throbber
Case 3:18-cv-02621-WHO Document 264-7 Filed 03/27/20 Page 1 of 65
`
`
`
`Exhibit F
`
`
`
`
`

`

`Case 3:18-cv-02621-WHO Document 264-7 Filed 03/27/20 Page 2 of 65
`
` Pages 1 - 63
`
`UNITED STATES DISTRICT COURT
`
`NORTHERN DISTRICT OF CALIFORNIA
`
`BEFORE THE HONORABLE WILLIAM H. ORRICK, JUDGE
`
`FINJAN, INC., )
` )
` Plaintiff, )
` )
` VS. ) NO. C 18-2621 WHO
` )
`CHECK POINT SOFTWARE TECHNOLOGIES, )
`INC., et al., )
` ) San Francisco, California
` Defendants. )
`___________________________________)
`
` Wednesday, December 4, 2019
`
`
`TRANSCRIPT OF PROCEEDINGS
`
`APPEARANCES:
`
`For Plaintiff:
` KRAMER LEVIN NAFTALIS & FRANKEL, LLP
` 990 Marsh Road
` Menlo Park, California 94025
` BY: PAUL J. ANDRE, ESQ.
` KRISTOPHER B. KASTENS, ESQ.
`
`For Defendants:
` ORRICK HERRINGTON & SUTCLIFFE, LLP
` 405 Howard Street
` San Francisco, California 94105-2669
` BY: CLEMENT S. ROBERTS, ESQ.
` EVAN D. BREWER, ESQ
`
` ORRICK HERRINGTON & SUTCLIFFE, LLP
` 777 South Figueroa Street
` Suite 3200
` Los Angeles, California 90017
` BY: ALYSSA M. CARIDIS, ESQ.
`
`Reported By: BELLE BALL, CSR 8785, CRR, RDR
` Official Reporter, U.S. District Court
`
`
`(Appearances continued, next page)
`
`
`
`

`

`Case 3:18-cv-02621-WHO Document 264-7 Filed 03/27/20 Page 3 of 65
`
`APPEARANCES, CONTINUED:
`
`For Defendants:
`
` ORRICK HERRINGTON & SUTCLIFFE, LLP
` 1000 Marsh Road
` Menlo Park, California 94025
` BY: VICKIE L. FEEMAN, ESQ.
`
`Also Present:
` JULIA MAR-SPINOLA, Finjan
`
`
`
`
`
`

`

`Case 3:18-cv-02621-WHO Document 264-7 Filed 03/27/20 Page 4 of 65
`
` 3
`
` 1
`
` 2
`
` 3
`
` 4
`
` 5
`
` 6
`
` 7
`
` 8
`
` 9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`Wednesday - December 4, 2019
`
` 2:46 p.m.
`
`P R O C E E D I N G S
`
`THE CLERK: Calling Civil Matter 18-2621, Finjan,
`
`Incorporated versus Check Point Software Technologies,
`
`Incorporated.
`
`Counsel, please come forward and state your appearances.
`
`MR. ANDRE: Good afternoon, Your Honor. Paul Andre
`
`for Finjan. With me today is Kris Kastens. And from Finjan,
`
`Julia Mar-Spinola is sitting back there.
`
`MR. ROBERTS: Good afternoon, Your Honor. Clem
`
`Roberts from Orrick Herrington for the defendant. And we have
`
`Alyssa Caridis, Vickie Feeman, and Evan Brewer.
`
`THE COURT: So I've put up here five bankers' boxes
`
`full of stuff that you filed.
`
`How on earth do you think that a federal judge is going to
`
`go through all of the paper? 5,135 charts? 185,000 pages?
`
`What do you want me to do with all of this? This is nuts.
`
`This is totally beyond the pale.
`
`Your job is to make your clients' cases clear. And
`
`digestible for people. I couldn't spend a month going through
`
`this, and do nothing else, and understand a minute of what
`
`you're trying to do. It's crazy.
`
`And you're not -- nobody in this case is helping
`
`themselves or their clients, particularly, in the way that this
`
`is going out. It's really not.
`
`
`
`

`

`Case 3:18-cv-02621-WHO Document 264-7 Filed 03/27/20 Page 5 of 65
`
` 4
`
` 1
`
` 2
`
` 3
`
` 4
`
` 5
`
` 6
`
` 7
`
` 8
`
` 9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`So what do you want me to do with this, Mr. Andre? What's
`
`the point of throwing all of this stuff at me?
`
`Everything that I looked at as I went -- as I tried to
`
`drill down on the few examples that are in the briefing --
`
`because there can't be a lot of them, because there are 185,000
`
`pages in the charts. But every one of them didn't check out,
`
`as far as I could tell, for your client.
`
`But I have a whole lot more that I have to do. And I
`
`didn't get a ton of help on the other side, because there are
`
`limitations in pages.
`
`So what am I supposed do with this?
`
`MR. ANDRE: Your Honor, I think -- first of all, I
`
`apologize. It was not our intent for the Court to receive --
`
`THE COURT: Well, who else is going to get it,
`
`Mr. Andre?
`
`MR. ANDRE: We served the charts on the defendant,
`
`because that's what they asked for. We asked them on numerous
`
`occasions: Can we group the charts? And they moved twice to
`
`say we could not group. And we had to have every single
`
`different product, and every single SKU, every version charted
`
`to try to avoid the grouping issue.
`
`When I got Your Honor's second order striking some of the
`
`contentions, and giving us clear instructions as to what to do,
`
`we took it to heart. And we talked to counsel (Indicating).
`
`We said: Is there any way we can group these charts to make it
`
`
`
`

`

`Case 3:18-cv-02621-WHO Document 264-7 Filed 03/27/20 Page 6 of 65
`
` 5
`
` 1
`
` 2
`
` 3
`
` 4
`
` 5
`
` 6
`
` 7
`
` 8
`
` 9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`less burdensome? And it was -- to do so would be at our own
`
`risk.
`
`You put the fear of God into us at the last hearing. I
`
`wasn't here, unfortunately; I was overseas. I wish I would
`
`have been here.
`
`When I got your order, I was upset that we were not able
`
`to satisfy Your Honor, and understand what we were trying to
`
`get across here. I think this sometimes happens with engineers
`
`who put this stuff together, they speak in a language that's
`
`foreign to me; I'm not an engineer.
`
`So, we went at a process over a two-week period where
`
`Mr. Kastens, who is a computer scientist (Indicating), and a
`
`team of young attorneys who didn't sleep put together charts
`
`for the defendant, Check Point, to show them every single
`
`combination of every single SKU number.
`
`For example, if there was a Firewall 7300 series, the 7300
`
`series has a 7302 and a 7304 and 7306. And it goes on and on,
`
`based on the size of the box. We charted every single one of
`
`those. Except doing it by the 7300 series. Mr. Kastens asked
`
`me personally: Is there any way we can just group these?
`
`I said I'm not going to roll the dice with Your Honor's
`
`order. You were very clear about the grouping.
`
`So we didn't intend defendants to file a motion with all
`
`of the briefing that was provided. We tried to give
`
`representative charts. And we just couldn't see eye to eye.
`
`
`
`

`

`Case 3:18-cv-02621-WHO Document 264-7 Filed 03/27/20 Page 7 of 65
`
` 6
`
` 1
`
` 2
`
` 3
`
` 4
`
` 5
`
` 6
`
` 7
`
` 8
`
` 9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`So, I do take responsibility in providing the defendants with
`
`those 5,000 charts.
`
`Because most of them were of one nature. There's
`
`different appliances, different firewalls, and combinations.
`
`But it was something that -- we didn't want to run afoul of the
`
`Court's order, and we couldn't figure out a way to get on with
`
`the defendant in this case. We've had numerous disputes with
`
`the defendant in this case. We generally tend to get along
`
`with -- we've had a trial in this court before, and we got
`
`along quite nicely with the defendants. But for whatever
`
`reason, that's what resulted.
`
`Now, when we filed our opposition to this motion, I
`
`imagine half those boxes are from us, because we responded to
`
`their briefing. And their hundreds of exhibits they put in.
`
`We matched them. We thought they were not representative. I
`
`don't know what we could have done to take this away from
`
`Your Honor. And I think this is one of the biggest issues --
`
`the reason I'm here today. I want to talk about what did we do
`
`wrong, take ownership of what we did do wrong. On your
`
`tentative, we're going to stipulate to quite a bit of it,
`
`because I went through and looked at it.
`
`And I want to make sure that we understand what we can do
`
`to, one, not have five bankers' boxes come up to the Court,
`
`because I think that is a tremendous waste. And when I heard
`
`about it, I knew your reaction was going to be exactly as it is
`
`
`
`

`

`Case 3:18-cv-02621-WHO Document 264-7 Filed 03/27/20 Page 8 of 65
`
` 7
`
` 1
`
` 2
`
` 3
`
` 4
`
` 5
`
` 6
`
` 7
`
` 8
`
` 9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`today, and I would take the brunt of it, even though it was an
`
`opposition motion, but nonetheless, 5,000 charts.
`
`That being said, with the charts we put in, there were no
`
`complaints about grouping. We did solve that problem. We
`
`didn't group anything. We put a chart in for every single
`
`possible combination. I think there must be easier ways to do
`
`it, but we couldn't figure out how to do it in this case.
`
`With that being said, I apologize to the Court, if we
`
`didn't solve the problem that you identified in a way that is
`
`acceptable. But we did -- it wasn't for lack of effort. We
`
`had a lot of people putting a lot of effort into it.
`
`THE COURT: I can see the effort.
`
`MR. ROBERTS: Your Honor, could I respond very
`
`briefly to that?
`
`THE COURT: You can respond. Let me just get my copy
`
`of the tentative, because I want to -- let me just ask what
`
`you're stipulating to, and then Mr. Roberts can --
`
`MR. ANDRE: Okay. Can I hand up just handouts? It
`
`might be easier for you to go through these.
`
`THE COURT: Looks smaller than these five bankers'
`
`boxes, so go ahead.
`
`MR. ANDRE: This is a summary.
`
`THE COURT: Okay. So you can't do this simply. So
`
`let me get Mr. Roberts to --
`
`MR. ROBERTS: All right. Two things. You don't have
`
`
`
`

`

`Case 3:18-cv-02621-WHO Document 264-7 Filed 03/27/20 Page 9 of 65
`
` 8
`
` 1
`
` 2
`
` 3
`
` 4
`
` 5
`
` 6
`
` 7
`
` 8
`
` 9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`any of the appliance charts. The only charts that you have are
`
`the substantive charts. We didn't put any of the appliance
`
`charts in.
`
`So this thing about the appliance charts, that's not what
`
`the bulk of the paper is. The bulk of the paper here is all of
`
`the evidence that relates to the substantive contentions for
`
`the network security Blades.
`
`Number two, on the appliance charts -- and we put in this
`
`correspondence Your Honor, before we brought this motion -- we
`
`went to them -- and you have this. This is Exhibit E to the
`
`Caridis declaration which has the meet-and-confer
`
`correspondence.
`
`And we say (As read):
`
`"The SAICs include thousands of charts purportedly
`
`directed to Check Point's appliances. From our
`
`review, it does not appear that these charts have any
`
`substantive differences...Please confirm whether
`
`Finjan will select one (or a limited subset if..."
`
`THE COURT: You need to slow down a little bit,
`
`Mister --
`
`MR. ROBERTS: Yeah.
`
`"Please confirm whether Finjan will select one (or a
`
`limited subset if Finjan believes multiple are
`
`necessary) per chart (sic) as exemplary, and withdraw
`
`the remaining charts."
`
`
`
`

`

`Case 3:18-cv-02621-WHO Document 264-7 Filed 03/27/20 Page 10 of 65
`
` 9
`
` 1
`
` 2
`
` 3
`
` 4
`
` 5
`
` 6
`
` 7
`
` 8
`
` 9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`We have in every briefing suggested that you can use
`
`exemplary charts, if you're alleging that the things are the
`
`same. You have to say what they're exemplary, and can say why
`
`they're the same.
`
`This isn't about the grouping question. This is about
`
`whether or not the appliances can be used as exemplary for
`
`other appliances, when all they're pointing to is the CPU and
`
`the memory of the appliance.
`
`And we have said in multiple briefing that that can be the
`
`same. And we said that in the meet-and-confer correspondence,
`
`here. They declined. And we didn't put any of those charts
`
`in.
`
`As for the rest of the paper, what we did, Your Honor,
`
`is -- what we tried do is we took 500 pages from among the
`
`charts. We put that in. Then we put in a 50-page appendix
`
`discussing the problems, to try to slim that down. And then we
`
`did the 25 pages of briefing.
`
`But I don't know how to -- leaving the appliance charts to
`
`one side, I don't even know how to deal with that volume, and
`
`put before the Court. If we didn't do that, they were going to
`
`say: Well, you only gave us a couple of examples, and you
`
`didn't prove your case that all of these things have problems
`
`in them.
`
`So, you know, I don't know how else to do it other than
`
`pick 500 pages from among the hundreds of thousands we were
`
`
`
`

`

`Case 3:18-cv-02621-WHO Document 264-7 Filed 03/27/20 Page 11 of 65
`
` 10
`
`given, then do a slimmed-down appendix to index into it, and
`
`then give you -- try to give you specific charts in the brief.
`
`I mean, I was trying to step it down, to make it as streamlined
`
`as possible.
`
`THE COURT: All right.
`
`So why don't you go ahead, Mr. Andre --
`
`MR. ANDRE: Thank Your Honor.
`
`On the slides, I -- I'm on Slide 2.
`
`(Document displayed)
`
`MR. ANDRE: I put in -- this is the Court's order
`
`that I was not here for, that you said there were three issues
`
`for our amended infringement contentions. One was grouping,
`
`the two is source code citations, and three were new
`
`instrumentalities. They were labeled (a), (b) and (d) in your
`
`brief. (C) was a -- doctrine of equivalents, which was not an
`
`issue.
`
`So with respect -- go to Slide 3.
`
`(Document displayed)
`
`MR. ANDRE: With respect to grouping, you told us to
`
`parse them out. That (As read):
`
`"...every contention for every claim can be combined
`
`with every contention for every other claim chart,
`
`Finjan must state that. I strike these charts with
`
`leave to amend."
`
`We tried to interpret that in the broadest reasonable way,
`
`
`
` 1
`
` 2
`
` 3
`
` 4
`
` 5
`
` 6
`
` 7
`
` 8
`
` 9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`

`

`Case 3:18-cv-02621-WHO Document 264-7 Filed 03/27/20 Page 12 of 65
`
` 11
`
` 1
`
` 2
`
` 3
`
` 4
`
` 5
`
` 6
`
` 7
`
` 8
`
` 9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`just to make sure we didn't run afoul of the Court's order. We
`
`understood the consequences.
`
`And of the 5,000 charts, I think almost all but 100 --
`
`some of them were on the appliances. I think it was 4,986 were
`
`on the appliances. All the different combinations. What may
`
`be in the boxes there, that's what I was talking about when I
`
`said most of them were on appliances.
`
`And we didn't want to -- we tried to tease out in the
`
`grouping we did. And as a result, the grouping's not before
`
`the Court today. Now, that's the good news. And that's
`
`probably the only good news I have for you, is that that's not
`
`before the Court.
`
`The second issue that Your Honor brought up in your court
`
`order is source code citations. And in this, there were 52
`
`products that we had charted in our amended infringement
`
`contentions. Check Point said 22 of them were fine. Cited for
`
`every element. And it was fine. But 30 of them were not.
`
`And your order said (As read):
`
`"To the extent that any of the 30 of the accused
`
`instrumentalities lack pinpoint citations, they are
`
`struck, with prejudice. Where Finjan has used the
`
`same source code for different things, it may
`
`infringe -- its contentions to better explain why the
`
`same source code is applied to wholly different
`
`limitations."
`
`
`
`

`

`Case 3:18-cv-02621-WHO Document 264-7 Filed 03/27/20 Page 13 of 65
`
` 12
`
` 1
`
` 2
`
` 3
`
` 4
`
` 5
`
` 6
`
` 7
`
` 8
`
` 9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`So we looked at, first of all, that order. And
`
`Check Point's Appendix 2, where they said here are the 22 --
`
`and this is on Page 5 of the slides -- Here are the 22 products
`
`and claims and patents that there is contentions for which
`
`source code citations provided for each element.
`
`So we're good on those 22. That's what we read the
`
`admission by Check Point, and Your Honor's order, that you want
`
`to look at the 30 that they said they were not source code
`
`citations.
`
`THE COURT: I was actually -- my memory was a little
`
`different than that. My memory was that the 30 there was
`
`nothing for, and then the focus was on whether the other 22
`
`had -- were sufficiently --
`
`MR. ANDRE: On the source code citation, what
`
`Your Honor ordered, I quote it verbatim.
`
`Says to the extent 30 --
`
`THE COURT: I saw your slide.
`
`MR. ANDRE: Yeah.
`
`THE COURT: But my memory's just different.
`
`MR. ANDRE: So it was -- it was Appendix 2 to
`
`Check Point's original motion that had ones that they were --
`
`they were pinpoint. That's -- these are blocking a quote from
`
`those. They said there was citations. You know, they had this
`
`table (Indicating), you might remember.
`
`THE COURT: Yeah.
`
`
`
`

`

`Case 3:18-cv-02621-WHO Document 264-7 Filed 03/27/20 Page 14 of 65
`
` 13
`
` 1
`
` 2
`
` 3
`
` 4
`
` 5
`
` 6
`
` 7
`
` 8
`
` 9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`MR. ANDRE: And in Appendix 2, they had list of
`
`contentions for which source code citations provided fore each
`
`element (Indicating). So --
`
`THE COURT: Okay. Well, if I'm wrong, I'm sure
`
`Mr. Roberts will let me know, too.
`
`MR. ANDRE: He may -- in his briefing this time, that
`
`was the case. But this was -- the briefing was focused on
`
`these 30 for which they were not -- not every element was a
`
`citation to, or no citations at all to the source code. The
`
`30.
`
`So we read the Court's order and their admissions that 22
`
`of the products did have source code citations for each and
`
`every element.
`
`Now if you look at Page 6, we did look at the 30
`
`instrumentalities that were struck, if there was no source
`
`code. As Your Honor said, to the extent those 30 did not have
`
`source code, they're struck.
`
`We went back and looked, and it said if there was or was
`
`not source code there. This was a diligent project we did to
`
`say: What of these 30 instrumentalities had source code that
`
`we thought was sufficient or not.
`
`Twenty-seven of them -- now, my engineerings would
`
`disagree with this, but 27 of them I said did not have source
`
`code citation to satisfy me. Three of them we believe did have
`
`source code citations that would be sufficient under the local
`
`
`
`

`

`Case 3:18-cv-02621-WHO Document 264-7 Filed 03/27/20 Page 15 of 65
`
` 14
`
` 1
`
` 2
`
` 3
`
` 4
`
` 5
`
` 6
`
` 7
`
` 8
`
` 9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`rules. And that is the Firewall, Anti-spam and Email Security,
`
`and Capsule Cloud. And that was the subject of the brief they
`
`filed for the second amended contentions.
`
`For the firewall, we go to Page 7 of the slides.
`
`(Document displayed)
`
`MR. ANDRE: What we said was in our groupings before,
`
`that the -- the threat emulation used these receivers in
`
`combination.
`
`And Your Honor noted that beside saying that the threat
`
`emulation Blade's scanner combines with the receivers in the
`
`other Blades, Finjan's chart does not adequately describe other
`
`combination -- '494 patent, chart at 21. (As read)
`
`"If every combination (sic) for every claim can be
`
`combined with every combination -- contention for
`
`every other claim in its chart, Finjan must state
`
`that. I strike these charts with leave to amend."
`
`So what we did there with the firewalls -- and they were
`
`acting as receiver, we amended the contentions to make very
`
`clear that the firewall also combined with the various threat
`
`emulation. So we were given leave to amend; we did so.
`
`We believe that the second amended infringement
`
`contentions set out every combination of threat emulation and
`
`firewall for every claim that the firewall receiver or contact
`
`processor is accused in a -- separate charts. So we gave those
`
`charts, those are the main charts that we provided.
`
`
`
`

`

`Case 3:18-cv-02621-WHO Document 264-7 Filed 03/27/20 Page 16 of 65
`
` 15
`
` 1
`
` 2
`
` 3
`
` 4
`
` 5
`
` 6
`
` 7
`
` 8
`
` 9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`So we think -- we identified the firewall earlier in the
`
`amended infringement contentions. We were given leave to amend
`
`to make it clear, and we believe we did so.
`
`With the next product, the anti-spam and email on Slide 8,
`
`this one is a little bit muddier, I'll be honest with
`
`Your Honor. The Anti-Spam and Email Security was listed in
`
`Finjan's cover pleadings as an accused product, both of them
`
`separately as accused products.
`
`But what we found out was the source code for the
`
`antivirus and the anti-spam email are identical, because they
`
`use the same software engine in both instrumentalities. They
`
`differ in name because one's used protect against web threats,
`
`and the other's used to protect against email threats. So what
`
`we did in the charts for our second amended infringement
`
`contention is we separate out those into two charts.
`
`It's muddier, because although we claimed it in our cover
`
`pleading that both infringe, in our first amended infringement
`
`contentions, we combined them. So we separated those out. But
`
`we think we gave adequate disclosure to provide Check Point
`
`with notice.
`
`And the third of the 30 on Page 9 of the slides is Capsule
`
`Cloud. So, Finjan alleged in its amended infringement
`
`contentions that Capsule Cloud is the cloud version of the
`
`Blades. And then incorporated the charts from the Blades to
`
`the Capsule Cloud. And you'll see that in the bottom
`
`
`
`

`

`Case 3:18-cv-02621-WHO Document 264-7 Filed 03/27/20 Page 17 of 65
`
` 16
`
` 1
`
` 2
`
` 3
`
` 4
`
` 5
`
` 6
`
` 7
`
` 8
`
` 9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`paragraph, it says (As read):
`
`"...Capsule Cloud infringes for the same reasons as
`
`set forth in Appendix A-1."
`
`So we had the exact same product. One is you buy and you
`
`get a box, and the other you buy and it's in the cloud. And
`
`you buy a service, essentially.
`
`So what we said on Capsule Cloud was, and you can read it
`
`in the slide, Capsule Cloud's exactly the same thing as blade,
`
`it's just in the cloud. And therefore, we just incorporated by
`
`reference the source code. Once again, maybe we should have
`
`put source code in there, and not incorporate by reference.
`
`So that is the reason we charted those three of the 30.
`
`The other 27, there was -- like I said, my engineering team was
`
`fighting me, but I said I -- it wasn't clear to me. I'm not an
`
`engineer, so...
`
`And then the last thing Your Honor talked about was new
`
`instrumentalities. You noted in your order that (As read):
`
`"Check Point replies that it has identified 13 new
`
`products in the amended infringement contentions, in
`
`addition to a larger number of unidentified (sic)
`
`technologies and functionalities that pop up without
`
`explanation in Finjan's charts."
`
`And if you go to Slide 11, those are the new
`
`instrumentalities that they put their briefing. None of these
`
`instrumentalities or these new technologies are in the second
`
`
`
`

`

`Case 3:18-cv-02621-WHO Document 264-7 Filed 03/27/20 Page 18 of 65
`
` 17
`
` 1
`
` 2
`
` 3
`
` 4
`
` 5
`
` 6
`
` 7
`
` 8
`
` 9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`amended infringement contentions. We complied wholeheartedly
`
`with the Court's order. So this is not really an issue for
`
`these named instrumentalities.
`
`Now, they've raised new issues. And this is where we'll
`
`get to your tentative, and we'll be stipulating to some of the
`
`tentative decisions, and contesting others.
`
`So the tentative, we go to your -- the tentative issue
`
`No. 1 that you identified.
`
`So:
`
`"Does Finjan continue to accuse products and theories
`
`that were previously struck with prejudice in the AIC
`
`Order because Finjan:
`
`"did not cite any source code for those products;
`
`"contentions were incomplete because Finjan provided
`
`source code citations for some elements but not all
`
`the elements;"
`
`And:
`
`"accused a marketing term and not a product?"
`
`Now, the products that are accused, the theories were
`
`these 30 products that you struck. And as I said, three of
`
`them we believe --
`
`THE COURT: All right, we've gone through them.
`
`MR. ANDRE: Okay. So we're there. So, and like I
`
`said, so that's not -- so that's the only issue now.
`
`If you go to the next slide, Slide 13, as I said of the 30
`
`
`
`

`

`Case 3:18-cv-02621-WHO Document 264-7 Filed 03/27/20 Page 19 of 65
`
` 18
`
` 1
`
` 2
`
` 3
`
` 4
`
` 5
`
` 6
`
` 7
`
` 8
`
` 9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`instrumentalities, we just wanted to -- the (b) part of the
`
`tentative is that -- did we have -- other than the 22, which we
`
`give source code, if the Court's referring to -- in the
`
`tentative you put in (As read):
`
`"Other than the 30 instrumentalities struck because
`
`no source code was cited..."
`
`For relevance.
`
`"...there are other contentions that were also struck
`
`because Finjan did not give pinpoint citations to all
`
`elements of the claim. But Check Point's examples
`
`show that some code was cited. It was code from a
`
`wholly different product. Finjan had access to
`
`source code directory for each product..."
`
`They gave a chart of products on Slide 13. And so we will
`
`stipulate to the tentative with respect to those products.
`
`That's what you mentioned in your order here. So that's one --
`
`the tentative, we won't assert anything on those products for
`
`those claims, as outlined in the table.
`
`THE COURT: All right.
`
`MR. ANDRE: Then Part (c), we stipulate to the
`
`tentative, because we actually won that one. So we -- we like
`
`that one.
`
`THE COURT: Uh-huh.
`
`MR. ANDRE: Tentative Issue No. 2 (As read):
`
`"Does Finjan include new accusations including:
`
`
`
`

`

`Case 3:18-cv-02621-WHO Document 264-7 Filed 03/27/20 Page 20 of 65
`
` 19
`
` 1
`
` 2
`
` 3
`
` 4
`
` 5
`
` 6
`
` 7
`
` 8
`
` 9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`"New products;
`
`"New claims;
`
`"Or new combinations?"
`
`And I want to go through each one of these. And we'll
`
`stipulate to some of tentative.
`
`If you go to Slide 15, these are new produced and patents
`
`they listed. They said -- they have bullet points (As read):
`
`"The AIC charts for the '494 patent did not include
`
`contentions for..."
`
`Various -- there's four bullet points there. This is in
`
`their briefing, at Page 10. Two of them, they're highlighted.
`
`You can see from the appendix, we did. And they stipulated to
`
`it. We did give for the antivirus, on '633 on claim 8. So we
`
`did give contentions that Check Point stipulated that we gave
`
`source code citations for every element. And they did not
`
`raise that during the second amendment.
`
`Same is true with the '154 patent, claim 1, for threat
`
`extraction.
`
`So we stipulate to two of those, and two of them we
`
`contest because they said we didn't -- we didn't provide them
`
`in the amendment infringement contentions, but their Appendix 2
`
`said we did. And I think that's dispositive of that.
`
`With respect to new claims, Slide 16. Finjan responded --
`
`I mean, Check Point admitted that the amended infringement
`
`contention charts included contentions for Endpoint Anti-Bot,
`
`
`
`

`

`Case 3:18-cv-02621-WHO Document 264-7 Filed 03/27/20 Page 21 of 65
`
` 20
`
` 1
`
` 2
`
` 3
`
` 4
`
` 5
`
` 6
`
` 7
`
` 8
`
` 9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`claim 10 and 14. You'll see that on the highlight on the
`
`right. This is their Appendix 2. This is the chart of the
`
`products they want to strike.
`
`We stipulate to the three at the bottom of the chart. The
`
`Network Threat Emulation, IPS, and Forensic. But we believe
`
`that the Endpoint Anti-Bot was disclosed in the amended
`
`infringement contentions. And they were -- further, they are
`
`not new claims in our charts today.
`
`So we will stipulate to the three, but the one we think we
`
`did disclose in the amended infringement contentions, as
`
`stipulated to by Check Point.
`
`And then with respect to new combinations, that's Slide 17
`
`and 18, Check Point provided the Court with another table. The
`
`new combinations in the second amended infringement
`
`contentions.
`
`We will stipulate to most of them, but there's two of them
`
`we believe we gave the combinations for in the amended
`
`infringement contentions, and just carried them through to the
`
`second amended infringement contentions.
`
`The first, it's actually on the table, the third from the
`
`bottom. The Network Threat Emulation and ThreatCloud
`
`Emulation. On the '844 -- this is claim 1 of the '844.
`
`You see there in the paragraph, it says (As read):
`
`"...Threat Emulation technology in ThreatCloud. The
`
`software that receives the downloadable..."
`
`
`
`

`

`Case 3:18-cv-02621-WHO Document 264-7 Filed 03/27/20 Page 22 of 65
`
` 21
`
` 1
`
` 2
`
` 3
`
` 4
`
` 5
`
` 6
`
` 7
`
` 8
`
` 9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`And shows that the Threat Emulation and ThreatCloud
`
`Emulation were combined in the amended infringement
`
`contentions.
`
`And then on the second page of the slide, Slide 18, the
`
`Endpoint Threat Emulation and ThreatCloud Emulation, again, we
`
`believe we disclosed these. And this is a little bit more
`
`attenuated, because in our contentions we defined what
`
`ThreatCloud was. That's on the right.
`
`It says (As read):
`
`"ThreatCloud also includes emulation technology using
`
`virtual machine sandboxes, which is sometimes also
`
`called 'SandBlast Cloud.'"
`
`So "SandBlast Cloud" is synonymous with "ThreatCloud."
`
`And for this claim on the '633 patent, you see we did a
`
`combination of the Endpoint Threat Emulation with sandbox
`
`cloud. You see the sandbox cloud in the figure and also in the
`
`text. Sandblast agent.
`
`So we believe, going back to Slide 17, at least two of
`
`these combinations we did disclose in our amended infringement
`
`contentions. The rest, we'll stipulate to the tentative that
`
`those are -- we will not have those.
`
`That's with respect to Issue 2 of the tentative.
`
`With respect to Issue 3, you asked if we adequately
`
`identified and explained the accused combinations. And the (a)
`
`section was about SmartEvent or Forensics. This is a
`
`
`
`

`

`Case 3:18-cv-02621-WHO Document 264-7 Filed 03/27/20 Page 23 of 65
`
` 22
`
` 1
`
` 2
`
` 3
`
` 4
`
` 5
`
` 6
`
` 7
`
` 8
`
` 9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`situation where when we go to Slide 20, our response is here.
`
`Your Honor is correct, we only charted that for one
`
`element. And we say it can be used in combination. In your
`
`tentative, you say, well, therefore, you could use a multitude
`
`of combinations.
`
`What we had said in our briefing was there's actually
`
`approximately 2,000 more charts, and we had to try to put them
`
`into each combination. We thought we were being prudent where
`
`we could, and just said essentially that these two
`
`instrumentalities are charted for a single claim element -- the
`
`database -- of these two patents.
`
`The charts for the single element provided Check Point
`
`with notice that when either of those instrumentalities were
`
`sold with the network or end point security products, the
`
`SmartEvent Forensic databases were also used to store the DSPs.
`
`We didn't combine all the charts. We didn't. And if it's
`
`-- we think we gave them notice. But Your Honor, if we didn't
`
`follow Your Honor's order and give them explicitly the charts,
`
`we'll live with the consequences of that.
`
`But it is something we -- we do believe we were trying to
`
`mitigate what we were doing with the appliances and doing
`
`almost 5,000 charts, and not do another 2,000 with a single
`
`element. We were just trying to be more prudent. And we
`
`thought we were clear about notice. But if we weren't, we'll
`
`live with the consequences there.
`
`
`
`

`

`Case 3:18-cv-02621-WHO Document 264-7 Filed 03/27/20 Page 24 of 65
`
` 23
`
` 1
`
` 2
`
` 3
`
` 4
`
` 5
`
` 6
`
` 7
`
` 8
`
` 9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`The tentative 3(b), it starts: The network firewall
`
`practices and li

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket