`
`
`
`
`
`
`
`
`
`
`
`
`
`UNITED STATES DISTRICT COURT
`
`NORTHERN DISTRICT OF CALIFORNIA
`
`FINJAN, INC.,
`
`Plaintiff,
`
`v.
`
`CHECK POINT SOFTWARE
`TECHNOLOGIES, INC., et al.,
`
`Case No. 18-cv-02621-WHO
`
`
`ORDER GRANTING IN PART
`MOTION TO STRIKE SECOND
`AMENDED CONTENTIONS;
`GRANTING IN PART MOTIONS TO
`SEAL
`
`Defendants.
`
`Re: Dkt. Nos. 212, 213, 223, 229, 231, 234,
`
`241
`
`
`
`I began the hearing on defendants Check Point Software Technologies, Inc. and Check
`
`Point Software Technologies Ltd. (collectively “Check Point”) motion to strike plaintiff Finjan,
`
`Inc.’s (“Finjan”) infringement contentions for the third time by hoisting onto the bench the six
`
`bankers’ boxes of documents that had been filed to litigate the motion. See Defendants’ Motion
`
`to Enforce Court Order and Strike Second Amended Infringement Contentions (“MTS SAIC”)
`
`[Dkt. No. 213]. Finjan’s second amended infringement contentions (“SAICs”) amount to 5,135
`
`charts, totaling to over 185,000 pages. This remarkably unreasonable filing hardly clarified
`
`Finjan’s infringement theories.
`
`I could not have resolved the propriety of the infringement contentions if I spent a month
`
`doing nothing else. The absurdity of the Finjan’s SAICs was underscored by its response to the
`
`tentative ruling I posted one day prior to the hearing. After issuing two detailed orders striking
`
`Finjan’s contentions and spending weeks to unravel the parties’ positions as expressed in the
`
`briefing, my tentative was almost totally against Finjan. At the start of the hearing, Finjan
`
`abandoned its positions in response to much of the tentative. That may have been strategic, but it
`
`left me wondering why it made the abandoned contentions in the first place.
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`Northern District of California
`
`United States District Court
`
`
`
`Case 3:18-cv-02621-WHO Document 255 Filed 01/17/20 Page 2 of 39
`
`
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`Locating the basis that Finjan asserts is contained for the infringement contentions is akin
`
`to going on an unsatisfying treasure hunt—you start with an appendix, move to a chart, and then
`
`look to pages in the chart that are supposed to contain the treasure, but instead refer to a totally
`
`different product. As explained below, I am ruling against Finjan on most of the remaining issues
`
`that were briefed.
`
`In normal litigation, that would be that. I would issue an order resolving the issues and the
`
`parties would move to the next stage in the case. But this is abnormal. I do not pretend that I
`
`reviewed all of Finjan’s 5,135 charts. Nor do I intend to waste more time parsing through this
`
`mess contention by contention without briefing. I will not assume that none of the unbriefed
`
`contentions pass muster, even though Finjan’s two strongest contentions failed (I asked Finjan in
`
`the tentative to identify its two strongest contentions that clearly specify how the cited source code
`
`shows that the accused products infringe a particular patent, and I will discuss in this Order why
`
`even those lacked merit).
`
`Check Point argues that the SAICs should be struck for six reasons (hereinafter “Issues 1-
`
`6”). For the reasons provided below, I strike with prejudice all contentions identified by Check
`
`Point under Issues 1, 2, 3, and 5. I will appoint a master pursuant to Federal Rule of Civil
`
`Procedure 53 to determine if the other 69 combination charts should also be struck for failure to
`
`adequately identify and explain combinations, as argued in Check Point’s Appendix C and
`
`Finjan’s Rebuttal Appendix C. See infra Section I.C (discussing Issue 3). The master shall also
`
`determine if the entirety of the SAICs should be struck for inadequate source code citation
`
`explanations, as argued in Check Point’s Appendix A, Finjan’s Rebuttal Appendix A, and Check
`
`Point’s Reply Appendix. See infra Section I.F (discussing Issue 6).1
`
`Finjan shall pay the master’s fees and costs. The master shall have the power to
`
`
`1 As a general matter, just because a contention crosses one of the issue hurdles, it does not
`necessarily mean that it is sufficiently alleged because it could fail to cross another issue hurdle. I
`emphasize this because Finjan repeatedly argues that providing source code citations is enough to
`amount to a sufficiently alleged infringement contention. That is just one hurdle; whether that
`source code citation is then adequately explained and connected to the claim limitation is another
`hurdle that it must cross as well.
`
`
`2
`
`Northern District of California
`
`United States District Court
`
`
`
`Case 3:18-cv-02621-WHO Document 255 Filed 01/17/20 Page 3 of 39
`
`
`
`recommend reallocating some or all of the fees to Check Point, and also to award attorney’s fees
`
`to the prevailing party for the proceedings before her as a discovery sanction. While I suspect that
`
`Finjan would be well advised to substantially reduce the size of its SAICs before the master
`
`commences her review, I have not analyzed the issues not addressed in this Order and defer to the
`
`master’s review of the issues before her.2
`
`BACKGROUND
`
`I.
`
`FACTUAL BACKGROUND
`
`A.
`
`Narrowing Order
`
`In September 2018, I received briefing from the parties on how to manage this litigation in
`
`compliance with Federal Rule of Civil Procedure 1’s mandate of a “just, speedy, and inexpensive
`
`determination of this action[.]” Order Re Case Narrowing and Infringement Contentions (the
`
`“Narrowing Order”) [Dkt. No. 29]. I then ordered Finjan to serve its infringement contentions
`
`under specifications that largely follow the provisions of this District’s Patent Local Rules as well
`
`as the guidance provided in the since withdrawn 2013 Model Order from the Federal Circuit. See
`
`Narrowing Order. Finjan was instructed to “include pinpoint source code citations . . .
`
`accompanied by the document production required by Patent Local Rule 3-2” and to also:
`
`(i) avoid open-ended citations to “exemplary” products and use of the
`terms “such as” and “for example”; (ii) set forth any infringement
`theories based on the doctrine of equivalents with limitation-by-
`limitation analyses; and (iii) for any indirect theories of infringement,
`identify the alleged direct infringement, the alleged acts of
`inducement or contribution to that infringement, and the relationship
`between them.
`
`Id. at 2.
`
`B.
`
`Order on Infringement Contentions
`
`On November 2, 2018, Finjan served its infringement contentions on Check Point, which
`
`then moved to strike the infringement contentions, arguing that they violated my Narrowing Order
`
`and the Patent Local Rules. See Check Point’s Motion to Enforce Court Order and Strike
`
`
`2 At the end of this Order I rule on the motions to seal. I will give the parties five days to review
`this Order before issuing it publicly to ensure that I have redacted the appropriate information in it.
`If there is any other portion that should be redacted, the parties should file a declaration in five
`days explaining why good cause exists to redact it.
`3
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`Northern District of California
`
`United States District Court
`
`
`
`Case 3:18-cv-02621-WHO Document 255 Filed 01/17/20 Page 4 of 39
`
`
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`Infringement Contentions [Dkt. No. 55] 1-3, 15-24. I largely agreed that Finjan’s infringement
`
`contentions failed to comply, and made several rulings that I summarize below. See Order
`
`Granting Motion to Strike in Part; Granting Motions to Seal; Granting Motion to Amend Claim
`
`Construction Schedule (the “IC Order”) [Dkt. No. 84].
`
`1.
`
`Grouping
`
`First, I required Finjan to organize its infringement contentions by the underlying
`
`instrumentalities rather than into five groups of products, because that would assist both the parties
`
`and me in determining precisely how Check Point’s products do or do not infringe Finjan’s patents
`
`as well as to aid Finjan’s efforts to provide specific source code citations. IC Order at 7. I ordered
`
`that Finjan specify any combinations of the underlying instrumentalities that it believed were
`
`infringing. Id. Although it might be true that Check Point sells its products to consumers in
`
`bundles, I reasoned that separating out infringement contentions by the underlying
`
`instrumentalities would be consistent with the purpose of Patent Local Rules because it would
`
`make the litigation process more efficient and discovery more streamlined. Id.
`
`2.
`
`Pinpoint Source Code Citations
`
`Second, I ordered Finjan to provide pinpoint source code citations that show “where and
`
`how each limitation of each asserted claim is found within each Accused Instrumentality” as
`
`required by the Patent Local Rules. IC Order at 12. In doing so, I rejected Finjan’s arguments
`
`that its infringement contentions were sufficient to disclose its infringement theories because they
`
`provided an overall infringement analysis that included both source code citations and public
`
`information. Id. at 7-12. I noted that many of the same sets of source code within the same
`
`product category were cited across different claims of different patents. Id.
`
`3.
`
`Open-Ended Contentions
`
`Third, I held that Finjan’s infringement contentions impermissibly contained open-ended
`
`citations to exemplary products in violation of the Narrowing Order. IC Order at 13-14. I found
`
`that Finjan’s citation to numerous releases of Check Point’s products were ambiguous and that it
`
`was unclear which releases applied to which products in the voluminous list cited by Finjan. Id.
`
`
`
`4
`
`Northern District of California
`
`United States District Court
`
`
`
`Case 3:18-cv-02621-WHO Document 255 Filed 01/17/20 Page 5 of 39
`
`
`
`4.
`
`New Instrumentalities
`
`Fourth, I found that Finjan failed to show good cause to accuse 16 new instrumentalities
`
`not previously identified pursuant to the Narrowing Order. IC Order at 14. However, I permitted
`
`Finjan to add these 16 new instrumentalities to its next set of contentions so long as it did so
`
`“consistent with the order’s guidance.” Id. I granted Check Point’s motion to strike in part and
`
`ordered Finjan to serve amended infringement contentions that were in accordance with my IC
`
`Order, Narrowing Order, and the Patent Local Rules. Id. at 15.
`
`C.
`
`Order on Amended Infringement Contentions
`
`Finjan then served its amended infringement contentions (“AICs”) and Check Point moved
`
`to strike the AICs, arguing that they were deficient in largely the same ways as before. See
`
`Defendants’ Motion to Strike Amended Infringement Contentions (“MTS AIC”) [Dkt. No. 126]. I
`
`agreed and made several rulings that I summarize below.3 See Order Granting Motion to Strike
`
`Infringement Contentions in Part (the “AIC Order”) [Dkt. No. 192].
`
`1.
`
`Grouping
`
`First, Check Point argued that Finjan violated the directives in the IC Order by renaming
`
`its “groups” of products as the instrumentalities themselves and then referring to the actual
`
`products in the groups as “features.” MTS AIC at 15-18. It identified Finjan’s charts as
`
`purporting to describe infringement theories on the following actual products:
`
`• Network Security Products: IPS, Anti-Bot, Anti-Virus, Threat Emulation, Threat
`
`Extraction.
`
`• Endpoint Security: Threat Emulation, Threat Extraction, AntiPhishing (zero
`
`phishing), Anti-Ransomware, Anti-Bot, Forensics, Anti-Exploit, Anti-Virus, Anti-
`
`Malware, SmartEvent.
`
`• ZoneAlarm: Advanced Firewall, OSFirewall, Threat Emulation, Browser
`
`Protection.
`
`• ThreatCloud: Threat Emulation.
`
`
`3 I did deny Check Point’s motion to strike to the extent that it argued that Finjan’s doctrine of
`equivalents contentions fell short. AIC Order at 12.
`5
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`Northern District of California
`
`United States District Court
`
`
`
`Case 3:18-cv-02621-WHO Document 255 Filed 01/17/20 Page 6 of 39
`
`
`
`• CloudGuard: CloudGuard SaaS.
`
`• Sandblast Mobile.
`
`Id. at 16-17. It asked that I strike the remaining contentions from the AICs. Id.
`
`I found that Finjan failed to follow the IC Order requiring that it organize its infringement
`
`contentions by the underlying instrumentalities that it was accusing. AIC Order at 7. Where
`
`Finjan accused certain products of infringing in combination, it also failed to follow the IC Order
`
`directing it to specify the combination. Id. I struck these charts with leave to amend to specify the
`
`combination and describe how such a combination would infringe. Id. at 7-8.
`
`2.
`
`Pinpoint Source Code Citations
`
`Second, Check Point argued that the AICs lacked source code citations for most accused
`
`products and that any citations provided are inadequate and unexplained. MTS AIC at 19-22. It
`
`contended that Finjan failed to provide any source code citations for 30 of the 52 accused
`
`instrumentalities. Id. at 20; see Appendix 1 - Source Code Citations, attached to MTS AIC [Dkt.
`
`No. 126-1] (hereinafter “Appendix 1”); Appendix 2 - List of Contentions for which Source Code
`
`Citations Provided for Each Element [Dkt. No. 126-1] (hereinafter “Appendix 2”).
`
` As I noted in the hearing on the MTS AIC, Finjan did not oppose this argument. See
`
`Transcript of Proceedings held on July 10, 2019 [Dkt. No. 190] 3:12-17 (“Check Point says in its
`
`brief that there was no code cited for 30 of the 52 accused instrumentalities, and there wasn’t a
`
`response to that in the briefing that I saw. So if that’s true, then I would grant that with prejudice
`
`and only allow the contentions that are listed in Check Point’s Appendix 2 to continue.”). I found
`
`that Finjan had already been directed to provide pinpoint source code citations for each limitation
`
`and held that “[t]o the extent any or all of the 30 of the accused instrumentalities lack pinpoint
`
`citations, they are struck with prejudice.” AIC Order at 11. Where Finjan used the same source
`
`code for different things, I allowed it to “amend its infringement contentions to better explain why
`
`the same source code [] applies to wholly different limitations.” Id.
`
`3.
`
`New Instrumentalities
`
`Third, without seeking leave or showing good cause, Finjan’s AICs expanded the scope of
`
`the case by accusing products, functionalities and marketing terms not previously identified. AIC
`
`6
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`Northern District of California
`
`United States District Court
`
`
`
`Case 3:18-cv-02621-WHO Document 255 Filed 01/17/20 Page 7 of 39
`
`
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`Order at 12-14; see Appendix 3 - List of New Products Added to Finjan’s Amended Infringement
`
`Contentions, attached to MTS AIC [Dkt. No. 126-1] (hereinafter “Appendix 3”). I noted that
`
`although I previously let Finjan add new products to its ICs, I was not inclined to do so again.
`
`AIC Order at 13. Accordingly, I struck all such new products and undefined instrumentalities. Id.
`
`at 14 (“Any products not charted in the initial infringement contentions are struck without leave to
`
`amend.”).
`
`Altogether, I allowed Finjan limited leave to amend its infringement contentions “one last
`
`time within fourteen days.” AIC Order at 18. I cautioned that “if any of its infringement
`
`contentions remain deficient, they may not form the basis for relief in this action.” Id.
`
`II.
`
`PROCEDURAL BACKGROUND
`
`Following the AIC Order, Check Point sent Finjan a 36-page letter explaining many
`
`examples of the deficiencies in Finjan’s AICs. See Declaration of Alyssa Caridis In Support of
`
`Defendants’ Motion to Enforce Court Order and Strike Second Amended Infringement
`
`Contentions (“Caridis Decl.”), Ex. A (copy of letter from C. Roberts to P. Andre dated August 20,
`
`2019) [Dkt. No. 212-7].
`
`On August 26, 2019, Finjan served its SAICs, containing 5,135 claim charts and totaling
`
`more than 185,000 pages. Caridis Decl., ¶ 2. On October 18, 2019, Check Point filed a motion to
`
`strike the SAIC. See MTS SAIC. Finjan filed an opposition, which it later retracted for a
`
`corrected opposition. See Corrected Plaintiff’s Opposition to Motion to Enforce Court Order and
`
`Strike Second Amended Infringement Contentions (“Oppo.”) [Dkt. No. 232]. Check Point filed a
`
`reply. See Defendants’ Reply In Support of Motion to Enforce Court Order and Strike Second
`
`Amended Infringement Contentions (“Reply”) [Dkt. No. 235]. I heard oral argument on
`
`December 4, 2019.
`
`Patent Local Rule 3-1 requires:
`
`
`LEGAL STANDARD
`
`[A] party claiming patent infringement shall serve on all parties a ‘Disclosure of
`Asserted Claims and Infringement Contentions[]’ . . . [which] shall contain the
`following information:
`
`
`7
`
`Northern District of California
`
`United States District Court
`
`
`
`Case 3:18-cv-02621-WHO Document 255 Filed 01/17/20 Page 8 of 39
`
`
`
`(a) Each claim of each patent in suit that is allegedly infringed by each opposing
`party, including for each claim the applicable statutory subsections of 35 U.S.C. §
`271 asserted;
`
`(b) Separately for each asserted claim, each accused apparatus, product, device,
`process, method, act, or other instrumentality (“Accused Instrumentality”) of each
`opposing party of which the party is aware. This identification shall be as specific
`as possible. Each product, device, and apparatus shall be identified by name or
`model number, if known. Each method or process shall be identified by name, if
`known, or by any product, device, or apparatus which, when used, allegedly results
`in the practice of the claimed method or process;
`
`(c) A chart identifying specifically where each limitation of each asserted claim is
`found within each Accused Instrumentality, including for each limitation that such
`party contends is governed by 35 U.S.C. § 112(6), the identity of the structure(s),
`act(s), or material(s) in the Accused Instrumentality that performs the claimed
`function.
`
`(d) For each claim which is alleged to have been indirectly infringed, an
`identification of any direct infringement and a description of the acts of the alleged
`indirect infringer that contribute to or are inducing that direct infringement. Insofar
`as alleged direct infringement is based on joint acts of multiple parties, the role of
`each such party in the direct infringement must be described.
`
`(e) Whether each limitation of each asserted claim is alleged to be literally present
`or present under the doctrine of equivalents in the Accused Instrumentality.
`
`“The overriding principle of the Patent Local Rules is that they are designed [to] make the parties
`
`more efficient, to streamline the litigation process, and to articulate with specificity the claims and
`
`theory of a plaintiff’s infringement claims.” Bender v. Maxim Integrated Prods., No. 09-cv-
`
`01152-SI, 2010 WL 1135762, at *2 (N.D. Cal. Mar. 22, 2010) (alteration in original) (internal
`
`citation omitted). Patent Local Rule 3-1 is intended to require the plaintiff “to crystallize its
`
`theories of the case early in the litigation and to adhere to those theories once disclosed.” Bender
`
`v. Advanced Micro Devices, Inc., No. 09-cv-1149-EMC, 2010 WL 363341, at *1 (N.D. Cal. Feb.
`
`1, 2010). It “takes the place of a series of interrogatories that defendants would likely have
`
`propounded had the patent local rules not provided for streamlined discovery.” Network Caching
`
`Tech., LLC v. Novell, Inc., No. 01-cv-2079-VRW, 2002 WL 32126128, at *4 (N.D. Cal. Aug. 13,
`
`2002).
`
`
`
`“[A]ll courts agree that the degree of specificity under Local Rule 3-1 must be sufficient to
`
`provide reasonable notice to the defendant why the plaintiff believes it has a ‘reasonable chance of
`
`8
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`Northern District of California
`
`United States District Court
`
`
`
`Case 3:18-cv-02621-WHO Document 255 Filed 01/17/20 Page 9 of 39
`
`
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`proving infringement.’” Shared Memory Graphics LLC v. Apple, Inc., 812 F. Supp. 2d 1022,
`
`1025 (N.D. Cal. 2010) (quoting View Eng’g, Inc. v. Robotic Vision Sys., Inc., 208 F.3d 981, 986
`
`(Fed. Cir. 2000)). The local rules do not “require the disclosure of specific evidence nor do they
`
`require a plaintiff to prove its infringement case . . . a patentee must nevertheless disclose what in
`
`each accused instrumentality it contends practices each and every limitation of each asserted claim
`
`to the extent appropriate information is reasonably available to it.” DCG Sys. v. Checkpoint
`
`Techs., LLC, No. 11-cv-03792-PSG, 2012 WL 1309161, at *2 (N.D. Cal. Apr. 16, 2012).
`
`DISCUSSION
`
`I.
`
`MOTION TO STRIKE SECOND AMENDED INFRINGEMENT CONTENTIONS
`
`Check Point moves to strike the SAICs with prejudice because Finjan: “(1) accuses
`
`products and theories struck with prejudice by the Court; (2) asserts new theories, claims, and
`
`combinations; (3) continues to accuse combinations without explaining which parts of the
`
`combination meet which limitation or how the combination of products act together to infringe;
`
`(4) relies on new open-ended contentions and citations to the entire code base for accused
`
`instrumentalities; (5) has not provided pinpoint source code citations for numerous contentions;
`
`and (6) still fails to specify how Check Point’s products infringe Finjan’s patents.” MTS SAIC 1-
`
`2 (emphasis in original).
`
`I provided parties with a tentative ruling on each of these six issues and ordered Finjan to
`
`identify two of its strongest contentions in response to Issue 6 that clearly specified how the cited
`
`source code shows that the accused products infringe a particular patent. See Tentative Ruling
`
`[Dkt. No. 242]. At the hearing, both parties presented arguments and, as indicated below, Finjan
`
`stipulated to a number of my tentative rulings. I address each issue below.
`
`A.
`
`Issue 1: Finjan Continues to Accuse Products That Were Previously Struck
`with Prejudice
`
`1.
`
`Issue 1(a): The SAICs include products previously struck because
`Finjan did not provide source code citations in its AICs.
`
`In Check Point’s previous motion to strike the AICs, it explained that Finjan failed to cite
`
`any source code for 30 of the 52 accused instrumentalities. MTS AIC 20. Check Point
`
`documented these 30 instrumentalities in Appendix 1 attached to its MTS AIC, which set forth
`
`9
`
`Northern District of California
`
`United States District Court
`
`
`
`Case 3:18-cv-02621-WHO Document 255 Filed 01/17/20 Page 10 of 39
`
`
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`precisely where source code citations were provided and where they were missing. See Appendix
`
`1 [Dkt. No. 126-1]; MTS SAIC 7. In my order striking the AICs, I held that “[t]o the extent that
`
`any or all 30 of the accused instrumentalities lack pinpoint citations, they are struck with
`
`prejudice.” AIC Order at 11. Check Point now argues that despite my order, Finjan’s SAICs
`
`continue to accuse products that were previously struck with prejudice. MTS SAIC 7.
`
`Check Point uses three instrumentalities as examples: Network Firewall, Network Anti-
`
`Spam & E-mail Security, and Capsule Cloud. It contends that these three instrumentalities were
`
`struck with prejudice during the AIC round because Finjan did not provide any source code
`
`citations. MTS SAIC 7. Yet Finjan’s SAICs includes these three products, and Check Point asks
`
`that I make clear that those products are not part of this case. Id.4
`
`At the hearing, Finjan stipulated to striking 27 of the accused instrumentalities, but still
`
`argued that the three examples identified by Check Point should not be struck because pinpoint
`
`citations were provided in the AICs. For the reasons explained below, all 30 instrumentalities
`
`listed at the end of this section are struck with prejudice.
`
`a.
`
`Network Firewall
`
`Finjan contends that it cited “the very same code that Check Point confirmed the Firewall
`
`uses in its interrogatory responses.” Oppo. 4; see Declaration of Kristopher Kastens (“Kastens
`
`Decl.”) [Dkt. No. 225-13] ¶ 3; see also id., Ex. 2 at 1, 5 (paper copy of Check Point’s
`
`
`4 In addition to arguing that Finjan’s factual assertions about the three examples are false, Check
`Point also contends that Finjan should be barred from relitigating this matter. Reply 1. It points
`out that Finjan never responded to its representations made in Appendix 1 during the AIC round,
`nor included any argument disputing its accuracy, in either its opposition or supplemental briefing.
`Id. Finjan did not contest the accuracy of the Appendices in the last hearing. See Transcript of
`Proceedings held on July 10, 2019 [Dkt. No. 190] 2:13-17. Check Point asserts that Finjan’s
`attempt to seek reconsideration of the prior AIC Order should be rejected because it “submitted
`evidence about which products did not have pin citations, Finjan did not dispute that evidence, and
`the Court relied on that record in issuing its order.” Reply 1-2.
`
`It is true that Check Point made the assertion in its AIC briefing and Appendices that there were
`30 instrumentalities that had no source code citations, and Finjan made no argument regarding the
`accuracy of that assertion. But I did not make a finding that those 30 instrumentalities were
`struck. There was no argument about the accuracy of that assertion. Instead, I held that “[t]o the
`extent any or all of the 30 of the accused instrumentalities lack pinpoint citations, they are struck
`with prejudice.” AIC Order at 11 (emphasis added). This question is not being “relitigated,” as
`Check Point phrases it. But for different reasons, all 30 instrumentalities are struck with
`prejudice.
`
`10
`
`Northern District of California
`
`United States District Court
`
`
`
`Case 3:18-cv-02621-WHO Document 255 Filed 01/17/20 Page 11 of 39
`
`
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`Supplemental Response to Finjan’s Interrogatory No. 9, which has been designated as source
`
`code) (hereinafter “Rog. 9”).5 As Check Point points out, this is false. Reply 2. Comparing the
`
`source code cited by Finjan with Rog. 9 shows that Finjan did not cite any of the code categorized
`
`as Network Firewall code. See Rog. 9 at 1-7. Finjan’s argument fails.
`
`b.
`
`Network Anti-Spam & E-mail Security
`
`Finjan similarly argues that it cited to the same code that Check Point confirmed is used by
`
`Anti-Spam. Oppo. 5. To support its argument, Finjan cites to the source code citations it provided
`
`in its SAICs. See Declaration of Lisa Kobialka in Support of Plaintiff Finjan, Inc.’s Opposition to
`
`Defendants’ Motion to Enforce Court Order and Strike Second Amended Infringement
`
`Contentions (‘Kobialka Decl.”) [Dkt. No. 225-2] ¶ 14; see also id., Ex. 11 at 7 [Dkt. No. 223-11]
`
`(copy of SAIC chart “Appendix A - Network Anti-Spam & E-mail Security” for the ‘494 Patent).
`
`But the issue here is whether Finjan accused this product in its AICs, or whether it failed to
`
`provide any source code citations for it in its AICs such that it was previously struck with
`
`prejudice.
`
`Even if I look at the source code citations Finjan provided for Network Anti-Spam in its
`
`SAICs, Check Point points out that Finjan cited to code that provides services to the Anti-Spam
`
`blade, but did not identify code that is part of that blade. Reply 3; see Rog. 9 at 44-45. As Check
`
`Point argues, this is “not a small distinction” because “for example Google’s web servers provides
`
`services to your Microsoft browser, but they are not part of your browser.” Reply 3.
`
`c.
`
`Capsule Cloud
`
`Finjan argues that it provides pincites for Capsule Cloud by incorporating by reference the
`
`citations for other instrumentalities because Capsule Cloud is just the cloud version of those
`
`blades. Oppo. 4; see Kastens Decl., Ex. P at 1-4 [Dkt. No. 224-8] (copy of AIC chart “Appendix
`
`A-6” for Capsule Cloud for the ‘494 Patent). Check Point responds that this argument is also false
`
`because Finjan’s AICs did not cite to any Capsule Cloud code. Reply at 3, n.3 (citing to
`
`
`5 As explained further in Section II of this opinion, a manual filing of this exhibit does not suffice.
`Check Point must e-file an electronic copy under seal so that it is properly part of the record of this
`case.
`
`11
`
`Northern District of California
`
`United States District Court
`
`
`
`Case 3:18-cv-02621-WHO Document 255 Filed 01/17/20 Page 12 of 39
`
`
`
`Declaration of Tamir Zegman In Support of Reply Brief to Strike Second Amended Infringement
`
`Contentions [Dkt. No. 235-2] ¶ 11 (describing that there is a specific source code directory for
`
`Capsule Cloud products but that Finjan’s AICs have never cited to any code in that directory)); see
`
`also Rog. 9 at 735 (list of Capsule Cloud source code).
`
`Even if Finjan was attempting to claim that non-Capsule Cloud code shows infringement,
`
`it does not explain that theory and instead simply provides a one-sentence incorporation by
`
`reference placeholder for Capsule Cloud. I expressly directed Finjan to “better explain why the
`
`same source code [] applies” to different things. AIC Order at 11. This example shows that
`
`Finjan has failed to do that as to Capsule Cloud.
`
`Accordingly, the following 30 instrumentalities are struck with prejudice. Finjan
`
`stipulated to striking 27 of them and its arguments as to the three products discussed above fail.
`
`//
`
`//
`
`//
`
`//
`
`//
`
`//
`
`//
`
`//
`
`//
`
`//
`
`//
`
`//
`
`//
`
`//
`
`//
`
`//
`
`//
`
`12
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`Northern District of California
`
`United States District Court
`
`
`
`Case 3:18-cv-02621-WHO Document 255 Filed 01/17/20 Page 13 of 39
`
`
`
`
`
`“Check Point Blade Architecture”
`1. Firewall
`2.
`IPSec VPN
`3.
`Identity Awareness
`4. Advanced Networking and Clustering
`5. Application Control
`6. URL Filtering
`7. Anti-Spam & E-mail Security
`8. Data Loss Prevention (DLP)
`9. Mobile Access Blade
`10. Network Policy Management
`11. Endpoint Policy Management
`12. Next-Generation SmartEvent
`13. Logging and Status
`14. Compliance
`15. SmartWorkflow
`16. SmartProvisiong
`17. Monitoring
`18. Management Portal
`19. User Directory
`Endpoint Security (Enterprise)
`20. SmartLog
`ZoneAlarm
`21. Two-Way Firewall
`22. Antivirus and Anti-spyware
`“ThreatCloud”
`23. IPS
`24. Anti-Bot
`25. Anti-Virus
`26. URL Filtering
`27. Application Control
`28. Private ThreatCloud
`“Capsule Cloud”
`29. No code cite. Only references “Check Point Blade Architecture” charts
`“Check Point Appliances”
`30. No code cite. Only references “Check Point Blade Architecture” charts
`
`I strike these instrumentalities with prejudice because Finjan continues to cite unrelated
`
`code by referring to directories that are not related to the accused product. Check Point provided
`
`Finjan with its code for each accused product in Rog. 9 before Finjan served its AICs. It should
`
`have been able to cite to the proper code for each accused product.
`
`2.
`
`Issue 1(b): The SAICs include contentions previously struck because
`Finjan provided pinpoint citations for only some elements of an
`asserted claim in its AICs.
`
`Other than the 30 instrumentalities discussed above, there are contentions for some
`
`products