throbber
Case 4:18-cv-07229-YGR Document 144-3 Filed 11/20/20 Page 1 of 38
`Case 4:18-cv-07229—YGR Document 144-3 Filed 11/20/20 Page 1 of 38
`
`EXHIBIT 3
`EXHIBIT 3
`
`

`

`Case 4:18-cv-07229-YGR Document 144-3 Filed 11/20/20 Page 2 of 38
`
`CONFIDENTIAL
`
`EDWARD G. POPLAWSKI (SBN 113590)
`epoplawski@wsgr.com
`OLIVIA M. KIM (SBN 228382)
`okim@wsgr.com
`TALIN GORDNIA (SBN 274213)
`tgordnia@wsgr.com
`WILSON SONSINI GOODRICH & ROSATI
`Professional Corporation
`633 West Fifth Street, Suite 1550
`Los Angeles, CA 90071
`Telephone: (323) 210-2900
`Facsimile: (866) 974-7329
`
`RYAN R. SMITH (SBN 229323)
`rsmith@wsgr.com
`CHRISTOPHER D. MAYS (SBN 266510)
`cmays@wsgr.com
`WILSON SONSINI GOODRICH & ROSATI
`Professional Corporation
`650 Page Mill Road
`Palo Alto, CA 94304-1050
`Telephone: (650) 493-9300
`Facsimile: (650) 493-6811
`
`Attorneys for Defendant
`QUALYS INC.
`
`IN THE UNITED STATES DISTRICT COURT
`FOR THE NORTHERN DISTRICT OF CALIFORNIA
`OAKLAND DIVISION
`
`CASE NO.: 4:18-cv-07229-YGR
`
`DEFENDANT QUALYS INC.’S
`FIRST SUPPLEMENTAL
`OBJECTIONS AND RESPONSES
`TO FINJAN, INC.’S THIRD SET OF
`INTERROGATORIES (NOS. 12-19)
`
`CONFIDENTIAL
`
`)))))))))))))
`
`FINJAN, INC., a Delaware Corporation,
`
`Plaintiff,
`
`v.
`
`QUALYS INC., a Delaware Corporation,
`
`Defendant.
`
`CASE NO. 4:18-cv-07229-YGR
`
`QUALYS’S FIRST SUPPLEMENTAL
`RESPONSES TO FINJAN’S THIRD SET OF
`INTERROGATORIES (NOS. 12-19)
`
`1
`2
`3
`4
`5
`6
`7
`8
`9
`10
`11
`12
`13
`14
`15
`16
`17
`18
`19
`20
`21
`22
`23
`24
`25
`26
`27
`28
`
`

`

`1
`2
`3
`4
`5
`6
`7
`8
`9
`10
`11
`12
`13
`14
`15
`16
`17
`18
`19
`20
`21
`22
`23
`24
`25
`26
`27
`28
`
`Case 4:18-cv-07229-YGR Document 144-3 Filed 11/20/20 Page 3 of 38
`
`CONFIDENTIAL
`
`Pursuant to Rules 26 and 33 of the Federal Rules of Civil Procedure and the Local Rules of
`the United States District Court for the Northern District of California, Defendant Qualys Inc.
`(“Qualys”) hereby responds and objections to Plaintiff Finjan, Inc.’s Third Set of Interrogatories to
`Qualys (Nos. 12-19).
`
`PRELIMINARY STATEMENT
`
`The following responses are made solely for the purpose of, and in relation to, this action.
`Each response is provided subject to all appropriate objections (including, without limitation,
`objections concerning competency, relevancy, materiality, propriety, and admissibility) that would
`require the exclusion of any statement contained herein if the statement were made by a witness
`present and testifying in court. All such objections and grounds are therefore reserved and may be
`interposed at the time of trial.
`The following responses are based on the facts and information presently known and
`available to Qualys. Discovery, investigation, research, and analysis are ongoing in this case and
`may disclose the existence of additional facts, add meaning to known facts, establish entirely new
`factual conclusions or legal contentions, or possibly lead to additions, variations, and changes to
`these responses. Qualys reserves the right to change or supplement these responses as additional
`facts are discovered, revealed, recalled, or otherwise ascertained.
`
`GENERAL OBJECTIONS
`
`In addition to any specifically stated objections, each of Qualys’s responses herein is subject
`to and incorporates the following general objections:
`1.
`Qualys objects to each interrogatory and each definition to the extent it purports to
`impose obligations greater or more extensive than those required by the Federal Rules of Civil
`Procedure, the Local Rules of the United States District Court for the Northern District of California,
`or other applicable law.
`2.
`Qualys objects to each interrogatory and definition to the extent it purports to request
`information that cannot be found in the course of a reasonable search.
`
`CASE NO. 4:18-cv-07229-YGR
`
`-1-
`
`QUALYS’S FIRST SUPPLEMENTAL
`RESPONSES TO FINJAN’S THIRD SET OF
`INTERROGATORIES (NOS. 12-19)
`
`

`

`Case 4:18-cv-07229-YGR Document 144-3 Filed 11/20/20 Page 4 of 38
`
`CONFIDENTIAL
`
`1
`2
`3
`4
`5
`6
`7
`8
`9
`10
`11
`12
`13
`14
`15
`16
`17
`18
`19
`20
`21
`22
`23
`24
`25
`26
`27
`28
`
`Qualys’s partial response to any interrogatory is not a waiver of its objection or right
`3.
`to object to the interrogatory, or any part thereof, or to any additional, supplemental, or further
`interrogatory or part thereof, but is instead offered in an effort to resolve a potential discovery
`dispute.
`Qualys objects to each interrogatory to the extent it seeks information that is neither
`4.
`relevant to any party’s claim or defense nor proportional to the needs of the case.
`5.
`Qualys objects to each interrogatory to the extent it is unreasonably cumulative or
`duplicative of other discovery requests, or seeks information that is obtainable from some other
`source that is more convenient, less burdensome, or less expensive.
`6.
`Qualys objects to each interrogatory to the extent it is overly broad, fails to
`reasonably identify the information sought, is unduly burdensome, and is posed for improper
`purposes, including, without limitation, embarrassment, undue annoyance, harassment, oppression,
`delay, or to increase the expense of litigation or to the extent it calls for a legal conclusion or opinion.
`7.
`Qualys objects to each interrogatory to the extent it seeks information for which the
`burden or expense of obtaining and disclosing outweighs its likely benefit in resolving the issues of
`this action.
`Qualys objects to each interrogatory to the extent it fails to describe with reasonable
`8.
`particularity the information requested.
`9.
`To the extent that any interrogatory may be construed as calling for information
`which is subject to a claim of privilege, including, without limitation, the attorney-client privilege
`and attorney work-product doctrine, Qualys hereby claims such privilege and objects to the
`disclosure of the information. Such information as may hereafter be provided in response to the
`interrogatory should not include any information subject to such privileges and doctrines, but the
`inadvertent disclosure of privileged information shall not constitute a waiver of any applicable
`privilege.
`Qualys objects to each interrogatory to the extent it is vague or ambiguous.
`10.
`Qualys objects to each interrogatory to the extent it seeks confidential, commercially
`11.
`sensitive, trade secret, and/or proprietary information of a non-party or information covered by a
`
`CASE NO. 4:18-cv-07229-YGR
`
`-2-
`
`QUALYS’S FIRST SUPPLEMENTAL
`RESPONSES TO FINJAN’S THIRD SET OF
`INTERROGATORIES (NOS. 12-19)
`
`

`

`1
`2
`3
`4
`5
`6
`7
`8
`9
`10
`11
`12
`13
`14
`15
`16
`17
`18
`19
`20
`21
`22
`23
`24
`25
`26
`27
`28
`
`Case 4:18-cv-07229-YGR Document 144-3 Filed 11/20/20 Page 5 of 38
`
`CONFIDENTIAL
`
`confidentiality agreement, or information that is otherwise protected from disclosure pursuant to
`Rule 26(c)(1)(G) of the Federal Rules of Civil Procedure or Rule 501 of the Federal Rules of
`Evidence. Qualys will not produce such information unless the non-party agrees to the terms of the
`protective order entered in this case or consents in writing to the disclosure of that information to
`Finjan.
`Qualys objects each interrogatory to the extent it seeks information that is not in
`12.
`Qualys’s possession, custody, or control.
`13.
`Qualys objects to any interrogatory that seeks information, documents, or things
`subject to confidentiality agreements, protective orders, and/or any other obligation pursuant to
`which Qualys is required to protect and/or maintain the confidentiality of any third party’s
`documents. Should an interrogatory call for such information, documents, or things, Qualys will
`act reasonably to obtain the consent of the third party to produce the information.
`14.
`Qualys objects generally to the interrogatories to the extent that they prematurely call
`for discovery concerning, among other things, Qualys products, downstream products, and facts and
`contentions relating to claim construction, non-infringement, invalidity, and other claims and
`defenses pursuant to Patent Local Rule 2-5.
`15.
`Qualys objects generally to the interrogatories because Finjan has served
`interrogatories in excess of the maximum 25 interrogatory limit under Fed. R. Civ. P. 33(a)(1).
`
`OBJECTIONS TO DEFINITIONS
`
`Qualys objects to Finjan’s definition of “You,” “Your,” and “Defendant” as overly
`1.
`broad and unduly burdensome. For purposes of these interrogatories, reference to “You,” “Your,”
`and “Defendant” shall refer to Defendant Qualys Inc. only.
`2.
`Qualys objects to Finjan’s definition of “Finjan” as overly broad and unduly
`burdensome. For purposes of these interrogatories, reference to “Finjan” shall refer to Plaintiff
`Finjan, Inc. only.
`3.
`Qualys objects to Finjan’s definition of “Accused Instrumentalities” as overly broad
`and unduly burdensome. For purposes of these interrogatories, reference to the “Accused
`
`CASE NO. 4:18-cv-07229-YGR
`
`-3-
`
`QUALYS’S FIRST SUPPLEMENTAL
`RESPONSES TO FINJAN’S THIRD SET OF
`INTERROGATORIES (NOS. 12-19)
`
`

`

`1
`2
`3
`4
`5
`6
`7
`8
`9
`10
`11
`12
`13
`14
`15
`16
`17
`18
`19
`20
`21
`22
`23
`24
`25
`26
`27
`28
`
`Case 4:18-cv-07229-YGR Document 144-3 Filed 11/20/20 Page 6 of 38
`
`CONFIDENTIAL
`
`Instrumentalities” shall refer to the Qualys products and services that Finjan has specifically
`identified in its Complaint and Infringement Contentions.
`4.
`Qualys objects to the definition of “relate to,” “reflecting,” “relating to,”
`“concerning,” and “any variations thereof” and all requests incorporating these terms, as overly
`broad, vague, ambiguous, unintelligible, requiring subjective judgment on the part of Qualys and/or
`its attorneys, and calling for conclusions or opinions of counsel in violation of the attorney work
`product doctrine.
`the definitions of “person,” “entity,” “document(s),”
`to
`5.
`Qualys objects
`“communication,” and “thing” to the extent they call for information that exceeds the scope
`contemplated by the Federal Rules of Civil Procedure and the Local Rules of the United States
`District Court for the Northern District of California, or other applicable law.
`
`OBJECTIONS TO INSTRUCTIONS
`
`Qualys objects to the instructions accompanying Finjan’s interrogatories to the extent
`1.
`that such instructions are not consistent with the provisions of the Federal Rules of Civil Procedure,
`Local Rules of the United States District Court for the Northern District of California, or other
`applicable law, or to the extent that the instructions purport to require Qualys to take actions or
`provide information not required or which exceed the scope of the Federal Rules of Civil Procedure,
`Local Rules of the United States District Court for the Northern District of California, or other
`applicable law.
`
`SPECIFIC OBJECTIONS AND RESPONSES TO INTERROGATORIES
`
`INTERROGATORY NO. 12:
`Identify all names, internal codenames, nomenclatures, SKUs, and/or designations for each
`actual or planned release or version of the Accused Instrumentalities and any technologies,
`components, or features of the Accused Instrumentalities.
`RESPONSE TO INTERROGATORY NO. 12:
`In addition to the foregoing general objections, which are expressly incorporated herein,
`Qualys objects to this interrogatory on the ground and to the extent that it: (1) is compound in that
`
`CASE NO. 4:18-cv-07229-YGR
`
`-4-
`
`QUALYS’S FIRST SUPPLEMENTAL
`RESPONSES TO FINJAN’S THIRD SET OF
`INTERROGATORIES (NOS. 12-19)
`
`

`

`Case 4:18-cv-07229-YGR Document 144-3 Filed 11/20/20 Page 7 of 38
`
`CONFIDENTIAL
`
`1
`2
`3
`4
`5
`6
`7
`8
`9
`10
`11
`12
`13
`14
`15
`16
`17
`18
`19
`20
`21
`22
`23
`24
`25
`26
`27
`28
`
`it contains at least three discrete subparts (identify information for each actual release or version;
`identify information for each planned release or version; identify information for any technologies,
`components, or features); (2) is vague and ambiguous as to at least the phrase “any technologies,
`components, or features of the Accused Instrumentalities”; (3) is overbroad and unduly burdensome
`in that it asks Qualys to identify information regarding each planned release or version of the
`Accused Instrumentalities; and (4) seeks information that is irrelevant to the claims and defenses at
`issue in this case and is not proportional to the needs of the case. Qualys further objects that Finjan
`has exceeded the maximum permitted number of discrete interrogatories and subparts.
`FIRST SUPPLEMENTAL RESPONSE TO INTERROGATORY NO. 12:
`In addition to the foregoing responses and objections, none of which are waived, Qualys
`further responds Pursuant to Fed. R. Civ. P. 33(d) that responsive information can be determined
`at least from the following documents: QUALYS02047060, QUALYS02020890. Qualys further
`incorporates by reference the testimony of Qualys’s witnesses pursuant to Fed. R. Civ. P.
`30(b)(6). Qualys further states that a previous name for Vulnerability Management was
`QualysGuard.
`INTERROGATORY NO. 13:
`Separately for each Asserted Claim of the Asserted Patents, identify all legal and factual
`bases for your contention that such claim is not infringed by the Accused Instrumentalities, including
`a chart that sets forth each claim element that you contend is not satisfied by the Accused
`Instrumentalities along with a substantive, particularized description of why you contend that
`element is not satisfied, including citation to specific components and functionality of the Accused
`Instrumentalities, and all documents and things in support of your position, including source code
`modules.
`RESPONSE TO INTERROGATORY NO. 13:
`In addition to the foregoing general objections, which are expressly incorporated herein,
`Qualys objects to this interrogatory on the ground and to the extent that it: (1) is compound; (2) is
`vague and ambiguous as to at least the phrases “components and functionality of the Accused
`Instrumentalities” and “source code module”; (3) is overbroad and unduly burdensome in that it
`
`CASE NO. 4:18-cv-07229-YGR
`
`-5-
`
`QUALYS’S FIRST SUPPLEMENTAL
`RESPONSES TO FINJAN’S THIRD SET OF
`INTERROGATORIES (NOS. 12-19)
`
`

`

`Case 4:18-cv-07229-YGR Document 144-3 Filed 11/20/20 Page 8 of 38
`
`CONFIDENTIAL
`
`1
`2
`3
`4
`5
`6
`7
`8
`9
`10
`11
`12
`13
`14
`15
`16
`17
`18
`19
`20
`21
`22
`23
`24
`25
`26
`27
`28
`
`asks Qualys to prepare a “chart that sets forth each claim element that you contend is not satisfied
`by the Accused Instrumentalities along with a substantive, particularized description of why you
`contend that element is not satisfied, including citation to specific components and functionality of
`the Accused Instrumentalities”; (4) seeks information that is irrelevant to the claims and defenses at
`issue in this case and is not proportional to the needs of the case; and (5) prematurely seeks
`information that is the subject of expert opinions. Qualys further objects that Finjan has exceeded
`the maximum permitted number of discrete interrogatories and subparts.
`FIRST SUPPLEMENTAL RESPONSE TO INTERROGATORY NO. 13:
`In addition to the foregoing responses and objections, none of which are waived, Qualys
`further states that Finjan’s Infringement Contentions served April 19, 2019 (“Finjan’s Infringement
`Contentions”) do not show that the limitations of the asserted claims are met by the Accused
`Instrumentalities. For example, the source code and documents cited by Finjan’s Infringement
`Contentions and in Finjan’s response to Qualys’s Interrogatory No. 7, including the material from
`the Jira and Qwiki repositories, do not show that the Accused Instrumentalities infringe the asserted
`claims. Qualys further states that Finjan’s infringement contentions and source code citations fail to
`show infringement of every limitation of every asserted claim by every accused product, as detailed
`in Qualys’s July 23, 2020 letters (from C. Mays to L. Kobialka), which are incorporated here by
`reference.
`The patents-in-suit relate to protecting end-user computers from potentially malicious
`content (malware) received over the Internet by detecting the malicious content and preventing its
`execution. Qualys, in contrast, is based on vulnerability management (VM), which checks metadata
`associated with files for potential vulnerabilities such as out-of-date software or misconfigurations.
`Qualys does not inspect incoming Internet content on end-user computers and is therefore
`fundamentally different from Finjan.
`The following provides a more granular discussion of Qualys’ non-infringement arguments
`based on Finjan’s Infringement Contentions. For the sake of brevity, Qualys has not repeated non-
`infringement arguments based on the same (or similar) claim language found in different claims.
`Qualys further states that the below is based on Qualys’ understanding of Finjan’s Infringement
`
`CASE NO. 4:18-cv-07229-YGR
`
`-6-
`
`QUALYS’S FIRST SUPPLEMENTAL
`RESPONSES TO FINJAN’S THIRD SET OF
`INTERROGATORIES (NOS. 12-19)
`
`

`

`Case 4:18-cv-07229-YGR Document 144-3 Filed 11/20/20 Page 9 of 38
`
`CONFIDENTIAL
`
`1
`2
`3
`4
`5
`6
`7
`8
`9
`10
`11
`12
`13
`14
`15
`16
`17
`18
`19
`20
`21
`22
`23
`24
`25
`26
`27
`28
`
`Contentions, but that it is Finjan who bears the burden of proof of infringement, not vice versa.
`Qualys reserves the right to rely on any failure of proof by Finjan as a non-infringement position
`regardless of whether disclosed below or not. Qualys also incorporates by reference its comments
`regarding notice from its Responsive Damages Contentions.
`Qualys does not indirectly infringe any of the asserted patents. Qualys does not believe it
`infringes any of the patents and therefore lacks the requisite state of mind to induce others to infringe
`or to contribute to others’ infringement.
`’844 Patent
`As explained below, Qualys did not directly infringe the asserted claims of the ’844 patent
`(i.e., claims 1, 4-9, 11, 15-17, 21-23, 32, and 41-44) during the period of alleged infringement from
`November 12, 2015 through January 29, 2017.
`Qualys did not perform the step of “receiving by an inspector a Downloadable.” For
`example, Qualys products, such as VM, do not inspect a “Downloadable” which under the agreed
`construction includes executable code. Such products typically look at metadata, not the code itself.
`Qualys did not perform the step of “generating by the inspector a first Downloadable security
`profile that identifies suspicious code in the received Downloadable.” For example, Qualys products
`such as VM, PC, and WAS cannot analyze code at all and thus cannot identify suspicious code.
`Qualys did not perform the step of “linking by the inspector the first Downloadable security
`profile to the Downloadable before a web server makes the Downloadable available to web clients.”
`Qualys products operate independently of what a web server makes available to clients. Qualys
`products typically do not interact with web servers and do not interact with downloadables before
`they are made available to web clients. Under the Court’ construction, the term “web client” refers
`to “an application on the end-user’s computer that requests a downloadable from the web server”.
`Qualys does not sit between any web server and web client so as to control what content is made
`available to the web client, per the Court’s construction. Qualys also does not provide a web client
`as defined by the Court, nor does Qualys exercise the necessary level of control to render any third
`party web clients to be “Qualys’s.” Qualys also did not receive an incoming downloadable at a
`gateway.
`
`CASE NO. 4:18-cv-07229-YGR
`
`-7-
`
`QUALYS’S FIRST SUPPLEMENTAL
`RESPONSES TO FINJAN’S THIRD SET OF
`INTERROGATORIES (NOS. 12-19)
`
`

`

`Case 4:18-cv-07229-YGR Document 144-3 Filed 11/20/20 Page 10 of 38
`
`CONFIDENTIAL
`
`1
`2
`3
`4
`5
`6
`7
`8
`9
`10
`11
`12
`13
`14
`15
`16
`17
`18
`19
`20
`21
`22
`23
`24
`25
`26
`27
`28
`
`Qualys did not perform the step of “linking to the first Downloadable security profile a
`Downloadable ID that identifies the Downloadable.” As explained above, Qualys did not receive a
`“Downloadable.” Finjan has not identified any alleged “Downloadable” which includes Java,
`ActiveX, Javascript, or Visual Basic. Qualys did not perform “the step of linking to the
`Downloadable a certificate that identifies the developer which created the Downloadable.” Qualys
`lacked the alleged “first Downloadable security profile includes a list of operations deemed
`suspicious by the inspector.” Qualys does not tokenize program code and so does not derive lists
`of operations. It also does not identify code that is “suspicious.” Qualys looks for vulnerabilities,
`not suspicious code. Moreover, Qualys receives metadata and state data for a target asset; this
`information does not contain suspicious code in a downloadable.
`Qualys lacked an inspector system with a “memory storing a first rule set.” Qualys lacked
`an inspector system with a “a first content inspection engine for using the first rule set to generate a
`first Downloadable security profile that identifies suspicious code in a Downloadable, and for
`linking the first Downloadable security profile to the Downloadable before a web server makes the
`Downloadable available to web clients.” As explained above, Qualys products, such as VM, PC,
`and WAS cannot analyze code at all.
`Qualys lacked an inspector system wherein “the first rule set includes a list of suspicious
`operations” or “first rule set include a list of suspicious code patterns.” Qualys lacked an inspector
`system wherein “the first content inspection engine creates a first Downloadable ID that identifies
`the Downloadable to which the first Downloadable security profile corresponds, and links the
`Downloadable ID to the Downloadable security profile.”
`Qualys did not use “a network gateway” or “network gateway system.” Qualys did not
`perform the step of “receiving a Downloadable with a linked Downloadable security profile that
`identifies suspicious code in the Downloadable, the Downloadable security profile being linked to
`the Downloadable before the web server make the Downloadable available to the web client.”
`Qualys did not perform the step of “comparing the Downloadable security profile against a security
`policy.” Qualys did not perform the step of “receiving a Downloadable with a linked first
`Downloadable security profile that identifies suspicious code in the Downloadable, the
`
`CASE NO. 4:18-cv-07229-YGR
`
`-8-
`
`QUALYS’S FIRST SUPPLEMENTAL
`RESPONSES TO FINJAN’S THIRD SET OF
`INTERROGATORIES (NOS. 12-19)
`
`

`

`Case 4:18-cv-07229-YGR Document 144-3 Filed 11/20/20 Page 11 of 38
`
`CONFIDENTIAL
`
`1
`2
`3
`4
`5
`6
`7
`8
`9
`10
`11
`12
`13
`14
`15
`16
`17
`18
`19
`20
`21
`22
`23
`24
`25
`26
`27
`28
`
`Downloadable security profile being linked to the Downloadable before the web server make the
`Downloadable available to the web client.” Qualys did not perform the step of “determining whether
`to trust the first Downloadable security profile.” Qualys did not perform the step of “comparing the
`first Downloadable security profile against the security policy if the first Downloadable security
`profile is trustworthy.”
`Qualys lacked “a Downloadable interceptor for receiving a Downloadable.” Qualys cannot
`intercept downloadables being sent to a web client from a web server. Qualys lacked “a file reader
`coupled to the interceptor for determining whether the Downloadable includes a linked
`Downloadable security profile that identifies suspicious code in the Downloadable, wherein if the
`Downloadable includes a linked Downloadable security profile, the Downloadable was linked
`before the web server makes the Downloadable available to the web client.” Qualys lacked “an
`engine coupled to the file reader for determining whether to trust the Downloadable security
`profile.” Qualys lacked “a security policy analysis engine coupled to a verification engine for
`comparing the Downloadable security profile against a security policy if the engine determines that
`the Downloadable security profile is trustworthy.” Qualys is unable to determine if such profiles are
`trustworthy or not. Qualys lacked a computer-readable storage medium storing program code for
`causing a data processing system on an inspector to perform the step of “receiving a Downloadable.”
`Qualys lacked a computer-readable storage medium storing program code for causing a data
`processing system on an inspector to perform the step of “generating a first Downloadable security
`profile that identifies suspicious code in the received Downloadable.” Qualys lacked a computer-
`readable storage medium storing program code for causing a data processing system on an inspector
`to perform the step of “linking the first Downloadable security profile to the Downloadable before
`a web server makes the Downloadable available to web clients.” Qualys lacked a computer-readable
`storage medium storing program code for causing a data processing system on an inspector to
`perform the step of “receiving a Downloadable with a linked first Downloadable security profile
`that identifies suspicious code in the Downloadable, the Downloadable security profile being linked
`to the Downloadable before the web server make the Downloadable available to the web client.”
`Qualys lacks a computer-readable storage medium storing program code for causing a data
`
`CASE NO. 4:18-cv-07229-YGR
`
`-9-
`
`QUALYS’S FIRST SUPPLEMENTAL
`RESPONSES TO FINJAN’S THIRD SET OF
`INTERROGATORIES (NOS. 12-19)
`
`

`

`1
`2
`3
`4
`5
`6
`7
`8
`9
`10
`11
`12
`13
`14
`15
`16
`17
`18
`19
`20
`21
`22
`23
`24
`25
`26
`27
`28
`
`Case 4:18-cv-07229-YGR Document 144-3 Filed 11/20/20 Page 12 of 38
`
`CONFIDENTIAL
`
`processing system on an inspector to perform the step of “determining whether to trust the first
`Downloadable security profile.” Qualys lacked a computer-readable storage medium storing
`program code for “causing a data processing system on an inspector to perform the step of
`“comparing the first Downloadable security profile against the security policy if the first
`Downloadable security profile is trustworthy.”
`Qualys lacked a “means for receiving a Downloadable.” Qualys lacked a “means for
`generating a first Downloadable security profile that identifies suspicious code in the received
`Downloadable.” Qualys lacked a “means for linking the first Downloadable security profile to the
`Downloadable before a web server makes the Downloadable available to web clients.” Qualys
`lacked a network gateway system with “means for receiving a Downloadable with a linked first
`Downloadable security profile that identifies suspicious code in the Downloadable, the
`Downloadable security profile being linked to the Downloadable before the web server make the
`Downloadable available to the web client.” Qualys lacked a network gateway system with “means
`for determining whether to trust the first Downloadable security profile.” Qualys lacked a network
`gateway system with “means for comparing the first Downloadable security profile against the
`security policy if the first Downloadable security profile is trustworthy.”
`Qualys did not induce infringement of the ’844 patent during the alleged damages period.
`Qualys’s outside counsel expressed his opinion to Finjan that Qualys did not infringe. Qualys has
`maintained its belief that it uses its own internally developed technology, for which it has received
`numerous patents. Further, Qualys did not receive any information from Finjan regarding its alleged
`infringement until after the ’844 patent’s expiration. As explained above Qualys products are
`incapable of direct infringement and thus cannot indirectly infringe. Additionally, Finjan failed to
`identify any non-party that would have directly infringed. Finjan also failed to identify any specific
`acts of inducement by Qualys during the period between Qualys attaining knowledge of the patent
`and its expiration.
`
`CASE NO. 4:18-cv-07229-YGR
`
`-10-
`
`QUALYS’S FIRST SUPPLEMENTAL
`RESPONSES TO FINJAN’S THIRD SET OF
`INTERROGATORIES (NOS. 12-19)
`
`

`

`Case 4:18-cv-07229-YGR Document 144-3 Filed 11/20/20 Page 13 of 38
`
`CONFIDENTIAL
`
`1
`2
`3
`4
`5
`6
`7
`8
`9
`10
`11
`12
`13
`14
`15
`16
`17
`18
`19
`20
`21
`22
`23
`24
`25
`26
`27
`28
`
`’968 Patent
`As explained below, Qualys has not directly infringe the asserted claims of the ’968 patent
`(i.e., claims 1, 6-7, 9-11, 13-15, 23, 26, and 32-33) during the period of alleged infringement, starting
`on November 12, 2015.
`Qualys lacks “a policy-based cache manager, comprising: a memory storing a cache of
`digital content.” Under the Court’s claim construction, the term “memory storing a cache of digital
`content” means “memory storing previously requested and retrieved digital content.” Qualys
`products, such as VM, PC, and WAS do not retrieve digital content but rather check metadata. No
`Qualys product stores previously requested and retrieved digital content. To the extent that any
`product analyzes a web page, that is done for a single usage, rather than to facilitate later retrieval.
`Finjan has failed to point to anything it contends is content (1) for which it is indicated whether that
`content is allowable relative to a given policy, and (2) that is used to derive a content profile.
`Qualys lacks “a plurality of policies.” Nor does it have any alleged “plurality of policies”
`“used for URL filtering,” “used for anti-virus protection,” or “used for security detection for
`malicious mobile code.” Qualys lacks “a policy index to the cache contents.” Looking for known
`vulnerabilities in a system is not a policy. Further, what Finjan alleges to be the “policy index”
`lacks “entries that relate cache content and policies by indicating cache content that is known to be
`allowable relative to a given policy, for each of a plurality of policies.” Indeed, Qualys does not
`indicate a list of digital content which is allowable. Qualys lacks “a content scanner,
`communicatively coupled with said memory, for scanning a digital content received, to derive a
`corresponding content profile.”
`Qualys lacks “a content evaluator, communicatively coupled with said memory, for
`determining whether a given digital content is allowable relative to a given policy, based on the
`content profile, the results of which are saved as entries in the policy index.” Checking whether a
`device passes or fails a policy-check is not a determination of allowability. Also, as noted above
`Qualys does not determine allowability based on anything Finjan has identified as the content.
`Qualys lacks a “policy-based cache manager” with “a transmitter for transmitting allowable content
`from the cache to a client computer” or “a receiver for receiving digital content from a web server.”
`
`CASE NO. 4:18-cv-07229-YGR
`
`-11-
`
`QUALYS’S FIRST SUPPLEMENTAL
`RESPONSES TO FINJAN’S THIRD SET OF
`INTERROGATORIES (NOS. 12-19)
`
`

`

`1
`2
`3
`4
`5
`6
`7
`8
`9
`10
`11
`12
`13
`14
`15
`16
`17
`18
`19
`20
`21
`22
`23
`24
`25
`26
`27
`28
`
`Case 4:18-cv-07229-YGR Document 144-3 Filed 11/20/20 Page 14 of 38
`
`CONFIDENTIAL
`
`Finjan failed to identify any hardware for a “transmitter” or “receiver.” Qualys products do not
`retrieve digital content. Qualys does not perform “policy-based caching.” Qualys does not perform
`the step of “providing a memory storing a cache of digital content, a plurality of policies, and a
`policy index of the cache contents, the policy index including entries that relate cache content and
`policies by indicating cache content that is known to be allowable relative to a given policy.”
`Qualys does not perform “for each of a plurality of policies; receiving a user request for a
`digital content, the user having associated therewith a policy from among the plurality of policies.”
`Qualys never responds to a user request for digital content. Such requests occur independently of
`Qualys software.
`Qualys does not perform “determining based on the cache, whether the requested digital
`content is already available; and if said determining based on a cache indicates that the data content
`is already available in the cache then further determining based on the policy index of the cache
`contents, whether the requested digital content is allowable for the user; else further determining
`based on a profile of the requested data content, whether the requested data content is allowable for
`the user's policy; and storing an indication of the results of said further determining whether the
`requested data is allowable, within the policy index.”
`Qualys does not perform the step of “transmitting the requeste

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket