throbber
Case 4:18-cv-07229-YGR Document 198 Filed 05/18/21 Page 1 of 10
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`Philip W. Goter (pro hac vice)
`goter@fr.com
`Robert P. Courtney (CA SBN 248392)
`courtney@fr.com
`FISH & RICHARDSON P.C.
`3200 RBC Plaza
`60 South 6th Street
`Minneapolis, MN 55402
`Phone: (612) 335-5070 /Fax: (612) 288-9696
`
`Proshanto Mukherji (pro hac vice)
`mukherji@fr.com
`FISH & RICHARDSON P.C.
`One Marina Park Drive
`Boston, MA 02210
`Phone: (617) 542-5070/ Fax (617) 542-8906
`
`Juanita R. Brooks (CA SBN 75934)
`brooks@fr.com
`Roger A. Denning (CA SBN 228998)
`denning@fr.com
`Jason W. Wolff (CA SBN 215819)
`wolff@fr.com
`Megan A. Chacon (CA SBN 304912)
`chacon@fr.com
`K. Nicole Williams (CA SBN 291900)
`nwilliams@fr.com
`FISH & RICHARDSON P.C.
`12860 El Camino Real, Suite 400
`San Diego, CA 92130
`Phone: (858) 678-5070 /Fax: (858) 678-5099
`
`Aamir A. Kazi (pro hac vice)
`kazi@fr.com
`Lawrence R. Jarvis (pro hac vice)
`jarvis@fr.com
`Fish and Richardson P.C.
`1180 Peachtree Street Ne 21st Floor
`Atlanta, GA 30309
`Phone: (404) 879-7238/ Fax: 404-892-5002
`
`Attorneys for Plaintiff
`FINJAN LLC
`
`UNITED STATES DISTRICT COURT
`
`NORTHERN DISTRICT OF CALIFORNIA
`
`(OAKLAND DIVISION)
`
`FINJAN LLC, a Delaware Limited Liability
`Company,
`
`Case No. 4:18-cv-07229-YGR (TSH)
`
`Plaintiff,
`
`v.
`
`QUALYS INC., a Delaware Corporation,
`
`Defendant.
`
`FINJAN LLC’S OPPOSITION TO
`QUALYS INC’S RENEWED MOTION TO
`STRIKE PORTIONS OF PLAINTIFF
`FINJAN LLC’S INFRINGEMENT
`EXPERT REPORTS
`
`[REDACTED VERSION OF DOCUMENT
`SOUGHT TO BE SEALED]
`
`June 8, 2021
`DATE:
`2:00 PM
`TIME:
`JUDGE: Hon. Yvonne Gonzalez Rogers
`PLACE:
`Zoom Teleconference
`
`FINJAN OPPO TO MOTION TO STRIKE
`Case No. 4:18-cv-07229-YGR (TSH)
`
`

`

`Case 4:18-cv-07229-YGR Document 198 Filed 05/18/21 Page 2 of 10
`
`TABLE OF CONTENTS
`
`Page
`
`I.
`
`Introduction ......................................................................................................................... 1
`
`II. Background ......................................................................................................................... 2
`
`III. Legal Standard ....................................................................................................................... 3
`
`IV. Argument............................................................................................................................. 3
`
`A. Qualys’s New Motion is Not a Renewal of its Prior Motion ............................................... 3
`
`B. Finjan’s Infringement Contentions Disclose Dr. Medvidovic’s Theory for the “Receiving”
`Limitation ......................................................................................................................... 4
`
`C. Qualys Cannot Show That Vulnerability Scanning is Not Based on Requests from a Client
`Device .............................................................................................................................. 4
`
`D. Qualys’s New Arguments Regarding Cloud Agents Should Be Rejected ............................ 7
`
`V. Conclusion ........................................................................................................................... 8
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`i
`
`FINJAN OPPO TO MOTION TO STRIKE
`Case No. 4:18-cv-07229-YGR (TSH)
`
`

`

`Case 4:18-cv-07229-YGR Document 198 Filed 05/18/21 Page 3 of 10
`
`
`
`I.
`
`INTRODUCTION
`
`Qualys’s renewed motion is flawed procedurally and substantively. In its “renewed”
`
`motion, Qualys expands the reach of the Court’s Order and piles in additional portions of
`
`Dr. Medvidovic’s report, raising issues beyond the Court left open for renewal. And for those
`
`issues the Court denied without prejudice, it fails to address the issue identified by the Court’s
`
`Order: whether the “receiving” limitation occurred “based” on requests from a client device.
`
`To reframe the issue from Qualys’s original motion to strike, at issue was whether
`
`Dr. Medvidovic’s infringement theory exceeded the scope of Finjan’s infringement contentions for
`
`the “receiving . . .” limitation. The relevant limitation requires “receiving, by a computer, an
`
`incoming stream of program code.” There is no limitation that specifies what requested the
`
`incoming stream, though obviously a stream would not be received unless something requested it.
`
`Dr. Medvidovic’s infringement theory and Finjan’s infringement contentions are in alignment:
`
`both refer to the same component (e.g., a scanner) performing the same function (receiving data
`
`from a client device), and Qualys raises no issues concerning the identity of what receives the
`
`incoming stream of program code.
`
`Instead, Qualys’s renewed motion turns on whether Dr. Medvidovic’s infringement report
`
`expressly discusses, as part of his infringement analysis, whether infringement depends on
`
`superfluous language in the contentions (that received data is “based” on a request by a client
`
`device). Although Qualys faults Dr. Medvidovic’s report for not importing limitations into the
`
`claims, he had no reason to provide an opinion on whether an unclaimed step was required.
`
`Notably, Qualys’s expert did not provide any infringement opinions regarding whether
`
`vulnerability scanning is “based” on requests for content by a client device either. See Exh. A
`
`(Rubin Reb. Rpt.) at ¶¶ 169-179.
`
`But what is critically ignored in Qualys’s motion is that Qualys has not “demonstrate[d]
`
`that vulnerability scanning is not ‘based’ on requests for content by the client device,” which was
`
`a prerequisite for renewal. ECF No. 188 at 7. Qualys identifies no evidence that suggests the
`
`receiving limitation does not follow a request for content by a client device. Qualys cannot
`
`because vulnerability scanning is based on requests for content from a client device. Qualys’s
`
`
`
`1
`
`
`
`FINJAN OPPO TO MOTION TO STRIKE
`Case No. 4:18-cv-07229-YGR (TSH)
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`
`
`

`

`Case 4:18-cv-07229-YGR Document 198 Filed 05/18/21 Page 4 of 10
`
`
`
`own documentation states that its vulnerability scanning “by default” evaluates “all traffic” on a
`
`network. See Exh. B (QUALYS00453094) at 107 (emphasis added). And network traffic
`
`necessarily involves requests by client devices.
`
`For these and the reasons that follow, the Court should deny Qualys’s motion.
`
`II.
`
`BACKGROUND
`
`Qualys previously filed a motion to strike Dr. Medvidovic’s report for at least seven
`
`different reasons. See ECF No. 156-4. One of Qualys’s arguments was that Dr. Medvidovic’s
`
`infringement theory for limitation 1(a) (“receiving, by a computer, an incoming stream of program
`
`code”) was not properly disclosed in Finjan’s infringement contentions. Id. at 12-13. After
`
`considering Finjan’s infringement contentions, the Court concluded that (1) Finjan’s infringement
`
`contentions refer to the receipt of content based on a request from a client device; and (2) Finjan’s
`
`expert espoused a theory where the accused products may receive content from a client device:
`
`Finjan’s contentions state that the accused products receive content “based on a client
`
`device requesting the content from a source computer, such as the Internet” and
`
`“when a particular client device requests content provided by a source computer.”
`
`(Contentions at 2-4.) Dr. Medvidovic, however, opines that the accused
`
`“Vulnerability Features” perform their network scans to detect vulnerabilities and
`
`policy compliance regardless of content requests and may receive data from client
`
`devices on the same network. (See Medvidovic Report ¶¶ 184-97.)
`
`ECF No. 188 at 7:8-13.
`
`The Court then stated, after reviewing the cited portions of Dr. Medvidovic’s report, it
`
`“cannot determine that they present a new theory.” Id. at 7:14-15. The Court denied Qualys’s
`
`motion, but left open one specific issue: whether the accused vulnerability scanning is “based” on
`
`requests for content by a client device. Id. at 7:18-20.
`
`While Qualys’s motion is purportedly a “renewal” of its motion to strike, it seeks to
`
`expand its mandate, adding new grieves and new portions of Dr. Medvidovic’s report it did not
`
`originally move on, namely ¶¶ 184, 186, 188-194, which were not at issue in its prior motion.
`
`
`
`2
`
`
`
`FINJAN OPPO TO MOTION TO STRIKE
`Case No. 4:18-cv-07229-YGR (TSH)
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`
`
`

`

`Case 4:18-cv-07229-YGR Document 198 Filed 05/18/21 Page 5 of 10
`
`
`
`III. LEGAL STANDARD
`
`The Court is familiar with the legal standards for a motion to strike infringement
`
`contentions, which are set forth in Finjan’s opposition to Qualys’s original motion and
`
`incorporated by reference herein. See ECF No. 163-3. For the issue underlying this motion,
`
`Qualys does not cite a single case where a court has struck an infringement report because the
`
`report failed to expressly opine on unclaimed features mentioned in the party’s PLR contentions
`
`IV. ARGUMENT
`
`A.
`
`Qualys’s New Motion is Not a Renewal of its Prior Motion
`
`Qualys’s prior motion sought to strike six paragraphs (¶¶ 185, 187, 195-197 and 214) of
`
`Dr. Medvidovic’s Report relating to the “receiving . . .” limitation. ECF No. 156 at 12:4-5. The
`
`Court denied Qualys’ motion to strike “without prejudice to renewal should Qualys demonstrate
`
`that vulnerability scanning is not ‘based’ on requests for content by the client device.” ECF No.
`
`188. Under the guise of a “renewed” motion, Qualys’s new motion seeks to strike thirteen
`
`paragraphs from Dr. Medvidovic’s report for the “receiving . . .” limitation—only four of which
`
`were included in Qualys’s original motion: ¶¶ 185, 187, 195, 196. ECF No. 194 at 5:21-24. This
`
`is not a “renewal” of Qualys’s prior motion—it is a new motion as to the paragraphs not cited in
`
`the original motion (¶¶ 184, 186, 188-194). And for the paragraphs that Qualys now seeks to
`
`strike referring to Cloud Agents (some or all of ¶¶ 185, 187, 195-196), Qualys’s basis for seeking
`
`to strike those paragraphs was that Finjan did not accuse Cloud Agents at all. ECF No. 156 at 5
`
`(“Finjan’s infringement contentions for the ’408 Patent do not accuse the Cloud Agent of
`
`practicing any limitation of any asserted claim of the ’408 Patent.”). The Court rejected that
`
`argument already, and Qualys should not be allowed a “do over”—the issue was already resolved.
`
`Thus, Qualys’s motion as to paragraphs ¶¶ 184, 186, 188-196 should be denied for
`
`improperly expanding the scope of the original underlying motion. As to the portions of ¶¶ 185,
`
`187, 195-196 that refer to Cloud Agents, Qualys’s motion should be denied as beyond the scope of
`
`the Court’s Order on an issue where Qualys was already heard.
`
`
`
`3
`
`
`
`FINJAN OPPO TO MOTION TO STRIKE
`Case No. 4:18-cv-07229-YGR (TSH)
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`
`
`

`

`Case 4:18-cv-07229-YGR Document 198 Filed 05/18/21 Page 6 of 10
`
`
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`
`
`B.
`
`Finjan’s Infringement Contentions Disclose Dr. Medvidovic’s Theory for the
`
`“Receiving” Limitation
`
`Claim 1 recites “receiving, by a computer, an incoming stream of program code.” Thus,
`
`the “receiving . . .” limitation requires: (1) receiving data at a computer; and (2) that the received
`
`data is program code.1 Dr. Medvidovic’s expert report and Finjan’s infringement contentions set
`
`forth the same theory for these two requirements. Dr. Medvidovic’s infringement theory for this
`
`limitation is that Qualys’s accused products include scanners that receive content. See, e.g., Exh.
`
`C (Medvidovic Op. Rep.) at ¶ 185. Finjan’s infringement contentions identify Qualys scanners as
`
`part of the claimed “computer” that receives content. Exh. D (408 Inf. Chart) at 2-4.
`
`Qualys cannot dispute the above characterization of Finjan’s infringement contentions or
`
`Dr. Medvidovic’s infringement theory. In its original motion, Qualys acknowledged that Finjan’s
`
`infringement contentions identified scanners as the receiving device (i.e., the claimed
`
`“computer”). ECF No. 156-4 at 12:15-17. Qualys also acknowledged that Finjan’s contentions
`
`identified the data received at the scanners from the client computers as the claimed “program
`
`code.” Id. at 13:1-3 (contending that Finjan’s contentions refer to the receipt of content from a
`
`client device). Finally, Qualys acknowledged that Dr. Medvidovic’s infringement theory is that
`
`scanners perform the receiving step. Id. at 12:21-24 (“
`
`
`
`”).
`
`Thus, there is no dispute that both Finjan’s infringement contentions and Dr. Medvidovic’s
`
`infringement analysis both refer to a scanner receiving content as an example of “receiving, by a
`
`computer, an incoming stream of program code.”
`
`C.
`
`Qualys Cannot Show That Vulnerability Scanning is Not Based on Requests
`
`from a Client Device
`
`Because Finjan’s infringement contentions disclosed both the component (scanner)
`
`responsible for performing the claimed “receiving . . .” and the implicated functionality (receipt of
`
`data in the form of program code), the Court permitted Qualys to renew its motion if it could
`
`“demonstrate that vulnerability scanning is not ‘based’ on requests for content by the client
`
`
`1 Asserted Claim 22 only requires receiving data.
`
`4
`
`
`
`FINJAN OPPO TO MOTION TO STRIKE
`Case No. 4:18-cv-07229-YGR (TSH)
`
`

`

`Case 4:18-cv-07229-YGR Document 198 Filed 05/18/21 Page 7 of 10
`
`
`
`device.” ECF No. 188 at 7. Qualys does not make the showing required by the Order. For
`
`example, Qualys cites no source code, technical documents, logs or expert testimony
`
`demonstrating that the receiving function in vulnerability scanning is not based on requests for
`
`content by a client device.
`
`Qualys’s entire argument seems to be that Finjan’s expert did not expressly opine that
`
`vulnerability scans are also “based” on a client device requesting content. See ECF No. 194 at
`
`1:10-18; id. at 3:11-12; 3:26-28.2 While it is true Dr. Medvidovic did not expressly opine that a
`
`client device must request content for there to be infringement, the reason is not because
`
`Dr. Medvidovic created a new theory infringement not present in the contentions. Rather, the
`
`reason is the claims do not require vulnerability scans to be “based” on a client device
`
`requesting content. This is precisely why Qualys’s technical expert has not disputed infringement
`
`on this basis (he instead argues whether the received content may be fairly characterized as the
`
`claimed “program code”). Exh. A (Rubin Reb. Rep.) at ¶¶ 169-179.
`
`Regardless, vulnerability scanning is “based” on request(s) from client devices. Qualys’s
`
`products operate in a client-server system. See, e.g., Exh. D (408 Inf. Chart) at 2; Exh. A (Rubin
`
`Reb. Rep.) at ¶¶ 102-103; Exh. C (Medvidovic Op. Rep.) at ¶¶ 90-93. Devices in such an
`
`architecture communicate with each other through a series of requests from client devices and
`
`responses from servers. For example, Qualys’s expert included a figure in his report with
`
`annotations (original or his own) that show exemplary communications in the Qualys system,
`
`including requests initiated by a device acting as a client device and content that is returned from a
`
`server and received by the Qualys scanners:
`
`
`2 Qualys argues about the proper construction of a “client device” in its motion (ECF No. 194 at
`2-3); however, its claim construction arguments are irrelevant since “client device” is not a term
`recited in the claims.
`
`
`
`5
`
`
`
`FINJAN OPPO TO MOTION TO STRIKE
`Case No. 4:18-cv-07229-YGR (TSH)
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`
`
`

`

`Case 4:18-cv-07229-YGR Document 198 Filed 05/18/21 Page 8 of 10
`
`
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`
`
`Exh. A (Rubin Reb. Rep.) at ¶ 97.
`
`
`
`While the annotations are not described in Dr. Rubin’s report, the figure generally reflects
`
`a typical client-server architecture that allows communications between the client and the server,
`
`including communications initiated by a client device requesting content. Qualys’s scanners scan
`
`these communications, as its documentation acknowledges. It states that a scanner is “[b]y
`
`default” configured to scan “all traffic” to the Qualys cloud:
`
`By default the Scanner LAN interface services all traffic to the Qualys Cloud
`
`Platform, including management traffic (software updates, health check, scan data
`
`upload) and scanning traffic.
`
`See Exh. B (QUALYS00453094) at 107 (emphasis added). Qualys’s argument, which appears to
`
`be that the only traffic that is scanned is that retrieved by a scanner, contradicts its own
`
`documents, which refer to scanning all traffic.
`
`In fact, Qualys’s expert produced an untimely spreadsheet with his rebuttal report that
`
`identified tens of thousands of potential exploits that could be detected in a Qualys vulnerability
`
`scan, including potential exploits relating to commands used in a client-server system, such as
`
`HTTP Get, HTTP Post, or an HTTP Response. See, e.g., Exh. E (QUALYS-RUBIN0911
`
`(Vulnerability Spreadsheet)) at QID 86391
`
`, QID 86571 (“
`
`”), QID 86427 (“
`
`
`
`
`
`
`
`
`
`6
`
`
`
`FINJAN OPPO TO MOTION TO STRIKE
`Case No. 4:18-cv-07229-YGR (TSH)
`
`

`

`Case 4:18-cv-07229-YGR Document 198 Filed 05/18/21 Page 9 of 10
`
`
`
`86372 (“
`
`(“
`
`”), QID 86580 (“
`
`”), QID
`
`”), QID 86455
`
`”), QID 87026 (“
`
`
`
`”). Qualys’s expert
`
`admits that client devices make requests and receive server responses (i.e., HTTP Requests and
`
`HTTP Responses). See Exh. A (Rubin Reb. Rep.) at ¶¶ 113-117 (discussing HTTP Request and
`
`HTTP GET, HTTP Post, and HTTP Response). Thus, when Qualys’s vulnerability product
`
`examines these types of potential exploits received over the network, the scanner would receive
`
`content “based on” a client device having first requested content, such as through an HTTP GET
`
`request.
`
`Lastly, Qualys sows confusion by arguing that the frequency (e.g., “constantly”,
`
`“continuously”, etc.) and manner (e.g., “automatically”, in response to a “configuration,” etc.) in
`
`which data is collected is informative as to whether data is received “based” on a request from a
`
`client device. These arguments are a red herring and more properly directed to a summary
`
`judgment motion. The Court’s order focused on whether the accused functionality was “based” on
`
`requests from the client device, not their periodicity or whether the client requests are automatic.
`
`Infringement does not depend on any of these issues, which are raised for the first time in
`
`Qualys’s renewed motion.
`
`Accordingly, Qualys has not demonstrated that the accused vulnerability scanning is not
`
`based on requests for content by the client device.
`
`D.
`
`Qualys’s New Arguments Regarding Cloud Agents Should Be Rejected
`
`While the above arguments apply to all theories, Qualys makes new arguments against
`
`Cloud Agents, which are flawed for a different and additional reason. The entire premise for
`
`Qualys’s argument is that a Cloud Agent “does not receive, send, or process requests for content.”
`
`Id. Yet Qualys was supposed to “demonstrate that vulnerability scanning is not ‘based’ on
`
`requests for content by the client device.” ECF No. 188 at 7 (emphasis added). A Cloud Agent is
`
`installed on a client device, but it is irrelevant whether the Cloud Agent itself sends requests for
`
`
`
`7
`
`
`
`FINJAN OPPO TO MOTION TO STRIKE
`Case No. 4:18-cv-07229-YGR (TSH)
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`
`
`

`

`Case 4:18-cv-07229-YGR Document 198 Filed 05/18/21 Page 10 of 10
`
`
`
`content. Qualys does not dispute the client devices request content, which is the relevant inquiry.
`
`See Exh. A (Rubin Reb. Rep.) at ¶¶ 169-179.
`
`For example, after new data is received at the client device (which would be in response to
`
`a request for that data), Dr. Medvidovic opines that the Cloud Agent on that client device collects
`
`data and sends it to the Qualys Cloud Platform for analysis:
`
`Exh. C (Medvidovic Op. Rep.) at ¶ 196 (internal citations omitted).
`
`
`
`
`
`
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`Accordingly, Qualys’s additional arguments about Cloud Agents should be denied too.
`
`11
`
`V.
`
`CONCLUSION
`
`For the reasons set forth herein, the Court should deny Qualys’s motion.
`
`
`Dated: May 18, 2021
`
`
`
`/s/ Jason Wolff
`Jason. W. Wolff
`
`Attorneys for Plaintiff
`FINJAN LLC.
`
`
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`
`
`
`
`8
`
`
`
`FINJAN OPPO TO MOTION TO STRIKE
`Case No. 4:18-cv-07229-YGR (TSH)
`
`

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket