throbber
Case 3:18-cv-02621-WHO Document 84 Filed 02/27/19 Page 1 of 18
`
`
`
`
`
`
`
`UNITED STATES DISTRICT COURT
`
`NORTHERN DISTRICT OF CALIFORNIA
`
`FINJAN, INC.,
`Plaintiff,
`
`v.
`
`CHECK POINT SOFTWARE
`TECHNOLOGIES, INC., et al.,
`Defendants.
`
`Case No. 18-cv-02621-WHO
`
`
`ORDER GRANTING MOTION TO
`STRIKE IN PART; GRANTING
`MOTIONS TO SEAL; GRANTING
`MOTION TO AMEND CLAIM
`CONSTRUCTION SCHEDULE
`Re: Dkt. Nos. 54, 55, 58, 60, 69, 75
`
`
`
`
`
`
`
`
`
`
`
`This is a patent infringement action. Plaintiff Finjan, Inc. (“Finjan”) accuses defendant
`
`Check Point Software Technologies, Inc. and Check Point Software Technologies Ltd.
`
`(collectively “Check Point”) of directly and indirectly infringing on several of its patents related to
`
`cyber security. Complaint at ¶¶ 8-9 [Dkt. No. 1]. Check Point moves to strike a number of
`
`Finjan’s infringement contentions for violations of my Order Re Case Narrowing and
`
`Infringement Contentions (the “Narrowing Order”) [Dkt. No. 29] and the Patent Local Rules.
`
`Check Point’s Motion to Enforce Court Order and Strike Infringement Contentions (“Mot.”) [Dkt.
`
`No. 55]. The motion to strike is granted in part and Finjan must amend its infringement
`
`contentions.
`
`BACKGROUND
`
`
`
`After receiving briefing from the parties on how to manage this litigation in compliance
`
`with Federal Rule of Civil Procedure 1’s mandate of a “just, speedy, and inexpensive
`
`determination of this action,” I ordered Finjan to serve its infringement contentions under
`
`specifications that largely follow the provisions of this Court’s Patent Local Rules as well as the
`
`guidance provided in the 2013 Model Order. Narrowing Order. Finjan was instructed to “include
`
`pinpoint source code citations . . . accompanied by the document production required by Patent
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`Northern District of California
`United States District Court
`
`

`

`Case 3:18-cv-02621-WHO Document 84 Filed 02/27/19 Page 2 of 18
`
`
`
`Local Rule 3-2” and to also:
`(i) avoid open-ended citations to “exemplary” products and use of the
`terms “such as” and “for example”; (ii) set forth any infringement
`theories based on the doctrine of equivalents with limitation-by-
`limitation analyses; and (iii) for any indirect theories of infringement,
`identify the alleged direct infringement, the alleged acts of
`inducement or contribution to that infringement, and the relationship
`between them.
`Id. at 2. On November 2, 2018, Finjan served its infringement contentions on Check Point. Mot.
`
`at 1.
`
`The infringement contentions consist of a cover pleading, a list of every instrumentality
`
`that allegedly infringes, and thirty-four claim charts. The cover pleading provides information on
`
`Finjan’s initial disclosure of asserted claims, infringement contentions, and document production
`
`pursuant to Patent Local Rules 3-1 and 3-2. Plaintiff Finjan, Inc.’s Initial Disclosure of Asserted
`
`Claims and Infringement Contentions and Document Production Pursuant to Patent Local Rules 3-
`
`1 and 3-2 (the “Initial Disclosures”), attached as Exhibit C to Declaration of Clement Roberts
`
`(“Roberts Decl.”) [Dkt. No. 55-21]. The instrumentality list sets forth every instrumentality made
`
`by Check Point that allegedly infringes Finjan’s patents, divided into five product categories: (1)
`
`Network Security Products, (2) Endpoint Enterprise Products, (3) Endpoint Consumer Products,
`
`(4) Mobile Products, and (5) Cloud Services Products. Id. at Ex. A. Within each product
`
`category, Finjan identified “Model/Product Identifiers” that include discrete software components
`
`and what Check Point alleges are marketing terms, product bundles, and packages. Id. It accuses
`
`42 discrete blades, software, components, and services. Declaration of Tamir Zegman (“Zegman
`
`Decl.”) at ¶ 18 [Dkt. No. 55-2].
`
`Finjan produced seven sets of claim charts (34 total), with one set for each patent asserted
`
`in this case. Roberts Decl. at ¶¶ 9-10. Each set contains a chart for each allegedly infringing
`
`product category mentioned above. Id. Each chart identifies elements of the patent, provides
`
`some information about the location of that element within Check Point’s products using materials
`
`found on Check Point’s website, and then references Check Point’s source code. Opposition at 3-
`
`4 [Dkt No. 60-4]. Check Point notes that the source code citations largely overlap across all the
`
`charts within a product category, regardless of which element or patent is being charted. Zegman
`
`2
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`Northern District of California
`United States District Court
`
`

`

`Case 3:18-cv-02621-WHO Document 84 Filed 02/27/19 Page 3 of 18
`
`
`
`Decl. at ¶¶ 28-29.
`
`Check Point moves to strike a number of Finjan’s infringement contentions for violating
`
`the Narrowing Order and the Patent Local Rules because the contentions: (1) improperly combine
`
`multiple instrumentalities into a single claim chart; (2) fail to provide pinpoint source code
`
`citations to each accused instrumentality; (3) improperly use open-ended exemplary product
`
`definitions; (4) fail to provide its infringement theory with pinpoint citations sufficient to identify
`
`how each accused instrumentality infringes each claim element in each asserted patent; and (5)
`
`improperly accuse irrelevant instrumentalities and previously-unidentified instrumentalities
`
`without showing good cause. Mot. at 15-24. Taken together, Check Point contends that it is
`
`impossible to determine whether Finjan is accusing each product on a stand-alone basis or as part
`
`of a combination. Id. at 2-3. Check Point asks that I strike the 25 instrumentalities that lack
`
`source code citations and to require Finjan (i) to specify whether each remaining instrumentality is
`
`being accused alone or as part of a combination (and if so, to specify the combination) and (ii) to
`
`disclose its theories about how each source code citation satisfies each claim limitation for which
`
`it is cited. Id. at 16.
`
`LEGAL STANDARD
`
`Patent Local Rule 3-1 requires:
`
`
`[A] party claiming patent infringement shall serve on all parties a ‘Disclosure of
`Asserted Claims and Infringement Contentions[]’ . . . [which] shall contain the
`following information:
`
`(a) Each claim of each patent in suit that is allegedly infringed by each opposing
`party, including for each claim the applicable statutory subsections of 35 U.S.C. §
`271 asserted;
`
`(b) Separately for each asserted claim, each accused apparatus, product, device,
`process, method, act, or other instrumentality (“Accused Instrumentality”) of each
`opposing party of which the party is aware. This identification shall be as specific
`as possible. Each product, device, and apparatus shall be identified by name or
`model number, if known. Each method or process shall be identified by name, if
`known, or by any product, device, or apparatus which, when used, allegedly results
`in the practice of the claimed method or process;
`
`(c) A chart identifying specifically where each limitation of each asserted claim is
`found within each Accused Instrumentality, including for each limitation that such
`3
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`Northern District of California
`United States District Court
`
`

`

`Case 3:18-cv-02621-WHO Document 84 Filed 02/27/19 Page 4 of 18
`
`
`
`party contends is governed by 35 U.S.C. § 112(6), the identity of the structure(s),
`act(s), or material(s) in the Accused Instrumentality that performs the claimed
`function.
`
`(d) For each claim which is alleged to have been indirectly infringed, an
`identification of any direct infringement and a description of the acts of the alleged
`indirect infringer that contribute to or are inducing that direct infringement. Insofar
`as alleged direct infringement is based on joint acts of multiple parties, the role of
`each such party in the direct infringement must be described.
`
`(e) Whether each limitation of each asserted claim is alleged to be literally present
`or present under the doctrine of equivalents in the Accused Instrumentality.
`
`“The overriding principle of the Patent Local Rules is that they are designed [to] make the parties
`
`more efficient, to streamline the litigation process, and to articulate with specificity the claims and
`
`theory of a plaintiff’s infringement claims.” Bender v. Maxim Integrated Prods., No. 09-cv-
`
`01152-SI, 2010 WL 1135762, at *2 (N.D. Cal. Mar. 22, 2010) (alteration in original) (internal
`
`citation omitted). Patent Local Rule 3-1 is intended to require the plaintiff “to crystallize its
`
`theories of the case early in the litigation and to adhere to those theories once disclosed.” Bender
`
`v. Advanced Micro Devices, Inc., No. 09-cv-1149-EMC, 2010 WL 363341, at *1 (N.D. Cal. Feb.
`
`1, 2010). It “takes the place of a series of interrogatories that defendants would likely have
`
`propounded had the patent local rules not provided for streamlined discovery.” Network Caching
`
`Tech., LLC v. Novell, Inc., No. 01-cv-2079-VRW, 2002 WL 32126128, at *4 (N.D. Cal. Aug. 13,
`
`2002).
`
`
`
`“[A]ll courts agree that the degree of specificity under Local Rule 3-1 must be sufficient to
`
`provide reasonable notice to the defendant why the plaintiff believes it has a ‘reasonable chance of
`
`proving infringement.’” Shared Memory Graphics LLC v. Apple, Inc., 812 F. Supp. 2d 1022,
`
`1025 (N.D. Cal. 2010) (quoting View Eng’g, Inc. v. Robotic Vision Sys., Inc., 208 F.3d 981, 986
`
`(Fed. Cir. 2000)). The local rules do not “require the disclosure of specific evidence nor do they
`
`require a plaintiff to prove its infringement case . . . a patentee must nevertheless disclose what in
`
`each accused instrumentality it contends practices each and every limitation of each asserted claim
`
`to the extent appropriate information is reasonably available to it.” DCG Sys. v. Checkpoint
`
`Techs., LLC, No. 11-cv-03792-PSG, 2012 WL 1309161, at *2 (N.D. Cal. Apr. 16, 2012).
`
`4
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`Northern District of California
`United States District Court
`
`

`

`Case 3:18-cv-02621-WHO Document 84 Filed 02/27/19 Page 5 of 18
`
`
`
`DISCUSSION
`
`I.
`
`MOTION TO STRIKE
`
`A.
`
`Use of Group Charts
`
`Check Point argues that Finjan’s grouping of the instrumentalities into five groups of
`
`products was improper. Mot. at 6-10. Instead, Finjan should have charted the 36 instrumentalities
`
`identified by it in a communication to Check Point pursuant to the Narrowing Order because many
`
`of the products now contained in the Infringement Contentions are actually marketing terms,
`
`packages of products, or broad product categories. Id.; Finjan-Check Point – Identification Email
`
`(“Identification Email”) attached as Ex. A to Roberts Decl. [Dkt. No. 55-19]. According to Check
`
`Point, rather than organize its charts to accuse the specific software or instrumentalities listed in
`
`the Identification Email, Finjan has instead added previously unidentified software, physical
`
`appliances, unspecified servers and devices that might interact with them, and a variety of
`
`overarching marketing terms and general “technologies” that it has then grouped to assert that
`
`some or all of these things infringe in one or more unspecified combinations. Id. at 8; Initial
`
`Disclosure.
`
`Patent Local Rule 3-1(c) requires an accusing party to provide “[a] chart identifying
`
`specifically where each limitation of each asserted claim is found within each Accused
`
`Instrumentality.” Patent L. R. 3-1(c). The accusing party “must compare an accused product to its
`
`patents on a claim by claim, element by element basis for at least one of each defendant’s
`
`products.” Finjan, Inc. v. Proofpoint, Inc., No. 13-cv-05808-HSG, 2015 WL 1517920, at *2
`
`(N.D. Cal. Apr. 2, 2015). While under certain circumstances a plaintiff may use a single chart to
`
`chart a number of representative products, plaintiff must still, at a minimum, “chart a single
`
`product against all elements.” Cap Co. v. McAfee, Inc., No. 14-cv-05068-JD, 2015 WL 4734951,
`
`at 2* (N.D. Cal. Aug. 10, 2015). A plaintiff does not satisfy this requirement by “mixing and
`
`matching between different accused products” in its claim charts, as “[i]nfringement cannot be
`
`shown by a muddled hash of elements from different products.” Id. Combination claim charts
`
`(whereby the party asserting infringement describes how multiple products infringe the asserted
`
`patent(s) in a single chart) can provide the required specificity under Patent Local Rule 3–1(c), if
`5
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`Northern District of California
`United States District Court
`
`

`

`Case 3:18-cv-02621-WHO Document 84 Filed 02/27/19 Page 6 of 18
`
`
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`each accused product allegedly infringes in the same way. See Creagri, Inc. v. Pinnaclife Inc.,
`
`LLC, No. 11-cv-06635-LHK-PSG, 2012 WL 5389775, at *3 (N.D. Cal. Nov. 2, 2012) (finding a
`
`single claim chart for multiple accused products sufficient where the plaintiff specified that each
`
`product contained the same chemical compound, which plaintiff asserted was the infringing
`
`element of each of the identified products).
`
`Using Check Point’s Network Security group as an example, in its Identification Email
`
`Finjan accused eleven Network Security Blades. Mot. at 7; Identification Email. But in its Initial
`
`Disclosure and Infringement Contentions, Finjan identified what Check Point argues are eight
`
`products, two technologies used by the eight products, twelve blades, nearly 100 devices, types of
`
`devices, and “virtual devices” that allegedly use some unspecified combination of the above
`
`“technologies” and blades, and two open ended catch-all categories consisting of “all supporting
`
`servers, cloud infrastructure, feeds, or other component utilized for the above features” and “those
`
`releases supported by R76 and later.” Id. at 7-8. Check Point’s Senior Architect Tamir Zegman
`
`has submitted a declaration that the various network security blades are modular software
`
`programs that are sold in various bundles and marketed with names such as “Next Generation
`
`Threat Prevention” and “Threat Prevention & Sandblast.” Zegman Decl. at ¶ 4. As the products
`
`named by Finjan are bundles and packages of specific blades (in the Network Security Products
`
`context) or other software, Check Point argues that it would crystalize Finjan’s infringement
`
`contentions to organize its charts by the instrumentalities listed in its Initial Disclosure that
`
`allegedly infringe on its patents rather than the current mashup of instrumentalities, bundles, and
`
`packages represented by Check Point’s marketing terms. Reply [Dkt. No. 69-4] at 1-2.
`
`In opposition, Finjan contends that its groupings are proper because the accused products
`
`contain common infringing components, such as common accused engines or features, and
`
`consequently infringe in the same way. Oppo. at 15. Finjan cites Finjan, Inc. v. Symantec Corp.,
`
`No. 14-cv-02998-HSG (N.D. Cal. Feb. 15, 2017) but as there was no written order in that case, it
`
`is of little persuasive value here. It argues that its groupings are warranted because Check Point
`
`groups its products differently on its website and at the source code level. Id. It also characterizes
`
`Check Point’s arguments about the network blades as a red herring because they are bundled
`6
`
`Northern District of California
`United States District Court
`
`

`

`Case 3:18-cv-02621-WHO Document 84 Filed 02/27/19 Page 7 of 18
`
`
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`together, share source code modules, and run on the same engine and that Check Point’s citation
`
`to Geovector Corp. v. Samsung Elecs. Co., No. 16-cv-02463-WHO, 2017 WL 76950, at *4 (N.D.
`
`Cal. Jan. 9, 2017) and Advanced Micro Devices, Inc., 2010 WL 363341, at *1-2 are inapposite;
`
`while these two cases may not be factually analogous in a way that is helpful to Check Point’s
`
`argument, neither do they support Finjan’s current groupings.
`
`I find that Check Point’s request that Finjan organize its infringement contentions by the
`
`underlying instrumentalities will assist both the parties and me in determining precisely how
`
`Check Point’s products do or do not infringe on Finjan’s patents and will aid Finjan’s efforts to
`
`provide specific source code citations. I expect that requiring the infringement contentions to be
`
`organized in this way will cure the source code citation deficiencies as identified by Check
`
`Point—as I discuss below, that the underlying instrumentalities might share source code modules
`
`or run on the same engine does not relieve Finjan of its duty to cite to the source code with
`
`specificity. Appendix A to Mot. [Dkt. No. 55-1]. If Finjan believes that Check Point’s
`
`underlying instrumentalities infringe in combination, Finjan must specify the combination. It may
`
`be true that Check Point sells its products to consumers in bundles, but it will streamline this
`
`litigation to determine which components of each bundle infringe.
`
`This direction does not prejudice Finjan. If one of Check Point’s instrumentalities is found
`
`to be infringing, it should be relatively simple to determine what products and bundles the
`
`instrumentality was included in and to calculate damages from there. This approach is consistent
`
`with the purpose of Patent Local Rules to make the litigation process more efficient and discovery
`
`more streamlined. Maxim Integrated Prods., 2010 WL 1135762, at *2; Advanced Micro Devices,
`
`Inc., 2010 WL 363341, at *1.
`
`B.
`
`Pinpoint Source Code Citations
`
`Pursuant to my Narrowing Order, Finjan is required to serve its Infringement Contentions
`
`with pinpoint source code citations. Narrowing Order at 2. Check Point complains that Finjan’s
`
`source code citations are inadequate and violate my Narrowing Order and the Patent Local
`
`Rules. Mot. at 16-18, 19-23. In particular, Check Point contends that Finjan fails to provide
`
`source code citations for 25 out of 42 accused instrumentalities, cites to sets of source code
`7
`
`Northern District of California
`United States District Court
`
`

`

`Case 3:18-cv-02621-WHO Document 84 Filed 02/27/19 Page 8 of 18
`
`
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`organized under vague functional headers that could point to multiple instrumentalities, provides
`
`no information or explanation as to how the code relates to specific limitation language, and cites
`
`the same sets of source code repeatedly across different asserted claims and patents. Id. Because
`
`of these deficiencies, Check Point argues, it is impossible to tell what Finjan’s infringement theory
`
`is or which citations Finjan intends to rely on for each limitation. Id. at 19-20.
`
`
`
`In opposition, Finjan contends that its infringement contentions are sufficient to disclose its
`
`infringement theories because it provides an overall infringement analysis that includes both
`
`source code citations and public information, such as marketing literature and website screenshots
`
`that explain how Check Point’s products work. Oppo. at 16-23. Finjan states that the structure
`
`and organization of Check Point’s source code appears to limit Finjan’s ability to map source code
`
`packages to specific instrumentalities. Id. It argues that it has provided the required source code,
`
`that Check Point’s argument has no basis, and that it is not required to provide source code
`
`citations for every single feature of every claim element. Id. Finally, Finjan explains that the
`
`same source code is cited across multiple charts because of similarities in the claim language,
`
`accused technologies and underlying source code. Id.
`
`
`
`Patent Local Rule 3-1(c) requires plaintiff to provide a chart “identifying specifically
`
`where and how each limitation of each asserted claim is found within each Accused
`
`Instrumentality[.]” The purpose of Rule 3-1 is “to require a plaintiff to crystalize its theory of the
`
`case and patent claims.” InterTrust Tech. Corp. v. Microsoft Corp., 2003 WL 23120174, at *8
`
`(C.D. Cal. Dec. 1, 2003). “At the Patent Local Rule 3-1 Disclosure stage, a plaintiff must put
`
`forth information so specific that either reverse engineering or its equivalent is required.” Id. at
`
`*3. This burden cannot be met simply by parroting claim language or through reference
`
`screenshots or website content. See Digital Reg of Texas, LLC v. Adobe Systems Inc., No. CV 12-
`
`01971-CW (KAW), 2013 WL 3361241, *4 (N.D. Cal. Jul. 3, 2013) (infringement contentions that
`
`“parrot” claim language and “incorporate [] screen slots in lieu of explanatory text” are improper
`
`because they leave defendants “to guess what particular system (or aspect of a particular system)
`
`[the patentee] is accusing of meeting each limitation.”). Where the accused instrumentality
`
`includes computer software based upon source code made available to the patentee, the patentee
`8
`
`Northern District of California
`United States District Court
`
`

`

`Case 3:18-cv-02621-WHO Document 84 Filed 02/27/19 Page 9 of 18
`
`
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`must provide "pinpoint citations" to the code identifying the location of each limitation. See Big
`
`Baboon Corp. v. Dell, Inc., 723 F.Supp.2d 1224, 1228 (C.D. Cal. 2010).
`
`
`
`Finjan’s pinpoint source code citations, even viewed along with the public information
`
`cited, do not meet the required level of specificity, particularly to “where and how each limitation
`
`of each asserted claim is found within each Accused Instrumentality” as required by the Patent
`
`Local Rules. Check Point correctly notes that under each claim limitation, Finjan cites multiple
`
`sets of source code, often with little or no explanation for which set of citations relate to the
`
`relevant claim limitation. For example, in Finjan’s claim chart for the U.S. 7,418,731 Patent
`
`(“’731 patent”) against the “Network Security Products”, Finjan cites to anywhere between 12-38
`
`sets of source code for each claim limitation. Zegman Decl. at ¶ 28; Roberts Decl. Ex. G. Each
`
`set has only a vague functional header, such as “[t]hese files implement a Database schema
`
`manager.” Roberts Decl. Ex. G, at 198-211. Most (if not all) of the set headers are not tethered to
`
`the actual language used in the claim limitation and do not explain how any particular set of
`
`source code practices the asserted claim limitation. Kinglite Holdings Inc. v. Micro-Star Int'l Co.,
`
`No. 14-cv-03009, 2016 WL 6762573, at *3 (C.D. Cal. June 15, 2016) (requiring citation to source
`
`code that practices claim element).
`
`Contrary to Finjan’s assertions, the public information does not help map Finjan’s source
`
`code citations to a claim limitation nor assist the reader in understanding Finjan’s infringement
`
`theories. The public information is largely comprised of generic marketing materials and
`
`screenshots of the type routinely rejected by courts in this district. Proofpoint, 2015 WL 1517920,
`
`at *6 (finding generic marketing literature and screenshots with no explanation do not meet the
`
`level of specificity required by the Patent Local Rules). Further, Finjan simply parrots claim
`
`language without identifying any particular supporting language in its sources or linking the cited
`
`sources to particular source code. For example, Finjan cites twenty pages of screenshots and
`
`asserts that virtually every product in each screenshot meets the claim limitation. Roberts Decl.
`
`Ex. G. at 179-198. This does not rise to the specificity required by the Patent Local Rules. See
`
`Pat. L.R. 3-1(c) (requiring the patentee to identify “the structure(s), act(s), or material(s) in the
`
`Accused Instrumentality that performs the claimed function); see also Digital Reg of Texas, 2013
`9
`
`Northern District of California
`United States District Court
`
`

`

`Case 3:18-cv-02621-WHO Document 84 Filed 02/27/19 Page 10 of 18
`
`
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`WL 3361241 at *4. If the cited materials contain information necessary to understand Finjan’s
`
`infringement theories, Finjan must identify the particular supporting language in those sources and
`
`explain how that language fits into Finjan’s theory of infringement. Proofpoint, 2015 WL
`
`1517920 at *6.
`
`The Claim Chart for limitation 1b of the ‘731 Patent on Check Point’s “Network Security
`
`Products” is illustrative. It discloses:
`
`[A] scanner for scanning incoming files from the Internet and deriving
`security profiles for the incoming files, wherein each of the security
`profiles comprises a list of computer commands that a corresponding
`one of the incoming files is programmed to perform.
`Roberts Decl. Ex. G at 28.
`
`To satisfy my Narrowing Order and Patent Local Rule 3-1(c), Finjan was required to
`
`identify what structure, act, or material in the “Network Security Products” infringes each claim
`
`limitation and to provide pinpoint source code citations that practice the claim limitation. Finjan
`
`states that Claim 1b requires multiple components to practice its scanning function, such as
`
`“obtaining files,” “analyzing files,” and “generating reports or security profiles.” Oppo. at 21-22.
`
`Assuming this is true, Finjan would be required to identify what source code is “obtaining files,”
`
`“analyzing files,” and “generating reports or security profiles” in the allegedly infringing Network
`
`Security Products, yet Finjan’s chart identifies none of these things. The words “obtaining files,”
`
`“analyzing files,” and “generating reports or security profiles” do not appear at all. Roberts Decl.
`
`Ex. G at 59-72. The marketing materials and screenshots Finjan cites only describe how the
`
`Network Security Products work in a general sense and virtually “parrot” the claim language,
`
`without tying it to any source code citations or specific information in those screenshots that
`match the specific claim components identified in Claim 1b1. Id. at 28-59.
`
`Finjan’s theory of infringement as to each specific component of Claim 1b may be hidden
`
`
`1 For example, Finjan’s public information recites: “The images below show that the Anti-Spam &
`Email Security software blade also checks for malwares which involves scanning incoming files
`from the Internet and deriving security profiles for the incoming files, wherein each of the security
`profiles comprises a list of computer commands.” Roberts Decl. Ex. G at 45. (internal quotation
`marks omitted).
`
`
`10
`
`Northern District of California
`United States District Court
`
`

`

`Case 3:18-cv-02621-WHO Document 84 Filed 02/27/19 Page 11 of 18
`
`
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`somewhere in those screenshots and sets of source code, but it is not readily apparent it its current
`
`state. It is Finjan’s obligation to identify the particular claim components in each claim, map
`
`those components onto the features of the allegedly infringing products, and pinpoint cite source
`
`code that practices that component. See Shared Memory Graphics, 821 F. Supp. 2d at 1025;
`Proofpoint, 2015 WL 1517920 at *7; Kinglite Holdings, 2016 WL 6762573, at *3.2
`
`
`
`Even more troublingly, many of the same sets of source code within the same product
`
`category are cited across different claims of different patents. Finjan explains that the same source
`
`code is cited across multiple charts because the accused technologies and the underlying source
`
`code are the same and the claim languages are similar. Oppo. at 16-23. This does not help.
`
`Finjan cites to the same sets of source code for different claims. It is not clear how source code to
`
`“implement a TE add file tool” meets both claim limitations as a “computer gateway for an
`
`intranet of computers” and “retrieving a requested file from the Internet.” Roberts Decl. Ex. G at
`
`1-27, 178-211. Moreover, if Finjan believes that the shared source code meets the claim
`
`limitation, it is obligated to say so explicitly in its infringement contentions. Neither Check Point
`
`nor I should be required to guess which part of the source code citations (either shared or not
`
`shared) allegedly infringe each claim element. See Digital Reg of Texas, 2013 WL 3361241 at *4.
`
`Finjan argues that Check Point failed to produce internal technical documents which
`
`limited its ability to map source code packages to specific instrumentality. Oppo. at 17-18. The
`
`argument is not well-taken. On October 29, 2018, two days before the deadline to serve its
`
`infringement contentions, Finjan requested production of documents it identified on Check Point’s
`
`source code computer. Roberts Decl. Ex. B. While it is not clear whether Finjan had access to
`
`those technical documents on the source code computer, Finjan did not move to compel or ask for
`
`additional time to prepare its infringement contentions. If the technical documents are critical for
`
`Finjan to provide adequate pinpoint source code citations, it should not have waited so long to
`
`request them. Finjan had raised the same argument in other cases in this district to excuse its
`
`failure to serve compliant infringement contentions. See Finjan Inc. v. Sophos, Inc., No. 14-cv-
`
`
`2 Finjan also attempts to bolster its contentions by citing to the claim chart for Claim 1b of Patent
`No. 6,154,844. That claim chart is deficient for the same reason.
`11
`
`Northern District of California
`United States District Court
`
`

`

`Case 3:18-cv-02621-WHO Document 84 Filed 02/27/19 Page 12 of 18
`
`
`
`01197-WHO, 2015 WL 5012679, at *2 (N.D. Cal. Aug. 24, 2015); Proofpoint, 2015 WL 1517920
`
`at *5. This raises doubts as to whether the requested technical documents would allow Finjan to
`
`provide adequate source code citations. To the extent that this is in actuality a discovery dispute,
`
`Finjan should have followed the procedures outlined in my Standing Order for Civil Cases.
`
`Next, Finjan contends that it has complied with Patent Local Rules because it made a good
`
`faith effort to provide the most relevant citations possible given the information that was available
`
`to it and it is not required to provide source code citations of every single feature for every claim
`
`element. Oppo. at 19-20. To support its position, Finjan cites to Adobe Systems Incorporated v.
`
`Wowza Media Systems, No. 11-cv-02243-JST, 2014 WL 709865, at *16 (N.D. Cal. Feb. 23,
`
`2014). Adobe is clearly distinguishable as in that case the court held that the plaintiff was not
`
`required to “list every bit of WMS source code that supports it” because the plaintiff had already
`
`adequately disclosed its infringement theory. Id. Here, Finjan has not yet adequately disclosed its
`
`infringement theories. I agree with Check Point that the way Finjan frames its source code
`
`citations creates incalculable alternatives of infringement theories and it is next to impossible to
`
`know what its infringement theories are. See Order Granting Motion to Enforce Order on Motion
`
`to Compel; Vacating Order to Show Cause; and Granting Motion to Enlarge Deadlines at 4,
`
`Finjan Inc. v. Zscaler, Inc., No.17-cv-06946-JST (N.D. Cal. Jan. 28, 2019) (ECF. No. 110)
`
`(finding Finjan failed to crystallize its theories when its infringement contentions set forth an
`
`incalculable combination of infringement theories).
`
`Finjan must provide pinpoint source code citations that show the “where and how each
`
`limitation of each asserted claim is found within each Accused Instrume

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket