throbber
Case 3:18-cv-02621-WHO Document 242 Filed 12/03/19 Page 1 of 6
`
`TENTATIVE RULING
`
`Finjan v. Check Point, 18-cv-02621
`
`
`
`
`
`Below are my tentative rulings on the issues presented regarding the Second Amended
`
`Infringement Contentions. I hope this will focus the parties’ arguments. Each side will have 30
`
`minutes to address any issues of concern: Finjan will start. Please note my order at the end of
`
`this document.
`
`ISSUE (1): Does Finjan continue to accuse products and theories that were previously struck
`
`with prejudice in the AIC Order because Finjan:
`
`(a) did not cite any source code citations for those products;
`
`(b) contentions were incomplete because Finjan provided source code citations for
`
`some elements of an asserted claim but not others;
`
`(c) accused a marketing term and not a product?
`
`TENTATIVE (1): Yes. To the extent that Finjan’s SAICs continue to not provide any source
`
`code or fail to explain why source code for one product shows infringement in a wholly different
`
`product, those contentions are stuck with prejudice. However, to the extent the SAICs accuse the
`
`marketing term CloudGuard, it is understood that Finjan is referring to the product CloudGuard
`
`SaaS. More details below:
`
`(a) Yes. In the AIC round, Check Point provided an Appendix that showed 30 of the
`
`52 instrumentalities did not include any source code citations at all. Finjan did
`
`not respond to this argument in the AIC Round, which I noted in the last hearing.
`
`Now Finjan is contesting the accuracy of that Appendix. But Check Point is
`
`correct in showing examples that even if Finjan did give some source code
`
`citations to those 30 products, it was for wholly irrelevant code related to other
`
`products. Finjan does not explain why the code for X product is relevant to
`
`infringement contentions about Y product.
`
`(b) Yes. Other than the 30 instrumentalities struck because no source code was cited
`
`
`
`1
`
`

`

`Case 3:18-cv-02621-WHO Document 242 Filed 12/03/19 Page 2 of 6
`
`(or irrelevant source code was cited), there were other contentions that were also
`
`struck because Finjan did not give pinpoint citations to all elements of the claim.
`
`Finjan again contests the accuracy of the Appendix. But Check Point’s examples
`
`shows that even if some code was cited, it was code from a wholly different
`
`product. Finjan had access to the source code directory for each product
`
`(Interrogatory No. 9), so it does not have an excuse to pin cite irrelevant source
`
`code without an explanation.
`
`(c) No. The AIC Order did not address CloudGuard as a marketing term; the
`
`marketing term addressed was ThreatCloud, which was then struck with
`
`prejudice. Finjan previously included contentions against “CloudGuard”
`
`marketing term, which Check Point argued that it understood to be “CloudGuard
`
`SaaS” product. Check Point recognized that Finjan’s AIC charts were purporting
`
`to describe infringement theories for a list of actual products, which included
`
`“CloudGuard: CloudGuard Saas.” See Defendants’ Motion to Strike Amended
`
`Infringement Contentions [Dkt. No. 125-4].
`
`
`
`ISSUE (2): Does Finjan include new accusations including:
`
`(a) new products and patents;
`
`(b) new claims;
`
`(c) new combinations?
`
`TENTATIVE (2): Yes. To the extent Finjan includes new products or adds that existing
`
`products infringe on other patents that were not previously asserted, those contentions are struck
`
`with prejudice. Finjan’s new combination contentions in its SAICs that were not previously
`
`included are also struck with prejudice. More details below:
`
`(a) Yes. Finjan attempts to argue that it accused these products in its AICs by
`
`pointing to wholly different charts, within a contention for something else
`
`entirely. Check Point claims that all of Finjan’s “rebuttals” in this section have
`
`
`
`2
`
`

`

`Case 3:18-cv-02621-WHO Document 242 Filed 12/03/19 Page 3 of 6
`
`the same flaw.
`
`(b) Yes. Check Point argues that Finjan has taken products that up to this point had
`
`only been accused of infringing a claim in combination with other products, and
`
`now in the SAICs adds that these products also infringe the claim on its own.
`
`Finjan does not respond to this argument. It only shows that previous IC charts
`
`showed the combinations, which misses the point.
`
`(c) Yes. Finjan attempts to argue that it accused these product combinations in its
`
`AICs by pointing to code cites that appear in the middle of claim charts for
`
`entirely different products.
`
`
`
`ISSUE (3): Does Finjan fail to adequately identify and explain the accused combinations?
`
`Specifically, does Finjan fail to:
`
`(a) identify and explain how SmartEvent or Forensics infringe the ‘494 and ‘086 in
`
`combination with other accused instrumentalities;
`
`(b) assert that Network Firewall practices any limits of the ‘968 ‘154 and ‘731
`
`Patents;
`
`(c) identify whether Anti-Bot or Anti-Virus practice limitations of the ‘154 claims for
`
`show how they work together?
`
`TENTATIVE (3): Yes. Finjan does not specify which instrumentalities are combined, and even
`
`if it does, it does not describe how that combination infringes. More details below:
`
`(a) Yes. Finjan does not identify which instrumentalities can combine with
`
`SmartEvent or Forensics to infringe ‘494 and ‘086 in combination. Instead, it
`
`contains generic combination language that states that these two products can be
`
`combined with “any other Endopint Security Instrumentality.” Finjan argues that
`
`specifying the combination any further would have required it to make an
`
`additional 2,000 charts. But the way it is charted now would allow it to have
`
`enormous leeway on how it could allege the combinations at trial.
`
`
`
`3
`
`

`

`Case 3:18-cv-02621-WHO Document 242 Filed 12/03/19 Page 4 of 6
`
`(b) Yes. Finjan’s statement for Firewall + Threat Emulation is virtually identical to
`
`the statement for Threat Emulation alone, which means that it does not show
`
`specifically how Firewall is used in combination with Threat Emulation.
`
`(c) Yes. Finjan only shows that the Anti-Bot instrumentality and Anti-Virus
`
`instrumentality operate together using a shared ThreatSpect engine, but that still
`
`does not sufficiently explain how the instrumentalities from the combination
`
`satisfy a specific claim element.
`
`
`
`ISSUE (4): Does Finjan include long open-ended citations to entire source code directories in an
`
`effort to preserve its ability to expand/change its theories later in the case?
`
`TENTATIVE (4): No, as long as Finjan’s disclaimer is clear. Check Point accuses Finjan of
`
`including block source code cites after each of its pin cites. Finjan quotes Judge Hixson’s recent
`
`order in Finjan, Inc. v. Bitdefender, Inc., et. al., where he understood that as a functional matter,
`
`you can’t operate just the infringing code – it won’t work, and therefore in a technical sense
`
`won’t “infringe” unless it is used with other code to make it operable. Finjan argues that it added
`
`disclaimers before its block citations that clarifies that these citations are not to show
`
`infringement but to provide context of the operability of its pinpoint source code citations in
`
`those charts. Finjan says it will not rely on block citations to show infringement at trial, just to
`
`show how the pinpoint citations operate.
`
`
`
`ISSUE (5): Has Finjan failed to provide pinpoint source code citations for numerous
`
`contentions?
`
`TENTATIVE (5): Yes. Checkpoint provides a table that shows missing or deficient source code
`
`citations and Finjan does not adequately rebut it. First, Finjan attempts to fill in those gaps by
`
`directing attention to cites from other claim elements. Second, its argument that some dependent
`
`claims don’t need cites fails because it does not incorporate citations in the independent claims
`
`by reference. Third, its attempt to provide a “corrected” chart in its opposition will not be
`
`
`
`4
`
`

`

`Case 3:18-cv-02621-WHO Document 242 Filed 12/03/19 Page 5 of 6
`
`tolerated; Finjan has had multiple shots at this already. Fourth, it attempts to argue that the AICs
`
`included pinpoint cites, but that is irrelevant now because the SAICs don’t include those pinpoint
`
`cites. The SAICs are what is operable now.
`
`
`
`ISSUE (6): Does Finjan fail to specify how the cited source code shows that the accused products
`
`infringe Finjan’s patents? Specifically, do:
`
`(a) Finjan’s source code citations remain largely unexplained and untethered to the
`
`language of the asserted claims;
`
`(b) Finjan’s SAICs repeat the same code for disparate limitations with no explanation
`
`as to why it applies?
`
`TENTATIVE (6): Yes. All contentions where Finjan fails to actually explain how the cited
`
`source code relates to each limitation, and all instances where Finjan cites the same code for
`
`different limitations without providing an explanation, are struck with prejudice. More details
`
`below:
`
`(a) Yes as to the IPS example; maybe for all instances. Appendix A to Check Point’s
`
`motion is a table illustrating that Finjan fails to explain how the cited source code
`
`shows that the accused products meet the requirements of the asserted claims for
`
`at least one claim limitation in every allegation in the SAICs. The parties use
`
`Network IPS blade for limitation 1b of the ‘731 Patent as an example; I
`
`previously addressed this example in the IC Order. To the extent that the IPS
`
`example is illustrative, Finjan has failed to actually explain how the cited source
`
`code relates to each limitation. I do not intend to cross check every allegation, but
`
`I will strike the examples provided in Check Point’s Appendix A (a table
`
`illustrating that Finjan fails to explain how the cited source code shows the
`
`accused products meet the requirements of the asserted claims for at least one
`
`claim limitation in every allegation in the SAICs).
`
`(b) Yes. Finjan continues to cite the same source code for different limitations,
`
`
`
`5
`
`

`

`Case 3:18-cv-02621-WHO Document 242 Filed 12/03/19 Page 6 of 6
`
`different patents, and different products without explaining why the same source
`
`code applies in these different cases. Finjan attempts to rebut this by showing
`
`how Check Point’s invalidity contentions are insufficiently pinpoint cited, but that
`
`is not the subject of this motion. Finjan’s response that it has always cited
`
`additional code files beyond what overlaps is false as illustrated by IPS charts for
`
`‘494 Patent 10d and ’731 Patent 1d, which cite the same 4 files.
`
`Even if some of Finjan’s contentions cross the hurdle of Issues 1-5 stated above, it is not
`
`clear to me if any of Finjan’s contentions satisfy Issue 6. It would help me if Finjan identifies
`
`two of its strongest contentions, where it has clearly specified how the cited source code shows
`
`that the accused products infringe a particular patent. Finjan must notify Check Point of those
`
`two contentions by 6:00 p.m. today. Check Point may explain why each is deficient, if it is, at
`
`the hearing.
`
`
`
`
`
`6
`
`

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket