throbber
Case 3:17-cv-00183-CAB-BGS Document 191 Filed 10/25/17 PageID.8918 Page 1 of 122
`
`PAUL J. ANDRE (State Bar No. 196585)
`pandre@kramerlevin.com
`LISA KOBIALKA (State Bar No. 191404)
`lkobialka@kramerlevin.com
`JAMES HANNAH (State Bar No. 237978)
`jhannah@kramerlevin.com
`KRAMER LEVIN NAFTALIS & FRANKEL LLP
`990 Marsh Road
`Menlo Park, CA 94025
`Telephone: (650) 752-1700
`Facsimile: (650) 752-1800
`
`Attorneys for Plaintiff
`FINJAN, INC.
`
`IN THE UNITED STATES DISTRICT COURT
`FOR THE SOUTHERN DISTRICT OF CALIFORNIA
`SAN DIEGO DIVISION
`FINJAN, INC., a Delaware Corporation,
`Case No.: 3:17-cv-00183-CAB-BGS
`
`PLAINTIFF FINJAN, INC.’S
`SUPPLEMENTAL INFORMATION
`IN SUPPORT OF CLAIM
`CONSTRUCTION REGARDING THE
`TERM “ENGINE”
`
`Plaintiff,
`
`v.
`
`ESET, LLC, a California Limited
`Liability Corporation, and ESET SPOL.
`S.R.O., a Slovak Republic Corporation,
`
`Defendants.
`ESET, LLC, a California Limited
`Liability Corporation, and ESET SPOL.
`S.R.O., a Slovak Republic Corporation,
`
`Counterclaim-Plaintiffs,
`
`v.
`
`FINJAN, INC., a Delaware Corporation,
`
`Counterclaim-Defendant.
`
`FINJAN’S SUPP. INFORMATION
`RE: “ENGINE”
`
`CASE NO. 17-cv-00183-CAB-BGS
`
`1 2 3 4 5 6 7 8 9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`

`

`Case 3:17-cv-00183-CAB-BGS Document 191 Filed 10/25/17 PageID.8919 Page 2 of 122
`
`Finjan, Inc. (“Finjan”) was not able to locate any case law where the claim term
`“engine” preceded by a descriptive modifier was determined to be a nonce term,1 and no
`decisions where “engine” was construed as a means-plus-function limitation when used
`in the claims. Instead, Finjan was able to locate hundreds of publications where those
`skilled in the art describe a variety of “engine” types demonstrating that “engine,” when
`used with a particular descriptive modifier (e.g., “antivirus engine,” “scanning engine,”
`“communication engine,” etc.) , is a term that is well understood by those of skill in the
`art and often used in software programming to describe the structure of a computer
`program.2 Submitted herewith is a sampling of those publications and references
`ranging from 1992 through the present. Upon request, Finjan is able to provide
`numerous additional publications and references discussing other types of engines.
`
`1.
`
`2.
`
`3.
`
`Attached as Exhibit 1 is an excerpt from the prosecution history of U.S.
`Patent No. 9,189,621. Exhibit 1 describes a “mutation engine” and shows
`the reference “Dark Avenger Mutation Engine No Threat to Protected
`PCs,” dated May 11, 1992.
`
`Attached as Exhibit 2 is U.S. Patent No. 5,680,547, entitled “Method and
`Apparatus for Controlling Network and Workstation Access Prior to
`Workstation Boot,” which was filed on August 8, 1995. Exhibit 2
`describes an “executable services engine.”
`
`Attached as Exhibit 3 is Finjan’s U.S. Patent No. 6,154,844, which was
`filed on December 22, 1997. Exhibit 3 describes a “protection engine,” a
`“content inspection engine,” a “security policy analysis engine,” a
`“Downloadable ID verification engine,” “Downloadable development
`engine,” a “network protection engine,” a “communications engine,” and a
`“web server engine.” Further, Claim 15, an asserted claim in this case,
`describes “content inspection engine.”
`
`1 The only case Eset submitted that mentions an “engine” is a PTAB case (Ex parte
`Smith) where “engine” was not even a claim term.
`2 By providing these references to the Court, Finjan is in no way admitting that the
`attached are relevant as prior art.
`
`FINJAN’S SUPP. INFORMATION
`RE: “ENGINE”
`
`1
`
`CASE NO. 17-cv-00183-CAB-BGS
`
`1 2 3 4 5 6 7 8 9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`

`

`Case 3:17-cv-00183-CAB-BGS Document 191 Filed 10/25/17 PageID.8920 Page 3 of 122
`
`4.
`
`5.
`
`6.
`
`7.
`
`8.
`
`9.
`
`Attached as Exhibit 4 is a press release entitled “Symantec Announces
`Norton Antivirus for Firewalls for Maximum Protection from Internet-
`Borne Viruses,” dated May 6, 1997. Exhibit 4 describes the “Norton
`AntiVirus Engine.”
`
`Attached as Exhibit 5 is U.S. Patent No. 6,029,256, entitled “Method and
`System for Allowing Computer Programs Easy Access to Features of a
`Virus Scanning Engine,” which was filed on December 31, 1997. Exhibit
`5 describes a “virus scan engine.”
`
`Attached as Exhibit 6 is a true and correct copy of the abstract of an article
`entitled “Bugs in the Web,” dated in 1997. Exhibit 6 describes an “e-mail
`scanning engine” and “virus scanning engine.”
`
`Attached as Exhibit 7 is an article from the 7th USENIX Security
`Symposium entitled “Data Mining Approaches for Intrusion Detection,”
`dated January 1998. Exhibit 7 describes a “detection engine.”
`
`Attached as Exhibit 8 is the abstract for an article entitled “PicoJava: a
`direct execution engine for Java Bytecode,” dated October 1998. Exhibit 8
`describes an “execution engine.”
`
`Attached as Exhibit 9 is an excerpt from the prosecution history of the ‘621
`Patent. Exhibit 9 shows the reference, “Heuristic Engines,” dated
`September 2001.
`
`10. Attached as Exhibit 10 is an article from Symantec Community, entitled
`“Open AV: Developing Open Source AntiVirus Engines,” dated December
`16, 2002. Exhibit 10 describes an “antivirus engine” and “detection
`engine.”
`
`11. Attached as Exhibit 11 is an article from the SFGate entitled “Best
`antivirus software for 2005/Viruses and worms just keep getting smarter
`and more devious,” dated November 29, 2004. Exhibit 11 describes an
`“antivirus engine.”
`
`12. Attached as Exhibit 12 is an article from ESET entitled “ESET Update
`Boosts Engine Scanning Speed,” dated July 12, 2010. Exhibit 12 describes
`ESET’s “scanning engine.”
`
`FINJAN’S SUPP. INFORMATION
`RE: “ENGINE”
`
`2
`
`CASE NO. 17-cv-00183-CAB-BGS
`
`1 2 3 4 5 6 7 8 9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`

`

`Case 3:17-cv-00183-CAB-BGS Document 191 Filed 10/25/17 PageID.8921 Page 4 of 122
`
`13. Attached as Exhibit 13 is ESET’s webpage entitled “ESET leading-edge
`technology,” as it exists today. Exhibit 13 describes ESET’s “scanning
`engine” and “detection engine.”
`
`14. Attached as Exhibit 14 is a true and correct copy of the Wikipedia.org
`webpage entitled “Comparison of antivirus software,” as it exists today.
`Exhibit 14 describes an “antivirus engine.”
`
`DATED: October 2, 2017
`
`Respectfully submitted,
`
`By: s/ James Hannah
`Paul J. Andre (State Bar. No. 196585)
`Lisa Kobialka (State Bar No. 191404)
`James Hannah (State Bar No. 237978)
`KRAMER LEVIN NAFTALIS
`& FRANKEL LLP
`990 Marsh Road
`Menlo Park, CA 94025
`Telephone: (650) 752-1700
`Facsimile: (650) 752-1800
`pandre@kramerlevin.com
`lkobialka@kramerlevin.com
`jhannah@kramerlevin.com
`
`Attorneys for Plaintiff
`FINJAN, INC.
`
`FINJAN’S SUPP. INFORMATION
`RE: “ENGINE”
`
`3
`
`CASE NO. 17-cv-00183-CAB-BGS
`
`1 2 3 4 5 6 7 8 9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`

`

`Case 3:17-cv-00183-CAB-BGS Document 191 Filed 10/25/17 PageID.8922 Page 5 of 122
`
`Exhibit 1
`
`(cid:3) (cid:3) (cid:3) (cid:3) (cid:3) (cid:3)
`
`

`

`Case 3:17-cv-00183-CAB-BGS Document 191 Filed 10/25/17 PageID.8923 Page 6 of 122
`
`

`

`Case 3:17-cv-00183-CAB-BGS Document 191 Filed 10/25/17 PageID.8924 Page 7 of 122
`
`Exhibit 2
`
`(cid:3) (cid:3) (cid:3) (cid:3) (cid:3) (cid:3)
`
`

`

`Case 3:17-cv-00183-CAB-BGS Document 191 Filed 10/25/17 PageID.8925 Page 8 of 122
`
`

`

`Case 3:17-cv-00183-CAB-BGS Document 191 Filed 10/25/17 PageID.8926 Page 9 of 122
`
`

`

`Case 3:17-cv-00183-CAB-BGS Document 191 Filed 10/25/17 PageID.8927 Page 10 of 122
`
`

`

`Case 3:17-cv-00183-CAB-BGS Document 191 Filed 10/25/17 PageID.8928 Page 11 of 122
`
`

`

`Case 3:17-cv-00183-CAB-BGS Document 191 Filed 10/25/17 PageID.8929 Page 12 of 122
`
`

`

`Case 3:17-cv-00183-CAB-BGS Document 191 Filed 10/25/17 PageID.8930 Page 13 of 122
`
`

`

`Case 3:17-cv-00183-CAB-BGS Document 191 Filed 10/25/17 PageID.8931 Page 14 of 122
`
`

`

`Case 3:17-cv-00183-CAB-BGS Document 191 Filed 10/25/17 PageID.8932 Page 15 of 122
`
`

`

`Case 3:17-cv-00183-CAB-BGS Document 191 Filed 10/25/17 PageID.8933 Page 16 of 122
`
`

`

`Case 3:17-cv-00183-CAB-BGS Document 191 Filed 10/25/17 PageID.8934 Page 17 of 122
`
`

`

`Case 3:17-cv-00183-CAB-BGS Document 191 Filed 10/25/17 PageID.8935 Page 18 of 122
`
`

`

`Case 3:17-cv-00183-CAB-BGS Document 191 Filed 10/25/17 PageID.8936 Page 19 of 122
`
`

`

`Case 3:17-cv-00183-CAB-BGS Document 191 Filed 10/25/17 PageID.8937 Page 20 of 122
`
`Exhibit 3
`
`(cid:3) (cid:3) (cid:3) (cid:3) (cid:3) (cid:3)
`
`

`

`Case 3:17-cv-00183-CAB-BGS Document 191 Filed 10/25/17 PageID.8938 Page 21 of 122
`
`

`

`Case 3:17-cv-00183-CAB-BGS Document 191 Filed 10/25/17 PageID.8939 Page 22 of 122
`
`

`

`Case 3:17-cv-00183-CAB-BGS Document 191 Filed 10/25/17 PageID.8940 Page 23 of 122
`
`

`

`Case 3:17-cv-00183-CAB-BGS Document 191 Filed 10/25/17 PageID.8941 Page 24 of 122
`
`

`

`Case 3:17-cv-00183-CAB-BGS Document 191 Filed 10/25/17 PageID.8942 Page 25 of 122
`
`

`

`Case 3:17-cv-00183-CAB-BGS Document 191 Filed 10/25/17 PageID.8943 Page 26 of 122
`
`

`

`Case 3:17-cv-00183-CAB-BGS Document 191 Filed 10/25/17 PageID.8944 Page 27 of 122
`
`

`

`Case 3:17-cv-00183-CAB-BGS Document 191 Filed 10/25/17 PageID.8945 Page 28 of 122
`
`

`

`Case 3:17-cv-00183-CAB-BGS Document 191 Filed 10/25/17 PageID.8946 Page 29 of 122
`
`

`

`Case 3:17-cv-00183-CAB-BGS Document 191 Filed 10/25/17 PageID.8947 Page 30 of 122
`
`

`

`Case 3:17-cv-00183-CAB-BGS Document 191 Filed 10/25/17 PageID.8948 Page 31 of 122
`
`

`

`Case 3:17-cv-00183-CAB-BGS Document 191 Filed 10/25/17 PageID.8949 Page 32 of 122
`
`

`

`Case 3:17-cv-00183-CAB-BGS Document 191 Filed 10/25/17 PageID.8950 Page 33 of 122
`
`

`

`Case 3:17-cv-00183-CAB-BGS Document 191 Filed 10/25/17 PageID.8951 Page 34 of 122
`
`

`

`Case 3:17-cv-00183-CAB-BGS Document 191 Filed 10/25/17 PageID.8952 Page 35 of 122
`
`

`

`Case 3:17-cv-00183-CAB-BGS Document 191 Filed 10/25/17 PageID.8953 Page 36 of 122
`
`

`

`Case 3:17-cv-00183-CAB-BGS Document 191 Filed 10/25/17 PageID.8954 Page 37 of 122
`
`

`

`Case 3:17-cv-00183-CAB-BGS Document 191 Filed 10/25/17 PageID.8955 Page 38 of 122
`
`Exhibit 4
`
`(cid:3) (cid:3) (cid:3) (cid:3) (cid:3) (cid:3)
`
`

`

`Case 3:17-cv-00183-CAB-BGS Document 191 Filed 10/25/17 PageID.8956 Page 39 of 122
`Symantec Announces Norton Antivirus For Firewalls For Maximum Protection From Internet-Borne Viruses | Symantec
`9/28/2017
`
`Press Releases
`
`SHARE:
`
`(cid:173) (cid:172) (cid:216)
`
`Symantec Announces Norton Antivirus For Firewalls For Maximum
`Protection From Internet-Borne Viruses
`Part of Symantec's Multi-Tier Security Solution (cid:1588) Norton AntiVirus for Firewalls
`Provides Maximum Anti-Virus Security for Corporate Firewalls
`CUPERTINO, Calif. —May 6, 1997— Symantec Corporation (Nasdaq: SYMC), the world's leading
`supplier of utilities and anti-virus software products today announced the introduction of Norton
`AntiVirus for Firewalls. As part of the Norton AntiVirus product line, this new product provides
`comprehensive anti-virus protection for corporations with compatible firewalls, by catching and
`destroying Internet-borne viruses before they invade corporate computer networks. Supported by
`industry-leading firewall vendors, Norton AntiVirus for Firewalls is used in conjunction with an
`existing firewall to provide an unparalleled corporate gateway security solution that provides
`maximum anti-virus protection from Internet-spread viruses, with an unrivaled degree of
`administrative flexibility and control at minimal expense to network throughput. Combined with the
`recently-released Norton AntiVirus Internet Email Gateways, Symantec delivers a complete solution
`of anti-virus protection for the corporate network gateways. administrative flexibility and control.
`
`"Norton AntiVirus for Firewalls addresses the growing need for a complete anti-virus solution at the
`corporate gateway level," said Enrique Salem, vice-president Symantec Security and Assistance
`Business Unit. "By detecting and destroying viruses in Internet, Web browsing, file transfer traffic,
`and Internet e-mail attachments, the corporate workplace is ensured of multi-level protection. Our
`development of robust anti-virus solutions such as Norton AntiVirus for Firewalls is a serious
`commitment towards providing Internet security and anti-virus protection to our corporate customers
`at all levels of their network infrastructure.".
`
`Defining AntiVirus Technology Standards for Firewall Integration
`
`NAV for Firewalls defines the standard for anti-virus technology integration with existing firewalls by
`minimizing network throughput degradation by intelligently scanning only suspicious traffic for
`
`https://www.symantec.com/about/newsroom/press-releases/1997/symantec_0506_01
`
`1/6
`
`

`

`Case 3:17-cv-00183-CAB-BGS Document 191 Filed 10/25/17 PageID.8957 Page 40 of 122
`Symantec Announces Norton Antivirus For Firewalls For Maximum Protection From Internet-Borne Viruses | Symantec
`9/28/2017
`viruses. An HTML user interface allows remote configuration. Supported by a consortium of
`industry-leading firewall vendors, NAV for Firewalls will be integrated seamlessly into existing
`corporate firewalls at virtually no degradation to overall network performance based on the
`revolutionary product architecture developed jointly by Symantec and Checkpoint Software
`Technologies. Symantec's partners include: Check Point Software Technologies, Trusted
`Information Systems (TIS), CyberGuard Corporation and Milkyway. In addition, Symantec plans to
`implement support for Microsoft's Proxy Server later this year. Together, these vendors hold
`approximately 50% market share of the firewall marketing according to market researcher
`International Data Corporation (IDC.)
`
`"Norton AntiVirus for Firewalls takes full advantage of the capabilities of the OPSEC Content
`Vectoring Protocol (CVP) to minimize performance impact and to provide and maximize anti-virus
`protection to Check Point FireWall-1 users," said Asheem Chandna, Director of Business
`Development, Check Point Software Technologies, Inc.
`
`Product Features and Benefits
`
`This latest addition to the Norton AntiVirus product line is based on the award-winning Norton
`
`AntiVirus engine. Norton AntiVirus for Firewalls is a Windows NT-based virus scanning server whichAntiVirus engine.
`utilizes Norton AntiVirus detection and removal technology. To be installed on a separate PC, NAV
`for Firewalls can be directly integrated into compatible firewalls, independent of operating systems.
`
`Another key benefit of NAV for Firewalls is that the administrator does not have to configure each of
`the client workstations individually to link up with a proxy, which prohibits any end-user by-pass
`possibilities. NAV for Firewalls is easy to configure through an HTML-based User Interface (UI),
`allowing multi-platform and remote configuration. NAV for Firewalls keeps track of detailed network
`security activities via a comprehensive activity log, and provides up-to-the-minute statistics of
`network activities in an HTML format to the network administrator.
`
`NAV for Firewalls scans and removes viruses found in Internet traffic, and is also capable of
`repairing infected files before forwarding to the end-user. In addition to anti-virus protection, NAV for
`Firewalls also has the capability of being configured to prevent certain types of files from entering
`the network, such as Java.CLASS files. NAV for Firewalls can be configured to scan three types of
`common Internet protocol files; HTTP, FTP, and SMTP; as well as an additional fourth protocol to be
`determined by the firewall.
`
`NAV for Firewalls incorporates an intelligent scanning architecture based on the Content Vectoring
`Protocol (CVP), whereby the firewall directs only suspicious traffic for a virus scan, which insures
`minimal impact to network throughput. NAV for Firewalls is highly scaleable in that it can be used to
`scan for any specific or all Internet protocols, depending up the needs of the corporation. The HTML
`user interface allows remote configuration. This architecture also allows NAV for Firewalls to be
`integrated with compatible firewalls of any platform, Unix or NT. In summary, NAV for Firewalls
`offers these additional unparalleled features:
`
`https://www.symantec.com/about/newsroom/press-releases/1997/symantec_0506_01
`
`2/6
`
`

`

`(cid:111)
`
`(cid:111)
`
`(cid:111)
`
`(cid:111)
`
`(cid:111)
`
`(cid:111)
`
`Case 3:17-cv-00183-CAB-BGS Document 191 Filed 10/25/17 PageID.8958 Page 41 of 122
`Symantec Announces Norton Antivirus For Firewalls For Maximum Protection From Internet-Borne Viruses | Symantec
`9/28/2017
`Comprehensive protection scans incoming and outgoing traffic types - including HTTP,
`FTP, SMTP, and has a reserved slot for a fourth Internet protocol type (to be determined by the
`firewalls) for viruses. NAV for Firewalls also scans virtually unlimited numbers of file extensions.
`
`Uses the award-winning, patent-pending Norton Anti-Virus Striker technology - an anti-anti-
`virus engine
`virus engine capable of detecting and removing even the dreaded Polymorphic viruses. Striker
`technology employs a revolutionary approach to the chameleon-like polymorphics. Each time
`NAV for Firewalls scans the gateway, it sets up a "virtual PC." This becomes a "clean room" in
`which NAV for Firewalls safely executes the potentially infected file without endangering other
`files.Separate and configurable scanning policies - for scanning inbound and outbound traffic,
`and uses a multi-thread scanning system to handle multiple simultaneous requests and scans.
`Provides maximum administrative flexibility - allowing administrators options for treating
`infected files including withhold (quarantine) and repair/remove.
`Minimal performance impact - provides users with minimal throughput degradation.
`Provides automatic and up-to-date virus definition updates, free via automatic and
`scheduleable LiveUpdate - provided from the Symantec AntiVirus Research Center (SARC)
`without any significant interruption of the daily network activities.
`Supported by an industry-leading consortium of firewall companies, NAV for Firewalls
`defines the standard of anti-virus for corporate firewalls. Compatible firewalls include:
`Checkpoint Firewall - Version 3.0 for UNIX, NT
`(cid:111)
`Trusted Information Systems (TIS) Gauntlet Firewall for UNIX 4.0 and NT
`CyberGuard Firewall
`Milkyway Blackhole Firewall (future release)(version 1.5, to be released Q2)
`Microsoft Proxy Server 1.0 (future release2)
`
`(cid:111)
`
`(cid:111)
`
`(cid:111)
`
`(cid:111)
`
`At the server level, NAV provides centralized control and customization, scheduled and on-demand
`scanning, and protection against virus transmissions within workgroups using Novell and NT
`servers. On the level of Internet Email (SMTP) Gateways, NAV for Internet Email Gateways detects
`and removes viruses hidden in attachments before they enter the corporation. Easy to configure
`and use via an HTML user interface, NAV-IEG provides minimal performance impact as it
`implements different scanning policies for inbound and outbound traffic.
`
`For large corporations equipped with firewalls who are concerned with Internet security threats such
`as viruses and malicious objects in general, Symantec's latest product, Norton AntiVirus (NAV) for
`Firewalls, backed by the industry-leading firewall companies, takes out Internet-borne viruses in
`various common protocols such as HTTP, FTP, and SMTP. NAV for Firewalls is based on
`revolutionary architecture developed in conjunction with leading firewall companies. Highly
`scaleable and platform-independent with respect to firewall integration, NAV for Firewalls is easy to
`use via an HTML user interface and provides maximum anti-virus protection at minimal expense to
`network throughput.
`
`Another key benefit of the entire NAV multi-tier product line up includes consistent and current one-
`click protection via LiveUpdate, which provides one button access to the latest virus definition
`updates and the visionary technology of the Symantec AntiVirus Research Center (SARC), the
`industry's leading virus research organization. SARC uses proactive Internet technology such as
`
`https://www.symantec.com/about/newsroom/press-releases/1997/symantec_0506_01
`
`3/6
`
`

`

`Case 3:17-cv-00183-CAB-BGS Document 191 Filed 10/25/17 PageID.8959 Page 42 of 122
`Symantec Announces Norton Antivirus For Firewalls For Maximum Protection From Internet-Borne Viruses | Symantec
`9/28/2017
`Bloodhound to prevent viruses from entering the corporate workplace. In addition, according to
`Secure Computing Best of Breed Solution Summary, January 1997, SARC leads the industry with a
`99.5% overall detection rate of "in the wild" viruses, using technologies such Seeker and SARA,
`next generation Polymorphic virus detection, and Macro Virus Protection (MVP) which uses access
`control technology to detect and remove macro viruses from infected documents. The
`comprehensive line of Norton AntiVirus products include:
`
`(cid:111)
`
`(cid:111)
`
`(cid:111)
`
`(cid:111)
`
`(cid:111)
`
`(cid:111)
`
`(cid:111)
`
`(cid:111)
`
`Norton AntiVirus (NAV) 3.0 for DOS Windows 3.1
`Norton AntiVirus (NAV) 2.0 for Windows 95
`Norton AntiVirus (NAV) NT 2.0 for Windows NT
`Norton AntiVirus (NAV) Internet for Netscape
`Norton AntiVirus (NAV) 2.0 NetWare for Novell
`Symantec AntiVirus (SAM) 4.5 for Macintosh
`Norton AntiVirus (NAV) for Internet Email Gateways - NAV-IEG
`Norton AntiVirus (NAV) for Firewalls
`
`About Symantec AntiVirus Research Center (SARC)
`
`NAV for Firewalls is backed by the Symantec AntiVirus Research Center (SARC). SARC is
`comprised of a dedicated team of virus experts whose sole mission is to provide swift, global
`responses to computer virus threats, proactively research and develop technologies that eliminate
`such threats, and educate the public on safe computing practices. As new computer viruses appear,
`SARC develops identification and detection for these viruses, and provides either a repair or delete
`operation, thus keeping users protected against the latest virus threats. These virus definitions
`updates are available free of charge (other than normal phone and Internet access charges) to
`users of Norton AntiVirus, and are easily obtained via LiveUpdate: one-button access to virus
`definition updates.
`
`Pricing, Availability and System Requirements
`
`NAV for Firewalls is expected to ship in mid-June, 1997. Pricing for corporate customers will be
`based on the number of users per firewall. For 1-500 users per firewall, Norton AntiVirus for
`Firewalls starts at $1,999, Estimated Retail Price (ERP); for 501-1000 users per firewall, the price is
`$3,999 (ERP); and for 1,001 users or more per firewall, NAV for Firewalls is priced at $7,999 (ERP).
`Minimum recommended system requirements include Pentium 133 MHz or above CPU, Windows
`NT 3.51 or above, CD ROM, 32 MB of RAM, 7 MB of hard disk space, 500 MB hard disk space for
`efficient server operation and TCP/IP.
`
`Symantec Corporation develops, markets, and supports a complete line of application and system
`software products designed to enhance individual and workgroup productivity as well as manage
`networked computing environments. Platforms supported include IBM personal computers and
`compatibles, Apple Macintosh computers as well as all major network operating systems. Founded
`in 1982, the company's global operations span North America, Europe, Japan and several fast
`growing markets throughout Asia Pacific and Latin America. Information on the company and its
`products can be obtained by calling (800) 441-7234 toll free or (541) 334-6054.
`
`https://www.symantec.com/about/newsroom/press-releases/1997/symantec_0506_01
`
`4/6
`
`

`

`Case 3:17-cv-00183-CAB-BGS Document 191 Filed 10/25/17 PageID.8960 Page 43 of 122
`Symantec Announces Norton Antivirus For Firewalls For Maximum Protection From Internet-Borne Viruses | Symantec
`9/28/2017
`NOTE TO EDITORS: If you would like additional information on Symantec Corporation and its
`products, please view the Symantec Press Center at http://www.symantec.com/PressCenter/ on
`Symantec's website.
`
`Brands and products referenced herein are the trademarks or registered trademarks of their
`respective holders. All prices noted are in US. Microsoft, Windows NT, MS-DOS and windows are
`either registered trademarks or trademarks of Microsoft Corporation in the United States and/or
`other countries.
`
`Quotes
`Check Point Software Technologies, Inc.
`Asheem Chandna, Director of Business Development
`(415) 562-0410
`
`"We're pleased that Symantec has developed the Norton AntiVirus for Firewalls product based on
`the Content Vectoring Protocol (CVP), jointly developed between Symantec and Check Point" said
`Asheem Chandna, director of business development for Check Point Software Technologies, Inc.
`"Giving customers the ability to create a cohesive network security solution by integrating solid anti-
`virus protection with FireWall-1 is the driving force behind the commitment to CVP and Check
`Point's Open Platform for Secure Enterprise Connectivity strategy."
`
`Milkyway
`Cuong Nguyen, Vice President of Research and Development
`
`"The tight integration of Symantec's selective anti-viral client with our "no-compromise" Black Hole
`firewall provides our users with a faster throughput and greater performance efficiencies, particularly
`in heterogeneous environments." Nguyen continued to say; "Integrating Symantecs' anti-viral
`solution with our "hardened kernel" security architecture further supports Milkyway's focus of
`partnering with technology leaders to meet the requirements of our growing global customer base."
`
`Trusted Information Systems (TIS)
`Steven Lipner, Executive Vice President and General Manager, Network Security Products
`301-947-7299
`
`"We are happy to be working with a leader like Symantec to bring the latest in firewall-based
`scanning products to our customers. We've been very pleased with both the speed and quality of
`our joint engineering efforts."
`
`Trusted Information Systems (TIS)
`Jim Ishikawa, Director of Product Management,
`(301) 527-9500
`
`"With its unique management and control interface integrated with Gauntlet Firewall products,
`Norton AntiVirus for Firewalls is a very solid solution for Gauntlet customers. We are pleased to be
`adding this product to the TIS suite of Open Content Security solutions."
`
`https://www.symantec.com/about/newsroom/press-releases/1997/symantec_0506_01
`
`5/6
`
`

`

`Case 3:17-cv-00183-CAB-BGS Document 191 Filed 10/25/17 PageID.8961 Page 44 of 122
`Symantec Announces Norton Antivirus For Firewalls For Maximum Protection From Internet-Borne Viruses | Symantec
`9/28/2017
`CyberGuard Corporation
`Robert L. Carberry, president and CEO
`(954) 973-5290
`"CyberGuard believes that anti-virus is a critical part of a complete Internet/Intranet security
`solution. We are pleased to work with one of the leaders in anti-virus, Symantec, and its Norton
`AntiVirus for Firewalls product, to help provide superior solutions and services to our corporate
`customers."
`
`NOTE TO EDITORS: If you would like additional information on Symantec Corporation and its
`products, please view the Symantec Press Center at http://www.symantec.com/PressCenter/ on
`Symantec's website.
`
`
`
`Brands and products referenced herein are the trademarks or registered trademarks of their
`respective holders. All prices noted are in US dollars and are valid only in the United States.
`
`
`
`
`
`(cid:172) (cid:173) (cid:227) (cid:406) (cid:356)
`
`© 1995–2017 Symantec Corporation
`
`About Symantec
`
`Careers
`
`News
`
`Sitemap
`
`Legal
`
`Privacy
`
`Cookies
`
`Contact Us
`
`https://www.symantec.com/about/newsroom/press-releases/1997/symantec_0506_01
`
`6/6
`
`

`

`Case 3:17-cv-00183-CAB-BGS Document 191 Filed 10/25/17 PageID.8962 Page 45 of 122
`
`Exhibit 5
`
`(cid:3) (cid:3) (cid:3) (cid:3) (cid:3) (cid:3)
`
`

`

`Case 3:17-cv-00183-CAB-BGS Document 191 Filed 10/25/17 PageID.8963 Page 46 of 122
`
`

`

`Case 3:17-cv-00183-CAB-BGS Document 191 Filed 10/25/17 PageID.8964 Page 47 of 122
`
`

`

`Case 3:17-cv-00183-CAB-BGS Document 191 Filed 10/25/17 PageID.8965 Page 48 of 122
`
`

`

`Case 3:17-cv-00183-CAB-BGS Document 191 Filed 10/25/17 PageID.8966 Page 49 of 122
`
`

`

`Case 3:17-cv-00183-CAB-BGS Document 191 Filed 10/25/17 PageID.8967 Page 50 of 122
`
`

`

`Case 3:17-cv-00183-CAB-BGS Document 191 Filed 10/25/17 PageID.8968 Page 51 of 122
`
`

`

`Case 3:17-cv-00183-CAB-BGS Document 191 Filed 10/25/17 PageID.8969 Page 52 of 122
`
`

`

`Case 3:17-cv-00183-CAB-BGS Document 191 Filed 10/25/17 PageID.8970 Page 53 of 122
`
`

`

`Case 3:17-cv-00183-CAB-BGS Document 191 Filed 10/25/17 PageID.8971 Page 54 of 122
`
`

`

`Case 3:17-cv-00183-CAB-BGS Document 191 Filed 10/25/17 PageID.8972 Page 55 of 122
`
`

`

`Case 3:17-cv-00183-CAB-BGS Document 191 Filed 10/25/17 PageID.8973 Page 56 of 122
`
`

`

`Case 3:17-cv-00183-CAB-BGS Document 191 Filed 10/25/17 PageID.8974 Page 57 of 122
`
`Exhibit 6
`
`(cid:3) (cid:3) (cid:3) (cid:3) (cid:3) (cid:3)
`
`

`

`Case 3:17-cv-00183-CAB-BGS Document 191 Filed 10/25/17 PageID.8975 Page 58 of 122
`Bugs in the Web
`10/2/2017
`
`Polski English
`
`remember me
`
`Login or register account
`password recovery
`
`Bugs in the Web
`Jonathan Richardson
`
`Details Contributors
`
`Fields of science Bibliography Quotations Similar Collections
`
`Source
`
`Computers & Security > 1997 > 16 > 4 > 332-333
`
`Abstract
`There is no doubt that over the past couple of years users' awareness of the risk of virus infection has increased. To
`understand the issues at stake it is first important to understand the nature if virus attacks. There are three main types
`of virus, these are: boot sector, executable and data-borne viruses. Boot sector viruses are the easiest to trap since
`they spread by infecting the boot sector of floppy disks. Executable viruses are harder to trap but it is still possible.
`Data-borne viruses are epitomized by the Word macro virus. Data-borne viruses are very hard to locate since they
`operate within host programs such as Excel and Word. By far the best virus protection policy on networks is to
`provide full virus scanning at the point of entry of files. Scanning files as they are accessed will always slow down the
`user's workstation however well the scanning works. A better option is to only scan the files as they enter the PC.
`SWEEP uses Sophos' InterCheck Technology to eliminate the need to scan each file for all known viruses every time
`it is accessed. There have for some years been NLM-based server virus protection modules. These can either scan
`files as they are accessed or be set to run at scheduled intervals to scan all files. Products such as Norton Anti Virus
`for NetWare run as server-based processes to ensure that the server remains clean at all times. Internet-borne
`viruses are not intercepted by server-based anti-virus software because the connection to the Internet typically
`bypasses the network server. The InterScan VirusWall product removes the need to have client-based scanners
`looking at the Internet content as it arrives at the user's workstation. Instead, a real-time E-mail scanning engine is
`E-mail scanning engine
`placed on the Internet Gateway. InterScan VirusWall is composed of a virus scanning engine and a Simple Mail
` virus scanning engine
`Transfer Protocol proxy server. The Integralis MIMEsweeper scans incoming E-mail to detect viruses, allowing control
`of full E-mail content. Both Java and ActiveX pose security problems since they are Internet-borne applications. The
`only safeguard at present is via certification schemes where safe controls are independently validated. With a proper
`set of security products ranging from packet level firewalls to Web content and E-mail scanners, plus correct
`configuration of your network, there is no reason why connecting to the Internet should pose a security threat.
`
`less
`
`Identifiers
`journal ISSN : 0167-4048
`
`Authors
`
`Jonathan Richardson
`
`Additional information
`Publication
`English
`languages:
`
`Data set:
`
`Elsevier
`
`https://www.infona.pl/resource/bwmeta1.element.elsevier-8a2dc931-1653-3b83-8207-56d66ab3ad4a
`
`1/2
`
`

`

`Case 3:17-cv-00183-CAB-BGS Document 191 Filed 10/25/17 PageID.8976 Page 59 of 122
`Bugs in the Web
`10/2/2017
`Publisher
`
`Elsevier Science
`
`Fields of science
`No field of science has been suggested yet.
`
`© 2015 Interdisciplinary Centre for Mathematical and Computational Modelling
`
`https://www.infona.pl/resource/bwmeta1.element.elsevier-8a2dc931-1653-3b83-8207-56d66ab3ad4a
`
`2/2
`
`

`

`Case 3:17-cv-00183-CAB-BGS Document 191 Filed 10/25/17 PageID.8977

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket