throbber
Case 4:18-cv-07229-YGR Document 158 Filed 01/23/21 Page 1 of 20
`
`EDWARD G. POPLAWSKI (SBN 113590)
`epoplawski@wsgr.com
`OLIVIA M. KIM (SBN 228382)
`okim@wsgr.com
`TALIN GORDNIA (SBN 274213)
`tgordnia@wsgr.com
`WILSON SONSINI GOODRICH &
`ROSATI
`Professional Corporation
`633 West Fifth Street, Suite 1550
`Los Angeles, CA 90071
`Telephone: (323) 210-2900
`Facsimile: (866) 974-7329
`
`Attorneys for Defendant
`QUALYS INC.
`
`RYAN R. SMITH (SBN 229323)
`rsmith@wsgr.com
`CHRISTOPHER D. MAYS (SBN 266510)
`cmays@wsgr.com
`WILSON SONSINI GOODRICH &
`ROSATI
`Professional Corporation
`650 Page Mill Road
`Palo Alto, CA 94304-1050
`Telephone: (650) 493-9300
`Facsimile: (650) 493-6811
`
`IN THE UNITED STATES DISTRICT COURT
`
`FOR THE NORTHERN DISTRICT OF CALIFORNIA
`
`OAKLAND DIVISION
`
`CASE NO.: 4:18-cv-07229-YGR (TSH)
`
`DEFENDANT QUALYS INC.’S
`MOTION TO STRIKE PORTIONS
`OF PLAINTIFF FINJAN LLC’S
`INFRINGEMENT AND DAMAGES
`EXPERT REPORTS
`
`Judge: Hon. Yvonne Gonzalez
`Rogers
`Date: March 2, 2021
`Time: 2:00pm
`Location: Zoom Teleconference1
`
`))))))))))))))
`
`FINJAN LLC
`
`Plaintiff,
`
`v.
`
`QUALYS INC.,
`
`Defendant.
`
`HIGHLY CONFIDENTIAL – ATTORNEYS EYE ONLY
` REDACTED VERSION OF DOCUMENT SOUGHT TO BE SEALED
`
`1 Per the Court’s Notice regarding Civil Law and Motion Calendars and its Order at D.I. 48.
`
`CASE NO. 4:18-cv-07229-YGR
`
`QUALYS MOTION TO STRIKE
`
`1
`2
`3
`4
`5
`6
`7
`8
`9
`10
`11
`12
`13
`14
`15
`16
`17
`18
`19
`20
`21
`22
`23
`24
`25
`26
`27
`28
`
`

`

`Case 4:18-cv-07229-YGR Document 158 Filed 01/23/21 Page 2 of 20
`
`TABLE OF CONTENTS
`TABLE OF CONTENTS ................................................................................................................ 1
`NOTICE OF MOTION AND MOTION ...................................................................................... III
`STATEMENT OF ISSUES AND RELIEF REQUESTED .......................................................... III
`MEMORANDUM OF POINTS AND AUTHORITIES ................................................................ 1
`I.
`INTRODUCTION ............................................................................................................... 1
`II.
`FACTUAL BACKGROUND ............................................................................................. 2
`A.
`Background of Qualys’s Products ........................................................................... 2
`B.
`Medvidovic’s Pattern of Introducing New Infringement Theories in
`Reports. ................................................................................................................... 3
`ARGUMENT ...................................................................................................................... 4
`A.
`Medvidovic’s New Cloud Agent Theory ................................................................ 5
`B.
`Medvidovic’s New Dynamic Building and Detection Theories ............................. 5
`1.
`New Theories Re: Building and Detecting “While . . . Receiving the
`Incoming Stream” ........................................................................................ 6
`Different Accused Functionality ................................................................. 8
`2.
`Finjan Consciously Elected Not to Amend Its Contentions ........................ 9
`3.
`Medvidovic’s New Claim 29 Theories ................................................................. 10
`Medvidovic’s New “Receiving” Theory ............................................................... 12
`Medvidovic’s New Date of First Infringement Theory......................................... 13
`Medvidovic Introduces a New Doctrine of Equivalents Theory Not
`Previously Disclosed in the Infringement Contentions. ........................................ 14
`Finjan Failed to Preserve the Foreign Sales Theories in Medvidovic’s,
`Cole’s and McDuff’s Reports ............................................................................... 14
`CONCLUSION ................................................................................................................. 16
`
`C.
`D.
`E.
`F.
`
`G.
`
`III.
`
`IV.
`
`1
`2
`3
`4
`5
`6
`7
`8
`9
`10
`11
`12
`13
`14
`15
`16
`17
`18
`19
`20
`21
`22
`23
`24
`25
`26
`27
`28
`
`CASE NO. 4:18-cv-07229-YGR
`
`i
`
`QUALYS MOTION TO STRIKE
`
`

`

`Case 4:18-cv-07229-YGR Document 158 Filed 01/23/21 Page 3 of 20
`
`TABLE OF AUTHORITIES
`
`CASES
`
` PAGE(S)
`
`ASUS Comp. Int’l v. Round Rock Research, LLC,
`No. 12-cv-02099-JST, 2014 WL 1463609 (N.D. Cal. Apr. 11, 2014) .............................4, 14
`
`Finjan, Inc. v. Blue Coat Sys., Inc.,
`No. 5:13-cv-03999-BLF, 2015 WL 3640694 (N.D. Cal. June 11, 2015) ..............................1
`
`Finjan, Inc. v. Blue Coat Sys., LLC,
`No. 15-cv-03295, 2017 U.S. Dist. LEXIS 220192 (N.D. Cal. July 28, 2017) .......................5
`
`Finjan, Inc. v. Cisco Sys., Inc.,
`No. 5:17-cv-00072-BLF, 2019 WL 6174936 (N.D. Cal. Nov. 20, 2019) ..........................1, 3
`
`Finjan, Inc. v. Cisco Sys., Inc.,
`No. 5:17-cv-00072-BLF(SVK), 2020 WL 2322923 (N.D. Cal. May 11,
`2020) ...................................................................................................................................1, 4
`
`Finjan, Inc. v. Juniper Network, Inc., et al.,
`No. 3:17-cv-05659, 2021 WL 75735 (N.D. Cal. Jan. 9, 2021) ..............................................1
`
`Finjan, Inc. v. Proofpoint, Inc.,
`No. 13-CV-05808-HSG, 2015 WL 1517920 (N.D. Cal. Apr. 2, 2015) .................................7
`
`Finjan, Inc. v. Symantec Corp.,
`No. 4:14-cv-02998-HSG(JSC), 2018 WL 620169 (N.D. Cal. Jan. 30, 2018)........................1
`
`Huawei Techs., Co., Ltd. V. Samsung Elecs. Co., Ltd.,
`340 F. Supp. 3d 934 (N.D. Cal. 2018) .................................................................................14
`
`Theranos, Inc. v. Fuisz Pharma LLC,
`No. 11-CV-05236-YGR, 2012 WL 6000798 (N.D. Cal. Nov. 30, 2012) ..........................4, 7
`
`RULES
`
`Patent L.R. 3-1 ...............................................................................................................................4, 7
`
`1
`2
`3
`4
`5
`6
`7
`8
`9
`10
`11
`12
`13
`14
`15
`16
`17
`18
`19
`20
`21
`22
`23
`24
`25
`26
`27
`28
`
`CASE NO. 4:18-cv-07229-YGR
`
`ii
`
`QUALYS MOTION TO STRIKE
`
`

`

`Case 4:18-cv-07229-YGR Document 158 Filed 01/23/21 Page 4 of 20
`
`NOTICE OF MOTION AND MOTION
`PLEASE TAKE NOTICE that on Tuesday, March 2, 2021 at 2:00pm or as soon thereafter
`as this matter may be heard before Judge Gonzalez Rogers of the United States District Court for
`the Northern District of California via Zoom video conference and/or in Courtroom 1, 4th Floor,
`of 1301 Clay Street in Oakland, California (per the Court’s March 12, 2020 Order (D.I. 48) and its
`Notice regarding Civil Law and Motion Calendars), defendant Qualys Inc. (“Qualys”) will and
`hereby does move to strike portions of plaintiff Finjan LLC’s (“Finjan”) expert reports
`STATEMENT OF ISSUES AND RELIEF REQUESTED
`Qualys seeks an order striking portions of the “Expert Report of Nenad Medvidovic,
`Ph.D.,” “Opening Expert Report of Eric Cold, Ph.D.,” and “Expert Report of DeForest McDuff,
`Ph.D.” Medvidovic’s, Cole’s and McDuff’s expert reports all proffer infringement theories that
`exceed the scope of Finjan’s Local Patent Rule Contentions. Dr. Medvidovic introduces new
`theories of infringement not previously disclosed in Finjan’s Infringement Contentions. Drs. Cole
`and McDuff offer speculative theories on worldwide infringement and damages even though such
`theories were never disclosed in Finjan’s Infringement Contentions or Damages Contentions and
`have been held as outside the scope of the operative Infringement Contentions. See D.I. 105 at 4;
`D.I. 152. Qualys therefore requests that the Court strike the portions of those expert reports
`containing these improper theories, identified by the highlighted portions of Exhibits 1, 2, and 13
`to the Declaration of Christopher D. Mays in support of this Motion.2
`
`2 Citations to “Ex. XX” or “Exhibit XX” refer to the exhibits to the Declaration of Christopher D.
`Mays, filed concurrently with this Motion.
`
`CASE NO. 4:18-cv-07229-YGR
`
`iii
`
`QUALYS MOTION TO STRIKE
`
`1
`2
`3
`4
`5
`6
`7
`8
`9
`10
`11
`12
`13
`14
`15
`16
`17
`18
`19
`20
`21
`22
`23
`24
`25
`26
`27
`28
`
`

`

`Case 4:18-cv-07229-YGR Document 158 Filed 01/23/21 Page 5 of 20
`
`I.
`
`MEMORANDUM OF POINTS AND AUTHORITIES
`INTRODUCTION
`Finjan has been repeatedly chastised by courts in this District for failing to properly
`disclose its infringement theories. It has made a pattern out of using expert reports to inject new
`theories into the litigation:
`After discovering its infringement theory covered only a minute portion of
`Juniper’s revenue base, on the eve of [trial] Finjan flip flopped and came up
`with a new infringement theory, one which would capture more of Juniper’s
`products and inflate the target revenue base. Finjan tried to sneak this theory
`in with its expert-damages report, but we caught it, and the Daubert order
`excluded that trick.
`Finjan, Inc. v. Juniper Network, Inc., et al., Case No. 3:17-cv-05659, 2021 WL 75735, at *2 (N.D.
`Cal. Jan. 9, 2021) (emphasis added); see also Finjan, Inc. v. Symantec Corp., Case No. 4:14-cv-
`02998-HSG(JSC), 2018 WL 620169 (N.D. Cal. Jan. 30, 2018) (striking portions of Finjan’s expert
`reports for including theories outside the scope of its contentions); Finjan, Inc. v. Blue Coat Sys.,
`Inc., Case No. 5:13-cv-03999-BLF, 2015 WL 3640694 (N.D. Cal. June 11, 2015) (same); Finjan,
`Inc. v. Cisco Sys., Inc., Case No. 5:17-cv-00072-BLF(SVK), 2020 WL 2322923 (N.D. Cal. May
`11, 2020) (same); and Finjan, Inc. v. Cisco Sys., Inc., Case No. 5:17-cv-00072-BLF, 2019 WL
`6174936 (N.D. Cal. Nov. 20, 2019) (same).
`Now Finjan is at it again. Finjan pervasively offered infringement theories for the ’408
`Patent that were extremely narrow and failed to address every claim limitation. Qualys raised
`these issues with Finjan months before the close of fact discovery, but Finjan consciously elected
`not to seek leave to amend the contentions with the Court. Instead, Finjan resorted to its same old
`playbook by relying on its expert, Dr. Nenad Medvidovic, to slip in a host of new infringement
`theories. Dr. Medvidovic himself has a rocky past with this problem, and has had his reports
`stricken for engaging in the same practices present here. Given this, particular scrutiny of his
`expert report is warranted. As detailed below, Medvidovic frequently exceeds the scope of
`Finjan’s infringement contentions by accusing different devices, different functionality, and
`simply filling in new theories for limitations that Finjan skipped in its contentions. The Court
`should strike these new theories and opinions.
`
`1
`2
`3
`4
`5
`6
`7
`8
`9
`10
`11
`12
`13
`14
`15
`16
`17
`18
`19
`20
`21
`22
`23
`24
`25
`26
`27
`28
`
`CASE NO. 4:18-cv-07229-YGR
`
`1
`
`QUALYS MOTION TO STRIKE
`
`

`

`1
`2
`3
`4
`5
`6
`7
`8
`9
`10
`11
`12
`13
`14
`15
`16
`17
`18
`19
`20
`21
`22
`23
`24
`25
`26
`27
`28
`
`Case 4:18-cv-07229-YGR Document 158 Filed 01/23/21 Page 6 of 20
`
`Further, despite the fact that the Court in this case has twice determined that Finjan failed
`to preserve any theory of foreign sales in its contentions, Drs. Medvidovic, Cole, and McDuff try
`to inject this issue into this case for a third time. This Court has already ruled that foreign sales is
`not part of the case, and should thus strike the corresponding portions of Medvidovic’s, Cole’s,
`and McDuff’s reports.
`In summary, Qualys seeks to strike the following paragraphs:
`o From Medvidovic’s expert report: ¶¶ 21-22, 160, 170, 172-174, 185, 187 fn. 6, 195-
`196, 214, 235-238, 250-253, 258, 262, 267-274, 276-300, 302-321, 323, 325, 327,
`333-338, 415-425, 427-430, and 446.3
`o From McDuff’s expert report: ¶¶ 8c, 13, 78, 87, 126, Tables 7 and 8, and
`Attachments B-1, B-2, B-4, B-5, B-6, B-8, C-2, and J-1.
`o From Cole’s expert report: ¶¶ 1186, 1188-1189, and 1871-1873.
`FACTUAL BACKGROUND
`A.
`Background of Qualys’s Products
`Qualys is a computer security company that offers vulnerability detection solutions.
`Finjan’s infringement expert, Medvidovic, describes a vulnerability as “a weakness in security that
`is subject to being exploited.” Ex. 1 at ¶ 82. Medvidovic analogizes a vulnerability to “leaving
`the back door to a house unlocked.” Id. Qualys’s solution is called the Qualys Cloud Platform,
`which is Cloud-based (i.e. resides on the Internet) software that enables customers to scan devices
`on their local networks (such as network infrastructure, firewalls, and even end-user devices like
`employee computers) for such vulnerabilities.
`Relevant to this motion, and as depicted by Qualys’s expert, Dr. Rubin, the following is a
`general depiction of Qualys’s architecture:
`
`II.
`
`3 For the Court’s convenience, Qualys provides an index for identifying: (1) the paragraph(s)
`of Medvidovic’s expert report to be struck; (2) the claim element the paragraph(s) pertains to; (3)
`pincites to the relevant portion of the Infringement Contentions; and (4) a brief statement regarding
`the basis for striking the paragraph(s) as Exhibit 10 to this motion.
`
`CASE NO. 4:18-cv-07229-YGR
`
`2
`
`QUALYS MOTION TO STRIKE
`
`

`

`Case 4:18-cv-07229-YGR Document 158 Filed 01/23/21 Page 7 of 20
`
`1
`2
`3
`4
`5
`6
`7
`8
`9
`10
`11
`12
`13
`14
`15
`16
`17
`18
`19
`20
`21
`22
`23
`24
`25
`26
`27
`28
`
`Ex. 12 (Rebuttal Expert Report of Dr. Avi Rubin Regarding U.S. Patent No. 8,225,408) at 42. As
`depicted above, there are three general ways that Qualys’s Cloud Platform interacts with a
`customer. The first uses a “scanner,” which can take the form of a scanner appliance or a virtual
`scanner. The second is a Qualys “Cloud Agent,” which is installed directly on a device that is to
`be scanned. In both cases, the scanners and Cloud Agents collect information and send that
`information to the Qualys Cloud Platform. For the purposes of this motion, a material difference
`between the scanners and the Cloud Agent is that a scanner analyzes the data locally and sends
`the scan result to the Cloud Platform, while the Cloud Agent sends raw data to the Cloud Platform,
`which analyzes that data and generates the scan result. See Ex.9 (Deposition Transcript of Holger
`Kruse (“Kruse Tr.”)) at 33:9-17; 109:5-110:25. Either way, scan results are stored in a database.
`See id. at 76:11-77:23. The third way that customers interact with Qualys’s Cloud Platform is by
`running a scan report, which involves querying the database of stored scan results. See id. at 78:14-
`23. Medvidovic appears to generally agree with this description in his report. See Ex. 1 at ¶¶ 88,
`96-99, 107, 114, 116, 170.
`B.
`Medvidovic’s Pattern of Introducing New Infringement Theories in Reports.
`Medvidovic has a history of providing expert opinions that exceed the scope of the
`Infringement Contentions. See Finjan v. Cisco, 2019 WL 6174936 (granting Cisco’s motion to
`strike portions of Medvidovic’s expert reports for exceeding the scope of Finjan’s infringement
`
`CASE NO. 4:18-cv-07229-YGR
`
`3
`
`QUALYS MOTION TO STRIKE
`
`

`

`Case 4:18-cv-07229-YGR Document 158 Filed 01/23/21 Page 8 of 20
`
`1
`2
`3
`4
`5
`6
`7
`8
`9
`10
`11
`12
`13
`14
`15
`16
`17
`18
`19
`20
`21
`22
`23
`24
`25
`26
`27
`28
`
`contentions and permitting Finjan to amend Medvidovic’s expert report)); Finjan v. Cisco, 2020
`WL 2322923 (granting Cisco’s motion to strike portions of Medvidovic’s amended expert report
`for exceeding the scope of Finjan’s infringement contentions)). For example, in Finjan v. Cisco,
`Medvidovic rendered opinions regarding infringement theories not disclosed in Finjan’s
`infringement contentions. See Finjan v. Cisco, 2020 WL 2322923 at *5-7.
`Here, Medvidovic repeats history by offering multiple new theories of infringement that,
`like in the Cisco case, were not included in Finjan’s infringement contentions. The Court should
`strike those opinions from Medvidovic’s report pertaining to such undisclosed theories (identified
`in Exhibit 1).4 See ASUS Comp. Int’l v. Round Rock Research, LLC, No. 12-cv-02099-JST, 2014
`WL 1463609, at *3-4 (N.D. Cal. Apr. 11, 2014) (striking expert testimony where expert opinions
`advanced new theories not disclosed in infringement contentions).
`III.
`ARGUMENT
`A “party may not use an expert report to introduce new infringement theories, new
`infringing instrumentalities, new invalidity theories, or new prior art references not disclosed in
`the parties’ infringement contentions or invalidity contentions.” ASUS v. Round Rock, LLC, 2014
`WL 1463609 at *1. “[T]he purpose of [Patent Local Rule 3-1] is to require the party claiming
`infringement to crystallize its theories of the case early in the litigation and to adhere to those
`theories once disclosed.” Theranos, Inc. v. Fuisz Pharma LLC, No. 11-CV-05236-YGR, 2012
`WL 6000798, at *2 (N.D. Cal. Nov. 30, 2012) (emphasis added). Similarly:
`The dispositive inquiry in a motion to strike is thus whether the allegedly undisclosed
`“theory” is in fact a new theory or new element of the accused product alleged to
`practice a particular claim that was not previously identified in the plaintiff’s
`contentions, or whether the “theory” is instead the identification of additional
`evidentiary proof showing that the accused element did in fact practice the limitation.
`. . . If the theory is new, prejudice is “inherent in the assertion of a new theory after
`discovery has closed.”
`
`Finjan, Inc. v. Blue Coat Sys., LLC, No. 15-cv-03295, 2017 U.S. Dist. LEXIS 220192, *13 (N.D.
`Cal. July 28, 2017) (citations omitted).
`
`4 For the Court’s convenience, Qualys provides an annotated and excerpted copy of Medvidovic’s
`expert report specifically identifying the paragraphs Qualys seeks to strike. The same pin citations
`identified throughout this Motion apply to that exhibit as well.
`
`CASE NO. 4:18-cv-07229-YGR
`
`4
`
`QUALYS MOTION TO STRIKE
`
`

`

`Case 4:18-cv-07229-YGR Document 158 Filed 01/23/21 Page 9 of 20
`
`1
`2
`3
`4
`5
`6
`7
`8
`9
`10
`11
`12
`13
`14
`15
`16
`17
`18
`19
`20
`21
`22
`23
`24
`25
`26
`27
`28
`
`Medvidovic’s New Cloud Agent Theory
`A.
`Qualys moves to strike ¶¶ 160, 170, 183, 185, 187 fn. 6, 195-196, 214, 235-238, 258, 287-
`289, 303-309, 325, 327, 415, 417-419, 427-428, and 446 of the Medvidovic report as containing
`previously undisclosed theories containing alleged infringement involving Qualys’s Cloud Agent.
`Finjan’s infringement contentions for the ’408 Patent do not accuse the Cloud Agent of practicing
`any limitation of any asserted claim of the ’408 Patent. Indeed, “Cloud Agent” appears nowhere
`in Finjan’s ’408 claim charts. See generally Ex. 5. Finjan’s only theories of infringement disclosed
`in its claim charts variously accuse either the Qualys Cloud Platform and/or Qualys’s Scanner
`Appliance/Virtual Appliance. See, e.g., id. at 2-3 (accusing the Cloud Platform and Scanner
`Appliance); 6 (referencing databases stored on the Cloud Platform); 15 (referencing API calls to
`Cloud Platform); and 17 (referencing scan reports generated by Cloud Platform). Notably, Finjan
`did specifically include Cloud Agents theories in its contentions for the other Patents-in-Suit. See,
`e.g., D.I. 100-11 at 000036, 000119, 000189, 000321, 000374, and 000486; see id. at 000408-469.
`Finjan consciously declined to include any Cloud Agent theories of infringement for the ’408
`Patent and should not be permitted to have its expert opine on this.
`However, Medvidovic dramatically expands Finjan’s infringement theories by offering
`over two dozen different infringement opinions regarding the Cloud Agents in his report. See Ex.
`1 at ¶¶ 160, 170, 175, 178, 183, 185, 187 fn. 6, 195-196, 214, 235-238, 258, 287-289, 303, 309,
`325, 327, 415, 417-419, 427-428, 446. None of these theories were included in Finjan’s
`infringement contentions, and the Court should strike the foregoing paragraphs from Medvidovic’s
`report accordingly.
`B.
`Medvidovic’s New Dynamic Building and Detection Theories
`Qualys moves to strike ¶¶ 238, 262, 267-274, 276-300, 302-320, 325, 327, 329, 333, and
`335-337 because they pertain to new theories regarding the dynamic building and detection steps
`of the ’408 Claims. Medvidovic’s new theories fall into two groups. First, he provides new
`theories regarding how the building and detection steps occur while still receiving the alleged
`incoming stream of program code. Second, he accuses entirely different features of performing
`the detecting and building step than what Finjan disclosed in its infringement contentions.
`
`CASE NO. 4:18-cv-07229-YGR
`
`5
`
`QUALYS MOTION TO STRIKE
`
`

`

`1
`2
`3
`4
`5
`6
`7
`8
`9
`10
`11
`12
`13
`14
`15
`16
`17
`18
`19
`20
`21
`22
`23
`24
`25
`26
`27
`28
`
`Case 4:18-cv-07229-YGR Document 158 Filed 01/23/21 Page 10 of 20
`
`1.
`
`New Theories Re: Building and Detecting “While . . . Receiving the
`Incoming Stream”
`
`Every claim of the ’408 Patent requires two acts occur “dynamically,” i.e., while receiving
`the incoming stream of program code. First, the Claims each require “dynamically building . . . a
`parse tree whose nodes represent tokens and patterns.” See Ex. 4 (’408 Patent) at Claims 1, 22,
`23, 29, 35. This must occur while still receiving the claimed incoming stream of program code.
`See id. Second, the Claims each require “dynamically detecting . . .indicators of potential exploits”
`while the “dynamic building” is still ongoing. Id. By extension, this means that the dynamic
`detection must also occur while still receiving the claimed incoming stream of program code. See
`id.
`
`Finjan, however, did not disclose theories about these steps in its infringement contentions.
`In its Infringement Contentions, Finjan merely restates parts of the claim language and says it
`occurs “during the scans”:
`
`Ex. 5 at 15. For the claimed “dynamically building” step, Finjan states:
`
`CASE NO. 4:18-cv-07229-YGR
`
`6
`
`QUALYS MOTION TO STRIKE
`
`

`

`Case 4:18-cv-07229-YGR Document 158 Filed 01/23/21 Page 11 of 20
`
`1
`2
`3
`4
`5
`6
`7
`8
`9
`10
`11
`12
`13
`14
`15
`16
`17
`18
`19
`20
`21
`22
`23
`24
`25
`26
`27
`28
`
`Id. at 16. Neither of these contentions say anything about how Finjan contends Qualys’s products
`build a parse tree or detect potential exploits while receiving the incoming stream of program code.
`Finjan says nothing about when or how the code it highlights in its contention executed (let alone
`that it occurs while still receiving the incoming stream of program code). To compound on this
`problem, Finjan completely ignores the further requirement in Element 1g that dynamic detection
`must occur while said dynamically building builds the parse tree. See id. Finjan failed to provide
`a “meaningful description of its theories” for these limitations. See Theranos, Inc. v. Fuisz Pharma
`LLC, No. 11-CV-05236-YGR, 2012 WL 6000798, at *4 (N.D. Cal. Nov. 30, 2012); see also
`Finjan, Inc. v. Proofpoint, Inc., No. 13-CV-05808-HSG, 2015 WL 1517920, at *6 (N.D. Cal. Apr.
`2, 2015) (“Even more troublingly, the little explanation Finjan does provide is framed in high-
`level generalities that do not specifically relate to the claim elements identified in each Claim. See
`Pat. L.R. 3–1(c) (requiring the patentee to identify ‘the structure(s), act(s), or material(s) in the
`Accused Instrumentality that performs the claimed function.’)”).
`the
`to his opinions of
`Dr. Medvidovic repeats
`this same error with regards
`“indicating...within the incoming stream” claim element. See Ex. 1 at ¶ ¶ 321, 323, 325, 327, 329,
`333, 335-337. Specifically, Finjan’s infringement contentions for that element merely refer back to
`
`CASE NO. 4:18-cv-07229-YGR
`
`7
`
`QUALYS MOTION TO STRIKE
`
`

`

`Case 4:18-cv-07229-YGR Document 158 Filed 01/23/21 Page 12 of 20
`
`the “dynamic detection” element. See Ex. 5 at 17-18. As noted above, the contentions for the
`dynamic detection element contain no theory of how detection allegedly occurs while still receiving
`an incoming stream.
`Medvidovic’s report attempts to fill these gaps by suddenly injecting theories for the
`missing limitations.
`
`
`
`
`
`
`
`
`
`
`
` None of these features are referenced
`anywhere in Finjan’s ’408 claim charts. See generally Ex. 5. Accordingly, these theories, and
`their corresponding paragraphs, should be struck.
`2.
`Different Accused Functionality
`
`Finjan’s infringement contentions include only one theory about which features of
`Qualys’s products allegedly build a parse tree and detect incoming exploits. For both elements,
`Finjan relies on a single document that describes the operation of the “Qualys API.” See Ex. 11;
`compare id. at FINJAN-QUALYS 042672-673 with Ex. 5 at 15; compare id. at FINJAN-
`QUALYS 042656 with Ex. 5 at 16.
`
`
` Thus, Finjan’s contentions for these elements were limited only to the Qualys API
`functionality found on
` Medvidovic discussed Qualys API in ¶¶ 265 and 307 of his report.
`
`1
`2
`3
`4
`5
`6
`7
`8
`9
`10
`11
`12
`13
`14
`15
`16
`17
`18
`19
`20
`21
`22
`23
`24
`25
`26
`27
`28
`
`CASE NO. 4:18-cv-07229-YGR
`
`8
`
`QUALYS MOTION TO STRIKE
`
`

`

`Case 4:18-cv-07229-YGR Document 158 Filed 01/23/21 Page 13 of 20
`
`However, Medvidovic also went significantly beyond the scope of Finjan’s contentions by
`offering several new alternative theories about different functionality that he opined also met these
`limitations.
`
`
`
`
`
`
`
`
`
`
` Medvidovic’s opinions should be limited to functionality actually disclosed in
`Finjan’s infringement contentions and thus the foregoing paragraphs should be struck.
`3.
`Finjan Consciously Elected Not to Amend Its Contentions
`
`Tellingly, Finjan knew about these deficiencies months before the close of fact discovery.
`On July 23, 2020, Qualys sent Finjan a letter detailing these and other problems in its infringement
`contentions. Qualys specifically noted that, as to the ’408 Patent:
`In Claim 1, Finjan fails to identify structure or functionality for parse trees that are
`dynamically built or that the nodes of those trees represent tokens and patterns.
`Finjan also fails to identify structure or functionality showing that the dynamic
`detection occurs during the dynamic building of Claim Element 1f.
`
`Ex. 6 at 15 (emphasis in original). Finjan ignored this issue in its August 13 response. See Ex. 7
`at 15-17. Finjan did, however, acknowledge it would “supplement its [Infringement Contentions]
`in response to Qualys’s letter.” Id. at 18. Yet, even after fact discovery concluded, Finjan never
`lived up to its promise and never sought leave to amend its infringement contentions. Finjan
`should not now be allowed to use Medvidovic’s report to sneak in contentions on elements it all
`but ignore in its contentions.
`
`1
`2
`3
`4
`5
`6
`7
`8
`9
`10
`11
`12
`13
`14
`15
`16
`17
`18
`19
`20
`21
`22
`23
`24
`25
`26
`27
`28
`
`CASE NO. 4:18-cv-07229-YGR
`
`9
`
`QUALYS MOTION TO STRIKE
`
`

`

`1
`2
`3
`4
`5
`6
`7
`8
`9
`10
`11
`12
`13
`14
`15
`16
`17
`18
`19
`20
`21
`22
`23
`24
`25
`26
`27
`28
`
`Case 4:18-cv-07229-YGR Document 158 Filed 01/23/21 Page 14 of 20
`
`Medvidovic’s New Claim 29 Theories
`C.
`Qualys moves to strike ¶¶ 415-417 and 427-430 of Medvidovic’s Report because they
`include new infringement theories as to Claim 29. There are two elements of Finjan’s Claim 29
`infringement contentions are problematic:
`[Element 29b] a non‐transitory computer‐readable storage medium storing
`computer-executable program code that is executed by a computer to scan
`incoming program code
`[Element 29c] an accessor, stored on the medium and executed by the
`computer, for accessing descriptions of exploits in terms of patterns of tokens
`and rules, wherein exploits are portions of program code that are malicious,
`wherein tokens are lexical constructs of any one of a plurality of
`programming languages, and wherein rules designate certain patterns of
`tokens as forming programmatical constructs.
`In Element 29b, Finjan provides a non-substantive and ambiguous contention that fails
`to identify any feature of the accused products with any specificity:
`
`Ex. 5 at 42. The only theory Finjan discloses for where this nondescript “storage medium” is
`located is found in its call-back to Element 1(d), which shows Finjan’s contention that the “storage
`medium” is the database residing on the Cloud Platform, not a component of the scanner:
`
`CASE NO. 4:18-cv-07229-YGR
`
`10
`
`QUALYS MOTION TO STRIKE
`
`

`

`Case 4:18-cv-07229-YGR Document 158 Filed 01/23/21 Page 15 of 20
`
`1
`2
`3
`4
`5
`6
`7
`8
`9
`10
`11
`12
`13
`14
`15
`16
`17
`18
`19
`20
`21
`22
`23
`24
`25
`26
`27
`28
`
`Id. at 6. Finjan’s contentions similarly allege this same database satisfies the Element 29c’s
`“accessor”:
`
`Id. at 43.
`Medvidovic’s report offers a different theory for these limitations.
`
`
`
`
`
`CASE NO. 4:18-cv-07229-YGR
`
`11
`
`QUALYS MOTION TO STRIKE
`
`

`

`Case 4:18-cv-07229-YGR Document 158 Filed 01/23/21 Page 16 of 20
`
`. Finjan should be bound by its original theory and Medvidovic’s
`improper new theory struck.
`D.
`Medvidovic’s New “Receiving” Theory
`Qualys moves to strike ¶¶ 185, 187, 195-197, and 214 of Medvidovic’s Report as including
`an improper new theory
`
`
`
`
`
`Finjan’s Infringement Contentions identify two theories of infringement:
`
` Theory 1: the Qualys Cloud Platform “receives content based on a client device
`requesting the content from a source computer, such as the Internet.” Ex. 5 at 2.
`
` Theory 2: In the second theory, Qualys’s Scanner Appliance and Virtual Scanner
`“receives content based on a client device requesting the content from a source
`computer, such as the Internet.” Id. at 3-4.
`Both of Finjan’s theories involve a client device (i.e., not the scanner) requesting content from an
`Internet-based source computer. Also, both of Finjan’s theories accuse distinct components
`operating alone – i.e., the Cloud Platform alone and/or the Scanner Appliance/Virtual Scanners
`alone.
`
`Medvidovic’s report jettisons the above-described theories.
`
`
`
`5
`
` Neither theory is disclosed in Finjan’s infringement contentions.
`
`.
`
`
`
`
`
`
`
`
`
`
`
`
`
`1
`2
`3
`4
`5
`6
`7
`8
`9
`10
`11
`12
`13
`14
`15
`16
`17
`18
`19
`20
`21
`22
`23
`24
`25
`26
`27
`28
`
`CASE NO. 4:18-cv-07229-YGR
`
`12
`
`QUALYS MOTION TO STRIKE
`
`

`

`Case 4:18-cv-07229-YGR Document 158 Filed 01/23/21 Page 17 of 20
`
`1
`2
`3
`4
`5
`6
`7
`8
`9
`10
`11
`12
`13
`14
`15
`16
`17
`18
`19
`20
`21
`22
`23
`24
`25
`26
`27
`28
`
`Medvidovic also offers the new theory that the Scanner Appliance and Virtual Scanner
`infringe by directly requesting content, rather than (as disclosed in Finjan’s contentions)
`intercepting content requested by a distinct client device:
`Finjan’s Infringement Contentions
`Medvidovic Report (Ex. 1) at ¶ 186:
`Appendix F (Ex. 5) at 3:
`As shown below, the content is received by
`each Accused Product (via the receiver of
`the Appliance Scanner) when a particular
`client device requests content provided by
`a source computer.
`
`
`
`
`
`
`
`
`And, as discussed above in Section A above, Medvidovic includes a theory of Cloud Agent-based
`reception, a theory nowhere included in Finjan’s infringement contentions. Compare Ex. 5 at 2-4
`with Ex. 1 at ¶¶ 185, 187 fn. 6, 195-196. Qualys asks that the Court strike these new theories.
`E.
`Medvidovic’s New Date of First Infringement Theory
`Qualys moves to strike ¶¶ 21-22, 262, and 277-283 from Medvidovic’s report. In
`paragraph 21, Medvidovic opines that the first date of infringement for the ’408 Patent is “no
`earlier than 2005.” Ex. 1 at ¶ 21.6 This is a new theory. Finjan’s Infringement and Damages
`Contentions list November 29, 2018 as the theoretical date of first infringement for the ’408 Patent.
`See D.I. 100-11 at 11, Ex. 8 at 4. Even Finjan’s damages expert, McDuff, disputes Medvidovic’s
`new opinion by identifying a different date of first infringement than Medvidovic. See Ex. 3 at
`Attachment F-2.
`Medvidovic’s identification of a new date of first infringement appears aimed at capturing
`a particular feature change in Qualys’s Scanner Appliances and Virtual Scanners.
`
`
`
`
`
`
`
`6 Qualys also objects to 2005 (years before the ’408 issued) as legally correct.
`
`CASE NO. 4:18-cv-07229-YGR
`
`13
`
`QUALYS MOTION TO STRIKE
`
`

`

`Case 4:18-cv-07229-YGR Document 158 Filed 01/23/21 Page 18 of 20
`
`1
`2
`3
`4
`5
`6
`7
`8
`9
`10
`11
`12
`13
`14
`15
`16
`17
`18
`19
`20
`21
`22
`23
`24
`25
`26
`27
`28
`
` This new theory is subject to being struck for the reasons discussed above. In any
`event, because Medvidovic’s 2005 theory is different from the theoretical date of first infringement
`Finjan

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket