`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`UNITED STATES DISTRICT COURT
`
`NORTHERN DISTRICT OF CALIFORNIA
`
`FINJAN, INC.,
`Plaintiff,
`
`v.
`
`CHECK POINT SOFTWARE
`TECHNOLOGIES, INC., et al.,
`Defendants.
`
`Case No. 18-cv-02621-WHO
`
`
`ORDER GRANTING MOTION TO
`STRIKE INFRINGEMENT
`CONTENTIONS IN PART; GRANTING
`MOTION TO STRIKE ATTORNEY
`DECLARATION; GRANTING
`MOTION TO AMEND INVALIDITY
`CONTENTIONS; GRANTING
`MOTIONS TO SEAL
`Re: Dkt. Nos. 125, 126, 129, 130, 131, 137,
`
`138, 139, 141, 163, 166, 172, 177, 178
`
`
`
`Defendants Check Point Software Technologies, Inc. and Check Point Software
`
`Technologies Ltd. (collectively “Check Point”) move to strike Plaintiff Finjan, Inc.’s (“Finjan”)
`
`infringement contentions for the second time. I previously granted Check Point’s motion to strike
`
`Finjan’s infringement contentions in part and gave Finjan leave to amend its contentions to
`
`comply with my Order Re Case Narrowing and Infringement Contentions (the “Narrowing
`
`Order”) [Dkt. No. 29] and the Patent Local Rules. Order Granting Motion to Strike in Part;
`
`Granting Motions to Seal; Granting Motion to Amend Claim Construction Schedule (the “IC
`
`Order”) [Dkt No. 84]. Although Finjan’s amended infringement contentions (“AICs”) are more
`
`complete, I agree with Check Point that they are still deficient and violate the IC Order, Narrowing
`
`Order, and the Patent Local Rules. I will grant Check Point’s motion to strike the AICs.
`
`Check Point also filed two other motions that I will grant. First, I will strike the
`
`declaration of Finjan’s attorney, Linjun Xu, attached to Finjan’s opposition to the previous motion
`
`to strike, because much of it was made without personal knowledge. Second, I will allow Check
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`Northern District of California
`United States District Court
`
`
`
`Case 3:18-cv-02621-WHO Document 192 Filed 08/12/19 Page 2 of 19
`
`
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`Point to amend its invalidity contentions because its motion was unopposed.
`
`BACKGROUND
`
`
`
`In September 2018, I received briefing from the parties on how to manage this litigation in
`
`compliance with Federal Rule of Civil Procedure 1’s mandate of a “just, speedy, and inexpensive
`
`determination of this action[.]” Narrowing Order. I then ordered Finjan to serve its infringement
`
`contentions under specifications that largely follow the provisions of this District’s Patent Local
`
`Rules as well as the guidance provided in the since withdrawn 2013 Model Order from the Federal
`
`Circuit. Narrowing Order. Finjan was instructed to “include pinpoint source code citations . . .
`
`accompanied by the document production required by Patent Local Rule 3-2” and to also:
`
`(i) avoid open-ended citations to “exemplary” products and use of the
`terms “such as” and “for example”; (ii) set forth any infringement
`theories based on the doctrine of equivalents with limitation-by-
`limitation analyses; and (iii) for any indirect theories of infringement,
`identify the alleged direct infringement, the alleged acts of
`inducement or contribution to that infringement, and the relationship
`between them.
`
`Id. at 2.
`
`On November 2, 2018, Finjan served its infringement contentions on Check Point, which
`
`then moved to strike the infringement contentions, arguing that they violated my Narrowing Order
`
`and the Patent Local Rules. Check Point’s Motion to Enforce Court Order and Strike
`
`Infringement Contentions at 1-3, 15-24 [Dkt. No. 55]. I largely agreed that Finjan’s infringement
`
`contentions failed to comply in the IC Order, and made several rulings that I summarize below.
`
`First, I required Finjan to organize its infringement contentions by the underlying
`
`instrumentalities rather than into five groups of products, because that would assist both the parties
`
`and me in determining precisely how Check Point’s products do or do not infringe Finjan’s patents
`
`and to aid Finjan’s efforts to provide specific source code citations. Id. at 7. Finjan was ordered
`
`to specify any combinations of the underlying instrumentalities that it believed were infringing.
`
`Id. Although it might be true that Check Point sells its products to consumers in bundles, I
`
`reasoned that separating out infringement contentions by the underlying instrumentalities would
`
`be consistent with the purpose of Patent Local Rules because it would make the litigation process
`
`more efficient and discovery more streamlined. Id.
`2
`
`Northern District of California
`United States District Court
`
`
`
`Case 3:18-cv-02621-WHO Document 192 Filed 08/12/19 Page 3 of 19
`
`
`
`Second, I ordered Finjan to provide pinpoint source code citations that show “where and
`
`how each limitation of each asserted claim is found within each Accused Instrumentality” as
`
`required by the Patent Local Rules. Id. at 12. In doing so, I rejected Finjan’s arguments that its
`
`infringement contentions were sufficient to disclose its infringement theories because they
`
`provided an overall infringement analysis that included both source code citations and public
`
`information. Id. at 7-12. I noted that many of the same sets of source code within the same
`
`product category were cited across different claims of different patents. Id.
`
`Third, I held that Finjan’s infringement contentions impermissibly contained open-ended
`
`citations to exemplary products in violation of the Narrowing Order. Id. at 13-14. I found that
`
`Finjan’s citation to numerous releases of Check Point’s products were ambiguous and that it was
`
`unclear which releases applied to which products in the voluminous list cited by Finjan. Id. I then
`
`denied Check Point’s motion to strike and ordered Finjan to serve amended infringement
`
`contentions that were in accordance with my IC Order, Narrowing Order, and Patent Local Rules.
`
`Id. at 15.
`
`Finjan has now served its amended infringement contentions (“AICs”) and Check Point
`
`argues that they are deficient in largely the same ways as before. Defendant Check Point Software
`
`Technologies, Inc. and Check Point Software Technologies, LTD.’s Motion to Strike Amended
`
`Infringement Contentions (“AIC MTS”) [Dkt. No. 125-4].
`
`LEGAL STANDARD
`
`Patent Local Rule 3-1 requires:
`
`
`[A] party claiming patent infringement shall serve on all parties a ‘Disclosure of
`Asserted Claims and Infringement Contentions[]’ . . . [which] shall contain the
`following information:
`
`(a) Each claim of each patent in suit that is allegedly infringed by each opposing
`party, including for each claim the applicable statutory subsections of 35 U.S.C. §
`271 asserted;
`
`(b) Separately for each asserted claim, each accused apparatus, product, device,
`process, method, act, or other instrumentality (“Accused Instrumentality”) of each
`opposing party of which the party is aware. This identification shall be as specific
`as possible. Each product, device, and apparatus shall be identified by name or
`model number, if known. Each method or process shall be identified by name, if
`3
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`Northern District of California
`United States District Court
`
`
`
`Case 3:18-cv-02621-WHO Document 192 Filed 08/12/19 Page 4 of 19
`
`
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`known, or by any product, device, or apparatus which, when used, allegedly results
`in the practice of the claimed method or process;
`
`(c) A chart identifying specifically where each limitation of each asserted claim is
`found within each Accused Instrumentality, including for each limitation that such
`party contends is governed by 35 U.S.C. § 112(6), the identity of the structure(s),
`act(s), or material(s) in the Accused Instrumentality that performs the claimed
`function.
`
`(d) For each claim which is alleged to have been indirectly infringed, an
`identification of any direct infringement and a description of the acts of the alleged
`indirect infringer that contribute to or are inducing that direct infringement. Insofar
`as alleged direct infringement is based on joint acts of multiple parties, the role of
`each such party in the direct infringement must be described.
`
`(e) Whether each limitation of each asserted claim is alleged to be literally present
`or present under the doctrine of equivalents in the Accused Instrumentality.
`“The overriding principle of the Patent Local Rules is that they are designed [to] make the parties
`
`more efficient, to streamline the litigation process, and to articulate with specificity the claims and
`
`theory of a plaintiff’s infringement claims.” Bender v. Maxim Integrated Prods., No. 09-cv-
`
`01152-SI, 2010 WL 1135762, at *2 (N.D. Cal. Mar. 22, 2010) (alteration in original) (internal
`
`citation omitted). Patent Local Rule 3-1 is intended to require the plaintiff “to crystallize its
`
`theories of the case early in the litigation and to adhere to those theories once disclosed.” Bender
`
`v. Advanced Micro Devices, Inc., No. 09-cv-1149-EMC, 2010 WL 363341, at *1 (N.D. Cal. Feb.
`
`1, 2010). It “takes the place of a series of interrogatories that defendants would likely have
`
`propounded had the patent local rules not provided for streamlined discovery.” Network Caching
`
`Tech., LLC v. Novell, Inc., No. 01-cv-2079-VRW, 2002 WL 32126128, at *4 (N.D. Cal. Aug. 13,
`
`2002).
`
`
`
`“[A]ll courts agree that the degree of specificity under Local Rule 3-1 must be sufficient to
`
`provide reasonable notice to the defendant why the plaintiff believes it has a ‘reasonable chance of
`
`proving infringement.’” Shared Memory Graphics LLC v. Apple, Inc., 812 F. Supp. 2d 1022,
`
`1025 (N.D. Cal. 2010) (quoting View Eng’g, Inc. v. Robotic Vision Sys., Inc., 208 F.3d 981, 986
`
`(Fed. Cir. 2000)). The local rules do not “require the disclosure of specific evidence nor do they
`
`require a plaintiff to prove its infringement case . . . a patentee must nevertheless disclose what in
`
`each accused instrumentality it contends practices each and every limitation of each asserted claim
`
`4
`
`Northern District of California
`United States District Court
`
`
`
`Case 3:18-cv-02621-WHO Document 192 Filed 08/12/19 Page 5 of 19
`
`
`
`to the extent appropriate information is reasonably available to it.” DCG Sys. v. Checkpoint
`
`Techs., LLC, No. 11-cv-03792-PSG, 2012 WL 1309161, at *2 (N.D. Cal. Apr. 16, 2012).
`
`I.
`
`MOTION TO STRIKE INFRINGEMENT CONTENTIONS
`
`DISCUSSION
`
`A.
`
`Grouping
`
`Check Point claims that Finjan has violated the directives contained in the IC Order by
`
`renaming its “groups” of products as the instrumentalities themselves and then referring to the
`
`actual products in the groups as “features.” AIC MTS at 15-18. Check Point states that within
`
`each group, Finjan’s infringements charts remain directed to a handful of individual products and
`
`services but provide no infringement theories for most of the groups. Id. at 16.
`
`Check Point identifies Finjan’s charts as purporting to describe infringement theories on
`
`the following actual products:
`
`• Network Security Products: IPS, Anti-Bot, Anti-Virus, Threat Emulation, Threat
`
`Extraction.
`
`• Endpoint Security: Threat Emulation, Threat Extraction, AntiPhishing (zero
`
`phishing), Anti-Ransomware, Anti-Bot, Forensics, Anti-Exploit, Anti-Virus, Anti-
`
`Malware, SmartEvent.
`
`• ZoneAlarm: Advanced Firewall, OSFirewall, Threat Emulation, Browser
`
`Protection.
`
`• ThreatCloud: Threat Emulation.
`
`• CloudGuard: CloudGuard SaaS.
`
`• Sandblast Mobile.
`
`Id. at 16-17. It asks that I strike the remaining contentions from the AICs. Id.
`
`1.
`
`Blade Architecture
`
`As an example, Check Point considers Finjan’s accusation of its “Blade Architecture” as
`
`infringing the ‘968 Patent. Id. at 17. According to Check Point, Finjan’s definition of its Blade
`
`Architecture is overbroad and encompasses 24 different products that Finjan refers to as features,
`
`as well as numerous marketing terms and other vague and unidentified functionalities. Id. But its
`5
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`Northern District of California
`United States District Court
`
`
`
`Case 3:18-cv-02621-WHO Document 192 Filed 08/12/19 Page 6 of 19
`
`
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`actual claim chart for this contention is only directed to three products: Anti-Virus, Sandblast
`
`Threat Emulation, and Sandblast Threat Extraction. Id.; Appendix 1 – Source Code Citations
`
`(“Citation Chart”) attached to AIC MTS [Dkt. No. 26-1]. Check Point argues that where Finjan
`
`has listed multiple instrumentalities that might infringe in combination, it must state how they do
`
`so and not force it, or the court, to guess. [Corrected] Reply in Support of Defendants Check Point
`
`Software Technologies, Inc. and Check Point Software Technologies, Ltd.’s Motion to Strike
`
`Amended Infringement Contentions (“AIC MTS Reply”) at 7-8 [Dkt. No. 141-4].
`
`In opposition, Finjan makes two arguments. First, it contends that the Blade Architecture
`
`Software is properly a single accused instrumentality because it is represented to customers that
`
`way. Plaintiff Finjan, Inc.’s Opposition to Defendant Check Point Software Technologies, Inc.
`
`and Check Point Software Technologies, Ltd’s Motion to Strike Amended Infringement
`
`Contentions (“AIC MTS Oppo.”) at 9-10 [Dkt. No. 131-4]. Finjan argues that the Blade
`
`Architecture Software constitutes a single product with various functionalities that satisfy various
`
`claim elements under a unified interface that allows them to be turned on and off individually. Id.
`
`Finjan asserts that if a particular blade functionality is not identified in the charts, then it is not
`
`accusing that functionality of infringement and that it is only accusing approximately half of the
`
`blade functionalities of satisfying a claim element. Id. at 11.
`
`Second, Finjan argues that it organized its analysis into separate contentions for each blade
`
`functionality. Id. at 13-15. Pointing to its chart for the ‘494 Patent, Finjan states that it has
`
`identified different blade functionalities as meeting separate elements. Id. at 13. According to
`
`Finjan, it has specifically set forth the blades or other technologies that were used to meet each
`
`element as separate contentions and has specified the combinations of different blades used to
`
`infringe each patent. Id. at 14; US Patent No. 8,677,494 Malicious Mobile Code Runtime
`
`Monitoring System and Methods Chart (the “Blade Architecture ‘494 Patent Chart”) attached as
`
`Ex E. to Cardis Decl. [Dkt. No. 125-11]. Thus, Finjan argues, the combinations created by these
`
`blades may lead to multiple different theories of infringement but are still limited by the different
`
`permutations of listed contentions. AIC MTS Oppo. at 14-15.
`
`In the IC Order, I already rejected Finjan’s first argument. Further, Finjan has failed to
`6
`
`Northern District of California
`United States District Court
`
`
`
`Case 3:18-cv-02621-WHO Document 192 Filed 08/12/19 Page 7 of 19
`
`
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`follow the IC order with respect to its blade architecture chart. In my IC Order, I noted that Finjan
`
`had accused 42 discrete blades and ordered Finjan to organize its infringement contentions by the
`
`underlying instrumentalities that it was accusing. IC Order at 2, 7. To the extent that the number
`
`of accused blades appears to keep changing, a chart for each blade will crystalize precisely which
`blades Finjan is accusing. 1 Turning to Finjan’s second argument, where Finjan accuses the blades
`
`of infringing in combination, the IC Order required it to specify the combination. Id. at 7. If I
`
`ignore the “blade architecture” label on Finjan’s Blade Architecture ‘494 Patent Chart and instead
`
`interpret it as a combination chart containing different specific blades, Finjan has significantly
`
`improved the chart from its first attempt. But, as Check Point argues, it is not enough to simply
`
`list a number of blades that could, in combination, infringe upon the ‘494 Patent. Finjan must
`
`describe how such a combination would infringe. Does Finjan contend that the Anti-Virus blade’s
`
`receiver function under limitation 10b combines with the downloadable scanner function of the
`
`Anti-Bot blade under limitation 10c? The chart does not say. Besides stating that the Threat
`
`Emulation blade’s scanner combines with the receivers in the other blades, Finjan’s chart does not
`
`adequately describe other combinations. ‘494 Patent Chart at 21. If every contention for every
`
`claim can be combined with every contention for every other claim in its chart, Finjan must state
`
`that. I strike these charts with leave to amend.
`
`2.
`
`Check Point’s Other Arguments
`
`
`
`Check Point identifies two other examples where it contends that Finjan’s charts are
`
`improper. First, Check Point states that Finjan’s ‘844 Patent chart for “Check Point Endpoint
`
`Security” only discusses Endpoint Threat Emulation. AIC MTS at 17; US Patent No. 6,154,844
`
`System and Method for Attaching a Downloadable Security Profile to a Downloadable (“the ’844
`
`Patent Chart”) attached as Ex. H to Declaration of Alyssa Cardis in Support of Defendant Check
`
`Point Software Technologies, Inc. and Check Point Software Technologies Ltd.’s Motion to Strike
`
`
`1 The parties dispute whether the blades share source code or a single interface, but that issue is
`irrelevant to the purpose of Finjan’s infringement contentions—requiring Finjan to crystallize its
`infringement theories early in the litigation so as to prevent the shifting sands approach to claim
`construction. See Atmel Corp. v. Info. Storage Devices, Inc., No. 95-cv-1987-FMS, 1998 WL
`775115, at *2 (N.D. Cal. 1998).
`
`7
`
`Northern District of California
`United States District Court
`
`
`
`Case 3:18-cv-02621-WHO Document 192 Filed 08/12/19 Page 8 of 19
`
`
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`Amended Infringement Contentions (“Cardis Decl.”) [Dkt. No. 125-12]. Yet Finjan still purports
`
`to accuse a wide variety of instrumentalities within “Check Point Endpoint Security” aside from
`
`Threat Emulation. AIC MTS at 17; Plaintiff Finjan, Inc’s Supplemental Disclosure of Asserted
`
`Claims and Infringement Contentions and Document Production Pursuant to Patent Local Rules 3-
`
`1 and 3-2 (“Finjan Supplemental Disclosure”) at 4-5, attached as Ex. A to Cardis Decl. [Dkt. No.
`
`125-7]. Since Threat Emulation is the only instrumentality charted, Check Point asks that I strike
`the rest of the instrumentalities.2 AIC MTS at 17.
`
`Second, Check Point asserts that Finjan improperly continues to accuse marketing terms
`
`and product categories. Id. at 18. Check Point states that “ThreatCloud” is a marketing term that
`
`refers to a number of products and services. Id.; Declaration of Tamir Zegman in Support of
`
`Defendant Check Point Software Technologies, Inc. and Check Point Software Technologies
`
`Ltd.’s Motion to Strike Amended Infringement Contentions (“Zegman Decl.”) at ¶ 8 [Dkt. No.
`
`125-6]. It argues that Finjan defines ThreatCloud in multiple inconsistent ways that include
`
`multiple products and services, but only makes allegations against Threat Emulation. Id. Check
`
`Point asks that I strike all other allegations under the ThreatCloud instrumentality. Id.
`
`I agree with Check Point on both counts. Indeed, Finjan’s opposition addresses neither
`
`argument. Finjan’s ’844 Patent Chart deals only with the Threat Emulation instrumentality; the
`
`other accused products identified by Finjan in the chart are struck. These include the Check Point
`
`Blade Architecture, Check Point Appliances, Check Point Endpoint Security, and Capsule Cloud.
`
`Finjan Supplemental Disclosure at 4-5. Similarly, because Finjan does not rebut Check Point’s
`
`statement that ThreatCloud is a marketing term and not a product itself, the allegations related to
`
`ThreatCloud are struck. If Finjan seeks to accuse the products that are sold under the ThreatCloud
`
`marketing term, it may amend to do so specifically.
`
`B.
`
`Source Code Citations
`
`Check Point next argues that the AICs lack source code citations for most accused
`
`
`2 Check Point also argues that the AICs related to Check Point Endpoint Security are deficient
`under Local Rule 3-1(b) because Finjan uses purely functional and open-ended terms. AIC MTS
`at 17-18.
`
`8
`
`Northern District of California
`United States District Court
`
`
`
`Case 3:18-cv-02621-WHO Document 192 Filed 08/12/19 Page 9 of 19
`
`
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`products and that the citations provided are inadequate and unexplained. AIC MTS at 19-22. It
`
`contends that this is doubly troubling based on the way Finjan has grouped its contentions because
`
`it does not cite code from actual products (i.e. the Firewall blade or the URL Filtering blade) and
`
`instead cites code to a single product within the group to accuse all the products in the group. Id.
`
`at 20. According to Check Point, Finjan has failed to provide any source code citations for 30 of
`
`the 52 accused instrumentalities. Id. Check Point also claims that where Finjan does provide
`
`source code citations, they are often untethered to the claim language and lack any sort of
`
`explanation. Id. at 21-22.
`
`Check Point cites to two examples. The first is to limitation 14f in the chart for US Patent
`
`No. 7,418,731 Method and System for Caching at Secure Gateways (“the Blade Architecture ‘731
`
`Patent Chart”) attached as Ex. J. to Cardis Decl. [Dkt. No. 125-14]. Limitation 14f concerns the
`
`use of a “security profile” and “profile cache,” but the cited source code refers to “security
`policies” and a “security policy cache.”3 AIC MTS at 21; ‘731 Patent Chart at 79-80. The second
`
`involves the Blade Architecture ‘494 Patent Chart. There, Check Point identifies an instance of
`
`Finjan citing the same three source code files for all claim elements across all asserted patents.
`
`AIC MTS at 22; Blade Architecture ‘494 Patent Chart at 14, 35, 51.
`
`Finjan counters that its source code citations are adequate and that it only used the same
`
`source code citations when the claim elements are similar and the specific technology is alleged to
`
`infringe the claim element the same way. AIC MTS Oppo. at 16. It also argues that the source
`
`code cited by Check Point on the Blade Architecture ‘494 Patent Chart is not actually the same
`
`(despite the fact that it is). Id. at 16 n.11. Next, Finjan argues that the examples Check Point cites
`
`are fabricated because Finjan only identified the emulation and extraction blades as infringing this
`
`claim and therefore it is irrelevant that the anti-virus and anti-bot blades’ functionality is not
`mentioned.4 Id. at 17.
`
`
`3 Finjan concedes that this source code citation is incorrect and characterizes it a “single anomaly”
`that it could have fixed before Check Point filed its motion, had Finjan been notified. AIC MTS
`Oppo. at 17.
`4 Check Point counters that Finjan’s argument related to the emulation and extraction blades
`should fail because Finjan’s ’154 “Blade Architecture” chart accuses different sets of blades of
`infringing the asserted limitations. For limitation 6b, Finjan incorporates its contentions for
`9
`
`Northern District of California
`United States District Court
`
`
`
`Case 3:18-cv-02621-WHO Document 192 Filed 08/12/19 Page 10 of 19
`
`
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`In reply, Check Point argues that the AICs still lack source code citations for most accused
`
`products and that the citations identified in the opposition are still deficient. AIC MTS Reply at 8-
`
`11. For example, Check Point identifies Finjan’s contention for “Endpoint client with Zero-
`
`Phishing” against ’154 Patent limitation 1b and argues that it just parrots claim language without
`
`providing relevant code to the limitation. Id. Rather, Finjan incorporates “the source code on
`
`emulation . . . and endpoint agent,” without explaining what the code does, and why it is being
`
`incorporated, or even what “emulation” and “endpoint agent” are, or how they work with
`
`“Endpoint client with Zero-Phishing.” Id. Then, Finjan cites one source code file, “the
`
`application programming interface for cloud to accept an incoming file,” without explanation as to
`
`how, either alone or in conjunction with some unidentified other source code, this file does what
`
`Finjan says. Id. Check Point argues that this does not disclose how Finjan believes that “Endpoint
`
`client with Zero-Phishing” meets limitation 1b of the ’154 patent. Id. Check Point also attached a
`
`table with extracted code citations and Finjan’s explanations. Id.; Reply Appendix attached to
`
`AIC MTS Reply [Dkt. No. 139-5].
`
`Check Point next contends that Finjan recycles code for both similar and different
`
`limitations, which is problematic. AIC MTS Reply at 9-10. According to Check Point, the same
`
`source code is cited for four limitations across three patents with four different descriptions (the
`
`’494 limitation 10b, ’731 limitation 1d, ’731 limitation 1e, and ’731 limitation 1e). Id. Check
`
`Point also notes that Finjan’s opposition does not address Check Point’s argument that that no
`
`source code has been cited for 30 of the 52 accused instrumentalities. Check Point asks that I
`
`
`limitation 1b, where it provided “contentions” for Threat Emulation, Anti-Virus, and “Anti-Virus
`and Anti-Bot.” Id.; US Patent No. 8,141,154 System and Method for Inspecting Dynamically
`Generated Executable Code (the “Blade Architecture ‘154 Patent Chart”) attached as Ex. 21 to
`Declaration of Kristopher Kastens in Support of Plaintiff Finjan, Inc.’s Opposition to Defendant
`Check Point Software Technologies, Inc. and Check Point Software Technologies Ltd.’s Motion
`to Strike Amended Infringement Contentions (“Kastens Decl.”). [Dkt. No. 131-40]. Check Point
`states that Finjan confusingly incorporates some limitations while referencing Threat Emulation
`and Threat Extraction, resulting in no blade being charted across all limitations. AIC MTS Reply
`at 10-11. Threat Emulation is at least partially charted for limitations 6b and 6d, but not 6c. Id.
`Threat Extraction is mentioned briefly for limitation 6d. Anti-Virus and “AntiVirus and Anti-Bot”
`are charted only for limitation 6b, but not 6c or 6d. Id. As discussed in the section on Blade
`Architecture, if it is presenting a combination claim chart, Finjan must explain how the different
`blades work together to infringe its patent.
`
`10
`
`Northern District of California
`United States District Court
`
`
`
`Case 3:18-cv-02621-WHO Document 192 Filed 08/12/19 Page 11 of 19
`
`
`
`strike all instrumentalities with no source code citations with prejudice, and only allow the
`
`contentions listed in Check Point’s Appendix 2 to continue. Id.
`
`
`
`Finjan has already been directed to provide pinpoint source code citations for each
`
`limitation. To the extent that any or all of the 30 of the accused instrumentalities lack pinpoint
`
`citations, they are struck with prejudice. Where Finjan has used the same source code for different
`
`things, it may amend its infringement contentions to better explain why the same source code is
`
`applies to wholly different limitations.
`
`C.
`
`Doctrine of Equivalents
`
`Check Point next argues that Finjan’s doctrine of equivalents (“DOE”) contentions also
`
`fall short. AIC MTS at 22-23. “The doctrine of equivalents holds that even if an accused product
`
`does not literally infringe the asserted claims of a patent, the product may infringe if the
`
`differences between the element of the accused product at issue and the claim limitation at issue
`
`are insubstantial.” UCP Int’l Co. Ltd. v. Balsam Brands Inc., No. 16-cv-07255-WHO, 2017 WL
`
`5068568, at *2 (N.D. Cal. Nov. 3, 2017) (internal citation omitted). This requires “a limitation-
`
`by-limitation analysis, not a boilerplate reservation.” Cap Co. v. McAfee, Inc., No. 14-cv-05068-
`
`JD, 2015 WL 4734951, at *4 (N.D. Cal. Aug. 10, 2015) (internal citation omitted).
`
`Check Point asserts that Finjan’s DOE analysis is insufficient because it simply parrots the
`
`claim language and the “same function, way, and result” language from the doctrine’s legal
`
`standard. AIC MTS at 22-23. Check Point identifies contention 5 of limitation 10c titled “Anti-
`
`Bot Technology has a Receiver – DOE” in the Blade Architecture ‘494 Patent Chart, which states
`
`that:
`
`
`Check Point Blade Architecture performs the same function as this
`element because it receives network traffic that is correlated to
`downloaded web content.
`
`Check Point Blade Architecture performs the same function the same
`way as this element because it receives the network traffic so that it
`can be used for malware detection.
`
`Check Point Blade Architecture achieves the same result as this
`element because content that is sent across the network is analyzed
`for malware.
`Blade Architecture ‘494 Patent Chart at 18.
`
`11
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`Northern District of California
`United States District Court
`
`
`
`Case 3:18-cv-02621-WHO Document 192 Filed 08/12/19 Page 12 of 19
`
`
`
`
`
`Finjan counters that its DOE analysis is sufficient because it provides tailored explanations
`
`for how each element is met under the required function-way-result test, and never parrots the
`
`claim language or uses boilerplate analysis. AIC MTS Oppo. at 18-21. As to the example above,
`
`Finjan claims that it explains how this element performs the same function, the same way and gets
`
`the same result through receiving network traffic for malware detection that is correlated to a
`
`downloadable. Id. at 20. Finjan argues that this is sufficient explanation to put Check Point on
`
`notice of Finjan’s DOE claims. Finjan next cites its DOE analysis for US Patent No. 8,141,154
`
`System and Method for Inspecting Dynamically Generated Executable Code at 22, attached as Ex.
`
`22 to Kastens Decl. [Dkt. No. 131-42]. There Finjan provides a more fulsome explanation why
`
`“Mobile Products” is equivalent to “SandBlast Mobile.” Id.
`
`
`
`As to both of these examples, I am satisfied that the DOE analysis provides sufficient
`
`notice to Check Point about why Finjan contends that these products are equivalent. It is also
`
`notable that Finjan used a similar DOE analysis in its original charts and Check Point did not find
`
`it deficient before. Check Point’s motion to strike on these grounds is denied.
`
`D.
`
`New Instrumentalities
`
`Check Point argues that Finjan has failed to show the requisite good cause to accuse new
`
`products in its amended AICs. AIC MTS at 23-24. Check Point notes that in my previous order, I
`
`allowed Finjan to add 16 previously-unidentified products if they were charted in conformity with
`
`the rest of the order. Id.; IC Order at 14. Check Point now claims that Finjan has added dozens
`
`more products, services, marketing terms, and other undefined functionalities and has not sought
`
`leave or shown good cause to do so. AIC MTS at 23-24.
`
`In opposition, Finjan contends that it has not accused any new products because most of
`
`what Check Point identifies as new products are not even “products” according to Check Point,
`
`and are instead “New Marketing Terms and Undefined Functionalities Referenced in the Claim
`
`Charts.” AIC MTS Oppo. at 21-22. Finjan also asserts th