`
`Exhibit 24
`
`REDACTED VERSION OF DOCUMENT
`SOUGHT TO BE SEALED
`
`
`
`Case 4:18-cv-07229-YGR Document 201-25 Filed 06/01/21 Page 2 of 28
`
`HIGHLY CONFIDENTIAL – ATTORNEYS EYES’ ONLY – SOURCE CODE
`
`IN THE UNITED STATES DISTRICT COURT
`
`FOR THE NORTHERN DISTRICT OF CALIFORNIA
`
`OAKLAND DIVISION
`
`FINJAN LLC, a Delaware Limited Liability
`Company,
`
`Case No. No. 4:18-cv-07229-YGR (TSH)
`
`Plaintiff,
`
`v.
`
`QUALYS INC., a Delaware Corporation,
`
`Defendant.
`
`OPENING EXPERT REPORT OF ERIC COLE,
`PH.D. REGARDING INFRINGEMENT BY
`QUALYS INC. OF PATENT NOS. 6,154,844;
`8,677,494; AND 7,418,731
`[HC-AEO]
`
`Date: December 1, 2020
`
`Eric Cole, PH.D.
`Ashburn, Virginia
`
`1 2 3 4 5 6 7 8 9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`
`
`Case 4:18-cv-07229-YGR Document 201-25 Filed 06/01/21 Page 3 of 28
`Case 4:18-cv-07229—YGR Document 201-25 Filed 06/01/21 Page 3 of 28
`
`
`
`129
`
`
`
`Case 4:18-cv-07229-YGR Document 201-25 Filed 06/01/21 Page 4 of 28
`Case 4:18-cv-07229—YGR Document 201-25 Filed 06/01/21 Page 4 of 28
`
`
`
`130
`
`
`
`Case 4:18-cv-07229-YGR Document 201-25 Filed 06/01/21 Page 5 of 28
`Case 4:18-cv-07229—YGR Document 201-25 Filed 06/01/21 Page 5 of 28
`
`
`
`131
`
`
`
`Case 4:18-cv-07229-YGR Document 201-25 Filed 06/01/21 Page 6 of 28
`Case 4:18-cv-07229—YGR Document 201-25 Filed 06/01/21 Page 6 of 28
`
`
`
`132
`
`
`
`Case 4:18-cv-07229-YGR Document 201-25 Filed 06/01/21 Page 7 of 28
`
`Communications use strong encryption and SSLv3 via port 443. The appliance polls
`
`QualysGuard to automatically to download software updates and new vulnerability signatures,
`
`and to process job requests for network discovery and scanning. Intranet Scanner does not retain
`
`scan results; instead, all data is securely encrypted, transmitted, and stored at redundant Qualys
`
`operations centers.” FINJAN-QUALYS 037927.
`
`358. Cloud Agent in combination with Vulnerability Management receives by an
`
`inspector a Downloadable. Qualys Cloud Agent includes an inspector (e.g., lightweight Cloud
`
`Agent installed on host systems) that receives Downloadables (e.g., metadata regarding installed
`
`software).
`
`359. Qualys Cloud Agents reside on the assets they monitor and work with Qualys
`
`Vulnerability Management to provide agent-based detection thereby extending VM’s network
`
`coverage to assets that cannot otherwise be scanned.
`
`
`Kruse Ex. 4, FINJAN-QUALYS 038136; Bachwani Dep. Tr. at 23:19-21 (Q Can you identify
`and Qualys products that use cloud agents? A. Vulnerability Management.”).
`
`360. Qualys Cloud Agents “collect metadata from its host and send it to the Qualys
`
`Cloud Platform for processing. Vulnerability assessment tests (all the heavy lifting) are
`
`intentionally kept off the agent, and performed within the Qualys Platform.”
`
`149
`
`
`
`Case 4:18-cv-07229-YGR Document 201-25 Filed 06/01/21 Page 8 of 28
`Case 4:18-cv-07229—YGR Document 201-25 Filed 06/01/21 Page 8 of 28
`
`
`
`150
`
`
`
`Case 4:18-cv-07229-YGR Document 201-25 Filed 06/01/21 Page 9 of 28
`Case 4:18-cv-07229—YGR Document 201-25 Filed 06/01/21 Page 9 of 28
`
`
`
`151
`
`
`
`Case 4:18-cv-07229-YGR Document 201-25 Filed 06/01/21 Page 10 of 28
`Case 4:18-cv-07229—YGR Document 201-25 Filed 06/01/21 Page 10 of 28
`
`
`
`152
`
`
`
`Case 4:18-cv-07229-YGR Document 201-25 Filed 06/01/21 Page 11 of 28
`Case 4:18-cv-07229—YGR Document 201-25 Filed 06/01/21 Page 11 of 28
`
`
`
`678
`
`
`
`Case 4:18-cv-07229-YGR Document 201-25 Filed 06/01/21 Page 12 of 28
`Case 4:18-cv-07229—YGR Document 201-25 Filed 06/01/21 Page 12 of 28
`
`
`
`679
`
`
`
`Case 4:18-cv-07229-YGR Document 201-25 Filed 06/01/21 Page 13 of 28
`Case 4:18-cv-07229—YGR Document 201-25 Filed 06/01/21 Page 13 of 28
`
`
`
`680
`
`
`
`Case 4:18-cv-07229-YGR Document 201-25 Filed 06/01/21 Page 14 of 28
`
`has not otherwise construed the term “receiver;” therefore, I have interpreted the term based on
`
`its plain and ordinary meaning to one of ordinary skill in the art at the time of the invention. As I
`
`explain below, the Accused Products satisfy this plain and ordinary meaning.
`
`(a)
`
`Vulnerability Management
`
`1229. Qualys Vulnerability Management, alone or in combination with Continuous
`
`Monitoring, ThreatProtect, or Cloud Agent, meets the recited claim language because
`
`Vulnerability Management, alone or in combination with Continuous Monitoring, ThreatProtect,
`
`or Cloud Agent, includes a receiver for receiving an incoming Downloadable.
`
`1230. Vulnerability Management includes a receiver (e.g., VM Scanning Engine) that
`
`receives Downloadables (e.g., executable application programs scanned by VM in search of
`
`vulnerabilities).
`
`1231. Qualys Vulnerability Management uses “Qualys Scanner Appliance” or “Qualys
`
`Cloud Agent” to collect the data needed to perform a host vulnerability assessment. “Qualys
`
`Scanner Appliance targets host assets remotely” and “Qualys Cloud Agent installs as a local
`
`system service.” Data collected by the Qualys Cloud Agent “is sent back to Qualys Cloud
`
`Platform at regular intervals.”
`
`
`
`
`
`689
`
`
`
`Case 4:18-cv-07229-YGR Document 201-25 Filed 06/01/21 Page 15 of 28
`Case 4:18-cv-07229—YGR Document 201-25 Filed 06/01/21 Page 15 of 28
`
`
`
`690
`
`
`
`Case 4:18-cv-07229-YGR Document 201-25 Filed 06/01/21 Page 16 of 28
`Case 4:18-cv-07229—YGR Document 201-25 Filed 06/01/21 Page 16 of 28
`
`
`
`691
`
`
`
`Case 4:18-cv-07229-YGR Document 201-25 Filed 06/01/21 Page 17 of 28
`Case 4:18-cv-07229—YGR Document 201-25 Filed 06/01/21 Page 17 of 28
`
`
`
`692
`
`
`
`Case 4:18-cv-07229-YGR Document 201-25 Filed 06/01/21 Page 18 of 28
`Case 4:18-cv-07229—YGR Document 201-25 Filed 06/01/21 Page 18 of 28
`
`
`
`693
`
`
`
`Case 4:18-cv-07229-YGR Document 201-25 Filed 06/01/21 Page 19 of 28
`Case 4:18-cv-07229—YGR Document 201-25 Filed 06/01/21 Page 19 of 28
`
`
`
`694
`
`
`
`Case 4:18-cv-07229-YGR Document 201-25 Filed 06/01/21 Page 20 of 28
`Case 4:18-cv-07229—YGR Document 201-25 Filed 06/01/21 Page 20 of 28
`
`
`
`695
`
`
`
`Case 4:18-cv-07229-YGR Document 201-25 Filed 06/01/21 Page 21 of 28
`Case 4:18-cv-07229—YGR Document 201-25 Filed 06/01/21 Page 21 of 28
`
`
`
`696
`
`
`
`Case 4:18-cv-07229-YGR Document 201-25 Filed 06/01/21 Page 22 of 28
`Case 4:18-cv-07229—YGR Document 201-25 Filed 06/01/21 Page 22 of 28
`
`
`
`697
`
`
`
`Case 4:18-cv-07229-YGR Document 201-25 Filed 06/01/21 Page 23 of 28
`Case 4:18-cv-07229—YGR Document 201-25 Filed 06/01/21 Page 23 of 28
`
`
`
`698
`
`
`
`Case 4:18-cv-07229-YGR Document 201-25 Filed 06/01/21 Page 24 of 28
`Case 4:18-cv-07229—YGR Document 201-25 Filed 06/01/21 Page 24 of 28
`
`
`
`699
`
`
`
`Case 4:18-cv-07229-YGR Document 201-25 Filed 06/01/21 Page 25 of 28
`Case 4:18-cv-07229—YGR Document 201-25 Filed 06/01/21 Page 25 of 28
`
`
`
`700
`
`
`
`Case 4:18-cv-07229-YGR Document 201-25 Filed 06/01/21 Page 26 of 28
`Case 4:18-cv-07229—YGR Document 201-25 Filed 06/01/21 Page 26 of 28
`
`
`
`701
`
`
`
`Case 4:18-cv-07229-YGR Document 201-25 Filed 06/01/21 Page 27 of 28
`Case 4:18-cv-07229—YGR Document 201-25 Filed 06/01/21 Page 27 of 28
`
`
`
`702
`
`
`
`Case 4:18-cv-07229-YGR Document 201-25 Filed 06/01/21 Page 28 of 28
`Case 4:18-cv-07229—YGR Document 201-25 Filed 06/01/21 Page 28 of 28
`
`
`
`703
`
`