throbber
Case 4:18-cv-07229-YGR Document 59-3 Filed 04/06/20 Page 1 of 8
`

`

`

`

`

`

`
`Exhibit 1
`
`

`

`Case 4:18-cv-07229-YGR Document 59-3 Filed 04/06/20 Page 2 of 8
`Case 1:18-cv-01519-MN Document 76 Filed 10/25/19 Page 1 of 77 PageID #: 4421
`
`IN THE UNITED STATES DISTRICT COURT
`FOR THE DISTRICT OF DELAWARE
`
`FINJAN, INC., a Delaware Corporation,
`
`Plaintiff,
`
` v.
`
`RAPID7, INC., a Delaware Corporation and
`RAPID7 LLC, a Delaware Limited Liability
`Company,
`
`Defendants.
`
`)
`)
`)
`)
`)
`)
`)
`)
`)
`)
`)
`
`C.A. No. 18-1519-MN
`
`JOINT CLAIM CONSTRUCTION BRIEF (TERMS 1-20)
`
`Philip A. Rovner (#3215)
`Jonathan A. Choa (#5319)
`POTTER ANDERSON & CORROON LLP
`Hercules Plaza
`P.O. Box 951
`Wilmington, DE 19899
`(302) 984-6000
`provner@potteranderson.com
`jchoa@potteranderson.com
`
`Attorneys for Plaintiff
`Finjan, Inc.
`
`Dated: October 25, 2019
`
`Richard L. Renck (#3893)
`DUANE MORRIS LLP
`222 Delaware Avenue,
`Suite 1600
`Wilmington, DE 19801-1659
`(302) 657-4900
`RLRenck@duanemorris.com
`
`Counsel for Defendants
`Rapid7, Inc. and Rapid7 LLC
`
`

`

`Case 4:18-cv-07229-YGR Document 59-3 Filed 04/06/20 Page 3 of 8
`Case 1:18-cv-01519-MN Document 76 Filed 10/25/19 Page 38 of 77 PageID #: 4458
`
`Response to Office Action dated October 5, 2011, at 138. In contrast, various claims of the ‘289
`
`Patent include an express requirement that the content is modified. See, e.g., Ex. A-4 (‘289 Patent,
`
`at Claim 1) (“modifying the content….” “transmitting the modified content…”). The express
`
`inclusion of this limitation in the ‘289 Patent claims confirms it should not be read into the claims
`
`of the ‘154 Patent that do not include (and, in fact, removed) this limitation. Andersen Corp., 474
`
`F.3d at 1369.
`
`2.
`
`Defendants’ Responsive Statement
`
`Rapid7’s proposed construction was adopted by the Juniper II Court. Juniper II, 387
`
`F.Supp.3d at 1013 (“this order construes the term ‘content processor’ as ‘a processor that processes
`
`modified content.’”).
`
`As noted above in connection with Term 5, the Federal Circuit has explained that the
`
`asserted claims of the ’154 Patent “recit[e] a system or software program that executes a substitute
`
`function,” which is the claimed “first function”. Palo Alto Networks, 752 F. Appx. at 1018. The
`
`“first function” sends its input to the security computer for inspection once invoked. Ex. A-3, cl. 1
`
`(“transmitting the input to the security computer for inspection, when the first function is invoked”);
`
`Juniper II, 387 F.Supp.3d at 1011 (“The claimed ‘first function’ then clearly involves the ‘substitute
`
`function,’ which sends the content’s input to the security computer for inspection once invoked.”).
`
`This call to a substitute function only exists after the original content is modified at a gateway
`
`device to include it. Ex. A-3 at 9:13-28 (“Content modifier 265 preferably modifies original content
`
`received by gateway computer 205, and produces modified content, which includes a layer of
`
`protection to combat dynamically generated malicious code.”). Thus, the claimed “content”
`
`received by the claimed “content processor” is necessarily modified content since the claims require
`
`it to “include[] a call to a first function”. Id. at cl. 1, 6.
`
`33
`
`

`

`Case 4:18-cv-07229-YGR Document 59-3 Filed 04/06/20 Page 4 of 8
`Case 1:18-cv-01519-MN Document 76 Filed 10/25/19 Page 39 of 77 PageID #: 4459
`
`Indeed, as noted above, the “present invention” described in the ’154 Patent makes this
`
`clear. Id. at 4:55-60 (“the present invention operates by replacing original function calls with
`
`substitute function calls within the content, at a gateway computer, prior to the content being
`
`received at the client computer.”).
`
`Finjan’s argument that it amended a claim during prosecution to cure an antecedent basis
`
`defect is irrelevant. The antecedent must use the same terminology, and Finjan curing an infirmity
`
`in the claim language does not dictate the construction of “content processor”. Moreover, Finjan’s
`
`attempt to rely on the ’289 Patent ignores the context of the claims. Claim 1 of the ’289 Patent is
`
`directed to a gateway computer (“receiving at a gateway computer…”), while the asserted claims
`
`of the ’154 Patent are directed to a client computer that receives modified content (i.e., from a
`
`gateway computer), as set forth above.
`
`Indeed, as the Juniper II Court found (acknowledging a prior analysis by the PTAB), the
`
`context of the claims in the ’154 Patent plainly requires that the “content processor” receive content
`
`that has been modified:
`
`the ’154 patent specification to refers to ‘three categories of content’:
`
`First, there is the “original content” that is scanned and modified at the gateway
`computer. Second, there is the “modified content” transmitted to, and received
`by, the client computer. Third is the “dynamically generated malicious content”
`that is generated at runtime and, thus, is undetected by the gateway computer in
`the “original content.”
`
`The PTAB further noted that “[n]otwithstanding the variety of content
`described in the Specification, the term ‘content’ is recited broadly in all challenged
`claims as ‘content including a call to a first function’ ” (ibid.). It then explained that
`(id. at 10 (first emphasis and alteration in original, second emphasis added)):
`
`Because the recited “first function” is the substituted function whose input is
`verified, the claimed “content,” in the context of the surrounding claim
`language, must refer to the modified content received at the client computer.
`See id. at 17:39–40 (“transmitting the input [of the first function call] to the
`security computer for inspection, when the first function is invoked”). The
`claimed content cannot refer to the “original content” that is received by the
`gateway computer and over the Internet because that content, according to the
`
`34
`
`

`

`Case 4:18-cv-07229-YGR Document 59-3 Filed 04/06/20 Page 5 of 8
`Case 1:18-cv-01519-MN Document 76 Filed 10/25/19 Page 40 of 77 PageID #: 4460
`
`Specification, would be capable of generating the undetected dynamically
`generated malicious content from which the client computer is to be protected.
`
`As such, the PTAB concluded that the claimed “content” refers to “data or
`information, which has been modified and is received over a network” (id. at 14
`(emphasis added)). This order agrees with the PTAB’s understanding to the extent
`that it found that the claimed “content” “has been modified.” Markman v. Westview
`Instruments, Inc., 517 U.S. 370, 389 (1996) (claims are to be construed “in a way
`that comports with the instrument as a whole”).
`
`Juniper II, 387 F.Supp.3d at 1011-12. Thus, the claimed “content processor” receives modified
`
`content.
`
`3.
`
`Plaintiff’s Reply Statement
`
`The only dispute between the parties is if a construction is necessary to limit the term to
`
`processing “modified” content, which is a rehash of the dispute over Term 5. Rapid7 argues the
`
`content must be modified because the first and second function must be different, which is
`
`incorrect for the reasons discussed above. Rapid7 ignores the Proofpoint Order, which explicitly
`
`rejects its proposal that the content must be modified and the two other decisions (Bitdefender and
`
`Symantec), noted in Finjan’s Opening Brief, that found no construction was necessary for this
`
`term. Instead, Rapid7 asks the Court to follow the Federal Circuit’s Palo Alto Networks decision
`
`and the Juniper II Order.
`
`As discussed above, the Federal Circuit opinion upon which Rapid7 relies states in relevant
`
`part only that “the ‘first function’ is the inspection step in which the content is assessed for safety,
`
`and the ‘second function’ is when, having been deemed safe, the content is actually run.” Ex. F-
`
`10 at 3. This fact is undisputed and does not require that the second function is different — i.e.,
`
`the security computer can inspect the first function and confirm it is safe, and then the receiving
`
`computer can safely run the same, non-inspected function.
`
`The Juniper II Order relies on the statement in the specification that “Content modifier 265
`
`preferably modifies original content received by the gateway computer 205, and produces
`
`35
`
`

`

`Case 4:18-cv-07229-YGR Document 59-3 Filed 04/06/20 Page 6 of 8
`Case 1:18-cv-01519-MN Document 76 Filed 10/25/19 Page 41 of 77 PageID #: 4461
`
`modified content, which includes a layer of protection to combat dynamically generated malicious
`
`code.” Ex. A-3, ‘154 Patent at 9:13-28 (emphasis added). In relying on that embodiment to narrow
`
`the claims, the Juniper II Court erred.3 First, that embodiment is just an example, as confirmed
`
`by the use of the “preferably” modifier. Even preferred embodiments should not be used to limit
`
`the scope of the claims where, as is the case here, they do not act to narrow the definition of
`
`otherwise broad terms. Ex. D-4 at 2, Finjan, Inc. v. Proofpoint, Inc., No. 4:13-cv-05808-HSG,
`
`Dkt. No. 267 (N.D. Cal. Dec. 3, 2015) (“it is improper to read limitations from the specification
`
`into the claims”) (citation omitted). Second, the example in the specification discusses a “content
`
`modifier,” while the claim term is a “content processor.” If the applicants intended to limit the
`
`scope of the claims to require that the content be modified, they would have used the same “content
`
`modifier” phrase from the specification. Instead, intending to require only that the first function
`
`be processed to determine if it is safe (but not necessarily modified), the applicants drafted the
`
`claim to recite “content processor.” This choice should be honored, and the claim should not be
`
`rewritten through claim construction as Rapid7 urges. Laitram Corp., 163 F.3d at 1347. Finally,
`
`as noted above, the term modify was specifically removed from the claim term during prosecution
`
`further demonstrating that the applicant intended the term to have its plain and ordinary meaning.
`
`4.
`
`Defendants’ Sur-Reply Statement
`
`Finjan misconstrues the Federal Circuit’s Order, and attempts to distinguish the Juniper II
`
`Order by disagreeing with the underlying analysis, but the issue was identical, and Finjan lost.
`
`The specification’s discussion of “content modifier 265” supports Rapid7. Indeed, the
`
`specification explains that the content modifier is what modifies the content to include the
`
`substitute function. Ex. A-3, 9:13-28; Figs. 2, 4. Once that modification has occurred, the gateway
`
`3 This decision is on appeal to the Federal Circuit. Finjan, Inc. v. Juniper Networks, Inc., No.
`19-2405 (Fed. Cir. 2019).
`
`36
`
`

`

`Case 4:18-cv-07229-YGR Document 59-3 Filed 04/06/20 Page 7 of 8
`Case 1:18-cv-01519-MN Document 76 Filed 10/25/19 Page 42 of 77 PageID #: 4462
`
`computer (which contains the content modifier) sends the modified content to the client computer,
`
`which contains the claimed “content processor.” Thus, the “content processor” receives the
`
`modified content over a network, “the content including a call to a first function,” as required by
`
`every asserted claim. This is illustrated in every embodiment. Fig. 2 shows “content modifier
`
`265” within “gateway computer 205” transmitting “modified content” to “client computer 210”
`
`including “content processor 270”. Ex. A-3, Fig. 2. Likewise, Fig. 3 shows a “gateway computer”
`
`that “replaces original function calls in content with substitute function calls” and transmits that
`
`modified content to the client computer for processing. Id. at Fig. 3. Fig. 4 shows “gateway
`
`computer 405” transmitting “modified content” to “client computer 410” containing “content
`
`processor 470”. Id. at Fig. 4. Fig. 5 likewise shows a “gateway computer” that “replace(s) original
`
`function calls with substitute function calls” at step 515 and then transmits the modified content to
`
`the client for processing at step 520. Id. at Fig. 5.
`
`The Bitdefender, Proofpoint, and Symantec Orders do not support Finjan’s argument. The
`
`Bitdefender and Proofpoint Orders addressed whether “a content processor for (i) processing
`
`content received over a network . . .” is a means-plus-function term. Ex. D-4 at 15; Ex. D-1 at 19.
`
`Similarly, the Symantec Court addressed the issue of whether “content processor” means “software
`
`that renders the content for interactive viewing on a display monitor.” Ex. D-5 at 16.
`
`Term 7. “a call to a first function” (‘154 Patent, Claims 1, 4, 6, 10)
`
`Plaintiff’s Proposed Construction
`
`plain and ordinary meaning, which is “a
`call to a first function”
`
`Defendants’ Proposed Construction
`a statement or instruction in the content, the
`execution of which causes the function to provide a
`service
`
`1.
`
`Plaintiff’s Opening Statement
`
`The term “a call to a first function,” does not require construction, and should be given its
`
`plain and ordinary meaning. The patentee did not act as a lexicographer and did not give any
`
`37
`
`

`

`Case 4:18-cv-07229-YGR Document 59-3 Filed 04/06/20 Page 8 of 8
`Case 1:18-cv-01519-MN Document 76 Filed 10/25/19 Page 77 of 77 PageID #: 4497
`
`Dated: October 25, 2019
`
`OF COUNSEL:
`
`Paul J. Andre
`Lisa Kobialka
`James Hannah
`Hannah Lee
`KRAMER LEVIN NAFTALIS
` & FRANKEL LLP
`990 Marsh Road
`Menlo Park, CA 94025
`(650) 752-1700
`
`Aaron M. Frankel
`KRAMER LEVIN NAFTALIS
` & FRANKEL LLP
`1177 Avenue of the Americas
`New York, NY 10036
`(212) 715-9100
`
`OF COUNSEL:
`L. Norwood Jameson
`Matthew C. Gaudet
`David C. Dotson
`DUANE MORRIS LLP
`1075 Peachtree Street NE, Suite 2000
`Atlanta, GA 30309
`(404) 253-6900
`
`Jordana Garellek
`DUANE MORRIS LLP
`1540 Broadway
`New York, NY 10036-4086
`(212) 471-1829
`
`POTTER ANDERSON & CORROON LLP
`
`By: /s/ Philip A. Rovner
`Philip A. Rovner (# 3215)
`Jonathan A. Choa (#5319)
`Hercules Plaza
`P.O. Box 951
`Wilmington, DE 19899
`(302) 984-6000
`provner@potteranderson.com
`jchoa@potteranderson.com
`
`Attorneys for Plaintiff
`Finjan, Inc.
`
`DUANE MORRIS LLP
`
`By: /s/ Richard L. Renck
`Richard L. Renck (# 3893)
`222 Delaware Avenue,
`Suite 1600
`Wilmington, DE 19801-1659
`(302) 657-4900
`RLRenck@duanemorris.com
`
`Counsel for Defendants
`Rapid7, Inc. and Rapid7 LLC
`
`72
`
`

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket