throbber
Case 4:18-cv-07229-YGR Document 201-25 Filed 06/01/21 Page 1 of 28
`
`Exhibit 24
`
`REDACTED VERSION OF DOCUMENT
`SOUGHT TO BE SEALED
`
`

`

`Case 4:18-cv-07229-YGR Document 201-25 Filed 06/01/21 Page 2 of 28
`
`HIGHLY CONFIDENTIAL – ATTORNEYS EYES’ ONLY – SOURCE CODE
`
`IN THE UNITED STATES DISTRICT COURT
`
`FOR THE NORTHERN DISTRICT OF CALIFORNIA
`
`OAKLAND DIVISION
`
`FINJAN LLC, a Delaware Limited Liability
`Company,
`
`Case No. No. 4:18-cv-07229-YGR (TSH)
`
`Plaintiff,
`
`v.
`
`QUALYS INC., a Delaware Corporation,
`
`Defendant.
`
`OPENING EXPERT REPORT OF ERIC COLE,
`PH.D. REGARDING INFRINGEMENT BY
`QUALYS INC. OF PATENT NOS. 6,154,844;
`8,677,494; AND 7,418,731
`[HC-AEO]
`
`Date: December 1, 2020
`
`Eric Cole, PH.D.
`Ashburn, Virginia
`
`1 2 3 4 5 6 7 8 9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`

`

`Case 4:18-cv-07229-YGR Document 201-25 Filed 06/01/21 Page 3 of 28
`Case 4:18-cv-07229—YGR Document 201-25 Filed 06/01/21 Page 3 of 28
`
`
`
`129
`
`

`

`Case 4:18-cv-07229-YGR Document 201-25 Filed 06/01/21 Page 4 of 28
`Case 4:18-cv-07229—YGR Document 201-25 Filed 06/01/21 Page 4 of 28
`
`
`
`130
`
`

`

`Case 4:18-cv-07229-YGR Document 201-25 Filed 06/01/21 Page 5 of 28
`Case 4:18-cv-07229—YGR Document 201-25 Filed 06/01/21 Page 5 of 28
`
`
`
`131
`
`

`

`Case 4:18-cv-07229-YGR Document 201-25 Filed 06/01/21 Page 6 of 28
`Case 4:18-cv-07229—YGR Document 201-25 Filed 06/01/21 Page 6 of 28
`
`
`
`132
`
`

`

`Case 4:18-cv-07229-YGR Document 201-25 Filed 06/01/21 Page 7 of 28
`
`Communications use strong encryption and SSLv3 via port 443. The appliance polls
`
`QualysGuard to automatically to download software updates and new vulnerability signatures,
`
`and to process job requests for network discovery and scanning. Intranet Scanner does not retain
`
`scan results; instead, all data is securely encrypted, transmitted, and stored at redundant Qualys
`
`operations centers.” FINJAN-QUALYS 037927.
`
`358. Cloud Agent in combination with Vulnerability Management receives by an
`
`inspector a Downloadable. Qualys Cloud Agent includes an inspector (e.g., lightweight Cloud
`
`Agent installed on host systems) that receives Downloadables (e.g., metadata regarding installed
`
`software).
`
`359. Qualys Cloud Agents reside on the assets they monitor and work with Qualys
`
`Vulnerability Management to provide agent-based detection thereby extending VM’s network
`
`coverage to assets that cannot otherwise be scanned.
`
`
`Kruse Ex. 4, FINJAN-QUALYS 038136; Bachwani Dep. Tr. at 23:19-21 (Q Can you identify
`and Qualys products that use cloud agents? A. Vulnerability Management.”).
`
`360. Qualys Cloud Agents “collect metadata from its host and send it to the Qualys
`
`Cloud Platform for processing. Vulnerability assessment tests (all the heavy lifting) are
`
`intentionally kept off the agent, and performed within the Qualys Platform.”
`
`149
`
`

`

`Case 4:18-cv-07229-YGR Document 201-25 Filed 06/01/21 Page 8 of 28
`Case 4:18-cv-07229—YGR Document 201-25 Filed 06/01/21 Page 8 of 28
`
`
`
`150
`
`

`

`Case 4:18-cv-07229-YGR Document 201-25 Filed 06/01/21 Page 9 of 28
`Case 4:18-cv-07229—YGR Document 201-25 Filed 06/01/21 Page 9 of 28
`
`
`
`151
`
`

`

`Case 4:18-cv-07229-YGR Document 201-25 Filed 06/01/21 Page 10 of 28
`Case 4:18-cv-07229—YGR Document 201-25 Filed 06/01/21 Page 10 of 28
`
`
`
`152
`
`

`

`Case 4:18-cv-07229-YGR Document 201-25 Filed 06/01/21 Page 11 of 28
`Case 4:18-cv-07229—YGR Document 201-25 Filed 06/01/21 Page 11 of 28
`
`
`
`678
`
`

`

`Case 4:18-cv-07229-YGR Document 201-25 Filed 06/01/21 Page 12 of 28
`Case 4:18-cv-07229—YGR Document 201-25 Filed 06/01/21 Page 12 of 28
`
`
`
`679
`
`

`

`Case 4:18-cv-07229-YGR Document 201-25 Filed 06/01/21 Page 13 of 28
`Case 4:18-cv-07229—YGR Document 201-25 Filed 06/01/21 Page 13 of 28
`
`
`
`680
`
`

`

`Case 4:18-cv-07229-YGR Document 201-25 Filed 06/01/21 Page 14 of 28
`
`has not otherwise construed the term “receiver;” therefore, I have interpreted the term based on
`
`its plain and ordinary meaning to one of ordinary skill in the art at the time of the invention. As I
`
`explain below, the Accused Products satisfy this plain and ordinary meaning.
`
`(a)
`
`Vulnerability Management
`
`1229. Qualys Vulnerability Management, alone or in combination with Continuous
`
`Monitoring, ThreatProtect, or Cloud Agent, meets the recited claim language because
`
`Vulnerability Management, alone or in combination with Continuous Monitoring, ThreatProtect,
`
`or Cloud Agent, includes a receiver for receiving an incoming Downloadable.
`
`1230. Vulnerability Management includes a receiver (e.g., VM Scanning Engine) that
`
`receives Downloadables (e.g., executable application programs scanned by VM in search of
`
`vulnerabilities).
`
`1231. Qualys Vulnerability Management uses “Qualys Scanner Appliance” or “Qualys
`
`Cloud Agent” to collect the data needed to perform a host vulnerability assessment. “Qualys
`
`Scanner Appliance targets host assets remotely” and “Qualys Cloud Agent installs as a local
`
`system service.” Data collected by the Qualys Cloud Agent “is sent back to Qualys Cloud
`
`Platform at regular intervals.”
`
`
`
`
`
`689
`
`

`

`Case 4:18-cv-07229-YGR Document 201-25 Filed 06/01/21 Page 15 of 28
`Case 4:18-cv-07229—YGR Document 201-25 Filed 06/01/21 Page 15 of 28
`
`
`
`690
`
`

`

`Case 4:18-cv-07229-YGR Document 201-25 Filed 06/01/21 Page 16 of 28
`Case 4:18-cv-07229—YGR Document 201-25 Filed 06/01/21 Page 16 of 28
`
`
`
`691
`
`

`

`Case 4:18-cv-07229-YGR Document 201-25 Filed 06/01/21 Page 17 of 28
`Case 4:18-cv-07229—YGR Document 201-25 Filed 06/01/21 Page 17 of 28
`
`
`
`692
`
`

`

`Case 4:18-cv-07229-YGR Document 201-25 Filed 06/01/21 Page 18 of 28
`Case 4:18-cv-07229—YGR Document 201-25 Filed 06/01/21 Page 18 of 28
`
`
`
`693
`
`

`

`Case 4:18-cv-07229-YGR Document 201-25 Filed 06/01/21 Page 19 of 28
`Case 4:18-cv-07229—YGR Document 201-25 Filed 06/01/21 Page 19 of 28
`
`
`
`694
`
`

`

`Case 4:18-cv-07229-YGR Document 201-25 Filed 06/01/21 Page 20 of 28
`Case 4:18-cv-07229—YGR Document 201-25 Filed 06/01/21 Page 20 of 28
`
`
`
`695
`
`

`

`Case 4:18-cv-07229-YGR Document 201-25 Filed 06/01/21 Page 21 of 28
`Case 4:18-cv-07229—YGR Document 201-25 Filed 06/01/21 Page 21 of 28
`
`
`
`696
`
`

`

`Case 4:18-cv-07229-YGR Document 201-25 Filed 06/01/21 Page 22 of 28
`Case 4:18-cv-07229—YGR Document 201-25 Filed 06/01/21 Page 22 of 28
`
`
`
`697
`
`

`

`Case 4:18-cv-07229-YGR Document 201-25 Filed 06/01/21 Page 23 of 28
`Case 4:18-cv-07229—YGR Document 201-25 Filed 06/01/21 Page 23 of 28
`
`
`
`698
`
`

`

`Case 4:18-cv-07229-YGR Document 201-25 Filed 06/01/21 Page 24 of 28
`Case 4:18-cv-07229—YGR Document 201-25 Filed 06/01/21 Page 24 of 28
`
`
`
`699
`
`

`

`Case 4:18-cv-07229-YGR Document 201-25 Filed 06/01/21 Page 25 of 28
`Case 4:18-cv-07229—YGR Document 201-25 Filed 06/01/21 Page 25 of 28
`
`
`
`700
`
`

`

`Case 4:18-cv-07229-YGR Document 201-25 Filed 06/01/21 Page 26 of 28
`Case 4:18-cv-07229—YGR Document 201-25 Filed 06/01/21 Page 26 of 28
`
`
`
`701
`
`

`

`Case 4:18-cv-07229-YGR Document 201-25 Filed 06/01/21 Page 27 of 28
`Case 4:18-cv-07229—YGR Document 201-25 Filed 06/01/21 Page 27 of 28
`
`
`
`702
`
`

`

`Case 4:18-cv-07229-YGR Document 201-25 Filed 06/01/21 Page 28 of 28
`Case 4:18-cv-07229—YGR Document 201-25 Filed 06/01/21 Page 28 of 28
`
`
`
`703
`
`

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket