throbber
Case 3:18-cv-02621-WHO Document 255 Filed 01/17/20 Page 1 of 39
`
`
`
`
`
`
`
`
`
`
`
`
`
`UNITED STATES DISTRICT COURT
`
`NORTHERN DISTRICT OF CALIFORNIA
`
`FINJAN, INC.,
`
`Plaintiff,
`
`v.
`
`CHECK POINT SOFTWARE
`TECHNOLOGIES, INC., et al.,
`
`Case No. 18-cv-02621-WHO
`
`
`ORDER GRANTING IN PART
`MOTION TO STRIKE SECOND
`AMENDED CONTENTIONS;
`GRANTING IN PART MOTIONS TO
`SEAL
`
`Defendants.
`
`Re: Dkt. Nos. 212, 213, 223, 229, 231, 234,
`
`241
`
`
`
`I began the hearing on defendants Check Point Software Technologies, Inc. and Check
`
`Point Software Technologies Ltd. (collectively “Check Point”) motion to strike plaintiff Finjan,
`
`Inc.’s (“Finjan”) infringement contentions for the third time by hoisting onto the bench the six
`
`bankers’ boxes of documents that had been filed to litigate the motion. See Defendants’ Motion
`
`to Enforce Court Order and Strike Second Amended Infringement Contentions (“MTS SAIC”)
`
`[Dkt. No. 213]. Finjan’s second amended infringement contentions (“SAICs”) amount to 5,135
`
`charts, totaling to over 185,000 pages. This remarkably unreasonable filing hardly clarified
`
`Finjan’s infringement theories.
`
`I could not have resolved the propriety of the infringement contentions if I spent a month
`
`doing nothing else. The absurdity of the Finjan’s SAICs was underscored by its response to the
`
`tentative ruling I posted one day prior to the hearing. After issuing two detailed orders striking
`
`Finjan’s contentions and spending weeks to unravel the parties’ positions as expressed in the
`
`briefing, my tentative was almost totally against Finjan. At the start of the hearing, Finjan
`
`abandoned its positions in response to much of the tentative. That may have been strategic, but it
`
`left me wondering why it made the abandoned contentions in the first place.
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`Northern District of California
`
`United States District Court
`
`

`

`Case 3:18-cv-02621-WHO Document 255 Filed 01/17/20 Page 2 of 39
`
`
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`Locating the basis that Finjan asserts is contained for the infringement contentions is akin
`
`to going on an unsatisfying treasure hunt—you start with an appendix, move to a chart, and then
`
`look to pages in the chart that are supposed to contain the treasure, but instead refer to a totally
`
`different product. As explained below, I am ruling against Finjan on most of the remaining issues
`
`that were briefed.
`
`In normal litigation, that would be that. I would issue an order resolving the issues and the
`
`parties would move to the next stage in the case. But this is abnormal. I do not pretend that I
`
`reviewed all of Finjan’s 5,135 charts. Nor do I intend to waste more time parsing through this
`
`mess contention by contention without briefing. I will not assume that none of the unbriefed
`
`contentions pass muster, even though Finjan’s two strongest contentions failed (I asked Finjan in
`
`the tentative to identify its two strongest contentions that clearly specify how the cited source code
`
`shows that the accused products infringe a particular patent, and I will discuss in this Order why
`
`even those lacked merit).
`
`Check Point argues that the SAICs should be struck for six reasons (hereinafter “Issues 1-
`
`6”). For the reasons provided below, I strike with prejudice all contentions identified by Check
`
`Point under Issues 1, 2, 3, and 5. I will appoint a master pursuant to Federal Rule of Civil
`
`Procedure 53 to determine if the other 69 combination charts should also be struck for failure to
`
`adequately identify and explain combinations, as argued in Check Point’s Appendix C and
`
`Finjan’s Rebuttal Appendix C. See infra Section I.C (discussing Issue 3). The master shall also
`
`determine if the entirety of the SAICs should be struck for inadequate source code citation
`
`explanations, as argued in Check Point’s Appendix A, Finjan’s Rebuttal Appendix A, and Check
`
`Point’s Reply Appendix. See infra Section I.F (discussing Issue 6).1
`
`Finjan shall pay the master’s fees and costs. The master shall have the power to
`
`
`1 As a general matter, just because a contention crosses one of the issue hurdles, it does not
`necessarily mean that it is sufficiently alleged because it could fail to cross another issue hurdle. I
`emphasize this because Finjan repeatedly argues that providing source code citations is enough to
`amount to a sufficiently alleged infringement contention. That is just one hurdle; whether that
`source code citation is then adequately explained and connected to the claim limitation is another
`hurdle that it must cross as well.
`
`
`2
`
`Northern District of California
`
`United States District Court
`
`

`

`Case 3:18-cv-02621-WHO Document 255 Filed 01/17/20 Page 3 of 39
`
`
`
`recommend reallocating some or all of the fees to Check Point, and also to award attorney’s fees
`
`to the prevailing party for the proceedings before her as a discovery sanction. While I suspect that
`
`Finjan would be well advised to substantially reduce the size of its SAICs before the master
`
`commences her review, I have not analyzed the issues not addressed in this Order and defer to the
`
`master’s review of the issues before her.2
`
`BACKGROUND
`
`I.
`
`FACTUAL BACKGROUND
`
`A.
`
`Narrowing Order
`
`In September 2018, I received briefing from the parties on how to manage this litigation in
`
`compliance with Federal Rule of Civil Procedure 1’s mandate of a “just, speedy, and inexpensive
`
`determination of this action[.]” Order Re Case Narrowing and Infringement Contentions (the
`
`“Narrowing Order”) [Dkt. No. 29]. I then ordered Finjan to serve its infringement contentions
`
`under specifications that largely follow the provisions of this District’s Patent Local Rules as well
`
`as the guidance provided in the since withdrawn 2013 Model Order from the Federal Circuit. See
`
`Narrowing Order. Finjan was instructed to “include pinpoint source code citations . . .
`
`accompanied by the document production required by Patent Local Rule 3-2” and to also:
`
`(i) avoid open-ended citations to “exemplary” products and use of the
`terms “such as” and “for example”; (ii) set forth any infringement
`theories based on the doctrine of equivalents with limitation-by-
`limitation analyses; and (iii) for any indirect theories of infringement,
`identify the alleged direct infringement, the alleged acts of
`inducement or contribution to that infringement, and the relationship
`between them.
`
`Id. at 2.
`
`B.
`
`Order on Infringement Contentions
`
`On November 2, 2018, Finjan served its infringement contentions on Check Point, which
`
`then moved to strike the infringement contentions, arguing that they violated my Narrowing Order
`
`and the Patent Local Rules. See Check Point’s Motion to Enforce Court Order and Strike
`
`
`2 At the end of this Order I rule on the motions to seal. I will give the parties five days to review
`this Order before issuing it publicly to ensure that I have redacted the appropriate information in it.
`If there is any other portion that should be redacted, the parties should file a declaration in five
`days explaining why good cause exists to redact it.
`3
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`Northern District of California
`
`United States District Court
`
`

`

`Case 3:18-cv-02621-WHO Document 255 Filed 01/17/20 Page 4 of 39
`
`
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`Infringement Contentions [Dkt. No. 55] 1-3, 15-24. I largely agreed that Finjan’s infringement
`
`contentions failed to comply, and made several rulings that I summarize below. See Order
`
`Granting Motion to Strike in Part; Granting Motions to Seal; Granting Motion to Amend Claim
`
`Construction Schedule (the “IC Order”) [Dkt. No. 84].
`
`1.
`
`Grouping
`
`First, I required Finjan to organize its infringement contentions by the underlying
`
`instrumentalities rather than into five groups of products, because that would assist both the parties
`
`and me in determining precisely how Check Point’s products do or do not infringe Finjan’s patents
`
`as well as to aid Finjan’s efforts to provide specific source code citations. IC Order at 7. I ordered
`
`that Finjan specify any combinations of the underlying instrumentalities that it believed were
`
`infringing. Id. Although it might be true that Check Point sells its products to consumers in
`
`bundles, I reasoned that separating out infringement contentions by the underlying
`
`instrumentalities would be consistent with the purpose of Patent Local Rules because it would
`
`make the litigation process more efficient and discovery more streamlined. Id.
`
`2.
`
`Pinpoint Source Code Citations
`
`Second, I ordered Finjan to provide pinpoint source code citations that show “where and
`
`how each limitation of each asserted claim is found within each Accused Instrumentality” as
`
`required by the Patent Local Rules. IC Order at 12. In doing so, I rejected Finjan’s arguments
`
`that its infringement contentions were sufficient to disclose its infringement theories because they
`
`provided an overall infringement analysis that included both source code citations and public
`
`information. Id. at 7-12. I noted that many of the same sets of source code within the same
`
`product category were cited across different claims of different patents. Id.
`
`3.
`
`Open-Ended Contentions
`
`Third, I held that Finjan’s infringement contentions impermissibly contained open-ended
`
`citations to exemplary products in violation of the Narrowing Order. IC Order at 13-14. I found
`
`that Finjan’s citation to numerous releases of Check Point’s products were ambiguous and that it
`
`was unclear which releases applied to which products in the voluminous list cited by Finjan. Id.
`
`
`
`4
`
`Northern District of California
`
`United States District Court
`
`

`

`Case 3:18-cv-02621-WHO Document 255 Filed 01/17/20 Page 5 of 39
`
`
`
`4.
`
`New Instrumentalities
`
`Fourth, I found that Finjan failed to show good cause to accuse 16 new instrumentalities
`
`not previously identified pursuant to the Narrowing Order. IC Order at 14. However, I permitted
`
`Finjan to add these 16 new instrumentalities to its next set of contentions so long as it did so
`
`“consistent with the order’s guidance.” Id. I granted Check Point’s motion to strike in part and
`
`ordered Finjan to serve amended infringement contentions that were in accordance with my IC
`
`Order, Narrowing Order, and the Patent Local Rules. Id. at 15.
`
`C.
`
`Order on Amended Infringement Contentions
`
`Finjan then served its amended infringement contentions (“AICs”) and Check Point moved
`
`to strike the AICs, arguing that they were deficient in largely the same ways as before. See
`
`Defendants’ Motion to Strike Amended Infringement Contentions (“MTS AIC”) [Dkt. No. 126]. I
`
`agreed and made several rulings that I summarize below.3 See Order Granting Motion to Strike
`
`Infringement Contentions in Part (the “AIC Order”) [Dkt. No. 192].
`
`1.
`
`Grouping
`
`First, Check Point argued that Finjan violated the directives in the IC Order by renaming
`
`its “groups” of products as the instrumentalities themselves and then referring to the actual
`
`products in the groups as “features.” MTS AIC at 15-18. It identified Finjan’s charts as
`
`purporting to describe infringement theories on the following actual products:
`
`• Network Security Products: IPS, Anti-Bot, Anti-Virus, Threat Emulation, Threat
`
`Extraction.
`
`• Endpoint Security: Threat Emulation, Threat Extraction, AntiPhishing (zero
`
`phishing), Anti-Ransomware, Anti-Bot, Forensics, Anti-Exploit, Anti-Virus, Anti-
`
`Malware, SmartEvent.
`
`• ZoneAlarm: Advanced Firewall, OSFirewall, Threat Emulation, Browser
`
`Protection.
`
`• ThreatCloud: Threat Emulation.
`
`
`3 I did deny Check Point’s motion to strike to the extent that it argued that Finjan’s doctrine of
`equivalents contentions fell short. AIC Order at 12.
`5
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`Northern District of California
`
`United States District Court
`
`

`

`Case 3:18-cv-02621-WHO Document 255 Filed 01/17/20 Page 6 of 39
`
`
`
`• CloudGuard: CloudGuard SaaS.
`
`• Sandblast Mobile.
`
`Id. at 16-17. It asked that I strike the remaining contentions from the AICs. Id.
`
`I found that Finjan failed to follow the IC Order requiring that it organize its infringement
`
`contentions by the underlying instrumentalities that it was accusing. AIC Order at 7. Where
`
`Finjan accused certain products of infringing in combination, it also failed to follow the IC Order
`
`directing it to specify the combination. Id. I struck these charts with leave to amend to specify the
`
`combination and describe how such a combination would infringe. Id. at 7-8.
`
`2.
`
`Pinpoint Source Code Citations
`
`Second, Check Point argued that the AICs lacked source code citations for most accused
`
`products and that any citations provided are inadequate and unexplained. MTS AIC at 19-22. It
`
`contended that Finjan failed to provide any source code citations for 30 of the 52 accused
`
`instrumentalities. Id. at 20; see Appendix 1 - Source Code Citations, attached to MTS AIC [Dkt.
`
`No. 126-1] (hereinafter “Appendix 1”); Appendix 2 - List of Contentions for which Source Code
`
`Citations Provided for Each Element [Dkt. No. 126-1] (hereinafter “Appendix 2”).
`
` As I noted in the hearing on the MTS AIC, Finjan did not oppose this argument. See
`
`Transcript of Proceedings held on July 10, 2019 [Dkt. No. 190] 3:12-17 (“Check Point says in its
`
`brief that there was no code cited for 30 of the 52 accused instrumentalities, and there wasn’t a
`
`response to that in the briefing that I saw. So if that’s true, then I would grant that with prejudice
`
`and only allow the contentions that are listed in Check Point’s Appendix 2 to continue.”). I found
`
`that Finjan had already been directed to provide pinpoint source code citations for each limitation
`
`and held that “[t]o the extent any or all of the 30 of the accused instrumentalities lack pinpoint
`
`citations, they are struck with prejudice.” AIC Order at 11. Where Finjan used the same source
`
`code for different things, I allowed it to “amend its infringement contentions to better explain why
`
`the same source code [] applies to wholly different limitations.” Id.
`
`3.
`
`New Instrumentalities
`
`Third, without seeking leave or showing good cause, Finjan’s AICs expanded the scope of
`
`the case by accusing products, functionalities and marketing terms not previously identified. AIC
`
`6
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`Northern District of California
`
`United States District Court
`
`

`

`Case 3:18-cv-02621-WHO Document 255 Filed 01/17/20 Page 7 of 39
`
`
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`Order at 12-14; see Appendix 3 - List of New Products Added to Finjan’s Amended Infringement
`
`Contentions, attached to MTS AIC [Dkt. No. 126-1] (hereinafter “Appendix 3”). I noted that
`
`although I previously let Finjan add new products to its ICs, I was not inclined to do so again.
`
`AIC Order at 13. Accordingly, I struck all such new products and undefined instrumentalities. Id.
`
`at 14 (“Any products not charted in the initial infringement contentions are struck without leave to
`
`amend.”).
`
`Altogether, I allowed Finjan limited leave to amend its infringement contentions “one last
`
`time within fourteen days.” AIC Order at 18. I cautioned that “if any of its infringement
`
`contentions remain deficient, they may not form the basis for relief in this action.” Id.
`
`II.
`
`PROCEDURAL BACKGROUND
`
`Following the AIC Order, Check Point sent Finjan a 36-page letter explaining many
`
`examples of the deficiencies in Finjan’s AICs. See Declaration of Alyssa Caridis In Support of
`
`Defendants’ Motion to Enforce Court Order and Strike Second Amended Infringement
`
`Contentions (“Caridis Decl.”), Ex. A (copy of letter from C. Roberts to P. Andre dated August 20,
`
`2019) [Dkt. No. 212-7].
`
`On August 26, 2019, Finjan served its SAICs, containing 5,135 claim charts and totaling
`
`more than 185,000 pages. Caridis Decl., ¶ 2. On October 18, 2019, Check Point filed a motion to
`
`strike the SAIC. See MTS SAIC. Finjan filed an opposition, which it later retracted for a
`
`corrected opposition. See Corrected Plaintiff’s Opposition to Motion to Enforce Court Order and
`
`Strike Second Amended Infringement Contentions (“Oppo.”) [Dkt. No. 232]. Check Point filed a
`
`reply. See Defendants’ Reply In Support of Motion to Enforce Court Order and Strike Second
`
`Amended Infringement Contentions (“Reply”) [Dkt. No. 235]. I heard oral argument on
`
`December 4, 2019.
`
`Patent Local Rule 3-1 requires:
`
`
`LEGAL STANDARD
`
`[A] party claiming patent infringement shall serve on all parties a ‘Disclosure of
`Asserted Claims and Infringement Contentions[]’ . . . [which] shall contain the
`following information:
`
`
`7
`
`Northern District of California
`
`United States District Court
`
`

`

`Case 3:18-cv-02621-WHO Document 255 Filed 01/17/20 Page 8 of 39
`
`
`
`(a) Each claim of each patent in suit that is allegedly infringed by each opposing
`party, including for each claim the applicable statutory subsections of 35 U.S.C. §
`271 asserted;
`
`(b) Separately for each asserted claim, each accused apparatus, product, device,
`process, method, act, or other instrumentality (“Accused Instrumentality”) of each
`opposing party of which the party is aware. This identification shall be as specific
`as possible. Each product, device, and apparatus shall be identified by name or
`model number, if known. Each method or process shall be identified by name, if
`known, or by any product, device, or apparatus which, when used, allegedly results
`in the practice of the claimed method or process;
`
`(c) A chart identifying specifically where each limitation of each asserted claim is
`found within each Accused Instrumentality, including for each limitation that such
`party contends is governed by 35 U.S.C. § 112(6), the identity of the structure(s),
`act(s), or material(s) in the Accused Instrumentality that performs the claimed
`function.
`
`(d) For each claim which is alleged to have been indirectly infringed, an
`identification of any direct infringement and a description of the acts of the alleged
`indirect infringer that contribute to or are inducing that direct infringement. Insofar
`as alleged direct infringement is based on joint acts of multiple parties, the role of
`each such party in the direct infringement must be described.
`
`(e) Whether each limitation of each asserted claim is alleged to be literally present
`or present under the doctrine of equivalents in the Accused Instrumentality.
`
`“The overriding principle of the Patent Local Rules is that they are designed [to] make the parties
`
`more efficient, to streamline the litigation process, and to articulate with specificity the claims and
`
`theory of a plaintiff’s infringement claims.” Bender v. Maxim Integrated Prods., No. 09-cv-
`
`01152-SI, 2010 WL 1135762, at *2 (N.D. Cal. Mar. 22, 2010) (alteration in original) (internal
`
`citation omitted). Patent Local Rule 3-1 is intended to require the plaintiff “to crystallize its
`
`theories of the case early in the litigation and to adhere to those theories once disclosed.” Bender
`
`v. Advanced Micro Devices, Inc., No. 09-cv-1149-EMC, 2010 WL 363341, at *1 (N.D. Cal. Feb.
`
`1, 2010). It “takes the place of a series of interrogatories that defendants would likely have
`
`propounded had the patent local rules not provided for streamlined discovery.” Network Caching
`
`Tech., LLC v. Novell, Inc., No. 01-cv-2079-VRW, 2002 WL 32126128, at *4 (N.D. Cal. Aug. 13,
`
`2002).
`
`
`
`“[A]ll courts agree that the degree of specificity under Local Rule 3-1 must be sufficient to
`
`provide reasonable notice to the defendant why the plaintiff believes it has a ‘reasonable chance of
`
`8
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`Northern District of California
`
`United States District Court
`
`

`

`Case 3:18-cv-02621-WHO Document 255 Filed 01/17/20 Page 9 of 39
`
`
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`proving infringement.’” Shared Memory Graphics LLC v. Apple, Inc., 812 F. Supp. 2d 1022,
`
`1025 (N.D. Cal. 2010) (quoting View Eng’g, Inc. v. Robotic Vision Sys., Inc., 208 F.3d 981, 986
`
`(Fed. Cir. 2000)). The local rules do not “require the disclosure of specific evidence nor do they
`
`require a plaintiff to prove its infringement case . . . a patentee must nevertheless disclose what in
`
`each accused instrumentality it contends practices each and every limitation of each asserted claim
`
`to the extent appropriate information is reasonably available to it.” DCG Sys. v. Checkpoint
`
`Techs., LLC, No. 11-cv-03792-PSG, 2012 WL 1309161, at *2 (N.D. Cal. Apr. 16, 2012).
`
`DISCUSSION
`
`I.
`
`MOTION TO STRIKE SECOND AMENDED INFRINGEMENT CONTENTIONS
`
`Check Point moves to strike the SAICs with prejudice because Finjan: “(1) accuses
`
`products and theories struck with prejudice by the Court; (2) asserts new theories, claims, and
`
`combinations; (3) continues to accuse combinations without explaining which parts of the
`
`combination meet which limitation or how the combination of products act together to infringe;
`
`(4) relies on new open-ended contentions and citations to the entire code base for accused
`
`instrumentalities; (5) has not provided pinpoint source code citations for numerous contentions;
`
`and (6) still fails to specify how Check Point’s products infringe Finjan’s patents.” MTS SAIC 1-
`
`2 (emphasis in original).
`
`I provided parties with a tentative ruling on each of these six issues and ordered Finjan to
`
`identify two of its strongest contentions in response to Issue 6 that clearly specified how the cited
`
`source code shows that the accused products infringe a particular patent. See Tentative Ruling
`
`[Dkt. No. 242]. At the hearing, both parties presented arguments and, as indicated below, Finjan
`
`stipulated to a number of my tentative rulings. I address each issue below.
`
`A.
`
`Issue 1: Finjan Continues to Accuse Products That Were Previously Struck
`with Prejudice
`
`1.
`
`Issue 1(a): The SAICs include products previously struck because
`Finjan did not provide source code citations in its AICs.
`
`In Check Point’s previous motion to strike the AICs, it explained that Finjan failed to cite
`
`any source code for 30 of the 52 accused instrumentalities. MTS AIC 20. Check Point
`
`documented these 30 instrumentalities in Appendix 1 attached to its MTS AIC, which set forth
`
`9
`
`Northern District of California
`
`United States District Court
`
`

`

`Case 3:18-cv-02621-WHO Document 255 Filed 01/17/20 Page 10 of 39
`
`
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`precisely where source code citations were provided and where they were missing. See Appendix
`
`1 [Dkt. No. 126-1]; MTS SAIC 7. In my order striking the AICs, I held that “[t]o the extent that
`
`any or all 30 of the accused instrumentalities lack pinpoint citations, they are struck with
`
`prejudice.” AIC Order at 11. Check Point now argues that despite my order, Finjan’s SAICs
`
`continue to accuse products that were previously struck with prejudice. MTS SAIC 7.
`
`Check Point uses three instrumentalities as examples: Network Firewall, Network Anti-
`
`Spam & E-mail Security, and Capsule Cloud. It contends that these three instrumentalities were
`
`struck with prejudice during the AIC round because Finjan did not provide any source code
`
`citations. MTS SAIC 7. Yet Finjan’s SAICs includes these three products, and Check Point asks
`
`that I make clear that those products are not part of this case. Id.4
`
`At the hearing, Finjan stipulated to striking 27 of the accused instrumentalities, but still
`
`argued that the three examples identified by Check Point should not be struck because pinpoint
`
`citations were provided in the AICs. For the reasons explained below, all 30 instrumentalities
`
`listed at the end of this section are struck with prejudice.
`
`a.
`
`Network Firewall
`
`Finjan contends that it cited “the very same code that Check Point confirmed the Firewall
`
`uses in its interrogatory responses.” Oppo. 4; see Declaration of Kristopher Kastens (“Kastens
`
`Decl.”) [Dkt. No. 225-13] ¶ 3; see also id., Ex. 2 at 1, 5 (paper copy of Check Point’s
`
`
`4 In addition to arguing that Finjan’s factual assertions about the three examples are false, Check
`Point also contends that Finjan should be barred from relitigating this matter. Reply 1. It points
`out that Finjan never responded to its representations made in Appendix 1 during the AIC round,
`nor included any argument disputing its accuracy, in either its opposition or supplemental briefing.
`Id. Finjan did not contest the accuracy of the Appendices in the last hearing. See Transcript of
`Proceedings held on July 10, 2019 [Dkt. No. 190] 2:13-17. Check Point asserts that Finjan’s
`attempt to seek reconsideration of the prior AIC Order should be rejected because it “submitted
`evidence about which products did not have pin citations, Finjan did not dispute that evidence, and
`the Court relied on that record in issuing its order.” Reply 1-2.
`
`It is true that Check Point made the assertion in its AIC briefing and Appendices that there were
`30 instrumentalities that had no source code citations, and Finjan made no argument regarding the
`accuracy of that assertion. But I did not make a finding that those 30 instrumentalities were
`struck. There was no argument about the accuracy of that assertion. Instead, I held that “[t]o the
`extent any or all of the 30 of the accused instrumentalities lack pinpoint citations, they are struck
`with prejudice.” AIC Order at 11 (emphasis added). This question is not being “relitigated,” as
`Check Point phrases it. But for different reasons, all 30 instrumentalities are struck with
`prejudice.
`
`10
`
`Northern District of California
`
`United States District Court
`
`

`

`Case 3:18-cv-02621-WHO Document 255 Filed 01/17/20 Page 11 of 39
`
`
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`Supplemental Response to Finjan’s Interrogatory No. 9, which has been designated as source
`
`code) (hereinafter “Rog. 9”).5 As Check Point points out, this is false. Reply 2. Comparing the
`
`source code cited by Finjan with Rog. 9 shows that Finjan did not cite any of the code categorized
`
`as Network Firewall code. See Rog. 9 at 1-7. Finjan’s argument fails.
`
`b.
`
`Network Anti-Spam & E-mail Security
`
`Finjan similarly argues that it cited to the same code that Check Point confirmed is used by
`
`Anti-Spam. Oppo. 5. To support its argument, Finjan cites to the source code citations it provided
`
`in its SAICs. See Declaration of Lisa Kobialka in Support of Plaintiff Finjan, Inc.’s Opposition to
`
`Defendants’ Motion to Enforce Court Order and Strike Second Amended Infringement
`
`Contentions (‘Kobialka Decl.”) [Dkt. No. 225-2] ¶ 14; see also id., Ex. 11 at 7 [Dkt. No. 223-11]
`
`(copy of SAIC chart “Appendix A - Network Anti-Spam & E-mail Security” for the ‘494 Patent).
`
`But the issue here is whether Finjan accused this product in its AICs, or whether it failed to
`
`provide any source code citations for it in its AICs such that it was previously struck with
`
`prejudice.
`
`Even if I look at the source code citations Finjan provided for Network Anti-Spam in its
`
`SAICs, Check Point points out that Finjan cited to code that provides services to the Anti-Spam
`
`blade, but did not identify code that is part of that blade. Reply 3; see Rog. 9 at 44-45. As Check
`
`Point argues, this is “not a small distinction” because “for example Google’s web servers provides
`
`services to your Microsoft browser, but they are not part of your browser.” Reply 3.
`
`c.
`
`Capsule Cloud
`
`Finjan argues that it provides pincites for Capsule Cloud by incorporating by reference the
`
`citations for other instrumentalities because Capsule Cloud is just the cloud version of those
`
`blades. Oppo. 4; see Kastens Decl., Ex. P at 1-4 [Dkt. No. 224-8] (copy of AIC chart “Appendix
`
`A-6” for Capsule Cloud for the ‘494 Patent). Check Point responds that this argument is also false
`
`because Finjan’s AICs did not cite to any Capsule Cloud code. Reply at 3, n.3 (citing to
`
`
`5 As explained further in Section II of this opinion, a manual filing of this exhibit does not suffice.
`Check Point must e-file an electronic copy under seal so that it is properly part of the record of this
`case.
`
`11
`
`Northern District of California
`
`United States District Court
`
`

`

`Case 3:18-cv-02621-WHO Document 255 Filed 01/17/20 Page 12 of 39
`
`
`
`Declaration of Tamir Zegman In Support of Reply Brief to Strike Second Amended Infringement
`
`Contentions [Dkt. No. 235-2] ¶ 11 (describing that there is a specific source code directory for
`
`Capsule Cloud products but that Finjan’s AICs have never cited to any code in that directory)); see
`
`also Rog. 9 at 735 (list of Capsule Cloud source code).
`
`Even if Finjan was attempting to claim that non-Capsule Cloud code shows infringement,
`
`it does not explain that theory and instead simply provides a one-sentence incorporation by
`
`reference placeholder for Capsule Cloud. I expressly directed Finjan to “better explain why the
`
`same source code [] applies” to different things. AIC Order at 11. This example shows that
`
`Finjan has failed to do that as to Capsule Cloud.
`
`Accordingly, the following 30 instrumentalities are struck with prejudice. Finjan
`
`stipulated to striking 27 of them and its arguments as to the three products discussed above fail.
`
`//
`
`//
`
`//
`
`//
`
`//
`
`//
`
`//
`
`//
`
`//
`
`//
`
`//
`
`//
`
`//
`
`//
`
`//
`
`//
`
`//
`
`12
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`Northern District of California
`
`United States District Court
`
`

`

`Case 3:18-cv-02621-WHO Document 255 Filed 01/17/20 Page 13 of 39
`
`
`
`
`
`“Check Point Blade Architecture”
`1. Firewall
`2.
`IPSec VPN
`3.
`Identity Awareness
`4. Advanced Networking and Clustering
`5. Application Control
`6. URL Filtering
`7. Anti-Spam & E-mail Security
`8. Data Loss Prevention (DLP)
`9. Mobile Access Blade
`10. Network Policy Management
`11. Endpoint Policy Management
`12. Next-Generation SmartEvent
`13. Logging and Status
`14. Compliance
`15. SmartWorkflow
`16. SmartProvisiong
`17. Monitoring
`18. Management Portal
`19. User Directory
`Endpoint Security (Enterprise)
`20. SmartLog
`ZoneAlarm
`21. Two-Way Firewall
`22. Antivirus and Anti-spyware
`“ThreatCloud”
`23. IPS
`24. Anti-Bot
`25. Anti-Virus
`26. URL Filtering
`27. Application Control
`28. Private ThreatCloud
`“Capsule Cloud”
`29. No code cite. Only references “Check Point Blade Architecture” charts
`“Check Point Appliances”
`30. No code cite. Only references “Check Point Blade Architecture” charts
`
`I strike these instrumentalities with prejudice because Finjan continues to cite unrelated
`
`code by referring to directories that are not related to the accused product. Check Point provided
`
`Finjan with its code for each accused product in Rog. 9 before Finjan served its AICs. It should
`
`have been able to cite to the proper code for each accused product.
`
`2.
`
`Issue 1(b): The SAICs include contentions previously struck because
`Finjan provided pinpoint citations for only some elements of an
`asserted claim in its AICs.
`
`Other than the 30 instrumentalities discussed above, there are contentions for some
`
`products

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket