATP

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket