throbber
Case 4:18-cv-07229-YGR Document 192-4 Filed 04/19/21 Page 1 of 27
`Case 4:18-cv-07229—YGR Document 192-4 Filed 04/19/21 Page 1 of 27
`
`EXHIBIT 3
`
`EXHIBIT 3
`
`

`

`Case 4:18-cv-07229-YGR Document 192-4 Filed 04/19/21 Page 2 of 27
`
`UNITED STATES DISTRICT COURT
`NORTHERN DISTRICT OF CALIFORNIA
`
`FINJAN, INC.,
`
`Plaintiff,
`
`QUALYS, INC.,
`
`Defendant.
`
`Case No. 4:I8-CV-07229-YGR
`
`EXPERT REPORT OF DR. SYLVIA D. HALL-ELLIS
`REGARDING PUBLIC AVAILABILITY OF CERTAIN PUBLICATIONS
`
`

`

`Case 4:18-cv-07229-YGR Document 192-4 Filed 04/19/21 Page 3 of 27
`
`Web access to more than 5.1-million full-text documents from some of the world's most highly
`
`cited publications. The content comprises over 180 journals, over 1,400 conference proceedings,
`
`more than 3,800 technical standards, over 1,800 eBooks and over 400 educational courses.
`
`Approximately 20,000 new documents are added to IEEE Xplore each month. Abstracts are free
`
`to access, but access to full text requires a subscription or institutional login.
`
`22.
`
`ResearchGate.3 A social networking site for scientists and researchers to share
`
`papers, ask and answer questions, and find collaborators, ResearchGate is the largest academic
`
`social network in terms of active users. Although other services have more registered users, a
`
`2015–2016 survey suggests that almost as many academics have Google Scholar profiles.
`
`Features available to ResearchGate members include following a research interest and the work
`
`of other individual participants, a blogging feature for users to write short reviews on peer-
`
`reviewed articles, private chat rooms for sharing data, editing documents, or discussing
`
`confidential topics, and a research-focused job board. ResearchGate indexes self-published
`
`information on user profiles and suggests members to connect with others who have similar
`
`interests. Member questions are fielded to others who have identified relevant expertise on their
`
`profiles. As of 2018, ResearchGate had more than 15 million users, with its largest user-bases
`
`coming from Europe and North America. Most of ResearchGate's users are involved in
`
`medicine, biology, engineering, computer science, agricultural sciences, and psychology.
`
`ResearchGate publishes a citation impact measurement in the form of an “RG Score,” which is
`
`reported to be correlated with existing citation impact measures. ResearchGate does not charge
`
`fees for putting content on the site and does not require peer review.
`
`3 http://www.researchgate.net
`
`8
`
`

`

`Case 4:18-cv-07229-YGR Document 192-4 Filed 04/19/21 Page 4 of 27
`
`23.
`
`Semantic Scholar.4 Developed at the Allen Institute for Artificial Intelligence and
`
`publicly released in November 2015, Semantic Scholar is designed to be an AI-backed search
`
`engine for scientific journal articles which uses a combination of machine learning, natural
`
`language processing, and machine vision to add a layer of semantic analysis to the traditional
`
`methods of citation analysis, and to extract relevant figures, entities, and venues from
`
`papers. Semantic Scholar is designed to highlight important, influential papers, and to identify
`
`the connections between them. As of January 2018, following a 2017 project that added
`
`biomedical papers and topic summaries, the Semantic Scholar corpus included more than 40
`
`million papers from computer science and biomedicine. As of August 2019, the number of
`
`included papers had grown to more than 173 million after the addition of the Microsoft
`
`Academic Graph records, already used by Lens.org.
`
`24.
`
`Google Scholar.5 A freely accessible web search engine that indexes the full text
`
`or metadata of scholarly literature across an array of publishing formats and disciplines
`
`released in November 2004, Google Scholar includes a significant number of peer-reviewed
`
`online academic journals, books, conference papers, selected theses and dissertations, preprints,
`
`abstracts, technical reports, and other scholarly literature. While Google does not publish the
`
`size of Google Scholar's database, scientometric researchers estimated it to contain roughly 389
`
`million documents including articles, citations and patents making it the world's largest academic
`
`search engine in January 2018. Because many Google Scholar search results link to commercial
`
`journal articles, searchers will be able to access only an abstract and the citation details of an
`
`article and may have to pay a fee to access the entire article. The most relevant results for the
`
`4 http://www.semanticscholar.org
`5 https://scholar.google.com
`
`9
`
`

`

`Case 4:18-cv-07229-YGR Document 192-4 Filed 04/19/21 Page 5 of 27
`
`bibliographic database. I personally identified and retrieved the MARC record that is
`
`Attachment 2a. As previously noted, the library that created the record is recorded in field 040
`
`with a unique library code. For Attachment 2a, that library code is “EQN,” which means that the
`
`MARC record for this manual was created at the Merck, Sharp & Dohme Research Laboratory
`
`Library (Kenilworth, New Jersey). As can be seen in the “Entered” field in the MARC record
`
`for this exhibit, a cataloger at the Merck, Sharp & Dohme Research Laboratory Library created
`
`OCLC record number 34504896 on April 3, 1996.
`
`58.
`
`The entry in the second field 500 of Attachment 2a indicates that the manual
`
`accompanied a software package. Attachment 2a further includes two locally assigned English
`
`language field 650 entries reading “Software” and “Handbooks.” Thus, as of its cataloging, the
`
`publication corresponding to the MARC record attached hereto as Attachment 2a was indexed
`
`according to its subject matter by virtue of at least two independently sufficient classifications:
`
`the field 650 entries. Further, as of April 3, 1996, the MARC record attached hereto as
`
`Attachment 2a was accessible through any library with access to the OCLC bibliographic
`
`database or the online catalog at a library that added this manual to its collection, which means
`
`that the corresponding publication was publicly available on or before that same date through
`
`any library with access to the OCLC bibliographic database or through an individual library.
`
`59.
`
`Attachment 2a indicates that the manual Dr. Solomon’s Antivirus Toolkit for
`
`Windows and DOS as cataloged at the Merck, Sharp & Dohme Research Laboratory Library is
`
`currently available from 1 library. In view of above, this manual Dr. Solomon’s Antivirus
`
`Toolkit for Windows and DOS was publicly available no later than April 3, 1996, because by that
`
`date it had been received, cataloged, and indexed at the Merck, Sharp & Dohme Research
`
`25
`
`

`

`Case 4:18-cv-07229-YGR Document 192-4 Filed 04/19/21 Page 6 of 27
`
`Laboratory Library and made part of the OCLC bibliographic database. For these reasons, I find
`
`that Exhibit 1002 was published and accessible to the public no later than April 3, 1996.
`
`60. My review, determination of authenticity, and public availability of the book
`
`titled Dr. Solomon's Anti-Virus Toolkit for Windows and DOS, Edition 3.0, by Solomon, is the
`
`second time that I have examined this document. I examined this book for the following matter:
`
`Finjan, Inc. v. Juniper Networks, Inc., U. S. District Court, Northern District of California, 3:17-
`
`cv-05659-WHA on behalf of Juniper Networks, Inc. in April 2019.
`
`61.
`
`I have been provided by counsel with a document bearing Bates Range
`
`QUALSYS00002805-00003045, which is the book Dr. Solomon's Anti-Virus Toolkit for
`
`Windows and DOS, Edition 3.0, by Alan Solomon. I have compared the document bearing Bates
`
`Range QUALSYS00002805-00003045 with Exhibit 1002. Based on my review, the conference
`
`papers in Bates Range QUALSYS00002805-00003045 and Exhibit 1002 are substantively the
`
`same.
`
`C.
`
`DOCUMENT 3 – “Dynamic Detection and Classification of Computer
`Viruses Using General Behaviour Patterns” by Morton Swimmer, Baudouin
`Le Charlier, and Abdelaziz Mounji (Exhibit 1003) (“Swimmer”)
`
`62.
`
`Attached hereto as Exhibit 1003, is a true and correct copy of the conference
`
`paper, “Dynamic Detection and Classification of Computer Viruses Using General Behaviour
`
`Patterns” by Morton Swimmer, Baudouin Le Charlier, and Abdelaziz Mounji (hereafter
`
`“Swimmer”). This conference paper was published in the Proceedings of the Fifth International
`
`Virus Bulletin Conference on pages 75-88. The Fifth International Virus Bulletin Conference
`
`was held September 20-22, 1995, in Boston, Massachusetts. I was able to find this book in the
`
`University of Washington Libraries (Seattle, Washington). The absence of journal issue cover,
`
`table of contents, etc. does not alter my opinion that Exhibit 1003 is an authentic copy of the
`
`Swimmer conference paper. Specifically, the text is complete; no pages are missing, and the text
`26
`
`

`

`Case 4:18-cv-07229-YGR Document 192-4 Filed 04/19/21 Page 7 of 27
`
`on each page appears to flow seamlessly from one page to the next; further, there are no visible
`
`alterations to the document. I was able to find the conference proceedings volume within the
`
`custody of a library – a place where an authentic copy of this book would likely be. Exhibit
`
`1003 is a true and correct copy in a condition that creates no suspicion about its authenticity.
`
`63.
`
`Attached hereto as Attachment 3a is a true and correct copy of the MARC record
`
`for the Proceedings of the Fifth International Virus Bulletin Conference from the British Library.
`
`The library ownership is indicated by the presence of the library’s code (Uk) in the 040 field. I
`
`personally identified and retrieved the MARC record that is Attachment 3a.
`
`64.
`
`The MARC record for the Proceedings of the Fifth International Virus Bulletin
`
`Conference shows that it was cataloged in the British Library on July 25, 1996, as shown in field
`
`008 (“960725”). The library continues to update this MARC record and enhanced the MARC
`
`record to meet current cataloging rules. Therefore, this volume would have been available to
`
`users in the British Library on or shortly after July 25, 1996.
`
`65.
`
`Attached hereto as Attachment 3b is a true and correct copy of the MARC record
`
`for the Proceedings of the Fifth International Virus Bulletin Conference obtained from the
`
`OCLC bibliographic database. I personally identified and retrieved the MARC record that is
`
`Attachment 3b. As previously noted, the library that created the record is recorded in field 040
`
`with a unique library code. For Attachment 3b, that library code is “WAU,” which means that
`
`the MARC record for this volume was created at the University of Washington Libraries
`
`(Seattle, Washington). The library continues to update this MARC record and enhanced the
`
`MARC record to meet current cataloging rules. As can be seen in the “Entered” field in the
`
`MARC record for Exhibit 1003, a cataloger at the University of Washington Libraries created
`
`OCLC record number 33834197 on December 1, 1995.
`
`27
`
`

`

`Case 4:18-cv-07229-YGR Document 192-4 Filed 04/19/21 Page 8 of 27
`
`66.
`
`Attachment 3b further includes an entry in field 050 (“QA76.76.C68 $b I57
`
`1995”)—as described above, this includes a subject matter classification number consistent with
`
`the Library of Congress classification system (analogous to the Dewey Decimal classification
`
`system). Attachment 3b further includes an English language descriptor term reading “Computer
`
`viruses $v Congresses” (see Attachment 1c, Library of Congress subject heading sh88004897
`
`and Attachment 1d, Library of Congress subject heading sh88031115) in the 650 field. Thus, as
`
`of its cataloging, the publication corresponding to the MARC record attached hereto as
`
`Attachment 3b was indexed according to its subject matter by virtue of at least two
`
`independently sufficient classifications: the field 050 entry and the field 650 entry. Further, as of
`
`December 1, 1995, the MARC record attached hereto as Attachment 3b was accessible through
`
`any library with access to the OCLC bibliographic database or the online catalog at a library that
`
`acquired this volume, which means that the corresponding publication was publicly available on
`
`or before that same date through any library with access to the OCLC bibliographic database or
`
`through an individual library.
`
`67.
`
`Attachment 3b indicates that the Proceedings of the Fifth International Virus
`
`Bulletin Conference as cataloged at the University of Washington Library is currently available
`
`from 2 libraries. In view of above, this volume of the Proceedings of the Fifth International
`
`Virus Bulletin Conference was publicly available no later than December 1, 1995, because by
`
`that date it had been received, cataloged, and indexed at the University of Washington Libraries
`
`and made part of the OCLC bibliographic database. For these reasons, it is my opinion that
`
`Exhibit 1003 was published and accessible to the public no later than December 1, 1995.
`
`68. My review, determination of authenticity, and public availability of the
`
`conference paper “Dynamic Detection and Classification of Computer Viruses Using General
`
`28
`
`

`

`Case 4:18-cv-07229-YGR Document 192-4 Filed 04/19/21 Page 9 of 27
`
`Behavior Patterns” by Swimmer is the sixth time that I have examined this document. I
`
`examined this conference paper for the following matters: a Petition for Inter Partes Review,
`
`Patent 8,677,494, Finjan, Inc. v. Symantec Corporation on behalf of Symantec Corporation in
`
`May 2016; Finjan, Inc. v. Symantec Corporation, U. S. District Court, Northern District of
`
`California, 3:14-cv-02998 on behalf of Symantec Corporation in July 2017; Finjan, Inc. v.
`
`Juniper Networks, Inc., U. S. District Court, Northern District of California, 3:17-cv-05659-
`
`WHA (two reviews) on behalf of Juniper Networks, Inc. in April 2019 and July 2019; and,
`
`Finjan, Inc. v. Cisco Systems, Inc., U. S. District Court, Northern District of California, 5:17-cv-
`
`00072-BLF-SVK on behalf of Cisco Systems, Inc. in August 2019.
`
`69.
`
`I have been provided by counsel with a document bearing Bates Range
`
`QUALSYS00003327-00003340, which is the conference paper “Dynamic Detection and
`
`Classification of Computer Viruses Using General Behavior Patterns” by Swimmer. I have
`
`compared the document bearing Bates Range QUALSYS00003327-00003340 with Exhibit
`
`1003. As I noted previously, Swimmer was published in the Proceedings of the Fifth
`
`International Virus Bulletin Conference. Based on my review, the conference papers in Bates
`
`Range QUALSYS00003327-00003340 and Exhibit 1003 are substantively the same.
`
`D.
`
`DOCUMENT 4 – Automated Assistance for Detecting Malicious Code by Rick
`Crawford, P. Kerchen, Karl N. Levitt, Roland Olsson, Myla Archer, and M.
`A. Izaguirre Casillas. (Exhibit 1004) (“Crawford”)
`
`70.
`
`Document 4 is a technical report, Automated Assistance for Detecting Malicious
`
`Code by Rick Crawford, P. Kerchen, Karl N. Levitt, Roland Olsson, Myla Archer, and M. A.
`
`Izaguirre Casillas (hereafter “Crawford”) and issued by the Office of Scientific and Technical
`
`Information of the U. S. Department of Energy in 1993. The exhibit filed in this proceeding as
`
`Exhibit 1004 is a true and correct copy of Document 4, which I obtained from the U. S.
`
`29
`
`

`

`Case 4:18-cv-07229-YGR Document 192-4 Filed 04/19/21 Page 10 of 27
`
`Department of Energy website.14 Specifically, the text is complete; no pages are missing, and
`
`the text on each page appears to flow seamlessly from one page to the next; further, there are no
`
`visible alterations to the document. Exhibit 1004 was found within the custody of the issuing
`
`federal agency – a place where, if authentic, a copy of this technical report would likely be.
`
`Exhibit 1004 is a true and correct copy in a condition that creates no suspicion about its
`
`authenticity.
`
`71.
`
`The website indicates 13 descriptor terms for searching the database: mathematics,
`
`computing, and information science; computers; security; detection; M codes; damage; design;
`
`automation; computer networks; personal computers; programming languages; implementation;
`
`and, mathematics and computers. Based on finding a digital copy of Document 4 and seeing the
`
`metadata record on its website, it is my opinion that Automated Assistance for Detecting
`
`Malicious Code by Crawford, et al. was available to the public on June 18, 1993.
`
`72. My review, determination of authenticity, and public availability of the
`
`conference paper “Automated Assistance for Detecting Malicious Code” by Crawford, et al. is
`
`the second time that I have examined this document. I examined this conference paper for the
`
`following matter: Finjan, Inc. v. Juniper Networks, Inc., U. S. District Court, Northern District of
`
`California, 3:17-cv-05659-WHA on behalf of Juniper Networks in April 2019.
`
`73.
`
`I have been provided by counsel with a document bearing Bates Range
`
`QUALSYS00008090-00008105, which is the conference paper “Automated Assistance for
`
`Detecting Malicious Code” by Crawford, et al. I have compared the document bearing Bates
`
`Range QUALSYS00008090-00008105 with Exhibit 1004. As I noted previously, Crawford was
`
`published in the Proceedings of the Sixth International Computer Security & Virus Conference.
`
`14 https://www.osti.gov/biblio/10176903/
`
`30
`
`

`

`Case 4:18-cv-07229-YGR Document 192-4 Filed 04/19/21 Page 11 of 27
`
`Based on my review, the conference papers in Bates Range QUALSYS00008090-00008105 and
`
`Exhibit 1004 are substantively the same.
`
`E.
`
`DOCUMENT 5 – “A Flexible Security Model for Using Internet Content,”
`by Nayeem Islam, Rangachari Anand, Trent Ray Jaeger, and Josyula R. Rao
`(“Islam”)
`
`74.
`
`Attached hereto as Exhibit 1005 is a is a true and correct copy of a conference
`
`paper, “A Flexible Security Model for Using Internet Content,” by Nayeem Islam, Rangachari
`
`Anand, Trent Ray Jaeger, and Josyula R. Rao (hereafter “Islam”) published in the Proceedings:
`
`16th IEEE Symposium on Reliable Distributed Systems found in the Linda Hall Library. The
`
`Anand conference paper appears beginning on page 89. Exhibit 1005 is a true and correct copy
`
`of the title page, verso of the title page, and the conference paper (pages 89-96). I obtained this
`
`copy of the conference paper from the Linda Hall Library which comprises Exhibit 1005.
`
`Specifically, the text of the conference paper is complete; no pages are missing, and the text on
`
`each page appears to flow seamlessly from one page to the next; further, there are no visible
`
`alterations to the document. Exhibit 1005 was found within the custody of a library – a place
`
`where, if authentic, a copy of this proceedings volume would likely be. Exhibit 1005 is a true
`
`and correct copy in a condition that creates no suspicion about its authenticity.
`
`75.
`
`The Anand conference paper is also available in the IEEE Xplore database,15 the
`
`ACM Digital Library,16 and the digital repository Semantic Scholar.17
`
`76.
`
`Attached hereto as Attachment 5a is a true and correct copy of the MARC record
`
`for the Proceedings: 16th IEEE Symposium on Reliable Distributed Systems in the Linda Hall
`
`Library. The library ownership is indicated by the presence of the library’s code (LHL) in the
`
`15 https://ieeexplore.ieee.org/document/632802
`16 https://dl.acm.org/doi/10.5555/829522.830930
`31
`
`

`

`Case 4:18-cv-07229-YGR Document 192-4 Filed 04/19/21 Page 12 of 27
`
`049 field. The library continues to update this MARC record and enhanced the MARC record to
`
`meet current cataloging rules. I personally identified and retrieved the MARC record that is
`
`Attachment 5a.
`
`77.
`
`Based on finding a print copy of Exhibit 1005 in the Linda Hall Library and
`
`MARC record in its online library catalog attached as Attachment 5a, it is my opinion that the
`
`Anand conference paper was available in the Linda Hall Library as of November 20, 1997.
`
`Attachment 5a further includes that the metadata record was created with three English language
`
`field 650 entries reading “Electronic data processing $x Distributed processing $v Congresses”
`
`(see Attachment 5b, Library of Congress subject heading sh2008102927), “Database
`
`management $x Reliability $v Congresses” (see Attachment 5c, Library of Congress subject
`
`heading sh85035848, Attachment 5d, Library of Congress subject heading sh85112510, and
`
`Attachment 1d, Library of Congress subject heading sh85031115), and “Reliability
`
`(Engineering) $v Congresses” (see Attachment 5e, Library of Congress subject heading
`
`sh2008110659).
`
`78.
`
`In view of the MARC record for Exhibit 1005, the Anand conference paper was
`
`publicly available no later than November 20, 1997, because the proceedings volume had been
`
`received, cataloged, and indexed at the Linda Hall Library and made part of its online catalog
`
`database.
`
`79.
`
`Attached hereto as Attachment 5f is a true and correct copy of the MARC record
`
`for the Proceedings: 16th IEEE Symposium on Reliable Distributed Systems obtained from the
`
`OCLC bibliographic database. I personally identified and retrieved the MARC record that is
`
`17 https://www.semanticscholar.org/paper/A-flexible-security-model-for-using-Internet-Anand-
`Islam/a3fc1c51b57de6833d2a1ad054e5293682e1bc1b
`32
`
`

`

`Case 4:18-cv-07229-YGR Document 192-4 Filed 04/19/21 Page 13 of 27
`
`attached hereto as Attachment 5f. As previously noted, the library that created the record is
`
`recorded in field 040 with a unique library code. For Attachment 5f, that library code is “FUG,”
`
`which means that the MARC record for this conference proceedings volume was created at the
`
`University of Florida Libraries (Gainesville, Florida). The library continues to update this
`
`MARC record and enhanced the MARC record to meet current cataloging rules. As can be seen
`
`in the “Entered” field in the MARC record identified as Attachment 5f, a cataloger at the
`
`University of Florida Libraries created OCLC record number 37979497 on November 20, 1997.
`
`80.
`
`Attachment 5f includes an entry in field 050 (“QA76.9.D5 $b S95 1997”)—as
`
`described above, this includes a subject matter classification number consistent with the Library
`
`of Congress classification system (analogous to the Dewey Decimal classification system).
`
`Further, Attachment 5f includes an entry in field 082 (“004.36”)—as described above, this
`
`includes a subject matter classification number consistent with the Dewey Decimal classification
`
`system. Attachment 5f further includes three English language field 650 entries reading
`
`“Electronic data processing $x Distributed processing $v Congresses” (see Attachment 5b,
`
`Library of Congress subject heading sh2008102927), “Database management $x Reliability $v
`
`Congresses” (see Attachment 5c, Library of Congress subject heading sh85035848, Attachment
`
`5d, Library of Congress subject heading sh85112510, and Attachment 1d, Library of Congress
`
`subject heading sh85031115), and “Reliability (Engineering) $v Congresses” (see Attachment
`
`5e, Library of Congress subject heading sh2008110659). Thus, as of its cataloging, the
`
`publication corresponding to the MARC record attached hereto as Attachment 5f was indexed
`
`according to its subject matter by virtue of at least three independently sufficient classifications:
`
`the field 050 entry, the field 082 entry, and the field 650 entry. Further, as of November 20,
`
`1997, the MARC record attached hereto as Attachment 5f was accessible through any library
`
`33
`
`

`

`Case 4:18-cv-07229-YGR Document 192-4 Filed 04/19/21 Page 14 of 27
`
`with access to the OCLC bibliographic database or the online catalog at a library that acquired
`
`this proceedings volume, which means that the corresponding publication was publicly available
`
`on or before that same date through any library with access to the OCLC bibliographic database
`
`or through an individual library.
`
`81.
`
`Attachment 5f indicates that the Proceedings: 16th IEEE Symposium on Reliable
`
`Distributed Systems as cataloged at the University of Florida Libraries is currently available from
`
`101 libraries. In view of above, this volume Proceedings: 16th IEEE Symposium on Reliable
`
`Distributed Systems was publicly available no later than November 20, 1997, because by that
`
`date it had been cataloged and indexed at the University of Florida Libraries, made part of the
`
`OCLC bibliographic database, and received at the Linda Hall Library. For these reasons, it is my
`
`opinion that Exhibit 1005 was published and accessible to the public no later than November 20,
`
`1997.
`
`82.
`
`Not only was Exhibit 1005 accessible and available to others in the field as of
`
`October 1997, researchers actually obtained and cited this article in other works, which is still
`
`further confirmation of its availability and accessibility. For example, Google Scholar indicates
`
`that this conference paper has been cited 23 times. Attachment 5g reports the number of citing
`
`references shown in Google Scholar for Exhibit 1005.
`
`83. My review, determination of authenticity, and public availability of the
`
`conference paper “A Flexible Security Model for Using Internet Content” by Islam, et al. is the
`
`second time that I have examined this document. I examined this conference paper for the
`
`following matter: Finjan, Inc. v. Sonicwall, Inc., U. S. District Court, Northern District of
`
`California, 5:17-cv-04467-BLF-HRL on behalf of Sonicwall, Inc. in September 2020; for
`
`Petitions for Inter Partes Review, Patent 7,975,305; 8,225,408; 6,154,844; 7,058,822;
`
`34
`
`

`

`Case 4:18-cv-07229-YGR Document 192-4 Filed 04/19/21 Page 15 of 27
`
`6,804,780; 6,965,968; 7,613,926; 7,647,633; 8,141,154; 8,667,494 Finjan, Inc. v. Sonicwall,
`
`Inc., on behalf of Sonicwall, Inc. in August 2020.
`
`84.
`
`I have been provided by counsel with a document bearing Bates Range
`
`QUALSYS00009435-00009449, which is the conference paper “A Flexible Security Model for
`
`Using Internet Content” by Islam, et al. I have compared the document bearing Bates Range
`
`QUALSYS00009435-00009449 with Exhibit 1005. As I noted previously, Islam was published
`
`in the Proceedings: 16th IEEE Symposium on Reliable Distributed Systems. Based on my
`
`review, the conference papers in Bates Range QUALSYS00009435-00009449 and Exhibit 1005
`
`are substantively the same.
`
`F.
`
`DOCUMENT 6 – “Scanners of the Year 2000: Heuristics” by Dmitry O.
`Gryaznov (Exhibit 1006) (“Gryaznov”)
`
`85.
`
`Document 6 is a true and correct copy of the conference paper “Scanners of the
`
`Year 2000: Heuristics” by Dmitry O. Gryaznov (hereafter “Gryaznov”). This conference paper
`
`was published in the Proceedings of the Fifth International Virus Bulletin Conference on pages
`
`225-234. The Fifth International Virus Bulletin Conference was held September 20-22, 1995, in
`
`Boston, Massachusetts. I was able to find this book in the University of Washington Libraries
`
`(Seattle, Washington). The absence of journal issue cover, table of contents, etc. does not alter
`
`my opinion that Exhibit 1006 is an authentic copy of the Gryaznov conference paper.
`
`Specifically, the text is complete; no pages are missing, and the text on each page appears to
`
`flow seamlessly from one page to the next; further, there are no visible alterations to the
`
`document. I was able to find the conference proceedings volume within the custody of a library
`
`– a place where an authentic copy of this book would likely be. Exhibit 1006 is a true and
`
`correct copy in a condition that creates no suspicion about its authenticity.
`
`35
`
`

`

`Case 4:18-cv-07229-YGR Document 192-4 Filed 04/19/21 Page 16 of 27
`
`86.
`
`Attached hereto as Attachment 6a is a true and correct copy of the MARC record
`
`for the Proceedings of the Fifth International Virus Bulletin Conference from the British Library.
`
`The library ownership is indicated by the presence of the library’s code (Uk) in the 040 field. I
`
`personally identified and retrieved the MARC record that is Attachment 6a.
`
`87.
`
`The MARC record for the Proceedings of the Fifth International Virus Bulletin
`
`Conference shows that it was cataloged in the British Library on July 25, 1996, as shown in field
`
`008 (“960725”). The library continues to update this MARC record and enhanced the MARC
`
`record to meet current cataloging rules. Therefore, this volume would have been available to
`
`users in the British Library on or shortly after July 25, 1996.
`
`88.
`
`Attached hereto as Attachment 6b is a true and correct copy of the MARC record
`
`for the Proceedings of the Fifth International Virus Bulletin Conference obtained from the
`
`OCLC bibliographic database. I personally identified and retrieved the MARC record that is
`
`Attachment 6b. As previously noted, the library that created the record is recorded in field 040
`
`with a unique library code. For Attachment 6b, that library code is “WAU,” which means that
`
`the MARC record for this volume was created at the University of Washington Libraries
`
`(Seattle, Washington). The library continues to update this MARC record and enhanced the
`
`MARC record to meet current cataloging rules. As can be seen in the “Entered” field in the
`
`MARC record for Exhibit 1006, a cataloger at the University of Washington Libraries created
`
`OCLC record number 33834197 on December 1, 1995.
`
`89.
`
`Attachment 6b further includes an entry in field 050 (“QA76.76.C68 $b I57
`
`1995”)—as described above, this includes a subject matter classification number consistent with
`
`the Library of Congress classification system (analogous to the Dewey Decimal classification
`
`system). Attachment 6b further includes an English language descriptor term reading “Computer
`
`36
`
`

`

`Case 4:18-cv-07229-YGR Document 192-4 Filed 04/19/21 Page 17 of 27
`
`viruses $v Congresses” (see Attachment 1c, Library of Congress subject heading sh88004897
`
`and Attachment 1d, Library of Congress subject heading sh88031115) in the 650 field. Thus, as
`
`of its cataloging, the publication corresponding to the MARC record attached hereto as
`
`Attachment 6b was indexed according to its subject matter by virtue of at least two
`
`independently sufficient classifications: the field 050 entry and the field 650 entry. Further, as of
`
`December 1, 1995, the MARC record attached hereto as Attachment 6b was accessible through
`
`any library with access to the OCLC bibliographic database or the online catalog at a library that
`
`acquired this volume, which means that the corresponding publication was publicly available on
`
`or before that same date through any library with access to the OCLC bibliographic database or
`
`through an individual library.
`
`90.
`
`Attachment 6b indicates that the Proceedings of the Fifth International Virus
`
`Bulletin Conference as cataloged at the University of Washington Library is currently available
`
`from 2 libraries. In view of above, this volume of the Proceedings of the Fifth International
`
`Virus Bulletin Conference was publicly available no later than December 1, 1995, because by
`
`that date it had been received, cataloged, and indexed at the University of Washington Libraries
`
`and made part of the OCLC bibliographic database. For these reasons, it is my opinion that
`
`Exhibit 1006 was published and accessible to the public no later than December 1, 1995.
`
`91. My review, determination of authenticity, and public availability of the
`
`conference paper “Scanners of the Year 2000: Heuristics” by Gryaznov is the third time that I
`
`have examined this document. I examined this conference paper for the following matters: a
`
`Petition for Inter Partes Review, Patent 7,613,926, Finjan, Inc. v. Juniper Networks, Inc., on
`
`behalf of Juniper Networks, Inc. in September 2018; Finjan, Inc. v. Symantec Corporation, U. S.
`
`District Court, Northern District of California, 3:14-cv-02998 on behalf of Symantec
`
`37
`
`

`

`Case 4:18-cv-07229-YGR Document 192-4 Filed 04/19/21 Page 18 of 27
`
`Corporation in July 2017; Finjan, Inc. v. Juniper Networks, Inc., U. S. District Court, Northern
`
`District of California, 3:17-cv-05659-WHA on behalf of Juniper Networks, Inc., in July 2019.
`
`92.
`
`I have been provided by counsel with a document bearing Bates Range
`
`QUALSYS00017719-00017730, which is the conference paper “Scanners of the Year 2000:
`
`Heuristics” by Dmitry O. Gryaznov. I have compared the document bearing Bates Range
`
`QUALSYS00017719-00017730 with Exhibit 1006. As I noted previously, Gryaznov was
`
`published in the Proceedings of the Fifth International Virus Bulletin Conference. B

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket