throbber
Case 4:18-cv-07229-YGR Document 200 Filed 05/25/21 Page 1 of 6
`
`RYAN R. SMITH (SBN 229323)
`rsmith@wsgr.com
`CHRISTOPHER D. MAYS (SBN 266510)
`cmays@wsgr.com
`WILSON SONSINI GOODRICH &
`ROSATI
`Professional Corporation
`650 Page Mill Road
`Palo Alto, CA 94304-1050
`Telephone: (650) 493-9300
`Facsimile: (650) 493-6811
`
`EDWARD G. POPLAWSKI (SBN 113590)
`epoplawski@wsgr.com
`OLIVIA M. KIM (SBN 228382)
`okim@wsgr.com
`TALIN GORDNIA (SBN 274213)
`tgordnia@wsgr.com
`STEPHANIE C. CHENG (SBN 319856)
`stephanie.cheng@wsgr.com
`WILSON SONSINI GOODRICH &
`ROSATI
`Professional Corporation
`633 West Fifth Street, Suite 1550
`Los Angeles, CA 90071
`Telephone: (323) 210-2900
`Facsimile: (866) 974-7329
`
`Attorneys for Defendant
`QUALYS INC.
`
`IN THE UNITED STATES DISTRICT COURT
`
`FOR THE NORTHERN DISTRICT OF CALIFORNIA
`
`OAKLAND DIVISION
`
`CASE NO.: 4:18-cv-07229-YGR (TSH)
`
`REPLY IN SUPPORT OF
`DEFENDANT QUALYS INC.’S
`RENEWED MOTION TO STRIKE
`PORTIONS OF PLAINTIFF FINJAN
`LLC’S INFRINGEMENT EXPERT
`REPORTS
`
`Judge: Hon. Yvonne Gonzalez
`Rogers
`Date: Tuesday, June 8, 2021
`Time: 2:00pm
`Location: Zoom Teleconference1
`
`))))))))))))))
`
`FINJAN LLC
`
`Plaintiff,
`
`v.
`
`QUALYS INC.,
`
`Defendant.
`
`1 Per the Court’s Notice regarding Civil Law and Motion Calendars and its Order at D.I. 48.
`
`CASE NO. 4:18-cv-07229-YGR
`
`REPLY ISO RENEWED MOTION TO STRIKE
`
`1
`2
`3
`4
`5
`6
`7
`8
`9
`10
`11
`12
`13
`14
`15
`16
`17
`18
`19
`20
`21
`22
`23
`24
`25
`26
`27
`28
`
`

`

`Case 4:18-cv-07229-YGR Document 200 Filed 05/25/21 Page 2 of 6
`
`I.
`
`INTRODUCTION
`Finjan’s Opposition says very little about Medvidovic’s Report and the actual opinions
`contained therein. Finjan certainly fails to show how Medvidovic’s opinions disclose a theory of
`infringement involving vulnerability scanning based on client devices’ computer requests. Instead,
`Finjan attempts to distract from Medvidovic’s failure to remain consistent with Finjan’s
`infringement contentions by discussing Qualys’s experts and citing technical documents (none of
`which, of course, appear anywhere in Medvidovic’s Report or Finjan’s infringement contentions).
`Setting these distractions aside, the question for the Court is clear: Do Medvidovic’s
`opinions about the ’408 Patent’s “receiving” limitation exceed the scope of Finjan’s infringement
`contentions? The answer is yes. Finjan’s contentions conditioned infringement upon a claimed
`computer receiving content based on a client device’s request for that content. But even Finjan
`concedes (Opposition at 5) that Medvidovic’s report offers no opinion conditioning infringement
`on a client device requesting content. Rather, what Medvidovic calls the claimed “computer” is
`nowhere shown to perform vulnerability scans “based on” a client device’s request for content but
`instead simply based on customer-configurations directing an automatic process that is
`independent of any end-user devices. For these reasons, discussed more fully below, Qualys’s
`motion should be granted.
`II.
`ARGUMENT
`As an initial point, Finjan nowhere disputes Qualys’s discussion of what a “client device”
`is in the pertinent field, particularly in the context of the Court’s Claim Construction Order in this
`case. Compare Motion at 2-3 with Opposition at 5, fn. 2. Finjan merely argues that because the
`term “client device” does not appear in the claims, the Court should ignore Qualys’s arguments.
`But, of course, it was Finjan who placed the meaning of “client device” at issue by conditioning
`infringement of the ’408 Patent on a client device requesting content. See Exhibit 5, D.I. 158-6,
`at 2-4. In any event, Finjan does not dispute that a client device refers to an end-user’s device that
`requests content.
`
`1
`2
`3
`4
`5
`6
`7
`8
`9
`10
`11
`12
`13
`14
`15
`16
`17
`18
`19
`20
`21
`22
`23
`24
`25
`26
`27
`28
`
`CASE NO. 4:18-cv-07229-YGR
`
`1
`
`REPLY ISO RENEWED MOTION TO STRIKE
`
`

`

`Case 4:18-cv-07229-YGR Document 200 Filed 05/25/21 Page 3 of 6
`
`1
`2
`3
`4
`5
`6
`7
`8
`9
`10
`11
`12
`13
`14
`15
`16
`17
`18
`19
`20
`21
`22
`23
`24
`25
`26
`27
`28
`
`A.
`
`This Motion Seeks to Strike Only Those Paragraphs of the Medvidovic
`Report Pertaining to His New Theory for the “Receiving” Limitation.
`Finjan takes issue with the fact that the instant motion identifies additional paragraphs of
`Medvidovic’s report from Qualys’s previous motion. But Qualys seeks to strike those
`paragraphs—and only those paragraphs—that pertain to Medvidovic’s “receiving” limitation for
`the Vulnerability Management line of products. See Exhibit 13, D.I. 194-2, at ¶¶184-196. Qualys
`has correctly identified, based on the Court’s Order, those paragraphs where Medvidovic renders
`opinions about infringement of the “receiving” limitation that are not based on a client device’s
`request for content (and therefore exceed the scope of Finjan’s infringement contentions). See D.I.
`188 at 7. Therefore, these paragraphs each fall within the scope of the Court’s Order and are
`properly the subject of this Renewed Motion.
`B.
`Finjan’s Infringement Contentions Do Not Disclose Medvidovic’s Theory for
`the “Receiving” Limitation.
`The parties agree that Medvidovic’s theory of infringement is that Qualys scanners receive
`content. Where the parties disagree is that Medvidovic’s opinions do not premise the receipt of
`that content on a client device’s request. Finjan argues that both its infringement contentions and
`Medvidovic’s report identify Qualys’s scanners as being part of the claimed “computer.” But that
`straw man argument fails to address the core issue: Finjan’s infringement contentions specifically
`state that the claimed computer receives content “based on a client device requesting the content
`from a source computer.” Exhibit 5, D.I. 158-6, at 2-3. Meanwhile, Finjan concedes that
`Medvidovic “did not expressly opine that a client device must request content for there to be
`infringement.” Opposition at 5. Medvidovic’s opinions no longer require any client device
`whatsoever, and thus jettison a foundational condition for infringement disclosed in Finjan’s
`infringement contentions. Medvidovic’s opinions are thus necessarily broader than the scope of
`the contentions and should be struck.
`C.
`Finjan and Medvidovic Fail to Show that Vulnerability Scanning is Based on
`Client Device’s Requests for Content.
`Finjan argues that Qualys’s motion should be denied because Qualys cannot prove that
`Vulnerability Scanning is not based on Requests from a client device. This argument is incorrect:
`as discussed in its opening brief, Medvidovic’s report shows that vulnerability scanning occurs
`
`CASE NO. 4:18-cv-07229-YGR
`
`2
`
`REPLY ISO RENEWED MOTION TO STRIKE
`
`

`

`Case 4:18-cv-07229-YGR Document 200 Filed 05/25/21 Page 4 of 6
`
`based on customer configurations as to when and where scans will occur. See Motion at 3-5. Any
`content requests come from Qualys’s scanners, not an end-user device. See id. at 4. Finjan does
`not dispute these facts. Moreover, Finjan improperly shifts the burden of infringement and the
`local rules – Finjan bears the burden of disclosing its infringement theories and ensuring that its
`experts’ opinions on infringement are consistent with those disclosures, not Qualys. And, of
`course, it is Finjan that bears the ultimate burden of proving infringement. Finjan’s argument that
`Qualys cannot prove a negative—i.e., that vulnerability scanning is not based on requests from a
`client device—merely obfuscates the fact that Finjan cannot point to a portion of Medvidovic’s
`report opining that vulnerability scans are based on a client device’s request for content.
`Finjan also argues that the claims do not require vulnerability scans to be based on a client
`device requesting content. But that argument is legally immaterial, because this motion pertains
`to Finjan’s disclosed infringement theory and whether Medvidovic’s opinions are consistent with
`that theory. Specifically, what matters here is that (a) Finjan’s infringement theory required a
`computer to receive content based on a client device’s content request, and (b) Medvidovic’s
`opinions are inconsistent with the original theory because his infringement opinions no longer
`involve client devices requesting content, let alone such a request being the basis of a vulnerability
`scan. See Exhibit 5, D.I. 158-6, at 2-3; Opposition at 5 (conceding point). Put another way,
`because Medvidovic opines that infringement can occur even if no client device requests content,
`his opinions go beyond the scope of Finjan’s contentions and should be struck.
`Finjan next argues that Qualys’s products necessarily include a “client device,” citing
`portions of Qualys’s expert’s report as well as several technical documents. There are two
`problems with this argument. First, Finjan makes no attempt to show that these materials (or the
`information disclosed therein) appear anywhere in either its infringement contentions or were ever
`considered or discussed in Medvidovic’s report. The issue here is the scope of Medvidovic’s
`opinions, not how Finjan’s attorneys may interpret documents appearing nowhere in Medvidovic’s
`report. Such extrinsic materials are not probative of whether Medvidovic’s opinions are consistent
`with Finjan’s infringement contentions.
`
`1
`2
`3
`4
`5
`6
`7
`8
`9
`10
`11
`12
`13
`14
`15
`16
`17
`18
`19
`20
`21
`22
`23
`24
`25
`26
`27
`28
`
`CASE NO. 4:18-cv-07229-YGR
`
`3
`
`REPLY ISO RENEWED MOTION TO STRIKE
`
`

`

`Case 4:18-cv-07229-YGR Document 200 Filed 05/25/21 Page 5 of 6
`
`1
`2
`3
`4
`5
`6
`7
`8
`9
`10
`11
`12
`13
`14
`15
`16
`17
`18
`19
`20
`21
`22
`23
`24
`25
`26
`27
`28
`
`Second, Finjan now suggests that devices like the Qualys Cloud Platform and the Qualys
`scanners are “client devices” that request content. To be clear, there is no dispute that Qualys’s
`scanners can make content requests. See Motion at 4-5 (citing Exhibit 13, D.I. 194-2 at ¶¶ 186,
`188, and 190). But Medvidovic did not opine that these scanners or the Cloud Platform are the
`“client devices.” Rather, Medvidovic specifically opined that these components were the claimed
`“computer” that receives content. See Motion at 4-5; Exhibit 13, D.I. 194-2 at ¶¶ 185 (“At a high
`level, the Qualys Cloud Platform relies on different techniques for scanning content that results in
`the receipt, by a computer (the scanner engine of Qualys Cloud Platform used by the Vulnerability
`Features, the WAS scanner of the Qualys Cloud Platform, or the Qualys Cloud Platform working
`with a Cloud Agent)”) and 196 (“Thus, in this example of the Vulnerability Features, the Qualys
`Cloud Platform includes a ‘computer,’ such as the scanner engine, and the collected data by that
`scanner engine…”). Thus, Finjan’s argument is not probative because it is unconnected to the
`scope of Medvidovic’s opinions. Indeed, given Medvidovic’s opinion that the scanners and Cloud
`Platform are the “computer” of the ‘408 Patent’s claims, the materials Finjan cites actually support
`Qualys’s point that Medvidovic opined that the claimed computer—not a client device—requests
`content.
` Finjan’s Cloud Agent Arguments Miss the Point
`D.
`Finjan finally argues that some of the challenged paragraphs contain opinions about the
`“Cloud Agent” and should therefore be excluded. This, again, misses the point. Although the
`Court determined that Finjan sufficiently disclosed Cloud Agents as an accused product in its
`infringement contentions for the ’408 Patent, the Court did not find that Medvidovic opined about
`the Cloud Agents in a manner consistent with Finjan’s infringement contentions. Similar to
`Medvidovic’s opinions involving scanners, Medvidovic’s Cloud Agent opinions do not discuss or
`involve any vulnerability scans being based on a client device requesting content. See Motion at
`4-5.
`
`Finjan’s argument that “Qualys does not dispute the client devices request content, which
`is the relevant inquiry” is also flawed. Opposition at 8. Both parties agree that Cloud Agents are
`software installed on end-user computers. See D.I 194 at 4-5. Medvidovic nowhere opines that
`
`CASE NO. 4:18-cv-07229-YGR
`
`4
`
`REPLY ISO RENEWED MOTION TO STRIKE
`
`

`

`1
`2
`3
`4
`5
`6
`7
`8
`9
`10
`11
`12
`13
`14
`15
`16
`17
`18
`19
`20
`21
`22
`23
`24
`25
`26
`27
`28
`
`Case 4:18-cv-07229-YGR Document 200 Filed 05/25/21 Page 6 of 6
`
`such an end-user computer ever requests content, and certainly never opines that a Cloud Agent is
`involved in the process even if such a content request occurs (which is precisely the problem).
`Finjan injects pure attorney speculation that “new data” is “received at the client device” “in
`response to a request for that data,” but this is problematic for two reasons. Opposition at 8. First,
`attorney speculation is not evidence, and Finjan offers no evidence that Medvidovic ever opined
`about such end-user devices ever making content requests. Second, even if a hypothetical end-
`user device did request content at some point, Finjan presents no evidence that Medvidovic ever
`opined that such content requests are at all involved in a vulnerability scan using a Cloud Agent.
`Tellingly, Finjan fails to point to a single passage in Medvidovic’s report supporting its argument.2
`
`III.
`
`CONCLUSION
`For the foregoing reasons, the Court should grant Qualys’s motion to strike the opinions of
`Dr. Nenad Medvidovic regarding the Receiving limitation for vulnerability scans (Paragraphs 184-
`185 (to the extent discussing vulnerability scans) and 186-196) as being a different theory from
`the one disclosed in Finjan’s infringement contentions.
`Respectfully submitted,
`
`WILSON SONSINI GOODRICH & ROSATI
`
`Dated: May 25, 2021
`
`By:
`
`/s/ Christopher D. Mays
`CHRISTOPHER D. MAYS
`
`Counsel for
`QUALYS INC.
`
`2 Finjan quotes a passage of Medvidovic’s report discussing the Qualys Cloud Platform
`receiving data sent by a Cloud Agent. This, of course, says nothing about any client device ever
`making a content request or whether any information sent to the Cloud Platform occurs “based
`on” such a request.
`
`CASE NO. 4:18-cv-07229-YGR
`
`5
`
`REPLY ISO RENEWED MOTION TO STRIKE
`
`

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket