throbber
Case 3:18-cv-02621-WHO Document 264-12 Filed 03/27/20 Page 1 of 23
`
`
`
`Exhibit K
`
`
`
`
`

`

`Case 3:18-cv-02621-WHO Document 264-12 Filed 03/27/20 Page 2 of 23
`
` Pages 1 - 22
`
`UNITED STATES DISTRICT COURT
`
`NORTHERN DISTRICT OF CALIFORNIA
`
`Before The Honorable William H. Orrick, Judge
`
`)
`FINJAN, INC.,
` )
` Plaintiff, )
` )
` VS. ) NO. C 18-02621-WHO
` )
`CHECK POINT SOFTWARE
`)
`TECHNOLOGIES, INC. and CHECK )
`POINT SOFTWARE TECHNOLOGIES, )
`LTD.,
`)
` )
` Defendants. )
` )
`
` San Francisco, California
` Wednesday, July 10, 2019
`
`
`TRANSCRIPT OF PROCEEDINGS
`
`
`APPEARANCES:
`
`For Plaintiff:
` KRAMER, LEVIN, NAFTALIS & FRANKEL LLP
` 990 Marsh Road
` Menlo Park, California 94025
` BY: LISA KOBIALKA, ATTORNEY AT LAW
` KRISTOPHER KASTENS, ATTORNEY AT LAW
` LINJUN XU, ATTORNEY AT LAW
`
`For Defendants:
` ORRICK, HERRINGTON & SUTCLIFFE LLP
` 777 South Figueroa Street - Suite 3200
` Los Angeles, California 90017
` BY: ALYSSA M. CARIDIS, ATTORNEY AT LAW
` CLEMENT S. ROBERTS, ATTORNEY AT LAW
` EVAN D. BREWER, ATTORNEY AT LAW
`
`
`
`Reported By: Marla F. Knox, RPR, CRR
` Official Reporter
`
`
`

`

`Case 3:18-cv-02621-WHO Document 264-12 Filed 03/27/20 Page 3 of 23
`
` 2
`
` 1
`
` 2
`
` 3
`
` 4
`
` 5
`
` 6
`
` 7
`
` 8
`
` 9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`Wednesday - July 10, 2019
`
` 9:14 a.m.
`
`P R O C E E D I N G S
`
`---000---
`
`THE CLERK: Calling civil matter 18-2621, Finjan,
`
`Incorporated versus Checkpoint Software Technologies,
`
`Incorporated, et al.
`
`Counsel, please come forward and state your appearance.
`
`MS. KOBIALKA: Good morning, Your Honor, Lisa Kobialka
`
`on behalf of Finjan and I'm accompanied by Kris Kastens, my
`
`partner, and Ms. Xu.
`
`THE COURT: Good morning.
`
`MR. ROBERTS: Good morning, Your Honor, Clement
`
`Roberts on behalf of Checkpoint with Alyssa Caridis and Evan
`
`Brewer.
`
`THE COURT: All right. Good morning. Let me give you
`
`my thoughts on these motions.
`
`With respect to the motion to strike amended infringement
`
`contentions, I'm inclined to grant regarding the Blade
`
`Architecture which allegedly infringes the '968. I think
`
`the -- it is necessary -- I asked before, and I really would
`
`like to see a chart for each blade to clarify which blades
`
`Finjan is accusing to specify the combinations when they exist
`
`and how they infringe. So I'm going to give you the
`
`opportunity to amend one more time and just be -- just make
`
`this clear. This is the whole point of this exercise. So make
`
`

`

`Case 3:18-cv-02621-WHO Document 264-12 Filed 03/27/20 Page 4 of 23
`
` 3
`
` 1
`
` 2
`
` 3
`
` 4
`
` 5
`
` 6
`
` 7
`
` 8
`
` 9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`it clear.
`
`I'm inclined to grant regarding -- with respect to the
`
`'844, the instrumentalities other than the Endpoint Threat
`
`Emulation, which is the only one that is mentioned in the chart
`
`on that patent.
`
`I would also grant regarding ThreatCloud because it is a
`
`marketing term and not a product, and there is no argument on
`
`that in the opposition. So I'm inclined to do that with
`
`prejudice unless there is some reason not to do that.
`
`With respect to the source code, I'm inclined also to
`
`grant Check Point -- it's a -- source code is not easy for me
`
`to understand and -- but Check Point says in its brief that
`
`there was no code cited for 30 of the 52 accused
`
`instrumentalities, and there wasn't a response to that in the
`
`briefing that I saw. So if that's true, then I would grant
`
`that with prejudice and only allow the contentions that are
`
`listed in Check Point's Appendix 2 to continue.
`
`With respect to the motion regarding the doctrine of
`
`equivalence, I deny that. I think that's -- that is
`
`sufficiently asserted. And I would also point out that Check
`
`Point didn't object to the DOE the first time around.
`
`With respect to the new instrumentalities that were not --
`
`the alleged new instrumentalities that weren't initially
`
`charted, I would grant with respect to that, that products not
`
`in the initial contentions would be struck. And you would need
`
`

`

`Case 3:18-cv-02621-WHO Document 264-12 Filed 03/27/20 Page 5 of 23
`
` 4
`
` 1
`
` 2
`
` 3
`
` 4
`
` 5
`
` 6
`
` 7
`
` 8
`
` 9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`good cause in order to assert them again and not just throw
`
`them into the case. And that includes all the products that
`
`weren't mentioned and the so-called undefined functionalities
`
`and marketing terms in Appendix 3.
`
`With respect to the -- the motion to strike the Xu
`
`declaration, that would be granted because she obviously did
`
`not have personal knowledge sufficient to write that
`
`declaration. It is my assumption -- and I just want Ms. Xu to
`
`clarify this for me -- that she did not look at the source code
`
`outside of the repository. My assumption is what happened was
`
`that she got information from the expert and put that in as the
`
`large part of the basis of that declaration. That's
`
`inappropriate. I'm not going to make a bigger deal of it than
`
`that, but don't do that again. And -- but I just want to be
`
`sure that that's the case. Because if it's not, then we have a
`
`different issue.
`
`And then, finally, Checkpoint's motion to amend the
`
`invalidity contentions wasn't opposed, so that's granted.
`
`So who wants to take that on or do you just want to accept
`
`the tentative?
`
`MR. KASTENS: Your Honor, Kristopher Kastens for
`
`Finjan, Inc.
`
`I'm just going to address the blades issue and
`
`instrumentality that they keep raising. So I just want to
`
`clarify something, Finjan's infringement contentions are in
`
`

`

`Case 3:18-cv-02621-WHO Document 264-12 Filed 03/27/20 Page 6 of 23
`
` 5
`
` 1
`
` 2
`
` 3
`
` 4
`
` 5
`
` 6
`
` 7
`
` 8
`
` 9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`line exactly with what we understood your order to be and the
`
`Federal Circuit law. So Federal Circuit law says -- and
`
`that's -- I'm citing a case in our brief, the Vasudevan
`
`Software, Inc. -- that if you have a software package with
`
`different functionality included in it and something can be
`
`turned off and something can be turned on, doesn't matter so
`
`long as it is included within the actual functionality. That's
`
`why we originally grouped it as a single application. It is a
`
`single application in our view. You receive it. You can turn
`
`on and off functionality and use certain functionality.
`
`Now what we have done -- we are not accusing every single
`
`functionality within this software application. Within our
`
`charts what we have done is divided up -- we have gone through
`
`and for each element, we have divided it into separate
`
`contentions related to specific technologies. Sometimes these
`
`relate specifically to blades because sometimes they map
`
`cleanly to blades. There is a whole bunch of stuff within the
`
`functionality of the software package. They don't say it is
`
`attributable to any product. They just say it is other code in
`
`there. It is in this overall software application. They don't
`
`say it is attributable to any actual blade. That's what we
`
`submitted to you actually on Monday in supplemental briefing
`
`which was their mapping of the -- of these products, these
`
`blades, that they are calling them, which are actual
`
`functionalities to the actual source code. It just shows you
`
`

`

`Case 3:18-cv-02621-WHO Document 264-12 Filed 03/27/20 Page 7 of 23
`
` 6
`
` 1
`
` 2
`
` 3
`
` 4
`
` 5
`
` 6
`
` 7
`
` 8
`
` 9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`it took 700 pages to map that out. It just shows you they are
`
`parsing out one software application into multiple different
`
`functionalities.
`
`So mindful of your previous order to make this as clear as
`
`possible, we have gone through; and we have specifically
`
`identified functionality for each element. So what they say we
`
`didn't cite source code for 30 of the 52 instrumentalities,
`
`that is because they -- that's related to functionality in that
`
`software application that is not part of our infringement
`
`contentions. They are just calling those separate products
`
`even though they are included within the one software
`
`application.
`
`If you have one software application and you and it has
`
`three different functionalities, just because one of those
`
`functionality is not accused, doesn't mean that functionality
`
`is not within the product. I think that is the fundamental
`
`dispute. That's all we are saying is that what we would like
`
`to accuse is the actual application they distribute.
`
`We have identified within that application the specific
`
`functionality. I believe that was perfectly in line with what
`
`your order requested. We grouped all the technology together
`
`and did that. When they say 30 out of 52, that's what they are
`
`talking about.
`
`I also wanted to relate to this -- to the new products
`
`that they are saying. Again, what they are saying is -- we
`
`

`

`Case 3:18-cv-02621-WHO Document 264-12 Filed 03/27/20 Page 8 of 23
`
` 7
`
` 1
`
` 2
`
` 3
`
` 4
`
` 5
`
` 6
`
` 7
`
` 8
`
` 9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`just said we are accusing this software application. And they
`
`are saying, Oh, that software application has functionalities
`
`that you didn't previously name in your infringement
`
`contentions. We never denied that. Those functionalities were
`
`not the basis of our infringement. We are still accusing that
`
`software application. So that is really cutting to the quick
`
`of it.
`
`Regarding the undefined functionalities and terms, they
`
`admit those aren't products. We are just -- they asked for
`
`more specific information about how they infringe. So we went
`
`through -- and we found technical information -- describing how
`
`they actually infringe with these -- with using documents
`
`describing -- in their source code describing how their
`
`technology actually works, and they don't even deny that these
`
`aren't products.
`
`So, I mean, we are trying to do our best to give them the
`
`most complete infringement contentions as possible. Any time
`
`that we give them more details -- they ask for more details.
`
`We give them more details. And they say that is an undefined
`
`functionality. You can't bring that in. They don't even say
`
`their products.
`
`I think I would strenuously argue that should not be
`
`subject to anything within the motion to strike. First of all,
`
`they don't even deny that these aren't products even under
`
`their definition of products which we again strenuously object
`
`

`

`Case 3:18-cv-02621-WHO Document 264-12 Filed 03/27/20 Page 9 of 23
`
` 8
`
` 1
`
` 2
`
` 3
`
` 4
`
` 5
`
` 6
`
` 7
`
` 8
`
` 9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`to because all the support says it is a single software
`
`application. So that's how we addressed it within our
`
`contentions and then within there -- to make sure that we were
`
`perfectly clear -- we divided out the specific technologies,
`
`some which directly map to blades and others which don't.
`
`Regarding the ThreatCloud, I don't know -- my
`
`understanding is that we may have addressed it. I know we
`
`addressed it in previous briefing. I mean, I don't understand
`
`why they would say it is a marketing term. They have data
`
`sheets on it to say it is a product. We have looked at source
`
`code and cited source code for the product. How can you say it
`
`is a marketing term when we have cited source code for it? I
`
`don't think they deny we cited source code. What are we
`
`pointing to if it is not a product? I have a real hard time
`
`grappling with the whole rationale where they can just say
`
`anything we point to is a marketing term; therefore, strike it
`
`when we are pointing to source code.
`
`We have been as explicit as possible throughout this
`
`process that our contentions are limited to what we have within
`
`our charts. So if we really cited nothing but a marketing term
`
`and -- which in our charts -- be that as it may -- that would
`
`be difficult, but we have cited source code for an actual,
`
`real-life product. So, I mean, I think that's what we would
`
`just say. Like, no, we actually have a --
`
`THE COURT: So I guess, Mr. Kastens, one of the things
`
`

`

`Case 3:18-cv-02621-WHO Document 264-12 Filed 03/27/20 Page 10 of 23
`
` 9
`
` 1
`
` 2
`
` 3
`
` 4
`
` 5
`
` 6
`
` 7
`
` 8
`
` 9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`I'm wondering is whether you are telling me that you have
`
`really done all you possibly can and what you have provided is
`
`it as far as you are concerned; that you couldn't do what I
`
`suggested, for example, with the Blade Architecture and do it
`
`blade by blade and lay things out; that you couldn't respond
`
`specifically to the -- what you think Check Point already knows
`
`and is sort of playing games with you a little bit and just
`
`say, no, we are not going after this, this, this and this. Be
`
`absolutely explicit and answer all those -- don't you think you
`
`could do that?
`
`MR. KASTENS: Your Honor, I think as far as -- we
`
`viewed their request that we were to -- that the grouping of
`
`these products as a pure formality. We argued -- we met and
`
`conferred with them. We go, Look, if you are saying these
`
`should be in separate charts for each blade, we will do it. We
`
`can do that easily. We offered that three separate times to
`
`them, and they never responded to that.
`
`So that is not to say that we can't divide up the charts.
`
`It just made a whole lot of sense -- since it is actually one
`
`software package, it makes a whole heck of a lot more sense to
`
`put it in one chart. It is a matter of form over substance.
`
`Furthermore, given that they finally -- after requiring a
`
`motion to compel, a response -- have told us what source --
`
`what they say what source code goes with what products took 700
`
`pages by the way -- we finally have their position on what they
`
`

`

`Case 3:18-cv-02621-WHO Document 264-12 Filed 03/27/20 Page 11 of 23
`
` 10
`
` 1
`
` 2
`
` 3
`
` 4
`
` 5
`
` 6
`
` 7
`
` 8
`
` 9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`say what source code goes with what products. That may be a
`
`basis also to further provide information.
`
`I mean, we have -- I think you may remember the last time
`
`we were in front of you, that we felt that would be information
`
`that would be easy to provide. We asked interrogatory on it.
`
`That was supposed to be answered before we supplemented our
`
`infringement contentions. They refused to answer it. Then we
`
`required a motion to compel. Then they extended their time to
`
`respond. So we only got it last week, and we submitted it to
`
`you. And I think if you take a look at that, you will see they
`
`will cite four directories for what they say is -- of source
`
`code for what they say is a product; and then immediately after
`
`that, they will cite literally, five, six pages of directories
`
`and say this is just other code relied on by this product; but
`
`it is not part of the product itself.
`
`THE COURT: All right.
`
`MR. KASTENS: So -- yeah, so, you know, I think that
`
`once again goes back to -- I mean, a bit of the games that they
`
`are playing. As far as dividing up charts and it being
`
`absolutely specific to what blade we -- we are talking about at
`
`a specific point, we can do that and we have offered to do
`
`that.
`
`THE COURT: It's -- you have experience with me. I'm
`
`like a second grader when it comes to this. It has to be
`
`really clear to me that what you are doing is clear to
`
`

`

`Case 3:18-cv-02621-WHO Document 264-12 Filed 03/27/20 Page 12 of 23
`
` 11
`
` 1
`
` 2
`
` 3
`
` 4
`
` 5
`
` 6
`
` 7
`
` 8
`
` 9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`everybody else, and I'm -- I take the bar low.
`
`MR. KASTENS: Your Honor --
`
`THE COURT: So that's what I'm looking for. Let me
`
`hear from Mr. Roberts.
`
`MR. ROBERTS: Yes. So to start with the last point,
`
`their offer to divide them up into separate charts was said We
`
`will take the exact same information and put that into separate
`
`charts if that will resolve the issue. There are lots of
`
`issues that we brought to the Court's attention. We were not
`
`able to accept that compromise. I will also note that the
`
`Court ordered them to do that. The offer that, Hey, if we do
`
`this one thing that the Court ordered us to do and we didn't
`
`follow the Court's order on that rules out the entire issue was
`
`not a particularly appealing offer.
`
`I do want to correct the Court with respect to
`
`ThreatCloud. I think what the Court said when they cite our
`
`characterization -- in particular, they have cited code for
`
`Threat Emulation, which is a product within the ThreatCloud
`
`marketing term. So we are not asking that their allegation as
`
`to Threat Emulation be struck; merely, the other products
`
`within the ThreatCloud marketing term.
`
`THE COURT: I meant to say that if I didn't say that.
`
`MR. ROBERTS: No worries. I just wanted to respond to
`
`what Counsel said we cited code for that product. The product
`
`for which they cited code within the ThreatCloud marketing term
`
`

`

`Case 3:18-cv-02621-WHO Document 264-12 Filed 03/27/20 Page 13 of 23
`
` 12
`
` 1
`
` 2
`
` 3
`
` 4
`
` 5
`
` 6
`
` 7
`
` 8
`
` 9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`is Threat Emulation.
`
`Your Honor, we put in as Appendix 1 -- and I have a
`
`slightly easier one here if the Court wants to see it -- a
`
`chart that shows for which claims and which products they cited
`
`code and which ones they did not. So we went through and we
`
`cited it. If these are just marketing terms, why have we --
`
`you know, we cited code for them.
`
`The issue with the marketing terms is generally they
`
`haven't cited code for them. The other undefined
`
`technologies -- the problem is they say: This technology or
`
`that technology is not linked to an infringement contention.
`
`It is not linked to a code citation. It is just a reference to
`
`a technology without a code citation. It is to a specific
`
`product.
`
`It is not like there are code citations to free-floating
`
`technologies. There are references to vague technologies and
`
`citations to products. Never the twain shall meet.
`
`When he said, Well, there are a whole lot of code sources
`
`available that are not part of the product, that's true. For
`
`example, there is an underlying operating system. And what
`
`their interrogatory asked for was they said: Tell us all of
`
`the code that is part of or used by a product. And the way we
`
`interpreted that was we will give you the unique code that is
`
`in each product, and then we will tell you everything else that
`
`interacts with it because although these are individual
`
`

`

`Case 3:18-cv-02621-WHO Document 264-12 Filed 03/27/20 Page 14 of 23
`
` 13
`
` 1
`
` 2
`
` 3
`
` 4
`
` 5
`
` 6
`
` 7
`
` 8
`
` 9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`programs, discreet programs, they have a lot of interactions.
`
`None of that code that does the interactions have they cited
`
`anywhere in their infringement contentions. None of it. It is
`
`not anywhere. There is no allegation that sort of operating
`
`system level code shared by all the products constitutes an
`
`infringing instrumentality. There is no allegation about that
`
`anywhere in there. There wasn't in the first one, and there
`
`isn't in this one.
`
`I think I have addressed the important points. If the
`
`Court has additional questions, I'm happy to answer them.
`
`THE COURT: I don't. Mr. Kastens, do you have any
`
`response?
`
`MR. KASTENS: Your Honor, you should have a copy of
`
`the source code exhibits. If you want to take a look at it, I
`
`think it will show you that it looks like there has been
`
`efforts made to like -- like, not represent in a manner that we
`
`can technically make sense of what this application is. It is
`
`a single application. We have accused it. That's what we are
`
`accusing. That is what our contention is. I don't think there
`
`is a factual record to say at this point in the contention
`
`stage to deny that that's true. To the extent that they have
`
`these certain definitions of what products are is completely
`
`based on what they argue their products are using a super
`
`narrow definition of what the code is for those products.
`
`So what I would seek leave to do, Your Honor, is if you
`
`

`

`Case 3:18-cv-02621-WHO Document 264-12 Filed 03/27/20 Page 15 of 23
`
` 14
`
` 1
`
` 2
`
` 3
`
` 4
`
` 5
`
` 6
`
` 7
`
` 8
`
` 9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`believe that a -- the charts by blade are the proper way, that
`
`we be allowed to go ahead and chart them using the blades. It
`
`would just really just take a matter of just dividing up our
`
`charts. We already have the charts divided up by blade. To
`
`understand that, the actual underlying code, for example, on
`
`some of these don't directly -- and some of the technologies
`
`don't directly map to a particular -- they say they are part of
`
`no products. I don't even know what to do in that instance if
`
`you say something is part of no product even though it's an
`
`application that is construed to the customers, and they only
`
`say 5 percent of the code actually in that application is in
`
`any sort of product. It is just -- it does not make sense and
`
`defies belief on that -- so that's what they seem to be
`
`attempting to do.
`
`So I think we can -- based on what our previous
`
`contentions are, we can divide them and specifically identify
`
`the blades. And all the blades that we have identified within
`
`our contentions regarding the actual functionality at issue
`
`were identified in the letter -- were identified to them as
`
`infringing products or was specifically related to source code
`
`that was previously cited even if they weren't specifically
`
`called out as that particular blade at that time. We cited
`
`source code for the blade. We can much more easily do it now
`
`that they have actually finally responded and said what source
`
`code goes with what blade.
`
`

`

`Case 3:18-cv-02621-WHO Document 264-12 Filed 03/27/20 Page 16 of 23
`
` 15
`
` 1
`
` 2
`
` 3
`
` 4
`
` 5
`
` 6
`
` 7
`
` 8
`
` 9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`MR. ROBERTS: To respond to that last point, we have
`
`been into this case now for almost a year. They have had the
`
`source code almost that entire time, over ten months,
`
`I believe, at this point. They asked us to do this mapping of
`
`not just what code is in each blade but also all of the code
`
`that we produced that interacts with it.
`
`We responded under 33(d) that it was a mechanical process;
`
`that someone would have to go through all the code and look at
`
`all of the links and look at all the functions and list them
`
`out. They said it was easier for us to do it than for them.
`
`When I met and conferred with Mr. Andre, I said, Look --
`
`before that motion, I said, Look, if you are telling me your
`
`experts don't have the ability to do this -- like they can't do
`
`it -- I will do it for you. They said, No, they can do it. We
`
`just think it is easier for you. We litigated a motion over
`
`that. The magistrate judge said we had to do it. We did it.
`
`I don't understand what they say: Oh, now that we have this
`
`thing, we can do something different. They have had three
`
`different experts look at this code for over ten months.
`
`THE COURT: I'm allowing them to amend.
`
`MR. ROBERTS: Yep.
`
`THE COURT: This is going to be the last time. So do
`
`the absolute best, and then you are going to be stuck with it.
`
`MR. KASTENS: Yes, Your Honor.
`
`THE COURT: And I will get an order out on these
`
`

`

`Case 3:18-cv-02621-WHO Document 264-12 Filed 03/27/20 Page 17 of 23
`
` 16
`
` 1
`
` 2
`
` 3
`
` 4
`
` 5
`
` 6
`
` 7
`
` 8
`
` 9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`things, and we will see where we are.
`
`MR. KASTENS: May I raise two additional brief issues
`
`not related to the merits of that?
`
`THE COURT: Okay.
`
`MR. KASTENS: One is the scheduling order with respect
`
`to claim construction. If they are going to be amending, can
`
`we, again, delay the claim construction until we --
`
`THE COURT: Yes, we have to do that one more time; and
`
`then that will be it. I mean, the whole -- this is something
`
`that occurs not in just this case but the whole purpose of this
`
`is not to have preliminary jousting, but it is to understand
`
`what the case is; and it is for you to understand it so that
`
`you can explain it to me when it comes time for claim
`
`construction and everything else. And what I often see through
`
`the clouds is just sort of general obfuscation. So I really
`
`want you to -- this should be a matter at this point of
`
`collaboration and understanding -- and making sure that you
`
`both understand what your perspectives are, so you can then
`
`present it to me.
`
`I do think we have to delay it one more time, and we can
`
`set the schedule either by your stipulation which would be
`
`preferable. And if you can't do that, give me competing
`
`schedules.
`
`MR. ROBERTS: Your Honor, I just -- one last point
`
`based on that, you know, we believe from their motion that they
`
`

`

`Case 3:18-cv-02621-WHO Document 264-12 Filed 03/27/20 Page 18 of 23
`
` 17
`
` 1
`
` 2
`
` 3
`
` 4
`
` 5
`
` 6
`
` 7
`
` 8
`
` 9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`filed to amend their invalidity contentions, if you read that,
`
`they have full understanding of what our contentions are.
`
`THE COURT: I know that is your perspective, and you
`
`may well be right. I don't know. I can't read into either of
`
`your minds. You both think that the other one is acting in a
`
`nefarious way, and that is the way that you litigate; and
`
`that's too bad for me, and it is probably too bad for your
`
`clients.
`
`MR. ROBERTS: My further point to that was just -- I
`
`think if you take a look at our actual charts we provided, we
`
`went through great pains to make them as understandable as
`
`possible. We have underlined, highlighted, arrows, everything
`
`we can do to try to say: This is what we are accusing. And
`
`this just seems to be monkey business to keep trying to, you
`
`know, argue about what the definitions are --
`
`THE COURT: We finished with that motion, so I don't
`
`want to deal with that anymore.
`
`MR. ROBERTS: All right.
`
`THE COURT: Ms. Xu.
`
`MS. KOBIALKA: Your Honor, I will want to be heard on
`
`your ruling as well. I have to make some statements, but it is
`
`fine to go ahead.
`
`MS. XU: Good morning, Your Honor.
`
`THE COURT: Was I correct in my understanding of how
`
`the -- your declaration was laid out?
`
`

`

`Case 3:18-cv-02621-WHO Document 264-12 Filed 03/27/20 Page 19 of 23
`
` 18
`
` 1
`
` 2
`
` 3
`
` 4
`
` 5
`
` 6
`
` 7
`
` 8
`
` 9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`MS. XU: Respectfully, it is incorrect. What happened
`
`is I did a in-person source code review sometime in September
`
`of last year, and at the time the majority of the source code
`
`was already on the source code computer. So specifically there
`
`is a network security blade -- so-called Blade Architecture,
`
`and that one contributes to the majority of the source code on
`
`the source code computer. That particular source code was
`
`already there at the time of review.
`
`Similarly, there is endpoint security source code which
`
`was also there at the time when I did the review; and if you
`
`look at my declaration, it contributed to the majority of the
`
`source code.
`
`THE COURT: Are you saying -- what I understood the
`
`facts to be was that you were in the repository for two and a
`
`half hours or something like that?
`
`MS. XU: Yes, that portion is correct. I was there,
`
`and then I looked at what is being loaded onto the source code
`
`computer as well as how many files were there and those sort of
`
`ballpark estimate, also in my declaration, and I also opened
`
`selected files to take a look to see the functionality of
`
`certain files and folders.
`
`THE COURT: Are you telling me that the entire
`
`declaration was from your own personal knowledge?
`
`MS. XU: That's a trick question. So --
`
`THE COURT: No, it's not.
`
`

`

`Case 3:18-cv-02621-WHO Document 264-12 Filed 03/27/20 Page 20 of 23
`
` 19
`
` 1
`
` 2
`
` 3
`
` 4
`
` 5
`
` 6
`
` 7
`
` 8
`
` 9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`MS. XU: Okay. I'm saying that declaration is based
`
`on my review of the source code on the source code computer,
`
`but it is also based on subsequent reviews by our expert and
`
`then the expert had --
`
`THE COURT: So here is the point -- and this is the
`
`only point that I wanted to make, and I wanted to be really
`
`clear -- you don't get to put in a declaration that you say you
`
`have personal knowledge of information that you don't have
`
`personal knowledge of.
`
`So when you are putting in the -- what an expert has told
`
`you about the source code review, you need to have that expert
`
`do it, not you. And don't let any partner in your law firm
`
`tell you that you need to do this yourself. That's -- you are
`
`stuck always with your -- the most important thing you have is
`
`your integrity, and you don't use somebody else's testimony and
`
`put it in as your own. Don't let anybody do that. So this is
`
`not -- I'm -- that was the basis for my ruling, okay.
`
`MS. XU: Okay.
`
`THE COURT: Thank you.
`
`MS. KOBIALKA: Your Honor, may I be heard briefly on
`
`your ruling? I do think that there have been some other
`
`allegations that have been made in connection with that
`
`particular motion that I have concerns about as well as the
`
`relief that is requested and so --
`
`THE COURT: So all I'm doing is saying -- I don't
`
`

`

`Case 3:18-cv-02621-WHO Document 264-12 Filed 03/27/20 Page 21 of 23
`
` 20
`
` 1
`
` 2
`
` 3
`
` 4
`
` 5
`
` 6
`
` 7
`
` 8
`
` 9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`think this is -- I don't think this is a big issue in the -- on
`
`any level except for I think it was inappropriate for you to
`
`make Ms. Xu file that declaration. I don't blame her at all.
`
`But I do blame your firm. And you just shouldn't do it that
`
`way.
`
`MS. KOBIALKA: I understand what your ruling is. I
`
`wanted to get clarification because they have asked for
`
`in-camera reviews and --
`
`THE COURT: I'm not doing anything -- I'm done with
`
`that, and Ms. Xu has indicated that she didn't violate the
`
`protective order. What she did was -- and it happens. Other
`
`people do similar kinds of things, but it is not right; and I
`
`shouldn't have people do it.
`
`If you want to have somebody make a statement about what
`
`anything says, make sure they have personal knowledge.
`
`MS. KOBIALKA: I mean, that takes me to the other
`
`point, which was that we signed declarations that says there
`
`has been 200 hours of document review in connection with, let's
`
`say, some discovery dispute. Now, I didn't personally do that
`
`document review; but I may have overseen that entire process.
`
`And to be very clear, her declaration is just about
`
`high-level information regarding the source code. You know,
`
`90 percent of it was based on what she had actually seen
`
`already. And she referred, especially in her declaration, that
`
`there was a hundred hours of review total done. She never
`
`

`

`Case 3:18-cv-02621-WHO Document 264-12 Filed 03/27/20 Page 22 of 23
`
` 21
`
` 1
`
` 2
`
` 3
`
` 4
`
` 5
`
` 6
`
` 7
`
` 8
`
` 9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`said, I personally did that review.
`
`So I understand your ruling, but I want to be clear
`
`because what it sounds like you are saying now is if I have a
`
`motion to compel, I'm now going to have -- let's say, the five
`
`associates who did the document review say, I did 25 hours of
`
`this review. I did this other review -- if I'm overseeing that
`
`process, I think it is fair to say I oversaw this review, and
`
`it took a total of 125 hours or 125 paralegal hours. This
`
`really is the level at which the declaration was stated.
`
`THE COURT: That's not the way that I read it, and
`
`that is not the way I just heard it described. And I wouldn't
`
`be argued this so vociferously because I think I'm being fairly
`
`lenient with respect to all of this because I do accept the
`
`truth of what Ms. Xu just said.
`
`MS. KOBIALKA: The only other question I have in
`
`connection with this is we were required to do pinpoint
`
`citations; and, you know, they made a big stink about maybe you
`
`have copied the source code, and I unde

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket